Anirudha Sahoo

Learn More
In this paper, we present the methodologies used in existing literature for Virtual Machine (VM) placement, load balancing and server consolidation in a data center environment. While the methodologies may seem fine on the surface, certain drawbacks and anomalies can be uncovered when they are analyzed deeper. We point out those anomalies and draw backs in(More)
This paper presents an integrated MAC and routing protocol called Delay Guaranteed Routing and MAC (DGRAM) for delay-sensitive wireless sensor network (WSN) applications. DGRAM is a TDMA-based protocol designed to provide deterministic delay guarantee in an energy-efficient manner. The design is based on slot reuse to reduce latency of a node in accessing(More)
Scheduling and call admission control (CAC) in IEEE 802.16 system play a vital role in the performance of the system. The 802.16 standard does not specify any scheduling architecture or CAC. Many proposals assume a bandwidth based CAC which only provides bandwidth guarantee, but cannot fulfill delay and jitter requirements. In this paper, we propose a CAC(More)
In this paper, we report our work on adaptive connection admission control in real-time communication networks. Much of the existing work on connection admission control (CAC) specifies the QoS parameters as fixed values and does not exploit the dynamic fluctuations in resource availability. We take an innovative approach: First, we allow an application to(More)
We present a stochastic model-based opportunistic channel access and transmission scheme for cognitive radio enabled secondary users for single data channel. We refer to this scheme as Residual Idle Time Distribution based Scheme (RIBS). In this scheme, the SU randomly senses the channel and if the channel is sensed idle, then it uses residual idle time(More)
In this paper, we discuss a cross layer congestion control technique of TCP Reno-2 in wireless networks. In this both TCP layer and PHY layer jointly control congestion. The PHY layer changes transmission power as per the channel condition, interference received and congestion in the network, whereas the TCP layer controls congestion using Reno-2 window(More)
In a wireless sensor network (WSN), interesting events are reported to the sink by the sensors in a distributed manner. Applications running at the sink require certain reliability in terms of events per unit time to be able to run satisfactorily. Individual report from sensor nodes is not important, but collective reports from sensor nodes of a region of(More)
Radio Frequency Identification (RFID) is slated to become a standard for tagging various products. As more and more products become RFID enabled, fast tag identification mechanisms will become important. Various tag identifica tion (or anti-collision) algorithms have been proposed for RFID systems. This work focuses on methods to improve tag read efficiency(More)
Running real time applications over wireless LANs is becoming common place. These applications require QoS. But the most widely used wireless LAN, IEEE 802.11, does not have QoS support. Hence, providing QoS in 802.11 WLANs is an important issue due to its large installation base. In this paper, we propose a priority based service differentiation mechanism(More)