# Impact of Long-Range Dependent Traffic in IoT Local Wireless Networks on Backhaul Link Performance

- 120 Downloads

## Abstract

Performance evaluation in Internet of Things (IoT) networks is becoming more and more important due to the increasing demand for quality of service (QoS). In addition to basic statistical properties based on the distribution of interarrival times of packets, actual network traffic exhibits correlations over a wide range of time scales associated with long-range dependence (LRD). This article focuses on examining the impact of both LRD and number of nodes that transmit packets in a typical IoT wireless local network, on performance of the backhaul link. The analysis of latency and packet loss led to an interesting observation that the aggregation of packet streams, originating from single nodes, lowers the importance of LRD, even causing an underestimation of performance results when compared to the queueing system with Markovian input.

## Keywords

IoT wireless network Backhaul link Long-range dependence Traffic analysis Performance evaluation## 1 Introduction and Related Work

Internet of Things (IoT) wireless networks integrate many physical devices and sensors that send data through wire or wireless connections and have different architectures (e.g. fog, edge, cloud). Because of the heterogeneity of IoT systems it is not easy task to design reliable and efficient communication systems [8]. One of the big issue is energy consumption, which depends on: incorrect selection of the microcontroller, energy-inefficient software [3] or communication protocol parameters [12]. Another big issue is the impact of offered load on quality of service (QoS) and quality of experience (QoE), especially for interactive or streaming services. There are two main measures in terms of QoS that relate to end-to-end connection performance: packet loss and latency. This article presents the results of these measures for different scenarios, taking into account long-range dependent (LRD) feature of the traffic.

Wireless communication in IoT networks is usually based on one of the Medium Access Control (MAC) protocols: Time Division Multiple Access (TDMA) or Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA). In TDMA protocol each node is assigned a time slot for data transmission in a predetermined order. The main disadvantage of this system is that it requires accurate synchronization, which reduces the efficiency of the entire system. The second MAC protocol widely used in IoT systems is well known CSMA/CA (example use: IEEE 802.11 family, IEEE 802.15.4, etc.), that was extensively studied in many articles. Comprehensive study on the throughput, delay and stability performance of CSMA networks was presented in [6]. The problem of stable throughput and bounded mean delay was discussed in [24]. Another interesting contribution in the area of CSMA/CA protocols was a proposition of Handshake Sense Multiple Access with Collision Avoidance (HSMA/CA) protocol [19], which protects a densely deployed network from the classical hidden and exposed terminal problems. This idea was developed using Markov modeling and simulations. Recently, authors of [9] considered maximum effective throughput and suggested that the minimum mean access delay parameter of CSMA/CA system is of great practical interest.

Network traffic affects the reliability and performance of a network. Information on the statistical distribution of interarrival times of packets is not sufficient for evaluation of network performance, since actual network traffic exhibits second-order properties associated with long-range dependence (LRD) [1, 20]. It is very important to consider LRD, because of the impact on queueing performance [16]. Many models were developed from the properties of fractional Gaussian noise [17] or fractional autoregressive moving average process [4]. One of the most popular model that incorporates LRD properties is on/off source, recently analyzed in [25]. There is also a modified version of the Pareto on/off model [13], which is used further in this article.

Network traffic analysis and modeling is crucial for design and implementation of efficient and reliable transmission networks. It helps explain possible problems before they occur. The simulation results can be used to identify anomalies [5, 7, 10] or detect Distributed Denial of Service flood attacks [11, 15]. Furthermore, most of the symptoms that lead to congestion and high level of packet loss rate can be detected in the simulation process of network traffic [2, 23].

Experimenting with physical devices is uneconomical in the first phase of the project, especially if the number of devices is large. Therefore, the simulation approach is optimal in developing new methods and testing new scenarios. For the purposes of this article, all simulations were carried out using OMNeT++ framework [21, 22], which is a powerful open-source discrete event simulation tool. In fact, it is component-based C++ simulation library and framework, but instead of providing components specifically for computer networks, it includes generic component architecture to create any simulation.

The article is organized as follows. Next section characterizes basic properties of long-range dependence and introduces estimation methods used in further sections of this paper. Section 3 presents considered network structure as well as the model of network traffic generated by single node. In addition, it contains all the statistics for the reference queueing system, which are further studied from the point of view of performance evaluation. In Sect. 4, the results obtained for the analyzed network are then compared with the corresponding statistics of a commonly used queueing model described in Sect. 3.3.

## 2 Long-Range Dependence

### 2.1 Basic Properties

*Y*(

*t*) be the stationary stochastic process. The following simple equation describes the relationship for the process that is rescaled in time:

*a*is a stretching factor and

*H*is the Hurst exponent and \(\overset{d}{=}\) denotes equality in distributions. If \(0.5< H < 1\) then second-order properties associated with correlation structure are preserved regardless of scaling in time and the process becomes LRD. The higher value of H the stronger dependence. The autocorrelation function for the incremental process \(X(i) = Y(i) - Y(i-1)\), \(i=1,2,...\), which reflects the similarity between

*X*(

*i*) and \(X(i+k)\), has the following form:

### 2.2 Estimation

*X*(

*n*) for discrete times \(n=0,1,...,N\) that corresponds to fixed-length intervals:

*m*denotes the level of aggregation, i.e.:

*X*. It can be easily seen that if one performs logarithmic operation on both sides of (6) then Hurst exponent can be estimated from the slope of linear regression (\(2H-2\)) for all aggregated samples according to (4).

*X*for period

*L*:

*c*is a positive value. As with the variance-time method, one can use the linear regression to get the estimated \(\tilde{H}\) from the slope (\(2H-1\)).

*X*. Although the estimation operation is done in the frequency domain, the Hurst exponent can also be calculated from linear regression. In this case, the FFT values should be taken as the regression points. LRD refers to the lowest frequencies, which is reflected in the formula (8), where most of the energy concentrates near 0. For that reason, only 10% of the lowest frequencies is considered in the periodogram estimation method.

## 3 Framework

### 3.1 Network

In order to analyze network traffic in a typical and commonly used structure for IoT devices shown in Fig. 1, a simple and efficient non-persistent CSMA/CA protocol is assumed. This protocol was chosen because it can be easily implemented even in basic and cheap microcontrollers and does not consume much power during wireless operation, which is crucial for IoT wireless sensors. In non-persistent version of CSMA protocol waiting node does not listen to the channel continuously until it becomes idle (like in 1- or p-persistent versions), which reduces energy consumption.

The network consists of *nNodes* wireless nodes and two stations: *st*0 and *st*1. Each node can transmit packets to the station *st*0 and can sense transmission from another node to avoid collisions. All nodes can hear each other, so there is no hidden node problem [14]. When the channel is busy, because another node is transmitting, the node that wants to send packets must wait a period of time and then listen (sense) again. If the channel is idle, the node starts its transmission immediately.

Wireless station *st*0 receives packets from all nodes and tries to send them all across the long range radio link to the station *st*1. All packets must pass through the wireless network interface of *st*0 that connects this station to another one (*st*1). The output interface at *st*0 actually incorporates the queueing system that has *K* places for packets (including the one being transmitted) and the transmission circuit limited by the bandwidth of the radio link. Therefore, because all the cumulative traffic from the nodes goes there, all interesting performance statistics, associated with the impact of LRD traffic, can be found at the radio link network interface of station *st*0. Before the packet leaves *st*0, either it is immediately processed (if the queue is empty) or goes to the queue buffer. If there is not enough buffer space, packet is dropped (buffer overflow). By changing the bandwidth of this radio link channel, one can examine the impact of the local traffic on queueing performance, and thus on the level of packet loss and latency.

### 3.2 Source Node

*H*can be easily obtained from:

### 3.3 Performance Evaluation

*st*0 and

*st*1 depends on statistical properties of the inbound traffic as well as the service rate and packet length distribution. Since all packets have fixed size, a deterministic service is assumed. All traffic from local network goes to the input of queueing system inside the output interface of

*st*0 (Fig. 1). The queueing system consists of one server and has \(K-1\) slots as a buffer space for packets. If the buffer overflows (

*K*packets in the system) then the next incoming packet is dropped. Most common type of queueing system that meets the above assumptions is M/D/1/K, for which explicit formulas of blocking probability, stationary distribution and mean system sojourn time were derived in [18]. Both latency and packet loss can be expressed in terms of steady state probabilities of number of packets in the system:

*st*0 for different scenarios, i.e. different levels of LRD as well as different number of nodes.

## 4 Results

The performance results were compared to a typical M/D/1/K queuing system, presented in 3.3, where all performance measures refer to the classical Poisson model of input traffic (without LRD feature).

*nNodes*) on performance of the backhaul link (Fig. 1). The simulation time, bandwidth and packet length for each scenario were 60 min., 1 Mbps and 4096 bits (512 bytes), respectively. The packet length corresponds to the packet transmission time of 4.096 ms shown in Fig. 3.

*H*was 0.9 and 0.6, which corresponds to the \(\alpha =1.2\) and \(\alpha =1.8\) of Pareto distribution in PMPP model.

In the next figure (Fig. 5) there are periodogram estimation plots for different number of nodes for desired \(H=0.9\). All estimation results of Hurst exponent were obtained based on the formula (8). It is clearly seen that the values of \(\tilde{H}\) decreases as the number of nodes increases. This is due to the disappearance of the LRD structure in aggregated stream that consists of many independent network flows coming from single nodes. It can be better observed in Table 1, where the mean \(\tilde{H}\) estimated for nodes stays the same (approximately), while the mean \(\tilde{H}\) at the input of the queue (*in*0) decreases to the low value, suggesting that the LRD properties gradually disappears.

*H*values constant number of nodes (\(nNodes=5\)). A slight increase of all measured values can be observed, which suggests that increasing

*H*value raises the level of collisions and hence increases values for other statistics.

Main statistics for \(H=0.9\) and different number of nodes.

Number of nodes: | 2 | 3 | 6 | 8 | 10 | 15 |
---|---|---|---|---|---|---|

Throughput [kbps] | 81 | 131 | 233 | 290 | 397 | 326 |

Packets at | 70829 | 112264 | 192267 | 239938 | 291615 | 345220 |

Collision rate [%] | 2 | 4 | 12 | 16 | 24 | 39 |

\(\bar{\lambda }\) at | 20 | 31 | 53 | 67 | 81 | 96 |

Mean \(\tilde{H}\) for nodes | 0.943 | 0.881 | 0.889 | 0.917 | 0.859 | 0.91 |

Mean \(\tilde{H}\) at | 0.873 | 0.813 | 0.861 | 0.841 | 0.758 | 0.574 |

Main statistics for 5 nodes and different *H* values.

H value: | 0.6 | 0.7 | 0.8 | 0.9 |
---|---|---|---|---|

Throughput [kbps] | 180.5 | 181.8 | 183.8 | 189.5 |

Packets at | 158681 | 159830 | 161598 | 166602 |

Collision rate [%] | 7.9 | 7.8 | 8.1 | 8.5 |

\(\bar{\lambda }\) at | 40.6 | 40.8 | 44.5 | 48.4 |

## 5 Conclusions

The number of IoT devices and networks is constantly increasing, which means that congestion can occur, especially when the communication channel capacity does not increase. The main performance measures analyzed in this article were latency and packet loss. It is obvious that for higher offered traffic load the values of both measures increases causing poor performance of the connection link. However, situation becomes worse when LRD is considered. There is no doubt that this feature exists in network traffic. The question is, how strong are these long-term relationships and how they influence the performance. The simulation results of analysis of a typical IoT wireless CSMA/CA network with backhaul link provided more insights on the impact of both LRD and number of nodes on latency and packet loss.

All estimation results of Hurst exponent show that \(\tilde{H}\) is stable for the same number of nodes. If number of nodes increases, then \(\tilde{H}\) becomes smaller. Furthermore, all performance results show that with an increasing number of nodes, performance improves, causing even underestimation of the classical M/D/1/K model of queueing system. It implies that the aggregated stream consisting of many single node streams has changed its structure in terms of LRD feature as well as the distribution. This phenomenon can be used to determine the parameters of the IoT network system in order to reduce the value of latency and packet loss, which in turn has a positive effect on QoS and QoE.

## References

- 1.Abry, P., Flandrin, P., Taqqu, M., Veitch, D.: Theory and Applications of Long-Range Dependence, 1st edn. Birkhäuser Basel, Cambridge (2002)zbMATHGoogle Scholar
- 2.Jan, M.A., Jan, S.R.U., Alam, M., Akhunzada, A., Rahman, I.U.: A comprehensive analysis of congestion control protocols in wireless sensor networks. Mob. Netw. Appl.
**23**(3), 456–468 (2018). https://doi.org/10.1007/s11036-018-1018-yCrossRefGoogle Scholar - 3.Al-Kofahi, M.M., Al-Shorman, M.Y., Al-Kofahi, O.M.: Toward energy efficient microcontrollers and Internet-of-Things systems. Comput. Electr. Eng.
**79**, 106457 (2019). https://doi.org/10.1016/j.compeleceng.2019.106457CrossRefGoogle Scholar - 4.Bai, S., Taqqu, M.: On the validity of resampling methods under long memory. Ann. Stat.
**45**, 2365–2399 (2017). https://doi.org/10.1214/16-AOS1524MathSciNetCrossRefzbMATHGoogle Scholar - 5.Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K.: Network anomaly detection: methods, systems and tools. IEEE Commun. Surv. Tutorials
**16**(1), 303–336 (2014). https://doi.org/10.1109/SURV.2013.052213.00046CrossRefGoogle Scholar - 6.Dai, L.: Toward a coherent theory of CSMA and Aloha. IEEE Trans. Wireless Commun.
**12**, 3428–3444 (2013). https://doi.org/10.1109/TWC.2013.052813.121605CrossRefGoogle Scholar - 7.Dymora, P., Mazurek, M.: Anomaly detection in IOT communication network based on spectral analysis and hurst exponent. Appl. Sci.
**9**(24) (2019). https://doi.org/10.3390/app9245319 - 8.Fortino, G., Gravina, R., Russo, W., Savaglio, C.: Modeling and simulating Internet-of-Things systems: a hybrid agent-oriented approach. Comput. Sci. Eng.
**19**(5), 68–76 (2017). https://doi.org/10.1109/MCSE.2017.3421541CrossRefGoogle Scholar - 9.Gao, Y., Dai, L.: Random access: packet-based or connection-based? IEEE Trans. Wireless Commun.
**18**(5), 2664–2678 (2019). https://doi.org/10.1109/TWC.2019.2906596CrossRefGoogle Scholar - 10.Iglesias, F., Zseby, T.: Analysis of network traffic features for anomaly detection. Mach. Learn.
**3**, 59–84 (2014). https://doi.org/10.1007/s10994-014-5473-9MathSciNetCrossRefGoogle Scholar - 11.Jing, X., Yan, Z., Jiang, X., Pedrycz, W.: Network traffic fusion and analysis against ddos flooding attacks with a novel reversible sketch. Inf. Fusion
**51**, 100–113 (2019). https://doi.org/10.1016/j.inffus.2018.10.013CrossRefGoogle Scholar - 12.Koseoglu, M., Karasan, E.: Energy-optimum throughput and carrier sensing rate in csma-based wireless networks. IEEE Trans. Mob. Comput.
**13**(6), 1200–1212 (2014). https://doi.org/10.1109/TMC.2013.124CrossRefGoogle Scholar - 13.Le-Ngoc, T., Subramanian, S.N.: A pareto-modulated poisson process (PMPP) model for long-range dependent traffic. Comput. Commun.
**23**, 123–132 (2000)CrossRefGoogle Scholar - 14.Ley-Bosch, C., Alonso-González, I., Sanchez-Rodriguez, D., Ramírez-Casañas, C.: Evaluation of the effects of hidden node problems in IEEE 802.15.7 uplink performance. Sensors
**16**, 216 (2016). https://doi.org/10.3390/s16020216CrossRefGoogle Scholar - 15.Li, G., Yan, Z., Fu, Y., Chen, H.: Data fusion for network intrusion detection: a review. Secur. Commun. Netw.
**2018**, 1–16 (2018). https://doi.org/10.1155/2018/8210614CrossRefGoogle Scholar - 16.Park, K., Willinger, W.: Self-Similar Network Traffic and Performance Evaluation, 1st edn. Wiley, Hoboken (2000)CrossRefGoogle Scholar
- 17.Purczynski, J., Wlodarski, P.: On fast generation of fractional Gaussian noise. Comput. Stat. Data Anal.
**50**, 2537–2551 (2006)MathSciNetCrossRefGoogle Scholar - 18.Seo, D.W.: Explicit formulae for characteristics of finite-capacity M/D/1 queues. ETRI J.
**36**(4), 609–616 (2014). https://doi.org/10.4218/etrij.14.0113.0812CrossRefGoogle Scholar - 19.Shafiq, M., Ahmad, M., Afzal, M., Ali, A., Irshad, A., Choi, J.G.: Handshake sense multiple access control for cognitive radio-based IOT networks. Sensors
**19**(2), 241 (2019). https://doi.org/10.3390/s19020241CrossRefGoogle Scholar - 20.Smith, R.: The dynamics of internet traffic: self-similarity, self-organization, and complex phenomena. Adv. Complex Syst.
**14**(6), 905–949 (2011). https://doi.org/10.1142/S0219525911003451MathSciNetCrossRefGoogle Scholar - 21.Varga, A.: OMNeT++. In: Wehrle, K., Güneş, M., Gross, J. (eds.) Modeling and Tools for Network Simulation, pp. 35–59. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-12331-3_3CrossRefGoogle Scholar
- 22.Varga, A.: OMNeT++. https://omnetpp.org/. Accessed 19 Dec 2019
- 23.Wang, J., Yang, X., Liu, Y., Qian, Z.: A contention-based hop-by-hop bidirectional congestion control algorithm for ad-hoc networks. Sensors
**19**(16) (2019). https://doi.org/10.3390/s19163484 - 24.Wong, P.K., Yin, D., Lee, T.T.: Analysis of non-persistent CSMA protocols with exponential backoff scheduling. IEEE Trans. Commun.
**59**(8), 2206–2214 (2011). https://doi.org/10.1109/TCOMM.2011.051811.100241CrossRefGoogle Scholar - 25.Zhang, Y., Huang, N., Xing, L.: A novel flux-fluctuation law for network with self-similar traffic. Phys. A Stat. Mech. Appl.
**452**(C), 299–310 (2016). https://doi.org/10.1016/j.physa.2016.02.031MathSciNetCrossRefzbMATHGoogle Scholar