Professional Documents
Culture Documents
Application-Oriented Traffic Modeling of WiFi-Based Internet of Things Gateways
Application-Oriented Traffic Modeling of WiFi-Based Internet of Things Gateways
Application-Oriented Traffic Modeling of WiFi-Based Internet of Things Gateways
Abstract—Many Internet of Things (IoT) devices generate any time in any place. Toward realizing this objective, two
relatively small-sized data and have limited energy supply. These main architectures are introduced in the literature to support
two factors limit their ability to connect directly to cloud servers transferring data from IoT devices to their management enti-
through a wireless backbone network without imposing a bur-
den on this network in providing efficient data transfer. In this ties or servers. In the first one, which is commonly known
article, we consider an IoT network architecture where a num- as cellular IoT [3], the IoT devices connect directly to the
ber of different IoT devices send their data wirelessly to an cellular infrastructure. However, some open issues need to be
IoT gateway (or a fog node) via a WiFi network. We focus addressed by this architecture to achieve the global IoT vision.
on characterizing incoming traffic patterns to the gateway for One of these issues is the wide-area deployment of a high den-
three typical IoT applications with real-time and nonreal-time
data transfer requirements, such as video surveillance, smart sity of IoT devices and the fact that many of these devices use
city, and e-healthcare. Our study is based on generating real low data rates to wirelessly transfer the sensed information
IoT traffic traces in a lab environment from various sensors and through the cellular network to Internet cloud servers. This
devices for the aforementioned applications and employing these adds a burden on the cellular backbone network as it needs to
traces to emulate a network of IoT nodes connected to a gateway support the access of a massive number of devices or machines
via WiFi. In the conducted experiments, different homogenous
and nonhomogeneous traffic patterns of the selected applications in addition to the regular voice/data traffic of human users [4].
are examined for synchronized and unsynchronized data sources. The second architecture uses gateways to aggregate the traf-
Based on our empirical data, the experimental results reveal that fic of IoT devices before sending this traffic over the wireless
the packet interarrival time distribution at the gateway is close cellular backbone [5].
to generalized Pareto distribution for homogeneous eHealth and Indeed, the introduction of IoT gateways [5], machine-to-
smart city traffic, whereas the Weibull distribution is the nearest
to model the empirical packet interarrival time for the rest of machine (M2M) capillary gateways [6], and/or fog nodes can
the examined traffic patterns. Moreover, we show that employ- relieve the cellular network burden as the traffic can be aggre-
ing the experimental findings to analyze the delay performance gated by a gateway or locally processed, if possible, by a
of connecting the gateway to the cloud, given certain backbone fog node before it is sent over the backbone to the cloud for
network resources, leads to accurate results. further processing and/or storage [7]. Nevertheless, a thorough
Index Terms—Characterization, fog, gateway, interarrival time study of the incoming traffic characteristics to gateways or fog
distribution, Internet of Things (IoT), traffic, WiFi. nodes is needed. This is attributed to the fact that the traffic
patterns generated by different IoT devices can be different
from the Internet traffic generated mainly by direct human
I. I NTRODUCTION activities [2], [8]. Thus, investigating IoT traffic characteristics
HE BASIC concept of Internet of Things (IoT) is to is essential because they are highly involved in planning and
T allow the cooperation between the Internet and Things,
which refer to objects equipped with identification, sensing,
designing network infrastructure [2].
Therefore, this study focuses on the second architecture
actuating, or controlling capabilities. These smart objects can where the data from IoT devices are sent via the widely
interact and communicate over the Internet to accomplish spe- deployed WiFi technology to IoT gateways or fog nodes,
cific goals, such as reducing costs and increasing optimization which forward it to its final destination in the Internet cloud
in a multitude of domains [1], [2]. This allows translat- through a wireless backbone network as shown in Fig. 1. The
ing the physical world into a digital cyber world, providing gateways/fog nodes aggregate traffic from different sources,
rich information via connectivity to anyone or anything at such as video surveillance cameras, portable eHealth devices
(such as the electrocardiogram (ECG), electromyography
Manuscript received February 8, 2021; revised March 28, 2021 and April (EMG), and blood pressure) for remote patient monitoring, and
26, 2021; accepted May 3, 2021. Date of publication May 11, 2021;
date of current version January 7, 2022. This work was supported by smart city sensors (air pollutant gases, temperature, luminos-
the UAE University UPAR Grant 12N008/31N456. (Corresponding author: ity, air pressure, and proximity sensors). Indeed, modeling the
Atef Abdrabou.) input traffic to these IoT gateways is of paramount importance
Atef Abdrabou, Maitha Saif Al Darei, and Monika Prakash are with the
Department of Electrical Engineering, UAE University, Al-Ain, UAE (e-mail: for evaluating the packet delay performance (e.g., via queuing
atef.abdrabou@uaeu.ac.ae; 201103856@uaeu.ac.ae; 201790521@uaeu.ac.ae). analysis) of the aggregated data and allocating the backbone
Weihua Zhuang is with the Department of Electrical and Computer network resources. Thus, we focus on the characterization of
Engineering, University of Waterloo, Waterloo, ON N2L 3G1, Canada (e-mail:
wzhuang@uwaterloo.ca). the incoming traffic to WiFi-based IoT gateways from IoT
Digital Object Identifier 10.1109/JIOT.2021.3079115 devices and the scaling of the WiFi network connecting the
2327-4662
c 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: INDIAN INST OF INFO TECH AND MANAGEMENT. Downloaded on November 20,2023 at 05:23:42 UTC from IEEE Xplore. Restrictions apply.
1160 IEEE INTERNET OF THINGS JOURNAL, VOL. 9, NO. 2, JANUARY 15, 2022
IoT devices with the gateways. The objective is to achieve the authors propose a model for periodic uplink reporting
an efficient allocation of the backbone radio resources and a for cellular smart city applications (e.g., metering reports of
successful realization of the second architecture. gas/water/electric consumptions, smart agriculture, and smart
The contribution of this research is threefold. First, the environment). In this model, each device is assigned a report-
packet interarrival time of the incoming IoT traffic to a ing period with a Pareto-distributed packet length [12], with
WiFi-based IoT gateway is characterized for widely used IoT direct communications between IoT devices and a cellular
applications, such as video surveillance, smart city, and e- network. Metzger et al. [13] addressed the validity of using
healthcare. The three applications constitute a major part of a Poisson approximation to model the arrival of aggregated
a wide smart city vision realized by IoT/M2M devices to periodic IoT traffic at a cloud server. Majumdar et al. [14]
enhance the welfare and quality of life of city residents [3], [5]. presented fitted statistical distributions to the empirical distri-
This is achieved through the integration of different services butions of packet interarrival times of some smart home appli-
that target: 1) the security (video surveillance, proximity sens- cations, such as temperature, air pressure, light, and motion
ing, and luminosity detection) and 2) health (ECG, EMG, sensors. López-Benítez et al. [15] provided a mathematical
and blood pressure measurements) of human beings, in addi- model for the packet interarrival times of the aggregated traffic
tion to essential environmental factors, such as temperature, of a number of homogeneous sources representing tempera-
humidity, pressure, and air pollutant gases through wide-area ture, light, or motion sensors. The works of [14] and [15] focus
monitoring. Different traffic patterns of these applications are on homogenous traffic from specific types of IoT sensors and
constructed from traffic traces (obtained from real devices do not include the effect of the communication technology
using lab experiments) and examined in a realistic setting used to aggregate the traffic.
using a virtual-machine-based network emulator. Some research works focus on IoT traffic classification
Second, we propose an analytical estimation of the num- for security purposes. Nguyen-An et al. [16] computed the
ber of IoT devices running similar or different applications entropy value of the parameters of IoT traffic, generated by
that can connect through a WiFi network to a gateway or a a software tool, to identify the device creating the traffic.
fog node without causing a significant access delay variation Similarly, Sivanathan et al. [17] proposed an architecture for
or packet loss due to collisions. Third, based on the experi- IoT traffic classification to autonomously detect IoT devices.
mental findings, an end-to-end delay performance analysis for Other researchers focus on studying IoT traffic characteris-
transferring the aggregated traffic from a gateway or fog node tics for different purposes, such as investigating the effect on
over a backbone communication link is provided. network storage and traffic [18] and examining the impact on
The remainder of this article is organized as follows. long-range networks (LoRA) [19].
Section II surveys the most relevant related works. Section III To the best of our knowledge, no other work in the litera-
describes the proposed system model. In Section IV, the details ture addresses the characterization of the aggregated incoming
of the experimental setups used to generate real IoT traffic traffic to WiFi-based IoT gateways for three major types of
traces are provided. Section V introduces and analyzes the applications (video surveillance, smart city, and e-healthcare),
emulated lab environment utilized to characterize the incom- considering inhomogeneous sources of different application
ing traffic of a WiFi-based IoT gateway. The results and the types. Moreover, our work is based on traffic data cap-
major findings of the performed experiments are presented in tured from realistic experimental setups that mimic real-life
Section VI. Using the experimental findings, Section VII intro- scenarios.
duces a mathematical analysis for the end-to-end packet delay
of IoT gateways/fog nodes when connected to a backbone
network. Finally, Section VIII concludes this research. III. S YSTEM M ODEL
Consider a three-tier topology in the system model. This
topology divides the IoT system into three layers, namely, the
II. R ELATED W ORKS perception, network, and application [20]. Here, the system
The research on IoT traffic characterization is still in model considers the incoming flow of data from the devices
its infancy stages [8]. It has been shown that conventional located in the perception layer and received by an IoT gateway
approaches, including the standard Poisson process, are inad- or fog node in the network layer. The perception layer accom-
equate to model IoT traffic [9]. According to [10], the char- modates different types of devices and sensors that represent
acteristics of aggregated periodic IoT data using the Poisson a wide range of IoT applications, such as e-healthcare, smart
process can introduce large errors on performance metrics of city, and video surveillance. Furthermore, such applications
interest. can provide a mixture of traffic that is acquired in real-time
The Third-Generation Partnership Project (3GPP) associa- or nonreal time.
tion suggests modeling the distribution of data transfer events Our system model follows the general consensus that the
generated (over some period of time) by a large number traffic generated in IoT networks tends to be more uplink than
of machine-type communication (MTC) devices connected downlink [19]. Thus, a gateway/fog node can be deployed in
directly to an LTE network by either uniform distribution for the network layer in order to collect the data coming from
nonsynchronized traffic or Beta distribution for synchronized different IoT devices in the perception layer for further anal-
one [11]. However, this model does not target packet inter- ysis and transmission to cloud management servers through a
arrival time to IoT gateways over a WiFi network. In [12], wireless cellular (4G/5G) backbone. The gateway is directly
Authorized licensed use limited to: INDIAN INST OF INFO TECH AND MANAGEMENT. Downloaded on November 20,2023 at 05:23:42 UTC from IEEE Xplore. Restrictions apply.
ABDRABOU et al.: APPLICATION-ORIENTED TRAFFIC MODELING OF WiFi-BASED INTERNET OF THINGS GATEWAYS 1161
Authorized licensed use limited to: INDIAN INST OF INFO TECH AND MANAGEMENT. Downloaded on November 20,2023 at 05:23:42 UTC from IEEE Xplore. Restrictions apply.
1162 IEEE INTERNET OF THINGS JOURNAL, VOL. 9, NO. 2, JANUARY 15, 2022
of 937 Bytes for ECG data, 1054 Bytes for EMG data, and
939 Bytes for blood-pressure data. The overall average data Fig. 5. Experimental emulation setup.
rate of the three sensors is 49 kb/s.
B. Smart City The camera transmits fixed-size packets (1358 Bytes each)
This trace contains a variety of measured quantities, which with a data rate of around 410 kb/s.
are likely to be monitored in most smart city initiatives, as in
the following. V. I OT N ETWORK E XPERIMENTAL S ETTING AND
The concentration of three gases (carbon dioxide, nitrogen G ATEWAY L OAD A NALYSIS
dioxide, and carbon monoxide) and a group of air pollutant In order to mimic the system model, two IoT network
gases (Air Pollutants II [24]) are monitored in an indoor loca- experimental setups are constructed. The first setup is emu-
tion with normal air concentration using different sensors. lation based. It uses virtual machines in order to emulate the
Luminosity is also sensed. A reading is obtained from each application nodes to provide large-scale experiments that can-
one of these sensors every 1 s. not be performed in a lab environment. The second setup is
Moreover, temperature, humidity, and pressure are moni- laboratory based. It is mainly used to validate the emulation-
tored with a sensor connected to the Waspmote board. A based scheme. The following section describes both setups,
proximity sensor is also used with a sample rate of 40 Hz. the examined traffic patterns, the analytical technique used to
The packets generated by the aforementioned Waspmote determine the number of application nodes employed in each
board sensors are sent wirelessly through a WiFi router and experiment, and the validation of the emulation-based setup.
captured by Wireshark, as depicted in Fig. 3. The packet size
varies according to the sensor type. It is around 124 Bytes A. Emulated Experimental Setup
for gas sensors, 114 Bytes for the temperature, humidity, air
This setup uses the common open research emulator
pressure, and proximity sensors, whereas it is 77 Bytes for the
(CORE) tool [28] for emulating the application nodes under
light sensor. The average rate of the data sent from the sensor
study. Opposite to discrete-event computer simulation, the
board is around 1.2 kb/s.
tool builds a virtual network of virtual machines (nodes)
that operate in real time. Therefore, it can run the full-
C. Video Surveillance fledged version of Linux applications over a real TCP/IP
The video surveillance traffic trace is obtained using a protocol stack. It is typically used when the required size
network camera to generate a live streaming video (real-time of the actual test network is large. In the setup, a node is
traffic). The camera is configured to stream a UDP live video used to serve as an IoT gateway, or a fog node is placed
in moving picture expert group transport stream (MPEG TS) in a location where it can communicate to the other nodes
format using the videoLAN client (VLC) media player via a as shown in Fig. 5. The rest of the nodes are IoT traffic
WiFi network as illustrated in Fig. 4. The video trace is cap- generators, where each node runs one of the aforementioned
tured using Wireshark by a PC connected to the same network. trace files obtained using the experimental setups introduced
Authorized licensed use limited to: INDIAN INST OF INFO TECH AND MANAGEMENT. Downloaded on November 20,2023 at 05:23:42 UTC from IEEE Xplore. Restrictions apply.
ABDRABOU et al.: APPLICATION-ORIENTED TRAFFIC MODELING OF WiFi-BASED INTERNET OF THINGS GATEWAYS 1163
TABLE I
in Section IV. The number of nodes that replay a specific IEEE 802.11 G S YSTEM PARAMETERS [29]
application trace file is determined based on the traffic pat-
tern introduced in Section V-B. In the emulator, the nodes
are connected with the gateway through a WiFi network that
implements the IEEE 802.11 MAC protocol. The effect of
the physical channel is emulated by making the data rate ri
allocated to each node randomly assigned for every exper-
iment sample, where ri ∈ {6, 9, 12, 18, 24, 36, 48, 54} Mb/s
since the wireless coverage and physical channel impairments
affect the received signal-to-noise ratio (SNR) at the WiFi
interface card. This accounts for changing the surroundings
or even node locations to different spots, leading to differ-
ent WiFi signal coverage quality, while rate adaptation is in
place. Consequently, it mimics the WiFi transceiver’s behavior
in practice, which adaptively selects the modulation scheme
and data transmission rate based on the channel condition. In
addition, the starting time of sending traffic for each node is
randomly determined for unsynchronized traffic. This captures saturation. This leads to the risk of packet loss due to packet
the variations of the main network parameters that affect traf- collisions, which cause a large service time variance within
fic characterization, targeted by this study across the samples this operation region. Therefore, the network should operate
of different experiments. in a region where the standard deviation of the service time is
much smaller than its average. It has been shown in [31] that
this region satisfies the condition
B. Application-Oriented Traffic Patterns
Seven traffic patterns are investigated. Three patterns g α(n − 1) 1 (1)
include homogenous traffic, namely, Pattern 1 video surveil-
lance traffic, Pattern 2 smart city traffic, and Pattern 3 where α is the probability of a nonempty node buffer and n
e-health traffic. The inhomogeneous traffic is represented by is the number of IoT nodes.
the remaining four patterns, which include a mix of the three Also, this region is marked by a small collision probability
types of applications under study. Pattern 4 consists of equally pc , which implies the probability of at least one other node
mixed traffic of e-health, smart city, and video surveillance. simultaneously transmits with the tagged node and can be
The majority of Pattern 5 traffic is e-health, whereas the major- calculated as
ity of Pattern 6 and 7 traffic come from video surveillance and pc = 1 − (1 − αpt )n−1 . (2)
smart city sources, respectively.
In (2), pt is transmission probability in any time slot of the
C. IoT Gateway Load Analysis backoff period. It can be obtained as
We want to estimate the number of IoT nodes generating 1
pt = (3)
homogeneous or inhomogeneous traffic connected to a WiFi- E[B]
based gateway or a fog node, without causing a significant
where E[B] is the average backoff period. The condition in (1)
likelihood of packet loss, either due to packet collisions or
can be satisfied for a small value of α (e.g., g ≤ 0.1). This
large access delay variations. It is to allow all the packets gen-
leads to a small pc , which can be calculated from (2) as
erated by the IoT nodes to reach the gateway for a reliable data
transfer.1 Thus, the characterized incoming traffic includes all α(n − 1)
pc ≈ . (4)
the packets sent to the gateway assuming the packet loss is E[B]
negligible. The average backoff period can be approximated, in the case
It is worth noting that the number of IoT nodes provided of a low pc , as [31]
by the analysis is used to calculate the number of virtual IoT
nodes in the emulation-based setup that replay the trace files 1 − pc CWmin
E[B] ≈ σ (5)
and transmit them to the emulated gateway/fog node. 1 − 2pc 2
It has been shown in [30] and [31] that the channel access where σ is the slot time and Wmin is the minimum contention
delay (service time) of an IEEE 802.11 WiFi network and window size.
packet collision probability steeply increase as the packet In addition, α can be obtained from
arrival rate of the WiFi nodes increases toward saturation.
Consequently, increasing the number of nodes results in a α = λE[St ] (6)
coarse change in the network load and a faster approach toward
where E[St ] is the average service time given by
1 Packet loss due to channel impairments is assumed to be alleviated
fc pc
by IEEE 802.11 frame retransmissions and the adaptive transmission rate E[St ] = E[Ft ] + [1 + α(n − 1)] + E[B]. (7)
adjustment, which is implemented in almost all commercial WiFi hardware. 2 1 − pc
Authorized licensed use limited to: INDIAN INST OF INFO TECH AND MANAGEMENT. Downloaded on November 20,2023 at 05:23:42 UTC from IEEE Xplore. Restrictions apply.
1164 IEEE INTERNET OF THINGS JOURNAL, VOL. 9, NO. 2, JANUARY 15, 2022
Authorized licensed use limited to: INDIAN INST OF INFO TECH AND MANAGEMENT. Downloaded on November 20,2023 at 05:23:42 UTC from IEEE Xplore. Restrictions apply.
ABDRABOU et al.: APPLICATION-ORIENTED TRAFFIC MODELING OF WiFi-BASED INTERNET OF THINGS GATEWAYS 1165
Authorized licensed use limited to: INDIAN INST OF INFO TECH AND MANAGEMENT. Downloaded on November 20,2023 at 05:23:42 UTC from IEEE Xplore. Restrictions apply.
1166 IEEE INTERNET OF THINGS JOURNAL, VOL. 9, NO. 2, JANUARY 15, 2022
TABLE II
D ISTRIBUTION PARAMETERS OF D IFFERENT T RAFFIC PATTERNS
Fig. 8. CDF for Pattern 1. Fig. 9. AD parameters for synchronized video surveillance traffic.
respectively
FF1 (x) = 1 − e−(x/μ) (15)
FF2 (x) = 1 − (1 + ξ (x − h)/s)−1/ξ (16)
(−x/k)λ
FF3 (x) = 1 − e . (17)
The empirical distribution is then matched to the nearest
distribution, i.e., the distribution with the lowest overall abso-
lute distribution distance parameters. Table II shows the values
of the parameters of the fitted distributions.
B. Results
1) Traffic Pattern 1 (Only Video Surveillance Traffic):
Fig. 10. AD parameters for unsynchronized video surveillance traffic.
Fig. 8 shows an example of how the empirical CDF compares
to the CDFs of the exponential, Weibull, and Pareto distribu-
tions in the synchronized case. Although the three distributions 2) Traffic Pattern 2 (Only Smart City Traffic): Figs. 11(a)
look close to the empirical one for the synchronized case, the and 12(a) show the AD results for the smart city traffic when
Weibull distribution has the lowest AD parameters as revealed IoT smart city nodes are synchronized and unsynchronized,
in Fig. 9. The average and standard deviation of the AD of respectively. The Pareto distribution is the lowest in AD aver-
Weibull distribution are the lowest among the distributions in age and standard deviation, and hence, considered the closest
the unsynchronized case as depicted in Fig. 10. This implies distribution to characterize this traffic pattern.
that the Weibull distribution is the closest distribution to model 3) Traffic Pattern 3 (Only eHealth Traffic): Fig. 11(b)
the packet interarrival time for video surveillance traffic. shows that the Pareto distribution has the lowest AD
Authorized licensed use limited to: INDIAN INST OF INFO TECH AND MANAGEMENT. Downloaded on November 20,2023 at 05:23:42 UTC from IEEE Xplore. Restrictions apply.
ABDRABOU et al.: APPLICATION-ORIENTED TRAFFIC MODELING OF WiFi-BASED INTERNET OF THINGS GATEWAYS 1167
Fig. 11. AD parameters for synchronized traffic Patterns 2, 3, and 4. (a) Smart city traffic. (b) eHealth traffic. (c) Equally-mixed traffic.
Fig. 12. AD parameters for unsynchronized traffic Patterns 2, 3, and 4. (a) Smart city traffic (unsync). (b) eHealth traffic (unsync). (c) Equally-mixed traffic
(unsync).
Fig. 13. AD parameters for synchronized traffic Patterns 5, 6, and 7. (a) Majority smart city traffic. (b) Majority video surveillance traffic. (c) Majority
eHealth traffic.
parameters among the three distributions for synchronized 5) Traffic Pattern 5 (Majority Smart City Traffic): This
eHealth traffic. Similarly, for unsynchronized eHealth traf- traffic pattern represents a scenario in which the majority of
fic, Pareto distribution has the lowest maximum, average, the traffic comes from smart city sources. It is noticed from
and standard deviation of AD among the examined dis- Figs. 13(a) and 14(a) that the Weibull distribution has the
tributions, as revealed in Fig. 12(b). This indicates that smallest maximum, average, and standard deviation of AD
the Pareto distribution is the nearest to the empiri- among the other distributions.
cal one. 6) Traffic Pattern 6 (Majority Video Surveillance Traffic):
4) Traffic Pattern 4 (Equally Mixed Traffic): Figs. 11(c) The majority of the sources for this traffic pattern are video
and 12(c) show the AD maximum value, average, and stan- surveillance cameras. It is observed from Figs. 13(b) and 14(b)
dard deviation for the synchronized and unsynchronized cases, that the lowest AD parameters can be obtained using the
respectively, when the traffic consists of an equal mix of video Weibull distribution.
surveillance, eHealth, and smart city data (i.e., each is orig- 7) Traffic Pattern 7 (Majority eHealth Traffic): This traffic
inated from the same number of IoT nodes). The Weibull pattern is formed when the majority of the sending sources
distribution is the closest one to the empirical distribution, are eHealth sensors. Figs. 13(c) and 14(c) show that the
according to the AD parameters, for both the synchronized Weibull distribution is the nearest one to match the empirical
and unsynchronized cases. distribution since it has the lowest AD maximum, average,
Authorized licensed use limited to: INDIAN INST OF INFO TECH AND MANAGEMENT. Downloaded on November 20,2023 at 05:23:42 UTC from IEEE Xplore. Restrictions apply.
1168 IEEE INTERNET OF THINGS JOURNAL, VOL. 9, NO. 2, JANUARY 15, 2022
Fig. 14. AD parameters for unsynchronized traffic Patterns 5, 6, and 7. (a) Majority smart city traffic (unsync). (b) Majority video surveillance traffic
(unsync). (c) Majority eHealth traffic (unsync).
ρSt c2v
E[D] ≈ + St (18)
2(1 − ρ)
where cv is the coefficient of variation of the packet interarrival
time and ρ is the queue utilization factor.
In the sequel, we provide a numerical comparison between
the measured end-to-end packet delay using the CORE emu-
lator and the analytically calculated average packet delay
using (18) for three packet interarrival time distributions, Fig. 16. End-to-end delay from a WiFi gateway to a management server
namely, exponential, Weibull, and generalized Pareto. The (smart city pattern).
aim is to show the impact of the interarrival time distribu-
tion on radio resource allocation. The emulation is performed
by using a packet trace of a specific traffic pattern as the figure compares the average delay measured by the emula-
input of an IoT gateway or fog node for each sample. The tor for the video surveillance traffic pattern with the delay
emulated configuration includes a gateway connected to a calculated by (18) for the aforementioned interarrival time
cloud data management server via a 4G or 5G wireless link. distributions. Apparently, Fig. 15 reveals that the average
The wireless link rate is varied to reflect the availability of end-to-end delay is generally closer to the one analytically
different amounts of radio resources, which depend on the obtained with the Weibull distribution than with the other dis-
number of gateways (or fog nodes), the background traffic of tributions over different utilization factor values. Similarly,
the backbone network, and channel condition. Consequently, Fig. 16 shows that the measured average end-to-end delay
the impact of channel impairments (i.e., pathloss, fading, and best matches the values calculated using (18) for gener-
interference) is represented by the available data rate for the alized Pareto distribution. Indeed, the results depicted by
wireless link. Figs. 15 and 16 are in agreement with the results shown in
Fig. 15 shows the average end-to-end delay that the Section VI-B for the same patterns. The figures also depict that
packets from an IoT gateway/fog node experience when the assumption of the exponential distribution for the inter-
transferred over a link for different available link capac- arrival time leads to underestimating the average end-to-end
ity (represented as different utilization factor values). The delay.
Authorized licensed use limited to: INDIAN INST OF INFO TECH AND MANAGEMENT. Downloaded on November 20,2023 at 05:23:42 UTC from IEEE Xplore. Restrictions apply.
ABDRABOU et al.: APPLICATION-ORIENTED TRAFFIC MODELING OF WiFi-BASED INTERNET OF THINGS GATEWAYS 1169
VIII. C ONCLUSION [8] A. Sivanathan et al., “Characterizing and classifying IoT traffic in smart
cities and campuses,” in Proc. IEEE Conf. Comput. Commun. Workshops
We have investigated the characterization of incoming traf- (INFOCOM WKSHPS), May 2017, pp. 559–564.
fic at WiFi-based IoT gateways or fog nodes, since it is pivotal [9] E. Soltanmohammadi, K. Ghavami, and M. Naraghi-Pour, “A survey of
for allocating the resources of the backbone network connect- traffic issues in machine-to-machine communications over LTE,” IEEE
Internet Things J., vol. 3, no. 6, pp. 865–884, Dec. 2016.
ing IoT nodes to cloud servers. This characterization includes [10] T. Hossfeld, F. Metzger, and P. E. Heegaard, “Traffic modeling for aggre-
homogeneous and nonhomogeneous traffic patterns of popular gated periodic IoT data,” in Proc. 21st Conf. Innov. Clouds Internet Netw.
IoT applications, such as video surveillance, e-healthcare, and Workshops (ICIN), Feb. 2018, pp. 1–8.
smart city, used in the area covered by the gateway or fog [11] “Study on RAN improvements for machine-type, Version 11.0.0,” 3GPP,
Sophia Antipolis, France, Rep. 37.868, Sep. 2011.
node. [12] “Cellular system support for ultra-low complexity and low through-
Real IoT data traces are generated in a laboratory setting put Internet of Things (CIoT) version 2.1.0,” 3GPP, Sophia Antipolis,
and used to generate the studied traffic patterns via a virtual France, Rep. 45.820, Aug. 2015.
[13] F. Metzger, T. Hossfeld, A. Bauer, S. Kounev, and P. E. Heegaard,
machine-based network emulation validated by a hardware- “Modeling of aggregated IoT traffic and its application to an IoT cloud,”
based replica in another lab setup. The WiFi network scale in Proc. IEEE, vol. 107, no. 4, pp. 679–694, Apr. 2019.
terms of the number of IoT nodes is analyzed and determined [14] C. Majumdar, M. López-Benítez, and S. N. Merchant, “Real smart home
data-assisted statistical traffic modeling for the Internet of Things,” IEEE
for a low probability of packet collisions and small access Internet Things J., vol. 7, no. 6, pp. 4761–4776, Jun. 2020.
delay variations to achieve negligible packet loss, assuming [15] M. López-Benítez, C. Majumdar, and S. N. Merchant, “Aggregated traf-
date rate adaptation is in place to mitigate physical channel fic models for real-world data in the Internet of Things,” IEEE Wireless
impairments. Commun. Lett., vol. 9, no. 7, pp. 1046–1050, Jul. 2020.
[16] H. Nguyen-An, T. Silverston, T. Yamazaki, and T. Miyoshi, “IoT traffic:
It is observed that the generalized Pareto distribution is Modeling and measurement experiments,” Internet Things, vol. 2, no. 1,
the closest among other common distributions to match the pp. 140–162, Feb. 2021.
empirical packet interarrival time distribution at a WiFi-based [17] A. Sivanathan, H. H. Gharakheili, and V. Sivaraman, “Detecting behav-
ioral change of IoT devices using clustering-based network traffic
IoT gateway or fog node for homogeneous e-healthcare and modeling,” IEEE Internet Things J., vol. 7, no. 8, pp. 7295–7309,
smart city traffic. On the other hand, the Weibull distribution Aug. 2020.
is found to be the nearest distribution to match the empirical [18] E. Batista, L. Andrade, R. Dias, A. Andrade, G. Figueiredo, and
C. Prazeres, “Characterization and modeling of IoT data traffic in the
packet interarrival time for homogeneous video surveillance Fog of Things paradigm,” in Proc. IEEE 17th Int. Symp. Netw. Comput.
and any other inhomogeneous traffic pattern (a traffic mix of Appl. (NCA), 2018, pp. 1–8.
the three applications) irrespective of whether the IoT traffic [19] V. Gupta, S. K. Devar, N. H. Kumar, and K. P. Bagadi, “Modelling
sources are synchronized or not. Analyzing the average end- of IoT traffic and its impact on LoRaWAN,” in Proc. IEEE Global
Commun. Conf. (GLOBECOM), 2017, pp. 1–6.
to-end delay for a backbone link connecting a gateway/fog [20] J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang, and W. Zhao, “A sur-
node to a cloud entity using these packet interarrival time find- vey on Internet of Things: Architecture, enabling technologies, security
ings reveals accurate results. This implies that the exponential and privacy, and applications,” IEEE Internet Things J., vol. 4, no. 5,
pp. 1125–1142, Oct. 2017.
interarrival time is not suitable to model the packet interarrival [21] T. Lin, C. Lee, J. Cheng, and W. Chen, “PRADA: Prioritized random
time at WiFi-based IoT gateways or fog nodes. In addition, access with dynamic access barring for MTC in 3GPP LTE-A networks,”
the WiFi random access scheme affects the packet interar- IEEE Trans. Veh. Technol., vol. 63, no. 5, pp. 2467–2472, Jun. 2014.
[22] M. Gerasimenko, V. Petrov, O. Galinina, S. D. Andreev, and
rival time at the gateway, making it not exactly following Y. Koucheryavy, “Energy and delay analysis of LTE-Advanced
any of the distributions commonly used for traffic modeling RACH performance under MTC overload,” in Proc. IEEE Globecom
(such as the exponential, Weibull, and generalized Pareto), Workshops, 2012, pp. 1632–1637.
although the number of IoT nodes is set to keep access delay [23] P. Zhou, H. Hu, H. Wang, and H. Chen, “An efficient random access
scheme for OFDMA systems with implicit message transmission,” IEEE
variations low. Trans. Wireless Commun., vol. 7, no. 7, pp. 2790–2797, Jul. 2008.
[24] Waspmote. Accessed: Mar. 26, 2021. [Online]. Available:
http://www.libelium.com/products/waspmote/
R EFERENCES [25] Introduction to Intel Galileo Boards. Accessed: Mar. 26, 2021.
[1] D. Miorandi, S. Sicari, F. De Pellegrini, and I. Chlamtac, “Internet of [Online]. Available: https://www.intel.com/content/www/us/en/support/
Things: Vision, applications and research challenges,” Ad Hoc Netw., articles/000005912/boards-and-kits/intel-galileo-boards.html
vol. 10, no. 7, pp. 1497–1516, 2012. [26] M. Singh, B. Singh, and V. K. Banga, “Effect of ECG sam-
[2] L. Atzori, A. Iera, and G. Morabito, “The Internet of Things: A survey,” pling frequency on approximate entropy based HRV,” Int. J. Biosci.
Comput. Netw., vol. 54, no. 15, pp. 2787–2805, 2010. Biotechnol., vol. 6, pp. 179–186, Aug. 2014.
[3] Y. Mehmood, F. Ahmad, I. Yaqoob, A. Adnane, M. Imran, and [27] H. Chen, Y. Zhang, Z. Zhang, Y. Fang, H. Liu, and C. Yao, “Exploring
S. Guizani, “Internet-of-Things-based smart cities: Recent advances and the relation between EMG sampling frequency and hand motion recog-
challenges,” IEEE Commun. Mag., vol. 55, no. 9, pp. 16–24, Sep. 2017. nition accuracy,” in Proc. IEEE Int. Conf. Syst. Man Cybern. (SMC),
[4] H. G. Moussa and W. Zhuang, “RACH performance analysis for large- Oct. 2017, pp. 1139–1144.
scale cellular IoT applications,” IEEE Internet Things J., vol. 6, no. 2, [28] J. Ahrenholz, “Comparison of CORE network emulation platforms,” in
pp. 3364–3372, Apr. 2019. Proc. MILCOM Mil. Commun. Conf., Oct. 2010, pp. 166–171.
[5] Y. Mehmood, N. Haider, M. Imran, A. Timm-Giel, and M. Guizani, [29] Part 11: Wireless LAN Medium Access Control (MAC) and Physical
“M2M communications in 5G: State-of-the-art architecture, recent Layer (PHY) Specifications: Further Higher-Speed Physical Layer
advances, and research challenges,” IEEE Commun. Mag., vol. 55, no. 9, Extension in the 2.4 GHz Band, IEEE Standard 802.11g/D1.1, 2001.
pp. 194–201, Sep. 2017. [30] H. Zhai, Y. Kwon, and Y. Fang, “Performance analysis of IEEE 802.11
[6] V. B. Mišić, J. Mišić, X. Lin, and D. Nerandzic, “Capillary machine-to- MAC protocols in wireless LANs,” Wireless Commun. Mobile Comput.,
machine communications: The road ahead,” in Proc. Int. Conf. Ad-Hoc vol. 4, pp. 917–931, Dec. 2004.
Netw. Wireless, 2012, pp. 413–423. [31] A. Abdrabou and W. Zhuang, “Stochastic delay guarantees and statisti-
[7] M. Chiang and T. Zhang, “Fog and IoT: An overview of research cal call admission control for IEEE 802.11 single-hop ad hoc networks,”
opportunities,” IEEE Internet Things J., vol. 3, no. 6, pp. 854–864, IEEE Trans. Wireless Commun., vol. 7, no. 10, pp. 3972–3981,
Dec. 2016. Oct. 2008.
Authorized licensed use limited to: INDIAN INST OF INFO TECH AND MANAGEMENT. Downloaded on November 20,2023 at 05:23:42 UTC from IEEE Xplore. Restrictions apply.
1170 IEEE INTERNET OF THINGS JOURNAL, VOL. 9, NO. 2, JANUARY 15, 2022
[32] V. Paxson and S. Floyd, “Wide area traffic: The failure of Poisson Monika Prakash received the bachelor’s degree
modeling,” IEEE/ACM Trans. Netw., vol. 3, no. 3, pp. 226–244, in computer science and engineering from Anna
Jun. 1995. University, Chennai, India, in 2011, and the M.Tech.
[33] A. Feldmann, Characteristics of TCP Connection Arrivals. New York, degree in computer networks and communications
NY, USA: Wiley-Blackwell, 2002, ch. 15, pp. 367–399. from the International Institute of Information
[34] R. Singhai, S. D. Joshi, and R. K. P. Bhatt, “Offered-load model for Technology Bangalore, Bengaluru, India, in
Pareto inter-arrival network traffic,” in Proc. IEEE 34th Conf. Local 2013.
Comput. Netw., 2009, pp. 364–367. She is a Ph.D. Research Fellow with the
[35] A. Tamazian and M. Bogachev, “Analytical and numerical estimates Department of Electrical Engineering, UAE
of the Weibull/M/1 and Weibull/Weibull/1 queues efficiency,” in Proc. University, Al Ain, UAE. Her current research
IEEE NW Russia Young Res. Elect. Electron. Eng. Conf. (EIConRusNW), interests include resource allocation in multihomed
2015, pp. 110–113. wireless networks (Wi-Fi, 4G/5G), machine-to-machine communications,
[36] T. Paul and T. Ogunfunmi, “Wireless LAN comes of age: Understanding and the Internet of Things.
the IEEE 802.11n amendment,” IEEE Circuits Syst. Mag., vol. 8, no. 1,
pp. 28–54, Mar. 2008.
[37] B. Vujicic, “Modeling and characterization of traffic in public safety
wireless networks,” Ph.D. dissertation, School Eng. Sci., Simon Fraser
Univ., Burnaby, BC, Canada, 2006.
[38] W. G. Marchal, “An approximate formula for waiting time in single
server queues,” AIIE Trans., vol. 8, no. 4, pp. 473–474, 1976.
Authorized licensed use limited to: INDIAN INST OF INFO TECH AND MANAGEMENT. Downloaded on November 20,2023 at 05:23:42 UTC from IEEE Xplore. Restrictions apply.