Learn More
IEEE 802.11 based wireless LANs (WLAN) are ubiquitous nowadays. Running real time voice and video applications over LANs is becoming common place. These applications require QoS in terms of delay, throughput etc. But 802.11 does not have inherent QoS support. Since 802.11 has a large installation base providing QoS in 802.11 WLANs is an important issue. In(More)
In this paper, we report our work on adaptive connection admission control in real-time communication networks. Much of the existing work on connection admission control (CAC) specifies the QoS parameters as fixed values and does not exploit the dynamic fluctuations in resource availability. We take an innovative approach: First, we allow an application to(More)
—In this paper, we present the methodologies used in existing literature for Virtual Machine (VM) placement, load balancing and server consolidation in a data center environment. While the methodologies may seem fine on the surface, certain drawbacks and anomalies can be uncovered when they are analyzed deeper. We point out those anomalies and drawbacks in(More)
—We propose a model-based channel access mechanism for cognitive radio-enabled secondary network, which op-portunistically uses the channel of an unslotted primary network when the channel is sensed idle. We refer to primary network as the network which carry the main traffic in a designated spectrum band. We have considered IEEE 802.11 WLAN as a de facto(More)
Assuming that Secondary Users (SU) have channel occupancy data (channel idle and busy durations) of Primary Users (PU), this paper presents a methodology to fit primary channel occupancy data to a distribution. Then we show how SUs can opportunistically transmit in the white spaces based on residual white space distribution while keeping probability of(More)
i Declaration I, Dhaval Manvar, declare that this written submission represents my ideas in my own words and where others' ideas or words have been included, I have adequately cited and referenced the original sources. I also declare that I have adhered to all principles of academic honesty and integrity and have not misrepresented or fabricated or(More)
—In a wireless sensor network (WSN), interesting events are reported to the sink by the sensors in a distributed manner. Applications running at the sink require certain reliability in terms of events per unit time to be able to run satisfactorily. Individual report from sensor nodes is not important, but collective reports from sensor nodes of a region of(More)
Radio Frequency Identification (RFID) is slated to become a standard for tagging various products. As more and more products become RFID enabled, fast tag identification mechanisms will become important. Various tag identification (or anti-collision) algorithms have been proposed for RFID systems. This work focuses on methods to improve tag read efficiency(More)
— This paper presents RTMAC, a realtime MAC protocol for wireless sensor network that can provide delay guarantee. RTMAC is based on TDMA protocol, but it is carefully designed to overcome the high latency of traditional TDMA protocols. It also conserves energy when a node may not be transmitting or receiving packets. We discuss the details of time slot(More)