SlideShare uma empresa Scribd logo
1 de 3
GLOBALSOFT TECHNOLOGIES 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com 
Optimally Adaptive Power-Saving Protocols for 
Ad Hoc Networks Using the Hyper Quorum System 
ABSTRACT: 
Quorum-based power-saving (QPS) protocols have been proposed for ad hoc networks 
(e.g., IEEE 802.11 ad hoc mode) to increase energy efficiency and prolong the 
operational time of mobile stations. These protocols assign to each station a cycle pattern 
that specifies when the station should wake up (to transmit/receive data) and sleep (to 
save battery power). In all existing QPS protocols, the cycle length is either identical for 
all stations or is restricted to certain numbers (e.g., squares or primes). These 
restrictions on cycle length severely limit the practical use of QPS protocols as each 
individual station may want to select a cycle length that is best suited for its own need 
(in terms of remaining battery power, tolerable packet delay, and drop ratio). In this 
paper, we propose the notion of hyper quorum system (HQS)—a generalization of QPS 
that allows for arbitrary cycle lengths. We describe algorithms to generate two different 
classes of HQS given any set of arbitrary cycle lengths as input. We also describe how to 
find the optimal cycle length for a station to maximize energy efficiency, subject to 
certain performance constraints. We then present analytical and simulation results that 
show the benefits of HQS-based power-saving protocols over the existing QPS 
protocols. The HQS protocols yield up to 41% improvement in energy efficiency under 
heavy traffic loads while eliminating more than 90% delay drops under light traffic 
loads.
EXISTING SYSTEM: 
In all existing QPS protocols, the cycle length is either identical for all stations or is 
restricted to certain numbers (e.g., squares or primes). These restrictions on cycle 
length severely limit the practical use of QPS protocols as each individual station may 
want to select a cycle length that is best suited for its own need (in terms of remaining 
battery power, tolerable packet delay, and drop ratio). In this paper, we propose the 
notion of hyper quorum system (HQS)—a generalization of QPS that allows for 
arbitrary cycle lengths. We describe algorithms to generate two different classes of HQS 
given any set of arbitrary cycle lengths as input. Existing QPS protocols for ad hoc 
networks can be classifiedinto two categories: the static and semi-adaptive protocols. 
PROPOSED SYSTEM: 
Quorum-based power-saving (QPS) protocols have been proposed for ad hoc networks 
(e.g., IEEE 802.11 ad hoc mode) to increase energy efficiency and prolong the 
operational time of mobile stations. HQS-based power management protocol 
renderssignificantly more stable performance under various trafficloads as compared to 
traditional QPS protocols. In particular, itgives up to 41% improvement in energy 
efficiency under heavytraffic loads while eliminating more than 90% delay dropsunder 
light traffic loads. 
CONCLUSION: 
We generalized traditional quorum systems and proposed the Hyper Quorum System. 
We showed that HQS is fully adaptive in the sense that a station can select any value of 
cycle length that is best suited to its own requirements in terms of packet delay and 
power constraint. Two HQS constructing schemes were presented that facilitate power 
saving under both delay-constrained and best-effort traffic. Both the constructing
schemes run in time, which may be readily adopted by nodes (e.g., sensors) with limited 
computing power. We derived an analytical model characterizing the performance of a 
QPS protocol, based on which stations can determine a proper scheme and the optimal 
cycle length. Experimental results showed that our HQS-based power management 
protocol renders significantly more stable performance under various traffic loads as 
compared to traditional QPS protocols. In particular, it gives up to 41% improvement 
in energy efficiency under heavy traffic loads while eliminating more than 90% delay 
drops under light traffic loads. 
SYSTEM CONFIGURATION:- 
HARDWARE CONFIGURATION:- 
 Processor - Pentium –IV 
 Speed - 1.1 Ghz 
 RAM - 256 MB(min) 
 Hard Disk - 20 GB 
 Key Board - Standard Windows Keyboard 
 Mouse - Two or Three Button Mouse 
 Monitor - SVGA 
SOFTWARE CONFIGURATION:- 
 Operating System : Windows XP 
 Programming Language : JAVA 
 Java Version : JDK 1.6 & above.

Mais conteúdo relacionado

Destaque

Yolanda florez peña
Yolanda florez peñaYolanda florez peña
Yolanda florez peñayolisfp
 
Advert pitch explanation
Advert pitch explanationAdvert pitch explanation
Advert pitch explanationcharladilan
 
Correo electronico.
Correo electronico.Correo electronico.
Correo electronico.240395
 
05 Nagasasra dan Sabuk Inten_SH Mintardja
05 Nagasasra dan Sabuk Inten_SH Mintardja05 Nagasasra dan Sabuk Inten_SH Mintardja
05 Nagasasra dan Sabuk Inten_SH MintardjaSariyanti Palembang
 
El paso de gusano a mariposa
El paso de gusano a mariposaEl paso de gusano a mariposa
El paso de gusano a mariposaDiamond Building
 
Formato guia pedagogica mundo de señales tulia
Formato guia pedagogica mundo de señales tuliaFormato guia pedagogica mundo de señales tulia
Formato guia pedagogica mundo de señales tuliaTulia Isabel Redondo Petro
 
Tupi x atlético
Tupi x atléticoTupi x atlético
Tupi x atléticoslidesblog
 
La Vuelta de Martin Fierro capitulo 12 . Candelaria Arias
La Vuelta de Martin Fierro capitulo 12 . Candelaria AriasLa Vuelta de Martin Fierro capitulo 12 . Candelaria Arias
La Vuelta de Martin Fierro capitulo 12 . Candelaria AriasLitertura2014
 
Lise meitner historia de una injusticia
Lise meitner historia de una injusticiaLise meitner historia de una injusticia
Lise meitner historia de una injusticiaKathyta
 
Teste socializacao 2sem2012
Teste socializacao 2sem2012Teste socializacao 2sem2012
Teste socializacao 2sem2012profdilsonaires
 
Practica 2 tabuladores
Practica 2 tabuladoresPractica 2 tabuladores
Practica 2 tabuladoresYosimira
 
Ata reunião abril 2013
Ata reunião abril 2013Ata reunião abril 2013
Ata reunião abril 2013cmsaraguari
 
Cinco maneras de blindar su telefono movil
Cinco maneras de blindar su telefono movilCinco maneras de blindar su telefono movil
Cinco maneras de blindar su telefono movilDaniel Vinchira Medina
 

Destaque (20)

Yolanda florez peña
Yolanda florez peñaYolanda florez peña
Yolanda florez peña
 
Advert pitch explanation
Advert pitch explanationAdvert pitch explanation
Advert pitch explanation
 
Diapositivas
DiapositivasDiapositivas
Diapositivas
 
Correo electronico.
Correo electronico.Correo electronico.
Correo electronico.
 
05 Nagasasra dan Sabuk Inten_SH Mintardja
05 Nagasasra dan Sabuk Inten_SH Mintardja05 Nagasasra dan Sabuk Inten_SH Mintardja
05 Nagasasra dan Sabuk Inten_SH Mintardja
 
El paso de gusano a mariposa
El paso de gusano a mariposaEl paso de gusano a mariposa
El paso de gusano a mariposa
 
Formato guia pedagogica mundo de señales tulia
Formato guia pedagogica mundo de señales tuliaFormato guia pedagogica mundo de señales tulia
Formato guia pedagogica mundo de señales tulia
 
Tupi x atlético
Tupi x atléticoTupi x atlético
Tupi x atlético
 
Wiki
WikiWiki
Wiki
 
La Vuelta de Martin Fierro capitulo 12 . Candelaria Arias
La Vuelta de Martin Fierro capitulo 12 . Candelaria AriasLa Vuelta de Martin Fierro capitulo 12 . Candelaria Arias
La Vuelta de Martin Fierro capitulo 12 . Candelaria Arias
 
Lise meitner historia de una injusticia
Lise meitner historia de una injusticiaLise meitner historia de una injusticia
Lise meitner historia de una injusticia
 
Cuestionario cop (1)
Cuestionario cop (1)Cuestionario cop (1)
Cuestionario cop (1)
 
Teste socializacao 2sem2012
Teste socializacao 2sem2012Teste socializacao 2sem2012
Teste socializacao 2sem2012
 
Practica 2 tabuladores
Practica 2 tabuladoresPractica 2 tabuladores
Practica 2 tabuladores
 
Prevent senior pf
Prevent senior pfPrevent senior pf
Prevent senior pf
 
Ata reunião abril 2013
Ata reunião abril 2013Ata reunião abril 2013
Ata reunião abril 2013
 
Linea
LineaLinea
Linea
 
Mark
MarkMark
Mark
 
Cinco maneras de blindar su telefono movil
Cinco maneras de blindar su telefono movilCinco maneras de blindar su telefono movil
Cinco maneras de blindar su telefono movil
 
Sobre mim
Sobre mimSobre mim
Sobre mim
 

Mais de IEEEFINALSEMSTUDENTSPROJECTS

2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...
2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...
2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE DOTNET NETWORKING PROJECT Qos aware geographic opportunistic routin...
2014 IEEE DOTNET NETWORKING PROJECT Qos aware geographic opportunistic routin...2014 IEEE DOTNET NETWORKING PROJECT Qos aware geographic opportunistic routin...
2014 IEEE DOTNET NETWORKING PROJECT Qos aware geographic opportunistic routin...IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE DOTNET NETWORKING PROJECT Pricing under constraints_in_access_netwo...
2014 IEEE DOTNET NETWORKING PROJECT Pricing under constraints_in_access_netwo...2014 IEEE DOTNET NETWORKING PROJECT Pricing under constraints_in_access_netwo...
2014 IEEE DOTNET NETWORKING PROJECT Pricing under constraints_in_access_netwo...IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE DOTNET NETWORKING PROJECT Network intrusion detection system using ...
2014 IEEE DOTNET NETWORKING PROJECT Network intrusion detection system using ...2014 IEEE DOTNET NETWORKING PROJECT Network intrusion detection system using ...
2014 IEEE DOTNET NETWORKING PROJECT Network intrusion detection system using ...IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE DOTNET NETWORKING PROJECT Leveraging social networks for p2 p conte...
2014 IEEE DOTNET NETWORKING PROJECT Leveraging social networks for p2 p conte...2014 IEEE DOTNET NETWORKING PROJECT Leveraging social networks for p2 p conte...
2014 IEEE DOTNET NETWORKING PROJECT Leveraging social networks for p2 p conte...IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...
2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...
2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE DOTNET NETWORKING PROJECT A proximity aware interest-clustered p2p ...
2014 IEEE DOTNET NETWORKING PROJECT A proximity aware interest-clustered p2p ...2014 IEEE DOTNET NETWORKING PROJECT A proximity aware interest-clustered p2p ...
2014 IEEE DOTNET NETWORKING PROJECT A proximity aware interest-clustered p2p ...IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORKING PROJECT Stars a statistical traffic pattern discove...
2014 IEEE JAVA NETWORKING PROJECT Stars a statistical traffic pattern discove...2014 IEEE JAVA NETWORKING PROJECT Stars a statistical traffic pattern discove...
2014 IEEE JAVA NETWORKING PROJECT Stars a statistical traffic pattern discove...IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORKING PROJECT Secure continuous aggregation in wireless s...
2014 IEEE JAVA NETWORKING PROJECT Secure continuous aggregation in wireless s...2014 IEEE JAVA NETWORKING PROJECT Secure continuous aggregation in wireless s...
2014 IEEE JAVA NETWORKING PROJECT Secure continuous aggregation in wireless s...IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORKING PROJECT Receiver based flow control for networks in...
2014 IEEE JAVA NETWORKING PROJECT Receiver based flow control for networks in...2014 IEEE JAVA NETWORKING PROJECT Receiver based flow control for networks in...
2014 IEEE JAVA NETWORKING PROJECT Receiver based flow control for networks in...IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORKING PROJECT Qos aware geographic opportunistic routingi...
2014 IEEE JAVA NETWORKING PROJECT Qos aware geographic opportunistic routingi...2014 IEEE JAVA NETWORKING PROJECT Qos aware geographic opportunistic routingi...
2014 IEEE JAVA NETWORKING PROJECT Qos aware geographic opportunistic routingi...IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...
2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...
2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORKING PROJECT On the excess bandwidth allocation in isp t...
2014 IEEE JAVA NETWORKING PROJECT On the excess bandwidth allocation in isp t...2014 IEEE JAVA NETWORKING PROJECT On the excess bandwidth allocation in isp t...
2014 IEEE JAVA NETWORKING PROJECT On the excess bandwidth allocation in isp t...IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORKING PROJECT Mobile data offloading how much can wi-fi d...
2014 IEEE JAVA NETWORKING PROJECT Mobile data offloading how much can wi-fi d...2014 IEEE JAVA NETWORKING PROJECT Mobile data offloading how much can wi-fi d...
2014 IEEE JAVA NETWORKING PROJECT Mobile data offloading how much can wi-fi d...IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop routing in wireless mesh network...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop routing in wireless mesh network...2014 IEEE JAVA NETWORKING PROJECT Hop by-hop routing in wireless mesh network...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop routing in wireless mesh network...IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message Authentication and sourc...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message Authentication and sourc...2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message Authentication and sourc...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message Authentication and sourc...IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message uthenticationand source ...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message uthenticationand source ...2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message uthenticationand source ...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message uthenticationand source ...IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORKING PROJECT Fair scheduling in cellular systems in the ...
2014 IEEE JAVA NETWORKING PROJECT Fair scheduling in cellular systems in the ...2014 IEEE JAVA NETWORKING PROJECT Fair scheduling in cellular systems in the ...
2014 IEEE JAVA NETWORKING PROJECT Fair scheduling in cellular systems in the ...IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORKING PROJECT Cost effective resource allocation of overl...
2014 IEEE JAVA NETWORKING PROJECT Cost effective resource allocation of overl...2014 IEEE JAVA NETWORKING PROJECT Cost effective resource allocation of overl...
2014 IEEE JAVA NETWORKING PROJECT Cost effective resource allocation of overl...IEEEFINALSEMSTUDENTSPROJECTS
 

Mais de IEEEFINALSEMSTUDENTSPROJECTS (20)

2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...
2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...
2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...
 
2014 IEEE DOTNET NETWORKING PROJECT Qos aware geographic opportunistic routin...
2014 IEEE DOTNET NETWORKING PROJECT Qos aware geographic opportunistic routin...2014 IEEE DOTNET NETWORKING PROJECT Qos aware geographic opportunistic routin...
2014 IEEE DOTNET NETWORKING PROJECT Qos aware geographic opportunistic routin...
 
2014 IEEE DOTNET NETWORKING PROJECT Pricing under constraints_in_access_netwo...
2014 IEEE DOTNET NETWORKING PROJECT Pricing under constraints_in_access_netwo...2014 IEEE DOTNET NETWORKING PROJECT Pricing under constraints_in_access_netwo...
2014 IEEE DOTNET NETWORKING PROJECT Pricing under constraints_in_access_netwo...
 
2014 IEEE DOTNET NETWORKING PROJECT Network intrusion detection system using ...
2014 IEEE DOTNET NETWORKING PROJECT Network intrusion detection system using ...2014 IEEE DOTNET NETWORKING PROJECT Network intrusion detection system using ...
2014 IEEE DOTNET NETWORKING PROJECT Network intrusion detection system using ...
 
2014 IEEE DOTNET NETWORKING PROJECT Leveraging social networks for p2 p conte...
2014 IEEE DOTNET NETWORKING PROJECT Leveraging social networks for p2 p conte...2014 IEEE DOTNET NETWORKING PROJECT Leveraging social networks for p2 p conte...
2014 IEEE DOTNET NETWORKING PROJECT Leveraging social networks for p2 p conte...
 
2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...
2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...
2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...
 
2014 IEEE DOTNET NETWORKING PROJECT A proximity aware interest-clustered p2p ...
2014 IEEE DOTNET NETWORKING PROJECT A proximity aware interest-clustered p2p ...2014 IEEE DOTNET NETWORKING PROJECT A proximity aware interest-clustered p2p ...
2014 IEEE DOTNET NETWORKING PROJECT A proximity aware interest-clustered p2p ...
 
2014 IEEE JAVA NETWORKING PROJECT Stars a statistical traffic pattern discove...
2014 IEEE JAVA NETWORKING PROJECT Stars a statistical traffic pattern discove...2014 IEEE JAVA NETWORKING PROJECT Stars a statistical traffic pattern discove...
2014 IEEE JAVA NETWORKING PROJECT Stars a statistical traffic pattern discove...
 
2014 IEEE JAVA NETWORKING PROJECT Secure continuous aggregation in wireless s...
2014 IEEE JAVA NETWORKING PROJECT Secure continuous aggregation in wireless s...2014 IEEE JAVA NETWORKING PROJECT Secure continuous aggregation in wireless s...
2014 IEEE JAVA NETWORKING PROJECT Secure continuous aggregation in wireless s...
 
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
 
2014 IEEE JAVA NETWORKING PROJECT Receiver based flow control for networks in...
2014 IEEE JAVA NETWORKING PROJECT Receiver based flow control for networks in...2014 IEEE JAVA NETWORKING PROJECT Receiver based flow control for networks in...
2014 IEEE JAVA NETWORKING PROJECT Receiver based flow control for networks in...
 
2014 IEEE JAVA NETWORKING PROJECT Qos aware geographic opportunistic routingi...
2014 IEEE JAVA NETWORKING PROJECT Qos aware geographic opportunistic routingi...2014 IEEE JAVA NETWORKING PROJECT Qos aware geographic opportunistic routingi...
2014 IEEE JAVA NETWORKING PROJECT Qos aware geographic opportunistic routingi...
 
2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...
2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...
2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...
 
2014 IEEE JAVA NETWORKING PROJECT On the excess bandwidth allocation in isp t...
2014 IEEE JAVA NETWORKING PROJECT On the excess bandwidth allocation in isp t...2014 IEEE JAVA NETWORKING PROJECT On the excess bandwidth allocation in isp t...
2014 IEEE JAVA NETWORKING PROJECT On the excess bandwidth allocation in isp t...
 
2014 IEEE JAVA NETWORKING PROJECT Mobile data offloading how much can wi-fi d...
2014 IEEE JAVA NETWORKING PROJECT Mobile data offloading how much can wi-fi d...2014 IEEE JAVA NETWORKING PROJECT Mobile data offloading how much can wi-fi d...
2014 IEEE JAVA NETWORKING PROJECT Mobile data offloading how much can wi-fi d...
 
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop routing in wireless mesh network...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop routing in wireless mesh network...2014 IEEE JAVA NETWORKING PROJECT Hop by-hop routing in wireless mesh network...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop routing in wireless mesh network...
 
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message Authentication and sourc...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message Authentication and sourc...2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message Authentication and sourc...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message Authentication and sourc...
 
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message uthenticationand source ...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message uthenticationand source ...2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message uthenticationand source ...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message uthenticationand source ...
 
2014 IEEE JAVA NETWORKING PROJECT Fair scheduling in cellular systems in the ...
2014 IEEE JAVA NETWORKING PROJECT Fair scheduling in cellular systems in the ...2014 IEEE JAVA NETWORKING PROJECT Fair scheduling in cellular systems in the ...
2014 IEEE JAVA NETWORKING PROJECT Fair scheduling in cellular systems in the ...
 
2014 IEEE JAVA NETWORKING PROJECT Cost effective resource allocation of overl...
2014 IEEE JAVA NETWORKING PROJECT Cost effective resource allocation of overl...2014 IEEE JAVA NETWORKING PROJECT Cost effective resource allocation of overl...
2014 IEEE JAVA NETWORKING PROJECT Cost effective resource allocation of overl...
 

Último

IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgsaravananr517913
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm Systemirfanmechengr
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction managementMariconPadriquez1
 
Piping Basic stress analysis by engineering
Piping Basic stress analysis by engineeringPiping Basic stress analysis by engineering
Piping Basic stress analysis by engineeringJuanCarlosMorales19600
 

Último (20)

IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm System
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction management
 
Piping Basic stress analysis by engineering
Piping Basic stress analysis by engineeringPiping Basic stress analysis by engineering
Piping Basic stress analysis by engineering
 

2014 IEEE JAVA NETWORKING PROJECT Optimally adaptive power saving protocols for ad hoc networks using the hyper quorum system

  • 1. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com Optimally Adaptive Power-Saving Protocols for Ad Hoc Networks Using the Hyper Quorum System ABSTRACT: Quorum-based power-saving (QPS) protocols have been proposed for ad hoc networks (e.g., IEEE 802.11 ad hoc mode) to increase energy efficiency and prolong the operational time of mobile stations. These protocols assign to each station a cycle pattern that specifies when the station should wake up (to transmit/receive data) and sleep (to save battery power). In all existing QPS protocols, the cycle length is either identical for all stations or is restricted to certain numbers (e.g., squares or primes). These restrictions on cycle length severely limit the practical use of QPS protocols as each individual station may want to select a cycle length that is best suited for its own need (in terms of remaining battery power, tolerable packet delay, and drop ratio). In this paper, we propose the notion of hyper quorum system (HQS)—a generalization of QPS that allows for arbitrary cycle lengths. We describe algorithms to generate two different classes of HQS given any set of arbitrary cycle lengths as input. We also describe how to find the optimal cycle length for a station to maximize energy efficiency, subject to certain performance constraints. We then present analytical and simulation results that show the benefits of HQS-based power-saving protocols over the existing QPS protocols. The HQS protocols yield up to 41% improvement in energy efficiency under heavy traffic loads while eliminating more than 90% delay drops under light traffic loads.
  • 2. EXISTING SYSTEM: In all existing QPS protocols, the cycle length is either identical for all stations or is restricted to certain numbers (e.g., squares or primes). These restrictions on cycle length severely limit the practical use of QPS protocols as each individual station may want to select a cycle length that is best suited for its own need (in terms of remaining battery power, tolerable packet delay, and drop ratio). In this paper, we propose the notion of hyper quorum system (HQS)—a generalization of QPS that allows for arbitrary cycle lengths. We describe algorithms to generate two different classes of HQS given any set of arbitrary cycle lengths as input. Existing QPS protocols for ad hoc networks can be classifiedinto two categories: the static and semi-adaptive protocols. PROPOSED SYSTEM: Quorum-based power-saving (QPS) protocols have been proposed for ad hoc networks (e.g., IEEE 802.11 ad hoc mode) to increase energy efficiency and prolong the operational time of mobile stations. HQS-based power management protocol renderssignificantly more stable performance under various trafficloads as compared to traditional QPS protocols. In particular, itgives up to 41% improvement in energy efficiency under heavytraffic loads while eliminating more than 90% delay dropsunder light traffic loads. CONCLUSION: We generalized traditional quorum systems and proposed the Hyper Quorum System. We showed that HQS is fully adaptive in the sense that a station can select any value of cycle length that is best suited to its own requirements in terms of packet delay and power constraint. Two HQS constructing schemes were presented that facilitate power saving under both delay-constrained and best-effort traffic. Both the constructing
  • 3. schemes run in time, which may be readily adopted by nodes (e.g., sensors) with limited computing power. We derived an analytical model characterizing the performance of a QPS protocol, based on which stations can determine a proper scheme and the optimal cycle length. Experimental results showed that our HQS-based power management protocol renders significantly more stable performance under various traffic loads as compared to traditional QPS protocols. In particular, it gives up to 41% improvement in energy efficiency under heavy traffic loads while eliminating more than 90% delay drops under light traffic loads. SYSTEM CONFIGURATION:- HARDWARE CONFIGURATION:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA SOFTWARE CONFIGURATION:-  Operating System : Windows XP  Programming Language : JAVA  Java Version : JDK 1.6 & above.