Documente Academic
Documente Profesional
Documente Cultură
Introduction
To develop the system to recover the useful signal from the collided signals and to
protect useful signal from unauthorized access. It eliminates the interface with high
efficiency. Thus the throughput and network efficiency can greatly be increased.
Literature Survey
Module Description
Login
In Login Form module presents users a form with username and password fields.
If the user enters a valid username/password combination they will be granted to access
data. If the user enter invalid username and password that user will be considered as
unauthorized user and denied access to that user.
Split file
In this module user select a file to transfer from source to destination. The
selected file is splitted to any number of segments based on the user need. The number of
segments which is splitted has been transferred from source to destination one by one.
Intermediate server
This server receives splitted segment of file from source without any content or
data loss .In this module Collision recovery algorithm is implemented to recover the
useful information that is the file from collision. This server receives all segment of file
from source without collision, protect and forward it to destination.
File Merge
File has been splitted to several segments. All those segments have been transfer
from source to destination without any collision through intermediate server. This module
is responsible for merging all those segments at the destination to get and view the Entire
file without any collision.
Server
This module is destination in our project. In this module merged file is received at
the specified location and user can view the file without any loss in the content of the file.
It save the merged file in that specified location for later use.
Module Diagram
Login
Intermediate server
receive file segment
Collision
recovery
Transferred to
destination
Login
Given Input- Giving user name and password as input.
Expected Output- Permit authorized user to transfer a file.
Split file
Given Input- user selected file is given as input.
Expected Output- Split the file into several segments.
Intermediate server
Given Input- Received file segment from source is given as input.
Expected Output- protect that segment of file from collision.
File merge
Given Input-Splited file segment as given as input.
Expected Output- merge those segment and give entire file.
Server
Given Input-merged file is given as input.
Expected Output- store the merged file at the user specified location.
System Design
user
Split file
Class Diagram
Intermediate
path
recovery
receive segment()
collision recover()
send segment()
Destination
new user receive path
username path to merge
password save
select file() receive segment()
split file() merge segment()
transfer segment() display file()
Object Diagram
User
Display file
Choose without Send Merge
Segment
Intermediate
file collision segment segment
file Server
State Diagram
State Diagram
login
choose
file
file split
collision
rec over
merge
file
Activity Diagram
Login
choose
file to split
collision
Recover
merge splitted
segment
c h o o s e file to s p lit
R e c e iv e & s e n d s e g m e n t
s e n d t h e s p litt e d s e m e n t
R e c o v e r c o llis io n
m e rg e s e g m e n t
lo gin
1 : c h e c k a u th o riza tio n
7 : m e rg e s e gm e nt
Inte rm e dia te
s e rv e r
5 R: e c e iv e a nd s e n d s e gm e nt
s e rv
er
c o llis io n
re c o v e ry 6 : R e c o v e r a n d s e nd
Component Diagram
login
select
user
file
split server
file
Receive
Intermediat segment
e server
merge
segment
display without
collision
Data Flow Diagram
Login
User
Split file
Intermediate
Merge File
Server
Display file
ER Diagram
Choose file
User
Authorized Split
Login Chec user
k
Intermediate Send
segment
Server
Display Merge
file segment
System Architecture
Choose
Login User file
File
Intermediate split
Display without
collision
Project flow Diagram
Intermediate
Merge
Server
file
Future Enhancement
We develop this project in wired network as a future work we can develop this
project in wireless network for broadcast multiple signals simultaneously without any
interference.
Advantages
Applications
Conclusion
References
[1] A. Bachir, D. Barthel, M. Heusse, and A. Duda, “Hidden nodes avoidance in wireless
sensor networks,” in Proc. Int. Conf. Wireless Netw., Commun.Mobile Comput., Jun. 13–
16, 2005, pp. 612–617.
[2] Y. Zhou and S. M. Nettles, “Balancing the hidden and exposed node problems with
power control in CSMA/CA-based wireless networks,” in Proc. IEEE Wireless Commun.
Netw. Conf., Mar. 13–17, 2005,pp. 683–688.
[3] T. C. Keong presented at the Ad hoc mobile wireless networks: Protocols Syst. Conf.,
2002.
[4] R. Ahlswede, N.Cal, S. Y. R. Li, and R. W. Yeung, “Network information
Flow,” IEEE Trans. Inf. Theory, vol. 46, no. 4, pp. 1204–1216, Jul. 2000.
[5] S. Y. R. Li, R. W. Yeung, and N.Cai, “Linear network coding,” IEEE Trans. Inf.
Theory, vol. 49, no. 2, pp. 371–381, Feb. 2003.
[6] T. Ho, J. Jin, and H. Viswanathan, “On network coding and routing in dynamic
wireless multicast networks,” in Proc. Workshop Inf. Theory Applicat., Univ. Calif., San
Diego,CA, 2006.
[7] H.Wang, P. Fan, and K. B. Letaief, “Maximum flow and network capacity of network
coding for ad-hoc networks,” IEEE Trans. Wireless Commun., vol. 6, no. 12, pp. 4193–
4198, Dec. 2007.
[8] J. Zhang, P. Fan, and K. B. Letaief, “Network coding for efficient multicast routing in
wireless ad-hoc networks,” IEEE Trans. Commun., vol. 56, no. 4, pp. 598–607, Apr.
2008.
[9] S. Boppana and J. M. Shea, “Overlapped transmission in wireless ad hoc networks,”
in Proc. ICCCAS, Guilin,China, 2006, pp. 1309–1314.
[10] S. Katti and D. Katabi, “Embracing wireless interference: Analog network coding,”
in Proc. Conf. Appl., Technol., Archit., Protocols Comput. Commun, Kyoto, Japan, 2007,
pp. 397–408.