Professional Documents
Culture Documents
JnanaSangama, Belgaum-590018
2016-2017
Bachelor of Engineering
In
Submitted By
STUDENT NAME
(USN)
CERTIFICATE
Certified that the Seminar work entitled “ Title of the Seminar” carried out by Mr./Ms. Name
of Student, USN: 1AM13IS--- a bonafide student of AMC Engineering College in partial
fulfillment for the award of Bachelor of Engineering in Information Science and Engineering of
the Visvesvaraya Technological University, Belgaum during the year 2016 – 2017. It is certified
that all corrections/suggestions indicated for Internal Assessment have been incorporated in the
Report deposited in the departmental library. The Seminar report has been approved as it
satisfies the academic requirements in respect of Seminar work prescribed for the said degree.
External Viva
1.
2.
ABSTRACT
Link error and malicious packet dropping are two sources for packet losses in multi-hop wireless
ad hoc network. While observing a sequence of packet losses in the network, whether the losses
are caused by link errors only, or by the combined effect of link errors and malicious drop are to
be identified. In the insider-attack case, whereby malicious nodes that are part of the route
exploit their knowledge of the communication context to selectively drop a small amount of
packets critical to the network performance. Because the packet dropping rate in this case is
comparable to the channel error rate, conventional algorithms that are based on detecting the
packet loss rate cannot achieve satisfactory detection accuracy.
To improve the detection accuracy, the correlations between lost packets is identified.
Homomorphism linear authenticator (HLA) based public auditing architecture is developed that
allows the detector to verify the truthfulness of the packet loss information reported by nodes.
This construction is privacy preserving, collusion proof, and incurs low communication and
storage overheads. To reduce the computation overhead of the baseline scheme, a packet-block
based mechanism is also proposed, which allows one to trade detection accuracy for lower
computation complexity.
(i)
ACKNOWLEDGEMENT
First and foremost I would like to thank GOD, the Almighty for being so merciful onme. He
guided me in each and every walk of life to do something good and hence thisseminar
I have a great pleasure in expressing my deep sense of gratitude to founder ChairmanDr. K.R.
Paramahamsa for having provided me with a great infrastructure and well-furnished labs for
successful completion of my seminar.
I express my sincere thanks and gratitude to our Principal Dr. T.N.Sreenivasa forproviding me
all the necessary facilities for successful completion of my seminar.
I would like to extend my special thanks to Dr. Latha C.A, HOD, Departmentof ISE, for
his/hersupport and encouragement and suggestions given to me in the course of my seminar
work.
Last but not the least, I wish to thank all the teaching & non-teaching staffs of department of
Information Science and Engineering, for their support, patience and endurance shown during
the preparation of this seminar report.
(ii)
TABLE OF CONTENTS
Abstract I
Acknowledgement II
Table of Contents III
List of Figures VI
List of Tables VII
CHAPTER 1 INTRODUCTION 01
1.1 VANETS 01
1.2 Applications of VANETS 01
1.3Multi-Hop Cooperative Video Streaming 02
1.4 Brief Project Layout 05
1.4.1 Learning and Analysis Phase 05
1.4.2 Design and Implementation Phase 05
1.4.3 Testing Phase 05
1.5 Organization of Project Report 06
CHAPTER 7 METHODOLOGY 36
7.1 Task Assignment Scheme 36
7.1.1 Assignment Interval 36
7.1.2 Streaming Task Scheduling 37
7.2 Packet Forwarding Strategy 38
7.2.1 First in First out (FIFO) Strategy 39
7.2.2 PPF-Playback Priority First Strategy 41
7.2.3 BAW-Bandwidth Aware Strategy 42
7.3 Time Distance Ratio (TDR) Metric 42
CHAPTER 8 IMPLEMENTATION 43
8.1 Implementation Language 43
8.2 Implementation Platform 45
CHAPTER 9 TESTING 46
9.1 Software Testing 46
9.2 Testing Methods 47
9.3 Test Cases 48
9.3.1 Formal Test Cases 49
9.3.2 Informal Test Cases 49
9.3.3 Typical Written Test Case Format 49
(iv)
CHAPTER 10 RESULT ANALYSIS 52
CHAPTER 11 CONCLUSION AND FUTURE WORK 54
11.1 Conclusion 54
11.2 Future Work 55
REFERENCES 56
APPENDIX A 58
APPENDIX B 60
APPENDIX C 62
(v)
LIST OF FIGURES
(vi)
LIST OF TABLES
(vii)