Disaster Messenger: An Android based Infrastructure Less Application for Post Disaster Information Exchange

Size: px
Start display at page:

Download "Disaster Messenger: An Android based Infrastructure Less Application for Post Disaster Information Exchange"

Transcription

1 : An Android based Infrastructure Less Application for Post Disaster Information Exchange Suman Bhattacharjee, Student Member IEEE, Sourav Kanta, Saket Modi, Madhumita Paul and Sipra DasBit, Senior Member IEEE Department of Computer Science and Technology Indian Institute of Engineering Science and Technology, Shibpur, India Abstract Natural disasters take its toll on traditional communication infrastructure severely causing intermittent network connectivity due to partially or fully damaged communication infrastructure. Therefore, data dissemination is hampered and the volunteers and different disaster management agencies find it difficult to communicate among them. Fortunately, a sizeable population (around 35% - 45%) these days owns various wireless devices like smart phones, tablets etc. with multiple communication interfaces (Bluetooth, Wi-Fi Direct). These devices with their alternative communication capabilities can be harnessed in a disaster aftermath in order to disseminate situational information. However, the procedure to disseminate such information through these devices should be simple enough so that minimal technical expertise is required from the user end. Several Android based applications are available which offers data forwarding service based on Wi-Fi direct. All such applications provide only unicast mode of communication while lacking to provide multicast and broadcast services. In this paper we provide a complete solution Disaster Messenger, an Android based application which allows the volunteers to disseminate information in absence of network infrastructure (through Wi-Fi direct) in unicast, multicast and broadcast mode. We perform rigorous field experiments to evaluate the performance of by varying movement speeds of the nodes and distance between the nodes. We also evaluate its performance in terms of energy efficiency. The comparison of the with a couple of wellknown file sharing applications namely and BitTorrent Sync reveals that outperforms and in terms of energy efficiency and data transfer rate in unicast mode. Due to unavailability of any competing application which supports multicast and broadcast services, we have not been able to compare the performance of our application for the said services. Keywords Post-disaster communication; Situational information; Information forwarding; Android application; Energy efficiency; I. INTRODUCTION Natural disasters damage existing communication infrastructure (wired or wireless) partially or fully. As a result, the disaster response teams and the rescue and relief teams experience huge challenge to communicate among themselves due to absence of stable connectivity. A well-managed disaster recovery operation requires effective sharing of situational information among them. Such information can help the disaster response teams and the rescue and relief teams to appropriately coordinate, manage and channelize their resources. An absence of prior knowledge about the situation results in a disproportionate distribution of relief materials among victims and shelters. But, due to the scarcity of power, network connectivity and suitable infrastructure, it is very difficult to set up a fully connected temporary network supporting data communication in the post-disaster scenario. A viable option for exchanging situational information is to use Delay-tolerant networks (DTNs), where battery-powered wireless devices (e.g. smart phones, PDAs, laptops, etc.) with multiple communication interfaces (Wi-Fi direct and Bluetooth), configured in ad-hoc mode, are used to exchange situational information [1-3]. But, this option has two major limitations. Firstly the procedure to disseminate situational information over DTNs is a complex procedure and requires fair amount of technical expertise from the users. The local volunteers working under different disaster management agencies might not be that much tech savvy. Moreover, implementing DTNs protocol suite for the application development requires data transfer through peer to peer ad-hoc mode. The root access of the device and a modified version of the operating system are essential for that purpose as majority of the device manufacturers do not support data transfer through the peer to peer ad-hoc mode due to security reasons [4-6]. Therefore, the applications developed for these platforms are not portable and distribution of the applications to the volunteers of different disaster management agencies become challenging in post disaster scenario. Therefore, we have developed, an Android application, which allows sharing of situational information (text, image, video or voice recordings) without the help of network infrastructure. We harness the potential of Wi-Fi direct to provide DTNs like features without the aforesaid limitations. Moreover, creates a new thread for every transmission and reception. Hence it can send or receive data to/from multiple sources in parallel.

2 New Existing Authentication Registered Interaction Activity Mode Request File Manager Fig. 1. Modular architecture of Several other applications are available in the market which offers data forwarding service based on Wi-Fi direct viz. [7] and [8]. is a file sharing application that shares files through Wi-Fi direct across multiple platforms including Android, Windows and ios in unicast mode. On the other hand transfer files directly from device to device through Wi-Fi direct across multiple platforms including Mac, Windows, Linux, ARM, FreeBSD, ios, Android, Kindle Fire. encrypts all files during transfer and never stores any information on third-party servers. This means data is protected against identity theft or attacks. Therefore, most of the existing applications offer data forwarding in unicast mode only. Multicast and broadcast modes of communications are unavailable. allows communication in all three modes. Another important aspect which needs to be considered while developing applications for post disaster scenario is energy efficiency of the applications. Power grids may get affected due to the extent of disaster. As a result rescue and relief teams experience unstable power supply. Majority of the devices which are used in post disaster communication (e.g. smart phones, PDAs, laptops, etc.) runs primarily on alternative power sources (battery). Such devices remain active for only a restricted period of time after which they need to be recharged. So, an application developed for those devices must be energy efficient in order to make the devices active for a longer period of time. Hence, we have evaluated the performance of our application () in terms of energy efficiency compared to and. The rest of the paper is organized as follows. Section II describes the design modules of. Performance evaluation is explained in Section III. Finally, conclusions are drawn in Section IV. II. DESIGN MODULES Store File Retrieve File File - 1 File - 2 This section introduces various modules of Disaster Messenger along with their functionalities. A. Architecture of Fig. 1 represents the modular architecture of the Disaster Messenger application. The application consists of four modules viz. Authentication, Interaction, File Manager and. File - N Success/Failure Sender/Receiver Run Application New Yes Authentication Complete Registration No Retrieval/ Storage Request Interaction Activity Mode File Manager Start a new thread with an initialized socket Are destination(s)/ source reachable? Retrieval/ Storage Retrieve/ Store File Fig. 2. Flow diagram of data transfer activity File - 1 File - 2 The main purpose of Authentication is to authenticate new users (first time users after installing the application). After authentication, the control is forwarded to the Interaction. This module consists of two sub modules namely Activity and Mode. Depending on the send or receive request selected by the user, the Interaction s transfers the control to the Activity and Mode respectively. Activity allows the user to choose the send or receive activity. Mode allows the user to choose unicast, multicast or broadcast mode of communication and subsequently request user to choose appropriate recipient(s) as destination(s). After selection of appropriate activity and mode of communication, the control is transferred to the File Manager. File Manager retrieves or stores file for send or receive request respectively. The control is then transferred to the Interaction again. The Interaction creates a new thread for send or receive request and transfer the control to the module. module sends success or failure acknowledgement to the Interaction and Yes Transmit/receive the file and close the socket to the sender or receiver No Send Receive Unicast Multicast Broadcast File - N

3 subsequently the success or failure acknowledgement is communicated to the users. B. Flow Diagram Fig. 2 represents the flow diagram of data transfer activity. Immediately after starting the application, the Authentication checks the authenticity of the user (for new user) and control is forwarded to the Interaction. This module allows the users to select between send and receive activities. If user wants to send information the mode of communication (unicast, multicast or broadcast) must be chosen. The control is then transferred to the File manager for selecting appropriate file. In case of receive request from user the control is directly transferred to the file manager. The file manager retrieves or stores file from/to the secondary or extended storage as per user request and sends a response to the Interaction. Upon receiving the response from the File Manager the Interaction creates a new thread for communication, checks the reachability of the destination(s) or source as per user request and finally transmit or receive the file. The control is then transferred to the which sends success or failure acknowledgement to the Interaction. C. Algorithm In this section the algorithm of is described Preamble: There are N numbers of devices in the network trying to send/receive situational information from other device(s) in any of the three modes (Unicast, Multicast or Broadcast). Each device searches for the intended sources(s)/recipient(s). If the sources(s)/recipient(s) are within the communication range, each device creates a new thread for communication and transfers control to the thread. Each device runs the following algorithm in order to send/receive situational information from other device(s). Input: Situational information to be shared among various devices Output: Sent/received data at the sender/receiver end Begin 1: if (F auth = False) /* F auth is device authentication flag*/ 2: set (D id ) /* D id user id for the new user*/ 3: end if 4: if (A select = send) /* A select is the selected activity*/ 5: if (M select = unicast) /* M select is selected mode*/ 6: D id_dest =select single device /* D id_dest is the destination device id*/ 7: elseif (M select = multicast) 8: D id_dest = select multiple devices 9: elseif (M select = broadcast) 1: D id_dest = select all devices 11: endif 12: send retrieve request to the file manager 13: select file to be send 14: create (S new ) /* S new new socket*/ 15: create (T new ) /* T new new thread*/ 16: start (T new ) 17: if (is_reachable (D id_dest ) = True) 18: while (F ack = False) /* F ack acknowledgement flag*/ 19: F ack = check (Ack) 2: endwhile 21: endif 22: elseif (A select = receive) 23: send store request to the file manager 24: create (S new ) 25: create (T new ) 26: start (T new ) 27: while (F ack = False) 28: F ack = check (Ack) 29: endwhile 3: endif End Analysing the time complexity of the aforesaid algorithm we found that the best case complexity of the algorithm is O(1) and the worst case complexity is O(n). The best case complexity arises when the sender and the receiver(s) are within the communication range of each other. In that case the receiver receives data sent by the sender immediately. On the other hand when the sender and receiver(s) are not connected then the sender will periodically checks for the availability of the receiver and the complexity of the proposed algorithm becomes O(n). III. PERFORMANCE EVALUATION In this section we analyze the performance of Disaster Messenger under different scenarios. A. Testbed Setup We have conducted several field trials in order to evaluate the performance of under different scenarios. The field trials have been conducted at the IIEST, Shibpur campus with ten volunteers equipped with Disaster Messenger preinstalled smart phones or Tablets. The volunteers have been divided into three groups (three volunteers in each group) and placed in distant locations such Fig. 3. Location of three volunteer groups at IIEST, Shibpur campus

4 We have used PowerTutor [1], an Android application in order to evaluate the energy efficiency of. The experiment has been conducted on S Duos 2 smart phones. The energy consumption readings from Power Tutor have been recorded during the transmission and receptions of a video file with size 83MB through Disaster Messenger for 1 times. The average energy consumption is computed by calculating the arithmetic mean of the 1 readings for both transmission and reception. Table I represents the list of Android devices along with their detailed specifications for the testbed implementation Fig. 4. Pictures of field trials conducted at IIEST, Shibpur that no groups can communicate with each other directly. One volunteer carrying a smart phone visited each group periodically to collect data from each group. Such moving volunteers are known as Data Mule [9]. It gathers data from one group and eventually moves towards other groups with the collected bundle of data. The data is stored in the secondary storage of the Data Mule. Upon reaching a new group it transmits a copy of the collected data to that group and collects data from that group. Fig. 3 represents the location of three volunteer groups at IIEST, Shibpur campus. Fig. 4 represents some of the pictures taken during field trials at IIEST, Shibpur. We have used heterogeneous devices (Smart Phones and Tablets from different manufacturers) for the field trials in order to evaluate the interoperability of the application. The performance of has been evaluated based on three aspects viz. deviation in average data transfer rate with distance between sender and receiver, deviation in average data transfer rate with movement speed of the nodes and energy efficiency of the application. The results of the field trials reveal that the data transmission range is device specific and the data transmission speed depends on the distance from the sender to the receiver. Device Name S Duos 2 J5 Moto E (1st Gen) TabS-1 TabS-2 TABLE I. DEVICE SPECIFICATION FOR TESTBED IMPLEMENTATION Device Category Memory (MB) Storage (GB) Battery (mah) Wi-Fi Direct Range Outdoor (Meter) Phone Phone Phone Tablet PC Tablet PC Moto G2 Phone Unicast Multicast Broadcast More Distance (meter) than 5 Fig. 5. Comparison between average data transfer rates with distance in three different modes More than Distance (Meter) 5 Fig. 6. Comparison between average data transfer rates with distance in unicast mode Upto More than 2 Movement Speed (Km/Hour) Fig. 7. Comparison between average data transfer rates with movement speed in unicast mode

5 Average Energy Consumption (mj) Transmission Reception Fig. 8. Comparison between average energy consumption during transmission and reception in unicast mode B. Results and discussion Fig. 5 represents the change of data transfer rate with respect to distance in three different modes for Disaster Messenger. From the result it is clear that increasing distance from the destination reduces data transfer rate. Fig. 6 represents the comparison of average data transfer rate between, and BitTorrent Sync with respect to the distance between sender and receiver in unicast mode of communication. Precisely we observe that exhibits around 8.75% and 2.81% higher data transfer rate in comparison with and Bit Torrent Sync respectively with respect to the distance between the sender and receiver. Fig. 7 represents the comparison of average data transfer rate between, and BitTorrent Sync with respect to the movement speed of the nodes in unicast mode of communication. In this scenario, we observe that exhibits around 7.1% higher data transfer rate compared to with respect to the movement speed of the nodes. Finally it exhibits around 9.2% higher data transfer rate compared to. Hence the results indicate superiority of compared to and in terms of average data transfer rate in unicast mode. Fig. 8 illustrates the comparison between Disaster Messenger, and with respect to the average energy consumption during transmission and reception in unicast mode. We observe that exhibits around 37% and 38.4% less energy consumption compared to whereas it exhibits around 33% and 36.4% less energy consumption compared to during transmission and reception in unicast mode respectively. IV. CONCLUSION In this work we have demonstrated the architecture and evaluated the performance of our proposed application. We have illustrated the time complexity of the algorithm of our proposed application and found that the algorithm exhibits time complexity of O(n) in worst case scenario and O(1) in best case scenario. We have also compared the performance of the application with a couple of well-known file sharing application namely and. The comparison reveals that Disaster Messenger saves around 37% and 33% energy during data transmission compared to and respectively. It also exhibits around 8.75% and 2.81% higher data transfer rate in unicast mode compared to and respectively. Hence, the application outperforms and in terms of energy consumption and data transfer rate in unicast mode of communication. Moreover, offers multicast and broadcast mode of communication. It also provides a simple user interface which does not demand technical expertise from the users. The aforesaid advantages make unique and suitable for post disaster communication. REFERENCES [1] S. Basu, S. Roy, S. Das Bit and S. Bandyopadhyay, A human mobility based knowledge sharing approach for post disaster need assessment using DTN, in Proc. ICDCN, article 34, 216. [2] H. Ntareme, M. Zennaro and B. Pehrson, DTN on smartphones: Applications or communication challenged areas, in Proc. ExtremeCom, 211. [3] E. Gelenbe and G. Gorbil, Wireless networks in emergency management, in Proc. PINGEN, pp 1-6, 212. [4] C. Funai, C. Tapparello and W. Heinzelman, Supporting Multi-hop Device-to-Device Networks Through WiFi Direct Multi-group Networking, arxiv preprint arxiv:161.28, 215. [5] [6] [7] [8] [9] S. Bhattacharjee, S. Roy and S. Bandyopadhyay, Exploring an energyefficient DTN framework supporting disaster management services in post disaster relief operation, Springer Wireless Networks, vol. 21, issue. 3, pp , 215. [1] L. Zhang, B. Tiwana, R. P. Dick, Z. Qian, Z. M. Mao, Z. Wang and L. Yang, Accurate Online Power Estimation and Automatic Battery Behavior Based Power Model Generation for Smartphones, in Proc. CODES/ISSS, pp , 21.

Ad hoc networking using Wi-Fi during natural disasters: overview and improvements.

Ad hoc networking using Wi-Fi during natural disasters: overview and improvements. Ad hoc networking using Wi-Fi during natural disasters: overview and improvements. Matthijs Gielen University of Twente P.O.Box 217, 7500AE Enschede The Netherlands m.w.gielen@student.utwente.nl ABSTRACT

More information

Reliable Stream Analysis on the Internet of Things

Reliable Stream Analysis on the Internet of Things Reliable Stream Analysis on the Internet of Things ECE6102 Course Project Team IoT Submitted April 30, 2014 1 1. Introduction Team IoT is interested in developing a distributed system that supports live

More information

Ethernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet

Ethernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet Lecture 6 Ethernet Reminder: Homework 2, Programming Project 2 due on 9/20/12. Thick-net Thin-net Twisted Pair Thursday, September 13 CS 475 Networks - Lecture 6 1 Thursday, September 13 CS 475 Networks

More information

Software Requirements Specification (IEEE Std )[1] V1.0. NoNET. Prepared by FixIT

Software Requirements Specification (IEEE Std )[1] V1.0. NoNET. Prepared by FixIT Software Requirements Specification (IEEE Std 830-1998)[1] V1.0 NoNET Prepared by FixIT Ceyda Tosun-1819580 Gülşah Sabırsız-1881424 Gulnaz Shaidolda-1784578 METU - Department of Computer Engineering CENG

More information

Lecture 6. Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1

Lecture 6. Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1 Lecture 6 Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1 Outline Chapter 2 - Getting Connected 2.1 Perspectives on Connecting

More information

A Genetic-Neural Approach for Mobility Assisted Routing in a Mobile Encounter Network

A Genetic-Neural Approach for Mobility Assisted Routing in a Mobile Encounter Network A Genetic-Neural Approach for obility Assisted Routing in a obile Encounter Network Niko P. Kotilainen, Jani Kurhinen Abstract--obility assisted routing (AR) is a concept, where the mobility of a network

More information

Part I. Wireless Communication

Part I. Wireless Communication 1 Part I. Wireless Communication 1.5 Topologies of cellular and ad-hoc networks 2 Introduction Cellular telephony has forever changed the way people communicate with one another. Cellular networks enable

More information

Subject: Adhoc Networks

Subject: Adhoc Networks ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.

More information

The Efficient Point to Point or Multipoint Live Video Streaming in Wireless Devices Mahesh 1 R Rajkumar 2 Dr M V Sudhamani 3

The Efficient Point to Point or Multipoint Live Video Streaming in Wireless Devices Mahesh 1 R Rajkumar 2 Dr M V Sudhamani 3 IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 04, 2015 ISSN (online): 2321-0613 The Efficient Point to Point or Multipoint Live Video Streaming in Wireless Devices Mahesh

More information

Security Enhancement of AODV Protocol for Mobile Ad hoc Network

Security Enhancement of AODV Protocol for Mobile Ad hoc Network Security Enhancement of AODV Protocol for Mobile Ad hoc Network Ms Darshana Patel 1, Ms Vandana Verma 2 1,2 RCEW, Jaipur, Rajasthan, India. ABSTRACT Here, authors presents a smart encryption algorithm

More information

Infrastructure-less Communication Access Points. NEC Corporation

Infrastructure-less Communication Access Points. NEC Corporation Infrastructure-less Communication Access Points NEC Corporation Summary of infrastructure-less communication access points An infrastructure-less communication access point provides a wireless LAN environment

More information

WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks

WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks Tzu-Chieh Tsai, Ting-Shen Liu, and Chien-Chun Han Department of Computer Science, National Chengchi University, Taipei,

More information

Number of Node Estimation in Mobile Ad Hoc Networks

Number of Node Estimation in Mobile Ad Hoc Networks Number of Node Estimation in Mobile Ad Hoc Networks https://doi.org/10.3991/ijim.v11i6.6986 Saher Manaseer!! ", Ibrahem Alhabash The University of Jordan, Amman, Jordan saher@ju.edu.jo Abstract Mobile

More information

Connecting Devices to the PSD-BYOD Network

Connecting Devices to the PSD-BYOD Network Connecting Devices to the PSD-BYOD Network Students and staff can use the PSD-BYOD (Bring Your Own Device) network for internet access. Below are directions for connecting different types of devices. Selecting

More information

Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing.

Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing. Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Study on Various

More information

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5

More information

Advanced Internet Architectures

Advanced Internet Architectures Advanced Internet Architectures Carlos Borrego Iglesias Carlos.Borrego@uab.cat Departament d Enginyeria de la Informació i de les Comunicacions Universitat Autònoma de Barcelona Tecnologies avançades d

More information

Routing Protocols in MANET: Comparative Study

Routing Protocols in MANET: Comparative Study Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119

More information

ANewRoutingProtocolinAdHocNetworks with Unidirectional Links

ANewRoutingProtocolinAdHocNetworks with Unidirectional Links ANewRoutingProtocolinAdHocNetworks with Unidirectional Links Deepesh Man Shrestha and Young-Bae Ko Graduate School of Information & Communication, Ajou University, South Korea {deepesh, youngko}@ajou.ac.kr

More information

How to connect your device using eduroam

How to connect your device using eduroam How to connect your device using eduroam Banaras Hindu University is now fully covered under eduroam, a service with more than 70,000 member academic institutions worldwide. This service allows authorized

More information

Implementation of Wireless Sensor Hub to Support Protocols Interoperability

Implementation of Wireless Sensor Hub to Support Protocols Interoperability Implementation of Wireless Sensor Hub to Support Protocols Interoperability Hitixa R. Patel VLSI & Embedded System Design GTU PG School Ahmedabad, India hitixa30@gmail.com Mr. Rajesh Sola Advance Computer

More information

Wireless Network Security Spring 2013

Wireless Network Security Spring 2013 Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #4 Wireless Systems II Project proposals: Announcements Written proposal due in 1 week Presentation in class in 1 week Contact me to discuss

More information

Power aware Multi-path Routing Protocol for MANETS

Power aware Multi-path Routing Protocol for MANETS Power aware Multi-path Routing Protocol for MANETS Shruthi P Murali 1,Joby John 2 1 (ECE Dept, SNGCE, India) 2 (ECE Dept, SNGCE, India) Abstract: Mobile Adhoc Network consists of a large number of mobile

More information

On maximizing VoIP capacity and energy conservation in multi-rate WLANs

On maximizing VoIP capacity and energy conservation in multi-rate WLANs University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2010 On maximizing VoIP capacity and energy conservation in multi-rate

More information

MOBILITY REACTIVE FRAMEWORK AND ADAPTING TRANSMISSION RATE FOR COMMUNICATION IN ZIGBEE WIRELESS NETWORKS

MOBILITY REACTIVE FRAMEWORK AND ADAPTING TRANSMISSION RATE FOR COMMUNICATION IN ZIGBEE WIRELESS NETWORKS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 3, March 2014,

More information

Measuring the power consumption of social media applications on a mobile device

Measuring the power consumption of social media applications on a mobile device Journal of Physics: Conference Series PAPER OPEN ACCESS Measuring the power consumption of social media applications on a mobile device To cite this article: A I M Dunia et al 2018 J. Phys.: Conf. Ser.

More information

Bytewalla IV Implementation of Delay Tolerant Networks on the Android platform

Bytewalla IV Implementation of Delay Tolerant Networks on the Android platform Implementation of DTN on the Android platform Thesis Plan - 1-2011-03-24 Bytewalla IV Implementation of Delay Tolerant Networks on the Android platform Thesis Plan v1.2 Author: - Michel Hognerud Examiner:

More information

A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET

A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET Bhagyashri Thakre 1, Archana Raut 2 1 M.E. Student, Mobile Technology, G H Raisoni College of Engineering, Nagpur, India 2 Assistant

More information

Bluetooth. 3.3 Latest Technology in Wireless Network. What is BLUETOOTH: Bluetooth 2/17/2016

Bluetooth. 3.3 Latest Technology in Wireless Network. What is BLUETOOTH: Bluetooth 2/17/2016 3.3 Latest Technology in Wireless Network Bluetooth Bluetooth Bluetooth is a high-speed, low-power microwave wireless link technology, designed to connect phones, laptops, PDAs and other portable equipment

More information

COMPARATIVE ANALYSIS OF DIFFERENT ROUTING PROTOCOLS IN DELAY TOLERANT NETWORKS

COMPARATIVE ANALYSIS OF DIFFERENT ROUTING PROTOCOLS IN DELAY TOLERANT NETWORKS COMPARATIVE ANALYSIS OF DIFFERENT ROUTING PROTOCOLS IN DELAY TOLERANT NETWORKS Chintan B. Desai PG Student, Electronics and Communication Department, Charotar University of Science & Technology, Changa,

More information

Deployable Communication Systems and IoT for Public Safety. Professor Kamesh Namuduri Electrical Engineering, University of North Texas

Deployable Communication Systems and IoT for Public Safety. Professor Kamesh Namuduri Electrical Engineering, University of North Texas Deployable Communication Systems and IoT for Public Safety Professor Kamesh Namuduri Electrical Engineering, University of North Texas Outline Introduction building blocks for public-safety and challenges

More information

Energy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2

Energy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2 Energy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2 1 Student Department of Electronics & Telecommunication, SITS, Savitribai Phule Pune University,

More information

Viewing Status and Statistics

Viewing Status and Statistics CHAPTER 7 This chapter explains how to use ADU to view the client adapter s status and its transmit and receive statistics. The following topics are covered in this chapter: Overview of ADU and Statistics

More information

A Jini Based Implementation for Best Leader Node Selection in MANETs

A Jini Based Implementation for Best Leader Node Selection in MANETs A Jini Based Implementation for Best Leader Node Selection in MANETs Monideepa Roy, Pushpendu Kar and Nandini Mukherjee Abstract MANETs provide a good alternative for handling the constraints of disconnectivity

More information

LESSON 12: WI FI NETWORKS SECURITY

LESSON 12: WI FI NETWORKS SECURITY LESSON 12: WI FI NETWORKS SECURITY Raúl Siles raul@taddong.com Founder and Security Analyst at Taddong Introduction to Wi Fi Network Security Wireless networks or Wi Fi networks IEEE 802.11 Standards Information

More information

A Mobile Ad Hoc Network Implementation for Android Smartphones

A Mobile Ad Hoc Network Implementation for Android Smartphones Research Proposal A Mobile Ad Hoc Network Implementation for Android Smartphones David Flanagan Rochester Institute of Technology Abstract The purpose of this research is to determine the feasibility of

More information

Multiple-Metric Hybrid Routing Protocol for Heterogeneous Wireless Access Networks

Multiple-Metric Hybrid Routing Protocol for Heterogeneous Wireless Access Networks Multiple-Metric Hybrid Routing Protocol for Heterogeneous Wireless Access Networks Lijuan Cao Kashif Sharif Yu Wang Teresa Dahlberg Department of Computer Science, University of North Carolina at Charlotte,

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK CONTROLLING PC THROUGH MOBILE PHONE MISS. MUKTA N. PATIL, PROF. SHEETAL P. GAWANDE

More information

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Mehdi Jalili, Islamic Azad University, Shabestar Branch, Shabestar, Iran mehdijalili2000@gmail.com Mohammad Ali

More information

Comparison of Various Routing Protocols & Brief of MANET

Comparison of Various Routing Protocols & Brief of MANET International Journal of Modern Trends in Engineering and Research www.ijmter.com Comparison of Various Routing Protocols & Brief of MANET Akashkumar Patel 1, Rakshitkumar Hirapara 2, Vivekkumar Dhamecha

More information

Data Link Layer, Part 5. Medium Access Control

Data Link Layer, Part 5. Medium Access Control CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU

More information

A Literature survey on Improving AODV protocol through cross layer design in MANET

A Literature survey on Improving AODV protocol through cross layer design in MANET A Literature survey on Improving AODV protocol through cross layer design in MANET Nidhishkumar P. Modi 1, Krunal J. Panchal 2 1 Department of Computer Engineering, LJIET, Gujarat, India 2 Asst.Professor,

More information

The Impact of the Number of Nodes, Speed of Nodes, Speed of Network and the Network Space to the Number of Nodes keeps Alive

The Impact of the Number of Nodes, Speed of Nodes, Speed of Network and the Network Space to the Number of Nodes keeps Alive Available online at www.globalilluminators.org GlobalIlluminators Full Paper Proceeding GTAR-2014, Vol. 1, 463--469 FULL PAPER PROCEEDING Multidisciplinary Studies ISBN: 978-969-9948-30-5 GTAR-14 The Impact

More information

Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols

Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols Akshay Shankar, Lavanya Chelle Information Science Engineering RNS Institute of Technology Bangalore, India Abstract- A Mobile

More information

Web-Based Home Appliances Controlling System

Web-Based Home Appliances Controlling System Web-Based Home Appliances Controlling System B.E. EXTC, TSEC Aman Chadha Mahesh Dubey Siddhesh Shirodker 1 Agenda House monitoring using a live feed Advanced security system based on userauthentication

More information

GoodMeasure Integrator Installation Guide for EDMI MK7A Meters

GoodMeasure Integrator Installation Guide for EDMI MK7A Meters GoodMeasure Integrator Installation Guide for EDMI MK7A Meters Before installation, check that you have a portable computer that you can use while on site to login to www.goodmeasure.net during the installation

More information

Keywords Minimum Spanning Tree, Mobile Adhoc Network (MANET), Multicast, Overhead, Scalability, Spanning Tree.

Keywords Minimum Spanning Tree, Mobile Adhoc Network (MANET), Multicast, Overhead, Scalability, Spanning Tree. Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Challenges

More information

Overview (Advantages and Routing Protocols) of MANET

Overview (Advantages and Routing Protocols) of MANET Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 10, Number 5 (2017) pp. 855-861 Research India Publications http://www.ripublication.com Overview (Advantages and Routing Protocols)

More information

Lecture 04 Introduction: IoT Networking - Part I

Lecture 04 Introduction: IoT Networking - Part I Introduction to Industry 4.0 and Industrial Internet of Things Prof. Sudip Misra Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 04 Introduction: IoT Networking

More information

IJSER. 1. Introduction. 1.1 Routing in DTN: Sukhpreet Kaur

IJSER. 1. Introduction. 1.1 Routing in DTN: Sukhpreet Kaur International Journal of Scientific & Engineering Research, Volume 7, Issue 4, April-2016 1717 A Review of Energy Consumption on DTN Routing Protocols Sukhpreet Kaur Abstract: DTN is net of similar nets.

More information

A Fast and Reliable Tree based Proactive Source Routing in Mobile Adhoc Network 1 Haseena M. K., 2 Annes Philip.

A Fast and Reliable Tree based Proactive Source Routing in Mobile Adhoc Network 1 Haseena M. K., 2 Annes Philip. www.ijecs.in International Journal Of Engineering And Computer Science ISSN:239-7242 Volume 4 Issue 7 July 205, Page No. 3422-3425 A Fast and Reliable Tree based Proactive Source Routing in Mobile Adhoc

More information

On Information Sharing Scheme for Automatic Evacuation Guiding System Using Evacuees Mobile Nodes

On Information Sharing Scheme for Automatic Evacuation Guiding System Using Evacuees Mobile Nodes On Information Sharing Scheme for Automatic Evacuation Guiding System Using Evacuees Mobile Nodes Nobuhisa Komatsu, Masahiro Sasabe, and Shoji Kasahara Graduate School of Information Science, Nara Institute

More information

Survey on Multicast Routing Protocols in MANETs

Survey on Multicast Routing Protocols in MANETs Survey on Multicast Routing Protocols in MANETs A Viswanath, Dept of CSE, Sree Vidyanikethan Engineering College, Tirupati, AP, India. N Papanna, M.Tech, Assistant Professor, Sree Vidyanikethan Engineering

More information

New Communication Technologies: Linking Stakeholders in Difficult Communication Environments 2 June 2015

New Communication Technologies: Linking Stakeholders in Difficult Communication Environments 2 June 2015 Highlights of the discussion New Communication Technologies: Linking Stakeholders in Difficult Communication Environments 2 June 2015 This brown bag is part of a how-to series that the DER Project Communication

More information

Lesson 10. Circuit Boards and Devices Ethernet and Wi-Wi Connectivity with the Internet

Lesson 10. Circuit Boards and Devices Ethernet and Wi-Wi Connectivity with the Internet Lesson 10 Circuit Boards and Devices Ethernet and Wi-Wi Connectivity with the Internet 1 Connecting Arduino USB to Internet Arduino board IDE supports USB. USB port connects to a mobile or computer or

More information

BYZANTINE ATTACK ON WIRELESS MESH NETWORKS: A SURVEY

BYZANTINE ATTACK ON WIRELESS MESH NETWORKS: A SURVEY BYZANTINE ATTACK ON WIRELESS MESH NETWORKS: A SURVEY Sunil Goyal1 M.Tech Student, Deptt. of CSE GKU TalwandiSabo,India Vinod sharma2 Assistant Professor, Deptt. of CSE GKU TalwandiSabo,India Abstract-The

More information

AmbiCom WL11-SD Wireless LAN SD Card. User Manual

AmbiCom WL11-SD Wireless LAN SD Card. User Manual AmbiCom WL11-SD Wireless LAN SD Card User Manual Version 3.0 October 15, 2004 Table of Contents 1 WL11-SD features...3 2 Package Contents & System Requirements...3 2.1 Package Contents... 3 2.2 System

More information

Figure 1. Clustering in MANET.

Figure 1. Clustering in MANET. Volume 6, Issue 12, December 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance

More information

Mobile Macroscopes: The CarTel Project

Mobile Macroscopes: The CarTel Project Mobile Macroscopes: The CarTel Project Sam Madden MIT CSAIL http://cartel.csail.mit.edu With Hari Balakrishnan, Vladimir Bychkovsky, Bret Hull, Yang Zhang, Kevin Chen, Waseem Daher, Michel Goraczko, Hongyi

More information

Glossary of Technology Terms

Glossary of Technology Terms Glossary of Technology Terms 1 Acceptable Use Agreement (AUA) An acceptable use agreement (AUA) is a document that outlines a set of rules to be followed by users or customers of a set of computing resources,

More information

A Novel Information Sharing Architecture Constructed by Broadcast Based Information Sharing System (BBISS)

A Novel Information Sharing Architecture Constructed by Broadcast Based Information Sharing System (BBISS) A Novel Information Sharing Architecture Constructed by Broadcast Based Information Sharing System (BBISS) Keisuke Utsu, Chee Onn Chow 2, Hiroaki Nishikawa 3, and Hiroshi Ishii School of Information and

More information

Using Mobile Computers Lesson 12

Using Mobile Computers Lesson 12 Using Mobile Computers Lesson 12 Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data Use BitLocker Drive Encryption Use remote network connections

More information

UCS-805 MOBILE COMPUTING Jan-May,2011 TOPIC 8. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.

UCS-805 MOBILE COMPUTING Jan-May,2011 TOPIC 8. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala. Mobile Ad Hoc Networks: Routing TOPIC 8 UCS-805 MOBILE COMPUTING Jan-May,2011 ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala Email-alakroy.nerist@gmail.com Mobile Ad Hoc Networks (MANET) Introduction

More information

IJRIM Volume 1, Issue 4 (August, 2011) (ISSN ) REQUIREMENTS FOR ALTERNATE ROUTES IN MANET ABSTRACT

IJRIM Volume 1, Issue 4 (August, 2011) (ISSN ) REQUIREMENTS FOR ALTERNATE ROUTES IN MANET ABSTRACT REQUIREMENTS FOR ALTERNATE ROUTES IN MANET Ela Kumar* Ravinder Nath Rajotiya** ABSTRACT The evolution of next generation wireless technologies, have given birth to new kind of communication techniques.

More information

Performance Analysis of MANET Routing Protocols OLSR and AODV

Performance Analysis of MANET Routing Protocols OLSR and AODV VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz

More information

nettalk DUO WiFi Configuration (using an Android smartphone)

nettalk DUO WiFi Configuration (using an Android smartphone) nettalk DUO WiFi Configuration (using an Android smartphone) Step 1. Activate your Device a. Locate your username and password inside of the box. b. Go to www.nettalk.com/activate and follow the activation

More information

WPAN/WBANs: ZigBee. Dmitri A. Moltchanov kurssit/elt-53306/

WPAN/WBANs: ZigBee. Dmitri A. Moltchanov    kurssit/elt-53306/ WPAN/WBANs: ZigBee Dmitri A. Moltchanov E-mail: dmitri.moltchanov@tut.fi http://www.cs.tut.fi/ kurssit/elt-53306/ IEEE 802.15 WG breakdown; ZigBee Comparison with other technologies; PHY and MAC; Network

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

Mitigating Malicious Activities by Providing New Acknowledgment Approach

Mitigating Malicious Activities by Providing New Acknowledgment Approach Mitigating Malicious Activities by Providing New Acknowledgment Approach G. S. Devi Lakshmi, J. Rajasekaran 2 PG Student, Sri Subramanya College of Engineering and Technology, Palani, Tamilnadu, India

More information

A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS

A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS ABSTRACT Zhang Huijuan and Liu Kai School of Software Engineering, Tongji University, Shanghai, China

More information

Available online at ScienceDirect. Procedia Computer Science 57 (2015 )

Available online at   ScienceDirect. Procedia Computer Science 57 (2015 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 57 (2015 ) 890 897 2015 International Conference on Recent Trends in Computing (ICRTC 2015) Performance Analysis of Efficient

More information

Mobility, Security Concerns, and Avoidance

Mobility, Security Concerns, and Avoidance By Jorge García, Technology Evaluation Centers Technology Evaluation Centers Mobile Challenges: An Overview Data drives business today, as IT managers and security executives face enormous pressure to

More information

Temporary Interconnection of ZigBee Personal Area Network (PAN)

Temporary Interconnection of ZigBee Personal Area Network (PAN) Temporary Interconnection of Personal Area Network (PAN) Sewook Jung, Alexander Chang, and Mario Gerla Department of Computer Science University of California, Los Angeles {sewookj,acmchang,gerla}@cs.ucla.edu

More information

A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks

A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks P.Madhan Mohan #, J.James Johnson #, K.Murugan $ and V.Ramachandran % # Under Graduate Student $ Senior

More information

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model 1 R. Jeevitha, 2 M. Chandra Kumar 1 Research Scholar, Department of Computer

More information

Mobile and Sensor Systems

Mobile and Sensor Systems Mobile and Sensor Systems Lecture 1: Introduction to Mobile Systems Prof Cecilia Mascolo About Me time In this course The course will include aspects related to general understanding of Mobile and ubiquitous

More information

Security for Smart Distribution Grid By Using Wireless Communication

Security for Smart Distribution Grid By Using Wireless Communication Security for Smart Distribution Grid By Using Wireless Communication S.K.Saranya 1, Dr.R.Karthikeyan 2 P.G Scholar, Dept of EEE, M.Kumarasamy College of Engineering, Karur, Tamilnadu, India 1 Professor,

More information

Estimate the Routing Protocols for Internet of Things

Estimate the Routing Protocols for Internet of Things Estimate the Routing Protocols for Internet of Things 1 Manjushree G, 2 Jayanthi M.G 1,2 Dept. of Computer Network and Engineering Cambridge Institute of Technology Bangalore, India Abstract Internet of

More information

An Adaptive and Optimal Distributed Clustering for Wireless Sensor

An Adaptive and Optimal Distributed Clustering for Wireless Sensor An Adaptive and Optimal Distributed Clustering for Wireless Sensor M. Senthil Kumaran, R. Haripriya 2, R.Nithya 3, Vijitha ananthi 4 Asst. Professor, Faculty of CSE, SCSVMV University, Kanchipuram. 2,

More information

CyberOffice: A Smart Mobile Application for Instant Meetings

CyberOffice: A Smart Mobile Application for Instant Meetings , pp.43-52 http://dx.doi.org/10.14257/ijseia.2014.8.1.04 CyberOffice: A Smart Mobile Application for Instant Meetings Dong Kwan Kim 1 and Jae Yoon Jung 2 1 Department of Computer Engineering, Mokpo National

More information

MobilityFirst Future Internet Architecture. Samuel Nelson

MobilityFirst Future Internet Architecture. Samuel Nelson MobilityFirst Future Internet Architecture Samuel Nelson snelson@winlab.rutgers.edu MobilityFirst Project: Collaborating Institutions (LEA) A. Venkataramani, J. Kurose,. Towsley M. Reiter S. Bannerjee

More information

Requirements Analysis of IP and MAC Protocols for Dedicated Short Range Communications (DSRC)

Requirements Analysis of IP and MAC Protocols for Dedicated Short Range Communications (DSRC) Requirements Analysis of IP and MAC Protocols for Dedicated Short Range Communications (DSRC) James T. Yu, jyu@cs.depaul.edu School of Computer Science, Telecommunications, and Information Systems DePaul

More information

Connection Guide (for COOLPIX)

Connection Guide (for COOLPIX) Connection Guide (for COOLPIX) This document describes the procedure for using the SnapBridge app (Version 2.0) to establish a wireless connection between a supported camera and smart device. When you

More information

MIS 300 Exam 2 Spring 2011

MIS 300 Exam 2 Spring 2011 MIS 300 Exam 2 Spring 2011 Name: Instructions Turn off your cell phone. Close your notes and book. Answer each question by selecting the best response. For True/False questions, select A for and B for.

More information

GoodMeasure Connector Installation Guide

GoodMeasure Connector Installation Guide GoodMeasure Connector Installation Guide Before installation, check that you have a portable computer that you can use while on site to login to www.goodmeasure.net during the installation The Connector

More information

Mobile Ad Hoc Networks: Basic Concepts and Research Issues

Mobile Ad Hoc Networks: Basic Concepts and Research Issues Mobile Ad Hoc s: Basic Concepts and Research Issues Ing. Alessandro Leonardi aleonardi@dieei.unict.it Wireless s Generations (1/3) Generation 1G 2G 2.5G 3G 4/5G Time 1980s 1990s Late1990s 2000s (2010 full

More information

MANET TECHNOLOGY. Keywords: MANET, Wireless Nodes, Ad-Hoc Network, Mobile Nodes, Routes Protocols.

MANET TECHNOLOGY. Keywords: MANET, Wireless Nodes, Ad-Hoc Network, Mobile Nodes, Routes Protocols. MANET TECHNOLOGY Dharna 1, Varsha Saroha 2, R. B. Dubey 3 1,2,3 Department of Electronics and Communication Engineering, Hindu College of Engineering, Sonepat, Haryana,(India) ABSTRACT Wireless technology

More information

Dynamic Neighbor Positioning In Manet with Protection against Adversarial Attacks

Dynamic Neighbor Positioning In Manet with Protection against Adversarial Attacks International Journal of Computational Engineering Research Vol, 03 Issue, 4 Dynamic Neighbor Positioning In Manet with Protection against Adversarial Attacks 1, K. Priyadharshini, 2, V. Kathiravan, 3,

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 9, September ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 9, September ISSN International Journal of Scientific & Engineering Research, Volume 4, Issue 9, September-2013 831 Performance Analysis of Reactive and Proactive Routing Protocols for Vehicular Adhoc Network Ms. Monika

More information

Performance Analysis of Mobile Ad Hoc Network in the Presence of Wormhole Attack

Performance Analysis of Mobile Ad Hoc Network in the Presence of Wormhole Attack Performance Analysis of Mobile Ad Hoc Network in the Presence of Wormhole Attack F. Anne Jenefer & D. Vydeki E-mail : annejenefer@gmail.com, vydeki.d@srmeaswari.ac.in Abstract Mobile Ad-Hoc Network (MANET)

More information

Technical Supplement

Technical Supplement HA 6400 Côr Home Automation Programming Camera Technical Supplement PROGRAMMING CAMERA The following instructions are applicable to the Gen 1 Indoor Desktop (RS 3130) and Outdoor Wedge (TVW 3120) cameras.

More information

Design and Implementation of Improved Routing Algorithm for Energy Consumption in Delay Tolerant Network

Design and Implementation of Improved Routing Algorithm for Energy Consumption in Delay Tolerant Network IJIRST International Journal for Innovative Research in Science & Technology Volume 3 Issue 07 December 2016 ISSN (online): 2349-6010 Design and Implementation of Improved Routing Algorithm for Energy

More information

IPv6 Stack. 6LoWPAN makes this possible. IPv6 over Low-Power wireless Area Networks (IEEE )

IPv6 Stack. 6LoWPAN makes this possible. IPv6 over Low-Power wireless Area Networks (IEEE ) Reference: 6LoWPAN: The Wireless Embedded Internet, Shelby & Bormann What is 6LoWPAN? 6LoWPAN makes this possible - Low-power RF + IPv6 = The Wireless Embedded Internet IPv6 over Low-Power wireless Area

More information

MobiDFS: A lightweight mobile distributed file system

MobiDFS: A lightweight mobile distributed file system MobiDFS: A lightweight mobile distributed file system Jilong Liao, Chi Zhang University of Tennessee, Knoxville, USA jliao2@utk.edu; czhang24@utk.edu Abstract Though Mobile computing area is getting increasingly

More information

PERVASIVE AUTHENTICATION AND AUTHORIZATION INFRASTRUCTURES FOR MOBILE USERS USING PERVASIVE-PKI

PERVASIVE AUTHENTICATION AND AUTHORIZATION INFRASTRUCTURES FOR MOBILE USERS USING PERVASIVE-PKI PERVASIVE AUTHENTICATION AND AUTHORIZATION INFRASTRUCTURES FOR MOBILE USERS USING PERVASIVE-PKI Ms. Sneha R. Kaware M.E First Year, computer science and Engineering, H.V.P.M college of Engg & Tech, Amravati,

More information

Asst. Prof. Information Technology Dept. 1, 2, 3, The Technological Institute of Textile and Sciences, Bhiwani, Haryana, India

Asst. Prof. Information Technology Dept. 1, 2, 3, The Technological Institute of Textile and Sciences, Bhiwani, Haryana, India Volume 4, Issue 10, October 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance

More information

Gurinder Pal Singh Chakkal, Sukhdeep Singh Dhillon

Gurinder Pal Singh Chakkal, Sukhdeep Singh Dhillon A Review on Mobile Ad-Hoc Networks (MANET) Routing Protocols Gurinder Pal Singh Chakkal 1, Sukhdeep Singh Dhillon 2 Computer Science & Engineering 1, 2 Institute of Engineering & Technology Bhaddal, Ropar

More information

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 9 February 2015 ISSN (online): 2349-6010 Elimination Of Redundant Data using user Centric Data in Delay Tolerant

More information

Instruction How To Use Wifi In Mobile Phone Via Laptop >>>CLICK HERE<<<

Instruction How To Use Wifi In Mobile Phone Via Laptop >>>CLICK HERE<<< Instruction How To Use Wifi In Mobile Phone Via Laptop You could also just connect your phone to your laptop and draw power from of the Wi-Fi hotspot feature, but you can also tether via a USB cable or

More information

USER MANUAL WI-LIGHT REMOTE APPLICATION

USER MANUAL WI-LIGHT REMOTE APPLICATION USER MANUAL WI-LIGHT REMOTE APPLICATION User Manual - Wi-light remote application 1 SUMMARY Connect to a Stand Alone device with the Wi-light application... 3 Connect the software smartphone server with

More information