Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Ranjith Pulyala
DOI Link: https://doi.org/10.22214/ijraset.2022.41305
Certificate: View Certificate
Wireless mesh networks (WMNs) have emerged as a key technology for next-generation wireless networking. Because of their advantages over other wireless networks, WMNs are undergoing rapid progress and inspiring numerous applications. In multi-hop wireless mesh networks (WMNs) experience frequent link failures caused by channel interference, dynamic obstacles and/or applications’ bandwidth demands. These failures cause severe performance degradation in WMNs or require expensive, manual network management for their real-time recovery. This paper presents an Autonomous network Reconfiguration System (ARS) that enables a multi-radio WMN to autonomously recover from local link failures to preserve network performance. ARS also improves channel efficiency by more than 90% over the other recovery methods. During their lifetime, multi-hop wireless mesh networks (WMNs) experience frequent link failures caused by channel interference, dynamic obstacles, and/or applications’ bandwidth demands. These failures cause severe performance degradation in WMNs or require expensive manual network management for their real-time recovery. By using channel and radio diversities in WMNs, ARS generates necessary changes in local radio and channel assignments in order to recover from failures. Next, based on the thus-generated configuration changes, the system cooperatively reconfigures network settings among local mesh routers. ARS has been evaluated extensively through ns2-based simulation. Our evaluation results show that ARS outperforms existing failure-recovery schemes in improving channel-efficiency by more than 90% and in the ability of meeting the applications’ bandwidth demands by an average of 200%.
I. INTRODUCTION
Wireless networks provide unprecedented freedom and mobility for a growing number of laptop and PDA users who no longer need wires to stay connected with their workplace and the Internet. Ironically, the very devices that provide wireless service to these clients need lots of wiring themselves to connect to private networks and the Internet. This white paper presents a viable alternative to all those wires - the wireless mesh network. Unlike basic Wi-Fi that simply untethers the client; the wireless mesh untethers the network itself giving IT departments, network architects and systems integrators unprecedented freedom and flexibility to build out networks in record time - with high performance and without the expensive cabling.
A wireless mesh network (WMN) is a communications network made up of radio nodes organized in a mesh topology. Wireless mesh networks often consist of mesh clients, mesh routers and gateways. The mesh clients are often laptops, cell phones and other wireless devices while the mesh routers forward traffic to and from the gateways which may but need not connect to the Internet. The coverage area of the radio nodes working as a single network is sometimes called a mesh cloud. Access to this mesh cloud is dependent on the radio nodes working in harmony with each other to create a radio network. A mesh network is reliable and offers redundancy. When one node can no longer operate, the rest of the nodes can still communicate with each other, directly or through one or more intermediate nodes. The animation below illustrates how wireless mesh networks can self-form and selfheal. Wireless mesh networks can be implemented with various wireless technology including 802.11, 802.15, 802.16, cellular technologies or combinations of more than one type. A wireless mesh network can be seen as a special type of wireless ad-hoc network. A wireless mesh network often has a more planned configuration, and may be deployed to provide dynamic and cost effective connectivity over a certain geographic area. An ad-hoc network, on the other hand, is formed ad hoc when wireless devices come within communication range of each other. The mesh routers may be mobile, and be moved according to specific demands arising in the network. Often the mesh routers are not limited in terms of resources compared to other nodes in the network and thus can be exploited to perform more resource intensive functions. In this way, the wireless mesh network differs from an ad-hoc network, since these nodes are often constrained by resources. Nodes are comprised of mesh routers and mesh clients. Each node operates not only as a host but also as a router, forwarding packets on behalf of other nodes that may not be within direct wireless transmission range of their destinations.
A WMN is dynamically self-organized and self-configured, with the nodes in the network automatically establishing and maintaining mesh connectivity among themselves. Extend the range and link robustness of existing Wi-Fi’s by allowing mesh-style multi-hopping. A user finds a nearby user and hops through it - or possibly multiple users - to get to the destination Every user becomes a relay point or router for network traffic Mesh networks consist of multiple wireless devices equipped with COTS802.11 a/b/g cards that work in ad-hoc fashion 802.11 capable antennas placed on rooftops allow a large area coverage.
A. Basic Idea
To meet the increasing capacity demands by the widely for a variety of applications, Such as public safety, environment monitoring, and citywide wireless Internet services and other emerging applications. However, due to heterogeneous and fluctuating wireless link conditions preserving the required performance of such WMNs is still a challenging problem. For example, some links of a WMN may experience significant channel interference from other coexisting wireless networks. Some parts of networks might not be able to meet increasing bandwidth demands from new mobile users and applications. Links in a certain area (e.g., a hospital or police station) might not be able to use some frequency channels because of spectrum etiquette or regulation .Even though many solutions for WMNs to recover from wireless link failures have been proposed, they still have several limitations.
To overcome the limitations, Autonomous network reconfiguration system (ARS) is used, that allows a multi radio WMN (mr-WMN) to autonomously reconfigure its local network settings channel, radio, and route assignment for real-time recovery from link failures. In its core, ARS is equipped with a reconfiguration planning algorithm that identifies local configuration changes for the recovery while minimizing changes of healthy network settings. Briefly, ARS first searches for feasible local configuration hanges available around a faulty area, based on current channel and radio associations. Then, by imposing current network settings as constraints, ARS identifies reconfiguration plans that require the minimum number of changes for the healthy network settings.
B. Motivation
Maintaining the performance of WMNs in the face of dynamic link failures remains a challenging problem. However, such failures can be withstood (hence maintaining the required performance) by enabling mr-WMNs to autonomously reconfigure channels and radio1 assignments, as in the following examples.
II. WIRELESS MESH NETWORKS
A. Wired Vs Wireless Networks
B. Types of Wireless Networks
One of the unique features of wireless networks is compare to wire network is that data is transmitted from one point to another through wireless links i.e. there is no need of wired link between the two nodes for transmission. They just need to be in the transmission range of each other. Wireless networks or divided into two categories. Infrastructure wireless network and infrastructure less or ad hoc wireless network.
C. TCP Working Mechanism And Variants Of TCP
Transmission Control Protocol (TCP) is a Transport Layer Protocol and originally designed for wired network in 1981. The basic responsibility of TCP is to provide reliable transfer of data between the nodes i.e. to ensure that the data is reached the destination correctly without any loss or damage. The data is transmitted in the form of continuous stream of octets. The mechanism is adopted to assign a sequence number to each octet of data and receiver respond with positive acknowledgement to ensure that the data is received correctly. Another aspect of TCP is the tree way handshakes mechanism to establish a connection between the end points (nodes). In case if there are two or more TCP connection between the end points for this TCP uses the port assignment mechanism to differentiate each connection from others.
a. Slow start
b. Congestion Avoidance
c. Fast Retransmit
D. Problems in Wireless Communications
Some of the problems related to wireless communication are multipath propagation, path loss, interference, and limited frequency spectrum. Multipath Propagation is, when a signal travels from its source to destination, in between there are obstacles which make the signal propagate in paths beyond the direct line of sight due to re?ections, refraction and di?raction and scattering. Path loss is the attenuation of the transmitted signal strength as it propagates away from the sender. Path loss can be determined as the ratio between the powers of the transmitted signal to the receiver signal.
This is mainly dependent on a number of factors such as radio frequency and the nature of the terrain. It is sometimes important to estimate the path loss in wireless communication networks.
Due to the radio frequency and the nature of the terrain are not same everywhere, it is hard to estimate the path loss during communication. During communication a number of signals in the atmosphere may interfere with each other resulting in the destruction of the original signal. Limited Frequency Spectrum is where, frequency bands are shared by many wireless technologies and not by one single wireless technology.
Wireless mesh networks (WMNS) are being developed actively and deployed widely for a variety of applications, such as public safety, environment monitoring, and citywide wireless Internet services. They have also been evolving in various forms (e.g., using multi radio/channel systems) to meet the increasing capacity demands by the above-mentioned and other emerging applications. However, due to heterogeneous and fluctuating wireless link conditions, preserving the required performance of such WMNs is still a challenging problem. For example, some links of a WMN may experience significant channel interference from other coexisting wireless networks. Some parts of networks might not be able to meet increasing bandwidth demands from new mobile users and applications. Links in a certain area (e.g., a hospital or police station) might not be able to use some frequency channels because of spectrum etiquette or regulation
Even though many solutions for WMNs to recover from wireless link failures have been proposed, they still have several limitations.
E. Network Architectures
Wireless mesh architecture is a first step towards providing cost effective and dynamic high-bandwidth networks over a specific coverage area. Wireless mesh architectures infrastructure is, in effect, a router network minus the cabling between nodes. It's built of peer radio devices that don't have to be cabled to a wired port like traditional WLAN access points (AP) do. Mesh architecture sustains signal strength by breaking long distances into a series of shorter hops. Intermediate nodes not only boost the signal, but cooperatively make forwarding decisions based on their knowledge of the network, i.e. perform routing. Such architecture may with careful design provide high bandwidth, spectral efficiency, and economic advantage over the coverage area. Wireless mesh networks have a relatively stable topology except for the occasional failure of nodes or addition of new nodes. The path of traffic, being aggregated from a large number of end users, changes infrequently. Practically all the traffic in an infrastructure mesh network is either forwarded to or from a gateway, while in ad hoc networks or client mesh networks the traffic flows between arbitrary pairs of nodes.
There are different types of wireless networks are being used across for various communications. They are
Infrastructure networks contain special nodes called access points (APs), which are connected via existing networks. APs are special in the sense that they can interact with wireless nodes as well as with the existing wired network. The other wireless nodes, also known as mobile stations (STAs), communicate via APs. The APs also act as bridges with other networks.
2. Hybrid WMNs: This architecture is the combination of infrastructure and client meshing.. Mesh clients can access the network through mesh routers as well as directly meshing with other mesh clients. While the infrastructure provides connectivity to other networks such as the Internet, Wi-Fi, Wi-MAX, cellular, and sensor networks, the routing capabilities of clients provide improved connectivity and coverage inside WMNs. The characteristics of WMNs are outlined below, where the hybrid architecture is considered for WMNs, since it comprises all the advantages of WMNs
Therefore, WMNs diversify the capabilities of ad-hoc networks instead of simply being another type of ad hoc network. These additional capabilities necessitate new algorithms and design principles for the realization of WMNs.
F. ARS Architecture
G. Routing Layer
Despite the availability of many routing protocols for ad hoc networks, the design of routing protocols for WMNs is still an active research area. We believe that an optimal routing protocol for WMNs must capture the following features:
H. Network Management
Many management functions are needed to maintain the appropriate operation of WMNs.
I. Dynamic Path Maintenance
The required QoS is ensured during the time when an established path remains unbroken. The QoS provision, however, is disrupted during the rerouting time. We want to be restrictive on the type of networks studied in this paper. Our routing algorithm works well when the average life time of an established path is much longer (such as an order of magnitude longer) than the average rerouting time. In such a case, the required QoS is ensured in most of the connection’s lifetime. There are numerous examples of such mobile networks. For instance, a group of soldiers stays in their bunkers and communicates with each other; a group of warships moves into a formation in which the relative positions of the ships are maintained. In this paper, we shall only consider the type of networks whose topologies are relatively stable because our routing-rerouting architecture does not support ad hoc networks with violently changing topologies.
3. Path Repairing: Dynamic path-repairing repairs the routing path at the breaking point, shifts the data traffic to a neighbor node, and reconfigures the path around the breaking point without rerouting the connection along a completely new path. The routing path is broken after moves out of the transmission range of, Instead of sending a path-breaking message to the source, tries to repair the path by broadcasting a repair-requesting message to the current neighbors asking if any of them are able to take over the job of, upon receipt of the message, the neighbors that have links to reply their resource availabilities to, Based on the received information, finds that has sufficient resources for that role. It adds link to the routing path and then sends a path-repairing message to upon receipt of the path repairing message, reserves the required resources and adds link to the routing path. In order to do path repairing, the connection table at must be extended to store the successive node’s successive node. The repair requesting message sent by to its neighbors contains. Every neighbor sends back a reply message, including at least a Boolean field telling whether it has a link to , If it does, the message also contains bandwidth (or delay), in addition to other information such as cost . In the case of bandwidth-constrained routing, when receives a reply message from a neighbor node, it checks whether both bandwidth and bandwidth are satisfied, where is the bandwidth requirement. If so, sends a path-repairing message to in order to reestablish the broken routing path through, If multiple neighbors satisfy the requirement, the one which minimizes cost is selected. If none of the neighbors satisfies the requirement, a path-breaking message is sent to the source for rerouting.
III. SYSTEM ANALYSIS, DESIGN AND DEVOLOPMENT
A. Existing System
WIRELESS mesh networks (WMNs) are being developed actively and deployed widely for a variety of applications, such as public safety, environment monitoring, and citywide wireless Internet services. They have also been evolving in various forms (e.g., using multi radio/channel systems to meet the increasing capacity demands by the above-mentioned and other emerging applications.
B. System Design and Development
Fact Finding is the methods of gathering the information required about the existing system. Some of them are as follows.
Observation of the current work situation will provide clues to problems and atmosphere.
Record searching, special purpose records and sampling will give quantitative information about the system which facilitates sizing of the proposed system and may also point the areas of difficulties which are being experienced.
Questionnaires can be used to collect the quantifiable data about the system. All of the techniques need to be supplemented by more detailed discussion of the interview situation. The identification of the user requirements, decision areas, objectives. And responsibilities for certain procedures can only be achieved for interviewing.
Based on the above fact finding techniques, it is observed the current situation of the existing system. It is very helpful to finding the areas of difficulties, which are being experienced in the existing system. Thus it helps to develop the proposed system with the quantifiable data.
2. Input Design
Input Design is part of overall system design, which requires very careful attention. If the data going into the system is incorrect then the processing and output will magnify these errors.
The inputs in the system are of three types:
The above input types enrich the proposed system with numerous facilities that make it more advantageous in comparison with the exiting normal system. All the inputs entered are completely raw, initially, before being entered into a database, each of them available processing. The input format in this system has been designed with the following objectives in mind.
C. Feasibility Analysis
All projects are feasible, given unlimited resources and infinite time. Before going further in to the steps of software development, the system analyst has to analyze whether the proposed system will be feasible for the organization and must identify the customer needs. The main purpose of feasibility study is to determine whether the problem is worth solving. The success of a system is also lies in the amount of feasibility study done on it. Many feasibility studies have to be done on any system. But there are three main feasibility tests to be performed.
They are
System design is process of planning a new system to document or altogether replace the old system. The purpose of the design phase is to plan a solution for the problem. The phase is the first step in moving from the problem domain to the solution domain. The design of the system is the critical aspect that affects the quality of the software. System design is also called top-level design. The design phase translates the logical aspects of the system into physical aspects of the system.
IV. PROJECT DESCRIPTION
Wireless mesh networks have the potential to deliver Internet broadband access, wireless local area network coverage and network connectivity for stationary or mobile hosts at low costs both for network operators and customers. The core technology involves a network of wireless routers relaying each others’ packets in a multihop fashion. Many variations on targeted applications and implementation choices offer different opportunities to emerging companies in this emerging area.
These independent wireless mesh networks bring many advantages to challenging outdoor communications environments that have traditionally been difficult to cover. Quick and easy to install over a wide geographic area while offering the flexibility to be deployed in any outdoor location, wireless mesh networks are an ideal communications solution for public safety, construction, transportation, mining and other industrial applications.
A. Modules
a. AODV initiates a route discovery process using Route Request (RREQ) and Route Reply (RREP).
b. The source node will create a RREQ packet
c. The broadcast ID is incremented each time the source node initiates RREQ.
d. The requests are sent using RREQ message and the information in connection with creation of a route is sent back in RREP message.
e. The source node broadcasts the RREQ packet to its neighbors’ and then sets a timer to wait for a reply
f. Basically, a lifetime is associated with the reverse route entry and if this entry is not used within this lifetime, the route information is deleted.
g. If the RREQ is lost during transmission, the source node is allowed to broadcast again using route discovery mechanism.
2. Link-Failure Detection: ARS in every mesh node monitors the quality of its outgoing wireless links at every tm (e.g., 10 sec) and reports the results to a gateway via a management message. Second, once it detects a link failure(s), ARS in the detector node(s) triggers the formation of a group among local mesh routers that use a faulty channel, and one of the group members is elected as a leader and coordinating the reconfiguration.
Three types of failures:
a. Self failure
b. Path failure
c. Link failure
In self failure, the node itself has failed due to a crash, re-boot, bug in software code, or connectivity issue. In path failure, a node along the path fails, causing other nodes to fail or there are collisions along the path. In sink (i.e., base station) failure, the whole network appears to be failing when it is the sink that has failed. Failure at the sink may be due to bad sink placement, changes in the environment after deployment, and connectivity issues.
Automated link failure and Interference Detection Avoidance (AIDA) module determines when it is advantageous to change channels for any AP or backhaul radio that experiences high levels of RF interference. The AIDA module monitors all channels, including unused channels, in order to perform this service.
3. Route Recovery: A network is assumed to consist of mesh nodes, IEEE 802.11-based wireless links, and one control gateway. Each mesh node is equipped with n radios, and each radio’s channel and link assignments are initially made by using global channel/link assignment algorithms.
a. Route recovery scheme in ad hoc networks to reduce the time delay and control overhead in the route recovery process.
b. Maintaining connectivity with the sink node is a crucial issue to collect data from sensors without any interruption. While sensors are typically deployed in abundance to tolerate possible node failures, a large number of such failures within the same region simultaneously may result in losing the connectivity with the sink node which eventually reduces the quality and efficiency of the network operation.
c. The idea of this distributed heuristic is based on maintaining the route information at each node to the sink and then utilizing such information for the relocation of the sensors.
d. Route recovery scheme to solve the link failure problem caused by node movement, packet collision or bad channel condition. Since it considers a backup node mobility and conduct route recovery implicitly, it can support fast route recovery and then provide reliable and stable route for routing protocols.
4. Leader Node: The leader node sends a planning-request message to a gateway. If any link is failure group members send request to the particular leader after that the leader node send request to the gateway.
5. Network Planner: It generates reconfiguration plans only in a gateway node. Network planner plans the diversity path for avoiding the faulty links. Then, the gateway synchronizes the planning requests—if there are multiples requests—and generates a reconfiguration plan for the request. Fourth, the gateway sends a reconfiguration plan to the leader node and the group members. Finally, all nodes in the group execute the corresponding configuration changes, if any, and resolve the group.
6. Autonomous Reconfiguration System: A reconfiguration plan is defined as a set of links’ configuration changes necessary for a network to recover from a link failure on a channel, and there are usually multiple reconfiguration plans for each link failure. ARS systematically generates reconfiguration plans that localize network changes by dividing the reconfiguration planning into three processes feasibility, QoS satisfiability, and optimality—and applying different levels of constraints. ARS first applies connectivity constraints to generate a set of feasible reconfiguration plans that enumerate feasible channel, link, and route changes around the faulty areas, given connectivity and link-failure constraints. Then, within the set, ARS applies strict constraints (i.e., QoS and network utilization) to identify a reconfiguration plan that satisfies the QoS demands and that improves network utilization most.
B. Wireless Mesh Networks with ARS System
WIRELESS mesh networks (WMNs) are being developed actively and deployed widely for a variety of applications, such as public safety, environment monitoring, and citywide wireless Internet services. First, resource-allocation algorithms can provide (theoretical) guidelines for initial network resource planning. However, even though their approach provides a comprehensive and optimal network configuration plan, they often require “global” configuration changes, which are undesirable in case of frequent local link failures. Next, a greedy channel-assignment algorithm can reduce the requirement of network changes by changing settings of only the faulty link(s). However, this greedy change might not be able to realize full improvements, which can only be achieved by considering configurations of neighbouring mesh routers in addition to the faulty link(s). Third, fault-tolerant routing protocols, such as local rerouting or multipath routing, can be adopted to use network-level path diversity for avoiding the faulty links. However, they rely on detour paths or redundant transmissions, which may require more network resources than link-level network reconfiguration. To overcome the above limitations, we propose an autonomous network reconfiguration system (ARS) that allows a multi-radio WMN to autonomously reconfigure its local network settings—channel, radio, and route assignment— for real-time recovery from link failures. In its core, ARS is equipped with a reconfiguration planning algorithm that identifies local configuration changes for the recovery while minimizing changes of healthy network settings. Briefly, ARS first searches for feasible local configuration changes available around a faulty area, based on current channel and radio associations. Then, by imposing current network settings as constraints, ARS identifies reconfiguration plans that require the minimum number of changes for the healthy network settings. ARS also includes a monitoring protocol that enables a WMN to perform real-time failure recovery in conjunction with the planning algorithm. The accurate link-quality information from the monitoring protocol is used to identify network changes that satisfy applications’ new QoS demands or that avoid propagation of QoS failures to neighbouring links (or “ripple effects”). Running in every mesh node, the monitoring protocol periodically measures wireless link conditions via a hybrid link-quality measurement technique,. Based on the measurement information, ARS detects link failures and/or generates QoS-aware network reconfiguration plans upon detection of a link failure.
D. Complexity of ARS
ARS incurs reasonable bandwidth and computation overheads. First, the network monitoring part in the reconfiguration protocols is made highly efficient by exploiting existing data traffic and consumes less than 12 kb/s probing bandwidth (i.e., one packet per second) for each radio. In addition, the group formation requires only message overhead (in forming a spanning tree), where the number of nodes in the group. Next, the computational overhead in ARS mainly stems from the planning algorithms. Specifically, generating its possible link plans incurs complexity, where the number of available channels and the number of radios. Next, a gateway node needs to generate and evaluate feasible plans, which incurs search overhead in a constraint graph that consists of nodes, where the number of links that use a faulty channel in the group.
V. SOFTWARE REQUIREMENTS AND FEATURES
A. Software Requirements
Tools: Network Simulator version-2
Os : Linux
Front End : TCL (Tool Command Language)
Back End : C++
1.3 Technology Used
Network Simulator-2
B. NS Features
? NS is an object oriented discrete event simulator
– Simulator maintains list of events and executes one event after another
– Single thread of control: no locking or race conditions
? Back end is C++ event scheduler
– Protocols mostly
– Fast to run, more control
? Front end is OTCL
– Creating scenarios, extensions to C++ protocols
– Fast to write and change
C. NS Programming Structure
7. Event Scheduler
In this Event scheduler while we processing many data’s at a time it will process one by one (i.e.) FIFO concept, so there is no congestion while transferring the packets.
8. Packets
It is the collection of data, whether header is called or not all header files where present in the stack registers.
9. Turn On Tracing
Trace packets on individual link Trace file format
10. Create Network Topology (Physical Layer)
The Physical Layer is the first and lowest layer in the seven-layer OSI model of computer networking. The implementation of this layer is often termed PHY. The Physical Layer consists of the basic hardware transmission technologies of a network. It is a fundamental layer underlying the logical data structures of the higher level functions in a network. Due to the plethora of available hardware technologies with widely varying characteristics, this is perhaps the most complex layer in the OSI architecture.
The Physical Layer defines the means of transmitting raw bits rather than logical data packets over a physical link connecting networking nodes. The bit stream may be grouped into code words or symbols and converted to a physical that is transmitted over hardware.
11. Transport Connection (Transport Layer)
Transport layers are contained in both the TCP/IP which is the foundation of the INTERNET and the OSI model of general networking. The definitions of the Transport Layer are slightly different in these two models. This article primarily refers to the TCP/IP model, in which TCP is largely for a convenient application programming interface to internet hosts, as opposed to the OSI model of definition interface. The most well-known transport protocol is the (TCP). It lent its name to the title of the entire internet protocol suite TCP/IP. It is used for connection-oriented transmissions, whereas the connectionless user datagram suite (UDP) is used for simpler messaging transmissions. TCP is the more complex protocol, due to its stateful design incorporating reliable transmission and data stream services.
12. Generate Traffic (Application Layer)
In TCP/IP, the Application Layer contains all protocols and methods that fall into the realm of process-to-process communications via an Internet Protocol (IP) network using the Transport layer protocols to establish underlying host-to-host connections.
In the OSI model, the definition of its Application Layer is narrower in scope, explicitly distinguishing additional functionality above the Transport Layer at two additional levels: session layer and presentation layer OSI specifies strict modular separation of functionality at these layers and provides protocol for each layer.
13. Insert Errors
Start debugging of errors
D. Creating the Topology
#create a new simulator object
set ns [new Simulator]
#open the nam trace file
set nf [open out.nam w]
$ns namtrace-all $nf
#define a 'finish' procedure
proc finish {} {
global ns nf
$ns flush-trace
#close the trace file
close $nf
#execute nam on the trace file
exec nam out.nam &
exit 0
}
E. Motivation for Simulations
VI. SYSTEM TESTING AND OUTPUT DESIGN
A. Black Box Testing
Black box testing also called behavioural testing focuses on the functional requirements of the software. That is black box testing enables the software engineer to derive sets of input conditions that will fully exercise all functional requirements for a program. Black box testing attempts to find errors in the following categories. Incorrect or missing functions. Interface errors. Errors in data structures or external data base access Behaviour or performance errors. Initialization and termination errors.
Functional Testing and black box type testing geared to functional requirements of an application. This type of testing should be done by testers. Our project does the functional testing of what input given and what output should be obtained.
System Testing-black box type testing that is based on overall requirements specifications; covers all combined parts of a system. The system testing to be done here is that to check with all the peripherals used in the project.
Stress Testing-term often used interchangeably with ‘load’ and ‘performance’ testing. Also used to describe such tests as system functional testing while under unusually heavy loads, heavy repletion of certain actions or inputs, input of large numerical values.
Performance Testing-term often used interchangeably with ‘stresses’ and ‘load’ testing. Ideally ‘performance’ testing is defined in requirements documentation or QA or Test Plans.
B. White Box Testing
White box testing sometimes called glass box testing is a test case design method that uses the control structure of the procedural design to derive test cases. Using white box testing methods, the software engineer can derive test cases that guarantee that all independent paths within a module have been exercised at least once. Exercise all logical decisions on their true and false sides. Execute all loops at their boundaries and within their operational bounds. Exercise internal data structures to ensure their validity
C. Unit Testing
The most ‘micro’ scale of testing to test particular functions or code modules. Typically, it is done by the programmer and not by tester, as it requires detailed knowledge of the internal program design and code. Not always easily done unless the application has a well designed architecture with tight code; may require developing test modules or test harnesses.
D. Quality Assurance
Software Quality Assurance involves the entire software development process-monitoring and improving the process, making sure that any agreed-upon standards and procedures are followed, and ensuring that problems are found and dealt with. It is oriented to ‘prevention’.
E. Software Life Cycle
The life cycle begins when an application is first conceived and ends when it is no longer in use. It includes aspects such as initial concept, requirements analysis, functional design, internal design, documentation planning, test planning, coding, document preparation, integration, testing, maintenance, updates, retesting, phase-out, and other aspects.
F. Verification and Validation
Verification refers to the set of activities that ensure that software correctly implements a specific function. Validation refers to a different set of activities that ensures that the software has been built is traceable to customer requirements.
Verification and validation encompasses a wide array of SQA activities that include formal technical reviews, quality and configuration audits, performance monitoring, simulation, feasibility study, documentation review, database review, algorithm analysis, development testing, qualification testing and installation testing.
G. System Implementation
System implementation is a stage in a stage in the project where the where the theoretical designs turned into working system.The most crucial stage the user confidence that the new system will work effectively and efficiently.
The performance of reliability of the system was tested and it gained acceptance. The system was implemented successfully. Implementation is a process that means converting a new system into operation.
Proper implementation is essential to provide a reliable system to meet organization requirements. During the implementation stage a live demon was undertaken and and made in front of end-users.
Implementation is a stage of project when the system design is turned into a working system. The stage consists of the following steps.
H. Output Design
Intelligent output design will improve systems relationships with the user and help in decision making. Outputs are also used to provide a permanent hardcopy of the results for latter consultations. The most important reason, which tempts the user to go for a new system is the output. The output generated by the system is often regarded as the criterion for evaluating the usefulness for the system. Here the output requirements use to be predetermined before going to the actual system design.
The output design is based on the following:
I. Critical Design Factors
Increase capacity and flexibility of wireless systems in recent years. Typical examples include directional and smart antennas, multiple input multiple output (MIMO) systems, and multi-radio/multi-channel systems. To further improve the performance of a wireless radio and control by higher layer protocols, more advanced radio technologies, such as reconfigurable radios, frequency agile/cognitive radios, and even software radios, have been used for wireless communication. Although these radio technologies are still in their infancy, they are expected to be the future platform for wireless networks due to their dynamic control capability. These advanced wireless radio technologies all require a revolutionary design in higher-layer protocols, especially MAC and routing protocols. Scalability. Scalability is a critical requirement of WMNs. Without support of this feature, the network performance degrades significantly as the network size increases. For example, routing protocols may not be able to find a reliable routing path, transport protocols may lose connections, and MAC protocols may experience significant throughput reduction. To ensure the scalability in WMNs, all protocols from the MAC layer to the application layer need to be scalable. Mesh Connectivity. Many advantages of WMNs originate from mesh connectivity. To ensure reliable mesh connectivity, network self-organization and topology control algorithms are needed.
Topology-aware MAC and routing protocols can significantly improve the performance of WMNs. Broadband and QoS. Different from classical ad hoc networks, most applications of WMNs are broadband services with heterogeneous QoS requirements. Thus, in addition to end-to-end transmission delay and fairness, more performance metrics, such as delay jitter, aggregate and per-node through- put, and packet loss ratios, must be considered by communication protocols.
Security. Although many security schemes have been proposed for wireless LANs in recent years, they are still not fully applicable for WMNs. For instance, there is no centralized trusted authority to distribute a public key in a WMN due to the distributed system architecture.
The existing security schemes proposed for ad hoc networks can be adopted for WMNs. However, most of the security solutions for ad hoc networks are still not mature enough to be implemented practically. Moreover, the different network architectures between WMNs and ad hoc networks usually render a solution for ad hoc networks ineffective in WMNs. Ease of Use. Protocols must be designed to enable the network to be as autonomous as possible. In addition, network management tools need to be developed to efficiently maintain the operation, monitor the performance, and configure the parameters of WMNs. These tools, together with the autonomous mechanisms in networking protocols, enable rapid deployment of WMNs. Compatibility and Inter-operability. In WMNs it is a default requirement to support network access for both conventional and mesh clients. Therefore, WMNs need to be backward compatible with conventional client nodes. This demands that mesh routers need to be capable of integrating heterogeneous wireless networks.
J. Simulation Models and Methods
ns-2 is used in our simulation study. Throughout the simulation, we use a grid topology with 25 nodes in an area of 1 x1 km .In the topology, adjacent nodes are separated by 180 m, and each node is equipped with a different number of radios, depending on its proximity to a gateway. The gateway is equipped with four radios, one-hop away nodes from a gateway have three radios, and other nodes have two radios. For each node in this topology, we use the following network protocol stacks. First, the shadowing propagation model is used to simulate varying channel quality and multipath effects. Next, CMU 802.11 wireless extension is used for the MAC protocol with a fixed data rate (i.e., 11 Mb/s) and is further modified to support multiple radios and multiple channels. Finally, a link-state routing protocol, a modification of DSDV, and multi radio-aware routing metric (WCETT ) are implemented and used for routing. In these settings, ARS is implemented as an agent in both the MAC layer and a routing protocol as explained in earlier chapters. It periodically collects channel information from MAC and requests channel switching or link-association changes based on its decision. At the same time, it informs the routing protocol of network failures or a routing table update.
K. Simulation Results
For the purpose of performance analysis, NAM trace files are written and graphs are plotted using XGRAPH. The simulator can produce both the visualization trace (Nam) as well as an ASCII file trace corresponding to the events registered at the network. In the trace file the number of packets sent, received and lost is noted down.
Graphs are drawn to compare the performance of the existing system with that of proposed one. The throughput, packet delivery ratio, average end-to-end delay and total dropped packets are calculated based on the parameters from the trace file.
Impact of the reconfiguration range is evaluated. As we increase the hop count from a faulty links, the capacity improvement achieved by the reconfiguration plans is measured. In addition, capacity gain plans that satisfy applications’ QoS constraints are calculated, admitting up to two times more flows than static assignment, through QoS aware planning. Next, ARS’s online reconfigurability allows for real-time failure detection and network reconfiguration, thus improving channel efficiency by 92% and improves network throughput and channel efficiency by more than 26%. Our experimental evaluation on a Linux-based implementation and ns2-based simulation have demonstrated the effectiveness of ARS in recovering from local link-failures and in satisfying applications’ diverse QoS demands.
L. Output NAM Window
2. Finding shortest path
3. Failure detection and reconfiguration
4. X GRAPH
Throughput comparison
5. Packet delivery ratio
6. Efficiency
VII. FUTURE SCOPE
An autonomous network reconfiguration system (ARS) that enables a multi-radio WMN to autonomously recover from wireless link failures. ARS generates an effective reconfiguration plan that requires only local network configuration changes by exploiting channel, radio, and path diversity. Furthermore, ARS effectively identifies reconfiguration plans that satisfy applications’ QoS constraints, admitting up to two times more flows than static assignment, through QoS aware planning. Next, ARS’s online reconfigurability allows for real-time failure detection and network reconfiguration. Based on existing MAC, routing, and transport protocols, network performance is not scalable with either the number of nodes or the number of hops in the network. This problem can be alleviated by increasing the network capacity through using multiple channels/radios per node or developing wireless radios with higher transmission speed. However, these approaches do not truly enhance the scalability of WMNs, because resource utilization is not actually improved. Therefore, in order to achieve scalability, it is essential to develop new MAC, routing, and transport protocols for WMNs.
[1] Akyildiz, X. Wang, and W. Wang, “Wireless mesh networks: A survey,” Comput. Netw., vol. 47, no. 4, pp. 445–487, Mar. 2005. [2] “MIT Roofnet,” [Online]. Available: http://www.pdos.lcs.mit.edu/ roofnet [3] Motorola, Inc., “Motorola, Inc., mesh broadband,” Schaumburg, IL [Online]. Available: http://www.motorola.com/mesh [4] P. Kyasanur and N. Vaidya, “Capacity of multi-channel wireless networks:Impact of number of channels and interfaces,” in Proc. ACM MobiCom, Cologne, Germany, Aug. 2005, pp. 43–57. [5] K. Ramanchandran, E. Belding-Royer, and M. Buddhikot, “Interference- aware channel assignment in multi-radio wireless mesh networks,” in Proc. IEEE INFOCOM, Barcelona, Spain, Apr. 2006, pp. 1–12. [6] R. Draves, J. Padhye, and B. Zill, “Routing in multi-radio, multi-hop wireless mesh networks,” in Proc. ACM MobiCom, Philadelphia, PA, Sep. 2004, pp. 114–128. [7] P. Bahl, R. Chandra, and J. Dunagan, “SSCH: Slotted seeded channel hopping for capacity improvement in IEEE 802.11 ad-hoc wireless networks,” in Proc. ACM MobiCom, Philadelphia, PA, Sep. 2004, pp. 216–230. [8] D. Aguayo, J. Bicket, S. Biswas, G. Judd, and R. Morris, “Link-level measurements from an 802.11b mesh network,” in Proc. ACM SIGCOMM, Portland, OR, Aug. 2004, pp. 121–132. [9] A. Akella, G. Judd, S. Seshan, and P. Steenkiste, “Self-management in chaotic wireless deployments,” in Proc. ACM MobiCom, Cologne, Germany, Sep. 2005, pp. 185–199. [10] J. Zhao, H. Zheng, and G.-H. Yang, “Distributed coordination in dynamic spectrum allocation networks,” in Proc. IEEE DySPAN, Baltimore, MD, Nov. 2005, pp. 259–268. [11] M. J. Marcus, “Real time spectrum markets and interruptible spectrum: New concepts of spectrum use enabled by cognitive radio,” in Proc. IEEE DySPAN, Baltimore, MD, Nov. 2005, pp. 512–517. [12] M. Alicherry, R. Bhatia, and L. Li, “Joint channel assignment and routing for throughput optimization in multi-radio wireless mesh networks,” in Proc. ACM MobiCom, Cologne, Germany, Aug. 2005, pp. 58–72. [13] M. Kodialam and T. Nandagopal, “Characterizing the capacity region in multi-radio multi-channel wireless mesh networks,” in Proc. ACM MobiCom, Cologne, Germany, Aug. 2005, pp. 73–87. [14] A. Brzezinski, G. Zussman, and E. Modiano, “Enabling distributed throughput maximization in wireless mesh networks: A partitioning approach,” in Proc. ACM MobiCom, Los Angeles, CA, Sep. 2006, pp. [15] A. Raniwala and T. Chiueh, “Architecture and algorithms for an IEEE 802.11-based multi-channel wireless mesh network,” in Proc. IEEE INFOCOM, Miami, FL, Mar. 2005, vol. 3, pp. 2223–2234. [16] S. Nelakuditi, S. Lee, Y. Yu, J. Wang, Z. Zhong, G. Lu, and Z. Zhang, “Blacklist-aided forwarding in static multihop wireless networks,” in Proc. IEEE SECON, Santa Clara, CA, Sep. 2005, pp. 252–262. [17] S. Chen and K. Nahrstedt, “Distributed quality-of-service routing in ad hoc networks,” IEEE J. Sel. Areas Commun., vol. 17, no. 8, pp. 1488–1505, Aug. 1999. [18] L. Qiu, P. Bahl, A. Rao, and L. Zhou, “Troubleshooting multi-hop wireless networks,” in Proc. ACM SIGMETRICS, Jun. 2005, pp. 380–381. [19] D.Kotz, C. Newport, R. S. Gray, J. Liu, Y.Yuan, and C. Elliott, “Experimental evaluation of wireless simulation assumptions,” Dept. Comput. Sci., Dartmouth College, Hanover, NH, Tech. Rep. TR2004-507, 2004. [20] T. Henderson, D.Kotz, and I. Abyzov, “The changing usage of amature campus-wide wireless network,” in Proc. ACM MobiCom, Philadelphia, PA, Sep. 2004, pp. 187–201. [21] M. Buddhikot, P. Kolodzy, S. Miller, K. Ryan, and J. Evans, “DIMSUMnet: New directions in wireless networking using coordinated dynamic spectrum access,” in Proc. IEEE WoWMOM, Naxos, Italy, Jun. 2005, pp. 78–85. [22] R. Braden, L. Zhang, S. Berson, S. Herzog, and S. Jamin, “Resource reservation protocol (RSVP),” Internet RFC 2205 (rfc2205.txt), Sep. 1997. [23] D. S. D. Couto, D. Aguayo, J. Bicket, and R. Morris, “A high-throughput path metric for multi-hop wireless routing,” in Proc. ACM MobiCom, San Diego, CA, Sep. 2003, pp. 134–146. [24] C. Perkins, E. Belding-Royer, and S. Das, “Ad-hoc on-demand distance vector routing,” Internet RFC 3561 (rfc3561.txt), Jul. 2003. [25] D. B. Johnson and D. A. Maltz, “Dynamic source routing in ad hoc wireless networks,” in The Book of Mobile Computing. Norwell, MA: Kluwer, 1996, vol. 353. [26] G. Holland, N. Vaidya, and P. Bahl, “A rate-adaptiveMAC protocol for multi-hop wireless networks,” in Proc. ACM MobiCom, Rome, Italy, Sep. 2001, pp. 236–251. [27] J. L. Gross and J. Yellen, Graph Theory and Its Applications, 2nd ed. London, U.K.: Chapman & Hall/CRC, 2006. [28] A. P. Subramanian, H. Gupta, S. R. Das, and J. Cao, “Minimum interference channel assignment in multiradio wireless mesh networks,” IEEE Trans. Mobile Comput., vol. 7, no. 12, pp. 1459–1473, Dec. 2008. [29] A. S. Tanenbaum and M. V. Steen, Distributed Systems. UpperSaddle River, NJ: Pearson Education, 2002. [30] Q. Xue and A. Ganz, “Ad hoc QoS on-demand routing (AQOR) in mobile ad hoc networks,” J. Parallel Distrib. Comput., vol. 63, no. 2, pp. 154–165, 2003. [31] K.-H. Kim and K. G. Shin, “On accurate and asymmetry-aware measurement of link quality in wireless mesh networks,” EEE/ACMTrans. Netw., vol. 17, no. 4, pp. 1172–1185, Aug. 2009. [32] “Netfilter,” [Online]. Available: http://www.netfilter.org [33] “MADWiFi,” Linx-Consulting, Reno, NV [Online]. Available: http:// www.madwifi.org [34] “Atheros Communications,” San Jose, CA [Online]. Available: http://www.atheros.com [35] “Soekris Engineering,” Santa Cruz, CA [Online]. Available: http://www.soekris.com [36] “Iperf network measurement tool,” [Online]. Available: http://code.google.com/p/iperf [37] “The network simulator—ns-2,” [Online]. Available: http://www.isiedu/nsnam/ns [38] T. S. Rappaport,Wireless Communications: Principles and Practice. Englewood Cliffs, NJ: Prentice-Hall, 2002. [39] C. Perkins and P. Bhagwat, “Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers,” in Proc. ACM SIGCOMM, London, U.K., Sep. 1994, pp. 234–244. [40] M. M. Carvalho and J. J. Garcia-Luna-Aceves, “A scalable model for channel access protocols in multihop ad hoc networks,” in Proc. ACM MobiCom, Philadelphia, PA, Sep. 2004, pp. 330–344. [41] M. M. Carvalho and J. J. Garcia-Luna-Aceves, “Delay analysis of IEEE 802.11 in single-hop networks,” in Proc. IEEE ICNP, Atlanta, GA, Nov. 2003, pp. 146–155. [42] G. Bianchi, “Performance analysis of the IEEE 802.11 distributed coordination function,” IEEE J. Sel. Areas Commun., vol. 18, no. 3, pp. 535–547, Mar. 2000. [43] H.Wu, X.Wang, Y. Liu, Q. Zhang, and Z.-L. Zhang, “SoftMAC: Layer 2.5 mac for VoIP spport in multi-hop wireless networks,” in Proc. IEEE SECON, Santa Clara, CA, Sep. 2005, pp. 441–451.
Copyright © 2022 Ranjith Pulyala. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET41305
Publish Date : 2022-04-08
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here