ABSTRACT
The massive deployment of Machine-to-machine (M2M) communications may overwhelm the cellular network by imposing strong constraints on the Radio Access Network (RAN). As the base station cannot accurately get the exact number of M2M arrivals, it cannot really predict the overload status. Consequently, a better estimation of this number would efficiently help to overcome the risk of congestion. In this paper, we proposed a novel fluid model for M2M communications, which allows gaining an enhanced understanding of the dynamics of such systems. The provided analysis of the model was used to devise a new method to estimate accurately the number of M2M devices. We proposed, then, a novel implementation of the ACB process, which dynamically computes the ACB factor according to the network's overload conditions while includes a corrective action adapting the controller action based on the mismatch existing between the computed and the targeted mean load. The simulation results show that the proposed algorithms allow improving considerably the estimation of the number of M2M devices' arrivals, while outperforming existing techniques.
- . R. Palattella et al., "Internet of Things in the 5G Era: Enablers, Architecture, and Business Models," in IEEE JSAC, vol. 34, no. 3, pp. 510--527, March 2016.Google Scholar
- . Biral, M. Centenaro, A. Zanella, L. Vangelista, M. Zorzi, phThe challenges of M2M massive access in wireless cellular networks, Digital Com. and Networks, Vol. 1, Issue 1, Pages 1--19, 2015.Google Scholar
- . Ratasuk, A. Prasad, L. Zexian, A. Ghosh, M. Uusitalo, phRecent advancements in M2M communications in 4G networks and evolution towards 5G, ICIN 2015 , vol., no., pp.52,57, 2015.%\colorredGoogle Scholar
- isco VNI blog post, ph2015 Cisco VNI Complete Forecast Update: Key Trends Include Mobility, M2M, and Multimedia Content.Google Scholar
- GPP TS 36.331 : phEvolved Universal Terrestrial Radio Access (E-UTRA); Radio Resource Control (RRC); Protocol specification V.12.5.0 Release 10, April 2015.Google Scholar
- . Ksentini, Y. Hadjadj-Aoul, T. Taleb, phCellular-based machine-to-machine: overload control," IEEE Network, vol.26, no.6, pp.54,60, November 2012.Google Scholar
- ouzouita M, Hadjadj-Aoul Y, Zangar N, Rubino G and Tabbane S, phMultiple Access Class Barring factors Algorithm for M2M communications in LTE-Advanced Networks, ACM/MSWIM, 2015. Google ScholarDigital Library
- rouk O., Ksentini A. and Taleb T., phGroup Paging-based Energy Saving for Massive MTC Accesses in LTE and Beyond Networks, IEEE JSAC, 2016.Google Scholar
- ouzouita M, Hadjadj-Aoul Y, Zangar N, Tabbane S and Viho C, phA random access model for M2M communications in LTE-advanced mobile networks, Modeling and Simulation of Computer Networks and Systems, Elsevier, 2015.Google Scholar
- strom K.J., Hagglund T., phAdvanced PID Control, ISA-The Instrumentation, Systems, and Automation Society, ISBN 1556179421, 2006.Google Scholar
- GPP TS 36.321, phLTE; Evolved Universal Terrestrial Radio Access (E-UTRA); Medium Access Control (MAC) protocol specification, V.11.3.0 Release 11, July 2013.Google Scholar
- orless, R., Gonnet, G., Hare, D., Jeffrey, D. and Knuth, D., phOn the Lambert $W$ function, Advances in Computational Mathematics (Berlin, New York: Springer-Verlag) 5: 329--359, 1996.Google Scholar
- rouk O. and Ksentini A., phMulti-Channel Slotted Aloha Optimization for Machine-Type-Communication, ACM/MSWiM, 2014. Google ScholarDigital Library
Index Terms
Dynamic Adaptive Access Barring Scheme For Heavily Congested M2M Networks
Recommendations
Adaptive handoff scheme for heterogeneous IP wireless networks
Recent technological advances allow mobile devices to be equipped with multiple wireless interfaces. Moreover, the coexistence of diverse but complementary architectures and wireless access technologies is one of the major trends in 4G or next-...
Performance of Dynamic Access Class Barring Method in Cellular M2M Networks
Cellular based machine-to-machine (M2M) systems generate massive number of access requests which create congestion in the cellular network. The contention-based random access procedures are designed for cellular networks which cannot accommodate a large ...
Dynamic multi-step paging scheme in PMIPv6-based wireless networks
In Proxy Mobile IP (PMIPv6) networks, proxy-registrations are performed even for idle MNs, resulting in unnecessary signaling traffic. Although there have been many IP paging techniques aimed at reducing the unnecessary location update, they focus only ...
Comments