Reliable and Efficient Access for Alarm-initiated and Regular M2M Traffic in IEEE 802.11ah Systems

Publikation: Bidrag til tidsskriftTidsskriftartikelForskningpeer review

19 Citationer (Scopus)
229 Downloads (Pure)

Resumé

IEEE 802.11ah is a novel WiFi-based protocol, aiming to provide an access solution for the machine-to-machine (M2M) communications. In this paper, we propose an adaptive access mechanism that can be seamlessly incorporated into IEEE 802.11ah protocol operation and that supports all potential M2M reporting regimes, which are periodic, on-demand and alarm reporting. The proposed access method is based a periodically re- occurring pool of time slots, whose size is proactively determined on the basis of the reporting activity in the cell. We show that it is possible to both efficiently and reliably resolve all reporting stations in the cell, within the limits of the allowed deadlines. As a side result, we also provide a rationale for modeling the inter-arrival time in alarm events by using the Beta distribution, a model that is considered in the 3GPP standardization.
OriginalsprogEngelsk
TidsskriftIEEE Internet of Things Journal
Vol/bind3
Udgave nummer5
Sider (fra-til)673-682
ISSN2327-4662
DOI
StatusUdgivet - 2016

Fingerprint

Standardization
Machine-to-machine communication

Citer dette

@article{e2024bdf745248e2b045e8599f9f1461,
title = "Reliable and Efficient Access for Alarm-initiated and Regular M2M Traffic in IEEE 802.11ah Systems",
abstract = "IEEE 802.11ah is a novel WiFi-based protocol, aiming to provide an access solution for the machine-to-machine (M2M) communications. In this paper, we propose an adaptive access mechanism that can be seamlessly incorporated into IEEE 802.11ah protocol operation and that supports all potential M2M reporting regimes, which are periodic, on-demand and alarm reporting. The proposed access method is based a periodically re- occurring pool of time slots, whose size is proactively determined on the basis of the reporting activity in the cell. We show that it is possible to both efficiently and reliably resolve all reporting stations in the cell, within the limits of the allowed deadlines. As a side result, we also provide a rationale for modeling the inter-arrival time in alarm events by using the Beta distribution, a model that is considered in the 3GPP standardization.",
author = "Madue{\~n}o, {Germ{\'a}n Corrales} and Cedomir Stefanovic and Petar Popovski",
year = "2016",
doi = "10.1109/JIOT.2015.2496418",
language = "English",
volume = "3",
pages = "673--682",
journal = "IEEE Internet of Things Journal",
issn = "2327-4662",
publisher = "IEEE",
number = "5",

}

TY - JOUR

T1 - Reliable and Efficient Access for Alarm-initiated and Regular M2M Traffic in IEEE 802.11ah Systems

AU - Madueño, Germán Corrales

AU - Stefanovic, Cedomir

AU - Popovski, Petar

PY - 2016

Y1 - 2016

N2 - IEEE 802.11ah is a novel WiFi-based protocol, aiming to provide an access solution for the machine-to-machine (M2M) communications. In this paper, we propose an adaptive access mechanism that can be seamlessly incorporated into IEEE 802.11ah protocol operation and that supports all potential M2M reporting regimes, which are periodic, on-demand and alarm reporting. The proposed access method is based a periodically re- occurring pool of time slots, whose size is proactively determined on the basis of the reporting activity in the cell. We show that it is possible to both efficiently and reliably resolve all reporting stations in the cell, within the limits of the allowed deadlines. As a side result, we also provide a rationale for modeling the inter-arrival time in alarm events by using the Beta distribution, a model that is considered in the 3GPP standardization.

AB - IEEE 802.11ah is a novel WiFi-based protocol, aiming to provide an access solution for the machine-to-machine (M2M) communications. In this paper, we propose an adaptive access mechanism that can be seamlessly incorporated into IEEE 802.11ah protocol operation and that supports all potential M2M reporting regimes, which are periodic, on-demand and alarm reporting. The proposed access method is based a periodically re- occurring pool of time slots, whose size is proactively determined on the basis of the reporting activity in the cell. We show that it is possible to both efficiently and reliably resolve all reporting stations in the cell, within the limits of the allowed deadlines. As a side result, we also provide a rationale for modeling the inter-arrival time in alarm events by using the Beta distribution, a model that is considered in the 3GPP standardization.

U2 - 10.1109/JIOT.2015.2496418

DO - 10.1109/JIOT.2015.2496418

M3 - Journal article

VL - 3

SP - 673

EP - 682

JO - IEEE Internet of Things Journal

JF - IEEE Internet of Things Journal

SN - 2327-4662

IS - 5

ER -