CITY UNIVERSITY OF HONG KONG 妆䉬㢢喽㦌ु

Massive Random Access of Machine-to-Machine Communications in LTE Networks: Modeling, Throughput Maximization and Delay Minimization

LTE䙝䖲撥㦌慫儜ᣓ勬军ᣓ勬埏怦䀛禿ᣓ䘚 呜⚵䗯儜⚧斁㦌䑺埳埩䣾䏚斁怂䑺ᘊ惲

Submitted to Department of Electrical Engineering 秵ᣓ䋳㢧ु奘 in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy 揳ु㟆喬ु墠

by

ZHAN Wen 揉墩

September 2019 䄓䤢憘䛊兣䛊挛

Abstract

Machine-to-Machine (M2M) communications is a key enabling tech- nology for the emerging Internet of Things paradigm, which offers pervasive wireless connectivity for autonomous devices with minimum human intervention. It has been identified by the Third-Generation Partnership Project (3GPP) as a new service type to be supported by the Long Term Evolution (LTE) networks. However, due to the ex- plosive growth of M2M markets, thousands of Machine-Type Devices (MTDs), e.g., sensors and actuators, will be deployed in each LTE cell. With many MTDs attempting to initiate connections with the network, the deluge of access requests will cause severe congestion with intoler- ably low access efficiency. How to efficiently accommodate the access of a massive number of MTDs has become a significant challenge for supporting M2M communications over LTE networks. A great deal of works have been done for modeling and evaluating the access performance of M2M communications in LTE networks. The existing models, however, either ignore the queueing behavior of each MTD or become unscalable in the massive access scenario, making it extremely difficult to further study how to optimize the access perfor- mance by properly tuning system parameters, e.g., backoff parameters. The crucial effect of data transmissions on the access performance of MTDs is also little understood. This thesis is devoted to modeling and optimizing the access through- put and access delay performance of massive random access of M2M communications in LTE networks. The study begins by proposing a novel double-queue model for each MTD, which can both incorporate the queueing behavior of each MTD and be scalable in the massive access scenario. The proposed model also captures the essence of the connection-based random access in LTE networks, where a connection

iii is first established between a device and the base station before the device starts to transmit its data packets. Based on the proposed double-queue model, the access throughput performance and the access delay performance are further character- ized and optimized with the assumption that the data transmission rate is sufficiently large, i.e., each MTD with a successful access re- quest can always clear its data queue in one time slot. The maximum access throughput and corresponding optimal backoff parameters, in- cluding the access class barring (ACB) factor and the uniform backoff (UB) window size, are derived as explicit functions of key system pa- rameters. Explicit expressions of the minimum mean access delay and the corresponding optimal ACB factor are also obtained. The anal- ysis shows that with a sufficiently large data transmission rate, the maximum access throughput is solely determined by the number of preambles, while the minimum mean access delay further depends on the network size and the traffic input rate of each MTD. To further evaluate the effect of limited data transmission resources on the access performance, the analysis is extended to incorporate a finite data transmission rate, with which it may take more than one time slot for MTDs to clear their data queues. The maximum access throughput and the corresponding optimal ACB factor are both ob- tained as explicit functions of the data transmission rate. The analysis reveals that the maximum access throughput is a monotonic increas- ing function of the data transmission rate, which becomes zero if the data transmission rate is too small. It is also shown that the crucial resource tradeoff between access and data transmission is determined by the time slot length. To further optimize the access throughput per- formance, the optimal time slot length for maximizing the normalized maximum access throughput is characterized. The analysis in this the- sis sheds important light on the practical system design for supporting massive access of M2M communications in LTE

Acknowledgements

When I look back at my entire journey of the Ph.D. study in City University of Hong Kong, I realize that in the last four years, I obtained not only the knowledge, the scholarly intellect and the experience, but also the valuable relationship, partnership and friendship with the peo- ple I meet here. In this acknowledgment, I would like to deliver my sincere appreciation to these people, i.e., my supervisor, friends and family members, who helped me a lot on this tough yet fruitful journey. Their constant encouragement motivates me to deal with the difficulties and challenges one after another in research and in daily life. Because of them, my days here have been filled with fun and happiness. First of all, I would like to express my heartfelt gratitude and respect to my supervisor, Prof. Lin Dai, for her constant support and inspiring guidance to me during my Ph.D. study. I really appreciate the effort she devotes to training me in doing research. In our numerous face-to- face meetings and discussions, she is always generous in sharing her way of thinking, providing constructive suggestions, explaining research methodologies and teaching me the skill in academic writing. Prof. Lin Dai’s immerse knowledge, professional guidance and rigorous attitude in doing research have a profound impact on my work and my future career. Moreover, during my Ph.D. study, I have had a great time and chance to work with many terrific, knowledgeable and hard-working colleagues. They made my life in Hong Kong enjoyable and wonder- ful. First, I would like to thank my groupmates Yitong Li, Yayu Gao, Xinghua Sun, Zhiyang Liu, Xijun Wang, Bo Bai, Yue Zhang and Pei Liu for their constant encouragement. I also would like to thank my

vii good friends in the lab, Salwa Mostafa, Yaru Fu, Hong Wang, Lei Li- u, Qi Liu, Shansuo Liang, Hao Wang, Wei Zhang, Miaomiao Dong, Rongbin Zhang, Adegoke Muideen Adeniyi, Guojun Xiong, Qiyou Du- an, and many others. Finally, I am deeply grateful to my family members, particularly my parents, who love me unconditionally and have supported me all those years. Their lifelong love is the best and most precious gift that I have in my life. They were, they are and they will always be where my heart belongs. Contents

Contentsi

List of Figuresv

Abbreviations ix

Notations xi

1 Introduction1 1.1 Machine-to-Machine Communications...... 1 1.1.1 Wireless Communications Towards the Era of Internet of Things...... 1 1.1.2 M2M Communications: Concepts and Features...... 3 1.1.3 Enabling Wireless Technologies for M2M Communications.4 1.2 An Overview of Long-Term Evolution (LTE) Networks...... 6 1.2.1 Network Structure...... 6 1.2.2 Uplink Resource Structure of the LTE Networks...... 8 1.2.3 Access and Data Transmission Procedures...... 9 1.3 Modeling and Performance Optimization of Massive Random Ac- cess of M2M Communications in LTE Networks...... 12 1.3.1 Modeling Methodology...... 12 1.3.2 Performance Optimization...... 14 1.3.3 Summary...... 15 1.4 Thesis Contributions and Outline...... 16

2 System Model 19 2.1 Key System Parameters...... 20 2.2 Double-Queue Model of Each MTD...... 22 2.3 State Characterization of Access Request...... 23 2.4 Performance Metrics...... 25

3 Access Throughput Optimization 27 3.1 Previous Work...... 27 3.2 Preliminary Analysis...... 29 3.3 Steady-State Point Analysis...... 30 3.3.1 Bistable Region and Monostable Region...... 32

i ii Contents

3.3.2 Simulation Results...... 34 3.4 Access Throughput Analysis...... 35 3.4.1 Maximum Access Throughput with M = 1...... 36 3.4.2 Extension to Multi-Preamble M > 1...... 38 3.4.3 Simulation Results...... 40 3.5 Discussions...... 43 3.5.1 Effect of Outdated Information on n and λ ...... 43 3.5.2 Effect of Bursty Arrivals of Data Packets...... 44 3.6 Summary...... 46

4 Access Delay Optimization 49 4.1 Previous Works...... 49 4.2 Moments of Access Delay...... 50 4.3 Minimum Mean Access Delay...... 51 4.3.1 Minimum Mean Access Delay with M = 1...... 53 4.3.2 Extension to Multi-Preamble M > 1...... 55 4.3.3 Simulation Results...... 56 4.4 Summary...... 57

5 Access Throughput Optimization with a Finite Data Transmis- sion Rate 59 5.1 Previous Works...... 59 5.2 Preliminary Analysis...... 61 5.3 Steady-State Point Analysis...... 62 5.3.1 Stability...... 64 5.3.2 Simulation Results...... 65 5.4 Access Throughput and Data Throughput...... 66 5.4.1 Access Throughput...... 66 5.4.2 Data Throughput...... 68 5.4.3 Extension to Multi-Preamble M > 1...... 69 5.4.4 Simulation Results...... 71 5.5 Optimal Time Slot Length...... 74 5.5.1 Normalized Maximum Access Throughput...... 75 5.5.2 Simulation Results...... 77 5.6 Summary...... 78

6 Conclusion and Future Work 81 6.1 Conclusion...... 81 6.2 Future Work...... 83

A Proof of Theorem 3.1 85

B Proof of Corollary 3.2 89 Contents iii

C Proof of Theorem 3.3 91

D Derivation of (5.3) 93

E Derivation of (5.9) 95

F Proof of Theorem 5.1 97

G Proof of Theorem 5.2 99

Bibliography 101

List of Publications 109 iv Contents List of Figures

1.1 Graphic illustration of the LTE system [14]...... 7 1.2 Uplink time-frequency resource structure of the LTE system.....8 1.3 (a) Contention-based random access procedure. (b) Uplink data transmission procedure...... 10

2.1 Frame structure of the LTE system in the Frequency Division Du- plex (FDD) mode...... 20 2.2 Double-queue model of each MTD...... 23

2.3 Embedded Markov chain {Xj} of the state transition process of each individual access request...... 23

3.1 State transition diagram of each individual access request with β = +∞...... 29 3.2 Bistable region B and monostable region M...... 32 ˆ 3.3 Steady-state points pL and pA versus the aggregate input rate λ. M = 1. n = 100. (a) W = 1, q ∈ {0.04, 0.06, 0.08, 0.1}. (b) q = 1,W ∈ {20, 40, 60, 80}...... 32

3.4 Steady-state points pL and pA versus the number of MTDs n. M = 1. λˆ = 0.4. (a) W = 1, q ∈ {0.04, 0.06, 0.08, 0.1}. (b) q = 1,W ∈ {20, 40, 60, 80}...... 33 3.5 Steady-state probability of successful transmission of access request- s p versus the ACB factor q and the UB window size W . M = 1. λˆ = 0.3. n = 100. (a) W = 1. (b) q = 1...... 35 3.6 Steady-state probability of successful transmission of access request- s p versus the ACB factor q and the UB window size W . M = 1. λˆ = 0.6. n ∈ {100, 200}. (a) W = 1. (b) q = 1...... 35

3.7 Unachievable region SN , achievable region SA and uncertain region SU ...... 36 ˆa 3.8 Access throughput λout versus the ACB factor q and the UB window ˆ ˆ ˆ size W . M = 1. n = 100. (a) λ = 0.3, (n, λ) ∈ SN . (b) λ = 0.6, ˆ ˆ ˆ (n, λ) ∈ SA. (c) λ = 0.4, (n, λ) ∈ SU ...... 37 ˆa 3.9 Access throughput λout versus the ACB factor q and the UB window size W . M = 1. n = 100. λˆ ∈ {0.3, 0.4, 0.6, 0.8}. (a)-(b) W = 1. (c)-(d) q = 1...... 40 ˆM,a 3.10 Access throughput λout versus the ACB factor q and the UB win- dow size W . n = 1000. λ = 0.006. M ∈ {6, 10}. (a) W = 1. (b) q = 1...... 41

v vi List of Figures

ˆM,a 3.11 Access throughput λout versus the number of MTDs n. λ = 0.006. M ∈ {6, 10}...... 42 ˆM,a 3.12 Simulated access throughput λout versus the relative errors γn and ˜ γλ. M = 10.n ˜ = 1000. λ = 0.01. (a) γλ = 0. (b) γn = 0...... 43 3.13 Illustration of data packet arrival processes at two tagged MTDs. σ0 = 0.005. λ0 = 0.006. σ1 = 0.005. λ1 = 1. (a) Temporal burstiness. (b) Spatial burstiness...... 45 ˆM,a 3.14 Simulated access throughput λout versus the synchronization ratio θ and the frequency of bursty arrivals ϕ. M = 10. n = 1000. ∗,M ∗,M σ0 = 0.005. λ0 = 0.006. λ1 = 1. (a) q = qW =1. (b) W = Wq=1 .... 45

4.1 Bistable region Bq and monostable region Mq...... 53 4.2 Mean access delay E[DT ] versus the ACB factor q for q ∈ Bq when ˆ ˆ λ ≤ λ0...... 54 4.3 Mean access delay E[DT ] (in unit of time slots) versus the ACB factor q. n = 1000. M = 10. λ ∈ {0.004, 0.01}...... 56

4.4 Mean access delay E[DT ] (in unit of time slots) versus the number ∗ of MTDs n. M ∈ {10, 20}. λ = 0.01. q = qD or 0.1...... 57

5.1 Embedded Markov chain {Xj} of the state transition process of each individual access request with a finite data transmission rate β and the UB window size W = 1...... 61 5.2 Limiting probability that no access request is in State H, α, and mean holding time in State H, τH , versus the aggregate input rate ˆ ˆ λ. n = 100. M = 1. q ∈ {0.01, 0.1}. β = 1. (a) α versus λ. (b) τH versus λˆ...... 64 5.3 Limiting probability of successful transmission of access requests given that no access request is in State H, p, versus the aggregate input rate λˆ and the ACB factor q. β ∈ {1, 10}. n = 100. M = 1. (a) q = 0.05. (b) λˆ = 0.4...... 65 ˆa ∗ 5.4 Maximum access throughput λmax and optimal ACB factor q versus the transmission rate β. λˆ ∈ {1, 5}. n ∈ {100, 1000}. M = 1. (a) ˆa ∗ λmax versus β. (b) q versus β...... 67 ˆM,a ∗,M 5.5 Maximum access throughput λmax and optimal ACB factor q versus the number of preambles M. n = 1000. λ = 0.005. β ∈ ˆM,a ∗,M {10, 20, 100}. (a) λmax versus M. (b) q versus M...... 71 ˆa ˆ 5.6 Access throughput λout versus the ACB factor q. λ ∈ {0.2, 0.38, 1}. n = 100. M = 1. (a) β = 1. (b) β = 10...... 71 ˆd ˆ 5.7 Data throughput λout versus the aggregate input rate λ. n = 100. M = 1. q = 0.001. β ∈ {1, 10}...... 72 ˆM,a ˆM,d 5.8 (a) Access throughput λout and data throughput λout versus the ACB factor q. n = 1000. λ = 0.006. β = 10. M ∈ {5, 10}. ˆM,a (b) Access throughput λout versus the number of MTDs n. q = 0.05 or q∗,M . λ = 0.006. β ∈ {10, 20, 50, 200}. M = 10...... 73 List of Figures vii

5.9 Optimal time slot length τ ∗,a and the corresponding normalized M,a λˆmax ∗,a maximum access throughput τ |τ=τ versus β0. n = 1000. M = 5. (a) λ0 = 0.001. (b) λ0 = 0.006...... 76 M,a λˆmax 5.10 Normalized maximum access throughput τ versus time slot length ∗,M τ. M = 5. q = q . (a) n = 1000. λ0 = 0.001. β0 ∈ {8, 12, 20}. (b) n = 1000. λ0 = 0.006. β0 ∈ {8, 12, 20}. (c) n ∈ {1500, 2500, 3000}. λ0 = 0.006. β0 = 20...... 77

A.1 f(p) has one root in (a), (b), (c), (d), (e) and three non-zero roots in (f)...... 86

H E.1 Embedded Markov chain {Xj }...... 96 viii List of Figures Abbreviations

3GPP Third-Generation Partnership Project

ACB Access Class Barring

BLE Bluetooth Low Energy

BS Base Station

BSR Buffer State Reporting

CQI Channel Quality Indicator

CSMA Carrier Sense Multiple Access

EPC Evolved Packet Core

E-UTRAN Evolved Universal Terrestrial Radio Access Network

FDD Frequency Division Duplex

GSM Global System for Mobile communications

H2H Human-to-Human

HARQ Hybrid Automatic Repeat reQuest

HOL Head-Of-Line

HTD Human-Type Device

IoT Internet of Things

LPWAN Low-Power Wide-Area Networks

ix x Abbreviations

LTE Long Term Evolution

M2M Machine-to-Machine

MMBP Markov Modulated Bernoulli Process

MME Entity

MTC Machine-Type Communications

MTD Machine-Type Device

NB-IoT NarrowBand Internet of Things

OFDM Orthogonal Frequency Division Multiplexing

PDCCH Physical Downlink Control CHannel

P-GW Packet data network GateWay

PHICH Physical Hybrid ARQ Indicator CHannel

PRACH Physical Random Access CHannel

PUCCH Physical Uplink Control CHannel

PUSCH Physical Uplink Shared CHannel

RRC

S-GW Service GateWay

UB Uniform Backoff

UMTS Universal Mobile Telecommunications System

WLAN Wireless Local Area Networks Notations

n The number of MTDs

λ Traffic input rate of each MTD q Access class barring factor

W Uniform backoff window size

M The number of preambles

β Total number of data packets that can be transmitted in each time slot

τ Time slot length

λˆ Aggregate input rate n˜ Outdated information on the number of MTDs

λ˜ Outdated information on the traffic input rate of each MTD

λ1 Traffic input rate of each MTD in the bursty phase

λ0 Traffic input rate of each MTD in the regular phase

β0 Number of data packets that can be transmitted per subframe

λ0 Probability that an MTD generates a new data packet in one subframe p Steady-state probability of successful transmission of access requests

given that no access request is in State H pL Desired steady-state point

xi xii Notations

pA Undesired steady-state point

α Steady-state probability that no access request is in State H

π˜i Probability of the access request being in State i, i ∈ {T,H, 0, 1,...,W − 1}

τi Mean holding time in State i, i ∈ {T,H, 0, 1,...,W − 1} q∗,M Optimal access class barring factor for maximizing the access throughput

W ∗,M Optimal uniform backoff window size for maximizing the access throughput

∗ qD Optimal access class barring factor for minimizing the mean access delay

τ ∗,a Optimal time slot length for maximizing the normalized maximum access

throughput

ˆa λout Access throughput

DT Access delay

ˆd λout Data throughput

B Bistable region

M Monostable region

SN Unachievable region

SU Uncertain region

SA Achievable region

SS Unstable region

γn Relative error on n

γλ Relative error on λ

ϕ Frequency of bursty arrivals

θ Synchronization ratio Chapter 1

Introduction

1.1 Machine-to-Machine Communications

1.1.1 Wireless Communications Towards the Era of Inter- net of Things

“We are all now connected by the Internet, like neurons in a giant brain.” —— Stephen Hawking

This quote is a true portrayal of our lives today. The Internet, nowadays, is affordable and pervasive. Almost all of us have access to it and we are using it for anything and everything, e.g., paying bills, watching videos or playing mobile games. The Internet has long been an integral part of our daily lives. Yet, it still keeps evolving and will reach every corner of human society by connecting not only the people but also the everyday objects, such as doors, vehicles, watches and even buildings. This irresistible trend proclaims that the era of Internet of Things (IoT) is coming.

IoT is a new wave in the technological revolution. It is generally referred to as a global network of connected devices having identities and virtual person- alities operating in smart spaces and using intelligent interfaces to communicate within social, environmental, and user contexts [1]. Although the definition seem- s complicated at first glance, the basic goal of the IoT vision is simple, that is, connecting the unconnected [2]. When everyday objects join the Internet, an ever-tight integration between the physical world and the computer network can

1 2 Chapter 1 be created, which enables us to sense, interact and control the physical objects by making them smart. This integration can also improve the efficiency, accuracy and automation of the existing applications and further give birth to a myriad of new use-cases. From small wearable devices such as Google glass, Apple watch, Fitbit, to large-scale intelligence systems such as Tesla autopilot, Industry 4.0, earthquake early detection, the potential impact of IoT applications is impressive. A UK government report shows that in the next few years, over 50 billion IoT devices will join the Internet [3]. Needless to say, the world of IoT is around the corner.

Although IoT is broad and multifaceted, wireless communications is always the heart of it. Since the invention of wireless telegraphy in the 19th century, wire- less communications has been one of the most common approaches for connecting everyone and everything. From the indoor venues, like offices, homes, and cafes, that are normally covered by WiFi, to the satellite communication with global coverage, wireless communications provides a convenient, flexible and accessible way for transmitting information over a distance without the help of wires, cables or any other forms of electrical conductors. The wireless connectivity thus will be an indispensable element for realizing many IoT applications, such as the fleet management, driverless cars and smart city.

On the other hand, IoT will in turn have a far-reaching influence on the fu- ture development of wireless communication technologies. For decades, by going to a larger bandwidth and higher data rates, typical wireless networks, such as WLAN and cellular networks, are designed and optimized in a way that they fit best for conventional Human-to-Human (H2H) communications, such as video streaming and mobile games, where a small number of devices access the network but transmit a significant amount of data. In IoT, on the other hand, devices just transmit and receive small data packets while the number of devices could be very large, orders of magnitude above what current communication networks are capable of dealing with. This fundamental difference changes the principle of wire- less communication system design from increasing link capacity to implementing low-overhead signaling protocols and highly scalable network architectures that can handle a large number of simultaneous connections [4].

Enormous endeavors have been made by the industry and academia in de- veloping new solutions or enhancing the existing networks for the emerging IoT applications. For instance, Low-Power Wide-Area Networks (LPWAN), such as Chapter 1 3

Sigfox and LoRa, have been developed and used to create a private wireless sensor network for long range and low rate transmission [2]. Bluetooth Low Energy (BLE) was recently released by Bluetooth standardization body and is a customized pro- tocol for meeting the short range transmission demand among energy-sensitive IoT devices [5]. Moreover, 3rd Generation Partnership Project (3GPP), the stan- dardization body for cellular system, has already included massive Machine-Type Communications (mMTC) as a generic service type to support in the upcoming network [6]. To conclude, wireless communication technologies are undergoing a new and pervasive evolution, without a doubt, towards a better support for the era of IoT.

1.1.2 M2M Communications: Concepts and Features

In the IoT vision, billions of everyday objects are connected, and disparate systems are brought together into one large, connected ecosystem. It can be seen that the key foundation for this vision is the seamless connection among a wide range of everyday objects. For developing such foundation, it is known that Machine-to-Machine (M2M) communications will be one of the most important paradigms, which can provide pervasive wireless connectivity for autonomous de- vices with minimum or no human intervention. M2M communications has been used in a variety of IoT applications, including home automation, industrial au- tomation, intelligent transportation systems, healthcare, surveillance and smart metering [7,8].

M2M communications is different from the conventional H2H communica- tions. One obvious difference is the device type. The device domain of M2M communications is comprised by autonomous objects such as sensor and meters, which are generally referred to as Machine-Type Devices (MTDs). On the other hand, the device domain of H2H communications is comprised by devices such as cellphone, laptop, etc, that have interfaces for human control, and are generally referred to as Human-Type Devices (HTDs). Indeed, the differences between M2M communications and H2H communications are far more than the type of devices. In the following, we summarize some unique characteristics of M2M communica- tions that differentiate it from conventional H2H communications [9, 10]:

• Amount of devices: Industrial reports have shown that the number of MTDs will soon exceed the sum of all HTDs [11]. An increased order of magnitude 4 Chapter 1

in the number of MTDs will generate massive transmissions, challenging the scalability of existing networks.

• Small packet transmissions: Although the number of devices can be large, most of MTDs transmit small-size messages, which can be just a few bits, or even just 1 bit to inform the occurrence of an emergency event. Therefore, the network should support small packet transmissions with minimal cost, e.g., signaling overhead, resource, etc.

• Low mobility: For many M2M applications, such as home automation and smart parking, MTDs are usually static or move in a predefined region. Thus, the mobility is not a major concern.

• Traffic direction: Different from H2H communications, motivated by applica- tions such as video streaming, where most traffic is in the downlink direction, in M2M communications, the traffic is usually in the uplink direction. For example, the smart meter periodically sends its metering report but may rarely receive downlink messages.

• Energy constraint: In most cases, MTDs are battery operated and an M2M network may be deployed in areas where frequent human access and battery replacement is impossible. Therefore, energy efficiency is a critical metric that needs to be considered.

• Device heterogeneity: A wide range of M2M applications have emerged and MTDs in different applications have diverse service requirements. For in- stance, in earthquake early detection systems, MTDs transmit critical in- formation and require ultra-low latency wireless transmission services. Yet, for the smart metering case, the meters are delay-insensitive. Hence, the network should be capable of providing service differentiation and diverse quality-of-service guarantees for different MTDs.

1.1.3 Enabling Wireless Technologies for M2M Communi- cations

With the booming M2M market, the potential of the M2M paradigm has been widely recognized by both academia and industry. A number of enabling wireless technologies that are promising to be used in M2M networks have been developed. Chapter 1 5

Depending on whether the connectivity is provided by the cellular system or not, we can broadly divide them into two categories: 1) capillary M2M communications and 2) cellular M2M communications.

In capillary M2M communications, MTDs form a private or relatively isolat- ed local area network by using short-range communication technologies, such as ZigBee and Bluetooth, or long-range communication technologies, such as Sigfox and LoRa. Capillary M2M communications are usually characterized by a large number of low-data-rate, low-cost and low-complexity MTDs, requiring high ener- gy efficiency, flexible deployments but may be insensitive to reliability. The target for deploying capillary M2M networks is to simplify the system architecture for realizing specific network functionalities, e.g., limiting the signaling to a local area, by exploiting the cooperation among neighboring MTDs without the aid of core network components [10]. Typical examples of capillary M2M communications include wireless sensor networks in the battlefield, home security and industrial automation.

Although capillary M2M communications is an attractive solution, the net- work coverage is usually limited, that is, MTDs have to be deployed in a certain area, near to the M2M gateways, through which they can get connected to the ex- ternal world. Such limitation in network coverage makes it hard, if impossible, to realize large-scale IoT systems, such as smart city or intelligent transportation sys- tem, where smart objects can be distributed in an area of several thousand square kilometres. Therefore, to release the full potential of M2M communications, the most ideal scenario is MTDs need just to be placed in the desired locations to get connected to the rest of the world [12]. Satellite communications can offer global scale network coverage. Yet, it is the least choice due to the prohibitively high cost and energy consumption.

So far, the most appealing solution that can provide widespread coverage with low complexity at MTDs, low energy consumption and reliable connectivity, is the existing cellular networks. In cellular M2M communications, MTDs are equipped with embedded SIM cards and can communicate autonomously with the like normal user equipments. With decades of development, the cellular system nowadays is stable, reliable and offers high capacity, security and a flexible interface for radio resource management. Thanks to the world-wide footprint of the network infrastructures, the cellular system becomes the most natural and ideal candidate for supporting M2M communications. 6 Chapter 1

Therefore, in this thesis, we will specifically focus on the cellular M2M com- munications. A brief introduction to the current cellular system, i.e., Long Term Evolution (LTE), will be presented in the following section.

1.2 An Overview of Long-Term Evolution (LTE) Networks

LTE is a standard for wireless broadband communication for mobile devices and data terminals [13]. It was proposed by 3GPP, a telecommunication stan- dardization body founded collaboratively by countries, research institutions and enterprises around the world. LTE evolves from an earlier 3GPP system known as Universal Mobile Telecommunication System (UMTS), which was in turn e- volved from the Global System for Mobile Communications (GSM). Compared to its predecessors, LTE improves the system capacity, network coverage, data rates while reduces latency by using advanced radio interface technologies, new frequency band and simplifying the network architecture to an all IP-based sys- tem. Nowadays, LTE has been a global standard with network connectivity all over the world, which naturally becomes the most appealing solution for enabling M2M communications.

In this section, we will first present a system-level view on the LTE network architecture, and then demonstrate the access and data transmission procedures in LTE networks.

1.2.1 Network Structure

A graphic illustration of the LTE system is shown in Fig. 1.1[14], from which we can see that two main components comprise the LTE system: the Evolved Universal Terrestrial Radio Access Network (E-UTRAN), and the Evolved Packet Core (EPC).

Specifically, the E-UTRAN is the of network and has just one component, eNodeBs, where eNodeB is an LTE terminology for Base Station (BS). In this thesis, we use the terminology BS for simplicity. The E-UTRAN manages the radio connection between the EPC and user equipments, i.e., MTDs in the Chapter 1 7

E-UTRAN EPC Server Base Station P-GW

Internet

MTD S-GW

MME Base Station MTD

Figure 1.1: Graphic illustration of the LTE system [14]. context of M2M communications. Each MTD communicates with just one BS. The functionalities of the E-UTRAN can be divided into two categories: data packet transmission and operation control. First, the BS sends data packets to MTDs or receives data packets from MTDs by using the signal processing func- tions of the LTE air interface. Second, by sending signaling messages, such as handover command, connection setup and security mode command, the BS con- trols the operation of MTDs in regard to mobility, security, etc. Each BS may have connections with nearby BSs. The connections between BSs are used for signaling and packet forwarding during handover [13].

The EPC mainly consists of three network components: the Mobility Manage- ment Entity (MME), Service GateWay (S-GW), and Packet data network Gate- Way (P-GW). Specifically, the MME handles the signaling related to mobility and security for E-UTRAN access, and is responsible for the tracking and the paging of user equipments. S-GW routes data packets through the network. P-GW is EPC’s point of contact with external IP networks, such as Internet.

It is clear that if an MTD needs to transmit a stream of information to the remote server, then it should first send packets to E-UTRAN, and E-UTRAN forwards to EPC, and finally, EPC relays the packets to the Internet. In this process, only the transmission between the MTD and E-UTRAN, i.e., BS, is built upon wireless channels. To gain a detailed understanding of the wireless data transmission link between the MTD and BS, in the following subsections, we will first demonstrate the uplink resource structure of the LTE networks, and then elaborate on the access and data transmission procedures. 8 Chapter 1

PRACH PUCCH PUSCH Frequency 180 kHz

Time

Subframe (1 ms)

Figure 1.2: Uplink time-frequency resource structure of the LTE system.

1.2.2 Uplink Resource Structure of the LTE Networks

In LTE networks, a connection1 between the MTD and the BS should first be established before the MTD transmits data packets to the BS. Therefore, besides data packets, a lot of signaling messages need to be exchanged for connection establishment. In LTE networks, data packets and signaling messages have to be delivered in different time-frequency resources.

Fig. 1.2 demonstrates the uplink resource structure of the LTE networks. Specifically, the radio transmissions in LTE are based on the Orthogonal Frequency Division Multiplexing (OFDM) scheme. The time is divided into fixed-length radio frames, and each frame contains multiple sub-frames, where each sub-frame’s duration is 1 millisecond [16]. Note that the resource scheduling is performed in both time domain and frequency domain. In the time domain, the resources are allocated in every 1 millisecond. In the frequency domain, the transmissions are scheduled in the unit of physical resource blocks, where a physical resource block is 180 kHz wide in frequency, as shown in Fig. 1.2.

To segregate different types of data and transmit them across the radio access network in an orderly fashion, in LTE networks, various physical “channels” are defined, where each “channel” is a group of physical resource blocks that are used with specific purposes [16]. According to the standard [17], there are three types of physical channels defined for uplink:

1That is, the MTD enters RRC (Radio Resource Control) CONNECTED state, in which the transmissions of unicast data to/from MTD, and the transmissions of broadcast/multicast data to MTD can take place [15]. Chapter 1 9

• Physical Uplink Control CHannel (PUCCH), which delivers control signal- ing, such as channel quality indicator report.

• Physical Random Access CHannel (PRACH), which is used for random ac- cess.

• Physical Uplink Shared CHannel (PUSCH), which is used to carry user data packets and radio resource control messages.

Particularly, each subframe contains at most one PRACH. PRACH will be al- located periodically and the period is broadcasted by the BS. According to the standard [16], the period of PRACH varies between a minimum of one PRACH every 20 subframes and a maximum of one PRACH per subframe. Note that s- ince the total time-frequency resources in LTE networks are limited, the period of PRACH subframe determines a crucial resource tradeoff between the access and data transmission, where more frequent PRACH subframes lead to fewer resources for data transmission. Later in this thesis, we will investigate this tradeoff.

1.2.3 Access and Data Transmission Procedures

Note that in LTE networks, if an MTD has data packets in the data queue but does not have a connection with BS, then it needs to perform the random access procedure to establish the connection, through which the MTD can further apply for uplink resources to deliver its data packets [18]. The contention-based random access procedure in LTE networks consists of four steps, as shown in Fig. 1.3a:

1. An MTD sends a randomly selected preamble to the BS via PRACH. In LTE networks, preambles are a series of orthogonal sequences. If two or more devices transmit the same preamble in the same PRACH subframe, then a collision occurs, i.e., the BS fails to decode it. Otherwise, the different preambles can be detected by the BS thanks to their orthogonality.

2. If the preamble is successfully decoded, then the BS sends a random access response to the MTD. The information included in the random access re- sponse contains the backoff window size, the timing advance value for timing synchronization and the uplink grant resource in PUSCH for the MTD to send the Radio Resource Control (RRC) connection request in Step 3. 10 Chapter 1

MTD BS 07' %6

Preamble 6FKHGXOLQJUHTXHVW (1) PRACH  PUCCH

Random access response 6FKHGXOLQJJUDQW (2)  PDCCH

RRC connection request 'DWD%65 (3)  PUSCH

RRC connection setup $&.1$&. (4)  PHICH

(a) (b)

Figure 1.3: (a) Contention-based random access procedure. (b) Uplink data transmission procedure.

3. Upon receiving the random access response, the MTD sends the RRC con- nection request, which specifics its identity and connection establishment cause, e.g., request radio resources for data transmission [19, 20]. If the MT- D does not receive the random access response, then it knows the preamble transmission fails.

4. Upon receiving the RRC connection request, the BS will then send the RRC connection setup, which contains the information for the MTD to config- ure its physical layer, MAC layer and signaling radio bearer, e.g., Channel Quality Indicator (CQI) reporting mode, the maximum number of Hybrid Automatic Repeat reQuest (HARQ) transmissions, and the periodic dedi- cated uplink resources for scheduling request transmission [13].

If the RRC connection setup is successfully received, then the MTD considers the random access procedure is successfully completed, and the connection with the BS is established. The MTD can then further request uplink resources from the BS for data transmission. A brief introduction of the uplink data transmission procedure in LTE networks is shown below, as illustrated in Fig. 1.3b:

1. For an MTD that has successfully completed the random access procedure, it would first transmit a scheduling request on the PUCCH to the BS to request uplink resources [18].

2. Upon receiving the scheduling request, the BS sends a scheduling grant on the Physical Downlink Control CHannel (PDCCH) to the MTD. The grant Chapter 1 11

includes all the transmission parameters that the MTD should use, for ex- ample, the transport block size, the resource block allocation in PUSCH and the modulation scheme [13].

3. Upon receiving the scheduling grant, the MTD can then transmit the data packets in the dedicated uplink resources. Along with the data packets, the MTD may also attach the Buffer State Reporting (BSR) message, which provides the information about the amount of pending data in the buffer of the MTD [18]. This information is useful for the BS in uplink scheduling process to determine the amount of resources to allocate to the MTD in future subframes [21].

4. If the BS receives the data correctly, then it sends the MTD a positive acknowledgment (ACK) on the Physical Hybrid ARQ Indicator CHannel (PHICH). Otherwise, the BS can adopt the non-adaptive retransmission scheme, in which it sends a negative acknowledgment on PHICH and the MTD then retransmits the data by using the set of resource blocks identical to the previous transmission [21].

Based on the BSR messages, the BS can keep track of the buffer status of the MTD and assign proper amount of resources to the MTD, i.e., Steps (2)-(4) in Fig. 1.3b are repeated until the data buffer of the MTD is cleared.

We can see from the above description that the access process of the LTE networks is connection-based random access, that is, a connection would first be established between a device and the BS before the device starts to transmit its data packets. Such a connection-based random access differs from the conventional packet-based random access in that the data packets do not contend for the channel individually. Instead, each device with data packets to transmit first sends a connection request to the BS, and if a device’s request is successfully received, then the BS will allocate resource blocks for the device to clear its data queue. 12 Chapter 1

1.3 Modeling and Performance Optimization of Massive Random Access of M2M Communi- cations in LTE Networks

The connection-based random access procedure adopted in the LTE networks is designed based on Aloha, where each MTD determines when to transmit the access request in a distributed manner. The access request fails when a collision occurs, i.e., two or more MTDs transmit the same preamble in the same PRACH subframe.

In conventional H2H communications, the collision issue is not serious because the number of devices, e.g., cellphones, requesting connection establishment at the same time is usually small. However, in M2M communications, thousands of MTDs might be deployed in each LTE cell, which may generate a massive number of simultaneous access requests. For example, in the utility meter reading reports, many meters transmit with high time correlation; In a railway bridge vibration sensing scenario, all sensors will be triggered and then transmit sensing data when a train passes by. In these applications, the MTDs may be idle for a long time but become active once an external event occurs [9]. In these cases, with massive access requests generated and transmitted via PRACHs, severe congestion will occur, leading to intolerably low access efficiency [22]. Considering the exponential increase in the number of MTDs [11], there is an urgent need to optimize the access efficiency of LTE networks for accommodating massive access from M2M communications.

This challenge has drawn wide attention in both academia and industry, and a lot of related works have been done on evaluating and improving the access performance of MTDs in LTE networks. In this section, a literature review in this field is presented.

1.3.1 Modeling Methodology

To understand the new challenges that M2M communications may pose to LTE networks, a plethora of models have been proposed for modeling the random access of M2M communications in LTE networks, most of which follow the classical analysis of Aloha. Chapter 1 13

In Aloha networks, due to the uncoordinated nature of transmitters, the ag- gregate traffic, i.e., the total number of requests in each time slot, in a random- access network varies with time. In Abramson’s landmark paper [23], the aggre- gate traffic of Aloha networks was modeled as a Poisson random variable with parameter G, based on which the network throughput, i.e., the average number of successful requests per time slot, can easily be obtained as Ge−G. Such an aggregate-traffic-centric modeling approach captures the essence of contention a- mong nodes, and has been widely adopted in the follow-up studies on various random-access networks [24–27]. For M2M communications in LTE networks, in addition to Poisson [28–31], Beta distribution was also adopted to model the number of requests (which were also referred to as “active MTDs” or “backlogged MTDs” in the literature) in the bursty scenarios [32–34]. However, the aggregate- traffic-centric modeling approach ignores the queueing behavior of each individual MTD. Little light can be shed on the effects of device-level input parameters such as the traffic input rate of each MTD on the network performance.

More refined models should therefore be established to include the queueing behavior of nodes. Various node-centric models have been proposed for Aloha networks, yet most of them lead to prohibitively high complexity when considering the interactions among nodes’ queues [35–37]. For M2M communications in LTE networks, queueing models for individual MTDs were established in [38] and [39] to evaluate the network performance under various backoff schemes. In both cases, iterative/recursive algorithms need to be adopted to solve the system equations, with which the computational complexity increases with the number of MTDs, rendering the models unscalable in massive access scenarios.

As pointed out in [40], [41], a random-access network can be regarded as a multi-queue-single-server system, and the key to performance analysis lies in proper characterization of the service time distribution, which is difficult to obtain with either each node’s queue completely ignored or interactions among nodes’ queues taken into full consideration. To reduce the modeling complexity, it was demonstrated in [40], [41] that a scalable node-centric model can be established by treating each node’s queue as an independent queueing system with identically distributed service time, which consists of two parts: 1) state characterization of each individual Head-Of-Line (HOL) packet; and 2) characterization of network steady-state points based on the fixed-point equations of limiting probability of successful transmission of HOL packets. The proposed modeling methodology 14 Chapter 1 has been successfully applied to various random-access networks, and shown to be accurate [42–45]. In most scenarios, the network steady-state points can be obtained as explicit functions of key system parameters such as the number of nodes and the backoff window size/transmission probability of each node, based on which the optimal network performance can further be characterized.

However, the above model cannot be directly applied to M2M communications in LTE networks. Specifically, a basic assumption of the aforementioned studies is that each single data packet in nodes’ queues has to contend for channel access. In LTE networks, however, as we have pointed out in Section 1.2.3, a connection would first be established between a device and the BS before the device starts to transmit its data packets [18]. The connection-based random access adopted in the LTE networks differs from the conventional packet-based random access in that the data packets do not contend for the channel individually. Thus, to properly model the massive random access of M2M communications in LTE networks, new scalable node-centric models for connection-based random access should be developed.

1.3.2 Performance Optimization

In the existing literature, two key performance metrics have been widely used for evaluating the access performance of MTDs in LTE networks, which are the access throughput, i.e., the average number of successful requests per time slot, and the access delay, i.e., the time spent from the generation of an access request until its successful transmission. Extensive works have shown that both the access throughput performance and the access delay performance of MTDs are crucially determined by the backoff parameters [46–50] and the amount of time-frequency resources that the BS allocates for access transmission [9, 51–55]. Therefore, a great deal of efforts have been devoted to studying how to improve the access performance by properly tuning backoff parameters or the amount of random access resources.

In LTE networks, the backoff parameters include the Access Class Barring (ACB) factor (i.e., the initial transmission probability of each MTD) and the Uniform Backoff (UB) window size. To tune the backoff parameters for improving the access efficiency, various algorithms were proposed to adaptively adjust the ACB factor [46–49] or the UB window size [50] based on the number of access requests in each time slot. Such information, however, is usually unavailable in Chapter 1 15 practice due to the uncoordinated nature of MTDs. Most efforts thus focused on developing algorithms to estimate the aggregate traffic according to the number of collision slots [47–49] or idle slots [50, 52] in each time slot. However, tracking the time-varying number of access requests is highly challenging and demanding for practical LTE systems.

Besides the backoff parameters, the access efficiency of the LTE networks is also crucially determined by the amount of random access resources [9], i.e., PRACH subframes, through which MTDs transmit access requests. To improve the access performance, in [51], a static resource allocation mechanism was pro- posed, in which different amounts of random access resources were assigned for different classes of MTDs depending on their priorities. In [52–55], dynamic re- source allocation mechanisms were proposed, in which the amount of random access resources was adaptively tuned according to the number of access requests in each time slot. By assuming that the MTDs with successful requests can always obtain sufficient data transmission resources to clear their data queues within one period of PRACH subframes, it was observed that the access performance could always be improved with more random access resources. Yet, the above studies ignore the crucial resource tradeoff in LTE networks, as shown in Section 1.2.2, that is, more frequent PRACH subframes lead to fewer resources for data trans- mission. Intuitively, with a lower data transmission rate, the data transmission time of MTDs would be prolonged, and newly generated access requests may not be accommodated until the ongoing data transmissions complete, resulting in low- er access efficiency. Therefore, it is of significant importance to characterize the effect of data transmission on the access performance of MTDs, which, however, has remained untouched.

1.3.3 Summary

In summary, despite great efforts on modeling and evaluating the access per- formance of M2M communications in LTE networks, a series of fundamental issues still remain open.

Firstly, existing models for the random access of M2M communications in LTE networks either exclude the device-level input parameters by ignoring the queueing behavior of each MTD, or become unscalable in the massive access scenarios, neither of which can facilitate the optimization of access performance of massive 16 Chapter 1

MTDs. Therefore, to analyze and optimize the massive random access performance of M2M communications in LTE networks, it is important to first establish a scalable node-centric model, which is able to capture the essence of connection- based random access and incorporate the queueing behavior of each MTD.

Secondly, although various algorithms have been proposed to tune backoff parameters for improving the access efficiency, how to optimize the access efficiency is less understood. Moreover, most of them require the realtime information of the time-varying number of access requests, which is difficult to collect. In practice, it would be desirable to develop optimal tuning of backoff parameters based on the statistical traffic information such as the traffic input rate of each MTD and the total number of MTDs, which is usually available at the BS.

Finally, in the existing studies, a widely adopted assumption is that each MTD with a successful access request can always clear its data queue within one period of PRACH subframes. This assumption, nevertheless, does not hold true in practical LTE networks because the amount of time-frequency resources allocated for data transmission is always finite and may not be sufficient for the MTDs to clear their data queues in time. It is, therefore, important to study how the access performance of MTDs is affected by limited resources of data transmission.

1.4 Thesis Contributions and Outline

This thesis is devoted to modeling and optimizing the access performance of M2M communications in LTE networks by addressing the fundamental open issues aforementioned.

Specifically, in Chapter2, we propose a new analytical framework for M2M communications in LTE networks. To capture the key feature of connection-based random access, a novel double-queue model for each MTD is established, where each MTD has one request queue and one data queue, and only the request queue is involved in the contention. Each newly arrival data packet in the data queue generates an access request in the request queue, while only one request can be kept. By treating each MTD’s request queue as an independent queueing system with identically distributed service time, a discrete-time Markov renewal process is established to characterize the behavior of each individual access request, where a data transmission state is introduced to describe the case of a data transmission Chapter 1 17

lasting for more than one time slot. The modeling complexity is independent of the number of MTDs even with the queueing behavior of each MTD taken into consideration, which is highly attractive in the massive access scenario.

In Chapter3 and Chapter4, we focus on the optimization of the access throughput and the access delay performance, respectively, and start the analy- sis by assuming that for each MTD, once its access request is successful, it can always clear its data queue within one time slot. In Chapter3, by deriving the access throughput as a function of key system parameters including the number of preambles M, the number of MTDs n, the traffic input rate of each MTD λ, the ACB factor q and the UB window size W , the access throughput is further maximized by optimally tuning the backoff parameters of each MTD, i.e., the ACB factor q and the UB window size W . Explicit expressions of the maximum access throughput and the corresponding optimal backoff parameters are obtained, which reveal that the maximum access throughput is solely determined by the number of preambles M, and yet to achieve it, either the ACB factor q or the UB window size W should be tuned based on the number of MTDs n, the traffic input rate of each MTD λ and the number of preambles M. It is shown that although the tunings of ACB factor and UB window size are equally effective in optimizing the access throughput performance, the latter is more robust against the variation of network size and traffic input rate.

In Chapter4, we focus on the optimization of the access delay performance of MTDs. Based on the probability generating function of the access delay, the first and second moments of access delay are obtained. The analysis shows that when the UB window size W = 1, the minimization of the second moment of access delay is equivalent to the minimization of the first moment of access delay, i.e., the mean access delay. Explicit expressions of the minimum mean access delay and the corresponding optimal ACB factor are obtained, which show that the minimum mean access delay linearly increases with the number of MTDs n and is inversely proportional to the number of preambles M when the aggregate traffic input rate of MTDs is large.

To further study the effect of data transmission on the access performance, in Chapter5, we relax the assumption of the infinite data transmission rate, and assume that the total number of data packets that can be transmitted in each time slot, denoted by β, is finite. Both the maximum access throughput and the corresponding optimal ACB factor are obtained as explicit functions of the data 18 Chapter 1

transmission rate β, the number of preambles M, the number of MTDs n and the traffic input rate of each MTD λ. The analysis shows that the maximum access throughput is a monotonic increasing function of the data transmission rate β. If the data transmission rate β is small, then the maximum access throughput decreases as the number of MTDs n grows, and superlinearly increases with the number of preambles M, which is in sharp contrast to that in the asymptotic case, where the maximum access throughput is independent of n and linearly increases with M. If the data transmission rate β is smaller than the aggregate traffic input rate of MTDs, then the maximum access throughput would be zero and the network becomes unstable as the data queues can never be cleared.

The remainder of this thesis is organized as follows. Chapter2 introduces the basic assumptions of this thesis and the double-queue model of each MTD. By assuming that the data transmission rate β = +∞, Chapter3 and Chapter 4 characterize the optimal access throughput and access delay performance, re- spectively. The effect of a finite data transmission rate β < +∞ on the optimal access throughput performance is analyzed in Chapter5. Chapter6 provides the conclusions and suggestions for future work. Chapter 2

System Model

This chapter presents the system model and basic assumptions which will be used throughout the analysis in the following chapters. It is organized as follows. Section 2.1 introduces the key system parameters that determine the access performance of MTDs in LTE networks. Section 2.2 describes the double- queue model of each MTD. The state characterization of each access request is presented in Section 2.3. Performance metrics are further defined in Section 2.4.

Consider a single-cell LTE system with n ∈ {1, 2,...} MTDs attempting to access the BS for uplink data transmission. Different from [56–60] where various access schemes were proposed for M2M communications, in this thesis, we focus on the random access process of the current LTE networks without assuming any modification to the standard. Moreover, out of the four steps of the random access process of LTE standard [18], the success of contention is mainly determined by the first step [9, 12]. Therefore, similar to [29, 30, 34, 38, 39, 46–49, 51, 52], in this thesis, we only focus on the access performance of the first step.

Specifically, in the random access process, each MTD randomly selects one out of M ∈ {1, 2,..., 64} orthogonal preambles and transmits via the PRACH to BS [18]. The PRACH consists of a series of subframes that appear periodically [16], as Fig. 2.1 shows. We define a time slot as the interval between two consecutive PRACHs. In each time slot, if more than one MTDs transmit the same preamble, then a collision occurs and all of them fail. The access request is successful if and only if there is one single MTD transmitting for a given preamble at each time slot. Upon successful access, the BS will assign the resources to the MTD for its data transmission.

19 20 Chapter 2

)UDPH )UDPH 6XEIUDPH

35$&+  35$&+ 

2QHWLPHVORW W VXEIUDPHV

Figure 2.1: Frame structure of the LTE system in the Frequency Division Duplex (FDD) mode.

2.1 Key System Parameters

In the massive access scenarios where a large number of MTDs transmit preambles simultaneously, collisions may frequently occur, leading to low chances of success. To improve the access efficiency, the system should be properly config- ured. In LTE networks, the access efficiency is mainly determined by the following key system parameters: 1) the number of preambles, 2) the backoff parameters, 3) the data transmission rate and 4) the time slot length. In this subsection, we will briefly introduce the above system parameters. Their effects on the access performance of MTDs will be analyzed in the following chapters.

1) The number of preambles: In LTE networks, preambles are a series of orthogonal sequences. Each time when an MTD wants to access the BS, it will transmit a randomly selected preamble, which is successful when no other MTDs select the same preamble. By virtue of the orthogonality of preambles, MTDs do not affect each other’s chance of successful access if they choose different preambles. Therefore, we can see that with more preambles, the chance of successful access should be improved as the probability that two or more MTDs choose the same preamble in a time slot decreases. Detailed discussion on the effects of the number of preambles M on the optimal access throughput and access delay performance of MTDs will be presented in the following chapters.

Since only the MTDs who share the same preamble would contend with each other, in this thesis, the analysis will start from the scenario where all MTDs share one preamble, i.e., M = 1, and then be extended to the multi-preamble scenario.

2) Backoff parameters: As the number of preambles is limited, frequen- t preamble collisions may occur in the massive access scenarios. To relieve the congestion, backoff schemes have been incorporated in LTE networks. Specifical- ly, according to the current standards [18, 66], each MTD needs to perform the ACB check before transmitting its access request. That is, the MTD generates a Chapter 2 21

random number between 0 and 1, and compares it with the ACB factor q ∈ (0, 1]. If the number is less than q, then the MTD proceeds to transmit the access re- quest. Otherwise, it is barred temporarily. Once the MTD passes the ACB check but involves in a collision, it randomly selects a value from {0,...,W }, and counts down until it reaches zero, where W is the UB window size in unit of time slots1.

Both the ACB factor q and the UB window size W crucially affect the access performance of MTDs. Intuitively, with heavy traffic, a small q or a large W can effectively reduce the average number of concurrent access requests in each time slot, hereby relieving the congestion. With light traffic, on the other hand, a large q or a small W leads to more chances of access for each MTD. Therefore, to optimize the access efficiency for massive M2M communications in LTE networks, it is of great practical importance to study how to properly tune the ACB factor q and the UB window size W according to the traffic condition. This is one of the key issues that we aim to address in the following chapters.

3) Data transmission rate: In LTE networks, MTDs attempt to access the BS for uplink data transmission. After the access request is successfully received, a connection will be established between the MTD and the BS, and then the BS will allocate resources to the MTD for its data transmission. The number of data packets that can be transmitted per time slot is determined by resource scheduling and link adaptation strategies. In this thesis, we assume that in each time slot, totally β ≥ 1 data packets can be transmitted, where β is referred to as the data transmission rate2.

Both the access and data transmission performance crucially depends on the data transmission rate β. In LTE networks, the number of MTDs that can transmit data packets concurrently in each time slot is limited. Therefore, with a small β, it may take long time for each MTD to clear its data buffer. The access efficiency would decrease because newly generated access requests may not be accommodated until the ongoing data transmission completes.

1 Note that the UB window size Ws in the LTE standard has the unit of milliseconds [18]. In a time-slotted system, it needs to be converted into the unit of time slots, which is denoted as  Ws  W ∈ {1, 2,...}, and we have W = τ + 1, where τ is the length of the time slot. 2It is worth mentioning that the LTE standard does not specify how the BS should allocate resources to MTDs [13]. In practice, the BS may adopt different kinds of resource scheduling algorithms. Despite the differences in the resource scheduling algorithms, their effect on the access performance of MTDs can be well captured by the total number of transmitted data packets in each time slot, i.e., data transmission rate β. 22 Chapter 2

In chapters3 and4, we will start by considering the asymptotic case with the data transmission rate β = +∞. In this case, each MTD with a successful access request can always clear its data queue in one time slot. This assumption has been widely adopted in the existing literature [38, 39, 58–60], and is a good approximation for light-traffic scenarios that are common for M2M communica- tions. In Chapter5, we will further characterize the effect of data transmission rate β on the optimal access performance of MTDs.

4) Time slot length: Note that the data transmission rate β is determined by the amount of resources scheduled for data transmission. A key system pa- rameter that determines how the resources are allocated between access and data transmission in LTE networks is the time slot length τ (in unit of subframes3). As we can see from Fig. 2.1, with a larger τ, there will be more subframes for data transmission in each time slot, which boosts the data transmission rate β. However, MTDs can access the channel less frequently, which may degrade the access efficiency. In light of this tradeoff, we will study how to properly tune the time slot length τ for optimizing the access performance of MTDs in Chapter5.

2.2 Double-Queue Model of Each MTD

Note that in LTE networks, for each MTD, a connection would first be es- tablished with the BS before it starts to transmit its data packets. Specifically, it generates an access request once it has data packets in the buffer. The access request stays until it is successfully transmitted, upon which the BS will assign sufficient resources for the MTD to clear its data buffer.

For such connection-based random access, we propose a double-queue model, that is, each MTD has one data queue and one request queue, as Fig. 2.2 illus- trates. Assume that the data buffer has an infinite size and the arrivals of data packets follow a Bernoulli process with parameter λ ∈ (0, 1). Each newly arrival data packet generates an access request, but only one request can be kept since each MTD can have at most one ongoing access request regardless of how many data packets in its buffer [18]. Each MTD’s request queue can then be modeled as a Geo/G/1/1 queue.

3According to the LTE standard [16], the length of one subframe is fixed to be one millisecond. Chapter 2 23

5HTXHVWTXHXH 07' 'DWDTXHXH Ă

5HTXHVWTXHXH 07' %6 'DWDTXHXH Ă Ă

5HTXHVWTXHXH 07' n 'DWDTXHXH Ă

Figure 2.2: Double-queue model of each MTD.

1 / Dtq  p t W

1 1  pt  pt 1 1qD  q D qDt  q D t qD p t t W t t T W 0 1 2 ĂĂ W-1 1 1 1 1

1 qDt p t H 1 / Dtq  p t W

Figure 2.3: Embedded Markov chain {Xj} of the state transition process of each individual access request.

Although each MTD has one request queue and one data queue, only the request queue is involved in the contention. In the following subsection, we will focus on the state transition process of each access request, i.e., the behavior of the head-of-line packet of the request queue.

2.3 State Characterization of Access Request

To model the behavior of each individual access request, a discrete-time

Markov renewal process (X, V) = {(Xj,Vj), j = 0, 1,...} is established, where

Xj denotes the state of a tagged access request at the j-th transition and Vj de- notes the epoch at which the j-th transition occurs. The states of {Xj} can be divided into three categories: 1) successful transmission (State T), 2) waiting to transmit (State i ∈ {0, 1,...,W − 1}) and 3) data transmission (State H). Fig. 2.3 shows the state transition process of each individual access request.

Note that with the number of preambles M = 1, an MTD can successfully transmit its access request only when no other MTD is in the data transmission state. Let αt denote the probability that no access request is in State H at time slot t, and pt denote the probability of successful transmission of access requests 24 Chapter 2 given that no access request is in State H at time slot t, t = 1, 2,.... As Fig. 2.3 illustrates, a fresh access request is initially in State T, and remains in State T if it passes the ACB check and is successfully transmitted4 given that no access request is in State H. If it passes the ACB check but encounters a collision, it then goes to State i ∈ {0, 1,...,W − 1}. In State i ∈ {1, 2,...,W − 1}, the access request counts down at each time slot until it reaches State 0. It leaves State 0 for State H if it passes the ACB check and is successfully transmitted given that no other access request is in State H. It eventually shifts from State H to State T when the data transmission finishes.

The steady-state probability distribution of the embedded Markov chain in Fig. 2.3 can be obtained as

  −1  π = 1 − qαp + 1 + (1−p)(W −1) ,  T qαp 2p   π = 1−qαp π , 0 qαp T (2.1)  πH = (1 − qαp)πT ,   (1−p)(W −j)πT πj = pW , j = 1, 2,...,W − 1, where α = lim αt is the steady-state probability that no access request is in State t→∞ H, and p = lim pt is the steady-state probability of successful transmission of t→∞ access requests given that no access request is in State H.

The interval between successive transitions, i.e., Vj+1−Vj, is called the holding time in State Xj, which solely depends on State Xj, j = 1, 2,.... Let τi denote the mean holding time in State i, where i ∈ {T,H, 0, 1,...,W − 1}. The holding time in State T and that in State k for k = 0, 1,...,W − 1 are one time slot, i.e.,

τT = τ0 = τ1 = ... = τW −1 = 1. (2.2)

On the other hand, the mean holding time in State H τH is determined by the data transmission rate β and the input rate of each MTD λ. Intuitively, with a larger β, the mean holding time of State H τH should decrease. Particularly, with β = +∞, the mean holding time of State H τH = 0. With a finite data transmission rate β,

τH > 0 and a detailed analysis of τH in this case will be presented in Chapter5.

4Note that a fresh access request would not enter State H if its transmission is successful because the data queue has only one data packet (i.e., the data queue was cleared when the previous access request was successfully transmitted), which can be cleared within one time slot. Chapter 2 25

Finally, the limiting state probability of the Markov renewal process (X, V) is given by

πiτi π˜i = P , (2.3) πj τj j∈S i ∈ S and S is the state space of X. Note that the probability of the access request

being in State T,π ˜T , is also the service rate of each MTD’s request queue as each request queue has a successful output if and only if the access request is in State T.

2.4 Performance Metrics

In this thesis, we aim to optimize the long-term access performance of M2M communications in LTE networks. Three key performance metrics are adopted:

ˆa • Access throughput λout, which is defined as the average number of successful access requests per time slot.

• Access delay DT , which is defined as the time spent from the generation of an access request until its successful transmission, in the unit of time slots.

ˆd • Data throughput λout, which is defined as the average number of transmitted data packets per time slot.

In Chapter3 and Chapter4, we will consider the asymptotic case with the data transmission rate β = +∞. In that case, for each MTD, once its access request is successful, it can always clear its data queue within one time slot, ˆd and the data throughput λout is thus equal to the aggregate traffic input rate. Accordingly, we only focus on the access performance, i.e., the access throughput in Chapter3 and the mean access delay of each MTD in Chapter4. Specifically, we will demonstrate how to maximize the access throughput and minimize the mean access delay of each MTD by tuning the backoff parameters for given number of MTDs n and input rate of each MTD λ. The effect of the number of preambles M on the optimal access throughput and access delay performance will also be investigated.

In Chapter5, we will consider the non-asymptotic case, where the data trans- mission rate β < +∞. With a finite data transmission rate, it may take more than 26 Chapter 2 one time slot for MTDs to clear their data queues, and the time slot length τ will determine a crucial resource tradeoff between the access and data transmission. Specifically, in Chapter5, we first evaluate the effect of the data transmission rate ˆa ˆd β on the access throughput λout and the data throughput λout, and then a more refined performance metric, the access throughput normalized by the time slot length τ, will be used to evaluate the effect of τ on the access throughput per- formance. The optimal time slot length for maximizing the normalized maximum access throughput will also be characterized. Chapter 3

Access Throughput Optimization

This chapter characterizes the maximum access throughput of M2M commu- nications in LTE networks and the corresponding optimal tuning of the backoff parameters when the data transmission rate β = +∞. This chapter is organized as follows. Section 3.1 presents a literature review of previous related work. The preliminary analysis is given in Section 3.2. Section 3.3 derives the network steady- state points. The maximum access throughput is further characterized in Section 3.4. The effects of outdated information on n and λ, and bursty arrivals of data packets on the maximum access throughput are discussed in Section 3.5. Section 3.6 summarizes this chapter.

3.1 Previous Work

It has been shown in Section 1.2 that for LTE networks, the random access process is designed based on Aloha [9], the simplest and one of the most rep- resentative random access schemes. The random-access network has long been observed that significant performance degradation occurs if backoff parameter- s are not properly selected. For Aloha networks, adaptive strategies have been developed to adjust the transmission probability of each node based on the real- time information of the aggregate traffic [61–63]. As such information is usually unknown at the transmitter side, decentralized control algorithms have been pro- posed to estimate the aggregate traffic [64], [65].

27 28 Chapter 3

To improve the probability of successful access of MTDs in LTE systems, various algorithms were also proposed to adaptively tune backoff parameters in- cluding the ACB factor [46–49] and the UB window size [50], or system resources including the number of preambles and the number of slots for random access [51, 52], according to the number of access requests in each time slot. Similar to Aloha networks, the effectiveness of adaptive tuning depends on how accurate the estimation of aggregate traffic is. Therefore, most efforts have been focused on developing estimation algorithms to track the time-varying number of access requests based on some measurable network status [47–52].

While the aforementioned developments have been substantial, how to opti- mally tune the backoff parameters of each device to maximize the access efficiency has remained largely unknown. The challenge originates from the lack of proper modeling of the random access process of LTE networks. As we mentioned in Section 1.3.1, existing models either exclude the device-level input parameters by ignoring the queueing behavior of each MTD [28–34], or become unscalable in the massive access scenarios [38], [39], neither of which can facilitate the optimization of access performance of massive MTDs. Moreover, most of the adaptive tuning algorithms were developed based on the estimation of time-varying network status [47–52], which in practice is difficult to track accurately. As we will demonstrate in this chapter, if the objective is to optimize the long-term network performance such as the access throughput, such estimation is indeed unnecessary. Instead, the optimal tuning of backoff parameters can solely be based on statistical information such as the traffic input rate of each device and the total number of devices.

Specifically, in this chapter, by characterizing the state transition of each ac- cess request, the network steady-state points are obtained as the non-zero roots of the single fixed-point equation of the limiting probability of successful transmission of access requests. The access throughput is further characterized, and maximized by properly choosing the backoff parameters including the ACB factor and the UB window size. The effects of outdated information on n and λ, and bursty arrivals of data packets on the maximum access throughput are also discussed Chapter 3 29

1 / q  pt W

1 p qp 1q  q t t W qp t T 0 1 2 ĂĂ W-1 1 p 1 1 1 1 1q  q t W 1 / q  pt W

Figure 3.1: State transition diagram of each individual access request with β = +∞.

3.2 Preliminary Analysis

In Chapter2, the system model has been presented and a discrete-time

Markov renewal process (X, V) = {(Xj,Vj), j = 0, 1,...} has been established to characterize the behavior of each individual access request, with the embed- ded Markov chain {Xj} of the state transition process of each individual access request shown in Fig. 2.3. Note that in this chapter, we specifically focus on the asymptotic scenario in which the data transmission rate β = +∞. That is, for each MTD, once its access request is successful, it can always clear its data queue within one time slot. Accordingly, the mean holding time in State H τH = 0 and the probability that no access request is in State H at time slot t αt = 1. By removing State H, the state transition diagram shown in Fig. 2.3 reduces to that in Fig. 3.1.

With α = 1, the steady-state probability distribution of the Markov chain in Fig. 3.1 can be obtained from (2.1) as

−1   1 (1−p)(W −1)   πT = + ,  qp 2p 1−qp (3.1) π0 = πT ,  qp  (1−p)(W −j)πT πj = pW , j = 1, 2,...,W − 1, where p = limt→∞ pt is the steady-state probability of successful transmission of access requests.

ˆa In this chapter, we are interested in the access throughput λout, which is de- fined as the average number of successful access requests per time slot. According to Fig. 2.2, the access throughput is determined by the aggregate service rate of n request queues. Based on the Geo/G/1/1 model of each request queue, the access 30 Chapter 3

throughput can be obtained as

ˆa ˆ λout = λ(1 − ρ), (3.2)

where λˆ = nλ denotes the aggregate input rate of MTDs, and ρ denotes the probability that each request queue is nonempty, which is given by [68]

ρ = λ . (3.3) λ+πT

By combining (3.1)–(3.3), we have

λˆa = λˆ . (3.4) out λˆ  1 (1−p)(W −1)  + +1 n qp 2p

ˆa We can see from (3.4) that the access throughput λout is closely determined by p, the steady-state probability of successful transmission of access requests. In the following section, we will specifically characterize the network steady-state points based on the fixed-point equation of p.

3.3 Steady-State Point Analysis

For any given MTD, its access request is successful if and only if all the other n − 1 devices are either with an empty request queue, or busy with a non-empty request queue but not transmitting. For each MTD, the probability that it has an empty request queue is 1 − ρ, and the probability that it has a non-empty request PW −1  queue but not transmitting is ρ j=1 πj + (1 − q)(π0 + πT ) , according to Fig. 3.1. The steady-state probability of successful transmission of access requests, p, can then be obtained as

W −1 !!n−1 X p = 1 − ρ + ρ πj + (1 − q)(π0 + πT ) j=1  n−1 ρπT = 1 − p . (3.5) Chapter 3 31

By combining (3.1), (3.3) and applying n − 1 ≈ n, (1 − x)n ≈ exp{−nx} for 0 < x < 1 if n is large, (3.5) can be approximated by

 

with a large n λˆ p ≈ exp − !  . (3.6)  λˆ  1 W −1  λˆ(W −1)  + +p 1− n q 2 2n

Theorem 3.1 shows that (3.6) has either one or three non-zero roots1.

Theorem 3.1. The fixed-point equation (3.6) of p has three non-zero roots 0 <   2 ˆ ˆ ˆ pA ≤ pS ≤ pL ≤ 1 if n > 2 q + W − 1 and λ1 ≤ λ ≤ λ2, where

λˆ = 2n , (3.7) 1 2 r  4  n− −W +1− n n− −2(W −1) q q   +W −1  −2n  exp  r  4   n− n n− −2(W −1)  q

λˆ = 2n . (3.8) 2 2 r  4  n− −W +1+ n n− −2(W −1) q q   +W −1  −2n  exp  r  4   n+ n n− −2(W −1)  q

Otherwise, (3.6) has only one non-zero root 0 < pL ≤ 1.

Proof. See AppendixA.

Note that not all the roots of (3.6) are steady-state points. We follow the approximate trajectory analysis proposed in [40], and find that:

1. If (3.6) has only one non-zero root pL, then pL is a steady-state point;

2. If (3.6) has three non-zero roots pA ≤ pS ≤ pL, then only pL and pA are

steady-state points. Similar to [69], we refer to pL as the desired steady-

state point and pA as the undesired steady-state point.

1Note that it was also observed in [45, 67] that for Aloha and CSMA networks with a finite retry limit of HOL packets, the fixed-point equation of steady-state points may have one or three non-zero roots. Yet they should be distinguished from this thesis as they assume packet-based random access, rather than connection-based random access. 32 Chapter 3

n Ö O

%LVWDEOH5HJLRQ 0RQRVWDEOH5HJLRQ %

Ö O

  OÖ

Figure 3.2: Bistable region B and monostable region M.

0 0 10 10

-1 -1 10 10 W = 80 W = 60 -2 -2 10 q = 0.04 10

W = 40 -3 -3 p 10 q = 0.06 p 10

-4 -4 10 q = 0.08 10

-5 -5 W = 20 10 q = 0.1 10 pL pL pA pA -6 -6 10 10 0.01 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0.01 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 Oˆ Oˆ (a) (b)

Figure 3.3: Steady-state points pL and pA versus the aggregate input rate λˆ. M = 1. n = 100. (a) W = 1, q ∈ {0.04, 0.06, 0.08, 0.1}. (b) q = 1,W ∈ {20, 40, 60, 80}.

3.3.1 Bistable Region and Monostable Region

It is clear from Theorem 3.1 that the number of steady-state points is deter- mined by the number of MTDs n, the aggregate input rate of MTDs λˆ, the ACB factor q and the UB window size W . Accordingly, we can define the following stable regions:

n o ˆ 2  ˆ ˆ ˆ • Bistable region B = (n, λ, q, W )|n > 2 q + W − 1 , λ1 ≤ λ ≤ λ2 , in

which the network has two steady-state points pL and pA.

• Monostable region M = B¯, in which the network has only one steady-

state point pL. Chapter 3 33

0 0 10 10

-1 q = 0.1 -1 10 q = 0.06 q = 0.04 10 W = 20 W = 40 W = 60 W = 80

-2 q = 0.08 -2 10 10

-3 -3 p 10 p10

pL -4 p -4 10 A 10

-5 -5 10 10 pL pA -6 -6 10 10 50 100 150 200 n 250 300 350 400 50 100 150 200 n 250 300 350 400 (a) (b)

Figure 3.4: Steady-state points pL and pA versus the number of MTDs n. M = 1. λˆ = 0.4. (a) W = 1, q ∈ {0.04, 0.06, 0.08, 0.1}. (b) q = 1,W ∈ {20, 40, 60, 80}.

A graphical illustration of the bistable region B and monostable region M is presented in Fig. 3.2. It can be observed from Fig. 3.2 that when n ≤  2  2 q + W − 1 , the network always falls into the monostable region M and oper- ˆ ates at the desired steady-state point pL, regardless of the aggregate input rate λ. On the other hand, if the aggregate input rate λˆ ≥ 4e−2 , then the network W −1 −2 1+ 2 e +W −1 q stays in the monostable region M, regardless of the number of MTDs n.

Corollary 3.2 further summarises the monotonicity property of the steady- state points with regard to the aggregate input rate λˆ, the number of MTDs n, the ACB factor q and the UB window size W .

Corollary 3.2. The steady-state points pL and pA are monotonic decreasing func- tions of λ,ˆ n and q, and monotonic increasing functions of W .

Proof. See AppendixB.

Fig. 3.3 demonstrates how the steady-state points pL and pA vary with the aggregate input rate λˆ under different values of the ACB factor q and the UB window size W . It can be seen from Fig. 3.3 that when the aggregate input rate λˆ is low, with a smaller ACB factor q or larger UB window size W , the network has a higher chance of falling into the monostable region with a single steady-state

point pL. As q increases or W decreases, the network may shift to the bistable

region with two steady-state points pL and pA. Similarly, Fig. 3.4 demonstrates

how the steady-state points pL and pA vary with the number of MTDs n. It can 34 Chapter 3 be seen from both Fig. 3.3 and Fig. 3.4 that as the aggregate input rate λˆ or the number of MTDs n increases, the network may first move from the monostable region to the bistable region, and eventually stays at the monostable region, as Fig. 3.2 illustrates.

Fig. 3.3 and Fig. 3.4 also corroborate Corollary 3.2 that both steady-state ˆ points pL and pA decrease with the ACB factor q, the aggregate input rate λ and the number of MTDs n, and increase with the UB window size W . A closer look at Fig. 3.3 shows that with a high aggregate input rate λˆ, e.g., λˆ > 0.8, the steady- ˆ state points pL and pA become insensitive to the increment of λ. In contrast, as shown in Fig. 3.4, when the number of MTDs n is large, both steady-state points rapidly decrease as n increases.

3.3.2 Simulation Results

The above analysis is verified by the simulation results presented in Fig. 3.5 and Fig. 3.6. The simulation setting is the same as the system model described in Chapter2 with the data transmission rate β = +∞ and we omit the details here. Each simulation is carried out for 108 time slots. In simulations, we count the total number of transmitted access requests from all MTDs and the total number of successful access requests. The steady-state probability of successful transmission of access requests p is then obtained by calculating the ratio of the number of successful access requests to the total number of transmitted access requests.

Specifically, it has been demonstrated that in the monostable region M, the network has only one steady-state point pL; in the bistable region B, the network has two steady-state points, i.e., the desired steady-state point pL and the unde- sired steady-state point pA. Both pL and pA are non-zero roots of the fixed-point equation (3.6) of the steady-state probability of successful transmission of access requests p. As Fig. 3.5 illustrates, with the aggregate input rate λˆ = 0.3 and the number of MTDs n = 100, the network operates at the monostable region M when the ACB factor q ∈ (0, 0.053) for W = 1 and W ∈ (38, +∞) for q = 1. As q increases or W decreases, the network will move to the bistable region B, and may drop from the desired steady-state point pL to the undesired steady-state ˆ point pA. Moreover, when the aggregate input rate λ is sufficiently high, e.g., Chapter 3 35

0 %  0  % 10 10

-1 -1 10 10 p = p L p = p L

-2 -2 10 10 p = p -3 -3 A p 10 p 10

-4 -4 10 10 p = p A

-5 -5 10 10 Analysis Analysis Simulation Simulation -6 -6 10 10 0.01 0.02 0.03 0.04 0.053 0.06 0.07 0.08 0.09 0.1 0.11 0.12 20 38 60 80 100 120 140 160 180 200 220 240 260 280 300 320 340 360 380 400 q W (a) (b)

Figure 3.5: Steady-state probability of successful transmission of access re- quests p versus the ACB factor q and the UB window size W . M = 1. λˆ = 0.3. n = 100. (a) W = 1. (b) q = 1.

0 % 0 % 10 10

-1 n = 100 -1 10 p = p L Analysis 10 Simulation p = p -2 -2 L 10 n = 200 10 Analysis Simulation -3 -3 p 10 p 10 n = 100 Analysis Simulation -4 -4 10 10 n = 200 Analysis Simulation -5 -5 10 10

-6 -6 10 10 0.01 0.02 0.03 0.04 0.05 0.06 0.07 0.08 0.09 0.1 0.11 0.12 20 40 60 80 100 120 140 160 180 200 220 240 260 280 300 320 340 360 380 400 q W (a) (b)

Figure 3.6: Steady-state probability of successful transmission of access re- quests p versus the ACB factor q and the UB window size W . M = 1. λˆ = 0.6. n ∈ {100, 200}. (a) W = 1. (b) q = 1.

λˆ ≥ 4e−2 ≈ 0.54, Fig. 3.2 has shown that the network will stay in the monos- table region regardless of the number of MTDs n. As we can see from Fig. 3.6, ˆ with λ = 0.6, the network always operates at the desired steady-state point pL. Simulation results presented in Fig. 3.5 and Fig. 3.6 well agree with the analysis.

3.4 Access Throughput Analysis

It has been shown in Section 3.2 and Section 3.3 that the access throughput ˆa λout is crucially determined by the steady-state probability of successful trans- mission of access requests p, which is a function of the number of MTDs n, the 36 Chapter 3

n

8QDFKLHYDEOH 8QFHUWDLQ $FKLHYDEOH

5HJLRQ + & 5HJLRQ +- 5HJLRQ +

§e · n¨ ¸  ©OÖ ¹

   e  e OÖ

Figure 3.7: Unachievable region SN , achievable region SA and uncertain re- gion SU .

aggregate input rate of MTDs λˆ, the ACB factor q and the UB window size W . Typically, n and λˆ are system input parameters. Therefore, in this section, we focus on optimizing the access throughput by tuning backoff parameters including q and W for given n and λˆ.

3.4.1 Maximum Access Throughput with M = 1

ˆa ˆa Define the maximum access throughput as λmax = max λout. The following (q,W ) ˆa theorem presents the maximum access throughput λmax and the optimal setting of q∗ and W ∗.

ˆa −1 Theorem 3.3. The maximum access throughput λmax = e , which is achieved if ∗ ∗ and only if the network operates at the desired steady-state point pL, and (q , W ) together satisfy −1  −1  1 + 1−e (W ∗ − 1) = n 1 − e . (3.9) q∗ 2 λˆ

Proof. See AppendixC.

 −1  We can see from Theorem 3.3 that when n 1 − e < 1, the maximum λˆ ˆa access throughput λmax cannot be achieved, since (3.9) does not hold for any q ∈ (0, 1] and W ≥ 1. On the other hand, when the aggregate input rate λˆ ≥ 4e−2 ≥ 4e−2 , Fig. 3.2 shows that the network is guaranteed to operate W −1 −2 1+ 2 e +W −1 q ˆa at the desired steady-state point pL. In this case, λmax can always be achieved if  −1  n 1 − e > 1, and q and W are properly tuned based on (3.9). Accordingly, λˆ we can define the following regions of (n, λˆ), which are illustrated in Fig. 3.7: Chapter 3 37

a 1 ˆ ˆa 1 Omax e Omax e 0.3 0.3

0.2 0.2 a out ˆ a

O out 0.1 ˆ O 0.1

0 0 200 200 160 1 160 1 120 0.8 120 0.8 0.6 0.6 80 0.4 80 0.4 40 0.2 q 40 0.2 W 1 0.01 W 1 0.01 q (a) (b)

Oˆa out p p L ˆa 1 Omax e 0.3 a

out 0.2 a

ˆ ˆ O O out p p A 0.1

200 160 1 120 0.8 0.6 80 0.4 40 0.2 q W 1 0.01 (c)

ˆa Figure 3.8: Access throughput λout versus the ACB factor q and the UB ˆ ˆ ˆ window size W . M = 1. n = 100. (a) λ = 0.3, (n, λ) ∈ SN . (b) λ = 0.6, ˆ ˆ ˆ (n, λ) ∈ SA. (c) λ = 0.4, (n, λ) ∈ SU .

n  −1  o • Unachievable region S = (n, λˆ)|n 1 − e < 1 , in which λˆa is N λˆ max unachievable regardless of what values of q and W are chosen. Intuitively, ˆa −1 to achieve the maximum access throughput λmax = e , the aggregate input ˆ ˆ e−1 −1 rate λ needs to be sufficiently large, i.e., λ > 1 ≈ e for large n. As we 1− n ˆ ˆa can see from Fig. 3.8a, with λ = 0.3, the access throughput λout is always ˆa ˆ below λmax as (n, λ) ∈ SN .

n  −1  o • Achievable region S = (n, λˆ)|n 1 − e ≥ 1, λˆ ≥ 4e−2 , in which A λˆ ˆa λmax can be achieved when q and W are tuned according to (3.9). As we ˆ can see from Fig. 3.8b, with (n, λ) ∈ SA, since the network is guaranteed

to operate at the desired steady-state point pL, the access throughput is ˆa maximized at λmax as long as (3.9) holds. In this case, the maximum access ˆa throughput λmax can be achieved by either tuning the ACB factor q or the UB window size W . For instance, if W is fixed to 1, then the optimal ACB 38 Chapter 3

∗ factor qW =1 can be obtained from (3.9) as

q∗ = λˆ . (3.10) W =1 n(λˆ−e−1)

∗ Similarly, if q is fixed to 1, then the optimal UB window size Wq=1 can be obtained from (3.9) as

 ne−1  2 n− −1 ∗ λˆ Wq=1 = 1−e−1 + 1. (3.11)

n  −1  o • Uncertain region S = (n, λˆ)|n 1 − e ≥ 1, λˆ < 4e−2 , in which the U λˆ network may operate at the desired steady-state point pL or the undesired ˆa steady-state point pA, and λmax is achievable only if the network operates at ˆa pL. As we can see from Fig. 3.8c, the access throughput λout may drastically

degrade if the network drops to the undesired steady-state point pA, in which case the maximum access throughput cannot be achieved.

3.4.2 Extension to Multi-Preamble M > 1

Note that the analysis in previous sections is based on the assumption that all n MTDs share one preamble, i.e., M = 1. In this subsection, the analysis will be extended to the multi-preamble scenario in which n MTDs choose M > 1 preambles.

By virtue of orthogonality among preambles, only the MTDs who share the same preamble contend with each other. Accordingly, the MTDs in the network can be divided into M groups according to the preamble each MTD chooses. By doing so, we can extend the previous analytical model to a multi-group one, with the group parameters defined as follows:

(i) PM (i) • n denotes the number of MTDs in Group i, i = 1, 2,...,M, and i=1 n = n.

• λˆ(i) denotes the aggregate input rate of MTDs in Group i, and λˆ(i) = n(i)λ, where λ is the input rate of each MTD.

• q(i) denotes the ACB factor of each MTD in Group i.

• W (i) denotes the UB window size of each MTD in Group i. Chapter 3 39

For each group, denote p(i) as the steady-state probability of successful trans- mission of access requests for MTDs in Group i, i = 1, 2,...,M. By replacing n, λ,ˆ q, W in (3.6) with n(i), λˆ(i), q(i),W (i), the steady-state points of Group i, i.e., (i) (i) ˆ(i),a pL and pA , can be obtained. Similarly, denote λout as the aggregate throughput of MTDs in Group i, i = 1, 2,...,M, which can be calculated based on (3.4) by replacing n, λ,ˆ q, W with n(i), λˆ(i),a, q(i),W (i). According to Theorem 3.3, the maxi- (i) −1 mum group throughput λˆmax = e , which is achieved when the group steady-state (i) (i) (i) (i) point is at pL , and q and W are chosen according to (3.9) for given n and ˆ(i) ˆM,a PM ˆ(i),a λ . The access throughput with M preambles is then given by λout = i=1 λout , which is maximized at ˆM,a −1 λmax = Me , (3.12)

(i),a −1 when all the groups achieve the maximum group throughput λˆmax = e , i = 1, 2,...,M.

Note that according to the standard, each MTD independently and ran- domly selects a preamble in each access attempt [18]. Therefore, the group size n(i), i = 1, 2,...,M, may change over time. Nevertheless, when the total number (i) (i) n of MTDs n is large, n can be approximated by n ≈ M . In this case, the access ˆ (i) n ˆ(i) nλ throughput can be obtained by replacing n and λ with n ≈ M and λ ≈ M in (3.4), respectively, as

M X λˆM,a = n 1 . (3.13) out M 1 (1−p(i))(W (i)−1) 1 + + i=1 q(i)p(i) 2p(i) λ

Moreover, the optimal setting q∗,M ,W ∗,M  for achieving the maximum access ˆM,a −1 ˆ throughput λmax = Me can be obtained from (3.9) by replacing n and λ with (i) n ˆ(i) nλ n ≈ M and λ ≈ M , respectively, as

1 1−e−1 ∗,M  n e−1 q∗,M + 2 W − 1 = M − λ . (3.14)

∗,M Specifically, with W = 1, the optimal ACB factor qW =1 with M preambles can be written as ∗,M λ qW =1 = nλ . (3.15) −e−1 M ∗,M With q = 1, the optimal UB window size Wq=1 with M preambles can be written as  n e−1  2 − −1 ∗,M M λ Wq=1 = 1−e−1 + 1. (3.16) 40 Chapter 3

ˆa 1 ˆa 1 Omax e Omax e 0.35 0.35

0.3 0.3 Oˆ 0.6 0.25 0.25 Analysis Simulation Oˆ 0.3 ˆa 0.2 0.2 Analysis ˆ 0.8 a O a

out O out p p L out ˆ Simulation ˆ O O Analysis 0.15 0.15 Simulation Oˆ 0.4 * Analysis denotes q 0.1 0.1 × W 1 Simulation ˆa 0.05 ˆa 0.05 Oout p p O L out p p A 0 0 0.01 0.018× ×0.026 0.04 0.05 0.06 0.07 0.08 0.09 0.1 0.11 0.12 0.01 0.02 0.03 0.04 0.05 0.06 q 0.07 0.08 0.09 0.1 0.11 0.12 q (a) (b)

ˆa 1 ˆa 1 Omax e Omax e 0.35 0.35

0.3 0.3 Oˆa out p p L 0.25 0.25 ˆ ˆa O 0.3 0.2 O 0.2 ˆ

a 0.6 a out p p

Analysis out out L O ˆ ˆ O Simulation O Analysis 0.15 0.15 Simulation ˆ 0.4 O ˆ 0.1 Analysis 0.1 O 0.8 Simulation Analysis 0.05 ˆa 0.05 Simulation Oout p p A denotes W * × q 1 0 0 20 40 60 80 100 120 140 160 180 200 220 240 260 280 300 320 340 360 380 400 20 40 60 80 100 120× 140 168× 200 220 240 260 280 300 320 340 360 380 400 W W (c) (d)

ˆa Figure 3.9: Access throughput λout versus the ACB factor q and the UB window size W . M = 1. n = 100. λˆ ∈ {0.3, 0.4, 0.6, 0.8}. (a)-(b) W = 1. (c)-(d) q = 1.

Note that (3.15) and (3.16) reduce to (3.10) and (3.11), respectively, when M = 1. ∗,M ∗,M It can be clearly seen from (3.15) and (3.16) that qW =1 and Wq=1 are monotonic increasing and decreasing functions of the number of preambles M, respectively, indicating that the ACB factor q and the UB window size W should be adaptively increased or reduced as more preambles are adopted.

3.4.3 Simulation Results

The above analysis is verified by the simulation results presented in Fig. 3.9– 3.11. In simulations, each MTD independently and randomly selects one out of M orthogonal preambles in each access attempt. We count the total number of successful access requests in each simulation run, i.e., 108 time slots, and then Chapter 3 41

ˆM 10, a  1 ˆM 10, a  1 Omax 10 e Omax 10 e 3.5 3.5

3 3

2.5 M 6 2.5 Analysis ˆM 6, a  1 ˆM 6, a  1 Omax 6e Simulation Omax 6e 2 2 a a , M 10 , M 6 M M out out

ˆ Analysis O 1.5 Analysis ˆ O 1.5 Simulation Simulation *, 1 denotes q M 1 × W 1 M 10 Analysis 0.5 0.5 Simulation

*, M denotes Wq 1 0 0 × 0.005×0.009 0.026× 0.04 0.05 0.06 0.07 0.08 0.09 0.1 10 50 120× 200 250 331× 400 450 500 550 600 650 700 750 800 q W (a) (b)

ˆM,a Figure 3.10: Access throughput λout versus the ACB factor q and the UB window size W . n = 1000. λ = 0.006. M ∈ {6, 10}. (a) W = 1. (b) q = 1. obtain the access throughput by calculating the ratio of the number of successful access requests to the number of time slots 108.

ˆa Specifically, the expression of access throughput λout with the number of preambles M = 1 has been given in (3.4), which is determined by the ACB factor q, the UB window size W , the number of MTDs n and the aggregate input rate λˆ. ˆa Fig. 3.9a-b illustrate how the access throughput λout varies with the ACB factor q with the UB window size W = 1 and the number of MTDs n = 100. In Fig. ˆ ˆ 3.9a, when the aggregate input rate λ is 0.3, we have (n, λ) ∈ SN , in which the ˆa maximum access throughput λmax cannot be achieved regardless of what value of ˆ ˆ ˆa q is chosen. On the other hand, with λ = 0.4, we have (n, λ) ∈ SU , in which λmax again cannot be achieved, because the network shifts to the undesired steady-state point pA as the ACB factor q increases. In Fig. 3.9b, as the aggregate input rate ˆ ˆ ˆa λ increases to 0.6 or 0.8, we have (n, λ) ∈ SA, where λmax can be achieved when q ∗ is tuned according to (3.10), i.e., q = qW =1. Similar observations can be obtained ˆa from Fig. 3.9c-d, where the maximum access throughput λmax is achieved when ˆ ˆ ∗ (n, λ) ∈ SA, i.e., λ = 0.6 or 0.8 with n = 100, and the UB window size W = Wq=1, which is given in (3.11).

ˆM,a The expression of the access throughput λout with the number of preambles M > 1 has been given in (3.13). Fig. 3.10 illustrates how the access throughput ˆM,a λout varies with the ACB factor q and the UB window size W with M = 6 and 10. A perfect match between simulation results and the analysis can be observed, (i) n which verifies that n ≈ M , i = 1, 2,...,M, can serve as a good approximation when the number of MTDs n is large. Moreover, we can see that the maximum 42 Chapter 3

1 10 ˆM 10, a  1 Omax 10 e ˆM 6, a  1 Omax 6e 0 *, M *, M 10 q q W 1 W W q 1 Analysis Analysis -1 Simulation Simulation 10 M=10

-2 10 a , M

out -3

ˆ q 1, W 81 O 10 Analysis Simulation -4 10 M=6

-5 10 q 0.5, W 21 Analysis

-6 Simulation 10 1000 2000 3000 4000 n 5000 6000 7000 8000

ˆM,a Figure 3.11: Access throughput λout versus the number of MTDs n. λ = 0.006. M ∈ {6, 10}.

ˆM,a access throughput λmax linearly increases with the number of preambles M, and ∗,M can be achieved by either tuning the ACB factor q according to qW =1 in (3.15), or ∗,M the UB window size W according to Wq=1 in (3.16).

Note that in the current standard setting, the ACB factor q and the UB win- dow size W are preselected from a certain range [18]. To see the performance loss without adaptive tuning of q and W , Fig. 3.11 illustrates the access throughput performance with two representative settings of parameters: {q = 0.5,W = 21} and {q = 1,W = 81} [70].2 It can be clearly observed that in both cases, the ˆM,a access throughput λout quickly deteriorates as the number of MTDs n increases, ˆM,a and becomes much lower than the maximum access throughput λmax when n is large. In sharp contrast, if the ACB factor q or the UB window size W is optimally ∗,M ∗,M ˆM,a selected, i.e., q = qW =1 or W = Wq=1 , the maximum access throughput λmax can always be achieved, which does not vary with the number of MTDs n. It corrob- orates that adaptive tuning of backoff parameters is indispensable especially for massive access scenarios.

2 Note that in the standard [18], the values of UB window size Ws are given in unit of mil- liseconds. If the PRACH configuration index is 14, for instance, the time slot length τ = 1 msec [16], and then W = 21 and W = 81 are corresponding to Ws = 20 msec and Ws = 80 msec, respectively. Chapter 3 43

5 5 4.5 4.5 4 ˆM 10, a  1 4 ˆM 10, a  1 Omax 10 e Omax 10 e 3.5 3.5 3 3 a a , , M M out 2.5 out 2.5 ˆ O ˆ O 2 2 1.5 1.5 1 1 *, M *, M q q W 1 q q W 1 0.5 *, M 0.5 *, M W W q 1 W W q 1 0 0 50% 40% 30% 20% 10% 0 10% 20% 30% 40% 50% 50% 40% 30% 20% 10% 0 10% 20% 30% 40% 50% J n J O (a) (b)

ˆM,a Figure 3.12: Simulated access throughput λout versus the relative errors γn ˜ and γλ. M = 10.n ˜ = 1000. λ = 0.01. (a) γλ = 0. (b) γn = 0.

3.5 Discussions

In this section, we will further discuss how the optimal access throughput performance is affected by practical network conditions such as the outdated in- formation on the number of MTDs n and the input rate of each MTD λ, and the bursty traffic.

3.5.1 Effect of Outdated Information on n and λ

So far we have shown that to optimize the access throughput performance, the backoff parameters of MTDs should be adaptively tuned according to the number of MTDs n and the input rate of each MTD λ. In practice, the BS can count the total number of MTDs3, collect the traffic input rate information from the feedback of MTDs, calculate the optimal backoff parameters based on (3.14), and broadcast the optimal configuration via the system information block. Each MTD then updates its backoff parameters accordingly.

Due to the constant change of network states, sometimes the BS may not be able to update the information on the total number of MTDs n and the input rate

3Note that here the total number of MTDs should be distinguished from the number of active MTDs, which is usually assumed in the literature [28–34, 46–52]. Specifically, the BS can easily keep a record of registered MTDs without knowing if they are active or not at each time slot. In contrast, tracking and estimating the time-varying number of active MTDs can be highly challenging and demanding. 44 Chapter 3

of each MTD λ in time. To see how much the access throughput may degrade with outdated information on n and λ, we define γ = n˜−n and γ = λ˜−λ as the relative n n˜ λ λ˜ error on n and λ, respectively, wheren ˜ and λ˜ denote the outdated information on the number of MTDs and the input rate of each MTD at the BS, respectively. ∗,M ∗,M Suppose that the optimal backoff parameters qW =1 and Wq=1 are calculated based onn ˜ and λ˜ according to (3.15) and (3.16), respectively. Fig. 3.12 presents the simulation results of the corresponding access throughput under various values of relative errors γn and γλ.

It can be clearly seen from Fig. 3.12a that due to outdated information of the number of MTDs, the access throughput would deflect from the maximum value, and the degradation becomes more significant as the relative error γn increases. Recall that it has been shown in Fig. 3.4 that both steady-state points are quite sensitive to the change of the number of MTDs n. Therefore, the access throughput may quickly drop when n is not updated in time. On the other hand, Fig. 3.3 shows that when the aggregate input rate λˆ is large, the steady-state points become insensitive to λˆ. As a result, the access throughput can stay at the maximum value

even with the relative error γλ as large as ±50%, as Fig. 3.12b illustrates. We can also see from Fig. 3.12 that although the maximum access throughput can be achieved by either tuning the ACB factor q or the UB window size W , the throughput performance is more sensitive to the relative errors with the optimal tuning of q than W . It suggests that the optimal tuning of W is more robust against the variation of network size and traffic input rate.

3.5.2 Effect of Bursty Arrivals of Data Packets

Note that the preceding analysis is based on the assumption that data packet arrivals of each MTD independently follow a Bernoulli process. In practical M2M communication scenarios, packet arrival processes could be bursty in some cases [22]. Hence, in this subsection, we will investigate the effect of bursty arrivals on the optimal access throughput performance.

There are two kinds of burstiness: temporal burstiness and spatial burstiness. As Fig. 3.13a illustrates, temporal burstiness means that a continuous stream of packets is generated in a short time period for a given MTD. On the other hand, spatial burstiness means that multiple MTDs generate packets in a synchronous manner, as Fig. 3.13b shows. To capture the temporal burstiness, the data packet Chapter 3 45

MTD 1:

t (Time slot) 0100 200 300 400 500 600 700 800900 1000

MTD 2:

t (Time slot) 0100 200 300 400 500 600 700 800900 1000 (a)

MTD 1:

t (Time slot) 0100 200 300 400 500 600 700 800900 1000

MTD 2:

t (Time slot) 0100 200 300 400 500 600 700 800900 1000 (b)

Figure 3.13: Illustration of data packet arrival processes at two tagged MTDs. σ0 = 0.005. λ0 = 0.006. σ1 = 0.005. λ1 = 1. (a) Temporal burstiness. (b) Spatial burstiness.

5 5 1 1 ˆM 10,a 10e ˆM 10,a 10e O ax O x 4 m 4 ma

3 3 a a , , M M out out 2 2 ˆ ˆ O O 1 1

0 0 1 1 0.8 *, 0.8 q q M *, M 0.6 W 1 0.6 W W q 1 0.4 0.4 T 0.8 0.9 1 T 0.8 0.9 1 0.2 0.6 0.7 0.2 0.6 0.7 0.3 0.4 0.5 0.3 0.4 0.5 0 0 0.1 0.2 M 0 0 0.1 0.2 M (a) (b)

ˆM,a Figure 3.14: Simulated access throughput λout versus the synchronization ratio θ and the frequency of bursty arrivals ϕ. M = 10. n = 1000. σ0 = 0.005. ∗,M ∗,M λ0 = 0.006. λ1 = 1. (a) q = qW =1. (b) W = Wq=1 . arrival process of a single MTD is modeled as a two-state Markov Modulated

Bernoulli Process (MMBP) {(Xt,Yt), t = 1, 2,....}, where Xt ∈ {0, 1} and Yt ∈ {0, 1} denote the number of arrivals and the phase of MMBP at time slot t, respectively. We refer to Yt = 1 as the bursty phase and Yt = 0 as the regular phase. Assume that the bursty phase and regular phase have packet arrival rates of λ1 = 1 and λ0  λ1, respectively, and last for a geometrically distributed amount of time slots with parameter σ1 and σ0, respectively. To capture the spatial burstiness, assume that ns out of n MTDs have identical data packet arrival 46 Chapter 3

processes, i.e., they are all driven by a common MMBP {(Xt,Yt), t = 1, 2,....}, and the remaining MTDs have independent data packet arrival processes. Define 1 σ1 the frequency of bursty arrivals as ϕ = 1 1 , and the synchronization ratio as + σ1 σ0 ns θ = n . Apparently, a large ϕ and θ indicate high temporal burstiness and spatial burstiness, respectively.

Fig. 3.14 presents the simulation results of access throughput with bursty arrivals under various values of the synchronization ratio θ and the frequency of ∗,M ∗,M bursty arrivals ϕ. We set the backoff parameters q and W as qW =1 and Wq=1 ,

respectively, which are calculated based on (3.15) and (3.16) with λ = ϕλ1 +

(1 − ϕ)λ0. We can observe from Fig. 3.14 that the access throughput is close to the maximum value within a wide range of θ and ϕ. The simulation results corroborate that by optimally tuning the ACB factor q or the UB window size W , the bursty input traffic can be sufficiently randomized. Therefore, the maximum access throughput can be achieved even when the input traffic has a high degree of temporal burstiness and spatial burstiness.

3.6 Summary

In this chapter, we study how to optimize the access throughput performance of M2M communications in LTE networks by properly tuning backoff parameters when the data transmission rate β = +∞. Starting from the single-preamble case, the analysis shows that the network can either have one or two steady-state points, depending on whether it operates at the monostable or bistable region. The access throughput is derived as an explicit function of the network steady- state points, and optimized by properly adjusting the backoff parameters of MTDs including the ACB factor q and the UB window size W according to the number of MTDs and the traffic input rate of each MTD. The analysis is further extended to the multi-preamble scenario, where explicit expressions of the maximum access throughput and the corresponding optimal backoff parameters are both obtained.

The analysis sheds important light on practical network design for supporting massive access of M2M communications in LTE networks. Specifically, it shows that a preselection of the ACB factor q and the UB window size W always leads to severe degradation of access throughput as more MTDs attempt to access the BS. Only by optimally tuning q or W can the access throughput remain at the highest Chapter 3 47 level regardless of how many MTDs in the network. The proposed optimal tuning is solely based on statistical information including the number of MTDs and the traffic input rate of each MTD, with which the throughput performance is found to be robust against feedback errors of the traffic input rate and burstiness of data arrivals.

Note that in this chapter, we only focus on the access throughput perfor- mance. In practice, however, many emerging M2M use-cases, such as industrial automation, rely on the realtime control, which imposes stringent latency require- ments on wireless connectivity. For those applications, the access delay DT is an important performance metric that needs to be considered. In the next chapter, we will specifically focus on the access delay performance of MTDs and study how to minimize the mean access delay of each MTD. 48 Chapter 3 Chapter 4

Access Delay Optimization

In this chapter, the analysis will be further extended to study how to properly tune the backoff parameters to optimize the access delay performance of M2M communications in LTE networks when the data transmission rate β = +∞. This chapter is organized as follows. Section 4.1 presents a literature review on previous related work. Section 4.2 derives moments of access delay. The minimum mean access delay and the corresponding optimal ACB factor are characterized in Section 4.3. Finally, concluding remarks are summarized in Section 4.4.

4.1 Previous Works

In Chapter 2.4, we have defined the access delay of each MTD as the time spent from the generation of an access request until its successful transmission. In LTE networks, the access delay of each MTD closely depends on the backoff parameters including the UB window size and the ACB factor (i.e., the initial transmission probability of each MTD). The access delay performance with UB or ACB scheme has been analyzed in [32–34, 47, 49, 50, 52, 71], where the mean access delay [32, 34, 47, 49, 50, 52] or the probability mass function of access delay [33, 71] was calculated based on the number of access requests1 in each time slot. In practice, however, such information is usually unavailable due to the uncoordinated nature of MTDs. Therefore, various algorithms were developed to estimate the number of access requests according to the number of idle slots

1In [32–34, 47, 49, 50, 52, 71], the data buffer of each MTD was ignored. Thus, the terms “MTD” and “access request” were often used interchangeably in those studies.

49 50 Chapter 4

[50, 52], or collision slots [47, 49]. In [32–34, 71], iterative methods were further proposed to calculate the current number of access requests based on previous ones.

Despite the above extensive studies, effects of key system parameters on the access delay performance have not been well understood. For instance, the data arrival rate of each MTD, which determines the traffic load of the network, has been ignored in previous studies, where MTDs were usually assumed to be buffer- less. How the mean access delay varies with the total number of MTDs or the number of preambles under different traffic conditions thus remains largely un- known. More importantly, due to the lack of accurate information of the number of access requests, the mean access delay has to be numerically calculated based on the estimated or iteratively updated number of access requests. The implicit nature renders it extremely difficult to further study how to optimize the access delay performance of each MTD by properly tuning backoff parameters.

In previous chapters, a new analytical framework has been proposed for M2M communications in LTE networks to maximize the access throughput. In this chapter, the proposed analytical framework will further be extended to optimize the access delay performance of MTDs. Specifically, based on the discrete-time Markov process of each access request, the probability generating function of the access delay and moments of access delay are derived, from which explicit ex- pressions of the minimum mean access delay and the corresponding optimal ACB factor will be obtained.

4.2 Moments of Access Delay

In Chapter 3.2, a discrete-time Markov process has been established to char- acterize the behavior of each access request, with the state transmission diagram of each access request shown in Fig. 3.1. Let Di denote the time spent from the beginning of State i until the service completion, where i ∈ {T, 0, 1,...,W − 1}. It can be obtained from Fig. 3.1 that

 1 with probability qp,  D = q(1−p) (4.1) j 1+D0 with probability 1−q+ W ,   q(1−p) 1+Di with probability W , i=1,...,W −1, Chapter 4 51

j ∈ {T, 0} and

Di = 1 + Di−1, i = 1, 2,...,W − 1, (4.2)

where p = lim pt is the steady-state probability of successful transmission of access t→∞ requests, q ∈ (0, 1] denotes the ACB factor and W ∈ {1, 2,...} represents the UB window size.

Note that a fresh access request is initially in State T and its service completes when it shifts back into State T. Therefore, DT is the access delay of each MTD.

Let GDT (z) denote its probability generating function. According to (4.1) and (4.2), we have W (1−z)zqp GDT (z) = W (1−z)(1−(1−q)z)−zq(1−zW )(1−p) . (4.3) The first moment of the access delay, i.e., the mean access delay (in unit of time 2 slots), E[DT ], and the second moment of the access delay E[DT ] can then be obtained from (4.3) as

E[D ] = G0 (1) = 1 + (1−p)(W −1) , (4.4) T DT qp 2p

and

E[D2 ] = G0 (1) + G00 (1) (4.5) T DT DT 1 1 2 = E[DT ](2E[DT ] − 1) + 3 ( p − 1)(W − 1),

respectively.

2 We can see from (4.4) and (4.5) that both E[DT ] and E[DT ] are crucially determined by the ACB factor q and the UB window size W . It is interesting to observe from (4.5) that when the UB window size W = 1, the minimization 2 of the second moment of access delay E[DT ] is equivalent to the minimization of

the mean access delay E[DT ]. Therefore, in this chapter, we assume W = 1 and focus on the optimization of mean access delay. We are specifically interested in

minimizing the mean access delay E[DT ] by optimally tuning the ACB factor q.

4.3 Minimum Mean Access Delay

Let us start by establishing the relationship between the mean access delay and access throughput. In Chapter3, the access throughput, which is defined as 52 Chapter 4

the average number of successful access requests per time slot, was derived as

λˆ = λˆ , (4.6) out λˆ  1 (1−p)(W −1)  + +1 n qp 2p

where λˆ = nλ is the aggregate input rate. By combining (4.4) and (4.6), we can see that n 1 E[DT ] = − , (4.7) λˆout λ

indicating that the mean access delay E[DT ] is minimized when the access through- ˆ put λout is maximized.

It has been shown in Chapter3 that the network has either two steady-state

points, i.e., the desired steady-state point pL and the undesired steady-state point pA with pL > pA, or one steady-state point pL, depending on whether it operates at the bistable region or monostable region. Both pL and pA are non-zero roots of the fixed-point equation of p, which was derived in Chapter3 as

 ˆ  p = exp − λ/M , (4.8) p+λ/ˆ (nq)

ˆ −1 when the UB window size W = 1. The maximum access throughput λmax = Me is achieved only when the network operates at the desired steady-state point pL and the ACB factor q is set to

ˆ q∗ = λ/n . (4.9) λ/Mˆ −e−1

It is clear from (4.7) that the minimum mean access delay is achieved at n − 1 = λˆmax λ ne 1 ∗ M − λ (time slots), when the ACB factor q = q and the network operates at the monostable region. If the network operates at the bistable region for q = q∗,

however, then the network may shift to the undesired steady-state point pA, at ne 1 which the minimum mean access delay M − λ is unachievable. To see how to optimally tune the ACB factor q to minimize the mean access delay in that case, in the following, we will start from the single-preamble scenario, where all MTDs share one preamble, i.e., M = 1. The analysis will be extended to the multi- preamble scenario in Section 4.3.2. Chapter 4 53

q 1 Bistable Monostable

Region  q Region %q

q 2 q* 4 q1 n 0 0 ˆ 2 ˆ O0 | 0.48 4e O

Figure 4.1: Bistable region Bq and monostable region Mq.

4.3.1 Minimum Mean Access Delay with M = 1

Let us first determine the conditions for the network to operate at the de- ∗ sired steady-state point pL with q = q . In Chapter3, the bistable region and monostable region were defined in terms of the quadruple (n, λ,ˆ q, W ). With the UB window size W = 1, for given the number of MTDs n and the aggregate input rate λˆ, the bistable region and monostable region in terms of the ACB factor q can be written as:

• Bistable region Bq = {q|q1 ≤ q ≤ q2}, in which the network has two steady-

state points pL and pA. ¯ • Monostable region Mq = Bq, in which the network has only one steady-state

point pL. q1 and q2 are given by

 √   √  2 ˆ 2 ˆ 4W−1 − λ/2 4W0 − λ/2 q1 = −  √  , q2 = −  √  , (4.10) ˆ ˆ n+2nW−1 − λ/2 n+2nW0 − λ/2

2 respectively , where W0(·) and W−1(·) are two real-valued branches of the Lambert W function with W0(·) as the principal branch.

Fig. 4.1 illustrates the bistable region Bq and monostable region Mq. It can ∗ be clearly seen from Fig. 4.1 that q is included in the monostable region Mq only ˆ ˆ ˆ ˆ when the aggregate input rate λ is sufficiently high, i.e., λ>λ0, where λ0≈0.48 is   2 ˆ ˆ pˆ ˆ −1 the single non-zero root of the equation λ−λ 1+1/W−1 − λ/2 =4(λ−e ), ∗ ˆ ˆ which is derived by combining q = q1,(4.9) and (4.10). With λ>λ0, the network

2 ˆ ˆ ˆ ˆ ˆ ˆ q1 and q2 are the roots of λ1 = λ and λ2 = λ, respectively, where λ1 and λ2 are given in (3.7) and (3.8). 54 Chapter 4

E>DT @

E> D T @ p p A

E> D T @ p pL

q q1 q* q2

Figure 4.2: Mean access delay E[DT ] versus the ACB factor q for q ∈ Bq when λˆ ≤ λˆ0.

is guaranteed to operate at the desired steady-state point pL when the ACB factor q is set to q∗, with which the access throughput is maximized and the mean access delay is minimized. We then have

∗ arg min E[DT ]|ˆ ˆ = q . (4.11) q λ>λ0

ˆ ˆ ∗ On the other hand, if λ ≤ λ0, then q ∈ Bq, indicating that the network has two steady-state points with q=q∗. In this case, q∗ may not be the optimal ACB factor for minimizing the mean access delay as the network may shift to the undesired steady-state point pA that is much lower than the desired steady-state ∗ point pL. As Fig. 4.2 illustrates, for q ≤ q ∈ Bq, the mean access delay E[DT ]p=pL monotonically decreases as the ACB factor q increases if the network operates at the desired steady-state point pL. If it operates at the undesired steady-state point pA, on the other hand, E[DT ]p=pA increases with q, and E[DT ]p=pA > E[DT ]p=pL . It is unknown when the network would shift from the desired steady-state point pL to the undesired steady-state point pA. Yet, the larger q, the higher risk of the network shifting from pL to pA. Therefore, to minimize the chance of operating at the undesired steady-state point pA, q should be set at the lowerbound q1, i.e.,

arg min E[DT ]|ˆ ˆ = q1. (4.12) q λ≤λ0 Chapter 4 55

Finally, by denoting the optimal ACB factor for minimizing the mean access ∗ delay as qD and combining (4.9)–(4.12), we have   λˆ if λˆ > λˆ ,  n(λˆ−e−1) 0 ∗,M=1   √  2 ˆ qD = 4W−1 − λ/2 (4.13)    √   otherwise.  ˆ  n −2W−1 − λ/2 −1

∗,M=1 It can be seen from (4.13) that the optimal ACB factor qD decreases as the number of MTDs n or the aggregate input rate λˆ increases.

4.3.2 Extension to Multi-Preamble M > 1

The above analysis is based on the assumption that all n MTDs share one preamble, i.e., M = 1. In this section, by applying the multi-group model proposed in Chapter3, the analysis will be extended to the multi-preamble scenario in which n MTDs choose M > 1 preambles. Specifically, as the preambles are orthogonal to each other, we can divide n MTDs into M groups according to the preamble each MTD chooses. Since each MTD independently and randomly selects a preamble (i) (i) n in each access attempt, the group size n can then be approximated as n ≈ M if ˆ (i) n ˆ(i) nλ the number of MTDs n is large. By replacing n and λ with n ≈ M and λ ≈ M in (4.13), respectively, the optimal ACB factor can be obtained as

 λ M ˆ  nλ if λ > λ0,  −e−1 n ∗ M √ qD = 2   (4.14) 4MW−1 − nλ/M/2    √   otherwise.  n −2W−1 − nλ/M/2 −1

By substituting (4.14) into (4.4) and (4.8), the corresponding minimum mean access delay can be derived as

 ne − 1 if λ> M λˆ ,  M λ n 0   √   min E[DT ]= n −2 − nλ/M/2 −1 (4.15) q W−1  √  otherwise,  2 q=q1 4MW−1 − nλ/M/2 pL

q=q1 where pL is the desired steady-state point of the network with q = q1, which is   p  the larger non-zero root of the fixed-point equation nλ 1 + 2W−1 − nλ/M/2 −  √  2  p  2 nλ/M 4MpW−1 − nλ/M/2 = 4nλW−1 − 2 / ln p. 56 Chapter 4

7 10

6 O 0.004 O 0.01 10 Analysis Analysis Simulation Simulation

5 10

4 10 @ E D T > T@ p p L

> 3

E D 10 E D minE> D T @ 171 > T@ p p A q min 41 E> D T @ q 1 10 * 0 denotes qD 10 0.001 0.01 0.016 0.048 0.1 0.13

Figure 4.3: Mean access delay E[DT ] (in unit of time slots) versus the ACB factor q. n = 1000. M = 10. λ ∈ {0.004, 0.01}.

We can see from (4.15) that the minimum mean access delay minq E[DT ] increases as the number of preambles M decreases or the network size n grows. ˆ For large n or λ, i.e., nλ > Mλ0, a linear increase of the minimum mean access 1 delay minq E[DT ] with regard to n and M can be observed.

4.3.3 Simulation Results

In this subsection, simulation results are presented to verify the above analy- sis. The simulation setting is the same as the system model described in Chapter 2 with the data transmission rate β = +∞ and the UB window size W = 1. Each simulation is carried out for 108 time slots. In simulations, the mean access delay is obtained by calculating the ratio of the sum of access delay of all successfully transmitted access requests to the total number of successful access requests.

Specifically, the expression of mean access delay E[DT ] has been given in (4.4) and illustrated in Fig. 4.3, where the number of preambles M=10 and the number

Mλˆ0 of MTDs n=1000. For large data arrival rate λ, i.e., λ = 0.01 > n ≈ 0.0048, the analysis has shown that the network is guaranteed to operate at the desired ∗ steady-state point pL for q = q = 0.016, with which the mean access delay is minimized. It can be seen from Fig. 4.3 that the minimum mean access delay ne 1 ∗ minq E[DT ] = M − λ = 171 time slots is indeed achieved with qD = 0.016.

Mλˆ0 On the other hand, for λ = 0.004 < n , the network operates at the bistable

region with two steady-state points, i.e., the desired steady-state point pL and the ∗ undesired steady-state point pA, when the ACB factor q = q = 0.125. As Fig. Chapter 4 57

7 10

6 10 M = 10

5 10

M = 20 4 10 @ T >

E D 3 10

2 10 * q q D q 0.1 1 10 Analysis Analysis Simulation Simulation

0 10 1000 1200 1400 1600 1800 2000 2200 2400 2600 2800 3000 n

Figure 4.4: Mean access delay E[DT ] (in unit of time slots) versus the number ∗ of MTDs n. M ∈ {10, 20}. λ = 0.01. q = qD or 0.1.

4.3 shows, for q ∈ Bq = {q|0.048 ≤ q ≤ 0.13}, the network quickly shifts to pA

as q increases, at which the mean access delay E[DT ] is much higher than that

at pL. Therefore, to minimize the mean access delay, the optimal ACB factor ∗ ∗ q should be set to the lowerbound qD = q1 = 0.048, with which the minimum mean access delay minq E[DT ] = 41 time slots is achieved according to (4.15). Simulation results presented in Fig. 4.3 well agree with the analysis.

Note that the analysis further shows that with the ACB factor optimally ∗ tuned as q = qD, the minimum mean access delay minq E[DT ] linearly increases 1 with n and M for large number of MTDs n, which is verified by simulation results presented in Fig. 4.4. In sharp contrast, if the ACB factor q is fixed, as the current

standard does [19], then the mean access delay E[DT ] exponentially increases with 1 n and M , as Fig. 4.4 illustrates. The gap between the minimum mean access delay and the mean access delay with the ACB factor q fixed at 0.1 grows as the network size n increases or the number of preambles M decreases, indicating that adaptive tuning of the ACB factor is crucial for massive access scenarios with a limited number of preambles.

4.4 Summary

In this chapter, we study how to properly tune backoff parameters to optimize the access delay performance of each MTD in LTE networks. By establishing the 58 Chapter 4

relationship between the mean access delay of each MTD and the access through- put, it is shown that the mean access delay is minimized when the access through- put is maximized, to achieve which the network should operate at the desired steady-state point with backoff parameters properly chosen. Explicit expressions of the minimum mean access delay and the corresponding optimal ACB factor are obtained, which reveal that in contrast to the maximum access throughput that is solely determined by the number of preambles, the minimum mean access delay further depends on the network size and the traffic input rate of each MTD. Sim- ulation results corroborate that compared to the standard setting where the ACB factor is fixed, the mean access delay of each MTD can be substantially reduced by optimally tuning the ACB factor according to the number of MTDs and the traffic input rate of each MTD. The improvement is especially significant in the massive access scenarios with a limited number of preambles.

So far, we have studied how to optimize the access throughput and access delay performance of MTDs, in Chapter3 and Chapter4, respectively. Note that the analysis above is developed based on a key assumption that the data transmission rate β = +∞. In the next chapter, the analysis will be extended to the non-asymptotic scenario with β < +∞, where the effect of data transmission rate β on the optimal access throughput and data throughput performance of M2M communications in LTE networks will be characterized. Chapter 5

Access Throughput Optimization with a Finite Data Transmission Rate

In this chapter, we aim to characterize the effect of data transmission rate on the optimal access performance of M2M communications in LTE networks. This chapter is organized as follows. Section 5.1 presents a literature review on previous related works. The preliminary analysis is given in Section 5.2. Section 5.3 presents the network steady-state points. The access throughput and data throughput are characterized in Section 5.4. The optimal time slot length for maximizing the normalized maximum access throughput is derived in Section 5.5. Finally, concluding remarks are summarized in Section 5.6.

5.1 Previous Works

It has been shown in Chapter2 that a connection-based random access process is adopted in LTE networks [18]. That is, each device with packets to send first transmits an access request to the BS for connection establishment. If the access request transmission is successful, then the BS will assign the resources to the device for its data transmission. Extensive works have been done on evaluating the access efficiency of MTDs in LTE networks [28–34, 38, 39, 58–60]. Yet, most of them only focus on the access request transmission performance and assume the data transmission rate β = +∞, in which case each MTD can always clear its data

59 60 Chapter 5 queue within one time slot once its access request is successful. This assumption is also adopted in Chapter3 and Chapter4, where we have demonstrated how to optimize the access throughput and access delay performance by optimally tuning backoff parameters.

Indeed, the assumption that the data transmission rate β = +∞ is a good approximation for light-traffic scenarios that are common for M2M communica- tions. However, it no longer holds true when the traffic load becomes heavy or the resource for data transmission is insufficient. In that case, it may take more than one time slot for MTDs to clear their data queues. Intuitively, with prolonged data transmission time, the access efficiency would decrease because newly generated access requests may not be accommodated until the ongoing data transmission completes. It may even drop to zero when the data transmission rate is too small to clear the data queues. To improve the access efficiency, more resources may be allocated to data transmissions to boost the data transmission rate, with which, however, the time slot length τ would be enlarged, indicating that the MTDs can access the channel less frequently. Apparently, the time slot length τ determines a crucial tradeoff between the data transmission rate and the access frequency, which should be properly set to optimize the access performance.

In this chapter, the analysis is extended to analyze the effect of the data trans- mission rate β on the optimal access performance of MTDs in LTE networks. Both the maximum access throughput and the corresponding optimal ACB factor are obtained as explicit functions of the data transmission rate. We will also demon- strate the effect of the time slot length τ on the normalized access throughput, i.e., the average number of successful access request per millisecond, and charac- terize the optimal time slot length for maximizing the normalized maximum access throughput.

It is worth mentioning that for data transmission performance of M2M com- munications, a lot of efforts have been made to maximize the sum rate [72–74] or the energy efficiency [75–77] by optimally allocating resource blocks to MTDs based on constraints such as the maximum transmit power of each MTD [73–75], or queueing delay bound of data packets [75]. By assuming that connections between the BS and MTDs have already been established, the access process is usually ig- nored in those studies. Moreover, this chapter should also be distinguished from [57, 58, 78–81], where the focus is on proposing new access and data transmission Chapter 5 61

pD q t t 7   ptD t q  ptD t q

pD q  + t t

Figure 5.1: Embedded Markov chain {Xj} of the state transition process of each individual access request with a finite data transmission rate β and the UB window size W = 1. schemes for M2M communications, rather than optimizing the performance of the current LTE random access process.

5.2 Preliminary Analysis

In Chapter3, it has been demonstrated that the tunings of ACB factor q and UB window size W are equally effective in optimizing the access throughput per- formance. Accordingly, in this chapter, we let W = 1 and only consider the ACB factor q. Therefore, by removing State k for k = 1, 2,...,W − 1, the embedded

Markov chain {Xj} of the state transition process of each individual access request shown in Fig. 2.3 reduces to that in Fig. 5.1.

With W = 1, the steady-state probability distribution of the embedded Markov chain in Fig. 5.1 can be obtained from (2.1) as

−1   1   πT = 1 − pαq + ,  pαq (5.1) πH = (1 − pαq)πT ,   1−pαq π0 = pαq πT ,

where α = lim αt is the steady-state probability that no access request is in State t→∞ H, and p = lim pt is the steady-state probability of successful transmission of t→∞ access requests given that no access request is in State H.

Let τi denote the mean holding time in State i, where i ∈ {0, T, H}. The holding time in State T and that in State 0 are both one time slot, i.e.,

τ0 = τT = 1. (5.2)

The mean holding time of State H τH is determined by the data transmission rate

β and the input rate λ of each MTD’s data queue. AppendixD shows that τH 62 Chapter 5

can be obtained as λ τH ≈ βpαq , (5.3) where the approximation is introduced mainly by dropping the rounding down operation for analytical tractability.

Finally, the limiting state probability of the Markov renewal process (X, V) is given by

πiτi π˜i = P , (5.4) πj τj j∈S i ∈ S, where S is the state space of X. Specifically, the probability of the access request being in State T can be obtained by combining (5.1)–(5.4) as

pαq π˜T = λ . (5.5) 1+ (1−pαq) β

Note thatπ ˜T is also the service rate of each MTD’s request queue. Based on the Geo/G/1/1 model of each request queue, the probability that each request queue is nonempty is given by ρ = λ . (5.6) λ+˜πT

5.3 Steady-State Point Analysis

The analysis above indicates that the steady-state performance of the network is crucially determined by p, the limiting probability of successful transmission of access requests given that no access request is in State H. In this subsection, the network steady-state points will be characterized based on the fixed-point equation of p.

Specifically, for a given access request, its transmission is successful if and only if all the other n−1 devices have empty request queues or have non-empty request queues but without requesting any transmission, given that no access request is in State H. Accordingly, we have p =Pr{request queue is empty|no access request is in State H} + Pr{request queue is non-empty but not transmitting|no access request is in State H}n−1  n−1 = 1−ρ + ρ(˜πT +˜π0)(1−q) . (5.7) 1−ρπ˜H 1−ρπ˜H Chapter 5 63

By combining (5.1)–(5.4), (5.6) and applying n − 1 ≈ n, (1 − x)n ≈ exp{−nx} for 0 < x < 1 if n is large, (5.7) can be approximated by

  with a large n nq p ≈ exp − pαq . (5.8) 1+ λ

AppendixE shows that the steady-state probability that no access request is in State H, α, is given by

λ ln p α = 1 + βq . (5.9)

By substituting (5.9) into (5.8), the fixed-point equation of p can be obtained as

 

λqˆ p = exp − !  , (5.10)  λˆ λˆ ln p  +pq 1+ n nqβ

where λˆ = nλ denotes the aggregate input rate. It can be seen that with β = +∞, ! ˆ (5.10) reduces to p = exp − λq , which is consistent with (3.6) with the UB λˆ +pq n window size W = 1. Theorem 5.1 shows that (5.10) has either one or three non- zero roots.

Theorem 5.1. The fixed-point equation (5.10) of p ∈ (0, 1] has either three non- zero roots 0 < pA ≤ pS ≤ pL ≤ 1 or one non-zero root 0 < pL ≤ 1.

Proof. See AppendixF.

Note that not all the roots of (5.10) are steady-state points. We follow the approximate trajectory analysis proposed in [40], and find that:

1. If (5.10) has only one non-zero root pL, then pL is a steady-state point;

2. If (5.10) has three non-zero roots pA ≤ pS ≤ pL, then only pL and pA are

steady-state points. We refer to pL as the desired steady-state point and pA as the undesired steady-state point.

It could be shown from (5.10) that the steady-state points pL and pA are both monotonic decreasing functions of traffic input rate of each MTD λ, the number of MTDs n, and the ACB factor q, and monotonic increasing functions of the data transmission rate β. 64 Chapter 5

   

  q     q  

 W   H D    q 

   

  q 

                  OÖ OÖ (a) (b)

Figure 5.2: Limiting probability that no access request is in State H, α, and ˆ mean holding time in State H, τH , versus the aggregate input rate λ. n = 100. ˆ ˆ M = 1. q ∈ {0.01, 0.1}. β = 1. (a) α versus λ. (b) τH versus λ.

5.3.1 Stability

By combining (5.9) and (5.10), we can see that the limiting probability that no access request is in State H, α, is also a monotonic decreasing function of the input rate of each MTD λ. As λ increases, α would eventually drop to zero, with which the mean holding time in State H, τH , becomes infinite according to (5.3), and the Markov chain in Fig. 5.1 becomes non-recurrent. In this case, one MTD would occupy the channel for data transmission for an unlimited amount of time. Meanwhile, as other MTDs’ access requests cannot succeed, the queue length of their data queues would become infinite, indicating that the network has become unstable.

In this thesis, we define that the network is stable if and only if the Markov chain in Fig. 5.1 is recurrent. It can be seen from (5.9) and (5.10) that α = 0 when the aggregate input rate λˆ is equal to the data transmission rate β. As Fig. 5.2 illustrates, when the aggregate input rate λˆ grows, the limiting probability that no access request is in State H, α, decreases and the mean holding time in State H ˆ τH increases. α drops to zero when λ ≥ β, with which τH = +∞, and the network becomes unstable1. Intuitively, when the data transmission rate β is smaller than the aggregate input rate λˆ, the data queues can never be cleared.

1Note that in Chapter3, the network is always stable because the data transmission rate β = +∞. Chapter 5 65

   

   

   p 

p ȕ  ȕ     6LPXODWLRQ 6LPXODWLRQ  $QDO\VLV p=p L $QDO\VLV p=p L $QDO\VLV p=p A $QDO\VLV p=p A ȕ  ȕ      6LPXODWLRQ 6LPXODWLRQ $QDO\VLV p=p L $QDO\VLV p=p L $QDO\VLV p=p A $QDO\VLV p=p A                         OÖ q (a) (b)

Figure 5.3: Limiting probability of successful transmission of access requests given that no access request is in State H, p, versus the aggregate input rate λˆ and the ACB factor q. β ∈ {1, 10}. n = 100. M = 1. (a) q = 0.05. (b) λˆ = 0.4.

5.3.2 Simulation Results

The above analysis is verified by the simulation results presented in Fig. 5.3. In this thesis, event-driven simulations are conducted and each simulation is carried out for 107 time slots. The simulation setting is the same as the system model described in Chapter 5.2, and we omit the details here. In simulations, we count the total number of transmitted access requests from all MTDs and the total number of successful access requests when no MTD is in the data transmission state. The limiting probability of successful transmission of access requests given that no access request is in State H, p, is then obtained by calculating the ratio of the number of successful access requests to the total number of transmitted access requests.

Specifically, the analysis has shown that the network can have either one steady-state point pL or two steady-state points, i.e., the desired steady-state point pL and the undesired steady-state point pA, which are non-zero roots of the fixed-point equation (5.10) of p. Fig. 5.3 presents how the steady-state points ˆ pL and pA vary with the aggregate input rate λ and the ACB factor q when the data transmission rate β is 1 or 10. It can be seen that when λˆ or q is small, ˆ the network has only one steady-state point pL and operates at pL. As λ or q increases, the network will have two steady-state points, i.e., the desired steady- state point pL and the undesired steady-state point pA. It may first operate at the desired steady-state point pL and then drop to the undesired steady-state point pA. Both steady-state points decrease as the ACB factor q increases, and are 66 Chapter 5

slightly improved when the data transmission rate β increases. Simulation results presented in Fig. 5.3 well agree with the analysis.

5.4 Access Throughput and Data Throughput

Based on the steady-state point analysis, in this section, we will focus on the throughput performance. In particular, we will derive the access throughput ˆa ˆd λout and the data throughput λout, and study how to optimally choose the system ˆa ˆd parameters to maximize λout and λout, respectively.

5.4.1 Access Throughput

ˆa In this thesis, the access throughput λout is defined as the average number of successful access requests per time slot. Based on the Geo/G/1/1 model of each ˆa access request queue, the access throughput λout can be obtained as

ˆa ˆ λout = λ(1 − ρ), (5.11)

where ρ denotes the probability that each request queue is nonempty. By combin- ing (5.1)–(5.4), (5.6), (5.9) and (5.11), we have

! λˆ ln p np q+ nβ ˆa npαq λout = = ! . (5.12) λ(1−pαq) pαq λˆ λpˆ ln p npq p ln p 1+ + 1+ 1−pq− + + β λ nβ nβ λˆ β

ˆa Note that when the data transmission rate β = +∞,(5.12) reduces to lim λout = β→+∞ ˆ nλqp , which is consistent with (3.4) with the UB window size W = 1. Moreover, λˆ+npq when the aggregate input rate λˆ ≥ β, the network will be unstable, in which case ˆa λout = 0 because the limiting probability that no access request is in State H, α, is 0. Typically, the number of MTDs n, the aggregate input rate λˆ and the data transmission rate β are system input parameters. Therefore, we are interested in ˆa ˆ how to optimally tune the ACB factor q to maximize λout for given n, λ and β.

ˆa ˆa Define the maximum access throughput as λmax = max λout. The following q ˆa theorem presents the maximum access throughput λmax and the optimal ACB factor q∗. Chapter 5 67

   

e

   

OÖ OÖ Öa   q OÖ  OÖ  OPD[

   

n  n  n  n                            E E (a) (b)

ˆa ∗ Figure 5.4: Maximum access throughput λmax and optimal ACB factor q ˆ ˆa versus the transmission rate β. λ ∈ {1, 5}. n ∈ {100, 1000}. M = 1. (a) λmax versus β. (b) q∗ versus β.

Theorem 5.2. The maximum access throughput is given by

ˆ λˆa = nβ(β−λ) , (5.13) max λβˆ (ne−1) λˆ2 β(enβ−n−1)+ + n n

which is achieved if and only if the network operates at the desired steady-state

point pL, and ˆ −1 q∗ = λ(β−e ) . (5.14) nβ(λˆ−e−1)

Proof. See AppendixG.

ˆa Fig. 5.4 illustrates how the maximum access throughput λmax and the optimal ACB factor q∗ vary with the data transmission rate β, the number of MTDs n and ˆ ˆa the aggregate input rate λ. Specifically, Fig. 5.4a shows that λmax is a monotonic increasing function of the data transmission rate β. With β = +∞,(5.13) reduces ˆa −1 ˆa to lim λmax = e , which is consistent with Theorem 3.3. Moreover, λmax de- β→+∞ creases as the aggregate arrival rate λˆ increases, and becomes zero when λˆ = β, in which case the network becomes unstable. As for the optimal ACB factor q∗, it can be seen from Fig. 5.4b that as the data transmission rate β grows, q∗ increases ∗ λˆ ∗ and quickly converges to lim q = ˆ −1 , which is consistent with (3.10). q β→+∞ n(λ−e ) decreases as the aggregate input rate λˆ or the number of MTDs n increases.

ˆ −1 We can also see from Theorem 5.2 that when nβ(λ−e ) < 1, the maximum λˆ(β−e−1) ˆa access throughput λmax cannot be achieved because (5.14) does not hold for any 68 Chapter 5

ACB factor q ∈ (0, 1]. Similar to that in Chapter3, we define the following regions of (n, λˆ):

n ˆ −1 o • Unachievable region S = (n, λˆ)| nβ(λ−e ) < 1 , in which λˆa cannot N λˆ(β−e−1) max be achieved, because (5.14) does not hold for any q ∈ (0, 1].

n ˆ −1 o • Uncertain region S = (n, λˆ)| nβ(λ−e ) ≥ 1, λˆ < 4e−2 , in which the net- U λˆ(β−e−1) work may operate at the desired steady-state point pL or the undesired ˆa steady-state point pA. λmax is achieved only if the network operates at pL.

n ˆ −1 o with a large n • Achievable region S = (n, λˆ)| nβ(λ−e ) ≥ 1, 4e−2 ≤ λˆ < β ≈ A λˆ(β−e−1) n o (n, λˆ)|4e−2 ≤ λˆ < β , in which the network is guaranteed to operate at ˆa the desired steady-state point pL, and λmax can be achieved when the ACB factor q is tuned according to (5.14).

n ˆ ˆ o • Unstable region SS = (n, λ)|λ ≥ β , in which the network is unstable ˆa and the access throughput λout = 0.

Note that when the data transmission rate β = +∞, the unstable region SS vanishes, and the remaining three regions reduce to the counterparts defined in Chapter3.

5.4.2 Data Throughput

ˆd Let us now consider the data throughput λout, which is defined as the average number of transmitted data packets per time slot. When the network is stable, i.e., λˆ < β, the data throughput is equal to the aggregate input rate λˆ, i.e.,

ˆd ˆ λout|λ<βˆ = λ. (5.15)

On the other hand, when the network is unstable, i.e., λˆ ≥ β, it has been shown in Section 5.3.1 that in this case, one MTD would capture the channel and transmit its data packets with rate β, while other MTDs cannot access. As a result, the data throughput is given by ˆd λout|λˆ≥β = β. (5.16)

ˆ ˆd We can see from (5.15) and (5.16) that when λ < β, the data throughput λout|λ<βˆ grows as the aggregate input rate λˆ increases, and approaches β as λˆ → β; When Chapter 5 69

λˆ ≥ β, the network achieves its maximum data throughput

ˆd λmax = β. (5.17)

It can be seen from (5.12) and (5.17) that when the maximum data throughput ˆd ˆa λmax is achieved, the network is unstable and the access throughput λout = 0. On ˆa the other hand, to achieve the maximum access throughput λmax, the network ˆd should operate at the achievable region SA, where the data throughput λout = ˆ ˆd ˆa λ < λmax = β. We can conclude that the maximum access throughput λmax and ˆd the maximum data throughput λmax cannot be achieved simultaneously.

5.4.3 Extension to Multi-Preamble M > 1

The analysis in previous sections is based on the assumption that the num- ber of preambles M = 1. In this subsection, we extend the above analysis to the multi-preamble scenario M > 1 by applying the multi-group model proposed in Chapter3. Specifically, by virtue of orthogonality among preambles, MTDs that use different preambles do not affect each other’s chance of successful access. Therefore, we can divide them into M groups according to the preamble that each MTD chooses. The group parameters can be defined as follows:

(i) PM (i) • n denotes the number of MTDs in Group i, i = 1, 2,...,M, and i=1 n = n.

• λˆ(i) denotes the aggregate input rate of MTDs in Group i and λˆ(i) = n(i)λ.

• β(i) denotes the transmission rate in Group i.

By replacing n, λ,ˆ β in (5.10), (5.12) and (5.15)–(5.16) with n(i), λˆ(i), β(i), the (i) (i) steady-state points of Group i, i.e., pL and pA , the group access throughput ˆ(i),a ˆ(i),d λout , and the group data throughput λout can be obtained, respectively.

As each MTD independently and randomly selects a preamble in each access attempt [18], when the total number of MTDs n is large, n(i) can be approximated (i) n by n ≈ M . Moreover, for fairness, we assume that all the groups have the (i) β same data transmission rate, that is, β = M . Similar to (5.15)–(5.16), the data 70 Chapter 5

throughput is still given by

 λˆ if λˆ < β, ˆM,d λout = (5.18) β otherwise,

ˆM,d ˆ with the maximum data throughput λmax = β when λ ≥ β.

On the other hand, the access throughput can be obtained by replacing n, λˆ (i) n ˆ(i) nλ (i) β and β with n ≈ M , λ ≈ M and β = M in (5.12), respectively, as

 λM ln p(i)  M p(i) q+ X β λˆM,a = n , (5.19) out M λM  λMp(i) ln p(i)  p(i)q Mp(i) ln p(i) 1+ 1−p(i)q− + + i=1 β β λ β

which is maximized at

ˆM,a nβ(β−nλ) λmax =  enβ  , (5.20) β −n−M +λβne−Mλ(β−nλ) M

with the optimal ACB factor

∗,M λM(β−Me−1) q = β(nλ−Me−1) . (5.21)

When the data transmission rate β = +∞, we can obtain from (5.20)–(5.21) that ˆM,a −1 ∗,M λ lim λmax = Me and lim q = nλ , which are consistent with (3.12) and β→+∞ β→+∞ −e−1 M (3.15), respectively. We can also see from (5.20) that for large number of MTDs ˆM,a M(β−nλ) ˆM,a n, λmax ≈ eβ−1 , indicating the maximum access throughput λmax decreases as n increases, and drops to zero when β = nλ, in which case the network becomes ˆM,a unstable. If the data transmission rate β is large, i.e., β  nλ, then λmax will approach Me−1 and become insensitive to the number of MTDs n.

ˆM,a As we can see from Fig. 5.5, both the maximum access throughput λmax and the corresponding optimal ACB factor q∗,M are monotonic increasing functions of the data transmission rate β and the number of preambles M. Intuitively, with more orthogonal preambles, more MTDs can successfully access the network, ˆM,a and thus the maximum access throughput λmax is increased. The increasing rate, however, depends on the data transmission rate β. When β is small, a superlinear ˆM,a increase of λmax with M can be observed. As β increases, the maximum access ˆM,a throughput λmax tends to linearly increase with M. Chapter 5 71

 

E    E  E  E  E    E 

  ÖM a  M OPD[  q 

 

 

 

                    M M (a) (b)

M,a ∗,M Figure 5.5: Maximum access throughput λˆmax and optimal ACB factor q versus the number of preambles M. n = 1000. λ = 0.005. β ∈ {10, 20, 100}. M,a ∗,M (a) λˆmax versus M. (b) q versus M.

  Ö Ö OÖ Ö Ö  O  O    O  OÖ  O  $QDO\VLV $QDO\VLV $QDO\VLV $QDO\VLV $QDO\VLV $QDO\VLV  6LPXODWLRQ 6LPXODWLRQ 6LPXODWLRQ  6LPXODWLRQ 6LPXODWLRQ 6LPXODWLRQ a  OÖ OÖa  out p p L PD[   Öa a  a  O Ö OÖ out p p L Oout out  

 OÖa  out p p A  

  Öa Oout p p GHQRWHV q A        q            q        (a) (b)

ˆa ˆ Figure 5.6: Access throughput λout versus the ACB factor q. λ ∈ {0.2, 0.38, 1}. n = 100. M = 1. (a) β = 1. (b) β = 10.

5.4.4 Simulation Results

In this section, simulation results are presented to validated the analysis above. In simulations, each MTD independently and randomly selects one out of M preambles in each access attempt. If the selected preamble is used by anoth- er MTD in the data transmission state, then the MTDs will perform the random preamble selection again in the next time slot2. An MTD with a successful access β request clears its data queue with the data transmission rate M , and at most M 2In practice, the BS knows which MTDs are in the data transmission state, and what pream- bles are used. If an MTD chooses a preamble that is used by another MTD in the data trans- mission state, then the BS would consider the request failed and not acknowledge it. The MTD then performs random preamble selection again. 72 Chapter 5



 E  6LPXODWLRQ  $QDO\VLV 

 E  6LPXODWLRQ  $QDO\VLV Öd Oout    

 

            OÖ

ˆd ˆ Figure 5.7: Data throughput λout versus the aggregate input rate λ. n = 100. M = 1. q = 0.001. β ∈ {1, 10}.

MTDs can be accommodated for concurrent data transmissions. We count the total number of successful access requests and the number of transmitted data packets in each simulation run, i.e., 107 time slots. The access throughput and data throughput are then obtained by calculating the ratios of the number of suc- cessful access requests and the number of transmitted data packets to the number of time slots 107, respectively.

ˆa Specifically, the expression of access throughput λout with the number of preambles M = 1 has been given in (5.12), which is determined by the number of MTDs n, the aggregate input rate λˆ, the data transmission rate β and the ACB ˆa factor q. Fig. 5.6 illustrates how the access throughput λout varies with the ACB factor q with the data transmission rate β = 1 or 10 and the number of MTDs n = 100. As Fig. 5.6 shows, when the aggregate input rate λˆ = 0.2 ∈ (0, 0.37), ˆ ˆa we have (n, λ) ∈ SN , in which the maximum access throughput λmax cannot be achieved regardless of what value of q is chosen. On the other hand, with ˆ ˆ ˆa λ = 0.38 ∈ [0.37, 0.54), we have (n, λ) ∈ SU , in which λmax again cannot be

achieved, because the network shifts to the undesired steady-state point pA as the ACB factor q increases. With λˆ = 1, if the data transmission rate β = 1, as shown ˆ in Fig. 5.6a, then we have (n, λ) ∈ SS , in which the network is unstable and the ˆa ˆ access throughput λout = 0. If β = 10, then (n, λ) ∈ SA, where the maximum ˆa access throughput λmax can be achieved when the ACB factor q is tuned according to (5.14), i.e., q = q∗ = 0.015, as shown in Fig. 5.6b. Note that a slight deviation between the analysis and simulation results is observed in this case because of the approximation introduced in (5.3).

ˆd ˆd ˆ As for the data throughput λout, the analysis has shown that λout = λ for Chapter 5 73

  

   E  M  q q  M  M d 6LPXODWLRQ 6LPXODWLRQ OÖ $QDO\VLV $QDO\VLV out   DQG  E 

a M d M    ÖM a M a 6LPXODWLRQ

M O Ö out out 6LPXODWLRQ out O  Ö Ö out $QDO\VLV O O $QDO\VLV    E  OÖM a PD[  6LPXODWLRQ  $QDO\VLV q    E  OÖM a  6LPXODWLRQ PD[  M GHQRWHV q $QDO\VLV                    q n (a) (b)

ˆM,a ˆM,d Figure 5.8: (a) Access throughput λout and data throughput λout versus the ACB factor q. n = 1000. λ = 0.006. β = 10. M ∈ {5, 10}. (b) Access ˆM,a ∗,M throughput λout versus the number of MTDs n. q = 0.05 or q . λ = 0.006. β ∈ {10, 20, 50, 200}. M = 10.

ˆ ˆd ˆ λ < β and λout = β for λ ≥ β. Simulation results presented in Fig. 5.7 verify that ˆd ˆ ˆ λout linearly increases with the aggregate input rate λ when λ is below the data ˆd ˆ transmission rate β, and reaches the maximum data throughput λmax when λ ≥ β. ˆ ˆa In this case, however, (n, λ) ∈ SS and the access throughput λout = 0, as shown in Fig. 5.6, indicating that the maximization of data throughput is achieved at the cost of sacrificing the access throughput.

Moreover, for the number of preambles M > 1, Fig. 5.8a illustrates how the ˆM,a ˆM,d access throughput λout and the data throughput λout vary with the ACB factor q when multiple preambles are adopted, i.e., M = 5 or 10. It can be clearly seen that the access throughput is quite sensitive to the value of ACB factor q. To achieve ˆM,a the maximum access throughput λmax, q should be carefully tuned based on the number of preambles M, the number of MTDs n and the input rate of each MTD λ according to (5.21), i.e., q = q∗,M . Moreover, in contrast to the case of infinite ˆM,a data transmission rate β = +∞ where λmax increases linearly with the number of ˆM,a preambles M, with β = 10, λmax is nearly tripled when M is doubled, indicating that the improvement in the maximum access throughput brought by increasing the number of preambles M is more significant when the data transmission rate is ˆM,d small. The data throughput λout , on the other hand, is independent of the ACB factor q, and equal to the aggregate input rate λˆ as long as λˆ < β.

ˆM,a Fig. 5.8b further illustrates how the access throughput λout varies with the number of MTDs n under various values of the data transmission rate β. It can 74 Chapter 5

be seen that even with the ACB factor optimally tuned, i.e., q = q∗,M , the access throughput performance may still deteriorate when the network size n increases if the data transmission rate β is small. The maximum access throughput becomes insensitive to the number of MTDs n only when β is sufficiently large, i.e., β  nλ. On the other hand, if the ACB factor q is fixed, e.g., q = 0.05, then the ˆM,a access throughput λout quickly drops as the number of MTDs n increases no matter how large the data transmission rate β is. Compared to the maximum access throughput, the throughput loss is significant especially when the data transmission rate β and the number of MTDs n are both large.

Note from Fig. 5.8b that for given data transmission rate β, the access throughput drops to zero when the aggregate input rate exceeds β, in which case the network becomes unstable. Intuitively, to avoid being unstable, the time slot length should be enlarged to allocate more resources for data transmission, which, however, leads to fewer chances for access. In the next section, we will further study how to properly choose the time slot length to optimize the access efficiency.

5.5 Optimal Time Slot Length

ˆM,a Recall that the access throughput λout is defined as the average number of successful access requests per time slot. In practice, however, the access through- put normalized by the time slot length, that is, the average number of successful access requests per millisecond, could be of more interest. In the LTE standard, the length of one time slot, τ (in unit of subframes3), is indeed a system param- eter that can be adaptively tuned. As Fig. 2.1 shows, the time slot length τ determines how the system resources are allocated between access and data trans- mission. With a smaller τ, MTDs can access the channel more frequently, but the data transmission rate would be lower as there are fewer subframes for data transmission per time slot. In this section, we will focus on the optimal tuning of the time slot length τ for maximizing the normalized access throughput4.

3According to the LTE standard [16], the length of one subframe is fixed to be one millisecond. 4 ˆM,a Note that it has been shown in Sections 5.4 that the maximum access throughput λmax and ˆM,d the maximum data throughput λmax cannot be achieved at the same time. In this section, we ˆM,a only focus on the maximum access throughput λmax. Chapter 5 75

5.5.1 Normalized Maximum Access Throughput

Specifically, as the BS dynamically allocates time-frequency resources every 1 millisecond, i.e., every subframe, in LTE networks [21], the total number of data packets that can be transmitted in each subframe, which is determined by the amount of resources and scheduling algorithm, is a given system parameter and

denoted by β0. With τ − 1 subframes for data transmission within each time slot, the data transmission rate β can be written as

β = β0(τ − 1). (5.22)

Similarly, denote the probability that an MTD generates a new data packet in one

subframe as λ0. The input rate of each MTD λ can then be written as

λ = λ0τ. (5.23)

By combining (5.20) and (5.22)–(5.23), the normalized maximum access through- M,a λˆmax put τ can be obtained as

β0 ˆM,a β0−nλ0− λmax τ =   2 2 . (5.24) τ eβ0(τ−1) M M Mλ0τ −1− +λ0τ e− + M n n β0(τ−1)

Here we are interested in how to optimize the normalized maximum access ˆM,a throughput by properly choosing the time slot length τ : max λmax . Note that it τ>1 τ has been shown in Section 5.4.1 that to guarantee the maximum access throughput ˆM,a ˆ λmax is achievable, the number of MTDs n and the aggregate input rate λ should ˆ nλ β fall into the achievable region SA. By replacing λ and β in SA with M and M , and further combining (5.22)–(5.23), we can obtain the following constraints on the time slot length τ: −2 τ ≥ 4e M and τ > β0 . (5.25) nλ0 β0−nλ0 Let τ ∗,a denote the optimal time slot length to maximize the normalized maximum access throughput, which can then be written as

M,a ∗,a λˆmax τ = arg max τ , (5.26) τ>τ0

−2 4e M β0 where τ0 = max{1, , } denotes the minimum requirement on the time nλ0 β0−nλ0 slot length τ according to (5.25). Fig. 5.9 presents the optimal time slot length 76 Chapter 5

 

  a W  a W    W W     M a M a Ö OÖ OPD[ PD[ _  a _  a W W  W W W  W

 

 

 

 

 

                      E E (a) (b)

Figure 5.9: Optimal time slot length τ ∗,a and the corresponding normalized M,a λˆmax maximum access throughput τ |τ=τ ∗,a versus β0. n = 1000. M = 5. (a) λ0 = 0.001. (b) λ0 = 0.006.

M,a ∗,a λˆmax ∗,a τ and the corresponding normalized maximum access throughput τ |τ=τ

with λ0 = 0.001 or 0.006.

Specifically, we can clearly see from Fig. 5.9a that when the traffic is light, ∗,a i.e., nλ0  β0, the optimal time slot length τ → τ0, indicating that in this case,

τ should be tuned as small as possible, approaching the minimum requirement τ0. Intuitively, with light traffic, the data transmission requires few resources. There- fore, the time slot length τ should be reduced such that MTDs can access more frequently. Moreover, neither the optimal time slot length τ ∗,a nor the correspond- M,a λˆmax ∗,a ing normalized maximum access throughput τ |τ=τ varies with the number of

data packets that can be transmitted per subframe β0 because data queues can always be cleared within two subframes.

In sharp contrast, with heavy traffic, e.g., λ0 = 0.006 as Fig. 5.9b shows, the optimal time slot length τ ∗,a becomes much larger than the minimum requirement

τ0, because more resources need to be allocated to data transmission. As β0 increases, data queues can be cleared within shorter time. The time slot length can then be reduced to allow for more frequent access for MTDs, and thus the M,a λˆmax ∗,a corresponding normalized maximum access throughput τ |τ=τ is significantly improved. Chapter 5 77

  

 E  E  $QDO\VLV $QDO\VLV 6LPXODWLRQ 6LPXODWLRQ   E   $QDO\VLV  M a ÖM a 6LPXODWLRQ OÖ  OPD[ PD[ W W   a GHQRWHV W E  E     $QDO\VLV $QDO\VLV  6LPXODWLRQ 6LPXODWLRQ

E    a GHQRWHV W $QDO\VLV 6LPXODWLRQ

                   W  W (a) (b)

  n  n  n  $QDO\VLV $QDO\VLV $QDO\VLV 6LPXODWLRQ 6LPXODWLRQ 6LPXODWLRQ

  ÖM a OPD[ W

 

 a GHQRWHV W            W (c)

M,a λˆmax Figure 5.10: Normalized maximum access throughput τ versus time slot ∗,M length τ. M = 5. q = q . (a) n = 1000. λ0 = 0.001. β0 ∈ {8, 12, 20}. (b) n = 1000. λ0 = 0.006. β0 ∈ {8, 12, 20}. (c) n ∈ {1500, 2500, 3000}. λ0 = 0.006. β0 = 20.

5.5.2 Simulation Results

Simulation results are presented in Fig. 5.10 to validate the preceding analy- sis. The simulation setting is the same as that in Section 5.4.4, except that each

MTD generates a packet with probability λ0 in each subframe, rather than with probability λ in each time slot.

Specifically, Fig. 5.10 illustrates how the normalized maximum access through- M,a λˆmax put τ varies with the time slot length τ under various values of the data trans-

mission rate per subframe β0 and the number of MTDs n. We can see from Fig. M,a λˆmax 5.10 that the normalized maximum access throughput τ crucially depends on the setting of τ, indicating that to optimize the throughput performance, the time slot length τ should be carefully selected. The values of the optimal time slot 78 Chapter 5 length τ ∗,a have been shown in Fig. 5.9, and are verified by simulation results pre- sented in Fig. 5.10. It is worth noting that in LTE networks, the time slot length τ (in unit of subframes) is an integer. Therefore, when choosing the optimal time slot length, τ ∗,a should be rounded to the nearest integer properly.

In the current standard, one representative value of the time slot length is τ = 5 subframes5 [22]. It can be seen from Fig. 5.10 that with τ = 5 , the network may suffer from severe throughput degradation. Specifically, when the traffic is light, i.e., nλ0  β0, we can observe from Fig. 5.10a that the normalized maximum access throughput with τ = 5 is only half of that with the optimal time ∗,a slot length τ ≈ 3. As the traffic input rate of each MTD per subframe λ0 or the network size n increases, the time slot length should be properly enlarged to allocate more resources to data transmission. If the time slot length τ is still fixed at 5, then the corresponding normalized maximum access throughput would be far below that with the optimal time slot length τ ∗,a. For instance, with n = 3000,

λ0 = 0.006 and β0 = 20 as shown in Fig. 5.10c, the network becomes unstable with the maximum access throughput dropping to zero when τ = 5. We can conclude that by optimally choosing the time slot length based on the traffic conditions and the data transmission rate, significant gains in the normalized access throughput can be achieved over the default setting.

5.6 Summary

In this chapter, we study how to optimize the random access performance of M2M communications in LTE networks with a finite data transmission rate β. Specifically, explicit expressions of the maximum access throughput and the opti- mal ACB factor are obtained. The analysis shows that when the data transmission rate β is small, the maximum access throughput decreases as the number of MTDs grows, and superlinearly increases with the number of preambles, indicating that significant improvements can be brought by allocating more preambles. It is in sharp contrast to the case of infinite data transmission rate where the maximum access throughput is independent of the number of MTDs and linearly increases with the number of preambles.

5 More specifically, in [22], PRACH configuration index=6 is used as one representative value, which, according to the PRACH configuration index table [16], specifies that within 10 subframes for each frame, the subframes with index 1 and 6 are PRACH subframes. In this case, PRACH subframes appear every 5 subframes, indicating that the time slot length τ = 5 subframes. Chapter 5 79

The analysis also reveals that the maximum access throughput drops to zero when the aggregate input rate exceeds the data transmission rate, in which case the data throughput reaches the maximum, but the network becomes unstable. To efficiently accommodate the massive access of MTDs, the data transmission rate should be sufficiently large, which indicates that the time slot length should be properly increased for allocating more resources to data transmission as the number of MTDs grows. The effect of time slot length on the normalized maximum access throughput is further analyzed, and shown to be crucial. By optimally choosing the time slot length according to the aggregate traffic rate and data transmission rate per subframe, substantial gains are observed over the default setting in various scenarios. 80 Chapter 5 Chapter 6

Conclusion and Future Work

6.1 Conclusion

As one key enabling technology for the emerging Internet of Things paradig- m, M2M communications expands the scope of entities connected to the Internet beyond just humans. Billions of MTDs, such as sensors, actuators and meters, are predicted to come into existence over the next few years and most of them will require ubiquitous wireless connectivity service from the LTE networks. However, with a large number of MTDs attempting to initiate connections with the BS, the massive access requests transmitted via a shared channel would cause severe con- gestion and intolerably low access efficiency. Although extensive works have been done for improving the access efficiency, how to optimize the access performance of M2M communications in LTE networks by properly tuning system parameters, such as backoff parameters and time slot length, still remains largely unknown.

The work in this thesis addresses this issue from both the theoretical and practical perspectives. From the theoretical aspect, the proposed double-queue model captures the key feature of the connection-based random access in LTE networks. It incorporates the queueing behavior of each MTD and is scalable in massive access scenarios, which enables us to reveal a complete picture of through- put maximization and delay minimization for the massive random access of M2M communications in LTE networks. For throughput maximization, the maximum access throughput, the maximum data throughput and the corresponding optimal backoff parameters, including the UB window size and the ACB factor, are derived as explicit functions of system parameters. The analysis shows that the maximum

81 82 Chapter 6 access throughput is a monotonic increasing function of the data transmission rate. When the data transmission rate is small, the maximum access throughput superlinearly increases with the number of preambles, while decreases as the net- work size or the traffic input rate of each MTD grows. On the other hand, if the data transmission rate is sufficiently large, then the maximum access throughput linearly increases with the number of preambles and becomes insensitive to the network size and the traffic input rate of each MTD. For delay minimization, the minimum mean access delay and the corresponding optimal ACB factor are de- rived. The relationship between the mean access delay of each MTD and the access throughput is established, which shows that the mean access delay is minimized when the access throughput is maximized. However, in contrast to the maximum access throughput that is solely determined by the number of preambles when the data transmission rate is large, the minimum mean access delay further depends on the network size and the traffic input rate of each MTD.

From the practical aspect, the work in this thesis sheds important light on network design for supporting massive access of M2M communications in LTE networks. For instance, the analysis shows that with the current LTE standard setting where the backoff parameters are fixed, both the access throughput per- formance and the access delay performance drastically degrade as the number of MTDs increases. To optimize the access performance, the backoff parameter, i.e., the UB window size or the ACB factor, should be adaptively tuned according to the network size, the traffic input rate of each MTD and the data transmission rate. It is worth mentioning that the proposed optimal tuning of backoff parameters does not rely on the realtime information of the aggregate traffic that is difficult to collect in practical LTE networks. Instead, it is solely based on statistical traffic information, which is usually available at the BS. Moreover, the analysis reveals that the time slot length has a crucial impact on the normalized access through- put performance, as it determines how the system resources are allocated between access and data transmission. The optimal time slot length for maximizing the normalized maximum access throughput is characterized, and shown to lead to significant gains over the default setting in various scenarios. Chapter 6 83

6.2 Future Work

The work in this thesis only provides a starting point. In the future, it is important to further extend our analytical framework to incorporate more realistic assumptions. For instance, the analysis in this thesis is developed based on a key assumption that each access request stays in the queue until it is successfully transmitted. In practice, however, an access request could be dropped if it reaches the maximum number of retransmissions. Therefore, the next step is to extend the analytical framework to further incorporate a retry limit, and study how such a retry limit affects the access performance and the optimal backoff parameter tuning.

Note that in this thesis, we focus on the homogeneous case where each MT- D has an identical traffic input rate and no quality-of-service requirements. In practice, MTDs in different applications may have distinct traffic characteristics. For some applications, such as industrial automation and healthcare, MTDs trans- mit critical information and thus require higher priority. The analysis should be extended to heterogeneous scenarios to incorporate distinct traffic characteristics and quality-of-service requirements of MTDs.

Moreover, in this thesis, we assume that the total number of data packets that can be transmitted in each time slot, β, does not change with time for the tractability of analysis. In practice, as the BS dynamically allocates time-frequency resources every one millisecond, the data transmission rate β may not be constant due to the dynamics of the resource scheduling process. How the time fluctuation of the data transmission rate β affects the optimal access performance of MTDs and the optimal backoff parameter tuning is an interesting topic that deserves much attention in the future study.

Last but not least, the analytical framework developed in this thesis is not limited to M2M communications in LTE networks, and can be applied to other wireless communication systems that adopt the connection-based random access. For instance, NarrowBand Internet of Things (NB-IoT), a new 3GPP radio-access technology exclusively designed for IoT applications in cellular systems, also adopt- s connection-based random access [82]. Although NB-IoT and LTE share the same network infrastructure, NB-IoT is not backward compatible with existing LTE s- tandards because it redesigns its physical layer and introduces many new features. 84 Chapter 6

For example, to enhance the network coverage, in NB-IoT, an MTD would repet- itively transmit the preamble several times, and the BS determines the presence of the preamble by comparing the accumulated received power with a predefined detection threshold [83]. With more repetitions, the system can combine each repetition and reach a higher effective signal-to-noise ratio, which improves the preamble detection probability and the network coverage. However, it would con- sume more random access resources and lead to fewer resources for data trans- mission. We can see that the crucial resource tradeoff between access and data transmission also exists in NB-IoT systems and further depends on the number of repetitions of preambles. It would be interesting to study how to extend our pro- posed analytical framework to include the newly emerging features of the NB-IoT systems and optimize the access performance of MTDs in NB-IoT systems. Appendix A

Proof of Theorem 3.1

a Proof. Let f(p) = − ln p − b+p , where

2 +W −1 2n q a = 2n , and b = 2n . (A.1) −W +1 −W +1 λˆ λˆ

It can be seen from (3.6) that f(p) = 0 has the same non-zero roots as the fixed- point equation (3.6). Hence, we will focus on f(p) = 0 in the following. The 0 g(p) derivative of f(p) can be obtained as f (p) = p(b+p)2 , where

a 2 a2 g(p) = − p + b − 2 + 4 − ab. (A.2)

Lemma A.1 shows that the number of non-zero roots of f(p) = 0 for p ∈ (0, 1] is crucially related with the number of non-zero roots of g(p) = 0 for p ∈ (0, 1].

Lemma A.1. f(p) = 0 has three non-zero roots 0 < pA ≤ pS ≤ pL ≤ 1 if and only 0 0 0 0 if g(p) = 0 has two non-zero roots 0 < p1 < p2 < 1 with f(p1) ≤ 0 and f(p2) ≥ 0;

Otherwise, f(p) = 0 has only one non-zero root 0 < pL ≤ 1.

a n Proof. Since lim f(p) = +∞ and f(1) = − = − 1 n < 0, f(p) = 0 has at least p→0 b+1 + q λˆ one non-zero root for p ∈ (0, 1]. To further determine the number of non-zero roots of f(p) = 0 for p ∈ (0, 1], let us consider the following scenarios.

1. If g(p) = 0 has no non-zero roots for p ∈ (0, 1], then g(p) < 0 for p ∈ (0, 1]. As a result, f 0(p) < 0 for p ∈ (0, 1], indicating that f(p) monotonically decreases for p ∈ (0, 1], as shown in Fig. A.1a. We can then conclude that

in this case, f(p) = 0 has only one non-zero root 0 < pL ≤ 1. 85 86 Appendix A

f p f p f p

pL pL pc pL pc pc     p   p

(a) (b) (c)

f p f p f p

p pc pc p pc pS pc p pc pc pL L    A   L  p    p p

(d) (e) (f)

Figure A.1: f(p) has one root in (a), (b), (c), (d), (e) and three non-zero roots in (f).

0 0 2. If g(p) = 0 has one non-zero root 0 < p1 ≤ 1, then g(p) < 0 for p ∈ (0, p1) 0 0 0 and g(p) > 0 for p ∈ (p1, 1]. As a result, f (p) < 0 for p ∈ (0, p1) and 0 0 f (p) > 0 for p ∈ (p1, 1], indicating that f(p) monotonically decreases for 0 0 p ∈ (0, p1), and then increases for p ∈ (p1, 1], as shown in Fig.A.1b. Since f(1) < 0, we can conclude that in this case, f(p) = 0 has only one non-zero

root 0 < pL ≤ 1.

0 0 3. If g(p) = 0 has two non-zero roots 0 < p1 < p2 ≤ 1, then we have:

0 0 0 (a) If p2 = 1, then g(p) < 0 for p ∈ (0, p1) and g(p) > 0 for p ∈ (p1, 1]. As a 0 0 0 0 result, f (p) < 0 for p ∈ (0, p1) and f (p) > 0 for p ∈ (p1, 1], indicating 0 that f(p) monotonically decreases for p ∈ (0, p1), and then increases for 0 p ∈ (p1, 1], as shown in Fig.A.1c. Since f(1) < 0, we can conclude that

in this case, f(p) = 0 has only one non-zero root 0 < pL ≤ 1.

0 0 S 0 (b) If p2 < 1, then g(p) < 0 for p ∈ (0, p1) (p2, 1) and g(p) > 0 for 0 0 0 0 S 0 0 p ∈ (p1, p2). As a result, f (p) < 0 for p ∈ (0, p1) (p2, 1) and f (p) > 0 0 0 0 S 0 for p ∈ (p1, p2), indicating that f(p) decreases for p ∈ (0, p1) (p2, 1), 0 0 and then increases for p ∈ (p1, p2), as shown in Fig.A.1d-f. We can 0 0 see from Fig.A.1d-e that if f(p1) > 0 or f(p2) < 0, f(p) = 0 has one

non-zero root 0 < pL ≤ 1; Otherwise, f(p) = 0 has three non-zero roots 0 0 < pA ≤ pS ≤ pL ≤ 1, as shown in Fig.A.1f, in which f(p1) ≤ 0 and 0 f(p2) ≥ 0. Appendix A 87

Lemma A.2 further presents the necessary and sufficient condition for g(p) = 0 0 0 0 0 having two non-zero roots 0 < p1 < p2 < 1 with f(p1) ≤ 0 and f(p2) ≥ 0.

0 0 0 Lemma A.2. g(p) = 0 has two non-zero roots 0 < p1 < p2 < 1 with f(p1) ≤ 0 0 2 ˆ ˆ ˆ ˆ ˆ and f(p2) ≥ 0 if and only if n > 2( q + W − 1) and λ1 ≤ λ ≤ λ2, where λ1 and λ2 are given in (3.7) and (3.8), respectively.

0 0 Proof. According to (A.2), g(p) = 0 has two non-zero roots 0 < p1 < p2 < 1 if and only if 0 < b < 1 and 4b < a < (b + 1)2, which can be further written as

( ) ˆ 2n n n λ < min , 1 = 1 , (A.3) W −1 W −1+ W −1+ q q

 2   2 1 + n > n 2n − W + 1 , (A.4) q λˆ λˆ

 2  n > 2 q + W − 1 , (A.5) according to (A.1).

0 0 The two non-zero roots of p1 and p2 of g(p) = 0 can be written as

 2 r  4  n− −W +1− n n− −2(W −1)  0 q q p1 = 2n  −W +1 λˆ 2 r  4  (A.6) n− −W +1+ n n− −2(W −1)  0 q q p2 = 2n  −W +1 λˆ

 2  if (A.5) holds, i.e., n > 2 q + W − 1 . It can be obtained from (A.6) that 0 0 ˆ ˆ ˆ ˆ ˆ f(p1) ≤ 0 and f(p2) ≥ 0 if and only if λ1 ≤ λ ≤ λ2, where λ1 and λ2 are given in (3.7) and (3.8), respectively.

ˆ ˆ Now, we prove that if (A.5) holds and λ ≤ λ2, then (A.3) and (A.4) hold.   2 ˆ (1) Let us first show that when n > 2 q + W − 1 , λ2 monotonically de- ˆ ˆ 2 creases with n. Specifically, according to (3.8), λ2 can be written as λ2 = F (n) , where 88 Appendix A

r ! 1 2  4  F (n) = n n − q − W + 1 + n n − q − 2(W − 1)

  ! · exp 2n + W − 1 . (A.7)  r  4   n+ n n− −2(W −1) q

   2n  (q(W −1)+2) exp −q(W −1) r  4   n+ n n−2(W −1)−  dF (n) q It can be obtained that dn  2  = qn2 > n>2 +W −1 q q(W −1)(e2−1) qn2 > 0. Therefore,

ˆ ˆ 2n n λ2 < lim λ2 =  2  < 1 . (A.8)  2  +W −1 e2+W −1 W −1+ n→2 +W −1 q q q

ˆ ˆ It can be seen from (A.8) that if (A.5) holds and λ ≤ λ2, then (A.3) holds.

ˆ ˆ ˆ 2n2 (2) We rewrite (A.4) as H(λ) > 0, where H(λ) is given by H(λ) = ˆ2 +   λ 1 4n − 2n2 + 2 + n(W − 1). It can be obtained that H(λˆ) = 0 has two non- λˆ q q2  2 r  4   2 r  4  n n− − n n− −2(W −1) n n− + n n− −2(W −1) ¯ q q ¯ q q zero roots of λ1 = 2 and λ2 = 2 n(W −1)+ n(W −1)+ q2 q2   ¯ ¯ 2 ˆ ¯ ˆ ¯ with λ1 < λ2, if (A.5) holds, i.e., n > 2 q + W − 1 . When λ < λ1 or λ > λ2, H(λˆ) > 0. According to (3.8), we can have

 2 r  4  r ! n− + n n−2(W −1)−   q q λ¯1 2 4 ˆ > n − − n n − 2 (W − 1) − ·  2  = 1. (A.9) λ2 q q 2 (W −1)n+ q2

ˆ ˆ ˆ Therefore, we can conclude that for λ < λ2, H(λ) > 0, which indicates that (A.4) holds.

Finally, Theorem 3.1 can be obtained by combing Lemma A.1 and Lemma A.2. Appendix B

Proof of Corollary 3.2

Proof. According to the fixed-point equation (3.6), we can obtain that

 2     ˆ 2 ∂p = p ln p λˆ 1 + W −1 + p 1 − λ(W −1) , (B.1) ∂λˆ g(p) λˆ n q 2 2n

!2   ∂p = p 1 · λˆ 1 + (1 − p) W −1 , (B.2) ∂n g(p) n (W −1)λˆ q 2 1− 2n 2 2 ∂p 1  ln p   λˆ  1 W −1   λˆ(W −1)  ∂q = ng(p) q · n q + 2 + p 1 − 2n , (B.3)

2 ∂p (ln p)2(1−p)  λˆ  1 W −1   λˆ(W −1)  ∂W = − 2ng(p) · n q + 2 + p 1 − 2n , (B.4) where g(p) is given in (A.2). Let us consider the following scenarios:

1. If g(p) = 0 has no non-zero roots for p ∈ (0, 1], then g(p) < 0 for p ∈ (0, 1].

In this case, as Fig.A.1a shows, (3.6) has one non-zero root pL, which is a steady-state point according to the approximate trajectory analysis in [40].

We then have g(pL) < 0.

0 0 2. If g(p) = 0 has one non-zero root 0 < p1 ≤ 1, then g(p) < 0 for p ∈ (0, p1) 0 and g(p) > 0 for p ∈ (p1, 1]. In this case, as Fig.A.1b shows, (3.6) has 0 one non-zero root pL < p1, which is a steady-state point according to the

approximate trajectory analysis in [40]. We then have g(pL) < 0.

0 0 3. If g(p) = 0 has two non-zero roots 0 < p1 < p2 ≤ 1, then we have:

0 0 0 (a) If p2 = 1, then g(p) < 0 for p ∈ (0, p1) and g(p) > 0 for p ∈ (p1, 1]. 0 In this case, as Fig.A.1c shows, (3.6) has one non-zero root pL < p1, 89 90 Appendix B

which is a steady-state point according to the approximate trajectory

analysis in [40]. We then have g(pL) < 0.

0 0 S 0 (b) If p2 < 1, then g(p) < 0 for p ∈ (0, p1) (p2, 1) and g(p) > 0 for 0 0 p ∈ (p1, p2). In this case, as Fig.A.1d-f show, (3.6) may have one 0 S 0 steady-state point pL ∈ (0, p1) (p2, 1), or three non-zero roots pA < 0 0 p1 < pS < p2 < pL, among which pA and pL are the steady-state points according to the approximate trajectory analysis in [40]. We then have

g(pL) < 0 and g(pA) < 0.

Finally, we can conclude that g(pL) < 0 and g(pA) < 0, It can then be ob- ∂p ∂p ∂p tained from (B.1)-(B.4) that < 0, < 0, < 0 and ∂λˆ ∂q ∂n p=pL,pA p=pL,pA p=pL,pA ∂p > 0. ∂W p=pL,pA Appendix C

Proof of Theorem 3.3

ˆ Proof. According to (3.3), (3.4) and (3.6), the access throughput λout can be writ- ˆ ˆ −1 ten as λout = −p ln p. It can be clearly seen that λmax = e , which is achieved when p∗ = e−1.(3.9) can then be obtained by substituting p∗ = e−1 into (3.6).

At the bistable region, the network may operate at the desired steady-state

point pL or the undesired steady-state point pA. In the following, we prove that −1 ˆ when (3.9) holds, pA < e , implying that λmax can only be achieved when the network operates at pL. Specifically, (3.9) can be written as

  2n − (W ∗ − 1) = 2n − 2 − (W ∗ − 1) e. (C.1) λˆ q∗

0 0 0 0 From Fig. A.1f, we can see pA ≤ p1 < p2 ≤ pL, where p1 and p2 are roots of g(p) = 0, which are given by (A.6), respectively. If (C.1) holds, then we have 2 r 4 n− −W ∗+1+ n(n− −2(W ∗−1)) 0 q∗ q∗ −1 −1 0 −1 p2 = 2 e < e . Therefore, pA < p2 < e . 2n− −W ∗+1 q∗

91 92 Appendix C Appendix D

Derivation of (5.3)

Proof. To derive the mean holding time in State H, τH , let us first denote the

holding time in State i as Yi, where i ∈ {0, T, H}, the number of packets in the

data queue when the access request enters State H as NH , and the number of new ˆ arrival packets when the access request is in State H as NH . We can then obtain that

NˆH +NH YH + YT = d β e, (D.1)

where β is the data transmission rate. Note that YT = 1 and τH = E[YH ].

According to (D.1), the mean holding time in State H, τH , can therefore be written as

ˆ NH +NˆH NH +NˆH −1 E[NH ]−1 E[NH ] τH = E[YH ] = Ed β e − 1 = Eb1 + β c − 1 ≈ β + β , (D.2)

x x−1 by applying d y e = b1+ y c for x, y ∈ {1, 2,...}, and dropping the rounding down

operation for analytical tractability. We can see from (D.2) that τH is determined by the average number of new arrival packets when the access request is in State ˆ H, E[NH ], and the average number of packets in the data queue when the access ˆ request enters State H, E[NH ]. In the following, we focus on E[NH ] first and then

E[NH ].

As the traffic input rate of each MTD is λ and the mean holding time in State

H is τH , we can easily obtain the average number of new arrival packets when the access request is in State H as

ˆ E[NH ] = λτH . (D.3)

93 94 Appendix D

On the other hand, to derive the average number of packets in the data queue when the access request enters State H, E[NH ], let us first define Di as the time spent from the beginning of State i until the service completion. According to Fig. 5.1, we can see that before the access request enters State H, it should first be in State T, in which case the data queue has one data packet, and then in State 0, in which case the average number of new arrival packets when the access request is in State 0 is λE[D0 − DH ]. Therefore, we have

E[NH ] = 1 + λE[D0 − DH ]. (D.4)

According to the Markov chain in Fig. 5.1, it can be obtained that

 Y0 + DH with probability pαq, D0 = (D.5) Y0 + D0 with probability 1 − pαq.

Let GDi (z) denote the probability generating functions of Di, where i ∈ {0, T, H}.

Based on (D.5) and Y0 = 1, we can have

pαqzGDH (z) GD0 (z) = 1−(1−pαq)z , (D.6) and furthermore,  0 GD0 (z) 1 E[D0 − DH ] = |z=1 = . (D.7) GDH (z) pαq

Finally, by further combining (D.2)–(D.7), we can obtain the mean holding time in State H, τH , as λ λ τH =  λ  ≈ βpαq , (D.8) βpαq 1− β

λ λ 1 by ignoring β in the denominator because β < n  1 for large n. Appendix E

Derivation of (5.9)

Proof. To derive the limiting probability that no access request is in State H, α, let H H H H us first define a discrete-time Markov renewal process (X , V ) = {(Xj ,Vj ), j = H 0, 1,...}, where Xj denotes the number of access requests in State H at the j-th H transition and Vj denotes the epoch at which the j-th transition occurs. As there H is at most one access request in State H in any time slot, Xj only has two states, H H i.e., State S0 with Xj = 0 or State S1 with Xj = 1, and the embedded Markov H H chain X = {Xj } is shown in Fig. E.1, where γt denotes the state transition probability from State S0 to State S1 at time slot t.

The steady-state probability distribution of the embedded Markov chain can be derived as 1 γ πS0 = γ+1 , πS1 = 1+γ , (E.1) where γ = lim γt. Since the mean holding time in State S0 is 1 and that in t→∞ State S1 is τH , we can then obtain the steady-state probability distribution of the discrete-time Markov renewal process (XH , VH ) as

1 τH γ π˜S = , π˜S = . (E.2) 0 1+τH γ 1 1+τH γ

Note that the limiting probability that no access request is in State H, α, is given byπ ˜S0 , which is determined by γ as (E.2) shows.

To derive γ, let us first focus on γt, which is the probability that given no access request in State H at time slot t − 1, one access request is in State H at time slot t. We can see from Fig. 5.1 that when one access request shifts to State H at time slot t, it must stay in State 0 at time slot t − 1, and is successfully 95 96 Appendix E

J t J t S S 

H Figure E.1: Embedded Markov chain {Xj }.

transmitted at time slot t. Let wt denote the probability that one access request is transmitted at time slot t given no access request in State H at time slot t − 1.

γt can then be written as

n−1 π˜0 γt = nwt(1 − wt) · , (E.3) π˜0+˜πT

n−1 where nwt(1 − wt) represents the probability that an access request is suc- cessfully transmitted at time slot t, and π˜0 is the probability that the access π˜0+˜πT request stays in State 0 at time slot t − 1. Note that the probability of successful transmission of access requests given that no access request is in State H at time

slot t, pt, can be written as

n−1 pt = (1 − wt) ≈ exp(−nwt), (E.4)

by applying n − 1 ≈ n, (1 − x)n ≈ exp{−nx} for 0 < x < 1 if n is large. By combining (5.1)–(5.4), (E.3) and (E.4), we can obtain that

γ = lim γt = −p(1 − pαq) ln p ≈ −p ln p, (E.5) t→+∞

where pαq is ignored because it is typically very small.

Finally, the limiting probability that no access request is in State H, α, can be obtained by combining (5.3), (E.2) and (E.5). Appendix F

Proof of Theorem 5.1

Proof. To determine the number of non-zero roots of the fixed-point equation (5.10), let us first define h(p) f(p) = pq  λ ln p  , (F.1) 1+ 1+ λ βq where p(ln p)2 (pq+λ) ln p h(p) = − β − λ − nq. (F.2)

pq  λ ln p  pqα As 1 + λ 1 + βq = 1 + λ > 0, it can be seen from (5.10), (F.1) and (F.2) that h(p) = 0 has the same non-zero roots as the fixed-point equation (5.10). Therefore, we focus on h(p) = 0 in the following.

Since lim h(p) = +∞ and h(1) = −nq < 0, h(p) = 0 has at least one non-zero p→0 root for p ∈ (0, 1]. To further determine the number of non-zero roots of h(p) = 0, according to (F.2), we can obtain that

0 (ln p)2  2 q  pq+λ h (p) = − β − β + λ ln p − pλ , (F.3)

with lim h0(p) = −∞, h0(1) = − q+λ , and p→0 λ

00 2 ln p 2 2q pq+λ h (p) = − pβ − pβ − pλ + λp2 , (F.4)

with lim h00(p) = +∞, h00(1) = 1 − 2λ+qβ . The single non-zero root of h00(p) = 0 is p→0 λβ given by β pE =  β  qβ  , (F.5) 2 exp 1+ W0 2 2λ

97 98 Appendix F where W0(·) is the principal branch of the Lambert W function. It can be obtained 00 from (F.4)–(F.5) that if 2λ + qβ ≤ λβ, then pE ≥ 1 and h (1) ≥ 0; Otherwise, 00 0 < pE < 1 and h (1) < 0.

In the following, we discuss the number of non-zero roots of h(p) = 0 based on the monotonicity of h0(p) for p ∈ (0, 1].

• If 2λ + qβ ≤ λβ, then h00(p) ≥ 0 for p ∈ (0, 1]. As a result, h0(p) is a non-decreasing function for p ∈ (0, 1]. Since lim h0(p) < 0 and h0(1) < 0, we p→0 have h0(p) < 0 for p ∈ (0, 1], indicating that h(p) monotonically decreases for p ∈ (0, 1]. We can then conclude that in this case, h(p) = 0 has only one

non-zero root 0 < pL ≤ 1.

00 00 • If 2λ + qβ > λβ, then h (p) > 0 for p ∈ (0, pE) and h (p) < 0 for p ∈ (pE, 1]. 0 As a result, h (p) monotonically increases for p ∈ (0, pE), and then decreases

for p ∈ (pE, 1].

0 0 – If h (pE) ≤ 0, then we have h (p) ≤ 0 for p ∈ (0, 1], indicating that h(p) is a non-increasing function for p ∈ (0, 1]. We can then conclude that

in this case, h(p) = 0 has only one non-zero root 0 < pL ≤ 1.

0 0 – If h (pE) > 0, then h (p) = 0 should have two non-zero roots p1 and p2, 0 S where 0 < p1 < pE < p2 < 1, and h (p) < 0 for p ∈ (0, p1) (p2, 1] and 0 h (p) > 0 for p ∈ (p1, p2), indicating that h(p) monotonically decreases S for p ∈ (0, p1) (p2, 1], and increases for p ∈ (p1, p2). If h(p1) > 0 or

h(p2) < 0, then h(p) = 0 has one non-zero root 0 < pL ≤ 1; Otherwise,

h(p) = 0 has three non-zero roots 0 < pA ≤ pS ≤ pL ≤ 1, in which

h(p1) ≤ 0 and h(p2) ≥ 0. Appendix G

Proof of Theorem 5.2

ˆa Proof. To derive the maximum access throughput λmax and the optimal ACB ∗ ˆa factor q , let us first rewrite the expression of the access throughput λout as

ˆa −nλβ n2λβ λout = 2 + λ , (G.1) λ(1+λ)+ng(p)(β−λ ) (1+λ)+n(β−λ2) g(p)

q by combining (5.8) and (5.12), where g(p) = − ln p . It can be clearly seen from ˆa (G.1) that λout is maximized when g(p) is maximized. Therefore, we focus on g(p) in the following.

The derivative of g(p) with regard to p can be written as

0 q q0(p) g (p) = p(ln p)2 − ln p , (G.2)

where q0(p) is the derivative of q with regard to p. According to (5.10), we can obtain that −λp(ln p)2−βλ ln p q = β(nλ+p ln p) , (G.3) and 2 0 λ(βnλ+p(ln p) (nλ+p−β)+2nλp ln p) q (p) = − βp(nλ+p ln p)2 . (G.4) By combining (G.2)–(G.4), we can then rewrite g0(p) as

0 λ(β−nλ)(1+ln p) g (p) = − β(nλ+p ln p)2 . (G.5)

It can be seen from (G.5) that g0(p) > 0 for p ∈ (0, e−1) and g0(p) < 0 for p ∈ (e−1, 1], indicating that g(p) monotonically increases for p ∈ (0, e−1) and

99 100 Appendix G

decreases for p ∈ (e−1, 1]. Thus, it can be concluded that g(p) is maximized when p∗ = e−1. Accordingly, the optimal ACB factor q∗ in (5.14) can be obtained by ∗ −1 ˆa substituting p = e into (5.10), and the maximum access throughput λmax can be derived by substituting p∗ = e−1 and (5.14) into (5.12).

Note that it has been shown in Chapter 5.3 that the network may have t-

wo steady-state points, i.e., the desired steady-state point pL and the undesired −1 steady-state point pA. In the following, we prove that pA < e , implying that the ˆa maximum access throughput λmax can only be achieved when the network operates

at pL. Specifically, when the network has two steady-state points pL and pA, we 0 0 can see from AppendixF that 0 < pA < pE < pL ≤ 1 and h (pE) > 0, where h (p)

and pE are given in (F.3) and (F.5), respectively. By combining (F.3) and (F.5), we have

 qβ  β qβ  qβ  β qβ   β qβ  −W0 exp(1+ ) +W0 exp(1+ ) +1−2W0 exp(1+ ) 0 2λ 2 2λ 2λ 2 2λ 2 2λ h (pE) = β . (G.6)

β qβ  βe  Note that for β ≥ 1, 1−2W0 2 exp(1 + 2λ ) < 1−2W0 2 < 0. Therefore, it can 0 qβ β qβ  be seen from (G.6) that if h (pE) > 0, then we must have 2λ > W0 2 exp(1 + 2λ ) , qβ β qβ  with which ln pE = −1− 2λ +W0 2 exp(1 + 2λ ) < −1, indicating that pA < pE < e−1. Bibliography

[1] L. Atzori, A. Iera, and G. Morabito, “The Internet of Things: A Survey,” J. Comput. Networks, vol. 54, no. 15, pp. 2787–2805, Oct. 2010.

[2] D. Hanes, G. Sagueiro, P. Grossetete, R. Barton and J. Henry, IoT Funda- mentals: Networking Technologies, Protocols, and User Cases for the Internet of Things, Cisco Press, 2017.

[3] UK Goverment Chief Scientific Adivser, The Internet of Things: mak- ing the most of the Second Digital Revolution, Aviailable online: http- s://www.oxfordmartin.ox.ac.uk/publications/view/1846

[4] V. W. S. Wong, R. Schober, D. W. K. Ng and L. C. Wang, Key Technologies for 5G Wireless Systems, Cambridge University Press, 2017.

[5] Bluetooh SIG, “Bluetooth specification version 4.0,” 2010. Aviailable online: https://www.bluetooth.org/en-us/specification/adopted-specifications

[6] 3GPP, TR 38.802 V14.0.0 “Study on new radio access technology physical layer aspects,” Mar. 2017.

[7] V. B. Miˇsi´cand J. Miˇsi´c, Machine-to-machine Communications: Architectures, Standards and Applications. CRC Press, 2014.

[8] F. Ghavimi and H. H. Chen, “M2M communications in 3GPP LTE/LTE-A networks: architectures, service requirements, challenges, and applications,” IEEE Commun. Surveys Tuts., vol. 17, no. 2, pp. 525–549, Second Quarter 2015.

[9] A. Laya, L. Alonso, and J. Alonso-Zarate, “Is the random access channel of LTE and LTE-A suitable for M2M communications? A survey of alternatives,” IEEE Commun. Surveys Tuts., vol. 16, no. 1, pp. 4–16, First Quarter 2014.

101 102 Bibliography

[10] A. Aijaz, “Protocol design for machine-to-machine networks,” Ph.D. dissertation, King’s College London, 2014. Aviailable on- line: https://kclpure.kcl.ac.uk/portal/en/theses/protocol-design-for- machinetomachine-networks(afa66e02-39e0-47fc-b496-e5e7bd86f74c).html

[11] Cisco whitepaper, “Cisco visual networking index: global mobile data traffic forecast update, 2015-2020,” Feb. 2016.

[12] A. Biral, M. Centenaro, A. Zanella, L. Vangelista, and M. Zorzi, “The chal- lenges of M2M massive access in wireless cellular networks,” Digit. Commun. Netw., vol. 1, no. 1, pp. 1–19, Feb. 2015.

[13] C. Cox, An Introduction to LTE: LTE, LTE-Advanced, SAE and Mobile Communications. Wiley, 2012.

[14] J. Korhonen, Introduction to 4G Mobile Communications, Artech House, 2014.

[15] F. Khan, LTE for 4G : air interface technologies and per- formance, Cambridge University Press, 2009.

[16] 3GPP TS 36.211 V10.4.0, “Evolved Universal Terrestrial Radio Access (E- UTRA); Physical Channels and Modulation,” Dec. 2011.

[17] 3GPP TS 36.300 V13.2.0, “Evolved Universal Terrestrial Radio Access (E- UTRA) and Evolved Universal Terrestrial Radio Access Network (E-UTRAN); Overall description; Stage 2,” Jan. 2016.

[18] 3GPP TS 36.321 V12.5.0, “Evolved Universal Terrestrial Radio Access (E- UTRA); Medium Access Control (MAC) protocol specification,” Apr. 2015.

[19] 3GPP TS 36.331 V13.3.0, “Evolved Universal Terrestrial Radio Access (E- UTRA); Radio Resource Control (RRC) protocol specification,” Jan. 2017.

[20] 3GPP TS 24.301 V13.6.1, “Technical Specification Group Core Network and Terminals; Non-Access-Stratum (NAS) protocol for Evolved Packet System (EPS);” Jun. 2016.

[21] E. Dahlman, S. Parlvall and J. Sk¨old, 4G: LTE/LTE-Advanced for Mobile Broadband. Elsvier, 2014.

[22] 3GPP TR 37.868 V11.0.0, “Study on RAN improvements for machine-type communications,” Oct. 2011. Bibliography 103

[23] N. Abramson, “The Aloha system: another alternative for computer com- munications,” in Proc. Fall Joint Comput. Conf., vol. 44, pp. 281–285, Nov. 1970.

[24] H. Takagi and L. Kleinrock, “Throughput analysis for persistent CSMA sys- tems,” IEEE Trans. Commun., vol. 33, no. 7, pp. 627–638, Jul. 1985.

[25] R. MacKenzie and T. O’Farrell, “Throughput and delay analysis for p- persistent CSMA with heterogeneous traffic,” IEEE Trans. Commun., vol. 58, no. 10, pp. 2881–2891, Sept. 2010.

[26] P. K. Wong, D. Yin, and T. T. Lee, “Analysis of non-persistent CSMA proto- cols with exponential backoff scheduling,” IEEE Trans. Commun., vol. 59, no. 8, pp. 2206–2214, Aug. 2011.

[27] J. Seo, H. Jin, and V. C. M. Leung, “Throughput upper-bound of slotted CSMA systems with unsaturated finite population,” IEEE Trans. Commun., vol. 61, no. 6, pp. 2477–2487, Jun. 2013.

[28] P. Osti, P. Lassila, S. Aalto, A. Larmo, and T. Tirronen, “Analysis of PDCCH performance for M2M traffic in LTE,” IEEE Trans. Veh. Technol., vol. 63, no. 9, pp. 4357–4371, Nov. 2014.

[29] R. R. Tyagi, F. Aurzada, K. D. Lee, and M. Reisslein, “Connection establish- ment in LTE-A networks: justification of poisson process modeling,” IEEE Syst. J., vol. 11, no. 4, pp. 2383–2394, Dec. 2017.

[30] R. R. Tyagi, F. Aurzada, K. D. Lee, S. G. Kim, and M. Reisslein, “Impact of retransmission limit on preamble contention in LTE-Advanced network,” IEEE Syst. J., vol. 9, no. 3, pp. 752–765, Oct. 2015.

[31] D. R. Morgan, “Random-Access channel queuing model,” IEEE Trans. Veh. Technol., vol. 65, no. 4, pp. 2522–2527, Apr. 2016.

[32] O. Arouk and A. Ksentini, “General model for RACH procedure performance analysis,” IEEE Commun. Lett., vol. 20, no. 2, pp. 372–375, Feb. 2015.

[33] C. H. Wei, G. Bianchi, and R. G. Cheng, “Modeling and analysis of random access channels with bursty arrivals in OFDMA wireless networks,” IEEE Trans. Wireless Commun., vol. 14, no. 4, pp. 1940–1953, Apr. 2015. 104 Bibliography

[34] M. Koseoglu, “Lower bounds on the LTE-A average random access delay under massive M2M arrivals,” IEEE. Trans. Wireless Commun., vol. 64, no. 5, pp. 2104–2115, May 2016.

[35] V. Anantharam, “The stability region of the finite-user slotted Aloha proto- col,” IEEE Trans. Inf. Theory, vol. 37, no. 3, pp. 535–540, May 1991.

[36] W. Szpankowski, “Stability conditions for some distributed systems: buffered random access systems,” Adv. Appl. Probab., vol. 26, pp. 498–515, Jun. 1993.

[37] W. Luo and A. Ephremides, “Stability of N interacting queues in random- access systems,” IEEE Trans. Inf. Theory, vol. 45, no. 5, pp. 1579–1587, Jul. 1999.

[38] J. B. Seo and V. C. M. Leung, “Design and analysis of backoff algorithms for random access channels in UMTS-LTE and IEEE 802.16 systems,” IEEE Trans. Veh. Technol., vol. 60, no. 8, pp. 3975–3989, Oct. 2011.

[39] D. Niyato, P. Wang, and D. I. Kim, “Performance modeling and analysis of heterogeneous machine type communications,” IEEE Trans. Wireless Com- mun., vol. 13, no. 5, pp. 2836–2849, Apr. 2014.

[40] L. Dai, “Stability and delay analysis of buffered Aloha networks,” IEEE. Trans. Wireless Commun., vol. 11, no. 8, pp. 2707–2719, Aug. 2012.

[41] L. Dai, “Toward a coherent theory of CSMA and Aloha,” IEEE Trans. Wire- less Commun., vol. 12, no. 7, pp. 3428–3444, Jul. 2013.

[42] L. Dai and X. Sun, “A unified analysis of IEEE 802.11 DCF networks: sta- bility, throughput and delay,” IEEE Trans. Mobile Comput., vol. 12, no. 8, pp. 1558–1572, Aug. 2013.

[43] Y. Gao, X. Sun, and L. Dai, “IEEE 802.11e EDCA networks: modeling, dif- ferentiation and optimization,” IEEE Trans. Wireless Commun., vol. 13, no. 7, pp. 3863–3879, Jul. 2014.

[44] Y. Li and L. Dai, “Maximum sum rate of slotted Aloha with capture,” IEEE Trans. Commun., vol. 64, no. 2, pp. 690–705, Feb. 2016.

[45] X. Sun and L. Dai, “Performance optimization of CSMA networks with a finite retry limit,” IEEE Trans. Wireless Commun., vol. 15, no. 9, pp. 5947– 5962, Sept. 2016. Bibliography 105

[46] S. Y. Lien, T. H. Liau, C. Y. Kao, and K. C. Chen, “Cooperative access class barring for Machine-to-Machine communication,” IEEE Trans. Wireless Com- mun., vol. 11, no. 1, pp. 27–32, Jan. 2012.

[47] H. Wu, C. Zhu, R. La, X. Liu, and Y. Zhang, “FASA: Accelerated S-ALOHA using access history for event-driven M2M communications,” IEEE/ACM Tran- s. Netw., vol. 21, no. 6, pp. 1904–1917, Dec. 2013.

[48] Z. Wang and V. W. S. Wong, “Optimal access class barring for stationary machine type communication devices with timing advance information,” IEEE Trans. Wireless Commun., vol. 14, no. 10, pp. 5374–5387, Jun. 2015.

[49] S. Duan, V. Shah-Mansouri, Z. Wang, and V. W. S. Wong, “D-ACB: Adaptive congestion control algorithm for bursty M2M traffic in LTE networks,” IEEE Trans. Veh. Technol., vol. 65, no. 12, pp. 9847–9861, Dec. 2016.

[50] G. Y. Lin, S. R. Chang, and H. Y. Wei, “Estimation and adaptation for bursty LTE random access,” IEEE Trans. Veh. Technol., vol. 65, no. 4, pp. 2560–2577, Apr. 2016.

[51] T. M. Lin, C. H. Lee, J. P. Cheng, and W. T. Chen, “PRADA: prioritized ran- dom access with dynamic access barring for MTC in 3GPP LTE-A networks,” IEEE Trans. Veh. Technol., no. 63, vol. 5, pp. 2467–2472, Jan. 2014.

[52] C. Y. Oh, D. Hwang, and T. J. Lee, “Joint access control and resource alloca- tion for concurrent and massive access of M2M devices,” IEEE Trans. Wireless Commun., vol. 14, no. 8, pp. 4182–4192, Mar. 2015.

[53] R. G. Cheng, F. M. Al-Taee, J. Chen, and C. H. Wei, “A dynamic resource allocation scheme for group paging in LTE-advanced networks,” IEEE Internet Things J., vol. 2, no. 5, pp. 427–434, Oct. 2015.

[54] G. Y. Lin and H. Y. Wei, “Auction-Based random access load control for time-dependent machine-to-machine communications,” IEEE Internet Things J., vol. 3, no. 5, pp. 658–672, Oct. 2016.

[55] Y. C. Pang, G. Y. Lin, and H. Y. Wei, “Context-Aware dynamic resource allocation for cellular M2M communications,” IEEE Internet Things J., vol. 3, no. 3, pp. 318-326, Jun. 2016. 106 Bibliography

[56] H. Thomsen, N. K. Pratas, C.ˇ Stefanovi´c,and P. Popovski, “Code-expanded radio access protocol for machine-to-machine communications,” Trans. Emerg. Telecommun. Technol., vol. 24, no. 4, pp. 355–365, May 2013.

[57] H. S. Dhillon, H. Huang, H. Viswanathan, and R. A. Valenzuela, “Fundamen- tals of throughput maximization with random arrivals for M2M communica- tions,” IEEE Trans. Commun., vol. 62, no. 11, pp. 4094–4109, Sept. 2014.

[58] D. T. Wiriaatmadja and K. W. Choi, “Hybrid random access and data trans- mission protocol for machine-to-machine communications in cellular networks,” IEEE Trans. Wireless Commun., vol. 14, no. 1, pp. 33–46, Jun. 2015.

[59] M. Shirvanimoghaddam, Y. Li, M. Dohler, B. Vucetic, and S. Feng, “Proba- bilistic rateless multiple access for machine-to-machine communication,” IEEE Trans. Wireless Commun., vol. 14, no. 12, pp. 6815–6826, Dec. 2015.

[60] J. Miˇsi´c,V. B. Miˇsi´c,and N. Khan, “Sharing it my way: efficient M2M access in LTE/LTE-A networks,” IEEE Trans. Veh. Technol., vol. 66, no. 1, pp. 696– 709, Jan. 2017.

[61] S. Lam and L. Kleinrock, “Packet switching in a multiaccess broadcast chan- nel: dynamic control procedures,” IEEE Trans. Commun., vol. 23, no. 9, pp. 891–904, Sept. 1975.

[62] M. J. Feguson, “On the control, stability, and waiting time in a slotted ALO- HA random-access system,” IEEE Trans. Commun., vol. 23, no. 11, pp. 1306– 1311, Nov. 1975.

[63] G. Fayolle, E. Gelenbe, and J. Labetoulle, “Stability and optimal control of the packet switching broadcast channel,” J. Assoc. Comput. Machinery, vol. 24, no. 3, pp. 375–386, Jul. 1977.

[64] B. Hajek and T. Van Loon, “Decentralized dynamic control of a multiaccess broadcast channel,” IEEE Trans. Automat. Contr., vol. 27, no. 3, pp. 559–569, Jun. 1982.

[65] R. Rivest, “Network control by Bayesian broadcast,” IEEE Trans. Inf. The- ory, vol. 33, no. 3, pp. 323–328, May 1987.

[66] 3GPP TS 22.011 V11.3.0, “Service accessibility,” Apr. 2013. Bibliography 107

[67] K. Sakakibara, T. Seto, D. Yoshimura, and J. Yamakita, “Effect of exponential backoff scheme and retransmission cutoff on the stability of frequency-hopping slotted ALOHA systems,” IEEE Trans. Wireless Commun., vol. 2, no. 4, pp. 714–722, Jul. 2003.

[68] D. Gross and C. M. Harris, Fundamentals of Queueing Theory. Wiley, 1998.

[69] D. Bertsekas and R. Gallager, Data Networks. Prentic Hall, 1992.

[70] 3GPP TSG RAN WG2 #71 R2-104662, “MTC simulation results with spe- cific solutions,” Aug. 2010.

[71] X. Jian, Y. Liu, Y. Wei, X. Zeng, and X. Tan, “Random access delay distri- bution of multichannel slotted ALOHA with its applications for machine type communications,” IEEE Internet Things J., vol. 4, no. 1, pp. 21–28, Feb. 2017.

[72] Z. Feng, Z. Feng, and T. A. Gulliver, “Biologically inspired two-stage re- source management for machine-type communications in cellular networks,” IEEE Trans. Wireless Commun., vol. 16, no. 9, pp. 5897–5910, Sept. 2017.

[73] K. Zheng, F. Hu, W. Wang, W. Xiang, and M. Dohler, “Radio resource allo- cation in LTE-advanced cellular networks with M2M communications,” IEEE Commun. Mag., vol. 50, no. 7, Jul. 2012.

[74] F. Ghavimi, Y. W. Lu, and H. H. Chen, “Uplink scheduling and power al- location for M2M communications in SC-FDMA-based LTE-A networks with QoS guarantees,” IEEE Trans. Veh. Technol., vol. 66, no. 7, pp. 6160–6170, Jul. 2017.

[75] A. Aijaz, M. Tshangini, M. R. Nakhai, X. Chu, and A. H. Aghvami, “Energy-efficient uplink resource allocation in LTE networks with M2M/H2H co-existence under statistical QoS guarantees,” IEEE Trans. Commun., vol. 62, no. 7, pp. 2353–2365, Jul. 2014.

[76] G. Zhang, A. Li, K. Yang, L. Zhao, Y. Du, and D. Cheng, “Energy-efficient power and time-slot allocation for cellular-enabled machine type communica- tions,” IEEE Commun. Lett., vol. 20, no. 2, pp. 368–371, Feb. 2016.

[77] A. Azari and G. Miao, “Network lifetime maximization for cellular-based M2M networks,” IEEE Access, vol. 5, pp. 18927–18940, Sept. 2017. 108 Bibliography

[78] H. S. Jang, S. M. Kim, H. S. Park, and D. K. Sung, “Message-embedded random access for cellular M2M communications,” IEEE Commun. Lett., vol. 20, no. 5, pp. 902–905, May 2016.

[79] Y. D. Beyene, R. J¨antti, and K. Ruttik, “Random access scheme for sporadic users in 5G,” IEEE Trans. Wireless Commun., vol. 16, no. 3, pp. 1823–1833, Mar. 2017.

[80] M. Centenaro, L. Vangelista, S. Saur, A. Weber, and V. Braun, “Comparison of collision-free and contention-based radio access protocols for the Internet of Things,” IEEE Trans. Commun., vol. 65, no. 9, pp. 3832–3846, Sept. 2017.

[81] X. Zhang, Y. C. Liang, and J. Fang, “Novel bayesian inference algorithms for multiuser detection in M2M communications,” IEEE Trans. Veh. Technol., vol. 66, no. 9, pp. 7833–7848, Sept. 2017.

[82] Y. P. E. Wang, X. Lin, A. Adhikary, A. Gr¨ovlen,Y. Sui, Y. Blankenship, J. Bergman and H. S. Razaghi “A primer on 3GPP narrowband Internet of Things,” IEEE Commun. Mag., vol. 55, no. 3, pp. 117–123, Mar. 2017.

[83] R. Harwahyu, R. G. Cheng, W. J. Tsai, J. K. Hwang and G. Bianchi, “Rep- etitions versus retransmissions: Tradeoff in configuring NB-IoT random access channels,” IEEE Internet Things J., vol. 6, no. 2, pp. 3796–3805, Apr. 2019. List of Publications

Journal Papers

1. Wen Zhan and Lin Dai, “Massive Random Access of Machine-to-Machine Communications in LTE Networks: Modeling and Throughput Optimiza- tion,” IEEE Trans. Wireless Commun., vol. 17, no. 4, pp. 2771–2785, Apr. 2018.

2. Wen Zhan and Lin Dai, “Massive Random Access of Machine-to-Machine Communications in LTE Networks: Throughput Optimization with a Finite Data Transmission Rate,” accepted by IEEE Trans. Wireless Commun..

3. Wen Zhan and Lin Dai, “Access Delay Optimization of M2M Communica- tions in LTE Networks,” accepted by IEEE Wireless Commun. Lett..

Conference Papers

1. Wen Zhan and Lin Dai, “Throughput Optimization for Massive Random Access of M2M Communications in LTE Networks,” in Proc. IEEE ICC’17, Paris, France, May 21–25, 2017.

2. Wen Zhan and Lin Dai, “Community-based Random Access Scheme for M2M Communications in LTE Networks,” in Proc. IEEE ISCIT’19, Ho Chi Minh, Vietnam, Sept. 25-27, 2019.