Skip to main content Accessibility help
×
Hostname: page-component-76fb5796d-skm99 Total loading time: 0 Render date: 2024-04-28T18:02:09.232Z Has data issue: false hasContentIssue false

18 - Medium Access Control, Resource Management, and Congestion Control for M2M Systems

from Part III - Network Protocols, Algorithms, and Design

Published online by Cambridge University Press:  28 April 2017

Shao-Yu Lien
Affiliation:
National Formosa University, Taiwan
Hsiang Hsu
Affiliation:
National Taiwan University, Taiwan
Vincent W. S. Wong
Affiliation:
University of British Columbia, Vancouver
Robert Schober
Affiliation:
Friedrich-Alexander-Universität Erlangen-Nürnberg, Germany
Derrick Wing Kwan Ng
Affiliation:
University of New South Wales, Sydney
Li-Chun Wang
Affiliation:
National Chiao Tung University, Taiwan
Get access

Summary

Introduction

The current mobile networks provide seamless and reliable streaming (voice/video) services to an increasing number of mobile users. From Global System for Mobile Communications (GSM) General Packet Radio Service (GPRS) and Universal Mobile Telecommunication System (UMTS) to Long Term Evolution (LTE) and LTE-Advanced (LTE-A), the transmission data rates have increased tremendously. Relying on the deployment of a heterogeneous network (HetNet) [1–5] involving macrocells, small cells (femtocells and picocells), and/or relay nodes, ubiquitous support for basic multimedia and Internet browsing applications has been tractable. In addition to mobile networks, wireless local area networks (WLANs) such as IEEE 802.11a/b/g/e/n/ac/ax also support moderate distance data exchange with best effort services or a certain level of quality of service (QoS). As a result, it seems that the needs of human-to-human (H2H) communication applications can be satisfied using the existing network architectures and technologies. However, to substantially facilitate human daily activities, providing only basic voice/video and Internet access services may be insufficient.

Recently, a novel communication paradigm known as machine-to-machine (M2M) communications has had a significant impact on the development of the next generation of wireless applications. Achieving “full automation” and “everything-to-everything” (X2X) connection facilitated byM2M communications has been regarded as two urgent and ultimate targets not only in the industry but also in the context of economics, social communities/activities, transportation, agriculture, and energy allocation [6]. “Full automation” implies a significant enhancement of human beings’ sensory and processing capabilities, which embraces unmanned or remotely controlled vehicles/ robots/offices/factories/stores, augmented/virtual/kinetic reality, and immersive sensory experiences. On the other hand, X2X connection implies that diverse entities, including human and machines, will be able to form new types of communities in addition to those based on H2H communication, such as social networks using human-to-machine (H2M) and M2M communication [7–12]. The applications include intelligent transportation systems (ITSs) [13], volunteer information networks (in which each entity in the network shares information with other entities to obtain a global view of the environment and the community) [14], the Internet of Things (IoT) [15–17], and smart buildings/cities/grids [18–20], to name but a few.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2017

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

[1] Y. S., Soh, T. Q. S., Quek, M., Kountouris, and H., Shin, “Energy efficient heterogeneous cellular networks,” IEEE J. Sel. Areas Commun., vol. 31, no. 5, pp. 840–850, May 2013.Google Scholar
[2] Q., Li, R. Q., Hu, Y., Qian, and G., Wu, “Intracell cooperation and resource allocation in a heterogeneous network with relays,” IEEE Trans. Veh. Technol., vol. 62, no. 4, pp. 1770–1784, May 2013.Google Scholar
[3] A., Damnjanovic, J., Montojo, Y., Wei, T., Ji, T., Luo, M., Vajapeyam, T., Yoo, O., Song, and D., Malladi, “A survey on 3GPP heterogeneous networks,” IEEEWireless Commun., vol. 18, no. 3, pp. 10–21, Jun. 2011.Google Scholar
[4] M., Wildemeersch, T. Q. S., Quek, M., Kountouris, A., Rabbachin, and C. H., Slump, “Successive interference cancellation in heterogeneous networks,” IEEE Trans. Commun., vol. 62, no. 12, pp. 4440–4453, Dec. 2014.Google Scholar
[5] Y. L., Lee, T. C., Chuah, J., Loo, and A., Vinel, “Recent advances in radio resource management for heterogeneous LTE/LTE-A networks,” IEEE Commun. Surv. Tutor., vol. 16, no. 4, pp. 2142–2180, Fourth Quarter 2014.Google Scholar
[6] S. Y., Lien, S. C., Hung, K. C., Chen, and Y. C., Liang, “Ultra-low latency ubiquitous connections in heterogeneous cloud radio networks,” IEEE Wireless Commun., vol. 22, no. 3, pp. 22–31, Jun. 2015.Google Scholar
[7] K. C., Chen and S. Y., Lien, “Machine-to-machine communications: Technologies and challenges,” Ad Hoc Netw., vol. 18, pp. 3–23, Jul. 2014.Google Scholar
[8] S. Y., Lien, K. C., Chen, and Y., Lin, “Toward ubiquitous massive accesses in 3GPP machine-to-machine communications,” IEEE Commun. Mag., vol. 49, no. 4, pp. 66–74, Apr. 2011.Google Scholar
[9] A., Rajandekar and B., Sikdar, “A survey of MAC layer issues and protocols for machine-to-machine communications,” IEEE Internet Things J., vol. 2, no. 2, pp. 175–186, Apr. 2015.Google Scholar
[10] H. L., Fu, P., Lin, H., Yue, G. M., Huang, and C. P., Lee, “Group mobility management for large-scale machine-to-machine mobile networking,” IEEE Trans. Veh. Technol., vol. 63, no. 3, pp. 1296–1305, Mar. 2014.Google Scholar
[11] X., Xiong, K., Zheng, R., Xu, W., Xiang, and P., Chatzimisios, “Low power wide area machine-to-machine networks: Key techniques and prototype,” IEEE Commun. Mag., vol. 53, no. 9, pp. 64–71, Sep. 2015.Google Scholar
[12] I., Stojmenovic, “Machine-to-machine communications with in-network data aggregation, processing, and actuation for large-scale cyber-physical systems,” IEEE Internet Things J., vol. 1, no. 2, pp. 122–128, Apr. 2014.Google Scholar
[13] G., Dimitrakopoulos and P., Demestichas, “Intelligent transportation systems,” IEEE Veh. Technol. Mag., vol. 5, no. 1, pp. 77–84, Mar. 2010.Google Scholar
[14] C., Chakrabarti and S., Roy, “Adapting mobility of observers for quick reputation assignment in a sparse post-disaster communication network,” in Proc. of IEEE Applications and Innovations in Mobile Computing (AIMoC), Feb. 2015.
[15] R., Pozza, M., Nati, S., Georgoulas, K., Moessner, and A., Gluhak, “Neighbor discovery for opportunistic networking in Internet of things scenarios: A survey,” IEEE Access, vol. 3, pp. 1101–1131, 2015.Google Scholar
[16] M. R., Palattella, N., Accettura, X., Vilajosana, T., Watteyne, L. A., Grieco, G., Boggia, and M., Dohler, “Standardized protocol stack for the Internet of (important) things,” IEEE Commun. Surv. Tutor., vol. 15, no. 3, pp. 1389–1406, Third Quarter 2013.Google Scholar
[17] C., Perera, A., Zaslavsky, P., Christen, and D., Georgakopoulos, “Context aware computing for the Internet of things: A survey,” IEEE Commun. Surv. Tutor., vol. 16, no. 1, pp. 414–454, First Quarter 2014.Google Scholar
[18] K., Katsaros, W., Chai, N., Wang, G., Pavlou, H., Bontius, and M., Paolone, “Information-centric networking for machine-to-machine data delivery: A case study in smart grid applications,” IEEE Netw., vol. 28, no. 3, pp. 58–64, May–Jun. 2014.Google Scholar
[19] Z. M., Fadlullah, M. M., Fouda, N., Kato, A., Takeuchi, N., Iwasaki, and Y., Nozaki, “Toward intelligent machine-to-machine communications in smart grid,” IEEE Commun. Mag., vol. 49, no. 4, pp. 60–65, Apr. 2011.Google Scholar
[20] A., Zanella, N., Bui, A., Castellani, L., Vangelista, and M., Zorzi, “Internet of things for smart cities,” IEEE Internet Things J., vol. 1, no. 1, pp. 22–32, Feb. 2014.Google Scholar
[21] S., Aust, R. V., Prasad, and I. G. M. M., Niemegeers, “Outdoor long-range WLANs: A lesson for IEEE 802.11ah,” IEEE Commun. Surv. Tutor., vol. 17, no. 3, pp. 1761–1775, Third Quarter 2015.Google Scholar
[22] T., Adame, A., Bel, B., Bellalta, J., Barcelo, and M., Oliver, “IEEE 802.11ah: The WiFi approach for M2M communications,” IEEE Wireless Commun., vol. 21, no. 6, pp. 144–152, Dec. 2014.Google Scholar
[23] C., W. Park, D., Hwang, and T. J., Lee, “Enhancement of IEEE 802.11ah MAC for M2M communications,” IEEE Commun. Lett., vol. 18, no. 7, pp. 1151–1154, Jul. 2014.Google Scholar
[24] M., Park, “IEEE 802.11ah: Sub-1-GHz license-exempt operation for the Internet of things,” IEEE Commun. Mag., vol. 53, no. 9, pp. 145–151, Sep. 2015.Google Scholar
[25] V., Jones and H., Sampath, “Emerging technologies for WLAN,” IEEE Commun. Mag., vol. 53, no. 3, pp. 141–149, Mar. 2015.Google Scholar
[26] 3GPP, “Study on provision of low-cost machine-type communications (MTC) user equipments (UEs) based on LTE,” TR 36.888 v12.0.0, Jun. 2013.
[27] A., Samukic, “UMTS universal mobile telecommunications system: Development of standards for the third generation,” IEEE Trans. Veh. Technol., vol. 47, no. 4, pp. 1099–1104, Nov. 1998.Google Scholar
[28] Q., Cui, H., Wang, P., Hu, X., Tao, P., Zhang, J., Hamalainen, and L., Xia, “Evolution of limited-feedback CoMP systems from 4G to 5G: CoMP features and limited-feedback approaches,” IEEE Veh. Technol. Mag., vol. 9, no. 3, pp. 94–103, Sep. 2014.Google Scholar
[29] S., Sun, Q., Gao, Y., Peng, Y., Wang, and L., Song, “Interference management through CoMP in 3GPP LTE-Advanced networks,” IEEE Wireless Commun., vol. 20, no. 1, pp. 59–66, Feb. 2013.Google Scholar
[30] O., Onireti, F., Heliot, and M. A., Imran, “On the energy efficiency–spectral efficiency trade-off in the uplink of CoMP system,” IEEE Trans. Wireless Commun., vol. 11, no. 2, pp. 556–561, Feb. 2012.Google Scholar
[31] V. S., Annapureddy, A., El Gamal, and V. V., Veeravalli, “Degrees of freedom of interference channels with CoMP transmission and reception,” IEEE Trans. Inf. Theory, vol. 58, no. 9, pp. 5740–5760, Sep. 2012.Google Scholar
[32] C. L., I, J., Huang, R., Duan, C., Cui, J. X., Jiang, and L., Li, “Recent progress on C-RAN centralization and cloudification,” IEEE Access, vol. 2, pp. 1030–1039, 2014.Google Scholar
[33] M., Peng, S., Yan, and H. V., Poor, “Ergodic capacity analysis of remote radio head associations in cloud radio access networks,” IEEE Wireless Commun. Lett., vol. 3, no. 4, pp. 365–368, Aug. 2014.Google Scholar
[34] F. A., Khan, H., He, J., Xue, and T., Ratnarajah, “Performance analysis of cloud radio access networks with distributed multiple antenna remote radio heads,” IEEE Trans. Signal Process., vol. 63, no. 18, pp. 4784–4799, Sep. 2015.Google Scholar
[35] S. N., Hong and J., Kim, “Joint coding and stochastic data transmission for uplink cloud radio access networks,” IEEE Commun. Lett., vol. 18, no. 9, pp. 1619–1622, Sep. 2014.Google Scholar
[36] S. H., Park, O., Simeone, O., Sahin, and S., Shamai Shitz, “Fronthaul compression for cloud radio access networks: Signal processing advances inspired by network information theory,” IEEE Signal Process. Mag., vol. 31, no. 6, pp. 69–79, Nov. 2014.Google Scholar
[37] M., Peng, K., Zhang, J., Jiang, J., Wang, and W., Wang, “Energy-efficient resource assignment and power allocation in heterogeneous cloud radio access networks,” IEEE Trans. Veh. Technol., vol. 64, no. 11, pp. 5275–5287, Nov. 2015.Google Scholar
[38] L., Lei, Z., Zhong, K., Zheng, J., Chen, and H., Meng, “Challenges on wireless heterogeneous networks for mobile cloud computing,” IEEE Wireless Commun., vol. 20, no. 3, pp. 34–44, Jun. 2013.Google Scholar
[39] F., Bonomi, R., Milito, J., Zhu, and S., Addepalli, “Fog computing and its role in the Internet of things,” in Proc. of ACM Mobile Cloud Computing Workshop (MCC), Aug. 2012.
[40] E., Aryafar, A., Keshavarz-Haddad, M., Wang, and M., Chiang, “RAT selection games in HetNets,” in Proc. of IEEE International Conf. on Computer Communications (INFOCOM), Apr. 2013.
[41] G., Fodor, S., Parkvall, S., Sorrentino, P., Wallentin, Q., Lu, and N., Brahmi, “Device-to-device communications for national security and public safety,” IEEE Access, vol. 2, pp. 1510–1520, 2014.Google Scholar
[42] Y., Li, D., Jin, J., Yuan, and Z., Han, “Coalitional games for resource allocation in the device-to-device uplink underlaying cellular networks,” IEEE Trans. Wireless Commun., vol. 13, no. 7, pp. 3965–3977, Jul. 2014.Google Scholar
[43] L., Lei, Z., Zhong, C., Lin, and X., Shen, “Operator controlled device-to-device communications in LTE-Advanced networks,” IEEE Wireless Commun., vol. 19, no. 3, pp. 96–104, Jun. 2012.Google Scholar
[44] A. T., Gamage, H., Liang, R., Zhang, and X., Shen, “Device-to-device communication underlaying converged heterogeneous networks,” IEEE Wireless Commun., vol. 21, no. 6, pp. 98–107, Dec. 2014.Google Scholar
[45] Q., Ye, M., Al-Shalash, C., Caramanis, and J. G., Andrews, “Distributed resource allocation in device-to-device enhanced cellular networks,” IEEE Trans. Commun., vol. 63, no. 2, pp. 441–454, Feb. 2015.Google Scholar
[46] S. Y., Lien, C. C., Chien, F. M., Tseng, and T. C., Ho, “3GPP device-to-device communications for beyond 4G cellular networks,” IEEE Commun. Mag., vol. 54, no. 3, pp. 29–35, Mar. 2016.Google Scholar
[47] M., Peng, S., Yan, K., Zhang, and C., Wang, “Fog computing based radio access networks: Issues and challenges,” IEEE Netw., vol. 30, no. 4, pp. 45–53, Jul. 2016.Google Scholar
[48] 3GPP, “Study on RAN improvements for machine-type communications,” TR 37.868 V11.0.0, Sep. 2011.
[49] R. G., Cheng, J., Chen, D. W., Chen, and C. H., Wei, “Modeling and analysis of an extended access barring algorithm for machine-type communications in LTE-A networks,” IEEE Trans. Wireless Commun., vol. 14, no. 6, pp. 2956–2968, Jun. 2015.Google Scholar
[50] G. Y., Lin, S. R., Chang, and H. Y., Wei, “Estimation and adaptation for bursty LTE random access,” IEEE Trans. Veh. Technol., vol. 65, no. 4, pp. 2560–2577, Apr. 2016.Google Scholar
[51] 3GPP, “Cellular system support for ultra-low complexity and low throughput Internet of Things (CIoT),” TR 45.820 v13.1.0, Nov. 2015.

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×