scispace - formally typeset
Search or ask a question
Author

N. Gunasekaran

Bio: N. Gunasekaran is an academic researcher from Anna University. The author has contributed to research in topics: Optical amplifier & Wireless network. The author has an hindex of 1, co-authored 2 publications receiving 145 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: The implementation and architecture of Bluetooth is delves into, the functional overview and applications of Bluetooth are described, and the development of a model for recording, printing, monitoring, and controlling of eight process variables at the same time, using a distributed control system are dealt with.
Abstract: Bluetooth is a method for data communication that uses short-range radio links to replace cables between computers and their connected units. Industry-wide Bluetooth promises very substantial benefits for wireless network operators, end workers, and content developers of exciting new applications. This article delves into the implementation and architecture of Bluetooth. It also describes the functional overview and applications of Bluetooth, and deals with the development of a model for recording, printing, monitoring, and controlling of eight process variables at the same time, using a distributed control system. We explain industrial automation via Bluetooth using IISS. Industrial automation is one of the major applications of Bluetooth technology. Industrial automation, in terms of controlling or monitoring a factory, office, or industrial process, means to install machines that can do the work instead of human workers. Industrial plants consists of many devices interconnected in different ways ranging from simple data collection units (I/O) to more intelligent devices such as sensors, one-loop controllers, or programmable controllers, and a supervisory system used as a human-machine interface (HMI) for data logging and supervisory control. An IISS is a controlling device that monitors the devices in a company. It basically communicates via the interface card in the PC; the hardware is connected parallel across the device, and it is interfaced with the PC via a transceiver. The device can be accessed both manually via the switches and remotely via the PC. A simulation of connecting a PC with the machines in a company was executed. Also, we wrote a software program using C language; we will show how the remote monitoring takes place between the control room and the PC. These details in the article establish the growing need for Bluetooth technology.

160 citations

Journal ArticleDOI
TL;DR: In this article, a network optimization design methodology for ultra-longhaul terrestrial networks is presented and a variety of network architectures analyzed: optical networks with a 1:N path restoration mechanism; optical network with express routes and a 1 :N path recovery; line shared protection ring (LSPR) networks.
Abstract: Today's new generation of undersea cable systems extensively uses optical amplifiers, which allows the systems to be implemented over transoceanic distances. Optical amplifiers offer significantly increased transmission capacity, networking functionality and operational flexibility - all potentially at lower cost than traditional regeneration systems. Thus, similar techniques are now being used in terrestrial networks to exploit the wide bandwidth of optical fibers for long-distance transmission (thousand of miles) since the frequency range is in THz. A network optimization design methodology for ultra-long-haul terrestrial networks is presented and a variety of network architectures analyzed: optical networks with a 1:N path restoration mechanism; optical networks with express routes and a 1:N path restoration; line shared protection ring (LSPR) networks. This methodology is applied to an example network using several traffic scenarios. The optimal network architecture depends on the network itself and on the criteria determining the network design.

Cited by
More filters
Patent
31 Oct 2003
TL;DR: In this article, a data communication network is used to upgrade and award admission of events to an event customer via a data communications network, where the system, system, server architecture and/or tangible medium upgrade and acceptance of events are considered.
Abstract: A method, system, server architecture and/or tangible medium upgrade and award admittance of events to an event customer, preferably via a data communication network. The method includes, for example, receiving a communication from the event customer, the communication including a request to obtain admittance to at least one event, the communication also including an identifier associated with the event customer, admitting the event customer at the point of sale system after verification of the request, and updating a database indicating that the request was processed. The method also includes determining first predetermined criteria associated with the event indicative of at least one other event customer not attending the event, releasing an allocation associated with the at least one other event customer, and notifying at least another of the event customers to perform the upgrade and/or reallocation.

543 citations

Journal ArticleDOI
TL;DR: A comprehensive survey of the VHD algorithms designed to satisfy the required Quality of Service (QoS) requirements of the forthcoming Fourth Generation (4G) heterogeneous wireless networks is presented.

485 citations

Patent
05 Jan 2005
TL;DR: In this paper, the authors present a method, system, server architecture and/or tangible medium to determine and establish communication with a mobile device user, which includes, for example, receiving a communication from, or transmitting a communication to, an event customer, and optionally updating a database to reflect the communication.
Abstract: A method, system, server architecture and/or tangible medium determines and/or transmits and/or establishes communication with a mobile device user. The method includes, for example, receiving a communication from and/or transmitting a communication to, an event customer, and optionally updating a database to reflect the communication. The method also includes obtaining at least one mobile address, e.g., a telephone number and a communication network used thereon by the event user and building a data address therefrom to establish the communication with the event user. In one embodiment, the method does not require the event user to provide a bbnetwork address associated with the mobile contact address. Various optional embodiments are disclosed.

242 citations

Patent
06 Feb 2006
TL;DR: In this article, a data communication network is used to upgrade and award admission of events to an event customer via a data communications network, where the system, system, server architecture and/or tangible medium upgrade and acceptance of events are considered.
Abstract: A method, system, server architecture and/or tangible medium upgrade and award admittance of events to an event customer, preferably via a data communication network. The method includes, for example, receiving a communication from the event customer, the communication including a request to obtain admittance to at least one event, the communication also including an identifier associated with the event customer, admitting the event customer at the point of sale system after verification of the request, and updating a database indicating that the request was processed. The method also includes determining first predetermined criteria associated with the event indicative of at least one other event customer not attending the event, releasing an allocation associated with the at least one other event customer, and notifying at least another of the event customers to perform the upgrade and/or reallocation.

127 citations

Journal ArticleDOI
TL;DR: An overview of Bluetooth technology in IoT including its security, vulnerabilities, threats, and risk mitigation solutions, as well as real-life examples of exploits are presented.
Abstract: Bluetooth technology is a key component of wireless communications It provides a low-energy and low-cost solution for short-range radio transmissions Bluetooth, more specifically Bluetooth Low Energy (BLE) has become the predominant technology for connecting IoT (Internet of Things) It can be found in cell phones, headsets, speakers, printers, keyboards, automobiles, children’s toys, and medical devices, as well as many other devices The technology can also be found in automated smart homes, to provide monitors and controls for lights, thermostats, door locks, appliances, security systems, and cameras Bluetooth offers convenience and ease of use, but it lacks a centralized security infrastructure As a result, it has serious security vulnerabilities, and the need for awareness of the security risks are increasing as the technology becomes more widespread This paper presents an overview of Bluetooth technology in IoT including its security, vulnerabilities, threats, and risk mitigation solutions, as well as real-life examples of exploits Our study highlights the importance of understanding attack risks and mitigation techniques involved with using Bluetooth technology on our devices Real-life examples of recent Bluetooth exploits are presented Several recommended security measures are discussed to secure Bluetooth communication

117 citations