127 research outputs found

    Cut Detection and Recovery in Wireless Sensor Networks

    Get PDF
    In WSN(wireless sensor network) will get partition into multiple number connected elements due to the failure of a number of its nodes, that is termed has cut. We tend to contemplate the drop back of detective work cut by the remaining nodes of a wireless sensor network. We tend to propose associate degree algorithmic rule that enables. Each node to notice once the property to a specially selected node has been lost. One or a lot of nodes that are connected to the special node when the cut. The rule of algorithmic is distributed and not synchronized: Each node has to communicate with solely those nodes that are among its communication limit. The algorithmic rule relies on the repetitious computation of a untrue electrical pulse of nodes. The meeting time of the underlying repetitious theme is freelance of the dimensions and structure of the network. We tend to demonstrate the effectiveness of the planned algorithmic rule through simulations and real implementation

    Towards Spatial Queries over Phenomena in Sensor Networks

    Get PDF
    Today, technology developments enable inexpensive production and deployment of tiny sensing and computing nodes. Networked through wireless radio, such senor nodes form a new platform, wireless sensor networks, which provide novel ability to monitor spatiotemporally continuous phenomena. By treating a wireless sensor network as a database system, users can pose SQL-based queries over phenomena without needing to program detailed sensor node operations. DBMS-internally, intelligent and energyefficient data collection and processing algorithms have to be implemented to support spatial query processing over sensor networks. This dissertation proposes spatial query support for two views of continuous phenomena: field-based and object-based. A field-based view of continuous phenomena depicts them as a value distribution over a geographical area. However, due to the discrete and comparatively sparse distribution of sensor nodes, estimation methods are necessary to generate a field-based query result, and it has to be computed collaboratively ‘in-the-network’ due to energy constraints. This dissertation proposes SWOP, an in-network algorithm using Gaussian Kernel estimation. The key contribution is the use of a small number of Hermite coefficients to approximate the Gaussian Kernel function for sub-clustered sensor nodes, and processes the estimation result efficiently. An object-based view of continuous phenomena is interested in aspects such as the boundary of an ‘interesting region’ (e.g. toxic plume). This dissertation presents NED, which provides object boundary detection in sensor networks. NED encodes partial event estimation results based on confidence levels into optimized, variable length messages exchanged locally among neighboring sensor nodes to save communication cost. Therefore, sensor nodes detect objects and boundaries based on moving averages to eliminate noise effects and enhance detection quality. Furthermore, the dissertation proposes the SNAKE-based approach, which uses deformable curves to track the spatiotemporal changes of such objects incrementally in sensor networks. In the proposed algorithm, only neighboring nodes exchange messages to maintain the curve structures. Based on in-network tracking of deformable curves, other types of spatial and spatiotemporal properties of objects, such as area, can be provided by the sensor network. The experimental results proved that our approaches are resource friendly within the constrained sensor networks, while providing high quality query results

    Mesh-Mon: a Monitoring and Management System for Wireless Mesh Networks

    Get PDF
    A mesh network is a network of wireless routers that employ multi-hop routing and can be used to provide network access for mobile clients. Mobile mesh networks can be deployed rapidly to provide an alternate communication infrastructure for emergency response operations in areas with limited or damaged infrastructure. In this dissertation, we present Dart-Mesh: a Linux-based layer-3 dual-radio two-tiered mesh network that provides complete 802.11b coverage in the Sudikoff Lab for Computer Science at Dartmouth College. We faced several challenges in building, testing, monitoring and managing this network. These challenges motivated us to design and implement Mesh-Mon, a network monitoring system to aid system administrators in the management of a mobile mesh network. Mesh-Mon is a scalable, distributed and decentralized management system in which mesh nodes cooperate in a proactive manner to help detect, diagnose and resolve network problems automatically. Mesh-Mon is independent of the routing protocol used by the mesh routing layer and can function even if the routing protocol fails. We demonstrate this feature by running Mesh-Mon on two versions of Dart-Mesh, one running on AODV (a reactive mesh routing protocol) and the second running on OLSR (a proactive mesh routing protocol) in separate experiments. Mobility can cause links to break, leading to disconnected partitions. We identify critical nodes in the network, whose failure may cause a partition. We introduce two new metrics based on social-network analysis: the Localized Bridging Centrality (LBC) metric and the Localized Load-aware Bridging Centrality (LLBC) metric, that can identify critical nodes efficiently and in a fully distributed manner. We run a monitoring component on client nodes, called Mesh-Mon-Ami, which also assists Mesh-Mon nodes in the dissemination of management information between physically disconnected partitions, by acting as carriers for management data. We conclude, from our experimental evaluation on our 16-node Dart-Mesh testbed, that our system solves several management challenges in a scalable manner, and is a useful and effective tool for monitoring and managing real-world mesh networks

    Walkabout : an asynchronous messaging architecture for mobile devices

    Get PDF
    Modern mobile devices are prolific producers and consumers of digital data, and wireless networking capabilities enable them to transfer their data over the Internet while moving. Applications running on these devices may perform transfers to upload data for backup or distribution, or to download new content on demand. Unfortunately, the limited connectivity that mobile devices experience can make these transfers slow and impractical as the amount of data increases. This thesis argues that asynchronous messaging supported by local proxies can improve the transfer capabilities of mobile devices, making it practical for them to participate in large Internet transfers. The design of the Walkabout architecture follows this approach: proxies form store-and-forward overlay networks to deliver messages asynchronously across the Internet on behalf of devices. A mobile device uploads a message to a local proxy at rapid speed, and the overlay delivers it to one or more destination devices, caching the message until each one is able to retrieve it from a local proxy. A device is able to partially upload or download a message whenever it has network connectivity, and can resume this transfer at any proxy if interrupted through disconnection. Simulation results show that Walkabout provides better throughput for mobile devices than is possible under existing methods, for a range of movement patterns. Upload and end-to-end to transfer speeds are always high when the device sending the message is mobile. In the basic Walkabout model, a message sent to a mobile device that is repeatedly moving between a small selection of connection points experiences high download and end-to-end transfer speeds, but these speeds fall as the number of connection points grows. Pre-emptive message delivery extensions improve this situation, making fast end-to-end transfers and device downloads possible under any pattern of movement. This thesis describes the design and evaluation of Walkabout, with both practical implementation and extensive simulation under real-world scenarios

    LOCALIZED MOVEMENT CONTROL CONNECTIVITY RESTORATION ALGORITHMS FOR WIRELESS SENSOR AND ACTOR NETWORKS

    Get PDF
    Wireless Sensor and Actor Networks (WSANs) are gaining an increased interest because of their suitability for mission-critical applications that require autonomous and intelligent interaction with the environment. Hazardous application environments such as forest fire monitoring, disaster management, search and rescue, homeland security, battlefield reconnaissance, etc. make actors susceptible to physical damage. Failure of a critical (i.e. cut-vertex) actor partitions the inter-actor network into disjointed segments while leaving a coverage hole. Maintaining inter-actor connectivity is extremely important in mission-critical applications of WSANs where actors have to quickly plan an optimal coordinated response to detected events. Some proactive approaches pursued in the literature deploy redundant nodes to provide fault tolerance; however, this necessitates a large actor count that leads to higher cost and becomes impractical. On the other hand, the harsh environment strictly prohibits an external intervention to replace a failed node. Meanwhile, reactive approaches might not be suitable for time-sensitive applications. The autonomous and unattended nature of WSANs necessitates a self-healing and agile recovery process that involves existing actors to mend the severed inter-actor connectivity by reconfiguring the topology. Moreover, though the possibility of simultaneous multiple actor failure is rare, it may be precipitated by a hostile environment and disastrous events. With only localized information, recovery from such failures is extremely challenging. Furthermore, some applications may impose application-level constraints while recovering from a node failure. In this dissertation, we address the challenging connectivity restoration problem while maintaining minimal network state information. We have exploited the controlled movement of existing (internal) actors to restore the lost connectivity while minimizing the impact on coverage. We have pursued distributed greedy heuristics. This dissertation presents four novel approaches for recovering from node failure. In the first approach, volunteer actors exploit their partially utilized transmission power and reposition themselves in such a way that the connectivity is restored. The second approach identifies critical actors in advance, designates them preferably as noncritical backup nodes that replace the failed primary if such contingency arises in the future. In the third approach, we design a distributed algorithm that recovers from a special case of multiple simultaneous failures. The fourth approach factors in application-level constraints on the mobility of actors while recovering from node failure and strives to minimize the impact of critical node failure on coverage and connectivity. The performance of proposed approaches is analyzed and validated through extensive simulations. Simulation results confirm the effectiveness of proposed approaches that outperform the best contemporary schemes found in literature
    • …
    corecore