Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Dharma P. Agrawal is active.

Publication


Featured researches published by Dharma P. Agrawal.


international parallel and distributed processing symposium | 2001

TEEN: a routing protocol for enhanced efficiency in wireless sensor networks

Arati Manjeshwar; Dharma P. Agrawal

Wireless sensor networks are expected to find wide applicability and increasing deployment in the near future. In this paper, we propose a formal classification of sensor networks, based on their mode of functioning, as proactive and reactive networks. Reactive networks, as opposed to passive data collecting proactive networks, respond immediately to changes in the relevant parameters of interest. We also introduce a new energy efficient protocol, TEEN (Threshold sensitive Energy Efficient sensor Network protocol) for reactive networks. We evaluate the performance of our protocol for a simple temperature sensing application. In terms of energy efficiency, our protocol has been observed to outperform existing conventional sensor network protocols.


IEEE Network | 2003

Multicast over wireless mobile ad hoc networks: present and future directions

C. de Morais Cordeiro; Hrishikesh Gossain; Dharma P. Agrawal

Advances in portable computing and wireless technologies are opening up exciting possibilities for the future of wireless mobile networking. A mobile ad hoc network consists of mobile platforms which are free to move arbitrarily. Since the nodes are mobile, internode connectivity may change frequently. There is an increasing demand for applications like multiplayer online gaming, where players residing at different locations participate in the same gaming session through their handheld portable devices. Such applications are characterized by a close degree of collaboration, typical of ad hoc network scenarios. Multicasting could prove to be an efficient way of providing necessary services for these kinds of applications; hence, it is imperative to determine what is the best way to provide these services in an ad hoc environment. Due to the very diverse requirements of the applications and the unpredictable nature of ad hoc networks, it is necessary to investigate and discern the applicability of existing ad hoc multicast protocols and quantify which is more suitable for which type of application. We provide a detailed description and comparison of ad hoc multicast protocols. We hope that this discussion is helpful to application developers in selecting an appropriate multicast protocol and paves the way for further research.


international parallel and distributed processing symposium | 2002

APTEEN: a hybrid protocol for efficient routing and comprehensive information retrieval in wireless

Arati Manjeshwar; Dharma P. Agrawal

Wireless sensor networks with thousands of tiny sensor nodes, are expected to find wide applicability and increasing deployment in coming years, as they enable reliable monitoring and analysis of the environment. In this paper, we propose a hybrid routing protocol (APTEEN) which allows for comprehensive information retrieval. The nodes in such a network not only react to time-critical situations, but also give an overall picture of the network at periodic intervals in a very energy efficient manner. Such a network enables the user to request past, present and future data from the network in the form of historical, one-time and persistent queries respectively. We evaluated the performance of these protocols and observe that these protocols are observed to outperform existing protocols in terms of energy consumption and longevity of the network.


IEEE Wireless Communications | 2005

Issues in integrating cellular networks WLANs, AND MANETs: a futuristic heterogeneous wireless network

Dave Cavalcanti; Dharma P. Agrawal; Carlos Cordeiro; Bin Xie; Anup Kumar

The popularity of wireless communication systems can be seen almost everywhere in the form of cellular networks, WLANs, and WPANs. In addition, small portable devices have been increasingly equipped with multiple communication interfaces building a heterogeneous environment in terms of access technologies. The desired ubiquitous computing environment of the future has to exploit this multitude of connectivity alternatives resulting from diverse wireless communication systems and different access technologies to provide useful services with guaranteed quality to users. Many new applications require a ubiquitous computing environment capable of accessing information from different portable devices at any time and everywhere. This has motivated researchers to integrate various wireless platforms such as cellular networks, WLANs, and MANETs. Integration of different technologies with different capabilities and functionalities is an extremely complex task and involves issues at all layers of the protocol stack. This article envisions an architecture for state-of-the-art heterogeneous multihop networks, and identifies research issues that need to be addressed for successful integration of heterogeneous technologies for the next generation of wireless and mobile networks.


international conference on information technology coding and computing | 2004

Threshold and identity-based key management and authentication for wireless ad hoc networks

Hongmei Deng; Annindo Mukherjee; Dharma P. Agrawal

As various applications of wireless ad hoc network have been proposed, security has become one of the big research challenges and is receiving increasing attention. In this paper, we propose a distributed key management and authentication approach by deploying the recently developed concepts of identity-based cryptography and threshold secret sharing. Without any assumption of prefixed trust relationship between nodes, the ad hoc network works in a self-organizing way to provide the key generation and key management service, which effectively solves the problem of single point of failure in the traditional public key infrastructure (PKI)-supported system. The identity-based cryptography mechanism is applied here not only to provide end-to-end authenticity and confidentiality, but also to save network bandwidth and computational power of wireless nodes.


Journal of Parallel and Distributed Computing | 2005

Dynamic probabilistic broadcasting in MANETs

Qi Zhang; Dharma P. Agrawal

In mobile ad hoc networks (MANETs), the efficiency of broadcasting protocol can dramatically affect the performance of the entire network. Appropriate use of a probabilistic method can reduce the number of rebroadcasting, therefore reduce the chance of contention and collision among neighboring nodes. A good probabilistic broadcast protocol can achieve higher throughput and lower energy consumption, without sacrificing the reachability or having any significant degradation. In this paper, we propose a probabilistic approach that dynamically adjusts the rebroadcasting probability as per the node distribution and node movement. This is done based on locally available information and without requiring any assistance of distance measurements or exact location determination devices. We evaluate the performance of our approach by comparing it with the AODV protocol (which is based on simple flooding) as well as a fixed probabilistic approach. Simulation results show our approach performs better than both simple flooding and fixed probabilistic schemes.


IEEE Computer | 2002

GPS: location-tracking technology

Rashmi Bajaj; Samantha Ranaweera; Dharma P. Agrawal

Increasing commercial use of the Global Positioning System will soon make it possible to locate anything, anywhere, anytime. The Global Positioning System can provide extremely accurate location information for mobile objects and people which is far superior to earlier tracking techniques. The challenge today is integrating the necessary components into older systems and improving GPS accuracy in areas with numerous obstructions. As more devices become GPS enabled, accuracy will increase and the systems scale and global reach will benefit everyone. Wireless technology promises to be a key element in any long-term solution.


mobile adhoc and sensor systems | 2007

Efficient Mesh Router Placement in Wireless Mesh Networks

Junfang Wang; Bin Xie; Kan Cai; Dharma P. Agrawal

The placement of mesh routers (MRs) in building a wireless mesh network (WMN) is the first step to ensure the desired network performance. Given a network domain, the fundamental issue in placing MRs is to find the minimal configuration of MRs so as to satisfy the network coverage, connectivity, and Internet traffic demand. In this paper, the problem is addressed under a constraint network model in which the traffic demand is non-uniformly distributed and the candidate positions for MRs are pre-decided. After formulating the MR placement problem, we first provide the theoretical analysis to validate the traffic demand and determine the optimal position of Internet gateway (IGW). To reduce complexity of determining the locations of MRs while satisfying the traffic constraint, we propose an effective heuristic algorithm to obtain an close-to-optimal solution. Finally, our simulation results verify our analytical model and show the effectiveness of our proposed algorithm.


IEEE Transactions on Parallel and Distributed Systems | 1998

Optimal scheduling algorithm for distributed-memory machines

Sekhar Darbha; Dharma P. Agrawal

Task Scheduling is one of the key elements in any distributed-memory machine (DMM), and an efficient algorithm can help reduce the interprocessor communication time. As optimal scheduling of tasks to DMMs is a strong NP-hard problem, many heuristic algorithms have been introduced in the literature. This paper presents a Task Duplication based Scheduling (TDS) algorithm which can schedule directed acyclic graphs (DAGs) with a complexity of O(|V|/sup 2/), where |V| is the number of tasks in the DAG. This algorithm generates an optimal schedule for a class of DAGs which satisfy a simple cost relationship. The performance of the algorithm has been observed by its application to some practical DAGs, and by comparing it with other existing scheduling schemes in terms of the schedule length and algorithm complexity.


IEEE Wireless Communications | 2007

Wireless Mesh Networks: Current Challenges and Future Directions of Web-In-The-Sky

Nagesh Nandiraju; Deepti S. Nandiraju; Lakshmi Santhanam; Bing He; Junfang Wang; Dharma P. Agrawal

Within the short span of a decade, Wi-Fi hotspots have revolutionized Internet service provisioning. With the increasing popularity and rising demand for more public Wi-Fi hotspots, network service providers are facing a daunting task. Wi-Fi hotspots typically require extensive wired infrastructure to access the backhaul network, which is often expensive and time consuming to provide in such situations. wireless mesh networks (WMNs) offer an easy and economical alternative for providing broadband wireless Internet connectivity and could be called the web-in-the-sky. In place of an underlying wired backbone, a WMN forms a wireless backhaul network, thus obviating the need for extensive cabling. They are based on multihop communication paradigms that dynamically form a connected network. However, multihop wireless communication is severely plagued by many limitations such as low throughput and limited capacity. In this article we point out key challenges that are impeding the rapid progress of this upcoming technology. We systematically examine each layer of the network and discuss the feasibility of some state-of-the-art technologies/protocols for adequately addressing these challenges. We also provide broader and deeper insight to many other issues that are of paramount importance for the successful deployment and wider acceptance of WMNs.

Collaboration


Dive into the Dharma P. Agrawal's collaboration.

Top Co-Authors

Avatar

Bin Xie

University of Cincinnati

View shared research outputs
Top Co-Authors

Avatar

Qing-An Zeng

University of Cincinnati

View shared research outputs
Top Co-Authors

Avatar

Anup Kumar

University of Louisville

View shared research outputs
Top Co-Authors

Avatar

Weihuang Fu

University of Cincinnati

View shared research outputs
Top Co-Authors

Avatar

Xiaodong Wang

University of Cincinnati

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge