CN104507038A - Access overload control method of RAN (Radio Access Network) layer in clustered M2M (Machine to Machine) network - Google Patents

Access overload control method of RAN (Radio Access Network) layer in clustered M2M (Machine to Machine) network Download PDF

Info

Publication number
CN104507038A
CN104507038A CN201410816294.5A CN201410816294A CN104507038A CN 104507038 A CN104507038 A CN 104507038A CN 201410816294 A CN201410816294 A CN 201410816294A CN 104507038 A CN104507038 A CN 104507038A
Authority
CN
China
Prior art keywords
beta
time delay
access
equipment
formula
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410816294.5A
Other languages
Chinese (zh)
Other versions
CN104507038B (en
Inventor
杜清河
李婉瑜
任品毅
孙黎
王熠晨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Jiaotong University
Original Assignee
Xian Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Jiaotong University filed Critical Xian Jiaotong University
Priority to CN201410816294.5A priority Critical patent/CN104507038B/en
Publication of CN104507038A publication Critical patent/CN104507038A/en
Application granted granted Critical
Publication of CN104507038B publication Critical patent/CN104507038B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access
    • H04W74/0841Random access procedures, e.g. with 4-step access with collision treatment

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Medicines Containing Antibodies Or Antigens For Use As Internal Diagnostic Agents (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses an access overload control method of an RAN layer in a clustered M2M network. The method comprises the following steps: (1) dividing MTC equipment in a base station into time delay sensitive equipment and time delay insensitive equipment according to a preset time delay sensitivity limit; (2) acquiring the quantity of users requesting to access in a current time slot by the base station, obtaining a corresponding pilot frequency partition ratio beta * when the total quantity of successfully accessed MTC equipment is maximum, and then acquiring the quantity of pilot-frequency resources allocated to the time delay sensitive equipment and the quantity of pilot-frequency resources allocated to the time delay insensitive equipment according to the corresponding pilot frequency partition ratio beta * when the total quantity of successfully accessed MTC equipment is maximum; (3) realizing user access by adopting an ACB mechanism according to the quantity of the allocated pilot-frequency resources by the time delay sensitive equipment, and realizing user access by adopting the ACB mechanism according to the allocated pilot-frequency resources by the time delay insensitive equipment. The method disclosed by the invention can be used for effectively increasing the access rate of the MTC equipment.

Description

The access overload controlling method of RAN layer in a kind of sub-clustering type M2M network
Technical field
The invention belongs to M2M communication technical field, relate to the access overload controlling method of RAN layer in a kind of sub-clustering type M2M network.
Background technology
When MTC device a certain intra-zone administration too much and the same period more intensively access network time, network just can face overload and possible MTC communication amount is increased sharply, and the congestion overload of network inevitably causes loss or even the service disruption of unnecessary time delay, packet.For the network congestion overload in M2M communication, the underaction of existing ACB strategy own, is difficult to effectively reduce collision probability and not readily passes through adjustment relevant parameter realizing trading off between various performance when number of users to be accessed increases further; In addition ACB strategy be only applicable to those can to time delay insensitive equipment access in reality the existence of delay sensitive equipment just make the application of ACB strategy receive limitation.Meanwhile, although EAB strategy considers time delay sensitive type equipment, but not realizing grouping to pilot resources causes two class users to share fixing pilot resources, it is unfair that this processing mode inevitably causes low priority user to access, in view of the above problems, need to dynamically arrange pilot tone subregion ratio to the M2M network under cluster structured using time delay sensitivity as standard, maximize the access rate of MTC device with this, but prior art does not relate to the technology of this respect.
Summary of the invention
The object of the invention is to the shortcoming overcoming above-mentioned prior art, provide the access overload controlling method of RAN layer in a kind of sub-clustering type M2M network, this control method can effectively improve MTC device access rate.
For achieving the above object, in sub-clustering type M2M network of the present invention, the access overload controlling method of RAN layer comprises the following steps:
1) according to the time delay sensitivity preset, each MTC device in base station is divided into time delay sensitive type equipment and time delay insensitive equipment;
2) base station obtains the number of users of current time slots application access, obtain MTC device access successfully total maximum time corresponding pilot tone subregion compare β *, then according to MTC device access successfully total maximum time corresponding pilot tone subregion compare β *obtain and distribute to the pilot resources number of time delay sensitive type equipment and distribute to the pilot resources number of time delay insensitive equipment;
3) time delay sensitive type equipment adopts ACB mechanism access user according to the pilot resources number distributed, and time delay insensitive equipment adopts ACB mechanism access user according to the pilot resources number distributed.
Step 2) in obtain MTC device access successfully total maximum time corresponding pilot tone subregion compare β *concrete steps be:
If A sfor the time delay sensitive type number of devices of current time slots, A nfor the time delay insensitive number of devices of current time slots, A ifor the MTC device sum of current time slots, then there is A s+ A n=A i; If M sfor distributing to the pilot resources number of time delay sensitive type equipment, M nfor distributing to the pilot resources number of time delay insensitive equipment, c is the sum of pilot resources, and β is the pilot tone subregion ratio of current time slots, then have
β = M s M n - - - ( 1 )
M s+M n=c (2)
Obtained by formula (1) and formula (2):
M s = cβ 1 + β M n = c 1 + β - - - ( 3 )
Each MTC device accesses successful probability P s=e -N/P, wherein, N is the MTC device quantity of current time slots application, and P is the patterns available number of resources of current time slots application, then the successful total S of MTC device access nfor:
S N = A s f s × e - A s f s M s + A n f n × e - A n f n M n - - - ( 4 )
Wherein, f sfor the restriction factor of time delay sensitive type equipment under ACB mechanism, f nfor the restriction factor of time delay insensitive equipment under ACB mechanism, formula (3) is brought in formula (4) and obtains
S N = A s f s × e - A s f s ( 1 + β ) cβ + A n f n × e - A n f n ( 1 + β ) c - - - ( 5 )
Then set up according to formula (5) and solve the Mathematical Modeling that maximum MTC device accesses successfully sum:
max β { A s f s · e - A s f s c ( 1 + 1 β ) + A n f n · e - A n f n ( 1 + β ) c } , A s f s ∈ ( 0,1 ] max A s f s e - A s f s c ( 1 + 1 β ) ≥ 1 { A s f s · e - A s f s c ( 1 + 1 β ) + A n f n · e - A n f n ( 1 + β ) c } , A s f s ∈ ( 1,3 ) max A s f s e - A s f s c ( 1 + 1 β ) ≥ 2 { A s f s · e - A s f s c ( 1 + 1 β ) + A n f n · e - A n f n ( 1 + β ) c } , A s f s ∈ [ 3 , + ∞ ) - - - ( 6 )
Set up target function, then according to target function solve formula (6) MTC device access successful total maximum time corresponding pilot tone subregion compare β *.
The process setting up target function is:
Differentiate is carried out to formula (5) equal sign both sides, and is 0 by the result after differentiate, then have
A s 2 f s 2 c β 2 × e - A s f s ( 1 + β ) cβ - A n 2 f n 2 c × e - A n f n ( 1 + β ) c ≡ 0 - - - ( 7 )
Abbreviation is carried out to formula (7) and obtains target function:
A s f s c ( 1 + 1 β ) - A n f n c ( 1 + β ) + 2 log β = log ( A s 2 f s 2 A n 2 f n 2 ) - - - ( 8 )
Work as A sf s∈ (0,1] time, then according to target function adopt Newton iterative solve formula (6), obtain MTC device access successful total maximum time corresponding pilot tone subregion compare β *.
Work as A sf stime ∈ (1,3), formula (6) can be expressed as the optimization problem under inequality constraints, and the detailed process solving formula (6) is:
Determine the feasible zone D of optimization problem 1:
D 1 = { β | β ≥ A s f s c * log ( A s f s ) - A s f s } - - - ( 9 )
Due to feasible zone D 1internal object function monotone decreasing, therefore when β gets boundary value, target function gets maximum, namely
β * = A s f s c * log ( A s f s ) - A s f s - - - ( 10 ) .
Work as A sf s∈ [3 ,+∞) time, formula (6) can be expressed as the optimization problem under inequality constraints, and the detailed process solving formula (6) is:
Determine the feasible zone D of optimization problem 2:
D 2 = { β | β ≥ A s f s c*log ( A s f s / 2 ) - A s f s } - - - ( 11 )
Due to feasible zone D 2internal object function monotone decreasing, therefore when β gets boundary value, target function gets maximum, namely
β * = A s f s c*log ( A s f s / 2 ) - A s f s - - - ( 12 ) .
The present invention has following beneficial effect:
In sub-clustering type M2M network of the present invention, the access overload controlling method of RAN layer is when accessing each MTC device, first according to the time delay sensitivity preset, each MTC device in base station is divided into time delay sensitive type equipment and time delay insensitive equipment, obtain again MTC device access successfully total maximum time corresponding pilot tone subregion ratio, then according to MTC device access successfully total maximum time corresponding pilot tone subregion than obtaining the pilot resources number distributing to time delay sensitive type equipment and time delay insensitive equipment, time delay sensitive type equipment and time delay insensitive equipment adopt ACB mechanism access user according to distributing to respective pilot resources number, thus effective raising MTC device access rate, make total access successful user number maximum, reasonable in design, simple to operate, practicality is extremely strong.
Accompanying drawing explanation
Fig. 1 is typical M2M system architecture diagram;
Fig. 2 is MTC device random access procedure figure;
Fig. 3 is scenario-frame design drawing;
Fig. 4 (a) is for the access probability of success is with the change curve of relation between two groups of restriction factors;
Fig. 4 (b) is for average access delay is with the change curve of relation between two groups of restriction factors;
Fig. 5 is the correlation curve figure accessing the probability of success under different restriction factor;
Fig. 6 is the correlation curve figure of average access delay under different restriction factor;
Fig. 7 is the correlation curve figure of collision probability under different restriction factor;
Fig. 8 is the correlation curve figure that under different restriction factor, two class users access the probability of success;
Fig. 9 is the correlation curve figure of the average access delay of two class users under different restriction factor;
Figure 10 is the correlation curve figure of two class user collision probabilities under different restriction factor.
Embodiment
Below in conjunction with accompanying drawing, the present invention is described in further detail:
With reference to figure 1, concrete being described below of typical M2M system architecture diagram:
Consider typical M2M SNA, comprise LTE-A base station, MTC device, gateway node and the interface between gateway and base station, wherein, LTE-A base station comprises macro station, Picocell base station, Femtocell base station and via node, and the pilot resources of user and the issue of various control information and storage are distributed in the regulation and control of primary responsibility the whole network, the base station of Serving cell, each equipment place wants elder generation and corresponding gateway node (GW) to communicate simultaneously, and gateway node contacts the serving BS of community, two equipment places as a via node; Between gateway and base station, then need interface S1 transmission of information, under this deployment scenario, realize direct communication each other by LTE-A base station between MTC device and connect.
With reference to figure 2, the access procedure of MTC device mainly completes in RACH channel, here configuration and the operational circumstances of RACH channel might as well be provided, RACH channel is made up of some RA time slots that can be used for transmitting access request, the length of RA time slot depends on the value of Configuration Index, point out in agreement, the every 5ms configuration of RACH is meaned once when Configuration Index value is 6, namely every 5ms just has 64 orthogonal guide frequency resources available, wherein, 54 accesses that can be used for based on collision, remain 10 then for collisionless access is reserved.Be that a time slot is as pilot resources configuration cycle using 5ms, MTC device goes competition 54 can supply the pilot resources utilized at each time slot, and in current time slots, the equipment of each application access must complete four step random access procedures between base station and equipment and just can complete this access request.Four handshake procedures of Stochastic accessing (RA) are as follows:
Msgl: the MTC device of application access sends pilot resources information to base station
Msg2: base station is by the MTC device transmission RA feedback information of PDSCH channel to correspondence
(connection request) information that Msg3:MTC equipment sends to base station " request connects "
Msg4: base station sends " Conflict solving " (contention resolution) information to MTC device
With reference to figure 3, in sub-clustering type M2M network of the present invention, the access overload controlling method of RAN layer comprises the following steps:
1) according to the time delay sensitivity preset, each MTC device in base station is divided into time delay sensitive type equipment and time delay insensitive equipment;
2) base station obtains the number of users of current time slots application access, obtain MTC device access successfully total maximum time corresponding pilot tone subregion compare β *, then according to MTC device access successfully total maximum time corresponding pilot tone subregion compare β *obtain and distribute to the pilot resources number of time delay sensitive type equipment and distribute to the pilot resources number of time delay insensitive equipment;
3) time delay sensitive type equipment adopts ACB mechanism access user according to the pilot resources number distributed, and time delay insensitive equipment adopts ACB mechanism access user according to the pilot resources number distributed.
Wherein, when the time delay sensitivity of MTC device is more than or equal to default time delay sensitivity, then this MTC device is time delay sensitive type equipment, and when the time delay sensitivity of MTC device is less than default time delay sensitivity, then this MTC device is time delay insensitive equipment;
Step 2) in obtain MTC device access successfully total maximum time corresponding pilot tone subregion compare β *concrete steps be:
If A sfor the time delay sensitive type number of devices of current time slots, A nfor the time delay insensitive number of devices of current time slots, A ifor the MTC device sum of current time slots, then there is A s+ A n=A i; If M sfor distributing to the pilot resources number of time delay sensitive type equipment, M nfor distributing to the pilot resources number of time delay insensitive equipment, c is the sum of pilot resources, and β is the pilot tone subregion ratio of current time slots, then have
β = M s M n - - - ( 1 )
M s+M n=c (2)
Obtained by formula (1) and formula (2):
M s = cβ 1 + β M n = c 1 + β - - - ( 3 )
Each MTC device accesses successful probability P s=e -N/P, wherein, N is the MTC device quantity of current time slots application, and P is the patterns available number of resources of current time slots application, then the successful total S of MTC device access nfor:
S N = A s f s × e - A s f s M s + A n f n × e - A n f n M n - - - ( 4 )
Wherein, f sfor the restriction factor of time delay sensitive type equipment under ACB mechanism, f nfor the restriction factor of time delay insensitive equipment under ACB mechanism, formula (3) is brought in formula (4) and obtains
S N = A s f s × e - A s f s ( 1 + β ) cβ + A n f n × e - A n f n ( 1 + β ) c - - - ( 5 )
Then set up according to formula (5) and solve the Mathematical Modeling that maximum MTC device accesses successfully sum:
max β { A s f s · e - A s f s c ( 1 + 1 β ) + A n f n · e - A n f n ( 1 + β ) c } , A s f s ∈ ( 0,1 ] max A s f s e - A s f s c ( 1 + 1 β ) ≥ 1 { A s f s · e - A s f s c ( 1 + 1 β ) + A n f n · e - A n f n ( 1 + β ) c } , A s f s ∈ ( 1,3 ) max A s f s e - A s f s c ( 1 + 1 β ) ≥ 2 { A s f s · e - A s f s c ( 1 + 1 β ) + A n f n · e - A n f n ( 1 + β ) c } , A s f s ∈ [ 3 , + ∞ ) - - - ( 6 )
Set up target function, then according to target function solve formula (6) MTC device access successful total maximum time corresponding pilot tone subregion compare β *.
The process setting up target function is:
Differentiate is carried out to formula (5) equal sign both sides, and is 0 by the result after differentiate, then have
A s 2 f s 2 c β 2 × e - A s f s ( 1 + β ) cβ - A n 2 f n 2 c × e - A n f n ( 1 + β ) c ≡ 0 - - - ( 7 )
Abbreviation is carried out to formula (7) and obtains target function:
A s f s c ( 1 + 1 β ) - A n f n c ( 1 + β ) + 2 log β = log ( A s 2 f s 2 A n 2 f n 2 ) - - - ( 8 )
Work as A sf s∈ (0,1] time, then according to target function adopt Newton iterative solve formula (6), obtain MTC device access successful total maximum time corresponding pilot tone subregion compare β *.
Work as A sf stime ∈ (1,3), formula (6) can be expressed as the optimization problem under inequality constraints, and the detailed process solving formula (6) is:
Determine the feasible zone D of optimization problem 1:
D 1 = { β | β ≥ A s f s c * log ( A s f s ) - A s f s } - - - ( 9 )
Due to feasible zone D 1internal object function monotone decreasing, therefore when β gets boundary value, target function gets maximum, namely
β * = A s f s c * log ( A s f s ) - A s f s - - - ( 10 ) .
Work as A sf s∈ [3 ,+∞) time, formula (6) can be expressed as the optimization problem under inequality constraints, and the detailed process solving formula (6) is:
Determine the feasible zone D of optimization problem 2:
D 2 = { β | β ≥ A s f s c*log ( A s f s / 2 ) - A s f s } - - - ( 11 )
Due to feasible zone D 2internal object function monotone decreasing, therefore when β gets boundary value, target function gets maximum, namely
β * = A s f s c*log ( A s f s / 2 ) - A s f s - - - ( 12 ) .
According to the realization mechanism of ACB strategy, first need to design the parameter of two in ACB mechanism (restriction factor and binding hours) respectively, because design focal point of the present invention is dynamic conditioning pilot tone subregion ratio, so now make following hypothesis in order to reduction procedure:
The binding hours of time delay sensitive type equipment is equal with the binding hours of time delay insensitive equipment, i.e. T s=T n; When being limited, the back off time of time delay sensitive type equipment and time delay insensitive equipment is as follows:
For the non-sensitive user of time delay, back off time is:
T barred = ( 0.7 + 0.6 · rand ac _ barringfactor ) × ac _ barringtime - - - ( 13 )
For latency sensitive user, back off time is:
T barred=(0.7+0.6·rand)*ac_barringtime (14)
And two bunches of equipment adopt the relation between the restriction factor of ACB mechanism to be set to linear relationship: f n=p+qf s, wherein f s∈ (0,1), the value of p and q will make f n∈ (0,1); Fig. 4 (a) and 4 (b) are the access probability of success and the average access delay change curve with relation between two groups of restriction factors respectively, according to the integrated survey accessing the probability of success and average access delay two indices, we select following relation:
f n = 0.6 + 1 3 f s - - - ( 15 )
In sum, main realization mechanism of the present invention is the pilot tone subregion ratio of attempt by each time slot of Dynamic controlling, to optimize the equipment access situation of each time slot; The essence of this algorithm be by RACH resource Dynamic Separation ability in cluster structured to realize the control to RAN overload in M2M communication.
Emulation experiment
With reference to figure 5, emulate in the LTE community of a 5MHz, 30000 MTC device are evenly distributed in community, and collision indicating device is set to 5ms, only accesses situation to user in 10s and consider in emulation.The quantitative proportion of the quantity of delay sensitive equipment and the non-sensitive equipment of time delay is set to 1: 9.In addition, for the parameter of two in ACB strategy, in emulation, delay sensitive equipment is the same with the binding hours of the non-sensitive equipment of time delay, meet (15) formula between restriction factor, and the random-backoff time of the equipment of respective cluster after restriction factor " restriction " meets (13) and (14) formula respectively.Under above-mentioned simulating scenes, Zong Fig. 5 show the access probability of success with the change curve of restriction factor and depict traditional ACB algorithm with algorithm proposed access rate compare.Can find out, when restriction factor changes between 0.2-0.8, along with restriction factor increases, the corresponding increase of access rate, and when restriction factor value is 0.9, access rate reduces, this is because major part user all can not obtain chance access under ACB mechanism by " restriction " when restriction factor is larger, this causes a large number of users collide and access rate is declined to some extent unavoidably.Meanwhile, the present invention compares traditional ACB mechanism and has higher access rate, and reason is that this programme realizes always accessing optimum by selecting optimum pilot tone subregion ratio.
Fig. 6 is the correlation curve figure of system average access delay under different restriction factor.Can find out, along with increasing progressively of restriction factor, average access delay constantly reduces, and the average access delay of user obtained under traversal restriction factor is all in below 4s, and this also illustrates another superiority of the present invention.Meanwhile, the present invention more traditional ACB mechanism significantly reduces in average access delay.
Fig. 7 show mean collisional probability with the change curve of restriction factor and give traditional ACB algorithm with institute proposes algorithm collision rate contrast, be not difficult discovery, the collision rate of this programme increases with the increase of restriction factor.Meanwhile, the present invention's more traditional ACB mechanism collision rate slightly improves, although collision rate improves, this is in the tolerance that systematic function promotes.
Under Fig. 8-10 discusses different restriction factor respectively, two class users are accessing the correlation curve figure in the probability of success, average access delay and mean collisional probability three.On the one hand, for sensitive equipment, from Fig. 8 and Fig. 9, compared with ACB mechanism, its access probability of success remains basically stable compared with ACB algorithm with average access delay, and Figure 10 shows that the collision rate of sensitive users significantly declines; On the other hand, for non-sensitive user, known by Fig. 8 and Fig. 9, than ACB strategy, its access probability of success greatly promotes and change with restriction factor is not obvious, and its average access delay significantly declines, in addition, Figure 10 also shows that the collision rate of non-sensitive user raises to some extent, and this is in the tolerance of other two performance boosts.

Claims (6)

1. an access overload controlling method for RAN layer in sub-clustering type M2M network, is characterized in that, comprise the following steps:
1) according to the time delay sensitivity preset, each MTC device in base station is divided into time delay sensitive type equipment and time delay insensitive equipment;
2) base station obtains the number of users of current time slots application access, obtain MTC device access successfully total maximum time corresponding pilot tone subregion compare β *, then according to MTC device access successfully total maximum time corresponding pilot tone subregion compare β *obtain and distribute to the pilot resources number of time delay sensitive type equipment and distribute to the pilot resources number of time delay insensitive equipment;
3) time delay sensitive type equipment adopts ACB mechanism access user according to the pilot resources number distributed, and time delay insensitive equipment adopts ACB mechanism access user according to the pilot resources number distributed.
2. the access overload controlling method of RAN layer in sub-clustering type M2M network according to claim 1, is characterized in that, step 2) in obtain MTC device access successfully total maximum time corresponding pilot tone subregion compare β *concrete steps be:
If A sfor the time delay sensitive type number of devices of current time slots, A nfor the time delay insensitive number of devices of current time slots, A ifor the MTC device sum of current time slots, then there is A s+ A n=A i; If M sfor distributing to the pilot resources number of time delay sensitive type equipment, M nfor distributing to the pilot resources number of time delay insensitive equipment, c is the sum of pilot resources, and β is the pilot tone subregion ratio of current time slots, then have
β = M s M n - - - ( 1 )
M s+M n=c (2)
Obtained by formula (1) and formula (2):
M s = cβ 1 + β M n = c 1 + β - - - ( 3 )
Each MTC device accesses successful probability P s=e -N/P, wherein, N is the MTC device quantity of current time slots application, and P is the patterns available number of resources of current time slots application, then the successful total S of MTC device access nfor:
S N = A s f s × e - A s f s M s + A n f n × e - A n f n M n - - - ( 4 )
Wherein, f sfor the restriction factor of time delay sensitive type equipment under ACB mechanism, f nfor the restriction factor of time delay insensitive equipment under ACB mechanism, formula (3) is brought in formula (4) and obtains
S N = A s f s × e - A s f s ( 1 + β ) cβ + A n f n × e - A n f n ( 1 + β ) c - - - ( 5 )
Then set up according to formula (5) and solve the Mathematical Modeling that maximum MTC device accesses successfully sum:
max β { A s f s · e - A s f s c ( 1 + 1 β ) + A n f n · e - A n f n ( 1 + β ) c } , A s f s ∈ ( 0,1 ] max A s f s e - A s f s c ( 1 + 1 β ) ≥ 1 { A s f s · e - A s f s c ( 1 + 1 β ) + A n f n · e - A n f n ( 1 + β ) c } , A s f s ∈ ( 1,3 ) max A s f s e - A s f s c ( 1 + 1 β ) ≥ 2 { A s f s · e - A s f s c ( 1 + 1 β ) + A n f n · e - A n f n ( 1 + β ) c } , A s f s ∈ [ 3 , + ∞ ) - - - ( 6 )
Set up target function, then according to target function solve formula (6) MTC device access successful total maximum time corresponding pilot tone subregion compare β *.
3. the access overload controlling method of RAN layer in sub-clustering type M2M network according to claim 2, it is characterized in that, the process setting up target function is:
Differentiate is carried out to formula (5) equal sign both sides, and is 0 by the result after differentiate, then have
A s 2 f s 2 c β 2 × e - A s f s ( 1 + β ) cβ - A n 2 f n 2 c × e - A n f n ( 1 + β ) c ≡ 0 - - - ( 7 )
Abbreviation is carried out to formula (7) and obtains target function:
A s f s c ( 1 + 1 β ) - A n f n c ( 1 + β ) + 2 log β = log ( A s 2 f s 2 A n 2 f n 2 ) - - - ( 8 )
4. the access overload controlling method of RAN layer in sub-clustering type M2M network according to claim 3, is characterized in that, work as A sf s∈ (0,1] time, then according to target function adopt Newton iterative solve formula (6), obtain MTC device access successful total maximum time corresponding pilot tone subregion compare β *.
5. the access overload controlling method of RAN layer in sub-clustering type M2M network according to claim 3, is characterized in that, work as A sf stime ∈ (1,3), formula (6) can be expressed as the optimization problem under inequality constraints, and the detailed process solving formula (6) is:
Determine the feasible zone D of optimization problem 1:
D 1 = { β | β ≥ A s f s c * log ( A s f s ) - A s f s } - - - ( 9 )
Due to feasible zone D 1internal object function monotone decreasing, therefore when β gets boundary value, target function gets maximum, namely
β * = A s f s c * log ( A s f s ) - A s f s - - - ( 10 ) .
6. the access overload controlling method of RAN layer in sub-clustering type M2M network according to claim 3, is characterized in that, work as A sf s∈ [3 ,+∞) time, formula (6) can be expressed as the optimization problem under inequality constraints, and the detailed process solving formula (6) is:
Determine the feasible zone D of optimization problem 2:
D 2 = { β | β ≥ A s f s c * log ( A s f s / 2 ) - A s f s } - - - ( 11 )
Due to feasible zone D 2internal object function monotone decreasing, therefore when β gets boundary value, target function gets maximum, namely
β * = A s f s c * log ( A s f s / 2 ) - A s f s - - - ( 12 ) .
CN201410816294.5A 2014-12-23 2014-12-23 The access overload controlling method of RAN layers in a kind of sub-clustering type M2M networks Active CN104507038B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410816294.5A CN104507038B (en) 2014-12-23 2014-12-23 The access overload controlling method of RAN layers in a kind of sub-clustering type M2M networks

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410816294.5A CN104507038B (en) 2014-12-23 2014-12-23 The access overload controlling method of RAN layers in a kind of sub-clustering type M2M networks

Publications (2)

Publication Number Publication Date
CN104507038A true CN104507038A (en) 2015-04-08
CN104507038B CN104507038B (en) 2018-01-19

Family

ID=52948740

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410816294.5A Active CN104507038B (en) 2014-12-23 2014-12-23 The access overload controlling method of RAN layers in a kind of sub-clustering type M2M networks

Country Status (1)

Country Link
CN (1) CN104507038B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107086900A (en) * 2017-05-08 2017-08-22 中国人民解放军理工大学 Tackle the M2M communication Access Control optimization method of LTE network emergency
CN108738161A (en) * 2018-04-28 2018-11-02 南京邮电大学 Accidental access method based on different delay demand device packets in a kind of machine type communication
CN109963272A (en) * 2019-04-28 2019-07-02 西安交通大学 A kind of accidental access method towards in differentiation MTC network
CN110996326A (en) * 2019-12-17 2020-04-10 西安电子科技大学 Method for planning cluster number of MTC (machine type communication) network in resource reuse scene
CN113423146A (en) * 2021-06-21 2021-09-21 南京邮电大学 Unauthorized random access method in multi-cell large-scale MIMO system
CN115315021A (en) * 2022-08-09 2022-11-08 浙江工业大学 LSTM-AM assisted multichannel ALOHA random access method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011098992A1 (en) * 2010-02-15 2011-08-18 Telefonaktiebolaget Lm Ericsson (Publ) Access control for m2m devices
CN103069899A (en) * 2010-08-12 2013-04-24 诺基亚公司 Configuring an uplink and downlink splitting pattern for device-to-device communication under a cellular network
US20140036669A1 (en) * 2011-04-29 2014-02-06 Intel Corporation Machine-to-machine communication device and method for providing enhanced access barring in a wireless network
CN103634088A (en) * 2007-11-16 2014-03-12 高通股份有限公司 Preamble design for a wireless signal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103634088A (en) * 2007-11-16 2014-03-12 高通股份有限公司 Preamble design for a wireless signal
WO2011098992A1 (en) * 2010-02-15 2011-08-18 Telefonaktiebolaget Lm Ericsson (Publ) Access control for m2m devices
CN103069899A (en) * 2010-08-12 2013-04-24 诺基亚公司 Configuring an uplink and downlink splitting pattern for device-to-device communication under a cellular network
US20140036669A1 (en) * 2011-04-29 2014-02-06 Intel Corporation Machine-to-machine communication device and method for providing enhanced access barring in a wireless network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
JEN-PO CHENG AND CHIA-HAN LEE: "《Prioritized Random Access with Dynamic Access Barring for RAN Overload in 3GPP LTE-A Networks》", 《IEEE GLOBECOM WORKSHOPS》 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107086900A (en) * 2017-05-08 2017-08-22 中国人民解放军理工大学 Tackle the M2M communication Access Control optimization method of LTE network emergency
CN107086900B (en) * 2017-05-08 2020-04-10 中国人民解放军理工大学 M2M communication access control optimization method for handling LTE network emergency
CN108738161A (en) * 2018-04-28 2018-11-02 南京邮电大学 Accidental access method based on different delay demand device packets in a kind of machine type communication
CN109963272A (en) * 2019-04-28 2019-07-02 西安交通大学 A kind of accidental access method towards in differentiation MTC network
WO2020220785A1 (en) * 2019-04-28 2020-11-05 西安交通大学 Random access method in differentiated mtc network
CN110996326A (en) * 2019-12-17 2020-04-10 西安电子科技大学 Method for planning cluster number of MTC (machine type communication) network in resource reuse scene
CN110996326B (en) * 2019-12-17 2022-04-05 西安电子科技大学 Method for planning cluster number of MTC (machine type communication) network in resource reuse scene
CN113423146A (en) * 2021-06-21 2021-09-21 南京邮电大学 Unauthorized random access method in multi-cell large-scale MIMO system
CN115315021A (en) * 2022-08-09 2022-11-08 浙江工业大学 LSTM-AM assisted multichannel ALOHA random access method

Also Published As

Publication number Publication date
CN104507038B (en) 2018-01-19

Similar Documents

Publication Publication Date Title
CN104507038A (en) Access overload control method of RAN (Radio Access Network) layer in clustered M2M (Machine to Machine) network
Vilgelm et al. LATMAPA: Load-adaptive throughput-maximizing preamble allocation for prioritization in 5G random access
CN101651969B (en) Implement method of power control cognition MAC protocol based on time division multiple access (TDMA)
CN106332094A (en) Q algorithm-based dynamic duty ratio coexistence method for LTE-U and Wi-Fi systems in unauthorized frequency band
JP2014521240A (en) Method and apparatus for ranging transmission by terminal in wireless communication system
JP2016532338A (en) Method and system for performing random access in small cell in dual connectivity
Li et al. An RSU-coordinated synchronous multi-channel MAC scheme for vehicular ad hoc networks
Yang et al. M2M access performance in LTE‐A system
Harwahyu et al. Analysis of group paging with pre-backoff
CN105873173A (en) Graded access overload control method
Lei et al. Performance improvement of Sub 1 GHz WLANs for future IoT environments
Althumali et al. Priority-based load-adaptive preamble separation random access for QoS-differentiated services in 5G networks
CN104540203A (en) Performance optimizing method for wireless body area network based on independent sets
Lee et al. LSTM-based ACB scheme for machine type communications in LTE-A networks
CN107567098A (en) The method and apparatus of power distribution
CN107182092A (en) Channel-sounding signal SRS sending method and device
Samir et al. An improved LTE RACH protocol for M2M applications
CN110392428A (en) The instruction of random access resource and acquisition methods, base station, terminal, readable medium
WO2018006759A1 (en) Channel access method, apparatus and system, and storage medium
CN108601091A (en) A kind of method that the shared unauthorized frequency ranges of LTE-U/WiFi avoid collision
CN103796277B (en) Method, system and device for indicating beacon frame sending and sending beacon frame
Vilgelm et al. Enhancing cellular M2M random access with binary countdown contention resolution
Bello et al. Frame based back-off for Q-learning RACH access in LTE networks
Nwogu et al. A combined static/dynamic partitioned resource usage approach for random access in 5G cellular networks
Chu et al. Study of generalized resource allocation scheme for multichannel slotted ALOHA systems

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant