logo资料库

M2M通信的新随机访问中的资源分配.pdf

第1页 / 共4页
第2页 / 共4页
第3页 / 共4页
第4页 / 共4页
资料共4页,全文预览结束
IEEE COMMUNICATIONS LETTERS, VOL. 19, NO. 5, MAY 2015 843 Resource Allocation in a New Random Access for M2M Communications Ningbo Zhang, Guixia Kang, Jing Wang, Yanyan Guo, and Fabrice Labeau, Member, IEEE Abstract—To increase the number of successful accesses for machine-to-machine (M2M) communication, we propose a new random access (RA) procedure. The proposed RA procedure al- lows evolved NodeB (eNB) to know the preamble collisions in the first step by attaching user equipment (UE) identity information in physical random access channel (PRACH). This improvement prevents eNB from scheduling physical uplink shared channel (PUSCH) to the collided preambles, which improves the resource efficiency. Based on the enhanced RA procedure, a resource allo- cation scheme is proposed. By estimating the number of successful preamble, the proposed scheme achieves a reasonable resource tradeoff between PRACH and PUSCH. Simulation results show that the proposed RA procedure significantly improves the num- ber of successful accesses as well as the resource efficiency. Index Terms—Machine-to-machine communications, random access, preamble collision, resource allocation. I. INTRODUCTION L OOKING ahead to the year of 2020 and beyond, hundreds of billions of machine-to-machine (M2M) connections will be made in cellular networks. Due to the massive connec- tions, how to support more M2M UEs simultaneously connect- ing to the cellular network is an important issue [1]. Random access (RA) is the first step to access cellular network. In a RA procedure, two uplink channels are required, i.e., physical ran- dom access channel (PRACH) for preamble transmission and physical uplink shared channel (PUSCH) for data transmission [2]. In M2M communications, there are two bottlenecks. The first one is preamble collisions on PRACH, i.e., if more than one M2M UE selects the same preamble on the same PRACH, they will share the same PUSCH for data transmission. When eNB schedules the same PUSCH to multiple UEs, this PUSCH is wasted because eNB cannot decode any data packet due to the co-channel interference. The second one is resource allocation between PRACH and PUSCH. Even if an M2M UE successfully selects a preamble without collision, it still fails if there are not enough resource blocks (RBs) allocated to the corresponding PUSCH. There have been several studies on the first bottleneck. In [3], an extended access barring (EAB) is introduced to control PRACH overload in which the delay tolerant UEs are not al- lowed to perform RA when PRACH overload is serious. In [4], a novel RA scheme to effectively increase the number of avail- able preambles is proposed. The proposed scheme provides additional preambles by spatially partitioning a cell coverage into multiple group regions and reducing cyclic shift size in RA preambles. For fixed-location M2M UEs, a new RA scheme in [5] is proposed. Based on the fixed timing alignment, a fixed-location M2M UE predetermines the possible occurrence of collisions, which can significantly reduce the probability of collisions. In [6], the authors review several RA overload control mechanisms to avoid congestion. Above studies mainly focus on how to lower the probability of preamble collision. When counting the number of successful accesses, the common assumption is that the number of PUSCH is sufficient. However, in practical systems, if more RBs are allocated to PUSCH, the number of RBs allocated to PRACH will correspondingly decrease because the total number of up- link RBs is fixed. This in turn impacts the number of available preamble. On the other hand, some PUSCH may be wasted on the collided preamble, which further decreases the efficiency of resource usage. Therefore, there are two problems on re- source allocation: 1) How to avoid resource wasting caused by collisions. 2) How to allocate resources between PRACH and PUSCH. To solve these problems, we propose a new RA procedure and a resource allocation scheme in this letter. The remainder of this letter is organized as follows. Section II presents the traditional RA procedure. Section III elaborates the improved RA procedure and the proposed resource allocation scheme. Evaluation results are given in Section IV, while the letter is concluded in Section V. Manuscript received November 21, 2014; revised February 21, 2015; accepted March 10, 2015. Date of publication March 18, 2015; date of current version May 7, 2015. This work was supported by Open Project of Key Laboratory of Ministry of Education for Wireless Communication: No. (KFKT-2014103), the National Science and Technology Major Project of China (No. 2013ZX03006001), the National High Technology Research and Development Program of China (“863”Program, No. SS2015AA011303), the National Natural Science Foundation of China (61471064, 61301146), and the Fundamental Research Funds for the Central Universities. The associate editor coordinating the review of this paper and approving it for publication was A. Lioumpas. (Corresponding author: Jing Wang.) N. Zhang and G. Kang are with Key Laboratory of Universal Wireless Communications, Ministry of Education, Beijing University of Posts and Telecommunications, Beijing 100876, China. J. Wang is with the College of Information Science and Technology, Beijing Normal University, Beijing 100875, China (e-mail: j.wang@bnu.edu.cn). Y. Guo is with the College of Physics and Electronic Engineering, ShanXi University, Taiyuan 030006, China. F. Labeau is with the Department of Electrical and Computer Engineering, McGill University, Montreal, QC H3A 0E9, Canada. Digital Object Identifier 10.1109/LCOMM.2015.2413961 II. TRADITIONAL RANDOM ACCESS PROCEDURE In long term evaluation (LTE) systems, there are two types of RA procedure: contention-based and contention-free [7]. This letter only focuses on the contention-based manner. A contention-based RA procedure consists of the following four steps: Step 1: An UE randomly selects one preamble from all avail- able preambles with equal probability and transmits it on PRACH. Step 2: After detecting the preamble, eNB transmits the cor- responding random access response (RAR) through downlink channels. The RAR conveys the identity of detected preamble, uplink grant for scheduled message in step 3, timing alignment (TA) information and the assignment of a temporary identifier. 1558-2558 © 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
844 IEEE COMMUNICATIONS LETTERS, VOL. 19, NO. 5, MAY 2015 Fig. 1. Resource allocation in a RA cycle. Step 3: After receiving the corresponding RAR, UE adjusts uplink transmission time according to the received TA and transmits a scheduled message on PUSCH. If more than one UE selects the same preamble in step 1, they will receive the same RAR and send their scheduled messages on the same PUSCH. There- fore, multiple scheduled messages are collided on PUSCH. Step 4: If eNB correctly decodes scheduled message from step 3, it transmits the contention resolution to the corresponding UE. If UE cannot receive the RAR message or contention resolution within correspond- ing timing window, it regards preamble transmission as a collision and reattempts RA procedure after a random back-off. It is known that uplink RBs are divided into PRACH subset and PUSCH subset in a RA cycle, as shown in Fig. 1. In traditional random access, eNB knows the occurrence of pream- ble collisions only when it cannot decode scheduled messages in step 3. Meanwhile, numbers of RBs are already assigned to those PUSCH where collisions happen. As a result, these assigned RBs are wasted. Obviously, if eNB can detect the collisions in step 1 and does not assign RBs to the collided PUSCH, resource wasting can be prevented. III. PROPOSED RANDOM ACCESS PROCEDURE AND RESOURCE ALLOCATION SCHEME A. Proposed Random Access Procedure In LTE systems, the preambles consist of the Zadoff-Chu sequence and the length of preamble sequence for format 0, 1, 2, and 3 is 839 [8]. A PRACH consists of 6 physical RBs (PRBs) in a subframe, which occupies 864 subcarriers. 64 preamble sequences are mapped to the central 839 subcarriers while the rest 25 subcarriers are reserved for guard band. After receiving the preambles on PRACH, eNB calculates the value of power delay profile (PDP). If the estimated PDP is higher than a predefined threshold, the preamble is regarded as active. eNB can detect if a preamble is active, but it does not know how many UEs select this preamble. We extend the traditional preamble transmission by trans- mitting not only preamble but also the UE identity (UE ID) information and a cyclic redundancy check (CRC) on PRACH. All UEs’ ID information and CRC are mapped to the same reserved subcarriers in the guard band. The length of UE ID and the position of mapping subcarriers are predefined. Given that every UE has a unique ID, when more than one UE selects the same preamble and transmits their IDs on the same predefined subcarriers, eNB cannot correctly decode UE ID because of the Fig. 2. The proposed PRACH mapping pattern. Fig. 3. Proposed RA procedure. interferences. Thus, eNB thinks that collisions happen and will not schedule PUSCH to this preamble. Therefore, resources wasting can be avoided. Fig. 2 gives an example of the proposed PRACH mapping pattern. In this example, we assume four bits of UE ID and four bits of CRC with quadrature phase shift keying (QPSK) modulation are transmitted on four predefined subcarriers (yel- low part in Fig. 2). Preamble sequences are still mapped to the central 839 subcarriers. Based on the new designed PRACH, a proposed RA pro- cedure is described in the following. Fig. 3 presents the procedure. Step 1: An M2M UE transmits a preamble, UE ID informa- tion and CRC on PRACH. Step 2: eNB first calculates the PDP of a preamble to detect if this preamble is active. If this preamble is active, eNB begins to decode the UE ID. After successfully de- coding the UE ID, eNB schedules PUSCH and sends the corresponding RAR. Otherwise, this preamble is regarded as a collision and eNB will stop sending the corresponding RAR. Step 3: Data packets are attached to the scheduled mes- sage to reduce the overhead of scheduling signal- ing considering the small size data packet of M2M communication.
ZHANG et al.: RESOURCE ALLOCATION IN A NEW RANDOM ACCESS FOR M2M COMMUNICATIONS Step 4: The same procedure is processed as the tradi- tional RA. B. Resource Allocation Scheme Between PRACH and PUSCH In this subsection, a resource allocation scheme for the proposed RA procedure is analyzed. As we know, before a RA cycle begins, eNB allocates the uplink RBs to PRACH and PUSCH, and broadcasts the PRACH configuration to all M2M UEs via the broadcast or the control channel. This subsection discusses the resource allocation between PRACH and PUSCH. The overall resource efficiency is defined as the number of RBs for successful random accesses over the total number of RBs for M2M communications. We assume that eNB can perfectly detect the preamble collisions in step 1 so that no RBs are wasted on collided preambles. A fixed uplink modulation and coding scheme (MCS) for M2M transmission is assumed. We define the number of active M2M UEs in a RA cycle with Nm, where Nm includes reattempting UEs which failed in previous RA cycles and the new arrived UEs in the current RA cycle. eNB can obtain the value of Nm by a load estimation algorithm [9]. Assuming that the total number of RBs in a RA cycle is q, that the number of RBs allocated to PRACH is l, and the number of RBs allocated to PUSCH is d, then we have: q = d + l. (1) Suppose the numbers of RBs constituting one preamble and one PUSCH are k and n, respectively. Therefore, the total number of RBs for one successful access is k + n. The overall resource efficiency can be written as: BAcc · (n + k) r = q , (2) where BAcc denotes the number of successful accesses. Let H and I denote the number of available PUSCH and the number of successful preamble constructed from d and l RBs, respectively. Then we have: H = , I = , (3) Psl k d n where Ps is the estimated probability of a successful preamble (i.e., a preamble that is selected only by one UE) in step 1, and denotes the bottom integer function. Theorem 1: The maximum r can be achieved when the resource allocation between PRACH and PUSCH satisfies: (4) H = I. Proof: When H = I, n and Psl k can be written as the sum of the bottom integer part and the decimal part in the following, . The values of d Psl k = d n , = = d n d n + dec + dec Psl k Psl k Psl k d , (5) n where dec(·) denotes the decimal function. In practical systems, since the numbers of available PUSCH and successful pream- bles are much larger than 1, the value of the decimal part in (5) must be much smaller than the value of the integer part, therefore, the decimal part in (5) can be neglected. In this way, (4) can be written as: d n = Psl k . (6) dtr = nq k + n . (13) 845 (7) (8) The overall resource efficiency is calculated as: d n · (n + k) q r1 = = d + Psl q . When H < I, under the above approximation, we have d Psl k . The overall resource efficiency becomes: d + Psl · (n + k) d n n < r2 = q < q = r1. Similarly, we can also obtain an inequality when H > I. Therefore, we conclude that the maximum r can be achieved when the number of PUSCH equals the number of successful preambles. In theorem 1, Ps is a key parameter. Suppose the number of . In step 1, preamble , there- available preamble is Np, then Np = selection follows a Binomial distribution with mean 1 Np fore, Ps is calculated as: Ps = P (Bi = 1) = binom(Nm, 1) · Nm−1 , l k 1 Np 1 − 1 Np (9) where Bi denotes the number of UEs which select the same (y!)×(x−y)! . Substituting (1), preamble i, and binom(x, y) = (3) and (9) into (4), yielding: x! Nm 1 − k (q − d) Nm−1 d n = . (10) Due to the nonlinear function of the left side in (10), it is difficult to directly obtain d. However, since d is a positive integer in the internal of [1, q − 1], we can use an exhaustive algorithm to search the optimal value, which is: Nm−1 dopt = arg min 1≤d≤q−1 Nm 1 − k (q − d) d n − (11) Equation (11) means that the optimal d can be achieved when the gap between the number of successful preamble and the number of available PUSCH is minimum. The number of successful access is expected as: BAcc = min{H, I} = min Nm−1 Nm 1− 1 Np dopt n . , IV. PERFORMANCE EVALUATION (12) In this section, we present the performance of the proposed RA procedure in terms of the number of successful attempts, the resource efficiency and the probability of preamble col- lisions. To simplify the simulation, the miss detections and false alarms during preamble detection are neglected. In the traditional RA procedure, Ps is set to 1 because eNB cannot de- tect the preamble collisions before scheduling PUSCH. Let dtr denotes the number of RBs allocated to PUSCH. By Theorem 1, we have q−dtr n . Note that dtr is an integer, so k = dtr
846 IEEE COMMUNICATIONS LETTERS, VOL. 19, NO. 5, MAY 2015 TABLE I CALCULATION OF dtr AND dopt Fig. 4. Comparison of the number of successful accesses between traditional RA procedure and new RA procedure. In the simulation, we set q = 300 and n = 1. Assuming there are 24 preamble sequences assigned to M2M UEs in every 6 PRBs, so k = 1 4 . By (11) and (13), dopt and dtr with different values of Nm are calculated in Table I. It can be seen that dopt is adaptively adjusted according to different values of Nm, while dtr is a fixed value. Fig. 4 shows the comparison of the number of successful accesses between the traditional RA procedure and the pro- posed RA procedure for different values of Nm. Theoretical analysis in (12) and simulation results in LTE systems are also compared. On PRACH, we use 4 subcarriers for UE ID transmission. Nm ranges from 50 to 1000. It can be seen that with the increase of Nm, the number of successful accesses in the traditional RA procedure significantly decreases, especially when Nm exceeds Np. This is because the probability of preamble collisions becomes larger, and more and more RBs are wasted on the collided PUSCH in step 3. In contrast, the proposed RA procedure achieves a stable number of successful accesses even when the number of active UEs is much higher than the number of available resources. This gain comes from the proposed resource allocation scheme and the pre-detection of preamble collisions. Furthermore, we observe that the theo- retical results match the simulation results. Fig. 5 presents the comparison of the overall resource efficiency in (2), the PUSCH resource efficiency and the probability of preamble collisions between the traditional RA procedure and the proposed RA procedure. The PUSCH re- source efficiency is defined as ratio between the number of PUSCH for successful accesses and the total number of avail- able PUSCH. In Fig. 5, when Nm is smaller than the number of available resources, the overall resource efficiencies for both the traditional RA and the proposed RA are very low. However, with the increase of Nm, the proposed RA scheme outperforms the traditional RA thanks to a more reasonable resource allocation between PRACH and PUSCH. It is worth observing that in traditional RA, the overall resource efficiency is the same as PUSCH resource efficiency. This is because the number of available PRACH is the same as the number of Fig. 5. Comparison of resource efficiency and preamble collision probability between traditional PA procedure and proposed RA procedure. available PUSCH. Regarding the PUSCH resource efficiency, the proposed RA maintains a value of almost 100% even when the probability of preamble collisions increases. In contrast, the PUSCH resource efficiency in traditional RA drops greatly due to serious preamble collisions. Moreover, the probability of preamble collisions in the proposed RA is also lower than that of traditional RA because the wasted RBs are reallocated to PRACH and PUSCH. V. CONCLUSION In this letter, we propose a new RA procedure and a resource allocation scheme for M2M communications. In the proposed RA procedure, eNB can detect the preamble collisions in the first step, and will not schedule PUSCH to the collided preambles. Based on the proposed RA procedure, a resource allocation scheme which achieves a reasonable resource allo- cation between PRACH and PUSCH is proposed. Simulation results show that the proposed RA outperforms the traditional RA procedure in terms of successful accesses, the resource efficiency and the probability of preamble collisions. REFERENCES [1] M. Islam, A.-E. Taha, and S. Akl, “A survey of access management tech- niques in machine type communications,” IEEE Commun. Mag., vol. 52, no. 4, pp. 74–81, Apr. 2014. [2] A. Laya, L. Alonso, and J. Alonso-Zarate, “Is the random access channel of LTE and LTE-a suitable for M2M communications? A survey of alter- natives,” IEEE Commun. Surveys Tuts., vol. 16, no. 1, pp. 4–16, 1st Quart., 2014. [3] T. Kwon and J.-W. Choi, “Multi-group random access resource allocation for M2M devices in multicell systems,” IEEE Commun. Lett., vol. 16, no. 6, pp. 834–837, Jun. 2012. [4] H. S. Jang, S. M. Kim, K. S. Ko, J. Cha, and D. K. Sung, “Spatial group based random access for M2M communications,” IEEE Commun. Lett., vol. 18, no. 6, pp. 961–964, Jun. 2014. [5] K. S. Ko et al., “A novel random access for fixed-location machine-to- machine communications in OFDMA based systems,” IEEE Commun. Lett., vol. 16, no. 9, pp. 1428–1431, Sep. 2012. [6] M. Hasan and E. Hossain, “Random access for machine-to-machine com- munication in LTE-advanced networks: Issues and approaches,” IEEE Commun. Mag., vol. 51, no. 6, pp. 86–93, Jun. 2013. [7] “Evolved universal terrestrial radio access (E-UTRA) medium access con- trol (MAC),” 3rd Generation Partnership Project, Sophia Antipolis Cedex, France, 3GPP TS 36.321, V12.2.1, Jun. 2014. [8] “Evolved universal terrestrial radio access (E-UTRA); Physical channels and modulation,” 3rd Generation Partnership Project, Sophia Antipolis Cedex, France, 3GPP TR 36.211, V12.2.0, Jun. 2014. [9] D. T. Wiriaatmadja and K. W. Choi, “Hybrid random access and data transmission protocol for machine-to-machine communications in cellular networks,” IEEE Trans. Wireless Commun., vol. 14, no. 1, pp. 33–46, Jan. 2015.
分享到:
收藏