SlideShare a Scribd company logo
1 of 7
Download to read offline
International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July-Aug 2020
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 351
Extension of Parametric Evaluation of WSN Utilizing Kautz
Technique
Harshitha P R
Computer Science & Engineering, BrindavanCollege of Engineering, Bengaluru
Email: harshitha.pr@gmail.com
Suvika K V
Computer Science & Engineering, C Byregowda Institute of Technology, Kolar
Email: kvsuvika@gmail.com
----------------------------------------************************----------------------------------
Abstract:
Wireless sensor and actuator networks (WSANs) are made out of sensors and actuators which performs
scattered recognizing and affecting endeavors. Most WSAN applications (e.g., fire area) asks for that
actuators rapidly respond to watched events. In this way, persistent and accuse tolerant transmission is an
essential need in WSANs to enable distinguished data to accomplish actuators constantly and quickly. In
view of confined power resources, essentialness capability is anothercritical essential. Such necessities end
up being all themore troublesome in generous scaleWSANs.
Nevertheless, existing WSANs come up short in meeting these necessities. To this end, first speculative
examination of the Kautz graph is done to check the real nature in WSANs to meet the essentials.
By then, a Kautz-based Real-time, Fault-tolerant and Energy-beneficial WSAN(REFER)is proposed.
Imply embeds Kautz graphs into the physical topology of a WSAN for persistent correspondence and
partners the Kautz diagrams using investigate table for high versatility. Suggest is significant over past
Kautz diagram based works in that it needn't troublewithanimperativenesseatinguptraditionto
findtheaccompanyingmostshortwayanditensures the consistency between the overlay and physical
topology.
Keywords —Wireless sensor and actuator networks (WSANs), routing, Kautz graph, Real-time,
Energyefficiency, Fault-tolerant.
----------------------------------------************************----------------------------------
I. INTRODUCTION
Remote Sensor Networks can be for the most part
portrayed as a system of hubs that helpfully
senseand may control nature empowering
association between people or PCs and the
encompassing condition.A WSN comprises of
vast number of sensor sand at least one sinks
where information is gathered. Every sensor hub
can detect the physical condition, handle
information locally, and takes an interest in
information sending to a sink, from where
information are recovered by clients. WSNs are
application particular, along these lines sensors
hubs are outfitted with sensors likewise. A few
applications (e.g. building observing) require
fewer sensors that can be put separately. Others
(e.g. reconnaissance of a war zone) require an
expansive number of sensors (e.g. thousands or
even millions) that will be conveyed
impromptu.Usingabiggernumberofsensorsexpands
RESEARCH ARTICLE OPEN ACCESS
International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July-Aug 2020
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 352
arrange vigor and adaptation to non-critical
failure. Sensor hubs can be sorted out in a remote
sensor arrange(WSN).The fund a mental element
so fasensor hub are information detecting,
neighborhood information preparing and
informationsending. WSNs can be named
homogeneous and heterogeneous. Homogeneous
WSNs contain just a single kind of gadgets, the
sensor hubs. Then again, heterogeneous WSNs
contain gadgets of various capacities. Run of the
mill sensor hubs are asset
obligedhubsandanothersort,calledBasestationhere,
aremoreassetrichthanthestandardsensorhubs;they
can have, for instance, more vitality assets, bigger
transmissionrun,higherinformationrate,andsoforth.
Vitality entirely restricted and dynamic
topologies are two attributes in remote sensor
systems. Due to vitality restricted, it's critical to
accomplish best harmony between dependable
information transmission and vitality utilization;
considering dynamic topology, how to keep up an
ongoingsystem by least cost isessential.
Portability in remote sensor systems
(WSN) has pulled in a ton of consideration in the
current years. The vast majority of the current
conventions accept that the hubs are stationary,[4]
since this supposition encourages the
disentanglement of the conventions, making them
have a low overhead. Be that as it may, in
applications like elderly wellbeing
checking,environmentobserving,huntandsafeguar
d, this supposition makes those bunching systems
invalid, since the static way of sensors is not
genuine for theseapplications.
II. RELATED WORK
The issue of uneven[1] vitality utilization in an
expansive class of many to-one sensor systems. In
a many-to-one sensor arrange, all sensor hubs
produce consistent bit rate (CBR) information and
send them to a solitary sink by means of multi
jump transmissions. This sort of sensor system
has numerous potential applications, for example,
ecological checking and information gathering. In
light of the perception that sensor hubs lounging
around the sink need to transfer more activity
contrasted with different hubs in external sub-
areas, our examination confirms that hubs in
internal rings endure considerably speedier energy
consumption rates (ECR) and consequently have
substantially shorter expected lifetimes. We term
this wonder of uneven vitality utilization rates as
the "vitalityopening" issue, which may bring
about extreme results, for example, early
brokenness of the whole system. We proposed
logical displaying for thisissue, which can help
comprehend the pertinence of various variables
on vitality utilization rates. Utilizing this model,
we concentrate the viability of a few existing
methodologies towards moderating the "energy
hole" issue, including organization help, activity
pressure and accumulation. We have utilized
reenactment results to approve ourinvestigation.
Sensor hubs are fueled by battery and have
serious vitality imperatives.[3] The common
many- toone movement design causes uneven
vitality utilization among sensor hubs, that is,
sensor hubs close to the base station or a bunch
head have significantly heavier activity weight
and come up short on power substantially quicker
than different hubs. The uneven hub vitality
scattering significantly lessens sensor arrange
lifetime. In a past work, we displayed the
chessboard grouping plan to expand organize
lifetime by adjusting hub vitality utilization. To
accomplish great execution and adaptability, we
propose to frame a heterogeneous sensor organize
by conveying a couple of capable top of the line
sensors notwithstanding countless end sensors. In
this paper,
weoutlineaproductivesteeringconventioninviewof
thechessboardgroupingplan,andweregisterthebase
hubthicknessforfulfillingagivenlifetimeimperative
. Reproduction tests demonstrate that the
chessboard bunching based directing convention
adjusts hub vitality utilization extremely well and
drastically expands arrange lifetime, and it
performs much superior to anything two other
grouping basedplans.
III. EXISTING SYSTEM
International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July-Aug 2020
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 353
All the nodes are controlled by the broadcasting
node or sink node where every sensor advances its
identified occasions to its tree root utilizing the
geological steering.[5] The nodes upon
disappointment retransmits the information in light
of the telecom node or sink node utilizing
dependable reliable by producing a specific
postponement. Likewise, a large portion of these
strategies are not vitality effective because of their
flooding-based topological or geological steering
segments. Each node acts in view of the time
interval which is static and the group heads frame a
spine work arrange give courses toward actuators.[8]
Limitation of the Existing system
The broadcast or the sink node cannot be
synchronized for every time interval because of the
dynamic collaborations where the network has been
defined statically.
Itonlydothedefinedtaskswhichreducesthe durability
and increases the threats. The current framework
devour a lot of vitality by depending on position
data created by communicate hub or sinkhub by
virtual coordination technique or flooding to find
and refresh steering ways.
IV. PROPOSED SYSTEM
Here, the Kautz chart is utilized for the
materialness in WSANs to meet the vitality
proficiency and constant correspondence
prerequisites in overlay upkeep anddirecting.
A Kautz chart embedding protocol that
implants Kautz diagrams to the physical
topologyof
aWSANandassociatesthechartsutilizinglook-into
table for high adaptability and ongoing
correspondence, and a vitality effective topology
upkeep system.
A hypothetical investigation of directing
ways in the Kautz chart and an effective blame
tolerantsteeringconventiontobolsterblametolerant,
ongoing and vitality productive information
transmission.
Thecalculationempowersatransfernodeto
rapidlyandproficientlyrecognizethefollowingmost
brief way from itself to the goal after directing
disappointment without informationtransmission.
Advantages of the proposed system
Due to dislocation of broadcasting
nodeinto a normal operating node, each node
changes its functionality at a different intervaltime.
The topological attribute of freezing in a network
iseliminated.
Performance estimation improvisation is
computerized based on residual attack policy for
untrusted intermediate nodetransmission.
The overall design improves and enhances
the overall networkperformance.
V. FAULTDIAGNOSIS
A. Sources ofFaults
Meshroutershelpstoconnectmeshnetworks
with different wireless networks. Hence WMNs
are
termedasstandalonedevices.Itprovidesgreaterrange
of data transfer rates in thenetworks.
There are a numerous faults occur in a mesh
topology, which are categorized as follows.
1) Transmission link fault: noise by external
source,fadingofmulti-path,interferenceswhich
are strong, and client’s misbehavior are some
of the reasons included, to show why fault
occurs. Link in these networks experiences
higher loss rate or longdelays.
2) Network element fault: Reasons for fault to
occur because of failing in single mesh
devices, hardware failures, power supply
fails, and softwarecrashes.
3) Mesh protocol fault: black hole and route
loops are created by routing protocol under
some circumstances. Extremely quick
decrease is observed in network throughput
and flapping route, which are reasons of
routingprotocols.
B.Taxonomy of Fault tolerantTechnique:
International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July-Aug 2020
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 354
We borrow the taxonomy ofldifferent
fault tolerant techniques used in traditional
distributedsystems.
1) FaultPrevention: Thisisto avoid or
preventfaults.
2) Fault Detection: This is to use different
metricsto collect symptoms oflpossiblefaults.
3) Fault Isolation: This is to correlate
differenttypes of fault indications received
from the network, and propose various
faulthypotheses.
4) Fault Identification: This is to the test each of
the proposed hypotheses in order to precisely
localize and identifyfaults.Fault Recovery:
This is to treat faults, i.e., reverse their
adverseeffects.
Isolation of faults that is checking locationof
faults, identification of faults, that is detection of
fault type are present in Faultdiagnosis.
To repair the faults, automation action should be
performed by system, and bring the network to a
desirable state Once a fault has been detected and
diagnosed. Without using the global impact in
some cases, repairing of faults can be taken place
in generalized fashion. In face of excessive
contention, conditions of bad channel can be held
by adapting transmission rate of transmitter. Nodes
are made to be
blacklistitfromroutinginthecasemeshnodesarenot
forwardsanypacketsasexpected.Relocationoftraffic
should be taken place if that node is determined to
be narrow. Methods which provides better
recovery can
beattainedinThesescenarios,ifreorganizationofroot
source of the faults isdone.
The reconfiguration fault recovery approaches
need to address three significant challenges. First
the network measurements must allow accurate
reconstructions of network models, otherwise
the computed recovery actions could be
misleading. Another challenge is that
findinglthelsuitable configuration in a large
solution space must be fast enough, otherwise the
network dynamics may render the returned
solution no longer applicable. Finally, a
Fault management must support human
understanding by providing logs and
explanation on reasoning logic of the fault
diagnosis and recovery process. This will
increase the user confidence for betteradoption.
VI. ARCHITECTURE ANDANALYSIS
Figure 1: Architecture of REFER protocol
The general coherent structure of the venture is
separated into preparing modules and an applied
information structure is characterized as
Engineering Plan. Figure 1 demonstrates the
Engineering plan where the client will design the
framework utilizing the arrangement module. The
design will be as far as the quantity of hubs,
versatility example of the hubs, and so forth.
Portable hubs and base station imparts through
the remote test system. Statistics module
gatherstheresultfromthewirelesssimulatorlikefault
tolerantpaths,energyconsumed,endtoenddelay,etc
and plot in a neat graph. Mobile node use REFER
protocols for routingmessages.
Here, there are two wireless sensor networks
where the nodes of those networks are
represented as sink 1 and sink 2. The intermediate
nodes starts transferring the data from the source
node to destination node. Upon the route failure
the node searches for an alternative path and upon
success of finding another path it transfers the
data.
International Journal of Scientific Research and Engineering Development
©IJSRED: All
VII. MODULEDESCRIPTION
Building an overlay on a WSAN for information
transmission can keep away from information
flooding and thus upgrade framework
adaptability,transmission speed and vitality
effectiveness [6]. An all-around outlined overlay
ought to be vitality productive in topology
upkeep, versatile to hub portability, and
empowers effective and dependable steering.[14]
With this target, there are three modules that are
incorporated into this venture as given beneath:
MODULE 1: Construction of Kautzgraph
MODULE 2: Setup Transmission
MODULE 3: REFER - Fault routing Protocol
MODULE 1: Construction ofKautz protocol
While plotting a WSAN overlay structure,
need to consider the tradeoff between framework
degree and expansiveness. The degree is the
amount ofneighbors a center keeps up and the
expansiveness is the most extraordinary
detachment between any two center points. While
a humbler degree produces cut down upkeep
overhead (essentialness usage), it prompts a
greater expansiveness and a more expanded
transmission delay. Underneath, we consider
whether the Kautz graph is a sensible overlay
topology that finishes a tradeoff among degree
and separation crosswise over forWSANs.[10]
MODULE 2: Setup transmission
In a considerable scale WSAN where the amount
of low-esteem sensors passed on in a target
domain is in the demand of hundreds or
thousands, it is excessive for all sensors to be
dynamic and incorporated into
datatransmission.Thesensorsareregularlyworkedi
n commitment cycle with cognizant and resting
periods to extra essentialness[2].
International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July
Available at www.ijsred.com
©IJSRED: All Rights are Reserved
WSAN for information
transmission can keep away from information
flooding and thus upgrade framework
adaptability,transmission speed and vitality
around outlined overlay
ought to be vitality productive in topology
e to hub portability, and
empowers effective and dependable steering.[14]
With this target, there are three modules that are
incorporated into this venture as given beneath:
Construction of Kautzgraph
Fault routing Protocol
Construction ofKautz protocol
While plotting a WSAN overlay structure, we
need to consider the tradeoff between framework
degree and expansiveness. The degree is the
amount ofneighbors a center keeps up and the
veness is the most extraordinary
detachment between any two center points. While
a humbler degree produces cut down upkeep
overhead (essentialness usage), it prompts a
greater expansiveness and a more expanded
transmission delay. Underneath, we consider
ether the Kautz graph is a sensible overlay
topology that finishes a tradeoff among degree
and separation crosswise over forWSANs.[10]
In a considerable scale WSAN where the amount
esteem sensors passed on in a target
main is in the demand of hundreds or
thousands, it is excessive for all sensors to be
dynamic and incorporated into
datatransmission.Thesensorsareregularlyworkedi
n commitment cycle with cognizant and resting
Figure 2: Three states of sensors
As showed up in Figure 2, Allude sets three down
to earth states for sensors to keep up the Kautz
overlay: dynamic, hold up and rest. Dynamic
center points shape a Kautz
once in a while exchange "Hello" messages to
check the accessibility with their neighboring
dynamic centers. Like diverse remote
frameworks, the repeat for the "Appreciated"
message exchanges is controlled by the
application needs. A higher repeat can ensure the
accessibility of the framework yet creates a high
overhead and the a different way.[16] The
restmaking arrangements for Allude relies on
upon sensor imperativeness leveland the
accessibility to other Kautz centers. Each center
point in the resting mode infrequently stirs to
check whether it can be a support probability for a
Kautz center. The picked confident centers stay in
the burglarystate.[20]
MODULE 3: REFER – Fault routing protocol
Correspondence between sensors uses high
essentialness. A tradeoff exists between
adjustmentto non
basicdisappointment/nonstopandimperativeness
usage in controlling. A Kautz diagram can fulfill a
sensible tradeoff. A Kautz outline with degree d
hasd
disjointcoursesbetweenanytwocenterpoints.Thistop
ology highlight supports accuse tolerant
coordinating traditions [11], [12], in which if a
center point fails to forward a message along the
briefest way, it can pick the successor in the second
Volume 3 Issue 4, July-Aug 2020
www.ijsred.com
Page 355
: Three states of sensors
As showed up in Figure 2, Allude sets three down
to earth states for sensors to keep up the Kautz
overlay: dynamic, hold up and rest. Dynamic
diagram, and they
once in a while exchange "Hello" messages to
check the accessibility with their neighboring
dynamic centers. Like diverse remote
frameworks, the repeat for the "Appreciated"
message exchanges is controlled by the
her repeat can ensure the
accessibility of the framework yet creates a high
overhead and the a different way.[16] The
restmaking arrangements for Allude relies on
upon sensor imperativeness leveland the
accessibility to other Kautz centers. Each center
nt in the resting mode infrequently stirs to
check whether it can be a support probability for a
Kautz center. The picked confident centers stay in
Fault routing protocol
Correspondence between sensors uses high
essentialness. A tradeoff exists between
adjustmentto non-
basicdisappointment/nonstopandimperativeness
usage in controlling. A Kautz diagram can fulfill a
sensible tradeoff. A Kautz outline with degree d
ntcoursesbetweenanytwocenterpoints.Thistop
ology highlight supports accuse tolerant
coordinating traditions [11], [12], in which if a
center point fails to forward a message along the
briefest way, it can pick the successor in the second
International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July-Aug 2020
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 356
most constrained way, then third-most restricted
way, and so on.[9]
InaWSAN,whenasensorperceivesanevent,itmay
need to advise different actuators to helpfully
manage the event. It is demonstrated that the
imperativeness eaten up by sending recognized data
between two centers is twofold the essentialness
exhausted for correspondence overhead, (for
instance, hello there messages and control
messages) between two centers [13]. In this way,
when there are various objectives,
usingCANguidingcomputationtosenddistinguished
data to various objectives may eat up much
imperativeness.
Right when the actuator of a source sensor (i.e.,
source actuator) multicasts identified data to
various objective center points, in order to
diminish the essentialness use in data sending, it
can use multicasting and reduce the amount of
data sending operations between centers. In like
manner, we propose a multicasting computation, in
which each actuator gathers a tree and multicasts
data to the objectives using the base number of
sending operations[18].
VIII. RESULTS
Figure 3: Consumption of Energy
The above Figure 3 shows the graph of
consumed energy of existing and proposed
system where the proposed system consumes less
energy when compared to the existing system.
Figure 4: Comparison of Delay
The above Figure 4 shows the graph shows the
comparison of the delay between proposed and
existing system where the proposed system have
less delay in delivering the information.
IX. CONCLUSION
Steady, essentialness profitability and adjustment
to interior disappointment are
fundamentalrequirements
forWSANapplications.Currentcontrollingtraditio
ns proposed for WSANs come up short in
meetingthesenecessities.Inthispaper,wespeculativ
elythoughtthe properties of the Kautz diagram,
which exhibits thatit is a perfect topology for
WSANs to meet the essentials. Thusly, we
propose Allude, which intertwines a Kautz
outline embedding tradition and a
gainfulaccusetolerantcoordinatingtradition.Allud
e's introduced Kautz topology is enduring with
the physical topology, empowering constant
correspondence. Encourage, REFER utilizes
lookinto table for the correspondence between
Kautz-based cells for high adaptability. Our
theoretical examination on the Kautz routes fill
in as the establishment for REFER's directing
tradition. It is advantageous over past Kautz-
based controlling computations by enabling a
center to clearly choose particular coordinating
ways and way lengths just in light of center point
IDs without relying upon an essentialness eating
up system. To deal with the issue of high center
point disillusionment rate, we furthermore
examine the multi-path directing in a
Kautzcell.Wealsothoughtanimperativenesscapabl
e multicasting count to furthermore diminish
essentialness use in correspondence between
Kautz cells. Wide trial happens show the world
class of Allude differentiated and other WSAN
systems and past Kautz-based overlay, and the
International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July-Aug 2020
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 357
sufficiency of the multi-way directing and
imperativeness compelling multicastingcounts.
REFERENCES
[1]. J. Li and P. Mohapatra - “Analytical modelling
and mitigation techniques for the energy hole
problem in sensor networks” - Pervasive and
Mobile Computing, Vol. 3, issue 3, pp. 233–254,
June 2007.
[2]. J. Steffan, L. Fiege, M. Cilia and A.
Buchmann,“Towards Multi-Purpose Wireless
Sensor Networks ” Proceedings of the
International Conference on Sensor
Networks (IEEE SENET’05), 2005.
[3]. X. Du, Y. Xiao and F. Dai, “Increasing network lifetime
by balancing node energy consumption in heterogeneous
sensor networks,” Wireless
Communications and Mobile Computing, vol. 8, pp. 125–
136, Semptem-ber2006.
[4]. P. O. S. Vaz de Melo, F. D. Cunha, A. A. F. Loureiro,
“A Distributed Protocol for Cooperation Among Different
Wireless Sensor Networks,” IEEE International Conference
on Communications (ICC
’13), June 2013.
[5].M.J.Shamani,H.GharaeeandS.Sadri,F.Rezaei, “Adaptive
Energy Aware Cooperation Strategy in Heterogeneous
Multi-Domain Sensor Networks, ” Procedia Computer
Science, Vol. 19, pp. 1047–1052, 2013.
[6]. B. Han, “Zone-based virtual backbone formation in
wireless ad hoc networks,” Ad Hoc Netw., vol. 7, no. 1, pp.
183–200, 2009.
[7]. W. K. Chiang and R. J. Chen, “Distributed faulttolerant
routing in Kautz networks,” in Proc. 3rd Workshop Future
Trends Distrib. Comput. Syst., 1992, pp. 297–303.
[8]. J. L. Gross and J. Yellen, Graph Theory and Its
Applications. Boca Raton, FL, USA: CRC Press, 2006.
[9]. C. P. Ravikumar, T. Rai, and V. Verma, “Kautz graphs
as attractive logical topologies in
multihoplightwavenetworks,”ElsevierSci.,vol.20,no.14,pp.
1259–1270,1997.
[10]. J. A. Sanchez, P. M. Ruiz, and I. stojmenovic,
“Energy-efficient geographic multicast routing for sensor
and actuator networks,” Comput. Commun., Elsevier, vol.
30, no. 13, pp. 2519–2531, 2007.
[11]. D. Guo, Y. Liu, and X. Ki, “Bake: A balanced kautz
tree structure for peer-to-peer networks,” presented at the
27th IEEE Conf. Comput. Commun., Phoenix, AZ, USA,
2008.
[12]. W. K. Chiang and R. J. Chen, “Distributed
faulttolerant routing in kautz networks,” J. Parallel Distrib.
Comput., vol. 20, pp. 99–106, 1994.[13] L. F. Akyildiz and
I. H. Kasimoglu. “Wireless sensor and actor networks:
research challenges” Ad hoc networks, 2(4):351–367,
2004.
[14]. M.Dhivya, Ashok Kumar Potnuru,
M.Sundarambal“Energy Efficient Routing Protocolfor
Wireless Sensor Networks”. www.ieee.org Vol. 978-1-
61284-764-1/11/2011 IEEE.
[15]. Fan Bai and Ahmed Helmy“A Survey of Mobility
Models in Wireless Ad hoc Networks” -, University of
Southern California, U.S.A-2010.
[16]. Haiying Shen and Ze Li “A Kautz-based Wireless
Sensor and Actuator Network for Real-Time, Fault-Tolerant
and Energy-Efficient Transmission” – IEEE transaction on
mobile computing, VOL 15, NO 1, January 2016.
[17]. E. Ngai, M. R. Lyu, and J. Liu, “A real-time
communication framework for wireless sensor-actuator networks,”
presented at the IEEE Aerospace Conf., Big Sky, MT, USA, 2006.
[18]. G. A. Shah, M. Bozyigit, O. B. Akan, and B. Baykal,
“Real-time coordination and routing in wireless sensor and
actor networks,” in Proc. 6th Int. Conf. Next Generation
Teletraffic Wired/Wireless Adv. Netw., 2006, pp. 365–383.
[19]. H. Shen, Z. Li,
and K. Chen, “A scalable and mobility-resilient data search
system for large-scale mobile wireless networks,” IEEE
Parallel Distrib.
Syst., vol. 25, no. 5, pp. 1124–1134, Jul. 2013.
[20]. W. K. Chiang and R. J. Chen, “Distributed fault-
tolerant routing in kautz networks,” J. Parallel Distributed.
Computing.vol. 20, pp. 99–106, 1994.

More Related Content

What's hot

Application of Weighted Centroid Approach in Base Station Localization for Mi...
Application of Weighted Centroid Approach in Base Station Localization for Mi...Application of Weighted Centroid Approach in Base Station Localization for Mi...
Application of Weighted Centroid Approach in Base Station Localization for Mi...
IJMER
 
ENERGY EFFICIENT HIERARCHICAL CLUSTER HEAD ELECTION USING EXPONENTIAL DECAY F...
ENERGY EFFICIENT HIERARCHICAL CLUSTER HEAD ELECTION USING EXPONENTIAL DECAY F...ENERGY EFFICIENT HIERARCHICAL CLUSTER HEAD ELECTION USING EXPONENTIAL DECAY F...
ENERGY EFFICIENT HIERARCHICAL CLUSTER HEAD ELECTION USING EXPONENTIAL DECAY F...
ijwmn
 
An Authenticated Trust and Reputation Calculation and Management System for C...
An Authenticated Trust and Reputation Calculation and Management System for C...An Authenticated Trust and Reputation Calculation and Management System for C...
An Authenticated Trust and Reputation Calculation and Management System for C...
1crore projects
 

What's hot (20)

Report
ReportReport
Report
 
IRJET- Energy Efficient Dynamic Cluster Head Selection with Differential Evol...
IRJET- Energy Efficient Dynamic Cluster Head Selection with Differential Evol...IRJET- Energy Efficient Dynamic Cluster Head Selection with Differential Evol...
IRJET- Energy Efficient Dynamic Cluster Head Selection with Differential Evol...
 
Application of Weighted Centroid Approach in Base Station Localization for Mi...
Application of Weighted Centroid Approach in Base Station Localization for Mi...Application of Weighted Centroid Approach in Base Station Localization for Mi...
Application of Weighted Centroid Approach in Base Station Localization for Mi...
 
A Predetermined Position-Wise Node Deployment for Optimizing Lifetime in Visu...
A Predetermined Position-Wise Node Deployment for Optimizing Lifetime in Visu...A Predetermined Position-Wise Node Deployment for Optimizing Lifetime in Visu...
A Predetermined Position-Wise Node Deployment for Optimizing Lifetime in Visu...
 
A novel energy efficient routing algorithm for wireless sensor networks using...
A novel energy efficient routing algorithm for wireless sensor networks using...A novel energy efficient routing algorithm for wireless sensor networks using...
A novel energy efficient routing algorithm for wireless sensor networks using...
 
A Survey on routing protocols for mobile sink based WSN
A Survey on routing protocols for mobile sink based WSNA Survey on routing protocols for mobile sink based WSN
A Survey on routing protocols for mobile sink based WSN
 
A Novel Routing Algorithm for Wireless Sensor Network Using Particle Swarm O...
A Novel Routing Algorithm for Wireless Sensor Network Using  Particle Swarm O...A Novel Routing Algorithm for Wireless Sensor Network Using  Particle Swarm O...
A Novel Routing Algorithm for Wireless Sensor Network Using Particle Swarm O...
 
Comprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing ProtocolComprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing Protocol
 
Review on Energy Efficient Routing Protocols Based on Clustering in WSN
Review on Energy Efficient Routing Protocols Based on Clustering in WSNReview on Energy Efficient Routing Protocols Based on Clustering in WSN
Review on Energy Efficient Routing Protocols Based on Clustering in WSN
 
Throughput analysis of energy aware routing protocol for real time load distr...
Throughput analysis of energy aware routing protocol for real time load distr...Throughput analysis of energy aware routing protocol for real time load distr...
Throughput analysis of energy aware routing protocol for real time load distr...
 
Throughput analysis of energy aware routing protocol
Throughput analysis of energy aware routing protocolThroughput analysis of energy aware routing protocol
Throughput analysis of energy aware routing protocol
 
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
 
ENERGY EFFICIENT HIERARCHICAL CLUSTER HEAD ELECTION USING EXPONENTIAL DECAY F...
ENERGY EFFICIENT HIERARCHICAL CLUSTER HEAD ELECTION USING EXPONENTIAL DECAY F...ENERGY EFFICIENT HIERARCHICAL CLUSTER HEAD ELECTION USING EXPONENTIAL DECAY F...
ENERGY EFFICIENT HIERARCHICAL CLUSTER HEAD ELECTION USING EXPONENTIAL DECAY F...
 
Report on Enhancing the performance of WSN
Report on Enhancing the performance of WSNReport on Enhancing the performance of WSN
Report on Enhancing the performance of WSN
 
IRJET- Improving Network Life Time using High Populated Harmony Search Al...
IRJET-  	  Improving Network Life Time using High Populated Harmony Search Al...IRJET-  	  Improving Network Life Time using High Populated Harmony Search Al...
IRJET- Improving Network Life Time using High Populated Harmony Search Al...
 
Messch protocol an energy efficient routing protocol for wsn
Messch protocol an energy efficient routing protocol for wsnMessch protocol an energy efficient routing protocol for wsn
Messch protocol an energy efficient routing protocol for wsn
 
An Authenticated Trust and Reputation Calculation and Management System for C...
An Authenticated Trust and Reputation Calculation and Management System for C...An Authenticated Trust and Reputation Calculation and Management System for C...
An Authenticated Trust and Reputation Calculation and Management System for C...
 
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
 
IRJET- An Hybrid Approach for Enhancement of Energy and Network Life Time...
IRJET-  	  An Hybrid Approach for Enhancement of Energy and Network Life Time...IRJET-  	  An Hybrid Approach for Enhancement of Energy and Network Life Time...
IRJET- An Hybrid Approach for Enhancement of Energy and Network Life Time...
 
Routing in Wireless Sensor Networks
Routing in Wireless Sensor NetworksRouting in Wireless Sensor Networks
Routing in Wireless Sensor Networks
 

Similar to Extension of Parametric Evaluation of WSN Utilizing Kautz Technique

Performance Analysis of Sensor Node Energy in Wireless Sensor Networks A Pers...
Performance Analysis of Sensor Node Energy in Wireless Sensor Networks A Pers...Performance Analysis of Sensor Node Energy in Wireless Sensor Networks A Pers...
Performance Analysis of Sensor Node Energy in Wireless Sensor Networks A Pers...
ijtsrd
 
ENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORK
ENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORKENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORK
ENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORK
cscpconf
 

Similar to Extension of Parametric Evaluation of WSN Utilizing Kautz Technique (20)

A Review on Virtual Grid Based Dynamic Routes Adjustment in WSN
A Review on Virtual Grid Based Dynamic Routes Adjustment in WSNA Review on Virtual Grid Based Dynamic Routes Adjustment in WSN
A Review on Virtual Grid Based Dynamic Routes Adjustment in WSN
 
IRJET- A Novel Approach of Balancing Routing using Hop Selection using Cluste...
IRJET- A Novel Approach of Balancing Routing using Hop Selection using Cluste...IRJET- A Novel Approach of Balancing Routing using Hop Selection using Cluste...
IRJET- A Novel Approach of Balancing Routing using Hop Selection using Cluste...
 
A Survey of Various Data Communication Schemes in WSN
A Survey of Various Data Communication Schemes in WSNA Survey of Various Data Communication Schemes in WSN
A Survey of Various Data Communication Schemes in WSN
 
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
 
IRJET-Energy aware Multi-Hop Routing Protocol for WSNS using Gateway
IRJET-Energy aware Multi-Hop Routing Protocol for WSNS using GatewayIRJET-Energy aware Multi-Hop Routing Protocol for WSNS using Gateway
IRJET-Energy aware Multi-Hop Routing Protocol for WSNS using Gateway
 
IRJET- Securing the Reliable Connectivity among Wireless Body Area Networks w...
IRJET- Securing the Reliable Connectivity among Wireless Body Area Networks w...IRJET- Securing the Reliable Connectivity among Wireless Body Area Networks w...
IRJET- Securing the Reliable Connectivity among Wireless Body Area Networks w...
 
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
 
IRJET- Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...
IRJET-  	  Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...IRJET-  	  Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...
IRJET- Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...
 
Sensors 19-03789-v2
Sensors 19-03789-v2Sensors 19-03789-v2
Sensors 19-03789-v2
 
IRJET- Energy Consumption Analysis of Direction Multimedia Access Control ...
IRJET- 	  Energy Consumption Analysis of Direction Multimedia Access Control ...IRJET- 	  Energy Consumption Analysis of Direction Multimedia Access Control ...
IRJET- Energy Consumption Analysis of Direction Multimedia Access Control ...
 
Performance Analysis of Sensor Node Energy in Wireless Sensor Networks A Pers...
Performance Analysis of Sensor Node Energy in Wireless Sensor Networks A Pers...Performance Analysis of Sensor Node Energy in Wireless Sensor Networks A Pers...
Performance Analysis of Sensor Node Energy in Wireless Sensor Networks A Pers...
 
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor NetworksIRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
 
An effective gossip routing based wireless sensor network framework for fore...
An effective gossip routing based wireless sensor network  framework for fore...An effective gossip routing based wireless sensor network  framework for fore...
An effective gossip routing based wireless sensor network framework for fore...
 
IRJET- Spectrum Availability based Routing with Security Consideration fo...
IRJET-  	  Spectrum Availability based Routing with Security Consideration fo...IRJET-  	  Spectrum Availability based Routing with Security Consideration fo...
IRJET- Spectrum Availability based Routing with Security Consideration fo...
 
ENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORK
ENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORKENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORK
ENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORK
 
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...
 
Analysis on Data Transmission in Underwater Acoustic Sensor Network for Compl...
Analysis on Data Transmission in Underwater Acoustic Sensor Network for Compl...Analysis on Data Transmission in Underwater Acoustic Sensor Network for Compl...
Analysis on Data Transmission in Underwater Acoustic Sensor Network for Compl...
 
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
 
A Review on Various Energy Efficient Routing Protocols in WSN
A Review on Various Energy Efficient Routing Protocols in WSNA Review on Various Energy Efficient Routing Protocols in WSN
A Review on Various Energy Efficient Routing Protocols in WSN
 

More from IJSRED

BigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunityBigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunity
IJSRED
 
Quantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf DiseaseQuantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf Disease
IJSRED
 
DC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric VehiclesDC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric Vehicles
IJSRED
 
Parallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MPParallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MP
IJSRED
 
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. AmaraStudy of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
IJSRED
 
An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...
IJSRED
 
Impacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric SolutionImpacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric Solution
IJSRED
 
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
IJSRED
 
Functions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in IndiaFunctions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in India
IJSRED
 
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
IJSRED
 

More from IJSRED (20)

IJSRED-V3I6P13
IJSRED-V3I6P13IJSRED-V3I6P13
IJSRED-V3I6P13
 
School Bus Tracking and Security System
School Bus Tracking and Security SystemSchool Bus Tracking and Security System
School Bus Tracking and Security System
 
BigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunityBigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunity
 
Quantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf DiseaseQuantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf Disease
 
DC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric VehiclesDC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric Vehicles
 
Growth Path Followed by France
Growth Path Followed by FranceGrowth Path Followed by France
Growth Path Followed by France
 
Acquisition System
Acquisition SystemAcquisition System
Acquisition System
 
Parallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MPParallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MP
 
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. AmaraStudy of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
 
Understanding Architecture of Internet of Things
Understanding Architecture of Internet of ThingsUnderstanding Architecture of Internet of Things
Understanding Architecture of Internet of Things
 
Smart shopping cart
Smart shopping cartSmart shopping cart
Smart shopping cart
 
An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...
 
Smart Canteen Management
Smart Canteen ManagementSmart Canteen Management
Smart Canteen Management
 
Gandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic EthicsGandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic Ethics
 
Impacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric SolutionImpacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric Solution
 
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
 
Inginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition SystemInginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition System
 
Farmer's Analytical assistant
Farmer's Analytical assistantFarmer's Analytical assistant
Farmer's Analytical assistant
 
Functions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in IndiaFunctions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in India
 
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
 

Recently uploaded

Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 

Recently uploaded (20)

Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptx
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 

Extension of Parametric Evaluation of WSN Utilizing Kautz Technique

  • 1. International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July-Aug 2020 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 351 Extension of Parametric Evaluation of WSN Utilizing Kautz Technique Harshitha P R Computer Science & Engineering, BrindavanCollege of Engineering, Bengaluru Email: harshitha.pr@gmail.com Suvika K V Computer Science & Engineering, C Byregowda Institute of Technology, Kolar Email: kvsuvika@gmail.com ----------------------------------------************************---------------------------------- Abstract: Wireless sensor and actuator networks (WSANs) are made out of sensors and actuators which performs scattered recognizing and affecting endeavors. Most WSAN applications (e.g., fire area) asks for that actuators rapidly respond to watched events. In this way, persistent and accuse tolerant transmission is an essential need in WSANs to enable distinguished data to accomplish actuators constantly and quickly. In view of confined power resources, essentialness capability is anothercritical essential. Such necessities end up being all themore troublesome in generous scaleWSANs. Nevertheless, existing WSANs come up short in meeting these necessities. To this end, first speculative examination of the Kautz graph is done to check the real nature in WSANs to meet the essentials. By then, a Kautz-based Real-time, Fault-tolerant and Energy-beneficial WSAN(REFER)is proposed. Imply embeds Kautz graphs into the physical topology of a WSAN for persistent correspondence and partners the Kautz diagrams using investigate table for high versatility. Suggest is significant over past Kautz diagram based works in that it needn't troublewithanimperativenesseatinguptraditionto findtheaccompanyingmostshortwayanditensures the consistency between the overlay and physical topology. Keywords —Wireless sensor and actuator networks (WSANs), routing, Kautz graph, Real-time, Energyefficiency, Fault-tolerant. ----------------------------------------************************---------------------------------- I. INTRODUCTION Remote Sensor Networks can be for the most part portrayed as a system of hubs that helpfully senseand may control nature empowering association between people or PCs and the encompassing condition.A WSN comprises of vast number of sensor sand at least one sinks where information is gathered. Every sensor hub can detect the physical condition, handle information locally, and takes an interest in information sending to a sink, from where information are recovered by clients. WSNs are application particular, along these lines sensors hubs are outfitted with sensors likewise. A few applications (e.g. building observing) require fewer sensors that can be put separately. Others (e.g. reconnaissance of a war zone) require an expansive number of sensors (e.g. thousands or even millions) that will be conveyed impromptu.Usingabiggernumberofsensorsexpands RESEARCH ARTICLE OPEN ACCESS
  • 2. International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July-Aug 2020 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 352 arrange vigor and adaptation to non-critical failure. Sensor hubs can be sorted out in a remote sensor arrange(WSN).The fund a mental element so fasensor hub are information detecting, neighborhood information preparing and informationsending. WSNs can be named homogeneous and heterogeneous. Homogeneous WSNs contain just a single kind of gadgets, the sensor hubs. Then again, heterogeneous WSNs contain gadgets of various capacities. Run of the mill sensor hubs are asset obligedhubsandanothersort,calledBasestationhere, aremoreassetrichthanthestandardsensorhubs;they can have, for instance, more vitality assets, bigger transmissionrun,higherinformationrate,andsoforth. Vitality entirely restricted and dynamic topologies are two attributes in remote sensor systems. Due to vitality restricted, it's critical to accomplish best harmony between dependable information transmission and vitality utilization; considering dynamic topology, how to keep up an ongoingsystem by least cost isessential. Portability in remote sensor systems (WSN) has pulled in a ton of consideration in the current years. The vast majority of the current conventions accept that the hubs are stationary,[4] since this supposition encourages the disentanglement of the conventions, making them have a low overhead. Be that as it may, in applications like elderly wellbeing checking,environmentobserving,huntandsafeguar d, this supposition makes those bunching systems invalid, since the static way of sensors is not genuine for theseapplications. II. RELATED WORK The issue of uneven[1] vitality utilization in an expansive class of many to-one sensor systems. In a many-to-one sensor arrange, all sensor hubs produce consistent bit rate (CBR) information and send them to a solitary sink by means of multi jump transmissions. This sort of sensor system has numerous potential applications, for example, ecological checking and information gathering. In light of the perception that sensor hubs lounging around the sink need to transfer more activity contrasted with different hubs in external sub- areas, our examination confirms that hubs in internal rings endure considerably speedier energy consumption rates (ECR) and consequently have substantially shorter expected lifetimes. We term this wonder of uneven vitality utilization rates as the "vitalityopening" issue, which may bring about extreme results, for example, early brokenness of the whole system. We proposed logical displaying for thisissue, which can help comprehend the pertinence of various variables on vitality utilization rates. Utilizing this model, we concentrate the viability of a few existing methodologies towards moderating the "energy hole" issue, including organization help, activity pressure and accumulation. We have utilized reenactment results to approve ourinvestigation. Sensor hubs are fueled by battery and have serious vitality imperatives.[3] The common many- toone movement design causes uneven vitality utilization among sensor hubs, that is, sensor hubs close to the base station or a bunch head have significantly heavier activity weight and come up short on power substantially quicker than different hubs. The uneven hub vitality scattering significantly lessens sensor arrange lifetime. In a past work, we displayed the chessboard grouping plan to expand organize lifetime by adjusting hub vitality utilization. To accomplish great execution and adaptability, we propose to frame a heterogeneous sensor organize by conveying a couple of capable top of the line sensors notwithstanding countless end sensors. In this paper, weoutlineaproductivesteeringconventioninviewof thechessboardgroupingplan,andweregisterthebase hubthicknessforfulfillingagivenlifetimeimperative . Reproduction tests demonstrate that the chessboard bunching based directing convention adjusts hub vitality utilization extremely well and drastically expands arrange lifetime, and it performs much superior to anything two other grouping basedplans. III. EXISTING SYSTEM
  • 3. International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July-Aug 2020 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 353 All the nodes are controlled by the broadcasting node or sink node where every sensor advances its identified occasions to its tree root utilizing the geological steering.[5] The nodes upon disappointment retransmits the information in light of the telecom node or sink node utilizing dependable reliable by producing a specific postponement. Likewise, a large portion of these strategies are not vitality effective because of their flooding-based topological or geological steering segments. Each node acts in view of the time interval which is static and the group heads frame a spine work arrange give courses toward actuators.[8] Limitation of the Existing system The broadcast or the sink node cannot be synchronized for every time interval because of the dynamic collaborations where the network has been defined statically. Itonlydothedefinedtaskswhichreducesthe durability and increases the threats. The current framework devour a lot of vitality by depending on position data created by communicate hub or sinkhub by virtual coordination technique or flooding to find and refresh steering ways. IV. PROPOSED SYSTEM Here, the Kautz chart is utilized for the materialness in WSANs to meet the vitality proficiency and constant correspondence prerequisites in overlay upkeep anddirecting. A Kautz chart embedding protocol that implants Kautz diagrams to the physical topologyof aWSANandassociatesthechartsutilizinglook-into table for high adaptability and ongoing correspondence, and a vitality effective topology upkeep system. A hypothetical investigation of directing ways in the Kautz chart and an effective blame tolerantsteeringconventiontobolsterblametolerant, ongoing and vitality productive information transmission. Thecalculationempowersatransfernodeto rapidlyandproficientlyrecognizethefollowingmost brief way from itself to the goal after directing disappointment without informationtransmission. Advantages of the proposed system Due to dislocation of broadcasting nodeinto a normal operating node, each node changes its functionality at a different intervaltime. The topological attribute of freezing in a network iseliminated. Performance estimation improvisation is computerized based on residual attack policy for untrusted intermediate nodetransmission. The overall design improves and enhances the overall networkperformance. V. FAULTDIAGNOSIS A. Sources ofFaults Meshroutershelpstoconnectmeshnetworks with different wireless networks. Hence WMNs are termedasstandalonedevices.Itprovidesgreaterrange of data transfer rates in thenetworks. There are a numerous faults occur in a mesh topology, which are categorized as follows. 1) Transmission link fault: noise by external source,fadingofmulti-path,interferenceswhich are strong, and client’s misbehavior are some of the reasons included, to show why fault occurs. Link in these networks experiences higher loss rate or longdelays. 2) Network element fault: Reasons for fault to occur because of failing in single mesh devices, hardware failures, power supply fails, and softwarecrashes. 3) Mesh protocol fault: black hole and route loops are created by routing protocol under some circumstances. Extremely quick decrease is observed in network throughput and flapping route, which are reasons of routingprotocols. B.Taxonomy of Fault tolerantTechnique:
  • 4. International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July-Aug 2020 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 354 We borrow the taxonomy ofldifferent fault tolerant techniques used in traditional distributedsystems. 1) FaultPrevention: Thisisto avoid or preventfaults. 2) Fault Detection: This is to use different metricsto collect symptoms oflpossiblefaults. 3) Fault Isolation: This is to correlate differenttypes of fault indications received from the network, and propose various faulthypotheses. 4) Fault Identification: This is to the test each of the proposed hypotheses in order to precisely localize and identifyfaults.Fault Recovery: This is to treat faults, i.e., reverse their adverseeffects. Isolation of faults that is checking locationof faults, identification of faults, that is detection of fault type are present in Faultdiagnosis. To repair the faults, automation action should be performed by system, and bring the network to a desirable state Once a fault has been detected and diagnosed. Without using the global impact in some cases, repairing of faults can be taken place in generalized fashion. In face of excessive contention, conditions of bad channel can be held by adapting transmission rate of transmitter. Nodes are made to be blacklistitfromroutinginthecasemeshnodesarenot forwardsanypacketsasexpected.Relocationoftraffic should be taken place if that node is determined to be narrow. Methods which provides better recovery can beattainedinThesescenarios,ifreorganizationofroot source of the faults isdone. The reconfiguration fault recovery approaches need to address three significant challenges. First the network measurements must allow accurate reconstructions of network models, otherwise the computed recovery actions could be misleading. Another challenge is that findinglthelsuitable configuration in a large solution space must be fast enough, otherwise the network dynamics may render the returned solution no longer applicable. Finally, a Fault management must support human understanding by providing logs and explanation on reasoning logic of the fault diagnosis and recovery process. This will increase the user confidence for betteradoption. VI. ARCHITECTURE ANDANALYSIS Figure 1: Architecture of REFER protocol The general coherent structure of the venture is separated into preparing modules and an applied information structure is characterized as Engineering Plan. Figure 1 demonstrates the Engineering plan where the client will design the framework utilizing the arrangement module. The design will be as far as the quantity of hubs, versatility example of the hubs, and so forth. Portable hubs and base station imparts through the remote test system. Statistics module gatherstheresultfromthewirelesssimulatorlikefault tolerantpaths,energyconsumed,endtoenddelay,etc and plot in a neat graph. Mobile node use REFER protocols for routingmessages. Here, there are two wireless sensor networks where the nodes of those networks are represented as sink 1 and sink 2. The intermediate nodes starts transferring the data from the source node to destination node. Upon the route failure the node searches for an alternative path and upon success of finding another path it transfers the data.
  • 5. International Journal of Scientific Research and Engineering Development ©IJSRED: All VII. MODULEDESCRIPTION Building an overlay on a WSAN for information transmission can keep away from information flooding and thus upgrade framework adaptability,transmission speed and vitality effectiveness [6]. An all-around outlined overlay ought to be vitality productive in topology upkeep, versatile to hub portability, and empowers effective and dependable steering.[14] With this target, there are three modules that are incorporated into this venture as given beneath: MODULE 1: Construction of Kautzgraph MODULE 2: Setup Transmission MODULE 3: REFER - Fault routing Protocol MODULE 1: Construction ofKautz protocol While plotting a WSAN overlay structure, need to consider the tradeoff between framework degree and expansiveness. The degree is the amount ofneighbors a center keeps up and the expansiveness is the most extraordinary detachment between any two center points. While a humbler degree produces cut down upkeep overhead (essentialness usage), it prompts a greater expansiveness and a more expanded transmission delay. Underneath, we consider whether the Kautz graph is a sensible overlay topology that finishes a tradeoff among degree and separation crosswise over forWSANs.[10] MODULE 2: Setup transmission In a considerable scale WSAN where the amount of low-esteem sensors passed on in a target domain is in the demand of hundreds or thousands, it is excessive for all sensors to be dynamic and incorporated into datatransmission.Thesensorsareregularlyworkedi n commitment cycle with cognizant and resting periods to extra essentialness[2]. International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July Available at www.ijsred.com ©IJSRED: All Rights are Reserved WSAN for information transmission can keep away from information flooding and thus upgrade framework adaptability,transmission speed and vitality around outlined overlay ought to be vitality productive in topology e to hub portability, and empowers effective and dependable steering.[14] With this target, there are three modules that are incorporated into this venture as given beneath: Construction of Kautzgraph Fault routing Protocol Construction ofKautz protocol While plotting a WSAN overlay structure, we need to consider the tradeoff between framework degree and expansiveness. The degree is the amount ofneighbors a center keeps up and the veness is the most extraordinary detachment between any two center points. While a humbler degree produces cut down upkeep overhead (essentialness usage), it prompts a greater expansiveness and a more expanded transmission delay. Underneath, we consider ether the Kautz graph is a sensible overlay topology that finishes a tradeoff among degree and separation crosswise over forWSANs.[10] In a considerable scale WSAN where the amount esteem sensors passed on in a target main is in the demand of hundreds or thousands, it is excessive for all sensors to be dynamic and incorporated into datatransmission.Thesensorsareregularlyworkedi n commitment cycle with cognizant and resting Figure 2: Three states of sensors As showed up in Figure 2, Allude sets three down to earth states for sensors to keep up the Kautz overlay: dynamic, hold up and rest. Dynamic center points shape a Kautz once in a while exchange "Hello" messages to check the accessibility with their neighboring dynamic centers. Like diverse remote frameworks, the repeat for the "Appreciated" message exchanges is controlled by the application needs. A higher repeat can ensure the accessibility of the framework yet creates a high overhead and the a different way.[16] The restmaking arrangements for Allude relies on upon sensor imperativeness leveland the accessibility to other Kautz centers. Each center point in the resting mode infrequently stirs to check whether it can be a support probability for a Kautz center. The picked confident centers stay in the burglarystate.[20] MODULE 3: REFER – Fault routing protocol Correspondence between sensors uses high essentialness. A tradeoff exists between adjustmentto non basicdisappointment/nonstopandimperativeness usage in controlling. A Kautz diagram can fulfill a sensible tradeoff. A Kautz outline with degree d hasd disjointcoursesbetweenanytwocenterpoints.Thistop ology highlight supports accuse tolerant coordinating traditions [11], [12], in which if a center point fails to forward a message along the briefest way, it can pick the successor in the second Volume 3 Issue 4, July-Aug 2020 www.ijsred.com Page 355 : Three states of sensors As showed up in Figure 2, Allude sets three down to earth states for sensors to keep up the Kautz overlay: dynamic, hold up and rest. Dynamic diagram, and they once in a while exchange "Hello" messages to check the accessibility with their neighboring dynamic centers. Like diverse remote frameworks, the repeat for the "Appreciated" message exchanges is controlled by the her repeat can ensure the accessibility of the framework yet creates a high overhead and the a different way.[16] The restmaking arrangements for Allude relies on upon sensor imperativeness leveland the accessibility to other Kautz centers. Each center nt in the resting mode infrequently stirs to check whether it can be a support probability for a Kautz center. The picked confident centers stay in Fault routing protocol Correspondence between sensors uses high essentialness. A tradeoff exists between adjustmentto non- basicdisappointment/nonstopandimperativeness usage in controlling. A Kautz diagram can fulfill a sensible tradeoff. A Kautz outline with degree d ntcoursesbetweenanytwocenterpoints.Thistop ology highlight supports accuse tolerant coordinating traditions [11], [12], in which if a center point fails to forward a message along the briefest way, it can pick the successor in the second
  • 6. International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July-Aug 2020 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 356 most constrained way, then third-most restricted way, and so on.[9] InaWSAN,whenasensorperceivesanevent,itmay need to advise different actuators to helpfully manage the event. It is demonstrated that the imperativeness eaten up by sending recognized data between two centers is twofold the essentialness exhausted for correspondence overhead, (for instance, hello there messages and control messages) between two centers [13]. In this way, when there are various objectives, usingCANguidingcomputationtosenddistinguished data to various objectives may eat up much imperativeness. Right when the actuator of a source sensor (i.e., source actuator) multicasts identified data to various objective center points, in order to diminish the essentialness use in data sending, it can use multicasting and reduce the amount of data sending operations between centers. In like manner, we propose a multicasting computation, in which each actuator gathers a tree and multicasts data to the objectives using the base number of sending operations[18]. VIII. RESULTS Figure 3: Consumption of Energy The above Figure 3 shows the graph of consumed energy of existing and proposed system where the proposed system consumes less energy when compared to the existing system. Figure 4: Comparison of Delay The above Figure 4 shows the graph shows the comparison of the delay between proposed and existing system where the proposed system have less delay in delivering the information. IX. CONCLUSION Steady, essentialness profitability and adjustment to interior disappointment are fundamentalrequirements forWSANapplications.Currentcontrollingtraditio ns proposed for WSANs come up short in meetingthesenecessities.Inthispaper,wespeculativ elythoughtthe properties of the Kautz diagram, which exhibits thatit is a perfect topology for WSANs to meet the essentials. Thusly, we propose Allude, which intertwines a Kautz outline embedding tradition and a gainfulaccusetolerantcoordinatingtradition.Allud e's introduced Kautz topology is enduring with the physical topology, empowering constant correspondence. Encourage, REFER utilizes lookinto table for the correspondence between Kautz-based cells for high adaptability. Our theoretical examination on the Kautz routes fill in as the establishment for REFER's directing tradition. It is advantageous over past Kautz- based controlling computations by enabling a center to clearly choose particular coordinating ways and way lengths just in light of center point IDs without relying upon an essentialness eating up system. To deal with the issue of high center point disillusionment rate, we furthermore examine the multi-path directing in a Kautzcell.Wealsothoughtanimperativenesscapabl e multicasting count to furthermore diminish essentialness use in correspondence between Kautz cells. Wide trial happens show the world class of Allude differentiated and other WSAN systems and past Kautz-based overlay, and the
  • 7. International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July-Aug 2020 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 357 sufficiency of the multi-way directing and imperativeness compelling multicastingcounts. REFERENCES [1]. J. Li and P. Mohapatra - “Analytical modelling and mitigation techniques for the energy hole problem in sensor networks” - Pervasive and Mobile Computing, Vol. 3, issue 3, pp. 233–254, June 2007. [2]. J. Steffan, L. Fiege, M. Cilia and A. Buchmann,“Towards Multi-Purpose Wireless Sensor Networks ” Proceedings of the International Conference on Sensor Networks (IEEE SENET’05), 2005. [3]. X. Du, Y. Xiao and F. Dai, “Increasing network lifetime by balancing node energy consumption in heterogeneous sensor networks,” Wireless Communications and Mobile Computing, vol. 8, pp. 125– 136, Semptem-ber2006. [4]. P. O. S. Vaz de Melo, F. D. Cunha, A. A. F. Loureiro, “A Distributed Protocol for Cooperation Among Different Wireless Sensor Networks,” IEEE International Conference on Communications (ICC ’13), June 2013. [5].M.J.Shamani,H.GharaeeandS.Sadri,F.Rezaei, “Adaptive Energy Aware Cooperation Strategy in Heterogeneous Multi-Domain Sensor Networks, ” Procedia Computer Science, Vol. 19, pp. 1047–1052, 2013. [6]. B. Han, “Zone-based virtual backbone formation in wireless ad hoc networks,” Ad Hoc Netw., vol. 7, no. 1, pp. 183–200, 2009. [7]. W. K. Chiang and R. J. Chen, “Distributed faulttolerant routing in Kautz networks,” in Proc. 3rd Workshop Future Trends Distrib. Comput. Syst., 1992, pp. 297–303. [8]. J. L. Gross and J. Yellen, Graph Theory and Its Applications. Boca Raton, FL, USA: CRC Press, 2006. [9]. C. P. Ravikumar, T. Rai, and V. Verma, “Kautz graphs as attractive logical topologies in multihoplightwavenetworks,”ElsevierSci.,vol.20,no.14,pp. 1259–1270,1997. [10]. J. A. Sanchez, P. M. Ruiz, and I. stojmenovic, “Energy-efficient geographic multicast routing for sensor and actuator networks,” Comput. Commun., Elsevier, vol. 30, no. 13, pp. 2519–2531, 2007. [11]. D. Guo, Y. Liu, and X. Ki, “Bake: A balanced kautz tree structure for peer-to-peer networks,” presented at the 27th IEEE Conf. Comput. Commun., Phoenix, AZ, USA, 2008. [12]. W. K. Chiang and R. J. Chen, “Distributed faulttolerant routing in kautz networks,” J. Parallel Distrib. Comput., vol. 20, pp. 99–106, 1994.[13] L. F. Akyildiz and I. H. Kasimoglu. “Wireless sensor and actor networks: research challenges” Ad hoc networks, 2(4):351–367, 2004. [14]. M.Dhivya, Ashok Kumar Potnuru, M.Sundarambal“Energy Efficient Routing Protocolfor Wireless Sensor Networks”. www.ieee.org Vol. 978-1- 61284-764-1/11/2011 IEEE. [15]. Fan Bai and Ahmed Helmy“A Survey of Mobility Models in Wireless Ad hoc Networks” -, University of Southern California, U.S.A-2010. [16]. Haiying Shen and Ze Li “A Kautz-based Wireless Sensor and Actuator Network for Real-Time, Fault-Tolerant and Energy-Efficient Transmission” – IEEE transaction on mobile computing, VOL 15, NO 1, January 2016. [17]. E. Ngai, M. R. Lyu, and J. Liu, “A real-time communication framework for wireless sensor-actuator networks,” presented at the IEEE Aerospace Conf., Big Sky, MT, USA, 2006. [18]. G. A. Shah, M. Bozyigit, O. B. Akan, and B. Baykal, “Real-time coordination and routing in wireless sensor and actor networks,” in Proc. 6th Int. Conf. Next Generation Teletraffic Wired/Wireless Adv. Netw., 2006, pp. 365–383. [19]. H. Shen, Z. Li, and K. Chen, “A scalable and mobility-resilient data search system for large-scale mobile wireless networks,” IEEE Parallel Distrib. Syst., vol. 25, no. 5, pp. 1124–1134, Jul. 2013. [20]. W. K. Chiang and R. J. Chen, “Distributed fault- tolerant routing in kautz networks,” J. Parallel Distributed. Computing.vol. 20, pp. 99–106, 1994.