Nt1310 Unit 3 Data Transmission

Improved Essays
This protocol is classified into rounds; every round composed of two phases;
Set-up Phase
(1) Advertisement Phase
(2) Cluster Set-up Phase
Steady Phase
(1) Schedule Creation
(2) Data Transmission
A. Setup Phase: Every node selects independent of other nodes if it will become a CH or not. This selection takes into consideration when the node behaved as a CH for the last time. In the advertisement phase, the CHs inform their neighboring node with an advertisement packet that they become CHs. Non-CH nodes take the advertisement packet with the strongest obtained signal strength. In the next cluster setup phase, the member nodes inform the CH that they become a member of that cluster with "join packet" has their IDs utilizing CSMA. After the cluster-setup sub-phase, the CH knows the no. of member nodes and their IDs. Depending on all messages obtained within the cluster, the CH produces a TDMA schedule, take a CSMA code in a random way, and forward the TDMA table to cluster members. After that steady-state phase starts.

B. Steady-state phase: Data transmission starts; Nodes forward their data during their assigned TDMA slot to the CH. This transmission utilizes a minimum amount of energy (selected depending on the obtained strength of the CH advertisement). The radio of every non-CH node can be turned off until the nodes assigned TDMA
…show more content…
It builds the residual energy of node as the significant metric which selects whether the nodes turn into CH or not after the first round. Similar to LEACH protocol, E-LEACH is classified into rounds, in the first round, each node has the same possibility to turn into CH, that mean nodes are chosen as CHs in a random way, in the next rounds, the residual energy of every node is different after one round communication and taken into consideration for choosing the CHs. That mean nodes have more energy will become a CHs instead of nodes with less

Related Documents

  • Improved Essays

    Nt1330 Unit 8

    • 375 Words
    • 2 Pages

    To explain this, we should already know that in real life scenarios, stack increases to lower memory addresses, whenever program calls some function, the address of function call instruction is saved in stack as a return for the function. When the function executes, it allocates local variables, including buffers to stack and they are given a lower address than the return address. So, in this scenario the return address is a certain level above the base address for buffers and if the buffer is overflowing, then it is most likely that an attacker can change return address as well. If the return address is changed to some random value, then it will cause segmentation fault, but if the return address is changed to a certain address where some executable code is present, then that may complete attackers intended tasks with the application.…

    • 375 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Kaplan University IT286 Unit 8.2 Jennifer Polisano Answer 8.2: As the IT Security Professional for Web Site 101, I will be recommending adjustments for recent security issues, including data loss due to employee negligence, physical break ins, identifying employee security standards, identifying network access specifics, and the recent hacking of the home page of Web Site 101. Web Site 101 currently has 300 employees working on three levels of the office building. In the previous years, this organization has grossed 2 million dollars revenue per year. For the organization to continue to thrive, these security problems will need to be addressed immediately.…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Nt1310 Unit 1 Lab 1

    • 439 Words
    • 2 Pages

    Speed, availability, and reliability are vital for a successful network infrastructure in terms of productivity and user experience. When first configuring this lab, I had to make the decision of whether or not to use one server to run all of the services or if the load should be distributed amongst multiple machines. I decided to go with the later, having a separate server hosting the wiki, another providing monitor services, and yet another acting as the DHCP, DNS and AD controller. While the last three were not required in the scope of this lab, I wanted to set up my initial network in a scalable manner, and this was the best solution for future growth. Distributing the services across multiple machines helps to reduce the processing that each box is required to do in order to fulfill requests.…

    • 439 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Nt1330 Unit 3

    • 1174 Words
    • 5 Pages

    Secure Shell (SSH) In this paper, I will discuss the network protocol Secure shell, better known as SSH. Interest in choosing this protocol came from my frequent use of SSH to run applications on the remote servers in Coover Hall. Because of this, I will be exploring the details on how the protocol works, vulnerabilities associated with it and mitigation techniques put in place to counter attacks. SSH is a Cryptographic Network Protocol created to replace Telnet.…

    • 1174 Words
    • 5 Pages
    Great Essays
  • Decent Essays

    Nt1330 Unit 2

    • 280 Words
    • 2 Pages

    1. What does the floor look like? Some food craps and foot prints are on the whitish-brown flooring. 2. What’s on the menu?…

    • 280 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 6 Blockchain

    • 520 Words
    • 3 Pages

    Let’s assume for example that a node only has the genesis block. It will then receive an inv message from its peers containing the hashes of the next 500 blocks in the chain. It will start requesting blocks from all of its connected peers. It requests for spreading the load and en‐ suring that it doesn’t overwhelm any peer with requests. The node keeps track of how many blocks are ‘in transit’ per peer connection, meaning blocks that it has requested but not received, checking that it does not exceed a limit (MAX_BLOCKS_IN_TRANS‐…

    • 520 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Requirements may be specified in a variety of ways. However there are some guidelines worth following: • Representation format and content should be relevant to the problem. • Information contained within the specification should be nested. 3.3.1.…

    • 87 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Based on the findings obtained from the analysis of security information then compiled recommendations for improvement of the condition of the company. Some recommendations are: 1. Describe in detail the confidentiality agreement and specifically including maintaining the confidentiality of the password 2. Reexamination of the access rights of each and updating access rights in case of transfer of part or advancement in accordance with their respective access rights. 3.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    c. Data computing The IoT devices are going to handle a lot of information for better consumer experience. This information needs to be analyzed and processed in real time. If the data is not processed in an appropriate time frame, then that would lead to consumer dissatisfaction. Moreover, the issue lies in the amount of data that will be generated from the IoT devices.…

    • 1436 Words
    • 6 Pages
    Great Essays
  • Decent Essays

    Application Support Application Support is type of software that runs on the computer. These are things like internet browsers, Games, Email programs etc. Each of these Applications has a different purpose. Such as Word processors are used for essays and research. Whereas games are simply used for enjoyment.…

    • 218 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1320 Unit 7

    • 1110 Words
    • 5 Pages

    1. How is the Moon dependent on the Sun? The Moon is dependent on the Sun for its different lunar phases. Although these phases may not be essential to the existence of the Moon, they would not occur without the Sun.…

    • 1110 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 4

    • 961 Words
    • 4 Pages

    The problem is to ensure that elderly medical patients take their medication and recommended dose at the proper time to ensure that they receive the necessary treatment, and prevent the condition from worsening in the process. To solve this problem, a device will need to be implemented that allows the user to be reminded when to take the medicine, and also be sure that the patient is taking the correct amount of medication. Our first idea was to develop a portable watch device with built in audio and visual cues to remind the patient of their need to take the medication. The device could be programmed ahead of time by a technician, and instruct the user to take the recommended dosage at the correct time.…

    • 961 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    When communicating and interacting effectively with residents and their families it's important to be able to comprehend their feelings toward the difficult and confusion news. A caregiver should also speak with truth and compassion to let them know your support will be there when needed. Provide clarification to the resident and their families about what psychosocial needs the resident may be going through. Also, providing options that can influence the resident to overcome the situation by assisting them with activities that allow the resident and their families to work together to help the resident start liking himself or to control his emotions.…

    • 102 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 3

    • 781 Words
    • 4 Pages

    Describe the responsibility of the medical office specialist to protect all protected health information (PHI). When it comes to protecting patient information, it’s about getting employees to understand how to best protect it and what to do if there is a data breach. Training is essential and should include not only administrative employees, like medical office specialist, but also doctors, nurses, and other clinicians throughout the organization. All employees with access to patient information need to have the understanding of how to maintain security protocols when it comes to patient care. Many clinicians tend to look at PHI breaches as simply an IT issue.…

    • 781 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 2

    • 241 Words
    • 1 Pages

    1. Education for All Handicapped Children Act- Education for all Handicapped Children Act is also referred to as Public Law (PL) 94-142. This act was passed in 1975 ensuring equal access to education for all students, including students with physical and mental disabilities (Connolly, 1989). 2. Individuals with Disabilities Act (IDEA) – IDEA is a statute which entitles all students with a disability educational services to meet their unique needs (Zirkel, 2013). 3.…

    • 241 Words
    • 1 Pages
    Improved Essays