scholarly journals A Survey of Random Access Control Techniques for Machine-to-Machine Communications in LTE/LTE-A Networks

IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 74961-74983 ◽  
Author(s):  
Huda Althumali ◽  
Mohamed Othman
Author(s):  
O. S. Galinina ◽  
S. D. Andreev ◽  
A. M. Tyurlikov

Introduction: Machine-to-machine communication assumes data transmission from various wireless devices and attracts attention of cellular operators. In this regard, it is crucial to recognize and control overload situations when a large number of such devices access the network over a short time interval.Purpose:Analysis of the radio network overload at the initial network entry stage in a machine-to-machine communication system.Results: A system is considered that features multiple smart meters, which may report alarms and autonomously collect energy consumption information. An analytical approach is proposed to study the operation of a large number of devices in such a system as well as model the settings of the random-access protocol in a cellular network and overload control mechanisms with respect to the access success probability, network access latency, and device power consumption. A comparison between the obtained analytical results and simulation data is also offered. 


Electronics ◽  
2018 ◽  
Vol 8 (1) ◽  
pp. 27 ◽  
Author(s):  
Israel Leyva-Mayorga ◽  
Miguel Rodriguez-Hernandez ◽  
Vicent Pla ◽  
Jorge Martinez-Bauset

One of the three main use cases of the fifth generation of mobile networks (5G) is massive machine-type communications (mMTC). The latter refers to the highly synchronized accesses to the cellular base stations from a great number of wireless devices, as a product of the automated exchange of small amounts of data. Clearly, an efficient mMTC is required to support the Internet-of-Things (IoT). Nevertheless, the method to change from idle to connected mode, known as the random access procedure (RAP), of 4G has been directly inherited by 5G, at least, until the first phase of standardization. Research has demonstrated the RAP is inefficient to support mMTC, hence, access control schemes are needed to obtain an adequate performance. In this paper, we compare the benefits of using different filtering methods to configure an access control scheme included in the 5G standards: the access class barring (ACB), according to the intensity of access requests. These filtering methods are a key component of our proposed ACB configuration scheme, which can lead to more than a three-fold increase in the probability of successfully completing the random access procedure under the most typical network configuration and mMTC scenario.


2012 ◽  
Vol 16 (9) ◽  
pp. 1428-1431 ◽  
Author(s):  
Kab Seok Ko ◽  
Min Jeong Kim ◽  
Kuk Yeol Bae ◽  
Dan Keun Sung ◽  
Jae Heung Kim ◽  
...  

2007 ◽  
Vol 6 (7) ◽  
pp. 2741-2751 ◽  
Author(s):  
Jang-Won Lee ◽  
Mung Chiang ◽  
A.R. Calderbank
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document