Computer Networking

Computer Networking

A computer network is a set of computers sharing resources located on or provided by network nodes. The computers use common communication protocols over digital interconnections to communicate with each other. These interconnections are made up of telecommunication network technologies, based on physically wired, optical, and wireless radio-frequency methods that may be arranged in a variety of network topologies.  The nodes of a computer network may include personal computers, servers, networking hardware, or other specialised or general-purpose hosts. They are identified by network addresses, and may have hostnames. Hostnames serve as memorable labels for the nodes, rarely changed after initial assignment. Network addresses serve for locating and identifying the nodes by communication protocols such as the Internet Protocol.  Computer networks may be classified by many criteria, including the transmission medium used to carry signals, bandwidth, communications protocols to organize network traffic, the network size, the topology, traffic control mechanism, and organizational intent. [Source]

Faculty Members:

Dr. Arup Bhattacharjee

Dr. Anish Kumar Saha

Dr. Pantha Kanti Nath

Dr. Ripon Patgiri

Mr. Biswanath Dey

Dr. Naresh Babu Muppalaneni

Publications

  1. Dubey, D., Singh, T.P., Bhattacharjee, A., Design of ATM Network Architecture that interoperate with Higher Level Protocols in 5G environment, (2021), pp. 341-346, DOI: 10.1109/ICIRCA51532.2021.9544934
  2. Reddy, K., Acharjamayum, I., Bhattacharjee, A. Layer-2 Performance Analysis of LTE-A and HetNets for 5G Networks, (2020), 1241, CCIS, pp. 575-587, DOI: 10.1007/978-981-15-6318-8_46
  3. Sharma, K.P., Bhattacharjee, A., Placement Issues in Network Function Virtualization, (2020) 1241 CCIS, pp. 588-599, DOI: 10.1007/978-981-15-6318-8_47
  4. Dey, B., Hossain, A., Bhattacharjee, A., Dey, R., Bera, R., Function approximation based energy detection in cognitive radio using radial basis function network, (2017) 23 (3), pp. 393-403, DOI: 10.1080/10798587.2016.1217632
  5. Ranjan, R., Bhattacharjee, A., Improved unchoking policy for BitTorrent, (2014), art. no. 6949851, pp. 307-311, DOI: 10.1109/ICCSP.2014.6949851
  6. Bhattacharjee, A., Nandi, S., Bivariate gamma distribution: A plausible solution for joint distribution of packet arrival and their sizes, Proceedings of 2010 13th International Conference on Computer and Information Technology, ICCIT 2010, art. no. 5723841, pp. 125-130, DOI: 10.1109/ICCITECHN.2010.5723841
  7. Bhattacharjee, A., Nandi, S., Tighter end-to-end delay bound for aggregate traffic scheduling, Proceedings of the 2010 Annual IEEE India Conference: Green Energy, Computing and Communication, INDICON 2010, art. no. 5712614, DOI: 10.1109/INDCON.2010.5712614
  8. Bhattacharjee, A., Nandi, S., Statistical analysis of network traffic inter-arrival, International Conference on Advanced Communication Technology, ICACT, 2, art. no. 5440221, pp. 1052-1057
  9. Bhattacharjee, A., Nandi, S., Self-similar traffic and buffer overflow: A bounded buffer allocation approach, Proceedings of INDICON 2009 - An IEEE India Council Conference, art. no. 5409384, DOI: 10.1109/INDCON.2009.5409384
  10. Bhattacharjee, A., Nandi, S., A proportional intra-class scheduling for differentiated services model, IEEE Region 10 Annual International Conference, Proceedings/TENCON, art. no. 4766625, DOI: 10.1109/TENCON.2008.4766625
  11. A Roy, J Pachuau, A K Saha, “An overview of queuing delay and various delay based algorithms in networks”, Computing Journal, Springer, Volume 103, issue 10, pp. 2361 – 2399, ISSN: 1436-5057, IF: 2.220, DOI:10.1007/s00607-021-00973-3, SCI.
  12. J Pachuau, A Roy, G Krishna, A K Saha, “Estimation of Traffic matrix from links load using Genetic Algorithm”, Scalable Computing: Practice and Experience, Volume 22, Issues 1, pp. 29–38, ISSN: 1895-1767, DOI 10.12694:/scpe.v22i1.1834, Scopus.
  13. S Debnath, B Bhuyan, A Saha, “Privacy Preserved Secured Outsourced Cloud Data Access Control Scheme with efficient Multi-authority Attribute Based Signcryption”, Multiagent and Grid Systems, vol. 16, no. 4, pp. 409-432, 2020, ISSN: 1574-1702, DOI: 10.3233/MGS-200338, Scopus.
  14.  A K Saha, K Sambyo & C Bhunia, “Energy efficient modeling of a network”, China Communications, 15, no. 1, pp. 107-117, Jan. doi: 10.1109/CC.2018.8290810, IEEE, ISSN: 1673-5447, IF-2.688, SCIE.
  15. A K Saha, K Sambyo & C Bhunia, “Design And Analysis of n:2n Reversible Decoder”, IETE, Journal Of Education, Taylor and Francis,  Vol-57, Issue-2, PP65-72, ISSN: 0974-7338, DOI: 1080/09747338.2016.1162672, 2016.
  16. K Sambyo, A K Saha & C Bhunia, “Mixed Path For Elephant Flow And Mice Flow For Delay Reduction In SDN”, Journal of Engineering Science and Technology, Vol-12, Issue-11, NOV 2017, PP 3057-3067, ISSN: 1823-4690, Scopus.
  17. K Sambyo, A K Saha & C Bhunia, “Node Skipping Routing”, Vol.85 (2015), pp.1-8, International Journal of Advanced Science and Technology, ISSN: 2005-4238.
  18. K Sambyo, A K Saha & C Bhunia, “Coding Header Compression”, Vol.84 (2015), pp.55-64, International Journal of Advanced Science and Technology, ISSN: 2005-4238
  19. K Sambyo, A K Saha & C Bhunia, “Analysis of APC and Code of Practice”, International Journal of Applied Engineering Research, pp 37935-37938, Volume 10, Number 17 (2015), ISSN 0973-4562, Scopus.
  20. A K Saha, J Pachuau, A Roy and C Bhunia, “GA based Energy Efficient Modelling of a Wireless Sensor Network”, Accepted, Principles of Big Graph: In Depth Insight, Volume-129, Elsevier.
  21. J Pachuau, A Roy, A K Saha, “An overview of crossover techniques in Genetic Algorithm”, International Conference on Modeling, Simulation and Optimization 2020, PP-581-598, NIT Silchar, doi.org/10.1007/978-981-15-9829-6_46, Scopus Indexed.
  22. A Kumar, R Bharti, D Gupta, A K Saha, “Improvement in Boosting Method by Using RUSTBoost Technique for Class Imbalanced Data”, Recent Developments in Machine Learning and Data Analytics. Advances in Intelligent Systems and Computing, vol 740, PP-51-66,  Springer (AISC volume 740), Doi. https://doi.org/10.1007/978-981-13-1280-9_5, Scopus Indexed.
  23. A K Saha, K Sambyo & C Bhunia, “Topology Discovery, Loop Finding and Alternative Path Solution in POX Controller”, Proceedings of the 24th International MultiConference of Engineers and Computer Scientists 2016, Vol II, IMECS 2016, March 16 – 18, 2016, Hong Kong, Scopus.
  24. A K Saha, K Sambyo & C Bhunia, “Integration of DVFS and Multi CPUs scaling in a multi processor”, International IEEE Conference on Electronic Design, Computer Networks and Automated Verification, Vol-01, PP-78-81, 29-30th January 2015, NIT Meghalaya, DOI: 10.1109/EDCAV.2015.7060543, Scopus.
  25. A K Saha, K Sambyo & C Bhunia, “Introduction to Software Defined Networking, its Features and Programming Structures”, 2nd Research Summit on CEEE(Computer, Electronics and Electrical Engineering), NIT Arunachal Pradesh, 3-4 June 2016. Organized by R & D Cell, NIT Yupia, India.
  26. B Dey and S Nandi, “Distributed Location and Lifetime Biased Clustering for large scale Wireless Sensor Network”, in International Conference on Distributed Computing and Networking, LNCS 4308, pp. 534-545, Dec 2006. Springer-Verlag Germany
  27. B Dey and S Nandi, “Multi-objective routing optimizations in cluster based Sensor Networks”, in IEEE 14th International Conference on Advanced Communication Technology, 19-22 February 2012. (IEEE Press)
  28. B Dey and Sukumar Nandi, “A Scalable Energy Efficient and Delay Bounded Data Gathering Framework for Large Scale Sensor Network”, in International Conference on Emerging Applications of Information Technology, February 2011(IEEE Press).
  29. B Dey, S Nandi and Gautam Das, “Mobility Assisted Efficient Coverage Control in Cluster Based Sensor Networks”, in International Conference on Emerging Applications of Information Technology, February 2011(IEEE Press).
  30. B Dey, Akhil S, S Nandi, “Clustering Problem in large-scale sensor network: Possibilities and requirements”, in International Conference on Advanced Communication Systems (ICACS-2007), January 2007.
  31. B Dey and S Nandi, “Localized intra cluster chaining for efficient data gathering in Large Scale Wireless Sensor Network “, 2nd International Conference on Wireless Communications and Sensor Networks, IIIT Allahabad, December 2006.
  32. R Tandon, B Dey and S Nandi, “Weight Based Clustering For Heterogeneous Wireless Sensor Networks”, in the nineteenth annual IEEE National Conference on Communications (NCC-2013), 15-17 February 2013.
  33. R Tandon, B Dey and S Nandi, “Distributed Lagrangean Clustering Protocol”, in the 14th International Conference on Distributed Computing and Networking (ICDCN 2013), 3-6 January 2013. (LNCS 7730).
  34. R Tandon, B Dey and S Nandi, “Adaptive Lagrangean Clustering Protocol”, in the proc. of the 2nd IEEE International Conference on Parallel, Distributed and Grid Computing (PDGC 2012), 06-08 December 2012.
  35. M Pant, B Dey and S Nandi, “Multihop Balanced Energy Clustering for Wireless Sensor Network”, in the IEEE Applications and Innovations in Mobile Computing (AIMoC 2015), February 12-15, 2015.
  36. V Chenna Kesavulu, B Dey, and S Nandi, “Secure Cluster Head Election Algorithm for Wireless Sensor Netowrks”, in the Third International Conference on Innovative Applications of Information Technology for Developing World (AACC 2005), December 2005.
  37. S Choudhury, B Dey, S Kumar, “Spam: A Threat to Network Security in Digital Library and Information Centres”, INFLIBNET Centre, India, 2005
  38. S Soni, B Dey, S Nandi, “Dynamic selection of cluster head in cluster of cluster heads within the cluster in Heterogeneous Wireless Sensor Network”, Advanced Communication Control and Computing Technologies (ICACCCT), 2014, Publisher :- IEEE Press
  39. BOOK CHAPTER: B Dey, Sandip Chakraborty and Sukumar NandiOptimal Cluster Head Positioning in Heterogeneous Sensor Networks, Book Title: Soft Computing Applications in Sensor Networks, Editors Sudip Misra, Shankar K Pal, Publishers: CRC Press, ISBN 9781482298758, September 2016. (Taylor & Francis Group, USA)
  40. Sabuzima Nayak, Ripon Patgiri, and Angana Borah, “A Survey on the roles of Bloom Filter in implementation of the Named Data Networking“, Computers Networks, Vol. 196 (2021), Elsevier, DOI: 10.1016/j.comnet.2021.108232 [Indexed: SCIE, Scimago Ranking: Q1, Impact Factor: 4.474] Download for free (50 days): https://authors.elsevier.com/a/1dFT-4xsUs08-x
  41. Ripon Patgiri, Sabuzima Nayak and Samir Kumar Borgohain, “PassDB: A Password Database with Strict Privacy Protocol using 3D Bloom Filter“, Information Sciences, Vol. 539, Issue: October 2020, pages: 157 – 176,  DOI: 10.1016/j.ins.2020.05.135
  42. Ripon Patgiri, Sabuzima Nayak, and Samir Kumar Borgohain, “PassDB: A Password Database using 3D Bloom Filter“, The 21st IEEE International Conferences on High Performance Computing and Communications (HPCC’19), to be held on Sat, 10 Aug, 2019 – Mon, 12 Aug, 2019, Zhangjiajie, China [Core Rank: B], doi: 10.1109/HPCC/SmartCity/DSS.2019.00162.
  43. Ripon Patgiri, Sabuzima Nayak, and Samir Kumar Borgohain, “ipBF: A Fast and Accurate IP Address Lookup using 3D Bloom Filter“, 18th International Conference on Intelligent Systems Design and Applications, VIT Chennai, India, December 6-8, 2018, DOI: 10.1007/978-3-030-16660-1_18
  44. Ripon Patgiri, Hemanth Katari, Ronit Kumar and Dheeraj Sharma, “Empirical study on Malicious URL Detection Using Machine Learning“, 15th International Conference on Distributed Computing and Internet Technology (ICDCIT 2019), KIIT University, Bhubaneswar, Odisha, India, LNCS, Springer, DOI: 10.1007/978-3-030-05366-6_31.

  45. Ripon Patgiri, Udit Varsheney, Tanya Akutota and Rakesh Kunde, “An Investigation on Intrusion Detection System Using Machine Learning“, IEEE Symposium Series on Computational Intelligence (IEEE SSCI 2018), 18-21 November, Bengaluru, India, DOI: 10.1109/SSCI.2018.8628676

  46. Pantha K. Nath, “Routing and Wavelength Assignment in Translucent Optical Networks with No Bifurcation of Flow” EIGHTH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION NETWORKS(ICCN) , Elsevier Science and Technology, pp. 282-289 (2014)
  47. Pantha K. Nath, “Minimizing Lost Traffic in Translucent Optical Networks with No Bifurcation of Flow using Branch and Price” INTERNATIONAL CONFERENCE ON ELECTRICAL ELECTRONICS AND COMPUTER SCIENCE(ICEECS), Vol III, no.7, pp. 24-28 (April 2014)
  48. Pantha K. Nath, T. Venkatesh “Lightpath routing and wavelength assignment for static demand in translucent optical networks”, Photonic Network Communication 39, pp. 103–119 (2020), https://doi.org/10.1007/s11107-019-00878-4
  49. Prathima C., Naresh Babu Muppalaneni, Kharade K.G. (2022) Deduplication of IoT Data in Cloud Storage. In: Satyanarayana C., Gao XZ., Ting CY., Muppalaneni N.B. (eds) Machine Learning and Internet of Things for Societal Issues. Advanced Technologies and Societal Change. Springer, Singapore. https://doi.org/10.1007/978-981-16-5090-1_13
  50. Ravi, N.Ch., Naresh Babu Muppalaneni, Dr. A. Govardhan, Joshi Padma, N. Smart Security Controls for Strikers for Dynamic Computing Models, Indian Journal of Computer Science and Engineering, 13(2), pp 456-466, 2022 SCOPUS indexed

    https://doi.org/10.21817/indjcse/2022/v13i2/221302125

    http://www.scopus.com/inward/record.url?eid=2-s2.0-85129304365&partnerID=MN8TOARS

  51. N. Ch. Ravi, Naresh Babu Muppalaneni,R. Sridevi,V. Kamakshi Prasad,A. Govardhan,Joshi Padma “Advanced Access Control Mechanism for Cloud Based E-wallet” Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI – 2018). ICCBI 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 31. Springer (2020)
    http://www.scopus.com/inward/record.url?eid=2-s2.0-85083639312&partnerID=MN8TOARS