Return to search results
Modeling MCPTT and User Behavior in ns-3
This dataset contains the raw data for the paper: Garey, W.; Henderson, T.; Sun, Y.; Rouil, R. and Gamboa, S. (2021). Modeling MCPTT and User Behavior in ns-3. In Proceedings of the 11th International Conference on Simulation and Modeling Methodologies, Technologies and Applications - SIMULTECH, ISBN 978-989-758-528-9, pages 30-41. DOI: 10.5220/0010513200300041. This includes: Figure 4 - The talk spurt and talk session duration CDF. Figure 5 - Orchestrator pusher model example. Figure 7 - MCPTT Access Time for immediately granted requests with queuing disabled. Figure 8 - MCPTT Access Time for queued or immediately granted requests with queuing enabled. Figure 9 - Mcptt Mouth-to-Ear Latency
Complete Metadata
| @type | dcat:Dataset |
|---|---|
| accessLevel | public |
| accrualPeriodicity | irregular |
| bureauCode |
[
"006:55"
]
|
| contactPoint |
{
"fn": "Wesley Garey",
"hasEmail": "mailto:wesley.garey@nist.gov"
}
|
| description | This dataset contains the raw data for the paper: Garey, W.; Henderson, T.; Sun, Y.; Rouil, R. and Gamboa, S. (2021). Modeling MCPTT and User Behavior in ns-3. In Proceedings of the 11th International Conference on Simulation and Modeling Methodologies, Technologies and Applications - SIMULTECH, ISBN 978-989-758-528-9, pages 30-41. DOI: 10.5220/0010513200300041. This includes: Figure 4 - The talk spurt and talk session duration CDF. Figure 5 - Orchestrator pusher model example. Figure 7 - MCPTT Access Time for immediately granted requests with queuing disabled. Figure 8 - MCPTT Access Time for queued or immediately granted requests with queuing enabled. Figure 9 - Mcptt Mouth-to-Ear Latency |
| distribution |
[
{
"title": "DOI Access for Modeling MCPTT and User Behavior in ns-3",
"accessURL": "https://doi.org/10.18434/mds2-2436"
},
{
"title": "Modeling MCPTT and User Behavior in ns-3",
"mediaType": "application/x-zip-compressed",
"description": "The data included in this package contains the raw data for the paper: Garey, W.; Henderson, T.; Sun, Y.; Rouil, R. and Gamboa, S. (2021). Modeling MCPTT and User Behavior in ns-3. In Proceedings of the 11th International Conference on Simulation and Modeling Methodologies, Technologies and Applications - SIMULTECH, ISBN 978-989-758-528-9, pages 30-41. DOI: 10.5220/0010513200300041. To support the advancement of public safety communications technology, the Third Generation Partnership Project (3GPP) has created several standards to define Mission Critical Push-To-Talk (MCPTT) over LongTerm Evolution (LTE) networks. As this is a new service that can be used in dire situations, it is imperative that the behavior and performance meet the expectations of first responders. This paper introduces an extension to the network simulator, ns-3, that models MCPTT and user Push-To-Talk (PTT) activity, so that researchers can gain insights and evaluate the performance of this service. In this paper we will describe MCPTT based on 3GPP definitions, the implementation of the MCPTT model in ns-3, and some results, including Key Performance Indicators (KPIs), that can be extracted from this model. Figure 4 was generated using proprietary data taken from a public safety LMR communication system. Figure 4 is comprised of two Cumulative Distribution Function (CDF) to graphically represent the length of talk spurts and talk sessions. Figure 5 was generated using the Mission Critical Push-To-Talk (MCPTT) model described in the paper. Figure 5 uses a step graph to show the transition of states for pushers and sessions during an arbitrary simulation for two users in the same group. Data is generated using 'mcptt-on-network-rebase' branch of https://github.com/tomhenderson/pscr-net-sim at commit b72658ddf (Jan 26, 2021). Figure 7 uses a CDF to graphically show the recorded MCPTT access time from the case study that is described in the paper when queuing is disabled. Figure 9 uses a CDF to graphically display the mouth-to-ear latency recorded from the case study that is described in the paper when queuing is disabled. Figure 7 and Figure 9 data is generated from this command: ./waf --run 'mcptt-operational-modes-static --callDuration=5000s --showProgress=1' Figure 8 uses a CDF to graphically show the recorded MCPTT access time from the case study that is described in the paper when queuing is enabled. Figure 8 data is generated from this command: ./waf --run 'mcptt-operational-modes-static --callDuration=5000s --showProgress=1 --queueing=1'",
"downloadURL": "https://data.nist.gov/od/ds/mds2-2436/plots.zip"
},
{
"title": "SHA256 File for Modeling MCPTT and User Behavior in ns-3",
"mediaType": "text/plain",
"downloadURL": "https://data.nist.gov/od/ds/mds2-2436/plots.zip.sha256"
}
]
|
| identifier | ark:/88434/mds2-2436 |
| issued | 2021-08-09 |
| keyword |
[
"MCPTT",
"MCV",
"mission critical voice",
"ns-3",
"public safety communication",
"push-to-talk",
"wireless communication"
]
|
| landingPage | https://data.nist.gov/od/id/mds2-2436 |
| language |
[
"en"
]
|
| license | https://www.nist.gov/open/license |
| modified | 2021-07-23 00:00:00 |
| programCode |
[
"006:045"
]
|
| publisher |
{
"name": "National Institute of Standards and Technology",
"@type": "org:Organization"
}
|
| references |
[
"https://dx.doi.org/10.5220/0010513200300041"
]
|
| theme |
[
"Advanced Communications:Wireless (RF)",
"Information Technology:Networking",
"Mathematics and Statistics:Modeling and simulation research",
"Public Safety:Public safety communications research"
]
|
| title | Modeling MCPTT and User Behavior in ns-3 |