Simulation of Infocommunications Process Development Scenarios in Wireless Centralized Network Cluster

Authors

  • O. M. Danylchuk Vasyl’ Stus Donetsk National University
  • V. V. Kovtun Vinnytsia National Technical University
  • O. D. Nykytenko Vinnytsia National Technical University
  • Yu. Yu. Nestiuk Vinnytsia National Technical University
  • V. V. Prysiazhniuk Vinnytsia National Technical University

DOI:

https://doi.org/10.31649/1997-9266-2021-159-6-100-113

Keywords:

mathematical model, parametric space of accessibility indicators, Markov queuing system, centralized network cluste, infocommunication interaction session

Abstract

The article presents mathematical models of the development of the infocommunication process that takes place in a wireless centralized network cluster. Many end mobile devices are involved in the research process, which are the subjects of information interaction with the base station. The later serves the information needs of the subjects in the selected processes in their own information environment. This background allows us to consider the studied process as a Markov queuing system with a flow of new incoming requests with needs for the desired amount of system resources and a flow of service signals, the receipt of which initiates redefinition of allocated for received incoming requests volumes of system resources. A controlled parameter in the created system is the acceptance or rejection of new incoming requests by its front-end interface. In this case, two scenarios are investigated, which differ in that synchronously or asynchronously received to the front-end interface service signals, the receipt of which marks a complete or partial redefinition of system resources involved in supporting active personalized sessions of infocommunication interaction. The proposed mathematical models for the development of such functional scenarios allow to calculate the probability of rejection of a new input request and the percentage of occupied system resources in terms of synchronous or asynchronous change of the spatial location of terminal devices relative to the base station.

The study of the proposed mathematical apparatus showed that the value of indicators from a certain metric in the situation of the second scenario, which characterizes the synchronous movement of IoT end devices relative to the base station, does not depend on the intensity of the input stream of service signals. The study of the influence of the type of distribution law of the stochastic characteristic parameter of a new input request on the values of indicators from a certain metric revealed an objective need to establish regulations on the value of the desired amount of system resources in new input requests.

Author Biographies

O. M. Danylchuk, Vasyl’ Stus Donetsk National University

Cand. Sc. (Pedagog.), Associate Professor, Associate Professor of the Chair of Applied Mathematics

V. V. Kovtun, Vinnytsia National Technical University

Cand. Sc. (Pedagog.), Associate Professor, Associate Professor of the Chair of Applied Mathematics

O. D. Nykytenko, Vinnytsia National Technical University

Cand. Sc. (Eng.), Associate Professor, Associate Professor of the Chair of Computer Control Systems

Yu. Yu. Nestiuk, Vinnytsia National Technical University

Student of the Department of Intelligent Information Technology and Automation

V. V. Prysiazhniuk, Vinnytsia National Technical University

Senior Lecturer of the Chair of Metrology and Industrial Automation

References

L. Chettri, and R. Bera, “A Comprehensive Survey on Internet of Things (IoT) Toward 5G Wireless Systems,” IEEE Internet of Things Journal, vol. 7, no. 1, pp. 16-32, 2020. https://doi.org/10.1109/JIOT.2019.2948888 .

K. Shafique, B. A. Khawaja, F. Sabir, S. Qazi, and M. Mustaqim, “Internet of Things (IoT) for Next-Generation Smart Systems: A Review of Current Challenges, Future Trends and Prospects for Emerging 5G-IoT Scenarios,” IEEE Access, vol. 8, pp. 23022-23040, 2020. https://doi.org/10.1109/ACCESS.2020.2970118 .

A. Ghosh, A. Maeder, M. Baker, and D. Chandramouli, “5G Evolution: A View on 5G Cellular Technology Beyond 3GPP Release 15,” IEEE Access, vol. 7; pp. 127639-127651, 2019. https://doi.org/10.1109/ACCESS.2019.2939938 .

A. A. R. Alsaeedy, and E. K. P. Chong, “Mobility Management for 5G IoT Devices: Improving Power Consumption With Lightweight Signaling Overhead,” IEEE Internet of Things Journal, vol. 6, no. 5, pp. 8237-8247, 2019. https://doi.org/10.1109/JIOT.2019.2920628 .

K. Fan, W. Jiang, H. Li, and Y. Yang, “Lightweight RFID Protocol for Medical Privacy Protection in IoT,” IEEE Transactions on Industrial Informatics, vol. 14, no. 4, pp. 1656-1665, 2018. https://doi.org/10.1109/TII.2018.2794996 .

M. Hosseinzadeh, et al. “A New Strong Adversary Model for RFID Authentication Protocols,” IEEE Access, vol. 8, pp. 125029-125045, 2020. https://doi.org/10.1109/ACCESS.2020.3007771 .

K. Ding, and P. Jiang, “RFID-based production data analysis in an IoT-enabled smart job-shop,” IEEE/CAA Journal of Automatica Sinica, vol. 5, no. 1, pp. 128-138, 2018. https://doi.org/10.1109/JAS.2017.7510418 .

V. Sharma, and M. Hashmi, “On the Seamless Integration and Co-Existence of Chipless RFID in Broad IoT Framework,” IEEE Access, vol. 9; pp. 69839-69849, 2021. https://doi.org/10.1109/ACCESS.2021.3078318 .

D. Sethia, D. Gupta, and H. Saran, “NFC Secure Element-Based Mutual Authentication and Attestation for IoT Access. In IEEE Transactions on Consumer Electronics,” vol. 64, no. 4, pp. 470-479, 2018. https://doi.org/10.1109/TCE.2018.2873181.

T. Ulz, T. Pieber, A. Höller, S. Haas, and C. Steger, “Secured and Easy-to-Use NFC-Based Device Configuration for the Internet of Things,” IEEE Journal of Radio Frequency Identification, vol. 1, no. 1, pp. 75-84, 2017. https://doi.org/10.1109/JRFID.2017.2745510 .

F. K. Shaikh, S. Zeadally, and E. Exposito, “Enabling Technologies for Green Internet of Things,” IEEE Systems Journal, vol. 11, no. 2, pp. 983-994, 2017. https://doi.org/10.1109/JSYST.2015.2415194 .

B. A. Alzahrani, K. Mahmood and S. Kumari, “Lightweight Authentication Protocol for NFC Based Anti-Counterfeiting System in IoT Infrastructure,” IEEE Access, vol. 8, pp. 76357-76367, 2020. https://doi.org/10.1109/ACCESS.2020.2989305 .

E. D. Ngangue Ndih, and S. Cherkaoui, “On Enhancing Technology Coexistence in the IoT Era: ZigBee and 802.11 Case,” In IEEE Access, vol. 4, pp. 1835-1844, 2016. https://doi.org/10.1109/ACCESS.2016.2553150 .

K. Lounis, and M. Zulkernine, “Attacks and Defenses in Short-Range Wireless Technologies for IoT,” IEEE Access, vol. 8, pp. 88892-88932, 2020. https://doi.org/10.1109/ACCESS.2020.2993553 .

H. Qin, B. Cao, J. He, X. Xiao, W. Chen, and Y. Peng, “Cross-Interface Scheduling Toward Energy-Efficient Device-to-Gateway Communications in IoT,” In IEEE Internet of Things Journal, vol. 7, no. 3, pp. 2247-2262, 2020. https://doi.org/10.1109/JIOT.2019.2958612 .

W. Jiang, Z. Yin, R. Liu, Z. Li, S. M. Kim, and T. He, “Boosting the Bitrate of Cross-Technology Communication on Commodity IoT Devices,” IEEE/ACM Transactions on Networking, vol. 27, no. 3, pp. 1069-1083, 2019. https://doi.org/10.1109/TNET.2019.2913980 .

J. F. Ensworth, and M. S. Reynolds, “BLE-Backscatter: Ultralow-Power IoT Nodes Compatible With Bluetooth 4.0 Low Energy (BLE) Smartphones and Tablets,” IEEE Transactions on Microwave Theory and Techniques, vol. 65, no. 9, pp. 3360-3368, 2017. https://doi.org/10.1109/TMTT.2017.2687866 .

S. R. Hussain, S. Mehnaz, S. Nirjon, and E. Bertino, “Secure Seamless Bluetooth Low Energy Connection Migration for Unmodified IoT Devices,” IEEE Transactions on Mobile Computing, vol. 17, no. 4, pp. 927-944, 2018. https://doi.org/10.1109/TMC.2017.2739742 .

K. Lounis, and M. Zulkernine, “Attacks and Defenses in Short-Range Wireless Technologies for IoT,” IEEE Access, vol. 8, pp. 88892-88932, 2020. https://doi.org/10.1109/ACCESS.2020.2993553 .

R. Rondón, A. Mahmood, S. Grimaldi, and M. Gidlund, “Understanding the Performance of Bluetooth Mesh: Reliability, Delay, and Scalability Analysis,” IEEE Internet of Things Journal, vol. 7, no. 3, pp. 2089-2101, 2020. https://doi.org/10.1109/JIOT.2019.2960248.

J. Lovón-Melgarejo, M. Castillo-Cara, O. Huarcaya-Canal, L. Orozco-Barbosa, and I. García-Varea, “Comparative Study of Supervised Learning and Metaheuristic Algorithms for the Development of Bluetooth-Based Indoor Localization Mechanisms,” IEEE Access, vol. 7, pp. 26123-26135, 2019. https://doi.org/10.1109/ACCESS.2019.2899736 .

H. Pirayesh, P. K. Sangdeh, and H. Zeng, “Coexistence of Wi-Fi and IoT Communications in WLANs,” IEEE Internet of Things Journal, vol. 7, no. 8, pp. 7495-7505, 2020. https://doi.org/10.1109/JIOT.2020.2986110.

W. Wang, Y. Chen, L. Wang, and Q. Zhang, “Sampleless Wi-Fi: Bringing Low Power to Wi-Fi Communications,” IEEE/ACM Transactions on Networking, vol. 25, no. 3, pp. 1663-1672, 2017. https://doi.org/10.1109/TNET.2016.2643160.

K. Lounis, and M. Zulkernine, “Attacks and Defenses in Short-Range Wireless Technologies for IoT,” IEEE Access, vol. 8, pp. 88892-88932, 2020. https://doi.org/10.1109/ACCESS.2020.2993553 .

M. R. Palattella, et al. “Internet of Things in the 5G Era: Enablers, Architecture, and Business Models,” IEEE Journal on Selected Areas in Communications, vol. 34, no. 3, pp. 510-527, 2016. https://doi.org/10.1109/JSAC.2016.2525418.

X. Ge, R. Zhou, and Q. Li, “5G NFV-Based Tactile Internet for Mission-Critical IoT Services,” IEEE Internet of Things Journal, vol. 7, no. 7. pp. 6150-6163, 2020. https://doi.org/10.1109/JIOT.2019.2958063.

G. A. Akpakwu, B. J. Silva, G. P. Hancke, and A. M. Abu-Mahfouz, “A Survey on 5G Networks for the Internet of Things: Communication Technologies and Challenges,” IEEE Access, vol. 6, pp. 3619-3647, 2018. https://doi.org/10.1109/ACCESS.2017.2779844 .

Y. Lin, T. Huang, and S. Tsai, “Enhancing 5G/IoT Transport Security Through Content Permutation,” IEEE Access, vol. 7, pp. 94293-94299, 2019. https://doi.org/10.1109/ACCESS.2019.2926479 .

L. Yu, Z. Li, J. Liu, and R. Zhou, “Resources Sharing in 5G Networks: Learning-Enabled Incentives and Coalitional Games,” IEEE Systems Journal, vol. 15, no. 1, pp. 226-237, 2021. https://doi.org/10.1109/JSYST.2019.2958890 .

C. She, Y. Duan, D. Zhao, T. Q. S. Quek, Y. Li, and B. Vucetic, “Cross-Layer Design for Mission-Critical IoT in Mobile Edge Computing Systems,” IEEE Internet of Things Journal, vol. 6, no. 6, pp. 9360-9374, 2019. https://doi.org/10.1109/JIOT.2019.2930983 .

A. Baz, A. A. Al-Naja, and M. Baz, “Statistical model for IoT/5G networks,” in Seventh International Conference on Ubiquitous and Future Networks, 2015, pp. 109-111. https://doi.org/10.1109/ICUFN.2015.7182511 .

C. Tsai, and M. Moh, “Load balancing in 5G cloud radio access networks supporting IoT communications for smart communities,” in IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), 2017, pp. 259-264. https://10.1109/ISSPIT.2017.8388652 .

O. V. Bisikalo, V. V. Kovtun, and V. V. Sholota, “The information system for Critical Use Access Process Dependability Modeling,” in 9th International Conference on Advanced Computer Information Technologies (ACIT), Ceske Budejovice, Czech Republic, 2019, pp. 5-8. https://doi.org/10.1109/ACITT.2019.8780013 .

O. V. Bisikalo, V. V. Kovtun, O. V. Kovtun, and O. M. Danylchuk, “Mathematical modeling of the availability of the information system for critical use to optimize control of its communication capabilities,” International Journal of Sensors, Wireless Communications and Control, vol. 10(5), pp. 505-517, 2021. https://doi.org/10.2174/2210327910999201009163958.

O. V. Bisikalo, V. V. Kovtun, and O. V. Kovtun, “Modeling of the Estimation of the Time to Failure of the information system for Critical Use,” in 10th International Conference on Advanced Computer Information Technologies (ACIT), Deggendorf, Germany, 2020, pp. 140-143. https://doi.org/10.1109/ACIT49673.2020.9208883 .

O. V. Bisikalo, D. S. Chernenko, O. M. Danylchuk, V. V. Kovtun, and V. B. Romanenko, “Information technology for TTF optimization of an information system for critical use that operates in aggressive cyber-physical space,” in International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T), Kharkiv, Ukraine, 2020, pp. 323-329. https://doi.org/10.1109/PICST51311.2020.9467997 .

O. V. Bisikalo, V. V. Kovtun, O. V. Kovtun, and V. B. Romanenko, “Research of safety and survivability models of the information system for critical use,” in 11th International Conference on Dependable Systems, Services and Technologies (DESSERT), Kyiv, Ukraine, 2020, pp. 7-12. https://doi.org/10.1109/DESSERT50317.2020.9125061 .

O. Bisikalo, O. Kovtun, V. Kovtun, and V. Vysotska, “Research of pareto-optimal schemes of control of availability of the information system for critical use,” CEUR Workshop Proceedings, CEUR-WS, vol. 2623, pp. 174-193, 2020.

M. Mbaye, M. Diallo, and M. Mboup, “LU-Based Beamforming Schemes for MIMO Systems,” IEEE Transactions on Vehicular Technology, vol. 66, no. 3, pp. 2214-2222, 2017. https://doi.org/10.1109/TVT.2016.2573046 .

J. Chen, J. Hu, and J. Zhou, “Hardware and Energy-Efficient Stochastic LU Decomposition Scheme for MIMO Receivers,” IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 24, no. 4, pp. 1391-1401, 2016. https://doi.org/10.1109/TVLSI.2015.2446481 .

Downloads

Abstract views: 184

Published

2021-12-24

How to Cite

[1]
O. M. Danylchuk, V. V. Kovtun, O. D. Nykytenko, Y. Y. Nestiuk, and V. V. Prysiazhniuk, “Simulation of Infocommunications Process Development Scenarios in Wireless Centralized Network Cluster”, Вісник ВПІ, no. 6, pp. 100–113, Dec. 2021.

Issue

Section

Information technologies and computer sciences

Metrics

Downloads

Download data is not yet available.