Sunteți pe pagina 1din 13

PROJECT NAME

Dissertation submitted in fulfilment of the requirements for the Degree of

BACHELOR OF TECHNOLOGY
in
COMPUTER SCIENCE AND ENGINEERING

By
Kokkera Rakesh(11406377)
Biswajit rout(Reg No)

Supervisor
Jasmeet kaur

School of Computer Applications


Lovely Professional University
Phagwara, Punjab (India)
DEC, 2017
PAC FORM

1
CERTIFICATE

This is to certify that the work reported in the Capstone Project entitled “Name of
Project”, submitted by Name(1), Name(2),.... at Lovely Professional University,
Phagwara, India is a bonafide record of his/her original work carried out under my
supervision. This work has not been submitted elsewhere for any other degree.

Signature of Supervisor

Date:

Counter Signed by:

1) HoD’s Signature: ________________

HoD Name: ___________________

Date: ___________________

2) Neutral Examiners:

(i) Examiner 1

Signature: _______________

Name: __________________

Date: ___________________

(ii) Examiner 2

Signature: _______________

Name: __________________

Date: ___________________

2
ACKNOWLEDGEMENTS

3
TABLE OF CONTENTS

CONTENTS PAGE NO.

PAC form ii

Certificate v

Acknowledgement vi

Table of Contents vii

List of Figures x

CHAPTER1: INTRODUCTION 1

1.1 WIRELESS AD HOC NETWORKS 1

1.2 MOBILE AD HOC NETWORK 2

1.2.1 ROUTING PROTOCOLS IN MANET 4

1.2.2 ADVANTAGES, DISADVANTAGES AND

APPLICATIONS OF MANET 6

1.3 DELAY TOLERANT NETWORK 6

1.4 OPPORTUNISTIC NETWORK 7

1.4.1 FIND OPPORTUNITY 9

4
TABLE OF CONTENTS

CONTENTS PAGE NO.

1.4.2 MESSAGE EXCHANGE 10

1.4.3 INFORMATION SPRINKLER 12

1.4.4 NODES 12

1.4.5 ROUTING PROTOCOLS 12

1.4.6 PRIVACY THREAT IN

OPPORTUNISTIC NETWORK 14

1.4.7 APPLICATIONS OF

OPPORTUNISTIC NETWORK 14

1.4.8 DIFFICULTIES IN OPPORTUNISTIC

NETWORK 15

1.4.9 ISSUES, SECURITY, AND PRIVACY

CHALLENGES IN OPPNET 15

CHAPTER2: REVIEW OF LITERATURE 18

CHAPTER3: PRESENT WORK 32

3.1 PROBLEM FORMULATION 32

3.2 OBJECTIVES OF THE STUDY 32

3.3 RESEARCH METHODOLOGY 32

5
TABLE OF CONTENTS

CONTENTS PAGE NO.

CHAPTER4: RESULTS AND DISCUSSION 36

4.1 EXPERIMENTAL RESULTS 36

4.1.1 IMPLEMENTATION TOOL 36

4.1.2 CASE 1 37

4.1.3 CASE 2 39

4.1.4 PROPOSED TECHNIQUE NETWORK

SIMULATION 41

4.2 COMPARISION WITH EXISTING TECHNIQUE 47

4.2.1 COMPARISON IN TERMS OF PACKET LOSS 47

4.2.2 COMPARISON IN TERMS OF THROUGHPUT 48

4.2.3 COMPARISON IN TERMS OF ENERGY LOSS 48

4.2.4 COMPARISON IN TERMS OF DELAY 49

CHAPTER5: CONCLUSION AND FUTURE SCOPE 51

5.1 CONCLUSION 51

5.2 FUTURE SCOPE 52

REFERENCES 53

LIST OF PUBLICATIONS 57

6
LIST OF FIGURES

FIGURE NO. FIGURE DESCRIPTION PAGE NO.

Figure 1.1 A Wireless Ad-hoc Network 2


Figure 1.2 Characteristics of ad hoc networks 3
Figure 1.3 Classification of Ad hoc Routing Protocols 5
Figure 1.4 Example of opportunistic network 7
Figure 1.5 Concept of opportunistic network 9
Figure 1.6 Message forwarding to an intermediate node by source 10
Figure 1.7 Message forwarding between intermediate nodes 11
Figure 1.8 Message forwarding between intermediate node and
destination 11
Figure 3.1 Methodology for virtual identification generation 35
Figure 4.1 Network design for normal scenario 37
Figure 4.2 Sharing message with mobile node (intermediate node) 37
Figure 4.3 Message forwarded to the destination 38
Figure 4.4 Message forwarded to a mobile node (intermediate
selfish node) 39
Figure 4.5 Destination information analyzed by selfish node 39
Figure 4.6 Packet dropped by selfish node 40
Figure 4.7 Proposed network design (1) 41
Figure 4.8 Proposed network design (2) 41
Figure 4.9 Message from source to get new ID; source node’s
request to stable node for a virtual ID 42
Figure 4.10 Authentication by stable node; stable node checks the
table to authenticate the valid user 42
Figure 4.11 Data sharing between stable nodes; stable nodes
compare their tables 43
Figure 4.12 Assigning of new ID to source after sharing data;
stable node provides a new ID to the source 43
Figure 4.13 Ticket receiving by the user 44

7
LIST OF FIGURES

FIGURE NO. FIGURE DESCRIPTION PAGE NO.

Figure 4.14 Data forwarding by using new ID 45


Figure 4.15 Mobility of intermediate node 45
Figure 4.16 Message forwarding by intermediate node to the
closer one in its range 46
Figure 4.17 Message reaches the destination 46
Figure 4.18 Virtual Identification generation 47
Figure 4.19 Packet loss graph 47
Figure 4.20 Throughput graph 48
Figure 4.21 Energy loss graph 48
Figure 4.22 Delay graph 49

8
CHAPTER 1
INTRODUCTION

1.1 Wireless Ad-hoc Networks

1.2 Mobile ad hoc network

Figure 1.2: Characteristics of ad hoc networks

9
1.2.1 Routing protocols in MANET

Ad hoc Routing Protocols

Table- Driven Hybrid On-demand

DSDV ZRP AODV DSR

Figure 1.3: Classification of Ad hoc Routing Protocols

1.2.2 Advantages, Disadvantages, and Applications of MANET

10
CHAPTER 2
-------------------------

11
REFERENCES

12

S-ar putea să vă placă și