Analysis of a Prioritized Medium Access Control for 2-Hop Machine-to-Machine (M2M) Communication Networks

被引:0
|
作者
Huang, Kuan-Ho [1 ]
Lin, Shao-An [1 ]
Ho, Shin-Yann [1 ]
Lin, Yi-Chen [1 ]
Lu, I-Wu [1 ]
Huang, Jie-Cheng [1 ]
Chou, Chun-Ting [1 ]
机构
[1] Natl Taiwan Univ, Dept Elect Engn, Taipei, Taiwan
关键词
IEEE-802.11; WLAN; MAC;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The Internet of Things (IoT) envisions to connect a huge number of machines together to provide users with various applications. In telematics applications, end nodes send the sensory data to the relay node. The relay node then forwards the data to the edge router. When the number of end nodes in the network is very large, the relay node may encounter buffer overflow, and the end-to-end delay becomes unacceptable. The reason is that the relay node uses the same contention parameters as the end nodes to contend for the channel. In this paper, we proposed a prioritized contention mechanism so that the end-to-end delay can be minimized. An analytical model and simulation results are also presented to analyze the end-to-end delay in a 2-hop IoT network.
引用
收藏
页码:435 / 440
页数:6
相关论文
共 50 条
  • [41] Industrial Automation using Embedded Systems and Machine-to-Machine, Man-to-Machine (M2M) Connectivity for Improved Overall Equipment Effectiveness (OEE)
    Amer, W.
    Ansari, U.
    Ghafoor, Abdul
    2009 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC 2009), VOLS 1-9, 2009, : 4450 - 4454
  • [42] Security Aspects of Smart Cards vs. Embedded Security in Machine-to-Machine (M2M) Advanced Mobile Network Applications
    Meyerstein, Mike
    Cha, Inhyok
    Shah, Yogendra
    SECURITY AND PRIVACY IN MOBILE INFORMATION AND COMMUNICATION SYSTEMS, 2009, 17 : 214 - 225
  • [43] Energy-Aware Medium Access Control for Energy-Harvesting Machine-to-Machine networks
    Kim, Dohyung
    Ko, Youngbae
    SAC '19: PROCEEDINGS OF THE 34TH ACM/SIGAPP SYMPOSIUM ON APPLIED COMPUTING, 2019, : 2399 - 2405
  • [44] Signal-Centric Predictive Medium Access Control for M2M Communications
    Gau, Rung-Hung
    Chen, Chih-Huan
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (04) : 2656 - 2668
  • [45] Statistical Dissemination Control in Large Machine-to-Machine Communication Networks
    Lin, Shih-Chun
    Gu, Lei
    Chen, Kwang-Cheng
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2015, 14 (04) : 1897 - 1910
  • [46] M2M Communication
    Malleck, H.
    Mecklenbruker, C.
    ELEKTROTECHNIK UND INFORMATIONSTECHNIK, 2014, 131 (01): : 1 - 2
  • [47] M2M Communication
    Helmut Malleck
    Christoph Mecklenbräuker
    e & i Elektrotechnik und Informationstechnik, 2014, 131 (1) : 1 - 2
  • [48] Comparison of the performance of a Machine-to-Machine (M2M) deep learning algorithm versus human graders for glaucoma screening in teleretinal fundus images
    Mirzania, Delaram
    Thompson, Atalie C.
    Mariottoni, Eduardo
    Shigueoka, Leonardo
    Muir, Kelly
    Medeiros, Felipe
    INVESTIGATIVE OPHTHALMOLOGY & VISUAL SCIENCE, 2020, 61 (07)
  • [49] Cooperative Communications in Machine to Machine (M2M): Solutions, Challenges and Future Work
    Raymond, Juma W.
    Olwal, Thomas O.
    Kurien, Anish M.
    IEEE ACCESS, 2018, 6 : 9750 - 9766
  • [50] Dynamic Preamble Grouping and Access Control Scheme in Machine-to-Machine Communication
    Zhao, Xiaoyan
    Wang, Cheng
    Wang, Weidong
    2019 11TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2019,