TY - JOUR
T1 - First Mile Challenges for Large-Scale IoT
AU - Bader, Ahmed
AU - Elsawy, Hesham
AU - Gharbieh, Mohammad
AU - Alouini, Mohamed-Slim
AU - Adinoyi, Abdulkareem
AU - Alshaalan, Furaih
N1 - KAUST Repository Item: Exported on 2020-10-01
PY - 2017/3/16
Y1 - 2017/3/16
N2 - The Internet of Things is large-scale by nature. This is not only manifested by the large number of connected devices, but also by the sheer scale of spatial traffic intensity that must be accommodated, primarily in the uplink direction. To that end, cellular networks are indeed a strong first mile candidate to accommodate the data tsunami to be generated by the IoT. However, IoT devices are required in the cellular paradigm to undergo random access procedures as a precursor to resource allocation. Such procedures impose a major bottleneck that hinders cellular networks' ability to support large-scale IoT. In this article, we shed light on the random access dilemma and present a case study based on experimental data as well as system-level simulations. Accordingly, a case is built for the latent need to revisit random access procedures. A call for action is motivated by listing a few potential remedies and recommendations.
AB - The Internet of Things is large-scale by nature. This is not only manifested by the large number of connected devices, but also by the sheer scale of spatial traffic intensity that must be accommodated, primarily in the uplink direction. To that end, cellular networks are indeed a strong first mile candidate to accommodate the data tsunami to be generated by the IoT. However, IoT devices are required in the cellular paradigm to undergo random access procedures as a precursor to resource allocation. Such procedures impose a major bottleneck that hinders cellular networks' ability to support large-scale IoT. In this article, we shed light on the random access dilemma and present a case study based on experimental data as well as system-level simulations. Accordingly, a case is built for the latent need to revisit random access procedures. A call for action is motivated by listing a few potential remedies and recommendations.
UR - http://hdl.handle.net/10754/623219
UR - http://ieeexplore.ieee.org/document/7876971/
UR - http://www.scopus.com/inward/record.url?scp=85017655950&partnerID=8YFLogxK
U2 - 10.1109/mcom.2017.1600604cm
DO - 10.1109/mcom.2017.1600604cm
M3 - Article
SN - 0163-6804
VL - 55
SP - 138
EP - 144
JO - IEEE Communications Magazine
JF - IEEE Communications Magazine
IS - 3
ER -