Professional Documents
Culture Documents
A Study of Bayesian Scheduling For M2M Traffic in Wireless LTE Network
A Study of Bayesian Scheduling For M2M Traffic in Wireless LTE Network
Abstract—In the event of phenomenal growth in Internet of IoT is a relatively broad topic in which its application
Things (IoT), Machine-to-Machine (M2M) devices are projected domain could range from smart metering, asset tracking, health
to reach figure of multiple billions in foreseeable future. monitoring, auto piloting to surveillance camera and many more
Operators around the world are aggressively refarming their to date. This vast diversity nature in IoT applications eventually
spectrum from older network and moving quickly to Long Term complicate M2M traffic further with unpredictable and self-
Evolution (LTE) for guarantee of future-proof services. With dissimilar behavior [2]. Although they are often characterized
every new M2M application being invented or deployed at this by small data packets, time-controlled transmission, group-
pace, unprecedented factors are unceasingly induced to existing based or synchronized access and have higher tendency of being
LTE protocols which caused undesirable performance
delay-tolerant, well-defined and precise M2M identification is
degradation. In this paper, a realistic LTE network environment
are modelled and simulated with tractable M2M traffic modules
not feasible considering new applications are being invented or
to observe such impacts on conventional scheduling schemes and deployed at almost daily. In a general view, there are more than
to identify the major causes. A prominent conventional Bayesian 150 device M2M models classified and designated into 6 generic
approach is hence adopted for revision to adapt the new M2M categories up to the present day, namely Asset Tracking,
traffics. The results obtained shown that the proposed M2M- Building Security, Fleet, Modem, Metering and Telehealth [3].
enabled True Bayesian Estimate (TBE-M) algorithm is capable of With disparate backgrounds, M2M application usually requires
outperforming the conventional TBE on a great scale. high level of customization entailing different data content, data
format, operating system, Quality of Service (QoS) requirement,
Keywords—LTE; wireless; Internet of things; machine-to- transmission interval and so on. Such permutations in terms of
machine communications; QoS; scheduling configuration are nearly illimitable and practically unpredictable
by the network.
I. INTRODUCTION
To meet LTE’s enlisted technical criteria under aforesaid
In order for Internet of Things (IoT) to really take off in the
disruptions from voluminous M2M interactions, packet
coming decade, truly ubiquitous and massive peer-to-peer
scheduling protocols are to be improvised or reinvented from
communications are the prerequisites in the future network.
present intelligence amongst conventional scheduling
Long Term Evolution (LTE) cell technology is in fact a windfall
algorithms to envision for newer traffic trend. In other words,
for Machine-to-Machine (M2M) communication’s promising
parameters of traditional scheduling algorithms can be
future with its outstanding bandwidth provision assuring
strategically manipulated to extend its coverage to M2M
‘everything connected to everything’ being possible. The
communications. As majority have been making much of uplink
average data rate in current 4G standards is already 5 to 10 times
measures due to M2M uplink tendency, fewer efforts note the
faster than of its predecessor 3G [1], allowing IoT traffics
analogous importance for downlink preparation. In this paper,
scaling to large sizes and relentless exchange of data. Higher
an enhanced real-time Bayesian bandwidth resource allocation
capacity with expanded connectivity are to be anticipated in the
mechanism is proposed to address the complex uncertainty
next-generation network, 5G. According to reliable forecasts,
issues induced in line by the presence of massive M2M traffics
more than 50 billion of M2M devices are anticipated in next
in LTE downlink.
decade [2] where M2M device is the general term used to refer
to all automated hardware (i.e. sensors and actuators) that form The remainder of this paper is organized as follows. Section
part of an IoT system. These devices are specialized to practice II gives an overview of literature studies relevant to M2M
M2M communication, a new type of communication which is scheduling and Bayesian strategies over LTE. Section III
the hallmark of IoT in order to realize the idealistic automation. presents the concept of proposed M2M-enabled Bayesian
A notable technical difference in these communications is the scheduling scheme. Section IV lists the simulation setup and
absolute absence of human intervention, which particularly discuss the numerical results obtained. Section V concludes the
contradicts to the traditional network traffics, known as Human- paper.
to-Human (H2H) communication. M2M in this regard is deemed
to be considerably distinctive from the conventional point of II. LITERATURE REVIEW
view and has given rise to growing concerns about LTE A. M2M-aware LTE
scheduler’s efficacy.
As M2M communication is aggressively gaining
grounds in LTE scope, more literatures have suggested
preemptive measures to ensure LTE is M2M-aware. The Although this scheme is oblivious to M2M’s presence, the
first approach is through handling of random access Bayesian equation can be straightforwardly reengineer to
congestion crisis at the medium access control (MAC) layer. incorporate M2M in scheduling decision making. Equation (1)
The authors in [4] have proposed a novel context-aware shows Bayesian Estimator in practical use, which gives a ‘true
scheme, conjoins with an overload detection mechanism to Bayesian estimate’.
address synchronized accesses from massive M2M nodes.
ୖ௩ାେ
As the scheme is fully oriented to overload circumstances, ൌ (1)
௩ା
accommodation is lacking in behalf of baseline congestion.
Although a latter effort [5] has supplemented this issue with Where:
a dynamic protocol that adapts to real-time congestion W = weight for observed data
intensity, hindrance of M2M nodes to the primary H2H R = average value for observed data
traffics remains unattended in the consequent resource = ݒnumber of samples for observed data
allocation phase. ݉ = weight given to the prior estimate
C = mean rating across the whole pool
To address the high signaling overhead problems in
M2M communication, another alternative is described in [6] TBE is a realistic rating strategy derived from Bayes
to aggregate small M2M data packets before transmission Estimator to handle large and complex field with multitudinous
to reduce individual signaling costs. A major drawback is parameters and is substantially reliable for simultaneous user
all transmissions including delay-sensitive traffics are background herein. The weighting vectors, ݒand ݉ are used to
subjected to a predefined minimum waiting time buffer balance W between variables R and C. As ݒapproaches zero,
without guarantee of subsequent incoming traffic. The W will be less affected by R as the product value of R ݒ
method is less efficient as a packet that is late to a buffer diminishes and vice versa. The proposed algorithm, TBE-M is
time window for a split second has to queue in the derived from TBE is as seen in Equation (2).
consecutive round which may delay the packet severely.
Throughput [bps]
Bandwidth / Frame Length 10 MHz / 10 ms
1000000
Frame Structure TDD
500000
Modulation QAM, 4-QAM, 16-QAM
0
Simulation Period 60s 10 20 30 40 50
Number of Simulation 5 Users
Traffic Models H2H: Video, VoIP, BE; M2M
TBE TBE-M
Mobility eNB: Fixed Position;
UE: Random Mobility
Number of UEs H2H UEs: 10-50; Fig. 1. Video Throughput.
M2M UEs: 100
UE interval 10
Video Delay