Analysis: Linked Cluster Algorithm

Improved Essays
1) Linked Cluster Algorithm (LCA) [5], [6], [7]:
LCA, was one of the initial clustering algorithms evolved. It was primarily developed for wired sensors, but later applied in wireless sensor networks. In LCA, a unique ID number is allotted to each node and has two means of becoming a cluster head. The first way is that if the node has the greatest ID number in the set including all neighbor nodes and the node itself. The second way is to assume that none of its neighbors are cluster heads, then it becomes a cluster head. In this way, LCA search a solution which is surely not an optimal solution.
2) Linked Cluster Algorithm (LCA) [5], [6], [7]:
LCA2 was anticipated to reduce the selection of an unnecessary number of cluster heads, as in LCA. In LCA2, the concept of a node being covered and non-covered was introduced. A node is considered as covered if one of its neighbors is a cluster head. Cluster heads are primarily selected from nodes which are having lowest ID among non-covered neighbors. Again the probability of achieving success is less.
3) Highest-Connectivity Cluster Algorithm [7]:
This algorithm is analogous to LCA. In
…show more content…
This algorithm offers a load balancing among cluster heads. The cluster head selection criteria are developed by having each node initiate 2d rounds of flooding, from that the results are logged. Then every node follows a simple set of rules to determine their respective cluster head. The first d rounds are referred to as flood max, used to propagate the largest node IDs. After this is complete, the second d rounds of flooding occur. This round is called flood min, used to allow the smaller node ids to reclaim a number of their territory. Then every node evaluates the logged entries following the rules listed

Related Documents

  • Great Essays

    Nt1310 Unit 1 Assignment 1

    • 1362 Words
    • 6 Pages

    The algorithm shows above will processing about number of 259−n attacks, the probity of successful for one unit is 2−n。It should be noted that even if a single packet has a net load of 2745 bits, you can get more than 2, 745 bits if you can get the plaintext of multiple packages. The next step in all of the required attacks is how to know the initial setup of the second layer of dense flow generator for any Packet (Packet). If you can get multiple packages and try them one by one, you can successfully find the initial setting of any package. N Basic Search time Ave requirements/bits Ave search time 5 214.7 159 283.7 10 223.9 1 146 282.9 15 222.9 33 x 210 281.9 20 221.7 1 x 220 280.7 25 220.3 32 x 1020 278.0 30 219.0 1 x 1030 278 FIGURE 12 RELATIONSHIP ABPUT…

    • 1362 Words
    • 6 Pages
    Great Essays
  • Great Essays

    Nt2580 Unit 6 Lab 1

    • 1713 Words
    • 7 Pages

    Answer: On observing the graph of sequence numbers between three scenarios(No_DROP,DROP_NoFast,DROP_Fast) we know that the DROP_NoFast scenario has the slowest growth in sequence number because of the below factors. a) Packet discard ratio is set to 0.5% in performance metrics which implies there is high rate of packets being dropped. b) Fast retransmit and fast recovery techniques in TCP are disabled which implies rate of sequence number of packets is…

    • 1713 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    In the paper, [1], the author introduced two kinds of topology attacks focus on the architecture of SDN and emphasized the weakness of the host tracking service and the link discovery service. And then, the paper provides the security extension, called Topoguard, for the Floodlight v0.9 controller. A. Two topology attacks The first attack as we mentioned, Host Location Hijacking Attack, is to send a fake request that the target host migrates to a new location trying to intercept packets and connections to the target host. This attack uses the weakness of the host tracking service that the controller simply follows the latest Packet-in message and does not check the identity of the request.…

    • 647 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    - LAN networking is used in Clustered system, in Multiprocessor system LAN etc. is not required. - The aim is high availability in clustered system whereas in multiprocessing it is time saving. - The processors share same system clock and common data structures. 7.…

    • 681 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    is a software-based protocol that provides a way to locate files, devices or even individual in a network. LDAP uses port 389 and is uses by Microsoft as the main protocol that opens up this type of access. LDAP is lightweight which indicates a smaller version with a smaller code and it is part of X.500. The latter acts as a standard for network directory services. /***************************…

    • 442 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 1 Lab 1

    • 439 Words
    • 2 Pages

    Speed, availability, and reliability are vital for a successful network infrastructure in terms of productivity and user experience. When first configuring this lab, I had to make the decision of whether or not to use one server to run all of the services or if the load should be distributed amongst multiple machines. I decided to go with the later, having a separate server hosting the wiki, another providing monitor services, and yet another acting as the DHCP, DNS and AD controller. While the last three were not required in the scope of this lab, I wanted to set up my initial network in a scalable manner, and this was the best solution for future growth. Distributing the services across multiple machines helps to reduce the processing that each box is required to do in order to fulfill requests.…

    • 439 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    A routing loop is a situation that occurs between two or more routers in which a packet is continuously routed between the routers as a result of irregularities from the routing algorithms and/or the routing tables of the routers. (routing loops, 2015). An example is when three routers are connected in a triangular pattern i.e. router A is connected to router B, router B is connected to router C and router C is connected to router A, when the network is converged, all three routers will have sent their routing tables to their neighbors. If router C goes down and router B tries to send a packet to C at the same time the router went down before it receives an updated table from router A, it will look into its routing table and it sees that router A can get to C, so it will update its route to C through A and will send the packet through router A. the same thing happens when router A receives the packet from router B, since it received no update on a change from B, it also checks its table and sees that B can get to C, so it updates its route to C through B and sends the packet to B and the packet keeps getting sent this way until the maximum hop count is reached…

    • 677 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    E. Also suppose a malicious node M can hear A, B, C and D. The attack can be described as follows:[18] “To start the attack, M changes its MAC address to match A’s, moves closer to and out of the range of A. It then sends an RREP to B that contains a hop count to X that is less than the one sent by C, e.g., zero. Therefore B changes its route to the destination, X, to go through A, as illustrated in Figure. 1.4.…

    • 210 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    We must be to create a custom network as appropriate with our thesis such as star topology or random topology or simple topology [35], by using the python script to make the network and must be to create topology like in chapter four to compare the result and throughput with other paper. 2.9.3 Design algorithm We need to get the best result and best throughput…

    • 464 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 6 Blockchain

    • 520 Words
    • 3 Pages

    Let’s assume for example that a node only has the genesis block. It will then receive an inv message from its peers containing the hashes of the next 500 blocks in the chain. It will start requesting blocks from all of its connected peers. It requests for spreading the load and en‐ suring that it doesn’t overwhelm any peer with requests. The node keeps track of how many blocks are ‘in transit’ per peer connection, meaning blocks that it has requested but not received, checking that it does not exceed a limit (MAX_BLOCKS_IN_TRANS‐…

    • 520 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Nt1330 Unit 7 Exercise 1

    • 756 Words
    • 4 Pages

    As shown in figure 8. – Red: Threshold of the parameters of the calculated result value. – Black: Calculated result value by using the Proactive Algorithm. – Green: Temperature of the individual nodes. – Blue: CPU Utilization of the individual nodes.…

    • 756 Words
    • 4 Pages
    Superior Essays
  • Decent Essays

    repository or central database and trusted third party Central authority(CA) are used to revoke, issue and store the keys. There is always a risk that these centralized infrastructure can be violated. Hence, Blochcain can be use to to reduce the risks of storing PKI on centralized infrastructure. Here the Data(Keys) will be distributed across the blochchain network[3] In the 2nd section we will go through the introduction of blockchain,…

    • 625 Words
    • 3 Pages
    Decent Essays
  • Great Essays

    Data Communication and Net-Centric Computing (COSC 2061) Assignment 2 Student Name: Weibin Zhong Number: s3503887 Introduction This report is identifying what are FDMA, TDMA and CDMA and how to maintain the communication seamlessly and the roaming service as well as the cost of roaming service. Furthermore, the 1G, 2G, 3G and 4G generations will be discussed.…

    • 1458 Words
    • 6 Pages
    Great Essays
  • Great Essays

    Abstract: With a specific end goal to outline and fabricate the secured network system, numerous elements must be thought seriously about, for example, the topology and position of hosts inside of the system, the determination of equipment and programming innovations, what's more, the cautious arrangement of every part. My paper will be an examination of the issues percentage in outlining a safe Local Area Network (LAN) and a best's portion practices proposed by security specialists. I will examine securing a LAN from network's perspective. [1] Introduction: With most complex innovations, there's not one size-fits-all arrangement regarding the matter of network administration. The needs and assets of every one of a kind association will relate…

    • 877 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Divide and Conquer Strategies: Divide and conquer is an algorithm which design paradigm based on multi-branched recursion. This designed paradigm consists of following phases: 1) Break the problem (divide): Breaking the problem into several sub-problems that are smaller in size. 2) Solve the sub problem(conquer) : Solve the sub-problem recursively .…

    • 718 Words
    • 3 Pages
    Improved Essays