SlideShare a Scribd company logo
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2510-2513 ISSN: 2249-6645
www.ijmer.com 2510 | Page
Meer Khursheeda Sulthana1
, Syed Sadat Ali2
1
M. Tech, Nimra College of Engineering & Technology, Vijayawada, A.P., India.
2
Assoc. Professor & Head, Dept.of CSE, Nimra College of Engineering & Technology, Vijayawada, A.P., India.
Abstract: Wireless sensor networks (WSNs) consisting of large numbers of low- power and low- cost wireless nodes, have
recently been employed in many applications: military surveillance, disaster response and medical care among others. The
inherent nature of sensor networks such as unattended operation, battery-powered nodes, and harsh environments pose
major challenges. One of the challenges is to ensure that the network is always connected. The connectivity of the sensor
network can easily be disrupted due to unpredictable wireless channels, early depletion of node’s energy, and physical
tampering by hostile users. Network disconnection, typically referred as a network “cut”, may cause a number of problems.
For example, ill-informed decisions to route the data to a node located in a disconnected segment of the network might lead
to data loss, wasted power consumption, and congestion around the network cut. This paper presents a distributed cut
detection method for WSNs.
Keywords: CCOS, Cut, DOS, WSN.
I. INTRODUCTION
Wireless sensor network (WSNs) (Figure 1) is composed of a powerful base station and a set of low-end sensor
nodes. Base station and the sensor nodes have wireless capabilities and communicate through a wireless, multi-hop, ad-hoc
network[1]. WSNs have emerged as an important new technology for purpose of instrumenting and observing the physical
world. Sensor networks are a capable scenario for sensing large areas at high spatial and positive resolution. However, the
small size and low cost of the processing machines that makes them attractive for large deployment also causes the loss of
low operational reliability[2]. The basic building block of these networks is a small microprocessor integrated with one or
more MEMS (micro-electromechanical system) sensors, actuators, and a wireless transceiver.[3]
A WSN is usually collection of hundreds or thousands of different sensor nodes. These sensor nodes are often
densely deployed in the sensor field and have the ability to gather data and route data back to a base station (BS). A sensor
has 4 basic parts: a processing unit, a sensing unit, a transceiver unit, and a power unit [4]. Most of the WSNs routing
techniques and sensing tasks require knowledge of location, which is provided by a location finding system. WSNs contains
large number of nodes and each node may be very close to each neighbor. Since WSN should use multi- hop techniques
because it consume less power than single hop techniques.
Figure 1 : Wireless sensor network example
II. CUTS IN WSNS
One of the unique challenges in wireless networking environments is the phenomenon of network partitioning,
which is the breakdown of a connected network topology into two or more separate, disconnected topologies[1]. Similarly
sensor nodes become fail for several reasons and the network may breaks into two or more divided partitions so can say that
when a number of sensor fails so the topology changes. A node may fail due to a variety of conditions such as electrical or
mechanical problems, environmental degradation, and battery reduction. In fact, node failure is expected to be quite common
anomaly due to the typically limited energy storage of the nodes that are powered by small batteries. Failure of a set of
sensor nodes will reduce the number of multi-hop paths in the network. Such failures can cause a subset of sensor nodes –
A Distributed Cut Detection Method for Wireless Sensor
Networks
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2510-2513 ISSN: 2249-6645
www.ijmer.com 2511 | Page
that have not failed – to become disconnected from the rest of the network, resulting in a partition of the network also called
a “cut”.
Two sensor nodes said to be disconnected if there is no path between them [2].And as we know that sensor nodes
has disconnectivity from the network is normally referred as a partition of the network of cut in the wireless sensor network,
which arise many problems like data loss, unreliability , performance degradation. Because of cuts in WSNs many problems
may arise like a wired network means data loss problem arises, means data reach in a disconnected route. Due to cuts, if any
sensor node breaks down then the network is separated into different parts so the topology of the network changes but still
network works. But because partition affects reliability, QOS of the network, data loss, efficiency, data processing speed.
Because if any data passes unfortunately in the wrong route so data loss occurs this also shows unreliability of the network.
III. RELATED WORK
In [5], the authors developed a partitionable group communication service which allows so called “partition-aware
applications” to operate in separated network topologies and, after two or more partitions merge, reconfigure themselves.
The partitioning problem is handled by a simple PING or ACK mechanism. A sensor node sends a PING message to another
node. If it does not receive an ACK in a certain period of time, that node is added to a list of suspects. A dynamic timeout
mechanism is helpful which leads to a reasonably accurate suspect list. This scheme lacks the ability to distinguish between
the node failure and partitioning which for most applications is desirable. In [3], the authors challenges posed by the
possibility of network partitioning in WSNs has been recognized in several papers but the problem of detecting when such
partitioning occurs seems to have received a little attention. To the best of our knowledge, the work in [3] is the only one that
addresses the problem of detecting cuts in WSNs. They developed an algorithm for detecting the linear cuts, which is a linear
separation of sensor nodes from the base station. The reason for the restriction to the linear cuts is that their algorithm relies
critically on a certain duality between straight line segments and points in 2D, which also restricts the algorithm in [3] to
sensor networks deployed in the 2D plane.
In contrast to the algorithm designed in [3], the DSSD algorithm proposed in [6] is not limited to linear cuts; it can
detect cuts that separate the network into multiple components of arbitrary shapes. Furthermore, the DSSD algorithm is not
restricted to sensor networks deployed in 2D, it does not require deploying sentinel nodes, and it allows every node to detect
if a cut occurs. The DSSD algorithm involves only the nearest neighbor communication, which eliminates the need of
routing messages to the source node. This feature makes the algorithm applicable to the mobile nodes as well. Since the
computation that a node has to carry out involves only averaging, it is particularly well suited to wireless sensor networks
with nodes that have limited computational capability. In this paper, the proposed algorithm is an extension of the previous
work [6], which partially examined the DOS detection problem.
IV. PROPOSED WORK
A. Problem Statement
Consider a WSN as a time-varying graph G(k) = (V(k), E(k)), whose node set V(k) represents the sensors active at
time k and the edge set E(k) consists of pairs of nodes (u, v) such that nodes u and v can directly exchange messages
between each other at time k. By an “active” node we mean a node that has not failed permanently. All graphs considered
here are called undirected, i.e., (i, j) = (j, i). The neighbors of a node i is the set Ni of nodes connected to i, i.e. Ni = {j|(i, j) €
E}.
Figure 2: Examples of Cut and Holes
The number of neighbors of i, |Ni(k)|, is known its degree, which is denoted by di(k). A path from nodes i to j is a
sequence of edges connecting i and j. A graph is called connected if there is a path between every pair of the nodes. A
component Gc of a graph G is a maximal connected sub- graph of G (i.e., no other connected subgraph of G contains Gc as
its subgraph). In terms of these definitions, a “cut” event is formally defined as the increase of the number of components of
a graph due to the failure of a subset of nodes (Figure 2). The number of cuts associated with a cut event is the increase in
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2510-2513 ISSN: 2249-6645
www.ijmer.com 2512 | Page
the number of the components after the event. The problem we seek to address is a twofold. First, we have to enable every
sensor node to detect if it is disconnected from the source.
B. Disconnected from source(DOS) Detection
We say that a Disconnected from Source (DOS) event has occurred for node u. The algorithm allows each node to
detect the DOS events. The sensor nodes use the computed potentials to detect if DOS events have occurred (i.e., if they are
disconnected from the source node). The approach here is to exploit the fact that if the state is close to zero then the node is
disconnected from the source, otherwise not. In order to reduce the sensitivity of the algorithm to variations in network size
and structure, we use a normalized state. DOS detection part consists of normalized state computation, steady-state detection
and connection or separation detection. A sensor node keeps track of the positive steady states seen in the past using the
following method. Each sensor node i computes the normalized state difference  xi(k) as follows:
Where zero is a small positive number.
Each sensor node keeps an estimate of the most recent “steady state” observed, which is denoted by )(kxss
i . This
estimate is updated at every time “k” according to the following rule: if PSSR(k)=1, then )(kxss
i  ix k; otherwise
)(kxss
i  ix k− 1 . It is initialized as
ss
ix (0) =∞. Every sensor node i also keeps a list of steady states seen in the past,
one value for each unpunctuated interval of time during which the state was detected to be steady. This information is kept in
a vector )(kxss
i , which is initialized to be empty and is updated as follows: If PSSR(k) = 1 but PSSR(k −1) = 0, then
)(kxss
is appended to )(kxss
i as a new entry. If steady state reached was detected in both k and k - 1 (i.e., PSSR(k) =
PSSR(k − 1) = 1, then the last entry of )(kxss
is updated to )(kxss
i .
C. Connected Cut Occurred Somewhere (CCOS) Detection
The algorithm for detecting CCOS events relies on finding a shortest path around a hole, if it exists, and is partially
inspired by the jamming detection algorithm [7]. The method utilizes sensor node states to assign the task of hole-detection
to the most appropriate nodes. When a sensor node detects a large change in its local state as well as failure of one or more
of its neighbors, and both of these events occur within a (predetermined) small time interval, the node initiates a PROBE
message. The probe messages that are initiated by certain nodes that encounter failed neighbors, and are forwarded from one
node to another in a way that if a short path exists around a “hole” created by node failures, the message will reach the
initiating node. The pseudo code for the algorithm that decides when to initiate a probe message is included. Each probe
message “p” contains the following information:
 A unique probe ID,
 Source Node id S
 Destination node,
 Path traversed (in chronological order), and
 The angle traversed by the probe message.
The list of probes is the union of the probe messages it received from its neighbors and the probe it decided to
initiate, if any probe is forwarded in a manner such that if the probe is triggered by the creation of a cut or small hole(with
circumference less than lmax) the probe traverses a path around the hole in a counter clockwise (CCW) direction and reaches
the node that initiated the probe. Since it is only used to compute destinations of the probe messages.
V. CONCLUSION
Wireless sensor networks (WSNs) are a promising technology for monitoring large regions at high spatial as well as
temporal resolution. The failure of some of its sensor nodes, which is called “cut” can separate the network into multiple
connected components. The ability of detecting the cuts by the disconnected nodes and source node of a wireless sensor
network will lead to the increase in the operational lifetime of the network. The Distributed Cut Detection (DCD) algorithm
proposed here enables every sensor node of a sensor network to detect Disconnected from Source events if they occur.
Second, it enables a subset of sensor nodes that experience CCOS events to detect them and estimate the approximate
location of the cut in the form of a list of active sensor nodes that lie at the boundary of the cut. The algorithm is based on
ideas from both electrical network theory and parallel iterative solution of linear equations. A key strength of the DCD
method is that the convergence rate of the iterative scheme is quite fast and independent of the size and structure of the
network.
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2510-2513 ISSN: 2249-6645
www.ijmer.com 2513 | Page
REFERENCES
[1] A Partition Detection System for Mobile Ad-Hoc Networks: Hartmut Ritter, Rolf Winter, Jochen Schiller
[2] Akyildiz, I.F., Su, W., ankarasubramaniam, Y., Cayirci, E.: Wireless Sensor Networks: A Survey. Computer Networks Journal
(Elsevier), Vol. 38, No.4 (2002)pp. 393-422.
[3] N. Shrivastava, S. Suri, and C. D. T´oth, “Detecting cuts in sensor networks,”in IPSN ’05: Proceedings of the 4th
international
symposiumon Information processing in sensor networks, 2005, pp. 210–217.
[4] A Survey on Sensor Setworks,‖ : I. F. Akyildiz et al IEEE Commun. Mag., vol. 40, no. 8, Aug. 2002, pp. 102–112.
[5] Ö. Babaoglu, R. Davoli, A. Montresor, Group Communication in Partitionable Systems: Specification and Algorithms, IEEE
Transactions on Software Engineering, 2001, vol. 27, no.4.
[6] P. Barooah, “Distributed Cut Detection in Sensor Networks,” Proc. 47th IEEE Conf. Decision and Control, pp. 1097-1102,
Dec.2008.
[7] A.D. Wood, J.A. Stankovic, and S.H. Son, “Jam: A Jammed-Area Mapping Service for Sensor Networks,” Proc. IEEE Real Time
Systems Symp. 2003.

More Related Content

What's hot

DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
IJEEE
 
Routing Design Issues in Heterogeneous Wireless Sensor Network
Routing Design Issues in Heterogeneous Wireless Sensor Network Routing Design Issues in Heterogeneous Wireless Sensor Network
Routing Design Issues in Heterogeneous Wireless Sensor Network
IJECEIAES
 
Localization
LocalizationLocalization
Localization
prasannagelli
 
The Expansion of 3D wireless sensor network Bumps localization
The Expansion of 3D wireless sensor network Bumps localizationThe Expansion of 3D wireless sensor network Bumps localization
The Expansion of 3D wireless sensor network Bumps localization
IJERA Editor
 
An algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor networkAn algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor network
eSAT Publishing House
 
Secure and Efficient Transmission Using Jammer and Relay Networks
Secure and Efficient Transmission Using Jammer and Relay NetworksSecure and Efficient Transmission Using Jammer and Relay Networks
Secure and Efficient Transmission Using Jammer and Relay Networks
International Journal of Engineering Inventions www.ijeijournal.com
 
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor NetworksAccurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
ambitlick
 
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET Journal
 
iPGCON14_134
iPGCON14_134iPGCON14_134
iPGCON14_134
Prafull Maktedar
 
Multilink Routing in Wireless Sensor Networks with Integrated Approach for Hi...
Multilink Routing in Wireless Sensor Networks with Integrated Approach for Hi...Multilink Routing in Wireless Sensor Networks with Integrated Approach for Hi...
Multilink Routing in Wireless Sensor Networks with Integrated Approach for Hi...
rahulmonikasharma
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
Eisha Madhwal
 
Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919
Editor IJARCET
 
Cut detection
Cut detectionCut detection
Cut detection
shaguftayasmin123
 
Optimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor NetworksOptimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor Networks
paperpublications3
 
D0606032413 Paper
D0606032413 PaperD0606032413 Paper
D0606032413 Paper
Prafull Maktedar
 
Ka2417181721
Ka2417181721Ka2417181721
Ka2417181721
IJERA Editor
 
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
ijwmn
 
K010526570
K010526570K010526570
K010526570
IOSR Journals
 
F0361026033
F0361026033F0361026033
F0361026033
ijceronline
 

What's hot (19)

DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
 
Routing Design Issues in Heterogeneous Wireless Sensor Network
Routing Design Issues in Heterogeneous Wireless Sensor Network Routing Design Issues in Heterogeneous Wireless Sensor Network
Routing Design Issues in Heterogeneous Wireless Sensor Network
 
Localization
LocalizationLocalization
Localization
 
The Expansion of 3D wireless sensor network Bumps localization
The Expansion of 3D wireless sensor network Bumps localizationThe Expansion of 3D wireless sensor network Bumps localization
The Expansion of 3D wireless sensor network Bumps localization
 
An algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor networkAn algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor network
 
Secure and Efficient Transmission Using Jammer and Relay Networks
Secure and Efficient Transmission Using Jammer and Relay NetworksSecure and Efficient Transmission Using Jammer and Relay Networks
Secure and Efficient Transmission Using Jammer and Relay Networks
 
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor NetworksAccurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
 
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
 
iPGCON14_134
iPGCON14_134iPGCON14_134
iPGCON14_134
 
Multilink Routing in Wireless Sensor Networks with Integrated Approach for Hi...
Multilink Routing in Wireless Sensor Networks with Integrated Approach for Hi...Multilink Routing in Wireless Sensor Networks with Integrated Approach for Hi...
Multilink Routing in Wireless Sensor Networks with Integrated Approach for Hi...
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
 
Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919
 
Cut detection
Cut detectionCut detection
Cut detection
 
Optimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor NetworksOptimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor Networks
 
D0606032413 Paper
D0606032413 PaperD0606032413 Paper
D0606032413 Paper
 
Ka2417181721
Ka2417181721Ka2417181721
Ka2417181721
 
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
 
K010526570
K010526570K010526570
K010526570
 
F0361026033
F0361026033F0361026033
F0361026033
 

Viewers also liked

The Effect of Design Parameters of an Integrated Linear Electromagnetic Moto...
The Effect of Design Parameters of an Integrated Linear  Electromagnetic Moto...The Effect of Design Parameters of an Integrated Linear  Electromagnetic Moto...
The Effect of Design Parameters of an Integrated Linear Electromagnetic Moto...
IJMER
 
Bu31284290
Bu31284290Bu31284290
Bu31284290
IJMER
 
Improvement of Surface Roughness of Nickel Alloy Specimen by Removing Recast ...
Improvement of Surface Roughness of Nickel Alloy Specimen by Removing Recast ...Improvement of Surface Roughness of Nickel Alloy Specimen by Removing Recast ...
Improvement of Surface Roughness of Nickel Alloy Specimen by Removing Recast ...
IJMER
 
Strehl Ratio with Higher-Order Parabolic Filter
Strehl Ratio with Higher-Order Parabolic FilterStrehl Ratio with Higher-Order Parabolic Filter
Strehl Ratio with Higher-Order Parabolic Filter
IJMER
 
Db3210821087
Db3210821087Db3210821087
Db3210821087
IJMER
 
Characterization of environmental impact indices of solid wastes in Surulere...
Characterization of environmental impact indices of solid wastes  in Surulere...Characterization of environmental impact indices of solid wastes  in Surulere...
Characterization of environmental impact indices of solid wastes in Surulere...
IJMER
 
Tracking of Maximum Power from Wind Using Fuzzy Logic Controller Based On PMSG
Tracking of Maximum Power from Wind Using Fuzzy Logic Controller Based On PMSGTracking of Maximum Power from Wind Using Fuzzy Logic Controller Based On PMSG
Tracking of Maximum Power from Wind Using Fuzzy Logic Controller Based On PMSG
IJMER
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
IJMER
 
Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques
IJMER
 
I0502 01 4856
I0502 01 4856I0502 01 4856
I0502 01 4856
IJMER
 
At2419231928
At2419231928At2419231928
At2419231928
IJMER
 
Liberty computerpub2
Liberty computerpub2Liberty computerpub2
Liberty computerpub2
padisav17
 
Analyses of front, contents and double page spreads
Analyses of front, contents and double page spreadsAnalyses of front, contents and double page spreads
Analyses of front, contents and double page spreads
Rana Karim
 
Experimental Investigation of Flow Pattern on Rectangular Fin Arrays under Na...
Experimental Investigation of Flow Pattern on Rectangular Fin Arrays under Na...Experimental Investigation of Flow Pattern on Rectangular Fin Arrays under Na...
Experimental Investigation of Flow Pattern on Rectangular Fin Arrays under Na...
IJMER
 
Some Dynamical Behaviours of a Two Dimensional Nonlinear Map
Some Dynamical Behaviours of a Two Dimensional Nonlinear MapSome Dynamical Behaviours of a Two Dimensional Nonlinear Map
Some Dynamical Behaviours of a Two Dimensional Nonlinear Map
IJMER
 
Bj31204211
Bj31204211Bj31204211
Bj31204211
IJMER
 
Am318385
Am318385Am318385
Am318385
IJMER
 
Influence of Hadoop in Big Data Analysis and Its Aspects
Influence of Hadoop in Big Data Analysis and Its Aspects Influence of Hadoop in Big Data Analysis and Its Aspects
Influence of Hadoop in Big Data Analysis and Its Aspects
IJMER
 
A Comparison Of Smart Routings In Mobile Ad Hoc Networks(MANETs)
A Comparison Of Smart Routings In Mobile Ad Hoc  Networks(MANETs) A Comparison Of Smart Routings In Mobile Ad Hoc  Networks(MANETs)
A Comparison Of Smart Routings In Mobile Ad Hoc Networks(MANETs)
IJMER
 
Ijmer 46050106
Ijmer 46050106Ijmer 46050106
Ijmer 46050106
IJMER
 

Viewers also liked (20)

The Effect of Design Parameters of an Integrated Linear Electromagnetic Moto...
The Effect of Design Parameters of an Integrated Linear  Electromagnetic Moto...The Effect of Design Parameters of an Integrated Linear  Electromagnetic Moto...
The Effect of Design Parameters of an Integrated Linear Electromagnetic Moto...
 
Bu31284290
Bu31284290Bu31284290
Bu31284290
 
Improvement of Surface Roughness of Nickel Alloy Specimen by Removing Recast ...
Improvement of Surface Roughness of Nickel Alloy Specimen by Removing Recast ...Improvement of Surface Roughness of Nickel Alloy Specimen by Removing Recast ...
Improvement of Surface Roughness of Nickel Alloy Specimen by Removing Recast ...
 
Strehl Ratio with Higher-Order Parabolic Filter
Strehl Ratio with Higher-Order Parabolic FilterStrehl Ratio with Higher-Order Parabolic Filter
Strehl Ratio with Higher-Order Parabolic Filter
 
Db3210821087
Db3210821087Db3210821087
Db3210821087
 
Characterization of environmental impact indices of solid wastes in Surulere...
Characterization of environmental impact indices of solid wastes  in Surulere...Characterization of environmental impact indices of solid wastes  in Surulere...
Characterization of environmental impact indices of solid wastes in Surulere...
 
Tracking of Maximum Power from Wind Using Fuzzy Logic Controller Based On PMSG
Tracking of Maximum Power from Wind Using Fuzzy Logic Controller Based On PMSGTracking of Maximum Power from Wind Using Fuzzy Logic Controller Based On PMSG
Tracking of Maximum Power from Wind Using Fuzzy Logic Controller Based On PMSG
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
 
Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques
 
I0502 01 4856
I0502 01 4856I0502 01 4856
I0502 01 4856
 
At2419231928
At2419231928At2419231928
At2419231928
 
Liberty computerpub2
Liberty computerpub2Liberty computerpub2
Liberty computerpub2
 
Analyses of front, contents and double page spreads
Analyses of front, contents and double page spreadsAnalyses of front, contents and double page spreads
Analyses of front, contents and double page spreads
 
Experimental Investigation of Flow Pattern on Rectangular Fin Arrays under Na...
Experimental Investigation of Flow Pattern on Rectangular Fin Arrays under Na...Experimental Investigation of Flow Pattern on Rectangular Fin Arrays under Na...
Experimental Investigation of Flow Pattern on Rectangular Fin Arrays under Na...
 
Some Dynamical Behaviours of a Two Dimensional Nonlinear Map
Some Dynamical Behaviours of a Two Dimensional Nonlinear MapSome Dynamical Behaviours of a Two Dimensional Nonlinear Map
Some Dynamical Behaviours of a Two Dimensional Nonlinear Map
 
Bj31204211
Bj31204211Bj31204211
Bj31204211
 
Am318385
Am318385Am318385
Am318385
 
Influence of Hadoop in Big Data Analysis and Its Aspects
Influence of Hadoop in Big Data Analysis and Its Aspects Influence of Hadoop in Big Data Analysis and Its Aspects
Influence of Hadoop in Big Data Analysis and Its Aspects
 
A Comparison Of Smart Routings In Mobile Ad Hoc Networks(MANETs)
A Comparison Of Smart Routings In Mobile Ad Hoc  Networks(MANETs) A Comparison Of Smart Routings In Mobile Ad Hoc  Networks(MANETs)
A Comparison Of Smart Routings In Mobile Ad Hoc Networks(MANETs)
 
Ijmer 46050106
Ijmer 46050106Ijmer 46050106
Ijmer 46050106
 

Similar to A Distributed Cut Detection Method for Wireless Sensor Networks

An implementation of recovery algorithm for fault nodes in a wireless sensor ...
An implementation of recovery algorithm for fault nodes in a wireless sensor ...An implementation of recovery algorithm for fault nodes in a wireless sensor ...
An implementation of recovery algorithm for fault nodes in a wireless sensor ...
eSAT Publishing House
 
Ijetr012022
Ijetr012022Ijetr012022
Ijetr012022
ER Publication.org
 
A self-managing fault management mechanism for wireless sensor networks
A self-managing fault management mechanism for wireless sensor networks A self-managing fault management mechanism for wireless sensor networks
A self-managing fault management mechanism for wireless sensor networks
ijwmn
 
18 9254 eeem diminishing connectivity edit septian
18 9254 eeem diminishing connectivity edit septian18 9254 eeem diminishing connectivity edit septian
18 9254 eeem diminishing connectivity edit septian
IAESIJEECS
 
Ijnsa050209
Ijnsa050209Ijnsa050209
Ijnsa050209
IJNSA Journal
 
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
cscpconf
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
IRJET Journal
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Network
ijtsrd
 
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKCODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
IJNSA Journal
 
IRJET- Coverage Hole Avoidance using Fault Node Recovery in Mobile Sensor Net...
IRJET- Coverage Hole Avoidance using Fault Node Recovery in Mobile Sensor Net...IRJET- Coverage Hole Avoidance using Fault Node Recovery in Mobile Sensor Net...
IRJET- Coverage Hole Avoidance using Fault Node Recovery in Mobile Sensor Net...
IRJET Journal
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
ijwmn
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
ijwmn
 
A Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network SecurityA Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network Security
ijtsrd
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
ijcsa
 
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed SurveyComparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
theijes
 
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
journalBEEI
 
Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581
Editor IJARCET
 
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Editor IJMTER
 
Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...
eSAT Publishing House
 
2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stack2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stack
Syed Ariful Islam Emon
 

Similar to A Distributed Cut Detection Method for Wireless Sensor Networks (20)

An implementation of recovery algorithm for fault nodes in a wireless sensor ...
An implementation of recovery algorithm for fault nodes in a wireless sensor ...An implementation of recovery algorithm for fault nodes in a wireless sensor ...
An implementation of recovery algorithm for fault nodes in a wireless sensor ...
 
Ijetr012022
Ijetr012022Ijetr012022
Ijetr012022
 
A self-managing fault management mechanism for wireless sensor networks
A self-managing fault management mechanism for wireless sensor networks A self-managing fault management mechanism for wireless sensor networks
A self-managing fault management mechanism for wireless sensor networks
 
18 9254 eeem diminishing connectivity edit septian
18 9254 eeem diminishing connectivity edit septian18 9254 eeem diminishing connectivity edit septian
18 9254 eeem diminishing connectivity edit septian
 
Ijnsa050209
Ijnsa050209Ijnsa050209
Ijnsa050209
 
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Network
 
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKCODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
 
IRJET- Coverage Hole Avoidance using Fault Node Recovery in Mobile Sensor Net...
IRJET- Coverage Hole Avoidance using Fault Node Recovery in Mobile Sensor Net...IRJET- Coverage Hole Avoidance using Fault Node Recovery in Mobile Sensor Net...
IRJET- Coverage Hole Avoidance using Fault Node Recovery in Mobile Sensor Net...
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
A Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network SecurityA Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network Security
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
 
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed SurveyComparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
 
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
 
Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581
 
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
 
Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...
 
2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stack2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stack
 

More from IJMER

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
IJMER
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
IJMER
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
IJMER
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
IJMER
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
IJMER
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
IJMER
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
IJMER
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
IJMER
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
IJMER
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
IJMER
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
IJMER
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
IJMER
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
IJMER
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
IJMER
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
IJMER
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
IJMER
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
IJMER
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
IJMER
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
IJMER
 
Application of Parabolic Trough Collectorfor Reduction of Pressure Drop in Oi...
Application of Parabolic Trough Collectorfor Reduction of Pressure Drop in Oi...Application of Parabolic Trough Collectorfor Reduction of Pressure Drop in Oi...
Application of Parabolic Trough Collectorfor Reduction of Pressure Drop in Oi...
IJMER
 

More from IJMER (20)

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
 
Application of Parabolic Trough Collectorfor Reduction of Pressure Drop in Oi...
Application of Parabolic Trough Collectorfor Reduction of Pressure Drop in Oi...Application of Parabolic Trough Collectorfor Reduction of Pressure Drop in Oi...
Application of Parabolic Trough Collectorfor Reduction of Pressure Drop in Oi...
 

Recently uploaded

Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 

Recently uploaded (20)

Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 

A Distributed Cut Detection Method for Wireless Sensor Networks

  • 1. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2510-2513 ISSN: 2249-6645 www.ijmer.com 2510 | Page Meer Khursheeda Sulthana1 , Syed Sadat Ali2 1 M. Tech, Nimra College of Engineering & Technology, Vijayawada, A.P., India. 2 Assoc. Professor & Head, Dept.of CSE, Nimra College of Engineering & Technology, Vijayawada, A.P., India. Abstract: Wireless sensor networks (WSNs) consisting of large numbers of low- power and low- cost wireless nodes, have recently been employed in many applications: military surveillance, disaster response and medical care among others. The inherent nature of sensor networks such as unattended operation, battery-powered nodes, and harsh environments pose major challenges. One of the challenges is to ensure that the network is always connected. The connectivity of the sensor network can easily be disrupted due to unpredictable wireless channels, early depletion of node’s energy, and physical tampering by hostile users. Network disconnection, typically referred as a network “cut”, may cause a number of problems. For example, ill-informed decisions to route the data to a node located in a disconnected segment of the network might lead to data loss, wasted power consumption, and congestion around the network cut. This paper presents a distributed cut detection method for WSNs. Keywords: CCOS, Cut, DOS, WSN. I. INTRODUCTION Wireless sensor network (WSNs) (Figure 1) is composed of a powerful base station and a set of low-end sensor nodes. Base station and the sensor nodes have wireless capabilities and communicate through a wireless, multi-hop, ad-hoc network[1]. WSNs have emerged as an important new technology for purpose of instrumenting and observing the physical world. Sensor networks are a capable scenario for sensing large areas at high spatial and positive resolution. However, the small size and low cost of the processing machines that makes them attractive for large deployment also causes the loss of low operational reliability[2]. The basic building block of these networks is a small microprocessor integrated with one or more MEMS (micro-electromechanical system) sensors, actuators, and a wireless transceiver.[3] A WSN is usually collection of hundreds or thousands of different sensor nodes. These sensor nodes are often densely deployed in the sensor field and have the ability to gather data and route data back to a base station (BS). A sensor has 4 basic parts: a processing unit, a sensing unit, a transceiver unit, and a power unit [4]. Most of the WSNs routing techniques and sensing tasks require knowledge of location, which is provided by a location finding system. WSNs contains large number of nodes and each node may be very close to each neighbor. Since WSN should use multi- hop techniques because it consume less power than single hop techniques. Figure 1 : Wireless sensor network example II. CUTS IN WSNS One of the unique challenges in wireless networking environments is the phenomenon of network partitioning, which is the breakdown of a connected network topology into two or more separate, disconnected topologies[1]. Similarly sensor nodes become fail for several reasons and the network may breaks into two or more divided partitions so can say that when a number of sensor fails so the topology changes. A node may fail due to a variety of conditions such as electrical or mechanical problems, environmental degradation, and battery reduction. In fact, node failure is expected to be quite common anomaly due to the typically limited energy storage of the nodes that are powered by small batteries. Failure of a set of sensor nodes will reduce the number of multi-hop paths in the network. Such failures can cause a subset of sensor nodes – A Distributed Cut Detection Method for Wireless Sensor Networks
  • 2. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2510-2513 ISSN: 2249-6645 www.ijmer.com 2511 | Page that have not failed – to become disconnected from the rest of the network, resulting in a partition of the network also called a “cut”. Two sensor nodes said to be disconnected if there is no path between them [2].And as we know that sensor nodes has disconnectivity from the network is normally referred as a partition of the network of cut in the wireless sensor network, which arise many problems like data loss, unreliability , performance degradation. Because of cuts in WSNs many problems may arise like a wired network means data loss problem arises, means data reach in a disconnected route. Due to cuts, if any sensor node breaks down then the network is separated into different parts so the topology of the network changes but still network works. But because partition affects reliability, QOS of the network, data loss, efficiency, data processing speed. Because if any data passes unfortunately in the wrong route so data loss occurs this also shows unreliability of the network. III. RELATED WORK In [5], the authors developed a partitionable group communication service which allows so called “partition-aware applications” to operate in separated network topologies and, after two or more partitions merge, reconfigure themselves. The partitioning problem is handled by a simple PING or ACK mechanism. A sensor node sends a PING message to another node. If it does not receive an ACK in a certain period of time, that node is added to a list of suspects. A dynamic timeout mechanism is helpful which leads to a reasonably accurate suspect list. This scheme lacks the ability to distinguish between the node failure and partitioning which for most applications is desirable. In [3], the authors challenges posed by the possibility of network partitioning in WSNs has been recognized in several papers but the problem of detecting when such partitioning occurs seems to have received a little attention. To the best of our knowledge, the work in [3] is the only one that addresses the problem of detecting cuts in WSNs. They developed an algorithm for detecting the linear cuts, which is a linear separation of sensor nodes from the base station. The reason for the restriction to the linear cuts is that their algorithm relies critically on a certain duality between straight line segments and points in 2D, which also restricts the algorithm in [3] to sensor networks deployed in the 2D plane. In contrast to the algorithm designed in [3], the DSSD algorithm proposed in [6] is not limited to linear cuts; it can detect cuts that separate the network into multiple components of arbitrary shapes. Furthermore, the DSSD algorithm is not restricted to sensor networks deployed in 2D, it does not require deploying sentinel nodes, and it allows every node to detect if a cut occurs. The DSSD algorithm involves only the nearest neighbor communication, which eliminates the need of routing messages to the source node. This feature makes the algorithm applicable to the mobile nodes as well. Since the computation that a node has to carry out involves only averaging, it is particularly well suited to wireless sensor networks with nodes that have limited computational capability. In this paper, the proposed algorithm is an extension of the previous work [6], which partially examined the DOS detection problem. IV. PROPOSED WORK A. Problem Statement Consider a WSN as a time-varying graph G(k) = (V(k), E(k)), whose node set V(k) represents the sensors active at time k and the edge set E(k) consists of pairs of nodes (u, v) such that nodes u and v can directly exchange messages between each other at time k. By an “active” node we mean a node that has not failed permanently. All graphs considered here are called undirected, i.e., (i, j) = (j, i). The neighbors of a node i is the set Ni of nodes connected to i, i.e. Ni = {j|(i, j) € E}. Figure 2: Examples of Cut and Holes The number of neighbors of i, |Ni(k)|, is known its degree, which is denoted by di(k). A path from nodes i to j is a sequence of edges connecting i and j. A graph is called connected if there is a path between every pair of the nodes. A component Gc of a graph G is a maximal connected sub- graph of G (i.e., no other connected subgraph of G contains Gc as its subgraph). In terms of these definitions, a “cut” event is formally defined as the increase of the number of components of a graph due to the failure of a subset of nodes (Figure 2). The number of cuts associated with a cut event is the increase in
  • 3. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2510-2513 ISSN: 2249-6645 www.ijmer.com 2512 | Page the number of the components after the event. The problem we seek to address is a twofold. First, we have to enable every sensor node to detect if it is disconnected from the source. B. Disconnected from source(DOS) Detection We say that a Disconnected from Source (DOS) event has occurred for node u. The algorithm allows each node to detect the DOS events. The sensor nodes use the computed potentials to detect if DOS events have occurred (i.e., if they are disconnected from the source node). The approach here is to exploit the fact that if the state is close to zero then the node is disconnected from the source, otherwise not. In order to reduce the sensitivity of the algorithm to variations in network size and structure, we use a normalized state. DOS detection part consists of normalized state computation, steady-state detection and connection or separation detection. A sensor node keeps track of the positive steady states seen in the past using the following method. Each sensor node i computes the normalized state difference  xi(k) as follows: Where zero is a small positive number. Each sensor node keeps an estimate of the most recent “steady state” observed, which is denoted by )(kxss i . This estimate is updated at every time “k” according to the following rule: if PSSR(k)=1, then )(kxss i  ix k; otherwise )(kxss i  ix k− 1 . It is initialized as ss ix (0) =∞. Every sensor node i also keeps a list of steady states seen in the past, one value for each unpunctuated interval of time during which the state was detected to be steady. This information is kept in a vector )(kxss i , which is initialized to be empty and is updated as follows: If PSSR(k) = 1 but PSSR(k −1) = 0, then )(kxss is appended to )(kxss i as a new entry. If steady state reached was detected in both k and k - 1 (i.e., PSSR(k) = PSSR(k − 1) = 1, then the last entry of )(kxss is updated to )(kxss i . C. Connected Cut Occurred Somewhere (CCOS) Detection The algorithm for detecting CCOS events relies on finding a shortest path around a hole, if it exists, and is partially inspired by the jamming detection algorithm [7]. The method utilizes sensor node states to assign the task of hole-detection to the most appropriate nodes. When a sensor node detects a large change in its local state as well as failure of one or more of its neighbors, and both of these events occur within a (predetermined) small time interval, the node initiates a PROBE message. The probe messages that are initiated by certain nodes that encounter failed neighbors, and are forwarded from one node to another in a way that if a short path exists around a “hole” created by node failures, the message will reach the initiating node. The pseudo code for the algorithm that decides when to initiate a probe message is included. Each probe message “p” contains the following information:  A unique probe ID,  Source Node id S  Destination node,  Path traversed (in chronological order), and  The angle traversed by the probe message. The list of probes is the union of the probe messages it received from its neighbors and the probe it decided to initiate, if any probe is forwarded in a manner such that if the probe is triggered by the creation of a cut or small hole(with circumference less than lmax) the probe traverses a path around the hole in a counter clockwise (CCW) direction and reaches the node that initiated the probe. Since it is only used to compute destinations of the probe messages. V. CONCLUSION Wireless sensor networks (WSNs) are a promising technology for monitoring large regions at high spatial as well as temporal resolution. The failure of some of its sensor nodes, which is called “cut” can separate the network into multiple connected components. The ability of detecting the cuts by the disconnected nodes and source node of a wireless sensor network will lead to the increase in the operational lifetime of the network. The Distributed Cut Detection (DCD) algorithm proposed here enables every sensor node of a sensor network to detect Disconnected from Source events if they occur. Second, it enables a subset of sensor nodes that experience CCOS events to detect them and estimate the approximate location of the cut in the form of a list of active sensor nodes that lie at the boundary of the cut. The algorithm is based on ideas from both electrical network theory and parallel iterative solution of linear equations. A key strength of the DCD method is that the convergence rate of the iterative scheme is quite fast and independent of the size and structure of the network.
  • 4. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2510-2513 ISSN: 2249-6645 www.ijmer.com 2513 | Page REFERENCES [1] A Partition Detection System for Mobile Ad-Hoc Networks: Hartmut Ritter, Rolf Winter, Jochen Schiller [2] Akyildiz, I.F., Su, W., ankarasubramaniam, Y., Cayirci, E.: Wireless Sensor Networks: A Survey. Computer Networks Journal (Elsevier), Vol. 38, No.4 (2002)pp. 393-422. [3] N. Shrivastava, S. Suri, and C. D. T´oth, “Detecting cuts in sensor networks,”in IPSN ’05: Proceedings of the 4th international symposiumon Information processing in sensor networks, 2005, pp. 210–217. [4] A Survey on Sensor Setworks,‖ : I. F. Akyildiz et al IEEE Commun. Mag., vol. 40, no. 8, Aug. 2002, pp. 102–112. [5] Ö. Babaoglu, R. Davoli, A. Montresor, Group Communication in Partitionable Systems: Specification and Algorithms, IEEE Transactions on Software Engineering, 2001, vol. 27, no.4. [6] P. Barooah, “Distributed Cut Detection in Sensor Networks,” Proc. 47th IEEE Conf. Decision and Control, pp. 1097-1102, Dec.2008. [7] A.D. Wood, J.A. Stankovic, and S.H. Son, “Jam: A Jammed-Area Mapping Service for Sensor Networks,” Proc. IEEE Real Time Systems Symp. 2003.