You are on page 1of 10

COMPUSOFT, An international journal of advanced computer technology, 6 (2), February-2017 (Volume-VI, Issue-II)

ISSN:2320-0790

DESIGN & DEVELOPMENT OF A MULTI-PATH DYNAMIC ROUTING


ALGORITHM FOR HIGH DATA INTEGRITY
M.Bharghavi1, Dr.U.M.Fernandes Dimlo 2, A.Shobha Rani3, Dr.G.Manoj Someswar4
1
M.Tech. (CSE), Narasimha Reddy Engineering College, Hyderabad, Telangana State, India
2
Professor, Dept. of CSE, Narasimha Reddy Engineering College, Hyderabad, Telangana State, India
3
Assistant Professor, Dept. of CSE, Narasimha Reddy Engineering College, Hyderabad, Telangana State, India
4
Principal & Professor, Dept. of CSE, NRI Institute of Technology, Greater Hyderabad, Telangana State, India

ABSTRACT: Applications running on the same Wireless Sensor Network (WSN) platform usually have different Quality of
Service (qos) requirements. Two basic requirements are low delay and high data integrity. However, in most situations, these two
requirements cannot be satisfied simultaneously. In this research paper, based on the concept of potential in physics, we propose
IDDR, a multi-path dynamic routing algorithm, to resolve this conflict. By constructing a virtual hybrid potential field, IDDR
separates packets of applications with different qos requirements according to the weight assigned to each packet and routes them
towards the sink through different paths to improve the data fidelity for integrity-sensitive applications as well as reduce the end-
to-end delay for delay-sensitive ones. Using the Lyapunov drift technique, we prove that IDDR is stable. Simulation results
demonstrate that IDDR provides data integrity and delay differentiated services.

Keywords:Wireless Sensor Network (WSN), Multi-Path Dynamic Routing Algorithm, Digital Audio Broadcasting (DAB), Quality
of Service (qos), Low-Interference Energy-efficient Multipath Routing protocol (LIEMRO), MCMP (Multi-Constraint Multi-Path)
routing protocol, CODA (Congestion Detection and Avoidance), Signal-to-Noise Ratio (SNR), Energy Efficient and qos aware
multipath routing protocol (EQSR), Adaptive Forwarding Scheme (AFS), Implicit Hop-by-Hop Rate Control

INTRODUCTION

Mobile computing is the discipline for creating an


information management platform, which is free
from spatial and temporal constraints. The freedom
from these constraints allows its users to access and Figure 1: Structure of Mobile Computing
process desired information from anywhere in the
space. The state of the user, static or mobile, does not Different types of devices used for the mobile
affect the information management capability of the computing:
mobile platform. A user can continue to access and
manipulate desired data while traveling on plane, in 1. Personal digital assistant/enterprise digital
car, on ship, etc. Thus, the discipline creates an assistant
illusion that the desired data and sufficient processing 2. Smartphones
power are available on the spot, where as in reality 3. Tablet computers
they may be located far away. Otherwise Mobile 4. Netbooks
computing is a generic term used to refer to a variety 5. Ultra-mobile PCs
of devices that allow people to access data and 6. Wearable computers
information from where ever they are.[1] 7. Palmtops/pocket computers

Applications of Mobile Computing:

2278
COMPUSOFT, An international journal of advanced computer technology, 6 (2), February-2017 (Volume-VI, Issue-II)

1. Vehicles: optimizing logistics and accelerating


Tomorrow’s cars will comprise many processes.[4]
wireless communication systems and mobility aware  Strengthen customer relationships by
applications. Music, news, road conditions, weather creating more opportunities to connect,
reports, and other broadcast information are received providing information at their fingertips
via digital audio broadcasting (DAB) with 1.5 M- when they need it most .
bits/s. For personal communication, a global system  Gain competitive advantage by creating
for mobile communications (GSM) phone might be brand differentiation and expanding
available offering voice and data connectivity with customer experience.
384 k-bits/s. For remote areas satellite  Increase work force effectiveness and
communication can be used, while the current capability by providing on-the-go access.
position of the car is determined via global  Improve business cycle processes by
positioning system (GPS). [2] Additionally, cars redesigning work flow to utilize mobile
driving in the same area build a local ad-hoc devices that interface with legacy
network for fast information exchange in emergency applications.
situations or to help each other keeping a safe
distance. In case of an accident, not only will the Advantages of Mobile Computing:
airbag be triggered, but also an emergency call to a
service provider informing ambulance and police. Mobile computing has changed the complete
Cars with this technology are already available. landscape of human being life. Following are the
Future cars will also inform other cars about clear advantages of Mobile Computing:
accidents via the ad hoc network to help them slow
down in time, even before a driver can recognize the 1. Location flexibility:
accident. Buses, trucks, and train are already
transmitting maintenance and logistic information to This has enabled user to work from anywhere as long
their home base, which helps o improve organization as there is a connection established. A user can work
(fleet management), and thus save time and money. without being in a fixed position. Their mobility
2. Emergency: ensures that they are able to carry out numerous tasks
Just imagine the possibilities of an at the same time perform their stated jobs.[5]
ambulance with a high quality wireless connection to
a hospital. After an accident, vital information about 2. Saves Time:
injured persons can be sent to the hospital
immediately. There, all necessary steps for this The time consumed or wasted by travelling from
particular type of accident can be prepared or further different locations or to the office and back, have
specialists can be consulted for an early diagnosis.[3] been slashed. One can now access all the important
Furthermore, wireless networks are the only means of documents and files over a secure channel or portal
communication in the case of natural disasters such and work as if they were on their computer. It has
as hurricanes or earthquakes. enhanced telecommuting in many companies. This
also reduces unnecessary expenses that might be
3. Business: incurred.
Today’s typical traveling salesman needs
instant access to the company’s database: to ensure 3. Enhanced Productivity:
that the files on his or her laptop reflect the actual
state, to enable the company to keep track of all Productive nature has been boosted by the fact that a
activities of their traveling employees, to keep worker can simply work efficiently and effectively
databases consistent etc., with wireless access, the from which ever location they see comfortable and
laptop can be turned into a true mobile office. suitable. Users are able to work with comfortable
environments.[6]
Benefits of Mobile Computing:
4. Ease of research:
 Improve business productivity by
streamlining interaction and taking Research has been made easier, since users will go to
the field and search for facts and feed them back to
advantage of immediate access
the system. It has also made it easier for field officer
 Reduce business operations costs by
and researchers to collect and feed data from
increasing supply chain visibility,

2279
COMPUSOFT, An international journal of advanced computer technology, 6 (2), February-2017 (Volume-VI, Issue-II)

wherever they without making unnecessary trip to the wireless channel and may be even inferior to the
and from the office to the field. performance of single-path approaches. Specifically,
when multiple adjacent paths are being used
5. Entertainment: concurrently, the broadcast nature of wireless
channels results in inter path interference which
Video and audio recordings can now be streamed on significantly degrades end-to-end throughput. In this
the go using mobile computing. It's easy to access a paper, we propose a Low-Interference Energy-
wide variety of movies, educational and informative efficient Multipath Routing protocol (LIEMRO) to
material. With the improvement and availability of improve the QoS requirements of event-driven
high speed data connections at considerable costs, applications. In addition, in order to optimize
one is able to get all the entertainment they want as resource utilization over the established paths,
they browser the internet for streamed data.[7] One LIEMRO employs a quality-based load balancing
can be able to watch news, movies, and algorithm to regulate the amount of traffic injected
documentaries among other entertainment offers over into the paths. The performance gain of LIEMRO
the internet. This was not such before mobile compared to the ETX-based single-path routing
computing dawned on the computing world. protocol is 85%, 80%, and 25% in terms of data
delivery ratio, end-to-end throughput, and network
6. Streamlining of Business Processes: lifetime, respectively. Furthermore, the end-to-end
latency is improved more than 60%.
Business processes are now easily available through
secured connections. Basing on the factor of security, The increasing demand for real-time applications in
adequate measures have been put in place to ensure Wireless Sensor Networks (WSNs) has made the
authentication and authorization of the user accessing Quality of Service (QoS) based communication
those services. protocols an interesting and hot research topic.
Satisfying Quality of Service (QoS) requirements
Some business functions can be run over secure links (e.g. bandwidth and delay constraints) for the
and also the sharing of information between business different QoS based applications of WSNs raises
partners. Also it's worth noting that lengthy travelling significant challenges. More precisely, the
has been reduced, since there is the use of voice and networking protocols need to cope up with energy
video conferencing. constraints, while providing precise QoS
guarantee.[9] Therefore, enabling QoS applications in
Meetings, seminars and other informative services sensor networks requires energy and QoS awareness
can be conducted using the video and voice in different layers of the protocol stack. In many of
conferencing. This cuts down on travel time and these applications (such as multimedia applications,
expenditure. or real-time and mission critical applications), the
network traffic is mixed of delay sensitive and delay
LITERATURE SURVEY tolerant traffic. Hence, QoS routing becomes an
This research paper proposes gradient routing with important issue. In this paper, we propose an Energy
two-hop information for industrial wireless sensor Efficient and QoS aware multipath routing protocol
networks to enhance real-time performance with (abbreviated shortly as EQSR) that maximizes the
energy efficiency. Two-hop information routing is network lifetime through balancing energy
adopted from the two-hop velocity-based routing, and consumption across multiple nodes, uses the concept
the proposed routing algorithm is based on the of service differentiation to allow delay sensitive
number of hops to the sink instead of distance. traffic to reach the sink node within an acceptable
Additionally, an acknowledgment control scheme delay, reduces the end to end delay through spreading
reduces energy consumption and computational out the traffic across multiple paths, and increases the
complexity. The simulation results show a reduction throughput through introducing data redundancy.
in end-to-end delay and enhanced energy EQSR uses the residual energy, node available buffer
efficiency.[8] size, and Signal-to-Noise Ratio (SNR) to predict the
best next hop through the paths construction phase.
The existing multipath routing protocols for wireless Based on the concept of service differentiation,
sensor networks demonstrate the efficacy of traffic EQSR protocol employs a queuing model to handle
distribution over multiple paths to fulfill the Quality both real-time and non-real-time traffic.
of Service (QoS) requirements of different By means of simulations, we evaluate and compare
applications. However, the performance of these the performance of our routing protocol with the
protocols is highly affected by the characteristics of MCMP (Multi-Constraint Multi-Path) routing

2280
COMPUSOFT, An international journal of advanced computer technology, 6 (2), February-2017 (Volume-VI, Issue-II)

protocol. Simulation results have shown that our the performance of sensing applications. We discuss
protocol achieves lower average delay, more energy the performance benefits and practical engineering
savings, and higher packet delivery ratio than the challenges of implementing CODA in an
MCMP protocol. experimental sensor network test bed based on
Berkeley motes using CSMA.[11] Simulation results
A new localized quality of service (QoS) routing indicate that CODA significantly improves the
protocol for wireless sensor networks (WSN) is performance of data dissemination applications such
proposed in this paper. The proposed protocol targets as directed diffusion by mitigating hotspots, and
WSN's applications having different types of data reducing the energy tax with low fidelity penalty on
traffic. It is based on differentiating QoS sensing applications. We also demonstrate that
requirements according to the data type, which CODA is capable of responding to a number of
enables to provide several and customized QoS congestion scenarios that we believe will be prevalent
metrics for each traffic category. With each packet, as the deployment of these networks accelerates.
the protocol attempts to fulfill the required data- SYSTEM ANALYSIS
related QoS metric(s) while considering power
efficiency. It is modular and uses geographical EXISTING SYSTEM:
information, which eliminates the need of
propagating routing information. For link quality  Most QoS provisioning protocols proposed
estimation, the protocol employs distributed, memory for traditional ad hoc networks have large
and computation efficient mechanisms. It uses a overhead caused by end-to-end path
multi-sink single-path approach to increase discovery and resource reservation. Thus,
reliability. To our knowledge, this protocol is the first they are not suitable for resource-
that makes use of the diversity in data traffic while constrained WSNs. Some mechanisms have
considering latency, reliability, residual energy in been designed to provide QoS services
sensor nodes, and transmission power between nodes specifically for WSNs.
to cast QoS metrics as a multi-objective problem. The  Adaptive Forwarding Scheme (AFS)
proposed protocol can operate with any medium employs the packet priority to determine the
access control (MAC) protocol, provided that it forwarding behavior to control the reliability
employs an acknowledgment (ACK) mechanism.  LIEMRO utilizes a dynamic path
Extensive simulation study with scenarios of 900 maintenance mechanism to monitor the
nodes shows the proposed protocol outperforms all quality of the active paths during network
comparable state-of-the-art QoS and localized routing operation and regulates the injected traffic
protocols. Moreover, the protocol has been rate of the paths according to the latest
implemented on sensor motes and tested in a sensor perceived paths quality.
network test bed.[10]
DISADVANTAGES OF EXISTING SYSTEM:
Event-driven sensor networks operate under an idle
 It does not consider the effects of buffer
or light load and then suddenly become active in
capacity and service rate of the active nodes
response to a detected or monitored event. The
to estimate and adjust the traffic rate of the
transport of event impulses is likely to lead to varying
active paths.
degrees of congestion in the network depending on
 This will cause congestion and thus lead to
the sensing application. It is during these periods of
many high integrity packets loss and large
event impulses that the likelihood of congestion is
end-to-end delay for delay sensitive packets.
greatest and the information in transit of most
 Delay-sensitive packets occupy the limited
importance to users. To address this challenge we
bandwidth and buffers, worsening drops of
propose an energy efficient congestion control
high-integrity ones.
scheme for sensor networks called CODA
 High-integrity packets block the shortest
(Congestion Detection and Avoidance) that
paths, compelling the delay-sensitive
comprises three mechanisms: (i) receiver-based
packets to travel more hops before reaching
congestion detection; (ii) open-loop hop-by-hop
the sink, which increases the delay.
backpressure; and (iii) closed-loop multi-source
 High-integrity packets occupy the buffers,
regulation. We present the detailed design,
which also increases the queuing delay of
implementation, and evaluation of CODA using
delay-sensitive packets.
simulation and experimentation. We define two
important performance metrics (i.e., energy tax and PROPOSED SYSTEM:
fidelity penalty) to evaluate the impact of CODA on

2281
COMPUSOFT, An international journal of advanced computer technology, 6 (2), February-2017 (Volume-VI, Issue-II)

 This work aims to simultaneously improve SYSTEM DESIGN


the fidelity for high-integrity applications
and decrease the end-to-end delay for delay- SYSTEM ARCHITECTURE:
sensitive ones, even when the network is
congested. We borrow the concept of
potential field from the discipline of physics
and design a novel potential based routing
algorithm, which is called integrity and
delay differentiated routing (IDDR). IDDR
is able to provide the following two
functions: Figure 2: System Architecture
 Improve fidelity for high-integrity
applications. The basic idea is to find as DATA FLOW DIAGRAM:
much buffer space as possible from the idle
and/or under-loaded paths to cache the 1. The DFD is also called as bubble chart. It is
excessive packets that might be dropped on a simple graphical formalism that can be
the shortest path. Therefore, the first task is used to represent a system in terms of input
to find these idle and/or underloaded paths, data to the system, various processing
then the second task is to cache the packets carried out on this data, and the output data
efficiently for subsequent transmission. is generated by this system.
IDDR constructs a potential field according 2. The data flow diagram (DFD) is one of the
to the depth1 and queue length information most important modeling tools. It is used to
to find the under-utilized paths. The packets model the system components. These
with high integrity requirement will be components are the system process, the data
forwarded to the next hop with smaller used by the process, an external entity that
queue length. A mechanism called Implicit interacts with the system and the
Hop-by-Hop Rate Control is designed to information flows in the system.[12]
make packet caching more efficient. 3. DFD shows how the information moves
 Decrease end-to-end delay for delay- through the system and how it is modified
sensitive applications. Each application is by a series of transformations. It is a
assigned a weight, which represents the graphical technique that depicts information
degree of sensitivity to the delay. Through flow and the transformations that are applied
building local dynamic potential fields with as data moves from input to output.
different slopes according to the weight 4. DFD is also known as bubble chart. A DFD
values carried by packets, IDDR allows the may be used to represent a system at any
packets with larger weight to choose shorter level of abstraction. DFD may be partitioned
paths. In addition, IDDR also employs the into levels that represent increasing
priority queue to further decrease the information flow and functional detail.
queuing delay of delay-sensitive packets.

ADVANTAGES OF PROPOSED SYSTEM:

 IDDR inherently avoids the conflict between


high integrity and low delay: the high-
integrity packets are cached on the under
loaded paths along which packets will suffer
a large end-to-end delay because of more
hops, and the delay-sensitive packets travel
along shorter paths to approach the sink as
soon as possible.
 Using the Lyapunov drift theory, we prove
that IDDR is stable.
 Furthermore, the results of a series of
simulations conducted on the TOSSIM
platform demonstrate the efficiency and Figure 3: Data Flow Diagram
feasibility of the IDDR scheme.

2282
COMPUSOFT, An international journal of advanced computer technology, 6 (2), February-2017 (Volume-VI, Issue-II)

UML DIAGRAMS their goals (represented as use cases), and any


dependencies between those use cases. The main
purpose of a use case diagram is to show what system
UML stands for Unified Modeling Language. UML functions are performed for which actor. Roles of the
is a standardized general-purpose modeling language actors in the system can be depicted.
in the field of object-oriented software engineering.
The standard is managed, and was created by, the
Object Management Group.
The goal is for UML to become a common language
for creating models of object oriented computer
software. In its current form UML is comprised of
two major components: a Meta-model and a notation.
In the future, some form of method or process may
also be added to; or associated with, UML.[13]
The Unified Modeling Language is a standard
language for specifying, Visualization, Constructing
and documenting the artifacts of software system, as Figure 4: Use Case Diagram
well as for business modeling and other non-software
systems. CLASS DIAGRAM:
The UML represents a collection of best engineering
practices that have proven successful in the modeling In software engineering, a class diagram in the
of large and complex systems.
The UML is a very important part of developing Unified Modeling Language (UML) is a type of static
objects oriented software and the software structure diagram that describes the structure of a
development process. The UML uses mostly
graphical notations to express the design of software system by showing the system's classes, their
projects. attributes, operations (or methods), and the
relationships among the classes. It explains which
GOALS:
The Primary goals in the design of the UML are as class contains information.[16]
follows:

1. Provide users a ready-to-use, expressive


visual modeling Language so that they can
develop and exchange meaningful models.
2. Provide extendibility and specialization
mechanisms to extend the core concepts.
3. Be independent of particular programming
languages and development process.
4. Provide a formal basis for understanding the
modeling language.
5. Encourage the growth of OO tools
Figure 5: Class Diagram
market.[14]
6. Support higher level development concepts
such as collaborations, frameworks, patterns DIAGRAM:
and components.
7. Integrate best practices. A sequence diagram in Unified Modeling Language
(UML) is a kind of interaction diagram that shows
how processes operate with one another and in what
USE CASE DIAGRAM:
order. It is a construct of a Message Sequence Chart.
A use case diagram in the Unified Modeling Sequence diagrams are sometimes called event
Language (UML) is a type of behavioral diagram diagrams, event scenarios, and timing diagrams.
defined by and created from a Use-case analysis.[15]
Its purpose is to present a graphical overview of the
functionality provided by a system in terms of actors,

2283
COMPUSOFT, An international journal of advanced computer technology, 6 (2), February-2017 (Volume-VI, Issue-II)

privacy. Input Design considered the following


things:
 What data should be given as input?
 How the data should be arranged or
coded?
 The dialog to guide the operating
personnel in providing input.
 Methods for preparing input validations
and steps to follow when error occur.

OBJECTIVES
1.Input Design is the process of converting a user-
oriented description of the input into a computer-
based system. This design is important to avoid errors
in the data input process and show the correct
direction to the management for getting correct
information from the computerized system.
ACTIVITY DIAGRAM:
2. It is achieved by creating user-friendly screens for
the data entry to handle large volume of data. The
Activity diagrams are graphical representations of
goal of designing input is to make data entry easier
workflows of stepwise activities and actions with
and to be free from errors. The data entry screen is
support for choice, iteration and concurrency.[17] In
designed in such a way that all the data manipulates
the Unified Modeling Language, activity diagrams
can be performed. It also provides record viewing
can be used to describe the business and operational
facilities.
step-by-step workflows of components in a system.
3.When the data is entered it will check for its
An activity diagram shows the overall flow of
validity. Data can be entered with the help of screens.
control.
Appropriate messages are provided as when needed
so that the user will not be in maize of instant. Thus
the objective of input design is to create an input
layout that is easy to follow.
OUTPUT DESIGN
A quality output is one, which meets the
requirements of the end user and presents the
information clearly. In any system results of
processing are communicated to the users and to
other system through outputs. In output design it is
determined how the information is to be displaced for
immediate need and also the hard copy output. It is
the most important and direct source information to
Figure 7: Activity Diagram the user. Efficient and intelligent output design
improves the system’s relationship to help user
decision-making.
INPUT DESIGN
1. Designing computer output should proceed in an
The input design is the link between the information
organized, well thought out manner; the right output
system and the user. It comprises the developing
must be developed while ensuring that each output
specification and procedures for data preparation and
element is designed so that people will find the
those steps are necessary to put transaction data in to
system can use easily and effectively. When analysis
a usable form for processing can be achieved by
design computer output, they should Identify the
inspecting the computer to read data from a written or
specific output that is needed to meet the
printed document or it can occur by having people
requirements.
keying the data directly into the system. The design
2.Select methods for presenting information.
of input focuses on controlling the amount of input
3.Create document, report, or other formats that
required, controlling the errors, avoiding delay,
contain information produced by the system.[18]
avoiding extra steps and keeping the process simple.
The output form of an information system should
The input is designed in such a way so that it
accomplish one or more of the following objectives.
provides security and ease of use with retaining the

2284
COMPUSOFT, An international journal of advanced computer technology, 6 (2), February-2017 (Volume-VI, Issue-II)

 Convey information about past activities, of confidence must be raised so that he is also able to
current status or projections of the make some constructive criticism, which is
 Future. welcomed, as he is the final user of the system.
 Signal important events, opportunities, SYSTEM TESTING
problems, or warnings. The purpose of testing is to discover errors.
 Trigger an action. Testing is the process of trying to discover every
 Confirm an action. conceivable fault or weakness in a work product. It
provides a way to check the functionality of
SYSTEM STUDY components, sub assemblies, assemblies and/or a
FEASIBILITY STUDY finished product It is the process of exercising
The feasibility of the project is software with the intent of ensuring that the software
analyzed in this phase and business proposal is put system meets its requirements and user expectations
forth with a very general plan for the project and and does not fail in an unacceptable manner. There
some cost estimates. During system analysis the are various types of test. Each test type addresses a
feasibility study of the proposed system is to be specific testing requirement.
carried out. This is to ensure that the proposed system TYPES OF TESTS
is not a burden to the company. For feasibility Unit testing
analysis, some understanding of the major Unit testing involves the design of test cases
requirements for the system is essential. that validate that the internal program logic is
Three key considerations involved in the feasibility functioning properly, and that program inputs
analysis are produce valid outputs. All decision branches and
internal code flow should be validated. It is the
 ECONOMICAL FEASIBILITY testing of individual software units of the application
 TECHNICAL FEASIBILITY .it is done after the completion of an individual unit
 SOCIAL FEASIBILITY before integration. This is a structural testing, that
relies on knowledge of its construction and is
ECONOMICAL FEASIBILITY invasive. Unit tests perform basic tests at component
This study is carried out to check the level and test a specific business process, application,
economic impact that the system will have on the and/or system configuration. Unit tests ensure that
organization. The amount of fund that the company each unique path of a business process performs
can pour into the research and development of the accurately to the documented specifications and
system is limited. The expenditures must be justified. contains clearly defined inputs and expected results.
Thus the developed system as well within the budget Integration testing
and this was achieved because most of the Integration tests are designed to test
technologies used are freely available. Only the integrated software components to determine if they
customized products had to be purchased. [19] actually run as one program. Testing is event driven
TECHNICAL FEASIBILITY and is more concerned with the basic outcome of
This study is carried out to check the screens or fields. Integration tests demonstrate that
technical feasibility, that is, the technical although the components were individually
requirements of the system. Any system developed satisfaction, as shown by successfully unit testing, the
must not have a high demand on the available combination of components is correct and consistent.
technical resources. This will lead to high demands Integration testing is specifically aimed at exposing
on the available technical resources. This will lead to the problems that arise from the combination of
high demands being placed on the client. The components.
developed system must have a modest requirement, Functional test
as only minimal or null changes are required for Functional tests provide systematic
implementing this system. demonstrations that functions tested are available as
SOCIAL FEASIBILITY specified by the business and technical requirements,
The aspect of study is to check the level of system documentation, and user manuals.
acceptance of the system by the user. This includes Functional testing is centered on the following items:
the process of training the user to use the system Valid Input : identified classes of valid
efficiently. The user must not feel threatened by the input must be accepted.
system, instead must accept it as a necessity. [20] The Invalid Input : identified classes of invalid
level of acceptance by the users solely depends on the input must be rejected.
methods that are employed to educate the user about Functions : identified functions must be
the system and to make him familiar with it. His level exercised.

2285
COMPUSOFT, An international journal of advanced computer technology, 6 (2), February-2017 (Volume-VI, Issue-II)

Output : identified classes of application  Verify that the entries are of the correct
outputs must be exercised. format
Systems/Procedures: interfacing systems or  No duplicate entries should be allowed
procedures must be invoked.  All links should take the user to the correct
Organization and preparation of functional tests is page.
focused on requirements, key functions, or special
test cases. In addition, systematic coverage pertaining Integration Testing
to identify Business process flows; data fields, Software integration testing is the
predefined processes, and successive processes must incremental integration testing of two or more
be considered for testing. Before functional testing is integrated software components on a single platform
complete, additional tests are identified and the to produce failures caused by interface defects.
effective value of current tests is determined. The task of the integration test is to check
System Test that components or software applications, e.g.
System testing ensures that the entire integrated components in a software system or – one step up –
software system meets requirements. It tests a software applications at the company level – interact
configuration to ensure known and predictable without error.
results. An example of system testing is the Test Results: All the test cases mentioned above
configuration oriented system integration test. passed successfully. No defects encountered.
System testing is based on process descriptions and Acceptance Testing
flows, emphasizing pre-driven process links and User Acceptance Testing is a critical phase
integration points. of any project and requires significant participation
White Box Testing by the end user. It also ensures that the system meets
White Box Testing is a testing in which in which the functional requirements.
the software tester has knowledge of the inner Test Results: All the test cases mentioned above
workings, structure and language of the software, or passed successfully. No defects encountered.
at least its purpose. It is purpose. It is used to test
areas that cannot be reached from a black box level. CONCLUSION
Black Box Testing In this research paper, a dynamic multipath routing
Black Box Testing is testing the software algorithm IDDR is proposed based on the concept of
without any knowledge of the inner workings, potential in physics to satisfy the two different QoS
structure or language of the module being tested. requirements, high data fidelity and low end-to-end
Black box tests, as most other kinds of tests, must be delay, over the same WSN simultaneously. The
written from a definitive source document, such as IDDR algorithm is proved stable using the Lyapunov
specification or requirements document, such as drift theory. Moreover, the experiment results on a
specification or requirements document. It is a testing small test bed and the simulation results on TOSSIM
in which the software under test is treated, as a black demonstrate that IDDR can significantly improve the
box .you cannot “see” into it. The test provides inputs throughput of the high-integrity applications and
and responds to outputs without considering how the decrease the end-to-end delay of delay sensitive
software works. applications through scattering different packets
Unit Testing: from different applications spatially and temporally.
Unit testing is usually conducted as part of a IDDR can also provide good scalability because only
combined code and unit test phase of the software local information is required, which simplifies the
lifecycle, although it is not uncommon for coding and implementation. In addition, IDDR has acceptable
unit testing to be conducted as two distinct phases. communication overhead.
Test strategy and approach REFERENCES
Field testing will be performed manually
and functional tests will be written in detail. [1] P. Levis, N. Lee, M. Welsh, and D. Culler,
“TOSSIM: Accurate and scalable simulation of entire
Test objectives TinyOS applications,” in Proc. 1st Int. Conf.
 All field entries must work properly. Embedded Networked Sensor Syst., 2003, pp. 126–
 Pages must be activated from the identified 137.
link.
 The entry screen, messages and responses [2] T. Chen, J. Tsai, and M. Gerla, “QoS routing
must not be delayed. performance in multihop multimedia wireless
networks,” in Proc. IEEE Int. Conf. Universal
Features to be tested Personal Commun., 1997, pp. 557–561.

2286
COMPUSOFT, An international journal of advanced computer technology, 6 (2), February-2017 (Volume-VI, Issue-II)

in sensor networks,” in Proc. IEEE Intl Conf. Local


[3] R. Sivakumar, P. Sinha, and V. Bharghavan, Comput. Netw., 2003, pp. 406–415.
“CEDAR: Core extraction distributed ad hoc routing
algorithm,” IEEE J. Selected Areas Commun., vol. [13] M. Radi, B. Dezfouli, K. A. Bakar, S. A. Razak,
17, no. 8, pp. 1454–1465, Aug. 1999. and M. A. Nematbakhsh, “Interference-aware
multipath routing protocol for QoS improvement in
[4] S. Chen and K. Nahrstedt, “Distributed quality- event-driven wireless sensor networks,” Tsinghua
of-service routing in ad hoc networks,” IEEE J. Sci. Technol., vol. 16, no. 5, pp. 475–490, 2011.
Selected Areas Commun., vol. 17, no. 8, pp. 1488–
1505, Aug. 1999. [14] J. Ben-Othman and B. Yahya, “Energy efficient
and QoS based routing protocol for wireless sensor
[5] B. Hughes and V. Cahill, “Achieving real-time networks,” J. Parallel Distrib. Comput., vol. 70, no. 8,
guarantees in mobile ad hoc wireless networks,” in pp. 849–857, 2010.
Proc. IEEE Real-Time Syst. Symp., 2003.
[15] M. Razzaque, M. M. Alam, M. MAMUN-OR-
[6] E. Felemban, C.-G. Lee, and E. Ekici, RASHID, and C. S. Hong, “Multi-constrained QoS
“MMSPEED: Multipath multi-speed protocol for geographic routing for heterogeneous traffic in sensor
QoS guarantee of reliability and timeliness in networks, ieice transactions on communications,”
wireless sensor networks,” IEEE Trans. Mobile IEICE Trans. Commun., vol. 91B, no. 8, pp. 2589–
Comput., vol. 5, no. 6, pp. 738–754, Jun. 2003. 2601, 2008.

[7] C. Lu, B. Blum, T. Abdelzaher, J. Stankovic, and [16] D. Djenouri and I. Balasingham, “Traffic-
T. He, “RAP: A real-time communication differentiation-based modular qos localized routing
architecture for large-scale wireless sensor for wireless sensor networks,” IEEE Trans. Mobile
networks,” in Proc. IEEE 8th Real-Time Embedded Comput., vol. 10, no. 6, pp. 797–809, Jun. 2010.
Technol. Appl. Symp., 2002, pp. 55–66.
[17] A. Basu, A. Lin, and S. Ramanathan, “Routing
[8] M. Caccamo, L. Zhang, L. Sha, and G. Buttazzo, using potentials: A dynamic traffic-aware routing
“An implicit prioritized access protocol for wireless algorithm,” in Proc. Conf. Appl., Technol.,
sensor networks,” in Proc. IEEE Real-Time Syst. Architectures, Protocols Comput. Commun., 2003,
Symp., 2002, pp. 39–48. pp. 37–48.

[9] T. He, J. Stankovic, C. Lu, and T. Abdelzaher, [18] C.-Y. Wan, S. B. Eisenman, and A. T.
“SPEED: A stateless protocol for real-time Campbell, “CODA: Congestion detection and
communication in sensor networks,” in Proc. IEEE avoidance in sensor networks,” in Proc. 1st Int. Conf.
23rd Int. Conf. Distrib. Comput. Syst., 2003, pp. 46– Embedded Netw. Sensor Syst., 2003, pp. 266–279.
55.
[19] L. Georgiadis, M. J. Neely and L. Tassiulas,
[10] P. T. A. Quang and D.-S. Kim, “Enhancing real- “Resource allocation and cross-layer control in
time delivery of gradient routing for industrial wireless networks,” Found. Trends Netw., vol. 1, no.
wireless sensor networks,” IEEE Trans. Ind. Inform., 1, pp. 1–144, 2006.
vol. 8, no. 1, pp. 61–68, Feb. 2012.
[20] A. Papadoulos and J. A. Mccann, “Towards the
[11] S. Bhatnagar, B. Deb, and B. Nath, “Service design of an energy-efficient, location-aware routing
differentiation in sensor networks,” in Proc. Int. protocol for mobile, adhoc sensor networkFs,” in
Symp. Wireless Pers. Multimedia Commun., 2001. Proc. Int. Workshop Database Expert Syst. Appl.,
2004, pp. 705–709.
[12] B. Deb, S. Bhatnagar, and B. Nath, “ReInForM:
Reliable information forwarding using multiple paths

2287

You might also like