Public reporting burden for this collection of information is estimated to average 1 hour per res... more Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden to
Proceedings of ICICS, 1997 International Conference on Information, Communications and Signal Processing. Theme: Trends in Information Systems Engineering and Wireless Multimedia Communications (Cat. No.97TH8237), 2000
2008 Ieee Wireless Communications and Networking Conference, 2008
Passive RFID tags transmit their ID information to a tag reader upon energization by the reader. ... more Passive RFID tags transmit their ID information to a tag reader upon energization by the reader. These transmitted signals, or IDs, may collide if multiple tags transmit their ID simultaneously, requiring repeated energizations by the reader to read all tag IDs successfully. The number of energizations increases with the number of ID bits in the tag and the number of tags to be read. An increase in energizations results in a greater incurred latency to read the tags, and additionally, more transmissions. This is undesirable in an industry environment especially, and with this comes higher expended energy by the reading system, leading to higher system costs. In this paper, a new proposed scheme is evaluated, the Shortcut Bisected Countdown Scheme (SBCS), in terms of the number of energizations by a reader. Three different techniques are progressively combined into three schemes in order to cut down on the number of energizations. The final scheme, SBCS, which is a combination of the three techniques, stabilizes on the number of energizations irrespective of the tag ID length and the number of tags to be read, resulting in a distinct advantage for bulk reading. The three schemes are memoryless meaning that the tags are unable to remember if they were read or not; hence the performance of each of the schemes is compared with the Query Tree protocol since it is also memoryless.
Differentiated Services (DiffServ) Architecture is based on aggregation of traffic as opposed to ... more Differentiated Services (DiffServ) Architecture is based on aggregation of traffic as opposed to per flow traffic. When DiffServ is used in a real time traffic environment it is important to study the effects of traffic aggregation on quality of service parameters. Instantaneous packet delay variation (IPDV) is one of the most commonly used quality of service parameters for real time traffic. In this paper we study how IPDV of a micro flow builds up, from the source to the destination, in a DiffServ network. We define the parameters that influence IPDV of a flow at a network node through our simulations and represent them in an abstract analytical model.
Proceedings of the 2009 International Conference, 2009
Underwater sensor deployment is a significant challenge due to the inherent difficulties posed by... more Underwater sensor deployment is a significant challenge due to the inherent difficulties posed by the underwater channel in terms of sensing and communications between sensors. In addition, monetary constraints arising from the cost of sensors and deploying them, limit the number of available sensors. As a result, these sensors must be deployed as efficiently as possible. This work presents the
International Journal on Advances in Networks and Services, Dec 31, 2013
A robust and reliable architecture for wireless sensor actor networks for industry control (WASAN... more A robust and reliable architecture for wireless sensor actor networks for industry control (WASANIC) is discussed and described in this paper. The stringent physical constraints in an industry environment are taken into consideration. We proposed an architecture that allows efficient cross-layering between a semi-scheduled medium access control (MAC) protocol called the Neighbor Turn Taking MAC (NTT-MAC) and a routing protocol based on the Multi-Meshed Tree (MMT) routing algorithm that is suited to the WSANIC topology encountered in an industry. The proposed architecture also addresses survivability and security. The cross-layered approach, named NTT-MMT, supports reliable and robust transportation of data. Through simulations, the performance of NTT-MMT was compared with carrier sense multiple access with collision avoidance (CSMA/CA) MAC and dynamic source routing (DSR) protocol.
WLANs cover small areas and provide limited mobility. 3G cellular systems have well-established q... more WLANs cover small areas and provide limited mobility. 3G cellular systems have well-established quality support, wide coverage, and high mobility. Integrating these two technologies is of interest since it would result in cheaper voice calls and better data rates for the users. This awareness has led to research activities directed towards inter-system and global roaming across these two technologies. The authors propose global mobility management framework to support seamless roaming across heterogeneous wireless networks. In this article are highlighted details on the application of the framework to support roaming across 3G cellular and wireless local area networks (WLAN). The framework has a robust architecture for mobility management for varying user mobility spans, provisioning for QoS mapping and intersystem message translation. Performance of the framework is presented and discussed.
2012 IEEE Global Communications Conference (GLOBECOM), 2012
Internet continues to grow in number and hence provisioning seamless Internet service to such use... more Internet continues to grow in number and hence provisioning seamless Internet service to such user is a topic of major interest. With new mobility architectures being investigated, it is important to have consistent comparative platforms and metrics. In this article, we introduce a novel and user-centric handoff cost framework to analyze handoff performance of different mobility schemes. The proposed framework helps examine the impacts of registration costs, signaling overhead, and data loss for Internet connected mobile users employing a unified ...
Communications networks today are a combination of different wireless and wired networks, that ar... more Communications networks today are a combination of different wireless and wired networks, that are based on an enriched set of technologies. Wired networks are pre-ferred when the 'communicating' user's mobility or freedom to roam is not a prime concern. However, ...
In this paper we propose an adaptive routing using a fuzzy system. The traffic in the network is ... more In this paper we propose an adaptive routing using a fuzzy system. The traffic in the network is re-routed to nodes, which are less congested, or have spare capacity. Based on a set of fuzzy rules, link cost is dynamically assigned depending upon the present condition of the network. Distance vector algorithm, which is one of the shortest path routing
In the future, wireless and mobile users will have increased demands for seamless roaming across ... more In the future, wireless and mobile users will have increased demands for seamless roaming across different types of wireless networks, quality of service guarantees and support of different types of services. This awareness has led to research activities directed towards inter-system and global roaming and can be noticed in the numerous products like multimode handsets, inter-working gateways and some ongoing standards and research work on signaling protocols for inter-system roaming. This article proposes a global mobility management framework. The framework is like an overlay network comprising of Inter-System Interface Control Units (IICU) to support inter-network communication and control for Location Management. The protocols and functions of this framework will be distributed and exist partly within the wireless networks and partly within the core-network. A hierarchy introduced among the IICUs will accommodate for the varying mobility coverage required by the mobile user. The IICU may be configured to perform various functions depending on its placement in the hierarchy of the framework. This approach aims to optimize across call set up delays, signaling traffic, database processing, handoff facilitation for seamless roaming and QoS mapping and negotiations as the user moves across different wireless networks. It avoids centralized database dependency with its associated single-point bottleneck and failures. 1 We restrict our analysis of the framework to a 2-network and a 3-network roaming scenario. The presentation has been further restricted to cost and delay analysis of the location update and call delivery procedures. We have taken into account the signalling requirements when the mobile user roams across networks with and without an active call.
Public reporting burden for this collection of information is estimated to average 1 hour per res... more Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden to
Proceedings of ICICS, 1997 International Conference on Information, Communications and Signal Processing. Theme: Trends in Information Systems Engineering and Wireless Multimedia Communications (Cat. No.97TH8237), 2000
2008 Ieee Wireless Communications and Networking Conference, 2008
Passive RFID tags transmit their ID information to a tag reader upon energization by the reader. ... more Passive RFID tags transmit their ID information to a tag reader upon energization by the reader. These transmitted signals, or IDs, may collide if multiple tags transmit their ID simultaneously, requiring repeated energizations by the reader to read all tag IDs successfully. The number of energizations increases with the number of ID bits in the tag and the number of tags to be read. An increase in energizations results in a greater incurred latency to read the tags, and additionally, more transmissions. This is undesirable in an industry environment especially, and with this comes higher expended energy by the reading system, leading to higher system costs. In this paper, a new proposed scheme is evaluated, the Shortcut Bisected Countdown Scheme (SBCS), in terms of the number of energizations by a reader. Three different techniques are progressively combined into three schemes in order to cut down on the number of energizations. The final scheme, SBCS, which is a combination of the three techniques, stabilizes on the number of energizations irrespective of the tag ID length and the number of tags to be read, resulting in a distinct advantage for bulk reading. The three schemes are memoryless meaning that the tags are unable to remember if they were read or not; hence the performance of each of the schemes is compared with the Query Tree protocol since it is also memoryless.
Differentiated Services (DiffServ) Architecture is based on aggregation of traffic as opposed to ... more Differentiated Services (DiffServ) Architecture is based on aggregation of traffic as opposed to per flow traffic. When DiffServ is used in a real time traffic environment it is important to study the effects of traffic aggregation on quality of service parameters. Instantaneous packet delay variation (IPDV) is one of the most commonly used quality of service parameters for real time traffic. In this paper we study how IPDV of a micro flow builds up, from the source to the destination, in a DiffServ network. We define the parameters that influence IPDV of a flow at a network node through our simulations and represent them in an abstract analytical model.
Proceedings of the 2009 International Conference, 2009
Underwater sensor deployment is a significant challenge due to the inherent difficulties posed by... more Underwater sensor deployment is a significant challenge due to the inherent difficulties posed by the underwater channel in terms of sensing and communications between sensors. In addition, monetary constraints arising from the cost of sensors and deploying them, limit the number of available sensors. As a result, these sensors must be deployed as efficiently as possible. This work presents the
International Journal on Advances in Networks and Services, Dec 31, 2013
A robust and reliable architecture for wireless sensor actor networks for industry control (WASAN... more A robust and reliable architecture for wireless sensor actor networks for industry control (WASANIC) is discussed and described in this paper. The stringent physical constraints in an industry environment are taken into consideration. We proposed an architecture that allows efficient cross-layering between a semi-scheduled medium access control (MAC) protocol called the Neighbor Turn Taking MAC (NTT-MAC) and a routing protocol based on the Multi-Meshed Tree (MMT) routing algorithm that is suited to the WSANIC topology encountered in an industry. The proposed architecture also addresses survivability and security. The cross-layered approach, named NTT-MMT, supports reliable and robust transportation of data. Through simulations, the performance of NTT-MMT was compared with carrier sense multiple access with collision avoidance (CSMA/CA) MAC and dynamic source routing (DSR) protocol.
WLANs cover small areas and provide limited mobility. 3G cellular systems have well-established q... more WLANs cover small areas and provide limited mobility. 3G cellular systems have well-established quality support, wide coverage, and high mobility. Integrating these two technologies is of interest since it would result in cheaper voice calls and better data rates for the users. This awareness has led to research activities directed towards inter-system and global roaming across these two technologies. The authors propose global mobility management framework to support seamless roaming across heterogeneous wireless networks. In this article are highlighted details on the application of the framework to support roaming across 3G cellular and wireless local area networks (WLAN). The framework has a robust architecture for mobility management for varying user mobility spans, provisioning for QoS mapping and intersystem message translation. Performance of the framework is presented and discussed.
2012 IEEE Global Communications Conference (GLOBECOM), 2012
Internet continues to grow in number and hence provisioning seamless Internet service to such use... more Internet continues to grow in number and hence provisioning seamless Internet service to such user is a topic of major interest. With new mobility architectures being investigated, it is important to have consistent comparative platforms and metrics. In this article, we introduce a novel and user-centric handoff cost framework to analyze handoff performance of different mobility schemes. The proposed framework helps examine the impacts of registration costs, signaling overhead, and data loss for Internet connected mobile users employing a unified ...
Communications networks today are a combination of different wireless and wired networks, that ar... more Communications networks today are a combination of different wireless and wired networks, that are based on an enriched set of technologies. Wired networks are pre-ferred when the 'communicating' user's mobility or freedom to roam is not a prime concern. However, ...
In this paper we propose an adaptive routing using a fuzzy system. The traffic in the network is ... more In this paper we propose an adaptive routing using a fuzzy system. The traffic in the network is re-routed to nodes, which are less congested, or have spare capacity. Based on a set of fuzzy rules, link cost is dynamically assigned depending upon the present condition of the network. Distance vector algorithm, which is one of the shortest path routing
In the future, wireless and mobile users will have increased demands for seamless roaming across ... more In the future, wireless and mobile users will have increased demands for seamless roaming across different types of wireless networks, quality of service guarantees and support of different types of services. This awareness has led to research activities directed towards inter-system and global roaming and can be noticed in the numerous products like multimode handsets, inter-working gateways and some ongoing standards and research work on signaling protocols for inter-system roaming. This article proposes a global mobility management framework. The framework is like an overlay network comprising of Inter-System Interface Control Units (IICU) to support inter-network communication and control for Location Management. The protocols and functions of this framework will be distributed and exist partly within the wireless networks and partly within the core-network. A hierarchy introduced among the IICUs will accommodate for the varying mobility coverage required by the mobile user. The IICU may be configured to perform various functions depending on its placement in the hierarchy of the framework. This approach aims to optimize across call set up delays, signaling traffic, database processing, handoff facilitation for seamless roaming and QoS mapping and negotiations as the user moves across different wireless networks. It avoids centralized database dependency with its associated single-point bottleneck and failures. 1 We restrict our analysis of the framework to a 2-network and a 3-network roaming scenario. The presentation has been further restricted to cost and delay analysis of the location update and call delivery procedures. We have taken into account the signalling requirements when the mobile user roams across networks with and without an active call.
Uploads
Papers by Nirmala Shenoy