Identifying Node Failures in Cellular Wireless Network Systems : A Probabilistic Approach

Authors

  • Gaddipathi Bharathi  Department of MCA , St. Mary's Group of Institutions, Guntur, Andhra Pradesh, India
  • Nallabothula Bhujanga Chakrapani  Department of MCA , St. Mary's Group of Institutions, Guntur, Andhra Pradesh, India

Keywords:

Node Failure Binary Scheme, Non Binary Scheme, Fault Management.

Abstract

The main concept of this paper is to detect the node failures and the signal strength of the nodes. To find out these fail nodes we use two schemes, Binary Scheme and Non Binary Scheme. In Binary scheme, there are two ways one is send query and other one is receive query. In Binary scheme, the result will be in Zero’s and One’s, if the Node is active means result will be 1 and if when the node is in active means 0. In this Node A will send the status of Node B, Node B will send the status of Node C and Node C will send the status of Node D. But we cannot find the strength of each node in this binary scheme. For this reason we go for Non Binary Scheme, in this scheme we can check whether the node is in strong state or weak state to receive the signals. Same like in binary scheme Node A will send the strong or weak status of Node B, Node B will send the Strong or weak status of Node C and Node C will send the Strong or Weak status of Node D. Also while sending the files it will select the alternate path automatically for off and weak nodes. So by using the alternate nodes the files will reach the destination. And also by using the main node we can check the node status and we can check the file status also in those particular nodes.

References

  1. R. Badonnel, R. State, and O. Festor. Self-configurable fault monitoring in ad-hoc networks. Ad Hoc Networks, 6(3):458-473, May 2008.
  2. P. Bahl and V. N. Padmanabhan. RADAR: An in-building RF-based user location and tracking system. In Proc. of IEEE INFOCOM, 2000.
  3. Y. Bar-Shalom, T. Kirubarajan, and X.-R. Li. Estimation with Applications to Tracking and Navigation. John Wiley & Sons, Inc., 2002.
  4. D. Ben Khedher, R. Glitho, and R. Dssouli. Novel Overlay-Based Failure Detection Architecture for MANET Applications. In IEEEInternational Conference on Networks, pages 130-135, 2007.
  5. C. Bettstetter. Smooth is Better than Sharp: A Random Mobility Model for Simulation of Wireless Networks. In Proc. of ACM International Workshop on Modeling, Analysis and Simulation of Wireless and Mobile Systems, pages 19-27, New York, NY, USA, 2001.ACM.[7]
  6. C. Bettstetter. Topology Properties of Ad Hoc Networks with Random Waypoint Mobility. ACM SIGMOBILE Mobile Computing and Communications Review, 7(3):50-52, 2003.
  7. J. Broch, D. A. Maltz, D. B. Johnson, Y.-C. Hu, and J. Jetcheva.A Performance Comparison of Multi-Hop Wireless Ad hoc Network Routing Protocols. In Proc. of MobiCom, pages 85-97, New York, NY,USA, 1998. ACM.
  8. T. D. Chandra and S. Toueg. Unreliable Failure Detectors for ReliableDistributed Systems. Journal of the ACM, 43:225-267, 1996.
  9. I. Constandache, R. R. Choudhury, and I. Rhee. Towards Mobile PhoneLocalization without War-Driving. In Proc. of IEEE INFOCOM, March2010.
  10. Y. Yi, M. Gerla, and K. Obraczka. Scalable Team Multicast in Wireless Ad Hoc Networks Exploiting Coordinated Motion. Ad Hoc Networks,2(2):171-184, 2004.

Downloads

Published

2017-08-31

Issue

Section

Research Articles

How to Cite

[1]
Gaddipathi Bharathi, Nallabothula Bhujanga Chakrapani, " Identifying Node Failures in Cellular Wireless Network Systems : A Probabilistic Approach, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 4, pp.462-465, July-August-2017.