SlideShare a Scribd company logo
1 of 9
Download to read offline
Scientific Journal Impact Factor (SJIF): 1.711
International Journal of Modern Trends in Engineering
and Research
www.ijmter.com
@IJMTER-2014, All rights Reserved 517
e-ISSN: 2349-9745
p-ISSN: 2393-8161
Performance Analysis of Fault Detection in Round Trip
Delay and Path Wireless Sensor Networks
P.SARANYA1
, Mrs. M.PARAMESWARI2
1
M.E Communication systems ,2
ASSISTANT PROFESSOR, DEPT OF ECE
Dhanalakshmi Srinivasan Engineering College,Perambalur
Abstract- In recent years, wsns detect to the fault sensor node based on round trip delay using path
in wireless sensor networks. Portable sensor node is low cost in Wsns . Measured in the round trip
delay time and number of sensor node. Existing method is used to large value of sensor node,
identification of sensor node time and distance . it is used to linear selection path, disadvantages are
data loss, more number of path, complexity. in this proposed method using distributed autonomous
sensor software implementation in NS2.it is detected fault sensor node and malfunction ,in this
analysis time and path using discrete Rtp. real time applicability in received signal strength ,separate
wavelength for end of the node avoid the data loss and complexity. Hardware implementation using
ZigBee and Microcontroller .Equal to the hardware and software implementation. It is overcomes to
the data loss. comparing the threshold and Rtd time. Finally, the algorithm is tested under different
number of faulty sensors in the same area. Our Simulation results demonstrate that the time
consumed to find out the faulty nodes in our proposed algorithm is relatively less with a large
number of faulty sensors existing in the network.
Index Terms— Faulty sensor node, round trip delay, round trip path, Wsns.
I. INTRODUCTION
The advanced in wireless communication technologies enabled large scale wireless sensor networks
(WSNs) deployment. Due to the feature of easy of deployment of sensor nodes, wireless sensor
networks (WSNs) have a vast range of applications such as monitoring environment, military,
medical, industrial and rescue missions . Wireless sensor network is composed of large number of
sensor nodes. The event is sensed by the low power sensor node deployed in neighborhood and the
sensed information is transmitted to a remote processing unit or base station ,To deliver crucial
information from the environment in real time it is impossible with wired sensor networks whereas
wireless sensor networks are used for data collection and processing in real time from environment .
The ambient conditions in the environment are measured by sensors and then measurements are
processed in order to assess the situation accurately in area around the sensors. Over a large
geographical area large numbers of sensor nodes are deployed for accurate monitoring. Due to the
limited radio range of the sensor nodes the increase in network size increases coverage of area but
data transmission i.e. communication to the base station (BS) is made possible with the help of
intermediate nodes. Depending on the different applications of wireless sensor networks they are
either deployed manually or randomly. After being deployed either in a manual or random fashion,
the sensor nodes self-organize themselves and start communication by sending the sensed data.
These sensor networks are deployed at a great pace in the current world. Access to wireless sensor
networks through internet is expected within 15 years. There is an interesting unlimited potential in
this wireless technology with various application areas along with crisis management, transportation,
military, medical, natural disaster, seismic sensing and environmental. In general the two types of
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 518
wireless sensor networks are: unstructured and structured. The structured wireless sensor networks
are those in which the sensor nodes deployment is in a planned manner whereas unstructured
wireless sensor networks are the one in which sensor nodes deployment is in an ad-hoc manner. As
there is no fixed infrastructure between wireless sensor networks for communication, routing
becomes an issue in large number of sensor nodes deployed along with other challenges of
manufacturing, design and management of these networks. There are different topologies that have
been proposed for these issues.in this sensor node identify failure and malfunction node. These two
categories which are infrastructure less and infrastructure based have their own cons and pros. In the
first category which is the infrastructure based networks, both voice and data with good quality of
service from source to destination is carried but infrastructure is required. In second category which
is infrastructure less networks have constraints with limitation in bandwidth, power and range.
A wide range of wireless sensor network applications are:
Underwater sensor networks that are used for monitoring of fisheries and coral reefs . as these
networks use equipment’s that are lighter, smaller and less power consumption. This application of
WSN has many challenges that include data collection, event detection, high data rates and sparse
deployment of nodes.
Other applications of WSN include:
 Outdoor/indoor monitoring of environment.
 Monitoring of health.
 Factory and process automation.
Structural Monitoring Machine Monitoring Process Monitoring
II. NETWORKING TOPOLOGIES
We can use several network topologies to coordinate the Wireless sensor network gateway, end
nodes, and router nodes. Router nodes are much similar to end nodes in that they can store
measurement data, but they also can be used to pass along measurement data from other nodes . The
first, and most basic topology, is the star topology, in which each node maintains a single, direct
communication link with the gateway. This topology is very simple but restricts the overall distance
that our network can achieve. To increase the distance that a network can cover, you could
implement a cluster, or tree, topology. In this more complex architecture scenario, each node still
uses only one communication path to the gateway but can use other nodes to route its information
along that path. This topology suffers from a typical problem, however. If a router node goes down,
all the nodes which depend on that router node also lose their communication links to the gateway.
The mesh network topology reduces this issue by extensively using redundant communication paths
to increase reliability of the system. In a mesh network, nodes maintain multiple communication
links back to the gateway, so that if a router node goes down or does not work properly, the network
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 519
automatically reroutes the data through a different sets of path. The mesh topology, although very
reliable, suffers from an wide increase in network latency because data must make multiples of hops
before successfully arriving at the gateway
II. PROPOSED METHOD
Figure :1
Changed topology and protocol .it is used to alternate path .in this paper result in number of nodes
and delay using round trip path. Coverage vs number of nodes avoid to the data loss .it is improved
the efficiency.
III. NODE SELECTION
Coverage is one of the most important issues in WSNs and it has been studied extensively in recent
years. In most cases, ―coverage‖ means area coverage. And K-coverage can be described as that
every point in the monitored field is covered by at least K sensors. In [16], the authors consider that
it is hard to guarantee full coverage for a given randomly deployment area, even if all sensors are on-
duty. Small sensing holes are not likely to influence the effectiveness of sensor networks and are
acceptable for most application scenarios. It’s enough to meet the application’s requirements if the
active nodes in the network could maintain reasonable area coverage—coverage expectation.
Coverage mechanism is to choose a subset of active nodes to maintain the coverage expectation. We
introduce into clusters the notion of ―intra-cluster coverage‖, which selects some active nodes within
clusters while maintaining coverage expectation of the cluster. Utilizing the idea proposed in our
research , cluster head randomly chooses m’ nodes according to equation
m m-i
Pcov=∑ C^I (r/R)^2i(1-r^2/R^2)
i=k
where P cover is the coverage expectation of sensing field determined by specific applications; and r
is sensing radius, R is cluster radius; m’ is the number of active nodes. For example, distributing 200
nodes in a 100×100m2 field, r = 12m, R = 30m, then the average number of cluster members is 60 or
so. With intra-cluster coverage, if P cover = 99% which means 99% of sensing field is expected to
bemonitored, 27 members should be active in each cluster to ensure 1-coverage of the cluster and
38members to ensure 2-coverage. If Pcover =95%, only 16 nodes and 25 nodes should be active to
ensure 1-coverage and 2-coverage respectively. Fig (2) circular topology used in this method any
one link fail or fault another link or path is using topology
S2sss2ssss
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 520
Figure: 2
Simulation Parameters
Parameters Value
Network Filed (0,0)~(100,100)
Node numbers 10~100
Sensing radius characterization
Sink position (50,200)
Initial energy 2 J
Data packet size 525 Bytes
Broadcast packet size 20 Bytes
Data Cycles per round(L) 5
IV. SIMULATION RESULT
The improved efficiency scheme will be applied in a real wireless sensor network system. It is
expensive to run schemes on the hardware of the system, so the feasibility and accuracy of the
schemes should be verified before being applied. Therefore, simulation becomes the best alternative
way of testing, evaluating and verifying. We programmed the data loss and improved efficiency
scheme using Visual NS2. We compared the change of fault detection accuracy of the RTD time
with varying node failure ratios for different average numbers of neighbor nodes. Hundred nodes are
randomly deployed in the network, as shown in
Figure:4.1 Number of sensor nodes using simulator
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 521
Figure :4.2 Round trip path
Figure:4.3 Num of path and delay
Figure:4.4 Nodes and delay
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 522
Figure :4.5 coverage and delay
Figure : 4.6 coverage and round trip path delay
For evaluation of the proposed method, we use two metrics; the delay and coverage. The delay is the
time duration in which all packets generated by all nodes reach the BS. The coverage is the average
rate of successful data delivery over the channel and it is measured in data packets per time slot. In
simulations, the WSN consists of 100 sensor nodes randomly distributed within a circular area with
radius of 100 units. The BS is located in the center of the circular area.
V.COMPARISON GRAPH
Figure : 5.1 nodes and delay
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 523
By applying the proposed method to WSNs, delay and coverage performances significantly
improved. The performance of the proposed method depends on the network topology. Compared to
the topologies with low and high 2 ratios, in the topologies with the medium 12 ratios, the percentage
of performance improvement in the proposed algorithm is more.
VI. CONCLUSION
For the node whose actual status is normal, if the number of nodes which is initially diagnosed as
possibly normal (RTD) in its neighbor nodes is less than half of the total neighbor nodes, the round
trip delay time node fault detection scheme will misdiagnose the normal node as faulty. Modification
is made to the detection criterion of and an improved efficiency scheme is proposed to address this
short coming. Simulation results show that the fault detection accuracy of the improved sensor node
out performs the for different average numbers of neighbor nodes and node failure ratios. It can also
be applied to wireless sensor networks where there are high neighbor nodes and the node failure ratio
is less.
Future Work for number of sensor nodes in this corresponding path.it will reduce detection time
and avoid data loss.
REFERENCES
[1] M. Lee and Y. Choi, ―Fault detection of wireless sensor networks,‖Comput. Commun., vol. 31, pp. 3469–3475, Jun.
2008.
[2] M. Asim, H. Mokhtar, and M. Merabti, ―A fault management architecture for wireless sensor network,‖ in Proc.
IWCMC, Aug. 2008, pp. 1–7.
[3] P. Jiang, ―A new method for node fault detection in wireless sensor networks,‖ Sensors, vol. 9, no. 2, pp. 1282–1294,
2009.
[4] S. S. Ahuja, R. Srinivasan, and M. Krunz, ―Single-link failure detection in all-optical networks using monitoring
cycles and paths,‖ IEEE/ACM Trans. Netw., vol. 17, no. 4, pp. 1080–1093, Aug. 2009
.[5] A. A. Boudhir, B. Mohamed, and B. A. Mohamed, ―New technique of wireless sensor networks localization based on
energy consumption,‖ Int. J. Comput. Appl., vol. 9, no. 12, pp. 25–28, Nov. 2010.
[6] I. Chen, A. P. Speer, and M. Eltoweissy, ―Adaptive fault tolerant QoS control algorithms for maximizing system
lifetime of query-based wireless sensor networks,‖ IEEE Trans. Dependable Secure Comput., vol. 8, no. 2, pp. 1–35,
Mar./Apr. 2011
[7] I. Chen, A. P. Speer, and M. Eltoweissy, ―Adaptive fault tolerant QoS control algorithms for maximizing system
lifetime of query-based wireless sensor networks,‖ IEEE Trans. Dependable Secure Comput., vol. 8, no. 2, pp. 1–35,
Mar./Apr. 2011
[8] I. Chen, A. P. Speer, and M. Eltoweissy, ―Adaptive fault tolerant QoS control algorithms for maximizing system
lifetime of query-based wireless sensor networks,‖ IEEE Trans. Dependable Secure Comput. vol. 8, no. 2, pp. 1–35,
Mar./Apr. 2011
.[9] R. N. Duche and N. P. Sarwade, ―Sensor node failure or malfunctioning detection in wireless sensor network,‖
ACEEE Int. J. Commun., vol. 3, no. 1, pp. 57–61, Mar. 2012.
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless Sensor Networks
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless Sensor Networks

More Related Content

What's hot

Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksrajatmal4
 
Hetrogenous wireless sensor network
Hetrogenous wireless sensor networkHetrogenous wireless sensor network
Hetrogenous wireless sensor networkChinmoy Jena
 
Scalability in wireless sensor networks
Scalability in wireless sensor networksScalability in wireless sensor networks
Scalability in wireless sensor networkssourabhshivtiwari
 
Wireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsWireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsmmjalbiaty
 
Optimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor NetworksOptimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor Networkspaperpublications3
 
Report on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORKReport on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORKNishant Bhardwaj
 
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...journalBEEI
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSNYara Ali
 
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...Vinayak Kulkarni
 
Comprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing ProtocolComprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing ProtocolIJRES Journal
 
De3211001104
De3211001104De3211001104
De3211001104IJMER
 
3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor NetworksIOSR Journals
 
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Onyebuchi nosiri
 
Data retrieval in sensor networks
Data retrieval in sensor networksData retrieval in sensor networks
Data retrieval in sensor networksAcad
 
ENERGY EFFICIENT MULTIHOP QUALITY PATH BASED DATA COLLECTION IN WIRELESS SENS...
ENERGY EFFICIENT MULTIHOP QUALITY PATH BASED DATA COLLECTION IN WIRELESS SENS...ENERGY EFFICIENT MULTIHOP QUALITY PATH BASED DATA COLLECTION IN WIRELESS SENS...
ENERGY EFFICIENT MULTIHOP QUALITY PATH BASED DATA COLLECTION IN WIRELESS SENS...Editor IJMTER
 

What's hot (20)

Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Hetrogenous wireless sensor network
Hetrogenous wireless sensor networkHetrogenous wireless sensor network
Hetrogenous wireless sensor network
 
Scalability in wireless sensor networks
Scalability in wireless sensor networksScalability in wireless sensor networks
Scalability in wireless sensor networks
 
Wireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsWireless sensor network lifetime constraints
Wireless sensor network lifetime constraints
 
Wsn by checkmate
Wsn by checkmateWsn by checkmate
Wsn by checkmate
 
Chapter
ChapterChapter
Chapter
 
wsn
wsnwsn
wsn
 
Optimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor NetworksOptimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor Networks
 
Report on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORKReport on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORK
 
WSN presentation
WSN presentationWSN presentation
WSN presentation
 
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
 
Wsn ppt original
Wsn ppt originalWsn ppt original
Wsn ppt original
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSN
 
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
 
Comprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing ProtocolComprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing Protocol
 
De3211001104
De3211001104De3211001104
De3211001104
 
3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks
 
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
 
Data retrieval in sensor networks
Data retrieval in sensor networksData retrieval in sensor networks
Data retrieval in sensor networks
 
ENERGY EFFICIENT MULTIHOP QUALITY PATH BASED DATA COLLECTION IN WIRELESS SENS...
ENERGY EFFICIENT MULTIHOP QUALITY PATH BASED DATA COLLECTION IN WIRELESS SENS...ENERGY EFFICIENT MULTIHOP QUALITY PATH BASED DATA COLLECTION IN WIRELESS SENS...
ENERGY EFFICIENT MULTIHOP QUALITY PATH BASED DATA COLLECTION IN WIRELESS SENS...
 

Similar to Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless Sensor Networks

An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...IRJET Journal
 
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor NetworkIRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor NetworkIRJET Journal
 
A Comparative Performance Analysis of Centralized and Distributed Hierarchica...
A Comparative Performance Analysis of Centralized and Distributed Hierarchica...A Comparative Performance Analysis of Centralized and Distributed Hierarchica...
A Comparative Performance Analysis of Centralized and Distributed Hierarchica...IRJET Journal
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)theijes
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...IJEEE
 
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKCODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKIJNSA Journal
 
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...IRJET Journal
 
Energetic Slot Allotment for Improving Interchange in Wireless Sensor Network
Energetic Slot Allotment for Improving Interchange in Wireless Sensor NetworkEnergetic Slot Allotment for Improving Interchange in Wireless Sensor Network
Energetic Slot Allotment for Improving Interchange in Wireless Sensor NetworkIRJET Journal
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor NetworkIRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor NetworkIRJET Journal
 
A Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkCassie Romero
 
Grid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing ProtocolGrid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing Protocolijtsrd
 
A Review Paper on Energy Capable Routing in Wireless Sensor Network
A Review Paper on Energy Capable Routing in Wireless Sensor NetworkA Review Paper on Energy Capable Routing in Wireless Sensor Network
A Review Paper on Energy Capable Routing in Wireless Sensor Networkijtsrd
 
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...IRJET Journal
 
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...IJEEE
 
International journal of computer science and innovation vol 2015-n1-paper5
International journal of computer science and innovation  vol 2015-n1-paper5International journal of computer science and innovation  vol 2015-n1-paper5
International journal of computer science and innovation vol 2015-n1-paper5sophiabelthome
 

Similar to Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless Sensor Networks (20)

An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
 
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor NetworkIRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
 
A Comparative Performance Analysis of Centralized and Distributed Hierarchica...
A Comparative Performance Analysis of Centralized and Distributed Hierarchica...A Comparative Performance Analysis of Centralized and Distributed Hierarchica...
A Comparative Performance Analysis of Centralized and Distributed Hierarchica...
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
 
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKCODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
 
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
 
Energetic Slot Allotment for Improving Interchange in Wireless Sensor Network
Energetic Slot Allotment for Improving Interchange in Wireless Sensor NetworkEnergetic Slot Allotment for Improving Interchange in Wireless Sensor Network
Energetic Slot Allotment for Improving Interchange in Wireless Sensor Network
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor NetworkIRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
 
A Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor Network
 
Grid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing ProtocolGrid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing Protocol
 
A Review Paper on Energy Capable Routing in Wireless Sensor Network
A Review Paper on Energy Capable Routing in Wireless Sensor NetworkA Review Paper on Energy Capable Routing in Wireless Sensor Network
A Review Paper on Energy Capable Routing in Wireless Sensor Network
 
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
 
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
 
0512ijdps26
0512ijdps260512ijdps26
0512ijdps26
 
L046027479
L046027479L046027479
L046027479
 
International journal of computer science and innovation vol 2015-n1-paper5
International journal of computer science and innovation  vol 2015-n1-paper5International journal of computer science and innovation  vol 2015-n1-paper5
International journal of computer science and innovation vol 2015-n1-paper5
 
Oj3425062509
Oj3425062509Oj3425062509
Oj3425062509
 

More from Editor IJMTER

A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIPA NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIPEditor IJMTER
 
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...Editor IJMTER
 
Analysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentAnalysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentEditor IJMTER
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationEditor IJMTER
 
Aging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetAging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetEditor IJMTER
 
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...Editor IJMTER
 
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESA CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESEditor IJMTER
 
Sustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialSustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialEditor IJMTER
 
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTUSE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTEditor IJMTER
 
Textual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisTextual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisEditor IJMTER
 
Testing of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsTesting of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsEditor IJMTER
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection TechniquesEditor IJMTER
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICEEditor IJMTER
 
SURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSSURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSEditor IJMTER
 
Survey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkSurvey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkEditor IJMTER
 
Step up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveStep up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveEditor IJMTER
 
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONSPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONEditor IJMTER
 
Software Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeSoftware Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeEditor IJMTER
 
Software Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisSoftware Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisEditor IJMTER
 
Software Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeSoftware Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeEditor IJMTER
 

More from Editor IJMTER (20)

A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIPA NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
 
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
 
Analysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentAnalysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX Environment
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-Duplication
 
Aging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetAging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the Internet
 
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
 
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESA CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
 
Sustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialSustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building Material
 
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTUSE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
 
Textual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisTextual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative Analysis
 
Testing of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsTesting of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different Processors
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection Techniques
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
 
SURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSSURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODS
 
Survey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkSurvey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor Network
 
Step up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveStep up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor Drive
 
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONSPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
 
Software Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeSoftware Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing Scheme
 
Software Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisSoftware Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global Analysis
 
Software Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeSoftware Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking Scheme
 

Recently uploaded

Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 

Recently uploaded (20)

★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 

Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless Sensor Networks

  • 1. Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com @IJMTER-2014, All rights Reserved 517 e-ISSN: 2349-9745 p-ISSN: 2393-8161 Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless Sensor Networks P.SARANYA1 , Mrs. M.PARAMESWARI2 1 M.E Communication systems ,2 ASSISTANT PROFESSOR, DEPT OF ECE Dhanalakshmi Srinivasan Engineering College,Perambalur Abstract- In recent years, wsns detect to the fault sensor node based on round trip delay using path in wireless sensor networks. Portable sensor node is low cost in Wsns . Measured in the round trip delay time and number of sensor node. Existing method is used to large value of sensor node, identification of sensor node time and distance . it is used to linear selection path, disadvantages are data loss, more number of path, complexity. in this proposed method using distributed autonomous sensor software implementation in NS2.it is detected fault sensor node and malfunction ,in this analysis time and path using discrete Rtp. real time applicability in received signal strength ,separate wavelength for end of the node avoid the data loss and complexity. Hardware implementation using ZigBee and Microcontroller .Equal to the hardware and software implementation. It is overcomes to the data loss. comparing the threshold and Rtd time. Finally, the algorithm is tested under different number of faulty sensors in the same area. Our Simulation results demonstrate that the time consumed to find out the faulty nodes in our proposed algorithm is relatively less with a large number of faulty sensors existing in the network. Index Terms— Faulty sensor node, round trip delay, round trip path, Wsns. I. INTRODUCTION The advanced in wireless communication technologies enabled large scale wireless sensor networks (WSNs) deployment. Due to the feature of easy of deployment of sensor nodes, wireless sensor networks (WSNs) have a vast range of applications such as monitoring environment, military, medical, industrial and rescue missions . Wireless sensor network is composed of large number of sensor nodes. The event is sensed by the low power sensor node deployed in neighborhood and the sensed information is transmitted to a remote processing unit or base station ,To deliver crucial information from the environment in real time it is impossible with wired sensor networks whereas wireless sensor networks are used for data collection and processing in real time from environment . The ambient conditions in the environment are measured by sensors and then measurements are processed in order to assess the situation accurately in area around the sensors. Over a large geographical area large numbers of sensor nodes are deployed for accurate monitoring. Due to the limited radio range of the sensor nodes the increase in network size increases coverage of area but data transmission i.e. communication to the base station (BS) is made possible with the help of intermediate nodes. Depending on the different applications of wireless sensor networks they are either deployed manually or randomly. After being deployed either in a manual or random fashion, the sensor nodes self-organize themselves and start communication by sending the sensed data. These sensor networks are deployed at a great pace in the current world. Access to wireless sensor networks through internet is expected within 15 years. There is an interesting unlimited potential in this wireless technology with various application areas along with crisis management, transportation, military, medical, natural disaster, seismic sensing and environmental. In general the two types of
  • 2. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 518 wireless sensor networks are: unstructured and structured. The structured wireless sensor networks are those in which the sensor nodes deployment is in a planned manner whereas unstructured wireless sensor networks are the one in which sensor nodes deployment is in an ad-hoc manner. As there is no fixed infrastructure between wireless sensor networks for communication, routing becomes an issue in large number of sensor nodes deployed along with other challenges of manufacturing, design and management of these networks. There are different topologies that have been proposed for these issues.in this sensor node identify failure and malfunction node. These two categories which are infrastructure less and infrastructure based have their own cons and pros. In the first category which is the infrastructure based networks, both voice and data with good quality of service from source to destination is carried but infrastructure is required. In second category which is infrastructure less networks have constraints with limitation in bandwidth, power and range. A wide range of wireless sensor network applications are: Underwater sensor networks that are used for monitoring of fisheries and coral reefs . as these networks use equipment’s that are lighter, smaller and less power consumption. This application of WSN has many challenges that include data collection, event detection, high data rates and sparse deployment of nodes. Other applications of WSN include:  Outdoor/indoor monitoring of environment.  Monitoring of health.  Factory and process automation. Structural Monitoring Machine Monitoring Process Monitoring II. NETWORKING TOPOLOGIES We can use several network topologies to coordinate the Wireless sensor network gateway, end nodes, and router nodes. Router nodes are much similar to end nodes in that they can store measurement data, but they also can be used to pass along measurement data from other nodes . The first, and most basic topology, is the star topology, in which each node maintains a single, direct communication link with the gateway. This topology is very simple but restricts the overall distance that our network can achieve. To increase the distance that a network can cover, you could implement a cluster, or tree, topology. In this more complex architecture scenario, each node still uses only one communication path to the gateway but can use other nodes to route its information along that path. This topology suffers from a typical problem, however. If a router node goes down, all the nodes which depend on that router node also lose their communication links to the gateway. The mesh network topology reduces this issue by extensively using redundant communication paths to increase reliability of the system. In a mesh network, nodes maintain multiple communication links back to the gateway, so that if a router node goes down or does not work properly, the network
  • 3. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 519 automatically reroutes the data through a different sets of path. The mesh topology, although very reliable, suffers from an wide increase in network latency because data must make multiples of hops before successfully arriving at the gateway II. PROPOSED METHOD Figure :1 Changed topology and protocol .it is used to alternate path .in this paper result in number of nodes and delay using round trip path. Coverage vs number of nodes avoid to the data loss .it is improved the efficiency. III. NODE SELECTION Coverage is one of the most important issues in WSNs and it has been studied extensively in recent years. In most cases, ―coverage‖ means area coverage. And K-coverage can be described as that every point in the monitored field is covered by at least K sensors. In [16], the authors consider that it is hard to guarantee full coverage for a given randomly deployment area, even if all sensors are on- duty. Small sensing holes are not likely to influence the effectiveness of sensor networks and are acceptable for most application scenarios. It’s enough to meet the application’s requirements if the active nodes in the network could maintain reasonable area coverage—coverage expectation. Coverage mechanism is to choose a subset of active nodes to maintain the coverage expectation. We introduce into clusters the notion of ―intra-cluster coverage‖, which selects some active nodes within clusters while maintaining coverage expectation of the cluster. Utilizing the idea proposed in our research , cluster head randomly chooses m’ nodes according to equation m m-i Pcov=∑ C^I (r/R)^2i(1-r^2/R^2) i=k where P cover is the coverage expectation of sensing field determined by specific applications; and r is sensing radius, R is cluster radius; m’ is the number of active nodes. For example, distributing 200 nodes in a 100×100m2 field, r = 12m, R = 30m, then the average number of cluster members is 60 or so. With intra-cluster coverage, if P cover = 99% which means 99% of sensing field is expected to bemonitored, 27 members should be active in each cluster to ensure 1-coverage of the cluster and 38members to ensure 2-coverage. If Pcover =95%, only 16 nodes and 25 nodes should be active to ensure 1-coverage and 2-coverage respectively. Fig (2) circular topology used in this method any one link fail or fault another link or path is using topology S2sss2ssss
  • 4. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 520 Figure: 2 Simulation Parameters Parameters Value Network Filed (0,0)~(100,100) Node numbers 10~100 Sensing radius characterization Sink position (50,200) Initial energy 2 J Data packet size 525 Bytes Broadcast packet size 20 Bytes Data Cycles per round(L) 5 IV. SIMULATION RESULT The improved efficiency scheme will be applied in a real wireless sensor network system. It is expensive to run schemes on the hardware of the system, so the feasibility and accuracy of the schemes should be verified before being applied. Therefore, simulation becomes the best alternative way of testing, evaluating and verifying. We programmed the data loss and improved efficiency scheme using Visual NS2. We compared the change of fault detection accuracy of the RTD time with varying node failure ratios for different average numbers of neighbor nodes. Hundred nodes are randomly deployed in the network, as shown in Figure:4.1 Number of sensor nodes using simulator
  • 5. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 521 Figure :4.2 Round trip path Figure:4.3 Num of path and delay Figure:4.4 Nodes and delay
  • 6. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 522 Figure :4.5 coverage and delay Figure : 4.6 coverage and round trip path delay For evaluation of the proposed method, we use two metrics; the delay and coverage. The delay is the time duration in which all packets generated by all nodes reach the BS. The coverage is the average rate of successful data delivery over the channel and it is measured in data packets per time slot. In simulations, the WSN consists of 100 sensor nodes randomly distributed within a circular area with radius of 100 units. The BS is located in the center of the circular area. V.COMPARISON GRAPH Figure : 5.1 nodes and delay
  • 7. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 523 By applying the proposed method to WSNs, delay and coverage performances significantly improved. The performance of the proposed method depends on the network topology. Compared to the topologies with low and high 2 ratios, in the topologies with the medium 12 ratios, the percentage of performance improvement in the proposed algorithm is more. VI. CONCLUSION For the node whose actual status is normal, if the number of nodes which is initially diagnosed as possibly normal (RTD) in its neighbor nodes is less than half of the total neighbor nodes, the round trip delay time node fault detection scheme will misdiagnose the normal node as faulty. Modification is made to the detection criterion of and an improved efficiency scheme is proposed to address this short coming. Simulation results show that the fault detection accuracy of the improved sensor node out performs the for different average numbers of neighbor nodes and node failure ratios. It can also be applied to wireless sensor networks where there are high neighbor nodes and the node failure ratio is less. Future Work for number of sensor nodes in this corresponding path.it will reduce detection time and avoid data loss. REFERENCES [1] M. Lee and Y. Choi, ―Fault detection of wireless sensor networks,‖Comput. Commun., vol. 31, pp. 3469–3475, Jun. 2008. [2] M. Asim, H. Mokhtar, and M. Merabti, ―A fault management architecture for wireless sensor network,‖ in Proc. IWCMC, Aug. 2008, pp. 1–7. [3] P. Jiang, ―A new method for node fault detection in wireless sensor networks,‖ Sensors, vol. 9, no. 2, pp. 1282–1294, 2009. [4] S. S. Ahuja, R. Srinivasan, and M. Krunz, ―Single-link failure detection in all-optical networks using monitoring cycles and paths,‖ IEEE/ACM Trans. Netw., vol. 17, no. 4, pp. 1080–1093, Aug. 2009 .[5] A. A. Boudhir, B. Mohamed, and B. A. Mohamed, ―New technique of wireless sensor networks localization based on energy consumption,‖ Int. J. Comput. Appl., vol. 9, no. 12, pp. 25–28, Nov. 2010. [6] I. Chen, A. P. Speer, and M. Eltoweissy, ―Adaptive fault tolerant QoS control algorithms for maximizing system lifetime of query-based wireless sensor networks,‖ IEEE Trans. Dependable Secure Comput., vol. 8, no. 2, pp. 1–35, Mar./Apr. 2011 [7] I. Chen, A. P. Speer, and M. Eltoweissy, ―Adaptive fault tolerant QoS control algorithms for maximizing system lifetime of query-based wireless sensor networks,‖ IEEE Trans. Dependable Secure Comput., vol. 8, no. 2, pp. 1–35, Mar./Apr. 2011 [8] I. Chen, A. P. Speer, and M. Eltoweissy, ―Adaptive fault tolerant QoS control algorithms for maximizing system lifetime of query-based wireless sensor networks,‖ IEEE Trans. Dependable Secure Comput. vol. 8, no. 2, pp. 1–35, Mar./Apr. 2011 .[9] R. N. Duche and N. P. Sarwade, ―Sensor node failure or malfunctioning detection in wireless sensor network,‖ ACEEE Int. J. Commun., vol. 3, no. 1, pp. 57–61, Mar. 2012.