Professional Documents
Culture Documents
Group Paging-Based Energy Saving For Massive MTC Accesses in LTE and Beyond Networks
Group Paging-Based Energy Saving For Massive MTC Accesses in LTE and Beyond Networks
5, MAY 2016
Abstract—Next generation cellular networks (5G) have to deal the aforementioned vision, MTC would support a large num-
with massive deployment of machine-type-communication (MTC) ber of applications, in various domains, such as Healthcare
devices, expected to cause congestion and system overload in both (eHealth), Intelligent Transport System (ITS), smart grid and
the radio access network (RAN) and the core network (CN).
Moreover, not only would the network suffer from the system over- smart metering, Public Safety (PS), etc.
load, but also the MTC devices would experience high latency to Energy conservation represents an important factor for the
access the channel and high power consumption due to the retrans- successful deployment of MTC devices. Particularly, for mas-
mission attempts. Indeed, power consumption is a critical issue sive MTC deployment case (noted by massive MTC), whereby
in MTC, as the devices are not plugged into the electrical sup- the devices need to be low-cost, affordable and able to operate
ply, e.g., in the case of sensor devices. To alleviate system overload
(caused by the massive MTC deployment), the 3GPP proposed on a battery for several years, i.e. strict requirements for low
the group paging (GP) method. However, its performances dra- power consumption (e.g., 10 times longer battery life). Indeed,
matically decrease when increasing the number of MTC devices recent forecasts predict that: (i) there would be 50 billion MTC
being paged. In this paper, we devise a novel method, named fur- devices by 2020 [2]; (ii) MTC traffic would increase 24 times
ther improvement-traffic scattering for group paging (FI-TSFGP), by 2017 compared to 2012; (iii) the total traffic volume, in
which aims to improve the performance of GP when the number
of MTC devices is high. FI-TSFGP scatters the paging opera- the wireless communication systems, would be increased 1000
tion of the MTC devices over a GP interval instead of letting all times compared to today’s traffic volume [3]–[5]. Massive MTC
of the devices start the channel access procedure at nearly the would not only impact the cellular network functioning by
same time. By doing so, FI-TSFGP achieves high-channel access introducing system overload and congestion, but also the MTC
probability for MTC devices, leading to the reduction of both the devices in terms of energy consumption. Indeed, massive MTC
channel access latency and power consumption. Compared to GP
and two other schemes, simulation results clearly demonstrate the will generate a huge amount of data/control traffic, leading to
high performance of FI-TSFGP in terms of: success and collision congestion and system overload in both the RAN and CN parts.
probabilities, average access delay, average number of preamble This congestion may cause intolerable delay, packet loss, or
transmissions, and ultimately energy conservation. even service unavailability for both MTC and Non-MTC traffic.
Index Terms—MTC, M2M, massive MTC, Energy efficient, At the same time, MTC devices will experience low success in
LTE, LTE-A, 5G, congestion control, overload control, RACH accessing the channel access, thus increasing the retransmission
procedure, group paging. attempts and dramatically increasing the energy consumption.
In this context, it is important to devise mechanisms that alle-
I. I NTRODUCTION viate system overload and consequently increase the MTC
0733-8716 © 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Indian Institute of TechnologyDharwad. Downloaded on June 21,2022 at 11:55:21 UTC from IEEE Xplore. Restrictions apply.
AROUK et al.: GROUP PAGING-BASED ENERGY SAVING FOR MASSIVE MTC ACCESSES IN LTE AND BEYOND NETWORKS 1087
MTC devices are in the RRC_CONNECTED mode, ignoring CHannel (RACH) procedure, existing solutions can be classi-
the RRC_IDLE mode. The authors in [10] propose to repeat the fied into two categories: Push and Pull based approaches. In
group paging interval, i.e. Consecutive Group Paging (CGP), the push category, the RACH procedure is initiated by the ter-
so that the MTC devices having not succeeded in the first GP minals (UEs or MTC devices), which yields to consider it also
interval will try to access the network in the subsequent GP as a decentralized control scheme. Many methods fall in this
interval(s). However, CGP performances are worse than the category [15]:
classical Group Paging [6] for certain configuration. In [11], 1. Separate RACH resources: when sharing the resources
and similar in spirit to the idea of [12], the authors proposed between M2M and Human-to-Human (H2H), there will
enforcing some backoff time on new transmission attempts be a large impact on the QoS of H2H as the number of
before the first preamble transmission, i.e. pre-backoff. Results MTC is naturally larger. Separating the RACH resources
presented in [11] showed the superiority of pre-backoff (PBO) between M2M and H2H is a requirement to limit the
method by report to the classical GP method. Another improve- impact of MTC on H2H traffic. This separation could be
ment of the GP method was introduced in [13], wherein a new done through different ways; time, frequency, preamble
method is devised, namely Traffic Scattering For Group Paging separations, or a mixture of them. However, the disad-
(TSFGP), which highly improves the performance, compared vantage of this scheme is that the resources of one type,
to GP, regardless the state of the device. In this paper we for example MTC’s dedicated resources, can not be used
introduce a Further Improved version of TSFGP (i.e., dubbed by another type having more traffic, even when the first
as FI-TSFGP) that enhances TSFGP performance leveraging type does not have traffic to send. Based on the latest
a better estimation of both the total number of arrivals and observation, static separation of resources is not a good
the number of successful MTC devices in the stable state. option. Another solution consists in separating the avail-
FI-TSFGP accurately estimates the latter, whatever the net- able resources into two groups: the first one is dedicated
work’s parameters (e.g., the number of preamble transmissions to H2H, and the another one is shared between H2H
N P Tmax and the number of available preambles R), which is and M2M [16]. Note that simulation results in [16] have
not the case of TSFGP that fails for certain configurations (e.g., proved that this method of separation outperforms the
when N P Tmax is large and R is small). Accordingly, FI-TSFGP static separation.
gives the flexibility to change the network’s parameters, e.g. 2. Dynamic allocation of RACH resources: this scheme can
changing the GP interval by changing the number of pream- be viewed as an improvement of the precedent one, since
ble transmissions. On the other hand, FI-TSFGP shares the the resources are dynamically allocated based on the
same objective as PBO, i.e. reducing the collisions during the predicted traffic. Though this scheme better handles the
RACH procedure. To achieve this objective, PBO spreads the congestion’s problem, it can be used only when the net-
MTC devices (via pre-backoff operation) over a certain interval work is aware about the time when the MTC devices have
regardless their number, while FI-TSFGP activates the num- information to be sent.
ber of MTC devices that maximizes the performances (e.g., 3. Access Class Barring (ACB) Scheme: by introducing a
maximizing the success probability and the resource utiliza- separate access class(es) for MTC devices, ACB allows
tion). Thanks to this difference (as illustrated in section V), the network to control the access of MTC devices sepa-
FI-TSFGP maintains good performances whatever the num- rately, avoiding any impact or penalty on the Non-MTC
ber of MTC devices, while PBO performances degrade when traffic. The granularity of the Access Class could be
the number of MTC devices increases. Compared to GP [6], extended to even distinguish between MTC classes, i.e.
CGP [10], and PBO [11], FI-TSFGP highly outperforms these to introduce priority between MTC applications. When
methods in terms of success and collision probabilities, average the ACB method is used, the network broadcasts two
access delay, average number of preamble transmissions, and parameters: (i) acb_Barring Factor that represents the
ultimately energy efficiency. probability of barring; (ii) acb_BarringT ime that deter-
The remainder of the work is organized as follows. Section II mines the duration in which the terminal should back off,
introduces a quick overview of the related works. Some back- before retrying the RACH procedure (if it fails to pass
ground about MTC system architecture, and RACH procedure the ACB check). In the literature, there are many meth-
is introduced in section III. In section IV, system model, used ods targeting the dynamic changes of the ACB parame-
in our study, and the analysis of our proposition are detailed. ters, especially the parameter acb_Barring Factor , such
The performance results of FI-TSFGP, GP, CGP, and PBO are as [17] which tries to adjust acb_Barring Factor using
presented and compared in section V. Finally, conclusions are the Proportional Integrative Derivative (PID) controller,
presented in section VI. and [18] where a traffic prediction is used in order to
adjust the acb_Barring Factor in the case of Beta traffic
as specified by 3GPP [15]. The authors in [19] intro-
duced a new RACH procedure engineered for M2M
II. R ELATED W ORK
communication, which is essentially a combination of the
Congestion and system overload, that may occur when conventional RACH procedure with ACB. The advantage
deploying MTC in LTE, are usually tackled by using different of this scheme consists in the fact that it allows the MTC
techniques, such as increasing the available resources [14] or devices to transmit their data just after the preamble trans-
by throttling/controlling the traffic. Based on which entity (i.e., mission. It also has a self-optimization feature, allowing
UE or evolved Node B - eNB) initiates the Random Access the system to achieve optimal MTC throughput.
Authorized licensed use limited to: Indian Institute of TechnologyDharwad. Downloaded on June 21,2022 at 11:55:21 UTC from IEEE Xplore. Restrictions apply.
1088 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 34, NO. 5, MAY 2016
Regarding the second category, i.e. pull based scheme, the third party [21]. On the other hand, MTC-IWF hides the inter-
network (eNB) initiates the RACH procedure. This category nal topology of the Public Land Mobile Network (PLMN) and
is also known as centralized control solutions. There are sev- relays or translates signaling protocols used over Tsp (a refer-
eral Pull based congestion control methods, among them we ence point used by a SCS to communicate with the MTC-IWF
can cite the Paging and Group Paging (GP) methods. In the related control plane signaling) in order to invoke specific func-
Paging method, the network sends a paging message when it tionality inside the PLMN. There are one or more instances of
needs some information from a certain terminal. This method MTC-IWF in the HPLMN and it can be a standalone entity or
is a rational one when paging a few number of devices, while a functional entity of another network element, with the abil-
it becomes impractical when paging a large number of MTC ity to connect to one or more SCSs [20]. As shown in Fig. 1,
devices. As an example, paging 36000 MTC devices will there are three ways for establishing communication between
require about 11.5 s if we know that there are two paging occa- MTC servers and MTC devices: direct model, indirect model,
sions in each radio frame (10 ms) and at most 16 MTC devices and hybrid model [20]. In the direct model, a MTC server is
can be paged by each paging occasion. One solution of this directly connected to the operator’s network in order to per-
issue is to use the GP method, whereby all the members of form user plane communications with the devices (UE or MTC)
the group are paged by just one paging message, addressed by without using any SCS. In the indirect model, the MTC server
GID [6], [7]. indirectly connects through the services of a SCS to the opera-
Given that Push based approaches are decentralized control tor’s network. The hybrid model is when the direct and indirect
solutions, the resource utilization would not be stable, and it models are used simultaneously.
might be degraded in the presence of a large number of devices.
Besides, it is so difficult to regulate the network load as the
traffic is originated by the devices. However, there are some
B. RACH Procedure
advantages of using this category. For example, the signaling
load will be low, as there is no need for paging messages. A terminal trying to connect to the network must perform
Further, this category is adequate for unscheduled events, such Radio Resource Control (RRC) connection setup procedure
as detection of the fire in the forest. On the other hand, in the (see Fig. 2) [22], [23]. The first four signaling steps concern
Pull based approaches, the resource utilization would be more the random access procedure, also known as Initial Ranging
stable due to the fact that the control is totally held by the (IR) [24]–[27], and they are detailed below. It should be noted
network. Furthermore, the network load would be easily reg- that lots of research work is being conducted to accommo-
ulated. The disadvantage of this category is the signaling load, date the RACH procedure with millimeter Waves (mmWave)
which will be slightly higher because of the paging message(s). beamforming cellular networks, which is expected to be used
Pull based approach is also inadequate for unscheduled events. in 5G [28], [29]. In general, there are two forms of random
Indeed, when it is applied with unscheduled events, the network access procedure: contention-based and contention-free ran-
has to send every time a paging message to know whether the dom access procedures. The first one is used, for example, when
devices need to send information or not. Pull based approach a terminal is moving from RRC_IDLE to RRC_CONNECTED,
will be costly if it is applied with unscheduled events. In spite or trying to recover the uplink synchronization, while the sec-
of its disadvantages, it is preferable, from the network’s view- ond one is used, for example, for handover or DownLink (DL)
point, to use the Pull based approach, rather than Push based data arrival [23]. The steps of the RACH procedure are as
one, whenever it is possible as the control is totally held by the follow (also depicted in Fig. 2):
network. 1) Random Access Preamble Transmission (Msg1): The
first step consists in transmitting a randomly chosen preamble.
This step allows the eNB to estimate the transmission timing of
III. MTC IN THE 4G L ANDSCAPE the terminal that would be later used for adjusting the uplink
synchronization. The frequential temporal resource in which
A. MTC Network Architecture
the preamble is transmitted is known as the Physical Random
Fig. 1 illustrates the envisioned 3GPP architecture to sup- Access CHannel (PRACH). As the preamble is randomly cho-
port MTC [20]. It consists of three main domains: the MTC sen, we may have the case that more than one terminal choose
domain, the communication network domain, and the MTC the same preamble, thus causing a collision. Another important
application domain. The MTC application domain comprises objective of this step is to adjust the power transmission of the
MTC servers, which are under the control of the mobile net- terminal, which is achieved by the power ramping factor that
work operator or a third party. Two new entities relative to is Power Ramping Step (P RS) in equation (2). For the first
MTC communication have been recently added to the 3GPP time of preamble transmission, all the terminals in the cell will
architecture: the MTC InterWorking Function (MTC-IWF) and transmit with the same power. The received power level of the
the Services Capability Server (SCS). SCS is an entity con- signals transmitted by terminals close to the base station, i.e.
necting MTC application servers to the 3GPP network so as to eNB, would be enough to be detected, while this level for those
enable them to communicate through specific services, defined far from the eNB may not be sufficient to be detected. In the lat-
by 3GPP, with MTC and MTC-IWF. The SCS can be connected ter situation, these terminals will retransmit the preamble with a
to one or more MTC-IWFs and it is controlled by the operator power level P RS dB higher than the one used in the precedent
of the Home Public Land Mobile Network (HPLMN) or by a attempt. The advantage of this technique is that each terminal
Authorized licensed use limited to: Indian Institute of TechnologyDharwad. Downloaded on June 21,2022 at 11:55:21 UTC from IEEE Xplore. Restrictions apply.
AROUK et al.: GROUP PAGING-BASED ENERGY SAVING FOR MASSIVE MTC ACCESSES IN LTE AND BEYOND NETWORKS 1089
uses the power level that ensures that the signal is well detected receiving the second message (Msg2). Indeed, the terminals, in
by the eNB, without wasting any additional power. this case, share the same temporary identifier (TC-RNTI). Each
2) Random Access Response Reception (Msg2): Once the terminal receiving the downlink message compares the iden-
random access preamble is transmitted, the terminal monitors tity in the message with the one transmitted in the third step.
the Physical Downlink Control CHannel (PDCCH) to receive Only the terminal observing a match between the two identities
the Random Access Response (RAR) message during the RAR will declare that the random access procedure has been success-
window. This message is identified by the Random Access- fully finished. After adjusting the power transmission, the other
Radio Network Temporary Identifier (RA-RNTI) associated terminals restart the RACH procedure.
with the PRACH in which the RA preamble is transmitted.
The RAR message consists of the Timing Advance (TA) com-
mand, which is used to adjust the uplink synchronization, and C. Power Consumption
the Temporary Cell-Radio Network Temporary Identifier (TC- As stated earlier, power consumption is very critical for
RNTI). The TC-RNTI is the temporary identity of the terminal efficient deployment of MTC, especially in case of Massive
in the cell and it is promoted to C-RNTI if the terminal has no MTC. The RACH procedure represents one of the most energy
yet a one. The RAR message also assigns to the terminal uplink consuming procedures in the MTC device lifecycle. Formally
resources to be used in the next step. For Non-contention based speaking, the preamble transmission power can be expressed as
RACH procedure, the terminal supposes that the RACH pro- follows [30]:
cedure has been successfully finished, while the terminal with
contention-based continues to the third step. It is worth not- PP R AC H = min{PC M AX , P RT P + P L} (1)
ing that the terminals that did not receive a response during the
RAR window will do backoff. When the backoff timer expires, where, PC M AX is the maximum UE transmit power as speci-
they will adjust the power transmission, by the open loop power fied in [31], P L is the Path Loss, explained below. It is worth
control, and then retransmit the preamble. noting that the maximum value of PC M AX is 23 dBm, as spec-
3) RRC Connection Request (Msg3): After the successful ified by 3GPP. P RT P is the Preamble Received Target Power,
reception of Msg2, the terminal adjusts the uplink synchroniza- which is the perceived power level of the PRACH preamble
tion and sends the Msg3 containing its ID and the RRC con- when reaching the eNB. This power is given by the following
nection request using the UpLink-Shared CHannel (UL-SCH) equation [32]:
obtained in the step 2. P RT P = P I RT P + pr mbl + (n tr − 1) ∗ P RS (2)
4) RRC Connection Setup (Msg4): This step is a response
to the precedent one, informing the terminal that RRC connec- where P I RT P is the Power Initial Received Target Power,
tion has been setup. Moreover, this step helps in solving access representing the initial values by which the PRACH pream-
problems when more than one terminal use the same resources ble is transmitted for the first time, and it takes the values
(the same preamble and the same PRACH) while successfully between (−120 dBm) and (−90 dBm) with a step (2), i.e.
Authorized licensed use limited to: Indian Institute of TechnologyDharwad. Downloaded on June 21,2022 at 11:55:21 UTC from IEEE Xplore. Restrictions apply.
1090 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 34, NO. 5, MAY 2016
TABLE I
L IST OF A BBREVIATIONS
Authorized licensed use limited to: Indian Institute of TechnologyDharwad. Downloaded on June 21,2022 at 11:55:21 UTC from IEEE Xplore. Restrictions apply.
AROUK et al.: GROUP PAGING-BASED ENERGY SAVING FOR MASSIVE MTC ACCESSES IN LTE AND BEYOND NETWORKS 1091
TR A R + W R A R TR A R + W R A R W B O − αa W B O
xa (i) = i + (6) =i+ + +1
TR A_R E P TR A_R E P TR A_R E P
+W R A R
where xa (i) is the order of the first RA slot within backoff = i + TRTARRA_R +
E P
window, relative to the preamble transmission at the RA slot WB O TR A R +W R A R +W R A R
TR A_R E P − TR A_R E P + TRTARRA_R +1
(i), TR A R is the processing delay at the eNB, and TR A_R E P is EP
TR A R + W R A R + W B O
retransmit their preambles at the RA slot (a) is equal to the time xd (i) = i + +1 (10)
of the slot (a), in a sub-frame unit, minus the duration before the TR A_R E P
start of the Backoff window (normalized by W B O ): and the proportion of MTC devices in this case is equal to:
[1 + (xa (i) − 1)TR A_R E P ]
αa = αd = 1 − αa − αbc K max
WB O QT −(T +W )
= 1 − R A_R E P W B OR A R R A R −
[1 + (i − 1)TR A_R E P + TR A R + W R A R ]
− TR A_R E P WB O
− Q + TR A R +W R A R
WB O WB O TR A_R E P TR A_R E P
Authorized licensed use limited to: Indian Institute of TechnologyDharwad. Downloaded on June 21,2022 at 11:55:21 UTC from IEEE Xplore. Restrictions apply.
1092 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 34, NO. 5, MAY 2016
⎧ M
⎨ Mi [n]e− Ri pn ; if Mtot i,s ≤ N AC K
Mi,s [n] = M
− i (14)
⎩ Mi [n]e R pn
N AC K ; otherwise
Mtoti,s
N P Tmax Mi
where Mtot i,s = n=1 Mi [n]e− R pn . However, the net-
work can not send back responses to more than N AC K MTC
devices even if the number of successful MTC devices is more
than N AC K . Hereafter, we will focus on the case where the
number of successful MTC devices is less than or equal to
N P Tmax Mi
N AC K , i.e. n=1 Mi [n]e− R pn ≤ N AC K . Accordingly, the
Fig. 4. Cumulative parts of W B O for each RA slot for MTC devices number of successful MTC devices at the RA slot (i) could be
transmitting their preambles for the second time, where W B O = 21 and written as:
T R A_R E P = 5 Mi
Mi,s [n] = Mi [n]e− R pn (15)
+W R A R
where Q = TRTARRA_R EP
. Therefore, αd is equal to: Let Mar v denote the number of new arrivals at each RA slot,
which represents the value Mi [1], and therefore the number of
TR A R +W R A R +W B O
αd = − successful and collided MTC devices will be:
WB O (11)
TR A_R E P TR A R +W R A R +W B O Mi Mi
WB O TR A_R E P Mi,s [1] = Mi [1]e− R p1 = Mar v e− R p1 (16)
M
It is worth noting that αa + K max αbc + αd = 1. Accordingly, Mi,c [1] = Mar v − Mi,s [1] = Mar v (1 − e − Ri
p1 ) (17)
the numbers of MTC devices retransmitting their preambles for
the second time are equal to: From Fig. 4, we clearly see that when the total number of
⎧ MTC devices, and consequently the number of successful
⎨ M1,c × αa ; for RA slot a MTC devices, is stable (i.e., merely constant), the cumulative
Mr etrans = M1,c × αbc ; for RA slots bc (12) parts of W B O is equal to W B O . Therefore, the collided MTC
⎩
M1,c × αd ; for RA slot d devices, engendered from the precedent RA slots, whose back-
off timers expire and retransmit the preamble for the (n + 1)th
By assuming that each RA slot experiences the same number
time at the current RA slot, i.e. Mi [n + 1], will be equal to
of new arrivals, the number of successful and collided MTC
the number of collided MTC devices at the current RA slot
devices will be the same as given by the equations (4), (5),
transmitting their preambles for the n th time, i.e. Mi,c [n]. This
and (12), and they will generate the same graphic as illustrated
means that Mi,c [n] = Mi [n + 1]. For example, the number of
in Fig. 3. Therefore, the number of collided MTC devices at
MTC devices transmitting their preamble for the second time is
each RA slot will be the sum of the contribution of each RA
equal to:
slot, as illustrated in Fig. 4. From this figure, we clearly see that
when the number of new arrivals at each RA slot is the same, 2
i−H
we come up to a situation where the number of MTC devices Mi [2] = αh Mh,c [1] (18)
retransmitting their preambles is constant. This implies that the h=i−H1
number of successful and collided MTC devices at each RA slot
will be constant too. where H2 = (TR A R + W R A R + W B O )/TR A_R E P + 1 and
H1 = (TR A R + W R A R )/TR A_R E P , deduced directly from
xd (i) and xa (i), respectively. αh can be one of the following
C. Analytical Model values: αa , αbc , and αd . As the system is in the stable state, both
The idea behind our proposition FI-TSFGP is to scatter the the number of collided MTC devices transmitting their pream-
MTC devices of a group being paged over the available interval ble for the first time (Mh,c [1]) and the total number of MTC
rather than leaving them to start the contention-based RACH devices (Mh ) are constant. Note that Mh,c [1], which is equal to
procedure all at once. Generally speaking, the number of MTC Mi,c [1], is given by the equation (17). Then, the equation (18)
devices at the RA slot (i) can be written by the following becomes:
equation: 2
i−H
Mi [2] = Mi,c [1] × αh (19)
N P Tmax
h=i−H1
Mi = Mi [n] (13)
n=1 As the cumulative parts of W B O is equal to W B O , we deduce
from Fig. 3 and 4 that:
where N P Tmax is the maximum number of preamble transmis-
sions, and Mi [n] is the number of MTC devices transmitting 2
i−H
their preamble for the n th time in the RA slot (i). The number αh = αa + K max αbc + αd = 1 (20)
of successful MTC devices at the RA slot (i) is equal to [7], [8]: h=i−H1
Authorized licensed use limited to: Indian Institute of TechnologyDharwad. Downloaded on June 21,2022 at 11:55:21 UTC from IEEE Xplore. Restrictions apply.
AROUK et al.: GROUP PAGING-BASED ENERGY SAVING FOR MASSIVE MTC ACCESSES IN LTE AND BEYOND NETWORKS 1093
and thus Mi [2] = Mi,c [1]. The numbers of collided and suc-
cessful MTC devices transmitting their preamble for the second
time are equal to:
Mi
Mi [2] = Mi,c [1] = Mar v (1 − e− R p1 )
Mi Mi Mi
Mi,s [2] = Mi [2]e− R p2 = Mar v (1 − e− R p1 )e− R p2
n−1
Mi
Mi [n] = Mi,c [n − 1] = Mar v (1 − e− R pk ) (22)
N P Tmax −1
k=1
×Mi + 2R 2 αm = 0 (28)
Therefore, the total number of MTC devices at each RA slot, in m=0
the stable state, is equal to:
This equation is a second order one for Mi , which can be solved
N P Tmax N P Tmax n−1
Mi easily. After obtaining the total number of MTC devices in the
−
Mi = Mi [n] = Mar v (1 − e R pk ) (23) stable state, Mi , we calculate the number of successful MTC
n=1 n=1 k=1
devices by the following equation:
The equation (23) can be written by the following form (see the
N P Tmax
appendix A for the demonstration):
Mi,s = Mi,s [n] (29)
N P Tmax −1
m Mi n=1
Mi = Mar v αm e− R (24)
m=0 where Mi,s [n] is given by the equation (21). Fig. 5 shows the
number of MTC devices transmitting their preambles for the i th
where αm is: time, and also the total number of arrivals and the number of
N P Tmax −m successful MTC devices (N P Tmax = 5). It is worth noting that
t
t+m−1
the calculated value by the equation (28) is for the case when
αm = (−1)m ... pk1 ... pkm (25)
the number of arrivals is stable.
t=1 k1 =1 km =km−1 +1
Fig. 6-8 and 7-9 illustrate the true and the approximate val-
m times ues of the total number of MTC (equation 28) and the number
However, the exponential function can be approximated by the of successful MTC (equation 29), respectively. These figures
following equation [36]: include the results for TSFGP as well FI-TSFGP for the sake of
comparison. Moreover, different values of R, Mar v , and N P Tmax
∞
were considered. From these figures, we clearly see that TSFGP
xn x2
ex = =1+x + + ... (26) method generally gives a good estimation of the total num-
n! 2!
n=0 ber and also the number of successful MTC devices. However,
TSFGP fails to estimate the intended values for certain con-
Applying this approximation to the equation (24), we find that:
figurations, e.g. R = 42, Mar v = 15 and N P Tmax = 10 (Fig. 6
N P Tmax −1
N P Tmax −1
and 7). To cope with this shortcoming, FI-TSFGP uses an iter-
Mi Mi
= αm − mαm + ative operation as illustrated in Algorithm 1, where δ is the
Mar v R tolerated error. Note that we assume that the value calculated
m=0 m=0
Authorized licensed use limited to: Indian Institute of TechnologyDharwad. Downloaded on June 21,2022 at 11:55:21 UTC from IEEE Xplore. Restrictions apply.
1094 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 34, NO. 5, MAY 2016
Fig. 6. The total number of arrivals in the stable state as function of the num- Fig. 9. The number of successful MTC devices in the stable state as function
ber of new arrivals Mar v for different number of preambles; N AC K = 15 and of the number of preamble transmissions N P Tmax ; Mar v = N AC K = 15
N P Tmax = 10
N P Tmax −1
m Mi curr ent
Minew ← Mar v αm e− R
m=0
m=0
end while
Micurr ent ← Minew
Fig. 8. The total number of arrivals in the stable state as function of the number
of preamble transmissions N P Tmax ; Mar v = N AC K = 15
Authorized licensed use limited to: Indian Institute of TechnologyDharwad. Downloaded on June 21,2022 at 11:55:21 UTC from IEEE Xplore. Restrictions apply.
AROUK et al.: GROUP PAGING-BASED ENERGY SAVING FOR MASSIVE MTC ACCESSES IN LTE AND BEYOND NETWORKS 1095
In order to make sure that there will be, on average, Mar v MTC
devices at each RA slot, we then distribute the devices over a
virtual interval containing I Vmax RA slots, where;
(M/N )
I Vmax = (30)
Mar v
Authorized licensed use limited to: Indian Institute of TechnologyDharwad. Downloaded on June 21,2022 at 11:55:21 UTC from IEEE Xplore. Restrictions apply.
1096 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 34, NO. 5, MAY 2016
TR A_R E P /2 = 2.5 ms, the average power consumption during be the sum of the access delay in the current paging interval
this period is equal to 2.5 × 100.1×∗P1 mW, which is added for plus the time of the precedent paging intervals, and the same
all the MTC devices at the start of the simulation. In order to thing for the average number of preamble transmissions. Let
show how our proposition behaves, FI-TSFGP will be com- (r ) be the number of preamble transmissions, then the CDF of
pared with the Group Paging (GP), Consecutive Group Paging preamble transmission can be defined as the number of MTC
(CGP) [10], and Pre-BackOff (PBO) methods [11]. The main devices successfully finished their RACH procedure by (r )
idea of CGP is to repeat the paging interval many times so times or less of preamble transmission divided by the total num-
that the MTC devices having not succeeded in the first pag- ber of successful MTC devices, and it is given by the following
ing interval will try to access in the next paging interval and equation:
so on. Note that the number of paging cycles, i.e. Cmax , and Imax r
N P Tmax are chosen to be equal to (7) and (3), respectively, as Mi,s [n]
C D FR (r ) = i=1 N n=1 (32)
these values maximize the performance of CGP [10]. Regarding Imax P Tmax
Mi,s [n]
i=1 n=1
the PBO method [11], all the members of the intended group
will do backoff before the first preamble transmission. As the Let (d) be the access delay for the RACH procedure between
authors did not give the optimal value of pre-backoff for a group the first attempt and the completion of the RACH procedure.
size more than 1000 MTC devices, we choose an integer value The CDF of access delay can be defined as the number of MTC
(using the equation 1 of [11]) higher than 200. Indeed, the opti- devices successfully finished the RACH procedure before the
mal value of PBO for a group size of 1000 MTC devices is time (d) and the total number of successful MTC devices. It is
more than 200. Then, the chosen value is W P B O = 240 and given by the following equation:
the corresponding maximum number of preamble transmissions
d
is N P Tmax = 8. We recall that FI-TSFGP tries to activate, at Ms,t
each RA slot during the available interval, the number of MTC C D FD (d) = Tt=1 (33)
max
t=1 Ms,t
devices that maximizes the performance. However, PBO tries
to spread the MTC devices during a certain interval regardless where Ms,t is the number of successful MTC devices whose
the size of the intended group. access delay is equal to (t), and Tmax is the maximum access
delay that is equal to the time of the paging interval in a sub-
frame unit, i.e. Tmax = 1 + (Imax − 1) ∗ TR A_R E P + TR A R +
A. Performance Metrics
W R A R . The resource utilization (RU) can be defined as the
The metrics considered to evaluate the performance of the ratio of the total number of successful MTC devices to the total
four above-mentioned schemes are: success, collision, and drop available RAOs, and it can be given by the following equation:
(only for FI-TSFGP) probabilities, average access delay, aver-
Imax N P Tmax
age number of preamble transmissions, resource utilization, i=1 n=1 Mi,s [n]
Cumulative Distribution Function (CDF) of both preamble RU = (34)
Imax R
transmission and access delay, and power consumption. The
success probability is defined as the number of MTC devices Regarding the power consumption, four values are consid-
successfully finished their RACH procedure within the max- ered: the power consumption for successful, collided, dropped
imum number of preamble transmissions, normalized by the (just for FI-TSFGP), and the total number of MTC devices.
total MTC devices (activated and non-activated, for FI-TSFGP, The Power consumption for successful/collided/dropped MTC
ones). The collision probability is the ratio between the num- devices is the mean power consumption of the MTC devices
ber of collided RAOs and the total number of available RAOs. having successfully accessed the network/collided/dropped,
Since Mar v MTC devices will be activated at each RA slot respectively. These parameters will be calculated for GP
for FI-TSFGP, there will be a part of MTC devices that will method, and then generalized for FI-TSFGP. Usually, the power
not be activated when ((M/N ) > Imax Mar v ). Thus, the drop’s consumption of the successful MTC devices consists of the
probability is equal to: following parts (we assume that the device needs n preamble
transmission before a successful attempt):
(M/N )−Imax Mar v
(M/N ) if (M/N ) > Imax Mar v 1. The power consumption when the device is waiting for
Pd = (31)
0 otherwise the first RA slot; (TR A_ R E P /2)P1 .
2. The power consumption when the device is transmitting
Regarding the average access delay, it represents the total the preamble for the first (n – 1) times, and collision
access delay for all the MTC devices, which successfully occurs. This power is equal to the one consumed in
finished the RACH procedure, between the first preamble the following steps; transmitting the preamble (P3 ),
transmission and the completion of the random access proce- waiting for the RAR window (TR A R P1 ), during the
dure (within the maximum number of preamble transmissions) RAR window (W R A R P2 ), and during the backoff
divided by the total number of successful MTC devices [6], and waiting for the next RA slot (( (1 + TR A R +
[15]. The average number of preamble transmissions is the total W R A R + W B O /2)/TR A_R E P
TR A_R E P − 1 − TR A R −
number of preamble transmissions of all the MTC devices suc- W R A R )P1 ). Note that W B O /2 is the average time of the
cessfully finished the RACH procedure, divided by the number backoff as the backoff timer can expire at any time during
of successful MTC devices. For CGP scheme, this time will the backoff window.
Authorized licensed use limited to: Indian Institute of TechnologyDharwad. Downloaded on June 21,2022 at 11:55:21 UTC from IEEE Xplore. Restrictions apply.
AROUK et al.: GROUP PAGING-BASED ENERGY SAVING FOR MASSIVE MTC ACCESSES IN LTE AND BEYOND NETWORKS 1097
Authorized licensed use limited to: Indian Institute of TechnologyDharwad. Downloaded on June 21,2022 at 11:55:21 UTC from IEEE Xplore. Restrictions apply.
1098 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 34, NO. 5, MAY 2016
Fig. 13. The average access delay for the considered methods Fig. 17. The resource utilization for the considered methods
Fig. 14. The average preamble transmission for the considered methods Fig. 18. The minimum resources required in order to achieve 90% of success
probability
Authorized licensed use limited to: Indian Institute of TechnologyDharwad. Downloaded on June 21,2022 at 11:55:21 UTC from IEEE Xplore. Restrictions apply.
AROUK et al.: GROUP PAGING-BASED ENERGY SAVING FOR MASSIVE MTC ACCESSES IN LTE AND BEYOND NETWORKS 1099
A PPENDIX A
T HE P ROOF OF THE E QUATION 24
In this section, we try to rewrite the equation (23). First of
all, we have
N P Tmax N P Tmax !n−1 "
Mi M
− Ri
Wi = = Wi [n] = (1 − e pk )
M1
n=1 n=1 k=1
When varying n frome 1 to N P Tmax , we have
Wi [1] = 1
Fig. 22. CDF of power consumption for the total number of MTC devices Mi
Wi [2] = 1 − e− R p1
0.3 mWatt for FI-TSFGP method, while they consume more M
− Ri
Mi
than 0.7 mWatt for the GP method, more than 1 mWatt for the Wi [3] = (1 − e p1 )(1 − e− R p2 )
M 2Mi
− Ri
CGP method, and more than 0.4 mWatt for PBO method. = 1 − ( p1 + p2 )e + p1 p2 e − R
Besides the superiority of FI-TSFGP, shown by Fig. 22 for Mi Mi Mi
the CDF of power consumption of the total number of MTC Wi [4] = (1 − e− R p1 )(1 − e− R p2 )(1 − e− R p3 )
devices (compared to GP and CGP and for a large number M
− Ri
of MTC devices by report to PBO), we also see a behavior = 1 − ( p1 + p2 + p3 )e + ( p1 p2 + p1 p3
2M 3Mi
− Ri
specific to the FI-TSFGP method. This behavior is that the per- + p2 p3 )e − p1 p2 p3 e − R
power level augments as the number of MTC devices increases. Wi [5] = (1 − e− R p1 )(1 − e− R p2 )(1 − e− R p3 )
M
We justify this benefit of FI-TSFGP by the fact that the net- − Ri
(1 − e p4 )
work activates certain number of MTC devices, while the others Mi
return back to the inactive state in which the MTC devices con- = 1 − ( p1 + p2 + p3 + p4 )e− R + ( p1 p2 + p1 p3 +
2Mi
sume the minimum power level. Therefore, the higher number p1 p4 + p2 p3 + p2 p4 + p3 p4 )e− R − ( p1 p2 p3 +
of MTC devices is, the higher percentage of MTC devices con- 3Mi
− R
p1 p2 p4 + p1 p3 p4 + p2 p3 p4 )e +
suming a certain power level is. Taking into account the fact that 4Mi
−
the number of MTC devices is naturally large, we conclude that p1 p2 p3 p4 e R
Authorized licensed use limited to: Indian Institute of TechnologyDharwad. Downloaded on June 21,2022 at 11:55:21 UTC from IEEE Xplore. Restrictions apply.
AROUK et al.: GROUP PAGING-BASED ENERGY SAVING FOR MASSIVE MTC ACCESSES IN LTE AND BEYOND NETWORKS 1101
From the equation (39), we can conclude that: 2. /TR A_R E P is integer whereas /TR A_R E P is not: in this
case, the value αd (equation 11) is equal to zero and thus:
max −1 N P T
N P T max −m
Wi = (−1)m ×
m=0 t=1 NR A = − + 1 = K max + 1
t
t+1
t+m−1 TR A_R E P TR A_R E P
m Mi (40)
... pk1 ... pkm e− R
where the value 1 represents the RA slot xa (i). Note that
k1 =1 k2 =k1 +1 km =km−1 +1
when x/y is an integer value, we have x/y = x/y
=
m times x/y.
Let αm be equal to: 3. /TR A_R E P is not integer whereas /TR A_R E P is: in this
case, the value αa (equation 7) is equal to zero and thus:
max −m
N P T
t
t+m−1
αm = (−1)m ... pk1 ... pkm
(41) NR A = +1− = K max + 1
t=1 k1 =1 km =km−1 +1 TR A_R E P TR A_R E P
m times where the value 1 represents the RA slot xd (i).
Therefore, we have: 4. Both /TR A_R E P and /TR A_R E P are integer values: in
this case, the values αa and αd are equal to zero and thus:
max −1
N P T m Mi
Wi = Mi
= αm e− R (42)
M1
m=0 NR A = − = K max
TR A_R E P TR A_R E P
which is equal to the equation (24).
Therefore, the equation giving K max is true.
A PPENDIX B
R EFERENCES
T HE P ROOF OF K max [1] R. Ratasuk, A. Prasad, Z. Li, A. Ghosh, and M. A. Uusitalo, “Recent
advancements in M2M communications in 4G networks and evolution
In this appendix, we will try to prove whether the value K max towards 5G,” in Proc. 18th Int. Conf. Intell. Next Gener. Netw. (ICIN),
is true. It is given in the text by the following equation Feb. 2015, pp. 52–57.
[2] L. Changwei, “Telco development trends and operator strategies,”
W B O − αa W B O WinWin Mag., vol. 13, pp. 19–22, Jul. 2012.
K max = [3] A. Zakrzewska, S. Ruepp, and M. Berger, “Towards converged 5G mobile
TR A_R E P networks-challenges and current trends,” in Proc. ITU Kaleidoscope
Acad. Conf.: Living Converged World–Impossible Without Stand.?, Jun.
2014, pp. 39–45.
TR A R +W R A R +W B O TR A R +W R A R
= TR A_R E P − TR A_R E P [4] E. Dahlman, G. Mildh, S. Parkvall, J. Peisa, J. Sachs, and Y. Selén, “5G
radio access,” Ericsson Rev., Jun. 2014.
Let TR A R + W R A R + W B O = and TR A R + W R A R = , and [5] 5GPPP. The 5G Infrastructure Public-Private Partnership (5GPPP).
2013, [Online]. Available: http://5g-ppp.eu/
thus; [6] 3GPP R2-113198, “Further analysis of group paging for MTC,” ITRI,
May 2011.
K max = − (43) [7] C.-H. Wei, R.-G. Cheng, and S.-L. Tsao, “Performance analysis of group
TR A_R E P TR A_R E P paging for machine-type-communications in LTE networks,” IEEE Trans.
Veh. Technol., vol. 62, no. 7, pp. 3371–3382, Sep. 2013.
Generally, the number of RA slots falling within the backoff [8] C.-H. Wei, G. Bianchi, and R.-G. Cheng, “Modeling and analysis of ran-
(BO) window is equal to the time of last sub-frame in the BO dom access channels with bursty arrivals in OFDMA wireless networks,”
IEEE Trans. Wireless Commun., vol. 14, no. 4, pp. 1940–1953, Apr. 2015.
window minus the time before starting the BO window (divided [9] O. Arouk, A. Ksentini, Y. Hadjadj-Aoul, and T. Taleb, “On improving the
by the interval between two consecutive RA slots), and it is group paging method for machine-type-communications,” in Proc. IEEE
given by: Int. Conf. Commun. (ICC), Jun. 2014, pp. 484–489.
[10] R. Harwahyu, R.-G. Cheng, and R. F. Sari, “Consecutive group paging
TR A R + W R A R + W B O TR A R + W R A R for LTE networks supporting machine-type communications services,”
NR A = i + −i − in Proc. IEEE 24th Int. Symp. Pers. Indoor Mobile Radio Commun.
TR A_R E P TR A_R E P (PIMRC), Sep. 2013, pp. 1619–1623.
[11] R. Harwahyu, X. Wang, R. Sari, and R.-G. Cheng, “Analysis of group
paging with pre-backoff,” EURASIP J. Wireless Commun. Net., vol. 2015,
= − (44) no. 1, pp. 1–9, 2015.
TR A_R E P TR A_R E P [12] 3GPP R2-111916, “Backoff enhancements for RAN overload control,”
ZTE, Apr. 2011.
Depending on the values of and , we have four cases: [13] O. Arouk, A. Ksentini, and T. Taleb, “Group paging optimization for
1. Both /TR A_R E P and /TR A_R E P are not integer
machine-type-communications,” in Proc. IEEE Ad-Hoc Sensor Netw.
Symp. (ICC’15 (09) AHSN), London, U.K., Jun. 2015, pp. 6519–6524.
values: in this case, we can write
/TR A_R EP [14] H. Thomsen, N. K. Pratas, E. Stefanovi, and P. Popovski,
as ( /TR A_R E P + 1) and /TR A_R E P as “Code-expanded radio access protocol for machine-to-machine com-
( /TR A_R E P − 1). Thus N R A becomes: munications,” Trans. Emerg. Telecommun. Technol., vol. 24, no. 4, pp.
355–365, 2013.
[15] 3GPP TR 37.868 V11.0.0, “Study on RAN improvement for machine-
NR A = +1 − +1 = K max + 2 type-communications,” Sep. 2012.
TR A_R E P TR A_R E P [16] K.-D. Lee, S. Kim, and B. Yi, “Throughput comparison of random
access methods for M2M service over LTE networks,” in Proc. IEEE
where the value 2 represents the RA slots xa (i) and xd (i). GLOBECOM Workshops (GC Wkshps), Dec. 2011, pp. 373–377.
Authorized licensed use limited to: Indian Institute of TechnologyDharwad. Downloaded on June 21,2022 at 11:55:21 UTC from IEEE Xplore. Restrictions apply.
1102 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 34, NO. 5, MAY 2016
[17] A. Ksentini, Y. Hadjadj-Aoul, and T. Taleb, “Cellular-based machine-to- Adlen Ksentini (SM’14) received the M.Sc. degree
machine: Overload control,” IEEE Netw., vol. 26, no. 6, pp. 54–60, Nov. in telecommunication and multimedia networking
2012. from the University of Versailles Saint-Quentin-en-
[18] O. Arouk and A. Ksentini, “Multi-channel slotted aloha optimization Yvelines, Versailles, France, and the Ph.D. degree
for machine-type-communication,” in Proc. 17th ACM Int. Conf. Model. in computer science from the University of Cergy-
Anal. Simul. Wireless Mobile Syst., 2014, pp. 119–125. Pontoise, Cergy-Pontoise, France (with a disserta-
[19] D. Wiriaatmadja and K. W. Choi, “Hybrid random access and data trans- tion on QoS provisioning in the IEEE 802.11-based
mission protocol for machine-to-machine communications in cellular networks), in 2005. He is currently an Associate
networks,” IEEE Trans. Wireless Commun., vol. 14, no. 1, pp. 33–46, Jan. Professor with the University of Rennes 1, Rennes,
2015. France. He is a member of the Dionysos Team with
[20] 3GPP TS 23.682 V11.4.0, “Architecture enhancements to facilitate com- INRIA, Rennes, France. He is involved in several
munications with packet data networks and applications,” Jun. 2013. national and European projects on QoS and QoE support in future wire-
[21] 3GPP TS 29.368 V12.2.0, “TSP interface protocol between the MTC less and mobile networks. He has coauthored over 80 technical journal and
inter working function (MTC-IWF) and service capability server (SCS),” international conference papers. His research interests include future Internet
2014. networks, mobile networks, QoS, QoE, performance evaluation, and multime-
[22] 3GPP TR 36.912 V11.0.0, “Feasibility study for further advancements dia transmission. He is the TPC Chair of the Wireless and Mobile (WMN)
for E-UTRA (LTE-Advanced),” Sep. 2012. Symposium of the IEEE ICC 2016. He was a Guest Editor of the IEEE Wireless
[23] 3GPP TR 36.300 V12.3.0, “Evolved universal terrestrial radio access Communication Magazine, IEEE Communication Magazine, and two ComSoc
(E-UTRA) and evolved universal terrestrial radio access network (E- MMTC Letters. He has been on the technical program committee of major
UTRAN); Overall description,” Sep. 2014. IEEE ComSoc, ICC/Globecom, ICME, WCNC, and PIMRC conferences. He
[24] L. Sanguinetti and M. Morelli, “An initial ranging scheme for the IEEE was the recipient of the Best Paper Award from the IEEE ICC 2012 and ACM
802.16 OFDMA uplink,” IEEE Trans. Wireless Commun., vol. 11, no. 9, MSWiM 2005.
pp. 3204–3215, Sep. 2012.
[25] C.-L. Lin and S.-L. Su, “A robust ranging detection with MAI cancel-
lation for OFDMA systems,” in Proc. 13th Int. Conf. Adv. Commun.
Tarik Taleb (S’05–M’05–SM’10) received the B.E.
Technol. (ICACT), Feb. 2011, pp. 937–941.
degree (with distinction) in information engineer-
[26] H. Minn and X. Fu, “A new ranging method for OFDMA systems,” in
ing, and the M.Sc. and Ph.D. degrees in information
Proc. IEEE Global Telecommun. Conf. (GLOBECOM’05), Nov 2005,
sciences from the Graduate School of Information
vol. 3, p. 6.
Sciences (GSIS), Tohoku University, Sendai, Japan,
[27] L. Sanguinetti, M. Morelli, and L. Marchetti, “A random access algorithm
in 2001, 2003, and 2005, respectively. He is currently
for lTE systems,” Trans. Emerg. Telecommun. Technol., vol. 24, no. 1,
a Professor with the School of Electrical Engineering,
pp. 49–58, 2013.
Aalto University, Espoo, Finland. Before that, he was
[28] C. Jeong, J. Park, and H. Yu, “Random access in millimeter-wave beam-
a Senior Researcher and 3GPP Standards Expert with
forming cellular networks: Issues and approaches,” IEEE Commun. Mag.,
NEC Europe Ltd, Heidelberg, Germany. He was then
vol. 53, no. 1, pp. 180–185, Jan. 2015.
leading the NEC Europe Labs Team working on RD
[29] V. Desai, L. Krzymien, P. Sartori, W. Xiao, A. Soong, and A. Alkhateeb,
projects on carrier cloud platforms, an important vision of 5G systems. Before
“Initial beamforming for mmwave communications,” in Proc. 48th
joining NEC and until March 2009, he was an Assistant Professor with the
Asilomar Conf. Signals Syst. Comput., Nov. 2014, pp. 1926–1930.
GSIS, Tohoku University, in a laboratory fully funded by KDDI, the sec-
[30] 3GPP TS 36.213 V12.4.0, “Physical layer procedures,” Dec. 2014.
ond largest network operator in Japan. From October 2005 to March 2006,
[31] 3GPP TS 36.101 V12.6.0, “User equipment (UE) radio transmission and
he was a Research Fellow with the Intelligent Cosmos Research Institute,
reception,” Dec. 2014.
Sendai, Japan. His research interests include architectural enhancements to
[32] 3GPP TS 36.321 V12.4.0, “Medium access control (MAC) protocol
mobile core networks (particularly 3GPPs), mobile cloud networking, net-
specification,” Dec. 2014.
work function virtualization, software defined networking, mobile multimedia
[33] 3GPP TS 36.331 V12.4.1, “Radio resource control (RRC); Protocol
streaming, inter-vehicular communications, and social media networking. He
specification,” Dec. 2014.
has been also directly engaged in the development and standardization of
[34] H. L. Bertoni, Radio Propagation for Modern Wireless Systems.
the Evolved Packet System as a member of 3GPPs System Architecture
Englewood Cliffs, NJ, USA: Prentice Hall, 1999.
working group. As an attempt to bridge the gap between academia and
[35] J. G. Andrews, A. Ghosh, and R. Muhamed, Fundamentals of WiMAX:
industry, he founded the IEEE Workshop on Telecommunications Standards:
Understanding Broadband Wireless Networking. Pearson Education,
From Research to Standards, a successful event that was recognized with
2007.
the Best Workshop Award by the IEEE Communication Society (ComSoC).
[36] Wikipedia. Exponential Function [Online]. Available: http:
Based on the success of this workshop, he has also founded and has been
//en.wikipedia.org/wiki/Exponential_function
the Steering Committee Chair of the IEEE Conference on Standards for
[37] M.-Y. Cheng, G.-Y. Lin, H.-Y. Wei, and A.-C. Hsu, “Overload con-
Communications and Networking. He is the General Chair of the 2019
trol for machine-type-communications in LTE-advanced system,” IEEE
edition of the IEEE Wireless Communications and Networking Conference
Commun. Mag., vol. 50, no. 6, pp. 38–45, Jun. 2012.
(WCNC19) to be held in Marrakech, Morocco. He is/was on the Editorial
Board of the IEEE T RANSACTIONS ON W IRELESS C OMMUNICATIONS,
the IEEE Wireless Communications Magazine, the IEEE T RANSACTIONS
ON V EHICULAR T ECHNOLOGY , the IEEE C OMMUNICATIONS S URVEYS
AND T UTORIALS , and a number of Wiley journals. He is serving as the
Chair of the Wireless Communications Technical Committee, the largest in
the IEEE ComSoC. He also served as the Vice Chair of the Satellite and
Space Communications Technical Committee of the IEEE ComSoc (2006–
2010). He has been on the technical program committee of different IEEE
Osama Arouk (S’14) received the B.S. degree conferences, including Globecom, ICC and WCNC, and chaired some of
in telecommunications engineering from Aleppo their symposia. He was the recipient of the 2009 IEEE ComSoc Asia-Pacific
University, Aleppo, Syria, in 2009, and the M.S. Best Young Researcher Award (June 2009), the 2008 TELECOM System
degree in signal processing from the University of Technology Award from the Telecommunications Advancement Foundation
Rennes 1, Rennes, France, in 2012. He is currently (March 2008), the 2007 Funai Foundation Science Promotion Award (April
pursuing the Ph.D. degree at INRIA/IRISA, Rennes, 2007), the 2006 IEEE Computer Society Japan Chapter Young Author Award
France. His research interest includes machine-type- (December 2006), the Niwa Yasujirou Memorial Award (February 2005),
communication (MTC), Internet-of-Things (IoT), and the Young Researcher’s Encouragement Award from the Japan chapter
performance evaluation, multichannel slotted aloha of the IEEE Vehicular Technology Society (VTS) (October 2003). Some of
systems, performance analysis of LTE, and beyond his research work have been also awarded best paper awards at prestigious
networks. conferences.
Authorized licensed use limited to: Indian Institute of TechnologyDharwad. Downloaded on June 21,2022 at 11:55:21 UTC from IEEE Xplore. Restrictions apply.