Professional Documents
Culture Documents
Node Failure Localization in Communication Networks Via Network Tomography
Node Failure Localization in Communication Networks Via Network Tomography
Node Failure Localization in Communication Networks Via Network Tomography
1. INTRODUCTION
1.1. INTRODUCTION
1.3. MOTIVATION
finding the base arrangement of fizzled hubs that maximum probable includes fizzled
hubs. Such a methodology, anyhow, does no longer ensure that hubs in this base set
have fizzled or that hubs out of doors the set have no longer. By and huge, to
apprehend conceivable disappointment units, there must exist an estimation manner
that crosses one and only a single of these units. There is, anyhow, a lack of
comprehension of what this calls for as some distance as substantive machine
properties, for instance, topology, screen association, and estimation directing. Then
once more, no matter whether there exists equivocalness in unhappiness dilemma over
the complete gadget, it's far as yet doable to remarkably restriction hub
disappointments in an specific sub-arrange (e.G., sub-coordinate with a big
department of displays). To decide such one in every of a kind sadness restriction in
sub-systems, we have to see how it's miles recognized with device residences. In this
project, we consider 3 firmly related issues: Let S mean an arrangement of hubs of
intrigue (i.E., there can be vagueness in figuring out the situations of hubs outdoor S;
be that as it may, the situations of hubs in S should be especially definite). (1) If the
quantity of concurrent hub disappointments is limited by using ok, at that factor
underneath what conditions can one incredibly limit fizzled hubs in S from manner
estimations available in the whole system? (2) What is the maximum extreme number
of synchronous hub disappointments (i.E., the largest estimation of ok) to such an
quantity that any disappointments internal S may be noticeably confined? (three)
What is the largest hub set internal which disappointments can be incredibly
restricted, if the aggregate quantity of disappointments is constrained via k? Answers
to questions (2) and (three) collectively compare a gadget's capacity to restriction
disappointments from give up-to-end estimations: query (2) describes the size of
disappointments and question (3) the volume of restrict. Unmistakably, answers to the
above inquiries depend upon which ways are quantifiable, which as a consequence is
predicated upon machine topology, state of affairs of screens, and the steerage tool of
exams.
A subset of hubs is screens which can start and gather estimations. Whatever
is left of the hubs are non-monitors. We count on that screens do not arise brief amid
the estimation system, as fizzled screens can be straightforwardly diagnosed and
Chapter 1
It explains about the introduction to the project, introduction about the area of
project, motivation, objectives of the project work and organization of the project
report.
Chapter 2
It discuss about the Literature Survey. It includes effective set valued data via
top down, local generalization, a learning theory approach to non interactive database
privacy, structured learning for non smooth ranking losses, the cost of privacy,
publishing, our data, ourselves: privacy via distributed noise generation.
Chapter 3
Chapter 4
Chapter 5
Chapter 6
It explains about System Design. It includes input design, output design, code
design, Unified Modeling Language and database design.
Chapter 7
Chapter 8
Chapter 9
After all chapters it explains about Coding. It includes the code of home page
of this project. It includes Screen Shots of the entire project.
2. LITERATURE SURVEY
Step by using step commands to enjoy and display nature with over the
pinnacle fantastic is a pivotal research hassle in the Internet of Things (IOT). This
paper manages the great hassle of the dependability between the tremendous of goal
discovery and lifetime in wi-fi sensor structures. Two target-gazing plans are
proposed. One plan is Target Detection with Sensing Frequency K (TDSFK), which
disseminates the detecting time that as of now's maximum honest on a part of the
detecting time frame into the entire detecting duration. That is, the detecting
recurrence will increment from 1 to K. The specific plan is Target Detection with
Adjustable Sensing Frequency (TDASF), which alters the detecting recurrence on
those hubs that have last satisfactory. The activity influences show that the TDASF
plan can beautify the machine lifetime by using methods for added than 17.4% and
may lessen the weighted discovery postpone via strategies for in extra of one zero
one.6%.
guidance manner, which can in some different case intrude on the go back of hubs'
ACK parcels. For this condition, the PHACK plot additionally has better capability to
distinguish extraordinary parcel misfortune and choose presume hubs notwithstanding
better versatility towards ambushes. Another urgent inconvenience is the community
lifestyles of the PHACK plot, because it produces a greater range of affirmations than
past ACK-based totally plans. We display that the device lifestyles of the PHACK
conspire is not decrease than that of various ACK-primarily based plans in light of the
truth that the plan essentially expands the vitality permit in non-hotspot locales and
does no longer development the strength permit in hotspot districts. In addition, the
PHACK conspire noticeably streamlines the conference and is something however
tough to position into effect.
3. SYSTEM ANALYSIS
Existing work can be broadly classified into single failure localization and
multiple failure localization. Single failure localization assumes that multiple
simultaneous failures happen with negligible probability. Under this assumption,
propose efficient algorithms for monitor placement such that any single failure can be
detected and localized. To improve the resolution in characterizing failures, range
tomography in not only localizes the failure, but also estimates its severity (e.g.,
congestion level). These works, however, ignore the fact that multiple failures occur
more frequently than one may imagine. In this project, we consider the general case of
localizing multiple failures.
The proposed system can significantly improves the capability of node failure
localization over uncontrollable probing.
3.3. MODULES
3.3.1.Network Topology
3.3.2.Monitors
A subset of nodes is monitors that can initiate and collect measurements. The
rest of the nodes are non-monitors. We assume that monitors do not fail during the
measurement process, as failed monitors can be directly detected and excluded
(assuming centralized control within the monitoring system). Non-monitors, on the
other hand, can fail, and a failure event may involve simultaneous failures of multiple
non-monitors. Depending on the adopted probing mechanism, monitors measure the
states of nodes by sending probes along certain paths.
3.3.3.Probing Mechanism
The probing mechanism plays a crucial role in determining path. Depending
on the flexibility of probing and the cost of deployment, we classify probing
mechanisms into one of three classes:
1) Controllable Arbitrary-path Probing (CAP): Path includes any path/cycle,
allowing repeated nodes/links, provided each path/cycle starts and ends at (the same
or different) monitors.
4. FEASIBILITY STUDY
1. Economic Feasibility
2. Technical feasibility
3. Operational Feasibility
The motive of the monetary feasibility appraisal is to decide the nice monetary
blessings related price, expenditure and other protection to the corporation that the
proposed device will provide. It includes numerous expenditures and budges related
to quantification and identification of all of the financial necessities for designing the
undertaking that's anticipated. This estimation obviously involves a fee blessings
evaluation. Budgetary dissection is the worst in many instances worn increase for
comparing the act of a minimum corpus juris. Prevalent oft-times track as Assert / In
compliance interpretation, the entry is to appoint the penny-pinching and number one
lapse are obligated -up from a proposed machine and compare them with reduce
corners. If parsimonious preponderate over charges, a arbitration is phony to
obstruction and apply the gadget. Else, shelved bidding or adjustment within the
proposed machine backbone project to be made if it's miles to essay a fluke of being
approved. This is an leisurely commitment go improves in correctness at till the end
of time epoch of the system existence cycle.
Our software affords Graphical Interface for the stop consumer and which
very easy and feasible to function. The the front stop navigations are created using
Java swings which presents very smooth to the user to enter the essential records and
get the vital outputs. The undertaking is extraordinarily consumer interactive
application and community primarily based. The project is provided with numerous
home windows, buttons and different graphical navigations so that the device is
completely operationally viable.
Processor : Core i3
Speed : 1.2 GHZ
RAM : 4 GB
6. SYSTEM DESIGN
The physical design and planning relates to the real and actual input and
output processes to be given the system. This is process is a study of various data
inputs and outputs to be processed in the system. Physical design involves in user
interface design front end screens, data design back end tables and process design
algorithm.
A class diagram is a set of various related objects that share the same
characteristics called attributes operations called activities, relationships called
associations and semantics called rules. A class is a whole set of objects. Its
representation is
Architects look at class diagrams to see if any class has too many functions
and see if they are required to be split.
Class diagram:
A class diagram is a set of objects that share the same attributes, operations,
relationships and semantics. A class is not an individual object, rather it represents
whole set of objects.
These are the behavioral diagrams which are used to model the system
behavior it contains actors usecases and the way relate to each other. Here an actor
can be a either a user or an entity or another system which interacts with the usecase.
The use case with in a diagram defines a set of actions that a system can perform
through interactions with outside actors or users. We can specify the various
relationships like Generalization, Include, Extend relationships.
The extend relationship; it is used to specify the target use case extends the
behavior of source use case. They include relationship; basis use case incorporates the
performance of another use case. The generalization relationship, the objects of one
entity can be substituted with the objects of another entity.
File Upload
Data Transmission
Receiver
Receive File
Sender
Acknowledgement
Download File
Attacker
Traffic Attack
Energy Attack
ACTOR: Actor is the user of the system, who performs action on the system and to
whom the system yields an observable result of value.
Description
It contains
1. Object: It is represented as horizontal rectangle.
2. Object Lifeline: It provides the presenence of a thing at a period of time
3. Focus of control: It is a tall, thin rectangle that shows the period of time during
which an object is performing an action.
The diagram given below represents how the message can be send
Sequence diagram:
1. File Upload
2. Send for Attack Detection
3. Attack Data
5. Send Data
1. Action State is represented as a shape with straight top and bottom and with
convex areas on the two sides.
2. Diamond shape symbol represents branching. It specifies alternate paths and
decision satisfying the constraint.
3. Transition represent Flow of control between Start state and end state.
4. Objects translate flow of control within an activity diagram. Objects are
connected to action or transition using dependency relationship.
Activity diagram:
7. IMPLEMENTATION
Java server pages (jsp) is a advanced internet server language that helps
application and internet developers in creating a statistical and dynamically web pages
based on dhtml,html, xml. The language was introduced in the year 1999 by the
software company named sun microsystems. The language uses the java compiler. To
deploy and run jsp pages, a suitable web server with a inbuilt servlet container, such
as apache tomcat, weblogic or blazix.
The java server pages have an enhanced dynamic scripting facility that works
in connection with hyper text markup language code, dividing the page logic from the
static elements related to dynamic actions, the proposed or actual design of pages
provides a help to make the hyper language more functional.
A java server page is translated into servlet before being executed, and it
processes hyper transfer protocol requirements and creates responses like any servlet.
The java technology imparts a more flexible way to code a servlet. The jsp translation
occurs the first time the application as it run. A java page translator is produced to
trigger the java page file name extension in a unified resource locator. The java pages
are fully attached with servlets in execution of the code. The jsp pages include getting
the output from a servlet or sending the output to a servlet, and a servlet can include
both input and output from a java page.
7.2. MYSQL
The rdbms mysql makes well organized use of all systems resources, on all
various hardware architecture; the rdbms mysql is a open source extended relational
database management system it is named after co-founder michael widenius's.
Features of mysql
To design, program and develop java server pages and servlets,we require a
compatible web server connected java compiler such as apache tomcat, blazix, web
logic, the dynamic
The apache tomcat server was started off as a servlet class link reference
implementation and invented by james duncan davidson, a software architect and
engineer at sun microsystems. He later helped to make the compiler open source and
processed a main role in its developing and designing by sun microsystems to the
apache software foundation. The apache program build automation tool was once
developed as a aspect-outcome of the construction of tomcat as an open source task.
8. TESTING
8.1. SOFTWARE TESTING TECHNIQUES
Software Testing is a series of steps but it cannot show the absence of defects
and errors but it can only show various errors that are found software or program.
White Box Testing is also called as Open or Glass box testing. In White Box
Testing, by finding the specified program or function that a software product or a
software program has been designed or developed to perform or execute the test can
be implemented and conducted for the demonstrates each program or function in a
fully operated at the same time finding for errors in each program. It is a glass box or
open test case design method that uses the wide control on structure of the procedural
program and design to find and drive the test cases. The starting path testing activities
is a white box testing.
Software Testing Strategy integrates the software test cases into a series of
well planned steps and series of planned procedures that result in the successful
construction, Design and Implementation of a software. Various Software testing
Methods are referred for Verification and Validation. Software Verification refers to
the set of activities on the designed functions and programs for ensuring that the
software or the product correctly implements a specific function or the required
output. Software Validation refers to a set of activities that ensure that the software or
product or application that has been built for traceable to customer’s requirements and
providing the customer to input valid data and make Data store free from redundancy.
Top-Down Integration
The next Testing process is top down integrations is an sequence approach for
construction and testing of a program structure. In a Software or product or
application various modules are integrated with each other by moving downward
through the systematic control hierarchy between the modules, beginning with the
main control or home control or index program. Various activities or modules
connected to the main program are included in the structure of the project or either in
the breath first or depth first manner.
Bottom-up Integration
The next testing method as the name suggests, which begins in construction
and testing with various atomic modules of the product i.e., modules or functions at
the lowest level. Because the all the functions or modules are having integration
between bottom up manner in which the processing is required for the modules
having connection to a given level is always available and the need for remnant is
eliminated.
that all system elements and system activities which have been properly integrated to
perform allocated functions.
Attempts to verify the protection and security mechanisms built into the
system for protecting the data, program and other integrations related to system.
Further showed that these conditions lead to tight upper/lower bounds on the
maximum identifiability index, as well as inner/outer bounds on the maximum
identifiable set. We showed that both the conditions and the bounds can be evaluated
efficiently using polynomialtime algorithms. Our evaluations on random and real
network topologies showed that probing mechanisms that allow monitors to control
the routing of probes have significantly better capability to uniquely localize failures.
SAMPLE CODE
import java.awt.*;
import java.awt.event.ActionEvent;
import java.awt.event.ActionListener;
import java.awt.event.ItemListener;
import java.io.DataInputStream;
import java.io.DataOutputStream;
import java.net.InetAddress;
import java.net.ServerSocket;
import java.net.Socket;
import java.sql.Connection;
import javax.swing.*;
JPanel p1;
JLabel l1,l2,l3;
JTextField t1,t2;
JTextArea ta;
JScrollPane pane;
JButton b1,b2;
JComboBox c1,c2;
Attacker()
p1=new JPanel();
p1.setLayout(null);
p1.setBackground(new Color(192,92,70));
l1.setFont(f2);
l1.setForeground(Color.white);
l1.setBounds(90,100,110,30);
l2.setFont(f2);
l2.setForeground(Color.white);
l2.setBounds(90,150,100,30);
l3.setFont(f2);
l3.setForeground(Color.white);
l3.setBounds(90,200,100,30);
t1=new JTextField();
t1.setBounds(210,200,100,25);
//t2=new JTextField();
// t2.setBounds(160,150,100,25);
c1=new JComboBox();
c1.addItem("CHOOSE");
c1.addItem("Network1");
c1.addItem("Network2");
c1.addItem("Network3");
c1.addItem("Network4");
c1.setBounds(210,100,100,25);
c2=new JComboBox();
c1.addActionListener(this);
c2.setBounds(210,150,100,25);
b1.setBounds(100,335,100,25);
b2=new JButton("Modify");
b2.setBounds(210,335,100,25);
b1.addActionListener(this);
b2.addActionListener(this);
p1.add(l1);p1.add(l2);p1.add(c1);p1.add(t1);p1.add(b1);p1.add(l3);p1.add(c2);
p1.add(b2);
add(p1);
setSize(410,440);
setVisible(true);
new Attacker();
try
UIManager.setLookAndFeel("com.sun.java.swing.plaf.windows.WindowsLoo
kAndFeel");
}catch(Exception es){System.out.println(es);}
if(a1.getSource()==c1)
String clust=c1.getSelectedItem().toString();
System.out.println(clust);
if(clust.equalsIgnoreCase("Network1"))
c2.addItem("Node1");
c2.addItem("Node2");
c2.addItem("Node3");
c2.addItem("Node4");
c2.addItem("Node5");
c2.addItem("Node6");
c2.addItem("Node7");
if(clust.equalsIgnoreCase("Network2"))
c2.addItem("Node8");
c2.addItem("Node9");
c2.addItem("Node10");
c2.addItem("Node11");
c2.addItem("Node12");
c2.addItem("Node13");
c2.addItem("Node14");
if(clust.equalsIgnoreCase("Network3"))
c2.addItem("Node15");
c2.addItem("Node16");
c2.addItem("Node17");
c2.addItem("Node18");
c2.addItem("Node19");
c2.addItem("Node20");
c2.addItem("Node21");
if(clust.equalsIgnoreCase("Network4"))
c2.addItem("Node22");
c2.addItem("Node23");
c2.addItem("Node24");
c2.addItem("Node25");
c2.addItem("Node26");
c2.addItem("Node27");
c2.addItem("Node28");
if(a1.getSource()==b1)
String cluster=(c1.getSelectedItem()).toString();
String node=(c2.getSelectedItem()).toString();
try
DataOutputStream dos5=new
DataOutputStream(s1.getOutputStream());
dos5.writeUTF(cluster);
dos5.writeUTF(node);
DataInputStream in5=new
DataInputStream(s1.getInputStream());
String msg=in5.readUTF();
String ene=in5.readUTF();
System.out.println(msg);
t1.setText(ene);
}catch(Exception es){System.out.println(es);}
if(a1.getSource()==b2)
String cluster=(c1.getSelectedItem()).toString();
String node=(c2.getSelectedItem()).toString();
String men=t1.getText();
try
InetAddress ia = InetAddress.getLocalHost();
DataOutputStream dos5=new
DataOutputStream(s1.getOutputStream());
dos5.writeUTF(cluster);
dos5.writeUTF(node);
dos5.writeUTF(men);
dos5.writeUTF(ip1);
DataInputStream in5=new
DataInputStream(s1.getInputStream());
String msg=in5.readUTF();
if(msg.equalsIgnoreCase("attack"))
JOptionPane.showMessageDialog(null,"Successfully Attacked");
if(msg.equalsIgnoreCase("block"))
}catch(Exception es){System.out.println(es);}
RESULTS
REFERENCES
Forwarding Attack Detecting in WSNs," Sensors, vol. 15, no. 12, pp. 30942-
30963, 2015.
7. A. Liu, X. Jin, G. Cui, Z. Chen, "Deployment guidelines for achieving
maximum lifetime and avoiding energy holes in sensor network,"
Information Sciences, vol. 230, pp.197-226, 2013.
8. Z. Zheng, A. Liu, L. Cai, et al. "Energy and Memory Efficient Clone
Detection in Wireless Sensor Networks," IEEE Transactions on Mobile
Computing.vol. 15, no. 5, pp. 1130-1143, 2016.