SlideShare a Scribd company logo
1 of 28
By:
SHAGUFTA YASMIN
     2SD12SCS11
Topics for discussion
 Introduction
    Sensor network
    Architecture of sensor network.
    Applications of sensor network.
    Challenges of sensor network.
 Cuts in sensor networks.
 Detection of cuts.
 Distributed cut detection algorithm.
 Conclusion.
 Future aspects.
 References.
 Sensor Network:

     It is a group of specialized transducers with a
 communication infrastructure intended to monitor
 and record conditions at diverse location, it may be
 temperature, pressure humidity wind direction and
 speed etc…
     It consists of multiple detection station called
 nodes, which is small, lightweight and portable.
Contd…
Contd…
Architecture of WSNs
 Transducer generates electrical signals.
 Microcomputer processes and stores
  Sensor output.
 Transceiver receives the
  commands from central
  computer, transmits data
  to that computer.
 Power from battery.
Applications
 Industrial monitoring.
   Machine health monitoring.
   Data logging.
   Industrial sense and control applications.
 Automated and smart homes.
     monitoring the activities performed in a smart
     home is achieved using wireless sensors embedded
     within everyday objects forming a sensor network.
 Medical device monitoring.
Contd…
 Monitoring of weather conditions.
 Air traffic control.
 Robot control.
 Air pollution monitoring.
 Forest fire detection.
 Natural disaster prevention.
Challenges
 One of the challenge in the successful use of WSNs
  come from limited energy of the individual sensor
  nodes.
 WSNs consist of large number of small, low cost
  sensor nodes distributed over large area.
 WSNs have emerged as a promising new technology
  to monitor large regions.
 Node failure is expected to be quite common. this is
  true for sensor networks deployed in harsh and
  dangerous fields such as forest fire monitoring and in
  defense applications.
Cuts in sensor networks
 WSNs can get separated into multiple connected
  components due to failure of some of its nodes, which
  is called “cut”.
 So here we consider the problem of detecting cuts.
 Two nodes are said to be disconnected if there is no
  path between them.
Contd…
Contd…
 In the figure, filled circles represents active nodes and
  unfilled circles represent failed node.
 Solid lines represents the edges, and dashed lines
  represent the edges that existed before the failure of
  node.
 the hole in (d) is indistinguishable from the cut in (b)
  to nodes that lie outside the region R
Detection of cuts
 Nodes that detect the occurrence and approximate the
  locations of the cuts can then alert the source node or base
  station.
 If the node were able to detect the occurrence of cut it could
  simply wait for the network to be repaired and eventually
  reconnected, which saves on-board energy of multiple nodes
  and prolongs their lives.
 The ability to detect cuts by both the disconnected node and
  source node will lead to increase in the operational lifetime
  of the network as a whole.
Distributed cut detection algorithm
 This algorithm allows each node to detect
  DOS(Disconnection frOm Source) events and subset of node
  to detect CCOS(connected but cut occurred somewhere)
  events.
 The algorithm is distributed and asynchronous.
 It involves only local communication between neighboring
  nodes and is robust to temporary communication failure
  between node pairs.
 A key component of the DCD algorithm is a distributed
  iterative computational step through which the nodes
  compute their electrical potentials.
Distributed cut Detection
  Definition and problem statement
 Time is measured with a discrete counter k=∞,…., -
  1,0,1,2,…..
 We model the sensor network as a time varying graph
    ( ) = ( (k )ℰ(k)), whose node set V(k) represents the
  sensor nodes active at time k and the edge set ℰ( )
  consist of pairs of nodes (u,v) such that nodes u and v can
  directly exchange the message between each other at
  time k.
 By an active nodes we mean a nodes that has not failed
  permanently .
Contid…
 All graphs considered here are undirected i.e (i,j)=(j,i).
 The neighbors of node i is the set        of nodes connected to i
    i.e.   = { |( , ) ∈ ℰ}.
    The numbers of neighbors of i, |       |, is called its degree,
    which is denoted by di.
    A path from i to j is sequence of edges connecting i and j.
   A graph is called connected if there is a path between every
    pair of nodes.
   A component Gc of the graph is maximal connected sub
    graph of G.
Contid…
 A cut is formally defined as the increase of the
  number of components of a graph due to the failure of
  subset of nodes.
 The number of the cuts associated with a cut event is
  the increase in the number of components after the
  event.
Contid…
 The problem we seek to address is two fold
   First we want to enable every node to detect if it is
    disconnected from source.
   Second we want to enable nodes that lie close to the cuts
    but are still connected to the source.
Contid…
 The DCD algorithm is based on the following electrical
    analogy.
    Imagine the wireless sensor network as an electrical circuit
    where the current is injected at the source node and
    extracted out of a common fictitious node that is connected
    to every node of sensor network.
    Each edge is replaced by the 1 Ω resistor.
    When a cut separates certain nodes from source node, the
    potential of each of those nodes becomes 0, since there is no
    current injection into their components.
    The potential is computed by an iterative scheme which only
    requires periodic communication among the neighboring
    nodes.
Contid…
DOS detection
• When node u is disconnected from the source, we say that a
  disconnected from source event has occurred for u.
• The algorithm allows each node to detect DOS events.
• The nodes use the computed potentials to detect if DOS
  event have occurred .
• The approach here is if the state is close to 0 then the node is
  disconnected from the source , otherwise not.
Contid…
 DOS detection part consist of steady state detection,
 normalized state computation and
 connection/separation detection.
Contid…
CCOS detection
 When a cut occurs in the network that does not separate a
  node u from the source node, connected but a cut occurred
  somewhere (CCOS) event has occurred for u.
 Detection of CCOS events by the nodes close to a cut, and
  approximate location of cut means location of one or more
  active nodes that lie at the boundary of cut and that are
  connected to source.
Contid…
 To detect the CCOS event the algorithm uses the fact
  that the potential of nodes that are connected to
  source node changes after the cut and also using probe
  messages.
 Probe messages that are initiated by the certain nodes
  that encounter failed neighbors, and are forwarded
  from one node to another node in a way that if short
  path exist around a hole created by node failures, the
  message will reach initiating nodes.
Contid…
 Each probe message contains the following
    information:
    A unique source ID
    Source node ID S
    Destination node,
    path traversed, and
    angle traversed by probe message.
Conclusion
 The DCD algorithm we propose here enables every
  node of a wireless sensor network to detect
  disconnected from source event if they occur.
 Second it enables the subset of nodes that experiences
  CCOS event to detect them and estimate the
  approximate location of the cut in the form of a list of
  active nodes that lie at the boundary of the cut/hole.
Future Aspect
 Application of DCD algorithm to detect the node
 separation and reconnection to the source in mobile
 networks.
references
 http:// www.liveieeeprojects.com
 http://www.ijsrp.org/research-paper-1212/ijsrp-p1203.pd
 http://www.faculty.cs.tamu.edu/stoleru/papers/prabir12c
  ut.pdf - United States
 www.cs.ucsb.edu/~suri/psdir/sentinel.pdf
 www.slideshare.net/.../cut-detection-in-wireless-sensor-
  networks
 http://en.wikipedia.org/wiki/Wireless_sensor_network
THANK YOU

More Related Content

What's hot

Dynamic Communication of Wireless Sensor Network
Dynamic Communication of Wireless Sensor Network Dynamic Communication of Wireless Sensor Network
Dynamic Communication of Wireless Sensor Network IJERA Editor
 
【Machine Lewarning】 Paper Presentation
【Machine Lewarning】 Paper Presentation【Machine Lewarning】 Paper Presentation
【Machine Lewarning】 Paper PresentationShun YU Ko
 
ENERGY EFFICIENCY IN AD HOC NETWORKS
ENERGY EFFICIENCY IN AD HOC NETWORKSENERGY EFFICIENCY IN AD HOC NETWORKS
ENERGY EFFICIENCY IN AD HOC NETWORKSijasuc
 
Hetrogenous wireless sensor network
Hetrogenous wireless sensor networkHetrogenous wireless sensor network
Hetrogenous wireless sensor networkChinmoy Jena
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Wireless sensor network report
Wireless sensor network reportWireless sensor network report
Wireless sensor network reportGanesh Khadsan
 
Intrusion Detection in Wireless Sensor Networks
Intrusion Detection in Wireless Sensor NetworksIntrusion Detection in Wireless Sensor Networks
Intrusion Detection in Wireless Sensor NetworksJaiprakash Nagar
 
Fault Node Recovery Algorithm for a Wireless Sensor Network
Fault Node Recovery Algorithm for a Wireless Sensor NetworkFault Node Recovery Algorithm for a Wireless Sensor Network
Fault Node Recovery Algorithm for a Wireless Sensor NetworkYogesh Vk
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...Mumbai Academisc
 
Parallel wisard object tracker a rambased tracking system
Parallel wisard object tracker a rambased tracking systemParallel wisard object tracker a rambased tracking system
Parallel wisard object tracker a rambased tracking systemcseij
 
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkBasic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkKarthik
 
International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER)International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER)ijceronline
 
Detecting proximity events in sensor networks
Detecting proximity events in sensor networksDetecting proximity events in sensor networks
Detecting proximity events in sensor networksBalaSuresh AsaiThambi
 
An algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor networkAn algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor networkeSAT Publishing House
 

What's hot (20)

Bi24385389
Bi24385389Bi24385389
Bi24385389
 
Indoor Localization in Wireless Sensor Networks
Indoor Localization in Wireless Sensor NetworksIndoor Localization in Wireless Sensor Networks
Indoor Localization in Wireless Sensor Networks
 
Dynamic Communication of Wireless Sensor Network
Dynamic Communication of Wireless Sensor Network Dynamic Communication of Wireless Sensor Network
Dynamic Communication of Wireless Sensor Network
 
【Machine Lewarning】 Paper Presentation
【Machine Lewarning】 Paper Presentation【Machine Lewarning】 Paper Presentation
【Machine Lewarning】 Paper Presentation
 
Ka2417181721
Ka2417181721Ka2417181721
Ka2417181721
 
ENERGY EFFICIENCY IN AD HOC NETWORKS
ENERGY EFFICIENCY IN AD HOC NETWORKSENERGY EFFICIENCY IN AD HOC NETWORKS
ENERGY EFFICIENCY IN AD HOC NETWORKS
 
Hetrogenous wireless sensor network
Hetrogenous wireless sensor networkHetrogenous wireless sensor network
Hetrogenous wireless sensor network
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Wireless sensor network report
Wireless sensor network reportWireless sensor network report
Wireless sensor network report
 
Bm32410415
Bm32410415Bm32410415
Bm32410415
 
Intrusion Detection in Wireless Sensor Networks
Intrusion Detection in Wireless Sensor NetworksIntrusion Detection in Wireless Sensor Networks
Intrusion Detection in Wireless Sensor Networks
 
Fault Node Recovery Algorithm for a Wireless Sensor Network
Fault Node Recovery Algorithm for a Wireless Sensor NetworkFault Node Recovery Algorithm for a Wireless Sensor Network
Fault Node Recovery Algorithm for a Wireless Sensor Network
 
Memristors
MemristorsMemristors
Memristors
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
 
Parallel wisard object tracker a rambased tracking system
Parallel wisard object tracker a rambased tracking systemParallel wisard object tracker a rambased tracking system
Parallel wisard object tracker a rambased tracking system
 
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkBasic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor Network
 
memristor
memristormemristor
memristor
 
International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER)International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER)
 
Detecting proximity events in sensor networks
Detecting proximity events in sensor networksDetecting proximity events in sensor networks
Detecting proximity events in sensor networks
 
An algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor networkAn algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor network
 

Similar to Cut detection

Cut Detection in Wireless Sensor Network
Cut Detection in Wireless Sensor NetworkCut Detection in Wireless Sensor Network
Cut Detection in Wireless Sensor NetworkIJMTST Journal
 
Hack Recognition In Wireless Sensor Network
Hack Recognition In Wireless Sensor NetworkHack Recognition In Wireless Sensor Network
Hack Recognition In Wireless Sensor NetworkIJERA Editor
 
A Distributed Cut Detection Method for Wireless Sensor Networks
A Distributed Cut Detection Method for Wireless Sensor NetworksA Distributed Cut Detection Method for Wireless Sensor Networks
A Distributed Cut Detection Method for Wireless Sensor NetworksIJMER
 
Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...eSAT Publishing House
 
Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...eSAT Journals
 
CIP Based BOND for Wireless Sensor Networks
CIP Based BOND for Wireless Sensor NetworksCIP Based BOND for Wireless Sensor Networks
CIP Based BOND for Wireless Sensor Networksijsrd.com
 
Modified Coverage Hole Detection Algorithm for Distributed WSNs
Modified Coverage Hole Detection Algorithm for Distributed WSNsModified Coverage Hole Detection Algorithm for Distributed WSNs
Modified Coverage Hole Detection Algorithm for Distributed WSNsidescitation
 
Analysis and reactive measures on the blackhole attack
Analysis and reactive measures on the blackhole attackAnalysis and reactive measures on the blackhole attack
Analysis and reactive measures on the blackhole attackJyotiVERMA176
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...ijceronline
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...IJSRD
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkIJMTST Journal
 
Wireless Personal Area Networks (WPAN): Lowrate amd High Rate
Wireless Personal Area Networks (WPAN): Lowrate amd High RateWireless Personal Area Networks (WPAN): Lowrate amd High Rate
Wireless Personal Area Networks (WPAN): Lowrate amd High RateDon Norwood
 
Intrusion detection in wireless sensor network
Intrusion detection in wireless sensor networkIntrusion detection in wireless sensor network
Intrusion detection in wireless sensor networkVinayak Raja
 
2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stack2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stackSyed Ariful Islam Emon
 
Minimization of Localization Error using Connectivity based Geometrical Metho...
Minimization of Localization Error using Connectivity based Geometrical Metho...Minimization of Localization Error using Connectivity based Geometrical Metho...
Minimization of Localization Error using Connectivity based Geometrical Metho...Dr. Amarjeet Singh
 
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor Networks
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor NetworksRedundant Actor Based Multi-Hole Healing System for Mobile Sensor Networks
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor NetworksEditor IJCATR
 

Similar to Cut detection (20)

Cut Detection in Wireless Sensor Network
Cut Detection in Wireless Sensor NetworkCut Detection in Wireless Sensor Network
Cut Detection in Wireless Sensor Network
 
Hack Recognition In Wireless Sensor Network
Hack Recognition In Wireless Sensor NetworkHack Recognition In Wireless Sensor Network
Hack Recognition In Wireless Sensor Network
 
A Distributed Cut Detection Method for Wireless Sensor Networks
A Distributed Cut Detection Method for Wireless Sensor NetworksA Distributed Cut Detection Method for Wireless Sensor Networks
A Distributed Cut Detection Method for Wireless Sensor Networks
 
Ijetr012022
Ijetr012022Ijetr012022
Ijetr012022
 
Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...
 
Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...
 
CIP Based BOND for Wireless Sensor Networks
CIP Based BOND for Wireless Sensor NetworksCIP Based BOND for Wireless Sensor Networks
CIP Based BOND for Wireless Sensor Networks
 
Modified Coverage Hole Detection Algorithm for Distributed WSNs
Modified Coverage Hole Detection Algorithm for Distributed WSNsModified Coverage Hole Detection Algorithm for Distributed WSNs
Modified Coverage Hole Detection Algorithm for Distributed WSNs
 
Analysis and reactive measures on the blackhole attack
Analysis and reactive measures on the blackhole attackAnalysis and reactive measures on the blackhole attack
Analysis and reactive measures on the blackhole attack
 
Ar03302620266
Ar03302620266Ar03302620266
Ar03302620266
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
 
Wireless Personal Area Networks (WPAN): Lowrate amd High Rate
Wireless Personal Area Networks (WPAN): Lowrate amd High RateWireless Personal Area Networks (WPAN): Lowrate amd High Rate
Wireless Personal Area Networks (WPAN): Lowrate amd High Rate
 
Sensor net
Sensor netSensor net
Sensor net
 
2512ijcsea02
2512ijcsea022512ijcsea02
2512ijcsea02
 
Intrusion detection in wireless sensor network
Intrusion detection in wireless sensor networkIntrusion detection in wireless sensor network
Intrusion detection in wireless sensor network
 
2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stack2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stack
 
Minimization of Localization Error using Connectivity based Geometrical Metho...
Minimization of Localization Error using Connectivity based Geometrical Metho...Minimization of Localization Error using Connectivity based Geometrical Metho...
Minimization of Localization Error using Connectivity based Geometrical Metho...
 
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor Networks
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor NetworksRedundant Actor Based Multi-Hole Healing System for Mobile Sensor Networks
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor Networks
 

Cut detection

  • 1. By: SHAGUFTA YASMIN 2SD12SCS11
  • 2. Topics for discussion  Introduction  Sensor network  Architecture of sensor network.  Applications of sensor network.  Challenges of sensor network.  Cuts in sensor networks.  Detection of cuts.  Distributed cut detection algorithm.  Conclusion.  Future aspects.  References.
  • 3.  Sensor Network: It is a group of specialized transducers with a communication infrastructure intended to monitor and record conditions at diverse location, it may be temperature, pressure humidity wind direction and speed etc… It consists of multiple detection station called nodes, which is small, lightweight and portable.
  • 6. Architecture of WSNs  Transducer generates electrical signals.  Microcomputer processes and stores Sensor output.  Transceiver receives the commands from central computer, transmits data to that computer.  Power from battery.
  • 7. Applications  Industrial monitoring.  Machine health monitoring.  Data logging.  Industrial sense and control applications.  Automated and smart homes. monitoring the activities performed in a smart home is achieved using wireless sensors embedded within everyday objects forming a sensor network.  Medical device monitoring.
  • 8. Contd…  Monitoring of weather conditions.  Air traffic control.  Robot control.  Air pollution monitoring.  Forest fire detection.  Natural disaster prevention.
  • 9. Challenges  One of the challenge in the successful use of WSNs come from limited energy of the individual sensor nodes.  WSNs consist of large number of small, low cost sensor nodes distributed over large area.  WSNs have emerged as a promising new technology to monitor large regions.  Node failure is expected to be quite common. this is true for sensor networks deployed in harsh and dangerous fields such as forest fire monitoring and in defense applications.
  • 10. Cuts in sensor networks  WSNs can get separated into multiple connected components due to failure of some of its nodes, which is called “cut”.  So here we consider the problem of detecting cuts.  Two nodes are said to be disconnected if there is no path between them.
  • 12. Contd…  In the figure, filled circles represents active nodes and unfilled circles represent failed node.  Solid lines represents the edges, and dashed lines represent the edges that existed before the failure of node.  the hole in (d) is indistinguishable from the cut in (b) to nodes that lie outside the region R
  • 13. Detection of cuts  Nodes that detect the occurrence and approximate the locations of the cuts can then alert the source node or base station.  If the node were able to detect the occurrence of cut it could simply wait for the network to be repaired and eventually reconnected, which saves on-board energy of multiple nodes and prolongs their lives.  The ability to detect cuts by both the disconnected node and source node will lead to increase in the operational lifetime of the network as a whole.
  • 14. Distributed cut detection algorithm  This algorithm allows each node to detect DOS(Disconnection frOm Source) events and subset of node to detect CCOS(connected but cut occurred somewhere) events.  The algorithm is distributed and asynchronous.  It involves only local communication between neighboring nodes and is robust to temporary communication failure between node pairs.  A key component of the DCD algorithm is a distributed iterative computational step through which the nodes compute their electrical potentials.
  • 15. Distributed cut Detection Definition and problem statement  Time is measured with a discrete counter k=∞,…., - 1,0,1,2,…..  We model the sensor network as a time varying graph ( ) = ( (k )ℰ(k)), whose node set V(k) represents the sensor nodes active at time k and the edge set ℰ( ) consist of pairs of nodes (u,v) such that nodes u and v can directly exchange the message between each other at time k.  By an active nodes we mean a nodes that has not failed permanently .
  • 16. Contid…  All graphs considered here are undirected i.e (i,j)=(j,i).  The neighbors of node i is the set of nodes connected to i i.e. = { |( , ) ∈ ℰ}.  The numbers of neighbors of i, | |, is called its degree, which is denoted by di.  A path from i to j is sequence of edges connecting i and j.  A graph is called connected if there is a path between every pair of nodes.  A component Gc of the graph is maximal connected sub graph of G.
  • 17. Contid…  A cut is formally defined as the increase of the number of components of a graph due to the failure of subset of nodes.  The number of the cuts associated with a cut event is the increase in the number of components after the event.
  • 18. Contid…  The problem we seek to address is two fold  First we want to enable every node to detect if it is disconnected from source.  Second we want to enable nodes that lie close to the cuts but are still connected to the source.
  • 19. Contid…  The DCD algorithm is based on the following electrical analogy.  Imagine the wireless sensor network as an electrical circuit where the current is injected at the source node and extracted out of a common fictitious node that is connected to every node of sensor network.  Each edge is replaced by the 1 Ω resistor.  When a cut separates certain nodes from source node, the potential of each of those nodes becomes 0, since there is no current injection into their components.  The potential is computed by an iterative scheme which only requires periodic communication among the neighboring nodes.
  • 20. Contid… DOS detection • When node u is disconnected from the source, we say that a disconnected from source event has occurred for u. • The algorithm allows each node to detect DOS events. • The nodes use the computed potentials to detect if DOS event have occurred . • The approach here is if the state is close to 0 then the node is disconnected from the source , otherwise not.
  • 21. Contid…  DOS detection part consist of steady state detection, normalized state computation and connection/separation detection.
  • 22. Contid… CCOS detection  When a cut occurs in the network that does not separate a node u from the source node, connected but a cut occurred somewhere (CCOS) event has occurred for u.  Detection of CCOS events by the nodes close to a cut, and approximate location of cut means location of one or more active nodes that lie at the boundary of cut and that are connected to source.
  • 23. Contid…  To detect the CCOS event the algorithm uses the fact that the potential of nodes that are connected to source node changes after the cut and also using probe messages.  Probe messages that are initiated by the certain nodes that encounter failed neighbors, and are forwarded from one node to another node in a way that if short path exist around a hole created by node failures, the message will reach initiating nodes.
  • 24. Contid…  Each probe message contains the following information:  A unique source ID  Source node ID S  Destination node,  path traversed, and  angle traversed by probe message.
  • 25. Conclusion  The DCD algorithm we propose here enables every node of a wireless sensor network to detect disconnected from source event if they occur.  Second it enables the subset of nodes that experiences CCOS event to detect them and estimate the approximate location of the cut in the form of a list of active nodes that lie at the boundary of the cut/hole.
  • 26. Future Aspect  Application of DCD algorithm to detect the node separation and reconnection to the source in mobile networks.
  • 27. references  http:// www.liveieeeprojects.com  http://www.ijsrp.org/research-paper-1212/ijsrp-p1203.pd  http://www.faculty.cs.tamu.edu/stoleru/papers/prabir12c ut.pdf - United States  www.cs.ucsb.edu/~suri/psdir/sentinel.pdf  www.slideshare.net/.../cut-detection-in-wireless-sensor- networks  http://en.wikipedia.org/wiki/Wireless_sensor_network