Multiple Access Technologies for Cellular M2M Communications

来源 :ZTE Communications | 被引量 : 0次 | 上传用户:stslayer
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
  Abstract
  This paper reviews the multiple access techniques for machine?to?machine (M2M) communications in future wireless cellular networks. M2M communications aims at providing the communication infrastructure for the emerging Internet of Things (IoT), which will revolutionize the way we interact with our surrounding physical environment. We provide an overview of the multiple access strategies and explain their limitations when used for M2M communications. We show the throughput efficiency of different multiple access techniques when used in coordinated and uncoordinated scenarios. Non?orthogonal multiple access (NOMA) is also shown to support a larger number of devices compared to orthogonal multiple access techniques, especially in uncoordinated scenarios. We also detail the issues and challenges of different multiple access techniques to be used for M2M applications in cellular networks.
  Keywords
  Internet of Things (IoT); massive access; machine?to?machine (M2M) communications; multiple access
  1 Introduction
  amchine?to?machine (M2M) communications is expected to become an integral part of cellular networks in the near future. In M2M communications a large number of multi?role devices, such as sensors and actuators, wish to communicate with each other and with the underlying data transport infrastructure. To enable such massive communication in wireless networks, major shifts from current protocols and designs are necessary [1]. Current wireless networks that have been mainly designed and engineered for human?based applications, such as voice, video, and data, cannot be used for M2M communications due to the different nature of their traffic and service requirements [2]. These differences have posed many questions and challenges in the communication society, in both industry and research sectors.
  M2M communications aims at providing the communication infrastructure for emerging Internet of Things (IoT) and involves the enabling of seamless information exchange between autonomous devices without any human intervention. M2M devices can be either stationary, such as smart meters, or mobile, such as fleet management devices, and they can connect to the network infrastructure using either wired or wireless links. Key challenges of massive M2M communications can be listed as follows [3]:
  1) Device cost: For the mass deployment of M2M communications, low cost devices are necessary for most use cases.   2) Battery life: Most M2M devices are battery operated and replacing batteries is not practical for many applications.
  3) Coverage: Deep indoor and regional connectivity is a requirement for many applications.
  4) Scalability: Network capacity must be easily scaled to handle a large number of devices forecasted to arise in the near future.
  5) Diversity: Cellular systems must be able to support diverse service requirements for different use cases, ranging from static sensor networks to tracking systems.
  The wired solutions include cable, xDSL, and optical fiber, and can provide high reliability, high data rate, short delay, and high security. However, they are cost ineffective and do not support mobility and scalability; therefore, not appropriate for M2M applications [3]. On the other hand, Wireless capillary (i.e., short range) solutions, such as WLAN and ZigBee, can provide low cost infrastructure and scalability for most M2M applications, but they suffer from small coverage, low data rate, weak security, and severe interference. Wireless cellular, i.e., GSM, GPRS, 3G, LTE?A, WiMAX, etc., however offers excellent coverage, mobility and scalability support, and good security, and the fact that the infrastructure already exists makes it a promising solution for M2M communications [3]. Therefore, our focus in this paper is on wireless cellular solutions for M2M communications.
  The mobile industry is standardizing several low power technologies, such as extended coverage GSM (EC?GSM), LTE for machine?type communication (LTE?M), and narrow band IoT (NB?IoT). Since GSM is still the dominant mobile technology in many markets, it is expected to play a key role in the IoT due to its global coverage and cost advantages. EC?GSM enables coverage improvements of up to 20 dB with respect to GPRS on the 900 MHz band [4]. A combined capacity of up to 50,000 devices per cell on a single transceiver has been achieved by defining new control and data channels mapped over legacy GSM. LTE?M brings new power saving functionality suitable for serving a variety of IoT applications, which extend battery life to 10 years or more. NB?IoT is a self contained carrier that can be deployed with a system bandwidth of 200 kHz. These initiatives were undertaken in 3GPP Release 13 for M2M specific applications [3].
  Despite all these efforts, further improvements are required in the way that devices communicate with the base station to support a large number of devices and not jeopardizing the human?based communication quality. The multiple access (MA) techniques have been identified as a key area where improvements for M2M communications are needed. The fact that the radio access strategy in LTE is still based on random access mechanisms turns it into a potential bottleneck for the performance of cellular networks when the number of M2M devices grows [5]. Moreover, radio resources are orthogonally allocated to the users/devices in the current LTE standards, which is not effective for M2M communications when the number of devices goes very large, due to the limited number of radio resources [6].   In this paper, we consider several multiple access technologies and show their performance in coordinated and uncoordinated scenarios. Overall, coordinated strategies outperform uncoordinated ones as in coordinated strategies the base station can optimally allocate the radio resources between the devices and support a larger number of devices. We also show that the non?orthogonal multiple access (NOMA) scheme achieves the highest throughput in both coordinated and uncoordinated strategies, whereas frequency division multiple access (FDMA) has comparable performance in coordinated scenarios. This suggests that FDMA can be effectively used in coordinated scenarios to achieve maximum throughput (this has been considered by 3GPP for M2M communications in the NB?IoT solution), while in uncoordinated scenarios, NOMA strategies must be considered to effectively support a large number of devices and use the available radio resources in an efficient manner.
  The remainder of the paper is organized as follows. Section 2 represents the unique characteristics of M2M communications and its challenges in cellular networks. In Section 3, we provide an overview on different multiple access technologies. Coordinated and uncoordinated MA techniques are represented in Section 4 and 5, respectively, where we characterize their maximum achievable throughput. Practical issues for implementing MA techniques for M2M communications are presented in Section 6. Finally, Section 7 concludes the paper.
  2 M2M Communications: Characteristics
  and Challenges
  Until recently, cellular systems have been designed and engineered for human based applications, such as voice, video, and data, with a higher demand on downlink. M2M communications however has different traffic characteristics that include small and infrequent data generated from a very large number of devices, which imposes a higher traffic volume on the uplink. In addition, M2M applications have very diverse service requirements. For instance, in alarm signal applications, a small?size message must be delivered to the base station (BS) within 10 ms, while in other applications, such as smart metering, the delay of up to several hours or even a day is tolerable [7].
  Due to limited radio resources and the large number of devices involved in M2M communications, wireless networks should minimize the time wasted due to collisions or exchanging control messages. The throughput must be large enough to support a large number of devices. Control overhead must be minimized as the payload data in many M2M applications is of small size and the control overhead of conventional approaches in current cellular systems results in an inefficient M2M communications [8]. In fact, if the control overhead of a protocol is large, the effective throughput is degraded even though the physical data rate may not be affected. It is also required that the effective throughput remain high irrespective of the traffic level [9].   Scalability is another challenge in M2M communications as it is expected that a large number of devices arise in M2M scenarios. These devices have dynamic behaviour, i.e., entering and leaving the network frequently; thus the network must easily tolerate the changes in the node density with little control information exchange. Energy efficiency is also one of the most important challenges in M2M communications, as devices in many M2M applications are battery operated and long life times are expected for these devices [10]. More specifically, the energy spent on radio access and data transmission in M2M communications must be minimized to improve the energy efficiency in a large scale. For instance, in high load scenarios, exchanging control information may consume more than 50% of the total energy in IEEE 802.11 MAC protocol, which shows its ineffectiveness in dense M2M applications [9].
  In many M2M applications, the network latency is a critical factor that determines the effectiveness of the service. For instance, in intelligent transportation systems and healthcare monitoring, it is highly important to make the communication reliable and fast. Channel access delay then needs to be minimized to reduce the overall latency in M2M communications. Moreover, in cellular systems, human?to?human (H2H) devices coexist with M2M devices, and the communication protocol must be designed in such a way to not jeopardize the quality of human?based communications. Resource management and allocation are challenging tasks in M2M communications which coexist with H2H applications, as H2H applications have completely different service requirements [11].
  These unique characteristics of M2M communications introduce a number of networking challenges in cellular networks. The fundamental issue arises from the fact that most M2M applications involve a huge number of devices. The question is then how the available radio resources have to be shared among devices such that their service requirements are simultaneously met.
  3 Overview of Multiple Access Techniques
  for M2M Communications
  Multiple access techniques can be divided into two broad categories, depending on how the radio resources are allocated to the devices. These include 1) uncoordinated, where the devices transmit data using slotted random access and there is no need to establish dedicated resources, and 2) coordinated, where devices transmit on separate resources pre?allocated by the base station. In coordinated MA, the base station knows a priori the set of devices that have data to transmit. The BS can also acquire channel state information (CSI) of these devices based on which it allocates resources to optimize system throughput. CSI to the devices can be obtained by each device sending an upload pilot signal.   Multiple access techniques can be also divided into orthogonal and non?orthogonal approaches. In orthogonal MA (OMA), radio resources are orthogonally divided between devices, where the signals from different devices are not overlapped with each other. Instances of OMA (Fig. 1) are time division multiple access (TDMA), frequency division multiple access (FDMA), orthogonal frequency division multiple access (OFDMA), and single carrier FDMA (SCFDMA). First and second generation cellular systems are mainly developed using OMA approaches, which avoid intra?cell interference and simplify air interface design. However, OMA approaches have no ability to combat the inter?cell interference; therefore careful cell planning and interference management techniques are required to solve the interference problem [12].
  Non?orthogonal MA (NOMA) techniques have been adopted in second and third generation cellular systems. NOMA allows overlapping among the signals from different devices by exploiting power domain, code domain, and interleaver pattern. Code division multiple access (CDMA) is the well?known example of NOMA which has been adopted in second and third generation cellular systems. CDMA is robust against inter?cell interference, but suffers from intra?cell interference [12]. CDMA is also not suitable for data services which require high single?user rates. Rather than CDMA which exploits code domain, NOMA in current study in general exploits power domain. NOMA is also shown to provide better performance than OMA [12]. In NOMA, signals from multiple users are superimposed in the power?domain and successive interference cancellation (SIC) is used at the BS to decode the messages. It is also shown that NOMA can achieve the multiuser capacity region both in the uplink and downlink [12].
  In this paper, we compare NOMA and OMA strategies in both coordinated and uncoordinated scenarios, and show that NOMA can provide the system with higher capacity to support M2M devices, especially in the uncoordinated scenario. This is achieved by exploiting the power domain, rather than frequency?domain or time?domain as in FDMA and TDMA, respectively.
  For the analysis in this paper, we consider a single cell centered by base station and devices uniformly distributed around it in a circular region with radius [R]. The uplink load seen by the base station is modeled by a Poisson point process with mean [λ] arrivals per second. We further assume a time slotted system with a slot duration of [τs]. We perform our analysis on a typical radio resource with slot duration [τs] and bandwidth [W]. Each device packet is assumed to have a payload of [L] bits.   The channel from a device located at distance [r] from the base station is modelled by [g=(r/R)-γ] , where [γ] denotes the path loss exponent and we ignore shadowing and small scale fading [13]. The received signal?to?noise ratio (SNR) for a device transmitting with power [Pt] over bandwidth [W] is then given by [14]:
  [μr=PtPmax WWtμg], (1)
  where [Pmax] is the maximum transmit power and [μ] is the reference SNR, defined as the average received SNR from a device transmitting at maximum power [Pmax] over bandwidth [W] located at the cell edge. Without loss of generality, we assume ordered channel gain [g1≥g2≥…≥gK], where [K] is the number of devices.
  4 Coordinated Multiple Access Strategies
  In this section, we consider the coordinated multiple access strategies, i.e., TDMA, FDMA, and NOMA, and compare their throughput efficiency. In this section, we assume that the BS has perfect CSI to all the devices.
  4.1 Optimal Throughput FDMA Strategy
  In FDMA, the spectrum is partitioned between the devices and each device will transmit in a portion of the spectrum. Fig. 1b shows the FDMA strategy, where the whole spectrum has been divided between 6 devices, and each device will use its allocated bandwidth for the data transmission.
  Using Shannon’s capacity formula, the minimum bandwidth required for the transmission of [L] bits by the ith device over time [τs] is given by the solution of the following equation [13]:
  [LτsWmini=log21+μWWminigi]. (2)
  The maximum load that can be supported in a resource block of duration [τs] and bandwidth [W] is given by:
  [Kmax=maxK:i=1KWmini≤W]. (3)
  4.2 Optimal Throughput TDMA Strategy
  In TDMA, the whole spectrum is used by each device in separate time instances. Fig. 1a shows the TDMA scheme, where the same time duration is allocated for 6 devices, and each device will only transmit in its allocated time slot using the whole spectrum. TDMA is an interesting MA strategy due to its simplicity, but it is not efficient for M2M applications with a large number of devices. Moreover, with increasing the number of devices, each device’s transmission will be delayed which is not appropriate for delay?sensitive M2M applications.
  Assuming a capacity approaching code and using Shannon’s capacity equation, the time required for a device located at distance [r] from the base station to deliver its packet to the destination is given by [13]:   [τ≥LWlog2(1+μr)], (4)
  and the minimum time required to deliver the message is obtained when the device is transmitting with full power [Pmax]:
  [τmini=LWlog2(1+μgi)]. (5)
  Similar to FDMA, the maximum number of devices which can be supported in a resource block of duration [τs] and bandwidth [W] can then be found as follows:
  [Kmax=maxK:i=1Kτmini≤τs]. (6)
  4.3 Optimal Throughput NOMA Strategy
  Unlike TDMA and FDMA, devices in the NOMA strategies are assumed to transmit in the same resource block and their transmissions interfere with each other. We assume that the BS perform successive interference cancellation (SIC), where it starts the decoding with the device with the largest channel gain and treats the signals from other devices as additive noise. After decoding the first device, its signal will be removed from the received signal and the BS continues the decoding for the second device and treats the remainder as additive noise. This process is continued until all the devices are successfully decoded. Under this decoding strategy, the Shannon Capacity formula for the ith device is given by:
  [L=Wτslog21+Piμgi1+j=i+1KPiμgj], (7)
  and the required transmit power can be calculated as follows:
  [Piμgi=2LWτs-1 1+j=i+1KPiμgj]. (8)
  By substituting, [i=K], we have:
  [PK=2LWτs-1μgK], (9)
  and by going backwards and ?nding the transmit power for the ith device, we have:
  [Pi=2(K-i)LWτs 2LWτs-1μgi]. (10)
  The maximum load that the BS can support in a resource block of bandwidth [W] and duration [τs] can be found as follows:
  [Kmax=maxK:Pi≤Pmax for i=1,2,…,K]. (11)
  4.4 Comparison Between Coordinated MA Techniques
  Fig. 2 shows the maximum throughput versus arrival rates for different coordinated MA techniques. NOMA can achieve very high throughput when the arrival rate is very large. FDMA performs very close to the NOMA strategy and can support all the active devices for the arrival rates up to 14,000 packets per second. The advantage of NOMA comes from the fact that the devices can use the whole spectrum thus achieving a higher throughput compared to FDMA. Only a fraction of the spectrum is used by each device in FDMA. Also, TDMA cannot support many devices, which shows that it is not an effective MA strategy for M2M communications.
  It is clear that the time slot duration [τi] and subchannel bandwidth [Wi] cannot be arbitrarily small in TDMA and FDMA, respectively. As can be seen in Fig. 2, if we put some constraints on the minimum time slot duration or subchannel bandwidth, the number of devices which can be supported by FDMA and TDMA would be limited. For example, if the minimum time slot duration for TDMA is set to be 1 ms, the maximum number of devices which can be supported in a time slot of duration 1 s is 1000. Similarly, if the minimum subchannel bandwidth in FDMA is set to be 1 kHz, the maximum number of devices which can be supported by the BS will be 1000. This shows that in practical systems where the minimum subchannel bandwidth and time slot duration cannot be very small, the maximum throughput of TDMA and FDMA will be limited. In such cases, NOMA can bring more benefits to the system as it can support a larger number of devices without dividing the radio resource into subchannels or time slots.   5 Uncoordinated Multiple Access Strategies
  In this section, we assume that the base station does not have CSI to the devices, which is particularly the case for M2M communications with a large number of devices, where it is almost impractical for the base station to estimate the channel to every device with random activities. The only information we assume is available at the BS is the traffic load which can be obtained using different load estimation algorithms.
  5.1 Uncoordinated FDMA
  In this scheme, we assume that the base station chooses a selection probability [pc] and broadcasts this information to the devices. Each device which has data to transmit only switches on its transmitter with probability [pc]. We refer to these devices as active devices. Let [Nc] denote the number of active device. We further assume that the BS uniformly divides the spectrum into [Nw] subchannels, and each device randomly chooses a subchannel for its transmission. We also assume that each device only transmits on a selected subchannel if the maximum transmit power required to deliver its message to the BS is less than [Pmax], assuming no collision on the selected subchannel. More specifically, the ith device is transmitting in a subchannel if the following condition holds:
  [2LNwWτs-1≤Nwμgi]. (12)
  Therefore, the probability that a device is transmitting can be calculated as follows:
  [P2LNwWτs-1≤Nwμgi=Nwμ2LNwWτs-12γ], (13)
  which is due to the fact that the devices are uniformly distributed in the cell and the probability that a device is located at distance [r] is given by [2rR2]. The average number of active devices which can deliver their messages, considering no collision, can be found as follows:
  [Np=NcNwμ2LNwWτs-12γ]. (14)
  As the devices randomly choose a sub?channel for their transmission, more than one device can select the same subchannel, which leads to collision. The base station cannot decode any of the devices that are simultaneously transmitting on that particular subchannel. The probability of collision can be calculated as follows [14]:
  [Pc=1-1-1NwNp-1]. (15)
  The average number of devices which can successfully deliver their messages to the BS is given by [NP(1-Pc)]. We assume that the BS finds the optimal values for [pc] and [Nw] such that the number of devices which can be supported by the BS is maximized.
  5.2 Uncoordinated TDMA
  Similar to FDMA, we assume that the BS assigns an access probability [pc] to the devices. Let [Nc] denote the number of active device. We further assume that the BS uniformly divides the time into [Nt] time slots, and each device randomly chooses a time slot for its transmission. We also assume that the each device only transmits in a selected time slot if the maximum transmit power required to deliver its message to the BS is less than [Pmax], assuming no collision on the selected time slot. More specifically, the ith device is transmitting in a time slot, if the following condition holds:   [2LNtWτs-1≤μgi]. (16)
  Therefore, the probability that a device is transmitting can be calculated as follows:
  [p2LNtWτs-1≤μgi=μ2LNtWτs-12γ], (17)
  which is due to the fact that the devices are uniformly distributed in the cell and the probability that a device is located at distance [r] is given by [2r/R2]. The average number of active devices which can deliver their messages, considering no collision, can be found as follows:
  [Np=Ncμ2LNtWτs-12γ]. (18)
  The average number of devices which can successfully deliver their messages to the BS is given by [NP(1-Pc)], where [Pc] is given by (15) by replacing [Nw] with [Nt]. We assume that the BS finds the optimal values for [Pc] and [Nt] such that the number of devices which can be supported by the BS is maximized.
  5.3 Uncoordinated NOMA
  We consider that each device performs power control such that the received SNR at the BS for each device is [γ0]. A device will only transmit if and only if the transmit power required to achieve the SNR [γ0] at the base station is less than [Pmax]. Let [Np] denote the number of devices which can transmit, i.e., their required transmit power is less than [Pmax]. The achievable rate for the devices considering the successive interference cancellation at the BS can be calculated as follows:
  [Rmin=log21+γ01+(Np-1)γ0]. (19)
  A message of length [L] can be delivered by [Np] devices if [WτsRmin≥L]. Using (19), the required SNR [γ0] for successfully delivering a message of length [L] at the BS is derived as follows:
  [γ0=112LWτs-1-Np]. (20)
  Accordingly, the number of devices which can be supported at the BS is upper bounded as follows:
  [Np≤12LWτs-1]. (21)
  5.4 Comparison Between Uncoordinated MA Techniques
  Fig. 3 shows the maximum number of devices which can be supported by the base station versus different arrival rates for uncoordinated MA strategies. The minimum time slot duration for TDMA is considered to be 1 ms, which corresponds to [Nt=1000], and the minimum subchannel bandwidth in FDMA is considered to be 1 kHz, which corresponds to [Nw=1000]. As shown in this figure, NOMA can support much larger number of devices compared to the FDMA and TDMA strategies. This is due to the high collision probability in uncoordinated FDMA and TDMA in high arrival rates, while in NOMA a large number of devices can simultaneously transmit in the same resource block by exploiting the power domain. This shows the advantage of NOMA in uncoordinated scenarios. Therefore, NOMA can be an excellent choice for M2M applications with a large number of devices and random traffic. Moreover, FDMA outperforms TDMA in moderate loads but they perform similarly in low and high arrival rates.   It is important to note that in NOMA the constraints on minimum time slot duration or subchannel bandwidth do not affect the throughput efficiency. This is due to the fact that in NOMA all the devices are transmitting in the whole bandwidth in all slot duration. One could consider some limitations in the minimum power difference between the devices, which mostly depends on the hardware capability to distinguish different power levels which is out of scope of this paper.
  6 Practical Considerations of Massive
  NOMA for M2M Communications and
  Future Directions
  NOMA can bring many benefits to cellular systems which include, but are not limited to, the following. NOMA can effectively use the spectrum and provide higher throughput by exploiting power domain and non?orthogonal multiplexing. It also provides robust performance gain in high mobility scenarios. NOMA is also compatible with OFDMA and can be applied on top of OFDMA for downlink and SC?FDMA for uplink. It can be also combined with multi?antenna techniques to improve the system performance. Using NOMA, multiple users can simultaneously transmit in the same subband without being identified by the destination a priori. The devices can attach their terminal identities to their messages and the base station can identify the devices after decoding their messages. The RA procedure can be eliminated and therefore the access delay and signaling overhead will be significantly reduced [12].
  Although NOMA can improve spectrum efficiency and system capacity, there are many practical challenges for this technology to be potentially used in real wireless systems for M2M communications. Here, we outline the main practical consideration of massive NOMA for M2M communications.
  First, in uncoordinated strategies the base station needs to estimate the arrival rate to effectively detect the devices. In uncoordinated FDMA, the BS needs to know the number of devices to find the optimal access probability and the number of subbands. In NOMA, the problem is much more complicated as the BS runs the SIC and needs to know the number of devices with different power levels. For simplicity, one could consider that the devices perform power control such that only one power level is received at the BS, but this may have some implications on the actual performance of the system as the overall system data rate will be dominated by the device with the lowest SINR; and thus will not effectively use the available spectrum. However, even with this simplification and suboptimal power allocations, NOMA outperforms FDMA in uncoordinated scenarios and can support a large number of devices under high loads.   Second, channel estimation at the devices is necessary in uncoordinated strategies employing NOMA techniques. This is due to the fact that the devices are not identified by the BS beforehand and they are simultaneously transmitting at the same resource block. To enable the BS to detect the devices and decode their messages, the devices need to perform channel estimation and adjust their power so the BS only deals with some known power levels rather than unknown channel gains. On the other hand, to effectively perform SIC, the multipath effect must be carefully taken into consideration as multipath will spread the signal over time, which decreases the effective signal to noise ratio for each device, and makes the BS unable to perform SIC. One can consider several techniques, such as time reversion [15], to eliminate the multipath effect by treating the channel between each device and the BS as the natural match filter. This has been shown an effective way to combat multipath effect for several fixed location M2M applications [16].
  Third, NOMA requires synchronization among the devices at the symbol level. This is very challenging as providing time synchronicity between a large number of devices distributed in a large environment is tedious. However, the devices in many M2M applications are deployed in fixed locations, so each device can determine its propagation delay using different distance estimation strategies or using control information periodically sent by the BS.
  Fourth, as the number of devices transmitting in each resource block in uncoordinated NOMA is random, the physical data rate cannot be determined beforehand. One could consider a very low rate code at each device, but it might be inefficient when used in low?to?moderate loads. An effective strategy is then to use rateless codes to automatically adapt to the traffic condition. Authors in [17] have proposed to use analog fountain codes to enable massive multiple access for M2M communications and achieve very high throughput even in high loads. Moreover, as shown in [18], binary rateless codes can be effectively used to enable NOMA for M2M communications. These coding strategies were mainly proposed to maximize the throughput in M2M communications and for delay sensitive applications with very short messages, more advanced coding techniques should be combined with rateless ideas to enable low latency massive multiple access in M2M communications.
  Last but not least, NOMA is still in its early stage of its development and more research work must be done to clearly identify its effectiveness in real scenarios. From an information theoretic point of view, it achieves the capacity region of the multiple access channel and thus is optimal in terms of throughput. But in real M2M applications when NOMA is jointly considered with medium access control layer in real world scenarios, it might not be as efficient as OMA techniques, which have been considered as effective multiple access techniques for a long time and several issues and challenges have been solved over the years.   7 Conclusions
  In this paper, we provided an overview of multiple access techniques for emerging machine?to?machine communications in cellular systems. The unique challenges of M2M communications were represented, where we identified scalability, energy efficiency, and reliability, as the most important features for every potential multiple access technology which is considered for M2M communications. We provided a simple study on the throughput efficiency of multiple access techniques in both coordinated and uncoordinated scenarios. NOMA was shown to provide the highest throughput in both coordinated and uncoordinated scenarios, whereas FDMA has shown comparable performance with NOMA in coordinated scenarios. NOMA is shown to be scalable in uncoordinated scenarios and can support a large number of devices. It can be also combined with different access management schemes to control the load over the base station. We also provided some of the practical issues in NOMA which needed to be considered for the use of NOMA strategies for M2M communications in future cellular systems.
  References
  [1] H. Shariatmadari, R. Ratasuk, S. Iraji, et al., “Machine?type communications: current status and future perspectives toward 5G systems,” IEEE Commununications Magazine, vol. 53, no. 9, pp. 10-17, Sept. 2015. doi: 10.1109/MCOM.2015.
  7263367.
  [2] G. Wu, S. Talwar, K. Johnsson, N. Himayat, and K. Johnson, “M2M: From mobile to embedded internet,” IEEE Commununications Magazine, vol. 49, no. 4, pp. 36-43, Apr. 2011. doi: 10.1109/ MCOM.2011.5741144.
  [3] Ericsson. (Jan. 2016). Cellular networks for massive IoT. Tech. Rep. Uen 284 23?3278 [Online]. Available: https://www.ericsson.com/res/docs/whitepapers/wp iot.pdf
  [4] Service Requirements for Machine?Type Communications (MTC); Stage 1, 3GPP TS 22.368 V.13.0.0, Jun. 2014.
  [5] A. Laya, L. Alonso, and J. Alonso?Zarate, “Is the random access channel of LTE and LTE?A suitable for M2M communications? a survey of alternatives,” IEEE Commununications Surveys & Tutorials, vol. 16, no. 1, pp. 4-16, 2014. doi:
  10.1109/SURV.2013.111313.00244.
  [6] G. Naddafzadeh?Shirazi, L. Lampe, G. Vos, and S. Bennett, “Coverage enhancement techniques for machine?to?machine communications over LTE,” IEEE Communications Magazine, vol. 53, no. 7, pp. 192-200, Jul. 2015. doi: 10.1109/MCOM.2015.7158285.
  [7] A. Zanella, N. Bui, A. Castellani, L. Vangelista, and M. Zorzi, “Internet of things for smart cities,” IEEE Internet of Things Jounral, vol. 1, no. 1, pp. 22-32, Feb. 2014. doi: 10.1109/JIOT.2014.2306328.   [8] D. Wiriaatmadja and K. W. Choi, “Hybrid random access and data transmission protocol for machine?to?machine communications in cellular networks,” IEEE Transactions on Wireless Communications, vol. 14, no. 1, pp. 33-46, Jan. 2015. doi: 10.1109/TWC.2014.2328491.
  [9] A. Rajandekar and B. Sikdar, “A survey of MAC layer issues and protocols for machine?to?machine communications,” IEEE Internet of Things Journal, vol. 2, no. 2, pp. 175-186, Apr. 2015. doi: 10.1109/JIOT.2015.2394438.
  [10] M. Hasan, E. Hossain, and D. Niyato, “Random access for machine?to?machine communication in LTE?advanced networks: issues and approaches,” IEEE Communications Magazine, vol. 51, no. 6, pp. 86-93, Jun. 2013. doi: 10.1109/MCOM.2013.6525600.
  [11] K. Zheng, S. Ou, J. Alonso?Zarate, et al., “Challenges of massive access in highly dense LTE?advanced networks with machine?to?machine communications,” IEEE Wireless Communications Magazine, vol. 21, no. 3, pp. 12-18, Jun. 2014. doi: 10.1109/MWC.2014.6845044.
  [12] A. Li, Y. Lan, X. Chen, and H. Jiang, “Non?orthogonal multiple access (NOMA) for future downlink radio access of 5G,” China Communications, vol. 12, Supplement, pp. 28-37, Dec. 2015.
  [13] H. S. Dhillon, H. C. Huang, H. Viswanathan, and R. A. Valenzuela, “Power?efficient system design for cellular?based machine?to?machine communications,” IEEE Transactions on Wireless Communications, vol. 12, no. 11, pp. 5740-5753, Nov. 2013. doi: 10.1109/TWC.2013.100713.130025.
  [14] H. S. Dhillon, H. C. Huang, H. Viswanathan, and R. A. Valenzuela, “Fundamentals of throughput maximization with random arrivals for M2M communications,” IEEE Transactions on Communications, vol. 62, no. 11, pp. 4094-4109, Nov. 2014. doi: 10.1109/TCOMM.2014.2359222.
  [15] B. Wang, Y. Wu, F. Han, Y. H. Yang, and K. J. R. Liu, “Green wireless communications: A time?reversal paradigm,” IEEE Journal on Selected Areas in Communications, vol. 29, no. 8, pp. 1698-1710, Sept. 2011. doi: 10.1109/JSAC.
  2011.110918.
  [16] Y. Chen, F. Han, Y. H. Yang, et al., “Time?reversal wireless paradigm for green internet of things: An overview,” IEEE Internet of Things Jounral, vol. 1, no. 1, pp. 81-98, Feb. 2014. doi: 10.1109/JIOT.2014.2308838.
  [17] M. Shirvanimoghaddam, Y. Li, M. Dohler, B. Vucetic, and S. Feng, “Probabilistic rateless multiple access for machine?to?machine communication,” IEEE Transactions on Wireless Communications, vol. 14, no. 12, pp. 6815 -6826, Dec. 2015. doi: 10.1109/TWC.2015.2460254.   [18] M. Shirvanimoghaddam, S. J. Johnson, and M. Dohler. (2016). An efficient massive access strategy based on superposition Raptor codes for M2M communications. CoRR [Online]. Available: http://arxiv.org/pdf/1602.05671v1.pdf
  Manuscript received: 2016?06?30
  Biographies
  Mahyar Shirvanimoghaddam (fmahyar.shirvanimoghaddam@newcastle.edu.au) received the BSc degree with 1st Class Honours from University of Tehran, Iran, in September 2008, the MSc degree with 1st Class Honours from Sharif University of Technology, Iran, in October 2010, and the PhD degree from The University of Sydney, Australia, in January 2015, all in electrical engineering. He then held a research assistant position at the Centre of Excellence in Telecommunications, School of Electrical and Information Engineering, The University of Sydney, before coming to the University of Newcastle, Australia, where he is now a postdoctoral research associate at the School of Electrical Engineering and Computer Science. His general research interests include channel coding techniques, cooperative communications, compressed sensing, machine?to?machine communications, and wireless sensor networks.
  Sarah Johnson (sarah.johnsong@newcastle.edu.au) received the BE (Hons) degree in electrical engineering in 2000, and PhD in 2004, both from the University of Newcastle, Australia. She then held a postdoctoral position with the Wireless Signal Processing Program, National ICT Australia before returning to the University of Newcastle where she is now an Australian Research Council Future Fellow. Her research interests are in the ?elds of error correction coding and network information theory. She is the author of a book on iterative error correction published by Cambridge University Press.
其他文献
李鸿章是晚清最受争议的大人物。有的赞他为“中兴之臣”,有的称他为“东方俾斯麦”,有的骂他是卖国贼,有的说他是替罪羊,有的讥他是裱糊匠。李鸿章有一个显著的缺点:对其下属,往往傲慢无礼,令人反感。梁启超曾评价他:“接人常带傲慢轻侮之色,俯视一切,揶揄弄之。”可谓准确到位。   李鸿章担任两广总督时,有一天正在批阅文件,秘书递上一张名片:某县长求见。李鸿章从窗口往外望去,果见一位身着官服的人进得大院,
期刊
有项民生工程,叫“菜篮子工程”,大家一听就知道是什么意思。可是菜篮子呢,今天有几个人手上还拎着菜篮子?我不知道是否要改成“塑料袋工程”。  不过在我小时候,菜篮子却是一种实实在在的存在。  上海是醒得很早的城市,菜场是最早热闹起来的角落。天刚放出一点曙光,人们揉着惺忪的眼睛,从热烘烘的被子里爬出来,拎起菜篮,直奔小菜场。那个时候,物质匮乏,包括买肉、鱼、蛋、青菜,样样都要排队。但天还早,菜场还没开
期刊
大学里最后一堂考试前的那天下午,我路过教学楼的公示板时看到一则通报批评:我们学院同年级一个同学上午考试作弊。虽然只透露了这个同学的姓,名是由“某某”替代的,但因为那个姓不常见,因此大家一眼就能认出是谁。  我着实惊讶了一下,因为这个“某某同学”是个不折不扣的学霸,考过好几次班级第一,也是学院里的标兵和奖学金的获得者,平时看起来也是很努力的样子,难道学霸也会去作弊吗?  我很诧异,就算是没有复习好,
期刊
名师闪亮登场,全体起立鼓掌。  主持介绍名师,麦克敲的三响。  各種协会组织,担任主席会长。  职务罗列一堆,头衔念到哑嗓。  时间超过十分,课程尚未开讲。  协会大多山寨,头衔皆为虚妄。
期刊
前些天,我去英国温泽做一次交流活动。当地的一位新朋友说要带我去参观一下温泽市的风光,我慨然应允。   温泽风景很优美,整座城市简洁、干净,身处其中让人感觉心情很舒畅。朋友把我带到一座很宽大的建筑前,说这是温泽市的政府大厅,有三百多年的历史,是温泽一个很有名的景点。   从外面看,这座大厅没有什么特别的地方,但为什么会成为有名的景点呢?朋友好像看出了我的疑惑,就拉着我说:“到里面你就知道了。”朋
期刊
路边停放着一排排无人驾驶车。无人驾驶车是新时代最伟大的发明,没有之一。   如果你走过去,对着无人驾驶车下一个命令——门!无人驾驶车就会启动探测仪,在你的脸上快速扫描,同时发出清晰的语音提示:“您确定要使用我吗?确定请点头,取消请摇头。”你点一点头,车门就嘭一下打开了。   什么?你没带钱包?没关系,只管坐!无人驾驶车的系统里,早已经记录了你的一切信息:相貌、身高、血型,工作单位、家庭住址、社
期刊
“精致利己主义者”的说法,最早来自某高校一位教授的话,说的是一些大学正在培养精致的利己主义者,他们高智商、世俗老到、善于表演,懂得配合,善于利用体制达到自己的目的。一旦这些人掌握了权力,带来的危害极大。  精致利己主义者有三大特征:一是隐蔽表演性与伪君子人格,他们往往具有伪崇高性,擅长运用所谓“精致”的外衣和娴熟的手段,使利己的目的不被他人察觉。二是逐利理性与自我利益最大化,他们对权力的贪婪、名誉
期刊
《司马光砸缸》的故事广泛流传于中国民间上千年,关键就在于这故事的主旨集中,集中在人的智慧,也集中在国人的那个要害处——谁都希望自家孩子聪明非凡。于是,少年司马光成了中华儿郎学习的榜样。  一群犹如当下社会的学前儿童,趁着家长出门了,聚集在司马光家的院子里疯玩,捉迷藏、躲猫猫,爬高落低、追逐嬉戏,这是常有的事情。官衙的后院有树木,有花草,有假山,还有一眼深井和一口注满了水的大陶缸。对于一个数千年来一
期刊
美国作家马克·吐温语录:“当真相在穿鞋的时候,谎言已经跑遍了全城”。  谎言为什么跑得那么快?因为人心让耳朵对谎言不设防。  人心有恐惧,谎言就是要使你害怕。哪怕绝无可能的事,多听几次就会相信,所谓“三人成虎”。哪怕是最相信儿子的曾参母亲,三次听说“曾参杀人”,也会“投杼逾墙而走”。世间多少逃难潮因此产生,多少人踩人的惨剧只因有人虚报失火。  人心幸災乐祸,听到成功人士出了问题,或有丑闻,潜藏的妒
期刊
在民营企业担任人力资源部经理的一位朋友说,他与老板“三观”不合,觉得待在这家企业精神抑郁,不如另谋出路。  他的薪水其实不错,企业前景也尚可,与老板还是校友,之所以与老板“交恶”,缘起招聘。去年企业上了一条生产线,急需一批管理人员,从去年夏天开始,人力资源部总共组织了十一次招聘,省、市招聘会场场不落,但招到的人离职率很高,大都上岗才几个月,就离开了,这条生产线运行一直不正常。  老板很着急,一着急
期刊