SlideShare une entreprise Scribd logo
1  sur  8
Efficient Algorithms for Neighbor Discovery in Wireless
Networks
ABSTRACT:
Neighbor discovery is an important first step in the initialization of a wireless ad
hoc network. In this paper, we design and analyze several algorithms for neighbor
discovery in wireless networks. Starting with a single-hop wireless network of
nodes, we propose a ALOHA-like neighbor discovery algorithm when nodes
cannot detect collisions, and an order-optimal receiver feedback-based algorithm
when nodes can detect collisions. Our algorithms neither require nodes to have a
priori estimates of the number of neighbors nor synchronization between nodes.
Our algorithms allow nodes to begin execution at different time instants and to
terminate neighbor discovery upon discovering all their neighbors. We finally
show that receiver feedback can be used to achieve a running time, even when
nodes cannot detect collisions. We then analyze neighbor discovery in a general
multihop setting. We establish an upper bound of on the running time of the
ALOHA-like algorithm, where denotes the maximum node degree in the network
and the total number of nodes. We also establish a lower bound of on the running
time of any randomized neighbor discovery algorithm. Our result thus implies that
the ALOHA-like algorithm is at most a factor worse than optimal.
EXISTING SYSTEM:
1) Neighbor discovery needs to cope with collisions. Ideally, a neighbor discovery
algorithm needs to minimize the probability of collisions and, therefore, the time to
discover neighbors.
2) In many practical settings, nodes have no knowledge of the number of
neighbors, which makes coping with collisions even harder.
3) When nodes do not have access to a global clock, they need to operate
asynchronously and still be able to discover their neighbors efficiently.
4) In asynchronous systems, nodes can potentially start neighbor discovery at
different times and, consequently, may miss each other’s transmissions.
5) Furthermore, when the number of neighbors is unknown, nodes do not know
when or how to terminate the neighbor discovery process.
PROPOSED SYSTEM:
In this paper, we present neighbor discovery algorithms that comprehensively
address each of these practical challenges under the standard collision channel
model. Unlike existing approaches that assume a priori knowledge of the number
of neighbors or clock synchronization among nodes, we propose neighbor
discovery algorithms that:
P1 do not require nodes to have a priori knowledge of the number of neighbors;
P2 do not require synchronization among nodes;
P3 allow nodes to begin execution at different time instants;
P4 enable each node to detect when to terminate the neighbor discovery process.
To the best of our knowledge, our work provides the first solution to the neighbor
discovery problem that satisfies all of the properties P1–P4. Our approach is to
start with a single-hop wireless network in which nodes are synchronized and
know exactly how many neighbors they have. As we will see, the analysis in such
a simplistic setting yields several valuable insights about the neighbor discovery
problem. These insights allow us to progressively relax each of the assumptions
leading to a complete and practical solution to the neighbor discovery problem in a
multihop network setting.
ALGORITHMS USED:
SYSTEM CONFIGURATION:-
HARDWARE REQUIREMENTS:-
 Processor - Pentium –IV
 Speed - 1.1 Ghz
 RAM - 256 MB
 Hard Disk - 20 GB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - SVGA
SOFTWARE REQUIREMENTS:
• Operating system : - Windows XP.
• Coding Language : C#.Net.
REFERENCE:
Sudarshan Vasudevan, Micah Adler, Dennis Goeckel, and Don Towsley,
“Efficient Algorithms for Neighbor Discovery in Wireless Networks”,
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 21, NO. 1,
FEBRUARY 2013.

Contenu connexe

Tendances

TIPC Roadmap 2021
TIPC Roadmap 2021TIPC Roadmap 2021
TIPC Roadmap 2021Jon Maloy
 
An Approach to Detect Packets Using Packet Sniffing
An Approach to Detect Packets Using Packet SniffingAn Approach to Detect Packets Using Packet Sniffing
An Approach to Detect Packets Using Packet Sniffingijcses
 
Overlapping Ping Monitoring
Overlapping Ping MonitoringOverlapping Ping Monitoring
Overlapping Ping MonitoringJon Maloy
 
Snmp vulnerability assessment
Snmp vulnerability assessmentSnmp vulnerability assessment
Snmp vulnerability assessmentSupriya G
 
TIPC Overview
TIPC OverviewTIPC Overview
TIPC OverviewJon Maloy
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum CryptographyShyam Mohan
 
Bh us-02-kaminsky-blackops
Bh us-02-kaminsky-blackopsBh us-02-kaminsky-blackops
Bh us-02-kaminsky-blackopsDan Kaminsky
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptographySukhdeep Kaur
 
Network Automation Tool and Python Scripting Platform
Network Automation Tool and Python Scripting PlatformNetwork Automation Tool and Python Scripting Platform
Network Automation Tool and Python Scripting PlatformZoltan Szilagyi
 
Information and network security 11 cryptography and cryptanalysis
Information and network security 11 cryptography and cryptanalysisInformation and network security 11 cryptography and cryptanalysis
Information and network security 11 cryptography and cryptanalysisVaibhav Khanna
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptographyMartins Okoi
 
Packet sniffing & ARP Poisoning
 Packet sniffing & ARP Poisoning  Packet sniffing & ARP Poisoning
Packet sniffing & ARP Poisoning Viren Rao
 
Network Time Synchronization
Network Time SynchronizationNetwork Time Synchronization
Network Time SynchronizationBen Rothke
 
Packet Sniffer
Packet Sniffer Packet Sniffer
Packet Sniffer vilss
 

Tendances (20)

TIPC Roadmap 2021
TIPC Roadmap 2021TIPC Roadmap 2021
TIPC Roadmap 2021
 
An Approach to Detect Packets Using Packet Sniffing
An Approach to Detect Packets Using Packet SniffingAn Approach to Detect Packets Using Packet Sniffing
An Approach to Detect Packets Using Packet Sniffing
 
Overlapping Ping Monitoring
Overlapping Ping MonitoringOverlapping Ping Monitoring
Overlapping Ping Monitoring
 
Snmp vulnerability assessment
Snmp vulnerability assessmentSnmp vulnerability assessment
Snmp vulnerability assessment
 
TIPC Overview
TIPC OverviewTIPC Overview
TIPC Overview
 
quantumcrypto
quantumcryptoquantumcrypto
quantumcrypto
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Bh us-02-kaminsky-blackops
Bh us-02-kaminsky-blackopsBh us-02-kaminsky-blackops
Bh us-02-kaminsky-blackops
 
CAP theorem by Ali Ghodsi
CAP theorem by Ali GhodsiCAP theorem by Ali Ghodsi
CAP theorem by Ali Ghodsi
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Network Automation Tool and Python Scripting Platform
Network Automation Tool and Python Scripting PlatformNetwork Automation Tool and Python Scripting Platform
Network Automation Tool and Python Scripting Platform
 
Information and network security 11 cryptography and cryptanalysis
Information and network security 11 cryptography and cryptanalysisInformation and network security 11 cryptography and cryptanalysis
Information and network security 11 cryptography and cryptanalysis
 
Distributed Hash Table
Distributed Hash TableDistributed Hash Table
Distributed Hash Table
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Hacking Quantum Cryptography
Hacking Quantum CryptographyHacking Quantum Cryptography
Hacking Quantum Cryptography
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptography
 
Packet sniffing & ARP Poisoning
 Packet sniffing & ARP Poisoning  Packet sniffing & ARP Poisoning
Packet sniffing & ARP Poisoning
 
Network Time Synchronization
Network Time SynchronizationNetwork Time Synchronization
Network Time Synchronization
 
Outsourced database
Outsourced databaseOutsourced database
Outsourced database
 
Packet Sniffer
Packet Sniffer Packet Sniffer
Packet Sniffer
 

En vedette

A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization ...
A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization ...A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization ...
A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization ...JPINFOTECH JAYAPRAKASH
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksJPINFOTECH JAYAPRAKASH
 
A fast clustering based feature subset selection algorithm for high-dimension...
A fast clustering based feature subset selection algorithm for high-dimension...A fast clustering based feature subset selection algorithm for high-dimension...
A fast clustering based feature subset selection algorithm for high-dimension...JPINFOTECH JAYAPRAKASH
 
2012 - 2013 DOTNET IEEE PROJECT TITLES
2012 - 2013 DOTNET IEEE PROJECT TITLES2012 - 2013 DOTNET IEEE PROJECT TITLES
2012 - 2013 DOTNET IEEE PROJECT TITLESJPINFOTECH JAYAPRAKASH
 
A probabilistic model of visual cryptography Scheme With Dynamic Group
A probabilistic model of visual cryptography Scheme With Dynamic GroupA probabilistic model of visual cryptography Scheme With Dynamic Group
A probabilistic model of visual cryptography Scheme With Dynamic GroupJPINFOTECH JAYAPRAKASH
 
Discovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networksDiscovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networksJPINFOTECH JAYAPRAKASH
 
A real time adaptive algorithm for video streaming over multiple wireless acc...
A real time adaptive algorithm for video streaming over multiple wireless acc...A real time adaptive algorithm for video streaming over multiple wireless acc...
A real time adaptive algorithm for video streaming over multiple wireless acc...JPINFOTECH JAYAPRAKASH
 
2012 - 2013 bulk ieee projects for sale
2012 - 2013 bulk ieee projects for sale2012 - 2013 bulk ieee projects for sale
2012 - 2013 bulk ieee projects for saleJPINFOTECH JAYAPRAKASH
 
Adaptive opportunistic routing for wireless ad hoc networks
Adaptive opportunistic routing for wireless ad hoc networksAdaptive opportunistic routing for wireless ad hoc networks
Adaptive opportunistic routing for wireless ad hoc networksJPINFOTECH JAYAPRAKASH
 
Cooperative positioning and tracking in disruption tolerant networks
Cooperative positioning and tracking in disruption tolerant networksCooperative positioning and tracking in disruption tolerant networks
Cooperative positioning and tracking in disruption tolerant networksJPINFOTECH JAYAPRAKASH
 

En vedette (15)

A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization ...
A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization ...A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization ...
A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization ...
 
2015 - 2016 ieee ns2 project titles
2015 - 2016 ieee ns2 project titles2015 - 2016 ieee ns2 project titles
2015 - 2016 ieee ns2 project titles
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
 
A fast clustering based feature subset selection algorithm for high-dimension...
A fast clustering based feature subset selection algorithm for high-dimension...A fast clustering based feature subset selection algorithm for high-dimension...
A fast clustering based feature subset selection algorithm for high-dimension...
 
2013 2014 bulk ieee projects
2013 2014 bulk ieee projects2013 2014 bulk ieee projects
2013 2014 bulk ieee projects
 
An adaptive cloud downloading service
An adaptive cloud downloading serviceAn adaptive cloud downloading service
An adaptive cloud downloading service
 
2012 - 2013 DOTNET IEEE PROJECT TITLES
2012 - 2013 DOTNET IEEE PROJECT TITLES2012 - 2013 DOTNET IEEE PROJECT TITLES
2012 - 2013 DOTNET IEEE PROJECT TITLES
 
A probabilistic model of visual cryptography Scheme With Dynamic Group
A probabilistic model of visual cryptography Scheme With Dynamic GroupA probabilistic model of visual cryptography Scheme With Dynamic Group
A probabilistic model of visual cryptography Scheme With Dynamic Group
 
2012-2013 IEEE PROJECT TITLES
2012-2013 IEEE PROJECT TITLES2012-2013 IEEE PROJECT TITLES
2012-2013 IEEE PROJECT TITLES
 
Discovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networksDiscovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networks
 
A real time adaptive algorithm for video streaming over multiple wireless acc...
A real time adaptive algorithm for video streaming over multiple wireless acc...A real time adaptive algorithm for video streaming over multiple wireless acc...
A real time adaptive algorithm for video streaming over multiple wireless acc...
 
2012 - 2013 bulk ieee projects for sale
2012 - 2013 bulk ieee projects for sale2012 - 2013 bulk ieee projects for sale
2012 - 2013 bulk ieee projects for sale
 
Adaptive opportunistic routing for wireless ad hoc networks
Adaptive opportunistic routing for wireless ad hoc networksAdaptive opportunistic routing for wireless ad hoc networks
Adaptive opportunistic routing for wireless ad hoc networks
 
Cooperative positioning and tracking in disruption tolerant networks
Cooperative positioning and tracking in disruption tolerant networksCooperative positioning and tracking in disruption tolerant networks
Cooperative positioning and tracking in disruption tolerant networks
 
Spatial approximate string search
Spatial approximate string searchSpatial approximate string search
Spatial approximate string search
 

Similaire à Efficient algorithms for neighbor discovery in wireless networks

For your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and laFor your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and laShainaBoling829
 
On the node clone detection in wireless sensor networks
On the node clone detection in wireless sensor networksOn the node clone detection in wireless sensor networks
On the node clone detection in wireless sensor networksJPINFOTECH JAYAPRAKASH
 
containing byzantine failures with control zones
containing  byzantine failures with control zonescontaining  byzantine failures with control zones
containing byzantine failures with control zonesvishnuRajan20
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sBlack Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sIJMER
 
Analysis and reactive measures on the blackhole attack
Analysis and reactive measures on the blackhole attackAnalysis and reactive measures on the blackhole attack
Analysis and reactive measures on the blackhole attackJyotiVERMA176
 
Introduction to cyber forensics
Introduction to cyber forensicsIntroduction to cyber forensics
Introduction to cyber forensicsAnpumathews
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Editor IJCATR
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Ballpark Figure Algorithms for Data Broadcast in Wireless Networks
Ballpark Figure Algorithms for Data Broadcast in Wireless NetworksBallpark Figure Algorithms for Data Broadcast in Wireless Networks
Ballpark Figure Algorithms for Data Broadcast in Wireless NetworksEditor IJCATR
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Analyzing worms and network traffic using compression
Analyzing worms and network traffic using compressionAnalyzing worms and network traffic using compression
Analyzing worms and network traffic using compressionUltraUploader
 
Discovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networksDiscovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networksJPINFOTECH JAYAPRAKASH
 
Defending against collaborative attacks by
Defending against collaborative attacks byDefending against collaborative attacks by
Defending against collaborative attacks byjpstudcorner
 
Anomalous payload based network intrusion detection
Anomalous payload based network intrusion detectionAnomalous payload based network intrusion detection
Anomalous payload based network intrusion detectionUltraUploader
 
Scanning and Enumeration in Cyber Security.pptx
Scanning and Enumeration in Cyber Security.pptxScanning and Enumeration in Cyber Security.pptx
Scanning and Enumeration in Cyber Security.pptxMahdiHasanSowrav
 

Similaire à Efficient algorithms for neighbor discovery in wireless networks (20)

Aa04404164169
Aa04404164169Aa04404164169
Aa04404164169
 
For your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and laFor your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and la
 
Packet capturing
Packet capturingPacket capturing
Packet capturing
 
On the node clone detection in wireless sensor networks
On the node clone detection in wireless sensor networksOn the node clone detection in wireless sensor networks
On the node clone detection in wireless sensor networks
 
containing byzantine failures with control zones
containing  byzantine failures with control zonescontaining  byzantine failures with control zones
containing byzantine failures with control zones
 
Byzantine
ByzantineByzantine
Byzantine
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sBlack Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
 
Analysis and reactive measures on the blackhole attack
Analysis and reactive measures on the blackhole attackAnalysis and reactive measures on the blackhole attack
Analysis and reactive measures on the blackhole attack
 
Introduction to cyber forensics
Introduction to cyber forensicsIntroduction to cyber forensics
Introduction to cyber forensics
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Ballpark Figure Algorithms for Data Broadcast in Wireless Networks
Ballpark Figure Algorithms for Data Broadcast in Wireless NetworksBallpark Figure Algorithms for Data Broadcast in Wireless Networks
Ballpark Figure Algorithms for Data Broadcast in Wireless Networks
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Analyzing worms and network traffic using compression
Analyzing worms and network traffic using compressionAnalyzing worms and network traffic using compression
Analyzing worms and network traffic using compression
 
Discovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networksDiscovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networks
 
Defending against collaborative attacks by
Defending against collaborative attacks byDefending against collaborative attacks by
Defending against collaborative attacks by
 
Anomalous payload based network intrusion detection
Anomalous payload based network intrusion detectionAnomalous payload based network intrusion detection
Anomalous payload based network intrusion detection
 
Scanning and Enumeration in Cyber Security.pptx
Scanning and Enumeration in Cyber Security.pptxScanning and Enumeration in Cyber Security.pptx
Scanning and Enumeration in Cyber Security.pptx
 
E0392031034
E0392031034E0392031034
E0392031034
 

Dernier

How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 

Dernier (20)

How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 

Efficient algorithms for neighbor discovery in wireless networks

  • 1. Efficient Algorithms for Neighbor Discovery in Wireless Networks ABSTRACT: Neighbor discovery is an important first step in the initialization of a wireless ad hoc network. In this paper, we design and analyze several algorithms for neighbor discovery in wireless networks. Starting with a single-hop wireless network of nodes, we propose a ALOHA-like neighbor discovery algorithm when nodes cannot detect collisions, and an order-optimal receiver feedback-based algorithm when nodes can detect collisions. Our algorithms neither require nodes to have a priori estimates of the number of neighbors nor synchronization between nodes. Our algorithms allow nodes to begin execution at different time instants and to terminate neighbor discovery upon discovering all their neighbors. We finally show that receiver feedback can be used to achieve a running time, even when nodes cannot detect collisions. We then analyze neighbor discovery in a general multihop setting. We establish an upper bound of on the running time of the ALOHA-like algorithm, where denotes the maximum node degree in the network and the total number of nodes. We also establish a lower bound of on the running time of any randomized neighbor discovery algorithm. Our result thus implies that the ALOHA-like algorithm is at most a factor worse than optimal.
  • 2. EXISTING SYSTEM: 1) Neighbor discovery needs to cope with collisions. Ideally, a neighbor discovery algorithm needs to minimize the probability of collisions and, therefore, the time to discover neighbors. 2) In many practical settings, nodes have no knowledge of the number of neighbors, which makes coping with collisions even harder. 3) When nodes do not have access to a global clock, they need to operate asynchronously and still be able to discover their neighbors efficiently. 4) In asynchronous systems, nodes can potentially start neighbor discovery at different times and, consequently, may miss each other’s transmissions. 5) Furthermore, when the number of neighbors is unknown, nodes do not know when or how to terminate the neighbor discovery process.
  • 3. PROPOSED SYSTEM: In this paper, we present neighbor discovery algorithms that comprehensively address each of these practical challenges under the standard collision channel model. Unlike existing approaches that assume a priori knowledge of the number of neighbors or clock synchronization among nodes, we propose neighbor discovery algorithms that: P1 do not require nodes to have a priori knowledge of the number of neighbors; P2 do not require synchronization among nodes; P3 allow nodes to begin execution at different time instants; P4 enable each node to detect when to terminate the neighbor discovery process. To the best of our knowledge, our work provides the first solution to the neighbor discovery problem that satisfies all of the properties P1–P4. Our approach is to start with a single-hop wireless network in which nodes are synchronized and know exactly how many neighbors they have. As we will see, the analysis in such a simplistic setting yields several valuable insights about the neighbor discovery problem. These insights allow us to progressively relax each of the assumptions leading to a complete and practical solution to the neighbor discovery problem in a multihop network setting.
  • 5.
  • 6.
  • 7. SYSTEM CONFIGURATION:- HARDWARE REQUIREMENTS:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA SOFTWARE REQUIREMENTS: • Operating system : - Windows XP. • Coding Language : C#.Net.
  • 8. REFERENCE: Sudarshan Vasudevan, Micah Adler, Dennis Goeckel, and Don Towsley, “Efficient Algorithms for Neighbor Discovery in Wireless Networks”, IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 21, NO. 1, FEBRUARY 2013.