Priority-Based Random Access control mechanism for M2M communications

Lu Guan, Bo Yan, Zhiyong Guo, Yejiang Gong

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)

Abstract

When incorporating machine-to-machine (M2M) communications into the Long Term Evolution (LTE) networks, one of the difficult challenges is the Radio Access Network (RAN) overload for massive access attempts. Besides, M2M communications devices can support a broad range of applications with different access requirements. So when dealing with access overload problem, User Equipment (UE) priority should be taken into account. In this paper, we propose a Priority-Based Random Access (PBRA) control mechanism for M2M traffics in LTE. The mechanism can provide priority-based services for different classes of UE by employing preamble split technology and priority-based backoff method. Furthermore, the Access Class Barring (ACB) method is also used to avoid serious RAN overload. The performances obtained by simulations show that the access success probability is high and the mechanism yields satisfactory access delays for all priorities.

Original languageEnglish
Title of host publication2016 2nd IEEE International Conference on Computer and Communications, ICCC 2016 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages2313-2317
Number of pages5
ISBN (Electronic)9781467390262
DOIs
Publication statusPublished - 10 May 2017
Externally publishedYes
Event2nd IEEE International Conference on Computer and Communications, ICCC 2016 - Chengdu, China
Duration: 14 Oct 201617 Oct 2016

Publication series

Name2016 2nd IEEE International Conference on Computer and Communications, ICCC 2016 - Proceedings

Conference

Conference2nd IEEE International Conference on Computer and Communications, ICCC 2016
Country/TerritoryChina
CityChengdu
Period14/10/1617/10/16

Keywords

  • LTE
  • Network overload
  • Priority-based
  • Random access

Fingerprint

Dive into the research topics of 'Priority-Based Random Access control mechanism for M2M communications'. Together they form a unique fingerprint.

Cite this