SlideShare a Scribd company logo
International Journal of Engineering and Techniques - Volume 3 Issue 1, Jan – Feb 2017
ISSN: 2395-1303 http://www.ijetjournal.org Page 93
Fast Data Transfer System Using Neighbor Discovery Node
Selection
Ms.Vishnupriya.J1
,Ms.Shalmabeebi.A2
1,2( Department of CS & IT, Dhanalakshmi Srinivasan College of Arts & Science for Women, Perambalur-621212.)
I. INTRODUCTION
A sensor network may contain a huge
number of simple sensor nodes that are
developed at some inspected site.
The sensor nodes act as routers ,
forwarding messages from one of their
neighbors to another.
Two neighboring sensors to communicate,
both must be in active node.
Sensor networks with low and irregular
traffic , a special neighbor discovery
schemes should be used.
II. EXISTING SYSTEM
Initial neighbor discovery is usually
performed when the sensor has no clue
about the structure of its immediate
surroundings.
Such a case , the sensor cannot communicate
with the gateway and is therefore very
limited in performing its tasks.
DISADVANTAGES OFEXISTING
SYSTEM
 In networks with continuously heavy
traffic.
 Long-term process.
 Greater expense of energy than
required in our scheme.
III. PROPOSED SYSTEM
Sensor network initialization and
continuous neighbor discovery. We focus on
the latter and view it as a joint task of all the
nodes in every connected segment.
Sensor employs a simple protocol in a
coordinate effort reduce power .
The time required to detect hidden sensors.
IV. ADVANTAGES OF PROPOSED
SYSTEM
 Detect their immediate neighbors.
 Message does not collide with
another.
 Every node discovers its hidden
neighbors independently.
 Detect their immediate neighbors.
 Message does not collide with
another.
Abstract:
In most sensor network the nodes are static . Subject to changes because of disruptions in wireless
communication , transmission power changes, loss of synchronization between neighboring nodes.Process
we call continuous neighbor discovery during sensor network initialization and continuous neighbor
discovery.
Keywords — Sensor, Disruptions, Synchronization, Network Initilization, Continuous Neighbor
Discovery.
RESEARCH ARTICLE OPEN ACCESS
International Journal of Engineering and Techniques
ISSN: 2395-1303
V. Data Flow Diagram / Use Case
Diagram / Flow Diagram
The DFD is also called as bubble chart.
The Input Data To The System, Various
Processing Carried Out On These Data, And
The Output Data Is Generated By The
System.
VI. USE CASE DIAGRAM
VI. MODULES
 Client – Server
 Detecting all hidden links Inside a
segment
 Detecting all hidden links Outside a
segment
 Neighbor Discovery Model
CLIENT – SERVER
Client – Server computing is distributed
access.
Server accepts requests for data from client
and returns the result to the client.
clients and servers communicate over a
computer network on separate hardware.
Journal of Engineering and Techniques - Volume 3 Issue 1, Jan
1303 http://www.ijetjournal.org
Diagram / Use Case
The DFD is also called as bubble chart.
The Input Data To The System, Various
Processing Carried Out On These Data, And
The Output Data Is Generated By The
Detecting all hidden links Inside a
Detecting all hidden links Outside a
Neighbor Discovery Model
Server computing is distributed
Server accepts requests for data from client
the result to the client.
clients and servers communicate over a
on separate hardware.
HIDDEN LINK PARTICIPATE INSIDE
A SEGMENT
The discovering node issues a special SYNC
message to all segment.
This SYNC message is distributed over the
already known wireless links of the
segment.
HIDDEN LINK PARTICIPATE
OUTSIDE A SEGMENT
A random wake-up approach is used to
minimize the possibility of repeating
collisions between the HELLO
nodes in the same segment.
The HELLO transmission time is even
shorter, the probability that two neighboring
nodes will be active at the same time.
NEIGHBOR DISCOVERY MODEL
Neighbor Discovery is studied for general
ad-hoc wireless networks.
The goal is to determine the HELLO
transmission frequency, and the duration of
the neighbor discovery process.
REFERENCES
1. RFC 1122, Requirements for Internet
Hosts – Communication Layers
Braden (ed.), October 1989.
2. RFC 1123, Requirements for Internet
Hosts – Application and Support
Braden (ed.), October 1989
3. "The DoD Internet Architecture Model"
Vinton G. Cerf and Edward
Cain, Computer Networks
North-Holland, pp. 307-318
4. [1], Vinton G. Cerf and Robert E.
Kahn, A Protocol for Packet Network
Intercommunication, 5 (1974)
5. Internet Hall of Fame
6. [2], Jon Postel, Comments on
Protocol and TCP, (1977), Section
3.3.3.2
7. [3], Norman Abramson,
System - Another alternative for
computer communications
Volume 3 Issue 1, Jan – Feb 2017
Page 94
HIDDEN LINK PARTICIPATE INSIDE
The discovering node issues a special SYNC
This SYNC message is distributed over the
already known wireless links of the
HIDDEN LINK PARTICIPATE
up approach is used to
minimize the possibility of repeating
collisions between the HELLO messages of
The HELLO transmission time is even
shorter, the probability that two neighboring
nodes will be active at the same time.
NEIGHBOR DISCOVERY MODEL
Neighbor Discovery is studied for general
goal is to determine the HELLO
transmission frequency, and the duration of
the neighbor discovery process.
Requirements for Internet
Communication Layers, R.
Braden (ed.), October 1989.
Requirements for Internet
Application and Support, R.
Braden (ed.), October 1989
"The DoD Internet Architecture Model",
Vinton G. Cerf and Edward
Computer Networks, 7 (1983),
318
, Vinton G. Cerf and Robert E.
A Protocol for Packet Network
, 5 (1974)
Comments on Internet
, (1977), Section
, Norman Abramson, The Aloha
Another alternative for
mmunications, (1970)
International Journal of Engineering and Techniques - Volume 3 Issue 1, Jan – Feb 2017
ISSN: 2395-1303 http://www.ijetjournal.org Page 95
8. [4], Robert M. Metcalfe and David R.
Boggs, Ethernet: Distributed Packet
Switching or Local Computer Networks,
(1976)
9. Vinton Robert E. Kahn, The Introduction
of Packet Satellite Communications,
(1979)
10. MIT Press Cambridge Inventing the
Internet, J. Abbate (2000)
11. RFC 1812, Requirements for IP Version
4 Routers, F. Baker (June 1995)
12. RFC 675, Specification of Internet
Transmission Control Protocol, V. Cerf
et al. (December 1974)
13. "Internet History, Who invented the
Internet, When was the Internet
invented". Retrieved 12 September 2016.
14. Ronda Hauben. "From the ARPANET to
the Internet". TCP Digest (UUCP).
Retrieved2007-07-05.Wollongong
ACKNOWLEDGMENT
The author deeply indebted to honorable
Shri A.SRINIVASAN(Founder Chairman),
SHRI P.NEELRAJ(Secretary) Dhanalakshmi
Srinivasan Group of Institutions,
Perambalur for giving me opportunity to
work
and avail the facilities of the College
Campus. The author
heartfelt and sincere thanks to Principal
Dr.ARUNA DINAKARAN, Vice Principal
Prof.S.H.AFROZE,
HoDMrs.V.VANEESWARI, (Dept. of CS &
IT)
Project Guide Ms.R.ARUNADEVI, (Dept. of
CS & IT) of Dhanalakshmi
Srinivasan College of Arts & Science for
Women,Perambalur.
The author also thanks to parents, Family
Members, Friends,
Relatives for their support, freedom and
motivation.
BIOGRAPHICAL NOTES
Ms.VISHNUPRIYA.J is presently pursuing
Computer Science M.Sc., Final year the
Department of Computer Science From
Dhanalakshmi Srinivasan College of Arts
and Science for Women, Perambalur,
Tamil Nadu ,India.
Mrs.SHALMA BEEBI.A - Received M.S.c.,
M.Phil
Degree in Computer Science. She is
currently
working as Assistant Professor in
Department
of Computer Science in Dhanalakshmi
Srinivasan College of Arts and Science for
Women, Perambalur Tamil Nadu, India.

More Related Content

What's hot

Network Essentials v2.0
Network Essentials v2.0Network Essentials v2.0
Network Essentials v2.0
Hossein Zahed
 
Computer Network Introduction by Mr. Lokesh Kumar #easterscience
Computer Network Introduction by Mr. Lokesh Kumar #easterscienceComputer Network Introduction by Mr. Lokesh Kumar #easterscience
Computer Network Introduction by Mr. Lokesh Kumar #easterscience
LOKESH KUMAR
 
Computer networks
Computer networksComputer networks
Computer networks
Sayma Sultana
 
Networks classification
Networks classificationNetworks classification
Networks classification
Mukesh Chinta
 
Computer networks
Computer networksComputer networks
Computer networks
Alvaro Gomes
 
Computer network
Computer networkComputer network
Computer network
samiksha padgilwar
 
Concept of networking
Concept of networkingConcept of networking
Concept of networking
sumit dimri
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
Rutwik Jadhav
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
okelloerick
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networks
Maksudujjaman
 
Networkingconcepts
NetworkingconceptsNetworkingconcepts
Networkingconcepts
vasanthimuniasamy
 
Lecture1
Lecture1Lecture1
Lecture1
Vedpal Yadav
 
Computer networks a tanenbaum - 5th editionee
Computer networks   a tanenbaum - 5th editioneeComputer networks   a tanenbaum - 5th editionee
Computer networks a tanenbaum - 5th editionee
pawan1809
 
Grid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing ProtocolGrid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing Protocol
ijtsrd
 
Computer network basics
Computer network basicsComputer network basics
Computer network basics
JAI MCA-STUDENT
 
Digital data communications
Digital data communicationsDigital data communications
Digital data communications
Prof. Dr. K. Adisesha
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
R G Mani
 
Some important networking questions
Some important networking questionsSome important networking questions
Some important networking questions
Srikanth
 
Wide Area Network (WAN)
Wide Area Network (WAN)Wide Area Network (WAN)
Wide Area Network (WAN)
Claisse Martinez
 
Network communication standards
Network communication standardsNetwork communication standards
Network communication standards
Adeel Khurram
 

What's hot (20)

Network Essentials v2.0
Network Essentials v2.0Network Essentials v2.0
Network Essentials v2.0
 
Computer Network Introduction by Mr. Lokesh Kumar #easterscience
Computer Network Introduction by Mr. Lokesh Kumar #easterscienceComputer Network Introduction by Mr. Lokesh Kumar #easterscience
Computer Network Introduction by Mr. Lokesh Kumar #easterscience
 
Computer networks
Computer networksComputer networks
Computer networks
 
Networks classification
Networks classificationNetworks classification
Networks classification
 
Computer networks
Computer networksComputer networks
Computer networks
 
Computer network
Computer networkComputer network
Computer network
 
Concept of networking
Concept of networkingConcept of networking
Concept of networking
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networks
 
Networkingconcepts
NetworkingconceptsNetworkingconcepts
Networkingconcepts
 
Lecture1
Lecture1Lecture1
Lecture1
 
Computer networks a tanenbaum - 5th editionee
Computer networks   a tanenbaum - 5th editioneeComputer networks   a tanenbaum - 5th editionee
Computer networks a tanenbaum - 5th editionee
 
Grid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing ProtocolGrid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing Protocol
 
Computer network basics
Computer network basicsComputer network basics
Computer network basics
 
Digital data communications
Digital data communicationsDigital data communications
Digital data communications
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
 
Some important networking questions
Some important networking questionsSome important networking questions
Some important networking questions
 
Wide Area Network (WAN)
Wide Area Network (WAN)Wide Area Network (WAN)
Wide Area Network (WAN)
 
Network communication standards
Network communication standardsNetwork communication standards
Network communication standards
 

Similar to IJET-V3I1P19

International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
Alexander Decker
 
2 sima singh-6-13
2 sima singh-6-132 sima singh-6-13
2 sima singh-6-13
Alexander Decker
 
Security threats in manets a review
Security threats in manets a reviewSecurity threats in manets a review
Security threats in manets a review
ijitjournal
 
Rmdtn ppt
Rmdtn pptRmdtn ppt
Rmdtn ppt
varsha mohite
 
Data Communication & Networking Basics
Data Communication & Networking BasicsData Communication & Networking Basics
Data Communication & Networking Basics
Mahbub Alam Masud
 
E42043640
E42043640E42043640
E42043640
IJERA Editor
 
Mw2522122216
Mw2522122216Mw2522122216
Mw2522122216
IJERA Editor
 
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole AttackPerformance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
ijsrd.com
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Alexander Decker
 
Performance evaluation of diff routing protocols in wsn using difft network p...
Performance evaluation of diff routing protocols in wsn using difft network p...Performance evaluation of diff routing protocols in wsn using difft network p...
Performance evaluation of diff routing protocols in wsn using difft network p...
Dr Sandeep Kumar Poonia
 
Ns2422412247
Ns2422412247Ns2422412247
Ns2422412247
IJERA Editor
 
Computer Networks Lecture Notes
Computer Networks Lecture NotesComputer Networks Lecture Notes
Computer Networks Lecture Notes
FellowBuddy.com
 
June 28 Presentation
June 28 PresentationJune 28 Presentation
June 28 Presentation
Andrew McGarry
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
eSAT Publishing House
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
eSAT Journals
 
32 marycherian 336-349
32 marycherian 336-34932 marycherian 336-349
32 marycherian 336-349
Alexander Decker
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor network
ijwmn
 
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
ijwmn
 
Computer networking
Computer networkingComputer networking
Computer networking
ashrafulislam293
 

Similar to IJET-V3I1P19 (20)

International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
 
2 sima singh-6-13
2 sima singh-6-132 sima singh-6-13
2 sima singh-6-13
 
Security threats in manets a review
Security threats in manets a reviewSecurity threats in manets a review
Security threats in manets a review
 
Rmdtn ppt
Rmdtn pptRmdtn ppt
Rmdtn ppt
 
Data Communication & Networking Basics
Data Communication & Networking BasicsData Communication & Networking Basics
Data Communication & Networking Basics
 
E42043640
E42043640E42043640
E42043640
 
Mw2522122216
Mw2522122216Mw2522122216
Mw2522122216
 
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole AttackPerformance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
 
Performance evaluation of diff routing protocols in wsn using difft network p...
Performance evaluation of diff routing protocols in wsn using difft network p...Performance evaluation of diff routing protocols in wsn using difft network p...
Performance evaluation of diff routing protocols in wsn using difft network p...
 
Ns2422412247
Ns2422412247Ns2422412247
Ns2422412247
 
Computer Networks Lecture Notes
Computer Networks Lecture NotesComputer Networks Lecture Notes
Computer Networks Lecture Notes
 
June 28 Presentation
June 28 PresentationJune 28 Presentation
June 28 Presentation
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
 
32 marycherian 336-349
32 marycherian 336-34932 marycherian 336-349
32 marycherian 336-349
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor network
 
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
 
Computer networking
Computer networkingComputer networking
Computer networking
 

More from IJET - International Journal of Engineering and Techniques

healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...
IJET - International Journal of Engineering and Techniques
 
verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...
IJET - International Journal of Engineering and Techniques
 
Ijet v5 i6p18
Ijet v5 i6p18Ijet v5 i6p18
Ijet v5 i6p17
Ijet v5 i6p17Ijet v5 i6p17
Ijet v5 i6p16
Ijet v5 i6p16Ijet v5 i6p16
Ijet v5 i6p15
Ijet v5 i6p15Ijet v5 i6p15
Ijet v5 i6p14
Ijet v5 i6p14Ijet v5 i6p14
Ijet v5 i6p13
Ijet v5 i6p13Ijet v5 i6p13
Ijet v5 i6p12
Ijet v5 i6p12Ijet v5 i6p12
Ijet v5 i6p11
Ijet v5 i6p11Ijet v5 i6p11
Ijet v5 i6p10
Ijet v5 i6p10Ijet v5 i6p10
Ijet v5 i6p2
Ijet v5 i6p2Ijet v5 i6p2
IJET-V3I2P24
IJET-V3I2P24IJET-V3I2P24
IJET-V3I2P23
IJET-V3I2P23IJET-V3I2P23
IJET-V3I2P22
IJET-V3I2P22IJET-V3I2P22
IJET-V3I2P21
IJET-V3I2P21IJET-V3I2P21
IJET-V3I2P20
IJET-V3I2P20IJET-V3I2P20
IJET-V3I2P19
IJET-V3I2P19IJET-V3I2P19
IJET-V3I2P18
IJET-V3I2P18IJET-V3I2P18
IJET-V3I2P17
IJET-V3I2P17IJET-V3I2P17

More from IJET - International Journal of Engineering and Techniques (20)

healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...
 
verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...
 
Ijet v5 i6p18
Ijet v5 i6p18Ijet v5 i6p18
Ijet v5 i6p18
 
Ijet v5 i6p17
Ijet v5 i6p17Ijet v5 i6p17
Ijet v5 i6p17
 
Ijet v5 i6p16
Ijet v5 i6p16Ijet v5 i6p16
Ijet v5 i6p16
 
Ijet v5 i6p15
Ijet v5 i6p15Ijet v5 i6p15
Ijet v5 i6p15
 
Ijet v5 i6p14
Ijet v5 i6p14Ijet v5 i6p14
Ijet v5 i6p14
 
Ijet v5 i6p13
Ijet v5 i6p13Ijet v5 i6p13
Ijet v5 i6p13
 
Ijet v5 i6p12
Ijet v5 i6p12Ijet v5 i6p12
Ijet v5 i6p12
 
Ijet v5 i6p11
Ijet v5 i6p11Ijet v5 i6p11
Ijet v5 i6p11
 
Ijet v5 i6p10
Ijet v5 i6p10Ijet v5 i6p10
Ijet v5 i6p10
 
Ijet v5 i6p2
Ijet v5 i6p2Ijet v5 i6p2
Ijet v5 i6p2
 
IJET-V3I2P24
IJET-V3I2P24IJET-V3I2P24
IJET-V3I2P24
 
IJET-V3I2P23
IJET-V3I2P23IJET-V3I2P23
IJET-V3I2P23
 
IJET-V3I2P22
IJET-V3I2P22IJET-V3I2P22
IJET-V3I2P22
 
IJET-V3I2P21
IJET-V3I2P21IJET-V3I2P21
IJET-V3I2P21
 
IJET-V3I2P20
IJET-V3I2P20IJET-V3I2P20
IJET-V3I2P20
 
IJET-V3I2P19
IJET-V3I2P19IJET-V3I2P19
IJET-V3I2P19
 
IJET-V3I2P18
IJET-V3I2P18IJET-V3I2P18
IJET-V3I2P18
 
IJET-V3I2P17
IJET-V3I2P17IJET-V3I2P17
IJET-V3I2P17
 

Recently uploaded

6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
Wearable antenna for antenna applications
Wearable antenna for antenna applicationsWearable antenna for antenna applications
Wearable antenna for antenna applications
Madhumitha Jayaram
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
PauloRodrigues104553
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
ihlasbinance2003
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
Ratnakar Mikkili
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 

Recently uploaded (20)

6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
Wearable antenna for antenna applications
Wearable antenna for antenna applicationsWearable antenna for antenna applications
Wearable antenna for antenna applications
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 

IJET-V3I1P19

  • 1. International Journal of Engineering and Techniques - Volume 3 Issue 1, Jan – Feb 2017 ISSN: 2395-1303 http://www.ijetjournal.org Page 93 Fast Data Transfer System Using Neighbor Discovery Node Selection Ms.Vishnupriya.J1 ,Ms.Shalmabeebi.A2 1,2( Department of CS & IT, Dhanalakshmi Srinivasan College of Arts & Science for Women, Perambalur-621212.) I. INTRODUCTION A sensor network may contain a huge number of simple sensor nodes that are developed at some inspected site. The sensor nodes act as routers , forwarding messages from one of their neighbors to another. Two neighboring sensors to communicate, both must be in active node. Sensor networks with low and irregular traffic , a special neighbor discovery schemes should be used. II. EXISTING SYSTEM Initial neighbor discovery is usually performed when the sensor has no clue about the structure of its immediate surroundings. Such a case , the sensor cannot communicate with the gateway and is therefore very limited in performing its tasks. DISADVANTAGES OFEXISTING SYSTEM  In networks with continuously heavy traffic.  Long-term process.  Greater expense of energy than required in our scheme. III. PROPOSED SYSTEM Sensor network initialization and continuous neighbor discovery. We focus on the latter and view it as a joint task of all the nodes in every connected segment. Sensor employs a simple protocol in a coordinate effort reduce power . The time required to detect hidden sensors. IV. ADVANTAGES OF PROPOSED SYSTEM  Detect their immediate neighbors.  Message does not collide with another.  Every node discovers its hidden neighbors independently.  Detect their immediate neighbors.  Message does not collide with another. Abstract: In most sensor network the nodes are static . Subject to changes because of disruptions in wireless communication , transmission power changes, loss of synchronization between neighboring nodes.Process we call continuous neighbor discovery during sensor network initialization and continuous neighbor discovery. Keywords — Sensor, Disruptions, Synchronization, Network Initilization, Continuous Neighbor Discovery. RESEARCH ARTICLE OPEN ACCESS
  • 2. International Journal of Engineering and Techniques ISSN: 2395-1303 V. Data Flow Diagram / Use Case Diagram / Flow Diagram The DFD is also called as bubble chart. The Input Data To The System, Various Processing Carried Out On These Data, And The Output Data Is Generated By The System. VI. USE CASE DIAGRAM VI. MODULES  Client – Server  Detecting all hidden links Inside a segment  Detecting all hidden links Outside a segment  Neighbor Discovery Model CLIENT – SERVER Client – Server computing is distributed access. Server accepts requests for data from client and returns the result to the client. clients and servers communicate over a computer network on separate hardware. Journal of Engineering and Techniques - Volume 3 Issue 1, Jan 1303 http://www.ijetjournal.org Diagram / Use Case The DFD is also called as bubble chart. The Input Data To The System, Various Processing Carried Out On These Data, And The Output Data Is Generated By The Detecting all hidden links Inside a Detecting all hidden links Outside a Neighbor Discovery Model Server computing is distributed Server accepts requests for data from client the result to the client. clients and servers communicate over a on separate hardware. HIDDEN LINK PARTICIPATE INSIDE A SEGMENT The discovering node issues a special SYNC message to all segment. This SYNC message is distributed over the already known wireless links of the segment. HIDDEN LINK PARTICIPATE OUTSIDE A SEGMENT A random wake-up approach is used to minimize the possibility of repeating collisions between the HELLO nodes in the same segment. The HELLO transmission time is even shorter, the probability that two neighboring nodes will be active at the same time. NEIGHBOR DISCOVERY MODEL Neighbor Discovery is studied for general ad-hoc wireless networks. The goal is to determine the HELLO transmission frequency, and the duration of the neighbor discovery process. REFERENCES 1. RFC 1122, Requirements for Internet Hosts – Communication Layers Braden (ed.), October 1989. 2. RFC 1123, Requirements for Internet Hosts – Application and Support Braden (ed.), October 1989 3. "The DoD Internet Architecture Model" Vinton G. Cerf and Edward Cain, Computer Networks North-Holland, pp. 307-318 4. [1], Vinton G. Cerf and Robert E. Kahn, A Protocol for Packet Network Intercommunication, 5 (1974) 5. Internet Hall of Fame 6. [2], Jon Postel, Comments on Protocol and TCP, (1977), Section 3.3.3.2 7. [3], Norman Abramson, System - Another alternative for computer communications Volume 3 Issue 1, Jan – Feb 2017 Page 94 HIDDEN LINK PARTICIPATE INSIDE The discovering node issues a special SYNC This SYNC message is distributed over the already known wireless links of the HIDDEN LINK PARTICIPATE up approach is used to minimize the possibility of repeating collisions between the HELLO messages of The HELLO transmission time is even shorter, the probability that two neighboring nodes will be active at the same time. NEIGHBOR DISCOVERY MODEL Neighbor Discovery is studied for general goal is to determine the HELLO transmission frequency, and the duration of the neighbor discovery process. Requirements for Internet Communication Layers, R. Braden (ed.), October 1989. Requirements for Internet Application and Support, R. Braden (ed.), October 1989 "The DoD Internet Architecture Model", Vinton G. Cerf and Edward Computer Networks, 7 (1983), 318 , Vinton G. Cerf and Robert E. A Protocol for Packet Network , 5 (1974) Comments on Internet , (1977), Section , Norman Abramson, The Aloha Another alternative for mmunications, (1970)
  • 3. International Journal of Engineering and Techniques - Volume 3 Issue 1, Jan – Feb 2017 ISSN: 2395-1303 http://www.ijetjournal.org Page 95 8. [4], Robert M. Metcalfe and David R. Boggs, Ethernet: Distributed Packet Switching or Local Computer Networks, (1976) 9. Vinton Robert E. Kahn, The Introduction of Packet Satellite Communications, (1979) 10. MIT Press Cambridge Inventing the Internet, J. Abbate (2000) 11. RFC 1812, Requirements for IP Version 4 Routers, F. Baker (June 1995) 12. RFC 675, Specification of Internet Transmission Control Protocol, V. Cerf et al. (December 1974) 13. "Internet History, Who invented the Internet, When was the Internet invented". Retrieved 12 September 2016. 14. Ronda Hauben. "From the ARPANET to the Internet". TCP Digest (UUCP). Retrieved2007-07-05.Wollongong ACKNOWLEDGMENT The author deeply indebted to honorable Shri A.SRINIVASAN(Founder Chairman), SHRI P.NEELRAJ(Secretary) Dhanalakshmi Srinivasan Group of Institutions, Perambalur for giving me opportunity to work and avail the facilities of the College Campus. The author heartfelt and sincere thanks to Principal Dr.ARUNA DINAKARAN, Vice Principal Prof.S.H.AFROZE, HoDMrs.V.VANEESWARI, (Dept. of CS & IT) Project Guide Ms.R.ARUNADEVI, (Dept. of CS & IT) of Dhanalakshmi Srinivasan College of Arts & Science for Women,Perambalur. The author also thanks to parents, Family Members, Friends, Relatives for their support, freedom and motivation. BIOGRAPHICAL NOTES Ms.VISHNUPRIYA.J is presently pursuing Computer Science M.Sc., Final year the Department of Computer Science From Dhanalakshmi Srinivasan College of Arts and Science for Women, Perambalur, Tamil Nadu ,India. Mrs.SHALMA BEEBI.A - Received M.S.c., M.Phil Degree in Computer Science. She is currently working as Assistant Professor in Department of Computer Science in Dhanalakshmi Srinivasan College of Arts and Science for Women, Perambalur Tamil Nadu, India.