Sensors: On The Evaluation of The Nb-Iot Random Access Procedure in Monitoring Infrastructures
Sensors: On The Evaluation of The Nb-Iot Random Access Procedure in Monitoring Infrastructures
Article
On the Evaluation of the NB-IoT Random Access
Procedure in Monitoring Infrastructures
Sergio Martiradonna 1,2 , Giuseppe Piro 1,2, * and Gennaro Boggia 1,2, *
1 Department of Electrical and Information Engineering—Politecnico di Bari, 70126 Bari, Italy
2 CNIT—Consorzio Nazionale Interuniversitario per le Telecomunicazioni, 43124 Parma, Italy
* Correspondence: [email protected] (G.P.); [email protected] (G.B.)
Received: 31 May 2019; Accepted: 21 July 2019; Published: 23 July 2019
Keywords: monitoring system; sensor network; NB-IoT; random access channel; simulation tool;
analytical model
1. Introduction
The Internet of Things (IoT) phenomenon is broadening at an astoundingly fast rate [1],
which promoted the birth of several novel services in different application domains, including,
but not limited to, Industry 4.0 [2], Smart Cities [3], Intelligent Transportation Systems [4], Precision
Agriculture [5], healthcare [6] and environmental monitoring [7]. Hence, an increasing number of
constrained smart devices are currently joining the worldwide Internet, asking for suitable wireless
communication technology, capable of offering both extremely low power consumption and support
for densely populated deployments. In general, these low-powered devices individually require low
data transfer rates as well, even though a densely populated Machine Type Communication (MTC)
deployment might become incredibly bandwidth-hungry. At the same time, devices generally require
extremely low power, remaining idle for prolonged periods. Furthermore, reasonably numerous IoT
applications involve the reporting of various events and data streaming to a central server in an efficient
and robust way (e.g., video surveillance and emergency health services). Besides, either the physical
location of devices in such scenarios may not be reached by fixed networks (e.g., basements) or the
apparatuses have to be arbitrarily deployed or moved anywhere [8]. Low Power Wide Area networks
(LPWANs) are an innovative communication pattern addressing the aforementioned requirements of
emerging IoT applications [9]. Essentially, they complement legacy cellular and short-range wireless
technologies, offering exclusive features for low complexity devices. At the time of this writing, there
are a number of LPWANs, each employing different techniques to meet the Machine-to-Machine (M2M)
requirements. In the unlicensed spectrums, LoRa [10] and SigFox [11] are the most common. However,
the licensed spectrum is widely known to supply a higher degree of reliability and Quality of Service.
Among the licensed LPWANs, NarrowBand IoT (NB-IoT) has been recognized as a promising and
effective technology offering wireless connectivity to smart devices. Standardized by the Third
Generation Partnership Project (3GPP) starting from Release 13 [12,13], it natively supports the
transmission of marginal amounts of data, while requiring low-energy consumption and limited
bandwidth usage [14]. Moreover, the adoption of NB-IoT is able to satisfy most of the requirements of
all the possible application scenarios, by dynamically adapting to different use cases. Therefore, the
application based on the potentially enormous amount and variety of data generated by monitoring
sensors is of particular interest. Such monitoring systems provide new services to citizens, companies,
and public administrations as well.
In a typical NB-IoT monitoring system, uplink transmissions prevail among the rest of exchanged
messages. Here, the random access procedure is the primary relation established between devices and
the base station. Built on top of a contention-based mechanism, it brings to performance degradation
when a multitude of simultaneous transmissions takes place [15]. In fact, in high traffic conditions,
only few devices can successfully complete the procedure. Consequently, analytical models and
system-level simulation tools able to investigate the behavior of the aforementioned random access
procedure are extremely important for driving current research activities related to the adoption of the
NB-IoT technology in smart monitoring infrastructures.
Nevertheless, at the time of this writing, scientific literature only provides splintered answers
to these challenging open issues. For instance, analytical models for estimating the random access
success probability are presented in [16–22], but they either do not fit the 3GPP guidelines or overlook
several aspects (see Section 2.4 for further details). In addition, to make matters worse, available
simulation tools do not completely support the random access procedure evaluation [23,24] and the
NB-IoT open-source simulation presented in [25] does not offer a satisfactory implementation of the
procedure itself.
Based on these premises, this contribution provides a significant step forward in the current state
of the art, by overcoming the evident limitations characterizing the scientific literature and presenting
key instruments for the evaluation of the NB-IoT random access procedure. For the first time, to the
best of the authors’ knowledge, the NB-IoT random access procedure is jointly investigated through
analytical models and system-level simulations, paving the way for future standard improvements.
Specifically, the contribution of this paper is three-fold.
1. Starting from the platform presented in [25], it puts forward an open-source and 3GPP-compliant
implementation of the NB-IoT random access procedure, which handles different coverage classes,
global and local transmission attempts counters, backoff times, and transitions from a class to
another, as well as other key simulations.
2. It formulates an analytical model describing both collision and success probabilities, given the
number of users willing to perform the random access procedure.
3. It deeply cross-validates the analytical model and the simulation tool, by considering realistic
NB-IoT deployments enabling periodic reporting in monitoring infrastructures, with different
resource configurations.
The rest of this work is organized as follows. Section 2 illustrates the NB-IoT technology,
describing in details the Random Access Procedure, and the currently available analytical models
and network simulators, as well as several real NB-IoT monitoring systems. Section 3 presents the
implemented simulation tool and the conceived analytical model. Section 4 discusses the results
Sensors 2019, 19, 3237 3 of 25
obtained through the cross-validation process. Section 5 concludes the paper and draws future
research activities.
• Stand-Alone operation: An operator can replace one GSM carrier of 200 kHz with NB-IoT,
leaving a guard interval of 10 kHz on both sides of the spectrum.
• In-Band operation: One or more NB-IoT carriers are deployed inside a larger LTE channel.
• Guard-Band operation: One or more carriers are allocated within the guard-band of LTE
bandwidth to NB-IoT.
All three deployment scenarios are transparent to non-NB-IoT devices. Consequently, LTE devices
that do not implement NB-IoT functionality simply do not see the NB-IoT channel inside the main LTE
bandwidth or in the guard band. At the same time, legacy GSM devices will not see an NB-IoT carrier
if used alongside 180 kHz GSM carriers. Such devices will only see noise where NB-IoT is active [26].
At the physical layer, NB-IoT fully inherits from LTE in the downlink. The transmission scheme is
based on conventional Orthogonal Frequency Division Multiplexing (OFDM) using normal Cyclic
Prefix (CP). An end user operates in the downlink using seven consecutive symbols on 12 subcarriers
(also referred to as tones) grouped into a Resource Block (RB), with a subcarrier spacing of 15 kHz [13].
The duration of a slot, subframe, and frame is analogous to LTE, as well. Therefore, in a single NB-IoT
carrier, there is only one RB and only one user can receive data at a time using all 12 subcarriers for
each subframe. As regards modulation, only Quadrature Phase-Shift Keying (QPSK) is supported.
Instead, the uplink supports not only the standard LTE subcarrier spacing of 15 kHz but also
a subcarrier spacing of 3.75 kHz. The elementary NB-IoT radio resource, termed Resource Unit (RU),
is the smallest unit to map a transport block [27]. It is assigned to a single user only. Unlike the
well-known resource block of LTE, an RU is dynamically defined as shown in Table 1 [28].
Specifically, the uplink supports two different configurations: Single-Tone and Multi-Tone.
Single-Tone uses either 3.75 or 15 kHz subcarrier spacing and each subcarrier represents an RU.
Consequently, a 180 kHz carrier is divided into either 48 or 12 RUs, respectively, thus resulting
in two different RU length values: 32 and 8 ms. In the case of Multi-Tone configuration, the subcarrier
spacing is set to 15 kHz only. Nevertheless, 3, 6 or 12 adjacent subcarriers may shape a single RU.
Again, depending on the number of tones per RU, its length changes accordingly (as illustrated in
Table 1).
The modulation schemes available in the uplink are restricted to Binary Phase-Shift Keying (BPSK)
and QPSK.
Sensors 2019, 19, 3237 4 of 25
One of the main objectives defined in NB-IoT study item description [29] is to achieve 20 dB
coverage extension compared with legacy General Packet Radio Service (GPRS) while limiting the
device maximum transmit power to 23 dBm (200 mW), which is a factor of ten lower than the
maximum output power of GPRS devices. Coverage extension is achieved by increasing the number
of repetitions at the expense of higher data rates. Moreover, NB-IoT supports up to three coverage
classes, namely Normal, Extended, and Extreme, to serve devices experiencing different ranges of path
loss. The Extreme class corresponds to incredibly low received power levels. The Normal class refers
to considerably higher received power levels. Specifically, the end device is considered in a specific
enhanced coverage level if its measured Reference Signal Received Power (RSRP) is less than the RSRP
threshold configured for that enhanced coverage class. According to the 3GPP specification [30],
the number of coverage classes is configurable by system information. Let n be the number of available
coverage classes so that 1 ≤ n ≤ 3. Different coverage classes correspond to operation with different
modulation orders, coding rates, repetition factors, and subcarrier spacings, in order to match the
data rate for each user to its available link budget. This allows devices having good coverage to
operate at higher data rates and with lower latency than devices that have poor coverage. Therefore,
the system is designed to meet the throughput and latency requirements for devices in Extreme
coverage, while devices in Normal or Extended coverage achieve improved performance.
NB-IoT generally takes advantage of the existing LTE physical channels, revised properly to fit
into the narrower bandwidth [31]. In the downlink direction, there are three channels:
On the other hand, for the uplink direction, there are two different channels, specifically:
• Narrowband Physical Uplink Shared Channel (NPUSCH) has two formats. Format 1 is used for
carrying uplink data and uses the same LTE error correction code. Format 2 is used for signaling
HARQ acknowledgment for NPDSCH and uses a repetition code for error correction.
• Narrowband Physical Random Access Channel (NPRACH) enables the random access procedure.
Thus, it is described in details in the following section.
Figure 1 shows a representative time–frequency structure of NB-IoT uplink channels when the
subcarrier spacing of the NPUSCH is set to 15 kHz.
Sensors 2019, 19, 3237 5 of 25
NPRACH
NPUSCH 1 tone - 8 ms
NPUSCH 3 tones - 4 ms
180 kHz
NPUSCH
12 tones
1 ms
NPUSCH
6 tones
2 ms
3.75 kHz
CP OFDM symbol
Frequency Hopping
Preamble 1
t
starting time periodicity
In contrast, LTE PRACH structure is defined by predefined configuration indexes, which are
broadcasted by System Information as well. In the time domain, the LTE PRACH occupies one, two or
three subframes (i.e., 1, 2 or 3 ms, respectively) and it is periodically scheduled by the base station,
while in the frequency domain it needs exactly six LTE RBs. The PRACH always consists of a set
of 64 orthogonal sequences. Typically, the PRACH is scheduled every 5 ms and 54 preambles are
dedicated to the contention-based access, while the other 10 are reserved for contention-free access.
On the other hand, NB-IoT random access procedure is per se contention based [30] and entails
the exchange of four messages, as depicted in Figure 4:
1. The device finds the first available RAO and then transmits a random preamble, chosen among
the available ones. Let s be the number of the available subcarriers. Then, the end device starts
the RAR window, W.
2. Upon preamble reception, the base station transmits an RAR that explicitly instructs the user
on which uplink resources have to be utilized for the transmission of the next message. If this
message is not received, the user keeps waiting for it until the expiration of W.
3. Exploiting the scheduled resources, the user transmits its identity and other important information;
this message is also known as Msg3. Subsequently, the terminal starts the Contention Resolution Timer.
4. The base station performs the contention resolution and sends back to the devices the identity of
the winning users through the Contention Resolution Message. If this message is not received,
users keep waiting for it up to the Contention Resolution Timer expiration.
The procedure fails when either the RAR or the Contention Resolution Message is not correctly
received by mobile terminals in the proper windows. Henceforward, a worst-case scenario is assumed.
Particularly, overlapping preambles always destructively interfere, therefore the base station never
detects them. In other words, if two or more devices send the same preamble in a single RAO, each user
fails the procedure.
Each collided user may retransmit a preamble after a backoff time b, chosen uniformly and at
random within the interval [0, B]. The maximum number of preamble transmission that a single mobile
terminal can attempt in a general coverage class c is set to ac . If a user fails the ac th attempt, it considers
being in the next higher coverage class, if exists. This behavior is repeated until the maximum number
of transmissions that can be tried globally in all classes, i.e., α, is reached.
As a case in point, Figure 5 reports three different users, i.e., A, B and C, starting the first
transmission attempt in the Normal, Extended and Extreme class, respectively, based on the assumption
that they always collide with other users. Since a0 = 2, as soon as User A fails the second attempt,
it retries the subsequent transmission in the Extended coverage class. Here, both A and B can try up
to a1 = 1 preamble transmission, hence jumping to the Extreme class in the immediately following
attempt. On the other hand, User C, whose class is Extreme, is forced to persist in its class. Anyway,
even though a2 = 3, a total amount of α = 4 attempts are foreseen for User C as well.
Sensors 2019, 19, 3237 7 of 25
1. Rand
om Ac
cess Pr
eamble
ponse
Access Res
2. Random
W
3. Ms
g 3
Contention
Message
Resolution tion R esolution
Timer 4. Conten
Extreme C B C BC A B C a2 = 4
Extended B A a1 = 1
Normal A A a0 = 2
Figure 5. Coverage class hopping of three distinct users during random access procedure with α = 4.
nodes installed in parking spaces is transmitted by NB-IoT, whereas charge management, sensor
node surveillance, task management, and business intelligence modules are implemented on a cloud
server. The system was then actually deployed in two Chinese cities for improving the utilization of
existing parking facilities effectively. Chen et al. [36] presented an indoor environment-temperature
monitoring system based on NB-IoT sensors and then validated it by means of real experimental results.
Pan et al. [37] addressed the issue of urban garbage management by designing a smart garbage bin
based on NB-IoT technology. In particular, they employed infrared and odor sensors to provide garbage
detection and classification. As a result, the proposed system changes the existing urban sanitation
work mode and improves the efficiency of sanitation workers, at the same time promoting the reuse
of recyclable resources. Instead, [38] designs an intelligent LED street light control system aiming at
saving energy and reducing the maintenance cost and difficulty of the urban street lighting. It consists
of a cloud server, a remote monitoring interface, and street light control terminals communicating
through NB-IoT. This solution realizes local intelligent control and remote supervision of street lights
and, thanks to an energy-saving algorithm, the energy consumption of the street lighting is greatly
reduced. Finally, in [39], the authors tried to address the problem of air pollution in a Smart City
context. In particular, they developed five types of air pollution detection sensors based on the NB-IoT
network in Thailand. Experimental results demonstrate the feasibility of inspecting real-time air
quality as a service.
On the other hand, in [40], NB-IoT has been identified as one of the most suitable wireless
communication technologies for Smart Agriculture applications because of its key features (low
power consumption, long communication range, and relatively easy network implementation).
Specifically, NB-IoT sensors collect environmental and soil data, which include ambient temperature,
atmospheric humidity, luminance, and soil moisture and temperature, every half an hour and transmit
them to the application server. Data are then analyzed by artificial intelligence systems, which impart
the corresponding methodologies to actuators to satisfy the specific conditions for crop growths.
Similarly, Chang et al. [41] presented a system for monitoring greenhouses of high-cost crop in the
suburb. Temperature and humidity data, as well as lighting parameters, are regularly collected from
the remote field and then synchronized with servers using NB-IoT. Experimental results further
demonstrate the feasibility and stability of data collecting using such a system.
Industry 4.0. was targeted by Rohit et al. [42], who proposed a smart solution for identification,
assessment, and tracking of industrial assets. After a comprehensive comparative study between
the existing communication technologies, NB-IoT is recognized as a key technology for achieving
the requirements of the 4.0 paradigm. In the context of the intelligent fishery, the authors of [43]
designed a fully-automatic and intelligent monitoring system for dissolved Oxygen of aquaculture
water, in order to reduce the mortality of bred animals. NB-IoT modules, along with optical and
polarographic sensors, and controllers are used to maintain the oxygen level of the aquaculture water
in the typical range.
As for the Smart Grid, Li et al. [44] demonstrated that NB-IoT work well in four typical
communication scenarios, after performing a comprehensive investigation on their requirements.
The authors claimed that the needs for field trips of personnel for meter reading, manual outage
reporting, and most restoration operations, especially for harsh environments that are difficult for
people to access, can be easily eliminated through the employment of NB-IoT.
Zhang et al. [45] formalized an architecture using NB-IoT to connect all intelligent things in
smart hospitals and introduce edge computing to deal with the requirement of latency in medical
processes. Furthermore, the authors designed an infusion monitoring system based on infrared sensors
to monitor the real-time drop rate and remaining drug volume during the intravenous infusion.
Popli et al. [46] delivered a comprehensive study of NB-IoT, extensively elaborating resource
allocation and energy efficiency techniques. Moreover, the proposed two novel application specific
energy efficient approaches for Smart Agriculture and Smart Health. Specifically, in the first scenario,
NB-IoT soil moisture sensors deployed in a farm field send data that are then processed using
Sensors 2019, 19, 3237 9 of 25
deep learning to meticulously divide the field into different zones. As for Smart Health scenario,
a novel approach for adaptively distributing the transmission power required to monitor the patient is
proposed, in order to perform power optimization and greatly improve the lifetime and performance
of the monitoring systems.
global and local transmission attempts counters, backoff times, and transitions from a class to
another, as well as other key simulation. Second, it formulates an analytical model describing both
collision and success probabilities, given the number of users willing to perform the random access
procedure. Third, it deeply cross-validates the analytical model and the simulation tool, by considering
realistic NB-IoT deployments enabling periodic reporting in monitoring infrastructures, with different
resource configurations.
As outlined in Figure 6, the starting point is the implementation of a 3GPP-compliant NB-IoT
random access procedure within an open-source simulation tool [25]. In summary, it is able to provide
the number of users accessing the NPRACH and the performance of the procedure itself, expressed in
terms of collision probability and success probability, by taking into account a large number of input
parameters. Then, the analytical model receives in input the number of users accessing the NPRACH,
obtained through computer simulations for estimating both the collision and the success probabilities
of users in an RAO.
Note that the symbols adopted in this document are summarized in Table 2.
Analytical Model
described in Section 3.2
cross-validation
Symbol Parameter
c Coverage class
n Number of coverage classes
s Number of NPRACH subcarriers
W RAR Window
α Maximum transmission attempts
ac Number of transmission attempts in class c
b Chosen backoff time
B Maximum backoff time
N Number of users accessing an RAO
M Number of users in the cell
P N,s Collision Probability
P N,s Simulated Collision Probability
S N,s Success Probability
S N,s Simulated Success Probability
UE eNB
UeNbIoTRandomAccess EnbNbIoTRandomAccess
BandwidthManager nbAMCmodule
NbUplinkPacketScheduler
FrameManager
FIFO | RR
Figure 7. Overview of the main building blocks of the NB-IoT simulation platform.
Nevertheless, the preliminary version of the NB-IoT simulator did not support the
standard-compliant random access procedure. At the code level, the EnbNbIoTRandomAccess and
UeNbIoTRandomAccess classes handle the random access procedure from the base station and user
point of view, respectively. Consequently, these classes have been deeply revised since they were
not capable of addressing the multi-class attempts control and transitions between coverage classes
(as discussed in Section 2.2). In particular, Figure 8 depicts an overview of the implemented code.
EnbNbIoTRandomAccess UeNbIoTRandomAccess
SetRachReservedSubChannels StartRaProcedure
SendMessage1
yes
CheckCollisions
no RestartRa attempts
FAIL Procedure left
SendMessage2
SendMessage3
SendMessage4
With respect to the UeNbIoTRandomAccess class, as soon as the traffic generator creates
a packet at the application layer, the UeNbIoTRandomAccess::StartRaProcedure() method initializes
the procedure. Then, several attributes and methods enabling coverage class transitions and
attempts-checking are called. In particular, the UeNbIoTRandomAccess::SendMessage1() method
selects the appropriate NPRACH resources for transmitting preambles in the correct coverage class.
Sensors 2019, 19, 3237 13 of 25
Let Nb be the number of users not colliding. It is indeed equal to the average number of preambles
chosen only once. In fact, given Equation (1), Nb is computed as the product of P1 and the number of
different preambles, s:
N −1
Nb = sP1 = N 1 − 1 . (2)
s
As a result, the average number of collided users, that is N,e corresponds to the total amount of
users, i.e., N, except the users whose preambles not collide, i.e., N,
b that is:
" N −1 #
N b = N 1− 1− 1
e = N−N . (3)
s
1 N −1
N
e
P N,s = = 1− 1− , N > 0. (4)
N s
Similarly, let the Success Probability be the probability that, in a given RAO, a user successfully
completes a preamble transmission. As previously stated, N b is the number of users not colliding.
Since Nb = N (1 − 1/s) N − 1 , as Equation (2) reports, (1 − 1/s) N −1 clearly represents this success
probability. Conversely, the success probability S N,s can be intuitively modeled as:
N −1
1
S N,s = 1 − P N,s = 1− , N > 0. (5)
s
Accordingly, it is worth noting that S1,s = 1, ∀s > 0, as if a single user accesses an RAO, it will
certainly not collide.
It is important to emphasize that no stringent assumption on the traffic model has been made in the
formulated analytical model. In fact, the probability of a device attempting a preamble transmission
in a given RAO depends on both its traffic arrival distribution and NPRACH structure in time.
These aspects can be easily managed by the simulation platform.
4. Performance Assessment
Cross-validation was conducted to evaluate the accuracy of the implemented simulation platform.
According to all the different monitoring systems detailed in Section 2.3, it is reasonable to assume
a periodic reporting traffic. Conducted tests consider a 3GPP reference scenario [49], which suitably
models highly dense sensor networks. Specifically, transmission requests arrival is modeled according
to the uniform distribution in the interval (0, 60) s, which is in line with the requirements of a number of
smart monitoring applications. In addition, M = 5000 or M = 10,000 motionless devices are uniformly
Sensors 2019, 19, 3237 15 of 25
distributed within a cell with a radius of 1.5 km. Consequently, every second there are, on average,
M/60 different mobile terminals that want to transmit a preamble. The base station uses a single
NB-IoT carrier of 180 kHz and the uplink is configured in Single-Tone mode with a subcarrier spacing
of 15 kHz. The chosen uplink scheduling strategy is First In First Out. The simulation environment is
summarized in Table 3.
Parameter Value
Traffic model Uniform Distribution—(0, 60) s
Number of sensors (M) [#] 5000, 10,000
Sensors spatial distribution Uniform
Cell radius [km] 1.5
NB-IoT bandwidth [kHz] 180
Transmission mode Single-Tone
Subcarrier spacing [kHz] 15
Uplink scheduler FIFO
The details related to the considered NPRACH resource configurations are summarized in
Tables 4 and 5.
Parameter Value
α [#] 10
n [#] 1
c Normal
zac [#] 6
α [#] 10
periodicity [ms] 80
s [#] 36
B [ms] 512
W [ms] 24
Parameter Value
α [#] 10
n [#] 3
c Normal Extended Extreme
ac [#] 3 3 6
periodicity [ms] 80 80 80
s [#] 12 12 24
B [ms] 256 512 1024
W [ms] 12 48 256
Note that for Configuration 1 only the Normal class is considered, while Configuration 2
contemplates all three coverage classes. It is worth mentioning that, to increase the statistical
significance of reported results, each simulation was repeated 150 times with different seeds.
System performance was evaluated in terms of the number of devices involved in the random
access procedure, as well as collision and success probabilities. In addition, the analysis of the
percentage error between the estimated success probability, i.e., S N,s , and the simulated success
probability, i.e., S N,s , was conducted for each set of simulations. The end-to-end delay was
statistically analyzed for additional completeness of the performance evaluation. Finally, to
provide further performance insights, the impact of RAO periodicity was investigated with a third
resource configuration.
Sensors 2019, 19, 3237 16 of 25
60
50
40
M=5000
30 M=10000
20
10
0
0 0.5 1 1.5 2 2.5 3
104
Figure 9. Average number of devices accessing RAOs for Configuration 1.
10
6
M=5000
M=10000
4
0
0 0.5 1 1.5 2 2.5 3
4
10
(a) Normal class
10
6
M=5000
M=10000
4
0
0 0.5 1 1.5 2 2.5 3
104
(b) Extended class
M=5000
4 M=10000
0
0 0.5 1 1.5 2 2.5 3
104
(c) Extreme class
0.8
0.6
0.4
Configuration 1, M=5000
0.2 Configuration 1, M=10000
Configuration 2, M=5000
Configuration 2, M=10000
0
0.01 0.1 1 10
The end-to-end delay is the time interval between the time instant when the devices application
layer generates a data packet, and the time instant when that data packet is received by the the base
station. Consequently, it includes the access delay as well as the delay introduced by scheduling
decisions and the physical transmission of the packet. The most noticeable aspect is that different
configurations have different trends. In addition, as expected, the end-to-end delay grows with the
number of sensors deployed in the cell, M.
Configuration 1 presents both the best and the worst performance in terms of delay, for M = 5000
and M = 10,000, respectively. As a matter of fact, in the first case, there are few user accessing each
RAO and a significantly high success probability, as highlighted in the previous sections. Consequently,
the end-to-end delay is notably improved, since less preamble retransmission occurs and the uplink
scheduler successfully manages the queued terminals. On the contrary, if M = 10,000, the access delay
dramatically increase due to the multiple collisions leading to several preamble retransmissions. At the
same time, the higher number of successful devices has a negative effect on the waiting time in the
scheduling queue as well, hence causing the rise of the end-to-end delay.
Differently, Configuration 2 exhibits an intermediate behavior. This is mainly because longer
Backoff times and RAR windows are counterbalanced by the difference in the NPRACH resources
structure and higher success probabilities.
Parameter Value
α [#] 10
n [#] 1
c Normal
ac [#] 6
α [#] 10
periodicity [ms] 160
s [#] 36
B [ms] 512
W [ms] 24
It is important to note that the only difference with respect to Configuration 1 lies in the periodicity,
in order to better identifying its relationship with the number of devices accessing RAOs, as well as
the success and collision probabilities. Figure 14 illustrates the number of devices accessing RAOs for
both Configuration 3 and Configuration 1.
Greater periodicities values lead to a greater number of terminals in the NPRACH since there
are fewer RAOs per unit of time. The average number of sensors accessing RAOs quickly reaches
extremely high values when M = 10,000. It is worth noting that the curves do not grow indefinitely
because each device can perform the preamble transmission a maximum number of times, i.e., α = 10.
In parallel, Figure 15 shows the success and collision probabilities.
The success probability is greatly reduced due to the higher density of terminals in each RAOs.
However, it is worth mentioning that, when M = 5000, performance is almost satisfactory, however the
amount of available resources is halved with respect to Configuration 1.
This brief analysis highlights the important trade-off between the resources available for NPRACH
and the resources available for data transmission, i.e., for the NPUSCH.
300
250
200
M=5000, Configuration 3
M=10000, Configuration 3
150 M=5000, Configuration 1
M=10000, Configuration 1
100
50
0
0 0.5 1 1.5 2 2.5 3
4
10
Figure 14. Average number of devices accessing RAOs for Configuration 3.
Sensors 2019, 19, 3237 22 of 25
5. Conclusions
NB-IoT is emerging as a promising technology for offering wireless connectivity to
constrained smart devices deployed in several pervasive monitoring scenarios, such as Smart City,
Precision Agriculture, and Industry 4.0. The random access procedure represents a key relation
between devices and the base station, since uplink transmissions prevail among the rest of exchanged
messages in a typical NB-IoT monitoring system. Hence, it is of the utmost importance to investigate
the behavior of the aforementioned random access procedure.
This paper presents the implementation of an open-source and 3GPP-compliant NB-IoT random
access procedure simulation tool and an analytical model describing both collision and success
probabilities, given the number of users accessing the random access channel. By taking into
account reference applications scenarios based on periodic reporting in monitoring infrastructures,
computer simulations showed, as expected, that highly dense sensor networks lead to an overall
higher preamble collision probability. Furthermore, cross-validation demonstrated that the formulated
analytical model exhibited a considerably low percentage error, proving its remarkable accuracy.
Future activities could involve, on the one hand, the formulation of a complete analytical model
to estimate both the number of users performing the random access procedure and an extended
analysis of the average end-to-end delay. On the other hand, either entirely new random access
mechanisms or major enhancements to the current random access protocol could be implemented in the
proposed simulation tool, in order to assess their performance with respect to the standard procedure.
Furthermore, the proposed simulation platform could be used for conducting the performance
evaluation of different application scenarios, hence embracing the huge extent of Internet of Things
use cases.
Author Contributions: Conceptualization, S.M. and G.P.; methodology, S.M. and G.P.; software, S.M. and G.P.;
validation, S.M. and G.P.; formal analysis, S.M. and G.P.; investigation, S.M. and G.P.; resources, S.M. and G.P.;
data curation, S.M. and G.P.; writing–original draft preparation, S.M. and G.P.; writing–review and editing,
S.M., G.P. and G.B.; visualization, S.M., G.P. and G.B.; supervision, G.B.; project administration, G.B.; funding
acquisition, G.B.
Funding: This work was partially funded by Italian MIUR PON projects Pico&Pro (ARS01_01061),
AGREED (ARS01_00254), FURTHER (ARS01_01283), and RAFAEL (ARS01_00305), by the PRIN project no.
2017NS9FEY entitled “Realtime Control of 5G Wireless Networks: Taming the Complexity of Future Transmission
and Computation Challenges", as well as by Apulia Region (Italy) Research Project E-SHELF (OSW3NO1) and
INTENTO (36A49H6).
Sensors 2019, 19, 3237 23 of 25
Conflicts of Interest: The authors declare no conflict of interest. The funders had no role in the design of the
study; in the collection, analysis, or interpretation of data; in the writing of the manuscript, or in the decision to
publish the results.
References
1. Cisco. The Zettabyte Era: Trends and Analysis. White Paper. 2015. Available online: https://files.ifi.uzh.
ch/hilty/t/Literature_by_RQs/RQ%20102/2015_Cisco_Zettabyte_Era.pdf (accessed on 31 May 2019 ).
2. Wollschlaeger, M.; Sauter, T.; Jasperneite, J. The Future of Industrial Communication: Automation Networks
in the Era of the Internet of Things and Industry 4.0. IEEE Ind. Electron. Mag. 2017, 11, 17–27. [CrossRef]
3. Lloret, J.; Tomas, J.; Canovas, A.; Parra, L. An Integrated IoT Architecture for Smart Metering. IEEE Commun.
Mag. 2016, 54, 50–57. [CrossRef]
4. Guerrero-Ibáñez, J.; Zeadally, S.; Contreras-Castillo, J. Sensor Technologies for Intelligent Transportation
Systems. Sensors 2018, 18, 1212. [CrossRef] [PubMed]
5. Ray, P.P. Internet of Things for Smart Agriculture: Technologies, Practices and Future Direction. J. Ambient
Intell. Smart Environ. 2017, 9, 395–420. [CrossRef]
6. Manogaran, G.; Varatharajan, R.; Lopez, D.; Kumar, P.M.; Sundarasekar, R.; Thota, C. A New Architecture
of Internet of Things and Big Data Ecosystem for Secured Smart Healthcare Monitoring and Alerting System.
Future Gener. Comput. Syst. 2018, 82, 375–387. [CrossRef]
7. Vijayakumar, N.; Ramya.; R. The Real Time Monitoring of Water Quality in IoT Environment. In Proceedings
of the International Conference on Innovations in Information, Embedded and Communication Systems
(ICIIECS), Coimbatore, India, 17–18 March 2015; pp. 1–5.
8. Xiong, X.; Zheng, K.; Xu, R.; Xiang, W.; Chatzimisios, P. Low Power Wide Area Machine-to-Machine
Networks: Key Techniques and Prototype. IEEE Commun. Mag. 2015, 53, 64–71. [CrossRef]
9. Raza, U.; Kulkarni, P.; Sooriyabandara, M. Low Power Wide Area Networks: An Overview. IEEE Commun.
Surv. Tutor. 2017, 19, 855–873. [CrossRef]
10. Augustin, A.; Yi, J.; Clausen, T.; Townsley, W.M. A study of LoRa: Long range & Low Power Networks for
the Internet of Things. Sensors 2016, 16, 1466.
11. SIGFOX. Sigfox—The Global Communications Service Provider for the Internet of Things. Available online:
https://www.sigfox.com (accessed on 13 May 2019).
12. 3GPP. E-UTRA and E-UTRAN; LTE Physical Layer, General Description (Release 13); Technical Report TS
36.201; 3GPP: Sophia Antipolis, France, 2016.
13. 3GPP. E-UTRA and E-UTRAN; LTE Physical Layer, General Description (Release 15); Technical Report TS
36.201, 3GPP: Sophia Antipolis, France, 2018.
14. Wang, Y.P.E.; Lin, X.; Adhikary, A.; Grovlen, A.; Sui, Y.; Blankenship, Y.; Bergman, J.; Razaghi, H.S. A Primer
on 3GPP Narrowband Internet of Things. IEEE Commun. Mag. 2017, 55, 117–123. [CrossRef]
15. Chen, M.; Miao, Y.; Hao, Y.; Hwang, K. Narrow Band Internet of Things. IEEE Access 2017, 5, 20557–20577 .
[CrossRef]
16. Sun, Y.; Tong, F.; Zhang, Z.; He, S. Throughput Modeling and Analysis of Random Access in Narrow-band
Internet of Things. IEEE Internet Things J. 2017, 5, 1485–1493. [CrossRef]
17. Jiang, N.; Deng, Y.; Condoluci, M.; Guo, W.; Nallanathan, A.; Dohler, M. RACH Preamble Repetition in
NB-IoT Network. IEEE Commun. Lett. 2018, 6, 1244–1247. [CrossRef]
18. Baracat, G.; Brito, J. NB-IoT Random Access Procedure Analysis. In Proceedings of the Latin-American
Conference on Communications (LATINCOM), Guadalajara, Mexico, 14–16 November 2018; pp. 1–6.
19. Harwahyu, R.; Cheng, R.G.; Tsai, W.J.; Hwang, J.K.; Bianchi, G. Repetitions vs Retransmissions: Trade-off in
Configuring NB-IoT Random Access Channels. IEEE Internet Things J. 2019, 6, 3796–3805. [CrossRef]
20. Lin, X.; Adhikary, A.; Wang, Y.P.E. Random Access Preamble Design and Detection for 3GPP Narrowband
IoT Systems. IEEE Wirel. Commun. Lett. 2016, 5, 640–643. [CrossRef]
21. Hwang, J.K.; Li, C.F.; Ma, C. Efficient Detection and Synchronization of Superimposed NB-IoT NPRACH
Preambles. IEEE Internet Things J. 2019, 6, 1173–1182. [CrossRef]
22. Harwahyu, R.; Cheng, R.G.; Wei, C.H.; Sari, R.F. Optimization of Random Access Channel in NB-IoT.
IEEE Internet Things J. 2018, 5, 391–402. [CrossRef]
Sensors 2019, 19, 3237 24 of 25
23. Foni, S.; Pecorella, T.; Fantacci, R.; Carlini, C.; Obino, P.; Di Benedetto, M.G. Evaluation methodologies
for the NB-IOT system: Issues and ongoing efforts. In Proceedings of the AEIT International Annual
Conference, Cagliari, Italy, 20–22 September 2017.
24. Miao, Y.; Li, W.; Tian, D.; Hossain, M.S.; Alhamid, M.F. Narrow Band Internet of Things: Simulation and
Modelling. IEEE Internet Things J. 2017, 5, 2304–2314. [CrossRef]
25. Martiradonna, S.; Grassi, A.; Piro, G.; Grieco, L.A.; Boggia, G. An Open Source Platform for Exploring
NB-IoT System Performance. In Proceedings of the IEEE European Wireless Conference (EW), Catania, Italy,
2–4 May 2018; pp. 1–6.
26. Sauter, M. From GSM to LTE-Advanced Pro and 5G: An Introduction to Mobile Networks and Mobile Broadband;
Wiley: Hoboken, NJ, USA, 2017.
27. 3GPP. E-UTRA and E-UTRAN; Overall Description (Release 15); Technical Report TS 36.300; 3GPP:
Sophia Antipolis, France, 2018.
28. 3GPP. E-UTRA; Physical Channels and Modulation (Release 15); Technical Report TS 36.211; 3GPP:
Sophia Antipolis, France, 2018.
29. 3GPP. Cellular System Support for Ultra-Low Complexity and Low Throughput Internet of Things (Release 13);
Technical Report TR 45.820; 3GPP: Sophia Antipolis, France, 2015.
30. 3GPP. E-UTRA and E-UTRAN; MAC Protocol Specification (Release 15); Technical Report TS 36.321; 3GPP:
Sophia Antipolis, France, 2018.
31. Ratasuk, R.; Mangalvedhe, N.; Zhang, Y.; Robert, M.; Koskinen, J.P. Overview of Narrowband IoT in LTE
Rel-13. In Proceedings of the IEEE Conference on Standards for Communications and Networking (CSCN),
Berlin, Germany, 31 October–2 November 2016.
32. Zhang, X.; Zhang, M.; Meng, F.; Qiao, Y.; Xu, S.; Hour, S. A Low-Power Wide-Area Network Information
Monitoring System by Combining NB-IoT and LoRa. IEEE Internet Things J. 2019, 6, 590–598. [CrossRef]
33. El Soussi, M.; Zand, P.; Pasveer, F.; Dolmans, G. Evaluating the Performance of eMTC and NB-IoT for Smart
City Applications. In Proceedings of the IEEE International Conference on Communications (ICC), Kansas
City, MO, USA, 20–24 May 2018; pp. 1–7.
34. Malarski, K.M.; Bardram, A.; Larsen, M.D.; Thrane, J.; Petersen, M.N.; Moeller, L.; Ruepp, S. Demonstration
of NB-IoT for Maritime Use Cases. In Proceedings of the International Conference on the Network of the
Future (NOF), Poznań, Poland, 19–21 November 2018; pp. 106–108.
35. Shi, J.; Jin, L.; Li, J.; Fang, Z. A Smart Parking System Based on NB-IoT and Third-Party Payment Platform.
In Proceedings of the International Symposium on Communications and Information Technologies (ISCIT),
Cairns, Australia, 25–27 September 2017; pp. 1–5.
36. Chen, X.; Chen, J.; Wu, Y.; Qian, L.; Huang, L.; Shi, Z.; Meng, L. Design of Indoor Temperature Monitoring
System based on Narrowband Internet of Things. In Proceedings of the Asia-Pacific Conference on
Communications (APCC), Ningbo, China, 12–14 November 2018; pp. 604–609.
37. Pan, P.; Lai, J.; Chen, G.; Li, J.; Zhou, M.; Ren, H. An Intelligent Garbage Bin Based on NB-IOT Research
Mode. In Proceedings of the IEEE International Conference of Safety Produce Informatization (IICSPI),
Chongqing, China, 10–12 December 2019; pp. 113–117.
38. Zhao, L.; Gao, Q.; Wang, R.; Fang, N.; Jin, Z.; Wan, N.; Xu, L. Intelligent Street Light System Based on NB-IoT
and Energy-saving Algorithm. In Proceedings of the International Conference on Smart and Sustainable
Technologies (SpliTech), Split, Croatia, 26–29 June 2018; pp. 1–6.
39. Duangsuwan, S.; Takarn, A.; Jamjareegulgarn, P. A Development on Air Pollution Detection Sensors based
on NB-IoT Network for Smart Cities. In Proceedings of the International Symposium on Communications
and Information Technologies (ISCIT), Bangkok Thailand, 26–29 September 2018; pp. 313–317.
40. Feng, X.; Yan, F.; Liu, X. Study of Wireless Communication Technologies on Internet of Things for Precision
Agriculture. In Wireless Personal Communications; Springer Nature Switzerland AG: Basel, Switzerland, 2019;
pp. 1–18.
41. Chang, Y.S.; Chen, Y.H.; Zhou, S.K. A Smart Lighting System for Greenhouses Based on Narrowband-IoT
Communication. In Proceedings of the International Microsystems, Packaging, Assembly and Circuits
Technology Conference (IMPACT), Taipei, Taiwan, 24–26 October 2018; pp. 275–278.
42. Rohit, S.; Jamkhandi, A.G.; Rao, A.; Krishna, V.; Naik, A.; Parathodiyil, M. IoT Based Identification and
Assessment of Industrial Assets. In Proceedings of the International Conference on Computing, Power and
Communication Technologies (GUCON), Greater Noida, India, 28–29 September 2018; pp. 378–383.
Sensors 2019, 19, 3237 25 of 25
43. Ma, Y.; Ding, W. Design of Intelligent Monitoring System for Aquaculture Water Dissolved Oxygen.
In Proceedings of the Advanced Information Technology, Electronic and Automation Control Conference
(IAEAC), Chongqing, China, 12–14 October 2018; pp. 414–418.
44. Li, Y.; Cheng, X.; Cao, Y.; Wang, D.; Yang, L. Smart Choice for the Smart Grid: Narrowband Internet of
Things (NB-IoT). IEEE Internet Things J. 2017, 5, 1505–1515. [CrossRef]
45. Zhang, H.; Li, J.; Wen, B.; Xun, Y.; Liu, J. Connecting intelligent things in smart hospitals using NB-IoT.
IEEE Internet Things J. 2018, 5, 1550–1560. [CrossRef]
46. Popli, S.; Jha, R.K.; Jain, S. A Survey on Energy Efficient Narrowband Internet of Things (NBIoT):
Architecture, Application and Challenges. IEEE Access 2019, 7, 16739–16776. [CrossRef]
47. 3GPP. E-UTRA; Physical Layer Procedures (Release 14); Technical Report TS 36.213; 3GPP: Sophia Antipolis,
France, 2017.
48. Piro, G.; Grieco, L.A.; Boggia, G.; Capozzi, F.; Camarda, P. Simulating LTE cellular Systems: An Open-Source
Framework. IEEE Trans. Veh. Technol. 2011, 60, 498–513. [CrossRef]
49. 3GPP. Study on RAN Improvements for Machine-Type Communications; Technical Report TR 37.868; 3GPP:
Sophia Antipolis, France, 2011.
50. 3GPP. Radio Resource Control (RRC), Protocol Specification (Release 14); Technical Report TS 36.331; 3GPP:
Sophia Antipolis, France, 2017.
c 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access
article distributed under the terms and conditions of the Creative Commons Attribution
(CC BY) license (http://creativecommons.org/licenses/by/4.0/).