Skip to main content Accessibility help
×
Hostname: page-component-7c8c6479df-94d59 Total loading time: 0 Render date: 2024-03-19T06:17:03.523Z Has data issue: false hasContentIssue false

17 - Cellular 5G Access for Massive Internet of Things

from Part III - Network Protocols, Algorithms, and Design

Published online by Cambridge University Press:  28 April 2017

Germán Corrales Madueño
Affiliation:
Aalborg University, Denmark
Nuno Pratas
Affiliation:
Aalborg University, Denmark
Čedomir Stefanović
Affiliation:
Aalborg University, Denmark
Petar Popovski
Affiliation:
Aalborg University, Denmark
Vincent W. S. Wong
Affiliation:
University of British Columbia, Vancouver
Robert Schober
Affiliation:
Friedrich-Alexander-Universität Erlangen-Nürnberg, Germany
Derrick Wing Kwan Ng
Affiliation:
University of New South Wales, Sydney
Li-Chun Wang
Affiliation:
National Chiao Tung University, Taiwan
Get access

Summary

Introduction to the Internet of Things (IoT)

The IoT refers to the paradigm of physical and virtual “things” that communicate and collaborate over the Internet, with or without human intervention. The spectra of things that may be connected within the IoT ranges from complex machines, such as aircraft and cars, to everyday appliances, such as consumer refrigerators, and very simple devices such as humidity sensors. The emphasis of the IoT is on services, which represent the primary driver for interconnecting things. Examples of IoT services include micro-climate monitoring of homes, asset tracking during transportation, and, on a larger scale, controlling the power consumption of all the refrigerators in a country depending on the load. Current and forecast market evaluations (such as Cisco's forecast of a $14.4 trillion global IoT market by 2022 [1]) show that the IoT has a huge revenue potential, to be shared between operators, service providers, hardware vendors, and testing-solutions vendors. Thus, it is not surprising that the IoT is currently one of the hottest topics in the telecommunications world, endorsed by both industry and academia.

A term closely related, but not identical to IoT is machine-to-machine (M2M) communications, or, in the Third Generation Partnership Project (3GPP) terminology, machine-type-communications (MTC). M2M communications refer to the concept in which machines (i.e., standalone devices) communicate with a remote server without human intervention. “M2M can be considered as the plumbing of IoT” [2] or, more formally stated, M2M communications are the key enabler of IoT services. A natural question that arises is how well the existing networking solutions and technologies can serve as the basis for M2M communications and, more broadly, IoT services and, when they cannot support them, how to design other, suitable connectivity solutions. These questions have in recent years instigated a significant body of research and development by industry, standardization bodies, and academia. The general conclusion is that the existing technologies, in their present form, cannot efficiently support M2M communications. The reason is that existing communication systems, particularly in the wireless domain, are designed to efficiently support human-type communications (HTC), such as web browsing, voice calls, and video streaming, where high data rates are essential but the volume of users that simultaneously require service is far beyond the expected number of interconnected devices.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2017

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

[1] Cisco, “Embracing the Internet of Everything to capture your share of $14.4 trillion,” 2015 White Paper. Available at www.cisco.com/c/dam/en_us/about/ac79/docs/innov/IoE_ Economy.pdf.
[2] “IoT and M2M,” 2015. Available at http://iotandm2m.blogspot.dk/2015/06/iot-m2m.html.
[3] SigFox, “Global cellular connectivity for the Internet of Things,” 2015. Available at www.sigfox.com/en/.
[4] LoRa Alliance, “Wide area networks for the Internet of Things,” 2015. Available at www.lora-alliance.org/.
[5] 3GPP, “Overview of 3GPP release 12,” Tech. Rep., 2014.
[6] G. C., Madueño, C., Stefanovic, and P., Popovski, “Reliable and efficient access for alarm-initiated and regular M2M traffic in IEEE 802.11 ah systems,” IEEE Internet Things J., vol. 3, no. 5, pp. 673–682, Oct. 2016.Google Scholar
[7] 3GPP, “Study on machine-type communications (MTC) and other mobile data applications communications enhancements,” TR 22.368, Dec. 2013.
[8] G. C., Madueño, C., Stefanovic, and P., Popovski, “Reengineering GSM/GPRS towards a dedicated network for massive smart metering,” in Proc. of IEEE International Conf. on Smart Grid Communications (SmartGridComm), Nov. 2014.
[9] G. C., Madueño, C., Stefanović, and P., Popovski, “How many smart meters can be deployed in a GSM cell?” in Proc. of IEEE Internatonal Conf. on Communications Workshops (ICC), Jun. 2013.
[10] IEEE, “IEEE 802.16p machine to machine (M2M) evaluation methodology document (EMD),” IEEE 802.16 Broadband Wireless Access Working Group (802.16p), EMD 11/0005, 2011.
[11] FP-7 METIS, “Requirements and general design principles for new air interface,” Deliverable D2.1, 2013.
[12] M., Laner, P., Svoboda, N., Nikaein, and M., Rupp, “Traffic models for machine type communications,” in Proc. of the Tenth International Symposium on Wireless Communication Systems (ISWCS), Aug. 2013.
[13] 3GPP, “Study on RAN improvements for machine-type communications,” TR 37.868 V11.0, Aug. 2010.
[14] G., Andrews, R., Askey, and R., Roy, Special Functions, 1st edn, Cambridge University Press, 2000.
[15] J. P., Cheng, C., Han Lee, and T. M., Lin, “Prioritized random access with dynamic access barring for RAN overload in 3GPP LTE-A networks,” in Proc. of IEEE GLOBECOM Workshops (GC Wkshps), Dec. 2011.
[16] A., Laya, L., Alonso, and J., Alonso-Zarate, “Is the random access channel of LTE and LTE-A suitable for M2M communications? A survey of alternatives,” IEEE Commun. Surv. Tutor., vol. 16, no. 1, pp. 4–16, First Quarter 2014.Google Scholar
[17] 3GPP, “Access barring for delay tolerant access in LTE,” TR R2-113013, May 2011.
[18] 3GPP, “MTC simulation results with specific solutions,” TR R2-104662, Aug. 2010.
[19] 3GPP, “Backoff enhancements for RAN overload control,” TR R2-112863, May 2011.
[20] 3GPP, “RACH congestion evaluation and potential solutions,” TR R2-102824, May 2011.
[21] E., Paolini, C., Stefanovic, G., Liva, and P., Popovski, “Coded random access: Applying codes on graphs to design random access protocols,” IEEE Commun. Mag., vol. 53, no. 6, pp. 144–150, Jun. 2015.Google Scholar
[22] 3GPP, “Medium access control (MAC) protocol specification,” TR 36.321, Tech. Rep., 2014.
[23] N. K., Pratas, C., Stefanovic, G. C., Madueño, and P., Popovski, “Random access for machine-type communication based on bloom filtering.” Available at http://arxiv.org/abs/1511.04930, Nov. 2015.
[24] H., Thomsen, N., Pratas, C., Stefanovic, and P., Popovski, “Analysis of the LTE access reservation protocol for real-time traffic,” IEEE Commun. Lett., vol. 17, no. 8, pp. 1616–1619, Aug. 2013.Google Scholar
[25] G. C., Madueño, J. J., Nielsen, D. M., Kim, N. K., Pratas, C., Stefanovic, and P., Popovski, “Assessment of LTE wireless access for monitoring of energy distribution in the smart grid,” IEEE J. Sel. Areas Commun., vol. 34, no. 3, pp. 675–688, Mar. 2016.Google Scholar
[26] J. J., Nielsen, G. C., Madueño, N. K., Pratas, R. B., Sørensen, C., Stefanovic, and P., Popovski, “What can wireless cellular technologies do about the upcoming smart metering traffic?” IEEE Commun. Mag., vol. 53, no. 9, pp. 41–47, Sep. 2015.Google Scholar
[27] 3GPP, “Study on RAN improvements for machine-type communications, rel. 11,” TR 37.868, Tech. Rep., Sep. 2011.
[28] 3GPP, “Study on enhancements to machine-type communications (MTC) and other mobile data applications; Radio access network (RAN) aspects, rel. 12,” TR 37.869, Tech. Rep., Sep. 2013.
[29] E., Casini, R. D., Gaudenzi, and O., del Rio Herrero, “Contention resolution diversity slotted ALOHA (CRDSA): An enhanced random access scheme for satellite access packet networks,” IEEE Trans. Wireless Commun., vol. 6, no. 4, pp. 1408–1419, Apr. 2007.Google Scholar
[30] G., Liva, “Graph-based analysis and optimization of contention resolution diversity slotted ALOHA,” IEEE Trans. Commun., vol. 59, no. 2, pp. 477–487, Feb. 2011.Google Scholar
[31] E., Paolini, C., Stefanovic, G., Liva, and P., Popovski, “Coded random access: How coding theory helps to build random access protocols,” IEEE Commun. Mag., vol. 53, no. 6, pp. 144–150, Jun. 2015.Google Scholar
[32] E., Paolini, G., Liva, and M., Chiani, “Coded slotted ALOHA: A graph-based method for uncoordinated multiple access,” IEEE Trans. Inf. Theory, vol. 61, no. 12, pp. 6815–6832, Dec. 2015.Google Scholar
[33] C., Stefanovic, M., Momoda, and P., Popovski, “Exploiting capture effect in frameless ALOHA for massive wireless random access,” in Proc. of IEEE Wireless Communications and Networking Conf. (WCNC), May 2014.
[34] G. C., Madueño, N. K., Pratas, C., Stefanovic, and P., Popovski, “Massive M2M access with reliability guarantees in LTE systems,” in Proc. of IEEE International Conf. on Communications (ICC), Jun. 2015.
[35] G. C., Madueño, C., Stefanovic, and P., Popovski, “Reliable reporting for massive M2M communications with periodic resource pooling,” IEEE Wireless Commun. Lett., vol. 3, no. 4, pp. 429–432, Aug. 2014.Google Scholar
[36] F., Boccardi, R., Heath, A., Lozano, T., Marzetta, and P., Popovski, “Five disruptive technology directions for 5G,” IEEE Commun. Mag., vol. 52, no. 2, pp. 74–80, Feb. 2014.Google Scholar
[37] 3GPP, “Further LTE physical layer enhancements for MTC,” Tech. Rep. RP-151186, May 2015.
[38] 3GPP, “Narrowband IOT,” Tech. Rep. RP-151621, 2015.
[39] 3GPP, “EC-GSM concept description,” Tech. Rep. GP-150132, 2015.

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×