Koojana Kuladinithi

Koojana Kuladinithi
Technische Universität Hamburg | TUHH · Communication Networks

Doctor of Philosophy

About

60
Publications
19,797
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
589
Citations
Citations since 2016
13 Research Items
298 Citations
201620172018201920202021202201020304050
201620172018201920202021202201020304050
201620172018201920202021202201020304050
201620172018201920202021202201020304050
Additional affiliations
April 2016 - January 2020
Technische Universität Hamburg
Position
  • Senior Researcher
February 2010 - March 2016
Universität Bremen
Position
  • PostDoc Position

Publications

Publications (60)
Article
Going wireless is one of the key industrial trends, which assists the emergence of new manufacturing and maintenance processes by reducing the complexity and cost of physical equipment. However, the adoption of Wireless Sensor Networks (WSNs) in production environments is limited due to the strict Quality of Service (QoS) requirements of industrial...
Article
Full-text available
Seismic data acquisition in oil and gas exploration employs a large-scale network of geophone sensors deployed in thousands across a survey field. A central control unit acquires and processes measured data from geophones to come up with an image of the earth’s subterranean structure to locate oil and gas traps. Conventional seismic acquisition sys...
Conference Paper
This paper aims to share the experiences during online teaching of two different project-based learning courses at Hamburg University of Technology (TUHH) during the COVID-19 (Corona) pandemic 2020. The success of project-based learning courses relies on how freely and openly students can discuss their task-oriented problems in small teams. The mos...
Conference Paper
Full-text available
EPIC (Improving Employability Through Internationalization and Collaboration) is an Erasmus+ 3 year Strategic Partnership, which explores how blended learning can support multinational and interdisciplinary student projects. In this way it searches to combine the flexibility and cost-effectiveness of virtual collaboration with the benefits of physi...
Article
Full-text available
Opportunistic networks have recently seen increasing interest in the networking community. They can serve a range of application scenarios, most of them being destination-less, i.e., without a-priori knowledge of who is the final destination of a message. In this paper, we explore the usage of data popularity for improving the efficiency of data fo...
Conference Paper
Full-text available
At the Hamburg University of Technology, Germany, the modelling of communication networks using the OMNeT++ simulator and the INET framework is taught for Master students. Teaching the concepts of simulation and modelling while letting the students obtain a hands-on experience during a 14-week (4h/week) period (single semester) is a challenging tas...
Conference Paper
Full-text available
This paper focuses on modeling the charateristics of opportunistic networks (OppNets). The motivation of this work is to develop a model which is closer to the reality to represent the data dissemination in OppNets. This paper shows our preliminary results validating our model in OppNets scenarios which give an opportunity to exchange data among a...
Article
Full-text available
Simulation is one of the most powerful tools we have for evaluating the performance of Opportunistic Networks. In this survey, we focus on available tools and models, compare their performance and precision and experimentally show the scalability of different simulators. We also perform a gap analysis of state-of-the-art Opportunistic Network simul...
Article
Full-text available
Opportunistic networks (OppNets) are focused to exploit direct, localised communications which occur in a peer-to-peer manner mostly based on people's movements and their contact durations. Therefore, the use of realistic mobility models is critical to evaluate the data dissemination in OppNets. One of the mobility models that is available in OMNeT...
Conference Paper
Decentralised electric power generation using renewable energy sources are becoming increasingly popular. As a consequence, decentralised electrical energy sources such as photovoltaic (PV) are connected to the low voltage (LV) power grids. This raises the requirement of dedicated and coordinated control of loads and power generation to realize int...
Article
Full-text available
All over the world, road congestion is among the most prevalent transport challenges usually in urban environments which not only increases fuel consumption and emission of harmful gases, but also causes stress for the drivers. Intelligent Transportation System (ITS) enables a better use of the infrastructure by connecting vehicles to other vehicle...
Conference Paper
Testbeds play a crucial role in evaluating novel protocols, algorithms, and applications in controlled, but realistic environments. These testbeds are mainly used by researchers to realize diverse application environments, which are not realistic to be achieved in simulated environments (e.g., lossy channels in Wireless Sensor Networks (WSN)). Most...
Conference Paper
Full-text available
The number of computing devices of the IoT are expected to grow exponentially. To address the communication needs of the IoT, research is being done to develop new networking architectures and to extend existing architectures. An area that lacks attention in these efforts is the emphasis on utilisation of omnipresent local data. There are a number...
Conference Paper
Full-text available
We are in the process of developing a system architecture for opportunistic and information centric communications. This architecture (called Keetchi), meant for the Internet of Things (IoT) is focussed on enabling applications to perform distributed and decentralised communications among smart devices. To realise and evaluate this architecture, we...
Conference Paper
Full-text available
This paper presents a preliminary system architecture of integrating OMNeT++ into the mosaik co-simulation framework. This will enable realistic simulation of communication network protocols and services for smart grid scenarios and on the other side, further development of communication protocols for smart grid applications. Thus, by integrating O...
Conference Paper
Content Centric Networking (CCN) is a new paradigm in networking and a future Internet architecture. Performance evaluations show that conventional CCN forwarding strategies which use replication of Interests (standard) or the shortest path (best-face) do not perform well under high bandwidth requirements and loaded networks. We have designed and e...
Conference Paper
The increasing interest and utilization of Wireless Sensor Networks has increased the requirements of energy saving for battery powered sensor nodes. Even in modern sensor nodes, communication causes the largest part of energy consumption and therefore ways to reduce the amount of data sending are widely concerned. One solution to reduce data trans...
Conference Paper
Today, there exist several standards based and proprietary based protocols that can be used in Wireless Sensor Network (WSN) applications. Proprietary technologies are difficult to integrate into larger networks and currently available Internet-based services. The use of IP based technologies allows easy integration with existing network infrastruc...
Conference Paper
Full-text available
The supervision of the environment of freight goods directly at the goods gives a better shelf-life estimation than monitoring at the inlet or outlet of the refrigeration unit. Implementing the monitoring spatially close to the good is typically more complex for the logistic service provider. Either this is done using wires or so-called data-logger...
Conference Paper
Full-text available
Massively distributed clouds (MDC) have a huge potential in serving novel applications and services in many situations. Mainly, they are able to provide communication without the use of an infras- tructure and to guarantee full data and user anonymity. However, their implementation is not trivial and requires innovation in many different fields, su...
Article
Full-text available
Several drafts in the CoRE WG are discussing the usage of CoAP on non-UDP/IP transports already. There are various use cases for non-UDP/IP transports. In order to structure the discussion, this draft introduces new terminology and transport scenarios.
Article
Full-text available
The use of web services for sensor networking applications is seen as an important part in emerging M2M communications. The Constrained Application Protocol (CoAP) is proposed by the Internet Engineering Task Force (IETF) to optimize the use of the RESTful web service architecture for constrained nodes and networks, for example Wireless Sensor Netw...
Article
Full-text available
The use of web services for sensor networking applications is seen as an important part in emerging M2M communications. The Constrained Application Protocol (CoAP) is proposed by the Internet Engineering Task Force (IETF) to optimize the use of the RESTful web service architecture for constrained nodes and networks, for example Wireless Sensor Netw...
Conference Paper
The use of web services for sensor networking applications is seen as an important part in emerging M2M communications. The Constrained Application Protocol (CoAP) is proposed by the Internet Engineering Task Force (IETF) to optimize the use of the RESTful web service architecture for constrained nodes and networks, for example Wireless Sensor Netw...
Article
In the Constrained RESTful Environments (CoRE) working group at the Internet Engineering Task Force (IETF) a Representational State Transfer (REST) architecture [1] is being defined for constrained nodes and networks, e.g. Wireless Sensor Networks (WSN). The CoRE working group has already proposed a standard called Constrained Application Protocol...
Conference Paper
The Trickle algorithm has proven to be of great benefit to the Wireless Sensor Networking area. It has shown general applicability in this field, e.g. for code distribution to smart objects and routing information distribution between smart objects. Up to now analysis of the algorithm has focussed on simulation studies and measurement campaigns. Th...
Conference Paper
Full-text available
Seamless performance of communication applications is critical for today's mobile workers who are dependent on their mobile computing devices. One area of such criticality is the smoothness of handovers between Access Points (APs) in 802.11 based communications. In this work, two heuristic handover algorithms based on indoor positioning are designe...
Article
Full-text available
The use of web services for sensor networking applications is seen as an important part in emerging M2M communi-cations. The Constrained Application Protocol (CoAP) is proposed by the IETF to optimize the use of the RESTful web service architecture in constrained nodes and networks, for example Wireless Sensor Networks. We present an IP based solut...
Article
In wireless multi-hop ad hoc networks, the simultaneous use of multiple routes may degrade the performance of applications due to mutual interference of discovered paths, irrespective of whether paths are physically node disjoint or link disjoint. Therefore, the selection of noninterfering routes is the main criterion to be addressed when using mul...
Article
Multipath routes in wireless multihop ad hoc networks have proven to increase performance compared to single path routing when providing backup paths in case of path failures and also distributing flows (i.e. data traffic) among several paths. The drawback of using multipath simultaneously in wireless multihop ad hoc networks is that the other node...
Patent
Method for implementing a parallel network attachment functionality to at least two mobile access networks; the home subscriber entity (HSS) transfers data to the attachment decision entity (ISADF), the data concerning the authorisation and the control of the parallel network attachment of the user device (UE); and in case that a parallel network a...
Conference Paper
An ad-hoc network is a network whose particular characteristics include absence of any kind of infrastructure, dynamic topology and limited resources. Up to day, several routing protocols have been proposed to face such a hostile environment. These solutions usually provide to the sources of data flows with single valid paths towards their destinat...
Article
An evolving wireless world is constantly providing users with a wider set of access technologies to choose from, each with different capabilities and properties. In this world, IMS as defined by 3GPP provides an enabling, standardized multimedia architecture that is access independent, hence, providing service convergence. This trend is accompanied...
Article
Full-text available
Information and Communication Technology includes many dif-ferent concepts, implementations and usages of Self-Organization (Serugendo et al. 2004; Czap et al. 2005; Brueckner et al. 2005). These are among others: ad hoc routing, autonomic communication, Self-Star and peer-to-peer networks. The constituting features of autonomous control, as alread...
Conference Paper
Full-text available
Ad hoc networks are considered to provide flexible and robust communication in emergency scenarios like fire fighting. However, for the time being, it is not clear how existing digital wireless communication technologies perform in environments with fire, smoke and vapour. To investigate this issue, we carried out several experiments at the trainin...
Conference Paper
Full-text available
An attractive application scenario for wearable computing is the maintenance of airplanes. In this scenario, wearable computers need wireless communication with high data rates to enable mobile workers to communicate with remote assistants or to obtain video manuals from remote servers. This paper describes experiments and results of measurements w...
Article
Link: http://www.sfb637.uni-bremen.de/pubdb/repository/SFB637-B3-05-003-IC.pdf
Article
Full-text available
The Ad hoc On-Demand Distance Vector (AODV) routing protocol is designed for use in mobile ad-hoc networks. As of the writing of this article, there exist several implementations of the AODV protocol for a range of operating systems (e.g., Unix/Linux, Windows), different devices (e.g. Notebook computers, PDAs) each developed using different techniq...
Conference Paper
Internet capable mobile or portable devices are already a modern commodity while it is becoming all the more common that such devices are hosts to more than one wireless interface. The aim of this paper is to show that a mobile user may make best use of this property by using multiple wireless interfaces simultaneously. This would incline that the...
Article
Full-text available
Information is one of the key ingredients in the success of any industry. Having information and sending information at the right time and at the right place makes this success. Wearable computing and wireless communication technologies have brought up an informational environment that can be character- ized as anytime-anywhere, which is able to en...
Conference Paper
Full-text available
There are currently, many bearer technologies available (Wireline, WLAN, GSM, GPRS, UMTS, etc.) that modern communication devices can use to connect to the Internet. Mobile IP enables such devices to use any of these bearer technologies even while roaming between them and without breaking ongoing communications. However, Mobile IP does not provide...
Article
Full-text available
This paper initially, describes the NOMAD test-bed be- ing set up at ComNets for network integration to integrate various bearer technologies (GSM, GPRS, WLAN, Ethernet). It is based on different Mobile IP versions (IPv4 and IPv6) and software for ad-hoc networking using the AODV (Ad-hoc On Demand Vector routing) protocol. The second section descri...
Article
A key area of consideration in self organizing ad hoc networks is the routing mechanisms. The On-Demand mechanism in IP based networks has become popular due to the lower overheads required in managing routes which make it ideal for even smaller, resource restrained mobile computing devices. This publication looks at the implementation aspects of d...
Article
Full-text available
Wearable computing along with advanced mobile communication has the potential to revolutionise the working environment and working processes of the mobile worker of the AEC industry. While wearable computing allows the mobile worker to execute his/her work and tasks more efficiently and safer with the support of information provided by novel user i...

Network

Cited By

Projects

Projects (5)
Project
This is a general-target project, where we explore how applications of machine learning algorithms can improve the robustness and the flexibility of various communication protocols.