The Cut In Wireless Sensor Networks

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

ABSTRACT:

Wireless Sensor Networks (WSNs) consist of thousands of tiny nodes having the capability of sensing, computation, and wireless communications. Wireless sensor network can suffer partition problem in the network which is called cut. So a single topology of the network breaks into two or more parts. Here we discuss several cut detection techniques to detect the cut.

INTRODUCTION:

wireless sensor network is composed of a powerful base station and a set of low-end sensor nodes. Base station and sensor nodes have wireless capabilities and communicate through a wireless, multi-hop, ad-hoc network.[3]Wireless sensor networks (WSN) have emerged as an important new technology for instrumenting and observing the physical world.

WIRELESS sensor networks (WSNs) are a promising technology for monitoring large regions at high spatial and activist resolution. However, the tiny size and low cost of the processing nodes that makes them attractive for widespread deployment also causes the disadvantage of low operational reliability[1].Wireless sensor networks (WSN) have emerged as an important new technology for instrumenting and observing the physical world. The basic building block of these networks is a tiny microprocessor integrated with one or more MEMS (micro-electromechanical system) sensors, actuators, and a wireless transceiver.[2] A WSN is usually collection of hundreds or thousands of sensor nodes. These sensor nodes are often densely deployed in a sensor field and have the capability to collect data and route data back to a base station (BS). A sensor consists of four basic parts: a sensing unit, a processing unit, a transceiver unit, and a power unit [5]. Most of the sensor network routing techniques and sensing tasks require knowledge of location, which is provided by a location finding system. Wireless sensor network contains large number of nodes and each node may be very close to each neighbor. Since WSN should use multihop techniques because it consume less power than single hop techniques. Multihop techniques can also effectively overcome some of the signal propagation outcomes experienced in long-distance wireless communication [6]. WSN may also have additional application dependent components such as a location finding system, power generator, and mobilizer (Fig. 1). Sensing units are usually composed of two subunits: sensors and analog-to-digital converters (ADCs). The ADCs convert the analog signals produced by the sensors to digital signals based on the observed phenomenon. The processing unit, which is generally associated with a small storage unit, controls the procedures that make the sensor node collaborate with the other nodes. A transceiver unit connects the node to the network. One of the most important units is the power unit. A power unit may be finite (e.g., a single battery) or may be supported by power scavenging devices (e.g., solar cells).

Figure-1:

Characteristics of WSN

The main characteristics of a WSN include

Limited Power consumption for nodes using batteries or energy harvesting

Ability to run with node failures

Mobility of nodes

Dynamic network topology

Communication failures

Heterogeneity of nodes

Scalability to large scale of deployment

capacity to survive hard environmental conditions

Ease of use

Unattended operation

Power consumption

WSN & ADHOC NETWORK

As WSNs are lots of similar to traditional wireless ad hoc networks, important differences exist which greatly influence how security is achieved [4]. In [8], I. F. Akyildiz et al proposed the differences between sensor networks and ad hoc networks are:

1. The number of sensor nodes in a sensor network can be several orders of magnitude higher than the nodes in an ad hoc network.

2. Sensor nodes are densely deployed.

3. Sensor nodes are prone to failures due to harsh environments and energy constraints.

4. The topology of a sensor network changes very frequently due to failures or mobility.

5. Sensor nodes are limited in computation, memory, and power resources.

6. Sensor nodes may not have global identification.

Protocol Stack

The protocol stack used in sensor nodes.It has physical, data link, network, transport, and application layer. Layer of protocol stack are defined as follows [8]:

Figure 2: Protocol Stack for WSN [8]

1. Physical layer: It provides a channel for the transmission. This is responsible for frequency selection, data encryption, , signal deflection, carrier frequency generation, and modulation.

2. Data link layer: This is responsible for the multiplexing of data streams, data frame detection, medium access, and error control; as well as ensuring reliable node-to-node and point-to-multipoint connections.

3. Network layer: This layer is responsible for providing the assignment of addresses and provide the routes to packets and how they are forwarded.

4. Transport layer: This is responsible for specifying reliable transmission and how a packets are completely transferred to the destination.

5. Application layer: Its responsibility is specifying how the data are requested and provided for both individual sensor nodes and interactions with the end user.

Power management plane: It describes or handles how a sensor node uses its power. For example, the sensor node may turn off its receiver after receiving a message from one of its neighbors. This is to avoid getting duplicated messages.

Mobility management plane: It detects and registers the movement of sensor nodes, so a route back to the user is always maintained, and the sensor nodes can keep track of who are their neighbor sensor nodes.

Task management plane: It balances and schedules the sensing tasks given to a specific region.[8]

Challenges:

In wireless sensor network there are several challenges like battery depletion problem ,physical means mechanical or electrical problems, environmental degradation. Sensor networks are typically characterized by limited power supplies, low bandwidth, small memory sizes and limited energy. Sensor nodes carry limited, normally not changeable, power sources. Therefore, while traditional networks aim to achieve high quality of service (QoS) of the wireless sensor network provisions, sensor network protocols must focus primarily on power conservation [4].As we know that wireless sensor networks use the concept of wireless ad-hoc network so it has self organizing behavior. So in WSN, topology changes dynamically. Sensor network do not have any predefined infrastructure so it does not use any regular topology.

So in wireless sensor networks, several challenges have to be overcome to achieve the potential of WSNs. One of the challenges in the successful use of WSNs come from the limited energy of the individual sensor nodes. Significant current research has therefore been directed at reducing energy consumption at the sensor nodes. In the hardware front, energy efficient components have been developed, and in the software front, power aware routing, low complexity coding, and low power data processing algorithms have been examined. Although these advances are expected to increase the lifetime of the wireless sensor nodes, due to their extremely limited energy budget and environmental degradation, node failure is expected to be quite common.

The inherent nature of WSNs such as unattended operation, battery powered nodes, and harsh environments are major challenges. One of more challenge is to ensure that the network is connected. The connectivity of the network can easily be disrupted due to unpredictable wireless channels, early depletion of node’s energy, and physical tampering by hostile users.[7]

Cut in wireless sensor networks:

ONE of the unique challenges in mobile ad-hoc networking environments is the phenomenon of network partitioning, which is the breakdown of a connected network topology into two or more separate, disconnected topologies.[3] Similarly sensors become fail for several reasons and the network may breaks into two or more divided partitions so can say that when a number of sensor fails so the topology changes. A node may fail due to a variety of conditions such as mechanical or electrical problems, environmental degradation, battery reduction. In fact, node failure is expected to be quite common anomaly due to the typically limited energy storage of the nodes that are powered by small batteries. Failure of a set of nodes will reduce the number of multi-hop paths in the network. Such failures can cause a subset of nodes – that have not failed – to become disconnected from the rest of the network, resulting in a partition of the network also called a"cut". Two nodes are said to be disconnected if there is no path between them.[1].And As we know that sensors has Disconnectivity from the network is normally referred as a partition of the network of cut in the wireless sensor network, which arise many problems like unreliability ,data loss, performance degradation. Because of cut in wireless sensor network many problems may arise like a wired network means data loss problem arises, means data reach in a disconnected route.[Man se]

Problems due to cut :

As mentioned above if any node breaks down then the network is separated into different parts so the topology of the network changes but still network works. But because partition affects reliability, data loss, QOS of the network, efficiency, data processing speed. Because if any data passes unfortunately in a wrong route so data loss occurs this also shows unreliability of the network.

Cut Detection in WSN

We consider the problem of detecting cuts between nodes of a wireless sensor network. We assume that there is a special designated node in the network, which we call the source station or node. Suppose source station may be a base station that serves as a mediator between the network and its users; since a cut may or may not separate a node from the source node, we distinguish between two distinct outcomes of a cut for a particular node. When a node u got disconnected from the source, we can say that a disconnection from Source station so can say that event has happened for u. When a cut happens in the network that does not separate a node u from the source node, we can say that connected, but a Cut Occurred Somewhere so can say another event has occurred for u. [1]

By "approximate location" of a cut we mean the location of one or more active nodes that lie at the boundary of the cut and that are connected to the source. Nodes that detect the occurrence and approximate locations of the cuts can then alert the source node or the base station. [1].

Cut detection Techniques:

Kleinberg describes detection of network failure paper [10]. The problem of network partition in sensor networks has been raised in several papers. As noted by Shrivastava et. al. [9], the challenges posed by the possibility of network partitioning in WSNs has been recognized in several papers (see, e.g. [10], [11], [12] ) but the problem of detecting when such partitioning occurs seems to have received little attention. As we concluded after the study in paper[2], the work done by Shrivastava et. al. is the only one that develop the anomaly of detecting partitions in wireless sensor networks. They developed an scheme for detecting o linear cuts, which is a linear separation of n nodes from the base station.

Kleinberg et. al. have studied the problem of detecting network failures in wired networks, and proposed schemes for the case when k edges fail independently [13], [14]

So finding the location of break in the network has done by Shrivastava et. by developing the algorithm for cut detection in paper[2] .In paper[2] Shrivastava developed a simple, low-overhead technique to find and locate the cuts or partitions or break point of the network in sensor networks. In this paper, they tried to reduce the communication cost for detecting linear cuts by using only a small number of sentinel nodes. Different sets of sentinels however, may lead to communication costs, and an important second-order optimization would take this effect into account. Another way to minimize the communication in the network would be to make the cut detection more decentralized. These are both very practical questions and natural directions for future work. In this paper we have limited ourselves to linear cuts. This is an important and natural class of cuts, but a richer set of cuts would include circular cuts, rectangular cuts, and polygonal cuts[10][9].

In paper [7] Myounggyu Won, focused on a more general partition detection problem – which is the destination-based cut detection problem. Unlike the traditional cut detection problem, they tried to find a partitions of the network between a node which may be sender and any node in a set of given destinations. They first proposed a Point-to-Point Cut Detection protocol (P2P-CD). P2P-CD allows a sender or a source station to track or catch a cut with respect to any destination node. After that they proposed two schemes to address the destination based cut detection problem. Which are the point-to-point cut detection protocol (P2P-CD) which enables each node to be able to detect a partition with respect to any destination node. This protocol significantly minimize the energy consumption when coupled with an underlying routing protocol at the cost of the knowledge on partial global topology. Their second algorithm, was the robust and energy efficient cut detection for multiple sinks (RE-CDM) is a more small solution in that it does not need data on global topology, nor node’s place information. [7].This algorithm was designed for network scenarios with a small number of sink nodes.

In paper [11],we have concluded two different techniques to detect network partitioning. Both methods are based on the notion of border nodes and their successful identification. With both systems one is able to distinguish node failure from network partition, with both systems primarily differing in terms of flexibility against failure and network load. These mechanisms explicitly select the best suited nodes and are also able to distinguish node failure from network partitioning. Both our approaches have unique advantages. The centralized approach generates a by far lower message overhead compared to the distributed approach. It is in its structure much simpler, but burdens one single node far more than the rest of the nodes. The centralized approach also has some critical system states. For example during the time between server failure and the time when all active nodes registered at the new server the network is completely unmonitored. The same problem occurs during the time when a new server has to be elected in a separated partition. The server election phase itself could be a complex and costly task in terms of network load and system downtime.

The distributed approach is far more resilient against node failure. Multiple partnerships make sure that a single or more failing nodes only reduce the monitored area of the affected nodes temporarily. That also has the effect that there is no downtime in that system except if a large number of nodes fail or an extremely unfortunate combination of nodes fail simultaneously. That also makes the system more stable against malicious nodes trying to disrupt the system. These positive properties of course come at a cost. The distributed approach loads the network far more than the centralized approach.[11]

Conclusion:

In this article we discuss WSN cut and existing cut detection schemes in WSN. Wireless Sensor Networks (WSNs) often suffer from disrupted connectivity caused by its numerous aspects such as limited battery power of a node and unattended operation vulnerable to violent interfering. And this loosing connectivity is often referred as a network cut sometimes. As we studied several schemes of detecting to cuts and want to conclude cut in WSN is a big problem which may arise some unreliability, so it is necessary to research and study to cut. And it also seems that cut detection scheme is also useful because of increasing reliability and efficiency of the network.



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now