SlideShare a Scribd company logo
1 of 8
Download to read offline
International Journal of Advances in Applied Sciences (IJAAS)
Vol. 7, No. 2, June 2018, pp. 135~142
ISSN: 2252-8814, DOI: 10.11591/ijaas.v7.i2.pp135-142  135
Journal homepage: http://iaescore.com/online/index.php/IJAAS
Building Fault Tolerance Within Wsn-A Topology Model
M. Sai Rama Krishna, Ch. Jnana Gayathri, K. Laxmi Pallavi Rao
Department of Electronics and Computer Engineering, K.L University, Vijayawada, India.
Article Info ABSTRACT
Article history:
Received Dec 14, 2018
Revised Apr 21, 2018
Accepted May 17, 2018
Wireless Sensor network plays a crucial role which helps in visualizing,
processing, and analyzing the information wirelessly. WSN is a network
which consists of huge amount of sensor devices which are of low cost and
low powered also known as sensor nodes. These type of networks are
generally used in real time applications such as monitoring of environmental
conditions, militaries, industries etc., .but the problem that exists in WSN is
may be due to different failures such as node failure, link failure, sink failure,
interference, power dissipation and collision. If these faults are unable to
handle then the desired network criteria’s may not be reached properly which
results in inefficiency of the network. So, the main idea behind the
investigation is to form a different networking topology which works in the
event of failure
Keyword:
Fault Tolerance
Topology
Wireless Sensor Network
Copyright Š 2018 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
M. Sai Rama Krishna,
Department of Electronics and Computer Engineering,
K.L University, Vijayawada, India.
Email: drmramakrishnaa@gmail.com
1. INTRODUCTION
Wireless Sensor Networks (WSNs) play a noteworthy part in present day innovation which acts as a
bridge between the physical and virtual worlds. These sensors are small with restricted processing and
computing resources which are inexpensive and helps in sensing, processing, and aggregating the
information from the environment, based on the requirement they can transmit the sensed data. A Wireless
Sensor Network is a self-designing network of little sensor nodes which helps in conveying among them
utilizing radio signals, deployed in quantity to detect, monitor and understand the physical world. In general a
network consists of huge components which are to be inter-conceded for remote sensing and transmitting
information of data to the server which is located far away and receiving data from the server an depending
on that the local environmental conditions will be controlled. WSN’s even work in crucial environments
which are subjected to different failures by several layers in a framework. Suppose if a node which should
transmit data is in a failure condition then all the other nodes will be waiting for the data to get received.
WSN must be free from faults. The network must be recovered from the fault as soon as possible when the
fault occurs. A WSN can be made to be operating under normal conditions even when a fault occurs by
implementing fault recovery techniques. Faults can happen within WSN involving many components of the
network. Different fault tolerance techniques when introduced into the system make the WSN more reliable.
Replication has been one of the major concepts that have been implemented over the time for making the
WSN fault tolerant. The Quality of WSN may suffer due to the introduction of redundancy within the
wireless networks. A typical wireless sensor network is shown in Figure 1.
WSN Node: A WSN node, otherwise called a bit. It is a node in a sensor system that is supplied for
performing some handling, gathering actual data and speaking with other associated nodes in the system.
 ISSN: 2252-8814
IJAAS Vol. 7, No. 2, June 2018: 135 – 142
136
Figure 1. Typical WSN
Base station: The base station should perform computations; higher memory is required and is
frequently associated with better continuity source than batteries. One can look at the base station as an area
point to the WSN where the base station's fundamental target is to collect distinguished data strength nodes in
WSN. The main role of base station is to transfer the received data from nodes to the server.
Application server: Development and implementation of different applications which are related to
real time applications needs the use of Wireless Sensor Networks (WSN). The unique feature of these
applications is to use WSN to collect and process the information continuously
1.1. Characteristics of Wireless Senor Networks
WSN are characterized by many intricate issues which all have a bearing on its fault tolerance. Each
of the characteristics must be taken into account and analyzed to understand the effect of the same on its
behavior when any of the fault occurs. Some of the features that affect the fault tolerance behavior are as
shown below:
a. Ability to adapt to hub disappointment
b. Some portability of hubs
c. Heterogeneity of hubs
d. Adaptability to huge size of sending
e. Ability to withstand severe environmental conditions
f. Ease of utilization
g. Cross-layer plan
1.2. The need for building fault tolerance within WSN Networks
WSN are being used for many critical and mission critical systems, failure of which may sometimes
leads to disastrous situations and WSN lead to great losses in many forms. WSNs are being used for many
purposes which aircraft management, Vegetation, whether forecasting, Traffic management and control etc.
WSN are being used extensively for real life and real time data acquisition. The WSN networks are delicate
as the networks are established using tiny and fragile devices and generally quite prone for failures.
Therefore it is necessary that WSN are built considering the failures of the devices used for networking. It is
necessary to build as much fault tolerance as possible into WSN so that the networks can be made to work as
much reliably as possible.
1.3. Problem definition
There are various techniques exhibited in the realated work for increasing the fault tolerance of the
WSN network and none of the strategies presented have presented verifiability of the fault tolerance levels of
the WSN network. The problem is to discover the procedures, techniques and mechanisms utilizing which
the WSN can be made to be fault tolerant and verifiable. In this paper two techniques have been proposed
using which fault tolerance levels can be computed. The fault tolerance processed by both the methods
provides for verifiability of the Reliability of the WSN networks.
2. RELATED WORK
WSN are small devices, low cost, limited memory, low power, and low power consumption devices.
The main aim of the sensor networks is to provide reliability, maintainability, availability [1]. In general
there will be faults which may occur due to various factors such as node fault, sink fault, network faults.
Sushruta Mishra et, al., have expressed that WSN can be subjected to many faults and also provided an
overview on various fault detection and recovery systems which helps in continuing the operation normally
IJAAS ISSN: 2252-8814 
Building Fault Tolerance Within Wsn-a Topology Model (M. Sai Rama Krishna)
137
in the event of some system component failures. The two methods used for fault recovery are Active
replication in which all or many nodes perform same functionality. If any node fails then also receiver will
get results from other nodes and the Passive replication involves Primary replica receiving all requests and
process them accordingly. Samira [2] described about routing solutions for fault tolerant which includes re-
transmission, in which the source node sends their data over an developed path, and if this path fails to
forward the data then the source again retransmits those data through different path. The second technique is
the data replication which sends different copies of the same data over multiple paths. Small scale sensor
networks which comprises of huge amount of sensors deployed over a small area which is based on Energy
and flow management in small scale WSN, Data management in small scale sensor networks and Coverage
along with connectivity in small scale networks while considering the Large Scale wireless sensor networks
(LS WSNs) which comprises of thousands of sensors are also based on various objectives of Energy and flow
management. C AHilaet [3] have presented automatic path recovery and efficient routing algorithms to make
the WSN fault tolerant. Fault tolerant multipath routing scheme for energy efficient wireless sensor network
(FTMRS) is based on multipath data routing scheme in which one of the shortest path is used for main data
routing and in the other two backup paths are used as alternative path for faulty network and to handle the
overloaded traffic on main channel. Manasvi [4] explained that wireless devices are battery powered for
maintaining protocols in an efficient manner. Flooding is a technique which continues until the destination
node is reached which results in impulsion or overlap. When same region is sensed by two sensors and the
sensed data is broadcasted at the same time, the neighbors will receive the duplicated packets which are
overcome by gossiping. In gossiping when a packet is received, a sensor would select one of its neighbors
randomly and send the packets to neighbor. This process continues until all sensors receive this packet but
there is a delay problem if the no of nodes get increased. Ting Yuan [5] presented the securing of the data
through introducing fault tolerance within WSN. The position of aggregating and forwarding the information
is known as sink. A node can't be each a sink and a source due to the fact this will substantially dissipate the
constrained power and security strength is a key management scheme, tamper-resistant hardware is still
economically mistaken to be applied in low-fee sensor nodes, making node capture even more appealing to
put into effect.
3. EXISTING WIRELESS SENSOR NETWORKS
A Wireless Sensor network is mainly used for continuous monitoring and processing the
information, in general there are so many existing WSN in which one of the applications is detailed in
Figure 2 which sprinkling of water and pesticide for turmeric plantation depending on the range of humidity
existence. After sensor sensing the existing humidity value then it initializes the sprinkling of water if it is
below the predefined. The entire data including date, time, humidity range, latitude and longitude, water
pumped are sent using base stations via internet to the main server. The data will be analyzed and if any
specific instructions required will be sent to the formers through SMS messages and the entire data received
will be stored at the main server. Connectivity of the main server and the base station is achieved through a
cable connection or using a combination of Wi-Fi/Cellular interface.
Figure 2. Existing WSN
 ISSN: 2252-8814
IJAAS Vol. 7, No. 2, June 2018: 135 – 142
138
3.1. Tree Topology
The investigation presented in this paper shows how the reliability of a WSN can be enhanced based
on networking topology. To start with Fault tree for the existing WSN is developed and overall fault rate is
computed. The fault tree diagram for the existing WSN is shown in Figure 3.
Figure 3. Tree topology in NS2
By developing these type of tree topology will result in high packet loss, low throughput, high delay
etc., so in order to avoid these type of faults while transferring data we are opting another topology known as
butterfly topology which is having multiple number of inputs and outputs which will help in transferring
information in any path.
4. IMPLEMENTING BUTTER-FLY TOPOLOGY WITHIN WIRELESS NETWORKS
It is possible that the failure rate of the network can be reduced by implementing different
topologies than the tree topology used for the sample WSN. Multi-stage networks are commonly used to
connect a set of inputs to a set of outputs; the concept as such is similar to cloud computing. The connectivity
is established through links between computing and switching systems. These networks use 2 X 2 switches.
Each switch takes two inputs and produces 2 outputs via different connections (Straight, cross, upper
broadcast and the lower broadcast. A butter fly network is a multi-stage networks. Number of stages used
depends on the kind of connectivity required.
A butterfly topology which uses 4 stage networks has been considered and the same is fitted into a
WSN network. A switch box in stage “I” is connected with the links that are at a distance of 2i
apart. The 4 X
4 butterfly network is achieved through two 2 X 2 networks.
The probability that one of the paths exists for connecting to a WSN node can be computed as
Ac = 2k ρl
ÎŚ(k) (1)
where k = Number of stages, ρ = probability that a node fails and Ό(k) is the probability that that a switch
box in the stage K can fail. ÎŚ(k) can be computed using the equation (2).
Φ(k) = 1 – ( 1- ρl Φ(k-1)2
(2)
The butterfly network connected for fitting the sample WSN has been shown in Figure 4. The butter
fly network has been established using 4 X 4 network containing 4 stages. The 4 X 4 network has become
necessary due to the availability of 8 elementary levels of inputs and 4 different types of outputs required to
make the network reliable and available.
IJAAS ISSN: 2252-8814 
Building Fault Tolerance Within Wsn-a Topology Model (M. Sai Rama Krishna)
139
Figure 4. Sample butterfly network
Using the equation (1) and equation (2) the probability of success that at least one path exists from
input point to an output has been computed as 0.81.
From the Figure 5 it can be seen that 6 extra switches have been included into WSN network to
make more fault free.
Figure 5. Modified WSN network-Butterfly topology-Hierarchical model
We developed a butterfly network in NS2 where we are obtaining High throughput, delay in
transferring packet is less and packet delivery ratio is high which is shown in Figure 6.
 ISSN: 2252-8814
IJAAS Vol. 7, No. 2, June 2018: 135 – 142
140
Figure 6. Butterfly network in NS2
5. SOFTWARE PLATFORM
5.1. Network simulator2 (NS2)
The scenario of assay of the system in the digital era is primly based on the simulation, the
simulation which exemplifies the system design model illustrates the system functioning and its
accompanying output. Simulation exhibits the comprehensive way of designing the system and the way its
operating desired to its objective which facilitates the user with the concept of learn by doing. The
accomplishment of the simulation is analogous to a child behaviour. The approach to the simulation is the
way of intercommunications between many entities and which depicts in the desired outcome.
5.2. Importance of NS2
There are prevalent Varian’s in the era of network simulators and in which some of the sequel are
ns-1, ns-2, ns-3. The network simulator has their own significance in all aspects of domains, but in the era of
teaching and research it is predominant and all of the versions are employed as prime simulators for the
computer technology. In the networking domain the Network simulators is a diverse simulator exhibiting a
significant outcome.
5.3. NS2 Installations and Setup
a. Install Ubuntu 12.04
b. Download NS-2.35 (http://sourceforge.net/projects/nsnam/files/allinone/ns-allinone-2.35/ns-allinone-
2.35.tar.gz/download)
c. Unzip or untar it to any folder (recommended is /home/loginname) using the following commands one by
one
sudo apt-get update
d. Using cd command go into appropriate folder, where the .gz file exists, and then execute below
commands
tar zxvf ns-allinone-2.35.tar.gz
sudo apt-get install build-essential autoconf automake libxmu-dev
cd ns-allinone-2.35
./install
e. Once installed the PATH information will be provided to you. So dont close the terminal after installation
complete, because you dont get path again.)
You will see some configuration in some last lines of completed installation as shown below.
Please put /home/Vertexsoft/Desktop/NS-Installation/ns-allinone- 2.35/bin:/home/Vertexsoft/Desktop/NS-
Installation/ns-allinone-2.35/tcl8.5.10/unix:/home/Vertexsoft/Desktop/NS-Installation/ns-allinone-
2.35/tk8.5.10/unix
5.4 Developing a Networking topology in NS2
Using the existing application specific WSN and separately considering the modified hierarchy
method named butterfly approach, the following results are obtained which adopt the features of both
technologies individually to produce efficient results as shown below. The nodes in this simulation results are
same as above mentioned approaches and the remaining are considered as sensor nodes for effective
functioning.
IJAAS ISSN: 2252-8814 
Building Fault Tolerance Within Wsn-a Topology Model (M. Sai Rama Krishna)
141
The data from nodes to server is reached by adopting the shortest, so that effective time in
performing the computation is maintained. But in simulation, there will not be any sign of failure of virtual
nodes. But in practical approach, there may be chance of occurrence of any failure .to verify the functioning
of proposed method a fault condition is introduced at time 4minutes near tower.at this situation, the data
packets move by selecting another approach leaving the failure tower node.
6. SIMULATION RESULTS
The butterfly method is the best approach witch delivers appreciate results when compared to pilot
network in case of any model. The following Figure 7 specifies the end to end delay in Ns2 simulation region
indicating time on x-axis and delay on y-axis.
Figure 7. End to end delay
The throughput is essential parameter which specifies the performance of any model. If the
throughput of any approach is high, then it is more efficient approach. The average throughput obtained by
using butterfly approach is very high unlike pilot approach is given in Figure 8
Figure 8. Average throughput
The packet delivery rate indicates the functioning of a method. If the delivery rate is very high, it
indicates the poor packet loss. The following Figure 9. indicates the packet delivery rate adopted by butterfly
technique is very high when compared to previous pilot approaches.
 ISSN: 2252-8814
IJAAS Vol. 7, No. 2, June 2018: 135 – 142
142
Figure 9. Packet loss
The maximum numbers of packets are delivered in butterfly topology and minimum packets are
delivered in pilot sensor networks. The following displays the packet delivery ration in Figure 10.
Figure 10. Packet delivery Ratio
7. CONCLUSION
Fault tolerance within a WSN can be enhanced by way of adding redundancy at network level
requiring networking gadgets such as switches, bridges and gateways. The devices within the network when
connected using the butterfly like topology will enhance the reliability of WSN networks. Fault tolerance as
such can be included by way of creating as many paths as possible from a WSN node. In the case of butterfly
topology 3 paths are created from each of the node as 2X2 switches are used to switch the output from one
device to other.
REFERENCES
[1] Sushruta Mishra, Lambodar Jena, Aarti Pradhan “Fault Tolerance in Wireless Sensor Networks”, International
Journal of Advanced Research in Computer Science and Software Engineering, ISSN: 2277 128X, Volume 2,
Issue 10.
[2] C.Ahila Jerlin, N.Rajkamal “Fault Tolerance in wireless sensor Networks”, International Journal of Innovative
Research in Advanced Engineering (IJIRAE), ISSN: 2349-2163, Volume 2, Issue 2.
[3] Manasvi Mannan, Shashi B. Rana “Fault Tolerance in wireless sensor network”, International Journal of Current
Engineering and Technology, E-ISSN 2277 – 4106, P-ISSN 2347 – 5161
[4] SamiraChouikhi, InèsElKorbi, YacineGhamri-Doudane, LeilaAzouzSaidane “A survey on Fault Tolerance in small
and large scale wireless sensor networks” National School of Computer Science,
CRISTALLab,UniversityofManouba, Computer Communications 69 (2015) 22–37
[5] Ting Yuan, Shiyong Zhang “Secure Fault Tolerance in Wireless Sensor Networks” IEEE 8th International
Conference on Computer and Information Technology Workshops, 978-0-7695-3242-4/08 $25.00 Š 2008 IEEE
DOI 10.1109/CIT.

More Related Content

What's hot

Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networksRushin Shah
 
An algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor networkAn algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor networkeSAT Publishing House
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor NetworkGanesh Khadsan
 
A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...
A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...
A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...IRJET Journal
 
Architecture 4 Wireless Sensor Networks
Architecture 4 Wireless Sensor NetworksArchitecture 4 Wireless Sensor Networks
Architecture 4 Wireless Sensor NetworksIvano Malavolta
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkIJMTST Journal
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKTejas Wasule
 
Wireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol pptWireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol pptsofiakhatoon
 
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET Journal
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar pptEisha Madhwal
 
Hetrogenous wireless sensor network
Hetrogenous wireless sensor networkHetrogenous wireless sensor network
Hetrogenous wireless sensor networkChinmoy Jena
 
Fault Node Recovery Algorithm for a Wireless Sensor Network
Fault Node Recovery Algorithm for a Wireless Sensor NetworkFault Node Recovery Algorithm for a Wireless Sensor Network
Fault Node Recovery Algorithm for a Wireless Sensor NetworkYogesh Vk
 
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...Vinayak Kulkarni
 
Energy Consumption in chain based routing protocol in wireless sensor network
Energy Consumption in chain based routing protocol in wireless sensor networkEnergy Consumption in chain based routing protocol in wireless sensor network
Energy Consumption in chain based routing protocol in wireless sensor networkBADALKUMAR56
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsnElham Hormozi
 
Scalability in wireless sensor networks
Scalability in wireless sensor networksScalability in wireless sensor networks
Scalability in wireless sensor networkssourabhshivtiwari
 
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNA SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNIAEME Publication
 
WSN presentation
WSN presentationWSN presentation
WSN presentationBraj Raj Singh
 

What's hot (20)

WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networks
 
An algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor networkAn algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor network
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...
A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...
A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...
 
Architecture 4 Wireless Sensor Networks
Architecture 4 Wireless Sensor NetworksArchitecture 4 Wireless Sensor Networks
Architecture 4 Wireless Sensor Networks
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
 
C0511318
C0511318C0511318
C0511318
 
Wireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol pptWireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol ppt
 
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
 
Hetrogenous wireless sensor network
Hetrogenous wireless sensor networkHetrogenous wireless sensor network
Hetrogenous wireless sensor network
 
Fault Node Recovery Algorithm for a Wireless Sensor Network
Fault Node Recovery Algorithm for a Wireless Sensor NetworkFault Node Recovery Algorithm for a Wireless Sensor Network
Fault Node Recovery Algorithm for a Wireless Sensor Network
 
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
 
Energy Consumption in chain based routing protocol in wireless sensor network
Energy Consumption in chain based routing protocol in wireless sensor networkEnergy Consumption in chain based routing protocol in wireless sensor network
Energy Consumption in chain based routing protocol in wireless sensor network
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsn
 
Scalability in wireless sensor networks
Scalability in wireless sensor networksScalability in wireless sensor networks
Scalability in wireless sensor networks
 
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNA SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
 
WSN presentation
WSN presentationWSN presentation
WSN presentation
 

Similar to Building Fault Tolerance in WSNs Using Topology Models

Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...IRJET Journal
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEYijcsa
 
Oj3425062509
Oj3425062509Oj3425062509
Oj3425062509IJERA Editor
 
IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...
IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...
IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...IRJET Journal
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
 
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...journalBEEI
 
Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Nod...
Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Nod...Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Nod...
Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Nod...iosrjce
 
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
 
Various Techniques Used in Wireless Sensor Networks for Data Transfer
Various Techniques Used in Wireless Sensor Networks for Data TransferVarious Techniques Used in Wireless Sensor Networks for Data Transfer
Various Techniques Used in Wireless Sensor Networks for Data TransferIJAEMSJORNAL
 
A Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkCassie Romero
 
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksSecure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksIJMER
 
Energetic Slot Allotment for Improving Interchange in Wireless Sensor Network
Energetic Slot Allotment for Improving Interchange in Wireless Sensor NetworkEnergetic Slot Allotment for Improving Interchange in Wireless Sensor Network
Energetic Slot Allotment for Improving Interchange in Wireless Sensor NetworkIRJET Journal
 
Grid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing ProtocolGrid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing Protocolijtsrd
 
A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor Networks
A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor NetworksA Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor Networks
A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor NetworksIJERA Editor
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesIJAEMSJORNAL
 
Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Editor IJARCET
 
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...Editor IJMTER
 

Similar to Building Fault Tolerance in WSNs Using Topology Models (20)

Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
 
iPGCON14_134
iPGCON14_134iPGCON14_134
iPGCON14_134
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
 
Oj3425062509
Oj3425062509Oj3425062509
Oj3425062509
 
IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...
IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...
IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
 
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
 
G017644454
G017644454G017644454
G017644454
 
Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Nod...
Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Nod...Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Nod...
Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Nod...
 
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
 
Various Techniques Used in Wireless Sensor Networks for Data Transfer
Various Techniques Used in Wireless Sensor Networks for Data TransferVarious Techniques Used in Wireless Sensor Networks for Data Transfer
Various Techniques Used in Wireless Sensor Networks for Data Transfer
 
A Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor Network
 
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksSecure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
 
Energetic Slot Allotment for Improving Interchange in Wireless Sensor Network
Energetic Slot Allotment for Improving Interchange in Wireless Sensor NetworkEnergetic Slot Allotment for Improving Interchange in Wireless Sensor Network
Energetic Slot Allotment for Improving Interchange in Wireless Sensor Network
 
Grid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing ProtocolGrid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing Protocol
 
Bm32410415
Bm32410415Bm32410415
Bm32410415
 
A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor Networks
A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor NetworksA Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor Networks
A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor Networks
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and Challenges
 
Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919
 
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
 

More from IJAAS Team

Super Capacitor Electronic Circuit Design for Wireless Charging
Super Capacitor Electronic Circuit Design for Wireless ChargingSuper Capacitor Electronic Circuit Design for Wireless Charging
Super Capacitor Electronic Circuit Design for Wireless ChargingIJAAS Team
 
On the High Dimentional Information Processing in Quaternionic Domain and its...
On the High Dimentional Information Processing in Quaternionic Domain and its...On the High Dimentional Information Processing in Quaternionic Domain and its...
On the High Dimentional Information Processing in Quaternionic Domain and its...IJAAS Team
 
Using FPGA Design and HIL Algorithm Simulation to Control Visual Servoing
Using FPGA Design and HIL Algorithm Simulation to Control Visual ServoingUsing FPGA Design and HIL Algorithm Simulation to Control Visual Servoing
Using FPGA Design and HIL Algorithm Simulation to Control Visual ServoingIJAAS Team
 
Mitigation of Selfish Node Attacks In Autoconfiguration of MANETs
Mitigation of Selfish Node Attacks In Autoconfiguration of MANETsMitigation of Selfish Node Attacks In Autoconfiguration of MANETs
Mitigation of Selfish Node Attacks In Autoconfiguration of MANETsIJAAS Team
 
Vision Based Approach to Sign Language Recognition
Vision Based Approach to Sign Language RecognitionVision Based Approach to Sign Language Recognition
Vision Based Approach to Sign Language RecognitionIJAAS Team
 
Design and Analysis of an Improved Nucleotide Sequences Compression Algorithm...
Design and Analysis of an Improved Nucleotide Sequences Compression Algorithm...Design and Analysis of an Improved Nucleotide Sequences Compression Algorithm...
Design and Analysis of an Improved Nucleotide Sequences Compression Algorithm...IJAAS Team
 
Review: Dual Band Microstrip Antennas for Wireless Applications
Review: Dual Band Microstrip Antennas for Wireless ApplicationsReview: Dual Band Microstrip Antennas for Wireless Applications
Review: Dual Band Microstrip Antennas for Wireless ApplicationsIJAAS Team
 
Simplified Space Vector Pulse Width Modulation Based on Switching Schemes wit...
Simplified Space Vector Pulse Width Modulation Based on Switching Schemes wit...Simplified Space Vector Pulse Width Modulation Based on Switching Schemes wit...
Simplified Space Vector Pulse Width Modulation Based on Switching Schemes wit...IJAAS Team
 
An Examination of the Impact of Power Sector Reform on Manufacturing and Serv...
An Examination of the Impact of Power Sector Reform on Manufacturing and Serv...An Examination of the Impact of Power Sector Reform on Manufacturing and Serv...
An Examination of the Impact of Power Sector Reform on Manufacturing and Serv...IJAAS Team
 
A Novel Handoff Necessity Estimation Approach Based on Travelling Distance
A Novel Handoff Necessity Estimation Approach Based on Travelling DistanceA Novel Handoff Necessity Estimation Approach Based on Travelling Distance
A Novel Handoff Necessity Estimation Approach Based on Travelling DistanceIJAAS Team
 
The Combination of Steganography and Cryptography for Medical Image Applications
The Combination of Steganography and Cryptography for Medical Image ApplicationsThe Combination of Steganography and Cryptography for Medical Image Applications
The Combination of Steganography and Cryptography for Medical Image ApplicationsIJAAS Team
 
Physical Properties and Compressive Strength of Zinc Oxide Nanopowder as a Po...
Physical Properties and Compressive Strength of Zinc Oxide Nanopowder as a Po...Physical Properties and Compressive Strength of Zinc Oxide Nanopowder as a Po...
Physical Properties and Compressive Strength of Zinc Oxide Nanopowder as a Po...IJAAS Team
 
Experimental and Modeling Dynamic Study of the Indirect Solar Water Heater: A...
Experimental and Modeling Dynamic Study of the Indirect Solar Water Heater: A...Experimental and Modeling Dynamic Study of the Indirect Solar Water Heater: A...
Experimental and Modeling Dynamic Study of the Indirect Solar Water Heater: A...IJAAS Team
 
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...IJAAS Team
 
An Improved Greedy Parameter Stateless Routing in Vehicular Ad Hoc Network
An Improved Greedy Parameter Stateless Routing in Vehicular Ad Hoc NetworkAn Improved Greedy Parameter Stateless Routing in Vehicular Ad Hoc Network
An Improved Greedy Parameter Stateless Routing in Vehicular Ad Hoc NetworkIJAAS Team
 
A Novel CAZAC Sequence Based Timing Synchronization Scheme for OFDM System
A Novel CAZAC Sequence Based Timing Synchronization Scheme for OFDM SystemA Novel CAZAC Sequence Based Timing Synchronization Scheme for OFDM System
A Novel CAZAC Sequence Based Timing Synchronization Scheme for OFDM SystemIJAAS Team
 
Workload Aware Incremental Repartitioning of NoSQL for Online Transactional P...
Workload Aware Incremental Repartitioning of NoSQL for Online Transactional P...Workload Aware Incremental Repartitioning of NoSQL for Online Transactional P...
Workload Aware Incremental Repartitioning of NoSQL for Online Transactional P...IJAAS Team
 
A Fusion Based Visibility Enhancement of Single Underwater Hazy Image
A Fusion Based Visibility Enhancement of Single Underwater Hazy ImageA Fusion Based Visibility Enhancement of Single Underwater Hazy Image
A Fusion Based Visibility Enhancement of Single Underwater Hazy ImageIJAAS Team
 
Graph Based Workload Driven Partitioning System by Using MongoDB
Graph Based Workload Driven Partitioning System by Using MongoDBGraph Based Workload Driven Partitioning System by Using MongoDB
Graph Based Workload Driven Partitioning System by Using MongoDBIJAAS Team
 
Data Partitioning in Mongo DB with Cloud
Data Partitioning in Mongo DB with CloudData Partitioning in Mongo DB with Cloud
Data Partitioning in Mongo DB with CloudIJAAS Team
 

More from IJAAS Team (20)

Super Capacitor Electronic Circuit Design for Wireless Charging
Super Capacitor Electronic Circuit Design for Wireless ChargingSuper Capacitor Electronic Circuit Design for Wireless Charging
Super Capacitor Electronic Circuit Design for Wireless Charging
 
On the High Dimentional Information Processing in Quaternionic Domain and its...
On the High Dimentional Information Processing in Quaternionic Domain and its...On the High Dimentional Information Processing in Quaternionic Domain and its...
On the High Dimentional Information Processing in Quaternionic Domain and its...
 
Using FPGA Design and HIL Algorithm Simulation to Control Visual Servoing
Using FPGA Design and HIL Algorithm Simulation to Control Visual ServoingUsing FPGA Design and HIL Algorithm Simulation to Control Visual Servoing
Using FPGA Design and HIL Algorithm Simulation to Control Visual Servoing
 
Mitigation of Selfish Node Attacks In Autoconfiguration of MANETs
Mitigation of Selfish Node Attacks In Autoconfiguration of MANETsMitigation of Selfish Node Attacks In Autoconfiguration of MANETs
Mitigation of Selfish Node Attacks In Autoconfiguration of MANETs
 
Vision Based Approach to Sign Language Recognition
Vision Based Approach to Sign Language RecognitionVision Based Approach to Sign Language Recognition
Vision Based Approach to Sign Language Recognition
 
Design and Analysis of an Improved Nucleotide Sequences Compression Algorithm...
Design and Analysis of an Improved Nucleotide Sequences Compression Algorithm...Design and Analysis of an Improved Nucleotide Sequences Compression Algorithm...
Design and Analysis of an Improved Nucleotide Sequences Compression Algorithm...
 
Review: Dual Band Microstrip Antennas for Wireless Applications
Review: Dual Band Microstrip Antennas for Wireless ApplicationsReview: Dual Band Microstrip Antennas for Wireless Applications
Review: Dual Band Microstrip Antennas for Wireless Applications
 
Simplified Space Vector Pulse Width Modulation Based on Switching Schemes wit...
Simplified Space Vector Pulse Width Modulation Based on Switching Schemes wit...Simplified Space Vector Pulse Width Modulation Based on Switching Schemes wit...
Simplified Space Vector Pulse Width Modulation Based on Switching Schemes wit...
 
An Examination of the Impact of Power Sector Reform on Manufacturing and Serv...
An Examination of the Impact of Power Sector Reform on Manufacturing and Serv...An Examination of the Impact of Power Sector Reform on Manufacturing and Serv...
An Examination of the Impact of Power Sector Reform on Manufacturing and Serv...
 
A Novel Handoff Necessity Estimation Approach Based on Travelling Distance
A Novel Handoff Necessity Estimation Approach Based on Travelling DistanceA Novel Handoff Necessity Estimation Approach Based on Travelling Distance
A Novel Handoff Necessity Estimation Approach Based on Travelling Distance
 
The Combination of Steganography and Cryptography for Medical Image Applications
The Combination of Steganography and Cryptography for Medical Image ApplicationsThe Combination of Steganography and Cryptography for Medical Image Applications
The Combination of Steganography and Cryptography for Medical Image Applications
 
Physical Properties and Compressive Strength of Zinc Oxide Nanopowder as a Po...
Physical Properties and Compressive Strength of Zinc Oxide Nanopowder as a Po...Physical Properties and Compressive Strength of Zinc Oxide Nanopowder as a Po...
Physical Properties and Compressive Strength of Zinc Oxide Nanopowder as a Po...
 
Experimental and Modeling Dynamic Study of the Indirect Solar Water Heater: A...
Experimental and Modeling Dynamic Study of the Indirect Solar Water Heater: A...Experimental and Modeling Dynamic Study of the Indirect Solar Water Heater: A...
Experimental and Modeling Dynamic Study of the Indirect Solar Water Heater: A...
 
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...
 
An Improved Greedy Parameter Stateless Routing in Vehicular Ad Hoc Network
An Improved Greedy Parameter Stateless Routing in Vehicular Ad Hoc NetworkAn Improved Greedy Parameter Stateless Routing in Vehicular Ad Hoc Network
An Improved Greedy Parameter Stateless Routing in Vehicular Ad Hoc Network
 
A Novel CAZAC Sequence Based Timing Synchronization Scheme for OFDM System
A Novel CAZAC Sequence Based Timing Synchronization Scheme for OFDM SystemA Novel CAZAC Sequence Based Timing Synchronization Scheme for OFDM System
A Novel CAZAC Sequence Based Timing Synchronization Scheme for OFDM System
 
Workload Aware Incremental Repartitioning of NoSQL for Online Transactional P...
Workload Aware Incremental Repartitioning of NoSQL for Online Transactional P...Workload Aware Incremental Repartitioning of NoSQL for Online Transactional P...
Workload Aware Incremental Repartitioning of NoSQL for Online Transactional P...
 
A Fusion Based Visibility Enhancement of Single Underwater Hazy Image
A Fusion Based Visibility Enhancement of Single Underwater Hazy ImageA Fusion Based Visibility Enhancement of Single Underwater Hazy Image
A Fusion Based Visibility Enhancement of Single Underwater Hazy Image
 
Graph Based Workload Driven Partitioning System by Using MongoDB
Graph Based Workload Driven Partitioning System by Using MongoDBGraph Based Workload Driven Partitioning System by Using MongoDB
Graph Based Workload Driven Partitioning System by Using MongoDB
 
Data Partitioning in Mongo DB with Cloud
Data Partitioning in Mongo DB with CloudData Partitioning in Mongo DB with Cloud
Data Partitioning in Mongo DB with Cloud
 

Recently uploaded

Speech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptxSpeech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptxpriyankatabhane
 
GenBio2 - Lesson 1 - Introduction to Genetics.pptx
GenBio2 - Lesson 1 - Introduction to Genetics.pptxGenBio2 - Lesson 1 - Introduction to Genetics.pptx
GenBio2 - Lesson 1 - Introduction to Genetics.pptxBerniceCayabyab1
 
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 
Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024AyushiRastogi48
 
Environmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial BiosensorEnvironmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial Biosensorsonawaneprad
 
Microteaching on terms used in filtration .Pharmaceutical Engineering
Microteaching on terms used in filtration .Pharmaceutical EngineeringMicroteaching on terms used in filtration .Pharmaceutical Engineering
Microteaching on terms used in filtration .Pharmaceutical EngineeringPrajakta Shinde
 
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.PraveenaKalaiselvan1
 
Transposable elements in prokaryotes.ppt
Transposable elements in prokaryotes.pptTransposable elements in prokaryotes.ppt
Transposable elements in prokaryotes.pptArshadWarsi13
 
User Guide: Orion™ Weather Station (Columbia Weather Systems)
User Guide: Orion™ Weather Station (Columbia Weather Systems)User Guide: Orion™ Weather Station (Columbia Weather Systems)
User Guide: Orion™ Weather Station (Columbia Weather Systems)Columbia Weather Systems
 
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...lizamodels9
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfSELF-EXPLANATORY
 
The dark energy paradox leads to a new structure of spacetime.pptx
The dark energy paradox leads to a new structure of spacetime.pptxThe dark energy paradox leads to a new structure of spacetime.pptx
The dark energy paradox leads to a new structure of spacetime.pptxEran Akiva Sinbar
 
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptxSTOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptxMurugaveni B
 
Pests of soyabean_Binomics_IdentificationDr.UPR.pdf
Pests of soyabean_Binomics_IdentificationDr.UPR.pdfPests of soyabean_Binomics_IdentificationDr.UPR.pdf
Pests of soyabean_Binomics_IdentificationDr.UPR.pdfPirithiRaju
 
Sulphur & Phosphrus Cycle PowerPoint Presentation (2) [Autosaved]-3-1.pptx
Sulphur & Phosphrus Cycle PowerPoint Presentation (2) [Autosaved]-3-1.pptxSulphur & Phosphrus Cycle PowerPoint Presentation (2) [Autosaved]-3-1.pptx
Sulphur & Phosphrus Cycle PowerPoint Presentation (2) [Autosaved]-3-1.pptxnoordubaliya2003
 
TOPIC 8 Temperature and Heat.pdf physics
TOPIC 8 Temperature and Heat.pdf physicsTOPIC 8 Temperature and Heat.pdf physics
TOPIC 8 Temperature and Heat.pdf physicsssuserddc89b
 
Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Nistarini College, Purulia (W.B) India
 
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)User Guide: Pulsar™ Weather Station (Columbia Weather Systems)
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)Columbia Weather Systems
 
Harmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms PresentationHarmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms Presentationtahreemzahra82
 
Scheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxScheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxyaramohamed343013
 

Recently uploaded (20)

Speech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptxSpeech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptx
 
GenBio2 - Lesson 1 - Introduction to Genetics.pptx
GenBio2 - Lesson 1 - Introduction to Genetics.pptxGenBio2 - Lesson 1 - Introduction to Genetics.pptx
GenBio2 - Lesson 1 - Introduction to Genetics.pptx
 
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 
Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024
 
Environmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial BiosensorEnvironmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial Biosensor
 
Microteaching on terms used in filtration .Pharmaceutical Engineering
Microteaching on terms used in filtration .Pharmaceutical EngineeringMicroteaching on terms used in filtration .Pharmaceutical Engineering
Microteaching on terms used in filtration .Pharmaceutical Engineering
 
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
 
Transposable elements in prokaryotes.ppt
Transposable elements in prokaryotes.pptTransposable elements in prokaryotes.ppt
Transposable elements in prokaryotes.ppt
 
User Guide: Orion™ Weather Station (Columbia Weather Systems)
User Guide: Orion™ Weather Station (Columbia Weather Systems)User Guide: Orion™ Weather Station (Columbia Weather Systems)
User Guide: Orion™ Weather Station (Columbia Weather Systems)
 
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
 
The dark energy paradox leads to a new structure of spacetime.pptx
The dark energy paradox leads to a new structure of spacetime.pptxThe dark energy paradox leads to a new structure of spacetime.pptx
The dark energy paradox leads to a new structure of spacetime.pptx
 
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptxSTOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
 
Pests of soyabean_Binomics_IdentificationDr.UPR.pdf
Pests of soyabean_Binomics_IdentificationDr.UPR.pdfPests of soyabean_Binomics_IdentificationDr.UPR.pdf
Pests of soyabean_Binomics_IdentificationDr.UPR.pdf
 
Sulphur & Phosphrus Cycle PowerPoint Presentation (2) [Autosaved]-3-1.pptx
Sulphur & Phosphrus Cycle PowerPoint Presentation (2) [Autosaved]-3-1.pptxSulphur & Phosphrus Cycle PowerPoint Presentation (2) [Autosaved]-3-1.pptx
Sulphur & Phosphrus Cycle PowerPoint Presentation (2) [Autosaved]-3-1.pptx
 
TOPIC 8 Temperature and Heat.pdf physics
TOPIC 8 Temperature and Heat.pdf physicsTOPIC 8 Temperature and Heat.pdf physics
TOPIC 8 Temperature and Heat.pdf physics
 
Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...
 
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)User Guide: Pulsar™ Weather Station (Columbia Weather Systems)
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)
 
Harmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms PresentationHarmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms Presentation
 
Scheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxScheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docx
 

Building Fault Tolerance in WSNs Using Topology Models

  • 1. International Journal of Advances in Applied Sciences (IJAAS) Vol. 7, No. 2, June 2018, pp. 135~142 ISSN: 2252-8814, DOI: 10.11591/ijaas.v7.i2.pp135-142  135 Journal homepage: http://iaescore.com/online/index.php/IJAAS Building Fault Tolerance Within Wsn-A Topology Model M. Sai Rama Krishna, Ch. Jnana Gayathri, K. Laxmi Pallavi Rao Department of Electronics and Computer Engineering, K.L University, Vijayawada, India. Article Info ABSTRACT Article history: Received Dec 14, 2018 Revised Apr 21, 2018 Accepted May 17, 2018 Wireless Sensor network plays a crucial role which helps in visualizing, processing, and analyzing the information wirelessly. WSN is a network which consists of huge amount of sensor devices which are of low cost and low powered also known as sensor nodes. These type of networks are generally used in real time applications such as monitoring of environmental conditions, militaries, industries etc., .but the problem that exists in WSN is may be due to different failures such as node failure, link failure, sink failure, interference, power dissipation and collision. If these faults are unable to handle then the desired network criteria’s may not be reached properly which results in inefficiency of the network. So, the main idea behind the investigation is to form a different networking topology which works in the event of failure Keyword: Fault Tolerance Topology Wireless Sensor Network Copyright Š 2018 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: M. Sai Rama Krishna, Department of Electronics and Computer Engineering, K.L University, Vijayawada, India. Email: drmramakrishnaa@gmail.com 1. INTRODUCTION Wireless Sensor Networks (WSNs) play a noteworthy part in present day innovation which acts as a bridge between the physical and virtual worlds. These sensors are small with restricted processing and computing resources which are inexpensive and helps in sensing, processing, and aggregating the information from the environment, based on the requirement they can transmit the sensed data. A Wireless Sensor Network is a self-designing network of little sensor nodes which helps in conveying among them utilizing radio signals, deployed in quantity to detect, monitor and understand the physical world. In general a network consists of huge components which are to be inter-conceded for remote sensing and transmitting information of data to the server which is located far away and receiving data from the server an depending on that the local environmental conditions will be controlled. WSN’s even work in crucial environments which are subjected to different failures by several layers in a framework. Suppose if a node which should transmit data is in a failure condition then all the other nodes will be waiting for the data to get received. WSN must be free from faults. The network must be recovered from the fault as soon as possible when the fault occurs. A WSN can be made to be operating under normal conditions even when a fault occurs by implementing fault recovery techniques. Faults can happen within WSN involving many components of the network. Different fault tolerance techniques when introduced into the system make the WSN more reliable. Replication has been one of the major concepts that have been implemented over the time for making the WSN fault tolerant. The Quality of WSN may suffer due to the introduction of redundancy within the wireless networks. A typical wireless sensor network is shown in Figure 1. WSN Node: A WSN node, otherwise called a bit. It is a node in a sensor system that is supplied for performing some handling, gathering actual data and speaking with other associated nodes in the system.
  • 2.  ISSN: 2252-8814 IJAAS Vol. 7, No. 2, June 2018: 135 – 142 136 Figure 1. Typical WSN Base station: The base station should perform computations; higher memory is required and is frequently associated with better continuity source than batteries. One can look at the base station as an area point to the WSN where the base station's fundamental target is to collect distinguished data strength nodes in WSN. The main role of base station is to transfer the received data from nodes to the server. Application server: Development and implementation of different applications which are related to real time applications needs the use of Wireless Sensor Networks (WSN). The unique feature of these applications is to use WSN to collect and process the information continuously 1.1. Characteristics of Wireless Senor Networks WSN are characterized by many intricate issues which all have a bearing on its fault tolerance. Each of the characteristics must be taken into account and analyzed to understand the effect of the same on its behavior when any of the fault occurs. Some of the features that affect the fault tolerance behavior are as shown below: a. Ability to adapt to hub disappointment b. Some portability of hubs c. Heterogeneity of hubs d. Adaptability to huge size of sending e. Ability to withstand severe environmental conditions f. Ease of utilization g. Cross-layer plan 1.2. The need for building fault tolerance within WSN Networks WSN are being used for many critical and mission critical systems, failure of which may sometimes leads to disastrous situations and WSN lead to great losses in many forms. WSNs are being used for many purposes which aircraft management, Vegetation, whether forecasting, Traffic management and control etc. WSN are being used extensively for real life and real time data acquisition. The WSN networks are delicate as the networks are established using tiny and fragile devices and generally quite prone for failures. Therefore it is necessary that WSN are built considering the failures of the devices used for networking. It is necessary to build as much fault tolerance as possible into WSN so that the networks can be made to work as much reliably as possible. 1.3. Problem definition There are various techniques exhibited in the realated work for increasing the fault tolerance of the WSN network and none of the strategies presented have presented verifiability of the fault tolerance levels of the WSN network. The problem is to discover the procedures, techniques and mechanisms utilizing which the WSN can be made to be fault tolerant and verifiable. In this paper two techniques have been proposed using which fault tolerance levels can be computed. The fault tolerance processed by both the methods provides for verifiability of the Reliability of the WSN networks. 2. RELATED WORK WSN are small devices, low cost, limited memory, low power, and low power consumption devices. The main aim of the sensor networks is to provide reliability, maintainability, availability [1]. In general there will be faults which may occur due to various factors such as node fault, sink fault, network faults. Sushruta Mishra et, al., have expressed that WSN can be subjected to many faults and also provided an overview on various fault detection and recovery systems which helps in continuing the operation normally
  • 3. IJAAS ISSN: 2252-8814  Building Fault Tolerance Within Wsn-a Topology Model (M. Sai Rama Krishna) 137 in the event of some system component failures. The two methods used for fault recovery are Active replication in which all or many nodes perform same functionality. If any node fails then also receiver will get results from other nodes and the Passive replication involves Primary replica receiving all requests and process them accordingly. Samira [2] described about routing solutions for fault tolerant which includes re- transmission, in which the source node sends their data over an developed path, and if this path fails to forward the data then the source again retransmits those data through different path. The second technique is the data replication which sends different copies of the same data over multiple paths. Small scale sensor networks which comprises of huge amount of sensors deployed over a small area which is based on Energy and flow management in small scale WSN, Data management in small scale sensor networks and Coverage along with connectivity in small scale networks while considering the Large Scale wireless sensor networks (LS WSNs) which comprises of thousands of sensors are also based on various objectives of Energy and flow management. C AHilaet [3] have presented automatic path recovery and efficient routing algorithms to make the WSN fault tolerant. Fault tolerant multipath routing scheme for energy efficient wireless sensor network (FTMRS) is based on multipath data routing scheme in which one of the shortest path is used for main data routing and in the other two backup paths are used as alternative path for faulty network and to handle the overloaded traffic on main channel. Manasvi [4] explained that wireless devices are battery powered for maintaining protocols in an efficient manner. Flooding is a technique which continues until the destination node is reached which results in impulsion or overlap. When same region is sensed by two sensors and the sensed data is broadcasted at the same time, the neighbors will receive the duplicated packets which are overcome by gossiping. In gossiping when a packet is received, a sensor would select one of its neighbors randomly and send the packets to neighbor. This process continues until all sensors receive this packet but there is a delay problem if the no of nodes get increased. Ting Yuan [5] presented the securing of the data through introducing fault tolerance within WSN. The position of aggregating and forwarding the information is known as sink. A node can't be each a sink and a source due to the fact this will substantially dissipate the constrained power and security strength is a key management scheme, tamper-resistant hardware is still economically mistaken to be applied in low-fee sensor nodes, making node capture even more appealing to put into effect. 3. EXISTING WIRELESS SENSOR NETWORKS A Wireless Sensor network is mainly used for continuous monitoring and processing the information, in general there are so many existing WSN in which one of the applications is detailed in Figure 2 which sprinkling of water and pesticide for turmeric plantation depending on the range of humidity existence. After sensor sensing the existing humidity value then it initializes the sprinkling of water if it is below the predefined. The entire data including date, time, humidity range, latitude and longitude, water pumped are sent using base stations via internet to the main server. The data will be analyzed and if any specific instructions required will be sent to the formers through SMS messages and the entire data received will be stored at the main server. Connectivity of the main server and the base station is achieved through a cable connection or using a combination of Wi-Fi/Cellular interface. Figure 2. Existing WSN
  • 4.  ISSN: 2252-8814 IJAAS Vol. 7, No. 2, June 2018: 135 – 142 138 3.1. Tree Topology The investigation presented in this paper shows how the reliability of a WSN can be enhanced based on networking topology. To start with Fault tree for the existing WSN is developed and overall fault rate is computed. The fault tree diagram for the existing WSN is shown in Figure 3. Figure 3. Tree topology in NS2 By developing these type of tree topology will result in high packet loss, low throughput, high delay etc., so in order to avoid these type of faults while transferring data we are opting another topology known as butterfly topology which is having multiple number of inputs and outputs which will help in transferring information in any path. 4. IMPLEMENTING BUTTER-FLY TOPOLOGY WITHIN WIRELESS NETWORKS It is possible that the failure rate of the network can be reduced by implementing different topologies than the tree topology used for the sample WSN. Multi-stage networks are commonly used to connect a set of inputs to a set of outputs; the concept as such is similar to cloud computing. The connectivity is established through links between computing and switching systems. These networks use 2 X 2 switches. Each switch takes two inputs and produces 2 outputs via different connections (Straight, cross, upper broadcast and the lower broadcast. A butter fly network is a multi-stage networks. Number of stages used depends on the kind of connectivity required. A butterfly topology which uses 4 stage networks has been considered and the same is fitted into a WSN network. A switch box in stage “I” is connected with the links that are at a distance of 2i apart. The 4 X 4 butterfly network is achieved through two 2 X 2 networks. The probability that one of the paths exists for connecting to a WSN node can be computed as Ac = 2k ρl ÎŚ(k) (1) where k = Number of stages, ρ = probability that a node fails and ÎŚ(k) is the probability that that a switch box in the stage K can fail. ÎŚ(k) can be computed using the equation (2). ÎŚ(k) = 1 – ( 1- ρl ÎŚ(k-1)2 (2) The butterfly network connected for fitting the sample WSN has been shown in Figure 4. The butter fly network has been established using 4 X 4 network containing 4 stages. The 4 X 4 network has become necessary due to the availability of 8 elementary levels of inputs and 4 different types of outputs required to make the network reliable and available.
  • 5. IJAAS ISSN: 2252-8814  Building Fault Tolerance Within Wsn-a Topology Model (M. Sai Rama Krishna) 139 Figure 4. Sample butterfly network Using the equation (1) and equation (2) the probability of success that at least one path exists from input point to an output has been computed as 0.81. From the Figure 5 it can be seen that 6 extra switches have been included into WSN network to make more fault free. Figure 5. Modified WSN network-Butterfly topology-Hierarchical model We developed a butterfly network in NS2 where we are obtaining High throughput, delay in transferring packet is less and packet delivery ratio is high which is shown in Figure 6.
  • 6.  ISSN: 2252-8814 IJAAS Vol. 7, No. 2, June 2018: 135 – 142 140 Figure 6. Butterfly network in NS2 5. SOFTWARE PLATFORM 5.1. Network simulator2 (NS2) The scenario of assay of the system in the digital era is primly based on the simulation, the simulation which exemplifies the system design model illustrates the system functioning and its accompanying output. Simulation exhibits the comprehensive way of designing the system and the way its operating desired to its objective which facilitates the user with the concept of learn by doing. The accomplishment of the simulation is analogous to a child behaviour. The approach to the simulation is the way of intercommunications between many entities and which depicts in the desired outcome. 5.2. Importance of NS2 There are prevalent Varian’s in the era of network simulators and in which some of the sequel are ns-1, ns-2, ns-3. The network simulator has their own significance in all aspects of domains, but in the era of teaching and research it is predominant and all of the versions are employed as prime simulators for the computer technology. In the networking domain the Network simulators is a diverse simulator exhibiting a significant outcome. 5.3. NS2 Installations and Setup a. Install Ubuntu 12.04 b. Download NS-2.35 (http://sourceforge.net/projects/nsnam/files/allinone/ns-allinone-2.35/ns-allinone- 2.35.tar.gz/download) c. Unzip or untar it to any folder (recommended is /home/loginname) using the following commands one by one sudo apt-get update d. Using cd command go into appropriate folder, where the .gz file exists, and then execute below commands tar zxvf ns-allinone-2.35.tar.gz sudo apt-get install build-essential autoconf automake libxmu-dev cd ns-allinone-2.35 ./install e. Once installed the PATH information will be provided to you. So dont close the terminal after installation complete, because you dont get path again.) You will see some configuration in some last lines of completed installation as shown below. Please put /home/Vertexsoft/Desktop/NS-Installation/ns-allinone- 2.35/bin:/home/Vertexsoft/Desktop/NS- Installation/ns-allinone-2.35/tcl8.5.10/unix:/home/Vertexsoft/Desktop/NS-Installation/ns-allinone- 2.35/tk8.5.10/unix 5.4 Developing a Networking topology in NS2 Using the existing application specific WSN and separately considering the modified hierarchy method named butterfly approach, the following results are obtained which adopt the features of both technologies individually to produce efficient results as shown below. The nodes in this simulation results are same as above mentioned approaches and the remaining are considered as sensor nodes for effective functioning.
  • 7. IJAAS ISSN: 2252-8814  Building Fault Tolerance Within Wsn-a Topology Model (M. Sai Rama Krishna) 141 The data from nodes to server is reached by adopting the shortest, so that effective time in performing the computation is maintained. But in simulation, there will not be any sign of failure of virtual nodes. But in practical approach, there may be chance of occurrence of any failure .to verify the functioning of proposed method a fault condition is introduced at time 4minutes near tower.at this situation, the data packets move by selecting another approach leaving the failure tower node. 6. SIMULATION RESULTS The butterfly method is the best approach witch delivers appreciate results when compared to pilot network in case of any model. The following Figure 7 specifies the end to end delay in Ns2 simulation region indicating time on x-axis and delay on y-axis. Figure 7. End to end delay The throughput is essential parameter which specifies the performance of any model. If the throughput of any approach is high, then it is more efficient approach. The average throughput obtained by using butterfly approach is very high unlike pilot approach is given in Figure 8 Figure 8. Average throughput The packet delivery rate indicates the functioning of a method. If the delivery rate is very high, it indicates the poor packet loss. The following Figure 9. indicates the packet delivery rate adopted by butterfly technique is very high when compared to previous pilot approaches.
  • 8.  ISSN: 2252-8814 IJAAS Vol. 7, No. 2, June 2018: 135 – 142 142 Figure 9. Packet loss The maximum numbers of packets are delivered in butterfly topology and minimum packets are delivered in pilot sensor networks. The following displays the packet delivery ration in Figure 10. Figure 10. Packet delivery Ratio 7. CONCLUSION Fault tolerance within a WSN can be enhanced by way of adding redundancy at network level requiring networking gadgets such as switches, bridges and gateways. The devices within the network when connected using the butterfly like topology will enhance the reliability of WSN networks. Fault tolerance as such can be included by way of creating as many paths as possible from a WSN node. In the case of butterfly topology 3 paths are created from each of the node as 2X2 switches are used to switch the output from one device to other. REFERENCES [1] Sushruta Mishra, Lambodar Jena, Aarti Pradhan “Fault Tolerance in Wireless Sensor Networks”, International Journal of Advanced Research in Computer Science and Software Engineering, ISSN: 2277 128X, Volume 2, Issue 10. [2] C.Ahila Jerlin, N.Rajkamal “Fault Tolerance in wireless sensor Networks”, International Journal of Innovative Research in Advanced Engineering (IJIRAE), ISSN: 2349-2163, Volume 2, Issue 2. [3] Manasvi Mannan, Shashi B. Rana “Fault Tolerance in wireless sensor network”, International Journal of Current Engineering and Technology, E-ISSN 2277 – 4106, P-ISSN 2347 – 5161 [4] SamiraChouikhi, InèsElKorbi, YacineGhamri-Doudane, LeilaAzouzSaidane “A survey on Fault Tolerance in small and large scale wireless sensor networks” National School of Computer Science, CRISTALLab,UniversityofManouba, Computer Communications 69 (2015) 22–37 [5] Ting Yuan, Shiyong Zhang “Secure Fault Tolerance in Wireless Sensor Networks” IEEE 8th International Conference on Computer and Information Technology Workshops, 978-0-7695-3242-4/08 $25.00 Š 2008 IEEE DOI 10.1109/CIT.