📙
Introduction
Zentanode is not different than a node, a device, or a data point in the Zentamesh.
Zentanodes are Zentachain's own nodes for offline communication through Zentamesh. Using a mesh topology, Zentamesh relays data from node to node. A Zentanode can be viewed as a node, a device, or a data point in a network. Nodes are also active network components like cell phones, routers, switches, bridges, and gateways. A unique Hash-Id is assigned to each node. Any mobile phone, tablet, or computer using the Zentalk messenger application functions as a node within Zentamesh.

Zentagate runs the service that allows data and transactions to be routed in the network with a node and allows the user to stay connected without internet access. It ensures extra encryption by AES and an anti-hack layer, to provide the user is engaged and secured safely. The gateway connects to the ecosystem for the usage of the Zentamesh such as the Internet. All Zentanodes in the network can also act as their Gateway to expand the network. Since each node owner has its own ID, they can isolate their node with a pin code to connect to their nodes.
The root node is the top node in the network and serves as the only interface between the Zentamesh and an external IP network which is protected with the Tor Network. Once the root node has connected to the router, idle nodes in the range of the root node will begin connecting with the root node thereby, forming the second layer of the network.
The root node can also be designated by a user which will entail the designated root node to directly connect with the router and forgo the election process. When the root node is designated, all other nodes within the network must also forget the election process to prevent the occurrence of a root node conflict.

The signed transaction is sent automatically to the Zentalk Application. Zentalk will broadcast the transaction to nearby Zentanodes. They relay the transaction data from a Z-node to another Z-node until it reaches a mesh node running Zentalk with internet access, which can send the transaction to the Bitcoin or to the Zentanetwork. Users can use CHAIN, DOT, and KSM to send transactions over the network.
Beacons are packets that are regularly announced by nodes and unprovisioned devices. The mesh beacon payload is contained in a Bluetooth GAP AD type called mesh beacon AD type. More information about AD types in general can be found in the Bluetooth Core Specification Supplement.
Currently, two types of mesh beacons are defined: Unprovisioned Device Beacon and Secure Network Beacon. The Unprovisioned Device Beacon allows a provisioner to discover the device and initiate the provisioning process.
The Secure Network Beacon is used to indicate the security status of a node with respect to a particular subnet to which the node belongs, in terms of the IV Update and Key Refresh security procedures.
No of Hops from Root | Throughput (Mbps) | Bridge Delay (ms) |
---|---|---|
1 | 54 Mbps | 1 ms |
2 | 54 Mbps | 2 ms |
3 | 54 Mbps | 3 ms |
4 | 54 Mbps | 4 ms |

Last modified 1mo ago