SERVFORU

Latest Post

Unlist Your Number From Truecaller


What is Truecaller?
The world’s largest collaborative phone directory to find people from all over the world through name and phone number lookup. Get the app for free to your Android, iPhone, Windows Phone, Blackberry and Nokia Symbian phone.
Access a list of users you may know through our social circle recommendations. This means you may know these users based on your own connections with other users whom you have in common.

If you don´t want your number to be searchable in the Truecaller app, then enter your phone number below including the country code and press “Unlist.” (i.e. +4690512214). You cannot resubmit your number to the directory.



1. Click here and go to TrueCaller Unlist Page.
2. Here Select your country.
3. Now put your number and captcha.
4. That's All, now you are successfully unlisted.
5. In future It will not list your phone number again.
6. Whole process will take 24hr so wait for that.
 

Reset Android Smartphone Pattern/Password/Pin lock

It sucks when you forget your passwords But Gmail account can save you. But what for those who don't have it? 
There are some methods to reset them
Wiping data being most popular 
But, why loosing precious data when there is a easier or easiest to do method 

This is a new method found and tested by me on a rooted device but the resources it uses are available to be used without root too, so it may work on unrooted devices too. 


This method uses Aroma File Manager by amarullz in Recovery Mode of the device to delete the password database related files. So, it should work on all devices! 


So, first you need to download AROMA FILE MANAGER from here 


Instructions:-


1. Download Aroma File Manager.
2. Place it in the root of your sdcard(Preferred)
3. Reboot into recovery
4. For CWM:



Mount all partitions (including sd-ext if you have it)

And flash Aroma File Manager from sdcard

For stock recovery(Samsung e3):


In stock recovery, there is no option to mount partitions, so

Flash Aroma File Manager, Click on menu option and go to settings

Select Mount All Partitions

Now, exit from Aroma File Manager and reflash it.

Now, you will see each partition is mounted


5. Now, go to /data/system

Note : If you have sd-ext mod to increase internal storage, go to /sd-ext/system/


6. Now, If you have to remove pattern lock, long press and delete gesture.key

If you want to remove password, delete password.key
7. Exit the Aroma File Manager
8. Reboot 



 

How to get patent in INDIA


            If you are an inventor or budding inventor, you might be having lot of questions in your mind before marketing your invention, such as how to obtain patent for my invention ? Is my invention patentable? Can I file patent by myself? etc. There are certain basic guidelines are already known to the patent practitioners to help the inventors. This article will help the inventors and entrepreneurs.










you can file using efiling 


with class 3 digital signature and any of the identification proof 

The Patent System of India


Intellectual Property Rights:

Intellectual Property Rights are statutory rights once granted allows the creator(s) or owner(s) of the intellectual property to exclude others from exploiting the same commercially for a given period of time. It allows the creator(s)/owner(s) to have the benefits from their work when these are exploited commercially. IPR are granted to an inventor or creator, designer in lieu of the discloser of his/her knowledge.

Governing Laws in India for IPR as follows:

1. Patent Act 1970

2. Trade Marks Act (1958 original) 1999

3. The Copyright Act 1957

4. The design Act 2000

5. Geographical Indication of Goods (Registration and Protection) Act 1999

6. Plant Variety and Farmers Right Protection Act 2001

What is an invention/innovation?

An invention means: a new product or process involving an inventive step and capable of industrial application.

An Innovation means: The successful exploitation of new ideas in the form of a useful machinery or process, by any person, using own intellect is called as innovation. Every innovation may not be patentable invention but every invention is an innovation.

All the inventions are the innovations and are patentable, but all the innovations are not the patentable inventions.

The Patent System

A patent is a contract between the inventor or applicant for the patent and the State, whereby the inventor or applicant gets a monopoly from the State for a certain period in return for disclosing full details of the invention. The patent system thus ensures that information on new inventions is made available for eventual public use so as to encourage technical and economic development and discourage secrecy.

If an inventor or company has an invention, which they consider to be novel and inventive, they may apply for a patent. This may be granted only after a detailed examination by a patent office. Once the patent is granted the inventor or applicant has the sole right to make, use or sell the invention for a limited period.

This period is usually twenty years.

There can also be confusion about what exactly can be protected by the patent system. Patents can only be applied to inventions. These usually have an industrial dimension. An invention is normally a new product, which involves a new principle of operation or an improvement to an old principle. Alternatively it may refer to a new or improved industrial process. Things, which do not involve manufacture, are not usually considered to be inventions. For example, a new scientific theory or a new surgical procedure would not be considered to be patentable for this reason.

Novelty and Inventiveness 

In order to be suitable for patenting, an invention must be novel and inventive. An invention is considered to be novel if it has not been disclosed to the public at the time that the patent application was made. As long as the date of the patent application precedes any disclosure of details of the invention to the public, the invention can be validly patented. If however, details of the invention have been disclosed to the public before applying for a patent, then the invention is no longer

considered to be novel in a patenting sense and it will not be possible to protect it validly through the patent system.It is important to be aware of the danger of premature disclosure of details of an invention. Even after a patent application has been filed, details of the invention should only be disclosed as part of a planned programme of commercial exploitation.Another requirement for a valid patent is inventiveness. This means that the invention must contain an inventive step. This can be the most difficult thing to show. A patent examiner may decide that the invention is obvious i.e. that somebody knowledgeable in the subject area, when familiarised with all earlier patents or other technology in the area, would have immediately been led to the same conclusion.


Commercialization of Inventions

Many inventors feel that filing a patent application is the most important and first thing they must do once they have an idea. This is rarely the case. Patenting an invention is not the only consideration and rushing to file an application may actually be the wrong thing to do first.Patents are of no value unless the commercial worth of the product or technology can be demonstrated and exploited. Many patentable inventions have failed not because they didn't work, or because they had been invented before, but because the inventor was unable to exploit them commercially. Inventing is increasingly being seen as a business. You must invest in the business if you wish to make a


return, and management and marketing skills are every bit as important as technical skills. If the inventor does not have all the skills required, it may be necessary to put together a team or partnership to exploit the project or to license the invention to an existing company who already has related products. If one does successfully commercialise an invention however the rewards can be substantial. A number of successful companies' world over own patents, which protect them against, copied products home or imported. This is an important factor in present day international trade. Most other traditionally used barriers to trade are being removed in the interests of fair competition. Patents are one of the few mechanisms that companies can legally use to protect their market share.
Having foreign patents also allows Irish companies to protect their products in export markets.
Where a product is unsuitable for export because of distance, cost or other factors, a licensing strategy can be used. The Indian company can use the patents to license the manufacturing/marketing rights for their invention to a foreign manufacturer. In return they receive a royalty, which increases their profits. Licensing for both the home and export markets to Indian and/or foreign companies is also the appropriate strategy for inventions made by non-manufacturing companies or by universities and colleges.
To succeed, an inventor does not have to have a great deal of business or technical expertise. He/she must however adopt a businesslike approach to the project. The first thing is to realise that there are several stages in the inventive process. It is vital to realise what stage one is at and what one needs to do next. 
The stages of development of a successful invention are:
•Identification of a problem that needs to be solved.

•Inventing a solution to the problem, which works.

•Developing a prototype or being able to demonstrate the invention to prove how it works.

•Filing a patent application to protect the invention so that it can be disclosed to other people.

•Arranging the manufacturing and marketing of the invention either through one's own company or through licensing.

•Each stage requires its own particular expertise and resources. It is essential that the early stages are satisfactorily completed before moving on. Experience shows that taking short cuts does not pay. For example, it is hard to get investors or potential licensees to appreciate the benefits of a particular invention if the prototype is very crude and does not work properly. Similarly there is little point in filing a patent application until one is satisfied that the invention can be shown to work. There can be some

overlap between the last two stages however. If it is possible to make some progress with manufacturing and marketing without compromising the patent position, then one should do this. As mentioned elsewhere, very often the later one files the patent application the better.

Disclosing an Invention

Details of an invention should not be disclosed to outsiders until such time as a patent application has been filed. However, many people make the mistake of filing patent applications too early. Because they are afraid that somebody else may invent the same thing, they file an application as quickly as possible without having any clear plan as to what they are going to do next. They then find that many
months pass before they are in a position to commercially exploit the invention, and they have not left enough time to obtain the necessary finance to cover international patent filings. In general, it is better to complete the development of the invention and file the patent application when it becomes necessary to make disclosures as part of a planned programme of commercial exploitation. If it is necessary to talk to technical specialists or others in order to obtain assistance during the development of the invention, this should be done on the basis of confidentiality. People should be informed that the information is strictly
confidential and asked to sign a simple document undertaking not to disclose the information until given permission to do so.



Adopting a proper commercialisation strategy involves considering all aspects at the same time, technical, commercial and legal. At the initial stages proper attention should be given to the technical aspects, but once the patent application is filed,the commercialisation should proceed as quickly as possible within the limited time scale provided by the patent system. Once an application has been filed in Ireland,applications in other countries must be made within twelve months if the best protection is to be obtained. As is explained below, an international patent programme can be a very expensive business. Funding for it from either private or public sources is unlikely to be obtained unless there are definite commercial plans for the invention which are well advanced. Setting up ones own manufacturing company or identifying potential licensees and reaching agreement with them can take time. A period of longer than twelve months is usually required to complete either of these activities. Thus if one has filed ones patent application too early one will inevitably run into financial difficulties in trying to keep it going

Another reason why it can be a mistake to file too early is that development of the invention may not be completed. Designs may change during development or other inventive features may be introduced. If the patent specification has been drafted too early it may not be possible to amend it to reflect the changes made. One can end up with a patent, which does not really cover the final commercial product.


Academic Research

People carrying out academic research are frequently under pressure to publish the results of their research for academic reasons. Researchers should, at all times, bear in mind the possibility of commercial results from their research. If a researcher sees a commercial application from his or her research, it would be wise to delay publication until a patent application has been filed.

Applying for a Patent

The first step that people usually take in applying for a patent is to file a preliminary application in one country. When the application is filed, the date of application is recorded and this is called the "priority date". The first application can be quite basic and does not have to include a set of claims (see below). It is still an important document and specialist advice from a patent agent should be obtained in preparing it.

Most countries are signatories to an international convention, which guarantees that the priority date of an invention filed in one country will be respected in other countries, provided an application is filed in the other countries within twelve months of the date of filing the first application. This is why the first document filed can be very important later.

The system of filing an application in one country initially can be of great benefit to inventors provided they have timed it correctly. It allows up to twelve months before foreign applications must be filed. During this time the inventor can assess the commercial prospects of the invention, carry out improvements on it, and arrange the necessary finance for international patenting and commercial exploitation through manufacture and sale. This period is also used to assess the market potential for the invention in various countries and to decide in which countries the expense of patenting is justified. Note though the comments earlier about the dangers of underestimating the time it takes to do these things and the dangers of filing too early

Patent Specifications

The patent system is complex, and great skill is required in reducing the principle of an invention to words, which will have legal effect. Patent agents have detailed knowledge of the complex procedures in the various foreign patent systems and work with other patent agents throughout the world to obtain patent protection for an invention in different countries

A patent specification is written in a certain format, which may not be immediately obvious to the casual reader. The specification usually contains a preamble, which describes the background to the invention. Then comes a statement of invention, which is a legal statement of the scope of the onopoly sought. This is followed by a detailed description of the invention, usually drawings or examples of how the invention is carried out. The final part of the specification includes a set of claims.These are not normally required in the preliminary application but are a vital part of the final document. A claim in this sense has nothing to do with the conventional use of the word, and does not relate to the advantages or performance of the invention.A patent claim is where the patent agent sets out the scope or extent of the monopoly, which he claims on behalf of the inventor. In other words, one is claiming a territory of technology within which other people may not stray without infringing the patent. The scope of the patent is very important. One can imagine that a patent for a completely new type of engine would have a very broad scope whereas a patent for an improvement in one component of that engine might be quite limited in scope.

Examination

When patent specifications have been filed in the various countries the patent examiners in those countries examine them. These examiners carry out a search through previous patent specifications and other literature in order to ascertain if the invention is novel. They also look at the question of inventiveness in relation to the "prior art". As a result of the patent search, an examiner may feel that certain features of the invention have already been disclosed in previous specifications. correspondence then ensues between the patent examiner and the patent agent until the examiner is satisfied that the claims for the patent are allowable. This can often mean an amendment or narrowing of the scope of the patent claims until the Patent Office in question is satisfied that it does not overlap the "territory of technology" claimed by previous inventors. This stage of the patenting procedure is called "prosecution" and can involve the inventor or applicant in considerable expense depending on the amount of work required to be done by the patent agent. As part of the patent examination procedure, the specification filed by the applicant is published, usually eighteen months after the priority date. The Patent Office also publishes a list of previous patents, which were found to be of
relevance in the patent search. Thus, even if an inventor has not disclosed the invention in any way up to this point, the patent system itself will make a disclosure and destroy its novelty at this time. It is for this reason that inventions once disclosed cannot be the subject of subsequent patent applications either by the inventor or by anybody else.

When the Patent Office has satisfied itself concerning the scope of the claims,which are to be granted, notice of allowance of the patent will be issued and the patent will be granted. In some countries (not in Ireland) there is a period however during which interested parties may oppose the granting of the patent by lodging their grounds for opposition with the Patent Office. If no one is successful in opposing the grant of the patent, the Letters Patent Document is issued and the patent comes into force.

Infringement

If anybody attempts to make, use, or sell an invention, which is covered by a patent which is in force in a certain country, he or she may be sued in that country for infringement by the patentee. If infringement is proved, damages may be awarded to the owner of the patent. Patent litigation is notoriously expensive, and is not entered into lightly. The greater the commercial potential of an invention, the higher is the chance that the patent will be infringed or contested. The fact that a patent is granted does not automatically mean that the inventor is given full protection. A granted patent can in certain circumstances be invalid because certain information did not come to the attention of the patent examiner during the course of the examination. This could show, for example, that the invention was not in fact novel. A court decision may ultimately be needed before the inventorfinds out whether he is protected or not 
 

Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks

In this paper we performed a tradeoff analysis of energy consumption vs. QoS gain in reliability, timeliness, and security for redundancy management of clustered heterogeneous wireless sensor networks utilizing multipath routing to answer user queries. We developed a novel probability model to analyze the best redundancy level in terms of path redundancy (mp ) and source redundancy (ms ), as well as the best intrusion detection settings in terms of the number of voters (m) and the intrusion invocation interval (TIDS ) under which the lifetime of a heterogeneous wireless sensor network is maximized while satisfying the reliability, timeliness and security requirements of query processing applications in the presence of unreliable wireless communication and malicious nodes. Finally, we applied our analysis results to the design of a dynamic redundancy management algorithm to identify and apply the best design parameter settings at runtime in response to environment changes to prolong the system lifetime. For future work, we plan to explore more extensive malicious attacks in addition to packet dropping and bad mouthing attacks, each with different implications to energy, security and reliability, and investigate intrusion detection and multipath routing based tolerance protocols to react to these attacks. Another direction is to consider smart and insidious attackers which can perform more targeted attacks, capture certain strategic nodes with higher probability, alternate between benign and malicious behavior and collude with other attackers to avoid intrusion detection. Lastly, we plan to investigate the use of trust/reputation management [33], [36], [37] to strengthen intrusion detection through “weighted voting” leveraging knowledge of trust/reputation of neighbor nodes, as well as to tackle the “what paths to use” problem in multipath routing decision making for intrusion tolerance in WSNs. In situations where concurrent query traffic is heavy, we plan to explore trust-based admission control [38]–[40] to optimize application performance.
 

The file extension .WD3 , what it contain

i got a file in .WD3 extension ,  many questions in my mind

i noticed there`s a file "Descr.WD3" in each folder....
what is this file and how can i view his content?

or should i delete it??
So at last find an answer

Descr.wd3 files reside in each directory Offline Explorer creates and contain information regarding all downloaded files in the directory:
- file name
- original file URL
- date of the last modification on Web server (to check for updates)
- file MIME type as it was returned by Web server (this is useful for offline browsing)
- a sign, if a .primary file was created or not.

Although all these files could be deleted, it is not recommended because this may make Web site updates and offline browsing less reliable.
 

10 Things to Do after installing Linux Mint 15 olivia KDE

I just installed Linux Mint 15 KDE desktop ,its really awesome,

Here is some tips for the newbies

1.Keyboard Shortcuts for the KDE Desktop













2. update the system

 


 sudo apt-get update

sudo apt-get upgrade

3. Make LibreOffice look great
The menu-bar of Libreoffice looks ugly under KDE. But there is an easy way to fix it.
1. Remove libreoffice-kde4 packages
2. install kde-gtk-config
3. install gtk3-engine-oxygen
Now, go to desktop settings > application appearance > Gtk configuration
Here select oxygen-gtk in both GTK2 and 3 themes. Now, you Gtk apps will look beautiful and KDEfied.



4 Get your Android device working under Linux Mint(KDE)

Independent developers have done an incredible job at bringing Android support to GNU/Linux. In order to be able to connect and access your Android devices from KDE's Dolphin,  search for kio-mtp (select the version of Linux Mint you are running). If the package is still in 'testing/unstable' stage, LInux Mint will ask you to deliberately click on the button 'Show unstable package' so that you are aware of the fact) and then the rest it one-click install.
It will also add and enable that repo where the packages is hosted so you can get future updates automatically. Do the same process for 'libmtp' and once both these packages are installed, reboot your system. Now you can connect and access your Android devices from Linux Mint

 

Recover Formatted Deleted Data from your hard disk , USB , memory card


Recently I  unknowingly formatted my internal hard disk of laptop , about 500 GB of data lost . I got panic and i searched the ways to recover my data and i found a way using a opensource software called TestDisk , and its working , here is the step by step method

Requirements : Live bootable ubuntu or Linux Mint , i used Linux mint

install the test disk by

$sudo apt-get install testdisk

on terminal


after installing testdisk

go for recovery

1.open terminal
2. $sudo testdisk



3.



Log creation

  • Choose Create to instruct Testdisk to create a log file containing technical information and messages, unless you have a reason to append data to the logor you execute TestDisk from read only media and must create the log elsewhere.
  • Choose None if you do not want messages and details of the process to be written into a log file (useful if for example Testdisk was started from a read-only location).
  • Press Enter to proceed.


4. 

Disk selection


select the hard disk or device to recovered
  • Use up/down arrow keys to select your hard drive with the lost partition/s.
  • Press Enter to Proceed.

5. 

Partition table type selection


  • Select the partition table type - usually the default value is the correct one as TestDisk auto-detects the partition table type.
  • Press Enter to Proceed.

6.

Current partition table status



  • Use the default menu "Analyse" to check your current partition structure and search for lost partitions.
  • Confirm at Analyse with Enter to proceed.
he first partition is listed twice which points to a corrupted partition or an invalid partition table entry.
Invalid NTFS boot points to a faulty NTFS boot sector, so it's a corrupted filesystem.
Only one logical partition (label Partition 2) is available in the extended partition. One logical partition is missing.
  • Confirm at Quick Search to proceed.

Quick Search for partitions

  • Confirm according to your OS and created partitions to proceed.
7.

Save the partition table or search for more partitions?


http://www.cgsecurity.org/wiki/TestDisk_Step_By_Step

http://www.cgsecurity.org/wiki/TestDisk
 

Best Custom Rom for Galaxy Tab 2 7.0 P3100 with SlimBean (build 6) JB 4.2.2 Custom ROM

The Slim Bean platform is already available for the Samsung Galaxy S2, Galaxy S3 and even for the Galaxy S4, so you have nothing to worry about; those who have already tried the custom Jelly Bean 4.2.2 ROM had declared that the system is stable and is smoothly running on their devices. Therefore, if you want to power up the performances of your Tab 2 7.0 and improve the Android user experience that runs on the same, apply this tutorial and flash the SlimBean OS.The firmware is coming with the latest features available for the Android platform (some of the apps and capabilities are extra ones – cannot be found in the default version of the Jelly Bean software) and it is also based on stock JB ROM. So, installing Slim Bean firmware on the Galaxy Tab 2 7.0 P3100 is a must have, especially if you are looking into obtaining more power from your Android based tablet
  1. Download the firmware file and save the same on your computer.
  2. The download link is here.
  3. Don’t unzip the update file.
  4. Take the USB cable and by using the same connect your tablet with the computer.
  5. Select the downloaded file and copy-paste it from your PC to your handset.
  6. Disconnect the devices by unplugging the USB cord.
  7. Turn off your Tab 2.
  8. Reboot into recovery mode.
  9. Note: the recovery mode can be entered by pressing on Power, Volume UP and Home buttons at the same time.
  10. From the recovery menu select “wipe data factory reset” and “wipe cache partition”.
  11. Return by selecting “+++go back+++”.
  12. Select “install zip from SD card” followed by “choose zip from SD card”.
  13. Pick the Slim Bean ROM file from your tablet.
  14. Start the flashing procedure.
  15. Wait while the update is being applied.
  16. In the end, from recovery select “+++go back+++” followed by “reboot system now”.
  17. Note: if the first boot takes longer than usual, don’t panic there is nothing wrong with your handset.
  18. Note 2: if your tablet will get stuck in a boot loop, reboot into recovery and wipe the system once more.
  19. Note 3: if you don’t like the new software then reboot into recovery and choose to restore the previous OS – only if you had applied a Nandroid backup first.
So, that was all; now you know how to update your Samsung Galaxy Tab 2 7.0 to custom Android 4.2.2 Jelly Bean OS with the SlimBean ROM. Test the firmware and the new features and apps and then return here and share your experience with us and with the other users who might want to install the software on their tablets.
 

Path Delay Calculation in Wireless Sensor Networks using Matlab


Delay Measurement Time Synchronization 

For Wireless Sensor Networks 



A synchronized network time is essential for energy efficient scheduling, data fusion, localization and many other wireless sensor networks (WSN) applications. This paper studies the special issue of time synchronization in tiny sensor networking devices and presents a Delay Measurement Time Synchronization (DMTS) technique applicable for both single hop and multi-hop wireless sensor networks. DMTS is flexible and lightweight. For a single hop WSN of n nodes, it takes only one time broadcast to synchronize the network regardless the  value of n. As aresult it adds minimum network traffic and is energy efficient, because radio communication is a significant source of energy-consumption in a WSN. For a multi-hop WSN of n nodes, DMTS requires n time message exchanges in total in order to synchronize the whole network. 
DMTS is implemented in Berkeley motes within Tiny OS framework. It is a service available 
to TinyOS applications. Our test results show that DMTS achieves a time synchronization 
accuracy of 1 clock tick in single-hop WSNs. For a 2 hop WSN, the average time 
synchronization error is approximately 1.5 clock ticks. 
DMTS scheme is currently used in several applications running on Berkeley motes to provide 

network timestamps and global scheduling





Algorithm


1. deploy uniform random node distribution
i. unknown positions of sensor nodes
(for GSP or RSP strategy)
(or)
ii. known positions of sensor nodes
(for ISP, GASP or MonteCarlo strategy)
calculate candidate locations
2. iteration:
i. place sensor nodes
ii. place sink strategy
iii. connect all nodes
iv. check connectivity of network
v. choose the nearest sink
vi. calculate the maximum delay
3. repeat 2 according to the sink placement strategy
4. select the locations with minimum worst-case delay


######################################################################



A = [   0 5.518 0 0 0 8.276 13.794 0 0 0 0 0 0 0;

        4.622 0 4.622 0 0 0 13.865 0 0 0 0 0 0 0;
        0 1.241 0 3.724 0 0 7.448 0 0 0 0 0 0 0;
        0 0 1.442 0 2.883 0 5.766 0 4.325 0 0 0 0 0;
        0 0 0 3.068 0 1.524 6.136 4.602 0 0 0 0 0 0;
        1.616 0 0 0 4.848 0 9.696 0 0 0 0 0 0 0;
        6.350 6.350 6.350 6.350 6.350 6.350 2.540 0 0 0 0 0 0 22.859;
        0 0 0 0 1.260 0 0 0 2.520 0 0 0 3.779 5.039;
        0 0 0 1.274 0 0 0 2.549 0 3.823 0 0 0 5.097;
        0 0 0 0 0 0 0 0 1.646 0 2.469 0 0 1.646;
        0 0 0 0 0 0 0 0 0 1.877 0 2.503 0 1.252;
        0 0 0 0 0 0 0 0 0 0 2.390 0 1.792 1.195;
        0 0 0 0 0 0 0 1.195 0 0 0 1.793 0 4.780;
        0 0 0 0 0 0 4.252 4.252 4.252 6.378 7.654 7.654 6.378 1.701;
    ];
L = [];
U = [];
S = [20 20 30 30 30 30  60 30 30 20 20 20 20 60];
for i = 1:14
    s=0;
    u=0;
    k=0;
    for j = 1:14
        s = s + A(j,i);
        if(A(i,j)~=0)
            u = u + S(j);
        end
    end
    L = [L,s];
    U = [U,u];
end
E = [];
for i = 1:14
    s = L(i)/(U(i)-L(i));
    E = [E,s];
end
P = [];
n = input('No. of nodes in path : ');
for i = 1:n
    k = input('Node : ');
    P = [P,k];
end
delay = 0;
for i = 1:n
    delay = delay + E(P(i));
end

#####################################################################
 

Optimized Link State Routing Protocol (OLSR)

Optimized Link State Routing (OLSR) protocol for mobile ad hoc networks. The protocol is an optimization of the classical link state algorithm tailored to the requirements of a mobile wireless LAN. The key concept used in the protocol is that of multipoint relays (MPRs). MPRs are selected nodes which forward broadcast messages during the flooding process. This technique substantially reduces the message overhead as compared to a classical flooding mechanism, where every node retransmits each message when it receives the first copy of the message. In OLSR, link state information is generated only by nodes elected as MPRs. Thus, a second optimization is achieved by minimizing the number of control messages flooded in the network. As a third optimization, an MPR node may choose to report only links between itself and its MPR selectors. Hence, as contrary to the classic link state algorithm, partial link state information is distributed in the network. Thisinformation is then used for route calculation. OLSR provides optimal routes (in terms of number of hops). The protocol is particularly suitable for large and dense networks as the technique of MPRs works well in this contex



SAMPLE PROGRAM 

# ======================================================================
# Define options
# ======================================================================
set opt(chan)           Channel/WirelessChannel  ;# channel type
#set opt(prop)           Propagation/TwoRayGround   ;# radio-propagation model
set opt(prop)           Propagation/Shadowing   ;# radio-propagation model
set opt(netif)          Phy/WirelessPhy          ;# network interface type
set opt(mac)            Mac/802_11               ;# MAC type
set opt(ifq)            Queue/DropTail/PriQueue  ;# interface queue type
set opt(ll)             LL                       ;# link layer type
set opt(ant)            Antenna/OmniAntenna      ;# antenna model
set opt(ifqlen)         50                       ;# max packet in ifq
set opt(nn)             11                       ;# number of mobilenodes
set opt(adhocRouting)   OLSR                 ;# routing protocol

set opt(cp)             ""                       ;# connection pattern file
set opt(sc)             ""                       ;# node movement file.

set opt(x)              1000                     ;# x coordinate of topology
set opt(y)              1000                     ;# y coordinate of topology
set opt(seed) X
set opt(stop)           50                       ;# time to stop simulation

set opt(cbr-start)      5.0
set opt(cbr-stop)       45.0
set opt(pa-start)       7.0
set opt(pa-stop)        37.0
set opt(pa1-start)      9.0
set opt(pa1-stop)       39.0
# ============================================================================

#
# check for random seed
#
if {$opt(seed) > 0} {
    puts "Seeding Random number generator with $opt(seed)\n"
    ns-random $opt(seed)
}

#Ganho das antenas
Antenna/OmniAntenna set Gt_ 18.0
Antenna/OmniAntenna set Gr_ 18.0

Phy/WirelessPhy set bandwidth_ 11Mb

# frequencia (2.4 GHz 802.11b) {Alcance = 276 metros}
Phy/WirelessPhy set freq_ 2.4e+9

Mac/802_11 set dataRate_ 11Mb
Mac/802_11 set basicRate_ 2Mb

Propagation/Shadowing set pathlossExp_ 2.7       ;#expoente de perdas
Propagation/Shadowing set std_db_ 4.0           ;#desvio padrao (dB)
#Propagation/TwoRayGround set L_ 1.0

#
# create simulator instance
#
set ns_ [new Simulator]

#
# control OLSR behaviour from this script -
# commented lines are not needed because
# those are default values
#
Agent/OLSR set use_mac_              true
Agent/OLSR set debug_                true
Agent/OLSR set willingness           3
Agent/OLSR set hello_ival_           2
Agent/OLSR set tc_ival_              5
Agent/OLSR set mpr_algorithm_        1
Agent/OLSR set routing_algorithm_    1
Agent/OLSR set link_quality_         1
Agent/OLSR set fish_eye_             false
Agent/OLSR set link_delay_           false
Agent/OLSR set tc_redundancy_        1
Agent/OLSR set c_alpha_              0.6

#
# open traces
#
$ns_ use-newtrace
set tracefd  [open wtrace.tr w]
set namtrace [open simulation.nam w]
$ns_ trace-all $tracefd
$ns_ namtrace-all-wireless $namtrace $opt(x) $opt(y)

#
# create topography object
#
set topo [new Topography]

#
# define topology
#
$topo load_flatgrid $opt(x) $opt(y)

#
# create God
#
create-god $opt(nn)

#
# configure mobile nodes
#
$ns_ node-config -adhocRouting $opt(adhocRouting) \
                 -llType $opt(ll) \
                 -macType $opt(mac) \
                 -ifqType $opt(ifq) \
                 -ifqLen $opt(ifqlen) \
                 -antType $opt(ant) \
                 -propType $opt(prop) \
                 -phyType $opt(netif) \
                 -channelType $opt(chan) \
                 -topoInstance $topo \
                 -wiredRouting OFF \
                 -agentTrace ON \
                 -routerTrace ON \
                 -macTrace OFF

for {set i 1} {$i < $opt(nn)} {incr i} {
    set node_($i) [$ns_ node]
}

#
# positions

$node_(1) set X_ 160.0  #CAPACIT
$node_(1) set Y_ 485.0
$node_(1) set Z_ 15.0

$node_(2) set X_ 305.0  #DI
$node_(2) set Y_ 277.0
$node_(2) set Z_ 15.0

$node_(3) set X_ 340.0   #SECOM
$node_(3) set Y_ 226.0
$node_(3) set Z_ 15.0

$node_(4) set X_ 270.0  #Grad Basico
$node_(4) set Y_ 32.0
$node_(4) set Z_ 15.0

$node_(5) set X_ 476.0  #Reitoria
$node_(5) set Y_ 200.0
$node_(5) set Z_ 15.0

$node_(6) set X_ 628.0  #Incubadora
$node_(6) set Y_ 320.0
$node_(6) set Z_ 15.0

$node_(7) set X_ 570.0  #Musica
$node_(7) set Y_ 440.0
$node_(7) set Z_ 15.0

$node_(8) set X_ 780.0  #LABS
$node_(8) set Y_ 480.0
$node_(8) set Z_ 15.0

$node_(9) set X_ 918.0  #CT
$node_(9) set Y_ 597.0
$node_(9) set Z_ 15.0

$node_(10) set X_ 968.0  #Grad Profissional
$node_(10) set Y_ 550.0
$node_(10) set Z_ 15.0

# cores
$ns_ color 1 red
$ns_ color 2 blue
$ns_ color 3 yellow

# setup UDP connection
# CAPACIT -> GRAD PROFISSIONAL
set udp [new Agent/UDP]
$udp set class_ 1
set null [new Agent/Null]
$ns_ attach-agent $node_(1) $udp
$ns_ attach-agent $node_(10) $null
$ns_ connect $udp $null
$udp set fid_ 1

set cbr [new Application/Traffic/CBR]
$cbr set packetSize_ 40     # RTP + UDP + Payload
$cbr set rate_ 8Kb
$cbr attach-agent $udp
$ns_ at 5.0 "$cbr start"
$ns_ at 45.0  "$cbr stop"

#GRAD PROFISSIONAL -> CAPACIT
set udp1 [new Agent/UDP]
$udp1 set class_ 2
set null1 [new Agent/Null]
$ns_ attach-agent $node_(10) $udp1
$ns_ attach-agent $node_(1) $null1
$ns_ connect $udp1 $null1
$udp1 set fid_ 2

set cbr1 [new Application/Traffic/CBR]
$cbr1 set packetSize_ 40     # RTP + UDP + Payload
$cbr1 set rate_ 8Kb
$cbr1 attach-agent $udp1
$ns_ at 5.0 "$cbr1 start"
$ns_ at 45.0  "$cbr1 stop"

#REITORIA -> CAPACIT
set udp2 [new Agent/UDP]
$udp2 set class_ 3
set null2 [new Agent/Null]
$ns_ attach-agent $node_(5) $udp2
$ns_ attach-agent $node_(1) $null2
$ns_ connect $udp2 $null2
$udp2 set fid_ 3

set cbr2 [new Application/Traffic/CBR]
$cbr2 set packetSize_ 40     # RTP + UDP + Payload
$cbr2 set rate_ 8Kb
$cbr2 attach-agent $udp2
$ns_ at 7.0 "$cbr2 start"
$ns_ at 45.0  "$cbr2 stop"

#CAPACIT -> REITORIA
set udp3 [new Agent/UDP]
$udp3 set class_ 4
set null3 [new Agent/Null]
$ns_ attach-agent $node_(1) $udp3
$ns_ attach-agent $node_(5) $null3
$ns_ connect $udp3 $null3
$udp3 set fid_ 4

set cbr3 [new Application/Traffic/CBR]
$cbr3 set packetSize_ 40     # RTP + UDP + Payload
$cbr3 set rate_ 8Kb
$cbr3 attach-agent $udp3
$ns_ at 7.0 "$cbr3 start"
$ns_ at 45.0  "$cbr3 stop"

#REITORIA -> CT
set udp4 [new Agent/UDP]
$udp4 set class_ 5
set null4 [new Agent/Null]
$ns_ attach-agent $node_(5) $udp4
$ns_ attach-agent $node_(9) $null4
$ns_ connect $udp4 $null4
$udp4 set fid_ 5

set cbr4 [new Application/Traffic/CBR]
$cbr4 set packetSize_ 40     # RTP + UDP + Payload
$cbr4 set rate_ 8Kb
$cbr4 attach-agent $udp4
$ns_ at 9.0 "$cbr4 start"
$ns_ at 45.0  "$cbr4 stop"

#CT -> REITORIA
set udp5 [new Agent/UDP]
$udp5 set class_ 6
set null5 [new Agent/Null]
$ns_ attach-agent $node_(9) $udp5
$ns_ attach-agent $node_(5) $null5
$ns_ connect $udp5 $null5
$udp5 set fid_ 6

set cbr5 [new Application/Traffic/CBR]
$cbr5 set packetSize_ 40     # RTP + UDP + Payload
$cbr5 set rate_ 8Kb
$cbr5 attach-agent $udp5
$ns_ at 9.0 "$cbr5 start"
$ns_ at 45.0  "$cbr5 stop"

#DI -> CT
set udp6 [new Agent/UDP]
$udp6 set class_ 7
set null6 [new Agent/Null]
$ns_ attach-agent $node_(2) $udp6
$ns_ attach-agent $node_(9) $null6
$ns_ connect $udp6 $null6
$udp6 set fid_ 7

set cbr6 [new Application/Traffic/CBR]
$cbr6 set packetSize_ 40     # RTP + UDP + Payload
$cbr6 set rate_ 8Kb
$cbr6 attach-agent $udp6
$ns_ at 11.0 "$cbr6 start"
$ns_ at 45.0  "$cbr6 stop"

#CT -> DI
set udp7 [new Agent/UDP]
$udp7 set class_ 8
set null7 [new Agent/Null]
$ns_ attach-agent $node_(9) $udp7
$ns_ attach-agent $node_(2) $null7
$ns_ connect $udp7 $null7
$udp7 set fid_ 8

set cbr7 [new Application/Traffic/CBR]
$cbr7 set packetSize_ 40     # RTP + UDP + Payload
$cbr7 set rate_ 8Kb
$cbr7 attach-agent $udp7
$ns_ at 11.0 "$cbr7 start"
$ns_ at 45.0  "$cbr7 stop"

#SECOM -> LABS
set udp8 [new Agent/UDP]
$udp8 set class_ 9
set null8 [new Agent/Null]
$ns_ attach-agent $node_(3) $udp8
$ns_ attach-agent $node_(8) $null8
$ns_ connect $udp8 $null8
$udp8 set fid_ 9

set cbr8 [new Application/Traffic/CBR]
$cbr8 set packetSize_ 40     # RTP + UDP + Payload
$cbr8 set rate_ 8Kb
$cbr8 attach-agent $udp8
$ns_ at 13.0 "$cbr8 start"
$ns_ at 45.0  "$cbr8 stop"

#LABS -> SECOM
set udp9 [new Agent/UDP]
$udp9 set class_ 10
set null9 [new Agent/Null]
$ns_ attach-agent $node_(8) $udp9
$ns_ attach-agent $node_(3) $null9
$ns_ connect $udp9 $null9
$udp9 set fid_ 10

set cbr9 [new Application/Traffic/CBR]
$cbr9 set packetSize_ 40     # RTP + UDP + Payload
$cbr9 set rate_ 8Kb
$cbr9 attach-agent $udp9
$ns_ at 13.0 "$cbr9 start"
$ns_ at 45.0  "$cbr9 stop"

#DI -> SECOM
set udp10 [new Agent/UDP]
$udp10 set class_ 11
set null10 [new Agent/Null]
$ns_ attach-agent $node_(2) $udp10
$ns_ attach-agent $node_(3) $null10
$ns_ connect $udp10 $null10
$udp10 set fid_ 11

set cbr10 [new Application/Traffic/CBR]
$cbr10 set packetSize_ 40     # RTP + UDP + Payload
$cbr10 set rate_ 8Kb
$cbr10 attach-agent $udp10
$ns_ at 15.0 "$cbr10 start"
$ns_ at 45.0  "$cbr10 stop"

#SECOM -> DI
set udp11 [new Agent/UDP]
$udp11 set class_ 12
set null11 [new Agent/Null]
$ns_ attach-agent $node_(3) $udp11
$ns_ attach-agent $node_(2) $null11
$ns_ connect $udp11 $null11
$udp11 set fid_ 12

set cbr11 [new Application/Traffic/CBR]
$cbr11 set packetSize_ 40     # RTP + UDP + Payload
$cbr11 set rate_ 8Kb
$cbr11 attach-agent $udp11
$ns_ at 15.0 "$cbr11 start"
$ns_ at 45.0  "$cbr11 stop"

#
# configurando trafego de background - pareto
#
# DI -> LABS
set tcp [new Agent/TCP]
$tcp set class_ 13
set sink [new Agent/TCPSink]
$ns_ attach-agent $node_(2) $tcp
$ns_ attach-agent $node_(8) $sink
$ns_ connect $tcp $sink
$tcp set fid_ 13

set p [new Application/Traffic/Pareto]
$p set packetSize_ 210
$p set burst_time_ 500ms
$p set idle_time_ 500ms
$p set rate_ 200k
$p set shape_ 1.5
$p attach-agent $tcp
$ns_ at 6.0 "$p start"
$ns_ at 35.0  "$p stop"

# GRAD BASICO -> CT
set tcp1 [new Agent/TCP]
$tcp1 set class_ 14
set sink1 [new Agent/TCPSink]
$ns_ attach-agent $node_(4) $tcp1
$ns_ attach-agent $node_(9) $sink1
$ns_ connect $tcp1 $sink1
$tcp1 set fid_ 14

set p1 [new Application/Traffic/Pareto]
$p1 set packetSize_ 210
$p1 set burst_time_ 500ms
$p1 set idle_time_ 500ms
$p1 set rate_ 200k
$p1 set shape_ 1.5
$p1 attach-agent $tcp1
$ns_ at 8.0 "$p1 start"
$ns_ at 35.0  "$p1 stop"

#SECOM -> GRAD PROFISSIONAL
set tcp2 [new Agent/TCP]
$tcp2 set class_ 15
set sink2 [new Agent/TCPSink]
$ns_ attach-agent $node_(3) $tcp2
$ns_ attach-agent $node_(10) $sink2
$ns_ connect $tcp2 $sink2
$tcp2 set fid_ 15

set p2 [new Application/Traffic/Pareto]
$p2 set packetSize_ 210
$p2 set burst_time_ 500ms
$p2 set idle_time_ 500ms
$p2 set rate_ 200k
$p2 set shape_ 1.5
$p2 attach-agent $tcp2
$ns_ at 10.0 "$p2 start"
$ns_ at 35.0  "$p2 stop"


## Label the Special Node in NAM
$ns_ at 0.0 "$node_(1) label CAPACIT"
$ns_ at 0.0 "$node_(2) label Dep_Informatica"
$ns_ at 0.0 "$node_(3) label SECOM"
$ns_ at 0.0 "$node_(4) label Grad_Basico"
$ns_ at 0.0 "$node_(5) label Reitoria"
$ns_ at 0.0 "$node_(6) label Incubadora"
$ns_ at 0.0 "$node_(7) label Musica"
$ns_ at 0.0 "$node_(8) label Laboratorios"
$ns_ at 0.0 "$node_(9) label Centro_Tec"
$ns_ at 0.0 "$node_(10) label Grad_Profissional"

#
# print (in the trace file) routing table and other
# internal data structures on a per-node basis
#
#$ns_ at 5.0 "[$node_(1) agent 255] print_rtable"
#$ns_ at 5.0 "[$node_(2) agent 255] print_rtable"
#$ns_ at 5.0 "[$node_(3) agent 255] print_rtable"
#$ns_ at 5.0 "[$node_(4) agent 255] print_rtable"
#$ns_ at 5.0 "[$node_(5) agent 255] print_rtable"
#$ns_ at 5.0 "[$node_(6) agent 255] print_rtable"
#$ns_ at 5.0 "[$node_(7) agent 255] print_rtable"
#$ns_ at 5.0 "[$node_(8) agent 255] print_rtable"
#$ns_ at 5.0 "[$node_(9) agent 255] print_rtable"
#$ns_ at 5.0 "[$node_(10) agent 255] print_rtable"
#$ns_ at 5.0 "[$node_(1) agent 255] print_linkset"
#$ns_ at 5.0 "[$node_(1) agent 255] print_nbset"
#$ns_ at 5.0 "[$node_(1) agent 255] print_nb2hopset"
#$ns_ at 5.0 "[$node_(1) agent 255] print_mprset"
#$ns_ at 5.0 "[$node_(1) agent 255] print_mprselset"
#$ns_ at 5.0 "[$node_(1) agent 255] print_topologyset"

#
# source connection-pattern and node-movement scripts
#
if { $opt(cp) == "" } {
    puts "*** NOTE: no connection pattern specified."
    set opt(cp) "none"
} else {
    puts "Loading connection pattern..."
    source $opt(cp)
}
if { $opt(sc) == "" } {
    puts "*** NOTE: no scenario file specified."
    set opt(sc) "none"
} else {
    puts "Loading scenario file..."
    source $opt(sc)
    puts "Load complete..."
}

#
# define initial node position in nam
#
for {set i 1} {$i < $opt(nn)} {incr i} {
    $ns_ initial_node_pos $node_($i) 20
}

#
# tell all nodes when the simulation ends
#
for {set i 1} {$i < $opt(nn) } {incr i} {
    $ns_ at $opt(stop).0 "$node_($i) reset";
}

$ns_ at $opt(stop).0002 "puts \"NS EXITING...\" ; $ns_ halt"
$ns_ at $opt(stop).0001 "stop"

proc stop {} {
    global ns_ tracefd namtrace
    $ns_ flush-trace
    close $tracefd
    close $namtrace
}

#
# begin simulation
#
puts "Starting Simulation..."

$ns_ run
 
 
Support : Ebin EPhrem | Ebin Ephrem | #Gabbarism
Copyright © 2011. Services | Embedded Support | Reviews | Virtual Technologys - All Rights Reserved
Template Created by ebinephrem.com Published by Ebin Ephrem
Proudly powered by Blogger