Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless Sensor Networks

Editor IJMTER

In recent years, wsns detect to the fault sensor node based on round trip delay using path in wireless sensor networks. Portable sensor node is low cost in Wsns . Measured in the round trip delay time and number of sensor node. Existing method is used to large value of sensor node, identification of sensor node time and distance . it is used to linear selection path, disadvantages are data loss, more number of path, complexity. in this proposed method using distributed autonomous sensor software implementation in NS2.it is detected fault sensor node and malfunction ,in this analysis time and path using discrete Rtp. real time applicability in received signal strength ,separate wavelength for end of the node avoid the data loss and complexity. Hardware implementation using ZigBee and Microcontroller .Equal to the hardware and software implementation. It is overcomes to the data loss. comparing the threshold and Rtd time. Finally, the algorithm is tested under different number of faulty sensors in the same area. Our Simulation results demonstrate that the time consumed to find out the faulty nodes in our proposed algorithm is relatively less with a large number of faulty sensors existing in the network.

Scientific Journal Impact Factor (SJIF): 1.711
International Journal of Modern Trends in Engineering
and Research
www.ijmter.com
@IJMTER-2014, All rights Reserved 517
e-ISSN: 2349-9745
p-ISSN: 2393-8161
Performance Analysis of Fault Detection in Round Trip
Delay and Path Wireless Sensor Networks
P.SARANYA1
, Mrs. M.PARAMESWARI2
1
M.E Communication systems ,2
ASSISTANT PROFESSOR, DEPT OF ECE
Dhanalakshmi Srinivasan Engineering College,Perambalur
Abstract- In recent years, wsns detect to the fault sensor node based on round trip delay using path
in wireless sensor networks. Portable sensor node is low cost in Wsns . Measured in the round trip
delay time and number of sensor node. Existing method is used to large value of sensor node,
identification of sensor node time and distance . it is used to linear selection path, disadvantages are
data loss, more number of path, complexity. in this proposed method using distributed autonomous
sensor software implementation in NS2.it is detected fault sensor node and malfunction ,in this
analysis time and path using discrete Rtp. real time applicability in received signal strength ,separate
wavelength for end of the node avoid the data loss and complexity. Hardware implementation using
ZigBee and Microcontroller .Equal to the hardware and software implementation. It is overcomes to
the data loss. comparing the threshold and Rtd time. Finally, the algorithm is tested under different
number of faulty sensors in the same area. Our Simulation results demonstrate that the time
consumed to find out the faulty nodes in our proposed algorithm is relatively less with a large
number of faulty sensors existing in the network.
Index Terms— Faulty sensor node, round trip delay, round trip path, Wsns.
I. INTRODUCTION
The advanced in wireless communication technologies enabled large scale wireless sensor networks
(WSNs) deployment. Due to the feature of easy of deployment of sensor nodes, wireless sensor
networks (WSNs) have a vast range of applications such as monitoring environment, military,
medical, industrial and rescue missions . Wireless sensor network is composed of large number of
sensor nodes. The event is sensed by the low power sensor node deployed in neighborhood and the
sensed information is transmitted to a remote processing unit or base station ,To deliver crucial
information from the environment in real time it is impossible with wired sensor networks whereas
wireless sensor networks are used for data collection and processing in real time from environment .
The ambient conditions in the environment are measured by sensors and then measurements are
processed in order to assess the situation accurately in area around the sensors. Over a large
geographical area large numbers of sensor nodes are deployed for accurate monitoring. Due to the
limited radio range of the sensor nodes the increase in network size increases coverage of area but
data transmission i.e. communication to the base station (BS) is made possible with the help of
intermediate nodes. Depending on the different applications of wireless sensor networks they are
either deployed manually or randomly. After being deployed either in a manual or random fashion,
the sensor nodes self-organize themselves and start communication by sending the sensed data.
These sensor networks are deployed at a great pace in the current world. Access to wireless sensor
networks through internet is expected within 15 years. There is an interesting unlimited potential in
this wireless technology with various application areas along with crisis management, transportation,
military, medical, natural disaster, seismic sensing and environmental. In general the two types of
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 518
wireless sensor networks are: unstructured and structured. The structured wireless sensor networks
are those in which the sensor nodes deployment is in a planned manner whereas unstructured
wireless sensor networks are the one in which sensor nodes deployment is in an ad-hoc manner. As
there is no fixed infrastructure between wireless sensor networks for communication, routing
becomes an issue in large number of sensor nodes deployed along with other challenges of
manufacturing, design and management of these networks. There are different topologies that have
been proposed for these issues.in this sensor node identify failure and malfunction node. These two
categories which are infrastructure less and infrastructure based have their own cons and pros. In the
first category which is the infrastructure based networks, both voice and data with good quality of
service from source to destination is carried but infrastructure is required. In second category which
is infrastructure less networks have constraints with limitation in bandwidth, power and range.
A wide range of wireless sensor network applications are:
Underwater sensor networks that are used for monitoring of fisheries and coral reefs . as these
networks use equipment’s that are lighter, smaller and less power consumption. This application of
WSN has many challenges that include data collection, event detection, high data rates and sparse
deployment of nodes.
Other applications of WSN include:
 Outdoor/indoor monitoring of environment.
 Monitoring of health.
 Factory and process automation.
Structural Monitoring Machine Monitoring Process Monitoring
II. NETWORKING TOPOLOGIES
We can use several network topologies to coordinate the Wireless sensor network gateway, end
nodes, and router nodes. Router nodes are much similar to end nodes in that they can store
measurement data, but they also can be used to pass along measurement data from other nodes . The
first, and most basic topology, is the star topology, in which each node maintains a single, direct
communication link with the gateway. This topology is very simple but restricts the overall distance
that our network can achieve. To increase the distance that a network can cover, you could
implement a cluster, or tree, topology. In this more complex architecture scenario, each node still
uses only one communication path to the gateway but can use other nodes to route its information
along that path. This topology suffers from a typical problem, however. If a router node goes down,
all the nodes which depend on that router node also lose their communication links to the gateway.
The mesh network topology reduces this issue by extensively using redundant communication paths
to increase reliability of the system. In a mesh network, nodes maintain multiple communication
links back to the gateway, so that if a router node goes down or does not work properly, the network
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 519
automatically reroutes the data through a different sets of path. The mesh topology, although very
reliable, suffers from an wide increase in network latency because data must make multiples of hops
before successfully arriving at the gateway
II. PROPOSED METHOD
Figure :1
Changed topology and protocol .it is used to alternate path .in this paper result in number of nodes
and delay using round trip path. Coverage vs number of nodes avoid to the data loss .it is improved
the efficiency.
III. NODE SELECTION
Coverage is one of the most important issues in WSNs and it has been studied extensively in recent
years. In most cases, ―coverage‖ means area coverage. And K-coverage can be described as that
every point in the monitored field is covered by at least K sensors. In [16], the authors consider that
it is hard to guarantee full coverage for a given randomly deployment area, even if all sensors are on-
duty. Small sensing holes are not likely to influence the effectiveness of sensor networks and are
acceptable for most application scenarios. It’s enough to meet the application’s requirements if the
active nodes in the network could maintain reasonable area coverage—coverage expectation.
Coverage mechanism is to choose a subset of active nodes to maintain the coverage expectation. We
introduce into clusters the notion of ―intra-cluster coverage‖, which selects some active nodes within
clusters while maintaining coverage expectation of the cluster. Utilizing the idea proposed in our
research , cluster head randomly chooses m’ nodes according to equation
m m-i
Pcov=∑ C^I (r/R)^2i(1-r^2/R^2)
i=k
where P cover is the coverage expectation of sensing field determined by specific applications; and r
is sensing radius, R is cluster radius; m’ is the number of active nodes. For example, distributing 200
nodes in a 100×100m2 field, r = 12m, R = 30m, then the average number of cluster members is 60 or
so. With intra-cluster coverage, if P cover = 99% which means 99% of sensing field is expected to
bemonitored, 27 members should be active in each cluster to ensure 1-coverage of the cluster and
38members to ensure 2-coverage. If Pcover =95%, only 16 nodes and 25 nodes should be active to
ensure 1-coverage and 2-coverage respectively. Fig (2) circular topology used in this method any
one link fail or fault another link or path is using topology
S2sss2ssss
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 520
Figure: 2
Simulation Parameters
Parameters Value
Network Filed (0,0)~(100,100)
Node numbers 10~100
Sensing radius characterization
Sink position (50,200)
Initial energy 2 J
Data packet size 525 Bytes
Broadcast packet size 20 Bytes
Data Cycles per round(L) 5
IV. SIMULATION RESULT
The improved efficiency scheme will be applied in a real wireless sensor network system. It is
expensive to run schemes on the hardware of the system, so the feasibility and accuracy of the
schemes should be verified before being applied. Therefore, simulation becomes the best alternative
way of testing, evaluating and verifying. We programmed the data loss and improved efficiency
scheme using Visual NS2. We compared the change of fault detection accuracy of the RTD time
with varying node failure ratios for different average numbers of neighbor nodes. Hundred nodes are
randomly deployed in the network, as shown in
Figure:4.1 Number of sensor nodes using simulator
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 521
Figure :4.2 Round trip path
Figure:4.3 Num of path and delay
Figure:4.4 Nodes and delay
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 522
Figure :4.5 coverage and delay
Figure : 4.6 coverage and round trip path delay
For evaluation of the proposed method, we use two metrics; the delay and coverage. The delay is the
time duration in which all packets generated by all nodes reach the BS. The coverage is the average
rate of successful data delivery over the channel and it is measured in data packets per time slot. In
simulations, the WSN consists of 100 sensor nodes randomly distributed within a circular area with
radius of 100 units. The BS is located in the center of the circular area.
V.COMPARISON GRAPH
Figure : 5.1 nodes and delay
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 523
By applying the proposed method to WSNs, delay and coverage performances significantly
improved. The performance of the proposed method depends on the network topology. Compared to
the topologies with low and high 2 ratios, in the topologies with the medium 12 ratios, the percentage
of performance improvement in the proposed algorithm is more.
VI. CONCLUSION
For the node whose actual status is normal, if the number of nodes which is initially diagnosed as
possibly normal (RTD) in its neighbor nodes is less than half of the total neighbor nodes, the round
trip delay time node fault detection scheme will misdiagnose the normal node as faulty. Modification
is made to the detection criterion of and an improved efficiency scheme is proposed to address this
short coming. Simulation results show that the fault detection accuracy of the improved sensor node
out performs the for different average numbers of neighbor nodes and node failure ratios. It can also
be applied to wireless sensor networks where there are high neighbor nodes and the node failure ratio
is less.
Future Work for number of sensor nodes in this corresponding path.it will reduce detection time
and avoid data loss.
REFERENCES
[1] M. Lee and Y. Choi, ―Fault detection of wireless sensor networks,‖Comput. Commun., vol. 31, pp. 3469–3475, Jun.
2008.
[2] M. Asim, H. Mokhtar, and M. Merabti, ―A fault management architecture for wireless sensor network,‖ in Proc.
IWCMC, Aug. 2008, pp. 1–7.
[3] P. Jiang, ―A new method for node fault detection in wireless sensor networks,‖ Sensors, vol. 9, no. 2, pp. 1282–1294,
2009.
[4] S. S. Ahuja, R. Srinivasan, and M. Krunz, ―Single-link failure detection in all-optical networks using monitoring
cycles and paths,‖ IEEE/ACM Trans. Netw., vol. 17, no. 4, pp. 1080–1093, Aug. 2009
.[5] A. A. Boudhir, B. Mohamed, and B. A. Mohamed, ―New technique of wireless sensor networks localization based on
energy consumption,‖ Int. J. Comput. Appl., vol. 9, no. 12, pp. 25–28, Nov. 2010.
[6] I. Chen, A. P. Speer, and M. Eltoweissy, ―Adaptive fault tolerant QoS control algorithms for maximizing system
lifetime of query-based wireless sensor networks,‖ IEEE Trans. Dependable Secure Comput., vol. 8, no. 2, pp. 1–35,
Mar./Apr. 2011
[7] I. Chen, A. P. Speer, and M. Eltoweissy, ―Adaptive fault tolerant QoS control algorithms for maximizing system
lifetime of query-based wireless sensor networks,‖ IEEE Trans. Dependable Secure Comput., vol. 8, no. 2, pp. 1–35,
Mar./Apr. 2011
[8] I. Chen, A. P. Speer, and M. Eltoweissy, ―Adaptive fault tolerant QoS control algorithms for maximizing system
lifetime of query-based wireless sensor networks,‖ IEEE Trans. Dependable Secure Comput. vol. 8, no. 2, pp. 1–35,
Mar./Apr. 2011
.[9] R. N. Duche and N. P. Sarwade, ―Sensor node failure or malfunctioning detection in wireless sensor network,‖
ACEEE Int. J. Commun., vol. 3, no. 1, pp. 57–61, Mar. 2012.
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless Sensor Networks
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless Sensor Networks

Recomendados

Wireless sensor network report por
Wireless sensor network reportWireless sensor network report
Wireless sensor network reportGanesh Khadsan
12.7K visualizações21 slides
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network por
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkIJMTST Journal
60 visualizações5 slides
wireless sensor network a survey por
wireless sensor network a surveywireless sensor network a survey
wireless sensor network a surveyThesis Scientist Private Limited
2.8K visualizações87 slides
50120140503002 por
5012014050300250120140503002
50120140503002IAEME Publication
323 visualizações14 slides
9345.pdf por
9345.pdf9345.pdf
9345.pdfRajShah860705
42 visualizações4 slides
wireless sensor network por
wireless sensor networkwireless sensor network
wireless sensor networkDeepaDasarathan
724 visualizações25 slides

Mais conteúdo relacionado

Mais procurados

Wireless Sensor Networks por
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksrajatmal4
58.6K visualizações30 slides
Hetrogenous wireless sensor network por
Hetrogenous wireless sensor networkHetrogenous wireless sensor network
Hetrogenous wireless sensor networkChinmoy Jena
3.6K visualizações32 slides
Scalability in wireless sensor networks por
Scalability in wireless sensor networksScalability in wireless sensor networks
Scalability in wireless sensor networkssourabhshivtiwari
4.9K visualizações16 slides
Wireless sensor network lifetime constraints por
Wireless sensor network lifetime constraintsWireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsmmjalbiaty
1.6K visualizações24 slides
Wsn by checkmate por
Wsn by checkmateWsn by checkmate
Wsn by checkmatePaYal Umraliya
2.8K visualizações20 slides
Chapter por
ChapterChapter
ChapterRajat Soni
988 visualizações31 slides

Mais procurados(20)

Wireless Sensor Networks por rajatmal4
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
rajatmal458.6K visualizações
Hetrogenous wireless sensor network por Chinmoy Jena
Hetrogenous wireless sensor networkHetrogenous wireless sensor network
Hetrogenous wireless sensor network
Chinmoy Jena3.6K visualizações
Scalability in wireless sensor networks por sourabhshivtiwari
Scalability in wireless sensor networksScalability in wireless sensor networks
Scalability in wireless sensor networks
sourabhshivtiwari4.9K visualizações
Wireless sensor network lifetime constraints por mmjalbiaty
Wireless sensor network lifetime constraintsWireless sensor network lifetime constraints
Wireless sensor network lifetime constraints
mmjalbiaty1.6K visualizações
Wsn by checkmate por PaYal Umraliya
Wsn by checkmateWsn by checkmate
Wsn by checkmate
PaYal Umraliya2.8K visualizações
Chapter por Rajat Soni
ChapterChapter
Chapter
Rajat Soni988 visualizações
wsn por Saurabh Singh
wsnwsn
wsn
Saurabh Singh206 visualizações
Optimum Sensor Node Localization in Wireless Sensor Networks por paperpublications3
Optimum Sensor Node Localization in Wireless Sensor NetworksOptimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor Networks
paperpublications332 visualizações
Report on WIRELESS SENSOR NETWORK por Nishant Bhardwaj
Report on WIRELESS SENSOR NETWORKReport on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORK
Nishant Bhardwaj4.6K visualizações
WSN presentation por Braj Raj Singh
WSN presentationWSN presentation
WSN presentation
Braj Raj Singh8.7K visualizações
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou... por journalBEEI
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
journalBEEI16 visualizações
Wsn ppt original por Deepak Kumar Dhal
Wsn ppt originalWsn ppt original
Wsn ppt original
Deepak Kumar Dhal14.4K visualizações
Localization in WSN por Yara Ali
Localization in WSNLocalization in WSN
Localization in WSN
Yara Ali22.2K visualizações
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ... por Vinayak Kulkarni
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
Vinayak Kulkarni1.1K visualizações
Comprehensive Review on Base Energy Efficient Routing Protocol por IJRES Journal
Comprehensive Review on Base Energy Efficient Routing ProtocolComprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing Protocol
IJRES Journal184 visualizações
De3211001104 por IJMER
De3211001104De3211001104
De3211001104
IJMER380 visualizações
3D Localization Algorithms for Wireless Sensor Networks por IOSR Journals
3D Localization Algorithms for Wireless Sensor Networks3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks
IOSR Journals560 visualizações
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw... por Onyebuchi nosiri
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Onyebuchi nosiri34 visualizações
Data retrieval in sensor networks por Acad
Data retrieval in sensor networksData retrieval in sensor networks
Data retrieval in sensor networks
Acad3.1K visualizações
ENERGY EFFICIENT MULTIHOP QUALITY PATH BASED DATA COLLECTION IN WIRELESS SENS... por Editor IJMTER
ENERGY EFFICIENT MULTIHOP QUALITY PATH BASED DATA COLLECTION IN WIRELESS SENS...ENERGY EFFICIENT MULTIHOP QUALITY PATH BASED DATA COLLECTION IN WIRELESS SENS...
ENERGY EFFICIENT MULTIHOP QUALITY PATH BASED DATA COLLECTION IN WIRELESS SENS...
Editor IJMTER556 visualizações

Similar a Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless Sensor Networks

An Approach of Mobile Wireless Sensor Network for Target Coverage and Network... por
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...IRJET Journal
39 visualizações6 slides
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network por
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor NetworkIRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor NetworkIRJET Journal
11 visualizações4 slides
The International Journal of Engineering and Science (IJES) por
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)theijes
498 visualizações8 slides
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN... por
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...IJEEE
336 visualizações4 slides
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK por
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKCODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKIJNSA Journal
40 visualizações8 slides
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se... por
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...IRJET Journal
29 visualizações9 slides

Similar a Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless Sensor Networks(20)

An Approach of Mobile Wireless Sensor Network for Target Coverage and Network... por IRJET Journal
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
IRJET Journal39 visualizações
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network por IRJET Journal
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor NetworkIRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET Journal11 visualizações
The International Journal of Engineering and Science (IJES) por theijes
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
theijes498 visualizações
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN... por IJEEE
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
IJEEE 336 visualizações
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK por IJNSA Journal
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKCODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
IJNSA Journal40 visualizações
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se... por IRJET Journal
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
IRJET Journal29 visualizações
Energetic Slot Allotment for Improving Interchange in Wireless Sensor Network por IRJET Journal
Energetic Slot Allotment for Improving Interchange in Wireless Sensor NetworkEnergetic Slot Allotment for Improving Interchange in Wireless Sensor Network
Energetic Slot Allotment for Improving Interchange in Wireless Sensor Network
IRJET Journal23 visualizações
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI... por ijwmn
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
ijwmn5 visualizações
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI... por ijwmn
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
ijwmn16 visualizações
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network por IRJET Journal
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor NetworkIRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET Journal11 visualizações
A Brief Research Study Of Wireless Sensor Network por Cassie Romero
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor Network
Cassie Romero4 visualizações
Grid-Based Multipath with Congestion Avoidance Routing Protocol por ijtsrd
Grid-Based Multipath with Congestion Avoidance Routing ProtocolGrid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing Protocol
ijtsrd12 visualizações
A Review Paper on Energy Capable Routing in Wireless Sensor Network por ijtsrd
A Review Paper on Energy Capable Routing in Wireless Sensor NetworkA Review Paper on Energy Capable Routing in Wireless Sensor Network
A Review Paper on Energy Capable Routing in Wireless Sensor Network
ijtsrd5 visualizações
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N... por IRJET Journal
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET Journal5 visualizações
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O... por IJEEE
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
IJEEE 305 visualizações
0512ijdps26 por Er_Loveleen
0512ijdps260512ijdps26
0512ijdps26
Er_Loveleen339 visualizações
L046027479 por IJERA Editor
L046027479L046027479
L046027479
IJERA Editor166 visualizações
International journal of computer science and innovation vol 2015-n1-paper5 por sophiabelthome
International journal of computer science and innovation  vol 2015-n1-paper5International journal of computer science and innovation  vol 2015-n1-paper5
International journal of computer science and innovation vol 2015-n1-paper5
sophiabelthome36 visualizações
Oj3425062509 por IJERA Editor
Oj3425062509Oj3425062509
Oj3425062509
IJERA Editor271 visualizações
Ijetcas14 591 por Iasir Journals
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
Iasir Journals281 visualizações

Mais de Editor IJMTER

A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP por
A NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIPA NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIPEditor IJMTER
837 visualizações10 slides
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ... por
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...Editor IJMTER
672 visualizações7 slides
Analysis of VoIP Traffic in WiMAX Environment por
Analysis of VoIP Traffic in WiMAX EnvironmentAnalysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentEditor IJMTER
480 visualizações13 slides
A Hybrid Cloud Approach for Secure Authorized De-Duplication por
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationEditor IJMTER
490 visualizações7 slides
Aging protocols that could incapacitate the Internet por
Aging protocols that could incapacitate the InternetAging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetEditor IJMTER
315 visualizações8 slides
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli... por
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...Editor IJMTER
817 visualizações8 slides

Mais de Editor IJMTER(20)

A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP por Editor IJMTER
A NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIPA NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
Editor IJMTER837 visualizações
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ... por Editor IJMTER
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
Editor IJMTER672 visualizações
Analysis of VoIP Traffic in WiMAX Environment por Editor IJMTER
Analysis of VoIP Traffic in WiMAX EnvironmentAnalysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX Environment
Editor IJMTER480 visualizações
A Hybrid Cloud Approach for Secure Authorized De-Duplication por Editor IJMTER
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-Duplication
Editor IJMTER490 visualizações
Aging protocols that could incapacitate the Internet por Editor IJMTER
Aging protocols that could incapacitate the InternetAging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the Internet
Editor IJMTER315 visualizações
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli... por Editor IJMTER
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
Editor IJMTER817 visualizações
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES por Editor IJMTER
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESA CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
Editor IJMTER335 visualizações
Sustainable Construction With Foam Concrete As A Green Green Building Material por Editor IJMTER
Sustainable Construction With Foam Concrete As A Green Green Building MaterialSustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building Material
Editor IJMTER1.6K visualizações
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST por Editor IJMTER
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTUSE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
Editor IJMTER3.2K visualizações
Textual Data Partitioning with Relationship and Discriminative Analysis por Editor IJMTER
Textual Data Partitioning with Relationship and Discriminative AnalysisTextual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative Analysis
Editor IJMTER293 visualizações
Testing of Matrices Multiplication Methods on Different Processors por Editor IJMTER
Testing of Matrices Multiplication Methods on Different ProcessorsTesting of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different Processors
Editor IJMTER245 visualizações
Survey on Malware Detection Techniques por Editor IJMTER
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection Techniques
Editor IJMTER408 visualizações
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE por Editor IJMTER
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
Editor IJMTER241 visualizações
SURVEY OF GLAUCOMA DETECTION METHODS por Editor IJMTER
SURVEY OF GLAUCOMA DETECTION METHODSSURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODS
Editor IJMTER431 visualizações
Survey: Multipath routing for Wireless Sensor Network por Editor IJMTER
Survey: Multipath routing for Wireless Sensor NetworkSurvey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor Network
Editor IJMTER267 visualizações
Step up DC-DC Impedance source network based PMDC Motor Drive por Editor IJMTER
Step up DC-DC Impedance source network based PMDC Motor DriveStep up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor Drive
Editor IJMTER285 visualizações
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION por Editor IJMTER
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONSPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
Editor IJMTER2.3K visualizações
Software Quality Analysis Using Mutation Testing Scheme por Editor IJMTER
Software Quality Analysis Using Mutation Testing SchemeSoftware Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing Scheme
Editor IJMTER269 visualizações
Software Defect Prediction Using Local and Global Analysis por Editor IJMTER
Software Defect Prediction Using Local and Global AnalysisSoftware Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global Analysis
Editor IJMTER269 visualizações
Software Cost Estimation Using Clustering and Ranking Scheme por Editor IJMTER
Software Cost Estimation Using Clustering and Ranking SchemeSoftware Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking Scheme
Editor IJMTER475 visualizações

Último

Proposal Presentation.pptx por
Proposal Presentation.pptxProposal Presentation.pptx
Proposal Presentation.pptxkeytonallamon
17 visualizações36 slides
K8S Roadmap.pdf por
K8S Roadmap.pdfK8S Roadmap.pdf
K8S Roadmap.pdfMaryamTavakkoli2
6 visualizações1 slide
Stone Masonry and Brick Masonry.pdf por
Stone Masonry and Brick Masonry.pdfStone Masonry and Brick Masonry.pdf
Stone Masonry and Brick Masonry.pdfMohammed Abdullah Laskar
21 visualizações6 slides
DevOps to DevSecOps: Enhancing Software Security Throughout The Development L... por
DevOps to DevSecOps: Enhancing Software Security Throughout The Development L...DevOps to DevSecOps: Enhancing Software Security Throughout The Development L...
DevOps to DevSecOps: Enhancing Software Security Throughout The Development L...Anowar Hossain
12 visualizações34 slides
START Newsletter 3 por
START Newsletter 3START Newsletter 3
START Newsletter 3Start Project
5 visualizações25 slides
Taking out the Trash (And the Recyclables]: RFID and the Handling of Municipa... por
Taking out the Trash (And the Recyclables]: RFID and the Handling of Municipa...Taking out the Trash (And the Recyclables]: RFID and the Handling of Municipa...
Taking out the Trash (And the Recyclables]: RFID and the Handling of Municipa...ijseajournal
5 visualizações13 slides

Último(20)

Proposal Presentation.pptx por keytonallamon
Proposal Presentation.pptxProposal Presentation.pptx
Proposal Presentation.pptx
keytonallamon17 visualizações
K8S Roadmap.pdf por MaryamTavakkoli2
K8S Roadmap.pdfK8S Roadmap.pdf
K8S Roadmap.pdf
MaryamTavakkoli26 visualizações
DevOps to DevSecOps: Enhancing Software Security Throughout The Development L... por Anowar Hossain
DevOps to DevSecOps: Enhancing Software Security Throughout The Development L...DevOps to DevSecOps: Enhancing Software Security Throughout The Development L...
DevOps to DevSecOps: Enhancing Software Security Throughout The Development L...
Anowar Hossain12 visualizações
START Newsletter 3 por Start Project
START Newsletter 3START Newsletter 3
START Newsletter 3
Start Project5 visualizações
Taking out the Trash (And the Recyclables]: RFID and the Handling of Municipa... por ijseajournal
Taking out the Trash (And the Recyclables]: RFID and the Handling of Municipa...Taking out the Trash (And the Recyclables]: RFID and the Handling of Municipa...
Taking out the Trash (And the Recyclables]: RFID and the Handling of Municipa...
ijseajournal5 visualizações
SPICE PARK DEC2023 (6,625 SPICE Models) por Tsuyoshi Horigome
SPICE PARK DEC2023 (6,625 SPICE Models) SPICE PARK DEC2023 (6,625 SPICE Models)
SPICE PARK DEC2023 (6,625 SPICE Models)
Tsuyoshi Horigome17 visualizações
Machine learning in drug supply chain management during disease outbreaks: a ... por IJECEIAES
Machine learning in drug supply chain management during disease outbreaks: a ...Machine learning in drug supply chain management during disease outbreaks: a ...
Machine learning in drug supply chain management during disease outbreaks: a ...
IJECEIAES12 visualizações
sam_software_eng_cv.pdf por sammyigbinovia
sam_software_eng_cv.pdfsam_software_eng_cv.pdf
sam_software_eng_cv.pdf
sammyigbinovia5 visualizações
Thermal aware task assignment for multicore processors using genetic algorithm por IJECEIAES
Thermal aware task assignment for multicore processors using genetic algorithm Thermal aware task assignment for multicore processors using genetic algorithm
Thermal aware task assignment for multicore processors using genetic algorithm
IJECEIAES31 visualizações
SUMIT SQL PROJECT SUPERSTORE 1.pptx por Sumit Jadhav
SUMIT SQL PROJECT SUPERSTORE 1.pptxSUMIT SQL PROJECT SUPERSTORE 1.pptx
SUMIT SQL PROJECT SUPERSTORE 1.pptx
Sumit Jadhav 12 visualizações
What is Whirling Hygrometer.pdf por IIT KHARAGPUR
What is Whirling Hygrometer.pdfWhat is Whirling Hygrometer.pdf
What is Whirling Hygrometer.pdf
IIT KHARAGPUR 11 visualizações
fakenews_DBDA_Mar23.pptx por deepmitra8
fakenews_DBDA_Mar23.pptxfakenews_DBDA_Mar23.pptx
fakenews_DBDA_Mar23.pptx
deepmitra814 visualizações
Update 42 models(Diode/General ) in SPICE PARK(DEC2023) por Tsuyoshi Horigome
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
Tsuyoshi Horigome23 visualizações
Searching in Data Structure por raghavbirla63
Searching in Data StructureSearching in Data Structure
Searching in Data Structure
raghavbirla635 visualizações
Saikat Chakraborty Java Oracle Certificate.pdf por SaikatChakraborty787148
Saikat Chakraborty Java Oracle Certificate.pdfSaikat Chakraborty Java Oracle Certificate.pdf
Saikat Chakraborty Java Oracle Certificate.pdf
SaikatChakraborty78714815 visualizações
An approach of ontology and knowledge base for railway maintenance por IJECEIAES
An approach of ontology and knowledge base for railway maintenanceAn approach of ontology and knowledge base for railway maintenance
An approach of ontology and knowledge base for railway maintenance
IJECEIAES12 visualizações
zincalume water storage tank design.pdf por 3D LABS
zincalume water storage tank design.pdfzincalume water storage tank design.pdf
zincalume water storage tank design.pdf
3D LABS5 visualizações

Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless Sensor Networks

  • 1. Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com @IJMTER-2014, All rights Reserved 517 e-ISSN: 2349-9745 p-ISSN: 2393-8161 Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless Sensor Networks P.SARANYA1 , Mrs. M.PARAMESWARI2 1 M.E Communication systems ,2 ASSISTANT PROFESSOR, DEPT OF ECE Dhanalakshmi Srinivasan Engineering College,Perambalur Abstract- In recent years, wsns detect to the fault sensor node based on round trip delay using path in wireless sensor networks. Portable sensor node is low cost in Wsns . Measured in the round trip delay time and number of sensor node. Existing method is used to large value of sensor node, identification of sensor node time and distance . it is used to linear selection path, disadvantages are data loss, more number of path, complexity. in this proposed method using distributed autonomous sensor software implementation in NS2.it is detected fault sensor node and malfunction ,in this analysis time and path using discrete Rtp. real time applicability in received signal strength ,separate wavelength for end of the node avoid the data loss and complexity. Hardware implementation using ZigBee and Microcontroller .Equal to the hardware and software implementation. It is overcomes to the data loss. comparing the threshold and Rtd time. Finally, the algorithm is tested under different number of faulty sensors in the same area. Our Simulation results demonstrate that the time consumed to find out the faulty nodes in our proposed algorithm is relatively less with a large number of faulty sensors existing in the network. Index Terms— Faulty sensor node, round trip delay, round trip path, Wsns. I. INTRODUCTION The advanced in wireless communication technologies enabled large scale wireless sensor networks (WSNs) deployment. Due to the feature of easy of deployment of sensor nodes, wireless sensor networks (WSNs) have a vast range of applications such as monitoring environment, military, medical, industrial and rescue missions . Wireless sensor network is composed of large number of sensor nodes. The event is sensed by the low power sensor node deployed in neighborhood and the sensed information is transmitted to a remote processing unit or base station ,To deliver crucial information from the environment in real time it is impossible with wired sensor networks whereas wireless sensor networks are used for data collection and processing in real time from environment . The ambient conditions in the environment are measured by sensors and then measurements are processed in order to assess the situation accurately in area around the sensors. Over a large geographical area large numbers of sensor nodes are deployed for accurate monitoring. Due to the limited radio range of the sensor nodes the increase in network size increases coverage of area but data transmission i.e. communication to the base station (BS) is made possible with the help of intermediate nodes. Depending on the different applications of wireless sensor networks they are either deployed manually or randomly. After being deployed either in a manual or random fashion, the sensor nodes self-organize themselves and start communication by sending the sensed data. These sensor networks are deployed at a great pace in the current world. Access to wireless sensor networks through internet is expected within 15 years. There is an interesting unlimited potential in this wireless technology with various application areas along with crisis management, transportation, military, medical, natural disaster, seismic sensing and environmental. In general the two types of
  • 2. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 518 wireless sensor networks are: unstructured and structured. The structured wireless sensor networks are those in which the sensor nodes deployment is in a planned manner whereas unstructured wireless sensor networks are the one in which sensor nodes deployment is in an ad-hoc manner. As there is no fixed infrastructure between wireless sensor networks for communication, routing becomes an issue in large number of sensor nodes deployed along with other challenges of manufacturing, design and management of these networks. There are different topologies that have been proposed for these issues.in this sensor node identify failure and malfunction node. These two categories which are infrastructure less and infrastructure based have their own cons and pros. In the first category which is the infrastructure based networks, both voice and data with good quality of service from source to destination is carried but infrastructure is required. In second category which is infrastructure less networks have constraints with limitation in bandwidth, power and range. A wide range of wireless sensor network applications are: Underwater sensor networks that are used for monitoring of fisheries and coral reefs . as these networks use equipment’s that are lighter, smaller and less power consumption. This application of WSN has many challenges that include data collection, event detection, high data rates and sparse deployment of nodes. Other applications of WSN include:  Outdoor/indoor monitoring of environment.  Monitoring of health.  Factory and process automation. Structural Monitoring Machine Monitoring Process Monitoring II. NETWORKING TOPOLOGIES We can use several network topologies to coordinate the Wireless sensor network gateway, end nodes, and router nodes. Router nodes are much similar to end nodes in that they can store measurement data, but they also can be used to pass along measurement data from other nodes . The first, and most basic topology, is the star topology, in which each node maintains a single, direct communication link with the gateway. This topology is very simple but restricts the overall distance that our network can achieve. To increase the distance that a network can cover, you could implement a cluster, or tree, topology. In this more complex architecture scenario, each node still uses only one communication path to the gateway but can use other nodes to route its information along that path. This topology suffers from a typical problem, however. If a router node goes down, all the nodes which depend on that router node also lose their communication links to the gateway. The mesh network topology reduces this issue by extensively using redundant communication paths to increase reliability of the system. In a mesh network, nodes maintain multiple communication links back to the gateway, so that if a router node goes down or does not work properly, the network
  • 3. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 519 automatically reroutes the data through a different sets of path. The mesh topology, although very reliable, suffers from an wide increase in network latency because data must make multiples of hops before successfully arriving at the gateway II. PROPOSED METHOD Figure :1 Changed topology and protocol .it is used to alternate path .in this paper result in number of nodes and delay using round trip path. Coverage vs number of nodes avoid to the data loss .it is improved the efficiency. III. NODE SELECTION Coverage is one of the most important issues in WSNs and it has been studied extensively in recent years. In most cases, ―coverage‖ means area coverage. And K-coverage can be described as that every point in the monitored field is covered by at least K sensors. In [16], the authors consider that it is hard to guarantee full coverage for a given randomly deployment area, even if all sensors are on- duty. Small sensing holes are not likely to influence the effectiveness of sensor networks and are acceptable for most application scenarios. It’s enough to meet the application’s requirements if the active nodes in the network could maintain reasonable area coverage—coverage expectation. Coverage mechanism is to choose a subset of active nodes to maintain the coverage expectation. We introduce into clusters the notion of ―intra-cluster coverage‖, which selects some active nodes within clusters while maintaining coverage expectation of the cluster. Utilizing the idea proposed in our research , cluster head randomly chooses m’ nodes according to equation m m-i Pcov=∑ C^I (r/R)^2i(1-r^2/R^2) i=k where P cover is the coverage expectation of sensing field determined by specific applications; and r is sensing radius, R is cluster radius; m’ is the number of active nodes. For example, distributing 200 nodes in a 100×100m2 field, r = 12m, R = 30m, then the average number of cluster members is 60 or so. With intra-cluster coverage, if P cover = 99% which means 99% of sensing field is expected to bemonitored, 27 members should be active in each cluster to ensure 1-coverage of the cluster and 38members to ensure 2-coverage. If Pcover =95%, only 16 nodes and 25 nodes should be active to ensure 1-coverage and 2-coverage respectively. Fig (2) circular topology used in this method any one link fail or fault another link or path is using topology S2sss2ssss
  • 4. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 520 Figure: 2 Simulation Parameters Parameters Value Network Filed (0,0)~(100,100) Node numbers 10~100 Sensing radius characterization Sink position (50,200) Initial energy 2 J Data packet size 525 Bytes Broadcast packet size 20 Bytes Data Cycles per round(L) 5 IV. SIMULATION RESULT The improved efficiency scheme will be applied in a real wireless sensor network system. It is expensive to run schemes on the hardware of the system, so the feasibility and accuracy of the schemes should be verified before being applied. Therefore, simulation becomes the best alternative way of testing, evaluating and verifying. We programmed the data loss and improved efficiency scheme using Visual NS2. We compared the change of fault detection accuracy of the RTD time with varying node failure ratios for different average numbers of neighbor nodes. Hundred nodes are randomly deployed in the network, as shown in Figure:4.1 Number of sensor nodes using simulator
  • 5. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 521 Figure :4.2 Round trip path Figure:4.3 Num of path and delay Figure:4.4 Nodes and delay
  • 6. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 522 Figure :4.5 coverage and delay Figure : 4.6 coverage and round trip path delay For evaluation of the proposed method, we use two metrics; the delay and coverage. The delay is the time duration in which all packets generated by all nodes reach the BS. The coverage is the average rate of successful data delivery over the channel and it is measured in data packets per time slot. In simulations, the WSN consists of 100 sensor nodes randomly distributed within a circular area with radius of 100 units. The BS is located in the center of the circular area. V.COMPARISON GRAPH Figure : 5.1 nodes and delay
  • 7. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 523 By applying the proposed method to WSNs, delay and coverage performances significantly improved. The performance of the proposed method depends on the network topology. Compared to the topologies with low and high 2 ratios, in the topologies with the medium 12 ratios, the percentage of performance improvement in the proposed algorithm is more. VI. CONCLUSION For the node whose actual status is normal, if the number of nodes which is initially diagnosed as possibly normal (RTD) in its neighbor nodes is less than half of the total neighbor nodes, the round trip delay time node fault detection scheme will misdiagnose the normal node as faulty. Modification is made to the detection criterion of and an improved efficiency scheme is proposed to address this short coming. Simulation results show that the fault detection accuracy of the improved sensor node out performs the for different average numbers of neighbor nodes and node failure ratios. It can also be applied to wireless sensor networks where there are high neighbor nodes and the node failure ratio is less. Future Work for number of sensor nodes in this corresponding path.it will reduce detection time and avoid data loss. REFERENCES [1] M. Lee and Y. Choi, ―Fault detection of wireless sensor networks,‖Comput. Commun., vol. 31, pp. 3469–3475, Jun. 2008. [2] M. Asim, H. Mokhtar, and M. Merabti, ―A fault management architecture for wireless sensor network,‖ in Proc. IWCMC, Aug. 2008, pp. 1–7. [3] P. Jiang, ―A new method for node fault detection in wireless sensor networks,‖ Sensors, vol. 9, no. 2, pp. 1282–1294, 2009. [4] S. S. Ahuja, R. Srinivasan, and M. Krunz, ―Single-link failure detection in all-optical networks using monitoring cycles and paths,‖ IEEE/ACM Trans. Netw., vol. 17, no. 4, pp. 1080–1093, Aug. 2009 .[5] A. A. Boudhir, B. Mohamed, and B. A. Mohamed, ―New technique of wireless sensor networks localization based on energy consumption,‖ Int. J. Comput. Appl., vol. 9, no. 12, pp. 25–28, Nov. 2010. [6] I. Chen, A. P. Speer, and M. Eltoweissy, ―Adaptive fault tolerant QoS control algorithms for maximizing system lifetime of query-based wireless sensor networks,‖ IEEE Trans. Dependable Secure Comput., vol. 8, no. 2, pp. 1–35, Mar./Apr. 2011 [7] I. Chen, A. P. Speer, and M. Eltoweissy, ―Adaptive fault tolerant QoS control algorithms for maximizing system lifetime of query-based wireless sensor networks,‖ IEEE Trans. Dependable Secure Comput., vol. 8, no. 2, pp. 1–35, Mar./Apr. 2011 [8] I. Chen, A. P. Speer, and M. Eltoweissy, ―Adaptive fault tolerant QoS control algorithms for maximizing system lifetime of query-based wireless sensor networks,‖ IEEE Trans. Dependable Secure Comput. vol. 8, no. 2, pp. 1–35, Mar./Apr. 2011 .[9] R. N. Duche and N. P. Sarwade, ―Sensor node failure or malfunctioning detection in wireless sensor network,‖ ACEEE Int. J. Commun., vol. 3, no. 1, pp. 57–61, Mar. 2012.