scispace - formally typeset
Search or ask a question
Author

Chandrashekhar Goswami

Bio: Chandrashekhar Goswami is an academic researcher from K L University. The author has contributed to research in topics: Wireless network & Transmission Control Protocol. The author has an hindex of 1, co-authored 2 publications receiving 2 citations.

Papers
More filters
Proceedings ArticleDOI
01 Nov 2017
TL;DR: The paper presents a comprehensive survey of various approaches pertaining to the improvement in TCP performance in wireless networks and summarizes the various proposed methodologies and also presents the advantages and disadvantages of those approaches.
Abstract: With the advancement of technology, handheld devices like smart phones, ipods, PDAs, etc. have become very popular now-a-days. The real flavors of these emerging smart technologies are perceived when they are interconnected by means of wireless networks. In real-life scenario, the networks are highly heterogeneous in nature and the most popular, traditional and reliable protocol for communicating among these networks is the Transmission Control Protocol (TCP). TCP is a transport layer protocol of the internet protocol suite which provides services for host-to-host connectivity in a connection-oriented manner. In a wired network, the TCP is well tuned to give a good performance for communication. The primary reason of packet losses in case of wired networks is the congestion in the network. However, the scenario is different in case of wireless communication. Here, the TCP performance issues crop up mainly due to errors in transmission and handoffs. The paper presents a comprehensive survey of various approaches pertaining to the improvement in TCP performance in wireless networks. It summarizes the various proposed methodologies and also presents the advantages and disadvantages of those approaches.

7 citations

Proceedings ArticleDOI
14 Dec 2022
TL;DR: In this article , the authors outline the foundations of social Internet of Things (SIoT) and the ideas of trust in SIoT while highlighting the parallels and discrepancies between IoT and social internet of things.
Abstract: IoT (Internet of Things) is a constantly expanding network made up of billions of connected physical things, including many sensors, embedded devices, smartphones, and wearables. These actual things are typically referred to as “smart objects”. A development of the Internet of Things, the Social Internet of Things (SIoT) combines ideas of social networking to create social networks of linked smart items. They sift through the SIoT looking for services and relevant information. In the early stages of research, the concept of trust and trustworthy in social communities created by SIoT is still relatively new. We outline the foundations of SIoT and the ideas of trust in SIoT while highlighting the parallels and discrepancies between IoT and SIoT. In order to determine an aggregate trust score, all of the trust features are aggregated using a machine learning-based algorithm. Results show that the suggested trust-based model effectively separates the network’s trustworthy and untrustworthy nodes.

1 citations

Book ChapterDOI
07 Aug 2018
TL;DR: By exchanging the data among different layers in cross layer design, the performance of wireless networks is improved and cross-layer approaches between network layer and transport layer to improve TCP’s performance are focused on.
Abstract: Transmission control protocol (TCP) performing better in a wired network, but not in wireless ad hoc network. Wireless ad hoc network has special characteristics like as node can move freely and a shared channel. Due to those characteristic, TCP facing some problems in wireless ad-hoc networks like as link failure, channel contention and high BER. The performance of TCP depredates due to these above-mentioned factors. The research community has been suggested some approaches to improve the performance of TCP in wireless ad hoc network. By exchanging the data among different layers in cross layer design, the performance of wireless networks is improved. This paper focuses on cross-layer approaches between network layer and transport layer to improve TCP’s performance.

1 citations

Proceedings ArticleDOI
21 Sep 2022
TL;DR: In this paper , the authors proposed an algorithm with an effective prediction to achieve a plan to reduce the carbon emission produced from the commercial building and achieve optimal energy consumption without reducing the customer's comfort and avoiding food wastage.
Abstract: Due to the overutilization of commercial buildings, climatic changes have occurred, which has caused a major impact on the environment Global warming is the main issue faced by society due to ozone weakening. Many researchers conclude that commercial buildings in society are a major part of consuming energy and generating carbon equally in the environment Most of the living areas are filled with commercial buildings where the peoples have to get their needs. This commercial building consists of an HVAC and Refrigeration system which is the major reason for the energy consumption in the commercial building. These systems are utilized in commercial buildings for customer satisfaction, comfortable shopping, and avoiding food wastage. But the main motive of this is to reduce the carbon emission produced from the commercial building and achieve optimal energy consumption without reducing the customer's comfort and avoiding food wastage. This article is categorized into two articles to construct an algorithm with an effective prediction to achieve a plan. This article concentrates on the requirements of a Zero Carbon (Z.C.) building. So that the data of energy consumption required for the commercial building are to be analyzed. For such analysis, the first part of this article is done with an Internet Of thigh (IoT) technology to collect the dataset of sensors in the building. This IoT Edge system is interconnected with all the devices of sensors used in HVAC and Refrigeration systems with the support of microcontrollers. The devices like sensors, consumers, actuators with user interfaces, and other technical gadgets are controlled and communicated by the Building Management System (BMS). This IoT Edge system collects and transfers the data into the IoT hub. IoT hub maintains the two-way communication among the cloud and Edge system utilized to secure the sensor data. This system supports the huge dataset storage used to predict and analyze the exact reason for energy consumption. This sensor data collection helps to evaluate the energy requirements according to a day/week or month in the commercial building's usages. In the second part of the article, the predictions are made with the new hybridization of the Firefly Optimization Algorithm (FOA) and the Deep Learning algorithm of Long Short-Term Memory Network (LSTM), respectively. The new proposed algorithm is Firefly optimized Long Short-Term Memory Network (FOLSTM), which is used to obtain an optimal solution. This proposed algorithm is compared with several traditional methods, which shows that FOLSTM is the better algorithm for accurate prediction.

Cited by
More filters
Journal ArticleDOI
TL;DR: It is shown that optimal TCP congestion control can be achieved by developing window-control oriented implicit primal-dual solvers for intended network utility maximization problem, and it is proved the existence of scalable, easy- to-deploy, yet optimal end-to-end congestion control schemes for networks with wireless links.
Abstract: This paper addresses the re-engineering of congestion control for TCP applications over networks with coupled wireless links. Using queueing delay as a congestion measure, we show that optimal TCP congestion control can be achieved by developing window-control oriented implicit primal-dual solvers for intended network utility maximization problem. Capitalizing on such an idea, we prove the existence of scalable, easy-to-deploy, yet optimal end-to-end congestion control schemes for networks with wireless links, given that the wireless access point appropriately schedules packet transmissions. A class of so-called QUIC-TCP congestion control algorithms are developed. Relying on a Lyapunov method, we rigorously establish the global convergence/stability of the proposed QUIC-TCP to optimal equilibrium in the network fluid model. Numerical results corroborate the merits of the proposed schemes in IPv6-based Internet environments.

6 citations

Journal ArticleDOI
01 Jun 2023-2
TL;DR: In this paper , the applicability of basalt as a reinforcing agent in polymer composites has been discussed and a comparison of the convex stability with the above cast iron and polymer impregnated mechanical properties has been made.
Abstract: Accordingly, many engineering designers have improved the wear friction performance of such materials. Also, the use of polymers as reinforcements in their endeavors has been done to improve intrinsic performance. Intrinsic properties played an important role in intrinsic polymer orientations, improving the cohesion of some reinforcement while at the same time worsening those Effects Woven glass, carbon and amethyst polymeric composites Inter-laminar shear strength and abrasion composites samples. Wear properties are calculated using machine and testing machine in computer aided universal testing. Fracture of composites showed surface modifications for Group bonding. The mechanical properties of basalt are better than glass reinforced composites the result of the study confirms the applicability of basalt as a reinforcing agent in polymer composites. Hybrid Mechanical Processes Ultrasonic assisted laser/water jet machining processes are used to solve machining problems related to insulating ceramics such as ultrasonic assisted discharge machining, discharge milling, electro-chemical discharge machining and powder hybrid discharge machining and discharge diamond grinding. Processes can create complex patterns in spark discharges. An attempt has been made here to compare the convex stability with the above cast iron and polymer impregnated mechanical properties.
Journal ArticleDOI
TL;DR: In this article , the authors used Open CV Library to show the gap between the article and camera for the Eudaimonia checking of the IOT climate, they have got adscititious two modules to the reconnaissance mission camera.
Abstract: AbstractWith the distended utilization of reconnaissance mission cameras, a library is proffered during this paper that is employed to try to image preparing victimization-programming tongues like python. This task uses Open CV Library to show the gap between the article and camera for the Eudaimonia checking of the IOT climate. We have got adscititious 2 modules to the reconnaissance mission camera. First, to understand the articles that area unit falling or unit victimization object space detector once the factor recognized then the client will get the caution message for that we have a tendency to area unit victimization GSM module. Second, there are a unit various prospects to urge upgrade of observation camera thanks to deluge or water; for the popularity of water, we have a tendency to area unit utilizing precipitation board module and management module that includes LM393 comparator on the off likelihood that the appliance knows the precipitation; at that time, it sends the message to the shopper. Results gain through screen catches of the examinations show the suitableness of the planned plot.KeywordsSurveillance cameraSmart homeRaspberry piSecurity
Journal ArticleDOI
TL;DR: In this article , the authors comprehensively examine the performance anomaly in multi-rate wireless networks using three approaches: experimental measurement, analytical modelling and simulation in Network Simulator v.3 (NS3).
Abstract: IEEE 802.11 wireless local area networks (WLANs) are shared networks, which use contention-based distributed coordination function (DCF) to share access to wireless medium among numerous wireless stations. The performance of the distributed coordination function mechanism mostly depends on the network load, number of wireless nodes and their data rates. The throughput unfairness, also known as performance anomaly is inherent in the very nature of mixed data rate Wi-Fi networks using the distributed coordination function. This unfairness exhibits itself through the fact that slow clients consume more airtime to transfer a given amount of data, leaving less airtime for fast clients. In this paper, we comprehensively examine the performance anomaly in multi-rate wireless networks using three approaches: experimental measurement, analytical modelling and simulation in Network Simulator v.3 (NS3). The results of our practical experiments benchmarking the throughput of a multi-rate 802.11ac wireless network clearly shows that even the recent wireless standards still suffer from airtime consumption unfairness. It was shown that even a single low-data rate station can decrease the throughput of high-data rate stations by 3–6 times. The simulation and analytical modelling confirm this finding with considerably high accuracy. Most of the theoretical models evaluating performance anomaly in Wi-Fi networks suggest that all stations get the same throughput independently of the used data rate. However, experimental and simulation results have demonstrated that despite a significant performance degradation high-speed stations still outperform stations with lower data rates once the difference between data rates becomes more significant. This is due to the better efficiency of the TCP protocol working over a fast wireless connection. It is also noteworthy that the throughput achieved by a station when it monopolistically uses the wireless media is considerably less than 50 % of its data rate due to significant overheads even in most recent Wi-Fi technologies. Mitigating performance anomaly in mixed-data rate WLANs requires a holistic approach that combines frame aggregation/fragmentation and adaption of data rates, contention window and other link-layer parameters.
Peer ReviewDOI
TL;DR: Several cross-layer models and parameter to design and address important issues and challenges to develop cross-Layer stack are listed and standardization, complex architecture, solicitous design, and implementation issues to build cross- layer architectures are discussed.
Abstract: are connected to a central device that Abstract —TCP/IP model is a dominant layered stack for wired networks but from the evolution of wireless technologies such as WiFi, WiMax, 3G/4G, ZigBee, sensor networks and satellites communication systems, these systems have posed specific challenges to support Quality of Service (QoS), mobility and handover, link adaptation, energy constraint performance, and security. To solve these problems TCP/IP model should be enforced. Cross-layer architectures have shown great performance improvement and it may shape the future of wireless networks. In this paper, we list several cross-layer models and parameter to design and address important issues and challenges to develop cross-layer stack. Moreover, we discuss standardization, complex architecture, solicitous design, and implementation issues to build cross-layer architectures.