IoT system evaluation methods for very bursty traffic with contention based access

Yu Feng, Z. Rong, Y. Wei, Yu Feng
{"title":"IoT system evaluation methods for very bursty traffic with contention based access","authors":"Yu Feng, Z. Rong, Y. Wei, Yu Feng","doi":"10.1109/ICCCHINAW.2017.8355278","DOIUrl":null,"url":null,"abstract":"One very popular IoT system is characterized by the very bursty traffic in which the transmission occurrence can be as lower as just 200 milliseconds in multiple hours. The traditional Monte Carlo behavioral simulation is very time-consuming for a usual IoT system where the traffic burst is significantly smaller than the hibernation time and the number of terminals is big. Alternatives are analytical approaches using random probability and stochastic process theory, and there have been numerous papers on Slotted ALOHA (S-ALOHA) system. Unfortunately almost all the results obtained so far are based on full buffer traffic model so there is not an efficient approach to evaluate the system performance of an IoT system supporting massive number of terminals with very bursty traffic patterns. Two analytic methodologies are proposed and studied in this paper for very bursty traffic pattern in a contention based access system employing S-ALOHA access with Binary Exponential Back-off (BEB), and a set of closed-form formulae are derived. The first method is based on the probability modeling and the second method is a Markov chain based 2-D analytical model. The fundamental parameter in both methods is the expression for packet transmission probability, and the close-form expressions are derived for both methods. It was verified that the two expressions agree with each other very well. Based on the packet transmission probability, the close form expressions for other system performance indicators are also derived, which includes packet loss rate, transmission time, transmission delay, re-transmission times, collision possibility, and channel utilization efficiency. The proposed methods were verified to match real system performance very well, and they can be the efficient and accurate analytical tools for IoT system performance evaluation and optimization supporting very bursty traffic.","PeriodicalId":164833,"journal":{"name":"2017 IEEE/CIC International Conference on Communications in China (ICCC Workshops)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE/CIC International Conference on Communications in China (ICCC Workshops)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCHINAW.2017.8355278","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

One very popular IoT system is characterized by the very bursty traffic in which the transmission occurrence can be as lower as just 200 milliseconds in multiple hours. The traditional Monte Carlo behavioral simulation is very time-consuming for a usual IoT system where the traffic burst is significantly smaller than the hibernation time and the number of terminals is big. Alternatives are analytical approaches using random probability and stochastic process theory, and there have been numerous papers on Slotted ALOHA (S-ALOHA) system. Unfortunately almost all the results obtained so far are based on full buffer traffic model so there is not an efficient approach to evaluate the system performance of an IoT system supporting massive number of terminals with very bursty traffic patterns. Two analytic methodologies are proposed and studied in this paper for very bursty traffic pattern in a contention based access system employing S-ALOHA access with Binary Exponential Back-off (BEB), and a set of closed-form formulae are derived. The first method is based on the probability modeling and the second method is a Markov chain based 2-D analytical model. The fundamental parameter in both methods is the expression for packet transmission probability, and the close-form expressions are derived for both methods. It was verified that the two expressions agree with each other very well. Based on the packet transmission probability, the close form expressions for other system performance indicators are also derived, which includes packet loss rate, transmission time, transmission delay, re-transmission times, collision possibility, and channel utilization efficiency. The proposed methods were verified to match real system performance very well, and they can be the efficient and accurate analytical tools for IoT system performance evaluation and optimization supporting very bursty traffic.
基于争用访问的突发流量物联网系统评估方法
一个非常流行的物联网系统的特点是非常突发的流量,其中传输发生在多个小时内可以低至200毫秒。传统的蒙特卡罗行为模拟对于通常的物联网系统来说非常耗时,因为该系统的流量突发时间明显小于休眠时间,并且终端数量很大。另一种方法是使用随机概率和随机过程理论的分析方法,并且已经有许多关于Slotted ALOHA (S-ALOHA)系统的论文。不幸的是,到目前为止获得的几乎所有结果都是基于全缓冲流量模型的,因此没有一种有效的方法来评估支持大量具有非常突发流量模式的终端的物联网系统的系统性能。本文提出并研究了基于争用的S-ALOHA二元指数回退(BEB)接入系统中非常突发的流量模式的两种分析方法,并导出了一组封闭公式。第一种方法是基于概率建模,第二种方法是基于马尔可夫链的二维解析模型。两种方法的基本参数都是数据包传输概率表达式,并推导出两种方法的近似表达式。经验证,这两种表述非常吻合。在此基础上,导出了丢包率、传输时间、传输延迟、重传次数、碰撞可能性、信道利用效率等系统其他性能指标的近似表达式。实验结果表明,所提出的方法与实际系统性能非常匹配,可以作为支持突发流量的物联网系统性能评估和优化的高效、准确的分析工具。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信