Skip to main content Accessibility help
  • Print publication year: 2017
  • Online publication date: April 2017

18 - Medium Access Control, Resource Management, and Congestion Control for M2M Systems

from Part III - Network Protocols, Algorithms, and Design



The current mobile networks provide seamless and reliable streaming (voice/video) services to an increasing number of mobile users. From Global System for Mobile Communications (GSM) General Packet Radio Service (GPRS) and Universal Mobile Telecommunication System (UMTS) to Long Term Evolution (LTE) and LTE-Advanced (LTE-A), the transmission data rates have increased tremendously. Relying on the deployment of a heterogeneous network (HetNet) [1–5] involving macrocells, small cells (femtocells and picocells), and/or relay nodes, ubiquitous support for basic multimedia and Internet browsing applications has been tractable. In addition to mobile networks, wireless local area networks (WLANs) such as IEEE 802.11a/b/g/e/n/ac/ax also support moderate distance data exchange with best effort services or a certain level of quality of service (QoS). As a result, it seems that the needs of human-to-human (H2H) communication applications can be satisfied using the existing network architectures and technologies. However, to substantially facilitate human daily activities, providing only basic voice/video and Internet access services may be insufficient.

Recently, a novel communication paradigm known as machine-to-machine (M2M) communications has had a significant impact on the development of the next generation of wireless applications. Achieving “full automation” and “everything-to-everything” (X2X) connection facilitated byM2M communications has been regarded as two urgent and ultimate targets not only in the industry but also in the context of economics, social communities/activities, transportation, agriculture, and energy allocation [6]. “Full automation” implies a significant enhancement of human beings’ sensory and processing capabilities, which embraces unmanned or remotely controlled vehicles/ robots/offices/factories/stores, augmented/virtual/kinetic reality, and immersive sensory experiences. On the other hand, X2X connection implies that diverse entities, including human and machines, will be able to form new types of communities in addition to those based on H2H communication, such as social networks using human-to-machine (H2M) and M2M communication [7–12]. The applications include intelligent transportation systems (ITSs) [13], volunteer information networks (in which each entity in the network shares information with other entities to obtain a global view of the environment and the community) [14], the Internet of Things (IoT) [15–17], and smart buildings/cities/grids [18–20], to name but a few.

[1] Y. S., Soh, T. Q. S., Quek, M., Kountouris, and H., Shin, “Energy efficient heterogeneous cellular networks,” IEEE J. Sel. Areas Commun., vol. 31, no. 5, pp. 840–850, May 2013.
[2] Q., Li, R. Q., Hu, Y., Qian, and G., Wu, “Intracell cooperation and resource allocation in a heterogeneous network with relays,” IEEE Trans. Veh. Technol., vol. 62, no. 4, pp. 1770–1784, May 2013.
[3] A., Damnjanovic, J., Montojo, Y., Wei, T., Ji, T., Luo, M., Vajapeyam, T., Yoo, O., Song, and D., Malladi, “A survey on 3GPP heterogeneous networks,” IEEEWireless Commun., vol. 18, no. 3, pp. 10–21, Jun. 2011.
[4] M., Wildemeersch, T. Q. S., Quek, M., Kountouris, A., Rabbachin, and C. H., Slump, “Successive interference cancellation in heterogeneous networks,” IEEE Trans. Commun., vol. 62, no. 12, pp. 4440–4453, Dec. 2014.
[5] Y. L., Lee, T. C., Chuah, J., Loo, and A., Vinel, “Recent advances in radio resource management for heterogeneous LTE/LTE-A networks,” IEEE Commun. Surv. Tutor., vol. 16, no. 4, pp. 2142–2180, Fourth Quarter 2014.
[6] S. Y., Lien, S. C., Hung, K. C., Chen, and Y. C., Liang, “Ultra-low latency ubiquitous connections in heterogeneous cloud radio networks,” IEEE Wireless Commun., vol. 22, no. 3, pp. 22–31, Jun. 2015.
[7] K. C., Chen and S. Y., Lien, “Machine-to-machine communications: Technologies and challenges,” Ad Hoc Netw., vol. 18, pp. 3–23, Jul. 2014.
[8] S. Y., Lien, K. C., Chen, and Y., Lin, “Toward ubiquitous massive accesses in 3GPP machine-to-machine communications,” IEEE Commun. Mag., vol. 49, no. 4, pp. 66–74, Apr. 2011.
[9] A., Rajandekar and B., Sikdar, “A survey of MAC layer issues and protocols for machine-to-machine communications,” IEEE Internet Things J., vol. 2, no. 2, pp. 175–186, Apr. 2015.
[10] H. L., Fu, P., Lin, H., Yue, G. M., Huang, and C. P., Lee, “Group mobility management for large-scale machine-to-machine mobile networking,” IEEE Trans. Veh. Technol., vol. 63, no. 3, pp. 1296–1305, Mar. 2014.
[11] X., Xiong, K., Zheng, R., Xu, W., Xiang, and P., Chatzimisios, “Low power wide area machine-to-machine networks: Key techniques and prototype,” IEEE Commun. Mag., vol. 53, no. 9, pp. 64–71, Sep. 2015.
[12] I., Stojmenovic, “Machine-to-machine communications with in-network data aggregation, processing, and actuation for large-scale cyber-physical systems,” IEEE Internet Things J., vol. 1, no. 2, pp. 122–128, Apr. 2014.
[13] G., Dimitrakopoulos and P., Demestichas, “Intelligent transportation systems,” IEEE Veh. Technol. Mag., vol. 5, no. 1, pp. 77–84, Mar. 2010.
[14] C., Chakrabarti and S., Roy, “Adapting mobility of observers for quick reputation assignment in a sparse post-disaster communication network,” in Proc. of IEEE Applications and Innovations in Mobile Computing (AIMoC), Feb. 2015.
[15] R., Pozza, M., Nati, S., Georgoulas, K., Moessner, and A., Gluhak, “Neighbor discovery for opportunistic networking in Internet of things scenarios: A survey,” IEEE Access, vol. 3, pp. 1101–1131, 2015.
[16] M. R., Palattella, N., Accettura, X., Vilajosana, T., Watteyne, L. A., Grieco, G., Boggia, and M., Dohler, “Standardized protocol stack for the Internet of (important) things,” IEEE Commun. Surv. Tutor., vol. 15, no. 3, pp. 1389–1406, Third Quarter 2013.
[17] C., Perera, A., Zaslavsky, P., Christen, and D., Georgakopoulos, “Context aware computing for the Internet of things: A survey,” IEEE Commun. Surv. Tutor., vol. 16, no. 1, pp. 414–454, First Quarter 2014.
[18] K., Katsaros, W., Chai, N., Wang, G., Pavlou, H., Bontius, and M., Paolone, “Information-centric networking for machine-to-machine data delivery: A case study in smart grid applications,” IEEE Netw., vol. 28, no. 3, pp. 58–64, May–Jun. 2014.
[19] Z. M., Fadlullah, M. M., Fouda, N., Kato, A., Takeuchi, N., Iwasaki, and Y., Nozaki, “Toward intelligent machine-to-machine communications in smart grid,” IEEE Commun. Mag., vol. 49, no. 4, pp. 60–65, Apr. 2011.
[20] A., Zanella, N., Bui, A., Castellani, L., Vangelista, and M., Zorzi, “Internet of things for smart cities,” IEEE Internet Things J., vol. 1, no. 1, pp. 22–32, Feb. 2014.
[21] S., Aust, R. V., Prasad, and I. G. M. M., Niemegeers, “Outdoor long-range WLANs: A lesson for IEEE 802.11ah,” IEEE Commun. Surv. Tutor., vol. 17, no. 3, pp. 1761–1775, Third Quarter 2015.
[22] T., Adame, A., Bel, B., Bellalta, J., Barcelo, and M., Oliver, “IEEE 802.11ah: The WiFi approach for M2M communications,” IEEE Wireless Commun., vol. 21, no. 6, pp. 144–152, Dec. 2014.
[23] C., W. Park, D., Hwang, and T. J., Lee, “Enhancement of IEEE 802.11ah MAC for M2M communications,” IEEE Commun. Lett., vol. 18, no. 7, pp. 1151–1154, Jul. 2014.
[24] M., Park, “IEEE 802.11ah: Sub-1-GHz license-exempt operation for the Internet of things,” IEEE Commun. Mag., vol. 53, no. 9, pp. 145–151, Sep. 2015.
[25] V., Jones and H., Sampath, “Emerging technologies for WLAN,” IEEE Commun. Mag., vol. 53, no. 3, pp. 141–149, Mar. 2015.
[26] 3GPP, “Study on provision of low-cost machine-type communications (MTC) user equipments (UEs) based on LTE,” TR 36.888 v12.0.0, Jun. 2013.
[27] A., Samukic, “UMTS universal mobile telecommunications system: Development of standards for the third generation,” IEEE Trans. Veh. Technol., vol. 47, no. 4, pp. 1099–1104, Nov. 1998.
[28] Q., Cui, H., Wang, P., Hu, X., Tao, P., Zhang, J., Hamalainen, and L., Xia, “Evolution of limited-feedback CoMP systems from 4G to 5G: CoMP features and limited-feedback approaches,” IEEE Veh. Technol. Mag., vol. 9, no. 3, pp. 94–103, Sep. 2014.
[29] S., Sun, Q., Gao, Y., Peng, Y., Wang, and L., Song, “Interference management through CoMP in 3GPP LTE-Advanced networks,” IEEE Wireless Commun., vol. 20, no. 1, pp. 59–66, Feb. 2013.
[30] O., Onireti, F., Heliot, and M. A., Imran, “On the energy efficiency–spectral efficiency trade-off in the uplink of CoMP system,” IEEE Trans. Wireless Commun., vol. 11, no. 2, pp. 556–561, Feb. 2012.
[31] V. S., Annapureddy, A., El Gamal, and V. V., Veeravalli, “Degrees of freedom of interference channels with CoMP transmission and reception,” IEEE Trans. Inf. Theory, vol. 58, no. 9, pp. 5740–5760, Sep. 2012.
[32] C. L., I, J., Huang, R., Duan, C., Cui, J. X., Jiang, and L., Li, “Recent progress on C-RAN centralization and cloudification,” IEEE Access, vol. 2, pp. 1030–1039, 2014.
[33] M., Peng, S., Yan, and H. V., Poor, “Ergodic capacity analysis of remote radio head associations in cloud radio access networks,” IEEE Wireless Commun. Lett., vol. 3, no. 4, pp. 365–368, Aug. 2014.
[34] F. A., Khan, H., He, J., Xue, and T., Ratnarajah, “Performance analysis of cloud radio access networks with distributed multiple antenna remote radio heads,” IEEE Trans. Signal Process., vol. 63, no. 18, pp. 4784–4799, Sep. 2015.
[35] S. N., Hong and J., Kim, “Joint coding and stochastic data transmission for uplink cloud radio access networks,” IEEE Commun. Lett., vol. 18, no. 9, pp. 1619–1622, Sep. 2014.
[36] S. H., Park, O., Simeone, O., Sahin, and S., Shamai Shitz, “Fronthaul compression for cloud radio access networks: Signal processing advances inspired by network information theory,” IEEE Signal Process. Mag., vol. 31, no. 6, pp. 69–79, Nov. 2014.
[37] M., Peng, K., Zhang, J., Jiang, J., Wang, and W., Wang, “Energy-efficient resource assignment and power allocation in heterogeneous cloud radio access networks,” IEEE Trans. Veh. Technol., vol. 64, no. 11, pp. 5275–5287, Nov. 2015.
[38] L., Lei, Z., Zhong, K., Zheng, J., Chen, and H., Meng, “Challenges on wireless heterogeneous networks for mobile cloud computing,” IEEE Wireless Commun., vol. 20, no. 3, pp. 34–44, Jun. 2013.
[39] F., Bonomi, R., Milito, J., Zhu, and S., Addepalli, “Fog computing and its role in the Internet of things,” in Proc. of ACM Mobile Cloud Computing Workshop (MCC), Aug. 2012.
[40] E., Aryafar, A., Keshavarz-Haddad, M., Wang, and M., Chiang, “RAT selection games in HetNets,” in Proc. of IEEE International Conf. on Computer Communications (INFOCOM), Apr. 2013.
[41] G., Fodor, S., Parkvall, S., Sorrentino, P., Wallentin, Q., Lu, and N., Brahmi, “Device-to-device communications for national security and public safety,” IEEE Access, vol. 2, pp. 1510–1520, 2014.
[42] Y., Li, D., Jin, J., Yuan, and Z., Han, “Coalitional games for resource allocation in the device-to-device uplink underlaying cellular networks,” IEEE Trans. Wireless Commun., vol. 13, no. 7, pp. 3965–3977, Jul. 2014.
[43] L., Lei, Z., Zhong, C., Lin, and X., Shen, “Operator controlled device-to-device communications in LTE-Advanced networks,” IEEE Wireless Commun., vol. 19, no. 3, pp. 96–104, Jun. 2012.
[44] A. T., Gamage, H., Liang, R., Zhang, and X., Shen, “Device-to-device communication underlaying converged heterogeneous networks,” IEEE Wireless Commun., vol. 21, no. 6, pp. 98–107, Dec. 2014.
[45] Q., Ye, M., Al-Shalash, C., Caramanis, and J. G., Andrews, “Distributed resource allocation in device-to-device enhanced cellular networks,” IEEE Trans. Commun., vol. 63, no. 2, pp. 441–454, Feb. 2015.
[46] S. Y., Lien, C. C., Chien, F. M., Tseng, and T. C., Ho, “3GPP device-to-device communications for beyond 4G cellular networks,” IEEE Commun. Mag., vol. 54, no. 3, pp. 29–35, Mar. 2016.
[47] M., Peng, S., Yan, K., Zhang, and C., Wang, “Fog computing based radio access networks: Issues and challenges,” IEEE Netw., vol. 30, no. 4, pp. 45–53, Jul. 2016.
[48] 3GPP, “Study on RAN improvements for machine-type communications,” TR 37.868 V11.0.0, Sep. 2011.
[49] R. G., Cheng, J., Chen, D. W., Chen, and C. H., Wei, “Modeling and analysis of an extended access barring algorithm for machine-type communications in LTE-A networks,” IEEE Trans. Wireless Commun., vol. 14, no. 6, pp. 2956–2968, Jun. 2015.
[50] G. Y., Lin, S. R., Chang, and H. Y., Wei, “Estimation and adaptation for bursty LTE random access,” IEEE Trans. Veh. Technol., vol. 65, no. 4, pp. 2560–2577, Apr. 2016.
[51] 3GPP, “Cellular system support for ultra-low complexity and low throughput Internet of Things (CIoT),” TR 45.820 v13.1.0, Nov. 2015.