Cut In Wireless Sensor Networks

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

Abstract: Wireless Sensor Networks (WSNs) consist of thousands of tiny nodes having the capability of sensing, computation, and wireless communications. Wireless sensor network can suffer partition problem in the network which is called cut. So a single topology of the network breaks into two or more parts. Here we discuss several cut detection techniques to detect the cut.

Keywords: WSN cuts, cut detection, WSN.

Introduction

wireless sensor network is composed of a powerful base station and a set of low-end sensor nodes. Base station and sensor nodes have wireless capabilities and communicate through a wireless, multi-hop, ad-hoc network.[3]Wireless sensor networks (WSN) have emerged as an important new technology for instrumenting and observing the physical world.

WIRELESS sensor networks (WSNs) are a promising technology for monitoring large regions at high spatial and temporal resolution. However, the small size and low cost of the nodes that makes them attractive for widespread deployment also causes the disadvantage of low operational reliability[1].Wireless sensor networks (WSN) have emerged as an important new technology for instrumenting and observing the physical world. The basic building block of these networks is a tiny microprocessor integrated with one or more MEMS (micro-electromechanical system) sensors, actuators, and a wireless transceiver.[2] A WSN is usually collection of hundreds or thousands of sensor nodes. These sensor nodes are often densely deployed in a sensor field and have the capability to collect data and route data back to a base station (BS). A sensor consists of four basic parts: a sensing unit, a processing unit, a transceiver unit, and a power unit [5]. Most of the sensor network routing techniques and sensing tasks require knowledge of location, which is provided by a location finding system. Wireless sensor network contains large number of nodes and each node may be very close to each neighbor. Since WSN should use multihop techniques because it consume less power than single hop techniques. Multihop communication can also effectively overcome some of the signal propagation effects experienced in long-distance wireless communication [6]. WSN may also have additional application dependent components such as a location finding system, power generator, and mobilizer (Fig. 1). Sensing units are usually composed of two subunits: sensors and analog-to-digital converters (ADCs). The ADCs convert the analog signals produced by the sensors to digital signals based on the observed phenomenon. The processing unit, which is generally associated with a small storage unit, manages the procedures that make the sensor node collaborate with the other nodes. A transceiver unit connects the node to the network. One of the most important units is the power unit. A power unit may be finite (e.g., a single battery) or may be supported by power scavenging devices (e.g., solar cells).

Figure-1:

Characteristics of WSN

The main characteristics of a WSN include

Power consumption constrains for nodes using batteries or energy harvesting

Ability to cope with node failures

Mobility of nodes

Dynamic network topology

Communication failures

Heterogeneity of nodes

Scalability to large scale of deployment

Ability to withstand harsh environmental conditions

Ease of use

Unattended operation

Power consumption

WSN & ADHOC NETWORK

As WSNs are lots of similar to traditional wireless ad hoc networks, important distinctions exist which greatly affect how security is achieved [4]. In [8], I. F. Akyildiz et al proposed the differences between sensor networks and ad hoc networks are:

1. The number of sensor nodes in a sensor network can be several orders of magnitude higher than the nodes in an ad hoc network.

2. Sensor nodes are densely deployed.

3. Sensor nodes are prone to failures due to harsh environments and energy constraints.

4. The topology of a sensor network changes very frequently due to failures or mobility.

5. Sensor nodes are limited in computation, memory, and power resources.

6. Sensor nodes may not have global identification.

Protocol Stack

The protocol stack used in sensor nodes contains physical, data link, network, transport, and application layers defined as follows [8]:

Figure 2: Protocol Stack for WSN [8]

1. Physical layer: This is responsible for frequency selection, carrier frequency generation, signal deflection, modulation, and data encryption.

2. Data link layer: This is responsible for the multiplexing of data streams, data frame detection, medium access, and error control; as well as ensuring reliable point-to-point and point-to-multipoint connections.

3. Network layer: This layer is responsible for specifying the assignment of addresses and how packets are forwarded.

4. Transport layer: This is responsible for specifying how the reliable transport of packets will take place.

5. Application layer: Its responsibility is specifying how the data are requested and provided for both individual sensor nodes and interactions with the end user.

Power management plane: It manages how a sensor node uses its power. For example, the sensor node may turn off its receiver after receiving a message from one of its neighbors. This is to avoid getting duplicated messages.

Mobility management plane: It detects and registers the movement of sensor nodes, so a route back to the user is always maintained, and the sensor nodes can keep track of who are their neighbor sensor nodes.

Task management plane: It balances and schedules the sensing tasks given to a specific region.[8]

Challenges:

In wireless sensor network there are several challenges like battery depletion problem ,physical means mechanical or electrical problems, environmental degradation, battery or hostile tampering. Sensor networks are typically characterized by limited power supplies, low bandwidth, small memory sizes and limited energy. Sensor nodes carry limited, normally not changeable, power sources. Therefore, while traditional networks aim to achieve high quality of service (QoS) provisions, sensor network protocols must focus primarily on power conservation [4].As we know that wireless sensor networks use the concept of wireless ad-hoc network so it has self organizing behavior. So in WSN, topology changes dynamically. Sensor network do not have any predefined infrastructure so it does not use any regular topology.

So in wireless sensor networks, several challenges have to be overcome to achieve the potential of WSNs. One of the challenges in the successful use of WSNs come from the limited energy of the individual sensor nodes. Significant current research has therefore been directed at reducing energy consumption at the sensor nodes. In the hardware front, energy efficient components have been developed, and in the software front, power aware routing, low complexity coding, and low power data processing algorithms have been examined. Although these advances are expected to increase the lifetime of the wireless sensor nodes, due to their extremely limited energy budget and environmental degradation, node failure is expected to be quite common.

The inherent nature of WSNs such as unattended operation, battery powered nodes, and harsh environments are major challenges. One of more challenge is to ensure that the network is connected. The connectivity of the network can easily be disrupted due to unpredictable wireless channels, early depletion of node’s energy, and physical tampering by hostile users.[7]

Cut in wireless sensor networks:

ONE of the unique challenges in mobile ad-hoc networking environments is the phenomenon of network partitioning, which is the breakdown of a connected network topology into two or more separate, disconnected topologies.[3] Similarly sensors become fail for several reasons and the network may breaks into two or more divided partitions so can say that when a number of sensor fails so the topology changes. A node may fail due to various factors such as mechanical or electrical problems, environmental degradation, battery depletion, or hostile tampering. In fact, node failure is expected to be quite common due to the typically limited energy budget of the nodes that are powered by small batteries. Failure of a set of nodes will reduce the number of multi-hop paths in the network. Such failures can cause a subset of nodes – that have not failed – to become disconnected from the rest, resulting in a "cut". Two nodes are said to be disconnected if there is no path between them.[1].And As we know that sensors has Disconnectivity from the network is normally referred as a partition of the network of cut in the wireless sensor network, which arise many problems like unreliability ,data loss, performance degradation. Because of cut in wireless sensor network many problems may arise like a wired network means data loss problem arises, means data reach in a disconnected route.[Man se]

Problems due to cut :

As mentioned above if any node breaks down then the network is separated into different parts so the topology of the network changes but still network works. But because partition affects reliability, data loss, QOS of the network, efficiency, data processing speed. Because if any data passes unfortunately in a wrong route so data loss occurs this also shows unreliability of the network.

Cut Detection in WSN

We consider the problem of detecting cuts by the nodes of a wireless network. We assume that there is a specially designated node in the network, which we call the source station or node. Suppose source station may be a base station that serves as a mediator between the network and its users; since a cut may or may not separate a node from the source node, we distinguish between two distinct outcomes of a cut for a particular node. When a node u got disconnected from the source, we can say that a disconnection from Source station so can say that event has occurred for u. When a cut occurs in the network that does not separate a node u from the source node, we can say that connected, but a Cut Occurred Somewhere so can say another event has occurred for u.

By "approximate location" of a cut we mean the location of one or more active nodes that lie at the boundary of the cut and that are connected to the source. Nodes that detect the occurrence and approximate locations of the cuts can then alert the source node or the base station. [1].

Cut detection Techniques:

Kleinberg describes detection of network failure paper [10]. The problem of network partition in sensor networks has been raised in several papers. As noted by Shrivastava et. al. [9], the challenges posed by the possibility of network partitioning in WSNs has been recognized in several papers (see, e.g. [10], [11], [12] ) but the problem of detecting when such partitioning occurs seems to have received little attention. To the best of our knowledge, the work by Shrivastava et. al. is the only one that addresses the problem of detecting cuts in wireless sensor networks. They developed an algorithm for detecting o linear cuts, which is a linear separation of on nodes from the base station.

Kleinberg et. al. have studied the problem of detecting network failures in wired networks, and proposed schemes for the case when k edges fail independently [13], [14].

To the best of our knowledge, the work by Shrivastava et. al. [9] is the only one that addresses the problem of detecting cuts in wireless sensor networks. Shrivastava proposed a simple, low-overhead scheme for detecting cuts (partitions) in sensor networks. In this paper, we have tried to minimize the communication cost for detecting linear cuts by using only a small number of sentinel nodes. Different sets of sentinels, however, may lead to different communication costs, and an important second-order optimization would take this effect into account. Another way to minimize the communication in the network would be to make the cut detection more decentralized. These are both very practical questions and natural directions for future work. In this paper we have limited ourselves to linear cuts. This is an important and natural class of cuts, but a richer set of cuts would include circular cuts, rectangular cuts, and polygonal cuts.[10]

In paper [7] Myounggyu Won, proposed a solution for a more general cut detection problem – the destination-based cut detection problem. Unlike the traditional cut detection problem, they attempt to find a network cut between a sender and any node in a set of given destinations. They first propose Point-to-Point Cut Detection protocol (P2P-CD). P2P-CD allows a source node to identify a cut with respect to any destination node. We then proposed two algorithms to address the destination based cut detection problem. We first introduced the point-to-point cut detection protocol (P2P-CD) which enables each node to be able to detect a cut with respect to any destination node. This protocol significantly reduces energy consumption when coupled with an underlying routing protocol at the cost of the knowledge on partial global topology. Our second algorithm, the robust and energy efficient cut detection for multiple sinks (RE-CDM) is a more lightweight solution in that it does not require information on global topology, nor node’s location information. This algorithm was designed for network scenarios with a small number of sink nodes.

we have evaluated [11] two different approaches to detect network partitioning. Both approaches are based on the notion of border nodes and their successful identification. With both systems one is able to distinguish node failure from network partition, with both systems primarily differing in terms of resilience against failure and network load. These mechanisms explicitly select the best suited nodes and are also able to distinguish node failure from network partitioning. Both our approaches have unique advantages. The centralized approach generates a by far lower message overhead compared to the distributed approach. It is in its structure much simpler, but burdens one single node far more than the rest of the nodes. The centralized approach also has some critical system states. For example during the time between server failure and the time when all active nodes registered at the new server the network is completely unmonitored. The same problem occurs during the time when a new server has to be elected in a separated partition. The server election phase itself could be a complex and costly task in terms of network load and system downtime.

The distributed approach is far more resilient against node failure. Multiple partnerships make sure that a single or more failing nodes only reduce the monitored area of the affected nodes temporarily. That also has the effect that there is no downtime in that system except if a large number of nodes fail or an extremely unfortunate combination of nodes fail simultaneously. That also makes the system more stable against malicious nodes trying to disrupt the system. These positive properties of course come at a cost. The distributed approach loads the network far more than the centralized approach.[11]

Conclusion:

In this article we discuss WSN cut and existing cut detection schemes in WSN. Wireless Sensor Networks (WSNs) often suffer from disrupted connectivity caused by its numerous aspects such as limited battery power of a node and unattended operation vulnerable to violent interfering. And this loosing connectivity is often referred as a network cut sometimes. As we studied several schemes of detecting to cuts and want to conclude cut in WSN is a big problem which may arise some unreliability, so it is necessary to research and study to cut. And it also seems that cut detection scheme is also useful because of increasing reliability and efficiency of the network.



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now