Distributed System Research Paper

Aims and Objectives 

Following are the aims and objectives of this research 

Aim:  To develop a hierarchical based dynamic mobile agent to monitor the faults across the dynamic distributed systems 

Objectives 

Following are the research objectives 

  • To review and critically analyze different mobile agent based fault tolerant monitoring systems for dynamic distributed systems and evaluate the gaps in the literature
  • To design a hierarchical wireless sensor network using java swings concept
  • To develop a dynamic mobile agent based fault tolerant monitoring system using java that can collect the statistics from different nodes of the wireless sensor network
  • To develop a SQL database to maintain the routing tables and store the collected monitoring information.
  • To test the application against the aim of the project and evaluate the results 

Project plan

Task Description Start Date End Date Duration
Project Introduction  Following aspects are covered for this task 

  • Problem definition and motivation
  • Aims and Objectives

 

    1 week 
Literature Review  Following topics are covered under literature review 

  • Introduction to distributed systems
  • What is fault tolerance and mobile agent based monitoring
  • Different types of faults across the wireless sensor networks
  • Existing techniques to handle these faults and their limitations
  • Proposed system

 

    3 weeks 
Design  Following design aspects covered 

  • Front end design covering the model of wireless sensor network
  • Business logic design that describes the actual coding logic used
  • Database design which deals with all the tables and stored procedure used in this application

 

    2 weeks 
Coding  Following modules are coded in this project 

  • Front end code using java swings
  • Business logic code
  • Database coding using JDBC connectivity programming

 

    4 weeks 
Evaluation of results  Following tasks are included in this section 

  • Testing the outputs
  • Bug fixing
  • Evaluation of results against the aims and objective of the project

 

    1 week 
Final Thesis preparation        1 week 
         

 

  This paper is written and submitted by sai

Efficient Resource Allocation For Wireless Multicast Documentation

Efficient Resource Allocation For Wireless Multicast Objective: 

The internet connectivity has become the important part of our day-to-day lives, people use internet connection at home, offices, on mobile, Laptop etc. There various technologies been provided for internet connection such as Broadband, wireless, Wi-Fi, Bluetooth etc. Among this wireless is widely use throughout the World as it provides the faster and easier access to the internet. WWW can be accessed from anywhere what you need to have is the appropriate device, will allow the use of Internet.

            This project Efficient Resource Allocation For Wireless Multicast aims at providing efficient resource allocation of Multicast wireless to the user. This will also reduce the cost of the bandwidth for the wireless users. The cost of the bandwidth will be reduced by using the method of finding the Shortest Path. To find the shortest path to the desired resource allocation in wireless connectivity Lagragean Method will be used. The Langragean Method will provide the shortest path to the desired resource in the multicast bandwidth in a wireless network which will allow the faster and easier access to connect to the world through Internet. This will make the surfing, browsing, downloading, and uploading easier. 

Modules of the Project:

This will also have some modules to used. This modules helps us in understanding the Flow and execution of the proposed system. The modules of the system are as follows. There are four modules in the proposed system they are a) Add Node, b) Resource Allocation, c) Source and Destination, d) Lagrangean Path. Let us see the modules in details.

a)      Add Node:

This is the first module of the system in this we specify the number of nodes in network. As soon as nodes are provided the nodes are arranged in cell randomly. According to the capability of cell it accesses the nodes in the network.

b)      Resource Allocation:

Resource allocation allocates the nearest resource current location so that it would provide good bandwidth usage and the access will be faster. 

c)      Source and Destination:

This module helps user to choose the source and the destination node. On selecting the source and destination node the position of the node and the cell containing the node is being stored. We repeat the steps to find the destination node to find the shortest node. 

d)      Lagrangean Path:

This module helps us to find the shortest path of the node by dividing the problem in two sub parts. The first part helps us to find solution to get faster access to the nearest cell. The second part helps us to find out the total bandwidth being used. And then repeating this will help us to find the shortest path to the desired node.           

            INPUT AND OUTPUT OF THE SYSTEM:

The input provided to the system is the number of nodes and after that the source and the destination nodes. Thee output of the system will be desired shortest path from the source and the destination mobile provided by user as input. 

Download Efficient Resource Allocation For Wireless Multicast Documentation.

Implementation of Fuzzy Temperature Control Using Microprocessor

Fuzzy Temperature Control Using Microprocessor project is designed as a system which can control the temperature of the devices using the basic fuzzy logic, this application checks the current temperature and checks weather it exceeds the desired limit, if then the application informs the user about the limit has been exceeded using an message send via SMS. This report discusses about the various components used and how they are been designed in a PCB.

Fuzzy logic controls are based on the theory of fuzzy set. Since the increased use of embedded system and microcontroller fuzzy logic has become more popular. Fuzzy logic is classified as a high level programming paradigm. Which is more appropriate for the embedded system when digital information processing is been used in case of microcontrollers. The main characteristic of fuzzy logic is that it transforms the binary world of computing into a computation basedon continues intervals of time. These property is been used by the embedded system.

The coprocessor design can be more costly than a software solution on a standard microcontroller. Another technique implemented in fuzzy logic is resolution analysis. The major reason for the fast execution of fuzzy logic in microcontroller is that it lies in identification of intelligent shortcuts during the compilation time itself in the PC. Some of the main advantages of fuzzy logic control are: High level linguistic variablebased control task description; it can beused for linear and nonlinear control, suitable for microcontrollerbased systems, Easy to implement multiinputmultioutput control system. Some of the main devices used in this project are LCD, program counters, Memory control unit, keypad, isolation circuits, power amplifier, ADC (analog to digital converter), buzzer, and LM35 microcontroller.

This paper also discuss about the whole device  with their pin diagram such as ADC 0809 controller IC and their working related to the project. Global system for mobile communication (GSM) are also been related to this project since the report are to be send to the user through the SMS service provided by the GSM architecture. 

Download Implementation of Fuzzy Temperature Control Using Microprocessor.

Efficient Routing in Intermittently Connected Mobile Networks:The Multiple Copy Case

In most of the mobile network which are of wireless network at many times they do not have the complete path between the source and destination. There are many networks real that follow these conventional rooting methods such as military networks, vehicular ad hoc networks, and wildlife tracking sensor networks. Because they establishes complete end- to- end paths before any data are been send. In the case of flooding based schemes have the high probability of delivery, which wastes more energy.

The dealing with such a networks many researches have been done which can significantly degrade their performance. So that the overhead of the flooding based schemes are been reduced in large. New routing schemes have been introduced where these schemes spray a message copy into the network and routes each copy independently to the destination. It also good performance under large number of scenarios, and also shows how to no of copies to be sprayed and how to distribute these copies between the systems in the network.

Efficient Routing in Intermittently Connected Mobile Networks paper also discuss about the topics like delay tolerant networks, ad hoc network, intermittent connectivity and routing. The spray phase can be defined as for every message originating at the source node, nmessage copies are been initially spreadforwarded by the source and possibly by the other nodes receiving a copyto ndistinct relays. Direct transition is performed Ifthe designationis not found in the spraying phase, then each of the nnodes carrying a message copy i.e. it will only forward the message to its destination is mentioned as the Wait phase.

Efficient Routing in Intermittently Connected Mobile Networks paper also discusses about the stability of spray and wait. This paper proposes two efficient multi- copy schemes called spray and wait which overcomes the shortcomings of flooding based and other existing schemes.

VOIP Java Project Source Code

OIP project is implemented in java platform which works on client server architecture using socket programming. Main aim of this project is to develop a web application through which users can use voice communication with any user from any part of the world for free of cost.

This system works on internet protocol where every user is allocated with unique ip address which is similar to that of allocation different phone numbers for different users. As the usage of internet is growing and even mobile communication is integrated with internet facility using voice over internet protocol communication will help users to reduce communication charges.

In existing system phone communication is the leading voice communication system all over the world. Disadvantages of using mobile communication is cost in order to communicate to users who are located at different parts of world this system is not efficient in terms of cost per call. In order to reduce this problem voice over intent protocol communication will be help full.

In present system voice over intent protocol a software front end is provided for users and server is maintained by developers and user needs to register with the application and get unique user name and password.

Here we provide project source code on voice over internet protocol software application which is developed in java.

Distributed Cache Updating For Dynamic Source Routing Protocol Project Report

Security of the data and prevent the loss of data being sent via router  is very important .The main aim of the project Distributed Cache Updating for Dynamic Source Routing Protocol is eliminating the problem of loss of data packet during the packet are being transmitted from the router by using the protocol. In the existing system the TCP/IP performance is being lowered due to loss of data, router failures, congestion in the network due to bad weather and also no track of the information about the failures so it becomes difficult to recover the data.  In this case if failure occurs the data packet have to sent again and this increases the time for receiving and sending of data.

Lets have look how the proposed system helps us to eliminate all the above stated drawbacks. the proposed system is being designed to maintain a Cache Table by the routers which will contain the information of the routing path. This table will contain all the information regarding the routers through which the packet will travel through will sending and receiving the information.  Every router will maintain its own cache table and contain the information about its neighboring router. In case if any router fails during the transmission of the data the cache algorithm removes this router and routes the information to the destination router through other router in the network. This algorithm helps to reduce the time in sending and receiving the data. If at any stage any  important data packet is being lost and, cache algorithm helps to track the router from where the data packet is being lost and send that particular data packet again to the destination. The algorithm used contains some modules which are as follows.

a.)    Route Request

b.)    Message Transfer.

c.)    Route Maintenance.

Cache Updating

Download Distributed Cache Updating For Dynamic Source Routing Protocol Project Report.

College Management System PHP Project Source Code

Introduction to College Management System PHP Project:

College management system project is implemented in PHP programming language using MY SQL database. Main aim of this project is to develop an online website which will cover details about institutes, courses, student’s information, student’s details and other information related to education.

In existing system there is no specific method for finding details about different institutes and know about institute from previous year students from respective colleges. Students should visit college and find details about the college which is a time taking procedure.

In present web portal project students can find details about different institutes and courses offered by different institutes through online web site.

Here we provide entire project source code with modules and database for free download.

A study on Sensor Nodes Attestation Protocol in a WSN Project Report

A study on Sensor Nodes Attestation Protocol in a WSN Project Report covers detailed explanation about project. Here we provide introduction to topic.

Sensor networks are been widely used in different fields of applications like fire monitoring, pollution monitoring, machine measurements of industries, wild environment management etc. WSN- wireless sensor networks can be considered as the wireless networks associated with wires that embraces different types of nodes called sensors arranged into a single architecture. Basically sensor nodes must contain different types of functions such as wireless communications as well as sensing activities. Because of some security problems related to routing process the wireless sensor networks are limited with some radio frequency channels which are not linked with any sensor nodes for physical security within a specific topology.

 For this reason, the hardware restrictions within the topology networks is the main reason that is allowing the wireless sensor networks to become more vulnerable towards different types of adverse effects. In order to overcome this problem, there is a necessity of incorporating all the nodes present within the system i.e. use of hirechary approach which performs the information sharing between two different nodes.

Every sensor network has it own sensor nodes which are capable of performing sensing process within appropriate sensing locations which is allowing the hackers to enter the attack the wireless sensor networks in an easier way. Because of presence of more vulnerability within the networks, the total network sensors that are present in the network are adversely affected by the attackers. For this particular reason, securing wireless sensor networks is happened to be vital task for the developers. They are trying to use two different types of steps through which in the first step they are connecting the relation between the sensor nodes present within the networks. In the second step, sensor node attestation is performed through which the total activities taking place in the wireless sensor networks can be easily identified and solved. 

Download A study on Sensor Nodes Attestation Protocol in a WSN Project Report.

E-Auction a Web Based Electronic Auctioning System Project Report

E-Auction a Web Based Electronic Auctioning System Project Report covers detailed explanation about project. Here we provide introduction to topic.

Nowadays, in this technological world, computer and internet usage are happened to be important for all the activities especially in the business activities of the organizations. Internet is giving many added advantages to the companies in order to reach their target customers from different ends over the globe. For example, a customer from India can buy the product of US Company through online without visiting their location. This aspect gives a clear idea on the importance of internet and its role played in the organization success. This study deals with the development of prototype for the purpose of building online auctioning system. This online auctioning system will allow the administrative users to access the website remotely through server. This process includes different aspects such as registration, bidding process and products management.

This system will perform the bidding process through which the users can buy the products through bidding. The bidding status can be identified by the users and it will even display the available products for bidding, sold out products, bidding details, timings, bidding date and payment options. Jeetle one of the popular bidding site can be considered as the best example for this application. But in this application only cars will be available for bidding and based on further demand the other products will be included in this application. This application is more useful to the organizations or companies who are planning to offer their products and services to the customer through online website. This application is more secured and will offer reliable services to the administrative users as well as the normal customers. 

Download E-Auction a Web Based Electronic Auctioning System Project Report.

A Linux Device Driver for USB to USB Direct Link Device Project Report

A Linux Device Driver for USB to USB Direct Link Device Project Report covers detailed explanation about project. Here we provide introduction to topic.

USB is referred to as universal serial bus came into existence in the year 1996 and its second version was released in the year 2000 which is capable of transferring the data with 480 Mbps speed. The product cost is less with higher rate of data transfer and gained more importance in this computer world. Nowadays this USB interfaces are allowing the users to connect different devices to the PC’s and every operating system will support this device. By using Linux there is no possibility for data transfer but by using this USB cables different types of data transactions can be performed between two systems. The operating systems related to Linux are not capable of providing the access through remote among the two PC’s but the file bandwidth is been used in order to transfer or share the files between two different computers or laptops which can be easily performed in operating system of Windows.

The main objective of this study is to create a system that supports USB remote access to transfer the data and files between two different systems and it includes two stages such as Kernel Module which is known as USB driver as well as user interface. In Kernel module phase the device driver will be designed which is called direct cable for connecting the two systems which suits best for operating systems of Linux. The low level system designed in this part will allow the users to transfer accurate, reliable and genuine files transfer among the systems. In this user interface stage, users can access the USB device remotely which provides transparent data access to the users in which the client server will be used that have three resources such as server side program, client side program as well as GUI QT.

Hardware Requirements:

  • USB Direct link cable
  • Intel P4 processor
  • 128MB Ram

Software Requirements:

  • Linux Kernel 2.6
  • GCC
  • QT

Download A Linux Device Driver for USB to USB Direct Link Device Project Report.