-
Modelling and Experimental Validation for Battery Lifetime Estimation in NB-IoT and LTE-M
Authors:
André Sørensen,
Hua Wang,
Maxime Jérôme Remy,
Nicolaj Kjettrup,
René Brandborg Sørensen,
Jimmy Jessen Nielsen,
Petar Popovski,
Germán Corrales Madueño
Abstract:
Internet of Things (IoT) is one of the main features in 5G. Low-power wide-area networking (LPWAN) has attracted enormous research interests to enable large scale deployment of IoT, with the design objectives of low cost, wide coverage area, as well as low power consumption. In particular, long battery lifetime is essential since many of the IoT devices will be deployed in hard-to-access locations…
▽ More
Internet of Things (IoT) is one of the main features in 5G. Low-power wide-area networking (LPWAN) has attracted enormous research interests to enable large scale deployment of IoT, with the design objectives of low cost, wide coverage area, as well as low power consumption. In particular, long battery lifetime is essential since many of the IoT devices will be deployed in hard-to-access locations. Prediction of the battery lifetime depends on the accurate modelling of energy consumption. This paper presents a comprehensive power consumption model for battery lifetime estimation, which is based on User Equipment(UE) states and procedures, for two cellular IoT technologies: Narrowband Internet of Things (NB-IoT) and Long Term Evolution for Machines (LTE-M). A measurement testbed has been setup and the proposed model has been tested and validated via extensive measurements under various traffic patterns and network scenarios, achieving the modelling inaccuracy within5%. The measurement results show that the battery lifetime of an IoT device can reach up to 10 years as required by 3GPP, with proper configuration of the traffic profile, the coverage scenario, as well as the network configuration parameters.
△ Less
Submitted 27 February, 2022; v1 submitted 24 June, 2021;
originally announced June 2021.
-
Reliable and Efficient Access for Alarm-initiated and Regular M2M Traffic in IEEE 802.11ah Systems
Authors:
German Corrales Madueno,
Cedomir Stefanovic,
Petar Popovski
Abstract:
EEE 802.11ah is a novel WiFi-based protocol, aiming to provide an access solution for the machine-to-machine (M2M) communications. In this paper, we propose an adaptive access mechanism that can be seamlessly incorporated into IEEE 802.11ah protocol operation and that supports all potential M2M reporting regimes, which are periodic, on-demand We show that it is possible to both efficiently and rel…
▽ More
EEE 802.11ah is a novel WiFi-based protocol, aiming to provide an access solution for the machine-to-machine (M2M) communications. In this paper, we propose an adaptive access mechanism that can be seamlessly incorporated into IEEE 802.11ah protocol operation and that supports all potential M2M reporting regimes, which are periodic, on-demand We show that it is possible to both efficiently and reliably resolve all reporting stations in the cell, within the limits of the allowed deadlines. As a side result, we also provide a rationale for modeling the inter-arrival time in alarm events by using the Beta distribution, a model that is considered in the 3GPP standardization.
△ Less
Submitted 29 June, 2017;
originally announced June 2017.
-
Random Access for Machine-Type Communication based on Bloom Filtering
Authors:
Nuno K. Pratas,
Cedomir Stefanovic,
German Corrales Madueno,
Petar Popovski
Abstract:
We present a random access method inspired on Bloom filters that is suited for Machine-Type Communications (MTC). Each accessing device sends a \emph{signature} during the contention process. A signature is constructed using the Bloom filtering method and contains information on the device identity and the connection establishment cause. We instantiate the proposed method over the current LTE-A ac…
▽ More
We present a random access method inspired on Bloom filters that is suited for Machine-Type Communications (MTC). Each accessing device sends a \emph{signature} during the contention process. A signature is constructed using the Bloom filtering method and contains information on the device identity and the connection establishment cause. We instantiate the proposed method over the current LTE-A access protocol. However, the method is applicable to a more general class of random access protocols that use preambles or other reservation sequences, as expected to be the case in 5G systems. We show that our method utilizes the system resources more efficiently and achieves significantly lower connection establishment latency in case of synchronous arrivals, compared to the variant of the LTE-A access protocol that is optimized for MTC traffic. A dividend of the proposed method is that it allows the base station (BS) to acquire the device identity and the connection establishment cause already in the initial phase of the connection establishment, thereby enabling their differentiated treatment by the BS.
△ Less
Submitted 30 August, 2016; v1 submitted 16 November, 2015;
originally announced November 2015.
-
Assessment of LTE Wireless Access for Monitoring of Energy Distribution in the Smart Grid
Authors:
Germán C. Madueño,
Jimmy J. Nielsen,
Dong Min Kim,
Nuno K. Pratas,
Čedomir Stefanović,
Petar Popovski
Abstract:
While LTE is becoming widely rolled out for human-type services, it is also a promising solution for cost-efficient connectivity of the smart grid monitoring equipment. This is a type of machine-to-machine (M2M) traffic that consists mainly of sporadic uplink transmissions. In such a setting, the amount of traffic that can be served in a cell is not constrained by the data capacity, but rather by…
▽ More
While LTE is becoming widely rolled out for human-type services, it is also a promising solution for cost-efficient connectivity of the smart grid monitoring equipment. This is a type of machine-to-machine (M2M) traffic that consists mainly of sporadic uplink transmissions. In such a setting, the amount of traffic that can be served in a cell is not constrained by the data capacity, but rather by the signaling constraints in the random access channel and control channel. In this paper we explore these limitations using a detailed simulation of the LTE access reservation protocol (ARP). We find that 1) assigning more random access opportunities may actually worsen performance; and 2) the additional signaling that follows the ARP has very large impact on the capacity in terms of the number of supported devices; we observed a reduction in the capacity by almost a factor of 3. This suggests that a lightweight access method, with a reduced number of signaling messages, needs to be considered in standardization for M2M applications. Additionally we propose a tractable analytical model to calculate the outage that can be rapidly implemented and evaluated. The model accounts for the features of the random access, control channel and uplink and downlink data channels, as well as retransmissions.
△ Less
Submitted 30 November, 2015; v1 submitted 11 August, 2015;
originally announced August 2015.
-
A Tractable Model of the LTE Access Reservation Procedure for Machine-Type Communications
Authors:
Jimmy J. Nielsen,
Dong Min Kim,
Germán C. Madueño,
Nuno K. Pratas,
Petar Popovski
Abstract:
A canonical scenario in Machine-Type Communications (MTC) is the one featuring a large number of devices, each of them with sporadic traffic. Hence, the number of served devices in a single LTE cell is not determined by the available aggregate rate, but rather by the limitations of the LTE access reservation protocol. Specifically, the limited number of contention preambles and the limited amount…
▽ More
A canonical scenario in Machine-Type Communications (MTC) is the one featuring a large number of devices, each of them with sporadic traffic. Hence, the number of served devices in a single LTE cell is not determined by the available aggregate rate, but rather by the limitations of the LTE access reservation protocol. Specifically, the limited number of contention preambles and the limited amount of uplink grants per random access response are crucial to consider when dimensioning LTE networks for MTC. We propose a low-complexity model of LTE's access reservation protocol that encompasses these two limitations and allows us to evaluate the outage probability at click-speed. The model is based chiefly on closed-form expressions, except for the part with the feedback impact of retransmissions, which is determined by solving a fixed point equation. Our model overcomes the incompleteness of the existing models that are focusing solely on the preamble collisions. A comparison with the simulated LTE access reservation procedure that follows the 3GPP specifications, confirms that our model provides an accurate estimation of the system outage event and the number of supported MTC devices.
△ Less
Submitted 30 November, 2015; v1 submitted 7 May, 2015;
originally announced May 2015.
-
Massive M2M Access with Reliability Guarantees in LTE Systems
Authors:
German Corrales Madueno,
Nuno K. Pratas,
Cedomir Stefanovic,
Petar Popovski
Abstract:
Machine-to-Machine (M2M) communications are one of the major drivers of the cellular network evolution towards 5G systems. One of the key challenges is on how to provide reliability guarantees to each accessing device in a situation in which there is a massive number of almost-simultaneous arrivals from a large set of M2M devices. The existing solutions take a reactive approach in dealing with mas…
▽ More
Machine-to-Machine (M2M) communications are one of the major drivers of the cellular network evolution towards 5G systems. One of the key challenges is on how to provide reliability guarantees to each accessing device in a situation in which there is a massive number of almost-simultaneous arrivals from a large set of M2M devices. The existing solutions take a reactive approach in dealing with massive arrivals, such as non-selective barring when a massive arrival event occurs, which implies that the devices cannot get individual reliability guarantees. In this paper we propose a proactive approach, based on a standard operation of the cellular access. The access procedure is divided into two phases, an estimation phase and a serving phase. In the estimation phase the number of arrivals is estimated and this information is used to tune the amount of resources allocated in the serving phase. Our results show that the proactive approach is instrumental in delivering high access reliability to the M2M devices.
△ Less
Submitted 10 February, 2015;
originally announced February 2015.
-
What Can Wireless Cellular Technologies Do about the Upcoming Smart Metering Traffic?
Authors:
Jimmy J. Nielsen,
Germán C. Madueño,
Nuno K. Pratas,
René B. Sørensen,
Čedomir Stefanović,
Petar Popovski
Abstract:
The introduction of smart electricity meters with cellular radio interface puts an additional load on the wireless cellular networks. Currently, these meters are designed for low duty cycle billing and occasional system check, which generates a low-rate sporadic traffic. As the number of distributed energy resources increases, the household power will become more variable and thus unpredictable fr…
▽ More
The introduction of smart electricity meters with cellular radio interface puts an additional load on the wireless cellular networks. Currently, these meters are designed for low duty cycle billing and occasional system check, which generates a low-rate sporadic traffic. As the number of distributed energy resources increases, the household power will become more variable and thus unpredictable from the viewpoint of the Distribution System Operator (DSO). It is therefore expected, in the near future, to have an increased number of Wide Area Measurement System (WAMS) devices with Phasor Measurement Unit (PMU)-like capabilities in the distribution grid, thus allowing the utilities to monitor the low voltage grid quality while providing information required for tighter grid control. From a communication standpoint, the traffic profile will change drastically towards higher data volumes and higher rates per device. In this paper, we characterize the current traffic generated by smart electricity meters and supplement it with the potential traffic requirements brought by introducing enhanced Smart Meters, i.e., meters with PMU-like capabilities. Our study shows how GSM/GPRS and LTE cellular system performance behaves with the current and next generation smart meters traffic, where it is clearly seen that the PMU data will seriously challenge these wireless systems. We conclude by highlighting the possible solutions for upgrading the cellular standards, in order to cope with the upcoming smart metering traffic.
△ Less
Submitted 1 July, 2015; v1 submitted 4 February, 2015;
originally announced February 2015.
-
Efficient LTE Access with Collision Resolution for Massive M2M Communications
Authors:
Germán Corrales Madueño,
Čedomir Stefanović,
Petar Popovski
Abstract:
LTE random access procedure performs satisfactorily in case of asynchronous, uncorrelated traffic arrivals. However, when the arrivals are correlated and arrive synchronously, the performance of the random access channel (RACH) is drastically reduced, causing a large number of devices to experience outage. In this work we propose a LTE RACH scheme tailored for delay-sensitive M2M services with syn…
▽ More
LTE random access procedure performs satisfactorily in case of asynchronous, uncorrelated traffic arrivals. However, when the arrivals are correlated and arrive synchronously, the performance of the random access channel (RACH) is drastically reduced, causing a large number of devices to experience outage. In this work we propose a LTE RACH scheme tailored for delay-sensitive M2M services with synchronous traffic arrivals. The key idea is, upon detection of a RACH overload, to apply a collision resolution algorithm based on splitting trees. The solution is implemented on top of the existing LTE RACH mechanism, requiring only minor modifications of the protocol operation and not incurring any changes to the physical layer. The results are very promising, outperforming the related solutions by a wide margin. As an illustration, the proposed scheme can resolve 30k devices with an average of 5 preamble transmissions and delay of 1.2 seconds, under a realistic probability of transmissions error both in the downlink and in the uplink.
△ Less
Submitted 24 October, 2014;
originally announced October 2014.
-
Reengineering GSM/GPRS Towards a Dedicated Network for Massive Smart Metering
Authors:
Germán Corrales Madueño,
Čedomir Stefanović,
Petar Popovski
Abstract:
GSM is a synonym for a major success in wireless technology, achieving widespread use and high technology ma- turity. However, its future is questionable, as many stakeholders indicate that the GSM spectrum should be refarmed for LTE. On the other hand, the advent of smart grid and the ubiquity of smart meters will require reliable, long-lived wide area connections. This motivates to investigate t…
▽ More
GSM is a synonym for a major success in wireless technology, achieving widespread use and high technology ma- turity. However, its future is questionable, as many stakeholders indicate that the GSM spectrum should be refarmed for LTE. On the other hand, the advent of smart grid and the ubiquity of smart meters will require reliable, long-lived wide area connections. This motivates to investigate the potential of GSM to be evolved into a dedicated network for smart metering. We introduce simple mechanisms to reengineer the access control in GSM. The result is a system that offers excellent support for smart metering, as well as the other massive machine-to-machine traffic patterns that are envisioned in 3GPP.
△ Less
Submitted 24 October, 2014;
originally announced October 2014.
-
Reliable Reporting for Massive M2M Communications with Periodic Resource Pooling
Authors:
Germán Corrales Madueño,
Cedomir Stefanović,
Petar Popovski
Abstract:
This letter considers a wireless M2M communication scenario with a massive number of M2M devices. Each device needs to send its reports within a given deadline and with certain reliability, e. g. 99.99%. A pool of resources available to all M2M devices is periodically available for transmission. The number of transmissions required by an M2M device within the pool is random due to two reasons - ra…
▽ More
This letter considers a wireless M2M communication scenario with a massive number of M2M devices. Each device needs to send its reports within a given deadline and with certain reliability, e. g. 99.99%. A pool of resources available to all M2M devices is periodically available for transmission. The number of transmissions required by an M2M device within the pool is random due to two reasons - random number of arrived reports since the last reporting opportunity and requests for retransmission due to random channel errors. We show how to dimension the pool of M2M-dedicated resources in order to guarantee the desired reliability of the report delivery within the deadline. The fact that the pool of resources is used by a massive number of devices allows to base the dimensioning on the central limit theorem. The results are interpreted in the context of LTE, but they are applicable to any M2M communication system.
△ Less
Submitted 4 April, 2014;
originally announced April 2014.