Important: Use custom search function to get better results from our thousands of pages

Use " " for compulsory search eg:"electronics seminar" , use -" " for filter something eg: "electronics seminar" -"/tag/" (used for exclude results from tag pages)
Tags: report, full, Networks, Sensor, sensor network wireless, routing wireless, mobile adhoc networks, information wireless, greedy forwarding, wireless based projects, problem with wireless, working of wireless sensor networks, wireless sensor ppt, pdf wireless sensor networks, ppt wireless network, wire networks, Wireless, Traversal, AntiVoid, with, Routing, Greedy, Greedy Routing with AntiVoid Traversal for Wireless Sensor Networks full report,
Ask More Info Of  A Seminar Ask More Info Of A Project Post Reply  Follow us on Twitter
28-04-2011, 05:45 PM
Post: #1
Greedy Routing with Anti-Void Traversal for Wireless Sensor Networks full report
ABSTRACT

PROJECT DESCRIPTION:

The unreachability problem (i.e., the so-called void problem) that exists in the greedy routing algorithms has been studied for the wireless sensor networks. Some of the current research work cannot fully resolve the void problem, while there exist other schemes that can guarantee the delivery of packets with the excessive consumption of control overheads. Moreover, the hop count reduction (HCR) scheme is utilized as a short-cutting technique to reduce the routing hops by listening to the neighbor’s traffic, while the intersection navigation (IN) mechanism is proposed to obtain the best rolling direction for boundary traversal with the adoption of shortest path criterion. In order to maintain the network requirement of the proposed RUT scheme under the non-UDG networks, the partial UDG construction (PUC) mechanism is proposed to transform the non-UDG into UDG setting for a portion of nodes that facilitate boundary traversal. These three schemes are incorporated within the GAR protocol to further enhance the routing performance with reduced communication overhead. The proofs of correctness for the GAR scheme are also given in this paper.

Modules:

Current application is differentiated into the following modules which are closely integrated to each other.
 Networking Module.
 Boundary evaluation Module.
 Greed Anti-void Traversal module.
 Performance evaluation module.

Networking Module:

Client-server computing or networking is a distributed application architecture that partitions tasks or workloads between service providers (servers) and service requesters, called clients. Often clients and servers operate over a computer network on separate hardware. A server machine is a high-performance host that is running one or more server programs which share its resources with clients. A client also shares any of its resources; Clients therefore initiate communication sessions with servers which await (listen to) incoming requests.
Boundary evaluation Module:
The RUT scheme is adopted to solve the boundary finding problem, and the combination of the GF and the RUT scheme (i.e., the GAR protocol) can resolve the void problem, leading to the guaranteed packet delivery. The definition of boundary and the problem statement are described as follows: Definition 1 (boundary). If there exists a set B such that 1) the nodes in B form a simple unidirectional ring and 2) the nodes located on and inside the ring are disconnected with those outside of the ring, B is denoted as the boundary set and the unidirectional ring is called a boundary.
Greed Anti-void Traversal module:
The objective of the GAR protocol is to resolve the void problem such that the packet delivery from NS to ND can be guaranteed. Before diving into the detail formulation of the proposed GAR algorithm, an introductory example is described in order to facilitate the understanding of the GAR protocol, the data packets initiated from the source node NS to the destination node ND will arrive in NV based on the GF algorithm. The void problem occurs as NV receives the packets, which leads to the adoption of the RUT scheme as the forwarding strategy of the GAR protocol. A circle is formed by centering at SV with its radius being equal to half of the transmission range R/2.
Performance evaluation module:
The following five metrics are utilized in the simulations for performance comparison:
Packet Arrival Rate: The ratio of the number of received data packets to the number of total data packets sent by the source.
Average End-to-End Delay: The average time elapsed for delivering a data packet within a successful transmission.
Path Efficiency: The ratio of the number of total hop counts within the entire routing path over the number of hop counts for the shortest path.
Communication Overhead: The average number of transmitted control bytes per second, including both the data packet header and the control packets.
Energy Consumption: The energy consumption for the entire network, including transmission energy consumption for both the data and control packets under the bit rate of 11 Mbps and the transmitting power of 15 dBm for each SN.


Existing System:


As mobile computing requires more computation as well as communication activities, energy efficiency becomes the most critical issue for battery-operated mobile devices. Specifically, in ad hoc networks where each node is responsible for forwarding neighbor nodes' data packets, care has to be taken not only to reduce the overall energy consumption of all relevant nodes but also to balance individual battery levels. Unbalanced energy usage will result in earlier node failure in overloaded nodes, and in turn may lead to network partitioning and reduced network lifetime. Localized routing algorithms which achieves a trade-off between balanced energy consumption and shortest routing delay, and at the same time avoids the blocking and route cache problems.

Proposed System:


In this project paper, a greedy anti-void routing (GAR) protocol is proposed to solve the void problem with increased routing efficiency by exploiting the boundary finding technique for the unit disk graph (UDG). The proposed rolling-ball UDG boundary traversal (RUT) is employed to completely guarantee the delivery of packets from the source to the destination node under the UDG network. The boundary map (BM) and the indirect map searching (IMS) scheme are proposed as efficient algorithms for the realization of the RUT technique.

Technologies

Software Requirements


Operating System : Windows XP/2003 Server
Architecture : 3-tier Architecture
Languages : C#.Net, ASP.Net,
Data Base : SQL Server 2005


Hardware Requirements


Intel Pentium : 600 MHz or above.
RAM (SD/DDR) : 1GB
Hard Disc : 80GB


IMPLEMENTATION


Implementation is the stage of the project when the theoretical design is turned out into a working system. Thus it can be considered to be the most critical stage in achieving a successful new system and in giving the user, confidence that the new system will work and be effective.

The implementation stage involves careful planning, investigation of the existing system and it’s constraints on implementation, designing of methods to achieve changeover and evaluation of changeover methods.



3.1. Module Description




Modules:


1. Networking Module.
2. Boundary evaluation Module.
3. Greed Anti-void Traversal module.
4. Performance evaluation module.


Module Description:
1. Networking Module.


Client-server computing or networking is a distributed application architecture that partitions tasks or workloads between service providers (servers) and service requesters, called clients. Often clients and servers operate over a computer network on separate hardware. A server machine is a high-performance host that is running one or more server programs which share its resources with clients. A client also shares any of its resources; Clients therefore initiate communication sessions with servers which await (listen to) incoming requests.


2. Boundary evaluation Module.


The RUT scheme is adopted to solve the boundary finding problem, and the combination of the GF and the RUT scheme (i.e., the GAR protocol) can resolve the void problem, leading to the guaranteed packet delivery. The definition of boundary and the problem statement are described as follows: Definition 1 (boundary). If there exists a set B such that 1) the nodes in B form a simple unidirectional ring and 2) the nodes located on and inside the ring are disconnected with those outside of the ring, B is denoted as the boundary set and the unidirectional ring is called a boundary.

3. Greed Anti-void Traversal module.

The objective of the GAR protocol is to resolve the void problem such that the packet delivery from NS to ND can be guaranteed. Before diving into the detail formulation of the proposed GAR algorithm, an introductory example is described in order to facilitate the understanding of the GAR protocol, the data packets initiated from the source node NS to the destination node ND will arrive in NV based on the GF algorithm. The void problem occurs as NV receives the packets, which leads to the adoption of the RUT scheme as the forwarding strategy of the GAR protocol. A circle is formed by centering at SV with its radius being equal to half of the transmission range R/2.




4. Performance evaluation module

The performance of the proposed GAR algorithm is evaluated and compared with other existing localized schemes via simulations, including the reference GF algorithm, the planar graph-based GPSR and GOAFR++ schemes, and the UDG-based BOUNDHOLE algorithm. It is noted that the GPSR and GOAFR++ schemes that adopt the GG planarization technique to planarize the network graph are represented as the GPSR(GG) and GOAFR++(GG) algorithms, while the variants of these two schemes with the CLDP planarization algorithm are denoted as the GPSR(CLDP) and GOAFR++(CLDP) protocols.


Attached File(s)
.doc  SYSTEM DESIGN.doc (Size: 146 KB / Downloads: 174)
.doc  Software Environment.doc (Size: 71.5 KB / Downloads: 135)
.doc  IMPLEMENTATION.doc (Size: 45.5 KB / Downloads: 127)
.doc  SYSTEM TESTING.doc (Size: 44.5 KB / Downloads: 116)
.doc  BIBLIOGRAPHY.doc (Size: 44 KB / Downloads: 124)
.doc  SYSTEM ANALYSIS.doc (Size: 42 KB / Downloads: 119)
.doc  INTRODUCTION.doc (Size: 40.5 KB / Downloads: 126)
.doc  HARDWARE SOFTWARE SPECIFICATION.doc (Size: 39 KB / Downloads: 100)
.doc  SYSTEM STUDY.doc (Size: 25 KB / Downloads: 113)
.doc  SAMPLE SCREENS.doc (Size: 23.5 KB / Downloads: 143)
.doc  CONCLUSION.doc (Size: 20.5 KB / Downloads: 111)
.doc  FIRST REVIEW.doc (Size: 45.5 KB / Downloads: 118)
.doc  ZEROTH REVIEW.doc (Size: 29 KB / Downloads: 126)
.ppt  Greddyppt.ppt (Size: 85.5 KB / Downloads: 222)
.doc  NewGrredyAbstract.doc (Size: 44.5 KB / Downloads: 131)

Please Use Search http://seminarprojects.com/search.php wisely To Get More Information About A Seminar Or Project Topic
28-04-2011, 05:55 PM
Post: #2
RE: Greedy Routing with Anti-Void Traversal for Wireless Sensor Networks full report
overall project available on http://seminarprojects.kreview.com/item.php?id=139 with source code

Please Use Search http://seminarprojects.com/search.php wisely To Get More Information About A Seminar Or Project Topic
03-10-2011, 11:53 AM
Post: #3
RE: Greedy Routing with Anti-Void Traversal for Wireless Sensor Networks full report
Please send me the full project report as early as possiable.
04-10-2011, 09:58 AM
Post: #4
RE: Greedy Routing with Anti-Void Traversal for Wireless Sensor Networks full report
to get information about the topic"Greedy Routing with Anti-Void Traversal for Wireless Sensor Networks " please link bellow

http://www.seminarprojects.com/Thread-gr...9#pid57289
14-02-2013, 03:29 PM
Post: #5
RE: Greedy Routing with Anti-Void Traversal for Wireless Sensor Networks full report
Dear Sir, Can i get the ER diagram for this project!
Please post it here or mail it to the below address...
mail: duderaghavsrao[at]gmail.com
Rating Greedy Routing with Anti-Void Traversal for Wireless Sensor Networks full report Options
Share Greedy Routing with Anti-Void Traversal for Wireless Sensor Networks full report To Your Friends :- Seminar Topics Bookmark
Post Reply 

Marked Categories : meaning of anti void, what is antivoid problem, the oveview of anti void routing for wireless sensor network pdf, free downlaod document for greedy routing with antivoid traverssal for wireless sensor networks, downlaod document for greedy routing with antivoid traverssal for wireless sensor networks, anti void routing in wireless sensor network project free download, greedy routing with anti void traversal ppt, greedy routing algorithm in wireless sensor networks source code, antivoid routing in wireless sensor network file type doc, greedy routing with anti void traversal for wireless sensor networks abstract, wireless sensor networks ppt abstract,

[-]
Quick Reply
Message
Type your reply to this message here.


Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  a project report on bvm co-operative bank system subine 0 76 28-10-2014 04:38 PM
Last Post: subine
  a project report on banking information system subine 0 59 28-10-2014 04:37 PM
Last Post: subine
  a report on knowledge and information management portal subine 0 35 28-10-2014 04:36 PM
Last Post: subine
  a report on project manager subine 0 33 28-10-2014 04:34 PM
Last Post: subine
  a project report on e- forum subine 0 22 28-10-2014 04:32 PM
Last Post: subine
  a project report on online share trading subine 0 22 28-10-2014 04:32 PM
Last Post: subine
  Business Travel And Expense Report seminar code 0 20 27-10-2014 01:12 PM
Last Post: seminar code
  simulation of routing algorithms subine 0 11 24-10-2014 04:26 PM
Last Post: subine
  anti-spyware subine 0 18 23-10-2014 04:15 PM
Last Post: subine
  Industrial Data Management & Report Generation project maker 0 38 22-10-2014 10:09 AM
Last Post: project maker
This Page May Contain What is Greedy Routing with Anti-Void Traversal for Wireless Sensor Networks full report And Latest Information/News About Greedy Routing with Anti-Void Traversal for Wireless Sensor Networks full report,If Not ...Use Search to get more info about Greedy Routing with Anti-Void Traversal for Wireless Sensor Networks full report Or Ask Here

Options: