R Sathya Narayanan CCBMDO-2016 - Academia.edu (original) (raw)

Uploads

Papers by R Sathya Narayanan CCBMDO-2016

Research paper thumbnail of Conservative Management of Osteoradionecrosis By Debridement, Sequestrectomy and Placement of An Obturator – A Clinical Report

International Journal of Science and Research (IJSR)

Research paper thumbnail of Intraoral Dermoid Cyst–A Rare Case Report

Research paper thumbnail of Fabrication and Testing of Abaca Fibre Reinforced Epoxy Composites for Automotive Applications

Advanced Materials Research, 2013

Research paper thumbnail of Properties and Performance Analysis of Woven Roving Composite Laminates for Automotive Panel Board Applications

Advanced Materials Research, 2013

ABSTRACT Now-a-days natural Fibers are employed in various engineering applications because of th... more ABSTRACT Now-a-days natural Fibers are employed in various engineering applications because of their high tensile strength, low thermal expansion, high strength to weight ratio and good corrosion resistance. In this paper, woven roving composite laminates are prepared to produce automotive panel boards. Even though, various methods are available for preparing composites like Pultrusion method, filament winding method and hand layup method, hand lay method is used in this paper. The bundles of woven roving are alkalized at concentration between 1.2 and 6% of NaoH. Then, the treated fibres with increased strength are used as reinforcement with Epoxy LY556 resin with HY951 hardener under room temperature. The tensile analysis is conducted for the specimens like plain specimen, specimen with circular central hole and specimen with rectangular central hole. The results show that plain specimen is having more strength followed by circular hole and then rectangular hole specimens. It suggested that the case industry can make near optimal circular hole for its components by replacing rectangular hole

Research paper thumbnail of A method for authentication and key exchange for seamless inter-domain handovers

Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955), 2000

With the rapid growth of the Internet and mobile wireless technologies, an ever-increasing requir... more With the rapid growth of the Internet and mobile wireless technologies, an ever-increasing requirement on securing services between mobile users and access networks has become especially important. When 1 a user roams into a foreign network, in addition to data confidentiality, mutual authentication between the user and the provider is also a vital issue. These concerns and the desire to stay seamlessly connected lead to the demand of fast authentication and key establishment mechanisms, which are particularly difficult in inter-domain handover scenarios. In this paper, we introduce a novel mechanism to provide a simple but effective method, which forwards the key from the previous access router to the new access router that the mobile node attaches to. With this mechanism, trust relationship can be re-established even if the access routers do not trust each other in such an inter-domain scenario. Compared with the classical authentication method used in GSM and a recently proposed EAP-based secure key exchange protocol, our approach shows advantages of faster key exchange and authentication with only minimal message exchange in the wireless link.

Research paper thumbnail of QoS and Security in 4G Networks

Future 4G mobile communication networks are expected to provide all IP-based services for heterog... more Future 4G mobile communication networks are expected to provide all IP-based services for heterogeneous wireless access technologies, assisted by mobile IP to provide seamless Internet access for mobile users. Two major challenges in developing such heterogeneous network infrastructure are QoS provisioning and security services for mobile users' communication flows. This paper proposes a new architectural view and methodologies for QoS and security support in 4G networks, which integrates QoS signaling with authentication, authorization and accounting (AAA) services to both guarantee the user applications' QoS requirements and achieve efficient authentication, authorization and key exchange.

Research paper thumbnail of Method to support mobile devices in a peer-to-peer network

Research paper thumbnail of Mrtp: a multi-flow real-time transport protocol for ad hoc net-works

Vtc, 2003

Transporting multimedia data over ad hoc networks is a challenging problem. However, the mesh top... more Transporting multimedia data over ad hoc networks is a challenging problem. However, the mesh topology of ad hoc networks implies the existence of multiple paths between two nodes. In our previous work, we have shown that path diversity provides an effective means of combating transmission errors and topology changes that are typical in ad hoc networks. Moreover, data partitioning techniques, such as striping and thinning, have been demonstrated to improve the queueing performance of realtime data. Recognizing the advantages of these techniques, as well as the increasing need of video services in ad hoc networks, we propose a new transport protocol to support multipath transport of realtime data. The new protocol, called Multiflow Realtime Transport Protocol (MRTP), provides a convenient vehicle for realtime applications to partition and transmit data using multiple flows. Analysis results from a bottleneck mobile node and simulation results from multiple path video transport over a 16-node ad hoc network illustrate the benefits of MRTP.

Research paper thumbnail of Robust peer-to-peer networks and methods of use thereof

Research paper thumbnail of Session Endpoint Management Protocol

Research paper thumbnail of Layer-2 multi-hop IEEE 802.11 architecture: design and performance analysis : WLAN systems and interworking

Iee Proceedings Communications, Nov 24, 2004

Research paper thumbnail of Method for Extending the Endpoint of an Active Session Over an Ad-Hoc Connection to a Local Device

Research paper thumbnail of Network layer end-point transfer

Research paper thumbnail of Robust Real-Time Index Concurrency Control

Real-time database systems are expected to rely heavily on indexes to speed up data accessand the... more Real-time database systems are expected to rely heavily on indexes to speed up data accessand thereby help more transactions meet their deadlines. Accordingly, high-performance indexconcurrency control (ICC) protocols are required to prevent contention for the index from becominga bottleneck. We took a first step towards achieving this objective in a recent simulation-basedstudy that evaluated the performance of a representative set

Research paper thumbnail of Supporting Video Transport on DOCSIS-compliant Cable Networks

Page 1. 1 Supporting Video Transport on DOCSIS-compliant Cable Networks Dennis Bushmitch Sarit Mu... more Page 1. 1 Supporting Video Transport on DOCSIS-compliant Cable Networks Dennis Bushmitch Sarit Mukherjee Sathya Narayanan Muthukumar Ratti Qun Shi Panasonic Information and Neworking Technologies Laboratory Two Research Way Princeton, NJ 08540 ...

Research paper thumbnail of Method for secure packet identification

Research paper thumbnail of Strategic action in network industries: an empirical analysis of the European mobile phone industry

Scandinavian Journal of Management, 2004

This paper investigates the strategic moves of European mobile phone operators during the early d... more This paper investigates the strategic moves of European mobile phone operators during the early development of the industry. Drawing on the literature on competitive dynamics and markets externalities, we study the strategic actions taken by mediators, ie, firms based on a ...

Research paper thumbnail of Real Time Transport With Path Diversity1

Realtime transport poses great challenges in network research. In this paper, we propose realtime... more Realtime transport poses great challenges in network research. In this paper, we propose realtime transport using multiple paths. We show the advantages of using multiple paths for streaming services, namely: (1) better error resilience performance, (2) better traffic characteristics and hence better queueing performance, and (3) inherent security advantages. We are working on developing a new protocol to support realtime transport with multiple paths. We are also working on a testbed to implement the ideas and demonstrate the performance of our proposal.

Research paper thumbnail of System and associated method for scheduling transport of variable bit-rate data over a network

Research paper thumbnail of Real Time Transport With Path Diversity

Realtime transport poses great challenges in network research. In this paper, we propose realtime... more Realtime transport poses great challenges in network research. In this paper, we propose realtime transport using multiple paths. We show the advantages of using multiple paths for streaming services, namely: (1) better error resilience performance, (2) better traffic characteristics and hence better queueing performance, and (3) inherent security advantages. We are working on developing a new protocol to support realtime transport with multiple paths. We are also working on a testbed to implement the ideas and demonstrate the performance of our proposal.

Research paper thumbnail of Conservative Management of Osteoradionecrosis By Debridement, Sequestrectomy and Placement of An Obturator – A Clinical Report

International Journal of Science and Research (IJSR)

Research paper thumbnail of Intraoral Dermoid Cyst–A Rare Case Report

Research paper thumbnail of Fabrication and Testing of Abaca Fibre Reinforced Epoxy Composites for Automotive Applications

Advanced Materials Research, 2013

Research paper thumbnail of Properties and Performance Analysis of Woven Roving Composite Laminates for Automotive Panel Board Applications

Advanced Materials Research, 2013

ABSTRACT Now-a-days natural Fibers are employed in various engineering applications because of th... more ABSTRACT Now-a-days natural Fibers are employed in various engineering applications because of their high tensile strength, low thermal expansion, high strength to weight ratio and good corrosion resistance. In this paper, woven roving composite laminates are prepared to produce automotive panel boards. Even though, various methods are available for preparing composites like Pultrusion method, filament winding method and hand layup method, hand lay method is used in this paper. The bundles of woven roving are alkalized at concentration between 1.2 and 6% of NaoH. Then, the treated fibres with increased strength are used as reinforcement with Epoxy LY556 resin with HY951 hardener under room temperature. The tensile analysis is conducted for the specimens like plain specimen, specimen with circular central hole and specimen with rectangular central hole. The results show that plain specimen is having more strength followed by circular hole and then rectangular hole specimens. It suggested that the case industry can make near optimal circular hole for its components by replacing rectangular hole

Research paper thumbnail of A method for authentication and key exchange for seamless inter-domain handovers

Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955), 2000

With the rapid growth of the Internet and mobile wireless technologies, an ever-increasing requir... more With the rapid growth of the Internet and mobile wireless technologies, an ever-increasing requirement on securing services between mobile users and access networks has become especially important. When 1 a user roams into a foreign network, in addition to data confidentiality, mutual authentication between the user and the provider is also a vital issue. These concerns and the desire to stay seamlessly connected lead to the demand of fast authentication and key establishment mechanisms, which are particularly difficult in inter-domain handover scenarios. In this paper, we introduce a novel mechanism to provide a simple but effective method, which forwards the key from the previous access router to the new access router that the mobile node attaches to. With this mechanism, trust relationship can be re-established even if the access routers do not trust each other in such an inter-domain scenario. Compared with the classical authentication method used in GSM and a recently proposed EAP-based secure key exchange protocol, our approach shows advantages of faster key exchange and authentication with only minimal message exchange in the wireless link.

Research paper thumbnail of QoS and Security in 4G Networks

Future 4G mobile communication networks are expected to provide all IP-based services for heterog... more Future 4G mobile communication networks are expected to provide all IP-based services for heterogeneous wireless access technologies, assisted by mobile IP to provide seamless Internet access for mobile users. Two major challenges in developing such heterogeneous network infrastructure are QoS provisioning and security services for mobile users' communication flows. This paper proposes a new architectural view and methodologies for QoS and security support in 4G networks, which integrates QoS signaling with authentication, authorization and accounting (AAA) services to both guarantee the user applications' QoS requirements and achieve efficient authentication, authorization and key exchange.

Research paper thumbnail of Method to support mobile devices in a peer-to-peer network

Research paper thumbnail of Mrtp: a multi-flow real-time transport protocol for ad hoc net-works

Vtc, 2003

Transporting multimedia data over ad hoc networks is a challenging problem. However, the mesh top... more Transporting multimedia data over ad hoc networks is a challenging problem. However, the mesh topology of ad hoc networks implies the existence of multiple paths between two nodes. In our previous work, we have shown that path diversity provides an effective means of combating transmission errors and topology changes that are typical in ad hoc networks. Moreover, data partitioning techniques, such as striping and thinning, have been demonstrated to improve the queueing performance of realtime data. Recognizing the advantages of these techniques, as well as the increasing need of video services in ad hoc networks, we propose a new transport protocol to support multipath transport of realtime data. The new protocol, called Multiflow Realtime Transport Protocol (MRTP), provides a convenient vehicle for realtime applications to partition and transmit data using multiple flows. Analysis results from a bottleneck mobile node and simulation results from multiple path video transport over a 16-node ad hoc network illustrate the benefits of MRTP.

Research paper thumbnail of Robust peer-to-peer networks and methods of use thereof

Research paper thumbnail of Session Endpoint Management Protocol

Research paper thumbnail of Layer-2 multi-hop IEEE 802.11 architecture: design and performance analysis : WLAN systems and interworking

Iee Proceedings Communications, Nov 24, 2004

Research paper thumbnail of Method for Extending the Endpoint of an Active Session Over an Ad-Hoc Connection to a Local Device

Research paper thumbnail of Network layer end-point transfer

Research paper thumbnail of Robust Real-Time Index Concurrency Control

Real-time database systems are expected to rely heavily on indexes to speed up data accessand the... more Real-time database systems are expected to rely heavily on indexes to speed up data accessand thereby help more transactions meet their deadlines. Accordingly, high-performance indexconcurrency control (ICC) protocols are required to prevent contention for the index from becominga bottleneck. We took a first step towards achieving this objective in a recent simulation-basedstudy that evaluated the performance of a representative set

Research paper thumbnail of Supporting Video Transport on DOCSIS-compliant Cable Networks

Page 1. 1 Supporting Video Transport on DOCSIS-compliant Cable Networks Dennis Bushmitch Sarit Mu... more Page 1. 1 Supporting Video Transport on DOCSIS-compliant Cable Networks Dennis Bushmitch Sarit Mukherjee Sathya Narayanan Muthukumar Ratti Qun Shi Panasonic Information and Neworking Technologies Laboratory Two Research Way Princeton, NJ 08540 ...

Research paper thumbnail of Method for secure packet identification

Research paper thumbnail of Strategic action in network industries: an empirical analysis of the European mobile phone industry

Scandinavian Journal of Management, 2004

This paper investigates the strategic moves of European mobile phone operators during the early d... more This paper investigates the strategic moves of European mobile phone operators during the early development of the industry. Drawing on the literature on competitive dynamics and markets externalities, we study the strategic actions taken by mediators, ie, firms based on a ...

Research paper thumbnail of Real Time Transport With Path Diversity1

Realtime transport poses great challenges in network research. In this paper, we propose realtime... more Realtime transport poses great challenges in network research. In this paper, we propose realtime transport using multiple paths. We show the advantages of using multiple paths for streaming services, namely: (1) better error resilience performance, (2) better traffic characteristics and hence better queueing performance, and (3) inherent security advantages. We are working on developing a new protocol to support realtime transport with multiple paths. We are also working on a testbed to implement the ideas and demonstrate the performance of our proposal.

Research paper thumbnail of System and associated method for scheduling transport of variable bit-rate data over a network

Research paper thumbnail of Real Time Transport With Path Diversity

Realtime transport poses great challenges in network research. In this paper, we propose realtime... more Realtime transport poses great challenges in network research. In this paper, we propose realtime transport using multiple paths. We show the advantages of using multiple paths for streaming services, namely: (1) better error resilience performance, (2) better traffic characteristics and hence better queueing performance, and (3) inherent security advantages. We are working on developing a new protocol to support realtime transport with multiple paths. We are also working on a testbed to implement the ideas and demonstrate the performance of our proposal.