Premium Essay

Nt1310 Unit 2.1 Data Analysis

Submitted By
Words 977
Pages 4
2.1 Classification of WSNs:
Wireless sensor networks (WSNs) are employed to be beneficial in diverse applications in dissimilar environment. Sensing nodes differ in their technical requirement to be beneficial in these various applications. Some networks require specific sensors to be developed and deployed for some inaccessible applications; subsequently sensors can be present with different and common properties for different applications. For example one application can use randomness in distribution of nodes while other application can use static distribution.
Hence, the network can be classified based on the strategy of deployment and this categorize the wireless sensor network.

2.1.1 Single-hop and multi-hop networks:
The network can …show more content…
In aggregating networks the information is not transmitted directly to the base station but uses packet forwarding and intermediate sensors needs to reach base station, although in non-aggregating network all the information is transmitted directly to the base station. Mainly in large networks it is preferable to perform aggregation rather than non-aggregation.
In wireless sensor networks usually the density of nodes remains high, hence it is valuable to consider aggregating network. It is also very efficient in large area of network in spite of non-aggregating network for data transmission.
Aggregating networks transmits only the compact and non-redundant information to the base station. Thus, it improves performance of the network when the data count is high. In aggregating networks the network traffic is also reduced to much extent by balancing the amount of data and reducing the number of transmission to the base station.
The preference for aggregating network increases as the size of the network increases because the network traffic is proportional to the size and density of the network over non-aggregating network for improved

Similar Documents

Premium Essay

Nt1310 Unit 2.1 Data Analysis

...1. Future areas of Application 2.1 Health Monitoring A health center is able to monitor the blood sugar levels of a chronic diabetes patient and possibly take early action in case of a sudden change in the normal trends. Whenever the patient tests his blood sugar level in the convenience of his home, the meter uploads the information to a ‘cloud’ which then is fed into the database of the health center for regular monitoring. It is estimated that over 640 million IoT devices will be used for healthcare by 2020. However the downside is the potential hacking risk posing threat to the patients relying on these devices. 2.2 Inventory Management IoT comes in handy by helping to replenishing production critical spare parts automatically without the intervention of a store keeper or a foreman. A preset counter decrements itself whenever a new order for a spare part is received from the production line. The ‘smart’ storage is programmed to send an automatic message directly to the supplier when a minimum buffer level was reached. The supplier of the part can then proactively make arrangements to deliver the part in time. 2.3 Wearables...

Words: 459 - Pages: 2

Premium Essay

Test

...ITT Technical Institute IS3340 Windows Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory Hours, 30 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110...

Words: 2305 - Pages: 10