SlideShare a Scribd company logo
Efficient Algorithms for Neighbor Discovery in Wireless
Networks
ABSTRACT:
Neighbor discovery is an important first step in the initialization of a wireless ad
hoc network. In this paper, we design and analyze several algorithms for neighbor
discovery in wireless networks. Starting with a single-hop wireless network of
nodes, we propose a ALOHA-like neighbor discovery algorithm when nodes
cannot detect collisions, and an order-optimal receiver feedback-based algorithm
when nodes can detect collisions. Our algorithms neither require nodes to have a
priori estimates of the number of neighbors nor synchronization between nodes.
Our algorithms allow nodes to begin execution at different time instants and to
terminate neighbor discovery upon discovering all their neighbors. We finally
show that receiver feedback can be used to achieve a running time, even when
nodes cannot detect collisions. We then analyze neighbor discovery in a general
multihop setting. We establish an upper bound of on the running time of the
ALOHA-like algorithm, where denotes the maximum node degree in the network
and the total number of nodes. We also establish a lower bound of on the running
time of any randomized neighbor discovery algorithm. Our result thus implies that
the ALOHA-like algorithm is at most a factor worse than optimal.
EXISTING SYSTEM:
1) Neighbor discovery needs to cope with collisions. Ideally, a neighbor discovery
algorithm needs to minimize the probability of collisions and, therefore, the time to
discover neighbors.
2) In many practical settings, nodes have no knowledge of the number of
neighbors, which makes coping with collisions even harder.
3) When nodes do not have access to a global clock, they need to operate
asynchronously and still be able to discover their neighbors efficiently.
4) In asynchronous systems, nodes can potentially start neighbor discovery at
different times and, consequently, may miss each other’s transmissions.
5) Furthermore, when the number of neighbors is unknown, nodes do not know
when or how to terminate the neighbor discovery process.
PROPOSED SYSTEM:
In this paper, we present neighbor discovery algorithms that comprehensively
address each of these practical challenges under the standard collision channel
model. Unlike existing approaches that assume a priori knowledge of the number
of neighbors or clock synchronization among nodes, we propose neighbor
discovery algorithms that:
P1 do not require nodes to have a priori knowledge of the number of neighbors;
P2 do not require synchronization among nodes;
P3 allow nodes to begin execution at different time instants;
P4 enable each node to detect when to terminate the neighbor discovery process.
To the best of our knowledge, our work provides the first solution to the neighbor
discovery problem that satisfies all of the properties P1–P4. Our approach is to
start with a single-hop wireless network in which nodes are synchronized and
know exactly how many neighbors they have. As we will see, the analysis in such
a simplistic setting yields several valuable insights about the neighbor discovery
problem. These insights allow us to progressively relax each of the assumptions
leading to a complete and practical solution to the neighbor discovery problem in a
multihop network setting.
ALGORITHMS USED:
Efficient algorithms for neighbor discovery in wireless networks
Efficient algorithms for neighbor discovery in wireless networks
SYSTEM CONFIGURATION:-
HARDWARE REQUIREMENTS:-
 Processor - Pentium –IV
 Speed - 1.1 Ghz
 RAM - 512 MB(min)
 Hard Disk - 40 GB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - LCD/LED
SOFTWARE REQUIREMENTS:-
 Operating System : LINUX
 Tool : Network Simulator-2
 Front End : OTCL (Object Oriented Tool Command
Language)
REFERENCE:
Sudarshan Vasudevan, Micah Adler, Dennis Goeckel, and Don Towsley,
“Efficient Algorithms for Neighbor Discovery in Wireless Networks”,
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 21, NO. 1,
FEBRUARY 2013.

More Related Content

DOCX
Efficient algorithms for neighbor discovery in wireless networks
PPTX
Chord- A Scalable Peer-to-Peer Lookup Service for Internet Applications
PDF
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
PDF
Implementing a Distributed Hash Table with Scala and Akka
PDF
PWL Seattle #16 - Chord: A Scalable Peer-to-peer Lookup Protocol for Internet...
PPTX
Impromptu ideas in respect of v2 v and other
PDF
Overlapping Ping Monitoring
DOCX
Snmp vulnerability assessment
Efficient algorithms for neighbor discovery in wireless networks
Chord- A Scalable Peer-to-Peer Lookup Service for Internet Applications
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
Implementing a Distributed Hash Table with Scala and Akka
PWL Seattle #16 - Chord: A Scalable Peer-to-peer Lookup Protocol for Internet...
Impromptu ideas in respect of v2 v and other
Overlapping Ping Monitoring
Snmp vulnerability assessment

What's hot (17)

PDF
Tipc Communication Groups
PPTX
Multiprocessing -Interprocessing communication and process sunchronization,se...
PPTX
quantumcrypto
PPT
Distributed Hash Table
PPT
Quantum cryptography
PPTX
Trace route
PPTX
2015 COSCUP SDN Workshop -- SDN Quick Start
PPTX
Packet Sniffer
PPTX
CAP theorem by Ali Ghodsi
PPTX
Post quantum cryptography
PDF
Analyzing worms and network traffic using compression
PDF
Packet sniffing & ARP Poisoning
PPTX
Wireshark
DOC
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
PPTX
Open Flow Protocol
PDF
Network Time Synchronization
Tipc Communication Groups
Multiprocessing -Interprocessing communication and process sunchronization,se...
quantumcrypto
Distributed Hash Table
Quantum cryptography
Trace route
2015 COSCUP SDN Workshop -- SDN Quick Start
Packet Sniffer
CAP theorem by Ali Ghodsi
Post quantum cryptography
Analyzing worms and network traffic using compression
Packet sniffing & ARP Poisoning
Wireshark
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
Open Flow Protocol
Network Time Synchronization
Ad

Viewers also liked (19)

DOC
IEEE PROJECTS FOR ECE 2013 2014
DOCX
A highly scalable key pre distribution scheme for wireless sensor networks
DOCX
Toward fine grained, unsupervised, scalable performance diagnosis for product...
PDF
Twitsper tweeting privately
DOCX
Identity based secure distributed data storage schemes
DOCX
Back pressure-based packet-by-packet adaptive routing in communication networks
PDF
final year ieee projects in pondicherry
PDF
2013 ieee java project titles for cse, it and mca
DOCX
Network assisted mobile computing with optimal uplink query processing
DOCX
Proteus multiflow diversity routing for wireless networks with cooperative tr...
DOCX
A rank correlation based detection against distributed reflection do s attacks
PDF
2013 14 ieee ece project titles - jp infotech
DOCX
Privacy preserving delegated access control in public clouds
PDF
Facilitating document annotation using content and querying value
DOCX
Towards secure multi keyword top-k retrieval over encrypted cloud data
DOCX
Participatory privacy enabling privacy in participatory sensing
DOCX
Using fuzzy logic control to provide intelligent traffic management service f...
DOCX
Distributed cooperative caching in social wireless networks
DOCX
Secure mining of association rules in horizontally distributed databases
IEEE PROJECTS FOR ECE 2013 2014
A highly scalable key pre distribution scheme for wireless sensor networks
Toward fine grained, unsupervised, scalable performance diagnosis for product...
Twitsper tweeting privately
Identity based secure distributed data storage schemes
Back pressure-based packet-by-packet adaptive routing in communication networks
final year ieee projects in pondicherry
2013 ieee java project titles for cse, it and mca
Network assisted mobile computing with optimal uplink query processing
Proteus multiflow diversity routing for wireless networks with cooperative tr...
A rank correlation based detection against distributed reflection do s attacks
2013 14 ieee ece project titles - jp infotech
Privacy preserving delegated access control in public clouds
Facilitating document annotation using content and querying value
Towards secure multi keyword top-k retrieval over encrypted cloud data
Participatory privacy enabling privacy in participatory sensing
Using fuzzy logic control to provide intelligent traffic management service f...
Distributed cooperative caching in social wireless networks
Secure mining of association rules in horizontally distributed databases
Ad

Similar to Efficient algorithms for neighbor discovery in wireless networks (20)

PDF
Aa04404164169
DOCX
On the node clone detection in wireless sensor networks
PDF
An Approach to Detect Packets Using Packet Sniffing
DOCX
For your final step, you will synthesize the previous steps and la
PDF
International Journal of Engineering Research and Development (IJERD)
DOCX
containing byzantine failures with control zones
DOCX
Byzantine
PPTX
Analysis and reactive measures on the blackhole attack
PDF
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
PPTX
Packet capturing
PDF
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
PDF
Ballpark Figure Algorithms for Data Broadcast in Wireless Networks
PPTX
Introduction to cyber forensics
PPTX
Slides on Security issues in TCP/IP Clear explanation
DOCX
Defending against collaborative attacks by
PDF
International Journal of Engineering Research and Development
PDF
Welcome to International Journal of Engineering Research and Development (IJERD)
PDF
International Journal of Engineering Research and Development (IJERD)
DOCX
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
PDF
4.6 - IoT Device Routing Protocols Brief
Aa04404164169
On the node clone detection in wireless sensor networks
An Approach to Detect Packets Using Packet Sniffing
For your final step, you will synthesize the previous steps and la
International Journal of Engineering Research and Development (IJERD)
containing byzantine failures with control zones
Byzantine
Analysis and reactive measures on the blackhole attack
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Packet capturing
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Ballpark Figure Algorithms for Data Broadcast in Wireless Networks
Introduction to cyber forensics
Slides on Security issues in TCP/IP Clear explanation
Defending against collaborative attacks by
International Journal of Engineering Research and Development
Welcome to International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
4.6 - IoT Device Routing Protocols Brief

Recently uploaded (20)

PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PPTX
master seminar digital applications in india
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Computing-Curriculum for Schools in Ghana
PPTX
GDM (1) (1).pptx small presentation for students
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
01-Introduction-to-Information-Management.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
RMMM.pdf make it easy to upload and study
PPTX
Pharma ospi slides which help in ospi learning
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Sports Quiz easy sports quiz sports quiz
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
master seminar digital applications in india
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
102 student loan defaulters named and shamed – Is someone you know on the list?
Computing-Curriculum for Schools in Ghana
GDM (1) (1).pptx small presentation for students
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
01-Introduction-to-Information-Management.pdf
VCE English Exam - Section C Student Revision Booklet
RMMM.pdf make it easy to upload and study
Pharma ospi slides which help in ospi learning
human mycosis Human fungal infections are called human mycosis..pptx
Sports Quiz easy sports quiz sports quiz
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Anesthesia in Laparoscopic Surgery in India
TR - Agricultural Crops Production NC III.pdf
Final Presentation General Medicine 03-08-2024.pptx
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Renaissance Architecture: A Journey from Faith to Humanism

Efficient algorithms for neighbor discovery in wireless networks

  • 1. Efficient Algorithms for Neighbor Discovery in Wireless Networks ABSTRACT: Neighbor discovery is an important first step in the initialization of a wireless ad hoc network. In this paper, we design and analyze several algorithms for neighbor discovery in wireless networks. Starting with a single-hop wireless network of nodes, we propose a ALOHA-like neighbor discovery algorithm when nodes cannot detect collisions, and an order-optimal receiver feedback-based algorithm when nodes can detect collisions. Our algorithms neither require nodes to have a priori estimates of the number of neighbors nor synchronization between nodes. Our algorithms allow nodes to begin execution at different time instants and to terminate neighbor discovery upon discovering all their neighbors. We finally show that receiver feedback can be used to achieve a running time, even when nodes cannot detect collisions. We then analyze neighbor discovery in a general multihop setting. We establish an upper bound of on the running time of the ALOHA-like algorithm, where denotes the maximum node degree in the network and the total number of nodes. We also establish a lower bound of on the running time of any randomized neighbor discovery algorithm. Our result thus implies that the ALOHA-like algorithm is at most a factor worse than optimal.
  • 2. EXISTING SYSTEM: 1) Neighbor discovery needs to cope with collisions. Ideally, a neighbor discovery algorithm needs to minimize the probability of collisions and, therefore, the time to discover neighbors. 2) In many practical settings, nodes have no knowledge of the number of neighbors, which makes coping with collisions even harder. 3) When nodes do not have access to a global clock, they need to operate asynchronously and still be able to discover their neighbors efficiently. 4) In asynchronous systems, nodes can potentially start neighbor discovery at different times and, consequently, may miss each other’s transmissions. 5) Furthermore, when the number of neighbors is unknown, nodes do not know when or how to terminate the neighbor discovery process.
  • 3. PROPOSED SYSTEM: In this paper, we present neighbor discovery algorithms that comprehensively address each of these practical challenges under the standard collision channel model. Unlike existing approaches that assume a priori knowledge of the number of neighbors or clock synchronization among nodes, we propose neighbor discovery algorithms that: P1 do not require nodes to have a priori knowledge of the number of neighbors; P2 do not require synchronization among nodes; P3 allow nodes to begin execution at different time instants; P4 enable each node to detect when to terminate the neighbor discovery process. To the best of our knowledge, our work provides the first solution to the neighbor discovery problem that satisfies all of the properties P1–P4. Our approach is to start with a single-hop wireless network in which nodes are synchronized and know exactly how many neighbors they have. As we will see, the analysis in such a simplistic setting yields several valuable insights about the neighbor discovery problem. These insights allow us to progressively relax each of the assumptions leading to a complete and practical solution to the neighbor discovery problem in a multihop network setting.
  • 7. SYSTEM CONFIGURATION:- HARDWARE REQUIREMENTS:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 512 MB(min)  Hard Disk - 40 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - LCD/LED SOFTWARE REQUIREMENTS:-  Operating System : LINUX  Tool : Network Simulator-2
  • 8.  Front End : OTCL (Object Oriented Tool Command Language) REFERENCE: Sudarshan Vasudevan, Micah Adler, Dennis Goeckel, and Don Towsley, “Efficient Algorithms for Neighbor Discovery in Wireless Networks”, IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 21, NO. 1, FEBRUARY 2013.