Papers by Professor S V Raghavan
CSI Transactions on ICT, 2017
The current issue that you are holding in your hands is a special one honoring India's greatest e... more The current issue that you are holding in your hands is a special one honoring India's greatest ever engineer/architect/planner Dr. Mokshakundam Visvesvaraya, in whose name the Government of India has launched a Doctoral Programme to identify the Best Talent across the country. The salient features of the scheme are reproduced here from the web site of Medial Lab Asia, the managers of the program on behalf of the Ministry of Electronics and Information technology, Government of India: 1. Give thrust to R&D, Create innovative ecosystem and Enhance India's competitiveness in the knowledge intensive sectors such as Electronics Systems Design and Manufacturing (ESDM), Information Technology (IT), and Information Technology Enabled Services (ITES). 2. To help in the fulfillment of the commitments made in National Policy on Electronics (NPE) 2012 and National Policy on Information Technology (NPIT) 2012. 3. Support to 1500 Ph.D. students in each of ESDM and IT/ITES sectors (Total: 3000 PhDs). 4. Out of the above, 500 PhDs in each of ESDM and IT/ ITES sectors would be from full-time Ph.D. candidates. The other 1000 PhDs in each of ESDM and IT/ITES sectors would be from part-time Ph.D. candidates. 5. The scheme will also support 200 Young Faculty Research Fellowships in the area of ESDM and IT/ ITES with the objective to attract and retain young faculty members. This is expected to help in the recognition and encouragement of young Faculty members involved in research and technology development in these areas. 6. Infrastructural grant to Academic Institutions for creation and/or up gradation of laboratories. Grant up to Rs. 5 lakh for every Full-Time PhD Candidate supported under the scheme may be provided to an Academic Institution. 7. One of the key goals of the Visvesvaraya Ph.D. Scheme is to encourage working professionals and non-PhD faculty members to pursue Ph.D. in the ESDM & IT/ITES sectors, as part-time candidates. It is envisioned that having part-time PhD students is likely to encourage the Industry-Academia interaction, help in the alignment of the R&D efforts between industry and academia, and bring value to the country.
CSI Transactions on ICT, 2021
The March 2021 issue in your hands carries a series of interesting articles about education and i... more The March 2021 issue in your hands carries a series of interesting articles about education and institution. The institution in focus is the famous Sri Chandrasekharendra Saraswathi Viswa Maha Vidyalaya (SCSVMV in short), a Deemed University located in Enathur, Kanchipuram. The greatness of such institutions stay in the background most often in the din that surrounds us; mainly due to the postcolonial conditioning that has remained deep rooted in our education system. The New Education Policy 2020 brings in fresh air and encourages experiments. Around the same time, Covid-19 pushed the world to embrace ICT in full measure. In a recent conclave I participated to talk about the role of SCSVMV in the context of NEP 2020, the idea of focusing an issue highlighting the methods, practices, and successes, was born. One gets news about institutions that are in the urban areas that are funded by the Government in good measure; but one often does not get to see India in its entirety. In this ...
Abst?act- Multimedia applications comprise several media streams, which are semantically synchron... more Abst?act- Multimedia applications comprise several media streams, which are semantically synchronized at different time instants. The application kehavior is stored along with the multimedia database using representation mechanisms such as OCPN (object composition Petri nets) or dynamic timed Petri nets (DTPN). It is imperative that one translates the application behavior to the corresponding schedulable entities, such as packets, so that the performance engineering of any system can be done, using the traffic model arising out of the (media related) application behavior as opposed to individual media level behavior. This requires that a function be defined, which takes the stored temporal representation as input and produces packets as output, preserving the semantic relationships among the streams. We propose a methodology based on probabilistic, attributed context free grammar (PACFG) to address this issue. We demonstrate the appropriateness of this methodology by applying it to ...
CSI Transactions on ICT, 2021
Being a Teacher is a spiritual experience. One not only experiences happiness and satisfaction, b... more Being a Teacher is a spiritual experience. One not only experiences happiness and satisfaction, but also imparts them to students who are listening. In this article, the author tries to capture the splendor of the classroom experience that practices the ideal form of teaching–learning process. The basis is the prescriptive methods given to this world by Adi Shankaracharya.
CSI Transactions on ICT, 2017
ArXiv, 2013
In the raise of many global organizations deploying their data centers and content services in In... more In the raise of many global organizations deploying their data centers and content services in India, the prefix reachability performance study from global destinations garners our attention. The events such as failures and attacks occurring in the Internet topology have impact on Autonomous System (AS) paths announced in the control plane and reachability of prefixes from spatially distributed ASes. As a consequence the customer reachability to the services in terms of increased latency and outages for a short or long time are experienced. The challenge in control plane event detection is when the data plane traffic is able to reach the intended destinations correctly. However detection of such events are crucial for the operations of content and data center industries. By monitoring the spatially distributed routing table features like AS path length distributions, spatial prefix reachability distribution and covering to overlap route ratio, we can detect the control plane events....
A set of relevant quotes could ‘set the scene’ for research into and discussion of the policy and... more A set of relevant quotes could ‘set the scene’ for research into and discussion of the policy and law aspects of DoS/DDoS against global, national and defence information infrastructures (GII, NII, DII), national critical infrastructure (CNI) and the nation state itself (Information Warfare, Cyber-warfare, Electronic Warfare).
CSI Transactions on ICT, 2021
We have spent five decades and four decades respectively, in the field of higher education. The i... more We have spent five decades and four decades respectively, in the field of higher education. The information chronicled in this paper represents our collective understanding and wisdom acquired therefrom. We describe ‘the desirable way’ for generations to come, after witnessing changes for the better and for the worse. Our emphasis is on holistic view, be it learning, research, technology, commerce, or environment; when we say holistic, we mean in space and time. There is a bit of philosophic underpinning when we make observations of consequence, but we do so with serious scientific basis. In our discourse, we are agnostic to belief (hypothesis) based dialectic logic and reasoning system and axiomatic (and hypothesis) based proving system that follows methodology assiduously.
International Association for Development of the Information Society, 2003
World Wide Web (web) is perceived as an unstructured and uncontrolled system. This paper explores... more World Wide Web (web) is perceived as an unstructured and uncontrolled system. This paper explores the web growth, processor speedup, and bandwidth growth over the time and proves that the web in its entirety is not an uncontrolled system that explodes indefinitely. Critical observation and analysis of the web, processor speedup, and bandwidth growth, prompted us to conjecture that "the
Computer Networks, Architecture and Applications, 1995
Testing is an integral part of protocol development cycle. In this paper, we will briefly discuss... more Testing is an integral part of protocol development cycle. In this paper, we will briefly discuss the protocol conformance testing methodologies and framework proposed by the International Standards Organization. Many efficient test sequence generation methods have been proposed to check the conformance of an implementation of a protocol to its standards. We will discuss these methods briefly. Finally, we will compare different test methodologies based on their fault coverage and the length of the test sequence.
IEEE/ACM Transactions on Networking, 1998
Conformance testing of protocols is the process of checking whether an implementation under test ... more Conformance testing of protocols is the process of checking whether an implementation under test conforms to the standards. In this paper we prove that the multilevel method (M method) [which splits the specification graph into a basic subgraph and one or more higher level subgraph(s)] is capable of diagnosing any number of faults in the higher level subgraph(s), if the basic subgraph is error-free. Heuristics for obtaining the basic subgraph and higher level subgraphs from the specification graph are also given. The advantage of the M method is that it has error recovery and, in addition, it does not assume the presence of reliable reset in the implementation under test. We additionally propose an incremental test sequence generation method, which produces a shorter test sequence and whose fault coverage is same as that of the M method. Finally, we compare the M method with other fault detection and fault diagnostic methods.
Computer Networks and ISDN Systems, 1995
Abstract A multi-level approach has been proposed for generating test sequences for the control p... more Abstract A multi-level approach has been proposed for generating test sequences for the control portion of communication protocols, given the specification. Test sequences generated using this approach have a high degree of fault coverage and the capability to recover from errors. The method does not assume the existence of an error-free reset input to move a protocol Finite State Machine (FSM) from any state to an initial state, unlike many other methods. The multi-level approach, thus, can be used to generate test sequences for real-world protocols. The methodology has been used to generate test sequences for a subset of the OSI Class 4 Transport Protocol and results are presented.
Google, Inc. (search), Subscribe (Full Service), Register (Limited Service, Free), Login. Search:... more Google, Inc. (search), Subscribe (Full Service), Register (Limited Service, Free), Login. Search: The ACM Digital Library The Guide. ...
Ad Hoc Networks, 2007
Increasing popularity and availability of portable wireless devices, which constitute mobile ad h... more Increasing popularity and availability of portable wireless devices, which constitute mobile ad hoc networks, calls for scalable ad hoc routing protocols. On-demand routing protocols adapt well with dynamic topologies of ad hoc networks, because of their lower control overhead and quick response to route breaks. But, as the size of the network increases, these protocols cease to perform due to large routing overhead generated while repairing route breaks. We propose a multipath on-demand routing protocol (SMORT), which reduces the routing overhead incurred in recovering from route breaks, by using secondary paths. SMORT computes fail-safe multiple paths, which provide all the intermediate nodes on the primary path with multiple routes (if exists) to destination. Exhaustive simulations using GloMoSim with large networks (2000 nodes) confirm that SMORT is scalable, and performs better even at higher mobility and traffic loads, when compared to the disjoint multipath routing protocol (DMRP) and ad hoc on-demand distance vector (AODV) routing protocol.
IFIP Advances in Information and Communication Technology, 2010
HAL is a multidisciplinary open access archive for the deposit and dissemination of scientific re... more HAL is a multidisciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L'archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d'enseignement et de recherche français ou étrangers, des laboratoires publics ou privés.
PROCEEDINGS OF THE INTERNATIONAL …, 2002
In the age of multimedia and high-speed networks, multicast is one of the mechanisms by which the... more In the age of multimedia and high-speed networks, multicast is one of the mechanisms by which the power of the Internet can be further harnessed in an efficient manner. When more than one receiver is interested in receiving a transmission from a single or a set of senders, multicast is the most efficient and viable mechanism. In the protocol stack of the network, multicast is best implemented in the network layer in the form of a multicast routing protocol to select the best path for the transmission. The other layers of the protocol stack provide additional features for multicast. This paper deals with how multicasting is implemented in the Internet (IPv4). With emphasis on the implementation of multicast at the network layer the implementation of additional features for multicast at the other layers of the protocol stack are presented. The network layer is concerned with routing of the data in an efficient manner with minimal duplication of data to the various receivers. The features of the routing protocols that have been proposed for best effort as well as QoS-based multicast are analyzed. Some of the issues and open problems related to multicast implementation and deployment are discussed along with an overview on how multicast service is deployed in some of the existing backbone networks. multimedia applications and Distributed Interactive Simulation (DIS). The multicast applications can be divided into the following categories: Single-point to multi-point e.g. Audio-Video broadcasts, Database updates, Push applications Multi-point to multi-point e.g. Video-conferencing, Distance Learning, Multiplayer Games Multi-point to single-point e.g. Resource Discovery, Data Collection, Auctions Address Range Uses 224.0.0.0 to 224.0.0.255 Administrative functions and system level routing chores (always sent with TTL of 1) 224.0.1.0 to 238.255.255.255 Multicast end user applications within groups, intranets and Internet 239.0.0.0 to 239.255.255.255 Locally administered or site specific multicast applications
CSI Transactions on ICT, 2021
TI & paper discusres the formal description of a real time rpplicatiw, viz a Fault Management Sys... more TI & paper discusres the formal description of a real time rpplicatiw, viz a Fault Management System (FMS) for the OS1 cnvimament, using 0-Estelle. 0-Estelle is an object oriented spcriticatiOn language that has been proposed by the authors for dcauibing red time applieationa8]. 0-Estelle is an Estelle based hnguagc with u t m d e d futures. A distniuted PMS is a set of Fault Managers running concurrently on smral systems. It is the responsibility of the Fault Manqscr 0 on ea & system to detect, isolate and possibly rectify the faults in the systcm[q. Management seMcea are provided to the PM to perform its tasks and to wmmunicate with F M s on other wemkWe have argued that the formal description of such a distniuted application requires additional features in description languages like Estelle. It will be dillicuh to describe the FMS using Estelk because of the non availability of appropriate features. 0-Estellc deseription of the FMS can be used for protoeol verification and semiau...
2006 International Conference on Advanced Computing and Communications, 2006
IPSec provides Maturity solutions to various network based applications i.e., web applications. I... more IPSec provides Maturity solutions to various network based applications i.e., web applications. Implementing the, IPSec in network layer includes significant bandwidth and processing time, overhead to application traffic. The upperlayer protocols such as TCP and UDP behaviour is also influenced by these overheads. In war work, we have studied the impact of IPSee on the metrics: Round Trip Time, Average Burst Size and Available Bandwidth for IPv4 and IPv6 network traffic.HMAC-MD5 authentication algorithm, advanced encryption standard encryption algorithm, and deflate comperession algorithm are used for the protocols of IPSec. From the characterized metrics and computed overheads we analyze tile impact of IPSec on connection handling capacity of web application servers by considering the user behaviour on web page requests.
Uploads
Papers by Professor S V Raghavan