2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM) 2012
DOI: 10.1109/wowmom.2012.6263789
|View full text |Cite
|
Sign up to set email alerts
|

Performance analysis of an LTE gateway for the IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
6
2
2

Relationship

0
10

Authors

Journals

citations
Cited by 25 publications
(12 citation statements)
references
References 17 publications
0
12
0
Order By: Relevance
“…The Constrained Application Protocol (CoAP) is an application layer protocol, specifically for energy constrained devices, described in [40]. The device in question (in this context, a sensor node) communicates with a CoAP client, which in turn communicates with a web server.…”
Section: Sensing Platformsmentioning
confidence: 99%
“…The Constrained Application Protocol (CoAP) is an application layer protocol, specifically for energy constrained devices, described in [40]. The device in question (in this context, a sensor node) communicates with a CoAP client, which in turn communicates with a web server.…”
Section: Sensing Platformsmentioning
confidence: 99%
“…Authors evaluated LTE for M2M on a bandwidth of 10 MHz without considering the 1.4 MHz bandwidth adapted by LTE-M for M2M communications. Costantino, Luca, et al have proposed in [8] a hybrid architecture for IoT where M2M devices are connected to an IoT gateway and evaluated the impact of M2M traffic in terms of network performance on traditional communications between UEs. On the MAC layer, Zain, Aini Syuhada Md, et al compared in [9] the performance of different scheduling algorithms for VoIP traffic in LTE-A networks.…”
Section: Related Workmentioning
confidence: 99%
“…Costantino et al [ 27 ] evaluate the performance of an LTE gateway using CoAP and representative M2M traffic patterns and network configurations through simulations. The authors argue that traffic patterns depend very much on the single application considered, and, therefore, do not describe or justify their choices.…”
Section: Mobile M2m Literature Reviewmentioning
confidence: 99%