Professional Documents
Culture Documents
Abstract—Machine-to-machine (M2M) wireless systems aim suppliers will generate incremental revenue exceeding $300
to provide ubiquitous connectivity between machine type com- billion in services [6]. This demonstrates the strong motivation
munication (MTC) devices without any human intervention. for cellular wireless technology providers to participate in this
Given the exponential growth of MTC traffic, it is of utmost
importance to ensure that future wireless standards are capable market [7]. On the other hand, the ubiquitousness of cellular
of handling this traffic. In this paper, we focus on the design of networks is a major incentive for M2M application developers
a very efficient massive access strategy for highly dense cellular to adopt cellular networks for their numerous applications [8].
arXiv:1602.05671v1 [cs.IT] 18 Feb 2016
networks with M2M communications. Several MTC devices are The latest cellular communication standard developed by
allowed to simultaneously transmit at the same resource block by the third generation partnership project (3GPP) is Long-Term
incorporating Raptor codes and superposition modulation. This
significantly reduces the access delay and improves the achievable Evolution (LTE), which provides a flexible communication
system throughput. A simple yet efficient random access strategy architecture to enable reliable communication at a lower cost
is proposed to only detect the selected preambles and the number per bit and to accommodate the continuous growth in wireless
of devices which have chosen them. No device identification is cellular demand [7]. However, LTE cellular networks, which
needed in the random access phase which significantly reduces are originally designed and engineered for human-to-human
the signalling overhead. The proposed scheme is analyzed and
the maximum number of MTC devices that can be supported in (H2H) communications, have been considered not suitable to
a resource block is characterized as a function of the message handle the unique characteristics of M2M applications [8].
length, number of available resources, and the number of Many M2M applications and device types share a set of key
preambles. Simulation results show that the proposed scheme attributes that have to be considered in the design of future
can effectively support a massive number of M2M devices for a wireless networks. These include, sporadic transmission of
limited number of available resources, when the message size is
small. small data bursts (only few kbs), massive number of devices,
and low power consumption to extend battery life. Moreover,
Index Terms—Internet of things, M2M communications, Rap- M2M devices and applications have diverse quality-of-service
tor codes, superposition modulation.
(QoS) requirements and traffic patterns [9]. For these reasons,
leading standardization bodies, such as 3GPP, have com-
I. I NTRODUCTION menced work on satisfying these and other constraints while
not sacrificing current cellular system usage for human-based
T HE ever increasing demand of industries to automate
their real-time monitoring and control processes and the
popularity of smart applications to improve our everyday life
applications [10]. For example, 3GPP has already specified
the general requirements for MTC applications and identified
will exponentially increase machine-to-machine (M2M) sys- issues and challenges related to them, and several network and
tem deployments in the near future [1]. M2M communications device modifications have been considered in the future release
aim to enable trillions of multi-role devices, namely machine- of LTE, referred to as LTE-Advanced (LTE-A) [11]. However,
type communication (MTC) devices, to communicate with a dramatic improvement in efficiency requires major changes
each other and the underlying data transport infrastructure to the air interface and core network [4].
with little or no human interaction [2, 3]. M2M communi- The random access channel (RACH) of LTE and LTE-A
cations have potentially diverse applications across different has been identified as a key area in which an improvement for
industries, including healthcare, the smart city market, logistic, MTC traffic is necessary [1]. In fact, the connection-oriented
manufacturing, process automation, energy, and utilities [4]. communication in the current LTE standard can induce ex-
This makes M2M communications one of the fastest-growing cessive signalling overhead in the case of transmitting small-
technologies in the field of telecommunications. According to sized data for M2M communications, especially when a large
an updated market forecast from ABI Research, the number of number of M2M devices attempt to access cellular networks
devices will more than double from the current level, with 40.9 at the same time [8]. Moreover, many M2M devices stay out
billion forecasted for 2020 [5]. Furthermore, Gartner estimates of connection to save energy except for communicating with
that the Internet of Things (IoT) will include 26 billion units the network and transmitting a small amount of signalling
installed by 2020, and by that time, IoT product and service data. Therefore, cellular networks should focus on how to deal
with a massive number of connection requests to initiate the
The material in this paper was submitted in part to IEEE International network connection before data transmission, rather than data
Symposium on Information Theory (ISIT), 2016.
M. Shirvanimoghaddam and Sarah. J. Johnson are with School traffic from numerous devices [12].
of Electrical Engineering and Computer Science, The University In the current LTE standard, the uplink channel is divided
of Newcastle, NSW, Australia (e-mail: {mahyar.shirvanimoghaddam; into two sub-channels, namely the physical random access
sarah.johnson}@newcastle.edu.au).
M. Dohler is with King’s College London, UK (email: mis- channel (PRACH) for preamble transmission and signalling
cha.dohler@kcl.au.uk). overhead and physical uplink shared channel (PUSCH) for
2
data transmission. Random access (RA) is the first step in selected the same preamble, and 3) minimize the resource
establishing an air interface connection to access the cellular wastage due to efficient usage of available resources. The
network, where multiple users/devices transmit random access proposed scheme contains two phases, the RA phase and
preambles in PRACH. In M2M communications, due to a mas- the data transmission phase. The devices do not need to be
sive number of MTC devices, a preamble is usually selected by identified by the BS in the RA phase; instead, the device ID is
more than one device, which are then allocated with the same sent along with its message in the data transmission phase and
PUSCH for the data transmission by the base station (BS). later is decoded by the BS. In the proposed scheme, collided
This is the first problem in RA for M2M communications devices are transmitting at the same data channel by using
which is called preamble collision on PRACH and results in the same Raptor code [21]. More specifically, a single degree
PUSCH wastage as the BS cannot decode any data packet distribution is used for Raptor codes in all the devices, which
due to the co-channel interference. The frequent preamble significantly simplifies the system design as the code is not
collisions in M2M communications also leads to network dependent on the number of devices or network condition. The
congestion, unexpected delays, packet loss, high energy con- BS will need to know only the number of active devices in a
sumption, high signaling overhead, and radio resource wastage data channel to perform the decoding and device identification.
[13]. The second problem is that even if each MTC device In fact, the received signal at the BS can be realized as a
selects a preamble without collision, there may not be enough superposition of coded symbols sent from the devices, which
resource blocks (RBs) to be allocated to the devices by the is then shown to be capacity approaching, when an appropriate
BS to the respective PUSCH [14]. successive interference cancellation (SIC) is used for the de-
The focus of existing studies on RA for M2M communi- coding. This is particularly suitable for M2M communications
cations is mostly limited to the first problem. In this vein with strict power limitations, especially when the data size is
and to reduce the access delay in M2M communications, very small and the number of devices is very large; thus, low
several overload control mechanisms have been proposed, rate Raptor codes in the low SNR regime can be effectively
including dynamic allocation [15, 16], slotted access, group- used for their data transmission. The maximum number of
based [2, 17], pull-based, and access class barring [18, 19]. M2M devices which can transmit at the same resource block
Moreover, the authors in [12] proposed a novel RA scheme, is then characterized as a function of the data size and the
where a cell coverage is spatially partitioned into multiple available bandwidth. The proposed scheme shows an excellent
group regions based on their delay and additional preambles performance in highly dense M2M networks, which makes it
can be provided by reducing the cyclic shift size in RA an excellent choice for future wireless technologies.
preambles. A further improvement on [12] can be achieved for The rest of the paper is organized as follows. Section II
fixed location MTC devices based on fixed timing alignment represent the system model. Section III represents the proposed
and prediction of the possible occurrences of collisions [20]. random access scheme. An overview on Raptor codes and the
A review of several RA overload control mechanisms can proposed data transmission strategy is presented in Section IV.
be found in [13]. Although these approaches can reduce the The rate performance analysis of the proposed scheme and the
access collisions to a certain degree, most of them still suffer weight coefficient design are studied in Section V. In Section
from very high access delays in highly dense networks. VI, we shed light on some of important practical issues of the
Unfortunately, only few studies have considered the second proposed scheme. Section VII shows the simulation results,
problem. More specifically, [14] proposed a new RA strategy followed by some concluding remarks in Section VIII.
by attaching the device ID to the preamble sent by the MTC
device, enabling the BS to detect the collision in the the RA II. S YSTEM M ODEL
process. Moreover, the device’s message is sent as part of We consider a single-cell centered by a BS in a cellular
the scheduled message in the RA phase of the LTE standard, wireless network, where M2M and H2H devices coexist and
which reduces the signalling overhead. A Hybrid RA and share radio resources. The number of M2M devices is assumed
data transmission protocol has also been proposed in [8], to be far greater than that of H2H devices. Similar to the LTE
where the available resources are dynamically allocated for system, we consider the uplink of an orthogonal frequency
the PRACH and PUSCH according to the periodic estimation division multiple access (OFDMA) system, where the radio
of the number of active M2M devices by the BS. Although, resources are divided into units of resource blocks (RBs), each
the proposed approach can reduce the signalling overhead, with time duration τs and bandwidth Ws . The time is divided
which is suitable for M2M applications with small data sizes, into time frames of length Tf , where the number of active M2M
it cannot solve the preamble collision problem when a massive devices in each time frame is random and follows a Poisson
number of devices are attempting to access the network. process with rate λ [22]. Fig. 1 shows the time-frequency
In this paper, we propose a novel RA strategy for M2M model of the uplink radio resource for M2M communications.
communications which provides major improvements in terms We also consider a contention-based random access strategy
of access delay and QoS, by shifting from conventional iden- in M2M communications, where Ns different random access
tification/authentication based RA strategies. The proposed preambles are selected in a random access attempt [13]. The
strategy aims to 1) minimize the access delay by enabling notation used in this paper is also summarized in Table I for
the collided devices to transmit at the same data channel, quick reference.
consisting of several RBs, 2) minimize the signalling overhead We assume that the radio resources for M2M and H2H
by signaling once for each group of devices which have communications are separately managed. The radio resource
3
Resource block for M2M PRACH A set of RBs for a preamble TABLE I
Resource block for H2H PRACH
Resource block for M2M PUSCH A data channel
N OTATION S UMMARY
Resource block for H2H PUSCH Time
Notation Description
Ws Total bandwidth of an RB in Hz
τs The duration of an RB
Tf Time frame duration
Frequency
T1 = 0
Inactive MTC device
have selected each preamble and been received with the same Active MTC device
Base station
delay at the BS. P1,1
than or equal to τ = 8Ts . Furthermore, the propagation delays Y = n(i, j)Pi,j + Z, (1)
i=1 j=1
of MTC devices to the BS are quantized and take values of
multiple of τ . Therefore, the propagation delay is modelled by where Z is additive white Gaussian noise (AWGN) with zero
an index taking values from 0 to Nt , where Nt is the maximum mean and variance σz2 . The BS then calculates the cross-
timing index which is determined by the cell coverage radius, correlation between the received signal Y and each preamble
R. More specifically, Nt = dR/(cτ )e, where c = 3 × 108 m/s is with different timing indexes. Unlike the preamble detection
the light speed and d.e is the ceil operator. The cell coverage strategy in the LTE standard that only one timing advance is
area can then be virtually partitioned into multiple regions, detected for multiple copies of each preamble received by the
where the devices in each region have the same timing index. BS, the BS in the proposed scheme can detect all the timing
That is an MTC device at distance r from the BS belongs to indexes of all the copies of each preamble, thanks to the same
the `th timing group if (` − 1)τ < r/c < `τ . Each MTC device received power from all the devices at the BS. Algorithm
determines its own group based on its distance information 1 shows the steps of the proposed iterative load estimation
between the BS and itself, which can be obtained by several strategy at the BS.
distance estimation algorithms [12]. Thus, we assume that each
MTC device knows its own timing index. Fig. 2 shows this Algorithm 1 Load Estimation Algorithm
cell partitioning based on timing indexes. 1: Initialize n̂ = 0
As shown in Fig. 2, the transmitted preambles by MTC 2: while ||Y ||22 > γth do
devices are received with different delays (i.e., timing indexes) 3: for i ∈ {1, · · · , Nt } do
due to different propagation distances from MTC devices 4: for j ∈ {1, · · · , Ns } do
if | N
P ZC
to the BS. In LTE, the BS determines the presence of any 5: n=0 Y [n]Pj,i [n]| > γth then
preamble by calculating the discrete cross correlation of the 6: n̂(i, j) + +,
received signal with each of the Ns preambles. 7: Y = Y − Pj,i ,
The Zadoff-Chu (ZC) sequences are used to generate RA 8: end if
preambles which are defined as zr [n] = exp[−jπrn(n + 1)/NZC ] 9: end for
for n = 0, · · · , NZC − 1, where NZC is the sequence length and 10: end for
r ∈ {1, · · · , NZC − 1} is the root index [12]. The magnitude 11: end while
of the cyclic correlation of each ZC sequence with itself It is important to note that γth in Algorithm 1 can be
is a delta function, i.e., crr [σ] = | N ∗
P ZC
n=0 zr [n]z [n + σ]| = changed and optimized for different loads. Fig. 3 shows the
NZC δ[σ], where (.)∗ denotes the complex conjugate. Using estimation accuracy of the proposed scheme under different
this property, we can determine by how much the received loads. Here, the estimation accuracy is defined as the dif-
sequence is shifted. Multiple RA preambles are then generated ference between the estimated and actual number of devices
from the ZC sequence by cyclically shifting the sequence divided by the actual number of devices. As can be seen
by a factor of NSC , which is determined by the system in this figure the proposed approach can accurately estimate
parameters. The ith preamble can be generated as zr,i [n] = zr [ the total number of devices from the preambles sent over
mod (n + iNCS , NZC )]. More details on the ZC sequences and the PRACH. The design and adjusting the parameters of the
their design parameters in LTE can be found in [27–29]. proposed algorithm can be done in such a way to maximize
Now, we explain the proposed load estimation algorithm the accuracy of the estimation. This is however beyond the
based on timing advance and different power levels of received scope of the paper. In the rest of the paper, we assume that
preambles. Let n(i, j) denote the number of devices belong to the BS always detects the preambles and accurately determines
the j th timing group that have selected the ith preamble. We the number of devices which have selected each preamble and
denote by Pi,j the ith received preamble at the BS which is have the same timing index.
sent by the device in the j th timing group. This preamble is It worth noting that a similar algorithm is used in the current
shifted by (j − 1)τ due to the propagation delay of the j th LTE standard to only detect each preamble. As several devices
group. The received signal at the BS at the end of the first might have chosen each preamble the discrete cross correlation
5
1 ti
N=20
N=100
N=300
0.8 N=500
b(i) C ci BPSK xi
di
wi
Estimation accuracy
0.6 Fig. 4. Encoder structure at the ith MTC device with Raptor component
code C. ti is an i.i.d. random binary sequence and wi is the weight coefficient
selected by the ith device.
0.4
CHANNEL ADAPTER
i.i.d. source L
1 − 2 × (.)
tL ... ...
i.i.d. source 1
t1
1 − 2 × (.)
w1
u1 v1 ĉ1
b(1) C c1 d1
BPSK
APP DEC
w1
... ... Σ x y ... dˆ1
Σ ...
...
wL dˆL−1
b(L) C BPSK z APP
uL vL
DEC
ĉL
cL dL wL
AWGN
ENCODER DECODER
Fig. 5. Encoder and decoder structure of the proposed code with Raptor component codes.
the channel adaptors at the devices are shared with the BS in It is important to note that by using i.i.d. channel adapters,
the RA phase through the RAR message or at the beginning of we can force the symmetry of the equivalent binary-input
the data transmission phase. This will be discussed in Section component channels [33]. Generally, a binary input channel
VI. The details of the weight coefficient design will also be is symmetric if [33]
discussed in the next section.
p(Y = y|C = 0) = p(Y = −y|C = 1)
which is valid since we assume that the equivalent SNR for 2) Exponential Weight Selection: In the exponential weight
all layers is very small. By using (8), (10) can be rewritten as (ExW) selection strategy, the weight coefficients are designed
follows: in such a way that the effective SNR at the BS for each device
L
X wi2 is the same.
I(C1 , · · · , CL ; Y ) = log2 1 + P
Lemma 1: Let L denote the number of active MTC devices
L 2 2
i=1 j=i+1 wj + σz
PL and γ0 denote the target effective SNR at the BS for every
L 2 2
Y j=i wj + σz MTC device. Then, the overall received SNR at the BS is
= log2 PL
2 2 given by:
i=1 j=i+1 wj + σz
L
P
2 2
j=1 wj + σz γ = (1 + γ0 )L − 1, (20)
= log2 = log2 (1 + γ) , (12)
σz2
and the optimal weight coefficients can be calculated as
which can be further simplified according to (11): follows, for i = 0, · · · , L − 1:
L
γ
X r
log2 (1 + γ) = log2 (1 + γi ). (13) ∗
wL−i = (1 + γ0 )i 0 . (21)
i=1 γ
As we assume that the devices continue their transmission Proof: Since the weight coefficients are designed such
over all the allocated RBs, i.e., the BS does not send acknowl- that the effective SNR of each equivalent BI-AWGN channel
edgement to each individual device upon successful decoding is γ0 , according to (13) we have:
of each stage, the achievable rate for each device is upper
bounded by the rate of the device with the minimum effective L log2 (1 + γ0 ) = log2 (1 + γ), (22)
SNR. Let Ri denote the effective rate of each device, then we
have: which directly results in (20). Also from (8), it is clear that
for the Lth layer, we have wL 2 = γ /γ , which proves (21) for
0
Ri ≤ log2 (1 + γmin ), (14) i = 0. We assume that (21) holds for i = 0, · · · , j for j ≥ 0, we
where γmin = mini {γi } and Rmin , log2 (1 + γmin ). then show that it also holds for j + 1. As we assume that the
Let k denote the message length of each MTC device, effective SNR for all layers is γ0 , then for layer L − j − 1 we
including the device ID. The number of RBs required for the have:
successful transmission of the message can be calculated as 2
wL−j−1 2
wL−j−1
follows: γ0 = P
L
= Pj
k
i=L−j iw2 + σ 2
z
2 2
i=0 wL−i + σz
V ≥ . (15) 2
τs Ws Rmin wL−j−1
= Pj
The RB load, defined as the average number of devices per i γ0 2
i=0 (1 + γ0 ) γ + σz
RB, can be easily obtained as V /N . 2
γwL−j−1
= ,
B. Designing the Weight Coefficients (1 + γ0 )j+1
As can be seen in (13), the effective rate for each device which is equivalent to (21) for j + 1. This completes the proof.
is characterized by the weight coefficients. In this section,
we propose three weight coefficient designs and discuss their In this scheme, the devices randomly select the weight coef-
respective rate performances. ficients from the set of optimal weight coefficients. Therefore,
1) Equal Weight Selection: In the equal weight (EqW) it is highly probable that more than one device will select the
selection strategy, all the devices select the same weight same weight coefficient. Let ri denote the number of devices
coefficient. Let w denote the weight coefficient selected by which have selected the weight coefficient wi∗ . It is clear that
all devices, then, it can be calculated as follows: PL ∗ Pj−1 Pj
i=1 ri = L and wi = wj for 1 + n ≤ i ≤
`=1 `
n .
`=1 `
1 According to (8), it is easy to verify that γi < γj for every
w= √ , (16) Pj−1 Pj
L i < j where 1 + `=1 n` ≤ i, j ≤ `=1 n` . This is because
which is due to the fact that the overall received signal power
at the BS is assumed to be 1. The effective SNR of the ith wi2 wi∗2
γi = P = P
device can then be calculated as follows: L 2 2 L 2 2
j=i+1 wj + σz j=i+1 wj + σz
w2 1 wj2
γi = = , (17)
(L − i)w2 + σz2 L − i + Lσz2 < P
L 2 2
= γj , (23)
`=j+1 w` + σz
and the minimum SNR for MTC devices is given by
1 which is valid when i < j . Accordingly, the minimum effective
γmin = . (18)
L − 1 + Lσz2 SNR for MTC devices can be calculated as follows:
The maximum achievable rate for MTC devices is then upper wi∗2
bounded by the rate of the device with the minimum SNR. It γmin = min
∗2 PL ∗2 2
. (24)
{i:ri 6=0} (ri − 1)w
i + j=i+1 rj wj + σz
can be characterized as follows:
(EqW) 1 In the following, we find the probability distribution
Rmin = log2 1+ . (19)
L − 1 + Lσz2 function (pdf) of γmin . For this aim, we define ξi =
8
w∗2
Pi for i ∈ {i : ri 6= 0}; otherwise it
(ri −1)wi∗2 + L ∗2 2
j=i+1 rj wj +σz
0.2
is set to ∞. Then according to Lemma 1 and (21), we have:
N=10000
L
1 1
rj (1 + γ0 )i−j + (1 + γ0 )i−L .
X
= (ri − 1) + 0.15
ξi γ0
Probability
j=i+1
Since the devices randomly choose from the L available weight 0.1 N=1000
1 1 Fig. 7. Average minimum achievable rate of MTC devices versus the number
Fγ (x|L) = p(γmin < x) = p(min ξi < x) = p(max > ) of devices for different target SNRs at the BS. Solid lines shows the simulation
i i ξi x results and dashed lines show the approximated pdf using (26).
1 1 1 1 1 1
= 1 − p(max < ) = 1 − p( < ,··· , < )
i ξi x ξ1 x ξL x by shifting the mean value by about 3%, which is in a close
L agreement with the simulation results.
Y 1 1
=1− p( < )
i=1
ξi x Fig. 7 shows the minimum achievable rate for MTC de-
L 1 −m
!!! vices versus the number of devices. As can be seen in this
Y
x i
=1− p0 + (1 − p0 ) 1 − Q p , (26) figure, with increasing the number of devices, the minimum
Si
i=1 achievable rate gets closer to the designed rate. Moreover,
where Q(x) = √1 x∞ exp −u2 /2 du. As L follows a Poisson
R
with decreasing the target SNR at the BS, the minimum
2π achievable rate gets closer to the desired rate. This is because,
distribution with mean λ, the complete cdf of γmin is calculated
as follows: according to Lemma (1), with decreasing total SNR at the BS,
the effective target SNR per device, γ0 , is decreased. More
λj
e−λ coefficients for the ith and
X
Fγ (x) = Fγ (x|L). (27) specifically, the ratio of weight q
j! th
j j device, which is given by (1 + γ0 )i−j , gets closer to
The pdf of γmin is simply the derivative of Fγ (x). 1. This leads to less rate loss as the weight coefficients are
Fig. 6 shows the histogram of the minimum SNR divided now close to each another. It is also important to note that
by the target effective SNR, γ0 , when the total SNR at the BS the approximation of the average minimum achievable rate
is γ = 20 dB. As can be seen in this figure, with increasing the using (26) shows excellent agreement with simulation results,
number of devices, and accordingly the number of available especially when the number of devices is relatively large.
weight coefficients, the probability that the minimum SNR is 3) Grouped Weight Selection: Let us assume that the BS
closer to γ0 is increased. This is because by increasing the can determine the number of devices which have a particular
number of devices, the probability that the devices choose timing advance and have selected a particular preamble. This
separate weight coefficients is increased, which accordingly way the devices can be partitioned into Nst = Ns × Nt different
leads to a higher minimum achievable rate. It is important to groups, where the devices in each group have the same timing
note that the proposed approximation of the pdf shows around index and have selected the same preamble. The devices
1% to 5% mismatch in the mean value to the simulated pdf. in each group are then assumed to have the same weight
This figure also shows the approximation of the pdf of γmin coefficient. We refer to this strategy as the group weight
9
103
(GrW) selection strategy. The weight coefficients are then GrW, γ0 = -10 dB
designed in such a way that the minimum effective SNR ExW, γ0 = -10 dB
for the devices is maximized. Let ri denote the number of 10
2
GrW, γ0 = -20 dB
ri wi2 = 1,
X
s.t. (i)
i=1
10-2
(ii) 0 ≤ wi ≤ 1, for i = 1, · · · , Nst , 100 101 102 103
Arrival Rate (λ)
Fig. 8. Average throughput per RBs for the proposed scheme with different
where we assume that the BS always starts the decoding weighting strategies without adaptive power management at the devices. The
from the group with the largest weight coefficient. To further message length of MTC devices is k = 1024, Ns = Nt = 20, Ws = 1
MHz, and τs = 1 ms. Solid and dashed lines show simulation and analytical
simplify the design of the weight coefficients, we define a results, respectively.
target minimum SNR γ0 , and determine the weight coefficients
such that the minimum device SNR is at least γ0 . For this C. Comparison Between Weight Selection Strategies
aim, we find the weight coefficients such that the effective Fig. 8 shows the RB load versus the number of devices
SNR of the first device of each group is at least γ0 . This is for different target SNR values at the BS. Fig. 8 shows the
because the first device of each group has the lowest effective average throughput per RB for the proposed scheme with
SNR amongst other devices in the group, which can be easily different weighting strategies. The analytical results are also
proven by using the same strategy as in (23). Therefore, for plotted in Fig. 8 which show a good match with the simulation
the first device of the ith group, we have: results. As can be seen in this figure, the grouped based weight
wi2 selection can accommodate more devices per RB compared to
γi = PNst = γ0 . (28) the exponential weight selection strategy. This is because of
(ri − 1)wi2 + 2 2
j=i+1 rj wj + σz
non-ideal weight selection in the ExW scheme, which reduces
For i = Nst , we have: γmin and accordingly the minimum achievable rate per MTC
2
wN
device decreases. However, in the GrW scheme, the weight
st
γ0 = 2
, (29) coefficients are designed to maximize the lowest effective
(rNst − 1)wN + σz2
st SNR, which can significantly increase the achievable rate per
th group, i.e., w
and the weight coefficient for the Nst Nst , can
MTC device, especially in higher loads.
be calculated as follows: Moreover, as can be seen in Fig. 8, with increasing the ar-
γ 1
rival rate the number of MTC devices which can be supported
2
wN = 0 . (30) by each RB is linearly increasing. This is due to the fact that
st γ 1 − γ0 (rNst − 1)
the weight selection strategies are designed in such a way that
The weight coefficient for the ith group can then be calculated the minimum received SNR per device remains constant at the
as follows: BS. Thus, by increasing the number of devices the minimum
Nst
γ (1 + γ0 )Nst −i Y 1
achievable rate remains constant, therefore the BS can support
wi2 = 0 . (31) a larger number of devices per RB.
γ 1 − γ0 (r` − 1)
`=i
As we assume that the total receive power at the BS is 1, then VI. P RACTICAL C ONSIDERATIONS
we have:
A. Overhead due to the Weight Selection in the Data Trans-
Nst
mission Phase
ri wi2 = 1,
X
(32)
i=1 In the data transmission phase, the devices should select the
and by substituting (31), we have: weight coefficients and the BS must know which weights are
selected and how many devices have selected the same weight.
N
Xst
ri (1 + γ0 )Nst −i The devices then need to inform the BS of their selected
γ = γ0 . (33)
i=1
N
Yst weight coefficients. For this aim, we assume that devices
[1 − γ0 (ri − 1)] randomly select a weight coefficient among N coefficients and
`=i send the index of the weight to the BS. This can be done by
It is clear from (33) that for a given γ0 , the order of the sending a binary sequence of an appropriate length to the BS.
number of devices in each group affects the total received The selected sequences should be orthogonal, so the BS can
SNR at the BS. The BS then performs an optimization to find detect them. The information about these orthogonal sequences
the optimal order of the weight coefficients to maximize the can be sent via the RAR message. Then a similar strategy as
average received SNR at the BS. For simplicity, we assume Algorithm 1 can be performed to detect the sequences and
that ri ≥ rj for i > j . estimate the number of devices which have selected the same
10
0.25
γ0 = -20 dB all the layers. In the next section, we show that even with this
0.2
imperfect rate efficiencies, the proposed scheme significantly
Probability
0.15
outperforms the existing massive access strategies for M2M
0.1
0.05
communications in terms of throughput and access delay. In
0
fact the superiority of the proposed code over existing schemes
0.65 0.7 0.75 0.8 0.85
Rate efficiency (η)
0.9 0.95 1
comes from the simultaneous multiple device transmission
0.25
γ0 =-10 dB
over the same data channel, which significantly reduces the
0.2
access delay and resource wastage.
Probability
0.15
0.1
C. Adaptive Power Management at MTC Devices
0.05
3
10 10
GrW
7 102
5
ACB only [34]
4 ACB with timing advance info [26]
101
Proposed Scheme, GrW, γmax=30 dB
3
Proposed Scheme, ExW, γmax=30 dB
2
Proposed scheme, GrW, γmax=10 dB
1 Proposed scheme, ExW, γmax=10 dB
100
100
1 2
0 10 10 103 104 105
100 101 102 103
Arrival rate (λ) Arrival rate (λ)
Fig. 10. Average throughput per RBs for the proposed scheme with different Fig. 11. Average number of MTC devices that can be supported in each
weighting strategies with adaptive power management at the devices. The time frame for different massive access strategies. The message length of
message length of MTC devices is k = 1024, Ns = Nt = 20, Ws = 1 MTC devices is k = 1024, Ns = 64, Nt = 20, Ws = 1 MHz, and τs = 1
MHz, and τs = 1 ms. The maximum received SNR at the BS is γmax = 30 ms.
dB. Solid and dashed lines show simulation and analytical results, respectively.
50
Fig. 10 shows the average throughput per RB when a power ACB with timing advance info [26]
45 ACB only [34]
adaptation strategy is used at the MTC devices such that the Proposed scheme, ExW, γmax =30 dB
40 Proposed scheme, GrW, γ =30 dB
maximum received SNR at the BS is 30 dB. As can be seen max
Proposed scheme, GrW, γmax =10 dB
in this figure in high load cases each RB can support up to 35 Proposed scheme, ExW, γmax =10 dB
strategies, respectively. 25
these timing advances and includes it in the RAR message. Fig. 12. Average delay versus arrival rate. The message length of MTC
If only one of the MTC devices, which have chosen the same devices is k = 1024, Ns = 64, Nt = 20, Ws = 1 MHz, and τs = 1 ms.
preamble, has the selected timing advance, then it can send its
MTC devices within each time frame. The proposed scheme
message without collision. This scheme can slightly improve
significantly outperforms the ACB schemes by supporting up
the random access efficiency, but is still limited by the number
to 200 and 500 MTC devices when the maximum SNR at the
of preambles, as the devices cannot simultaneously transmit at
BS is 10 dB and 30 dB, respectively.
the same RB. In the ACB scheme, a parameter called ACB
parameter, is broadcasted by the BS to inform the devices Fig. 12 shows the average delay versus the arrival rate for
to transmit with a certain probability. Let p denote the ACB different massive access strategies. As can be seen in this
parameter, then an MTC device which has data to transmit figure the proposed scheme can support a significantly larger
will draw a random number in the range [0, 1], and participate number of devices with almost zero delay compared to ACB
in the random access procedure only if the random number schemes. It is important to note that in the ACB scheme, we
is less than p. The optimal value for p for the original ACB assume that a device can successfully deliver its message to the
scheme [34] is p = min{1, N/Ns } and n that for the ACB BS in its corresponding data channel, when it has successfully
o with
timing advance information [26] is p = 1, 1.17N s ln(ρ)
, where completed the RA phase; thus, the only limiting factor for the
N (ρ−1)
4d(R−d) ACB scheme is the preamble collision in the RA phase. In
ρ=
R2
. ACB and to accommodate more devices in given number of
Similar to [26], we assume that the cell has radius R = 1.5 RBs, each device should be allocated only few number of RBs
km, τ = 0.26 µs, and d = cτ = 75 m. This results in Ns = 20 and transmit at high power to guarantee that its message can
different timing groups. Without loss of generality, we assume be decoded. On the other hand in the proposed scheme, RBs
that each RB carries exactly kr symbols, where kr ≥ k, which are shared among all the devices and they are transmitting
means that in the ACB scheme, each device which has been at minimum power over relatively large number of RBs. As
granted access to the BS, will be allocated one RB. Fig. the devices will only perform random access once in the
11 shows the average number of MTC devices which can proposed scheme and also according to Fig. 11 where a larger
be supported by different massive access techniques when number of MTC devices can be supported in each RB in the
100 RBs are allocated for M2M communications in the data proposed scheme with lower transmission power, we can claim
transmission phase. As can be seen in this figure the ACB that the proposed scheme will significantly improve energy
scheme [34] can support at most 25 MTC devices while the efficiency in M2M communications compared to existing ACB
ACB with timing advance information can support up to 55 approaches.
12
VIII. C ONCLUSIONS [13] M. Hasan, E. Hossain, and D. Niyato, “Random access for machine-
to-machine communication in LTE-advanced networks: issues and ap-
In this paper, we designed an effective massive access proaches,” IEEE Commun. Mag., vol. 51, no. 6, pp. 86–93, 2013.
strategy for highly dense cellular networks with M2M com- [14] N. Zhang, G. Kang, J. Wang, Y. Guo, and F. Labeau, “Resource
allocation in a new random access for M2M communications,” IEEE
munications, where several MTC devices are able to simulta- Commun. Lett., vol. 19, no. 5, pp. 843–846, May. 2015.
neously transmit in the same resource block by incorporating
[15] A. Lo, Y. W. Law, M. Jacobsson, and M. Kucharzak, “Enhanced LTE-
Raptor codes and superposition modulations. This significantly advanced random-access mechanism for massive machine-to-machine
reduces the access delay and access blockage probability, (M2M) communications,” in 27th Wireless World Research Forum
which are the main burden in current proposals for random (WWRF27), 2011.
[16] S. Choi, W. Lee, D. Kim, K.-J. Park, S. Choi, and K.-Y. Han, “Automatic
access management in M2M communications. A simple yet configuration of random access channel parameters in LTE systems,” in
efficient random access strategy was proposed to only detect 2011 IFIP Wireless Days (WD).
the selected preambles and the number of devices which have [17] C.-Y. Tu, C.-Y. Ho, and C.-Y. Huang, “Energy-efficient algorithms and
evaluations for massive access management in cellular based machine
chosen them. The proposed scheme was analyzed and the to machine communications,” in IEEE Vehicular Technology Conference
maximum number of MTC devices that can be supported in (VTC Fall), 2011.
a resource block was also characterized as a function of the [18] J.-P. Cheng, C.-H. Lee, and T.-M. Lin, “Prioritized random access with
dynamic access barring for RAN overload in 3GPP LTE-A networks,” in
message length, number of available resources, and the number Proc. IEEE GLOBECOM Workshops (GC Wkshps), 2011, pp. 368–372.
of preambles. Simulation results showed that the proposed [19] S.-Y. Lien, T.-H. Liau, C.-Y. Kao, and K.-C. Chen, “Cooperative access
scheme can effectively support a massive number of M2M class barring for machine-to-machine communications,” IEEE Trans.
Wireless Commun., vol. 11, no. 1, pp. 27–32, 2012.
devices for a limited number of available resources, when the [20] K. S. Ko, M. J. Kim, K. Y. Bae, D. K. Sung, J. H. Kim, and J. Y.
message size is small. Ahn, “A novel random access for fixed-location machine-to-machine
communications in OFDMA based systems,” IEEE Commun. Lett.,
vol. 16, no. 9, pp. 1428–1431, September 2012.
R EFERENCES [21] A. Shokrollahi, “Raptor codes,” IEEE Trans. Inf. Theory, vol. 52, no. 6,
[1] K. Zheng, S. Ou, J. Alonso-Zarate, M. Dohler, F. Liu, and H. Zhu, pp. 2551 –2567, Jun. 2006.
“Challenges of massive access in highly dense LTE-Advanced networks [22] H. S. Dhillon, H. C. Huang, H. Viswanathan, and R. A. Valenzuela,
with machine-to-machine communications,” IEEE Wireless Commun. “Fundamentals of throughput maximization with random arrivals for
Mag., vol. 21, no. 3, pp. 12–18, Jun. 2014. M2M communications,” IEEE Trans. Commun., vol. 62, no. 11, pp.
[2] S.-Y. Lien, K.-C. Chen, and Y. Lin, “Toward ubiquitous massive accesses 4094–4109, Nov. 2014.
in 3GPP machine-to-machine communications,” IEEE Commun. Mag., [23] D. Niyato, P. Wang, and D. I. Kim, “Performance modeling and analysis
vol. 49, no. 4, pp. 66–74, 2011. of heterogeneous machine type communications,” IEEE Trans. Wireless
[3] G. Wu, S. Talwar, K. Johnsson, N. Himayat, and K. Johnson, “M2M: Commun., vol. 13, no. 5, pp. 2836–2849, May 2014.
From mobile to embedded internet,” IEEE Commun. Mag., vol. 49, no. 4, [24] H. Moon, “Optimum power allocation for preamble detection with
pp. 36–43, 2011. channel-adaptive random access,” IEEE Trans. Wireless Commun.,
[4] H. Shariatmadari, R. Ratasuk, S. Iraji, A. Laya, T. Taleb, R. Jantti, and vol. 12, no. 11, pp. 5424–5433, Nov. 2013.
A. Ghosh, “Machine-type communications: Current status and future [25] R. Louie, W. Hardjawana, Y. Li, and B. Vucetic, “Distributed multiple-
perspectives toward 5G systems,” IEEE Commun. Mag., vol. 53, no. 9, access for wireless communications: Compressed sensing with multiple
pp. 10–17, Sep. 2015. antennas,” in IEEE Global Communications Conference (GLOBECOM),
[5] ABI Research. (2014) The Internet of Things will Dec. 2012, pp. 3622–3627.
drive wireless connected devices to 40.9 billion in [26] Z. Wang and V. Wong, “Optimal access class barring for stationary
2020. [Online]. Available: https://www.abiresearch.com/press/ machine type communication devices with timing advance information,”
the-internet-of-things-will-drive-wireless-connect/ IEEE Trans. Wireless Commun., vol. 14, no. 10, pp. 5374–5387, Oct.
[6] Gartner, Inc. (2014) Gartner says the internet of things will transform 2015.
the data center. [Online]. Available: http://www.gartner.com/newsroom/ [27] D. Chu, “Polyphase codes with good periodic correlation properties
id/2684616 (corresp.),” IEEE Trans. Inf. Theory, vol. 18, no. 4, pp. 531–532, Jul.
[7] G. Naddafzadeh-Shirazi, L. Lampe, G. Vos, and S. Bennett, “Coverage 1972.
enhancement techniques for machine-to-machine communications over [28] R. L. Frank, “Polyphase codes with good nonperiodic correlation
LTE,” IEEE Commun. Mag., vol. 53, no. 7, pp. 192–200, Jul. 2015. properties,” IEEE Trans. Inf. Theory, vol. 9, no. 1, pp. 43–45, Jan. 1963.
[8] D. Wiriaatmadja and K. W. Choi, “Hybrid random access and data trans- [29] “LTE; Evolved Universal Terrestial Radio Access (E-UTRA); Physical
mission protocol for machine-to-machine communications in cellular layer procedures,” Technical Specification 3GPP TS 36.213 V.12.5.0,
networks,” IEEE Trans. Wireless Commun., vol. 14, no. 1, pp. 33–46, Apr. 2015.
Jan. 2015. [30] M. Luby, “LT codes,” in Proc. 43rd Annual IEEE Symp. Foundations
[9] M. Shirvanimoghaddam, Y. Li, M. Dohler, B. Vucetic, and S. Feng, Comput. Science, Nov. 2002, pp. 271 – 280.
“Probabilistic rateless multiple access for machine-to-machine commu- [31] O. Etesami and A. Shokrollahi, “Raptor codes on binary memoryless
nication,” IEEE Trans. Wireless Commun., vol. 14, no. 12, pp. 6815– symmetric channels,” IEEE Trans. Inf. Theory, vol. 52, no. 5, pp. 2033
6826, Dec. 2015. – 2051, May. 2006.
[10] K. Zheng, S. Ou, J. Alonso-Zarate, M. Dohler, F. Liu, and H. Zhu, [32] M. Shirvanimoghaddam and S. J. Johnson, “Raptor codes in the low
“Challenges of massive access in highly dense LTE-advanced networks SNR regime,” CoRR, vol. abs/1510.08183, 2015. [Online]. Available:
with machine-to-machine communications,” IEEE Wireless Commun. http://arxiv.org/abs/1510.08183
Mag., vol. 21, no. 3, pp. 12–18, Jun. 2014. [33] J. Hou, P. Siegel, L. Milstein, and H. Pfister, “Capacity-approaching
[11] “Third Generation Partnership program (3GPP): Service Requirements bandwidth-efficient coded modulation schemes based on low-density
for Machine-Type Communications (MTC); Stage 1,” Technical Speci- parity-check codes,” IEEE Trans. Inf. Theory, vol. 49, no. 9, pp. 2141–
fication 22.368, V.13.0.0, Jun. 2014. 2155, Sep. 2003.
[12] H. S. Jang, S. M. Kim, K. S. Ko, J. Cha, and D. K. Sung, “Spatial group [34] S. Duan, V. Shah-Mansouri, and V. Wong, “Dynamic access class barring
based random access for M2M communications,” IEEE Commun. Lett., for M2M communications in LTE networks,” in IEEE Global Commun.
vol. 18, no. 6, pp. 961–964, Jun. 2014. Conf.(GLOBECOM), Dec. 2013, pp. 4747–4752.