SlideShare uma empresa Scribd logo
1 de 48
A Presentation on
             Fault Tolerance in Wireless Sensor Networks
                                by
       Constrained Delaunay Triangulation Coverage Strategy


Under Guidance of:                         Presented by :-
Prof. Dr. Santosh Kumar Swain              Ramnesh Dubey
Dept. of Computer science & Engg.          Branch: M. Tech.(CSE)
KIIT University                            Roll no: 1050013




                                                                   1
Outline
1. Introduction
2. Literature Survey
3. Motivation
4. Problem Definition
5. Objective
6. Proposed Work
7. Simulation Result
8. Comparison
9. Conclusion
10. Future Work
11. References
                             2
Introduction
                                    Development of sensor nodes,
Advances in                         with sensing, data processing,
wireless                            and communicating
Communications                      components:
                                    low cost
                                    low dimension
                                    low power consumption
      Sensing   Computing
                                    low memory
        Communication               low computational power


A wireless sensor network is composed by a large number of sensor
sensing self-powered nodes.
                                                               3
Introduction (Contd.)

                   Energy Efficiency




     Deployed Sensor
                                       Coverage
        network
Fault tolerant:
      The system should be robust against node failure.
                                                          4
Literature Survey
  • Coverage in WSNs:
                                   Coverage



                                Fault         Deployment     Energy       Event
   Type           Radii
                              Tolerance        Strategies   Efficiency   Transfer




 Target      Area
                      Fixed   Variable
Coverage   coverage




                                                                              5
Literature Survey (Contd.)




                             6
Literature Survey (Contd.)
       Coverage Strategies
              Coverage Strategies




                                         Computational
Force Based        Grid Based
                                        Geometry Based



                Triangular Lattice     Voronoi Diagram


                  Square Grid        Delaunay Triangulation


                 Hexagonal Grid      Constrained Delaunay
                                         Triangulation

                                                              7
Motivation
• Coverage strategies proposed so far do not facilitate
  fault tolerance and energy efficiency together.
• Sensor networks are energy constrained as they are
  battery operated, but in addition to provide fault
  tolerant coverage, the energy efficiency of the network
  must be maintained.
• K - coverage mechanisms proposed in the literature are
  not energy efficient as several sensors report
  simultaneously, leading to excessive energy
  consumption, congestion, and collisions in the
  network.
• This reduces the quality of service and network
  performance.
                                                        8
Problem Definition


To incorporate in Coverage strategy
• Event Reporting.
• Energy Efficiency.



                                      9
Objective

My objective is to enhances a fault tolerant
coverage protocol that incorporate.

• Event reporting with the help of additional
  support structure and

• Energy efficiency by reducing the communication.

                                                 10
Proposed Work

           Deployment


            Coverage


        Backup Coverage


     Distributed Greedy Algo.


Constrained Delaunay Triangulation
              Algo.

  And Selection of Backup node


                                     11
Proposed Work (Contd.)




                         12
Proposed Work (Contd.)




                         13
Proposed Work (Contd.)
              Distributed Greedy Algo.
•   Procedure 2-COVERAGE (S [ ])
•   S [ ] is the set of sensor nodes deployed
•   R is the region to be covered
•                  snode ← S[x]              : x is randomly selected node
•                  while (R is not Covered) do
•                  dbl[i]← snode
•                  snode← broadcast()
•                  snode ←recv()
•                  snode ←maxBenifit()
•                  i ←i+1
•         end while
•   end procedure


                                                                             14
Proposed Work (Contd.)
  Algorithm for Constrained Delaunay
           triangulation CDT
1.Construct DT, set color of each node to WHITE, and
   broadcast all its 1-hop neighbor information using the
   packet Neighbor_Packet.
2.Nodes having lowest id among its 2-hop neighbors set their
   color to BLACK.
3. Each BLACK node chooses a set N of nodes from its 1-hop
   neighbors using the following method.
   (a) N = empty
   (b) n1 = farthest neighbor
   (c) N = N ᴜ n1
   (d) for i = 2, 3,. . .

                                                          15
Proposed Work (Contd.)
     Algorithm for Constrained Delaunay
              triangulation CDT
 {
      ni = choose ith farthest neighbour
      if ni makes more than 60 degree angle with
      n1 , n2 , . . . , ni - 1
      then N = N ᴜ ni
     }
4. Each BLACK node add the constraint edges to the nodes in N and broadcasts these constraint
   edges information using the message Constraint _Packet.
5. Each WHITE node sets its color = BROWN if it is other end of any constrained edges received
     using Constraint _Packet.
6. Each BROWN node broadcasts its constraint edge information using the control packet
     Constraint _Packet.
7. All WHITE and BROWN nodes remove edges connected to it which crosses constraint
   edged, this information is broadcasted using Edge cross _Packet.
8. Each-BLACK node places a new edge from the WHITE nodes, from which the edge was
   deleted in the previous step to from new triangles.                                         16
Proposed Work (Contd.)
         Selection of Backup Nodes Algo.
•   Procedure: BK SELECT (dbl [ ])
•
•   dbl [ ] is the set of sensor nodes providing 2Coverage
•
•   Neighbors [ ] is the set of Triangle Neighbors of each node
•
•   i ←0
•      while i ≠ dbl.end() do
•
•        if dbl[i].area() ≡ Neighbors [ ].area() then
•             backup[ j] ← dbl[i]
•             PotPri[] ←nearest(Neighbors[],backup[ j])
•             PotPri[] ←median(Neighbors[],backup[ j])
•             i ← i+1
•       end if
•   end while
•   while i ≠ PotPri.end() do
•      if PotPri.area() ≡ Neighbors [ ].area() then
•         backup[] ←PotPri[i]
•         erase(PotPri[i])
•      end if
•    end while
•   end procedure
                                                                  17
Proposed Work (Contd.)
• Selection of Backup Nodes:




                                18
Proposed Work (Contd.)
• Backup Node Functionality:
  Event Detection
  Backup Reporting




                                19
Proposed Work (Contd.)
• Event Reporting




a. Several nodes detecting and reporting events to
   common forwarder.
b. A node and its forwarder detecting the event.
c. Channel access issues.
                                                 20
Proposed Work (Contd.)

• Event Reporting
  Handle the all three challenges




                                     21
Simulation Result
                   Simulation Environment
      Parameter                 Low Power Value         High Power Value
Number of nodes          50                       50
Area Range (m*m)         1000                     1000
Transmission range (m)   195                      195
Data Packet size         512                      512
Bandwidth (Kbps)         2.4                      100
Transmit power (mW)      14.88                    660
Receive power (mW)       12.50                    395
Idle power (mW)          12.36                    350
sleep power (mW)         1.4                      300


                                                                           22
Simulation Result (Contd.)
• Throughput Low Power




                                  23
Simulation Result (Contd.)
• Throughput High Power




                                  24
Simulation Result (Contd.)
• Packet Drop Rate Low Power




                                  25
Simulation Result (Contd.)
• Packet Drop Rate High Power




                                   26
Simulation Result (Contd.)
• Average Packets End to End Delay Low Power




                                               27
Simulation Result Cont.
• Average Packets End to End Delay High Power




                                                28
Simulation Result (Contd.)
Fault Node / Active Node




                             29
Simulation Result (Contd.)
Fault Node / Active Node




                             30
Simulation Result (Contd.)
Energy (Low Power/ High Power)




                                 31
Comparison
Delaunay Triangulation Vs. Constrained
       Delaunay Triangulation




                                     32
Comparison (Contd.)
Delaunay Triangulation Vs. Constrained
       Delaunay Triangulation
S.No. Features              Delaunay               Constrained Delaunay
                            Triangulation Coverage Triangulation
                            strategy               Coverage strategy

1     Simulation Scenario   Matlab                Matlab
2     Numbers of            50                    50
      Nodes
3     Area                  1000                  1000
4     Dimensions            2D                    2D
5     Distance Computed
      Formula
6     Sensors Communicate   Distance    Sensing   Distance      Sensing
      Condition             Range                 Range


                                                                          33
Comparison Cont.
S.No.   Features        Delaunay Triangulation    Constrained Delaunay
                        Coverage                  Triangulation
                        strategy                  Coverage strategy
7       Coverage        Optimization Coverage     Area Coverage

8       Sensing Range   Irregular Sensing Range   Regular Sensing Range

9       Strategy        Geometry Based            Geometry Based




                                                                     34
Comparison (Contd.)
Delaunay Triangulation
 Other Related Work




                         35
Comparison Cont.
Constrained Delaunay Triangulation




                                     36
Comparison (Contd.)
Constrained Delaunay Triangulation




                                     37
Conclusion
To provide quality service by coverage strategy,
there arises a need for developing protocols to
provide.

• Fault tolerance.
• Event reporting and
• Maintain energy efficiency.


                                                   38
Future Work

• Better mechanisms in choosing the minimal
  number of nodes for our Coverage Strategy.

• Lowering the contention in the Network.

• Low latency.

                                               39
Dissertation
 R.Dubey, S.K.Swain, C.P.Kashayp, R.Bera “Fault Tolerance in
  Wireless Sensor Networks Using Constrained Delaunay
  Triangulation”, International Conference on Electrical Engineering
  and Computer Science (ICEECS), IRNet, April 2012.
• R.Dubey, S.K.Swain, N.S.Mandal, C.M.Mourya, “Constrained
  Delaunay Triangulation for Wireless Sensor Networks", Elsevier Ad
  Hoc Networks,2012.( Communicated)




                                                                40
References

[1] P.Kumari and Y.Singh. “Delaunay Triangulation Coverage Strategy for Wireless Sensor Networks”. IEEE
     (ICCCI), pages 1-5, 2012.
[2] R.H.Abedi, N.Aslam and S.Ghani “Fault Tolerance Analysis of Heterogeneous Wireless Sensor
     Network”. CCECE, IEEE International Conference, pages 175-179, 2011.
[3] E.Bulut, Z.Wang and B.K.Szymanski. “The effect of neighbor graph connectivity on coverage
     redundancy in Wireless Sensor Network “. IEEE (ICC), pages 1-5, 2010.
[4] M.Marta, Y.Yang and M. Cardei, “Energy-efficient composite event detection in Wireless Sensor
     Networks”. In Proceedings of the 4th International Conference on Wireless Algorithms , Systems and
     Application , WASA ‘09, Berlin, Heidelberg, Springer-Velag, Pages 94-103, 2009.
[5] C.T.Vu and Y.Li. “Delaunay – Triangulation based complete coverage in Wireless Sensor Networks”.
     IEEE (PERCOM), pages 1-5, 2009.
[6] J.Wang, S.Medidi and M.Medidi.”Energy-efficient K-coverage for Wireless Sensor Network with
     variable sensing radii”. IEEE (GLOBECOM ), pages 4518-4523, 2009.
[7] D. Satyanarayana and S. V. Rao. “Constrained delaunay triangulation for ad-hoc networks”. J. Comp.
     Sys., Netw., and Comm., January, 2008.
[8] D. Wang, B.Xie, and D.P. Agrawal. “Coverage and lifetime optimization of wireless sensor networks
     with gaussian distribution”. IEEE Transactions on Mobile Computing, pages 1444-1458, December,
     2008.
[9] J. Wang and S. Medidi. “Mesh-based coverage for wireless sensor networks”. IEEE GLOBECOM, pages
     1-5, 2008.



                                                                                                  41
References Cont.
[10] Jiong Wang and Sirisha Medidi. “Topology control for reliable sensor-to-sink data transport in
    sensor networks”. In ICC, pages 3215-3219. IEEE, 2008.
[11] Mohamed Hefeeda. “Randomized k-coverage algorithms for dense sensor networks.” In
    Proceedings of INFOCOM Minisymposium, pages 2376-2380, 2007.
[12] Md. M.O.Rashid, M. M. Alam, Md. A. Razzaque, and C. S. Hong. “Reliable event detection and
    congestion avoidance in wireless sensor networks.” In Ronald H. Perrott, Barbara M. Chapman,
    Jaspal Subhlok, Rodrigo Fernandes de Mello, and Laurence Tianruo Yang, editors, HPCC, volume
    4782 of Lecture Notes in Computer Science, pages 521-532. Springer, 2007.
[13] J.Wang and S. Medidi. “Energy ecient coverage with variable sensing radii in wireless sensor
    networks.” In Proceedings of the Third IEEE International Conference on Wireless and Mobile
    Computing, Networking and Communications, WIMOB '07, pages 61-69, 2007.
[14]C.H.Wu, K.C. Lee, and Y.C.Chung. “A delaunay triangulation based method for wireless sensor
    network deployment.” Comput. Commun., 2744-2752,October 2007.
[15] Y. Zhou and M. Medidi. “Energy-ecient contention-resilient medium access for wireless sensor
    networks.” IEEE (ICC), pages 3178-3183, 2007.
[16] C. F .Hsin, and M. Liu. “Randomly duty-cycled wireless sensor networks: Dynamics of coverage.”
    IEEE Transactions on Wireless Communications, 5,3182-3192, 2006.
[17] K. S.T. Wu and H. C. Jiau. “A two-way coverage mechanism for wireless sensor networks.” In in
    Personal, Indoor and Mobile Radio Communications, IEEE 17th International Symposium on, pages
    1-5, 2006.




                                                                                                 42
References Cont.
[18] S. Megerian, F. Koushanfar, M. Potkonjak, M. B. Srivastava. “Worst and best-case coverage in sensor
     networks.” IEEE Transaction on Mobile Computing, pages 84-92, 2005.
[19] G. Xing, X. Wang, Y. Zhang, C. Lu, R. Pless, and C. Gill. “Integrated Coverage and Connectivity
     Configuration for in Sensor Networks.” ACM Trans. Sen. Netw., pages36–72, 2005.
[20] O. B. Akan, Akyildiz and F. Ian “Event-to-sink reliable transport in wireless sensor Networks.”
     IEEE/ACM Trans. Netw., pages 1003-1016, October 2005.
[21] Mihaela Cardei and D.Z.Du. “Improving wireless sensor network lifetime through power aware
     organization.” ACM Wireless Networks, pages 333-340, 2005.
[22] Mihaela Cardei, My T. Thai, Yingshu Li, and Weili Wu. “Energy-ecient target coverage in wireless
     sensor networks.” In in IEEE Infocom, pages 1976-1984, 2005.
[23] H.Zhang and J. C.Hou. “Maintaining sensing coverage and connectivity in large sensor networks.”
     Ad Hoc & Sensor Wireless Networks, 1, 2005.
[24] C. Wook and S. K. Das. “Trade-of between coverage and data reporting latency for energy
     conserving data gathering in wireless sensor networks.” In Mobile Adhoc and Sensor Systems, IEEE
     International Conference , pages 503-512, 2004.




                                                                                                     43
References Cont.
[25] Z. Zhou, S. Das and H. Gupta. “Connected k-coverage problem in sensor networks”. In Proceedings
     of the International Conference on Computer Communications and Networks, pages 373-378,
     2004.
[26] Z. Zhou, S. Das and H. Gupta. “Variable radii connected sensor cover in sensor networks”. In Proc.
     of the IEEE International Conference on Sensor and Ad Hoc Communications and Networks, 2004.
[27] A. Cerpa and D. Estrin. “Ascent: Adaptive self-conguring sensor networks topologies”. IEEE
     Transactions on Mobile Computing, pages 272-285, July 2004.
[28] S. Pattem, S.Poduri and B. Krishnamachari. “Energy-quality tradeos for target tracking in wireless
     sensor networks”. In Proceedings of the 2nd international conference on Information processing in
     sensor networks, IPSN'03, Berlin, Heidelberg, Springer-Verlag, pages 32-46, 2003.
[29] G. Wang, G. Cao and T. LaPorta. “A bidding protocol for deploying mobile sensors”, 2003.
[30] X.Y.Li, P.J.Wan, and O.Frieder. “Coverage in wireless ad-hoc sensor networks. IEEE Transactions on
     Computers . » pages 753-763, 2003.
[31] S. Adlakha and M. Srivastava. “Critical density thresholds for coverage in wireless sensornetworks.”
     IEEE Wireless Commun. Networking, pages 16-20, 2003.




                                                                                                      44
References Cont.
[32] H. Gupta, S. R. Das and Q. Gu. “Connected sensor cover: self-organization of sensor networks for
     efficient query execution”. pages 189-200, 2003.
[33] C. Huang and Y.C. Tseng. “The coverage problem in a wireless sensor network”. In Proceedings of
     the 2nd ACM international conference on Wireless Sensor Networks and Applications, WSNA '03,
     pages 115-121, 2003.
[34] K. Kar and S. Banerjee. “Node Placement for Connected Coverage in Sensor Networks.” March
     2003.
[35] Xiang-Yang Li, Gruia Calinescu, Peng-Jun Wan, and Yu Wang. “Localized delaunay triangulation with
     application in ad hoc wireless networks”. IEEE Transaction on Parallel and Distributed System,
     14(9):2003, 2003.
[36] B. Liu and D. Towsley. “On the coverage and detectability of wireless sensor networks.” ad hoc
     Wireless Networks, 3, 2003.
[37] S. Pattem, S. Poduri and B. Krishnamachari. “Energy-quality tradeos for target tracking in wireless
     sensor networks”. In Proceedings of the 2nd international conference on Information processing in
     sensor networks, IPSN'03, pages 32-046, Springer-Verlag, 2003.
[38] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. Wireless sensor networks: a survey.
     Computer Networks, pages 393-422, 2002.



                                                                                                     45
References Cont.
[39] K. Chakrabarty, S. S. Iyengar, H. Qi and E.Cho. “Grid coverage for surveillance and target location in
     distributed sensor networks.”IEEE Transactions on Computers, pages 1448-1453, 2002.
[40] A. Howard, M. J. Mataric and G. S. Sukhatme. “Mobile sensor network deployment using potential
     fields: A distributed, scalable solution to the area coverage problem”. pages 299-308, 2002.
[41] M.X. Cheng. M. Min X.Jia D. Li D.z Du M. Cardie, D. MacCallum. ‘’Wireless sensor networks with
     energy ecient organization.” Jouranal of International Networks, pages 213-229, 2002.
[42] D. Tian and N. D. Georganas. “A Coverage-Preserving Node Scheduling Scheme for LargeWireless
     Sensor Networks”. ACM, pages 32–41, 2002.
[43] S. Meguerdichian, F. Koushanfar, M. Potkonjak and M. B. Srivastava. “Coverage problems in wireless
     Ad-hoc sensor networks.” In in IEEE INFOCOM, pages 1380-1387, 2001.
[44] S. Meguerdichian, F. Koushanfar, G. Qu and M. Potkonjak.”Exposure in wireless ad-hoc sensor
     networks,” 2001.
[45] S. Slijepcevic and M. Potkonjak. “Power ecient organization of wireless sensor networks.” pages
     472-476, 2001.
[46] Jie Wu and Hailan Li. “On calculating connected dominating set for efficient routing in ad hoc
     wireless networks.” In Proceedings of the 3rd international workshop on Discrete algorithms and
     methods for mobile computing and communications, DIALM '99, pages 7-14, ACM,1999.
[47] F. Aurenhammer. “Voronoi diagrams a survey of a fundamental geometric data structure.”ACM
     Computing Surveys, pages 345-405, 1991.
[48] Teerawat Issariyakul and Ekram Hossain. “Introduction to Network Simulator NS2.”,Springer
      Publishing Company, Incorporated, 1 edition, 2008.


                                                                                                        46
References Cont.
[49] S. Lu F. Ye, G. Zhong and L. Zhang. “Energy ecient robust       sensing coverage in large sensor
     networks”. In Proceedings of the 1st ACM international workshop on Wireless sensor networks and
     applications. technical report,UCLA.
[50] M.Cardei and J.Wu, “Coverage in wireless sensor networks.” In M.Ilyas and I.Mahgoub, editors,
     Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, pages 361-372. CRC
     PRESS LLC.
[51] L. P. Chew ,“Constrained delaunay triangulations.”, 1987.
[52] http://en.wikipedia.org/wiki/MATLAB.
[53] http://www.isi.edu/nsnam/ns/.
[54] Esq David J. Stein,“Wireless Sensor Network Simulator.”, 2006.




                                                                                                   47
THANK YOU

            48

Mais conteúdo relacionado

Mais procurados

Comparative Study of Routing Protocols in Wireless Sensor Networks by Abid Af...
Comparative Study of Routing Protocols in Wireless Sensor Networks by Abid Af...Comparative Study of Routing Protocols in Wireless Sensor Networks by Abid Af...
Comparative Study of Routing Protocols in Wireless Sensor Networks by Abid Af...Abid Afsar Khan Malang Falsafi
 
An algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor networkAn algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor networkeSAT Publishing House
 
Fault Node Recovery Algorithm for a Wireless Sensor Network
Fault Node Recovery Algorithm for a Wireless Sensor NetworkFault Node Recovery Algorithm for a Wireless Sensor Network
Fault Node Recovery Algorithm for a Wireless Sensor NetworkYogesh Vk
 
Issues of Wireless Sensor Networks
Issues of Wireless Sensor NetworksIssues of Wireless Sensor Networks
Issues of Wireless Sensor NetworksSouhaiel tekaya
 
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
 TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEYijujournal
 
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKSMULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKSvtunotesbysree
 
Wireless sensor network wireless network
Wireless sensor network wireless networkWireless sensor network wireless network
Wireless sensor network wireless networkTeced Ce
 
Introduction of Wireless Sensor Network
Introduction of Wireless Sensor NetworkIntroduction of Wireless Sensor Network
Introduction of Wireless Sensor NetworkMuhammad Kaife Uddin
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsVirendra Thakur
 
Energy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networksEnergy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networksSpandan Spandy
 
Power Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksPower Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksMshari Alabdulkarim
 
Design Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksDesign Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksKhushbooGupta145
 
Wireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsWireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsmmjalbiaty
 

Mais procurados (20)

Comparative Study of Routing Protocols in Wireless Sensor Networks by Abid Af...
Comparative Study of Routing Protocols in Wireless Sensor Networks by Abid Af...Comparative Study of Routing Protocols in Wireless Sensor Networks by Abid Af...
Comparative Study of Routing Protocols in Wireless Sensor Networks by Abid Af...
 
An algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor networkAn algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor network
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Fault Node Recovery Algorithm for a Wireless Sensor Network
Fault Node Recovery Algorithm for a Wireless Sensor NetworkFault Node Recovery Algorithm for a Wireless Sensor Network
Fault Node Recovery Algorithm for a Wireless Sensor Network
 
Issues of Wireless Sensor Networks
Issues of Wireless Sensor NetworksIssues of Wireless Sensor Networks
Issues of Wireless Sensor Networks
 
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
 TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
 
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKSMULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
 
Wsn
WsnWsn
Wsn
 
Wireless sensor network wireless network
Wireless sensor network wireless networkWireless sensor network wireless network
Wireless sensor network wireless network
 
Introduction of Wireless Sensor Network
Introduction of Wireless Sensor NetworkIntroduction of Wireless Sensor Network
Introduction of Wireless Sensor Network
 
Wsn ppt original
Wsn ppt originalWsn ppt original
Wsn ppt original
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
 
Wireless Sensor Networks ppt
Wireless Sensor Networks pptWireless Sensor Networks ppt
Wireless Sensor Networks ppt
 
Energy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networksEnergy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networks
 
Power Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksPower Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor Networks
 
Design Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksDesign Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor Networks
 
Wireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsWireless sensor network lifetime constraints
Wireless sensor network lifetime constraints
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
wsn
wsnwsn
wsn
 
wireless sensor network a survey
wireless sensor network a surveywireless sensor network a survey
wireless sensor network a survey
 

Destaque

Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksBala Lavanya
 
Session 5.6 towards a semantic outlier detection framework in wireless sens...
Session 5.6   towards a semantic outlier detection framework in wireless sens...Session 5.6   towards a semantic outlier detection framework in wireless sens...
Session 5.6 towards a semantic outlier detection framework in wireless sens...semanticsconference
 
Linear books to open world adventure
Linear books to open world adventureLinear books to open world adventure
Linear books to open world adventuresemanticsconference
 
Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811praveen369
 
Energy conservation in wireless sensor networks
Energy conservation in wireless sensor networksEnergy conservation in wireless sensor networks
Energy conservation in wireless sensor networksahmad abdelhafeez
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor NetworksKarthik
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksrajatmal4
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor networkdeawoo Kim
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issuesMaha Saad
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networksRushin Shah
 
FAULT DETECTION IN WIRELESS SENSOR NETWORK
FAULT DETECTION IN WIRELESS SENSOR NETWORKFAULT DETECTION IN WIRELESS SENSOR NETWORK
FAULT DETECTION IN WIRELESS SENSOR NETWORKPavithraRShettigar
 

Destaque (13)

Lecture3 - Machine Learning
Lecture3 - Machine LearningLecture3 - Machine Learning
Lecture3 - Machine Learning
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networks
 
Session 5.6 towards a semantic outlier detection framework in wireless sens...
Session 5.6   towards a semantic outlier detection framework in wireless sens...Session 5.6   towards a semantic outlier detection framework in wireless sens...
Session 5.6 towards a semantic outlier detection framework in wireless sens...
 
Linear books to open world adventure
Linear books to open world adventureLinear books to open world adventure
Linear books to open world adventure
 
Data aggregation in wireless sensor networks
Data aggregation in wireless sensor networksData aggregation in wireless sensor networks
Data aggregation in wireless sensor networks
 
Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811
 
Energy conservation in wireless sensor networks
Energy conservation in wireless sensor networksEnergy conservation in wireless sensor networks
Energy conservation in wireless sensor networks
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networks
 
FAULT DETECTION IN WIRELESS SENSOR NETWORK
FAULT DETECTION IN WIRELESS SENSOR NETWORKFAULT DETECTION IN WIRELESS SENSOR NETWORK
FAULT DETECTION IN WIRELESS SENSOR NETWORK
 

Semelhante a Fault Tolerant Coverage Using Constrained Delaunay Triangulation

Analysis and reactive measures on the blackhole attack
Analysis and reactive measures on the blackhole attackAnalysis and reactive measures on the blackhole attack
Analysis and reactive measures on the blackhole attackJyotiVERMA176
 
Deep Neural Networks (D1L2 Insight@DCU Machine Learning Workshop 2017)
Deep Neural Networks (D1L2 Insight@DCU Machine Learning Workshop 2017)Deep Neural Networks (D1L2 Insight@DCU Machine Learning Workshop 2017)
Deep Neural Networks (D1L2 Insight@DCU Machine Learning Workshop 2017)Universitat Politècnica de Catalunya
 
Cube2012 Submission 359
Cube2012 Submission 359Cube2012 Submission 359
Cube2012 Submission 359Sandeep Saxena
 
Minimum Complexity Decoupling Networks for Arbitrary Coupled Loads
Minimum Complexity Decoupling Networks for Arbitrary Coupled LoadsMinimum Complexity Decoupling Networks for Arbitrary Coupled Loads
Minimum Complexity Decoupling Networks for Arbitrary Coupled LoadsDing Nie
 
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHBased on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHijsrd.com
 
Positioning techniques in 3 g networks (1)
Positioning techniques in 3 g networks (1)Positioning techniques in 3 g networks (1)
Positioning techniques in 3 g networks (1)kike2005
 
Network Lifetime Enhancement by Node Deployment in WSN
Network Lifetime Enhancement by Node Deployment in WSNNetwork Lifetime Enhancement by Node Deployment in WSN
Network Lifetime Enhancement by Node Deployment in WSNIJTET Journal
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...csijjournal
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...csijjournal
 
MobileNet - PR044
MobileNet - PR044MobileNet - PR044
MobileNet - PR044Jinwon Lee
 
EDGE-Net: Efficient Deep-learning Gradients Extraction Network
EDGE-Net: Efficient Deep-learning Gradients Extraction NetworkEDGE-Net: Efficient Deep-learning Gradients Extraction Network
EDGE-Net: Efficient Deep-learning Gradients Extraction Networkgerogepatton
 
EDGE-Net: Efficient Deep-learning Gradients Extraction Network
EDGE-Net: Efficient Deep-learning Gradients Extraction NetworkEDGE-Net: Efficient Deep-learning Gradients Extraction Network
EDGE-Net: Efficient Deep-learning Gradients Extraction Networkgerogepatton
 
MobileNet Review | Mobile Net Research Paper Review | MobileNet v1 Paper Expl...
MobileNet Review | Mobile Net Research Paper Review | MobileNet v1 Paper Expl...MobileNet Review | Mobile Net Research Paper Review | MobileNet v1 Paper Expl...
MobileNet Review | Mobile Net Research Paper Review | MobileNet v1 Paper Expl...Laxmi Kant Tiwari
 
Cvpr 2018 papers review (efficient computing)
Cvpr 2018 papers review (efficient computing)Cvpr 2018 papers review (efficient computing)
Cvpr 2018 papers review (efficient computing)DonghyunKang12
 
[AAAI2018] Multispectral Transfer Network: Unsupervised Depth Estimation for ...
[AAAI2018] Multispectral Transfer Network: Unsupervised Depth Estimation for ...[AAAI2018] Multispectral Transfer Network: Unsupervised Depth Estimation for ...
[AAAI2018] Multispectral Transfer Network: Unsupervised Depth Estimation for ...KAIST
 
[AAAI2018] Multispectral Transfer Network: Unsupervised Depth Estimation for ...
[AAAI2018] Multispectral Transfer Network: Unsupervised Depth Estimation for ...[AAAI2018] Multispectral Transfer Network: Unsupervised Depth Estimation for ...
[AAAI2018] Multispectral Transfer Network: Unsupervised Depth Estimation for ...KAIST
 
“Introduction to Computer Vision with CNNs,” a Presentation from Mohammad Hag...
“Introduction to Computer Vision with CNNs,” a Presentation from Mohammad Hag...“Introduction to Computer Vision with CNNs,” a Presentation from Mohammad Hag...
“Introduction to Computer Vision with CNNs,” a Presentation from Mohammad Hag...Edge AI and Vision Alliance
 

Semelhante a Fault Tolerant Coverage Using Constrained Delaunay Triangulation (20)

Analysis and reactive measures on the blackhole attack
Analysis and reactive measures on the blackhole attackAnalysis and reactive measures on the blackhole attack
Analysis and reactive measures on the blackhole attack
 
Deep Neural Networks (D1L2 Insight@DCU Machine Learning Workshop 2017)
Deep Neural Networks (D1L2 Insight@DCU Machine Learning Workshop 2017)Deep Neural Networks (D1L2 Insight@DCU Machine Learning Workshop 2017)
Deep Neural Networks (D1L2 Insight@DCU Machine Learning Workshop 2017)
 
Cube2012 Submission 359
Cube2012 Submission 359Cube2012 Submission 359
Cube2012 Submission 359
 
Abitseminar
AbitseminarAbitseminar
Abitseminar
 
Ijnsa050209
Ijnsa050209Ijnsa050209
Ijnsa050209
 
Minimum Complexity Decoupling Networks for Arbitrary Coupled Loads
Minimum Complexity Decoupling Networks for Arbitrary Coupled LoadsMinimum Complexity Decoupling Networks for Arbitrary Coupled Loads
Minimum Complexity Decoupling Networks for Arbitrary Coupled Loads
 
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHBased on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
 
Positioning techniques in 3 g networks (1)
Positioning techniques in 3 g networks (1)Positioning techniques in 3 g networks (1)
Positioning techniques in 3 g networks (1)
 
Network Lifetime Enhancement by Node Deployment in WSN
Network Lifetime Enhancement by Node Deployment in WSNNetwork Lifetime Enhancement by Node Deployment in WSN
Network Lifetime Enhancement by Node Deployment in WSN
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
 
MobileNet - PR044
MobileNet - PR044MobileNet - PR044
MobileNet - PR044
 
EDGE-Net: Efficient Deep-learning Gradients Extraction Network
EDGE-Net: Efficient Deep-learning Gradients Extraction NetworkEDGE-Net: Efficient Deep-learning Gradients Extraction Network
EDGE-Net: Efficient Deep-learning Gradients Extraction Network
 
EDGE-Net: Efficient Deep-learning Gradients Extraction Network
EDGE-Net: Efficient Deep-learning Gradients Extraction NetworkEDGE-Net: Efficient Deep-learning Gradients Extraction Network
EDGE-Net: Efficient Deep-learning Gradients Extraction Network
 
MobileNet V3
MobileNet V3MobileNet V3
MobileNet V3
 
MobileNet Review | Mobile Net Research Paper Review | MobileNet v1 Paper Expl...
MobileNet Review | Mobile Net Research Paper Review | MobileNet v1 Paper Expl...MobileNet Review | Mobile Net Research Paper Review | MobileNet v1 Paper Expl...
MobileNet Review | Mobile Net Research Paper Review | MobileNet v1 Paper Expl...
 
Cvpr 2018 papers review (efficient computing)
Cvpr 2018 papers review (efficient computing)Cvpr 2018 papers review (efficient computing)
Cvpr 2018 papers review (efficient computing)
 
[AAAI2018] Multispectral Transfer Network: Unsupervised Depth Estimation for ...
[AAAI2018] Multispectral Transfer Network: Unsupervised Depth Estimation for ...[AAAI2018] Multispectral Transfer Network: Unsupervised Depth Estimation for ...
[AAAI2018] Multispectral Transfer Network: Unsupervised Depth Estimation for ...
 
[AAAI2018] Multispectral Transfer Network: Unsupervised Depth Estimation for ...
[AAAI2018] Multispectral Transfer Network: Unsupervised Depth Estimation for ...[AAAI2018] Multispectral Transfer Network: Unsupervised Depth Estimation for ...
[AAAI2018] Multispectral Transfer Network: Unsupervised Depth Estimation for ...
 
“Introduction to Computer Vision with CNNs,” a Presentation from Mohammad Hag...
“Introduction to Computer Vision with CNNs,” a Presentation from Mohammad Hag...“Introduction to Computer Vision with CNNs,” a Presentation from Mohammad Hag...
“Introduction to Computer Vision with CNNs,” a Presentation from Mohammad Hag...
 

Último

Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 

Último (20)

Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 

Fault Tolerant Coverage Using Constrained Delaunay Triangulation

  • 1. A Presentation on Fault Tolerance in Wireless Sensor Networks by Constrained Delaunay Triangulation Coverage Strategy Under Guidance of: Presented by :- Prof. Dr. Santosh Kumar Swain Ramnesh Dubey Dept. of Computer science & Engg. Branch: M. Tech.(CSE) KIIT University Roll no: 1050013 1
  • 2. Outline 1. Introduction 2. Literature Survey 3. Motivation 4. Problem Definition 5. Objective 6. Proposed Work 7. Simulation Result 8. Comparison 9. Conclusion 10. Future Work 11. References 2
  • 3. Introduction Development of sensor nodes, Advances in with sensing, data processing, wireless and communicating Communications components: low cost low dimension low power consumption Sensing Computing low memory Communication low computational power A wireless sensor network is composed by a large number of sensor sensing self-powered nodes. 3
  • 4. Introduction (Contd.) Energy Efficiency Deployed Sensor Coverage network Fault tolerant: The system should be robust against node failure. 4
  • 5. Literature Survey • Coverage in WSNs: Coverage Fault Deployment Energy Event Type Radii Tolerance Strategies Efficiency Transfer Target Area Fixed Variable Coverage coverage 5
  • 7. Literature Survey (Contd.) Coverage Strategies Coverage Strategies Computational Force Based Grid Based Geometry Based Triangular Lattice Voronoi Diagram Square Grid Delaunay Triangulation Hexagonal Grid Constrained Delaunay Triangulation 7
  • 8. Motivation • Coverage strategies proposed so far do not facilitate fault tolerance and energy efficiency together. • Sensor networks are energy constrained as they are battery operated, but in addition to provide fault tolerant coverage, the energy efficiency of the network must be maintained. • K - coverage mechanisms proposed in the literature are not energy efficient as several sensors report simultaneously, leading to excessive energy consumption, congestion, and collisions in the network. • This reduces the quality of service and network performance. 8
  • 9. Problem Definition To incorporate in Coverage strategy • Event Reporting. • Energy Efficiency. 9
  • 10. Objective My objective is to enhances a fault tolerant coverage protocol that incorporate. • Event reporting with the help of additional support structure and • Energy efficiency by reducing the communication. 10
  • 11. Proposed Work Deployment Coverage Backup Coverage Distributed Greedy Algo. Constrained Delaunay Triangulation Algo. And Selection of Backup node 11
  • 14. Proposed Work (Contd.) Distributed Greedy Algo. • Procedure 2-COVERAGE (S [ ]) • S [ ] is the set of sensor nodes deployed • R is the region to be covered • snode ← S[x] : x is randomly selected node • while (R is not Covered) do • dbl[i]← snode • snode← broadcast() • snode ←recv() • snode ←maxBenifit() • i ←i+1 • end while • end procedure 14
  • 15. Proposed Work (Contd.) Algorithm for Constrained Delaunay triangulation CDT 1.Construct DT, set color of each node to WHITE, and broadcast all its 1-hop neighbor information using the packet Neighbor_Packet. 2.Nodes having lowest id among its 2-hop neighbors set their color to BLACK. 3. Each BLACK node chooses a set N of nodes from its 1-hop neighbors using the following method. (a) N = empty (b) n1 = farthest neighbor (c) N = N ᴜ n1 (d) for i = 2, 3,. . . 15
  • 16. Proposed Work (Contd.) Algorithm for Constrained Delaunay triangulation CDT { ni = choose ith farthest neighbour if ni makes more than 60 degree angle with n1 , n2 , . . . , ni - 1 then N = N ᴜ ni } 4. Each BLACK node add the constraint edges to the nodes in N and broadcasts these constraint edges information using the message Constraint _Packet. 5. Each WHITE node sets its color = BROWN if it is other end of any constrained edges received using Constraint _Packet. 6. Each BROWN node broadcasts its constraint edge information using the control packet Constraint _Packet. 7. All WHITE and BROWN nodes remove edges connected to it which crosses constraint edged, this information is broadcasted using Edge cross _Packet. 8. Each-BLACK node places a new edge from the WHITE nodes, from which the edge was deleted in the previous step to from new triangles. 16
  • 17. Proposed Work (Contd.) Selection of Backup Nodes Algo. • Procedure: BK SELECT (dbl [ ]) • • dbl [ ] is the set of sensor nodes providing 2Coverage • • Neighbors [ ] is the set of Triangle Neighbors of each node • • i ←0 • while i ≠ dbl.end() do • • if dbl[i].area() ≡ Neighbors [ ].area() then • backup[ j] ← dbl[i] • PotPri[] ←nearest(Neighbors[],backup[ j]) • PotPri[] ←median(Neighbors[],backup[ j]) • i ← i+1 • end if • end while • while i ≠ PotPri.end() do • if PotPri.area() ≡ Neighbors [ ].area() then • backup[] ←PotPri[i] • erase(PotPri[i]) • end if • end while • end procedure 17
  • 18. Proposed Work (Contd.) • Selection of Backup Nodes: 18
  • 19. Proposed Work (Contd.) • Backup Node Functionality: Event Detection Backup Reporting 19
  • 20. Proposed Work (Contd.) • Event Reporting a. Several nodes detecting and reporting events to common forwarder. b. A node and its forwarder detecting the event. c. Channel access issues. 20
  • 21. Proposed Work (Contd.) • Event Reporting Handle the all three challenges 21
  • 22. Simulation Result Simulation Environment Parameter Low Power Value High Power Value Number of nodes 50 50 Area Range (m*m) 1000 1000 Transmission range (m) 195 195 Data Packet size 512 512 Bandwidth (Kbps) 2.4 100 Transmit power (mW) 14.88 660 Receive power (mW) 12.50 395 Idle power (mW) 12.36 350 sleep power (mW) 1.4 300 22
  • 23. Simulation Result (Contd.) • Throughput Low Power 23
  • 24. Simulation Result (Contd.) • Throughput High Power 24
  • 25. Simulation Result (Contd.) • Packet Drop Rate Low Power 25
  • 26. Simulation Result (Contd.) • Packet Drop Rate High Power 26
  • 27. Simulation Result (Contd.) • Average Packets End to End Delay Low Power 27
  • 28. Simulation Result Cont. • Average Packets End to End Delay High Power 28
  • 29. Simulation Result (Contd.) Fault Node / Active Node 29
  • 30. Simulation Result (Contd.) Fault Node / Active Node 30
  • 31. Simulation Result (Contd.) Energy (Low Power/ High Power) 31
  • 32. Comparison Delaunay Triangulation Vs. Constrained Delaunay Triangulation 32
  • 33. Comparison (Contd.) Delaunay Triangulation Vs. Constrained Delaunay Triangulation S.No. Features Delaunay Constrained Delaunay Triangulation Coverage Triangulation strategy Coverage strategy 1 Simulation Scenario Matlab Matlab 2 Numbers of 50 50 Nodes 3 Area 1000 1000 4 Dimensions 2D 2D 5 Distance Computed Formula 6 Sensors Communicate Distance Sensing Distance Sensing Condition Range Range 33
  • 34. Comparison Cont. S.No. Features Delaunay Triangulation Constrained Delaunay Coverage Triangulation strategy Coverage strategy 7 Coverage Optimization Coverage Area Coverage 8 Sensing Range Irregular Sensing Range Regular Sensing Range 9 Strategy Geometry Based Geometry Based 34
  • 38. Conclusion To provide quality service by coverage strategy, there arises a need for developing protocols to provide. • Fault tolerance. • Event reporting and • Maintain energy efficiency. 38
  • 39. Future Work • Better mechanisms in choosing the minimal number of nodes for our Coverage Strategy. • Lowering the contention in the Network. • Low latency. 39
  • 40. Dissertation  R.Dubey, S.K.Swain, C.P.Kashayp, R.Bera “Fault Tolerance in Wireless Sensor Networks Using Constrained Delaunay Triangulation”, International Conference on Electrical Engineering and Computer Science (ICEECS), IRNet, April 2012. • R.Dubey, S.K.Swain, N.S.Mandal, C.M.Mourya, “Constrained Delaunay Triangulation for Wireless Sensor Networks", Elsevier Ad Hoc Networks,2012.( Communicated) 40
  • 41. References [1] P.Kumari and Y.Singh. “Delaunay Triangulation Coverage Strategy for Wireless Sensor Networks”. IEEE (ICCCI), pages 1-5, 2012. [2] R.H.Abedi, N.Aslam and S.Ghani “Fault Tolerance Analysis of Heterogeneous Wireless Sensor Network”. CCECE, IEEE International Conference, pages 175-179, 2011. [3] E.Bulut, Z.Wang and B.K.Szymanski. “The effect of neighbor graph connectivity on coverage redundancy in Wireless Sensor Network “. IEEE (ICC), pages 1-5, 2010. [4] M.Marta, Y.Yang and M. Cardei, “Energy-efficient composite event detection in Wireless Sensor Networks”. In Proceedings of the 4th International Conference on Wireless Algorithms , Systems and Application , WASA ‘09, Berlin, Heidelberg, Springer-Velag, Pages 94-103, 2009. [5] C.T.Vu and Y.Li. “Delaunay – Triangulation based complete coverage in Wireless Sensor Networks”. IEEE (PERCOM), pages 1-5, 2009. [6] J.Wang, S.Medidi and M.Medidi.”Energy-efficient K-coverage for Wireless Sensor Network with variable sensing radii”. IEEE (GLOBECOM ), pages 4518-4523, 2009. [7] D. Satyanarayana and S. V. Rao. “Constrained delaunay triangulation for ad-hoc networks”. J. Comp. Sys., Netw., and Comm., January, 2008. [8] D. Wang, B.Xie, and D.P. Agrawal. “Coverage and lifetime optimization of wireless sensor networks with gaussian distribution”. IEEE Transactions on Mobile Computing, pages 1444-1458, December, 2008. [9] J. Wang and S. Medidi. “Mesh-based coverage for wireless sensor networks”. IEEE GLOBECOM, pages 1-5, 2008. 41
  • 42. References Cont. [10] Jiong Wang and Sirisha Medidi. “Topology control for reliable sensor-to-sink data transport in sensor networks”. In ICC, pages 3215-3219. IEEE, 2008. [11] Mohamed Hefeeda. “Randomized k-coverage algorithms for dense sensor networks.” In Proceedings of INFOCOM Minisymposium, pages 2376-2380, 2007. [12] Md. M.O.Rashid, M. M. Alam, Md. A. Razzaque, and C. S. Hong. “Reliable event detection and congestion avoidance in wireless sensor networks.” In Ronald H. Perrott, Barbara M. Chapman, Jaspal Subhlok, Rodrigo Fernandes de Mello, and Laurence Tianruo Yang, editors, HPCC, volume 4782 of Lecture Notes in Computer Science, pages 521-532. Springer, 2007. [13] J.Wang and S. Medidi. “Energy ecient coverage with variable sensing radii in wireless sensor networks.” In Proceedings of the Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WIMOB '07, pages 61-69, 2007. [14]C.H.Wu, K.C. Lee, and Y.C.Chung. “A delaunay triangulation based method for wireless sensor network deployment.” Comput. Commun., 2744-2752,October 2007. [15] Y. Zhou and M. Medidi. “Energy-ecient contention-resilient medium access for wireless sensor networks.” IEEE (ICC), pages 3178-3183, 2007. [16] C. F .Hsin, and M. Liu. “Randomly duty-cycled wireless sensor networks: Dynamics of coverage.” IEEE Transactions on Wireless Communications, 5,3182-3192, 2006. [17] K. S.T. Wu and H. C. Jiau. “A two-way coverage mechanism for wireless sensor networks.” In in Personal, Indoor and Mobile Radio Communications, IEEE 17th International Symposium on, pages 1-5, 2006. 42
  • 43. References Cont. [18] S. Megerian, F. Koushanfar, M. Potkonjak, M. B. Srivastava. “Worst and best-case coverage in sensor networks.” IEEE Transaction on Mobile Computing, pages 84-92, 2005. [19] G. Xing, X. Wang, Y. Zhang, C. Lu, R. Pless, and C. Gill. “Integrated Coverage and Connectivity Configuration for in Sensor Networks.” ACM Trans. Sen. Netw., pages36–72, 2005. [20] O. B. Akan, Akyildiz and F. Ian “Event-to-sink reliable transport in wireless sensor Networks.” IEEE/ACM Trans. Netw., pages 1003-1016, October 2005. [21] Mihaela Cardei and D.Z.Du. “Improving wireless sensor network lifetime through power aware organization.” ACM Wireless Networks, pages 333-340, 2005. [22] Mihaela Cardei, My T. Thai, Yingshu Li, and Weili Wu. “Energy-ecient target coverage in wireless sensor networks.” In in IEEE Infocom, pages 1976-1984, 2005. [23] H.Zhang and J. C.Hou. “Maintaining sensing coverage and connectivity in large sensor networks.” Ad Hoc & Sensor Wireless Networks, 1, 2005. [24] C. Wook and S. K. Das. “Trade-of between coverage and data reporting latency for energy conserving data gathering in wireless sensor networks.” In Mobile Adhoc and Sensor Systems, IEEE International Conference , pages 503-512, 2004. 43
  • 44. References Cont. [25] Z. Zhou, S. Das and H. Gupta. “Connected k-coverage problem in sensor networks”. In Proceedings of the International Conference on Computer Communications and Networks, pages 373-378, 2004. [26] Z. Zhou, S. Das and H. Gupta. “Variable radii connected sensor cover in sensor networks”. In Proc. of the IEEE International Conference on Sensor and Ad Hoc Communications and Networks, 2004. [27] A. Cerpa and D. Estrin. “Ascent: Adaptive self-conguring sensor networks topologies”. IEEE Transactions on Mobile Computing, pages 272-285, July 2004. [28] S. Pattem, S.Poduri and B. Krishnamachari. “Energy-quality tradeos for target tracking in wireless sensor networks”. In Proceedings of the 2nd international conference on Information processing in sensor networks, IPSN'03, Berlin, Heidelberg, Springer-Verlag, pages 32-46, 2003. [29] G. Wang, G. Cao and T. LaPorta. “A bidding protocol for deploying mobile sensors”, 2003. [30] X.Y.Li, P.J.Wan, and O.Frieder. “Coverage in wireless ad-hoc sensor networks. IEEE Transactions on Computers . » pages 753-763, 2003. [31] S. Adlakha and M. Srivastava. “Critical density thresholds for coverage in wireless sensornetworks.” IEEE Wireless Commun. Networking, pages 16-20, 2003. 44
  • 45. References Cont. [32] H. Gupta, S. R. Das and Q. Gu. “Connected sensor cover: self-organization of sensor networks for efficient query execution”. pages 189-200, 2003. [33] C. Huang and Y.C. Tseng. “The coverage problem in a wireless sensor network”. In Proceedings of the 2nd ACM international conference on Wireless Sensor Networks and Applications, WSNA '03, pages 115-121, 2003. [34] K. Kar and S. Banerjee. “Node Placement for Connected Coverage in Sensor Networks.” March 2003. [35] Xiang-Yang Li, Gruia Calinescu, Peng-Jun Wan, and Yu Wang. “Localized delaunay triangulation with application in ad hoc wireless networks”. IEEE Transaction on Parallel and Distributed System, 14(9):2003, 2003. [36] B. Liu and D. Towsley. “On the coverage and detectability of wireless sensor networks.” ad hoc Wireless Networks, 3, 2003. [37] S. Pattem, S. Poduri and B. Krishnamachari. “Energy-quality tradeos for target tracking in wireless sensor networks”. In Proceedings of the 2nd international conference on Information processing in sensor networks, IPSN'03, pages 32-046, Springer-Verlag, 2003. [38] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. Wireless sensor networks: a survey. Computer Networks, pages 393-422, 2002. 45
  • 46. References Cont. [39] K. Chakrabarty, S. S. Iyengar, H. Qi and E.Cho. “Grid coverage for surveillance and target location in distributed sensor networks.”IEEE Transactions on Computers, pages 1448-1453, 2002. [40] A. Howard, M. J. Mataric and G. S. Sukhatme. “Mobile sensor network deployment using potential fields: A distributed, scalable solution to the area coverage problem”. pages 299-308, 2002. [41] M.X. Cheng. M. Min X.Jia D. Li D.z Du M. Cardie, D. MacCallum. ‘’Wireless sensor networks with energy ecient organization.” Jouranal of International Networks, pages 213-229, 2002. [42] D. Tian and N. D. Georganas. “A Coverage-Preserving Node Scheduling Scheme for LargeWireless Sensor Networks”. ACM, pages 32–41, 2002. [43] S. Meguerdichian, F. Koushanfar, M. Potkonjak and M. B. Srivastava. “Coverage problems in wireless Ad-hoc sensor networks.” In in IEEE INFOCOM, pages 1380-1387, 2001. [44] S. Meguerdichian, F. Koushanfar, G. Qu and M. Potkonjak.”Exposure in wireless ad-hoc sensor networks,” 2001. [45] S. Slijepcevic and M. Potkonjak. “Power ecient organization of wireless sensor networks.” pages 472-476, 2001. [46] Jie Wu and Hailan Li. “On calculating connected dominating set for efficient routing in ad hoc wireless networks.” In Proceedings of the 3rd international workshop on Discrete algorithms and methods for mobile computing and communications, DIALM '99, pages 7-14, ACM,1999. [47] F. Aurenhammer. “Voronoi diagrams a survey of a fundamental geometric data structure.”ACM Computing Surveys, pages 345-405, 1991. [48] Teerawat Issariyakul and Ekram Hossain. “Introduction to Network Simulator NS2.”,Springer Publishing Company, Incorporated, 1 edition, 2008. 46
  • 47. References Cont. [49] S. Lu F. Ye, G. Zhong and L. Zhang. “Energy ecient robust sensing coverage in large sensor networks”. In Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications. technical report,UCLA. [50] M.Cardei and J.Wu, “Coverage in wireless sensor networks.” In M.Ilyas and I.Mahgoub, editors, Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, pages 361-372. CRC PRESS LLC. [51] L. P. Chew ,“Constrained delaunay triangulations.”, 1987. [52] http://en.wikipedia.org/wiki/MATLAB. [53] http://www.isi.edu/nsnam/ns/. [54] Esq David J. Stein,“Wireless Sensor Network Simulator.”, 2006. 47
  • 48. THANK YOU 48