Pravin Bhagwat's research while affiliated with University of Maryland, College Park and other places

Publications (49)

Chapter
An ad-hoc network is the cooperative engagement of a collection of Mobile Hosts without the required intervention of any centralized Access Point. In this paper we present an innovative design for the operation of such ad-hoc networks. The basic idea of the design is to operate each Mobile Host as a specialized router, which periodically advertises...
Conference Paper
Wireless LAN (WLAN) market consists of IEEE 802.11 MAC standard conformant devices (e.g., access points (APs), client adapters) from multiple vendors. Certain third party certifications such as those specified by the Wi-Fi alliance have been widely used by vendors to ensure basic conformance to the 802.11 standard, thus leading to the expectation t...
Article
Bluetooth, a wireless technology based on a frequency-hopping physical layer, enables portable devices to form short-range wireless ad hoc networks. Bluetooth hosts are not able to communicate unless they have previously discovered each other through synchronization of their timing and frequency-hopping patterns. Thus, even if all nodes are within...
Article
The past decade has seen communication revolution in the form of cellular telephony as well as the Internet, but much of it has been restricted to the developed world and metropolitan pockets in the developing world. While the use of cellular technologies can cut down on the time to deploy access networks, the cost economics make this non-viable in...
Article
The past decade has seen communication revolution in the form of cellular telephony as well as the Internet, but much of it has been restricted to the developed world and metro pockets in the developing world. While the use of cellular technologies can cut down on the time to deploy access networks, the cost economics make this non-viable in growin...
Article
Mobile nodes of the future will be equipped with multiple network interfaces to take advantage of overlay networks, yet no current mobility systems provide full support for the simultaneous use of multiple interfaces. The need for such support arises when multiple connectivity options are available with different cost, coverage, latency and bandwid...
Conference Paper
Mobile nodes of the future will be equiped with multiple network interfaces to take advantage of overlay networks, yet no current mobility systems provide full support for the simultaneous use of multiple interfaces. The need for such support arises when multiple connectivity options are available with different cost, coverage, latency and bandwidt...
Conference Paper
Bluetooth, an innovation in short-range radio technology, has gone through the first stage of standardization, and commercial products based on ν1.0 specifications will be appearing. While much work has gone into developing the radio technology and hardware for this system, little effort has been focused on additional infrastructure that is necessa...
Conference Paper
Wireless ad hoc networks have been a growing area of research. While there has been considerable research on the topic of routing in such networks, the topic of topology creation has not received due attention. This is because almost all ad hoc networks to date have been built on top of a single channel, broadcast based wireless media, such as 802....
Article
Full-text available
Bluetooth, a recent innovation in short-range radio technology, has gone through the first stage of standardization, and commercial products based on v1.0 specifications will be appearing soon. While much work has gone into developing the radio technology and hardware for this system, little effort has been focused on additional infrastructure that...
Article
Palmtop computers are rapidly becoming the popular platform of choice for running personal productivity applications, but their networking capabilities axe still lagging behind user expectations. Due to memory size, cost, and power considerations most palmtop computers support only limited form of point-to-point communication, namely, connection vi...
Conference Paper
Proximity awareness in Bluetooth technology is implemented via an asymmetric point to point “sender-receiver” protocol where “senders” are trying to discover “receivers” in the vicinity. This paper tries to shed some light on the link formation delay by first identifying the delay bottlenecks in the asymmetric neighborhood discovery process and the...
Article
Full-text available
An ad-hoc network is the cooperative engagement of a collection of Mobile Hosts without the required intervention of any centralized Access Point. In this paper we present an innovative design for the operation of such ad-hoc networks. The basic idea of the design is to operate each Mobile Host as a specialized router, which periodically advertises...
Article
Palmtop computers which consume very little power, have very small size, and are much cheaper compared to their laptop counterparts are proliferating in the market. However, there exist no satisfactory wireless connectivity solution in terms of cost and power consumption to connect these devices to the network. This paper describes a cost-effective...
Article
The emergence of battery powered handheld devices as popular computing devices is presenting new challenges. Among the most important challenges is the need to provide a low cost, low power, indoor wireless networking access to handheld devices. The constraints posed by battery power and cost require a careful re-evaluation of system design issues...
Article
Paltmtop computers are rapidly becoming the popular platform of choice for running personal productivity applications, but their networking capabilities are still lagging behind user expectations. Due to memory size, cost, and power considerations most palmtop computers support only limited form of point-to-point communication, namely, connection v...
Conference Paper
Full-text available
Bluetooth is a promising new technology for short range wireless connectivity between mobile devices. Initially, Bluetooth will be used as a replacement for point to-(multi)point cables. However, in due course of time, solutions for forming multihop ad hoc networks over Bluetooth (referred to as scatternets) will be needed. In this paper, we explor...
Conference Paper
The emergence of battery powered handheld devices as popular computing devices is presenting new challenges. Among the most important challenges is the need to provide a low cost, low power, indoor wireless networking access to handheld devices. The constraints posed by battery power and cost require a careful re-evaluation of system design issues...
Article
New short-range wireless communication technologies would enable environment-aware, mobile, personal area networks. These new technologies will serve as enablers for ubiquitous, low-cost, low-complexity, small-sized information appliances. These appliances will serve as interaction tools between humans and computer-driven services and applications...
Article
Application layer proxies already play an important role in todays networks, serving as firewalls and HTTP caches - and their role is being expanded to include encryption, compression, and mobility support services. Current application layer proxies suffer major performance penalties as they spend most of their time moving data back and forth betwe...
Article
Full-text available
Transcoding proxies are used as intermediaries between generic World Wide Web servers and a variety of client devices in order to adapt to the greatly varying bandwidths of different client communication links and to handle the heterogeneity of possibly small-screened client devices. Such transcoding proxies can adaptively adjust the amount by whic...
Article
Full-text available
Application Layer Proxies are an extremely popular method for adding new services to existing network applications. They provide backwards compatibility, centralized administration, and the convenience of the programming environment of whatever operating system they are implemented on top of. Since proxies act as traffic concentrators, serving mult...
Article
this paper, we discuss several emerging standards that relate to wireless LAN systems. These standards include two physical and link layer standards, IEEE 802.11 and ETSI HIPERLAN, as well as a mobile networking standard, Mobile IP, and some developing standards for wireless link management.
Article
Application layer proxies already play an important role in today's networks, serving as firewalls and HTTP caches --- and their role is being expanded to include encryption, compression, and mobility support services. Current application layer proxies suffer major performance penalties as they spend most of their time moving data back and forth be...
Article
Full-text available
A QoS routing protocol based on alternative path selection is described. Using a combination of source routing and shortest path routing, packets are routed along alternate paths when available resources along the shortest path cannot satisfy the QoS requirements of end to end flows. For path selection, the QoS routing protocol makes use of the inf...
Article
Full-text available
Application layer proxies already play an important role in today's networks, serving as firewalls and HTTP caches --- and their role is being expanded to include encryption, compression, and mobility support services. Current application layer proxies suffer major performance penalties as they spend most of their time moving data back and forth be...
Article
Full-text available
Due to advances in wireless communication technology there is a growing demand for providing continuous network access to the users of portable computers, regardless of their location. Existing network protocols cannot meet this requirement since they were designed with the assumption of a static network topology where hosts do not change their loc...
Article
Full-text available
In recent years, a variety of mobile computers equipped with wireless communication devices have become popular. These computers use applications and protocols, originally developed for wired desktop hosts, to communicate over wireless channels. Unlike wired networks, packets transmitted on wireless channels are often subject to burst errors which...
Article
The emerging widespread use of wireless LAN systems together with the users' desire for such systems to interoperate has created a requirement for standards. Many standards bodies are currently defining standards for wireless systems that relate to different layers of the networking protocol stack. Of these, two influential physical and data link l...
Article
Full-text available
Each Location Directory (LD) provides the information to locate the forwarding address of a Mobile Host (MH) in a mobile networking system. The LD should be updated when the MH moves from one access zone to another access zone. If an Internet Access Point (IAP) (or base station) could cache some useful LD information entries, then, after receiving...
Article
Full-text available
We explore various network layer concepts that play a crucial role in the design of mobile networking systems. We show that mobility is essentially an address translation problem and is best resolved at the network layer. We describe services that must be supported at the network layer to carry out the task of address translation. Using these servi...
Article
Unlike wired networks, packets transmitted on wireless channels are often subject to burst errors which cause back to back packet losses. Most wireless LAN link layer protocols recover from packet losses by retransmitting lost segments. When the wireless channel is in a burst error state, most retransmission attempts fail, thereby causing poor util...
Article
As mobile computers move from one place to another their "physical" points of attachment to network change from time to time. Host movement causes service disruption. Mobile-IP protocols attempts to solve this problem by hiding the effect of change in network service access point from the transport and higher layers. Thus, Mobile-IP ensures that a...
Conference Paper
As mobile computers move from one place to another, their “physical” points of attachment to the network change from time to time. Host movement causes service disruption. The Mobile-IP protocol attempts to solve this problem by hiding the effect of change in network service access points from the transport and higher layers. Thus, Mobile-IP ensure...
Conference Paper
As mobile computers move from one place to another their "physical" points of attachment to network change from time to time. Host movement causes service disruption. Mobile-IP protocols attempts to solve this problem by hiding the effect of change in network service access point from the transport and higher layers. Thus, Mobile-IP ensures that a...
Chapter
The recent advances in wireless communication technology, coupled with the progress in hardware miniaturization, are taking us into a new era of computing, popularly known as nomadic computing. Battery powered, untethered computers are likely to become a pervasive part of our computing infrastructure [9]. There are, however, many technical challeng...
Conference Paper
Full-text available
The authors examine the performance implications of providing reliability in conjunction with multicast transport over a high speed wide area network. They use a block based acknowledgement and selective retransmission protocol to evaluate the impact of the loss rate and the multicast tree topology on the achievable throughput. Their results show t...
Article
Full-text available
Users of portable computers would like to carry their laptops with them whenever they move from one place to another and yet maintain transparent network access through the wireless link. The existing set of network protocols do not meet this requirement since they were designed under the assumption of a stationary network topology in which hosts d...
Conference Paper
A method for achieving declustering for Cartesian product files on M units is proposed. The focus is on range queries, as opposed to partial match queries that older declustering methods have examined. The method uses a distance-preserving mapping, the Hilbert curve, to impose a linear ordering on the multidimensional points (buckets); then, it tra...
Article
Full-text available
Due to advances in wireless communication technology there is a growing demand for providing continuous network access to the users of portable computers, regardless of their location. Existing network protocols cannot meet this requirement since they were designed with the assumption of a static network topology where hosts do not change their loc...
Article
Thesis (Ph. D.)--University of Maryland at College Park, 1995. Thesis research directed by Dept. of Computer Science. Includes bibliographical references (leaves 143-149).

Citations

... Several methods have been proposed for declustering data including Disk Modulo [9], Field-wise Exclusive OR [22], Hilbert [10], Near Optimal Allocation [20], cyclic allocation schemes [27], [28], Golden Ratio Sequences [6], Hierarchical [5], and Discrepancy Declustering [8]. Using declustering and replication, approaches including Complete Coloring [15] has optimal performance and Square Root Colors Disk Modulo [15] has one more than optimal. ...
... Our proposed protocol uses the OffSM and favors nodes with close offline social relationship as next forwarder nodes. Offline social CLWPR performance was evaluated against other routing protocols, including OLSR, 53 DSDV, 54 AODV, 55 and CLWPR, 5 and initial results acquired demonstrate improved performance in terms of packet delivery ratio and end to end delay. ...
... Thus, a key issue for general MANETs is how to update routing tables to reflect the dynamic change of the network topology. There are many previous works concerned with this issue; e.g., 1) reactive routing protocols such as AODV [18], DSR [4], and ABR [22]; 2) proactive routing protocols such as DSDV [19], OLSR, and Babel; and 3) their hybrid [3] (the details of AODV will be explained later). ...
... Until now, many research works have been published, but we only consider two most relevant works. A Routing Vector Method (RVM) [10] is a standard routing protocol which depends on network structure. The main drawback of RVM is that it utilizes maximum number of relays. ...
... O estudo de (Salonidis, Bhagwat, Tassiulas and Lamaire 2001) introduz o protocolo de construção de topologia Bluetooth (BTCP) para formação de Scatternets. Os autores definem regras necessárias para a eleição de um líder e a técnica de alternar o estado de um nó entre encontrar e ser encontrado para formação de rede. ...
... Hence, there is a trade-off between the appearance of a web site and the speed of that site [Iwaarden and Wiele 2003]. Han et al. discussed that extensive download time of mobile web pages makes the viewing of Web Pages very cumbersome [Han 1998]. Parasuraman et al. defined assurance as the knowledge and courtesy of employers and their ability to inspire trust and confidence [Parasuraman et al. 1985]. ...
... Existen grupos de investigadores como el Digital Gangetic Plains (DGP) [7] en India, o el Technology and Infraestructure for Emerging Regions (TIER) [8] en Estados Unidos, que han demostrado que se pueden realizar enlaces punto a punto (PtP) en varios kilómetros de distancia, usando tecnología WiFi, obteniendo prestaciones razonables. Ambas aproximaciones se basan en reemplazar el protocolo de censado CSMA/CA de la subcapa MAC por TDMA. ...
... The addresses stored in the route tables correspond to the layer at which the DSDV protocol is operated. Operation at layer 3 uses network layer addresses for the next hop and destination addresses, and operation at layer 2 uses layer 2 MAC addresses [15] [16]. ...
... The performance of reliable multicast protocols has been studied both analytically and through network simulations. For example, [141] develops an analytical model and carries simulations to study the performance of a generic reliable block-based multicast protocol using stop-and-wait, positive acknowledgements, and selective retransmissions. This model quantifies the number of transmission attempts until full reception, assuming independent losses in different links. ...
... Maltz et al. [217] implement Transport Layer Mobility (TLM) by utilizing TCP Splice technology. They find that multiple network interfaces can be simultaneously used by a node to get benefits from overlay networks. ...