Research Article

An Enhanced Reliable Access Scheme for Massive IoT Applications in Ubiquitous IoT Systems

Figure 3

Example of an access scheme.
(a) Topology diagram of an access scheme example
(b) Node request time and deadline