Next Article in Journal
An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks
Next Article in Special Issue
Towards Harmonious Coexistence in the Unlicensed Spectrum: Rational Cooperation of Operators
Previous Article in Journal
A Multi-Objective Partition Method for Marine Sensor Networks Based on Degree of Event Correlation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Exploiting the Capture Effect to Enhance RACH Performance in Cellular-Based M2M Communications

Ubiquitous Network Laboratory, School of Electrical and Electronic Engineering, Yonsei university, 50 Yonsei-ro, Seodaemun-Gu, Seoul 03722, Korea
*
Author to whom correspondence should be addressed.
Sensors 2017, 17(10), 2169; https://doi.org/10.3390/s17102169
Submission received: 2 September 2017 / Revised: 17 September 2017 / Accepted: 19 September 2017 / Published: 21 September 2017
(This article belongs to the Special Issue Green Wireless Networks in 5G-inspired Applications)

Abstract

:
Cellular-based machine-to-machine (M2M) communication is expected to facilitate services for the Internet of Things (IoT). However, because cellular networks are designed for human users, they have some limitations. Random access channel (RACH) congestion caused by massive access from M2M devices is one of the biggest factors hindering cellular-based M2M services because the RACH congestion causes random access (RA) throughput degradation and connection failures to the devices. In this paper, we show the possibility exploiting the capture effects, which have been known to have a positive impact on the wireless network system, on RA procedure for improving the RA performance of M2M devices. For this purpose, we analyze an RA procedure using a capture model. Through this analysis, we examine the effects of capture on RA performance and propose an Msg3 power-ramping (Msg3 PR) scheme to increase the capture probability (thereby increasing the RA success probability) even when severe RACH congestion problem occurs. The proposed analysis models are validated using simulations. The results show that the proposed scheme, with proper parameters, further improves the RA throughput and reduces the connection failure probability, by slightly increasing the energy consumption. Finally, we demonstrate the effects of coexistence with other RA-related schemes through simulation results.

1. Introduction

Supporting Internet of Things (IoT) services is emerging as one of the most important problems facing communication systems [1,2]. There are many applications, such as public safety, e-health, fleet management, and smart metering [1], that will use machine-to-machine (M2M) communication technology, which ensures connectivity to the devices without human interaction
Cellular networks are expected to play a major role in enabling M2M communications because they can provide seamless coverage over a large area, support mobility, and offer security. However, there are several problems with enabling M2M communications over cellular networks because these networks are optimized for human-to-human (H2H) communications and the characteristics of M2M communications are different from those of conventional H2H communications. For example, M2M communications are triggered by events, time-controlled, involve the transmission of small amounts of data, and are energy-limited [3]. The 3rd Generation Partnership Project (3GPP) has studied the issues facing M2M services in cellular networks. In [1], the 3GPP studied potential system improvements for M2M communications, the authors organized the architectural considerations and defined the expected problems for M2M communications. One of the most critical problems is congestion due to the massive access by M2M devices. The control plane at the radio-access-network (RAN) level suffers during massive access by M2M devices due to their characteristics. M2M devices try to establish a connection with an evolved node B (eNB) when they have data to transmit, causing a severe random access channel (RACH) congestion problem. The 3GPP suggested some solutions [1], including an access class barring (ACB) scheme, a separate RACH resource-allocation scheme, a dynamic RACH resource-allocation scheme, and an M2M-specific back-off scheme.
Because RACH congestion due to massive access causes the degradation of RA throughput, increasing the RA throughput has become a major research target. The ACB method efficiently solves the RA throughput problem by controlling the access probabilities of separate access classes. In [4], the authors suggested dynamic-ACB (D-ACB) to not only overcome the RACH congestion problem due to bursts of M2M traffic but also to reduce the total service time. The D-ACB determines the accurate ACB factor without backlog information. In [5], a cooperative ACB (C-ACB) scheme was proposed to reduce the congestion in multi-cell cases. In this study, the ACB factors of each eNB were used for the eNB selection by M2M devices. Furthermore, the ACB factors were jointly determined among the neighboring eNBs. The access load could be distributed using the cooperative method. In [6], timing-advance (TA) information was used to reduce the RA collision probability because the propagation delay between a stationary M2M device and the eNB is a constant. Hence, the authors assumed that the TA values in a random access response (Msg2) could be used as an identifier; therefore, some preamble collisions could be solved. Based on this, they proposed a TA-based ACB scheme for increasing RA throughput. In [7], an ACB scheme for delay-sensitive devices is proposed. The authors consider the scenario where delay-sensitive and delay-tolerant services coexist. In addition, a priority-based ACB scheme adjusts dynamically the access probability and the number of preambles to satisfy the requirements of delay-sensitive services. In addition, delay-tolerant services can also be highly utilized based-on preamble allocation.
A preamble-separation method has also been proposed to increase the RA throughput. In [8], two preamble-allocation methods for M2M/H2H services were studied. One method split the preambles into disjointed sets for M2M and H2H separately, while the other split them into an H2H-only set and an H2H/M2M-hybrid set. The authors modeled these methods and analyzed them in terms of throughput. In [9], the authors analyzed the non-overlapping preamble separation, proposing the use of a load-adaptive throughput-maximizing preamble-allocation procedure, which automatically adjusted the preamble allocation to the priority classes, based on the access load. Both studies showed that the preamble–separation scheme increased the RA throughput, especially when the access load was heavy.
The energy consumption of M2M devices is also a very important issue because most M2M devices are vulnerable to energy consumption. Therefore, many studies have been conducted on the energy consumption of the RA process. In [10], further improvement of traffic scattering for the group paging (FI-TSFGP) scheme was proposed to achieve high channel-access probability for M2M services. They also provided analysis of the scheme in terms of access latency and power consumption. Consequently, they argued that the FI-TSFGP scheme led to the reduction of both the channel access latency and the power consumption. In [11], group-based access control was studied in terms of the energy consumption of M2M devices. The authors introduced a coordinator to reduce massive access. In addition, they proposed a joint massive access control and resource allocation scheme that minimized total energy consumption.
Analyzing the RA procedure is fundamental to understanding the RACH congestion problem and to providing the proper solutions. Various studies have analyzed an RA procedure to solve the RACH problem. These studies have mostly focused on the well-known multi-slotted Advocates of Linux Open-source Hawaii Association (ALOHA) model. The RA throughput, access delay, efficiency, and energy consumption of the RA procedure have been well analyzed using the multi-slotted ALOHA model [4,5,6,12,13,14]. However, these studies used the classical collision model to interpret RA nature, which assumes that no signal is decoded when multiple nodes transmit simultaneously. This model allows for simple analysis but does not yield accurate results due to the characteristics of wireless communications. Other studies have used the slotted-ALOHA system in a capture model [15,16]. This model assumed that a certain signal could be decoded when the received power of a specific signal was larger than a predefined threshold. Studies exploiting this model have provided more realistic results.
In this paper, we provide novel solution to resolve the RACH congestion problem due to massive access of M2M devices by exploiting the capture effect: Msg3 power ramping (PR) scheme. The main contributions of this paper are summarized as follows:
  • We formulated analysis models of the RA procedure considering the capture effect. Previous studies [4,5,6,12,13,14] adopted the collision model to analyze the RA procedure and assumed that the RA performance degradation due to the collisions of the preambles (Msg1) could not be prevented. However, we provide an RA analysis model that considers the capture effect. Therefore, we consider RA performance improvements due to the capture effect of the physical layer, even if the collision occurs. We provide an RA performance analysis model, in terms of the RA throughput, the connection failure probability, and the average energy consumption of the devices.
  • Exploiting the capture effect to improve the RA performances, we propose the Msg3 PR scheme. This scheme causes a difference in the received power of messages at the eNB, so that the capture effect occurs frequently. In addition, it is easy to apply because the proposed scheme adopts the power ramping scheme that has already been used in the cellular system. Moreover, by applying this new technique, a device that has performed many retransmissions would have a higher RA success probability; thus, the connection failure probability could be reduced.
  • In the simulation, we demonstrate the accuracy of proposed analysis and the advantages of the Msg3 PR scheme. In addition, the effects of various network parameters on the performance of the technology are demonstrated. Moreover, we discuss the beneficial points of the proposed scheme when used with other RA-related schemes.
The rest of the paper is organized as follows. In Section 2, we introduce our system model. The motivation of this study and an introduction to the Msg3 PR scheme are presented in Section 3. In Section 4, we derive the analysis models for the RA procedure, considering the capture effect, and provide the performance of the proposed scheme, in terms of several performance metrics. In Section 5, the simulation results demonstrate the performance of the Msg3 PR scheme and the accuracy of the proposed analysis. Finally, Section 6 presents the conclusions.

2. System Model

2.1. Random Access Procedure

An M2M device in the radio-resource-control (RRC) idle mode performs an RA procedure to set up a connection with an eNB before data transmission. There are two types of RA procedures: contention-free and contention-based. In this study, we focus on the contention-based RA procedure. Before beginning the RA, the device listens to the system information block (SIB) messages broadcasted periodically by the eNB. The SIB messages contain information about the RA, such as the physical random access channel (PRACH) configuration index and the frequency offset, which inform about what resource blocks are reserved for the subsequent RA. Furthermore, information about which preambles are reserved for groups and about power control is included in the SIB messages. The contention-based RA procedure includes four steps messages exchanging [17]; the RA procedure modeled in this study is as follows:
  • Msg1. Preamble transmission
    The RA procedure is initiated by the transmission of a preamble that is randomly chosen from preamble set V at a predetermined RA slot. As a result, there are three cases: singleton preamble, collided preambleand empty preamble. Singleton preamble is chosen by exactly one device, the collided preamble preamble is chosen by multiple devices, and the empty preamble is chosen by none of the devices. An eNB can only detect whether a specific preamble is transmitted, but cannot determine whether it is a collided preamble or a singleton preamble [17,18]. Devices that send Msg1 set the random-access-response (RAR) window.
  • Msg2. RAR
    When the eNB detects a preamble transmission, it sends an Msg2 for the corresponding preambles through the physical-downlink control channel (PDCCH). This Msg2 contains the radio-network temporary identifier (RA-RNTI), the timing-advance (TA) information, and the uplink grant. The RA-RNTI identifies the corresponding preamble, the TA information is used to adjust the synchronization of the corresponding device, and the uplink grant is used to schedule the transmission of Msg3. Because the eNB cannot distinguish between singleton and collided preambles, it sends Msg2 for either preamble. Therefore, multiple devices that select the same preamble during Msg1 transmission receive the same Msg2, which only indicates the corresponding preamble. If a device does not receive an Msg2 within the RAR window, it realizes that the current RA has failed.
  • Msg3. RRC-connection request
    After sending Msg1, the device observes the PDCCH for the RAR window. If it finds the corresponding Msg2, it sends the Msg3, containing its identifier, by using a physical-uplink shared channel (PUSCH) informed by the uplink grant in the Msg2. Devices that send Msg3 set the contention–resolution time. Devices that choose the same preamble (i.e., collided preamble) also send an Msg3 containing their own identifier by using the same uplink grant, and, therefore, an Msg3 collision can occur.
  • Msg4. RRC-connection setup
    The eNB transmits the Msg4 using the PDCCH to inform the device that an RRC connection has been set up. Because the Msg4 contains the device identifier received from successfully received Msg3, an RA collision can be resolved if a specific Msg3 is decoded by capture effect.
If any of the four steps fails, an RA failure occurs. In this study, we assume that RA failure only occurs when the devices fail to receive an Msg 4. If a device does not receive an Msg 4 within the contention-resolution time, it performs a random back-off and re-attempts the RA, if the trial number does not exceed the maximum trial number, N m a x . If the trial number exceeds N m a x , a connection failure occurs. Note that the trial number can be from 1 to N m a x . If the RA procedure is successful within N m a x RA trials, the device successfully connects to the eNB. We do not consider the hybrid automatic repeat request (HARQ) procedure for Msg3 or Msg4, nor do we consider the PDCCH resource constraint.

2.2. Power Capture Effect

Due to the characteristics of wireless communications, a specific signal can be decoded when multiple signals are received at different powers, causing the capture effect. This phenomenon occurs when the strongest signal power received from a specific device is sufficiently large. In other words, the capture effect occurs when the signal-to-interference ratio (SIR) (in [16], the signal-to-interference-plus-noise-ratio (SINR) is used. However, we use SIR to model the capture effect as [15] for mathematical tractability) of the strongest signal is larger than a specific threshold [15,16]. If P i denotes the signal power received from device i at the eNB, the probability that the signal from device i is captured, i.e., P p c , i , is defined as follows:
P p c , i = P P i > β j i P j ,
where β is the capture-threshold.

2.3. Uplink Power Control

In [19], the Msg1 transmission adopted a power-ramping scheme to increase the probability of preamble detection, which was not considered in this study. When a device re-attempts the RA procedure after back-off, it increases its Msg1 transmission power through a power-ramping. Let P m s g 1 denote the Msg1 transmission power, and P m s g 1 can be defined as follows [10,17]:
P m s g 1 = min ( P C m a x , P R T P + P L ) ,
where P C m a x [dBm] is the maximum transmission power, P L [dB] is the path loss; and P R T P [dBm] is the preamble received target power, which is defined as follows:
P R T P = P I R T + d e l t a + ( r 1 ) P R S .
Here, P I R T is the power initial received target, d e l t a is the offset value depending upon the preamble format, and r is the ramping number that is associated with the trial number of the device. Using open- and closed-loop power control [19], a device can estimate the P L and, therefore, can adjust its transmission power to meet the target received power at the eNB. In this study, we assume that the power control is performed perfectly, such that the received signal power depends only upon the ramping number.
The Msg3 transmission power follows the PUSCH power control policy [18]. The Msg3 transmission power is affected by the modulation and coding scheme (MCS), resource blocks, and other factors. For the case of M2M communications, the data required is quite small, and the MCS is also low due to the low complexity. Hence, it is reasonable that the transmission power of Msg3 is identical for M2M devices. Consequently, we assume, for simplicity, that
P m s g 3 = min ( P C m a x , P t a r g e t + P L ) ,
where P t a r g e t = 10 log M + P 0 + d e l t a M C S + f ( i ) is assumed to be a constant value. Here, M is the number of assigned resource blocks, d e l t a M C S is the change in value related to MCS, and the other values are defined by the high-layer.

3. Motivation and Proposed Scheme

The RACH congestion problem can be fatal for a network system and devices. As described in the RA procedure in Section 2.1, a collision occurs when multiple devices select the same preamble and send their Msg1s. Because this Msg1 collision cannot be detected by the eNB during the Msg1 reception, these devices suffer from an Msg3 collision that also wastes the PUSCH resources. Moreover, the congestion problem gets worse due to the retransmission by the RA-failed devices and can even cause a connection failure. In summary, the RACH congestion problem causes (1) degradation of the RACH throughput, (2) increased probability of connection failures, and (3) wasting of the uplink resources (PUSCH). Exploiting the capture effect positively affects the network system [15,16]. Intuitively, the RACH congestion problem can also benefit from exploiting the capture effect. Even though collisions occur, if an Msg3 of a specific device is captured, the eNB can send an Msg4 to the device, and, therefore, the device would successfully connect. The received signal powers at the eNB are differentiated to exploit the capture effect. However, as seen in Equation (4), there is no difference between the target powers of the received signals when perfect power control for M2M devices is performed. Hence, we propose adopting a power ramping scheme for Msg3 transmission to exploit the capture effect. The proposed scheme leads the device to transmit at higher power as more retransmissions occur. There are some advantages using the power ramping scheme: first, it is easy to implement because it has been adopted for Msg1 transmission; and, second, the more retransmitted devices there are, the higher the probability of being captured, reducing the probability of connection failure. Because the proposed scheme uses a power-ramping scheme, the Msg3 transmission power can be reformulated as follows:
P m s g 3 = min ( P C m a x , P t a r g e t + P L + ( r 1 ) P R S ) .
As a result, the received power can be differentiated based on the ramping number (r) of the device.

4. Analysis Model

Intuitively, the Msg3 PR will have a positive effect on the probability of RA success because it helps the eNB capture the Msg3, even in a collision situation. However, it is necessary to analyze how the proposed scheme is affected by the network parameters and to analyze negative aspects of the scheme, such as the increased energy consumption of the devices. In this section, we propose an RA procedure analysis model that considers the capture effect in the Msg3 reception. For mathematical tractability, we assume that network is in a steady-state (in [4,10,14], a heavily congested network reaches a steady-state. In other words, the number of arrivals of retransmitted devices is much greater than the number of new arrivals. When the network is in a steady state, the network states (ex. the number of RA arrivals, the distribution of the trial numbers in the network, the number of RA successes at each RA procedure, etc.) are merely constant). We provide an analytic model for three performance metrics: RA throughput, connection failure probability, and average energy consumption. The RA throughput and connection failure probability demonstrate the positive effect of the proposed Msg3 PR scheme, while the average energy consumption is a potential negative effect of the proposed scheme. Table 1 summarizes the notations used in this analysis.

4.1. System Model

We consider a single cell with radius X c e l l . Let N and N denote the set of devices sending Msg1 to participate in RA at the same RA slot, and the size of N , respectively. Devices in N are uniformly distributed in a cell, hence, X u = x which denotes the distance between the eNB and u, follows a uniform distribution. A device u N , which failed the RA procedure ( t 1 ) times and participates in the t t h RA at this RA slot has a trial number T u = t . Similarly, R u = r denotes the ramping number of a device defined by Equation (5) at the current RA slot. As seen in Equation (5), the Msg3 transmission power of u is upper-bounded by P C m a x as P t a r g e t + ( r 1 ) P R S + P L P C m a x . Note that P L is related to x. For simplicity, P L can be defined using the log-distance path loss model without fading as P L ( x ) = P L 0 + 10 α log ( x x 0 ) , where P L 0 and x 0 are the reference-path loss and distance, respectively. From the upper-bound condition and the path-loss model, the upper-bound of the ramping number of the device located at a distance x from the eNB is as follows:
r max 1 , P C m a x P L ( x ) P t a r g e t P R S + 1 = K m a x ( x ) .
Definition 1.
K m a x ( x ) is the maximum allowable ramping number of a device located at a distance x from the eNB. Then, the ramping number of u, R u , can be defined as follows:
R u = min K m a x ( x u ) , T u .
However, Equation (7) is hard to deal with. Hence, we introduce the concept of zones for tractability as shown in Figure 1.
Definition 2.
Zone k is the area in which devices with K m a x = k are located. In addition, Z u is the zone in which device u belongs. Thus, Z u = k means that a device u is in zone k (also, u can only increase its ramping number up to k). Therefore, z o n e N m a x is the closet to the eNB, whereas z o n e 1 is the farthest from the eNB.
If the distribution of X u is known (i.e., the distribution of devices in a cell), the probability that device u belongs to zone k, P ( Z u = k ) , is (see Figure 1)
P ( Z u = k ) = b k + 1 b k P ( X u = x ) d x , k [ 1 , N m a x ] .
Note that K m a x ( x ) is a decreasing function for x. Therefore, there exists a boundary distance b k = K m a x 1 ( k ) , k = 1 , , N m a x , where b N m a x + 1 = 0 .
Definition 3.
E [ N T = t k ] is the expected number of devices having a trial number t that are located in zone k for t [ 1 , N m a x ] and k [ 1 , N m a x ] . Then, k t E [ N T = t k ] = N holds.
If E [ N T = t k ] for t , k are given, we can define the distribution of the ramping number.
Definition 4.
P ( R u = r , Z u = k | N ) is the probability that a device has a ramping number r and is located in zone k; E [ N R = r k ] is the expected number of devices that have a trial number r and are located in zone k when N devices participate in the RA for r [ 1 , N m a x ] and k [ 1 , N m a x ] .
E [ N R = r k ] can be derived from E [ N T = t k ] . Because the devices belonging to zone k can only increase their ramping numbers to k, N R = r k = 0 for r > k . Hence, E [ N R = r k ] can be defined using E [ N T = t k ] as follows:
E [ N R = r k ] = E [ N T = r k ] , 1 r < k , t = k N m a x E [ N T = t k ] , r = k , , r [ 1 , N m a x ] , 0 , k < r N max .
Finally, the following two equations are derived.
P ( R u , Z u = k | N ) = E [ N R = r k ] N P ( R u | N ) = k = 1 N m a x P ( R u , Z u = k | N ) = E [ n R = r ] N , r [ 1 , N m a x ] ,
where P ( R u | N ) is the distribution of the ramping number when the number of accesses is N.

4.2. RA Throughput

In this sub-section, we provide an analysis model for the RA throughput. First, we provide a one-shot model when N and E [ N T = t k ] for t , k are given. Then, we demonstrate a steady-state RA throughput using the one-shot model because E [ N T = t k ] is affected by the RA success probability, as determined by the RA throughput.

4.2.1. One-Shot RA Throughput Analysis

Devices in N send an Msg1 that is randomly selected from V preambles. Focusing on a certain device, u N with T u = t and Z u = k , and, therefore, R u = r = m i n ( t , k ) . Let V u denote the preamble selected by device u, and M v denote the number of devices that select preamble v among N excluding device u. Then, the probability that device u and m devices in set N \ u select preamble v can be expressed as follows:
P ( M v = m , V u = v | N ) = 1 V N 1 m 1 V m 1 1 V N m 1 , m [ 0 , N 1 ] , v [ 1 , V ] .
Next, we derive the probability that device u succeeds in a RA (i.e., the Msg3 from u is successfully decoded by the eNB), which we denote as the event S u . Let the random variable P i r x denote the received signal power from device i at the eNB. Then, the event ( S u ) occurs, even if u collides with m devices, when P u r x meets the capture condition defined in Equation (1). Hence, the conditional probability of ( S u ) is
P ( S u | N , M v = m , V u = v , P u r x = p ) = P β i M v P i r x p | N , m , v , P u r x = p .
Since we assume that power control with full compensation of path loss is performed perfectly, P i r x is a function of the ramping number as in Equation (5). Therefore, the probability density function (PDF) of P i r x follows the distribution of the ramping number ( R i ) of the RA-participating devices as Equation (10). In other words, the PDF of P i r x is
P P i r x = P r x ( r ) | N = P ( R i = r | N ) .
Hence, the conditional probability in Equation (12) is redefined as R u :
P S u | N , M v = m , V u = v , P u r x = P r x ( r )   = P ( S u | N , M v = m , V u = v , R u = r )   = P β i M v P i r x P r x ( r ) | N , m , R u = r   = C P N , m , r ,
where C P N , m , r is the Msg3 capture probability, which means the probability that device u whose ramping number is r is captured by the eNB when m devices among N devices collide with u. Note that C P N , 0 , r is the capture probability when u selects the singleton preamble, and therefore, C P N , 0 , r = 1 for any N and r. Because the PDF of P i r x is defined, and is independent and identically distributed, i.i.d., Equation (14) can be solved using the m-fold convolution of the PDF of P i r x for given values of N , m , and r [16].
Then, the following conditional probability can be obtained from Equations (8), (10) and (14), and the chain rule:
P ( S u , R u = r , Z u = k | N , M v = m , V u = v )   = P ( S u | N , M v = m , V u = v , R u = r , Z u = k ) P ( R u = r | N , M v = m , V u = v , Z u = k ) 12341234 P ( Z u = k | N , M v = m , V u = v )   = C P N , m , r P ( R u = r | N , Z u = k ) P ( Z u = k ) , r [ 1 , N m a x ] , k [ 1 , N m a x ] .
Note that (a) S u is dependent of R u , not Z u , (b) R u is independent of V u and M v , and (c) Z u is independent of N , M v , and V u , so Equation (15) holds.
From Equations (11) and (15), we have
P ( S u , M v = m , V u = v , R u = r , Z u = k | N ) P 1 p 2 p 2 p 2 p 2 p 2 p 2 p 2 p 2 p 2 p 2 p 2 p 2 p 2 p 2 p 2 p = P ( M v = m , V u = v | N ) P ( S u , R u = r , Z u = k | N , M v = m , V u = v ) m [ 0 , N 1 ] , v [ 1 , V ] , r [ 1 , N m a x ] , k [ 1 , N m a x ] .
Thus, the probability that an arbitrary device succeeds in RA when N devices participate in the RA is
P ( S u | N ) = v = 1 V m = 0 N 1 r = 1 N m a x k = 1 N m a x P ( S u , M v = m , V u = v , R u = r , Z u = k | N ) = m = 0 N 1 N 1 m 1 V m 1 1 V N m 1 r = 1 N m a x P ( S u | N , M v = m , R u = r ) 123 k = 1 N m a x P ( R u = r | N , Z u = k ) P ( Z u = k ) = m = 0 N 1 N 1 m 1 V m 1 1 V N m 1 r = 1 N m a x C P N , m , r P ( R u = r | N = N ) = m = 0 N 1 N 1 m 1 V m 1 1 V N m 1 C P N , m ,
where C P N , m = r = 1 N m a x C P N , m , r P ( R u = r | N ) , which denotes the capture probability of a device when it collides with m devices among N devices.
Consequently, we can obtain the one-shot RA throughput when N devices participate in RA as
E [ S | N ] = N P ( S u | N ) = N m = 0 N 1 N 1 m 1 V m 1 1 V N m 1 C P N , m .

4.2.2. Steady-State RA Throughput Analysis Model

As seen in Equation (14), the capture probability, C P N , m , r , is affected by the distribution of the ramping number P ( R u | N ) , which is determined by E [ N T = t k ] as in Equation (9). Therefore, E [ N T = t k ] must first be obtained. Let us assume that the network is in a steady-state with a stable number of RA accesses N at each RA slot; then, with a slight abuse of notation, we can still represent N and N T = t k as steady-state values. Then, the following condition holds.
Note that E [ N T = 1 ] = k E [ N T = 1 k ] denotes the number of new arrivals. Now, we introduce a Markov chain model to determine the state of the devices, where state < t , k > presents those devices with a trial number t and are located in z o n e k . If we assume that the M2M devices have no mobility, a state transition only occurs when a device (a) fails in RA and retries (from < t , k > to < t + 1 , k > ), (b) succeeds in RA, or (c) fails in its connection set up. Figure 2 presents this Markov chanin model. Then, P < t , t + 1 > k can be derived as follows:
P < t , t + 1 > k = 1 P ( S u | N , T u = t , Z u = k ) = 1 P ( S u | N , R u = min ( t , k ) ) t [ 1 , N m a x 1 ] , k [ 1 , N m a x ] ,
where
P ( S u | N , R u = r ) = P ( S u , R u = r | N ) P ( R u = r | N ) = m = 0 N 1 N 1 m 1 V m 1 1 V N m 1 C P N , m , r .
Finally, we can obtain the steady-state value E [ N T = t k ] using balance equation property.
E [ n T = t + 1 k ] = P ( Z u = k ) E [ N T = 1 ] , t = 1 , P < t , t + 1 > k E [ n T = t k ] , 1 < t N max 1 ,
t = 1 N m a x k = 1 N m a x E [ N T = t k ] = N .
Here, the first line of Equation (21) holds because the locations of devices are uniformly distributed. From Equations (21) and (22), E [ N T = t k ] , t , k can be obtained. In summary, the steady-state RA throughput for fixed the number of accesses, N, can be obtained by the iterative procedure as in Figure 3.

4.3. Connection Failure Probability

Connection failure probability is defined as the probability that a device fails to acquire connectivity by failing the RA process N m a x times. Let P C S , T = t | N , Z = k and P C F , T = t | N , Z = k denote the conditional connection success and connection failure probabilities, respectively, of a device with a trial number t for given z o n e k and total arrival N, respectively. Therefore, P C S , T = t | N , Z = k is equal to the probability that the device fails at RA ( t 1 ) times, and finally succeeds in the t t h RA trial. Then,
P C S , T = t | N , Z = k = P S | N , R = r i = 1 t 1 ( 1 P S | N , R = i ) , if t k , P S | N , R = k ( 1 P S | N , R = k ) t k i = 1 k 1 ( 1 P S | N , R = i ) , if , t > k ,
where P S | N , R = r is the simple notation of P ( S u | N , R u = r ) , as defined in Equation (20). Then, the connection failure event is same as the complementary event of the connection success cases. Thus, P C F | N , Z = k can be derived as follows:
P C F | N , Z = k = 1 t = 1 N m a x P C S , T = t | N , Z = k = 1 r = 1 k P S | N , R = r i = 1 r 1 ( 1 P S | N , R = i ) P S | N , R = k i = 1 k 1 ( 1 P S | N , R = i ) t = k + 1 N m a x ( 1 P S | N , R = k ) t k .
Finally, the connection failure probability, P C F | N , can be derived using Equation (8) as follows:
P C F | N = k = 1 N m a x P C F | N , Z = k P ( Z u = k ) .

4.4. Average Energy Consumption

4.4.1. Energy Consumption Model

An average energy consumption model for the devices needs to be defined to analyze the energy consumption of the proposed scheme. For the energy-consumption parameters, we have partially referenced the model used in [10]. In [10], the authors assumed that an RA collision is detected by the eNB during the Msg1 reception, whereas we assumed that a collision is detected when the eNB cannot decode Msg3. Therefore, we refer to and modify the energy consumption model defined in [10]. In this study, the description of how parameters are defined is omitted. See [10] for a detailed description of the parameters. Instead, we provide simplified description in Figure 4. Let P 1 , P 2 , and P 3 denote the power consumption for waiting RA slot and performing back-off, receiving messages from the eNB, and transmission, respectively. Here, for analytic convenience, we assume that all transmission powers are equal, i.e., P 3 = P m s g 1 = P m s g 3 as in Equation (5). Then, the average energy consumption for failed RA and successful RA events can be modeled as follows.
  • The energy consumed during a failed RA event is equal to that consumed in the following steps: waiting for the first RA slots( ( τ R A _ R E P / 2 ) P 1 ), transmitting Msg1 ( P 3 ), waiting for the RAR window ( τ R A R P 1 ), wating for the Msg2 ( ( W R A R / 2 ) P 2 ), receiving the Msg2 ( τ m s g 2 P 2 ), processing time for Msg3 ( T p r o c P 2 ), transmitting Msg3 ( P 3 ), and expiring the contention-resolution timer ( W c o n _ s o l P 2 ).
  • The energy consumed during a successful RA event is equal to that consumed during the following steps. From transmitting Msg1 to receiving Msg2, the power consumed by the successful RA follows that consumed by the failed RA procedure and equals ( ( τ R A _ R E P / 2 ) P 1 + P 3 + τ R A R P 1 + ( W R A R / 2 ) P 2 + τ m s g 2 P 2 + T p r o c P 2 + P 3 ) . In addition, the following steps are: for waiting Msg4 ( ( W c o n _ s o l / 2 ) P 2 ), the power consumed when receiving Msg4 ( τ m s g 4 P 2 ), processing time for acknowledgement (ACK) ( T p r o c 2 P 2 ), and the power consumed by transmitting the ACK of Msg4 ( P 3 ).
Note that 1 / 2 terms denote the average time values. Parameter values in the above model are described in Table 2.

4.4.2. Average Energy Consumption

δ F and δ S denote the energy consumption for single failed and successful RA event, respectively. Note that δ F and δ S are random variables because P 3 is the random variable that is determined by the trial number and the path-loss of device as in Equations (5) and (7). Therefore, P 3 can be expressed as P 3 ( t , x ) [ m W ] = P ( r ) P ( x ) P c , where P ( r ) is the ramping component; r = m i n ( t , K m a x ( x ) ) , P ( x ) is the path-loss component, and P c is the target power, which is a constant value. From the previously-described power consumption model, δ F and δ S can be simply expressed as follows:
δ F = θ 1 P 3 ( t , x ) + θ 2 , δ S = θ 3 P 3 ( t , x ) + θ 4 ,
where θ 1 , θ 2 , θ 3 , and θ 4 are constants defined by the consumption model. In the previous section, because the analysis was performed based on Z u = k rather than X u = x , Equation (26) can be reformulated as follows:
δ ¯ F , k ( t ) = θ 1 P ¯ 3 , k ( t ) + θ 2 , δ ¯ S , k ( t ) = θ 3 P ¯ 3 , k ( t ) + θ 4 ,
where δ ¯ F , k ( t ) and δ ¯ S , k ( t ) denote the average energy consumption of device, which is located within z o n e k with the trial number t, having single failed and successful RA events, respectively. Here, P ¯ 3 , k ( t ) can be calculated using the average path-loss of the devices within z o n e k . Therefore, P ¯ 3 , k ( t ) = P ( r ) P ¯ ( k ) P c , where P ( r ) is the ramping component where r = m i n ( t , k ) , P ¯ ( k ) is the average path-loss of devices in z o n e k .
The energy consumption of a device located within z o n e k that succeeds in acquiring a connection after a number t of RA trials is denoted by w S ( t , k ) . Moreover, w F ( k ) denotes the energy consumption of a device located within z o n e k that fails to acquire a connection. Then, w S ( t , k ) and w F ( k ) can be derived as follows:
w S ( t , k ) = t = 1 K t , k 1 δ ¯ F , k ( t ) + ( t K t , k ) δ ¯ F , k ( K t , k ) + δ ¯ S , k ( K t , k ) , w F ( k ) = t = 1 K t , k δ ¯ F , k ( t ) + ( N m a x K t , k ) δ ¯ F , k ( K t , k ) ,
where K t , k = m i n ( t , k ) , which denotes the maximum ramping number of the device with T u = t and Z u = k as defined in Equation (7). Then, the average energy consumption of a device located within z o n e k when the total arrival is N, i.e., E [ W | N , Z u = k ] , is calculated using Equations (23) and (24) as follows:
E [ W | N , Z u = k ] = t = 1 N m a x w S ( t , k ) P C S , T = t | n , Z = k + w F ( k ) P C F | N , Z = k .
Finally, E [ W | N = N ] is
E [ W | N ] = k = 1 N m a x E [ W | N , Z u = k ] P ( Z u = k ) .

5. Simulation Results

In this section, the simulation results are provided to show the performance of the proposed Msg3 PR scheme. A discrete event simulator is built to analyze the performance of the RA procedure and the effect of the capture. The simulator implements the RA procedure defined in Section 2.1, and also implements the capture effects by adjusting the capture condition as Equation (1). Table 2 summarizes the commonly used simulation parameters in Section 5.1 and Section 5.2.
Through the analysis results defined in Section 4 and the simulation results, the steady-state performances in terms of the RA throughput, the connection failure probability and the average energy consumption are presented in Section 5.1. In Section 5.2, the possibility of coexistence of the Msg3 PR scheme with other typical RA-related schemes is presented by showing simulation results.

5.1. Performance of the Msg3 PR Scheme

In this subsection, we present the analysis (Anal.) and simulation (Sim.) results of the Msg3 PR scheme when the network is in a steady-state. Because the steady-state analysis model defined in Section 4 can be obtained when N is determined, the simulations also performed with fixed N. Therefore, we generate static new arrival at each RACH to converge the total arrival to N. Moreover, the locations of newly arrived devices are determined by the uniform distribution.
The simulation model assumes a steady-state condition. In other words, the number of arrivals and the distribution of the trial and the ramping number of devices converge.
We show RA throughput performance in terms of P R S , N m a x , and the number of preambles in an RACH, V. Furthermore, the connection failure probability analysis and the average energy consumption analysis according to P R S change are additionally performed to further analyze the performance of Msg3 PR scheme. The performance metrics used in the study are defined as follows.
The RA throughput performance is evaluated in terms of P R S , N m a x , and the number of preambles in a RACH, V. Furthermore, analyses of the connection failure probability and the average energy consumption according to P R S change are additionally performed to further analyze the performance of the Msg3 PR scheme. Note that we use the same parameters relative to energy consumption model as in Table 2 in the simulation. The performance metrics used in the study are defined as follows:
  • RA throughput
    (Anal.)—Equation (18).
    (Sim.)
    E [ S | N ] = T o t a l # o f R A S u c c e s s D e v i c e s N × S i m N u m b e r ,
  • Connection failure probability
    (Anal.)—Equation (25).
    (Sim.)
    P C F | N = T o t a l # o f C o n n e c t i o n F a i l e d D e v i c e s T o t a l # o f R A C o m p l e t e d D e v i c e s ,
  • Average energy consumption
    (Anal.)—Equation (30).
    (Sim.)
    E [ W | N ] = T o t a l E . C o f R A C o m p l e t e d D e v i c e s T o t a l # o f R A C o m p l e t e d D e v i c e s .
In each figure, the analysis results are displayed as lines, and the simulation results are displayed as markings if we performed both an analysis and a simulation.

5.1.1. The Consequences of the Capture Effect and Its Properties

Before discussing the performance metrics of the Msg3 PR scheme, we describe the consequences of the capture effect and its properties. Table 3 shows the RA success probability for given ramping numbers defined as in Equation (20), when the number of accesses is high, i.e., P ( S u | N = 60 , R u = r ) . As seen in Table 3, P ( S u | N = 60 , R u = r ) increases as r increases. For example, P ( S u | N = 60 , R u = 1 ) = 4 . 9 % , whereas P ( S u | N = 60 , R u = 8 ) = 28 . 4 % when P R S = 1 dB. In addition, P ( S u | N = 60 , R u = 1 ) = 4 . 9 % , whereas P ( S u | N = 60 , R u = 8 ) = 99 . 9 % when P R S = 4 dB. In other words, the probability of RA success for a device with R u = 8 is 5.7 times that of a device with R u = 1 when P R S = 1 dB. Furthermore, in the case of P R S = 4 dB, the difference in the success probability is further increased to approximately 20.4 times. From Table 3, the RA success probability increases as the Msg3 PR scheme uses higher P R S values.
However, this is not always true, as seen in Figure 5, which shows the RA success probability according to the location of the device. Note that the heavy-access load ( N = 60 ) case is considered, i.e., P ( S u | N = 60 , X u = x ) , which can be derived from P ( S u | N = 60 , Z u = k ) . We observe that the RA success probability decreases as the device moves away from the eNB. This is because K m a x ( x ) defined in Equation (6), decreases as x increases, and thus, the capture probability declines. One interesting point in Figure 5 is that the RA success probability is not necessarily high when the P R S is high; in other words, the trend noted in Table 3 is not always true. Based on the distance, the RA success probability when P R S = 4 dB is often less than the RA success probability with P R S = 3 dB. Moreover, even when x is between approximately 600 m and 700 m, the RA success probability for a P R S = 4 dB is lower than that with a P R S = 2 dB. The reason is that having too large of a P R S value in certain areas lowers the maximum ramping number, as seen in Equation (6), and, therefore, the RA success probability can be decreased. As a result, as the P R S increases, the devices close to the eNB have a higher probability of being captured, while the devices further from the eNB cannot perform power ramping well due to their lower K m a x . Hence, we can make an inference about performance: an increase in P R S does not necessarily lead to an increase in RA performance.

5.1.2. The RA Throughput

Figure 6 illustrates the RA throughput when the P R S is changed with V = 20 and N m a x = 8 . In addition, we compare the performance of the conventional case, which does not consider the capture effect of Msg3 (i.e., E [ S u , M v = 0 | N ] ) [4,5,9,14]. The RA throughput is clearly improved using the Msg3 PR scheme; particularly when heavy congestion occurs (i.e., N = 3 V = 60 ), the RA throughput for P R S = 1 dB, 2 dB, 3 dB, and 4 dB is improved by approximately 48 % , 80 % , 137 % , and 105 % , respectively, as compared to the conventional case. This is due to the fact that the capture effect may occur among the devices that suffer from collisions that reduce the RA throughput, and the Msg3 PR can increase the capture probability. Note that the increase in P R S does not necessarily lead to an increase in RA throughput, as previously mentioned. In particular, the RA throughput in the case of 4 dB is lower than that in the case of 3 d B because the RA success probability of 4 dB-case is lower, as seen in Figure 5. Therefore, it is important to choose a proper P R S value. For example, choosing P R S = 3 dB would be preferred in terms of the RA throughput.
Figure 7 illustrates the effect of changes in N m a x on the RA throughput when P R S = 2 dB and V = 20 . Comparing the RA throughputs in the cases when N m a x = 4 and N m a x = 8 , a throughput difference is observed when the number of accesses is large because, if the congestion level is not severe ( N 25 ), retransmissions are not likely to occur more than four times. Hence, there is no throughput difference between these two cases. However, if the congestion level becomes severe, the trial number of most devices will reach to N m a x due to severe collisions. Therefore, in this case, the probability of capture increases N m a x is larger. However, this observation does not apply to the N m a x = 12 case; the performance difference between the cases with N m a x = 8 and 12 is negligible. This is due to the following reasons: (1) most devices (except the devices near the eNB) could not increase their ramping number enough due to the ramping number limitation, K m a x , and (2) the devices near the eNB are often captured before the ramping number is significantly increased. As a result, if N m a x becomes sufficiently large, the overall throughput is no longer affected.
In Figure 8, we also show the RA throughput varying with the size of the preamble set, V, where P R S = 2 dB and N m a x = 8 . As analyzed in other studies [5,6,8,12] (or, the conventional case in shown Figure 6), the RA throughput is maximized when the number of accesses is the same as the preamble size, i.e., n = V . However, if the Msg3 PR is used, the number of throughput-maximizing arrivals increases significantly. This result further demonstrates that, because of the capture effect on the RA procedure, optimization is needed if diverse RACH congestion-control schemes, such as ACB or M2M-specific back-off, are used.

5.1.3. The Connection Failure Probability

Figure 9 presents the relationship between the P R S and the connection failure probability when V = 20 and N m a x = 8 . From Figure 9, we can see that, by increasing the number of accesses, the connection failure probability increases due to severe collisions. In the conventional case, almost 70 % of devices experience a connection failure when the number of arrivals surges ( N = 60 ). The Msg3 PR scheme reduces the connection failure probability significantly. For example, under heavy access load ( N = 60 ), the connection failure probability could be reduced by approximately 42 % when Msg3 PR with P R S = 3 dB is used, as compared with the conventional case. In addition, the connection failure probability of the 3 dB-case is lower than that of the 4 dB-case.

5.1.4. The Average Energy Consumption

Figure 10 presents the average energy consumption of the devices that completed the RA. We plot the performance when V = 20 and N m a x = 8 . The average energy consumption of the devices increases with increasing the number of accesses; this is because the RA success probability decreases due to the congestion. Since most energy consumption occurs during transmission, the Msg3 PR scheme consumes more energy than the conventioal case. However, increasing the P R S does not necessarily increase the energy consumption. Surprisingly, the Msg3 PR with P R S = 3 dB or 4 dB consumes less energy than the Msg3 PR with P R S = 1 dB or 2 dB. For example, the Msg3 PR consumes approximately 13 % more energy than the conventional case when P R S = 3 dB or 4 dB, while it consumes approximately 30 % more energy than the conventional case when P R S = 1 dB or P R S = 2 dB. From this observation, we can argue that the energy consumption reductions due to the increase in the RA success probability are greater than the increased energy consumption due to increased transmission power results from P R S increment. In conclusion, choosing proper values of P R S and N m a x for the Msg3 PR scheme can improve the RA throughput and lower the connection failure probability with relatively little additional energy consumption.

5.2. Coexistence with Other Schemes

Because the Msg3 PR scheme only controls the Msg3 transmission power, it can easily coexist with other RA-related schemes. In this sub-section, we discuss the possibility of coexistence of the Msg3 PR scheme with other typical RA-related schemes through simulation results.
The simulations assume bursts of M2M traffic. In [20], the M2M traffic arrival is modeled as a beta-distribution to express the burstiness of M2M traffic. Let g ( τ ) denote the probability that each device is activated at time τ . Then,
g ( τ ) = τ a 1 ( T A τ ) b 1 T A a + b 2 β ( a , b ) , 0 τ T A ,
where β ( a , b ) is the beta-function, T A is the activation time which denotes the period during which all devices are activated, and a = 3 , b = 4 for bursty-M2M traffic. In this simulation, 10,000 devices are uniformly distributed in a cell, and each device generates traffic only once. That is, when a device experiences connection failure/success, it does not participate in the RA again. The activation time, T A , is 10 s. Optimal ACB is assumed in this simulation, and the barring time and back-off window size are 200 ms and 20 ms, respectively.
Figure 11 illustrates the cumulative distribution function (CDF) of the RA results over time when the optimal ACB is used. The ACB scheme controls the number of participants, so that the efficiency of the RACH could be maximized. Therefore, if severe congestion is predicted, it protects the RACH efficiency by blocking accesses of devices, but it does not improve RA throughput itself. As seen in Figure 11, the number of connection failed-devices is increased due to bursty arrivals if only the ACB is used. However, when using the ACB with the Msg3 PR, the number of devices experiencing connection failure is much smaller than in the case of using the ACB only. Because the Msg3 PR scheme improves the RA throughput, approximately 20 % of devices (almost 2000 devices) are more successful in acquiring connections by using the Msg3 PR together. Furthermore, this performance is the result when the ACB is performed without considering the RA efficiency improvement due to the Msg3 PR scheme. Therefore, although it is not the scope of this study, a larger performance improvement can be expected if ACB optimization is performed considering Msg3 PR.

6. Conclusions

RACH congestion problems resulting from massive access by the M2M devices cause severe performance degradation on both the eNB and M2M devices—for example, wasting the uplink resources such as RACH and PUSCH, and increasing the connection failure probability hindering the M2M communications.
We conducted a study of the influence of the capture effect on the RA performance. It was observed that the RA performance could be improved when the Msg3 was captured by the eNB even if collision occurred. Because the capture effect could occur when the received signal powers were differentiated by the eNB, we proposed the Msg3 PR scheme that exploited the power ramping scheme to increase the capture probability.
A steady-state analysis model was provided to show the performance of the proposed scheme in terms of the RA throughput, the connection failure probability, and the average energy consumption. Numerical results of analysis and simulation results showed that the Msg3 PR scheme with proper parameters increases the RA throughput (and also increased the PUSCH efficiency), even under heavy access loads. Moreover, the proposed scheme reduced the connection failure probability, which disturbs the M2M communications, by slightly increasing the average energy consumption.
Moreover, by conducting additional simulation, we discussed the benefits of using the proposed scheme and the effects of coexistence with other RA-related technologies. The simulation results show that the proposed algorithm can be combined with other technologies to achieve a larger performance improvement. In future work, further optimization could be performed for RA-related technologies using the Msg3 PR scheme.

Acknowledgments

This work was supported by the ICT R&D program of MSIP/IITP, Korea (B0101-17-1276, Access Network Control Techniques for Various IoT Services).

Author Contributions

Jonghun Kim conceived of the study, proposed the idea and analysis model, designed the simulations, and wrote the paper; Jaiyong Lee participated in the coordination of the research, corrected the manuscript and searched for funding to support the work.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. 3GPP. Service Requirements for Machine-Type Communications. 3GPP TS 22.368 V13.1.0. Available online: http://www.3gpp.org/ftp/Specs/archive/22_series/22.368/22368-d10.zip (accessed on 20 September 2017).
  2. 3GPP. Study on RAN Improvements for Machine-Type Communications. 3GPP TR 37.868 V11.0.0. Available online: http://www.3gpp.org/ftp/Specs/archive/37_series/37.868/37868-b00.zip (accessed on 20 September 2017).
  3. Kim, J.; Lee, J.; Kim, J.; Yun, J. M2M Service Platforms: Survey, Issues, and Enabling Technologies. IEEE Commun. Surv. Tutor. 2014, 16, 142–149. [Google Scholar] [CrossRef]
  4. Duan, S.; Shah-Mansouri, V.; Wang, Z.; Wong, V.W. D-ACB: Adaptive Congestion Control Algorithm for Bursty M2M Traffic in LTE Networks. IEEE Trans. Veh. Technol. 2016, 65, 9847–9861. [Google Scholar] [CrossRef]
  5. Lien, S.-Y.; Liau, T.-H.; Kao, C.-Y.; Chen, K.-C. Cooperative access class barring for machine-to-machine communications. IEEE Trans. Wirel. Commun. 2012, 11, 27–32. [Google Scholar] [CrossRef]
  6. Wang, Z.; Wong, V.W.S. Optimal Access Class Barring for Stationary Machine Type Communication Devices with Timing Advance Information. IEEE Trans. Wirel. Commun. 2015, 14, 5374–5387. [Google Scholar] [CrossRef]
  7. Li, N.; Cao, C.; Wang, C. Dynamic Resource Allocation and Access Class Barring Scheme for Delay-Sensitive Devices in Machine to Machin (M2M) Communnications. Sensors 2017, 17, 1407. [Google Scholar] [CrossRef] [PubMed]
  8. Lee, K.D.; Kim, S.; Yi, B. Throughput comparison of random access methods for M2M service over LTE networks. In Proceedings of the 2011 IEEE GLOBECOM Workshops (GC Wkshps), Houston, TX, USA, 5–9 December 2011; pp. 373–377. [Google Scholar]
  9. Vilgelm, M.; Guersu, M.; Kellerer, W.; Reisslein, M. LATMAPA: Load-Adaptive Throughput-MAximizing Preamble Allocation for Prioritization in 5G Random Access. IEEE Access 2017, 5, 1103–1116. [Google Scholar] [CrossRef]
  10. Arouk, O.; Ksentini, A.; Taleb, T. Group Paging-Based Energy Saving for Massive MTC Accesses in LTE and Beyond Networks. IEEE J. Sel. Areas Commun. 2016, 34, 1086–1102. [Google Scholar] [CrossRef]
  11. Ho, C.Y.; Huang, C.Y. Energy-Saving Massive Access Control and Resource Allocation Schemes for M2M Communications in OFDMA Cellular Networks. IEEE Wirel. Commun. Lett. 2012, 1, 209–212. [Google Scholar] [CrossRef]
  12. Wei, C.H.; Bianchi, G.; Cheng, R.G. Modeling and Analysis of Random Access Channels with Bursty Arrivals in OFDMA Wireless Networks. IEEE Trans. Wirel. Commun. 2015, 14, 1940–1953. [Google Scholar] [CrossRef]
  13. Niyato, D.; Wang, P.; Kim, D.I. Performance Modeling and Analysis of Heterogeneous Machine Type Communications. IEEE Trans. Wirel. Commun. 2014, 13, 2836–2849. [Google Scholar] [CrossRef]
  14. Lin, G.Y.; Chang, S.R.; Wei, H.Y. Estimation and Adaptation for Bursty LTE Random Access. IEEE Trans. Veh. Technol. 2016, 1, 2560–2577. [Google Scholar] [CrossRef]
  15. Yue, W. The effect of capture on performance of multichannel slotted ALOHA systems. IEEE Trans. Commun. 1991, 39, 818–822. [Google Scholar] [CrossRef]
  16. Zanella, A.; Zorzi, M. Theoretical Analysis of the Capture Probability in Wireless Systems with Multiple Packet Reception Capabilities. IEEE Trans. Commun. 2012, 60, 1058–1071. [Google Scholar] [CrossRef]
  17. 3GPP. Medium Access Control (MAC) Protocol specification. 3GPP TS 36.321 V10.2.0. Available online: http://www.3gpp.org/ftp/Specs/archive/36_series/36.321/36321-a20.zip (accessed on 20 September 2017).
  18. 3GPP. Evolved Universal Terrestrial Radio Access (E-UTRA). 3GPP TS 36.213 V14.3.0; Physical Layer Procedures. Available online: http://www.3gpp.org/ftp/Specs/archive/36_series/36.213/36213-e30.zip (accessed on 20 September 2017).
  19. Song, L.; Shen, J. Evolved Cellular Network Planning and Optimization for UMTS and LTE; CRC Press: Boca Raton, FL, USA, 2010. [Google Scholar]
  20. ZTE. R2-104663: LTE: MTC LTE simulations. In Proceedings of the 3GPP TSG RAN WG2 Meeting #71, Madrid, Spain, 23 August 2010. [Google Scholar]
Figure 1. Definition of ’zone’.
Figure 1. Definition of ’zone’.
Sensors 17 02169 g001
Figure 2. Markov chain model of the devices. State < t , k > indicates that the devices with the trial number T u = t and Z u = k . Note that state transitions occur when (a) random acess (RA) failure, (b) RA success, and (c) connection failure occurs, respectively.
Figure 2. Markov chain model of the devices. State < t , k > indicates that the devices with the trial number T u = t and Z u = k . Note that state transitions occur when (a) random acess (RA) failure, (b) RA success, and (c) connection failure occurs, respectively.
Sensors 17 02169 g002
Figure 3. Summary for the iterative derivation of the steady state RA throughput.
Figure 3. Summary for the iterative derivation of the steady state RA throughput.
Sensors 17 02169 g003
Figure 4. The power consumption model for (a) single failed RA event (b) single successful RA event.
Figure 4. The power consumption model for (a) single failed RA event (b) single successful RA event.
Sensors 17 02169 g004
Figure 5. RA success probability according to the location of the device with N = 60 . i.e., P ( S u | N = 60 , X u = x ) .
Figure 5. RA success probability according to the location of the device with N = 60 . i.e., P ( S u | N = 60 , X u = x ) .
Sensors 17 02169 g005
Figure 6. Steady-state RA throughput in terms of power ramping steo ( P R S ).
Figure 6. Steady-state RA throughput in terms of power ramping steo ( P R S ).
Sensors 17 02169 g006
Figure 7. Steady-state RA throughput in terms of N m a x .
Figure 7. Steady-state RA throughput in terms of N m a x .
Sensors 17 02169 g007
Figure 8. Steady-state RA throughput in terms of V.
Figure 8. Steady-state RA throughput in terms of V.
Sensors 17 02169 g008
Figure 9. Connection failure probability ( N m a x = 8 , V = 20 ).
Figure 9. Connection failure probability ( N m a x = 8 , V = 20 ).
Sensors 17 02169 g009
Figure 10. Average energy consumption of devices that completed the RA procedure ( N m a x = 8 , V = 20 ).
Figure 10. Average energy consumption of devices that completed the RA procedure ( N m a x = 8 , V = 20 ).
Sensors 17 02169 g010
Figure 11. Cumulative distribution function (CDF) of RA results when optimal acess class barring (ACB) is used.
Figure 11. Cumulative distribution function (CDF) of RA results when optimal acess class barring (ACB) is used.
Sensors 17 02169 g011
Table 1. Notation summary.
Table 1. Notation summary.
NotationDescription
N / N a set of devices participate RA/the size of N
M v the number of devices that select preamble v among terminals excluding device u
V u a preamble selected by device u
T u the RA trial number of device u
R u the ramping number of device u
S u the event that device u succeeds in the RA procedure
P u ( P u r x ) transmission (received) power of (from) device u
K m a x ( x ) the maximum ramping number of a device located at a distance x from eNB
P R S Power ramping step
X u distance from eNB to device u
Z u the zone where device u belongs
N T = t k ( N R = r k ) a set of devices located within z o n e k with trial number t (with ramping number r)
δ ¯ F , k ( t ) δ ¯ S , k ( t ) the average energy consumption of device located within z o n e k with the trial number t, having
single failed (successful) RA events,
w S ( t , k ) w F ( k ) the energy consumption of the device that succeeded (failed) in the connection
Wthe energy consumption of device which is completed the RA procedure
Table 2. Simulation parameters.
Table 2. Simulation parameters.
NotationDefinitionValues
Parameters Relative to RA Procedure
Vthe number of preambles20, 40, 60
N m a x maximum number of RA trial4, 8, 12
X c e l l radius of single cell1500 m
X u The distribution of devicesuniform
Parameters Relative to Power Model
P I R T P Preamble initial receive target power−104 dBm
P C m a x Maximum transmit power23 dBm
P R S Power ramping step1, 2, 3, 4 dB
d e l t a offset value0 dBm
P L 0 reference path-olss127 dBm
x 0 reference point distance1500 m
α path-loss exponent2
Parameters Relative to Energy Consumption Model [10]
τ R A _ R E P periodicity of RACH5 ms
τ R A R processing delay2 ms
W R A R RAR window size5 ms
τ m s g 2 , τ m s g 4 requiring time for receiving Msg2/Msg41 ms
W c o n _ s o l size of Contention-resolution timer48 ms
P 1 power consumption when the device is waiting−37 dBm
P 2 power consumption when the device is receiving−22 dBm
Table 3. P ( S u | N = 60 , R u = r ) ( % ) .
Table 3. P ( S u | N = 60 , R u = r ) ( % ) .
Power ramping step (PRS) \ R u 12345678
1 dB4.94.94.99.813.315.820.028.4
2 dB4.94.912.021.336.659.181.895.7
3 dB4.914.026.350.681.297.699.999.9
4 dB4.915.345.082.798.999.999.999.9

Share and Cite

MDPI and ACS Style

Kim, J.; Lee, J. Exploiting the Capture Effect to Enhance RACH Performance in Cellular-Based M2M Communications. Sensors 2017, 17, 2169. https://doi.org/10.3390/s17102169

AMA Style

Kim J, Lee J. Exploiting the Capture Effect to Enhance RACH Performance in Cellular-Based M2M Communications. Sensors. 2017; 17(10):2169. https://doi.org/10.3390/s17102169

Chicago/Turabian Style

Kim, Jonghun, and Jaiyong Lee. 2017. "Exploiting the Capture Effect to Enhance RACH Performance in Cellular-Based M2M Communications" Sensors 17, no. 10: 2169. https://doi.org/10.3390/s17102169

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop