Faculty Publications
Permanent URI for this communityhttps://idr.nitk.ac.in/handle/123456789/18736
Publications by NITK Faculty
Browse
11 results
Search Results
Item A tree structure for Web service compositions(2009) D’Mello, D.A.; Ananthanarayana, V.S.The composition of Web services is gaining a considerable momentum as an approach to the effective integration of distributed, heterogeneous and autonomous applications to build more sophisticated and value added services. Algorithms are needed to select the best services for the individual tasks of the composition. QoS is an important criterion to select the best service for the tasks of composition. The objective of selection algorithm is to maximize the QoS of the composition based on the composite service provider's (CSP) QoS requirements. In this paper, we define the various business offers (service offers) of Web services. We classify the CSP's requirements defined on the QoS and service offers based on its structure. We propose a tree structure to represent the CSP's requirements defined on the multiple QoS properties and service offers involving AND and OR operators with varied preferences. © 2009 ACM.Item Parallelized K-Means clustering algorithm for self aware mobile Ad-hoc networks(2011) Thomas, L.; Manjappa, K.; Annappa, B.; Guddeti, G.R.M.Providing Quality of Service (QoS) in Mobile Ad-hoc Network (MANET) in terms of bandwidth, delay, jitter, throughput etc., is critical and challenging issue because of node mobility and the shared medium. The work in this paper predicts the best effective cluster while taking QoS parameters into account. The proposed work uses K-Means clustering algorithm for automatically discovering clusters from large data repositories. Further, iterative K-Means clustering algorithm is parallelized using Map-Reduce technique in order to improve the computational efficiency and thereby predicting the best effective cluster. Hence, parallel K-Means algorithm is explored for finding the best effective cluster containing the hops which lies in the best cluster with the best throughput in self aware MANET. Copyright © 2011 ACM.Item Application of parallel K-means clustering algorithm for prediction of optimal path in self aware mobile ad-hoc networks with link stability(2011) Thomas, L.; Annappa, B.Providing Quality of Service (QoS) in terms of bandwidth, delay, jitter, throughput etc., for Mobile Ad-hoc Network (MANET) which is the autonomous collection of nodes, is challenging issue because of node mobility and the shared medium. This work is to predict the Optimal link based on the link stability which is the number of contacts between 2 pair of nodes that can be effectively applied for prediction of optimal effective path while taking QoS parameters into account to reach the destination using the application of K-Means clustering algorithm for automatically discovering clusters from large data repositories which is parallelized using Map-Reduce technique in order to improve the computational efficiency and thereby predicting the optimal effective path from source to sink. The work optimizes the previous result by pre-assigning task for finding the best stable link in MANET and then work is explored only on that stable link hence, by doing so we are able to predict the optimal path in more time efficient way. © 2011 Springer-Verlag.Item Cross layer service driven adaptive retry limit for IEEE 802.11 mobile ad-hoc networks(2011) Manjappa, M.; Guddeti, G.Traffic in future Mobile Ad-Hoc Network (MANET) is expected to carry a mix of real time multimedia, and non real time file transfer etc. Providing Quality of Service (QoS) for these different applications is difficult and the current research on MANET is choosing the Cross Layer Design for providing QoS. The packet loss due to collision is misinterpreted by MANET as route failure and this triggers route maintenance phase causing unnecessary overhead resulting in low throughput. In this paper, we propose a service driven cross layer model in order to increase the throughput by dynamically adjusting the limits of Request to Send (RTS) retransmission for different flows in the network according to the priority. Simulation is done in NS-2 and the proposed method is compared with IEEE 802.11 DCF MAC using two ad-hoc routing protocols namely AODV and DSR. The results show that the prioritized flow achieves higher throughput over un-prioritized flow when compared to IEEE 802.11 MAC. © 2011 IEEE.Item Throughput enhancement of the prioritized flow in self aware MANET based on neighborhood node distances(2011) Manjappa, M.; Guddeti, G.Mobility causes frequent link failures in ad hoc network resulting in packet losses. Another cause of packet loss is collision which MANET misinterprets as link failure and triggers route maintenance phase. Triggering of this unnecessary route maintenance phase adds extra overhead to the network resulting in low throughput. In this paper a Quality of Service (QoS) aware cross layer model PrioritizedQoS (PrQoS) is proposed to improve the throughput of the prioritized flow in Self Aware MANET. According to the distance of the receiving node from the transmitting node, which is found using Received Signal Strength, packets are treated differently in lower layers by dynamically adjusting the Request To Send (RTS) retry limit based on the priority of the flow. The simulation is done in ns-2 and the PrQoS is compared with the traditional methods i.e. default behavior of the protocols. The results show that the prioritized flow achieves higher throughput than the unprioritized flow when compared to traditional method. Further the PrQoS also avoids unnecessary route re-discovery attempts by finding the root cause of the packet drop based on the distance between the nodes thereby reducing the network load. © 2011 IEEE.Item AMul: Adaptive multicast routing protocol for multi-hop wireless networks(2011) Panwala, V.; Hegde, S.; Tahiliani, M.P.Wireless Networks have evolved as promising technology for numerous applications to provide Internet access to fixed and mobile wireless devices. Multicasting plays a crucial role in many applications of Wireless Networks. Several routing protocols have been proposed for multicast communication in mobile wireless networks. In this paper we propose a reactive and receiver initiated multicast routing protocol called Adaptive Multicast (AMul) to provide better Quality of Service (QoS) in Wireless Networks. Using simulations, we compare AMul with Protocol for Unified Multicasting through Announcements (PUMA) which is also a reactive and receiver initiated multicast routing protocol for Multi- Hop Wireless Networks. Based on the simulation results, we observe that AMul reduces the overall end to end delay while inducing negligible control overhead in the network. © Springer-Verlag 2011.Item Cognitive network layer in MANETs mobility aware routing protocol(2012) Zakeerhusen, A.G.; Manjappa, M.; Guddeti, G.It is intended to add cognition to make cognitive network layer in order to design and develop Quality of Service (QoS) aware adaptive routing protocol in Mobile Adhoc Networks (MANETs). QoS-aware routing is challenging as nodes in the network are free to move, the topology will be changing dynamically. Performance of AODV will be less when nodes in the network are highly mobile. In this paper, Mobility Aware Routing Protocol (MARP) model is proposed to extract a core part in MANET that is stable in terms of mobility of the nodes. This core part is a subset of MANET mobile nodes through which transmission will be done. Here selection of paths through this extracted core can ensure more QoS in time. The MARP model not only provides a better way to discover a QoS but it considers an efficient route maintenance scheme by selecting the route which has more stability as source is having knowledge about other available paths. Since MARP is multipath routing protocol, route maintenance is easy and it robust. By simulation MARP show better performance over existing AODV-on demand routing protocol. © 2012 Springer-Verlag.Item Comparative analysis of queue mechanisms with respect to various traffic in wired-cum-wireless network(Institute of Electrical and Electronics Engineers Inc., 2014) Dhadse, J.S.; Chandavarkar, B.R.Current Active Queue Management (AQM) and TCP are designed to work well for wired networks where packet loss is mainly due to network congestion. In wired cum wireless networks, however, wireless bandwidth is much smaller than the wired network and at base station packet loss occurs due to bottleneck wireless link. As a result, the performance of TCP flows is significantly degraded. To overcome this problem, Base Station (BS) is the key point for performance enhancement in wired-cum-wireless network. There is need of AQM at base station which stabilize the system and achieve low delay, low packet loss, and high link utilization regardless the dynamic of network conditions. To study the behavior of Queue at base station, we carry out simulation of wired-cum-wireless network with respect to various traffics (Background, streaming, conversational) in ns-2. © 2014 IEEE.Item Cloud workflow and security: A survey(Institute of Electrical and Electronics Engineers Inc., 2014) Anupa, J.; Chandra Sekaran, K.C.The cloud revolution has helped enterprises to improve their business and performance by providing them computing power, storage capabilities and a variety of services for very less or no infrastructure and reasonable cost. It also provisioned the scientific and academic communities to run complex applications involving large data sets, high performance or distributed resources. The Workflow Management Systems (WfMSs) help the enterprises in automation of their business processes and thus help the management to take critical decisions fast. Cloud Workflows club the advantages of both Cloud Computing and WfMSs. In spite of the advantages of the cloud, security is a major area of concern. The use of WfMSs for critical and strategic applications, which is common in case of Business and Scientific community, gives rise to major concerns regarding the threats against integrity, authorization, availability etc. The concept of running secure workflow instances on public cloud processing platforms is still in its infancy. This paper gives an overview of workflow management systems, cloud computing, cloud workflows and security in these areas. This paper also provides a survey on security mechanisms for WfMSs and Cloud Workflows. © 2014 IEEE.Item Negotiation and monitoring of service level agreements in cloud computing services(Springer Verlag service@springer.de, 2017) Anithakumari, S.; Chandrasekaran, K.SLAs are so significant in cloud computing because it establishes agreements between the cloud service providers and cloud consumers, about the quality of the providing service. SLA monitoring is the only available provision to check whether the agreed parties are following the agreement terms or not. A multistep SLA negotiation, which contains the selection of apt cloud service provider and the negotiation with the selected provider, is proposed here. An efficient SLA negotiation algorithm is also included in this negotiation method. Experimental evaluation shows that the proposed method is more efficient in resource allocation and it gives more revenue to the cloud providers. © Springer Science+Business Media Singapore 2017.
