Conference PaperPDF Available

Analyzing impacts of coexistence between M2M and H2H communication on 3GPP LTE system

Authors:
  • Peoples' Friendship University of Russia (RUDN University)

Abstract and Figures

In this paper, we consider 3GPP LTE cellular system where machine-to-machine (M2M) devices and human-to-human (H2H) users transmit their data into the network. By contrast to previous studies which primarily focused on M2M overload protection and respective control mechanisms, this work concentrates on system operation when M2M and H2H data flows coexist in the network. In particular, we propose an integrated simulation-analytical framework to evaluate relevant performance characteristics (data transmission delays, blocking probabilities, etc.) with both Markov process based analysis and system-level simulations. Our results indicate that the proposed methodology demonstrates acceptable levels of convergence between analytical and simulations components, as well as becomes useful to characterize impacts of M2M/H2H coexistence on radio resource allocation in 3GPP LTE across a number of important M2M-centric scenarios.
Content may be subject to copyright.
Analyzing Impacts of Coexistence between M2M
and H2H Communication on 3GPP LTE System
Irina Gudkova1, Konstantin Samouylov1, Ivan Buturlin1, Vladimir Borodakiy2,
Mikhail Gerasimenko3, Olga Galinina3, and Sergey Andreev3
1Peoples’ Friendship University of Russia (PFUR), Russia
{igudkova,ksam}@sci.pfu.edu.ru, ivan buturlin@mail.ru
2JSC “Concern Sistemprom”, Russia
bvu@systemprom.ru
3Tampere University of Technology (TUT), Finland
{mikhail.gerasimenko,olga.galinina,sergey.andreev}@tut.fi
Abstract. In this paper, we consider 3GPP LTE cellular system where
machine-to-machine (M2M) devices and human-to-human (H2H) users
transmit their data into the network. By contrast to previous studies
which primarily focused on M2M overload protection and respective con-
trol mechanisms, this work concentrates on system operation when M2M
and H2H data flows coexist in the network. In particular, we propose an
integrated simulation-analytical framework to evaluate relevant perfor-
mance characteristics (data transmission delays, blocking probabilities,
etc.) with both Markov process based analysis and system-level simula-
tions. Our results indicate that the proposed methodology demonstrates
acceptable levels of convergence between analytical and simulations com-
ponents, as well as becomes useful to characterize impacts of M2M/H2H
coexistence on radio resource allocation in 3GPP LTE across a number
of important M2M-centric scenarios.
1 Introduction and Background
Machine-to-machine (M2M) communication is believed to reshape the Internet
as we know it today, as billions of unattended devices (sensors, actuators, smart
meters, etc.) become connected and send their data into the network [1]. Such
massive connectivity offers novel attractive services, but also raises significant
challenges to manage large number of devices, typically transmitting only small
data fragments, across a wide range of emerging applications [2]. This is espe-
cially true for current cellular technology (e.g., 3GPP LTE [3]), which has been
historically optimized for human-to-human (H2H) traffic and therefore creates
inefficiency at every step of M2M communication, from initial network entry to
actual data transmission [4].
Cellular industry, and in particular 3GPP standards community, has recently
been very active with several study and work items identified on M2M communi-
cation [5]. These primarily focused on overload protection, when a large number
of M2M devices attempt to connect to the network in a correlated manner [6].
A. Mellouk et al. (Eds.): WWIC 2014, LNCS 8458, pp. 162–174, 2014.
c
Springer International Publishing Switzerland 2014
Analyzing Impacts of Coexistence between M2M and H2H Communication 163
Such scenarios may be characteristic for modern smart grid deployments, where
a high density of metering devices transmit their ”last gasp” signaling in case
of a massive power outage event. In some situations, this excessive messaging
quickly deteriorates available capacity of LTE signaling channels (i.e., PRACH:
physical random access channel and PDCCH: physical downlink control channel)
and results in significant outage when meters cannot access the network with
their data [7], [8]. Furthermore, at these periods, conventional H2H users suffer
from denial of service by the network as well, as they share the same signaling
channels with M2M devices.
The above overload protection research resulted in respective control mech-
anisms (e.g., EAB: extended access barring) standardized for LTE Release-11
and designed to mitigate initial network entry peaks by barring some of the
(delay-tolerant) M2M devices from accessing the network for predefined periods
of time [9]. These simple mechanisms, whereas offer an immediate solution to the
problem, do not help control regular system operation when both M2M devices
and H2H users already coexist in the network. Little is known about such co-
existence with only a few research works mainly addressing improved scheduler
design by taking into account the typical properties of M2M traffic [10]. These
single-issues papers are primarily build on computer simulations and do not offer
comprehensive understanding of M2M/H2H coexistence.
In this work, we bridge the indicated gap by proposing an adequate simulation-
analytical framework to capture the main impacts of M2M communication on
the conventional H2H traffic. In particular, we mathematically characterize the
key performance characteristics of M2M and H2H communications, such as data
transmission times and blocking probabilities [11], and confirm our results by
extensive system-level evaluations across a number of important M2M-centric
scenarios. Our framework allows to optimize radio resource allocation proce-
dures in a cellular network and achieve understanding of resulting system per-
formance to reach good balance between M2M and H2H communication. The
rest of the text is organized as follows. Section 2 details our mathematical model
and introduces its core assumptions. Further, in Section 3, we conduct numerical
analysis of representative M2M-centric scenarios and derive the key performance
characteristics. Section 4 introduces our M2M-aware system-level simulator and
offers some initial performance evaluation results, primarily, for the purposes of
verification of the analytical framework.
2 System Model of LTE Cell with H2H and M2M Traffic
Consider a single cell of LTE network (see Figure 1) with the peak capacity of
Cunits of channel resource (UCR), measured in bps. All users employ identical
H2H-service, such as voice telephony or video streaming. Additionally, the cell
supports transmission of M2M data fragments of a particular type from many
M2M devices. The system reserves ChUCR to offer H2H-services to users. Here-
inafter, the indexes ”m” and ”h” in mathematical expressions differentiate if a
specific parameter applies to M2M or to H2H traffic, respectively. Consequently,
164 I. Gudkova et al.
not more than Cm=CChUCR are available for M2M devices, while not less
than ChUCR are available for H2H devices.
A minimum of bmUCR is required to transmit M2M data fragments. Cor-
respondingly, in order to transmit the current number of the data fragments,
UCR are grouped into fixed transmission zones comprising cUCR. Then M=
c/bm=max{yN: yc/bm}is the maximum number of data fragments
which may be transmitted in one such fixed zone. Further, we assume that the
cell might allocate S=Cm/ctransmission zones to serve M2M user traffic.
The arrival flow of requests from M2M devices to transmit their data is as-
sumed to be Poisson with the rate of λm[1/time-unit = 1/s], whereas the length
of each data fragment is exponentially distributed with the mean θ[UCR×time-
unit = bit]. Denote a=λmθ[UCR] as the corresponding offered load rate.
These simplifying assumptions are made for the sake of analytical tractability
and provide a first-order insight into the performance of the considered system.
Further, H2H-services require bhUCR. We consider the arrival flow of requests
from the users demanding H2H-service to be Poisson with the rate of λh[1/time-
unit], while the duration of H2H-service is exponential with the mean of 1
[time-unit]. Denote as ρ=λh/μ[Erlang] the respective offered load rate by H2H
users.
The considered model is a combination of First Come – First Served streaming
model and Egalitarian Processor Sharing (EPS) elastic traffic model.
Fig. 1. Proposed model of resource distribution in LTE cell
Analyzing Impacts of Coexistence between M2M and H2H Communication 165
In our model, three different scenarios are possible when a new data fragment
transmission request is generated by an M2M device:
1. The request is accepted for service and additional resources are not allo-
cated. This scenario corresponds to the situation when at the moment of the
request generation the number of data fragments is such that the decrease
in their transmission rate (but not less than bm)al lows to serve this new
data fragment.
2. The request is accepted for service and a new fixed transmission zone is
allocated for its service. This scenario corresponds to the situation when at
the moment of the request generation the number of data fragments is such
that the decrease in their transmission rate (but not less than bm)does not
allow to serve this new data fragment. At the same time, there are at least
cUCR of free (unallocated) resources available for M2M service out of the
maximum Cmto allocate a new transmission zone.
3. The request is blocked without any impact on the rate of the spawning
Poisson process.
Similarly, two different scenarios are possible when a new service request is
generated by an H2H device:
1. The request is accepted for service when at the moment of its generation
there are at least bhof ChUCR of free resource.
2. The request is blocked without any impact on the rate of the spawning
Poisson process.
Let Nm(t) be the number of M2M data fragments transmitted at the moment
t0, and Nh(t) be the number of users which at the moment t0 are receiving
H2H-service. Then the operation of the considered LTE cell model featuring
both H2H and M2M traffic can be described by the compound random process
{(Nm(t),N
h(t)) ,t>0}, over the state space
X={(nm,n
h): nhbhCc(nm),n
mbmCm,n
m0,n
h0},
|X | =(S·c)/bm
nm=0 Cc(nm)
bh+1
,(1)
where c(nm)=c·nm/M=c·min {yN,ynm/M}is the number of UCR
allocated for the transmission of nmM2M data fragments.
For the considered model, we may derive a system of balance equations. The
equation corresponding to the state (nm,n
h)∈X is given as follows:
p(nm,n
h)×[λm·1{(nm,n
h)/∈B
m}+(c(nm)/θ)·1{nm>0}+
+λh·1{(nm,n
h)/∈B
h}+nhμh]=p(nm1,n
h)·λm·1{nm>0}+
+p(nm+1,n
h)·(c(nm+1)/θ)·1{(nm,n
h)/∈B
m}+
+p(nm,n
h1) ·λh·1{nh>0}+p(nm,n
h+1)·(nh+1)μh·1{(nm,n
h)/∈Bh},
where the boundaries of the state space may be defined by means of the sets:
Bm={(nm,n
h)∈X :nhbh>Cc(nm+1)(nm+1)bm>C
m},(2)
166 I. Gudkova et al.
Bh={(nm,n
h)∈X :(nh+1)bh>Cc(nm)}.(3)
The random process {(Nm(t),N
h(t)) ,t>0}constitutes a reversible Markov
process with the stationary probability distribution:
p(nm,n
h)=G1(X)a
M·bmnmnm
i=1 i
M1
×ρnh
nh!,(nm,n
h)∈X ,(4)
where G(X) is the constant obtained from the normalizing condition.
Further, we consider the primary time-probability characteristics of the pro-
posed LTE cell model and introduce analytical expressions to derive these. To
this end, we write the state space Xas follows:
X=
S
s=0
Xs,Xs={(nm,n
h)∈X :c(nm)=s·c}.(5)
Knowing the distribution (4) and using the state space partitioning in (5), we
arrive at the expression for the M2M request blocking probabilities Bmas well
as those for H2H devices Bh, respectively:
Bm=
(nm,nh)∈Bm
p(nm,n
h)=
S1
s=0
(Cs·c)/bh
nh=(C(s+1)·c)/bh+1
p(s·M, nh)+
Ch/bh
nh=0
p(S·M, nh),(6)
Bh=
(nm,nh)∈Bh
p(nm,n
h)=p0,C
bh+
S
s=1
s·M
nm=(s1)·M+1
pnm,Cs·c
bh.(7)
The resulting formula for the mean M2M data fragment transmission time
may be given as:
Tm=Cm/bm
nm=0 (Cc(nm))/bh
nh=0 nm·p(nm,n
h)
λm(1 Bm),(8)
where the upper part determines the mean number of the transmitted M2M data
fragments Nm.
Further, we continue by numerically analyzing the operational characteristics
of the considered resource distribution model with the fixed transmission zone
for M2M traffic in LTE cell with H2H users.
3 Numerical Analysis of the Proposed Model
As an example, we consider a single cell of LTE with the peak capacity of
C=52.8 Mbps, which is distributed between H2H users and M2M devices. For
the H2H user service, the system reserves Ch=10.56 Mbps of its capacity. Let
every M2M data fragment of θ=0.88 Mbit require a minimum of bm=0.88
Mbps. As a numerical illustration of an H2H-service, we consider streaming
Analyzing Impacts of Coexistence between M2M and H2H Communication 167
video, which has a requirement of bh=2.64 Mbps on the minimum throughput.
Assume the H2H offered load rate to be ρ= 5 Erlang. Let up to S=2fixed
transmission zones can be allocated for M2M data fragments transmission, each
of which comprising c= 20 Mbps.
Figure 2 introduces plots illustrating H2H request blocking probabilities Bh
calculated as given by formula (7), M2M data fragment blocking probabilities
Bm(6), and mean fragment transmission time Tm(8) on increasing M2M offered
load. The figure indicates that the mean fragment transmission time varies sig-
nificantly with the changing offered load. In order to explain the main reasons
behind the observed effects let us consider the plots of other probability-time
characteristics in our model.
Fig. 2. Blocking probabilities and mean data fragment transmission time
Together with the mean number of transmitted M2M data fragments Nm,we
also consider the following characteristics:
1. Mean number of the allocated fixed transmission zones for M2M devices:
¯s=
(nm,nh)X
nm
M·p(nm,n
h)=
S·c/bm
nm=0
(Cc(nm))/bh
nh=0 nm
M·p(nm,n
h).(9)
2. Mean number of UCR allocated for the transmission of a single data frag-
ment:
b1=(nm,nh)X,nm=0 c(nm)
nm×p(nm,n
h)=
=S·c/bm
nm=1 (Cc(nm))/bh
nh=0 c(nm)
nm×p(nm,n
h).(10)
168 I. Gudkova et al.
3. Probability that at least one data fragment is being transmitted:
P1=P{nm=1}=
(nm,nh)X,nm=0
p(nm,n
h)=
S·c/bm
nm=1
(Cc(nm))/bh
nh=0
p(nm,n
h).(11)
4. Probability that two fixed transmission zones have been allocated for serving
M2M devices:
P{s=2}=
(nm,nh)Xs=2
p(nm,n
h).(12)
The plots for the aforementioned characteristics of the LTE cell model are
shown in Figures 3 and 4.
Fig. 3. Time-probability characteristics ¯sand Nm
Let us now consider again the primary parameter for the performance eval-
uation of our model operation, which is the mean time Tmof the M2M data
fragment transmission (see Figure 5). We may further identify three intervals
of the M2M offered load, within which the mean number of fixed transmission
zones ¯sbelongs to the following ranges: 0 ¯s1, 1 ¯s2, and ¯s2.
Over the first interval of the offered load for serving M2M devices, one fixed
transmission range is allocated on average and, correspondingly, 0 ¯s1. It
is important to emphasize that with the growth of the offered load from a=16
UCR, the mean transmission time Tmis showing non-uniform behavior. Over
the second interval, all UCR of the first fixed transmission zone have been used
for the data fragments transmission 1 ¯s2, and the probability increases
that two fixed zones will be allocated P{s=2}→1. When the offered load
Analyzing Impacts of Coexistence between M2M and H2H Communication 169
Fig. 4. Time-probability characteristics ¯
b1,P{nm=1},andP{s=2}
Fig. 5. Mean data fragment transmission time
reaches the value of a= 55 UCR, all available UCR are used to transmit M2M
data fragments and ¯s2.
In what follows, we consider variation in the mean data fragment transmission
time over each of the indicated M2M offered load intervals:
1. Over the interval a=[2,16] UCR, the value of Tmgrows insignificantly
as the number of data fragments in the system is small, P1<1, and they
arrive at the low rate of Nm<1. Accounting for the fact that M2M service
follows the EPS discipline, the amount of resources taken by one M2M device
170 I. Gudkova et al.
increases up to ¯
b19 UCR. Therefore, we observe minimal values of Tmin
this interval.
2. Over the interval a=[16,30] UCR, the value of Tmgrows faster and reaches
the value of Tm0,8 seconds. Data fragments begin to arrive with higher
rate and their mean number exceeds one, Nm1. Therefore, the amount of
resources allocated for the transmission of one fragment decreases down to
¯
b12. Accounting for such decrease together with increase in the offered
load, the value of Tmgrows significantly.
3. Over the interval a=[32,44] UCR, when one more fixed transmission zone
has been allocated to serve M2M traffic, the value of Tmdecreases slightly.
Probability that an additional fixed transmission zone is available tends to
one P{s=2}→1, and the mean number of UCR allocated for the trans-
mission of one data fragment is ¯
b1.
4. Over the interval a=[44,55] UCR, almost all of the available UCR allocated
across two fixed transmission zones are used for data fragments transmission.
Therefore, the amount of UCR allocated for the transmission of one fragment
decreases further and the value of Tmgrows.
5. Over the interval a=[55,98] UCR, the allocated fixed transmission zones
are completely filled with M2M data fragments, and 40 Nm48. The
mean amount of resources allocated for the transmission of one data fragment
tends to the allowed minimum of ¯
b1bm. Within this interval of the offered
load, it is typical to observe the maximum data fragment transmit times Tm
and high loss probabilities Bm.
We proceed with detailing our simulation methodology to extend the above
mathematical analysis.
4 Simulation Methodology, Results, and Conclusions
In our past M2M work [12], [13], we were mostly concentrated on the partic-
ular features of IEEE 802.16 and 3GPP LTE technology related to signaling
channel simulations and analysis. For those purposes we employed a simplified
Protocol Level Simulator (PLS) to abstract away many realistic system features
for the sake of simulation speed. By contrast, in this paper we are considering a
more detailed simulation methodology incorporating most of the practical 3GPP
LTE features. Our approach is based on detailed System Level Simulator (SLS)
which has been developed and applied successfully in our recent publications on
next-generation wireless networks [14] focusing H2H traffic. However, this work
extends our SLS tool to enable characteristic M2M scenarios.
The core capabilities of the considered simulator are: detailed LTE MAC-layer
features (according to 3GPP LTE Release-10 specifications, fully calibrated),
dynamic channel modeling, different traffic types, user and eNodeB directivity
and location modeling, as well as many others (see Figure 6). In particular, the
basic features of the LTE implementation inside our SLS tool are: realistic 10
ms FDD frame structure, inter-cell interference, support for several scheduling
Analyzing Impacts of Coexistence between M2M and H2H Communication 171
schemes (round-robin, proportional-fair, etc.). Instead of modeling the control
channels explicitly, the respective control signaling overhead is taken into account
to speed-up the simulations. However, necessary channel procedures could be
easily integrated into the SLS, if required.
Fig. 6. High-level structure of our system-level simulator
Regarding channel models implementation, the most challenging aspects are
interference and pathloss characterization [15]. Basic ITU models (Urban Macro,
Urban Micro, ITU-R M.2135) have been realized and used in the SLS. Interfer-
ence calculation has been somewhat simplified to speed-up simulations further.
Instead of per-RB (resource block) calculations, only the percentage of intersec-
tions between the same time-frequency domain user requests (of different cell in
a sector) is accounted for. Large-scale and small-scale parameters are modeled
employing random variables with a certain deviation and mean; the numbers are
taken from ITU-R M.2135 document.
More advanced Spatial Channel Model (SCM, 3GPP TR25.996), which is
based on multiple ray clusters is currently under implementation. As a conclu-
sion, we emphasize that the methodology behind our SLS tool simplifies physical-
layer implementation to enable better support for MAC-layer features and pro-
cedures across a large-scale system deployment. Furthermore, our abstractions
result in a profound decrease in simulation complexity, which, in combination
with efficient code structures written in Python and C++, delivers attractively
short simulation times: one second of the real-time in a typical 19-cell (3 sector)
deployments with 30 users per cell could be simulated with only around 100
seconds of simulation time.
As a first step in this paper, we calibrate the simulation results with the
above analysis. Along these lines, we choose to disregard realistic interference,
172 I. Gudkova et al.
Fig. 7. Mean data fragment transmission time: analysis and simulation
pathloss, and other complex channel effects. However, we account for the actual
LTE frame structure to verify that simulation results fall well near our analytical
expectations. We further assume that the resource allocated to the H2H and
M2M devices is employing all available frequencies, so that the scheduler is
working in a time-division manner. Additionally, to account for some channel
degradation factors, we enable a simple physical-layer pathloss model described
in [14]. For the purposes of initial calibration and testing, we focus on a tagged
sector of our one-cell scenario. Users are deployed in a 288m-area around eNodeB
(typical for Urban macro model, ISD = 500).
User arrivals and departures are modeled according to the above analysis in
Section 3. At this stage, the interference between the users is considered insignif-
icant, due to the absence of other cells (which may be also the consequence of ap-
propriate network planning). More advanced interference and channel modeling
will be given in our future publications. In Figure 7, we overlay our simulation re-
sults on top of the previously obtained analysis (see Figure 2). Hence, we observe
that simulated mean data fragment transmission times are reasonably close to the
analytical prediction, but they also remain slightly higher due to the increasing in-
fluence of the realistic LTE performance factors not captured by the current anal-
ysis. Our ongoing work is to extend the reported analytical framework towards
the inclusion of practical performance degradation factors explicitly [16], as well
as to build a number of more insightful simulation scenarios mindful of upper-
layer protocols [17]. However, already now we can conclude that the constructed
simulation-analytical framework is a very useful tool to characterize M2M/H2H
coexistence and understand the resulting LTE system behavior.
Analyzing Impacts of Coexistence between M2M and H2H Communication 173
Acknowledgment. The reported study was partially supported by RFBR, re-
search projects No. 13-07-00953 a and No. 14-07-00090, GETA, and the Internet
of Things program of Digile, funded by Tekes.
References
1. David, K., Vinodrai, V., Yao, J.: WWRF Introduction and Vision (2010)
2. Wu, G., Talwar, S., Johnsson, K., Himayat, N., Johnson, K.: M2M: From mobile
to embedded Internet. IEEE Communications Magazine 49(4), 36–43 (2011)
3. 3GPP LTE Release 10 & beyond (LTE-Advanced)
4. Gotsis, A., Lioumpas, A., Alexiou, A.: M2M scheduling over LTE: Challenges and
new perspectives. IEEE Vehicular Technology Magazine 7(3), 34–39 (2012)
5. Study on RAN Improvements for Machine-Type Communications. 3GPP Technical
Report (TR) 37.868 (2011)
6. Cheng, M.-Y., Lin, G.-Y., Wei, H.-Y., Hsu, A.: Overload control for machine-type-
communications in LTE-Advanced system. IEEE Communications Magazine 50(6),
38–45 (2012)
7. Andreev, S., Larmo, A., Gerasimenko, M., Petrov, V., Galinina, O., Tirronen, T.,
Torsner, J., Koucheryavy, Y.: Efficient small data access for machine-type commu-
nications in LTE. In: Proc. of the IEEE International Conference on Communica-
tions, pp. 3569–3574 (2013)
8. Dementev, O., Galinina, O., Gerasimenko, M., Tirronen, T., Torsner, J., Andreev,
S., Koucheryavy, Y.: Analyzing the overload of 3GPP LTE system by diverse classes
of connected-mode MTC devices. In: Proc. of the IEEE World Forum on Internet
of Things (2014)
9. Hasan, M., Hossain, E., Niyato, D.: Random access for machine-to-machine com-
munication in LTE-Advanced networks: Issues and approaches. IEEE Communi-
cations Magazine 51(6), 86–93 (2013)
10. Zheng, K., Hu, F., Wang, W., Xiang, W., Dohler, M.: Radio resource allocation in
LTE-Advanced cellular networks with M2M communications. IEEE Communica-
tions Magazine 50(7), 184–192 (2012)
11. Borodakiy, V.Y., Buturlin, I.A., Gudkova, I.A., Samouylov, K.E.: Modelling and
analysing a dynamic resource allocation scheme for M2M traffic in LTE networks.
In: Balandin, S., Andreev, S., Koucheryavy, Y. (eds.) NEW2AN 2013 and ruS-
MART 2013. LNCS, vol. 8121, pp. 420–426. Springer, Heidelberg (2013)
12. Andreev, S., Galinina, O., Koucheryavy, Y.: Energy-efficient client relay scheme
for machine-to-machine communication. In: Proc. of the IEEE Global Telecommu-
nications Conference (2011)
13. Gerasimenko, M., Petrov, V., Galinina, O., Andreev, S., Koucheryavy, Y.: Im-
pact of MTC on energy and delay performance of random-access channel in LTE-
Advanced. Transactions on Emerging Telecommunications Technologies 24(4),
366–377 (2013)
14. Andreev, S., Pyattaev, A., Johnsson, K., Galinina, O., Koucheryavy, Y.: Cellular
traffic offloading onto network-assisted device-to-device connections. IEEE Com-
munications Magazine 52(4), 20–31 (2014)
15. Andreev, S., Koucheryavy, Y., Himayat, N., Gonchukov, P., Turlikov, A.: Active-
mode power optimization in OFDMA-based wireless networks. In: Proc. of the
IEEE Global Telecommunications Conference Workshops (2010)
174 I. Gudkova et al.
16. Moltchanov, D., Koucheryavy, Y., Harju, J.: Loss performance model for wireless
channels with autocorrelated arrivals and losses. Computer Communications 29,
2646–2660 (2006)
17. Dunaytsev, R., Koucheryavy, Y., Harju, J.: TCP NewReno throughput in the pres-
ence of correlated losses: The slow-but-steady variant. In: Proc. of the IEEE Inter-
national Conference on Computer Communications, INFOCOM (2006)
... In [22,23], the concept of the queuing model was used to model the resource allocation problem for the coexistence of different services with different QoS in 4G or 5G networks. In [22,23], the coexistence of machine-to-machine (M2M) and human-to-human (H2H) communications in 4G networks was studied. ...
... In [22,23], the concept of the queuing model was used to model the resource allocation problem for the coexistence of different services with different QoS in 4G or 5G networks. In [22,23], the coexistence of machine-to-machine (M2M) and human-to-human (H2H) communications in 4G networks was studied. In [22], a queuing model was used to analyze the impacts of coexistence between M2M and H2H communication on a 3GPP LTE system. ...
... In [22,23], the coexistence of machine-to-machine (M2M) and human-to-human (H2H) communications in 4G networks was studied. In [22], a queuing model was used to analyze the impacts of coexistence between M2M and H2H communication on a 3GPP LTE system. In [23], a resource sharing method was proposed for M2M and H2H traffic under a time-controlled scheduling scheme in LTE networks. ...
Article
Full-text available
The 5G network is designed to serve three main use cases: enhanced mobile broadband (eMBB), massive machine-type communications (mMTC), and ultra-reliable and low-latency communications (uRLLC). There are many new technological enablers, including the cloud radio access network (C-RAN) and network slicing, that can support 5G and meet its requirements. The C-RAN combines both network virtualization and based band unit (BBU) centralization. Using the network slicing concept, the C-RAN BBU pool can be virtually sliced into three different slices. 5G slices require a number of Quality of service (QoS) metrics, such as average response time and resource utilization. In order to enhance the C-RAN BBUs utilization while protecting the minimum QoS of the coexisting three slices, a priority-based resource allocation with queuing model is proposed. The uRLLC is given the highest priority, while eMBB has a higher priority than mMTC services. The proposed model allows the eMBB and mMTC to be queued and the interrupted mMTC to be restored in its queue to increase its chance to reattempt the service later. The proposed model’s performance measures are defined and derived using a continuous-time Markov chain (CTMC) model and evaluated and compared using different methodologies. Based on the results, the proposed scheme can increase C-RAN resource utilization without degrading the QoS of the highest-priority uRLLC slice. Additionally, it can reduce the forced termination priority of the interrupted mMTC slice by allowing it to re-join its queue. Therefore, the comparison of the results shows that the proposed scheme outperforms the other states of the art in terms of improving the C-RAN utilization and enhancing the QoS of eMBB and mMTC slices without degrading the QoS of the highest priority use case.
... The coexistence of H2H and M2M traffics involves many challenges that could arise in a common network that reduces its effectiveness as result of the incompatibility of H2H and M2M patterns. Contrary to H2H traffic, M2M traffic is highly homogeneous because it uses small chunks of data along with small transfer rates, usually with predictable times and durations of communication [2]. But with M2M synchronization behavior and a variety of applications with different payloads, times and data rates, accumulative traffic from different sources is expected to be received, which forms heterogeneous traffic that very rapidly saturates the network bandwidth. ...
... • First "Emergency" storm: when Group (1) submits its data as a result of a sudden event: ( 1) = (1) = 5 • Second "Emergency" storm: when Group (1) and Group (2) dispatch their payloads simultaneously: ...
... ( 2) = (1) + (2) = 15 • Third "Emergency" storm: when Group (1) , Group (2) and Group (3) send their data at the same time: ...
Conference Paper
Full-text available
Due to its unique pattern and different goals, Machine-to-Machine (M2M) traffic necessitates new traffic models. The real challenge is striking a balance between model accuracy and dealing with a massive number of M2M devices that must all work in unison. On the one hand, due to their reliability, "Source traffic models" have a competitive advantage over "Aggregated traffic models". But on the other hand, their complexity is expected to make managing the exponential growth of M2M devices difficult. In this paper, we propose a Markov Modulated Poisson Processes (MMPP) framework for studying M2M heterogeneous traffic effects as well as Human-to-Human (H2H) traffic using MMPP. To characterize the H2H/M2M coexistence, Markov chains were used as a stochastic process tool. Once using the traditional evolved Node B (eNodeB), our simulation results show that the network's service completion rate will suffer significantly. In the worst-case scenario, when an accumulative storm of M2M requests tries to access the network at the same time, the degradation reaches 8%. However, by leasing 72 resources reserved for M2M traffic and using our "Coexistence of Heterogeneous traffic Analyzer and Network Architecture for Long term evolution" (CHANAL) solution, we can achieve a completion rate of 96%. 1 Introduction Machine to Machine (M2M) communications and Human-to-Human (H2H) communications are expected to play a major role in any future wireless network. Although M2M communications and H2H communications have complementary goals in different fields (e.g., civil transportation, electrical power network, medical treatment, industrial automation, etc.), but M2M communications as a proxy for replacing/limiting numerous human interventions through the Long Term Evolution-Advanced (LTE-A) intelligent systems [1]. Taking into account the fact that M2M features should meet rejuvenating technology requirements, the differences in H2H and M2M traffic features can distract LTE-A unprecedented development. The coexistence of H2H and M2M traffics involves many challenges that could arise in a common network that reduces its effectiveness as result of the incompatibility of H2H and M2M patterns. Contrary to H2H traffic, M2M traffic is highly homogeneous because it uses small chunks of data along with small transfer rates, usually with predictable times and durations of communication [2]. But with M2M synchronization behavior and a variety of applications with different payloads, times and data rates, accumulative traffic from different sources is expected to be received, which forms heterogeneous traffic that very rapidly saturates the network bandwidth. The problem of saturation inevitably has a remarkable impact on traffic, services and applications in both M2M and H2H [3]. Cellular systems (smart sensors, mobile telephones, basic stations, satellite systems, etc.) have recently spread and pushing the existing technologies to their maximum [4] in terms of the complexity of their processing algorithms. Mobile operators spend $20 billion per year to overcome network failure and service degradations, according to Heavy Reading [5]. As a result, one of the most challenges for mobile operators, researchers and the 3rd Generation Partnership Project (3GPP) community is the efficient radio communication strategy [6]. In this context, the main performance of homogenic M2M traffic and H2H traffic is characterized mathematically in our previous work [7]. We used a mathematical model called "Coexistence Analyzer and Network Architecture for Long term evolution" (CANAL) to mathematically characterize the key performance of homogeneous M2M traffic as well as H2H traffic. 2 Traffic modelling Traffic modelling can be described by processes of stochastics that match the behavior of the measured data traffic for physical quantities [8]. The models of traffic are classified as the Source traffic models (e.g., voice, video and data) and Aggregated traffic models (e.g., high-speed links, backbone networks and internet). The source traffic simulation (e.g., SimuLTE simulator [9], OPtimized Network Engineering Tool (OPNET) [10], Objective Modular NeTwork (OMNeT) [11], etc.) generate packets that reflect real traffic behavior at sizes and intervals. In [12], the OPNET modeler is used to analyze a number of typical sources of traffic models, including two-state MMPP, ON/OFF and Interrupted Poisson Process (IPP) models. Our previous work in [13] focused on M2M traffic load in disastrous situations. The ability of an evolved Node B (eNodeB) to deal with a fixed number of H2H traffics with an increasing number of M2M requests attempting to access a LTE-A network simultaneously is examined in all scenarios using a source traffic simulator such as SimuLTE. When we consider that, according to [14], it is expected to have more than 52000 devices per cell trying to send their payloads at the same time during a disaster, we realize that source traffic models become extremely heavy to be executed in such cases, which necessitates the use of aggregated traffic modelling. The goal of aggregated traffic models (i.e., Simulink simulator [15]) is to find a good approximation of the arrival process of multiple devices while maintaining a good balance between accuracy and simulation efficiency [16]. For example, in [7], we studied the mutual impact of H2H and M2M traffic in dense areas and emergency situations. We also run several simulations based on the proposed architecture in [15], assuming a single LTE-A network with average arrival rates (λ1; λ2) and service rates (µ1; µ2) for H2H and M2M traffics. According to the simulation results, a prioritized LTE-A system could handle more requests in less time for both M2M and H2H traffics.
... In these networks, each active connection requires a certain amount of radio resources (call, message, video) provided to the request at the time of its receipt and should be released at the end of the connection. The amount of required resources is determined by a predefined probability distribution, which can take into account the features of various radio resource allocation schemes when analyzing the performance of wireless networks ; Gudkova et al. (2014). Such systems can be modeled using resource queueing systems ; Naumov et al. (2016); Sopin et al. (2017); Tikhonenko (2010), where each arrival, in addition to one server, takes a certain amount of resource (deterministic or random, discrete or continuous). ...
Article
Full-text available
New Radio Access Technology 3GPP New Radio has become the fundamental wireless technology in the fifth-generation networks, which allows us to achieve high data rates due to the ability to work in the millimeter-wave band. But the key feature and the main problem of 5G New Radio networks is that people themselves, cars, buildings, etc. are signal blockers, while the base stations of the fourth generation networks have widescreen broadcasting and such small obstacles do not cause loss of connection. Service providers and mobile operators are already testing the proposed technology. In this connection, the scientific community has the task of analyzing the performance of these systems and increasing it in the future. Currently, there are known studies of “basic” mathematical models of such networks. By this term, we mean models built in the simplest possible assumptions. However, due to the justified necessity of introducing new technology into the daily lives of subscribers, service providers pose the scientific community with the task of analyzing the effectiveness of the most appropriate mathematical models. For example, a technology of splitting transmitted data into two streams using as 5G and both 4G transmission technologies is considered now by 3GPP Project Coordination Group. The paper is devoted to such a problem. We consider a mathematical model of the message transmitting with the implementation of the splitting function in the communication networks of New Radio technology in the form of a resource queueing system with a renewal arrival process and non-exponential service. For this problem, an approximation of a stationary two-dimensional probability distribution of the number of occupied resources in parallel service units is obtained. It is shown that this approximation coincides with the Gaussian distribution, and its area of applicability is shown.
... The traffic profile (Table 3) complies with the global traffic forecast for 2025 [23], while service characteristics provided in [24]. We consider six types of services: streaming video [25], audio, file sharing, social networking, Web, and Machine-to-Machine [26] traffic. Data is transmitted by unicast sessions for all the services, but video can be also streamed via multicast sessions to reduce the amount of utilized resource. ...
Conference Paper
Full-text available
3GPP New Radio (NR) radio access technology operating in millimeter wave (mmWave) frequency band is considered as key enabler for Fifth-generation (5G) mobile system. Despite the enormous available bandwidth potential, mmWave signal transmissions suffer from fundamental technical challenges like severe path loss, sensitivity to blockage, directivity, and narrow beamwidth, due to its short wavelengths. To address the problem of quality degradation due to the line-of-sight (LoS) blockage by various objects in the channel, 3GPP is currently working on multi-connectivity (MC) mechanisms that allow a user to remain connected to several mmWave access points simultaneously as well as switch between them in case its active connection drops. In this paper, exploiting the methods of stochastic geometry and queuing theory we propose a model of 5G NR base station (BS) serving a mixture of unicast and multicast traffic. MC techniques is proposed to be used for cell-edge users. The proposed model is validated against computer simulations in terms of session drop probabilities and system resource utilization metrics. Our findings are illustrated with a numerical example.
Chapter
The main feature in the development of Internet of Things (IoT) applications is the necessity of conjoint servicing of heterogenous data streams over existent network infrastructure. This trend has been recognized and supported by 3GPP with introducing of NarrowBand IoT (NB-IoT) technology, which allows to use the same resource by 3GPP LTE high-end equipment and NB-IoT low-end devices. The need of sharing the limited amount of available resource efficiently emphasizes the importance of theoretical study of formulated problem. The model of resource allocation and sharing for conjoint servicing of real time video traffic of surveillance cameras and NB-IoT data traffic of smart meters and actuators over LTE cell facilities is constructed. In the model the access control is used to create the conditions for differentiated servicing of coming sessions. All random variables used in the model have exponential distribution with corresponding mean values but the obtained results are valid for models with arbitrary distribution of service times. Using the model the main performance measures of interest are given with help of values of probabilities of model’s stationary states. The recursive algorithm of performance measures estimation is suggested. The model and derived algorithms can be used for study the scenarios of resource sharing between heterogenous data streams over 3GPP LTE with NB-IoT functionality.
Chapter
In this paper, we consider the LoRa technology to expand sensor network coverage in smart sustainable cities. A model of a LoRa mesh network is proposed using the AODV protocol in packet routing. With a simulation model developed based on OMNET++, a series of computer experiments was carried out with changing various parameters. In the experiments results, the end-to-end delay and packet loss ratio were analyzed in the dependence on the number of nodes and packet size in the network. The simulation results show that the latency is relatively high in the LoRa mesh network, but it might be accepted for some applications.
Chapter
In this paper, we propose the modification of the dynamic screening method for the resource queueing systems with customers copying at the second phase. We obtain the characteristic function of the studied three-dimensional Markov chain and the main numerical characteristics. The obtained analytical results are compared with the simulation ones, the high accuracy of probability is demonstrated, the recommended limit value of the system and the loss probability are found.
Chapter
In 5G networks we expect femtocells, mmWave and D2D communications to take over the more typical long-range cellular architectures with pre-planned radio resources. However, as the connection length between the nodes become shorter, locating feasible, non-interfering combinations of the links becomes more and more difficult. In this paper a new approach to this problem is presented. In particular, through guided heuristic search, it is possible to locate non-interfering combinations of wireless connections in a highly effective manner. The approach enables operators to deploy centralized scheduling solutions for emerging technologies such as network-assisted WiFi-Direct and LTE Direct, and others, especially those which lack efficient medium arbitration mechanisms.
Chapter
In this paper a model of a heterogeneous resource queueing system with a Markovian arrival process is considered. The customer accepted for servicing occupies random amount of resource with a given distribution function depending on the class of the customer and on the type of service it needs. At the end of the service, the customer leaves the system and releases the occupied resource. In this work, asymptotic formulas for calculating the main probability characteristics of the model, including the joint distribution functions of the customers number and the total resource amounts occupied by them, are obtained. Finally, the accuracy of the approximation is verified by using simulation.
Article
Full-text available
One of the main problems in LTE networks is the distribution of a limited number of radio resources among Human-to-Human (H2H) users as well as the increasing number of machine-type-communication (MTC) devices in machine-to-machine (M2M) communications. Different traffic types from user’s equipment and MTC devices transmitted over the network suggests a dynamic resource allocation in order to provide a better quality of service (QoS). In this paper, we propose a dynamic resource allocation scheme for M2M traffic in LTE networks. The suggested method is based on fixed bandwidth intervals at which traffic from MTC devices is serviced according to the Processor Sharing (PS) discipline. By means of a Markov model, an estimation of the behaviour of LTE for H2H and M2M traffics characteristics is shown. We propose an analytical solution to calculate the model performance measures, such as blocking probabilities for H2H users.
Conference Paper
Full-text available
As massive deployments of autonomous MTC devices jeopardize current mobile access networks with their excessive signaling, wireless industry is taking decisive steps to protect future technology from such overloads. Whereas efficient mechanisms for overload control of 3GPP Long Term Evolution (LTE) system are now in place when the devices are connecting to the network, we investigate the situation when the connection has already been established and a large number of devices send their meaningful data. In this paper, we intend to identify whether a surge in simultaneous transmission attempts by numerous connected-mode MTC devices actually threatens 3GPP LTE and characterize an overloaded scenario with a mixture of diverse device classes (e.g., low and high priority devices). Our approach combines both analysis and protocol-level simulations to conclude that appropriate overload control mechanisms may also be necessary for connected-mode devices.
Article
Full-text available
While operators have finally started to deploy fourth generation broadband technology, many believe it will still be insufficient to meet the anticipated demand in mobile traffic over the coming years. Generally, the natural way to cope with traffic acceleration is to reduce cell size, and this can be done in many ways. The most obvious method is via picocells, but this requires additional CAPEX and OPEX investment to install and manage these new base stations. Another approach, which avoids this additional CAPEX/OPEX, involves offloading cellular traffic onto direct D2D connections whenever the users involved are in proximity. Given that most client devices are capable of establishing concurrent cellular and WiFi connections today, we expect the majority of immediate gains from this approach to come from the use of the unlicensed bands.
Conference Paper
Full-text available
In this paper, we address the emerging concept of Machine-Type Communications (MTC), where unattended wireless devices send their data over the Long Term Evolution (LTE) cellular network. In particular, we emphasize that future MTC deployments are expected to feature a very large number of devices, whereas the data from a particular device may be infrequent and small. Currently, LTE is not optimized for such traffic and its data transmission schemes are not MTC-specific. To improve the efficiency of small data access, we propose a novel contention-based LTE transmission (COBALT) mechanism and evaluate its performance with both analysis and protocol-level simulations. When compared against existing alternatives, our data access scheme is demonstrated to improve network resource consumption, device energy efficiency, and mean data access delay. We conclude that COBALT has the potential for supporting massive MTC deployments based on the future releases of the LTE technology.
Article
Full-text available
Machine-to-machine communication, a promising technology for the smart city concept, enables ubiquitous connectivity between one or more autonomous devices without or with minimal human interaction. M2M communication is the key technology to support data transfer among sensors and actuators to facilitate various smart city applications (e.g., smart metering, surveillance and security, infrastructure management, city automation, and eHealth). To support massive numbers of machine type communication (MTC) devices, one of the challenging issues is to provide an efficient way for multiple access in the network and to minimize network overload. In this article, we review the M2M communication techniques in Long Term Evolution- Advanced cellular networks and outline the major research issues. Also, we review the different random access overload control mechanisms to avoid congestion caused by random channel access of MTC devices. To this end, we propose a reinforcement learning-based eNB selection algorithm that allows the MTC devices to choose the eNBs (or base stations) to transmit packets in a self-organizing fashion.
Article
Full-text available
As Machine-Type-Communications (MTC) continues to burgeon rapidly, a comprehensive study on overload control approach to manage the data and signaling traffic from massive MTC devices is required. In this work, we study the problem of RACH overload, survey several types of RAN-level contention resolution methods, and introduce the current development of CN (core network) overload mechanisms in 3GPP LTE. Additionally, we simulate and compare different methods and offer further observations on the solution design.
Article
Full-text available
Machine-to-machine (M2M) communications over cellular networks pose significant challenges as a result of the large number of devices, small data transmissions, and vast applications range. Current solutions based on general packet radio service (GPRS) access proved to be inadequate for supporting the M2M ecosystem. Therefore, advanced cellular network releases, such as long-term evolution (LTE) and LTE-Advanced (LTE-A), should efficiently cater to M2M com-munications. However, the increase in signaling overhead and diverse quality-of-service (QoS) requirements calls for the development of novel flexible scheduling algo-rithms. In this article, we present the challenges in facili-tating M2M scheduling over existing and future cellular infrastructures, review the related proposals, provide some initial solutions, and identify new perspectives, which pave the way for efficient and smooth migration to M2M-enabled broadband cellular systems.
Article
Full-text available
Energy efficiency is increasingly important for wire-less cellular systems due to the limited battery resources of mobile clients. While modern cellular standards emphasize low client battery consumption, existing techniques do not explicitly focus on reducing power that is consumed when a client is actively communicating with the network. Based on high data rate demands of modern multimedia applications, active-mode power consumption should also be an important consideration for wireless system design and standards development. Recent work in this area shows that radio resource management schemes optimizing energy efficient metrics can provide considerable reduction in client power consumption. In this paper, we evaluate the performance of such techniques using realistic cellular system simulation model. Specifically, we focus on the emerging fourth generation IEEE 802.16m standard. Our simulation results indicate that energy efficient techniques continue to provide considerable power savings, even when accounting for realistic system parameters and channel environments.
Article
Full-text available
Machine-to-machine (M2M) communications are expected to provide ubiquitous connectivity between machines without the need of human intervention. To support such a large number of autonomous devices, the M2M system architecture needs to be extremely power and spectrally efficient. This article thus briefly reviews the features of M2M services in the third generation (3G) long-term evolution and its advancement (LTE-Advanced) networks. Architectural enhancements are then presented for supporting M2M services in LTE-Advanced cellular networks. To increase spectral efficiency, the same spectrum is expected to be utilized for human-to-human (H2H) communications as well as M2M communications. We therefore present various radio resource allocation schemes and quantify their utility in LTE-Advanced cellular networks. System-level simulation results are provided to validate the performance effectiveness of M2M communications in LTE-Advanced cellular networks.
Article
Machine-type communications (MTC) are a rapidly growing technology, which is expected to generate significant revenues to mobile network operators. In particular, smart grid is predicted to become one of the key MTC use cases that involves unattended meters autonomously reporting information to a grid infrastructure. With this research, we consider a typical smart metering MTC application scenario in the context of 3GPP LTE-advanced wireless cellular system featuring a large number of devices connecting to the network near-simultaneously. The resulting overload of the random access channel requires a novel evaluation methodology based on comprehensive analysis and simulations. In this paper, we target to complement a validated evaluation framework fully compatible with the 3GPP test cases with a thorough analysis of random access channel performance in overloaded MTC scenarios. We also look at the regular MTC operation, when the devices are sending their data after initial network entry has been performed. By including energy consumption into our methodology together with the conventional performance metrics, we aim at providing a complete and unified insight into MTC device operation, including its energy efficiency. Copyright © 2013 John Wiley & Sons, Ltd.