Online Notice Board
Online Notice Board
On
BACHELOR OF TECHONOLOGY
IN
Submitted By:
We hereby declare that the project entitled “Online Notice Board” submitted for the B. Tech. (CSE)
degree is our original work and the project has not formed the basis for the award of any other degree,
diploma, fellowship or any other similar titles.
This is to certify that the project entitled “Online Notice Board” is the bonafide work of Shubham
Rai and Vikas Gupta submitted in partial fulfillment of the requirements for the award of the degree of
Bachelor of Technology (B.tech) in Computer Science and Engineering (CSE) by APJ Abdul Kalam
Technical University, Lucknow during the academic year 2017-2018.
Head of Department
Dr. Amit Singhal
Department of CSE
ACKNOWLEDGMENT
We take this opportunity to express our sincere thanks and deep gratitude to our project guide Dr. Amit
Singhal who shared his time and knowledge with us and helped in completing this project successfully.
We with the immense pleasure and heartfelt gratitude; express our sincere thanks to our project
coordinators Mr. Ramveer Singh & Ms. Preeti Dubey for their useful suggestions, continuous
guidance, and moral support for the progress of my work.
We express our sincere gratitude to Prof. (Dr.) Amit Singhal, Head of Department (CSE) for his strict
supervision, constant encouragement, inspiration and guidance. His inspiring suggestions and timely
guidance enabled me/us to perceive the various aspects of the project with a new vision.
We are very much grateful to our parents for their support and faith they showed in us. Last but not the
least our friends for being there round the clock whenever we needed them.
Abstract
An online notice board is a place where people can leave any types of messages and
notifications, for example, to advertise things, announce events or provide any information. Notice
board online it can be placed on digital devices such computers, tabs, mobile phones etc. This online
notice board project is very helpful for all type of users like existing users and new users. So admin can
leave and erase notification for other people to read and see. The main aim of this free online notice
board project is make information dissemination much easier in a paperless community as the world
tends to interact with the online notice board facility as an project, Online notice board admin can send
the notification to the particular students regarding fee payments, results, any new activity happen in
college campus or college fest participation, libraries dues, hostel room payments, any workshop
registrations, warnings and reminders etc. for this work online notice board project is make all work
much easier and understandable to all.
This online notice board work generally intends to act as a support system for the all users. By
the help of free online notice board users can access the notifications and articles quickly not only in
the particular premises, also wherever and whenever they need to know. Online notice board usability
is fully capable of passing relevant notices and announcements, and keeping the users update from time
to time. The students are kept updated each time with the online notice board for college is uploaded
based on their preferences with respect to the departments and categories through a notice board online.
Online notice board is one of the applications to improve the usage of notice board of the college by
making it available online.
Table of Contents
Title Page i
Declaration of the Student ii
Certificate of the Guide iii
Acknowledgement iv
Abstract v
List of Figures vi
List of Tables (optional) vii
Timeline / Gantt Chart viii
1. INTRODUCTION 1
1.1 Problem Definition 2
1.2 Project Overview/Specifications 3
1.3 Hardware Specification 4
1.4 Software Specification 4
2. LITERATURE SURVEY 5
2.1 Existing System 6
2.2 Proposed System 7
2.3 Feasibility Study 8
3 SYSTEM ANALYSIS & DESIGN 10
3.1 Requirement Specification 11
3.2 Use Case Diagrams 13
3.3 DFD’s 14
3.4 Design & steps 16
3.5 Algorithms and Pseudo Code 19
3.6 Testing Process 29
4. RESULTS / OUTPUTS 31
5. CONCLUSIONS 36
6. REFERENCES 38
7. APPENDICES 40
7.1 Papers Published in Journals 41
7.2 Certificates of the Papers Published 56
List of Figures
3.2 Use Case Diagram 13
3.3 DFD’s 14
3.3. Level 1 DFD 14
1
3.3. Level 2 DFD 14
2
3.3. Level 3 DFD 15
3
CHATER 1
INTRODUCTION
1
INTRODUCTION
A Notice Board is a traditional tool for the dissemination of information in academic campuses. A
traditional Notice board is made of a wooden frame with a soft central square of cork for pinning the
papers of information for the students. In any College there is a lot of on wall notice boards placed on
different location where by people with their announcements type on a sheet of paper and place it on
the notice boards for other people to read when passing through those notice boards. Thus there is a lot
of accumulation of papers due to carelessness of people who place them and no one who is responsible
for removing it. And hence there is a lot of strain on the people who having announcements in hand by
making sure that the announcements are placed everywhere, all these comes because the software is not
used in this context.
The Online Notice Board System is intended for colleges and institutions where information and file
sharing on regular basis plays vital role in the performance. The proposed system will act as an online
notice board which will make use of the modern communication methodologies and techniques for
information flow. The system is planned to consist of various useful features for the said purpose. The
proposed system aims to create a platform for issuing notice, sharing information and files between the
members of the institution. Different users shall have different level of access to the content. In the
context of a college, there shall be four users of the software – administrator, student, teachers and
guest. The administrator shall be able to issue notice, upload files, and view students’ activities on the
software. The teacher shall be able to issue notice, upload files (on a general basis or to a particular
classroom), and view result and students’ activities. The student shall be able to upload/download files,
submit to faculty/teacher and view result. A guest will simply be able to view public notices.
With the diversity of technologies available, finding the most convenient server software and
programming language to develop a website is always an area of concern. Even more, implementing an
online notice board requires more than just a fast accessible website, but also, one that supports
concurrent views, and changes to the notice board seamlessly.
2
1.1 PROBLEM DEFINITIONS
In today’s world, everything is digitalized and paper is being used less and less every day. How often
has it happened that we miss some important notice because we have to go to a wall and read the notice
there? There are dedicated file hosting sites and clouds used by some institutions, but there is a definite
need for a dedicated noticeboard system. The proposed system is such a system. In the college or
institutions there are many problems, distinguish is between rumor and true information. At times dates
are changed and change of plan is very poorly communicated to the students and faculty, which creates
confusion. In case of an Online Notice Board students will have access to important announcements
while walking around anywhere or not having in the campus and have the benefit of being reminded
several times a day.
To develop a web application that will help us receiving the notices from the college, anywhere,
anytime. Earlier there was problem that notices were posted on notice board. If there is holiday on the
next day, nobody will be able to read it.
Online Notice Board simply helps a student to access any type of information related to their college,
their department or their section/class. Having a notice board portal in college also helps the faculties
and college administration easily reach out to the students.
The Online Notice Board provide the facility of approaching each and every student in the minimum
amount of time and effort. The advantage of Online Notice Board in a college or institutions are
following:
3
1.3 HARDWARE SPECIFICATIONS
The system will interact with the hardware resources of the system on which it is running. While any
system will support the core software, a device with push messaging facility is recommended for
Windows 8 or Windows 10. The main hardware requirements for this web application are following:
Operating System- Windows Server, Linux, or any operating system that can run as a webserver,
capable of delivering HTML5 content, including JSON and MP4.
Processor- Intel® Celeron® Processor 847, 1.10 GHz, or equivalent.
Storage- Between 1.3 GB - 2.3 GB depending on the language version.
RAM- Minimum of 512 MB. The recommended amount can vary depending on number of users
connected, number of websites hosted on the device, and other factors.
Hard Disk- 3 GB of available hard-disk space for installation; additional free space is required
during installation. You cannot install on removable flash storage devices.
Any operating system such as Windows, Mac or Linux is the basic requirement for the web application.
The main requirements in the form of software for a web application is following:
4
CHAPTER 2
LITERATURE
SURVEY
5
Almost all leading institutions, excepting a few, currently lack an Online Notice Board system. Though
some have taken the aid of third-party websites like Facebook to interact, it comes at the cost of mixing
one’s social life with professional. Keeping this in mind, educational institutes will find this software
extremely useful. There are dedicated file hosting sites and clouds used by some institutions, but there
is a definite need for a dedicated noticeboard system. The proposed system is such a system.
Currently our college has manual system of putting notices on notice board. It’s outdated now. As
nobody has a time to stand in rush in order to read the notices on noticeboard. The limitations of the
existing system are following:
2.1.1. Order of Data: Notice can get out of order in traditional notice board system. If someone
accidentally puts some data in the wrong place, it can lead to lost data. Automated notice management
systems allow users to quickly check whether information already exists somewhere in the system,
which helps avoid problems like redundant data.
2.1.2. Complexity: Automated system is less complex than manual system of handling notices,
which can make it easier for untrained people to access and manipulate data. Anyone having the basic
knowledge of mobiles can work on the automated system.
2.1.3. Inconsistency of data: There will be an unavailability for future use, since notice might get
misplaced during manual notices management. So notice won’t be preserved properly for future use.
2.1.4. Damage: Manual notices stack are vulnerable to damage, destruction and theft in ways that
digital databases are not. A company may back up its digital data both on site and at offsite locations,
ensuring its security if the office building suffered a fire or similar disaster. A manual database,
however, may only exist in one place without any copies. As a result, a manual database would be very
vulnerable to a fire or other natural disaster. In addition, while access time in a manual database
system, information must be found by hand rather than electronically. While a digital database will
typically allow users to search the entire database for specific information in seconds, someone looking
for information in a manual system may have to spend hours searching for a particular piece of data.
6
2.1.5. Editing and Communication: Manual notices do not allow users to easily edit data or
information. Manual notices often cannot be edited directly, forcing users to make new copies. To
circulate notice on paper, users must require peons and other staff. Online Notice Board allow users to
edit information fields directly, and because data is stored digitally, it is already in a form that can be
easily transmitted.
2.2.1. To eliminate wastage of time and energy: Online Notice Board application will be
able to save lot of paper and time. It directs both teacher and pupil’s energy and attention to one thing
at a time by placing proper persons at their proper places at the proper time. Everything will be
instantaneous.
2.2.2. To avoid duplication and overlapping: This application will help to remove the
duplicity of notices. Only one person, who is admin can post the notice. No one else would be able to
do so. So student and staff will be given correct information all the time.
2.2.3. To ensure due attention of student to each and every notice: Online Notice Board
application ensures that everyone has kind attention to every notice and updates going on in college.
There will be a buzz at each and every notice to drive the attention of student to check it once. In this
way, students will be well informed about their college activities.
2.2.4. To bring system into college life: It would be dire need of all colleges as it’s easy and
shortcut method to inform all the students. In the absence of proper notification system will make it
very difficult to inform students at right time.
2.2.5. Searching a particular Notice: This application allows you search the notice very easily
through title of notice. If anyone forgets about the notice details, he can search it out very easily.
2.2.6. Free Service: It gives free service to notify all the students. There will be no cost of sending
notification to all. Just have the good system implemented in college and that too free of cost.
7
2.2.7. Prevent Crowd in College: As you can see, there is always a crowd at notice board. As
notice board is one, and people to see notice are more. With this application there will be no more
crowd. Everyone will be well informed even at their homes. So they are free to do there other work.
2.2.9. Anytime Anywhere Service: With this application, notices will be delivered anytime and
at any place. There is no restriction of time to send a notice.
2.2.10. Keeping Notices at one place: This application allow you to have notices in one place
only. If there is an attachment with that, all will be placed in a separate folder dedicated to that
application. So there will be no here and there of notices.
8
• Does the necessary technology exist to do what is suggested?
• Do the proposed equipment’s have the technical capacity to hold the data required to use the
new system?
• Will the proposed system provide adequate response to inquiries, regardless of the number or
location of users?
• Can the system be upgraded if developed?
• Are there technical guarantees of accuracy, reliability, ease of access and data security?
Earlier no system existed to cater to the needs of Secure Infrastructure Implementation System.
The current system developed is technically feasible. It is a web based user interface. Thus it provides
an easy access to the users. The databases purpose is to create, establish and maintain a work- flow
among various entities in order to facilitate all concerned users in their various capacities or roles.
Permission to the users would be granted based on the roles specified. Therefore, it provides the
technical guarantee of accuracy, reliability and security. The software and hardware requirements for
the development of this project are not many and are already available as free as open source. The work
for the project is done with the current equipment and existing software technology. Necessary
bandwidth exists for providing a fast feed- back to the users irrespective of the number of users using
the system.
2.3.2. Operational Feasibility: Under this category of service we conduct a study to analysis and
determine whether your need can be fulfilled by using a proposed solution. The result of our
operational feasibility Study will clearly outline that the solution proposed for your business is
operationally workable and conveniently solves your problems under consideration after the proposal is
implemented. We would precisely describe how the system will interact with the systems and persons
around. Our feasibility report would provide results of interest to all stakeholders. It will do as per
the needs of the business requirements.
2.3.3. Timeline Feasibility: It is important to understand that a need must be fulfilled when it has
to be. Some otherwise feasible and highly desirable projects can become non-feasible due to very
restrictive timeline constraints. This fact makes it imperative that milestones are clearly linked to the
timeline and projects are well conceived with safe unforeseen margins. We make sure that we strictly
follow what has been stated above.
9
CHAPTER 3
SYSTEM
ANALYSIS
AND DESIGN
10
3.1 Requirement Specification
3.1.1 Major Functional Requirements:
The system should meet the following functional requirements:
The system should be able to manage and store notices and files.
The system should provide appropriate UI for notice and file upload and download.
The system should be able to recognize and authenticate several levels of users.
The system should be able to manage and maintain a proper database.
The system should be easily operable and user friendly.
The apps should be able to work seamlessly with the web server.
The apps should be able to provide push messaging in real time, whenever available.
11
performance requirements. Except viewing pre-loaded notices and files, an internet connection is
needed for the features of the system to become available.
3.1.3.2 Safety Requirements: Major attention should be given to the safety and security of the
data and information that are stored in the software. The database must be trustworthy and non-leakage
to ensure no data loss occurs.
3.1.3.3Security Requirements: User authentication must be absolute and non-by-passable. No
user should be able to access the software without providing proper authentication. In case of guest
users, only public notices and events should be visible. Also, the IP address of the client machine can
be recorded for future follow up of any security issues that may arise.
3.1.3.4 Software Quality Attributes Several additional qualities and characteristics of the
system will be important to the client and/or the developers, like correctness, maintainability,
portability, testability and usability. For correctness, proper care and attention should be given during
the design and coding from both developers and customer (should correct some false and unwanted
features) side. Usability is achieved by developing the product as user friendly as possible. Similarly,
maintainability and testability plays vital role in the long.
12
3.2 Use Case Diagrams
13
3.3 Data Flow Diagram:
3.3.1 LEVEL 0 DFD:
14
3.3.3 LEVEL 2 DFD:
15
3.4 Design & steps
A design approach is a general philosophy that may or may not include a guide for specific methods.
Some are to guide the overall goal of the design. Other approaches are to guide the tendencies of the
designer. A combination of approaches may be used if they don’t conflict.
Function Oriented Design Approach is partitioning of a design into subsystems and modules, with each
one handling one or more functions. Contrast with object-oriented design, data-structure-oriented
design. This application project uses function oriented design approach. Every module and sub
modules are made, based on their functionality. These modules are designed and implemented
separately and then they are integrated together to form the desired application. This web application
contains two types of user:
User
Admin
Both the user are having different works. User have to check the notices and work on these notices.
Admin has a different work such as Add Notice, Delete Notice, and Update Notice Etc. The working of
both user and admin are described below:
3.4.1. User: The working procedure of user is described below:
3.4.1.1. Registering a User: The first step in this web application is to get the users registered to
the website. For this, user will provide all the necessary details such as Name, Email id, Roll No. etc.
and press the register button. After that, all the information along with registration id is stored on Web
Server and the user gets registered.
3.4.1.2. User Login: After registering, the user is allowed to log in. Username and password after
validating at client side, is sent to server side to authentication. After authentication response is sent by
the server to client, and then user gets logged in.
3.4.1.3. Viewing the Notices: At the first time, when you are using this application for the first
time, it will fetch all the notices from server. In all the other case, all previous notices are fetched from
application’s own database stored inside client mobile. It then checks for new notices from the server.
If there are new notices on the server, it will fetch all those notices.
3.4.1.4. Searching a Notice: The user is able to search the notice in list view depending on the
title of the notice. It helps user to get the desired notice instantly.
16
3.4.1.5. Reset Password: This application also has the facility to reset the password. If one user
has forgot his password, he/she can rest the password by giving his username or email address. The
user will be given a page in which he can set his new password. Forgotten password will be updated
with the new one on the server.
3.4.2 Admin: The working of admin is described following:
3.4.2.1 Add Notice: Being an admin, the most important work is to add the notice on the online
notice board. Since the right of adding notice to the web application is only at the admin, hence it is
very important to be sincere in performing this work. Any type of small mistake can create some big
issues.
3.4.2.2 Delete Notice: An admin can perform too many work on this web application and delete
notice is one of them. If a notice is useless i.e. the time has been passed for that notice then the admin
can delete that notice.
3.4.2.3 Update Notice: Updating the notice is not a primary work of admin but sometimes as per
the requirements it is important to update any notice.
Database Design
Database design is the process of producing a detailed data model of a database. This logical data
model contains all the needed logical and physical design choices and physical storage parameters
needed to generate a design in a data definition language, which can then be used to create a database.
A fully attributed data model contains detailed attributes for each entity. The term database design can
be used to describe many different parts of the design of an overall database system. Principally, and
most correctly, it can be thought of as the logical design of the base data structures used to store the
data. In the relational model these are the tables and views. In an object database the entities and
relationships map directly to object classes and named relationships. However, the term database
design could also be used to apply to the overall process of designing, not just the base data structures,
but also the forms and queries used as part of the overall database application within the database
management system (DBMS). The process of doing database design generally consists of a number of
steps which will be carried out by the database designer. Usually, the designer must:
• Determine the relationships between the different data elements.
• Superimpose a logical structure upon the data on the basis of these relationships.
17
Design process
1. Determine the purpose of the database - This helps prepare for the remaining steps.
2. Find and organize the information required - Gather all of the types of information to record in the
database, such as product name and order number.
3. Divide the information into tables - Divide information items into major entities or subjects, such as
Products or Orders. Each subject then becomes a table.
4. Turn information items into columns - Decide what information needs to be stored in each table.
Each item becomes a field, and is displayed as a column in the table. For example, an Employees table
might include fields such as Last Name and Hire Date.
5. Specify primary keys - Choose each table’s primary key. The primary key is a column, or a set of
columns, that is used to uniquely identify each row. An example might be Product ID or Order ID.
6. Set up the table relationships - Look at each table and decide how the data in one table is related to
the data in other tables. Add fields to tables or create new tables to clarify the relationships, as
necessary.
7. Refine the design - Analyze the design for errors. Create tables and add a few records of sample data.
Check if results come from the tables as expected. Make adjustments to the design, as needed.
8. Apply the normalization rules - Apply the data normalization rules to see if tables are structured
correctly. Make adjustments to the tables
18
3.5 Algorithms and Pseudo Code
3.5.1. Index. php
<? php
include('connection.php');
session_start();
?>
<html>
<head>
<title>Online Notice Board</title>
<link rel="stylesheet" href="css/bootstrap.css"/>
<script src="js/jquery_library.js"></script>
<script src="js/bootstrap.min.js"></script>
</head>
<body>
<nav class="navbar navbar-default navbar-fixed-top" style="background:#000">
<div class="container">
<ul class="nav navbar-nav navbar-left">
<li><a href="index.php"><strong>Online Notice Board</strong></a></li>
<li><a href="index.php?option=contact"><span class="glyphicon glyphicon-
phone"></span>Contact</a></li>
</ul>
<ul class="nav navbar-nav navbar-right">
<li><a href="index.php?option=New_user"><span class="glyphicon glyphicon-user"></span>
Sign Up</a></li>
<li><a href="index.php?option=login"><span class="glyphicon glyphicon-log-in"></span>
Login</a></li>
</ul>
</div>
</nav>
<div class="container-fluid">
<!-- slider -->
<div id="carousel-example-generic" class="carousel slide" data-ride="carousel">
<!-- Indicators -->
<ol class="carousel-indicators">
<li data-target="#carousel-example-generic" data-slide-to="0" class="active"></li>
<li data-target="#carousel-example-generic" data-slide-to="1"></li>
19
<li data-target="#carousel-example-generic" data-slide-to="2"></li>
</ol>
<!-- Wrapper for slides -->
<div class="carousel-inner" role="listbox">
<div class="item active">
<img style="height:600px;width:100%" src="images/bbd 1.jpg" alt="...">
<div class="carousel-caption">
</div>
</div>
<div class="item">
<img style="height:600px;width:100%;" src="images/bbd 2.jpg" alt="...">
<div class="carousel-caption">
</div>
</div>
<div class="item">
<img style="height:600px;width:100%;" src="images/bbd 3.jpg" alt="...">
<div class="carousel-caption">
</div>
</div>
</div>
<!-- Controls -->
<a class="left carousel-control" href="#carousel-example-generic" role="button" data-slide="prev">
<span class="glyphicon glyphicon-chevron-left" aria-hidden="true"></span>
<span class="sr-only">Previous</span>
</a>
<a class="right carousel-control" href="#carousel-example-generic" role="button" data-slide="next">
<span class="glyphicon glyphicon-chevron-right" aria-hidden="true"></span>
<span class="sr-only">Next</span>
</a>
</div>
<!-- slider end-->
20
</div>
<div class="container">
<div class="row">
<!-- container -->
<div class="col-sm-8">
<?php
@$opt=$_GET['option'];
if($opt!="")
{
if($opt=="contact")
{
include('contact.php');
}
else if($opt=="New_user")
{
include('registration.php');
}
else if($opt=="login")
{
include('login.php');
}
else
{
echo "
<h1>Welcome to the College Notice Portal !</h1>";
}
?>
</div>
<!-- container -->
<div class="col-sm-4">
<div class="panel panel-default">
21
<div class="panel-heading">Latest news</div>
<div class="panel-body">
<p><marquee behavior="scroll" align="middle" direction="left" bgcolor="ORANGE"
scrollamount="10" onmouseover="this.stop()" onmouseout="this.start()"><a href="">Schedule of 3rd
Sessional</a></marquee></p>
<p><marquee behavior="scroll" align="middle" direction="left" bgcolor="ORANGE"
scrollamount="10" onmouseover="this.stop()" onmouseout="this.start()"><a href="">Cultural Event
Schedule</a></marquee></p>
<p><marquee behavior="scroll" align="middle" direction="left" bgcolor="ORANGE"
scrollamount="10" onmouseover="this.stop()" onmouseout="this.start()"><a href="">Cricket
Tournament Schedule</a></marquee></p>
</div>
</div>
</div>
</div>
</div>
<br/>
<br/>
<br/>
<!-- footer-->
<nav class="navbar navbar-default navbar-bottom" style="background:black">
<div class="container">
<ul class="nav navbar-nav navbar-left">
</ul>
</div>
</nav>
<!-- footer-->
</body>
</html>
22
3.5.2 Registration.php
?php
require('connection.php');
extract($_POST);
if(isset($save))
{
//check user alereay exists or not
$sql=mysqli_query($conn,"select * from user where email='$e'");
$r=mysqli_num_rows($sql);
if($r==true)
{
$err= "<font color='red'>This user already exists</font>";
}
else
{
//dob
$dob=$yy."-".$mm."-".$dd;
//hobbies
$hob=implode(",",$hob);
//image
$imageName=$_FILES['img']['name'];
//encrypt your password
$pass=md5($p);
$query="insert into user values('','$n','$e','$pass','$mob','$gen','$hob','$imageName','$dob',now())";
mysqli_query($conn,$query);
//upload image
mkdir("images/$e");
move_uploaded_file($_FILES['img']['tmp_name'],"images/$e/".$_FILES['img']['name']);
$err="<font color='blue'>Registration successfull !!</font>"
}
}
23
?>
<h2>Registration Form</h2>
<form method="post" enctype="multipart/form-data">
<table class="table table-bordered">
<Tr>
<Td colspan="2"><?php echo @$err;?></Td>
</Tr>
<tr>
<td>Enter Your name</td>
<Td><input type="text" class="form-control" name="n" required/></td>
</tr>
<tr>
<td>Enter Your email </td>
<Td><input type="email" class="form-control" name="e" required/></td>
</tr>
<tr>
<td>Enter Your Password </td>
<Td><input type="password" class="form-control" name="p" required/></td>
</tr>
<tr>
<td>Enter Your Mobile </td>
<Td><input class="form-control" type="number" name="mob" required/></td>
</tr>
<tr>
<td>Select Your Gender</td>
<Td>
Male<input type="radio" name="gen" value="m" required/>
Female<input type="radio" name="gen" value="f"/>
</td>
</tr>
<tr>
24
<td>Choose Your hobbies</td>
<Td>
Reading<input value="reading" type="checkbox" name="hob[]"/>
Singing<input value="singin" type="checkbox" name="hob[]"/>
Playing<input value="playing" type="checkbox" name="hob[]"/>
</td>
</tr>
<tr>
<td>Upload Your Image </td>
<Td><input class="form-control" type="file" name="img" required/></td>
</tr>
<tr>
<td>Enter Your DOB</td>
<Td>
<select name="yy" required>
<option value="">Year</option>
<?php
for($i=1950;$i<=2016;$i++)
{
echo "<option>".$i."</option>";
}
?>
</select>
<select name="mm" required>
<option value="">Month</option>
<?php
for($i=1;$i<=12;$i++)
{
echo "<option>".$i."</option>";
}
?>
25
</select>
<select name="dd" required>
<option value="">Date</option>
<?php
for($i=1;$i<=31;$i++)
{
echo "<option>".$i."</option>";
}
?>
</select>
</td>
</tr>
<tr>
<Td colspan="2" align="center">
<input type="submit" class="btn btn-success" value="Save" name="save"/>
<input type="reset" class="btn btn-success" value="Reset"/>
</td>
</tr>
</table>
</form>
</body>
</html>
3.5.3 Connection.php
<?php
$conn=mysqli_connect("localhost","root","","online_notice");
?>
3.5.4 Amin/Add_Notice.php
<?php
extract($_POST);
if(isset($add))
26
{
if($details=="" || $sub=="" || $user=="")
{
$err="<font color='red'>fill all the fileds first</font>";
}
else
{
foreach($user as $v)
{
mysqli_query($conn,"insert into notice values('','$v','$sub','$details',now())");
}
$err="<font color='green'>Notice added Successfully</font>";
} }
?>
<h2>Add New Notice</h2>
<form method="post">
<div class="row">
<div class="col-sm-4"></div>
<div class="col-sm-4"><?php echo @$err;?></div>
</div>
<div class="row">
<div class="col-sm-4">Enter Subject</div>
<div class="col-sm-5">
<input type="text" name="sub" class="form-control"/></div>
<div class="col-sm-8">
</div>
<div class="row">
<div class="col-sm-4">Enter Details</div>
<div class="col-sm-5">
<textarea name="details" class="form-control"></textarea></div>
</div>
27
<div class="row" style="margin-top:10px">
</div>
<div class="row">
<div class="col-sm-4">Select User</div>
<div class="col-sm-5">
<select name="user[]" multiple="multiple" class="form-control">
<?php
$sql=mysqli_query($conn,"select name,email from user");
while($r=mysqli_fetch_array($sql))
{
echo "<option value='".$r['email']."'>".$r['name']."</option>";
}
?>
</select>
</div>
</div>
<div class="row" style="margin-top:10px">
<div class="col-sm-2"></div>
<div class="col-sm-8">
</div>
<div class="row" style="margin-top:10px">
<div class="col-sm-2"></div>
<div class="col-sm-4">
<input type="submit" value="Add New Notice" name="add" class="btn btn-success"/>
<input type="reset" class="btn btn-success"/>
</div>
</form>
28
3.6 Testing Process
Web Testing in simple terms is checking your web application for potential bugs before its made live
or before code is moved into the production environment. During this stage issues such as that of web
application security, the functioning of the site, its access to handicapped as well as regular users and
its ability to handle traffic is checked.
A test plan can be defined as a document describing the scope, approach, resources, and
schedule of intended testing activities. It identifies test items, the features to be tested, the testing tasks,
who will do each task, and any risks requiring contingency planning. In software testing, a test plan
gives detailed testing information regarding an upcoming testing effort, including
• Scope of testing
• Schedule
• Test Deliverables
• Release Criteria
• Risks and Contingencies
It is also be described as a detail of how the testing will proceed, who will do the testing, what
will be tested, in how much time the test will take place, and to what quality level the test will be
performed. The process of defining a test project so that it can be properly measured and controlled.
The test planning process generates a high level test plan document that identifies the software items to
be tested, the degree of tester independence, the test environment, the test case design and test
measurement techniques to be used, and the rationale for their choice. A testing plan is a
methodological and systematic approach to testing a system such as a machine or software. It can be
effective in finding errors and flaws in a system. In order to find relevant results, the plan typically
contains experiments with a range of operations and values, including an understanding of what the
eventual workflow will be. Test plan is a document which includes, introduction, assumptions, list of
test cases, list of features to be tested, approach, deliverables, resources, risks and scheduling.. A record
of the test planning process detailing the degree of tester independence, the test environment, the test
case design techniques and test measurement techniques to be used, and the rationale for their choice.
Test Activities: Various Testing Activities are as follow:
3.6.1. Black box testing: Internal system design is not considered in this type of testing. Tests are
based on requirements and functionality.
29
3.6.2. White box testing: This testing is based on knowledge of the internal logic of an
applications code. Also known as Glass box Testing. Internal software and code working should be
known for this type of testing. Tests are based on coverage of code statements, branches, paths,
conditions.
3.6.3. Unit testing: Testing of individual software components or modules. Typically done by the
programmer and not by testers, as it requires detailed knowledge of the internal program design and
code may require developing test driver modules or test harnesses.
3.6.4. Incremental integration testing: Bottom up approach for testing i.e. continuous testing of
an application as new functionality is added; Application functionality and modules should be
independent enough to test separately done by programmers or by testers.
3.6.5. Integration testing: Testing of integrated modules to verify combined functionality after
integration. Modules are typically code modules, individual applications, client and server applications
on a network, etc. This type of testing is especially relevant to client/server and distributed systems.
3.6.6. Functional testing: This type of testing ignores the internal parts and focus on the output is
as per requirement or not. Black-box type testing geared to functional requirements of an application.
3.6.7. System testing: Entire system is tested as per the requirements. Black-box type testing that is
based on overall requirements specifications, covers all combined parts of a system.
3.6.8. End-to-end testing: Similar to system testing, involves testing of a complete application
environment in a situation that mimics real-world use, such as interacting with a database, using
network communications, or interacting with other hardware, applications, or systems if appropriate.
30
CHAPTER 4
RESULTS/
OUTPUTS
31
The results/Outputs are shown by the following snapshots of the application:
32
4.2 Registration Page:
33
4.4. User Dashboard
34
4.6 Add Notice
35
CHAPTER 5
CONCLUSION/
FUTURE
SCOPE
36
5.1 FUTURE SCOPE
The future scope of the project is that it can be used as any news giving application or it can be used to
advertise your products, telling the customers about new schemes and products coming to your shop.
This application of Online Notice Board can be further extended to include the following features:
2. Documents and PDF files: The attachments can be further improved to include PDF files or
Doc files. Then there will not be much need to send images with the notices. A single file would serve
all the purposes.
3. Feedback: Feedback on the notices can also be taken. It can increase communication among
connected members and any issue can be easily sorted out on the spot.
5.2 CONCLUSIONS
• Database: MySQL
So during this project I learned all the above things. Before this project, I had no idea about Java Script,
PHP and MySQL for making a web application. Although I had little bit knowledge of HTML and CSS
before. But now I learned a lot about Java Script, PHP and MySQL and got knowledge of using Java
Script, PHP and MySQL for developing web application. Now I prefer to work on command line rather
than graphically. I learned how to work on XAMP Server. If I talk about the project, Online Notice
Board Application has reduced lot of manual work. It has made notifying each and every user very easy
and that too with no time and place restrictions
37
Chapter 6
References
38
Reference
https://www.w3schools.com/php/default.asp
https://www.tutorialspoint.com/php/index.htm
https://www.w3schools.com/php/php_mysql_intro.asp
https://en.wikipedia.org/wiki/PHP
39
Chapter 7
Appendices
40
7.1 Papers Published in Journals
7.1.1 Wireless Sensor network
Wireless Sensor Network
[1] Dr. Amit Singhal, [2] Shubham Rai, [3] Vikas Gupta
[1]
Head of Department Computer Science & Engineering, BBDIT Ghaziabad
[2][3]
Student, Computer Science & Engineering, BBDIT Ghaziabad
amitsinghal1.cs@gmail.com
guptavikas120@gmail.com
raishubham.103@gamil.com
Abstract
Wireless Sensor Network stands as one of the most emerging technologies combining
together sensing, computational capability and communication into minute devices proceeding
towards whole new world of simplicity. Wireless Sensor Networks (WSN) are used in variety of
fields which includes military, healthcare, environmental, biological, home and other commercial
applications.
A wireless sensor network is composed of large number of dispersed autonomous devices
which uses sensors to monitor physical or environmental changes in a geographical area, process
this data and report the changes to a centralized point through a wireless communication
network. Due to the requirement of low device complexity with low energy consumption a
balanced communication and signal or data processing capabilities must be found. Wireless
Sensor Network communicates through radio frequency. WSN acts as a mediator between the
real physical world and the virtual world. In this paper, we report some of the current trends,
challenges and security issues with wireless sensor network.
Wireless Sensor Network has been widely used in many areas especially for surveillance
and monitoring in agriculture and habitat monitoring. Environment monitoring has become an
important field of control and protection, providing real-time system and control communication
with the physical world.
Key Words: Wireless Sensor Network, Personal computers, Personal Digital Assistants, Denial of
Service attack, Environment Monitoring.
1. Introduction commercial and industrial applications, because
A wireless sensor network (WSN) [1] is a of its technical development in a processor,
collection of spatially distributed autonomous communication, and low-power usage of
sensors to examine present atmospheric and embedded computing devices. The WSN is built
physical such as temperature, pressure, etc. and with nodes that are used to observe the
to cooperatively pass the data gathered through surroundings like temperature, humidity,
the network to a main centralized point. pressure, position, vibration, sound etc. These
Currently, WSN (Wireless Sensor Network) is nodes can be used in various real-time
the most standard services employed in applications to perform various tasks like smart
41
detecting, a discovery of neighbor node, data Wireless sensor network (WSN) is built up of
Processing and storage, data collection, target a group of several hundred or thousands of
tracking, monitor and controlling, sensor nodes, where each node is connected to
synchronization, node localization, and effective one sensor node. Radio transceiver with an
routing between the base station and nodes. internal antenna or connection of an external
A Wireless sensor network can also be defined antenna, a microcontroller, an electronic circuit
as a network of devices that can communicate for interfacing with sensors and an energy source
the information gathered from a monitored field are some typical parts of a single sensor
through wireless links. The data is forwarded network node. Each sensor network node can be
through multiple nodes, and with a gateway, the composed of various sensors that are used to
data is connected to other networks like wireless collect data is transferred to the user through
Ethernet. network and also control some physical
The basic requirements of WSN are as follows: processes. A sensor network is composed of a
Scalability- WSN must be capable of large number of sensor nodes, which are densely
being easily expanded or upgraded on deployed either inside the phenomenon or very
demand. close to it. This paper presents a detailed
Reliability – WSN must be worth overview of the research issues in the
trusting and it should provide what is applications of Wireless Sensor Networks.
needed for the user 1.1 Characteristics
Responsiveness – WSN should quickly The main characteristics of a WSN include:
react in the desired or positive way.
Mobility – WSN must be able to move Power consumption constraints for nodes
from one place to another. using batteries or energy harvesting.
Power Efficiency – WSN must be power Examples of suppliers are ReVibe
efficient. Energy[6] and Perpetuum[7]
Ability to cope with node failures
(resilience)
Some mobility of nodes (for highly
mobile nodes see MWSNs)
Heterogeneity of nodes
Homogeneity of nodes
Scalability to large scale of deployment
Ability to withstand harsh environmental
conditions
Ease of use
2. Wireless Sensor Network
Architecture
The most common WSN architecture follows the
OSI architecture Model. The architecture of the
WSN includes five layers and three cross layers.
Mostly in sensor network we require five layers,
namely application, transport, network, data
link& physical layer. The three cross planes are
namely power management, mobility
42
management, and task management. These either practical on the upstream. There are some
layers of the WSN are used to accomplish the popular protocols in the transport layer namely
network and make the sensors work together in STCP (Sensor Transmission Control Protocol),
order to raise the complete efficiency of the
PORT (Price-Oriented Reliable Transport
network.
Protocol and PSFQ (pump slow fetch quick).
The types of topologies used in WSN are:
Star Topologies 2.3 Network Layer
Tree Topologies The main function of the network layer is
Mesh Topologies routing, it has a lot of tasks based on the
application, but actually, the main tasks are in
Layers in Wireless Sensor Network are: the power conserving, partial memory, buffers,
and sensor don’t have a universal ID and have to
be self-organized. There are a lot of existing
protocols for this network layer, they can be
separate into; flat routing and hierarchal routing
or can be separated into time driven, query-
driven & event driven.
43
magnetic, thermal, visual, infrared, radar, and soil, and atmospheric contexts, forest fire
acoustic, which are clever to monitor a wide detection, meteorological or geophysical
range of ambient situations. Sensor nodes are research, flood detection, bio-complexity
used for constant sensing, event ID, event mapping of the environment, and pollution
detection & local control of actuators. The study. There are several studies that focus in
applications of wireless sensor network mainly environmental monitoring applications [9] [10].
include health, military, environmental, home, & Some researchers implement the fault tolerant
other commercial areas. and studies the tradeoff between tool expense
and lifetime of sensor network [11] to make sure
the fault tolerance is in the three dimensional
settings.
3.3 Military Applications
Wireless sensor networks can be an integral part
of military command, control, communications,
computing, intelligence, surveillance,
reconnaissance and targeting (C4ISRT) systems.
Some of the military applications of sensor
networks are monitoring friendly forces,
equipment and ammunition; battlefield
surveillance, reconnaissance of opposing forces
and terrain, targeting, battle damage assessment,
and nuclear, biological and chemical (NBC)
attack detection and reconnaissance. Some main
uses of WSN in Military are following:
Fig 3: Applications of WSN
Monitoring friendly forces, equipment
3.1 Area Monitoring and ammunition
Area monitoring is a common application of
WSNs. In area monitoring, the WSN is deployed
Battlefield surveillance
over a region where some phenomenon is to be
monitored. A military example is the use of
Reconnaissance of opposing forces and
terrain
sensors detect enemy intrusion; a civilian
example is the geo-fencing of gas or oil Targeting
pipelines.
Battle damage assessment
3.2 Environment/Earth Sensing
There are many applications in monitoring
Nuclear, biological and chemical attack
environmental parameters. Some environmental detection and reconnaissance
applications of sensor networks include tracking Since sensor networks are based on the dense
the movements of birds, small animals, and deployment of disposable and low-cost sensor
insects. Monitoring environmental conditions nodes, destruction of some nodes by hostile
that affect crops and livestock, irrigation, macro actions does not affect a military operation as
instruments for large-scale Earth monitoring and much as the destruction of a traditional sensor,
planetary exploration, chemical/biological which makes sensor networks concept a better
detection, precision agriculture, biological, approach for battlefields.
Earth, and environmental monitoring in marine,
44
3.5 Industrial Monitoring
Wireless sensor networks have been developed
for machinery condition-based maintenance
(CBM) as they offer significant cost savings and
enable new functionality.[12] Wireless sensors can
be placed in locations difficult or impossible to
reach with a wired system, such as rotating
machinery and untethered vehicles.
Due to the high density of server’s racks in a
data center, often cabling and IP addresses are an
issue. Wireless sensor networks are also used for
the collection of data for monitoring of
environmental information.
4. Security Issues in WSN
4.1 Security Requirement: Sensor network
Fig 4: Military Uses have to fulfill some requirements for providing
a secure communication. General security
3.4 Health Care Monitoring requirements of [2] [3] WSNs are availability,
The sensor networks for medical applications confidentiality, integrity and authentication. [5]
can be of several types: implanted, wearable, and [4][6] Some other requirements known as
environment-embedded. The implantable secondary requirements are source localization,
medical devices are those that are inserted inside self-organization and data freshness. These
human body. Wearable devices are used on the requirements gives protection against attacks to
body surface of a human or just at close the information transmitted over the sensor
proximity of the user. Environment-embedded network [19].
systems employ sensors contained in the
4.2 Source Localization: For data
environment.
transmission some applications use location
information of the sink node. It is important to
give security to the location information. Non-
secured data can be controlled by the malicious
node by sending false signal strengths or
replaying signals.
4.3 Data Integrity: It is very crucial in
sensor network to ensure the reliability of the
data. It ensures that data packets that are
received by the destination are exactly the ones
sent by the sender and any one cannot alter that
packet in between.
4.4 Data Confidentiality: Confidentiality
means to protect data during communication in a
Fig 5: Uses in Healthcare network to be understood other than intended
recipient. To provide the data confidentiality, an
45
encrypted data is used so that only recipient Attacks in wireless sensor network are shown in
decrypts the data to its original form. Figure 7. They are roughly categorized as
follows:
Attacks in
46
physical systems , time critical application , 2278-0661, Vol. 16, Issue 6(III), DOI:
connective sensing and spectrum , privacy and 10.9790/0661-16637983, pp. 79-83, Nov.-Dec.
security management . [5] Pankaj Pardesi and Jitender Grover,
Wireless sensor networks represent a very “Improved Multiple Sink Placement Strategy in
interesting multidisciplinary field of research, Wireless Sensor Networks”, 2015 IEEE
characterized by a very large number of possible International Conference on Futuristic Trends on
applications. Their main advantage is the ability Computational Analysis and Knowledge
to be applied to any field, and in any Management (A-BLAZE), Amity University,
environment that for its application require Greater Noida, Uttar Pradesh, India, DOI:
substantially stringent conditions. Future 10.1109/ABLAZE.2015.7155032, pp. 418-424,
scenarios "are aware of the world" or "internet of 25-27 Feb, 2015.
things" are as real scenarios, and there are good [6] G. Padmavathi and D. Shanmugapriya, “A
chances to achieve in the next ten years. Survey of Attacks, Security Mechanisms and
Challenges in Wireless Sensor Networks”,
International Journal of Computer Science and
6. References Information Security (IJCSIS), Volume 4, Issue
1 & 2, pp. 1-9, August 2009
[1] Bhaskar Krishnamachari, “An Introduction [7] Daniel E. Burgner, Luay A. Wahsheh,
to Wireless Sensor Networks”, Presentation at "Security of Wireless Sensor Networks", 2011
the Second International Conference on Eighth International Conference on Information
Intelligent Sensing and Information Processing Technology: New Generations (ITNG), Las
(ICISIP), Chennai, India, 1 January 2005 Vegas, NV, pp. 315-320, 2011.
[2] Eirini Karapistoli, Anastasios A. [8] Heena Rathore, Sushmita Jha, "Bio-inspired
Economides, "Wireless sensor network security machine learning based Wireless Sensor
visualization", 2012 4th International Congress Network security", 2013 World Congress on
on Ultra-Modern Telecommunications and Nature and Biologically Inspired Computing
Control Systems and Workshops (ICUMT), pp. (NaBIC), Fargo, ND, pp. 140-146, 2013.
850-856, 2012. [9] W.-S. Jang, W. M. Healy, and M. J.
[3] Virendra Pal Singh, Sweta Jain and Jyoti Skibniewski, “Wireless sensor networks as part
Singhai, “Hello Flood Attack and its of a web-based building environmental
Countermeasures in Wireless Sensor Networks”, monitoring system,” Automation in
International Journal of Computer Science Issues Construction, vol. 17, no. 6, pp. 729-736, Aug.
(IJCSI), Volume 7, Issue 3, No 11, pp. 23-27, 2008.
May 2010. [10] R. Mittal and M. P. S. Bhatia, “Wireless
[4] Jitender Grover, Shikha Sharma and Mohit Sensor Networks for Monitoring the
Sharma, “Reliable SPIN in Wireless Sensor Environmental Activities,” Analysis, 2010.
Network: A Review”, IOSR Journal of [11] Y. Guo and J. McNair, “Fault Tolerant
Computer Engineering (IOSR-JCE), ISSN: Three Dimensional Environment Monitoring
Using Wireless Sensor Networks,” pp. 1-7.
47
7.2 Design of Routing Protocol for MANET
Design of Routing Protocol for MANET
[1] Dr. Amit Singhal, [2] Vikas Gupta, [3] Shubham Rai
[1]
Head of Department Computer Science & Engineering, BBDIT Ghaziabad
[2][3]
Student, Computer Science & Engineering, BBDIT Ghaziabad
amitsinghal1.cs@gmail.com
guptavikas120@gmail.com
raishubham.103@gamil.com
Abstract:
A typical ad hoc network consists of nodes that are usually battery operated devices such as
laptops, PDAs or sensor nodes that come together and spontaneously form a network.
Energy conservation is a critical issue as the lifetime of these nodes depends on the life of
the system. Research has been carried out to conserve energy at various levels i.e., at the
hardware level, operating system, application level. We propose Efficient Power Aware
Routing (EPAR), a new power aware routing protocol that increases the network lifetime
of MANET.
In contrast to conventional power aware algorithms, EPAR identifies the capacity of a node
not just by its residual battery power, but also by the expected energy spent in reliably
forwarding data packets over a specific link. This makes that high energy node to transmit
the received packets to maximum energy node of available nodes. It may leads to successful
delivery of packets on this path. Using a mini-max formulation, EPAR selects the path that
has the largest packet capacity at the smallest residual packet transmission capacity.
This protocol must be able to handle high mobility of the nodes that often cause changes in
the network topology. This paper evaluates three Ad hoc network routing protocols
(EPAR, MTPR, and DSR) in different network scales, taking into consideration the energy
consumption. Indeed, our proposed algorithm reduces for more than 20% the total energy
consumption and decreases the mean delay, especially for high load networks, to maximize
the network lifetime, while achieving a good packet delivery ratio.
Key words: EPAR, MTPR, DSR, Residual battery power.
50
Basically, in order to obtain the routing energies of all the nodes and thereby
information, each node must spend lot of prolong the network lifetime.
time to process any control data it receives,
even if it is not the intended recipient. 5.1 Route Discovery and
Maintenance in Proposed
4. PROPOSED WORK Algorithm
To propose an efficient power aware routing EPAR schemes make routing decisions to
(EPAR) protocol that increases the network optimize performance of power or energy
lifetime of MANET. In EPAR, before related evaluation metrics. The route
forwarding its packets to next hop, the selections are made solely with regards to
source itself analyze the entire path and its performance requirement policies,
ability. The source node calculates the independent of the underlying ad-hoc
expected energy spent over each path routing protocols deployed. Therefore the
available and its lifetime changes if, the power aware routing schemes are
packet routed through each path. On transferable from one underlying ad hoc
analyzing the entire route path available, the routing protocol to another, the observed
source node decides not only the next hop relative merits and drawbacks remain valid.
and also the entire path to be used and route There are two routing objectives for
its packet as calculated. It increased minimum total transmission energy and total
Network lifetime. In EPAR, selection of operational lifetime of the network can be
path decided only based on the residual mutually contradictory. For example, when
energy of full path. How about the residual several minimum energy routes share a
energy of all intermediate nodes have taken common node, the battery power of this
care in selection of next hop. It increases in node will quickly run into depletion,
life time of nodes further decreases packet shortening the network lifetime. When
loss. choosing a path, the DSR implementation
chooses the path with the minimum number
of hops. For EPAR, however, the path is
5. DESIGN AND chosen based on energy. First, we calculate
IMPLEMENTATION the battery power for each path, that is, the
To conserve energy, there should minimize lowest hop energy of the path. The path is
the amount of energy consumed by all then selected by choosing the path with the
packets traversing from source node to maximum lowest hop energy.
destination node i.e. we want to know the Table 1. NETWORK PARAMETER TO
total amount of energy the packets BE MEASURED USING NS2
consumed when it travels from each and
every node on the route to the next hop. The
No of packets Defines no of packet
energy consumed for one packet is
sent
calculated by the equation k Ec=ΣT (ni,
Traffic size Packet size and time
ni+1) i=1 where, into nares nodes in the
interval for
route while T denotes the energy consumed
sequential
in transmitting and receiving a packet over
transmission
one hop. Then we find the minimum Ec for
Transmit Energy Require to transmit
all packets. The main objective of EPAR is
Receive Energy Require to receive
to minimize the variance in the remaining
Idle energy Being at ON
condition
51
Sense power Energy spent to sense
packets
Energy consumed: No of packets
transmitted x energy
spent
Residual Energy Initial energy –
energy consumed
52
6.2 Path Selection Based On
Energy Calculation
53
transmission at this situation residual energy 7. CONCLUSION
will be a function of only of idle power. This paper mainly deals with the improve
Since no transmission reception is carried the overall network lifetime of the network
out. Therefore, by spending idle power, how using a EPAR algorithm. We propose a new
long the low power node could remain in scheme EPAR it satisfies both medium and
network. The network life time =The time large size network but DSR and MTPR only
over which the residual energy could spend used for small size network. It produces
on keeping the node remains in network. good results in terms of throughput and
6.6 Network Lifetime Varying With leads to good packet delivery ratio.
Respect To Network Size 8. REFERENCES
(Functional) [1] Internet Engineering Task Force, “Manet
working group charter,”
http://www.ietf.org/html.charters/manet-
charter.html.
[2] E.Royer and C.-K. Toh, “A Review of
Current Routing Protocols for Ad Hoc
Mobile Wireless Networks,” IEEE Personal
Communications Magazine, Vol. 6, No. 2,
April 1999.
[3] T. S. Rappaport, “Wireless
Communications: Principles and Practice”,
Prentice Hall, July 1999.
[4] S-L.Wu, Y-C Tseng and J-P Sheu,
“Intelligent Medium Access for Mobile Ad
Hoc Networks with Busy Tones and Power
Figure 7 Network Lifetime Varying with Control,” IEEE Journal on Selected Areas in
Respect Network Size (Functional) Communications, Vol. 18, No. 9, September
2000.
In Fig 7shows the network lifetime as a
[5] J. Gomez, A.T. Campbell, M.
function of the number of nodes. The life-
Naghshineh and C. Bisdikian, “Conserving
time decreases as the number of nodes grow;
Transmission Power in Wireless Ad Hoc
however for a number of nodes greater than
Networks”, Proc. 9thInternational
100, the life-time remains almost constant as
Conference on Network Protocols (ICNP
the number of nodes increases. Lifetime
2001), 2001.
decreases because MANET has to cover
[6] B. Chen, K. Jamieson, H. Balakrishnan,
more nodes as the number of nodes in the
and R. Morris, “Span: An Energy-Efficient
network size increases. We observe that the
Coordination Algorithm for Topology
improvement achieved through EPAR is
Maintenance in Ad Hoc Wireless
equal to 85 %. Energy is uniformly drained
Networks,” ACM Wireless Networks
from all the nodes and hence the network
Journal, Vol. 8, 2002.
life-time is significantly increased. Network
[7] M. W. Subbarao, “Dynamic Power-
lifetime as a functional can be calculated as:
Conscious Routing for MANETs: An Initial
RESIDUAL ENERGY= (transmission
Approach”, Journal of Research of the
power + receiving power) * network
National Institute of Standards and
lifetime.
Technology, Vol.104, No.6,1999.
54
[8] J.E. Wieselthier, G.D. Nguyen, and
A.Ephremides, ”On the construction of
energy efficient broadcast and multicast
trees in wirelessnetworks”, IEEE
INFOCOM 2000.
[9] S. Singh and C. S. Raghavendra,
“PAMAS - Power Aware Multi-Access
protocol with Signalling for Ad Hoc
Networks,” ACM SIGCOMM, Computer
Communication Review, July 1998.
[10] P-J. Wan, G. Calinescu, X. Li and O.
Frieder, “Minimum-Energy Broadcast
Routing in Static Ad Hoc Wireless
Networks”, IEEE INFOCOM2001.
[11] Laura Feeney and Martin
Nilsson,“Investigating the Energy
Consumption of a Wireless Network
Interface in an Ad Hoc Networking
Environment”, Proceedings of IEEE
INFOCOM, Anchorage, AK, 2001.
[12] K. Scott and N. Bambos, ”Routing and
channel assignment for low power
transmission in PCS,” Proceedings of IEEE
InternationalConference on Universal
Personal Communications (ICUPC ’96),
Cambridge, MA, September 29 - October 2,
1996.
[13] S. Singh, M. Woo, and C. S.
Raghavendra, “Power-aware with Routing
in Mobile Ad Hoc Networks”, Proceedings
of Mobicom 1998, Dallas, TX, 1998.
[14] C.-K. Toh,“Maximum Battery Life
Routing to Support Ubiquitous Mobile
Computing in Wireless Ad Hoc Networks,”
IEEE Communications Magazine, June
2001.
55
7.2 Certificates of the Papers Published
56
57
7.2.2 Design of Routing Protocol for MANET
58
59
60