In the string topology SWWSN shown in Figure 7.5 of the textbook, estimate the traffic load that needs to be carried by the LL when the LL is connected between the BS and the WSN node at location 0 . 6 N. Assume the routing protocol used by the SWWSN nodes is shortest path routing and each sensor node generates an approximate traffic of k bits per second.
What will be an ideal response?
When the LL is connected between the BS and the WSN node at 0
.
6
N, the LL carries traffic
from the following network segments: (i) traffic from nodes from 0
.
6
N to
N, proportional to
k
×
0
.
4
N where
k is the unit traffic generated by a given node and (ii) traffic from the nodes 0.3N to 0.6N, proportional to k×0.3N. Therefore, the total traffic load that needs to be
carried by the LL is approximately equal to 0.
7kN
You might also like to view...
Which of the following statements is false?
a. A floating-point number is a number with a decimal point. b. Java provides two primitive types for storing floating-point numbers in memory—float and double. c. Variables of type float represent single-precision floating-point numbers and have seven significant digits. d. Variables of type double represent double-precision floating-point numbers; these require twice as much memory as float variables and provide 14 significant digits.
When a subclass constructor calls its superclass constructor, what happens if the superclass’s constructor does not assign a value to an instance variable?
a. A syntax error occurs. b. A compile-time error occurs. c. A run-time error occurs. d. The program compiles and runs because the instance variables are initialized to their default values.
If the outer loop of a nested loop controls the ____ subscript in a two-dimensional array, the array is filled with data row by row.
A. column B. row C. outer D. nested
Intrusion detection systems can be classified as host-based or ___________
Fill in the blank(s) with the appropriate word(s).