Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Bachelor of Technology
In
K. MADHUBABU
1
K L EDUCATION FOUNDATION
Department of Computer Science Engineering
Declaration
The term paper minor Project Report entitled “ PATH RECONSTRUCTION IN MULTIHOP
WIRELESS NETWORKS USING HUBS “a record of bonafide work of B. VENKAT SAI
KIRAN(160030098), B. NAVEEN KUMAR(160030123), P. DILEEP KUMAR
(160031038) submitted in partial fulfilment for the award of B.Tech in Computer Science
Engineering to K L Deemed to be a University. The results embodied in this report have not
been copied from any other department/institute/university.
2
K L EDUCATION FOUNDATION
Department of Computer Science Engineering
Certificate
This is to certify that the minor Project Report entitled “ PATH RECONSTRUCTION IN
MULTIHOP WIRELESS NETWORKS USING HUBS “is being submitted by B. VENKAT
SAI KIRAN(160030098), B. NAVEEN KUMAR(160030123), P. DILEEP KUMAR
(160031038) in partial fulfilment for the award of B.Tech in Computer Science Engineering to
K L Deemed to be a University is a record of bonafide work carried out under our guidance
and supervision.
The results embodied in this report have not been copied from any other
department/University/Institute.
3
ACKNOWLEDGMENT
It is great pleasure for me to express my gratitude to our honorable President Sri.
KONERU SATYANARAYANA, for giving the opportunity and platform with
facilities in accomplishing the project report.
I record it as my privilege to deeply thank our pioneer, Dr. HARI KIRAN VEGE
HOD-CSE for providing us the efficient faculty and facilities to make our ideas
into reality.
4
ABSTRACT
Cloud computing is a Service Delivery Mechanism. Computing resources are
delivered as a service over the network. These services are scalable, Autonomous
and Cost effective in nature. Cloud computing is responsible for the exponential
growth of IT industry. Inspite of having various Security challenges and
advantages make the cloud computing more secure. In this paper we are going to
reconstruct the path for the packet that takes over the network. We are going to
find the best path for the packets to travel between the client and servers.
Sometimes, due to heavy traffic in the network the packets are dropped in
between which will be not known by the client or the receiver. Heavy traffic in
the network may lead to connection lost. Since to provide the better efficiency in
the packet hand ling we are using Path Reconstruction Algorithm in wireless
networks. According to the study of base papers we observed that the efficiency
in forest areas are more compared to the cities. We will try to improve the
efficiency in cities. We will make this using the battery capacities for wireless
networks and server capacity or cache capacity on the wired devices .In the
shortest path that was generated by cloud data center which it can be redesigned
by the hubs at their respective places when the there find any traffic suddenly
5
CONTENTS
TITLE OF THE CONTENT PAGE NO
INTRODUCTION 8
LITERATURE SURVEY 11
THEORITICAL ANALYSIS 13
EXPERIMENTAL INVESTIGATION 17
EXPERIMENTAL RESULTS 25
PERFORMANCE METRICES 28
SUMMARY,CONCLUSIONAND 31
RECOMANDATIONS
REFRENCES/BIBILOGRAPHY 32
6
CHAPTER – 1
INTRODUCTION
7
INTRODUCTION
All Cloud figuring is another registering model in which assets are pooled to give
programming, stage and framework to however many clients as could be
expected under the circumstances by sharing the accessible assets. In this
model "clients" plug into the "cloud" to get to IT assets which are estimated and
gave "on-request". A Communication hub is an important data centers in cloud
with an emphasis connectivity to other communication hubs, data centers and
cloud applications. Every hub is connected to its own power circuits, each hub
gets the power supply from the nearest power stations. In today’s leading life
Internet of Things (IOT) is rising, there is an expanding requirement for low-
control remote correspondence arrangements. Multi-hop transmission is in this
way essential for long-run correspondences. For instance, dynamic appropriated
conventions have been broadly utilized in numerous genuine world sent
activities, for example, clinical observing, Green Orbs, and City See. Since from
the papers we have analyzed that the transfer percentage in the clinical
observing or forest area and Green orbs the transfer rate observed is faster than
the City area and accuracy is also more in the Forest and Green Orbs. In these
systems, every hub decides its next-bounce forwarder (parent), rather than
brought together directing in which a sink is answerable for figuring the best
way for every hub. Our previous estimation shows that 18,644 percent changes
occurred in ten-day informational collection which contains nearly 343 hubs in
Green Orbs.
With bundle level data, it is anything but difficult to determine the dynamic
directing topology whenever moment. Such a topology is fundamental for
observing per-jump misfortune proportions
also, per-jump transmission delays in an ongoing way.
A solitary parcel way can be the "indisputable evidence" that uncovers a system
crackle .We can give helpful answers to questions, for example, "One hub
encountering blockage. Give me traffic sources causing the clog".
A clear way to deal with uncover the bundle way is to record the total way during
parcel sending, e.g., putting away the ID succession of all sending hubs, in each
packet. In this way, we consider the way remaking issue to instrument a little
parcel overhead to every bundle, and reproduce the steering way at the sink with a
high remaking proportion. In a low-power and multi-hop organize, it is attractive
and testing to remake bundle level way utilizing a little overhead.
8
Packet Switching
Packet-switch portrays the kind of system wherein generally little units of
information called parcels are steered through a system dependent on the goal
address contained inside every parcel. Separating correspondence into bundles
enables similar information way to be shared among numerous clients in the
system. This sort of correspondence among sender and recipient is known as
connectionless (as opposed to devoted). Most traffic over the Internet utilizes
bundle exchanging and the Internet is fundamentally a connectionless system.
9
CHAPTER-2
LITERATURE SURVEY
10
Path Reconstruction Problem:
Every hub has a one of a kind two Bytes (truncated as B) hub ID which is
ordinarily conveyed in every bundle. Normally, a bundle additionally contains a
succession number which increments when the first hub creates and sends a
parcel.
(2) The system utilizes dynamic and appropriated directing conventions, to adapt
to natural elements.
After gathering the arrangement of all parcels P from the sink hubs, the way
remaking issue is to reproduce the directing way for a specific bundle p ∈ P
utilizing data encoded in the parcels. We state a way remaking is effective if the
recouped way equivalents to the genuine way which is an arrangement of hub
IDs start from the 1st hub and finishes at the sink hub. Plainly, the way
information is recorded assumes a key job in deciding the presentation of way
recreation.
Increase cost proportion for every individual parcel, i.e., gain/cost. This
measurement effectively remake a way. The increase of every bundle is said as
where c0 is the quantity of bytes speaking to a hub ID, h is the way length of the
parcel, and I ∈{ 0,1} is a marker variable speaking to a right way recreation. The
expense of every bundle is the overhead of the extra way pertinent added fields
to every parcel. Past investigations don't expressly consider this measure while
we trust it is similarly significant.
11
AUDIT OF THE IDEAS IN ALGORITHMS
This segment succinctly surveys significant way remaking calculations in the
writing. For every calculation, we will feature what way important data is
recorded and what is the fundamental thought for the way reproduction
calculation. Fundamental Approach: In the essential methodology, every hub
(i.e., unique hub, sink hub or forwarder) annexes its ID to each bundle. At the
point when we examine a parcel at the sink side, the bundle way is
straightforwardly accessible. The parcel overhead is variable. Typically, a limit
basic is introduced to bound the greatest way recording overhead. Thus, the
essential methodology isn't appropriate for enormous systems with long directing
ways.
MNT remakes the way by abusing between bundle relationship produced from
spatially various hubs along the directing way, i.e., a sent parcel and its
neighboring parcels privately created at the forwarder are normally sent to the
equivalent next bounce. Such nearby bundles fill in as stays of the sent parcel.
Forwarder in parcel used to record, by the way a bundle used to acquire by
linking 1-bounce forward by every one of its stays. It can't be applicable to
occasion recognition systems where just a couple of hubs are activated to create
parcels.
12
Some Existing Algorithms
NC-algorithms:- Algorithm misusing connection: The classification incorporates
the fundamental methodology, PathZip and PAT without subpath link (bPAT).
Every one of the algorithm just save data in every individual parcel for way
recreation.
13
Existing Model Description
a) Description
We consider the issue of reproducing way for bundle p in the gathered parcel
follow P. We useh(p) to mean p's way length. We further present the
accompanying documentations:
1) G =(V,L): the topology diagram where V is the arrangement of system hubs
and L is the arrangement of remote connections.
2) D: The normal system level of the system G.
3) T(p) and T(p): we useT(p) to mean the quantity of bundles with the equivalent
steering way as parcel p in the parcel follow P. The gathering of bundles with a
similar way are alluded to as a way gathering. In this way, T(p) speaks to the way
gathering size of bundle p. We further define T(p)=T(p)/h(p) , h(p) indicates the
way length of p. as the relative way gathering size.
4) t(p): the quantity of ceaseless parcels (i.e., bundles with persistent grouping
number) with the equivalent steering way as bundle p in the parcel follow P.
Plainly t(p)≤ T(p).
5) GR =( VR,LR): therouting chart where VR and LR are sets of hubs and
connections which are unequivocally recorded in the parcels in P inside a period
window Tw. VR ⊆ V and LR ⊆ L. The directing chart GR varies from the
topology diagram G in that every one of the connections in GR are really chosen
as steering joins by bundles in P.
14
b) Implications
1 : It is conceivable to plot the choice space (see Section VII) for choosing the
best calculation for various systems. We can see the proportions of fleeting and
spatial relationships as a scaffold between the normal parameterization of a
system and the presentation of algorithms. From one viewpoint, it is conceivable
to investigate more system situations demonstrating various measures of
transient and spatial relationships. Then again, we can generally anticipate the
exhibition of various algorithms in various systems utilizing our model. For
instance, it is normal that SC-algorithms will have a low way remaking
proportion in occasion location systems if just a couple of hubs are activated and
accordingly the directing chart scarcely contains the steering way of a parcel. It is
likewise expected that TC-algorithms will have a low way remaking proportion
in systems with a versatile sink if the sink moves quick and along these lines the
quantity of parcels with the equivalent directing way is low. We will find in
Section VII that our assessment results confirm the above forecasts.
15
EXISTING Implementation Method
The main objective of this project to increase the accuracy in city and to decrease
the power consumption. It is observed from the previous papers that from
previous algorithm (cPathST) reconstruction proportion helped to increase from
94.4%, 34.3%, and 30.8% to 98.9%, 99.9%, and 60.1% by and large in three
system situations, individually, contrasted and the best in class algorithms. But
from the above criteria we can see that the accuracy should be increased in the
3rd condition.
In this we will use the hubs which will be acting as the communication between
the group of hubs in the network. We will consider the hubs to transfer the
packets, the packets will be transferred between the hubs which has the highest
percentage of battery. The packets will select the path depending on the highest
battery percentage, the packets continue the same protocol until it reaches the
receiver’s end. If any of the hub is busy and it has the highest percentage than the
upcoming packet will be sent through the hub having the next highest percentage
this process applies for all the packets and it continues until it reaches the end or
transmission stops.
Better Algorithms
The suggestions abridged in Section V-B structure the premise to control our
plan of better algorithms as for way recreation proportion and increase cost
proportion.
A. cPathT
16
2.) cPathS
Our subsequent algorithm, cPathS, misuses spatial relationship for way recreation.
We first briefly present the iPath algorithm. iPath additionally abuses spatial relationship
and iteratively remakes a h-bounce parcel way from (h − 1)- jump ways. iPath's key
thought is to iteratively remake the bundle way and utilize the reproduced ways to bound
the quest space for recreating p's way. Be that as it may, it can now and again experience
the ill effects of a low reproduction proportion if the quantity of ways from p.Parent in the
bundle follow is amazingly low and along these lines the likelihood that p takes an
alternate way is high. How about we take a gander at the directing chart appeared in Fig.
1. When iPath recreates A1's way, it searches for matches with the remade ways began at
B in the bundle follow (i.e., B-D-F-K and B-C-F-K) and there is no match. In any case,
on the off chance that we could utilize the directing diagram to reproduce more ways
from B, e.g., B-C-E-K, which are not really in the parcel follow (i.e., virtual ways), we
could remake more ways in the following emphasess.
B. cPathST
Our third algorithm, cPath, misuses both fleeting and spatial relationship for way
reproduction. It depends on cPathT and cPathS we have proposed in the past two subsections.
Along these lines, the extra fields included the bundles are the association of fields included
the past two algorithms. We likewise see that both cPathT and cPathS utilize the way hash
field to exceptionally distinguish a way. This field would thus be able to be shared by the two
algorithms.
cPathST accept the accompanying fields:
(1) Origin
(2) pLen
(3) aMsr .
(4) pathhash
(5) parent
. It fills in as pursues: • Use the cPathT algorithm to remake the parcel ways. • Use the
Origin-Parent joins and the effectively remade ways to fabricate a longhaul directing
chart. • Based on the built up steering diagram, utilize the cPathS algorithm to
recreate the rest of the bundle ways. We can see that there are two principle stages in
cPathST. To start with, the algorithm summons cPathT. Second, the algorithm
summons cPathS. We use cPathT before cPathS with the goal that the reproduced
ways by cPathT can benefit ensuing way recreations in cPathS. cPath ST joins the
benefits of both TC-algorithms and SC-algorithms: when there is a high worldly
connection (e.g., in occasion discovery organizes), the first stage would already be
able to accomplish a high remaking radio; when there is a high spatial relationship
(e.g., in systems with portable sinks), the subsequent stage can accomplish a high
reconstruction ratio notwithstanding low reconstruction radio in the first stage.
17
CHAPTER-3
METHODOLOGY
18
PROPOSED METHOD
Path reconstruction is finished by utilizing the exhibitions of the batteries of the
remote gadgets and dependent on store execution in wired device. Distributed
storage execution is vigorously reliant on the presentation of the capacity
engineering it is utilizing, it is seen when the associated system data transmission
is more noteworthy than the maintainable exchange paces of the capacity drives.
It very well may be gotten to inside its associated system without being online.
Cloud stockpiling execution is vigorously subject to the exhibition of the
capacity design it is utilizing, it is seen when the associated system data
transmission is more prominent than the feasible exchange paces of the capacity
drives. In this paper, we will talk about various sorts of capacity drives, their
presentation and how drives can bottleneck the distributed storage execution.
ALGORITHM
Dijkstra’s Algorithm
Dijkstra’s Algorithm stands out from the rest due to its ability to find the shortest path
from one node to every other node within the same graph data structure. This means,
that rather than just finding the shortest path from the starting node to another specific
node, the algorithm works to find the shortest path to every single reachable node –
provided the graph doesn’t change.
The algorithm runs until all of the reachable nodes have been visited. Therefore, you
would only need to run Dijkstra’s algorithm once, and save the results to be used again
and again without re-running the algorithm – again, unless the graph data structure
changed in any way.
In the case of a change in the graph, you would need to rerun the graph to ensure you
have the most updated shortest paths for your data structure.
Let’s take our routing example from above, if you want to go from A to B in the
shortest way possible, but you know that some roads are heavily congested, blocked,
undergoing works, and so on, when using Dijkstra, the algorithm will find the shortest
path while avoiding any edges with larger weights, thereby finding you the shortest
route.
While adding battery performances to the Dijkstra’s algorithm our project is ready to
use implementation or working processure of the project is explained here
When two hubs send the data request to the cloud Data center at the same time
along with the request we have to send the cache performance of the system and also
battery efficiency based on the these parameters the datacenter decides to which hub
they send the data at which rate in order to avoid traffic regulations in the network
If datacentre sends same rate of flow of data to both the hub the less battery device
drains of its capacity when load is heavy and when battery id full it will work with high
speed and also performs well like wise cache capacity when cache is full its send in
slow rate otherwise its sends data in high rate based in bandwith capacity
19
Diagram for proposed model
20
CODE:
import ctypes
class SYSTEM_POWER_STATUS(ctypes.Structure):
_fields_ = [
('ACLineStatus', wintypes.BYTE),
('BatteryFlag', wintypes.BYTE),
('BatteryLifePercent', wintypes.BYTE),
('Reserved1', wintypes.BYTE),
('BatteryLifeTime', wintypes.DWORD),
('BatteryFullLifeTime', wintypes.DWORD),
SYSTEM_POWER_STATUS_P = ctypes.POINTER(SYSTEM_POWER_STATUS)
GetSystemPowerStatus = ctypes.windll.kernel32.GetSystemPowerStatus
GetSystemPowerStatus.argtypes = [SYSTEM_POWER_STATUS_P]
GetSystemPowerStatus.restype = wintypes.BOOL
status = SYSTEM_POWER_STATUS()
row = len(Graph)
col = len(Graph[0])
21
Blackened =[0] * row
dist[_s]= 0
u = MinDistance(dist, Blackened)
if u == float("Inf"):
break
else:
Blackened[u]= 1
for v in range(row):
parent[v]= u
pathlength[v]= pathlength[parent[v]]+1
dist[v]= dist[u]+Graph[u][v]
parent[v]= u
pathlength[v] = pathlength[u] + 1
if dist[_d]!= float("Inf"):
PrintPath(parent, _d)
else:
print ("There is no path between vertex ", _s, "to vertex ", _d )
22
def PrintPath(parent, _d):
if parent[_d]==-1:
print (_d, )
return
PrintPath(parent, parent[_d])
min = float("Inf")
for v in range(len(dist)):
min = dist[v]
Min_index = v
if not GetSystemPowerStatus(ctypes.pointer(status)):
raise ctypes.WinError()
[float("Inf"), 9, 0, 7, float("Inf")],
Dijkstra(Graph, 1,3 )
23
OUTPUT:-
2. Compute Cost , p ∈ N ij i
3. end for
4. p = first element of N i
7. add p to SN i
8. end if
9. p = next element of N i
24
Experiment Analysis By Papers
The quantity of hop counts to the sink indirectly affects vitality utilization. The lower bounce
check diminishes the quantity of parcels sent between the hubs, in this way devouring lower
vitality. shows the parcel conveyance proportion under various number of source hubs. As it
tends to be seen from the chart, the parcel conveyance proportion is somewhat bigger than the
other. Considering the connection dependability of the neighbouring hubs prompts the choice
of a neighbouring hub with better connection quality. The higher the connection quality, the
lower the parcel misfortune, prompting the higher the bundle conveyance proportion. In the
event that the quantity of parcels sent abatements, the vitality utilization, required for sending
the bundles, additionally diminishes.
Experiment 2:
The ENSA-BAN convention has lower vitality utilization (around 10%)
contrasted with the DMQoS convention. As referenced previously, this is on the
grounds that the ENSA-BAN chooses the following bounce hub considering both
lingering vitality and least jump checks. It shows the parcel conveyance proportion of
ENSA-BAN and DMQoS. The diagram shows the parcel conveyance proportion of
ENSA-BAN is lower than another convention. This is on the grounds that when the
sink hub is situated at the patient's lower leg, the bounce tallies of the hubs are
expanded and the way with least jump checks isn't really the way with high
unwavering quality.
25
Attacks in multihop networks
A MANET gives organize connectivity between versatile hubs over conceivably
multihop wireless channels essentially through connection layer master tools that guarantee
one-bounce availability, and net-work-layer conventions that broaden the connectivity to
different jumps. This disseminated protocols typically accept that all hubs are agreeable in the
coordination procedure. This supposition is sadly not valid in an unfriendly situation. Since
participation is accepted yet no ten constrained in MANETs, noxious assailants can without
much of a stretch upset system tasks by abusing convention determinations. The fundamental
system layer activities in MANETs are specially appointed directing an information bundle
sending, which connect with one another and fullfill the usefulness of conveying parcels from
the source to the goal. The impromptu directing conventions trade steering messages among
hubs and keep up steering states a show hub as needs are. In light of the directing states,
information parcels are sent by the middle of the road hubs along a setup course to the goal. By
the by, both directing and parcel sending tasks are helpless against vindictive assaults,
prompting different kinds of a glitch in the system layer. While thorough identification of the
assaults is out of our extension, such system layer vulnerabilities, for the most part, can be
categorized as one of two classifications: directing assaults and bundle sending assaults, in light
of the objective activity of the assaults.
Notwithstanding steering assaults, the enemy may dispatch assaults against bundle sending
activities too. Such assaults don't disturb the directing convention and toxic substance the
steering states at every hub. Rather, they influence the information parcels to be conveyed in a
manner that is purposefully conflicting with the directing states. For instance, the assailant
along a set up course may drop the bundles, adjust the substance of the parcels or copy the
bundles it has just sent. Another kind of parcel sending assault is the refusal of-administration
(DoS) assault through system layer bundle impacting, in which the aggressor infuses an
26
enormous number of garbage bundles into the system. These bundles squander a critical bit of
the system assets and present serious remote channel conflict and system blockage in the
MANET.
Detection:- Because the wireless channel is open, each node can perform localized
detection by overhearing ongoing transmissions and evaluating the behaviour of its
neighbours. However, its accuracy is limited by a number of factors such as channel error,
interference, and mobility. A malicious node may also abuse the security solution and
intentionally accuse legitimate nodes. In order to address such issues, the detection results at
individual nodes can be integrated and refined in a distributed manner to achieve consensus
among a group of nodes. An alternative detection approach relies on explicit
acknowledgment from the destination and/or intermediate nodes to the source so that the
source can out where the packet was dropped.
Reaction:- Once a malicious node is detected, certain actions are triggered to protect the
net-work from future attacks launched by this node. The reaction component typically is
related to the prevention component in the overall security system. For example, the
malicious node may have its certificate revoked, or be chosen with smaller probability in
27
future forwarding paths. Based on their scope, the reaction schemes can be categorized as
global reaction and end-host reaction. In the former scheme, all nodes in the network react to
a malicious node as a whole.
Global reaction:- The reaction scheme in falls into the global reaction category. It is
based on the URSA certification framework [20]. Once multiple nodes in a local
neighborhood have reached consensus that one of their neighbors is malicious, they
collectively revoke the certificate of the malicious node. Consequently, the malicious node is
isolated in the network as it cannot participate in the routing or packet forwarding
operations in the future. End-host reaction. The path rate in allows each node to maintain
its own rating for every other node it knows about. A node slowly increases the rating of
well-behaved nodes over time, but dramatically decreases the rating of a malicious node
that is detected by its watch dog. Based on the rating, the source always selects the path
with the highest average rating. Clearly each node may have a different opinion about
whether another node is malicious, and each has its independent reaction accordingly.
Performance Matrices
Energy utilization.
Since sensor hubs in/on the human body have constrained vitality, vitality
utilization is one of the significant components which should be considered in
BANs. On the off chance that a sensor quits working due to the low intensity of
the battery, essential indications of the patient won't be available, bringing about
an unfortunate circumstances.
Packets sent.
This measurement shows the quantity of parcels that are sent by the middle
hubs. The more the halfway hubs, the more the vitality utilization and the more
the deferral in the system.
End-to-End delay.
28
Cloud security challenges
1. Resource location: End-clients utilize the administrations gave by the cloud suppliers
without knowing precisely where the assets for such administrations are found,
conceivably in other authoritative spaces. This represents a potential issue when debates
occur, which is once in a while outside the ability to control of cloud suppliers.
Information put away at the cloud specialist organizations isn't just influenced by the
supplier strategies yet in addition by the enactment of nations where the suppliers live.
When utilizing such administrations, clients need to consent to the ''Terms of Service''
which award the suppliers the privilege to uncover client data in consistence with laws
and law implementation demands, for instance, as noted in the ongoing Dropbox's
Terms of Service. The European Union has given Directive 95/46/EC to secure client
protection. The order disallows moves of individual information to nations which don't
guarantee a satisfactory degree of security.
3. Validation and trust of gained data: as the basic information is situated in the
cloud supplier foundation, the information might be adjusted without the proprietor's
assent. The adjusted information may then be recovered and handled by the proprietor to
settle on basic choices. The valid-ness of the information for this situation is significant,
and thusly should be ensured. In any case, normal measures to guarantee information
uprightness don't exist.
4. Framework checking and logs: as more business basic applications are relocated to
the cloud, clients may demand that cloud suppliers give all the more observing and log
information for the clients' work force. As the aftereffects of checking and logs may
contain delicate framework data, and are generally utilized inside by the suppliers,
sharing pieces of such information to either clients or outsider inspectors isn't something
all cloud suppliers are eager to do. It will require a great deal of arrangement between
cloud suppliers and clients to concoct proper checking and log data as a component of
any assistance understanding.
29
Cloud Security Benefits:
1. Protection against DDoS:- Distributed denial of service attacks are on the rise, and a
top cloud computing security solution focuses on measures to stop huge amounts of
traffic aimed at a company’s cloud servers. This entails monitoring, absorbing and
dispersing DDoS attacks to minimize risk.
2. Data security:- In the ever-increasing era of data breaches, a top cloud computing
security solution has security protocols in place to protect sensitive information and
transactions. This prevents a third party from eavesdropping or tampering with data
being transmitted.
3. Regulatory compliance:- Top cloud computing security solutions help companies in
regulated industries by managing and maintaining enhanced infrastructures for
compliance and to protect personal and financial data.
4. Flexibility:- A cloud computing solution provides you with the security you need
whether you’re turning up or down capacity. You have the flexibility to avoid server
crashes during high traffic periods by scaling up your cloud solution. Then when the
high traffic is over, you can scale back down to reduce costs.
5. High availability and support:-. A best-practices cloud computing security solution
offers constant support for a company’s assets. This includes live monitoring 24 hours
a day, 7 days a week, and every day of the year. Redundancies are built-in to ensure
your company’s website and applications are always online.
30
Conclusion:
This paper gives the best path for transmission of packets through the hubs.
We aim to deep insights for path reconstruction and this will give us the best way. Every hub
will get the transmission packet and the percentage of the battery it consist. Extensive
evaluations in different network scenarios show the prediction power of the model as well as
the advantages of our proposed algorithm. The main advantage by this paper is that we will
acquire more accuracy in cities even though there is more traffic or overload in the hubs.
Security challenges and advantages make the cloud computing more secure. In this paper we
are going to reconstruct the path for the packet that takes over the network. We are going to
find the best path for the packets to travel between the client and servers. Sometimes, due to
heavy traffic in the network the packets are dropped in between which will be not known by
the client or the receiver. One possible direction of future work is to improve the path
exploration efficiency in cPathS’s design. Currently, cPathS only uses two priorities. For
complex networks, the key to improving the performance is to prioritize the paths to be
explored, as exploring all possible paths could be computationally infeasible.
31
References:
UNDERSTANDING PATH RECONSTRUCTION ALGORITHMS IN MULTIPHOP
WIRELESS NETWORKS BY
[1] T. He et al., “VigilNet: An integrated sensor network system for energy efficient
surveillance,” ACM Trans. Sensor Netw., vol. 2, no. 1, pp. 1–38, 2006.
[3] L. Mo et al., “Canopy closure estimates with GreenOrbs: Sustainable sensing in the
forest,” in Proc. ACM SenSys, 2009, pp. 99–112.
[5] H.-S. Kim, J. Lee, and J. W. Jang, “BLEmesh: A wireless mesh network protocol for
Bluetooth low energy devices,” in Proc. IEEE FiCloud, Aug. 2015, pp. 558–563.
[6] O. Chipara, C. Lu, T. C. Bailey, and G.-C. Roman, “Reliable clinical monitoring using
wireless sensor networks: Experiences in a step-down hospital unit,” in Proc. ACM SenSys,
2010, pp. 155–168.
[7] X. Mao, X. Miao, Y. He, X.-Y. Li, and Y. Liu, “CitySee: Urban CO2 monitoring with
sensors,” in Proc. IEEE INFOCOM, Mar. 2012, pp. 1611–1619.
[8] C. Perkins, E. Belding-Royer, and S. Das, Ad Hoc On-Demand Distance Vector (AODV)
Routing, document RFC 3561, 2003.
[9] A. Woo, T. Tong, and D. Culler, “Taming the underlying challenges of reliable multihop
routing in sensor networks,” in Proc. ACM SenSys, 2003, pp. 14–27.
[10] O. Gnawali et al., “CTP: An efficient, robust, and reliable collection tree protocol for
wireless sensor networks,” ACM Trans. Sensor Netw., vol. 10, no. 1, pp. 16:1–16:49, 2013.
[11] O. Gaddour and A. Koubâa, “RPL in a nutshell: A survey,” Comput. Netw., vol. 56, no.
14, pp. 3163–3178, 2012.
32