Online Notice Board
Online Notice Board
Online Notice Board
On
BACHELOR OF TECHONOLOGY
IN
Submitted By:
We hereby declare that the project entitled “Online Notice Board” submitted for the B. Tech. (CSE)
degree is our original work and the project has not formed the basis for the award of any other degree,
diploma, fellowship or any other similar titles.
This is to certify that the project entitled “Online Notice Board” is the bonafide work of Shubham
Rai and Vikas Gupta submitted in partial fulfillment of the requirements for the award of the degree of
Bachelor of Technology (B.tech) in Computer Science and Engineering (CSE) by APJ Abdul Kalam
Technical University, Lucknow during the academic year 2017-2018.
Head of Department
Dr. Amit Singhal
Department of CSE
ACKNOWLEDGMENT
We take this opportunity to express our sincere thanks and deep gratitude to our project guide Dr. Amit
Singhal who shared his time and knowledge with us and helped in completing this project successfully.
We with the immense pleasure and heartfelt gratitude; express our sincere thanks to our project
coordinators Mr. Ramveer Singh & Ms. Preeti Dubey for their useful suggestions, continuous
guidance, and moral support for the progress of my work.
We express our sincere gratitude to Prof. (Dr.) Amit Singhal, Head of Department (CSE) for his strict
supervision, constant encouragement, inspiration and guidance. His inspiring suggestions and timely
guidance enabled me/us to perceive the various aspects of the project with a new vision.
We are very much grateful to our parents for their support and faith they showed in us. Last but not the
least our friends for being there round the clock whenever we needed them.
Abstract
An online notice board is a place where people can leave any types of messages and
notifications, for example, to advertise things, announce events or provide any information. Notice
board online it can be placed on digital devices such computers, tabs, mobile phones etc. This online
notice board project is very helpful for all type of users like existing users and new users. So admin can
leave and erase notification for other people to read and see. The main aim of this free online notice
board project is make information dissemination much easier in a paperless community as the world
tends to interact with the online notice board facility as an project, Online notice board admin can send
the notification to the particular students regarding fee payments, results, any new activity happen in
college campus or college fest participation, libraries dues, hostel room payments, any workshop
registrations, warnings and reminders etc. for this work online notice board project is make all work
much easier and understandable to all.
This online notice board work generally intends to act as a support system for the all users. By
the help of free online notice board users can access the notifications and articles quickly not only in
the particular premises, also wherever and whenever they need to know. Online notice board usability
is fully capable of passing relevant notices and announcements, and keeping the users update from time
to time. The students are kept updated each time with the online notice board for college is uploaded
based on their preferences with respect to the departments and categories through a notice board online.
Online notice board is one of the applications to improve the usage of notice board of the college by
making it available online.
Table of Contents
Title Page i
Declaration of the Student ii
Certificate of the Guide iii
Acknowledgement iv
Abstract v
List of Figures vi
List of Tables (optional) vii
Timeline / Gantt Chart viii
1. INTRODUCTION 1
1.1 Problem Definition 2
1.2 Project Overview/Specifications 3
1.3 Hardware Specification 4
1.4 Software Specification 4
2. LITERATURE SURVEY 5
2.1 Existing System 6
2.2 Proposed System 7
2.3 Feasibility Study 8
3 SYSTEM ANALYSIS & DESIGN 10
3.1 Requirement Specification 11
3.2 Use Case Diagrams 13
3.3 DFD’s 14
3.4 Design & steps 16
3.5 Algorithms and Pseudo Code 19
3.6 Testing Process 29
4. RESULTS / OUTPUTS 31
5. CONCLUSIONS 36
6. REFERENCES 38
7. APPENDICES 40
7.1 Papers Published in Journals 41
7.2 Certificates of the Papers Published 56
List of Figures
3.2 Use Case Diagram 13
3.3 DFD’s 14
3.3.1 Level 1 DFD 14
3.3.2 Level 2 DFD 14
3.3.3 Level 3 DFD 15
CHATER 1
INTRODUCTION
1
INTRODUCTION
A Notice Board is a traditional tool for the dissemination of information in academic campuses. A
traditional Notice board is made of a wooden frame with a soft central square of cork for pinning the
papers of information for the students. In any College there is a lot of on wall notice boards placed on
different location where by people with their announcements type on a sheet of paper and place it on
the notice boards for other people to read when passing through those notice boards. Thus there is a lot
of accumulation of papers due to carelessness of people who place them and no one who is responsible
for removing it. And hence there is a lot of strain on the people who having announcements in hand by
making sure that the announcements are placed everywhere, all these comes because the software is not
used in this context.
The Online Notice Board System is intended for colleges and institutions where information and file
sharing on regular basis plays vital role in the performance. The proposed system will act as an online
notice board which will make use of the modern communication methodologies and techniques for
information flow. The system is planned to consist of various useful features for the said purpose. The
proposed system aims to create a platform for issuing notice, sharing information and files between the
members of the institution. Different users shall have different level of access to the content. In the
context of a college, there shall be four users of the software – administrator, student, teachers and
guest. The administrator shall be able to issue notice, upload files, and view students’ activities on the
software. The teacher shall be able to issue notice, upload files (on a general basis or to a particular
classroom), and view result and students’ activities. The student shall be able to upload/download files,
submit to faculty/teacher and view result. A guest will simply be able to view public notices.
With the diversity of technologies available, finding the most convenient server software and
programming language to develop a website is always an area of concern. Even more, implementing an
online notice board requires more than just a fast accessible website, but also, one that supports
concurrent views, and changes to the notice board seamlessly.
2
1.1 PROBLEM DEFINITIONS
In today’s world, everything is digitalized and paper is being used less and less every day. How often
has it happened that we miss some important notice because we have to go to a wall and read the notice
there? There are dedicated file hosting sites and clouds used by some institutions, but there is a definite
need for a dedicated noticeboard system. The proposed system is such a system. In the college or
institutions there are many problems, distinguish is between rumor and true information. At times dates
are changed and change of plan is very poorly communicated to the students and faculty, which creates
confusion. In case of an Online Notice Board students will have access to important announcements
while walking around anywhere or not having in the campus and have the benefit of being reminded
several times a day.
To develop a web application that will help us receiving the notices from the college, anywhere,
anytime. Earlier there was problem that notices were posted on notice board. If there is holiday on the
next day, nobody will be able to read it.
Online Notice Board simply helps a student to access any type of information related to their college,
their department or their section/class. Having a notice board portal in college also helps the faculties
and college administration easily reach out to the students.
The Online Notice Board provide the facility of approaching each and every student in the minimum
amount of time and effort. The advantage of Online Notice Board in a college or institutions are
following:
3
1.3 HARDWARE SPECIFICATIONS
The system will interact with the hardware resources of the system on which it is running. While any
system will support the core software, a device with push messaging facility is recommended for
Windows 8 or Windows 10. The main hardware requirements for this web application are following:
Operating System- Windows Server, Linux, or any operating system that can run as a webserver,
capable of delivering HTML5 content, including JSON and MP4.
Processor- Intel® Celeron® Processor 847, 1.10 GHz, or equivalent.
Storage- Between 1.3 GB - 2.3 GB depending on the language version.
RAM- Minimum of 512 MB. The recommended amount can vary depending on number of users
connected, number of websites hosted on the device, and other factors.
Hard Disk- 3 GB of available hard-disk space for installation; additional free space is required
during installation. You cannot install on removable flash storage devices.
Any operating system such as Windows, Mac or Linux is the basic requirement for the web application.
The main requirements in the form of software for a web application is following:
4
CHAPTER 2
LITERATURE
SURVEY
5
Almost all leading institutions, excepting a few, currently lack an Online Notice Board system. Though
some have taken the aid of third-party websites like Facebook to interact, it comes at the cost of mixing
one’s social life with professional. Keeping this in mind, educational institutes will find this software
extremely useful. There are dedicated file hosting sites and clouds used by some institutions, but there
is a definite need for a dedicated noticeboard system. The proposed system is such a system.
Currently our college has manual system of putting notices on notice board. It’s outdated now. As
nobody has a time to stand in rush in order to read the notices on noticeboard. The limitations of the
existing system are following:
2.1.1. Order of Data: Notice can get out of order in traditional notice board system. If someone
accidentally puts some data in the wrong place, it can lead to lost data. Automated notice management
systems allow users to quickly check whether information already exists somewhere in the system,
which helps avoid problems like redundant data.
2.1.2. Complexity: Automated system is less complex than manual system of handling notices,
which can make it easier for untrained people to access and manipulate data. Anyone having the basic
knowledge of mobiles can work on the automated system.
2.1.3. Inconsistency of data: There will be an unavailability for future use, since notice might get
misplaced during manual notices management. So notice won’t be preserved properly for future use.
2.1.4. Damage: Manual notices stack are vulnerable to damage, destruction and theft in ways that
digital databases are not. A company may back up its digital data both on site and at offsite locations,
ensuring its security if the office building suffered a fire or similar disaster. A manual database,
however, may only exist in one place without any copies. As a result, a manual database would be very
vulnerable to a fire or other natural disaster. In addition, while access time in a manual database
system, information must be found by hand rather than electronically. While a digital database will
typically allow users to search the entire database for specific information in seconds, someone looking
for information in a manual system may have to spend hours searching for a particular piece of data.
6
2.1.5. Editing and Communication: Manual notices do not allow users to easily edit data or
information. Manual notices often cannot be edited directly, forcing users to make new copies. To
circulate notice on paper, users must require peons and other staff. Online Notice Board allow users to
edit information fields directly, and because data is stored digitally, it is already in a form that can be
easily transmitted.
2.2.1. To eliminate wastage of time and energy: Online Notice Board application will be
able to save lot of paper and time. It directs both teacher and pupil’s energy and attention to one thing
at a time by placing proper persons at their proper places at the proper time. Everything will be
instantaneous.
2.2.2. To avoid duplication and overlapping: This application will help to remove the
duplicity of notices. Only one person, who is admin can post the notice. No one else would be able to
do so. So student and staff will be given correct information all the time.
2.2.3. To ensure due attention of student to each and every notice: Online Notice Board
application ensures that everyone has kind attention to every notice and updates going on in college.
There will be a buzz at each and every notice to drive the attention of student to check it once. In this
way, students will be well informed about their college activities.
2.2.4. To bring system into college life: It would be dire need of all colleges as it’s easy and
shortcut method to inform all the students. In the absence of proper notification system will make it
very difficult to inform students at right time.
2.2.5. Searching a particular Notice: This application allows you search the notice very easily
through title of notice. If anyone forgets about the notice details, he can search it out very easily.
2.2.6. Free Service: It gives free service to notify all the students. There will be no cost of sending
notification to all. Just have the good system implemented in college and that too free of cost.
7
2.2.7. Prevent Crowd in College: As you can see, there is always a crowd at notice board. As
notice board is one, and people to see notice are more. With this application there will be no more
crowd. Everyone will be well informed even at their homes. So they are free to do there other work.
2.2.9. Anytime Anywhere Service: With this application, notices will be delivered anytime and
at any place. There is no restriction of time to send a notice.
2.2.10. Keeping Notices at one place: This application allow you to have notices in one place
only. If there is an attachment with that, all will be placed in a separate folder dedicated to that
application. So there will be no here and there of notices.
8
• Does the necessary technology exist to do what is suggested?
• Do the proposed equipment’s have the technical capacity to hold the data required to use the
new system?
• Will the proposed system provide adequate response to inquiries, regardless of the number or
location of users?
• Can the system be upgraded if developed?
• Are there technical guarantees of accuracy, reliability, ease of access and data security?
Earlier no system existed to cater to the needs of Secure Infrastructure Implementation System.
The current system developed is technically feasible. It is a web based user interface. Thus it provides
an easy access to the users. The databases purpose is to create, establish and maintain a work- flow
among various entities in order to facilitate all concerned users in their various capacities or roles.
Permission to the users would be granted based on the roles specified. Therefore, it provides the
technical guarantee of accuracy, reliability and security. The software and hardware requirements for
the development of this project are not many and are already available as free as open source. The work
for the project is done with the current equipment and existing software technology. Necessary
bandwidth exists for providing a fast feed- back to the users irrespective of the number of users using
the system.
2.3.2. Operational Feasibility: Under this category of service we conduct a study to analysis and
determine whether your need can be fulfilled by using a proposed solution. The result of our
operational feasibility Study will clearly outline that the solution proposed for your business is
operationally workable and conveniently solves your problems under consideration after the proposal is
implemented. We would precisely describe how the system will interact with the systems and persons
around. Our feasibility report would provide results of interest to all stakeholders. It will do as per
the needs of the business requirements.
2.3.3. Timeline Feasibility: It is important to understand that a need must be fulfilled when it has
to be. Some otherwise feasible and highly desirable projects can become non-feasible due to very
restrictive timeline constraints. This fact makes it imperative that milestones are clearly linked to the
timeline and projects are well conceived with safe unforeseen margins. We make sure that we strictly
follow what has been stated above.
9
CHAPTER 3
SYSTEM
ANALYSIS
AND DESIGN
10
3.1 Requirement Specification
3.1.1 Major Functional Requirements:
The system should meet the following functional requirements:
The system should be able to manage and store notices and files.
The system should provide appropriate UI for notice and file upload and download.
The system should be able to recognize and authenticate several levels of users.
The system should be able to manage and maintain a proper database.
The system should be easily operable and user friendly.
The apps should be able to work seamlessly with the web server.
The apps should be able to provide push messaging in real time, whenever available.
11
performance requirements. Except viewing pre-loaded notices and files, an internet connection is
needed for the features of the system to become available.
3.1.3.2 Safety Requirements: Major attention should be given to the safety and security of the
data and information that are stored in the software. The database must be trustworthy and non-leakage
to ensure no data loss occurs.
3.1.3.3Security Requirements: User authentication must be absolute and non-by-passable. No
user should be able to access the software without providing proper authentication. In case of guest
users, only public notices and events should be visible. Also, the IP address of the client machine can
be recorded for future follow up of any security issues that may arise.
3.1.3.4 Software Quality Attributes Several additional qualities and characteristics of the
system will be important to the client and/or the developers, like correctness, maintainability,
portability, testability and usability. For correctness, proper care and attention should be given during
the design and coding from both developers and customer (should correct some false and unwanted
features) side. Usability is achieved by developing the product as user friendly as possible. Similarly,
maintainability and testability plays vital role in the long.
12
3.2 Use Case Diagrams
13
3.3 Data Flow Diagram:
3.3.1 LEVEL 0 DFD:
14
3.3.3 LEVEL 2 DFD:
15
3.4 Design & steps
A design approach is a general philosophy that may or may not include a guide for specific methods.
Some are to guide the overall goal of the design. Other approaches are to guide the tendencies of the
designer. A combination of approaches may be used if they don’t conflict.
Function Oriented Design Approach is partitioning of a design into subsystems and modules, with each
one handling one or more functions. Contrast with object-oriented design, data-structure-oriented
design. This application project uses function oriented design approach. Every module and sub
modules are made, based on their functionality. These modules are designed and implemented
separately and then they are integrated together to form the desired application. This web application
contains two types of user:
User
Admin
Both the user are having different works. User have to check the notices and work on these notices.
Admin has a different work such as Add Notice, Delete Notice, and Update Notice Etc. The working of
both user and admin are described below:
3.4.1. User: The working procedure of user is described below:
3.4.1.1. Registering a User: The first step in this web application is to get the users registered to
the website. For this, user will provide all the necessary details such as Name, Email id, Roll No. etc.
and press the register button. After that, all the information along with registration id is stored on Web
Server and the user gets registered.
3.4.1.2. User Login: After registering, the user is allowed to log in. Username and password after
validating at client side, is sent to server side to authentication. After authentication response is sent by
the server to client, and then user gets logged in.
3.4.1.3. Viewing the Notices: At the first time, when you are using this application for the first
time, it will fetch all the notices from server. In all the other case, all previous notices are fetched from
application’s own database stored inside client mobile. It then checks for new notices from the server.
If there are new notices on the server, it will fetch all those notices.
3.4.1.4. Searching a Notice: The user is able to search the notice in list view depending on the
title of the notice. It helps user to get the desired notice instantly.
16
3.4.1.5. Reset Password: This application also has the facility to reset the password. If one user
has forgot his password, he/she can rest the password by giving his username or email address. The
user will be given a page in which he can set his new password. Forgotten password will be updated
with the new one on the server.
3.4.2 Admin: The working of admin is described following:
3.4.2.1 Add Notice: Being an admin, the most important work is to add the notice on the online
notice board. Since the right of adding notice to the web application is only at the admin, hence it is
very important to be sincere in performing this work. Any type of small mistake can create some big
issues.
3.4.2.2 Delete Notice: An admin can perform too many work on this web application and delete
notice is one of them. If a notice is useless i.e. the time has been passed for that notice then the admin
can delete that notice.
3.4.2.3 Update Notice: Updating the notice is not a primary work of admin but sometimes as per
the requirements it is important to update any notice.
Database Design
Database design is the process of producing a detailed data model of a database. This logical data
model contains all the needed logical and physical design choices and physical storage parameters
needed to generate a design in a data definition language, which can then be used to create a database.
A fully attributed data model contains detailed attributes for each entity. The term database design can
be used to describe many different parts of the design of an overall database system. Principally, and
most correctly, it can be thought of as the logical design of the base data structures used to store the
data. In the relational model these are the tables and views. In an object database the entities and
relationships map directly to object classes and named relationships. However, the term database
design could also be used to apply to the overall process of designing, not just the base data structures,
but also the forms and queries used as part of the overall database application within the database
management system (DBMS). The process of doing database design generally consists of a number of
steps which will be carried out by the database designer. Usually, the designer must:
• Determine the relationships between the different data elements.
• Superimpose a logical structure upon the data on the basis of these relationships.
17
Design process
1. Determine the purpose of the database - This helps prepare for the remaining steps.
2. Find and organize the information required - Gather all of the types of information to record in the
database, such as product name and order number.
3. Divide the information into tables - Divide information items into major entities or subjects, such as
Products or Orders. Each subject then becomes a table.
4. Turn information items into columns - Decide what information needs to be stored in each table.
Each item becomes a field, and is displayed as a column in the table. For example, an Employees table
might include fields such as Last Name and Hire Date.
5. Specify primary keys - Choose each table’s primary key. The primary key is a column, or a set of
columns, that is used to uniquely identify each row. An example might be Product ID or Order ID.
6. Set up the table relationships - Look at each table and decide how the data in one table is related to
the data in other tables. Add fields to tables or create new tables to clarify the relationships, as
necessary.
7. Refine the design - Analyze the design for errors. Create tables and add a few records of sample data.
Check if results come from the tables as expected. Make adjustments to the design, as needed.
8. Apply the normalization rules - Apply the data normalization rules to see if tables are structured
correctly. Make adjustments to the tables
18
3.5 Algorithms and Pseudo Code
3.5.1. Index. php
<? php
include('connection.php');
session_start();
?>
<html>
<head>
<title>Online Notice Board</title>
<link rel="stylesheet" href="css/bootstrap.css"/>
<script src="js/jquery_library.js"></script>
<script src="js/bootstrap.min.js"></script>
</head>
<body>
<nav class="navbar navbar-default navbar-fixed-top" style="background:#000">
<div class="container">
<ul class="nav navbar-nav navbar-left">
<li><a href="index.php"><strong>Online Notice Board</strong></a></li>
<li><a href="index.php?option=contact"><span class="glyphicon glyphicon-
phone"></span>Contact</a></li>
</ul>
<ul class="nav navbar-nav navbar-right">
<li><a href="index.php?option=New_user"><span class="glyphicon glyphicon-user"></span>
Sign Up</a></li>
<li><a href="index.php?option=login"><span class="glyphicon glyphicon-log-in"></span>
Login</a></li>
</ul>
</div>
</nav>
<div class="container-fluid">
<!-- slider -->
<div id="carousel-example-generic" class="carousel slide" data-ride="carousel">
<!-- Indicators -->
<ol class="carousel-indicators">
<li data-target="#carousel-example-generic" data-slide-to="0" class="active"></li>
<li data-target="#carousel-example-generic" data-slide-to="1"></li>
19
<li data-target="#carousel-example-generic" data-slide-to="2"></li>
</ol>
<!-- Wrapper for slides -->
<div class="carousel-inner" role="listbox">
<div class="item active">
<img style="height:600px;width:100%" src="images/bbd 1.jpg" alt="...">
<div class="carousel-caption">
</div>
</div>
<div class="item">
<img style="height:600px;width:100%;" src="images/bbd 2.jpg" alt="...">
<div class="carousel-caption">
</div>
</div>
<div class="item">
<img style="height:600px;width:100%;" src="images/bbd 3.jpg" alt="...">
<div class="carousel-caption">
</div>
</div>
</div>
<!-- Controls -->
<a class="left carousel-control" href="#carousel-example-generic" role="button" data-slide="prev">
<span class="glyphicon glyphicon-chevron-left" aria-hidden="true"></span>
<span class="sr-only">Previous</span>
</a>
<a class="right carousel-control" href="#carousel-example-generic" role="button" data-slide="next">
<span class="glyphicon glyphicon-chevron-right" aria-hidden="true"></span>
<span class="sr-only">Next</span>
</a>
</div>
<!-- slider end-->
20
</div>
<div class="container">
<div class="row">
<!-- container -->
<div class="col-sm-8">
<?php
@$opt=$_GET['option'];
if($opt!="")
{
if($opt=="contact")
{
include('contact.php');
}
else if($opt=="New_user")
{
include('registration.php');
}
else if($opt=="login")
{
include('login.php');
}
else
{
echo "
<h1>Welcome to the College Notice Portal !</h1>";
}
?>
</div>
<!-- container -->
<div class="col-sm-4">
<div class="panel panel-default">
21
<div class="panel-heading">Latest news</div>
<div class="panel-body">
<p><marquee behavior="scroll" align="middle" direction="left" bgcolor="ORANGE"
scrollamount="10" onmouseover="this.stop()" onmouseout="this.start()"><a href="">Schedule of 3rd
Sessional</a></marquee></p>
<p><marquee behavior="scroll" align="middle" direction="left" bgcolor="ORANGE"
scrollamount="10" onmouseover="this.stop()" onmouseout="this.start()"><a href="">Cultural Event
Schedule</a></marquee></p>
<p><marquee behavior="scroll" align="middle" direction="left" bgcolor="ORANGE"
scrollamount="10" onmouseover="this.stop()" onmouseout="this.start()"><a href="">Cricket
Tournament Schedule</a></marquee></p>
</div>
</div>
</div>
</div>
</div>
<br/>
<br/>
<br/>
<!-- footer-->
<nav class="navbar navbar-default navbar-bottom" style="background:black">
<div class="container">
<ul class="nav navbar-nav navbar-left">
</ul>
</div>
</nav>
<!-- footer-->
</body>
</html>
22
3.5.2 Registration.php
?php
require('connection.php');
extract($_POST);
if(isset($save))
{
//check user alereay exists or not
$sql=mysqli_query($conn,"select * from user where email='$e'");
$r=mysqli_num_rows($sql);
if($r==true)
{
$err= "<font color='red'>This user already exists</font>";
}
else
{
//dob
$dob=$yy."-".$mm."-".$dd;
//hobbies
$hob=implode(",",$hob);
//image
$imageName=$_FILES['img']['name'];
//encrypt your password
$pass=md5($p);
$query="insert into user values('','$n','$e','$pass','$mob','$gen','$hob','$imageName','$dob',now())";
mysqli_query($conn,$query);
//upload image
mkdir("images/$e");
move_uploaded_file($_FILES['img']['tmp_name'],"images/$e/".$_FILES['img']['name']);
$err="<font color='blue'>Registration successfull !!</font>"
}
}
23
?>
<h2>Registration Form</h2>
<form method="post" enctype="multipart/form-data">
<table class="table table-bordered">
<Tr>
<Td colspan="2"><?php echo @$err;?></Td>
</Tr>
<tr>
<td>Enter Your name</td>
<Td><input type="text" class="form-control" name="n" required/></td>
</tr>
<tr>
<td>Enter Your email </td>
<Td><input type="email" class="form-control" name="e" required/></td>
</tr>
<tr>
<td>Enter Your Password </td>
<Td><input type="password" class="form-control" name="p" required/></td>
</tr>
<tr>
<td>Enter Your Mobile </td>
<Td><input class="form-control" type="number" name="mob" required/></td>
</tr>
<tr>
<td>Select Your Gender</td>
<Td>
Male<input type="radio" name="gen" value="m" required/>
Female<input type="radio" name="gen" value="f"/>
</td>
</tr>
<tr>
24
<td>Choose Your hobbies</td>
<Td>
Reading<input value="reading" type="checkbox" name="hob[]"/>
Singing<input value="singin" type="checkbox" name="hob[]"/>
Playing<input value="playing" type="checkbox" name="hob[]"/>
</td>
</tr>
<tr>
<td>Upload Your Image </td>
<Td><input class="form-control" type="file" name="img" required/></td>
</tr>
<tr>
<td>Enter Your DOB</td>
<Td>
<select name="yy" required>
<option value="">Year</option>
<?php
for($i=1950;$i<=2016;$i++)
{
echo "<option>".$i."</option>";
}
?>
</select>
<select name="mm" required>
<option value="">Month</option>
<?php
for($i=1;$i<=12;$i++)
{
echo "<option>".$i."</option>";
}
?>
25
</select>
<select name="dd" required>
<option value="">Date</option>
<?php
for($i=1;$i<=31;$i++)
{
echo "<option>".$i."</option>";
}
?>
</select>
</td>
</tr>
<tr>
<Td colspan="2" align="center">
<input type="submit" class="btn btn-success" value="Save" name="save"/>
<input type="reset" class="btn btn-success" value="Reset"/>
</td>
</tr>
</table>
</form>
</body>
</html>
3.5.3 Connection.php
<?php
$conn=mysqli_connect("localhost","root","","online_notice");
?>
3.5.4 Amin/Add_Notice.php
<?php
extract($_POST);
if(isset($add))
26
{
if($details=="" || $sub=="" || $user=="")
{
$err="<font color='red'>fill all the fileds first</font>";
}
else
{
foreach($user as $v)
{
mysqli_query($conn,"insert into notice values('','$v','$sub','$details',now())");
}
$err="<font color='green'>Notice added Successfully</font>";
} }
?>
<h2>Add New Notice</h2>
<form method="post">
<div class="row">
<div class="col-sm-4"></div>
<div class="col-sm-4"><?php echo @$err;?></div>
</div>
<div class="row">
<div class="col-sm-4">Enter Subject</div>
<div class="col-sm-5">
<input type="text" name="sub" class="form-control"/></div>
<div class="col-sm-8">
</div>
<div class="row">
<div class="col-sm-4">Enter Details</div>
<div class="col-sm-5">
<textarea name="details" class="form-control"></textarea></div>
</div>
27
<div class="row" style="margin-top:10px">
</div>
<div class="row">
<div class="col-sm-4">Select User</div>
<div class="col-sm-5">
<select name="user[]" multiple="multiple" class="form-control">
<?php
$sql=mysqli_query($conn,"select name,email from user");
while($r=mysqli_fetch_array($sql))
{
echo "<option value='".$r['email']."'>".$r['name']."</option>";
}
?>
</select>
</div>
</div>
<div class="row" style="margin-top:10px">
<div class="col-sm-2"></div>
<div class="col-sm-8">
</div>
<div class="row" style="margin-top:10px">
<div class="col-sm-2"></div>
<div class="col-sm-4">
<input type="submit" value="Add New Notice" name="add" class="btn btn-success"/>
<input type="reset" class="btn btn-success"/>
</div>
</form>
28
3.6 Testing Process
Web Testing in simple terms is checking your web application for potential bugs before its made live
or before code is moved into the production environment. During this stage issues such as that of web
application security, the functioning of the site, its access to handicapped as well as regular users and
its ability to handle traffic is checked.
A test plan can be defined as a document describing the scope, approach, resources, and
schedule of intended testing activities. It identifies test items, the features to be tested, the testing tasks,
who will do each task, and any risks requiring contingency planning. In software testing, a test plan
gives detailed testing information regarding an upcoming testing effort, including
• Scope of testing
• Schedule
• Test Deliverables
• Release Criteria
• Risks and Contingencies
It is also be described as a detail of how the testing will proceed, who will do the testing, what
will be tested, in how much time the test will take place, and to what quality level the test will be
performed. The process of defining a test project so that it can be properly measured and controlled.
The test planning process generates a high level test plan document that identifies the software items to
be tested, the degree of tester independence, the test environment, the test case design and test
measurement techniques to be used, and the rationale for their choice. A testing plan is a
methodological and systematic approach to testing a system such as a machine or software. It can be
effective in finding errors and flaws in a system. In order to find relevant results, the plan typically
contains experiments with a range of operations and values, including an understanding of what the
eventual workflow will be. Test plan is a document which includes, introduction, assumptions, list of
test cases, list of features to be tested, approach, deliverables, resources, risks and scheduling.. A record
of the test planning process detailing the degree of tester independence, the test environment, the test
case design techniques and test measurement techniques to be used, and the rationale for their choice.
Test Activities: Various Testing Activities are as follow:
3.6.1. Black box testing: Internal system design is not considered in this type of testing. Tests are
based on requirements and functionality.
29
3.6.2. White box testing: This testing is based on knowledge of the internal logic of an
applications code. Also known as Glass box Testing. Internal software and code working should be
known for this type of testing. Tests are based on coverage of code statements, branches, paths,
conditions.
3.6.3. Unit testing: Testing of individual software components or modules. Typically done by the
programmer and not by testers, as it requires detailed knowledge of the internal program design and
code may require developing test driver modules or test harnesses.
3.6.4. Incremental integration testing: Bottom up approach for testing i.e. continuous testing of
an application as new functionality is added; Application functionality and modules should be
independent enough to test separately done by programmers or by testers.
3.6.5. Integration testing: Testing of integrated modules to verify combined functionality after
integration. Modules are typically code modules, individual applications, client and server applications
on a network, etc. This type of testing is especially relevant to client/server and distributed systems.
3.6.6. Functional testing: This type of testing ignores the internal parts and focus on the output is
as per requirement or not. Black-box type testing geared to functional requirements of an application.
3.6.7. System testing: Entire system is tested as per the requirements. Black-box type testing that is
based on overall requirements specifications, covers all combined parts of a system.
3.6.8. End-to-end testing: Similar to system testing, involves testing of a complete application
environment in a situation that mimics real-world use, such as interacting with a database, using
network communications, or interacting with other hardware, applications, or systems if appropriate.
30
CHAPTER 4
RESULTS/
OUTPUTS
31
The results/Outputs are shown by the following snapshots of the application:
32
4.2 Registration Page:
33
4.4. User Dashboard
34
4.6 Add Notice
35
CHAPTER 5
CONCLUSION/
FUTURE
SCOPE
36
5.1 FUTURE SCOPE
The future scope of the project is that it can be used as any news giving application or it can be used to
advertise your products, telling the customers about new schemes and products coming to your shop.
This application of Online Notice Board can be further extended to include the following features:
2. Documents and PDF files: The attachments can be further improved to include PDF files or
Doc files. Then there will not be much need to send images with the notices. A single file would serve
all the purposes.
3. Feedback: Feedback on the notices can also be taken. It can increase communication among
connected members and any issue can be easily sorted out on the spot.
5.2 CONCLUSIONS
• Database: MySQL
So during this project I learned all the above things. Before this project, I had no idea about Java Script,
PHP and MySQL for making a web application. Although I had little bit knowledge of HTML and CSS
before. But now I learned a lot about Java Script, PHP and MySQL and got knowledge of using Java
Script, PHP and MySQL for developing web application. Now I prefer to work on command line rather
than graphically. I learned how to work on XAMP Server. If I talk about the project, Online Notice
Board Application has reduced lot of manual work. It has made notifying each and every user very easy
and that too with no time and place restrictions
37
Chapter 6
References
38
Reference
https://www.w3schools.com/php/default.asp
https://www.tutorialspoint.com/php/index.htm
https://www.w3schools.com/php/php_mysql_intro.asp
https://en.wikipedia.org/wiki/PHP
39
Chapter 7
Appendices
40
7.1 Papers Published in Journals
7.1.1 Wireless Sensor network
Wireless Sensor Network
[1] Dr. Amit Singhal, [2] Shubham Rai, [3] Vikas Gupta
[1]
Head of Department Computer Science & Engineering, BBDIT Ghaziabad
[2][3]
Student, Computer Science & Engineering, BBDIT Ghaziabad
amitsinghal1.cs@gmail.com
guptavikas120@gmail.com
raishubham.103@gamil.com
Abstract
Wireless Sensor Network stands as one of the most emerging technologies combining
together sensing, computational capability and communication into minute devices proceeding
towards whole new world of simplicity. Wireless Sensor Networks (WSN) are used in variety of
fields which includes military, healthcare, environmental, biological, home and other
commercial applications.
A wireless sensor network is composed of large number of dispersed autonomous
devices which uses sensors to monitor physical or environmental changes in a geographical
area, process this data and report the changes to a centralized point through a wireless
communication network. Due to the requirement of low device complexity with low energy
consumption a balanced communication and signal or data processing capabilities must be
found. Wireless Sensor Network communicates through radio frequency. WSN acts as a
mediator between the real physical world and the virtual world. In this paper, we report some
of the current trends, challenges and security issues with wireless sensor network.
Wireless Sensor Network has been widely used in many areas especially for surveillance
and monitoring in agriculture and habitat monitoring. Environment monitoring has become an
important field of control and protection, providing real-time system and control
communication with the physical world.
Key Words: Wireless Sensor Network, Personal computers, Personal Digital Assistants, Denial of
Service attack, Environment Monitoring.
1. Introduction commercial and industrial applications, because
A wireless sensor network (WSN) [1] is a of its technical development in a processor,
collection of spatially distributed autonomous communication, and low-power usage of
sensors to examine present atmospheric and embedded computing devices. The WSN is
physical such as temperature, pressure, etc. and built with nodes that are used to observe the
to cooperatively pass the data gathered through surroundings like temperature, humidity,
the network to a main centralized point. pressure, position, vibration, sound etc. These
Currently, WSN (Wireless Sensor Network) is nodes can be used in various real-time
the most standard services employed in applications to perform various tasks like smart
41
detecting, a discovery of neighbor node, data Wireless sensor network (WSN) is built up of
Processing and storage, data collection, target a group of several hundred or thousands of
tracking, monitor and controlling, sensor nodes, where each node is connected to
synchronization, node localization, and one sensor node. Radio transceiver with an
effective routing between the base station and internal antenna or connection of an external
nodes. antenna, a microcontroller, an electronic circuit
A Wireless sensor network can also be defined for interfacing with sensors and an energy
as a network of devices that can communicate source are some typical parts of a single sensor
the information gathered from a monitored field network node. Each sensor network node can
through wireless links. The data is forwarded be composed of various sensors that are used to
through multiple nodes, and with a gateway, the collect data is transferred to the user through
data is connected to other networks network and also control some physical
like wireless Ethernet. processes. A sensor network is composed of a
The basic requirements of WSN are as follows: large number of sensor nodes, which are
Scalability- WSN must be capable of densely deployed either inside the phenomenon
being easily expanded or upgraded on or very close to it. This paper presents a
demand. detailed overview of the research issues in the
Reliability – WSN must be worth applications of Wireless Sensor Networks.
trusting and it should provide what is 1.1 Characteristics
needed for the user
The main characteristics of a WSN include:
Responsiveness – WSN should quickly
react in the desired or positive way. Power consumption constraints for nodes
Mobility – WSN must be able to move using batteries or energy harvesting.
from one place to another. Examples of suppliers are ReVibe
Power Efficiency – WSN must be Energy[6] and Perpetuum[7]
power efficient. Ability to cope with node failures
(resilience)
Some mobility of nodes (for highly mobile
nodes see MWSNs)
Heterogeneity of nodes
Homogeneity of nodes
Scalability to large scale of deployment
Ability to withstand harsh environmental
conditions
Ease of use
2. Wireless Sensor Network
Architecture
The most common WSN architecture follows
the OSI architecture Model. The architecture of
the WSN includes five layers and three cross
layers. Mostly in sensor network we require
five layers, namely application, transport,
network, data link& physical layer. The three
cross planes are namely power management,
mobility management, and task management.
42
These layers of the WSN are used to either practical on the upstream. There are
accomplish the network and make the sensors some popular protocols in the transport layer
work together in order to raise the complete namely STCP (Sensor Transmission Control
efficiency of the network.
Protocol), PORT (Price-Oriented Reliable
The types of topologies used in WSN are: Transport Protocol and PSFQ (pump slow fetch
Star Topologies quick).
Tree Topologies
Mesh Topologies 2.3 Network Layer
The main function of the network layer is
Layers in Wireless Sensor Network are: routing, it has a lot of tasks based on the
application, but actually, the main tasks are in
the power conserving, partial memory, buffers,
and sensor don’t have a universal ID and have
to be self-organized. There are a lot of existing
protocols for this network layer, they can be
separate into; flat routing and hierarchal routing
or can be separated into time driven, query-
driven & event driven.
43
types of sensors like low sampling rate, agriculture, biological, Earth, and
seismic, magnetic, thermal, visual, infrared, environmental monitoring in marine, soil, and
radar, and acoustic, which are clever to monitor atmospheric contexts, forest fire
a wide range of ambient situations. Sensor detection, meteorological or geophysical
nodes are used for constant sensing, event ID, research, flood detection, bio-complexity
event detection & local control of actuators. mapping of the environment, and pollution
The applications of wireless sensor network study. There are several studies that focus in
mainly include health, military, environmental, environmental monitoring applications [9] [10].
home, & other commercial areas. Some researchers implement the fault tolerant
and studies the tradeoff between tool expense
and lifetime of sensor network [11] to make
sure the fault tolerance is in the three
dimensional settings.
3.3 Military Applications
Wireless sensor networks can be an integral
part of military command, control,
communications, computing, intelligence,
surveillance, reconnaissance and targeting
(C4ISRT) systems. Some of the military
applications of sensor networks are monitoring
friendly forces, equipment and ammunition;
battlefield surveillance, reconnaissance of
opposing forces and terrain, targeting, battle
damage assessment, and nuclear, biological and
chemical (NBC) attack detection and
Fig 3: Applications of WSN reconnaissance. Some main uses of WSN in
Military are following:
3.1 Area Monitoring Monitoring friendly forces, equipment
Area monitoring is a common application of and ammunition
WSNs. In area monitoring, the WSN is Battlefield surveillance
deployed over a region where some Reconnaissance of opposing forces and
phenomenon is to be monitored. A military terrain
example is the use of sensors detect enemy Targeting
intrusion; a civilian example is the geo- Battle damage assessment
fencing of gas or oil pipelines. Nuclear, biological and chemical attack
detection and reconnaissance
3.2 Environment/Earth Sensing Since sensor networks are based on the dense
There are many applications in monitoring deployment of disposable and low-cost sensor
environmental parameters. Some environmental nodes, destruction of some nodes by hostile
applications of sensor networks include actions does not affect a military operation as
tracking the movements of birds, small animals, much as the destruction of a traditional sensor,
and insects. Monitoring environmental which makes sensor networks concept a better
conditions that affect crops and livestock, approach for battlefields.
irrigation, macro instruments for large-scale
Earth monitoring and planetary exploration,
chemical/biological detection, precision
44
3.5 Industrial Monitoring
Wireless sensor networks have been developed
for machinery condition-based maintenance
(CBM) as they offer significant cost savings
and enable new functionality.[12] Wireless
sensors can be placed in locations difficult or
impossible to reach with a wired system, such
as rotating machinery and untethered vehicles.
Due to the high density of server’s racks in a
data center, often cabling and IP addresses are
an issue. Wireless sensor networks are also
used for the collection of data for monitoring of
environmental information.
4. Security Issues in WSN
4.1 Security Requirement: Sensor
Fig 4: Military Uses network have to fulfill some requirements for
providing
3.4 Health Care Monitoring a secure communication. General security
The sensor networks for medical applications requirements of [2] [3] WSNs are availability,
can be of several types: implanted, wearable, confidentiality, integrity and authentication.
and environment-embedded. The implantable [5][4][6] Some other requirements known as
medical devices are those that are inserted secondary requirements are source localization,
inside human body. Wearable devices are used self-organization and data freshness. These
on the body surface of a human or just at close requirements gives protection against attacks to
proximity of the user. Environment-embedded the information transmitted over the sensor
systems employ sensors contained in the network [19].
environment.
4.2 Source Localization: For data
transmission some applications use location
information of the sink node. It is important to
give security to the location information. Non-
secured data can be controlled by the malicious
node by sending false signal strengths or
replaying signals.
4.3 Data Integrity: It is very crucial in
sensor network to ensure the reliability of the
data. It ensures that data packets that are
received by the destination are exactly the ones
sent by the sender and any one cannot alter that
packet in between.
4.4 Data Confidentiality: Confidentiality
Fig 5: Uses in Healthcare means to protect data during communication in
a network to be understood other than intended
45
recipient. To provide the data confidentiality, their own data bits to the channel, replay old
an encrypted data is used so that only recipient packets and any other type of attack. A secure
decrypts the data to its original form. network ought to support all security properties.
[7][8] Attackers may deploy some malicious
nodes in the network with similar capabilities
as of normal node or may overwrite the
memory of normal deployed node by capturing
them. Attacks in wireless sensor network are
shown in Figure 7. They are roughly
categorized as follows:
Attacks in
WSN
46
technologies are being devised to overcome Issues (IJCSI), Volume 7, Issue 3, No 11, pp.
these and to make sensor networks an integral 23-27, May 2010.
part of our lives. The future prospects of WSN [4] Jitender Grover, Shikha Sharma and Mohit
applications are highly promising to Sharma, “Reliable SPIN in Wireless Sensor
revolutionize our everyday lives. Network: A Review”, IOSR Journal of
Computer Engineering (IOSR-JCE), ISSN:
5. Future Scope 2278-0661, Vol. 16, Issue 6(III), DOI:
It will be produced a very powerful and cost- 10.9790/0661-16637983, pp. 79-83, Nov.-Dec.
effective devices that they may be used in many [5] Pankaj Pardesi and Jitender Grover,
other applications (such as underwater r “Improved Multiple Sink Placement Strategy in
acoustic sensor systems , sensing based cyber- Wireless Sensor Networks”, 2015 IEEE
physical systems , time critical application , International Conference on Futuristic Trends
connective sensing and spectrum , privacy and on Computational Analysis and Knowledge
security management . Management (A-BLAZE), Amity University,
Wireless sensor networks represent a very Greater Noida, Uttar Pradesh, India, DOI:
interesting multidisciplinary field of research, 10.1109/ABLAZE.2015.7155032, pp. 418-424,
characterized by a very large number of 25-27 Feb, 2015.
possible applications. Their main advantage is [6] G. Padmavathi and D. Shanmugapriya, “A
the ability to be applied to any field, and in any Survey of Attacks, Security Mechanisms and
environment that for its application require Challenges in Wireless Sensor Networks”,
substantially stringent conditions. Future International Journal of Computer Science and
scenarios "are aware of the world" or "internet Information Security (IJCSIS), Volume 4, Issue
of things" are as real scenarios, and there are 1 & 2, pp. 1-9, August 2009
good chances to achieve in the next ten years. [7] Daniel E. Burgner, Luay A. Wahsheh,
"Security of Wireless Sensor Networks", 2011
Eighth International Conference on Information
6. References Technology: New Generations (ITNG), Las
Vegas, NV, pp. 315-320, 2011.
[1] Bhaskar Krishnamachari, “An Introduction [8] Heena Rathore, Sushmita Jha, "Bio-inspired
to Wireless Sensor Networks”, Presentation at machine learning based Wireless Sensor
the Second International Conference on Network security", 2013 World Congress on
Intelligent Sensing and Information Processing Nature and Biologically Inspired Computing
(ICISIP), Chennai, India, 1 January 2005 (NaBIC), Fargo, ND, pp. 140-146, 2013.
[2] Eirini Karapistoli, Anastasios A. [9] W.-S. Jang, W. M. Healy, and M. J.
Economides, "Wireless sensor network security Skibniewski, “Wireless sensor networks as part
visualization", 2012 4th International Congress of a web-based building environmental
on Ultra-Modern Telecommunications and monitoring system,” Automation in
Control Systems and Workshops (ICUMT), pp. Construction, vol. 17, no. 6, pp. 729-736, Aug.
850-856, 2012. 2008.
[3] Virendra Pal Singh, Sweta Jain and Jyoti [10] R. Mittal and M. P. S. Bhatia, “Wireless
Singhai, “Hello Flood Attack and its Sensor Networks for Monitoring the
Countermeasures in Wireless Sensor Environmental Activities,” Analysis, 2010.
Networks”, [11] Y. Guo and J. McNair, “Fault Tolerant
International Journal of Computer Science Three Dimensional Environment Monitoring
Using Wireless Sensor Networks,” pp. 1-7.
47
7.2 Design of Routing Protocol for MANET
Design of Routing Protocol for MANET
[1] Dr. Amit Singhal, [2] Vikas Gupta, [3] Shubham Rai
[1]
Head of Department Computer Science & Engineering, BBDIT Ghaziabad
[2][3]
Student, Computer Science & Engineering, BBDIT Ghaziabad
amitsinghal1.cs@gmail.com
guptavikas120@gmail.com
raishubham.103@gamil.com
Abstract:
A typical ad hoc network consists of nodes that are usually battery operated devices such as
laptops, PDAs or sensor nodes that come together and spontaneously form a network.
Energy conservation is a critical issue as the lifetime of these nodes depends on the life of
the system. Research has been carried out to conserve energy at various levels i.e., at the
hardware level, operating system, application level. We propose Efficient Power Aware
Routing (EPAR), a new power aware routing protocol that increases the network lifetime
of MANET.
In contrast to conventional power aware algorithms, EPAR identifies the capacity of a node
not just by its residual battery power, but also by the expected energy spent in reliably
forwarding data packets over a specific link. This makes that high energy node to transmit
the received packets to maximum energy node of available nodes. It may leads to successful
delivery of packets on this path. Using a mini-max formulation, EPAR selects the path that
has the largest packet capacity at the smallest residual packet transmission capacity.
This protocol must be able to handle high mobility of the nodes that often cause changes in
the network topology. This paper evaluates three Ad hoc network routing protocols
(EPAR, MTPR, and DSR) in different network scales, taking into consideration the energy
consumption. Indeed, our proposed algorithm reduces for more than 20% the total energy
consumption and decreases the mean delay, especially for high load networks, to maximize
the network lifetime, while achieving a good packet delivery ratio.
Key words: EPAR, MTPR, DSR, Residual battery power.
49
While the minimum-energy unicast routing along with the packets. DSR explores the
problem can be solved in polynomial time many advantages of source routing and
by shortest-path algorithms, it remains open enjoys the benefits of some of the most
whether the minimum-energy broadcast extensive testing and deployment of any of
routing problem can be solved in polynomial the protocols. It is one of the purest
time, despite the NP-hardness of its general examples of the on demand protocol, in
graph version. Recently three greedy which all actions are taken only when the
heuristics were proposed in MST (minimum route is actually needed. It has some
spanning tree), SPT (shortest-path tree), and disadvantage also like it does not support
BIP (broadcasting incremental power).At multicasting, decreasing throughput, and
load increases the energy consumption is increasing load of the network.
more. Md Nafees Rahman developed an
“Efficient Algorithm for Prolonging 3.2 MTPR Protocol
Network Lifetime of Wireless Sensor
In existing power aware methodology
Networks”. This approach proposed a
(MTPR), the next hop to be transmitted only
Particle Swarm Optimization (PSO). It has
chosen based on the residual energy of the
the merits to locate the optimal sink position
next hop. Not focusing on complete path
with respect to those relay nodes to make the
identification. Whenever the source finds
network more energy efficient. The demerit
next hop based on residual energy, the high
is that it only satisfies low density Network.
residual energy nodes might not be nearer
From the above literature survey related
by sufficient energy nodes. This makes that
with the energy consumption the following
high energy node to transmit the received
things are focused:
packets to maximum energy node of
Minimize Energy consumed per packet: available nodes. It may leads to unsuccessful
the most intuitive metric, however not delivery of packets on this path. Assuming
optimal for maximum lifetime; all nodes in the network are equally
Maximize Time to Network Partition: important, no node should be used for
important for mission critical routing more often than other nodes.
applications, hard to maintain low delay However, if many minimum energy routes
and high throughput simultaneously; all go through a specific node, the battery of
Minimize Variance in node power levels: this node is drained quickly and eventually
balance the power consumption for all the node dies. Therefore, the remaining
the node in the network, i.e., all nodes in battery capacity of a node should be used to
the network have the same importance; define a routing metric that captures the
Minimize Cost per packets: try to expected lifetime of a node, and so, the
maximize the life of all the nodes; lifetime of the network. The limitations of
Minimize Maximum Node Cost: try to this approach can be summarized are the
delay the node network will be congested as the packets has
to route from multiple nodes, more number
3. EXISTING PROBLEM of nodes has to participate in forming a
routing path and it will always select its
3.1 DSR Protocol nearest neighboring node ,it does not
The Dynamic Source Routing algorithm is consider overall s-d path. This protocol is
another innovative approach to ad hoc that, it is not scalable to large networks and
networking whereby nodes communicate even requires significantly more processing
along paths stored in source routes carried resources than most other protocols.
50
Basically, in order to obtain the routing energies of all the nodes and thereby
information, each node must spend lot of prolong the network lifetime.
time to process any control data it receives,
even if it is not the intended recipient. 5.1 Route Discovery and
Maintenance in Proposed
4. PROPOSED WORK Algorithm
To propose an efficient power aware routing EPAR schemes make routing decisions to
(EPAR) protocol that increases the network optimize performance of power or energy
lifetime of MANET. In EPAR, before related evaluation metrics. The route
forwarding its packets to next hop, the selections are made solely with regards to
source itself analyze the entire path and its performance requirement policies,
ability. The source node calculates the independent of the underlying ad-hoc
expected energy spent over each path routing protocols deployed. Therefore the
available and its lifetime changes if, the power aware routing schemes are
packet routed through each path. On transferable from one underlying ad hoc
analyzing the entire route path available, the routing protocol to another, the observed
source node decides not only the next hop relative merits and drawbacks remain valid.
and also the entire path to be used and route There are two routing objectives for
its packet as calculated. It increased minimum total transmission energy and total
Network lifetime. In EPAR, selection of operational lifetime of the network can be
path decided only based on the residual mutually contradictory. For example, when
energy of full path. How about the residual several minimum energy routes share a
energy of all intermediate nodes have taken common node, the battery power of this
care in selection of next hop. It increases in node will quickly run into depletion,
life time of nodes further decreases packet shortening the network lifetime. When
loss. choosing a path, the DSR implementation
chooses the path with the minimum number
of hops. For EPAR, however, the path is
5. DESIGN AND chosen based on energy. First, we calculate
IMPLEMENTATION the battery power for each path, that is, the
To conserve energy, there should minimize lowest hop energy of the path. The path is
the amount of energy consumed by all then selected by choosing the path with the
packets traversing from source node to maximum lowest hop energy.
destination node i.e. we want to know the Table 1. NETWORK PARAMETER TO
total amount of energy the packets BE MEASURED USING NS2
consumed when it travels from each and
every node on the route to the next hop. The
No of packets Defines no of packet
energy consumed for one packet is
sent
calculated by the equation k Ec=ΣT (ni,
Traffic size Packet size and time
ni+1) i=1 where, into nares nodes in the
interval for
route while T denotes the energy consumed
sequential
in transmitting and receiving a packet over
transmission
one hop. Then we find the minimum Ec for
Transmit Energy Require to transmit
all packets. The main objective of EPAR is
Receive Energy Require to receive
to minimize the variance in the remaining
Idle energy Being at ON
condition
51
Sense power Energy spent to sense
packets
Energy consumed: No of packets
transmitted x energy
spent
Residual Energy Initial energy –
energy consumed
52
6.2 Path Selection Based On
Energy Calculation
53
transmission at this situation residual energy 7. CONCLUSION
will be a function of only of idle power. This paper mainly deals with the improve
Since no transmission reception is carried the overall network lifetime of the network
out. Therefore, by spending idle power, how using a EPAR algorithm. We propose a new
long the low power node could remain in scheme EPAR it satisfies both medium and
network. The network life time =The time large size network but DSR and MTPR only
over which the residual energy could spend used for small size network. It produces
on keeping the node remains in network. good results in terms of throughput and
6.6 Network Lifetime Varying With leads to good packet delivery ratio.
Respect To Network Size 8. REFERENCES
(Functional) [1] Internet Engineering Task Force, “Manet
working group charter,”
http://www.ietf.org/html.charters/manet-
charter.html.
[2] E.Royer and C.-K. Toh, “A Review of
Current Routing Protocols for Ad Hoc
Mobile Wireless Networks,” IEEE Personal
Communications Magazine, Vol. 6, No. 2,
April 1999.
[3] T. S. Rappaport, “Wireless
Communications: Principles and Practice”,
Prentice Hall, July 1999.
[4] S-L.Wu, Y-C Tseng and J-P Sheu,
“Intelligent Medium Access for Mobile Ad
Hoc Networks with Busy Tones and Power
Figure 7 Network Lifetime Varying with Control,” IEEE Journal on Selected Areas in
Respect Network Size (Functional) Communications, Vol. 18, No. 9, September
2000.
In Fig 7shows the network lifetime as a
[5] J. Gomez, A.T. Campbell, M.
function of the number of nodes. The life-
Naghshineh and C. Bisdikian, “Conserving
time decreases as the number of nodes grow;
Transmission Power in Wireless Ad Hoc
however for a number of nodes greater than
Networks”, Proc. 9thInternational
100, the life-time remains almost constant as
Conference on Network Protocols (ICNP
the number of nodes increases. Lifetime
2001), 2001.
decreases because MANET has to cover
[6] B. Chen, K. Jamieson, H. Balakrishnan,
more nodes as the number of nodes in the
and R. Morris, “Span: An Energy-Efficient
network size increases. We observe that the
Coordination Algorithm for Topology
improvement achieved through EPAR is
Maintenance in Ad Hoc Wireless
equal to 85 %. Energy is uniformly drained
Networks,” ACM Wireless Networks
from all the nodes and hence the network
Journal, Vol. 8, 2002.
life-time is significantly increased. Network
[7] M. W. Subbarao, “Dynamic Power-
lifetime as a functional can be calculated as:
Conscious Routing for MANETs: An Initial
RESIDUAL ENERGY= (transmission
Approach”, Journal of Research of the
power + receiving power) * network
National Institute of Standards and
lifetime.
Technology, Vol.104, No.6,1999.
54
[8] J.E. Wieselthier, G.D. Nguyen, and
A.Ephremides, ”On the construction of
energy efficient broadcast and multicast
trees in wirelessnetworks”, IEEE
INFOCOM 2000.
[9] S. Singh and C. S. Raghavendra,
“PAMAS - Power Aware Multi-Access
protocol with Signalling for Ad Hoc
Networks,” ACM SIGCOMM, Computer
Communication Review, July 1998.
[10] P-J. Wan, G. Calinescu, X. Li and O.
Frieder, “Minimum-Energy Broadcast
Routing in Static Ad Hoc Wireless
Networks”, IEEE INFOCOM2001.
[11] Laura Feeney and Martin
Nilsson,“Investigating the Energy
Consumption of a Wireless Network
Interface in an Ad Hoc Networking
Environment”, Proceedings of IEEE
INFOCOM, Anchorage, AK, 2001.
[12] K. Scott and N. Bambos, ”Routing and
channel assignment for low power
transmission in PCS,” Proceedings of IEEE
InternationalConference on Universal
Personal Communications (ICUPC ’96),
Cambridge, MA, September 29 - October 2,
1996.
[13] S. Singh, M. Woo, and C. S.
Raghavendra, “Power-aware with Routing
in Mobile Ad Hoc Networks”, Proceedings
of Mobicom 1998, Dallas, TX, 1998.
[14] C.-K. Toh,“Maximum Battery Life
Routing to Support Ubiquitous Mobile
Computing in Wireless Ad Hoc Networks,”
IEEE Communications Magazine, June
2001.
55
7.2 Certificates of the Papers Published
56
57
7.2.2 Design of Routing Protocol for MANET
58
59
60