Freeprojectsforall.com



Universal Network Coding-Based Opportunistic Routing for UnicastABSTRACT:Network coding-based opportunistic routing has emerged as an elegant way to optimize the capacity of lossy wireless multihop networks by reducing the amount of required feedback messages. Most of the works on network coding-based opportunistic routing in the literature assume that the links are independent. This assumption has been invalidated by the recent empirical studies that showed that the correlation among the links can be arbitrary. In this work, we show that the performance of network coding-based opportunistic routing is greatly impacted by the correlation among the links. We formulate the problem of maximizing the throughput while achieving fairness under arbitrary channel conditions, and we identify the structure of its optimal solution. As is typical in the literature, the optimal solution requires a large amount of immediate feedback messages, which is unrealistic. We propose the idea of performing network coding on the feedback messages and show that if the intermediate node waits until receiving only one feedback message from each next-hop node, the optimal level of network coding redundancy can be computed in a distributed manner. The coded feedback messages require a small amount of overhead, as they can be integrated with the packets. Our approach is also oblivious to losses and correlations among the links, as it optimizes the performance without the explicit knowledge of these two factors.IntroductionDESIGNING efficient protocols for wireless multihop networks is not a straightforward extension from the protocols designed for their wireline counterparts, due to the unique properties of wireless links. One of the major properties of wireless links is the poor link quality. For example, recent studies have shown that 50 percent of the operational links in Roofnet have loss rates higher than 30 percent. Therefore, a major challenge for deploying wireless multihop networks is to design a transmission protocol that handles the lossy behavior of the wireless links efficiently.Performing opportunistic routing requires coordination among the links and the design of a specialized MAC protocol. It also requires all of the next-hop nodes to be able to overhear each other, which might not be available. In Fig. 2a source node s1 wants to send packets to the destination node d1 through the relay nodes v1 and v2. Assume that after the transmission of the a and b packets, node v1 has a, and node v2 has both a and b. Node v2 has to know which packets to send, and how many of each type, based on overhearing the transmission of node v1.Intersession network coding can be used to resolve the shortcomings of opportunistic routing. In intersession network coding, the source node divides the message it wants to send into batches, each having K packets of the form P1; . . . ; PK. The source node keeps sending coded packets of the form P K i?1 giPi, where gi; 8i is a random coefficient chosen over a finite field of a large enough size, typically 28–216. Upon receiving a coded packet, the intermediate relay node checks to see if the coded packet is linearly independent to what it has received before. If so, the node keeps the coded packet, otherwise it drops the packet. Each intermediate node generates linear combinations of the packets it has, and sends the resulting coded packets. When the destination receives K linearly independent packets, it can decode all of the packets of the batch. Therefore, it sends feedback to the source that requests it to stop sending from this batch and moves to the next batch.EXISTING SYSTEM:Most of the previous works on opportunistic routing with intrasession network coding either assume that the links are independent and design the protocol based on that, or use the forwarding rule that says the total number of received linearly independent packets should equal the number of linearly independent packets received by next-hop nodes.In a general network, the links will have different correlations, and these correlations change over time. This makes it difficult to perform measurements about the correlation, as to decide whether to use network coding or not. Therefore, it is crucial to design a strategy that guarantees a good performance in all cases and can adapt to the changes in the link qualities and the correlation among the links.DISADVANTAGES OF EXISTING SYSTEM:The main challenge that faces the deployment of opportunistic routing is dealing with the case of when two relay nodes overhear the same packet.The works that design the rate control according to the rule that says the total number of received linearly independent packets should be the same as the ones received by next-hop nodes result in throughput reduction.In a general network, the links will have different correlations, and these correlations change over time, as is noted in. This makes it difficult to perform measurements about the correlation, as to decide whether to use network coding or not.PROPOSED SYSTEM:In this paper, we formulate the problem of utility maximization for multiple unicast sessions that use network coding based opportunistic routing on an arbitrary wireless multi-hop network, and use the duality approach to come up with the optimal distributed solution. We identify the challenges of implementing the optimal distributed algorithm to come up with a more practical algorithm. The practical algorithm works in a batch-by-batch manner and performs network coding on the feedback messages to exploit the broadcast nature of wireless links in the reverse direction. This reduces the number of feedback messages and eliminates the need for immediate feedback information. The algorithm is universal, as it takes into account the loss rates and the correlations among the links without the need to explicitly measure them. We prove that the batch-by-batch algorithm converges to the optimal solution. We present simulation results for our algorithm under different wireless settings, and show its superiority regardless of the channel’s characteristics.ADVANTAGES OF PROPOSED SYSTEM:Since we are using intra-session network coding, one important factor to decide is the rate of linearly independent packets that a node has to successfully deliver to next-hop nodes.Our algorithm adapts to changes in the channel loss rates and the correlations among the links.OVERVIEW OF .NET represents Microsoft's vision of the future of applications in the Internet age. .NET provides enhanced interoperability features based upon open Internet standards. Microsoft .NET represents a great improvement.Microsoft .NET provides the following:A robust runtime platform, the CLRMultiple language developmentAn extensible programming model, the .NET Framework, which provides a large class library of reusable code available from multiple languagesA networking infrastructure built on top of Internet standards that supports a high level of communication among applicationsA new mechanism of application delivery, the Web service, that supports the concept of an application as a servicePowerful development Framework OverviewThe .NET Framework consists of the CLR, the .NET Framework Class Library, the Common Language Specification (CLS), a number of .NET languages, and Visual Studio .mon Language RuntimeThe runtime environment provided by .NET, the CLR, manages the execution of code and provides useful services. The services of the CLR are exposed through programming languages. The syntax for these services varies from language to language, but the underlying execution engine providing the services is the same.Not all languages expose all the features of the CLR. The language with the best mapping 45 to the CLR is the new language C#. , however, does an admirable job of exposing the functionality..NET Framework Class LibraryThe .NET Framework class library is huge, comprising more than 2,500 classes. All this functionality is available to all the .NET languages. The library consists of four main parts:1.Base class library (which includes networking, security, diagnostics, I/O, and otherTypes of operating system services)Data and XML classesWindows UIWeb services and Web UICommon Language SpecificationThe CLS is an agreement among language designers and class library designers about those features and usage conventions that can be relied upon. CLS rules apply to public features that are visible outside the assembly where they are defined.Languages in .NETMicrosoft itself is providing four CLS-compliant languages. , C#, and C++ with managed extensions are extenders. Jscript .NET is a consumer.Visual Studio .NET 2008Visual Studio .NET 2008 includes a range of new features and enhancements for every type of developer, and offers key improvements directed at mobile device developers and enterprise developers.Base classes provide standard functionality such as input/output, string manipulation, security management, network communications; thread management, text management, and user interface design features.The classes enable developers to interact with data accessed in the form of XML through the OLE DB, ODBC, Oracle, and SQL Server interfaces. The classesSupport the development of Web-based applications and Web services. The Windows Forms classes support the development of desktop-based smart client applications. is a programming framework built on the common language runtime that can be used on a server to build powerful Web applications. offers several important advantages over previous Web development models:Enhanced is compiled common language runtime code running on the server. Unlike its interpreted predecessors, can take advantage of early binding, just-in-time compilation, native optimization, and caching services right out of the box. This amounts to dramatically better performance before you ever write a line of codeWorld-Class Tool SupportThe framework is complemented by a rich toolbox and designer in the Visual Studio integrated development environment. WYSIWYG editing, drag-and-drop server controls, and automatic deployment are just a few of the features this powerful tool provides.Power and FlexibilityBecause is based on the common language runtime, the power and flexibility of that entire platform is available to Web application developers. The .NET Framework class library, Messaging, and Data Access solutions are all seamlessly accessible from the Web. is also language-independent, so you can choose the language that best applies to your application or partition your application across many languages. makes it easy to perform common tasks, from simple form submission and client authentication to deployment and site configuration. For example, the page framework allows you to build user interfaces that cleanly separate application logic from presentation code and to handle events in a simple, Visual Basic - like forms processing model. Additionally, the common language runtime simplifies development, with managed code services such as automatic reference counting and garbage employs a text-based, hierarchical configuration system, which simplifies applying settings to your server environment and Web applications. Because configuration information is stored as plain text, new settings may be applied without the aid of local administration tools. This "zero local administration" philosophy extends to deploying Framework applications as well. An Framework application is deployed to a server simply by copying the necessary files to the server.Scalability and has been designed with scalability in mind, with features specifically tailored to improve performance in clustered and multiprocessor environments. Further, processes are closely monitored and managed by the runtime, so that if one misbehaves (leaks, deadlocks), a new process can be created in its place, which helps keep your applications constantly available to handle requestsCustomizability and delivers a well-factored architecture that allows developers to "plug in" their code at the appropriate level. In fact, it is possible to extend or replace any subcomponent of the runtime with your own custom-written component.SecurityWith built in Windows authentication and per-application configuration, you can be assured that your applications are secure.Language SupportThe Microsoft .NET Platform currently offers built-in support for three languages: C#, Visual Basic, and Scripts.Language CompatibilityThe differences between the VBScript used in ASP and the Visual Basic .NET language used in are by far the most extensive of all the potential migration issues. Not only has departed from the VBScript language to "true" Visual Basic, but the Visual Basic language itself has undergone significant changes in this release.TOOL SELECTED: VB. NETVisual is designed to be a fast and easy way to create .NET applications, including Web services and Web applications. Applications written in Visual Basic are built on the services of the common language runtime and take full advantage of the .NET Framework.Visual Basic .NET () is an object-oriented computer language that can be viewed as an evolution of Microsoft's Visual Basic (VB) implemented on the Microsoft .NET framework. Its introduction has been controversial, as significant changes were made that broke backward compatibility with VB and caused a rift within the developer community.It is fully integrated with the .NET Framework and the common language runtime,1 which together provide language interoperability, garbage collection, enhanced security, and improved versioning support.MICROSOFT SQL SERVER 2005SQL Server 2005 exceeds dependability requirements and provides innovative capabilities that increase employee effectiveness, integrate heterogeneous IT ecosystems, and maximize capital and operating budgets. SQL Server 2005 provides the enterprise data management platform your organization needs to adapt quickly in a fast-changing environment. With the lowest implementation and maintenance costs in the industry, SQL Server 2005 delivers rapid return on your data management investment. SQL Server 2005 supports the rapid development of enterprise-class business applications that can give your company a critical competitive advantage.Easy-to-Use Business IntelligenceThese tools through rich data analysis and data mining capabilities that integrate with familiar applications such as Microsoft Office, SQL Server 2005 enable you to provide all of your employees with critical, timely business information tailored to their specific information needs. Every copy of SQL Server 2005 ships with a suite of BI services.Self-Tuning and Management CapabilitiesRevolutionary self-tuning and dynamic self-configuring features optimize database performance, while management tools automate standard activities. Graphical tools and wizards simplify setup, database design, and performance monitoring, allowing database administrators to focus on meeting strategic business needs.Data Management Applications and ServicesUnlike its competitors, SQL Server 2005 provides a powerful and comprehensive data management platform. Every software license includes extensive management and development tools, a powerful extraction, transformation, and loading (ETL) tool, business intelligence and analysis services, and new capabilities such as Notification Services. The result is the best overall business value available.SQL Server 2005 Enterprise EditionEnterprise Edition includes the complete set of SQL Server data management and analysis features and is uniquely characterized by several features that make it the most scalable and available edition of SQL Server 2005. It scales to the performance levels required to support the largest Web sites, Enterprise Online Transaction Processing (OLTP) systems and Data Warehousing systems. Its support for failover clustering also makes it ideal for any mission critical line-of-business -10 Features of SqlServer-20051. T-SQL (Transaction SQL) enhancementsT-SQL is the native set-based RDBMS programming language offering high-performance data access. It now incorporates many new features including error handling via the TRY and CATCH paradigm, Common Table Expressions (CTE), which return a record set in a statement, and the ability to shift columns to rows and vice versa with the PIVOT and UNPIVOT commands.2. CLR (Common Language Runtime)The next major enhancement in SQL Server 2005 is the integration of a .NET compliant language such as C#, or to build objects (stored procedures, triggers, functions, etc.). This enables you to execute .NET code in the DBMS to take advantage of the .NET functionality. It is expected to replace extended stored procedures in the SQL Server 2000 environment as well as expand the traditional relational engine capabilities.3. Service BrokerThe Service Broker handles messaging between a sender and receiver in a loosely coupled manner. A message is sent, processed and responded to, completing the transaction. This greatly expands the capabilities of data-driven applications to meet workflow or custom business needs. 4. Data encryptionSQL Server 2000 had no documented or publicly supported functions to encrypt data in a table natively. Organizations had to rely on third-party products to address this need. SQL Server 2005 has native capabilities to support encryption of data stored in user-defined databases. 5. SMTP mailSending mail directly from SQL Server 2000 is possible, but challenging. With SQL Server 2005, Microsoft incorporates SMTP mail to improve the native mail capabilities. Say "see-ya" to Outlook on SQL Server!6. HTTP endpointsYou can easily create HTTP endpoints via a simple T-SQL statement exposing an object that can be accessed over the Internet. This allows a simple object to be called across the Internet for the needed data.7. Multiple Active Result Sets (MARS)MARS allow a persistent database connection from a single client to have more than one active request per connection. This should be a major performance improvement, allowing developers to give users new capabilities when working with SQL Server. For example, it allows multiple searches, or a search and data entry. The bottom line is that one client connection can have multiple active processes simultaneously.8. Dedicated administrator connectionIf all else fails, stop the SQL Server service or push the power button. That mentality is finished with the dedicated administrator connection. This functionality will allow a DBA to make a single diagnostic connection to SQL Server even if the server is having an issue.9. SQL Server Integration Services (SSIS)SSIS has replaced DTS (Data Transformation Services) as the primary ETL (Extraction, Transformation and Loading) tool and ships with SQL Server free of charge. This tool, completely rewritten since SQL Server 2000, now has a great deal of flexibility to address complex data movement.10. Database mirroringIt's not expected to be released with SQL Server 2005 at the RTM in November, but I think this feature has great potential. Database mirroring is an extension of the native high-availability capabilities. So, stay tuned for more details…. INFORMATION SUPER HIGHWAY:?A set of computer networks, made up of a large number of smaller networks, using different networking protocols. The world's largest computing network consisting of over two million computers supporting over 20 millions users in almost 200 different countries. The Internet is growing a phenomenal rate between 10 and 15 percent. So any size estimates are quickly out of date.?Internet was originally established to meet the research needs of the U.S Defence Industry. But it has grown into a huge global network serving universities, academic researches, commercial interest and Government agencies, both in the U.S and Overseas. The Internet uses TCP/IP protocols and many of the Internet hosts run the Unix Operating System.?HTMLHTML (Hyper Text Markup Language) is the language that is used to prepare documents for online publications. HTML documents are also called Web documents, and each HTML document is known as Web page. A page is what is seen in the browser at any time. Each Web site, whether on the Internet or Intranet, is composed of multiple pages. And it is possible to switch among them by following hyperlinks. The collection of HTML pages makes up the World Wide Web.A web pages is basically a text file that contains the text to be displayed and references of elements such as images, sounds and of course hyperlinks to other documents. HTML pages can be created using simple text editor such as Notepad or a WYSIWYG application such as Microsoft FrontPage. In either case the result is a plain text file that computers can easily exchange. The browser displays this text file on the client computer."Hypertext" is the jumping frog portion. A hyperlink can jump to any place within your own page(s) or literally to anyplace in the world with a 'net address (URL, or Uniform Resource Locator.) It's a small part of the html language. INTERNET INFORMATION SERVER (IIS):A web server is a program connected to the world wide web(www) that furnishes resources from the web browser.?Microsoft IIS is a web server integrated with server that makes it easy to publish information and bring business application to the web.?Because of its tight integration with Windows NT server, IIS guarantees the network administrator and application developer the same security, Networking and administrator functionality as windows NT server. Above and beyond its use of familiar Windows NT server?Tools and functionality, IIS also has built-in capabilities to help administer secure websites, and to develop server-intensive web application.?FEATURES OF IIS:?IIS provides integrated security and access to a wide range of content, work seamlessly with COM components, and has a graphical interface-the Microsoft Management Console (MMC) –that you can use to create and manage your ASP application.IIS Provides Integrated Security:On the internet, most sites allow anybody to connect to the site. The exceptions are commercialists where you pay a onetime, monthly fee to access the site. Sites that are restrict the access called secured site. Secured site use either integrated security or login, password security. IIS support both of these methods.IIS provides Access to Content:All web servers can deliver HTML files, but they differ widely in how they treat other types of content. Most servers let you add and modify Multi-purpose Internet Mail Extensions (MMIE) types, but integrate directly into the windows registry. That means IIS natively understands how to treat most common windows file format, such as text (TXT) files, application initialization (INI) files, executable (EXE) files and many othersIIS provides an Interface FOR COMYou can control many parts of IIS using COM>IIS exposes many of the server’s configuration settings via the IIS Admin objects. These objects are accessible from ASP and other languages. That means you can adjust server configuration and create virtual directories and webs programmatically. IIS 4 and higher store settings and web information in a spoil database called the Metaphase. You can use the IIS Admin objects to create new sites and virtual directories be alter the properties of existing sites and virtual directories.IIS ARCHITECTURES OVERVIEW:?IIS is a core product, which means that it is designed to work closely with many other products, including all products in the Windows NT Server 4.0 Option pack. The following figure shows the relationship between IIS and other products installed as part of the Windows NT Server 4.0 Option pack.SECURITY FOR IIS APPLICATION?IIS provides three authentication schemes to control access to ITS resources: Anonymous, Basic and Windows NT challenge/Response. Each of these schemes had different effect on the security context of an application launched by ITS. This includes ISAPI extension agents, COT applications, IDC scripts and future scripting capabilities.ACCESS PRIVIEGES?IIS provides several new access levels. The following values can set the type of access allowed to specific directories: ReadWriteScriptExecuteLog AccessDirectory Browsing.?IIS WEBSITE ADMINISTRATION?Administering websites can be time consuming and costly, especially for people who manage large internet Service Provider (ISP) Installations. To save time and money Sip’s support only large company web siesta the expense of personal websites. But is there a cost-effective way to support both? The answer is yes; if you can automate administrative tasks and let users administer their own sites from remote computers. This solution reduces the amount of time and money it takes to manually administer a large installation, without reducing the number of web sites supported.?Microsoft Internet Information server (IIS) version 4.0 offers technologies to do this:1. Windows scripting Host (WSH)2. IIS Admin objects built on top of Active Directory service Interface(ADS)) With these technologies working together behind the scenes, the person can administers sites from the command line of central computer and can group frequently used commands in batch files.Then all user need to do is run batch files to add new accounts, change permissions, add a virtual server to a site and many other tasks.SOFTWARE REQUIREMENT SPECIFICATION A software requirements specification (SRS) is a complete description of the behavior of the software to be developed. It includes a set of use cases that describe all of the interactions that the users will have with the software. In addition to use cases, the SRS contains functional requirements, which define the internal workings of the software: that is, the calculations, technical details, data manipulation and processing, and other specific functionality that shows how the use cases are to be satisfied. It also contains nonfunctional requirements, which impose constraints on the design or implementation (such as performance requirements, quality standards or design constraints).The SRS phase consists of two basic activities:Problem/Requirement Analysis:The process is order and more nebulous of the two, deals with understanding the problem, the goal and constraints.Requirement Specification:Here, the focus is on specifying what has been found giving analysis such as representation, specification languages and tools, and checking the specifications are addressed during this activity.The Requirement phase terminates with the production of the validate SRS document. Producing the SRS document is the basic goal of this phase.Role of SRS:The purpose of the Software Requirement Specification is to reduce the communication gap between the clients and the developers. Software Requirement Specification is the medium though which the client and user needs are accurately specified. It forms the basis of software development. A good SRS should satisfy all the parties involved in the system.Data flow diagramLevel 0Base stationView requestRouter check the nodeMessage send via routerLevel 1Node Exists Send request Receive messageCheck IP Address & check verification nodeEncode message using network codingLevel 2Router IP AddressRouter check the each nodeCheck verification same/diff node to each dataResponse to clientReceive Encoded dataUse case DiagramBase stationRouter Create messageView requestMessage send via routerRouter check each nodecheck verification same/diff node to each dataResponse to clientEncode DataSend messageNode Send requestClass DiagramNode IP AddressSend requestView message ()Base stationIP AddressView requestSend message via routerSocket connection () ()Send message () ()Router IP AddressRouter check the each nodeEncode () () Receive message ()Response to clientSend message () ()Activity diagramNode Router Checkcheck veryfication same/diff node to each dataRouter check the each nodeEncode Message and send message to nodeResponse to client Yes Start msg receiveNo IP Address & View requestIP AddressSend request Message ReceivedBase stationMessage send via routerRouter check the nodeModulesNetwork Topology:The networks that consist of n randomly and evenly distributed static nodes in a unit square area. These nodes are randomly grouped into S–D pairs.The Coded Feedback ApproachThe coded feedback approach performed the coded feedback approach over multihop in wire line networks, i.e., network coding is performed on the feedback message, and these feedback messages are allowed to travel over more than one hop in the reverse paths between the source and the destination. To achieve optimal solutions the coded feedback is integrated with the gradient algorithm Algorithm ImplementationThis module implemented in a batch-bybatch manner, the source will inject all of the packets of a given batch with the same rate and can be done in a batch-by-batch manner by performing the transfer of the credits for a given batch, and the queue length updates at a node after making sure that the next-hop nodes have collectively received linearly independent packets equal to the number of credits for that batch at that node. After that, the node will move to the next batch. Therefore, what needs to be specified is how to use the coded feedback approach at the relay node u to perform the following two decisions that lead to maximize.Every time a node receives a vector in the null space from the next-hop node, it multiplies that vector with all of the packets it has sent. This is done so that it can figure out the number of linearly independent packets that has been received by next-hop nodes. Once that rank becomes equal to the number of credits assigned for that batch at that node, the node distributes its credits to next-hop nodes.Performance EvaluationOur universal approach (UNIV) improves the throughput from 40 to 300 percent over both MORE and CCACK, depending on the scenario. The biggest improvement is noticed when the loss rates of the links are very high. This is due to the use of coded feedback in an optimal manner, which does not require too many feedback messages. The highest throughput is achieved by our protocol when the links are negatively correlated, whereas the lowest throughput is achieved when the links are positively correlated.SYSTEM TESTING The purpose of testing is to discover errors. Testing is the process of trying to discover every conceivable fault or weakness in a work product. It provides a way to check the functionality of components, sub assemblies, assemblies and/or a finished product It is the process of exercising software with the intent of ensuring that theSoftware system meets its requirements and user expectations and does not fail in an unacceptable manner. There are various types of test. Each test type addresses a specific testing requirement.TYPES OF TESTSUnit testing Unit testing involves the design of test cases that validate that the internal program logic is functioning properly, and that program inputs produce valid outputs. All decision branches and internal code flow should be validated. It is the testing of individual software units of the application .it is done after the completion of an individual unit before integration. This is a structural testing, that relies on knowledge of its construction and is invasive. Unit tests perform basic tests at component level and test a specific business process, application, and/or system configuration. Unit tests ensure that each unique path of a business process performs accurately to the documented specifications and contains clearly defined inputs and expected results.Integration testing Integration tests are designed to test integrated software components to determine if they actually run as one program. Testing is event driven and is more concerned with the basic outcome of screens or fields. Integration tests demonstrate that although the components were individually satisfaction, as shown by successfully unit testing, the combination of components is correct and consistent. Integration testing is specifically aimed at exposing the problems that arise from the combination of components.Functional test Functional tests provide systematic demonstrations that functions tested are available as specified by the business and technical requirements, system documentation, and user manuals.Functional testing is centered on the following items:Valid Input : identified classes of valid input must be accepted.Invalid Input : identified classes of invalid input must be rejected.Functions : identified functions must be exercised.Output : identified classes of application outputs must be exercised.Systems/Procedures: interfacing systems or procedures must be invoked. Organization and preparation of functional tests is focused on requirements, key functions, or special test cases. In addition, systematic coverage pertaining to identify Business process flows; data fields, predefined processes, and successive processes must be considered for testing. Before functional testing is complete, additional tests are identified and the effective value of current tests is determined.System Test System testing ensures that the entire integrated software system meets requirements. It tests a configuration to ensure known and predictable results. An example of system testing is the configuration oriented system integration test. System testing is based on process descriptions and flows, emphasizing pre-driven process links and integration points.White Box Testing White Box Testing is a testing in which in which the software tester has knowledge of the inner workings, structure and language of the software, or at least its purpose. It is purpose. It is used to test areas that cannot be reached from a black box level.Black Box Testing Black Box Testing is testing the software without any knowledge of the inner workings, structure or language of the module being tested. Black box tests, as most other kinds of tests, must be written from a definitive source document, such as specification or requirements document, such as specification or requirements document. It is a testing in which the software under test is treated, as a black box .you cannot “see” into it. The test provides inputs and responds to outputs without considering how the software works.Unit Testing:Unit testing is usually conducted as part of a combined code and unit test phase of the software lifecycle, although it is not uncommon for coding and unit testing to be conducted as two distinct phases.Test strategy and approachField testing will be performed manually and functional tests will be written in detail.Test objectivesAll field entries must work properly.Pages must be activated from the identified link.The entry screen, messages and responses must not be delayed.Features to be testedVerify that the entries are of the correct formatNo duplicate entries should be allowedAll links should take the user to the correct page.Integration TestingSoftware integration testing is the incremental integration testing of two or more integrated software components on a single platform to produce failures caused by interface defects.The task of the integration test is to check that components or software applications, e.g. components in a software system or – one step up – software applications at the company level – interact without error.Test Results: All the test cases mentioned above passed successfully. No defects encountered.Acceptance TestingUser Acceptance Testing is a critical phase of any project and requires significant participation by the end user. It also ensures that the system meets the functional requirements.Test Results: All the test cases mentioned above passed successfully. No defects encountered.CONCLUSIONS AND FUTURE WORKIn this paper, we have developed a distributed opportunistic routing algorithm that uses network coding. The design of our algorithm is inspired by recent results in the literature. That showed the sensitivity of the opportunistic routing and network coding protocols to the correlations among the wireless links. Our algorithm adapts to changes in the channel loss rates and the correlations among the links.References[1] A. Khreishah, I. Khalil, and J. Wu, “Universal opportunistic routing scheme using network coding,” in Proc. IEEE Conf. Sensor, Mesh Ad Hoc Commun. Netw., Jun. 2012, pp. 353–361.[2] D. Aguayo, J. Bicket, S. Biswas, G. Judd, and R. Morris, “Linklevel measurements from an 802.11b mesh network,” in Proc. Conf. Appl., Technol., Archit., Protocols Comput. Commun., Aug.2004, pp. 121–132.[3] MIT Roofnet. [Online]. Available: [4] S. Biswas and R. Morris, “Opportunistic routing in multi-hop wireless networks,” in Proc. ACM Special Interest Group Data Commun.,Philadelphia, PA, USA, Sep. 2005.[5] S. Chachulski, M. Jennings, S. Katti, and D. Katabi, “Trading structure for randomness in wireless opportunistic routing,” in Proc. Conf. Appl., Technol., Archit., Protocols Comput. Commun., Aug.2007, pp. 169–180.[6] T. Ho, M. M_edard, R. Koetter, D. Karger, M. Effros, J. Shi, and B. Leong, “A random linear network coding approach to multicast,”IEEE Trans. Inf. Theory, vol. 52, no. 10, pp. 4413–4430,Oct. 2006.[7] C.-C. Wang, A. Khreishah, and N. Shroff, “On cross-layer optimizations for intersession network coding on practical 2-hop relay networks,” in Proc. Conf. Rec. 43rd Asilomar Conf. Signals, put., Nov. 2009, pp. 771–775.[8] A. Khreishah, I. Khalil, and J. Wu, “Distributed network codingbased opportunistic routing for multicast,” in Proc. 13th ACM Int. Symp. Mobile Ad Hoc Netw. Comput., 2012, pp. 115–124.[9] A. Khreishah, I. Khalil, P. Ostovari, and J. Wu, “Flow-based XOR network coding for lossy wireless networks,” IEEE Trans. Wireless Commun., vol. 11, no. 6, pp. 2321–2329, Jun. 2012.[10] P. Ostovari, J. Wu, and A. Khreishah, “Network coding techniques for wireless and sensor networks,” The Art Wireless Sensor Netw., vol. 1, pp. 129–162, 2013.[11] K. Srinivasan, M. Jain, J. Choi, T. Azim, E. Kim, P. Levis, and B. Krishnamachari, “The k-factor: Inferring protocol performance using inter-link reception correlation,” presented at the ACM 19th Annu. Int. Conf. Mobile Comput. Netw., Chicago, IL, USA, Sep. 2010.[12] B. L. Y. Lin and B. Liang, “CodeOR: Opportunistic routing in wireless mesh networks with segmented network coding,” in Proc. 16th IEEE Int. Conf. Netw. Protocols, Oct. 2008, pp. 13–22.[13] C. Gkantsidis, B. Radunovic, P. Key, S. Gheorgiu, W. Hu, and P. Rodriguez, “Multipath code casting for wireless mesh networks,”in Proc. ACM Int. Conf. Emerging Netw. Experiments Technol. Conf.,2007, p. 10.[14] X. Zhang, and B. Li, “Optimized multipath network coding in lossy wireless networks,” IEEE J. Sel. Areas Commun., vol. 27, no. 5, pp. 622–634, Jun. 2009.[15] D. Koutsonikolas, C.-C. Wang, and Y. Hu, “CCACK: Efficient network coding based opportunistic routing through cumulative coded acknowledgments,” in Proc. 29th Conf. Comput. Commun., San Diego, CA, USA, Mar. 2010, pp. 1–9 ................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download