SlideShare a Scribd company logo
Efficient Algorithms for Neighbor Discovery in Wireless
Networks
ABSTRACT:
Neighbor discovery is an important first step in the initialization of a wireless ad
hoc network. In this paper, we design and analyze several algorithms for neighbor
discovery in wireless networks. Starting with a single-hop wireless network of
nodes, we propose a ALOHA-like neighbor discovery algorithm when nodes
cannot detect collisions, and an order-optimal receiver feedback-based algorithm
when nodes can detect collisions. Our algorithms neither require nodes to have a
priori estimates of the number of neighbors nor synchronization between nodes.
Our algorithms allow nodes to begin execution at different time instants and to
terminate neighbor discovery upon discovering all their neighbors. We finally
show that receiver feedback can be used to achieve a running time, even when
nodes cannot detect collisions. We then analyze neighbor discovery in a general
multihop setting. We establish an upper bound of on the running time of the
ALOHA-like algorithm, where denotes the maximum node degree in the network
and the total number of nodes. We also establish a lower bound of on the running
time of any randomized neighbor discovery algorithm. Our result thus implies that
the ALOHA-like algorithm is at most a factor worse than optimal.
EXISTING SYSTEM:
1) Neighbor discovery needs to cope with collisions. Ideally, a neighbor discovery
algorithm needs to minimize the probability of collisions and, therefore, the time to
discover neighbors.
2) In many practical settings, nodes have no knowledge of the number of
neighbors, which makes coping with collisions even harder.
3) When nodes do not have access to a global clock, they need to operate
asynchronously and still be able to discover their neighbors efficiently.
4) In asynchronous systems, nodes can potentially start neighbor discovery at
different times and, consequently, may miss each other’s transmissions.
5) Furthermore, when the number of neighbors is unknown, nodes do not know
when or how to terminate the neighbor discovery process.
PROPOSED SYSTEM:
In this paper, we present neighbor discovery algorithms that comprehensively
address each of these practical challenges under the standard collision channel
model. Unlike existing approaches that assume a priori knowledge of the number
of neighbors or clock synchronization among nodes, we propose neighbor
discovery algorithms that:
P1 do not require nodes to have a priori knowledge of the number of neighbors;
P2 do not require synchronization among nodes;
P3 allow nodes to begin execution at different time instants;
P4 enable each node to detect when to terminate the neighbor discovery process.
To the best of our knowledge, our work provides the first solution to the neighbor
discovery problem that satisfies all of the properties P1–P4. Our approach is to
start with a single-hop wireless network in which nodes are synchronized and
know exactly how many neighbors they have. As we will see, the analysis in such
a simplistic setting yields several valuable insights about the neighbor discovery
problem. These insights allow us to progressively relax each of the assumptions
leading to a complete and practical solution to the neighbor discovery problem in a
multihop network setting.
ALGORITHMS USED:
Efficient algorithms for neighbor discovery in wireless networks
Efficient algorithms for neighbor discovery in wireless networks
SYSTEM CONFIGURATION:-
HARDWARE REQUIREMENTS:-
 Processor - Pentium –IV
 Speed - 1.1 Ghz
 RAM - 256 MB
 Hard Disk - 20 GB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - SVGA
SOFTWARE REQUIREMENTS:
• Operating system : - Windows XP.
• Coding Language : C#.Net.
REFERENCE:
Sudarshan Vasudevan, Micah Adler, Dennis Goeckel, and Don Towsley,
“Efficient Algorithms for Neighbor Discovery in Wireless Networks”,
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 21, NO. 1,
FEBRUARY 2013.

More Related Content

DOCX
Efficient algorithms for neighbor discovery in wireless networks
PDF
Introduction to Quantum Cryptography
PPT
Janusz Kowalik: quantum cryptography
ODP
Quantum Cryptography - Quantum Coin Tossing
PDF
Implementing a Distributed Hash Table with Scala and Akka
PPTX
Impromptu ideas in respect of v2 v and other
PDF
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
PDF
PWL Seattle #16 - Chord: A Scalable Peer-to-peer Lookup Protocol for Internet...
Efficient algorithms for neighbor discovery in wireless networks
Introduction to Quantum Cryptography
Janusz Kowalik: quantum cryptography
Quantum Cryptography - Quantum Coin Tossing
Implementing a Distributed Hash Table with Scala and Akka
Impromptu ideas in respect of v2 v and other
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
PWL Seattle #16 - Chord: A Scalable Peer-to-peer Lookup Protocol for Internet...

What's hot (20)

PDF
TIPC Roadmap 2021
PDF
An Approach to Detect Packets Using Packet Sniffing
PDF
Overlapping Ping Monitoring
DOCX
Snmp vulnerability assessment
PDF
TIPC Overview
PPTX
quantumcrypto
PPTX
Quantum Cryptography
PPT
Bh us-02-kaminsky-blackops
PPTX
CAP theorem by Ali Ghodsi
PPT
Quantum cryptography
PDF
Network Automation Tool and Python Scripting Platform
PPTX
Information and network security 11 cryptography and cryptanalysis
PPT
Distributed Hash Table
PDF
Hacking Quantum Cryptography
PPTX
Post quantum cryptography
PDF
Packet sniffing & ARP Poisoning
PDF
Network Time Synchronization
PPTX
Outsourced database
PPTX
Packet Sniffer
TIPC Roadmap 2021
An Approach to Detect Packets Using Packet Sniffing
Overlapping Ping Monitoring
Snmp vulnerability assessment
TIPC Overview
quantumcrypto
Quantum Cryptography
Bh us-02-kaminsky-blackops
CAP theorem by Ali Ghodsi
Quantum cryptography
Network Automation Tool and Python Scripting Platform
Information and network security 11 cryptography and cryptanalysis
Distributed Hash Table
Hacking Quantum Cryptography
Post quantum cryptography
Packet sniffing & ARP Poisoning
Network Time Synchronization
Outsourced database
Packet Sniffer
Ad

Viewers also liked (15)

PPTX
A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization ...
PDF
2015 - 2016 ieee ns2 project titles
PDF
Packet hiding methods for preventing selective jamming attacks
DOCX
A fast clustering based feature subset selection algorithm for high-dimension...
DOCX
2013 2014 bulk ieee projects
DOCX
An adaptive cloud downloading service
DOC
2012 - 2013 DOTNET IEEE PROJECT TITLES
DOCX
A probabilistic model of visual cryptography Scheme With Dynamic Group
DOCX
2012-2013 IEEE PROJECT TITLES
DOCX
Discovery and verification of neighbor positions in mobile ad hoc networks
DOCX
A real time adaptive algorithm for video streaming over multiple wireless acc...
DOCX
2012 - 2013 bulk ieee projects for sale
DOCX
Adaptive opportunistic routing for wireless ad hoc networks
DOCX
Cooperative positioning and tracking in disruption tolerant networks
DOCX
Spatial approximate string search
A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization ...
2015 - 2016 ieee ns2 project titles
Packet hiding methods for preventing selective jamming attacks
A fast clustering based feature subset selection algorithm for high-dimension...
2013 2014 bulk ieee projects
An adaptive cloud downloading service
2012 - 2013 DOTNET IEEE PROJECT TITLES
A probabilistic model of visual cryptography Scheme With Dynamic Group
2012-2013 IEEE PROJECT TITLES
Discovery and verification of neighbor positions in mobile ad hoc networks
A real time adaptive algorithm for video streaming over multiple wireless acc...
2012 - 2013 bulk ieee projects for sale
Adaptive opportunistic routing for wireless ad hoc networks
Cooperative positioning and tracking in disruption tolerant networks
Spatial approximate string search
Ad

Similar to Efficient algorithms for neighbor discovery in wireless networks (20)

PDF
Aa04404164169
DOCX
For your final step, you will synthesize the previous steps and la
PPTX
Packet capturing
DOCX
On the node clone detection in wireless sensor networks
DOCX
containing byzantine failures with control zones
DOCX
Byzantine
PDF
International Journal of Engineering Research and Development (IJERD)
PPTX
Slides on Security issues in TCP/IP Clear explanation
PDF
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
PPTX
Analysis and reactive measures on the blackhole attack
PPTX
Introduction to cyber forensics
PDF
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
PDF
International Journal of Engineering Research and Development (IJERD)
PDF
Ballpark Figure Algorithms for Data Broadcast in Wireless Networks
PDF
International Journal of Engineering Research and Development
PDF
Analyzing worms and network traffic using compression
DOCX
Discovery and verification of neighbor positions in mobile ad hoc networks
DOCX
Defending against collaborative attacks by
PDF
4.6 - IoT Device Routing Protocols Brief
PDF
Anomalous payload based network intrusion detection
Aa04404164169
For your final step, you will synthesize the previous steps and la
Packet capturing
On the node clone detection in wireless sensor networks
containing byzantine failures with control zones
Byzantine
International Journal of Engineering Research and Development (IJERD)
Slides on Security issues in TCP/IP Clear explanation
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Analysis and reactive measures on the blackhole attack
Introduction to cyber forensics
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
International Journal of Engineering Research and Development (IJERD)
Ballpark Figure Algorithms for Data Broadcast in Wireless Networks
International Journal of Engineering Research and Development
Analyzing worms and network traffic using compression
Discovery and verification of neighbor positions in mobile ad hoc networks
Defending against collaborative attacks by
4.6 - IoT Device Routing Protocols Brief
Anomalous payload based network intrusion detection

Recently uploaded (20)

PDF
Complications of Minimal Access Surgery at WLH
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Sports Quiz easy sports quiz sports quiz
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Insiders guide to clinical Medicine.pdf
PDF
RMMM.pdf make it easy to upload and study
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
Basic Mud Logging Guide for educational purpose
PDF
Computing-Curriculum for Schools in Ghana
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Pre independence Education in Inndia.pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
Complications of Minimal Access Surgery at WLH
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPH.pptx obstetrics and gynecology in nursing
Module 4: Burden of Disease Tutorial Slides S2 2025
Sports Quiz easy sports quiz sports quiz
O7-L3 Supply Chain Operations - ICLT Program
Final Presentation General Medicine 03-08-2024.pptx
Insiders guide to clinical Medicine.pdf
RMMM.pdf make it easy to upload and study
human mycosis Human fungal infections are called human mycosis..pptx
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Renaissance Architecture: A Journey from Faith to Humanism
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Basic Mud Logging Guide for educational purpose
Computing-Curriculum for Schools in Ghana
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Microbial diseases, their pathogenesis and prophylaxis
Pre independence Education in Inndia.pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf

Efficient algorithms for neighbor discovery in wireless networks

  • 1. Efficient Algorithms for Neighbor Discovery in Wireless Networks ABSTRACT: Neighbor discovery is an important first step in the initialization of a wireless ad hoc network. In this paper, we design and analyze several algorithms for neighbor discovery in wireless networks. Starting with a single-hop wireless network of nodes, we propose a ALOHA-like neighbor discovery algorithm when nodes cannot detect collisions, and an order-optimal receiver feedback-based algorithm when nodes can detect collisions. Our algorithms neither require nodes to have a priori estimates of the number of neighbors nor synchronization between nodes. Our algorithms allow nodes to begin execution at different time instants and to terminate neighbor discovery upon discovering all their neighbors. We finally show that receiver feedback can be used to achieve a running time, even when nodes cannot detect collisions. We then analyze neighbor discovery in a general multihop setting. We establish an upper bound of on the running time of the ALOHA-like algorithm, where denotes the maximum node degree in the network and the total number of nodes. We also establish a lower bound of on the running time of any randomized neighbor discovery algorithm. Our result thus implies that the ALOHA-like algorithm is at most a factor worse than optimal.
  • 2. EXISTING SYSTEM: 1) Neighbor discovery needs to cope with collisions. Ideally, a neighbor discovery algorithm needs to minimize the probability of collisions and, therefore, the time to discover neighbors. 2) In many practical settings, nodes have no knowledge of the number of neighbors, which makes coping with collisions even harder. 3) When nodes do not have access to a global clock, they need to operate asynchronously and still be able to discover their neighbors efficiently. 4) In asynchronous systems, nodes can potentially start neighbor discovery at different times and, consequently, may miss each other’s transmissions. 5) Furthermore, when the number of neighbors is unknown, nodes do not know when or how to terminate the neighbor discovery process.
  • 3. PROPOSED SYSTEM: In this paper, we present neighbor discovery algorithms that comprehensively address each of these practical challenges under the standard collision channel model. Unlike existing approaches that assume a priori knowledge of the number of neighbors or clock synchronization among nodes, we propose neighbor discovery algorithms that: P1 do not require nodes to have a priori knowledge of the number of neighbors; P2 do not require synchronization among nodes; P3 allow nodes to begin execution at different time instants; P4 enable each node to detect when to terminate the neighbor discovery process. To the best of our knowledge, our work provides the first solution to the neighbor discovery problem that satisfies all of the properties P1–P4. Our approach is to start with a single-hop wireless network in which nodes are synchronized and know exactly how many neighbors they have. As we will see, the analysis in such a simplistic setting yields several valuable insights about the neighbor discovery problem. These insights allow us to progressively relax each of the assumptions leading to a complete and practical solution to the neighbor discovery problem in a multihop network setting.
  • 7. SYSTEM CONFIGURATION:- HARDWARE REQUIREMENTS:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA SOFTWARE REQUIREMENTS: • Operating system : - Windows XP. • Coding Language : C#.Net.
  • 8. REFERENCE: Sudarshan Vasudevan, Micah Adler, Dennis Goeckel, and Don Towsley, “Efficient Algorithms for Neighbor Discovery in Wireless Networks”, IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 21, NO. 1, FEBRUARY 2013.