Professional Documents
Culture Documents
Design and Performance Analysis of A Novel Distributed Queue Access Protocol For Cellular-Based Massive M2M Communications
Design and Performance Analysis of A Novel Distributed Queue Access Protocol For Cellular-Based Massive M2M Communications
Design and Performance Analysis of A Novel Distributed Queue Access Protocol For Cellular-Based Massive M2M Communications
ABSTRACT This paper proposes a novel access protocol based on the distributed queue (DQ) mech-
anism to effectively tackle the massive access issue in the cellular-based machine-to-machine (M2M)
communications. To fully take the advantage of the DQ mechanism, we newly propose a method to avoid
the DQ’s inherent over-division problem by letting the base station first roughly probes the number of
colliding devices in a random access opportunity. Based on the probing result, the base station then randomly
divides these devices into a determined number of groups and ‘‘pushes’’ these groups to the end of a logical
access queue. In addition, we develop an analytic model to accurately estimate the average access delay of
the proposed protocol in the massive scenarios. Computer simulations are also performed to validate the
correctness of the analytic model as well as the effectiveness of the proposed protocol in comparison with
the LTE standard and conventional DQ access schemes.
INDEX TERMS Distributed queue, load estimation, LTE, massive M2M communications, random access
protocols.
2169-3536
2017 IEEE. Translations and content mining are permitted for academic research only.
3008 Personal use is also permitted, but republication/redistribution requires IEEE permission. VOLUME 6, 2018
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
A.-T. H. Bui et al.: Design and Performance Analysis of a Novel DQ Access Protocol
FIGURE 6. An example of the proposed protocol. FIGURE 7. Example of multiple queues running in parallel.
the number of MTDs per group falling very short compared This barely affects the ACB scheme, as RAOs unusable for
to K . The 6 groups then exit the queue in turn to re-perform a transmitting MTD may still be utilized by others who just
preamble transmissions in the next 6 RAOs i.e., RAO 2 to resume from their previous backoff or barring wait. On the
RAO 7. Again, via partial estimation step, the BS is aware contrary, DQ-based protocols require that all MTDs (that
that the numbers of transmitting MTDs i.e., Nr , in each of is, both transmitting and waiting ones) do not adjust their
these RAOs are lower than K 2 . Thus, the BS first performs counters until transmitting MTDs have received their RAR
iterative estimation to obtain accurate Nr and Ns of each RAO. i.e., until the locking interval W of transmitting MTDs has
Then, to avoid over-division, the BS instructs the Nr − Ns elapsed, to ensure that the queue operates in a synchronous
unsuccessful MTDs in each of these RAOs to split into G = manner. Thus, in effect, a single distributed queue can only
[(Nr − Ns )/K ] groups so that the number of MTDs per group use RAOs that are at least W subframes apart from each other.
is approximately K . An example of this can be found by This leads to under-utilization when the RAOs are spaced at
looking the second RAO where 14 unsuccessful MTDs are less than or equal to W subframes.
randomly divided into G = [14/6] = 2 groups with 7 MTDs To overcome this issue, we propose to facilitate more
(which are well around K ) in each. All 13 groups created than one distributed queues running in parallel so that RAOs
during RAO 2 to RAO 7 then consecutively exit the queue unusable by a queue will be exploited by the others. Our idea
to retransmit in RAO 8 to RAO 20. As the number of MTDs is best described via the example provided in Fig. 7 where
in each of these 13 groups is approximately K , RAO 8 to ra-ResponseWindowSize is set to 5 subframes [27], and the
RAO 20 achieve maximum efficiency (which occurs when RAOs are located at subframes number 1 and 6 of any frames
Nr ≈ K ). The number of unsuccessful MTDs per RAO from (which is equivalent to setting PRACH Configuration Index
that point also drops below K and thus, no further division is to 6). If there is only one queue, it is easy to see that to satisfy
required and G is always 1 afterwards. the RAOs spacing condition i.e., consecutive usable RAOs of
a queue must be spaced at least W subframes apart, the queue
C. MULTIPLE DISTRIBUTED QUEUES AND PROPOSED can only use either the pair of subframes number 1 or 6, which
ACCESS PROCEDURE leads to only 50% RAOs utilization. To achieve full RAOs
In the previous subsection, we have comprehensively utilization while still secure the RAOs spacing constraint, we
described the operation of our proposed protocol which, how- propose the parallel use of two separate queues where the first
ever, only acts as a conceptual replacement to the underlying occupies the pair of subframes number 1 and the second takes
ALOHA-like framework of LTE. To be considered practical, the pair of subframes number 6 as depicted in the middle and
the protocol must fully satisfy the timing requirements of the bottom of Fig. 7, respectively. This concept extends naturally
LTE’s handshake procedure. Such task is actually non-trivial to other PRACH configurations. Also, we assume that the
due to the reasons discussed in the following paragraph. number of parallel queues as well as the allocated positions
From Fig. 2, it is seen that after performing a pream- of their RAOs inside a frame are broadcast to all MTDs by the
ble transmission, an MTD cannot take any further actions BS as part of system information. Upon entering the network,
until the corresponding RAR-probing time window is over. an MTD will randomly select a queue to associate with.
This time window begins at exactly three subframes after The access procedure, modified to accommodate our pro-
the MTD’s preamble transmission RAO and has a length posed protocol, can finally be visualized as in Fig. 8.
of ra-ResponseWindowSize subframes, which results in a
total locking interval of W = 3 + ra-ResponseWindowSize IV. ANALYTIC MODEL & PERFORMANCE ANALYSIS
subframes. Consequently, any RAOs taking place during this In this section, we propose an analytic model to study the
interval is considered unusable for the transmitting MTD. access delay of our proposed protocol. The operation of the
1 Nr (d)−1
Ps (d) = 1 − . (3)
K
As seen from the Fig. 9, if an MTD succeeds at a depth d, it
will have waited for a number of RAOs equal the total number
of nodes from all previous depths plus, on average, half of the
number of nodes of d (as it may belong to any node of d with
equal probabilities). For convenience, we denote the number
of nodes of a depth d by Ln (d) and the average number of
elapsed RAOs for a device succeeding at d by L(d). The
relationship between the two is expressed as
d−1
X Ln (d)
FIGURE 9. Analytic delay model of the proposed protocol. L(d) = Ln (d 0 ) + . (4)
2
d 0 =1
• For d = da , Ln (d) is rewritten as Note that D(Nq ) is measured in the unit of RAOs of the
a −2
dY MTD’s chosen queue. That is, these RAOs must be spaced
Ln (da ) = G(da − 1) G(d 0 ) = G(da − 1)K da −2 . at least W subframes apart of each other. To provide a
d 0 =1 more practical result, we fix the value of W to 8 subframes
(7) as in Fig. 7 and the spacing between consecutive RAOs
of a queue to 9 subframes (which is well longer than W )
• For d > da , there is no further splitting and thus, so that there is one RAO per one frame i.e., one RAO
Ln (d) = Ln (da ) = G(da − 1)K da −2 . (8) every 10ms, for every queue. The average delay that an
MTD has to wait until its successful preamble transmission,
It is clear that da must be derived for specific calculation
measured in the unit of seconds, is then easily found as
of L(d). To find da , we first observe that Ps (d) ≈ 0 and
0.01 ∗ D(Nq )
G(d) = K for all d < da − 1. Then, Nr (da − 1) can be
Finally, let us assume that there are N simultaneous arrivals
found as
to the system and Q queue(s) running in parallel. Since the
N
Nr (da − 1) = d −2 . (9) MTDs randomly choose one among Q queue(s) to perform
K a access, each queue serves on average Nq = N /Q simultane-
It is also reminded that at da − 1, the number of devices per ous arrivals. Furthermore, since the queues run in parallel, the
node starts dropping below K 2 i.e., Nr (da − 1) < K 2 . Thus, average delay of an MTD of any queue is also the average
N < K da and since da is the smallest integer that satisfies delay of all MTDs. That is, the average delay that an MTD
this condition, we can conclude that da = log(N )
log(K ) . It is has to wait until its successful preamble transmission given
important to note that G(da − 1) is consequently derived by N and Q, measured in the unit of seconds, is written as
substituting Nr (da − 1) in (9) into (5) and (3). This completes 0.01 ∗ D(N /Q).
the calculation for L(d).
Now that L(d) is found, the remaining task is to derive the V. RESULTS & DISCUSSIONS
probability that an MTD succeeds at d denoted by Pr(d). In this section, computer simulations using basic
This is interpreted as the probability that the device fails at MATLAB programming are performed to validate our ana-
all depths prior to d and then succeeds at d, which is then lytic model for delay analysis, as well as to demonstrate the
expressed as effectiveness of the proposed protocol in comparison with
d−1
Y standard ACB scheme and the CRQ protocol. Configuration
1 − Ps (d 0 ) .
Pr(d) = Ps (d) (10) parameters for the RA procedure are summarized in Table 1
d 0 =1 and are assumed to be known by all MTDs. As for the
As seen from (3), Nr (d) is required to calculate Ps (d) for traffic model, we employ batch arrivals with the following
any d. In general, Nr (d) can be written as assumptions (which are reasonable for M2M traffic):
• N MTDs try to access the network simultaneously every
(1 − Ps (d − 1)) Nr (d − 1)
Nr (d) = . (11) Tp seconds, where Tp is the period of the batches.
G(d − 1) • There is no new arrivals between two consecutive
Therefore, Nr (d) is a function of Nr (d −1). This establishes batches.
a recursive solution to find Nr (d) for any d, where the initial • Tp is long enough that all collisions from previous batch
condition is Nr (1) = Nq where Nq denotes the total number has been resolved by the time a new batch arrive.
of simultaneous arrivals at the MTD’s choosen queue. Thus, The protocols of interest are then assessed using access
Pr(d) for any d is consequently derived. Finally, the average delay as the main performance metric. Note that we only
number of RAOs (or correspondingly, the average access observe the random access delay of an MTD until when it
delay) that an MTD has to wait, denoted by D(Nq ), is found successfully sends its preamble, as following Msg. 2, 3 and 4
as transmissions are not random but scheduled by the BS. The
X∞ access delay of the MTD, in the unit of seconds, is then found
D(Nq ) = L(d)Pr(d). (12) as 0.01 × the number of RAOs of the chosen queue that has
d=1 elapsed until the MTD’s successful preamble transmission.
VOLUME 6, 2018 3015
A.-T. H. Bui et al.: Design and Performance Analysis of a Novel DQ Access Protocol
FIGURE 11. Average access delay comparison of the protocols, given PRACH Conf. Index = 3 and Tbar = 2s. (a) Lower access
region. (b) Massive access region.
FIGURE 12. Average access delay of the proposal and ACB under peak load i.e., N = 14700.
TABLE 2. Blocking probability of ACB schem under peak load i.e., N = 14700.
When the system is overloaded, e.g. PRACH Configuration to gradually drops as the barring time increases, it cannot
Index is 3, our proposed protocol outpaces the ACB scheme drop below ours even if Tbar keeps getting prolonged. This
by a remarkable margin for all tested Tbar . Moreover, we can claim is backed up by the fact that at Tbar settings where the
safely assure that although access delay of the latter seems observable performance gap is smallest i.e., at Tbar = 2s, the
blocking probabilities of the ACB is already very close to 0%. These models assume that the MTDs wake up to perform
That is, further increment in Tbar quickly puts the system back random access following certain temporal distributions over a
to the non-overload state in which the delay is bounded to rise fixed period, which is significantly different from the studied
as Tbar gets higher. simultaneous case where the MTDs access at the same time
Finally, one may conclude from Fig. 12 that in the case instance. Therefore, in our future works, we are interested in
of very high load, i.e. massive arrivals from MTDs, our seeing how our protocol fares compared to the ACB and other
protocol shows a performance level that is anywhere from novel access schemes under the 3GPP’s reference setups.
comparable with to significantly better than the ACB. What
we want to emphasize here is that the ACB scheme requires REFERENCES
almost perfect coordination between all LTE parameters in [1] D. Boswarthick et al., M2M Communications: A Systems Approach.
accordance with a specific load to achieve the performance Hoboken, NJ, USA: Wiley, 2012.
[2] M. Dohler et al., 5G Mobile and Wireless Communications Technology.
level similar to what ours has to offer. Cambridge, U.K.: Cambridge Univ. Press, 2016.
[3] Study on Facilitating Machine to Machine Communication in 3GPP Sys-
VI. CONCLUSIONS & FUTURE WORK tems, document 3GPP TR 22.868 V8.0.0, Mar. 2007.
[4] Machine to Machine Communications (M2M); Functional Architecture,
In this paper, the foreseen massive multiple access issue in document ETSI TS 102.690 V2.1.1, Oct. 2013.
the context of cellular-based M2M communications had been [5] A. Laya, L. Alonso, and J. Alonso-Zarate, ‘‘Is the random access chan-
throughout studied. It was seen that in dense scenario where nel of LTE and LTE-A suitable for M2M communications? A survey
of alternatives,’’ IEEE Commun. Surveys Tuts., vol. 16, no. 1, pp. 4–16,
hundreds of thousands of MTDs are expected to be housed 1st Quart., 2013.
by a single base station, simultaneous access attempts from [6] Evolved Universal Terrestrial Radio Access (E-UTRA); Radio Resource
a measly 1% of the population could still impose signifi- Control (RRC), document 3GPP TS 36.331 V10.5.0, Mar. 2012.
[7] MTC Simulation Results With Specific Solutions, document 3GPP TSG
cant stress on the current-gen LTE networks’ random access RAN WG2 # 71 R2-104662, Aug. 2010.
channel. Several existing countermeasures, including both [8] P. Si, J. Yang, S. Chen, and H. Xi, ‘‘Adaptive massive access management
the 3GPP’s ACB scheme and the CRQ protocol, as well as for QoS guarantees in M2M communications,’’ IEEE Trans. Veh. Technol.,
vol. 64, no. 7, pp. 3152–3166, Jul. 2015.
their pros and cons, were also investigated. More importantly, [9] A. Ilori, Z. Tang, J. He, K. Blow, and H.-H. Chen, ‘‘A random channel
we then introduced a novel DQ-based random access protocol access scheme for massive machine devices in LTE cellular networks,’’ in
coupled with an estimation strategy to address the issue in a Proc. IEEE ICC, London, U.K., Jun. 2015, pp. 2985–2990.
[10] S. Duan, V. Shah-Mansouri, Z. Wang, and V. W. S. Wong, ‘‘D-ACB:
more efficient manner. By randomly dividing unsuccessful Adaptive congestion control algorithm for bursty M2M traffic in LTE
MTDs in an RAO into a number of groups based on the networks,’’ IEEE Trans. Veh. Technol., vol. 65, no. 12, pp. 9847–9861,
estimation strategy’s output and pushing these groups to the Dec. 2016.
[11] G.-Y. Lin, S.-R. Chang, and H.-Y. Wei, ‘‘Estimation and adaptation for
end of a logical access queue to retry later, our protocol was bursty LTE random access,’’ IEEE Trans. Veh. Technol., vol. 65, no. 4,
able to avoid both the over-division problem of the CRQ and pp. 2560–2577, Apr. 2016.
the uncertainty factor of the ACB. The use of multiple access [12] J. Mišić, V. B. Mišić, and N. Khan, ‘‘Sharing it my way: Efficient M2M
access in LTE/LTE-A networks,’’ IEEE Trans. Veh. Technol., vol. 66, no. 1,
queues running in parallel was also suggested to fully exploit pp. 696–709, Jan. 2017.
the closely-spaced RAOs. Finally, we constructed a delay [13] W. Xu and G. Campbell, ‘‘A near perfect stable random access protocol for
model for the proposal and performed computer simulations a broadcast channel,’’ in Proc. IEEE ICC, Jun. 1992, pp. 370–374.
[14] F. Vázquez-Gallego, J. Alonso-Zarate, P. Tuset-Peiró, and L. Alonso,
to validate both the analytic model and the effectiveness of
‘‘Energy performance of distributed queuing access in machine-to-
the proposed protocol over the ACB and the CRQ. machine networks with idle-to-saturation transitions,’’ in Proc. IEEE
The simulation results showed that the CRQ initially out- GLOBECOM Wkshps, Atlanta, GA, USA, Dec. 2013, pp. 867–872.
[15] F. Vázquez-Gallego, J. Alonso-Zarate, P. Tuset-Peiró, and L. Alonso,
performed the ACB scheme, but quickly lost its favor when
‘‘Energy analysis of a contention tree-based access protocol for machine-
the load increased due to over-division. Our protocol, how- to-machine networks with idle-to-saturation traffic transitions,’’ in Proc.
ever, outpaced both the ACB and CRQ in a wide range of IEEE ICC, Sydney, NSW, Australia, Jun. 2014, pp. 1094–1099.
load up to around 15,000 simultaneous access attempts, given [16] A. Laya, L. Alonso, and J. Alonso-Zarate, ‘‘Contention resolution queues
for massive machine type communications in LTE,’’ in Proc. IEEE
a certain LTE configuration. Under closer inspection at peak PIMRC Workshop M2M Commun., Challenges, Solutions Appl., Sep. 2015,
load, it was seen that even with different LTE configurations, pp. 2314–2318.
our protocol exhibited a performance level ranging from [17] A. Laya, L. Alonso, and J. Alonso-Zarate, ‘‘Efficient contention resolution
in highly dense LTE networks for machine type communications,’’ in Proc.
comparable with to remarkably better than the ACB. Thus, IEEE Global Commun. Conf. (GLOBECOM), Dec. 2015, pp. 1–7.
the proposed protocol emerged as one highly feasible solution [18] F. Vázquez-Gallego, L. Alonso, and J. Alonso-Zarate, ‘‘Energy harvesting-
for massive M2M access scenario, when the CRQ suffered aware distributed queuing access for wireless machine-to-machine net-
works,’’ in Proc. IEEE GLOBECOM, Washington, DC, USA, Dec. 2016,
from the severe impact of over-division and the ACB started pp. 1–7.
getting overloaded. [19] F. M. Awuor and C.-Y. Wang, ‘‘Massive machine type communication
Finally, it is worth noting that besides the simultaneous in cellular system: A distributed queue approach,’’ in Proc. IEEE ICC,
Kuala Lumpur, Malaysia, May 2016, pp. 1–7.
access pattern considered in this paper, there exists other [20] A.-T. H. Bui and A. T. Pham, ‘‘Efficient access protocol for massive
approaches to model MTDs’ access patterns as well. In fact, M2M communications in LTE,’’ in Proc. IEICE General Conf., Mar. 2017,
the 3GPP has readily provided two references, quoted as the pp. BS-1–BS-34.
[21] A.-T. H. Bui, C. T. Nguyen, T. C. Thang, and A. T. Pham, ‘‘An improved
uniform and Beta traffic models, to depict the access patterns DQ access protocol for cellular-based massive M2M communications,’’ in
of uncorrelated and highly correlated MTDs, respectively. Proc. IEEE/CIC ICC China, Qingdao, China, Oct. 2017.
[22] Evolved Universal Terrestrial Radio Access (E-UTRA); Physical Channels TRUONG C. THANG received the B.E. degree
and Modulation, document 3GPP TS 36.211 V10.4.0, Dec. 2011. from the Hanoi University of Science and Tech-
[23] Evolved Universal Terrestrial Radio Access (EUTRA); Medium Access nology, Vietnam, in 1997, and the Ph.D. degree
Control (MAC), document 3GPP TS 36.321 V9.3.0, Jun. 2010. from KAIST, South Korea, in 2006. From 1997
[24] S. Ghez, S. Verdú, and S. C. Schwartz, ‘‘Stability properties of slotted to 2000, he was a Network Engineer with Viet-
Aloha with multipacket reception capability,’’ IEEE Trans. Autom. Control, nam Post and Telecom. From 2007 to 2011, he
vol. 33, no. 7, pp. 640–649, Jul. 1988. was a Research Staff Member with the Electronics
[25] A. Laya, C. Kalalas, F. Vazquez-Gallego, L. Alonso, and J. Alonso-Zarate,
and Telecommunications Research Institute, South
‘‘Goodbye, ALOHA!’’ IEEE Access, vol. 4, pp. 2029–2044, Apr. 2016.
Korea. He was also an active member of South
[26] M. Shirvanimoghaddam, M. Dohler, and S. J. Johnson, ‘‘Massive multiple
access based on superposition raptor codes for cellular M2M communi- Korean and Japanese delegations to standard meet-
cations,’’ IEEE Trans. Wireless Commun., vol. 16, no. 1, pp. 307–319, ings of ISO/IEC and ITU-T from 2002 to 2014. Since 2011, he has been
Jan. 2017. an Associate Professor with The University of Aizu, Japan. His research
[27] C. Anton-Haro and M. Dohler, Machine-to-Machine (M2M) Communi- interests include multimedia networking, image/video processing, content
cations: Architecture, Performance and Applications. Cambridge, U.K.: adaptation, IPTV, and MPEG/ITU standards.
Woodhead Publishing, 2015.