Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
mobile sampling of sensor field data using controlled broadcast
#1

Mobile Sampling of Sensor Field Data Using Controlled Broadcast
[attachment=78]
ABSTRACT:
Mobile objects can be used to gather samples from a sensor field. Civilian vehicles or even human beings equipped with proper wireless communication devices can be used as mobile sinks that retrieve sensor-data from sampling points within a large sensor field. A key challenge is how to gather the sensor data in a manner that is energy efficient with respect to the sensor nodes that serve as sources of the sensor data. In this paper, an algorithmic technique called Band-based Directional Broadcast is introduced to control the direction of broadcasts that originate from sensor nodes. The goal is to direct each broadcast of sensor data toward the mobile sink, thus reducing costly forwarding of sensor data packets. The technique is studied by simulations that consider energy consumption and data deliverability.
EXISTING SYSTEM
In the existing system when transferring data from sender to receiver there may be chances of data loss. No user can be known whether the router is free after he sends data to the router. Also no intimation when the buffer at the router is full or busy or free. It causes retransmission of data to the router and hence redundant bandwidth usage and consumption of time
PROPOSED SYSTEM
The main objective of this project is to reduce the congestion when data transfers between source and destination. When data transfers between source and destination there may be chances of occurrence of congestion and also it monitor when congestion occurs. If so that has to be intimated or warned to the user. In this System, using several algorithms viz. Leaky bucket algorithm and Virtual scheduling algorithm congestion can be avoided.
Leaky Bucket Algorithm continuously receives and sends the data at the particular interval of time to avoid congestion or flooding of data. Virtual scheduling algorithm monitors the congestion occurrence, when congestion occurs it intimates or warns user and simultaneously intimates when the router is free and data transferred successfully to destination.
This system can be implemented in a real network to control the traffic occurred in a network. User can get to know the status of the router whether router is busy in controlling the inflow and outflow of data to transfer data to the destination.
HARDWARE REQUIREMENTS
The most common set of requirements defined by any operating system or software application is the physical computer resources, also known as hardware. The hardware requirements required for this project are:
20 GB of Hard disk
256 MB RAM
Pentium 133 MHZ or above (Processor)
PC s which are interconnected in LAN
Network Adapter card configured with an IP address
SOFTWARE REQUIREMENTS
Software Requirements deal with defining software resource requirements and pre-requisites that need to be installed on a computer to provide optimal functioning of an application. These requirements or pre-requisites are generally not included in the software installation package and need to be installed separately before the software is installed. The software requirements that are required for this project are:
Java 1.3 or more
Windows 98 or more
MODULES
The project comprises of three modules as follows:
Source Module.
Router Module.
Destination Module.
Source Module
The task of this Module is to divide the Message in the form of 48 Bytes and forward it into the Router. The allocated Bytes are called as Packets.
The message is divided into fixed-sized packets called cells.
The cells are appended with appropriate header information.
The header contains the destination machine name.
The total packet length is 53 bytes i.e. 48-byte data + 5-byte header
The packets are forwarded to the router for further processing.
Router Module
The task of this Module is to accept the packet from the Source. Each and Every packet arrived in the router are send to Destination based on the GCRA algorithm. GCRA algorithm implements two algorithms.
Virtual Scheduling Algorithm
It continuously monitors the traffic inflow and it anticipate occurrence of congestion, it sends a warning message to the Source Machine to slow down the traffic and clear the buffer in the Router Machine.
Leaky Bucket Algorithm
It sends the cells to the corresponding Destination Machine at a regular interval (i.e. certain rate corresponding to a traffic cell rate parameter) message to the Source Machine to continue the cell transmission.
Reply

#2
to get information about the topic "mobile sampling of sensor field data using controlled broadcast" full report refer the page link bellow

http://seminarsprojects.net/Thread-mobil...-broadcast
Reply

#3

please send me the overview of the mobile sampling of sensor field data using controlled broadcast iee project
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

Powered By MyBB, © 2002-2024 iAndrew & Melroy van den Berg.