SlideShare uma empresa Scribd logo
1 de 9
Baixar para ler offline
CAPACITY OF HYBRID WIRELESS MESH NETWORKS
WITH RANDOM APS
ABSTRACT:
In conventional Wireless Mesh Networks (WMNs), multihop relays are performed in the backbone comprising
of interconnected Mesh Routers (MRs) and this causes capacity degradation.
We propose hybrid WMN architecture that the backbone is able to utilize random connections to Access Points
(APs) of Wireless Local Area Network (WLAN). In such a proposed hierarchal architecture, capacity
enhancement can be achieved by letting the traffic take advantage of the wired connections through APs.
Theoretical analysis has been conducted for the asymptotic capacity of three-tier hybrid WMN, where per-MR
capacity in the backbone is first derived and per-MC capacity is then obtained. Besides related to the number of
R cells as a conventional WMN, the analytical results reveal that the asymptotic capacity of a hybrid WMN is
also strongly affected by the number of cells having AP connections, the ratio of access link bandwidth to
backbone link bandwidth, etc.
MR configuration of the network can drastically improve the network capacity in our proposed network
architecture. It also shows that the traffic balance among the MRs with AP access is very important to have a
tighter asymptotic capacity bound. The results and conclusions justify the perspective of having such a hybrid
WMN utilizing widely deployed WLANs.
GLOBALSOFT TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
EXISTING SYSTEM:
The Mesh routers (MRs) play an essential role in a WMN, which provides service for MCs on one hand;
forward data packets via wireless link to neighboring MRs on the other hand. Interconnected MRs form the
backbone of a WMN, where several special MRs connecting to the
Internet with wired cables are called Internet Gateways (IGWs). By taking disadvantage of wireless Multihop
forwarding deployment of MRs poses much less constraints as they can be deployed on electric poles or house
rooftop. Such deployment feasibility enables a WMN to provide low cost metro-scale coverage for MCs’
access. The major challenge in a WMN is the capacity degradation problem caused by the interference on a
single or multiple routing paths during Multihop transmission. Although the network architecture of any WMN
is different from an ad hoc network, the asymptotic capacity bound derived by the analytical work in [3] is still
valid for a WMN backbone.
DISADVANTAGES:
Actually, MRs need not have access to A/C power as energy can be supplied from self-equipped solar
panels.
The whole WMN forms multiple clusters where each cluster is led by an IGW and constraints MRs
closer to the IGW. Readers interested in various cluster construction methods are suggested.
Similar network architecture is the hybrid ad hoc networks, where infrastructures are interconnected
with wired cables and deliver data packets for ad hoc clients in a single or multiple hops.
PROPOSED SYSTEM:
The designed to have information about the complete network topology so as to perform routing functions
without involving the IGW capacity is constrained by the IGWs and the capacity may be worse than that of ad
hoc routing in the backbone. Having the whole network information at the MRs may lead to excessive overhead
and may not facilitate easy management of the clustering approach. The backbone of a WMN consists of MRs
and IGWs, where the MRs and the IGWs are wireless interconnected to each other and provide service to the
MCs. Multiple IGWs divide a WMN into several clusters such that each one is led by an IGW.
We investigate such an IGW cluster. MRs in the cluster is homogeneous that have the same backbone and
access link transmission region. Due to interference among neighboring MRs, they have to share wireless
resources in the frequency domain and/or time domain. The network is modeled as shown in Fig. 4, where grid
deployed MRs are indicated by blue circles, the IGW is indicated by red rectangles, randomly distributed MCs
are indicated by green dots, and APs are indicated by dark triangles. The three tiers of a hybrid WMN are: MCs
in the first tier connect to the MRs in the second tier.
ADVANTAGES:
The second tier also interconnects to each other. So, the traffic from MCs can exchange via the
connections among MRs in the second tier.
The connections from the MRs in the second tier to the APs in the third tier are random, which are
denoted by dotted lines in the figure. While wireless connections between the second tier and the third tier
available, the traffic between two MRs in the second tier can be exchanged via the third tier.
HARDWARE & SOFTWARE REQUIREMENTS:
HARDWARE REQUIREMENT:
 Processor - Pentium –IV
 Speed - 1.1 GHz
 RAM - 256 MB (min)
 Hard Disk - 20 GB
 Floppy Drive - 1.44 MB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - SVGA
SOFTWARE REQUIREMENTS:
 Operating System : Windows XP
 Front End : Visual Studio .Net 2008
 Scripts : C# Script.
MODULES:
 NOVEL NETWORK ARCHITECTURE
 NETWORK MODEL AND ANALYSIS
 HYBRID WMN ARCHITECTURE
 TRAFFIC MODEL
 ROUTING AND TRAFFIC BALANCE
 ROUTING AND TRAFFIC BALANCE
 PER-MC CAPACITY
MODULE DESCRIPTION:
NOVEL NETWORK ARCHITECTURE:
The proposing a novel network architecture a hybrid WMN, which will have a higher capacity than a
conventional WMN. Presence of APs in the deployment area of conventional WMNs is assumed and access
links for the connections to MRs are used. Thus, from the network architecture view, existing WMN is extended
with new elements Ps and a new link type AP-MR link, and translates a two-tier network into a three-tier
network.
NETWORK MODEL AND ANALYSIS:
Multiple IGWs divide a WMN into several clusters such that each one is led by an IGW. We investigate such an
IGW cluster. MRs in the cluster is homogeneous that have the same backbone and access link transmission
region. Due to interference among neighboring MRs, they have to share wireless resources in the frequency
domain and/or time domain. AP is present in the transmission range of anMRcell, MR can access the AP. The
connection between the MR and the AP is also an access link, which shares bandwidth with the MCs it is
serving. We call the MR with AP connection as AP-MR and the MR without AP connection as non-AP-MR.
While we use term “MR” without specifying and it means both kinds of MRs.
HYBRID WMN ARCHITECTURE:
The network is modeled where grid deployed MRs are indicated by blue circles, the IGW is indicated by red
rectangles, randomly distributed MCs are indicated by green dots, and APs are indicated by dark triangles. The
three tiers of a hybrid WMN are: MCs in the first tier connect to the MRs in the second tier. Each MR provides
network access service for multiple MCs. MRs in the second tier also interconnects to each other. So, the traffic
from MCs can exchange via the connections among MRs in the second tier. There is one IGW in the second
layer to provide Internet access to MRs. The third tier includes APs which are connected to each other by wired
connections.
TRAFFIC MODEL:
The traffic generated or terminated at MCs can be divided into intercluster and intracluster traffic. The
intercluster traffic is from the MCs to the destination outside the cluster or from the source outside the cluster to
the MC in the cluster. The traffic goes to the IGW and the IGW is in-charge of aggregating intercluster traffic,
routing in the wired network, protocol conversation, etc. Without loss of generality, we assume inter-cluster
traffic is from the MCs to the IGW. This condition also applies in the reverse direction.
ROUTING AND TRAFFIC BALANCE:
The routing and traffic balance scheme used in analyzing a WMN backbone, we use a 2D grid-based WMN.
The connectivity graphs of the MRs, which are denoted by dots at the intersection points, denote the
communication links. Packets can transmit from one MR to the neighboring MR in the grid, which counts as
one-hop transmission.
PER-MC CAPACITY:
The utilizing a random AP connection, the ratio of the backbone link bandwidth to the access link bandwidth is
very critical. The traffic via the APs employs the access link. While it is not sufficient, the benefits from using
the random connections will be limited. An increase in the number of AP-MRs can help increase the traffic
through the APs. The efficiency of implementing a large number of APs depends very much on the strategies of
traffic load balancing.
FLOW CHART
CONCLUSION:
In this paper, we have derived asymptotic capacity of hybrid WMN architecture with random connections to
APs. With this, the access link bandwidth greatly affects the capacity, which is different from a conventional
WMN. To some extent, the ratio of access link bandwidth to backbone link bandwidth is critical. It dominates
the capacity bottleneck and magnifies the influence of AP-MRs.
Theoretical results show that the capacity enhancement by accessing APs within the coverage of MRs is
significant with an increase in the number of AP-MRs and the bandwidth ratio. The improvement is at the very
low cost by utilizing currently available networks and it is also possible for those networks to take advantage of
a WMN.
We access to the APs are random, it may have negative impact on WLANs’ performance when the WLANs’
traffics are heavy. In the future work, we plan to consider the traffic between MRs and WLANs so as to have a
control mechanism that takes the traffic load at the APs into account.
REFERENCES:
[1] N. Nandiraju, D. Nandiraju, L. Santhanam, B. He, J. Wang, and D.P. Agrawal, “Wireless Mesh Networks:
Current Challenges and Future Directions of Web-in-the-Sky,” IEEE Wireless Comm., vol. 14, no. 4, pp. 79-89,
Aug. 2007.
[2] C. Cordeiro and D.P. Agrawal, Ad Hoc & Sensor Networks: Theory and Applications. World Scientific,
2006.
[3] P. Gupta and P. Kumar, “The Capacity of Wireless Networks,” IEEE Trans. Information Theory, vol. 46,
no. 2, pp. 388-404, Mar. 2000.
[4] B. He, B. Xie, and D.P. Agrawal, “Optimizing the Internet Gateway Deployment in a Wireless Mesh
Network,” Proc. IEEE Int’l Conf. Mobile Adhoc and Sensor Systems (MASS), 2007.
[5] B. Liu, Z. Liu, and D. Towsley, “On the Capacity of Hybrid Wireless Networks,” Proc. IEEE INFOCOM,
2003.
[6] U.C. Kozat and L. Tassulas, “Throughput Capacity of Random Ad Hoc Networks with Infrastructure
Support,” Proc. ACM MobiCom, 2003.
[7] A. Zemlianov and G. Veciana, “Capacity of Ad Hoc Wireless Networks with Infrastructure Support,” IEEE
J. Selected Area in Comm., vol. 23, no. 3, pp. 657-667, Mar. 2005.
[8] P. Zhou, X. Wang, and R. Rao, “Asymptotic Capacity of Infrastructure Wireless Mesh Networks,” IEEE
Trans. Mobile Computing, vol. 7, no. 8, pp. 1011-1024, Aug. 2008.

Mais conteúdo relacionado

Mais procurados

JOINT-DESIGN OF LINK-ADAPTIVE MODULATION AND CODING WITH ADAPTIVE ARQ FOR COO...
JOINT-DESIGN OF LINK-ADAPTIVE MODULATION AND CODING WITH ADAPTIVE ARQ FOR COO...JOINT-DESIGN OF LINK-ADAPTIVE MODULATION AND CODING WITH ADAPTIVE ARQ FOR COO...
JOINT-DESIGN OF LINK-ADAPTIVE MODULATION AND CODING WITH ADAPTIVE ARQ FOR COO...IJCNCJournal
 
multicast capacity in manet with infrastructure support
multicast capacity in manet with infrastructure supportmulticast capacity in manet with infrastructure support
multicast capacity in manet with infrastructure supportswathi78
 
Dotnet delay-optimal broadcast for multihop wireless networks using self-int...
Dotnet  delay-optimal broadcast for multihop wireless networks using self-int...Dotnet  delay-optimal broadcast for multihop wireless networks using self-int...
Dotnet delay-optimal broadcast for multihop wireless networks using self-int...Ecway Technologies
 
IJCTET2015123106
IJCTET2015123106IJCTET2015123106
IJCTET2015123106ijctet
 
Efficient Load Balancing Routing in Wireless Mesh Networks
Efficient Load Balancing Routing in Wireless Mesh NetworksEfficient Load Balancing Routing in Wireless Mesh Networks
Efficient Load Balancing Routing in Wireless Mesh Networksijceronline
 
Investigation of Clock Synchronization Techniques and its Performance Impact ...
Investigation of Clock Synchronization Techniques and its Performance Impact ...Investigation of Clock Synchronization Techniques and its Performance Impact ...
Investigation of Clock Synchronization Techniques and its Performance Impact ...ijctet
 
M phil-computer-science-networking-projects
M phil-computer-science-networking-projectsM phil-computer-science-networking-projects
M phil-computer-science-networking-projectsVijay Karan
 
Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...Roopali Singh
 

Mais procurados (10)

JOINT-DESIGN OF LINK-ADAPTIVE MODULATION AND CODING WITH ADAPTIVE ARQ FOR COO...
JOINT-DESIGN OF LINK-ADAPTIVE MODULATION AND CODING WITH ADAPTIVE ARQ FOR COO...JOINT-DESIGN OF LINK-ADAPTIVE MODULATION AND CODING WITH ADAPTIVE ARQ FOR COO...
JOINT-DESIGN OF LINK-ADAPTIVE MODULATION AND CODING WITH ADAPTIVE ARQ FOR COO...
 
multicast capacity in manet with infrastructure support
multicast capacity in manet with infrastructure supportmulticast capacity in manet with infrastructure support
multicast capacity in manet with infrastructure support
 
VIBRANT TOPOLOGY GOVERNOR IN MOBILE AD HOC NETWORKS WITH COOPERATIVE COMMUNIC...
VIBRANT TOPOLOGY GOVERNOR IN MOBILE AD HOC NETWORKS WITH COOPERATIVE COMMUNIC...VIBRANT TOPOLOGY GOVERNOR IN MOBILE AD HOC NETWORKS WITH COOPERATIVE COMMUNIC...
VIBRANT TOPOLOGY GOVERNOR IN MOBILE AD HOC NETWORKS WITH COOPERATIVE COMMUNIC...
 
Dotnet delay-optimal broadcast for multihop wireless networks using self-int...
Dotnet  delay-optimal broadcast for multihop wireless networks using self-int...Dotnet  delay-optimal broadcast for multihop wireless networks using self-int...
Dotnet delay-optimal broadcast for multihop wireless networks using self-int...
 
IJCTET2015123106
IJCTET2015123106IJCTET2015123106
IJCTET2015123106
 
Efficient Load Balancing Routing in Wireless Mesh Networks
Efficient Load Balancing Routing in Wireless Mesh NetworksEfficient Load Balancing Routing in Wireless Mesh Networks
Efficient Load Balancing Routing in Wireless Mesh Networks
 
Investigation of Clock Synchronization Techniques and its Performance Impact ...
Investigation of Clock Synchronization Techniques and its Performance Impact ...Investigation of Clock Synchronization Techniques and its Performance Impact ...
Investigation of Clock Synchronization Techniques and its Performance Impact ...
 
M phil-computer-science-networking-projects
M phil-computer-science-networking-projectsM phil-computer-science-networking-projects
M phil-computer-science-networking-projects
 
Antijam ipsn09
Antijam ipsn09Antijam ipsn09
Antijam ipsn09
 
Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...
 

Semelhante a DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh networks with random a ps

Capacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psCapacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psecway
 
Capacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psCapacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psEcway Technologies
 
Java capacity of hybrid wireless mesh networks with random a ps
Java  capacity of hybrid wireless mesh networks with random a psJava  capacity of hybrid wireless mesh networks with random a ps
Java capacity of hybrid wireless mesh networks with random a psecwayerode
 
Capacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psCapacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psEcway Technologies
 
Active Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
Active Path Updation For Layered Routing (Apular) In Wireless Mesh NetworksActive Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
Active Path Updation For Layered Routing (Apular) In Wireless Mesh Networkschetan1nonly
 
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...IJECEIAES
 
Capacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psCapacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psEcway2004
 
Dotnet capacity of hybrid wireless mesh networks with random a ps
Dotnet  capacity of hybrid wireless mesh networks with random a psDotnet  capacity of hybrid wireless mesh networks with random a ps
Dotnet capacity of hybrid wireless mesh networks with random a psEcwaytech
 
Dotnet capacity of hybrid wireless mesh networks with random a ps
Dotnet  capacity of hybrid wireless mesh networks with random a psDotnet  capacity of hybrid wireless mesh networks with random a ps
Dotnet capacity of hybrid wireless mesh networks with random a psEcwayt
 
Capacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psCapacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psEcwayt
 
Capacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psCapacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psEcwayt
 
Capacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psCapacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psEcwaytechnoz
 
Capacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psCapacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psecwayprojects
 
Capacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psCapacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psEcwayt
 
M.Phil Computer Science Networking Projects
M.Phil Computer Science Networking ProjectsM.Phil Computer Science Networking Projects
M.Phil Computer Science Networking ProjectsVijay Karan
 
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...IJMER
 

Semelhante a DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh networks with random a ps (20)

Capacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psCapacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a ps
 
Capacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psCapacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a ps
 
Java capacity of hybrid wireless mesh networks with random a ps
Java  capacity of hybrid wireless mesh networks with random a psJava  capacity of hybrid wireless mesh networks with random a ps
Java capacity of hybrid wireless mesh networks with random a ps
 
Capacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psCapacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a ps
 
Active Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
Active Path Updation For Layered Routing (Apular) In Wireless Mesh NetworksActive Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
Active Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
 
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
 
Capacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psCapacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a ps
 
Dotnet capacity of hybrid wireless mesh networks with random a ps
Dotnet  capacity of hybrid wireless mesh networks with random a psDotnet  capacity of hybrid wireless mesh networks with random a ps
Dotnet capacity of hybrid wireless mesh networks with random a ps
 
Dotnet capacity of hybrid wireless mesh networks with random a ps
Dotnet  capacity of hybrid wireless mesh networks with random a psDotnet  capacity of hybrid wireless mesh networks with random a ps
Dotnet capacity of hybrid wireless mesh networks with random a ps
 
Capacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psCapacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a ps
 
Capacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psCapacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a ps
 
Capacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psCapacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a ps
 
Capacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psCapacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a ps
 
Capacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psCapacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a ps
 
Ccn ppt
Ccn pptCcn ppt
Ccn ppt
 
C046022025
C046022025C046022025
C046022025
 
M.Phil Computer Science Networking Projects
M.Phil Computer Science Networking ProjectsM.Phil Computer Science Networking Projects
M.Phil Computer Science Networking Projects
 
B031201016019
B031201016019B031201016019
B031201016019
 
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
 
G04122038042
G04122038042G04122038042
G04122038042
 

Mais de IEEEGLOBALSOFTTECHNOLOGIES

DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...IEEEGLOBALSOFTTECHNOLOGIES
 

Mais de IEEEGLOBALSOFTTECHNOLOGIES (20)

DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
 

Último

Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?SANGHEE SHIN
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataCloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataSafe Software
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
GenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncGenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncObject Automation
 
Spring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdfSpring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdfAnna Loughnan Colquhoun
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 

Último (20)

Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataCloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
GenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncGenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation Inc
 
Spring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdfSpring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdf
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 

DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh networks with random a ps

  • 1. CAPACITY OF HYBRID WIRELESS MESH NETWORKS WITH RANDOM APS ABSTRACT: In conventional Wireless Mesh Networks (WMNs), multihop relays are performed in the backbone comprising of interconnected Mesh Routers (MRs) and this causes capacity degradation. We propose hybrid WMN architecture that the backbone is able to utilize random connections to Access Points (APs) of Wireless Local Area Network (WLAN). In such a proposed hierarchal architecture, capacity enhancement can be achieved by letting the traffic take advantage of the wired connections through APs. Theoretical analysis has been conducted for the asymptotic capacity of three-tier hybrid WMN, where per-MR capacity in the backbone is first derived and per-MC capacity is then obtained. Besides related to the number of R cells as a conventional WMN, the analytical results reveal that the asymptotic capacity of a hybrid WMN is also strongly affected by the number of cells having AP connections, the ratio of access link bandwidth to backbone link bandwidth, etc. MR configuration of the network can drastically improve the network capacity in our proposed network architecture. It also shows that the traffic balance among the MRs with AP access is very important to have a tighter asymptotic capacity bound. The results and conclusions justify the perspective of having such a hybrid WMN utilizing widely deployed WLANs. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
  • 2. EXISTING SYSTEM: The Mesh routers (MRs) play an essential role in a WMN, which provides service for MCs on one hand; forward data packets via wireless link to neighboring MRs on the other hand. Interconnected MRs form the backbone of a WMN, where several special MRs connecting to the Internet with wired cables are called Internet Gateways (IGWs). By taking disadvantage of wireless Multihop forwarding deployment of MRs poses much less constraints as they can be deployed on electric poles or house rooftop. Such deployment feasibility enables a WMN to provide low cost metro-scale coverage for MCs’ access. The major challenge in a WMN is the capacity degradation problem caused by the interference on a single or multiple routing paths during Multihop transmission. Although the network architecture of any WMN is different from an ad hoc network, the asymptotic capacity bound derived by the analytical work in [3] is still valid for a WMN backbone. DISADVANTAGES: Actually, MRs need not have access to A/C power as energy can be supplied from self-equipped solar panels. The whole WMN forms multiple clusters where each cluster is led by an IGW and constraints MRs closer to the IGW. Readers interested in various cluster construction methods are suggested. Similar network architecture is the hybrid ad hoc networks, where infrastructures are interconnected with wired cables and deliver data packets for ad hoc clients in a single or multiple hops. PROPOSED SYSTEM: The designed to have information about the complete network topology so as to perform routing functions without involving the IGW capacity is constrained by the IGWs and the capacity may be worse than that of ad hoc routing in the backbone. Having the whole network information at the MRs may lead to excessive overhead and may not facilitate easy management of the clustering approach. The backbone of a WMN consists of MRs and IGWs, where the MRs and the IGWs are wireless interconnected to each other and provide service to the MCs. Multiple IGWs divide a WMN into several clusters such that each one is led by an IGW. We investigate such an IGW cluster. MRs in the cluster is homogeneous that have the same backbone and access link transmission region. Due to interference among neighboring MRs, they have to share wireless resources in the frequency domain and/or time domain. The network is modeled as shown in Fig. 4, where grid deployed MRs are indicated by blue circles, the IGW is indicated by red rectangles, randomly distributed MCs
  • 3. are indicated by green dots, and APs are indicated by dark triangles. The three tiers of a hybrid WMN are: MCs in the first tier connect to the MRs in the second tier. ADVANTAGES: The second tier also interconnects to each other. So, the traffic from MCs can exchange via the connections among MRs in the second tier. The connections from the MRs in the second tier to the APs in the third tier are random, which are denoted by dotted lines in the figure. While wireless connections between the second tier and the third tier available, the traffic between two MRs in the second tier can be exchanged via the third tier. HARDWARE & SOFTWARE REQUIREMENTS: HARDWARE REQUIREMENT:  Processor - Pentium –IV  Speed - 1.1 GHz  RAM - 256 MB (min)  Hard Disk - 20 GB  Floppy Drive - 1.44 MB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA
  • 4. SOFTWARE REQUIREMENTS:  Operating System : Windows XP  Front End : Visual Studio .Net 2008  Scripts : C# Script.
  • 5. MODULES:  NOVEL NETWORK ARCHITECTURE  NETWORK MODEL AND ANALYSIS  HYBRID WMN ARCHITECTURE  TRAFFIC MODEL  ROUTING AND TRAFFIC BALANCE  ROUTING AND TRAFFIC BALANCE  PER-MC CAPACITY
  • 6. MODULE DESCRIPTION: NOVEL NETWORK ARCHITECTURE: The proposing a novel network architecture a hybrid WMN, which will have a higher capacity than a conventional WMN. Presence of APs in the deployment area of conventional WMNs is assumed and access links for the connections to MRs are used. Thus, from the network architecture view, existing WMN is extended with new elements Ps and a new link type AP-MR link, and translates a two-tier network into a three-tier network. NETWORK MODEL AND ANALYSIS: Multiple IGWs divide a WMN into several clusters such that each one is led by an IGW. We investigate such an IGW cluster. MRs in the cluster is homogeneous that have the same backbone and access link transmission region. Due to interference among neighboring MRs, they have to share wireless resources in the frequency domain and/or time domain. AP is present in the transmission range of anMRcell, MR can access the AP. The connection between the MR and the AP is also an access link, which shares bandwidth with the MCs it is serving. We call the MR with AP connection as AP-MR and the MR without AP connection as non-AP-MR. While we use term “MR” without specifying and it means both kinds of MRs. HYBRID WMN ARCHITECTURE: The network is modeled where grid deployed MRs are indicated by blue circles, the IGW is indicated by red rectangles, randomly distributed MCs are indicated by green dots, and APs are indicated by dark triangles. The three tiers of a hybrid WMN are: MCs in the first tier connect to the MRs in the second tier. Each MR provides network access service for multiple MCs. MRs in the second tier also interconnects to each other. So, the traffic from MCs can exchange via the connections among MRs in the second tier. There is one IGW in the second layer to provide Internet access to MRs. The third tier includes APs which are connected to each other by wired connections. TRAFFIC MODEL: The traffic generated or terminated at MCs can be divided into intercluster and intracluster traffic. The intercluster traffic is from the MCs to the destination outside the cluster or from the source outside the cluster to the MC in the cluster. The traffic goes to the IGW and the IGW is in-charge of aggregating intercluster traffic, routing in the wired network, protocol conversation, etc. Without loss of generality, we assume inter-cluster traffic is from the MCs to the IGW. This condition also applies in the reverse direction. ROUTING AND TRAFFIC BALANCE:
  • 7. The routing and traffic balance scheme used in analyzing a WMN backbone, we use a 2D grid-based WMN. The connectivity graphs of the MRs, which are denoted by dots at the intersection points, denote the communication links. Packets can transmit from one MR to the neighboring MR in the grid, which counts as one-hop transmission. PER-MC CAPACITY: The utilizing a random AP connection, the ratio of the backbone link bandwidth to the access link bandwidth is very critical. The traffic via the APs employs the access link. While it is not sufficient, the benefits from using the random connections will be limited. An increase in the number of AP-MRs can help increase the traffic through the APs. The efficiency of implementing a large number of APs depends very much on the strategies of traffic load balancing. FLOW CHART
  • 8. CONCLUSION: In this paper, we have derived asymptotic capacity of hybrid WMN architecture with random connections to APs. With this, the access link bandwidth greatly affects the capacity, which is different from a conventional WMN. To some extent, the ratio of access link bandwidth to backbone link bandwidth is critical. It dominates the capacity bottleneck and magnifies the influence of AP-MRs. Theoretical results show that the capacity enhancement by accessing APs within the coverage of MRs is significant with an increase in the number of AP-MRs and the bandwidth ratio. The improvement is at the very low cost by utilizing currently available networks and it is also possible for those networks to take advantage of a WMN. We access to the APs are random, it may have negative impact on WLANs’ performance when the WLANs’ traffics are heavy. In the future work, we plan to consider the traffic between MRs and WLANs so as to have a control mechanism that takes the traffic load at the APs into account.
  • 9. REFERENCES: [1] N. Nandiraju, D. Nandiraju, L. Santhanam, B. He, J. Wang, and D.P. Agrawal, “Wireless Mesh Networks: Current Challenges and Future Directions of Web-in-the-Sky,” IEEE Wireless Comm., vol. 14, no. 4, pp. 79-89, Aug. 2007. [2] C. Cordeiro and D.P. Agrawal, Ad Hoc & Sensor Networks: Theory and Applications. World Scientific, 2006. [3] P. Gupta and P. Kumar, “The Capacity of Wireless Networks,” IEEE Trans. Information Theory, vol. 46, no. 2, pp. 388-404, Mar. 2000. [4] B. He, B. Xie, and D.P. Agrawal, “Optimizing the Internet Gateway Deployment in a Wireless Mesh Network,” Proc. IEEE Int’l Conf. Mobile Adhoc and Sensor Systems (MASS), 2007. [5] B. Liu, Z. Liu, and D. Towsley, “On the Capacity of Hybrid Wireless Networks,” Proc. IEEE INFOCOM, 2003. [6] U.C. Kozat and L. Tassulas, “Throughput Capacity of Random Ad Hoc Networks with Infrastructure Support,” Proc. ACM MobiCom, 2003. [7] A. Zemlianov and G. Veciana, “Capacity of Ad Hoc Wireless Networks with Infrastructure Support,” IEEE J. Selected Area in Comm., vol. 23, no. 3, pp. 657-667, Mar. 2005. [8] P. Zhou, X. Wang, and R. Rao, “Asymptotic Capacity of Infrastructure Wireless Mesh Networks,” IEEE Trans. Mobile Computing, vol. 7, no. 8, pp. 1011-1024, Aug. 2008.