CONTENT SHARING OVER SMARTPHONE AND PC USING ANDROID

Similar documents
A Recommendation Based Efficient Secure discover-predict-deliver Content Sharing Scheme

Peer-to-Peer Content sharing for Smart phones over Ad-Hoc Networks.

COMPARATIVE ANALYSIS OF DIFFERENT ROUTING PROTOCOLS IN DELAY TOLERANT NETWORKS

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES

Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay

Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey. Namita Mehta 1 and Mehul Shah 2

Archna Rani [1], Dr. Manu Pratap Singh [2] Research Scholar [1], Dr. B.R. Ambedkar University, Agra [2] India

Energy Consumption and Performance of Delay Tolerant Network Routing Protocols under Different Mobility Models

A Joint Replication-Migration-based Routing in Delay Tolerant Networks

Design and Implementation of Improved Routing Algorithm for Energy Consumption in Delay Tolerant Network

Performance Analysis of Delay Tolerant Network Routing Protocols in Different Mobility Environments

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network

IJSER. 1. Introduction. 1.1 Routing in DTN: Sukhpreet Kaur

High Throughput in MANET Using relay algorithm and rebroadcast probability

Routing Protocol Approaches in Delay Tolerant Networks

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM

Geographic information based Replication and Drop Routing (GeoRaDR): A Hybrid Message Transmission Approach for DTNs

Hierarchical Trust Management for Delay Tolerant Networks Using Stochastic Petrinet for Secure Routing

Simulation and Analysis of Opportunistic Routing Protocols

Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks

Improving Performance in Ad hoc Networks through Location based Multi Hop Forwarding

MDR Based Cooperative Strategy Adaptation in Wireless Communication

PERFORMANCE EVALUATION OF DSDV, AODV ROUTING PROTOCOLS IN VANET

A Genetic-Neural Approach for Mobility Assisted Routing in a Mobile Encounter Network

Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing.

Routing with Multi-Level Social Groups in Mobile Opportunistic Networks

NEW STRATEGY TO OPTIMIZE THE PERFORMANCE OF SPRAY AND WAIT ROUTING PROTOCOL

Community-Based Adaptive Buffer Management Strategy in Opportunistic Network

Spray and Dynamic: Advanced Routing in Delay Tolerant Networks

ERASURE-CODING DEPENDENT STORAGE AWARE ROUTING

STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK

International Journal of Computer Engineering and Applications, Volume XII, Special Issue, August 18, ISSN

Impact of Social Networks in Delay Tolerant Routing

Buffer Aware Network Coded Routing Protocol for Delay Tolerant Networks

Research Article ISSN:

BOND: Unifying Mobile Networks with Named Data. Michael Meisel

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

Routing Issues & Performance Of Different Opportunistic Routing Protocols In Delay Tolerant Network

Reducing End to End per Packet Energy Consumption

ANNALS of Faculty Engineering Hunedoara International Journal of Engineering

Integrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANET

Exploiting Heterogeneity in Mobile Opportunistic Networks: An Analytic Approach

Efficient Message Caching Scheme for MANET

Available online at ScienceDirect. Procedia Computer Science 57 (2015 )

Routing in Delay Tolerant Networks (DTN)

Application of Graph Theory in DTN Routing

Studies with ns-2 and ns-3 based DTN Simulators

The Novel HWN on MANET Cellular networks using QoS & QOD

Estimation based Erasure-coding Routing in Delay Tolerant Networks

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Social-Aware Routing in Delay Tolerant Networks

On Information Sharing Scheme for Automatic Evacuation Guiding System Using Evacuees Mobile Nodes

SECURE AND EFFICIENT HYBRID APPROACH FOR DATA TRANSMISSION IN ZIGBEE NETWORK

Simulation of Epidemic, Spray and Wait and First Contact Routing Protocols in Delay Tolerant Network

A SURVEY ON OPPORTUNISTIC ROUTING PROTOCOLS IN CELLULAR NETWORK FOR MOBILE DATA OFFLOADING

Timely Information Dissemination with Distributed Storage in Delay Tolerant Mobile Sensor Networks

WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks

EA-Epidemic: An Energy Aware Epidemic-Based Routing Protocol for Delay Tolerant Networks

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks

INTERNATIONAL JOURNAL OF RESEARCH SCIENCE & MANAGEMENT

Improvement of Buffer Scheme for Delay Tolerant Networks

PRESENTATION MOLD OF INTERRUPTION TOLERANT NETWORK ROUTING

Effect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols

IMPROVING QoS IN DELAY TOLERANT MOBILE AD HOC NETWORK USING MULTIPLE MESSAGE FERRIES

Performance Analysis of Routing Protocol in Delay Tolerant Network

1. INTRODUCTION. Saravanan.A 1 and Dr.Sunitha Abburu 2

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Optimising Replication versus Redundancy in Window-aware Opportunistic Routing

Link Lifetime Prediction in Mobile Ad-Hoc Network Using Curve Fitting Method

Mobile Offloading Using WiFi: Viable in VANETs?

Figure 1. Clustering in MANET.

Combined Mobile Ad-hoc and Delay/Disruption-tolerant Routing

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

An Efficient Peer-to-Peer Distributed Scheduling for Content Based File Sharing in Manet

GROUP MANAGEMENT IN MOBILE ADHOC NETWORKS

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks

Advanced Internet Architectures

TRUST FRAMEWORK FOR DATA FORWARDING IN OPPORTUNISTIC NETWORKS USING MOBILE TRACES

PROFICIENT CLUSTER-BASED ROUTING PROTOCOL USING EBSA AND LEACH APPROACHES

Context-for-Wireless: Context-Sensitive Energy- Efficient Wireless Data Transfer

MOBILITY REACTIVE FRAMEWORK AND ADAPTING TRANSMISSION RATE FOR COMMUNICATION IN ZIGBEE WIRELESS NETWORKS

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS

Opportunistic Web Access via WLAN Hotspots

Packet Estimation with CBDS Approach to secure MANET

Integrated Routing Protocol for Opportunistic Networks

Design of Simulator for Finding the Delay Distribution in Delay Tolerant Networking

Energy Efficient EE-DSR Protocol for MANET

Routing in a Delay Tolerant Network Sushant Jain, Kevin Fall and Rabin Patra SIGCOMM Presented by Xun Gong

Comparison of Online Record Linkage Techniques

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks

TOPOLOGY CONTROL IN WIRELESS NETWORKS BASED ON CLUSTERING SCHEME

Performance Evaluation of Various Routing Protocols in MANET

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

Beaconing Strategy for Geo-Graphic Routing In Mobile Ad Hoc Networks

Regression-based Link Failure Prediction with Fuzzy-based Hybrid Blackhole/Grayhole Attack Detection Technique

Capacity-Aware Routing Using Throw-Boxes

Network Routing Without Delay Using Message Scheduling

Data Gathering for Wireless Sensor Network using PEGASIS Protocol

A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET

Transcription:

International Journal of Advances in Applied Science and Engineering (IJAEAS) ISSN (P): 2348-1811; ISSN (E): 2348-182X Vol-1, Iss.-4, SEPTEMBER 2014, 53-57 IIST CONTENT SHARING OVER SMARTPHONE AND PC USING ANDROID POPURI SRINIVASARAO, YALAVARTHI LEELAKRISHNA * PG SCHOLAR, CSE, E.V.M COLLEGE OF ENGG & TECH, NARASARAOPET,AP, INDIA, INDIA ** ASSISTANT PROFESSOR, CSE, E.V.M COLLEGE OF ENGG & TECH, NARASARAOPET,AP, INDIA kanne.naveen@gmail.com Abstract With the growing number of smartphone users, peer-to-peer ad hoc content sharing is expected to occur more often. Thus, new content sharing mechanisms should be developed as traditional data delivery schemes are not efficient for content sharing due to the sporadic connectivity between smartphones. To accomplish data delivery in such challenging environments, researchers have proposed the use of store-carry-forward protocols, in which a node stores a message and carries it until a forwarding opportunity arises through an encounter with other nodes. Most previous works in this field have focused on the prediction of whether two nodes would encounter each other, without considering the place and time of the encounter. In this paper, we propose discover-predict-deliver as an efficient content sharing scheme for delay-tolerant smartphone networks. In our proposed scheme, contents are shared using the mobility information of individuals. Specifically, our approach employs a mobility learning algorithm to identify places indoors and outdoors. A hidden Markov model is used to predict an individual s future mobility information. Evaluation based on real traces indicates that with the proposed approach, 87 percent of contents can be correctly discovered and delivered within 2 hours when the content is available only in 30 percent of nodes in the network. We implement a sample application on commercial smartphones, and we validate its efficiency to analyze the practical feasibility of the content sharing application. Our system approximately results in a 2 percent CPU overhead and reduces the battery lifetime of a smartphone by 15 percent at most. Index Terms Store and forward networks, wireless communication, location dependent and sensitive, pervasive computing I. INTRODUCTION Now a days the problem of content sharing in DTN networks is challenging research problem. The numbers of Smartphone s are increasing now days. Peer-to-peer ad hoc content sharing is expected to occur more often. In traditional centralized server system, many tasks are required for content sharing among smart phones such as registration, uploading contents to central servers by content provider, and searching and downloading contents by consumer. In this method contents are spontaneously discovered and shared. This approach will improve the efficiency as compared to existing methods. Ad hoc networks can easily be constructed with Smartphone as they are prepared with various network interfaces, such as Wi-Fi or Bluetooth. The connectivity between Smartphone s is expected to be discontinuous due to the movement patterns of carriers and the signal propagation. To overcome this problem, researchers have proposed a variety of store carry-forward routing methods. In Store and forward networks information is sent to an intermediate station where it is kept and sent at a later time to the final destination or to another intermediate station. This technique is commonly used in networks with intermittent connectivity, mainly in the environments requiring high mobility. It may also be used in situations when there are high error rates and long delays in transmission. End-to-end connection is not available. In the store-carry-forward routing schemes [2],[9],[10] a node stores a message and carries it for a certain period until a communication occurs. Utility functions are used for making local forwarding decisions. To increase the delivery possibility multiple copies of the same message are spread in parallel. Delay-Tolerant Network (DTN) routing protocols achieve better performance than traditional mobile ad hoc network (MANET) routing protocols. The absence of the requirement of a central server is the advantage of both DTN and MANET routing protocols. Hence contents are distributed and stored directly on the Smartphone s. A basic DTN routing solution is Epidemic routing [2]. Epidemic routing quickly distribute messages to hosts, within connected portions of ad hoc networks. At this point, the message spreads to large network of nodes. Due to this transitive transmission of data, probability of reaching messages to their destination increases. Existing methods are based on traditional mobile ad hoc network (MANET) routing protocols which delivers worst performance for content sharing. Some methods presented using the DTN, but deliver the less efficiency. New method introduced with more efficiency but resulted into more energy consumption. Existing system mainly focused on limiting 53

search query propagation and proposed a number of query processing methods. It does not focus on the geographic search query propagation limit. Now days there are increasing demand for content sharing in wireless networks, hence we need to have efficient method in place. A hidden Markov model is used to predict an individual s future mobility information. We propose an energy efficient content sharing mechanism in DTNs. Today s Smartphone s have various characteristics (i.e., availability of various localization and communication technologies). So we are aiming to utilize them and appropriately designed the method. This approach will improve the efficiency as compared to existing methods. In this paper we are extending the recently presented method in [1], which practically efficient for content sharing in DTN. The extension of this method is required to enhance the lifetime of Smartphone s. The proposed method is basically based on fuzzy rules to stop the applications during the idle time. II. LITERATURE SURVEY This section focus on different methods presented for DTN based content sharing networks. In [3], Chaintreau et al. studied the effect of human mobility on opportunistic forwarding and suggested that the intercontact time between two nodes can be approximated by a power law. They did not study how mobility information can be used for estimatingen counter opportunities among users. In [7], Entracked is location tracking system for GPS-enabled devices. The system is configurable to understand different tradeoffs between energy consumption and robustness. EnLoc[8] uses GPS, GSM, and Wi-Fi system for energy-efficient localization. The system takes advantage of human mobility patterns to predict a location of user to minimize the sampling count. Mobility prediction has been widely studied in and out of the delay-tolerant networking community. Markov-based schemes formulate the problem as a Hidden Markov or semi-markov model and predict human mobility. Even though Bluetooth is a low-power radio, device discovery duration of it is much longer than Wi-Fi (approx. 10s for Bluetooth vs._1s for Wi-Fi active scanning), it may cause more energy consumption on smart phones. In prediction-based schemes [9] [10] sophisticated utility functions are designed using the history of the mobility, the encounter rates and encounter times. Each node stores a utility value for all other nodes, and these values are updated using the time between contacts. While forwarding a message copy only those nodes are considered who are having higher utility for the message destination. Depending on the number of copies of a single message that may coexist in the network, one can define two major categories of mobility-assisted routing schemes. In single-copy schemes, there s only one node in the network that carries a copy of the message at any given time. This node is considered as the custodian of the message. When the current custodian forwards the copy to an appropriate next hop, this becomes the message s new custodian, and so on and so forth until the message reaches its destination. The multiple-copy routing schemes may generate multiple copies of the same message, which can be routed independently for increased robustness. Searching for Content in Mobile DTN by M. Pitkanen[5], explores various methods to limit query spread. The key differences in content detect are that we use a multicopy query distribution scheme, and our detect scheme efficiently uses location information to prevent the unnecessary propagation of queries. BeaconPrint[12] discovers meaningful places by continuously determining stable scans for a certain time period. Previous work has studied the power of Bluetooth/Wi-Fi devices which either focus on only Bluetooth [13], [14] or ignore the duration of device discovery [14], but without which it is hard to evaluate the energy consumption of these devices. III. PROPOSED APPROACH FRAMEWORK AND DESIGN Data flow of proposed method is described by following steps: Step 1: Input content request. Step 2: Search content in local storage. Step 3: Generate the query based on request if the contents are not found in local storage. Step 4: Detect the location where content sharing can be performed. Step 5: Trigger query in network based on distribution and termination technique. Step 6: Apply the Adaptive analysis Algorithm of discovery content detection. Step 7: Node matches the content in local storage and if match found select the subset of content. Step 8: Send the content to the query originator. 1.1. Proposed Method In the store-carry-forward networking the nodes communicate using DTN bundle architecture [10], all users are ready to cooperate and supply a limited amount of their resources, like bandwidth, storage, and processing power, to help others. This method allows users to issue queries for content stored on other smart phones anywhere in the network and to review the chances of obtaining the information needed. In the proposed method, contents are locally indexed and identified easily. Some of our assumptions are, unlimited content size, the contents are non-fragmented, or they are not coupled to 54

locations. Localization devices should be equipped in Smart phones GPS, as well as various networking interfaces like Wi-Fi,GSM/CDMA, and Bluetooth. Contents are shared using the mobility information of individuals. Let the maximum distance to exchange messages between two nodes be R. The distance between smart phones i and j at time t is denoted as Dij;t = Dji;t. Thus, nodes i and j can exchange messages if and only if Dij;t R. The content sharing process is classified into two parts. First is the efficient content detection and second is the content delivery. In the content detection, a user requests for content. The application initially searches for the content in local storage, and if not found, the application generate a query message based on the user s request. The query is then triggered in the network based on a particular forwarding decision and searchtermination technique. ediscovery for Content detection focuses on how to trigger query using Bluetooth [9]. The content delivery is initiated when the content is found. Using utility function the content is routed towards the query originator. The major principle of ediscovery is to reduce smartphone energy consumption of device discovery, while not missing too many peers. 3.2. Mathematical Model 1. Mobility Informationfor destination d, if MIi ={li,t,li,t+δ,.lit+kδ} L={l1,l2, lm} m 1 k=[m/δ] 2. Query time ti={ t0,t1} 3.3 Definitions 1. Query time: The time difference between query release time t0 and content usage time t1, T = t1 - t0 Hence after the query lifetime, both query and content are no longer useful. 2. Mobility information: A set of meaningful locations and paths between these locations. The mobility information of node i from time t for the interval of M is: Content detection focuses on how to trigger query. Query should only be forwarded to neighbors that have matching contents or that are on the path to other nodes having matching contents. Nodes return non-overlapping response to the requester. Each. node can make independent forwarding decisions. To limit the query triggering: a split query time limit and a query distance limit. We use a controlled replication-based [9] routing scheme because this scheme performs better than singlecopy scheme. Our work splits the query lifetime for discovering and delivering contents. Also our work uses spatial constraint for query distribution. The details of the spatiotemporal constraint for query distribution are: When a node needs some contents, it generates query information Q. Q contains: node identifier ID (e.g., IMEI number), the creation time of the query tqc, the query time T, the replication size, and the q node s mobility information: When a query-carrying node encounters another node, the carrying node executes the following forwarding decision to spread the query: Where,α [0,1] is the ratio of the detect period to the delivery period. This indicates percentage of the query time used for detection and percentage used for delivery. When the querycarrying node finds that forwarding the query will not influence sharing performance due to the end of the query time, the node terminates distributing the query. In case the above forwarding decision function is true, the next forwarding decision is taken: 3.4 Content detection The utility function Ui(d) is for the effectiveness of node I when it delivers a message to destination d. In utilitybased routing, node i forwards a message to node j which is intended for destination d, if 3.4 Content detection Where lf,t is the location of the forwarding node f at time t, lq,tis the predicted location of the query originator node q at time t, and H is the threshold distance for query triggering It is set by the user. This decision function is for not triggering the query in unnecessary area. A node may carry a query traveling long distance even the content can be found in the area where node is residing. In this case content delivery cost will be very high, or it happen that contents may not be delivered because of the 55

query time expiration. Hence limiting the query trigger to a certain region is reasonable. IV MOBILITY LEARNING AND PREDICTION In this section, we describe the core component of the proposed content sharing scheme which involves mobility learning and prediction. Although contents are not coupled to user locations, our content discovery and content delivery mechanisms use the location information of the user for accurate content sharing. Specifically, in (2), we use the location information of two nodes: a node that makes a forwarding decision and a node that has generated a query. Therefore, we utilize a smartphonebased context provider called LifeMap [21], which is specifically designed to support location-based services in indoor/outdoor environments. Also, in (3) and (4), the predicted location of nodes is used to estimate the distance between these nodes at a given time. We extend LifeMap with a Prediction module, which is a special component to predict the future locations of nodes. The Content Provider module of LifeMap is modified to extract the temporal features of locations. We examine these modules, and for the description of other components, readers may refer to the original papers [21], [22]. Mobility Learning In daily life, people typically visit a number of places, but not all of these are meaningful for learning people s mobility. Indeed, DPD requires the discovery of locations where content sharing can be performed. Content sharing is successfully performed in places where smartphone users stay long enough, as perceiving the existence of other nodes and message exchanging requires several minutes depending on the size of the message, the bandwidth, and the network interface. Hence, we are basically interested in discovering places where the user stays longer than a certain duration (i.e., meaningful places) and the context in user movement (i.e., paths). 3.1.1 Movement Tracking In LifeMap, the Activity Manager monitors the acceleration vector of a three-axis accelerometer and detects the motion of the user. The motion detector function of the Activity Manager is basically a classifier M that has two outputs: moving or stationary. When the user is walking, running, or moving in a vehicle, the motion is classified as moving, whereas when the user stays at a certain location, the motion is classified as stationary. 3.2 Mobility Prediction As DPD uses location information to estimate if a node approaches the destination of the content or diverges from the destination, the prediction of nodes mobility information is essential. In computing (2), (3), and (4), we first need to estimate the predicted mobility information from time t for the duration of query lifetime T per time instance _. The prediction of the required mobility information is formulated as a posterior distribution: V. CONCLUSION The main aim of this paper was to introduce the power efficient and performance efficient content sharing scheme for DTN. There are many ways or the applications which we have utilized here to stop during their idle time. The proposed method aims to utilize the advantages of today s smart phones (i.e., availability of various localization and communication technologies) and appropriately designed the method. This method shares the content by reducing the energy consumption. VI. REFERENCES [1] Elmurod Talipov, Yohan Chon, and Hojung Cha, Member, IEEE, Content Sharing over Smartphone-Based Delay-Tolerant Networks, IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 12, NO. 3, MARCH 2013. [2] A. Vahdat and D. Becker, Epidemic Routing for Partially Connected Ad Hoc Networks, technical report, Dept. of Computer Science, Duke Univ., Sept. 2000. [3] T. Spyropoulos, K. Psounis, and C. Raghavendra, Efficient Routing in Intermittently Connected Mobile Networks: The Single-Copy Case, IEEE/ACM Trans. Networking, vol. 16, no. 1, pp. 63-76, Feb. 2008. [4] T. Spyropoulos, K. Psounis, and C.S. Raghavendra, Efficient Routing in Intermittently Connected Mobile Networks: The Multiple- Copy Case, IEEE/ACM Trans. Networking, vol. 16, pp. 77-90, Feb. 2008. [5] M. Pitkanen, T. Karkkainen, J. Greifenberg, and J. Ott, Searching for Content in Mobile DTNs, Proc. IEEE Int l Conf. Pervasive Computing and Comm. (PERCOM 09), pp. 1-10, 2009. [6] J. Hightower, S. Consolvo, A. Lamarca, I. Smith, and J. Hughes, Learning and Recognizing the Places We Go, Proc. Seventh Int l Conf. Ubiquitous Computing, pp. 159-176, 2005. [7] M.B. Kjaergaard, J. Langdal, T. Godsk, and T. Toftkjaer, Entracked: Energy-Efficient Robust Position Tracking for Mobile Devices, Proc. ACM MobiSys, pp. 221-234, 2009. [8] I. Constandache, S. Gaonkar, M. Sayler, R.R. Choudhury, and O. Cox, Enloc: Energy-Efficient Localization for Mobile Phones, Proc. IEEE INFOCOM, pp. 2716-2720, 2009. 56

[9] Bo Han, Aravind Srinivasan, ediscovery: Energy Efficient Device Discovery for Mobile Opportunistic Communications 978-1-4673-2447-2/12/$31.00c 2012 IEEE [10] V. Cerf, S. Burleigh, A. Hooke, L. Torgerson, R. Durst, K. Scott, K. Fall, and H. Weiss, Delay-Tolerant Network Architecture, RFC4838, Jan. 2007. [11] A. Sharma, V. Navda, R. Ramjee, V. N. Padmanabhan, and E. M. Belding. Cool-Tether: Energy Efficient On-the-fly WiFi Hot-spots using Mobile Phones. In Proceedings of CoNEXT 2009, pages 109 120, Dec. 2009. [12] J. Hightower, S. Consolvo, A. Lamarca, I. Smith, and J. Hughes, Learning and Recognizing the Places We Go, Proc. Seventh Int l Conf. Ubiquitous Computing, pp. 159-176, 2005. [13] C. Drula, C. Amza, F. Rousseau, and A. Duda. Adaptive Energy Conserving Algorithms for Neighbor Discovery in Opportunistic Bluetooth Networks. IEEE Journal on Selected Areas incommunications, 25(1):96 107, Jan. 2007. AUTHORS: First Author: Popuri Srinivasarao received the B.Tech degree in IT and pursuing M.Tech degree in CSE from E.V.Mcollegeofengg&tech,Narasaraopet. His area of interests includes mobile computing Second Author: Yalavarthi Leelakrishna is now working as Assistant Professor in the department of CSE in E.V.Mcollegeofengg&tech,Narasaraopet, Andhra Pradesh, India since Jun 2008. His research interests include mobile computing. [14] R. Friedman, A. Kogan, and Y. Krivolapov. On Power and Throughput Tradeoffs of WiFi and Bluetooth in Smartphones. In Proceedings of INFOCOM 2011, pages 900 908, Apr. 2011. 57