Simulation based studies of machine-to-machine communications

Evgeny Osipov, Laurynas Riliskis, Timo Lehikoinen, Jukka Kämäräinen, Marko Pellinen

    Research output: Chapter in Book/Report/Conference proceedingChapter or book articleProfessional

    Abstract

    Simulations are essential for understanding complex systems such as Cyber Physical Systems. The creation of reliable multi-disciplinary simulation tools that can be used to support the entire development process has been identified as a major scientific goal in several research roadmaps and agendas for the coming 15 years. This chapter presents two showcases, which highlight the necessity of trustworthy simulation tools, especially in the case of machine-tomachine communications. First the performance of UWB radio technology in context of vehicle automation is evaluated. Second the experiences from performing the entire cycle of protocol development for machine-to-machine communications are presented. The two presented showcases support a conclusion that a successful simulation platform should have a user-friendly simulation framework and models that support virtualization. This will enable the incorporation of simulations into day-to-day engineering practice and thereby shrink the gap between the real and the virtual developing environments.
    Original languageEnglish
    Title of host publicationWireless Networking for Moving Objects
    Subtitle of host publicationProtocols, Architectures, Tools, Services and Applications
    PublisherSpringer
    Pages239-254
    ISBN (Electronic)978-3-319-10834-6
    ISBN (Print)978-3-319-10833-9
    DOIs
    Publication statusPublished - 26 Aug 2015
    MoE publication typeD2 Article in professional manuals or guides or professional information systems or text book material

    Publication series

    SeriesLecture Notes in Computer Science
    Volume8611

    Keywords

    • machine-to-machine
    • simulations
    • symphony
    • UWB
    • WSN

    Fingerprint

    Dive into the research topics of 'Simulation based studies of machine-to-machine communications'. Together they form a unique fingerprint.

    Cite this