You are on page 1of 10

DECLARATION

I hereby declare that this submission is my own work and that, to the best of my knowledge
and belief, it contains no material previously published or written by another person nor
material which to a substantial extent has been accepted for the award of any other degree
or diploma of the university or other institute of higher learning, except where due
acknowledgment has been made in the text.

Signature
Name : Kajal Singhal
Roll No. : 1529010060
Date :

Signature
Name : Kajal
Roll No. 1529010059
Date :

Signature
Name : Charu Bansal
Roll No. 1529010050
Date :

ii
CERTIFICATE

This is to certify that Project Report entitled “Bug Tracking System” which is submitted by
Kajal Singhal (1529010060), Kajal (1529010059) & Charu Bansal (1529010050) in partial
fulfillment of the requirement for the award of degree B. Tech. in Department of Computer
Science & Engineering of A.K.T.U is a record of the candidate own work carried out by
him under my/our supervision. The matter embodied in this thesis is original and has not
been submitted for the award of any other degree.

Date: Supervisor
Prof. Ashish chakraveti
Department of Computer Science
& Engineering

iii
ACKNOWLEDGEMENT

It gives us a great sense of pleasure to present the report of the B. Tech Project undertaken
during B. Tech. Final Year. We owe special debt of gratitude to Professor Ashish
chakurvati, Department of Computer Science & Engineering, ABES Institute of
Technology, Ghaziabad for his constant support and guidance throughout the course of our
work. His sincerity, thoroughness and perseverance have been a constant source of
inspiration for us. It is only his cognizant efforts that our endeavors have seen light of the
day.
We also take the opportunity to acknowledge the contribution of Professor Ashish
Chakurvati,Department of Computer Science & Engineering, ABES Institute of
Technology, Lucknow for his full support and assistance during the development of the
project.
We also would not like to miss the opportunity to acknowledge the contribution of all
faculty members of the department for their kind assistance and cooperation during the
development of our project. Last but not the least, we acknowledge our parents and friends
for their constant support throughout the project.

Signature
Name : Kajal Singhal
Roll No. 1529010060
Date :

Signature
Name : Kajal
Roll No. 1529010059
Date :

Signature
Name :Charu Bansal
Roll No. 1529010050
Date :

iv
ABSTRACT

Bug-Tracking mechanism is employed only is some of the large software development


houses. Most of the others never bothered with bug tracking at all, and instead simply relied on
shared lists and email to monitor the status of defects. This procedure is error-prone and tends
to cause those bugs judged least significant by developers to be dropped or ignored.

Bug-Tracking System is an ideal solution to track the bugs of a product, solution or an


application. Bug Tacking System allows individual or groups of developers to keep track of
outstanding bugs in their product effectively. This can also be called as Defect Tracking
System.

v
LIST OF TABLES

TABLES PAGE NO.


Table 1:Comparative Specification Of Motes. 2

Table 2 : Summary of WSN layers, possible attacks 6


on them and the existing protocols.

Table 3 : Summary of WSN Simulators. 11

vi
LIST OF FIGURES

FIGURES PAGE NO.


Figure 1 : Layered Architecture of WSN 4

Figure 2 : Sybil Attack 8

Figure 3 : Blackhole/S sinkhole Attack 8

Figure 4 : Wormhole Attack 9

Figure 5 : Typical routing in a small 12


network
Figure 6 : Setting Up Cluster And 23
Routing Table
Figure 7 : Interpretation Of Pheromone 25
Value
Figure 8 : Dead Nodes vs Rounds 26
Completed (Standard Leach Protocol)
Figure 9 : Packets to Base Station vs 26
Rounds Completed

Figure 10 : Packets to Base Station vs 27


Rounds Completed (Standard Leach
Protocol)

Figure 11 : Number of Cluster Heads vs 28


Rounds Completed

Figure 12 : Number of Cluster Heads vs 28


Rounds Completed (Standard Leach
Protocol)

Figure 13 : Packets to Cluster Head vs 29


Rounds Completed

Figure 14 : Packets to Cluster Head vs 29


Rounds Completed (Standard Leach

vii
Protocol)

Figure 15 : Alive Nodes vs Rounds 30


Completed

Figure 16 : Alive Nodes vs Rounds 30


Completed (Standard Leach Protocol)

Figure 17: Profiler 31

Figure 18: Profiler (Standard Leach 31


Protocol)

viii
LIST OF ABBREVIATIONS

ACO Ant Colony Optimization

WSN Wireless Sensor Network

PKI Public Key Cryptography

IDS Intrusion Detection System

RAM Random Access Memory

LEACH Low-Energy Adaptive Clustering Hierarchy

PEGASIS Power Efficient Gathering in Season Information System

SPINS Security Protocols in Sensor Network

LEAP Localized Encryption & Authentication Protocol

TCP Transmission Control protocol

NS2 Network Simulator 2

MAC Media Access Control

NED Network Description

IDE Integrated Development Environment

GloMoSim Global Mobile Information System Simulator

API Application Program Interface

LAN Local Area Network

ix
TABLE OF CONTENTS

CHAPTER 1 INTRODUCTION ................................................................................... 1


1.1 Ant Colonies .......................................................................................... 2
CHAPTER 2 BRIEF LITERATURE SURVEY ........................................................... 4
2.1 Communication Protocol ....................................................................... 4
2.1.1 Physical Layer................................................................................. 4
2.1.2 Data Link Layer .............................................................................. 4
2.1.3 Network Layer ................................................................................ 5
2.1.4 Transport Layer............................................................................... 5
2.1.5 Application Layer ................................................ 5
2.2 Attacks On WSN and Its Mitigation ........................................................ 6
2.2.1 Denial Of Service ............................................................................ 7
2.2.2 Attack Of Information In Transit .................................................... 7
2.2.3 Sybil Attack .................................................................................... 7
2.2.4 Black Hole/ Sinkhole Attack .......................................................... 8
2.2.5 ‘Hello flood’ Attack ........................................................................ 8
2.2.6 Wormhole Attack ............................................................................ 9
2.3 Simulators Of Wireless Sensor Network ................................................. 9
2.3.1 TOSSIM 10
2.3.2 NS2 ............................................................................................... 10
2.3.3 OMNeT++ .................................................................................... 10
2.3.4 GloMoSim ......................................................... 11
2.4 Routing 11
2.4.1 Classification Of Routers .............................................................. 13
2.4.1.1 Static vs Adaptive 14
2.4.1.2 Single paths vs Multi path.................................................. 14
2.4.1.3 Intradomain vs Interdomain ............................................... 15
2.4.1.4 Flat vs Hierarchical ............................................................ 15
2.4.1.5 Link state vs Distance vectore ........................................... 15
2.4.1.6 Host intelligent vs Router Intelligent ................................. 16
2.5 Network Routing ................................................................................... 17

x
2.6 Shortest Path Routing ............................................................................ 18
CHAPTER 3 PROBLEM FORMULATION .............................................................. 20
CHAPTER 4 IMPLEMENTATION AND RESULT ANALYSIS ............................. 22
4.1 Implementation ...................................................................................... 22
4.2 Result Analysis ...................................................................................... 26
CHAPTER 5 CONCLUSION ..................................................................................... 32
5.1 Conclusion 32
5.2 Future Scope .......................................................................................... 32
PUBLISHED RESEARCH PAPER ............................................................................ 33
REFERENCES ............................................................................................................ 38

xi

You might also like