In resource constrained wireless sensor networks (WSNs) it is important to utilize energy efficie... more In resource constrained wireless sensor networks (WSNs) it is important to utilize energy efficiently. Data dissemination is mainly responsible for the consumption of energy in sensor nodes (SNs). The data dissemination protocols for WSNs should reduce the energy consumption of the SNs. Sink and source mobility is the major challenge for data dissemination protocols. In this paper, a Tier based Energy Efficient protocol (TBEE) providing sink and source mobility in WSNs has been proposed. TBEE protocol has been designed so that fewer SNs located nearer to the dissemination point (DP) respond to the sinks message for grid formation thereby reducing message overheads. TBEE exploits an improved approach of communication amongst the SNs so that the collisions are reduced. TBEE efficiently handles the movement of the sinks and sources in the network and reduces the overheads associated with their mobility. TBEE’s performance was evaluated in different conditions and scenarios. Simulation ...
P2P computing has opened up exciting new possibilities by extending the boundaries of scale, crea... more P2P computing has opened up exciting new possibilities by extending the boundaries of scale, creating virtual supercomputers enabling computing in the large, providing gigantic storage clusters and specialized search engines based on shared content and information. However, the P2P revolution has left the large enterprises, small and medium businesses and other organizations largely untouched. These organizations also require access to
International Journal of Intelligent Systems and Applications, 2012
In this paper, we have proposed a new SEP protocol called as Deterministic-SEP (D-SEP), for elect... more In this paper, we have proposed a new SEP protocol called as Deterministic-SEP (D-SEP), for electing cluster heads in a distributed fashion in two-, three-, and multi-level hierarchical wireless sensor networks. The significant improvement has been shown using D-SEP in comparison with SEP in terms of network lifetime, energy consumption and data transmission to BS. Our expectations are demonstrated by simulation results. We have introduced the superior characteristic of our protocol and discussed the cluster head selection algorithm by describing the threshold and probability equations. In order to reach the constructive conclusion, two cases of two-level and four cases of three-level heterogeneity have been reported and compared. The results reveal that there is 323% & 207% improvement in the overall lifetime of the network by using D-SEP after comparing two-level (m=0.3, a=1.5) & three-level (m=0.5, m0=0.4, a=1.5, b=3) respectively. The investigations ascertain the stable region and maximized lifetime of the network by using D-SEP over SEP. The development of 17.8 fold in the lifetime of the network is reported by using D-SEP. Moreover the energy depletion slope per round is lower in case of D-SEP over SEP.
In this paper, we have simulated and evaluated the performance tradeoff with routing protocols: C... more In this paper, we have simulated and evaluated the performance tradeoff with routing protocols: Constrained Flooding, the Real-Time Search and the Adaptive Tree on MICA and MICAz platform with different radio models using PROW-LER for wireless sensor networks. The simulation results establish that the MICAz motes give low latency, high throughput, high energy consumption, low efficiency but better lifetime while the MICA motes give high success rate and less loss rate. It has been, thus, concluded that in case of all the radio models the MICAz is preferably better than MICA in applications where energy is a constraint. Moreover, use of MICAz motes increases the network lifetime in comparison to MICA for the radio models. Further, the AT protocol can be applied to achieve better energy consumption, efficiency and lifetime in real time for wireless sensor networks.
International Journal of Networking and Virtual Organisations, 2010
The Indian Information Technology (IT) industry is on the verge of significant change. Its domina... more The Indian Information Technology (IT) industry is on the verge of significant change. Its dominance is under threat from countries like China, the Philippines, Vietnam, Israel and the like, which can offer skilled IT workers at lower wages. Moreover, the academic institutions that are engaged in higher technical education have failed to provide quality manpower, which the IT industry needs to transition from the largely lower end of the technology spectrum in which it operates to a leader in the worldwide IT industry that creates new technologies, services and applications. Clearly, a lot needs to be done to improve the overall quality of education and research and promote collaboration between the academia and the industry. This research paper presents the design and specifications of 'IndNet', a pan-India collaborative Peer-to-Peer (P2P) network for the community of technology experts, industry practitioners, faculty members, researchers and students who belong to various universities and business organisations. IndNet shall enable the aggregation and exchange of computational resources, technology-related content and expert human knowledge, effectively bridging the gap between the industry and the teeming technical institutions in India.
2008 16th IEEE International Conference on Networks, 2008
Abstract Peer-to-peer (P2P) networks are vulnerable to Distributed Denial-of-Service (DDoS) attac... more Abstract Peer-to-peer (P2P) networks are vulnerable to Distributed Denial-of-Service (DDoS) attacks, which cause invalid packets to be flooded through the P2P network, preventing valid packets from being delivered. This causes a disruption of the services ...
International Journal of Advanced Computer Science and Applications, 2012
Vehicular Ad hoc Network (VANET) is a kind of mobile ad hoc network using the capabilities of wir... more Vehicular Ad hoc Network (VANET) is a kind of mobile ad hoc network using the capabilities of wireless communication for Vehicle-to-Vehicle and Vehicle-to-Roadside communication to provide safety and comfort to vehicles in transportation system. People in vehicles want to access data of their interest from Road Side Unit (RSU). RSU need to schedule these requests in a way to maximize the service ratio. In this paper we have proposed new methods for careful analysis of incoming requests to find whether these requests can be completed within deadline or not and to provide dynamic service queue. Simulation results show that the proposed schemes increase the service ratio significantly.
In this paper, work has been extended to prolong the lifetime and energy proficiency of wireless ... more In this paper, work has been extended to prolong the lifetime and energy proficiency of wireless sensor network. An idea of deterministic HEED has been proposed that take care of cluster head which has not been elected in 1/pi rounds. Here the comparative investigations have been reported to ascertain the performance of HEED, Multilevel Heterogeneous-Hybrid Energy Efficient Distributed Protocol (MH-HEED) and the Deterministic-HEED (D-HEED) for Wireless Sensor Network (WSN) in case of different deployment strategies. The results envisage that there is increase of about 364.3%, 268.7% & 300% comparing D-HEED over H-HEED, whereas this increase is about 25%, 22.9% &15.38% over MH-HEED in case of circular, grid and rectangular deployment strategies respectively.
In this paper, the enhancement of HEED protocol to support mobility in both homogenous and hetero... more In this paper, the enhancement of HEED protocol to support mobility in both homogenous and heterogeneous network [Homogeneous HEED (H-HEED), two-, three-level heterogeneous (2H-HHED & 3H-HEED) and multi-level heterogeneous HEED (MH-HEED)] has been presented. Here, we have examined the performance of HEED, 2H-HEED, 3H-HEED and MH-HEED with random mobility in wireless sensor network in terms of stability, energy efficiency, lifetime and throughput. The results establish that the MH-HEED in sensor network proved to be superior because of the enhancement in the performance metrics like: stability, lifetime and throughput (data packets transmitted to BS) with the random mobility of BS. The network performance is dominating in terms of stability, throughput and energy efficiency if 3H-HEED protocol is used and it is useful for habitat monitoring and other similar applications. The overall performance of the network substantially improved in case of BS mobility.
Communications in Computer and Information Science, 2011
In this paper, we propose a cooperative caching scheme that exploits an energy efficient model in... more In this paper, we propose a cooperative caching scheme that exploits an energy efficient model in Wireless Sensor Network. Cooperative caching is done in the form of concentric circular cache layers around the sink. A Circular cache layer is a group of nodes falls ...
International Journal of Computer Applications, 2010
This paper presents the realistic approach towards the quantitative analysis and simulation of En... more This paper presents the realistic approach towards the quantitative analysis and simulation of Energy Efficient Hierarchical Cluster (EEHC)-based routing for wireless sensor networks. Here the efforts have been done to combine analytical hardware model with the modified EEHC-based routing model and to investigate the operating frequency reliance on various performance metrics. It has been indicated that there is significant enhancement in the number of cluster requirement as there is increase in frequency and head set size.
Technology Integration Advancements in Distributed Systems and Computing
P2P networks have caught the imagination of the research community and application developers wit... more P2P networks have caught the imagination of the research community and application developers with their sheer scalability and fault-tolerance characteristics. However, only content-sharing applications based on the P2P concept have reached the desired level of maturity. The potential of the P2P concept for designing the next-generation of real-world distributed applications can be realized only if a comprehensive framework quantifying the performance related aspects of all classes of P2P applications is available. Researchers have proposed some QoS (Quality-of-Service) parameters for content-sharing P2P applications based on response time and delay, but these do not cover the gamut of application domains that the P2P concept is applicable to. Hence, this research paper proposes an early QoS framework covering various classes of P2P applications; content distribution, distributed computing and communication and collaboration. Early results from the prototype implementation of the Pe...
Communications in Computer and Information Science, 2009
Peer-to-Peer networks have been widely used for sharing millions of terabytes of content, for lar... more Peer-to-Peer networks have been widely used for sharing millions of terabytes of content, for large-scale distributed computing and for a variety of other novel applications, due to their scalability and fault-tolerance. However, the scope of P2P networks has somehow been ...
2009 IEEE International Conference on Internet Multimedia Services Architecture and Applications (IMSAA), 2009
Abstract Cloud computing has emerged as an exciting new computing paradigm offering organization... more Abstract Cloud computing has emerged as an exciting new computing paradigm offering organizations and businesses the flexibility of scaling their compute resource usage, without having to worry about under or over-provisioning. It also enables services to be deployed and utilized in a ...
Proceedings of the 2011 International Conference on Communication, Computing & Security - ICCCS '11, 2011
In the vehicular ad hoc networks several types of data are disseminated and transmission protocol... more In the vehicular ad hoc networks several types of data are disseminated and transmission protocol changes with change in the type of data. Some information is useful for only those vehicles which are in certain specific range or location. Dissemination of traffic update message to all the vehicles is wastage of channel bandwidth. In our proposed method, vehicles which are
2011 World Congress on Information and Communication Technologies, 2011
SMS has a variety of advantages and disadvantages for M-Commerce purpose. The advantages are it i... more SMS has a variety of advantages and disadvantages for M-Commerce purpose. The advantages are it is easy to use, a common messaging tool among consumers, works across all wireless operators, affordable for mobile users, no specific software required for installation, allows banks and financial institutions to provide real-time information to consumers and employees and stored messages can be accessed without
International Conference on Grid Computing and Applications, 2007
A method and apparatus for forming slabs and shaped bars of food material such as fish or meat. T... more A method and apparatus for forming slabs and shaped bars of food material such as fish or meat. The material is extruded at a very high pressure while deep frozen and via an extrusion nozzle which is shaped to build up back pressure to improve uniformity of extrusion.
Observation of electromagnetic fluctuations in lower hybrid range of frequencies is reported in a... more Observation of electromagnetic fluctuations in lower hybrid range of frequencies is reported in a large volume linear plasma device. The instability is observed in the plasma core when a narrow multifilamentary source is used and it is absent when a broad source is used. This instability is observed in high beta plasma and it is characterized by broadband turbulent spectra with central frequency ω=5×104 s−1 and wave number k⊥=0.2 cm−1 and satisfies the condition k⊥ρe≤1, where ρe is the electron Larmor radius. When increasing the axial magnetic field reduces plasma beta, the instability weakens in magnitude and magnetic component is totally suppressed at plasma beta less than 0.5. Several possible explanations are considered and it is indicated that either the pressure gradient modified by energetic electrons or the electron temperature gradient may be responsible for the instability.
Abstract—Cloud computing has been envisioned as the next-generation technology of IT industries. ... more Abstract—Cloud computing has been envisioned as the next-generation technology of IT industries. The Cloud is a platform where data owner remotely store their data in the cloud to enjoy the high quality applications and services. The client or data owner send their data ...
In resource constrained wireless sensor networks (WSNs) it is important to utilize energy efficie... more In resource constrained wireless sensor networks (WSNs) it is important to utilize energy efficiently. Data dissemination is mainly responsible for the consumption of energy in sensor nodes (SNs). The data dissemination protocols for WSNs should reduce the energy consumption of the SNs. Sink and source mobility is the major challenge for data dissemination protocols. In this paper, a Tier based Energy Efficient protocol (TBEE) providing sink and source mobility in WSNs has been proposed. TBEE protocol has been designed so that fewer SNs located nearer to the dissemination point (DP) respond to the sinks message for grid formation thereby reducing message overheads. TBEE exploits an improved approach of communication amongst the SNs so that the collisions are reduced. TBEE efficiently handles the movement of the sinks and sources in the network and reduces the overheads associated with their mobility. TBEE’s performance was evaluated in different conditions and scenarios. Simulation ...
P2P computing has opened up exciting new possibilities by extending the boundaries of scale, crea... more P2P computing has opened up exciting new possibilities by extending the boundaries of scale, creating virtual supercomputers enabling computing in the large, providing gigantic storage clusters and specialized search engines based on shared content and information. However, the P2P revolution has left the large enterprises, small and medium businesses and other organizations largely untouched. These organizations also require access to
International Journal of Intelligent Systems and Applications, 2012
In this paper, we have proposed a new SEP protocol called as Deterministic-SEP (D-SEP), for elect... more In this paper, we have proposed a new SEP protocol called as Deterministic-SEP (D-SEP), for electing cluster heads in a distributed fashion in two-, three-, and multi-level hierarchical wireless sensor networks. The significant improvement has been shown using D-SEP in comparison with SEP in terms of network lifetime, energy consumption and data transmission to BS. Our expectations are demonstrated by simulation results. We have introduced the superior characteristic of our protocol and discussed the cluster head selection algorithm by describing the threshold and probability equations. In order to reach the constructive conclusion, two cases of two-level and four cases of three-level heterogeneity have been reported and compared. The results reveal that there is 323% & 207% improvement in the overall lifetime of the network by using D-SEP after comparing two-level (m=0.3, a=1.5) & three-level (m=0.5, m0=0.4, a=1.5, b=3) respectively. The investigations ascertain the stable region and maximized lifetime of the network by using D-SEP over SEP. The development of 17.8 fold in the lifetime of the network is reported by using D-SEP. Moreover the energy depletion slope per round is lower in case of D-SEP over SEP.
In this paper, we have simulated and evaluated the performance tradeoff with routing protocols: C... more In this paper, we have simulated and evaluated the performance tradeoff with routing protocols: Constrained Flooding, the Real-Time Search and the Adaptive Tree on MICA and MICAz platform with different radio models using PROW-LER for wireless sensor networks. The simulation results establish that the MICAz motes give low latency, high throughput, high energy consumption, low efficiency but better lifetime while the MICA motes give high success rate and less loss rate. It has been, thus, concluded that in case of all the radio models the MICAz is preferably better than MICA in applications where energy is a constraint. Moreover, use of MICAz motes increases the network lifetime in comparison to MICA for the radio models. Further, the AT protocol can be applied to achieve better energy consumption, efficiency and lifetime in real time for wireless sensor networks.
International Journal of Networking and Virtual Organisations, 2010
The Indian Information Technology (IT) industry is on the verge of significant change. Its domina... more The Indian Information Technology (IT) industry is on the verge of significant change. Its dominance is under threat from countries like China, the Philippines, Vietnam, Israel and the like, which can offer skilled IT workers at lower wages. Moreover, the academic institutions that are engaged in higher technical education have failed to provide quality manpower, which the IT industry needs to transition from the largely lower end of the technology spectrum in which it operates to a leader in the worldwide IT industry that creates new technologies, services and applications. Clearly, a lot needs to be done to improve the overall quality of education and research and promote collaboration between the academia and the industry. This research paper presents the design and specifications of 'IndNet', a pan-India collaborative Peer-to-Peer (P2P) network for the community of technology experts, industry practitioners, faculty members, researchers and students who belong to various universities and business organisations. IndNet shall enable the aggregation and exchange of computational resources, technology-related content and expert human knowledge, effectively bridging the gap between the industry and the teeming technical institutions in India.
2008 16th IEEE International Conference on Networks, 2008
Abstract Peer-to-peer (P2P) networks are vulnerable to Distributed Denial-of-Service (DDoS) attac... more Abstract Peer-to-peer (P2P) networks are vulnerable to Distributed Denial-of-Service (DDoS) attacks, which cause invalid packets to be flooded through the P2P network, preventing valid packets from being delivered. This causes a disruption of the services ...
International Journal of Advanced Computer Science and Applications, 2012
Vehicular Ad hoc Network (VANET) is a kind of mobile ad hoc network using the capabilities of wir... more Vehicular Ad hoc Network (VANET) is a kind of mobile ad hoc network using the capabilities of wireless communication for Vehicle-to-Vehicle and Vehicle-to-Roadside communication to provide safety and comfort to vehicles in transportation system. People in vehicles want to access data of their interest from Road Side Unit (RSU). RSU need to schedule these requests in a way to maximize the service ratio. In this paper we have proposed new methods for careful analysis of incoming requests to find whether these requests can be completed within deadline or not and to provide dynamic service queue. Simulation results show that the proposed schemes increase the service ratio significantly.
In this paper, work has been extended to prolong the lifetime and energy proficiency of wireless ... more In this paper, work has been extended to prolong the lifetime and energy proficiency of wireless sensor network. An idea of deterministic HEED has been proposed that take care of cluster head which has not been elected in 1/pi rounds. Here the comparative investigations have been reported to ascertain the performance of HEED, Multilevel Heterogeneous-Hybrid Energy Efficient Distributed Protocol (MH-HEED) and the Deterministic-HEED (D-HEED) for Wireless Sensor Network (WSN) in case of different deployment strategies. The results envisage that there is increase of about 364.3%, 268.7% & 300% comparing D-HEED over H-HEED, whereas this increase is about 25%, 22.9% &15.38% over MH-HEED in case of circular, grid and rectangular deployment strategies respectively.
In this paper, the enhancement of HEED protocol to support mobility in both homogenous and hetero... more In this paper, the enhancement of HEED protocol to support mobility in both homogenous and heterogeneous network [Homogeneous HEED (H-HEED), two-, three-level heterogeneous (2H-HHED & 3H-HEED) and multi-level heterogeneous HEED (MH-HEED)] has been presented. Here, we have examined the performance of HEED, 2H-HEED, 3H-HEED and MH-HEED with random mobility in wireless sensor network in terms of stability, energy efficiency, lifetime and throughput. The results establish that the MH-HEED in sensor network proved to be superior because of the enhancement in the performance metrics like: stability, lifetime and throughput (data packets transmitted to BS) with the random mobility of BS. The network performance is dominating in terms of stability, throughput and energy efficiency if 3H-HEED protocol is used and it is useful for habitat monitoring and other similar applications. The overall performance of the network substantially improved in case of BS mobility.
Communications in Computer and Information Science, 2011
In this paper, we propose a cooperative caching scheme that exploits an energy efficient model in... more In this paper, we propose a cooperative caching scheme that exploits an energy efficient model in Wireless Sensor Network. Cooperative caching is done in the form of concentric circular cache layers around the sink. A Circular cache layer is a group of nodes falls ...
International Journal of Computer Applications, 2010
This paper presents the realistic approach towards the quantitative analysis and simulation of En... more This paper presents the realistic approach towards the quantitative analysis and simulation of Energy Efficient Hierarchical Cluster (EEHC)-based routing for wireless sensor networks. Here the efforts have been done to combine analytical hardware model with the modified EEHC-based routing model and to investigate the operating frequency reliance on various performance metrics. It has been indicated that there is significant enhancement in the number of cluster requirement as there is increase in frequency and head set size.
Technology Integration Advancements in Distributed Systems and Computing
P2P networks have caught the imagination of the research community and application developers wit... more P2P networks have caught the imagination of the research community and application developers with their sheer scalability and fault-tolerance characteristics. However, only content-sharing applications based on the P2P concept have reached the desired level of maturity. The potential of the P2P concept for designing the next-generation of real-world distributed applications can be realized only if a comprehensive framework quantifying the performance related aspects of all classes of P2P applications is available. Researchers have proposed some QoS (Quality-of-Service) parameters for content-sharing P2P applications based on response time and delay, but these do not cover the gamut of application domains that the P2P concept is applicable to. Hence, this research paper proposes an early QoS framework covering various classes of P2P applications; content distribution, distributed computing and communication and collaboration. Early results from the prototype implementation of the Pe...
Communications in Computer and Information Science, 2009
Peer-to-Peer networks have been widely used for sharing millions of terabytes of content, for lar... more Peer-to-Peer networks have been widely used for sharing millions of terabytes of content, for large-scale distributed computing and for a variety of other novel applications, due to their scalability and fault-tolerance. However, the scope of P2P networks has somehow been ...
2009 IEEE International Conference on Internet Multimedia Services Architecture and Applications (IMSAA), 2009
Abstract Cloud computing has emerged as an exciting new computing paradigm offering organization... more Abstract Cloud computing has emerged as an exciting new computing paradigm offering organizations and businesses the flexibility of scaling their compute resource usage, without having to worry about under or over-provisioning. It also enables services to be deployed and utilized in a ...
Proceedings of the 2011 International Conference on Communication, Computing & Security - ICCCS '11, 2011
In the vehicular ad hoc networks several types of data are disseminated and transmission protocol... more In the vehicular ad hoc networks several types of data are disseminated and transmission protocol changes with change in the type of data. Some information is useful for only those vehicles which are in certain specific range or location. Dissemination of traffic update message to all the vehicles is wastage of channel bandwidth. In our proposed method, vehicles which are
2011 World Congress on Information and Communication Technologies, 2011
SMS has a variety of advantages and disadvantages for M-Commerce purpose. The advantages are it i... more SMS has a variety of advantages and disadvantages for M-Commerce purpose. The advantages are it is easy to use, a common messaging tool among consumers, works across all wireless operators, affordable for mobile users, no specific software required for installation, allows banks and financial institutions to provide real-time information to consumers and employees and stored messages can be accessed without
International Conference on Grid Computing and Applications, 2007
A method and apparatus for forming slabs and shaped bars of food material such as fish or meat. T... more A method and apparatus for forming slabs and shaped bars of food material such as fish or meat. The material is extruded at a very high pressure while deep frozen and via an extrusion nozzle which is shaped to build up back pressure to improve uniformity of extrusion.
Observation of electromagnetic fluctuations in lower hybrid range of frequencies is reported in a... more Observation of electromagnetic fluctuations in lower hybrid range of frequencies is reported in a large volume linear plasma device. The instability is observed in the plasma core when a narrow multifilamentary source is used and it is absent when a broad source is used. This instability is observed in high beta plasma and it is characterized by broadband turbulent spectra with central frequency ω=5×104 s−1 and wave number k⊥=0.2 cm−1 and satisfies the condition k⊥ρe≤1, where ρe is the electron Larmor radius. When increasing the axial magnetic field reduces plasma beta, the instability weakens in magnitude and magnetic component is totally suppressed at plasma beta less than 0.5. Several possible explanations are considered and it is indicated that either the pressure gradient modified by energetic electrons or the electron temperature gradient may be responsible for the instability.
Abstract—Cloud computing has been envisioned as the next-generation technology of IT industries. ... more Abstract—Cloud computing has been envisioned as the next-generation technology of IT industries. The Cloud is a platform where data owner remotely store their data in the cloud to enjoy the high quality applications and services. The client or data owner send their data ...
Uploads
Papers by Lalit Awasthi