0% found this document useful (0 votes)
116 views67 pages

Online Notice Board

Uploaded by

Tolosa Tafese
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
116 views67 pages

Online Notice Board

Uploaded by

Tolosa Tafese
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 67

A Project Report

On

ONLINE NOTICE BOARD


In partial fulfillment of
the requirement for the award of the degree of

BACHELOR OF TECHONOLOGY

IN

COMPUTER SCIENCE AND ENGINEERING

Under the guidance of

Dr. Amit Singhal


(HOD CSE Department)
BBDIT Ghaziabad

Submitted By:

Shubham Rai (1403510048)


Vikas Gupta (1403510059)

Babu Banarsi Das Institute of Engineering, Ghaziabad


(Affiliated to AKTU, Lucknow, Uttar Pradesh)
MAY, 2018
DECLARATION

We hereby declare that the project entitled “Online Notice Board” submitted for the B. Tech. (CSE)
degree is our original work and the project has not formed the basis for the award of any other degree,
diploma, fellowship or any other similar titles.

Signature of the Student


Place:
Date:
CERTIFICATE

This is to certify that the project entitled “Online Notice Board” is the bonafide work of Shubham
Rai and Vikas Gupta submitted in partial fulfillment of the requirements for the award of the degree of
Bachelor of Technology (B.tech) in Computer Science and Engineering (CSE) by APJ Abdul Kalam
Technical University, Lucknow during the academic year 2017-2018.

Signature of Guide: - Project Coordinators:-


Name: Dr. Amit Singhal Mr. Ramveer Singh
Head of Department, CSE Ms. Preeti Dubey
(Assistant Professor)
Department of CSE

Head of Department
Dr. Amit Singhal
Department of CSE

ACKNOWLEDGMENT
We take this opportunity to express our sincere thanks and deep gratitude to our project guide Dr. Amit
Singhal who shared his time and knowledge with us and helped in completing this project successfully.
We with the immense pleasure and heartfelt gratitude; express our sincere thanks to our project
coordinators Mr. Ramveer Singh & Ms. Preeti Dubey for their useful suggestions, continuous
guidance, and moral support for the progress of my work.
We express our sincere gratitude to Prof. (Dr.) Amit Singhal, Head of Department (CSE) for his strict
supervision, constant encouragement, inspiration and guidance. His inspiring suggestions and timely
guidance enabled me/us to perceive the various aspects of the project with a new vision.
We are very much grateful to our parents for their support and faith they showed in us. Last but not the
least our friends for being there round the clock whenever we needed them.
Abstract

An online notice board is a place where people can leave any types of messages and
notifications, for example, to advertise things, announce events or provide any information. Notice
board online it can be placed on digital devices such computers, tabs, mobile phones etc. This online
notice board project is very helpful for all type of users like existing users and new users. So admin can
leave and erase notification for other people to read and see. The main aim of this free online notice
board project is make information dissemination much easier in a paperless community as the world
tends to interact with the online notice board facility as an project, Online notice board admin can send
the notification to the particular students regarding fee payments, results, any new activity happen in
college campus or college fest participation, libraries dues, hostel room payments, any workshop
registrations, warnings and reminders etc. for this work online notice board project is make all work
much easier and understandable to all.

This online notice board work generally intends to act as a support system for the all users. By
the help of free online notice board users can access the notifications and articles quickly not only in
the particular premises, also wherever and whenever they need to know. Online notice board usability
is fully capable of passing relevant notices and announcements, and keeping the users update from time
to time. The students are kept updated each time with the online notice board for college is uploaded
based on their preferences with respect to the departments and categories through a notice board online.
Online notice board is one of the applications to improve the usage of notice board of the college by
making it available online.
Table of Contents
Title Page i
Declaration of the Student ii
Certificate of the Guide iii
Acknowledgement iv
Abstract v
List of Figures vi
List of Tables (optional) vii
Timeline / Gantt Chart viii
1. INTRODUCTION 1
1.1 Problem Definition 2
1.2 Project Overview/Specifications 3
1.3 Hardware Specification 4
1.4 Software Specification 4
2. LITERATURE SURVEY 5
2.1 Existing System 6
2.2 Proposed System 7
2.3 Feasibility Study 8
3 SYSTEM ANALYSIS & DESIGN 10
3.1 Requirement Specification 11
3.2 Use Case Diagrams 13
3.3 DFD’s 14
3.4 Design & steps 16
3.5 Algorithms and Pseudo Code 19
3.6 Testing Process 29

4. RESULTS / OUTPUTS 31

5. CONCLUSIONS 36
6. REFERENCES 38

7. APPENDICES 40
7.1 Papers Published in Journals 41
7.2 Certificates of the Papers Published 56
List of Figures
3.2 Use Case Diagram 13
3.3 DFD’s 14
3.3. Level 1 DFD 14
1
3.3. Level 2 DFD 14
2
3.3. Level 3 DFD 15
3
CHATER 1

INTRODUCTION

1
INTRODUCTION
A Notice Board is a traditional tool for the dissemination of information in academic campuses. A
traditional Notice board is made of a wooden frame with a soft central square of cork for pinning the
papers of information for the students. In any College there is a lot of on wall notice boards placed on
different location where by people with their announcements type on a sheet of paper and place it on
the notice boards for other people to read when passing through those notice boards. Thus there is a lot
of accumulation of papers due to carelessness of people who place them and no one who is responsible
for removing it. And hence there is a lot of strain on the people who having announcements in hand by
making sure that the announcements are placed everywhere, all these comes because the software is not
used in this context.

The Online Notice Board System is intended for colleges and institutions where information and file
sharing on regular basis plays vital role in the performance. The proposed system will act as an online
notice board which will make use of the modern communication methodologies and techniques for
information flow. The system is planned to consist of various useful features for the said purpose. The
proposed system aims to create a platform for issuing notice, sharing information and files between the
members of the institution. Different users shall have different level of access to the content. In the
context of a college, there shall be four users of the software – administrator, student, teachers and
guest. The administrator shall be able to issue notice, upload files, and view students’ activities on the
software. The teacher shall be able to issue notice, upload files (on a general basis or to a particular
classroom), and view result and students’ activities. The student shall be able to upload/download files,
submit to faculty/teacher and view result. A guest will simply be able to view public notices.

With the diversity of technologies available, finding the most convenient server software and
programming language to develop a website is always an area of concern. Even more, implementing an
online notice board requires more than just a fast accessible website, but also, one that supports
concurrent views, and changes to the notice board seamlessly.

2
1.1 PROBLEM DEFINITIONS

In today’s world, everything is digitalized and paper is being used less and less every day. How often
has it happened that we miss some important notice because we have to go to a wall and read the notice
there? There are dedicated file hosting sites and clouds used by some institutions, but there is a definite
need for a dedicated noticeboard system. The proposed system is such a system. In the college or
institutions there are many problems, distinguish is between rumor and true information. At times dates
are changed and change of plan is very poorly communicated to the students and faculty, which creates
confusion. In case of an Online Notice Board students will have access to important announcements
while walking around anywhere or not having in the campus and have the benefit of being reminded
several times a day.

To develop a web application that will help us receiving the notices from the college, anywhere,
anytime. Earlier there was problem that notices were posted on notice board. If there is holiday on the
next day, nobody will be able to read it. 

1.2 PROJECT OVERVIEW/SPECIFICATIONS

Online Notice Board simply helps a student to access any type of information related to their college,
their department or their section/class. Having a notice board portal in college also helps the faculties
and college administration easily reach out to the students.

The Online Notice Board provide the facility of approaching each and every student in the minimum
amount of time and effort. The advantage of Online Notice Board in a college or institutions are
following:

i. Saves human effort and time


ii. Saves wastage of paper which is good for environment.
iii. Faculty can easily reach out to every student to inform something urgent.
iv. Adding a new notice and removing an old notice is very easy.

3
1.3 HARDWARE SPECIFICATIONS
The system will interact with the hardware resources of the system on which it is running. While any
system will support the core software, a device with push messaging facility is recommended for
Windows 8 or Windows 10. The main hardware requirements for this web application are following:
Operating System- Windows Server, Linux, or any operating system that can run as a webserver,
capable of delivering HTML5 content, including JSON and MP4.
Processor- Intel® Celeron® Processor 847, 1.10 GHz, or equivalent.
Storage- Between 1.3 GB - 2.3 GB depending on the language version.
RAM- Minimum of 512 MB. The recommended amount can vary depending on number of users
connected, number of websites hosted on the device, and other factors.
Hard Disk- 3 GB of available hard-disk space for installation; additional free space is required
during installation. You cannot install on removable flash storage devices.

1.4 SOFTWARE SPECIFICATIONS

Any operating system such as Windows, Mac or Linux is the basic requirement for the web application.
The main requirements in the form of software for a web application is following:

 Operating System- Windows, Linux, Mac, Unix


 Browser- Google Chrome, Firefox, Safari etc.
 Server- XAMP, LAMP, WAMP

4
CHAPTER 2

LITERATURE
SURVEY

5
Almost all leading institutions, excepting a few, currently lack an Online Notice Board system. Though
some have taken the aid of third-party websites like Facebook to interact, it comes at the cost of mixing
one’s social life with professional. Keeping this in mind, educational institutes will find this software
extremely useful. There are dedicated file hosting sites and clouds used by some institutions, but there
is a definite need for a dedicated noticeboard system. The proposed system is such a system.

2.1 Existing System

Currently our college has manual system of putting notices on notice board. It’s outdated now. As
nobody has a time to stand in rush in order to read the notices on noticeboard. The limitations of the
existing system are following:

2.1.1. Order of Data: Notice can get out of order in traditional notice board system. If someone
accidentally puts some data in the wrong place, it can lead to lost data. Automated notice management
systems allow users to quickly check whether information already exists somewhere in the system,
which helps avoid problems like redundant data.

2.1.2. Complexity: Automated system is less complex than manual system of handling notices,
which can make it easier for untrained people to access and manipulate data. Anyone having the basic
knowledge of mobiles can work on the automated system.

2.1.3. Inconsistency of data: There will be an unavailability for future use, since notice might get
misplaced during manual notices management. So notice won’t be preserved properly for future use.

2.1.4. Damage: Manual notices stack are vulnerable to damage, destruction and theft in ways that
digital databases are not. A company may back up its digital data both on site and at offsite locations,
ensuring its security if the office building suffered a fire or similar disaster. A manual database,
however, may only exist in one place without any copies. As a result, a manual database would be very
vulnerable to a fire or other natural disaster. In addition, while access time in a manual database
system, information must be found by hand rather than electronically. While a digital database will
typically allow users to search the entire database for specific information in seconds, someone looking
for information in a manual system may have to spend hours searching for a particular piece of data.

6
2.1.5. Editing and Communication: Manual notices do not allow users to easily edit data or
information. Manual notices often cannot be edited directly, forcing users to make new copies. To
circulate notice on paper, users must require peons and other staff. Online Notice Board allow users to
edit information fields directly, and because data is stored digitally, it is already in a form that can be
easily transmitted.

2.2 Proposed System

Proposed System will be able to do the following:

2.2.1. To eliminate wastage of time and energy: Online Notice Board application will be
able to save lot of paper and time. It directs both teacher and pupil’s energy and attention to one thing
at a time by placing proper persons at their proper places at the proper time. Everything will be
instantaneous.

2.2.2. To avoid duplication and overlapping: This application will help to remove the
duplicity of notices. Only one person, who is admin can post the notice. No one else would be able to
do so. So student and staff will be given correct information all the time.

2.2.3. To ensure due attention of student to each and every notice: Online Notice Board
application ensures that everyone has kind attention to every notice and updates going on in college.
There will be a buzz at each and every notice to drive the attention of student to check it once. In this
way, students will be well informed about their college activities.

2.2.4. To bring system into college life: It would be dire need of all colleges as it’s easy and
shortcut method to inform all the students. In the absence of proper notification system will make it
very difficult to inform students at right time.

2.2.5. Searching a particular Notice: This application allows you search the notice very easily
through title of notice. If anyone forgets about the notice details, he can search it out very easily.

2.2.6. Free Service: It gives free service to notify all the students. There will be no cost of sending
notification to all. Just have the good system implemented in college and that too free of cost.

7
2.2.7. Prevent Crowd in College: As you can see, there is always a crowd at notice board. As
notice board is one, and people to see notice are more. With this application there will be no more
crowd. Everyone will be well informed even at their homes. So they are free to do there other work.

2.2.8. Automatically Updated Dashboard: The dashboard of notice is automatically updated


when a new message arrives. The user can himself refresh the dashboard to see any new notice.

2.2.9. Anytime Anywhere Service: With this application, notices will be delivered anytime and
at any place. There is no restriction of time to send a notice.

2.2.10. Keeping Notices at one place: This application allow you to have notices in one place
only. If there is an attachment with that, all will be placed in a separate folder dedicated to that
application. So there will be no here and there of notices.

2.3 Feasibility Study


Depending on the results of the initial investigation, the survey is expanded to a more detailed
feasibility study. Feasibility study is a test of system proposal according to its work ability, impact on
the organization, ability to meet user needs, and effective use of resources. The objective for this phase
is not to solve the problem but to acquire a sense of scope. During the study, the problem definition is
crystallized and aspects of the problem to be included in the system are deter- mined. Web Application
Development Systems are capital investments because resources are being spent currently in order to
achieve benefits to be received over a period of time following completion. There
should be a careful assessment of each project before it is begun in terms of economic justification,
technical feasibility, operational impact and adherence to the master development plan. We started the
project by listing the possible queries that the user might want to be satisfied. And on these lines we
guided the project further. The three main points, kept in mind at the time of project, are:
• Possible (To build it with the given technology and resources)
• Affordable (given the time and cost constraints of the organization)
• Acceptable (for use by the eventual users of the system
The three major areas to be considered while determining the feasibility of a project are:
2.3.1. Technical Feasibility: The technical issue usually raised during the feasibility stage of the
investigation includes the following:

8
• Does the necessary technology exist to do what is suggested?
• Do the proposed equipment’s have the technical capacity to hold the data required to use the
new system?
• Will the proposed system provide adequate response to inquiries, regardless of the number or
location of users?
• Can the system be upgraded if developed?
• Are there technical guarantees of accuracy, reliability, ease of access and data security?
Earlier no system existed to cater to the needs of Secure Infrastructure Implementation System.
The current system developed is technically feasible. It is a web based user interface. Thus it provides
an easy access to the users. The databases purpose is to create, establish and maintain a work- flow
among various entities in order to facilitate all concerned users in their various capacities or roles.
Permission to the users would be granted based on the roles specified. Therefore, it provides the
technical guarantee of accuracy, reliability and security. The software and hardware requirements for
the development of this project are not many and are already available as free as open source. The work
for the project is done with the current equipment and existing software technology. Necessary
bandwidth exists for providing a fast feed- back to the users irrespective of the number of users using
the system.
2.3.2. Operational Feasibility: Under this category of service we conduct a study to analysis and
determine whether your need can be fulfilled by using a proposed solution. The result of our
operational feasibility Study will clearly outline that the solution proposed for your business is
operationally workable and conveniently solves your problems under consideration after the proposal is
implemented. We would precisely describe how the system will interact with the systems and persons
around. Our feasibility report would provide results of interest to all stakeholders. It will do as per
the needs of the business requirements.
2.3.3. Timeline Feasibility: It is important to understand that a need must be fulfilled when it has
to be. Some otherwise feasible and highly desirable projects can become non-feasible due to very
restrictive timeline constraints. This fact makes it imperative that milestones are clearly linked to the
timeline and projects are well conceived with safe unforeseen margins. We make sure that we strictly
follow what has been stated above.

9
CHAPTER 3

SYSTEM
ANALYSIS
AND DESIGN

10
3.1 Requirement Specification
3.1.1 Major Functional Requirements:
The system should meet the following functional requirements:
 The system should be able to manage and store notices and files.
 The system should provide appropriate UI for notice and file upload and download.
 The system should be able to recognize and authenticate several levels of users.
 The system should be able to manage and maintain a proper database.
 The system should be easily operable and user friendly.
 The apps should be able to work seamlessly with the web server.
 The apps should be able to provide push messaging in real time, whenever available.

3.1.2 External Interface Requirements


3.1.2.1 User Interfaces: The system will start with a login page to identify the user level and the
features will be available accordingly. The application will have easily accessible buttons for all major
activities of the software. Key features and recent events will be highlighted to attract user attention.
3.1.2.2 Hardware Interfaces: The system will interact with the hardware resources of the system
on which it is running. While any system will support the core software, a device with supporting a
browser such as Chrome and OS like Windows or Mac.
3.1.2.3 Software Interfaces: Only Operating System having browsers which support tags of
HTML, CSS will support this application. It will have the most interaction with an external database
server. It may also be integrated with other systems like Employee Management System and/or Student
Management System.
3.1.2.4Communications Interfaces: An active internet connection will be required for the
functioning of the software. In case of the mobile apps, an internet connection will then allow the
software to connect to the online database. The system will use the Hyper Text Transfer Protocol
(HTTP) to transmit data.
3.1.3 Other Non-functional Requirements
3.1.3.1 Performance Requirements: The system in itself does not require anything specific for
basic operation, but the complete software with all its components running may have some

11
performance requirements. Except viewing pre-loaded notices and files, an internet connection is
needed for the features of the system to become available.
3.1.3.2 Safety Requirements: Major attention should be given to the safety and security of the
data and information that are stored in the software. The database must be trustworthy and non-leakage
to ensure no data loss occurs.
3.1.3.3Security Requirements: User authentication must be absolute and non-by-passable. No
user should be able to access the software without providing proper authentication. In case of guest
users, only public notices and events should be visible. Also, the IP address of the client machine can
be recorded for future follow up of any security issues that may arise.
3.1.3.4 Software Quality Attributes Several additional qualities and characteristics of the
system will be important to the client and/or the developers, like correctness, maintainability,
portability, testability and usability. For correctness, proper care and attention should be given during
the design and coding from both developers and customer (should correct some false and unwanted
features) side. Usability is achieved by developing the product as user friendly as possible. Similarly,
maintainability and testability plays vital role in the long.

12
3.2 Use Case Diagrams

Use Case Diagram of Online Notice Board

13
3.3 Data Flow Diagram:
3.3.1 LEVEL 0 DFD:

3.3.2 LEVEL 1 DFD:

14
3.3.3 LEVEL 2 DFD:

15
3.4 Design & steps
A design approach is a general philosophy that may or may not include a guide for specific methods.
Some are to guide the overall goal of the design. Other approaches are to guide the tendencies of the
designer. A combination of approaches may be used if they don’t conflict.
Function Oriented Design Approach is partitioning of a design into subsystems and modules, with each
one handling one or more functions. Contrast with object-oriented design, data-structure-oriented
design. This application project uses function oriented design approach. Every module and sub
modules are made, based on their functionality. These modules are designed and implemented
separately and then they are integrated together to form the desired application. This web application
contains two types of user:
 User
 Admin

Both the user are having different works. User have to check the notices and work on these notices.
Admin has a different work such as Add Notice, Delete Notice, and Update Notice Etc. The working of
both user and admin are described below:
3.4.1. User: The working procedure of user is described below:
3.4.1.1. Registering a User: The first step in this web application is to get the users registered to
the website. For this, user will provide all the necessary details such as Name, Email id, Roll No. etc.
and press the register button. After that, all the information along with registration id is stored on Web
Server and the user gets registered.
3.4.1.2. User Login: After registering, the user is allowed to log in. Username and password after
validating at client side, is sent to server side to authentication. After authentication response is sent by
the server to client, and then user gets logged in.
3.4.1.3. Viewing the Notices: At the first time, when you are using this application for the first
time, it will fetch all the notices from server. In all the other case, all previous notices are fetched from
application’s own database stored inside client mobile. It then checks for new notices from the server.
If there are new notices on the server, it will fetch all those notices.
3.4.1.4. Searching a Notice: The user is able to search the notice in list view depending on the
title of the notice. It helps user to get the desired notice instantly.

16
3.4.1.5. Reset Password: This application also has the facility to reset the password. If one user
has forgot his password, he/she can rest the password by giving his username or email address. The
user will be given a page in which he can set his new password. Forgotten password will be updated
with the new one on the server.
3.4.2 Admin: The working of admin is described following:
3.4.2.1 Add Notice: Being an admin, the most important work is to add the notice on the online
notice board. Since the right of adding notice to the web application is only at the admin, hence it is
very important to be sincere in performing this work. Any type of small mistake can create some big
issues.
3.4.2.2 Delete Notice: An admin can perform too many work on this web application and delete
notice is one of them. If a notice is useless i.e. the time has been passed for that notice then the admin
can delete that notice.
3.4.2.3 Update Notice: Updating the notice is not a primary work of admin but sometimes as per
the requirements it is important to update any notice.

Database Design
Database design is the process of producing a detailed data model of a database. This logical data
model contains all the needed logical and physical design choices and physical storage parameters
needed to generate a design in a data definition language, which can then be used to create a database.
A fully attributed data model contains detailed attributes for each entity. The term database design can
be used to describe many different parts of the design of an overall database system. Principally, and
most correctly, it can be thought of as the logical design of the base data structures used to store the
data. In the relational model these are the tables and views. In an object database the entities and
relationships map directly to object classes and named relationships. However, the term database
design could also be used to apply to the overall process of designing, not just the base data structures,
but also the forms and queries used as part of the overall database application within the database
management system (DBMS). The process of doing database design generally consists of a number of
steps which will be carried out by the database designer. Usually, the designer must:
• Determine the relationships between the different data elements.

• Superimpose a logical structure upon the data on the basis of these relationships.

17
Design process

1. Determine the purpose of the database - This helps prepare for the remaining steps.
2. Find and organize the information required - Gather all of the types of information to record in the
database, such as product name and order number.

3. Divide the information into tables - Divide information items into major entities or subjects, such as
Products or Orders. Each subject then becomes a table.

4. Turn information items into columns - Decide what information needs to be stored in each table.
Each item becomes a field, and is displayed as a column in the table. For example, an Employees table
might include fields such as Last Name and Hire Date.

5. Specify primary keys - Choose each table’s primary key. The primary key is a column, or a set of
columns, that is used to uniquely identify each row. An example might be Product ID or Order ID.

6. Set up the table relationships - Look at each table and decide how the data in one table is related to
the data in other tables. Add fields to tables or create new tables to clarify the relationships, as
necessary.

7. Refine the design - Analyze the design for errors. Create tables and add a few records of sample data.
Check if results come from the tables as expected. Make adjustments to the design, as needed.

8. Apply the normalization rules - Apply the data normalization rules to see if tables are structured
correctly. Make adjustments to the tables

18
3.5 Algorithms and Pseudo Code
3.5.1. Index. php
<? php
include('connection.php');
session_start();
?>
<html>
<head>
<title>Online Notice Board</title>
<link rel="stylesheet" href="css/bootstrap.css"/>
<script src="js/jquery_library.js"></script>
<script src="js/bootstrap.min.js"></script>
</head>
<body>
<nav class="navbar navbar-default navbar-fixed-top" style="background:#000">
<div class="container">
<ul class="nav navbar-nav navbar-left">
<li><a href="index.php"><strong>Online Notice Board</strong></a></li>
<li><a href="index.php?option=contact"><span class="glyphicon glyphicon-
phone"></span>Contact</a></li>
</ul>
<ul class="nav navbar-nav navbar-right">
<li><a href="index.php?option=New_user"><span class="glyphicon glyphicon-user"></span>
Sign Up</a></li>
<li><a href="index.php?option=login"><span class="glyphicon glyphicon-log-in"></span>
Login</a></li>
</ul>
</div>
</nav>
<div class="container-fluid">
<!-- slider -->
<div id="carousel-example-generic" class="carousel slide" data-ride="carousel">
<!-- Indicators -->
<ol class="carousel-indicators">
<li data-target="#carousel-example-generic" data-slide-to="0" class="active"></li>
<li data-target="#carousel-example-generic" data-slide-to="1"></li>

19
<li data-target="#carousel-example-generic" data-slide-to="2"></li>
</ol>
<!-- Wrapper for slides -->
<div class="carousel-inner" role="listbox">
<div class="item active">
<img style="height:600px;width:100%" src="images/bbd 1.jpg" alt="...">
<div class="carousel-caption">
</div>
</div>
<div class="item">
<img style="height:600px;width:100%;" src="images/bbd 2.jpg" alt="...">
<div class="carousel-caption">
</div>
</div>
<div class="item">
<img style="height:600px;width:100%;" src="images/bbd 3.jpg" alt="...">
<div class="carousel-caption">
</div>
</div>
</div>
<!-- Controls -->
<a class="left carousel-control" href="#carousel-example-generic" role="button" data-slide="prev">
<span class="glyphicon glyphicon-chevron-left" aria-hidden="true"></span>
<span class="sr-only">Previous</span>
</a>
<a class="right carousel-control" href="#carousel-example-generic" role="button" data-slide="next">
<span class="glyphicon glyphicon-chevron-right" aria-hidden="true"></span>
<span class="sr-only">Next</span>
</a>
</div>
<!-- slider end-->

20
</div>
<div class="container">
<div class="row">
<!-- container -->
<div class="col-sm-8">
<?php
@$opt=$_GET['option'];
if($opt!="")
{
if($opt=="contact")
{
include('contact.php');
}
else if($opt=="New_user")
{
include('registration.php');
}
else if($opt=="login")
{
include('login.php');
}
else
{
echo "
<h1>Welcome to the College Notice Portal !</h1>";
}
?>
</div>
<!-- container -->
<div class="col-sm-4">
<div class="panel panel-default">

21
<div class="panel-heading">Latest news</div>
<div class="panel-body">
<p><marquee behavior="scroll" align="middle" direction="left" bgcolor="ORANGE"
scrollamount="10" onmouseover="this.stop()" onmouseout="this.start()"><a href="">Schedule of 3rd
Sessional</a></marquee></p>
<p><marquee behavior="scroll" align="middle" direction="left" bgcolor="ORANGE"
scrollamount="10" onmouseover="this.stop()" onmouseout="this.start()"><a href="">Cultural Event
Schedule</a></marquee></p>
<p><marquee behavior="scroll" align="middle" direction="left" bgcolor="ORANGE"
scrollamount="10" onmouseover="this.stop()" onmouseout="this.start()"><a href="">Cricket
Tournament Schedule</a></marquee></p>
</div>
</div>
</div>
</div>
</div>
<br/>
<br/>
<br/>
<!-- footer-->
<nav class="navbar navbar-default navbar-bottom" style="background:black">
<div class="container">
<ul class="nav navbar-nav navbar-left">
</ul>
</div>
</nav>
<!-- footer-->
</body>
</html>

22
3.5.2 Registration.php
?php
require('connection.php');
extract($_POST);
if(isset($save))
{
//check user alereay exists or not
$sql=mysqli_query($conn,"select * from user where email='$e'");
$r=mysqli_num_rows($sql);
if($r==true)
{
$err= "<font color='red'>This user already exists</font>";
}
else
{
//dob
$dob=$yy."-".$mm."-".$dd;
//hobbies
$hob=implode(",",$hob);
//image
$imageName=$_FILES['img']['name'];
//encrypt your password
$pass=md5($p);
$query="insert into user values('','$n','$e','$pass','$mob','$gen','$hob','$imageName','$dob',now())";
mysqli_query($conn,$query);
//upload image
mkdir("images/$e");
move_uploaded_file($_FILES['img']['tmp_name'],"images/$e/".$_FILES['img']['name']);
$err="<font color='blue'>Registration successfull !!</font>"
}
}

23
?>
<h2>Registration Form</h2>
<form method="post" enctype="multipart/form-data">
<table class="table table-bordered">
<Tr>
<Td colspan="2"><?php echo @$err;?></Td>
</Tr>
<tr>
<td>Enter Your name</td>
<Td><input type="text" class="form-control" name="n" required/></td>
</tr>
<tr>
<td>Enter Your email </td>
<Td><input type="email" class="form-control" name="e" required/></td>
</tr>
<tr>
<td>Enter Your Password </td>
<Td><input type="password" class="form-control" name="p" required/></td>
</tr>
<tr>
<td>Enter Your Mobile </td>
<Td><input class="form-control" type="number" name="mob" required/></td>
</tr>
<tr>
<td>Select Your Gender</td>
<Td>
Male<input type="radio" name="gen" value="m" required/>
Female<input type="radio" name="gen" value="f"/>
</td>
</tr>
<tr>

24
<td>Choose Your hobbies</td>
<Td>
Reading<input value="reading" type="checkbox" name="hob[]"/>
Singing<input value="singin" type="checkbox" name="hob[]"/>
Playing<input value="playing" type="checkbox" name="hob[]"/>
</td>
</tr>
<tr>
<td>Upload Your Image </td>
<Td><input class="form-control" type="file" name="img" required/></td>
</tr>
<tr>
<td>Enter Your DOB</td>
<Td>
<select name="yy" required>
<option value="">Year</option>
<?php
for($i=1950;$i<=2016;$i++)
{
echo "<option>".$i."</option>";
}
?>
</select>
<select name="mm" required>
<option value="">Month</option>
<?php
for($i=1;$i<=12;$i++)
{
echo "<option>".$i."</option>";
}
?>

25
</select>
<select name="dd" required>
<option value="">Date</option>
<?php
for($i=1;$i<=31;$i++)
{
echo "<option>".$i."</option>";
}
?>
</select>
</td>
</tr>
<tr>
<Td colspan="2" align="center">
<input type="submit" class="btn btn-success" value="Save" name="save"/>
<input type="reset" class="btn btn-success" value="Reset"/>

</td>
</tr>
</table>
</form>
</body>
</html>
3.5.3 Connection.php
<?php
$conn=mysqli_connect("localhost","root","","online_notice");
?>
3.5.4 Amin/Add_Notice.php
<?php
extract($_POST);
if(isset($add))

26
{
if($details=="" || $sub=="" || $user=="")
{
$err="<font color='red'>fill all the fileds first</font>";
}
else
{
foreach($user as $v)
{
mysqli_query($conn,"insert into notice values('','$v','$sub','$details',now())");
}
$err="<font color='green'>Notice added Successfully</font>";
} }
?>
<h2>Add New Notice</h2>
<form method="post">
<div class="row">
<div class="col-sm-4"></div>
<div class="col-sm-4"><?php echo @$err;?></div>
</div>
<div class="row">
<div class="col-sm-4">Enter Subject</div>
<div class="col-sm-5">
<input type="text" name="sub" class="form-control"/></div>
<div class="col-sm-8">
</div>
<div class="row">
<div class="col-sm-4">Enter Details</div>
<div class="col-sm-5">
<textarea name="details" class="form-control"></textarea></div>
</div>

27
<div class="row" style="margin-top:10px">
</div>
<div class="row">
<div class="col-sm-4">Select User</div>
<div class="col-sm-5">
<select name="user[]" multiple="multiple" class="form-control">
<?php
$sql=mysqli_query($conn,"select name,email from user");
while($r=mysqli_fetch_array($sql))
{
echo "<option value='".$r['email']."'>".$r['name']."</option>";
}
?>
</select>
</div>
</div>
<div class="row" style="margin-top:10px">
<div class="col-sm-2"></div>
<div class="col-sm-8">
</div>
<div class="row" style="margin-top:10px">
<div class="col-sm-2"></div>
<div class="col-sm-4">
<input type="submit" value="Add New Notice" name="add" class="btn btn-success"/>
<input type="reset" class="btn btn-success"/>
</div>
</form>

28
3.6 Testing Process
Web Testing in simple terms is checking your web application for potential bugs before its made live
or before code is moved into the production environment. During this stage issues such as that of web
application security, the functioning of the site, its access to handicapped as well as regular users and
its ability to handle traffic is checked.
A test plan can be defined as a document describing the scope, approach, resources, and
schedule of intended testing activities. It identifies test items, the features to be tested, the testing tasks,
who will do each task, and any risks requiring contingency planning. In software testing, a test plan
gives detailed testing information regarding an upcoming testing effort, including
• Scope of testing
• Schedule
• Test Deliverables
• Release Criteria
• Risks and Contingencies
It is also be described as a detail of how the testing will proceed, who will do the testing, what
will be tested, in how much time the test will take place, and to what quality level the test will be
performed. The process of defining a test project so that it can be properly measured and controlled.
The test planning process generates a high level test plan document that identifies the software items to
be tested, the degree of tester independence, the test environment, the test case design and test
measurement techniques to be used, and the rationale for their choice. A testing plan is a
methodological and systematic approach to testing a system such as a machine or software. It can be
effective in finding errors and flaws in a system. In order to find relevant results, the plan typically
contains experiments with a range of operations and values, including an understanding of what the
eventual workflow will be. Test plan is a document which includes, introduction, assumptions, list of
test cases, list of features to be tested, approach, deliverables, resources, risks and scheduling.. A record
of the test planning process detailing the degree of tester independence, the test environment, the test
case design techniques and test measurement techniques to be used, and the rationale for their choice.
Test Activities: Various Testing Activities are as follow:
3.6.1. Black box testing: Internal system design is not considered in this type of testing. Tests are
based on requirements and functionality.

29
3.6.2. White box testing: This testing is based on knowledge of the internal logic of an
applications code. Also known as Glass box Testing. Internal software and code working should be
known for this type of testing. Tests are based on coverage of code statements, branches, paths,
conditions.
3.6.3. Unit testing: Testing of individual software components or modules. Typically done by the
programmer and not by testers, as it requires detailed knowledge of the internal program design and
code may require developing test driver modules or test harnesses.
3.6.4. Incremental integration testing: Bottom up approach for testing i.e. continuous testing of
an application as new functionality is added; Application functionality and modules should be
independent enough to test separately done by programmers or by testers.
3.6.5. Integration testing: Testing of integrated modules to verify combined functionality after
integration. Modules are typically code modules, individual applications, client and server applications
on a network, etc. This type of testing is especially relevant to client/server and distributed systems.
3.6.6. Functional testing: This type of testing ignores the internal parts and focus on the output is
as per requirement or not. Black-box type testing geared to functional requirements of an application.
3.6.7. System testing: Entire system is tested as per the requirements. Black-box type testing that is
based on overall requirements specifications, covers all combined parts of a system.
3.6.8. End-to-end testing: Similar to system testing, involves testing of a complete application
environment in a situation that mimics real-world use, such as interacting with a database, using
network communications, or interacting with other hardware, applications, or systems if appropriate.

30
CHAPTER 4
RESULTS/
OUTPUTS

31
The results/Outputs are shown by the following snapshots of the application:

4.1 Home page

32
4.2 Registration Page:

4.3 Login Page

33
4.4. User Dashboard

4.5 Admin’s Dashboard

34
4.6 Add Notice

4.7 Manage (Delete/Update) Notification

35
CHAPTER 5
CONCLUSION/
FUTURE
SCOPE

36
5.1 FUTURE SCOPE

The future scope of the project is that it can be used as any news giving application or it can be used to
advertise your products, telling the customers about new schemes and products coming to your shop.
This application of Online Notice Board can be further extended to include the following features:

1. Categorization of Notice: Notices can be categorized in different categories, so that it’s


possible for user to easily manage the notices. Categorization can also be done by making groups.
Defining the notice to be circulated in a particular group can make it more secure.

2. Documents and PDF files: The attachments can be further improved to include PDF files or
Doc files. Then there will not be much need to send images with the notices. A single file would serve
all the purposes.

3. Feedback: Feedback on the notices can also be taken. It can increase communication among
connected members and any issue can be easily sorted out on the spot.

5.2 CONCLUSIONS

I learned a lot by doing this project.

• Operating system: Windows 10

 Web Browser: Google Chrome, Mozilla Firefox

• Languages used: HTML, CSS, JAVA SCRIPT, PHP

• Servers Used: XAMP Server

• Database: MySQL

So during this project I learned all the above things. Before this project, I had no idea about Java Script,
PHP and MySQL for making a web application. Although I had little bit knowledge of HTML and CSS
before. But now I learned a lot about Java Script, PHP and MySQL and got knowledge of using Java
Script, PHP and MySQL for developing web application. Now I prefer to work on command line rather
than graphically. I learned how to work on XAMP Server. If I talk about the project, Online Notice
Board Application has reduced lot of manual work. It has made notifying each and every user very easy
and that too with no time and place restrictions

37
Chapter 6

References

38
Reference
 https://www.w3schools.com/php/default.asp

 https://www.tutorialspoint.com/php/index.htm

 https://www.w3schools.com/php/php_mysql_intro.asp

 https://en.wikipedia.org/wiki/PHP

39
Chapter 7

Appendices

40
7.1 Papers Published in Journals
7.1.1 Wireless Sensor network
Wireless Sensor Network
[1] Dr. Amit Singhal, [2] Shubham Rai, [3] Vikas Gupta
[1]
Head of Department Computer Science & Engineering, BBDIT Ghaziabad
[2][3]
Student, Computer Science & Engineering, BBDIT Ghaziabad
amitsinghal1.cs@gmail.com
guptavikas120@gmail.com
raishubham.103@gamil.com

Abstract
Wireless Sensor Network stands as one of the most emerging technologies combining
together sensing, computational capability and communication into minute devices proceeding
towards whole new world of simplicity. Wireless Sensor Networks (WSN) are used in variety of
fields which includes military, healthcare, environmental, biological, home and other commercial
applications.
A wireless sensor network is composed of large number of dispersed autonomous devices
which uses sensors to monitor physical or environmental changes in a geographical area, process
this data and report the changes to a centralized point through a wireless communication
network. Due to the requirement of low device complexity with low energy consumption a
balanced communication and signal or data processing capabilities must be found. Wireless
Sensor Network communicates through radio frequency. WSN acts as a mediator between the
real physical world and the virtual world. In this paper, we report some of the current trends,
challenges and security issues with wireless sensor network.

Wireless Sensor Network has been widely used in many areas especially for surveillance
and monitoring in agriculture and habitat monitoring. Environment monitoring has become an
important field of control and protection, providing real-time system and control communication
with the physical world.

Key Words: Wireless Sensor Network, Personal computers, Personal Digital Assistants, Denial of
Service attack, Environment Monitoring.
1. Introduction commercial and industrial applications, because
A wireless sensor network (WSN) [1] is a of its technical development in a processor,
collection of spatially distributed autonomous communication, and low-power usage of
sensors to examine present atmospheric and embedded computing devices. The WSN is built
physical such as temperature, pressure, etc. and with nodes that are used to observe the
to cooperatively pass the data gathered through surroundings like temperature, humidity,
the network to a main centralized point. pressure, position, vibration, sound etc. These
Currently, WSN (Wireless Sensor Network) is nodes can be used in various real-time
the most standard services employed in applications to perform various tasks like smart

41
detecting, a discovery of neighbor node, data Wireless sensor network (WSN) is built up of
Processing and storage, data collection, target a group of several hundred or thousands of
tracking, monitor and controlling, sensor nodes, where each node is connected to
synchronization, node localization, and effective one sensor node. Radio transceiver with an
routing between the base station and nodes. internal antenna or connection of an external
A Wireless sensor network can also be defined antenna, a microcontroller, an electronic circuit
as a network of devices that can communicate for interfacing with sensors and an energy source
the information gathered from a monitored field are some typical parts of a single sensor
through wireless links. The data is forwarded network node. Each sensor network node can be
through multiple nodes, and with a gateway, the composed of various sensors that are used to
data is connected to other networks like wireless collect data is transferred to the user through
Ethernet. network and also control some physical
The basic requirements of WSN are as follows: processes. A sensor network is composed of a
 Scalability- WSN must be capable of large number of sensor nodes, which are densely
being easily expanded or upgraded on deployed either inside the phenomenon or very
demand. close to it. This paper presents a detailed
 Reliability – WSN must be worth overview of the research issues in the
trusting and it should provide what is applications of Wireless Sensor Networks.
needed for the user 1.1 Characteristics
 Responsiveness – WSN should quickly The main characteristics of a WSN include:
react in the desired or positive way.
 Mobility – WSN must be able to move  Power consumption constraints for nodes
from one place to another. using batteries or energy harvesting.
 Power Efficiency – WSN must be power Examples of suppliers are ReVibe
efficient. Energy[6] and Perpetuum[7]
 Ability to cope with node failures
(resilience)
 Some mobility of nodes (for highly
mobile nodes see MWSNs)
 Heterogeneity of nodes
 Homogeneity of nodes
 Scalability to large scale of deployment
 Ability to withstand harsh environmental
conditions
 Ease of use
2. Wireless Sensor Network
Architecture
The most common WSN architecture follows the
OSI architecture Model. The architecture of the
WSN includes five layers and three cross layers.
Mostly in sensor network we require five layers,
namely application, transport, network, data
link& physical layer. The three cross planes are
namely power management, mobility

42
management, and task management. These either practical on the upstream. There are some
layers of the WSN are used to accomplish the popular protocols in the transport layer namely
network and make the sensors work together in STCP (Sensor Transmission Control Protocol),
order to raise the complete efficiency of the
PORT (Price-Oriented Reliable Transport
network.
Protocol and PSFQ (pump slow fetch quick).
The types of topologies used in WSN are:
 Star Topologies 2.3 Network Layer
 Tree Topologies The main function of the network layer is
 Mesh Topologies routing, it has a lot of tasks based on the
application, but actually, the main tasks are in
Layers in Wireless Sensor Network are: the power conserving, partial memory, buffers,
and sensor don’t have a universal ID and have to
be self-organized. There are a lot of existing
protocols for this network layer, they can be
separate into; flat routing and hierarchal routing
or can be separated into time driven, query-
driven & event driven.

2.4 Data Link Layer


The data link layer is liable for multiplexing data
frame detection, data streams, MAC, & error
control, confirm the reliability of point–point
(or) point– multipoint.

2.5 Physical Layer


The physical layer provides an edge
for transferring a stream of bits above physical
medium. This layer is responsible for the
selection of frequency, generation of a carrier
frequency, signal detection, Modulation & data
Fig 2: Architecture of WSN encryption. IEEE 802.15.4 is suggested as
typical for low rate particular areas & wireless
2.1 Application Layer sensor network with low cost, power
The application layer is liable for traffic consumption, density, the range of
management and offers software for numerous communication to improve the battery life.
applications that convert the data in a clear form CSMA/CA is used to support star & peer to peer
to find positive information. Sensor networks topology. There are several versions of IEEE
arranged in numerous applications in different 802.15.4.V.
fields such as agricultural, military,
environment, medical, etc. 3. Applications
2.2 Transport Layer The area of application of wireless sensor
The function of the transport layer is to deliver network is very broad. Wireless sensor networks
congestion avoidance and reliability where a lot may comprise of numerous different types of
of protocols intended to offer this function are sensors like low sampling rate, seismic,

43
magnetic, thermal, visual, infrared, radar, and soil, and atmospheric contexts, forest fire
acoustic, which are clever to monitor a wide detection, meteorological or geophysical
range of ambient situations. Sensor nodes are research, flood detection, bio-complexity
used for constant sensing, event ID, event mapping of the environment, and pollution
detection & local control of actuators. The study. There are several studies that focus in
applications of wireless sensor network mainly environmental monitoring applications [9] [10].
include health, military, environmental, home, & Some researchers implement the fault tolerant
other commercial areas. and studies the tradeoff between tool expense
and lifetime of sensor network [11] to make sure
the fault tolerance is in the three dimensional
settings.
3.3 Military Applications
Wireless sensor networks can be an integral part
of military command, control, communications,
computing, intelligence, surveillance,
reconnaissance and targeting (C4ISRT) systems.
Some of the military applications of sensor
networks are monitoring friendly forces,
equipment and ammunition; battlefield
surveillance, reconnaissance of opposing forces
and terrain, targeting, battle damage assessment,
and nuclear, biological and chemical (NBC)
attack detection and reconnaissance. Some main
uses of WSN in Military are following:
Fig 3: Applications of WSN
 Monitoring friendly forces, equipment
3.1 Area Monitoring and ammunition
Area monitoring is a common application of
WSNs. In area monitoring, the WSN is deployed
 Battlefield surveillance
over a region where some phenomenon is to be
monitored. A military example is the use of
 Reconnaissance of opposing forces and
terrain
sensors detect enemy intrusion; a civilian
example is the geo-fencing of gas or oil  Targeting
pipelines.
 Battle damage assessment
3.2 Environment/Earth Sensing
There are many applications in monitoring
 Nuclear, biological and chemical attack
environmental parameters. Some environmental detection and reconnaissance
applications of sensor networks include tracking Since sensor networks are based on the dense
the movements of birds, small animals, and deployment of disposable and low-cost sensor
insects. Monitoring environmental conditions nodes, destruction of some nodes by hostile
that affect crops and livestock, irrigation, macro actions does not affect a military operation as
instruments for large-scale Earth monitoring and much as the destruction of a traditional sensor,
planetary exploration, chemical/biological which makes sensor networks concept a better
detection, precision agriculture, biological, approach for battlefields.
Earth, and environmental monitoring in marine,

44
3.5 Industrial Monitoring
Wireless sensor networks have been developed
for machinery condition-based maintenance
(CBM) as they offer significant cost savings and
enable new functionality.[12] Wireless sensors can
be placed in locations difficult or impossible to
reach with a wired system, such as rotating
machinery and untethered vehicles.
Due to the high density of server’s racks in a
data center, often cabling and IP addresses are an
issue. Wireless sensor networks are also used for
the collection of data for monitoring of
environmental information.
4. Security Issues in WSN
4.1 Security Requirement: Sensor network
Fig 4: Military Uses have to fulfill some requirements for providing
a secure communication. General security
3.4 Health Care Monitoring requirements of [2] [3] WSNs are availability,
The sensor networks for medical applications confidentiality, integrity and authentication. [5]
can be of several types: implanted, wearable, and [4][6] Some other requirements known as
environment-embedded. The implantable secondary requirements are source localization,
medical devices are those that are inserted inside self-organization and data freshness. These
human body. Wearable devices are used on the requirements gives protection against attacks to
body surface of a human or just at close the information transmitted over the sensor
proximity of the user. Environment-embedded network [19].
systems employ sensors contained in the
4.2 Source Localization: For data
environment.
transmission some applications use location
information of the sink node. It is important to
give security to the location information. Non-
secured data can be controlled by the malicious
node by sending false signal strengths or
replaying signals.
4.3 Data Integrity: It is very crucial in
sensor network to ensure the reliability of the
data. It ensures that data packets that are
received by the destination are exactly the ones
sent by the sender and any one cannot alter that
packet in between.
4.4 Data Confidentiality: Confidentiality
means to protect data during communication in a
Fig 5: Uses in Healthcare network to be understood other than intended
recipient. To provide the data confidentiality, an

45
encrypted data is used so that only recipient Attacks in wireless sensor network are shown in
decrypts the data to its original form. Figure 7. They are roughly categorized as
follows:

Attacks in

Based Based on Based on


on Capabilit Protocol
li

Wormhole Insider Vs. Physical


Fig 7: Different Types of Attacks
Hello Flood Outsider Link
Fig 6: Security Issues
6. Conclusion
Selective Passive Vs. Network
4.5 Data Availability: It ensures that the
services are always available in the network Our research paper has introduced the
even under the attack such as Denial of Service architecture, various applications and security
attack (Dos). issues of wireless sensor network. In present
generation WSN services are extending for mini
4.6 Data Authentication: It ensures that the applications like agriculture, military
data received by receiver has not been modified application, medical and health care. These
during the transmission. It is important for systems has low power consumption, low cost
receiver node to do verification that the data is and is a convenient way to control real-time
received from an authenticate node. monitoring for unprotected agriculture and
4.7 Data Freshness: Data freshness means habitat. Moreover, it can also be applied to
that each message transmitted over the channel indoor living monitoring, greenhouse
is new and fresh. It guarantees that the old monitoring, climate monitoring and forest
messages cannot be replayed by any node. This monitoring. Though wireless sensor networks
can be solved by adding some time related are constrained by scalability, cost, and topology
counter to check the freshness of the data. change and power consumption, new
technologies are being devised to overcome
5. Classification of security threats these and to make sensor networks an integral
part of our lives. The future prospects of WSN
WSNs are vulnerable against so many attacks.
applications are highly promising to
Attackers can attack the radio transmission; add
revolutionize our everyday lives.
their own data bits to the channel, replay old
packets and any other type of attack. A secure 5. Future Scope
network ought to support all security properties.
[7][8] Attackers may deploy some malicious It will be produced a very powerful and cost-
nodes in the network with similar capabilities as effective devices that they may be used in many
of normal node or may overwrite the memory of other applications (such as underwater r
normal deployed node by capturing them. acoustic sensor systems , sensing based cyber-

46
physical systems , time critical application , 2278-0661, Vol. 16, Issue 6(III), DOI:
connective sensing and spectrum , privacy and 10.9790/0661-16637983, pp. 79-83, Nov.-Dec.
security management . [5] Pankaj Pardesi and Jitender Grover,
Wireless sensor networks represent a very “Improved Multiple Sink Placement Strategy in
interesting multidisciplinary field of research, Wireless Sensor Networks”, 2015 IEEE
characterized by a very large number of possible International Conference on Futuristic Trends on
applications. Their main advantage is the ability Computational Analysis and Knowledge
to be applied to any field, and in any Management (A-BLAZE), Amity University,
environment that for its application require Greater Noida, Uttar Pradesh, India, DOI:
substantially stringent conditions. Future 10.1109/ABLAZE.2015.7155032, pp. 418-424,
scenarios "are aware of the world" or "internet of 25-27 Feb, 2015.
things" are as real scenarios, and there are good [6] G. Padmavathi and D. Shanmugapriya, “A
chances to achieve in the next ten years. Survey of Attacks, Security Mechanisms and
Challenges in Wireless Sensor Networks”,
International Journal of Computer Science and
6. References Information Security (IJCSIS), Volume 4, Issue
1 & 2, pp. 1-9, August 2009
[1] Bhaskar Krishnamachari, “An Introduction [7] Daniel E. Burgner, Luay A. Wahsheh,
to Wireless Sensor Networks”, Presentation at "Security of Wireless Sensor Networks", 2011
the Second International Conference on Eighth International Conference on Information
Intelligent Sensing and Information Processing Technology: New Generations (ITNG), Las
(ICISIP), Chennai, India, 1 January 2005 Vegas, NV, pp. 315-320, 2011.
[2] Eirini Karapistoli, Anastasios A. [8] Heena Rathore, Sushmita Jha, "Bio-inspired
Economides, "Wireless sensor network security machine learning based Wireless Sensor
visualization", 2012 4th International Congress Network security", 2013 World Congress on
on Ultra-Modern Telecommunications and Nature and Biologically Inspired Computing
Control Systems and Workshops (ICUMT), pp. (NaBIC), Fargo, ND, pp. 140-146, 2013.
850-856, 2012. [9] W.-S. Jang, W. M. Healy, and M. J.
[3] Virendra Pal Singh, Sweta Jain and Jyoti Skibniewski, “Wireless sensor networks as part
Singhai, “Hello Flood Attack and its of a web-based building environmental
Countermeasures in Wireless Sensor Networks”, monitoring system,” Automation in
International Journal of Computer Science Issues Construction, vol. 17, no. 6, pp. 729-736, Aug.
(IJCSI), Volume 7, Issue 3, No 11, pp. 23-27, 2008.
May 2010. [10] R. Mittal and M. P. S. Bhatia, “Wireless
[4] Jitender Grover, Shikha Sharma and Mohit Sensor Networks for Monitoring the
Sharma, “Reliable SPIN in Wireless Sensor Environmental Activities,” Analysis, 2010.
Network: A Review”, IOSR Journal of [11] Y. Guo and J. McNair, “Fault Tolerant
Computer Engineering (IOSR-JCE), ISSN: Three Dimensional Environment Monitoring
Using Wireless Sensor Networks,” pp. 1-7.

47
7.2 Design of Routing Protocol for MANET
Design of Routing Protocol for MANET
[1] Dr. Amit Singhal, [2] Vikas Gupta, [3] Shubham Rai
[1]
Head of Department Computer Science & Engineering, BBDIT Ghaziabad
[2][3]
Student, Computer Science & Engineering, BBDIT Ghaziabad
amitsinghal1.cs@gmail.com
guptavikas120@gmail.com
raishubham.103@gamil.com

Abstract:
A typical ad hoc network consists of nodes that are usually battery operated devices such as
laptops, PDAs or sensor nodes that come together and spontaneously form a network.
Energy conservation is a critical issue as the lifetime of these nodes depends on the life of
the system. Research has been carried out to conserve energy at various levels i.e., at the
hardware level, operating system, application level. We propose Efficient Power Aware
Routing (EPAR), a new power aware routing protocol that increases the network lifetime
of MANET.
In contrast to conventional power aware algorithms, EPAR identifies the capacity of a node
not just by its residual battery power, but also by the expected energy spent in reliably
forwarding data packets over a specific link. This makes that high energy node to transmit
the received packets to maximum energy node of available nodes. It may leads to successful
delivery of packets on this path. Using a mini-max formulation, EPAR selects the path that
has the largest packet capacity at the smallest residual packet transmission capacity.
This protocol must be able to handle high mobility of the nodes that often cause changes in
the network topology. This paper evaluates three Ad hoc network routing protocols
(EPAR, MTPR, and DSR) in different network scales, taking into consideration the energy
consumption. Indeed, our proposed algorithm reduces for more than 20% the total energy
consumption and decreases the mean delay, especially for high load networks, to maximize
the network lifetime, while achieving a good packet delivery ratio.
Key words: EPAR, MTPR, DSR, Residual battery power.

1. INTRODUCTION range or with the one that is outside their


An Ad hoc wireless network is a collection radio range. For the latter scenario, an
of two or more devices with wireless intermediate node is used to relay or forward
communications and networking capability. the packet from the source toward the
Such devices can communicate with another destination. An Ad hoc wireless network is
node that is immediately within their radio self-organizing and adaptive. This means
that a formed network can be de-formed on-
48
the-fly without the need for any system network. Energy-related metrics that have
administration. The term “ad hoc” tends to been used to determine energy efficient
imply “can take different forms” and “can routing path instead of the shortest one are
be mobile, standalone, or networked”. Ad discussed. They are
hoc nodes or devices should be able to  Energy consumed/packet,
detect the presence of other such devices
and to perform the necessary handshaking to  Time to network partition,
allow communications and the sharing of  Variance in node power levels,
information and services. Ad hoc devices  cost/packet, and
should not only detect the presence of
connectivity with neighboring  Maximum node cost.
devices/nodes, but also identify what type
the devices are and their corresponding 2. PRELIMINARY STUDIES:
attributes. Since an ad hoc wireless network
does not rely on any fixed network entities, This section explains the literature survey
the network itself essentially infrastructure- various energy conservation technique the
less. There is no need for any fixed radio survey also extensively covers the various
base stations, no wires or fixed routers routing techniques. Dongkyun Kim et al
.However, due to the presence of mobility, presents untethered nodes in mobile ad-hoc
routing information will have to change to networks strongly depend on the efficient
reflect changes in link connectivity. The use of their batteries. In this paper we
diversity of ad hoc mobile devices also propose a new metric, the drain rate, to
implies that the battery capacity of such forecast the lifetime of nodes according to
devices will also vary. Since ad hoc current traffic conditions. This metric is
networks rely on forwarding data packets combined with the value of the remaining
sent by other nodes, power consumption battery capacity to determine which nodes
becomes a critical issue. can be part of an active route. This metric is
good at reflecting the current dissipation of
1.1 Energy Efficiency energy without considering other traffic
Most existing network protocols do not measurements, like queue length and the
consider power consumption an issue since number of connections passing through the
they assume the presence of static hosts and nodes. The main goal of MDR is to extend
routers, which are powered by mains. the lifetime of each node, while prolonging
However, mobile devices today are mostly the lifetime of each connection. The demerit
operated by batteries. Battery technology is is current dissipation of energy without
still lagging behind microprocessor considering other traffic measurements, like
technology. The lifetime of Li-ion battery queue length and the number of connections
today is only 2-3 hours. Such a limitation in passing through the nodes. P.-J. Wan et al
the operating hours of devices implies the presents Energy conservation is a critical
need for power conservation. In particular, issue in ad hoc wireless networks for node
for ad hoc mobile networks, mobile devices and network life, as the nodes are powered
must perform both the role of an end system by batteries only. One major approach for
and that of intermediate system. Hence, energy conservation is to route a
forwarding packets on the behalf of others communication session along the route
will consume power, and this can be quite which requires the lowest total energy
significant for nodes in an ad hoc wireless consumption. This optimization problem is
referred to as Minimum-Energy Routing.
49
While the minimum-energy unicast routing along with the packets. DSR explores the
problem can be solved in polynomial time many advantages of source routing and
by shortest-path algorithms, it remains open enjoys the benefits of some of the most
whether the minimum-energy broadcast extensive testing and deployment of any of
routing problem can be solved in polynomial the protocols. It is one of the purest
time, despite the NP-hardness of its general examples of the on demand protocol, in
graph version. Recently three greedy which all actions are taken only when the
heuristics were proposed in MST (minimum route is actually needed. It has some
spanning tree), SPT (shortest-path tree), and disadvantage also like it does not support
BIP (broadcasting incremental power).At multicasting, decreasing throughput, and
load increases the energy consumption is increasing load of the network.
more. Md Nafees Rahman developed an
“Efficient Algorithm for Prolonging 3.2 MTPR Protocol
Network Lifetime of Wireless Sensor
In existing power aware methodology
Networks”. This approach proposed a
(MTPR), the next hop to be transmitted only
Particle Swarm Optimization (PSO). It has
chosen based on the residual energy of the
the merits to locate the optimal sink position
next hop. Not focusing on complete path
with respect to those relay nodes to make the
identification. Whenever the source finds
network more energy efficient. The demerit
next hop based on residual energy, the high
is that it only satisfies low density Network.
residual energy nodes might not be nearer
From the above literature survey related
by sufficient energy nodes. This makes that
with the energy consumption the following
high energy node to transmit the received
things are focused:
packets to maximum energy node of
 Minimize Energy consumed per packet: available nodes. It may leads to unsuccessful
the most intuitive metric, however not delivery of packets on this path. Assuming
optimal for maximum lifetime; all nodes in the network are equally
 Maximize Time to Network Partition: important, no node should be used for
important for mission critical routing more often than other nodes.
applications, hard to maintain low delay However, if many minimum energy routes
and high throughput simultaneously; all go through a specific node, the battery of
 Minimize Variance in node power levels: this node is drained quickly and eventually
balance the power consumption for all the node dies. Therefore, the remaining
the node in the network, i.e., all nodes in battery capacity of a node should be used to
the network have the same importance; define a routing metric that captures the
 Minimize Cost per packets: try to expected lifetime of a node, and so, the
maximize the life of all the nodes; lifetime of the network. The limitations of
 Minimize Maximum Node Cost: try to this approach can be summarized are the
delay the node network will be congested as the packets has
to route from multiple nodes, more number
3. EXISTING PROBLEM of nodes has to participate in forming a
routing path and it will always select its
3.1 DSR Protocol nearest neighboring node ,it does not
The Dynamic Source Routing algorithm is consider overall s-d path. This protocol is
another innovative approach to ad hoc that, it is not scalable to large networks and
networking whereby nodes communicate even requires significantly more processing
along paths stored in source routes carried resources than most other protocols.

50
Basically, in order to obtain the routing energies of all the nodes and thereby
information, each node must spend lot of prolong the network lifetime.
time to process any control data it receives,
even if it is not the intended recipient. 5.1 Route Discovery and
Maintenance in Proposed
4. PROPOSED WORK Algorithm
To propose an efficient power aware routing EPAR schemes make routing decisions to
(EPAR) protocol that increases the network optimize performance of power or energy
lifetime of MANET. In EPAR, before related evaluation metrics. The route
forwarding its packets to next hop, the selections are made solely with regards to
source itself analyze the entire path and its performance requirement policies,
ability. The source node calculates the independent of the underlying ad-hoc
expected energy spent over each path routing protocols deployed. Therefore the
available and its lifetime changes if, the power aware routing schemes are
packet routed through each path. On transferable from one underlying ad hoc
analyzing the entire route path available, the routing protocol to another, the observed
source node decides not only the next hop relative merits and drawbacks remain valid.
and also the entire path to be used and route There are two routing objectives for
its packet as calculated. It increased minimum total transmission energy and total
Network lifetime. In EPAR, selection of operational lifetime of the network can be
path decided only based on the residual mutually contradictory. For example, when
energy of full path. How about the residual several minimum energy routes share a
energy of all intermediate nodes have taken common node, the battery power of this
care in selection of next hop. It increases in node will quickly run into depletion,
life time of nodes further decreases packet shortening the network lifetime. When
loss. choosing a path, the DSR implementation
chooses the path with the minimum number
of hops. For EPAR, however, the path is
5. DESIGN AND chosen based on energy. First, we calculate
IMPLEMENTATION the battery power for each path, that is, the
To conserve energy, there should minimize lowest hop energy of the path. The path is
the amount of energy consumed by all then selected by choosing the path with the
packets traversing from source node to maximum lowest hop energy.
destination node i.e. we want to know the Table 1. NETWORK PARAMETER TO
total amount of energy the packets BE MEASURED USING NS2
consumed when it travels from each and
every node on the route to the next hop. The
No of packets Defines no of packet
energy consumed for one packet is
sent
calculated by the equation k Ec=ΣT (ni,
Traffic size Packet size and time
ni+1) i=1 where, into nares nodes in the
interval for
route while T denotes the energy consumed
sequential
in transmitting and receiving a packet over
transmission
one hop. Then we find the minimum Ec for
Transmit Energy Require to transmit
all packets. The main objective of EPAR is
Receive Energy Require to receive
to minimize the variance in the remaining
Idle energy Being at ON
condition

51
Sense power Energy spent to sense
packets
Energy consumed: No of packets
transmitted x energy
spent
Residual Energy Initial energy –
energy consumed

5.2 Network Lifetime Network


lifetime – Residual energy
relationship
It could be classified into two conditions: Figure 1. Flow Chart
1. Non-functional: 6. SIMULATION SETUP AND
The node is simply idle and not participating
in any traffic transmission at this situation RESULT DISCUSSION
residual energy will be a function of only of Extensive simulations were conducted
idle power. Since no transmission reception using NS-2.33. The simulated network
is carried out. Therefore, by spending idle consisted of 120 nodes randomly scattered
power, how long the low power node could in a 2000x2000m area at the beginning of
remain in network. the simulation. The tool set dest was used to
The network lifetime = The time over which produce mobility scenarios, where nodes are
the residual energy could spend on keeping moving at six different uniform speeds
the node remains in network. (Network ranging between 0 to 10 m/s and a uniform
lifetime) non function = residual energy pause time of 10s.
(idle power) * network lifetime = residual 6.1 Node Configuration
energy Eg: 0.01v * 500 min = 5v.

2. Network lifetime functional:


In this case, the node contributes to the
network and involved in handling traffic. So
it would transmit power and receive power.
Therefore, (transmission power + receiving
power) * network lifetime = residual energy
Packet delivery ratio=No. of packets
delivered / No. of packets transmitted.
Figure 2 Node Configuration

In Fig 2 Node Configuration is done. Node


configuration essentially consists of defining
the different node characteristics before
creating them. They may consist of the type
of addressing structure used in the
simulation, selecting the type of ad hoc
routing protocol for wireless nodes or
defining their energy model.

52
6.2 Path Selection Based On
Energy Calculation

Figure 5 Network Lifetime Varying With


Respect Network Size
6.4 Network Lifetime Varying With
Figure 3. Path Selection Based On Energy Respect Network Size
Calculation In Fig 5 shows that the DSR protocol
In Fig 3 we calculate expected energy drain becomes inefficient when the network
at each path calculated from path A, B, C. consists of more than 700 traffic size for low
Among which path A expected to spent density network while for high density
lesser energy and ensure prolong lifetime, so network becomes inefficient when the
path A has chosen. network consist more than 1000 sources
EPAR shows the best performance with
6.3 Average Consumed Power
maximum network lifetime than MTPR and
versus No. Of Nodes DSR.
6.5 Network Lifetime Varying With
Respect To Network Size
(Nonfunctional) Figure 6 Network
Lifetime Varying With Respect to
Network Size(Nonfunctional)

Figure 4: Average Consumed Power


versus No. of Nodes

In Fig 4 shows that the consumed power of


networks using EPAR and MTPR decreases
significantly when the number of nodes
exceeds 60. On the contrary, the consumed
power of a network using the DSR protocol
increases rapidly whilst that of EPAR based
network shows stability with increasing
number of nodes.
In Fig 6 shows that the node is simply idle
and not participating in any traffic

53
transmission at this situation residual energy 7. CONCLUSION
will be a function of only of idle power. This paper mainly deals with the improve
Since no transmission reception is carried the overall network lifetime of the network
out. Therefore, by spending idle power, how using a EPAR algorithm. We propose a new
long the low power node could remain in scheme EPAR it satisfies both medium and
network. The network life time =The time large size network but DSR and MTPR only
over which the residual energy could spend used for small size network. It produces
on keeping the node remains in network. good results in terms of throughput and
6.6 Network Lifetime Varying With leads to good packet delivery ratio.
Respect To Network Size 8. REFERENCES
(Functional) [1] Internet Engineering Task Force, “Manet
working group charter,”
http://www.ietf.org/html.charters/manet-
charter.html.
[2] E.Royer and C.-K. Toh, “A Review of
Current Routing Protocols for Ad Hoc
Mobile Wireless Networks,” IEEE Personal
Communications Magazine, Vol. 6, No. 2,
April 1999.
[3] T. S. Rappaport, “Wireless
Communications: Principles and Practice”,
Prentice Hall, July 1999.
[4] S-L.Wu, Y-C Tseng and J-P Sheu,
“Intelligent Medium Access for Mobile Ad
Hoc Networks with Busy Tones and Power
Figure 7 Network Lifetime Varying with Control,” IEEE Journal on Selected Areas in
Respect Network Size (Functional) Communications, Vol. 18, No. 9, September
2000.
In Fig 7shows the network lifetime as a
[5] J. Gomez, A.T. Campbell, M.
function of the number of nodes. The life-
Naghshineh and C. Bisdikian, “Conserving
time decreases as the number of nodes grow;
Transmission Power in Wireless Ad Hoc
however for a number of nodes greater than
Networks”, Proc. 9thInternational
100, the life-time remains almost constant as
Conference on Network Protocols (ICNP
the number of nodes increases. Lifetime
2001), 2001.
decreases because MANET has to cover
[6] B. Chen, K. Jamieson, H. Balakrishnan,
more nodes as the number of nodes in the
and R. Morris, “Span: An Energy-Efficient
network size increases. We observe that the
Coordination Algorithm for Topology
improvement achieved through EPAR is
Maintenance in Ad Hoc Wireless
equal to 85 %. Energy is uniformly drained
Networks,” ACM Wireless Networks
from all the nodes and hence the network
Journal, Vol. 8, 2002.
life-time is significantly increased. Network
[7] M. W. Subbarao, “Dynamic Power-
lifetime as a functional can be calculated as:
Conscious Routing for MANETs: An Initial
RESIDUAL ENERGY= (transmission
Approach”, Journal of Research of the
power + receiving power) * network
National Institute of Standards and
lifetime.
Technology, Vol.104, No.6,1999.

54
[8] J.E. Wieselthier, G.D. Nguyen, and
A.Ephremides, ”On the construction of
energy efficient broadcast and multicast
trees in wirelessnetworks”, IEEE
INFOCOM 2000.
[9] S. Singh and C. S. Raghavendra,
“PAMAS - Power Aware Multi-Access
protocol with Signalling for Ad Hoc
Networks,” ACM SIGCOMM, Computer
Communication Review, July 1998.
[10] P-J. Wan, G. Calinescu, X. Li and O.
Frieder, “Minimum-Energy Broadcast
Routing in Static Ad Hoc Wireless
Networks”, IEEE INFOCOM2001.
[11] Laura Feeney and Martin
Nilsson,“Investigating the Energy
Consumption of a Wireless Network
Interface in an Ad Hoc Networking
Environment”, Proceedings of IEEE
INFOCOM, Anchorage, AK, 2001.
[12] K. Scott and N. Bambos, ”Routing and
channel assignment for low power
transmission in PCS,” Proceedings of IEEE
InternationalConference on Universal
Personal Communications (ICUPC ’96),
Cambridge, MA, September 29 - October 2,
1996.
[13] S. Singh, M. Woo, and C. S.
Raghavendra, “Power-aware with Routing
in Mobile Ad Hoc Networks”, Proceedings
of Mobicom 1998, Dallas, TX, 1998.
[14] C.-K. Toh,“Maximum Battery Life
Routing to Support Ubiquitous Mobile
Computing in Wireless Ad Hoc Networks,”
IEEE Communications Magazine, June
2001.

55
7.2 Certificates of the Papers Published

7.2.1. Wireless Sensor Network

56
57
7.2.2 Design of Routing Protocol for MANET

58
59
60

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy