Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Y. Bashir is active.

Publication


Featured researches published by Y. Bashir.


Mobile Information Systems | 2009

A simulation based analysis of the impact of IEEE 802.15.4 MAC parameters on the performance under different traffic loads

D. Rohm; Mukul Goyal; Hossein Hosseini; A. Divjak; Y. Bashir

IEEE 802.15.4, a MAC/PHY protocol for low power and low data rate wireless networks, is emerging as the popular choice for various monitoring and control applications. Depending on the application, the traffic load on an IEEE 802.15.4 network may vary over a wide range. The performance of the protocol, measured in terms of the packet loss probability and the packet latency, depends upon the prevailing traffic load among the nodes competing for channel access, the level of interference from the hidden nodes and the configuration of IEEE 802.15.4 MAC parameters. In this paper, we analyze via simulations the impact of different configurable MAC parameters on the performance of beaconless IEEE 802.15.4 networks under different traffic loads and under different levels of interference from the hidden nodes. Based on this analysis, we suggest the values of IEEE 802.15.4 MAC parameters that results in a good tradeoff between the packet loss probability and the packet latency under different conditions.


network-based information systems | 2010

A Performance Analysis of Point-to-Point Routing along a Directed Acyclic Graph in Low Power and Lossy Networks

Weigao Xie; Mukul Goyal; Hossein Hosseini; Jerald P. Martocci; Y. Bashir; Emmanuel Baccelli; Arjan Durresi

The ROLL working group at IETF is currently designing RPL, the Routing Protocol for Low power and lossy networks. RPL is based on organizing the nodes in a network in one or more directed acyclic graphs(DAGs) rooted at the popular/default destinations. The DAG structure naturally supports multipoint-to-point routing towards the DAG root and point-to-multipoint routing from the root towards the nodes. The point-to-point (P2P) routing mechanism specified in RPL requires a packet to travel upwards along the DAG until it is turned downwards by a node that knows the downward route along the DAG to the packet’sdestination. This up and down routing along the DAG may result in significantly suboptimal P2P routes. In this paper, we quantify the difference in terms of routing cost between DAG-based P2P routes and the shortest (or minimum cost) P2P routes available in a sample network topology and make the case for a better P2P routing solution in RPL.


advanced information networking and applications | 2010

Routing Loops in DAG-Based Low Power and Lossy Networks

Weigao Xie; Mukul Goyal; Hossein Hosseini; Jerald P. Martocci; Y. Bashir; Emmanuel Baccelli; Arjan Durresi

Directed Acyclic Graphs (DAGs), rooted at popular/default destinations, have emerged as a preferred mechanism to provide IPv6 routing functionality in large scale low power and lossy networks, that include wireless sensor networks and those based on power line communication. A DAG maintains its acyclic nature by requiring that each DAG node must have a higher ’rank’ than any of its DAG parents. While a node may decrease its DAG rank safely, increasing its DAG rank to add a new parent may result in a routing loop if the new parent is also a descendant in the DAG. In this paper, we first study via simulations the time required by the network to converge to a stable, loop-free state following a rank increase operation and the number of routing messages generated (the network ’churn’) during this time. Then, we describe the precautionary measures that can be used to avoid routing loops and evaluate via simulations how these measures affect the time and churn involved in reaching a stable state following a rank increase operation.


advanced information networking and applications | 2009

Impact of IEEE 802.11n Operation on IEEE 802.15.4 Operation

Balaji Polepalli; Weigao Xie; Dhanashree Thangaraja; Mukul Goyal; Hossein Hosseini; Y. Bashir

Wireless communication among sensor devices, enabled by IEEE 802.15.4 protocol, is increasingly replacing the existing wired technology in a wide range of monitoring and control applications. IEEE 802.15.4 networks typically operate in 2.4GHz ISM band, which is used by popular IEEE 802.11 (WiFi) networks as well. An overlap between the channels used by IEEE802.15.4 and IEEE 802.11 networks may adversely impact the operation of IEEE 802.15.4 since it is a low power protocol using a small channel width compared to the transmitted power levels and channel width used by IEEE 802.11. Avoiding channel overlap between IEEE 802.15.4 and IEEE 802.11 networks will become difficult once proposed IEEE 802.11n technology becomes popular. This is because an IEEE802.11n network may use two 20MHz wide channels for its operation, rather than a single 20MHz channel as is the case with other IEEE 802.11 PHY layers. In this paper, we evaluate, via test bed experiments, the impact of IEEE 802.11n operation on IEEE 802.15.4 performance when there is an overlap between the channels used by IEEE 802.15.4 and IEEE 802.11n networks.


advanced information networking and applications | 2009

Configuring Beaconless IEEE 802.15.4 Networks Under Different Traffic Loads

D. Rohm; Mukul Goyal; Hossein Hosseini; A. Divjak; Y. Bashir

IEEE 802.15.4, a MAC/PHY protocol for low power and low data rate wireless networks, is emerging as the popular choice for various monitoring and control applications. Depending on the application, the traffic load on an IEEE 802.15.4 network may vary over a wide range. Hence, proper configuration is important for successful operation of the protocol under given traffic load conditions. In this paper, we examine the impact of different configuration parameters: namely, macMinBE, macMaxBE and macMaxCSMABackoffs, on the performance of beaconless IEEE 802.15.4 networks. The performance is measured in terms of the packet loss probability and the packet latency as the traffic load on the network increases. Based on this analysis, we suggest IEEE 802.15.4 configuration that results in a good tradeoff between the packet loss probability and the packet latency for a given traffic load range. This analysis is based on ns2 simulations.


network-based information systems | 2010

Evaluating the Impact of Signal to Noise Ratio on IEEE 802.15.4 PHY-Level Packet Loss Rate

Mukul Goyal; S. Prakash; Weigao Xie; Y. Bashir; Hossein Hosseini; Arjan Durresi

In this paper, we evaluate the impact of signal to noise ratio (SNR) on the PHY-level packet loss rates on IEEE 802.15.4 links under the additive white Gaussian noise and Rayleigh fading models. We show that IEEE 802.15.4 PHY-level packet loss rate has a step-like response to the SNR deterioration. In other words, the packet loss rate is largely unaffected by SNR deterioration as long as SNR is more than a threshold. However, even a small deterioration in SNR beyond this threshold causes the packet loss rate to approach1. This result implies that SNR may not serve as a fine-granularity metric to indicate the reliability of an IEEE 802.15.4 link.


broadband and wireless computing, communication and applications | 2010

AntSens: An Ant Routing Protocol for Large Scale Wireless Sensor Networks

Mukul Goyal; Weigao Xie; Hossein Hosseini; Y. Bashir

Large scale wireless sensor networks, consisting of thousands of nodes spread over a large geographical area, are being planned for a number of monitoring and control applications. The individual nodes in such networks would be severely limited in their capabilities - they will have limited memory and CPU resources and would typically run on batteries. A suitable routing protocol for large wireless sensor networks should scale well with the size of the network in terms of the control packet, memory and processing overhead. Dynamic link/node characteristics, such as PHY/MAC loss rates and battery levels, in such networks require continuous monitoring of the quality of existing routes and frequent discovery of new routes. The routing protocol should allow distribution of traffic load through out the network to avoid artificial congestion, and hence high MAC level loss rates, in parts of the network. The existing routing protocols do not meet all the criteria mentioned above. Hence, we propose a new routing protocol meeting the criteria mentioned above. The proposed protocol, called AntSens, may be considered as belonging to the category of ant routing protocols that are based on the manner ants discover and remember the best routes to the food location.


global communications conference | 2009

Dynamic Reconfiguration in Beaconless IEEE 802.15.4 Networks under Varying Traffic Loads

D. Rohm; Mukul Goyal; Weigao Xie; Balaji Polepalli; Hossein Hosseini; A. Divjak; Y. Bashir

IEEE 802.15.4, a MAC/PHY protocol for low power and low data rate wireless networks, is emerging as the popular choice for various monitoring and control applications. Depending on the application, the traffic load on an IEEE 802.15.4 network may vary over a wide range. The performance of the protocol, measured in terms of the packet loss probability and the packet latency, depends upon the prevailing traffic load as well as the configuration of IEEE 802.15.4 MAC parameters. Static configuration of IEEE 802.15.4 MAC parameters, good for a particular traffic load range, may result in bad performance when the traffic load changes beyond that range. In this paper, we present a scheme that can be used by an IEEE 802.15.4 node to dynamically adjust its MAC configuration based on the observed loss rate and latency suffered by recent packets generated by the node. The performance benefits of the proposed scheme are illustrated via NS2 simulations.


international symposium on performance evaluation of computer and telecommunication systems | 2009

A stochastic model for beaconless IEEE 802.15.4 MAC operation

Mukul Goyal; D. Rohm; Hossein Hosseini; Kishor S. Trivedi; A. Divjak; Y. Bashir


Archive | 2010

A Performance Analysis of P2P Routing along a DAG in LLNs

Mukul Goyal; Ted Humpal; Emmanuel Baccelli; Y. Bashir

Collaboration


Dive into the Y. Bashir's collaboration.

Top Co-Authors

Avatar

Mukul Goyal

University of Wisconsin–Milwaukee

View shared research outputs
Top Co-Authors

Avatar

Hossein Hosseini

University of Wisconsin–Milwaukee

View shared research outputs
Top Co-Authors

Avatar

Weigao Xie

University of Wisconsin–Milwaukee

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

D. Rohm

University of Wisconsin–Milwaukee

View shared research outputs
Top Co-Authors

Avatar

Balaji Polepalli

University of Wisconsin–Milwaukee

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Dhanashree Thangaraja

University of Wisconsin–Milwaukee

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge