SlideShare a Scribd company logo
1 of 28
By:
SHAGUFTA YASMIN
     2SD12SCS11
Topics for discussion
 Introduction
    Sensor network
    Architecture of sensor network.
    Applications of sensor network.
    Challenges of sensor network.
 Cuts in sensor networks.
 Detection of cuts.
 Distributed cut detection algorithm.
 Conclusion.
 Future aspects.
 References.
 Sensor Network:

     It is a group of specialized transducers with a
 communication infrastructure intended to monitor
 and record conditions at diverse location, it may be
 temperature, pressure humidity wind direction and
 speed etc…
     It consists of multiple detection station called
 nodes, which is small, lightweight and portable.
Contd…
Contd…
Architecture of WSNs
 Transducer generates electrical signals.
 Microcomputer processes and stores
  Sensor output.
 Transceiver receives the
  commands from central
  computer, transmits data
  to that computer.
 Power from battery.
Applications
 Industrial monitoring.
   Machine health monitoring.
   Data logging.
   Industrial sense and control applications.
 Automated and smart homes.
     monitoring the activities performed in a smart
     home is achieved using wireless sensors embedded
     within everyday objects forming a sensor network.
 Medical device monitoring.
Contd…
 Monitoring of weather conditions.
 Air traffic control.
 Robot control.
 Air pollution monitoring.
 Forest fire detection.
 Natural disaster prevention.
Challenges
 One of the challenge in the successful use of WSNs
  come from limited energy of the individual sensor
  nodes.
 WSNs consist of large number of small, low cost
  sensor nodes distributed over large area.
 WSNs have emerged as a promising new technology
  to monitor large regions.
 Node failure is expected to be quite common. this is
  true for sensor networks deployed in harsh and
  dangerous fields such as forest fire monitoring and in
  defense applications.
Cuts in sensor networks
 WSNs can get separated into multiple connected
  components due to failure of some of its nodes, which
  is called “cut”.
 So here we consider the problem of detecting cuts.
 Two nodes are said to be disconnected if there is no
  path between them.
Contd…
Contd…
 In the figure, filled circles represents active nodes and
  unfilled circles represent failed node.
 Solid lines represents the edges, and dashed lines
  represent the edges that existed before the failure of
  node.
 the hole in (d) is indistinguishable from the cut in (b)
  to nodes that lie outside the region R
Detection of cuts
 Nodes that detect the occurrence and approximate the
  locations of the cuts can then alert the source node or base
  station.
 If the node were able to detect the occurrence of cut it could
  simply wait for the network to be repaired and eventually
  reconnected, which saves on-board energy of multiple nodes
  and prolongs their lives.
 The ability to detect cuts by both the disconnected node and
  source node will lead to increase in the operational lifetime
  of the network as a whole.
Distributed cut detection algorithm
 This algorithm allows each node to detect
  DOS(Disconnection frOm Source) events and subset of node
  to detect CCOS(connected but cut occurred somewhere)
  events.
 The algorithm is distributed and asynchronous.
 It involves only local communication between neighboring
  nodes and is robust to temporary communication failure
  between node pairs.
 A key component of the DCD algorithm is a distributed
  iterative computational step through which the nodes
  compute their electrical potentials.
Distributed cut Detection
  Definition and problem statement
 Time is measured with a discrete counter k=∞,…., -
  1,0,1,2,…..
 We model the sensor network as a time varying graph
    ( ) = ( (k )ℰ(k)), whose node set V(k) represents the
  sensor nodes active at time k and the edge set ℰ( )
  consist of pairs of nodes (u,v) such that nodes u and v can
  directly exchange the message between each other at
  time k.
 By an active nodes we mean a nodes that has not failed
  permanently .
Contid…
 All graphs considered here are undirected i.e (i,j)=(j,i).
 The neighbors of node i is the set     of nodes connected to i
    i.e.   = { |( , ) ∈ ℰ}.
    The numbers of neighbors of i, |       |, is called its
    degree, which is denoted by di.
    A path from i to j is sequence of edges connecting i and j.
   A graph is called connected if there is a path between every
    pair of nodes.
   A component Gc of the graph is maximal connected sub
    graph of G.
Contid…
 A cut is formally defined as the increase of the
  number of components of a graph due to the failure of
  subset of nodes.
 The number of the cuts associated with a cut event is
  the increase in the number of components after the
  event.
Contid…
 The problem we seek to address is two fold
   First we want to enable every node to detect if it is
    disconnected from source.
   Second we want to enable nodes that lie close to the cuts
    but are still connected to the source.
Contid…
 The DCD algorithm is based on the following electrical
    analogy.
    Imagine the wireless sensor network as an electrical circuit
    where the current is injected at the source node and
    extracted out of a common fictitious node that is connected
    to every node of sensor network.
    Each edge is replaced by the 1 Ω resistor.
    When a cut separates certain nodes from source node, the
    potential of each of those nodes becomes 0, since there is no
    current injection into their components.
    The potential is computed by an iterative scheme which only
    requires periodic communication among the neighboring
    nodes.
Contid…
DOS detection
• When node u is disconnected from the source, we say that a
  disconnected from source event has occurred for u.
• The algorithm allows each node to detect DOS events.
• The nodes use the computed potentials to detect if DOS
  event have occurred .
• The approach here is if the state is close to 0 then the node is
  disconnected from the source , otherwise not.
Contid…
 DOS detection part consist of steady state
 detection, normalized state computation and
 connection/separation detection.
Contid…
CCOS detection
 When a cut occurs in the network that does not separate a
  node u from the source node, connected but a cut occurred
  somewhere (CCOS) event has occurred for u.
 Detection of CCOS events by the nodes close to a cut, and
  approximate location of cut means location of one or more
  active nodes that lie at the boundary of cut and that are
  connected to source.
Contid…
 To detect the CCOS event the algorithm uses the fact
  that the potential of nodes that are connected to
  source node changes after the cut and also using probe
  messages.
 Probe messages that are initiated by the certain nodes
  that encounter failed neighbors, and are forwarded
  from one node to another node in a way that if short
  path exist around a hole created by node failures, the
  message will reach initiating nodes.
Contid…
 Each probe message contains the following
    information:
    A unique source ID
    Source node ID S
    Destination node,
    path traversed, and
    angle traversed by probe message.
Conclusion
 The DCD algorithm we propose here enables every
  node of a wireless sensor network to detect
  disconnected from source event if they occur.
 Second it enables the subset of nodes that experiences
  CCOS event to detect them and estimate the
  approximate location of the cut in the form of a list of
  active nodes that lie at the boundary of the cut/hole.
Future Aspect
 Application of DCD algorithm to detect the node
 separation and reconnection to the source in mobile
 networks.
references
 http:// www.liveieeeprojects.com
 http://www.ijsrp.org/research-paper-1212/ijsrp-p1203.pd
 http://www.faculty.cs.tamu.edu/stoleru/papers/prabir12c
  ut.pdf - United States
 www.cs.ucsb.edu/~suri/psdir/sentinel.pdf
 www.slideshare.net/.../cut-detection-in-wireless-sensor-
  networks
 http://en.wikipedia.org/wiki/Wireless_sensor_network
THANK YOU

More Related Content

Viewers also liked

wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar pptEisha Madhwal
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksrajatmal4
 
System in human life
System in human lifeSystem in human life
System in human lifeDefi_racfeb11
 
Cyclic Sleep Wake Up Scenario for Wireless Body Area Sensor Networks
Cyclic Sleep Wake Up Scenario for Wireless Body Area Sensor NetworksCyclic Sleep Wake Up Scenario for Wireless Body Area Sensor Networks
Cyclic Sleep Wake Up Scenario for Wireless Body Area Sensor Networksijircee
 
Body sensor networks: challenges & applications
Body sensor networks: challenges & applicationsBody sensor networks: challenges & applications
Body sensor networks: challenges & applicationsVasily Ryzhonkov
 
Biosensors and it’s application
Biosensors and it’s applicationBiosensors and it’s application
Biosensors and it’s applicationJoy Karmakar
 
WML-Tutorial
WML-TutorialWML-Tutorial
WML-TutorialOPENLANE
 
human detection robot
human detection robothuman detection robot
human detection robotS Ayub
 
Passive infrared based human detection alive robot
Passive infrared based human detection alive robotPassive infrared based human detection alive robot
Passive infrared based human detection alive robotSidharth Mohapatra
 
Cholesterol Bio Sensors: getter better fast
Cholesterol Bio Sensors: getter better fastCholesterol Bio Sensors: getter better fast
Cholesterol Bio Sensors: getter better fastJeffrey Funk
 
Wireless body area network
Wireless body area networkWireless body area network
Wireless body area networkPratik Gondaliya
 
wireless body area networks(WBAN)
wireless body area networks(WBAN)wireless body area networks(WBAN)
wireless body area networks(WBAN)kramsheeda
 
Automatic Wireless Health Monitoring System In Hospitals For Patients
Automatic Wireless Health Monitoring System In Hospitals For PatientsAutomatic Wireless Health Monitoring System In Hospitals For Patients
Automatic Wireless Health Monitoring System In Hospitals For PatientsEdgefxkits & Solutions
 

Viewers also liked (20)

wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
System in human life
System in human lifeSystem in human life
System in human life
 
Cyclic Sleep Wake Up Scenario for Wireless Body Area Sensor Networks
Cyclic Sleep Wake Up Scenario for Wireless Body Area Sensor NetworksCyclic Sleep Wake Up Scenario for Wireless Body Area Sensor Networks
Cyclic Sleep Wake Up Scenario for Wireless Body Area Sensor Networks
 
Body sensor networks: challenges & applications
Body sensor networks: challenges & applicationsBody sensor networks: challenges & applications
Body sensor networks: challenges & applications
 
Biosensors and it’s application
Biosensors and it’s applicationBiosensors and it’s application
Biosensors and it’s application
 
531 biosensors
531 biosensors531 biosensors
531 biosensors
 
Good-bye Mr.Chips by Muhammad Azam
Good-bye Mr.Chips  by Muhammad AzamGood-bye Mr.Chips  by Muhammad Azam
Good-bye Mr.Chips by Muhammad Azam
 
Wap wml
Wap wmlWap wml
Wap wml
 
WML-Tutorial
WML-TutorialWML-Tutorial
WML-Tutorial
 
human detection robot
human detection robothuman detection robot
human detection robot
 
Wireless Body Sensor Networks
Wireless Body Sensor Networks Wireless Body Sensor Networks
Wireless Body Sensor Networks
 
Passive infrared based human detection alive robot
Passive infrared based human detection alive robotPassive infrared based human detection alive robot
Passive infrared based human detection alive robot
 
Cholesterol Bio Sensors: getter better fast
Cholesterol Bio Sensors: getter better fastCholesterol Bio Sensors: getter better fast
Cholesterol Bio Sensors: getter better fast
 
Human Sensors
Human SensorsHuman Sensors
Human Sensors
 
Wireless body area network
Wireless body area networkWireless body area network
Wireless body area network
 
Body Area Network
Body Area NetworkBody Area Network
Body Area Network
 
AODV Protocol
AODV ProtocolAODV Protocol
AODV Protocol
 
wireless body area networks(WBAN)
wireless body area networks(WBAN)wireless body area networks(WBAN)
wireless body area networks(WBAN)
 
Automatic Wireless Health Monitoring System In Hospitals For Patients
Automatic Wireless Health Monitoring System In Hospitals For PatientsAutomatic Wireless Health Monitoring System In Hospitals For Patients
Automatic Wireless Health Monitoring System In Hospitals For Patients
 

Similar to Cut detection

Cut Detection in Wireless Sensor Network
Cut Detection in Wireless Sensor NetworkCut Detection in Wireless Sensor Network
Cut Detection in Wireless Sensor NetworkIJMTST Journal
 
Hack Recognition In Wireless Sensor Network
Hack Recognition In Wireless Sensor NetworkHack Recognition In Wireless Sensor Network
Hack Recognition In Wireless Sensor NetworkIJERA Editor
 
A Distributed Cut Detection Method for Wireless Sensor Networks
A Distributed Cut Detection Method for Wireless Sensor NetworksA Distributed Cut Detection Method for Wireless Sensor Networks
A Distributed Cut Detection Method for Wireless Sensor NetworksIJMER
 
Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...eSAT Publishing House
 
Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...eSAT Journals
 
CIP Based BOND for Wireless Sensor Networks
CIP Based BOND for Wireless Sensor NetworksCIP Based BOND for Wireless Sensor Networks
CIP Based BOND for Wireless Sensor Networksijsrd.com
 
Modified Coverage Hole Detection Algorithm for Distributed WSNs
Modified Coverage Hole Detection Algorithm for Distributed WSNsModified Coverage Hole Detection Algorithm for Distributed WSNs
Modified Coverage Hole Detection Algorithm for Distributed WSNsidescitation
 
Analysis and reactive measures on the blackhole attack
Analysis and reactive measures on the blackhole attackAnalysis and reactive measures on the blackhole attack
Analysis and reactive measures on the blackhole attackJyotiVERMA176
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...ijceronline
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...IJSRD
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkIJMTST Journal
 
Wireless Personal Area Networks (WPAN): Lowrate amd High Rate
Wireless Personal Area Networks (WPAN): Lowrate amd High RateWireless Personal Area Networks (WPAN): Lowrate amd High Rate
Wireless Personal Area Networks (WPAN): Lowrate amd High RateDon Norwood
 
2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stack2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stackSyed Ariful Islam Emon
 

Similar to Cut detection (20)

Pulkit 10103644
Pulkit 10103644Pulkit 10103644
Pulkit 10103644
 
Cut Detection in Wireless Sensor Network
Cut Detection in Wireless Sensor NetworkCut Detection in Wireless Sensor Network
Cut Detection in Wireless Sensor Network
 
Hack Recognition In Wireless Sensor Network
Hack Recognition In Wireless Sensor NetworkHack Recognition In Wireless Sensor Network
Hack Recognition In Wireless Sensor Network
 
A Distributed Cut Detection Method for Wireless Sensor Networks
A Distributed Cut Detection Method for Wireless Sensor NetworksA Distributed Cut Detection Method for Wireless Sensor Networks
A Distributed Cut Detection Method for Wireless Sensor Networks
 
Ijetr012022
Ijetr012022Ijetr012022
Ijetr012022
 
Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...
 
Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...
 
CIP Based BOND for Wireless Sensor Networks
CIP Based BOND for Wireless Sensor NetworksCIP Based BOND for Wireless Sensor Networks
CIP Based BOND for Wireless Sensor Networks
 
Modified Coverage Hole Detection Algorithm for Distributed WSNs
Modified Coverage Hole Detection Algorithm for Distributed WSNsModified Coverage Hole Detection Algorithm for Distributed WSNs
Modified Coverage Hole Detection Algorithm for Distributed WSNs
 
Analysis and reactive measures on the blackhole attack
Analysis and reactive measures on the blackhole attackAnalysis and reactive measures on the blackhole attack
Analysis and reactive measures on the blackhole attack
 
Ii2414621475
Ii2414621475Ii2414621475
Ii2414621475
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 
Indoor Localization in Wireless Sensor Networks
Indoor Localization in Wireless Sensor NetworksIndoor Localization in Wireless Sensor Networks
Indoor Localization in Wireless Sensor Networks
 
Ar03302620266
Ar03302620266Ar03302620266
Ar03302620266
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
 
Sensor net
Sensor netSensor net
Sensor net
 
2512ijcsea02
2512ijcsea022512ijcsea02
2512ijcsea02
 
Wireless Personal Area Networks (WPAN): Lowrate amd High Rate
Wireless Personal Area Networks (WPAN): Lowrate amd High RateWireless Personal Area Networks (WPAN): Lowrate amd High Rate
Wireless Personal Area Networks (WPAN): Lowrate amd High Rate
 
2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stack2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stack
 

Recently uploaded

psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterMateoGardella
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.MateoGardella
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 

Recently uploaded (20)

INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 

Cut detection

  • 1. By: SHAGUFTA YASMIN 2SD12SCS11
  • 2. Topics for discussion  Introduction  Sensor network  Architecture of sensor network.  Applications of sensor network.  Challenges of sensor network.  Cuts in sensor networks.  Detection of cuts.  Distributed cut detection algorithm.  Conclusion.  Future aspects.  References.
  • 3.  Sensor Network: It is a group of specialized transducers with a communication infrastructure intended to monitor and record conditions at diverse location, it may be temperature, pressure humidity wind direction and speed etc… It consists of multiple detection station called nodes, which is small, lightweight and portable.
  • 6. Architecture of WSNs  Transducer generates electrical signals.  Microcomputer processes and stores Sensor output.  Transceiver receives the commands from central computer, transmits data to that computer.  Power from battery.
  • 7. Applications  Industrial monitoring.  Machine health monitoring.  Data logging.  Industrial sense and control applications.  Automated and smart homes. monitoring the activities performed in a smart home is achieved using wireless sensors embedded within everyday objects forming a sensor network.  Medical device monitoring.
  • 8. Contd…  Monitoring of weather conditions.  Air traffic control.  Robot control.  Air pollution monitoring.  Forest fire detection.  Natural disaster prevention.
  • 9. Challenges  One of the challenge in the successful use of WSNs come from limited energy of the individual sensor nodes.  WSNs consist of large number of small, low cost sensor nodes distributed over large area.  WSNs have emerged as a promising new technology to monitor large regions.  Node failure is expected to be quite common. this is true for sensor networks deployed in harsh and dangerous fields such as forest fire monitoring and in defense applications.
  • 10. Cuts in sensor networks  WSNs can get separated into multiple connected components due to failure of some of its nodes, which is called “cut”.  So here we consider the problem of detecting cuts.  Two nodes are said to be disconnected if there is no path between them.
  • 12. Contd…  In the figure, filled circles represents active nodes and unfilled circles represent failed node.  Solid lines represents the edges, and dashed lines represent the edges that existed before the failure of node.  the hole in (d) is indistinguishable from the cut in (b) to nodes that lie outside the region R
  • 13. Detection of cuts  Nodes that detect the occurrence and approximate the locations of the cuts can then alert the source node or base station.  If the node were able to detect the occurrence of cut it could simply wait for the network to be repaired and eventually reconnected, which saves on-board energy of multiple nodes and prolongs their lives.  The ability to detect cuts by both the disconnected node and source node will lead to increase in the operational lifetime of the network as a whole.
  • 14. Distributed cut detection algorithm  This algorithm allows each node to detect DOS(Disconnection frOm Source) events and subset of node to detect CCOS(connected but cut occurred somewhere) events.  The algorithm is distributed and asynchronous.  It involves only local communication between neighboring nodes and is robust to temporary communication failure between node pairs.  A key component of the DCD algorithm is a distributed iterative computational step through which the nodes compute their electrical potentials.
  • 15. Distributed cut Detection Definition and problem statement  Time is measured with a discrete counter k=∞,…., - 1,0,1,2,…..  We model the sensor network as a time varying graph ( ) = ( (k )ℰ(k)), whose node set V(k) represents the sensor nodes active at time k and the edge set ℰ( ) consist of pairs of nodes (u,v) such that nodes u and v can directly exchange the message between each other at time k.  By an active nodes we mean a nodes that has not failed permanently .
  • 16. Contid…  All graphs considered here are undirected i.e (i,j)=(j,i).  The neighbors of node i is the set of nodes connected to i i.e. = { |( , ) ∈ ℰ}.  The numbers of neighbors of i, | |, is called its degree, which is denoted by di.  A path from i to j is sequence of edges connecting i and j.  A graph is called connected if there is a path between every pair of nodes.  A component Gc of the graph is maximal connected sub graph of G.
  • 17. Contid…  A cut is formally defined as the increase of the number of components of a graph due to the failure of subset of nodes.  The number of the cuts associated with a cut event is the increase in the number of components after the event.
  • 18. Contid…  The problem we seek to address is two fold  First we want to enable every node to detect if it is disconnected from source.  Second we want to enable nodes that lie close to the cuts but are still connected to the source.
  • 19. Contid…  The DCD algorithm is based on the following electrical analogy.  Imagine the wireless sensor network as an electrical circuit where the current is injected at the source node and extracted out of a common fictitious node that is connected to every node of sensor network.  Each edge is replaced by the 1 Ω resistor.  When a cut separates certain nodes from source node, the potential of each of those nodes becomes 0, since there is no current injection into their components.  The potential is computed by an iterative scheme which only requires periodic communication among the neighboring nodes.
  • 20. Contid… DOS detection • When node u is disconnected from the source, we say that a disconnected from source event has occurred for u. • The algorithm allows each node to detect DOS events. • The nodes use the computed potentials to detect if DOS event have occurred . • The approach here is if the state is close to 0 then the node is disconnected from the source , otherwise not.
  • 21. Contid…  DOS detection part consist of steady state detection, normalized state computation and connection/separation detection.
  • 22. Contid… CCOS detection  When a cut occurs in the network that does not separate a node u from the source node, connected but a cut occurred somewhere (CCOS) event has occurred for u.  Detection of CCOS events by the nodes close to a cut, and approximate location of cut means location of one or more active nodes that lie at the boundary of cut and that are connected to source.
  • 23. Contid…  To detect the CCOS event the algorithm uses the fact that the potential of nodes that are connected to source node changes after the cut and also using probe messages.  Probe messages that are initiated by the certain nodes that encounter failed neighbors, and are forwarded from one node to another node in a way that if short path exist around a hole created by node failures, the message will reach initiating nodes.
  • 24. Contid…  Each probe message contains the following information:  A unique source ID  Source node ID S  Destination node,  path traversed, and  angle traversed by probe message.
  • 25. Conclusion  The DCD algorithm we propose here enables every node of a wireless sensor network to detect disconnected from source event if they occur.  Second it enables the subset of nodes that experiences CCOS event to detect them and estimate the approximate location of the cut in the form of a list of active nodes that lie at the boundary of the cut/hole.
  • 26. Future Aspect  Application of DCD algorithm to detect the node separation and reconnection to the source in mobile networks.
  • 27. references  http:// www.liveieeeprojects.com  http://www.ijsrp.org/research-paper-1212/ijsrp-p1203.pd  http://www.faculty.cs.tamu.edu/stoleru/papers/prabir12c ut.pdf - United States  www.cs.ucsb.edu/~suri/psdir/sentinel.pdf  www.slideshare.net/.../cut-detection-in-wireless-sensor- networks  http://en.wikipedia.org/wiki/Wireless_sensor_network