Modelling IoT devices communication employing representative operation modes to reveal traffic generation characteristics
read more
Citations
Internet of Things: Applications, security and privacy: A survey
6G opportunities arising from Internet of Things use cases: a review paper
References
What Will 5G Be
Internet of Things for Smart Cities
Wide area traffic: the failure of Poisson modeling
Packet Trains--Measurements and a New Model for Computer Network Traffic
Related Papers (5)
Frequently Asked Questions (16)
Q2. What are the typical challenges for the next generation of wireless communications?
For the previous two generations of wireless communications, the typical challenges were energy efficiency [3], data throughput [4,20], coverage [5] and end-to-end latency.
Q3. What is the first technique in the M2MD?
The first technique is Centralised Scheduling, in which the M2MD must send a Scheduling Request (SR) to a centralised device such as, a Base Station (BS) to access the channel.
Q4. What are the main multiple-access techniques for a shared channel?
For a shared channel, there are two main multiple-access techniques (i) Centralised Scheduled Access in which a centralised device determines what part of the channel is allocated to each user, and (ii) Distributed Access in which each user locally decides the channel to access.
Q5. What is the summation of the TPs going out of any state?
The summation of the TPs going out of any state must equal to unity, as follows:Ps,s + Ps,r + Ps,b = 1Pb,b + Pb,i + Pb,s + Pb,r = 1Pr,r + Pr,s = 1Pi,i + Pi,s = 1.
Q6. How many packets are transmitted by the MCM?
For instance, in SNR1 the number of packets achieved by simulation is 3× 104 for the 5× 104 time unit, and using MCM is 3.041× 104, that is less than 1.4% error.
Q7. What is the biggest challenge for network operators?
Providing a ubiquitous service for this extraordinary number of connected devices and the consequent volume of data generated by those devices is the biggest challenges for network operators [14,18].
Q8. What is the reason for the increase in the number of connected devices?
The increase in the number of connected devices is occurring due to the variety of new applications coming on to the market, such as smart homes and wearable devices.
Q9. What is the second factor not accounted for in the existing M2M traffic models?
The second factor not accounted for in the existing M2M traffic models is the blocking incidence in which the user requires access to the shared channels, but the channels are fully occupied [21–23].
Q10. What other factors affect the extracted traffic?
The extracted traffic has several other factors affecting it, such as the channel information capacity and multi-access technique used.
Q11. What is the way to model the noise generated by the audience?
If it is intended to model the noise that will be produced generated by the audience, the authors can model it as a random process (an Analytical approach shown in section 2.1), or alternatively, use a sensor to record the noise level at several conferences and then generalise the measured noise level (an empirical approach that will be presented in section 2.2).
Q12. How can the MCM predict the number of transmitted packets?
In particular, in the case where γ((r, r)) and γ((i, i)) are equal to unity and three respectively (i.e., SNR 1), the MCM is able to predict the number of transmitted packets with significantly higher accuracy than the Poisson model (MMPP).
Q13. How can the number of transmitted packets be derived from the MCM?
the number of transmitted packets (NP ) can be derived from the MCM by using the probability of a device transmitting data (PT ) and the number of devices in the area of interest (n):NP = PT × n where PT = Pr + Pi. (12)For simulating the M2MDs a discrete event simulator [36] was used to evaluate the network behaviour.
Q14. What is the assumption that P(s,r) is deterministic?
It is worth mentioning that the assumption that P(s,r) is deterministic is only acceptable if the SR was sent in sufficient time for the centralised device to allocate a channel resource to the M2MD.
Q15. What is the time duration the data packets spend in the buffer?
The time duration the data packets spend in the buffer represents the time of sending the SR to the BS, and for a resource to be scheduled.
Q16. What is the arrival rate in the proposed model?
The arrival rate in the proposed model depends on the current state of the MMPP, e.g., λ1 represents the rate of arrival of the first state.