DECLARATION
I hereby declare that this submission is my own work and that, to the best of my knowledge
and belief, it contains no material previously published or written by another person nor
material which to a substantial extent has been accepted for the award of any other degree
or diploma of the university or other institute of higher learning, except where due
acknowledgment has been made in the text.
Signature
Name : Kajal Singhal
Roll No. : 1529010060
Date :
Signature
Name : Kajal
Roll No. 1529010059
Date :
Signature
Name : Charu Bansal
Roll No. 1529010050
Date :
ii
CERTIFICATE
This is to certify that Project Report entitled “Bug Tracking System” which is submitted by
Kajal Singhal (1529010060), Kajal (1529010059) & Charu Bansal (1529010050) in partial
fulfillment of the requirement for the award of degree B. Tech. in Department of Computer
Science & Engineering of A.K.T.U is a record of the candidate own work carried out by
him under my/our supervision. The matter embodied in this thesis is original and has not
been submitted for the award of any other degree.
Date: Supervisor
Prof. Ashish chakraveti
Department of Computer Science
& Engineering
iii
ACKNOWLEDGEMENT
It gives us a great sense of pleasure to present the report of the B. Tech Project undertaken
during B. Tech. Final Year. We owe special debt of gratitude to Professor Ashish
chakurvati, Department of Computer Science & Engineering, ABES Institute of
Technology, Ghaziabad for his constant support and guidance throughout the course of our
work. His sincerity, thoroughness and perseverance have been a constant source of
inspiration for us. It is only his cognizant efforts that our endeavors have seen light of the
day.
We also take the opportunity to acknowledge the contribution of Professor Ashish
Chakurvati,Department of Computer Science & Engineering, ABES Institute of
Technology, Lucknow for his full support and assistance during the development of the
project.
We also would not like to miss the opportunity to acknowledge the contribution of all
faculty members of the department for their kind assistance and cooperation during the
development of our project. Last but not the least, we acknowledge our parents and friends
for their constant support throughout the project.
Signature
Name : Kajal Singhal
Roll No. 1529010060
Date :
Signature
Name : Kajal
Roll No. 1529010059
Date :
Signature
Name :Charu Bansal
Roll No. 1529010050
Date :
iv
ABSTRACT
Bug-Tracking mechanism is employed only is some of the large software development
houses. Most of the others never bothered with bug tracking at all, and instead simply relied on
shared lists and email to monitor the status of defects. This procedure is error-prone and tends
to cause those bugs judged least significant by developers to be dropped or ignored.
Bug-Tracking System is an ideal solution to track the bugs of a product, solution or an
application. Bug Tacking System allows individual or groups of developers to keep track of
outstanding bugs in their product effectively. This can also be called as Defect Tracking
System.
v
LIST OF TABLES
TABLES PAGE NO.
Table 1:Comparative Specification Of Motes. 2
Table 2 : Summary of WSN layers, possible attacks 6
on them and the existing protocols.
Table 3 : Summary of WSN Simulators. 11
vi
LIST OF FIGURES
FIGURES PAGE NO.
Figure 1 : Layered Architecture of WSN 4
Figure 2 : Sybil Attack 8
Figure 3 : Blackhole/S sinkhole Attack 8
Figure 4 : Wormhole Attack 9
Figure 5 : Typical routing in a small 12
network
Figure 6 : Setting Up Cluster And 23
Routing Table
Figure 7 : Interpretation Of Pheromone 25
Value
Figure 8 : Dead Nodes vs Rounds 26
Completed (Standard Leach Protocol)
Figure 9 : Packets to Base Station vs 26
Rounds Completed
Figure 10 : Packets to Base Station vs 27
Rounds Completed (Standard Leach
Protocol)
Figure 11 : Number of Cluster Heads vs 28
Rounds Completed
Figure 12 : Number of Cluster Heads vs 28
Rounds Completed (Standard Leach
Protocol)
Figure 13 : Packets to Cluster Head vs 29
Rounds Completed
Figure 14 : Packets to Cluster Head vs 29
Rounds Completed (Standard Leach
vii
Protocol)
Figure 15 : Alive Nodes vs Rounds 30
Completed
Figure 16 : Alive Nodes vs Rounds 30
Completed (Standard Leach Protocol)
Figure 17: Profiler 31
Figure 18: Profiler (Standard Leach 31
Protocol)
viii
LIST OF ABBREVIATIONS
ACO Ant Colony Optimization
WSN Wireless Sensor Network
PKI Public Key Cryptography
IDS Intrusion Detection System
RAM Random Access Memory
LEACH Low-Energy Adaptive Clustering Hierarchy
PEGASIS Power Efficient Gathering in Season Information System
SPINS Security Protocols in Sensor Network
LEAP Localized Encryption & Authentication Protocol
TCP Transmission Control protocol
NS2 Network Simulator 2
MAC Media Access Control
NED Network Description
IDE Integrated Development Environment
GloMoSim Global Mobile Information System Simulator
API Application Program Interface
LAN Local Area Network
ix
TABLE OF CONTENTS
CHAPTER 1 INTRODUCTION ................................................................................... 1
1.1 Ant Colonies .......................................................................................... 2
CHAPTER 2 BRIEF LITERATURE SURVEY ........................................................... 4
2.1 Communication Protocol ....................................................................... 4
2.1.1 Physical Layer................................................................................. 4
2.1.2 Data Link Layer .............................................................................. 4
2.1.3 Network Layer ................................................................................ 5
2.1.4 Transport Layer............................................................................... 5
2.1.5 Application Layer ................................................ 5
2.2 Attacks On WSN and Its Mitigation ........................................................ 6
2.2.1 Denial Of Service ............................................................................ 7
2.2.2 Attack Of Information In Transit .................................................... 7
2.2.3 Sybil Attack .................................................................................... 7
2.2.4 Black Hole/ Sinkhole Attack .......................................................... 8
2.2.5 ‘Hello flood’ Attack ........................................................................ 8
2.2.6 Wormhole Attack ............................................................................ 9
2.3 Simulators Of Wireless Sensor Network ................................................. 9
2.3.1 TOSSIM 10
2.3.2 NS2 ............................................................................................... 10
2.3.3 OMNeT++ .................................................................................... 10
2.3.4 GloMoSim ......................................................... 11
2.4 Routing 11
2.4.1 Classification Of Routers .............................................................. 13
2.4.1.1 Static vs Adaptive 14
2.4.1.2 Single paths vs Multi path.................................................. 14
2.4.1.3 Intradomain vs Interdomain ............................................... 15
2.4.1.4 Flat vs Hierarchical ............................................................ 15
2.4.1.5 Link state vs Distance vectore ........................................... 15
2.4.1.6 Host intelligent vs Router Intelligent ................................. 16
2.5 Network Routing ................................................................................... 17
x
2.6 Shortest Path Routing ............................................................................ 18
CHAPTER 3 PROBLEM FORMULATION .............................................................. 20
CHAPTER 4 IMPLEMENTATION AND RESULT ANALYSIS ............................. 22
4.1 Implementation ...................................................................................... 22
4.2 Result Analysis ...................................................................................... 26
CHAPTER 5 CONCLUSION ..................................................................................... 32
5.1 Conclusion 32
5.2 Future Scope .......................................................................................... 32
PUBLISHED RESEARCH PAPER ............................................................................ 33
REFERENCES ............................................................................................................ 38
xi