Referring to FIG. 8 illustrates an exemplary signal flow diagram depicting sectionalization of violator nodes, in accordance with exemplary embodiments of the present invention. The method starts at step [802]. At step [804], the central probe server [112] selects a packet loss violator node out of all the violators node for a given time duration ΔT and form a 1×1 Node (ΔT) matrix containing a single node. At step [806], the sectionalisation module [114] appends the selected violator node to the member list in the violator node database. At step [806A], the errant point identification module [116] initializes the chain length to 1 for the at least one daisy chain formed from the at least one violator node. At step [808], the central probe server [112] finds directly connected neighbor nodes of the selected violator node and for neighbor matrix Neighbornode(ΔT). At step [810], the central probe server [112] finds violator nodes contained in directly connected neighbor nodes and form violator node matrix Violatornode(ΔT). At step [812], the sectionalisation module [114] checks if the number of nodes in matrix Violatornode(ΔT) is 0, and, at step [822] the sectionalisation module [114] checks if the chain length is 1, and accordingly marks the violator node type as “Silo Node” for that particular node. Accordingly, at step [828], the sectionalisation module [114] excludes this node from ViolatorDatabase(ΔT) of time interval ΔT for next Daisy Chain/Silo node determination.