Login | Register

Modelling of a Hybrid MAC Protocol for M2M Communications

Title:

Modelling of a Hybrid MAC Protocol for M2M Communications

Keyvan Ghazvini, Farshad (2017) Modelling of a Hybrid MAC Protocol for M2M Communications. Masters thesis, Concordia University.

[thumbnail of Keyvan Ghazvini-MASc-S2017.pdf]
Preview
Text (application/pdf)
Keyvan Ghazvini-MASc-S2017.pdf - Accepted Version
1MB

Abstract

Machine-to-machine (M2M) communications is one of the enabling technologies for connecting massive number of devices to the Internet of Things (IoT). M2M communications have different characteristics than human-to-human (H2H) communications. In this work, we propose a scalable, hybrid MAC protocol that will satisfy user quality-of-service (QoS) requirements.
We model both periodic and nonperiodic traffic. The proposed MAC protocol organizes transmissions into superframes consisting of a number of frames. A machine is assumed to generate a one or zero packet per its period. The machines have been divided into several types according to their packet generation probabilities. The generated packets are classified into different traffic classes according to their tolerance to packet losses and served by a subframe. Further, each subframe is divided into two sub-periods one serving contention and the other reserved traffic of that traffic class. We formulated an optimization problem that minimizes frame length subject to QoS user requirements. Then, we derived packet loss probability for each class as well as total packet loss probability for the optimization. Formulation resulted in a nonlinear optimization problem, but numerical results show that an LP approximation provides a nearly optimal solution.
The work also considered the proposed protocol under user mobility. The packet arrival process under user mobility has been derived. Then the performance of the protocol has been evaluated with the contention service under this arrival process. The contention service with and without packet losses have been considered. A priority queueing mechanism also has been studied for M2M communication. The results of this thesis may be useful in the design of M2M communication system.

Divisions:Concordia University > Gina Cody School of Engineering and Computer Science > Electrical and Computer Engineering
Item Type:Thesis (Masters)
Authors:Keyvan Ghazvini, Farshad
Institution:Concordia University
Degree Name:M.A. Sc.
Program:Electrical and Computer Engineering
Date:April 2017
Thesis Supervisor(s):Mehmet Ali, Mustafa
Keywords:M2M communications; MAC protocol; optimization; frame structure; contention;reservation; packet loss probability.
ID Code:982407
Deposited By: FARSHAD KEYVAN GHAZVINI
Deposited On:09 Jun 2017 14:13
Last Modified:18 Jan 2018 17:55

References:

References
[1] A. Aijaz and A. H. Aghvami. “A PRMA based MAC protocol for cognitive machine-to-machine communications”. Presented at Communications (ICC), 2013 IEEE International Conference on. 2013 DOI: 10.1109/ICC.2013.6654955.
[2] F. V. Azquez-Gallego, J. Alonso-Zarate, I. Balboteo and L. Alonso. “DPCF-M: A medium access control protocol for dense machine-to-machine area networks with dynamic gateways”. Presented at Signal Processing Advances in Wireless Communications (SPAWC), 2013 IEEE 14th Workshop on. 2013, . DOI: 10.1109/SPAWC.2013.6612098.
[3] Chen-Yu Hsu, Chi-Hsien Yen and Chun-Ting Chou. “An adaptive multichannel protocol for large-scale machine-to-machine (M2M) networks”. Presented at Wireless Communications and Mobile Computing Conference (IWCMC), 2013 9th International. 2013, . DOI: 10.1109/IWCMC.2013.6583731.
[4] Chul Wan Park, Duckdong Hwang and Tae-Jin Lee. “Enhancement of IEEE 802.11ah MAC for M2M communications”. Communications Letters, IEEE 18(7), pp. 1151-1154. 2014. . DOI: 10.1109/LCOMM.2014.2323311.
[5] Guo Wang, Xiaofeng Zhong, Shunliang Mei and Jing Wang. “An adaptive medium access control mechanism for cellular based machine to machine (M2M) communication”. Presented at Wireless Information Technology and Systems (ICWITS), 2010 IEEE International Conference on. 2010, . DOI: 10.1109/ICWITS.2010.5611820.
[6] Huasen Wu, Chenxi Zhu, R. J. La, Xin Liu and Youguang Zhang. “Fast adaptive S-ALOHA scheme for event-driven machine-to-machine communications”. Presented at Vehicular Technology Conference (VTC Fall), IEEE, 2012. DOI: 10.1109/VTCFall.2012.6398917.
[7] Y. Liu, C. Yuen, X. Cao, N. U. Hassan, and J. Chen, “Design of a scalable hybrid MAC protocol for heterogeneous M2M networks,” IEEE Internet Things J., vol.1, no.1, pp. 99–111, 2014.
[8] A. Lo, Y. W. Law, M. Jacobsson and M. Kucharzak. “Enhanced LTE-advanced random-access mechanism for massive machine-to-machine (M2M) communications”. Presented at 27th World Wireless Research Forum (WWRF) Meeting, 2011.
[9] N. K. Pratas, H. Thomsen, C. Stefanovic and P. Popovski. “Code-expanded random access for machine-type communications”. Presented at Globecom Workshops (GC Wkshps), 2012 IEEE. 2012, . DOI: 10.1109/GLOCOMW.2012.6477838.
[10] Yi Liu, Chau Yuen, Jiming Chen and Xianghui Cao. “A scalable hybrid MAC protocol for massive M2M networks”. Presented at Wireless Communications and Networking Conference (WCNC), 2013 IEEE. 2013, . DOI: 10.1109/WCNC.2013.6554572.
[11] Yu Chen and Wei Wang. “Machine-to-machine communication in LTE-A”. Presented at Vehicular Technology Conference Fall (VTC 2010-Fall), 2010 IEEE 72nd, 2010. DOI: 10.1109/VETECF.2010.5594218.
[12] C.L. Fullmer and J.J. Garcia-Luna-Aceves, “Floor acquisition multiple access (FAMA) for packet-radio networks”, in: Proc. ACM SIGCOMM 95, Cambridge, MA (August 28–September 1, 1995).
[13] G. Wang, X. Zhong, S. Mei, and J. Wang, “An adaptive medium access control mechanism for cellular based Machine to Machine (M2M) communication,” in Proc. of IEEE ICWITS 2010, 2010.
[14] G. Khandelwal, K. Lee, A. Yener, and S. Serbetli, “ASAP: A MAC protocol for dense and time-constrained RFID systems,” EURASIP J. Wireless Commun. Netw., vol. 2007, no. 2, pp. 18 730-1–18 730-13, Jan. 2007.
[15] D. Tarchi, R. Fantacci, and D. Marabissi, “Proposal of a cognitive based MAC protocol for M2M environments,” in Proc. 24th IEEE Int. Symp. Personal Indoor Mobile Radio Commun. (PIMRC), 2013, pp. 1609– 1613.
[16] I. Park, D. Kim, and D. Har. "MAC achieving low latency and energy efficiency in hierarchical M2M networks with clustered nodes." IEEE Sensors Journal 15.3, 2015, 1657-1661.
[17] A. Azari and G. Miao. “Energy efficient MAC for cellular-based M2M communications”. Presented at Signal and Information Processing (GlobalSIP), 2014 IEEE Global Conference on. 2014, . DOI: 10.1109/GlobalSIP.2014.7032092.
[18] P. K. Verma, R. Tripathi and K. Naik. “A robust hybrid-MAC protocol for M2M communications”. Presented at Computer and Communication Technology (ICCCT), 2014 International Conference on. 2014, . DOI: 10.1109/ICCCT.2014.7001503.
[19] Boswarthick D, Elloumi O, Hersent O, editors. M2M communications: a systems approach. John Wiley & Sons; 2012 Mar 14.
[20] H. Shariatmadari, et al., “Machine-Type Communications: Current Status and Future Perspectives Toward 5G Systems”, IEEE Communications Magazine, Comm. Standards Supplement, pp. 10-17, Sept. 2015.
[21] C. Kahn, H. Viswanathan, “Connectionless Access for Mobile Cellular Networks”, IEEE Communications Magazine, Comm. Standards Supplement, pp. 26-31, Sept. 2015.
[22] S. Andrew et al., “Efficient Small Data Access for Machine-Type Communications in LTE”, Proceedings of ICC, pp. 3569-74, June 2013.
[23] J.J Nielson et al., ” What Can Wireless Cellular Technologies Do About the Smart Metering Traffic?”, IEEE Communications Magazine, Comm. Standards Supplement, pp. 41-47, Sept. 2015.
[24] C. Pereira and A. Aguiar,”Towards Efficient Mobile M2M Communications: Survey and Open Challenges”, Sensors, 14, 19582-19608; doi:10.3390/s141019582, 2014.
[25] A. Rajandekar and B. Sikdar,”A Survey of MAC Layer Issues and Protocols for Machine-to-Machine Communications”, IEEE Internet of Things Journal for Machine-to-Machine Communications, Vol. 2, No. 2, pp.175-186, April 2015.
[26] C. Karuupongsiri, K. Munasinghe, and A. Jamalipour, “ Smart Meter Packet Transmission via the Control Signal of LTE Networks”, IEEE ICC-Mobile and Wireless Networking Symposium, pp. 2291-2996, 2015.
[27] G. M. Madueno et al.,”Massive M2M Access with Reliability Guarantees in LTE Systems”, IEEE ICC-Mobile and Wireless Networking Symposium, pp. 2297-3002, 2015.
[28] A. Gotsis, A. Lioumpas and A. Alexiou, “M2M Scheduling Over LTE”, IEEE Vehicular Technology Magazine, pp. 34—39, Sept. 2012.
[29] A. Leon-Garcia and I. Widjaja, “Communication Networks”,McGraw Hill, 2nd ed., 2004.
[30] Boswarthick, David, Omar Elloumi, and Olivier Hersent, eds. M2M communications: a systems approach. John Wiley & Sons, 2012.
[31] J. Kim, J. Kim, & B. Kim, “Analysis of the M/G/1 queue with discriminatory random order service policy” Performance Evaluation, 68(3), 256-270, Mar. 2011.
[32] J. Kaufman, ‘’Blocking in a shared resource environment’’ IEEE Transactions on communications, 29(10), 1474-1481, 1981.
[33] J.F. Hayes, & T.V.G. Babu, Modeling and analysis of telecommunications networks. John Wiley & Sons, 2004.
All items in Spectrum are protected by copyright, with all rights reserved. The use of items is governed by Spectrum's terms of access.

Repository Staff Only: item control page

Downloads per month over past year

Research related to the current document (at the CORE website)
- Research related to the current document (at the CORE website)
Back to top Back to top