Towards Reliable Data Delivery for Highly
Dynamic Mobile Ad Hoc Networks
This paper addresses the problem of delivering data packets
for highly dynamic mobile ad hoc networks in a reliable and
timely manner. Most existing ad hoc routing protoc
susceptible to node mobility, especially for large
Driven by this issue, we propose an efficient Position based
Opportunistic Routing protocol (POR) which takes advantage of
property of geographic routing and the broad
nature of wireless medium. When a data packet is sent out, some
of the neighbor nodes that have overheard the transmission will
serve as forwarding candidates, and take turn to forward the
packet if it is not relayed by the specific best forwarder wit
certain period of time. By utilizing such in
communication is maintained without
being interrupted. The
additional latency incurred by local route recovery is greatly
reduced and the duplicate relaying caused by packet reroute is
decreased. In case of communication hole, a Virtual
Destination based Void Handling (VDVH) scheme is further
proposed to work together with POR. Both theoretical analysis
and simulation results show that POR achieves excellent
performance even under high
node mobility with acceptable
overhead and the new void handling scheme also works well.
In this module, nodes are added to Topology.
2)Node Details: In this module we have to give the node name
This module makes possible to transfer the
file from Source Node to particular destination node.
4)Packet Forward Details:This module give the all the details of
the transferred file like source and destination and file details.
The next step in analysis is to verify the feasibility of the
proposed system. “All projects are feasible given unlimited
resources and infinite time“. But in reality both resources and
time are scarce. Project should confirm to time
should be optimal in there consumption of resources. This place
a constant is approval of any project.
Feasibility has applied to Digital Tune pertains to the following
To determine whether the proposed system is technically
feasible, we should take into consideration the technical issues
involved behind the system.
To determine the operational feasibility of the system
should take into consideration the awareness level of the users.
This system is operational feasible since the users are familiar
with the technologies and hence there is no need to gear up the
personnel to use system. Also the system is very friendly a
To decide whether a project is economically feasible, we have to
consider various factors as:
Cost benefit analysis
In the existing system
ad hoc routin
g protocols are
to node mobility, especially for large
scale networks. One of the main reasons is due to the pre
determination of an end
end route before data transmission.
Owing to the constantly and even fast changing network
opology, it is very difficult to maintain a deterministic route.
The discovery and recovery procedures are also time and energy
consuming. Once the path breaks, data packets will get lost or be
delayed for a long time until the reconstruction of the route,
causing transmission interruption.
A novel Position based OpportunisticRouting protocol
(POR) is proposed, in which several forwarding candidates
cache the packet that has been received using MAC interception.
If the best for
warder does not forward the packet in certain time
slots, suboptimal candidates will take turn to forward the packet
according to a locally formed order. In this way, as long as one
of the candidates succeeds in receiving and forwarding the
packet, the dat
a transmission will not be interrupted. Potential
paths are exploited on
fly on a per
leading to POR’s excellent robustness.
SOFTWARE REQUIREMENT SPECIFICATION
What is SRS?
Software Requirement Specification (SRS) is the starting
point of the software developing activity. As system grew more
complex it became evident that the goal of the entire system
cannot be easily comprehended. Hence the need for the
requirement phase arose. The software project is initiated by the
ds. The SRS is the means of translating the ideas of
the minds of clients (the input) into a formal document (the
output of the requirement phase.)
The SRS phase consists of two basic activities:
The process is order and more
nebulous of the two,
deals with understand the problem, the goal and constraints.
Here, the focus is on specifying what has been found giving
analysis such as representation, specification languages and tools,
and checking the s
pecifications are addressed during this activity.
The Requirement phase terminates with the production of the
validate SRS document. Producing the SRS document is the
basic goal of this phase.
ROLE OF SRS
The purpose of the Software Requirement Specif
to reduce the communication gap between the clients and the
developers. Software Requirement Specification is the medium
though which the client and user needs are accurately specified.
It forms the basis of software development. A good SRS s
satisfy all the parties involved in the system.
This document is the only one that describes the
requirements of the system. It is meant for the use by the
developers, and will also be the basis for validating the final
delivered system. Any c
hanges made to the requirements in the
future will have to go through a formal change approval process.
The developer is responsible for asking for clarifications, where
necessary, and will not make any alterations without the
permission of the client.
rdware and software Requirements:
Microsoft Windows XP Professional
s and awt.
Pentium 4 processor
1 GB RAM
80 GB Hard Disk Space
enter node details
select source node
select file to browse
1: enter node details
2: select source node
3: select file to browse
4: select destination
1) J. Broch, D. A. Maltz, D. B. Johnson, Y.
C. Hu, and J.
performance comparison of multi
hop wireless ad hoc network
routing protocols,” in
. ACM, 1998, pp. 85
2) M. Mauve, A. Widmer, and H. Hartenstein, “A survey on
based routing in mobile ad hoc networks,”
, vol. 15, no. 6, pp. 30
39, Nov/Dec 2001.
3) D. Chen and P. Varshney, “A survey of void handling
for geographic routing i
n wireless networks,”
Surveys & Tutorials, IEEE
, vol. 9, no. 1, pp. 50
4) D. Son, A. Helmy, and B. Krishnamachari, “The effect of
location errors on geographic routing in mobile ad
hoc sensor networks: anal
ysis and improvement using mobility
Mobile Computing, IEEE Transactions on
, vol. 3,
5) B. Karp and H. T. Kung, “Gpsr: greedy perimeter stateless
for wireless networks,” in
, 2000, pp. 243
6) S. Biswas and R. Morris, “Exor: opportunistic multi
for wireless networks,” in
, 2005, pp. 133
7) S. Chachulski, M. Jennings, S. Katti, and D. Katabi, “Trading
structure for randomness in wireless opportunistic routin
, 2007, pp. 169
8) E. Rozner, J. Seshadri, Y. Mehta, and L. Qiu, “Soar: Simple
adaptive routing protocol for wireless mesh networks,”
Mobile Computing, IEEE Transactions on
, vol. 8, no. 12, pp.
1635, dec. 2009.
9) A. Balasubramanian, R. Mahajan, A. Venkataramani, B. N.
and J. Zahorjan, “Interactive wifi connectivity for moving
, 2008, pp. 427
10) K. Zeng, Z. Yang, and W. Lou, “Location
rate and multihop wireless networks,”
Technology, IEEE Transactions on
, vol. 58, no. 6, pp. 3032