Advertisement

Cluster Computing

, Volume 20, Issue 3, pp 2375–2384 | Cite as

Dual-channel medium access control of low power wide area networks considering traffic characteristics in IoE

  • Dae-Young Kim
  • Seokhoon KimEmail author
Article

Abstract

The Internet of Thing (IoT) is evolving into the Internet of Everything (IoE). Combining cloud computing with the IoE has attracted attention for wide area applications as a major service. In addition, low power wide area networks (LPWANs) have become a remarkable communication technology in IoT. Because the LPWAN provides long range communication with low power, it can be widely exploited for IoE applications. To improve quality of service, data traffic should be transmitted by considering its priority. However, this is not easy because the LPWAN has a low data rate and long transmission delay. Therefore, this paper proposes a dual-channel medium access control (MAC) to satisfy these requirements in the LPWAN. Generated data is classified into three categories by considering traffic characteristics and is delivered with different priority in dual channels. The performance evaluation is carried out with computer simulations. The results show that the proposed scheme outperforms existing schemes in the LPWAN.

Keywords

LPWAN IoT Medium access control Priority based transmission 

Notes

Acknowledgements

This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (NRF-2017R1D1A1B03032777), and this work was supported by the Soonchunhyang University Research Fund.

References

  1. 1.
    Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of things (IoT): a vision, architectural elements, and future directions. Elsevier Futr. Gener. Comput. Syst. 29(7), 1645–1660 (2013)CrossRefGoogle Scholar
  2. 2.
    Atzori, L., Iera, A., Morabito, G.: The Internet of things: a survey. Elsevier Comput. Netw. 54(15), 2787–2805 (2010)CrossRefzbMATHGoogle Scholar
  3. 3.
    Chen, M., Wan, J., Li, F.: Machine-to-machine communications: architectures, standards and applications. KSII Trans. Internet Inf. Syst. 6(2), 480–497 (2012)Google Scholar
  4. 4.
    Kim, S., Na, W.: Safe data transmission architecture based on cloud for Internet of things. Wirel. Pers. Commun. 86(1), 287–300 (2016)CrossRefGoogle Scholar
  5. 5.
    Gunes, V., Peter, S., Givargis, T., Vahid, F.: A survey on concepts, applications, and challenges in cyber-physical systems. KSII Trans. Internet Inf. Syst. 8(12), 4242–4267 (2014)Google Scholar
  6. 6.
    Sato, A., Huang, R., Yen, N.Y.: Design of fusion technique-based mining engine for smart business. Hum.-centric Comput. Inf. Sci. 5(1), 23 (2015)CrossRefGoogle Scholar
  7. 7.
    Culler, D., Estrin, D., Srivastava, M.: Guest editors introduction: overview of sensor networks. IEEE Comput. 37(8), 41–49 (2004)CrossRefGoogle Scholar
  8. 8.
    Kim, D.-Y., Cho, J., Jeong, B.-S.: Practical data transmission in cluster-based sensor networks. KSII Trans. Internet Inf. Syst. 4(3), 224–242 (2010)Google Scholar
  9. 9.
    Kim, D.-Y., Jin, Z., Choi, J., Lee, B., Cho, J.: Transmission power control with the guaranteed communication reliability in WSN. Int. J. Distrib. Sens. Netw. ID 632590 (2015)Google Scholar
  10. 10.
    IEEE: IEEE 802.15.4 standard. IEEE 802.15.4-2006 Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPAN) (2006)Google Scholar
  11. 11.
    Gutierrez, J.A., Naeve, M., Callaway, E., Bourgeois, M., Mitter, V., Heile, B.: IEEE 802.15.4: a developing standard for low-power low-cost wireless personal area networks. IEEE Netw. 15(5), 12–19 (2001)CrossRefGoogle Scholar
  12. 12.
    Gaur, M.S., Pant, B.: Trusted and secure clustering in mobile pervasive environment. Hum.-centric Comput. Inf. Sci. 5(1), 32 (2015)CrossRefGoogle Scholar
  13. 13.
    Pughat, A., Sharma, V.: A review on stochastic approach for dynamic power management in wireless sensor networks. Hum.-centric Comput. Inf. Sci. 5(1), 4 (2015)CrossRefGoogle Scholar
  14. 14.
    Xiong, X., Zheng, K., Xu, R., Xiang, W., Chatzimisios, P.: Low power wide area machine-to-machine networks: key techniques and prototype. IEEE Commun. Mag. 53(9), 64–71 (2015)CrossRefGoogle Scholar
  15. 15.
    LoRa Alliance. https://www.lora-alliance.org (2016). Accessed 15 Oct 2016
  16. 16.
    SIGFOX. http://www.sigfox.com (2016). Accessed 15 Oct 2016
  17. 17.
    Weightless. http://www.weightless.org (2016). Accessed 15 Oct 2016
  18. 18.
    Sornin, N., Luis, M., Eirich, T., Kramp, T., Hersent, O.: LoRa alliance LoRaWAN specification. LoRaWAN Specification Release v1.0 (2015)Google Scholar
  19. 19.
    Augustin, A., Yi, J., Clausen, T., Townsley, W.M.: A study of LoRa: long range & low power networks for the Internet of Things. MDPI Sens. 16(9), 1466 (2016)CrossRefGoogle Scholar
  20. 20.
    Israr, I., Yaqoob, M.M., Javaid, N., Qasim, U., Khan, Z.A.: Simulation analysis of medium access techniques. In: Proceedings of IEEE International Conference on Broadband, Wireless Computing, Communication and Applications, pp. 602–607 (2012)Google Scholar
  21. 21.
    Walke, B.H., Mangold, S., Berlemann, L.: IEEE 802 wireless systems: protocols, multi-hop mesh/relaying, performance and spectrum coexistence. Wiley, Chichester (2006)CrossRefGoogle Scholar
  22. 22.
    Saleh, M., Dong, L.: Comparing FCFS & EDF scheduling algorithms for real-time packet switching networks. In: Proceedings of IEEE International Conference on Networking, Sensing and Control, pp. 698–703 (2010)Google Scholar
  23. 23.
    Ross, S.M.: Probability models for computer science. Harcourt/Academic Press, Orlando (2001)Google Scholar
  24. 24.
    Trivedi, K.S.: Probability and statistics with reliability, queuing and computer science applications. Wiley, Chichester (2002)zbMATHGoogle Scholar
  25. 25.
    MacDougall, M.H.: Simulating computer systems—techniques and tool. The MIT Press, Cambridge (1987)Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2017

Authors and Affiliations

  1. 1.Department of Computer Software EngineeringChangshin UniversityChangwonKorea
  2. 2.Department of Computer Software EngineeringSoonchunhyang UniversityAsanKorea

Personalised recommendations