Professional Documents
Culture Documents
INTRODUCTION
1.1 OVERVIEW
APPLICATIONS
Area monitoring
Environmental/Earth monitoring
Observing the gas levels at vulnerable areas needs the usage of high-end,
sophisticated equipment, capable to satisfy industrial regulations. Wireless internal
monitoring solutions facilitate keep tabs on large areas as well as ensure the precise
gas concentration degree.
Exterior monitoring
External air quality monitoring needs the use of precise wireless sensors, rain
& wind resistant solutions as well as energy reaping methods to assure extensive
liberty to machine that will likely have tough access.
INDUSTRIAL MONITORING
Main article:
Mobile Cloud Networks are also used for the collection of data for
monitoring of environmental information; this can be as simple as the monitoring of
the temperature in a fridge to the level of water in overflow tanks in nuclear power
plants
Monitoring the quality and level of water includes many activities such as
checking the quality of underground or surface water and ensuring a country’s water
infrastructure for the benefit of both human and animal. The area of water quality
monitoring utilizes Mobile Cloud Networks and many manufacturers have launched
fresh and advanced applications for the purpose.
The consequences of natural perils like floods can be effectively prevented with
Mobile Cloud Networks. Wireless nodes are distributed in rivers so that changes of the
water level can be effectively monitored.
Agriculture
Accurate agriculture
Mobile Cloud Networks let users to make precise monitoring of the crop at the time
of its growth. Hence, farmers can immediately know the state of the item at all its stages
which will ease the decision process regarding the time of harvest.
Irrigation management
When real time data is delivered, farmers are able to achieve intelligent irrigation.
Data regarding the fields such as temperature level and soil moisture are delivered to
farmers through Mobile Cloud Networks.
When each plant is joined with a personal irrigation system, farmers can pour
the precise amount of water each plant needs and hence, reduce the cost and improve
the quality of the end product. The networks can be employed to manage various
actuators in the systems using no wired infrastructure.
Greenhouses
Mobile Cloud Networks are also used to control the temperature and
humidity levels inside commercial greenhouses. When the temperature and humidity
drops below specific levels, the greenhouse manager must be notified via e-mail or
cell phone text message, or host systems can trigger misting systems, open vents,
turn on fans, or control a wide variety of system responses.
CHARACTERISTICS
The base stations are one or more components of the MCN with much more
computational, energy and communication resources. They act as a gateway between sensor
nodes and the end user as they typically forward data from the MCN on to a server. Other
special components in routing based networks are routers, designed to compute, calculate
and distribute the routing tables.
1.2 PLATFORMS
Standards are used far less in MCNs than in other computing systems which
makes most systems incapable of direct communication between different systems.
However predominant standards commonly used in MCN communications include:
ISA100.11a
WirelessHART
IEEE 1451
ZigBee / 802.15.4
ZigBee IP
6LoWPAN
Hardware
One major challenge in a MCN is to produce low cost and tiny sensor nodes.
There are an increasing number of small companies producing MCN hardware and
the commercial situation can be compared to home computing in the 1970s. Many of
the nodes are still in the research and development stage, particularly their software.
Also inherent to sensor network adoption is the use of very low power methods for
data acquisition.
In many applications, a MCN communicates with over a Local Area Network or
Wide Area Network through a gateway. The Gateway acts as a bridge between the
MCN and the other network. This enables data to be stored and processed by device
with more resources, for example in a remotely located Server_ (computing).
Software
Energy is the scarcest resource of MCN nodes, and it determines the lifetime of
MCNs. MCNs are meant to be deployed in large numbers in various environments,
including remote and hostile regions, where ad hoc communications are a key
component. For this reason, algorithms and protocols need to address the following
issues:
Lifetime maximization
Robustness and fault tolerance
Self-configuration
Some of the important topics in MCN (Mobile Cloud Networks) software research are:
Operating systems
Security
Mobility
Operating systems
Operating systems for Mobile Cloud Network nodes are typically less
complex than general-purpose operating systems. They more strongly resemble
embedded systems, for two reasons.
First, Mobile Cloud Networks are typically deployed with a particular
application in mind, rather than as a general platform. Second, a need for low costs
and low power leads most wireless sensor nodes to have low-power microcontrollers
ensuring that mechanisms such as virtual memory are either unnecessary or too
expensive to implement.
TinyOS is perhaps the first operating system specifically designed for Mobile
Cloud Networks. TinyOS is based on an event-driven programming model instead of
multithreading. TinyOS programs are composed of event handlers and tasks with
run-to-completion semantics. When an external event occurs, such as an incoming
data packet or a sensor reading, TinyOS signals the appropriate event handler to
handle the event. Event handlers can post tasks that are scheduled by the TinyOS
kernel some time later.
Online collaborative sensor data management platforms are on-line database services
that allow sensor owners to register and connect their devices to feed data into an online
database for storage and also allow developers to connect to the database and build their
own applications based on that data. Examples include Xivelyand theWikisensing
platform.
Such platforms simplify online collaboration between users over diverse data sets
ranging from energy and environment data to that collected from transport services. Other
services include allowing developers to embed real-time graphs & widgets in websites;
analyse and process historical data pulled from the data feeds; send real-time alerts from
any data stream to control scripts, devices and environments.
[21]
The architecture of the Wiki sensing system is described in describes the key
components of such systems to include APIs and interfaces for online collaborators, a
middleware containing the business logic needed for the sensor data management and
processing and a storage model suitable for the efficient storage and retrieval of large
volumes of data.
Simulation of MCNs
Network simulators like OPNET, NetSim, NS2 and OMNeT can be used to
simulate a Mobile Cloud Network.
Other concepts
If a centralized architecture is used in a sensor network and the central node fails, then
the entire network will collapse, however the reliability of the sensor network can be
increased by using a distributed control architecture. Distributed control is used in
MCNs for the following reasons:
There is also no centralized body to allocate the resources and they have to be self
organized.
The data gathered from Mobile Cloud Networks is usually saved in the form of
numerical data in a central base station. Additionally, the Open Geospatial Consortium
(OGC) is specifying standards for interoperability interfaces and metadata encodings
that enable real time integration of heterogeneous sensor webs into the Internet, allowing
any individual to monitor or control Mobile Cloud Networks through a Web Browser.
In-network processing
Features
In the proposed system introduce about the concept and give an overview idea about
the project. We discuss about the project domain and the detailed description of existing
systems by analysis the literature survey of the existing techniques.
In the project also then presented about the techniques and methods of our proposed
methods. In our proposed method we also listed out the advantages of using our
proposed method. Then we presented the differences between the existing system and
proposed system as a tabular representation stating the advantages of our proposed
system.
In the project made a system analysis of the methods we propose. In Chapter 4, we
listed the Hardware requirements and Software Requirements of our project.
In the project presented the modules and their description. Then we also depicted the
Use-case diagram of our project, then we depicted Class diagram of our project.
In the project concluded our proposal and then in Chapter 7 we list out our references
made for our proposed method.
CHAPTER 2
LITERATURE SURVEY
Traditional TCP has two significant challenges – it can only utilise a single network path
between source and destination per session, and (aside from the gradual deployment of
explicit congestion notification) congestion control relies primarily on packet loss as a
congestion indicator. Traditional TCP sessions must be broken and reestablished when
endpoints shift their network connectivity from one interface to another (such as when a
mobile device moves from 3G to 802.11, and thus changes its active IP address). Being
bound to a single path also precludes multihomed devices from using any additional
capacity that might exist over alternate paths.
CHAPTER 3
SYSTEM ANALYSIS
Most of the existing solutions for the local minimum problem use perimeter routing
technique (PRT). By the PRT, when greedy forwarding fails at a local minimum, i.e.,
no neighbors closer to the sink, packets tend to be routed along the whole
boundaries. In SPAN, a sensor associates with a CH in a step.
A cluster with a higher CH degree may become highly loaded. Another drawback of
existing clustering techniques is that they require more than one transmission power
levels for routing the data. Such techniques are not suitable for low-cost sensors
which have usually single power level. GPSR does not achieve shorter routing paths.
Similarly, GFVD does not construct a shorter routing path and may burden the
energy consumption of sensors.
In existing, CHs to perform direct transmissions to the sink, thus it suffers from the
cost of long-distance transmissions.
More energy consumption
They may not use shorter routing path
3.2 PROPOSED SYSTEM
In the project propose an EHC technique in MCNs that periodically selects CHs
according to their residual energy and the utility of the sensor to its neighbors. The
main difference between existing clustering techniques and EHC technique is the
utility of the CHs in MCNs. In the EHC technique, a sensor becomes a CH if the
utility of the sensor is higher than its neighbors.
Different from the existing work, a CH in EHC technique has maximum eleven
neighboring CHs and does not make any assumptions about the density of sensors.
The worst case processing time and space complexities of EHC technique is O(1) per
sensor.
In the project present a route optimization technique in clustered MCNs among
obstacles using Dijkstra’s shortest path algorithm.
SYSTEM REQUIREMENTS
MODULE DESCRIPTION
MODULES
Network Configuration
Energy-Efficient Homogeneous Clustering
Route Optimization Technique
Performance Evaluation
Sensor nodes are randomly distributed in the sensing field. In this project we are
using Mobile Cloud Network. In this network, the nodes are static and fixed. The sensor
nodes are sense the information and then send to the server. If the source node sends the
packet, it will send through the intermediate node. The nodes are communicates only
within the communication range. So, we have to find the node’s communication range.
A network consists of N sensors, deployed at random uniformly in a For among
obstacles. The sensors are stationary and powered by the batteries. We assume the
binary disc communication model in which a sensor, denoted by s, can communicate
with other sensors within the disc of radius C centered at s. Two sensors i and j can
communicate with each other directly and are known as neighbors if the Euclidean
distance between them is not more than C. The number of neighboring CHs of a CH is
said to be the CH degree.
In this module, we first propose EHC technique and then describe its
properties. EHC works in the following two steps to form a clustered MCN:
Initial cluster head election:The goal of this step is to elect the CHs in a
distributed manner. At the beginning of each round, sensor i picks a random number
in (0, 1). If the random number is less than P, then sensor i is a CH-candidate. With
this mechanism, approximately k of N sensors are elected as CH-candidates. The
random number does not depend on the previous round. Advertisement contention
occurs when multiple CH-candidates advertise at the same time. To resolve the
contention, we use a randomized back-off delay.
Connected network formation: We elect more CHs to ensure that the CHs can
form a connected network, since ICHs are not connected. A Non-Cluster Head
sensor (NCH) is elected as a CH, denoted by Gateway CH (GCH), if two or more
neighboring ICHs are not connected. In the rest of the paper, a CH represents either a
GCH or ICH. Preference is given to the NCHs which have higher amount of residual
energy and maximum number of neighboring CHs. Lemma 1 shows that a NCH has
maximum five neighboring ICHs. We estimate the randomized back-off delay to
resolve the advertisement contention for selecting GCHs.
Average Hop Count: The average hop count as the average number of hops
traveled by any packet to reach the sink. The simulation for analysis of average hop
count is conducted by varying the communication range of the sensors. Energy
Consumption:
The energy consumption per round is the sum of energy consumed per round
in EHC and ROT. We therefore consider the energy consumption as the energy
dissipated in transmitting and receiving packets., Packet delivery ratio: –
\
CHAPTER 6
SOFTWAREDESCRIPTION
STRUCTURE OF NS2
NS2 is built using object oriented methods in C++ and OTcl (object oriented
variant of Tcl.
FUNCTIONALITIES OF NS2.33
Functionalities for wired, wireless networks, tracing, and visualization are available in
NS2.
This section describes the wireless model that was originally ported as CMU’s
Monarch group’s mobility extension to NS2. The first section covers the original
mobility model ported from CMU/Monarch group. In this section, we cover the internals
of a mobile node, routing mechanisms and network components that are used to
construct the network stack for a mobile node. The components that are covered briefly
are Channel, Network interface, Radio propagation model, MAC protocols, Interface
Queue, Link layer and Address resolution protocol model (ARP). CMU trace support
and Generation of node movement and traffic scenario files are also covered in this
section. The original CMU model allows simulation of pure wireless LANs or multihop
ad-hoc networks. Further extensions were made to this model to allow combined
simulation of wired and wireless networks. MobileIP was also extended to the wireless
model.
The wireless model essentially consists of the MobileNode at the core, with
additional supporting features that allows simulations of multi-hop ad-hoc networks,
wireless LANs etc. The MobileNode object is a split object. The C++ class
MobileNode is derived from parent class Node. A MobileNode thus is the basic
Node object with added functionalities of a wireless and mobile node like ability to
move within a given topology, ability to receive and transmit signals to and from a
wireless channel etc. A major difference between them, though, is that a MobileNode
is not connected by means of Links to other nodes or mobilenodes. In this section we
shall describe the internals of MobileNode, its routing mechanisms, the routing
protocols dsdv, aodv, tora and dsr, creation of network stack allowing channel access
in MobileNode, brief description of each stack component, trace support and
movement/traffic scenario generation for wireless simulations.
MOBILE NODE: CREATING WIRELESS TOPOLOGY
The class MobileNode is derived from the base class Node. MobileNode is a
split object.
IMPLEMENTATION ENVIRONMENT
Network simulator 2 is used as the simulation tool in this project. NS was chosen as
the simulator partly because of the range of features it provides and partly because it has
an open source code that can be modified and extended. There are different versions of
NS and the latest version is ns-2.1b9a while ns-2.1b10 is under development
MOBILE NETWORKING IN NS
The wireless model essentially consists of the Mobile Node at the core with
additional supporting features that allows simulations of multi-hop ad-hoc networks,
wireless LANs etc. The Mobile Node object is a split object. The C++ class Mobile
Node is derived from parent class Node. A Mobile Node thus is the basic Node object
with added functionalities of a wireless and mobile node like ability to move within a
given topology, ability to receive and transmit signals to and from a wireless channel etc.
A major difference between them is that a mobile Node is not connected by means of
Links to other nodes or mobile nodes.
Mobile Node is the basic nsNode object with added functionalities like movement,
ability to transmit and receive on a channel that allows it to be used to create mobile,
wireless simulation environments. The class Mobile Node is derived from the base class
Node. The four ad-hoc routing protocols that are currently supported are, Dynamic
Source Routing (DSR), Temporally ordered Routing Algorithm (TORA) and Adhoc On-
demand Distance Vector (AODV).
CHAPTER 8
SYSTEM DESIGN
The cluster head and mobile network is connected to the base station to interact with the
other nodes for providing the efficient signal,for the nearby nodes.
EHC
Techniq
Select
Cluste
Collect data
from
Send
data
Route
Optimizatio
Use Dijistrak’s
shortest path
Reduce the
energy
The DFD is also called as bubble chart. It is a simple graphical formalism that can be
used to represent a system in terms of input data to the system, various processing
carried out on this data, and the output data is generated by this system.
1. The data flow diagram (DFD) is one of the most important modeling tools. It is used
to model the system components. These components are the system process, the data
used by the process, an external entity that interacts with the system and the
information flows in the system.
2. DFD shows how the information moves through the system and how it is modified
by a series of transformations. It is a graphical technique that depicts information
flow and the transformations that are applied as data moves from input to output.
3. DFD is also known as bubble chart. A DFD may be used to represent a system at any
level of abstraction. DFD may be partitioned into levels that represent increasing
information flow and functional detail.
Start
Neighbor Selection
Cluster Formation
EHC Technique
N If Y
E
H
Stop
8.4 UML DIAGRAMS
The goal is for UML to become a common language for creating models of object
oriented computer software. In its current form UML is comprised of two major
components: a Meta-model and a notation. In the future, some form of method or process
may also be added to; or associated with, UML.
The UML represents a collection of best engineering practices that have proven
successful in the modeling of large and complex systems.
The UML is a very important part of developing objects oriented software and the
software development process. The UML uses mostly graphical notations to express the
design of software projects.
GOALS
1. Provide users a ready-to-use, expressive visual modeling Language so that they can
develop and exchange meaningful models.
2. Provide extendibility and specialization mechanisms to extend the core concepts.
3. Be independent of particular programming languages and development process.
4. Provide a formal basis for understanding the modeling language.
5. Encourage the growth of OO tools market.
8.4.1 USE CASE DIAGRAM:
A use case diagram in the Unified Modeling Language (UML) is a type of behavioral
diagram defined by and created from a Use-case analysis. Its purpose is to present a
graphical overview of the functionality provided by a system in terms of actors, their
goals (represented as use cases), and any dependencies between those use cases.
Source ID
EHC
Technique
Packet Me
Source Transfer
Residual
Energy
Route
Optimizat
ion
Techniqu
e
Use shortest path BASE
algorithm
Head
Reduce the
energy
consumpti
Fig 8.4.1 Use case diagram for finding shortest path
on
8.4.2 CLASS DIAGRAM
Sour
Route
IP Address
IP Address
Browse
Monitor
Generate
Verify MAC,Log()
MAC()
Residual
Energy()
IP Address IP Address
Attacks
Route Receive()
Optimatiza Save File()
tion()
Dynamic
Fig 8.4.2 Class diagram for finding cluster head
Attack()
8.4.3 SEQUENCE DIAGRAM
Transfer
Transfer
Packet
Receive and
Route
Optimizatio Save
n
Dijistrak’s
Technique
shortest
Verifies MAC
address,
Alloted
Time
Reduce the
energy
consum
ption Receive and
Save
Fig 8.4.3 seqence diagram for reduce energy
8.4.4 ACTIVITY DIAGRAM
Neighbor Selection
routing
Form Routing Table
Cluster Formation
EHC Technique
N If Y
o E e
H s
C
Residual Energy Ve Utility of the sensor to
rifi its neighbors
ed
E
n
d
CHAPTER 9
SYSTEM TESTING
TYPES OF TESTS
Unit testing involves the design of test cases that validate that the internal program
logic is functioning properly, and that program inputs produce valid outputs. All
decision branches and internal code flow should be validated. It is the testing of
individual software units of the application .it is done after the completion of an
individual unit before integration. This is a structural testing, that relies on knowledge of
its construction and is invasive. Unit tests perform basic tests at component level and test
a specific business process, application, and/or system configuration. Unit tests ensure
that each unique path of a business process performs accurately to the documented
specifications and contains clearly defined inputs and expected results.
FUNCTIONAL TESTING
Functional tests provide systematic demonstrations that functions tested are available
as specified by the business and technical requirements, system documentation, and
user manuals.
SYSTEM TESTING
System testing ensures that the entire integrated software system meets requirements.
It tests a configuration to ensure known and predictable results. An example of
system testing is the configuration oriented system integration test. System testing is
based on process descriptions and flows, emphasizing pre-driven process links and
integration points.
WHITE BOX TESTING
White Box Testing is a testing in which in which the software tester has knowledge of
the inner workings, structure and language of the software, or at least its purpose. It
is purpose. It is used to test areas that cannot be reached from a black box level.
Black Box Testing is testing the software without any knowledge of the inner workings,
structure or language of the module being tested. Black box tests, as most other kinds
of tests, must be written from a definitive source document, such as specification or
requirements document, such as specification or requirements document. It is a
testing in which the software under test is treated, as a black box .you cannot “see”
into it. The test provides inputs and responds to outputs without considering how the
software works.
UNIT TESTING
Unit testing is usually conducted as part of a combined code and unit test phase of the
software lifecycle, although it is not uncommon for coding and unit testing to be
conducted as two distinct phases.
Field testing will be performed manually and functional tests will be written in detail.
Test objectives
INTEGRATION TESTING
The task of the integration test is to check that components or software applications,
e.g. components in a software system or – one step up – software applications at the
company level – interact without error.
Test Results:All the test cases mentioned above passed successfully. No defects
encountered.
User Acceptance Testing is a critical phase of any project and requires significant
participation by the end user. It also ensures that the system meets the functional
requirements.
Test Results
All the test cases mentioned above passed successfully. No defects encoun
CHAPTER 10
SCREENSHOTS
#===================================
#===================================
# Initialization
#===================================
#Create a ns simulator
create-god $val(nn)
#===================================
-llType $val(ll) \
-macType $val(mac) \
-ifqType $val(ifq) \
-ifqLen $val(ifqlen) \
-antType $val(ant) \
-propType $val(prop) \
-phyType $val(netif) \
-channel $chan \
-topoInstance $topo \
-agentTrace ON \
-routerTrace ON \
-macTrace ON \
-movementTrace ON
#===================================
# Nodes Definition
#===================================
foreach cm $cmembers($i) {
# puts "residualenergyList:$residualenergyList1($i)"
foreach cm $cmembers($i) {
if {$energy($cm)==$me} {
if {$CH($i)!=$NCHv($i)} {
puts "NCH($i):$NCHv($i)"
puts "CH($i):$CH($i)"
return $value
return $value
#Performance Evaluation
set ahc 60
set cr 25
set ahc1 55
while {$cr<=100} {
set st 100
set ec 1
set ec1 3
while {$st<=500} {
}
set nobs 1
set ahcv 13
set ahcv1 24
set dly 14
set dly1 24
set lt 70
set lt1 20
set cep 70
set cep1 20
while {$nobs<=5} {
#===================================
# Termination
#===================================
proc finish {} {
$ns flush-trace
close $tracefile
close $namfile
exec nam out1.nam &
exit 0
$ns run
CHAPTER 10
CONCLUSION
[1] J. H. Lee, T. Kwon, and J. Song, “Group connectivity model forindustrial Mobile
Cloud Networks,” IEEE Trans. Ind. Electron., vol. 57,no. 5, pp. 1835–1844, May
2010.
[2] J.-S. Lee and W.-L.Cheng, “Fuzzy-logic-based clustering approach for Mobile Cloud
Networks using energy predication,” IEEE Sensors J.,vol. 12, no. 9, pp. 2891–2897,
Sep. 2012.
[3] Z. Ha, J. Wu, J. Zhang, L. Liu, and K. Tian, “A general self-organized tree-based
energy-balance routing protocol for Mobile Cloud Network,”IEEE Trans. Nucl. Sci.,
vol. 61, no. 2, pp. 732–740, Apr. 2014.
[6] P. T. A. Quang and D.-S.Kim, “Enhancing real-time delivery of gradient routing for
industrial Mobile Cloud Networks,” IEEE Trans.Ind. Informat., vol. 8, no. 1, pp. 61–
68, Feb. 2012.
[7] J. Niu, L. Cheng, Y. Gu, L. Shu, and S. K. Das, “R3E: Reliable reactiverouting
enhancement for Mobile Cloud Networks,” IEEE Trans. Ind.Informat., vol. 10, no.
1, pp. 784–794, Feb. 2014.