This document summarizes an initial survey on fault tolerance and implementation in wireless sensor networks. It discusses wireless sensor networks and their applications. It covers sources of faults like node, network, and sink faults. It also discusses different fault tolerance techniques like preventive and curative. Fault tolerance can be implemented at different layers like hardware, software, and network communication layers. The document surveys existing literature on fault tolerance classification and mechanisms to improve reliability, survivability and performance in wireless sensor networks.
Wireless Sensor Networks (WSNs) are distributed and independent sensors that are connected and worked together to measure quantities such as temperature, humidity, pressure, noise levels or vibrations. WSNs can measure vehicular movement (velocity, location, etc.) and monitor conditions such as lightning condition, soil makeup and motion. Nowadays, WSNs are utilized in many common applications such as vehicle applications. Some of vehicle applications are: vehicle tracking and detection, tire pressure monitoring, vehicle speed detection, vehicle direction indicator, traffic control, reversing aid sensors etc. Such applications can be divided in major categories such as safety, security, environment and logistics. To implement WSN in an application and have an efficient system, we need to consider about WSN technology, and its components. This paper is aimed at providing reliable software architecture of WSN that could be implemented for better performance and working.
Data acquisition and storage in Wireless Sensor NetworkRutvik Pensionwar
1. Introduce to Wireless Sensor Network and various data retrieval techniques.
2. Present different algorithms used in Wireless Sensor Network to achieve efficiency and manage power effectively.
in this paper authors made the study of basic clustering algorithm Leach. A comparison is made between Leach and Leach.wireless sensor network advantages, and wireless sensor network dataset
Wireless Sensor Networks (WSNs) are distributed and independent sensors that are connected and worked together to measure quantities such as temperature, humidity, pressure, noise levels or vibrations. WSNs can measure vehicular movement (velocity, location, etc.) and monitor conditions such as lightning condition, soil makeup and motion. Nowadays, WSNs are utilized in many common applications such as vehicle applications. Some of vehicle applications are: vehicle tracking and detection, tire pressure monitoring, vehicle speed detection, vehicle direction indicator, traffic control, reversing aid sensors etc. Such applications can be divided in major categories such as safety, security, environment and logistics. To implement WSN in an application and have an efficient system, we need to consider about WSN technology, and its components. This paper is aimed at providing reliable software architecture of WSN that could be implemented for better performance and working.
Data acquisition and storage in Wireless Sensor NetworkRutvik Pensionwar
1. Introduce to Wireless Sensor Network and various data retrieval techniques.
2. Present different algorithms used in Wireless Sensor Network to achieve efficiency and manage power effectively.
in this paper authors made the study of basic clustering algorithm Leach. A comparison is made between Leach and Leach.wireless sensor network advantages, and wireless sensor network dataset
Advanced Software Engineering course - Guest Lecture
A4WSN- Architecture 4 Wireless Sensor Networks
Here you can find the research paper presenting the concepts described in this lecture: http://goo.gl/XBB4k
This presentation has been developed in the context of the Advanced Software Engineering course at the DISIM Department of the University of L’Aquila (Italy).
http://www.di.univaq.it/malavolta
INTRODUCTION TO WIRELESS SENSOR NETWORKS.
This powerpoint generally defines Wireless Sensor Networks, the advantages, disadvantages and the general types.
Design Issues and Applications of Wireless Sensor Networkijtsrd
Efficient design and implementation of wireless sensor networks has become a hot area of research in recent years, due to the vast potential of sensor networks to enable applications that connect the physical world to the virtual world. By networking large numbers of tiny sensor nodes, it is possible to obtain data about physical phenomena that was difficult or impossible to obtain in more conventional ways. In future as advances in micro-fabrication technology allow the cost of manufacturing sensor nodes to continue to drop, increasing deployments of wireless sensor networks are expected, with the networks eventually growing to large numbers of nodes.Potential applications for such large-scale wireless sensor networks exist in a variety of fields, including medical monitoring, environmental monitoring, surveillance, home security, military operations, and industrial machine monitoring etc. G. Swarnalatha | R. Srilalitha"Design Issues and Applications of Wireless Sensor Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-6 , October 2017, URL: http://www.ijtsrd.com/papers/ijtsrd4688.pdf http://www.ijtsrd.com/engineering/computer-engineering/4688/design-issues-and-applications-of-wireless-sensor-network/g-swarnalatha
wireless sensor networks using zigbee and wifisunil raj kumar
the ppt presents a brief view of how we can transmit zigbee collected data to wifi transceiver and flow chart ,block diagram gives you a clear idea of how data are transmitting
Design Issues and Challenges in Wireless Sensor NetworksKhushbooGupta145
Wireless Sensor Networks (WSNs) are composed self-organized wireless ad hoc networks which comprise of a large number of resource constrained sensor nodes. The major areas of research in WSN is going on hardware, and operating system of WSN, deployment, architecture, localization, synchronization, programming models, data aggregation and dissemination, database querying, architecture, middleware, quality of service and security. This paper study highlights ongoing research activities and issues that affect the design and performance of Wireless Sensor Network.
Advanced Software Engineering course - Guest Lecture
A4WSN- Architecture 4 Wireless Sensor Networks
Here you can find the research paper presenting the concepts described in this lecture: http://goo.gl/XBB4k
This presentation has been developed in the context of the Advanced Software Engineering course at the DISIM Department of the University of L’Aquila (Italy).
http://www.di.univaq.it/malavolta
INTRODUCTION TO WIRELESS SENSOR NETWORKS.
This powerpoint generally defines Wireless Sensor Networks, the advantages, disadvantages and the general types.
Design Issues and Applications of Wireless Sensor Networkijtsrd
Efficient design and implementation of wireless sensor networks has become a hot area of research in recent years, due to the vast potential of sensor networks to enable applications that connect the physical world to the virtual world. By networking large numbers of tiny sensor nodes, it is possible to obtain data about physical phenomena that was difficult or impossible to obtain in more conventional ways. In future as advances in micro-fabrication technology allow the cost of manufacturing sensor nodes to continue to drop, increasing deployments of wireless sensor networks are expected, with the networks eventually growing to large numbers of nodes.Potential applications for such large-scale wireless sensor networks exist in a variety of fields, including medical monitoring, environmental monitoring, surveillance, home security, military operations, and industrial machine monitoring etc. G. Swarnalatha | R. Srilalitha"Design Issues and Applications of Wireless Sensor Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-6 , October 2017, URL: http://www.ijtsrd.com/papers/ijtsrd4688.pdf http://www.ijtsrd.com/engineering/computer-engineering/4688/design-issues-and-applications-of-wireless-sensor-network/g-swarnalatha
wireless sensor networks using zigbee and wifisunil raj kumar
the ppt presents a brief view of how we can transmit zigbee collected data to wifi transceiver and flow chart ,block diagram gives you a clear idea of how data are transmitting
Design Issues and Challenges in Wireless Sensor NetworksKhushbooGupta145
Wireless Sensor Networks (WSNs) are composed self-organized wireless ad hoc networks which comprise of a large number of resource constrained sensor nodes. The major areas of research in WSN is going on hardware, and operating system of WSN, deployment, architecture, localization, synchronization, programming models, data aggregation and dissemination, database querying, architecture, middleware, quality of service and security. This paper study highlights ongoing research activities and issues that affect the design and performance of Wireless Sensor Network.
sensors are what we experience the most in our life. they are even working in our body in different aspects. they may be as eyes, ears, skin, tongue etc. when we combine them they make a network. it may be a human sensor network. but i have shared something interesting about wireless sensor networks.
RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or solid-state drives (SSDs) to protect data in the case of a drive failure.
ITU-T requirement for cloud and cloud deployment modelHitesh Mohapatra
List and explain the functional requirements for networking as per the ITU-T technical report. List and explain cloud deployment models and list relative strengths and weaknesses of the deployment models with neat diagram.
Medium:
Maximum Level sum of a Binary Tree
Jump Game III
Minesweeper
Binary Tree Level Order Traversal
Number of operations to make network connected
Open the lock
Hard:
Sliding Puzzle
Trapping Rain Water II
Trie Data Structure
LINK: https://leetcode.com/tag/trie/
Easy:
1. Longest Word in Dictionary
Medium:
1. Count Substrings That Differ by One Character
2. Replace Words
3. Top K Frequent Words
4. Maximum XOR of Two Numbers in an Array
5. Map Sum Pairs
Hard:
1. Concatenated Words
2. Word Search II
Basic commands for powershell : Configuring Windows PowerShell and working wi...Hitesh Mohapatra
Configuring Windows PowerShell and working with basic commands
• Configuring the Windows PowerShell console
• Configuring the Windows PowerShell ISE application
• Finding commands
• Running commands
• Using the About files
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
3. INTRODUCTION
• Sensor networks are highly distributed networks of small, lightweight
wireless node, deployed in large numbers to monitor the environment
or system.
• Each node of the sensor networks consist of three subsystem:
• Sensor subsystem: senses the environment
• Processing subsystem: performs local computations on the sensed data
• Communication subsystem: responsible for message exchange with
neighboring sensor nodes
• The features of sensor nodes
• Limited sensing region, processing power, energy
4. PROPERTIES
• The advantage of sensor networks
• Robust : a large number of sensors
• Reliable :
• Accurate : sensor networks covering a wider region
• Fault-tolerant : many nodes are sensing the same event
• Two important operations in a sensor networks
• Data dissemination : the propagation of data/queries throughout the
network
• Data gathering : the collection of observed data from the individual sensor
nodes to a sink
• The different types of sensors
• Seismic, thermal, visual, infrared
5. APPLICATIONS OF SENSOR NETWORKS
• Using in military
• Battlefield surveillance and monitoring, guidance systems of intelligent
missiles, detection of attack by weapons of mass destruction such as
chemical, biological, or nuclear
• Using in nature
• Forest fire, flood detection, habitat exploration of animals
• Using in health
• Monitor the patient’s heart rate or blood pressure, and sent regularly to
alert the concerned doctor, provide patients a greater freedom of
movement
6. MORE APPLICATIONS
• Using in home (smart home)
• Sensor node can built into appliances at home, such as ovens, refrigerators,
and vacuum cleaners, which enable them to interact with each other and
be remote-controlled
• Using in office building
• Airflow and temperature of different parts of the building can be
automatically controlled
• Using in warehouse
• Improve their inventory control system by installing sensors on the
products to track their movement
7. ISSUES AND CHALLENGES IN
DESIGNING A SENSOR NETWORK
• Issues and Challenges
• Sensor nodes are randomly deployed and hence do not fit into any regular
topology. Once deployed, they usually do not require any human
intervention. Hence, the setup and maintenance of the network should be
entirely autonomous.
• Sensor networks are infrastructure-less. Therefore, all routing and
maintenance algorithms need to be distributed.
• Energy problem
• Hardware and software should be designed to conserve power
• Sensor nodes should be able to synchronize with each other in a
completely distributed manner, so that TDMA schedules can be imposed.
• A sensor network should also be capable of adapting to changing
connectivity due to the failure of nodes, or new nodes powering up. The
routing protocols should be able to dynamically include or avoid sensor
nodes in their paths.
8. CONT..
• Real-time communication over sensor networks must be supported
through provision of guarantees on maximum delay, minimum
bandwidth, or other QoS parameters.
• Provision must be made for secure communication over sensor
networks, especially for military applications which carry sensitive
data.
9. SENSOR NETWORK ARCHITECTURE
• The two basic kinds of sensor network architecture
• Layered Architecture
• Clustered Architecture
10. LAYERED ARCHITECTURE
• A layered architecture has a single powerful base station, and the layers
of sensor nodes around it correspond to the nodes that have the same
hop-count to the BS.
• In the in-building scenario, the BS acts an access point to a wired
network, and small nodes form a wireless backbone to provide wireless
connectivity.
• The advantage of a layered architecture is that each node is involved
only in short-distance, low-power transmissions to nodes of the
neighboring layers.
12. CLUSTERED ARCHITECTURE
• A clustered architecture organizes the sensor nodes into clusters, each
governed by a cluster-head. The nodes in each cluster are involved in
message exchanges with their cluster-heads, and these heads send
message to a BS.
• Clustered architecture is useful for sensor networks because of its
inherent suitability for data fusion. The data gathered by all member of
the cluster can be fused at the cluster-head, and only the resulting
information needs to be communicated to the BS.
• The cluster formation and election of cluster-heads must be an
autonomous, distributed process.
14. INTRODUCTION to FAULT:
WHAT IS FAULT TOLERANCE
•Monitored and tolerated in order to provide a good
performance for the users throughout the network.
•WHY FAULT TOLERANCE
Reliability
Survivability
Performance
15. RELIABILITY:
• Our goal is to maximize the network reliability at its design
life.
• As dependence on mobile terminals increases, users will
demand the same system functionality, in terms of reliable
service.
• Reliability techniques comprise of the following phases.
• Fault confinement
• Fault detection
• Fault latency
16. SURVIVABILITY:
• Survivability is used to describe the available performance
of a network after a failure.
•Strategies to improve network survivability can be classified
into three categories:
-> Prevention,
-> Network design and capacity allocation,
->Traffic management and restoration.
•The ideal survivability goal is to make a network failure
imperceptible to the user by providing service continuity and
minimizing network congestion.
17. Survivability issues in wireless networks must take into account
these unique characteristics:
• user mobility,
• power conservation in mobile terminals,
• security (encryption and authentication),
• the poor quality of radio links (in comparison to wired
equivalents),
• channel capacity that is limited by a regulated frequency
spectrum.
18. PERFORMANCE
•Various issues and factors are considered for good performance of the
network. In order to achieve over all good performance of the network
fault tolerant techniques are implemented at various levels.
For example, Recovery
•Recovery is a process where the type of the faults is identified and new
clusters are allocated to the sensors.
•When the gateway is identified as failure all sensors in its clusters are
recovered.
•The status message is parsed to extract the identity of sensors that cannot
communicate with the gateway due to range faults in the gateways.
•Clustering is based on the distance between the sensors and gateways.
•During clustering each gateway creates a range set based on the
communication range of the sensors and the gateways.
19. TYPES OF CONCERNS IN FAULT TOLERANCES:
• Node Faults
• Network Faults
• Sink Faults
• Hardware Layer
• Software Layer
• Network Communication Layer
• Application Layer
20. PREVENTIVE TECHNIQUES
• This category includes all the techniques that attempt to prevent failure
by improving the use of the available resources and/or implementing
different alternatives that provide the same service in such a way that a
failure does not affect the continuity of the service.
• It can be distinguished in two level :
• Node Level
• Network Level
21. CURATIVE TECHNIQUE
• The techniques belonging to this class are triggered when a problem is
noticed in the network functioning.
• They attempt to recover the failure in order to resume the data sensing
and/or transmission.
• The recovery is done by replacing failed components by new ones.
There placement not means necessarily adding new components, but
activating redundant nodes which are in sleeping mode or relocating
some nodes to guarantee the service providing continuity.
22. SOME MORE CLASSIFICATION
• The second criterion for the classification of the
fault tolerance mechanisms is its main objective
when proposed. This criterion allows organizing the
mechanisms in four main classes:
• energy or power management
• flow management
• data management and coverage
• connectivity management
24. CONCLUSION
Study of fault tolerance in each layer and different type of
implementations done to each layer and different algorithms proposed in
order to over come faults in the network.
Algorithm-based fault tolerance techniques can achieve high
performance, tolerate physical failures in the system, and still produce
correct results.
25. REFERENCES
• “A survey on fault tolerance in small and large scale wireless sensor networks”
Samira Chouikhi, Inès El Korbi, Yacine Ghamri-Doudane, Leila Azouz Saidane
Review article Computer Communications, Volume 69, 15 September 2015, Pages
22-37,Elsevier.
• “A survey on fault tolerance techniques in Wireless Sensor Networks” Gholamreza
Kakamanshadi; Savita Gupta; Sukhwinder Singh 2015 International Conference on
Green Computing and Internet of Things (ICGCIoT) Year: 2015 Pages: 168 – 173,IEEE
Conferences.
• “Neural fault isolator for Wireless Sensor Networks” Luciana Moreira Sa de
Souza; Ricardo Sangoi Padilha; Christian Decker 2008 5th International Conference
on Networked Sensing Systems Year: 2008 , Pages: 47 – 50,IEEE Conferences.
• Paradis, L. & Han, Q. J Netw Syst Manage (2007) 15: 171.
https://doi.org/10.1007/s10922-007-9062-0 DOIhttps://doi.org/10.1007/s10922-
007-9062-0 Publisher NameKluwer Academic Publishers-Plenum Publishers Print
ISSN1064-7570 Online ISSN1573-7705, Springer.
• Zhang Z., Shu L., Mehmood A., Yan L., Zhang Y. (2018) A Short Survey on Fault
Diagnosis in Wireless Sensor Networks. In: Huang M., Zhang Y., Jing W., Mehmood
A. (eds) Wireless Internet. WICON 2016. Lecture Notes of the Institute for
Computer Sciences, Social Informatics and Telecommunications Engineering, vol
214. Springer, Cham.
• Cheraghlou, M.N., Khadem-Zadeh, A. & Haghparast, M. Wireless Pers Commun
(2017) 92: 603. https://doi.org/10.1007/s11277-016-3559-3.
27. Q. What are the factors that lead to implementation of fault
tolerance in wireless networks in addition to two factors
reliability and internet that you have described at the
abstract level?
Additional factors that include for fault tolerant wireless
network is
a) Software
b) Hardware
c) Survivability
d) Performance
e) Heterogeneity of the network
28. Q. What are the different types of algorithms for
fault tolerance?
Distributed clustering algorithm
Topology controlling algorithm
Algorithm for improving the dependability
29. Top Journals in this area
• IEEE, Wireless Communication ,
http://www.comsoc.org/wirelessmag
• ACM Computing Surveys http://surveys.acm.org/
• Mobile Networks and Applications
http://www.springer.com/engineering/signals/journal/11
036
• IEEE Transactions on Communications
http://www.comsoc.org/tc
• IEEE Communications Surveys and Tutorials
http://www.comsoc.org/cst
• Computer Communications The International Journal for the
Computer and Telecommunications Industry
https://www.journals.elsevier.com/computer-
communications