SlideShare a Scribd company logo
Optimal Multicast Capacity and Delay Tradeoffs In MANETs
ABSTRACT
In this paper, we give a global perspective of multicast capacity and delay analysis in Mobile Ad Hoc Networks
(MANETs). Specifically, we consider four node mobility models:
1. Two-dimensional mobility,
2. Two-dimensional hybrid random walk,
3. One-dimensional mobility, and
4. One-dimensional hybrid random walk.
Two mobility time-scales are investigated in this paper:
Fast mobility where node mobility is at the same time-scale as data transmissions;
Slow mobility where node mobility is assumed to occur at a much slower time-scale than data
transmissions. Given a delay constraint D, we first characterize the optimal multicast capacity for each
of the eight types of mobility models, and then we develop a scheme that can achieve a capacity-delay
tradeoff close to the upper bound up to a logarithmic factor. In addition, we also study heterogeneous
networks with infrastructure support.
ARCHITECTURE
GLOBALSOFT TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
EXISTING SYSTEM
In Existing System, A single session cannot make full use of the network capacity due to the overhead
of the root in the spanning tree. The second difference is the definition of throughput. In multicast scheme, all
the k destinations in a session receive the same packet, and only one packet can be treated as valid and the other
k Θ (1) packets are redundancies. Search the optimal capacity delay tradeoff and identify the limiting factors of
the existing scheduling schemes in MANETs.
Disadvantage:
Limiting factors
Low redundancy.
PROPOSED SYSTEM
In Proposed System, assume that at each time slot, bits can be transmitted in a successful transmission.
Mobility time scales: Two time scales of mobility are considered in this paper:
Fast mobility: The
mobility of nodes is at the same time
scale as the transmission of
packets, i.e., in each time-slot, only one
transmission is allowed.
Slow mobility: The
mobility of nodes is much slower than
the transmission of packets, i.e.,
multiple transmissions may
happen within one time-slot.
ADVANTAGE
 The advantage of dimensional mobility lies in the fact that it is simple and easily predictable, thus
increasing the inter contact rate.
 Though nodes are limited to only moving horizontally or vertically, the mobility range on their orbit
lines is not restricted.
Algorithm – Joint/Scheduling algorithm
In this algorithm, there are two types of transmissions:
1. Source-Relay(S-R) transmission and
2. Relay-Destination(R-D) transmission. Thus, when a particularly pair is selected,
there will be two conditions: S-R pair or R-D pair.
1. If node Nsend contains packet P in its relaying pool to be sent to Nreceive, and Nsend is in
the same cell as Nreceive, we call Nsend and Nreceive a R-D pair.
2. If node Nsend does not contain packet P in its relaying pool to be sent to Nreceive, while
node Nreceive does not contain packet P in its relaying pool to be sent to Nsend, and Nsend
is in the same cell as Nreceive, we call Nsend and Nreceive a S-R pair.
MODULES
1. SCHEDULING POLICIES
2. HETEROGENEOUS NETWORKS
3. TRANSMISSION INFRASTRUCTURE
MODULES DESCRIPTION
SCHEDULING POLICIES
In this Module, the information about the current and past status of the network, and can schedule any
radio transmission in the current and future time slots, similar. We say a packet is successfully delivered if and
only if all destinations within the multicast session have received the packet. In each time slot, for each packet p
that has not been successfully delivered and each of its unreached destinations, the scheduler needs to perform
the following two functions:
1. Capture
The scheduler needs to decide whether to deliver packet to destination in the current time slot. If yes,
the scheduler then needs to choose one relay node (possibly the source node itself) that has a copy of the
packet at the beginning of the timeslot, and schedules radio transmissions to forward this packet to
destination within the same timeslot, using possibly multi-hop transmissions. When this happens
successfully, we say that the chosen relay node has successfully captured the destination of packet. We call
this chosen relay node the last mobile relay for packet and destination. And we call the distance between the
last mobile relay and the destination as the capture range.
2. Duplication
For a packet p that has not been successfully delivered, the scheduler needs to decide whether to
duplicate packet p to other nodes that does not have the packet at the beginning of the time-slot. The
scheduler also needs to decide which nodes to relay from and relay to, and how.
HETEROGENEOUS NETWORKS
In this Module, All transmissions can be carried out either in ad hoc mode or in infrastructure mode. We
assume that the base stations have a same transmission bandwidth, denoted for each. The bandwidth for each
mobile ad hoc node is denoted. Further, we evenly divide the bandwidth into two parts, one for uplink
transmissions and the other for downlink transmissions, so that these different kinds of transmissions will not
interfere with each other.
TRANSMISSION INFRASTRUCTURE
In this Module, A transmission in infrastructure mode is carried out in the following steps:
1) Uplink: A mobile node holding packet is selected, and transmits this packet to the nearest base
station.
2) Infrastructure relay: Once a base station receives a packet from a mobile node, all the other base
stations share this packet immediately, (i.e., the delay is considered to be zero) since all base stations are
connected by wires.
3) Downlink: Each base station searches for all the packets needed in its own sub region, and transmit
all of them to their destined mobile nodes. At this step, every base station will adopt TDMA schemes to
delivered different packets for different multicast sessions.
System Specification
HARDWARE & SOFTWARE REQUIREMENTS:
HARDWARE REQUIREMENTS:
System : Pentium IV 2.4 GHz.
Hard Disk : 40 GB.
Floppy Drive : 1.44 Mb.
Monitor : 15 VGA Color.
Mouse : Logitech.
Ram : 512 MB.
SOFTWARE REQUIREMENTS:
Operating system : Windows 7 Ultimate (32- bit).
Coding Language : C#.NET
Front End : Visual Studio 2010 professional
CLOUING
DOMAIN: WIRELESS NETWORK PROJECTS

More Related Content

What's hot

Cluster based routing protocol 1
Cluster based routing protocol 1Cluster based routing protocol 1
Cluster based routing protocol 1
Sudhansu Dash
 
Geographical routing presentation
Geographical routing presentationGeographical routing presentation
Geographical routing presentationApoorva Nagaraj
 
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Multicast capacity-in-manet-wi...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Multicast capacity-in-manet-wi...IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Multicast capacity-in-manet-wi...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Multicast capacity-in-manet-wi...
IEEEMEMTECHSTUDENTPROJECTS
 
Adaptive opportunistic routing for wireless ad hoc networks
Adaptive opportunistic routing for wireless ad hoc networksAdaptive opportunistic routing for wireless ad hoc networks
Adaptive opportunistic routing for wireless ad hoc networks
JPINFOTECH JAYAPRAKASH
 
Cluster based routing protocol
Cluster based routing protocolCluster based routing protocol
Cluster based routing protocolSudhansu Dash
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
IEEEGLOBALSOFTTECHNOLOGIES
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSN
Mahbubur Rahman
 
CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)
Gaurav Dalvi
 
A Survey of Geographic Routing Protocols for Vehicular
A Survey of Geographic Routing Protocols for VehicularA Survey of Geographic Routing Protocols for Vehicular
A Survey of Geographic Routing Protocols for VehicularGabriel Balderas
 
A survey of geographic routing protocols for Vehicular Ad Hoc Networks (VANETs)
A survey of geographic routing protocols for Vehicular Ad Hoc Networks (VANETs)A survey of geographic routing protocols for Vehicular Ad Hoc Networks (VANETs)
A survey of geographic routing protocols for Vehicular Ad Hoc Networks (VANETs)Gabriel Balderas
 
MuMHR: Multi-path, Multi-hop Hierarchical Routing
MuMHR: Multi-path, Multi-hop Hierarchical RoutingMuMHR: Multi-path, Multi-hop Hierarchical Routing
MuMHR: Multi-path, Multi-hop Hierarchical RoutingM H
 
Wsn routing protocol
Wsn routing protocolWsn routing protocol
Wsn routing protocol
SuganthiN2
 
Geographic routing protocol_in_wireless_sensor_networks
Geographic routing protocol_in_wireless_sensor_networksGeographic routing protocol_in_wireless_sensor_networks
Geographic routing protocol_in_wireless_sensor_networksGr Patel
 
rupali published paper
rupali published paperrupali published paper
rupali published paperRoopali Singh
 
Polynomial time algorithms for multirate anypath
Polynomial time algorithms for multirate anypathPolynomial time algorithms for multirate anypath
Polynomial time algorithms for multirate anypath
IMPULSE_TECHNOLOGY
 
TOPOLOGY DISCOVERY IN MULTI-HOP CLUSTERING VEHICULAR NETWORKS
TOPOLOGY DISCOVERY IN MULTI-HOP CLUSTERING VEHICULAR NETWORKSTOPOLOGY DISCOVERY IN MULTI-HOP CLUSTERING VEHICULAR NETWORKS
TOPOLOGY DISCOVERY IN MULTI-HOP CLUSTERING VEHICULAR NETWORKS
caijjournal
 

What's hot (18)

Cluster based routing protocol 1
Cluster based routing protocol 1Cluster based routing protocol 1
Cluster based routing protocol 1
 
Geographical routing presentation
Geographical routing presentationGeographical routing presentation
Geographical routing presentation
 
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Multicast capacity-in-manet-wi...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Multicast capacity-in-manet-wi...IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Multicast capacity-in-manet-wi...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Multicast capacity-in-manet-wi...
 
Adaptive opportunistic routing for wireless ad hoc networks
Adaptive opportunistic routing for wireless ad hoc networksAdaptive opportunistic routing for wireless ad hoc networks
Adaptive opportunistic routing for wireless ad hoc networks
 
Cluster based routing protocol
Cluster based routing protocolCluster based routing protocol
Cluster based routing protocol
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSN
 
Leach protocol
Leach protocolLeach protocol
Leach protocol
 
CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)
 
A Survey of Geographic Routing Protocols for Vehicular
A Survey of Geographic Routing Protocols for VehicularA Survey of Geographic Routing Protocols for Vehicular
A Survey of Geographic Routing Protocols for Vehicular
 
A survey of geographic routing protocols for Vehicular Ad Hoc Networks (VANETs)
A survey of geographic routing protocols for Vehicular Ad Hoc Networks (VANETs)A survey of geographic routing protocols for Vehicular Ad Hoc Networks (VANETs)
A survey of geographic routing protocols for Vehicular Ad Hoc Networks (VANETs)
 
MuMHR: Multi-path, Multi-hop Hierarchical Routing
MuMHR: Multi-path, Multi-hop Hierarchical RoutingMuMHR: Multi-path, Multi-hop Hierarchical Routing
MuMHR: Multi-path, Multi-hop Hierarchical Routing
 
ShortPaper
ShortPaperShortPaper
ShortPaper
 
Wsn routing protocol
Wsn routing protocolWsn routing protocol
Wsn routing protocol
 
Geographic routing protocol_in_wireless_sensor_networks
Geographic routing protocol_in_wireless_sensor_networksGeographic routing protocol_in_wireless_sensor_networks
Geographic routing protocol_in_wireless_sensor_networks
 
rupali published paper
rupali published paperrupali published paper
rupali published paper
 
Polynomial time algorithms for multirate anypath
Polynomial time algorithms for multirate anypathPolynomial time algorithms for multirate anypath
Polynomial time algorithms for multirate anypath
 
TOPOLOGY DISCOVERY IN MULTI-HOP CLUSTERING VEHICULAR NETWORKS
TOPOLOGY DISCOVERY IN MULTI-HOP CLUSTERING VEHICULAR NETWORKSTOPOLOGY DISCOVERY IN MULTI-HOP CLUSTERING VEHICULAR NETWORKS
TOPOLOGY DISCOVERY IN MULTI-HOP CLUSTERING VEHICULAR NETWORKS
 

Viewers also liked

Lesson 10 introduction
Lesson 10 introductionLesson 10 introduction
Lesson 10 introductionSheila Tabor
 
مشروع القانون الجنائي
مشروع القانون الجنائيمشروع القانون الجنائي
مشروع القانون الجنائي
م م أولاد سيدي عبد النبي
 
Bongs
BongsBongs
Identity_Management_Vendor_Evaluation
Identity_Management_Vendor_EvaluationIdentity_Management_Vendor_Evaluation
Identity_Management_Vendor_EvaluationJerry Ruggieri
 
Banco Trujillo
Banco TrujilloBanco Trujillo
Banco Trujillo
williamsevillanodiaz
 
Maravillas turísticas del Ecuador
Maravillas turísticas del EcuadorMaravillas turísticas del Ecuador
Maravillas turísticas del EcuadorCarlos San
 
Providing a Professional Education: Preparing Scholars for the Workforce
Providing a Professional Education: Preparing Scholars for the Workforce Providing a Professional Education: Preparing Scholars for the Workforce
Providing a Professional Education: Preparing Scholars for the Workforce
National Partnership for Educational Access
 
Ppt
PptPpt
Comienzo curso 13 14 23-09-13
Comienzo curso 13 14 23-09-13Comienzo curso 13 14 23-09-13
Comienzo curso 13 14 23-09-13myenglishcorner
 
Soy Mi Cuento: Bridging Multiple Worlds in Independent Schools
Soy Mi Cuento: Bridging Multiple Worlds in Independent Schools Soy Mi Cuento: Bridging Multiple Worlds in Independent Schools
Soy Mi Cuento: Bridging Multiple Worlds in Independent Schools
National Partnership for Educational Access
 
CCCS' Digital Badge Possibilitites IMS Global Badging and Credentials Conveni...
CCCS' Digital Badge Possibilitites IMS Global Badging and Credentials Conveni...CCCS' Digital Badge Possibilitites IMS Global Badging and Credentials Conveni...
CCCS' Digital Badge Possibilitites IMS Global Badging and Credentials Conveni...
cccschamp
 
La importancia del uso de las herramientas de la web
La importancia del uso de las herramientas de la webLa importancia del uso de las herramientas de la web
La importancia del uso de las herramientas de la web
Yohely Medina
 
ευχές
ευχέςευχές
ευχέςnpomaki
 
Historias do Asorey saídas 1º eso
Historias do Asorey saídas 1º esoHistorias do Asorey saídas 1º eso
Historias do Asorey saídas 1º esoiesasorey
 
Question 6) What have you learnt about technologies from the process of const...
Question 6) What have you learnt about technologies from the process of const...Question 6) What have you learnt about technologies from the process of const...
Question 6) What have you learnt about technologies from the process of const...kimberleyreyes
 

Viewers also liked (17)

Lesson 10 introduction
Lesson 10 introductionLesson 10 introduction
Lesson 10 introduction
 
مشروع القانون الجنائي
مشروع القانون الجنائيمشروع القانون الجنائي
مشروع القانون الجنائي
 
Bongs
BongsBongs
Bongs
 
Identity_Management_Vendor_Evaluation
Identity_Management_Vendor_EvaluationIdentity_Management_Vendor_Evaluation
Identity_Management_Vendor_Evaluation
 
Banco Trujillo
Banco TrujilloBanco Trujillo
Banco Trujillo
 
Maravillas turísticas del Ecuador
Maravillas turísticas del EcuadorMaravillas turísticas del Ecuador
Maravillas turísticas del Ecuador
 
Providing a Professional Education: Preparing Scholars for the Workforce
Providing a Professional Education: Preparing Scholars for the Workforce Providing a Professional Education: Preparing Scholars for the Workforce
Providing a Professional Education: Preparing Scholars for the Workforce
 
Ppt
PptPpt
Ppt
 
отчет
отчетотчет
отчет
 
ITS Group Kurumsal Katalog
ITS Group Kurumsal KatalogITS Group Kurumsal Katalog
ITS Group Kurumsal Katalog
 
Comienzo curso 13 14 23-09-13
Comienzo curso 13 14 23-09-13Comienzo curso 13 14 23-09-13
Comienzo curso 13 14 23-09-13
 
Soy Mi Cuento: Bridging Multiple Worlds in Independent Schools
Soy Mi Cuento: Bridging Multiple Worlds in Independent Schools Soy Mi Cuento: Bridging Multiple Worlds in Independent Schools
Soy Mi Cuento: Bridging Multiple Worlds in Independent Schools
 
CCCS' Digital Badge Possibilitites IMS Global Badging and Credentials Conveni...
CCCS' Digital Badge Possibilitites IMS Global Badging and Credentials Conveni...CCCS' Digital Badge Possibilitites IMS Global Badging and Credentials Conveni...
CCCS' Digital Badge Possibilitites IMS Global Badging and Credentials Conveni...
 
La importancia del uso de las herramientas de la web
La importancia del uso de las herramientas de la webLa importancia del uso de las herramientas de la web
La importancia del uso de las herramientas de la web
 
ευχές
ευχέςευχές
ευχές
 
Historias do Asorey saídas 1º eso
Historias do Asorey saídas 1º esoHistorias do Asorey saídas 1º eso
Historias do Asorey saídas 1º eso
 
Question 6) What have you learnt about technologies from the process of const...
Question 6) What have you learnt about technologies from the process of const...Question 6) What have you learnt about technologies from the process of const...
Question 6) What have you learnt about technologies from the process of const...
 

Similar to JAVA 2013 IEEE MOBILECOMPUTING PROJECT Optimal Multicast Capacity and Delay Tradeoffs in MANETs

2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...
2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...
2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...
IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Multicast capacity-in-manet-wit...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Multicast capacity-in-manet-wit...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Multicast capacity-in-manet-wit...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Multicast capacity-in-manet-wit...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
multicast capacity in manet with infrastructure support
multicast capacity in manet with infrastructure supportmulticast capacity in manet with infrastructure support
multicast capacity in manet with infrastructure support
swathi78
 
Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...
Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...
Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...
CSCJournals
 
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETsJPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
chennaijp
 
International Journal of Pharmaceutical Science Invention (IJPSI)
International Journal of Pharmaceutical Science Invention (IJPSI)International Journal of Pharmaceutical Science Invention (IJPSI)
International Journal of Pharmaceutical Science Invention (IJPSI)
inventionjournals
 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANET
Editor IJCATR
 
Generalized two
Generalized twoGeneralized two
Generalized two
IMPULSE_TECHNOLOGY
 
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
IOSR Journals
 
Optimal multicast capacity and delay tradeoffs in manets
Optimal multicast capacity and delay tradeoffs in manetsOptimal multicast capacity and delay tradeoffs in manets
Optimal multicast capacity and delay tradeoffs in manets
JPINFOTECH JAYAPRAKASH
 
M.E Computer Science Mobile Computing Projects
M.E Computer Science Mobile Computing ProjectsM.E Computer Science Mobile Computing Projects
M.E Computer Science Mobile Computing Projects
Vijay Karan
 
M.Phil Computer Science Mobile Computing Projects
M.Phil Computer Science Mobile Computing ProjectsM.Phil Computer Science Mobile Computing Projects
M.Phil Computer Science Mobile Computing Projects
Vijay Karan
 
M phil-computer-science-mobile-computing-projects
M phil-computer-science-mobile-computing-projectsM phil-computer-science-mobile-computing-projects
M phil-computer-science-mobile-computing-projects
Vijay Karan
 
Optimized Fuzzy Routing for MANET
Optimized Fuzzy Routing for MANETOptimized Fuzzy Routing for MANET
Optimized Fuzzy Routing for MANET
iosrjce
 
D017252327
D017252327D017252327
D017252327
IOSR Journals
 
Paper id 71201928
Paper id 71201928Paper id 71201928
Paper id 71201928
IJRAT
 
Mobile Relay Configuration in Data-Intensuive Wireless Sensor with Three Rout...
Mobile Relay Configuration in Data-Intensuive Wireless Sensor with Three Rout...Mobile Relay Configuration in Data-Intensuive Wireless Sensor with Three Rout...
Mobile Relay Configuration in Data-Intensuive Wireless Sensor with Three Rout...
IJERA Editor
 
2013 2014 ieee projects titles with abstract
2013 2014 ieee projects titles with abstract2013 2014 ieee projects titles with abstract
2013 2014 ieee projects titles with abstract
Mukundhan Elumalai
 
D0431013019
D0431013019D0431013019
D0431013019
ijceronline
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMIOSR Journals
 

Similar to JAVA 2013 IEEE MOBILECOMPUTING PROJECT Optimal Multicast Capacity and Delay Tradeoffs in MANETs (20)

2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...
2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...
2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Multicast capacity-in-manet-wit...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Multicast capacity-in-manet-wit...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Multicast capacity-in-manet-wit...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Multicast capacity-in-manet-wit...
 
multicast capacity in manet with infrastructure support
multicast capacity in manet with infrastructure supportmulticast capacity in manet with infrastructure support
multicast capacity in manet with infrastructure support
 
Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...
Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...
Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...
 
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETsJPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
 
International Journal of Pharmaceutical Science Invention (IJPSI)
International Journal of Pharmaceutical Science Invention (IJPSI)International Journal of Pharmaceutical Science Invention (IJPSI)
International Journal of Pharmaceutical Science Invention (IJPSI)
 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANET
 
Generalized two
Generalized twoGeneralized two
Generalized two
 
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
 
Optimal multicast capacity and delay tradeoffs in manets
Optimal multicast capacity and delay tradeoffs in manetsOptimal multicast capacity and delay tradeoffs in manets
Optimal multicast capacity and delay tradeoffs in manets
 
M.E Computer Science Mobile Computing Projects
M.E Computer Science Mobile Computing ProjectsM.E Computer Science Mobile Computing Projects
M.E Computer Science Mobile Computing Projects
 
M.Phil Computer Science Mobile Computing Projects
M.Phil Computer Science Mobile Computing ProjectsM.Phil Computer Science Mobile Computing Projects
M.Phil Computer Science Mobile Computing Projects
 
M phil-computer-science-mobile-computing-projects
M phil-computer-science-mobile-computing-projectsM phil-computer-science-mobile-computing-projects
M phil-computer-science-mobile-computing-projects
 
Optimized Fuzzy Routing for MANET
Optimized Fuzzy Routing for MANETOptimized Fuzzy Routing for MANET
Optimized Fuzzy Routing for MANET
 
D017252327
D017252327D017252327
D017252327
 
Paper id 71201928
Paper id 71201928Paper id 71201928
Paper id 71201928
 
Mobile Relay Configuration in Data-Intensuive Wireless Sensor with Three Rout...
Mobile Relay Configuration in Data-Intensuive Wireless Sensor with Three Rout...Mobile Relay Configuration in Data-Intensuive Wireless Sensor with Three Rout...
Mobile Relay Configuration in Data-Intensuive Wireless Sensor with Three Rout...
 
2013 2014 ieee projects titles with abstract
2013 2014 ieee projects titles with abstract2013 2014 ieee projects titles with abstract
2013 2014 ieee projects titles with abstract
 
D0431013019
D0431013019D0431013019
D0431013019
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
 

More from IEEEGLOBALSOFTTECHNOLOGIES

DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Facilitating document annotation usin...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Facilitating document annotation usin...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Facilitating document annotation usin...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Facilitating document annotation usin...
IEEEGLOBALSOFTTECHNOLOGIES
 

More from IEEEGLOBALSOFTTECHNOLOGIES (20)

DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Facilitating document annotation usin...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Facilitating document annotation usin...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Facilitating document annotation usin...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Facilitating document annotation usin...
 

Recently uploaded

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 

Recently uploaded (20)

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 

JAVA 2013 IEEE MOBILECOMPUTING PROJECT Optimal Multicast Capacity and Delay Tradeoffs in MANETs

  • 1. Optimal Multicast Capacity and Delay Tradeoffs In MANETs ABSTRACT In this paper, we give a global perspective of multicast capacity and delay analysis in Mobile Ad Hoc Networks (MANETs). Specifically, we consider four node mobility models: 1. Two-dimensional mobility, 2. Two-dimensional hybrid random walk, 3. One-dimensional mobility, and 4. One-dimensional hybrid random walk. Two mobility time-scales are investigated in this paper: Fast mobility where node mobility is at the same time-scale as data transmissions; Slow mobility where node mobility is assumed to occur at a much slower time-scale than data transmissions. Given a delay constraint D, we first characterize the optimal multicast capacity for each of the eight types of mobility models, and then we develop a scheme that can achieve a capacity-delay tradeoff close to the upper bound up to a logarithmic factor. In addition, we also study heterogeneous networks with infrastructure support. ARCHITECTURE GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
  • 2. EXISTING SYSTEM In Existing System, A single session cannot make full use of the network capacity due to the overhead of the root in the spanning tree. The second difference is the definition of throughput. In multicast scheme, all the k destinations in a session receive the same packet, and only one packet can be treated as valid and the other k Θ (1) packets are redundancies. Search the optimal capacity delay tradeoff and identify the limiting factors of the existing scheduling schemes in MANETs. Disadvantage: Limiting factors Low redundancy. PROPOSED SYSTEM In Proposed System, assume that at each time slot, bits can be transmitted in a successful transmission. Mobility time scales: Two time scales of mobility are considered in this paper: Fast mobility: The mobility of nodes is at the same time scale as the transmission of packets, i.e., in each time-slot, only one transmission is allowed. Slow mobility: The mobility of nodes is much slower than the transmission of packets, i.e., multiple transmissions may
  • 3. happen within one time-slot. ADVANTAGE  The advantage of dimensional mobility lies in the fact that it is simple and easily predictable, thus increasing the inter contact rate.  Though nodes are limited to only moving horizontally or vertically, the mobility range on their orbit lines is not restricted. Algorithm – Joint/Scheduling algorithm In this algorithm, there are two types of transmissions: 1. Source-Relay(S-R) transmission and 2. Relay-Destination(R-D) transmission. Thus, when a particularly pair is selected, there will be two conditions: S-R pair or R-D pair. 1. If node Nsend contains packet P in its relaying pool to be sent to Nreceive, and Nsend is in the same cell as Nreceive, we call Nsend and Nreceive a R-D pair. 2. If node Nsend does not contain packet P in its relaying pool to be sent to Nreceive, while node Nreceive does not contain packet P in its relaying pool to be sent to Nsend, and Nsend is in the same cell as Nreceive, we call Nsend and Nreceive a S-R pair.
  • 4. MODULES 1. SCHEDULING POLICIES 2. HETEROGENEOUS NETWORKS 3. TRANSMISSION INFRASTRUCTURE MODULES DESCRIPTION SCHEDULING POLICIES In this Module, the information about the current and past status of the network, and can schedule any radio transmission in the current and future time slots, similar. We say a packet is successfully delivered if and only if all destinations within the multicast session have received the packet. In each time slot, for each packet p that has not been successfully delivered and each of its unreached destinations, the scheduler needs to perform the following two functions: 1. Capture The scheduler needs to decide whether to deliver packet to destination in the current time slot. If yes, the scheduler then needs to choose one relay node (possibly the source node itself) that has a copy of the packet at the beginning of the timeslot, and schedules radio transmissions to forward this packet to destination within the same timeslot, using possibly multi-hop transmissions. When this happens successfully, we say that the chosen relay node has successfully captured the destination of packet. We call this chosen relay node the last mobile relay for packet and destination. And we call the distance between the last mobile relay and the destination as the capture range. 2. Duplication For a packet p that has not been successfully delivered, the scheduler needs to decide whether to duplicate packet p to other nodes that does not have the packet at the beginning of the time-slot. The scheduler also needs to decide which nodes to relay from and relay to, and how. HETEROGENEOUS NETWORKS In this Module, All transmissions can be carried out either in ad hoc mode or in infrastructure mode. We assume that the base stations have a same transmission bandwidth, denoted for each. The bandwidth for each mobile ad hoc node is denoted. Further, we evenly divide the bandwidth into two parts, one for uplink transmissions and the other for downlink transmissions, so that these different kinds of transmissions will not interfere with each other.
  • 5. TRANSMISSION INFRASTRUCTURE In this Module, A transmission in infrastructure mode is carried out in the following steps: 1) Uplink: A mobile node holding packet is selected, and transmits this packet to the nearest base station. 2) Infrastructure relay: Once a base station receives a packet from a mobile node, all the other base stations share this packet immediately, (i.e., the delay is considered to be zero) since all base stations are connected by wires. 3) Downlink: Each base station searches for all the packets needed in its own sub region, and transmit all of them to their destined mobile nodes. At this step, every base station will adopt TDMA schemes to delivered different packets for different multicast sessions. System Specification HARDWARE & SOFTWARE REQUIREMENTS: HARDWARE REQUIREMENTS: System : Pentium IV 2.4 GHz. Hard Disk : 40 GB. Floppy Drive : 1.44 Mb. Monitor : 15 VGA Color. Mouse : Logitech. Ram : 512 MB. SOFTWARE REQUIREMENTS: Operating system : Windows 7 Ultimate (32- bit). Coding Language : C#.NET Front End : Visual Studio 2010 professional