Node selection in p2 p content sharing service in mobile cellular networks wi...Uvaraj Shan
This document discusses node selection algorithms for peer-to-peer content sharing over mobile cellular networks that consider downlink bandwidth limitations. It proposes two novel algorithms (DBaT-B and DBaT-N) that select peer nodes to maximize load balancing across cells while meeting the requesting peer's bandwidth needs. DBaT-B selects peers to satisfy the requesting peer's minimum bandwidth requirement, while DBaT-N selects a certain number of peers as requested. Both algorithms first choose peers in the least busy cell to improve load balancing.
Video transmission over wireless network requires
link reliability. Videos are having more data to be transmitted
during communication. The criticality and load of the network
increases when some video data is communicated over the
network. Firstly, describes the characteristics of Mobile Ad hoc
Networks and their Routing protocol, and second a mobile ad
hoc network (MANET) which consists of set mobile wireless
nodes and one fixed wireless server are design using ns-2. In this
research we will simulate three MANET routing protocols such
as AODV against three different parameters i.e. delay, network
load, throughput and retransmission.
A survey on cost effective survivable network design in wireless access networkijcses
In today’s technology, the essential property for wireless communication network is to exhibit as a
dependable network. The dependability network incorporates the property like availability, reliability and
survivability. Although these factors are well taken care by protocol for wired network, still there exists
huge lack of efficacy for wireless network. Further, the wireless access network is more complicated with
difficulties like frequencies allocation, quality of services, user requests. Adding to it, the wireless access
network is severely vulnerable to link and node failures. Therefore, the survivability in wireless access
network is very important factor to be considered will performing wireless network designing. This paper
focuses on discussion of survivability in wireless access network. Capability of a wireless access network to
perform its dedicated accessibility services even in case of infrastructure failure is known as survivability.
Given available capacity, connectivity and reliability the survivable problem in hierarchical network is to
minimize the overall connection cost for multiple requests. The various failure scenario of wireless access
network as existing in literature is been explored. The existing survivability models for access network like
shared link, multi homing, overlay network, sonnet ring, and multimodal devices are discussed in detail
here. Further comparison between various existing survivability solutions is also tabulated.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
International Journal of Engineering Research and Development (IJERD)IJERD Editor
This document summarizes a research paper that proposes and evaluates a prototype called Source Initiated Frame Restoration (SIFR) to improve video quality over the internet. SIFR employs frame-preserving policies and uses multiple alternative internet paths to restore lost video frames when outages are detected. The researchers deployed SIFR on PlanetLab nodes and compared its performance to the default internet routing. They found that SIFR was able to provide higher perceptual video quality by restoring lost frames from alternative paths when outages occurred on the primary path.
This document provides an introduction and overview of mobile ad hoc networks (MANETs). It discusses how MANETs are self-configuring networks formed by mobile nodes without a fixed infrastructure. The key characteristics of MANETs include using wireless communication, nodes acting as both hosts and routers, limited bandwidth and variable capacity links, energy-constrained operation, and dynamic network topology. The document also outlines some common applications of MANETs and provides an overview of different routing protocols used in MANETs, including proactive, reactive, and hybrid protocols. It gives a brief description of distance-vector and link-state routing approaches.
GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...IJCNCJournal
With the current development of mobile communication services, people need personal communication of
high speed, excellent service, high quality and low latency,however, limited spectrum resources become
the most important factor to hamper improvement of cellular systems. As big amount of data traffic will
cause greater local consumption of spectrum resources, future networks are required to have appropriate
techniques to better support such forms of communication. D2D (Device-to-device) communication
technology in a cellular network makes full use of spectrum resources underlaying, reduces the load of the
base station, minimizes transmit power of the terminals and the base stations, thereby enhances the overall
throughput of the networks. Due to the use of multiplexing D2D UE (User equipment) resources and
spectrum, and the interference caused by the sharing of resources between adjacent cells, it has become a
major factor affecting coexisting of cellular subscribers and D2D users. When D2D communication
multiplexes the uplink resources, the base-stations are easily to be disturbed; when the downlink resources
are multiplexed, the users of downlink are susceptible to interference. In order to build a high-efficient
mobile network, we can meet the QoS requirements by controlling the power to suppress the interference
between the base station and a terminal user.
Node selection in p2 p content sharing service in mobile cellular networks wi...Uvaraj Shan
This document discusses node selection algorithms for peer-to-peer content sharing over mobile cellular networks that consider downlink bandwidth limitations. It proposes two novel algorithms (DBaT-B and DBaT-N) that select peer nodes to maximize load balancing across cells while meeting the requesting peer's bandwidth needs. DBaT-B selects peers to satisfy the requesting peer's minimum bandwidth requirement, while DBaT-N selects a certain number of peers as requested. Both algorithms first choose peers in the least busy cell to improve load balancing.
Video transmission over wireless network requires
link reliability. Videos are having more data to be transmitted
during communication. The criticality and load of the network
increases when some video data is communicated over the
network. Firstly, describes the characteristics of Mobile Ad hoc
Networks and their Routing protocol, and second a mobile ad
hoc network (MANET) which consists of set mobile wireless
nodes and one fixed wireless server are design using ns-2. In this
research we will simulate three MANET routing protocols such
as AODV against three different parameters i.e. delay, network
load, throughput and retransmission.
A survey on cost effective survivable network design in wireless access networkijcses
In today’s technology, the essential property for wireless communication network is to exhibit as a
dependable network. The dependability network incorporates the property like availability, reliability and
survivability. Although these factors are well taken care by protocol for wired network, still there exists
huge lack of efficacy for wireless network. Further, the wireless access network is more complicated with
difficulties like frequencies allocation, quality of services, user requests. Adding to it, the wireless access
network is severely vulnerable to link and node failures. Therefore, the survivability in wireless access
network is very important factor to be considered will performing wireless network designing. This paper
focuses on discussion of survivability in wireless access network. Capability of a wireless access network to
perform its dedicated accessibility services even in case of infrastructure failure is known as survivability.
Given available capacity, connectivity and reliability the survivable problem in hierarchical network is to
minimize the overall connection cost for multiple requests. The various failure scenario of wireless access
network as existing in literature is been explored. The existing survivability models for access network like
shared link, multi homing, overlay network, sonnet ring, and multimodal devices are discussed in detail
here. Further comparison between various existing survivability solutions is also tabulated.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
International Journal of Engineering Research and Development (IJERD)IJERD Editor
This document summarizes a research paper that proposes and evaluates a prototype called Source Initiated Frame Restoration (SIFR) to improve video quality over the internet. SIFR employs frame-preserving policies and uses multiple alternative internet paths to restore lost video frames when outages are detected. The researchers deployed SIFR on PlanetLab nodes and compared its performance to the default internet routing. They found that SIFR was able to provide higher perceptual video quality by restoring lost frames from alternative paths when outages occurred on the primary path.
This document provides an introduction and overview of mobile ad hoc networks (MANETs). It discusses how MANETs are self-configuring networks formed by mobile nodes without a fixed infrastructure. The key characteristics of MANETs include using wireless communication, nodes acting as both hosts and routers, limited bandwidth and variable capacity links, energy-constrained operation, and dynamic network topology. The document also outlines some common applications of MANETs and provides an overview of different routing protocols used in MANETs, including proactive, reactive, and hybrid protocols. It gives a brief description of distance-vector and link-state routing approaches.
GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...IJCNCJournal
With the current development of mobile communication services, people need personal communication of
high speed, excellent service, high quality and low latency,however, limited spectrum resources become
the most important factor to hamper improvement of cellular systems. As big amount of data traffic will
cause greater local consumption of spectrum resources, future networks are required to have appropriate
techniques to better support such forms of communication. D2D (Device-to-device) communication
technology in a cellular network makes full use of spectrum resources underlaying, reduces the load of the
base station, minimizes transmit power of the terminals and the base stations, thereby enhances the overall
throughput of the networks. Due to the use of multiplexing D2D UE (User equipment) resources and
spectrum, and the interference caused by the sharing of resources between adjacent cells, it has become a
major factor affecting coexisting of cellular subscribers and D2D users. When D2D communication
multiplexes the uplink resources, the base-stations are easily to be disturbed; when the downlink resources
are multiplexed, the users of downlink are susceptible to interference. In order to build a high-efficient
mobile network, we can meet the QoS requirements by controlling the power to suppress the interference
between the base station and a terminal user.
DEVICE-TO-DEVICE (D2D) COMMUNICATION UNDER LTE-ADVANCED NETWORKSijwmn
Device-to-Device (D2D) communication is a new technology that offer many advantages for the LTEadvanced
network such us wireless peer-to-peer services and higher spectral efficiency. It is also
considered as one of promising techniques for the 5G wireless communications system and used in so
many different fields such as network traffic offloading, public safety, social services and applications such
as gaming and military applications . The goal of this paper is to present advances on the current 3GPP
LTE-advanced system related to Device-to-Device (D2D). In this paper, we provide an overview of the
D2D types based on the communication spectrum of D2D transmission, namely Inband D2D
communication and Outband D2D communication. Then we present the advantages and disadvantages of
each D2D mode. Moreover, architecture and protocol enhancements for D2D communications under
LTE-A network are described.
This document discusses device-to-device (D2D) communication in LTE networks. It describes how D2D allows direct communication between user equipments by bypassing the base station, addressing issues like network coverage, congestion control, and public safety. The document outlines the D2D communication process, including synchronization, discovery, and communication modes. It also describes the ProSe D2D network architecture and direct discovery procedure. D2D communication in LTE aims to improve network coverage, offer last mile connectivity, control congestion, and enable public safety communication during emergencies or disasters.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
The problems associated with selfish nodes in
MANET are addressed by a collaborative watchdog approach
which reduces the detection time for selfish nodes thereby
improves the performance and accuracy of watchdogs[1]. In
the related works they make use of credit based systems, reputation
based mechanisms, pathrater and watchdog mechanism
to detect such selfish nodes. In this paper we follow an approach
of collaborative watchdog which reduces the detection
time for selfish nodes and also involves the removal of such
selfish nodes based on some progressively assessed thresholds.
The threshold gives the nodes a chance to stop misbehaving
before it is permanently deleted from the network.
The node passes through several isolation processes before it
is permanently removed. Another version of AODV protocol
is used here which allows the simulation of selfish nodes in
NS2 by adding or modifying log files in the protocol.
AN EXPANDED BLUETOOTH NETWORK-A SOLUTION TO THE SHORT RANGE BLUETOOTH COMMUNI...cscpconf
Bluetooth is a short range, low power, low cost wireless communication technology designed to connect phones, laptops and PDAs. The greater availability of portable devices with Bluetooth connectivity imposes wireless connection between enabled devices. This paper considers the problems of Bluetooth communication and also proposes a new expanded network to overcome the basic limitation of Bluetooth devices that is the range constraint. This creates a network of devices that will include laptops, set top devices and also mobile phones. The main purpose of this proposal is to establish a network will enable the users to communicate outside the range without any range constraint.
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5Gijwmn
Machine to Machine communication or M2M, refers to a model of communication where devices communicate directly with each other using the available wired or wireless channels. M2M is a new concept proposed under 3GPP(3rd Generation Partnership Project); several research are working on providing solutions for M2M communication for the 5G networks. Challenges associated with M2M communication are the lack of standards, security, poor infrastructure, interoperability and diverse architecture. In this paper, we propose a new mechanism called TM2M5G (The Machine to Machine for 5G) based on SOFTNET platform which results in support of 5G heterogeneous network. In this paper, we
propose the architecture for M2M communication based on SOFTNET and provide new features support like security algorithms for data transmission among devices and scheduling algorithm for seamless transmission of data packets over the network. Finallysimulation results ofthis algorithm based on a system level simulator, considering two different approaches for analyzing the parameters such as delay, throughput and bandwidth are presented.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Synthesis of Non-Replicated Dynamic Fragment Allocation Algorithm in Distribu...IDES Editor
This document summarizes a research paper that proposes a new dynamic fragment allocation algorithm for distributed database systems. The algorithm incorporates time constraints of database accesses, a volume threshold, and the volume of data transmitted between sites over time to dynamically reallocate fragments based on changing access patterns. It aims to migrate fragments to sites that consistently transfer the most data to/from that fragment over recent time intervals. This is intended to improve performance by minimizing data transmission costs as access patterns change. Key factors like the volume threshold, time interval duration, and consistency threshold regulate how frequently fragments are reallocated.
The exponential rise in wireless communication systems and allied applications has revitalized academiaindustries to achieve more efficient data transmission system to meet Quality-of-Service (QoS) demands. Amongst major wireless communication techniques, Mobile Ad-hoc Network (MANET) is found potential to provide decentralized and infrastructure less communication among multiple distributed nodes across network region. However, dynamic network conditions such as changing topology, congestion, packet drop, intrusion possibilities etc often make MANET’s routing a tedious task. On the other hand, mobile network feature broadens the horizon for intruders to penetrate the network and causes performance degradation. Unlike classical MANET protocols where major efforts have been made on single network parameter based routing decision, this research paper proposes a novel Elitist Genetic Algorithm (EGA) Multi-Objective Optimization assisted Network Condition Aware QoS-Routing Protocol for Mobile Ad-hoc Networks (MNCQM). Our proposed MNCQM protocol exhibits two phase implementation where at first it performs node-profiling under dynamic network topology for which three factors; irregular MAC information exchange, queuing overflow and topological variations have been considered. Towards this objective node features like Packet Forwarding Probability (PFP) at the MAC layer, Success Probability of Data Transmission (SPDT) of a neighboring node, and Probability of Successful Data Delivery (PSDD) have been obtained to estimate Node-Trustworthiness Index (NTI), which is further used to eliminate untrustworthy nodes. In the second phase of implementation, a novel Evolutionary Computing assisted nondisjoint best forwarding path selection model is developed that exploits node’s and allied link’s connectivity and availability features to identify the quasi-sub-optimal forwarding paths. EGA algorithm intends to reduce hop-counts, connectivity-loss and node or link unavailability to estimate best forwarding node. One key feature of the proposed model is dual-supplementary forwarding path selection that enables alternate path formation in case of link outage and thus avoids any iterative network discovery phase.
This document summarizes a research paper that proposes a framework for continuous query processing for mobile users in peer-to-peer environments without centralized servers. The framework allows users to specify quality of service parameters for query answers and collaborate with peers to continuously maintain answers. Key aspects of the framework include allowing users to specify desired levels of coverage and accuracy for query answers, and designing a continuous answer maintenance scheme where users collaborate with peers to refine answers if local caches do not satisfy quality requirements. Experimental results showed the framework was efficient and scalable while providing a tradeoff between communication overhead and answer quality.
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...ijasuc
Delay Tolerant Networks (DTNs) where the node connectivity is opportunistic and end-to-end path between
any pair of source and destination is not guaranteed most of the time. Hence the messages are transferred
from source to destination via intermediate nodes on hop to hop basis using store-carry-forward paradigm.
Due to quick advancement in hand held devices such as smart phone and laptop with support of wireless
communication interface carried by human being, it is possible in coming days to use DTNs for message
dissemination without setting up infrastructure. The routing task becomes challenging in DTNs due to
intermittent network connectivity and the connection opportunity arises only when node comes in
transmission range of each other. The performance of the routing protocols depend on the selection of
appropriate relay node which can deliver the message to final destination in case of source and destination
do not meet at all. Many social characteristics are exhibited by the human being like friendship,
community, similarity and centrality which can be exploited by the routing protocol in order to take the
forwarding decisions. Literature shows that by using these characteristics, the performance of DTN routing
protocols have been improved in terms of delivery probability. The existing routing schemes used
community detection using aggregated contact duration and contact frequency which does not change over
the time period. We propose community detection through Inter Contact Time (ICT) between node pair
using power law distribution where the members of community are added and removed dynamically. We
also considered single copy of each message in entire network to reduce the network overhead. The
proposed routing protocol named Social Based Single Copy Routing (SBSCR) selects the suitable relay
node from the community members only based on the social metrics such as similarity and friendship
together. ICTs show power law nature in human mobility which is used to detect the community structure at
each node. A node maintains its own community and social metrics such as similarity and friendship with
other nodes. Whenever node has to select the relay node then it selects from its community with higher
value of social metric. The simulations are conducted using ONE simulator on the real traces of campus
and conference environments. SBSCR is compared with existing schemes and results show that it
outperforms in terms of delivery probability and delivery delay with comparable overhead ratio.
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
The document compares two handoff management protocols for 4G wireless networks: Mobile IPv6 (MIPv6) and Hierarchical Mobile IPv6 (HMIPv6). MIPv6 allows nodes to change their point of attachment to the Internet while maintaining ongoing communications. However, it causes high signaling traffic and latency during handoffs. HMIPv6 addresses this by separating local and global mobility management. It reduces signaling costs for intra-domain handoffs by using a mobility anchor point for local registration instead of the home agent. The document analyzes and compares the handoff latency of MIPv6 and HMIPv6, finding that HMIPv6 has lower latency for intra-domain handoffs by avoiding signaling to the home agent or correspondents
Flexible bloom for searching textual contentUvaraj Shan
This document presents the BloomCast scheme for efficient full-text retrieval in unstructured peer-to-peer networks. BloomCast replicates document content across the network in the form of Bloom filters to reduce communication costs while still guaranteeing recall. It hybridizes a lightweight distributed hash table with the unstructured overlay to support random node sampling and network size estimation. Queries are evaluated based on Bloom filter membership verification to support full-text searches with the potential for false positives but no false negatives. The system aims to provide efficient and effective full-text retrieval in unstructured P2P networks.
Secure intrusion detection and attack measure selection in virtual network sy...Uvaraj Shan
This document proposes NICE, a framework for secure intrusion detection and attack mitigation in virtual network systems. NICE uses distributed agents on cloud servers to monitor traffic, detect vulnerabilities, and generate attack graphs. It profiles virtual machines to identify their state and vulnerabilities. When potential attacks are detected, NICE can quarantine suspicious VMs and inspect their traffic. The attack analyzer correlates alerts, constructs attack graphs, and selects appropriate countermeasures based on the graphs. Evaluations show NICE can effectively detect attacks while minimizing performance overhead for the cloud system.
Secure intrusion detection and attack measure selectionUvaraj Shan
This document proposes NICE, a framework for secure intrusion detection and attack mitigation in virtual network systems. NICE uses distributed agents on cloud servers to monitor traffic, detect vulnerabilities, and generate attack graphs. It profiles virtual machines to identify their state and vulnerabilities. When potential attacks are detected, NICE can quarantine suspicious VMs and inspect their traffic. The attack analyzer correlates alerts, constructs attack graphs, and selects appropriate countermeasures based on the graphs. Evaluations show NICE can effectively detect attacks while minimizing performance overhead for the cloud system.
Effective data retrieval system with bloom in a unstructured p2p networkUvaraj Shan
1) Bloomcast is an efficient and effective full-text retrieval scheme for unstructured peer-to-peer (P2P) networks. It guarantees perfect recall rates with high probability while reducing communication costs.
2) Bloomcast replicates documents across the P2P network using Bloom filters rather than the raw data. This reduces storage and communication costs for replication.
3) By leveraging a hybrid P2P protocol, Bloomcast uniformly distributes items randomly across the network. This allows for random node sampling and network size estimation while supporting full-text searches with guaranteed recall within an O(√N) communication cost, where N is the network size.
This slides guide Tamil learning children to know about Name of flowers in Tamil language.The name of flowers are explained with clear pictures along with English name.This is the first part and other comes as follows.
This document presents two novel peer selection algorithms, DBaT-B and DBaT-N, for peer-to-peer content sharing over mobile cellular networks. DBaT-B selects peers to satisfy the requesting peer's minimum downlink bandwidth requirement, while balancing traffic load across cells. DBaT-N selects a specified number of peers such that the total uplink bandwidth exceeds the requester's downlink limit, again balancing loads. Both algorithms first choose the least busy cell and then select peers based on uplink bandwidth and service ability to meet the requester's needs while improving load balancing performance compared to traditional algorithms.
Flexible bloom for searching textual contentUvaraj Shan
This document describes BloomCast, a system that uses Bloom filters to encode document content and replicate it across peers in an unstructured peer-to-peer (P2P) network. BloomCast aims to achieve high recall for search queries at low communication cost. It hybridizes a lightweight distributed hash table (DHT) with the P2P overlay to enable random node sampling and network size estimation. The DHT helps meet two constraints: query and document replicas are randomly distributed across the network, and peers know the network size. By uniformly replicating content across the network, BloomCast can guarantee search recall. It utilizes Bloom filters to compress document replicas and reduce replication costs.
DEVICE-TO-DEVICE (D2D) COMMUNICATION UNDER LTE-ADVANCED NETWORKSijwmn
Device-to-Device (D2D) communication is a new technology that offer many advantages for the LTEadvanced
network such us wireless peer-to-peer services and higher spectral efficiency. It is also
considered as one of promising techniques for the 5G wireless communications system and used in so
many different fields such as network traffic offloading, public safety, social services and applications such
as gaming and military applications . The goal of this paper is to present advances on the current 3GPP
LTE-advanced system related to Device-to-Device (D2D). In this paper, we provide an overview of the
D2D types based on the communication spectrum of D2D transmission, namely Inband D2D
communication and Outband D2D communication. Then we present the advantages and disadvantages of
each D2D mode. Moreover, architecture and protocol enhancements for D2D communications under
LTE-A network are described.
This document discusses device-to-device (D2D) communication in LTE networks. It describes how D2D allows direct communication between user equipments by bypassing the base station, addressing issues like network coverage, congestion control, and public safety. The document outlines the D2D communication process, including synchronization, discovery, and communication modes. It also describes the ProSe D2D network architecture and direct discovery procedure. D2D communication in LTE aims to improve network coverage, offer last mile connectivity, control congestion, and enable public safety communication during emergencies or disasters.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
The problems associated with selfish nodes in
MANET are addressed by a collaborative watchdog approach
which reduces the detection time for selfish nodes thereby
improves the performance and accuracy of watchdogs[1]. In
the related works they make use of credit based systems, reputation
based mechanisms, pathrater and watchdog mechanism
to detect such selfish nodes. In this paper we follow an approach
of collaborative watchdog which reduces the detection
time for selfish nodes and also involves the removal of such
selfish nodes based on some progressively assessed thresholds.
The threshold gives the nodes a chance to stop misbehaving
before it is permanently deleted from the network.
The node passes through several isolation processes before it
is permanently removed. Another version of AODV protocol
is used here which allows the simulation of selfish nodes in
NS2 by adding or modifying log files in the protocol.
AN EXPANDED BLUETOOTH NETWORK-A SOLUTION TO THE SHORT RANGE BLUETOOTH COMMUNI...cscpconf
Bluetooth is a short range, low power, low cost wireless communication technology designed to connect phones, laptops and PDAs. The greater availability of portable devices with Bluetooth connectivity imposes wireless connection between enabled devices. This paper considers the problems of Bluetooth communication and also proposes a new expanded network to overcome the basic limitation of Bluetooth devices that is the range constraint. This creates a network of devices that will include laptops, set top devices and also mobile phones. The main purpose of this proposal is to establish a network will enable the users to communicate outside the range without any range constraint.
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5Gijwmn
Machine to Machine communication or M2M, refers to a model of communication where devices communicate directly with each other using the available wired or wireless channels. M2M is a new concept proposed under 3GPP(3rd Generation Partnership Project); several research are working on providing solutions for M2M communication for the 5G networks. Challenges associated with M2M communication are the lack of standards, security, poor infrastructure, interoperability and diverse architecture. In this paper, we propose a new mechanism called TM2M5G (The Machine to Machine for 5G) based on SOFTNET platform which results in support of 5G heterogeneous network. In this paper, we
propose the architecture for M2M communication based on SOFTNET and provide new features support like security algorithms for data transmission among devices and scheduling algorithm for seamless transmission of data packets over the network. Finallysimulation results ofthis algorithm based on a system level simulator, considering two different approaches for analyzing the parameters such as delay, throughput and bandwidth are presented.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Synthesis of Non-Replicated Dynamic Fragment Allocation Algorithm in Distribu...IDES Editor
This document summarizes a research paper that proposes a new dynamic fragment allocation algorithm for distributed database systems. The algorithm incorporates time constraints of database accesses, a volume threshold, and the volume of data transmitted between sites over time to dynamically reallocate fragments based on changing access patterns. It aims to migrate fragments to sites that consistently transfer the most data to/from that fragment over recent time intervals. This is intended to improve performance by minimizing data transmission costs as access patterns change. Key factors like the volume threshold, time interval duration, and consistency threshold regulate how frequently fragments are reallocated.
The exponential rise in wireless communication systems and allied applications has revitalized academiaindustries to achieve more efficient data transmission system to meet Quality-of-Service (QoS) demands. Amongst major wireless communication techniques, Mobile Ad-hoc Network (MANET) is found potential to provide decentralized and infrastructure less communication among multiple distributed nodes across network region. However, dynamic network conditions such as changing topology, congestion, packet drop, intrusion possibilities etc often make MANET’s routing a tedious task. On the other hand, mobile network feature broadens the horizon for intruders to penetrate the network and causes performance degradation. Unlike classical MANET protocols where major efforts have been made on single network parameter based routing decision, this research paper proposes a novel Elitist Genetic Algorithm (EGA) Multi-Objective Optimization assisted Network Condition Aware QoS-Routing Protocol for Mobile Ad-hoc Networks (MNCQM). Our proposed MNCQM protocol exhibits two phase implementation where at first it performs node-profiling under dynamic network topology for which three factors; irregular MAC information exchange, queuing overflow and topological variations have been considered. Towards this objective node features like Packet Forwarding Probability (PFP) at the MAC layer, Success Probability of Data Transmission (SPDT) of a neighboring node, and Probability of Successful Data Delivery (PSDD) have been obtained to estimate Node-Trustworthiness Index (NTI), which is further used to eliminate untrustworthy nodes. In the second phase of implementation, a novel Evolutionary Computing assisted nondisjoint best forwarding path selection model is developed that exploits node’s and allied link’s connectivity and availability features to identify the quasi-sub-optimal forwarding paths. EGA algorithm intends to reduce hop-counts, connectivity-loss and node or link unavailability to estimate best forwarding node. One key feature of the proposed model is dual-supplementary forwarding path selection that enables alternate path formation in case of link outage and thus avoids any iterative network discovery phase.
This document summarizes a research paper that proposes a framework for continuous query processing for mobile users in peer-to-peer environments without centralized servers. The framework allows users to specify quality of service parameters for query answers and collaborate with peers to continuously maintain answers. Key aspects of the framework include allowing users to specify desired levels of coverage and accuracy for query answers, and designing a continuous answer maintenance scheme where users collaborate with peers to refine answers if local caches do not satisfy quality requirements. Experimental results showed the framework was efficient and scalable while providing a tradeoff between communication overhead and answer quality.
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...ijasuc
Delay Tolerant Networks (DTNs) where the node connectivity is opportunistic and end-to-end path between
any pair of source and destination is not guaranteed most of the time. Hence the messages are transferred
from source to destination via intermediate nodes on hop to hop basis using store-carry-forward paradigm.
Due to quick advancement in hand held devices such as smart phone and laptop with support of wireless
communication interface carried by human being, it is possible in coming days to use DTNs for message
dissemination without setting up infrastructure. The routing task becomes challenging in DTNs due to
intermittent network connectivity and the connection opportunity arises only when node comes in
transmission range of each other. The performance of the routing protocols depend on the selection of
appropriate relay node which can deliver the message to final destination in case of source and destination
do not meet at all. Many social characteristics are exhibited by the human being like friendship,
community, similarity and centrality which can be exploited by the routing protocol in order to take the
forwarding decisions. Literature shows that by using these characteristics, the performance of DTN routing
protocols have been improved in terms of delivery probability. The existing routing schemes used
community detection using aggregated contact duration and contact frequency which does not change over
the time period. We propose community detection through Inter Contact Time (ICT) between node pair
using power law distribution where the members of community are added and removed dynamically. We
also considered single copy of each message in entire network to reduce the network overhead. The
proposed routing protocol named Social Based Single Copy Routing (SBSCR) selects the suitable relay
node from the community members only based on the social metrics such as similarity and friendship
together. ICTs show power law nature in human mobility which is used to detect the community structure at
each node. A node maintains its own community and social metrics such as similarity and friendship with
other nodes. Whenever node has to select the relay node then it selects from its community with higher
value of social metric. The simulations are conducted using ONE simulator on the real traces of campus
and conference environments. SBSCR is compared with existing schemes and results show that it
outperforms in terms of delivery probability and delivery delay with comparable overhead ratio.
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
The document compares two handoff management protocols for 4G wireless networks: Mobile IPv6 (MIPv6) and Hierarchical Mobile IPv6 (HMIPv6). MIPv6 allows nodes to change their point of attachment to the Internet while maintaining ongoing communications. However, it causes high signaling traffic and latency during handoffs. HMIPv6 addresses this by separating local and global mobility management. It reduces signaling costs for intra-domain handoffs by using a mobility anchor point for local registration instead of the home agent. The document analyzes and compares the handoff latency of MIPv6 and HMIPv6, finding that HMIPv6 has lower latency for intra-domain handoffs by avoiding signaling to the home agent or correspondents
Flexible bloom for searching textual contentUvaraj Shan
This document presents the BloomCast scheme for efficient full-text retrieval in unstructured peer-to-peer networks. BloomCast replicates document content across the network in the form of Bloom filters to reduce communication costs while still guaranteeing recall. It hybridizes a lightweight distributed hash table with the unstructured overlay to support random node sampling and network size estimation. Queries are evaluated based on Bloom filter membership verification to support full-text searches with the potential for false positives but no false negatives. The system aims to provide efficient and effective full-text retrieval in unstructured P2P networks.
Secure intrusion detection and attack measure selection in virtual network sy...Uvaraj Shan
This document proposes NICE, a framework for secure intrusion detection and attack mitigation in virtual network systems. NICE uses distributed agents on cloud servers to monitor traffic, detect vulnerabilities, and generate attack graphs. It profiles virtual machines to identify their state and vulnerabilities. When potential attacks are detected, NICE can quarantine suspicious VMs and inspect their traffic. The attack analyzer correlates alerts, constructs attack graphs, and selects appropriate countermeasures based on the graphs. Evaluations show NICE can effectively detect attacks while minimizing performance overhead for the cloud system.
Secure intrusion detection and attack measure selectionUvaraj Shan
This document proposes NICE, a framework for secure intrusion detection and attack mitigation in virtual network systems. NICE uses distributed agents on cloud servers to monitor traffic, detect vulnerabilities, and generate attack graphs. It profiles virtual machines to identify their state and vulnerabilities. When potential attacks are detected, NICE can quarantine suspicious VMs and inspect their traffic. The attack analyzer correlates alerts, constructs attack graphs, and selects appropriate countermeasures based on the graphs. Evaluations show NICE can effectively detect attacks while minimizing performance overhead for the cloud system.
Effective data retrieval system with bloom in a unstructured p2p networkUvaraj Shan
1) Bloomcast is an efficient and effective full-text retrieval scheme for unstructured peer-to-peer (P2P) networks. It guarantees perfect recall rates with high probability while reducing communication costs.
2) Bloomcast replicates documents across the P2P network using Bloom filters rather than the raw data. This reduces storage and communication costs for replication.
3) By leveraging a hybrid P2P protocol, Bloomcast uniformly distributes items randomly across the network. This allows for random node sampling and network size estimation while supporting full-text searches with guaranteed recall within an O(√N) communication cost, where N is the network size.
This slides guide Tamil learning children to know about Name of flowers in Tamil language.The name of flowers are explained with clear pictures along with English name.This is the first part and other comes as follows.
This document presents two novel peer selection algorithms, DBaT-B and DBaT-N, for peer-to-peer content sharing over mobile cellular networks. DBaT-B selects peers to satisfy the requesting peer's minimum downlink bandwidth requirement, while balancing traffic load across cells. DBaT-N selects a specified number of peers such that the total uplink bandwidth exceeds the requester's downlink limit, again balancing loads. Both algorithms first choose the least busy cell and then select peers based on uplink bandwidth and service ability to meet the requester's needs while improving load balancing performance compared to traditional algorithms.
Flexible bloom for searching textual contentUvaraj Shan
This document describes BloomCast, a system that uses Bloom filters to encode document content and replicate it across peers in an unstructured peer-to-peer (P2P) network. BloomCast aims to achieve high recall for search queries at low communication cost. It hybridizes a lightweight distributed hash table (DHT) with the P2P overlay to enable random node sampling and network size estimation. The DHT helps meet two constraints: query and document replicas are randomly distributed across the network, and peers know the network size. By uniformly replicating content across the network, BloomCast can guarantee search recall. It utilizes Bloom filters to compress document replicas and reduce replication costs.
This slides guide Tamil learning children to know about Name of flowers in Tamil language.The name of flowers are explained with clear pictures. This also has English Language names also.
This slides guide Tamil learning children to know about Name of flowers in Tamil language.The name of flowers are explained with clear pictures. This also has English Language names also.
To allot secrecy-safe association rules mining schema using FP treeUvaraj Shan
This document proposes a secure frequent-pattern tree (FP-tree) based scheme to preserve private information while doing collaborative association rules mining between multiple parties. The scheme uses attribute-based encryption to create a global FP-tree for each party and homomorphic encryption to merge the FP-trees to obtain the final global association rules results without revealing individual transaction data. The scheme is proven to be secure and collusion-resistant against up to n-1 colluding parties attempting to learn honest respondents' private data or responses.
Two aspect authentication system using secure mobileUvaraj Shan
This document presents a two-factor authentication system that uses a user's mobile device. It combines one-time passwords as the first factor with encrypted user credentials stored on the mobile device as the second factor. The system is designed to provide strong authentication while reducing costs compared to hardware token-based systems. It analyzes the security of the approach and evaluates usability through a study. The study found participants were willing to accept lower usability for improved security when using untrusted computers.
Continental-continental convergence occurs when two continental plates collide and push against each other, forming large mountain ranges such as the Himalayas. When sedimentary layers between the plates are crumpled and folded, fold mountains are created, with anticlines where the rocks fold upward and synclines where they fold downward. Folds can be symmetrical, asymmetrical, isoclinal, overturned, or recumbent, depending on the orientation and steepness of the axial plane and limbs. Examples of fold mountain ranges include the Himalayas, Alps, Andes, Rockies, and Urals.
This sildes describes about Water a survival source for all living beings which has three form of state like solid,liquid and vapour form.Human body contain 72% of water.All living beings like Human,Animal,birds and Plants require water.Do not pollute water.Save water.
These slides explains about community helpers in our society.Depending upon professionals their works has being established and explained with pictures. This presentation guide children to learn about Community Helpers in our society.
The 2008 Sichuan earthquake in China's Sichuan province was measured at 7.9 on the Richter scale. It killed over 69,000 people and injured hundreds of thousands more. The shallow depth and long duration of the quake contributed to the extensive damage, leveling thousands of buildings including poorly constructed schools where many children died. Rebuilding the devastated areas cost around $1 trillion. Improved building codes and earthquake drills could have reduced the human and economic toll.
Node selection in p2 p content sharing service in mobile cellular networks wi...Uvaraj Shan
This document discusses node selection algorithms for peer-to-peer content sharing over mobile cellular networks that consider downlink bandwidth limitations. It proposes two novel algorithms (DBaT-B and DBaT-N) that select peer nodes to maximize load balancing across cells while meeting the requesting peer's bandwidth needs. DBaT-B selects peers to satisfy the requesting peer's minimum bandwidth requirement, while DBaT-N selects a certain number of peers as requested. Both algorithms first choose peers in the least busy cell to improve load balancing.
Node selection in p2 p content sharing service in mobile cellular networks wi...Uvaraj Shan
The document discusses node selection algorithms for peer-to-peer content sharing over mobile cellular networks that consider downlink bandwidth limitations. It proposes two algorithms: DBaT-B selects peers to meet a minimum requested bandwidth sum, prioritizing load balancing across cells. DBaT-N selects a requested number of peers where the bandwidth sum exceeds the downlink limit, again balancing cell loads. Both aim to satisfy bandwidth demands while distributing traffic evenly across the network. The paper then evaluates the algorithms' performance through simulation.
final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai", Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, Final Year Java Projects, Final Year ASP.NET Projects, Final Year VB.NET Projects, Final Year C# Projects, Final Year Visual C++ Projects, Final Year Matlab Projects, Final Year NS2 Projects, Final Year C Projects, Final Year Microcontroller Projects, Final Year ATMEL Projects, Final Year PIC Projects, Final Year ARM Projects, Final Year DSP Projects, Final Year VLSI Projects, Final Year FPGA Projects, Final Year CPLD Projects, Final Year Power Electronics Projects, Final Year Electrical Projects, Final Year Robotics Projects, Final Year Solor Projects, Final Year MEMS Projects, Final Year J2EE Projects, Final Year J2ME Projects, Final Year AJAX Projects, Final Year Structs Projects, Final Year EJB Projects, Final Year Real Time Projects, Final Year Live Projects, Final Year Student Projects, Final Year Engineering Projects, Final Year MCA Projects, Final Year MBA Projects, Final Year College Projects, Final Year BE Projects, Final Year BTech Projects, Final Year ME Projects, Final Year MTech Projects, Final Year M.Sc Projects, IEEE Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, IEEE 2009 Java Projects, IEEE 2009 ASP.NET Projects, IEEE 2009 VB.NET Projects, IEEE 2009 C# Projects, IEEE 2009 Visual C++ Projects, IEEE 2009 Matlab Projects, IEEE 2009 NS2 Projects, IEEE 2009 C Projects, IEEE 2009 Microcontroller Projects, IEEE 2009 ATMEL Projects, IEEE 2009 PIC Projects, IEEE 2009 ARM Projects, IEEE 2009 DSP Projects, IEEE 2009 VLSI Projects, IEEE 2009 FPGA Projects, IEEE 2009 CPLD Projects, IEEE 2009 Power Electronics Projects, IEEE 2009 Electrical Projects, IEEE 2009 Robotics Projects, IEEE 2009 Solor Projects, IEEE 2009 MEMS Projects, IEEE 2009 J2EE P
This document provides summaries of IEEE papers from various years between 2007-2009. It instructs the user to use Ctrl + F to search for papers from a specific year. For example, searching for "2009" would yield over 50 project summaries from that year. The document then provides an excerpt from an IEEE paper from 2009 on location-based services and privacy.
This document provides summaries of IEEE papers from various years between 2007-2009. It instructs the user to use Ctrl + F to search for papers from a specific year. For example, searching for "2009" would yield over 50 project summaries from that year. The document then provides an excerpt from an IEEE paper from 2009 on location-based services and privacy.
Real Time Projects, Live Projects, Student Projects, Engineering Projectsncct
final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai", Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, Final Year Java Projects, Final Year ASP.NET Projects, Final Year VB.NET Projects, Final Year C# Projects, Final Year Visual C++ Projects, Final Year Matlab Projects, Final Year NS2 Projects, Final Year C Projects, Final Year Microcontroller Projects, Final Year ATMEL Projects, Final Year PIC Projects, Final Year ARM Projects, Final Year DSP Projects, Final Year VLSI Projects, Final Year FPGA Projects, Final Year CPLD Projects, Final Year Power Electronics Projects, Final Year Electrical Projects, Final Year Robotics Projects, Final Year Solor Projects, Final Year MEMS Projects, Final Year J2EE Projects, Final Year J2ME Projects, Final Year AJAX Projects, Final Year Structs Projects, Final Year EJB Projects, Final Year Real Time Projects, Final Year Live Projects, Final Year Student Projects, Final Year Engineering Projects, Final Year MCA Projects, Final Year MBA Projects, Final Year College Projects, Final Year BE Projects, Final Year BTech Projects, Final Year ME Projects, Final Year MTech Projects, Final Year M.Sc Projects, IEEE Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, IEEE 2009 Java Projects, IEEE 2009 ASP.NET Projects, IEEE 2009 VB.NET Projects, IEEE 2009 C# Projects, IEEE 2009 Visual C++ Projects, IEEE 2009 Matlab Projects, IEEE 2009 NS2 Projects, IEEE 2009 C Projects, IEEE 2009 Microcontroller Projects, IEEE 2009 ATMEL Projects, IEEE 2009 PIC Projects, IEEE 2009 ARM Projects, IEEE 2009 DSP Projects, IEEE 2009 VLSI Projects, IEEE 2009 FPGA Projects, IEEE 2009 CPLD Projects, IEEE 2009 Power Electronics Projects, IEEE 2009 Electrical Projects, IEEE 2009 Robotics Projects, IEEE 2009 Solor Projects, IEEE 2009 MEMS Projects, IEEE 2009 J2EE P
final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai", Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, Final Year Java Projects, Final Year ASP.NET Projects, Final Year VB.NET Projects, Final Year C# Projects, Final Year Visual C++ Projects, Final Year Matlab Projects, Final Year NS2 Projects, Final Year C Projects, Final Year Microcontroller Projects, Final Year ATMEL Projects, Final Year PIC Projects, Final Year ARM Projects, Final Year DSP Projects, Final Year VLSI Projects, Final Year FPGA Projects, Final Year CPLD Projects, Final Year Power Electronics Projects, Final Year Electrical Projects, Final Year Robotics Projects, Final Year Solor Projects, Final Year MEMS Projects, Final Year J2EE Projects, Final Year J2ME Projects, Final Year AJAX Projects, Final Year Structs Projects, Final Year EJB Projects, Final Year Real Time Projects, Final Year Live Projects, Final Year Student Projects, Final Year Engineering Projects, Final Year MCA Projects, Final Year MBA Projects, Final Year College Projects, Final Year BE Projects, Final Year BTech Projects, Final Year ME Projects, Final Year MTech Projects, Final Year M.Sc Projects, IEEE Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, IEEE 2009 Java Projects, IEEE 2009 ASP.NET Projects, IEEE 2009 VB.NET Projects, IEEE 2009 C# Projects, IEEE 2009 Visual C++ Projects, IEEE 2009 Matlab Projects, IEEE 2009 NS2 Projects, IEEE 2009 C Projects, IEEE 2009 Microcontroller Projects, IEEE 2009 ATMEL Projects, IEEE 2009 PIC Projects, IEEE 2009 ARM Projects, IEEE 2009 DSP Projects, IEEE 2009 VLSI Projects, IEEE 2009 FPGA Projects, IEEE 2009 CPLD Projects, IEEE 2009 Power Electronics Projects, IEEE 2009 Electrical Projects, IEEE 2009 Robotics Projects, IEEE 2009 Solor Projects, IEEE 2009 MEMS Projects, IEEE 2009 J2EE P
final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai", Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, Final Year Java Projects, Final Year ASP.NET Projects, Final Year VB.NET Projects, Final Year C# Projects, Final Year Visual C++ Projects, Final Year Matlab Projects, Final Year NS2 Projects, Final Year C Projects, Final Year Microcontroller Projects, Final Year ATMEL Projects, Final Year PIC Projects, Final Year ARM Projects, Final Year DSP Projects, Final Year VLSI Projects, Final Year FPGA Projects, Final Year CPLD Projects, Final Year Power Electronics Projects, Final Year Electrical Projects, Final Year Robotics Projects, Final Year Solor Projects, Final Year MEMS Projects, Final Year J2EE Projects, Final Year J2ME Projects, Final Year AJAX Projects, Final Year Structs Projects, Final Year EJB Projects, Final Year Real Time Projects, Final Year Live Projects, Final Year Student Projects, Final Year Engineering Projects, Final Year MCA Projects, Final Year MBA Projects, Final Year College Projects, Final Year BE Projects, Final Year BTech Projects, Final Year ME Projects, Final Year MTech Projects, Final Year M.Sc Projects, IEEE Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, IEEE 2009 Java Projects, IEEE 2009 ASP.NET Projects, IEEE 2009 VB.NET Projects, IEEE 2009 C# Projects, IEEE 2009 Visual C++ Projects, IEEE 2009 Matlab Projects, IEEE 2009 NS2 Projects, IEEE 2009 C Projects, IEEE 2009 Microcontroller Projects, IEEE 2009 ATMEL Projects, IEEE 2009 PIC Projects, IEEE 2009 ARM Projects, IEEE 2009 DSP Projects, IEEE 2009 VLSI Projects, IEEE 2009 FPGA Projects, IEEE 2009 CPLD Projects, IEEE 2009 Power Electronics Projects, IEEE 2009 Electrical Projects, IEEE 2009 Robotics Projects, IEEE 2009 Solor Projects, IEEE 2009 MEMS Projects, IEEE 2009 J2EE P
final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai", Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, Final Year Java Projects, Final Year ASP.NET Projects, Final Year VB.NET Projects, Final Year C# Projects, Final Year Visual C++ Projects, Final Year Matlab Projects, Final Year NS2 Projects, Final Year C Projects, Final Year Microcontroller Projects, Final Year ATMEL Projects, Final Year PIC Projects, Final Year ARM Projects, Final Year DSP Projects, Final Year VLSI Projects, Final Year FPGA Projects, Final Year CPLD Projects, Final Year Power Electronics Projects, Final Year Electrical Projects, Final Year Robotics Projects, Final Year Solor Projects, Final Year MEMS Projects, Final Year J2EE Projects, Final Year J2ME Projects, Final Year AJAX Projects, Final Year Structs Projects, Final Year EJB Projects, Final Year Real Time Projects, Final Year Live Projects, Final Year Student Projects, Final Year Engineering Projects, Final Year MCA Projects, Final Year MBA Projects, Final Year College Projects, Final Year BE Projects, Final Year BTech Projects, Final Year ME Projects, Final Year MTech Projects, Final Year M.Sc Projects, IEEE Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, IEEE 2009 Java Projects, IEEE 2009 ASP.NET Projects, IEEE 2009 VB.NET Projects, IEEE 2009 C# Projects, IEEE 2009 Visual C++ Projects, IEEE 2009 Matlab Projects, IEEE 2009 NS2 Projects, IEEE 2009 C Projects, IEEE 2009 Microcontroller Projects, IEEE 2009 ATMEL Projects, IEEE 2009 PIC Projects, IEEE 2009 ARM Projects, IEEE 2009 DSP Projects, IEEE 2009 VLSI Projects, IEEE 2009 FPGA Projects, IEEE 2009 CPLD Projects, IEEE 2009 Power Electronics Projects, IEEE 2009 Electrical Projects, IEEE 2009 Robotics Projects, IEEE 2009 Solor Projects, IEEE 2009 MEMS Projects, IEEE 2009 J2EE P
final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai", Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, Final Year Java Projects, Final Year ASP.NET Projects, Final Year VB.NET Projects, Final Year C# Projects, Final Year Visual C++ Projects, Final Year Matlab Projects, Final Year NS2 Projects, Final Year C Projects, Final Year Microcontroller Projects, Final Year ATMEL Projects, Final Year PIC Projects, Final Year ARM Projects, Final Year DSP Projects, Final Year VLSI Projects, Final Year FPGA Projects, Final Year CPLD Projects, Final Year Power Electronics Projects, Final Year Electrical Projects, Final Year Robotics Projects, Final Year Solor Projects, Final Year MEMS Projects, Final Year J2EE Projects, Final Year J2ME Projects, Final Year AJAX Projects, Final Year Structs Projects, Final Year EJB Projects, Final Year Real Time Projects, Final Year Live Projects, Final Year Student Projects, Final Year Engineering Projects, Final Year MCA Projects, Final Year MBA Projects, Final Year College Projects, Final Year BE Projects, Final Year BTech Projects, Final Year ME Projects, Final Year MTech Projects, Final Year M.Sc Projects, IEEE Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, IEEE 2009 Java Projects, IEEE 2009 ASP.NET Projects, IEEE 2009 VB.NET Projects, IEEE 2009 C# Projects, IEEE 2009 Visual C++ Projects, IEEE 2009 Matlab Projects, IEEE 2009 NS2 Projects, IEEE 2009 C Projects, IEEE 2009 Microcontroller Projects, IEEE 2009 ATMEL Projects, IEEE 2009 PIC Projects, IEEE 2009 ARM Projects, IEEE 2009 DSP Projects, IEEE 2009 VLSI Projects, IEEE 2009 FPGA Projects, IEEE 2009 CPLD Projects, IEEE 2009 Power Electronics Projects, IEEE 2009 Electrical Projects, IEEE 2009 Robotics Projects, IEEE 2009 Solor Projects, IEEE 2009 MEMS Projects, IEEE 2009 J2EE P
final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai", Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, Final Year Java Projects, Final Year ASP.NET Projects, Final Year VB.NET Projects, Final Year C# Projects, Final Year Visual C++ Projects, Final Year Matlab Projects, Final Year NS2 Projects, Final Year C Projects, Final Year Microcontroller Projects, Final Year ATMEL Projects, Final Year PIC Projects, Final Year ARM Projects, Final Year DSP Projects, Final Year VLSI Projects, Final Year FPGA Projects, Final Year CPLD Projects, Final Year Power Electronics Projects, Final Year Electrical Projects, Final Year Robotics Projects, Final Year Solor Projects, Final Year MEMS Projects, Final Year J2EE Projects, Final Year J2ME Projects, Final Year AJAX Projects, Final Year Structs Projects, Final Year EJB Projects, Final Year Real Time Projects, Final Year Live Projects, Final Year Student Projects, Final Year Engineering Projects, Final Year MCA Projects, Final Year MBA Projects, Final Year College Projects, Final Year BE Projects, Final Year BTech Projects, Final Year ME Projects, Final Year MTech Projects, Final Year M.Sc Projects, IEEE Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, IEEE 2009 Java Projects, IEEE 2009 ASP.NET Projects, IEEE 2009 VB.NET Projects, IEEE 2009 C# Projects, IEEE 2009 Visual C++ Projects, IEEE 2009 Matlab Projects, IEEE 2009 NS2 Projects, IEEE 2009 C Projects, IEEE 2009 Microcontroller Projects, IEEE 2009 ATMEL Projects, IEEE 2009 PIC Projects, IEEE 2009 ARM Projects, IEEE 2009 DSP Projects, IEEE 2009 VLSI Projects, IEEE 2009 FPGA Projects, IEEE 2009 CPLD Projects, IEEE 2009 Power Electronics Projects, IEEE 2009 Electrical Projects, IEEE 2009 Robotics Projects, IEEE 2009 Solor Projects, IEEE 2009 MEMS Projects, IEEE 2009 J2EE P
final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai", Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, Final Year Java Projects, Final Year ASP.NET Projects, Final Year VB.NET Projects, Final Year C# Projects, Final Year Visual C++ Projects, Final Year Matlab Projects, Final Year NS2 Projects, Final Year C Projects, Final Year Microcontroller Projects, Final Year ATMEL Projects, Final Year PIC Projects, Final Year ARM Projects, Final Year DSP Projects, Final Year VLSI Projects, Final Year FPGA Projects, Final Year CPLD Projects, Final Year Power Electronics Projects, Final Year Electrical Projects, Final Year Robotics Projects, Final Year Solor Projects, Final Year MEMS Projects, Final Year J2EE Projects, Final Year J2ME Projects, Final Year AJAX Projects, Final Year Structs Projects, Final Year EJB Projects, Final Year Real Time Projects, Final Year Live Projects, Final Year Student Projects, Final Year Engineering Projects, Final Year MCA Projects, Final Year MBA Projects, Final Year College Projects, Final Year BE Projects, Final Year BTech Projects, Final Year ME Projects, Final Year MTech Projects, Final Year M.Sc Projects, IEEE Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, IEEE 2009 Java Projects, IEEE 2009 ASP.NET Projects, IEEE 2009 VB.NET Projects, IEEE 2009 C# Projects, IEEE 2009 Visual C++ Projects, IEEE 2009 Matlab Projects, IEEE 2009 NS2 Projects, IEEE 2009 C Projects, IEEE 2009 Microcontroller Projects, IEEE 2009 ATMEL Projects, IEEE 2009 PIC Projects, IEEE 2009 ARM Projects, IEEE 2009 DSP Projects, IEEE 2009 VLSI Projects, IEEE 2009 FPGA Projects, IEEE 2009 CPLD Projects, IEEE 2009 Power Electronics Projects, IEEE 2009 Electrical Projects, IEEE 2009 Robotics Projects, IEEE 2009 Solor Projects, IEEE 2009 MEMS Projects, IEEE 2009 J2EE P
final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai", Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, Final Year Java Projects, Final Year ASP.NET Projects, Final Year VB.NET Projects, Final Year C# Projects, Final Year Visual C++ Projects, Final Year Matlab Projects, Final Year NS2 Projects, Final Year C Projects, Final Year Microcontroller Projects, Final Year ATMEL Projects, Final Year PIC Projects, Final Year ARM Projects, Final Year DSP Projects, Final Year VLSI Projects, Final Year FPGA Projects, Final Year CPLD Projects, Final Year Power Electronics Projects, Final Year Electrical Projects, Final Year Robotics Projects, Final Year Solor Projects, Final Year MEMS Projects, Final Year J2EE Projects, Final Year J2ME Projects, Final Year AJAX Projects, Final Year Structs Projects, Final Year EJB Projects, Final Year Real Time Projects, Final Year Live Projects, Final Year Student Projects, Final Year Engineering Projects, Final Year MCA Projects, Final Year MBA Projects, Final Year College Projects, Final Year BE Projects, Final Year BTech Projects, Final Year ME Projects, Final Year MTech Projects, Final Year M.Sc Projects, IEEE Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, IEEE 2009 Java Projects, IEEE 2009 ASP.NET Projects, IEEE 2009 VB.NET Projects, IEEE 2009 C# Projects, IEEE 2009 Visual C++ Projects, IEEE 2009 Matlab Projects, IEEE 2009 NS2 Projects, IEEE 2009 C Projects, IEEE 2009 Microcontroller Projects, IEEE 2009 ATMEL Projects, IEEE 2009 PIC Projects, IEEE 2009 ARM Projects, IEEE 2009 DSP Projects, IEEE 2009 VLSI Projects, IEEE 2009 FPGA Projects, IEEE 2009 CPLD Projects, IEEE 2009 Power Electronics Projects, IEEE 2009 Electrical Projects, IEEE 2009 Robotics Projects, IEEE 2009 Solor Projects, IEEE 2009 MEMS Projects, IEEE 2009 J2EE P
final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai", Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, Final Year Java Projects, Final Year ASP.NET Projects, Final Year VB.NET Projects, Final Year C# Projects, Final Year Visual C++ Projects, Final Year Matlab Projects, Final Year NS2 Projects, Final Year C Projects, Final Year Microcontroller Projects, Final Year ATMEL Projects, Final Year PIC Projects, Final Year ARM Projects, Final Year DSP Projects, Final Year VLSI Projects, Final Year FPGA Projects, Final Year CPLD Projects, Final Year Power Electronics Projects, Final Year Electrical Projects, Final Year Robotics Projects, Final Year Solor Projects, Final Year MEMS Projects, Final Year J2EE Projects, Final Year J2ME Projects, Final Year AJAX Projects, Final Year Structs Projects, Final Year EJB Projects, Final Year Real Time Projects, Final Year Live Projects, Final Year Student Projects, Final Year Engineering Projects, Final Year MCA Projects, Final Year MBA Projects, Final Year College Projects, Final Year BE Projects, Final Year BTech Projects, Final Year ME Projects, Final Year MTech Projects, Final Year M.Sc Projects, IEEE Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, IEEE 2009 Java Projects, IEEE 2009 ASP.NET Projects, IEEE 2009 VB.NET Projects, IEEE 2009 C# Projects, IEEE 2009 Visual C++ Projects, IEEE 2009 Matlab Projects, IEEE 2009 NS2 Projects, IEEE 2009 C Projects, IEEE 2009 Microcontroller Projects, IEEE 2009 ATMEL Projects, IEEE 2009 PIC Projects, IEEE 2009 ARM Projects, IEEE 2009 DSP Projects, IEEE 2009 VLSI Projects, IEEE 2009 FPGA Projects, IEEE 2009 CPLD Projects, IEEE 2009 Power Electronics Projects, IEEE 2009 Electrical Projects, IEEE 2009 Robotics Projects, IEEE 2009 Solor Projects, IEEE 2009 MEMS Projects, IEEE 2009 J2EE P
final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai", Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, Final Year Java Projects, Final Year ASP.NET Projects, Final Year VB.NET Projects, Final Year C# Projects, Final Year Visual C++ Projects, Final Year Matlab Projects, Final Year NS2 Projects, Final Year C Projects, Final Year Microcontroller Projects, Final Year ATMEL Projects, Final Year PIC Projects, Final Year ARM Projects, Final Year DSP Projects, Final Year VLSI Projects, Final Year FPGA Projects, Final Year CPLD Projects, Final Year Power Electronics Projects, Final Year Electrical Projects, Final Year Robotics Projects, Final Year Solor Projects, Final Year MEMS Projects, Final Year J2EE Projects, Final Year J2ME Projects, Final Year AJAX Projects, Final Year Structs Projects, Final Year EJB Projects, Final Year Real Time Projects, Final Year Live Projects, Final Year Student Projects, Final Year Engineering Projects, Final Year MCA Projects, Final Year MBA Projects, Final Year College Projects, Final Year BE Projects, Final Year BTech Projects, Final Year ME Projects, Final Year MTech Projects, Final Year M.Sc Projects, IEEE Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, IEEE 2009 Java Projects, IEEE 2009 ASP.NET Projects, IEEE 2009 VB.NET Projects, IEEE 2009 C# Projects, IEEE 2009 Visual C++ Projects, IEEE 2009 Matlab Projects, IEEE 2009 NS2 Projects, IEEE 2009 C Projects, IEEE 2009 Microcontroller Projects, IEEE 2009 ATMEL Projects, IEEE 2009 PIC Projects, IEEE 2009 ARM Projects, IEEE 2009 DSP Projects, IEEE 2009 VLSI Projects, IEEE 2009 FPGA Projects, IEEE 2009 CPLD Projects, IEEE 2009 Power Electronics Projects, IEEE 2009 Electrical Projects, IEEE 2009 Robotics Projects, IEEE 2009 Solor Projects, IEEE 2009 MEMS Projects, IEEE 2009 J2EE P
3 S W 2009 I E E E Abstracts Java, N C C T Chennaincct
final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai", Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, Final Year Java Projects, Final Year ASP.NET Projects, Final Year VB.NET Projects, Final Year C# Projects, Final Year Visual C++ Projects, Final Year Matlab Projects, Final Year NS2 Projects, Final Year C Projects, Final Year Microcontroller Projects, Final Year ATMEL Projects, Final Year PIC Projects, Final Year ARM Projects, Final Year DSP Projects, Final Year VLSI Projects, Final Year FPGA Projects, Final Year CPLD Projects, Final Year Power Electronics Projects, Final Year Electrical Projects, Final Year Robotics Projects, Final Year Solor Projects, Final Year MEMS Projects, Final Year J2EE Projects, Final Year J2ME Projects, Final Year AJAX Projects, Final Year Structs Projects, Final Year EJB Projects, Final Year Real Time Projects, Final Year Live Projects, Final Year Student Projects, Final Year Engineering Projects, Final Year MCA Projects, Final Year MBA Projects, Final Year College Projects, Final Year BE Projects, Final Year BTech Projects, Final Year ME Projects, Final Year MTech Projects, Final Year M.Sc Projects, IEEE Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, IEEE 2009 Java Projects, IEEE 2009 ASP.NET Projects, IEEE 2009 VB.NET Projects, IEEE 2009 C# Projects, IEEE 2009 Visual C++ Projects, IEEE 2009 Matlab Projects, IEEE 2009 NS2 Projects, IEEE 2009 C Projects, IEEE 2009 Microcontroller Projects, IEEE 2009 ATMEL Projects, IEEE 2009 PIC Projects, IEEE 2009 ARM Projects, IEEE 2009 DSP Projects, IEEE 2009 VLSI Projects, IEEE 2009 FPGA Projects, IEEE 2009 CPLD Projects, IEEE 2009 Power Electronics Projects, IEEE 2009 Electrical Projects, IEEE 2009 Robotics Projects, IEEE 2009 Solor Projects, IEEE 2009 MEMS Projects, IEEE 2009 J2EE P
Service Based Content Sharing in the Environment of Mobile Ad-hoc NetworksIOSR Journals
This document discusses service-based content sharing in mobile ad-hoc networks. It proposes a peer-to-peer file sharing system that allows efficient content distribution using low-cost Bluetooth links. Peers discover each other via scanning and share subscribed content in segments over Bluetooth. The system was implemented on Blackberry and Windows Mobile smartphones to test feasibility. Tests showed file transfers were practical between mobile devices using this approach, with segment size having little effect on performance.
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
Similar to Node selection in Peer-to-Peer content sharing service in mobile cellular networks with Reduction Bandwidth (20)
Two aspect authentication system using secure mobile devicesUvaraj Shan
This document summarizes a research paper that proposes a two-factor authentication system using mobile devices. The system uses one-time passwords as the first authentication factor and encrypted user credentials stored on a mobile phone as the second factor. The system is designed to provide strong authentication while reducing costs compared to token-based systems. It analyzes the security of the approach and evaluates usability through a study where participants accepted lower usability for improved security of their credentials.
Textual based retrieval system with bloom in unstructured Peer-to-Peer networksUvaraj Shan
This document summarizes a research article about a textual retrieval system using Bloom filters in unstructured peer-to-peer networks. It discusses how Bloom Cast replicates document content across the network using Bloom filters to encode documents. This allows for efficient full-text searches with guaranteed recall rates while reducing communication costs compared to replicating raw documents. The system samples nodes randomly using a lightweight distributed hash table to support searches in an unstructured P2P network where the network size is unknown.
Two aspect authentication system using secureUvaraj Shan
This document proposes a two-factor authentication system using mobile devices. It uses a combination of one-time passwords (OTP) as the first factor and encrypted user credentials stored on a mobile device as the second factor. An OTP algorithm is developed that uses aspects like the IMEI, IMSI, username, PIN, hour and minute to generate unique passwords. The system can operate in a standalone mode where OTPs are generated locally on devices, or an SMS-based mode where OTPs are requested from the server. Security and usability evaluations show the system protects against attacks while being usable.
Two aspect authentication system using secureUvaraj Shan
This document proposes a two-factor authentication system using mobile devices. It uses a combination of one-time passwords (OTP) as the first factor and encrypted user credentials stored on the mobile device as the second factor. An OTP algorithm is developed that uses aspects like the IMEI, IMSI, username, PIN, hour and minute to generate unique and hard to guess passwords. The system can operate in two modes - a connectionless mode where OTP is generated locally on the device, or an SMS-based mode where the device requests the OTP from the server via SMS. A security and usability analysis is presented, showing the system is secure against various attacks and users are willing to accept lower usability for higher security.
This document summarizes the Flexible Bloom system for searching textual content in an unstructured peer-to-peer overlay network. Flexible Bloom utilizes Bloom filters to encode entire documents and replicates document copies randomly and uniformly across the network to guarantee recall at a low communication cost. It hybridizes a lightweight distributed hash table with the unstructured overlay to support random node sampling and network size estimation. Peers in the peer-to-peer network are identified by self-issued identity certificates without a central certification authority due to the unmanaged nature of the network.
Effective Data Retrieval System with Bloom in a Unstructured p2p NetworkUvaraj Shan
1) Bloomcast is an efficient and effective full-text retrieval scheme for unstructured peer-to-peer (P2P) networks. It guarantees perfect recall rates with high probability while reducing communication costs.
2) Bloomcast replicates documents across the P2P network using Bloom filters rather than the raw data. This reduces storage and communication costs for replication.
3) By leveraging a hybrid P2P protocol, Bloomcast uniformly distributes items randomly across the network. This allows for random node sampling and network size estimation while guaranteeing recall at a communication cost of O(√N), where N is the network size.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
Assessment and Planning in Educational technology.pptxKavitha Krishnan
In an education system, it is understood that assessment is only for the students, but on the other hand, the Assessment of teachers is also an important aspect of the education system that ensures teachers are providing high-quality instruction to students. The assessment process can be used to provide feedback and support for professional development, to inform decisions about teacher retention or promotion, or to evaluate teacher effectiveness for accountability purposes.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
Physiology and chemistry of skin and pigmentation, hairs, scalp, lips and nail, Cleansing cream, Lotions, Face powders, Face packs, Lipsticks, Bath products, soaps and baby product,
Preparation and standardization of the following : Tonic, Bleaches, Dentifrices and Mouth washes & Tooth Pastes, Cosmetics for Nails.
Node selection in Peer-to-Peer content sharing service in mobile cellular networks with Reduction Bandwidth
1. American Journal of Networks and Communications
2013; 2(2): 40-46
Published online June 10, 2013 (http://www.sciencepublishinggroup.com/j/ajnc)
doi: 10.11648/j.ajnc.20130202.13
Node selection in Peer-to-Peer content sharing service in
mobile cellular networks with Reduction Bandwidth
S. Uvaraj1
, S. Suresh2
, E. Mohan3
1
Arulmigu Meenakshi Amman College of Engineering, Kanchipuram, India
2
Sri Venkateswara College of Engineering, Chennai, India
3
Pallavan College of Engineering, Kanchipuram, India
Email address:
ujrj@rediffmail.com(S. Uvaraj), ss12oct92@gmail.com(S. Suresh), emohan1971@gmail.com(E. Mohan)
To cite this article:
S. Uvaraj, S. Suresh, E. Mohan Node Selection in P2P Content Sharing Service in Mobile Cellular Networks with Reduction Bandwidth
American Journal of Networks and Communications Vol. 2, No. 2, 2013, pp. 40-46. doi: 10.11648/j.ajnc.20130202.13
Abstract: The peer-to-peer service has entered the public limelight over the last few years. Several research
projects are underway on peer-to-peer technologies, but no definitive conclusion is currently available.
Comparing to traditional server-client technology on the internet, the P2P technology has capabilities to
realize highly scalable, extensible and efficient distributed applications. At the same time mobile networks such as
WAP, wireless LAN and Bluetooth have been developing at breakneck speed. Demand for using peer-to-peer applica-
tions over PDAs and cellular phones is increasing. The purpose of this study is to explore a mobile peer-to-peer network
architecture where a variety of devices communications each other over a variety of networks. In this paper, we pro-
pose the architecture well-adapted to mobile devices and mobile network. In P2P file sharing systems over mobile cel-
lular networks, the bottleneck of file transfer speed is usually the downlink bandwidth of the receiver rather than the uplink
bandwidth of the senders. In this paper we consider the impact of downlink bandwidth limitation on file transfer speed and
propose two novel peer selection algorithms named DBaT-B and DBaT-N, which are designed for two different cases of
the requesting peer’s demand respectively. Our algorithms take the requesting peer’s downlink bandwidth as the target of
the sum of the selected peers’ uplink bandwidth. To ensure load balance on cells, they will first choose a cell with the low-
est traffic load before choosing each peer.
Keywords: Network Security, P2P, Mobile Cellular Networks, Peer Selection, Load Balance, Reduction Bandwidth
1. Introduction
In the cooperated network, the server-client technology
has been used as the traditional way to handle network re-
sources and provide Internet services. It has advantages to
regulate Internet services by only maintain limited number
of central servers. As a result, peer-to-peer technology has
become popular and has been used in networks which
manage vast amounts of data daily, and balance the load
over a large number of servers.
At the same time, mobile Internet services have become
very popular. In the past four years, the market of mobile
Internet services has considerably grown successful in Japan
where imode is the most famous example. The mobile en-
vironment is different from the fixed Internet in that it is an
extremely constrained environment, in terms of both com-
munication and terminal capabilities. This should be taken
into account when developing systems which will work in
a mobile environment. Additionally, various wireless have
been emerging of network environments such as IMT-2000
(International Mobile Telecommunications-2000, for ex-
ample FOMA)[10], Wireless LAN and Bluetooth, and us-
ers can select them to satisfy their network demands. In the
near future, an environment where many sensors, users and
different kind of objects exist, move and communicate with
one another, called “ubiquitous communication environ-
ment”, will appear.
In this paper we study the problems of peer selection in
P2P file sharing systems over mobile cellular networks
with consideration of downlink bandwidth limitation. Our
motivation is that, since the file transfer speed is limited by
the requesting peer’s downlink bandwidth, some other per-
formance indicator such as load balance on cells should be
focused on. So our goal is to achieve load balance on cells
under the precondition that the requesting peer’s demand is
satisfied. In P2P file sharing systems the requesting peer’s
2. American Journal of Networks and Communications 2013; 2(2): 40-46 41
demand can be divided into two cases, one is that the re-
questing peer demands a lower bound of the sum of the
selected peers’ uplink bandwidth (as in some P2P media
sharing systems [5]), and the other is that the requesting
peer demands a certain number of selected peers (denoted
as Numwant in BitTorrent Tracker protocol [6]). We con-
sider the two cases both and propose two algorithms for the
two cases respectively. The first one is named DBaT-B
(Downlink Bandwidth as Target, Bandwidth satisfied), and
the second one is named DBaT-N (Downlink Bandwidth as
Target, Number satisfied). Major features of our algorithms
can be described as follows. First, they take the requesting
peer’s downlink bandwidth as the target of the sum of the
selected peers’ uplink bandwidth. Second, they choose a
cell with the lowest traffic load before choosing each peer.
Difference of the two algorithms lies in using different
criteria in each peer selection round to satisfy the different
demand. Moreover, we also provide a Fuzzy Cognitive
Map (FCM) [7] that can be used in our algorithms to esti-
mate peers’ service ability according to multiple influential
factors. Simulation results show that in respective cases
DBaT-B and DBaT-N algorithms can both achieve favora-
ble load balance on cells in mobile cellular networks while
ensuring good file transfer speed, and compared with other
two traditional peer selection algorithms our algorithms are
nice improvements.
The principal goal of our work is thus to design a mobile
peer-to-peer architecture and a general peer-to-peer plat-
form that enhances communication capabilities for mobile
clients, by utilizing network resources efficiently and sup-
porting mobility in an integrated and practical way.
The rest of this paper is organized as follows. Section 2
gives an overview of our peer-to-peer architecture, de-
scribes each key element of our architecture and mobile
device adaptation. Section 3 describes the Algorithm de-
sign. We introduce DBAT-B and DBAT-N algorithms in
detail. Section 4 we present the FCM that can be used in
our algorithms. In Section 5 we evaluate the performance
of our algorithms through simulations. Finally we give out
conclusions for this paper.
2. Architecture
2.1. Architecture Overview
The proposed mobile peer-to-peer architecture is shown
in Fig. 1. All of the peer-to-peer communication entities
that have a common set of interest and obey a common set
of policies construct one peer-to-peer community. This
architecture consists of the following basic components:
Peer-to-peer node: The peer-to-peer node is an indepen-
dent communication entity in the peer-to-peer network.
Mobile proxy: Theoretically, all the mobile devices (e.g.
WAP or i-mode terminals) can be independent nodes in the
peer-to peer architecture. However some of them are func-
tionally limited and cannot act as autonomous nodes. The
mobile proxy is a function in a node, which acts as a proxy
for the mobile devices with constrained capability, so that
these mobile devices can join the peer-to-peer architecture.
Pure peer-to-peer architecture: There are only peer-to-
peer nodes in the pure peer-to-peer architecture. The pro-
posed pure peer-to-peer architecture is shown in Fig. 2 (a).
The connection between peer-to-peer nodes is established
on their mutual trust. Each peer-to-peer node is an inde-
pendent entity and can participate in and leave the peer-to-
peer network at its convenience. Messages are sent from a
peer-to-peer node to another one directly or by passing
them via some intermediary peer-to-peer nodes.
Fig 1. The mobile peer-to-peer architecture
Fig 2. Pure peer-to-peer and hybrid peer-to-peer
Hybrid peer-to-peer architecture: The hybrid peer-to-
peer architecture resolves the disadvantages of the pure
peer-to-peer architecture such as inefficient routing, splits
of network and lack of security, by introducing a control
node. The proposed hybrid peer-to-peer architecture is
shown Fig. 2 (b). In our architecture, the control node pro-
vides the functions for providing routing information to a
destination node, discovering the first peer-to-peer node,
recovering from the splitting of the peer-to-peer network,
improving the network topology and security such as au-
thentication, in order to improve the inefficiency of the
pure peer-to-peer architecture. To realize the hybrid peer-
to-peer architecture, the control node and the gateway node
are defined.
Control node: Control node is an administrative entity
which manages a peer-to-peer community in the peer-to-
peer network. It provides several functions independent of
particular applications such as name resolution, route in-
formation provision, the first per-to-peer discovery, net-
3. 42 S. Uvaraj et al.: Node Selection in P2P Content Sharing Service in Mobile Cellular
Networks with Reduction Bandwidth
work topology optimization, node authentication and mul-
ticast group management.
Gateway node: Gateway node is a connection entity
linking between a pure peer-to-peer network and a hybrid
peer-to-peer network. It provides for nodes in pure peer-to-
peer network with several proxy functions such as routing
information provision, node authentication, and multicast
group management. A control node receives a request from
a peer-to-peer node and provides it with routing informa-
tion, topology optimization function and security function.
A gateway node collects topology information on a pure
peer-to-peer network and reports it to the control node.
2.2. Mobile Device Adaptation
Another distinct characteristic of this architecture is that
it allows mobile devices to take part in the peer-to-peer
network via a mobile proxy node. While a mobile device,
such as a cellular phone, may have enough capabilities to
act as an independent peer-to-peer node in the future, it still
has the following limitations at this time:
• Limited storage
• Small runtime heap
• Modest processor performance
• Constrained electrical power
Thus, a current mobile device can’t fully perform the
role of a peer-to-peer node that offers services to other
peer-to-peer nodes in a peer-to-peer network. In order to
incorporate a mobile device into a peer-to-peer network,
some functions must be done by other nodes on behalf of a
mobile device. Through the cooperation of a mobile proxy,
a mobile device can virtually act as a peer-to-peer node and
can perform the necessary functions in the peer-to-peer
architecture. From the point of view of the peer-to-peer
architecture, mobile devices are modeled in the three ways.
In Fig.3(a), mobile devices share the same proxy node.
From the point of view of the network, the mobile proxy
acts as one peer-to-peer node. In Fig. 3(b), a mobile device
has its own node name and acts as a separate peer-to-peer
node in the peer-to-peer architecture.
Fig 3. Mobile Device Adaptation
For realizing this type of mobile proxy, some proxy
functions should be implemented on Node C such as trans-
forming a message received from a mobile device into a
message of a peer-to-peer protocol. In Fig. 3(c), a pair of a
mobile device and a proxy function constructs a peer-to-
peer node in the peer-to-peer architecture. In this case, a
mobile device has its own node name, and acts as a sepa-
rate node through a mobile proxy. The mobile proxy does
not act as an independent node. It will be decided by re-
quirements of peer- to- peer applications, as to which type
of mobile proxy model will be preferable.
3. Dbat Algorithms
In this section we depict the details about DBaT-B and
DBaT-N algorithms, which can be denoted as DBaT algo-
rithms as a whole. Due to the existence of downlink band-
width limitation, it is unnecessary to always choose peers
with high uplink bandwidth. So DBaT algorithms take the
requesting peer’s downlink bandwidth as the target of the
sum of the selected peers’ uplink bandwidth. Besides, to
ensure load balance on cells, DBaT algorithms will first
choose a cell with the lowest traffic load before choosing a
peer.
In DBaT algorithms service ability is used as one of the
criteria for peer selection. As we have mentioned before, in
mobile environments estimation of peers’ service ability is
complicated since it is influenced by multiple factors. In
this section we just focus on the details of DBaT algo-
rithms. A method about how to estimate peers’ service
ability in P2P file sharing systems over mobile cellular
networks will be provided in next section. Here we list the
common notations used in this section and their meanings:
The traffic load on a cell is defined as the ratio of the
current used radio bandwidth over the total radio band-
width of the base station in the cell. For example, assuming
that the current used radio bandwidth of a 3G base station
is 1.2Mbps, the traffic load on this cell is 0.6 since the
maximum radio bandwidth provided by this 3G base sta-
tion is 2Mbps.Obviously the value of traffic load on a cell
ranges from 0 to 1.
3.1. Dbat-B Algorithm
DBaT-B algorithm is designed for the case that the re-
questing peer demands a lower bound (denoted as Bd) of
the sum of the selected peers’ uplink bandwidth. The rela-
tionship between Bd and Br can be discussed as follows.
4. American Journal of Networks and Communications 2013; 2(2): 40-46 43
On one hand, if Bd is higher than Br, it makes no sense due
to the performance limitation imposed by Br. On the other
hand, if Bd is lower than
Br, we can easily take Bd as Br and DBaT-B algorithm
still works. Here we list the notations used in this subsec-
tion and their meanings:
• Bs: Sum of the estimated uplink bandwidth of the se-
lected peers. Initial value of Bs is 0.
• ∆B: Difference between Br and Bs, more specifically,
∆B = Bs – Br.
In more detail, DBaT-B algorithm works in the follow-
ing steps:
Step 1. Choose a cell:
1-1. Sort the cells according to the traffic load;
1-2. Choose a cell with the lowest traffic load, go to
Step 2.
Step 2. Check all the peers in this cell with Bpa and |∆B|:
2-1. Compare the values of Bpa of all the candidate
peers in this cell with |∆B|;
2-2. If there is no peer satisfying Bp a > |∆B|, go to Step
3, otherwise go to Step 4.
Step 3. Choose a peer in this cell according to service
ability:
3-1. Choose a peer with the highest service ability in
this cell;
3-2. Calculate Lest for this cell according to (1), calcu-
late Bpe according to (2);
3-3. Recalculate Bs and ∆B, go to Step 1.
Step 4. Check all the peers in this cell with Bpe and |∆B|:
4-1. Calculate the value of Lest and Bpe for each candi-
date peer that satisfies Bp a > |∆B| in this cell;
4-2. Compare the values of Bpe of all the peers that sa-
tisfy Bp a > |∆B| in this cell with |∆B|;
4-3. If there is no peer satisfying Bpe > |∆B|, go to Step
3, otherwise go to Step 5.
Step 5. Choose a peer in this cell according to service
ability, Bpe and |∆B|:
5-1. Choose a peer with the highest value of estimated
service ability from the peers that satisfy Bpe >
|∆B| in this cell;
5-2. Recalculate Bs and ∆B, end the peer selection
process.
3.2. Dbat -N Algorithm
DBaT-N algorithm is designed for the case that the re-
questing peer demands a certain number of selected peers.
In traditional fixed network environments, file transfer
speed usually increases with more serving peers. However,
in mobile cellular network environments, file transfer
speed may not increase as the number of serving peers in-
creases because it would be bottlenecked by the downlink
bandwidth limitation. So the motivation of DBaT-N is to
choose a certain number of selected peers whose sum of
uplink bandwidth is fitly over Br. Here we list the notations
used in this subsection and their meanings:
In each peer selection round, Bref can be seen as a fixed
target of the selected peer’s uplink bandwidth, B’ can be
seen as the actually used target of the selected peer’s uplink
bandwidth since it represents the adjustment of Bref after
last peer selection round, and ∆b is used to record the value
difference between B’ and a candidate peer’s estimated
uplink bandwidth. So, the basic idea of DBaT-N can be
described as follows. In each peer selection round DBaT-N
chooses a peer with uplink bandwidth close to B’, and in
the last round it chooses a peer that makes the sum of se-
lected peers’ uplink bandwidth fitly over Br according to
∆b.
In more detail, DBaT-N algorithm works in the follow-
ing steps:
Step 1. Choose a cell:
1-1. Sort the cells according to the traffic load;
1-2. Choose a cell with the lowest traffic load, go to
Step 2.
Step 2. Calculate ∆b for each peer in this cell:
2-1. Calculate the value of Lest and Bpe for each candi-
date peer in this cell;
2-2. Calculate B’ = Bref - ∆b, then calculate ∆b = Bpe- B’
for each candidate peer in this cell;
2-3. Check the value of n, if n > 1, go to Step 3, if n= 1,
go to Step 4.
Step 3. Choose a peer according to service ability, K
3-1. Choose a peer with the highest estimated service
ability from the K peers that have the lowest values
of |∆b| in this cell;
3-2. Record the value of Bpe and Lest for this peer,
record the value of ∆b, let n = n – 1, go to Step 1.
Step 4. Choose a peer according to service ability, K and
∆b:
4-1. Choose a peer with the highest estimated service
ability from the K peers that have the lowest values
of ∆b and satisfy ∆b > 0 in this cell;
4-2. Record the value of Bp e and Lest for this peer,
record the value of ∆b, end the peer selection
process.
In Step 4, it is possible that the number of peers satisfy-
ing ∆b > 0 (denoted as k here) is lower than K. In this case,
the algorithm will take k as K in Step 4. Moreover, it is also
possible that the value of k is 0.
5. 44 S. Uvaraj et al.: Node Selection in P2P Content Sharing Service in Mobile Cellular
Networks with Reduction Bandwidth
4. Fcm for Estimation of Peers’Service
Ability
Service ability in environments of mobile cellular net-
works:
• Uplink Bandwidth. A peer’s uplink bandwidth has di-
rect and great impact on its service ability.
• Delay. The delay between a peer and the requesting
client will affect the peer’s service ability to some extent.
• Packet Loss Probability. According to our simulations,
Packet loss probability on the link between a peer and the
requesting client impacts the peer’s service ability greatly.
• SINR. SINR (Signal to Interference and Noise Ratio)
value of a radio link can indicate the radio link quality
which has a direct impact on the packet loss probability of
the link.
• Energy Level. Since the battery energy is relatively li-
mited on mobile hosts, the energy level has a direct impact
on peer churn probability which greatly affects the peer’s
service ability. Moreover, a peer with higher energy level
is expected to stay longer.
• Lingering Time. As in we assume that if a peer stays
longer its peer churn probability is lower.
• Moving Speed. In mobile environments, a higher mov-
ing speed usually means a lower radio link quality, and
thus means a higher packet loss probability. Moreover, a
peer with higher moving speed often has higher cell han-
dover probability which affects its service ability to some
extent.
4.1. Simple P2P Protocol for Cellular Phones
We have designed the P2P protocol for cellular phones
with a simple text format over HTTP, since they can only
support HTTP and cannot process the protocol based on
XML. The P2P protocol for cellular phones is provided by
mobile proxy. Each mobile proxy acts as a virtual peer-to-
peer node for a cellular phone and converts the XML based
P2P protocol to the simple P2P protocol for the cellular
phone. An example of a P2P message for cellular phone is
shown in Figure 4. A message included in the HTTP body,
is written in a simple text format and is composed of two
parts. The first part of the message corresponds to the P2P
core protocol, and the second part corresponds to the appli-
cation protocol.
Fig. 4. A sample of P2P message for cellular Phone
5. Performance Evaluation
In this section we evaluate the performance of DBaT al-
gorithms on our simulation platform built upon OMNet++.
Network topology used in the simulations is shown. where
there are 20 cells in total. As shown in Fig. 4, we adopt a
BitTorrent-like [6] architecture for the P2P systems used in
our simulations.
5.1. Simulation Settings
In our simulations, to simulate a relatively realistic and
moderate initial status, the initial traffic load on each cell is
randomly generated in the range of [0.25, 0.75]. The num-
ber of requesting peer is 10, and each requesting peer has
100 candidate peers. So there are totally 1000 candidate
peers that are randomly distributed in 20 cells. Some para-
meters of each candidate peer are set as follows. The delay
between a candidate peer and the requesting peer is ran-
domly generated in the range from 0 to 500ms. The SINR
value of a radio link is randomly generated in the range
from 0 to 100dB. The energy level is randomly generated
in the range from 0 to 5. The lingering time is generated by
a random number in combination with the value of the
energy level, and has a range from 0 to 5 hours. The packet
loss probability of each radio link is generated by a random
number in combination with the SINR value and the value
of the moving speed, and has a range of [0.001, 0.01].
Fig 5. FCM for P2P systems over mobile cellular networks
Moreover, during the data transmission process, each
serving peer has a probability of peer churn, which is gen-
erated by the value of the energy level in combination with
the value of the lingering time. After a peer churn happens,
the churned peer will leave the system, and the requesting
peer will ask the tracker to return a new serving peer to get
the remaining data.
Furthermore, each serving peer also has a probability of
moving to a neighboring cell, which is called cell handover
probability and is generated by the value of the moving
speed in combination with a random number. After a serv-
ing peer move to a neighboring cell, its parameters includ-
ing delay, SINR value and packet loss probability will be
6. American Journal of Networks and Communications 2013; 2(2): 40-46 45
regenerated. We evaluate the performance of DBaT algo-
rithms using a BT-like file sharing process. First, the 10
requesting peers join in the system and send requests for
files to the Tracker simultaneously. Second, the Tracker
performs the same peer selection algorithm for the 10 re-
questing peers and returns them a peer list respectively.
Finally, the 10 requesting peers receive a file from their
own serving peers respectively. We record the average
transfer time of the 10 files and the Standard Deviation (SD)
of the traffic load on the 20 cells during the file sharing
process.
5.2. Case I: A Lower Bound of the Sum of the Selected
Peers’ Uplink Bandwidth is Demanded
In this subsection we consider the case that the request-
ing peer demands a lower bound of the sum of the selected
peers’ uplink bandwidth. We compare the performance of
DBaT-B algorithm with other two algorithms. One is
called HSA-B Highest Service Ability, Bandwidth satis-
fied), and the other is called RS-B (Random Selection,
Bandwidth satisfied). HSA-B is in fact the same with the
peer selection algorithm that always chooses peers with the
highest service ability [5], and RS-B is in fact the tradition-
al peer selection algorithm used in BitTorrent that chooses
peers randomly [6].
Fig. 6 shows the simulation results under the scenario of
3G networks when the downlink bandwidth of each re-
questing peer ranges from 200Kbps to 1Mbps. The results
can be observed and analyzed as follows.
Fig 6. Simulation results under the 3G scenario in case I
First, with any value of the downlink bandwidth, the SD
value of DBaT-B is much (at least 66%) lower than those
of HSA-B and RS-B. This indicates that DBaT-B achieves
much better load balance on the 20 cells than the other two
algorithms. Second, with any value of the downlink band-
width, the average file transfer time of RS-B is obviously
(at least 33%) higher than that of DBaT-B or HSA-B. This
indicates that the service ability of the serving peers chosen
by RS-B is still lower than those chosen by DBaT-B or
HSA-B, although the sum of their uplink bandwidth is over
the downlink bandwidth of each requesting peer. Third, as
the downlink bandwidth increases, the difference between
the average file transfer time of DBaT-B and that of HSA-
B gets smaller. This can be explained as follows. When the
downlink bandwidth is small, the number of serving peers
in the system will not be great.
From the results and analysis in subsection 5.2 we can
draw conclusions including:
1) Downlink bandwidth limitation has great impact on
file transfer speed;
2) Our DBaT algorithms can achieve much better load
balance on cells than traditional HSA and RS algorithms; 3)
Our DBaT algorithms can achieve file transfer speed simi-
lar with that of HSA, especially when the traffic load on
cells is relatively high.
6. Conclusion
In this paper we studied the problems of peer selection in
P2P file sharing service over mobile cellular networks with
consideration of downlink bandwidth limitation. Our major
contribution was to propose two peer selection algorithms
(named DBaT-B and DBaT-N) that can achieve load bal-
ance on cells under the precondition that the requesting
peer’s demand is satisfied. The two algorithms were de-
signed for two different cases of the requesting peer’s de-
mand respectively. Our algorithms take the requesting
peer’s downlink bandwidth as the target of the sum of the
selected peers’ uplink bandwidth. Compared with the tradi-
tional HSA and RS algorithms, our DBaT algorithms can
achieve much better load balance on cells, and they can
also achieve file sharing speed better than that of RS, or
similar with that of HSA, especially when the traffic load
on cells is relatively high. So our algorithms can be seen as
nice improvements. Peer-to-peer security will be an impor-
tant issue for such an environment. We are considering the
incorporation of peer-to-peer security into our mobile peer-
to-peer architecture. Additionally, we continue to develop
new mobile peer-to-peer applications and will evaluate
efficiency and performance of our peer-to-peer protocols.
References
[1] Y. Li, Y. C. Wu, J. Y. Zhang, et al., “A P2P Based Distri-
buted Services Network for Next Generation Mobile Inter-
net Communications,” in Proc.WWW’09, pp. 1177-1178,
2009.
[2] L. Popova, T. Herpel, W. Gerstacker, “Cooperative mobile-
to-mobile file dissemination in cellular networks within a
unified radio interface,” Computer Networks, vol. 52(6), pp.
1153-1165, 24 April 2008.
[3] H. Xie, R. Yang, A. Krishnamurthy, “P4P: Provider Portal
for Applications,” in Proc. ACM SIGCOMM’08, vol. 38, pp.
351-362, 2008.
[4] [4]W. Li, S. Z. Chen, T. Yu, “UTAPS: An Underlying To-
pology Aware Peer Selection Algorithm in BitTorrent,” in
Proc. IEEE AINA’08, pp. 539-545, 2008.
[5] T. S. Eugene Ng, et al., “Measurement-Based Optimization
7. 46 S. Uvaraj et al.: Node Selection in P2P Content Sharing Service in Mobile Cellular
Networks with Reduction Bandwidth
Techniques for Bandwidth-Demanding Peer-to-Peer Sys-
tems,” in Proc. IEEE INFOCOM’03, pp. 539-545, Orlando,
Florida, USA, 2003.
[6] BitTorrent,Inc. 2008. URL: http://www.bittorrent.com/
[7] B. Kosko, “Fuzzy Cognitive Maps,” International Journal of
Man-Machine Studies, vol. 24, pp. 65-75, 1986.
[8] X. Li, H. Ji, F. R. Yu, R. M. Zheng, “A FCM-Based Peer
Grouping Scheme for Node Failure Recovery in Wireless
P2P File Sharing,” in Proc. IEEE ICC’09, pp. 1-5, 2009.
[9] OMNeT++, URL: http://www.omnetpp.org/2011
[10] NTT DoCoMo, Inc., “FOMA (Freedom Of Mobile multi-
media Access)”, http://foma.nttdocomo.co.jp/English/.