CN104507038A - Access overload control method of RAN (Radio Access Network) layer in clustered M2M (Machine to Machine) network - Google Patents
Access overload control method of RAN (Radio Access Network) layer in clustered M2M (Machine to Machine) network Download PDFInfo
- Publication number
- CN104507038A CN104507038A CN201410816294.5A CN201410816294A CN104507038A CN 104507038 A CN104507038 A CN 104507038A CN 201410816294 A CN201410816294 A CN 201410816294A CN 104507038 A CN104507038 A CN 104507038A
- Authority
- CN
- China
- Prior art keywords
- beta
- time delay
- access
- equipment
- formula
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 31
- 230000035945 sensitivity Effects 0.000 claims abstract description 10
- 238000005457 optimization Methods 0.000 claims description 12
- 230000003247 decreasing effect Effects 0.000 claims description 6
- 238000005192 partition Methods 0.000 abstract 2
- 238000004891 communication Methods 0.000 description 5
- 238000013461 design Methods 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 101100274486 Mus musculus Cited2 gene Proteins 0.000 description 1
- 101150096622 Smr2 gene Proteins 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000003750 conditioning effect Effects 0.000 description 1
- 238000002474 experimental method Methods 0.000 description 1
- VYMDGNCVAMGZFE-UHFFFAOYSA-N phenylbutazonum Chemical compound O=C1C(CCCC)C(=O)N(C=2C=CC=CC=2)N1C1=CC=CC=C1 VYMDGNCVAMGZFE-UHFFFAOYSA-N 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 230000009897 systematic effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/08—Non-scheduled access, e.g. ALOHA
- H04W74/0833—Random access procedures, e.g. with 4-step access
- H04W74/0841—Random access procedures, e.g. with 4-step access with collision treatment
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Medicines Containing Antibodies Or Antigens For Use As Internal Diagnostic Agents (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses an access overload control method of an RAN layer in a clustered M2M network. The method comprises the following steps: (1) dividing MTC equipment in a base station into time delay sensitive equipment and time delay insensitive equipment according to a preset time delay sensitivity limit; (2) acquiring the quantity of users requesting to access in a current time slot by the base station, obtaining a corresponding pilot frequency partition ratio beta * when the total quantity of successfully accessed MTC equipment is maximum, and then acquiring the quantity of pilot-frequency resources allocated to the time delay sensitive equipment and the quantity of pilot-frequency resources allocated to the time delay insensitive equipment according to the corresponding pilot frequency partition ratio beta * when the total quantity of successfully accessed MTC equipment is maximum; (3) realizing user access by adopting an ACB mechanism according to the quantity of the allocated pilot-frequency resources by the time delay sensitive equipment, and realizing user access by adopting the ACB mechanism according to the allocated pilot-frequency resources by the time delay insensitive equipment. The method disclosed by the invention can be used for effectively increasing the access rate of the MTC equipment.
Description
Technical field
The invention belongs to M2M communication technical field, relate to the access overload controlling method of RAN layer in a kind of sub-clustering type M2M network.
Background technology
When MTC device a certain intra-zone administration too much and the same period more intensively access network time, network just can face overload and possible MTC communication amount is increased sharply, and the congestion overload of network inevitably causes loss or even the service disruption of unnecessary time delay, packet.For the network congestion overload in M2M communication, the underaction of existing ACB strategy own, is difficult to effectively reduce collision probability and not readily passes through adjustment relevant parameter realizing trading off between various performance when number of users to be accessed increases further; In addition ACB strategy be only applicable to those can to time delay insensitive equipment access in reality the existence of delay sensitive equipment just make the application of ACB strategy receive limitation.Meanwhile, although EAB strategy considers time delay sensitive type equipment, but not realizing grouping to pilot resources causes two class users to share fixing pilot resources, it is unfair that this processing mode inevitably causes low priority user to access, in view of the above problems, need to dynamically arrange pilot tone subregion ratio to the M2M network under cluster structured using time delay sensitivity as standard, maximize the access rate of MTC device with this, but prior art does not relate to the technology of this respect.
Summary of the invention
The object of the invention is to the shortcoming overcoming above-mentioned prior art, provide the access overload controlling method of RAN layer in a kind of sub-clustering type M2M network, this control method can effectively improve MTC device access rate.
For achieving the above object, in sub-clustering type M2M network of the present invention, the access overload controlling method of RAN layer comprises the following steps:
1) according to the time delay sensitivity preset, each MTC device in base station is divided into time delay sensitive type equipment and time delay insensitive equipment;
2) base station obtains the number of users of current time slots application access, obtain MTC device access successfully total maximum time corresponding pilot tone subregion compare β
*, then according to MTC device access successfully total maximum time corresponding pilot tone subregion compare β
*obtain and distribute to the pilot resources number of time delay sensitive type equipment and distribute to the pilot resources number of time delay insensitive equipment;
3) time delay sensitive type equipment adopts ACB mechanism access user according to the pilot resources number distributed, and time delay insensitive equipment adopts ACB mechanism access user according to the pilot resources number distributed.
Step 2) in obtain MTC device access successfully total maximum time corresponding pilot tone subregion compare β
*concrete steps be:
If A
sfor the time delay sensitive type number of devices of current time slots, A
nfor the time delay insensitive number of devices of current time slots, A
ifor the MTC device sum of current time slots, then there is A
s+ A
n=A
i; If M
sfor distributing to the pilot resources number of time delay sensitive type equipment, M
nfor distributing to the pilot resources number of time delay insensitive equipment, c is the sum of pilot resources, and β is the pilot tone subregion ratio of current time slots, then have
M
s+M
n=c (2)
Obtained by formula (1) and formula (2):
Each MTC device accesses successful probability P
s=e
-N/P, wherein, N is the MTC device quantity of current time slots application, and P is the patterns available number of resources of current time slots application, then the successful total S of MTC device access
nfor:
Wherein, f
sfor the restriction factor of time delay sensitive type equipment under ACB mechanism, f
nfor the restriction factor of time delay insensitive equipment under ACB mechanism, formula (3) is brought in formula (4) and obtains
Then set up according to formula (5) and solve the Mathematical Modeling that maximum MTC device accesses successfully sum:
Set up target function, then according to target function solve formula (6) MTC device access successful total maximum time corresponding pilot tone subregion compare β
*.
The process setting up target function is:
Differentiate is carried out to formula (5) equal sign both sides, and is 0 by the result after differentiate, then have
Abbreviation is carried out to formula (7) and obtains target function:
Work as A
sf
s∈ (0,1] time, then according to target function adopt Newton iterative solve formula (6), obtain MTC device access successful total maximum time corresponding pilot tone subregion compare β
*.
Work as A
sf
stime ∈ (1,3), formula (6) can be expressed as the optimization problem under inequality constraints, and the detailed process solving formula (6) is:
Determine the feasible zone D of optimization problem
1:
Due to feasible zone D
1internal object function monotone decreasing, therefore when β gets boundary value, target function gets maximum, namely
Work as A
sf
s∈ [3 ,+∞) time, formula (6) can be expressed as the optimization problem under inequality constraints, and the detailed process solving formula (6) is:
Determine the feasible zone D of optimization problem
2:
Due to feasible zone D
2internal object function monotone decreasing, therefore when β gets boundary value, target function gets maximum, namely
The present invention has following beneficial effect:
In sub-clustering type M2M network of the present invention, the access overload controlling method of RAN layer is when accessing each MTC device, first according to the time delay sensitivity preset, each MTC device in base station is divided into time delay sensitive type equipment and time delay insensitive equipment, obtain again MTC device access successfully total maximum time corresponding pilot tone subregion ratio, then according to MTC device access successfully total maximum time corresponding pilot tone subregion than obtaining the pilot resources number distributing to time delay sensitive type equipment and time delay insensitive equipment, time delay sensitive type equipment and time delay insensitive equipment adopt ACB mechanism access user according to distributing to respective pilot resources number, thus effective raising MTC device access rate, make total access successful user number maximum, reasonable in design, simple to operate, practicality is extremely strong.
Accompanying drawing explanation
Fig. 1 is typical M2M system architecture diagram;
Fig. 2 is MTC device random access procedure figure;
Fig. 3 is scenario-frame design drawing;
Fig. 4 (a) is for the access probability of success is with the change curve of relation between two groups of restriction factors;
Fig. 4 (b) is for average access delay is with the change curve of relation between two groups of restriction factors;
Fig. 5 is the correlation curve figure accessing the probability of success under different restriction factor;
Fig. 6 is the correlation curve figure of average access delay under different restriction factor;
Fig. 7 is the correlation curve figure of collision probability under different restriction factor;
Fig. 8 is the correlation curve figure that under different restriction factor, two class users access the probability of success;
Fig. 9 is the correlation curve figure of the average access delay of two class users under different restriction factor;
Figure 10 is the correlation curve figure of two class user collision probabilities under different restriction factor.
Embodiment
Below in conjunction with accompanying drawing, the present invention is described in further detail:
With reference to figure 1, concrete being described below of typical M2M system architecture diagram:
Consider typical M2M SNA, comprise LTE-A base station, MTC device, gateway node and the interface between gateway and base station, wherein, LTE-A base station comprises macro station, Picocell base station, Femtocell base station and via node, and the pilot resources of user and the issue of various control information and storage are distributed in the regulation and control of primary responsibility the whole network, the base station of Serving cell, each equipment place wants elder generation and corresponding gateway node (GW) to communicate simultaneously, and gateway node contacts the serving BS of community, two equipment places as a via node; Between gateway and base station, then need interface S1 transmission of information, under this deployment scenario, realize direct communication each other by LTE-A base station between MTC device and connect.
With reference to figure 2, the access procedure of MTC device mainly completes in RACH channel, here configuration and the operational circumstances of RACH channel might as well be provided, RACH channel is made up of some RA time slots that can be used for transmitting access request, the length of RA time slot depends on the value of Configuration Index, point out in agreement, the every 5ms configuration of RACH is meaned once when Configuration Index value is 6, namely every 5ms just has 64 orthogonal guide frequency resources available, wherein, 54 accesses that can be used for based on collision, remain 10 then for collisionless access is reserved.Be that a time slot is as pilot resources configuration cycle using 5ms, MTC device goes competition 54 can supply the pilot resources utilized at each time slot, and in current time slots, the equipment of each application access must complete four step random access procedures between base station and equipment and just can complete this access request.Four handshake procedures of Stochastic accessing (RA) are as follows:
Msgl: the MTC device of application access sends pilot resources information to base station
Msg2: base station is by the MTC device transmission RA feedback information of PDSCH channel to correspondence
(connection request) information that Msg3:MTC equipment sends to base station " request connects "
Msg4: base station sends " Conflict solving " (contention resolution) information to MTC device
With reference to figure 3, in sub-clustering type M2M network of the present invention, the access overload controlling method of RAN layer comprises the following steps:
1) according to the time delay sensitivity preset, each MTC device in base station is divided into time delay sensitive type equipment and time delay insensitive equipment;
2) base station obtains the number of users of current time slots application access, obtain MTC device access successfully total maximum time corresponding pilot tone subregion compare β
*, then according to MTC device access successfully total maximum time corresponding pilot tone subregion compare β
*obtain and distribute to the pilot resources number of time delay sensitive type equipment and distribute to the pilot resources number of time delay insensitive equipment;
3) time delay sensitive type equipment adopts ACB mechanism access user according to the pilot resources number distributed, and time delay insensitive equipment adopts ACB mechanism access user according to the pilot resources number distributed.
Wherein, when the time delay sensitivity of MTC device is more than or equal to default time delay sensitivity, then this MTC device is time delay sensitive type equipment, and when the time delay sensitivity of MTC device is less than default time delay sensitivity, then this MTC device is time delay insensitive equipment;
Step 2) in obtain MTC device access successfully total maximum time corresponding pilot tone subregion compare β
*concrete steps be:
If A
sfor the time delay sensitive type number of devices of current time slots, A
nfor the time delay insensitive number of devices of current time slots, A
ifor the MTC device sum of current time slots, then there is A
s+ A
n=A
i; If M
sfor distributing to the pilot resources number of time delay sensitive type equipment, M
nfor distributing to the pilot resources number of time delay insensitive equipment, c is the sum of pilot resources, and β is the pilot tone subregion ratio of current time slots, then have
M
s+M
n=c (2)
Obtained by formula (1) and formula (2):
Each MTC device accesses successful probability P
s=e
-N/P, wherein, N is the MTC device quantity of current time slots application, and P is the patterns available number of resources of current time slots application, then the successful total S of MTC device access
nfor:
Wherein, f
sfor the restriction factor of time delay sensitive type equipment under ACB mechanism, f
nfor the restriction factor of time delay insensitive equipment under ACB mechanism, formula (3) is brought in formula (4) and obtains
Then set up according to formula (5) and solve the Mathematical Modeling that maximum MTC device accesses successfully sum:
Set up target function, then according to target function solve formula (6) MTC device access successful total maximum time corresponding pilot tone subregion compare β
*.
The process setting up target function is:
Differentiate is carried out to formula (5) equal sign both sides, and is 0 by the result after differentiate, then have
Abbreviation is carried out to formula (7) and obtains target function:
Work as A
sf
s∈ (0,1] time, then according to target function adopt Newton iterative solve formula (6), obtain MTC device access successful total maximum time corresponding pilot tone subregion compare β
*.
Work as A
sf
stime ∈ (1,3), formula (6) can be expressed as the optimization problem under inequality constraints, and the detailed process solving formula (6) is:
Determine the feasible zone D of optimization problem
1:
Due to feasible zone D
1internal object function monotone decreasing, therefore when β gets boundary value, target function gets maximum, namely
Work as A
sf
s∈ [3 ,+∞) time, formula (6) can be expressed as the optimization problem under inequality constraints, and the detailed process solving formula (6) is:
Determine the feasible zone D of optimization problem
2:
Due to feasible zone D
2internal object function monotone decreasing, therefore when β gets boundary value, target function gets maximum, namely
According to the realization mechanism of ACB strategy, first need to design the parameter of two in ACB mechanism (restriction factor and binding hours) respectively, because design focal point of the present invention is dynamic conditioning pilot tone subregion ratio, so now make following hypothesis in order to reduction procedure:
The binding hours of time delay sensitive type equipment is equal with the binding hours of time delay insensitive equipment, i.e. T
s=T
n; When being limited, the back off time of time delay sensitive type equipment and time delay insensitive equipment is as follows:
For the non-sensitive user of time delay, back off time is:
For latency sensitive user, back off time is:
T
barred=(0.7+0.6·rand)*ac_barringtime (14)
And two bunches of equipment adopt the relation between the restriction factor of ACB mechanism to be set to linear relationship: f
n=p+qf
s, wherein f
s∈ (0,1), the value of p and q will make f
n∈ (0,1); Fig. 4 (a) and 4 (b) are the access probability of success and the average access delay change curve with relation between two groups of restriction factors respectively, according to the integrated survey accessing the probability of success and average access delay two indices, we select following relation:
In sum, main realization mechanism of the present invention is the pilot tone subregion ratio of attempt by each time slot of Dynamic controlling, to optimize the equipment access situation of each time slot; The essence of this algorithm be by RACH resource Dynamic Separation ability in cluster structured to realize the control to RAN overload in M2M communication.
Emulation experiment
With reference to figure 5, emulate in the LTE community of a 5MHz, 30000 MTC device are evenly distributed in community, and collision indicating device is set to 5ms, only accesses situation to user in 10s and consider in emulation.The quantitative proportion of the quantity of delay sensitive equipment and the non-sensitive equipment of time delay is set to 1: 9.In addition, for the parameter of two in ACB strategy, in emulation, delay sensitive equipment is the same with the binding hours of the non-sensitive equipment of time delay, meet (15) formula between restriction factor, and the random-backoff time of the equipment of respective cluster after restriction factor " restriction " meets (13) and (14) formula respectively.Under above-mentioned simulating scenes, Zong Fig. 5 show the access probability of success with the change curve of restriction factor and depict traditional ACB algorithm with algorithm proposed access rate compare.Can find out, when restriction factor changes between 0.2-0.8, along with restriction factor increases, the corresponding increase of access rate, and when restriction factor value is 0.9, access rate reduces, this is because major part user all can not obtain chance access under ACB mechanism by " restriction " when restriction factor is larger, this causes a large number of users collide and access rate is declined to some extent unavoidably.Meanwhile, the present invention compares traditional ACB mechanism and has higher access rate, and reason is that this programme realizes always accessing optimum by selecting optimum pilot tone subregion ratio.
Fig. 6 is the correlation curve figure of system average access delay under different restriction factor.Can find out, along with increasing progressively of restriction factor, average access delay constantly reduces, and the average access delay of user obtained under traversal restriction factor is all in below 4s, and this also illustrates another superiority of the present invention.Meanwhile, the present invention more traditional ACB mechanism significantly reduces in average access delay.
Fig. 7 show mean collisional probability with the change curve of restriction factor and give traditional ACB algorithm with institute proposes algorithm collision rate contrast, be not difficult discovery, the collision rate of this programme increases with the increase of restriction factor.Meanwhile, the present invention's more traditional ACB mechanism collision rate slightly improves, although collision rate improves, this is in the tolerance that systematic function promotes.
Under Fig. 8-10 discusses different restriction factor respectively, two class users are accessing the correlation curve figure in the probability of success, average access delay and mean collisional probability three.On the one hand, for sensitive equipment, from Fig. 8 and Fig. 9, compared with ACB mechanism, its access probability of success remains basically stable compared with ACB algorithm with average access delay, and Figure 10 shows that the collision rate of sensitive users significantly declines; On the other hand, for non-sensitive user, known by Fig. 8 and Fig. 9, than ACB strategy, its access probability of success greatly promotes and change with restriction factor is not obvious, and its average access delay significantly declines, in addition, Figure 10 also shows that the collision rate of non-sensitive user raises to some extent, and this is in the tolerance of other two performance boosts.
Claims (6)
1. an access overload controlling method for RAN layer in sub-clustering type M2M network, is characterized in that, comprise the following steps:
1) according to the time delay sensitivity preset, each MTC device in base station is divided into time delay sensitive type equipment and time delay insensitive equipment;
2) base station obtains the number of users of current time slots application access, obtain MTC device access successfully total maximum time corresponding pilot tone subregion compare β
*, then according to MTC device access successfully total maximum time corresponding pilot tone subregion compare β
*obtain and distribute to the pilot resources number of time delay sensitive type equipment and distribute to the pilot resources number of time delay insensitive equipment;
3) time delay sensitive type equipment adopts ACB mechanism access user according to the pilot resources number distributed, and time delay insensitive equipment adopts ACB mechanism access user according to the pilot resources number distributed.
2. the access overload controlling method of RAN layer in sub-clustering type M2M network according to claim 1, is characterized in that, step 2) in obtain MTC device access successfully total maximum time corresponding pilot tone subregion compare β
*concrete steps be:
If A
sfor the time delay sensitive type number of devices of current time slots, A
nfor the time delay insensitive number of devices of current time slots, A
ifor the MTC device sum of current time slots, then there is A
s+ A
n=A
i; If M
sfor distributing to the pilot resources number of time delay sensitive type equipment, M
nfor distributing to the pilot resources number of time delay insensitive equipment, c is the sum of pilot resources, and β is the pilot tone subregion ratio of current time slots, then have
M
s+M
n=c (2)
Obtained by formula (1) and formula (2):
Each MTC device accesses successful probability P
s=e
-N/P, wherein, N is the MTC device quantity of current time slots application, and P is the patterns available number of resources of current time slots application, then the successful total S of MTC device access
nfor:
Wherein, f
sfor the restriction factor of time delay sensitive type equipment under ACB mechanism, f
nfor the restriction factor of time delay insensitive equipment under ACB mechanism, formula (3) is brought in formula (4) and obtains
Then set up according to formula (5) and solve the Mathematical Modeling that maximum MTC device accesses successfully sum:
Set up target function, then according to target function solve formula (6) MTC device access successful total maximum time corresponding pilot tone subregion compare β
*.
3. the access overload controlling method of RAN layer in sub-clustering type M2M network according to claim 2, it is characterized in that, the process setting up target function is:
Differentiate is carried out to formula (5) equal sign both sides, and is 0 by the result after differentiate, then have
Abbreviation is carried out to formula (7) and obtains target function:
4. the access overload controlling method of RAN layer in sub-clustering type M2M network according to claim 3, is characterized in that, work as A
sf
s∈ (0,1] time, then according to target function adopt Newton iterative solve formula (6), obtain MTC device access successful total maximum time corresponding pilot tone subregion compare β
*.
5. the access overload controlling method of RAN layer in sub-clustering type M2M network according to claim 3, is characterized in that, work as A
sf
stime ∈ (1,3), formula (6) can be expressed as the optimization problem under inequality constraints, and the detailed process solving formula (6) is:
Determine the feasible zone D of optimization problem
1:
Due to feasible zone D
1internal object function monotone decreasing, therefore when β gets boundary value, target function gets maximum, namely
6. the access overload controlling method of RAN layer in sub-clustering type M2M network according to claim 3, is characterized in that, work as A
sf
s∈ [3 ,+∞) time, formula (6) can be expressed as the optimization problem under inequality constraints, and the detailed process solving formula (6) is:
Determine the feasible zone D of optimization problem
2:
Due to feasible zone D
2internal object function monotone decreasing, therefore when β gets boundary value, target function gets maximum, namely
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410816294.5A CN104507038B (en) | 2014-12-23 | 2014-12-23 | The access overload controlling method of RAN layers in a kind of sub-clustering type M2M networks |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410816294.5A CN104507038B (en) | 2014-12-23 | 2014-12-23 | The access overload controlling method of RAN layers in a kind of sub-clustering type M2M networks |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104507038A true CN104507038A (en) | 2015-04-08 |
CN104507038B CN104507038B (en) | 2018-01-19 |
Family
ID=52948740
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410816294.5A Active CN104507038B (en) | 2014-12-23 | 2014-12-23 | The access overload controlling method of RAN layers in a kind of sub-clustering type M2M networks |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104507038B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107086900A (en) * | 2017-05-08 | 2017-08-22 | 中国人民解放军理工大学 | Tackle the M2M communication Access Control optimization method of LTE network emergency |
CN108738161A (en) * | 2018-04-28 | 2018-11-02 | 南京邮电大学 | Accidental access method based on different delay demand device packets in a kind of machine type communication |
CN109963272A (en) * | 2019-04-28 | 2019-07-02 | 西安交通大学 | A kind of accidental access method towards in differentiation MTC network |
CN110996326A (en) * | 2019-12-17 | 2020-04-10 | 西安电子科技大学 | Method for planning cluster number of MTC (machine type communication) network in resource reuse scene |
CN113423146A (en) * | 2021-06-21 | 2021-09-21 | 南京邮电大学 | Unauthorized random access method in multi-cell large-scale MIMO system |
CN115315021A (en) * | 2022-08-09 | 2022-11-08 | 浙江工业大学 | LSTM-AM assisted multichannel ALOHA random access method |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2011098992A1 (en) * | 2010-02-15 | 2011-08-18 | Telefonaktiebolaget Lm Ericsson (Publ) | Access control for m2m devices |
CN103069899A (en) * | 2010-08-12 | 2013-04-24 | 诺基亚公司 | Configuring an uplink and downlink splitting pattern for device-to-device communication under a cellular network |
US20140036669A1 (en) * | 2011-04-29 | 2014-02-06 | Intel Corporation | Machine-to-machine communication device and method for providing enhanced access barring in a wireless network |
CN103634088A (en) * | 2007-11-16 | 2014-03-12 | 高通股份有限公司 | Preamble design for a wireless signal |
-
2014
- 2014-12-23 CN CN201410816294.5A patent/CN104507038B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103634088A (en) * | 2007-11-16 | 2014-03-12 | 高通股份有限公司 | Preamble design for a wireless signal |
WO2011098992A1 (en) * | 2010-02-15 | 2011-08-18 | Telefonaktiebolaget Lm Ericsson (Publ) | Access control for m2m devices |
CN103069899A (en) * | 2010-08-12 | 2013-04-24 | 诺基亚公司 | Configuring an uplink and downlink splitting pattern for device-to-device communication under a cellular network |
US20140036669A1 (en) * | 2011-04-29 | 2014-02-06 | Intel Corporation | Machine-to-machine communication device and method for providing enhanced access barring in a wireless network |
Non-Patent Citations (1)
Title |
---|
JEN-PO CHENG AND CHIA-HAN LEE: "《Prioritized Random Access with Dynamic Access Barring for RAN Overload in 3GPP LTE-A Networks》", 《IEEE GLOBECOM WORKSHOPS》 * |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107086900A (en) * | 2017-05-08 | 2017-08-22 | 中国人民解放军理工大学 | Tackle the M2M communication Access Control optimization method of LTE network emergency |
CN107086900B (en) * | 2017-05-08 | 2020-04-10 | 中国人民解放军理工大学 | M2M communication access control optimization method for handling LTE network emergency |
CN108738161A (en) * | 2018-04-28 | 2018-11-02 | 南京邮电大学 | Accidental access method based on different delay demand device packets in a kind of machine type communication |
CN109963272A (en) * | 2019-04-28 | 2019-07-02 | 西安交通大学 | A kind of accidental access method towards in differentiation MTC network |
WO2020220785A1 (en) * | 2019-04-28 | 2020-11-05 | 西安交通大学 | Random access method in differentiated mtc network |
CN110996326A (en) * | 2019-12-17 | 2020-04-10 | 西安电子科技大学 | Method for planning cluster number of MTC (machine type communication) network in resource reuse scene |
CN110996326B (en) * | 2019-12-17 | 2022-04-05 | 西安电子科技大学 | Method for planning cluster number of MTC (machine type communication) network in resource reuse scene |
CN113423146A (en) * | 2021-06-21 | 2021-09-21 | 南京邮电大学 | Unauthorized random access method in multi-cell large-scale MIMO system |
CN115315021A (en) * | 2022-08-09 | 2022-11-08 | 浙江工业大学 | LSTM-AM assisted multichannel ALOHA random access method |
Also Published As
Publication number | Publication date |
---|---|
CN104507038B (en) | 2018-01-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104507038A (en) | Access overload control method of RAN (Radio Access Network) layer in clustered M2M (Machine to Machine) network | |
Vilgelm et al. | LATMAPA: Load-adaptive throughput-maximizing preamble allocation for prioritization in 5G random access | |
CN101651969B (en) | Implement method of power control cognition MAC protocol based on time division multiple access (TDMA) | |
CN106332094A (en) | Q algorithm-based dynamic duty ratio coexistence method for LTE-U and Wi-Fi systems in unauthorized frequency band | |
JP2014521240A (en) | Method and apparatus for ranging transmission by terminal in wireless communication system | |
JP2016532338A (en) | Method and system for performing random access in small cell in dual connectivity | |
Li et al. | An RSU-coordinated synchronous multi-channel MAC scheme for vehicular ad hoc networks | |
Yang et al. | M2M access performance in LTE‐A system | |
Harwahyu et al. | Analysis of group paging with pre-backoff | |
CN105873173A (en) | Graded access overload control method | |
Lei et al. | Performance improvement of Sub 1 GHz WLANs for future IoT environments | |
Althumali et al. | Priority-based load-adaptive preamble separation random access for QoS-differentiated services in 5G networks | |
CN104540203A (en) | Performance optimizing method for wireless body area network based on independent sets | |
Lee et al. | LSTM-based ACB scheme for machine type communications in LTE-A networks | |
CN107567098A (en) | The method and apparatus of power distribution | |
CN107182092A (en) | Channel-sounding signal SRS sending method and device | |
Samir et al. | An improved LTE RACH protocol for M2M applications | |
CN110392428A (en) | The instruction of random access resource and acquisition methods, base station, terminal, readable medium | |
WO2018006759A1 (en) | Channel access method, apparatus and system, and storage medium | |
CN108601091A (en) | A kind of method that the shared unauthorized frequency ranges of LTE-U/WiFi avoid collision | |
CN103796277B (en) | Method, system and device for indicating beacon frame sending and sending beacon frame | |
Vilgelm et al. | Enhancing cellular M2M random access with binary countdown contention resolution | |
Bello et al. | Frame based back-off for Q-learning RACH access in LTE networks | |
Nwogu et al. | A combined static/dynamic partitioned resource usage approach for random access in 5G cellular networks | |
Chu et al. | Study of generalized resource allocation scheme for multichannel slotted ALOHA systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |