Chandan Tilak Bhunia

Learn More
Packet combining scheme is a well defined simple error correction scheme with erroneous copies at the receiver. It offers higher throughput combined with ARQ protocols in networks than that of basic ARQ protocols. But packet combining scheme fails to correct errors when occur in the same bit locations of two erroneous copies. In the present work, we propose(More)
For reliable transport of data in wireless network, Aggressive Packet Combining (APC) scheme is well-established. APC has several limitations including throughput. Several modifications were earlier studied elsewhere for improving the throughput. The throughputs of the proposed new techniques are higher than that of APC. In this paper we propose two new(More)
The important functions of Radio Frequency Identification (RFID) technology are radiation and detection. So efficient antenna design and fabrication is the unique solution which perform a very crucial role for many applications. The reader and tag intense are component of the RFID system. In this paper designed has done on RFID antenna for tag and reader(More)
DSR algorithm is applied to selects best path for communication between two nodes in a highly dynamic environment. As highly dynamic environment changes frequently, the probability of breakage of established path is high in such environment. Every time when established path breaks, a new route has to be discovered for communication between the nodes. In(More)
Aggressive Packet Combining (APC) scheme is well established for receiving correct packet in high error prone wireless link. In APC three copies of a packet are transmitted and receiver does bit wise majority decision to get the correct copy. The main research challenge in APC is that if two or more copies of the packet become erroneous at the particular(More)
Password based authentication schemes have been widely used to verify the legitimacy of a user over an insecure communication channel. A common feature among most of the published schemes is that user's identity (ID) is static in all the transaction sessions, which may leak some information about the user and can create risk of identity theft during message(More)
As computer networks become an essential part of our daily life, therefore, protecting the resources from unauthorized users come forward with more challenging and complicated task for the researchers. From the last few decades, many number of password-based authentication schemes have been adopted in multi-server environment to protect the resources from(More)
Several prior studies reported that the header compression (HC) achieves several gains like bandwidth savings, faster response time and better reliability. A few other studies reported about loss due to HC. In this short paper, we introduce a single parameter named "power" to measure the gains of HC. We also introduce another single parameter as "effective(More)
To combat error in computer communication networks, ARQ (Automatic Repeat Request) techniques are used. Recently Chakraborty has proposed a simple technique called the packet combining scheme in which error is corrected at the receiver from the erroneous copies. Packet Combining (PC) scheme fails: (i) when bit error locations in erroneous copies are the(More)
Aggressive Packet Combining (APC) scheme is well established for receiving correct packet in high error prone wireless link. In APC three copies of a packet are transmitted and receiver does bit wise majority decision to get the correct copy. The main research challenge in APC is that if two or more copies of the packet become erroneous at the particular(More)