Next Article in Journal
Analysis and Design of a Pulsed Power Generator for a Low-Energy Magnetic Pulse Welding System
Next Article in Special Issue
Assessment of Communication Resource Allocation by the Transmission Control Protocol for the Target Virtual Connection under Competitive Conditions
Previous Article in Journal
Testing the Verification and Validation Capability of a DCP-Based Interface for Distributed Real-Time Applications
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Reliably Controlling Massive Traffic between a Sensor Network End Internet of Things Device Environment and a Hub Using Transmission Control Protocol Mechanisms

1
Internet of Things Group, Institute of Theoretical and Applied Informatics Polish Academy of Sciences, Bałtycka 5, 44-100 Gliwice, Poland
2
Department of Mathematics Applications and Methods for Artificial Intelligence, Faculty of Applied Mathematics, Silesian University of Technology, ul. Akademicka 2A, 44-100 Gliwice, Poland
*
Author to whom correspondence should be addressed.
Electronics 2023, 12(24), 4920; https://doi.org/10.3390/electronics12244920
Submission received: 20 November 2023 / Revised: 30 November 2023 / Accepted: 4 December 2023 / Published: 6 December 2023
(This article belongs to the Special Issue Transmission Control Protocols (TCPs) in Wireless and Wired Networks)

Abstract

:
The constant growth of Internet of Things traffic is ensured by the ongoing evolution of the hierarchy of all hardware links of sensor networks. At the same time, the implementation of the Edge computing ideology regulates the complexity of the “first-mile” section (from the sensors array to the peripheral server). Here, the authors suggest paying attention to the growing share of massive traffic from target sensors in the total traffic of the sensors array. This circumstance makes it expedient to introduce an additional link to the peripheral server for summarizing massive traffic from target sensors. The authors present a sensor network end IoT device (SNEIoTD), implemented grounded on a reliable and cheap Raspberry Pi computing platform, as such a link. The introduction of this SNEIoTD makes it possible to reduce the probability of information loss from the critical infrastructure of a smart city and increase the flexibility of controlling the massive traffic of the first mile. In this context, the urgent task is the reliable control of information transfer from the SNEIoTD environment to a hub, which the authors formalize based on Transmission Control Protocol (TCP). This article proposes a mathematical model of the interaction of the main mechanisms of the TCP in the form of a queuing system. As part of this model, a semi-Markov process of an information transfer with a unified speed is selected and its stationary distribution is analytically formalized. A computationally efficient information technology for determining the TCP Window Size is formulated, taking into account the interaction of TCP mechanisms in the process of massive traffic control. Using the example of TCP Westwood+ protocol modification, it is shown that the results of the application of information technology permit increases in the stability of data transfer under the circumstances of increasing Round-Trip Times.

1. Introduction and State-of-the-Art

1.1. Relevance of the Research

The continued expansion of Internet of Things (IoT) traffic [1,2,3] is facilitated by the ongoing enhancement of the hardware links within sensor networks. Concurrently, the adoption of Edge computing ideology [4,5,6] serves to manage the intricacies of the “first-mile” segment (from the sensor array to the peripheral server). It is noteworthy to highlight that the increasing proportion of mass traffic originating from specific target sensors, which, in certain cases, surpasses the cumulative traffic of the entire sensor array (for instance, a single 4k camera in a city’s video surveillance system generates more traffic than the entirety of the city’s smart traffic lights). This observation underscores the necessity of introducing an additional link to the peripheral server to aggregate substantial traffic from these target sensors. The authors of this article have previously investigated, in [7,8], the issue of the integration of a sensor network end IoT device (SNEIoTD), developed on the reliable and cost-effective Raspberry Pi computing platform, as a viable solution to address this need. The incorporation of such a SNEIoTD aims to diminish the likelihood of information loss within the critical infrastructure of a smart city and enhance the adaptability of controlling massive traffic at the initial stage. Consequently, a pressing challenge in this context is the effective control of information transfer from the SNEIoTD environment to a hub, a task that the authors formalize based on the TCP.
The endpoint in the studied system is a SNEIoTD, which aggregates information from sensors that generate massive traffic, and, as it accumulates, transmits it to the hub. The hub can be either a peripheral server or a cloud data storage itself. At the same time, an SNEIoTD is a significantly simpler computing device than a hub (which is why we mention Raspberry Pi in this context). It should be noted that the idea of using an SNEIoTD as an intermediate link was inspired by practice. While organizing the process of transferring information from 4k cameras of a city’s video surveillance system, we were faced with multiple cases of information loss due to the unreliability of the 5G information transmission channel. After we introduced an additional link (the “sensor network end IoT device”) into the “4k camera array”—“hub” system, we were able to solve the above problem (Figure 1).
Let us explain in more detail why in this research we focus on the transport layer of the Open Systems Interconnection (OSI) model and the TCP. As we mentioned above, sensor networks are designed to collect critical information (for example, information from cameras of a city’s video surveillance system). This information can characterize functioning industries, various processes in a smart city, and people’s preferences. In each case mentioned, the loss of collected information can have extremely significant negative consequences, even catastrophic. In the context of the above, the issue of reliability in transferring information from the elements of the sensor array to the final point of its placement comes to the forefront.
An OSI model’s transport layer is developed to guarantee reliable data transmission from a sender to a recipient [9,10,11]. However, the degree of its reliability may exhibit significant fluctuations. There exist numerous transport-layer protocols [12,13,14], from protocols that solely offer fundamental transport capabilities (such as data transfer functions without acknowledgement) to protocols that guarantee the delivery of multiple data packets to a destination in the proper sequence. Multiplexing numerous data streams establishes a data flow control mechanism and ensures the reliability of the received data. For instance, the User Datagram Protocol (UDP) [15,16] is confined to overseeing the integrity of data within a single datagram and does not preclude the chance of losing an entire packet, duplicating packets, or disturbing the order of received data packets. On the other hand, the TCP guarantees dependable and uninterrupted data transmission, preventing data loss or disruption of the sequential order, and can redistribute data by breaking down large data portions into smaller fragments and, conversely, consolidating fragments into a single packet. This circumstance, as well as the fact that over 90% of the world’s data traffic is controlled via TCP [17,18], became a decisive factor influencing the authors’ choice.

1.2. State-of-the-Art

In different wireless network structures, such as those found in the IoT, TCP retains its significance as a transport protocol owing to its dependable delivery characteristics and extensive prevalence on the Internet [19,20]. Among the various attributes of the TCP, congestion control stands out as a key feature that has garnered sustained attention over time, remaining the focus of numerous research studies.
Research on this topic typically concentrates on the following methods: active queue control, network feedback techniques, and alterations in a TCP’s algorithm, as well as different combinations of these methods [21,22,23,24]. This section provides a brief overview of studies that have tackled issues concerning TCP and the IoT.
In the publication [25], a comprehensive comparative analysis of TCP’s congestion control algorithms within the IoT context is outlined. This study assesses 14 different alternatives, delineating their respective benefits and drawbacks. The findings suggest that the primary challenges observed among the evaluated algorithms predominantly lie in issues related to data transfer rate and equity.
With the proliferation of intercommunicating devices, congestion inevitably rises. In the realm of the IoT, this escalation is particularly pronounced, driven by the continual appearance of new devices able to join an existing network. In such a dynamic ecosystem, effective congestion control becomes imperative to accommodate a diverse range of devices, each potentially employing a different variation of a transport protocol. This involves adapting data transfer speeds in response to network congestion, all while ensuring fairness and sustaining throughput across the network [25].
Typically, proposals for modifications align with a standard TCP [26,27] or involve particular improvements to the control algorithms of established versions. Within these alterations, protocols utilizing Round-Trip Time for measuring network congestion are categorized as proactive, while those relying on segment losses for congestion identification are deemed reactive. As noted by the authors of [28], even though reactive protocols effectively utilize the entire accessible data transfer capacity, they may not be well-suited for equipment operating with a limited data transfer capacity.
Conversely, pre-emptive protocols aim to minimize data segment losses and retransmissions but may fall short of leveraging the entire network capacity. In light of these considerations, the study in [28] modifies the TCP that can function in either pre-emptive or proactive modes based on the network environments. This protocol initially operates in pre-emptive mode before congestion escalation is identified, at which point it transitions to proactive mode. The hybrid variant demonstrated commendable performance in terms of data transfer speeds and equity in contrast with the New Reno, CUBIC, HTCP, and FAST-FIT variants.
Another recent study delving into modifications of transport protocols is outlined in [29]. CERL+ stands out as a version inspired by TCP Reno, with its primary aim being to optimize the data transfer rate while minimizing the adverse effects stemming from lost data segments. Their suggestion utilizes mean and minimum Round-Trip Time (RTT) estimates to discern connection bottleneck circumstances and identify instances of random data segment loss attributed to connection failures, a common occurrence in 802.11 networks. In comparison with various other TCP variants [12,13,14], including NewReno, mVeno, Westwood+, YeAh, CUBIC, and New Jersey+, the CERL+ suggestion exhibited a superior data transfer rate and lower data segment loss, mitigating bottleneck congestion across diverse wireless network structures.
By integrating a blend of the aforementioned methodologies, the authors in [30] introduce FAIR+, a synthesis of Active Queue Management (AQM) mechanisms, network reactions, and TCP adjustments. Their proposal demonstrated favourable outcomes in terms of latency, goodput, and fairness metrics within multi-hop wireless network scenarios, outperforming varied alternatives including NRT, OQS, and Westwood.
A concept structurally close to the system described in Section 1.1 was presented in [31,32]. Those papers introduce a system for device indoor localization that uses variations in the strength of the wireless signal. Their proposed system addresses logistics use cases in which it is imperative to achieve reliable end-to-end delivery, such as pharmaceutic delivery, delivery of confidential documents and court exhibits, and even food delivery, since vulnerabilities in these deliveries present a potential risk of terrorism or other attacks. This work proposes a concept based on a low-power and low-cost LoRaWAN system that utilizes a Machine Learning technique based on Neural Networks to achieve high accuracy in device indoor localization by measuring the signal strength of a beacon device. However, in these studies, LoRaWAN is used as a communication technology. This platform does not provide the speed characteristics necessary for our case. We also note that the use of neural networks as a model of the studied process requires significant preliminary work on collecting and summarizing training data.
In general, it should be noted that the authors of the aforementioned studies strive to pay attention to the description of the competition for resources for their information and communication systems between a large number of non-resource-intensive connections. This does not fit into the concept of using the SNEIoTD described in Section 2.1, which determines the relevance of this research.

1.3. Main Attributes of this Research

Next, we will present the main elements that determine the orientation, structure and novelty of the presented research.
An object of this research is an extensive process of controlling massive data transfer from the SNEIoTD environment to a hub as a result of the interaction of the main mechanisms of the TCP.
A subject of this research includes the theory and methods of mathematical modelling, probability theory, queuing theory, and recovery theory.
The goal of this research is articulated as follows: to analytically determine the unified speed of information transfer from the SNEIoTD environment to a hub controlled by the main mechanisms of TCP, taking into account the specific features of this process.
Our research objectives are:
-
to formalize the parametric space for an adequate representation of the research object;
-
to formalize the concepts that characterize the features of the interaction of the main mechanisms of the TCP (Slow Start, Additive-Increase/Multiplicative-Decrease) when controlling massive data transfer from the SNEIoTD environment to a hub discretely and continuously;
-
to formalize the information technology for calculating the TCP Window Size of both mentioned mechanisms and the <ssthresh> parameter;
-
to implement a numerical experiment, the results of which will justify the effectiveness of the created mathematical apparatus.
Now, let us state the main contribution of the research.
The IoT systems are designed for the collection of information. If an entire system of smart city traffic lights generates dozens of megabytes of traffic, and a high-quality video surveillance system alone generates gigabytes of traffic, ensuring its reliable transmission to the cloud using a wireless communication channel becomes a non-trivial task. This article proposes an idea to alleviate this constraint by introducing an additional hardware element into the classical “sensor network”—”cloud” structure (SNEIoTD, see Figure 1). To achieve maximum benefit from this proposal, the authors have suggested a mathematically founded TCP-based information technology for effective control of reliable transmission of massive traffic between a SNEIoTD and the edge of the cloud.
This article proposes a mathematical model of the interaction of the main mechanisms of the TCP (Slow Start, Additive-Increase/Multiplicative-Decrease) in the form of a queuing system, which describes the process of reliable control of massive traffic from the SNEIoTD environment to a hub. As part of this model, a semi-Markov process is selected that describes the interaction of these mechanisms, locked to the definition of such a characteristic parameter as the unified speed of information transfer. As a result of recurrent analyses of the aforementioned process, a stationary distribution of an embedded Markov chain is determined. This made it possible to analytically describe the stationary distribution of the original semi-Markov process. The aforementioned stationary distribution analytical representation became the basis for the formalization of an accurate, computationally efficient information technology for calculating the TCP Window Size of both the previously mentioned mechanisms and the <ssthresh> parameter.
In the following sections of the article, three main sections are highlighted. Section 2 introduces the parametric space that characterizes the interaction of TCP mechanisms in the process of traffic control from the SNEIoTD environment to a hub. The distribution function of the stochastic parameter TCP Window Size for the studied process was investigated. Elements of the research on the dynamic properties of the TCP Window Size stochastic parameter over time are also formalized. Section 3 is devoted to simulation modelling to demonstrate the information technology formulated in Section 2.2. Section 3 also provides empirical results on the example of the TCP Westwood+ protocol, which proves the functionality of the proposed mathematical apparatus. In Section 4, generalized conclusions and directions for further investigation are outlined.

2. Materials and Methods

2.1. Statement of the Research

As mentioned above, in our research we will focus on the analytical description of the influence of the settings of the Slow Start (SlS) and Additive-Increase/Multiplicative-Decrease (AI/MD) mechanisms integrated in TCP on the value of the TCP Window Size controlled parameter S w for the target connection between the SNEIoTD environment, which generates massive, mission-critical traffic, and a hub. The parameter S w defines the size of the data block that the SNEIoTD environment can send to a hub without confirmation of receipt from the latter. The interaction of the SlS and AI/MD mechanisms is determined by a controlled parameter, T s l s , known as the Slow Start Threshold [21,22,23,24], and feedback signals s = s + , s , s o from a hub, which will be mentioned later in the paper. The parameter known as Round-Trip Time [21,22,23,24], which characterizes the time required to send a block of data to the hub and receive confirmation of its receipt, is denoted by T r t .
After each confirmation from the hub, the SlS mechanism increases the value of the parameter S w by one. If such a trend is maintained, the value of the parameter S w doubles in a time not less than T r t . In turn, after each confirmation from the hub, the AI/MD mechanism increases the value of the parameter S w by 1 / S w . The value of such an increase is presented in integer form: 1 / S w , therefore (while maintaining the trend of receiving confirmations from a hub) after each subsequent time interval, not less than T r t , the value S w will increase by one. The inherent TCP Three-Way Handshake logic [17,18] assumes the existence of three types of reverse communication signals (confirmation signals from a hub):
-
data block received in full: s + ,
-
data block received with skips: s ,
-
reverse signal not received (communication channel overload): s o .
The initiation of an information interaction between the SNEIoTD environment and a hub begins with setting the initial value of the parameter T s l s . Further, after each SNEIoTD reception of the signal ! s + , the value of the parameter T s l s is redefined: T s l s : = max 2 , S w / 2 . The characteristics of the information interaction between the SNEIoTD and a hub are regulated with the SlS mechanism until the SNEIoTD environment receives the signal s or the value of the parameter S w reaches the value of T s l s . The moment of detection of certain facts regulates the transfer of connection control to the AI/MD mechanism. Upon receiving the signal s , the AI/MD mechanism continues to work: S w : = max 2 , S w / 2 . Returning control of the connection to the SlS mechanism is possible only upon receipt of the SNEIoTD signal s o . At the same time, the SlS mechanism resets the value S w to one: S w : = 1 , and regulates reattempts to send the data block to a hub after a time equal to T r t has passed. If the SNEIoTD does not receive a signal s + in response, the SlS mechanism authorizes another attempt to send the data block to a hub after a time interval equal to T r t : = 2 T r t . The value S w remains unchanged: S w = 1 . These described actions are repeated until the SNEIoTD receives the signal s + .
We will choose a theoretical basis for an analytical description of the process of information interactions between the SNEIoTD environment and a hub, taking into account the described logic of control. The authors propose a formalization of the researched process based on the queuing theory [7,8] with a controlled input flow. To serve the latter, we assume one device with an infinite queue, a reverse connection, and a deterministic service of duration t m = 1 / T c c , where T c c is the actual capacity of the route between the SNEIoTD and a hub. The set of data blocks represents a population of incoming requests. The control of the flow of incoming requests is regulated by the above-described logic of application of the SlS and AI/MD mechanisms built into the TCP. Let us assume that at the time of receiving the signal s from the population of incoming service requests, n > 0 blocks of data are transmitted, where the value n depends on the parameter S w and several data blocks being sent to a hub without confirming the fact of their receipt. Accepted incoming requests are served in order of arrival (FIFO).
We denote with p n + the probability of obtaining a series of signals s + of length n . We denote with p n + the probability of obtaining an arbitrary series of signals s + , s of length n . We denote with p n o the probability of obtaining a signal s o for a series of data blocks of length n sent to a hub at S w = n (if the studied process is controlled via the AI/MD mechanism) or S w n (if the studied process is controlled via the SlS mechanism).
All further initiatives regarding the formalization and research of the relevant queuing system are based on the following initial postulates:
-
the probabilities p = p n + , p n + , p n o are determined exclusively by an existing value of the parameter S w and do not depend on the previous values of the parameters S w , T s l s ;
-
for the probabilities p , the equality p n + + p n + + p n o = 1 is fulfilled. At the same time, when n = 1 , the values of probabilities p represent the functioning of the SlS mechanism, and when n > 1 the values of probabilities p represent the functioning of the AI/MD mechanism;
-
SNEIoTD always has relevant data for sending to a hub;
-
the initiating value S w max is at the same time a deterministic upper limit of the value of the parameter S w for any moment of implementation of the studied process;
-
parameter T r t is a stochastic value with distribution function T r t x .
A visual interpretation of the above-described logic of interaction between the SlS and AI/MD mechanisms is presented in Figure 2.

2.2. Research of the Distribution Function of the Stochastic Parameter TCP Window Size for the Studied Process

In Section 2.1, we noted that the controlled parameter S w is significant for the target connection between the SNEIoTD environment and a hub. Let us investigate the stochastic nature of this parameter, taking into account that the studied process is controlled via SlS & AI/MD mechanisms, the interaction between which is characterized by the controlled parameter T s l s .
Let us introduce the vector F = S w , T s l s , α , where α is a binary parameter whose value α = 0 corresponds to the SlS mechanism, and α = 1 corresponds to the AI/MD mechanism. Next, we will investigate the stochastic process F t t > 0 . Let the value of the parameter S w be measured at discrete moments represented by the sequence t i i > 0 . Subject to the postulates defined in Section 2.1, the sequence F k = F t k k > 0 ordered by the value of the argument is the aperiodic, irreducible Markov chain with a bounded set of states and with a stationary distribution q F . Considering that T s l s : = S w / 2 after each fact of receiving a signal s or s o , then (under the condition n :   p n + > 0 or p n o > 0 ) all F of the inequalities T s l s > S w max , q F = 0 are true, because all such states will be irreversible. Let us introduce the notation q F = q T s l s , S w α . In this case, starting from the logic of interactions of SlS and AI/MD mechanisms described in the previous section, we can write: q T s l s , S w 0 = 0   S w T s l s , q T s l s , S w 1 = 0   S w < T s l s .
We accept that L = S w max / 2 . Taking into account the introduced notations, the stationary distribution of the stochastic parameter S w for SlS and AI/MD mechanisms will be described by the expressions q i 0 = n = i + 1 L q n , i 0 , q i 1 = n = 2 min i , L q n , i 1 , respectively. For all 2 < n L / 2 , the probability q F satisfies the following equations:
q n , n 1 = p 2 n + i = 2 2 n q i , 2 n 1 + p 2 n + 1 + i = 2 2 n + 1 q i , 2 n + 1 1 + p 1 + q n , n 1 0 + p 1 + i = 2 n + 1 L q i , 2 n 0 + i = 2 n + 2 L q i , 2 n + 1 0 ,
q n , 1 0 = p 2 n o i = 2 2 n q i , 2 n 1 + p 2 n + 1 o i = 2 2 n + 1 q i , 2 n + 1 1 + p 1 o i = 2 n + 1 L q i , 2 n 0 + i = 2 n + 2 L q i , 2 n + 1 0 .
Equations (1) and (2) match with the first quarter of the index space and characterize the system’s transitions between the SlS and AI/MD mechanisms. At the same time, Equation (1) characterizes the transitions for the AI/MD mechanism after the arrival of the signal s and the transitions from the SlS mechanism to the AI/MD mechanism, which can occur if, as a result of the operation of the SlS mechanism, S w becomes equal to T s l s , or if the SlS mechanism detects a pass in the data sequence. Equation (2) is interpreted so that a transition to a state q n , 1 ) can take place from any other state of a Markov chain if the SNEIoTD receives a signal s o .
The equations for q n , n 1 , q n , 1 0 for indices L / 2 < n L are obtained as a result of the reduction of Equations (1) and (2), with the exclusion of the aforementioned irreversible states:
q n , n 1 = p 1 + q k , k 1 0 + p 2 n + i = 2 2 n q i , 2 n 1 + p 2 n + 1 + i = 2 2 n + 1 q i , 2 n + 1 1 ,
q n , 1 0 = p 2 n o i = 2 2 n q i , 2 n 1 + p 2 n + 1 o i = 2 2 n + 1 q i , 2 n + 1 1 .
Finally, let us characterize the traffic control on the SNEIoTD side under the conditions of the arrival of signals s + , which leads to an increase in the value of the parameter S w . For all, 2 < n S w max we write:
q n , i 1 = p i 1 + q n , i 1 1 ,   n < i ;
q n , S w max 1 = p S w max 1 + q n , S w max 1 1 + p S w max + q n , S w max 1 .
After the value of the parameter S w reaches S w max , its growth stops, even if new signals s + arrive. For the SlS mechanism, this means that
q n , i 0 = p 1 + q n , i 1 0 ,   n < L ,   n > i .
Based on Equation (7), we write:
q n , i 0 = p 1 + i 1 q n , 1 0 .
Let us select implementations of Equation (5) for which the condition L < i < S w max is fulfilled and sum them for n = 2 , L ¯ :
q i 1 = n = 2 L q n , i 1 = p i 1 + n = 2 L q n , i 1 1 = p i 1 + q i 1 1 .
Based on Equation (9), we write: q i 1 = H i q L 1   i > L , where H i = k = L i 1 p k + . Note that q i 1 = n = 2 min i , L q n , i 1 . If i > L , then q i , i 1 = 0 ; otherwise, q i , i 1 > 0 . Accordingly, the system of Equations (1)–(7) can be reduced to the form of a system of equations concerning the variables q n , 1 0 and q n , n 1 .
Based on the value of the probabilities q i 0 and q i 1 , we can analytically express the dynamics of the value of the parameter S w for AI/MD and SlS mechanisms, respectively.
We characterize the dynamics of the value of the TCP Window Size parameter for the case when the information interaction between a SNEIoTD and a hub is controlled via the AI/MD mechanism through probabilities q i 1 . For i < L , we write: q n , i 1 = p i 1 + q n , i 1 1 , n = 2 , i 1 ¯ , i = n + 1 , L ¯ . Let us sum the obtained equations in terms of n :
k = 2 i 1 q k , i 1 = p i 1 + k = 2 i 1 q k , i 1 1 .
Based on the previously introduced notation, Equation (10), we can write q i 1 q i , i 1 = p i 1 + q i 1 q and, in turn:
q i 1 = H i q L ,   i > J ,
q i 1 1 = q i 1 q i , i 1 / p i + ,   i J .
Now, let us characterize the dynamics of the value of the TCP Window Size parameter for the case in which the information interaction between the SNEIoTD and a hub is controlled via the SlS mechanism through probabilities q i 0 . This mechanism functions as long as the condition S w < T s l s is fulfilled. In terms of q i 0 , this means that
q i 0 = k = i + 1 L q k , i 0 = p 1 + i 1 k = i + 1 L q k , 1 0 .
Let us reduce the value of the iterator in Equation (13) by one: q i 1 0 = k = i L q k , i 1 o = p 1 + i 2 k = i L q k , 1 0 , from which q i 1 0 = p 1 + i 2 p 1 + 1 i q i 0 + q i , 1 0 . Let us present the last equation in its completed form:
q i 1 0 = p n + 1 q i 0 + p 1 + i 2 q i , 1 0 .
Therefore, Equations (11), (12) and (14) characterize the dynamics of the value of the TCP Window Size parameter for AI/MD and SlS mechanisms (in terms of probabilities q i 0 and q i 1 , respectively).
Let us summarize the process of solving the system of Equations (1)–(4) in the context of the obtained recurrent expressions (8) and (9). As a result of the substitution, we find:
q n , i α = q L 1 C n , i α ,
where L / 2 n L : C k , 1 0 = p 2 n o H 2 n + p 2 n + 1 o H 2 n + 1 , C n , n 1 = p 2 n + H 2 n + p 2 n + 1 + H 2 n + 1 + p 1 + n 1 C n , 1 0 ; and 2 < n < L / 2 : C n , 1 0 = p 1 o B 2 n + B 2 n + 1 + p 2 n o A 2 n + p 2 n + 1 o A 2 n + 1 , C n , n 1 = p 2 n + A 2 n + p 2 n + 1 + A 2 n + 1 + p 1 + n 1 B n , 1 + p 1 + B 2 n + B 2 n + 1 , where A i = q i 1 / q L 1 , i < L ; A n , i = q n , i 1 / q L , B n , i = q n , i 0 / q L , B i = q i 0 / q L 1 .
Let us summarize the material of this section by formulating the information technology for calculating the probabilistic characteristics of TCP Window Size for the process of information interaction between the SNEIoTD environment and a hub controlled via AI/MD and SlS mechanisms. The input parameters are the values of probabilities p n + , p n + , and p n o (see Section 2.1), and the value of the parameter S w max (the maximum allowable sliding window size). The output parameters are the calculated values of the probabilities q i 0 , q i , 1 0 , q i 1 , and q i , 1 1 . Information technology includes the following stages:
Stage 1. For k = L , S w max 1 ¯ , we calculate A k + 1 = p k 1 + A k , A L : = 1 and take B k : = 1 .
Stage 2. We calculate A S w max = A S w max 1 / 1 p S w max + .
Stage 3. For each k = L , 3 ¯ , we calculate
C i , 1 0 = p 2 i o A 2 i + p 2 i + 1 o A 2 i + 1 + p 1 o B 2 i + B 2 i + 1 I i , B i = C i + 1 , 1 0 p 1 + i 1 + B i + 1 / p 1 + , C i , i 1 = p 2 i + A 2 i + p 2 i + 1 + A 2 i + 1 + p 1 + i 1 C i , 1 0 + p 1 + B 2 i + B 2 i + 1 I i , A i 1 = A i C i , i 1 / p i + ,
consecutively, considering at each iteration that I i = 0 i > L / 2 , 1 i L / 2 .
Stage 4. We calculate q L = 1 / k = 1 S w max B k + A k .
Stage 5. We accept that q i 0 : = B i q L , q i , 1 0 = C i , 1 0 q L , q i 1 = A i q L , and q i , 1 1 = C i , 1 1 q L .
The information technology presented above is characterized by a linear computational complexity O S w max . This makes it possible to calculate 3 S w max variables.

2.3. Elements of the Research of a TCP Window Size Dynamic Properties in Continuous Time

Let us examine the stochastic process F t t > 0 in continuous time. For this process, a Markov chain F k k > 0 is needed; accordingly, the process F t t > 0 is semi-Markov. Let t i be a sequence of moments during which the value of the TCP Window Size parameter changed. For all T s l s values, we introduce the notation γ S w α = Φ t i + 1 i t i F i = T s l s , S w , α .
If T r t has a finite, non-zero mathematical expectation, then the stochastic process F t t > 0 is ergodic and its distribution converges to the stationary one:
P F = lim t P F t = γ S w α q T s l s , S w α / S w = 1 S w max γ S w α j = 2 L q j , S w α .
The statement enclosed in Equation (16) is derived as per an ergodic theorem [33] for semi-Markov processes. It is important to mention that t i + 1 t i > 0 , t i + 1 t i S w / T c c ; t i + 1 t i = T r t if T r t > S w / T c c . Accordingly, the stochastic process F t t > 0 is regular, so 0 < γ S w α < if Φ T r t is finite. To establish the stationary distribution (16), it is enough to calculate γ S w α .
If the process of information interaction between the SNEIoTD environment and a hub is controlled through the AI/MD mechanism, the value of the TCP Window Size parameter changes when the number of sent data blocks matches a value of S w at the current time of sending data to a hub. The described procedure for sending data at a fixed TCP Window Size takes S w t 0 . If at the end of this time interval, the reverse communication signal from a hub is not received, the SNEIoTD waits for it, subsequently updating the value S w . The waiting interval is equal to T r t ; therefore,
γ S w 1 = S w t 0 x d T r t x + S w t 0 T r t S w t 0 ,
where t 0 = 1 / T c c .
If the process of information interaction between the SNEIoTD environment and a hub is controlled through the SlS mechanism, then the value of the TCP Window Size parameter is doubled in the period T r t . Accordingly, the value of the parameter S w manages to change several times during one implementation T r t . A direct description of this variant of the studied process of information interaction within the framework of this research is not rational. It is more productive to use the verified approximate scheme of the structure T r t described in [34]: γ 2 S w 0 = 2 S w t 0 x 2 S w 1 t 0 d T r t x + t 0 T r t 2 S w t 0 . In all other cases, γ i 0 = t 0 , except for γ 1 0 , the value of which is regulated by the postponement procedure. As we noted above, in the absence of a signal s + , the delay procedure involves doubling the waiting period k times in a row. Taking this into account, we write:
γ 1 0 = p 1 + i = 1 k 1 i 1 p 1 + i 1 + k 1 p 1 + k 1 Φ T r t
To calculate the characteristics in (16)–(18) based on the P F t distribution, we suggest using the method described in [35].

3. Results and Discussion

We will demonstrate the functionality of the mathematical apparatus presented in the previous section by applying simulation modelling theory providences. Our focus will be on the stationary distributions q i = q i 0 + q i 1 , i = 1 , S w max ¯ , determined using the information technology formulated in Section 2.2, and their first two moments (mathematical expectation and variance).
In our calculations, we used the initial values synthesized according to the rules generalized in the form of the corresponding sets. Set 1 is formed on the basis that the facts of receiving SNEIoTD signals s (which indicate that a hub received data blocks with errors) are independent and characterized by the probability p s . At the same time, it was assumed that the probability p s o of receiving a communication channel overload signal s o when sending one data block did not change with increases in the value of the parameter S w for the AI/MD mechanism. Accordingly, in the parametric space p + , p + , p o , Set 1 was characterized by the following analytical expressions: p n + = 1 p s n 1 p s o , p n + = 1 1 p s k 1 p s o , p n o = p s o . Set 2 differed from Set 1 in that, when forming it, we considered the facts of receiving signals s o from the SNEIoTD environment to be independent. Accordingly, we analytically characterized Set 2 as follows: p n + = 1 p s n 1 p s o n , p n + = 1 1 p s k 1 p s o n , p n o = 1 1 p s o n . The specific ranges of variation in the values of the controlled parameters S w , p s , and p s o were chosen to ensure the visibility and interpretability of the obtained results.
We determined the visual form of the dependence of q i = f S w , Set 1 , Set 2 on p s o = 10 × 10 3 , p s = 0.5 × 10 3 , 1.5 × 10 3 , 10 × 10 3 . These calculated results are presented in Figure 3 and Figure 4.
Graphs from Figure 3 and Figure 4 demonstrate that if the probability p s o of receiving a signal s o is low, then this characteristic parameter does not have a noticeable effect on the shape of the stationary distribution q i for the entire investigated range of values of the parameter S w . The form of the obtained stationary distributions for different values of the probability p s corresponds to expectations and indicates that, for the established initial conditions, the information interaction between the SNEIoTD environment and a hub is almost constantly under the control of the AI/MD mechanism.
The transition from Set 1 to Set 2 does not change the nature of the distributions q i , absorbing only the amplitude values of the latter. However, we investigated the sensitivity of the q i distributions to increases in the value of p s o by increasing the value of this parameter to the level of p s o = 25 × 10 3 . We then repeated this calculation of dependences for p s o = 25 × 10 3 , p s = 0.5 × 10 3 , 1.5 × 10 3 , 10 × 10 3 . The obtained results are visualized in Figure 5 and Figure 6.
From the findings presented in Figure 5 and Figure 6, our results show that increasing the value of the parameter p s o by 2.5 times led to a noticeable increase in the frequency of observation of low TCP Window Size values. At certain ratios of the values of parameters p s , p s o distributions q i degenerate into the form of monotonically decreasing functions. The latter means that the information interaction between the SNEIoTD environment and a hub is almost constantly under the control of the SlS mechanism, which is accompanied by the degradation of the bandwidth of the target connection. In Figure 6, this effect is more pronounced, because the values from Set 2 take into account the fact that the probability p s o increases with the increase in the value of S w ; accordingly, the dominance of the SlS mechanism begins to be observed at lower values of the parameter S w , and as the value of this parameter increases, it ceases to depend on the value of the probability p s . To emphasize the conclusions made here, we visualized the three-dimensional dependencies q i = f S w , p s o , p s = 2.5 × 10 3 for Set 1 (Figure 7) and Set 2 (Figure 8).
The results shown in Figure 7 demonstrate the presence of an extremum of the function q i = f S w , p s o . Moreover, the value of the argument p s o affects only the value of the function at the extreme points, but not the positioning of these points in the dimension S w . This fact echoes the results of the analysis of Figure 3. In general, it can be concluded that for initial data synthesized within the limits defined by Set 1, the mathematical apparatus proposed in Section 2.2 allows for the determination of the optimal TCP Window Size value, in particular, S w = 18 . Figure 8 demonstrates that for small values of S w (in the range of 2 , 30 ), the target connection between the SNEIoTD environment and a hub, characterized by the output data synthesized within the limits defined by Set 2, is under the control of the SlS mechanism. At values of S w > 30 , the control initiative of the target connection passes to the AI/MD mechanism. This fact is fully confirmed by the logic of the TCP, which we focused on in Section 2.1.
Now let us examine how the moments of the first (mathematical expectation) and second (variance) orders for the TCP Window Size parameter depend on the values of probabilities p s and p s o . The data for this calculation were obtained in the context of the rules summarized in Set 1. This calculation’s results are presented in Figure 9 and Figure 10.
Figure 9 shows that the mathematical expectation of the parameter S w is a monotonically decreasing function, the value of which is affected by the argument p s significantly more than the argument p s o . This circumstance can be explained by the fact that (for Set 1) the equality of q i 0 = 0 is fulfilled for all i > L , that is, with a sufficiently large value of S w , the probability of activation of the SlS mechanism due to the arrival of the signal s o is unlikely. From Figure 10, it can be seen that the variance of the parameter S w is characterized by the presence of extreme values in the range of 0 , 1 for both arguments, p s and p s o . However, the tendency for the greater influence of the parameter p s compared to the parameter p s o on the value of the resulting function persists here. We also emphasize that the variance in the TCP Window Size can be a monotonic function because it is determined not only by the values of the parameters p s , p s o , and S w max , but also by the variance of the parameter T r t .
We completed the experimental phase of this research by proving the positive effect of using the proposed mathematical apparatus. In the previous part of this research, published in [7], the authors compared the modified version of the TCP Westwood+ protocol with analogues such as TCP Westwood+ (without modification), TCP NewReno, TCP Vegas, BIC TCP, and TCP Veno. The object of this research was the process of information interaction between the SNEIoTD and a hub with a communication channel implemented based on the 5G platform. The modification consisted of the implementation of the scheme for controlling the Window Size parameter proposed by the authors. This research complements the possibilities presented in [7] due to the information technology formulated in Section 2.2, locked to control the <ssthresh> parameter of the SlS mechanism. Figure 11 demonstrates the effect of the introduction of the authors’ information technology on an example of modification of the mentioned TCP Westwood+ parameter. The remaining parameters of the experiment are identical to those described in [7].
From the findings presented in Figure 11, our results show that the use of the authors’ information technology for controlling the <ssthresh> parameter, according to the example of using the Westwood+ TCP to control the information interaction between a SNEIoTD environment and a hub, has a positive effect that increases with the increase in the value of the parameter T r t . In particular, it was possible to increase the stability of data transfer in situations where the signal s o is 80% received (see the graphs shown in Figure 11 for the values T r t > 9 of this argument).

4. Conclusions and Future Work

This article proposes a mathematical model of the interaction of the main mechanisms of the TCP (Slow Start, Additive-Increase/Multiplicative-Decrease) in the form of a queuing system, which describes the process of reliably controlling massive traffic from the SNEIoTD environment to a hub. As part of our model, a semi-Markov process is selected that describes the interaction of these mechanisms, locked to the definition of such a characteristic parameter as the unified speed of information transfer. As a result of recurrent analyses of the aforementioned process, a stationary distribution of an embedded Markov chain was determined. This made it possible to analytically describe the stationary distribution of the original semi-Markov process. An analytical representation of the above-mentioned stationary distribution became the basis for our formalization of an accurate, computationally efficient information technology for calculating the TCP Window Size of both the studied mechanisms and the <ssthresh> parameter.
The conducted simulation made it possible to determine a number of important regularities in the distributed process of controlling data transfer from the SNEIoTD environment to a hub in the context of using the TCP. Using the example of TCP Westwood+ protocol modification, it has been shown that the results of applying the information technology proposed in Section 2.2 make it possible to increase the stability of targeted data transfer in conditions of an increasing Round-Trip Time.
As a promising direction for further research, the authors suggest the expansion of the mathematical apparatus presented in Section 2 according to the analytical description of the optimizing mechanisms specific to different versions of the TCP.

Author Contributions

Conceptualization, V.K.; methodology, V.K.; software, V.K.; validation, K.G., W.K. and K.P.; formal analysis, V.K.; investigation, V.K.; resources, K.G., W.K. and K.P.; data curation, K.G., W.K. and K.P.; writing—original draft preparation, V.K.; writing—review and editing, V.K.; visualization, V.K.; supervision, V.K.; project administration, V.K.; funding acquisition, V.K. All authors have read and agreed to the published version of the manuscript.

Funding

This study was funded by the “Methodology for Increasing the Dependability of Information Systems for Critical Use with a Heterogeneous Wireless Interface” project, reg. no. 2022/45/P/ST7/03450, of the POLONEZ BIS 2 program, implemented by the National Science Center in Krakow.

Data Availability Statement

Most data are contained within the article. All the data are available on request subject to restrictions, e.g., privacy or ethics.

Acknowledgments

The authors are grateful to all colleagues and institutions that contributed to this research and made it possible to publish its results.

Conflicts of Interest

The authors declare no conflict of interest.

Nomenclature

S w is TCP Window Size;
T s l s is a Slow Start Threshold;
s is a set of feedback signals;
T r t is Round-Trip Time;
s + is a “data block received” feedback signal;
s is a “data block received with skips” feedback signal;
s o is a “reverse signal not received” feedback signal;
T c c is the actual capacity of the route between the SNEIoTD and a hub;
p n + is the probability of obtaining a series of signals s + of length n ;
p n + is the probability of obtaining an arbitrary series of signals s + ,   s of length n ;
p n o is the probability of obtaining a signal s o for a series of data blocks of length n sent to a hub at S w = n ;
T r t x is a distribution function of a stochastic parameter T r t ;
S w max is the deterministic upper limit of the value of the parameter S w for any moment of implementation of the studied process;
F = S w , T s l s , α is a basic representation of the investigated process;
α is a binary parameter, where α = 0 corresponds to the SlS mechanism, and α = 1 corresponds to the AI/MD mechanism;
q F is the stationary distribution of a vector F ;
L = S w max / 2 is a parameter derived from S w max ;
i , n are iterators.

References

  1. Rezaee, N.; Zanjirchi, S.M.; Jalilian, N.; Bamakan, S.M.H. Internet of Things Empowering Operations Management; A Systematic Review Based on Bibliometric and Content Analysis. Telemat. Inform. Rep. 2023, 11, 100096. [Google Scholar] [CrossRef]
  2. Verma, H.; Chauhan, N.; Awasthi, L.K. A Comprehensive Review of ‘Internet of Healthcare Things’: Networking Aspects, Technologies, Services, Applications, Challenges, and Security Concerns. Comput. Sci. Rev. 2023, 50, 100591. [Google Scholar] [CrossRef]
  3. Moges, T.H.; Lakew, D.S.; Nguyen, N.P.; Dao, N.-N.; Cho, S. Cellular Internet of Things: Use Cases, Technologies, and Future Work. Internet Things 2023, 24, 100910. [Google Scholar] [CrossRef]
  4. Izonin, I.; Tkachenko, R.; Duriagina, Z.; Shakhovska, N.; Kovtun, V.; Lotoshynska, N. Smart Web Service of Ti-Based Alloy’s Quality Evaluation for Medical Implants Manufacturing. Appl. Sci. 2022, 12, 5238. [Google Scholar] [CrossRef]
  5. Sulieman, N.A.; Celsi, L.R.; Li, W.; Zomaya, A.; Villari, M. Edge-Oriented Computing: A Survey on Research and Use Cases. Energies 2022, 15, 452. [Google Scholar] [CrossRef]
  6. Capra, M.; Peloso, R.; Masera, G.; Roch, M.R.; Martina, M. Edge Computing: A Survey On the Hardware Requirements in the Internet of Things World. Futur. Internet 2019, 11, 100. [Google Scholar] [CrossRef]
  7. Kovtun, V.; Grochla, K.; Połys, K. Investigation of the Information Interaction of a sensor network end IoT Device and a hub at the Transport Protocol Level. Electronics 2023, 12, 4662. [Google Scholar] [CrossRef]
  8. Kovtun, V.; Altameem, T.; Al-Maitah, M.; Kempa, W. The Markov Concept of the Energy Efficiency Assessment of the Edge Computing Infrastructure Peripheral Server Functioning over Time. Electronics 2023, 12, 4320. [Google Scholar] [CrossRef]
  9. Alavikia, Z.; Shabro, M. A Comprehensive Layered Approach for Implementing Internet of Things-Enabled Smart Grid: A Survey. Digit. Commun. Netw. 2022, 8, 388–410. [Google Scholar] [CrossRef]
  10. Lombardi, M.; Pascale, F.; Santaniello, D. Internet of Things: A General Overview between Architectures, Protocols and Applications. Information 2021, 12, 87. [Google Scholar] [CrossRef]
  11. Amin, M.S.; Rahman, S. An Introduction of Open System Interconnection (OSI) Model and Its Architecture. Preprints 2023. [Google Scholar] [CrossRef]
  12. Kovtun, V.; Izonin, I.; Gregus, M. Mathematical Models of the Information Interaction Process in 5G-IoT Ecosystem: Different Functional Scenarios. ICT Express 2023, 9, 264–269. [Google Scholar] [CrossRef]
  13. Gerodimos, A.; Maglaras, L.; Ferrag, M.A.; Ayres, N.; Kantzavelou, I. IoT: Communication Protocols and Security Threats. Internet Things Cyber-Phys. Syst. 2023, 3, 1–13. [Google Scholar] [CrossRef]
  14. Habib, S.; Qadir, J.; Ali, A.; Habib, D.; Li, M.; Sathiaseelan, A. The Past, Present, and Future of Transport-Layer Multipath. J. Netw. Comput. Appl. 2016, 75, 236–258. [Google Scholar] [CrossRef]
  15. Herrero, R. Analysis of the Constrained Application Protocol over Quick UDP Internet Connection Transport. Internet Things 2020, 12, 100328. [Google Scholar] [CrossRef]
  16. Nor, S.A.; Alubady, R.; Kamil, W.A. Simulated Performance of TCP, SCTP, DCCP and UDP Protocols over 4G Network. Procedia Comput. Sci. 2017, 111, 2–7. [Google Scholar] [CrossRef]
  17. Kovtun, V.; Izonin, I.; Gregus, M. Formalization of the Metric of Parameters for Quality Evaluation of the Subject-System Interaction Session in the 5G-IoT Ecosystem. Alex. Eng. J. 2022, 61, 7941–7952. [Google Scholar] [CrossRef]
  18. Ren, Y.; Yang, W.; Zhou, X.; Chen, H.; Liu, B. A Survey on TCP over mmWave. Comput. Commun. 2021, 171, 80–88. [Google Scholar] [CrossRef]
  19. Garcia-Macias, J.A. Transport in the IP-Based Internet of Things: Status Report. Procedia Comput. Sci. 2023, 224, 18–25. [Google Scholar] [CrossRef]
  20. Wytrębowicz, J.; Cabaj, K.; Krawiec, J. Messaging Protocols for IoT Systems—A Pragmatic Comparison. Sensors 2021, 21, 6904. [Google Scholar] [CrossRef] [PubMed]
  21. Anelli, P.; Diana, R.; Lochin, E. FavorQueue: A Parameterless Active Queue Management to Improve TCP Traffic Performance. Comput. Netw. 2014, 60, 171–186. [Google Scholar] [CrossRef]
  22. Tran, V.-H.; De Coninck, Q.; Hesmans, B.; Sadre, R.; Bonaventure, O. Observing Real Multipath TCP Traffic. Comput. Commun. 2016, 94, 114–122. [Google Scholar] [CrossRef]
  23. Lee, I.W.; Fapojuwo, A.O. Analysis and modeling of a campus wireless network TCP/IP traffic. Comput. Netw. 2009, 53, 2674–2687. [Google Scholar] [CrossRef]
  24. Christin, N.; Liebeherr, J. Marking Algorithms for Service Differentiation of TCP Traffic. Comput. Commun. 2005, 28, 2058–2069. [Google Scholar] [CrossRef]
  25. Hussain, S.Z.; Parween, S. Comparative Study of TCP Congestion Control Algorithm in IoT. In Proceedings of the 2021 3rd International Conference on Advances in Computing, Communication Control and Networking (ICAC3N), Greater Noida, India, 17–18 December 2021. [Google Scholar] [CrossRef]
  26. Pandya, P. Transmission Control Protocol/Internet Protocol Packet Analysis. In Computer and Information Security Handbook; Morgan Kaufmann: Burlington, MA, USA, 2013; pp. e205–e218. [Google Scholar] [CrossRef]
  27. Loshin, P. Transmission Control Protocol. TCP/IP Clear. Explain. 2003, 351–382. [Google Scholar] [CrossRef]
  28. Verma, L.P.; Kumar, M. An IoT Based Congestion Control Algorithm. Internet Things 2019, 9, 100157. [Google Scholar] [CrossRef]
  29. Briones, A.; Mallorquí, A.; Zaballos, A.; de Pozuelo, R.M. Wireless Loss Detection over Fairly Shared Heterogeneous Long Fat Networks. Electronics 2021, 10, 987. [Google Scholar] [CrossRef]
  30. Ju, B.-G.; Kim, M.; Kim, S.; Moreno-Ternero, J.D. Fair International Protocols for the Abatement of GHG Emissions. Energy Econ. 2021, 94, 105091. [Google Scholar] [CrossRef]
  31. Ragnoli, M.; Stornelli, V.; Del Tosto, D.; Barile, G.; Leoni, A.; Ferri, G. Flood Monitoring: A LoRa Based Case-Study in the City of L’Aquila. In Proceedings of the 2022 17th Conference on Ph.D Research in Microelectronics and Electronics (PRIME), Villasimius, Italy, 12–15 June 2022. [Google Scholar] [CrossRef]
  32. Perković, T.; Rodić, L.D.; Šabić, J.; Šolić, P. Machine Learning Approach towards LoRaWAN Indoor Localization. Electronics 2023, 12, 457. [Google Scholar] [CrossRef]
  33. Zhdanok, A. Invariant Finitely Additive Measures for General Markov Chains and the Doeblin Condition. Mathematics 2023, 11, 3388. [Google Scholar] [CrossRef]
  34. Sarkar, N.I.; Ammann, R.; Zabir, S.M.S. Analyzing TCP Performance in High Bit Error Rate Using Simulation and Modeling. Electronics 2022, 11, 2254. [Google Scholar] [CrossRef]
  35. Olmedo, G.; Lara-Cueva, R.; Martínez, D.; de Almeida, C. Performance Analysis of a Novel TCP Protocol Algorithm Adapted to Wireless Networks. Futur. Internet 2020, 12, 101. [Google Scholar] [CrossRef]
Figure 1. Structural representation of the research objective.
Figure 1. Structural representation of the research objective.
Electronics 12 04920 g001
Figure 2. Graphic interpretation of the interaction of SlS and AI/MD mechanisms in the context of the research object.
Figure 2. Graphic interpretation of the interaction of SlS and AI/MD mechanisms in the context of the research object.
Electronics 12 04920 g002
Figure 3. Visualization of the dependence of q i = f S w , Set 1 on p s o = 10 × 10 3 , p s = 0.5 × 10 3 , 1.5 × 10 3 , 10 × 10 3 .
Figure 3. Visualization of the dependence of q i = f S w , Set 1 on p s o = 10 × 10 3 , p s = 0.5 × 10 3 , 1.5 × 10 3 , 10 × 10 3 .
Electronics 12 04920 g003
Figure 4. Visualization of the dependence of q i = f S w , Set 2 on p s o = 10 × 10 3 , p s = 0.5 × 10 3 , 1.5 × 10 3 , 10 × 10 3 .
Figure 4. Visualization of the dependence of q i = f S w , Set 2 on p s o = 10 × 10 3 , p s = 0.5 × 10 3 , 1.5 × 10 3 , 10 × 10 3 .
Electronics 12 04920 g004
Figure 5. Visualization of the dependence of q i = f S w , Set 1 on p s o = 25 × 10 3 , p s = 0.5 × 10 3 , 1.5 × 10 3 , 10 × 10 3 .
Figure 5. Visualization of the dependence of q i = f S w , Set 1 on p s o = 25 × 10 3 , p s = 0.5 × 10 3 , 1.5 × 10 3 , 10 × 10 3 .
Electronics 12 04920 g005
Figure 6. Visualization of the dependence of q i = f S w , Set 2 on p s o = 25 × 10 3 , p s = 0.5 × 10 3 , 1.5 × 10 3 , 10 × 10 3 .
Figure 6. Visualization of the dependence of q i = f S w , Set 2 on p s o = 25 × 10 3 , p s = 0.5 × 10 3 , 1.5 × 10 3 , 10 × 10 3 .
Electronics 12 04920 g006
Figure 7. Visualization of dependence q i = f S w , p s o , p s = 2.5 × 10 3 calculated for Set 1.
Figure 7. Visualization of dependence q i = f S w , p s o , p s = 2.5 × 10 3 calculated for Set 1.
Electronics 12 04920 g007
Figure 8. Visualization of dependence q i = f S w , p s o , p s = 2.5 × 10 3 calculated for Set 2.
Figure 8. Visualization of dependence q i = f S w , p s o , p s = 2.5 × 10 3 calculated for Set 2.
Electronics 12 04920 g008
Figure 9. Visualization of the dependence Μ S w 1 = f p s , p s o calculated for Set 1.
Figure 9. Visualization of the dependence Μ S w 1 = f p s , p s o calculated for Set 1.
Electronics 12 04920 g009
Figure 10. Visualization of the dependence Μ S w 2 = f p s , p s o calculated for Set 1.
Figure 10. Visualization of the dependence Μ S w 2 = f p s , p s o calculated for Set 1.
Electronics 12 04920 g010
Figure 11. Demonstration of the effect of an applied use of the information technology presented in Section 2.2.
Figure 11. Demonstration of the effect of an applied use of the information technology presented in Section 2.2.
Electronics 12 04920 g011
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Kovtun, V.; Grochla, K.; Kempa, W.; Połys, K. Reliably Controlling Massive Traffic between a Sensor Network End Internet of Things Device Environment and a Hub Using Transmission Control Protocol Mechanisms. Electronics 2023, 12, 4920. https://doi.org/10.3390/electronics12244920

AMA Style

Kovtun V, Grochla K, Kempa W, Połys K. Reliably Controlling Massive Traffic between a Sensor Network End Internet of Things Device Environment and a Hub Using Transmission Control Protocol Mechanisms. Electronics. 2023; 12(24):4920. https://doi.org/10.3390/electronics12244920

Chicago/Turabian Style

Kovtun, Viacheslav, Krzysztof Grochla, Wojciech Kempa, and Konrad Połys. 2023. "Reliably Controlling Massive Traffic between a Sensor Network End Internet of Things Device Environment and a Hub Using Transmission Control Protocol Mechanisms" Electronics 12, no. 24: 4920. https://doi.org/10.3390/electronics12244920

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop