You are on page 1of 9

VISVESVARAYA TECHNOLOGICAL UNIVERSITY

JnanaSangama, Belgaum-590018

2016-2017

A Technical Seminar Report


on
“Seminar Title”
Submitted in partial fulfillment of the requirement for the award of the degree of

Bachelor of Engineering

In

INFORMATION SCIENCE & ENGINEERING

Submitted By

STUDENT NAME
(USN)

Under The Guidance Of


Guide Name
Designation
Dept. of ISE

DEPARTMENT OF INFORMATION SCIENCE AND ENGINEERING


AMC ENGINEERING COLLEGE
18th K.M. Bannerghatta Main Road
Bengaluru – 560083
2016-2017
AMC ENGINEERING COLLEGE
(NBA Accredited, Affiliated to Visvesvaraya Technological University)
18th K.M. Bannerghatta Main Road
Bengaluru – 560083

Department of Information Science and Engineering

CERTIFICATE

Certified that the Seminar work entitled “ Title of the Seminar” carried out by Mr./Ms. Name
of Student, USN: 1AM13IS--- a bonafide student of AMC Engineering College in partial
fulfillment for the award of Bachelor of Engineering in Information Science and Engineering of
the Visvesvaraya Technological University, Belgaum during the year 2016 – 2017. It is certified
that all corrections/suggestions indicated for Internal Assessment have been incorporated in the
Report deposited in the departmental library. The Seminar report has been approved as it
satisfies the academic requirements in respect of Seminar work prescribed for the said degree.

Signature f the Guide Signature of the HOD Signature of the Principal


Guide Name Dr. Latha. CA. T. N. Sreenivasa
Dept. ISE Dept. of ISE

External Viva

Name of the examiners Signature with date

1.

2.
ABSTRACT

Link error and malicious packet dropping are two sources for packet losses in multi-hop wireless
ad hoc network. While observing a sequence of packet losses in the network, whether the losses
are caused by link errors only, or by the combined effect of link errors and malicious drop are to
be identified. In the insider-attack case, whereby malicious nodes that are part of the route
exploit their knowledge of the communication context to selectively drop a small amount of
packets critical to the network performance. Because the packet dropping rate in this case is
comparable to the channel error rate, conventional algorithms that are based on detecting the
packet loss rate cannot achieve satisfactory detection accuracy.

To improve the detection accuracy, the correlations between lost packets is identified.
Homomorphism linear authenticator (HLA) based public auditing architecture is developed that
allows the detector to verify the truthfulness of the packet loss information reported by nodes.
This construction is privacy preserving, collusion proof, and incurs low communication and
storage overheads. To reduce the computation overhead of the baseline scheme, a packet-block
based mechanism is also proposed, which allows one to trade detection accuracy for lower
computation complexity.

(i)
ACKNOWLEDGEMENT

First and foremost I would like to thank GOD, the Almighty for being so merciful onme. He
guided me in each and every walk of life to do something good and hence thisseminar

I have a great pleasure in expressing my deep sense of gratitude to founder ChairmanDr. K.R.
Paramahamsa for having provided me with a great infrastructure and well-furnished labs for
successful completion of my seminar.

I express my sincere thanks and gratitude to our Principal Dr. T.N.Sreenivasa forproviding me
all the necessary facilities for successful completion of my seminar.

I would like to extend my special thanks to Dr. Latha C.A, HOD, Departmentof ISE, for
his/hersupport and encouragement and suggestions given to me in the course of my seminar
work.

I am grateful to my guide Name of the Guide, Designation, Department of ISE, AMC


Engineering College, Bengaluru for his/her unfailing and constant motivational & timely help,
encouragement and suggestion, given to me in the course of my seminar work.

Last but not the least, I wish to thank all the teaching & non-teaching staffs of department of
Information Science and Engineering, for their support, patience and endurance shown during
the preparation of this seminar report.

NAME OF THE STUDENT


(USN: 1AM13IS---)

(ii)
TABLE OF CONTENTS

CONTENTS TITLE PAGE NO.

Abstract I
Acknowledgement II
Table of Contents III
List of Figures VI
List of Tables VII
CHAPTER 1 INTRODUCTION 01
1.1 VANETS 01
1.2 Applications of VANETS 01
1.3Multi-Hop Cooperative Video Streaming 02
1.4 Brief Project Layout 05
1.4.1 Learning and Analysis Phase 05
1.4.2 Design and Implementation Phase 05
1.4.3 Testing Phase 05
1.5 Organization of Project Report 06

CHA PTER 2 LITERATURE SURVEY 07


2.1 Neighbor Discovery in VANETS 07
2.2 Collaborative Downloading 07
2.3 Adaptive Video Streaming in VANETS 09
2.4 Optimal Rate Control for CVS 09
2.5 Related Works 10
2.6 Preliminary Study Review 12

CHAPTER 3 PROBLEM DEFINITION 13


3.1 Problem Statement 13
3.2 Existing System 13
3.3 Proposed System 14

CHAPTER 4 SYSTEM REQUIREMENTS SPECIFICATION 16


4.1 Functional Requirements 16
4.2 Non Functional Requirements 17
4.2.1 Product Requirements 17
4.2.2 Organizational Requirements 18
4.2.3 User Requirements 18
4.2.4 Basic Operational Requirements 18
4.3 Resource Requirements 19
4.3.1 NS2 Simulator 19
4.3.2 GNU Plot 20
(iii)
4.4 Hardware Requirements 21
4.5 Software Requirements 21

CHAPTER 5 SYSTEM ANALYSIS 22


5.1 Feasibility Study 22
5.1.1 Technical Feasibility 23
5.1.2 Economical Feasibility 23
5.1.3 Social Feasibility 23

CHAPTER 6 SYSTEM DESIGN 24


6.1 Fundamental Design Concepts 24
6.1.1 Input Design 24
6.1.2 Output Design 25
6.1.3 MVC Design Method 25
6.2 System Development Methodology 28
6.2.1 Model Phases 28
6.2.2 Reasons for Choosing Waterfall Model 29
6.3 System Architecture 30
6.4 Design Classes of the System 30
6.5 Use Case Diagrams 31
6.6 Sequence Diagrams of the System 32
6.7 Dataflow Diagrams of the System 33

CHAPTER 7 METHODOLOGY 36
7.1 Task Assignment Scheme 36
7.1.1 Assignment Interval 36
7.1.2 Streaming Task Scheduling 37
7.2 Packet Forwarding Strategy 38
7.2.1 First in First out (FIFO) Strategy 39
7.2.2 PPF-Playback Priority First Strategy 41
7.2.3 BAW-Bandwidth Aware Strategy 42
7.3 Time Distance Ratio (TDR) Metric 42

CHAPTER 8 IMPLEMENTATION 43
8.1 Implementation Language 43
8.2 Implementation Platform 45

CHAPTER 9 TESTING 46
9.1 Software Testing 46
9.2 Testing Methods 47
9.3 Test Cases 48
9.3.1 Formal Test Cases 49
9.3.2 Informal Test Cases 49
9.3.3 Typical Written Test Case Format 49
(iv)
CHAPTER 10 RESULT ANALYSIS 52
CHAPTER 11 CONCLUSION AND FUTURE WORK 54
11.1 Conclusion 54
11.2 Future Work 55

REFERENCES 56

APPENDIX A 58

APPENDIX B 60

APPENDIX C 62

PAPER PRESENTED AND PUBLISHED 66

(v)
LIST OF FIGURES

FIGURE NO. TITLE PAGE NO.


Fig. 1.1 Architecture of the Proposed K-hop CVS Scenario 04

Fig. 6.1 MVC Design Model 25

Fig. 6.2 Communication in MVC Architecture 26

Fig. 6.3 Structure of JFC User Interface Component 27

Fig. 6.4 Waterfall Model 29

Fig. 6.5 System Architecture 30

Fig. 6.6 Class Diagram 31

Fig. 6.7 Use Case Diagram of the Requester Vehicle 31

Fig. 6.8 Use Case Diagram of the Helper Vehicle 32

Fig. 6.9 Use Case Diagram of the Forwarder Vehicle 32

Fig. 6.10 Sequence Diagram for Adding Vehicle 33

Fig. 6.11 Sequence Diagram for Video Streaming 33

Fig. 6.12 Level 0 Data Flow Diagram 34

Fig. 6.13 Level 1 Data Flow Diagram 35

Fig. 7.1 FIFO Strategy - Processing Procedure 39

Fig. 7.2 PPF Strategy – Processing Procedure 40

Fig. 7.3 BAW Strategy - Processing Procedure 42

Fig. 10.1 Outputs of Different Intervals 53

(vi)
LIST OF TABLES

TABLE NO. TITLE PAGE NO.

Table 9.1 Test Cases for Simulation 51

Table 10.1 Simulation Parameters of IEEE 802.11 Interface 52

(vii)

You might also like