An Enhanced Random Access Algorithm Based on the Clustering-Reuse Preamble Allocation in NB-IoT System

As a new wireless access technology, Narrow Band IoT (NB-IoT) enables low-power wide-area coverage services and can be applied to many domains. Emerging applications such as smart traffic, shared bicycles and shared cars have put forward more stringent requirements for connectivity. In order to get higher QoS, an enhancement access algorithm is proposed for the complex service scenario of NB-IoT, in which the network terminals are clustered based the distance from base station and terminal traffic intensity, and allocated reuse preamble code to improve network access capacity. The capacity is modeled and analyzed to evaluate the enhanced access algorithm based on clustering-reuse preamble allocation (ERA-CRPA). The experimental results show that the ERA-CRPA can effectively reduce the probability of random access preamble collision, further improve the access efficiency and increase the equivalent capacity of NB-IoT network.

[1]  Ying Chen,et al.  Performance Analysis and Uplink Scheduling for QoS-Aware NB-IoT Networks in Mobile Computing , 2019, IEEE Access.

[2]  Xingqin Lin,et al.  Performance Evaluation of NB-IoT Coverage , 2016, 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall).

[3]  B. Jaumard,et al.  Efficient algorithms for divisive hierarchical clustering with the diameter criterion , 1990 .

[4]  Hans-Peter Kriegel,et al.  A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.

[5]  Xuyuan Kang,et al.  High-Accuracy Entity State Prediction Method Based on Deep Belief Network Toward IoT Search , 2019, IEEE Wireless Communications Letters.

[6]  Kai Liu,et al.  A classification back-off method for capacity optimization in NB-IOT random access , 2017, 2017 11th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID).

[7]  Xingqin Lin,et al.  A Primer on 3GPP Narrowband Internet of Things , 2016, IEEE Communications Magazine.

[8]  Zhidu Li,et al.  Socially Aware Caching in D2D Enabled Fog Radio Access Networks , 2019, IEEE Access.

[9]  Hervé Rivano,et al.  LTE-A random access channel capacity evaluation for M2M communications , 2016, 2016 Wireless Days (WD).

[10]  Xiaodong Liu,et al.  SMK-means: An Improved Mini Batch K-means Algorithm Based on Mapreduce with Big Data , 2018 .

[11]  Behrouz Shahgholi Ghahfarokhi,et al.  Energy and QoS-Aware Contention-Based Medium Access Control in Machine-Type Communications , 2019, 2019 27th Iranian Conference on Electrical Engineering (ICEE).

[12]  H. Tijms,et al.  A queueing system with impatient customers , 1985 .

[13]  Fei Tong,et al.  Throughput Modeling and Analysis of Random Access in Narrowband Internet of Things , 2018, IEEE Internet of Things Journal.

[14]  Jin Wang,et al.  A PSO based Energy Efficient Coverage Control Algorithm for Wireless Sensor Networks , 2018 .

[15]  Olav Tirkkonen,et al.  NB-IoT Technology Overview and Experience from Cloud-RAN Implementation , 2017, IEEE Wireless Communications.

[16]  Eitan Altman,et al.  Self-Organizing Relays: Dimensioning, Self-Optimization, and Learning , 2012, IEEE Transactions on Network and Service Management.

[17]  Kalle Ruttik,et al.  On the Performance of Narrow-Band Internet of Things (NB-IoT) , 2017, 2017 IEEE Wireless Communications and Networking Conference (WCNC).

[18]  Nirwan Ansari,et al.  NOMA Aided Narrowband IoT for Machine Type Communications With User Clustering , 2018, IEEE Internet of Things Journal.

[19]  Shigetomo Kimura,et al.  A Contention Window Control Method Using Priority Control Based on the Number of Freezes of Wireless LAN , 2017, 2017 Fifth International Symposium on Computing and Networking (CANDAR).

[20]  Vincent Wai Sum Wong,et al.  Connection Density Maximization of Narrowband IoT Systems With NOMA , 2019, IEEE Transactions on Wireless Communications.

[21]  Jun Li,et al.  A smart parking system based on NB-IoT and third-party payment platform , 2017, 2017 17th International Symposium on Communications and Information Technologies (ISCIT).

[22]  Yuzhe Liu,et al.  Overlapping Community Deep Exploring-Based Relay Selection Method Toward Multi-Hop D2D Communication , 2019, IEEE Wireless Communications Letters.

[23]  Abraham O. Fapojuwo,et al.  Performance Analysis and Parameter Optimization of Random Access Backoff Algorithm in LTE , 2012, 2012 IEEE Vehicular Technology Conference (VTC Fall).

[24]  Hang Shi,et al.  A Feature-Based Learning System for Internet of Things Applications , 2019, IEEE Internet of Things Journal.

[25]  Mohammad Qatawneh,et al.  Virtual Node Schedule for Supporting QoS in Wireless Sensor Network , 2019, 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT).

[26]  Baoyu Ma,et al.  An Evidence Combination Method based on DBSCAN Clustering , 2018 .

[27]  Olivier Seller,et al.  IoT: The era of LPWAN is starting now , 2016, ESSCIRC Conference 2016: 42nd European Solid-State Circuits Conference.

[28]  Dan Keun Sung,et al.  An Enhanced Random Access Scheme With Spatial Group Based Reusable Preamble Allocation in Cellular M2M Networks , 2015, IEEE Communications Letters.

[29]  Yuzhe Liu,et al.  Cooperative Willingness Aware Collaborative Caching Mechanism Towards Cellular D2D Communication , 2018, IEEE Access.

[30]  Chia-han Lee,et al.  Prioritized Random Access with dynamic access barring for RAN overload in 3GPP LTE-A networks , 2011, 2011 IEEE GLOBECOM Workshops (GC Wkshps).

[31]  Zhongming Zheng,et al.  Equivalent Capacity in Carrier Aggregation-Based LTE-A Systems: A Probabilistic Analysis , 2014, IEEE Transactions on Wireless Communications.

[32]  A. Alexiou,et al.  M2M Scheduling over LTE: Challenges and New Perspectives , 2012, IEEE Vehicular Technology Magazine.

[33]  Joongheon Kim,et al.  Dynamic Power Allocation and User Scheduling for Power-Efficient and Delay-Constrained Multiple Access Networks , 2018, IEEE Transactions on Wireless Communications.

[34]  Qing Yang,et al.  Cache Less for More: Exploiting Cooperative Video Caching and Delivery in D2D Communications , 2019, IEEE Transactions on Multimedia.

[35]  Zibouda Aliouat,et al.  An Efficient Clustering Strategy Avoiding Buffer Overflow in IoT Sensors: A Bio-Inspired Based Approach , 2019, IEEE Access.

[36]  Hassaan Khaliq Qureshi,et al.  Performance Analysis of Contention-Based Random Access Procedure in Clustered LTE Networks , 2013, 2013 Seventh International Conference on Next Generation Mobile Apps, Services and Technologies.

[37]  H. Edelsbrunner,et al.  Efficient algorithms for agglomerative hierarchical clustering methods , 1984 .

[38]  Douglas Steinley,et al.  K-means clustering: a half-century synthesis. , 2006, The British journal of mathematical and statistical psychology.

[39]  Fernand Meyer,et al.  A comparative study of LPWAN technologies for large-scale IoT deployment , 2019, ICT Express.

[40]  Jiawei Han,et al.  CLARANS: A Method for Clustering Objects for Spatial Data Mining , 2002, IEEE Trans. Knowl. Data Eng..

[41]  Xiang Cheng,et al.  Smart Choice for the Smart Grid: Narrowband Internet of Things (NB-IoT) , 2018, IEEE Internet of Things Journal.

[42]  Yuehong Gao,et al.  On Buffer-Constrained Throughput of a Wireless-Powered Communication System , 2019, IEEE Journal on Selected Areas in Communications.

[43]  Victor C. M. Leung,et al.  Performance Modeling and Stability of Semi-Persistent Scheduling with Initial Random Access in LTE , 2012, IEEE Transactions on Wireless Communications.

[44]  Cao Jing,et al.  Approaches for scaling DBSCAN algorithm to large spatial databases , 2000 .

[45]  Kwang-Cheng Chen,et al.  Toward ubiquitous massive accesses in 3GPP machine-to-machine communications , 2011, IEEE Communications Magazine.