Internet of Things and Sensors Networks in 5G Wireless Communications
Internet of Things and Sensors Networks in 5G Wireless Communications
and Sensors
Networks in
5G Wireless
Communications
Edited by
Lei Zhang, Guodong Zhao and Muhammad Ali Imran
Printed Edition of the Special Issue Published in Sensors
www.mdpi.com/journal/sensors
Internet of Things and Sensors Networks
in 5G Wireless Communications
Internet of Things and Sensors Networks
in 5G Wireless Communications
Editorial Office
MDPI
St. Alban-Anlage 66
4052 Basel, Switzerland
This is a reprint of articles from the Special Issue published online in the open access journal Sensors
(ISSN 1424-8220) from 2019 to 2020 (available at: https://www.mdpi.com/journal/sensors/special
issues/IOT SN5G)
For citation purposes, cite each article independently as indicated on the article page online and as
indicated below:
LastName, A.A.; LastName, B.B.; LastName, C.C. Article Title. Journal Name Year, Article Number,
Page Range.
c 2020 by the authors. Articles in this book are Open Access and distributed under the Creative
Commons Attribution (CC BY) license, which allows users to download, copy and build upon
published articles, as long as the author and publisher are properly credited, which ensures maximum
dissemination and a wider impact of our publications.
The book as a whole is distributed by MDPI under the terms and conditions of the Creative Commons
license CC BY-NC-ND.
Contents
Rabeea Basir, Saad Qaisar, Mudassar Ali, Monther Aldwairi, Muhammad Ikram Ashraf,
Aamir Mahmood and Mikael Gidlund
Fog Computing Enabling Industrial Internet of Things: State-of-the-Art and
Research Challenges
Reprinted from: Sensors 2019, 19, 4807, doi:10.3390/s19214807 . . . . . . . . . . . . . . . . . . . . 1
Collins Burton Mwakwat, Hassan Malik, Muhammad Mahtab Alam, Yannick Le Moullec,
Sven Parand and Shahid Mumtaz
Narrowband Internet of Things (NB-IoT): From Physical (PHY) and Media Access Control
(MAC) Layers Perspectives
Reprinted from: Sensors 2019, 19, 2613, doi:10.3390/s19112613 . . . . . . . . . . . . . . . . . . . . 39
Ahmed Adel Aly, Hussein M. ELAttar, Hesham ElBadawy and Wael Abbas
Aggregated Throughput Prediction for Collated Massive Machine-Type Communications in 5G
Wireless Networks
Reprinted from: Sensors 2019, 19, 3651, doi:10.3390/s19173651 . . . . . . . . . . . . . . . . . . . . 73
Wenjun Hou, Song Li, Yanjing Sun, Jiasi Zhou and Nannan Lu
Interference-Aware Subcarrier Allocation for Massive Machine-Type Communication in
5G-Enabled Internet of Things
Reprinted from: Sensors 2019, 19, 4530, doi:10.3390/s19204530 . . . . . . . . . . . . . . . . . . . . 93
Muhammad Asad Ullah, Junnaid Iqbal, Arliones Hoeller, Richard Demo Souza and
Hirley Alves
K-Means Spreading Factor Allocation for Large-Scale LoRa Networks
Reprinted from: Sensors 2019, 19, 4723, doi:10.3390/s19214723 . . . . . . . . . . . . . . . . . . . . 106
Jiewen Deng, Wanrong Sun, Lei Guan, Nan Zhao, Muhammad Bilal Khan, Aifeng Ren,
Jianxun Zhao, Xiaodong Yang and Qammer H. Abbasi
Noninvasive Suspicious Liquid Detection Using Wireless Signals
Reprinted from: Sensors 2019, 19, 4086, doi:10.3390/s19194086 . . . . . . . . . . . . . . . . . . . . 179
Mohammad Kazem Chamran, Kok-Lim Alvin Yau, Rafidah M. D. Noor and Richard Wong
A Distributed Testbed for 5G Scenarios: An Experimental Study
Reprinted from: Sensors 2020, 20, 18, doi:10.3390/s20010018 . . . . . . . . . . . . . . . . . . . . . 190
v
About the Special Issue Editors
Lei Zhang (Dr.) is a Lecturer at the University of Glasgow, UK. He received his Ph.D. from the
University of Sheffield, UK. He worked as a research engineer in the Huawei Communication
Technology Laboratory (CT Lab), and a research fellow in the 5G Innovation Centre (5GIC),
Institute of Communications (ICS), University of Surrey, UK. His research interests broadly lie in
communications and networks, including wireless blockchain networks, radio access network slicing
(RAN slicing), new air interface designs, Internet of Things (IoT), multi-antenna signal processing,
and massive MIMO systems. He has 19 US/UK/EU/China granted/filed patents on wireless
communications and has published over 100 peer-reviewed papers. Dr. Lei Zhang also holds a
visiting position in 5GIC at the University of Surrey. He is an associate editor of IEEE ACCESS and a
senior member of IEEE.
Guodong Zhao (Dr.) received his B.E. degree from Xidian University, Xi’an, China, in 2005, and
his Ph.D. degree from Beihang University, Beijing, China, in 2011, both in Electrical Engineering.
From 2011 to 2018, he was an associate professor at the University of Electronic Science and
Technology of China (UESTC), Chengdu, China. In 2018, he joined the University of Glasgow
in the UK as a lecturer (assistant professor). He has 10 years of experience working on wireless
communications with international partners and he is a senior member of IEEE. He has published
one book with Springer press and more than 50 peer-reviewed research papers (including more than
10 IEEE transaction papers), had over 1700 citations in Google Scholar, and won a best paper award
in IEEE Globecom, 2012, and a best poster award in IEEE WCNC, 2018. His current research interests
are within the areas of wireless communication, control, and robotics.
Muhammad Ali Imran (Prof.) is a Fellow of IET, Senior Member of IEEE and Senior Fellow of
the Higher Education Academy UK. He is a Professor of Wireless Communication Systems, with
research interests in self-organised networks, wireless networked control systems and wireless sensor
systems. He heads the Communications, Sensing and Imaging (CSI) research group at the University
of Glasgow and is Dean at the University of Glasgow, UESTC. He is an Affiliate Professor at the
University of Oklahoma, USA and a visiting Professor at the 5G Innovation Centre, University of
Surrey, UK. He has over 20 years of combined academic and industry experience, with several leading
roles in multi-million GBP-funded projects. He has filed 15 patents; has authored/co-authored
over 400 journal and conference publications; was editor of five books and author of more than
20 book chapters; and successfully supervised over 40 postgraduate students at the Doctoral level.
He has been a consultant for international projects and local companies in the area of self-organised
networks. He has been interviewed by the BBC, Scottish television and many radio channels on the
topic of 5G technology.
vii
sensors
Review
Fog Computing Enabling Industrial Internet of
Things: State-of-the-Art and Research Challenges
Rabeea Basir 1 , Saad Qaisar 1 , Mudassar Ali 1,2, * , Monther Aldwairi 3 ,
Muhammad Ikram Ashraf 4 , Aamir Mahmood 5 and Mikael Gidlund 5
1 School of Electrical Engineering and Computer Science, National University of Science and Technology,
Islamabad 44000, Pakistan; [email protected] or [email protected] (R.B.);
[email protected] (S.Q.)
2 Department of Telecommunication Engineering, University of Engineering and Technology,
Taxila 47050, Pakistan
3 College of Technological Innovation, Zayed University, Abu Dhabi 144534, UAE; [email protected]
4 Centre for Wireless Communication, University of Oulu, 90014 Oulu, Finland; ikram.ashraf@oulu.fi or
[email protected]
5 Department of Information Systems and Technology, Mid Sweden University, 85170 Sundsvall, Sweden;
[email protected] (A.M.); [email protected] (M.G.)
* Correspondence: [email protected] or [email protected]
Abstract: Industry is going through a transformation phase, enabling automation and data
exchange in manufacturing technologies and processes, and this transformation is called Industry
4.0. Industrial Internet-of-Things (IIoT) applications require real-time processing, near-by storage,
ultra-low latency, reliability and high data rate, all of which can be satisfied by fog computing
architecture. With smart devices expected to grow exponentially, the need for an optimized fog
computing architecture and protocols is crucial. Therein, efficient, intelligent and decentralized
solutions are required to ensure real-time connectivity, reliability and green communication. In this
paper, we provide a comprehensive review of methods and techniques in fog computing. Our focus
is on fog infrastructure and protocols in the context of IIoT applications. This article has two main
research areas: In the first half, we discuss the history of industrial revolution, application areas of
IIoT followed by key enabling technologies that act as building blocks for industrial transformation.
In the second half, we focus on fog computing, providing solutions to critical challenges and as an
enabler for IIoT application domains. Finally, open research challenges are discussed to enlighten fog
computing aspects in different fields and technologies.
Keywords: Industry 4.0; Internet of Things; Industrial Internet of Things; Cyber Physical
System; cloud computing; fog computing; edge computing; smart devices; smart factory;
industrial automation
1. Introduction
Revolution in any realm is required with the passage of time. Every field changes to go forward
with better solutions dealing with the challenges of the era. Industrial Internet of Things (IIoT) is
revolutionizing the classical communication methodologies. With the emergence of smart devices
(mobile, machines, sensors) coupled with a diverse range of applications requirements, IIoT is the
way forward. It is expected that 26 billion IoT devices of heterogeneous capabilities will be installed
to perform functions with different Quality-of-Service (QoS) requirements by 2020 [1]. IIoT gives
rise to 4th industrial revolution based on Cyber-Physical Systems (CPS) with the need arising back
in 2015 originated basically in Germany [2]. Industry 4.0 defines diverse use cases ranging from
interconnected digital technologies, CPS, Mobile Cloud Computing (MCC) and Internet of Things (IoT)
for promoting the whole industry in terms of efficiency, effectiveness, supporting heterogeneous data,
higher production, automation, and integrating knowledge [3]. These key enabling technologies have
been deployed to some extent in industrial domains such as healthcare, transportation, smart cities,
micro-grids, and smart factory. This trend gives rise to intelligent, distributed and self-organizing
solutions to support these application domains.
Deploying industry 4.0 involves three-layer implementation; physical layer, network layer, and
intelligent-application layer [4]. The physical layer comprises identification and location awareness
entities i.e. actuators, sensors, and terminal devices; the network layer comprises of the development
of a network that can support industrial automation, network can be cellular, indoor, cloud or
private. Factory automation and coordination are processed on the application layer. Infrared (IR),
Radio-Frequency Identification (RFID), Bluetooth, 6LoWPAN, IEEE 802.11 af, IEEE 802.11 a/b/n/ac
for short range connectivity; Ultra-Wideband (UWB), cellular (2G, 3G, 4G, LTE-MTC, 5G), Sigfox, Long
range (LoRa) for long range connectivity, are a few of the majorly used communication standards for
IIoT [5,6].
The future of automation is based on decentralized intelligence in which all machines
can communicate with one another to arrive at independent or consensus inference, called
Machine-to-Machine (M2M) communication. These decentralized intelligent solutions play a vital
role in industry 4.0 digital transformation. The decentralized solutions provide flexibility and quick
decision assistance over centralized solutions. For M2M communication, 802.11ah technology has
evolved in the recent past. Exchanging machine data demands real-time communication ensuring
latency, security, reliability, bandwidth and privacy measures in all IIoT domains. To satisfy these
critical requirements, there is a need to explore new enabling solutions that support these applications.
In the future, 5G cellular technology will support such heterogeneous networks with massive number
of IIoT devices. It is anticipated that future 5G networks not only provide flexibility but can optimize
the usage of available resources of bandwidth, power, energy, connectivity to different applications at
the same time [7].
In the last decade, computation and processing requirements of end users have increased
exponentially. It has become increasingly challenging for designers to scale the processing and
data storage capabilities for users within the given device size and battery constraints. To meet these
growing requirements, researchers have come up with the solution to offload services to a centralized
location known as the cloud. Cloud computing is an alternative for data computation, storage
and management. It supports intensive computation and manages heterogeneous devices of next
generation networks [8–10]. Additionally, cloud computing architecture involves the direct connection
between devices and the cloud server. Practically, we are beginning to understand the connection
between and the enormous number of IIoT devices and a single cloud server. However, cloud-based
systems are unable to meet the requirement such as heavy data computation, real-time device
control, security and management results in insufficient support of IIoT application requirements [11].
Considering a wide variety of IoT scenarios, some of the challenges [10–16] in cloud computing are
listed below:
• Large distance between the cloud and edge devices causes propagation and transmission delays.
• Large computational load on a single cloud server causes processing and queuing delays.
• Increased number of smart devices has hindered meeting the bandwidth requirements.
• Enormous number of smart devices will bring scalability, speed, and computational issues.
• Wireless medium between cloud and smart devices brings resource management issues.
• Heterogeneity property of smart devices in terms of accessing technology will bring difficulty in
handling at the cloud.
• Mobility of IoT devices bring service availability issues, cloud server may not be able to provide
services due to network congestion and failure.
2
Sensors 2019, 19, 4807
• Security is a very critical thread, as the cloud is exposed to the whole world over the public internet.
• Computing offloading every-time at cloud causes a loss in energy and battery lifetime.
• Although data storage at cloud brings benefits to application developers, they should be careful
of integrity and authentication demands of IIoT applications.
• Cloud computing is a centralized and complex architecture for real-time applications of IIoT.
All these limitations require a change, how and where we process data. These challenges motivate
us to explore new decentralized approaches/solutions in IIoT domains. A new concept of fog
computing is introduced by Bonomi et al. [15] for handling data locally at the network edge in
order to overcome the limitations of cloud architecture. Fog computing complements existing cloud
architecture and has addressed the issue of latency and bandwidth efficiency [17]. Because of its
distributed architecture, it calls for a strong check on QoS requirements to make it useful. Fog is
mainly based on distributed networking with ubiquitous pervasive computing. It comprises small
scale data centers or a group of computers known as cloudlets (fog clouds) that provide services to
devices located in close proximity [17,18]. The initial installation cost, latency, and energy consumption
is far less as compared to that of the cloud, but the operational cost varies. Fog architecture can
leverage computations either from dedicated edge servers or adhoc infrastructure. For promoting IIoT
architecture with fog computing as a key enabler technology, a group of fog clouds can also be used.
In fog computing, data processing in single server (fog cloud) helps in achieving real-time and
reliable communication. It puts the safety and security of personal data back into our premises.
Furthermore, a cost effective approach can be used in fog computing such that data transmission
and storage fees can be reduced based on service premises. Therefore, fog computing has the
potential to provide affordable solutions for large IIoT projects. Instead of being restricted to only
one expensive cloud connection, fog computing gives the freedom to choose any hardware from
Information Technology (IT) solutions. It supports all existing legacy devices and non-IIoT devices that
never intended to be the part of IIoT application. This is not only economical but also more flexible.
When it comes to speed, fog computing allows real-time processing and supports to process data
as fast as our local system. Fog can be managed securely from remote places. It can be scaled and
updated dynamically. It gives more security, better performance, and lower costs. Fog incorporates
positive attributes of cloud and provides benefits that may support future IIoT applications [18–23].
Fog computing and edge computing being extended form of cloud computing gives solutions to
the challenges faced by cloud computing that is attractive for IIoT real-time applications. The terms
fog computing and edge computing are often used by industry interchangeably. Both these computing
technologies bring computing and processing capabilities near the vicinity where data originates.
Edge computing complements fog computing by bringing computation to one of the devices of a
network. This device is named as E-node and is close to the data. E-node has more power, computation
capabilities and intelligent controllers, such as programmable automation controllers (PAC). Presence
of E-node in edge computing improves latency, reliability, security and privacy issues [24,25]. E-node
acts as an interface/bridge between the data sources and the cloud. The basic architecture for fog
network is given in Figure 1 depicting fog cloud serving as a middle layer between the cloud server and
smart end-devices. Figure 1 demonstrates a basic idea of cloud, fog and edge computing promoting
different IIoT application domains.
Fog is a relatively new paradigm that brings new challenges in terms of efficient and scalable
network architecture. It is expected that it will gradually develop over the next few years for realizing
the Industry 4.0. Challenges, such as energy conservation, real-time communication, efficient spectrum
use, cache memory on edge devices and optimized allocation of resources are open issues that need
to be addressed for future automation. Without such considerations, guaranteed QoS requirements
of IoT devices may not be fulfilled. In the future, solutions to these challenges must be provided by
researchers for the development of the industrial revolution. This paper is written with an aim to
give a summarized version of existing solutions using fog computing acting as an enabler for IIoT
applications.
3
Sensors 2019, 19, 4807
Figure 1. Generalized view: IIoT application domains with cloud, fog and edge computing.
The paper is organized as follows; Section 2 briefly introduces IIoT. Benefits of IIoT applications
in daily life and their critical requirements are briefly explained in Section 3. Section 4 presents
protocol/solution proposed by various researchers promoting fog computing as an enabling technology
for IIoT development. Section 5 describes challenges and solutions in communication and networking
proposed in the literature to use fog computing in IIoT. Section 6 lists down several open research
issues in fog computing. Finally, the paper is concluded in Section 7. The flow of this survey paper is
shown in Figure 2.
4
Sensors 2019, 19, 4807
Industry 1.0: At the end of the 18th century, the 1st industrial revolution started with the help
of water and steam power, which systematizes the factory floor. First, the mechanical weaving loom
was established in 1784, and the first mechanical system was built thorough mechanical production
facilities.
Industry 2.0: In the beginning of the 20th century, the 2nd industrial revolution started
using electrical energy. The first assembly line using electrical energy was established in 1870.
The introduction of mass production in industry 2.0 enhanced the industry.
Industry 3.0: Beginning of the 1970s i.e., in 1969, the first control system using programming
language was established. Industry was slowly shifted to automation using information technology
and micro-electronics’s applications. This is the 3rd industrial revolution [26].
Industry 4.0: This previous industrial revolutions give rise to the development of industry
4.0. Industry 4.0 contributes a revolution to all domains comprising economic, academic, research,
industrial and manufacturing sectors. There is a huge impact of the industrial revolution on
the manufacturing processes of many fields. Implementing industry 4.0 demands change in
many technologies namely automation, identification, computer, network communication, digital
manufacturing, production process, production control management, decision making, judgment,
sensing and analysis [27]. In the future, the manufacturing industry is expected to change on a large
scale because of all new generation networks and interfaces offered by the environment of industry
4.0. This transformation is already in process in many industrial sectors. Up till now, for the fourth
industrial revolution, exponentially growing technologies are sensor technology, artificial intelligence,
5
Sensors 2019, 19, 4807
machine learning, robotics, nanotechnology, and 3D printing [28]. These technologies were invented
decades ago, but their minimum cost and exponential growth will shape industry 4.0. To change the
industrial process, researchers are focusing on providing the evolved form of these technologies in
terms of flexibility and fast computational process. All this automation in industry is very important
for the economic growth of a country.
6
Sensors 2019, 19, 4807
the form of a Venn diagram. The similarities between the two give support for the development of
Industry 4.0/IIoT.
7
Sensors 2019, 19, 4807
The layered architecture of Industry 4.0 is given in Figure 3, which involves the common attributes
of CPS and IoT. The physical or sensing layer should be designed to the extent that IIoT applications
can sense/control information from physical environment and integrates with hardware sensors and
actuators accordingly. The second layer should be optimized to provide a reliable connection to
support data transfer over a communication medium (wired/wireless). So far, IIoT applications used
wired medium to provide solutions. In the near future, the wireless medium is required because of
shifting from centralized to decentralized solutions. Connectivity technologies, such as NB-IoT/5G
and beyond 5G over different architecture such as SDN, NFV, cloud computing or fog computing will
give solution to different applications. The intelligent-application layer, providing services to users
has to be optimized in terms of service production, satisfaction, interaction, and management.
8
Sensors 2019, 19, 4807
For connecting IIoT devices, all technologies have to work with the objective of maximum
throughput, minimum power consumption, minimum transmission delay, and maximum transmission
distance range. 2G, 3G, 4G, LTE are cellular technologies that were used for long range connectivity
in wireless wide area networks (WWAN). IIoT application’s critical requirements and the increasing
number of smart devices need additional resources for connectivity. Increase in smart devices results
in more data processing for which connectivity technology is moving towards 5G. The 3rd Generation
Partnership Project (3GPP) proposed Extended Coverage-Global System for Mobile Communications
for the Internet of Things (EC-GSM-IoT) and Narrowband-Internet of Things (NB-IoT) for supporting
M2M, enhanced MTC (eMTC), massive MTC (mMTC) and critical MTC (cMTC) communication
networks for IIoT applications [5]. 5G cellular technology gives super low latency, ultra-reliable and
high availability to cMTC applications (industrial application and control, remote surgery, remote
training, remote manufacturing, and traffic safety and control). Low cost, low energy, and the massive
number of intelligent devices in smart agriculture, smart meter, tracking, fleet management, and
logistics domain are supported by 5G as well. 5G is beneficial for IIoT applications comprising from
mMTC, cMTC to enhanced mobile broadband. The distributed model of IIoT applications require a
massive amount of data rate with minimum latency, 5G technology gives 10 Gbps with 1 ms latency.
5G is use case driven communication technology for upcoming IIoT applications.
For distributed ultra-low-latency and reliable connectivity in IIoT applications, 5G-IoT is an
emerging solution. 5G-IoT scenario extends capabilities of IoT smart devices used in all domains.
Recent research is focusing on low-latency, end-to-end reliability, and low energy consumption for
both uplink and downlink communication. There is a lot of potential in research on IIoT with
5G communication technologies, to overcome challenges. This research will help in the industrial
revolution. With the evolution of Industry 4.0, 5G is rapidly evolving in order to meet the requirement
of IIoT applications mainly real time functioning, energy efficiency, less power consumption, shared
spectrum regulation, reliable communication, and handing massive amount of data. Almost 90% of
needs met using fixed line 3G and 4G cellular technologies, but need for deployment of industrial
revolution can be fulfilled using 5G. 5G as an enabler of industry 4.0 gives multi-channel, capability,
multi-network management, operating both local and global networks, supporting heterogeneous
networks [27]. Mobile computing and cloud computing brings accurate data for IIoT application and
provide efficiency to industry 4.0 infrastructure. Details of cloud computing in comparison with fog
and edge computing is explained in the next section.
9
Sensors 2019, 19, 4807
2.5.2. Big Data and Analytics, Horizontal and Vertical System Integration
Different systems, ranging from customer to enterprise-level systems, have to collect, manage
and evaluate the big amount of data. Three main goals of big data analytics result in the reduction
of cost, efficient decision making and emerging new services and products. Industry 4.0 involves
digital transformation in vertical and horizontal value chain networks. These networks result in
the integration of customer and enterprise systems of companies, departments and business market-
exchanging data. These value chain processes should be transparent and flexible with real-time
functioning constraint.
2.5.5. Cyber-security
Exponential increase in connections among devices in industry 4.0 will increase threats to systems,
networks, and processes. Cyber-security is a process that prevents unwanted intruders from accessing,
destroying, interrupting or changing sensitive information about company/organization as well as
business market networks; gives them secure and reliable communication systems.
• Confidential data and personal information of an industry should not be shared with outsiders.
• Security and privacy are in high demand by an industry from the cloud service provider.
• Data location on the basis of geographic follows rules and regulations. It also helps in securing the
information.
• High load demands high-speed internet connectivity. This processing causes delays in communication.
• Memory and storage capacity may get exhausted because of many applications simultaneously
accessing a single cloud server.
• Context awareness is required for speedy processes.
• Different standards cause problems in exchanging data, information, services, and applications
among different clouds at different locations.
• Recovery and back-up update are required for industrial processing and decision making, cloud
computing will cause delay.
10
Sensors 2019, 19, 4807
and intelligence control to the proximity of data devices. Inside industry 4.0, there is critical
requirement of real-time services with high data processing, maximum capacity and scalability. Fog
computing gives the best solutions for such an environment because of its significant benefits over
cloud computing. Extension of cloud computing, aims to minimize the burden on the cloud by
introducing network edge computing concept.
For industrial automation, real-time services and decision making processes require low latency
and enhanced cache memory. Required performance parameters are mobility, real time applications,
low-latency, location-awareness, number of nodes and cache-enabled edge devices on this basis of
geographical distribution. Virtualized nodes frequently known as cloudlets or fog nodes are placed
between clouds of internet and end user devices. Fog computing provides services and applications as
a cloud does with better QoS parameters performance covering critical requirements of IIoT. Important
advantages of fog computing that influence its use for IIoT are:
• Data storage on network edge nodes eliminates the transmission delay by removing the need for
accessing data from far-away clouds.
• Fog computing supports to process and analyze the data on faster speed for IIoT applications.
• Data storage on edge nodes will reduce the processing and computing delay.
• Cache enabled nodes will prevent transmission of irrelevant information over the network.
• Can give support to all IoT applications e.g., smart grids, smart cities, D2D, Vehicular Ad-hoc
networks (VANETS) using edge networking concept.
• Provides filtered and required interaction between end devices and cloud service providers.
Fog computing is the building stone to provide solutions for more efficient, effective and
manageable communication way for the massive number of smart IoT devices in the near future. Fog
computing with extra features as compared to cloud computing in terms of latency, security, location
awareness, location, and number of server nodes, real-time connectivity and mobility is a promising
enabler for industrial automation.
IIoT applications have critical communication requirements. Cloud computing, fog computing,
and edge computing platforms need to be optimized for better, efficient results. Cloud computing can
be used where there is no high requirement of real-time connections, privacy, and security. On a local
area network, fog computing uses a centralized system which interacts between the network and
cloud server, whereas edge computing does computation on embedded systems of the network.
Edge computing has direct interaction with sensors and actuators. The need for cloud, fog and edge
computing architectures is increased with the growth of the IIoT application. To increase the use of
IIoT smart devices, researchers are focusing on fog or edge computing paradigms which results in
industrial development.
11
Sensors 2019, 19, 4807
3.1. IIoT-Applications
From the identification of faults to solutions via communication and networking technologies,
every step needs to be optimized and has research potential. Possessing attributes of intelligence,
reliability, safety, sustainability, privacy, and efficiency; these applications are called smart in the
literature. This revolution results in the development of new infrastructure. According to [37], smart
city, smart factory and smart product are the main applications of industry 4.0.
12
Sensors 2019, 19, 4807
M2M communication, in which machines communicate with each other over the Internet. Developing
and manufacturing industry, communication of intelligent machines with each other using different
technologies depending on the coverage area, give rise to high production and self-regulation of the
manufacturing process in an industry. These are the goals of industry 4.0; all this is assured by IT
systems as they provide enabling smart technologies. The integration of these heterogeneous devices
in a network with other devices and existing communication technologies is also the main requirement
for designers. Every IIoT application has critical design goal requirements to improve QoS in providing
solutions. These design parameters are:
• Energy & Long Battery Life: Overall network energy should be preserved for better and efficient
outcomes. Smart devices should have enough battery storage so that they can use for long time.
• Latency: Some IIoT applications are time-sensitive, a bound should be there to limit all types of
delays including processing, propagation, transmission, and computation.
• Throughput: Amount of data for processing is different for different applications. It should
satisfy the application requirement.
• Network Topology: How the number of servers (cloud, fog, e-node) and smart devices are placed
in a network for better QoS requirements.
• Reliability: Solutions by IIoT applications demand reliable real-time connectivity.
• Security, Safety & Privacy: These are very demanding and major requirements for all IIoT
applications. For example, inside a smart factory there should be privacy and security such that no
one can access the private information. For healthcare applications, patient’s information should
be safe and not easily accessible and changeable. 3A’s; Authentication, Access, and Authorization
are steps involved in the strictly secure system. The demand of end to end communication in IIoT
applications requires privacy of data as well. Sensors and actuators should be safe from intruders
as well as environmental hazards.
• Low Cost: Smart devices used for IIoT applications should be low cost so that doesnt affect the
CAPEX/OPEX. Deployment involved in industry 4.0 should not be so much that will cause loss
in marketplace.
• Long Coverage: A device should be capable enough to cover the desired range.
• Standardization: So far, there is no such network standardization and is an open challenge
for researchers.
• Integration: IIoT applications are composed of heterogeneous devices and hybrid networks, there
are a lot of issues in integration.
• Communication/Enabling Technology: Communication technology for supporting IIoT
application should provide assured performance services.
• Device Maintenance: Heterogeneous device in an industry 4.0 environment, require constant
device management as devices are connected with each other and the Internet. Software Defined
Networking (SDN) is used for such failure and changing maintenance issues of devices.
• Monitoring Network: Wireless, environmental and mobility nature may cause a change in
network topology which requires the system to be monitored and managed frequently.
• Configuration & Management of System: Self-configurable, self-control, reconfiguration
functionality in addition of new devices in network.
• Traffic congestion & Overload: Smart devices will be increased with time in any IIoT application.
System should be able to adjust according to the traffic burden and data requirement.
• Mobility: IIoT applications, such as transportation, inside industry and healthcare devices, have
the property of mobility from one place to another.
• Scalability: Scalability brings many issues, some are: How many numbers of smart devices are
enough to support an industrial application environment? or how many devices are served by a
server easily? how to optimally design a system under energy/spectrum issues?
13
Sensors 2019, 19, 4807
• Heterogeneity & Interoperability: Heterogeneous smart IIoT devices have to communicate and
collect information among themselves and the Internet. This integration is an issue to solve.
Standardization is required for interoperability of IIoT devices.
• Performance: There is always a performance trade-off among these QoS requirements. There
should be an optimized, supportive, and efficient trade-off among the factors affecting
performance. Performance maintenance solutions are required for future automation.
14
Sensors 2019, 19, 4807
15
Figure 7. Industry 4.0, IIoT applications versus cloud and fog computing.
Sensors 2019, 19, 4807
Because of architecture complexity, the cloud can only be operated by technical experts while
fog can be managed and operated by little human effort. Large companies control cloud networks,
while fog can be controlled by small as well as large companies. Low-latency critical IIoT applications
will be handled by fog, while applications that can tolerate large delays leverage the cloud services.
Internet connection between user IoT devices and a cloud server should be reliable for the entire time
of connection, while in fog architecture connection with cloud is not necessarily required for the whole
time. Bandwidth requirement increases for both frameworks as the number of IoT devices is increasing
exponentially. It provides awareness property, which means it knows about the requirements of
customers and will provide solutions accordingly. It can be placed anywhere between the cloud and
user nodes according to the demands. Performance and efficiency parameters of IIoT application
services can be enhanced using fog framework. In addition, the scalability issue can be handled
using it. Data storage at network edge will result in minimization of service delays and supports
real-time processing. The big amount of data produced from heterogeneous smart devices requires
huge data storage and computation at the cloud server. IIoT applications requires data storage at
their backbone. This big data is giving rise to edge computing for future. Edge computing is also
called Mobile Edge Computing (MEC). This technology supports IIoT applications by building better
operational connectivity. It brings cloud computing capabilities at the devices that are present on the
edge of a network, these devices named as edge servers or edge devices. The edge devices are part of
the Internet and participate in processing and computation near the data location. This technology is
an industrial initiative by the European Telecommunication Standards Institute (ETSI) [41].
4. Protocols/Algorithms
Protocol is a basic set of rules that defines how communication happen between different devices
in a network. Protocols have to be devised intelligently in order to achieve the defined goals.
As the future is industrial automation in industry 4.0 revolutionized era, there is an exponential
increase in smart, intelligent devices in IIoT applications. A major requirement is that the emerging
network protocols must meet required goals in performance affecting parameters, such as energy
efficiency, latency minimization, spectrum efficiency, cache memory maximization, and bandwidth
use requirements. A summarized discussion on pre-existing protocols in the context of fog computing
proposed by researchers is given below in following subsections.
4.1. Routing
Dong et al. [42] have introduced redundant fog loops for WSNs. The proposed fog loop-based
scheme has two main steps. Creation of fogs using loop paths is the first step, while the second
mechanism creates fog nodes in the source node areas along with many other interfering fogs within
the network. This proposed scheme has helped in finding the exact location of the source node
in terms of energy efficiency and privacy. Results were compared to the efficiency offered by the
Phantom Routing Scheme (PRS). The proposed scheme gives improved efficiency by 4 folds and can
also improve the privacy and security up to 8 folds.
Since fog computing lowers latency and offers energy saving, they are tailor-made for dealing
with WSNs [43]. Sensors in WSNs are resource-constrained, therefore energy efficiency is an important
issue. It needs to be addressed for the network to increase network life-time of operation and working
efficiently for a prolonged period of time. Sensors in a form of clusters collected data and send to the
base station using energy-efficient routing protocols. In this approach, using multi-hop communication,
data is transferred to the sink/destination node. The nodes acting as a cluster head are used for
multi-hop communications. For networking, apart from the routing problem, another issue that
needs to be catered is increasing network lifetime. Network lifetime can be effectively increased by
optimizing energy and power consumption at nodes. Some examples of these routing protocols are
Low-Energy-Adaptive-Clustering-Hierarchy (LEACH) and Stable-Election-Protocol (SEP). LEACH
protocol involves Deterministic Cluster Selection Head and abbreviated as LEACH-DCHS [44].
16
Sensors 2019, 19, 4807
Handy et al. [45] have proposed LEACH in which rotation of the cluster heads in a randomized
manner is used for energy distribution to the nodes evenly. These algorithms haven t been used for
fog computing yet, but can be used in future incorporating fog computing. SEP was proposed by
Smaragdakis et al. [46], prolongs the period of stability of wireless sensor networks. A modified
version of SEP (M-SEP) proposed by Singh et al. [47] is suitable for heterogeneous WSNs. Some of
the nodes in this approach might have a greater chance of getting selected as a cluster head and have
more energy. Moreover, in large WSNs, the data to be processed from heterogeneous devices is in
large volumes. Processing time is significantly large, so an alternate approach is to use fog computing.
The time required to process large amount of data gets considerably reduced using fog as the sensors in
the network get interconnected with the Internet in order to make smart by making them autonomous
in making decisions.
Another routing protocol that is energy-efficient named as new-SEP is proposed by
Naranjo et al. [48], prolongs the stability of sensor networks supported by fog more than SEP.
Optimal clustering nodes are elected by considering various sensor node features such as the ratio
of heterogeneity in the network, residual energy, distance between cluster heads. Results were
compared with baseline schemes of LEACH and SEP, the proposed scheme performs better in terms
of energy-preservation and network lifetime. Considering increasing the network’s stability periods,
N-SEP performs better than LEACH (50 percent) and SEP (25 percent). An efficient route optimization
algorithm was presented in [49] to address the mobility control issue in fog-based SDN networks.
The proposed SDN-enabled fog computing architecture had three-layered structure namely, fog layer,
network layer and application layer. Results showed that there is a great improvement in network
performance. A three-layered plane architecture was proposed to generate efficient routing paths
by the authors in [50] for data-center-based heterogeneous networks, using tensor decomposition
methods. These three planes do three different tasks, edge plane considers the traffic, bandwidth and
delay requirements; fog planes computes and controls the available paths and finally cloud plane do
the routing.
17
Sensors 2019, 19, 4807
could be divided into clusters on basis of respective objective functions and accordingly get resources.
Authors have provide two algorithms for LRRM 1 slice and LRRM 2 slice with an objective function of
maximizing high data rate and minimizing latency, respectively.
To meet low latency, high throughput and connectivity requirements in future RANs,
non-orthogonal multiple access (NOMA) is a promising technique. Zhang et al. in [53] have formulated
a problem for maximizing the net utility under interference constraint for resource allocation problem
for NOMA-based FRAN system model. Results were compared with the conventional orthogonal
frequency division modulation (OFDM) technique. Madsen and Albeanu [54] discuss platforms
involving fog computing in which there is communication going on between the smart devices,
fog, and cloud. A model for internet applications in future is presented by Hong et al. [55] in
which applications are delay-sensitive and distributed geographically. For improving the rendering
performance of a webpage, Zu et al. [56] exploit information available only at the network’s edge.
Companies that want to deliver content such as Netflix uses fog computing to reach their geographically
distributed customers. As indicated by [57], ensuring significantly large streamed data to be delivered
in the proximity of the end-user (customer), is done using fog computing.
Minimizing the energy consumed in geographically distributed applications and resource
allocation using fog computing is discussed in [58] for video services. Size of fog nodes deployment
shows the application demand in that region. To maximize social welfare, some of the user data needs
to be controlled. Optimization on large scale is also possible using proximal and distributed algorithms.
The algorithm proposed gives a near-optimal solution.
18
Sensors 2019, 19, 4807
inefficient deployment of resources as it reduces the overall efficiency of the network. This results in
definite increase in power consumption. A low service block is preferred for maintaining lower latency,
which will otherwise be detrimental to the high-performance requirements of edge computing. Unlike
cloud computing, fog computing has a limitation of resources, which can be overcome if we allow
cooperation between various data centers. A cooperative scheme by Beraldi et al. [63] is proposed in
which data centers near the edge exchange processing requests and shares the load of highly loaded
data centers. The request arriving at a busy data center is forwarded to any other data center having
the request buffer partially filled. The proposed scheme maintains a threshold of requests with the
help of Markov Chains to make sure that load is equally distributed among all the data centers. This
leads to much-improved performance as lightly loaded data centers can absorb the burden of heavily
loaded ones during peak hours.
Full use of edge resources cannot be done by cloud computing polymerization calculation [64].
The edge devices are not part of the cloud computing, which is undesirable for delay-sensitive
requirements. Ningning et al. [65] have explored how fog computing can turn the nodes or edges
into virtual machines using Cloud Atomization Technology to improve on this problem. The authors
use graph partitioning for developing an efficient load balancing algorithm. Consequently, a flexible
network can be built by making fog networking possible after atomizing the cloud and eventually
reduce the cost of the system that were high before implementing the load balancing algorithm.
Deng et al. [66] investigate power consumption and transmission delay trade-off. Problem of workload
allocation is formulated to obtain the minimal power consumption subject to the constraint of service
delay. Three sub-problems result after the decomposition of the primal problem. Based on the
obtained results, it is shown that cloud performance is enhanced by using fog computing. Moreover,
latency is reduced and bandwidth can be saved by sacrificing some of the computational resources.
Computational clusters are formed on the basis of cooperation behavior between the Small Cells
(SC) to share computational resources. However, the cooperation is dependent upon many factors
such as resource availability, resource allocation, delay constraints of the application, distribution of
computational load and size of the cluster. The joint distribution of resources for the mobile end-users
and the cloud is the main objective problem of this framework.
All the data that is being frequently accessed by the edge devices is stored at the Radio Units (RU),
which considerably decreases the overall delay in the network of Fog-Radio Access Networks (F-RAN).
However, in such systems, the energy efficiency aspect has always been a matter of serious concern
due to the addition of extra smart components in the system. In [67], the authors have proposed a
novel scheme by designing a green network in which an efficient algorithm is incorporated to optimize
the selection of RU. Furthermore, the algorithm also jointly optimizes the formation of clustering
and beamforming while maintaining the QoS and balancing the load of each of active backhaul as a
measure of its capacity. While copying data from the database, edge devices may interfere with each
other. To avoid this mishap, data replication techniques are used for copying data electronically from
the main database where the data of all the users is hosted. Uniform distribution of data and processing
is crucial over the network which in turn helps in managing the large amount of data and workload
with efficiency. Fog computing not only helps in achieving higher efficiency, it also helps in balancing
load across distributed platforms and achieving higher energy efficiency due to fewer performance
bottlenecks. Verma et al. [68] have focused on making a network that is less dependent on cloud
computing and bringing the storage and processing capabilities near the edge devices. The results are
simulated with the help of CloudSim by testing different geographically separated servers and their
configurations and then make comparisons between cloud and fog computing for various attributes.
19
Sensors 2019, 19, 4807
technical challenges for future network development. A well-designed network architecture can
increase the sustainability and performance of the entire system. The journey towards industry 4.0
is on its way and until now there are no such standards, regulations, and certification to follow
them.Although fog becoming a developing key enabling technology for IoT architecture, it still faces
some issues while integrating into the current architecture. Complex software applications and
solutions are needed to achieve an efficient fog network. Fog network will be analyzed in terms
of key performance measurements, which are bandwidth use, energy consumption, low latency,
maximum throughput, and resource management. In this section, critical technical communication
and networking challenges in the context of fog computing for IIoT applications are listed. All of them
have potential for future work.
20
Sensors 2019, 19, 4807
and high computational power. Network’s complexity increases day by day, because of scalability
issues of smart objects supporting IIoT applications.
Virtualization has played a very crucial role in improving the overall efficiency of the data centers
and now research has also been done on how virtualization can help in fog networks. Virtualization
makes it easiest to deploy fog functionalities on an existing node (by isolating and securing fog services
in a virtual machine or container). It also helps in conserving energy by efficiently consolidating
the tasks on a single fog node. A comparison in terms of power consumption was studied in [69]
between C-RAN and F-RAN using network function virtualization (NFV) technology. The authors
have formulated a mixed integer linear programming (MILP) problem, results for F-RAN are 30%
more improved in terms of power-saving as compared to C-RAN.
Roca et al. [70] have developed a platform using Fog-Function Virtualization, which works
and builds on the concept of Network Function Virtualization (NFV) for multiple IoT applications.
This, further with the help of node constellation creation, helps in easy deployment and reduces
the cost considerably as less energy is required for running the system due to efficiently performing
virtualization. Task scheduling is necessary as it helps with the load balancing aspect of networking
and can provide services to multiple users. Cooperative games between the containers and brokers are
studied for energy-efficient task selection algorithm. Kaur et al. [71] have achieved efficiency with
the help of container-as-a-service (CaaS). Lightweight containers have been used which considerably
reduce the energy consumption by a container migration techniques. This kind of virtualization is
more cost-efficient for distributed architecture, where a large number of devices with different running
applications/processes can be allocated to resources efficiently. Results achieved by the authors prove
that the system is more energy-efficient.
Graph-Based Heuristic algorithms were proposed by the authors in [72]. Type of problem is the
integer linear programming (ILP) problem, the objective is to increase the energy efficiency under
association and capacity threshold constraints for hybrid cloud-fog RAN (CF-RAN) architecture.
Minimization of latency and power consumption is also addressed in the proposed system model.
Fog computing along with NFV gives excellent outcomes in terms of reducing latency and power
consumption. Energy can be saved by incorporating techniques, such as Message Queue Telemetry
Transport (MQTT) in a fog-based environment [22]. In this scheme, the number of transmissions is
reduced to save energy of the end devices. Using energy-efficient routing protocols is imperative
to achieve energy efficiency. MQTT supports sensor data in real time due to its many-to-many
communication nature. The concept of MQTT focuses on introducing another layer between the fog
and cloud with lower complexity. MQTT broker place is at the fog layer. The intermediate layer is
responsible for predicting the future measurements, and acts as a gateway for the upper layer. It helps
to offload the computationally expensive tasks from the cloud to save in the storage memory of the
fog server. This results in a reduced number of transmissions as the update only occurs in case of a
mismatch.
5.2. Throughput/Rate/Capacity
For network designing, a new paradigm known as Socially-Aware-Networking (SAN) has been of
major interest [73]. To achieve efficient performance, SAN brings the human behavior and CPS
together via intelligently designing of a network. This design should be adaptable as well for
all environments. The resources available to mobile devices differ depending on the models and
specifications. This resource availability results in a group of mobile devices that might be sufficient
in terms of processing and storage parameters. Group of some might not be self-sufficient. The best
solution to this problem is given by SAN and Fog-Radio Access Networking (F-RAN).
D2D communication comprises the direct sharing of contents among mobile devices. Direct
sharing is a key feature supporting D2D communication. For achieving efficient performance results,
an imperative design of network embedded with all technologies is required. Research has shown that
the system performance in terms of utility, throughput and energy efficiency is maximized using the
21
Sensors 2019, 19, 4807
download mode with the help of branch and bound algorithm [74]. Klas et al. [75] and Cau et al. [76]
worked on improving network efficiency Mobile Edge Computing (MEC). MEC is a domain under
fog and focuses on providing cloud computing capabilities near the edge of network. Efforts and
improvements have been made in MEC in order for it to support 5G communications. Another target
of MEC is to achieve access to information provided by the radio network for application development
and distribution of the content. It is predicted that data traffic over mobile devices will increase
manifold in the next few years. Such increasing needs must be satisfied using efficient mechanisms.
A reliable service with an extremely low latency (URLLC) and high capacity is the foremost
requirement of IIoT networks. Throughput maximization of the F-RAN system is compared with three
different back-haul strategies for Small Cell Networks (SCN) in [77]. All these strategies namely, decode
and forward, direct transmission and C-RAN were studied under delay threshold, rate constraint, and
backhaul and fronthaul links. The authors proposed iterative algorithms for all strategies. For F-RAN,
Pontois et al. in [78] formulated a non-convex optimization problem under fronthaul constraints. A
hybrid semi-distributed resource allocation algorithm was proposed by the authors for the proposed
weighted sum-rate maximization problem. Results show that there is a trade-off between maximum
throughput and system latency. A multi-objective optimization problem was proposed by the authors
in [79]. They have proposed three parallel algorithms to improve latency, throughput and resource
management. A queuing model was studied under task buffering, offloading and resource allocation
algorithms. Lyapunov drift was used by the authors to design the resource allocation policy. In
results for better system performance, trade-off between latency and throughput is observed. [80]
end-to-end performance is guaranteed after composition of problem as Multi-Constrained Optimal
Path (MCOP). The authors propose a solution from the network architecture’s perspective and cloud
service relation. The proposed algorithm provides better results in terms of efficiency and effectiveness.
QoS parameters (capacity, delay and cost) gets improved by the proposed network-cloud service
provisioning system model.
22
Sensors 2019, 19, 4807
Shojafar et al. [86] propose a resource scheduler for Networked Fog Centers (NetFCs) that
not only provides services to the vehicular client but is also energy efficient. NetFCs operate from
vehicular network’s edge via Infrastructure to Vehicle (I2V) mobile links to the vehicular clients that
are being served. Not only does the overall computation and communication energy efficiency get
maximized but also the network performs better in terms of QoS requirements. Moreover, hard
QoS requirements induced by the application are met, such as reducing transmission rates, delay,
and jitter. Resource scheduler is responsible for admission control, dispatching the allowed traffic
using minimum energy and adaptively controlling the traffic that is being injected into the mobile
connections. Few of the important characteristics of the scheduler include providing QoS guarantees
induced by the application, implantation of the scheduler is both scalable and distributive.
5.4. Latency
Fog networking is a key paradigm to provide solutions to latency-sensitive future IIoT applications.
Many researchers have contributed to cater latency minimization problem. Online Fog Network
Formation Algorithm was proposed by Gilsoo et al. in [87] for minimizing the overall maximum
latency (communication and processing) of a fog network. The objective problem constitutes of the
sum of two types of delays i.e., fog network formation and task distribution. A joint energy and
latency optimization (JELO) scheme for F-RAN was proposed in [88]. The joint optimization of
energy consumption and latency was formulated as an integer-programming (IP) problem subject to
user association, capacity and latency threshold. The proposed complex problem was divided into
two sub-problems of knapsack and semi-assignment problem. The proposed algorithm gives better
results as compared to the existing techniques in the literature. A latency minimization problem was
formulated for IoT-fog network under user association, workload and latency threshold constraints.
The authors have proposed a matching-game theory for the proposed resource management problem
for network latency minimization [89].
Over the last few years, the Internet of Vehicles (IoV) has been a matter of growing interest.
Cloud computing provides high performing IoT services to IoV, still, there are many shortcomings
when it comes to mobility support, latency and location awareness. Xiuli Hi et al. [90] have
integrated fog computing into SDN. While fog Computing helps with the latency of the network, SDN
provides flexibility in the centralized control and providing the complete global knowledge of the
network. Vehicle to Vehicle (V2V), Vehicle to Infrastructure (V2I) and Vehicle to Base station (V2B)
communication can be supported by a weighted undirected graph having Road Side Units (RSUs).
The simulation results given by the aforementioned authors decrease the latency and achieve a higher
QoS. The scheme proposed by Skarlat et al. [91] tackles an optimization problem, providing a solution
that there is no trade-off between communication and using resources and energy for computation.
The applied system model demonstrates that in optimization scenarios, reduced average round-trip
time (RTT) and delays up to 39 percent can be achieved using fog. The scheme also considers an
independent cooperative number of working nodes.
For the smart city, Fairness Cooperation Algorithm (FCA) was proposed by Dong et al. [92], for the
joint optimization problem. The authors have formulated a convex-non-linear programming problem
of minimizing the total system cost (delay and energy consumption), subject to power, workload and
computation capacity threshold constraints. QoE and fairness of users under FCA was compared with
baseline algorithm (BA) and distributed optimization algorithm (DOA).
23
Sensors 2019, 19, 4807
problem at the backhaul link of F-RAN, authors have proposed a projection gradient method in [93].
To increase the throughput, they have used stochastic geometry to derive a close-form of successful
transmission probability (STP). Afterward, the optimal placement of cache over the network was
done. To fulfill the delay requirements, authors in [94] have proposed a decentralized asynchronous
coding caching scheme. The result shows that the proposed algorithm is more efficient than existing
algorithms present in the literature. A convex optimization problem of minimizing the worst-case
fronthaul delay was formulated by the authors. Depending on application delay requirements, the
proposed coded scheme gives synchronous and asynchronous transmission methods. The problem
of user association with a fog node on the basis of lower latency is formulated in [95]. The authors
have formulated the problem using game theory, for which they have used a proactive caching scheme
and Boltzmann-Gibbs learning algorithm for solution. Latency of proposed fog network is the sum of
computing and queuing delays.
Different researchers have worked on the F-RAN design considering various aspects. For a green
system, as discussed by Chen et al. [67,96], minimization of energy consumption is done by considering
an F-RAN that is cache-enabled for the selection of Remote Radio Head (RRHs). For balancing
front-haul traffic, Park et al. [97] have discussed a scheme to deliver data from Base Band Unit (BBU)
and RRHs. Content placement problem involving caching has been discussed in X Peng et al. [98] and
Dai et al. [99]. F-RANs accommodate caching in the road-side units. Di Chen et al. [100] have worked
on maximizing the Signal to Interference Noise Ratio (SINR) to ensure fairness while jointly optimizing
cluster formation and multicast beamforming. The objective function in this work has non-convex
constraints and is collectively an NP-hard problem. Sensor-cloud system gives solutions to many
applications in a smart city. The system was developed by the integration of CPS and cloud computing.
Besides many benefits, a major problem is coupling resource management, which was discussed
in [101]. They have introduced a fog layer between sensor and cloud layer, which emphasizes the
services. Firstly, authors have proposed an algorithm for caching at fog layer, afterwards, Hungarian
algorithm was extended to deal with the optimal use of resources on basis of maximum matching.
The proposed algorithms result in the minimization of latency for sustainable services.
24
Table 1. Literature Review: R.A=Resource Allocation, L=Latency, E=Energy, T/R/C=Throughput/Rate/Capacity, Cc=Cache, P=Power, H=Handover, B=Bandwidth,
S=Security, T.L=Transmission Link.
25
[84] Smart monitoring systems Downlink WSN+CPS
[85] Security Routing VN+Cloud Computing
[87] Heterogeneous IoT applications Downlink Cloud Computing
[88] Time-sensitive IoT applications Uplink RANs
[89] Heterogeneous IoT applications Downlink Cloud Computing
[93] Wireless network RANs
[94] Downlink RANs
[95] 5G network Downlink Fog-IoT
[103] Microgrid Downlink VM+Cloud Computing
[104] Security+Microgrids Downlink Cloud Computing
[105] Microgrid Downlink Cloud Computing
[101] Smart city Routing CPS+Cloud Computing
[92] Smart city Downlink Fog-IoT
[106] Multimedia Downlink Cloud Computing
[107] Secure and time saving multimedia Routing ICN
[108] Secure IoT applications Downlink D2D
[109] Downlink D2D+RANs
[110] 5G mobile network+V2G services Routing V2G
[111] VANETs IoT+ITS
Table 1. Cont.
26
Sensors 2019, 19, 4807
27
Sensors 2019, 19, 4807
number of smart devices results computation delays at cloud also it involves more power consumption.
This power consumption can be optimized after load balancing among fog nodes and cloud server.
Jalali et al. [134] have discussed various ways for the deployment of IoT nodes in an energy-efficient
way. The authors have used MGs and fog computing as an enabler with an aim to reduce the energy
consumption by the IoT specific applications. Energy consumption of various types has been discussed
i.e., energy consumed during computation and balancing traffic on fog as well as the cloud. Renewable
energy is stored in MGs, which can be used for further processing. Dynamic decisions such as weather
forecasting or renewable energy availability causes dependent energy-saving processes.
6.3. Multimedia
Multimedia communication involves a large amount of audio and video data, being produced
by smart IIoT devices. This ever-increasing amount of multimedia content brings new challenges.
Low-latency and energy-efficient solutions are required to provide services. A direct consequence of
increasing multimedia traffic is overburdening of the already strained mobile access network channels.
The essential components of a multimedia communication system can be visualized with the help of
Figure 1. The authors in [106], have formulated a cost minimization optimization problem, this cost
depends on scheduler decisions. Scheduler takes decisions regarding distribution and states (open or
close) of fog nodes. This cost minimization problem alternatively converted into multimedia user’s
(MMU) response time minimization problem under capacity, coverage zone area and association
constraints. The authors have introduced a fog node to resolve the resource management and latency
issues between cloud and MMUs. Using Stackelberg game, an online resource allocation scheme was
proposed. The enormous amount of data production for smart applications, need security and privacy
as well. The authors have proposed a chaotic cryptographic method to ensure security along with
low-latency requirements for Information-Centric Multimedia Network (ICMN) [107]. The speed of
encryption and decryption of multimedia streams in the cryptographic method, was enhanced using
fog computing.
28
Sensors 2019, 19, 4807
in the number of smart devices that causes scarcity in spectrum and resources. This idea gives rise to
D2D communication technology in which devices are part of the Internet and can communicate with
each other without the involvement of internet infrastructure. This direct communication will result in
less usage of the wireless spectrum. A device is itself constrained-bounded in terms of parameters, such
as energy or resources, hence cloud and fog computing technologies support them. These emerging
technologies enhance processing capabilities and result in efficient system formation. Cloud services
for D2D communications have performance bottleneck as devices use direct communication, hence
an alternative fog service is required. Fog with the same set of services, provide better performance.
Fog networking act as an alternative of cloud, as it provides desired requirements in the vicinity of
edge devices. Researchers have proposed D2D fogging to address energy-efficient task offloading in
D2D communication [137]. The proposed method includes a framework for task offloading and uses
assistance from the network for D2D. Mobile users use the communication and computation resources
of each other dynamically. After discussing several security issues in fog computing, authors have
proposed three lightweight anonymous authentication protocols (LAAPs) [108].
The proposed scheme with the aid of D2D communication, is feasible for IoT devices which
are resource-limited. Li et al. [109] proposed a F-community architecture for F-RAN followed by a
data caching scheme. The caching scheme for UEs in D2D aided F-RAN helps in reduction of delays.
Nodes in the system with higher chances of being selected as the central nodes store the most popular
content in their cache. For access to any data, a user receives data from the cache stored previously.
Kaur et al. [138] have proposed cachinMobile, which, compared to the cloud, can meet the low latency
and energy efficiency requirements by using the elastic services provided by the nodes at the edge.
Energy efficiency and low latency requirements is a major issue in this technique as the resources at
the edge and the devices that are mobile. This approach has proposed to use D2D communication
to carry out communication at a short distance and save network resources. CachinMobile not only
improves energy efficiency but also maintains QoS.
29
Sensors 2019, 19, 4807
latency for time-sensitive applications using fog computing. Being an integral part of the ITS, VANETs
have many applications. Computation and communication demands are hard to meet in the cloud
architecture. Incorporating fog networking not only fulfills the demands but also improves latency,
location awareness and energy efficiency. For power management, there is a need for new technologies.
For this problem Vehicle to Grid (V2G) is a recent concept with open issues, that uses renewable energy.
When renewable energy is available it is used to charge plug-in electric vehicles. Otherwise, these
electric vehicles are used as the source of energy. The use of alternative energy source will reduce
the power burden on the grid during peak hours. Owners of these plug-in electric vehicles got paid
by electric companies using metering systems. It provides some relief to electric companies in terms
of payment, traffic load, and energy consumption during peak hours. In smart grids, a distributed
architecture with storage and processing capabilities is need to be deployed, as there is a high factor of
mobility in V2G. To implement the V2G services in the 5G network, a hybrid fog and cloud architecture
was proposed by researchers in [110]. Open issues, such as energy efficiency, resource management,
security, and privacy are needed to be addressed in the future to improve system efficiency. Security
is a big challenge in VANETS, fog computing integration is smart transportation brings solution to
this challenge. Ma et al. [111] have designed a new authenticated key agreement (AKA) protocol for
fog-based VANETs.
The authors in [112] compared fog and cloud computing performance in a real VANET
environment. Results shows that fog computing gives better services for real-time scenario applications,
namely traffic detection and time estimation. Fog computing performs well because it supports
the main attributes of VANETs that are location-awareness, mobility and real-time communication.
Integration of the Internet of Things with VANETs gives rise to Internet of Vehicles (IoV) is a matter of
growing interest over the last few years [139].
30
Sensors 2019, 19, 4807
priority based scheduling algorithm for classifying the traffic message type (emergency or safety
applications) and a classification algorithm to schedule the requests.
7. Conclusions
Industry 4.0, a revolutionized era which will have a massive number of smart devices that will
support IIoT applications in every field. This deployment of smart devices will change all domains of
human life’s perspective. IIoT applications will provide solutions to all fields, such as transportation,
healthcare, food supply chain, education, and industry. These IIoT applications will provide efficient,
effective solutions for future networks. There are challenges in communication and networking in
terms of latency, bandwidth, resource allocation, and storage.
All these advanced IIoT applications will create a huge amount of data, causing a burden on the
cloud. Even though cloud computing provides services to the edge devices, it incurs huge latency,
resource allocation challenges, caching placement problems, energy consumption. These issues are
detrimental to the QoS aspect of a network. Fog as an extension of cloud provides a platform to
compute, control, store and manage these IIoT devices. In the future, it will reshape all sectors
involving IIoT applications, with the integration of important existing communication technologies
namely, CPS, SDN, NFV, 5G, D2D. This brings computation, resource management, and storage
challenges. In this paper, first, we gave an overview of IIoT applications and its enabling technologies
used for new revolutionized era. The pre existing protocols and solutions to challenges related to fog
computing are summarized. In the end, we have mentioned open research IIoT domains, in which fog
computing can act as an enabler. We have previewed the work carried out by numerous researchers
incorporating fog computing to provide services to IIoT edge devices leveraging towards Industry 4.0
way. Critical review of some existing work is summarized in the table, which can be used to find open
research challenges. Towards the development of this industrial transformative epoch, most of the
research work is still uncertain and waiting. This is an interesting era to discover what fog computing
may contribute to the world of automation in the coming future.
Author Contributions: R.B. is the main author for this survey article, who wrote the original draft.
M.A. (Mudassar Ali), S.Q., M.A. (Monther Aldwairi), M.I.A., and A.M. contributed in terms of conceptualization,
organization and validation of the article. A.M., M.G. and M.A. (Monther Aldwairi) also contributed to
acquire funds.
Funding: This work was supported by the Swedish Knowledge Foundation under Grant 20180178.
Acknowledgments: This work was supported by Zayed University Research Office, Research Cluster Award
# R17079.
Conflicts of Interest: The authors declare no conflict of interest.
References
1. Rivera, J.; Goasduff, L. Gartner says a thirty-fold increase in internet-connected physical devices
by 2020 will significantly alter how the supply chain operates. Gartner 2014. Available online:
https://www.gartner.com/en/newsroom/press-releases/2014-03-24-gartner-says-a-thirty-fold-increase-
in-internet-connected-physical-devices-by-2020-will-significantly-alter-how-the-supply-chain-operates
(accessed on 19 July 2019).
2. Roblek, V.; Meško, M.; Krapež, A. A complex view of industry 4.0. Sage Open 2016, 6. [CrossRef]
3. Thames, L.; Schaefer, D. Software-defined cloud manufacturing for industry 4.0. Procedia CIRP 2016,
52, 12–17. [CrossRef]
4. Varghese, A.; Tandur, D. Wireless requirements and challenges in Industry 4.0. In Proceedings of
the 2014 International Conference on Contemporary Computing and Informatics (IC3I), Mysore, India,
27–29 November 2014; pp. 634–638.
5. Akpakwu, G.A.; Silva, B.J.; Hancke, G.P.; Abu-Mahfouz, A.M. A survey on 5G networks for the Internet of
Things: Communication technologies and challenges. IEEE Access 2018, 6, 3619–3647. [CrossRef]
31
Sensors 2019, 19, 4807
6. Vangelista, L.; Zanella, A.; Zorzi, M. Long-range IoT technologies: The dawn of LoRaTM . In Future Access
Enablers of Ubiquitous and Intelligent Infrastructures; Springer: Cham, Switzerland, 2015; pp. 51–58.
7. Osseiran, A.; Boccardi, F.; Braun, V.; Kusume, K.; Marsch, P.; Maternia, M.; Queseth, O.; Schellmann, M.;
Schotten, H.; Taoka, H.; et al. Scenarios for 5G mobile and wireless communications: The vision of the
METIS project. IEEE Commun. Mag. 2014, 52, 26–35. [CrossRef]
8. Christensen, J.H. Using RESTful web-services and cloud computing to create next generation mobile
applications. In Proceedings of the 24th ACM SIGPLAN Conference Companion on Object Oriented
Programming Systems Languages and Applications, Orlando, FL, USA, 25–29 October 2009; pp. 627–634.
9. Buyya, R.; Yeo, C.S.; Venugopal, S.; Broberg, J.; Brandic, I. Cloud computing and emerging IT platforms:
Vision, hype, and reality for delivering computing as the 5th utility. Future Gener. Comput. Syst. 2009,
25, 599–616. [CrossRef]
10. Atlam, H.F.; Alenezi, A.; Alharthi, A.; Walters, R.J.; Wills, G.B. Integration of cloud computing with internet
of things: Challenges and open issues. In Proceedings of the 2017 IEEE International Conference on
Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber,
Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Exeter, UK, 21–23 June 2017;
pp. 670–675.
11. Ai, Y.; Peng, M.; Zhang, K. Edge computing technologies for Internet of Things: A primer.
Digit. Commun. Netw. 2018, 4, 77–86. [CrossRef]
12. Peter, N. Fog computing and its real time applications. Int. J. Emerg. Technol. Adv. Eng. 2015, 5, 266–269.
13. Aazam, M.; Huh, E.N. Fog computing and smart gateway based communication for cloud of things.
In Proceedings of the 2014 International Conference on Future Internet of Things and Cloud, Barcelona,
Spain, 24–29 August 2014; pp. 464–470.
14. Atlam, H.F.; Alenezi, A.; Walters, R.J.; Wills, G.B.; Daniel, J. Developing an adaptive Risk-based access
control model for the Internet of Things. In Proceedings of the 2017 IEEE International Conference on
Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber,
Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Exeter, UK, 21–23 June 2017;
pp. 655–661.
15. Bonomi, F.; Milito, R.; Zhu, J.; Addepalli, S. Fog computing and its role in the Internet of things.
In Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, Helsinki, Finland,
13–17 August 2012; pp. 13–16.
16. Wen, Z.; Yang, R.; Garraghan, P.; Lin, T.; Xu, J.; Rovatsos, M. Fog orchestration for internet of things services.
IEEE Internet Comput. 2017, 21, 16–24. [CrossRef]
17. Verma, M.; Bhardwaj, N.; Yadav, A.K. Real time efficient scheduling algorithm for load balancing in fog
computing environment. Int. J. Inf. Technol. Comput. Sci 2016, 8, 1–10. [CrossRef]
18. Fog Computing and the Internet of Things: Extend the Cloud to Where the Things Are. White Paper. 2016.
Available online: https://www.cisco.com/c/dam/en_us/solutions/trends/iot/docs/computing-overview.
pdf (accessed on 19 September 2019).
19. Atlam, H.; Walters, R.; Wills, G. Fog computing and the Internet of things: A review. Big Data Cogn. Comput.
2018, 2, 10. [CrossRef]
20. Chiang, M.; Zhang, T. Fog and IoT: An overview of research opportunities. IEEE Internet Things J. 2016,
3, 854–864. [CrossRef]
21. Liu, Y.; Fieldsend, J.E.; Min, G. A framework of fog computing: Architecture, challenges, and optimization.
IEEE Access 2017, 5, 25445–25454. [CrossRef]
22. Peralta, G.; Iglesias-Urkia, M.; Barcelo, M.; Gomez, R.; Moran, A.; Bilbao, J. Fog computing based efficient
IoT scheme for the Industry 4.0. In Proceedings of the 2017 IEEE International Workshop of Electronics,
Control, Measurement, Signals and their Application to Mechatronics (ECMSM), Donostia-San Sebastian,
Spain, 24–26 May 2017; pp. 1–6.
23. Bonomi, F.; Milito, R.; Natarajan, P.; Zhu, J. Fog computing: A platform for internet of things and analytics.
In Big Data and Internet of Things: A Roadmap for Smart Environments; Springer: New York, NY, USA, 2014;
pp. 169–186.
24. Agarwal, S.; Yadav, S.; Yadav, A.K. An efficient architecture and algorithm for resource provisioning in fog
computing. Int. J. Inf. Eng. Electron. Bus. 2016, 8, 48. [CrossRef]
32
Sensors 2019, 19, 4807
25. Ketel, M. Fog-cloud services for iot. In Proceedings of the of the SouthEast Conference, Kennesaw, GA, USA,
13–15 April 2017; pp. 262–264.
26. Georgakopoulos, D.; Jayaraman, P.P.; Fazia, M.; Villari, M.; Ranjan, R. Internet of Things and edge cloud
computing roadmap for manufacturing. IEEE Cloud Comput. 2016, 3, 66–73. [CrossRef]
27. Lu, Y. Industry 4.0: A survey on technologies, applications and open research issues. J. Ind. Inf. Integr. 2017,
6, 1–10. [CrossRef]
28. Camarillo, A.; Ríos, J.; Althoff, K.D. Product Lifecycle Management as Data Repository for Manufacturing
Problem Solving. Materials 2018, 11, 1469. [CrossRef]
29. Obst, M.; Holm, T.; Urbas, L.; Fay, A.; Kreft, S.; Hempen, U.; Albers, T. Semantic description of process
modules. In Proceedings of the 2015 IEEE 20th Conference on Emerging Technologies & Factory Automation
(ETFA), Luxembourg, 8–11 September 2015; pp. 1–8.
30. Li, B.; Zhao, Z.; Guan, Y.; Ai, N.; Dong, X.; Wu, B. Task Placement Across Multiple Public Clouds With
Deadline Constraints for Smart Factory. IEEE Access 2018, 6, 1560–1564. [CrossRef]
31. Chen, H.; Abbas, R.; Cheng, P.; Shirvanimoghaddam, M.; Hardjawana, W.; Bao, W.; Li, Y.; Vucetic, B.
Ultra-reliable low latency cellular networks: Use cases, challenges and approaches. IEEE Commun. Mag.
2018, 56, 119–125. [CrossRef]
32. Ladiges, J.; Fay, A.; Holm, T.; Hempen, U.; Urbas, L.; Obst, M.; Albers, T. Integration of modular process
units into process control systems. IEEE Trans. Ind. Appl. 2018, 54, 1870–1880. [CrossRef]
33. Vogel-Heuser, B.; Diedrich, C.; Pantförder, D.; Göhner, P. Coupling heterogeneous production systems by a
multi-agent based cyber-physical production system. In Proceedings of the 2014 12th IEEE International
Conference on Industrial Informatics (INDIN), Porto Alegre, Brazil, 27–30 July 2014; pp. 713–719.
34. Wan, J.; Tang, S.; Shu, Z.; Li, D.; Wang, S.; Imran, M.; Vasilakos, A.V. Software-defined industrial internet of
things in the context of industry 4.0. IEEE Sens. J. 2016, 16, 7373–7380. [CrossRef]
35. Gruber, F.E. Industry 4.0: A best practice project of the automotive industry. In Proceedings of the
IFIP International Conference on Digital Product and Process Development Systems, Dresden, Germany,
10–11 October 2013; pp. 36–40.
36. Vaquero, L.M.; Rodero-Merino, L. Finding your way in the fog: Towards a comprehensive definition of fog
computing. ACM SIGCOMM Comput. Commun. Rev. 2014, 44, 27–32. [CrossRef]
37. Stock, T.; Seliger, G. Opportunities of sustainable manufacturing in industry 4.0. Procedia Cirp 2016,
40, 536–541. [CrossRef]
38. Elliott, J.A. An Introduction to Sustainable Development; Routledge: Abingdon, UK, 2012.
39. Bibri, S.E.; Krogstie, J. Smart sustainable cities of the future: An extensive interdisciplinary literature review.
Sustain. Cities Soc. 2017, 31, 183–212. [CrossRef]
40. Schlechtendahl, J.; Keinert, M.; Kretschmer, F.; Lechler, A.; Verl, A. Making existing production systems
Industry 4.0-ready. Prod. Eng. 2015, 9, 143–148. [CrossRef]
41. Mouradian, C.; Naboulsi, D.; Yangui, S.; Glitho, R.H.; Morrow, M.J.; Polakos, P.A. A comprehensive survey
on fog computing: State-of-the-art and research challenges. IEEE Commun. Surv. Tutor. 2017, 20, 416–464.
[CrossRef]
42. Dong, M.; Ota, K.; Liu, A. Preserving source-location privacy through redundant fog loop for wireless
sensor networks. In Proceedings of the 2015 IEEE International Conference on Computer and Information
Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing;
Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), Liverpool, UK, 26–28 October 2015;
pp. 1835–1842.
43. Huang, L.; Li, G.; Wu, J.; Li, L.; Li, J.; Morello, R. Software-defined QoS provisioning for fog computing
advanced wireless sensor networks. In Proceedings of the 2016 IEEE SENSORS, Orlando, FL, USA,
30 October–3 November 2016; pp. 1–3.
44. Liu, Y.; Gao, J.; Jia, Y.; Zhu, L. A cluster maintenance algorithm based on LEACH-DCHS protoclol.
In Proceedings of the International Conference on Networking, Architecture, and Storage, 2008. NAS’08,
Chongqing, China, 12–14 June 2008; pp. 165–166.
45. Handy, M.; Haase, M.; Timmermann, D. Low energy adaptive clustering hierarchy with deterministic
cluster-head selection. In Proceedings of the 4th International Workshop on Mobile and Wireless
Communications Network, Stockholm, Sweden, 9–11 September 2002; pp. 368–372.
33
Sensors 2019, 19, 4807
46. Smaragdakis, G.; Matta, I.; Bestavros, A. Sep: A Stable Election Protocol for Clustered Heterogeneous Wireless
Sensor Networks; Technical Report; Boston University Computer Science Department: Boston, MA, USA, 2004.
47. Singh, D.; Panda, C.K. Performance analysis of modified stable election protocol in heterogeneous wsn.
In Proceedings of the 2015 International Conference on Electrical, Electronics, Signals, Communication and
Optimization (EESCO), Visakhapatnam, India, 24–25 January 2015; pp. 1–5.
48. Naranjo, P.G.V.; Shojafar, M.; Abraham, A.; Baccarelli, E. A new stable election-based routing algorithm to
preserve aliveness and energy in fog-supported wireless sensor networks. In Proceedings of the 2016 IEEE
International Conference on Systems, Man, and Cybernetics (SMC), Budapest, Hungary, 9–12 October 2016;
pp. 2413–2418.
49. Bi, Y.; Han, G.; Lin, C.; Deng, Q.; Guo, L.; Li, F. Mobility support for fog computing: An SDN approach.
IEEE Commun. Mag. 2018, 56, 53–59. [CrossRef]
50. Wang, X.; Yang, L.T.; Kuang, L.; Liu, X.; Zhang, Q.; Deen, M.J. A tensor-based big-data-driven routing
recommendation approach for heterogeneous networks. IEEE Netw. 2019, 33, 64–69. [CrossRef]
51. Du, J.; Zhao, L.; Feng, J.; Chu, X. Computation offloading and resource allocation in mixed fog/cloud
computing systems with min-max fairness guarantee. IEEE Trans. Commun. 2018, 66, 1594–1608. [CrossRef]
52. Sun, Y.; Peng, M.; Mao, S.; Yan, S. Hierarchical radio resource allocation for network slicing in fog radio
access networks. IEEE Trans. Veh. Technol. 2019, 68, 3866–3881. [CrossRef]
53. Zhang, H.; Qiu, Y.; Long, K.; Karagiannidis, G.K.; Wang, X.; Nallanathan, A. Resource allocation in
NOMA-based fog radio access networks. IEEE Wirel. Commun. 2018, 25, 110–115. [CrossRef]
54. Madsen, H.; Burtschy, B.; Albeanu, G.; Popentiu-Vladicescu, F. Reliability in the utility computing era:
Towards reliable fog computing. In Proceedings of the 2013 20th International Conference on Systems,
Signals and Image Processing (IWSSIP), Bucharest, Romania, 7–9 July 2013; pp. 43–46.
55. Hong, K.; Lillethun, D.; Ramachandran, U.; Ottenwälder, B.; Koldehofe, B. Mobile fog: A programming
model for large-scale applications on the internet of things. In Proceedings of the Second ACM SIGCOMM
Workshop on Mobile cloud Computing, Hong Kong, China, 12–16 August 2013; pp. 15–20.
56. Zhu, J.; Chan, D.S.; Prabhu, M.S.; Natarajan, P.; Hu, H.; Bonomi, F. Improving web sites performance
using edge servers in fog computing architecture. In Proceedings of the 2013 IEEE Seventh International
Symposium on Service-Oriented System Engineering, Redwood City, CA, USA, 25–28 March 2013;
pp. 320–323.
57. Rudenko, E. Fog Computing Is a New Concept of Data Distribution. Available online: https://xcluesiv.
com/fog-computing-is-a-new-concept-of-data-distribution/ (accessed on 19 July 2019).
58. Do, C.T.; Tran, N.H.; Pham, C.; Alam, M.G.R.; Son, J.H.; Hong, C.S. A proximal algorithm for joint resource
allocation and minimizing carbon footprint in geo-distributed fog computing. In Proceedings of the 2015
International Conference on Information Networking (ICOIN), Siem Reap, Cambodia, 12–14 January 2015;
pp. 324–329.
59. Ning, Z.; Huang, J.; Wang, X. Vehicular fog computing: Enabling real-time traffic management for smart
cities. IEEE Wirel. Commun. 2019, 26, 87–93. [CrossRef]
60. Mutlag, A.A.; Ghani, M.K.A.; Arunkumar, N.a.; Mohamed, M.A.; Mohd, O. Enabling technologies for fog
computing in healthcare IoT systems. Future Gener. Comput. Syst. 2019, 90, 62–78. [CrossRef]
61. Khattak, H.A.; Arshad, H.; ul Islam, S.; Ahmed, G.; Jabbar, S.; Sharif, A.M.; Khalid, S. Utilization and load
balancing in fog servers for health applications. EURASIP J. Wirel. Commun. Netw. 2019, 2019, 91. [CrossRef]
62. Abkenar, F.S.; Jamalipour, A. EBA: Energy Balancing Algorithm for Fog-IoT Networks. IEEE Internet Things J.
2019, 6, 6843–6849. [CrossRef]
63. Beraldi, R.; Mtibaa, A.; Alnuweiri, H. Cooperative load balancing scheme for edge computing resources.
In Proceedings of the 2017 Second International Conference on Fog and Mobile Edge Computing (FMEC),
Valencia, Spain, 8–11 May 2017; pp. 94–100.
64. Armbrust, M.; Fox, A.; Griffith, R.; Joseph, A.D.; Katz, R.; Konwinski, A.; Lee, G.; Patterson, D.; Rabkin, A.;
Stoica, I.; et al. A view of cloud computing. Commun. ACM 2010, 53, 50–58. [CrossRef]
65. Ningning, S.; Chao, G.; Xingshuo, A.; Qiang, Z. Fog computing dynamic load balancing mechanism based
on graph repartitioning. China Commun. 2016, 13, 156–164. [CrossRef]
66. Deng, R.; Lu, R.; Lai, C.; Luan, T.H.; Liang, H. Optimal workload allocation in fog-cloud computing toward
balanced delay and power consumption. IEEE Internet Things J. 2016, 3, 1171–1181. [CrossRef]
34
Sensors 2019, 19, 4807
67. Chen, D.; Kuehn, V. Adaptive radio unit selection and load balancing in the downlink of Fog radio access
network. In Proceedings of the 2016 IEEE Global Communications Conference (GLOBECOM), Washington,
DC, USA, 4–8 December 2016; pp. 1–7.
68. Verma, S.; Yadav, A.K.; Motwani, D.; Raw, R.; Singh, H.K. An efficient data replication and load balancing
technique for fog computing environment. In Proceedings of the 2016 3rd International Conference
on Computing for Sustainable Global Development (INDIACom), New Delhi, India, 16–18 March 2016;
pp. 2888–2895.
69. Zeng, Y.; Al-Quzweeni, A.; Elgorashi, T.E.; Elmirghani, J.M. Energy Efficient virtualization framework for
5G F-RAN. arXiv 2019, arXiv:1904.02481.
70. Roca, D.; Quiroga, J.V.; Valero, M.; Nemirovsky, M. Fog function virtualization: A flexible solution for
iot applications. In Proceedings of the 2017 Second International Conference on Fog and Mobile Edge
Computing (FMEC), Valencia, Spain, 8–11 May 2017; pp. 74–80.
71. Kaur, K.; Dhand, T.; Kumar, N.; Zeadally, S. Container-as-a-service at the edge: Trade-off between energy
efficiency and service availability at fog nano data centers. IEEE Wirel. Commun. 2017, 24, 48–56. [CrossRef]
72. Tinini, R.I.; Batista, D.M.; Figueiredo, G.B.; Tornatore, M.; Mukherjee, B. Low-latency and energy-efficient
BBU placement and VPON formation in virtualized cloud-fog RAN. IEEE/OSA J. Opt. Commun. Netw. 2019,
11, B37–B48. [CrossRef]
73. Xia, F.; Liu, L.; Li, J.; Ma, J.; Vasilakos, A.V. Socially aware networking: A survey. IEEE Syst. J. 2015,
9, 904–921. [CrossRef]
74. Zhang, C.; Sun, Y.; Mo, Y.; Zhang, Y.; Bu, S. Social-aware content downloading for fog radio access networks
supported device-to-device communications. In Proceedings of the 2016 IEEE International Conference on
Ubiquitous Wireless Broadband (ICUWB), Nanjing, China, 16–19 October 2016; pp. 1–4.
75. Klas, G.I. Fog Computing and Mobile Edge cloud Gain Momentum Open Fog Consortium, Etsi Mec and
Cloudlets. 2015. Available online: https://yucianga.info/wp-content/uploads/2015/11/15_11_22-_Fog_
computing_and_mobile_edge_cloud_gain_momentum_Open_Fog_Consortium-ETSI_MEC-Cloudlets_
v1_1.pdf (accessed on 19 September 2019).
76. Cau, E.; Corici, M.; Bellavista, P.; Foschini, L.; Carella, G.; Edmonds, A.; Bohnert, T.M. Efficient exploitation
of mobile edge computing for virtualized 5G in EPC architectures. In Proceedings of the 2016 4th IEEE
International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), Oxford,
UK, 29 March–1 April 2016; pp. 100–109.
77. Li, Z.; Sichitiu, M.L.; Qiu, X. Fog Radio Access Network: A New Wireless Backhaul Architecture for Small
Cell Networks. IEEE Access 2018, 7, 14150–14161. [CrossRef]
78. Pontois, N.; Kaneko, M.; Dinh, T.H.L.; Boukhatem, L. User pre-scheduling and beamforming with outdated
CSI in 5G fog radio access networks. In Proceedings of the 2018 IEEE Global Communications Conference
(GLOBECOM), Abu Dhabi, UAE, 9–13 December 2018; pp. 1–6.
79. Li, L.; Guan, Q.; Jin, L.; Guo, M. Resource allocation and task offloading for heterogeneous real-time tasks
with uncertain duration time in a fog queueing system. IEEE Access 2019, 7, 9912–9925. [CrossRef]
80. Huang, J.; Duan, Q.; Guo, S.; Yan, Y.; Yu, S. Converged network-cloud service composition with end-to-end
performance guarantee. IEEE Trans. Cloud Comput. 2015, 6, 545–557. [CrossRef]
81. Yu, Y.; Liu, S.; Tian, Z.; Wang, S. A dynamic distributed spectrum allocation mechanism based on game
model in fog radio access networks. China Commun. 2019, 16, 12–21.
82. Abedin, S.F.; Alam, M.G.R.; Kazmi, S.A.; Tran, N.H.; Niyato, D.; Hong, C.S. Resource allocation for
ultra-reliable and enhanced mobile broadband IoT applications in fog network. IEEE Trans. Commun. 2018,
67, 489–502. [CrossRef]
83. Majd, A.; Sahebi, G.; Daneshtalab, M.; Plosila, J.; Lotfi, S.; Tenhunen, H. Parallel imperialist competitive
algorithms. Concurr. Comput. Pract. Exp. 2018, 30, e4393. [CrossRef]
84. Majd, A.; Sahebi, G.; Daneshtalab, M.; Plosila, J.; Tenhunen, H. Hierarchal Placement of Smart Mobile Access
Points in Wireless Sensor Networks Using Fog Computing. In Proceedings of the 2017 25th Euromicro
International Conference on Parallel, Distributed and Network-based Processing (PDP), St. Petersburg,
Russia, 6–8 March 2017; pp. 176–180.
85. Moreno-Vozmediano, R.; Montero, R.S.; Huedo, E.; Llorente, I.M. Cross-site virtual network in cloud and
fog computing. IEEE Cloud Comput. 2017, 4, 46–53. [CrossRef]
35
Sensors 2019, 19, 4807
86. Shojafar, M.; Cordeschi, N.; Baccarelli, E. Energy-efficient adaptive resource management for real-time
vehicular cloud services. IEEE Trans. Cloud Comput. 2016, 7, 196–209. [CrossRef]
87. Lee, G.; Saad, W.; Bennis, M. An online optimization framework for distributed fog network formation with
minimal latency. IEEE Trans. Wirel. Commun. 2019, 18, 2244–2258. [CrossRef]
88. Vu, D.N.; Dao, N.N.; Jang, Y.; Na, W.; Kwon, Y.B.; Kang, H.; Jung, J.J.; Cho, S. Joint energy and latency
optimization for upstream IoT offloading services in fog radio access networks. Trans. Emerg. Telecommun.
Technol. 2019, 30, e3497. [CrossRef]
89. Ali, M.; Riaz, N.; Ashraf, M.I.; Qaisar, S.; Naeem, M. Joint cloudlet selection and latency minimization in fog
networks. IEEE Trans. Ind. Inform. 2018, 14, 4055–4063. [CrossRef]
90. He, X.; Ren, Z.; Shi, C.; Fang, J. A novel load balancing strategy of software-defined cloud/fog networking
in the Internet of vehicles. China Commun. 2016, 13, 140–149. [CrossRef]
91. Skarlat, O.; Schulte, S.; Borkowski, M.; Leitner, P. Resource provisioning for IoT services in the fog.
In Proceedings of the 2016 IEEE 9th Conference on Service-Oriented Computing and Applications (SOCA),
Macau, China, 4–6 November 2016; pp. 32–39.
92. Dong, Y.; Guo, S.; Liu, J.; Yang, Y. Energy-Efficient Fair Cooperation Fog Computing in Mobile Edge
Networks for Smart City. IEEE Internet Things J. 2019, 6, 7543–7554. [CrossRef]
93. Wang, R.; Li, R.; Wang, P.; Liu, E. Analysis and Optimization of Caching in Fog Radio Access Networks.
IEEE Trans. Veh. Technol. 2019, 68, 8279–8283. [CrossRef]
94. Jiang, Y.; Huang, W.; Bennis, M.; Zheng, F. Decentralized Asynchronous Coded Caching Design and
Performance Analysis in Fog Radio Access Networks. IEEE Trans. Mob. Comput. 2019. [CrossRef]
95. Abouaomar, A.; Elmachkour, M.; Kobbane, A.; Tembine, H.; Ayaida, M. Users-Fogs association within a
cache context in 5G networks: Coalition game model. In Proceedings of the 2018 IEEE Symposium on
Computers and Communications (ISCC), Natal, Brazil, 25–28 June 2018; pp. 14–19.
96. Chen, D.; Schedler, S.; Kuehn, V. Backhaul traffic balancing and dynamic content-centric clustering for the
downlink of Fog Radio Access Network. In Proceedings of the 2016 IEEE 17th International Workshop on
Signal Processing Advances in Wireless Communications (SPAWC), Edinburgh, UK, 3–6 July 2016; pp. 1–5.
97. Park, S.H.; Simeone, O.; Shamai, S. Joint optimization of cloud and edge processing for fog radio access
networks. In Proceedings of the 2016 IEEE International Symposium on Information Theory (ISIT), Barcelona,
Spain, 10–15 July 2016; pp. 315–319.
98. Peng, X.; Shen, J.C.; Zhang, J.; Letaief, K.B. Joint data assignment and beamforming for backhaul
limited caching networks. In Proceedings of the 2014 IEEE 25th Annual International Symposium on
Personal, Indoor, and Mobile Radio Communication (PIMRC), Washington, DC, USA, 2–5 September 2014;
pp. 1370–1374.
99. Dai, B.; Yu, W. Joint user association and content placement for cache-enabled wireless access networks.
In Proceedings of the 2016 IEEE International Conference on Acoustics, Speech and Signal Processing
(ICASSP), Shanghai, China, 20–25 March 2016; pp. 3521–3525.
100. Chen, D.; Kuehn, V. Weighted max-min fairness oriented load-balancing and clustering for multicast
cache-enabled F-RAN. In Proceedings of the 2016 9th International Symposium on Turbo Codes and Iterative
Information Processing (ISTC), Brest, France, 5–9 September 2016; pp. 395–399.
101. Wang, T.; Liang, Y.; Jia, W.; Arif, M.; Liu, A.; Xie, M. Coupling resource management based on fog computing
in smart city systems. J. Netw. Comput. Appl. 2019, 135, 11–19. [CrossRef]
102. Zhou, Z.; Liu, P.; Feng, J.; Zhang, Y.; Mumtaz, S.; Rodriguez, J. Computation resource allocation and
task assignment optimization in vehicular fog computing: A contract-matching approach. IEEE Trans.
Veh. Technol. 2019, 68, 3113–3125. [CrossRef]
103. Javaid, S.; Javaid, N.; Saba, T.; Wadud, Z.; Rehman, A.; Haseeb, A. Intelligent resource allocation in residential
buildings using consumer to fog to cloud based framework. Energies 2019, 12, 815. [CrossRef]
104. Tajalli, S.Z.; Tajalli, S.A.M.; Kavousi-Fard, A.; Niknam, T.; Dabbaghjamanesh, M.; Mehraeen, S. A Secure
Distributed Cloud-Fog Based Framework for Economic Operation of Microgrids. In Proceedings of the 2019
IEEE Texas Power and Energy Conference (TPEC), College Station, TX, USA, 7–8 February 2019; pp. 1–6.
105. Barros, E.B.C.; Dionísio Machado Filho, L.; Batista, B.G.; Kuehne, B.T.; Peixoto, M.L.M. Fog Computing
Model to Orchestrate the Consumption and Production of Energy in Microgrids. Sensors 2019, 19, 2642.
[CrossRef] [PubMed]
36
Sensors 2019, 19, 4807
106. Jie, Y.; Li, M.; Guo, C.; Chen, L. Game-theoretic online resource allocation scheme on fog computing for
mobile multimedia users. China Commun. 2019, 16, 22–31.
107. Zhou, Y.; Shen, Q.; Dong, M.; Ota, K.; Wu, J. Chaos-Based Delay-Constrained Green Security
Communications for Fog-Enabled Information-Centric Multimedia Network. In Proceedings of the 2019
IEEE 89th Vehicular Technology Conference (VTC2019-Spring), Kuala Lumpur, Malaysia, 28 April–1 May
2019; pp. 1–6.
108. Gope, P. LAAP: Lightweight Anonymous Authentication Protocol for D2D-Aided Fog Computing Paradigm.
Comput. Secur. 2019, 86, 223–237. [CrossRef]
109. Li, Z.; Chen, J.; Zhang, Z. Socially Aware Caching in D2D Enabled Fog Radio Access Networks. IEEE Access
2019, 7, 84293–84303. [CrossRef]
110. Tao, M.; Ota, K.; Dong, M. Foud: Integrating fog and cloud for 5G-enabled V2G networks. IEEE Netw. 2017,
31, 8–13. [CrossRef]
111. Ma, M.; He, D.; Wang, H.; Kumar, N.; Choo, K.K.R. An Efficient and Provably-Secure Authenticated Key
Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks. IEEE Internet Things J. 2019, 6, 8065–8075.
[CrossRef]
112. Pereira, J.; Ricardo, L.; Luís, M.; Senna, C.; Sargento, S. Assessing the reliability of fog computing for smart
mobility applications in VANETs. Future Gener. Comput. Syst. 2019, 94, 317–332. [CrossRef]
113. Wang, D.; Liu, Z.; Wang, X.; Lan, Y. Mobility-Aware Task Offloading and Migration Schemes in Fog
Computing Networks. IEEE Access 2019, 7, 43356–43368. [CrossRef]
114. Chen, Y.S.; Tsai, Y.T. A mobility management using follow-me cloud-cloudlet in fog-computing-based RANs
for smart cities. Sensors 2018, 18, 489. [CrossRef]
115. Kadhim, A.J.; Seno, S.A.H. Energy-efficient multicast routing protocol based on SDN and fog computing for
vehicular networks. Ad Hoc Netw. 2019, 84, 68–81. [CrossRef]
116. Muthanna, A.; Ateya, A.A.; Khakimov, A.; Gudkova, I.; Abuarqoub, A.; Samouylov, K.; Koucheryavy,
A. Secure IoT Network Structure Based on Distributed Fog Computing, with SDN/Blockchain. J. Sens.
Actuator Netw. 2019, 8, 15. [CrossRef]
117. Islam, N.; Faheem, Y.; Din, I.U.; Talha, M.; Guizani, M.; Khalil, M. A blockchain-based fog computing
framework for activity recognition as an application to e-Healthcare services. Future Gener. Comput. Syst.
2019, 100, 569–578. [CrossRef]
118. Tang, W.; Zhang, K.; Zhang, D.; Ren, J.; Zhang, Y.; Shen, X.S. Fog-Enabled Smart Health: Toward Cooperative
and Secure Healthcare Service Provision. IEEE Commun. Mag. 2019, 57, 42–48. [CrossRef]
119. Moustafa, N. A Systemic IoT-Fog-Cloud Architecture for Big-Data Analytics and Cyber Security Systems:
A Review of Fog Computing. arXiv 2019, arXiv:1906.01055.
120. Yassine, A.; Singh, S.; Hossain, M.S.; Muhammad, G. IoT big data analytics for smart homes with fog and
cloud computing. Future Gener. Comput. Syst. 2019, 91, 563–573. [CrossRef]
121. Nasir, M.; Muhammad, K.; Lloret, J.; Sangaiah, A.K.; Sajjad, M. Fog computing enabled cost-effective
distributed summarization of surveillance videos for smart cities. J. Parallel Distrib. Comput. 2019,
126, 161–170. [CrossRef]
122. Mora, L.; Bolici, R.; Deakin, M. The first two decades of smart-city research: A bibliometric analysis.
J. Urban Technol. 2017, 24, 3–27. [CrossRef]
123. Luthra, M.; Koldehofe, B.; Steinmetz, R. Transitions for Increased Flexibility in Fog Computing: A Case
Study on Complex Event Processing. Inform. Spektrum 2019, 42, 244–255. [CrossRef]
124. Naranjo, P.G.V.; Pooranian, Z.; Shojafar, M.; Conti, M.; Buyya, R. FOCAN: A Fog-supported smart city
network architecture for management of applications in the Internet of Everything environments. J. Parallel
Distrib. Comput. 2019, 132, 274–283. [CrossRef]
125. Giang, N.K.; Lea, R.; Leung, V.C. Developing applications in large scale, dynamic fog computing: A case
study. Softw. Pract. Exp. 2019, doi: 10.1002/spe.2695. [CrossRef]
126. Tang, B.; Chen, Z.; Hefferman, G.; Wei, T.; He, H.; Yang, Q. A hierarchical distributed fog computing
architecture for big data analysis in smart cities. In Proceedings of the ASE BigData & SocialInformatics
2015, Kaohsiung, Taiwan , 7–9 October 2015; p. 28.
127. Dsouza, C.; Ahn, G.J.; Taguinod, M. Policy-driven security management for fog computing: Preliminary
framework and a case study. In Proceedings of the 2014 IEEE 15th International Conference on Information
Reuse and Integration (IEEE IRI 2014), Redwood City, CA, USA, 13–15 August 2014; pp. 16–23.
37
Sensors 2019, 19, 4807
128. Aamir, M.; Masroor, S.; Ali, Z.A.; Ting, B.T. Sustainable Framework for Smart Transportation System: A Case
Study of Karachi. Wirel. Pers. Commun. 2019, 106, 27–40. [CrossRef]
129. Baccarelli, E.; Cordeschi, N.; Mei, A.; Panella, M.; Shojafar, M.; Stefa, J. Energy-efficient dynamic traffic
offloading and reconfiguration of networked data centers for big data stream mobile computing: Review,
challenges, and a case study. IEEE Netw. 2016, 30, 54–61. [CrossRef]
130. Azimi, I.; Pahikkala, T.; Rahmani, A.M.; Niela-Vilén, H.; Axelin, A.; Liljeberg, P. Missing data resilient
decision-making for healthcare IoT through personalization: A case study on maternal health. Future Gener.
Comput. Syst. 2019, 96, 297–308. [CrossRef]
131. Kumari, A.; Tanwar, S.; Tyagi, S.; Kumar, N. Fog computing for Healthcare 4.0 environment: Opportunities
and challenges. Comput. Electr. Eng. 2018, 72, 1–13. [CrossRef]
132. Ray, P.P.; Dash, D.; De, D. Edge computing for Internet of Things: A survey, e-healthcare case study and
future direction. J. Netw. Comput. Appl. 2019, 140, 1–22. [CrossRef]
133. Gia, T.N.; Jiang, M.; Rahmani, A.M.; Westerlund, T.; Liljeberg, P.; Tenhunen, H. Fog computing in healthcare
internet of things: A case study on ecg feature extraction. In Proceedings of the 2015 IEEE International
Conference on Computer and Information Technology; Ubiquitous Computing and Communications;
Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, Liverpool, UK,
26–28 October 2015; pp. 356–363.
134. Jalali, F.; Vishwanath, A.; De Hoog, J.; Suits, F. Interconnecting Fog computing and microgrids for greening
IoT. In Proceedings of the 2016 IEEE Innovative Smart Grid Technologies-Asia (ISGT-Asia), Melbourne, VIC,
Australia, 28 November–1 December 2016; pp. 693–698.
135. Beligianni, F.; Alamaniotis, M.; Fevgas, A.; Tsompanopoulou, P.; Bozanis, P.; Tsoukalas, L.H. An internet
of things architecture for preserving privacy of energy consumption. In Proceedings of the Mediterranean
Conference on Power Generation, Transmission, Distribution and Energy Conversion (MedPower 2016),
Belgrade, Serbia, 6–9 November 2016.
136. Rao, L.; Liu, X.; Ilic, M.D.; Liu, J. Distributed coordination of internet data centers under multiregional
electricity markets. Proc. IEEE 2012, 100, 269–282.
137. Pu, L.; Chen, X.; Xu, J.; Fu, X. D2D fogging: An energy-efficient and incentive-aware task offloading
framework via network-assisted D2D collaboration. IEEE J. Sel. Areas Commun. 2016, 34, 3887–3901.
[CrossRef]
138. Wang, S.; Huang, X.; Liu, Y.; Yu, R. CachinMobile: An energy-efficient users caching scheme for fog
computing. In Proceedings of the 2016 IEEE/CIC international conference on communications in China
(ICCC), Chengdu, China, 27–29 July 2016; pp. 1–6.
139. Yang, F.; Wang, S.; Li, J.; Liu, Z.; Sun, Q. An overview of internet of vehicles. China Commun. 2014, 11, 1–15.
[CrossRef]
140. Anawar, M.R.; Wang, S.; Azam Zia, M.; Jadoon, A.K.; Akram, U.; Raza, S. Fog computing: An overview of
big IoT data analytics. Wirel. Commun. Mob. Comput. 2018, 2018, 7157192. [CrossRef]
c 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access
article distributed under the terms and conditions of the Creative Commons Attribution
(CC BY) license (http://creativecommons.org/licenses/by/4.0/).
38
sensors
Article
Narrowband Internet of Things (NB-IoT):
From Physical (PHY) and Media Access Control
(MAC) Layers Perspectives
Collins Burton Mwakwata 1, *, Hassan Malik 1 , Muhammad Mahtab Alam 1 ,
Yannick Le Moullec 1 , Sven Parand 2 and Shahid Mumtaz 3
1 Thomas Johann Seebeck Department of Electronics, Tallinn University of Technology (TalTech),
Ehitajate tee-5, 19086 Tallinn, Estonia; [email protected] (H.M.);
[email protected] (M.M.A.); [email protected] (Y.L.M.)
2 Telia Estonia Ltd., 10616 Tallinn, Estonia; [email protected]
3 Instituto de Telecomunicações, 1049-001 Aveiro, Portugal; [email protected]
* Correspondence: [email protected]; Tel.: +372-58-663569
Abstract: Narrowband internet of things (NB-IoT) is a recent cellular radio access technology
based on Long-Term Evolution (LTE) introduced by Third-Generation Partnership Project (3GPP)
for Low-Power Wide-Area Networks (LPWAN). The main aim of NB-IoT is to support massive
machine-type communication (mMTC) and enable low-power, low-cost, and low-data-rate
communication. NB-IoT is based on LTE design with some changes to meet the mMTC requirements.
For example, in the physical (PHY) layer only single-antenna and low-order modulations are
supported, and in the Medium Access Control (MAC) layers only one physical resource block
is allocated for resource scheduling. The aim of this survey is to provide a comprehensive overview
of the design changes brought in the NB-IoT standardization along with the detailed research
developments from the perspectives of Physical and MAC layers. The survey also includes an
overview of Evolved Packet Core (EPC) changes to support the Service Capability Exposure Function
(SCEF) to manage both IP and non-IP data packets through Control Plane (CP) and User Plane (UP),
the possible deployment scenarios of NB-IoT in future Heterogeneous Wireless Networks (HetNet).
Finally, existing and emerging research challenges in this direction are presented to motivate future
research activities.
1. Introduction
According to Information Handling Services (IHS) technology forecast, the Internet of Things
(IoT) market is expected to grow to billions of devices by 2020 [1]. Massive connections are expected
to respond to different IoT use cases such as smart city, smart wearables, smart home, etc. [2].
For these applications, latency-insensitive devices can be positioned in hard-to-reach areas and do
not require high throughput or frequent reporting. Therefore, to cope with such tremendous IoT
trends, the Third-Generation Partnership Project (3GPP) introduced the Narrowband Internet of
Things (NB-IoT) standard as a communication technology enabler. NB-IoT is categorized as one of
the licensed Low-Power Wide-Area Networks (LPWAN) cellular technologies based on Long-Term
Evolution (LTE) with long range and low cost. In the LPWAN category, there exist other licensed
technologies, i.e., Long-Term Evolution Category M1 (LTE-M), and unlicensed technologies, i.e., Long
Range (LoRa), SigFox, Ingenu, etc. [3–7], but they are not the focus of the current work since they are
not based on cellular technology.
The term Narrowband refers to NB-IoT’s bandwidth of maximum 200 kHz thanks to which it
can coexist either in the Global System for Mobile Communications (GSM) spectrum or by occupying
one of the legacy LTE Physical Resource Blocks (PRBs) as in-band or as guard-band. Since it coexists
in the LTE spectrum, NB-IoT follows the legacy LTE numerologies as it uses Orthogonal Frequency
Division Multiplexing (OFDM) and Single-Carrier Frequency Division Multiple Access (SC-FDMA)
in the downlink and uplink transmission schemes, respectively. Some modifications in the physical
(PHY) and medium access control (MAC) layers are implemented to support the long-range massive
machine-type (mMTC) connections with low power, low data rates, low complexity, and hence
low cost. However, despite its low complexity, this new radio access technology (RAT) delivers
better performance in terms of the supported number of devices, and coverage enhancements for
latency-insensitive applications with maximum coupling loss (MCL) of about 20 dB higher than LTE
(i.e., 164 dB) [5–11].
With flexible deployment as well as the possibility to implement over-the-air (OTA) firmware
upgrades, many telecommunication operators across the globe (as shown in Figure 1) deployed
NB-IoT to test its practical feasibility on diverse use cases with real-life trials such as connected sheep
in Norway [12], smart metering and tracking in Brazil [13], NB-IoT at sea in Norway [14], smart city in
Las Vegas, USA [15], etc. The trials are enabled by different NB-IoT software and hardware solutions
from different chip or module vendors such as Skyworks [16], Media tek [17], Neul (Huawei) [18],
Quectel [19], Nordic Semiconductors [20], Intel [21], Sequans [22], Qualcomm [23], Siera wireless [24],
Samsung [25], Altair [26], U-Blox [27], and so on.
0HJDIRQ
7HOLD
(OLVD
'1$
7HOHQRU
6ZLVVFRP
2UDQJH
6)5 &KLQD8QLFRP
7HOHIRQLFD
&KLQD7HOHFRP
&KLQD0RELOH
.W
([DPSOH
7HONRPVHO
2SHUDWRU±$SSOLFDWLRQ 67&
9LYR±6PDUWPHWHULQJ 'LDORJ
DQGWUDFNLQJ%UD]LO
9RGDIRQH 6LQJWHO
70RELOH±6PDUWFLW\LQ
/DV9HJDV86$ 9LYR
7HOLD±&RQQHFWHGVKHHS
1RUZD\
9RGDIRQH
7HOVWUD
Figure 1. The geographical representation of countries with the ongoing NB-IoT real-life deployments
for diverse use cases (May 2019).
40
Sensors 2019, 19, 2613
The availability of such commercial off-the-shelf solutions speeds up the adoption of NB-IoT.
For this reason, numerous studies addressing segmented enhancement criteria including survey
articles emerged to analyze NB-IoT performance and implementation. Table 1 presents, in a nutshell,
the main differences and similarities between this survey and the other existing ones by displaying the
key focus features.
Table 1. Summarized comparison of this survey’s contribution with respect to the existing surveys.
For example, in [32], the authors surveyed the development path of MTC and elaborated the
NB-IoT evolution in Release 13. Similarly, in [28], the authors discussed the Release 13 features and
compared its performance with respect to other communication technologies such as LTE-M, SigFox,
Lora and Wireless-Fidelity (WiFi), etc. In [29,30], the authors gave an overview of NB-IoT Release 14;
however, in [30], the authors elaborated more on the expectations for NB-IoT Release 15 agenda.
In [31], the authors presented a survey on the NB-IoT downlink scheduling issues by highlighting
the associated scheduling process in terms of offset index selection. In [33], the authors surveyed
the uplink and downlink performance evaluation of NB-IoT systems by analyzing the main causes
of latency, trade-off between throughput and free resources, channel occupancy etc. with respect to
Release 13 and Release 14 updates.
In contrast to the above surveys, this paper presents:
To the best of the authors’ knowledge, this is the first survey that covers broadly these
above-mentioned contributions and hence will facilitate the reader’s knowledge related to NB-IoT
from standardization, ongoing research, and its practical implementation.
The rest of this paper is organized as follows: Section 2 discusses NB-IoT standards by elaborating
the key design changes and the related ongoing enhancements. Section 3 presents the state of the art
of NB-IoT protocol stack by detailing the PHY layer and MAC layer features. Section 4 discusses the
open research questions and their potential solutions, and the conclusion is drawn in Section 5.
41
Sensors 2019, 19, 2613
multiplexing (NB-OFDM). In May 2015, 3GPP merged the two proposals (i.e., NB-M2M and NB-OFDM)
and formed the Narrowband Cellular IoT (NB-CIoT). Eight months later, Ericsson proposed the
Narrowband Long-Term Evolution NB-LTE. In September 2015, 3GPP included all proposals as a work
item for Release 13. The key difference between NB-CIoT and NB-LTE was the number of the reused
legacy LTE network resources to support interoperability. In June 2016 NB-IoT was recognized as
a new clean slate RAT. Only further improvement changes were allowed and implemented thereafter.
In this regard, this section presents the main NB-IoT design changes from Release 13 until
today that enabled the massive IoT connections with the corresponding solutions to respond to the
adopted NB-IoT objectives. The enhancement features are classified following the objectives that
are presented in the releases which would make it easier for the readers to refer back to the official
3GPP documents [8,9,34–38].
2.1. Release 13
3GPP introduced the following techniques in NB-IoT Release 13 to enable cellular massive IoT
deployment for diverse use cases with low power, low complexity, and hence low cost. The introduced
features and their corresponding objectives are as follows.
/7(6SHFWUXP /7(6SHFWUXP
*60VSHFWUXP
1%,R735%
6WDQGDORQHDOORFDWLRQN+]
Figure 2. Narrow band Interet of Things (NB-IoT) Flexible Allocation inside Long-Term Evolution
(LTE) spectrum (in-band and guard-band) and when refarming the Global System for Mobile
Communications (GSM) spectrum (standalone).
42
Sensors 2019, 19, 2613
allocated to a single UE in the uplink. In this regard, tones (frequency domain) with different duration
are allocated to UEs. For the uplink transmission, each tone may either occupy 3.75 kHz or 15 kHz
of transmission bandwidth based on the SC-FDMA scheme; for downlink NB-IoT uses 15 kHz of
transmission bandwidth with OFDM scheme as LTE. With 15 kHz spacing, NB-IoT can dedicate either
single-tone (8 ms) or multi-tone (3 tones, 6 tones, and 12 tones) to different UEs with the duration of
4 ms, 2 ms, and 1 ms, respectively. On the other hand, the 3.75 kHz spacing supports only single-tone
allocation to different users with 48 subcariers of 32 ms duration [11,39,40].
43
Sensors 2019, 19, 2613
In general, NPRACH is used by UEs to perform initial access to the network, to request
transmission resources, and to reconnect to the base station after a link failure. NPDSCH and NPUSCH
are used to carry the downlink and uplink data packets transmissions, respectively. DMRS is used
for uplink channel estimation accuracy. The UE acquires Master Information Block (MIB) from
NPBCH and System Information Block (SIBs) from the NPDCCH. The defined MIB and SIB are
broadcasted once during 640 ms and 2560 ms intervals, respectively. The timing of the remaining
SIBs is configured in SIB1-NB. NRS is used for cell search and initial system acquisition. NPSS and
NSSS are used by the UE for its frequency and timing synchronization with the base station. Due to
overhead scheduling gaps in NPDCCH, the downlink and uplink peak data rates are ~250 kb/s and
~2267 kb/s, respectively, [34,40–43].
44
Sensors 2019, 19, 2613
45
Sensors 2019, 19, 2613
with the wake-up signal technique is larger when the UE wakes up from deep sleep more frequently
(i.e., for shorter DRX/eDRX cycles). Also, significant power consumption reduction is achieved
even when a common wake-up signal is used for a group of UEs. Quick RRC release and early
data transmission during random access channel (RACH) procedure are supported to reduce the UE
transmission latency and hence power consumption.
46
Sensors 2019, 19, 2613
47
Sensors 2019, 19, 2613
$13'&&+ %13'6&+
Figure 3. NB-IoT Downlink Frame Structure: subframe number 0 carries the Narrowband Physical
Broadcast Channel (NPBCH), 1 to 4, and 6 to 8 carry the Narrowband Physical Downlink Control
Channel (NPDCCH)/Narrowband Physical Downlink Shared Channel (NPDSCH), and 5 and 9 carry
the Narrowband Primary Synchronization Signal (NPSS)/Narrowband Secondary Synchronization
Signal (NSSS) (A) When the subframe is carrying control channels and (B) when the subframe is
carrying data.
In general, the base station uses DCI to specify the scheduling information for a downlink/uplink
transmission in NB-IoT. Then NB-IoT UE learns the deployment mode (standalone, in-band, or
guard-band) as well as the cell identity through its initial acquisition, and it figures out which resource
elements are already used by LTE. This is the way by which the UE can map NPDCCH and NPDSCH
symbols to available resource elements. For example, in the downlink, NPDCCH is transmitted by
aggregating the narrowband control elements (element 0 and element 1) where element 0 is occupied in
subcarrier 0 to 5 and element 1 occupies subcarrier 6 to 11 in a subframe. The elements are determined
by the type of DCI which is carried by NPDCCH to deliver scheduling command. Either two DCIs can
be multiplexed in one subframe, or one DCI can be mapped in one subframe, corresponding to the
aggregation level used [48]. However, NPDCCH, NPDSCH, and NRS cannot be mapped to the already
occupied resource elements for LTE signals such as cell-specific reference symbols (CRS) and LTE
physical downlink control channel (PDCCH). When NB-IoT UE receives NPDCCH which carries DCI,
it decodes it and uses the device’s scheduling feature (k0) to know the delay over which it will start to
receive NPDSCH. The scheduling information is used to identify the allocated resources over NPDSCH
48
Sensors 2019, 19, 2613
and NPUSCH, respectively. In each NPDCCH, a maximum of two DCIs can be transported, and each
UE can receive up to one DCI. The time interval between two successive NPDCCH opportunities is
referred to as an NPDCCH period (PP) [48].
In the state of the art, different works have proposed solutions to the challenges that occur in PHY
layer features, such as initial cell acquisition and synchronization, random access, channel estimation,
error correction, and co-channel interference, as summarized in Table 2.
PV
PV
N+]
N+]
Figure 4. NB-IoT Uplink Frame Structure, (A) when 15 kHz spacing is used with different
tone-allocation possibilities with slot duration of 0.5 ms and (B) when 3.75 kHz is used only single-tone
allocation is supported with 4 times longer slot duration (2 ms).
49
Sensors 2019, 19, 2613
Table 2. Cont.
50
Sensors 2019, 19, 2613
Table 2. Cont.
51
Sensors 2019, 19, 2613
In [52], the work investigated the downlink synchronization signal design and proposed
the novel general synchronization signal structure with a couple of Zadoff-Chu (ZC) conjugated
sequences in order to remove the potential timing errors caused by large frequency offsets. Their new
synchronization signal structure demonstrated better functionality with the frequency offset tolerance
of up to 40 kHz. However, the model does not explain the number of samples per symbol involved in
synchronization operation and decision.
In [53], the random access preamble is discussed based on the design of NPRACH for single-tone
frequency hopping only. It introduces the new single-tone frequency hopping random access signal
used by NPRACH in NB-IoT systems. It further explains the design rationale and proposes some
possible receiver algorithms for NPRACH detection and ToA estimation. The simulation results show
that NPRACH performance is improved. However, the paper did not discuss the impact of massive
interference which may result in lower received Signal Interference plus Noise Ratio (SINR) at the base
station such that the lower the SINR the lower the detection probability of NPRACH. In addition to that
the higher the number of devices the higher probability of NPRACH preamble collision. So lower SINR
detected at base station and higher collision probability both affect NPRACH detection negatively.
In [54], the authors described a NPRACH design as specified in 3GPP in standard in Release 13.
They proposed a receiver algorithm for the NPRACH timing advance estimation as well as detection.
The simulation results for the NPRACH detection shows that if one preamble sequence is transmitted,
the detection threshold should be set between 55% to 70% of the average value to satisfy the desired
NPRACH performance at the lowest SNR. The results also showed that at 5 and 11 preamble sequence
transmission, the detection threshold should be 50% and 35% of the average value, respectively. It is
noted that increasing the detection threshold lowers the false alarm probability, which leads to an
increased likelihood of misdetection.
In [55], the authors provided a mathematical model of an NB-IoT network in order to predict
the optimum performance with a specific configuration of some design parameters (i.e., repetition,
number of the preamble in NPRACH per second, coverage classes and intersite distance). The paper
analyzes the effects of parameter choice in outdoor, indoor, and deep indoor. The work finally proposes
how to choose the optimal configuration i.e., by providing the highest throughput, as well as success
probability higher than minimal success probability with minimal one being of 90%. The work showed
that even though the success probability has a maximum limit, it can still be altered by modifying the
number of repetitions to enhance the coverage or the system capacity in terms of throughput.
In [56], the authors presented the NB-IoT frequency diversity (FD) reception for NPSS as well
as NSSS. In the reception mode, the NB-IoT UE alternatively receives the NPSS and NSSS in time
domain radio frame by switching the received signals transmitted in different resource blocks in the
frequency domain. Their simulation results show that using the proposed FD reception could improve
the detection probability by 16% more than without applying the frequency diversity. Additionally,
using FD with precoding vector switching (PVC) transmit diversity, achieves 90% of physical cell ID
detection (PCID) probabilities at the average SNR of 0 dB with maximum carrier offset of 70 kHz.
The method also achieves 97% of PCID detection probability without consideration of frequency
carrier offset.
52
Sensors 2019, 19, 2613
random access with Msg3 collisions instead of Msg1 collision (as multipath transmission) for the
random access procedure. The proposed model results show the impact of the parameters (Msg3
transmission mode, Msg3 modulation and coding scheme (MCS), power control schemes and power
ramping step) in the single-tone and multi-tone transmissions Bit Error Rate (BER) performance.
The results are presented in terms of the total number of preamble transmission success, preamble
retransmissions and lost preamble attempts. The work concludes that Msg3 must be considered in
the random access procedure analysis, the transmission mode as well as MCS, and for better system
performance and fairness distribution of UEs in the cell, it is better to configure power control correctly.
In [58], the authors analyze NB-IoT transmission delay as well as mathematical evaluation of the
probability of success for the random access procedure preamble transmission. The analysis is based on
three scenarios; scenario one uses minimum values of parameters, scenario two uses the intermediate
values, and scenario three uses maximum parameter values. The used parameters are NPRACH
periodicity, start time, number of repetitions, number of preamble attempts, and random access
response window size. The average delay analysis was performed such that k preamble sequences are
mapped in n subcarriers. The preamble collision occurs when multiple UEs send preamble sequences
in the same subcarrier. A successful preamble attempt occurs when only one UE sends the preamble
to a given subcarrier.
In [59], the authors investigated a random access optimization algorithm and summarized
the NPRACH feature and hence designed random access with differentiated barring (RADB) for
NB-IoT system. It is observed that the RADB could solve the preamble request conflict caused by
massive NB-IoT UEs and hence provide reliable random access for latency-sensitive devices. However,
the authors did not consider the problems of channel resource distribution and resource use rate.
In [60], the authors designed a new frequency hopping pattern of NPRACH preamble which uses
all feasible hopping distances for a given number of subcarriers. It is seen that their proposed pattern
was compatible with standards that is keeping the same NPRACH structure with only very small
changes (hopping in the standard is allowed only between the subcarriers of the same resource group).
Their simulation where they adopted their first traffic model which deploys 3000 devices, 48 ms and
40 ms of NPRACH preamble and periodicity, respectively, show that the proposed hopping pattern
could improve the ToA estimation without additional system overhead.
53
Sensors 2019, 19, 2613
that NB-IoT coverage could reach as far as 35 km. However, the paper does not elaborate on the
solution feasibility in environments without line of sight.
In [63], the work provided optimization cases for NB-IoT downlink in terms of MCS. The work
also provided the optimization cases of coverage level (CL) by taking into consideration the RACH
success rate with different driving speeds of NB-IoT devices in a commercially deployed network.
Their results show that the base station paging success rate is decreased as the adjacent cell interference
increases. However, the decrease in MCS improves paging performance. Coverage level 0 is the best
choice for NB-IoT use cases that involve mobility, whereas coverage level 1 and 2 are mostly for fixed
location NB-IoT use cases.
In [64], the author presented an iterative algorithm for NB-IoT transmission procedure.
The simulation results in terms of BER and blocks error rate (BLER) show that by use of concatenated
error correcting codes or cryptographic redundancy and error correcting code, the algorithm improves
the NB-IoT coverage and reduces the overall NB-IoT power consumption. The modification of additional
correction of low reliable bits could demonstrate the error correction of the damaged messages by the
noisy transmission and hence can reduce the repetition number. However, this work did not discuss how
effective the algorithm is when taking into consideration different channel conditions, payload sizes, as
well as different repetition numbers with respect to device signal quality.
In [67], the authors considered the presence of random phase noise of the received signals mainly
caused by oscillators impairments in both the transmitting and receiving sides and how to lower
the mean square error (MSE) estimates. They presented the sequential MMSE channel estimation
method that could be implemented in NB-IoT systems. Their model shows that if random phase noise
is considered during channel estimation, it is possible to improve the detected SNR by up to 1 dB.
However, the model is assumed to be uniformly distributed hence does not present the real-time
channel which is randomly changing over time.
54
Sensors 2019, 19, 2613
55
Sensors 2019, 19, 2613
Table 3. Cont.
56
Sensors 2019, 19, 2613
57
Sensors 2019, 19, 2613
NB-IoT scheduling schemes which considers the device’s simplicity, modulation schemes, channel
conditions, and delay requirement for specific use cases.
In [71], the paper proposed a new resource allocation technique by extending the paging resource
that will be specific for paging traffic offload. The authors noted that the new paging PRB could
lower power consumption which is mostly used to load and offload the paging load. Also, the work
proposed the selection scheme based on UE identity (ID) that is used to balance the load between the
paging resource blocks. The simulation results show that power consumption reduction and resource
optimal usage are of 80% and 30.5%, respectively. This work considered adding other PRBs for paging
monitoring; however, the authors do not demonstrate the trade-off between the newly introduced
scheme and the UE complexity requirements.
In [83], the authors proposed an enhanced access reservation protocol (ARP) that allows
the device to transmit a fraction of a preamble sequence by providing an analytical model that
captures the performance of ARP in terms of the false alarm, misdetection, and collision probabilities.
They mathematically analyze the trade-off between the misdetection and the collision probabilities.
The drawback of this protocol is that with massive NB-IoT deployment, altering the configuration of
the protocol may result in detection performance degradation which can lead to huge packet loss.
In [72], the authors analyzed the impact of interference when the 15 kHz LTE system coexists
with a guard-band NB-IoT system with 3.75 kHz subcarrier separation. Their simulation results
demonstrated that it is desirable that the scheduler of the LTE system empties the neighboring RBs
of the NB-IoT system and allocates resources if possible. The authors then proposed an NB-IoT
scheduling method for the LTE system to improve the performance of the studied NB-IoT system.
Their results showed that if emptying is not done, at 103 BER there is 1 dB drop of SNR as compared to
when emptying of RBs is done.
58
Sensors 2019, 19, 2613
bandwidth and performing repetitions could enhance the coverage. However, the work did not
consider the actual impact of channel parameters as well as NB-IoT UE impairments such as CFO
which may lead to transmission errors.
In [75], the authors proposed a new NB-IoT link adaptation scheme with the consideration of the
repetition factor. They claim that their proposed two-dimensional scheme is composed of Inner Loop
Link Adaptation that copes with BLER by periodically adjusting the repetition number and outer loop
link adaptation which coordinates the MCS and repetition number. This is because 20 dB coverage
enhancement beyond LTE can be achieved by the repetition of transmitted data. So, in this work, they
proposed an algorithm that dynamically chooses MCS and repetition number based on estimated
real-time channel state information (CSI). However, their algorithm does not elaborate on the different
NB-IoT power classes and to which range their respective coverage could be enhanced.
59
Sensors 2019, 19, 2613
In [79], the authors presented the NB-IoT power measurement. Their measurements were set in
such a way that NB-IoT transmission consumes 716 mW when at 23 dBm with a power efficiency of
37%. DL control and data signals consume 213 mW, idle-mode-eDRx and PSM consumes 21 mW and
13 μW, respectively. In general, according to their empirical measurements, it is shown that the power
consumption is 10% lower than the 3GPP estimates. During measurements, parameters such as time
domain repetition, I-eDRx, and PSM were taken into consideration. To characterize each component
in the proposed model, several test cases such as Tx power, UL, and DL data rates, I-eDRx, and PSM
were used and all parameters except one at a time were fixed. Their results showed that the NB-IoT
devices power consumption is independent of the subcarrier spacing. However, the total ON time of
the devices is in many cases defining the overall battery life. As their remark, the data rates do not
directly impact the power consumption, but it has a major direct impact because it defines the overall
device ON time. If the transmitting interval is 1 h, the device achieves only 2.5 weeks of battery life.
Increasing the duration to 24 h, the lifetime of the device increases to 12.8 years in PSM.
In [80], the authors proposed a prediction-based energy-saving mechanism to reduce energy
consumption by decreasing the number of scheduling request procedures. Their proposed scheme
showed that it could reduce the NB-IoT active time from 5% to 16% for the medium and bad channel
quality and achieve from 10% to 34% battery saving in different scenarios as compared to 3GPP
consumption simulation specifications in [43].
In [81], the authors developed a semi-Markov chain with power saving mode, idle mode, random
access, and transmission mode to study the energy requirement and delay performance for NB-IoT.
It is noted that for massive synchronous connections, extra power is drained in random access and
transmission states due to collisions. The paper further proposes an energy optimization model based
on a priori method that takes into consideration the PSM duration as well as power consumption.
The results demonstrate that for optimal energy and delay requirement, it is important to set the higher
RACH transmission number to accommodate more delay on the UE. However, their optimization
model did not consider the power consumption during the transition of different states, because when
the UE is required to perform several sessions per day, it might go through several transitions that have
a significant effect on power consumption. Furthermore, the mode does not include the small data
transmission scheme during RRC connection as proposed in the updated standards. However, with
the introduction of the new power class in NB-IoT Release 14, there is a need for practical experiments
to evaluate the new coverage classes. With lower transmit power, the SNR detected at the base station
becomes lower hence the device will need to perform more repetitions to enhance coverage.
60
Sensors 2019, 19, 2613
CP CIoT EPS optimization encapsulates the data packets in Non-Access Stratum (NAS) by using
control plane signaling messages. In this regard, this procedure is mandatory. Compared to the
conventional SR procedure, the NB-IoT UE skips some steps required for each data transfer hence this
optimization procedure best fits the short data transmission or reception.
On the other hand, UP CIoT EPS optimization requires the RRC connected mode to get the scheduled
radio resources as well as Access Stratum (AS) between the UE and the network. This mode uses the
newly introduced connection to Suspend and Resume procedures. Connection suspend procedure helps
to retain the network context so that the UE can resume the connection when traffic is available. Retaining
the context helps the UE and the network to skip the AS and RRC reconfiguration in each data transfer.
Since it uses user plane, the UP CIoT EPS is suitable for both small and large transactions.
Serving
Gateway
(SGW)
Mobile
Mobility Entity
(MME)
eNodeB Packet Data
Network
GateWay
(PDN GW)
Application
Service Capability server
Exposure
NB-IoT UE Function (SCEF)
Figure 5. Representation of NB-IoT IP and Non-IP data path: Blue line displays the IP data path in UP
mode (as Legacy LTE), Red line displays the non-IP data path in CP mode, and dashed-line displays
the IP data path in CP mode.
Furthermore, the UE in Service Request procedure (an LTE procedure used by the UE and base
station to transmit or receive data in RRC idle state) is required to be in a connected state in order
for base station to allocate the radio resources. For NB-IoT this SR is optional; however, NB-IoT UE
that supports UP optimization needs also to support SR. For example; if the NB-IoT UE wants to
transmit the uplink data in idle state, it will send the random access preamble through which the base
station and UE will establish RRC connection and UE will be allocated with the radio resources for
data transfer. After a certain period of inactivity, the base station initiates the release procedure.
Similarly, for UE downlink data reception, if the UE is in DRX mode, the UE regularly listens
to downlink signaling and if the UE notices the paging message, it will perform the SR procedure as
described in uplink data transmission. Additionally, if the UE is in PSM mode, it will be completely
inaccessible until it initiates the same SR procedure for the uplink grant or by using Tracking Area
Update (TAU).
There are works that are addressing the upper layers such as [77], where the authors proposed an
efficient small data transmission scheme by using CP procedure. The proposed scheme enables the
devices to transmit data packets through the RRC connection setup procedure when the device is in
idle mode. This process reduces the signaling overhead caused by the security setup process and data
radio bearer setup process. However, a suggestion could be to analyze the power consumption during
this small data transmission and compare its effectiveness to when the same data is transmitted during
the UP procedure.
Summary: This section discussed PHY layer features, highlighting the corresponding enhancements
on cell acquisition procedure, random access channel estimation, and interference mitigation. It then
addressed the MAC layer enhancements regarding resource allocation, link adaptation, coverage and
61
Sensors 2019, 19, 2613
capacity, and power management. It further addressed the upper layers changes related to cellular IoT
evolved packet system optimization through user and control planes to enhance the small data packets
transmissions for end-to-end massive connectivity.
1%,R7/7(VPDOOFHOO
1%,R7VPDOOFHOO
1%,R7/7(8(
1%,R7/7(PDFURFHOO8(
1%,R7VPDOOFHOO8( 1%,R7/7(PDFURFHOO
1%,R7VPDOOFHOO 1%,R7/7(VPDOOFHOO
Figure 6. Summary of NB-IoT deployment strategies. For example, when NB-IoT is deployed in
macrocell and LTE in small cell, when LTE is in macrocell and NB-IoT is in small cells, when NB-IoT
is in macrocell and small cells support both NB-IoT and LTE, and when LTE is in macrocell and
LTE/NB-IoT is in small cells
62
Sensors 2019, 19, 2613
63
Sensors 2019, 19, 2613
64
Sensors 2019, 19, 2613
5.4. Latency
NB-IoT latency tolerance is set to 10 ms. This is due to its support for use cases of UEs that are
in environments with bad channel conditions [95–97]. Initial cell acquisition, frequency, and timing
requirements, RACH transmission, half duplex mode of transmission and several repetitions that are
performed during transmission are some of the features that play part in the overall data transmission
delay. Several works are trying to reduce the timing requirement so as to reduce transmission latency
of devices; however, most of the works have not addressed delay by taking into consideration the
massive congestion that is expected for the IoT networks, processing delays due to low complex
devices, queuing delays, propagation delays especially with long-range feature, as well as errors and
error recovery.
However, early data transmission schemes and the second NB-IoT HARQ process for devices
that have good channel conditions are among the features that can be used to reduce the transmission
latency and improving the transmission link performance. However, only a handful of research articles
have discussed the effectiveness of these processes when applied in NB-IoT.
65
Sensors 2019, 19, 2613
estimation but the NB-IoT receiver sensitivity and weak channel estimation quality still negatively
affect the TA adjustment.
Table 4. Open Research Questions related to the physical layer, MAC layer, and standard.
66
Sensors 2019, 19, 2613
6. Conclusions
Due to the fact that most of the existing works are segmented and only consider one or two
releases in their corresponding studies or simulations, this paper has presented a comprehensive
overview of NB-IoT standard from Release 13 to Release 16 prospects to enhance and enable more
realistic research. It further presented the detailed current state of the art of NB-IoT based on the
ongoing discussion on NB-IoT protocol stack along with the related contributions and analyzed the
knowledge gaps by using NB-IoT standard as a benchmark. It is observed that most of the articles focus
on improving one or few features while neglecting others,it could be better to display the trade-offs
between the improvement feature and the neglected ones, i.e., performance trade-off between PHY
and MAC layer when one feature is changed in either of the layers, the impact of repetition on overall
energy consumption, CFO on channel estimation quality etc. This paper also presented the NB-IoT
deployment strategies to highlight the coexistence possibilities with other legacy technologies i.e., LTE,
by considering the NB-IoT support for small cells in HetNet scenarios. Lastly, it discussed the open
research challenges and the future common research focus on NB-IoT i.e., battery life, optimal resource
usage, handover support during mobility, transmission latency, scheduling, etc. To the best of the
author’s knowledge, this is the first survey that covers broadly these mentioned contributions and
hence this work will help the researchers get most of the needed information to accelerate their research
by finding the relevant information and sources for deeper exploration of the research concepts as well
as finding possible solutions.
Author Contributions: Conceptualization, C.B.M., H.M., M.M.A., Y.L.M., S.P. and S.M.; investigation, C.B.M.,
H.M., M.M.A., Y.L.M., S.P. and S.M.; resources, C.B.M., H.M., M.M.A., Y.L.M., S.P. and S.M.; writing—original
draft preparation, C.B.M..; writing—review and editing, C.B.M., H.M.; formal analysis, C.B.M., H.M., M.M.A.,
Y.L.M., S.P. and S.M.; supervision, M.M.A., H.M., Y.L.M.
Funding: This research received no external funding.
Acknowledgments: This project has received funding partly from European Union’s Horizon 2020 Research and
Innovation Program under Grant 668995 and European Union Regional Development Fund in the framework of
the Tallinn University of Technology Development Program 2016–2022. This material reflects only the authors’
view and the EC Research Executive Agency is not responsible for any use that may be made of the information
it contains.
Conflicts of Interest: The authors declare no conflict of interest.
References
1. Lucero, S. IoT Platforms: Enabling the Internet of Things. 2019. Available online: https://cdn.ihs.com/
www/pdf/enabling-IOT.pdf (accessed on 12 January 2019).
2. Salman, L.; Salman, S.; Jahangirian, S.; Abraham, M.; German, F.; Blair, C.; Krenz, P. Energy efficient
IoT-based smart home. In Proceedings of the IEEE 3rd World Forum on Internet of Things (WF-IoT),
Reston, VA, USA, 12–14 December 2016.
3. Bardyn, J.; Melly, T.; Seller, O.; Sornin, N. IoT: The era of LPWAN is starting now. In Proceedings of
the ESSCIRC Conference 2016: 42nd European Solid-State Circuits Conference, Lausanne, Switzerland,
12–15 September 2016; pp. 25–30. [CrossRef]
4. Devalal, S.; Karthikeyan, A. LoRa Technology—An Overview. In Proceedings of the Second International
Conference on Electronics, Communication and Aerospace Technology (ICECA), Tamilnadu, India,
29–30 March 2018.
5. Mekki, K.; Bajic, E.; Chaxel, F.; Meyer, F. A comparative study of LPWAN technologies for large-scale IoT
deployment. ICT Express 2019, 5, 1–7. [CrossRef]
6. Lauridsen, M.; Nguyen, H.; Vejlgaard, B.; Kovacs, I.Z.; Mogensen, P.; Sorensen, M. Coverage Comparison
of GPRS, NB-IoT, LoRa, and SigFox in a 7800 square km Area. In Proceedings of the IEEE 85th Vehicular
Technology Conference (VTC Spring), Sydney, Australia, 4–7 June 2017.
7. Sinha, R.S.; Wei, Y.; Hwang, S.H. A survey on LPWA technology: LoRa and NB-IoT. ICT Express 2017,
3, 14–21. [CrossRef]
67
Sensors 2019, 19, 2613
8. Rico-Alvarino, A.; Vajapeyam, M.; Xu, H.; Wang, X.; Blankenship, Y.; Bergman, J.; Tirronen, T.; Yavuz, E.
An overview of 3GPP enhancements on machine to machine communications. IEEE Commun. Mag. 2016,
54, 14–21. [CrossRef]
9. Gozalvez, J. New 3GPP Standard for IoT [Mobile Radio]. IEEE Veh. Technol. Mag. 2016, 11, 14–20. [CrossRef]
10. Lauridsen, M.; Kovacs, I.Z.; Mogensen, P.; Sorensen, M.; Holst, S. Coverage and Capacity Analysis of
LTE-M and NB-IoT in a Rural Area. In Proceedings of the 2016 IEEE 84th Vehicular Technology Conference
(VTC-Fall), Montreal, QC, Canada, 18–21 September 2016.
11. Adhikary, A.; Lin, X.; Wang, Y..E. Performance Evaluation of NB-IoT Coverage. In Proceedings of the IEEE
84th Vehicular Technology Conference (VTC-Fall), Montreal, QC, Canada, 18–21 September 2016.
12. Telia. Verdens Storste Iot Pilot. 2018. Available online: https://www.telia.no/magasinet/verdens-storste-
iot-pilot/ (accessed on 23 December 2018).
13. U Blox. Press Releases. 2019. Available online: https://www.u-blox.com/en/press-releases/ (accessed on
26 January 2019).
14. Norway, T. Sub-Pump. 2018. Available online: https://www.teliacompany.com/en/news/news-articles/
2017/sub-pump/ (accessed on 26 December 2018).
15. T Mobile. Smart Cities. 2019. Available online: https://iot.t-mobile.com/solutions/smart-cities/ (accessed
on 10 February 2019).
16. Skyworks. Cellular IoT. 2019. Available online: http://www.skyworksinc.com/Products/1152/Cellular_
IoT (accessed on 15 February 2019).
17. Mediatek. NB-IoT. 2019. Available online: https://www.mediatek.com/products/nbIot/mt2625 (accessed
on 19 February 2019).
18. Huawei. 2019. Available online: https://e.huawei.com/my/solutions/technical/iot/nb-iot (accessed on
20 February 2019).
19. Quactel. LPWA IoT Module. 2019. Available online: https://www.quectel.com/product/list/
LPWAIoTModule.htm (accessed on 15 March 2019).
20. Nordic Semiconductors. 2019. Available online: https://www.nordicsemi.com/News/2018/12/ (accessed
on 10 February 2019).
21. Intel. Modem Solutions. 2019. Available online: https://www.intel.com/content/www/us/en/mobile/
modem-solutions.html (accessed on 10 February 2019).
22. Sequans. 2019. Available online: http://www.sequans.com/products-solutions/ (accessed on 10
February 2019).
23. Qualcomm. IoT Modem. 2019. Available online: https://www.qualcomm.com/products/mdm9206-iot-
modem (accessed on 10 February 2019).
24. Sierrawireless. Products and Solutions. 2019. Available online: https://www.sierrawireless.com/products-
and-solutions/embedded-solutions/ (accessed on 10 February 2019).
25. Samsung. Samsung Exynos. 2019. Available online: https://news.samsung.com/global/samsungs-exynos-
i-s111 (accessed on 10 February 2019).
26. Altair Semiconductors. 2018. Available online: https://altair-semi.com/ (accessed on 10 February 2019).
27. U blox. Cellular Modules. 2019. Available online: https://www.u-blox.com/en/cellular-modules (accessed
on 10 February 2019).
28. Chen, M.; Miao, Y.; Hao, Y.; Hwang, K. Narrow Band Internet of Things. IEEE Access 2017, 5, 20557–20577.
[CrossRef]
29. Hoglund, A.; Lin, X.; Liberg, O.; Behravan, A.; Yavuz, E.A.; Van Der Zee, M.; Sui, Y.; Tirronen, T.;
Ratilainen, A.; Eriksson, D. Overview of 3GPP Release 14 Enhanced NB-IoT. IEEE Netw. 2017, 31, 16–22.
[CrossRef]
30. Ratasuk, R.; Mangalvedhe, N.; Xiong, Z.; Robert, M.; Bhatoolaul, D. Enhancements of narrowband IoT in
3GPP Rel-14 and Rel-15. In Proceedings of the IEEE Conference on Standards for Communications and
Networking (CSCN), Helsinki, Finland, 18–20 September 2017.
31. Boisguene, R.; Tseng, S.; Huang, C.; Lin, P. A survey on NB-IoT downlink scheduling: Issues and potential
solutions. In Proceedings of the 13th International Wireless Communications and Mobile Computing
Conference (IWCMC), Valencia, Spain, 26–30 June 2017.
32. Xu, J.; Yao, J.; Wang, L.; Ming, Z.; Wu, K.; Chen, L. Narrowband Internet of Things: Evolutions, Technologies,
and Open Issues. IEEE Internet Things J. 2018, 5, 1449–1462. [CrossRef]
68
Sensors 2019, 19, 2613
33. Feltrin, L.; Tsoukaneri, G.; Condoluci, M.; Buratti, C.; Mahmoodi, T.; Dohler, M.; Verdone, R. Narrowband IoT:
A Survey on Downlink and Uplink Perspectives. IEEE Wirel. Commun. 2019, 26, 78–86. [CrossRef]
34. Zayas, A.D.; Merino, P. The 3GPP NB-IoT system architecture for the Internet of Things. In Proceedings
of the IEEE International Conference on Communications Workshops (ICC Workshops), Paris, France,
21–25 May 2017.
35. ERICSSON. Scope of Release 16-NB-IoT, RP-181187. 2018. Available online: http://www.3gpp.org/ftp/
TSG_RAN/TSG_RAN/TSGR_80/Report/ (accessed on 23 December 2018).
36. Huawei. On NB-IoT Evolution in Rel-16, RP-180877. 2018. Available online: http://www.3gpp.org/ftp/
TSG_RAN/TSG_RAN/TSGR_80/Report/ (accessed on 23 December 2018).
37. 3GPP. Revision of WI on Enhancements of NB-IoT, RP-161901. 2018. Available online: https://portal.3gpp.
org/ngppapp/CreateTdoc.aspx?mode=view&contributionId=730352 (accessed on 23 December 2018).
38. 3GPP. TS 36.300 V13.8.0 (2017-06). 2018. Available online: https://portal.3gpp.org/desktopmodules/
Specifications/SpecificationDetails.aspx?specificationId=2430 (accessed on 23 December 2018).
39. Xu, T.; Darwazeh, I. Non-Orthogonal Narrowband Internet of Things: A Design for Saving Bandwidth and
Doubling the Number of Connected Devices. IEEE Internet Things J. 2018, 5, 2120–2129. [CrossRef]
40. Beyene, Y.D.; Jantti, R.; Tirkkonen, O.; Ruttik, K.; Iraji, S.; Larmo, A.; Tirronen, T.; Torsner, J. NB-IoT
Technology Overview and Experience from Cloud-RAN Implementation. IEEE Wirel. Commun. 2017,
24, 26–32. [CrossRef]
41. Ratasuk, R.; Mangalvedhe, N.; Kaikkonen, J.; Robert, M. Data Channel Design and Performance for
LTE Narrowband IoT. In Proceedings of the IEEE 84th Vehicular Technology Conference (VTC-Fall),
Montreal, QC, Canada, 18–21 September 2016 .
42. Ratasuk, R.; Mangalvedhe, N.; Zhang, Y.; Robert, M.; Koskinen, J. Overview of narrowband IoT in LTE
Rel-13. In Proceedings of the IEEE Conference on Standards for Communications and Networking (CSCN),
Berlin, Germany, 31 October–2 November 2016.
43. 3GPP. Specs. 2019. Available online: http://www.3gpp.org/ftp/Specs/archive/45_series/45.820/45820-
d10.zip (accessed on 24 April 2019).
44. 3GPP. TS 36.213. 2018. Available online: https://portal.3gpp.org/desktopmodules/Specifications/
SpecificationDetails.aspx?specificationId=2427 (accessed on 29 December 2018).
45. Ericsson. Ground-Breaking Long-Range NB-IoT Connection. 2018. Available online:
https://www.ericsson.com/en/press-releases/2018/9/ericsson-and-telstra-complete-ground-breaking-
long-range-nb-iot-connection, (accessed on 25 December 2018).
46. Ericsson. Key Technology Choices for Optimal Massive IoT Devices. 2019. Available
online: https://www.ericsson.com/en/ericsson-technology-review/archive/2019/key-technology-choices-
for-optimal-massive-iot-devices (accessed on 20 March 2019).
47. Ericsson. Technology Overview. 2019. Available online: https://www.ericsson.com/en/ericsson-
technology-review/archive/2019/ (accessed on 10 April 2019).
48. Wang, Y.E.; Lin, X.; Adhikary, A.; Grovlen, A.; Sui, Y.; Blankenship, Y.; Bergman, J.; Razaghi, H.S. A Primer
on 3GPP Narrowband Internet of Things. arXiv 2016, arXiv:1606.04171.
49. Kroll, H.; Korb, M.; Weber, B.; Willi, S.; Huang, Q. Maximum-Likelihood Detection for Energy-Efficient
Timing Acquisition in NB-IoT. In Proceedings of the IEEE Wireless Communications and Networking
Conference Workshops (WCNCW), San Francisco, CA, USA, 19–22 March 2017.
50. Ali, A.; Hamouda, W. On the Cell Search and Initial Synchronization for NB-IoT LTE Systems.
IEEE Commun. Lett. 2017, 21, 1843–1846. [CrossRef]
51. Xu, T.; Darwazeh, I. Uplink Narrowband IoT Data Rate Improvement: Dense Modulation Formats or
Non-Orthogonal Signal Waveforms? In Proceedings of the 2018 IEEE 29th Annual International Symposium
on Personal, Indoor and Mobile Radio Communications (PIMRC), Bologna, Italy, 9–12 September 2018;
pp. 142–146. [CrossRef]
52. Zou, J.; Xu, C. Frequency Offset Tolerant Synchronization Signal Design in NB-IoT. Sensors 2018, 18, 4077.
[CrossRef]
53. Lin, X.; Adhikary, A.; Eric Wang, Y. Random Access Preamble Design and Detection for 3GPP Narrowband
IoT Systems. IEEE Wirel. Commun. Lett. 2016, 5, 640–643. [CrossRef]
69
Sensors 2019, 19, 2613
54. Cho, S.; Kim, H.; Jo, G. Determination of Optimum Threshold Values for NPRACH Preamble Detection
in NB-IoT Systems. In Proceedings of the 2018 Tenth International Conference on Ubiquitous and Future
Networks (ICUFN), Prague, Czech Republic, 3–6 July 2018; pp. 616–618.
55. Feltrin, L.; Condoluci, M.; Mahmoodi, T.; Dohler, M.; Verdone, R. NB-IoT: Performance Estimation and
Optimal Configuration. In Proceedings of the European Wireless 24th European Wireless Conference,
Catania, Italy, 2–4 May 2018.
56. Shimura, A.; Sawahashi, M.; Nagata, S.; Kishiyama, Y. Physical Cell ID Detection Performance Applying
Frequency Diversity Reception to NPSS and NSSS for NB-IoT. In Proceedings of the 24th Asia-Pacific
Conference on Communications (APCC), Ningbo, China, 12–14 November 2018.
57. Martín, A.G.; Leal, R.P.; Armada, A.G.; Durán, A.F. NBIoT Random Access Procedure: System Simulation
and Performance. In Proceedings of the Global Information Infrastructure and Networking Symposium
(GIIS), Thessaloniki, Greece, 23–25 October 2018.
58. Baracat, G.H.; Brito, J.M.C. NB-IoT Random Access Procedure Analysis. In Proceedings of the 2018 IEEE 10th
Latin-American Conference on Communications (LATINCOM), Guadalajara, Mexico, 14–16 November 2018;
pp. 1–6. [CrossRef]
59. M, Y.; Cheng, Y.; Hossain, J.; Ahmed, M.S.G. RADB: Random Access with Differentiated Barring for
Latency-Constrained Applications in NB-IoT Network. Wirel. Commun. Mob. Comput. 2018, 2018, 6210408.
60. Jeon, W.S.; Seo, S.B.; Jeong, D.G. Effective Frequency Hopping Pattern for ToA Estimation in NB-IoT Random
Access. IEEE Trans. Veh. Technol. 2018, 67, 10150–10154. [CrossRef]
61. Li, Y.; Chen, S.; Ye, W.; Lin, F. A Joint Low-Power Cell Search and Frequency Tracking Scheme in NB-IoT
Systems for Green Internet of Things. Sensors 2018, 18, 3274. [CrossRef] [PubMed]
62. Ha, S.; Seo, H.; Moon, Y.; Lee, D.; Jeong, J. A Novel Solution for NB-IoT Cell Coverage Expansion.
In Proceedings of the Global Internet of Things Summit (GIoTS), Bilbao, Spain, 4–7 June 2018.
63. Chung, H.; Lee, S.; Jeong, J. NB-IoT Optimization on Paging MCS and Coverage Level. In Proceedings
of the 15th International Symposium on Wireless Communication Systems (ISWCS), Lisbon, Portugal,
28–31 August 2018; pp. 1–5.
64. Živic, N. Improved Up-Link Repetition Procedure for Narrow Band Internet of Things. In Proceedings of
the International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas,
NV, USA, 13–15 December 2018.
65. Zhang, L.; Ijaz, A.; Xiao, P.; Tafazolli, R. Channel Equalization and Interference Analysis for Uplink
Narrowband Internet of Things (NB-IoT). IEEE Commun. Lett. 2017, 21, 2206–2209. [CrossRef]
66. Yang, B.; Zhang, L.; Qiao, D.; zhao, G.; Imran, M. Narrowband Internet of Things (NB-IoT) and LTE Systems
Co-existence Analysis. In Proceedings of the 2018 IEEE Global Communications Conference (GLOBECOM),
Abu Dhabi, UAE, 9–13 December 2018.
67. Rusek, F.; Hu, S. Sequential channel estimation in the presence of random phase noise in NB-IoT systems.
In Proceedings of the IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio
Communications (PIMRC), Montreal, QC, Canada, 8–13 October 2017.
68. Mangalvedhe, N.; Ratasuk, R.; Ghosh, A. NB-IoT deployment study for low power wide area cellular IoT.
In Proceedings of the IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio
Communications (PIMRC), Valencia, Spain, 4–8 September 2016.
69. Malik, H.; Pervaiz, H.; Mahtab Alam, M.; Le Moullec, Y.; Kuusik, A.; Ali Imran, M. Radio Resource
Management Scheme in NB-IoT Systems. IEEE Access 2018, 6, 15051–15064. [CrossRef]
70. Yu, Y.; Tseng, S. Downlink Scheduling for Narrowband Internet of Things (NB-IoT) Systems. In Proceedings
of the IEEE 87th Vehicular Technology Conference (VTC Spring), Porto, Portugal, 3–6 June 2018.
71. Liu, J.; Mu, Q.; Liu, L.; Chen, L. Investigation about the paging resource allocation in NB-IoT.
In Proceedings of the 20th International Symposium on Wireless Personal Multimedia Communications
(WPMC), Bali, Indonesia, 17–20 December 2017.
72. Kim, H.; Cho, S.C.; Lee, Y. Interference Analysis of Guardband NB-IoT System. In Proceedings
of the International Conference on Information and Communication Technology Convergence (ICTC),
Sydney, NSW, Australia, 4–7 June 2017.
73. Hsieh, B.; Chao, Y.; Cheng, R.; Nikaein, N. Design of a UE-specific uplink scheduler for narrowband
Internet-of-Things (NB-IoT) systems. In Proceedings of the 3rd International Conference on Intelligent
Green Building and Smart Grid (IGBSG), Yi-Lan, Taiwan, 22–25 April 2018.
70
Sensors 2019, 19, 2613
74. Andres-Maldonado, P.; Ameigeiras, P.; Prados, J.; Ramos, J.; Navarro-Ortiz, J.M.; Lopez-Soler, J. Analytic
Analysis of Narrowband IoT Coverage Enhancement Approaches. In Proceedings of the 2018 Global Internet
of Things Summit (GIoTS), Bilbao, Spain, 4–7 June 2018; pp. 1–6.
75. Yu, C.; Yu, L.; Wu, Y.; He, Y.; Lu, Q. Uplink Scheduling and Link Adaptation for Narrowband Internet of
Things Systems. IEEE Access 2017, 5, 1724–1734. [CrossRef]
76. Jiang, Z.; Han, B.; Chen, P.; Yang, F.; Bi, Q. On Novel Access and Scheduling Schemes for IoT Communications.
Mob. Inf. Syst. 2016, 2016, 1–9. [CrossRef]
77. Oh, S.; Shin, J. An Efficient Small Data Transmission Scheme in the 3GPP NB-IoT System. IEEE Commun. Lett.
2017, 21, 660–663. [CrossRef]
78. Cluzel, S.; Franck, L.; Radzik, J.; Cazalens, S.; Dervin, M.; Baudoin, C.; Dragomirescu, D. 3GPP NB-IOT
Coverage Extension Using LEO Satellites. In Proceedings of the IEEE 87th Vehicular Technology Conference
(VTC Spring), Porto, Portugal, 3–6 June 2018.
79. Lauridsen, M.; Krigslund, R.; Rohr, M.; Madueno, G. An Empirical NB-IoT Power Consumption Model for
Battery Lifetime Estimation. In Proceedings of the IEEE 87th Vehicular Technology Conference (VTC Spring),
Porto, Portugal, 3–6 June 2018.
80. Lee, J.; Lee, J. Prediction-Based Energy Saving Mechanism in 3GPP NB-IoT Networks. Sensors 2017, 17, 2008.
[CrossRef] [PubMed]
81. Bello, H.; Jian, X.; Wei, Y.; Chen, M. Energy-Delay Evaluation and Optimization for NB-IoT PSM with
Periodic Uplink Reporting. IEEE Access 2019, 7, 3074–3081. [CrossRef]
82. Khan, S.; Malik, H.; Alam, M.; Le Moullec, Y. DORM: Narrowband IoT Development Platform and Indoor
Deployment Coverage Analysis. In Proceedings of the 2nd International Workshop on Recent Advances in
Cellular Technologies and 5G for IoT Environments (RACT-5G-IoT 2019), Leuven, Belgium, 29 April–2 May 2019.
83. Kim, T.; Kim, D.M.; Pratas, N.; Popovski, P.; Sung, D.K. An Enhanced Access Reservation Protocol With
a Partial Preamble Transmission Mechanism in NB-IoT Systems. IEEE Commun. Lett. 2017, 21, 2270–2273.
[CrossRef]
84. 3GPP. Architecture Enhancements to Facilitate Communications with Packet Data Networks and
Applications. 2017. Available online: https://portal.3gpp.org/desktopmodules/Specifications/
SpecificationDetails.aspx?specificationId=862 (accessed on 20 April 2019).
85. 3GPP. TS 23.401 V14.3.0. 2017. Available online: https://portal.3gpp.org/desktopmodules/Specifications/
SpecificationDetails.aspx?specificationId=849 (accessed on 25 April 2019).
86. Andres-Maldonado, P.; Ameigeiras, P.; Prados-Garzon, J.; Navarro-Ortiz, J.; Lopez-Soler, J.M. Narrowband
IoT Data Transmission Procedures for Massive Machine-Type Communications. IEEE Netw. 2017, 31, 8–15.
[CrossRef]
87. Mohamed, M.O.; Abdelhamid, B.; El Ramly, S. Interference mitigation in heterogeneous networks using
Fractional Frequency Reuse. In Proceedings of the International Conference on Wireless Networks and
Mobile Communications (WINCOM), Fez, Morocco, 26–29 October 2016.
88. Monteiro, N.; Mihovska, A.; Rodrigues, A.; Prasad, N.; Prasad, R. Interference analysis in a LTE-A HetNet
scenario: Coordination vs. uncoordination. In Proceedings of the Wireless VITAE 2013, Atlantic City, NJ, USA,
24–27 June 2013.
89. Palanisamy, P.; Nirmala, S. Downlink interference management in femtocell networks—A comprehensive
study and survey. In Proceedings of the International Conference on Information Communication and
Embedded Systems (ICICES), Chennai, India, 21–22 Feburary 2013.
90. Song, S.; Li, H.; Fan, Y.; Kong, W.; Zhang, W. Downlink Interference Rejection in Ultra Dense Network.
In Proceedings of the 13th APCA International Conference on Control and Soft Computing (CONTROLO),
Ponta Delgada, Portugal, 4–6 June 2018; pp. 361–364.
91. Chiumento, A.; Pollin, S.; Desset, C.; der Perre, L.V.; Lauwereins, R. Scalable HetNet interference
management and the impact of limited channel state information. EURASIP J. Wirel. Commun. Netw.
2015, 2015, 74. [CrossRef]
92. Oo, T.; Tran, N.H.; Saad, W.; Niyato, D.; Han, Z.; Hong, C. Offloading in HetNet: A Coordination of
Interference Mitigation, User Association, and Resource Allocation. IEEE Trans. Mob. Comput. 2017,
16, 2276–2291. [CrossRef]
93. Liou, R.H.; Lin, Y.B.; Tsai, S.C. An Investigation on LTE Mobility Management. IEEE Trans. Mob. Comput.
2013, 12, 166–176. [CrossRef]
71
Sensors 2019, 19, 2613
94. Karandikar, A.; Akhtar, N.; Mehta, M. Mobility Management in LTE Networks. In Mobility Management in
LTE Heterogeneous Networks; Springer: Berlin, Germany, 2017.
95. Francois, F.; Abdelrahman, O.H.; Gelenbe, E. Impact of Signaling Storms on Energy Consumption and
Latency of LTE User Equipment. In Proceedings of the 2015 IEEE 17th International Conference on High
Performance Computing and Communications, New York, NY, USA, 24–26 August 2015.
96. Koc, A.T.; Jha, S.C.; Vannithamby, R.; Torlak, M. Device Power Saving and Latency Optimization in LTE-A
Networks Through DRX Configuration. IEEE Trans. Wirel. Comm. 2014, 13, 2614–2625.
97. Nikaein, N.; Krea, S. Latency for Real-Time Machine-to-Machine Communication in LTE-Based System
Architecture. In Proceedings of the 17th European Wireless 2011—Sustainable Wireless Technologies,
Vienna, Austria, 27–29 April 2011.
98. Laya, A.; Alonso, L.; Alonso-Zarate, J. Is the Random Access Channel of LTE and LTE-A Suitable for M2M
Communications? A Survey of Alternatives. IEEE Commun. Surv. Tutor. 2013, 16, 4–16. [CrossRef]
99. Cheng, J.; Lee, C.; Lin, T. Prioritized Random Access with dynamic access barring for RAN overload in
3GPP LTE-A networks. In Proceedings of the 2011 IEEE GLOBECOM Workshops (GC Wkshps), Houston,
TX, USA, 5–9 December 2011.
c 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access
article distributed under the terms and conditions of the Creative Commons Attribution
(CC BY) license (http://creativecommons.org/licenses/by/4.0/).
72
sensors
Article
Aggregated Throughput Prediction for Collated
Massive Machine-Type Communications in 5G
Wireless Networks
Ahmed Adel Aly 1, *, Hussein M. ELAttar 2, *, Hesham ElBadawy 3, * and Wael Abbas 1
1 Department of Basic and Applied Sciences. Arab Academy for Science, Technology and Maritime
Transport (AASTMT), Cairo P.O. Box 2033, Egypt; [email protected]
2 Department of Electronics and Communications Engineering. Arab Academy for Science, Technology and
Maritime Transport (AASTMT), Cairo P.O. Box 2033, Egypt
3 Network Planning Department, National Telecommunication Institute (NTI), Cairo 11432, Egypt
* Correspondence: [email protected] (A.A.A.); [email protected] (H.M.E.); [email protected] (H.E.)
Abstract: The demand for extensive data rates in dense-traffic wireless networks has expanded
and needs proper controlling schemes. The fifth generation of mobile communications (5G) will
accommodate these massive communications, such as massive Machine Type Communications
(mMTC), which is considered to be one of its top services. To achieve optimal throughput, which is
considered a mandatory quality of service (QoS) metric, the carrier sense multiple access (CSMA)
transmission attempt rate needs optimization. As the gradient descent algorithms consume a long
time to converge, an approximation technique that distributes a dense global network into local
neighborhoods that are less complex than the global ones is presented in this paper. Newton’s method
of optimization was used to achieve fast convergence rates, thus, obtaining optimal throughput.
The convergence rate depended only on the size of the local networks instead of global dense
ones. Additionally, polynomial interpolation was used to estimate the average throughput of the
network as a function of the number of nodes and target service rates. Three-dimensional planes of
the average throughput were presented to give a profound description to network’s performance.
The fast convergence time of the proposed model and its lower complexity are more practical than
the previous gradient descent algorithm.
1. Introduction
The evolution of the fifth generation of cellular mobile systems (5G) has become one of the most
significant fields for commercial applications. The 5G system is promising to increase data rates by
10 times that of the traditional Long-Term Evolution (LTE) networks, to an average of 10 Gbps with
a 1 ms round-trip latency. This high bandwidth is to accommodate an enormous number of connected
devices per unit area under the Internet of Things (IoT) framework [1]. In fact, the 5G requirement
covers a wide range of core services, specifically the massive Machine-Type Communications (mMTC)
is one of the top three services. The other core services being the ultra-reliable low latency (URLLC) and
the extreme mobile broadband (eMBB) communications [2]. The services in mMTC are defined by large
numbers of linked devices that are generally transmit data traffic. It includes algorithms, mechanisms,
and techniques that permit the exchange of information or data without explicit human involvement.
Recent research studies have shown that most of the existing machine-type communications suffer
from limited coverage and access reservation. Currently, the procedure for reserving access is limited
to a low number of devices and each device requires high data rates [3]. The main challenge in mMTC
is the need for efficient connectivity for this massive number of devices that share packets of data.
Additionally, mMTC suffers from losses in data packets due to heavy traffic and congestions. a proper
way to overcome these data losses is to provide suitable quality of service (QoS) requirements such as
high network throughput with low latency.
In [4], an overview of key radio resource management techniques for 5G dense small cells
was studied. Preliminary system-level simulation results indicated that a mean throughput gain of
around 63% and up to 84% in latency reduction can be achieved by utilizing resource management
techniques. In [5], an efficient online scheme was proposed for predicting channel state information
from historical data, in 5G wireless communication systems. The experiment results showed
that the scheme not only obtained the predicted channel state information values very quickly
but also achieved highly accurate predictions with up to 2.650%–3.457% average difference ratio
between the prediction and measurements. In [6], a new Machine-to-Machine (M2M) communication
paradigm based on cognitive radio technology was studied, namely the cognitive M2M communication.
The cognitive M2M network architecture and cognitive machine model is presented and the coexistence
of cognitive M2M devices in TV white spaces was discussed. Additionally, a spectrum exploration
scheme motivated by energy-efficiency was introduced. Numerical results show important energy
savings and efficiency in providing smart grid data transmission. In [7], device-to-device (D2D)
energy-efficient resource allocation algorithm was introduced. To enhance QoS efficiency, a distributed
interference mitigation mechanism consisting of a method for canceling interference and a method
for optimizing transmission power constraint was discussed. Simulations analyze the achievable
performance of the proposed algorithm and discuss implementation and complexity. Additionally,
intelligent energy management based on the safe transfer of information between millions of sensors
and actuators installed with little or no human involvement was developed in [8]. By investigating the
inclusion of software-defined networking with machine-to-machine communication, this motivates
the study of a coherent communication structure for intelligent energy management. The proposed
software-defined machine-to-machine system was described, with a focus on its price reduction,
resource allocation, and end-to-end service quality assurance. In [9], two-stage access control and
resource allocation algorithm were developed. In the first phase, a contract-based incentive system
was introduced to motivate some delay-tolerant machine-type communication equipment. a long-term
cross-layer online resource allocation method was suggested in the second phase, which optimized
rate control, energy allocation, and channel choice, without previous channel state information. Finally,
under different simulation situations, the performance of the suggested algorithm was verified.
On the other hand, optimizations regarding carrier sense multiple access with collision avoidance
(CSMA/CA) have met with great success in different applications. Research on CSMA/CA has
a long tradition for years, on which a node senses the channel before transmitting on a shared
transmission medium to avoid collision of data in wireless networks [10]. Recent papers [11–14]
proposed various CSMA/CA scheduling algorithms that are able to optimize network QoS metrics,
particularly the network throughput. In [11], a CSMA scheme was formulated in which throughput
and power consumption of each node were optimized by controlling back-off and sleeping timers,
while ensuring throughput optimality. In [12], link throughput was analyzed by taking back-off
collisions into account; a model was formed to characterize the collision effect among the network’s
nodes. Results showed that their model was robust against different network topologies. In [13],
the performance of CSMA network’s throughput was studied under the signal to interference and noise
ratio (SINR) model, where a packet was received as long as a certain SINR threshold was exceeded.
In [14], they provided effective carrier sensing threshold adjustment algorithms for large wireless
CSMA networks. Simulation for evaluating consistency and goodput guaranteed safe interference.
They also introduced dynamic signal detection thresholds depending on neighboring transmission
feedback. In [15], a distributed iterative algorithm was studied, which produced approximate solutions
motivated by an approximation that allowed the expression of approximate solutions via a certain
non-linear system with a polynomial size. Numerical results showed that the algorithm produced
74
Sensors 2019, 19, 3651
highly accurate solutions and converged much faster than previous studies. In [16], a distributed
scheduling algorithm for the SINR model was studied and proved to be throughput optimal. Further,
the algorithm was augmented by using a parallel update technique and the numerical results showed
a good performance in terms of a supportable throughput and the convergence rate to steady-state.
Moreover, a random access channel evaluation and load estimation of a large number of MTC devices
were developed in [17]. a closed-form expression and an effective approach for achieving the Joint
Probability Distribution Function (PDF) were extracted from the amount of effective and collided access
requests within a random access opportunity. Numerical results justified their formulation’s efficiency
and demonstrated that the computational cost was smaller than that of other similar techniques.
There has been extensive consideration to the issue of connection scheduling for peak throughput
performance with a focus on the maximum weight scheduling model established in [18,19]. Despite its
optimization characteristic, a central controller is needed. In addition, solving for each schedule
choice is a non-deterministic polynomial-time hard (NP-hard) problem. Various studies have tried
to modify the algorithm of maximal weight to make it easier to deploy [20–22]. Such methods are
greedy and might not, however, attain an optimized performance. a series of articles [23–25] optimized
the throughput calculations for a group of connection scheduling schemes called adaptive CSMA,
which can, thus, maintain any attainable rate. In particular, the transmission attempt rate was tuned
by each connection to guarantee adequate average desired rates of service.
In [26], the transmission attempt rate was adjusted in the CSMA algorithm to support the required
target service rates. This technique poses a problem in adjusting the transmission attempt rate
parameter, as it is an NP-hard problem, which is difficult to handle. In addition, most of the research in
this field aims at solving this problem using a stochastic gradient descent algorithm which is an iterative
optimization method for differentiable objective functions [23]. The drawback of this method is that it
consumes millions of iterations to converge. Unfortunately, this approach results in an impractical
time of convergence depending on the size of the network. Few studies focus on using a proper SINR
model for interference, as most of the studies just settled with using interference model based on
conflict graph [23–25].
The work in this paper aimed to enhance the performance of global dense networks with a CSMA
scheduling algorithm under a more practical and realistic SINR model, to adequately capture the
complexity of wireless network interferences. In addition, by utilizing an approximation technique
to overcome large network sizes, the optimization problem could be solved as the approximation
technique distributes large networks into smaller ones. The size of the network and node distance
with its neighbors is independent of the size of the whole large network. Thus, the solution to
such optimization is achievable due to the scale of the small networks. This means that the global
optimization function of the transmission attempt rate parameter in CSMA is distributed into local
optimization functions for each node and its neighbors. The local optimization function is then
solved using Newton’s method of optimization instead of stochastic gradient descent, as it has a faster
convergence rate [26]. The achievable service rate of each link is then calculated and its percentage
error with the target service rate is formulated. In addition, the average throughput is finally calculated.
The whole process is repeated under different network operational parameters as SINR thresholds,
target service rates, and the number of nodes, to emphasize their effect on the average throughput.
The main contribution of the presented work is giving a full description of the effect of changing
network operational parameters on the average throughput and proving asymptotic relations using
polynomial interpolation that describes the following.
• Throughput as a function of both target service rates and SINR threshold for a given number
of nodes.
• Throughput as a function of both the number of nodes and the target service rates for a given
SINR threshold.
• Maximum throughput for a different number of nodes at different SINR thresholds.
75
Sensors 2019, 19, 3651
The proposed model proves its robustness against the increasing number of nodes due to its dependence
on the local network size instead of the global one. The model also provides efficient asymptotic
throughput relations to be used for estimating the performances of such wireless networks.
The rest of the paper is organized as follows. In Section 2, the system model is described,
Section 2.1 describes the used CSMA scheduling algorithm and the research problem is explained.
In Section 2.2, the global optimization function is introduced while the distributed local networks
algorithm and its model are described in Section 2.3. In Section 2.4, the computational complexity
is explained, Section 2.5 discusses the polynomial interpolation technique, and Section 2.6 analyzes
the delay performance. In Section 3, the numerical analysis of the proposed model is obtained and
described. Results are discussed in Sections 4 and 5 concludes the work and results.
The used parameters and variables in the following sections and their descriptions are summarized
and given in Table 1.
Parameter/Variable Description
dii Distance between transmitter and receiver of same node i.
dij Distance between two nodes i and j.
N Total number of nodes.
Nj Number of nodes at node j neighborhood.
Schedule of the network where xi (t) = 1 means that link i is active and
x(t)
transmitting data and xi (t) = 0 means that link i is not active.
Close-in-Radius distance where interference is neglected if distances between
R
nodes exceeded it.
SINR Signal to Interference and Noise Ratio.
pi Transmit power of link i.
α Path loss exponent.
ω The variance of the Gaussian thermal noise present at all receivers.
T SINR threshold that has to be exceeded to ensure successful data reception.
I List of all feasible schedules.
λ Transmission attempt rate
The long-term service rate of node i which is the marginal probability that
si
node i is active.
1(x ∈ I ) The indicator for the feasibility of the schedule.
z Normalizing constant.
r Transmission aggressiveness.
The feasible schedule such that yk = 0 means that node k is inactive while
yk
yk = 1 indicates that node k is active and meets the required SINR threshold.
Th Average Normalized Throughput.
Th_max
Maximum Normalized Throughput
e st The approximate error between the achieved and the target service rates.
P(x) the stationary distribution of the CSMA Markov chain
2. System Model
The model used in this article is based on a single-hop wireless network. Each node is formed from
a pair of transmitter and receiver similar to the bipole model in [27], the distance between transmitter
and receiver is dii for node i. N is defined as the total number of nodes in the network model. Let dij be
the distance between two nodes i and j.
For scheduling data transmissions between nodes, x(t) is defined as the schedule of the network;
it can also be referred to as x. In other words, xi (t) = 1 indicates that node i is active at time slot t and
during data transmission. Two nodes are considered to be neighbors and interfere with each other if
the distance between them is less than or equals to R (Close-in-Radius). Interference between nodes is
neglected if they are not neighbors or, in other words, the distance between them is higher than R as
shown in Figure 1.
76
Sensors 2019, 19, 3651
Figure 1. Local Neighborhood network as a part of the global network, the maximum distance between
a node (a pair of transmitter and receiver) and its neighbors is the Close-in-Radius distance R
Pi dii −α
SINR = −α + ω
, (1)
{j∈ N j , jI, x j (t)=1} P j d ji
where P j is the transmitting power of node j, α is the path loss exponent of the standard path loss
model |d|−α . ω is the variance of the Gaussian thermal noise present at all receivers. N j is a set of node
j and its neighbors.
The condition for xi (t) = 1 (Node i is active and transmitting data) is SINR ≥ T; T is the SINR
presumed threshold constraint. If all active nodes in a schedule satisfy this condition, their schedule is
called a feasible schedule. The list of all feasible schedules is defined as I, where receivers are able to
receive data successfully.
end if
end if
77
Sensors 2019, 19, 3651
It can be shown in [25] that the adaptive CSMA algorithm induces a Markov chain on the state
space of the schedules {0, 1}N . Further, the stationary distribution of the Markov chain, parametrized by
the transmission attempt rate vector λ = [λi ]N i=1 , is given by:
1
p(x) = λ j 1(x ∈ I ), ∀ x ∈ {0, 1}N , (2)
z
j:x j =1
where 1(x ∈ I ) is an indicator of x being a feasible schedule, and z is the normalizing constant. Then,
due to the ergodicity of the Markov chain, the long-term service rate of a node i denoted by si is
equal to the marginal probability that node i is active, i.e., pi (xi = 1). Thus, the service rates and the
transmission attempt rates are related as follows:
1
si = pi (1) = λ j, ∀ i ∈ N , (3)
z
x: xi =1 j:x j =1
where pi (1) denotes pi (xi = 1). The adaptive CSMA algorithm can support any service provided that
appropriate transmission attempt rates are used for the underlying distribution [28]. If the desired
service rates are known, these transmission attempt rates can be obtained by solving the system of
equations in Equation (3).
Assume that each node i has a capacity of 1. If node i transmits data all the time (without affecting
other nodes), then its service rate is 1 (unit of data per unit time). Then, si (r) is also the normalized
service rate with respect to the node capacity.
The following concave function G(r) can be maximized by choosing a suitable value of
the transmission aggressiveness r, this maximization is equivalent to the minimization of the
Kullback–Leibler divergence between the arrival rate and the service rate distribution functions
as established in [29].
To solve Equation (4), the distributed stochastic gradient descent algorithm was used [23].
However, the gradient of (4) estimation was calculated in a distributed manner and took an impractical
time of convergence in order to reach steady state. In order to rectify this problem, the proposed
global optimization function was divided into separate and scalable approximated local optimization
functions and, finally, these local functions were appropriately combined for estimating the solution to
the global problem. The target service rates were assumed as predefined for each node.
78
Sensors 2019, 19, 3651
where r j = [r jk ]k∈ N is the local transmission aggressiveness of node j, y = [ yk ]k∈N j ∈ {0, 1}N j is the
j
local feasible schedule at node j such that y j = 0 means that node j is inactive and y j = 1 indicates that
node j is active and exceeds the SINR threshold. s( j) = {sk
k ∈ N j is the local service rate vector of
node j.
Due to the downscaling of the global network dimensions, the solution might be simplified
by solving local optimization functions. The local solutions of the transmission attempt rate are
then combined to produce a global transmission attempt rate that can be directly used in the CSMA
algorithm. This process is chosen over the adaptation of transmission attempt rates using a stochastic
gradient descent that requires extensive time to converge on the global function. Each node in the
network executes (Algorithm 2) in parallel to get the average normalized throughput.
(7) Use Polynomial interpolation to form the average normalized throughput equations as a function of
either—number of nodes and target service rates or SINR threshold and target service rates. Polynomial
interpolation is also used to get the maximum normalized throughput as a function of the number
of nodes.
79
Sensors 2019, 19, 3651
The approximate global transmission attempt rate λ that can be directly applied to the CSMA
SINR threshold scheduling algorithm (Algorithm 1) is given by:
|N j |−1
1 − sj
λ = erk j , (9)
sj
k∈N j
where s j is the target service rate of link j,
N j
is the number of nodes in the local neighborhood of
node j. The transmission aggressiveness is rk j , k ∈ N j is the optimized parameter in Step (2) of node j
and its presence in every local neighborhood.
Newton’s method of optimization used in Step (2) is used to optimize the local optimization
function (6) [30]. It can be computed without complexity due to its relatively smaller size as compared
to the global function and is given by:
where z j is the local normalization constant of node j and its neighbors. I j is a list of all feasible
schedules of node j and its neighbors. The gradient of (6) is given by:
where θ is the variable of the function f and n is the degree of the polynomial.
80
Sensors 2019, 19, 3651
The solution of Equation (14) is computed using the Vandermonde matrix [33] formed in
Equation (15), in order to calculate the coefficient an given both θ and f :
⎡ ⎤⎡ ⎤ ⎡ ⎤
⎢⎢ 1 θ1 θ21 ··· θm ⎥⎥⎢⎢ a0 ⎥⎥ ⎢⎢ f0 ⎥⎥
⎢⎢ 1
⎥⎥⎥⎢⎢⎢ ⎥⎥ ⎢⎢ ⎥⎥
⎢⎢ 1 θ2 θ22 ··· θm ⎥⎥⎢⎢ a1 ⎥⎥ ⎢⎢ f1 ⎥⎥
⎢⎢ ⎥⎥ ⎢⎢ ⎥⎥
⎥⎥⎥⎢⎢⎢
2
⎢⎢ 1 θ3 θ23 ··· θm ⎥⎥ ⎢⎢ ⎥⎥
⎢⎢ ⎥⎥⎢⎢ a2 ⎥⎥ = ⎢⎢ f2 ⎥⎥ , (15)
⎢⎢ 3 ⎥⎥⎢⎢ ⎥⎥ ⎢⎢ ⎥⎥
⎢⎢ .. .. .. .. .. ⎥⎥⎢⎢ .. ⎥⎥ ⎢⎢ .. ⎥⎥
⎢⎢ . . . . . ⎥⎥⎢⎢ . ⎥⎥ ⎢⎢ . ⎥⎥
⎢⎣ ⎦⎥⎣⎢ ⎦⎥ ⎣⎢ ⎥⎦
1 θn θ2n ··· θmn am fn
Another form of the polynomial interpolation used in this work is the bicubic interpolation for
a function of two variables, such as:
Equations (15) and (17) are solved using the Gaussian elimination method [34] until a reduced
echelon form is reached; hence, the values of the coefficients are computed. In Step (7),
Polynomial interpolation is used to obtain the average normalized throughput as a function of
either number of nodes and target service rates or SINR threshold and target service rates. Polynomial
interpolation is also used to get the maximum normalized throughput as a function of the number
of nodes.
3. Results
In this section numerical analysis are used to estimate the performance of the proposed algorithm.
Random topology graphs are considered with a different number of nodes to test the robustness of
the model. Random networks are generated by placing nodes on a two-dimensional area of length of
12 unit distance. The system parameters are summarized in Table 2.
Random networks are generated with varying densities from 10 up to 100 nodes, and vertices are
drawn when nodes are neighbors and interfere with each other. The total number of links is higher
than the total number of nodes, but it does not reach the mesh topology where the number of links
equals to N (N − 1)/2. The interference graph of a 100-node random topology is shown in Figure 2.
81
Sensors 2019, 19, 3651
In order to prove the fast convergence rate of the proposed model, Figure 3 shows that the norm
of the gradient in Newton’s method of a random local network sample converges in 4 to 5 iterations.
In Figure 4, the average normalized throughput as a function of the target service rate is shown
for different network topologies of 10, 30, 50, and 100 randomly distributed nodes at 9, 12 and 15 dB
SINR thresholds.
82
Sensors 2019, 19, 3651
(a)
(b)
(c)
Figure 4. Average normalized throughput for a different number of nodes—(a) 9 dB SINR threshold,
(b) 12 dB SINR threshold, and (c) 15 dB SINR threshold.
83
Sensors 2019, 19, 3651
As shown in Figure 4, increasing the SINR threshold shows degradation in throughput, especially at
high-target service rates. This is because the nodes will be unable to transmit until a higher SINR
threshold is met. Meanwhile, it is observed that initially, as target service rate increases, the average
normalized throughput increases until it reaches its maximum. This is where the network works under
“stable operating conditions”. After that point, the network enters “unstable operating conditions”
in which collisions become more likely and the number of backlogged frames increases. This means
that the arrival rate of new frames to the system will be larger than the capability of successful frames
transmission, thus, leading to a decrease of the average normalized throughput.
In order to acquire the obtained results in Figure 4 as a system of asymptotic relations,
polynomial bicubic interpolation algorithm is used. Therefore, the average normalized throughput can
be estimated via the following proposed equation in the general form of:
where Th is the average normalized throughput as a function of the number of nodes N and target
service rate is denoted as S. The constants a0 , . . . , a9 are the constant coefficients in Equation (18) and
are given in Table 3.
SINR
a0 a1 a2 a3 a4 a5 a6 a7 a8 a9
Threshold
T=9 0.3476 −3 × 10−4 0.559 3.5 × 10−6 0.0029 1.096 10−9 −3.4 × 10−5 −0.00466 −1.016
T = 10 0.1716 −4.6 × 10−4 −1.2147 3.4 × 10−6 0.004496 5.442 10−9 −3.26 × 10−5 −0.0064 −3.865
T = 11 −0.314 3.65 × 10−4 4.92 3.3 × 10−6 −0.00486 −8.14 10−9 −3 × 10−5 0.00256 4.28
T = 12 −0.119 8.45 × 10−5 2.49 3.18 × 10−6 −0.00189 −2.97 10−9 2.8 × 10−5 7.5 × 10−4 1.239
T = 13 −0.305 3.65 × 10−4 4.896 4 × 10−6 −0.00614 −8.66 10−9 −3 × 10−5 0.0038 4.81
T = 14 −0.3 1.9 × 10−4 4.898 5.3 × 10−6 −0.0059 −8.73 10−9 −3.4 × 10−5 0.004 4.847
T = 15 −0.0515 −4.25 × 10−4 1.718 6.6 × 10−6 −7.35 × 10−4 −1.597 10−9 −3.76 × 10−4 −5.79 × 10−4 0.447
The interpolation equations are used to describe the missing values between the calculated
throughput results and also give more details in three-dimensional planes of the average normalized
throughput as a function of both target service rates and the number of nodes. In Figure 5, the plane
is represented at different SINR thresholds of 9 up to 15 dB. It can be observed that increasing the
number of transmitting nodes in the network will cause more collisions, thus, leading to a decrease in
the network throughput.
Another way to make use of the polynomial bicubic interpolation is to generate another form of
the previous equation with different parameters, such as:
where Th is the average normalized throughput as a function of target service rate denoted as S and
the SINR threshold T. The constants c0 , . . . , c9 are the constant coefficients in Equation (19) and are
given in Table 4.
Moreover, the previous step of interpolation is repeated to find an asymptotic relation of the
average normalized throughput as a function of both target service rates and the SINR threshold.
In Figure 6, the plane is shown with a number of nodes from 10 up to 100 nodes.
84
Sensors 2019, 19, 3651
(a)
(b)
(c)
85
Sensors 2019, 19, 3651
No. of
c0 c1 c2 c3 c4 c5 c6 c7 c8 c9
Nodes
N = 10 −0.028 −0.00138 1.32 8.95 × 10−5 0.0166 −0.315 10−6 8.95 × 10−4 −0.028 −0.128
N = 20 −0.0367 0.0025 1.25 −1 × 10−4 0.0015 −0.112 10−6 −1.66 × 10−4 −0.03 −0.219
N = 30 −0.069 0.0063 1.5 −2.89 × 10−4 −0.0135 −0.566 10−7 −5.66 × 10−4 −0.0324 0.0755
N = 40 −0.077 0.01069 1.43 −4.8 × 10−4 −0.0328 −0.313 10−7 0.00129 −0.03 −0.0665
N = 50 −0.449 0.01425 0.8649 −6.74 × 10−4 −0.0437 0.9377 10−8 0.002 −0.0365 −0.752
N = 60 −0.0276 0.0143 0.64 −6.76 × 10−4 −0.0428 1.339 10−8 0.00197 −0.036 −1.025
N = 70 −0.0265 0.0143 0.623 −6.79 × 10−4 −0.0419 1.29 10−8 0.0019 −0.036 −1.04
N = 80 −0.134 0.0165 1.942 −6.8 × 10−4 −0.0647 −1.38 10−8 0.00185 −0.012 0.366
N = 90 −0.0599 0.0156 1.006 −6.8 × 10−4 −0.052 0.516 10−9 0.0018 −0.023 −0.77
N = 100 −0.061 0.0156 1.019 −6.86 × 10−4 0.0517 0.409 10−9 0.00175 −0.0229 −0.749
After obtaining the average normalized throughput from the numerical analysis, the maximum
normalized throughput could be extracted. Polynomial cubic interpolation algorithm was used to
concatenate the above figures and define a relation for acquiring the maximum normalized throughput
in the general form of:
Th_max(N ) = k0 + k1 N + k2 N2 , (20)
where Th_max is the maximum normalized throughput as a function of the number of nodes N.
The constants k0 , k1 , and k2 are the constant coefficients in Equation (20) and are given in Table 5.
SINR Threshold k0 k1 k2
S=9 0.6989 −0.003 −4 × 10−7
S = 12 0.6282 0.0033 −7.48 × 10−8
S = 15 0.551 −0.00278 −1.2 × 10−7
The interpolation equations graphs of the maximum normalized throughput are shown in Figure 7
as a function of the number of nodes at the different SINR thresholds from 9 up to 15 dB.
Another way to describe the maximum normalized throughput more generally, using the
polynomial bicubic interpolation is to formulate a plane that is a function of, both, the number of nodes
and the SINR threshold. Therefore, the maximum normalized throughput was estimated using the
following equation as the general form:
Th_max(N, T ) = e0 + e1 N + e2 T + e3 N2 + e4 NT + e5 T2 , (21)
where Th_max is the maximum normalized throughput as a function of the number of nodes N and
the SINR threshold denoted as T. The constants e0 , . . . , e5 are the constant coefficients in Equation (21)
and are given in Table 6.
86
Sensors 2019, 19, 3651
(a)
(b)
(c)
Figure 6. Plane of average normalized throughput generated from the polynomial interpolation for
different SINR thresholds of—(a) 10-node topology, (b) 50-node topology, and (c) 100-node topology.
87
Sensors 2019, 19, 3651
Figure 7. Maximum normalized throughput at different number of nodes for SINR threshold of 9 dB,
12 dB, and 15 dB.
Coefficient e0 e1 e2 e3 e4 e5
Value 0.9213 −0.00345 −0.025 −8.47 × 10−6 9.81 × 10−5 10−5
As a result to Equation (21), the maximum normalized throughput as a function of both the
number of nodes and the SINR threshold can be generated approximately. Different from Equation (20),
the new equation adds the dimension of the SINR threshold to give a more general description and
eases the prediction to be based on two parameters instead of one. Equation (21) is shown in Figure 8
for different number of nodes and SINR thresholds.
Figure 8. Maximum normalized throughput as a function of both the number of nodes and the
SINR threshold.
A sample of error using Equation (7) between the proposed approximation technique and
the stochastic gradient descent algorithm is shown in Figure 9. Where the local approximation
algorithm that calculates the approximate transmission attempt rates uses their static values in the
CSMA algorithm (i.e., they are not adapted during the algorithm). On the other hand, the stochastic
gradient descent algorithm begins with some initial transmission attempt rates, and by observing the
corresponding service rates, it adapts the transmission attempt rates [23].
88
Sensors 2019, 19, 3651
Figure 9. The approximate error of the achievable and the target service rates due to stochastic gradient
descent and the proposed approximation algorithm with 50 nodes distributed with the same random
topology used in this article.
For 5G networks, the error has to be minimum at all target service rates. Additionally, determining
the transmission attempt rate is an NP-hard problem and the stochastic gradient descent is unpractical
as it adapts those transmission attempt rates in several iterations, as shown in the Figure 9. This is why
the proposed approach of pre-calculating those transmission attempt rates and using them directly in
the network helps in reducing the error at most target service rates. The results would be comparable
even at higher rates but there still exists an advantage in the early stages where the network works
under “stable operating conditions”. The error of the proposed model did not exceed 0.06, while the
gradient descent started with an error exceeding 0.2 for a target service rate up to 0.4 unit data per
unit time.
4. Discussion
The proposed model aims at providing possible ways of predicting random network performances
under different circumstances. One thing to mention is that the proposed model is scalable, as it studied
a 10- to 100-node random topology in an area of 12 × 12 square units of distance. This means that if
a 400-node random topology is studied at 24 × 24 square units of distance, the performance will be
similar to the proposed 100-node one. This is due to the dependence of the proposed model on the local
neighborhood size, not the global one. Therefore, what matters is the performance degradation that
would arise from increasing the number of nodes in the same limited area. Additionally, increasing the
given area can allow for fitting a higher number of nodes, as the limited area considered in this work
affects the interference to a great extent, due to the high-density neighborhoods interfering with each
other. Additionally, increasing the number of nodes in the given area to a value higher than the studied
ones might lead to a density (number of nodes/unit area) > 1, which is rarely found and should most
of the time be ≤ 1. Additionally, the resulting model might be used for scalable networks. In other
words, the resulted network could be used to estimate the performance of both small as well as large
networks. The presented analysis is based on the normalized unit area and the normalized throughput,
so it might provide a good performance whatever be the network size.
The proposed polynomial interpolation’s throughput asymptotic relations here are based on the
studied topologies and might lead to other performance prediction if different parameters were used.
To sum up the used parameters here, the SINR threshold was set to 9, 12, and 15 dB, up to 0.9 unit
target service rates, and up to 100 nodes randomly distributed in the unit area were considered.
89
Sensors 2019, 19, 3651
Three-dimensional topologies were applicable and would not have differed much from the
two-dimensional topology used in the proposed model, as the distance was the only matter.
We previously mentioned the close-in-radius R distance as the distance where interference was
neglected if two nodes were at distance > R apart from each other. This radius could either be of a circle
if a two-dimensional topology was considered or a radius of a sphere in case of the three-dimensional
topology. Therefore, at the end what matters is distances at any directions and the three-dimensional
topology could be equivalent to a dense network that is already studied in the proposed model.
Additionally, the main scope of this paper was to calculate the effect of the increasing the number of
nodes on the throughput in dense networks, which is suitable for 5G applications. The energy and the
delay could be considered in details in future work.
5. Conclusions
A CSMA algorithm of a single-hop wireless network was considered under a realistic SINR model.
An approximation algorithm of distributing the global network into downscaled local neighborhoods
was used to calculate the transmission attempt rate to optimize the throughput of the global network.
This was done by achieving target service rates of nodes while varying the number of nodes up to
a random 100-node topology. The proposed model converged fast and proved its robustness against
the increasing number of nodes as it depended only on the size of the local network instead of the
global dense one. Three-dimensional planes of the average normalized throughput were obtained by
polynomial interpolation that produced a complete description of the performance of the network.
Maximum normalized throughput was obtained too as a function of the number of nodes using
polynomial interpolation. The used approach of pre-calculating the transmission attempt rates and
using them directly in the network helped in reducing the error at most values of the target service
rates. Even at higher rates, results would be comparable with a gradient descent algorithm but there
still would exist an advantage in the early stages where the network would work under “stable
operating conditions”. The proposed model is also scalable, so it might provide a network performance,
whatever be its size. Additionally, the proposed model has a faster convergence time and is considered
to be less complex and more practical than the previously used gradient descent algorithm.
Author Contributions: Conceptualization, A.A.A. and H.E.; Investigation, A.A.A. and H.M.E.; Methodology,
A.A.A. and H.M.E.; Project administration, H.E.; Resources, A.A.A.; Software, A.A.A.; Supervision, H.E., H.M.E.
and W.A.; Validation, A.A.A. and H.E.; Visualization, H.E.; Writing—original draft, A.A.A.; Writing—review and
editing, A.A.A., H.M.E., H.E., and W.A.
Funding: This research received no external funding.
Conflicts of Interest: The authors declare no conflict of interest.
References
1. Agiwal, M.; Roy, A.; Saxena, N. Next generation 5G wireless networks: a comprehensive survey. IEEE Commun.
Surv. Tutor. 2016, 18, 1617–1655. [CrossRef]
2. Marsch, P.; Bulakci, Ö.; Queseth, O.; Boldi, M. 5G System Design: Architectural and Functional Considerations
and Long Term Research; John Wiley & Sons: Hoboken, NJ, USA, 2018.
3. Bockelmann, C.; Pratas, N.K.; Wunder, G.; Saur, S.; Navarro, M.; Gregoratti, D.; Vivier, G.; De Carvalho, E.;
Ji, Y.; Stefanović, Č. Towards massive connectivity support for scalable mMTC communications in 5G
networks. IEEE Access 2018, 6, 28969–28992. [CrossRef]
4. Mahmood, N.H.; Lauridsen, M.; Berardinelli, G.; Catania, D.; Mogensen, P. Radio resource management
techniques for eMBB and mMTC services in 5G dense small cell scenarios. In Proceedings of the IEEE 84th
Vehicular Technology Conference, Montréal, QC, Canada, 18–21 September 2016; pp. 1–5.
5. Luo, C.; Ji, J.; Wang, Q.; Chen, X.; Li, P. Channel state information prediction for 5G wireless communications:
a deep learning approach. IEEE Trans. Network Sci. Eng. 2018. [CrossRef]
6. Zhang, Y.; Yu, R.; Nekovee, M.; Liu, Y.; Xie, S.; Gjessing, S. Cognitive machine-to-machine communications:
Visions and potentials for the smart grid. IEEE Netw. 2012, 26, 6–13. [CrossRef]
90
Sensors 2019, 19, 3651
7. Zhou, Z.; Dong, M.; Ota, K.; Wang, G.; Yang, L.T. Energy-efficient resource allocation for D2D communications
underlaying cloud-RAN-based LTE-A networks. IEEE Int. Things J. 2015, 3, 428–438. [CrossRef]
8. Zhou, Z.; Gong, J.; He, Y.; Zhang, Y. Software defined machine-to-machine communication for smart energy
management. IEEE Commun. Mag. 2017, 55, 52–60. [CrossRef]
9. Zhou, Z.; Guo, Y.; He, Y.; Zhao, X.; Bazzi, W.M. Access Control and Resource Allocation for M2M
Communications in Industrial Automation. IEEE Trans. Ind. Inform. 2019, 15, 3093–3103. [CrossRef]
10. Wyglinski, A.M.; Pu, D. Digital Communication Systems Engineering with Software-Defined Radio; Artech House:
Norwood, MA, USA, 2013.
11. Maatouk, A.; Assaad, M.; Ephrmmides, A. Energy efficient and throughput optimal CSMA scheme. IEEE ACM
Trans. Netw. 2019, 27, 316–329. [CrossRef]
12. Kai, C.; Zhang, S.; Wang, L. Impacts of packet collisions on link throughput in CSMA wireless networks.
China Commun. 2018, 15, 1–14. [CrossRef]
13. Sun, X. Maximum throughput of CSMA networks with capture. IEEE Wirel. Commun. Lett. 2016, 6, 86–89.
[CrossRef]
14. Chau, C.; Ho, I.W.; Situ, Z.; Liew, S.C.; Zhang, J. Effective static and adaptive carrier sensing for dense
wireless CSMA networks. IEEE Trans. Mobile Comput. 2016, 16, 355–366. [CrossRef]
15. Yun, S.Y.; Shin, J.; Yi, Y. CSMA using the Bethe approximation for utility maximization. In Proceedings of the
2013 IEEE International Symposium on Information Theory, Istanbul, Turkey, 7–12 July 2013; pp. 206–210.
16. Swamy, P.S.; Ganti, R.K.; Jagannathan, K. Spatial CSMA: a distributed scheduling algorithm for the SIR
model with time-varying channels. In Proceedings of the IEEE Twenty First National Conference on
Communications, Mumbai, India, 27 February–1 March 2015; pp. 1–6.
17. Tello-Oquendo, L.; Pla, V.; Leyva-Mayorga, I.; Martinez-Bauset, J.; Casares-Giner, V.; Guijarro, L.
Efficient random access channel evaluation and load estimation in LTE-A with massive MTC. IEEE Trans.
Veh. Technol. 2018, 68, 1998–2002. [CrossRef]
18. TassiulAs, L.; Ephremides, A. Stability properties of constrained queueing systems and scheduling policies
for maximum throughput in multihop radio networks. In Proceedings of the 29th IEEE Conference on
Decision and Control, Honolulu, HI, USA, 5–7 December 1990; pp. 2130–2132.
19. Tassiulas, L.; Ephremides, A. Dynamic server allocation to parallel queues with randomly varying connectivity.
IEEE Trans. Inform. Theory 1993, 39, 466–478. [CrossRef]
20. Chaporkar, P.; Kar, K.; Luo, X.; Sarkar, S. Throughput and fairness guarantees through maximal scheduling
in wireless networks. IEEE Trans. Inform. Theory 2008, 54, 572–594. [CrossRef]
21. Dimakis, A.; Walrand, J. Sufficient conditions for stability of longest-queue-first scheduling: Second-order
properties using fluid limits. Adv. Appl. Probab. 2006, 38, 505–521. [CrossRef]
22. Wu, X.; Srikant, R.; Perkins, J.R. Queue-Length Stability of Maximal Greedy Schedules in Wireless Networks.
Available online: http://ita.ucsd.edu/workshop/06/papers/262.pdf (accessed on 19 August 2019).
23. Jiang, L.; Walrand, J. a distributed CSMA algorithm for throughput and utility maximization in wireless
networks. IEEE/ACM Trans. Netw. 2010, 18, 960–972. [CrossRef]
24. Rajagopalan, S.; Shah, D.; Shin, J. Network adiabatic theorem: An efficient randomized protocol for contention
resolution. ACM SIGMETRICS Perform. Eval. Rev. 2009, 37, 133–144.
25. Ni, J.; Tan, B.; Srikant, R. Q-CSMA: Queue-length-based CSMA/CA algorithms for achieving maximum
throughput and low delay in wireless networks. IEEE/ACM Trans. Netw. 2012, 20, 825–836.
26. Swamy, P.S.; Ganti, R.K.; Jagannathan, K. Adaptive CSMA under the SINR model: Efficient approximation
algorithms for throughput and utility maximization. IEEE/ACM Trans. Netw. 2017, 25, 1968–1981. [CrossRef]
27. Baccelli, F.; Singh, C. Adaptive spatial Aloha, fairness and stochastic geometry. In Proceedings of the 2013
11th International Symposium and Workshops on Modeling and Optimization in Mobile, IEEE Ad Hoc and
Wireless Networks, Ibaraki, Japan, 13–17 May 2013; pp. 7–14.
28. Jiang, L.; Leconte, M.; Ni, J.; Srikant, R.; Walrand, J. Fast mixing of parallel Glauber dynamics and low-delay
CSMA scheduling. IEEE Trans. Inform. Theory 2012, 58, 6541–6555. [CrossRef]
29. Jiang, L.; Walrand, J. Scheduling and congestion control for wireless and processing networks. Synth. Lect.
Commun. Netw. 2010, 3, 1–156. [CrossRef]
30. Boyd, S.; Vandenberghe, L. Convex Optimization; Cambridge University Press: Cambridge, UK, 2004.
31. Chapra, S.C.; Canale, R.P. Numerical Methods for Engineers, 7th ed.; McGraw-Hill Education: New York, NY,
USA, 2015.
91
Sensors 2019, 19, 3651
32. Rao, G.S. Numerical Analysis, 3rd ed.; New Age International (P) Ltd.: New Delhi, India, 2006.
33. Cheney, E.W.; Kincaid, D.R. Numerical Mathematics and Computing, 6th ed.; Cengage Learning: Mason, OH,
USA, 2008.
34. Lay, D.C.; Lay, S.R.; McDonald, J. Linear Algebra and Its Applications, 5th ed.; Pearson: London, UK, 2016.
35. Shah, D.; David, N.C.; Tsitsiklis, J.N. Hardness of low delay network scheduling. IEEE Trans. Inform. Theory
2011, 57, 7810–7817. [CrossRef]
36. Lee, D.; Yun, D.; Shin, J.; Yi, Y.; Yun, S.Y. Provable per-link delay-optimal CSMA for general wireless network
topology. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM 2014), Toronto,
ON, Canada, 27 April–2 May 2014; pp. 2535–2543.
37. Kwak, J.; Lee, C.H.; Eun, D.Y. Exploiting the past to reduce delay in CSMA scheduling: a high-order Markov
chain approach. ACM SIGMETRICS Perform. Eval. Rev. 2013, 41, 353–354. [CrossRef]
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access
article distributed under the terms and conditions of the Creative Commons Attribution
(CC BY) license (http://creativecommons.org/licenses/by/4.0/).
92
sensors
Article
Interference-Aware Subcarrier Allocation for Massive
Machine-Type Communication in 5G-Enabled
Internet of Things
Wenjun Hou 1 , Song Li 1 , Yanjing Sun 1,2, *, Jiasi Zhou 1 , Xiao Yun 1 and Nannan Lu 1
1 School of Information and Control Engineering, China University of Mining and Technology,
Xuzhou 221000, China; [email protected] (W.H.); [email protected] (S.L.);
[email protected] (J.Z.); [email protected] (X.Y.); [email protected] (N.L.)
2 school of Communication and Information Engineering, Xi’an University of Science and Technology,
Xi’an 710054, China
* Correspondence: [email protected]
Abstract: Massive machine-type communication (mMTC) is investigated as one of three typical scenes
of the 5th-generation (5G) network. In this paper, we propose a 5G-enabled internet of things (IoT) in
which some enhanced mobile broadband devices transmit video stream to a centralized controller and
some mMTC devices exchange short packet data with adjacent devices via D2D communication to
promote inter-device cooperation. Since massive MTC devices have data transmission requirements
in 5G-enabled IoT with limited spectrum resources, the subcarrier allocation problem is investigated
to maximize the connectivity of mMTC devices subject to the quality of service (QoS) requirement
of enhanced Mobile Broadband (eMBB) devices and mMTC devices. To solve the formulated
mixed-integer non-linear programming (MINLP) problem, which is NP-hard, an interference-aware
subcarrier allocation algorithm for mMTC communication (IASA) is developed to maximize the
number of active mMTC devices. Finally, the performance of the proposed algorithm is evaluated
by simulation. Numerical results demonstrate that the proposed algorithm outperforms the three
traditional benchmark methods, which significantly improves the utilization of the uplink spectrum.
This indicates that the proposed IASA algorithm provides a better solution for IoT application.
1. Introduction
In the future industrial internet of things (IIoT), a large number of devices including monitoring
sensors and execution control units will be deployed to support factory automation and industry
control system [1]. Massive periodic/non-periodic data will be transferred to a centralized control unit
or adjacent devices via an industry wireless network, including video monitoring information, sensing
data, operation instructions. However, due to the limited capacity and throughput of the current
cellular system, it is insufficient in supporting future IoT applications with a tremendous number of
devices and heterogeneous information traffic [2].
Massive machine-type communication (mMTC), as one of three typical application scenarios
in the 5th-generation (5G) network, is investigated to support communication among a massive
number of devices, which provides a feasible solution for future industrial IoT (IIoT) [3]. Due to
limited spectrum resources in the cellular system, massive devices access the wireless network in a
spectrum-sharing manner in which multiple devices are allocated in the same spectrum at the same
time. Thus, the co-channel interference among devices restricts the number of devices connected to
the cellular system. Effective interference management plays a vital role in mMTC to support the
simultaneous access of more devices. The features and challenges of mMTC in IoT are as follows. First,
devices in IoT need to exchange information with their neighbor devices frequently. In other words,
the communication is performed between adjacent devices [4]. Second, the coding blocklengths for
IoT are usually short, to reduce the transmission delay. The transmission rate cannot be estimated
by the conventional Shannon’s capacity, which assumes an infinite blocklength [5]. Third, a massive
number of devices in IoT need to be supported. Thus, efficient resource allocation in mMTC needs to
be investigated to address these challenges.
A wide range of works have contributed to the resource allocation problem in mMTC. In [6],
the authors establish an interference model and a formulate resource allocation problem between
users and machine-type communication (MTC) gateways in mMTC burst scenarios. In [7], the authors
investigated the access management issues for MTC devices with heterogeneous quality of service
(QoS) in the same cellular network. This work does not consider bandwidth utilization because
transmission opportunities are reserved for a group of MTC devices at the same time. The authors
in [8] propose two relay schemes and transmission protocols to specifically stimulate system capacity.
In a multi-cell MTC system, Kwon et al. [9] establishes the interference model and analyzes the
signal-to-interference-plus-noise-ratio (SINR) distributions and drives efficient resource allocation
schemes. In [10], the authors propose a dynamic resource allocation algorithm based on the
estimation of the number of MTC devices to handle massive and dynamic MTC devices while
satisfying the random access delay requirement of MTC devices. To achieve effective resource
utilization, a resource allocation metric based on statistical priority is proposed in [11]. In this way,
effective resource utilization is achieved by letting MTC devices send a reduced set of their data. In [12],
the authors consider a connectivity maximization problem for narrowband IoT with non-orthogonal
multiple-access (NOMA). However, articles [6–12] assume that all devices communicate with the
base station or centralized controller directly and do not consider the communications between
adjacent devices.
D2D technology, as another promising technology in 5G, can establish communication between
adjacent nodes, which can improve the spectrum efficiency and offload the load of Base Station (BS).
D2D communication is introduced to mMTC system to stimulate spectrum efficiency and support
more mMTC devices accessed with limited spectrum resources. However, designing better resource
allocation algorithms to manage the inter-user interference between D2D users and cellulars is the
key challenge for improving system performance. Resource allocation and interference problems of
D2D communication have been investigated in many works [13–15]. The authors in [16] propose a
cell sectorization scheme to alleviate the interference between cellular users and D2D users. In [17],
the authors investigate interference coordination for downlink full-dimension multiple-output systems
with underlying D2D communications.
Adopting D2D technology, the number of supported devices can be improved in mMTC
scenarios [18]. By allowing unauthorized devices to reuse the frequency bands of authorized cellular
users, bandwidth utilization can be improved [19–21]. The literature [22] proposes a heuristic
subcarrier allocation method to set the user’s signal-to-noise ratio (SNR) threshold to meet the QoS of
the system. The authors in [23] propose a mobile traffic offloading scheme that combines small base
stations with D2D offloading. The goal is to accommodate a large number of MTC connections by
maximizing the throughput of the network system. The impact of radio frequency energy harvesting
on the spectral efficiency of the D2D-assisted MTC system is analyzed first in [24]. In [25], the authors
propose two solutions to manage the communication between D2D devices and the BS to lighten the
overhead of MTC devices on the 5G network. However, resource allocation [19–25] mainly focuses on
throughput maximization or interference minimization. In an IIoT enabled by D2D communications,
massive devices demand access to the network via D2D mode. Thus, the connectivity maximization
problem becomes a challenging issue to tackle. To support a system in which the number of users is
higher than the number of subcarriers, a range of fair subcarrier allocation algorithms is proposed that
94
Sensors 2019, 19, 4530
always improves the reliability [26]. However, the author only considers the scenario of mobile users
in the downlink and does not consider the influence of interference.
In this paper, we investigate a D2D-enabled internet of things in which some devices (enhanced
Mobile Broadband (eMBB) devices) connect to the centralized controller while other devices (mMTC
devices) communicate with their adjacent devices via D2D communication to promote inter-device
cooperation in industry automation. Specifically, mMTC devices reuse the spectrum resource
with eMBB devices. We establish the connectivity maximization problem of mMTC devices
while guaranteeing the QoS of eMBB devices and mMTC devices. Furthermore, we propose an
interference-aware subcarrier allocation algorithm to tackle the problem. The main contributions of
this paper are as follows:
• We establish a problem of maximizing the number of accessed mMTC pairs subject to the
constraints of QoS in a system with both eMBB and mMTC devices, which is proven to be
a mixed-integer non-linear programming (MINLP) problem.
• We propose an interference-aware subcarrier allocation algorithm for mMTC (IASA) considering
the interference range of each mMTC device.
• In order to evaluate the proposed algorithm, a simulation is conducted. The results demonstrate
that the proposed algorithm outperforms two benchmark algorithms significantly in terms of the
number of mMTC pairs accessed under the same constraints.
The remainder of the paper is organized as follows. The system model and assumptions is
elaborated in the “System Model” section. The optimization problem and constraints are introduced
in the “Problem Formulation” section. The proposed subcarrier allocation algorithm is presented
in the “Interference-Aware Subcarrier Allocation for mMTC Communication Algorithm” section.
Comprehensive simulation results are provided in the “Simulation result analysis” section. Finally,
we conclude the paper in the ”Conclusion” section.
2. System Model
In this paper, we investigate an industrial wireless network in which some devices, referred to as
eMBB devices (such as monitoring cameras), transmit video information to a centralized controller,
while devices referred to as mMTC devices (such as sensors and actuators), transmit short blocklength
packets to their adjacent devices to promote inter-device cooperation and industrial automation.
The system model is illustrated in Figure 1, where N eMBB devices and M mMTC devices are randomly
distributed, represented by sets N = {CU1,..., CUi,..., CUN } and M = MU1,..., MUj,..., MU M ,
respectively. The mMTC devices transmit information from the transmitters to receivers by the
D2D communication mode, and the mMTC pairs reuse the eMBB devices’ uplink resources in
order to improve the spectrum efficiency. The mMTC pairs and eMBB devices are represented
by MUj and CUi , respectively. Each mMTC pair is composed of one mMTC transmitter and one
mMTC receiver represented by MUjt and MUjr , respectively. All available spectrum resources are
divided into sub-carriers with the same bandwidth. Each eMBB device occupies mutually orthogonal
sub-carriers. Therefore, there is no co-channel interference between the eMBB devices. We assume that
the eMBB device CUi occupies the subcarrier i. Considering the impact of devices on each other, each
mMTC pair is allowed to access no more than one subcarrier, and each subcarrier can be accessed by
multiple mMTC devices. All of the channels in the system are assumed to be quasi-static Rayleigh
fading channels. The channel gain remains constant for each symbol transmission period but varies
independently between different symbol periods. The parameters in the article are shown in Table 1.
95
Sensors 2019, 19, 4530
Notation Description
gj Gain between MUjt and MUjr
gi,B Gain between CUi and the centralized controller
hi,j Interference gain between CUi and MUjr
h j,B Interference gain between MUjt and the centralized controller
f j ,j Interference gain between MUjt and MUjr
Pic The transmit power of CUi
Pjd The transmit power of MUjt
We define a binary subcarrier allocation matrix A ∈ {0, 1} M× N , where αij = 1 indicates that MUj
occupies subcarrier i, otherwise αij = 0, i ∈ N , j ∈ M. Thus, the received signal of the base station on
subcarrier i is
yi = Pic gi,B xi + ∑ αij Pjd h j,B x j + n0 , (1)
j∈M
where xi and x j are the transmitted signals of the eMBB devices CUi and the mMTC transmitter MUjt ,
respectively. n0 represents normalized additive white Gaussian noise, n0 ∼ CN 0, σ02 . When the
centralized controller receives the uplink signals of the eMBB device CUi , the SINR at centralized
controller can be calculated as
| gi,B |2 Pic
i
γcu = , (2)
I + σ02 B
where B is the subcarrier bandwidth and I represents the interference caused by the mMTC pairs
which access the subcarrier i:
M 2
I = ∑ αij Pjd h j,B . (3)
j =1
Since the eMBB devices transmit long packet data, the achievable transmission rate of the eMBB
device CUi can be obtained by Shannon’s theorem:
Ricu = B log 1 + γcu
i
. (4)
96
Sensors 2019, 19, 4530
M
zj = Pjd g j x j + ∑ αij Pic hi,j xi + ∑
∑ αij Pjd f j ,j x j + n0 , (5)
i ∈N j =1 i ∈N
j = j
where the first term is the signal receiver MUjr received from mMTC transmitter MUjt . The second
term is the interference from the eMBB device CUi . The third term is the interference signal from
the transmitter of the mMTC pair MUj that occupies the same subcarrier with mMTC pair MUj .
According to (5), the SINR of the mMTC receiver MUjr can be derived as
2
Pjd g j
γj = 2 2 . (6)
d
∑i∈N αij Pic hi,j + ∑ M
j=1 ∑i ∈N αij Pj f j ,j + σ0
2
j = j
Since mMTC communication is mostly aimed at periodic monitoring data in IoT applications such
as smart cities, the length of data packets transmitted is usually very short. According to information
theory, the rate of short packets cannot achieve the Shannon limit. Therefore, the transmission rate of
the mMTC devices is represented by the short packet rate [27], as shown in (7):
1 1
R j = log2 (1 + γ j ) − log2 (e) Q−1 (ε) 1− (7)
m (1 + γ j )2
where m is the block length, ε is the transmission error probability, and Q−1 (x) is the inverse of the
Gaussian Q function.
3. Problem Formulation
The optimization goal of this paper is to maximize the total number of mMTC devices accessed
under the QoS of each eMBB device. All of the mMTC devices access the network adhere to the
following criteria:
(i) Each mMTC device is allowed to access no more than one subcarrier.
(ii) To ensure the transmission quality of the eMBB devices, the interference each subcarrier can
suffer should be below a threshold.
(iii) Both eMBB devices and mMTC devices should satisfy their own transmission rate requirements.
When the jth mMTC pair is allowed to access the subcarrier i, the SINR of the receiver of MUj is
2
Pjd g j
γj = 2 2 . (8)
Pic hi,j + ∑ M α d f + σ2
j =1 ij Pj j ,j 0
j= j
Taking γ j in (8) into (7), we can get the transmission rate R j after mMTC pair MUj is allowed to
access the subcarrier i. In order to ensure the QoS of the mMTC pair MUj , the achievable rate R j of the
mMTC pair MUj should not be less than the minimum required rate R j− min , i.e.,
R j ≥ R j− min . (9)
When the mMTC pair MUj is allowed to access the subcarrier i, the minimum transmission rate of
the eMBB device CUi is Ricu− min . Under the QoS constraint of the eMBB devices and the mMTC pairs,
97
Sensors 2019, 19, 4530
we maximize the number of mMTC pairs accessed in the network. Mathematically, the optimization
problem is formulated as
N M
max ∑ ∑ αij , (10a)
αij
i =1 j =1
The constraints described in (10b) and (10c) indicate that the respective minimum transmission
rate requirements of the eMBB devices and the mMTC pairs should be satisfied. Equation (10e) reveals
that each mMTC pair is allowed to occupy at most one subcarrier. The optimization problem is a
binary optimization problem, and the traversal complexity of the problem is 2 MN . In the following
section, we propose a lower complexity algorithm named interference-aware subcarrier allocation for
mMTC communication.
Pic | gi,B |2
i
Icu − max
= − σ02 B. (11)
Ricu min
2 − −1
When the jth mMTC pair MUj occupies the subcarrier i, the interference caused by MUj to the
base station is
2
Ij,B = Pjd h j,B . (12)
To ensure the rate requirement of the eMBB device, the interference caused by the mMTC pair
MUj should not exceed the maximum interference allowed by the subcarrier i, i.e.,
Ij,B ≤ Icu
i
− max
. (13)
Therefore, a set of mMTC pairs allowed to occupy subcarrier i can be selected according to
Equation (13). For all mMTC pairs that can be accessed, we first define the normalized interference
caused by each pair as Ij,i = Ij,B /Icu
i
− max
. Define the interference matrix as
⎡ ⎤
I11 I21 ··· 1
IM
⎢ ⎥
⎢ I12 I22 ··· 2
IM ⎥
Ω=⎢
⎢ .. .. .. ⎥.
⎥
⎣ . . ··· . ⎦
I1N I2N ··· IMN
When the mMTC pair MUj , j = j, attempts to access the subcarrier i, the following two conditions
should be satisfied.
(i) The interference caused by MUj and the total interference of mMTC pairs cannot exceed the
i
maximum interference allowed by subcarrier i, i.e., Icu .
− max
(ii) All of the accessed mMTC pairs should satisfy their own QoS.
98
Sensors 2019, 19, 4530
When both conditions are satisfied, the mMTC pair is allowed to access the subcarrier. In order
to facilitate the calculation, we convert the rate constraint of the eMBB device in (11) into an
interference limit:
i
Icu ≤ Icu
i
− max
, (14)
where
i
Icu = ∑ Ij,B ∀i ∈ N . (15)
j∈ M
Substituting (14) for (11), then the optimization problem is converted into
N M
max ∑ ∑ αij , (16a)
αij
i =1 j =1
s.t i
Icu ≤ Icu
i
− max
, (16b)
R j ≥ R j− min , (16c)
αij ∈ {0, 1}, ∀i ∈ N j∈M, (16d)
N
∑ αij ≤ 1 ∀ j ∈ M. (16e)
i =1
The optimization variables of this problem are all binary variables, and the optimization
problem (16a) is an NP-hard problem that cannot be solved by the convex optimization method.
The traditional way to solve an NP-hard problem is to carry out an exhaustive search, which involves
unaccepted computational complexity. Thus, it is difficult to obtain the optimal result by direct solution.
This paper proposes a heuristic algorithm with lower complexity to tackle the problem, referred to as
interference-aware subcarrier allocation for mMTC.
Firstly, the mMTC pair with minimal interference to the base station is selected in the
two-dimensional matrix Ω, and the access conditions (16b) and (16c) are updated according to the QoS
of the eMBB devices and other mMTC pairs. Once an mMTC pair occupies a subcarrier, the mMTC
pair is prohibited from accessing other subcarriers. When the sum of the interference ratio accumulated
on subcarrier i is not less than 1, other mMTC pairs will be no longer allowed to access the subcarrier i.
For the constraint condition (16c), we can estimate whether the QoS requirements are still satisfied
after each mMTC pair occupies the subcarrier according to (7) and (9). Due to the interference between
mMTC pairs accessing the same channel, the interference range of the mMTC pair is defined in this
paper to suppress interference between mMTC pairs. The interference range of an mMTC pair MUj is
defined as the range in which the mMTC pairs suffer from the interference of MUj . Thus, the mMTC
pairs in the interference range of MUj cannot access the same subcarrier with MUj to avoid interference.
In other words, when mMTC pair MUj accesses subcarrier i, the other pairs within the interference
range of MUj cannot access subcarrier i to reduce the interference between the mMTC pairs and to
ensure the QoS of each mMTC pair.
The IASA algorithm is summarized in Algorithm 1. Lines 1–5 of the algorithm calculate the
maximum interference that all subcarriers can support (line 3) and the proportion of the interference
from each mMTC pair (line 5). Then a two-dimensional matrix is formed. Lines 6–12 of the algorithm
sort the data in the two-dimensional matrix in ascending order one-dimensionally. Firstly, we find
the mMTC pair and subcarrier corresponding to the minimum interference ratio. Then we estimate
whether the accumulated interference caused by the mMTC pair exceeds the maximum interference
allowed by the subcarrier so as to determine whether the mMTC pair can access the sub-carrier (line 7).
After the mMTC pair MUj accesses subcarrier i, the mMTC pair within the interference range of MUj
is prohibited from accessing subcarrier i (line 9).
99
Sensors 2019, 19, 4530
The IASA algorithm is a centralized algorithm that can be implemented by a centralized controller.
First, the centralized controller collects the information from mMTC devices who want to transmit
packets with their neighborhood devices, including the channel state information and the required
transmission rate. Then the centralized controller obtains the spectrum allocation results according
to the IASA algorithm and broadcasts the allocation results to each mMTC pair. Then each mMTC
transmitter completes the packets transmission on its allocated subcarrier.
100
Sensors 2019, 19, 4530
where D is the communication distance and AG is the antenna gain. The value of AG is 0.4 dB. L is the
indoor penetration loss. we assume that 80% of mMTC equipment is indoor equipment, where L takes
20 dB; 20% is outdoor mMTC equipment, where L takes 0 dB.
Figure 2 is a location distribution diagram of eMBB devices and mMTC devices. We consider an
area with a radius of 200 m, in which the eMBB devices and mMTC devices are evenly and randomly
distributed in the area, and the base station is set at the origin.
Figure 3 shows the number of mMTC pairs that successfully access subcarriers for different
eMBB devices with Pic = 10 dB, Pjd = 7 dB, Ricu− min = 10 bps, R j = 5 bps. The total number of
mMTC pairs is 150, and the interference range of the mMTC pair is 80 m. Among the four algorithms,
the number of mMTC pairs accessed increases as the number of subcarriers increases. The reason
is that when the number of subcarriers increases, the mMTC pairs will be more likely to access
the subcarriers. Some mMTC pairs with large interference also have the opportunity to access the
subcarriers. Compared to the three contrastive algorithms, the IASA algorithm can realize more mMTC
devices accessed in the system. The reason is that under the premise of guaranteeing the QoS of the
eMBB devices and the mMTC pairs, the mMTC pair with the least interference to the subcarriers is
selected first according to the IASA algorithm. The distance limitation is established to reduce the
interference between the adjacent mMTC pairs. Meanwhile, the complexity of the algorithm is reduced.
For GA, each subcarrier gives priority to the access number optimization of itself rather than the access
performance of the whole system, so the access number of the system cannot be maximized. However,
since GA considers the mMTC priority access with less interference in each subcarrier, its performance
is better than RAA and SAA. For RAA and SAA, there may be an mMTC pair with large interference
accessing the subcarrier at any time, which occupies a large proportion of the interference space that
the subcarrier can sustain. Under these circumstances, some mMTC pairs with small interference
cannot access the subcarrier because the space for interference is finite. Therefore, the IASA algorithm
enables the system to accommodate more mMTC pairs.
200
Base Station
150 eMBB Device
mMTC Node
100
50
-50
-100
-150
-200
-200 -150 -100 -50 0 50 100 150 200
101
Sensors 2019, 19, 4530
90
Greedy Algorithm(GA)
80 Interference-Aware Subcarrier Allocation Algorithm(IASA)
Sequential Access Algorithm(SAA)
Random Access Algorithm(RAA)
70
60
40
30
20
10
0
5 6 7 8 9 10 11 12 13 14 15
number of CU
Figure 3. Number of mMTC pairs accessed versus different eMBB devices using different algorithms.
Figure 4 depicts the number of mMTC pairs that access subcarriers for different eMBB devices
with Pic = 10 dB, Pjd = 7 dB, R j = 5 bps. The interference range of the mMTC pairs is 80 m. The number
of mMTC pairs that access the subcarriers decreases gradually when the minimum transmission rate
of the eMBB devices gradually increases. The reason is that when the minimum transmission rate of
the eMBB devices increases, the maximum interference that each subcarrier can sustain is reduced.
In the case where the interference caused by the mMTC pair is unchanged, the number of mMTC
pairs that can access the subcarriers is reduced. In the low-rate phase, the RAA exhibits much lower
access performance than the IASA algorithm. And the SAA exhibits a comparable access performance
with IASA algorithm. However, as the rate of eMBB devices increase, the performance of SAA have
dropped significantly compared to the IASA algorithm.
,$6$
5$$
6$$
WKHQXPEHURIP07&DFFHVHG
WKHUDWHRIH0%%ESV
Figure 4. Number of mMTC pairs accessed versus different rate requirements of eMBB devices.
Figure 5 presents the number of mMTC pairs accessed when the power of the mMTC pairs
transmitter change with Pic = 10 dB, Rcu− min = 10 bps, R j = 5 bps. The interference range of the
mMTC pairs is 80 m. The number of accessed mMTC devices gradually decreases as the power of the
mMTC transmitter increases. This is due to the fact that the interference to subcarriers increases while
102
Sensors 2019, 19, 4530
the power of the mMTC transmitting increases. Therefore, the number of mMTC devices accessed is
relatively reduced. Compared to the variables such as the number of eMBB devices and the minimum
transmission rate of eMBB devices, the power of the mMTC transmitter has a relatively small impact
on the number of mMTC pairs accessed in the system.
,$6$
5$$
6$$
WKHQXPEHURIP07&DFFHVHG
WKHSRZHURIP07&G%
Figure 5. Number of mMTC pairs accessed versus different mMTC device transmit powers.
Figure 6 investigates the number of mMTC pairs accessed when there are different numbers of
mMTC pairs in the system. The parameter settings are the same as in Figure 3. The number of mMTC
devices accessed increases as the number of mMTC pairs in the system increases. Before the number of
subcarriers is saturated, the more mMTC devices in the system, the greater the opportunity to access
devices that satisfy the QoS requirements of the eMBB devices. Thus, the total number of mMTC pairs
accessed will increase. However, when the power and the minimum transmission rate of the eMBB
devices are fixed, the number of mMTC devices accessed by all subcarriers is constant, so the number
of mMTC pairs accessed will gradually become saturated. Among the three algorithms shown in
Figure 6, the RAA achieves the access saturation state first.
,$6$
5$$
6$$
WKHQXPEHURIP07&DFFHVHG
WKHQXPEHURIP07&LQWKHV\VWHP
Figure 6. Number of mMTC pairs accessed versus different number of mMTC devices.
6. Conclusions
In this paper, an interference-aware subcarrier allocation algorithm for mMTC is proposed for
the subcarrier allocation problem of D2D communication in mMTC scenarios. Initially, we establish
a model maximizing the number of mMTC pairs accessed. When carrying out subcarrier allocation,
we calculate the maximum interference that each subcarrier can sustain. Then we determine the mMTC
pair with the least interference to the subcarrier and estimate the access property according to whether
103
Sensors 2019, 19, 4530
the QoS of the mMTC pair is satisfied. When the accumulated interference caused by the mMTC pair
is greater than the maximum interference limit that the subcarrier can sustain, the subcarrier will be
not be accessible to other mMTC pairs anymore. Simulation results demonstrated the effectiveness of
the proposed algorithm.
Author Contributions: W.H. designed the algorithm, performed the theoretical analysis, and wrote the
manuscript. S.L. and Y.S. implemented the simulation and contributed to the manuscript preparation. J.Z. analyzed
the data. X.Y. and N.L. contributed to polishing the revised manuscript and provided suggestions on simulation
evaluation.
Acknowledgments: This work was supported by the Science and Technology Project of Xuzhou (KC18105
KC18068), the National Natural Science Foundation of China (61771417 51734009 51804304), the National Key
Research and Development Program (2016YFC0801403), and the Fundamental Research and Development
Foundation of Jiangsu Province.
Conflicts of Interest: The authors declare no potential conflicts of interest with respect to the research, authorship,
and/or publication of this article.
References
1. Meng, Z.; Wu, Z.; Gray, J. A Collaboration-Oriented M2M Messaging Mechanism for the Collaborative
Automation between Machines in Future Industrial Networks. Sensors 2017, 17, 2694. [CrossRef] [PubMed]
2. Park, J.H. Advances in Future Internet and the Industrial Internet of Things. Symmetry 2019, 11, 244.
[CrossRef]
3. Al-Sakran, A.; Qutqut, M.H.; Almasalha, F.; Hassanein, H.S.; Hijjawi, M. An Overview of the Internet
of Things Closed Source Operating Systems. In Proceedings of the 2018 14th International Wireless
Communications Mobile Computing Conference (IWCMC), Limassol, Cyprus, 25–29 June 2018; pp. 291–297.
[CrossRef]
4. Laya, A.; Alonso, L.; Alonso-Zarate, J. Is the random access channel of LTE and LTE-A suitable for M2M
communications? A survey of alternatives. IEEE Commun. Surv. Tutor. 2013, 16, 4–16. [CrossRef]
5. Kawabata, H.; Ishibashi, K.; Vuppala, S.; de Abreu, G.T. Robust relay selection for large-scale
energy-harvesting IoT networks. IEEE Internet Things J. 2016, 4, 384–392. [CrossRef]
6. Hu, X.; Sun, J. Interference Analysis and Resource Allocation of Burst Scenario in Massive Machine-Type
Communications. In Proceedings of the 2018 IEEE 18th International Conference on Communication
Technology (ICCT), Chongqing, China, 8–11 October 2018; pp. 822–826. [CrossRef]
7. Lien, S.; Chen, K. Massive Access Management for QoS Guarantees in 3GPP Machine-to-Machine
Communications. IEEE Commun. Lett. 2011, 15, 311–313. [CrossRef]
8. Tefek, U.; Lim, T.J. Relaying and Radio Resource Partitioning for Machine-Type Communications in Cellular
Networks. IEEE Trans. Wirel. Commun. 2017, 16, 1344–1356. [CrossRef]
9. Kwon, T.; Choi, J. Multi-Group Random Access Resource Allocation for M2M Devices in Multicell Systems.
IEEE Commun. Lett. 2012, 16, 834–837. [CrossRef]
10. Oh, C.; Hwang, D.; Lee, T. Joint Access Control and Resource Allocation for Concurrent and Massive Access
of M2M Devices. IEEE Trans. Wirel. Commun. 2015, 14, 4182–4192. [CrossRef]
11. Mostafa, A.E.; Gadallah, Y. Uniqueness-Based Resource Allocation for M2M Communications in
Narrowband IoT Networks. In Proceedings of the 2017 IEEE 86th Vehicular Technology Conference
(VTC-Fall), Toronto, ON, Canada, 24–27 September 2017; pp. 1–5. [CrossRef]
12. Mostafa, A.E.; Zhou, Y.; Wong, V.W. Connectivity maximization for narrowband IoT systems with
NOMA. In Proceedings of the 2017 IEEE International Conference on Communications (ICC), Paris, France,
21–25 May 2017; pp. 1–6.
13. Han, S.; Xu, X.; Zhao, L.; Tao, X. Joint time and power allocation for uplink cooperative non-orthogonal
multiple access based massive machine-type communication Network. Int. J. Distrib. Sens. Netw. 2018,
14, 1550147718778215. [CrossRef]
14. Li, J.; Zhang, X.; Feng, Y.; Li, K.C. A Resource Allocation Mechanism Based on Weighted Efficiency
Interference-Aware for D2D Underlaid Communication. Sensors 2019, 19, 3194. [CrossRef] [PubMed]
104
Sensors 2019, 19, 4530
15. Li, Z.; Gui, J.; Xiong, N.; Zeng, Z. Energy-Efficient Resource Sharing Scheme With Out-Band D2D
Relay-Aided Communications in C-RAN-Based Underlay Cellular Networks. IEEE Access 2019, 7,
19125–19142. [CrossRef]
16. Ningombam, D.D.; Lee, C.G.; Shin, S. Interference Mitigation for Multicast D2D Communications Underlay
Cellular Networks. In Proceedings of the 2019 International Conference on Artificial Intelligence in
Information and Communication (ICAIIC), Okinawa, Japan, 11–13 February 2019; pp. 1–4. [CrossRef]
17. Li, X.; Qin, N.; Sun, T. Interference coordination for FD-MIMO cellular network with D2D communications
underlaying. China Commun. 2018, 15, 75–88.
18. Asadi, A.; Wang, Q.; Mancuso, V. A survey on device-to-device communication in cellular networks.
IEEE Commun. Surv. Tutor. 2014, 16, 1801–1819. [CrossRef]
19. Kai, Y.; Wang, J.; Zhu, H.; Wang, J. Resource Allocation and Performance Analysis of Cellular-Assisted
OFDMA Device-to-Device Communications. IEEE Trans. Wirel. Commun. 2019, 18, 416–431. [CrossRef]
20. Lu, B.; Lin, S.; Shi, J.; Wang, Y. Resource Allocation for D2D Communications Underlaying Cellular Networks
Over Nakagami- m Fading Channel. IEEE Access 2019, 7, 21816–21825. [CrossRef]
21. Chour, H.; Jorswieck, E.A.; Bader, F.; Nasser, Y.; Bazzi, O. Global Optimal Resource Allocation for Efficient
FD-D2D Enabled Cellular Network. IEEE Access 2019, 7, 59690–59707. [CrossRef]
22. Huang, Y.F.; Tan, T.H.; Liu, S.P.; Liu, T.Y.; Chen, C.M. Performance of subcarrier allocation of D2D
multicasting for wireless communication systems. In Proceedings of the 2018 Tenth International Conference
on Advanced Computational Intelligence (ICACI), Xiamen, China, 29–31 March 2018; pp. 193–196.
23. Cao, W.; Feng, G.; Qin, S.; Liang, Z. D2D Communication Assisted Traffic Offloading for Massive
Connections in HetNets. In Proceedings of the 2016 IEEE Global Communications Conference (GLOBECOM),
Washington, DC, USA, 4–8 December 2016; pp. 1–6. [CrossRef]
24. Atat, R.; Liu, L.; Mastronarde, N.; Yi, Y. Energy Harvesting-Based D2D-Assisted Machine-Type
Communications. IEEE Trans. Commun. 2017, 65, 1289–1302. [CrossRef]
25. Bagaa, M.; Ksentini, A.; Taleb, T.; Jantti, R.; Chelli, A.; Balasingham, I. An efficient D2D-based strategies
for machine type communications in 5G mobile systems. In Proceedings of the 2016 IEEE Wireless
Communications and Networking Conference, Doha, Qatar, 3–6 April 2016; pp. 1–6. [CrossRef]
26. Shi, J.; Yang, L.L. Novel subcarrier-allocation schemes for downlink MC DS-CDMA systems. IEEE Trans.
Wirel. Commun. 2014, 13, 5716–5728. [CrossRef]
27. Xu, S.; Chang, T.; Lin, S.; Shen, C.; Zhu, G. Energy-Efficient Packet Scheduling With Finite Blocklength Codes:
Convexity Analysis and Efficient Algorithms. IEEE Trans. Wirel. Commun. 2016, 15, 5527–5540. [CrossRef]
c 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access
article distributed under the terms and conditions of the Creative Commons Attribution
(CC BY) license (http://creativecommons.org/licenses/by/4.0/).
105
sensors
Article
K-Means Spreading Factor Allocation for Large-Scale
LoRa Networks
Muhammad Asad Ullah 1 , Junnaid Iqbal 1 , Arliones Hoeller 1,2,3 , Richard Demo Souza 2 and
Hirley Alves 1, *
1 Centre for Wireless Communications, University of Oulu, 90014 Oulu, Finland;
muhammad.asadullah@oulu.fi (M.A.U.); junnaid.iqbal@oulu.fi (J.I.)
2 Department of Electrical and Electronics Engineering, Federal University of Santa Catarina,
Florianópolis 88040-900, Brazil; [email protected]
3 Department of Telecommunications Engineering, Federal Institute for Education, Science,
and Technology of Santa Catarina, São José 88103-310, Brazil; [email protected]
* Correspondence: Hirley.Alves@oulu.fi
Abstract: Low-power wide-area networks (LPWANs) are emerging rapidly as a fundamental Internet
of Things (IoT) technology because of their low-power consumption, long-range connectivity, and
ability to support massive numbers of users. With its high growth rate, Long-Range (LoRa) is
becoming the most adopted LPWAN technology. This research work contributes to the problem
of LoRa spreading factor (SF) allocation by proposing an algorithm on the basis of K-means
clustering. We assess the network performance considering the outage probabilities of a large-scale
unconfirmed-mode class-A LoRa Wide Area Network (LoRaWAN) model, without retransmissions.
The proposed algorithm allows for different user distribution over SFs, thus rendering SF allocation
flexible. Such distribution translates into network parameters that are application dependent.
Simulation results consider different network scenarios and realistic parameters to illustrate how
the distance from the gateway and the number of nodes in each SF affects transmission reliability.
Theoretical and simulation results show that our SF allocation approach improves the network’s
average coverage probability up to 5 percentage points when compared to the baseline model.
Moreover, our results show a fairer network operation where the performance difference between
the best- and worst-case nodes is significantly reduced. This happens because our method seeks to
equalize the usage of each SF. We show that the worst-case performance in one deployment scenario
can be enhanced by 1.53 times.
1. Introduction
The Internet of Things (IoT) is the integration of modern electronic devices, smart sensors, internet
protocols, and wireless communications technologies. IoT applications are rapidly gaining popularity
in many domains such as industrial operations, smart parking, augmented maps, healthcare, smart
cars, and smart homes [1–5]. According to a Gartner Inc. report, there will be around 26 billion IoT
devices deployed worldwide by 2020 [6]. In the Statista report, it is predicted that there will be over
75 billion IoT devices worldwide by 2025 [7].
In the modern era, the spectacular growth and transformation of wireless connectivity are driven
by the IoT paradigm, with technologies having attributes of large-scale network infrastructure with
low-cost sensors connected to the Internet. In this context, low-power wide-area networks (LPWANs)
are quite popular in terms of prototypes, standards, and on the commercial level because of their
significance with respect to power efficiency along with long range [8,9]. Within this context, LoRA,
SigFox, NB-IoT, Weightless, RPMA and DASH7 [10,11] are the most distinguished technologies.
This paper focuses on LoRa, which provides good performance in terms of reliability and energy
consumption. The network architecture contains end-devices, gateways, and a network server (NS),
forming a star topology. It operates at unlicensed frequency ISM (Industrial, Scientific, Medical) bands
of 863–870 MHz and 915 MHz in Europe and the U.S., respectively [12,13]. In Europe, the duty cycle
limitations range from 0.1% to 10%, following European Telecommunications Standards Institute
(ETSI) standards. In addition, LoRa works on variable and adaptive data rates by using different
spreading factors. This is achieved by the NS controlling the spreading factors (SFs) and bandwidth
(BW) of the end-devices. Higher SFs allow larger coverage areas; however, as a drawback, they reduce
the data rate and increase the time-on-air (ToA) of LoRa packets [14].
Notably, the gateway has the ability to receive data from multiple nodes at the same time because
of the orthogonality of sub-bands and the quasi-orthogonality of different SFs. The LoRa MAC layer,
known as LoRaWAN [15], is a type of ALOHA protocol controlled by the NS. LoRaWAN defines three
classes of devices depending upon the application. Class A devices may wait for acknowledgments
(ACK) only in their receiving windows during downlink transmission and consume the least power.
Class B devices are able to open extra receiving windows at scheduled times, thus reducing downlink
latency. Class C nodes consume the most energy because they leave the receiver enabled all the time,
allowing for the lowest latency time [16].
For instance, extensive measurement campaigns show that the communication range of LoRa
reaches up to 30 km over the water and more than 15 km on the ground [11]. LoRa is suitable for a wide
range of telemetry applications (e.g., sensing and monitoring), which can be used in several industry
verticals, such as smart grids and cities, and smart agriculture up to industrial IoT applications [17,18].
During the past few years, many studies have contributed by proposing new algorithms, systems
models, analyses, and by designing new approaches for performance enhancement of LoRa networks.
However, only a few considered resource allocation.
The major contribution of this work is the modeling of an approach for SF allocation for a large
scale LoRa network based on K-means clustering and the analysis of connection, capture, and coverage
probabilities. Instead of using constant steps of distance from the gateway to define SF areas [19,20],
the proposed algorithm assigns a maximum range of individual SF regions, which allows for distinct
user distribution. Then, we evaluate the performance of the proposed algorithm over the uplink of a
large-scale LoRa network with a single gateway based on the model introduced in [19].
The remainder of this article is structured as follows. Section 2 discusses related work and a short
overview of LPWAN technologies. Section 3 introduces the system model, and Section 3.1 details the
outage probabilities of the baseline model, used to examine the performance of proposed SF allocation
approach. The proposed algorithm is presented in Section 4. Simulation results are discussed in
Section 5. Finally, Section 6 concludes the paper and proposes future work.
2. Related Work
Overviews of LoRa and LPWAN technologies are provided in [21,22]. Usually, LoRa operates with
a bandwidth of 125 kHz, but it also allows for bandwidths of 250 kHz and 500 kHz. The wider bands
promote resistance to fading, channel noise, Doppler effects, and long-term relative frequency [23].
Chirp spread spectrum (CSS) modulation, which enables high receiver sensitivity, makes LoRa more
robust against the interference when compared to Sigfox, which employs ultra-narrowband (UNB)
communication [24]. As a tradeoff, the use of wider bands for the transmission of narrowband signals
makes less efficient use of the spectrum. A realistic SigFox communication model is implemented
and tested in [25]; it evaluates the performance of a high-density large-scale wireless sensor network
(WSN). From the obtained results, one can observe that the performance of the SigFox network
significantly degrades by increasing the number of sensors, and some solutions are presented to
improve the performance.
107
Sensors 2019, 19, 4723
Unlike Sigfox, LoRa can be deployed locally, i.e., without the need for a cellular infrastructure,
and has higher bit rates. By contrast, NB-IoT is an expensive technology having the pros of low latency
and high quality of service (QoS) [26]. In [27], the authors compare different LPWAN technologies
(Bluetooth, ZigBee, SigFox, and LoRa) and discuss LoRa with respect to code rate (CR), bandwidth
(BW), and SF but without considering the influence of Rayleigh fading and path loss attenuation.
Theoretical and simulation results show that SF, BW, and CR influence the ToA of a packet. Larger SFs
and CRs result in higher ToA of LoRa packets. Conversely, ToA reduces with larger bandwidths.
The work in [28] proposes two different algorithms named EXPLoRa-SF and EXPLoRa-AT and
shows in simulation results that these algorithms perform considerably better than the LoRaWAN
adaptive rate strategy (ADR). EXPLoRa-AT delivers higher bit rates in the event of higher traffic loads,
while EXPLoRa-SF allocates SFs at the different subgroups of end-devices depending on the received
signal strength indicator (RSSI). The results demonstrate that the data extraction rate (DER) drops
dramatically for higher SFs and larger numbers of end-devices. The authors, however, assume a short
range and dense network in their analysis.
The EXPLoRa approach is further extended in [29], K-means is applied to identify the non-circular
crowded region, and all the nodes inside that area are assumed to have same SF. On the other hand,
in the proposed work the geometry of network is circular, with six annuluses representing the range
of individual SFs. We have analyzed the scalability and the performance of the uplink LoRa model
considering Rayleigh fading, connection H1 , capture Q1 , and coverage probabilities H1 Q1 in the
presence of interfering signals using the same SF. The considerations of H1 and H1 Q1 are missing
in [28,29]. Moreover, in our model, we consider a dense and wide network (radius of several kilometers)
and analyze the performance by considering the maximum distance of individual SF boundaries from
the gateway.
Another scientific study used K-means for the classification of end-devices into three groups
based on traffic characteristics with different priorities. The grouping of end-devices was computed in
terms of priority-based transmission instead of SF allocation [30].
In [31,32], SF distribution is mainly based on the power level of the signals that the gateway
receives from the end-devices and gateway sensitivity, without considering the location of end-devices.
As a drawback, SF allocation was disturbed because of high-density buildings, and 53.2% of the
end-devices were forced to use SF12. Furthermore, in [28–31], only network-level simulators such
as ns-3 and LoRaSim are used, which abstracts some characteristics of the physical layer that are
incorporated in our analysis. Conversely, our study evaluated the performance of the proposed SF
allocation algorithm considering the analytical model, realistic parameters, and averaging over 105
random deployment of the Poisson point process (PPP) by Monte Carlo computer simulations, which
match with the theoretical results.
The tree-based spreading factor clustering algorithm (TSCA) for SF allocation in multihop LoRA
networks is introduced in [33]. This approach offloads the data traffic in many sub-networks, which
are linked to a sink node assigning a specific SF according to network clustering, thus enabling parallel
frame transmission with multiple SFs. The authors show that TSCA increases the network performance
in a network with rectangular geometry.
A single gateway uplink model considering path loss attenuation and Rayleigh fading is designed
in [19], utilizing stochastic geometry to model network interference and then disconnection and
collision probabilities. Such a model is further extended in [20], in which the authors propose a
scheme that considers message replication and gateways with multiple receive antennas/decoders
to attain time and spatial diversity. They demonstrate that the number of users and traffic density
directly affects the performance of the LoRa network and that sending multiple message copies is
beneficial for low-density networks. Both of these studies adopt equal radius SF allocation approaches.
Unlike [19,20], our work considers K-means-based fair SF allocation of nodes in LoRa networks.
Recently, several studies have addressed the problems associated with automatic repeat request
(ARQ) and contributed to downlink reliability in LoRaWAN applications. The sequential transmission
108
Sensors 2019, 19, 4723
of downlink frames, saturation of duty cycle, and half-duplex nature of LoRa gateway radios are
marked as the major shortcomings for the downlink transmission [34,35]. Furthermore, these works
also highlight the significance of gateway selection algorithm to prevent traffic losses due to sequential
transmission of downlink frames and duty cycle limitations.
One experimental study evaluates the performance of a LoRa network at a 125 kHz bandwidth
and SF7 for a sailing monitoring model, and the measurements show a 60.49% packet loss at the
maximum distance of 3284 m [36]. Another LoRaWAN-based indoor environment monitoring system
composed of 331 sensor nodes is deployed at the University of Oulu, where the gateway is installed at
a distance of ∼180 m and 24 m above the ground [37]. The measurements performed at SF7 show a
maximum 11.33% packet error rate (PER), which can be due to co-spreading factor interference because
all 331 end-devices use the same SF. As illustrated in [19], nodes using the same SF face co-spreading
factor interference. The motivation behind our work is to propose a suitable SF allocation algorithm
for a large-scale LoRa network to efficiently utilize the different data rates. To enhance SF allocation,
we propose a novel algorithm, based on the machine learning technique called K-means clustering,
for effectively allocating the SFs.
3. System Model
We consider N̄ uniformly distributed smart devices inside an uplink class-A LoRaWAN network
without retransmissions, utilizing a single channel within radio range of R km and a circular area of
V = πR2 around a single gateway. Figure 1 illustrates a deployment with N̄ = 500 and R = 3 km.
The gateway is at the origin, and nodes are distributed uniformly in V = 28.26 km2 . Note that such
model captures the characteristics of telemetry applications such as those in smart cities and smart
buildings. For instance, the University of Oulu Smart Campus has a LoRaWAN network constantly
monitoring several sensors such as temperature, luminosity, and CO2 [37].
3
Nodes
Gateway
2
-1
-2
-3
-3 -2 -1 0 1 2 3
Figure 1. Uniform distribution of N̄ = 500 nodes in a circular network area of radius R = 3 km,
with the gateway (GW) at the origin.
109
Sensors 2019, 19, 4723
4 BW
Rb = , (1)
4 + CR 2SF
where 4+4CR is the effective coding rate, ranging from 45 to 48 , while CR denotes the LoRa coding rate
configuration, varying from 1 to 4. In our work, we assume CR = 1, and the LoRa uplink channel
aggregated bit rate is expressed as bitrateU = ∑12i =7 Rbi = 12.17 kbps. For instance, Table 1 shows the
characteristics of 9 byte LoRa packets with explicit header and CRC modes enabled and BW = 125 kHz.
Table 1. Characteristics of the LoRa uplink model containing packets of 9 bytes at BW = 125 kHz.
N
r1 t = g d1 h1 ∗ s1 t + ∑ χSF
k t g dk hk ∗ sk t + n t , (2)
k =2
where n t is additive white Gaussian noise with zero mean and variance N = −174 + NF +
10log10 ( BW ) dBm, NF is the noise figure of the receiver, and −174 dBm/Hz is the thermal noise
spectral density constant.
We consider that an outage of the received signal in an uplink channel can take place in the two
scenarios [19]. First, if the signal-to-noise ratio (SNR) of the received packet is less than the SF specific
threshold qSF , then the node is considered disconnected. Second, if the signal-to-interference ratio (SIR)
between the target-received packet and any other concurrent signals of the same SF and frequency
channel is less than 6 dB, then it is considered as a collision.
110
Sensors 2019, 19, 4723
only possible when the SNR of the received signal at the gateway is less than the reception threshold
qSF . Thus, the first outage condition, the connection probability, is defined as [19]
N qSF
H1 = exp , (3)
P1 g ( d1 )
where d1 (in meters) is the distance of the desired end-device from the gateway.
The probability above depends on the distribution of Xk∗ = | hk∗ |2 g(dk∗ ). The cumulative distribution
function (CDF) of Xk∗ is derived in [19] and is denoted as FXk∗ . Thus,
∞
| h1 |2 g ( d1 ) zg(d1 )
Q1 = E|h1 |2 FXk∗ = e−z FXk∗ dz. (5)
4 0 4
Moreover, in [19] the authors present an approximation for (5) that is only accurate at the edges of each
annulus. This paper considers only the exact probability in (5).
The average coverage probability of a individual SF annulus is also inspected. It indicates the
probability of an end-device at distance d1 in the annulus i by considering the connection and capture
probabilities and is defined as [20]
l
2 i +1
℘c,i = H1 (d1 ) Q1 (d1 )(d1 − li ) dd1 , (7)
( li +1 − li )2 li
where li+1 is the radius of the outer circle and li is the radius of the inner circle of the ith annulus.
111
Sensors 2019, 19, 4723
between the cluster centers and data elements typically assumes the Euclidean distance. K-means
clustering method can efficiently achieve robust clustering results when dealing with large data sets.
The K-means algorithm first arbitrarily chooses K points from the data set, which indicate the initial
centroids. The remaining points are then clustered to the closest centroid, and the coordinates of
centroids are recalculated, iteratively, until the cost function converges.
Consequently, it is important to choose the appropriate number of centroids during the
initialization procedure because the area of each annulus π (li2+1 − li2 ) increases towards the higher
SFs in a strategy based on equal distance steps per SF, which results in the growth of node density
due to uniform distribution. That is why it is essential to select the sequences for K-means iterations
that can provide larger values of K clusters for higher SFs. In order to avoid an extensive number of
nodes in an individual SF, there should be a fair difference between the inner (li ) and outer (li+1 ) radii
of annulus. In the proposed work, the annulus area is directly dependent on the difference between
the K clusters for two consecutive iterations.
In our approach, we use five iterations of K-means. We start by computing the boundaries of
the outermost SF ring, SF12, and then proceed to define the inner boundaries for lower SFs. For each
iteration, K clusters are selected to develop the centroids of end-devices in the LoRa network covered
by a single gateway. Four different mathematical sequences listed in Table 2—a Fibonacci series, square
numbers, Wythoff array, and arithmetic series—are used to assign the values of K for each iteration.
In our work, K-means operates iteratively. Each iteration defines the set of nodes at the outer SF
ring. In each iteration, the algorithm seeks the set of K centroids C that minimizes the average of the
distances between any node and its closest centroid, i.e.,
1
C = arg min
| EDk | ∑ dist(Ck , Xi )2 , (8)
Ck ∈C Xi ∈ EDk
where EDk is the set of devices at the k-th iteration, Xi is a device in EDk , and Ck is the closest centroid
of Xi . The function dist( x1 , x2 ) computes the Euclidean distance between x1 and x2 . This procedure
returns the collection of K centroids of network nodes, whereas C = {C1 , . . . CK }. After computing
the centroids, the algorithm determines the boundary of C, so that [Cx , Cy ] = boundary(C ), which
determines the 2-D vector of border points around the Cartesian coordinates of the centroids. Then,
it separates the nodes that are inside of the centroid boundary, forming the set I = [ Ix , Iy ], where
Ix and Iy are vectors storing the coordinates of the inner nodes in each of the Cartesian dimensions.
In the next step, the maximum absolute value of each dimension of I is calculated to set the radius as
max | I |+max | I |
li = x
2
y
, which defines the limit of the SF ring i. The procedure repeats to determine the
boundaries of the remaining SF rings (l5 , . . . l1 ).
The steps involved in the proposed SF allocation technique are described in Algorithm 1. It repeats
the process five times to allocate nodes for SF12–SF8.At the end, the remaining nodes use SF7. Initially,
the SF12 outer limit is set to the network radius. In each iteration, the number of clusters is assigned
to K depending on the chosen mathematical series (as mentioned in Table 2). For the first iteration,
the algorithm considers all of the N̄ nodes inside the set ED. In line 4, it computes the K-means of ED,
which returns the centroids C = {C1 , . . . CK } by (8). Since nodes in the set I are inside the boundary of
centroids, line 7 computes the inner limit of SF ring li . This process is repeated iteratively until l1 is
112
Sensors 2019, 19, 4723
calculated for the allocation of SF8 and the remaining nodes are assigned to SF7 (line 11). Note that
the set of nodes ED is updated at the end of each iteration by removing the nodes that were already
allocated to an SF (line 9).
1: l6 := R
2: for i in {5, . . . , 1} do For each SF ring, starting from the outermost ring
3: K := GetKfromSeries(i) Set number of centroids for this iteration
4: C := Kmeans(ED, K) Compute the centroids
5: B := boundary(C) Compute the boundary of C
6: I := { x ∈ ED | x ∈ convB} Select nodes that are inside the boundary B
max(| Ix |)+max(| Iy |)
7: li : = 2 Compute the new SF ring limit
8: SFi+7 := { x ∈ ED | x ∈ / Ball[(0, 0), li ]} Allocate SFi+7 to nodes outside the circle of radius li
9: ED := { x ∈ ED | x ∈ Ball[(0, 0), li ]} Remove nodes outside the circle of radius li
10: l0 := 0
11: SF7 := ED Allocate SF7 to remaining nodes
12: return L
All of the iterations of the proposed algorithm for an example network are demonstrated in
Figure 2. The radius of the network circular area is R = 3 km, and therefore, the outer limit of SF12 is
l6 = R = 3 km. The first iteration of the algorithm defines the inner boundary of SF12, l5 , as shown in
Figure 2. After excluding the devices inside the SF12 ring from EDk , the algorithm runs a new iteration
and defines l4 , i.e., the inner boundary of the SF11 ring. The iterations continue until l1 is defined and
the complete network geometry is obtained.
3 3 3
R l5 l4
2 l5 2 2
l4 l3
1 1 1
0 0 0
-1 -1 -1
-2 -2 -2
-3 -3 -3
-3 -2 -1 0 1 2 3 -3 -2 -1 0 1 2 3 -3 -2 -1 0 1 2 3
3 3
l3 l2 3 l1
2 2
l2 l1 2 l0
1 1 1
0 0 0
-1 -1 -1
-2
-2 -2
-3
-3 -3
-3 -2 -1 0 1 2 3 -3 -2 -1 0 1 2 3 -2 0 2
Figure 2. K-means iterations for SF allocation based on Fibonacci series and 500 nodes, where li and
li+1 are the inner and outer radii of ith annulus, respectively.
113
Sensors 2019, 19, 4723
Figure 3 depicts the clusters of nodes, centroids, and gateway at the origin for the last K-means
iteration. The nodes outside l1 are allocated to SF8, and the remaining nodes are assigned to SF7.
The SF distribution of N̄ = 500 nodes based on the proposed approach considering the Fibonacci series
for clustering is shown in Figure 4. The number of nodes in SF rings depends on the chosen series
because of the distinct number of clusters for each sequence.
1500
Gateway
Cluster 1
1000 Cluster 2
Cluster 3
Cluster 4
Cluster 5
500 Centroids
l1
-500
-1000
-1500
-1500 -1000 -500 0 500 1000 1500
Figure 3. 5th iteration with Fibonacci series. Nodes outside l1 use SF8, those inside use SF7.
3
SF12
SF11
2 SF10
SF9
SF8
SF7
1 Gateway
-1
-2
-3
-3 -2 -1 0 1 2 3
114
Sensors 2019, 19, 4723
The area of each annulus also varies according to the mathematical series, which also affects the
network performance. An important aspect to take into consideration is the selection of the number
of clusters (K); if the difference between the clusters of two consecutive iterations is too big, that will
result in a large number of end-devices in that specific region and, as a consequence, the probability of
collisions and of co-SF interference will be high. In the same way, SF7 will have a larger coverage area
and more nodes if K is high for the last iteration.
Table 4. Comparison of the proposed approach with the reference method, based on the number
of nodes.
115
Sensors 2019, 19, 4723
Table 5. Comparison of proposed approach with the reference method based on the distance of
individual SF outer boundaries from the gateway (values in meters).
The boxplot is a standard process to quantify the variability of data on the basis of five parameters,
i.e., the minimum, first quartile (25%), median, third quartile (75%), and maximum. Th distance
of the SFs boundary from the gateway for N̄ = 500 is demonstrated in Figure 5 for each of the
considered series.
3000 3000
2500 2500
2000
2000
1500
1500
1000
1000
500
SF7 SF8 SF9 SF10 SF11 SF12 SF7 SF8 SF9 SF10 SF11 SF12
3000 3000
2500 2500
2000 2000
1500
1500
1000
1000
SF7 SF8 SF9 SF10 SF11 SF12 SF7 SF8 SF9 SF10 SF11 SF12
Figure 5. Boxplots representing the distance of SFs from the gateway. The red “+” signs indicate
outliers. SF12 has a constant distance of 3 km for all of the series.
The median of every SF is identical to distances provided in Table 5. As depicted in the graphical
results, SF7 and SF8 have a large disparity in range and number of nodes for different scenarios, while
SF11 and SF12 have nearly close coverage areas for all scenarios. Furthermore, we can also clearly
observe that variation in K clusters selection has a direct effect on SF allocation based on the proposed
methodology. The number of nodes in each SF are illustrated in Table 4. Square-series-based networks
demonstrate five times more nodes in SF7 as compared to the reference model.
116
Sensors 2019, 19, 4723
The large values of K clusters for the last iterations result in longer radii that directly increase
the region of SF7 and keep SF8 further away from the gateway. These different scenarios can be used
according to different situations and requirements of LoRa applications. An approach based on the
Fibonacci series is beneficial for applications where fewer nodes in lower SFs are required, while the
Wythoff array, square series, and arithmetic series have wider regions for SF7, and thus can be used in
setups where more nodes are required in SF7 inside the radio range of nearly 1200 m to provide highest
data rate (Rb = 5.47 kbps, see Table 1). Several studies examined the performance of LoRa networks and
show that the success probability of data packets decreases for higher SFs. In our work, we consider
the effect of changing the coverage range and varying the number of devices for individual SFs.
1 1
0.8 0.8
0.6 0.6
0.4 0.4
0.2 0.2
0 0
0 500 1000 1500 2000 2500 3000 0 500 1000 1500 2000 2500 3000
1 1
0.8 0.8
0.6 0.6
0.4 0.4
0.2 0.2
0 0
0 500 1000 1500 2000 2500 3000 0 500 1000 1500 2000 2500 3000
Figure 6. LoRa uplink performance with the proposed SF allocation algorithm for different series
and N̄ = 500 nodes. (a) Square series with K = {49, 36, 25, 16, 9}. (b) Fibonacci series with
K = {34, 21, 13, 8, 5}. (c) Wythoff with K = {37, 32, 24, 16, 11}. (d) Arithmetic series with K =
{34, 28, 22, 16, 10}.
As expected, the distance of the end-device from the gateway has considerable influence on
connection probability H1 . In the case of the Fibonacci series, the model has a better success probability
for lower SFs as compared to the square series, arithmetic series, and Wythoff array. This fact is
117
Sensors 2019, 19, 4723
due to the difference in a range of individual SF boundaries for said SF allocation schemes and the
distance-dependent SNR threshold qSF . Furthermore, in the scenario of the square series, SF7 has large
coverage areas of 1201 m (see Table 5), which affects path loss attenuation and the instantaneous SNR.
The SNR threshold qSF , however, remains the same at −6 dB (see Table 1). As a consequence, the outage
condition in (3) slightly degrades the network connection probability. Although a performance boost
is illustrated during transitions of end-devices into the next SF because of the lower value of qSF ,
the performance of the previous SF has a direct consequence on the next SF.
Moving towards the capture probability Q1 , unlike H1 , it considers co-SF interference. Q1 declines
gradually with increasing SF, as illustrated in Figure 6. This trend is because of two major factors
including ToA and the number of nodes in each annulus. ToA grows exponentially with SF, thus for
the higher SFs, the wireless channel remains occupied for a long time slot, which increases the risk
of collisions between simultaneously transmitted LoRa packets. In the same way, the number of
end-devices in an individual annulus increases for higher SFs due to the uniform distribution of nodes
in the circular coverage area, as demonstrated in Table 4. As a result, the network experiences co-SF
interference that degrades the quality of transmission. For the cases with the square series, arithmetic
series, and Wythoff array (Figure 6a,c,d), the model has a larger coverage area and more nodes in
SF7, resulting in higher co-spreading factor interference, which is the major reason behind the lower
performance of the network for these specific scenarios. Although we are sacrificing network quality
for lower SFs with fewer nodes and high success probabilities, as presented in Figure 7, we improved
the performance of the network for the higher SFs and regions with more nodes, where the network
performance was weak in the baseline model from [19], which considers fixed distance steps from the
gateway to define the SF allocation. Moreover, SF allocation based on the square series (Figure 6a)
has better network performance, which happens because of improved gain in Q1 for higher SFs as
compared to the Fibonacci series, arithmetic series, and Wythoff array.
0.2 0.1
0.1
0.05
0
0
-0.1
-0.05
-0.2
-0.3 -0.1
0 500 1000 1500 2000 2500 3000 0 500 1000 1500 2000 2500 3000
0.15 0.15
0.1 0.1
0.05 0.05
0 0
-0.05 -0.05
-0.1 -0.1
-0.15 -0.15
-0.2 -0.2
-0.25 -0.25
0 500 1000 1500 2000 2500 3000 0 500 1000 1500 2000 2500 3000
Figure 7. Comparison of performance gain of different series with respect to the baseline model for
N̄ = 500, network size of R = 3 km with p0 = 1%, and path loss exponent η = 2.75.
118
Sensors 2019, 19, 4723
In Figure 8, we present the performance of the square series based on the proposed SF allocation
algorithm in comparison with the baseline model. First, we observe that the capture probability Q1
and coverage probability H1 Q1 of the baseline model outperform the proposed algorithm in the region
of radius R > 1000 m from the gateway. Here, it is worth mentioning that there are fewer nodes in
this region as compared to the remaining area of the network. The proposed algorithm surpasses the
baseline model with a gain in capture probability Q1 (up to 53% for SF12 in Figure 8b). In addition, the
nodes closer to the gateway always have better behavior in contrast with nodes far away, so that the
network can tolerate a lower success probability with a boost in performance of farther end-devices.
As expected, there was more change in success probability in the higher SFs region as compared to
baseline model because of the fair distribution of SF by the proposed algorithm. Figure 8b shows the
difference between the baseline model and the square series in terms of outage probabilities through
the course of distance. The zero level on the y-axis (success probability) shows no difference, while
there is a positive/negative gain either on the upper or lower side of that level. There is up to 16.73%
growth in Q1 demonstrated by the end-devices present in higher SFs.
1 0.2
0.9 0.15
0.1
0.8
0.05
0.7
0
0.6
-0.05
0.5
-0.1
0.4
-0.15
0.3 -0.2
0.2 -0.25
0 500 1000 1500 2000 2500 3000 0 500 1000 1500 2000 2500 3000
Figure 8. (a) Performance comparison of square series with the reference model for N̄ = 500.
(b) Performance gain (success probability of proposed model − success probability of reference
model). The proposed SF allocation approach sacrifices Q1 , H1 Q1 for the lower SFs but achieves
greater performance for the higher SFs.
Moreover, we also consider the evaluation of the average coverage probability of the networks
for different numbers of nodes ( N̄) ranging from 300 to 700, and results demonstrate that ℘c drops
exponentially towards higher N̄. Figure 9 depicts the average coverage probability of different numbers
of end-devices. The SF allocation schemes deployed using the square series demonstrated a better
performance gain than all other scenarios, including the reference model. It was followed by the
Wythoff array, arithmetic series, and Fibonacci series, in that order. The proposed SF allocation
scheme overcomes the performance of the baseline model by an overall growth of around 5% in its ℘c .
For instance, taking the square series into account, at N̄ = 500 there is a boost in the average coverage
probability (6) from ℘c = 41.9% to 46.81% compared with the reference model. On the other hand, SF
allocation schemes deployed using the Fibonacci series showed the least-improved network coverage
probability compared to all other user distribution series.
119
Sensors 2019, 19, 4723
0.7
0.65
0.6
0.55
0.5
0.45 0.4114
0.4
0.35
0.3610
0.3
0.25
0.2
300 400 500 600 700
Figure 9. Comparison of the coverage probabilities of the LoRa uplink as a function of the number of
nodes ranging from N̄ = 300 to 700 nodes for the network size of R = 3 km with p0 = 1% and path loss
exponent η = 2.75.
We also investigated the performance of the proposed model taking into account the variation of
different parameters on Fibonacci series. As seen in Figure 10a,b, H1 is agnostic to the number of nodes
and duty cycle. It is assessed at 0.1% and 1%, which is within the duty cycle range specified by ETSI
for LoRa applications [34,35]. Furthermore, node density and the duty cycle demonstrate a negative
impact on Q1 because of co-SF interference caused by increasing medium usage from N̄ = 501 nodes
to N̄ = 1005 nodes. Likewise, in Figure 10c, the path loss exponent η illustrates network connection
degradation at 2.65 from 2.5 because H1 depends on the distance, while the the capture probability
(Q1 ) is not dependent on the path loss exponent. In the case of one frequency channel, the transmit
power Pk of nodes can be up to 20 dBm (100 mW) [11,41]. In order to evaluate the effect of different
transmit powers, in Figure 10d we raised the transmit power from 14 dBm to 19 dBm. The results
demonstrate that the transmit power of 19 dBm causes a better connection probability as compared
to 14 dBm. Nevertheless, variations of the path loss exponent and transmit power do not affect Q1
considerably because it is much more dependent on the number of nodes.
120
Sensors 2019, 19, 4723
1 1
0.8 0.8
0.6 0.6
0.4 0.4
0.2 0.2
0 0
0 2000 4000 6000 8000 10000 12000 0 2000 4000 6000 8000 10000 12000
1 1
0.8 0.8
0.6 0.6
0.4 0.4
0.2 0.2
0 0
0 2000 4000 6000 8000 10000 12000 0 2000 4000 6000 8000 10000 12000
Figure 10. Performance LoRa uplink considering Fibonacci series K-means clustering, and the impact
of different parameters on success probabilities. (a) Density of users increased from N̄ = 501 to N̄ = 1005.
(b) Duty cycle increased from p0 = 0.1% to p0 = 1%. (c) Path loss exponent from η = 2.5 to η = 2.65.
(d) Transmit power from (Ptx = 14) dBm to Ptx = 19 dBm.
5.3. Discussion
The architecture of LoRaWAN consists of end-devices, a gateway, network server (NetServer),
and application server [15]. The NetServer is mainly responsible for the overall management of the
network. The dynamic configuration of the SF by the NetServer is already possible in LoRaWAN
during the network join procedure or through specific MAC commands. In fact, these features are
used in LoRaWAN when the adaptive data rate (ADR) mechanism is active. For our approach to be
implemented in practice, the NetServer could run our algorithm periodically or when the number of
connected devices changes significantly, and then issue the required MAC commands to reconfigure
the devices that need to change their SF. Therefore, as the current LoRaWAN specification is already
able to dynamically allocate SFs, our proposal only changes the way the proper allocation is calculated
at the NetServer, and is therefore feasible in practice.
6. Conclusions
This paper has presented a novel SF allocation technique for a large-scale LoRa network using the
K-means clustering machine learning algorithm. The authors also analyzed the impact of the distance
of end-devices from the gateway and the number of nodes in each SF on network performance. In this
work, four different scenarios are considered, which have different distances for the SF boundaries
and variations in the number of nodes in an individual SF. Such fair distribution results in a better
average coverage probability in the higher SFs, while dealing with the maximum number of nodes.
Numerical findings show that our SF allocation algorithm outperforms the reference model not
only in terms of success probability but also in regards to fair resource distribution. The evaluated
theoretical and simulation results are useful for an in-depth understanding of large and dense LoRa
121
Sensors 2019, 19, 4723
networks. Our resource allocation method can handle dense and large circular coverage areas for LoRa
sensors using distinct numbers of clusters instead of equal-radius-based SF allocation [19,20], while
the techniques in [28,29,33] are designed for short-range networks. The studies [19,20,28,29,33] only
highlighted the performance of networks for fixed parameters. In contrast to them, our work inspects
different scenarios by obeying the restrictions of ETSI standards.
Author Contributions: Concept and methodology, H.A.; software, M.A.U. and J.I.; validation, A.H. and H.A.;
Resources, A.H. and R.D.S.; writing original draft, M.A.U. and J.I.; writing revision, H.A., A.H., and R.D.S.;
supervision, H.A.; Project Administration, H.A.
Funding: This research has been supported in Finland by the Academy of Finland: 6Genesis Flagship (Grant
no318927) and EE-IoT (no319008); as well as the BusinessFinland MOSSAF project. This work has been supported
in Brazil by CNPq, PrInt CAPES-UFSC “Automation 4.0”, and INESC P&D Brasil (Project F-LOCO, Energisa,
ANEEL PD-00405-1804/2018).
Conflicts of Interest: The authors declare no conflict of interest.
References
1. Chen, S.; Xu, H.; Liu, D.; Hu, B.; Wang, H. A Vision of IoT: Applications, Challenges, and Opportunities
With China Perspective. IEEE Internet Things J. 2014, 1, 349–359. [CrossRef]
2. Sisinni, E.; Saifullah, A.; Han, S.; Jennehag, U.; Gidlund, M. Industrial Internet of Things: Challenges,
Opportunities, and Directions. IEEE Trans. Ind. Inf. 2018, 14, 4724–4734. [CrossRef]
3. Sotres, P.; Lanza, J.; Sánchez, L.; Santana, J.R.; López, C.; Muñoz, L. Breaking Vendors and City Locks through
a Semantic-enabled Global Interoperable Internet-of-Things System: A Smart Parking Case. Sensors 2019,
19, 229. [CrossRef] [PubMed]
4. Rodrigues, J.J.P.C.; De Rezende Segundo, D.B.; Junqueira, H.A.; Sabino, M.H.; Prince, R.M.; Al-Muhtadi, J.;
De Albuquerque, V.H.C. Enabling Technologies for the Internet of Health Things. IEEE Access 2018, 6,
13129–13141. [CrossRef]
5. Asadullah, M.; Ullah, K. Smart home automation system using Bluetooth technology. In Proceedings of the
2017 International Conference on Innovations in Electrical Engineering and Computational Technologies
(ICIEECT), Karachi, Pakistan, 5–7 April 2017; pp. 1–6.
6. Saha, H.N.; Mandal, A.; Sinha, A. Recent trends in the Internet-of-Things. In Proceedings of the 2017 IEEE
7th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA,
9–11 January 2017; pp. 1–4.
7. Internet of Things (IoT) Connected Devices Installed Base Worldwide from 2015 to 2025 (in Billions).
Available online: https://www.statista.com (accessed on 16 October 2019).
8. Yasmin, R.; Petäjäjärvi, J.; Mikhaylov, K.; Pouttu, A. On the integration of LoRaWAN with the 5G test
network. In Proceedings of the 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and
Mobile Radio Communications (PIMRC), Montreal, QC, Canada, 8–13 October 2017; pp. 1–6.
9. Mikhaylov, K.; Petrov, V.; Gupta, R.; Lema, M.A.; Galinina, O.; Andreev, S.; Koucheryavy, Y.;
Valkama, M.; Pouttu, A.; Dohler, M. Energy Efficiency of Multi-Radio Massive Machine-Type Communication
(MR-MMTC): Applications, Challenges, and Solutions. IEEE Commun. Mag. 2019, 57, 100–106. [CrossRef]
10. Vangelista, L.; Zanella, A.; Zorzi, M. Long-range IoT technologies: The dawn of LoRa. In Proceedings
of the Future Access Enablers for Ubiquitous and Intelligent Infrastructures, Cham, Switzerland,
23–25 September 2015; pp. 51–58.
11. Petajajarvi, J.; Mikhaylov, K.; Roivainen, A.; Hanninen, T.; Pettissalo, M. On the coverage of LPWANs: Range
evaluation and channel attenuation model for LoRa technology. In Proceedings of the 2015 14th International
Conference on ITS Telecommunications (ITST), Copenhagen, Denmark, 2–4 December 2015; pp. 55–59.
12. Lauridsen, M.; Vejlgaard, B.; Kovacs, I.Z.; Nguyen, H.; Mogensen, P. Interference Measurements in the
European 868 MHz ISM Band with Focus on LoRa and SigFox. In Proceedings of the 2017 IEEE Wireless
Communications and Networking Conference (WCNC), San Francisco, CA, USA, 19–22 March 2017; pp. 1–6.
13. Cattani, M.; Boano, C.A.; Romer, K. An experimental evaluation of the reliability of lora long-range
low-power wireless communication. J. Sens. Actuator Netw. 2017, 6, 7. [CrossRef]
14. AN1200.22 LoRaTM Modulation Basics, Rev. 2. Semtech, 2015. Available online: http://www.semtech.com/
uploads/documents/an1200.22.pdf (accessed on 31 July 2019).
122
Sensors 2019, 19, 4723
123
Sensors 2019, 19, 4723
35. Hasegawa, Y.; Suzuki, K. A Multi-User ACK-Aggregation Method for Large-Scale Reliable LoRaWAN
Service. In Proceedings of the ICC 2019—2019 IEEE International Conference on Communications (ICC),
Shanghai, China, 20–24 May 2019; pp. 1–7.
36. Li, L.; Ren, J.; Zhu, Q. On the application of LoRa LPWAN technology in sailing monitoring system.
In Proceedings of the 13th Annual Conference on Wireless On-demand Network Systems and Services
(WONS), Jackson, WY, USA, 21–24 February 2017; pp. 77–80.
37. Yasmin,R.; Petäjäjärvi, J.; Mikhaylov, K.; Pouttu, A. Large and Dense LoRaWAN Deployment to
Monitor Real Estate Conditions and Utilization Rate. In Proceedings of the 2018 IEEE 29th Annual
International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Bologna,
Italy, 9–12 September 2018.
38. Abramson, N. The Aloha System—Another alternative for computer communications. In Proceedings of the
FallJoint Computer Conference (AFIPS ’70 (Fall)), New York, NY, USA, 17–19 November 1970; pp. 281–285.
39. Goursaud, C.; Gorce, J.M. Dedicated networks for IoT: PHY/MAC state of the art and challenges.
EAI Endorsed Trans. Internet Things 2015, 1. [CrossRef]
40. Na, S.; Xumin, L.; Yong, G. Research on k-means Clustering Algorithm: An Improved k-means Clustering
Algorithm. In Proceedings of the 2010 Third International Symposium on Intelligent Information Technology
and Security Informatics, Jinggangshan, China, 2–4 April 2010; pp. 63–67.
41. Bouguera, T.; Diouris, J.F.; Chaillout, J.J.; Jaouadi, R.; Andrieux, G. Energy Consumption Model for Sensor
Nodes Based on LoRa and LoRaWAN. Sensors 2018, 18, 2104. [CrossRef] [PubMed]
c 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access
article distributed under the terms and conditions of the Creative Commons Attribution
(CC BY) license (http://creativecommons.org/licenses/by/4.0/).
124
sensors
Article
User Association and Power Control for Energy
Efficiency Maximization in M2M-Enabled Uplink
Heterogeneous Networks with NOMA
Shuang Zhang 1,2 and Guixia Kang 1,2, *
1 Key Laboratory of Universal Wireless Communications, Ministry of Education, Beijing University of Posts
and Telecommunications, Beijing 100876, China; [email protected]
2 Wuxi BUPT Sensory Technology and Industry Institute CO. LTD, Wuxi 214000, China
* Correspondence: [email protected]
Abstract: To support a vast number of devices with less energy consumption, we propose a new user
association and power control scheme for machine to machine enabled heterogeneous networks
with non-orthogonal multiple access (NOMA), where a mobile user (MU) acting as a machine-
type communication gateway can decode and forward both the information of machine-type
communication devices and its own data to the base station (BS) directly. MU association and power
control are jointly considered in the formulated as optimization problem for energy efficiency (EE)
maximization under the constraints of minimum data rate requirements of MUs. A many-to-one MU
association matching algorithm is firstly proposed based on the theory of matching game. By taking
swap matching operations among MUs, BSs, and sub-channels, the original problem can be solved
by dealing with the EE maximization for each sub-channel. Then, two power control algorithms are
proposed, where the tools of sequential optimization, fractional programming, and exhaustive search
have been employed. Simulation results are provided to demonstrate the optimality properties of our
algorithms under different parameter settings.
1. Introduction
The increase of smartphones, laptops, and other mobile devices as well as data-hungry applications,
need huge demands for ubiquitous coverage and very high data rates in cellular networks. However,
homogeneous networks cannot satisfy these requirements [1]. Then, two-fold efforts have been spent
to meet the stringent requirements. On one hand, researchers have proposed heterogeneous networks
(HetNets) where different types of base stations (BSs), e.g., macro BSs (MBSs) and small BSs (SBSs) are
deployed in a multi-tier hierarchical structure. In this structure, all BSs have seamless coverage and reuse
frequencies to achieve higher data rate [2,3]. On the other hand, the so-called non-orthogonal multiple
access (NOMA) has been investigated as a potential technique to further improve the throughput of
network [4–7]. Different from conventional orthogonal multiple access (OMA), NOMA serves multiple
users at the same time/frequency/codes resource by allocating different powers for them, and the
superposition coded signal can be decoded at receivers by successive interference cancellation (SIC).
Therefore, the combination of HetNets and NOMA will exhibit great potential to satisfy the 1000-times
increase of mobile broadband data for the upcoming fifth generation (5G) communication systems and
beyond [3].
However, the severe inter-tier and intra-tier interference make the NOMA-enabled HetNets
challenging to achieve. Resource management plays an important role to alleviate these interference [8].
For downlink communication, specifically, some work focuses on the sum rate maximization and
shows higher spectral efficiency (SE) can be achieved by NOMA when considering the intercell
interference [9–12]. Besides SE, energy efficiency (EE) is also a key performance metric investigated for
resource allocation in NOMA-enabled HetNets [8,13,14]. Moreover, EE is more important in uplink
than in downlink NOMA-enabled HetNets since the devices in uplink communications are often
battery-limited. It is a fact that the battery capacity has been improved at a very slow pace over the
past decades [15], and hence this increase cannot scale with the high energy consumption caused by
the increasing traffic demands. Meanwhile, EE has emerged as a new prominent performance metric
for wireless communication networks designs due to the economic, operational, and environmental
concerns [16,17]. Therefore, it is a stringent work to improve EE for uplink transmission.
Machine-to-machine (M2M) communications, also known as machine-type communications
(MTC), enable pervasive connections to support IoT. M2M communications are one of the potential
applications of NOMA-enabled HetNets [18], since NOMA-enabled HetNets provide a practical
infrastructure to offer massive access opportunities for such a huge number of devices, especially
for the cases in which each device only needs to send a small amount of data periodically in uplink.
One of the challenges for HetNets with M2M communications is the access control, which can manage
the engagement of massive MTC devices (MTCDs) to the core network. Among the existing access
solutions, deploying MTC gateways (MTCGs) is an effective approach to connect M2M communication
and cellular communication [19–21]. When mobile user (MU) has more power and storage space than
MTCDs (e.g., smart sensors), the MU can be configured as the MTCG, as proposed in [22].
Since 5G will be HetNets including various network models (e.g., cellular networks, wireless
networks (WSNs), and low power wireless area networks) to support high data rate and massive
devices [3], our work combing M2M communication and cellular network has a large significance for
this heterogeneous scenario. The short distance communication in our system model can be realized
with WSNs, which provide a new way to help the sink nodes in WSNs communicate to the core
network. For example, the MTCDs can be the sensors in an environmental monitoring WSN, and they
can transmit the collected data to the core network through a mobile device in cellular networks with
NOMA. Therefore, our work also has a practical significance for sensors work.
Recently, there have been some studies addressing the aforementioned challenges of applying
NOMA in HetNets for EE maximization. In [23], a distributed user association algorithm based on
inter-cell interference plus noise ratios of BS and a centralized user association based on the popular
size of BS were both proposed. After user association was determined, a power control algorithm
was proposed based on Lagrangian dual method, then a one-dimensional search algorithm was
used to search Lagrangian multiplier, which added algorithm complexity. Two specific examples
were provided to demonstrate the effectiveness of unified NOMA-enabled heterogeneous ultra-dense
networks with user association and power control in [18]. An alternated energy efficient resource
allocation algorithm based on fixed power allocation was first proposed in [13]. Then, two iterative
energy-efficient resource allocation algorithms were proposed to update for better EE based on
Lagrangian dual method. Joint base station association and power control optimization algorithms
were proposed based on coalition formation games and interior-point method in [24], but sub-channel
allocation and fractional equation for EE maximization had not been considered. Moreover, the user
association algorithms in the aforementioned work were all considered with fixed power allocation
firstly, whereafter iterative algorithms were used to obtain the final optimal value.
There are also some studies on the usage of M2M communications in NOMA systems.
For example, energy-efficient resource allocation with hybrid division multiple-access NOMA for
cellular-enabled M2M communications was researched in [25,26]. With MTCDs cluster formation
known beforehand, standard convex optimization and Lagrange duality methods were employed
respectively for power control in [25,26]. User clustering in NOMA-aided cellular M2M communication
systems was researched in [27,28] with millimeter-wave and narrow-band IoT separately. A joint
power and sub-channel allocation for secrecy capacity algorithm was proposed in [29] to obtain the
126
Sensors 2019, 19, 5307
suboptimal solution of the optimization problem. However, the aforementioned work deploys M2M
user in single-cell networks. The trend of more and more intensive network deployment motivates us
to deploy M2M-enabled NOMA in the scenarios with multi-tier HetNets and new resource allocation
needs to be considered with the non-convexity caused by inter-cell interference in HetNets.
In this paper, we focus on the uplink EE maximization via user association and power control
for M2M-enabled HetNets using NOMA. In this scenario, one macro base station (MBS) is located
in the cell center. Each small cell has one small base station (SBS) located in the cell center. MUs
are distributed randomly in the cell. An MU acting as an MTCG can decode and forward both
the information of MTCDs and its own data to the BS. The EE (bits/Joule) maximization problem
is formulated and solved to obtain the optimal MU association and power allocation. The main
contributions of this paper are summarized as follows:
• We propose a new framework of M2M-enabled HetNets with NOMA. In this framework, control
data separation architecture, i.e., control information and data message are separated, which can
reduce the signal overhead [30]. NOMA is adopted by the MTCDs to transmit the information to
MUs which is regarded as the relay. MUs decode the overlaid information and simultaneously
transmit received data to the BSs based on the NOMA principle.
• In order to solve the EE maximization optimization problem, a BS and a sub-channel are included
in a couple, since a MU can only associate one BS at one sub-channel. Then, a many-to-one MU
association algorithm is proposed based on matching game [31]. Through swap operation among
each couple, the EE maximization problem can be tackled by solving the power control problem
at each sub-channel. Compared with the previous studies on the algorithms (user association and
power allocation) [13,18,23,24], our algorithms are jointly optimized and fixed power allocation
is not required for initialization.
• Two power control algorithms are proposed based on sequential optimization [32,33].
The fractional programming [34] and sequential optimization are combined to develop a novel
sequential fractional power control algorithm (SFPCA), from which the original problem is
transformed to be convex and requires less computational complexity. The other algorithm
combines the exhaustive search method with sequential optimization, which can verify the
correctness of SFPCA.
The rest of this paper is organized as follows. The system model and problem formulation are
focused in Section 2. The MU association matching algorithm is proposed in Section 3. The power
control problem is solved in Section 4. Numerical results are provided in Section 5, and concluding
remarks are given in Section 6.
Notations: Lowercase and uppercase boldface letters denote vectors and matrices, respectively.
We use uppercase decorated letters to denote sets. For an arbitrary set M, we always have the
corresponding uppercase M to the denote the cardinality of M, i.e., |M| = M, [·] T denotes the
transpose operator.
127
Sensors 2019, 19, 5307
F = |F |. The system bandwidth shared by all BSs is divided into N orthogonal sub-channels, and each
one is assigned with bandwidth B. For convenience, hereinafter we always have n ∈ N = {1, 2, · · · N }
to denote the sub-channel. MUs are served by BSs according to the BSs’ coverage.
&RUH1HWZRUN
RUH
&%6
MU3 signal
dectection
08
0
08..
0
MU2 signal MU1 signal 0%6
0%6
6 08
08.
.
dectection dectection
6%6
6%6
6
6%6
%6
08
08
08 08
ĂĂ
08
08
08N
N
0
08 08
08
08N
08
08 N
0
08
088NN
07&'
07&
&'
07&'
07&'
07&'N
07&'N
N 07&'N
07&
&'N
N
&RPPXQLFDWLRQDWVXEFKDQQHO
6KRUWGLVWDQFHWUDQVPLVVLRQ
&RQWUROLQIRUPDWLRQ
where h jk is the channel between MTCD jk and MUk ; q jk and s jk denote the transmit power and message
of MTCD jk ; and nk represents the additive zero-mean Gaussian noise with variance σ2 . Uk represents
the setof MTCDs which are served byMUk . Without loss of generality, the channels are sorted by
h1 k 2 σ2 > h2 k 2 σ2 > · · · hU k 2 σ2 > 0. Applying SIC in NOMA [33], the achievable data
k k k k k k
throughput for MTCD jk at MUk is given by
Hjk k q jk
R jk = log2 1+ , (2)
1 + Ijk
2
where Hjk k = h jk k σk2 , Ijk = ∑
q H ,
ik k ik k
and we define Ijk = 0 for jk = Uk . After MUs
i ∈ Uk Hi k < Hj k
k k
successfully decode the messages from MTCDs,all MUs simultaneously transmit data to the BS based
on the NOMA principle. Denote hk f n = gk f n d− α
k f as the channel gain between MUk and BS f at
sub-channel n (SCn ). gk f n denotes the corresponding Rayleigh fading channel gain; α is the path loss
factor; and dk f is the distance between MUk and BS f . In order to split the superimposed signals on
SCn in BS f , SIC is carried out at BS f . Based on the uplink NOMA protocol [35], the signal of MU with
the highest channel gain will be first decoded at BS f and experiences interference from other MUs
having relatively weaker channel gains on SCn . Therefore, the channel gains of MUs over SCn in BS f
128
Sensors 2019, 19, 5307
2 2 2 2
are sorted as h1 f n σ2f n > h2 f n σ2f n > · · · hk f n σ2f n > · · · hS f n f n σ2f n , where S f n = S f n .
Then the transmit data rate of MUk associated with BS f over SCn can be expressed as
pk f n Hk f n
Rk f n = Blog2 1+ , (3)
1 + Ik f n + φk f n
2
where Hk f n = hk f n σ2f n . Ik f n is the interference that MUk receives from other MUs whose channel
gains are smaller than that on SCn of BS f , which can be given by
Ik f n = ∑ pi f n Hi f n . (4)
i ∈{S f n | Hi f n < Hk f n }
φk f n = ∑ ∑ pi f n Hi f n is the interference from MUs associated to other BSs on SCn . Then the
f ∈{F \ f } i ∈S f n
data rate of MUs at SCn is
pk f n Hk f n
Rn = B ∑ ∑ log2 1+
1 + Ik f n + φk f n
. (5)
f ∈F k ∈S f n
Rn
EEn = , (6)
∑ ∑ pk f n + Pc
f ∈F k ∈S f n
where Pc is the additional circuit power consumption over each sub-channel. Then the considered EE
optimization problem can be formulated as
max
P
∑ EEn (7a)
n∈N
s.t. Rk f n ≥ ∑ R jk + Rreq , ∀k ∈ K, n ∈ N , (7b)
j∈U j
k
where P is the transmit power vector with elements pk f n ; Pmax is the maximum transmit power of each
MU; and Rreq is the minimum data rate requirement of a MU. Since each MU is regarded as an MTCG
for MTCDs, they should ensure the data rate that MTCDs can be uploaded to the SBS, therefore we
have constraint (7b) as the data rate requirement of MUk associated to BS f at SCn [22]. Constraint (7c)
is used to guarantee the feasible value ranges of P.
129
Sensors 2019, 19, 5307
3. MU Association
The MTCDs associated to the corresponding MU are known beforehand. Since solving the
optimization problem is equal to obtain the optimal EE of each sub-channel, the MU association
will become the matching problem among BSs, sub-channels and MUs to achieve sub-channel EE
maximization. Thus, we propose a MU association algorithm using matching game [30] in the
following parts.
Definition 1. Given two disjoint sets, K = {1, · · · , K } denotes the set for MUs, and M =
{(1, 1) (1, 2) · · · , (2, 1) · · · , (n, f ), · · · ( N, F )} represents the couples. A many-to-one matching Ψ is
a mapping from the set K ∪ M into the set of all subsets of K ∪ M for f ∈ F , k ∈ K, n ∈ N satisfying
i) Ψ(k ) ∈ M;
ii) Ψ(n, f ) ⊂ K;
iii) |Ψ(k)| = 1 |, Ψ(SCn , f )| = S f n ;
iv) (n, f ) = Ψ(k) ⇔ k ∈ Ψ(n, f ).
Condition i indicates that each MU matches with a sub-channel-BS couple. On the other hand,
each couple matches a subset of MUs, which is illustrated in condition ii. Condition iii states a MU can
only associate one BS and choose one sub-channel while each couple matches S f n MUs.
The aim of each couple is to maximize its own EE. To this end, we exploit the swap operation
into our matching algorithm. A swap operation means two MUs matching with different couples
exchange their matchings based on different cases, while other MUs remain their matchings. The EE
of the exchanged couples will be recomputed by the power control algorithm. Note that how to
allocate power to obtain the optimal EE for a given sub-channel will be presented in the next section,
and we assume it is known in advance. A swap operation will be approved and the matching will
be exchanged only when all EE of the sub-channels belonging to the exchanged couples increase if
the swap is performed. The swap operation will be continued until no swap is further preferred.
More details are described in Algorithm 1.
130
Sensors 2019, 19, 5307
2: M̂ = M, Count = 1
3: while (Count ≤ M) do
4: Hk∗ f ∗ n∗ = argmax Hk f n . Assign k∗ to the couple ( f ∗ , n∗ ), K̂ = K̂ \k∗ , M̂ =
∀k∈K̂,( f ,n)∈ M̂
M̂\( f ∗ , n∗ ), and set Count = Count + 1
5: end while
6: end for
Swap matching phase: Indicator = 1
7: while (Indicator) do
8: for u = 1 : K do
9: for k = 1 : K do
10: if Ψ(k ) = Ψ(u) then
11: continue;
12: else if MUk and MUu are both in the coverage of the BSs of each other then
13: switch (Ψ(k ), Ψ(u) )
14: case MUk and MUu belonging to the same BS and different sub-channels:
15: Calculate and compare the EE of the two sub-channels before and after the swap using
the power control algorithm. If the EE of the two-subchannels both improve, exchange
the sub-channel, form the new couple, and set Indicator = 1.
16: case MUk and MUu belonging to the different BSs and different sub-channels:
17: Calculate and compare the EE of the two sub-channels before and after the swap using
the power control algorithm. If the EE of the two sub-channels both improve, exchange
the couple, form the new couple, and set Indicator = 1.
18: case MUk and MUu belonging to the different BSs and same sub-channels:
19: Calculate the EE of the sub-channel before and after the swap using the power control
algorithm. If the EE of the sub-channel has been improved, exchange the BS, form the
new couple, and set Indicator = 1.
20: end switch
21: end if
22: end for
23: end for
24: end while
Proof of Theorem 1. For each swap operation, the matching changes from Ψex to Ψnow . We have
EEn,ex and EEn,now to denote the corresponding EE of of Ψex and Ψnow on SCn . Based on the aim of
swap operation, we have EEn,now > EEn,ex , that is, the EE of each sub-channel increases after each
swap matching. Since each sub-channel is orthogonal to each other, the system EE will increase owing
to the improved EE of each sub-channels. Moreover, the system EE has an upper bound due to the
limited transmit power of each MU. Therefore, the MU association algorithm and power allocation
converge after a finite number of swaps.
131
Sensors 2019, 19, 5307
4. Power Control
In this section, we will investigate the optimal power control design appearing in Algorithm 1 to
obtain the maximum EE of SCn . Before we present the optimization problem for EEn maximization,
we first deal with Rn , which can be rewritten as
⎛ ⎞
∑ pk f n Hk f n
⎜ k ∈S f n ⎟
Rn (p f n ) = B ∑ log2 ⎝1 +
1 + φk f n
⎠, (8)
f ∈F
Due to the multi-interference in the sum-rate function in (8), EEn in (6) is non-convex and cannot
be directly solved by the generalized fractional programming approach. Then, we first transform
the numerator into the difference of two non-negative functions and the EEn maximization can be
rewritten as
F+ (p f n ) − F− (p f n )
max η̃n = (10a)
pfn ∑ ∑ pk f n + Pc
f ∈F k ∈S f n
with
Ck+f n (p f n ) − Ck−f n (p f n ) ≥ 0, ∀k ∈ K, ∀ f ∈ F , ∀n ∈ N , (11)
F+ (p f n ) = B ∑ log2 ⎝1 + ∑ pk f n Hk f n + φk f n ⎠ ,
f ∈F k ∈S f n
F − (p f n ) = B ∑ log2 1 + φk f n ,
f ∈F (12)
+
Ck f n (p f n ) = Blog2 1 + pk f n Hk f n + Ik f n + φk f n
− Rtot,k − Rreq ,
−
Ck f n (p f n ) = Blog2 1 + Ik f n + φk f n .
Note that F + , F − , C + , and C − are concave functions regarding to p f n , then the numerator of (10a)
and the constraint functions in (10b) are expressed as the difference of concave functions, which are not
concave in general. Motivated by [31,32], where sequential optimization is used to solve the similar
problem as (10), we adopt this method and combine it with fractional programming and exhaustive
search to propose two power control algorithms. Before introducing the two algorithms, we first
present the details of the sequential optimization theory in the next sub-section.
132
Sensors 2019, 19, 5307
where f 0 (x) is the differentiable objective with constraints f i (x) ≥ 0. Let G (v) be the problem solved in
the v-th iteration by the sequential method to tackle problem F̄, which can be written as
(v)
max g0 (x) (14a)
x
(v)
s.t. gi ( x ) ≥ 0, ∀i ∈ {1, · · · , I }, (14b)
Proposition 1. For any given p f n (v) , the sequence approximation problem of (10), denoted by G (v) can be
written as
F + (p f n ) − F̃ (p f n )
max ηn = (15a)
∑ ∑ pk f n + Pc
f ∈F k ∈S f n
133
Sensors 2019, 19, 5307
Proof of Proposition 1. As we know, any concave function is the upper-bounded of its first-order
Taylor expansion at any point. Since F − (p f n ) and C − (p f n ) are concave functions, for any power vector
(v)
p f n we have
F+ (p f n ) − F− (p f n )
≥ F + (p f n ) − F̃ (p f n )
(18)
= F + ( p f n ) − F − p f n (v)
T
− ∇ F − p f n (v) p f n − p f n (v) ,
C+ (p f n ) − C− (p f n )
≥ C + (p f n ) − C̃ (p f n )
(19)
= C + (p f n ) − Ck−f n p f n (v)
T
− ∇C − p f n (v) ( p f n − p f n ( v ) ).
Hence, (15a) and (15b) are lower bounds of (10a) and (11), respectively. Since the lower bounds
(v)
in (16) are tight when evaluated by p f n , it follows that (15a) and (15b) are equal to (10a) and (11),
(v)
respectively, for p f n = p f n . Similarly, the gradients of (15a) and (15b) are equal to those of (10a) and
(v)
(11), for p f n = p f n . Thus, (15) fulfills all the properties described in the above sub-section, which
completes the proof of this proposition.
(v)
For any p f n , problem (15) has a concave numerator and an affine denominator, while the
constraint functions in (15b) and (15c) are both concave and affine. Therefore, (15) is a single-ratio
problem, which can be solved by the generalized fractional programming. We adopt the widely used
Dinkelbach’s algorithm to solve it. According to Dinkelbach’s method [33], we first introduce the
following auxiliary function
T( p f n , ηn ) = f n ( p f n ) − ηn gn ( p f n ), (20)
with f n (p f n ) = F + (p f n ) − F̃ (p f n ), and gn (p f n ) = ∑ ∑ pk f n + Pc .
f ∈F k ∈S f n
134
Sensors 2019, 19, 5307
Theorem 2. Let ηn∗ , p∗f n and p∗k f n denote the optimal value, optimal solution and its elements of problem (15),
respectively. Then, we have
F + (p∗f n )− F̃ (p∗f n ) F + (p f n )− F̃ (p f n )
ηn∗ = ∑ ∑ p∗k f n + Pc
= max ∑ ∑ pk f n + Pc
, (21)
f ∈F k∈S f n f ∈F k ∈S f n
if and only if
max { T(p f n , ηn∗ ) = f n (p f n ) − ηn∗ gn (p f n ) }
(22)
= f n (p∗f n ) − ηn∗ gn (p∗f n ) = 0.
Proof of Theorem 2. Theorem 2 was proved in [33,36], and we omit it due to the limited space.
The optimal ηn∗ can be obtained by Dinkelbach’s method, which is summarized in Algorithm 2.
As shown in the algorithm, we need to solve the problem (23) for a given parameter ηn (c) in each
iteration. In Algorithm 2, ηn has been updated as ηn (c) in each iteration until convergence. or reaching
the maximum number of iterations. p f n (c) denotes the optimal power of the following problem in the
c-th iteration, which can be obtained in Algorithm 3, as given by
(7c) ,
135
Sensors 2019, 19, 5307
the number of iterations for Algorithm 2, where C is bounded by Cmax . From Section V, we can see
that Algorithm 2 will converge after a few number of iterations. Then we discuss the computational
complexity of Algorithm 3, the complexity of this algorithm is mainly caused by (23), and denoted
by X. The computational complexity of (23) is O(Sn 3 ) [37], where Sn is the number of MUs at SCn .
The complexity of Algorithm 3 is X = VO(Sn 3 ), where V is the the number of iterations bounded by
Vmax . In summary, the computational complexity of the power control algorithm is O(CX ).
Due to the multi-user interference, we cannot solve problem (25) by standard convex optimization
tools. Similar to SFPCA, sequential optimization is applied and the approximate problem can be
shown as
F + (p f n ) − F̃ (p f n )
max (26a)
pfn ∑ ∑ pk f n + Pc
f ∈F k ∈S f n
s.t. F + (p f n ) − F̃ (p f n ) ≥ yn , ∀n ∈ N , (26b)
(7c), (11). (26c)
It can be observed that since yn is fixed, (26) is equivalent to minimize the linear function
∑ ∑ pk f n + Pc in the denominator, subject to convex constraints. Then, problem (26) can be solved
f ∈F k ∈S f n
by plain convex programming. To implement an efficient line search for yn , the bound of yn is given by
y n = FS f n Rreq
⎛ ⎞
∑ pk f n Hk f n
⎜ k ∈S f n ⎟
≤ ∑ log2 ⎝1 +
1 + φk f n
⎠
f ∈F
⎛ ⎞ (27)
136
Sensors 2019, 19, 5307
137
Sensors 2019, 19, 5307
[
TPD[ :
(QHUJ\(IILFLHQF\ELWV-
*UHHQSRLQW
TPD[ :
6($((0D[LPL]DWLRQ
6)3&$((0D[LPL]DWLRQ
6)3&$6XPíUDWH0D[LPL]DWLRQ
3PD[:
TPD[ :
(QHUJ\(IILFLHQF\ELWV-
TPD[ :
TPD[ :
7KHUHTXLUHPHQWGDWHUDWHRIHDFK08ESV
Figure 3. EE versus the date rate requirement of each MU for different schemes.
Figures 4 and 5 shows the convergence property of Algorithms 2 and 3. For simplicity, the numerical
results in two figures are from a random chosen sub-channel, where ηn (c) = 1. In Figure 4, we can see that
(0)
the number of iterations are limited within four times. To show the influence of p f n , we give the different
(0)
values of p f n in Figure 5, where f n (p f n (v) ) − ηn (c) gn (p f n (v) ) − ( f n (p f n (v−1) ) − ηn (c) gn (p f n (v−1) )) =
W(p f n (v) ). It is shown that the initial values have an effect on the number of iterations. Specifically,
when p f n (0) = 0 × Pmax , less than 11 times is needed to reach the convergence. Although the initial
values affect the number of iterations, it does not affect the final results.
To show the relationship between the different numbers of MUs and MTCDs and the EE, we have
Figure 6. It is not surprise to see that the EE performance of all these schemes increases as Pmax grows.
From the four schemes, we can find out that the EE of K = 40 is much larger than that of K = 15, since
the NOMA scheme can obtain much higher EE by supporting multiple MUs, and they can choose the
suitable couples by swap operations for better EE. From the Algorithm 1, we know that power control
138
Sensors 2019, 19, 5307
algorithm needs to be executed after each swap operation, that is, the number of iterations increases
with the increase of K and more process time are required. From the Figure 6, we can also see that the
EE of Uk = 2 is larger than that of Uk = 3 under the same K, i.e., K has much greater impact on EE
than Uk , since the NOMA scheme can obtain much higher EE by supporting multiple MUs and the
increasing Uk represents the increase data rate requirement of MUs.
Figure 7 presents the cumulative distribution function (CDF) of the number of swap operations
of different scenarios when the matching algorithms reached convergence. From the figure we can
see that more swap operations were needed for a larger number of MUs and sub-channels, such as,
K = 40, N = 3 needed more swap operations than that K = 40, N = 2 and K = 15, N = 3. Especially,
less than 70 swap operations were needed for K = 40 and N = 3.
s
(QHUJ\(IILFLHQF\DWRQHVXEíFKDQQHOELWV-
7KHQXPEHURILWHUDWLRQV
s
:SIQY
SIQ s3PD[
SIQ s3PD[
SIQ s3PD[
7KHQXPEHURILWHUDWLRQV
139
Sensors 2019, 19, 5307
[
(QHUJ\(IILFLHQF\ELWV-
. 8N
. 8N
. 8N
. 8N
3PD[:
Figure 6. EE versus the maximum transmit power for the different number of MUs and MTCDs.
&')RIWKHQXPEHURIVZDSRSHUDWLRQV
. 1
. 1
. 1
. 1
6ZDS1XPEHU
6. Conclusions
This work investigated the uplink EE maximization problem in M2M-enabled HetNets with
NOMA, where a MU acting as an MTCG can decode and forward both the information of MTCDs
and its own data to the BS directly. Due to the limited spectrum resource, each BS shared the same
sub-channels and NOMA was adopted between MUs in the same BS and sub-channel. The EE
maximization problem was formulated, where MU association and power control were combined with
each other. To solve it, a MU association matching algorithm was proposed based on the matching game.
Under a given MU association, the uplink EE maximization was transformed into the EE maximization
of each sub-channel. Two power control algorithms were provided to obtain the suboptimal power
solutions based on sequential optimization. Simulation results showed that our proposed algorithms
performed better than EE performance. It is known that cellular network is a key way to connect the
M2M communications to the core network; our proposed scheme provided a new strategy for MTCDs
to connect the cellular network with regard to MUs as their MTCGs based NOMA, and the power
140
Sensors 2019, 19, 5307
control of MTCDs was also considered as the constraints for the EE optimization problem. In fact, large
scale devices are a more realistic scenario for 5G and next generation network, and since the number
of MTCDs is considered on a small scale in this paper, the extension of our algorithms for large scale
devices is one of the future works. Furthermore, the research of high computation complexity of the
proposed algorithms for large scale devices is also a significant problem.
Author Contributions: The main contributions of S.Z. were to create the main ideas and execute performance
evaluation by extensive simulation, while G.K. worked as the advisor to discuss, create, and advise the main ideas
and performance evaluations together. All authors read and approved the final version of the paper.
Funding: This work was supported by the National Science and Technology Major Project of China (No.
2017ZX03001022) and National Natural Science Foundation of China (61471064).
Conflicts of Interest: The authors declare no conflict of interest.
References
1. Ghosh, A.; Mangalvedhe, N.; Ratasuk, R.; Mondal, B.; Cudak, M.; Visotsky, E.; Thomas, T.A.; Andrews, J.G.;
Xia, P.; Jo, H.S.; et al. Heterogeneous cellular networks: From theory to practice. IEEE Commun. Mag.
2012, 6, 54–64. [CrossRef]
2. Damnjanovic, A.; Montojo, J.; Wei, Y.; Ji, T.; Luo, T.; Vajapeyam, M.; Yoo, T.; Song, O.; Malladi, D. A survey
on 3GPP heterogeneous networks. IEEE Wirel. Commun. 2011, 3, 10–21. [CrossRef]
3. Ericsson, A.B. 5G Radio Access, Research and Vision; Saito, Y., Benjebbour, A., Eds.; June 2013.
4. Shin, W.; Vaezi, M.; Lee, B.; Love, D.J.; Lee, J.; Poor, H.V. Non-orthogonal multiple access in multi-cell
networks: Theory, performance, and practical challenges. IEEE Commun. Mag. 2017, 10, 2–9. [CrossRef]
5. Ding, Z.; Yang, Z.; Fan, P.; Poor, H.V. On the performance of non-orthogonal multiple access in 5G systems
with randomly deployed users. IEEE Signal Process. Lett. 2014, 12, 1501–1505. [CrossRef]
6. Ding, Z.; Peng, M.; Poor, H.V. Cooperative non-orthogonal multiple access in 5G systems. IEEE Commun. Lett.
2015, 8, 1462–1465. [CrossRef]
7. Zhang, N.; Wang, J.; Kang, G.; Liu, Y. Uplink non-orthogonal multiple access in 5G systems.
IEEE Commun. Lett. 2016, 3, 458–461. [CrossRef]
8. Zhang, H.; Fang, F.; Cheng, J.; Long, K.; Wang, W.; Leung, V.C.M. Energy-efficient resource allocation in
NOMA heterogeneous networks. IEEE Wirel. Commun. 2018, 2, 48–53. [CrossRef]
9. Mokdad, A.; Azmi, P.; Mokari, N. Radio resource allocation for heterogeneous traffic in GFDM-NOMA
heterogeneous cellular networks. IET Commun. 2016, 12, 1444–1455. [CrossRef]
10. Zhao, J.; Liu, Y.; Chai, K.K.; Nallanathan, A.; Chen, Y.; Han, Z. Spectrum allocation and power control for
non-orthogonal multiple access in HetNets. IEEE Trans. Wirel. Commun. 2017, 9, 5825–5837. [CrossRef]
11. Ni, D.; Hao, L.; Tran, Q.T.; Qian, X. Power allocation for downlink NOMA heterogeneous networks.
IEEE Access 2018, 6, 26742–26752. [CrossRef]
12. Ni, D.; Hao, L.; Tran, Q.T.; Qian, X. Transmit power minimization for downlink multi-cell multi-carrier
NOMA networks. IEEE Commun. Lett. 2018, 12, 2459–2462. [CrossRef]
13. Fang, F.; Cheng, J.; Ding, Z. Joint energy efficient subchannel and power optimization for a downlink NOMA
heterogeneous network. IEEE Trans. Veh. Technol. 2019, 68, 1351–1364. [CrossRef]
14. Moltafet, M.; Azmi, P.; Mokari, N.; Javan, M.R.; Mokdad, A. Optimal and fair energy efficient resource allocation
for energy harvesting-enabled-PD-NOMA-based HetNets. IEEE Trans. Wirel. Commun. 2018, 3, 2054–2067.
[CrossRef]
15. Pentikousis, K. In search of energy-efficient mobile networking. IEEE Commun. Mag. 2010, 1, 95–103.
[CrossRef]
16. IMT-2020(5G) Promotion Group. 5G Vision and Requirements; May 2014.
17. Buzzi, S.; Chih-Lin, I.; Klein, T.E.; Poor, H.V.; Yang, C.; Zappone, A. A survey of energy-efficient techniques
for 5G networks and challenges ahead. IEEE J. Sel. Areas Commun. 2016, 4, 697–709. [CrossRef]
18. Qin, Z.; Yue, X.; Liu, Y.; Ding, Z.; Nallanathan, A. User association and resource allocation in unified NOMA
enabled heterogeneous ultra dense networks. IEEE Commun. Mag. 2018, 6, 86–92. [CrossRef]
19. Yang, Z.; Xu, W.; Xu, H.; Shi, J.; Chen, M. Energy efficient non-orthogonal multiple access for machine-
to-machine communications. IEEE Commun. Lett. 2017, 4, 817–820. [CrossRef]
141
Sensors 2019, 19, 5307
20. Shirvanimoghaddam, M.M.; Dohler, M.; Johnson, S.J. Massive non-orthogonal multiple access for cellular
IoT: potentials and limitations. IEEE Commun. Mag. 2017, 9, 55–61. [CrossRef]
21. Chen, S.; Ma, R.; Chen, H.; Zhang, H.; Meng, W.; Liu, J. Machine-to-machine communications in ultra-dense
networks-a survey. IEEE Commun. Surv. Tutor. 2017, 3, 1478–1503. [CrossRef]
22. Yang, Z.; Pan, Y.; Xu, W.; Guan, R.; Wang, Y.; Chen, M. Energy efficient resource allocation for machine-
to-machine communications with NOMA and energy harvesting. In Proceedings of the 2017 IEEE Conference
on Computer Communications Workshops (INFOCOM WKSHPS), Atlanta, GA, USA, 1–4 May 2017; pp. 1–6.
[CrossRef]
23. Xu, B.; Chen, Y.; Carrion, J.R.; Zhang, T. Resource allocation in energy-cooperation enabled two-tier NOMA
HetNets towards green 5G. IEEE J. Sel. Areas Commun. 2017, 12, 2758–2770. [CrossRef]
24. Qian, L.P.; Wu, Y.; Zhou, H.; Shen, X.S. Joint uplink base station sssociation and power control for small-cell
networks with non-orthogonal multiple access. IEEE Trans. Wirel. Commun. 2017, 19, 5567–5582. [CrossRef]
25. Yang, Z.; Xu, W.; Pan, Y.; Pan, C.; Chen, M. Energy efficient resource allocation in machine-to-machine
communications with multiple access and energy harvesting for IoT. IEEE Internet Things J. 2018, 5, 229–245.
[CrossRef]
26. Li, Z.; Gui, J. Energy-efficient resource allocation with hybrid TDMA–NOMA for cellular-enabled
machine-to-machine communications. IEEE Access 2019, 7, 105800–105815. [CrossRef]
27. Lv, T.; Ma, Y.; Zeng, J.; Mathiopoulos, P.T. Millimeter-wave NOMA transmission in cellular M2M
communications for Internet of Things. IEEE Internet Things J. 2018, 5, 1989–2000. [CrossRef]
28. Shahini, A.; Ansari, N. NOMA aided narrowband IoT for machine type communications with user clustering.
IEEE Internet Things J. 2019, 6, 7183–7191. [CrossRef]
29. Han, S.; Xu, X.; Tao, X.; Zhang, P. Joint power and sub-channel allocation for secure transmission in
NOMA-based mMTC networks. IEEE Syst. J. 2019, 13, 2476–2487. [CrossRef]
30. Mohamed, A.; Onireti, O.; Imran, M.A.; Imran, A.; Tafazolli, R. Control-data separation architecture for
cellular radio access networks: A survey and outlook. IEEE Commun. Surv. Tutor. 2016, 18, 446–465.
[CrossRef]
31. Bodine-Baron, E.; Lee, C.; Chong, A.; Hassibi, B.; Wierman, A. Peer effects and stability in matching markets.
In Proceedings of the 4th Symposium on Algorithmic Game Theory (SAGT), Amalfi, Italy, 17–19 October 2011;
pp. 117–129. [CrossRef]
32. Aydin, O.; Jorswieck, E.A.; Aziz, D.; Zappone, A. Energy-spectral efficiency tradeoffs in 5G multi-operator
networks with heterogeneous constraints. IEEE Trans. Wirel. Commun. 2017, 9, 5869–5881. [CrossRef]
33. Zappone, A.; Bjornson, E.; Sanguinetti, L.; Jorswieck, E. Globally optimal energy-efficient power control and
receiver design in wireless networks. IEEE Trans. Signal Process. 2017, 11, 2844–2859. [CrossRef]
34. Dinkelbach, W. On nonlinear fractional programming. Manag. Sci. 1967, 7, 492–498. [CrossRef]
35. Ali, M.S.; Tabassum, H.; Hossain, E. Dynamic user clustering and power allocation for uplink and downlink
non-orthogonal multiple access (NOMA) systems. IEEE Access 2016, 4, 6325–6343. [CrossRef]
36. Li, Y.; Sheng, M.; Yang, C.; Wang, X. Energy efficiency and spectral efficiency tradeoff in interference-limited
wireless networks. IEEE Commun. Lett. 2013, 10, 1924–1927. [CrossRef]
37. Kha, H.H.; Tuan, H.D.; Nguyen, H.H. Fast global optimal power allocation in wireless networks by local
D.C. programming. IEEE Trans. Wirel. Commun. 2012, 2, 510–515. [CrossRef]
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access
article distributed under the terms and conditions of the Creative Commons Attribution
(CC BY) license (http://creativecommons.org/licenses/by/4.0/).
142
sensors
Article
A Dynamic Access Probability Adjustment Strategy
for Coded Random Access Schemes
Jingyun Sun 1 , Rongke Liu 1, * and Enrico Paolini 2, *
1 School of Electronics and Information Engineering, Beihang University, 37 Xueyuan Road, Haidian District,
Beijing 100191, China; [email protected]
2 Department of Electrical, Electronic, and Information Engineering, University of Bologna,
via Dell’Universitá 50, 47522 Cesena (FC), Italy
* Correspondence: [email protected] (R.L.); [email protected] (E.P.);
Tel.: +86-10-8233-9475 (R.L.); +39-0547-339137 (E.P.)
Abstract: In this paper, a dynamic access probability adjustment strategy for coded random access
schemes based on successive interference cancellation (SIC) is proposed. The developed protocol
consists of judiciously tuning the access probability, therefore controlling the number of transmitting
users, in order to resolve medium access control (MAC) layer congestion states in high load conditions.
The protocol is comprised of two steps: Estimation of the number of transmitting users during the
current MAC frame and adjustment of the access probability to the subsequent MAC frame, based on
the performed estimation. The estimation algorithm exploits a posteriori information, i.e., available
information at the end of the SIC process, in particular it relies on both the frame configuration
(residual number of collision slots) and the recovered users configuration (vector of recovered users)
to effectively reduce mean-square error (MSE). During the access probability adjustment phase,
a target load threshold is employed, tailored to the packet loss rate in the finite frame length case.
Simulation results revealed that the developed estimator was able to achieve remarkable performance
owing to the information gathered from the SIC procedure. It also illustrated how the proposed
dynamic access probability strategy can resolve congestion states efficiently.
Keywords: congestion; estimation; irregular repetition slotted ALOHA; medium access control;
random access; successive interference cancellation
1. Introduction
In machine-type and Internet-of-Things (IoT) communications, users generate a large amount of
bursty traffic to transmit over a shared communication medium. Coordinated multiple access schemes
turn to be impractical and generally inefficient in such scenarios. For this reason, random access
schemes have attracted a renewed interest, as they provide a practical way for uncoordinated users to
contend for channel resource.
Pure ALOHA scheme [1] was proposed in 1968 to share a channel among a number of users
sending packets as soon as they have data to transmit. Classical slotted ALOHA [2] is a distributed
random access scheme in which time is divided into slots of equal duration with each transmission
starting only at the beginning of a time slot. In both variants, an absence of coordination among users
may lead to collisions (two or more packets are received in overlapping time windows). All packets
involved in a collision are often reported as useless and are retransmitted after a random delay,
according to some probability distribution, or (in the framed case) in the next frame. As a result,
pure ALOHA and slotted ALOHA suffer from a throughput penalty and an under-utilization of
channel resource. The optimal normalized throughput of pure ALOHA is 0.18 and the throughput of
slotted ALOHA is increased to 0.37.
The expression of “coded random access” refers to a set of random access schemes that combine
the packet repetition of users with successive interference cancellation (SIC) at the receiver. The first
coded random access scheme is collision resolution diversity slotted ALOHA (CRDSA) [3], where each
user sends two packet replicas in two random slots of the frame, and then SIC is applied to recover the
collided packets in an iterative fashion. After CRDSA, CRDSA++ [4] was proposed to further improve
throughput by increasing the number of packet replicas. In [5], where irregular repetition slotted
ALOHA (IRSA) was proposed, the SIC-based random access process is conveniently described by a
bipartite graph, establishing a bridge between the SIC procedure and the iterative erasure decoding
of graph-based codes. In IRSA, the packet repetition rate is irregular from user to user and is chosen
independently by each active user according to a suitably designed probability distribution. Since then,
coded random access emerged as a new paradigm and has been the subject of several investigations
over the past few years (e.g., [6–12] and references therein). As a result, the throughput has substantially
increased which makes it a practical and efficient solution to support uncoordinated access.
Despite their numerous advantages, coded random access schemes exhibit lower critical points in
traffic load. In other words, the throughput of these schemes is maximized for load values less than
1 and, for larger values of the load, it decreases very rapidly. Congestion occurs when the number
of active users is greater than the receiver processing capacity. Several control methods for random
access schemes have been investigated, which may be classified into two kinds: Dynamic frame
length based methods and dynamic access probability based methods. In dynamic framed slotted
ALOHA (DFSA) systems, the frame size is adjusted dynamically according to the estimated number
of active users in order to maximize the system efficiency [13–17]. In dynamic access probability based
schemes, on the other hand, an access controller is required to adjust the users access probability under
high traffic loads in order to limit the number of transmitting users [18–21]. However, in [18–20],
the estimation process was simply based on the status of frame slots before the application of SIC
and in [21], the estimation is assumed to be ideal at the receiver. Furthermore, the proposed random
access control mechanisms in [18] are based on random access schemes without SIC at the receiver,
which is not applicable for coded random access schemes. In both [19,20], users directly employ the
load threshold from [5], which is obtained via asymptotic analysis (frame length and user population
size tending to infinity, their ratio remaining constant). When applied to the finite frame length case,
asymptotic load thresholds tend to be beyond the actual critical point, which may yield considerable
throughput losses.
In this paper, a dynamic access probability based strategy for coded random access schemes
is proposed to resolve congestion. The proposed strategy performs two main tasks: Estimation of
number of transmitting users in the current frame and the adjustment of access probability in the next
frame based on the estimation results. In our previous work [22–24] techniques for a more reliable
estimation of the number of transmitting users in coded random access schemes were developed
and more specially, the number of transmitting users in the current frame was estimated using a
posteriori information gathered throughout the SIC process. A posteriori estimation was considered
for CRDSA in [22], for IRSA in [23] and for CRDSA over a packet and slot erasure channel in [24].
Notably, [22–24] were entirely focused on the estimation process, without any attempt to exploit it
within a dynamic access probability adjustment protocol. The usage of a target load threshold tailored
to the finite frame length case and the introduction of a state judgment to avoid not fully reliable
estimation in high traffic load conditions are other original features of this manuscript.
The system model and some preliminary definitions are provided in Section 2. The estimation
algorithm for the number of transmitting users in the current frame is addressed in Section 3.1,
while the access probability adjustment strategy is proposed in Section 3.2. Numerical results are
illustrated in Section 4 and concluding remarks are given in Section 5.
144
Sensors 2019, 19, 4206
2. Preliminaries
(k) ( k −1)
Na = Na − Δ ( k −1) . (1)
(k)
Transmitting users are the ones who are allowed to transmit their packets in the frame. Let Ta
(k)
be the number of transmitting users during frame k. Moreover, denote by the access probability
p ac
of the active users during frame k. At the beginning of the k-th frame, each active user becomes a
(k)
transmitting one with probability p ac , independently of other active users. Hence, the conditional
(k)
expected value of Ta is:
Each transmitting user is frame- and slot- synchronous and attempts at most one packet transmission
per frame.
In every frame corresponding to k = 0, all active users transmit their packets to the receiver, i.e.,
(0) (0) (0)
we have p ac = 1 and t a = n a . The instantaneous channel load over frame k is defined as:
(k)
ta
G (k) = (3)
m
and represents the average number of packet transmissions per slot. The throughput over frame k is
defined as:
(k)
(k) ta
Th = (1 − PL ) (4)
m
representing the average number of successfully recovered packets per slot by the receiver. The quantity
PL in Equation (4) is the packet loss rate over the frame, which is expressed as:
δ(k)
PL = 1 − (k)
. (5)
ta
145
Sensors 2019, 19, 4206
In IRSA, each transmitting user sends L packet replicas to slots picked uniformly at random.
The number of replicas, named user degree, is a discrete random variable probability mass function
(p.m.f.) {Λl }, where Λl = P( L = l ) is the probability that a user generates l packet replicas. Users
choose their replica factor (i.e., user degree) L independently of each other, with no coordination,
and the values of user degree are according to distribution {Λl }. We also represent {Λl } in polynomial
form, as Λ( x ) = ∑dl =max
1 Λl x , where dmax is the maximum number of packet replicas per user. Both
l
information about the transmitting user index (assuming users are indexed from 1 to npop ) and pointers
to the slots where the other replicas have been transmitted are included in the header of each packet
replica. CRDSA can be seen as IRSA with Λ( x ) = x dmax .
In this paper, a classical collision channel model is adopted. After packet replica transmissions,
each slot takes one of the following three states: Empty slot (no packet replica transmitted in that
slot), singleton slot (only one packet replica transmitted in that slot), and collision slot (two or more
than two packet replicas transmitted in that slot). The receiver can always correctly classify the state
of each slot. Collision slots provide no information to the receiver about the number and content of
collided packet replicas directly. However, as soon as the contribution of interference, generated by
some transmitting users on the slot, is canceled and only one packet replica is left in it, the slot status
is updated to singleton. Similarly, if all of the packet replicas transmitted in the slot are recovered
by the receiver, the slot status (singleton slot or collision) is updated to empty. Packet replicas from
singleton slots are always correctly received, which means that packet losses may only be generated
by unresolved collisions.
After transmissions, the pointers to twin replicas in the header of the packet enable SIC at the
receiver. At first, the receiver stores the content of the frame. Then, the receiver performs iteratively
the following procedure, consisting of two subsequent steps:
1. Pick out the singleton slots in the frame. For each singleton slot, extract the transmitting user
index, the content of the packet replica, and positions of other twin replicas. Identified users in this
step become recovered users;
2. For each user recovered at step 1, remove the user’s contribution of interference in the slots
where the packet replicas have been transmitted. A new singleton slot will appear if, after interference
cancellation, they contain only one replica.
The iterative SIC procedure terminates when all slots are empty ones, in which case SIC succeeds,
or when no singleton slot can be found but collision slots still exist, in which case it fails. At the end of
the SIC procedure, the residual number of empty slots in the frame is denoted by Me , and the residual
number of collided slots per frame by Mc . Obviously, we have Me + Mc = m.
Example 1. With reference to Figure 1, t a = 4 users transmit their packets to a frame with m = 5 slots. User
u1 generates three replicas of his packet, and sends them to s1 , s3 , and s4 , respectively. Each of the other users
generate two replicas of the corresponding packets and transmit them as illustrated in the figure. At the receiver,
slots s1 and s4 are singleton slots and the left s2 , s3 , and s5 are collison slots.
Figure 2 provides a graphical interpretation (first proposed in [5]) of the iterative SIC procedure performed
on the frame of Figure 1. In the presented graph, “slot nodes" represent slots and “user nodes" represent users.
In the first SIC iteration, s1 and s4 are singleton slots and the corresponding packet replicas are correctly received,
making u1 a recovered user. The pointer to slot s3 , where the twin of the replica in s1 has been transmitted,
is extracted (step 1). After the interference from recovered user u1 in slot s3 is canceled and only one packet
replica is left in s3 , making s3 a new singleton slot (step 2). Then a second iteration is triggered. After three SIC
iterations, users u2 and u3 remain unrecovered, there are no singleton slots in the frame, and SIC terminates
with failure.
The feedback frame configuration signal is {0, 1, 0, 0, 1} which indicates that s1 , s3 and s4 are empty slots
and that s2 and s5 are unresolved collision slots. Receiving this feedback signal, u2 and u3 become aware that
their packets have not been successfully received.
146
Sensors 2019, 19, 4206
s1 s2 s3 s4 s5
u1 u1,1 u1,2 u1,3
u2 u2,1 u2,2
u3 u3,1 u3,2
u4 u4,1 u4,2
Figure 1. Example of a MAC frame with t a = 4 transmitting users and m = 5 slots. User u1 sends three
packet replicas and the other users each send two packet replicas. Slots s1 and s4 are singleton slots
and the left s2 , s3 , and s5 are collision slots.
slot nodes
user nodes
Table 1. Load threshold G ◦ for different probability distributions Λ( x ), for MAC frame length m = 200,
and packet loss rate target PL◦ = 0.01.
Distribution, Λ( x) G◦
Λ1 ( x ) = x 2 0.35
Λ2 ( x ) = x 4 0.69
Λ3 ( x ) = 0.5x2 + 0.28x3 + 0.22x8 0.705
Λ4 ( x ) = 0.25x2 + 0.6x3 + 0.15x8 0.76
147
Sensors 2019, 19, 4206
Figure 3 shows the packet loss rate PL versus instantaneous load G for the distributions in Table 1
and frame length m = 200. As previously remarked, the SIC process in IRSA can be described by a
bipartite graph, where unresolved collisions are associated with graphical structures known, in the
low-density parity-check (LDPC) coding jargon, as stopping sets. It is well known that the impact
of small stopping sets on the finite-length performance is strictly related to the fraction of degree-2
variable nodes in its bipartite graph and a similar role is played by degree-2 users in IRSA. As observed
in the figure, the limitation of degree-2 repetition has a better error floor performance, but a poorer
waterfall performance. The detailed packet loss rate performance analysis for IRSA schemes have been
addressed in [5].
100
10−1
10−2
PL
10−3
Λ1
Λ2
Λ3
10−4
Λ4
Figure 3. Packet loss rate PL versus instantaneous load G for frame length m = 200 and the distributions
in Table 1.
where Mi has dimension oi × b and all of its rows have Hamming weight i. 2. Every column of M has
Hamming weight at least 2.
Example 2. Let o = (o1 , o2 , o3 ) = (0, 1, 3) and b = 5. Each matrix in M ∈ M(o, b) has dimension 4 × 5.
Its row indexes should be thought as partitioned into the two subsets {1} and {2, 3, 4}. The row of index 1
has weight 2, and the rows of indexes 2, 3, and 4 have weight 3. Every column of M has weight of at least 2.
An example of matrix M ∈ M(o, b) is:
148
Sensors 2019, 19, 4206
⎛ ⎞
1 0 0 1 0
⎜ ⎟
⎜ 0 1 0 1 1 ⎟
M=⎜ ⎟.
⎝ 1 1 1 0 0 ⎠
0 0 1 1 1
The following lemma provides a formal expression for the cardinality of the set M(o, b).
Lemma 1. For given o and b, let h(o, b) be the cardinality of the set M(o, b). Moreover, let x =
( x1 , x2 , . . . , x|o| ) and:
|o | |o |
A(x ) = ∏ (1 + x i ) − 1 + ∑ xi (7)
i =1 i =1
and:
l j
|o | |o |
Bj,l (x ) = ∑ xi ∏ (1 + x i ) . (8)
i =1 i =1
Then, we have:
where coeff( P(x ), xr ) is the coefficient of xr in the multivariate polynomial P(x ).
Proof. Let c T = (c1 , . . . , c|o| )T be the generic column and define a multivariate enumerating function
for valid columns (i.e., columns with weight of at least 2):
A(x ) = ∑ x c . (11)
c:|c|≥2
It is easy to recognize that an equivalent expression for A(x ) is the one shown in Equation (7).
This is because (1 + x1 ) · · · (1 + x|o| ) provides the sum of all monomials in the variables x1 , . . . x|o|
with a unitary coefficient, to which we subtract all monomials of degrees 0 and 1 as required by the
condition of validity.
Considering now b columns and applying properties of generating functions, coeff(( A(x ))b , x w )
is the number of |o | × b binary matrices such that all matrix columns are valid and such that
the weight of row i is wi . This immediately leads to Equation (9). The equivalent expression of
Equation (10) is obtained by simple algebraic manipulation of the multivariate polynomial ( A(x ))b .
149
Sensors 2019, 19, 4206
In particular, it is obtained by applying Newton’s binomial formula twice and by exploiting the identity
) =
coeff(∑i αi Pi (x ), x w ).
∑i αi coeff( Pi (x ), x w
A maximum a posteriori (MAP) estimator for the number of transmitting users then returns
the value:
Theorem 1. The a posteriori probability distribution of the configuration t a of the transmitting users fulfills:
t a h(t a − δ, mc )
P(t a |mc , δ) ∝
δ ∏dmax (m)ta,l P(t a ) (14)
l =1 l
t
where h(o, b) is given by Lemma 1, ( δa ) = ∏l ( δa,l ), and P(t a ) is the a priori probability that the transmitting
t
l
users configuration equals t a .
150
Sensors 2019, 19, 4206
Let T (t a , mc , δ) be the number of ways in which |t a | transmitting users with configuration t a can
transmit their packet replicas in the frame so that, at the end of SIC, there are mc unresolved collision
slots and a recovered users configuration δ. Moreover, let T (t a ) be the number of ways in which |t a |
transmitting users with configuration t a can place their packet replicas in the frame. The conditional
probability P(mc , δ|t a ) can be expressed as:
T (t a , mc , δ)
P(mc , δ|t a ) = . (16)
T (t a )
dmax ta,l
m
T (t a ) = ∏ . (17)
l =1
l
To develop an expression for T (t a , mc , δ), we proceed as follows. At the end of SIC, |t a − δ| transmitting
users with configuration t a − δ remain unrecovered. The number of ways in which these users transmit
their packet replicas to mc slots, forming mc collisions (at least two replicas per slot) is h(t a − δ, mc ).
If we let g(δ, mc ) be the number of ways in which |δ| transmitting users with configuration δ can place
their packet replicas in a frame with m − mc free slots and mc unresolvable collision slots, so that
SIC can recover all of them, we can write (no formal expression for g(δ, mc ) is provided because this
parameter, not depending on t a does not play any role in the estimation process of Equation(13)):
t a m
T (t a , mc , δ) = δ h(t a − δ, mc ) g(δ, mc ). (18)
mc
Incorporating Equation (17) and Equation (18) into Equation (16) and then Equation (16) into
Equation (15), and omitting all terms not depending on t a , we obtain Equation (14).
Although Equations (13) and (14) define an exact MAP estimator, computing h(t a − δ, mc ) turns
out to be a complex task, becoming already intractable for frame sizes in the order of a few tens.
For this reason we employ an approximated MAP estimator. In the approximation, all packet replicas,
even from the same user, are regarded as distinguishable packets. Equivalently, each user chooses l
slots with replacement. In this approximate setting, we have
t a h((∑dl =max
1 ( tl − δl ) l ), mc )
P(t a |mc , δ) ∝ δ dmax
P(t a ) (19)
m ∑ l =1 t l l
M = E[2 ] (20)
(k) (k)
where = t̂ a − ta is the estimation error.
151
Sensors 2019, 19, 4206
(k)
n a > G ◦ m, (21)
(k)
where we recall that n a is the number users that are active on frame k. Our purpose is to exploit the
developed estimator to detect congestion states and dynamically adjust the users access probability to
improve overall efficiency. Congestion states are resolved by tuning the access probability to control
the number of transmitting users in the next frame.
The proposed scheme is based on the definition of three possible states for a frame, namely:
• Not fully reliable estimate. In high load conditions, SIC typically stops prematurely with a
(k)
relatively small number of recovered users. We say that the estimate t̂ a is not fully reliable when
the number of users recovered by processing the frame is smaller than the number of users that
could not be recovered:
(k)
δ(k) < t a − δ(k) (22)
or, equivalently,
(k)
δ(k) < t a /2. (23)
• Congestion with reliable estimate. The number of active users is above threshold G ◦ m,
but the
number of users recovered by processing the frame is not less than the number of users that could
not be recovered:
(k) (k)
na > G◦ m and δ(k) ≥ t a − δ(k) . (24)
(k)
n a ≤ G ◦ m. (25)
In the first case, a large number of transmitting users is unrecovered, and the packet loss rate is
larger than 0.5. As illustrated in the numerical results section, the estimation MSE increases with the
number of transmitting users and the estimate is therefore regarded as not suitable to design the access
probability p ac in the subsequent frame. In contrast, in the last two cases the access probability in the
next frame is calculated directly by employing the estimate of the number of transmitting users.
In the generic frame k, after all transmitting users have performed the transmission of their
packet replicas, the receiver performs the SIC procedure. At the end of SIC, the receiver executes the
procedure described in Algorithm 1. This procedure is executed regardless of the SIC termination
status (success or failure). An explanation of Algorithm 1 is provided in the following.
152
Sensors 2019, 19, 4206
The first step (line 1) consists of detecting whether Equation (23) is fulfilled or not. When SIC
(k) (k)
succeeds (mc = 0), the estimation is perfect. The algorithm jumps to line 6 and simply sets t̂ a = δ(k) .
(k)
In case of an SIC failure (mc > 0), the algorithm applies a two-hypotheses MAP detector, whose
development is presented in Appendix A, to decide whether Equation (23) holds (in which case
estimation is considered unreliable) or not. Concretely, if
(k) (k)
P(t a > 2δ(k) |mc , δ (k) )
(k) (k)
> 1, (26)
P(t a ≤ 2δ(k) |mc , δ (k) )
then Equation (23) is assumed to hold and the estimation Equation (19) is regarded as not reliable
(k)
enough. Otherwise, the estimate t̂ a is employed to design the access probability in the next frame.
When Equation (26) is satisfied, a ’not fully reliable estimate’ state is detected and the number
of transmitting users is detected to be large enough to create a congestion but the relatively large
(k)
estimation MSE prevents from relying on t̂ a to reliably adjust the access probability in the next frame.
At the end of frame k a number ∑ik=0 δ(i) of active users have been recovered since the beginning of
congestion. Therefore, at the beginning of the subsequent frame, the number of unresolved active
( k +1)
users fulfills n a ≤ npop − ∑ik=0 δ(i) . To make the expected number of transmitting users in the
subsequent frame below the target number G ◦ m, we set the access probability according to (line 2)
( k +1) G◦ m
p ac = . (27)
npop − ∑ik=0 δ(i)
This way, the conditional expected number of transmitting users in the next frame is
153
Sensors 2019, 19, 4206
(0)
where n a − ∑ik=1 δ(i) represents the actual number of unrecovered active users at the beginning of
frame k + 1.
When the estimation result is detected to be reliable, an acceptable estimation MSE is assumed
(k)
by the receiver, which exploits t̂ a (equal to δ(k) in case of a SIC success or by Equation (19) in case
of a failure) to obtain an estimate of the number of active users on frame k. Specifically, the receiver
performs (line 10):
( k +1) ( k +1)
E[ Ta |n a ] = G ◦ m. (30)
( k +1) G◦ m
p ac = (k)
. (31)
n̂ a − δ(k)
(k)
If n̂ a < G ◦ m, a no congestion state is detected. The frame index k is re-initialized to 0 and the
users access probability is set to be 1 (lines 15 and 16).
As a last step (line 19), the receiver broadcasts to the users the index of the next frame (index of
the current frame increased by 1 if a congestion is detected and 0 otherwise), the access probability to
be employed by active users in the next frame, and the list of indexes of collision slots at the end of
SIC in the current frame. Upon receiving feedback from the receiver, users behave as follows:
• If k > 0 (congestion), in the next frame each backlogged user attempts access to the frame with
probability equal to the new access probability. Each non-backlogged user is prevented from
transmitting new packets;
• If k = 0 (no congestion), users that are in a backlog state retransmit their packet. Users that are
not backlogged take their normal access activity.
Users are updated by the receiver about congestion or no congestion simply through the index k.
Moreover, each of them knows whether or not it is in a backlog state simply by looking at the list of
collision slot indexes C (k) . Note that, if k = 0 (no congestion) is broadcasted by the receiver, this does
not necessarily mean that SIC has succeeded as there may be a small number of users unrecovered
154
Sensors 2019, 19, 4206
even though the system is not suffering from congestion. In this case, we simply let backlogged users
retransmit packet replicas with probability 1 in the subsequent frame, together with possible fresh
replicas from newly activated users.
4. Numerical Results
This section is organized into two subsections. In Section 4.1 we show results on the estimation of
the number of transmitting users, while in Section 4.2 we address the performance achieved by the
proposed scheme.
1 0.4
0.8
Throughput Standard Deviation
Average Throughput
0.6
0.2
0.4
0.2
0 0
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
G
Figure 4. Average throughout and throughput standard deviation versus the instantaneous load G for
IRSA with Λ( x ) = 0.5x2 + 0.28x3 + 0.22x8 .
Figure 5 shows the estimation performance after SIC iterations, letting the SIC-based receiver run
until no active user is recovered. As a comparison, we also consider the estimation performance using
the frame configuration before SIC iterations, which is reviewed in Appendix B. In the figure, the solid
line is relevant to the proposed estimation making use of the frame configuration and recovered users
configuration after SIC iterations. Moreover, a dashed line corresponds to the estimation based on
the initially received frame, before SIC is applied. As observed in the figure, the proposed estimation
155
Sensors 2019, 19, 4206
algorithm is able to reduce the MSE effectively over the whole range of G values. It is also worth
noting that the performance of the proposed estimator relies on the SIC performance. In low load
conditions, the SIC procedure stops with a large number of users recovered, so in this region the
proposed estimation algorithm is more effective. In contrast, in high load conditions SIC almost always
stops prematurely, recovering a small number of users, leading the proposed estimation algorithm to
be less effectively.
102
101
Mε
100
10−1
Before SIC
After SIC
10−2
0 0.2 0.4 0.6 0.8 1
G
Figure 5. Mean squared error (MSE) versus G for IRSA with Λ( x ) = 0.5x2 + 0.28x3 + 0.22x8 .
156
Sensors 2019, 19, 4206
slowly as some users are recovered by the receiver in each transmission. Each curve is plotted up to
the maximum value of k for which congestions remain unresolved, which is different for the different
choices of the target load threshold.
0.9
0.8
0.7
0.6
pac
0.5
0.4
0.3
0.2 G o =0.65
G o =0.705
0.1 G o =0.80
G o =0.938
0
0 5 10 15 20 25 30
k
Figure 6. Access probability p ac versus frame index k for IRSA with Λ( x ) = 0.5x2 + 0.28x3 + 0.22x8 .
0.7
0.6
0.5
0.4
Th
0.3
0.2
G o =0.65
0.1
G o =0.705
G o =0.80
o
G =0.938
0
0 5 10 15 20 25 30
k
Figure 7. Throughput performance Th versus frame index k for IRSA with Λ( x ) = 0.5x2 + 0.28x3
+ 0.22x8 .
10 0
10 -1
PL
10 -2
10 -3 G o =0.65
G o =0.705
o
G =0.80
G o =0.938
10 -4
0 5 10 15 20 25
k
Figure 8. Packet loss rate PL versus frame index k for IRSA with Λ( x ) = 0.5x2 + 0.28x3 + 0.22x8 .
Back to Figure 3, we have seen that the IRSA scheme tends to show a packet loss rate floor at
low offered traffic regimes, the floor appearing around PL = 10−2 (corresponding to G = 0.705) for
157
Sensors 2019, 19, 4206
Λ( x ) = 0.5x2 + 0.28x3 + 0.22x8 . For larger values of G (corresponding to the waterfall packet loss rate
region), the packet loss rate increases rapidly: A PL 0.08 is achieved at G = 0.80 and a PL 0.5
is achieved at G = 0.938. Consequently, in Figure 8, systems with target G ◦ = 0.65 and G ◦ = 0.705
have a similar packet loss rate performance, and they perform better than those with target G ◦ = 0.80
and G ◦ = 0.938. Furthermore, due to estimation errors and to fluctuations of the actual number of
transmitting users, we observe a minor packet loss rate deviation between Figure 8 and Figure 3.
For example, in Figure 8, the packet loss rate with target G ◦ = 0.80 is around 0.2, while in Figure 3,
the packet loss rate at G ◦ = 0.80 is approximately equal to 0.008.
As a final remark, recall that the throughput is defined as G (1 − PL ). The influence of PL at
(k)
G ≤ 0.705 is small, so that the per-frame throughput Th is approximately equal to the instantaneous
load G. That is why in Figure 7, the throughput performance with target G ◦ = 0.705 is better than that
with target G ◦ = 0.65. However, for the cases G ◦ = 0.8 and G ◦ = 0.938, the influence of PL can not be
ignored any more. The system performance is worse even though the load target G ◦ is higher, since
the packet loss rate is now considerably higher.
5. Conclusion
In this paper, we proposed a technique to estimate the number of transmitting users in each
frame of an IRSA-based coded random access system. The estimated number of transmitting users
in the current frame was exploited to adjust the users access probability in the next frame. Frame
configuration information as well as recovered users configuration information at the end of the
SIC procedure were employed to make the estimation more accurate. Numerical results revealed
how the derived dynamic access probability strategy could resolve congestion efficiently, with a
stable throughput and a target packet loss rate performance for a proper choice of the parameter
G ◦ . Interesting directions of investigation include the exact efficient evaluation of the h(o, b) function
(addressed in Lemma 1), to make the optimum estimator applicable to large communication networks.
Adjusting the frame length dynamically in situations of slowly varying traffic load over a large scale
is another direction of investigation that, to the best of the authors’ knowledge, has not been so far
addressed in the coded random access context.
Author Contributions: All the authors contributed extensively to the work presented in this paper and to writing
the paper itself. J.S. and E.P. conceived the idea and developed the proposed approaches. E.P. gave advice
on the research and helped in editing the paper. E.P. and R.L. improved the quality of the manuscript and
completed revision.
Funding: This research was funded by the China Scholarship Council (grant No. 201706020024).
Conflicts of Interest: The authors declare no conflict of interest.
(k) (k)
P(t a > 2δ(k) |mc , δ (k) ) Ĥ0
(k) (k)
≷ 1, (A1)
P(t a ≤ 2δ(k) |mc , δ (k) ) Ĥ1
158
Sensors 2019, 19, 4206
(k)
where P(t a |mc , δ (k) ) comes from the estimator Equation (14).
where wc is the number of collision slots before SIC iterations. Following Bayes’ rule, P(t a |wc ) may be
developed as:
P ( t a | wc ) ∝ P ( wc | t a ) P ( t a )
∝ p c wc (1 − p c ) m − wc . (A8)
References
1. Abramson, N. The ALOHA system: Another alternative for computer communications. In Proceedings of
the Fall Joint Computer Confonference, New York, NY, USA, 17–19 November 1970; pp. 281–285.
2. Roberts, L.G. ALOHA packet systems with and without slots and capture. ACM SIGCOM Comput.
Commun. Rev. 1975, 5, 28–42. [CrossRef]
3. Casini, E.; De Gaudenzi, R.; Herrero, O.D.R. Contention resolution diversity slotted ALOHA (CRDSA):
An enhanced random access scheme for satellite access packet networks. IEEE Trans. Wirel. Commun. 2007, 6,
1408–1419. [CrossRef]
159
Sensors 2019, 19, 4206
4. De Gaudenzi, R.; Herrero, O.D.R. Advances in random access protocols for satellite networks. In Proceedings
of the 2009 International Workshop on Satellite and Space Communications, Tuscany, Italy, 9–11 September
2009; pp. 331–336.
5. Liva, G. Graph-based analysis and optimization of contention resolution diversity slotted ALOHA.
IEEE Trans. Commun. 2011, 59, 477–487. [CrossRef]
6. Amat, A.G.; Liva, G. Finite Length Analysis of Irregular Repetition Slotted ALOHA in the Waterfall Region.
IEEE Commun. Lett. 2018, 22, 886–889. [CrossRef]
7. De Gaudenzi, R.; Herrero, O.D.R.; Gallinaro, G.; Cioni, S.; Arapoglou, P.D. Random access schemes for
satellite networks, from VSAT to M2M: A survey. Int. J. Satellite Commun. Netw. 2018, 36, 66–107. [CrossRef]
8. Alvi, S.; Durrani, S.; Zhou, X. Enhancing CRDSA with Transmit Power Diversity for Machine-Type
Communication. IEEE Trans. On Vehic. Tech. 2018, 67, 7790–7794. [CrossRef]
9. Paolini, E.; Liva, G.; Chiani, M. Coded slotted ALOHA: A graph-based method for uncoordinated multiple
access. IEEE Trans. Inf. Theory 2015, 61, 6815–6832. [CrossRef]
10. Paolini, E.; Stefanović, Č.; Liva, G.; Popovski, P. Coded random access: Applying codes on graphs to design
random access protocols. IEEE Commun. Mag. 2015, 53, 144–150. [CrossRef]
11. Taghavi, A.; Vem, A.; Chamberland, J.-F.; Narayanan, K.R. On the design of universal schemes for massive
uncoordinated multiple access. In Proceedings of the 2016 IEEE International Symposium on Information
Theory (ISIT), Barcelona, Spain, 10–15 July 2016; pp. 345–349.
12. Sandgren, E.; i Amat, A.G.; Brännström, F. On frame asynchronous coded slotted ALOHA: Asymptotic,
finite length, and delay analysis. IEEE Trans. Commun. 2017, 65, 691–704. [CrossRef]
13. Schoute, F. Dynamic frame length ALOHA. IEEE Trans. Commun. 1983, 31, 565–568. [CrossRef]
14. Chen, W.-T. An accurate tag estimate method for improving the performance of an RFID anticollision
algorithm based on dynamic frame length ALOHA. IEEE Trans. Autom. Sci. Eng. 2009, 6, 9–15. [CrossRef]
15. Eom, J.-B.; Lee, T.-J. Accurate tag estimation for dynamic framed-slotted ALOHA in RFID systems.
IEEE Commun. Lett. 2010, 14, 60–62. [CrossRef]
16. Wu, H.; Zeng, Y. Bayesian tag estimate and optimal frame length for anti-collision ALOHA RFID system.
IEEE Trans. Autom. Sci. Eng. 2010, 7, 963–969. [CrossRef]
17. Zanella, A. Estimating collision set size in framed slotted ALOHA wireless networks and RFID systems.
IEEE Commun. Lett. 2012, 16, 300–303. [CrossRef]
18. Rivero Angeles, M.E.; Lara Rodriguez, D.; Cruz-Perez, F.A. Random-access control mechanisms using
adaptive traffic load in ALOHA and CSMA strategies for EDGE. IEEE Trans. Vehic. Tech. 2005, 54, 1160–1186.
[CrossRef]
19. Lee, M.W.; Lee, J.K.; Lim, J.S. R-CRDSA: Reservation-Contention Resolution Diversity Slotted ALOHA for
Satellite Networks. IEEE Commun. Lett. 2012, 16, 1576–1579. [CrossRef]
20. Noh, H.J.; Lee, J.K.; Lim, J.S. Performance evaluation of access control for CRDSA and R-CRDSA under high
traffic load. In Proceedings of the 2013 IEEE Military Communications Conference, San Diego, CA, USA,
18–20 November 2013; pp. 1365–1370.
21. Sun, J.; Liu, R. Irregular Repetition Slotted ALOHA with Priority (P-IRSA). In Proceedings of the 2016 IEEE
Vehicular Technology Conference (VTC Spring), Nanjing, China, 15–18 May 2016; pp. 1–5.
22. Sun, J.; Liu, R.; Paolini, E. Detecting the Number of Active Users in Coded Random Access Systems.
In Proceedings of the 2018 IEEE 29th Annual International Symposium on Personal, Indoor and Mobile
Radio Communications (PIMRC), Bologna, Italy, 9–12 September 2018; pp. 1–7.
23. Sun, J.; Liu, R.; Paolini, E. Detecting the Number of Active Users in IRSA Access Protocols. In Proceedings of
the 2018 IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications
(PIMRC), Bologna, Italy, 9–12 September 2018; pp. 1972–1976.
24. Sun, J.; Liu, R.; Paolini, E. Unrecovered Users Distribution in Coded Random Access Systems with Erasures.
In Proceedings of the 2019 IEEE International Conference on Communications (ICC), Shanghai, China,
20–24 May 2019; pp. 1–6.
25. Schmetterer, L. An introduction to combinatorial analysis by J. Riordan. Phys. Today 1959, 12, 158.
c 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access
article distributed under the terms and conditions of the Creative Commons Attribution
(CC BY) license (http://creativecommons.org/licenses/by/4.0/).
160
sensors
Article
On the Capacity of 5G NR Grant-Free Scheduling
with Shared Radio Resources to Support
Ultra-Reliable and Low-Latency Communications
M. Carmen Lucas-Estañ *, Javier Gozalvez and Miguel Sepulcre
Department of Communications Engineering, Universidad Miguel Hernández de Elche (UMH),
Avda. de la Universidad s/n, 03202 Elche, Spain
* Correspondence: [email protected]; Tel.: +34-965-222-424
Abstract: 5G and beyond networks are being designed to support the future digital society,
where numerous sensors, machinery, vehicles and humans will be connected in the so-called
Internet of Things (IoT). The support of time-critical verticals such as Industry 4.0 will be especially
challenging, due to the demanding communication requirements of manufacturing applications
such as motion control, control-to-control applications and factory automation, which will require
the exchange of critical sensing and control information among the factory nodes. To this aim,
important changes have been introduced in 5G for Ultra-Reliable and Low-Latency Communications
(URLLC). One of these changes is the introduction of grant-free scheduling for uplink transmissions.
The objective is to reduce latency by eliminating the need for User Equipments (UEs—sensors, devices
or machinery) to request resources and wait until the network grants them. Grant-free scheduling
can reserve radio resources for dedicated UEs or for groups of UEs. The latter option is particularly
relevant to support applications with aperiodic or sporadic traffic and deterministic low latency
requirements. In this case, when a UE has information to transmit, it must contend for the usage
of radio resources. This can lead to potential packet collisions between UEs. 5G introduces the
possibility of transmitting K replicas of the same packet to combat such collisions. Previous studies
have shown that grant-free scheduling with K replicas and shared resources increases the packet
delivery. However, relying upon the transmission of K replicas to achieve a target reliability level
can result in additional delays, and it is yet unknown whether grant-free scheduling with K replicas
and shared resources can guarantee very high reliability levels with very low latency. This is the
objective of this study, that identifies the reliability and latency levels that can be achieved by 5G
grant-free scheduling with K replicas and shared resources in the presence of aperiodic traffic, and as
a function of the number of UEs, reserved radio resources and replicas K. The study demonstrates
that current Fifth Generation New Radio (5G NR) grant-free scheduling has limitations to sustain
stringent reliability and latency levels for aperiodic traffic.
1. Introduction
5G networks are being designed with the objective to support a broad range of verticals such as
manufacturing, transport, health, energy and entertainment. To this aim, important changes have been
introduced to increase data rates (enhanced mobile broadband, or eMBB), efficiently support large
amounts of devices (massive machine type communications, or mMTC) and guarantee unprecedented
reliability and latency levels (Ultra-Reliable and Low-Latency Communications or URLLC) [1].
Supporting URLLC is particularly relevant for many Industry 4.0 manufacturing applications, such as
motion control (requires a maximum latency of 1 ms and a reliability of 1–10−6 [2]), control-to-control
applications (maximum latency of 4 ms and a reliability of 1–10−8 [1]) and factory automation
(maximum latency between 0.25 ms and 2.5 ms and reliability requirements up to 1–10−9 [3]). These
applications require the exchange of information between sensors, actuators and controllers through
an industrial sensor and control network. 5G has the potential to provide the connectivity required
by the Industry 4.0 to digitalize factories and to support data-intensive services while ubiquitously
guaranteeing low latency and reliable connections. This has actually been acknowledged through the
establishment of the 5G Alliance for Connected Industries and Automation (5G-ACIA) [4].
5G has introduced significant changes to support URLLC [5]. Some of these changes focus at the
Radio Access Network level, since the medium access mechanisms account for an important part of
the total end-to-end transmission delay [6]. This is for example the case of the grant-based scheduling
process for uplink (UL) transmissions in legacy LTE (Long Term Evolution) 4G networks. Grant-based
scheduling requires a User Equipment (UE) and a Base Station (BS) to exchange scheduling requests
(SRs) and grant messages before transmitting any data. This process alone already results in an average
delay of up to 11.5 ms when considering a Transmission Time Interval (TTI) equal to 1 ms and an
SR periodicity of 10 ms [3]. Reducing the slot duration can reduce this delay. However, additional
scheduling changes have been necessary to sustain the URLLC requirements that characterize some
vertical applications, such as those in Industry 4.0. In particular, Release 15 and 16 of the 3rd Generation
Partnership Project (3GPP) standards have introduced the concept of grant-free scheduling (also
referred to as Configured Grant for 5G New Radio [7]) to support URLLC.
With grant-free scheduling, the BS reserves resources for UL transmissions and informs the UEs
of the reserved resources. When a UE wants to initiate a UL transmission, it directly utilizes the
reserved resources, without sending an SR and waiting for the subsequent grant message from the BS.
Recent studies have shown that grant-free scheduling in 5G NR considerably reduces the end-to-end
latency [8]. The 3GPP standards introduce the possibility for grant-free scheduling to reserve resources
to dedicated UEs, or to a group of UEs. In the first case, each resource is reserved for a specific UE,
and only this UE can utilize the resource at any time. This approach is adequate for periodic traffic since
the resource allocations can be planned, and resources can then be utilized efficiently. Such planning is
not possible in the case of aperiodic, sporadic or uncertain traffic. Sharing dedicated resources by a
group of UEs is hence an interesting option to optimize the usage of the radio resources in the presence
of aperiodic traffic. In this case, UEs have to contend for their usage, and collisions are possible. 5G NR
introduces the possibility to transmit K replicas of the same packet in consecutive slots to combat
potential collisions. However, relying on the transmission of K replicas to achieve a target reliability
level can result in additional delays. It is yet unknown whether 5G NR grant-free scheduling with
K-repetitions and shared resources can satisfy critical applications and guarantee very high reliability
levels with very low latency. In this context, this study presents an in-depth analysis of the reliability
and latency levels that can be achieved with existing 5G NR grant-free scheduling solutions as a
function of the number of UEs, the number of reserved radio resources, and the number of replicas
K. To this aim, the study analytically quantifies the probability of successfully delivering a packet
when using grant-free scheduling with K-repetitions and shared resources. In addition, the study
analyzes the impact of self-collisions. Self-collisions occur when a UE has to transmit a new packet,
and the transmission of the K replicas of the previous packet has not finished. If this happens, the new
packet must be stored, and its transmission is delayed until all replicas of the previous packet have
been transmitted. This study demonstrates for the first time that self-collisions have a non-negligible
impact upon the capacity of 5G NR grant-free scheduling to support stringent URLLC reliability and
latency levels.
2. Related Work
The 5G NR standard introduces the use of grant-free scheduling (also referred to as Configured
Grant [7]). With grant-free scheduling, the network pre-configures the radio resources and assigns
162
Sensors 2019, 19, 3575
them to UEs without waiting for UEs to request resources. UEs can utilize the pre-assigned resources
as soon as they have data to transmit. This is in contrast to grant-based scheduling, where UEs must
request access to radio resources through the transmission of Scheduling Requests (SR). The BS assigns
the radio resources to the UEs and notifies them using grant messages. UEs must wait to receive these
grant messages before transmitting any data. Grant-free scheduling eliminates all delays introduced by
the handshaking present in grant-based scheduling. Grant-free scheduling also improves the energy
consumption of the UEs, reduces their complexity, and decreases the signaling overhead compared
with grant-based scheduling ([8,9]). Grant-free scheduling can assign dedicated or shared resources to
the UEs. The BS decides whether resources are dedicated to specific UEs, or are shared by a group of
UEs [10]. Reserving resources to dedicated UEs is an interesting approach when we can plan ahead
what is the demand for resources. This is for example the case of periodic traffic. However, reserving
resources to dedicated users can be highly inefficient if the traffic demand is uncertain or aperiodic,
and it is not possible to anticipate when these resources will be needed. In this case, it is possible to
share radio resources by a group of UEs. This option ensures a more efficient utilization of resources,
and the possibility to satisfy URLLC communication requirements. However, users must contend for
the resources, and collisions can happen if two or more UEs simultaneously contend for the same
resources. 5G NR introduces the possibility of transmitting K replicas of the same packet in consecutive
slots to combat collisions and thus increase the probability of a correct reception [11,12].
The study in [13] analyzes the performance of the K replicas scheme. The authors propose
transmitting the first copy of a packet using dedicated resources, and the following replicas using
shared resources. The proposal also exploits shared diversity and advanced receiver processing
techniques to reduce the impact of packet collisions. The proposal achieves adequate reliability levels
and reduces the number of reserved (shared) radio resources, compared to a configuration that reserves
resources to dedicated UEs. The study in [14] also transmits the first copy of a packet using dedicated
resources. However, it does not consider the transmission of K replicas of a packet. Instead, the authors
propose to retransmit the original packet in a shared resource only if the first transmission is not
successful. This requires a handshaking between the UEs and the BS to exchange acknowledgement
messages. This handshaking increases the latency, and can compromise the capability to adequately
support URLLC applications with stringent latency requirements. In [15], the authors study the
optimum number of replicas (K) necessary to achieve a target reliability level within a deterministic
latency deadline. The study focuses upon aperiodic traffic and the case in which a group of UEs
share resources. The authors show that randomly choosing the resource for each replica increases the
probability of correctly delivering a packet. However, the study focuses on reliability levels up to
1–10−5 while some critical Industry 4.0 applications require higher reliability levels.
Previous studies have shown that transmitting K-repetitions of a packet increases the reception
rate. However, this can be done at the expense of an inefficient use of the radio resources due to
packet collisions or the unnecessary reservation of resources when the first replicas are correctly
delivered. Latency requirements may also impose restrictions on the number of replicas that can be
transmitted, and consequently on the reliability levels that may be achieved. In this context, several
recent contributions have analyzed slight modifications to the K-repetitions scheme. For example, [16]
proposed adaptively configuring the number of replicas transmitted based on the channel conditions.
The objective is to utilize the radio resources efficiently by avoiding unnecessary retransmissions
when the channel quality is good. A similar objective is sought in [17] where authors propose
conditions to stop the transmission of replicas. Other interesting proposals in 3GPP standardization
working groups include: the transmission of replicas within mini-slots (to reduce the latency) [18],
the possibility for transmitting replicas across the slot border, or the concept of periodicity boundary [19].
These studies propose interesting variants of the K-repetitions scheme. However, it is yet unknown
whether 5G NR grant-free scheduling with K-repetitions and shared resources can really support
URLLC communications with strict reliability and latency requirements under the presence of aperiodic
or sporadic traffic. This traffic is critical in many verticals, for example in Industry 4.0. In this context,
163
Sensors 2019, 19, 3575
this study conducts an in-depth evaluation of 5G NR grant-free scheduling with K-repetitions and
shared resources in the presence of aperiodic or sporadic traffic. The study identifies the reliability
and latency levels that can be achieved with 5G NR grant-free scheduling, and identifies its current
limitations. The study analyzes the impact of the number of UEs in the network, the number of reserved
radio resources, and the number of replicas K. The study also analyzes for the first time the impact of
self-collisions. The conducted analysis helps to identify the reliability and latency levels that can be
achieved based on network deployments and configuration options for 5G NR grant-free scheduling.
It should be noted that 3GPP standards define the possibility of utilizing grant-free scheduling
and transmitting K replicas, but do not define a specific scheme to be implemented. This study is based
on the implementation of 5G NR grant-free scheduling with K replicas and shared resources proposed
in [15]. This implementation is chosen because it has been specifically designed to guarantee stringent
URLLC latency and reliability requirements. To this aim, the implementation transmits original packets
and all of the replicas using grant-free scheduling on shared radio resources. A different approach
is proposed in [13] where dedicated resources are used to transmit the original packets, and shared
resources are used for the following replicas. This approach can increase the delay compared to [15]
if grant-based scheduling is utilized to allocate the dedicated resources. The efficient utilization
of resources could also be compromised if dedicated resources were reserved for each UE when
supporting applications with aperiodic traffic. The implementation of 5G NR grant-free scheduling
with K–repetitions and shared resources proposed in [15] is therefore better suited to support URLLC
applications with aperiodic or sporadic traffic.
3. Grant-Free Scheduling
This paper uses grant-free scheduling with K-repetitions and shared resources to evaluate the
reliability and latency levels that can be achieved in the presence of aperiodic traffic. Following [20],
reliability for URLLC services is defined as the percentage of data packets that are successfully delivered
before the latency deadline L established by the service or application. Following 3GPP standards [11],
UEs transmit the same data packet in K consecutive transmission slots with a duration Tslot . The UE
randomly selects an RB (Resource Block) for each transmission from the U RBs available per Tslot .
This is illustrated in Figure 1 that represents the time/frequency resource grid map in 5G NR, where the
unit is an RB. In 5G NR, a wideband channel is divided into sub-frames, slots and RBs. An RB is the
smallest unit of frequency resources that can be allocated to a UE. Without loss of generality, this study
considers a numerology μ equal to 3 with a subcarrier spacing of 120 kHz [21]. An RB is then 1440 kHz
(Δf ) wide in frequency (12 sub-carriers of 120 kHz) and lasts for one time slot with the duration Tslot
equal to 0.125 ms.
The reliability at the medium access level that can be achieved with grant-free scheduling with
K-repetitions and shared resources depends upon two main factors. The first factor is the possibility
that a packet is not correctly received due to the collision of all its K replicas with other transmissions;
this is due to the random selection of the RB for the transmission of each replica. The study in [15]
showed that the possibility to successfully deliver a packet increases with the number K of replicas.
The second factor is the effect of self-collisions. A self-collision occurs when a UE has to transmit a
new packet, and the transmission of the K replicas of the previous packet has not finished. If this
happens, the new packet must be stored, and its transmission is delayed until all the replicas of the
previous packet have been transmitted. This delay can result in the case that the new packet cannot
be delivered within the latency limit, and hence self-collisions can impact the reliability of URLLC
services. It is important then that the reliability (or probability that a packet is correctly received
before the latency deadline) of grant-free scheduling with K-repetitions and shared radio resources
is computed considering both the effect of collisions from other UEs, and the effect of self-collisions.
In this case, the reliability or probability Prel that a packet is correctly received by the BS must consider
the probability Psc that the transmission of the K replicas of a packet is not completed before the latency
deadline L due to the effect of self-collisions. For the packets that are not affected by the effect of
164
Sensors 2019, 19, 3575
self-collisions, it must be considered the probability Pc that a packet is not correctly received due to the
collision of all its K replicas with other transmissions. Hence, Prel can be expressed as:
In [15], its authors presented an expression to approximate the probability Pc of the collision of
the K replicas of a packet with the transmission of other UEs. The expression was derived in scenarios
where N UEs share the same pool of RBs. However, [15] did not analyze the impact of self-collisions,
since the study only considered low values of K (equal to or lower than 4). For these low values,
self-collisions might not have an impact upon the reliability, as will be later shown. In this paper,
we analytically derive the exact probability of any collision of the K replicas of a packet with packets
transmitted by other UEs (Pc ). We also quantify the impact of self-collisions (Psc ), and analytically
compute the reliability that can be achieved by grant-free scheduling with K-repetitions and shared
resources (Prel ). These analytical expressions are a valuable contribution to the community since they
can be easily utilized to evaluate 5G NR grant-free scheduling. The availability of these exact analytical
expressions is particularly useful when considering applications with very demanding reliability and
latency URLLC requirements. This is the case of certain Industry 4.0 applications. For example, motion
control requires a maximum latency of 1 ms and a reliability of 1–10−6 . Control-to-control applications
require a maximum latency of 4 ms and a reliability of 1–10−8 . Factory automation applications usually
demand maximum latency values in the range 0.25–2.5 ms and reliability levels up to 1–10−9 . In this
case, simulations can be very computationally expensive if we want to compute the packet reception
rate (1 − Pc ) with reliability demands in the order of 1–10−6 to 1–10−9 . In these scenarios, errors are
very rare, and we need long and computationally expensive simulations to achieve accurate results.
The analytical methodology utilized in this study is then an adequate and efficient tool for scenarios
with demanding URLLC communication requirements.
f/¨f
U
5%
u
5%ZLWKDFWLYHW[
Figure 1. Illustration of the Fifth Generation New Radio (5G NR) resource grid map: Transmission of a
data packet with four repetitions and a random selection of Resource Blocks (RBs) per slot.
P g = 1 − exp(−Tslot · λ) (2)
165
Sensors 2019, 19, 3575
We define Ri as the set of UEs for which a new packet could be generated in a slot si (the slot has a
time duration equal to Tslot ). Here, ni is the number of UEs that do have a new packet to transmit in si .
This ni can then take any value between 0 and the cardinality of Ri . The probability Ptx (ni , Ri ) that ni
UEs from the set Ri of UEs have new packets to be transmitted in si with duration Tslot is equal to:
|Ri | |Ri |−ni
Ptx (ni , Ri ) = · P g ni · 1 − P g (3)
ni
where |Ri | represents the number of elements or the cardinality of the set Ri .
A packet will not be successfully delivered to the BS if all its K replicas collide with the
trans-missions of other UEs. A UE has an active transmission in si if it generated a new data packet in
the previous slots si−(K−1) , . . . , si−1 , and si . If this is the case, then the UE would be transmitting one of
the K replicas in si . We denote as nact i
the number of UEs with active transmissions in si . The probability
Pnrc (nact
i
, U ) that n act UEs do not collide with a given UE is equal to the probability that they do not
i
select the same RB at a given slot for their next transmission as the UE under study. Pnrc (nact i
, U ) is
given by:
nact
U−1 i
Pnrc (nact
i , U ) = (4)
U
Equations (2)–(4) are necessary to compute the probability Pc that a packet is not correctly received
at the BS due to the collision of all its K replicas with the transmissions of other UEs. To compute Pc ,
let us consider the case of a particular UE1 that has to transmit the K replicas of a packet in slots si ,
si+1 , . . . , si+K−1 . For the sake of clarity, we consider an example with K = 4, and si corresponding to s3 .
Pc is then equal to the probability of collision of the 4 replicas transmitted in s3 , s4 , s5 , and s6 , which is
represented by Prc (s3 , s4 , s5 , s6 ):
Pc = Prc (s3 , s4 , s5 , s6 ) (5)
To determine Prc (s3 , s4 , s5 , s6 ), we first study the probability Prc (s3 ) that the replica of the packet
transmitted in s3 collides with a transmission from any other UE. Prc (s3 ) is given by the probability
that one or more UEs (in addition to UE1 ) have an active transmission in s3 (i.e., nact 3
≥ 1), and that one
or more of the nact UEs select the same RB as UE for their transmission. n act is equal to n + n + n +
3 1 3 0 1 2
n3 , and the probability Prc (s3 ) has to consider all possible combinations of n0 , n1 , n2 and n3 that result
in nact
3
≥ 1. The probability P(nact 3
≥ 1) can then be expressed as:
⎧ ⎡ ⎤ ⎫
nmax ⎪
⎪ nmax nmax ⎢⎢ nmax ⎥⎥⎪⎪
⎪ 0
⎪
⎨ 1 2
⎢ 3
⎥⎥ ⎪
⎪
⎬
⎢⎢
P(nact ≥ 1) = ⎪
⎪ Ptx (n0 , R0 ) · Ptx (n1 , R1 ) · ⎢⎢Ptx (n2 , R2 ) · Ptx (n3 , R3 )⎥⎥⎥ ⎪ ⎪ (6)
3 ⎪
⎪ ⎢
⎣ ⎥
⎦ ⎪
⎪
n0 = n min ⎩ n1 =nmin n2 =n min n3 =n min ⎭
0 1 2 3
where nmax
i
and nmin
i
represent the maximum and minimum possible values of ni in each slot, and are
equal to:
nmax
i = |Ri |, ∀i ≤ 3 (7)
1 if i = 3 & |Ri | = N − 1
nmin
i = ,i≤3 (8)
0 otherwise
where Ri is the set of UEs that could have a new packet to be transmitted in si . Ri is equal to the total
number of UEs (N) minus UE1 and all active UEs in the slot previous to si . The cardinality of Ri is then
equal to:
i−1
|Ri | = N − 1 − n j, i ≤ 3 (9)
j=max{i−3,0}
166
Sensors 2019, 19, 3575
To achieve finally the expression of Prc (s3 ), we need to incorporate to the expression of P(nact 3
≥ 1)
in (6) the probability that one or more of the nact3
UEs select the same RB as UE 1 for their transmissions.
This probability is equal to 1 − Pnrc (nact
3
, U ). Prc (s3 ) is then calculated as:
⎧ ⎡ ⎤⎫
⎪
nmax
⎪ ⎪
⎨
nmax
nmax
⎢⎢ nmax
" ⎥⎥ ⎪ ⎪
⎪
⎢⎢ act , U )) ⎥⎥⎥ ⎬
0 1 2 3
Prc (s3 ) = ⎪ P ( n , R ) · P ( n , R ) · ⎢ P ( n , R ) · P ( n , R ) · ( 1 − P ( n ⎥⎦ ⎪ (11)
n0
⎪ tx 0 0 n =nmin tx 1 1 n =nmin ⎢⎣ tx 2 2 n =nmin tx 3 3
⎪
=nmin ⎩
nrc 3 ⎪
⎪
⎭
0 1 1 2 2 3 3
The probability of collision of the replica transmitted in s4 depends upon the number nact 4
of
UEs with active transmissions in s4 . This nact 4
depends on the number n 1 , n 2 , n 3 and n 4 of UEs that
have new packets to transmit in s1 , s2 , s3 , and s4 , respectively. The probability that UEs have new
packets to transmit in s1 , s2 , and s3 is already included in (11) (Ptx (n1 , R1 ), Ptx (n2 , R2 ), and Ptx (n3 , R3 )
respectively). In this context, Prc (s3 ) and Prc (s4 ) are not independent, and they must be calculated
jointly. We then compute the joint probability Prc (s3 , s4 ) that the replicas transmitted in s3 and s4
collide with transmissions from other UEs. Computing Prc (s3 , s4 ) only requires including in (11) the
probability that there are UEs with new packets to be transmitted in s4 (i.e., Ptx (n4 , R4 )), and the
probability that one or more of the active nact 4
UEs in s4 select the same RB for their transmission than
UE1 . Prc (s3 , s4 ) can then be expressed as:
⎧
nmax ⎪
⎪ nmax nmax
0 ⎪ ⎨
1
2
Prc (s3 , s4 ) = ⎪
⎪ Ptx ( n ,
0 0R ) · Ptx ( n ,
1 1R ) · [Ptx (n2 , R2 )·
n0
⎪
=nmin ⎩ n =nmin n =nmin
1 2
⎫
⎤⎥⎪
0 1 2
(12)
nmax
" nmax
" ⎥⎥ ⎪ ⎪
⎥⎥ ⎬
3 4
Ptx (n3 , R3 ) · (1 − Pnrc (nact , U )) · Ptx (n4 , R4 ) · (1 − Pnrc (nact , U )) ⎪
⎥⎦ ⎪
n3 =nmin
3
n4 =nmin
4 ⎪
⎭
3 4
where nact
4
, |R4 |, nmax
4
and nmin
4
are defined as:
4
4 =
nact
j=1
nj (13)
3
|R4 | = N − 1 − nj (14)
j=1
nmax
4 = |R4 | (15)
1 if |R4 | = N − 1
nmin
4 = (16)
0 otherwise
The process followed to account for possible collisions of the replicas transmitted in s5 and s6 is
similar to that considered for s4 . Pc can then be expressed as follows when K = 4:
⎧
⎪
⎪ ⎪
⎨
nmax
0
nmax
1
nmax
2
Pc = ⎪
⎪ P ( n , R ) · P ( n , R ) · [P (n , R )·
n0 =nmin
⎪ tx 0 0 n =nmin tx 1 1 n =nmin tx 2 2
⎩
0 1 1 2 2
nmax
3 " n max
4 #"
Ptx (n3 , R3 ) · (1 − Pnrc (nact
3
, U )) · Ptx (n4 , R4 ) · (1 − Pnrc (nact
4
, U )) · (17)
n3 =nmin n4 =nmin
⎫
⎤⎤⎪
3 4
nmax
5 " n max
6 " ⎥⎥⎥ ⎥⎥⎥ ⎪
⎪
⎬
Ptx (n5 , R5 ) · (1 − Pnrc (nact , U )) · Ptx (n6 , R6 ) · (1 − Pnrc (nact , U )) ⎥⎥⎥ ⎥⎥⎥ ⎪⎪
n5 = n 5
min
5
n6 =n6
min
6 ⎦ ⎦ ⎪
⎭
167
Sensors 2019, 19, 3575
where nact
i
, |Ri |, nmax
i
and nmin
i
∀i ∈ [0, 2·K−1] are defined as:
i
i =
nact
j=max{i−(K−1),0}
nj (18)
i−1
|Ri | = N − 1 − nj (19)
j=max{i−(K−1),0}
nmax
i = |Ri | (20)
1 if i ≥ K − 1 & |Ri | = N − 1
nmin
i = (21)
0 otherwise
The process illustrated for K = 4 can be followed to compute Pc for any value of K. As shown
in (22), Pc can be computed using the auxiliary function hi (K, N, U ) defined in (23) with i equal to cero.
To simplify the notation, hi (K, N, U ) is also represented as hi in (22) and (23). As it can be observed
in (23), h0 depends on h1 , and in general, hi depends on hi+1 , until h2K−1 .
3.2. Self-Collisions
The effect of self-collisions is illustrated in Figure 2. We may suppose that a UE starts transmitting
a packet p1 that was generated before t0 . Let us then suppose then that a second packet p2 is generated
before the K replicas of the previous packet p1 have been transmitted. This is a self-collision. If a
self-collision happens, p2 can be stored, and its transmission will start after the UE has transmitted the
Kth replica of p1 (i.e., at t1 in Figure 2). The transmission of the K replicas of p2 will finish at t2 that is
equal to:
t2 = 2 · K · Tslot + t0 (24)
The transmission of the K replicas of p2 may finish after the latency deadline L, due to the time p2
being stored as the K replicas of p1 are being transmitted. We then analyze the probability Psc that
the transmission of K replicas of a packet is not completed before L due to the effect of self-collisions.
This probability depends upon the number of replicas K and on the time instant at which p2 was
generated. Figure 2 illustrates how self-collisions affect the probability of completing the transmission
of p2 before L, with L equal to 1 ms. L = 1 ms implies that the maximum number of replicas K that can
be transmitted per packet is 8. However, it is possible to transmit less than 8 replicas, and Figure 2
represents the case in which K is set equal to 4, 6 or 8. p2 can be transmitted before the deadline L if it
is generated at any time instant after t2 − L, where t2 is the time at which the transmission of the K
replicas of p2 is finished (the transmission of p2 starts when the transmission of the K replicas of p1
has finished at t1 ). If p2 is generated before t2 − L, it is not possible to complete the transmission of
the K replicas of p2 before the latency deadline L. Psc can then be computed as the probability that the
time between the generation of two consecutive packets at a UE falls within the interval [0, Δt], where
168
Sensors 2019, 19, 3575
Δt represents the time difference between t2 − L and the time tp1 at which p1 is generated (see (26)).
Psc can then be expressed as:
% Δt
Psc (Δt) = λ · e−t·λ · dt (25)
0
Δt = t2 − L − tp1 = 2 · K · Tslot − L − tp1 (26)
¨t PV
K p p p p p p p p
t t t t
p p
¨t PV
K p p p p p p p p p p p p
t t t t
p p
¨t PV
K p p p p p p p p p p p p p p p p
t t t t
p p
As shown in (25) and (26), the negative effect of self-collisions increases with the value of K, since K
influences the time a packet might be stored until the transmission of the previous packet is finished.
However, increasing the number K of replicas transmitted for each packet is preferred, in order to
combat possible collisions with other UEs sharing the same pool of radio resources. The next section
will analyze both the effect of collisions from other UEs and the effect of self-collisions to analyze the
reliability achievable with the grant-free scheduling with K-repetitions and shared radio resources.
4. Validation
This section validates the analytical expressions derived in Section 3.1 to calculate the probability
Pc that a packet is not correctly received due to packet collisions with other UEs. To this aim, we compare
the results achieved with the analytical expressions, with that obtained through simulations.
We have implemented a system level simulator in Matlab™ that accurately models the 5G NR
grant-free scheduling process with K-repetitions and shared resources. The simulator emulates a single
cell with N UEs that generate aperiodic traffic. Each UE models the packet traffic arrival, using a
Poisson distribution with exponential inter-arrival time. The average packet inter-arrival time is equal
to 1/λ, where λ is the average number of packets generated per second. The simulator implements the
time/frequency resource grid map of 5G NR. The time and frequency duration of RBs is configurable
based on the considered 5G NR numerology μ. It is possible to also configure the number U of RBs
available per time slot. The number K of replicas can also be configured in the simulation platform.
We have conducted a large number of simulations to ensure the accuracy of the simulation results,
and compare them to those obtained with our analytical expressions and methodology. Simulations
are here shown for K equal to 2, 4 and 8, λ equal to 0.1 packets, μ equal to 3, and U equal to 6 RBs
per slot. UEs transmit small packets with a size of 32 bytes [22] that can be transmitted in a single
RB. Figure 3 compares the value of Pc achieved analytically and through simulations for a varying
number N of users in the cell. The figure shows that the results achieved analytically precisely
match those obtained through the simulations. Similar trends have been observed for other values of
the parameters. The results achieved clearly validate the proposed methodology and the analytical
expressions presented in Section 3.1.
169
Sensors 2019, 19, 3575
Figure 3. Comparison of analytical and simulation results for different latency requirements L and
number of repetitions K (U = 6, λ = 0.1 packets).
It is important to highlight that this study focuses on URLLC applications that demand very
high reliability levels. In simulations, we compute the number of packets for which the K replicas
have collided with those packets transmitted by other UEs, and then compute the achieved reliability
(Prel = 1 − Pc ). It is rare that all K replicas of a packet collide with transmissions from other UEs for
low values of N. This is particularly the case when K increases. In this context, the computational cost
of simulations significantly increases if we want to achieve accurate statistical results. This explains
why simulation results are not shown for values of N below 30 when K = 8. It also highlights the
value of our analytical expressions and methodology to estimate the performance of 5G NR grant-free
scheduling for demanding URLLC applications and aperiodic traffic.
5. Performance Evaluation
This section evaluates the capacity of 5G NR grant-free scheduling with K-repetitions and shared
resources to meet the reliability and latency requirements of URLLC services. To this aim, we use
the analytical expressions that are derived in Section 3 and were validated in the previous section.
Reliability for URLLC services is defined as the percentage Prel of data packets that are successfully
received by the BS before the latency deadline established by the service or application. In this study,
we analyze first the reliability, considering only the effect of collisions from other UEs. This study
analyzes then the impact of self-collisions on the capacity of 5G NR grant-free scheduling with
K-repetitions and shared resources to achieve the reliability levels demanded by URLLC services.
This is particularly relevant, as this study extends the state of the art by evaluating the capacity of 5G
NR grant-free scheduling to sustain reliability levels even higher than 1–10−9 . This study also evaluates
the performance of 5G NR grant-free scheduling as a function of the number of UEs, the number of
reserved radio resources, and the number K of replicas.
The performance of 5G NR grant-free scheduling is evaluated considering a single cell with N
UEs. Packets are generated by each UE following a Poisson process with exponentially inter-arrival
time. The average packet inter-arrival time is equal to 1/λ, where λ is the average number of packets
generated per second. UEs transmit small packets with a size of 32 bytes [22]. Radio resources are
divided in 6 × 12 subcarriers (i.e., U = 6) with a subcarrier spacing of 120 kHz (i.e., Tslot = 0.125 ms).
Figure 4 shows the probability Pc that a packet is not correctly received at the BS due to the collisions
from other UEs experienced by all of the replicas of a packet (This would correspond to the reliability
achieved with 5G NR grant-free scheduling if there were no self-collisions, i.e., Psc = 0 and Prel = 1 − Pc ).
The figure shows the value of Pc that can be achieved as a function of the number of UEs for latency
requirements (L) of 0.25, 0.5, 0.75 and 1 ms. We focus on services with the most stringent latency
requirements, given the challenge to satisfy high reliability levels when latency decreases [23]. For each
value of L, the grant-free scheduling scheme is executed with the maximum possible number of replicas
170
Sensors 2019, 19, 3575
K that can be transmitted within the required latency. For example, if the maximum latency L that can
be tolerated is equal to 1 ms, the maximum number of replicas K that can be transmitted within 1 ms is
equal to 8 (L = 1 ms corresponds to 8·Tslot when Tslot = 0.125 ms). Figure 4 also shows the performance
achieved for two values of λ (0.1 and 1 packet(s)). The results depicted in Figure 4 clearly show that
reducing the probability Pc of not receiving a packet to values as low as 10−9 , (and hence reaching
reliability levels of 1–10−9 when the effect of self-collisions is not considered), can only be achieved
with high values of K and values of L equal to 0.75 or 1 ms. Figure 4 also shows that the probability Pc
increases with the number of UEs, since the risk of collision is higher. As a result, the capacity of 5G NR
grant-free scheduling to support high reliability levels is significantly decreased as the number of UEs
to be supported increases. Figure 4 also shows that the difficulty in supporting high reliability levels
increases with λ, since the probability Pc increases as a result of a higher risk of collision between UEs.
(a) (b)
Figure 4. Pc as function of the number of User Equipments (UEs) and for different latency requirements
L: (a) λ = 0.1 packets; (b) λ = 1 packet.
Figure 5 depicts the number of UEs that can be supported with a given latency requirement (L)
and a reliability of Prel = 1 − Pc when Psc = 0. It is important to remember that L establishes the
maximum number of replicas K that can be transmitted. The results (the number of supported UEs)
for each value of L in Figure 5 have been obtained for the maximum value of K permitted by L (K
equal to 2, 4, 6 and 8 for L equal to 0.25, 0.5, 0.75 and 1 ms, respectively). The Release 15 of the 3GPP
standards [22] establishes URLLC requirements with a latency of L = 1 ms and a reliability target of
1–10−5 . Figure 5 shows that grant-free scheduling with K-repetitions and shared resources can achieve
a reliability equal to 1–10−5 with only K = 2 if we do not consider self-collisions. Grant-free scheduling
with K = 2 can also guarantee a latency as low as 0.25 ms. For low values of the packet generation
rate (i.e., λ = 0.1 packets), grant-free scheduling with 2 repetitions can support up to 34 UEs with a
reliability of 1–10−5 and L = 0.25 ms if we do not consider self-collisions. The number of UEs that
can be supported decreases with λ, since the risk of collision with other UEs increases when each UE
transmits more packets per second. For example, only 4 UEs can be supported with L = 0.25 ms and a
reliability of 1–10−5 when λ = 1 packet. If the latency requirement is relaxed to 0.5 ms or even higher,
grant-free scheduling can support more than 500 UEs with only K = 4 when λ = 0.1 packets. If λ
increases, grant-free scheduling can only guarantee the required reliability for 500 UEs if the latency
requirement is 1 ms, and each UE can transmit 8 replicas of the same packet. These results show
that the reliability and latency levels that can be achieved with grant-free scheduling depend upon
configuration parameters (e.g., K), the traffic (e.g., λ) and the number of UEs supported. An adequate
configuration and optimization of grant-free scheduling based on the network conditions could help
support stringent reliability and latency levels. However, it is important to note that these results are
achieved without considering self-collisions. The impact of self-collisions might be non-negligible
when, for example, K and/or λ increase.
The Release 16 of 3GPP standards for 5G NR [2] defines use cases with higher reliability
requirements (up to 1–10−6 ). Some Industry 4.0 applications (e.g., factory automation) require even
171
Sensors 2019, 19, 3575
higher reliability levels (up to 1–10−9 ), as discussed in [3]. It is then important analyzing whether
grant-free scheduling with K-repetitions and shared resources can guarantee reliability levels of the
order of 1–10−9 . Figures 4 and 5 show that grant-free scheduling can only guarantee very high reliability
levels with high values of K, which limits the latency requirements (L) that can be satisfied. For example,
a probability to correctly receive a packet equal to 1–10−7 cannot be guaranteed when L < 0.5 ms,
even for the lower packet generation rates. If the reliability requirement increases to Prel = 1–10−9 ,
grant-free scheduling can only support 5 UEs with L = 0.75 ms and λ = 0.1 packets. It can support
86 UEs if the latency requirement is relaxed to 1 ms. However, if λ increases to 1 packet then grant-free
scheduling can only support 10 UEs with a reliability of 1–10−9 even if L is equal to 1 ms.
(a) (b)
Figure 5. Number of UEs supported with different requirements (L and Prel = 1 − Pc , when Psc = 0):
(a) λ = 0.1 packets; (b) λ = 1 packet.
Figure 6 shows the impact of U upon the performance of the grant-free scheduling scheme with
K-repetitions and shared resources. U is the number of available RBs (Resource Blocks) per Tslot .
In particular, Figure 6 depicts the number of UEs that can be supported with a given reliability and
latency L when U decreases and λ is set equal to 0.1 packets (the reliability is equal to Prel = 1 − Pc when
the effect of self-collisions is not taken into account, i.e., Psc = 0). Figure 6 shows that the number of
UEs that grant-free scheduling with K-repetitions can support for a given set of requirements strongly
depends upon the number of RBs available. UEs randomly select an RB for each transmission from the
U RBs available per slot. The probability that several UEs select the same RB for their transmissions
increases when the number of RBs per slot decreases. Consequently, the probability Pc that a packet
is not correctly received due to packet collisions, increases. In addition, the number of UEs that can
achieve a target reliability level also decreases when the number of RBs per slot decreases. For example,
443 UEs can be supported with L = 0.5 ms (and hence K = 4) and Pc = 10−5 when U is equal to 5 RBs.
This number decreases to 69 UEs when U decreases to 3 RBs. This is a significant reduction of 84%.
This reduction increases when the reliability demand increases. For example, 86 UEs can be supported
with Pc = 10−9 and L = 1 ms (and hence K = 8) when U is equal to 6. However, only 6 UEs can achieve
these values of Pc and L if U decreases to 4 (i.e., a 93% reduction).
172
Sensors 2019, 19, 3575
Figure 6. Number of UEs supported for a given L and Prel = 1 − Pc with Psc = 0 as a function of the
number U of available RBs per Tslot (λ = 0.1 packets).
All previous results have been derived without considering the effect of self-collisions.
Self-collisions were illustrated in Figure 2, and the probability of self-collision was derived in Section 3.2.
As previously described, if a packet p2 is generated before the K replicas of the previous packet p1
have been transmitted, p2 will be stored and transmitted after completing the transmission of the K
replicas of p1 . Due to the time that p2 is stored, the transmission of its K replicas may finish after the
latency deadline L. As presented in Section 3.2, it is not possible to complete the transmission of the K
replicas of p2 before the latency deadline L if p2 is generated before t2 − L (t2 is the time at which the
transmission of the K replicas of p2 is finished as shown in Figure 2). This results in that the probability
Psc (the probability that the transmission of K replicas of a packet is not completed before L due to
the effect of self-collisions) is equal to the probability that the time between the generation of two
consecutive packets at a UE falls within the interval [0, Δt], where Δt represents the time difference
between t2 − L and the time tp1 at which p1 is generated (see (25) and (26)).
We consider that packets are generated following a Poisson process with exponential inter-arrival
time. As a result, Δt is homogeneously distributed between Δt1 and Δt2 . For K = 4 in Figure 2, Δt1 is
equal to 0 and Δt2 is equal to Tslot , since p1 can be homogeneously generated between t0 and t0 − Tslot .
When K = 6, Δt1 is equal to 4 ·Tslot , and Δt2 is equal to (4+1) ·Tslot , since p1 can be homogeneously
generated between t0 and t0 − Tslot . Similarly, Δt1 and Δt2 are equal to 8 ·Tslot and (8+1) ·Tslot for
K = 8. Table 1 shows the value of Psc given in (26) when Δt is equal to Δt1 or Δt2 considering L = 1
ms and K = 4, 6 and 8. Δt = Δt1 corresponds to the scenario where self-collisions are less probable,
while Δt = Δt2 corresponds to the case in which they are more probable.
The results in Table 1 show that the probability of self-collision is non-negligible. For example,
Psc can reach values equal to 1.25 × 10−4 and 9.99 × 10−4 when K is equal to 4 and 8, respectively,
and λ = 1 packet. It is also important to highlight that a comparison of results in Figure 4 and Table 1
shows that Psc can be actually higher than Pc . This is for example the case when K = 8: Pc is lower than
10−7 and 10−5 for λ equal to 0.1 and 1 packet(s), respectively (Figure 4), while Psc is approximately equal
to 10−4 and 10−3 (Table 1). Grant-free scheduling can hence be limited by the effect of self-collisions,
in particular when K increases. It is then important that the reliability (or probability that a packet is
correctly received before the latency deadline) of grant-free scheduling with K-repetitions and shared
radio resources is computed considering both the effect of collisions from other UEs and the effect of
self-collisions following (1).
173
Sensors 2019, 19, 3575
Figure 7 plots 1 − Prel for different values of K and L when considering both Pc and Psc . The results
are plotted considering Δt = Δt1 for computing Psc . Δt = Δt1 corresponds to the case where self-collisions
are less probable. Figure 4 shows that it is necessary to transmit a high number of replicas K within L
to combat collisions from other UEs and correctly receive a packet at the BS. For example, Figure 4
shows that K must be equal to 8 in order to achieve Prel = 1–10−9 when Psc = 0 and λ is equal to 1
packet. However, Table 1 showed that the effect of self-collisions increases with K even to the point
that self-collisions limit the reliability that can be achieved. This is actually shown in Figure 7 when we
consider L = 1 ms. In principle, it could be possible to satisfy a 1 ms latency requirement if we transmit
4, 6 or 8 replicas of a packet. Figure 7 shows that if K = 4 and Δt = Δt1 (for computing Psc in (26)),
the impact of self-collisions is not relevant, and the reliability levels of 1–10−5 can be satisfied for more
than 500 UEs and 80 UEs when λ is equal to 0.1 and 1 packet(s), respectively; these results are in line
with those observed in Figure 4 for K = 4. However, when K is equal to 6 or 8, the effect of self-collisions
becomes more relevant (Table 1), and Figure 7 shows that it can actually limit the maximum reliability
that can be achieved independently of the number of UEs. In fact, the maximum reliability that can be
achieved is approximately equal to 1 − Psc . In this case, for K = 8 and λ = 1 packet/s, the maximum
reliability (when Psc is computed considering Δt = Δt1 ) that can be achieved is 1–10−3 when the latency
requirement L is equal to 1 ms. It should be noted that reliability levels even higher than 1 − Pc = 1–10−9
were achieved when the effect of self-collisions was not considered (Figure 4). The results discussed so
far correspond to the scenario where Psc has been computed considering Δt = Δt1 . This corresponds
to the scenario where self-collisions are less probable. Figure 7 also shows the reliability that can be
achieved with L = 1 ms and K = 4 when Δt = Δtavg . This Δtavg is the average value of Δt. Δtavg = (Δt1 +
Δt2 )/2, since Δt is homogeneously distributed between Δt1 and Δt2 . Figure 7 shows that in this case it is
not possible to achieve a reliability higher than 1–6.3 × 10−5 and 1–6.3 × 10−4 when λ is equal to 0.1 and
1 packet(s). Figure 7 also shows that the reliability becomes again nearly independent of the number of
UEs that are being supported. The degradation of reliability experienced from Δt = Δt1 to Δt = Δtavg is
again due to a major relevance of the effect of self-collisions when we compute the reliability.
(a) (b)
Figure 7. Reliability for different latency requirements L and number of repetitions K (U = 6): (a) λ = 0.1
packets; (b) λ = 1 packet.
Expressions in (25) and (26) show that Psc also depends upon the latency requirement L. The effect
of self-collisions is more relevant when the latency requirement is stricter. For example, Figure 7 shows
that the effect of self-collisions already limits the maximum reliability that can be achieved when
K = 4 if the latency requirement is equal to 0.5 ms. Latency requirements significantly influence the
reliability levels that can be satisfied. This is the case because latency requirements limit the number K
of replicas that can be sent for each packet. Figure 4 shows that the maximum reliability level that can
be guaranteed depends on the latency requirements when only considering Pc . Figure 7 also shows
174
Sensors 2019, 19, 3575
that the effect of self-collisions becomes more relevant with stricter latency requirements. These results
show that it is a challenge guaranteeing high reliability demands with very low latency levels.
The results in Figure 7 demonstrate that current 5G NR grant-free scheduling with K-repetitions
and shared resources cannot guarantee some of the more demanding reliability and latency levels.
However, it is important emphasizing that other proposals cannot meet such requirements either,
and these actually perform worse than the implementation analyzed in this study. This is actually
the case for the proposals that transmit the first copy of a packet in dedicated resources for the UEs.
These resources can be reserved using grant-based scheduling (such as in [14]) or semi-persistent
scheduling (such as in [13]). Grant-based scheduling requires the UE to send an SR to the BS, and wait
for the BS to reply with a grant message. The exchange of these messages between the UE and the BS
is illustrated in Figure 8 This handshaking generates a non-negligible Ttotal latency that is equal to:
where TL1/L2 is the L1/L2 processing latency at the BS and the UE, Talign is the alignment latency (the
alignment latency is the time elapsed from the moment the UE is ready to transmit to the actual time
the transmission starts), Tproc is the processing latency (this latency represents the latency between
the reception of the SR and the transmission of the grant message), and Ttx is the time required to
transmit the SR and grant messages. Following [24], we consider TL1/L2 = Talign = Ttx = 1 TTI, and Tproc
= 2.33 TTI. These values are a best-case scenario, since they represent reduced processing times that
can be achieved with 3GPP Release 15 compared to Release 14. Equation (27) shows that the total
latency (2.3 ms) introduced by the grant-based scheduling process to assign dedicated resources to UEs
is higher than the latency achieved with the 5G NR grant-free scheduling implementation analyzed in
this study. For example, Figure 7 shows that this implementation can guarantee latency levels below
1 ms (this latency is guaranteed with a reliability up to 1–10−5 when K = 4, λ = 0.1 packets, U = 6,
and Δt = Δtavg ).
ĂƚĂŝŶ WƌŽĐĞƐƐŝŶŐΘ
ůŝŐŶŵĞŶƚ ƌĞƐƉŽŶƐĞƚŝŵĞ
WƌŽĐĞƐƐŝŶŐ h
^Z 'ƌĂŶƚ ĂƚĂƚƌĂŶƐŵŝƐƐŝŽŶ
^
WƌŽĐĞƐƐŝŶŐΘ WƌŽĐĞƐƐŝŶŐ
ƌĞƐƉŽŶƐĞƚŝŵĞ
ǀĞƌĂŐĞůĂƚĞŶĐLJ
The alternative to grant-based scheduling is Semi-Persistent Scheduling (SPS). In this case, UEs are
assigned dedicated resources for a period of time. During this period, UEs can utilize the resources
without requesting permission from the BS. This avoids the latency introduced by grant-based
scheduling. However, semi-persistent scheduling inefficiently utilizes the radio resources when the
traffic is aperiodic. This is the case, because it is not possible to predict when UEs will need resources.
To illustrate this effect, let us consider a scenario with N = 300 users that generate aperiodic traffic
(λ = 0.1 packets). We shall then suppose that users request a maximum latency of 1 ms and a reliability
level equal to 1–10−5 . Satisfying this demand requires reserving 300 RBs (one per UE) in a 1 ms time
windowA lower number of resources would be necessary if traffic was periodic and we could estimate
when each UE would require resources for their transmission. In this case, several UEs could share
the same RB if they generate their packets at different time instants. This would reduce the total
number of RBs necessary to serve all users. This is not possible in the case of aperiodic traffic, since
175
Sensors 2019, 19, 3575
we cannot predict when a UE would need radio resources. Figure 7 shows that our implementation
of 5G NR grant-free scheduling with 4-repetitions and shared resources can support 300 UEs (with
their latency and reliability demands) with only 48 RBs in a time window of 1 ms. This is 84% less
radio resources than if we reserve dedicated resources per UE (with aperiodic traffic) for their first
transmission using semi-persistent scheduling. These results clearly show that the implemented
5G NR grant-free scheduling with shared resources can better support URLLC applications with
aperiodic traffic and stringent communication requirements than other existing proposals. However,
the conducted analysis (e.g., Figure 7) has also shown that new solutions will be needed to guarantee
very demanding reliability and latency levels such as those foreseen for some URLLC services in 3GPP
Release 16.
6. Conclusions
This paper has analyzed the capacity of 5G NR grant-free scheduling to support URLLC services
with strict reliability and latency levels such as those demanded by Industry 4.0. The study has
focused on aperiodic or sporadic traffic and an implementation of 5G NR grant-free scheduling with
K-repetitions and shared radio resources. This implementation has been chosen, since sharing radio
resources is an attractive option for aperiodic traffic. In addition, the K-repetitions scheme can combat
possible packet collisions between UEs that share radio resources. This study has analyzed the reliability
and latency levels that can be achieved with existing 5G NR grant-free scheduling with shared radio
resources as a function of the number of UEs, the number of reserved radio resources, and the number of
replicas K. To this aim, this study has derived analytical expressions that quantify the exact probability
of collision with packets transmitted by other UEs, and the impact of self-collisions. It is important
to emphasize that this study is the first one that has evaluated the impact of self-collisions. Packet
collisions and self-collisions have then been taken into account to derive analytically the reliability that
can be achieved by existing 5G NR grant-free scheduling with shared resources. The derived analytical
expressions have been validated against simulations. These expressions are a valuable contribution to
the community, since they can be easily utilized to evaluate 5G NR grant-free scheduling.
This study has demonstrated that current 5G NR grant-free scheduling solutions cannot guarantee
high reliability levels with strong latency requirements. This is partly due to the fact that strong latency
requirements limit the number of replicas K that can be transmitted. In addition, self-collisions have a
non-negligible impact that even limits the reliability that can be achieved when K increases. The impact
of self-collisions also increases with the latency requirements. The obtained results demonstrate
that new solutions are necessary for 5G NR grant-free scheduling to be able to support applications
with stringent URLLC latency and reliability requirements under the presence of aperiodic traffic.
In particular, the transmission of K replicas per packet might be inadequate to support aperiodic traffic
with very low latency levels due to the impact of self-collisions. Consequently, other approaches should
be designed to minimize collisions between UEs sharing radio resources. This study has shown that
these new solutions cannot be based either on grant-based or semi-persistent scheduling. Grant-based
scheduling introduces additional latency due to the exchange of messages between the UEs and the BS
for assigning the radio resources. Semi-persistent scheduling with dedicated resources inefficiently
utilizes the available resources when considering dedicated resources and aperiodic traffic. Innovative
grant-free scheduling solutions are hence necessary to meet the URLLC requirements identified for
3GPP Release 16 and beyond. This could include, for example, the use of sensing mechanisms or full
duplex techniques that can reduce packet collisions.
Author Contributions: Conceptualization, M.C.L.-E. and J.G.; methodology, M.C.L.-E. and J.G.; validation,
M.C.L.-E. and J.G.; formal analysis, M.C.L.-E., J.G. and M.S.; investigation, M.C.L.-E.; writing—original draft
preparation, M.C.L.-E.; writing—review and editing, J.G. and M.S.; funding acquisition, J.G. and M.S.
Funding: This work has been funded by the European Commission through the FoF-RIA Project AUTOWARE:
Wireless Autonomous, Reliable and Resilient Production Operation Architecture for Cognitive Manufacturing
176
Sensors 2019, 19, 3575
(No. 723909), and the Spanish Ministry of Economy, Industry, and Competitiveness, AEI, and FEDER funds
(TEC2017-88612-R).
Conflicts of Interest: The authors declare no conflict of interest.
References
1. 3GPP. Technical Specification Group Services and System Aspects; Study on Communication for Automation in
Vertical Domains; 3GPP: Sophia Antipolis, France, 2018; Release 16, 3GPP TR 22.804 V16.2.0.
2. 3GPP. Technical Specification Group Radio Access Network; Study on Physical Layer Enhancements for NR
Ultra-Reliable and Low Latency Case (URLLC); 3GPP: Sophia Antipolis, France, 2018; Release 16, 3GPP TR
38.824 V1.0.0.
3. Klessig, H.; Ashraf, S.A.; Almeroth, B.; Riedel, I.; Puschmann, A.; Elste, T.; Simsek, M.; Schulz, P.; Matthe, M.;
Fettweis, G.; et al. Latency Critical IoT Applications in 5G: Perspective on the Design of Radio Interface and
Network Architecture. IEEE Commun. Mag. 2017, 55, 70–78.
4. 5G Alliance for Connected Industries and Automation (5G-ACIA). 5G for Connected Industries and Automation,
2nd ed.; 5G Alliance for Connected Industries and Automation (5G-ACIA): Frankfurt, Germany, 2019.
5. Popovski, P.; Nielsen, J.J.; Stefanovic, C.; De Carvalho, E.; Ström, E.; Trillingsgaard, K.F.; Bana, A.-S.;
Kim, D.M.; Kotaba, R.; Park, J.; et al. Wireless Access for Ultra-Reliable Low-Latency Communication:
Principles and Building Blocks. IEEE Netw. 2018, 32, 16–23. [CrossRef]
6. 3GPP. Technical Specification Group Radio Access Network; Evolved Universal Terrestrial Radio Access (E-UTRA);
Study on Latency Reduction Techniques for LTE; 3GPP: Sophia Antipolis, France, 2016; 3GPP TR 36.881
V14.0.0.
7. 3GPP. Technical Specification Group Radio Access Network; NR; Medium Access Control (MAC) Protocol
Specification; 3GPP: Sophia Antipolis, France, 2018; Release 15, 3GPP TS 38.321 V15.4.0.
8. Berardinelli, G.; Mahmood, N.H.; Abreu, R.; Jacobsen, T.; Pedersen, K.; Kovacs, I.Z.; Mogensen, P. Reliability
Analysis of Uplink Grant-Free Transmission Over Shared Resources. IEEE Access 2018, 6, 23602–23611.
[CrossRef]
9. 3GPP. Discussion on Configured Grant for NR-U; 3GPP: Sophia Antipolis, France, 2018; 3GPP TSG-RAN,
R1-1810329.
10. Li, Z.; Uusitalo, M.A.; Shariatmadari, H.; Singh, B. 5G URLLC: Design Challenges and System Concepts.
In Proceedings of the 2018 15th International Symposium on Wireless Communication Systems (ISWCS),
Lisbon, Portugal, 28–31 August 2018; pp. 1–6.
11. 3GPP. Technical Specification Group Radio Access Network; NR; Physical Layer Procedures for Data; 3GPP:
Sophia Antipolis, France, 2018; Release 15, 3GPP TS 38.214 V15.4.0.
12. Wu, Y.; Zhang, L.; Wang, C.; Chen, Y. Performance Evaluation of Grant-Free Transmission for Uplink URLLC
Services. In Proceedings of the 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), Sydney,
Australia, 4–7 June 2017; pp. 1–6.
13. Kotaba, R.; Manchon, C.N.; Balercia, T.; Popovski, P. Uplink Transmissions in URLLC Systems with Shared
Diversity Resources. IEEE Wirel. Commun. Lett. 2018, 7, 590–593. [CrossRef]
14. Abreu, R.; Mogensen, P.; Pedersen, K.I. Pre-Scheduled Resources for Retransmissions in Ultra-Reliable and
Low Latency Communications. In Proceedings of the 2017 IEEE Wireless Communications and Networking
Conference (WCNC), San Francisco, CA, USA, 19–22 March 2017; pp. 1–5.
15. Singh, B.; Tirkkonen, O.; Li, Z.; Uusitalo, M.A. Contention-Based Access for Ultra-Reliable Low Latency
Uplink Transmissions. IEEE Wirel. Commun. Lett. 2018, 7, 182–185. [CrossRef]
16. Jacobsen, T.; Abreu, R.; Berardinelli, G.; Pedersen, K.; Mogensen, P.; Kovacs, I.Z.; Madsen, T.K. System
Level Analysis of Uplink Grant-Free Transmission for URLLC. In Proceedings of the 2017 IEEE Globecom
Workshops (GC Wkshps), Singapore, 4–8 December 2017; pp. 1–6.
17. 3GPP. Grant-Free Transmission for UL URLLC; 3GPP: Sophia Antipolis, France, 2017; 3GPP TSG-RAN,
R1-1706919.
18. 3GPP. Enhancement of Uplink Grant-free transmission for NR URLLC; 3GPP: Sophia Antipolis, France, 2018;
3GPP TSG-RAN, R1-1810176.
19. 3GPP. Enhancement of Configured Grant for NR URLLC; 3GPP: Sophia Antipolis, France, 2018; 3GPP TSG-RAN,
R1-1812162.
177
Sensors 2019, 19, 3575
20. 3GPP. Technical Specification Group Radio Access Network; NR; Service Requirements for the 5G System; 3GPP:
Sophia Antipolis, France, 2018; Stage 1, Release 15, 3GPP TR 22.261 V15.7.0.
21. 3GPP. Technical Specification Group Radio Access Network; NR; Physical Channels and Modulation; 3GPP:
Sophia Antipolis, France, 2018; Release 15, 3GPP TR 38.211 V15.4.0.
22. 3GPP. Technical Specification Group Radio Access Network; Study on Scenarios and Requirements for Next
Generation Access Technologies; 3GPP: Sophia Antipolis, France, 2018; Release 15, 3GPP TR 38.913 V15.0.0.
23. Bennis, M.; Debbah, M.; Poor, H.V. Ultrareliable and Low-Latency Wireless Communication: Tail, Risk,
and Scale. Proc. IEEE 2018, 106, 1834–1853. [CrossRef]
24. 3GPP. Evaluation of Latency in LTE; 3GPP: Sophia Antipolis, France, 2017; 3GPP TSG-RAN, R1-1720535.
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access
article distributed under the terms and conditions of the Creative Commons Attribution
(CC BY) license (http://creativecommons.org/licenses/by/4.0/).
178
sensors
Article
Noninvasive Suspicious Liquid Detection Using
Wireless Signals
Jiewen Deng 1 , Wanrong Sun 1 , Lei Guan 2 , Nan Zhao 1 , Muhammad Bilal Khan 1 , Aifeng Ren 1 ,
Jianxun Zhao 1 , Xiaodong Yang 1, * and Qammer H. Abbasi 3
1 School of Electronic Engineering, Xidian University, Xi’an 710071, China; [email protected] (J.D.);
[email protected] (W.S.); [email protected] (N.Z.); [email protected] (M.B.K.);
[email protected] (A.R.); [email protected] (J.Z.)
2 School of Life Sciences and Technology, Xidian University, Xi’an 710126, China; [email protected]
3 School of Engineering, University of Glasgow, Glasgow G12 8QQ, UK; [email protected]
* Correspondence: [email protected]
Abstract: Conventional liquid detection instruments are very expensive and not conducive to
large-scale deployment. In this work, we propose a method for detecting and identifying suspicious
liquids based on the dielectric constant by utilizing the radio signals at a 5G frequency band. There are
three major experiments: first, we use wireless channel information (WCI) to distinguish between
suspicious and nonsuspicious liquids; then we identify the type of suspicious liquids; and finally,
we distinguish the different concentrations of alcohol. The K-Nearest Neighbor (KNN) algorithm is
used to classify the amplitude information extracted from the WCI matrix to detect and identify liquids,
which is suitable for multimodal problems and easy to implement without training. The experimental
result analysis showed that our method could detect more than 98% of the suspicious liquids, identify
more than 97% of the suspicious liquid types, and distinguish up to 94% of the different concentrations
of alcohol.
1. Introduction
The illegal carrying and transportation of flammable and explosive liquids seriously affects public
safety. Flammable and explosive liquids such as gasoline and alcohol are also commonly used in
various terrorist activities. Therefore, the safety inspection of flammable and explosive liquids is of
great significance for ensuring public safety. It has broad application prospects in the fields of public
security, civil aviation, and customs. Liquids cannot be identified by the naked eye, and it is difficult
to carry out dangerous liquid inspection in crowded places, which is a great challenge for security
personnel. Moreover, there are still some places where the “taste liquid” method is used to determine
whether the liquid is safe [1]. Forbid passengers to carry large amounts of liquid has become the
main method to prevent terrorist attacks. For example, international civil aviation regulations prohibit
carrying more than 100 mL of liquid, and trains and high-speed trains prohibit carrying flammable
liquids and more than 120 mL of compressed spray. The traditional detection of suspicious items is
either manual inspection (such as setting checkpoints at each entrance) or special equipment (such as
surveillance cameras, X-ray machines, and ultra-wideband scanners), which is costly, expensive to
deploy, and difficult to implement on a large scale [2]. It is necessary to introduce a new suspicious
liquid detection scheme which is more economical and covers a wider range.
There are several mature liquid detection technologies. A traditional approache, the Raman
spectrum analysis, uses the molecular structure to identify liquids according to their scattering
spectroscopy. Raman spectroscopy has many unique advantages, such as wide detection range, sharp
spectral peaks, and high resolution [3]. That is, when monochromatic light radiates on an object,
the molecules of the substance will scatter, and the spectrum reflected by different substances will be
different. Moreover, the method, based on X-ray image technology, is used to identify liquid substances,
and can obtain the atomic number of the liquid through its X-ray [4]. However, this method has a
certain error rate and the equipment is very expensive. Another method is to detect liquids based
on the different absorption and attenuation characteristics of different substances via electromagnetic
waves [5,6]. Microwave detection can achieve noncontact detection with a certain distance between
the detected objects, and has high detection sensitivity. However, these approaches rely on expensive
and specialized equipment, which does not facilitate wide deployment in practice.
Recently, Radio Frequency (RF) based sensing has drawn considerable attention. A couple of
studies have explored the feasibility of using RF signals for remote monitoring and controlling during
infusion. For instance, a wireless intelligent monitoring system, based on wireless communication
and network technology, is put forward, which can monitor drip speed in real time and automatically
alarm in abnormal conditions [7]. The ZigBee wireless sensor is used to detect the velocity of liquid
droplets [8]. While these approaches mainly focus on exploiting the differences of wireless signal
measurements to sense physical morphological changes of liquids, using fine-grained wireless channel
information (WCI) to identify types of liquid remains an option.
5G communication technology is a data and information transmission technology developed
by technicians based on 4G technology. Its advantages include sound transmission performance,
fast transmission speed, high utilization rate of resources, and wide range of coverage. As such,
it is favored in modern data and information transmission [9]. Based on ubiquitous wireless signals,
the wireless sensing system will provide a variety of high precision, high reliability, high security,
and convenient application services, among which the human behavior identification technology is at
the core for public use [10]. As the information of the physical layer, the fine-grained WCI contains a
lot of channel information which is invisible to the Medium Access Control (MAC) layer. The WCI can
measure the frequency response of multiple subcarriers at the same time from a single packet, rather
than the overall amplitude response superimposed by all subcarriers. Information about the WCI and
frequency-selective channels is described [11].
In the field of wireless sensing, WCI has gradually become a popular area of research [12], such as
indoor positioning [13–15], respiration detection [16–18], and behavior recognition [19,20]. Zhou et al.
proposed using the WCI to detect the presence of people in the environment [21]. Although wireless
signals have good applications in indoor positioning and fall detection, there are still relatively few
studies on detecting the types and concentrations of liquids by using them. Liquid interferes with
the path of radio signals. Different liquids have different degrees of interference to the radio signal
propagation path due to their differences in dielectric constants, which leads to different changes in the
WCI. These changes can be effectively observed at the signal receiver, so as to realize the detection and
identification of various liquids. Table 1 shows the relative dielectric constants of common objects.
Following this introduction, the paper is organized into four sections. Section 2 describes the
preparatory work. Section 3 details the band selection and method design. Results are analyzed in
Section 4 and conclusions are drawn in Section 5.
180
Sensors 2019, 19, 4086
2. Preparatory Work
In Equation (2), H(n) is the data for subcarrier number n, where n ∈ [1 to 30]. |H(n)| is the raw
amplitude information and ∠H(n) denotes the random phase data.
The deviation scale of each data from the reference value is given. Suppose the median of {d(k)} is
D. The median has an absolute deviation of:
MAD can replace the standard deviation σ. The Hampel filter uses m data in a mobile window to
determine the validity of current data. If the data is valid, process it; otherwise, replace it with the
median. The Hampel filter can protect the detailed information while filtering the singular value.
181
Sensors 2019, 19, 4086
(
n
2
d (x, y) = (xk − yk ) , (5)
k =1
In the KNN algorithm, the choice of the K value will have a significant impact on the classification
results. Generally, we can take a relatively small value of K, and cross validation is used to select the
best value of K. Usually, K is an integer less than 20.
3. Method Design
182
Sensors 2019, 19, 4086
4
7 407
Using this method, we carried out three experiments. Experiment 1 was to distinguish between
suspicious and nonsuspicious liquids, Experiment 2 was to identify the type of suspicious liquids,
and Experiment 3 was to distinguish the three different concentrations of alcohol.
4
7 407
Figure 3. (a) The selection of containers; (b) Suspicious liquids selected from the experiment.
183
Sensors 2019, 19, 4086
4
7 407 47
Figure 4. Amplitude information of 30 subcarriers of Step 1 at the C-band. (a) Using the paper cup;
(b) Using the plastic bottle; (c) Using the glass bottle.
4
7 407 47
Figure 5. Amplitude information of 30 subcarriers of Step 1 at the S-band. (a) Using the paper cup;
(b) Using the plastic bottle; (c) Using the glass bottle.
Figure 6. The KNN algorithm Classification results of Step 1 at the C-band and the S-band.
184
Sensors 2019, 19, 4086
The KNN classification algorithm was used to further detect suspicious and nonsuspicious liquids.
The classification results of the KNN algorithm for two bands of data are shown in Figure 6. Blue,
orange, and grey represent the paper cup, the plastic bottle, and the glass bottle, respectively. In the
C-band environment, the detection accuracy of Step 1 was over 98%, and that for S-band was 99%.
! ! !
" " "
# # #
4
7 407 47
Figure 7. Amplitude information of 30 subcarriers of Step 2 at the C-band. (a) Using the paper cup;
(b) Using the plastic bottle; (c) Using the glass bottle.
In the S-band environment, the WCI amplitude ranges of the three kinds of suspected liquids
differed greatly, as shown in Figure 8.
!
! !
" " "
#
# #
4
7 407 47
Figure 8. Amplitude information of 30 subcarriers of Step 2 at the S-band. (a) Using the paper cup;
(b) Using the plastic bottle; (c) Using the glass bottle.
Figure 9 is the result of the KNN classification algorithm in identifying the types of suspicious
liquids. In the C-band environment, the system can achieve more than 97% accuracy in identifying
types of suspicious liquid (Step 2), and that for the S-band environment is 99%.
185
Sensors 2019, 19, 4086
Figure 9. The KNN algorithm Classification results of Step 2 at the C-band and the S-band.
&
&
&
&
4
7 407 47
Figure 10. The wireless channel information (WCI) amplitudes of 30 subcarriers corresponding to
different concentrations of alcohol at the C-band by using different containers. (a) Using the paper cup;
(b) Using the plastic bottle; (c) Using the glass bottle.
Figure 11 shows the detection results of different concentrations of alcohol in C-band and S-band
environments. From the figure, we can see that the detection accuracy of the C-band is higher than that
of the S-band for the detection of alcohol with different concentrations. In the C-band frequency analysis
experiment, the accuracy of the system for the detection of different concentrations of alcohol reached
more than 91%, and that of S-band electromagnetic waves was up to 89%. Therefore, the C-band
electromagnetic wave is superior to the S-band electromagnetic wave in the accurate detection of
different concentrations of the same liquid.
186
Sensors 2019, 19, 4086
Figure 11. Detection results of different concentrations of alcohol at the C-band and the S-band.
As can be seen from Table 2, wireless sensing corresponding the 5G frequency band had
excellent detection results for the detection and identification of suspicious liquids, no matter which
container was selected. Moreover, our method had better performance and robustness in detecting
different concentrations of alcohol, and had more subtle differences in dielectric constant than existing
Wi-Fi technologies.
5. Conclusions
In this work, we explored the feasibility of using a wireless signal in a multi-band environment
to detect suspicious liquids. Our work is novel because it demonstrates that it is possible to detect
suspicious liquids accurately using radio signals without installing expensive liquid detection machines.
Our system can not only detect whether the liquid is suspicious, but also further identify the types of
suspicious liquids. In addition, we confirmed the feasibility of liquid concentration detection by using
the WCI at a 5G frequency band.
The results analysis shows that our method can accurately detect suspicious and nonsuspicious
liquids (Experiment 1) with more than 98% accuracy, regardless of the type and size of containers,
and can identify the type of suspicious liquids (Experiment 2) with more than 97% accuracy. For the
detection of alcohol with different concentrations, the accuracy can reach up to 94%. This provides
better performance and robustness than existing Wi-Fi technology.
However, our method has limitations for liquids stored in metal containers. In that case,
we recommend that security personnel intervene. Our method could be further improved by increasing
the number of suspicious liquids prohibited in public and looking for ways to reduce the impact of
metal containers on liquid detection.
Author Contributions: Conceptualization, J.D. and N.Z.; methodology, L.G.; software, J.D.; validation, L.G.;
formal analysis, J.D.; writing—original draft preparation, J.D.; writing—review and editing, M.B.K.; supervision,
W.S., A.R., J.Z., X.Y. and Q.H.A.; project administration, X.Y.; funding acquisition, X.Y.
Funding: The work was supported in part by the Fundamental Research Funds for the Central Universities
(No. JB180205).
Conflicts of Interest: The authors declare no conflict of interest.
187
Sensors 2019, 19, 4086
References
1. Hu, L. Research on Liquid Classification by CNN-SVM Model and WIFI Channel State Information.
Master’s Thesis, Hunan University, Changsha, China, 2018.
2. Wang, C.; Liu, J.; Chen, Y.; Liu, H.; Wang, Y. Towards in-baggage Suspicious Object Detection Using
Commodity WiFi. In Proceedings of the 2018 IEEE Conference on Communications and Network Security
(CNS), Beijing, China, 30 May–1 June 2018.
3. Jiang, X.; Qian, Y.T. Research on The Improvement of Raman Spectrum Qualitative Technique and Its
Application in Airport Inspection. Shandong Inoustrial Technol. 2017, 351, 220–222.
4. Wang, Y.S.; Li, B.L. Recognition of Liquid Substances in Containers Based on X-Ray Images. In Proceedings
of the 15th National Conference on Image and Graphics, Guangzhou, China, 10 December 2010; p. 5.
5. Xu, X. Study on Microwave Detection Method for Quality of Liquid Food. Master’s Thesis, University of
Electronic Science and Technology of China, Sichuang, China, 2015.
6. Ma, Y. Microwave Detection of Mixed Liquid Components. Master’s Thesis, Taiyuan University of Technology,
Taiyuan, China, 2013.
7. Xiao, W.; Tu, Y.; Wang, J.; Mao, Y.W. Design and Implementation of Wireless Intelligent Monitoring System
for Liquid Droplets. Electron. Meas. Technol. 2008, 1, 133–136.
8. Yu, H.; Ding, B.; Sun, X.; Ding, Z. Design and Implementation of Infusion Monitoring System Based on
ZigBee Technology. Piezoelectrics Acoustooptics 2013, 35, 756–762.
9. Chengming, Z. Practical Thinking of 5G Communication Technology Based on Internet of Things.
Telecom World 2019, 26, 95–96.
10. Wang, C.; Chen, S.; Yang, Y.; Hu, F.; Liu, F.; Wu, J. Literature Review on Wireless Sensing Wi-Fi Signal-Based
Recognition of Human Activities. Tsinghua Sci. Technol. 2018, 23, 203–222. [CrossRef]
11. Yang, Z.; Liu, Y. Wi-Fi Radar: From RSSI to CSI. Commun. CCF 2014, 10, 11.
12. Li, X.; Zhang, D.; Xiong, J.; Zhang, Y.; Li, S.; Wang, Y.; Mei, H. Training-Free Human Vitality Monitoring
Using Commodity Wi-Fi. ACM Interact. Mob. Wearable Ubiquitous Technol. 2018, 2, 121. [CrossRef]
13. Xiang, L.; Li, S.; Zhang, D.; Jie, X.; Hong, M. Dynamic-MUSIC: Accurate device-free indoor localization.
In Proceedings of the ACM International Joint Conference on Pervasive & Ubiquitous Computing, Heidelberg,
Germany, 12–16 September 2016.
14. Wang, J.; Jiang, H.; Xiong, J.; Jamieson, K.; Xie, B. LiFS: Low Human-Effort, Device-Free Localization with
Fine-Grained Subcarrier Information. In Proceedings of the International Conference on Mobile Computing
& Networking, New York, NY, USA, 3–7 October 2016.
15. Xiong, J.; Sundaresan, K.; Jamieson, K. ToneTrack: Leveraging Frequency-Agile Radios for Time-Based Indoor
Wireless Localization. In Proceedings of the 21st Annual International Conference on Mobile Computing
and Networking, Paris, France, 7–11 September 2015.
16. Liu, X.; Cao, J.; Tang, S.; Wen, J.; Guo, P. Contactless Respiration Monitoring Via Off-the-Shelf WiFi Devices.
IEEE Trans. Mob. Comput. 2016, 15, 2466–2479. [CrossRef]
17. Wang, H.; Zhang, D.; Ma, J.; Wang, Y.; Wang, Y.; Wu, D.; Gu, T.; Xie, B. Human respiration detection
with commodity WiFi devices: Do user location and body orientation matter? In Proceedings of the ACM
International Joint Conference on Pervasive & Ubiquitous Computing, Heidelberg, Germany, 12–16 September
2016.
18. Zhang, F.; Zhang, D.; Xiong, J.; Wang, H.; Niu, K.; Jin, B.; Wang, Y. From Fresnel Diffraction Model to
Fine-Grained Human Respiration Sensing with Commodity Wi-Fi Devices. ACM Interact. Mob. Wearable
Ubiquitous Technol. 2018, 21, 53. [CrossRef]
19. Wei, W.; Liu, A.X.; Shahzad, M.; Kang, L.; Lu, S. Understanding and Modeling of WiFi Signal Based Human
Activity Recognition. In Proceedings of the International Conference on Mobile Computing & Networking,
Paris, France, 7–11 September 2015.
20. Yan, W.; Jian, L.; Chen, Y.; Gruteser, M.; Liu, H. E-eyes: Device-free location-oriented activity identification
using fine-grained WiFi signatures. In Proceedings of the 20th Annual International Conference on Mobile
Computing and Networking, Maui, HI, USA, 7–11 September 2014.
21. Zhou, Z.; Zheng, Y.; Wu, C.; Shang, G.L.; Liu, Y. Towards Omnidirectional Passive Human Detection.
In Proceedings of the 2013 Proceedings IEEE INFOCOM, Turin, Italy, 14–19 April 2013.
188
Sensors 2019, 19, 4086
22. Wu, K. Wi-metal: Detecting metal by using wireless networks. In Proceedings of the IEEE International
Conference on Communications, Kuala Lumpur, Malaysia, 22–27 May 2016.
23. Zhong, S.; Huang, Y.; Ruby, R.; Lu, W.; Qiu, Y.X.; Wu, K. Wi-fire: Device-free fire detection using WiFi networks.
In Proceedings of the IEEE International Conference on Communications, Paris, France, 21–25 May 2017.
24. Technology, M. The MIIT has Issued a Notice Concerning the Use of the 3300–3600 MHz and 4800–5000
MHz Frequency Bands in The Fifth-generation Mobile Communication System. 2017. Available online: http:
//www.miit.gov.cn/n1146295/n1652858/n1652930/n3757020/c5907905/content.html (accessed on 15 July 2018).
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access
article distributed under the terms and conditions of the Creative Commons Attribution
(CC BY) license (http://creativecommons.org/licenses/by/4.0/).
189
sensors
Article
A Distributed Testbed for 5G Scenarios:
An Experimental Study
Mohammad Kazem Chamran 1 , Kok-Lim Alvin Yau 1, *, Rafidah M. D. Noor 2 and Richard Wong 1
1 School of Science and Technology, Sunway University, Subang Jaya 47500, Malaysia;
[email protected] (M.K.C.); [email protected] (R.W.)
2 Department of Computer System and Technology, University of Malaya, Kuala Lumpur 50603, Malaysia;
fi[email protected]
* Correspondence: [email protected]
Abstract: This paper demonstrates the use of Universal Software Radio Peripheral (USRP), together
with Raspberry Pi3 B+ (RP3) as the brain (or the decision making engine), to develop a distributed
wireless network in which nodes can communicate with other nodes independently and make
decision autonomously. In other words, each USRP node (i.e., sensor) is embedded with separate
processing units (i.e., RP3), which has not been investigated in the literature, so that each node
can make independent decisions in a distributed manner. The proposed testbed in this paper is
compared with the traditional distributed testbed, which has been widely used in the literature. In the
traditional distributed testbed, there is a single processing unit (i.e., a personal computer) that makes
decisions in a centralized manner, and each node (i.e., USRP) is connected to the processing unit via a
switch. The single processing unit exchanges control messages with nodes via the switch, while the
nodes exchange data packets among themselves using a wireless medium in a distributed manner.
The main disadvantage of the traditional testbed is that, despite the network being distributed in
nature, decisions are made in a centralized manner. Hence, the response delay of the control message
exchange is always neglected. The use of such testbed is mainly due to the limited hardware and
monetary cost to acquire a separate processing unit for each node. The experiment in our testbed has
shown the increase of end-to-end delay and decrease of packet delivery ratio due to software and
hardware delays. The observed multihop transmission is performed using device-to-device (D2D)
communication, which has been enabled in 5G. Therefore, nodes can either communicate with other
nodes via: (a) a direct communication with the base station at the macrocell, which helps to improve
network performance; or (b) D2D that improve spectrum efficiency, whereby traffic is offloaded
from macrocell to small cells. Our testbed is the first of its kind in this scale, and it uses RP3 as the
distributed decision-making engine incorporated into the USRP/GNU radio platform. This work
provides an insight to the development of a 5G network.
Keywords: D2D communication; 5G; sensor network; sensor; end-to-end delay; USRP; distributed
mechanism; Raspberry Pi
1. Introduction
Fifth generation (5G) is a promising next-generation cellular network armed with new features,
particularly device-to-device (D2D) communication that enables direct communication between
devices without going through base stations (BSs). This helps to offload traffic from macrocell (MC)
BSs to small cell (SC) (i.e., femtocell) BSs, as well as user equipment and devices, including sensors,
while increasing network cell coverage via multihop transmission [1–3]. In 5G, a node can operate
either as a licensed user (or a primary user, PU) to utilize its licensed channels (or cellular channels),
or as an unlicensed user (or a secondary user, SU) to explore and utilize white spaces, which are the
underutilized licensed channels (or cognitive channels) [4]. D2D enables nodes to access both cellular
and cognitive channels to improve spectrum efficiency in order to improve data transmission rate and
quality of service (QoS) [5–7].
191
Sensors 2020, 20, 18
delay of a route changes with its operating environment (e.g., the processing capability) and its
operation (e.g., the lower read and write rates of RP3 contribute to a higher end-to-end delay and lower
packet delivery ratio in our distributed testbed compared to the traditional testbed). Lower end-to-end
delay is favorable to support real-time applications integrated with sensors, such as driverless vehicles.
To the best of our knowledge, this is the first USRP/GNU radio platform incorporated with RP3
implementation with this scale and functionality.
2. Background
This section presents an overview of 5G, USRP, GNU radio, and RP3.
2.1. 5G
The 5G network is a heterogeneous network that consists of different kinds of network cells,
including MC and femtocell (FC). The transmission of the BSs and nodes are characterized by different
frequency bands and transmission power levels. In Figure 1, a 5G network consists of two main
planes: (a) control plane consists of MC BSs, which use higher transmission power levels at lower
frequency bands, contributing to larger transmission ranges; and (b) data plane consists of FC BSs
and nodes, which use lower transmission power levels at higher frequency bands, contributing to
smaller transmission ranges [22]. The control plane communicates with the cloud, which consists
of a central controller (CC) that manages and coordinates global functions, such as route selection.
MC BSs can coordinate and communicate among themselves via the cloud [12,23], and this helps them
to determine the nodes that each of them must cover. The FC BSs can coordinate and communicate
among themselves via D2D if they are within each other’s transmission range, and this helps them to:
(a) use a route established from a FC source node FCs to a FC destination node FCd by the CC; and (b)
offload traffic from MC BSs. Both MC and FC overlap, and FC BSs can communicate with each other
directly. Hence, the MC BS in the control plane can select a route, and inform FC BSs and nodes in
the data plane about the route; subsequently, the FC BSs and nodes setup the D2D route accordingly.
Therefore, FC BSs and nodes can be relaxed from performing complex tasks, such as route selection.
192
Sensors 2020, 20, 18
Figure 2. Transmit and receive paths between an antenna and a RP3 via a USRP/GNU radio unit. Solid
arrow line is part of a receive path, and dotted arrow line is part of a transmit path.
• Wide bandwidth transceive (WBX) is the RF front end that provides access to different operating
channels within a range of 50 MHz of RF bandwidth with 8 bit samples, or 25 MHz of RF
bandwidth with 16 bit samples. The maximum transmission power is 100 mW (or 20 dBm) with a
noise figure of 5 dB.
193
Sensors 2020, 20, 18
• Converter consists of: (a) an analogue-to-digital converter (ADC) and a digital down converter
(DDC) in the receive path; and (b) a digital-to-analogue converter (DAC) and a digital up converter
(DUC) in the transmit path. DDC selects desired signals from an array of signals captured by ADC,
while DUC increases the bandwidth of baseband signals so that they are compatible with DAC.
• Field-programmable gate array (FPGA), specifically the Xilinx Spartan 3A-DSP 1800 board [24]
used in this platform, consists of: (a) a decimation filter for achieving the required interface
bandwidth in the receive path, and an interpolation filter for achieving the opposite in the
transmit path; (b) a USRP hardware driver (UHD) block with a software interface that enables
various components to communicate among themselves; and (c) a processor block that performs
encoding/decoding, modulation/demodulation, timing synchronization, and other signal
processes required for software defined radio (SDR) operations. The FPGA communicates with
RP3 via power over Ethernet (PoE). It provides connection between: (a) gigabit Ethernet CAT
5E-350 MHz cables, which provide a maximum data rate of 1000 megabits per second (Mbps)
connected to a Gigabit switch; and (b) USB3, which provides a maximum data rate of 1600 Mbps.
During system initialization, the kernel, which is the fundamental part of an operating system,
of GNU radio controls and monitors programs and systems, as well as performs default functions,
such as checking and assigning memory space to FPGA [24].
• Source node, which is a RP3 unit with an Internet protocol (IP) address (e.g., 192.168.10.2) and
a port number (e.g., 1234), generates and sends a data or video stream in the form of frames
encapsulated in user datagram protocol (UDP). In GRC, the frames pass through three main
components: (a) an encoder that converts the frames into packets with a predefined payload length
(e.g., 1472 bytes); (b) a Gaussian minimum shift keying (GMSK) modulator that converts the packets
into modulated signals at baseband (e.g., the minimum non-zero frequencies); and (c) a USRP
sink block that sets the center frequency (e.g., 850 MHz), channel gain (e.g., 1dB), and sample rate
(e.g., 1 MHz). Finally, the signals are broadcasted.
• Intermediate node receives signals from a transmitter, which can be a source node or an upstream
intermediate node, and transmits them to the next-hop node, which can be a destination or
a downstream intermediate node. There are two processes that help to improve the quality
of packets before forwarding them in order to reduce interference and address poor channel
quality [25]: (a) to demodulate signals to packets, and then to decode packets to frames; and
(b) to encode frames to packets, and then to modulate packets to signals. The demodulation
and decoding processes are performed at the receiver unit, and then modulation and encoding
processes at the transmitter unit.
• Destination node, which is a RP3, receives and demodulates signals to packets, and then decodes
packets to frames. Then, a UDP sink block sends the frames to an application (e.g., a VLC media
player) through a port (e.g., port number 1236 or udp://@:1236).
194
Sensors 2020, 20, 18
Figure 3. GNU radio flow graph that consists of source, intermediate and destination nodes.
3. Related Work
This section presents related works on testbeds, particularly USRP/GNU radio platforms,
for investigating the networking aspect of 5G. It covers two main topics. Firstly, the communication
delay between nodes along a route. The routes are assumed to be readily available, and they are
selected and provided by the central controller. Secondly, the testbeds, particularly USRP/GNU radio
and RP3 platforms.
195
Sensors 2020, 20, 18
via a switch. The end-to-end delay has shown to reduce since the personal computer can pre-process
route selection prior to data transmission.
In [27], the response delay (or the round-trip time) is investigated on a testbed comprised of
two USRP/GNU radio nodes connected to a personal computer. The response delay is the duration
between the moment the first byte of a packet passes the digital signal processing block of a sender and
the moment the first byte of an acknowledgement packet arrives at the sender. The delay is incurred
in: (a) the initiation process that includes modulation, sampling, encoding, as well as packet transfer
between GNU radio and kernel (or the operating system); (b) the buffering process that collects and
stores packets in a buffer (e.g., the buffer of a VLC media player); and (c) the transmission process
that receives and sends packets to the FPGA unit of USRP so that they are interpolated before being
transmitted via antenna. Measurement shows that the initiation process has the highest time delay,
and the transmission process has the lowest time delay.
In [28], the hardware and software processing delays, as well as the response delay,
are investigated on a testbed comprised of two USRP/SDR nodes, which serve as the source and
destination nodes, connected to a single traditional processing unit (i.e., a personal computer).
The source node transmits a data packet to the destination node; and subsequently, the destination
node returns a response packet to the source node. The delays are incurred in: (a) processes run in a
USRP/SDR node (e.g., operating system and the modulation process); and (b) communication between
the two nodes. Measurement shows that the software processing delay incurred in SDR is significantly
higher than the hardware processing delay incurred in USRP and the communication delay incurred
between the two nodes.
In [29], the response delay, which includes the waiting time of a packet in a queue, is investigated
on a testbed comprised of four USRP/GNU radio nodes connected to a single traditional processing
unit (i.e., another USRP/GNU radio unit). There are a pair of PU transmitter and receiver, and another
pair of SU transmitter and receiver. The SU transmitter must sense the operating channels before
transmission so as not to interfere with the PUs. Up to 30% of the delay incurred in the SU transmitter
is attributed to channel sensing, which can be reduced to increase throughput at the expense of higher
interference level to PUs. Hence, there is a tradeoff between the delay and throughput performances.
In [30], the hardware and software processing delays of different processes are investigated
on a testbed comprised of two USRP/GNU radio nodes embedded with separate processing units
(i.e., personal computers). The nodes are connected to each other via Ethernet. Examples of the USRP
processes are the operating system processes in the kernel, and the decimation filtering in FPGA; and
an example of the GNU radio process is the modulation process. During measurement, a 1 μs guard
time is included between the processes. A node transmits a ping packet to another node. The packet
moves through the transmit and receive paths, and the timestamps for different processes in the
USRP/GNU radio node are recorded. Measurement shows that the hardware and software processing
delays are highest for processes running in the Kernel. This indicates that the USRP/GNU radio
platform has low efficiency providing low network performance, particularly high end-to-end delay.
In this paper, the testbed is comprised of five USRP/GNU radio nodes embedded with separate
processing units. Investigation is conducted on multihop transmissions in the network layer.
196
Sensors 2020, 20, 18
sensing and selection, route discovery and selection, and handshaking (e.g., request, acknowledgement,
and response messages). Therefore, the response delay of a D2D type of communication in a real testbed
is a cause of concern because of the sensitivity of wireless communication and the delay incurred
due to the distance between a node pair. The response delay is important in D2D communication
because if it may not fulfill the delay requirement (or higher than a threshold), MC BS must be used.
This paper focuses on the response delay, which is end-to-end in nature, between a source node from
first transmitted packet up to last received one.
In this paper, each BS or node is embedded with a separate processing unit, particularly RP3
as the core processing unit, to provide a more realistic wireless testbed, and so a single traditional
processing unit is not needed.
197
Sensors 2020, 20, 18
In [40], a single register transfer level (RTL) dongle embedded with a Raspberry Pi transmits
and receives in the frequency bands 24–1850 MHz. The general-purpose input/output (GPIO) pins
of the Raspberry Pi is used to generate and transmit pulse width modulation (PWM). The energy
consumption of the RTL dongle embedded with Raspberry Pi has shown to be less than 3 watts, and
so the dongle and Raspberry Pi can be powered by portable batteries. In addition, the use of Raspberry
Pi has shown to enable the detection of a wide range of frequency bands while incurring low energy
consumption.
In [41], a single USRP/GNU radio node connected to a personal computer, which serves as the
transmitter, broadcasts signals to a RTL dongle embedded with a Raspberry Pi, which serves as the
receiver. The testbed consists of a low-cost radio community that transmit at two frequency bands,
namely 915 MHz (or the ISM band) and 40.68 MHz (or the FM radio frequency band). The testbed has
demonstrated the capability of Raspberry Pi for transmitting and receiving signals in these frequency
bands, and the quality of reception depends on the transmission power and the height of the antenna
of the transmitter.
In [42], a testbed consists of two USRP/GNU radio nodes: (a) a static node, which is connected
to a personal computer, serves as the ground BS; and (b) a dynamic node, which is embedded with
Raspberry Pi3, is installed on an unmanned aerial vehicle (or a drone). The ground BS receives location
information from the drones so that it can monitor the location of the drone. The ground BS and
drone exchange messages in the frequency bands 400–4400 MHz. The testbed has demonstrated the
capability of Raspberry Pi3 for setting up communication and processing information with lower
energy consumption.
In [43], a testbed consists of three main USRP/GNU radio nodes: (a) a SU source node, which is
connected to a personal computer; (b) a SU intermediate node, which is embedded with Raspberry Pi3,
that performs energy-based channel sensing; and (c) a SU destination node, which is embedded with
Raspberry Pi3. The rest of the nodes are PUs. The SU source node transmits data packets to the SU
destination node in multiple hops without interfering with the random PUs’ activities. The channel
sensing delay incurred by the SU intermediate node embedded with Raspberry Pi3 has shown to be
twice of that incurred by the SU source node connected to a personal computer.
In this paper, our testbed consists of five USRP/GNU radio nodes embedded with Raspberry Pi3
B+ (RP3) that constitutes a source node and four intermediate nodes. In addition, a personal computer
serves as the destination node. The USRP/GNU radio performs communication, and the RP3 performs
processes. While existing works in the literature [20,38–43], focus on the capability and compatibility
of USRP/GNU radio and RP3, this paper focuses on end-to-end hardware and software processing
delays between a source node and a destination node, and the use of the delay measurement for route
selection (i.e., either via D2D or MC BS).
198
Sensors 2020, 20, 18
C = c1 , c2 , ..., c|C| . Each route k k = ∪ ln ∈ L consists of a set of links from a femtocell source node
to a femtocell destination node. a femtocell source node f cs sends packets to a femtocell destination
node f cd along a primary route k k = ( f cs , f c1 , f c2 , f c3 , f c4 , f cd ), which is D2D and multihop in nature.
In a testbed with a single traditional processing unit, the femtocell nodes f cs , f c1 , f c2 , f c3 , f c4 , f cd are
connected to a MC BS, which serves as the centralized processor, via a switch as shown in Figure 4a
(see Section 5.3.1 for more descriptions). On the other hand, in a testbed with separate processing
units, each femtocell node is embedded with a separate processing unit, namely RP3, as shown in
Figure 4b (see Section 5.3.2 for more descriptions). In this paper, a primary route has up to five hops.
The primary route uses cognitive channels (or white spaces in licensed channels), and the secondary
route uses cellular channels (or the licensed channels). The use of primary routes helps to reduce the
congestion level of MC BS [4]. However, when the primary route becomes unavailable or broken,
then a secondary route k k = ( f cs , mc1 , f cd ), which passes through the macrocell BS mc1 . The route
selection between primary and secondary routes is shown in the form of a flowchart in Figure 5 and
an algorithm in Algorithm 1.
Algorithm 1 Route selection between the primary route (via D2D) and the secondary route (via MC BS)
1: procedure R OUTE SELECTION
2: for k1 = ( f cs , f c1 , f c2 , f c3 , f c4 , f cd ) and k2 = ( f cs , mc1 , f cd ) do
3: if route k1 is available then
4: f cs send packet to f c1
5: if f c1 is not available then
6: packet goes through mc1 (secondary route) to f cd
7: end if
8: if f c2 is available then
9: check the second condition:
10: if t f c1 to f c2 is ≤ α then
11: f c1 send packet to f c2
12: end if
13: end if
14: if f c2 is not available then
15: packet goes through mc1 to f cd
16: end if
17: if f c3 is available then
18: check the second condition:
19: if t f c2 to f c3 is ≤ α then
20: f c2 send packet to f c3
21: end if
22: end if
23: if f c3 is not available then
24: packet goes through mc1 to f cd
25: end if
26: if f c4 is available then
27: check the second condition:
28: if t f c3 to f c4 is ≤ α then
29: f c3 send the packet to f c4
30: f c4 send the packet to destination f cd
31: else packet goes through mc1 to f cd
32: end if
33: end if
34: end if
35: end for
36: end procedure
The end-to-end delay tkk of a primary route k k increases with the number of hops [44], and it must
be less than a threshold tkk < α, where α = 10 ms is imposed by the IEEE 802.15.4 standard [14,45].
The secondary route is selected if the threshold is not fulfilled. The threshold α is imposed due to
199
Sensors 2020, 20, 18
the need to reduce end-to-end delay in order to support and deploy real-time applications, including
applications integrated with sensors such as driverless vehicles, in 5G. Long software and hardware
processing delays can increase the queue size of base stations and nodes, and so they affect network
performance, such as reducing packet delivery ratio [46,47].
In this paper, route selection is made by a central controller, and so the underlying routes, as well
as the channels of the links in the routes, are readily available. There is a single MC BS that selects
a route, and informs FC BSs and nodes about the route; subsequently, the FC BSs and nodes setup
the route accordingly. Further extension to the testbed, such as increasing the number of MC BSs,
is suggested in Section 7. The investigation takes into account the effects of the characteristics of 5G,
including heterogeneity that involves nodes with different features and characteristics (i.e., different
transmission power, frequency range, and strength of operating system).
200
Sensors 2020, 20, 18
signal to travel from one USRP/GNU radio node to another over a link ln ; however, it is negligible
compared to software and hardware processing delays [27].
The D2D link or per-hop delay tln for link ln ∈ L is as follows:
Figure 6. D2D link delay for a single-hop transmission over a link ln . The processing unit can be either
a personal computer or a RP3.
tkk = ∑ t ln (2)
ln ∈ k k
5. Experimental Setup
This experiment investigates the link (or per hop) and end-to-end delays of a route via D2D
communication among heterogeneous BSs and nodes (i.e., MC and FCs) (see Section 4 for more details).
201
Sensors 2020, 20, 18
Figure 7. An experimental setup for a D2D route with five hops using RP3 in the RPU testbed, which
is equivalent to Figure 4b.
202
Sensors 2020, 20, 18
tkk = (tlPC
1
+ tlGNU
1
+ tlh1 ) + (tlGNU
2
+ tlh2 ) + ... + (tlGNU
n
+ tlhn ) (3)
where tlPC
∗
is the single processing unit delay, tlGNU
∗
is the GNU radio processing delay, and tlh∗ is the
hardware processing delay (see Figure 6). The software processing delay is tsln =l = tlPC + tlGNU for the
1 1 1
first hop and tsln =l = tlGNU
∗
for the subsequent hops. The tlGNU
∗
includes the response time incurred for
1
a node of a route to request for next-hop node information (e.g., the next-hop node IP address and
operating channel) from the personal computer.
Figure 8. The end-to-end delay of a route in the two testbeds. The delays are shown in same sized
blocks although the time period of each block may be different.
203
Sensors 2020, 20, 18
850 MHz and transmits in 860 MHz; f c2 receives in 860 MHz and transmits in 870 MHz; f c3 receives
in 870 MHz and transmits in 880 MHz; f c4 receives in 880 MHz and transmits in 890 MHz to the
destination node f cd .
The BSs and nodes exchange control and data messages among themselves via wireless
transmission. Each node incurs three types of delays: (a) the software processing delay incurred
in RP3; (b) the software processing delay incurred in GNU radio; and (c) the hardware processing delay
incurred in USRP and the propagation delay. In contrast to the testbed with a PCU (see Section 5.3.1),
the intermediate nodes incur the software processing delay in the RP3. Unlike PCU, in RPU, every
single node (either source, intermediate, or destination node) receives decision on the next-hop node
and the transmission channel, which incurs tlRP3
n
(see Figure 8), from the personal computer. The node
can also receive such information from the personal computer. Since RP3 has limited processing
capability, the software processing delay for the software processes is non-negligible at each node in
RPU, causing longer end-to-end delay compared to that in PCU. Based on Equation (2), the end-to-end
delay of a route k k ∈ K is as follows:
tkk = ∑(tlRP3
n
+ tlGNU
n
+ tlhn ) (4)
204
Sensors 2020, 20, 18
6. Experimental Results
This section compares the PCU and RPU performance measures in Section 6.1, and the packet
delivery via primary route (i.e., via D2D) and secondary route (i.e., via MC BS) in Section 6.2.
205
Sensors 2020, 20, 18
Figure 10. End-to-end delay and packet delivery ratio for PCU and RPU. (a) Comparison of software
and hardware processing delays between PCU and RPU. (b) Comparison of packet delivery ratio
between PCU and RPU.
Figure 11. Comparison of software and hardware processing delays between Case I and Case
II. In Case I, a two-hop communication is performed via MC BS in PCU. In Case II, a two-hop
communication is performed via D2D in RPU.
206
Sensors 2020, 20, 18
This section investigates the end-to-end delay of a primary route when nodes are embedded with
RP3, and compares it with that of a secondary route, in which only source and destination nodes
are embedded with RP3, and the BS is implemented using a personal computer. In Figure 12, a RP3
source node f cs can communicate with a RP3 destination node f cd via either: (a) Case I which is a
direct communication with MC BS MC1 (i.e., a personal computer), specifically f cs − MC1 − f cd in
PCU; or (b) Case II which is a two-hop route using D2D communication, specifically f cs − f c1 − f cd in
RPU, whereby f c1 is an intermediate node embedded with RP3. The total delay of Cases I and II are
0.039736 s and 0.08666 s, respectively, and so the total delay of Case II is more than twice higher than
that in Case I. In RPU, the total software and hardware processing delay of a D2D communication from
the source node up to the intermediate node is 0.03384s; while in PCU, the total software and hardware
processing delay from the source node up to the MC BS is 0.01655 s. In RPU, the total software
and hardware processing delay from the intermediate node f c1 to the destination node is 0.05282 s;
while in PCU, the total software and hardware processing delay from the MC BS to the destination is
0.02318 s. Hence, Case I has a lower total delay as compared to Case II due to its greater processing
capability. Figure 11 shows the total delay, which includes software and hardware processing delays,
of a direct communication with MC BS and a multihop D2D route. Figure 13 shows the packet delivery
ratio via D2D and MC BS. A source node transmits a packet towards a destination node, the packet
goes through intermediate node as the destination node is beyond the transmission range of the
transmitter. For this packet transmission, the intermediate node is first selected (i.e., Case I), and then
the MC BS is selected (i.e., Case II). From the source node to the intermediate node in Figure 13, the MC
BS has a 99.65% packet delivery ratio, while the node with RP3 has 97.32%. From the intermediate
node to the destination node, MC BS delivers 99.59% of the packets, while the node with RP3 delivers
96.63% of the packets. Therefore, in Figure 13 the total packet delivery ratio from a source node to a
destination node via MC BS is 99.24%. However, the packet delivery ratio from the source node to the
destination node via RP3 is 93.95%, which is about 7% lesser.
207
Sensors 2020, 20, 18
Figure 13. Comparison of the two-hop packet delivery via D2D and MC BS.
In Figure 14, a throughput comparison is made between PCU and RPU. Higher throughput refers
indicates a higher successful packets transmission rate [26]. Throughput reduces as the number of
hops increases for both PCU and RPU; however, PCU achieves a higher throughput compared to RPU
because of higher packet delivery ratio (see Figure 10b).
208
Sensors 2020, 20, 18
While PCU is a widely used testbed in the literature, nodes are constrained to be located at close
proximity to the centralized processing unit. Meanwhile, RPU has a closer resemblance to a real
deployed network, and it has not been investigated in the literature, and so it is the focus of this paper.
Our experimental results showed that: (a) the end-to-end delay is lower in PCU as control messages
are exchanged via a switch using gigabit Ethernet; and (b) the per-hop and end-to-end delays increase
with the number of hops in RPU. However, in RPU, device-to-device communication between nodes
from a source node to a destination node can offload traffic from BS, which is one of the promising
features of 5G. Therefore, this paper presents a case study in which the intermediate node of a two-hop
route can be: (a) a node (via D2D); or (b) a macrocell BS. While the preceding case can reduce the traffic
amount at a macrocell BS, it can increase end-to-end delay and reduce packet delivery ratio compared
to the latter case due to its lower processing capability.
As for future work, we aim to relax the assumptions made in this article to enable a macrocell
base station (MC BS) to receive updates from femtocell base stations and nodes. Examples of such
updates are the packet delivery ratio and per-hop delay, which allows MC BS to make decision on
route selection based on the updates under unpredictable and dynamic operating environment.
Author Contributions: M.K.C. designed and implemented testbed. K.-L.A.Y. contributed to system model and
literature review. R.M.D.N. and R.W. contributed to paper review and formatting. All authors have read and
agreed to the published version of the manuscript.
Funding: This work was part of the project entitled “A Novel Clustering Algorithm based on Reinforcement
Learning for the Optimization of Global and Local Network Performances in Mobile Networks” funded by the
Malaysian Ministry of Education under Fundamental Research Grant Scheme FRGS/1/2019/ICT03/SYUC/01/1,
as well as the Partnership Grant CR-UM-SST-DCIS-2018-01 and RK004-2017 between Sunway University and
University of Malaya.
Conflicts of Interest: The author declares no conflict of interest.
Abbreviations
The following abbreviations are used in this manuscript:
209
Sensors 2020, 20, 18
References
1. Ashraf, M.I.; Tamoor-Ul-Hassan, S.; Mumtaz, S.; Tsang, K.F.; Rodriquez, J. Device-to-device assisted mobile
cloud framework for 5G networks. In Proceedings of the IEEE International Conference on Industrial
Informatics (INDIN), Emden, Germany, 24–26 July 2017; pp. 1020–1023. [CrossRef]
2. Raschellà, A.; Umbert, A. Implementation of Cognitive Radio Networks to evaluate spectrum management
strategies in real-time. Comput. Commun. 2016, 79, 37–52. [CrossRef]
3. Okasaka, S.; Weiler, R.J.; Keusgen, W.; Pudeyev, A.; Maltsev, A.; Karls, I.; Sakaguchi, K. Proof-of-concept
of a millimeter-wave integrated heterogeneous network for 5G cellular. Sensors 2016, 16, 1362. [CrossRef]
[PubMed]
4. Asadi, A.; Member, S.; Wang, Q.; Member, S.; Mancuso, V. A Survey on Device-to-Device Communication in
Cellular Networks. IEEE Commun. Surv. Tutor. 2014, 16, 1801–1819. [CrossRef]
5. Aly, A.A.; ELAttar, H.M.; ElBadawy, H.; Abbas, W. Aggregated Throughput Prediction for Collated Massive
Machine-Type Communications in 5G Wireless Networks. Sensors 2019, 19, 3651. [CrossRef]
6. Chang, B.; Zhao, G.; Imran, M.A.; Chen, Z.; Li, L. Dynamic Wireless QoS Analysis for Real-Time Control in
URLLC. In Proceedings of the 2018 IEEE Globecom Workshops, GC Wkshps 2018—Proceedings, Abu Dhabi,
UAE, 9–13 December 2018; pp. 1–5. [CrossRef]
7. Zhang, H.; Liao, Y.; Song, L. D2D-U: Device-to-Device Communications in Unlicensed Bands for 5G System.
IEEE Trans. Wirel. Commun. 2017, 16, 3507–3519. Available online: http://xxx.lanl.gov/abs/1610.04982
(accessed on 1 August 2019). [CrossRef]
8. Yau, K.l.A.; Qadir, J.; Wu, C.; Imran, M.A.L.I.; Ling, M.E.E.H. Cognition-inspired 5G cellular networks:
A review and the road ahead. IEEE Access 2018, 6, 35072–35090. [CrossRef]
9. Ge, X.; Tu, S.; Mao, G.; Wang, C.X.; Han, T. 5G Ultra-Dense Cellular Networks. IEEE Wirel. Commun. 2016,
23, 72–79. Available online: http://xxx.lanl.gov/abs/1512.03143 (accessed on 22 December 2018). [CrossRef]
10. Agiwal, M.; Roy, A.; Saxena, N. Next generation 5G wireless networks: A comprehensive survey.
IEEE Commun. Surv. Tutor. 2016, 18, 1617–1655. [CrossRef]
11. Kim, J.; Molisch, A.F. Quality-aware millimeter-wave device-to-device multi-hop routing for 5G cellular
networks. In Proceedings of the 2014 IEEE International Conference on Communications, ICC 2014, Sydney,
Australia, 10–14 June 2014; pp. 5251–5256. [CrossRef]
12. He, J.; Song, W. Evolving to 5G: A Fast and Near-optimal Request Routing Protocol for Mobile Core
Networks. IEEE Wirel. Netw. 2014, 4586–4591. [CrossRef]
13. Tran, T.X.; Hajisami, A.; Pompili, D. ULTRA-DENSE HETEROGENEOUS SMALL CELL DEPLOYMENT
IN 5G AND BEYOND Cooperative Hierarchical Caching in 5G Cloud Radio Access Networks. IEEE Netw.
2017, 31, 35–41. [CrossRef]
14. Chávez-Santiago, R.; Szydełko, M.; Kliks, A.; Foukalas, F.; Haddad, Y.; Nolan, K.E.; Kelly, M.Y.; Masonta,
M.T.; Balasingham, I. 5G: The Convergence of Wireless Communications. Wirel. Pers. Commun. 2015,
83, 1617–1642. [CrossRef] [PubMed]
15. Mahmood, A.M.; Al-yasiri, A.; Alani, O.Y. Cognitive Neural Network Delay Predictor for High Speed
Mobility in 5G C-RAN Cellular Networks. In Proceedings of the 2018 IEEE 5G World Forum (5GWF), Silicon
Valley, CA, USA, 9–11 July 2018; pp. 93–98. [CrossRef]
16. Abd, S.A.; Manjunath, S.; Abdulhayan, S. Direct Device-to-Device Communication in 5G Networks.
In Proceedings of the 2016 International Conference on Computation System and Information Technology
for Sustainable Solutions (CSITSS), Bangalore, India, 6–8 October 2016; pp. 216–219. [CrossRef]
17. Wassie, D.A.; Berardinelli, G.; Tavares, F.M.L. Experimental Verification of Interference Mitigation techniques
for 5G Small Cells. In Proceedings of the 2015 IEEE 81st Vehicular Technology Conference (VTC Spring),
Glasgow, UK, 11–14 May 2015; pp. 1–5. [CrossRef]
210
Sensors 2020, 20, 18
18. Quaresma, J.; Ribeiro, C.; Gameiro, A.; Zelenak, M.; Duplicy, J. Distributed RF sensing framework with
radio environment emulation. In Proceedings of the 2013 IEEE 14th International Symposium on a World
of Wireless, Mobile and Multimedia Networks, WoWMoM 2013, Madrid, Spain, 4–7 June 2013; pp. 1–6.
[CrossRef]
19. Jain, A.; Sharma, V.; Amrutur, B. Soft real time implementation of a Cognitive Radio testbed for frequency
hopping primary satisfying QoS requirements. In Proceedings of the 2014 20th National Conference on
Communications, NCC 2014, Kanpur, Uttar Pradesh, India, 28 February–2 March 2014; pp. 1–6. [CrossRef]
20. Barrak, S.E.; Lyhyaoui, A.; Puliafito, A.; Serrano, S. Implementation of a low cost SDR-based Spectrum
Sensing Prototype using USRP and Raspberry Pi board. Int. Conf. Autom. Control Eng. Comput. Sci. (ACECS)
2017, 20, 54–58.
21. Briand, A.; Albert, B.B.; Gurjao, E.C. Complete software defined RFID system using GNU radio.
In Proceedings of the 2012 IEEE International Conference on RFID-Technologies and Applications, RFID-TA
2012, Nice, France, 5–7 November 2012; pp. 287–291. [CrossRef]
22. Öhlén, P.; Skubic, B.; Rostami, A.; Ghebretensaé, Z.; Mårtensson, J.; Fiorani, M.; Monti, P.; Wosinska, L. Data
Plane and Control Architectures for 5G Transport Networks. J. Light. Technol. 2016, 34, 1501–1508. [CrossRef]
23. Maksymyuk, T.; Gazda, J.; Yaremko, O.; Nevinskiy, D. Deep Learning Based Massive MIMO Beamforming
for 5G Mobile Network. In Proceedings of the 2018 IEEE 4th International Symposium on Wireless Systems
within the International Conferences on Intelligent Data Acquisition and Advanced Computing Systems
(IDAACS-SWS), Lviv, Ukraine, 20–21 September 2018; pp. 241–244. [CrossRef]
24. Ettus, M.; Braun, M. The universal software radio peripheral (usrp) family of low-cost sdrs. In Opportunistic
Spectrum Sharing and White Space Access: The Practical Reality; Wiley Telecom: Hoboken, NJ, USA, 2015;
pp. 3–23.
25. Ali, S.A.; Umrani, F.A.; Umrani, N.A. Performance Evaluation Of Decode and Forward Cooperative
Communication Protocol. Int. J. Inf. Technol. Electr. Eng. 2012, 1, 321–325.
26. Syed, A.; Yau, K.L.; Qadir, J.; Mohamad, H.; Ramli, N.; Keoh, S. Route selection for multi-hop cognitive radio
networks using reinforcement learning: An experimental study. IEEE Access 2016, 4, 6304–6324. [CrossRef]
27. Truong, N.B.; Suh, Y.J.; Yu, C. Latency analysis in GNU radio/USRP-based software radio platforms.
In Proceedings of the IEEE Military Communications Conference MILCOM, San Diego, CA, USA,
18–20 November 2013; pp. 305–310. [CrossRef]
28. Van den Bergh, B.; Vermeulen, T.; Verhelst, M.; Pollin, S. CLAWS: Cross-Layer Adaptable Wireless System
enabling full cross-layer experimentation on real-time software-defined 802.15. 4. EURASIP J. Wirel.
Commun. Netw. 2014, 1–13. [CrossRef]
29. Khandakar, A.; Mohamed, A.M.S. Understanding probabilistic cognitive relaying communication with
experimental implementation and performance analysis. Sensors 2019, 19, 179. [CrossRef]
30. Nychis, G.; Hottelier, T.; Yang, Z.; Seshan, S.; Steenkiste, P. Enabling MAC Protocol Implementations on
Software-Defined Radios. Netw. Syst. Des. Implement. 2009, 9, 91–105.
31. Chen, W.T.; Chang, K.T.; Ko, C.P. Spectrum monitoring for wireless TV and FM broadcast using
software-defined radio. Multimed. Tools Appl. 2016, 75, 9819–9836. [CrossRef]
32. Byun, S.S. TCP over scarce transmission opportunity in cognitive radio networks. Comput. Netw. 2016,
103, 101–114. [CrossRef]
33. Gameiro, A.; Ribeiro, C.; Quaresma, J. Selective reporting—A half signalling load algorithm for distributed
sensing. Eurasip J. Wirel. Commun. Netw. 2013, 2013, 1–14. [CrossRef]
34. Marko, H.; Korpi, J.; Hiivala, M. Predictive Channel Selection for over-the-Air Video Transmission Using
Software-Defined Radio Platforms. In International Conference on Cognitive Radio Oriented Wireless Networks;
Springer: Cham, Switzerland, 2016; Volume 172, pp. 569–579. [CrossRef]
35. Berardinelli, G.; Buthler, J.L.; Tavares, F.M.L.; Tonelli, O.; Wassie, D.A.; Hakhamaneshi, F.; Sørensen, T.B.;
Mogensen, P. Distributed Synchronization of a testbed network with USRP N200 radio boards.
In Proceedings of the IEEE International Conference on Communications, Pacific Grove, CA, USA,
2–5 November 2014; pp. 563–567. [CrossRef]
36. Nagaraju, P.B.; Ding, L.; Melodia, T.; Batalama, S.N.; Pados, D.A.; Matyjas, J.D. Implementation of a
Distributed Joint Routing and Dynamic Spectrum Allocation Algorithm on USRP2 Radios. In Proceedings
of the IEEE International Conference on Communications, Boston, MA, USA, 21–25 June 2010; pp. 26–27.
[CrossRef]
211
Sensors 2020, 20, 18
37. Chang, B.; Zhao, G.; Chen, Z.; Li, L.; Imran, M.A. Packet-Drop Design in URLLC for Real-Time Wireless
Control Systems. IEEE Access 2019. [CrossRef]
38. Martínez-quintero, J.C.; Estupiñán-cuesta, E.P.; Rodríguez-ortega, V.D. Raspberry PI 3 RF signal generation
system. Visión Electrónica 2019, 13, 2.
39. Zhang, N.; Sun, W.; Lou, W.; Hou, Y.T.; Trappe, W. ROSTER: Radio context attestation in cognitive radio
network. In Proceedings of the 2018 IEEE Conference on Communications and Network Security, CNS 2018,
Beijing, China, 30 May–1 June 2018; pp. 1–9. [CrossRef]
40. Tomar, V.S.; Bhatia, V. Low Cost and Power Software Defined Radio Using Raspberry Pi for Disaster Effected
Regions. Procedia Comput. Sci. 2015, 58, 401–407. [CrossRef]
41. Al-safi, A.; Narasimhan, L.; Bazuin, B. Software Defined Community Radio Using Low Cost Hardware and
Free Software. In Proceedings of the Universal Technology Management Conference (UTMC), Bemidji, MN,
USA, 26–28 May 2016; pp. 51–55.
42. Shi, Y.; Wensowitch, J.; Ward, A.; Badi, M.; Camp, J. Building UAV-Based Testbeds for Autonomous Mobility
and Beamforming Experimentation. In Proceedings of the 2018 IEEE International Conference on Sensing,
Communication and Networking, SECON Workshops 2018, Hong Kong, China, 11–13 June 2018; pp. 1–5.
[CrossRef]
43. Park, H.J.; Lee, G.M.; Shin, S.H.; Roh, B.H.; Oh, J.M. Implementation of Multi-Hop Cognitive Radio Testbed
using Raspberry Pi and USRP. Int. J. Interdiscip. Telecommun. Netw. 2017, 9, 37–48. [CrossRef]
44. Habib, M.A.; Moh, S. Robust Evolutionary-Game-Based Routing for Wireless Multimedia Sensor Networks.
Sensors 2019, 19, 3544. [CrossRef] [PubMed]
45. Shariatmadari, H.; Iraji, S.; Anjum, O.; Riku, J.; Li, Z.; Wijting, C. Delay Analysis of Network Architectures for
Machine-to-Machine Communications in LTE System. In Proceedings of the 21st International Conference
on Telecommunications (ICT)—Workshop on M2M Solutions and Services, Lisbon, Portugal, 4–7 May 2014;
pp. 502–506. [CrossRef]
46. Homaei, M.H.; Salwana, E.; Shamshirband, S. An Enhanced Distributed Data Aggregation Method in the
Internet of Things. Sensors 2019, 19, 3173. [CrossRef]
47. Jin, Z.; Ma, Y.; Su, Y.; Li, S.; Fu, X. A Q-learning-based delay-aware routing algorithm to extend the lifetime
of underwater sensor networks. Sensors 2017, 17, 1660. [CrossRef]
48. Zhang, W.; Wang, C.X.; Ge, X.; Chen, Y. Enhanced 5G Cognitive Radio Networks Based on Spectrum Sharing
and Spectrum Aggregation. IEEE Trans. Commun. 2018, PP, 492–496. [CrossRef]
49. Orebaugh, A.; Ramirez, G.; Beale, J. Wireshark & Ethereal Network Protocol Analyzer Toolkit; Elsevier:
Amsterdam, The Netherlands, 2006.
c 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access
article distributed under the terms and conditions of the Creative Commons Attribution
(CC BY) license (http://creativecommons.org/licenses/by/4.0/).
212
MDPI
St. Alban-Anlage 66
4052 Basel
Switzerland
Tel. +41 61 683 77 34
Fax +41 61 302 89 18
www.mdpi.com