Informatica logo


Login Register

  1. Home
  2. Issues
  3. Volume 28, Issue 2 (2017)
  4. Optimal Access Class Barring in Machine ...

Informatica

Information Submit your article For Referees Help ATTENTION!
  • Article info
  • Full article
  • Related articles
  • Cited by
  • More
    Article info Full article Related articles Cited by

Optimal Access Class Barring in Machine to Machine Systems with Random Activation Time
Volume 28, Issue 2 (2017), pp. 285–302
Vahid Shah-Mansouri   Seshadhri Srinivasan   Valentina E. Balas  

Authors

 
Placeholder
https://doi.org/10.15388/Informatica.2017.130
Pub. online: 1 January 2017      Type: Research Article      Open accessOpen Access

Received
1 October 2015
Accepted
1 October 2016
Published
1 January 2017

Abstract

Machine type communication (MTC) systems are a new paradigm in communication systems where machines talk to each other rather than humans. It is expected that more than twenty billion smart devices are deployed around the globe by 2020. The machines talk to each other and communicate with cloud based MTC servers to monitor and control everything around us. Such ubiquitous sensing and actuating require a communication infrastructure. Cellular networks due to their wide coverage are the best candidate for the communication infrastructure. The 3GPP LTE system is the future cellular network. Access class barring (ACB) is introduced by the standard as a solution to alleviate the congestion at the access layer. It works as a persistent probability for network access at the data link layer. In this paper, we consider an MTC system with several devices using LTE system as communication network. Based on the suggestions of the 3GPP standard, we consider uniform activation of devices within a long interval. This activation pattern results in Poisson arrival traffic in each random access channel. Using this arrival traffic pattern, we obtain the ACB factor which maximizes the throughput in the access link. This factor depends on the traffic parameters. Then, we propose a scheme to estimate the traffic parameters. At the end, we propose an algorithm which takes into account practical considerations. We validate our analytical models through extensive simulations.

1 Introduction

Internet of things (IoT) and machine type communications (MTC) are technologies which are expected to change the future of the connected world. All the devices around us are becoming smart and they are going to be connected to the Internet creating a connected planet. Machines are able to communicate with each other to carry out certain tasks. MTC servers residing at the cloud collect information of the MTC devices and provide analytical service over them for the users. For example, the power consumption of households or individual devices within a home can be measured by MTC devices and can be stored at an MTC server. Such information can be analysed to predict the consumption and improve the operation of the smart grid. Health monitoring, elderly care, and ubiquitous connection are other examples of the widespread use of MTC system in the near future (3GPP, 2011). Gartner predicts that by 2020, devices surrounding us will be connected to the Internet. In fact, it is expected to have over 26 billion connected MTC devices all around the world by 2020 (Gartner Report, 2014).
Although such systems provide huge business opportunities and can help the economies to grow, the implementation of such system has several barriers. In the access link, connection of a large number of MTC devices can create congestion and degrade the throughput. It is known that MTC devices do not create heavy traffic. It means, each device may send few bytes of information whenever it is connected. However, the control plane signalling for connection of a device to the core is still a problem. To handle a connection, the MTC device needs to exchange control signalling with the core to allow such access (3GPP, 2013). Therefore, not only the access, but also the backhaul and core networks need to be revisited for any technology which is used as the communication infrastructure in MTC communications.
Several standardization bodies have started MTC and IoT related activities including regulating and standardizations (Cisco, 2015). This includes Third Generation Partnership Project (3GPP) and the Institute of Electrical and Electronics Engineers (IEEE) (IEEE, 2010). MTC systems need a network infrastructure for their operation. Sensors and actuators need to connect to the network through access gateways, base stations, or access points in a wireless manner. Such middle nodes also require to provide connectivity to the cloud and MTC servers as well.
Cellular networks are the best candidate for MTC communications due to their widespread coverage. Cellular coverage these days is available almost everywhere. Therefore, they can be used as an infrastructure for IoT and MTC applications (Lien et al., 2011). However, cellular networks are designed for human to human (H2H) communications, not machine to machine communications (M2M). Therefore, for the use of such systems for M2M applications, the network structure needs a revisit. Also, the network resources should be wisely shared between H2H and M2M applications.
In this paper, we focus on the 4th generation long term evolution (LTE) technology as cellular infrastructure. In the 3GPP LTE standard, logical uplink and downlink channels are defined for the communication of the devices. To obtain a dedicated uplink and downlink channel for communication, a physical uplink shared channel is introduced that users compete in that channel to reserve their dedicated channel. This logical channel is called random access channel (RACH). This is an uplink channel shared between differen users. This random access procedure is also used for the synchronization of the users. There are limited resources (orthogonal codes) in this channel that users randomly choose and transmit as a notion of connection request. Since the number of resources is limited, the chance that two users choose the same resource increases as the number of devices increases in the network.
Radio access network (RAN) overload is referred to the case where several devices are activated at the same time and try to connect to the network. This is equivalent to simultaneous access requests in the random access channel. Two main solutions have been proposed in the LTE standard to alleviate the network congestion. The first approach is the use of an access class barring (ACB) factor (3GPP, 2005). ACB factor, p, is a persistent probability announced by the enhanced node B (eNodeB) in the broadcast channel as an MIB information. An activated node tries to gain access to the network with probability p. With probability $1-p$, the node postpones its access request to the next RACH. If the eNodeB detects a RAN overload condition, it can increase the value of p. We notice that although higher ACB factors can decrease congestion, it can increase delays which is an important quality of service (QoS) parameter for the cellular operators. Therefore, it is of interest to carefully set ACB factor. The other parameter proposed by 3GPP standard for congestion control is backoff. When a node tries to access the network and it experiences congestion in the RACH, it postpones its transmission for a certain number of RACHs which is backoff parameter. Backoff parameter is also announced by the eNodeB and it is an approach for traffic shaping. Large values of the backoff parameter makes the backlog traffic uniform over next RACHs.
The resources of MTC system can be separated from resource used by the H2H applications. This problem is addressed in Cheng et al. (2011) and Lien et al. (2012). To reduce the congestion, the ACB factor and the timing advance are used together in Wang and Wong (2015). A heuristic algorithm is proposed in Duan et al. (2013) for finding an ACB factor close to optimal. Kalman filters are used in Tavana et al. (2015) to dynamically find the ACB factor. In He et al. (2015), authors proposed an approach for dynamic adjustment of ACB factor based on Markov analysis. A joint optimal physical random access channel (PRACH) resource allocation is proposed in Oh et al. (2015) to maximize the random access efficiency with random access latency constraint, when there are massive access attempts of MTC devices in LTE systems. In Han et al. (2015), a heterogeneous ACB scheme is proposed to avoid long delays where the newly activated and backlogged devices are treated differently. The main difference between these works and our work is that they consider burst arrival traffic with Beta distribution. We consider normal operation of the network while the arrival traffic follows a Poisson distribution. This is based on the assumption in 3GPP (2011) that nodes are activated uniformly over a long interval. This model is also employed in Dhillon et al. (2015).
In this paper, we consider an MTC system where the incoming traffic has a Poisson pattern. It comes from the uniform activation of the devices. If several devices are triggered and each try to access the network uniformly in a long time interval, then the arrival traffic follows Poisson distribution. This is the case in many practical applications and introduced in the 3GPP standard as one of possible activation patterns (3GPP, 2005). Considering the arrival traffic as Poisson with parameter λ, we obtain the optimal ACB factor that eNodeB can use to maximize the throughput of a RACH. The throughput of a RACH is defined as the average number of successful initial access requests received in the RACH. We show that the optimal ACB factor depends on Poisson traffic parameter λ. Since λ is not known at the eNodeB, we propose a scheme to estimate this parameter in practical situations. Our work is different from other works in the literature in sense that we consider Poisson traffic arrival while most of the works consider Beta distribution. Our estimation scheme is also unique compared to the literature. We validate our analytical results through simulations.
The rest of the paper is organized as follows. Section 2 contains the system model and problem formulations. In Section 3, we present the optimal ACB factor and also the traffic arrival rate estimation. We discuss some practical considerations of our scheme in Section 4. Section 5 contains the simulations results. We conclude the paper in Section 6.

2 System Model

The 3GPP standard defines a random access procedure for the devices which want to connect to the network. When a node wants to connect to the network, it needs to send a request in the first upcoming logical shared uplink control channel called random access channel (RACH). The physical uplink channel associated to this logical channel is called physical RACH or PRACH. The PRACH is repeated with a certain frequency ranging from 2 msec to 20 msec. The information regarding the PRACH channel is broadcast by the eNodeB for all the users. 64 orthogonal codes are defined in the standard for the PRACH. These codes are called preambles and have length of 829 symbols. Some preambles are reserved by the eNodeB for special applications which are delay sensitive. The eNodeB periodically announces the preambles which can be used by the devices. When a node wants to connect to the network, in its first upcoming RACH, the node randomly picks a preamble from the pool of available preambles and transmits that preamble to the eNodeB. The node does not transmit any other information about itself. Since the preambles are orthogonal, if two nodes transmit different preambles, the eNodeB can detect both of the transmitted preambles. The eNodeB acknowledges the successful reception of a preamble right after PRACH. After that, the acknowledged node sends its ID and the eNodeB assigns a dedicated data channel to it. If two nodes transmit the same preamble, they are both acknowledged. Then, both of them send their IDs which makes collision. A node can gain access to the network and receives a dedicated data channel if no one else has transmitted the preamble that tnode had picked.
In MTC applications, there might be thousands of devices in the system. A large number of devices may be activated simultaneously which results in congestion at the access link. To alleviate the congestion at the PRACH, the standard has proposed two schemes. The first is based on the use of access class barring (ACB) factor. The second one is based on a backoff timer. The ACB factor is a persistent probability announced by the eNodeB at the start of each PRACH. It is a number between 0 and 1. Let p denote the ACB factor announced by the eNodeB. An activated device decides to participate in a RACH and it picks a preamble with probability p. With probability $1-p$, the device postpones its transmission. The eNodeB can also announce a backoff timer. A node which experiences collision or fails an ACB check postpones its transmission for an interval equal to the backoff timer.
Two types of traffic are suggested by 3GPP for M2M communication systems. The first type suggests that the MTC devices are activated uniformly over a time interval. This shows the regular traffic in the system. For event driven applications, the standard suggests a bursty traffic model which follows a Beta distribution. We consider the normal operation of the network where the MTC devices are activated uniformly over a time period. Assuming that there is a large number of MTC devices while the activation interval is much larger than the PRACH period, then the number of MTC devices which are activated in between two consecutive PRACHs follows a Poisson distribution. If the backoff time is also much longer than the period of PRACHs, then the backlogged traffic is also distributed according to a Poisson distribution. The backlogged traffic and the newly activated traffic are independent. Since the summation of two independent Poisson distributions is a Poisson distribution, the distribution of the number of nodes which try to participate in a PRACH follows a Poisson distribution. This model for arrival traffic is also used in Dhillon et al. (2015). Let λ denote the mean of the number of MTC devices which try to connect to the network in a PRACH. We notice that due to the ACB factor, some of them actually transmit in the PRACH. Let N denote the number of MTC devices which try to connect to the network. Then, we have
\[ N\sim \mathrm{Poisson}(\lambda ).\]
We are interested to find the ACB factor, which is a design parameter, such that the throughput of a PRACH is maximized. The throughput of a PRACH is defined as the average number of devices which can gain access to the network (i.e. transmit a preamble successfully and get acknowledged) during the PRACH. Let r denote the number of preambles. The probability that a specific preamble is chosen by exactly one node is
(1)
\[ \mathbb{P}\{\text{a preamble is successful}\}=\left(\genfrac{}{}{0pt}{}{N}{1}\right)\frac{p}{r}{\bigg(1-\frac{p}{r}\bigg)^{N-1}}.\]
Let S denote the number of successfully transmitted preambles. The average number of successful preamble transmission is
(2)
\[ \mathbf{E}[S]={\mathbf{E}_{N}}\big[\mathbf{E}[S\hspace{0.1667em}|\hspace{0.1667em}N]\big].\]
We define random variable ${s_{l}}$ for $l=1,\dots ,r$ as follows. Let ${s_{l}}=1$ if preamble l is successfully transmitted for $l=1,\dots ,r$ where r is the number of preambles. Otherwise, ${s_{l}}=0$. We notice that ${s_{l}}=0$ includes the case that the preamble experienced collision and the case that the preamble is not chosen by any device. Then, we have
(3)
\[\begin{aligned}{}\mathbf{E}[S|N]=& \mathbf{E}\bigg[\sum \limits_{r}{s_{r}}\hspace{0.1667em}\Big|\hspace{0.1667em}N\bigg]=\sum \limits_{r}\mathbf{E}[{s_{r}}\hspace{0.1667em}|\hspace{0.1667em}N]\\ {} =& r\left(\genfrac{}{}{0pt}{}{N}{1}\right)\frac{p}{r}{\bigg(\hspace{-0.1667em}1-\frac{p}{r}\bigg)^{N-1}}=Np{\bigg(\hspace{-0.1667em}1-\frac{p}{r}\bigg)^{N-1}}.\end{aligned}\]
The expected value for successful transmission is obtained from (3) as
(4)
\[ \mathbf{E}[S]={\mathbf{E}_{N}}\big[\mathbf{E}[S\hspace{0.1667em}|\hspace{0.1667em}N]\big]={\mathbf{E}_{N}}\bigg[Np{\bigg(\hspace{-0.1667em}1-\frac{p}{r}\bigg)^{N-1}}\bigg]={\sum \limits_{N=0}^{\infty }}\bigg(Np{\bigg(1-\frac{p}{r}\bigg)^{N-1}}\bigg)\frac{{e^{-\lambda }}{\lambda ^{N}}}{N!}.\]
In practical cases, the number of MTC devices in a real system is large. Therefore, λ can be easily greater than 10. In that case, the probability that N is near one is close to zero. For large values of N, we can use the following estimation
(5)
\[ {\bigg(1-\frac{p}{r}\bigg)^{N-1}}\approx {e^{-\frac{p(N-1)}{r}}}.\]
Therefore, we have
(6)
\[ \mathbf{E}[S]={\mathbf{E}_{N}}\big[Np{e^{-\frac{p(N-1)}{r}}}\big]\approx {\sum \limits_{N=0}^{\infty }}\big(Np{e^{-\frac{p(N-1)}{r}}}\big)\frac{{e^{-\lambda }}{\lambda ^{N}}}{N!}.\]
This is what we call the throughput of a RACH and it is used in the next section.

3 Optimal ACB Factor and Parameter Estimation

In this section, we find the ACB factor that maximizes the throughput and estimate the unknown system parameters. The expected number of successful transmissions depends on p. We are interested to find the value of p which maximizes (6). We take derivative with respect to p from (6) as
(7)
\[\begin{aligned}{}\frac{\partial \mathbf{E}[S]}{\partial p}=& \frac{\partial }{\partial p}{\mathbf{E}_{N}}\big[Np{e^{-\frac{p(N-1)}{r}}}\big]\\ {} =& {\mathbf{E}_{N}}\big[N{e^{-\frac{p(N-1)}{r}}}\big]-{\mathbf{E}_{N}}\bigg[\frac{N(N-1)}{r}p{e^{-\frac{p(N-1)}{r}}}\bigg]\\ {} =& {e^{\frac{p}{r}}}{\mathbf{E}_{N}}\big[N{e^{-\frac{p}{r}N}}\big]-\frac{p}{r}{e^{\frac{p}{r}}}{\mathbf{E}_{N}}\big[{N^{2}}{e^{-\frac{p}{r}N}}\big]+\frac{p}{r}{e^{\frac{p}{r}}}{\mathbf{E}_{N}}\bigg[\frac{N}{r}p{e^{-\frac{p}{r}N}}\bigg].\end{aligned}\]
The moment generating function of Poisson random variable N is defined as
(8)
\[ \Phi (\pi )=\mathbf{E}\big[{e^{\pi N}}\big]={e^{\lambda ({e^{\pi }}-1)}}.\]
The first and second derivatives of the moment generating function with respect to π are
(9)
\[\begin{aligned}{}{\Phi ^{\prime }}(\pi )=& \mathbf{E}\big[N{e^{\pi N}}\big]=\lambda {e^{\pi }}{e^{\lambda ({e^{\pi }}-1)}},\\ {} {\Phi ^{\prime\prime }}(\pi )=& \mathbf{E}\big[{N^{2}}{e^{\pi N}}\big]=\lambda {e^{\pi }}{e^{\lambda ({e^{\pi }}-1)}}+{\lambda ^{2}}{e^{2\pi }}{e^{\lambda ({e^{\pi }}-1)}}.\end{aligned}\]
Equation (7) can be written using the moment generating function as
(10)
\[\begin{aligned}{}\frac{\partial \mathbf{E}[S]}{\partial p}=& {e^{\frac{p}{r}}}{\Phi ^{\prime }}\bigg(-\frac{p}{r}\bigg)-\frac{p}{r}{e^{\frac{p}{r}}}{\Phi ^{\prime\prime }}\bigg(-\frac{p}{r}\bigg)+\frac{p}{r}{e^{\frac{p}{r}}}{\Phi ^{\prime }}\bigg(-\frac{p}{r}\bigg)\\ {} =& {e^{\frac{p}{r}}}\lambda {e^{-p/r}}{e^{\lambda ({e^{-p/r}}-1)}}-\frac{p}{r}{e^{p/r}}\lambda {e^{-p/r}}{e^{\lambda ({e^{-p/r}}-1)}}\\ {} & -\frac{p}{r}{e^{p/r}}{\lambda ^{2}}{e^{-2p/r}}{e^{\lambda ({e^{-p/r}}-1)}}+\frac{p}{r}{e^{p/r}}\lambda {e^{-p/r}}{e^{\lambda ({e^{-p/r}}-1)}}\\ {} =& \bigg(\lambda -\lambda \frac{p}{r}-{\lambda ^{2}}\frac{p}{r}{e^{-p/r}}+\lambda \frac{p}{r}\bigg){e^{\lambda ({e^{-p/r}}-1)}}.\end{aligned}\]
info1141_g001.jpg
Fig. 1
Average number of preambles chosen by one node, by more than one node and the number of preambles which are not selected by any node.
To find the ACB factor which maximizes the average number of successful transmissions, we equate (10) to zero. Then, we obtain
(11)
\[\begin{array}{l}\displaystyle \frac{\partial \mathbf{E}[S]}{\partial p}=0,\\ {} \displaystyle \hspace{1em}\Rightarrow \hspace{1em}1-\lambda \frac{p}{r}{e^{-p/r}}=0.\end{array}\]
In practice, the total number of preambles is 64 in the LTE standard. Therefore, we can approximate ${e^{p/r}}$ with $1+p/r$. We notice that p should be between zero and one. Therefore, the optimal ACB factor is obtained as
(12)
\[ {p^{\ast }}=\min \bigg(\frac{r}{\lambda -1},1\bigg).\]
The information regarding λ is not available at the eNodeB. Therefore, eNodeB needs to estimate parameter λ to set the optimal ACB factor. We propose a scheme to estimate this variable. The information which is available to estimate λ is the number of preambles which are chosen by one node, by more than one node and the number of preambles which are not selected by any node. Figure 1 shows the average number of preambles versus λ. The results are obtained via simulation of a real system with 25 preambles. The ACB factor is set to 1 for this simulation.
As Fig. 1 shows, for a specific average number of successfully transmitted preambles, there are two values of λ. Therefore, the number of successful preambles is not a good metric to estimate λ since it does not provide unique answer. Both the number of empty preambles and the number of collided preambles can be used to estimate the parameter λ. In this paper, we use the number of preambles not chosen by any node to estimate λ. The number of collided preambles can also be used for this purpose in a similar manner.
Assume that there are N nodes in a RACH where ACB factor p is used. Let S denote the number of preambles not chosen by node in a RACH. The following theorem characterizes the behaviour of the random variable S in the RACH.
Theorem 1.
The number of preambles which are not chosen by any node follows a Poisson distribution for known N, where N is large.
(13)
\[ \mathbf{P}(S=s\hspace{0.1667em}|\hspace{0.1667em}N)\approx {e^{-\mu }}\frac{{\mu ^{s}}}{s!},\]
where $\mu =r{e^{-Np/r}}$.
Proof.
This problem is known as urn problem. Part of our proof is from Feller (1968), Chapter 4. Let ${A_{m}}$ be the event that m specific preamble is not chosen by any node for $m=1,\dots ,r$. Then we have
(14)
\[ \mathbf{P}\{{A_{m}}\}={\bigg(1-\frac{mp}{r}\bigg)^{N}}.\]
Let ${S_{m}}$ denote the probability m preambles are not chosen by any node. This probability can be written as
(15)
\[ {S_{m}}=\left(\genfrac{}{}{0pt}{}{r}{m}\right){\bigg(1-\frac{mp}{r}\bigg)^{N}}.\]
The probability that at least one preamble is not chosen by any node can be written based on ${S_{m}}$ as
(16)
\[\begin{aligned}{}\mathbf{P}\{\text{at least one preamble is not chosen}\}=& \sum_{m=1}^{r} (-1)^m S_m \\ {} =& \sum_{m=1}^{r} (-1)^m {r \choose m}\bigg( 1 - \frac{mp}{r}\bigg)^N.\end{aligned}\]
The probability that all the preambles are chosen by the nodes is one minus the probability that at least one preamble is empty. Let ${p_{0}}(N,r)$ denote this probability. Then, we have
(17)
\[ {p_{0}}(N,r)=1-{\sum \limits_{m=1}^{r}}{(-1)^{m}}{S_{m}}=-{\sum \limits_{m=0}^{r}}{(-1)^{m}}\left(\genfrac{}{}{0pt}{}{r}{m}\right){\bigg(1-\frac{mp}{r}\bigg)^{N}}.\]
Let ${p_{m}}(N,r)$ denote the probability that exactly m preambles are not chosen by any node. These m preambles can be chosen in $\left(\genfrac{}{}{0pt}{}{r}{m}\right)$ ways. The nodes are distributed among other $r-m$ preambles such that none of the preambles are empty. The number of such cases is ${(r-m)^{N}}{p_{0}}(N,r-m)$. Dividing by ${r^{N}}$, we find the probability that exactly m preambles remain empty as
(18)
\[\begin{aligned}{}{p_{m}}(N,r)=& \left(\genfrac{}{}{0pt}{}{r}{m}\right){\bigg(1-\frac{mp}{r}\bigg)^{N}}{p_{0}}(N,r-m)\\ {} =& \left(\genfrac{}{}{0pt}{}{r}{m}\right){\sum \limits_{v=0}^{r-m}}{(-1)^{v}}\left(\genfrac{}{}{0pt}{}{r-m}{v}\right){\bigg(1-p\frac{m+v}{r}\bigg)^{N}}.\end{aligned}\]
The following inequalities show upper and lower bounds for ${S_{v}}$ (Feller (1968), page 103)
(19)
\[ {r^{v}}{\bigg(1-p\frac{v}{r}\bigg)^{v+N}}<v!{S_{v}}<{r^{v}}{\bigg(1-p\frac{v}{r}\bigg)^{N}}.\]
Using the approximation of ${(1-1/x)^{y}}\approx {e^{-y/x}}$, we obtain
(20)
\[ {\big(r{e^{-p(v+N)/(N-v)}}\big)^{v}}<v!{S_{v}}<{\big(r{e^{-pN/r}}\big)^{v}}.\]
For large values of N and r, we have
(21)
\[ 0\leqslant \frac{{\mu ^{v}}}{v!}-{S_{v}}\to 0,\]
where $\mu =r{e^{-pN/r}}$. Then, we have
(22)
\[ {e^{-\mu }}-{p_{0}}(r,N)={\sum \limits_{v=0}^{\infty }}{(-1)^{v}}\bigg(\frac{{\mu ^{v}}}{v!}-{S_{v}}\bigg).\]
Combining (18) and (22), we obtain
(23)
\[ {p_{m}}(N,r)-{e^{-\mu }}\frac{{\mu ^{m}}}{m!}\to 0.\]
This finalizes our proof.  □
Let ${s_{1}},\dots ,{s_{k}}$ denote the number of preambles experiencing collision at RACHs 1 to k. These are considered as k samples of random variable S which is proven in Theorem 1 to be a Poisson random variable.
(24)
\[ \mathbf{E}[{s_{i}}]={\mathbf{E}_{N}}\big[\mathbf{E}[{s_{i}}|N]\big]={\mathbf{E}_{N}}\big[r{e^{-pN/r}}\big].\]
Using the moment generating function of random variable N, we have
(25)
\[\begin{aligned}{}{\mu _{{s_{i}}}}=\mathbf{E}[{s_{i}}]=& {\mathbf{E}_{N}}\big[r{e^{-pN/r}}\big]=r\Phi (-1/r)=r{e^{\lambda ({e^{-p/r}}-1)}}.\end{aligned}\]
For large values of r, we approximate ${e^{-1/r}}$ with $1-1/r$, Then, we have
(26)
\[ {\mu _{{s_{i}}}}=r{e^{\lambda ({e^{-p/r}}-1)}}\approx r{e^{-p\lambda /r}}.\]
We also calculate the variance of variable ${s_{i}}$ as
(27)
\[ {\sigma _{{s_{i}}}^{2}}={\mathbf{E}_{N}}\big[\mathbf{E}\big[{({s_{i}}-{\mu _{{s_{i}}}})^{2}}\big|N\big]\big]={\mathbf{E}_{N}}\big[r{e^{-pN/r}}\big].\]
We notice that mean and variance of a Poisson variable are equal. Using the same approximation used for the mean, we have
(28)
\[\begin{aligned}{}{\sigma _{{s_{i}}}^{2}}\approx & r{e^{-p\lambda /r}}.\end{aligned}\]
Let χ denote the average of random variables ${s_{1}},\dots ,{s_{k}}$ as
(29)
\[ \chi =\frac{{\textstyle\textstyle\sum _{i=1}^{k}}{s_{i}}}{k}.\]
The variables ${s_{1}},\dots ,{s_{k}}$ are independent random variables with Poisson distribution. Therefore, we have
(30)
\[\begin{aligned}{}{\mu _{\chi }}=& \mathbf{E}[\chi ]=\frac{{\textstyle\sum _{i}}\mathbf{E}[{s_{i}}]}{k}={\mu _{{s_{i}}}}\approx r{e^{-p\lambda /r}},\\ {} {\sigma _{\chi }^{2}}=& \mathbf{E}\big[{(\chi -{\mu _{\chi }})^{2}}\big]=\mathbf{E}\bigg[{\bigg(\frac{{\textstyle\sum _{i}}{s_{i}}}{k}-{\mu _{\chi }}\bigg)^{2}}\bigg]=\frac{1}{k}{\sigma _{{s_{i}}}^{2}}\approx \frac{r}{k}{e^{-p\lambda /r}}.\end{aligned}\]
To build the estimator, we equate the average of the samples taken from k RACHs with the mean of random variable χ which is ${\mu _{\chi }}=r{e^{-\lambda /r}}$. Let ${\tilde{\lambda }_{k}}$ denote the estimation of parameter λ using information of k RACHs. Then, we have
(31)
\[ \chi =\frac{{\textstyle\textstyle\sum _{i=1}^{k}}{s_{i}}}{k}=r{e^{-p{\tilde{\lambda }_{k}}/r}}.\]
Therefore, our estimator would be as
(32)
\[ {\tilde{\lambda }_{k}}=-\frac{r}{p}\ln \left(\chi /r\right).\]
The next theorem shows that the estimator in (32) is unbiased.
Theorem 2.
The estimator in (32) is unbiased. This means, the expected value of the estimation approaches λ as k is large
(33)
\[ \mathbf{E}[{\tilde{\lambda }_{k}}-\lambda ]\to 0\hspace{1em}\textit{as}\hspace{2.5pt}k\to \infty .\]
Proof.
We define function h as
(34)
\[ h(\chi )=-\frac{r}{p}\ln (\chi /r).\]
If we write the second order Taylor approximation of the estimator in (32) around its mean value, we have
(35)
\[\begin{aligned}{}{\tilde{\lambda }_{k}}\approx & h({\mu _{\chi }})+{h^{\prime }}({\mu _{\chi }})(\chi -{\mu _{\chi }})+\frac{{h^{\prime\prime }}({\mu _{\chi }})}{2}{(\chi -{\mu _{\chi }})^{2}}\\ {} =& -r\ln ({\mu _{\chi }}/r)-(\chi -{\mu _{\chi }})\frac{r}{p{\mu _{\chi }}}+\frac{{(\chi -{\mu _{{\mu _{\chi }}}})^{2}}}{2}\frac{r}{{p^{2}}{\mu _{\chi }^{2}}}.\end{aligned}\]
Then, we have
(36)
\[ \mathbf{E}[{\tilde{\lambda }_{k}}]\approx -\frac{r}{p}\ln ({\mu _{\chi }}/r)+\frac{{\sigma _{\chi }^{2}}}{2}\frac{r}{{p^{2}}{\mu _{\chi }^{2}}}=\lambda +\frac{1}{2{p^{2}}k}{e^{\lambda /r}}.\]
Based on (36), for large values of k, the mean of the estimation approaches λ which proves this estimator is unbiased.  □
To show the accuracy of this estimator, we find the variance of the estimation error. The estimation error is defined as
(37)
\[ e={\tilde{\lambda }_{k}}-\lambda .\]
The variance of error can be formulated as
(38)
\[ {\sigma _{e}^{2}}=\mathbf{E}\big[{({\tilde{\lambda }_{k}}-\lambda )^{2}}\big].\]
Consider in the first two terms of the Taylor approximation in (35), we have
(39)
\[\begin{aligned}{}{\sigma _{e}^{2}}\approx & \mathbf{E}\bigg[{\bigg(-r\ln ({\mu _{\chi }}/r)-(\chi -{\mu _{\chi }})\frac{r}{{\mu _{\chi }}}-\lambda \bigg)^{2}}\bigg]\\ {} =& \mathbf{E}\bigg[{\bigg(-(\chi -{\mu _{\chi }})\frac{r}{{\mu _{\chi }}}\bigg)^{2}}\bigg]=\frac{{r^{2}}{\sigma _{\chi }^{2}}}{{\mu _{\chi }^{2}}}=\frac{1}{2{p^{2}}k}{e^{p\lambda /r}}.\end{aligned}\]
We can see that the variance of error approaches zero for large values of k.

4 Practical Considerations

As the estimator suggests, k samples are needed to estimate the value of the average traffic rate λ. Therefore, we need to first choose an ACB factor p, then estimate the number of tags based on the samples and adjust ACB factor again. An inefficient p may result in large variance of error. In our proposed algorithm, we first set $k=1$ and use $p=1$ to find the estimate of the average traffic as $\tilde{\lambda }$. Using the obtained λ, we set the optimal ACB factor as ${p^{\ast }}=\min \{1/(\lambda -1)1\}$. Then, we set $k=2$ and keep the ACB factor constant for two RACHs. We continue to increase k and find the optimal ACB factor gradually until we reach the desired k. We notice that the desired k is obtained via the desired variance of error. This means, if the desired variance of error in the system should be less than ${\sigma _{\mathrm{threshold}}^{2}}$, then using (39), the required number of samples k should be larger than
(40)
\[ k>\frac{1}{2{p^{2}}{\sigma _{\mathrm{threshold}}^{2}}}{e^{p\lambda /r}}.\]
Another practical aspect that we take into account to modify our algorithm is the drift in the traffic rate λ. It is possible that during k RACHs that we use to estimate λ, the value of λ changes. If the changes in λ are considerable, the estimator does not provide useful information. However, if the changes are not significant, one can show that it is possible to modify the estimator in a way that would correct that drift. We assume that the traffic rate drift is Δ between the first RACH and the $kth$ RACH. We notice that we are interested to estimate the latest traffic rate. We assume that the traffic rate in the first RACH is $\lambda -\Delta $ while it is λ in RACH k. The traffic at RACH i is $\lambda -{\delta _{i}}$, where ${\delta _{1}}=\Delta $ and ${\delta _{k}}=0$. We introduce the weighted average of the samples ${s_{i}}$ as
(41)
\[ S=\frac{{\textstyle\sum _{i}}{\varpi _{i}}{s_{i}}}{k},\]
where ${\varpi _{i}}$ is the coefficient of sample i. We notice that ${\textstyle\sum _{i}}{\varpi _{i}}=k$. In this case, the mean of samples would be
\[ {\mu _{\chi }}=\mathbf{E}[\chi ]=\frac{{\textstyle\sum _{i}}\mathbf{E}[{\varpi _{i}}{s_{i}}]}{k}\approx \frac{1}{k}\sum \limits_{i}{\varpi _{i}}r{e^{-p(\lambda -{\delta _{i}})/r}}=\frac{1}{k}r{e^{-p\lambda /r}}\sum \limits_{i}{\varpi _{i}}{e^{p{\delta _{i}}/r}}.\]
Assuming that all${\delta _{i}}$s are small, one can approximate ${e^{p{\delta _{i}}/r}}$ with $1+p{\delta _{i}}/r$. Therefore, we have
\[\begin{aligned}{}{\mu _{\chi }}=& \frac{1}{k}r{e^{-p\lambda /r}}\sum \limits_{i}{\varpi _{i}}{e^{p{\delta _{i}}/r}}\approx \frac{1}{k}r{e^{-p\lambda /r}}\sum \limits_{i}{\varpi _{i}}(1+p{\delta _{i}}/r)\\ {} =& r{e^{-p\lambda /r}}\bigg(1+\frac{p}{r}\sum \limits_{i}{\varpi _{i}}{\delta _{i}}\bigg).\end{aligned}\]
This equation shows that to have a correct estimate of λ, ${\varpi _{i}}$ should be small when ${\delta _{i}}$ is large. Since ${\delta _{i}}$ is large when i is close to one and then vanishes. The values of ${\varpi _{i}}$ should start from a small number and increase as i approaches k. Since ${\delta _{k}}=0$, the highest coefficient is for $i=k$. Using the first order Taylor series approximation for our estimator in (32), the mean of the estimated value in this case is
(42)
\[\begin{aligned}{}\mathbf{E}\{{\tilde{\lambda }_{k}}\}=& -\frac{r}{p}\ln ({\mu _{\chi }}/r)=-\frac{r}{p}\ln \bigg({e^{-p\lambda /r}}\bigg(1+\frac{p}{r}\sum \limits_{i}{\varpi _{i}}{\delta _{i}}\bigg)\bigg)\\ {} =& \lambda -\ln \bigg(1+\frac{p}{r}\sum \limits_{i}{\varpi _{i}}{\delta _{i}}\bigg).\end{aligned}\]
This shows that if we are able to minimize ${\textstyle\sum _{i}}{\varpi _{i}}{\delta _{i}}$, the parameter λ can be estimated accurately. Algorithm 1 shows the procedure that we use to set the ACB factor.
info1141_g002.jpg
Algorithm 1
Estimation Algorithm

5 Simulation Results

In this section, we present the simulation results and compare the analytical models presented in the paper with the actual results. We validate our models and present the effect and approximations used in the system. The simulation settings for different figures are presented separately.
First, we validate the estimation which is used for the number of successful preambles. Equation (6) presents the estimation for the average number of successfully transmitted preambles. Figure 2 compares the analytical results and the actual data obtained from simulations. The expected number of preambles transmitted successfully is plotted by changing the value of λ from 10 to 40. Three different ACB factors are used for simulations, namely 0.5, 0.75, and 1. The analytical results which is an estimation of the actual value are compared with the actual data. We can see that the estimation is accurate in this case.
info1141_g003.jpg
Fig. 2
Average number of preambles chosen by one node.
Next, we investigate the result obtained in Theorem 2. In this theorem, it is shown that the number of preambles not chosen by any node follows a Poisson distribution with mean $r{e^{-pN/r}}$ when the number of nodes N is known in the system. In Fig. 3, the mean and variance of this variable is compared with the actual data obtained from simulations. Two different cases are considered for the ACB factor, namely 0.5 and 1. Again, it is shown that the estimation is accurate.
info1141_g004.jpg
Fig. 3
Actual versus analytical results for the expected number of empty preambles conditioned on N.
Next, we investigate the performance of our estimator. Figure 4 shows the mean of estimated value versus traffic rate. We vary the traffic rate from λ from 20 to 160. 25 preambles are present in the system. We use our estimator to estimate λ based on the number of preambles not chosen by any node.
info1141_g005.jpg
Fig. 4
The estimation of parameter λ.
We use $k=20$ for this simulation. We investigate the effect of k in the next simulations. The simulation contains two curves for two ACB factors, 0.75 and 1. This figure shows the mean of the estimation. When ACB factor is 1, for values of λ below around 80, the estimated value follows the actual value. However, after that the estimated value starts decreasing and shows a bias in the system. The main reason is that as the number of nodes increases, the number of preambles chosen by no node tends to zero. In this case, the estimator fails to estimate and returns no value. In this case, we set the estimated value to 0. This is called the saturation of the estimator. Therefore, the estimator has an operation range which is 80 for ACB = 1 and around 120 for ACB = 0.75 based on the simulation. Within the operation range, the estimator is working well. Outside this range, the estimator is not useful anymore.
info1141_g006.jpg
Fig. 5
Mean of estimation error versus the number of samples for two average arrival traffic rates.
We now show that the estimator is unbiased as the number of samples increases. Figures 5 and 6 show the mean and variance of the estimation error as the number of samples increases. The preamble size is fixed to 20 and two ACB factors are set to one. The simulations are carried out for two traffic rates $\lambda =10$ and $\lambda =25$. For a fixed number of preambles, we expect that lower traffic rate has better performance in terms of error which can be seen in the figures. Both the mean and variance of error vanishes as the number of samples k increases in the system. The mean of error falls below 1% and 3% of the actual value when k approaches 20. If the system can tolerate higher values of error, lower values of k can be used.
info1141_g007.jpg
Fig. 6
Variance of estimation error versus the number of samples for two average arrival traffic rates.

6 Conclusions

In this paper, we studied an MTC communication system where machines talk to each other and also communicate with the MTC server to finish a certain task. We consider a Poisson traffic arrival distribution in each RACH. Using this assumption, we obtain the optimal ACB factor which maximizes the throughput of the random access channel. The throughput is defined as the number of successfully transmitted requests in the RACH. Then, we propose an estimator to estimate the parameters of the arrival traffic. We prove that this estimator is unbiased. To show the accuracy of the estimator, we find the variance of the estimation error as well. We validate our analytical models via extensive simulation results.

References

 
Cheng, J.P., Lee, C.H., Lin, T.M. (2011). Prioritized random access with dynamic access barring for RAN overload in 3GPP LTE-A networks. In: Proceedings of IEEE GLOBECOM, Houston, TX.
 
Cisco (2015). San Jose, CA, USA, Cisco visual networking index: global mobile data traffic forecast update. 2014–2019 technical report, February 2015.
 
Dhillon, H.S., Huang, H., Viswanathan, H., Valenzuela, R.A. (2015). Fundamentals of throughput maximization with random arrivals for M2M communications. arXiv:1307.0585.
 
Duan, S., Shah-Mansouri, V., Wong, V.W.S. (2013). Dynamic access class barring for M2M communications in LTE networks. In: Proceedings of IEEE GLOBECOM, Altlanta, GA.
 
Feller, W. (1968). An Introduction to Probability Theory and Its Application. John Wiley and Sons.
 
Gartner Report (2014). Gartner Says the Internet of Things Installed Base will Grow to 26 Billion Units by 2020, 2 January 2014.
 
Han, X., Lim, T.J., Xu, J. (2015). Heterogeneous access class barring with QoS guarantee in machine-type communications. Transaction on Emerging Telecommunication Technologies.
 
He, H., Du, Q., Song, H., Li, W., Wang, Y., Ren, R. (2015). Traffic-aware ACB scheme for massive access in machine-to-machine networks. In: Proceedings of IEEE Conference on Communications (ICC), London, UK.
 
IEEE (2010). Machine to machine (M2M) communications technical report. IEEE 802.16p-10/0005, November 2010.
 
Lien, S.-Y., Chen, K.-C., Lin, Y. (2011). Toward ubiquitous massive accesses in 3GPP machine-to-machine communications. IEEE Communications Magazine, 49(4), 66–74.
 
Lien, S.Y., Liau, T.H., Kao, C.Y., Chen, K.C. (2012). Cooperative access class barring for machine-to-machine communications. IEEE Transactions on Wireless Communications, 11(1), 27–32.
 
Oh, C.Y., Hwang, D., Lee, T.J. (2015). Joint access control and resource allocation for concurrent and massive access of M2M devices. IEEE Transactions on Wireless Communications.
 
Tavana, M., Shah-Mansouri, V., Wong, V.W.S. (2015). Congestion control for bursty M2M traffic in LTE networks. In: Proceedings of IEEE Conference on Communications (ICC), London, UK.
 
Wang, Z., Wong, V.W.S. (2015). Optimal access class barring for stationary machine type communication devices with timing advance information. IEEE Transactions on Wireless Communications.
 
3GPP (2005). Access class barring and overload protection. 3GPP TR 23.898 V7.0.0.
 
3GPP (2011). Study on RAN improvements for machine-type communications. 3rd Generation Partnership Project (3GPP), TR 37.868 V11.0.0, October 2011.
 
3GPP (2013). Study on machine-type communications (MTC) and other mobile data applications communications enhancements. 3rd Generation Partnership Project (3GPP), TR 23.887 V12.0.0, December 2013.

Biographies

Shah-Mansouri Vahid
vmansouri@ut.ac.ir

V. Shah-Mansouri is an asst. professor, Department of Electrical and Computer Engineering in University of Tehran, Iran. He obtained his PhD from University of British Columbia, and master’s from Sharif University of Technology, Iran. He has authored many papers in national and international journals and conferences.

Srinivasan Seshadhri
seshadhri@ieee.org

S. Srinivasan obtained his PhD from National Institute of Technology-Tiruchirappalli, India in 2010. He has worked with ABB GISL, TUT, Estonia, Technical University of Munich, Germany, and University of Sannio, Italy. Currently he is the Director of Center for Automatic Control Engineering, Kalasalingam University, India. He has published over 45 journals and 40 conference articles.

Balas Valentina E.
valentina.balas@uav.ro

V.E. Balas is currently a full-time professor in the Department of Automatics and Applied Software at the Faculty of Engineering, Aurel Vlaicu University of Arad, Romania. She holds a PhD in applied electronics and telecommunications from Polytechnic University of Timisoara. Dr. Balas is author of more than 250 research papers in refereed journals and international conferences. Her research interests are in intelligent systems, fuzzy control, soft computing, smart sensors, information fusion, modelling and simulation.

She is the editor-in chief of the International Journal of Advanced Intelligence Paradigms (IJAIP) and of the International Journal of Computational Systems Engineering (IJCSysE), member in editorial board of several national and international journals and is the evaluator expert for national and international projects. Dr. Balas is the director of Intelligent Systems Research Centre in Aurel Vlaicu University of Arad. She served as general chair of the International Workshop Soft Computing and Applications (SOFA) in seven editions 2005–2016 held in Romania and Hungary.

Dr. Balas participated in many international conferences as the organizer, honorary chair, session chair and member in steering, advisory or international program committees.

She is a member of EUSFLAT, SIAM and a senior member of IEEE, member of TC – Fuzzy Systems (IEEE CIS), member of TC – Emergent Technologies (IEEE CIS), member of TC – Soft Computing (IEEE SMCS). Dr. Balas was vice-president (Awards) of IFSA International Fuzzy Systems Association Council (2013–2015) and is a joint secretary of the Governing Council of Forum for Interdisciplinary Mathematics (FIM), a multidisciplinary academic body, India.


Reading mode PDF XML

Table of contents
  • 1 Introduction
  • 2 System Model
  • 3 Optimal ACB Factor and Parameter Estimation
  • 4 Practical Considerations
  • 5 Simulation Results
  • 6 Conclusions
  • References
  • Biographies

Copyright
© 2017 Vilnius University
by logo by logo
Open access article under the CC BY license.

Keywords
machine type communication congestion control access class barring

Metrics
since January 2020
1037

Article info
views

584

Full article
views

435

PDF
downloads

232

XML
downloads

Export citation

Copy and paste formatted citation
Placeholder

Download citation in file


Share


RSS

  • Figures
    7
  • Theorems
    2
info1141_g001.jpg
Fig. 1
Average number of preambles chosen by one node, by more than one node and the number of preambles which are not selected by any node.
info1141_g002.jpg
Algorithm 1
Estimation Algorithm
info1141_g003.jpg
Fig. 2
Average number of preambles chosen by one node.
info1141_g004.jpg
Fig. 3
Actual versus analytical results for the expected number of empty preambles conditioned on N.
info1141_g005.jpg
Fig. 4
The estimation of parameter λ.
info1141_g006.jpg
Fig. 5
Mean of estimation error versus the number of samples for two average arrival traffic rates.
info1141_g007.jpg
Fig. 6
Variance of estimation error versus the number of samples for two average arrival traffic rates.
Theorem 1.
Theorem 2.
info1141_g001.jpg
Fig. 1
Average number of preambles chosen by one node, by more than one node and the number of preambles which are not selected by any node.
info1141_g002.jpg
Algorithm 1
Estimation Algorithm
info1141_g003.jpg
Fig. 2
Average number of preambles chosen by one node.
info1141_g004.jpg
Fig. 3
Actual versus analytical results for the expected number of empty preambles conditioned on N.
info1141_g005.jpg
Fig. 4
The estimation of parameter λ.
info1141_g006.jpg
Fig. 5
Mean of estimation error versus the number of samples for two average arrival traffic rates.
info1141_g007.jpg
Fig. 6
Variance of estimation error versus the number of samples for two average arrival traffic rates.
Theorem 1.
The number of preambles which are not chosen by any node follows a Poisson distribution for known N, where N is large.
(13)
\[ \mathbf{P}(S=s\hspace{0.1667em}|\hspace{0.1667em}N)\approx {e^{-\mu }}\frac{{\mu ^{s}}}{s!},\]
where $\mu =r{e^{-Np/r}}$.
Theorem 2.
The estimator in (32) is unbiased. This means, the expected value of the estimation approaches λ as k is large
(33)
\[ \mathbf{E}[{\tilde{\lambda }_{k}}-\lambda ]\to 0\hspace{1em}\textit{as}\hspace{2.5pt}k\to \infty .\]

INFORMATICA

  • Online ISSN: 1822-8844
  • Print ISSN: 0868-4952
  • Copyright © 2023 Vilnius University

About

  • About journal

For contributors

  • OA Policy
  • Submit your article
  • Instructions for Referees
    •  

    •  

Contact us

  • Institute of Data Science and Digital Technologies
  • Vilnius University

    Akademijos St. 4

    08412 Vilnius, Lithuania

    Phone: (+370 5) 2109 338

    E-mail: informatica@mii.vu.lt

    https://informatica.vu.lt/journal/INFORMATICA
Powered by PubliMill  •  Privacy policy