IJCNIS Vol. 10, No. 2, 8 Feb. 2018
Cover page and Table of Contents: PDF (size: 606KB)
Full Text (PDF, 606KB), PP.27-37
Views: 0 Downloads: 0
Long Term Evolution, Human to Human, Machine to Machine, Random Area Network, Random Access, Random Access Channel
Long Term Evolution (LTE) emerges as the promising communication technology for data and voice service in Human to Human Communication (H2H). Currently, LTE network also includes Machine to Machine (M2M) communication. Combining the legacy systems and evolving Machine type devices, increases the access rate to a particular base station leading to congestion in Access network. Congestion in Random Access Network (RAN) that occurs during the Random Access Process affects the performance of H2H communication. The objective of the paper is to analyze the existing congestion control techniques and to provide a comprehensive summary on classified poll and event based mechanisms.
Chidanandan V., Arun Raj Kumar P., "A Comprehensive Review of Congestion Control Techniques in M2M and Cellular Networks", International Journal of Computer Network and Information Security(IJCNIS), Vol.10, No.2, pp.27-37, 2018. DOI:10.5815/ijcnis.2018.02.04
[1]TS 102 689 V1.1.1 (2010), Machine-to-Machine communications (M2M); M2M service requirements, ETSI Technical Specification, FRANCE
[2]TS 36.321 V12.5.0 (2015 - 04), Medium Access Control (MAC), protocol specification, 3GPP Technical Specification, FRANCE
[3]TS 36.331 V13.0.0 (2016 - 01), Radio Resource Control (RRC), Protocol Specification, 3GPP Technical Specification, FRANCE
[4]TR 37.868 V11.0.0 (2011-09), Study on RAN Improvements for Machine-type Communications, 3GPP Technical Report, FRANCE
[5]R2 - 104007 (2010), Pull vs Push approach for MTC, 3GPP TSG RAN WG2 #70bis, Sweden
[6]T. Taleb and A. Kunz, "Machine type communications in 3GPP networks: potential, challenges, and solutions," in IEEE Communications Magazine, vol. 50, no. 3, pp. 178-184, March 2012.
[7]TS 36.300 (2010-07) Evolved universal terrestrial radio access (E-UTRA) and Evolved universal terrestrial radio access network (E-UTRAN); Overall description, 3GPP Technical Specification, FRANCE
[8]D. Aragao, D. Vieira, M. F. de Castro and Y. Ghamri-Doudane, "A dynamic backoff approach to control the congestion in M2M communication over LTE networks," 2015 Global Information Infrastructure and Networking Symposium (GIIS), Guadalajara, 2015, pp. 1-6.
[9]X. Jian, Y. Jia, X. Zeng and J. Yang, "A novel class-dependent back-off scheme for Machine Type Communication in LTE systems," 2013 22nd Wireless and Optical Communication Conference, Chongqing, 2013, pp. 135-140
[10]R. G. Cheng, J. Chen, D. W. Chen and C. H. Wei, "Modeling and Analysis of an Extended Access Barring Algorithm for Machine-Type Communications in LTE-A Networks," in IEEE Transactions on Wireless Communications, vol. 14, no. 6, pp. 2956-2968, June 2015.
[11]Jihun Moon and Yujin Lim, "Adaptive Access Class Barring for Machine-Type Communications in LTE-A," 2016 Eighth International Conference on Ubiquitous and Future Networks (ICUFN), Vienna, 2016, pp. 398-402.
[12]S. Y. Lien, T. H. Liau, C. Y. Kao and K. C. Chen, "Cooperative Access Class Barring for Machine-to-Machine Communications," in IEEE Transactions on Wireless Communications, vol. 11, no. 1, pp. 27-32, January 2012.
[13]T. Jiang, X. Tan, X. Luan, X. Zhang and J. Wu, "Evolutionary game based access class barring for machine-to-machine communications," 16th International Conference on Advanced Communication Technology, Pyeongchang, 2014, pp. 832-835.
[14]S. Duan, V. Shah-Mansouri and V. W. S. Wong, "Dynamic access class barring for M2M communications in LTE networks," 2013 IEEE Global Communications Conference (GLOBECOM), Atlanta, GA, 2013, pp. 4747-4752.
[15]A. Lo, Y. Law, M. Jacobsson, M. Kucharzak “Enhanced LTE-Advanced Random-Access Mechanism for Massive Machine-to-Machine (M2M) Communications”, Proc. 27th Meeting of Wireless World Research Form, Düsseldorf, Germany, Oct 2011, pp. 1-5.
[16]J. P. Cheng, C. h. Lee and T. M. Lin, "Prioritized Random Access with dynamic access barring for RAN overload in 3GPP LTE-A networks," 2011 IEEE GLOBECOM Workshops (GC Wkshps), Houston, TX, 2011, pp. 368-372.
[17]Du, Q., Li, W., Liu, L., Ren, P., Wang, Y., Sun, L. Dynamic RACH Partition for Massive Access of Differentiated M2M Services. Sensors 2016, 16, 455.
[18]D. Kim, W. Kim and S. An, "Adaptive random access preamble split in LTE," 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC), Sardinia, 2013, pp. 814-819.
[19]L. M. Bello, P. Mitchell and D. Grace, "Application of Q-Learning for RACH Access to Support M2M Traffic over a Cellular Network," European Wireless 2014; 20th European Wireless Conference, Barcelona, Spain, 2014, pp. 1-6.
[20]Y. C. Pang, S. L. Chao, G. Y. Lin and H. Y. Wei, "Network access for M2M/H2H hybrid systems: a game theoretic approach," in IEEE Communications Letters, vol. 18, no. 5, pp. 845-848, 2014.
[21]K. S. Ko, M. J. Kim, K. Y. Bae, D. K. Sung, J. H. Kim and J. Y. Ahn, "A Novel Random Access for Fixed-Location Machine-to-Machine Communications in OFDMA Based Systems," in IEEE Communications Letters, vol. 16, no. 9, pp. 1428-1431, September 2012.
[22]K. Lee, J. Shin, Y. Cho, K. S. Ko, D. K. Sung and H. Shin, "A group-based communication scheme based on the location information of MTC devices in cellular networks," 2012 IEEE International Conference on Communications (ICC), Ottawa, ON, 2012, pp. 4899-4903.
[23]Y. Chang, C. Zhou and O. Bulakci, "Coordinated Random Access Management for Network Overload Avoidance in Cellular Machine-to-Machine Communications," European Wireless 2014; 20th European Wireless Conference, Barcelona, Spain, 2014, pp. 1-6.
[24]Thomsen, H., Pratas, N. K., Stefanovi?, C. and Popovski, P. (2013), Code-expanded radio access protocol for machine-to-machine communications. Trans Emerging Tel Tech, 24: 355–365.
[25]Z. Wang and V. W. S. Wong, "Optimal Access Class Barring for Stationary Machine Type Communication Devices With Timing Advance Information," in IEEE Transactions on Wireless Communications, vol. 14, no. 10, pp. 5374-5387, Oct. 2015.
[26]He H., Ren P., Du Q., Sun L. (2015), Estimation Based Adaptive ACB Scheme for M2M Communications. In: Xu K., Zhu H. (eds) Wireless Algorithms, Systems, and Applications. WASA 2015. Lecture Notes in Computer Science, vol 9204. Springer, Cham
[27]sesia, s., Baker, M., Toufik, I., LTE – the UMTS Long Term Evolution: From Theory to Practice, Wiley, Wiltshire., 2011.
[28]H. He, Q. Du, H. Song, W. Li, Y. Wang and P. Ren, "Traffic-aware ACB scheme for massive access in machine-to-machine networks," 2015 IEEE International Conference on Communications (ICC), London, 2015, pp. 617-622.
[29]L. Alonso, R. Agusti and O. Sallent, "A near-optimum MAC protocol based on the distributed queueing random access protocol (DQRAP) for a CDMA mobile communication system," in IEEE Journal on Selected Areas in Communications, vol. 18, no. 9, pp. 1701-1718, Sept. 2000.
[30]A. Ksentini, Y. Hadjadj-Aoul and T. Taleb, "Cellular-based machine-to-machine: overload control," in IEEE Network, vol. 26, no. 6, pp. 54-60, November-December 2012.
[31]Dave Evans, The Internet of Things How the Next Evolution of the Internet Is Changing Everything, CISCO white paper, Cisco Internet Business Solutions Group (IBSG), 2011
[32]M. Hasan, E. Hossain and D. Niyato, "Random access for machine-to-machine communication in LTE-advanced networks: issues and approaches," in IEEE Communications Magazine, vol. 51, no. 6, pp. 86-93, June 2013.
[33]A. Laya, L. Alonso and J. Alonso-Zarate, "Is the Random Access Channel of LTE and LTE-A Suitable for M2M Communications? A Survey of Alternatives," in IEEE Communications Surveys & Tutorials, vol. 16, no. 1, pp. 4-16, First Quarter 2014.
[34]Song L., Zhou W., Hou Y., Gao M. (2017) Load-aware ACB Scheme for M2M Traffic in LTE-A Networks. In: Barolli L., Xhafa F., Yim K. (eds) Advances on Broad-Band Wireless Computing, Communication and Applications. BWCCA 2016. Lecture Notes on Data Engineering and Communications Technologies, vol 2. Springer
[35]Jaideep Kaur, Kamaljit Kaur,"Internet of Things: A Review on Technologies, Architecture, Challenges, Applications, Future Trends", International Journal of Computer Network and Information Security (IJCNIS), Vol.9, No.4, pp. 57-70, 2017.