Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Diman Zad Tootaghaj is active.

Publication


Featured researches published by Diman Zad Tootaghaj.


consumer communications and networking conference | 2011

Game-theoretic approach to mitigate packet dropping in wireless Ad-hoc networks

Diman Zad Tootaghaj; Farshid Farhat; Mohammad-Reza Pakravan; Mohammad Reza Aref

Performance of routing is severely degraded when misbehaving nodes drop packets instead of properly forwarding them. In this paper, we propose a Game-Theoretic Adaptive Multipath Routing (GTAMR) protocol to detect and punish selfish or malicious nodes which try to drop information packets in routing phase and defend against collaborative attacks in which nodes try to disrupt communication or save their power. Our proposed algorithm outranks previous schemes because it is resilient against attacks in which more than one node coordinate their misbehavior and can be used in networks which wireless nodes use directional antennas. We then propose a game theoretic strategy, ERTFT, for nodes to promote cooperation. In comparison with other proposed TFT-like strategies, ours is resilient to systematic errors in detection of selfish nodes and does not lead to unending death spirals.


ieee international symposium on workload characterization | 2015

Evaluating the Combined Impact of Node Architecture and Cloud Workload Characteristics on Network Traffic and Performance/Cost

Diman Zad Tootaghaj; Farshid Farhat; Mohammad Arjomand; Paolo Faraboschi; Mahmut T. Kandemir; Anand Sivasubramaniam; Chita R. Das

The combined impact of node architecture and workload characteristics on off-chip network traffic with performance/cost analysis has not been investigated before in the context of emerging cloud applications. Motivated by this observation, this paper performs a thorough characterization of twelve cloud workloads using a full-system datacenter simulation infrastructure. We first study the inherent network characteristics of emerging cloud applications including message inter-arrival times, packet sizes, inter-node communication overhead, self-similarity, and traffic volume. Then, we study the effect of hardware architectural metrics on network traffic. Our experimental analysis reveals that (1) the message arrival times and packet-size distributions exhibit variances across different cloud applications, (2) the inter-arrival times imply a large amount of self-similarity as the number of nodes increase, (3) the node architecture can play a significant role in shaping the overall network traffic, and finally, (4) the applications we study can be broadly divided into those which perform better in a scale-out or scale-up configuration at node level and into two categories, namely, those that have long-duration, low-burst flows and those that have short-duration, high-burst flows. Using the results of (3) and (4), the paper discusses the performance/cost trade-offs for scale-out and scale-up approaches and proposes an analytical model that can be used to predict the communication and computation demand for different configurations. It is shown that the difference between two different node architectures performance per dollar cost (under same number of cores system wide) can be as high as 154 percent which disclose the need for accurate characterization of cloud applications before wasting the precious cloud resources by allocating wrong architecture. The results of this study can be used for system modeling, capacity planning and managing heterogeneous resources for large-scale system designs.


IEEE Transactions on Cloud Computing | 2016

Stochastic Modeling and Optimization of Stragglers

Farshid Farhat; Diman Zad Tootaghaj; Yuxiong He; Anand Sivasubramaniam; Mahmut Kandemir; Chita R. Das

MapReduce framework is widely used to parallelize batch jobs since it exploits a high degree of multi-tasking to process them. However, it has been observed that when the number of servers increases, the map phase can take much longer than expected. This paper analytically shows that the stochastic behavior of the servers has a negative effect on the completion time of a MapReduce job, and continuously increasing the number of servers without accurate scheduling can degrade the overall performance. We analytically model the map phase in terms of hardware, system, and application parameters to capture the effects of stragglers on the performance. Mean sojourn time (MST), the time needed to sync the completed tasks at a reducer, is introduced as a performance metric and mathematically formulated. Following that, we stochastically investigate the optimal task scheduling which leads to an equilibrium property in a datacenter with different types of servers. Our experimental results show the performance of the different types of schedulers targeting MapReduce applications. We also show that, in the case of mixed deterministic and stochastic schedulers, there is an optimal scheduler that can always achieve the lowest MST.


consumer communications and networking conference | 2011

Risk of attack coefficient effect on availability of Ad-hoc networks

Diman Zad Tootaghaj; Farshid Farhat; Mohammad-Reza Pakravan; Mohammad Reza Aref

Security techniques have been designed to obtain certain objectives. One of the most important objectives all security mechanisms try to achieve is the availability, which insures that network services are available to various entities in the network when required. But there has not been any certain parameter to measure this objective in network. In this paper we consider availability as a security parameter in ad-hoc networks. However this parameter can be used in other networks as well. We also present the connectivity coefficient of nodes in a network which shows how important is a node in a network and how much damage is caused if a certain node is compromised.


measurement and modeling of computer systems | 2018

Parsimonious Tomography: Optimizing Cost-Identifiability Trade-off for Probing-based Network Monitoring

Diman Zad Tootaghaj; Ting He; Thomas F. La Porta

Network tomography using end-to-end probes provides a powerful tool for monitoring the performance of internal network elements. However, active probing can generate tremendous traffic, which degrades the overall network performance. Meanwhile, not all the probing paths contain useful information for identifying the link metrics of interest. This observation motivates us to study the optimal selection of monitoring paths to balance identifiability and probing cost. Assuming additive link metrics (e.g., delays), we consider four closely-related optimization problems: 1) Max-ILCost that maximizes the number of identifiable links under a probing budget, 2) Max-Rank-Cost that maximizes the rank of selected paths under a probing budget, 3) Min-Cost-IL that minimizes the probing cost while preserving identifiability, and 4) Min-Cost-Rank that minimizes the probing cost while preserving rank. While (1) and (3) are hard to solve, (2) and (4) are easy to solve, and the solutions give a good approximation for (1) and (3). Specifically, we provide an optimal algorithm for (4) and a (1?1/e)-approximation algorithm for (2). We prove that the solution for (4) provides tight upper/lower bounds on the minimum cost of (3), and the solution for (2) provides upper/lower bounds on the maximum identifiability of (1). Our evaluations on real topologies show that solutions to the rank-based optimization (2, 4) have superior performance in terms of the objectives of the identifiability-based optimization (1, 3), and our solutions can reduce the total probing cost by an order of magnitude while achieving the same monitoring performance.


transmission & distribution conference & exposition: asia and pacific | 2009

Partial discharge source classification and de-noising in rotating machines using Discrete Wavelet Transform and directional coupling capacitors

Mohammad Amin Kashiha; Diman Zad Tootaghaj; Dolat Djamshidi

This paper introduces a new method to separate PD from other disturbing signals present on the high voltage generators and motors. The method is based on combination of a pattern classifier (i.e. Discrete Wavelet Transform (DWT)) to de-noise PD and Time-Of-Arrival method to separate PD sources. Furthermore we will show that it can recognize PD sources including rotating machines internal and external (e.g. on the bus bar) discharge pulses.


symposium on reliable distributed systems | 2017

Controlling Cascading Failures in Interdependent Networks under Incomplete Knowledge

Diman Zad Tootaghaj; Novella Bartolini; Hana Khamfroush; Thomas F. La Porta

Vulnerability due to inter-connectivity of multiple networks has been observed in many complex networks. Previous works mainly focused on robust network design and on recovery strategies after sporadic or massive failures in the case of complete knowledge of failure location. We focus on cascading failures involving the power grid and its communication network with consequent imprecision in damage assessment. We tackle the problem of mitigating the ongoing cascading failure and providing a recovery strategy. We propose a failure mitigation strategy in two steps: 1) Once a cascading failure is detected, we limit further propagation by re-distributing the generator and loads power. 2) We formulate a recovery plan to maximize the total amount of power delivered to the demand loads during the recovery intervention. Our approach to cope with insufficient knowledge of damage locations is based on the use of a new algorithm to determine consistent failure sets (CFS). We show that, given knowledge of the system state before the disruption, the CFS algorithm can find all consistent sets of unknown failures in polynomial time provided that, each connected component of the disrupted graph has at least one line whose failure status is known to the controller.


2017 IFIP Networking Conference (IFIP Networking) and Workshops | 2017

Network recovery from massive failures under uncertain knowledge of damages

Diman Zad Tootaghaj; Hana Khamfroush; Novella Bartolini; Stefano Ciavarella; Seamus Hayes; Thomas F. La Porta


Journal of Electromagnetic Analysis and Applications | 2009

Partial Discharge Source Classification and De-Noising in Rotating Machines Using Discrete Wavelet Transform and Directional Coupling Capacitor

Mohammad Amin Kashiha; Diman Zad Tootaghaj; Dolat Jamshidi


Archive | 2017

High Five: Improving Gesture Recognition by Embracing Uncertainty.

Diman Zad Tootaghaj; Adrian Sampson; Todd Mytkowicz; Kathryn S. McKinley

Collaboration


Dive into the Diman Zad Tootaghaj's collaboration.

Top Co-Authors

Avatar

Farshid Farhat

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

Thomas F. La Porta

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

Novella Bartolini

Sapienza University of Rome

View shared research outputs
Top Co-Authors

Avatar

Hana Khamfroush

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

Mohammad Arjomand

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

Ting He

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

Anand Sivasubramaniam

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

Chita R. Das

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

Adrian Sampson

University of Washington

View shared research outputs
Researchain Logo
Decentralizing Knowledge