Papr 10
Papr 10
Access Channel
Ahmed O. Elmeligy Ioannis Psaromiligkos Au Minh
McGill University McGill University Hydro-Quebéc Research Institute (IREQ)
[email protected] [email protected] [email protected]
Abstract—The use of cellular networks for massive machine- joint probability of the number of successful and collided
arXiv:2405.14667v2 [eess.SP] 8 Oct 2024
type communications (mMTC) is an appealing solution due to UE preamble transmissions within a RACH slot is derived
the wide availability of cellular infrastructure. in [6]. Maximum likelihood (ML) estimation and Bayesian
Estimating the number of devices (network load) is vital
for efficient allocation of the available resources, especially for techniques are used to estimate the network load. Two algo-
managing the random access channel (RACH) of the network. rithms are proposed based on whether the number of successes
This paper considers a two-priority RACH and proposes two and collisions are known at the BS or only the number of
network load estimators: a maximum likelihood (ML) estimator successes is known. However, the probability of unselected
and a reduced complexity (RCML) variant. The estimators are preambles is not considered, which is additional information
based on a novel model of the random access behavior of the
devices coupled with a flexible analytical framework to calculate known to the BS and can be used to improve the estimation
the involved probabilities. Monte Carlo simulations demonstrate accuracy.
the accuracy of the proposed estimators for different network A combinatorial model presented in [4] investigates the
configurations. Results depict increased estimation accuracy us- transient behavior of RACHs with bursty arrivals. The model
ing non-uniform preamble selection probabilities compared to the obtains the average number of successful and collided UEs
common uniform probabilities at no extra computational cost.
Index Terms—Load estimation, massive machine-type commu- in a single RACH slot. The authors then estimate the number
nications (mMTC), random access channel (RACH). of contending UEs in each slot. Simulations show that the
estimation is accurate in the case of a high UE count but
I. I NTRODUCTION suffers for few UE.
The use of already deployed cellular infrastructure is The number of active UEs in
an appealing solution to providing wireless connectivity irregular repetition slotted ALOHA (IRSA) access protocol
for massive machine-type communication (mMTC) applica- is estimated in [7]; successive interference cancellation (SIC)
tions [1]. At the same time, combining multi-priority applica- is adopted at the receiver to recover the transmitted packets.
tions in a single network is a promising cost-efficient approach The authors propose a maximum a posteriori (MAP)
as it avoids deploying multiple networks. However, servicing detector for the number of unrecovered UEs in a specific
the massive number of devices in mMTC poses a significant SIC iteration. A sub-optimal detector is also proposed to
challenge to the cellular network, particularly, by congesting reduce the computational complexity via approximations.
and overloading the random access channel (RACH) [2], [3]. Numerical results illustrate that the suboptimal detector’s
The RACH, which is usually available periodically, is the mean absolute error (MAE) increases with the overloading.
channel the devices use to request access to the network [4]. In [8], an estimate of the network load is used in two
Each time the RACH is available is known as a RACH dynamic access class barring (ACB) algorithms that operate
slot, and at each slot, a device (henceforth referred to as a without the BS knowing the number of devices. The first
user equipment (UE)) randomly chooses a preamble from a algorithm optimizes the ACB factor for a fixed number of
finite set of preambles and transmits it to the base station (BS); preambles, where the ACB factor determines the backoff time
if a preamble is selected by only one device, the BS can of collided devices. The second algorithm optimizes the ACB
successfully decode it. On the other hand, if two or more factor and the number of available preambles.
devices choose the same preamble a collision happens [5]. Finally, a backoff scheme is developed by [9] that uses a
The network load is defined as the number of UEs the net- backoff indicator to determine a random waiting period for the
work serves, and the ratio of UEs to the number of preambles collided UEs. The backoff indicator is dynamically adjusted
is known as the overloading factor; a high overloading factor in [10] based on the availability of resources and the number
indicates that the network is congested, thus increasing the of backlogged UEs.
number of collisions and reducing the network throughput. In all these works, only a single UE priority class is
Knowing the load is vital for the network operator to decide considered; hence superimposing numerous applications with
how to allocate the available finite resources to the UE pool. varying quality of service (QoS) requirements in the same
Several methods have been proposed to estimate the net- network to save resources would not be possible. Additionally,
work load in the RACH. A closed-form expression for the only a single RACH slot is used, and the estimation techniques
are not extended to multiple RACH slots, which could signif- Resource
Block (RB)
icantly improve the estimator’s accuracy.
Several additional works consider single and multi-UE pri-
π1 π2 π3 πT
ority classes, focusing on improving the RACH performance
by first introducing a performance metric, and then optimizing M h x h φ
h x l
M −1 h
the RACH parameters, such as the number of preambles, the
M − 2 l h φ x
.. .. .. ..
RACH periodicity, or the ACB factor, to maximize the met- ..
. . . . .
ric [11]–[15]. However, no network load estimation techniques 1
l
φ
x
h
(18) (26)
where N h , N l , p̂hlk , and p̂llk are as follows: The RCML estimator is then obtained by (1) with P̂ (π) in
place of P (π).
N h = nh − H, Nkl = nl − L (19)
IV. S IMULATION R ESULTS
phφk
p̂hφk = (20) In this section, we evaluate the performance of the proposed
phφk + . . . + phΦ + phi
P
i∈X estimators in terms of the MAE for varying numbers of
plφk UEs and the number of patterns observed. We consider three
p̂lφk = (21)
plφk + . . . + plΦ + pli simulation setups. In the first setup, all UEs are assumed
P
i∈X
to be in the same priority class; hence, ph = pl . This
The algorithm that calculates the third factor in (3) is similar scenario replicates the RACH in LTE and the contention-
to Algorithm 2, hence it has been omitted for brevity. based RACH procedure in 5G, with the RBs representing
preambles in the random access procedure [20], [21]. In the
Finally, the last factor in (3), P X H; L Φ , is the proba- second setup, the UEs are split into two priority classes, with
bility that two or more UEs occupy each RB in X . Let X = the H-UEs having more RBs available than the L-UEs. This
{x1 , x2 , . . . , xX }. Proposition 4 depicts how P X H, L, Φ setup corresponds to virtually allocating the RBs to the UEs
is calculated. depending on their priority class [22], [23]. Finally, the third
setup utilizes non-uniform RB access probabilities introducing
a generalized approach to the RACH protocol, thereby opening
Proposition 4. P X H, L, Φ is given by:
up opportunities for integrating different priority classes more
P X H, L, Φ = effectively. The results presented are averages of 50 Monte
N1h +N1l h
NX l
+NX N1h NXh Carlo simulations. In all simulations, the number of RBs is
X
···
X X
···
X set to M = 6, T is set to 1, 3, or 10, and the number of
k1 =2 kX =2 i1 =0 iX =0
L-UEs ranges from 0 to 7.
X h A. Single Priority Class
Y N h
(p̂hxj )ij (1 − p̂hxj )N −ij ×
i j In the first simulation, nh is fixed to 2, while the elements in
j=1
p and pl are set to 1/M , indicating that all RBs are equally
h
Nl
l
(p̂lxj )kj −ij (1 − p̂lxj )N −kj +ij (22a) likely to be chosen by any UE. The MAE of the ML and
kj − ij RCML estimators against nl are shown in Fig. 3. As we can
see, on average, the ML estimator (Fig. 3a) outperforms the
s.t. km − im ≥ 0, m∈X (22b) RCML estimator (Fig. 3b) due to the RCML not using all the
X
X X
X available pattern information. As expected, the MAE decreases
im = N h , km = N l − N h (22c) as T increases due to the extra information available to the
m=1 m=1 BS. Furthermore, for a fixed T , an increase in the overloading
5 5 6 6
T =1 T =1 T = 1, nh = 1 T = 1, nh = 1
T =3 T =3 T = 3, nh = 1 T = 3, nh = 1
4 T = 10 4 T = 10 T = 10, nh = 1 T = 10, nh = 1
4 T = 1, nh = 2 4 T = 1, nh = 2
3 3
MAE
MAE
MAE
MAE
T = 3, nh = 2 T = 3, nh = 2
T = 10, nh = 2 T = 10, nh = 2
2 2
2 2
1 1
0 0 0 0
0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7
Number of L-UEs (nl ) Number of L-UEs (nl ) Number of L-UEs (nl ) Number of L-UEs (nl )
(a) (b) (a) (b)
Fig. 3. MAE vs. nl for ML (3a) and RCML (3b) estimators for different T . Fig. 5. MAE vs. nl for ML (5a) and RCML (5b) estimators for different T
and nh .
·10−3
8
0
Estimated number of H-UEs (n̂h )
6 6
T = 1, nh = 1 T = 1, nh = 1
1 T = 3, nh = 1 T = 3, nh = 1
2 6 T = 10, nh = 1 T = 10, nh = 1
4 T = 1, nh = 2 4 T = 1, nh = 2
MAE
MAE
T = 3, nh = 2 T = 3, nh = 2
3 T = 10, nh = 2 T = 10, nh = 2
4 4 2 2
5
6 0 0
2 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7
7 Number of L-UEs (nl ) Number of L-UEs (nl )
8 (a) (b)
0
0 1 2 3 4 5 6 7 8 Fig. 6. MAE vs. nl
for ML (6a) and RCML (6b) estimators for different T
Estimated number of L-UEs (n̂l ) and nh using non-uniform ph and pl .
i=1 h h
i6=k 4: N ←N −1
Pn 5: p̂hi ← 0, p̂li ← 0
such that i=1 π̂i = 1. p̂h p̂lj
6: p̂hj ← PM
j
p̂h
, p̂lj ← PM
p̂l
for j 6= i
k=1 k k=1 k
We can now begin the proof of Proposition 1, as shown k6=i k6=i
below. The first factor in (4) is the probability that only one 7: At the end of the ith iteration z holds P H .
H-UE occupies RB h1 , and no other UEs are in RB h1 :
h l
n h h nh −1 n l
P (Hh1 ) = ph1 (1 − ph1 ) (plh1 )0 (1 − plh1 )n , R EFERENCES
1 0
(30) [1] I. Leyva-Mayorga, L. Tello-Oquendo, V. Pla, J. Martinez-Bauset, and
which when simplified results in (5). The second factor in (4) V. Casares-Giner, “Performance analysis of access class barring for
handling massive M2M traffic in LTE-A networks,” in 2016 IEEE
is the probability that only one H-UE occupies RB h2 , and no international conference on communications (icc). IEEE, 2016, pp.
other UEs are in RB h2 , given that one H-UE is in RB h1 . 1–6.
Algorithm 2 P L H (PIMRC). IEEE, 2018, pp. 1972–1976.
h h l l [8] S. Duan, V. Shah-Mansouri, Z. Wang, and V. W. Wong, “D-ACB:
1: Initialization:
z = 1, N = n − H, N = n Adaptive congestion control algorithm for bursty M2M traffic in LTE
0 if j ∈ H networks,” IEEE Transactions on Vehicular Technology, vol. 65, no. 12,
2: p̂h
j = ph pp. 9847–9861, 2016.
P j ph otherwise [9] Evolved Universal Terrestrial Radio Access, “Medium access control
i∈H
/ i
(MAC) protocol specification (3GPP TS 36.321 version 8.5. 0 release
0 if j ∈ H
8),” ETSI TS, vol. V16, no. 321, 2021.
3: p̂lj = plj
P l otherwise [10] H. D. Althumali, M. Othman, N. K. Noordin, and Z. M. Hanapi,
/ pi
i∈H “Dynamic backoff collision resolution for massive M2M random access
4: for each i in L do l h in cellular IoT networks,” IEEE Access, vol. 8, pp. 201 345–201 359,
5: z ← z × N l p̂li (1 − p̂li )N −1 (1 − p̂hi )N 2020.
l l
6: N ←N −1 [11] M. R. Chowdhury and S. De, “Queue-aware access prioritization for
7: p̂hi ← 0, p̂li ← 0 massive machine-type communication,” IEEE Internet of Things Jour-
p̂h p̂lj nal, vol. 9, no. 17, pp. 15 858–15 873, 2022.
8: p̂hj ← PM
j
p̂h
, p̂lj ← PM
p̂l
for j 6= i [12] H. Althumali, M. Othman, N. K. Noordin, and Z. M. Hanapi, “Priority-
k=1 k k=1 k
k6=i k6=i based load-adaptive preamble separation random access for QoS-
differentiated services in 5G networks,” Journal of Network and Com-
9: At the end of the ith iteration z holds P L H .
puter Applications, vol. 203, p. 103396, 2022.
[13] L. Tello-Oquendo, I. Leyva-Mayorga, V. Pla, J. Martinez-Bauset, J.-
Algorithm 3 P X H, L, Φ
R. Vidal, V. Casares-Giner, and L. Guijarro, “Performance analysis and
1: Initialization: z = 0, N h = nh −H, N l = nl −L, N = N h +N l optimal access class barring parameter configuration in LTE-A networks
with massive M2M traffic,” IEEE Transactions on Vehicular Technology,
0 if j ∈ H, L, Φ vol. 67, no. 4, pp. 3505–3520, 2017.
2: p̂h
j = ph
j
[14] M. Alvi, K. M. Abualnaja, W. T. Toor, and M. Saadi, “Performance
P otherwise analysis of access class barring for next generation IoT devices,”
i∈X phi Alexandria Engineering Journal, vol. 60, no. 1, pp. 615–627, 2021.
0 if j ∈ H, L, Φ [15] S. Duan, V. Shah-Mansouri, and V. W. Wong, “Dynamic access class
3: p̂lj = plj barring for M2M communications in LTE networks,” in 2013 IEEE
P l otherwise Global Communications Conference (GLOBECOM). IEEE, 2013, pp.
i∈X pi
4: K ← F IND C OMBINATIONS(X, N, empty list) 4747–4752.
5: for each k in K do [16] H. Zhang, M. Jiang, X. Liu, X. Wen, N. Wang, and K. Long, “PPO-
6: I ← F IND C OMBINATIONS H(X, N h , k, empty list) based PDACB traffic control scheme for massive IoV communications,”
IEEE Transactions on Intelligent Transportation Systems, 2022.
7: for each i in N do [17] H. Wu, C. Zhu, R. J. La, X. Liu, and Y. Zhang, “Fast adaptive S-ALOHA
8: Initialization: z ′ = 1, p = 1, N h , N l , p̂hj , p̂lj scheme for event-driven machine-to-machine communications,” in 2012
9: for each j in X do IEEE vehicular technology conference (VTC Fall). IEEE, 2012, pp.
h h
10: z′ ← z ′ × Ni (p̂hj )ip (1 − p̂hj )N −ip ×
p
1–5.
Nl
l kp −ip l [18] O. Galinina, A. Turlikov, S. Andreev, and Y. Koucheryavy, “Stabilizing
kp −ip
(p̂j ) (1 − p̂lj )N −kp +ip multi-channel slotted aloha for machine-type communications,” in 2013
11: N h ← N h − ip , N l ← N l − (kp − ip ) IEEE International Symposium on Information Theory. IEEE, 2013,
12: h
p̂j ← 0, l
p̂j ← 0 pp. 2119–2123.
p̂h p̂l [19] Z. Wang and V. W. Wong, “Optimal access class barring for stationary
13: p̂hm ← PM m h ,
p̂
p̂lm ← PM m l
p̂
for m 6= j machine type communication devices with timing advance information,”
k=1 k k=1 k
k6=j k6=j IEEE Transactions on Wireless communications, vol. 14, no. 10, pp.
14: p←p+1 5374–5387, 2015.
15: z ← z + z′ [20] M. Polese, M. Centenaro, A. Zanella, and M. Zorzi, “M2M massive
access in LTE: RACH performance evaluation in a smart city scenario,”
16: At the end of the kth iteration z holds P X H, L, Φ .
in 2016 IEEE International Conference on Communications (ICC).
ieee, 2016, pp. 1–6.
[2] M. Condoluci, M. Dohler, G. Araniti, A. Molinaro, and K. Zheng, [21] D. H. Morais, “5G NR overview and physical layer,” in Key 5G/5G-
“Toward 5G densenets: architectural advances for effective machine-type Advanced Physical Layer Technologies: Enabling Mobile and Fixed
communications over femtocells,” IEEE Communications Magazine, Wireless Access. Springer, 2024, pp. 233–321.
vol. 53, no. 1, pp. 134–141, 2015. [22] J.-P. Cheng, C.-h. Lee, and T.-M. Lin, “Prioritized random access with
[3] D. T. Wiriaatmadja and K. W. Choi, “Hybrid random access and dynamic access barring for RAN overload in 3GPP LTE-A networks,”
data transmission protocol for machine-to-machine communications in in 2011 IEEE GLOBECOM Workshops (GC Wkshps). IEEE, 2011, pp.
cellular networks,” IEEE Transactions on Wireless Communications, 368–372.
vol. 14, no. 1, pp. 33–46, 2014. [23] T.-M. Lin, C.-H. Lee, J.-P. Cheng, and W.-T. Chen, “PRADA: Prioritized
[4] C.-H. Wei, G. Bianchi, and R.-G. Cheng, “Modeling and analysis random access with dynamic access barring for MTC in 3GPP LTE-A
of random access channels with bursty arrivals in OFDMA wireless networks,” IEEE Transactions on Vehicular Technology, vol. 63, no. 5,
networks,” IEEE Transactions on Wireless communications, vol. 14, pp. 2467–2472, 2014.
no. 4, pp. 1940–1953, 2014. [24] 3GPP, “Study on RAN improvements for machine type communica-
[5] O. Arouk, A. Ksentini, and T. Taleb, “How accurate is the RACH tions,” TR 37.868, Tech. Rep., 2011.
procedure model in LTE and LTE-A?” in 2016 International Wireless
Communications and Mobile Computing Conference (IWCMC). IEEE,
2016, pp. 61–66.
[6] L. Tello-Oquendo, V. Pla, I. Leyva-Mayorga, J. Martinez-Bauset,
V. Casares-Giner, and L. Guijarro, “Efficient random access channel
evaluation and load estimation in LTE-A with massive MTC,” IEEE
Transactions on Vehicular Technology, vol. 68, no. 2, pp. 1998–2002,
2018.
[7] J. Sun, R. Liu, and E. Paolini, “Detecting the number of active users
in IRSA access protocols,” in 2018 IEEE 29th Annual International
Symposium on Personal, Indoor and Mobile Radio Communications