scispace - formally typeset
Author

N. Gunasekaran

Bio: N. Gunasekaran is an academic researcher from Anna University. The author has contributed to research in topic(s): Optical amplifier & Wireless network. The author has an hindex of 1, co-authored 2 publication(s) receiving 145 citation(s).

Papers
More filters
Journal ArticleDOI

[...]

TL;DR: The implementation and architecture of Bluetooth is delves into, the functional overview and applications of Bluetooth are described, and the development of a model for recording, printing, monitoring, and controlling of eight process variables at the same time, using a distributed control system are dealt with.
Abstract: Bluetooth is a method for data communication that uses short-range radio links to replace cables between computers and their connected units. Industry-wide Bluetooth promises very substantial benefits for wireless network operators, end workers, and content developers of exciting new applications. This article delves into the implementation and architecture of Bluetooth. It also describes the functional overview and applications of Bluetooth, and deals with the development of a model for recording, printing, monitoring, and controlling of eight process variables at the same time, using a distributed control system. We explain industrial automation via Bluetooth using IISS. Industrial automation is one of the major applications of Bluetooth technology. Industrial automation, in terms of controlling or monitoring a factory, office, or industrial process, means to install machines that can do the work instead of human workers. Industrial plants consists of many devices interconnected in different ways ranging from simple data collection units (I/O) to more intelligent devices such as sensors, one-loop controllers, or programmable controllers, and a supervisory system used as a human-machine interface (HMI) for data logging and supervisory control. An IISS is a controlling device that monitors the devices in a company. It basically communicates via the interface card in the PC; the hardware is connected parallel across the device, and it is interfaced with the PC via a transceiver. The device can be accessed both manually via the switches and remotely via the PC. A simulation of connecting a PC with the machines in a company was executed. Also, we wrote a software program using C language; we will show how the remote monitoring takes place between the control room and the PC. These details in the article establish the growing need for Bluetooth technology.

145 citations

Journal ArticleDOI

[...]

TL;DR: In this article, a network optimization design methodology for ultra-longhaul terrestrial networks is presented and a variety of network architectures analyzed: optical networks with a 1:N path restoration mechanism; optical network with express routes and a 1 :N path recovery; line shared protection ring (LSPR) networks.
Abstract: Today's new generation of undersea cable systems extensively uses optical amplifiers, which allows the systems to be implemented over transoceanic distances. Optical amplifiers offer significantly increased transmission capacity, networking functionality and operational flexibility - all potentially at lower cost than traditional regeneration systems. Thus, similar techniques are now being used in terrestrial networks to exploit the wide bandwidth of optical fibers for long-distance transmission (thousand of miles) since the frequency range is in THz. A network optimization design methodology for ultra-long-haul terrestrial networks is presented and a variety of network architectures analyzed: optical networks with a 1:N path restoration mechanism; optical networks with express routes and a 1:N path restoration; line shared protection ring (LSPR) networks. This methodology is applied to an example network using several traffic scenarios. The optimal network architecture depends on the network itself and on the criteria determining the network design.

Cited by
More filters
Patent

[...]

31 Oct 2003
TL;DR: In this article, a data communication network is used to upgrade and award admission of events to an event customer via a data communications network, where the system, system, server architecture and/or tangible medium upgrade and acceptance of events are considered.
Abstract: A method, system, server architecture and/or tangible medium upgrade and award admittance of events to an event customer, preferably via a data communication network. The method includes, for example, receiving a communication from the event customer, the communication including a request to obtain admittance to at least one event, the communication also including an identifier associated with the event customer, admitting the event customer at the point of sale system after verification of the request, and updating a database indicating that the request was processed. The method also includes determining first predetermined criteria associated with the event indicative of at least one other event customer not attending the event, releasing an allocation associated with the at least one other event customer, and notifying at least another of the event customers to perform the upgrade and/or reallocation.

543 citations

Journal ArticleDOI

[...]

TL;DR: A comprehensive survey of the VHD algorithms designed to satisfy the required Quality of Service (QoS) requirements of the forthcoming Fourth Generation (4G) heterogeneous wireless networks is presented.
Abstract: Vertical handover decision (VHD) algorithms are essential components of the architecture of the forthcoming Fourth Generation (4G) heterogeneous wireless networks. These algorithms need to be designed to provide the required Quality of Service (QoS) to a wide range of applications while allowing seamless roaming among a multitude of access network technologies. In this paper, we present a comprehensive survey of the VHD algorithms designed to satisfy these requirements. To offer a systematic comparison, we categorize the algorithms into four groups based on the main handover decision criterion used. Also, to evaluate tradeoffs between their complexity of implementation and efficiency, we discuss three representative VHD algorithms in each group.

468 citations

Patent

[...]

05 Jan 2005
TL;DR: In this paper, the authors present a method, system, server architecture and/or tangible medium to determine and establish communication with a mobile device user, which includes, for example, receiving a communication from, or transmitting a communication to, an event customer, and optionally updating a database to reflect the communication.
Abstract: A method, system, server architecture and/or tangible medium determines and/or transmits and/or establishes communication with a mobile device user. The method includes, for example, receiving a communication from and/or transmitting a communication to, an event customer, and optionally updating a database to reflect the communication. The method also includes obtaining at least one mobile address, e.g., a telephone number and a communication network used thereon by the event user and building a data address therefrom to establish the communication with the event user. In one embodiment, the method does not require the event user to provide a bbnetwork address associated with the mobile contact address. Various optional embodiments are disclosed.

242 citations

Patent

[...]

06 Feb 2006
TL;DR: In this article, a data communication network is used to upgrade and award admission of events to an event customer via a data communications network, where the system, system, server architecture and/or tangible medium upgrade and acceptance of events are considered.
Abstract: A method, system, server architecture and/or tangible medium upgrade and award admittance of events to an event customer, preferably via a data communication network. The method includes, for example, receiving a communication from the event customer, the communication including a request to obtain admittance to at least one event, the communication also including an identifier associated with the event customer, admitting the event customer at the point of sale system after verification of the request, and updating a database indicating that the request was processed. The method also includes determining first predetermined criteria associated with the event indicative of at least one other event customer not attending the event, releasing an allocation associated with the at least one other event customer, and notifying at least another of the event customers to perform the upgrade and/or reallocation.

127 citations

Journal ArticleDOI

[...]

01 Jul 2005
TL;DR: The research contributions in this arena are brought together to give an overview of the state-of-the-art, and processes for network formation, routing and intra- and inter-piconet scheduling, are explained and classified.
Abstract: This paper describes the issue of piconet interconnection for Bluetooth technology. These larger networks, known as scatternets, have the potential to increase networking flexibility and facilitate new applications. While the Bluetooth specification permits piconet interconnection, the creation, operation and maintenance of scatternets remains open. In this paper, the research contributions in this arena are brought together, to give an overview of the state-of-the-art. First, operation of the Bluetooth system is explained, followed by the mechanism for link formation. Then, the issue of piconet interconnection is considered in detail. Processes for network formation, routing and intra- and inter-piconet scheduling, are explained and classified. Finally, the research issues arising are outlined.

85 citations