Deepanshu Shukla

Learn More
— We describe enhancements to the IEEE 802.11 DCF MAC Protocol which enable nodes to identify themselves as exposed nodes and to opportunistically schedule concurrent transmissions whenever possible, thereby improving utilization and mitigating the exposed node problem. The algorithm makes minimal changes to the IEEE 802.11 MAC protocol. It does not require(More)
To my late grandparents and my family Abstract IEEE 802.11 specifies the most famous family of WLANs. It features two basic mode of operation: Distributed Coordinating Function (DCF) and Point Coordinating Function (PCF). Both PCF and DCF mode of IEEE 802.11 do not perform equally well under all traffic scenarios. Their behavior varies depending upon(More)
This work presents the first scalable, efficient and generic compilers to construct group key exchange (GKE) protocols from two/three party key exchange (2-KE/3-KE) protocols. We propose three different compilers where the first one is a 2-KE to GKE compiler (2-TGKE) for tree topology, the second one is also for tree topology but from 3-KE to GKE (3-TGKE)(More)
  • Satyajit Rai, Leena Chandran Wadia, +6 authors Anupam Goyal
  • 2003
Multihop ad-hoc wireless networks offer great challenges for protocol designers. Stations in such networks are constrained by factors like low power, limited bandwidth, link errors, and collisions. Changes are needed at various levels of the protocol stack, most importantly at the medium access layer (MAC). The medium access mechanism in multihop wireless(More)
Acknowledgment I express my sincere gratitude toward my guide Prof. Sridhar Iyer for his constant help, encouragement and inspiration throughout the project work. Without his invaluable guidance, this work would never have been a successful one. I would also like to thank the members of the Satyajit Rai and Abhishek Goliya for their valuable suggestions and(More)
This work presents the first scalable, efficient and generic compilers to construct group key exchange (GKE) protocols from two/three party key exchange (2-KE/3-KE) protocols. We propose three different compilers where the first one is a 2-KE to GKE compiler (2-TGKE) for tree topology, the second one is also for tree topology but from 3-KE to GKE (3-TGKE)(More)
  • 1