Sunteți pe pagina 1din 67

A Project Report

On

ONLINE NOTICE BOARD


In partial fulfillment of
the requirement for the award of the degree of

BACHELOR OF TECHONOLOGY

IN

COMPUTER SCIENCE AND ENGINEERING

Under the guidance of

Dr. Amit Singhal


(HOD CSE Department)
BBDIT Ghaziabad

Submitted By:

Shubham Rai (1403510048)


Vikas Gupta (1403510059)

Babu Banarsi Das Institute of Engineering, Ghaziabad


(Affiliated to AKTU, Lucknow, Uttar Pradesh)
MAY, 2018
DECLARATION

We hereby declare that the project entitled “Online Notice Board” submitted for the B. Tech. (CSE)
degree is our original work and the project has not formed the basis for the award of any other degree,
diploma, fellowship or any other similar titles.

Signature of the Student


Place:
Date:
CERTIFICATE

This is to certify that the project entitled “Online Notice Board” is the bonafide work of Shubham
Rai and Vikas Gupta submitted in partial fulfillment of the requirements for the award of the degree of
Bachelor of Technology (B.tech) in Computer Science and Engineering (CSE) by APJ Abdul Kalam
Technical University, Lucknow during the academic year 2017-2018.

Signature of Guide: - Project Coordinators:-


Name: Dr. Amit Singhal Mr. Ramveer Singh
Head of Department, CSE Ms. Preeti Dubey
(Assistant Professor)
Department of CSE

Head of Department
Dr. Amit Singhal
Department of CSE
ACKNOWLEDGMENT

We take this opportunity to express our sincere thanks and deep gratitude to our project guide Dr. Amit
Singhal who shared his time and knowledge with us and helped in completing this project successfully.
We with the immense pleasure and heartfelt gratitude; express our sincere thanks to our project
coordinators Mr. Ramveer Singh & Ms. Preeti Dubey for their useful suggestions, continuous
guidance, and moral support for the progress of my work.
We express our sincere gratitude to Prof. (Dr.) Amit Singhal, Head of Department (CSE) for his strict
supervision, constant encouragement, inspiration and guidance. His inspiring suggestions and timely
guidance enabled me/us to perceive the various aspects of the project with a new vision.
We are very much grateful to our parents for their support and faith they showed in us. Last but not the
least our friends for being there round the clock whenever we needed them.
Abstract

An online notice board is a place where people can leave any types of messages and
notifications, for example, to advertise things, announce events or provide any information. Notice
board online it can be placed on digital devices such computers, tabs, mobile phones etc. This online
notice board project is very helpful for all type of users like existing users and new users. So admin can
leave and erase notification for other people to read and see. The main aim of this free online notice
board project is make information dissemination much easier in a paperless community as the world
tends to interact with the online notice board facility as an project, Online notice board admin can send
the notification to the particular students regarding fee payments, results, any new activity happen in
college campus or college fest participation, libraries dues, hostel room payments, any workshop
registrations, warnings and reminders etc. for this work online notice board project is make all work
much easier and understandable to all.

This online notice board work generally intends to act as a support system for the all users. By
the help of free online notice board users can access the notifications and articles quickly not only in
the particular premises, also wherever and whenever they need to know. Online notice board usability
is fully capable of passing relevant notices and announcements, and keeping the users update from time
to time. The students are kept updated each time with the online notice board for college is uploaded
based on their preferences with respect to the departments and categories through a notice board online.
Online notice board is one of the applications to improve the usage of notice board of the college by
making it available online.
Table of Contents
Title Page i
Declaration of the Student ii
Certificate of the Guide iii
Acknowledgement iv
Abstract v
List of Figures vi
List of Tables (optional) vii
Timeline / Gantt Chart viii
1. INTRODUCTION 1
1.1 Problem Definition 2
1.2 Project Overview/Specifications 3
1.3 Hardware Specification 4
1.4 Software Specification 4
2. LITERATURE SURVEY 5
2.1 Existing System 6
2.2 Proposed System 7
2.3 Feasibility Study 8
3 SYSTEM ANALYSIS & DESIGN 10
3.1 Requirement Specification 11
3.2 Use Case Diagrams 13
3.3 DFD’s 14
3.4 Design & steps 16
3.5 Algorithms and Pseudo Code 19
3.6 Testing Process 29

4. RESULTS / OUTPUTS 31

5. CONCLUSIONS 36
6. REFERENCES 38

7. APPENDICES 40
7.1 Papers Published in Journals 41
7.2 Certificates of the Papers Published 56
List of Figures
3.2 Use Case Diagram 13
3.3 DFD’s 14
3.3.1 Level 1 DFD 14
3.3.2 Level 2 DFD 14
3.3.3 Level 3 DFD 15
CHATER 1

INTRODUCTION

1
INTRODUCTION
A Notice Board is a traditional tool for the dissemination of information in academic campuses. A
traditional Notice board is made of a wooden frame with a soft central square of cork for pinning the
papers of information for the students. In any College there is a lot of on wall notice boards placed on
different location where by people with their announcements type on a sheet of paper and place it on
the notice boards for other people to read when passing through those notice boards. Thus there is a lot
of accumulation of papers due to carelessness of people who place them and no one who is responsible
for removing it. And hence there is a lot of strain on the people who having announcements in hand by
making sure that the announcements are placed everywhere, all these comes because the software is not
used in this context.

The Online Notice Board System is intended for colleges and institutions where information and file
sharing on regular basis plays vital role in the performance. The proposed system will act as an online
notice board which will make use of the modern communication methodologies and techniques for
information flow. The system is planned to consist of various useful features for the said purpose. The
proposed system aims to create a platform for issuing notice, sharing information and files between the
members of the institution. Different users shall have different level of access to the content. In the
context of a college, there shall be four users of the software – administrator, student, teachers and
guest. The administrator shall be able to issue notice, upload files, and view students’ activities on the
software. The teacher shall be able to issue notice, upload files (on a general basis or to a particular
classroom), and view result and students’ activities. The student shall be able to upload/download files,
submit to faculty/teacher and view result. A guest will simply be able to view public notices.

With the diversity of technologies available, finding the most convenient server software and
programming language to develop a website is always an area of concern. Even more, implementing an
online notice board requires more than just a fast accessible website, but also, one that supports
concurrent views, and changes to the notice board seamlessly.

2
1.1 PROBLEM DEFINITIONS

In today’s world, everything is digitalized and paper is being used less and less every day. How often
has it happened that we miss some important notice because we have to go to a wall and read the notice
there? There are dedicated file hosting sites and clouds used by some institutions, but there is a definite
need for a dedicated noticeboard system. The proposed system is such a system. In the college or
institutions there are many problems, distinguish is between rumor and true information. At times dates
are changed and change of plan is very poorly communicated to the students and faculty, which creates
confusion. In case of an Online Notice Board students will have access to important announcements
while walking around anywhere or not having in the campus and have the benefit of being reminded
several times a day.

To develop a web application that will help us receiving the notices from the college, anywhere,
anytime. Earlier there was problem that notices were posted on notice board. If there is holiday on the
next day, nobody will be able to read it.

1.2 PROJECT OVERVIEW/SPECIFICATIONS

Online Notice Board simply helps a student to access any type of information related to their college,
their department or their section/class. Having a notice board portal in college also helps the faculties
and college administration easily reach out to the students.

The Online Notice Board provide the facility of approaching each and every student in the minimum
amount of time and effort. The advantage of Online Notice Board in a college or institutions are
following:

i. Saves human effort and time


ii. Saves wastage of paper which is good for environment.
iii. Faculty can easily reach out to every student to inform something urgent.
iv. Adding a new notice and removing an old notice is very easy.

3
1.3 HARDWARE SPECIFICATIONS
The system will interact with the hardware resources of the system on which it is running. While any
system will support the core software, a device with push messaging facility is recommended for
Windows 8 or Windows 10. The main hardware requirements for this web application are following:
Operating System- Windows Server, Linux, or any operating system that can run as a webserver,
capable of delivering HTML5 content, including JSON and MP4.
Processor- Intel® Celeron® Processor 847, 1.10 GHz, or equivalent.
Storage- Between 1.3 GB - 2.3 GB depending on the language version.
RAM- Minimum of 512 MB. The recommended amount can vary depending on number of users
connected, number of websites hosted on the device, and other factors.
Hard Disk- 3 GB of available hard-disk space for installation; additional free space is required
during installation. You cannot install on removable flash storage devices.

1.4 SOFTWARE SPECIFICATIONS

Any operating system such as Windows, Mac or Linux is the basic requirement for the web application.
The main requirements in the form of software for a web application is following:

 Operating System- Windows, Linux, Mac, Unix


 Browser- Google Chrome, Firefox, Safari etc.
 Server- XAMP, LAMP, WAMP

4
CHAPTER 2

LITERATURE
SURVEY

5
Almost all leading institutions, excepting a few, currently lack an Online Notice Board system. Though
some have taken the aid of third-party websites like Facebook to interact, it comes at the cost of mixing
one’s social life with professional. Keeping this in mind, educational institutes will find this software
extremely useful. There are dedicated file hosting sites and clouds used by some institutions, but there
is a definite need for a dedicated noticeboard system. The proposed system is such a system.

2.1 Existing System

Currently our college has manual system of putting notices on notice board. It’s outdated now. As
nobody has a time to stand in rush in order to read the notices on noticeboard. The limitations of the
existing system are following:

2.1.1. Order of Data: Notice can get out of order in traditional notice board system. If someone
accidentally puts some data in the wrong place, it can lead to lost data. Automated notice management
systems allow users to quickly check whether information already exists somewhere in the system,
which helps avoid problems like redundant data.

2.1.2. Complexity: Automated system is less complex than manual system of handling notices,
which can make it easier for untrained people to access and manipulate data. Anyone having the basic
knowledge of mobiles can work on the automated system.

2.1.3. Inconsistency of data: There will be an unavailability for future use, since notice might get
misplaced during manual notices management. So notice won’t be preserved properly for future use.

2.1.4. Damage: Manual notices stack are vulnerable to damage, destruction and theft in ways that
digital databases are not. A company may back up its digital data both on site and at offsite locations,
ensuring its security if the office building suffered a fire or similar disaster. A manual database,
however, may only exist in one place without any copies. As a result, a manual database would be very
vulnerable to a fire or other natural disaster. In addition, while access time in a manual database
system, information must be found by hand rather than electronically. While a digital database will
typically allow users to search the entire database for specific information in seconds, someone looking
for information in a manual system may have to spend hours searching for a particular piece of data.

6
2.1.5. Editing and Communication: Manual notices do not allow users to easily edit data or
information. Manual notices often cannot be edited directly, forcing users to make new copies. To
circulate notice on paper, users must require peons and other staff. Online Notice Board allow users to
edit information fields directly, and because data is stored digitally, it is already in a form that can be
easily transmitted.

2.2 Proposed System

Proposed System will be able to do the following:

2.2.1. To eliminate wastage of time and energy: Online Notice Board application will be
able to save lot of paper and time. It directs both teacher and pupil’s energy and attention to one thing
at a time by placing proper persons at their proper places at the proper time. Everything will be
instantaneous.

2.2.2. To avoid duplication and overlapping: This application will help to remove the
duplicity of notices. Only one person, who is admin can post the notice. No one else would be able to
do so. So student and staff will be given correct information all the time.

2.2.3. To ensure due attention of student to each and every notice: Online Notice Board
application ensures that everyone has kind attention to every notice and updates going on in college.
There will be a buzz at each and every notice to drive the attention of student to check it once. In this
way, students will be well informed about their college activities.

2.2.4. To bring system into college life: It would be dire need of all colleges as it’s easy and
shortcut method to inform all the students. In the absence of proper notification system will make it
very difficult to inform students at right time.

2.2.5. Searching a particular Notice: This application allows you search the notice very easily
through title of notice. If anyone forgets about the notice details, he can search it out very easily.

2.2.6. Free Service: It gives free service to notify all the students. There will be no cost of sending
notification to all. Just have the good system implemented in college and that too free of cost.

7
2.2.7. Prevent Crowd in College: As you can see, there is always a crowd at notice board. As
notice board is one, and people to see notice are more. With this application there will be no more
crowd. Everyone will be well informed even at their homes. So they are free to do there other work.

2.2.8. Automatically Updated Dashboard: The dashboard of notice is automatically updated


when a new message arrives. The user can himself refresh the dashboard to see any new notice.

2.2.9. Anytime Anywhere Service: With this application, notices will be delivered anytime and
at any place. There is no restriction of time to send a notice.

2.2.10. Keeping Notices at one place: This application allow you to have notices in one place
only. If there is an attachment with that, all will be placed in a separate folder dedicated to that
application. So there will be no here and there of notices.

2.3 Feasibility Study


Depending on the results of the initial investigation, the survey is expanded to a more detailed
feasibility study. Feasibility study is a test of system proposal according to its work ability, impact on
the organization, ability to meet user needs, and effective use of resources. The objective for this phase
is not to solve the problem but to acquire a sense of scope. During the study, the problem definition is
crystallized and aspects of the problem to be included in the system are deter- mined. Web Application
Development Systems are capital investments because resources are being spent currently in order to
achieve benefits to be received over a period of time following completion. There
should be a careful assessment of each project before it is begun in terms of economic justification,
technical feasibility, operational impact and adherence to the master development plan. We started the
project by listing the possible queries that the user might want to be satisfied. And on these lines we
guided the project further. The three main points, kept in mind at the time of project, are:
• Possible (To build it with the given technology and resources)
• Affordable (given the time and cost constraints of the organization)
• Acceptable (for use by the eventual users of the system
The three major areas to be considered while determining the feasibility of a project are:
2.3.1. Technical Feasibility: The technical issue usually raised during the feasibility stage of the
investigation includes the following:

8
• Does the necessary technology exist to do what is suggested?
• Do the proposed equipment’s have the technical capacity to hold the data required to use the
new system?
• Will the proposed system provide adequate response to inquiries, regardless of the number or
location of users?
• Can the system be upgraded if developed?
• Are there technical guarantees of accuracy, reliability, ease of access and data security?
Earlier no system existed to cater to the needs of Secure Infrastructure Implementation System.
The current system developed is technically feasible. It is a web based user interface. Thus it provides
an easy access to the users. The databases purpose is to create, establish and maintain a work- flow
among various entities in order to facilitate all concerned users in their various capacities or roles.
Permission to the users would be granted based on the roles specified. Therefore, it provides the
technical guarantee of accuracy, reliability and security. The software and hardware requirements for
the development of this project are not many and are already available as free as open source. The work
for the project is done with the current equipment and existing software technology. Necessary
bandwidth exists for providing a fast feed- back to the users irrespective of the number of users using
the system.
2.3.2. Operational Feasibility: Under this category of service we conduct a study to analysis and
determine whether your need can be fulfilled by using a proposed solution. The result of our
operational feasibility Study will clearly outline that the solution proposed for your business is
operationally workable and conveniently solves your problems under consideration after the proposal is
implemented. We would precisely describe how the system will interact with the systems and persons
around. Our feasibility report would provide results of interest to all stakeholders. It will do as per
the needs of the business requirements.
2.3.3. Timeline Feasibility: It is important to understand that a need must be fulfilled when it has
to be. Some otherwise feasible and highly desirable projects can become non-feasible due to very
restrictive timeline constraints. This fact makes it imperative that milestones are clearly linked to the
timeline and projects are well conceived with safe unforeseen margins. We make sure that we strictly
follow what has been stated above.

9
CHAPTER 3

SYSTEM
ANALYSIS
AND DESIGN

10
3.1 Requirement Specification
3.1.1 Major Functional Requirements:
The system should meet the following functional requirements:
 The system should be able to manage and store notices and files.
 The system should provide appropriate UI for notice and file upload and download.
 The system should be able to recognize and authenticate several levels of users.
 The system should be able to manage and maintain a proper database.
 The system should be easily operable and user friendly.
 The apps should be able to work seamlessly with the web server.
 The apps should be able to provide push messaging in real time, whenever available.

3.1.2 External Interface Requirements


3.1.2.1 User Interfaces: The system will start with a login page to identify the user level and the
features will be available accordingly. The application will have easily accessible buttons for all major
activities of the software. Key features and recent events will be highlighted to attract user attention.
3.1.2.2 Hardware Interfaces: The system will interact with the hardware resources of the system
on which it is running. While any system will support the core software, a device with supporting a
browser such as Chrome and OS like Windows or Mac.
3.1.2.3 Software Interfaces: Only Operating System having browsers which support tags of
HTML, CSS will support this application. It will have the most interaction with an external database
server. It may also be integrated with other systems like Employee Management System and/or Student
Management System.
3.1.2.4Communications Interfaces: An active internet connection will be required for the
functioning of the software. In case of the mobile apps, an internet connection will then allow the
software to connect to the online database. The system will use the Hyper Text Transfer Protocol
(HTTP) to transmit data.
3.1.3 Other Non-functional Requirements
3.1.3.1 Performance Requirements: The system in itself does not require anything specific for
basic operation, but the complete software with all its components running may have some

11
performance requirements. Except viewing pre-loaded notices and files, an internet connection is
needed for the features of the system to become available.
3.1.3.2 Safety Requirements: Major attention should be given to the safety and security of the
data and information that are stored in the software. The database must be trustworthy and non-leakage
to ensure no data loss occurs.
3.1.3.3Security Requirements: User authentication must be absolute and non-by-passable. No
user should be able to access the software without providing proper authentication. In case of guest
users, only public notices and events should be visible. Also, the IP address of the client machine can
be recorded for future follow up of any security issues that may arise.
3.1.3.4 Software Quality Attributes Several additional qualities and characteristics of the
system will be important to the client and/or the developers, like correctness, maintainability,
portability, testability and usability. For correctness, proper care and attention should be given during
the design and coding from both developers and customer (should correct some false and unwanted
features) side. Usability is achieved by developing the product as user friendly as possible. Similarly,
maintainability and testability plays vital role in the long.

12
3.2 Use Case Diagrams

Use Case Diagram of Online Notice Board

13
3.3 Data Flow Diagram:
3.3.1 LEVEL 0 DFD:

3.3.2 LEVEL 1 DFD:

14
3.3.3 LEVEL 2 DFD:

15
3.4 Design & steps
A design approach is a general philosophy that may or may not include a guide for specific methods.
Some are to guide the overall goal of the design. Other approaches are to guide the tendencies of the
designer. A combination of approaches may be used if they don’t conflict.
Function Oriented Design Approach is partitioning of a design into subsystems and modules, with each
one handling one or more functions. Contrast with object-oriented design, data-structure-oriented
design. This application project uses function oriented design approach. Every module and sub
modules are made, based on their functionality. These modules are designed and implemented
separately and then they are integrated together to form the desired application. This web application
contains two types of user:
 User
 Admin

Both the user are having different works. User have to check the notices and work on these notices.
Admin has a different work such as Add Notice, Delete Notice, and Update Notice Etc. The working of
both user and admin are described below:
3.4.1. User: The working procedure of user is described below:
3.4.1.1. Registering a User: The first step in this web application is to get the users registered to
the website. For this, user will provide all the necessary details such as Name, Email id, Roll No. etc.
and press the register button. After that, all the information along with registration id is stored on Web
Server and the user gets registered.
3.4.1.2. User Login: After registering, the user is allowed to log in. Username and password after
validating at client side, is sent to server side to authentication. After authentication response is sent by
the server to client, and then user gets logged in.
3.4.1.3. Viewing the Notices: At the first time, when you are using this application for the first
time, it will fetch all the notices from server. In all the other case, all previous notices are fetched from
application’s own database stored inside client mobile. It then checks for new notices from the server.
If there are new notices on the server, it will fetch all those notices.
3.4.1.4. Searching a Notice: The user is able to search the notice in list view depending on the
title of the notice. It helps user to get the desired notice instantly.

16
3.4.1.5. Reset Password: This application also has the facility to reset the password. If one user
has forgot his password, he/she can rest the password by giving his username or email address. The
user will be given a page in which he can set his new password. Forgotten password will be updated
with the new one on the server.
3.4.2 Admin: The working of admin is described following:
3.4.2.1 Add Notice: Being an admin, the most important work is to add the notice on the online
notice board. Since the right of adding notice to the web application is only at the admin, hence it is
very important to be sincere in performing this work. Any type of small mistake can create some big
issues.
3.4.2.2 Delete Notice: An admin can perform too many work on this web application and delete
notice is one of them. If a notice is useless i.e. the time has been passed for that notice then the admin
can delete that notice.
3.4.2.3 Update Notice: Updating the notice is not a primary work of admin but sometimes as per
the requirements it is important to update any notice.

Database Design
Database design is the process of producing a detailed data model of a database. This logical data
model contains all the needed logical and physical design choices and physical storage parameters
needed to generate a design in a data definition language, which can then be used to create a database.
A fully attributed data model contains detailed attributes for each entity. The term database design can
be used to describe many different parts of the design of an overall database system. Principally, and
most correctly, it can be thought of as the logical design of the base data structures used to store the
data. In the relational model these are the tables and views. In an object database the entities and
relationships map directly to object classes and named relationships. However, the term database
design could also be used to apply to the overall process of designing, not just the base data structures,
but also the forms and queries used as part of the overall database application within the database
management system (DBMS). The process of doing database design generally consists of a number of
steps which will be carried out by the database designer. Usually, the designer must:
• Determine the relationships between the different data elements.

• Superimpose a logical structure upon the data on the basis of these relationships.

17
Design process

1. Determine the purpose of the database - This helps prepare for the remaining steps.
2. Find and organize the information required - Gather all of the types of information to record in the
database, such as product name and order number.

3. Divide the information into tables - Divide information items into major entities or subjects, such as
Products or Orders. Each subject then becomes a table.

4. Turn information items into columns - Decide what information needs to be stored in each table.
Each item becomes a field, and is displayed as a column in the table. For example, an Employees table
might include fields such as Last Name and Hire Date.

5. Specify primary keys - Choose each table’s primary key. The primary key is a column, or a set of
columns, that is used to uniquely identify each row. An example might be Product ID or Order ID.

6. Set up the table relationships - Look at each table and decide how the data in one table is related to
the data in other tables. Add fields to tables or create new tables to clarify the relationships, as
necessary.

7. Refine the design - Analyze the design for errors. Create tables and add a few records of sample data.
Check if results come from the tables as expected. Make adjustments to the design, as needed.

8. Apply the normalization rules - Apply the data normalization rules to see if tables are structured
correctly. Make adjustments to the tables

18
3.5 Algorithms and Pseudo Code
3.5.1. Index. php
<? php
include('connection.php');
session_start();
?>
<html>
<head>
<title>Online Notice Board</title>
<link rel="stylesheet" href="css/bootstrap.css"/>
<script src="js/jquery_library.js"></script>
<script src="js/bootstrap.min.js"></script>
</head>
<body>
<nav class="navbar navbar-default navbar-fixed-top" style="background:#000">
<div class="container">
<ul class="nav navbar-nav navbar-left">
<li><a href="index.php"><strong>Online Notice Board</strong></a></li>
<li><a href="index.php?option=contact"><span class="glyphicon glyphicon-
phone"></span>Contact</a></li>
</ul>
<ul class="nav navbar-nav navbar-right">
<li><a href="index.php?option=New_user"><span class="glyphicon glyphicon-user"></span>
Sign Up</a></li>
<li><a href="index.php?option=login"><span class="glyphicon glyphicon-log-in"></span>
Login</a></li>
</ul>
</div>
</nav>
<div class="container-fluid">
<!-- slider -->
<div id="carousel-example-generic" class="carousel slide" data-ride="carousel">
<!-- Indicators -->
<ol class="carousel-indicators">
<li data-target="#carousel-example-generic" data-slide-to="0" class="active"></li>
<li data-target="#carousel-example-generic" data-slide-to="1"></li>

19
<li data-target="#carousel-example-generic" data-slide-to="2"></li>
</ol>
<!-- Wrapper for slides -->
<div class="carousel-inner" role="listbox">
<div class="item active">
<img style="height:600px;width:100%" src="images/bbd 1.jpg" alt="...">
<div class="carousel-caption">
</div>
</div>
<div class="item">
<img style="height:600px;width:100%;" src="images/bbd 2.jpg" alt="...">
<div class="carousel-caption">
</div>
</div>
<div class="item">
<img style="height:600px;width:100%;" src="images/bbd 3.jpg" alt="...">
<div class="carousel-caption">
</div>
</div>
</div>
<!-- Controls -->
<a class="left carousel-control" href="#carousel-example-generic" role="button" data-slide="prev">
<span class="glyphicon glyphicon-chevron-left" aria-hidden="true"></span>
<span class="sr-only">Previous</span>
</a>
<a class="right carousel-control" href="#carousel-example-generic" role="button" data-slide="next">
<span class="glyphicon glyphicon-chevron-right" aria-hidden="true"></span>
<span class="sr-only">Next</span>
</a>
</div>
<!-- slider end-->

20
</div>
<div class="container">
<div class="row">
<!-- container -->
<div class="col-sm-8">
<?php
@$opt=$_GET['option'];
if($opt!="")
{
if($opt=="contact")
{
include('contact.php');
}
else if($opt=="New_user")
{
include('registration.php');
}
else if($opt=="login")
{
include('login.php');
}
else
{
echo "
<h1>Welcome to the College Notice Portal !</h1>";
}
?>
</div>
<!-- container -->
<div class="col-sm-4">
<div class="panel panel-default">

21
<div class="panel-heading">Latest news</div>
<div class="panel-body">
<p><marquee behavior="scroll" align="middle" direction="left" bgcolor="ORANGE"
scrollamount="10" onmouseover="this.stop()" onmouseout="this.start()"><a href="">Schedule of 3rd
Sessional</a></marquee></p>
<p><marquee behavior="scroll" align="middle" direction="left" bgcolor="ORANGE"
scrollamount="10" onmouseover="this.stop()" onmouseout="this.start()"><a href="">Cultural Event
Schedule</a></marquee></p>
<p><marquee behavior="scroll" align="middle" direction="left" bgcolor="ORANGE"
scrollamount="10" onmouseover="this.stop()" onmouseout="this.start()"><a href="">Cricket
Tournament Schedule</a></marquee></p>
</div>
</div>
</div>
</div>
</div>
<br/>
<br/>
<br/>
<!-- footer-->
<nav class="navbar navbar-default navbar-bottom" style="background:black">
<div class="container">
<ul class="nav navbar-nav navbar-left">
</ul>
</div>
</nav>
<!-- footer-->
</body>
</html>

22
3.5.2 Registration.php
?php
require('connection.php');
extract($_POST);
if(isset($save))
{
//check user alereay exists or not
$sql=mysqli_query($conn,"select * from user where email='$e'");
$r=mysqli_num_rows($sql);
if($r==true)
{
$err= "<font color='red'>This user already exists</font>";
}
else
{
//dob
$dob=$yy."-".$mm."-".$dd;
//hobbies
$hob=implode(",",$hob);
//image
$imageName=$_FILES['img']['name'];
//encrypt your password
$pass=md5($p);
$query="insert into user values('','$n','$e','$pass','$mob','$gen','$hob','$imageName','$dob',now())";
mysqli_query($conn,$query);
//upload image
mkdir("images/$e");
move_uploaded_file($_FILES['img']['tmp_name'],"images/$e/".$_FILES['img']['name']);
$err="<font color='blue'>Registration successfull !!</font>"
}
}

23
?>
<h2>Registration Form</h2>
<form method="post" enctype="multipart/form-data">
<table class="table table-bordered">
<Tr>
<Td colspan="2"><?php echo @$err;?></Td>
</Tr>
<tr>
<td>Enter Your name</td>
<Td><input type="text" class="form-control" name="n" required/></td>
</tr>
<tr>
<td>Enter Your email </td>
<Td><input type="email" class="form-control" name="e" required/></td>
</tr>
<tr>
<td>Enter Your Password </td>
<Td><input type="password" class="form-control" name="p" required/></td>
</tr>
<tr>
<td>Enter Your Mobile </td>
<Td><input class="form-control" type="number" name="mob" required/></td>
</tr>
<tr>
<td>Select Your Gender</td>
<Td>
Male<input type="radio" name="gen" value="m" required/>
Female<input type="radio" name="gen" value="f"/>
</td>
</tr>
<tr>

24
<td>Choose Your hobbies</td>
<Td>
Reading<input value="reading" type="checkbox" name="hob[]"/>
Singing<input value="singin" type="checkbox" name="hob[]"/>
Playing<input value="playing" type="checkbox" name="hob[]"/>
</td>
</tr>
<tr>
<td>Upload Your Image </td>
<Td><input class="form-control" type="file" name="img" required/></td>
</tr>
<tr>
<td>Enter Your DOB</td>
<Td>
<select name="yy" required>
<option value="">Year</option>
<?php
for($i=1950;$i<=2016;$i++)
{
echo "<option>".$i."</option>";
}
?>
</select>
<select name="mm" required>
<option value="">Month</option>
<?php
for($i=1;$i<=12;$i++)
{
echo "<option>".$i."</option>";
}
?>

25
</select>
<select name="dd" required>
<option value="">Date</option>
<?php
for($i=1;$i<=31;$i++)
{
echo "<option>".$i."</option>";
}
?>
</select>
</td>
</tr>
<tr>
<Td colspan="2" align="center">
<input type="submit" class="btn btn-success" value="Save" name="save"/>
<input type="reset" class="btn btn-success" value="Reset"/>

</td>
</tr>
</table>
</form>
</body>
</html>
3.5.3 Connection.php
<?php
$conn=mysqli_connect("localhost","root","","online_notice");
?>
3.5.4 Amin/Add_Notice.php
<?php
extract($_POST);
if(isset($add))

26
{
if($details=="" || $sub=="" || $user=="")
{
$err="<font color='red'>fill all the fileds first</font>";
}
else
{
foreach($user as $v)
{
mysqli_query($conn,"insert into notice values('','$v','$sub','$details',now())");
}
$err="<font color='green'>Notice added Successfully</font>";
} }
?>
<h2>Add New Notice</h2>
<form method="post">
<div class="row">
<div class="col-sm-4"></div>
<div class="col-sm-4"><?php echo @$err;?></div>
</div>
<div class="row">
<div class="col-sm-4">Enter Subject</div>
<div class="col-sm-5">
<input type="text" name="sub" class="form-control"/></div>
<div class="col-sm-8">
</div>
<div class="row">
<div class="col-sm-4">Enter Details</div>
<div class="col-sm-5">
<textarea name="details" class="form-control"></textarea></div>
</div>

27
<div class="row" style="margin-top:10px">
</div>
<div class="row">
<div class="col-sm-4">Select User</div>
<div class="col-sm-5">
<select name="user[]" multiple="multiple" class="form-control">
<?php
$sql=mysqli_query($conn,"select name,email from user");
while($r=mysqli_fetch_array($sql))
{
echo "<option value='".$r['email']."'>".$r['name']."</option>";
}
?>
</select>
</div>
</div>
<div class="row" style="margin-top:10px">
<div class="col-sm-2"></div>
<div class="col-sm-8">
</div>
<div class="row" style="margin-top:10px">
<div class="col-sm-2"></div>
<div class="col-sm-4">
<input type="submit" value="Add New Notice" name="add" class="btn btn-success"/>
<input type="reset" class="btn btn-success"/>
</div>
</form>

28
3.6 Testing Process
Web Testing in simple terms is checking your web application for potential bugs before its made live
or before code is moved into the production environment. During this stage issues such as that of web
application security, the functioning of the site, its access to handicapped as well as regular users and
its ability to handle traffic is checked.
A test plan can be defined as a document describing the scope, approach, resources, and
schedule of intended testing activities. It identifies test items, the features to be tested, the testing tasks,
who will do each task, and any risks requiring contingency planning. In software testing, a test plan
gives detailed testing information regarding an upcoming testing effort, including
• Scope of testing
• Schedule
• Test Deliverables
• Release Criteria
• Risks and Contingencies
It is also be described as a detail of how the testing will proceed, who will do the testing, what
will be tested, in how much time the test will take place, and to what quality level the test will be
performed. The process of defining a test project so that it can be properly measured and controlled.
The test planning process generates a high level test plan document that identifies the software items to
be tested, the degree of tester independence, the test environment, the test case design and test
measurement techniques to be used, and the rationale for their choice. A testing plan is a
methodological and systematic approach to testing a system such as a machine or software. It can be
effective in finding errors and flaws in a system. In order to find relevant results, the plan typically
contains experiments with a range of operations and values, including an understanding of what the
eventual workflow will be. Test plan is a document which includes, introduction, assumptions, list of
test cases, list of features to be tested, approach, deliverables, resources, risks and scheduling.. A record
of the test planning process detailing the degree of tester independence, the test environment, the test
case design techniques and test measurement techniques to be used, and the rationale for their choice.
Test Activities: Various Testing Activities are as follow:
3.6.1. Black box testing: Internal system design is not considered in this type of testing. Tests are
based on requirements and functionality.

29
3.6.2. White box testing: This testing is based on knowledge of the internal logic of an
applications code. Also known as Glass box Testing. Internal software and code working should be
known for this type of testing. Tests are based on coverage of code statements, branches, paths,
conditions.
3.6.3. Unit testing: Testing of individual software components or modules. Typically done by the
programmer and not by testers, as it requires detailed knowledge of the internal program design and
code may require developing test driver modules or test harnesses.
3.6.4. Incremental integration testing: Bottom up approach for testing i.e. continuous testing of
an application as new functionality is added; Application functionality and modules should be
independent enough to test separately done by programmers or by testers.
3.6.5. Integration testing: Testing of integrated modules to verify combined functionality after
integration. Modules are typically code modules, individual applications, client and server applications
on a network, etc. This type of testing is especially relevant to client/server and distributed systems.
3.6.6. Functional testing: This type of testing ignores the internal parts and focus on the output is
as per requirement or not. Black-box type testing geared to functional requirements of an application.
3.6.7. System testing: Entire system is tested as per the requirements. Black-box type testing that is
based on overall requirements specifications, covers all combined parts of a system.
3.6.8. End-to-end testing: Similar to system testing, involves testing of a complete application
environment in a situation that mimics real-world use, such as interacting with a database, using
network communications, or interacting with other hardware, applications, or systems if appropriate.

30
CHAPTER 4
RESULTS/
OUTPUTS

31
The results/Outputs are shown by the following snapshots of the application:

4.1 Home page

32
4.2 Registration Page:

4.3 Login Page

33
4.4. User Dashboard

4.5 Admin’s Dashboard

34
4.6 Add Notice

4.7 Manage (Delete/Update) Notification

35
CHAPTER 5
CONCLUSION/
FUTURE
SCOPE

36
5.1 FUTURE SCOPE

The future scope of the project is that it can be used as any news giving application or it can be used to
advertise your products, telling the customers about new schemes and products coming to your shop.
This application of Online Notice Board can be further extended to include the following features:

1. Categorization of Notice: Notices can be categorized in different categories, so that it’s


possible for user to easily manage the notices. Categorization can also be done by making groups.
Defining the notice to be circulated in a particular group can make it more secure.

2. Documents and PDF files: The attachments can be further improved to include PDF files or
Doc files. Then there will not be much need to send images with the notices. A single file would serve
all the purposes.

3. Feedback: Feedback on the notices can also be taken. It can increase communication among
connected members and any issue can be easily sorted out on the spot.

5.2 CONCLUSIONS

I learned a lot by doing this project.

• Operating system: Windows 10

 Web Browser: Google Chrome, Mozilla Firefox

• Languages used: HTML, CSS, JAVA SCRIPT, PHP

• Servers Used: XAMP Server

• Database: MySQL

So during this project I learned all the above things. Before this project, I had no idea about Java Script,
PHP and MySQL for making a web application. Although I had little bit knowledge of HTML and CSS
before. But now I learned a lot about Java Script, PHP and MySQL and got knowledge of using Java
Script, PHP and MySQL for developing web application. Now I prefer to work on command line rather
than graphically. I learned how to work on XAMP Server. If I talk about the project, Online Notice
Board Application has reduced lot of manual work. It has made notifying each and every user very easy
and that too with no time and place restrictions

37
Chapter 6

References

38
Reference
 https://www.w3schools.com/php/default.asp

 https://www.tutorialspoint.com/php/index.htm

 https://www.w3schools.com/php/php_mysql_intro.asp

 https://en.wikipedia.org/wiki/PHP

39
Chapter 7

Appendices

40
7.1 Papers Published in Journals
7.1.1 Wireless Sensor network
Wireless Sensor Network
[1] Dr. Amit Singhal, [2] Shubham Rai, [3] Vikas Gupta
[1]
Head of Department Computer Science & Engineering, BBDIT Ghaziabad
[2][3]
Student, Computer Science & Engineering, BBDIT Ghaziabad
amitsinghal1.cs@gmail.com
guptavikas120@gmail.com
raishubham.103@gamil.com

Abstract
Wireless Sensor Network stands as one of the most emerging technologies combining
together sensing, computational capability and communication into minute devices proceeding
towards whole new world of simplicity. Wireless Sensor Networks (WSN) are used in variety of
fields which includes military, healthcare, environmental, biological, home and other
commercial applications.
A wireless sensor network is composed of large number of dispersed autonomous
devices which uses sensors to monitor physical or environmental changes in a geographical
area, process this data and report the changes to a centralized point through a wireless
communication network. Due to the requirement of low device complexity with low energy
consumption a balanced communication and signal or data processing capabilities must be
found. Wireless Sensor Network communicates through radio frequency. WSN acts as a
mediator between the real physical world and the virtual world. In this paper, we report some
of the current trends, challenges and security issues with wireless sensor network.

Wireless Sensor Network has been widely used in many areas especially for surveillance
and monitoring in agriculture and habitat monitoring. Environment monitoring has become an
important field of control and protection, providing real-time system and control
communication with the physical world.

Key Words: Wireless Sensor Network, Personal computers, Personal Digital Assistants, Denial of
Service attack, Environment Monitoring.
1. Introduction commercial and industrial applications, because
A wireless sensor network (WSN) [1] is a of its technical development in a processor,
collection of spatially distributed autonomous communication, and low-power usage of
sensors to examine present atmospheric and embedded computing devices. The WSN is
physical such as temperature, pressure, etc. and built with nodes that are used to observe the
to cooperatively pass the data gathered through surroundings like temperature, humidity,
the network to a main centralized point. pressure, position, vibration, sound etc. These
Currently, WSN (Wireless Sensor Network) is nodes can be used in various real-time
the most standard services employed in applications to perform various tasks like smart

41
detecting, a discovery of neighbor node, data Wireless sensor network (WSN) is built up of
Processing and storage, data collection, target a group of several hundred or thousands of
tracking, monitor and controlling, sensor nodes, where each node is connected to
synchronization, node localization, and one sensor node. Radio transceiver with an
effective routing between the base station and internal antenna or connection of an external
nodes. antenna, a microcontroller, an electronic circuit
A Wireless sensor network can also be defined for interfacing with sensors and an energy
as a network of devices that can communicate source are some typical parts of a single sensor
the information gathered from a monitored field network node. Each sensor network node can
through wireless links. The data is forwarded be composed of various sensors that are used to
through multiple nodes, and with a gateway, the collect data is transferred to the user through
data is connected to other networks network and also control some physical
like wireless Ethernet. processes. A sensor network is composed of a
The basic requirements of WSN are as follows: large number of sensor nodes, which are
 Scalability- WSN must be capable of densely deployed either inside the phenomenon
being easily expanded or upgraded on or very close to it. This paper presents a
demand. detailed overview of the research issues in the
 Reliability – WSN must be worth applications of Wireless Sensor Networks.
trusting and it should provide what is 1.1 Characteristics
needed for the user
The main characteristics of a WSN include:
 Responsiveness – WSN should quickly
react in the desired or positive way.  Power consumption constraints for nodes
 Mobility – WSN must be able to move using batteries or energy harvesting.
from one place to another. Examples of suppliers are ReVibe
 Power Efficiency – WSN must be Energy[6] and Perpetuum[7]
power efficient.  Ability to cope with node failures
(resilience)
 Some mobility of nodes (for highly mobile
nodes see MWSNs)
 Heterogeneity of nodes
 Homogeneity of nodes
 Scalability to large scale of deployment
 Ability to withstand harsh environmental
conditions
 Ease of use
2. Wireless Sensor Network
Architecture
The most common WSN architecture follows
the OSI architecture Model. The architecture of
the WSN includes five layers and three cross
layers. Mostly in sensor network we require
five layers, namely application, transport,
network, data link& physical layer. The three
cross planes are namely power management,
mobility management, and task management.
42
These layers of the WSN are used to either practical on the upstream. There are
accomplish the network and make the sensors some popular protocols in the transport layer
work together in order to raise the complete namely STCP (Sensor Transmission Control
efficiency of the network.
Protocol), PORT (Price-Oriented Reliable
The types of topologies used in WSN are: Transport Protocol and PSFQ (pump slow fetch
 Star Topologies quick).
 Tree Topologies
 Mesh Topologies 2.3 Network Layer
The main function of the network layer is
Layers in Wireless Sensor Network are: routing, it has a lot of tasks based on the
application, but actually, the main tasks are in
the power conserving, partial memory, buffers,
and sensor don’t have a universal ID and have
to be self-organized. There are a lot of existing
protocols for this network layer, they can be
separate into; flat routing and hierarchal routing
or can be separated into time driven, query-
driven & event driven.

2.4 Data Link Layer


The data link layer is liable for multiplexing
data frame detection, data streams, MAC, &
error control, confirm the reliability of point–
point (or) point– multipoint.

2.5 Physical Layer


The physical layer provides an edge
for transferring a stream of bits above physical
medium. This layer is responsible for the
Fig 2: Architecture of WSN selection of frequency, generation of a carrier
frequency, signal detection, Modulation & data
2.1 Application Layer encryption. IEEE 802.15.4 is suggested as
The application layer is liable for traffic typical for low rate particular areas & wireless
management and offers software for numerous sensor network with low cost, power
applications that convert the data in a clear consumption, density, the range of
form to find positive information. Sensor communication to improve the battery life.
networks arranged in numerous applications in CSMA/CA is used to support star & peer to
different fields such as agricultural, military, peer topology. There are several versions of
environment, medical, etc. IEEE 802.15.4.V.
2.2 Transport Layer
The function of the transport layer is to deliver 3. Applications
congestion avoidance and reliability where a lot The area of application of wireless sensor
of protocols intended to offer this function are network is very broad. Wireless sensor
networks may comprise of numerous different

43
types of sensors like low sampling rate, agriculture, biological, Earth, and
seismic, magnetic, thermal, visual, infrared, environmental monitoring in marine, soil, and
radar, and acoustic, which are clever to monitor atmospheric contexts, forest fire
a wide range of ambient situations. Sensor detection, meteorological or geophysical
nodes are used for constant sensing, event ID, research, flood detection, bio-complexity
event detection & local control of actuators. mapping of the environment, and pollution
The applications of wireless sensor network study. There are several studies that focus in
mainly include health, military, environmental, environmental monitoring applications [9] [10].
home, & other commercial areas. Some researchers implement the fault tolerant
and studies the tradeoff between tool expense
and lifetime of sensor network [11] to make
sure the fault tolerance is in the three
dimensional settings.
3.3 Military Applications
Wireless sensor networks can be an integral
part of military command, control,
communications, computing, intelligence,
surveillance, reconnaissance and targeting
(C4ISRT) systems. Some of the military
applications of sensor networks are monitoring
friendly forces, equipment and ammunition;
battlefield surveillance, reconnaissance of
opposing forces and terrain, targeting, battle
damage assessment, and nuclear, biological and
chemical (NBC) attack detection and
Fig 3: Applications of WSN reconnaissance. Some main uses of WSN in
Military are following:
3.1 Area Monitoring  Monitoring friendly forces, equipment
Area monitoring is a common application of and ammunition
WSNs. In area monitoring, the WSN is  Battlefield surveillance
deployed over a region where some  Reconnaissance of opposing forces and
phenomenon is to be monitored. A military terrain
example is the use of sensors detect enemy  Targeting
intrusion; a civilian example is the geo-  Battle damage assessment
fencing of gas or oil pipelines.  Nuclear, biological and chemical attack
detection and reconnaissance
3.2 Environment/Earth Sensing Since sensor networks are based on the dense
There are many applications in monitoring deployment of disposable and low-cost sensor
environmental parameters. Some environmental nodes, destruction of some nodes by hostile
applications of sensor networks include actions does not affect a military operation as
tracking the movements of birds, small animals, much as the destruction of a traditional sensor,
and insects. Monitoring environmental which makes sensor networks concept a better
conditions that affect crops and livestock, approach for battlefields.
irrigation, macro instruments for large-scale
Earth monitoring and planetary exploration,
chemical/biological detection, precision

44
3.5 Industrial Monitoring
Wireless sensor networks have been developed
for machinery condition-based maintenance
(CBM) as they offer significant cost savings
and enable new functionality.[12] Wireless
sensors can be placed in locations difficult or
impossible to reach with a wired system, such
as rotating machinery and untethered vehicles.
Due to the high density of server’s racks in a
data center, often cabling and IP addresses are
an issue. Wireless sensor networks are also
used for the collection of data for monitoring of
environmental information.
4. Security Issues in WSN
4.1 Security Requirement: Sensor
Fig 4: Military Uses network have to fulfill some requirements for
providing
3.4 Health Care Monitoring a secure communication. General security
The sensor networks for medical applications requirements of [2] [3] WSNs are availability,
can be of several types: implanted, wearable, confidentiality, integrity and authentication.
and environment-embedded. The implantable [5][4][6] Some other requirements known as
medical devices are those that are inserted secondary requirements are source localization,
inside human body. Wearable devices are used self-organization and data freshness. These
on the body surface of a human or just at close requirements gives protection against attacks to
proximity of the user. Environment-embedded the information transmitted over the sensor
systems employ sensors contained in the network [19].
environment.
4.2 Source Localization: For data
transmission some applications use location
information of the sink node. It is important to
give security to the location information. Non-
secured data can be controlled by the malicious
node by sending false signal strengths or
replaying signals.
4.3 Data Integrity: It is very crucial in
sensor network to ensure the reliability of the
data. It ensures that data packets that are
received by the destination are exactly the ones
sent by the sender and any one cannot alter that
packet in between.
4.4 Data Confidentiality: Confidentiality
Fig 5: Uses in Healthcare means to protect data during communication in
a network to be understood other than intended

45
recipient. To provide the data confidentiality, their own data bits to the channel, replay old
an encrypted data is used so that only recipient packets and any other type of attack. A secure
decrypts the data to its original form. network ought to support all security properties.
[7][8] Attackers may deploy some malicious
nodes in the network with similar capabilities
as of normal node or may overwrite the
memory of normal deployed node by capturing
them. Attacks in wireless sensor network are
shown in Figure 7. They are roughly
categorized as follows:

Attacks in
WSN

BasedWormhole Based on Vs.Based Physical


Insider on
on Hello FloodCapabilit
Outsider Protocol
Link
Fig 6: Security Issues routing y Layer
li Selective Passive Vs. Network
Forwarding Active Transport
4.5 Data Availability: It ensures that the Sybil Mote-classVs.
services are always available in the network
even under the attack such as Denial of Service Sinkhole Laptop Class
attack (Dos).

4.6 Data Authentication: It ensures that


the data received by receiver has not been Fig 7: Different Types of Attacks
modified during the transmission. It is
important for receiver node to do verification
that the data is received from an authenticate 6. Conclusion
node. Our research paper has introduced the
architecture, various applications and security
4.7 Data Freshness: Data freshness means issues of wireless sensor network. In present
that each message transmitted over the channel generation WSN services are extending for
is new and fresh. It guarantees that the old mini applications like agriculture, military
messages cannot be replayed by any node. This application, medical and health care. These
can be solved by adding some time related systems has low power consumption, low cost
counter to check the freshness of the data. and is a convenient way to control real-time
monitoring for unprotected agriculture and
5. Classification of security habitat. Moreover, it can also be applied to
indoor living monitoring, greenhouse
threats monitoring, climate monitoring and forest
monitoring. Though wireless sensor networks
WSNs are vulnerable against so many attacks. are constrained by scalability, cost, and
Attackers can attack the radio transmission; add topology change and power consumption, new

46
technologies are being devised to overcome Issues (IJCSI), Volume 7, Issue 3, No 11, pp.
these and to make sensor networks an integral 23-27, May 2010.
part of our lives. The future prospects of WSN [4] Jitender Grover, Shikha Sharma and Mohit
applications are highly promising to Sharma, “Reliable SPIN in Wireless Sensor
revolutionize our everyday lives. Network: A Review”, IOSR Journal of
Computer Engineering (IOSR-JCE), ISSN:
5. Future Scope 2278-0661, Vol. 16, Issue 6(III), DOI:
It will be produced a very powerful and cost- 10.9790/0661-16637983, pp. 79-83, Nov.-Dec.
effective devices that they may be used in many [5] Pankaj Pardesi and Jitender Grover,
other applications (such as underwater r “Improved Multiple Sink Placement Strategy in
acoustic sensor systems , sensing based cyber- Wireless Sensor Networks”, 2015 IEEE
physical systems , time critical application , International Conference on Futuristic Trends
connective sensing and spectrum , privacy and on Computational Analysis and Knowledge
security management . Management (A-BLAZE), Amity University,
Wireless sensor networks represent a very Greater Noida, Uttar Pradesh, India, DOI:
interesting multidisciplinary field of research, 10.1109/ABLAZE.2015.7155032, pp. 418-424,
characterized by a very large number of 25-27 Feb, 2015.
possible applications. Their main advantage is [6] G. Padmavathi and D. Shanmugapriya, “A
the ability to be applied to any field, and in any Survey of Attacks, Security Mechanisms and
environment that for its application require Challenges in Wireless Sensor Networks”,
substantially stringent conditions. Future International Journal of Computer Science and
scenarios "are aware of the world" or "internet Information Security (IJCSIS), Volume 4, Issue
of things" are as real scenarios, and there are 1 & 2, pp. 1-9, August 2009
good chances to achieve in the next ten years. [7] Daniel E. Burgner, Luay A. Wahsheh,
"Security of Wireless Sensor Networks", 2011
Eighth International Conference on Information
6. References Technology: New Generations (ITNG), Las
Vegas, NV, pp. 315-320, 2011.
[1] Bhaskar Krishnamachari, “An Introduction [8] Heena Rathore, Sushmita Jha, "Bio-inspired
to Wireless Sensor Networks”, Presentation at machine learning based Wireless Sensor
the Second International Conference on Network security", 2013 World Congress on
Intelligent Sensing and Information Processing Nature and Biologically Inspired Computing
(ICISIP), Chennai, India, 1 January 2005 (NaBIC), Fargo, ND, pp. 140-146, 2013.
[2] Eirini Karapistoli, Anastasios A. [9] W.-S. Jang, W. M. Healy, and M. J.
Economides, "Wireless sensor network security Skibniewski, “Wireless sensor networks as part
visualization", 2012 4th International Congress of a web-based building environmental
on Ultra-Modern Telecommunications and monitoring system,” Automation in
Control Systems and Workshops (ICUMT), pp. Construction, vol. 17, no. 6, pp. 729-736, Aug.
850-856, 2012. 2008.
[3] Virendra Pal Singh, Sweta Jain and Jyoti [10] R. Mittal and M. P. S. Bhatia, “Wireless
Singhai, “Hello Flood Attack and its Sensor Networks for Monitoring the
Countermeasures in Wireless Sensor Environmental Activities,” Analysis, 2010.
Networks”, [11] Y. Guo and J. McNair, “Fault Tolerant
International Journal of Computer Science Three Dimensional Environment Monitoring
Using Wireless Sensor Networks,” pp. 1-7.

47
7.2 Design of Routing Protocol for MANET
Design of Routing Protocol for MANET
[1] Dr. Amit Singhal, [2] Vikas Gupta, [3] Shubham Rai
[1]
Head of Department Computer Science & Engineering, BBDIT Ghaziabad
[2][3]
Student, Computer Science & Engineering, BBDIT Ghaziabad
amitsinghal1.cs@gmail.com
guptavikas120@gmail.com
raishubham.103@gamil.com

Abstract:
A typical ad hoc network consists of nodes that are usually battery operated devices such as
laptops, PDAs or sensor nodes that come together and spontaneously form a network.
Energy conservation is a critical issue as the lifetime of these nodes depends on the life of
the system. Research has been carried out to conserve energy at various levels i.e., at the
hardware level, operating system, application level. We propose Efficient Power Aware
Routing (EPAR), a new power aware routing protocol that increases the network lifetime
of MANET.
In contrast to conventional power aware algorithms, EPAR identifies the capacity of a node
not just by its residual battery power, but also by the expected energy spent in reliably
forwarding data packets over a specific link. This makes that high energy node to transmit
the received packets to maximum energy node of available nodes. It may leads to successful
delivery of packets on this path. Using a mini-max formulation, EPAR selects the path that
has the largest packet capacity at the smallest residual packet transmission capacity.
This protocol must be able to handle high mobility of the nodes that often cause changes in
the network topology. This paper evaluates three Ad hoc network routing protocols
(EPAR, MTPR, and DSR) in different network scales, taking into consideration the energy
consumption. Indeed, our proposed algorithm reduces for more than 20% the total energy
consumption and decreases the mean delay, especially for high load networks, to maximize
the network lifetime, while achieving a good packet delivery ratio.
Key words: EPAR, MTPR, DSR, Residual battery power.

1. INTRODUCTION range or with the one that is outside their


An Ad hoc wireless network is a collection radio range. For the latter scenario, an
of two or more devices with wireless intermediate node is used to relay or forward
communications and networking capability. the packet from the source toward the
Such devices can communicate with another destination. An Ad hoc wireless network is
node that is immediately within their radio self-organizing and adaptive. This means
that a formed network can be de-formed on-
48
the-fly without the need for any system network. Energy-related metrics that have
administration. The term “ad hoc” tends to been used to determine energy efficient
imply “can take different forms” and “can routing path instead of the shortest one are
be mobile, standalone, or networked”. Ad discussed. They are
hoc nodes or devices should be able to  Energy consumed/packet,
detect the presence of other such devices  Time to network partition,
and to perform the necessary handshaking to
 Variance in node power levels,
allow communications and the sharing of
information and services. Ad hoc devices  cost/packet, and
should not only detect the presence of  Maximum node cost.
connectivity with neighboring
devices/nodes, but also identify what type 2. PRELIMINARY STUDIES:
the devices are and their corresponding
attributes. Since an ad hoc wireless network This section explains the literature survey
does not rely on any fixed network entities, various energy conservation technique the
the network itself essentially infrastructure- survey also extensively covers the various
less. There is no need for any fixed radio routing techniques. Dongkyun Kim et al
base stations, no wires or fixed routers presents untethered nodes in mobile ad-hoc
.However, due to the presence of mobility, networks strongly depend on the efficient
routing information will have to change to use of their batteries. In this paper we
reflect changes in link connectivity. The propose a new metric, the drain rate, to
diversity of ad hoc mobile devices also forecast the lifetime of nodes according to
implies that the battery capacity of such current traffic conditions. This metric is
devices will also vary. Since ad hoc combined with the value of the remaining
networks rely on forwarding data packets battery capacity to determine which nodes
sent by other nodes, power consumption can be part of an active route. This metric is
becomes a critical issue. good at reflecting the current dissipation of
energy without considering other traffic
1.1 Energy Efficiency measurements, like queue length and the
Most existing network protocols do not number of connections passing through the
consider power consumption an issue since nodes. The main goal of MDR is to extend
they assume the presence of static hosts and the lifetime of each node, while prolonging
routers, which are powered by mains. the lifetime of each connection. The demerit
However, mobile devices today are mostly is current dissipation of energy without
operated by batteries. Battery technology is considering other traffic measurements, like
still lagging behind microprocessor queue length and the number of connections
technology. The lifetime of Li-ion battery passing through the nodes. P.-J. Wan et al
today is only 2-3 hours. Such a limitation in presents Energy conservation is a critical
the operating hours of devices implies the issue in ad hoc wireless networks for node
need for power conservation. In particular, and network life, as the nodes are powered
for ad hoc mobile networks, mobile devices by batteries only. One major approach for
must perform both the role of an end system energy conservation is to route a
and that of intermediate system. Hence, communication session along the route
forwarding packets on the behalf of others which requires the lowest total energy
will consume power, and this can be quite consumption. This optimization problem is
significant for nodes in an ad hoc wireless referred to as Minimum-Energy Routing.

49
While the minimum-energy unicast routing along with the packets. DSR explores the
problem can be solved in polynomial time many advantages of source routing and
by shortest-path algorithms, it remains open enjoys the benefits of some of the most
whether the minimum-energy broadcast extensive testing and deployment of any of
routing problem can be solved in polynomial the protocols. It is one of the purest
time, despite the NP-hardness of its general examples of the on demand protocol, in
graph version. Recently three greedy which all actions are taken only when the
heuristics were proposed in MST (minimum route is actually needed. It has some
spanning tree), SPT (shortest-path tree), and disadvantage also like it does not support
BIP (broadcasting incremental power).At multicasting, decreasing throughput, and
load increases the energy consumption is increasing load of the network.
more. Md Nafees Rahman developed an
“Efficient Algorithm for Prolonging 3.2 MTPR Protocol
Network Lifetime of Wireless Sensor
In existing power aware methodology
Networks”. This approach proposed a
(MTPR), the next hop to be transmitted only
Particle Swarm Optimization (PSO). It has
chosen based on the residual energy of the
the merits to locate the optimal sink position
next hop. Not focusing on complete path
with respect to those relay nodes to make the
identification. Whenever the source finds
network more energy efficient. The demerit
next hop based on residual energy, the high
is that it only satisfies low density Network.
residual energy nodes might not be nearer
From the above literature survey related
by sufficient energy nodes. This makes that
with the energy consumption the following
high energy node to transmit the received
things are focused:
packets to maximum energy node of
 Minimize Energy consumed per packet: available nodes. It may leads to unsuccessful
the most intuitive metric, however not delivery of packets on this path. Assuming
optimal for maximum lifetime; all nodes in the network are equally
 Maximize Time to Network Partition: important, no node should be used for
important for mission critical routing more often than other nodes.
applications, hard to maintain low delay However, if many minimum energy routes
and high throughput simultaneously; all go through a specific node, the battery of
 Minimize Variance in node power levels: this node is drained quickly and eventually
balance the power consumption for all the node dies. Therefore, the remaining
the node in the network, i.e., all nodes in battery capacity of a node should be used to
the network have the same importance; define a routing metric that captures the
 Minimize Cost per packets: try to expected lifetime of a node, and so, the
maximize the life of all the nodes; lifetime of the network. The limitations of
 Minimize Maximum Node Cost: try to this approach can be summarized are the
delay the node network will be congested as the packets has
to route from multiple nodes, more number
3. EXISTING PROBLEM of nodes has to participate in forming a
routing path and it will always select its
3.1 DSR Protocol nearest neighboring node ,it does not
The Dynamic Source Routing algorithm is consider overall s-d path. This protocol is
another innovative approach to ad hoc that, it is not scalable to large networks and
networking whereby nodes communicate even requires significantly more processing
along paths stored in source routes carried resources than most other protocols.

50
Basically, in order to obtain the routing energies of all the nodes and thereby
information, each node must spend lot of prolong the network lifetime.
time to process any control data it receives,
even if it is not the intended recipient. 5.1 Route Discovery and
Maintenance in Proposed
4. PROPOSED WORK Algorithm
To propose an efficient power aware routing EPAR schemes make routing decisions to
(EPAR) protocol that increases the network optimize performance of power or energy
lifetime of MANET. In EPAR, before related evaluation metrics. The route
forwarding its packets to next hop, the selections are made solely with regards to
source itself analyze the entire path and its performance requirement policies,
ability. The source node calculates the independent of the underlying ad-hoc
expected energy spent over each path routing protocols deployed. Therefore the
available and its lifetime changes if, the power aware routing schemes are
packet routed through each path. On transferable from one underlying ad hoc
analyzing the entire route path available, the routing protocol to another, the observed
source node decides not only the next hop relative merits and drawbacks remain valid.
and also the entire path to be used and route There are two routing objectives for
its packet as calculated. It increased minimum total transmission energy and total
Network lifetime. In EPAR, selection of operational lifetime of the network can be
path decided only based on the residual mutually contradictory. For example, when
energy of full path. How about the residual several minimum energy routes share a
energy of all intermediate nodes have taken common node, the battery power of this
care in selection of next hop. It increases in node will quickly run into depletion,
life time of nodes further decreases packet shortening the network lifetime. When
loss. choosing a path, the DSR implementation
chooses the path with the minimum number
of hops. For EPAR, however, the path is
5. DESIGN AND chosen based on energy. First, we calculate
IMPLEMENTATION the battery power for each path, that is, the
To conserve energy, there should minimize lowest hop energy of the path. The path is
the amount of energy consumed by all then selected by choosing the path with the
packets traversing from source node to maximum lowest hop energy.
destination node i.e. we want to know the Table 1. NETWORK PARAMETER TO
total amount of energy the packets BE MEASURED USING NS2
consumed when it travels from each and
every node on the route to the next hop. The
No of packets Defines no of packet
energy consumed for one packet is
sent
calculated by the equation k Ec=ΣT (ni,
Traffic size Packet size and time
ni+1) i=1 where, into nares nodes in the
interval for
route while T denotes the energy consumed
sequential
in transmitting and receiving a packet over
transmission
one hop. Then we find the minimum Ec for
Transmit Energy Require to transmit
all packets. The main objective of EPAR is
Receive Energy Require to receive
to minimize the variance in the remaining
Idle energy Being at ON
condition

51
Sense power Energy spent to sense
packets
Energy consumed: No of packets
transmitted x energy
spent
Residual Energy Initial energy –
energy consumed

5.2 Network Lifetime Network


lifetime – Residual energy
relationship
It could be classified into two conditions: Figure 1. Flow Chart
1. Non-functional: 6. SIMULATION SETUP AND
The node is simply idle and not participating
in any traffic transmission at this situation RESULT DISCUSSION
residual energy will be a function of only of Extensive simulations were conducted
idle power. Since no transmission reception using NS-2.33. The simulated network
is carried out. Therefore, by spending idle consisted of 120 nodes randomly scattered
power, how long the low power node could in a 2000x2000m area at the beginning of
remain in network. the simulation. The tool set dest was used to
The network lifetime = The time over which produce mobility scenarios, where nodes are
the residual energy could spend on keeping moving at six different uniform speeds
the node remains in network. (Network ranging between 0 to 10 m/s and a uniform
lifetime) non function = residual energy pause time of 10s.
(idle power) * network lifetime = residual 6.1 Node Configuration
energy Eg: 0.01v * 500 min = 5v.

2. Network lifetime functional:


In this case, the node contributes to the
network and involved in handling traffic. So
it would transmit power and receive power.
Therefore, (transmission power + receiving
power) * network lifetime = residual energy
Packet delivery ratio=No. of packets
delivered / No. of packets transmitted.
Figure 2 Node Configuration

In Fig 2 Node Configuration is done. Node


configuration essentially consists of defining
the different node characteristics before
creating them. They may consist of the type
of addressing structure used in the
simulation, selecting the type of ad hoc
routing protocol for wireless nodes or
defining their energy model.

52
6.2 Path Selection Based On
Energy Calculation

Figure 5 Network Lifetime Varying With


Respect Network Size
6.4 Network Lifetime Varying With
Figure 3. Path Selection Based On Energy Respect Network Size
Calculation In Fig 5 shows that the DSR protocol
In Fig 3 we calculate expected energy drain becomes inefficient when the network
at each path calculated from path A, B, C. consists of more than 700 traffic size for low
Among which path A expected to spent density network while for high density
lesser energy and ensure prolong lifetime, so network becomes inefficient when the
path A has chosen. network consist more than 1000 sources
EPAR shows the best performance with
6.3 Average Consumed Power maximum network lifetime than MTPR and
versus No. Of Nodes DSR.
6.5 Network Lifetime Varying With
Respect To Network Size
(Nonfunctional) Figure 6 Network
Lifetime Varying With Respect to
Network Size(Nonfunctional)

Figure 4: Average Consumed Power


versus No. of Nodes

In Fig 4 shows that the consumed power of


networks using EPAR and MTPR decreases
significantly when the number of nodes
exceeds 60. On the contrary, the consumed
power of a network using the DSR protocol
increases rapidly whilst that of EPAR based
network shows stability with increasing
number of nodes.
In Fig 6 shows that the node is simply idle
and not participating in any traffic

53
transmission at this situation residual energy 7. CONCLUSION
will be a function of only of idle power. This paper mainly deals with the improve
Since no transmission reception is carried the overall network lifetime of the network
out. Therefore, by spending idle power, how using a EPAR algorithm. We propose a new
long the low power node could remain in scheme EPAR it satisfies both medium and
network. The network life time =The time large size network but DSR and MTPR only
over which the residual energy could spend used for small size network. It produces
on keeping the node remains in network. good results in terms of throughput and
6.6 Network Lifetime Varying With leads to good packet delivery ratio.
Respect To Network Size 8. REFERENCES
(Functional) [1] Internet Engineering Task Force, “Manet
working group charter,”
http://www.ietf.org/html.charters/manet-
charter.html.
[2] E.Royer and C.-K. Toh, “A Review of
Current Routing Protocols for Ad Hoc
Mobile Wireless Networks,” IEEE Personal
Communications Magazine, Vol. 6, No. 2,
April 1999.
[3] T. S. Rappaport, “Wireless
Communications: Principles and Practice”,
Prentice Hall, July 1999.
[4] S-L.Wu, Y-C Tseng and J-P Sheu,
“Intelligent Medium Access for Mobile Ad
Hoc Networks with Busy Tones and Power
Figure 7 Network Lifetime Varying with Control,” IEEE Journal on Selected Areas in
Respect Network Size (Functional) Communications, Vol. 18, No. 9, September
2000.
In Fig 7shows the network lifetime as a
[5] J. Gomez, A.T. Campbell, M.
function of the number of nodes. The life-
Naghshineh and C. Bisdikian, “Conserving
time decreases as the number of nodes grow;
Transmission Power in Wireless Ad Hoc
however for a number of nodes greater than
Networks”, Proc. 9thInternational
100, the life-time remains almost constant as
Conference on Network Protocols (ICNP
the number of nodes increases. Lifetime
2001), 2001.
decreases because MANET has to cover
[6] B. Chen, K. Jamieson, H. Balakrishnan,
more nodes as the number of nodes in the
and R. Morris, “Span: An Energy-Efficient
network size increases. We observe that the
Coordination Algorithm for Topology
improvement achieved through EPAR is
Maintenance in Ad Hoc Wireless
equal to 85 %. Energy is uniformly drained
Networks,” ACM Wireless Networks
from all the nodes and hence the network
Journal, Vol. 8, 2002.
life-time is significantly increased. Network
[7] M. W. Subbarao, “Dynamic Power-
lifetime as a functional can be calculated as:
Conscious Routing for MANETs: An Initial
RESIDUAL ENERGY= (transmission
Approach”, Journal of Research of the
power + receiving power) * network
National Institute of Standards and
lifetime.
Technology, Vol.104, No.6,1999.

54
[8] J.E. Wieselthier, G.D. Nguyen, and
A.Ephremides, ”On the construction of
energy efficient broadcast and multicast
trees in wirelessnetworks”, IEEE
INFOCOM 2000.
[9] S. Singh and C. S. Raghavendra,
“PAMAS - Power Aware Multi-Access
protocol with Signalling for Ad Hoc
Networks,” ACM SIGCOMM, Computer
Communication Review, July 1998.
[10] P-J. Wan, G. Calinescu, X. Li and O.
Frieder, “Minimum-Energy Broadcast
Routing in Static Ad Hoc Wireless
Networks”, IEEE INFOCOM2001.
[11] Laura Feeney and Martin
Nilsson,“Investigating the Energy
Consumption of a Wireless Network
Interface in an Ad Hoc Networking
Environment”, Proceedings of IEEE
INFOCOM, Anchorage, AK, 2001.
[12] K. Scott and N. Bambos, ”Routing and
channel assignment for low power
transmission in PCS,” Proceedings of IEEE
InternationalConference on Universal
Personal Communications (ICUPC ’96),
Cambridge, MA, September 29 - October 2,
1996.
[13] S. Singh, M. Woo, and C. S.
Raghavendra, “Power-aware with Routing
in Mobile Ad Hoc Networks”, Proceedings
of Mobicom 1998, Dallas, TX, 1998.
[14] C.-K. Toh,“Maximum Battery Life
Routing to Support Ubiquitous Mobile
Computing in Wireless Ad Hoc Networks,”
IEEE Communications Magazine, June
2001.

55
7.2 Certificates of the Papers Published

7.2.1. Wireless Sensor Network

56
57
7.2.2 Design of Routing Protocol for MANET

58
59
60

S-ar putea să vă placă și