This document summarizes a research paper on optimizing random MAC protocols for IoT communication. It begins by introducing the growth of IoT and issues with collisions that can occur without central coordination. It then discusses how IRSA and CRDSA protocols attempt to reduce collisions by using random repetition of packets. The document reviews the history of IoT and key technologies like TCP/IP that enabled its development. Finally, it outlines important characteristics of IoT like scalability, critical applications, and the need for low-cost communication protocols to support the large number of connected devices expected in the future.
An Introduction To Computer Networking A SurveyCheryl Brown
This document provides an introduction and overview of computer networking. It discusses the history of computer networking beginning in the 1960s and the components that make up a computer network including cables, network interface cards, switches, and software. It also describes different types of networks including local area networks (LANs), wide area networks (WANs), wireless local area networks (WLANs), metropolitan area networks (MANs), and campus area networks (CANs). The document concludes by discussing how computer networks have changed communication and will continue to evolve and enhance our lives through new protocols, applications, and technologies.
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMijwmn
In 2020 more than50 billions devices will be connected over the Internet. Every device will be connected to
anything, anyone, anytime and anywhere in the world of Internet of Thing or IoT. This network will
generate tremendous unstructured or semi structured data that should be shared between different
devices/machines for advanced and automated service delivery in the benefits of the user’s daily life. Thus,
mechanisms for data interoperability and automatic service discovery and delivery should be offered.
Although many approaches have been suggested in the state of art, none of these researches provide a fully
interoperable, light, flexible and modular Sensing/Actuating as service architecture. Therefore, this paper
introduces a new Semantic Multi Agent architecture named OntoSmart for IoT data and service
management through service oriented paradigm. It proposes sensors/actuators and scenarios independent
flexible context aware and distributed architecture for IoT systems, in particular smart home systems.
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMijwmn
In 2020 more than50 billions devices will be connected over the Internet. Every device will be connected to
anything, anyone, anytime and anywhere in the world of Internet of Thing or IoT. This network will
generate tremendous unstructured or semi structured data that should be shared between different
devices/machines for advanced and automated service delivery in the benefits of the user’s daily life. Thus,
mechanisms for data interoperability and automatic service discovery and delivery should be offered.
Although many approaches have been suggested in the state of art, none of these researches provide a fully
interoperable, light, flexible and modular Sensing/Actuating as service architecture. Therefore, this paper
introduces a new Semantic Multi Agent architecture named OntoSmart for IoT data and service
management through service oriented paradigm. It proposes sensors/actuators and scenarios independent
flexible context aware and distributed architecture for IoT systems, in particular smart home systems.
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMijwmn
In 2020 more than50 billions devices will be connected over the Internet. Every device will be connected to
anything, anyone, anytime and anywhere in the world of Internet of Thing or IoT. This network will
generate tremendous unstructured or semi structured data that should be shared between different
devices/machines for advanced and automated service delivery in the benefits of the user’s daily life. Thus,
mechanisms for data interoperability and automatic service discovery and delivery should be offered.
Although many approaches have been suggested in the state of art, none of these researches provide a fully
interoperable, light, flexible and modular Sensing/Actuating as service architecture. Therefore, this paper
introduces a new Semantic Multi Agent architecture named OntoSmart for IoT data and service
management through service oriented paradigm. It proposes sensors/actuators and scenarios independent
flexible context aware and distributed architecture for IoT systems, in particular smart home systems.
This document discusses hardware/software interoperability and single point vulnerability problems with internet of things (IoT) systems. It summarizes previous work that identified key barriers to wider IoT adoption, including a desire for components that are highly interoperable, dependable, reconfigurable, and certifiable. The document then examines IoT communication models like device-to-device, device-to-cloud, and device-to-gateway. While these models provide flexibility, interoperability challenges can arise from proprietary protocols and data formats. Future IoT systems will need to address these issues to gain broad societal acceptance.
The document discusses hardware/software interoperability and single point vulnerability problems with internet of things (IoT) systems. It provides background on IoT, describing how connected devices can communicate through different models including device-to-device, device-to-cloud, and device-to-gateway. The paper reviews literature on societal applications and adoption barriers for IoT. It finds that for widespread adoption, future IoT technologies will need highly interoperable and dependable hardware/software that is reconfigurable and certifiable to address known problems and vulnerabilities.
Hardware/Software Interoperability and Single Point Vulnerability Problems of...BRNSS Publication Hub
As reiterated by many authors, internet of things (IoT) is the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data, creating opportunities for more direct integration of the physical world into computer-based systems, resulting in efficiency improvements, economic benefits, and reduced human exertions. This is made possible by the communications models with the enabling technologies which make communications possible among IoT connected devices, although, with drawbacks. These drawbacks are the major reasons for adoption problems of IoT services by the society. This paper carried out an investigative study on previous works on the societal applications and adoption problems of IoT, IoT communications models, and pros and cons of IoT. Through the study, it was revealed that for IoT devices and services to be widely adopted with no or minimal problems, future IoT technology will not only address the known drawbacks but also will require hardware and software components that are highly interoperable, dependable, reconfigurable, and, in many applications, certifiable.
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVEScsandit
The common vision of smart systems today, is by and large associated with one single concept,
the internet of things (IoT), where the whole physical infrastructure is linked with intelligent
monitoring and communication technologies through the use of wireless sensors. In such an
intelligent vibrant system, sensors are connected to send useful information and control
instructions via distributed sensor networks. Wireless sensors have an easy deployment and
better flexibility of devices contrary to wired setup. With the rapid technological development of
sensors, wireless sensor networks (WSNs) will become the key technology for IoT and an
invaluable resource for realizing the vision of Internet of things (IoT) paradigm. It is also
important to consider whether the sensors of a WSN should be completely integrated into IoT or
not. New security challenges arise when heterogeneous sensors are integrated into the IoT. Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a
number of security primitives that can be taken to protect their data over the internet.
An Introduction To Computer Networking A SurveyCheryl Brown
This document provides an introduction and overview of computer networking. It discusses the history of computer networking beginning in the 1960s and the components that make up a computer network including cables, network interface cards, switches, and software. It also describes different types of networks including local area networks (LANs), wide area networks (WANs), wireless local area networks (WLANs), metropolitan area networks (MANs), and campus area networks (CANs). The document concludes by discussing how computer networks have changed communication and will continue to evolve and enhance our lives through new protocols, applications, and technologies.
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMijwmn
In 2020 more than50 billions devices will be connected over the Internet. Every device will be connected to
anything, anyone, anytime and anywhere in the world of Internet of Thing or IoT. This network will
generate tremendous unstructured or semi structured data that should be shared between different
devices/machines for advanced and automated service delivery in the benefits of the user’s daily life. Thus,
mechanisms for data interoperability and automatic service discovery and delivery should be offered.
Although many approaches have been suggested in the state of art, none of these researches provide a fully
interoperable, light, flexible and modular Sensing/Actuating as service architecture. Therefore, this paper
introduces a new Semantic Multi Agent architecture named OntoSmart for IoT data and service
management through service oriented paradigm. It proposes sensors/actuators and scenarios independent
flexible context aware and distributed architecture for IoT systems, in particular smart home systems.
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMijwmn
In 2020 more than50 billions devices will be connected over the Internet. Every device will be connected to
anything, anyone, anytime and anywhere in the world of Internet of Thing or IoT. This network will
generate tremendous unstructured or semi structured data that should be shared between different
devices/machines for advanced and automated service delivery in the benefits of the user’s daily life. Thus,
mechanisms for data interoperability and automatic service discovery and delivery should be offered.
Although many approaches have been suggested in the state of art, none of these researches provide a fully
interoperable, light, flexible and modular Sensing/Actuating as service architecture. Therefore, this paper
introduces a new Semantic Multi Agent architecture named OntoSmart for IoT data and service
management through service oriented paradigm. It proposes sensors/actuators and scenarios independent
flexible context aware and distributed architecture for IoT systems, in particular smart home systems.
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMijwmn
In 2020 more than50 billions devices will be connected over the Internet. Every device will be connected to
anything, anyone, anytime and anywhere in the world of Internet of Thing or IoT. This network will
generate tremendous unstructured or semi structured data that should be shared between different
devices/machines for advanced and automated service delivery in the benefits of the user’s daily life. Thus,
mechanisms for data interoperability and automatic service discovery and delivery should be offered.
Although many approaches have been suggested in the state of art, none of these researches provide a fully
interoperable, light, flexible and modular Sensing/Actuating as service architecture. Therefore, this paper
introduces a new Semantic Multi Agent architecture named OntoSmart for IoT data and service
management through service oriented paradigm. It proposes sensors/actuators and scenarios independent
flexible context aware and distributed architecture for IoT systems, in particular smart home systems.
This document discusses hardware/software interoperability and single point vulnerability problems with internet of things (IoT) systems. It summarizes previous work that identified key barriers to wider IoT adoption, including a desire for components that are highly interoperable, dependable, reconfigurable, and certifiable. The document then examines IoT communication models like device-to-device, device-to-cloud, and device-to-gateway. While these models provide flexibility, interoperability challenges can arise from proprietary protocols and data formats. Future IoT systems will need to address these issues to gain broad societal acceptance.
The document discusses hardware/software interoperability and single point vulnerability problems with internet of things (IoT) systems. It provides background on IoT, describing how connected devices can communicate through different models including device-to-device, device-to-cloud, and device-to-gateway. The paper reviews literature on societal applications and adoption barriers for IoT. It finds that for widespread adoption, future IoT technologies will need highly interoperable and dependable hardware/software that is reconfigurable and certifiable to address known problems and vulnerabilities.
Hardware/Software Interoperability and Single Point Vulnerability Problems of...BRNSS Publication Hub
As reiterated by many authors, internet of things (IoT) is the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data, creating opportunities for more direct integration of the physical world into computer-based systems, resulting in efficiency improvements, economic benefits, and reduced human exertions. This is made possible by the communications models with the enabling technologies which make communications possible among IoT connected devices, although, with drawbacks. These drawbacks are the major reasons for adoption problems of IoT services by the society. This paper carried out an investigative study on previous works on the societal applications and adoption problems of IoT, IoT communications models, and pros and cons of IoT. Through the study, it was revealed that for IoT devices and services to be widely adopted with no or minimal problems, future IoT technology will not only address the known drawbacks but also will require hardware and software components that are highly interoperable, dependable, reconfigurable, and, in many applications, certifiable.
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVEScsandit
The common vision of smart systems today, is by and large associated with one single concept,
the internet of things (IoT), where the whole physical infrastructure is linked with intelligent
monitoring and communication technologies through the use of wireless sensors. In such an
intelligent vibrant system, sensors are connected to send useful information and control
instructions via distributed sensor networks. Wireless sensors have an easy deployment and
better flexibility of devices contrary to wired setup. With the rapid technological development of
sensors, wireless sensor networks (WSNs) will become the key technology for IoT and an
invaluable resource for realizing the vision of Internet of things (IoT) paradigm. It is also
important to consider whether the sensors of a WSN should be completely integrated into IoT or
not. New security challenges arise when heterogeneous sensors are integrated into the IoT. Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a
number of security primitives that can be taken to protect their data over the internet.
Internet of things: review, architecture and applicationsCSITiaesprime
Devices linked to the internet of things (IoT) may communicate with one another in several settings. Furthermore, rather of relying on an existing centralized system, users may develop their own network by using wireless capabilities. This kind of network is known as a wireless mobile ad hoc network. The mobile ad-hoc network (MANET) enables IoT devices to connect with one another in an unstructured networked environment. IoT devices may connect, establish linkages, and share data on a continuous basis. In this system, the cloud's purpose is to store and analyze data acquired from IoT devices. One of the most significant challenges in cloud computing has been identified as information security, and its resolution will result in an even bigger increase in cloud computing usage and popularity in the future. Finally, the goal of this project is to create a framework for facilitating communication between IoT devices in a Cloud and MANET context. Our major contribution is a ground-breaking research initiative that combines cloud computing with the MANET and connects the internet of things. This research might be used to the IoT in the future.
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESIJCNCJournal
The common vision of smart systems today, is by and large associated with one single concept, the internet of things (IoT), where the whole physical infrastructure is linked with intelligent monitoring and communication technologies through the use of wireless sensors. In such an intelligent vibrant system, sensors are connected to send useful information and control instructions via distributed sensor networks. Wireless sensors have an easy deployment and better flexibility of devices contrary to wired setup. With the rapid technological development of sensors, wireless sensor networks (WSNs) will become the key technology for IoT and an invaluable resource for realizing the vision of Internet of things (IoT) paradigm.
It is also important to consider whether the sensors of a WSN should be completely integrated into IoT or not. New security challenges arise when heterogeneous sensors are integrated into the IoT. Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a number of security primitives that can be taken to protect their data over the internet.
CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...IJCNCJournal
Internet of Things (IoT) has become a popular technology in recent years. Different IoT applications such
as traffic control, environment monitoring, etc. contain many sensor devices, routers, actuators, edge
routers, and Base Stations (BS) which communicate with each other and send millions of data packets that
need to be delivered to their destination nodes successfully to ensure the High-performance communication
networks. IoT devices connect to the Internet using wired or wireless communication channels where most
of the devices are wearable, which means people slowly move from one point to another or fast-moving
using vehicles. How to ensure high performance of IoT data networks is an important research challenge
while considering the limitation of some IoT devices that may have limited power resources or limited
coverage areas. Many Kinds of research focus on how to customize routing protocols to be efficient for
IoT devices. The traditional routing mechanisms utilized specific IP addresses to identify users while in IoT
it is more beneficial to identify a group of users (things) based on any contexts, status, or values of their
resources such as the level of their batteries (e.g., low, medium or high). While IoT devices have different
characteristics, a multicasting mechanism to send one message to various groups of devices will not be
efficient in IoT communication networks since the aggregation of packets is very difficult. Thus, it is useful
to propose a mechanism that able to filter data packets that need to be sent to a specific group of devices.
In this paper, we propose efficient context-aware addressing mechanism, which is based on bloom filters
to increase the performance of IoT communication networks. A routing architecture is built based on
bloom filters which store routing information. In our works, we reduce the size of routing information
using a proposed aggregation mechanism which is based on connecting each group of IoT devices with an
edge router which is hierarchically connected to an upper router after operating its bloom filter. Our
simulation results show a significant improvement in the IoT performance metrics such as packets
transmission delay, jitter the throughput, packets dropping ratio, and the energy consumption in
comparison with well-known routing protocols of IoT such as Destination Sequenced Distance Vector
routing protocol (DSDV), and Ad hoc On-demand Distance Vector routing protocol (AODV).
Context Information Aggregation Mechanism Based on Bloom Filters (CIA-BF) for...IJCNCJournal
Internet of Things (IoT) has become a popular technology in recent years. Different IoT applications such as traffic control, environment monitoring, etc. contain many sensor devices, routers, actuators, edge routers, and Base Stations (BS) which communicate with each other and send millions of data packets that need to be delivered to their destination nodes successfully to ensure the High-performance communication networks. IoT devices connect to the Internet using wired or wireless communication channels where most of the devices are wearable, which means people slowly move from one point to another or fast-moving using vehicles. How to ensure high performance of IoT data networks is an important research challenge while considering the limitation of some IoT devices that may have limited power resources or limited coverage areas. Many Kinds of research focus on how to customize routing protocols to be efficient for IoT devices. The traditional routing mechanisms utilized specific IP addresses to identify users while in IoT it is more beneficial to identify a group of users (things) based on any contexts, status, or values of their resources such as the level of their batteries (e.g., low, medium or high). While IoT devices have different characteristics, a multicasting mechanism to send one message to various groups of devices will not be efficient in IoT communication networks since the aggregation of packets is very difficult. Thus, it is useful to propose a mechanism that able to filter data packets that need to be sent to a specific group of devices. In this paper, we propose efficient context-aware addressing mechanism, which is based on bloom filters to increase the performance of IoT communication networks. A routing architecture is built based on bloom filters which store routing information. In our works, we reduce the size of routing information using a proposed aggregation mechanism which is based on connecting each group of IoT devices with an edge router which is hierarchically connected to an upper router after operating its bloom filter. Our simulation results show a significant improvement in the IoT performance metrics such as packets transmission delay, jitter the throughput, packets dropping ratio, and the energy consumption in comparison with well-known routing protocols of IoT such as Destination Sequenced Distance Vector routing protocol (DSDV), and Ad hoc On-demand Distance Vector routing protocol (AODV).
CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...AlAtfat
This document proposes a Cloud-Internet Communication Security (CICS) framework to provide secure communication among smart devices connected to the internet. The framework has four layers - a presentation layer on smart devices, a communication security layer providing encryption/decryption, a ubiquitous network layer, and a cloud layer. The cloud layer collects encrypted data from devices, processes it, and stores it securely. This framework aims to address security challenges like attacks that could disrupt services or cause denial of service when smart devices communicate using cloud computing.
Lightweight IoT middleware for rapid application developmentTELKOMNIKA JOURNAL
Sensors connected to the cloud services equipped with data analytics has created a plethora of new type of applications ranging from personal to an industrial level forming to what is known today as Internet of Things (IoT). IoT-based system follows a pattern of data collection, data analytics, automation, and system improvement recommendations. However, most applications would have its own unique requirements in terms of the type of the smart devices, communication technologies as well as its application provisioning service. In order to enable an IoT-based system, various services are commercially available that provide services such as backend-as-a-service (BaaS) and software-as-a-service (SaaS) hosted in the cloud. This, in turn, raises the issues of security and privacy. However there is no plug-and-play IoT middleware framework that could be deployed out of the box for on-premise server. This paper aims at providing a lightweight IoT middleware that can be used to enable IoT applications owned by the individuals or organizations that effectively securing the data on-premise or in remote server. Specifically, the middleware with a standardized application programming interface (API) that could adapt to the application requirements through high level abstraction and interacts with the application service provider is proposed. Each API endpoint would be secured using Access Control List (ACL) and easily integratable with any other modules to ensure the scalability of the system as well as easing system deployment. In addition, this middleware could be deployed in a distributed manner and coordinate among themselves to fulfil the application requirements. A middleware is presented in this paper with GET and POST requests that are lightweight in size with a footprint of less than 1 KB and a round trip time of less than 1 second to facilitate rapid application development by individuals or organizations for securing IoT resources.
This document discusses Human Area Networks (HAN), a type of personal area network that uses the human body as a transmission medium to pass data. It proposes using capacitive coupling to generate an alternating current field on the body's surface to propagate signals between two bodies in contact, without radiation into the surroundings. This allows for a highly secure form of data transfer. The document provides background on computer networking and discusses various standard types of networks like WLAN, LAN, WAN, and MAN. It also reviews some common short-range wireless technologies that could enable HAN, such as Bluetooth, ZigBee, and Wi-Fi, and their respective standards.
MULTI-ACCESS EDGE COMPUTING ARCHITECTURE AND SMART AGRICULTURE APPLICATION IN...ijmnct
The Ubiquitous Power Internet of Things (UPIoT) is a deep integration of the interconnected power
network and communication network, enabling full perception of the system status and business operations
for power production, transmission, and consumption. To address the challenges of real-time perception,
rapid response, and privacy protection, UPIoT can benefit from the use of edge computing technology.
Edge computing is a new and innovative computing architecture that enables quick and efficient
processing of data close to the source, bypassing network latency and bandwidth issues. By shifting
computing power to the edge of the network, edge computing reduces the strain on cloud computing
centers and decreases input response time for users. However, access latency can still be a bottleneck,
which may overshadow the benefits of edge computing, particularly for data-intensive services. While edge
computing offers promising solutions for the IoT network, there are still some issues to address, such as
security, incomplete data, and investment and maintenance costs. In this paper, researcher conducts a
comprehensive survey of edge computing and how edge device placement can improve performance in IoT
networks. The paper includes a comparative use case of smart agriculture edge computing
implementations and discusses the various challenges faced in implementing edge computing in the UPIoT
context. The results also aim to inspire new edge-based IoT security designs by providing a complete
review of IoT security solutions at the edge layer in UPIoT
The Role of Cloud-MANET Framework in the Internet of Things (IoT)AlAtfat
In the next generation of computing, Mobile ad-hoc network
(MANET) will play a very important role in the Internet of Things (IoT). The
MANET is a kind of wireless networks that are self-organizing and auto
connected in a decentralized system. Every device in MANET can be moved
freely from one location to another in any direction. They can create a network
with their neighbors’ smart devices and forward data to another device. The IoTCloud-MANET framework of smart devices is composed of IoT, cloud
computing, and MANET. This framework can access and deliver cloud services
to the MANET users through their smart devices in the IoT framework where all
computations, data handling, and resource management are performed. The smart
devices can move from one location to another within the range of the MANET
network. Various MANETs can connect to the same cloud, they can use cloud
service in a real time. For connecting the smart device of MANET to cloud needs
integration with mobile apps. My main contribution in this research links a new
methodology for providing secure communication on the internet of smart
devices using MANET Concept in 5G. The research methodology uses the
correct and efficient simulation of the desired study and can be implemented in a
framework of the Internet of Things in 5G.
F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-...Istabraq M. Al-Joboury
Internet of Things (IoT) evolves very rapidly over time, since everything such as sensors/actuators linked together from around the world with use of evolution of ubiquitous computing through the Internet. These devices have a unique IP address in order to communicate with each other and transmit data with features of wireless technologies. Fog computing or so called edge computing brings all Cloud features to embedded devices at edge network and adds more features to servers like pre-store data of Cloud, fast response, and generate overhasty users reporting. Fog mediates between Cloud and IoT devices and thus enables new types of computing and services. The future applications take the advantage of combing the two concepts Fog and Cloud in order to provide low delay Fog-based and high capacity of storage Cloud-based. This paper proposes an IoT architecture for healthcare network based on Fog to Cloud and Data in Motion (F2CDM). The proposed architecture is designed and implemented over three sites: Site 1 contains the embedded devices layer, Site 2 consists of the Fog network layer, while Site 3 consists of the Cloud network. The Fog layer is represented by a middleware server in Al-Nahrain University with temporary storage such that the data lives inside for 30 min. During this time, the selection of up-normality in behavior is send to the Cloud while the rest of the data is wiped out. On the other hand, the Cloud stores all the incoming data from Fog permanently. The F2CDM works using Message Queue Telemetry Transport (MQTT) for fast response. The results show that all data can be monitored from the Fog in real time while the critical data can be monitored from Cloud. In addition, the response time is evaluated using traffic generator called Tsung. It has been found that the proposed architecture reduces traffic on Cloud network and provides better data analysis.
This document discusses the Internet of Things (IoT) and related technologies. It provides background on IoT, noting challenges around affordability, network integration, and interoperability. It then discusses how present communication technologies span the globe via wireless and wired networks. The IoT is expected to significantly change communication requirements and infrastructure over the next decade as the number of connected devices grows. Mobile networks and wireless networks will also expand by adding many small IoT devices. Cloud computing is identified as an important building block for the future internet and IoT, as it helps reduce costs and enables new services. The author expresses interest in working with cloud computing technologies like Java/J2EE.
This document proposes an e-toll payment system using Azure cloud that automates toll gate payments. The system uses RFID tags attached to vehicles with their registration number embedded. When a vehicle reaches the toll gate, the RFID reader obtains the registration number and sends it to the Azure cloud to check if payment was made using a mobile app. If payment was completed, the cloud responds to open the toll gate. This allows drivers to pay electronically without waiting in queues and avoids using cash. The system aims to reduce congestion and fuel consumption at toll plazas through automated payment verification and toll gate control.
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...IRJET Journal
This document proposes an e-toll payment system using Azure cloud that automates toll payments. A mobile app allows users to pay tolls digitally via wallet, credit/debit cards, or banking. Successful payments are recorded on Azure cloud along with the vehicle's RFID tag ID. At toll gates, RFID readers scan tags and check the cloud to see if payment was made. If so, the gate opens, streamlining the toll process and reducing congestion. The system aims to provide a more convenient cashless toll payment alternative compared to existing smart card or queue-based systems.
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESIJNSA Journal
The Internet of Things (IoT) brings connectivity to about every objects found in the physical space. It extends connectivity to everyday objects. From connected fridges, cars and cities, the IoT creates opportunities in numerous domains. However, this increase in connectivity creates many prominent challenges. This paper provides a survey of some of the major issues challenging the widespread adoption of the IoT. Particularly, it focuses on the interoperability, management, security and privacy issues in the IoT. It is concluded that there is a need to develop a multifaceted technology approach to IoT security,
management, and privacy.
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESIJNSA Journal
The Internet of Things (IoT) brings connectivity to about every objects found in the physical space. It
extends connectivity to everyday objects. From connected fridges, cars and cities, the IoT creates
opportunities in numerous domains. However, this increase in connectivity creates many prominent
challenges. This paper provides a survey of some of the major issues challenging the widespread adoption
of the IoT. Particularly, it focuses on the interoperability, management, security and privacy issues in the
IoT. It is concluded that there is a need to develop a multifaceted technology approach to IoT security,
management, and privacy.
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESIJNSA Journal
The Internet of Things (IoT) brings connectivity to about every objects found in the physical space. It extends connectivity to everyday objects. From connected fridges, cars and cities, the IoT creates opportunities in numerous domains. However, this increase in connectivity creates many prominent challenges. This paper provides a survey of some of the major issues challenging the widespread adoption of the IoT. Particularly, it focuses on the interoperability, management, security and privacy issues in the IoT. It is concluded that there is a need to develop a multifaceted technology approach to IoT security, management, and privacy.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
A MIDDLEWARE FOR THE INTERNET OF THINGSIJCNCJournal
The Internet of Things (IoT) connects everyday objects including a vast array of sensors, actuators, and smart devices, referred to as “things” to the Internet, in an intelligent and pervasive fashion. This connectivity gives rise to the possibility of using the tracking capabilities of things to impinge on the location privacy of users. Most of the existing management and location privacy protection solutions do not consider the low-cost and low-power requirements of things; or, they do not account for the heterogeneity, scalability, or autonomy of communications supported in the IoT. Moreover, these traditional solutions do not consider the case where a user wishes to control the granularity of the disclosed information based on
the context of their use (e.g. based on the time or the current location of the user). To fill this gap, a middleware, referred to as the Internet of Things Management Platform (IoT-MP) is proposed in this paper.
Internet of Things (IoT) integrates billions of the heterogeneous IoT things with the Internet in which the embedded systems such as sensors and actuators linked together to improve quality of life, and becomes the future of technologies in any field of human daily life. These IoT devices cooperate with each other and generate useful information to provide better services and applications to the governments and the society. Also, there is a need to store these data on Cloud for monitoring. This paper, surveys IoT applications, new challenges and issues arise in different fields and provides IoT architecture, focuses on explanation of IoT protocols and their operations and functionalities, presents different microcontroller types used by researchers. With the huge amount of data generated from IoT devices, the integrating Cloud and IoT may helpful, Therefore, a survey on open issues faced when these two concepts integrating together is discussed. The objective of this paper is to provide a survey for everything related to IoT and direct it to all beginners in this filed or academic researchers.
This document discusses emerging technologies related to the Internet of Things (IoT). It defines IoT as physical objects communicating via the internet, with estimates of 30-50 billion connected objects by 2020. Key areas of focus for IoT include facilities management, industrial applications, energy, healthcare, transportation, and more. The document also discusses technology trends driving IoT like automation, robotics, AI, 3D printing, and analytics. It notes issues around ethics, security, privacy and jobs related to IoT.
MASSIVE MACHINE TYPE COMMUNICATION TOWARDS 6G.pdfYAAKOVSOLOMON1
This white paper explores key research directions for machine type communication (MTC) towards 6G networks by 2030. It discusses the main societal drivers of MTC, such as autonomous mobility and smart manufacturing. Representative MTC use cases are presented across various industries. Emerging MTC services are expected to have highly diverse requirements in terms of performance metrics like reliability, latency, energy efficiency, and scalability. The white paper investigates potential enabling technologies for building a holistic MTC network architecture in 6G that can efficiently support both massive and critical MTC services.
Internet of things: review, architecture and applicationsCSITiaesprime
Devices linked to the internet of things (IoT) may communicate with one another in several settings. Furthermore, rather of relying on an existing centralized system, users may develop their own network by using wireless capabilities. This kind of network is known as a wireless mobile ad hoc network. The mobile ad-hoc network (MANET) enables IoT devices to connect with one another in an unstructured networked environment. IoT devices may connect, establish linkages, and share data on a continuous basis. In this system, the cloud's purpose is to store and analyze data acquired from IoT devices. One of the most significant challenges in cloud computing has been identified as information security, and its resolution will result in an even bigger increase in cloud computing usage and popularity in the future. Finally, the goal of this project is to create a framework for facilitating communication between IoT devices in a Cloud and MANET context. Our major contribution is a ground-breaking research initiative that combines cloud computing with the MANET and connects the internet of things. This research might be used to the IoT in the future.
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESIJCNCJournal
The common vision of smart systems today, is by and large associated with one single concept, the internet of things (IoT), where the whole physical infrastructure is linked with intelligent monitoring and communication technologies through the use of wireless sensors. In such an intelligent vibrant system, sensors are connected to send useful information and control instructions via distributed sensor networks. Wireless sensors have an easy deployment and better flexibility of devices contrary to wired setup. With the rapid technological development of sensors, wireless sensor networks (WSNs) will become the key technology for IoT and an invaluable resource for realizing the vision of Internet of things (IoT) paradigm.
It is also important to consider whether the sensors of a WSN should be completely integrated into IoT or not. New security challenges arise when heterogeneous sensors are integrated into the IoT. Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a number of security primitives that can be taken to protect their data over the internet.
CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...IJCNCJournal
Internet of Things (IoT) has become a popular technology in recent years. Different IoT applications such
as traffic control, environment monitoring, etc. contain many sensor devices, routers, actuators, edge
routers, and Base Stations (BS) which communicate with each other and send millions of data packets that
need to be delivered to their destination nodes successfully to ensure the High-performance communication
networks. IoT devices connect to the Internet using wired or wireless communication channels where most
of the devices are wearable, which means people slowly move from one point to another or fast-moving
using vehicles. How to ensure high performance of IoT data networks is an important research challenge
while considering the limitation of some IoT devices that may have limited power resources or limited
coverage areas. Many Kinds of research focus on how to customize routing protocols to be efficient for
IoT devices. The traditional routing mechanisms utilized specific IP addresses to identify users while in IoT
it is more beneficial to identify a group of users (things) based on any contexts, status, or values of their
resources such as the level of their batteries (e.g., low, medium or high). While IoT devices have different
characteristics, a multicasting mechanism to send one message to various groups of devices will not be
efficient in IoT communication networks since the aggregation of packets is very difficult. Thus, it is useful
to propose a mechanism that able to filter data packets that need to be sent to a specific group of devices.
In this paper, we propose efficient context-aware addressing mechanism, which is based on bloom filters
to increase the performance of IoT communication networks. A routing architecture is built based on
bloom filters which store routing information. In our works, we reduce the size of routing information
using a proposed aggregation mechanism which is based on connecting each group of IoT devices with an
edge router which is hierarchically connected to an upper router after operating its bloom filter. Our
simulation results show a significant improvement in the IoT performance metrics such as packets
transmission delay, jitter the throughput, packets dropping ratio, and the energy consumption in
comparison with well-known routing protocols of IoT such as Destination Sequenced Distance Vector
routing protocol (DSDV), and Ad hoc On-demand Distance Vector routing protocol (AODV).
Context Information Aggregation Mechanism Based on Bloom Filters (CIA-BF) for...IJCNCJournal
Internet of Things (IoT) has become a popular technology in recent years. Different IoT applications such as traffic control, environment monitoring, etc. contain many sensor devices, routers, actuators, edge routers, and Base Stations (BS) which communicate with each other and send millions of data packets that need to be delivered to their destination nodes successfully to ensure the High-performance communication networks. IoT devices connect to the Internet using wired or wireless communication channels where most of the devices are wearable, which means people slowly move from one point to another or fast-moving using vehicles. How to ensure high performance of IoT data networks is an important research challenge while considering the limitation of some IoT devices that may have limited power resources or limited coverage areas. Many Kinds of research focus on how to customize routing protocols to be efficient for IoT devices. The traditional routing mechanisms utilized specific IP addresses to identify users while in IoT it is more beneficial to identify a group of users (things) based on any contexts, status, or values of their resources such as the level of their batteries (e.g., low, medium or high). While IoT devices have different characteristics, a multicasting mechanism to send one message to various groups of devices will not be efficient in IoT communication networks since the aggregation of packets is very difficult. Thus, it is useful to propose a mechanism that able to filter data packets that need to be sent to a specific group of devices. In this paper, we propose efficient context-aware addressing mechanism, which is based on bloom filters to increase the performance of IoT communication networks. A routing architecture is built based on bloom filters which store routing information. In our works, we reduce the size of routing information using a proposed aggregation mechanism which is based on connecting each group of IoT devices with an edge router which is hierarchically connected to an upper router after operating its bloom filter. Our simulation results show a significant improvement in the IoT performance metrics such as packets transmission delay, jitter the throughput, packets dropping ratio, and the energy consumption in comparison with well-known routing protocols of IoT such as Destination Sequenced Distance Vector routing protocol (DSDV), and Ad hoc On-demand Distance Vector routing protocol (AODV).
CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...AlAtfat
This document proposes a Cloud-Internet Communication Security (CICS) framework to provide secure communication among smart devices connected to the internet. The framework has four layers - a presentation layer on smart devices, a communication security layer providing encryption/decryption, a ubiquitous network layer, and a cloud layer. The cloud layer collects encrypted data from devices, processes it, and stores it securely. This framework aims to address security challenges like attacks that could disrupt services or cause denial of service when smart devices communicate using cloud computing.
Lightweight IoT middleware for rapid application developmentTELKOMNIKA JOURNAL
Sensors connected to the cloud services equipped with data analytics has created a plethora of new type of applications ranging from personal to an industrial level forming to what is known today as Internet of Things (IoT). IoT-based system follows a pattern of data collection, data analytics, automation, and system improvement recommendations. However, most applications would have its own unique requirements in terms of the type of the smart devices, communication technologies as well as its application provisioning service. In order to enable an IoT-based system, various services are commercially available that provide services such as backend-as-a-service (BaaS) and software-as-a-service (SaaS) hosted in the cloud. This, in turn, raises the issues of security and privacy. However there is no plug-and-play IoT middleware framework that could be deployed out of the box for on-premise server. This paper aims at providing a lightweight IoT middleware that can be used to enable IoT applications owned by the individuals or organizations that effectively securing the data on-premise or in remote server. Specifically, the middleware with a standardized application programming interface (API) that could adapt to the application requirements through high level abstraction and interacts with the application service provider is proposed. Each API endpoint would be secured using Access Control List (ACL) and easily integratable with any other modules to ensure the scalability of the system as well as easing system deployment. In addition, this middleware could be deployed in a distributed manner and coordinate among themselves to fulfil the application requirements. A middleware is presented in this paper with GET and POST requests that are lightweight in size with a footprint of less than 1 KB and a round trip time of less than 1 second to facilitate rapid application development by individuals or organizations for securing IoT resources.
This document discusses Human Area Networks (HAN), a type of personal area network that uses the human body as a transmission medium to pass data. It proposes using capacitive coupling to generate an alternating current field on the body's surface to propagate signals between two bodies in contact, without radiation into the surroundings. This allows for a highly secure form of data transfer. The document provides background on computer networking and discusses various standard types of networks like WLAN, LAN, WAN, and MAN. It also reviews some common short-range wireless technologies that could enable HAN, such as Bluetooth, ZigBee, and Wi-Fi, and their respective standards.
MULTI-ACCESS EDGE COMPUTING ARCHITECTURE AND SMART AGRICULTURE APPLICATION IN...ijmnct
The Ubiquitous Power Internet of Things (UPIoT) is a deep integration of the interconnected power
network and communication network, enabling full perception of the system status and business operations
for power production, transmission, and consumption. To address the challenges of real-time perception,
rapid response, and privacy protection, UPIoT can benefit from the use of edge computing technology.
Edge computing is a new and innovative computing architecture that enables quick and efficient
processing of data close to the source, bypassing network latency and bandwidth issues. By shifting
computing power to the edge of the network, edge computing reduces the strain on cloud computing
centers and decreases input response time for users. However, access latency can still be a bottleneck,
which may overshadow the benefits of edge computing, particularly for data-intensive services. While edge
computing offers promising solutions for the IoT network, there are still some issues to address, such as
security, incomplete data, and investment and maintenance costs. In this paper, researcher conducts a
comprehensive survey of edge computing and how edge device placement can improve performance in IoT
networks. The paper includes a comparative use case of smart agriculture edge computing
implementations and discusses the various challenges faced in implementing edge computing in the UPIoT
context. The results also aim to inspire new edge-based IoT security designs by providing a complete
review of IoT security solutions at the edge layer in UPIoT
The Role of Cloud-MANET Framework in the Internet of Things (IoT)AlAtfat
In the next generation of computing, Mobile ad-hoc network
(MANET) will play a very important role in the Internet of Things (IoT). The
MANET is a kind of wireless networks that are self-organizing and auto
connected in a decentralized system. Every device in MANET can be moved
freely from one location to another in any direction. They can create a network
with their neighbors’ smart devices and forward data to another device. The IoTCloud-MANET framework of smart devices is composed of IoT, cloud
computing, and MANET. This framework can access and deliver cloud services
to the MANET users through their smart devices in the IoT framework where all
computations, data handling, and resource management are performed. The smart
devices can move from one location to another within the range of the MANET
network. Various MANETs can connect to the same cloud, they can use cloud
service in a real time. For connecting the smart device of MANET to cloud needs
integration with mobile apps. My main contribution in this research links a new
methodology for providing secure communication on the internet of smart
devices using MANET Concept in 5G. The research methodology uses the
correct and efficient simulation of the desired study and can be implemented in a
framework of the Internet of Things in 5G.
F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-...Istabraq M. Al-Joboury
Internet of Things (IoT) evolves very rapidly over time, since everything such as sensors/actuators linked together from around the world with use of evolution of ubiquitous computing through the Internet. These devices have a unique IP address in order to communicate with each other and transmit data with features of wireless technologies. Fog computing or so called edge computing brings all Cloud features to embedded devices at edge network and adds more features to servers like pre-store data of Cloud, fast response, and generate overhasty users reporting. Fog mediates between Cloud and IoT devices and thus enables new types of computing and services. The future applications take the advantage of combing the two concepts Fog and Cloud in order to provide low delay Fog-based and high capacity of storage Cloud-based. This paper proposes an IoT architecture for healthcare network based on Fog to Cloud and Data in Motion (F2CDM). The proposed architecture is designed and implemented over three sites: Site 1 contains the embedded devices layer, Site 2 consists of the Fog network layer, while Site 3 consists of the Cloud network. The Fog layer is represented by a middleware server in Al-Nahrain University with temporary storage such that the data lives inside for 30 min. During this time, the selection of up-normality in behavior is send to the Cloud while the rest of the data is wiped out. On the other hand, the Cloud stores all the incoming data from Fog permanently. The F2CDM works using Message Queue Telemetry Transport (MQTT) for fast response. The results show that all data can be monitored from the Fog in real time while the critical data can be monitored from Cloud. In addition, the response time is evaluated using traffic generator called Tsung. It has been found that the proposed architecture reduces traffic on Cloud network and provides better data analysis.
This document discusses the Internet of Things (IoT) and related technologies. It provides background on IoT, noting challenges around affordability, network integration, and interoperability. It then discusses how present communication technologies span the globe via wireless and wired networks. The IoT is expected to significantly change communication requirements and infrastructure over the next decade as the number of connected devices grows. Mobile networks and wireless networks will also expand by adding many small IoT devices. Cloud computing is identified as an important building block for the future internet and IoT, as it helps reduce costs and enables new services. The author expresses interest in working with cloud computing technologies like Java/J2EE.
This document proposes an e-toll payment system using Azure cloud that automates toll gate payments. The system uses RFID tags attached to vehicles with their registration number embedded. When a vehicle reaches the toll gate, the RFID reader obtains the registration number and sends it to the Azure cloud to check if payment was made using a mobile app. If payment was completed, the cloud responds to open the toll gate. This allows drivers to pay electronically without waiting in queues and avoids using cash. The system aims to reduce congestion and fuel consumption at toll plazas through automated payment verification and toll gate control.
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...IRJET Journal
This document proposes an e-toll payment system using Azure cloud that automates toll payments. A mobile app allows users to pay tolls digitally via wallet, credit/debit cards, or banking. Successful payments are recorded on Azure cloud along with the vehicle's RFID tag ID. At toll gates, RFID readers scan tags and check the cloud to see if payment was made. If so, the gate opens, streamlining the toll process and reducing congestion. The system aims to provide a more convenient cashless toll payment alternative compared to existing smart card or queue-based systems.
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESIJNSA Journal
The Internet of Things (IoT) brings connectivity to about every objects found in the physical space. It extends connectivity to everyday objects. From connected fridges, cars and cities, the IoT creates opportunities in numerous domains. However, this increase in connectivity creates many prominent challenges. This paper provides a survey of some of the major issues challenging the widespread adoption of the IoT. Particularly, it focuses on the interoperability, management, security and privacy issues in the IoT. It is concluded that there is a need to develop a multifaceted technology approach to IoT security,
management, and privacy.
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESIJNSA Journal
The Internet of Things (IoT) brings connectivity to about every objects found in the physical space. It
extends connectivity to everyday objects. From connected fridges, cars and cities, the IoT creates
opportunities in numerous domains. However, this increase in connectivity creates many prominent
challenges. This paper provides a survey of some of the major issues challenging the widespread adoption
of the IoT. Particularly, it focuses on the interoperability, management, security and privacy issues in the
IoT. It is concluded that there is a need to develop a multifaceted technology approach to IoT security,
management, and privacy.
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESIJNSA Journal
The Internet of Things (IoT) brings connectivity to about every objects found in the physical space. It extends connectivity to everyday objects. From connected fridges, cars and cities, the IoT creates opportunities in numerous domains. However, this increase in connectivity creates many prominent challenges. This paper provides a survey of some of the major issues challenging the widespread adoption of the IoT. Particularly, it focuses on the interoperability, management, security and privacy issues in the IoT. It is concluded that there is a need to develop a multifaceted technology approach to IoT security, management, and privacy.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
A MIDDLEWARE FOR THE INTERNET OF THINGSIJCNCJournal
The Internet of Things (IoT) connects everyday objects including a vast array of sensors, actuators, and smart devices, referred to as “things” to the Internet, in an intelligent and pervasive fashion. This connectivity gives rise to the possibility of using the tracking capabilities of things to impinge on the location privacy of users. Most of the existing management and location privacy protection solutions do not consider the low-cost and low-power requirements of things; or, they do not account for the heterogeneity, scalability, or autonomy of communications supported in the IoT. Moreover, these traditional solutions do not consider the case where a user wishes to control the granularity of the disclosed information based on
the context of their use (e.g. based on the time or the current location of the user). To fill this gap, a middleware, referred to as the Internet of Things Management Platform (IoT-MP) is proposed in this paper.
Internet of Things (IoT) integrates billions of the heterogeneous IoT things with the Internet in which the embedded systems such as sensors and actuators linked together to improve quality of life, and becomes the future of technologies in any field of human daily life. These IoT devices cooperate with each other and generate useful information to provide better services and applications to the governments and the society. Also, there is a need to store these data on Cloud for monitoring. This paper, surveys IoT applications, new challenges and issues arise in different fields and provides IoT architecture, focuses on explanation of IoT protocols and their operations and functionalities, presents different microcontroller types used by researchers. With the huge amount of data generated from IoT devices, the integrating Cloud and IoT may helpful, Therefore, a survey on open issues faced when these two concepts integrating together is discussed. The objective of this paper is to provide a survey for everything related to IoT and direct it to all beginners in this filed or academic researchers.
This document discusses emerging technologies related to the Internet of Things (IoT). It defines IoT as physical objects communicating via the internet, with estimates of 30-50 billion connected objects by 2020. Key areas of focus for IoT include facilities management, industrial applications, energy, healthcare, transportation, and more. The document also discusses technology trends driving IoT like automation, robotics, AI, 3D printing, and analytics. It notes issues around ethics, security, privacy and jobs related to IoT.
Similar to RANDOM MAC OPTIMIZATION FOR IOT COMMUNICATION.pdf (20)
MASSIVE MACHINE TYPE COMMUNICATION TOWARDS 6G.pdfYAAKOVSOLOMON1
This white paper explores key research directions for machine type communication (MTC) towards 6G networks by 2030. It discusses the main societal drivers of MTC, such as autonomous mobility and smart manufacturing. Representative MTC use cases are presented across various industries. Emerging MTC services are expected to have highly diverse requirements in terms of performance metrics like reliability, latency, energy efficiency, and scalability. The white paper investigates potential enabling technologies for building a holistic MTC network architecture in 6G that can efficiently support both massive and critical MTC services.
This document provides an overview and table of contents for the book "IoT and Low-Power Wireless: Circuits, Architectures, and Techniques". The book is edited by Christopher Siu and Krzysztof Iniewski and contains 12 chapters covering various topics related to Internet of Things (IoT) and low-power wireless technologies. The table of contents lists the chapter titles and authors for each chapter in the book. The document also provides information about the book series that this book is part of.
Multi-slot Coded ALOHA with Irregular Degree.pdfYAAKOVSOLOMON1
This document proposes an improvement to the Multi-slot Coded ALOHA (MuSCA) random multiple access scheme for satellite communications. The improvement involves applying variable code rates and irregular user degree distributions, where the code rate and degree for each user are selected according to a probability distribution. This allows the system to achieve higher throughput compared to the original MuSCA scheme and other related schemes like Contention Resolution Diversity Slotted ALOHA (CRDSA). The document describes how the system would work, including encoding data into codewords that are split into multiple bursts and transmitted on random slots, and decoding the received signal using successive interference cancellation. It analyzes the potential throughput gain from optimizing the irregular degree distribution.
Machine-Type-Communication in 5G Cellular System-Li_Yue_PhD_2018.pdfYAAKOVSOLOMON1
This document is a dissertation submitted by Yue Li for the degree of Doctor of Philosophy at the University of Victoria. The dissertation focuses on improving transmission efficiency for machine-type communication (MTC) devices in 5G cellular systems. Specifically, it proposes applying network coding and device-to-device communications to MTC devices to improve efficiency. It also proposes using floating relays deployed via unmanned aerial vehicles to proactively improve channel quality for MTC devices experiencing high shadowing. The dissertation provides theoretical analyses and performance evaluations of the proposed approaches.
Massive_MTC_An_Overview and Perspectives Towards 5G.pdfYAAKOVSOLOMON1
The document provides an overview of 5G mobile networks and their ability to support massive machine-type communications (mMTC). Some key points:
- 5G networks are expected to be operational by 2020 and will enable up to 50 billion connected devices through technologies like M2M, D2D, and V2V communications.
- 5G aims to consolidate all existing machine-type communications onto a single platform based on the Internet of Things (IoT) concept to create an Internet of Everything enabling smart cities and a fully networked society.
- 5G is expected to significantly increase data speeds, reduce latency, improve energy efficiency, and support a vast number of low-power devices and new applications.
Graph-based Random-Access Protocols for Massive Multiple Access Networks.pdfYAAKOVSOLOMON1
The document is a dissertation submitted by Shun Ogata for the degree of Doctor of Philosophy. It proposes novel random access schemes for massive multiple access networks using frameless ALOHA. Specifically, it proposes ZigZag decodable frameless ALOHA, which introduces ZigZag decoding to resolve collisions in frameless ALOHA. It also proposes frameless ALOHA with multiple base station cooperation, where base stations share retrieved packets over a backhaul network. Finally, it combines ZigZag decoding and multiple base station cooperation in a single scheme. Analysis and simulations show the proposed schemes achieve higher throughput than conventional schemes.
Massive MTC An Overview and Perspectives Towards 5G (2).pdfYAAKOVSOLOMON1
This document provides an overview of massive machine-type communications (MMC) and perspectives towards 5G networks. It discusses how 5G will enable the integration of all known machine-to-machine communication technologies through a single infrastructure, creating an environment for smart cities and a fully networked society under the new Internet of Everything concept. By 2020, it is predicted that 5G networks will support up to 50 billion connected devices and provide higher data speeds, lower latency, and improved quality of service compared to 4G networks. This will allow for new applications in areas like automation, transportation, healthcare, and more.
This document is the thesis submitted by Oscar del Río Herrero for the degree of Doctor of Philosophy at Universitat Ramon Llull in Barcelona, Spain in 2015. The thesis proposes three novel random access schemes for satellite communications: Contention Resolution Diversity Slotted Aloha (CRDSA), Asynchronous Contention Resolution Diversity Aloha (ACRDA), and Enhanced Spread Spectrum Aloha (E-SSA). CRDSA uses strong error correction codes and successive interference cancellation to achieve high throughput for slotted systems. ACRDA extends this technique to unslotted systems using spreading sequences. E-SSA applies similar concepts to spread spectrum systems. The performance of the schemes is
Extended LTE Coverage for Indoor Machine Type Communication.pdfYAAKOVSOLOMON1
This document discusses extending LTE coverage for indoor machine type communication. It proposes using repetition to increase coverage without requiring hardware upgrades. Simulations show that with a 20 dB coverage increase through repetition, coverage can be almost complete for inter-site distances up to 2500 m, where standard LTE has gaps. Higher resource usage is required but the number of supported users is limited more by coverage at longer distances than resources. Uplink performance is also evaluated through link and system level simulations.
Key Enabling Technologies of 5G Wireless Mobile Communication.pdfYAAKOVSOLOMON1
The document discusses key enabling technologies of 5G wireless mobile communication. It provides an overview of 5G technology, including its features such as high speed, low latency and high capacity. It describes 5G's equipment providers and the countries that have conducted early experiments with 5G including India, South Korea and San Marino. The document outlines 5G's architecture and discusses several key enabling technologies that are used in 5G networks, such as device-to-device communication, machine-to-machine communication, and millimeter wave technology.
This document proposes a new random access method called coherent contention resolution diversity slotted ALOHA (C-CRDSA) to improve the throughput of existing contention resolution diversity slotted ALOHA (CRDSA) for satellite Internet of Things systems. C-CRDSA accumulates replicated packets coherently at the receiver to increase the signal-to-noise ratio and enable better interference cancellation. It uses a sliding window approach to coherently accumulate potential virtual subframes across the access frame. Simulation results show C-CRDSA improves throughput, especially under heavy loads, by leveraging the diversity and coherence of transmitted packets.
The document discusses coded slotted ALOHA (CSA) and other coded random access schemes for massive machine-type communications. It begins with background on the increasing problem of multiple access for large populations of users. It then reviews classical random access schemes like slotted ALOHA and more modern coded schemes like CRDSA, IRSA, and CSA. CSA uses error correcting codes, where users transmit encoded segments of data over randomly selected slots, allowing throughput higher than traditional schemes to be achieved without feedback. The performance of CSA and related protocols is analyzed using a bipartite graph representation and density evolution techniques from coding theory.
Finite-Length Performance Analysis of Slotted ALOHA-Thesis.pdfYAAKOVSOLOMON1
Finite-Length Performance Analysis of Slotted ALOHA with Interference Cancellation analyzes the performance of Irregular Repetition Slotted ALOHA (IRSA) for finite frame lengths. It develops a matrix-based analysis to derive a semi-analytical expression for packet loss rate. Through computer simulations, it shows the proposed analysis allows exact computation of packet loss rate for small user numbers and frame lengths, unlike previous asymptotic analyses for infinite users and frames.
6G Internet of Things - A Comprehensive Survey.pdfYAAKOVSOLOMON1
The document provides a comprehensive survey of the convergence of 6G technologies and Internet of Things (IoT). It discusses how 6G is expected to empower future IoT networks through technologies like edge intelligence, reconfigurable intelligent surfaces, terahertz communications, and blockchain. It then explores the opportunities brought by 6G for various emerging IoT applications in domains like healthcare, vehicular networking, satellites, and industry. The survey identifies key research challenges in areas such as security, energy efficiency, and standardization and points to potential directions for future 6G-IoT research.
Frameless ALOHA is a random access protocol inspired by rateless codes that uses successive interference cancellation (SIC) to resolve packet collisions. It operates without a predefined frame length, adding slots until a stopping criterion is met like resolving a certain fraction of users. The analysis shows the protocol can achieve high throughput asymptotically by optimizing the slot access probability. The capture effect from stronger signals can further boost performance by enabling intra-slot SIC. Noise impacts the achievable throughput, requiring higher optimized slot degrees to counter its effects.
This document presents a thesis that analyzes random access protocols for satellite networks considering multipacket reception over block fading channels. It begins with a review of random access protocols like slotted ALOHA. It then discusses collision and block fading channel models and threshold-based decoding in the absence and presence of coding. It develops probability matrices for multipacket reception when the number of packets is 2 or 3. It also analyzes irregular repetition slotted ALOHA (IRSA) through graphical representations and generating distributions. It evaluates the theoretical bounds and provides simulations comparing different distributions. Finally, it presents various numerical results analyzing the performance of slotted ALOHA, coded slotted ALOHA and IRSA under different channel conditions.
Low power architecture of logic gates using adiabatic techniquesnooriasukmaningtyas
The growing significance of portable systems to limit power consumption in ultra-large-scale-integration chips of very high density, has recently led to rapid and inventive progresses in low-power design. The most effective technique is adiabatic logic circuit design in energy-efficient hardware. This paper presents two adiabatic approaches for the design of low power circuits, modified positive feedback adiabatic logic (modified PFAL) and the other is direct current diode based positive feedback adiabatic logic (DC-DB PFAL). Logic gates are the preliminary components in any digital circuit design. By improving the performance of basic gates, one can improvise the whole system performance. In this paper proposed circuit design of the low power architecture of OR/NOR, AND/NAND, and XOR/XNOR gates are presented using the said approaches and their results are analyzed for powerdissipation, delay, power-delay-product and rise time and compared with the other adiabatic techniques along with the conventional complementary metal oxide semiconductor (CMOS) designs reported in the literature. It has been found that the designs with DC-DB PFAL technique outperform with the percentage improvement of 65% for NOR gate and 7% for NAND gate and 34% for XNOR gate over the modified PFAL techniques at 10 MHz respectively.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
1. Sci.Int.(Lahore),31(6),827-835 , 2019 ISSN 1013-5316; CODEN: SINTE 8 827
November-December
RANDOM MAC OPTIMIZATION FOR IOT COMMUNICATION
1
Reem Abdullah Alkhateeb, 2
Shroog Ageel Alshammari, 3
Kusum Yadav
1
Computer Science and Engineering Department, University of Ha‘il , Hail, Kingdom of Saudi Arabia
r.alkhateeb@uoh.edu.sa, 2
shr.alshammari@uoh.edu.sa, 3
kusumasyadav0@gmail.com,
ABSTRACT— These days, the use of networks has become part of our daily lives, especially with the spread of the Internet of Things
which consists of low-capacity devices that cooperate to perform specific tasks. This can be used to facilitate our life during this current
era which is full of technology. Furthermore, network design must be developed to eliminate the need for a central coordinator. The
absence of a central coordinator greatly simplifies the design of the network, especially in the case of a vast number of connected
devices; however, this may cause collisions between data packets sent from different devices at the same time. Nevertheless, collisions
can be resolved through multiple mechanisms for instant ALOHA derivatives. However, these type of mechanisms does not solve the
problem 100%, but it makes the performance better...
I. INTRODUCTION
The In the world of networking, the internet is not
considered new; however, it can be said that there is a new
technological revolution in the science of networks called
the ‗Internet of Things‘ (IoT), which allows the internet to
reach the world of everyday, material things. It has become
a fixture in certain industries, as the technology can be used
for business applications in place of humans, and also plays
a significant role in health – these are the most prominent
areas that the internet of things deals with. Besides, IoT
allows devices and servers to talk to each other in new,
more interconnected ways [4, 5]. It is possible to say that the
IoT is a system of interconnected computing devices,
machines, objects, and people who are provided with unique
identifiers and the ability to transmit data across a network
without the requirement for human-to-human or human-to-
computer communication [1, 2]. There are around 9 billion
interconnected devices, and this number is expected to reach
24 billion by 2020, which suggests new opportunities for
marketing, greater competencies, and enhanced experiences
[2].
The most important aspect of network science is the 7-layer
OSI model, consisting of the physical layer, the data link
layer, the network layer, the transport layer, the session
layer, and the application layer. In this study, there will be a
focus on the data link layer that has the IEEE 802 protocol
family, particularly the media access control layer (MAC),
which is responsible for sending packet data to and from the
network interface card, and to and from another shared
remote channel [6]. An open protocol stack represents the
key to implement the vast world of services and applications
that the market provides day by day, thanks to the ever-
going technological innovation: for instance, in smart grid,
environmental and energetic monitoring, smart
transportations, and healthcare scenarios, which are only
just few examples of the market fields that already largely
benefit of the IoT paradigm and its innovative features.
Both industrial and scientific communities have shown a
great interest in the complex scenario of IoT/M2M services,
because of the large number of issues as well as of
opportunities it carries along. Both communities look
forward to a larger use of the advantages that the satellites
may offer: in fact, the fraction of the M2M traffic delivered
via satellite is continuously increasing in size [1, 2]. It is
known that in the age of the internet there is an enormous
number of devices connected simultaneously to the network,
which helps to facilitate our daily lives. The reason for
concern about MAC is the lack of central coordination,
which makes network design much simpler and performs
better. Therefore, the development of access control
protocols is required to overcome challenges in existing
network infrastructure and protocol stacks used – for
instance, ALOHA protocols, which are the easiest and most
well-known [6, 7]. Besides, Irregular Repetition Slotted
ALOHA (IRSA), a derivative of the ALOHA protocol, is
currently considered the best solution to reduce collision. It
raises the level of throughput, which works on the principle
of random repetition to the packets that have been
transmitted [4, 8]. It is also one of the Random Access
protocols which have traditionally represented a general
solution for the collision. As the IRSA has a space for each
user, it is equipped with temporary storage space of limitless
size to store packets that have not yet been sent or received
correctly and without a collision. This is considered a
development of the Contention Resolution Diversity Slotted
ALOHA protocol (CRDSA).
II. HISTORY OF THE INTERNET OF
THINGS(IOT)
The history of the internet stretches back to the middle of
the last century. By the 1960s, the first packet switching
networks were developed, including the development of the
ARPANET network. ARPANET was a technology
launched by the US Department of Defense in the 1960s to
connect universities and research institutions, to exploit the
capabilities of computers available at the time. The first
network used TCP (both of these technologies have become
a focal point in the creation of the internet) [1, 2, 9]. With
the development of the internet came its availability for
civilian purposes, and in the 1990s, a new internet era would
emerge, namely the World Wide Web. Following this,
mobile internet became globally widespread during the
2000s, and the most recent development – the Internet of
Things (IoT) – was introduced between 2007 and 2009. This
development has subsequently become an active science
field in the world of networks and computing, as it consists
of many interconnected smart devices that facilitate our
lives. It is possible to say that IoT integrates things through
specific systems to facilitate communication between
devices, humans, and other devices including machines,
sensors, and various artificial intelligence tools[1, 2, 10].
This type of communication can result in the creation of a
vast amount of data that is stored, processed, and displayed
to deal with it by setting the radio frequency. The
importance of this field lies in the fact that it is involved in
the running of many areas such as health, education and
industrial sectors and helps to improve them, as shown in
Figure 1.
2. 828 ISSN 1013-5316; CODEN: SINTE 8 Sci.Int.(Lahore),31(6),827-835 , 2019
November-December
Figure.1.The IoT application [7]
NIC expects that ―by 2025, Internet nodes may reside in
everyday things – food packages, furniture, paper
documents, and more‖. It highlights upcoming opportunities
that will arise, starting from the idea that ―big demand
connected with technology advances could drive general
diffusion of an Internet of Things (IoT) that could, like the
present Internet, provide an invaluable thing to economic
development.‖ Because of that, this field has attracted the
attention of many researchers in networking[11]. Besides, it
considered that this technology has become an integral part
of our daily lives since there is a connection via the internet
between many machines and devices. The system of
communication is manufactured by platforms designed
using cloud computing, as these platforms receive device
applications through the internet, thus the decision is taken
to collect the data from this connection. The devices around
us can also be controlled using intelligent devices that have
greatly enhanced the world of technology, and all this can
happen through IoT. Some of the features of IoT include
[12, 13]:
Multitude: The vast number of devices that can be
connected, even if there is no interaction with humans.
Scalability: The possibility and ease of modifying the
protocols used to communicate easily and quickly
without wasting time and effort while preserving their
characteristics.
Variation: This is based on the way of working from the
connection of various devices, which we can use in
several areas and are scalable in growth; also, the
introduction of new devices that can be utilized in new
and different fields.
Disappearance: Lack of need for direct human
intervention is what enables hidden systems to make
decisions based on data.
Criticality: The criticality of use is possible in cases
where devices are used for critical situations, such as in
the health industry in saving a human life. This can be
considered a challenge faced by this type of technology.
Level of power: Trying to reduce the amount of energy
needed to power devices with limited access to power.
Cohabitation: Relative to the wide range of designs
consisting of several devices that rely on this technology;
focus must be on the side of coexistence and integration
in these designs.
Cost: To achieve widespread usage, the prices of these
connected devices must be accessible to users to attract
customers which can be obtained by connecting small,
low-cost devices to carry out large tasks.
Because of the phenomenal growth expected of the Internet
of Things over the next few years, it is worth considering
the factors which will help to make communication
between devices low cost and be able to perform
substantial tasks smoothly. These factors include the use
of protocols that assist in achieving the goal of
communication between these devices, and the
identification of methods utilized by controlling the
communication between potential devices. Further, there
is a need to contribute to the design of low-cost, low-
complexity technologies [12,13].
III. IOT PROTOCOLS
In the field of IoT, devices communicate with each other
using internet protocols that determine the method of
sending and receiving data between these devices.
Therefore, many protocols have been proposed to
implement a connection between the different devices and
provide solutions within specific mechanisms, such as
CoAP, REST, XMPP, AMQP, MQTT, DDS, and others
[14]. The lack of a protocol that can handle machine-to-
machine, machine-to-server, and server-to-server
communication has led to fragmentation among many
protocols. In contrast, fragmentation is a major impediment
to the development of new services that require the
integration of multiple internet services to provide
horizontal integration of services. The importance of
protocols is to control or limit communication problems,
such as the following [14]:
Spectrum scarcity: There is a huge number of connected
devices already in use, and considering this number is
supposed to reach up to 50 billion devices by 2020, this
creates a great challenge for communication networks
regarding the congestion spectrum. Therefore, it is
possible to use the current spectrum more efficiently to
avoid potential spectrum shortages and to support large-
scale data transfer.
Interference: the presence of many connected devices
causes overlapping between the networks, which
adversely affects the process of data transfer. Thus, ways
to limit these problems must be developed and
implemented to achieve the best connection without
losing any data.
Coverage issues: The issue of network coverage is a
major concern in the world of networks. Because
wireless coverage is not always guaranteed, especially in
the industrial and scientific domain, this issue can be
effectively overcome through the dynamic access of the
spectrum to spread better ranges. This will be discussed
in more detail later in the thesis.
Device heterogeneity: The diversity of networks
regarding applications requires the use of a variety of
protocols as well as the diversity of data sent and
received. This requires intelligent handling of these data,
so the devices must be smart enough to communicate
with others. Additionally, there are a variety of new
applications such as home multimedia distribution
systems, smart roads for future intelligent transport
systems, and broadband services in public areas.
Network delay and losses: Data transfer delay is a thorny
issue when designing a network, which determines how
long it takes to transfer data over the network from one
node or endpoint to another. Network delays are regularly
3. Sci.Int.(Lahore),31(6),827-835 , 2019 ISSN 1013-5316; CODEN: SINTE 8 829
November-December
short; for example, the end-to-end delay of a network
across countries is about 30 milliseconds. However, loss
of network packets necessitates network designers to
check for injuries, and to resend if necessary. The
different round-trip time is added for a resend and
response request[14]. Therefore, it must identify the IoT
protocol stack which has taken a great deal of time in
delaying to develop a protocol stack that meets the
communication requirements, while keeping the
protocols as simple as possible. Moreover, there is a need
to build a single structure that replaces the proprietary
approach through a transparent end-to-end structure. This
structure must meet the essential requirements of a
protocol stack which is capable of handling large
amounts of information, queries, and accounts, and
utilizing new data processing models, stream processing,
data collection, and extraction, all of which are
sustainable by telecommunication standards,
including[6]:
Low energy: The majority of devices require a low power
connection because the vast majority of these devices
operate by the battery, and cannot pull power from the
source of energy. Thus, the COME protocol must show a
low power consumption rate.
A highly reliable protocols stack: To maintain privacy
and to integrate things seamlessly into the internet, they
need to provide the same reliability used on the internet –
with the additional requirement that reliability works out
as efficiently as possible[6].
When there is a monition for the protocol stack, it should
monition the layer of this stack. The IoT protocol stack can
be divided into four layers: application layer, transport layer,
network layer, and data link layer, as shown in Figure 2.
Figure 2. The IoT Protocol Stack
Application Layer Protocols
The application layer is considered the top layer, and this
layer provides software services to ensure communication
between other application programs on the network. There
is a focus on two protocols, namely the CoAP protocol
(Constrained Application Protocol), introduced by the IETF
Constrained RESTful Conditions (CoRE) working society.
Second is the MQTT protocol (Message Queuing Telemetry
Transport), which was developed by IBM in 1999 [6].
CoAP Protocol
This protocol is useful for low-energy or battery-powered
devices as it is a good choice for this kind of equipment. It
has an exchange of requests and responses in an un-
synchronous way. All headers, methods, and status codes
are binary encoders; it effectively handles the need for ultra-
lightweight protocol and constant connectivity capability.
Furthermore, it uses UDP coupe [6][15].
MQTT Protocol
This is a highly efficient protocol for low bandwidth devices
and high latency networks. It takes the publish/subscribe
messaging method, which is extremely lightweight and ideal
for connecting small devices to restricted networks. In
addition to its effective bandwidth, agnostic data, and its
continuous session awareness, it is also considered very
simple, offering few control options [16].
Transport Layer Protocols
The transport layer is considered as an end-to-end
connection, controlling two endpoints by using the
Windows concept to determine how much information
should be sent between endpoints. The technique of IoT
focuses on the use of UDP. This is because it is lighter and
much faster compared to TCP. Additionally, it is also
considered as a communication protocol and does not come
with the flexibility features of the encoder which makes it
unique, making it suitable for the restricted environment of
devices and sensors [6].
Network Layer or Internet Layer
This layer can be considered as it aims to achieve efficiency
with low-energy budgets such as IPv6 and low power
wireless (6LoWPAN) networks. Also, there are real
decisions about how the hardware may declare what
functions are being implemented and the assumptions that
are proposed about their role in the network. The overlay
that IPv6 provides over the network 6LoWPAN is a set of
protocols that can be used to integrate limited hardware
resources into systems [6].
Data Link Layer
IEEE 802.15.4 (MAC) Layer
IEEE 802.15.4 is a set of standards that detail the variety of
wireless personal area networks and focuses on
communications between devices in a restricted
environment in the case of low power, low memory, and
low bandwidth [6, 17]. The MAC layer has also attracted
the attention of researchers, which can be divided into three
sections:
Contention-based Protocols
This could also be called Random Access (RA) protocols.
The simplest protocols send packets at the ready for data
transmission and reduce collision. Data exchange can only
begin if the channel is not busy sending another; otherwise,
the transmission will have a delay. But in the event of a
collision, data cannot be recovered in the future due to
destructive interference between transmitters. The
probability of data loss in such protocols is very high, which
significantly affects the throughput. The most well known of
these protocols are pure ALOHA and slotted ALOHA,
which can achieve a maximum throughput of 18% for
ALOHA and 36% for slotted ALOHA [18].
Contention-free Protocols
Contention-free protocols can also be called Dedicated
Access (DA) protocols. These can be considered as the
protocols that allocate resources to terminals to eliminate
collisions. Part of the time or part of the frequency
bandwidth is assigned to a node, whether temporary or
permanent and does not allow other nodes in the network to
use them [19]
.
4. 830 ISSN 1013-5316; CODEN: SINTE 8 Sci.Int.(Lahore),31(6),827-835 , 2019
November-December
Hybrid Protocols
This protocol is used to maximize the benefit of DA and RA
as it tries to combine simplicity with productivity. This
category of protocols also achieves the highest utilization
and production of IoT of resolved users to have a sudden
jump from a low value to a much higher value after a single
time slot. The avalanche point gives the possible maximum
throughput.
IV. RELATED WORK
There will be presenting a study on the protocols that limit
interference and collision problems in the Internet of
Things, which are discussed to avoid collisions. Because of
this, the satellite protocols are mainly based on the ALOHA
protocol and its developments. The major issues that affect
the design, deployment, and performance of the IoT are as
follows [1, 2, 20]:
Medium Access Scheme
Energy Management
Transport Layer Protocol
Cost
Security
Real-time Traffic Support with QoS provisioning
In this thesis, there will be a focus on the Medium Access
Scheme, which has many characteristics for instant Energy
Efficiency, Scalability, Adaptability, Low Latency and
Predictability, and Reliability. It can be considered as being
primarily responsible for regulating access to the shared
medium.
Medium Access Scheme
The Media Access Control scheme is one of two sublayers
that designed the Data Link Layer of the OSI model. The
MAC layer is responsible for transferring data packets to
and from one Network Interface Card (NIC) to another
across a shared channel. The MAC sublayer uses MAC
protocols to guarantee that packets sent from different
stations across the same channel do not collide. Moreover,
many devices can recognize each other in the same physical
link in the data link layer through the MAC addresses that
are assigned to all ports on the switch. The MAC address is
routed through the MAC algorithm as a secret key input,
and an arbitrary longitudinal message is documented. A
MAC address can be identified with a 12-digit hexadecimal
number (48 bits in length). Additionally, the LAN nodes use
the same communication channel for transmission. The
MAC subclass consists of two primary responsibilities: data
encapsulation, including frame assembly before
transmission and frame parsing/error detection, during and
after the reaction; and media access control, including the
start of frame transmission and recovery from transmission
failure. Moreover, as mentioned earlier, it is divided into
three types, and the focus will be on Random Access
Schemes and its protocols. Before identifying the types of
Mac protocols, Successive Interference Cancellation (SIC)
should be discussed [3, 17, 19].
Successive Interference Cancellation (SIC)
Recently there has been considerable interest in the
application of SIC which was initially applied to the Slotted
ALOHA frame. SIC also can significantly improve and
increase throughput by solving several collisions that affect
throughput performance. The function of the recipient is to
resolve the individual values received in the frame, and the
indicators contained in those Singletons assist this. In this
way, the corresponding interventions are eliminated in other
slots, and other Singletons may be detected. This process is
repeated until no more Singletons are detected or all user
messages are resolved in this frame. Furthermore, it has
demonstrated huge potential capacity and performance
improvements, and there are other performance metrics
rather than throughput, for example, delay, which is critical
in some networks. SIC improves the throughput
performance of networks; however, it may worsen its delay
performance [4, 21].
Random Access Schemes
Random Access schemes can be used to transfer data
immediately, which may interfere with some of the data
being transmitted. New mechanisms to eliminate overlap
were also considered to resolve differences in data loads to
reduce the loss of transmitted data. For example, these
mechanisms are cracked ALOHA protocols (SA). It can be
seen that most of the previous work on ALOHA systems is
based on the assumption that when one packet is sent in a
given period, it is always received correctly, and in the case
of two or more transmissions, all packets are damaged. This
is in addition to the concept of repeating the data packet
twice (or more) within the same frame, to increase the
probability of transmission successfully. This process may
allow you to decrypt a different splash code sent in the same
slot. Moreover, there are methods to solve the problem of
data collision, which will be identified in more detail later,
and the performance of these different methods is studied as
determined as Random Access based on ALOHA. This
chapter only views synchronous RA protocols, ignoring the
ALOHA protocol, which is an asynchronous one. Examples
of synchronous RA protocols include Slotted ALOHA,
Diversity Slotted ALOHA, Contention Resolution Diversity
Slotted ALOHA (CRDSA), and Irregular Repetition Slotted
ALOHA (IRSA) [8, 22, 23].
ALOHA
It can be said that the first copies of the Random Access
protocols is pure ALOHA protocol, which is very
straightforward and asynchronous, and was introduced in
1970 at the University of Hawaii. The data is sent as soon as
it is ready, and the user waits for an acknowledgment
(ACK) message from the receiver. Pure ALOHA does not
verify whether the channel is busy before transmission. This
way, it is possible that a collision between the packets of
data that have been sent could occur. However, a node can
monitor the broadcasts on the medium, even it's own, and
determine whether the transmitted frames were received or
not. Therefore, there is a need to recognize the attempt to
resend at the transmission stations later on. When collisions
occur, this will retransmit the data packet; otherwise, if the
packet has been successfully delivered, the receiver
responds with an acknowledgment. The efficiency of
transmission of this protocol does not reach 100% of the
5. Sci.Int.(Lahore),31(6),827-835 , 2019 ISSN 1013-5316; CODEN: SINTE 8 831
November-December
communication channel's capacity. An effort is successful if
the inter-attempt intervals on both sides exceed 1 (for unit
duration packets) to calculate the successful of the attempt P
(success) = e-g (n) e-g (n) = e-2g (n). Furthermore, the
throughput of the success rate can be calculated using this
equation: throughput= g (n) e-2g (n) and to find the max:
throughput at g(n) = 1/2, throughput = 1/2e ~ 0.18, which is
equivalent to 18% of the communication channel‘s capacity
[8, 24].
Slotted ALOHA
Slotted ALOHA is the first of the synchronous protocols of
the Random Access protocols, introduced in 1972. In slotted
ALOHA, time is subdivided into slots, and there will be a
transit-only at the start of a slot. Moreover, the partial
collision is avoided by the synchronization expedient. This
organization divides the probability of a collision and
increases throughput. So, the maximum throughput is
double the amount obtained for pure ALOHA; this is
because, in slotted ALOHA, possible collisions are half of
the number of collisions that happen in pure ALOHA. The
throughput can be calculated as if packet x is successfully
delivered:
Prob{x is successfully delivered}
= Prob{No other packets within the vulnerable period T}
= e^-Np
Throughput = Np . e^-Np;
Which achieves the highest point 1/e = 36% when R = Np =
1 as shown in Fig. 3 [8].
Figure 3 Pure ALOHA Performance Compared with Slotted
ALOHA Performance[27]
Diversity Slotted ALOHA
Diversity slotted ALOHA can be considered a derivative
and support for SA, which was introduced in 1981. DESA
either is used to send two or more identical copies to the
channel, on different frequency channels or spaced at
random intervals. The probability of receiving the original
burst may increase because it is possible to decode one of
the replicas correctly to retrieve the original information by
reducing the number of retransmissions necessary to deliver
the burst at the end. If the sender does not receive the
acknowledgment from at least one of any of those replicas,
it will wait again for the random time and will be restarted
by the sending methods. Using two replicas is as productive
as possible. Additionally, this method can increase the
throughput performance. At present, this type of protocol is
commonly used in satellite networks for initial station
access or for sending short packets via a common medium
[23].
Contention Resolution Diversity Slotted ALOHA
CRDSA was introduced in 2007. It can be classified as an
innovative DSA enhancement and an implementation of the
sequential overlap elimination algorithm to achieve greater
productivity of SA and DSA. As in DSA, each replica has
indications of the position of the other copies in the frame.
When a replica is decrypted correctly in the destination,
other methods can be subtracted; that is, the interference
cancellation can be applied. Thus, depending on time slots
and frequency slots, there will be a specified frame size
value and number of users per frame. If any user sends data,
there will be two replicas to be sent with a random number
of the frequency interval and the random number of the time
slot that will indicate each replica. The other version that
will successfully move will cancel the other, and equal the
value of the frame with intervals that multiply with the
intervals and user per frame. The frame size will be divided
by two because each user sends two identical ones.
Therefore, interference occurs if two packets are sent at the
same frequency and one-time slot, so in this case, there will
be no interference because each replica will be sent at a
deferred frequency. Burst collisions are cleared up through a
simple yet effective iterative Interference Cancellation (IC)
approach that uses frame composition information from the
replica bursts. The collided packets can be resolved by using
successive interference cancellation (SIC) which is very
useful. The main CRDSA advantages lie in the improved
packet loss ratio and reduced packet delivery delay
performance versus channel load, jointly with a much higher
operational throughput compared to SA and DSA. CRDSA
offers a significant performance gain concerning SA and
DSA, which can reach up to 50% [23]. Thanks to the use of
SIC, CRDSA offers a large performance gain concerning
SA and DSA.
Irregular Repetition Slotted ALOHA (IRSA)
The importance of wireless networks emerging from
ALOHA has increased with the widespread use of the
internet and progress in communications systems, as well as
the increase in the number of wireless devices as mentioned
previously. This growth has attracted more attention to
ALOHA because it is a low-complexity protocol. However,
pure ALOHA is not enough and cannot handle the huge
number of users effectively. Therefore, many improvements
have been proposed over the years. Irregular Repetition
Slotted ALOHA (IRSA) is a new evolution of the ALOHA
protocol that also sends each user a variable number of
copies of their packets at each MAC frame with priority
classes. Furthermore, collisions can be solved by
eliminating overlapping interference using cleanly received
copies. In this way, close productivity can be achieved close
to the standard maximum output value of one value on the
collision channel. As previously mentioned, CRDSA works
on replicating packages. To convert the principle of variable
frequency, the scheme [5] was called Irregular Repetition
Slotted ALOHA (IRSA). In particular, it turns out that the
ERS diagram can be equivalent by a binary diagram, and
SIC can be seen on the dissecting decomposition on a binary
diagram, similar to decoding the peeling symbols on the
diagrams on the binary orthologue. This connection allows
tools to borrow graphs for analysis and improvement of
IRSA; its performance significantly reduces considerable
lengths in the frame, as well as large size of the population.
The development of density (DE) and error model can be
predicted to show the rate analysis for loss of packets for the
Lings can frame framework by conducting a block analysis
[6 - 8]. The optimum frequency distribution was for DE,
resulting in significant improvements in performance (for
large frames) concerning CRDSA. On the other hand, since
users in the IRSA service transfer replicas in their packages
6. 832 ISSN 1013-5316; CODEN: SINTE 8 Sci.Int.(Lahore),31(6),827-835 , 2019
November-December
at randomly selected intervals, the probability distribution
determines the number of replicas sent per slot – not
controlled by the system designer, but fully determines the
average number of frequencies and load. As previously
mentioned, CRDSA achieves a maximum throughput,
defined as the probability of successful packet transmission
per slot, of T = 0.55; while the peak throughput for Framed
Slotted ALOHA is just T = 0.37. While the transmitted
replicas are different from user to user, this scheme is
dubbed Irregular Repetition Slotted ALOHA (IRSA).
Furthermore, IRSA operation can be described as borrowing
concepts from graph symbols such as the spread of belief at
the package level to resolve collisions. It, therefore,
provides the representation of a chart that allows rapid and
high-quality analytical characterization of IRSA
performance. Tests and scientific convergence (SIC) show
that the IRSA may provide productivity equal to T = 0.97 if
an appropriate degree distribution is chosen and the number
of available intervals is greater than the number of
competing devices [4, 8].
V. OVERVIEW
This study is based on the principle of CRDSA, which is a
Random Access technique that utilizes a specific number of
replicas to transmit within a MAC frame. Furthermore, it
follows this system to avoid a collision. Using this
mechanism requires a pointer that points to the replica, and
if one replica has received, it will cancel the other. Although
CRDSA is not considered the best solution to the collision,
it does upgrade the level of throughput performance. It also
follows the same principle as the IRSA, but with a random
number of replicas according to classes with priority
performing better when throughput is compared.
Table.1Transmission Probability Distribution [25]
Index Transmission Probability Distribution
1 0.5102 + 0.4898
2 0.5631 + 0.0436 +0.3933
3 0.5465 + 0.1623 + 0.2912
4 0.5 + 0.28 + 0.22
5
0.08 + 0.14 + 0.3 + 0.17 + 0.14 +
0.17
6
0.4977 +0.2207 +0.0381 +0.0756
+0.0398 +0.0009 +0.0088 +0.0068
+0.0030 +0.0429 +0.0081 +0.0576
The study will start by generating a scenario to evaluate the
performance of CRDSA within a MAC frame. Each user
has to transmit two replicas of the same packet in a random
time slot and frequency slot into the same MAC frame.
Each replica has a pointer, which indicates the entire slot
occupied by the bursts. Whenever one packet is successfully
decoded at the receiver, the pointer is extracted, and the
potential interference contribution caused by the replica on
the corresponding slot is removed,
such as in the slot where the packet is decoded. The SIC
technique proceeds until either all bursts have been
successfully decoded, or until a maximum number of
iterations has been reached. This technique is fundamental
for improving the performance of the protocol, but at the
same time introduces a temporal delay proportional to the
maximum number of iterations done by the receiver [26].
In addition to creating a scenario that studying the
performance of the IRSA protocol, which is considering to
send a random number of the replica within classes that
determine the priority in a random time slot and frequency
slot. Following the same principle used in CRDSA,
whenever a replica has successfully been received, the other
replicas will be canceled. The SIC technique proceeds until
all packets have been successfully received. It can be
considered as a modification of the CRDSA scenario, which
will lead to a comparison of the throughput performance in
each protocol, resulting in the best way for data
transmission without collision and improving the
transmission of large quantities of data in a single system.
Figure 4 How the Number of Slots are Determined
VI. SYSTEM MODEL
CRDSA
As stated, the scenario used to study the performance is
CRDSA. The basic idea is to send data packets with
identical replicas, which are two with a pointer, to achieve
greater performance. Furthermore, the frame duration ( is
considered, which consists of n time slot F of frequency slot
that will determine the value of the frame size and the
number of the users per frame. The principle works as
follows to determine the slots number:
Slots=Timeslots*Frequency Slots. Furthermore, two
replicas are randomly generated, with the first replica slots
equal to a random number of time slots and frequency slots.
There will be assigned further slots for the second replica,
which will be a random number of timeslots and frequency
slots. However, there will be a condition, which is the first
replica slot ≠ second replica slot. For example, a frame with
64-time slots and 32 frequency slots, as shown in Figure3,
means that the number of slots will be64*32 and the replica
will be sent at a random time slot and frequency slot. Also,
each replica will be randomly given a probability number.
Identifying a pointer K for both replica of packet as
[preamble, pointer] where preamble is Time Slot and
Frequency Slot of other replica as follows:
S={s11(x1,y1),s12(x1,y2),s21(x2,y1),s22(x2,y2),sts
fs(xts,yfs)}
S is a cell which include many arrays s=[k ts fs] where k is a
pointer for two replica so
s(ts1,fs1)=[k1 ts2 fs2]
s(ts2,fs2)=[k1 ts1 fs1] and so on.
For SIC state where a collided packet is detected, s array
will be s(x,y)=[ 0 0 0] to decode and extract the true packet.
On the other hand, the elements of the array are removed for
a clean packet.
Using the successive interference cancellation (SIC)
technique, there will be the detection of collision packets
and the elimination of replicas of the successively received
packet. The counter must be set, along with a maximum
number of iterations: Nitr=1 to max iteration and Nitr = Nitr
7. Sci.Int.(Lahore),31(6),827-835 , 2019 ISSN 1013-5316; CODEN: SINTE 8 833
November-December
+1 for every interference canceled packet. The normalized
load can be calculated as G = packet load/slots where packet
load is between 0 and the number of slots and the
throughput = number of successive received packets per
frame/slots. Calculate the average to approximately 200
tests to the iteration counter to know the average of the
interference packets [26].
IRSA
IRSA is considered here as the scenario used to study the
performance of CRDSA with modifications. The basic idea
is to send data packets with an identical replica to achieve
greater performance. Furthermore, the frame duration is
which consists of n time slot F of frequency slot that will
determine the value of the frame size and the number of
users per frame. The principle is to determine the slot
numbers by Slots=Timeslots*Frequency Slots. Furthermore,
there is a creating to S cell has Time Slots * Frequency Slots
dimension and Status matrix for each slot so the statuses are
non-negative integers as follows:
0: Slot is idle.
1: Slot is ready to transmit
2: The packet collides.
The replica will be sent in a randomly selected time slot and
frequency slot. Besides, giving each replica a random
probability number depending on the simulation result will
allow a study of the performance of the transmission
protocol, which is examined in different conditions and
different transmission possibilities. Generating several
replicas depending on Table 1.
To determine the performance, the number of slots with
values of ones in the Status Matrix will be collected, which
refers to the number of packets without collision.
Successive Status = ∑
Replication of packets received as a graph-based
representation must also be removed, thanks to a successive
interference cancellation (SIC) algorithm that facilities the
detection of the collision packets. Additionally, setting the
iteration counter and a maximum number of iterations:
Nitr=1 to max iteration and Nitr = Nitr +1 for every
interference canceled signal will calculate the normalized
load G = packet load/slots where packet load is between 0
and number of slots.
The throughput = number of successive received packets per
frame/slots.
The average of the interference packets can be worked out
by calculating the average to approximately 200 tests of the
iteration counter.
I. RESULTS
Figure 5 Packet Loss Rate of IRSA with Iteration
Figure 6 Packet Loss Rate of IRSA, ALOHA, and CRDSA
Figure 7 Throughput of IRSA with Iteration
Figure 8 Throughput of IRSA, ALOHA and CRDSA
The CRDSA system, which was introduced, is simulated in
MATLAB. The simulation examines the MAC layer, and
the MATLAB code is shown in the Appendix. CRDSA
access frame setting with time slots is set as 64, and the
frequency slot is set as 32 because it is a Random Access
simulation and each result is taken from the mean of 200
test results.
II. PERFORMANCE EVALUATION
Figure5 and Figure6 show the throughput performance of
six schemes, which are indicated by the packet loss rate
versus normalized load. The Magenta curve represents the
IRSA scheme with maximum iteration set as one. Figure6
shows the blue curve representing the IRSA scheme without
any maximum iteration set, which means the iteration will
stop if the system achieves 100% throughput or no clean
packet in the sample memory. The black curve represents
the original frame ALOHA, while the green curve is the
CRDSA scheme with maximum iteration set as one. The red
curve represents the CRDSA scheme without any maximum
iteration set, which means the iteration will stop if the
system achieves 100% throughput or no clean packet in the
8. 834 ISSN 1013-5316; CODEN: SINTE 8 Sci.Int.(Lahore),31(6),827-835 , 2019
November-December
sample memory. Furthermore, from Figure6 it can also be
seen that the original frame ALOHA is already starting to
lose packet compared to CRDSA – the red curve only starts
losing packets when the load is larger than approximately
45%. Besides, we can see that the CRDSA packet loss rate
increases significantly after 50% load, but it is still better
than frame ALOHA. Moreover, comparison with IRSA
shows it has the best performance because it only starts to
lose packets after 60%. Figures 7 and 8 show the frame
utilization of six schemes mentioned above with increased
normalized load. For frame ALOHA, it achieves its
maximum utilization of around 37% when the load is full.
In comparison, CRDSA achieves maximum frame
utilization when the load is close to 60%. For CRDSA
without maximum iteration set, throughput is able to
achieve 40% of the frame slots. Furthermore, comparison
with IRSA shows that it achieves maximum frame
utilization when the load is nearly 70%. For IRSA without
maximum iteration set, Figure 8 illustrates that the IRSA
throughput with maximum iteration is able to achieve 60%
of the frame slots. Figures6 and7 demonstrate that IRSA can
achieve much lower packet loss rate and higher frame
utilization than both original frame ALOHA and CRDSA.
Additionally, they also provide configuration suggestions
for Load Relief schemes and frame size setting. For
example, if frame resource is quite precious, frame size
could be set as a relatively small number, and Load Relief
schemes should control the normalized load no more than
0.7 at most of the time. On the other hand, if throughput
performance is primary, frame size could be slightly
increased, combined with Load Relief schemes control, to
make the normalized load no more than 0.6. However, the
cost of the IRSA scheme is the uncertainty of time delay and
power consumption caused by increasing iteration.
Therefore, actual operation iteration should be limited.
However, over small iteration, limitation would sabotage
IRSA performance like one-iter IRSA in Figures 5, 6, 7, and
8. The following analysis is of the suitable maximum
iteration set of IRSA.
III. CONCLUSION AND FUTURE WORK
IoT technology has revolutionized the world of
communications; this technique saves valuable time and
effort and helps us adapt to the era of speed. Considering the
high importance of this technology, it must be developed,
especially in the area of Random Access protocols.
Furthermore, the different protocol types indicate evolution,
and thus many models have been published for these
different protocols. It is expected that IoT technologies will
improve even further over the coming years, and studies
will increase in this area. This paper discussed several ideas,
algorithms, and techniques to improve the performance of
protocols through the development of random transport
protocols. Analytical and experimental analyses were
presented, highlighting promising solutions.
As shown in the results, the performance of the IRSA was
better than CRDSA, which was with a particular number of
iterations with assigned numbers called probability. A
possible solution is to add another random number to each
user which can act as a block number to prevent the user
from choosing this number when selecting the random
number employed in the probability variables. For example,
there will be a user number m which will go to send the
replicas with a probability number k. However, if we assign
a number to prevent the users from independently selecting
a particular number, it will skip that number and never use
it. From this principle, it can be seen how collisions between
data packets can be avoided. This step can lead to avoiding
each user from using a particular slot which may improve
the throughput performance.
REFERENCES
[1] "The internet of things: Between the revolution of the
internet and the metamorphosis of objects." Vision and
Challenges for Realising the Internet of Things (2010):
11-24.
[2] Gubbi, Jayavardhana, et al. "Internet of Things (IoT):
A vision, architectural elements, and future
directions." Future generation computer systems 29.7
(2013): 1645-1660.
[3] Xia, Feng, et al. "Internet of things." International
Journal of Communication Systems 25.9 (2012): 1101.
[4] Toni, Laura, and Pascal Frossard. "Prioritized random
MAC optimization via graph-based analysis." IEEE
Transactions on Communications 63.12 (2015): 5002-
5013.
[5] Zanella, Andrea, et al. "M2M massive wireless access:
challenges, research issues, and ways
forward." Globecom Workshops (GC Wkshps), 2013
IEEE. IEEE, 2013.
[6] Aijaz, Adnan, and A. Hamid Aghvami. "Cognitive
machine-to-machine communications for Internet-of-
Things: A protocol stack perspective." IEEE Internet
of Things Journal 2.2 (2015): 103-112.
[7] Zhang, Yan, et al. "Cognitive machine-to-machine
communications: visions and potentials for the smart
grid." IEEE network 26.3 (2012).
[8] Paolini, Enrico, Gianluigi Liva, and Marco Chiani.
"Coded slotted ALOHA: A graph-based method for
uncoordinated multiple access." IEEE Transactions on
Information Theory 61.12 (2015): 6815-6832.
[9] Abbate, Janet Ellen. "From ARPANET to Internet: A
history of ARPA-sponsored computer networks, 1966-
-1988." (1994).
[10]Domingo, Mari Carmen. "An overview of the Internet
of Things for people with disabilities." Journal of
Network and Computer Applications 35.2 (2012): 584-
596.
[11]Atzori, Luigi, Antonio Iera, and Giacomo Morabito.
"The internet of things: A survey." Computer
networks 54.15 (2010): 2787-2805.
[12]Boswarthick, David, Omar Elloumi, and Olivier
Hersent, eds. M2M communications: a systems
approach. John Wiley & Sons, 2012.
[13]Wu, Geng, et al. "M2M: From mobile to embedded
internet." IEEE Communications Magazine 49.4
(2011).
[14]Al-Fuqaha, Ala, et al. "Toward better horizontal
integration among IoT services." IEEE
Communications Magazine 53.9 (2015): 72-79.
[15]Shelby, Zach, Klaus Hartke, and Carsten Bormann.
"The constrained application protocol (CoAP)."
(2014).
[16]Thangavel, Dinesh, et al. "Performance evaluation of
MQTT and CoAP via a common
middleware." Intelligent Sensors, Sensor Networks and
Information Processing (ISSNIP), 2014 IEEE Ninth
International Conference on. IEEE, 2014.
9. Sci.Int.(Lahore),31(6),827-835 , 2019 ISSN 1013-5316; CODEN: SINTE 8 835
November-December
[17]Bianchi, Giuseppe, Luigi Fratta, and Matteo Oliveri.
"Performance evaluation and enhancement of the
CSMA/CA MAC protocol for 802.11 wireless
LANs." Personal, Indoor and Mobile Radio
Communications, 1996. PIMRC'96., Seventh IEEE
International Symposium on. Vol. 2. IEEE, 1996.
[18]Sharma, Gaurav, Ayalvadi Ganesh, and Peter Key.
"Performance analysis of contention based medium
access control protocols." IEEE Transactions on
Information Theory 55.4 (2009): 1665-1682.
[19]Busch, Costas, et al. "Contention-free MAC protocols
for wireless sensor networks." International
Symposium on Distributed Computing. Springer,
Berlin, Heidelberg, 2004.
[20]Rayes, Ammar, and Samer Salam. "The Internet in
IoT—OSI, TCP/IP, IPv4, IPv6 and Internet
Routing." Internet of Things From Hype to Reality.
Springer International Publishing, 2017. 35-56.
[21]Weber, Steven P., et al. "Transmission capacity of
wireless ad hoc networks with successive interference
cancellation." IEEE Transactions on Information
Theory 53.8 (2007): 2799-2814
[22]Raychaudhuri, D. "Performance analysis of random
access packet-switched code division multiple access
systems." IEEE Transactions on Communications 29.6
(1981): 895-901.
[23]Munari, Andrea, et al. "The throughput of slotted
ALOHA with diversity." Communication, Control, and
Computing (Allerton), 2013 51st Annual Allerton
Conference on. IEEE, 2013.
[24]Stefanovic, Cedomir, PetarPopovski, and
DejanVukobratovic. "Frameless ALOHA protocol for
wireless networks." IEEE Communications
Letters 16.12 (2012): 2087-2090.
[25]Laura Toni and Pascal Frossard. Prioritized random
MAC optimization via graph-based analysis. arXiv
preprint arXiv:1501.00587, 2015.
[26]Wei Ye, John Heidemann, and Deborah Estrin. An
energy-e cient MAC protocol for wireless sensor
networks. In INFOCOM 2002. Twenty-First Annual
Joint Conference of the IEEE Computer and
Communications So-cieties. Proceedings. IEEE,
volume 3, pages 1567{1576. IEEE, 2002.
[27]Wikipedia,(2014):―ALOHAnet‖https://en.wikipedia.or
g/wiki/ALOHAnet.[Accessed 23 September. 2017].