Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Satish K. Tripathi is active.

Publication


Featured researches published by Satish K. Tripathi.


IEEE Personal Communications | 1997

Signal stability-based adaptive routing (SSA) for ad hoc mobile networks

Rohit Dube; Cynthia D. Rais; Kuang-Yeh Wang; Satish K. Tripathi

Ad hoc networks have no spatial hierarchy and suffer from frequent link failures which prevent mobile hosts from using traditional routing schemes. Under these conditions, mobile hosts must find routes to destinations without the use of designated routers and also must dynamically adapt the routes to the current link conditions. This article proposes a distributed adaptive routing protocol for finding and maintaining stable routes based on signal strength and location stability in an ad hoc network and presents an architecture for its implementation. Interoperability with mobile IP (Internet protocol) is discussed.


international conference on computer communications | 2003

A framework for reliable routing in mobile ad hoc networks

Zhenqiang Ye; Srikanth V. Krishnamurthy; Satish K. Tripathi

Mobile ad hoc networks consist of nodes that are often vulnerable to failure. As such, it is important to provide redundancy in terms of providing multiple node-disjoint paths from a source to a destination. We first propose a modified version of the popular AODV protocol that allows us to discover multiple node-disjoint paths from a source to a destination. We find that very few of such paths can be found. Furthermore, as distances between sources and destinations increase, bottlenecks inevitably occur and thus, the possibility of finding multiple paths is considerably reduced. We conclude that it is necessary to place what we call reliable nodes (in terms of both being robust to failure and being secure) in the network for efficient operations. We propose a deployment strategy that determines the positions and the trajectories of these reliable nodes such that we can achieve a framework for reliably routing information. We define a notion of a reliable path which is made up of multiple segments, each of which either entirely consists of reliable nodes, or contains a preset number of multiple paths between the end points of the segment. We show that the probability of establishing a reliable path between a random source and destination pair increases considerably even with a low percentage of reliable nodes when we control their positions and trajectories in accordance with our algorithm.


acm special interest group on data communication | 1998

Quality of service based routing: a performance perspective

George Apostolopoulos; Roch Guérin; Sanjay Kamat; Satish K. Tripathi

Recent studies provide evidence that Quality of Service (QoS) routing can provide increased network utilization compared to routing that is not sensitive to QoS requirements of traffic. However, there are still strong concerns about the increased cost of QoS routing, both in terms of more complex and frequent computations and increased routing protocol overhead. The main goals of this paper are to study these two cost components, and propose solutions that achieve good routing performance with reduced processing cost. First, we identify the parameters that determine the protocol traffic overhead, namely (a) policy for triggering updates, (b) sensitivity of this policy, and (c) clamp down timers that limit the rate of updates. Using simulation, we study the relative significance of these factors and investigate the relationship between routing performance and the amount of update traffic. In addition, we explore a range of design options to reduce the processing cost of QoS routing algorithms, and study their effect on routing performance. Based on the conclusions of these studies, we develop extensions to the basic QoS routing, that can achieve good routing performance with limited update generation rates. The paper also addresses the impact on the results of a number of secondary factors such as topology, high level admission control, and characteristics of network traffic.


international conference on computer communications | 1996

Enhancing throughput over wireless LANs using channel state dependent packet scheduling

Pravin Bhagwat; Partha P. Bhattacharya; Arvind Krishna; Satish K. Tripathi

Unlike wired networks, packets transmitted on wireless channels are often subject to burst errors which cause back to back packet losses. Most wireless LAN link layer protocols recover from packet losses by retransmitting lost segments. When the wireless channel is in a burst error state, most retransmission attempts fail thereby causing poor utilization of the wireless channel. Furthermore, in the event of multiple sessions sharing a wireless link, FIFO packet scheduling can cause the HOL blocking effect, resulting in unfair sharing of the bandwidth. This observation leads to a new class of packet dispatching methods which explicitly take the wireless channel characteristics into consideration in making packet dispatching decisions. We compare a variety of channel state dependent packet (CSDP) scheduling methods with a view towards enhancing the performance of the transport layer sessions. Our results indicate that by employing a CSDP scheduler at the wireless LAN device driver level, significant improvement in the channel utilization can be achieved in typical wireless LAN configurations.


global communications conference | 2002

Split TCP for mobile ad hoc networks

Swastik Kopparty; Srikanth V. Krishnamurthy; Michalis Faloutsos; Satish K. Tripathi

The fairness and throughput of TCP suffer when it is used in mobile ad hoc networks. This is because TCP wrongly attributes packet losses due to link failures (a consequence of mobility) to congestion. The resulting overall degradation of throughput especially affects connections with a large number of hops, where link failures are more likely; thus, short connections enjoy an unfair advantage. Furthermore, if the IEEE 802.11 MAC protocol is used, the problems are exacerbated due to the protocol-induced capture effect, leading to greater unfairness and a further throughput degradation. We develop a scheme, called split TCP, which separates the TCP functions of congestion control and reliable packet delivery. For any TCP connection, certain nodes along the route take up the role of being proxies for that connection. The proxies buffer packets upon receipt and administer rate control. The buffering enables dropped packets to be recovered from the most recent proxy. The rate control helps in controlling congestion on inter-proxy segments. Thus, we emulate shorter TCP connections and can thereby achieve better parallelism in the network. Simulations show that the use of proxies improves the total throughput by as much as 30% in typical scenarios and reduces unfairness significantly. In terms of an unfairness metric that we introduce, the unfairness decreases from 0.8 to 0.2 (1.0 being the maximum unfairness). We conclude that incorporating TCP proxies is beneficial in terms of improving TCP performance in ad hoc networks.


global communications conference | 2003

Synchronization of multiple levels of data fusion in wireless sensor networks

Wei Yuan; Srikanth V. Krishnamurthy; Satish K. Tripathi

In wireless sensor networks, in-network data fusion is needed for energy-efficient information flow from a plurality of sensors to a central server or sink. As data (either raw or fused) is propagated towards the sink, multiple levels of data fusion are likely. The data fusion at various levels should be synchronized in order to fuse data effectively. It is important that information from as many sensors as possible to be fused in order to increase the credibility of the aggregated report. However, there are trade-offs between fusing a large number of sensor reports and the latency incurred in the aggregation process. The paths taken by the data towards the sink determine where data can be fused, and thus, have an effect on the efficiency of the aggregation process. In this work, we propose a methodology by which the various levels of fusion are synchronized to ensure that the aggregated report has a desired trade-off between credibility and latency, regardless of the topology of the structure created by the integration of the paths on which data traverses towards the sink.


IEEE ACM Transactions on Networking | 1998

Carry-over round robin: a simple cell scheduling mechanism for ATM networks

Debanjan Saha; Sarit Mukherjee; Satish K. Tripathi

We propose a simple mechanism named carry-over round robin (CORR) for scheduling cells in asynchronous transfer mode networks. We quantify the operational complexity of CORR scheduling and show that it is comparable to that of a simple round-robin scheduler. We then show that, albeit its simplicity, CORR is very competitive with much more sophisticated and significantly more complex scheduling disciplines in terms of performance. We evaluate the performance of CORR using both analysis and simulation, We derive analytical bounds on the worst case end-to-end delay achieved by a CORR scheduler for different traffic arrival patterns. Using traffic traces from MPEG video streams, we compare the delay performance of CORR with that of packet-by-packet generalized processor sharing (PGPS) and stop-and-go (SG). Our results show that, in terms of delay performance, CORR compares favorably with both PGPS and SG. We also analyze the fairness properties of CORR and show that it achieves near perfect fairness.


international conference on computer communications | 1994

Effect of topology on performance of reliable multicast communication

Pravin Bhagwat; Partho Pratim Mishra; Satish K. Tripathi

The authors examine the performance implications of providing reliability in conjunction with multicast transport over a high speed wide area network. They use a block based acknowledgement and selective retransmission protocol to evaluate the impact of the loss rate and the multicast tree topology on the achievable throughput. Their results show that even when the buffer overflow probability at switches and receivers is low, the cumulative loss probability seen by a source may be quite high. They also demonstrate that the average throughput increases significantly if the transport protocol delivers packets to the application layer out-of-sequence. They investigate the scaling properties of the error control mechanism and show that the multicast tree topology that results in minimum transfer time is not necessarily the same as the one constructed using minimal bandwidth or shortest path algorithms.<<ETX>>


ad hoc networks | 2004

A ROUTING FRAMEWORK FOR PROVIDING ROBUSTNESS TO NODE FAILURES IN MOBILE AD HOC NETWORKS

Zhenqiang Ye; Srikanth V. Krishnamurthy; Satish K. Tripathi

Abstract Nodes in a mobile ad hoc network are often vulnerable to failures. The failures could be either due to fading effects, battery drainage, or as a result of compromised nodes that do not participate in network operations. Intermittent node failures can disrupt routing functionalities. As such, it is important to provide redundancy in terms of providing multiple node-disjoint paths from a source to a destination. In line with this objective, we first propose a modified version of the widely studied ad hoc on-demand distance vector routing protocol to facilitate the discovery of multiple node-disjoint paths from a source to a destination. We find that very few of such paths can be found. Furthermore, as distances between sources and destinations increase, bottlenecks inevitably occur and thus, the possibility of finding multiple paths is considerably reduced. We conclude that it is necessary to place what we call reliable nodes (in terms of both being robust to failure and being secure) in the network to support efficient routing operations. We propose a deployment strategy that determines the positions and the trajectories of these reliable nodes such that we can achieve a framework for reliably routing information. We define a notion of a reliable path which is made up of multiple segments, each of which either entirely consists of reliable nodes, or contains a preset number of multiple paths between the end points of the segment. We show that the probability of establishing a reliable path between a random source and destination pair increases tremendously even with a small number of reliable nodes when we use our algorithm to appropriately position these reliable nodes.


international ifip tc networking conference | 2002

A New Adaptive Channel Reservation Scheme for Handoff Calls in Wireless Cellular Networks

Zhong Xu; Zhenqiang Ye; Srikanth V. Krishnamurthy; Satish K. Tripathi; Mart L. Molle

In wireless cellular networks, in order to ensure that ongoing calls are not dropped while the owner mobile stations roam among cells, handoff calls may be admitted with a higher priority as compared with new calls. Since the wireless bandwidth is scarce and therefore precious, efficient schemes which allow a high utilization of the wireless channel, while at the same time guarantee the QoS of handoff calls are needed. In this paper, we propose a new scheme that uses GPS measurements to determine when channel reservations are to be made. It works by sending channel reservation request for a possible handoff call to a neighboring cell not only based on the position and orientation of that calls mobile station, but also depends upon the relative motion of the mobile station with respect to that target cell. The scheme integrates threshold time and various features of prior schemes to minimize the effect of false reservations and to improve the channel utilization of the cellular system. Simulation results showthat our scheme performs better in almost all typical scenarios than prior schemes.

Collaboration


Dive into the Satish K. Tripathi's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

James Jobin

University of California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Zhenqiang Ye

University of California

View shared research outputs
Top Co-Authors

Avatar

Roch Guérin

Washington University in St. Louis

View shared research outputs
Top Co-Authors

Avatar

Kalyan Basu

University of North Texas

View shared research outputs
Researchain Logo
Decentralizing Knowledge