SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 994
Multipath Based Routing and Energy Efficient Multicasting for Wireless
Sensor Actuator Networks Using The Real-Time, Fault Tolerant and
Energy-Efficiency (REFER) Protocol.
Manikya P N1 , Hanumanthappa S N2
1 PG student, Electrical and Electronics Department, UBDT College of Engineering, Davangere
2 Assistant Professor of Electronics &Communication Department, UBDT College of Engineering, Davangere
----------------------------------------------------------------------------***-----------------------------------------------------------------------------
Abstract - Wireless sensor and actuator networks (WSANs)
are composed of sensors and actuators to perform distributed
sensing and actuating tasks. Most WSANapplications(e.g., fire
detection) demand that actuators rapidlyrespondtoobserved
events. Therefore, real-time (i.e., fast) and fault-tolerant
transmission is a critical requirement in WSAN’s to enable
sensed data to reach actuators reliably and quickly. Due to
limited power resources, energy-efficiency is another crucial
requirement. Such requirements become formidably
challenging in large-scale WSANs. However, existing WSANs
fall short in meeting these requirements. To this end, we first
theoretically study the Kautz graph for its applicability in
WSANs to meet these requirements.
We then propose a Kautz-based real-time, Fault-tolerant and
Energy-efficient WSAN (REFER). REFERembedsKautzgraphs
into the physical topology of a WSAN for real-time
communication and connects the Kautz graphs using
distributed hash table (DHT) for high scalability. We also
theoretically study routing paths in the Kautz graph, basedon
which we develop an efficient fault-tolerant routing protocol.
It enables a relay node to quickly and efficiently identify the
next shortest path from itself to the destination based only on
node IDs upon routing failure, rather than relying on
retransmission from the source.
Key Words: WSAN, Fault Detection,FaultDiagnosis,Fault
Recovery, Network Measurements.
1. INTRODUCTION
A wireless sensor network (WSN) is a collection of low-cost,
low-power and multi-functionality wireless sensing devices
that can be densely deployed for surveillance purpose.
Traditionally, it is used for data gathering by sampling
surroundings and reporting to predefined data sinks. As
hardware technology advances, it is now evolving toward
service-oriented wireless sensor and actuator networks
(WSANs) [1]. A WSAN consists of sensor nodes capable of
measuring stimuli in the environment and actuator nodes
capable of affectingtheirlocal environment.Similarto WSNs,
WSAN sensors usually are low-cost and low power devices
with a short transmission range that are usedforthesensing
a physical phenomenon. WSAN actuators are resource-rich
devices characterizedbyhigherprocessingandtransmission
capabilities and a longer battery life.
When sensors detect events, they process and transmit the
event data to their nearby actuators, which take action on
the events. WSANs can potentially be used in applications
such as real-time target tracking and surveillance,homeland
security, chemical attack detection and environment
monitoring in battlefields, factories, buildings and cities. For
example, smoke detectors (i.e., sensors) deployed in a
building report detected fire events to sprinklers (i.e.,
actuators); Sensors deployed in a battlefield report their
detected malicious objects to actuators, which immediately
takes action accordingly. Since sensorsaredenselydeployed
to ensure the coverageandtopologyconnectivityusually,the
scenario we considered in this paper is a highly dense and
mobile WSAN which consists of densely populated and
possibly mobile sensors.
Actuators need to quickly and reliably respond to nearby
sensed events. Delay response may lead to disastrous
consequences such as a large loss of life.Therefore,real-time
(i.e., very fast) communication is of great importance in
guaranteeing the timely actions. Because of node mobility
and resultant routing failures, fault-tolerance is crucial to
ensure reliable node communication. In addition, energy-
efficiency is also a critical requirement for WSANs due to
limited resources of sensors. Such requirements become
formidably challenging inlarge-scaleWSANs (e.g.,battlefield
monitoring applications) where the number of sensors is in
the order of hundreds or thousands [2].
Most of the routing protocols for mobile ad hoc networks
(MANETs) and WSNs treat every node equally and fail to
leverage the capabilities of resource-rich devices to reduce
the communication burden on low-resource sensors. These
protocols are suboptimal for WSANs. Recently, mesh-based
[3], [4] and tree-based [5], [6] systems have been proposed
for data transmission in WSANs.Inthemesh-basedmethods,
physically close sensors form a cluster and the cluster head
reports their sensed events to the closest actuator througha
multi-hop path. In the tree-based methods, physically close
sensors form a tree for data transmission.Inbothmethods,a
source node must retransmit a message upon a routing
failure. With the capability of self-organization and self
configuration in a wireless network, The nodes in a network
are deploy incrementally, one node at a time, as needed. As
number of node mount increases, users experience with
increase in reliability and connectivity issues accordingly. It
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 995
is intended to do rather for reliability and affords access
networks in smaller regions.
It is desirable to provide Self reconfigurable Fault Tolerance
for any large-scale network supporting many users and a
diverse set ofapplications.Reconfigurablefaultmanagement
aims to automate many of the fault tolerance task by
continuously monitoring network condition for self-
awareness, analyzing the fault after it is detected for self-
diagnosis, and taking adaptation actions for self-recovery.
Thus it potentially reduces human efforts and responds to
the faults faster.
Fault Management is a fairly young research field, in this
paper we discuss on faults, fault recovery, Extensive
experimental results demonstratethesuperiorperformance
of REFER in comparison with existing WSAN systems in
terms of real-time communication, energy-efficiency, fault-
tolerance and scalability.
The rest of the paper is organized as follows: Section II
presents Related work on WSAN’s, Fault DiagnosisandFault
Recovery is described in section III. Section IV includes
Methodology and Sections V and VI presents Simulation
setup and Results. and in Section VII Conclusions were
drawn.
2. RELATED WORK
WSNs can be regarded as a subcategory of MANETs with
additional constraints of security and energy-efficiency.
WSANs are a subcategory ofWSNs with higher requirements
on real-time,energy-efficientandfault-toleranttransmission.
MANETs use either topological routing [8], [9], [20] or
geographic routing [7]. AODV [8] and DSR [20] are reactive
routing protocols, in which a source nodebroadcastsaquery
to find a path to the destination. DSDV [9] is a proactive
routing algorithm, in which each node maintains and
periodically updates a routing table by message flooding.
Keeping a complete routing table reduces route acquisition
latency for data transmission. However, its correctoperation
dependsonitsperiodicalglobaldisseminationofconnectivity
information, leading to low scalability. Further, the limited
battery power of the sensors makes such routing unsuitable
for WSANs. Geographical routing always chooses the node
closest to the destination by relying on the position
information generated by GPS or a virtual coordination
method [10], [11], [12],bothconsumeaconsiderableamount
of energy, which are also not suitable for WSANs. Many
routing algorithms have been proposed for WSNs.
Pottner et al. [21] introduced a heuristic to calculate a
schedule that cansupportthegivenapplicationrequirements
in terms of data delivery latency andreliabilityanddescribed
methods and tools to collect the data necessary as input for
schedule calculation.
He et al. [22] investigated the on demand scenario where
data collection requests arrive at the mobile element
progressively, and modelled the data collection process as a
queuing system. Based on this model, the authors evaluated
the performance of data collection through both theoretical
analysis and extensive simulation.
Ji et al. [23] introduced a more reasonable model,
probabilistic network model,forthenetworkcapacityofdata
collection. They proposed a cell-based path scheduling(CPS)
algorithm for snapshot data collection, and proposed a zone
based pipeline scheduling (ZPS) algorithm for continuous
data collection.
Vazifehdan et al. [28] proposed two energy-aware routing
algorithms for WANET, called reliable minimum energy cost
routing (RMECR) and reliable minimum energy routing
(RMER). However, the above methods need to retransmit a
message from the source to the destination upon a routing
failure, generating a certain delay. Also, most of these
methods are not energy efficient due to their flooding based
topological or geographical routing components. REFER is
superior to the previous WSAN routing protocols because it
can simultaneously meet the requirements of real-time
communication, fault-tolerance and energy-efficiency. Most
previous research on Kautz graphs focus on exploiting the
Kautz graph in the application layer of P2P networks [14],
[15], [16].
Zuo et al. [17] proposed to build a Kautz graph overlay on
the application layer of a MANET in order to enhance the
routing performance. However, due to the topology
inconsistency, the methodusesMANETmulti-hoproutingfor
the communication between two neighboring Kautz nodes.
Ravikumar et al. [29] and Li et al. [16] studied the shortest
and longest path routing. In BAKE [15]andDFTR[18],anode
uses the next shortest path when it fails to forward the
message along the shortest path. However, a node needs to
use a routing generation algorithm(equivalenttotheprocess
of building a tree) to find different routes to a destination
nodeand calculate their lengths, which generate high energy
consumption.
Imase et al. [30] identified the bounds of the three possible
path lengths in the worst case, but they did not indicate all
disjoint paths, the precise path lengthand the corresponding
conditions, which are identified in REFER.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 996
3. FAULT DIAGNOSIS
A. Sources of Faults
Mesh routers helps to connect mesh networkswithdifferent
wireless networks. Hence WMNs are termed as standalone
devices. It provides greater range of data transfer rates in
the networks. In wireless communication,protocolsusedfor
communication are at small cost. So, there are more chances
of packet losses and node failures. Informationtransmission
generally starts from source node to specified destination
node.
There are a numerous faults occur ina meshtopology,which
are categorized as follows.
 Transmission link fault: noise by external source,
fading of multi-path, interferences which are strong,
and client’s misbehavior are some of the reasons
included, to show why fault occurs. Link in these
networks experiences higher loss rate or long delays.
 Network element fault: Reasons for fault to occur
because of failing in single mesh devices, hardware
failures, power supply fails, and software crashes.
 Mesh protocol fault: black hole and route loops are
created by routingprotocol undersomecircumstances.
Extremely quick decrease is observed in network
throughput and flapping route, which are reasons of
routing protocols. Protocols of Mesh routing are
developed in order to reclaim faults from failure in
path, and it can still give few un-preferred
complications.
 Traffic congestion. As network quantity exceeds the
link capacity, a network can experience important
profusion or even disintegrate if not managed
correctly.
B. Taxonomy of Fault tolerant Techniques
Recent research has developed several techniques that deal
with different types of faults at different layers of network
stack. To assist in understanding the assumptions,focus and
intuitions behind the design and development of these
techniques. We borrow the taxonomy of different fault
tolerant techniques used in traditional distributed systems.
 Fault Prevention: This is to avoid or prevent faults.
 Fault Detection: This is to use differentmetricstocollect
symptoms of possible faults.
 Fault Isolation: This is to correlate different types of
fault indications received from the network, and
propose various fault hypotheses.
 Fault Identification: This is to test each of the proposed
hypotheses in order to precisely localize and identify faults.
 Fault Recovery: This is to treat faults, i.e., reverse their
adverse effects.
Note that there do exist some techniques that address a
combination of all these aspects. In fact, these techniques
operate at different layers of the network protocol stack.
Most Fault avoidance techniques operate in the network
layer, adding redundancy in routingpaths;a majorityoffault
detection and recovery techniques operate at the transport
layer; and a few fault recovery techniques perform at the
application layer, concealing faults during off-line data
processing. In this paper, we use the above taxonomy to
systematically summarize and compare the fault tolerant
techniques that are potentially useful.
Isolation of faults that is checking location of faults,
identification of faults, that is detection of fault type are
present in Fault diagnosis. Locating the faults and even
determining links faults or failure in nodes is relatively easy
by sufficient measurement. Pinpointing will be a challenge
for faults in route cause, where faults will be corrected
making recovery decisions automatically by the system. In-
accurate adaptations are made and routecauseassumptions
are made by some of existing solutions.
The reconfiguration fault recovery approaches need to
address three significant challenges. First the network
measurements must allow accurate reconstructions of
network models, otherwise the computed recovery actions
could be misleading. Another challenge is that finding a
suitable configuration in a large solution space must be fast
enough, otherwise the network dynamics may render the
returned solution no longer applicable. Finally, a Fault
management must support human understanding by
providing logs and explanation on its reasoning logicoffault
diagnosis and recovery process. This will increase the user
confidence for better adoption.
4. METHODOLOGY
To achieve the consistency between overlay and physical
topology, we rely on nodecommunicationtodeterminenode
ID since the real node communication distance reflects node
physical distances. The process ofembeddingKautzgraphto
a cell is actually the process of Kautz ID assignment. It
involves two steps: actuator ID assignment and sensor ID
assignment. We present the details of each step below.
Actuator ID Assignment
The actuator ID assignment process detects trianglesamong
the neighboring actuators andsequentiallyassignsIDstothe
actuators. For this purpose, we first introduce a distributed
method for a large-scale network and then introduce a
centralized method for a small-scale network.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 997
Sensor ID Assignment
After the actuators in each cell receive their IDs, they select
active sensors in the cell to be Kautz nodes to form a
complete K graph.
REFER Routing Protocol
The REFER routing protocol consists of intra-cell
communication and inter-cell communication. Theintra-cell
communication is developed. This enables a node to quickly
and efficiently determine the different successors of the d-
disjoint paths from itself to the destination node and
corresponding path lengths simply based on node IDs
without relying on an energy-consuming method. The fault-
tolerant routing algorithm in a Kautz graph in the intra-cell
communication. Whennode U initiatesorreceivesa message
destined to node V, it initially chooses its successor in the
shortest path to V (as in the greedy shortest protocol). If the
successor is congested failed or the link to the successor is
broken down. Without the need to notify the source node, U
locally chooses the second shortest path, thirdshortestpath,
and so on until a successor capable of forwarding data is
found. If a number of paths with the same path length exist,
U randomly chooses a successor among these paths. To
forward the message to the successor, the node chooses a
path with the lowest delay [8], which could be eithera multi-
hop path or direct path. After a node receives U’s message, it
repeat the same process in choosing its successor for
message routing.
5. SIMULATION SETUP
In WSA Networks, there is no one-for-all scheme that works
well in scenarios with different network sizes, traffic
overloads, and node mobility patterns. Ns-2 is a discrete
event simulator using in networking research. NS-2 used for
wired and wireless network to provides significant support
for simulation of TCP, routing and multicast protocols. It is
combination of two simulation tools. The network simulator
(ns) contains all commonly used IP protocols. The network
animator (nam), which is use to visualize the simulations.
Ns-2 can fully simulates a layered network fromthephysical
radio transmission channel to high-level applications.
Table: 1 Simulation Parameters
Simulation Parameters Value
Simulator Ns-2 (2.35)
Topology 1200*1000
Propagation Model TwoRayGround
No. of Nodes 0- 55
Bandwidth 3 Mbps
Queue length 340
Packet Size 512 bytes
Simulation Time 20 s
Initial Energy 100 Joules
Routing Protocols DSR
Source node 0
Destination Multiple (35 & 30)
Actuators 50
LAN 4 (51,52,53&54) nodes
6. RESULTS & DISCUSSION
Simulation of the network was performed to detect fire and
to inform to the LAN Network with considering Fault-
Tolerant, Reliable, and Energy Efficient
Fig.1 Deployment of random nodes
Fig 1 shows the Forming a Wireless Mesh link with nodes,
The Environment has dimension of 1200 * 1000. Number of
nodes considered here is 55 and initial energy on each node
was set to 100 joules. Also in this work we considered
Source node as Node 0 and multiple destination nodes as
Node 30 & 35. It is clearly shown in above fig. Node 50 is
considered as Actuator. Lan Network is associated with
nodes 51,52, 53 and 54 respectively.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 998
Fig.2 Fault detection
After that, It checks for fault in the path. If fault is detected, it
searches for the alternate path by using multi-hop
communication. If Path associated with any faults, then it is
detected using fault diagnosis algorithm.
When Base station (BS) receives message from Detectors, it
has to circulate with any one of the Actuators within the
network. These actuators take necessaryactionbasedonthe
type of application required. Here in this work we propose
LAN Network, After collecting information, The primary
actuators/Auxiliary actuators forward those Traffics to the
LAN network.
Fig.3 Fault recovery and Actuators circulates
Detection to LAN
Before Simulation time expires,FaultyRecoveryactions took
place for those fault nodes by selecting a parameter from
configuration Parameters.
In this Section simulation results are presented. Here,
simulations are carried out for 56 wireless mesh nodes. The
performance evaluated by using the following metrics.
1. Packet Delivery Ratio: Packet Delivery Ratio(PDR)isdefined
as the total no of packets successfully received by the
destination to the no of packets sent by the source.
PDR= Number of Packets Received (ACK)/ Number of
Packets Sent (TCP).
Fig. 4 Packet delivery ratio (%)
The PDR specifies the performance of network that how
successfully the packets have been transferred. Larger
values give better results.
2. Throughput: It is defined as Average rate of packets
successfully transferred to their final destination per unit
time.
Fig. 5 Throughput (Kb/S)
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 999
3. Energy Consumption: The average energy consumed for the
mesh network.
Fig. 6 Energy Consumption (J).
7. CONCLUSION
Real-time, energy-efficiency and fault-tolerance are
critical requirements for WSAN applications.Currentrouting
protocols proposed for WSANs fall short in meeting these
requirements. In this paper, we theoretically studied the
properties of the Kautz graph, which shows that it is an
optimal topology for WSANsto meet the requirements.Thus,
we propose REFER, which incorporates a Kautz graph
embedding protocol and an efficient fault-tolerant routing
protocol. REFER’s embedded Kautz topology is consistent
with the physical topology, facilitating realtime
communication. Further, REFER leverages DHT for the
communication between Kautz-based cells for high
scalability.
REFERENCES
[1] L. F. Akyildiz and I. H. Kasimoglu, “Wireless sensor and
actor networks: Research challenges,” Ad Hoc
Netw., vol. 2, no. 4, pp. 351–367, 2004.
[2] J. A. Sanchez, P. M. Ruiz, and I. stojmenovic, “Energy-
efficient geographic multicast routing for sensor
and actuator networks,” Comput. Commun.,
Elsevier, vol. 30, no. 13, pp. 2519–2531, 2007.
[3] E. Ngai, M. R. Lyu, and J. Liu, “A real-time communication
framework for wireless sensor-actuatornetworks,”
presented at the IEEE Aerospace Conf., Big Sky, MT,
USA, 2006.
[4] G. A. Shah, M. Bozyigit, O. B. Akan, and B. Baykal, “Real-
time coordination and routing in wireless sensor
and actor networks,” in Proc. 6th Int. Conf. Next
Generation Teletraffic Wired/Wireless Adv. Netw.,
2006, pp. 365–383.
[5] W. Hu, N. Bulusu, and S. Jha, “A communication paradigm
for hybrid sensor/actuator networks,” in Proc.15th
IEEE Int. Symp. Personal, Indoor Mobile Radio
Commun., 2004, vol. 12, pp. 47–59.
[6] T. Melodia, D. Pompili, V. C. Gungor, and I. F. Akyidi, “A
distributed coordination framework for wireless
sensor and actuator networks,” in Proc. 8th ACMInt.
Symp. Mobile Ad Hoc Netw. Comput., 2005, pp. 99–
110.
[7] P. Bose, P. Morin, I. Stojmenovic, and J. Urrutia, “Routing
with guaranteed delivery in adhoc wireless
networks,” Wireless Netw., vol. 7, no. 6, pp. 609–
616, 2001.
[8] C. Perkins, E. Belding-Royer, and S. Das, “RFC 3561:
Adhoc on demand distance vector (AODV) routing,
2003.
[9] E. P. Charles and P. Bhagwat, “Highly dynamic
destination sequenced distance vector routing
(DSDV) for mobile computers,” ACM Sigcomm
Comput. Commun. Rev., vol. 24, pp. 234–244, 1994.
[10] M. Caesar, M. Castro, E. B. Nightingale, G. O. Shea, and A.
Rowstron, “Virtual ring routing: Network routing
inspired by DHTs,” in Proc. Conf. Appl., Technol.,
Archit., Protocols Comput. Commun., 2006, vol. 36,
pp. 351–362.
[11] A. Awad, R. German, and F. Dressler,“P2P-basedrouting
and data management using the virtual cord
protocol,” in Proc. 13th Annu. ACM Int. Conf. Mobile
Comput. Netw., 2006, pp. 443–444.
[12] H. Shen, Z. Li, and K. Chen, “A scalable and mobility-
resilient data search system for large-scale mobile
wireless networks,” IEEE Parallel Distrib. Syst., vol.
25, no. 5, pp. 1124–1134, Jul. 2013.
[13] S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S.
Shenker, “A scalable content-addressable network,”
in Proc. Conf. Appl., Technol., Archit., Protocols
Comput. Commun., 2001, pp. 161–172.
[14] D. Guo, J. Wu, H. Chen, and X. Luo, “Moore: An
extendable peer to- peer network based on
incomplete kautz digraph with constant degree,” in
Proc. IEEE Conf. Comput. Commun., 2007, pp. 821–
829.

More Related Content

What's hot

A Survey on routing protocols for mobile sink based WSN
A Survey on routing protocols for mobile sink based WSNA Survey on routing protocols for mobile sink based WSN
A Survey on routing protocols for mobile sink based WSN
IRJET Journal
 
Energy efficient routing in wireless sensor network based on mobile sink guid...
Energy efficient routing in wireless sensor network based on mobile sink guid...Energy efficient routing in wireless sensor network based on mobile sink guid...
Energy efficient routing in wireless sensor network based on mobile sink guid...
IJECEIAES
 
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
Editor IJCATR
 
Qos group based optimal retransmission medium access protocol for wireless se...
Qos group based optimal retransmission medium access protocol for wireless se...Qos group based optimal retransmission medium access protocol for wireless se...
Qos group based optimal retransmission medium access protocol for wireless se...
IJCNCJournal
 
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star Topology
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star TopologyA Fault Tolerant Approach to Enhances Wsn Lifetime in Star Topology
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star Topology
IRJET Journal
 
B05630814
B05630814B05630814
B05630814
IOSR-JEN
 
A Fault Tolerant Approach To Enhances WSN Lifetime In Star Topology
A Fault Tolerant Approach To Enhances WSN Lifetime In Star TopologyA Fault Tolerant Approach To Enhances WSN Lifetime In Star Topology
A Fault Tolerant Approach To Enhances WSN Lifetime In Star Topology
IRJET Journal
 
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET Journal
 
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
IRJET Journal
 
Attaining Augmented Overhaul and Profit Maximization in Cognitive Wireless In...
Attaining Augmented Overhaul and Profit Maximization in Cognitive Wireless In...Attaining Augmented Overhaul and Profit Maximization in Cognitive Wireless In...
Attaining Augmented Overhaul and Profit Maximization in Cognitive Wireless In...
paperpublications3
 
A cross layer protocol based on mac and routing protocols for healthcare appl...
A cross layer protocol based on mac and routing protocols for healthcare appl...A cross layer protocol based on mac and routing protocols for healthcare appl...
A cross layer protocol based on mac and routing protocols for healthcare appl...
ijassn
 
De3211001104
De3211001104De3211001104
De3211001104
IJMER
 
A Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health MonitoringA Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health Monitoring
IJEEE
 
Leach wireless sensor ntwrk aa1
Leach wireless sensor ntwrk aa1Leach wireless sensor ntwrk aa1
Optimized Projected Strategy for Enhancement of WSN Using Genetic Algorithms
Optimized Projected Strategy for Enhancement of WSN Using  Genetic AlgorithmsOptimized Projected Strategy for Enhancement of WSN Using  Genetic Algorithms
Optimized Projected Strategy for Enhancement of WSN Using Genetic Algorithms
IJMER
 
A Review Paper on Power Consumption Improvements in WSN
A Review Paper on Power Consumption Improvements in WSNA Review Paper on Power Consumption Improvements in WSN
A Review Paper on Power Consumption Improvements in WSN
IJERA Editor
 
B0470208027
B0470208027B0470208027
B0470208027
ijceronline
 
2 ijcse-01208
2 ijcse-012082 ijcse-01208
2 ijcse-01208
Shivlal Mewada
 
Throughput analysis of energy aware routing protocol
Throughput analysis of energy aware routing protocolThroughput analysis of energy aware routing protocol
Throughput analysis of energy aware routing protocol
eSAT Publishing House
 
Throughput analysis of energy aware routing protocol for real time load distr...
Throughput analysis of energy aware routing protocol for real time load distr...Throughput analysis of energy aware routing protocol for real time load distr...
Throughput analysis of energy aware routing protocol for real time load distr...
eSAT Journals
 

What's hot (20)

A Survey on routing protocols for mobile sink based WSN
A Survey on routing protocols for mobile sink based WSNA Survey on routing protocols for mobile sink based WSN
A Survey on routing protocols for mobile sink based WSN
 
Energy efficient routing in wireless sensor network based on mobile sink guid...
Energy efficient routing in wireless sensor network based on mobile sink guid...Energy efficient routing in wireless sensor network based on mobile sink guid...
Energy efficient routing in wireless sensor network based on mobile sink guid...
 
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
 
Qos group based optimal retransmission medium access protocol for wireless se...
Qos group based optimal retransmission medium access protocol for wireless se...Qos group based optimal retransmission medium access protocol for wireless se...
Qos group based optimal retransmission medium access protocol for wireless se...
 
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star Topology
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star TopologyA Fault Tolerant Approach to Enhances Wsn Lifetime in Star Topology
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star Topology
 
B05630814
B05630814B05630814
B05630814
 
A Fault Tolerant Approach To Enhances WSN Lifetime In Star Topology
A Fault Tolerant Approach To Enhances WSN Lifetime In Star TopologyA Fault Tolerant Approach To Enhances WSN Lifetime In Star Topology
A Fault Tolerant Approach To Enhances WSN Lifetime In Star Topology
 
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
 
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
 
Attaining Augmented Overhaul and Profit Maximization in Cognitive Wireless In...
Attaining Augmented Overhaul and Profit Maximization in Cognitive Wireless In...Attaining Augmented Overhaul and Profit Maximization in Cognitive Wireless In...
Attaining Augmented Overhaul and Profit Maximization in Cognitive Wireless In...
 
A cross layer protocol based on mac and routing protocols for healthcare appl...
A cross layer protocol based on mac and routing protocols for healthcare appl...A cross layer protocol based on mac and routing protocols for healthcare appl...
A cross layer protocol based on mac and routing protocols for healthcare appl...
 
De3211001104
De3211001104De3211001104
De3211001104
 
A Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health MonitoringA Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health Monitoring
 
Leach wireless sensor ntwrk aa1
Leach wireless sensor ntwrk aa1Leach wireless sensor ntwrk aa1
Leach wireless sensor ntwrk aa1
 
Optimized Projected Strategy for Enhancement of WSN Using Genetic Algorithms
Optimized Projected Strategy for Enhancement of WSN Using  Genetic AlgorithmsOptimized Projected Strategy for Enhancement of WSN Using  Genetic Algorithms
Optimized Projected Strategy for Enhancement of WSN Using Genetic Algorithms
 
A Review Paper on Power Consumption Improvements in WSN
A Review Paper on Power Consumption Improvements in WSNA Review Paper on Power Consumption Improvements in WSN
A Review Paper on Power Consumption Improvements in WSN
 
B0470208027
B0470208027B0470208027
B0470208027
 
2 ijcse-01208
2 ijcse-012082 ijcse-01208
2 ijcse-01208
 
Throughput analysis of energy aware routing protocol
Throughput analysis of energy aware routing protocolThroughput analysis of energy aware routing protocol
Throughput analysis of energy aware routing protocol
 
Throughput analysis of energy aware routing protocol for real time load distr...
Throughput analysis of energy aware routing protocol for real time load distr...Throughput analysis of energy aware routing protocol for real time load distr...
Throughput analysis of energy aware routing protocol for real time load distr...
 

Similar to IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless Sensor Actuator Networks using the Real-Time, Fault Tolerant and Energy-Efficiency (REFER) Protocol.

Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
IRJET Journal
 
A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...
A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...
A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...
IRJET Journal
 
ENERGY EFFICIENT MULTIHOP QUALITY PATH BASED DATA COLLECTION IN WIRELESS SENS...
ENERGY EFFICIENT MULTIHOP QUALITY PATH BASED DATA COLLECTION IN WIRELESS SENS...ENERGY EFFICIENT MULTIHOP QUALITY PATH BASED DATA COLLECTION IN WIRELESS SENS...
ENERGY EFFICIENT MULTIHOP QUALITY PATH BASED DATA COLLECTION IN WIRELESS SENS...
Editor IJMTER
 
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
IRJET Journal
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET Journal
 
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor NetworksIRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
IRJET Journal
 
Energetic Slot Allotment for Improving Interchange in Wireless Sensor Network
Energetic Slot Allotment for Improving Interchange in Wireless Sensor NetworkEnergetic Slot Allotment for Improving Interchange in Wireless Sensor Network
Energetic Slot Allotment for Improving Interchange in Wireless Sensor Network
IRJET Journal
 
design & implementation of energy effecient data collection in multiple mobil...
design & implementation of energy effecient data collection in multiple mobil...design & implementation of energy effecient data collection in multiple mobil...
design & implementation of energy effecient data collection in multiple mobil...
mamtha_praksh
 
A Review on Virtual Grid Based Dynamic Routes Adjustment in WSN
A Review on Virtual Grid Based Dynamic Routes Adjustment in WSNA Review on Virtual Grid Based Dynamic Routes Adjustment in WSN
A Review on Virtual Grid Based Dynamic Routes Adjustment in WSN
IRJET Journal
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
ijcsa
 
A Review Paper On Communication Protocols For Wireless Sensor Networks
A Review Paper On Communication Protocols For Wireless Sensor NetworksA Review Paper On Communication Protocols For Wireless Sensor Networks
A Review Paper On Communication Protocols For Wireless Sensor Networks
Bria Davis
 
Building Fault Tolerance Within Wsn-A Topology Model
Building Fault Tolerance Within Wsn-A Topology ModelBuilding Fault Tolerance Within Wsn-A Topology Model
Building Fault Tolerance Within Wsn-A Topology Model
IJAAS Team
 
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor NetworkIRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET Journal
 
Performance evaluation of data filtering approach in wireless sensor networks...
Performance evaluation of data filtering approach in wireless sensor networks...Performance evaluation of data filtering approach in wireless sensor networks...
Performance evaluation of data filtering approach in wireless sensor networks...
ijmnct
 
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORK
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORKLIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORK
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORK
Journal For Research
 
IRJET- Security Efficiency of Transfering the Data for Wireless Sensor Ne...
IRJET-  	  Security Efficiency of Transfering the Data for Wireless Sensor Ne...IRJET-  	  Security Efficiency of Transfering the Data for Wireless Sensor Ne...
IRJET- Security Efficiency of Transfering the Data for Wireless Sensor Ne...
IRJET Journal
 
An effective gossip routing based wireless sensor network framework for fore...
An effective gossip routing based wireless sensor network  framework for fore...An effective gossip routing based wireless sensor network  framework for fore...
An effective gossip routing based wireless sensor network framework for fore...
International Journal of Reconfigurable and Embedded Systems
 
Concepts and evolution of research in the field of wireless sensor networks
Concepts and evolution of research in the field of wireless sensor networksConcepts and evolution of research in the field of wireless sensor networks
Concepts and evolution of research in the field of wireless sensor networks
IJCNCJournal
 
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOSENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
IAEME Publication
 
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOSENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
IAEME Publication
 

Similar to IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless Sensor Actuator Networks using the Real-Time, Fault Tolerant and Energy-Efficiency (REFER) Protocol. (20)

Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
 
A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...
A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...
A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...
 
ENERGY EFFICIENT MULTIHOP QUALITY PATH BASED DATA COLLECTION IN WIRELESS SENS...
ENERGY EFFICIENT MULTIHOP QUALITY PATH BASED DATA COLLECTION IN WIRELESS SENS...ENERGY EFFICIENT MULTIHOP QUALITY PATH BASED DATA COLLECTION IN WIRELESS SENS...
ENERGY EFFICIENT MULTIHOP QUALITY PATH BASED DATA COLLECTION IN WIRELESS SENS...
 
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
 
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor NetworksIRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
 
Energetic Slot Allotment for Improving Interchange in Wireless Sensor Network
Energetic Slot Allotment for Improving Interchange in Wireless Sensor NetworkEnergetic Slot Allotment for Improving Interchange in Wireless Sensor Network
Energetic Slot Allotment for Improving Interchange in Wireless Sensor Network
 
design & implementation of energy effecient data collection in multiple mobil...
design & implementation of energy effecient data collection in multiple mobil...design & implementation of energy effecient data collection in multiple mobil...
design & implementation of energy effecient data collection in multiple mobil...
 
A Review on Virtual Grid Based Dynamic Routes Adjustment in WSN
A Review on Virtual Grid Based Dynamic Routes Adjustment in WSNA Review on Virtual Grid Based Dynamic Routes Adjustment in WSN
A Review on Virtual Grid Based Dynamic Routes Adjustment in WSN
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
 
A Review Paper On Communication Protocols For Wireless Sensor Networks
A Review Paper On Communication Protocols For Wireless Sensor NetworksA Review Paper On Communication Protocols For Wireless Sensor Networks
A Review Paper On Communication Protocols For Wireless Sensor Networks
 
Building Fault Tolerance Within Wsn-A Topology Model
Building Fault Tolerance Within Wsn-A Topology ModelBuilding Fault Tolerance Within Wsn-A Topology Model
Building Fault Tolerance Within Wsn-A Topology Model
 
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor NetworkIRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
 
Performance evaluation of data filtering approach in wireless sensor networks...
Performance evaluation of data filtering approach in wireless sensor networks...Performance evaluation of data filtering approach in wireless sensor networks...
Performance evaluation of data filtering approach in wireless sensor networks...
 
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORK
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORKLIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORK
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORK
 
IRJET- Security Efficiency of Transfering the Data for Wireless Sensor Ne...
IRJET-  	  Security Efficiency of Transfering the Data for Wireless Sensor Ne...IRJET-  	  Security Efficiency of Transfering the Data for Wireless Sensor Ne...
IRJET- Security Efficiency of Transfering the Data for Wireless Sensor Ne...
 
An effective gossip routing based wireless sensor network framework for fore...
An effective gossip routing based wireless sensor network  framework for fore...An effective gossip routing based wireless sensor network  framework for fore...
An effective gossip routing based wireless sensor network framework for fore...
 
Concepts and evolution of research in the field of wireless sensor networks
Concepts and evolution of research in the field of wireless sensor networksConcepts and evolution of research in the field of wireless sensor networks
Concepts and evolution of research in the field of wireless sensor networks
 
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOSENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
 
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOSENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
ssuser36d3051
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
yokeleetan1
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
mahammadsalmanmech
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
heavyhaig
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 

Recently uploaded (20)

Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 

IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless Sensor Actuator Networks using the Real-Time, Fault Tolerant and Energy-Efficiency (REFER) Protocol.

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 994 Multipath Based Routing and Energy Efficient Multicasting for Wireless Sensor Actuator Networks Using The Real-Time, Fault Tolerant and Energy-Efficiency (REFER) Protocol. Manikya P N1 , Hanumanthappa S N2 1 PG student, Electrical and Electronics Department, UBDT College of Engineering, Davangere 2 Assistant Professor of Electronics &Communication Department, UBDT College of Engineering, Davangere ----------------------------------------------------------------------------***----------------------------------------------------------------------------- Abstract - Wireless sensor and actuator networks (WSANs) are composed of sensors and actuators to perform distributed sensing and actuating tasks. Most WSANapplications(e.g., fire detection) demand that actuators rapidlyrespondtoobserved events. Therefore, real-time (i.e., fast) and fault-tolerant transmission is a critical requirement in WSAN’s to enable sensed data to reach actuators reliably and quickly. Due to limited power resources, energy-efficiency is another crucial requirement. Such requirements become formidably challenging in large-scale WSANs. However, existing WSANs fall short in meeting these requirements. To this end, we first theoretically study the Kautz graph for its applicability in WSANs to meet these requirements. We then propose a Kautz-based real-time, Fault-tolerant and Energy-efficient WSAN (REFER). REFERembedsKautzgraphs into the physical topology of a WSAN for real-time communication and connects the Kautz graphs using distributed hash table (DHT) for high scalability. We also theoretically study routing paths in the Kautz graph, basedon which we develop an efficient fault-tolerant routing protocol. It enables a relay node to quickly and efficiently identify the next shortest path from itself to the destination based only on node IDs upon routing failure, rather than relying on retransmission from the source. Key Words: WSAN, Fault Detection,FaultDiagnosis,Fault Recovery, Network Measurements. 1. INTRODUCTION A wireless sensor network (WSN) is a collection of low-cost, low-power and multi-functionality wireless sensing devices that can be densely deployed for surveillance purpose. Traditionally, it is used for data gathering by sampling surroundings and reporting to predefined data sinks. As hardware technology advances, it is now evolving toward service-oriented wireless sensor and actuator networks (WSANs) [1]. A WSAN consists of sensor nodes capable of measuring stimuli in the environment and actuator nodes capable of affectingtheirlocal environment.Similarto WSNs, WSAN sensors usually are low-cost and low power devices with a short transmission range that are usedforthesensing a physical phenomenon. WSAN actuators are resource-rich devices characterizedbyhigherprocessingandtransmission capabilities and a longer battery life. When sensors detect events, they process and transmit the event data to their nearby actuators, which take action on the events. WSANs can potentially be used in applications such as real-time target tracking and surveillance,homeland security, chemical attack detection and environment monitoring in battlefields, factories, buildings and cities. For example, smoke detectors (i.e., sensors) deployed in a building report detected fire events to sprinklers (i.e., actuators); Sensors deployed in a battlefield report their detected malicious objects to actuators, which immediately takes action accordingly. Since sensorsaredenselydeployed to ensure the coverageandtopologyconnectivityusually,the scenario we considered in this paper is a highly dense and mobile WSAN which consists of densely populated and possibly mobile sensors. Actuators need to quickly and reliably respond to nearby sensed events. Delay response may lead to disastrous consequences such as a large loss of life.Therefore,real-time (i.e., very fast) communication is of great importance in guaranteeing the timely actions. Because of node mobility and resultant routing failures, fault-tolerance is crucial to ensure reliable node communication. In addition, energy- efficiency is also a critical requirement for WSANs due to limited resources of sensors. Such requirements become formidably challenging inlarge-scaleWSANs (e.g.,battlefield monitoring applications) where the number of sensors is in the order of hundreds or thousands [2]. Most of the routing protocols for mobile ad hoc networks (MANETs) and WSNs treat every node equally and fail to leverage the capabilities of resource-rich devices to reduce the communication burden on low-resource sensors. These protocols are suboptimal for WSANs. Recently, mesh-based [3], [4] and tree-based [5], [6] systems have been proposed for data transmission in WSANs.Inthemesh-basedmethods, physically close sensors form a cluster and the cluster head reports their sensed events to the closest actuator througha multi-hop path. In the tree-based methods, physically close sensors form a tree for data transmission.Inbothmethods,a source node must retransmit a message upon a routing failure. With the capability of self-organization and self configuration in a wireless network, The nodes in a network are deploy incrementally, one node at a time, as needed. As number of node mount increases, users experience with increase in reliability and connectivity issues accordingly. It
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 995 is intended to do rather for reliability and affords access networks in smaller regions. It is desirable to provide Self reconfigurable Fault Tolerance for any large-scale network supporting many users and a diverse set ofapplications.Reconfigurablefaultmanagement aims to automate many of the fault tolerance task by continuously monitoring network condition for self- awareness, analyzing the fault after it is detected for self- diagnosis, and taking adaptation actions for self-recovery. Thus it potentially reduces human efforts and responds to the faults faster. Fault Management is a fairly young research field, in this paper we discuss on faults, fault recovery, Extensive experimental results demonstratethesuperiorperformance of REFER in comparison with existing WSAN systems in terms of real-time communication, energy-efficiency, fault- tolerance and scalability. The rest of the paper is organized as follows: Section II presents Related work on WSAN’s, Fault DiagnosisandFault Recovery is described in section III. Section IV includes Methodology and Sections V and VI presents Simulation setup and Results. and in Section VII Conclusions were drawn. 2. RELATED WORK WSNs can be regarded as a subcategory of MANETs with additional constraints of security and energy-efficiency. WSANs are a subcategory ofWSNs with higher requirements on real-time,energy-efficientandfault-toleranttransmission. MANETs use either topological routing [8], [9], [20] or geographic routing [7]. AODV [8] and DSR [20] are reactive routing protocols, in which a source nodebroadcastsaquery to find a path to the destination. DSDV [9] is a proactive routing algorithm, in which each node maintains and periodically updates a routing table by message flooding. Keeping a complete routing table reduces route acquisition latency for data transmission. However, its correctoperation dependsonitsperiodicalglobaldisseminationofconnectivity information, leading to low scalability. Further, the limited battery power of the sensors makes such routing unsuitable for WSANs. Geographical routing always chooses the node closest to the destination by relying on the position information generated by GPS or a virtual coordination method [10], [11], [12],bothconsumeaconsiderableamount of energy, which are also not suitable for WSANs. Many routing algorithms have been proposed for WSNs. Pottner et al. [21] introduced a heuristic to calculate a schedule that cansupportthegivenapplicationrequirements in terms of data delivery latency andreliabilityanddescribed methods and tools to collect the data necessary as input for schedule calculation. He et al. [22] investigated the on demand scenario where data collection requests arrive at the mobile element progressively, and modelled the data collection process as a queuing system. Based on this model, the authors evaluated the performance of data collection through both theoretical analysis and extensive simulation. Ji et al. [23] introduced a more reasonable model, probabilistic network model,forthenetworkcapacityofdata collection. They proposed a cell-based path scheduling(CPS) algorithm for snapshot data collection, and proposed a zone based pipeline scheduling (ZPS) algorithm for continuous data collection. Vazifehdan et al. [28] proposed two energy-aware routing algorithms for WANET, called reliable minimum energy cost routing (RMECR) and reliable minimum energy routing (RMER). However, the above methods need to retransmit a message from the source to the destination upon a routing failure, generating a certain delay. Also, most of these methods are not energy efficient due to their flooding based topological or geographical routing components. REFER is superior to the previous WSAN routing protocols because it can simultaneously meet the requirements of real-time communication, fault-tolerance and energy-efficiency. Most previous research on Kautz graphs focus on exploiting the Kautz graph in the application layer of P2P networks [14], [15], [16]. Zuo et al. [17] proposed to build a Kautz graph overlay on the application layer of a MANET in order to enhance the routing performance. However, due to the topology inconsistency, the methodusesMANETmulti-hoproutingfor the communication between two neighboring Kautz nodes. Ravikumar et al. [29] and Li et al. [16] studied the shortest and longest path routing. In BAKE [15]andDFTR[18],anode uses the next shortest path when it fails to forward the message along the shortest path. However, a node needs to use a routing generation algorithm(equivalenttotheprocess of building a tree) to find different routes to a destination nodeand calculate their lengths, which generate high energy consumption. Imase et al. [30] identified the bounds of the three possible path lengths in the worst case, but they did not indicate all disjoint paths, the precise path lengthand the corresponding conditions, which are identified in REFER.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 996 3. FAULT DIAGNOSIS A. Sources of Faults Mesh routers helps to connect mesh networkswithdifferent wireless networks. Hence WMNs are termed as standalone devices. It provides greater range of data transfer rates in the networks. In wireless communication,protocolsusedfor communication are at small cost. So, there are more chances of packet losses and node failures. Informationtransmission generally starts from source node to specified destination node. There are a numerous faults occur ina meshtopology,which are categorized as follows.  Transmission link fault: noise by external source, fading of multi-path, interferences which are strong, and client’s misbehavior are some of the reasons included, to show why fault occurs. Link in these networks experiences higher loss rate or long delays.  Network element fault: Reasons for fault to occur because of failing in single mesh devices, hardware failures, power supply fails, and software crashes.  Mesh protocol fault: black hole and route loops are created by routingprotocol undersomecircumstances. Extremely quick decrease is observed in network throughput and flapping route, which are reasons of routing protocols. Protocols of Mesh routing are developed in order to reclaim faults from failure in path, and it can still give few un-preferred complications.  Traffic congestion. As network quantity exceeds the link capacity, a network can experience important profusion or even disintegrate if not managed correctly. B. Taxonomy of Fault tolerant Techniques Recent research has developed several techniques that deal with different types of faults at different layers of network stack. To assist in understanding the assumptions,focus and intuitions behind the design and development of these techniques. We borrow the taxonomy of different fault tolerant techniques used in traditional distributed systems.  Fault Prevention: This is to avoid or prevent faults.  Fault Detection: This is to use differentmetricstocollect symptoms of possible faults.  Fault Isolation: This is to correlate different types of fault indications received from the network, and propose various fault hypotheses.  Fault Identification: This is to test each of the proposed hypotheses in order to precisely localize and identify faults.  Fault Recovery: This is to treat faults, i.e., reverse their adverse effects. Note that there do exist some techniques that address a combination of all these aspects. In fact, these techniques operate at different layers of the network protocol stack. Most Fault avoidance techniques operate in the network layer, adding redundancy in routingpaths;a majorityoffault detection and recovery techniques operate at the transport layer; and a few fault recovery techniques perform at the application layer, concealing faults during off-line data processing. In this paper, we use the above taxonomy to systematically summarize and compare the fault tolerant techniques that are potentially useful. Isolation of faults that is checking location of faults, identification of faults, that is detection of fault type are present in Fault diagnosis. Locating the faults and even determining links faults or failure in nodes is relatively easy by sufficient measurement. Pinpointing will be a challenge for faults in route cause, where faults will be corrected making recovery decisions automatically by the system. In- accurate adaptations are made and routecauseassumptions are made by some of existing solutions. The reconfiguration fault recovery approaches need to address three significant challenges. First the network measurements must allow accurate reconstructions of network models, otherwise the computed recovery actions could be misleading. Another challenge is that finding a suitable configuration in a large solution space must be fast enough, otherwise the network dynamics may render the returned solution no longer applicable. Finally, a Fault management must support human understanding by providing logs and explanation on its reasoning logicoffault diagnosis and recovery process. This will increase the user confidence for better adoption. 4. METHODOLOGY To achieve the consistency between overlay and physical topology, we rely on nodecommunicationtodeterminenode ID since the real node communication distance reflects node physical distances. The process ofembeddingKautzgraphto a cell is actually the process of Kautz ID assignment. It involves two steps: actuator ID assignment and sensor ID assignment. We present the details of each step below. Actuator ID Assignment The actuator ID assignment process detects trianglesamong the neighboring actuators andsequentiallyassignsIDstothe actuators. For this purpose, we first introduce a distributed method for a large-scale network and then introduce a centralized method for a small-scale network.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 997 Sensor ID Assignment After the actuators in each cell receive their IDs, they select active sensors in the cell to be Kautz nodes to form a complete K graph. REFER Routing Protocol The REFER routing protocol consists of intra-cell communication and inter-cell communication. Theintra-cell communication is developed. This enables a node to quickly and efficiently determine the different successors of the d- disjoint paths from itself to the destination node and corresponding path lengths simply based on node IDs without relying on an energy-consuming method. The fault- tolerant routing algorithm in a Kautz graph in the intra-cell communication. Whennode U initiatesorreceivesa message destined to node V, it initially chooses its successor in the shortest path to V (as in the greedy shortest protocol). If the successor is congested failed or the link to the successor is broken down. Without the need to notify the source node, U locally chooses the second shortest path, thirdshortestpath, and so on until a successor capable of forwarding data is found. If a number of paths with the same path length exist, U randomly chooses a successor among these paths. To forward the message to the successor, the node chooses a path with the lowest delay [8], which could be eithera multi- hop path or direct path. After a node receives U’s message, it repeat the same process in choosing its successor for message routing. 5. SIMULATION SETUP In WSA Networks, there is no one-for-all scheme that works well in scenarios with different network sizes, traffic overloads, and node mobility patterns. Ns-2 is a discrete event simulator using in networking research. NS-2 used for wired and wireless network to provides significant support for simulation of TCP, routing and multicast protocols. It is combination of two simulation tools. The network simulator (ns) contains all commonly used IP protocols. The network animator (nam), which is use to visualize the simulations. Ns-2 can fully simulates a layered network fromthephysical radio transmission channel to high-level applications. Table: 1 Simulation Parameters Simulation Parameters Value Simulator Ns-2 (2.35) Topology 1200*1000 Propagation Model TwoRayGround No. of Nodes 0- 55 Bandwidth 3 Mbps Queue length 340 Packet Size 512 bytes Simulation Time 20 s Initial Energy 100 Joules Routing Protocols DSR Source node 0 Destination Multiple (35 & 30) Actuators 50 LAN 4 (51,52,53&54) nodes 6. RESULTS & DISCUSSION Simulation of the network was performed to detect fire and to inform to the LAN Network with considering Fault- Tolerant, Reliable, and Energy Efficient Fig.1 Deployment of random nodes Fig 1 shows the Forming a Wireless Mesh link with nodes, The Environment has dimension of 1200 * 1000. Number of nodes considered here is 55 and initial energy on each node was set to 100 joules. Also in this work we considered Source node as Node 0 and multiple destination nodes as Node 30 & 35. It is clearly shown in above fig. Node 50 is considered as Actuator. Lan Network is associated with nodes 51,52, 53 and 54 respectively.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 998 Fig.2 Fault detection After that, It checks for fault in the path. If fault is detected, it searches for the alternate path by using multi-hop communication. If Path associated with any faults, then it is detected using fault diagnosis algorithm. When Base station (BS) receives message from Detectors, it has to circulate with any one of the Actuators within the network. These actuators take necessaryactionbasedonthe type of application required. Here in this work we propose LAN Network, After collecting information, The primary actuators/Auxiliary actuators forward those Traffics to the LAN network. Fig.3 Fault recovery and Actuators circulates Detection to LAN Before Simulation time expires,FaultyRecoveryactions took place for those fault nodes by selecting a parameter from configuration Parameters. In this Section simulation results are presented. Here, simulations are carried out for 56 wireless mesh nodes. The performance evaluated by using the following metrics. 1. Packet Delivery Ratio: Packet Delivery Ratio(PDR)isdefined as the total no of packets successfully received by the destination to the no of packets sent by the source. PDR= Number of Packets Received (ACK)/ Number of Packets Sent (TCP). Fig. 4 Packet delivery ratio (%) The PDR specifies the performance of network that how successfully the packets have been transferred. Larger values give better results. 2. Throughput: It is defined as Average rate of packets successfully transferred to their final destination per unit time. Fig. 5 Throughput (Kb/S)
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 999 3. Energy Consumption: The average energy consumed for the mesh network. Fig. 6 Energy Consumption (J). 7. CONCLUSION Real-time, energy-efficiency and fault-tolerance are critical requirements for WSAN applications.Currentrouting protocols proposed for WSANs fall short in meeting these requirements. In this paper, we theoretically studied the properties of the Kautz graph, which shows that it is an optimal topology for WSANsto meet the requirements.Thus, we propose REFER, which incorporates a Kautz graph embedding protocol and an efficient fault-tolerant routing protocol. REFER’s embedded Kautz topology is consistent with the physical topology, facilitating realtime communication. Further, REFER leverages DHT for the communication between Kautz-based cells for high scalability. REFERENCES [1] L. F. Akyildiz and I. H. Kasimoglu, “Wireless sensor and actor networks: Research challenges,” Ad Hoc Netw., vol. 2, no. 4, pp. 351–367, 2004. [2] J. A. Sanchez, P. M. Ruiz, and I. stojmenovic, “Energy- efficient geographic multicast routing for sensor and actuator networks,” Comput. Commun., Elsevier, vol. 30, no. 13, pp. 2519–2531, 2007. [3] E. Ngai, M. R. Lyu, and J. Liu, “A real-time communication framework for wireless sensor-actuatornetworks,” presented at the IEEE Aerospace Conf., Big Sky, MT, USA, 2006. [4] G. A. Shah, M. Bozyigit, O. B. Akan, and B. Baykal, “Real- time coordination and routing in wireless sensor and actor networks,” in Proc. 6th Int. Conf. Next Generation Teletraffic Wired/Wireless Adv. Netw., 2006, pp. 365–383. [5] W. Hu, N. Bulusu, and S. Jha, “A communication paradigm for hybrid sensor/actuator networks,” in Proc.15th IEEE Int. Symp. Personal, Indoor Mobile Radio Commun., 2004, vol. 12, pp. 47–59. [6] T. Melodia, D. Pompili, V. C. Gungor, and I. F. Akyidi, “A distributed coordination framework for wireless sensor and actuator networks,” in Proc. 8th ACMInt. Symp. Mobile Ad Hoc Netw. Comput., 2005, pp. 99– 110. [7] P. Bose, P. Morin, I. Stojmenovic, and J. Urrutia, “Routing with guaranteed delivery in adhoc wireless networks,” Wireless Netw., vol. 7, no. 6, pp. 609– 616, 2001. [8] C. Perkins, E. Belding-Royer, and S. Das, “RFC 3561: Adhoc on demand distance vector (AODV) routing, 2003. [9] E. P. Charles and P. Bhagwat, “Highly dynamic destination sequenced distance vector routing (DSDV) for mobile computers,” ACM Sigcomm Comput. Commun. Rev., vol. 24, pp. 234–244, 1994. [10] M. Caesar, M. Castro, E. B. Nightingale, G. O. Shea, and A. Rowstron, “Virtual ring routing: Network routing inspired by DHTs,” in Proc. Conf. Appl., Technol., Archit., Protocols Comput. Commun., 2006, vol. 36, pp. 351–362. [11] A. Awad, R. German, and F. Dressler,“P2P-basedrouting and data management using the virtual cord protocol,” in Proc. 13th Annu. ACM Int. Conf. Mobile Comput. Netw., 2006, pp. 443–444. [12] H. Shen, Z. Li, and K. Chen, “A scalable and mobility- resilient data search system for large-scale mobile wireless networks,” IEEE Parallel Distrib. Syst., vol. 25, no. 5, pp. 1124–1134, Jul. 2013. [13] S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker, “A scalable content-addressable network,” in Proc. Conf. Appl., Technol., Archit., Protocols Comput. Commun., 2001, pp. 161–172. [14] D. Guo, J. Wu, H. Chen, and X. Luo, “Moore: An extendable peer to- peer network based on incomplete kautz digraph with constant degree,” in Proc. IEEE Conf. Comput. Commun., 2007, pp. 821– 829.