Pravin Bhagwat's research while affiliated with University of Maryland, College Park and other places
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publications (49)
An ad-hoc network is the cooperative engagement of a collection of Mobile Hosts without the required intervention of any centralized
Access Point. In this paper we present an innovative design for the operation of such ad-hoc networks. The basic idea of the
design is to operate each Mobile Host as a specialized router, which periodically advertises...
Wireless LAN (WLAN) market consists of IEEE 802.11 MAC standard conformant devices (e.g., access points (APs), client adapters) from multiple vendors. Certain third party certifications such as those specified by the Wi-Fi alliance have been widely used by vendors to ensure basic conformance to the 802.11 standard, thus leading to the expectation t...
Bluetooth, a wireless technology based on a frequency-hopping physical layer, enables portable devices to form short-range wireless ad hoc networks. Bluetooth hosts are not able to communicate unless they have previously discovered each other through synchronization of their timing and frequency-hopping patterns. Thus, even if all nodes are within...
The past decade has seen communication revolution in the form of cellular telephony as well as the Internet, but much of it has been restricted to the developed world and metropolitan pockets in the developing world. While the use of cellular technologies can cut down on the time to deploy access networks, the cost economics make this non-viable in...
The past decade has seen communication revolution in the form of cellular telephony as well as the Internet, but much of it has been restricted to the developed world and metro pockets in the developing world. While the use of cellular technologies can cut down on the time to deploy access networks, the cost economics make this non-viable in growin...
Mobile nodes of the future will be equipped with multiple network interfaces to take advantage of overlay networks, yet no current mobility systems provide full support for the simultaneous use of multiple interfaces. The need for such support arises when multiple connectivity options are available with different cost, coverage, latency and bandwid...
Mobile nodes of the future will be equiped with multiple network
interfaces to take advantage of overlay networks, yet no current
mobility systems provide full support for the simultaneous use of
multiple interfaces. The need for such support arises when multiple
connectivity options are available with different cost, coverage,
latency and bandwidt...
Bluetooth, an innovation in short-range radio technology, has gone
through the first stage of standardization, and commercial products
based on ν1.0 specifications will be appearing. While much work has
gone into developing the radio technology and hardware for this system,
little effort has been focused on additional infrastructure that is
necessa...
Wireless ad hoc networks have been a growing area of research.
While there has been considerable research on the topic of routing in
such networks, the topic of topology creation has not received due
attention. This is because almost all ad hoc networks to date have been
built on top of a single channel, broadcast based wireless media, such
as 802....
Bluetooth, a recent innovation in short-range radio technology, has gone through the first stage of standardization, and commercial products based on v1.0 specifications will be appearing soon. While much work has gone into developing the radio technology and hardware for this system, little effort has been focused on additional infrastructure that...
Palmtop computers are rapidly becoming the popular platform of choice for running personal productivity applications, but their networking capabilities axe still lagging behind user expectations. Due to memory size, cost, and power considerations most palmtop computers support only limited form of point-to-point communication, namely, connection vi...
Proximity awareness in Bluetooth technology is implemented via an asymmetric point to point “sender-receiver” protocol where “senders” are trying to discover “receivers” in the vicinity. This paper tries to shed some light on the link formation delay by first identifying the delay bottlenecks in the asymmetric neighborhood discovery process and the...
An ad-hoc network is the cooperative engagement of a collection of Mobile Hosts without the required intervention of any centralized Access Point. In this paper we present an innovative design for the operation of such ad-hoc networks. The basic idea of the design is to operate each Mobile Host as a specialized router, which periodically advertises...
Palmtop computers which consume very little power, have very small size, and are much cheaper compared to their laptop counterparts are proliferating in the market. However, there exist no satisfactory wireless connectivity solution in terms of cost and power consumption to connect these devices to the network. This paper describes a cost-effective...
The emergence of battery powered handheld devices as popular computing devices is presenting new challenges. Among the most important challenges is the need to provide a low cost, low power, indoor wireless networking access to handheld devices. The constraints posed by battery power and cost require a careful re-evaluation of system design issues...
Paltmtop computers are rapidly becoming the popular platform of choice for running personal productivity applications, but their networking capabilities are still lagging behind user expectations. Due to memory size, cost, and power considerations most palmtop computers support only limited form of point-to-point communication, namely, connection v...
Bluetooth is a promising new technology for short range wireless
connectivity between mobile devices. Initially, Bluetooth will be used
as a replacement for point to-(multi)point cables. However, in due
course of time, solutions for forming multihop ad hoc networks over
Bluetooth (referred to as scatternets) will be needed. In this paper, we
explor...
The emergence of battery powered handheld devices as popular
computing devices is presenting new challenges. Among the most important
challenges is the need to provide a low cost, low power, indoor wireless
networking access to handheld devices. The constraints posed by battery
power and cost require a careful re-evaluation of system design issues...
New short-range wireless communication technologies would enable
environment-aware, mobile, personal area networks. These new
technologies will serve as enablers for ubiquitous, low-cost,
low-complexity, small-sized information appliances. These appliances
will serve as interaction tools between humans and computer-driven
services and applications...
Application layer proxies already play an important role in
todays networks, serving as firewalls and HTTP caches - and their
role is being expanded to include encryption, compression, and
mobility support services. Current application layer proxies suffer
major performance penalties as they spend most of their time moving
data back and forth betwe...
Transcoding proxies are used as intermediaries between generic
World Wide Web servers and a variety of client devices in order to adapt
to the greatly varying bandwidths of different client communication
links and to handle the heterogeneity of possibly small-screened client
devices. Such transcoding proxies can adaptively adjust the amount by
whic...
Application Layer Proxies are an extremely popular method for adding new services to existing network applications. They provide backwards compatibility, centralized administration, and the convenience of the programming environment of whatever operating system they are implemented on top of. Since proxies act as traffic concentrators, serving mult...
this paper, we discuss several emerging standards that relate to wireless LAN systems. These standards include two physical and link layer standards, IEEE 802.11 and ETSI HIPERLAN, as well as a mobile networking standard, Mobile IP, and some developing standards for wireless link management.
Application layer proxies already play an important role in today's networks, serving as firewalls and HTTP caches --- and their role is being expanded to include encryption, compression, and mobility support services. Current application layer proxies suffer major performance penalties as they spend most of their time moving data back and forth be...
A QoS routing protocol based on alternative path selection is described. Using a combination of source routing and shortest path routing, packets are routed along alternate paths when available resources along the shortest path cannot satisfy the QoS requirements of end to end flows. For path selection, the QoS routing protocol makes use of the inf...
Application layer proxies already play an important role in today's networks, serving as firewalls and HTTP caches --- and their role is being expanded to include encryption, compression, and mobility support services. Current application layer proxies suffer major performance penalties as they spend most of their time moving data back and forth be...
Due to advances in wireless communication technology there is a growing demand for providing continuous network access to the users of portable computers, regardless of their location. Existing network protocols cannot meet this requirement since they were designed with the assumption of a static network topology where hosts do not change their loc...
In recent years, a variety of mobile computers equipped with wireless communication devices have become popular. These computers use applications and protocols, originally developed for wired desktop hosts, to communicate over wireless channels. Unlike wired networks, packets transmitted on wireless channels are often subject to burst errors which...
The emerging widespread use of wireless LAN systems together with
the users' desire for such systems to interoperate has created a
requirement for standards. Many standards bodies are currently defining
standards for wireless systems that relate to different layers of the
networking protocol stack. Of these, two influential physical and data
link l...
Each Location Directory (LD) provides the information to locate the forwarding address of a Mobile Host (MH) in a mobile networking system. The LD should be updated when the MH moves from one access zone to another access zone. If an Internet Access Point (IAP) (or base station) could cache some useful LD information entries, then, after receiving...
We explore various network layer concepts that play a crucial role
in the design of mobile networking systems. We show that mobility is
essentially an address translation problem and is best resolved at the
network layer. We describe services that must be supported at the
network layer to carry out the task of address translation. Using these
servi...
Unlike wired networks, packets transmitted on wireless channels are often subject to burst errors which cause back to back packet losses. Most wireless LAN link layer protocols recover from packet losses by retransmitting lost segments. When the wireless channel is in a burst error state, most retransmission attempts fail, thereby causing poor util...
As mobile computers move from one place to another their "physical" points of attachment to network change from time to time. Host movement causes service disruption. Mobile-IP protocols attempts to solve this problem by hiding the effect of change in network service access point from the transport and higher layers. Thus, Mobile-IP ensures that a...
As mobile computers move from one place to another, their
“physical” points of attachment to the network change from
time to time. Host movement causes service disruption. The Mobile-IP
protocol attempts to solve this problem by hiding the effect of change
in network service access points from the transport and higher layers.
Thus, Mobile-IP ensure...
As mobile computers move from one place to another their "physical" points of attachment to network change from time to time. Host movement causes service disruption. Mobile-IP protocols attempts to solve this problem by hiding the effect of change in network service access point from the transport and higher layers. Thus, Mobile-IP ensures that a...
The recent advances in wireless communication technology, coupled with the progress in hardware miniaturization, are taking us into a new era of computing, popularly known as nomadic computing. Battery powered, untethered computers are likely to become a pervasive part of our computing infrastructure [9]. There are, however, many technical challeng...
The authors examine the performance implications of providing
reliability in conjunction with multicast transport over a high speed
wide area network. They use a block based acknowledgement and selective
retransmission protocol to evaluate the impact of the loss rate and the
multicast tree topology on the achievable throughput. Their results show
t...
Users of portable computers would like to carry their laptops with them whenever they move from one place to another and yet maintain transparent network access through the wireless link. The existing set of network protocols do not meet this requirement since they were designed under the assumption of a stationary network topology in which hosts d...
A method for achieving declustering for Cartesian product files on
M units is proposed. The focus is on range queries, as opposed
to partial match queries that older declustering methods have examined.
The method uses a distance-preserving mapping, the Hilbert curve, to
impose a linear ordering on the multidimensional points (buckets); then,
it tra...
Due to advances in wireless communication technology there is a growing demand for providing continuous network access to the users of portable computers, regardless of their location. Existing network protocols cannot meet this requirement since they were designed with the assumption of a static network topology where hosts do not change their loc...
Thesis (Ph. D.)--University of Maryland at College Park, 1995. Thesis research directed by Dept. of Computer Science. Includes bibliographical references (leaves 143-149).
Citations
... Several methods have been proposed for declustering data including Disk Modulo [9], Field-wise Exclusive OR [22], Hilbert [10], Near Optimal Allocation [20], cyclic allocation schemes [27], [28], Golden Ratio Sequences [6], Hierarchical [5], and Discrepancy Declustering [8]. Using declustering and replication, approaches including Complete Coloring [15] has optimal performance and Square Root Colors Disk Modulo [15] has one more than optimal. ...
Reference: Equivalent Disk Allocations
... Our proposed protocol uses the OffSM and favors nodes with close offline social relationship as next forwarder nodes. Offline social CLWPR performance was evaluated against other routing protocols, including OLSR, 53 DSDV, 54 AODV, 55 and CLWPR, 5 and initial results acquired demonstrate improved performance in terms of packet delivery ratio and end to end delay. ...
... Thus, a key issue for general MANETs is how to update routing tables to reflect the dynamic change of the network topology. There are many previous works concerned with this issue; e.g., 1) reactive routing protocols such as AODV [18], DSR [4], and ABR [22]; 2) proactive routing protocols such as DSDV [19], OLSR, and Babel; and 3) their hybrid [3] (the details of AODV will be explained later). ...
... Until now, many research works have been published, but we only consider two most relevant works. A Routing Vector Method (RVM) [10] is a standard routing protocol which depends on network structure. The main drawback of RVM is that it utilizes maximum number of relays. ...
... O estudo de (Salonidis, Bhagwat, Tassiulas and Lamaire 2001) introduz o protocolo de construção de topologia Bluetooth (BTCP) para formação de Scatternets. Os autores definem regras necessárias para a eleição de um líder e a técnica de alternar o estado de um nó entre encontrar e ser encontrado para formação de rede. ...
... Hence, there is a trade-off between the appearance of a web site and the speed of that site [Iwaarden and Wiele 2003]. Han et al. discussed that extensive download time of mobile web pages makes the viewing of Web Pages very cumbersome [Han 1998]. Parasuraman et al. defined assurance as the knowledge and courtesy of employers and their ability to inspire trust and confidence [Parasuraman et al. 1985]. ...
... Existen grupos de investigadores como el Digital Gangetic Plains (DGP) [7] en India, o el Technology and Infraestructure for Emerging Regions (TIER) [8] en Estados Unidos, que han demostrado que se pueden realizar enlaces punto a punto (PtP) en varios kilómetros de distancia, usando tecnología WiFi, obteniendo prestaciones razonables. Ambas aproximaciones se basan en reemplazar el protocolo de censado CSMA/CA de la subcapa MAC por TDMA. ...
... The addresses stored in the route tables correspond to the layer at which the DSDV protocol is operated. Operation at layer 3 uses network layer addresses for the next hop and destination addresses, and operation at layer 2 uses layer 2 MAC addresses [15] [16]. ...
... The performance of reliable multicast protocols has been studied both analytically and through network simulations. For example, [141] develops an analytical model and carries simulations to study the performance of a generic reliable block-based multicast protocol using stop-and-wait, positive acknowledgements, and selective retransmissions. This model quantifies the number of transmission attempts until full reception, assuming independent losses in different links. ...
... Maltz et al. [217] implement Transport Layer Mobility (TLM) by utilizing TCP Splice technology. They find that multiple network interfaces can be simultaneously used by a node to get benefits from overlay networks. ...