Sateesh Addepalli
Cisco Systems, Inc.
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Sateesh Addepalli.
ieee international conference on cloud computing technology and science | 2012
Flavio Bonomi; Rodolfo A. Milito; Jiang Zhu; Sateesh Addepalli
Fog Computing extends the Cloud Computing paradigm to the edge of the network, thus enabling a new breed of applications and services. Defining characteristics of the Fog are: a) Low latency and location awareness; b) Wide-spread geographical distribution; c) Mobility; d) Very large number of nodes, e) Predominant role of wireless access, f) Strong presence of streaming and real time applications, g) Heterogeneity. In this paper we argue that the above characteristics make the Fog the appropriate platform for a number of critical Internet of Things (IoT) services and applications, namely, Connected Vehicle, Smart Grid, Smart Cities, and, in general, Wireless Sensors and Actuators Networks (WSANs).
Communications of The ACM | 2012
Miad Faezipour; Mehrdad Nourani; Adnan Saeed; Sateesh Addepalli
Vehicle area networks form the backbone of future intelligent transportation systems.
global communications conference | 2011
Y. Ming Tsang; Ada S. Y. Poon; Sateesh Addepalli
The mmWave communication system is operating at a regime with high number of antennas and very limited number of RF analog chains. Large number of antennas are used to extend the communication range for recovering the high path loss while fewer RF analog chains are designed to reduce transmit and processing power and hardware complexity. In this regime, typical MIMO algorithms are not applicable. Before any communication starts, devices are needed to align their beam pointing angles towards each other. An efficient searching protocol to obtain the best beam angle pair is therefore needed. It is called BeamForming (BF) training protocol. This paper presents a new BF training technique called beam coding. Each beam angle is assigned unique signature code. By coding multiple beam angles and steering at their angles simultaneously in a training packet, the best beam angle pair can be obtained in a few packets. The proposed BF training technique not only shows the robustness in non-line- of-sight environment, but also provides very flat power variation within a packet in contrast to the IEEE 802.11ad standard whose scheme may lead to large dynamic range of signals due to beam angles varying across a training packet.
International Journal of Vehicular Technology | 2012
Kevin C. Lee; Raghuram S. Sudhaakar; Jianxia Ning; Lillian Lei Dai; Sateesh Addepalli; J. P. Vasseur; Mario Gerla
This paper focuses on routing for vehicles getting access to infrastructure either directly or via multiple hops through other vehicles. We study routing protocol for low-power and lossy networks (RPL), a tree-based routing protocol designed for sensor networks. Many design elements from RPL are transferable to the vehicular environment. We provide a simulation performance study of RPL and RPL tuning in VANETs. More specifically, we seek to study the impact of RPLs various parameters and external factors (e.g., various timers and speeds) on its performance and obtain insights on RPL tuning for its use in VANETs. We then fine tune RPL and obtain performance gain over existing RPL.
computer and communications security | 2013
Arun K. Kanuparthi; Ramesh Karri; Sateesh Addepalli
Internet of Things (IoT) is the interconnection of a large number of resource-constrained devices such as sensors, actuators, and nodes that generate large volumes of data which are then processed into useful actions in areas such as home and building automation, intelligent transportation and connected vehicles, industrial automation, smart healthcare, smart cities, and others. Important challenges remain to fulfill the IoT vision including data provenance and integrity, trust management, identity management, and privacy. We describe how embedded and hardware security approaches can be the basis to address these security challenges.
consumer communications and networking conference | 2012
Kevin C. Lee; Raghuram S. Sudhaakar; Lillian Lei Dai; Sateesh Addepalli; Mario Gerla
This paper focuses on routing for vehicles getting access to infrastructure either directly or via multiple hops though other vehicles. We study Routing Protocol for Low power and lossy networks (RPL), a tree-based routing protocol designed for sensor networks. Many design elements from RPL are transferable to the vehicular environment. We provide a simulation performance study of RPL and RPL tuning in VANETs. More specifically, we seek to study the impact of RPLs various parameters and external factors (e.g., various timers and speeds) on its performance and obtain insights on RPL tuning for its use in VANETs.
conference on emerging network experiment and technology | 2010
Mustafa Y. Arslan; Konstantinos Pelechrinis; Ioannis Broustis; Srikanth V. Krishnamurthy; Sateesh Addepalli; Konstantina Papagiannaki
Channel Bonding (CB) combines two adjacent frequency bands to form a new, wider band to facilitate high data rate transmissions in MIMO-based 802.11n networks. However, the use of a wider band with CB can exacerbate interference effects. Furthermore, CB does not always provide benefits in interference-free settings, and can even degrade performance in some cases. We conduct an in-depth, experimental study to understand the implications of CB. Based on this study we design an auto-configuration framework, ACORN, for enterprise 802.11n WLANs. ACORN integrates the functions of user association and channel allocation, since our study reveals that they are tightly coupled when CB is used. We show that the channel allocation problem with the constraints of CB is NP-complete. Thus, ACORN uses an algorithm that provides a worst case approximation ratio of [EQUATION] with Δ being the maximum node degree in the network. We implement ACORN on our 802.11n testbed. Our experiments show that ACORN (i) outperforms previous approaches that are agnostic to CB constraints; it provides per-AP throughput gains from 1.5x to 6x and (ii) in practice, its channel allocation module achieves an approximation ratio much better than [EQUATION].
international conference on distributed computing systems | 2013
Bo Zhao; Qiang Zheng; Guohong Cao; Sateesh Addepalli
Smartphone based web browsing wastes a lot of power when downloading webpages due to the special characteristics of the 3G radio interface. In this paper, we identify these special characteristics, and address power consumption issues through two novel techniques. First, we reorganize the computation sequence of the web browser when loading a webpage, so that the web browser can first run the computations that will generate new data transmissions and retrieve these data from the web server. Then, the web browser can put the 3G radio interface into low power state, release the radio resource, and then run the remaining computations. Second, we introduce a practical data mining based method to predict the user reading time of webpages, based on which the smartphone can switch to low power state when the reading time is longer than a threshold. To demonstrate the effectiveness of our energy-aware approaches, we develop a testbed with Android phones on T-Mobile UMTS network. Experimental results show that our approach can reduce the power consumption of smartphone by more than 30% during web browsing, and reduce the webpage loading time by 17%.
IEEE ACM Transactions on Networking | 2013
Mustafa Y. Arslan; Konstantinos Pelechrinis; Ioannis Broustis; Shailendra Singh; Srikanth V. Krishnamurthy; Sateesh Addepalli; Konstantina Papagiannaki
The wide channels feature combines two adjacent channels to form a new, wider channel to facilitate high-data-rate transmissions in multiple-input-multiple-output (MIMO)-based IEEE 802.11n networks. Using a wider channel can exacerbate interference effects. Furthermore, contrary to what has been reported by prior studies, we find that wide channels do not always provide benefits in isolation (i.e., one link without interference) and can even degrade performance. We conduct an in-depth, experimental study to understand the implications of wide channels on throughput performance. Based on our measurements, we design an auto-configuration framework called ACORN for enterprise 802.11n WLANs. ACORN integrates the functions of user association and channel allocation since our study reveals that they are tightly coupled when wide channels are used. We show that the channel allocation problem with the constraints of wide channels is NP-complete. Thus, ACORN uses an algorithm that provides a worst-case approximation ratio of O(1/Δ + 1), with Δ being the maximum node degree in the network. We implement ACORN on our 802.11n testbed. Our evaluations show that ACORN: 1) outperforms previous approaches that are agnostic to wide channels constraints; it provides per-AP throughput gains ranging from 1.5 × 6×; and 2) in practice, its channel allocation module achieves an approximation ratio much better than the theoretically predicted O(1/Δ + 1).
IEEE Design & Test of Computers | 2013
Jeyavijayan Rajendran; Arun K. Kanuparthi; Mohamed Zahran; Sateesh Addepalli; Gaston S. Ormazabal; Ramesh Karri
Modification to traditional SoC design flow can enable effective protection against maliciously inserted rogue functionality during design and fabrication. This article presents a joint circuit-architecture-level design approach that helps in preventing or detecting Trojan attacks.