Recursive Access Class Barring for Machine Type Communications with PUSCH Resource Constraints

Han Seung Jang, Hu Jin, Bang Chul Jung, Tony Q.S. Quek

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

In massive cellular internet-of-things (IoT) networks, periodic and sporadic traffic may be well processed, while bursty traffic may cause an unexpected network congestion or overload problem. Thus, in this paper, we propose a generalized random access (RA) control mechanism considering whole steps of RA procedure and available resources at each step for handling bursty traffic in cellular IoT networks. The proposed RA control mechanism mainly consists of the estimation method for the number of backlogged nodes and the computation method for access class barring (ACB) factors. Through extensive computer simulations, the proposed RA control mechanism shows the enhanced performance in terms of the total service time, the average access delay, and the energy efficiency, compared to the conventional RA control mechanism, which only focuses on controlling preamble transmissions at the first step of the RA procedure.

Original languageEnglish
Title of host publication2019 IEEE International Conference on Communications, ICC 2019 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781538680889
DOIs
Publication statusPublished - 2019 May
Event2019 IEEE International Conference on Communications, ICC 2019 - Shanghai, China
Duration: 2019 May 202019 May 24

Publication series

NameIEEE International Conference on Communications
Volume2019-May
ISSN (Print)1550-3607

Conference

Conference2019 IEEE International Conference on Communications, ICC 2019
Country/TerritoryChina
CityShanghai
Period19-05-2019-05-24

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Recursive Access Class Barring for Machine Type Communications with PUSCH Resource Constraints'. Together they form a unique fingerprint.

Cite this