Subbarayan Venkatesan

Learn More
We consider the issue of designing a generic transport layer protocol for energy-constrained sensor networks. We present the requirements for such a transport protocol and propose sensor transmission control protocol (STCP). STCP is a generic, scalable and reliable transport layer protocol where a majority of the functionalities are implemented at the base(More)
One of the main design issues for a sensor network is conservation of the energy available at each sensor node. We propose to deploy multiple, mobile base stations to prolong the lifetime of the sensor network. We split the lifetime of the sensor network into equal periods of time known as rounds. Base stations are relocated at the start of a round. Our(More)
Cognitive radios CR have the ability to dynamically adapt to local spectrum availability. In a multi-hop wireless network comprised of CR-enabled devices, Medium Access Control (MAC) layer scheduling for data communication involves assignment of timeslots and channels to either links or nodes in the network. The number of channels available and the channel(More)
of mobile hosts communicating among themselves using wireless links, without the use of any other communication support facilities (e.g., base stations). They are also called mobile radio networks or multihop wireless networks. Two mobile hosts (MHs) are said to be within range and neighbors of each other if each can receive the other’s transmission. Every(More)
Detecting properties about distributed program as an important problem in testing and debugging distributed programs. This problem is very hard due to the combinatorial explosion of the global state space. For a given execution, we consider the problem of detecting whether a predicate @ is true at some global state of the system. First, we present a space(More)
Intrusion detection systems alert the system administrators of intrusions but, in most cases, do not provide details about which system events are relevant to the intrusion and how the system events are related. We consider intrusions of file systems. Existing tools, like BackTracker, help the system administrator backtrack from the detection point, which(More)
Detecting termination of a distributed computation is a fundamental problem in distributed systems. We present two optimal algorithms for detecting termination of a non-diffusing distributed computation for an arbitrary topology. Both algorithms are optimal in terms of message complexity and detection latency. The first termination detection algorithm has(More)
Cognitive radios (CR) technology enables wireless devices to dynamically switch between channels in a wide range of frequency bands and utilize unused parts of licensed and unlicensed frequency bands. The CR-enabled devices can either form a stand-alone multi-hop wireless network or form a multi-hop wireless backbone network that can connect different types(More)