SlideShare a Scribd company logo
1 of 4
Design of Persistence Probability in the M2M Random Access
Network 1
Design of Persistence Probability
in the M2M Random Access Network 何浩平 B97901049
陳姵伶 B97901075
Introduction
Figure 1 M2M network [1]
• For example: weather prediction
- Sensors send data every second.
- Delay needs to be minimized.
- Power of sensors is limited.
• Random access: machines compete for limited
channels.
• Persistence probability pm : a base station will
broadcast pm to decide how many machines can start
random access.
• pm plays an important role in performance of random
access.
[1] TelecomTV: http://www.telecomtv.com
System Model
We use the random access channel and the random-access
procedure in UMTS-LTE. Since we consider a scenario under
M2M network, there are some assumptions as follows.
1. Bursting arrival of all machines happens at a time and
each machine has only a set of data to send.
2. Before they doing random access, they should randomly
pick up a q=[0, 1], if q is smaller than the pm, then a
machine can start the random access. Otherwise, it’ll
retry in the next slot until it successfully transmits.
3. When only one machine chooses a specific preamble, the
machine is considered to be successful, and can start to
transmit.
4. Backoff system is not considered since its effect is
somewhat the same as persistence probability.
Theorem
A. Compete for preambles
Except for the process of comparing to pm, at the procedure of
random access, we define ! k | n,P( ) as a probability that k
among v machines can start to transmit their packets under a total
of P preambles
! k | n,P( )=
1
Pv
Ck
P
Ck
v
k! "1( )m
Cm
P"k
Cm
v"k
m! P " k " m( )v"k"m
m=0
min v"k, P"k( )
#
where min v " k, P " k( )$ 0
(1)
Using the principle of inclusion and exclusion can derive this
equation. Since there’re only k preambles being uniquely chosen,
each of last preambles should contain more than 2 machines.
With the above equation, we can derived the expected
successful number:
E[ k | n,P( )] = v 1!
1
P
"
#$
%
&'
v!1
(2)
To find the maximal v given P, we have:
d
dv
v 1!
1
P
"
#$
%
&'
v!1
= 0
(3)
voptimal =
!1
ln(1! 1
P)
(4)
Later, our analysis will use equation (4) again.
B. Markov Chain Analysis
Based on the assumptions mentioned in the section of System
Model, it can be seen that the number of contending machines
Design of Persistence Probability in the M2M Random Access
Network 2
forms a finite discrete Markov chain. Here we use the same
concept as [2] to solve the problem.
The probability of transition from state u to v is:
tuv =
B i,u, pm( )! u " v | i,P( )i=u"v
u
# v $ u, u % 0, pm & 0,1( )
! u " v | u,P( ) v $ u, u % 0, pm = 1
0 v > u or pm = 0
1 u, v = 0
'
(
)
))
*
)
)
)
(5)
Clearly, there is one absorbing state (0). Given the current
state M (M machines come in the first slot), the mean delay of the
system aM is:
aM =
1
1! tMM
1+ tMkak
k=1
M !1
"
#
$%
&
'(
(6)
With this equation, we can implement dynamic programming
to find an optimal set of pm to let aM minimize.
[2] M. Lotfinezhad, B. Liang and E. S. Sousa, “Adaptive Cluster-Based Data
Collection in Sensor Networks with Direct Sink Access” IEEE
Transactions on Mobile Computing, 7 (7) (2008), pp. 884–897
Design
Method A:
Using equation (6), we can implement dynamic algorithm to
find an optimal set of pm to let aM minimize.
Method B: (UMTS with pm, and consider the backoff system [3])
Based on equation (6), for a specific machine number M, we
find a best pm to let aM minimize.
Method C:
Combine equation (4) and equation (6), we can find a set of
pm to let aM close to the result of Method A.
[3] 3GPPTS25.321V5.14.0,Third-GenerationPartnershipProject;Medium Access
Control (MAC) Protocol Specification, Sophia-Antipolis, France, Sep. 2008.
Estimation of the Machine Number
Since the Method A, B and C need some feedback of
estimation of contending machine number, here we provide a
method to solve this problem.
A base station will accurately know that the number of empty
preamble which no one chooses (Pempty), the number of successful
preamble which is only chosen by one machine (x) and the total
number of preambles (P). With this information, assume the
arriving machine number is v, we can derive the equation:
! x | v,P'( )=
CPempty
Ptotal
Pv
P'
P'" x
#
$%
&
'(
v
P'" x
#
$%
&
'( P'" x( )! ("1)n
Cn
x
Cn
v"(P'"x)
n!( ) "1( )m
Cm
x"n
x " n " m( )v"(P'"x)"n
m=0
x"n
)
#
$%
&
'(
n=0
x
)
*
+
,
-
.
/
(7)
Where v ! P'! x( )" 2x, v ! P' " x, and P' = Ptotal ! Pempty.
This equation uses the same concept as (1). With a specific
Pempty, x and P, we can find a v* make (7) maximal, and this way
is highly accurate.
Protocol
Figure 2 Flow Chart of Protocol Design
Analysis
Figure 3 Comparison among different settings with M=300
and P=54
• Method C is as good as Method A.
• For Method B, under M=300, choosing pm=0.4~0.5 will
have the lowest delay. Comparing to pm=1, pm=1 needs
another 31 slots to deal the traffic. However, this method
is still worse than the others.
Design of Persistence Probability in the M2M Random Access
Network 3
M 20 50 70 100 130 200 250 300
Pm, opt
1.0 1.0 0.8 0.53 0.41 0.28 0.22 0.2
M x Pm, opt
20 50 56 53 53.3 56 55 60
Table 1 a set of optimal pm by Method A
• Method A tends to filter all machines such that the
expected machine number allowed to start random
access matches the best machine number that maximizes
success probability.
Figure 4 Comparison among different settings 2
• This again shows that Method C is as good as Method A.
Besides, Method C and A show much more efficient
than Method B especially when M grows.
Figure 5 Differences between Method A and C
• Method A and C is not the same, but when preamble
number is large enough, their performance is almost the
same.
Figure 6 Difference of complexity of 2 Methods
• This shows that the complexity of Method C is much
simpler than Method A. It significantly reduces the
complexity of programming.
Figure 7 The impact of an inaccurate feedback
• This shows that if there’s an inaccurate feedback that
provides an inaccurate estimation of contending machine
number, the impact on Method C seems slight.
• The error caused by an inaccurate feedback can also be
seen as the frequency of updating the pm is low. Thus, if
a base station extends the period to broadcast a pm, the
efficiency will be still good enough.
Conclusion
• By the above analysis, we can see that Method C is a
flexible method since it doesn’t need a complex
programming, and with a large tolerance for an error in
the estimation of the coming machine number,
• Although it may increase power consumption since a
base station needs to continuously update the pm, the
period of update pm is available to extend without losing
much efficiency.
Ø Overall, under these kind of scenerios, our work of
designing persistence probability provides a general
solution: Method C. With slightly increasing the system
complexity, Method C truely gives a lot of efficiency.
Design of Persistence Probability in the M2M Random Access
Network 1

More Related Content

What's hot

pptx - Psuedo Random Generator for Halfspaces
pptx - Psuedo Random Generator for Halfspacespptx - Psuedo Random Generator for Halfspaces
pptx - Psuedo Random Generator for Halfspaces
butest
 

What's hot (17)

post119s1-file3
post119s1-file3post119s1-file3
post119s1-file3
 
Masters Report 3
Masters Report 3Masters Report 3
Masters Report 3
 
Quiz 2
Quiz 2Quiz 2
Quiz 2
 
Masters Report 2
Masters Report 2Masters Report 2
Masters Report 2
 
pptx - Psuedo Random Generator for Halfspaces
pptx - Psuedo Random Generator for Halfspacespptx - Psuedo Random Generator for Halfspaces
pptx - Psuedo Random Generator for Halfspaces
 
Economia01
Economia01Economia01
Economia01
 
Performance Analysis of PAPR Reduction in MIMO-OFDM
Performance Analysis of PAPR Reduction in MIMO-OFDMPerformance Analysis of PAPR Reduction in MIMO-OFDM
Performance Analysis of PAPR Reduction in MIMO-OFDM
 
Energy consumption of vlsi decoders
Energy consumption of vlsi decodersEnergy consumption of vlsi decoders
Energy consumption of vlsi decoders
 
Zurich machine learning_vicensgaitan
Zurich machine learning_vicensgaitanZurich machine learning_vicensgaitan
Zurich machine learning_vicensgaitan
 
Uav route planning for maximum target coverage
Uav route planning for maximum target coverageUav route planning for maximum target coverage
Uav route planning for maximum target coverage
 
Programming project
Programming projectProgramming project
Programming project
 
Power density Spectrum
Power density SpectrumPower density Spectrum
Power density Spectrum
 
Manifold Blurring Mean Shift algorithms for manifold denoising, report, 2012
Manifold Blurring Mean Shift algorithms for manifold denoising, report, 2012Manifold Blurring Mean Shift algorithms for manifold denoising, report, 2012
Manifold Blurring Mean Shift algorithms for manifold denoising, report, 2012
 
LPC Lossy Compression of Speech Signals
LPC Lossy Compression of Speech SignalsLPC Lossy Compression of Speech Signals
LPC Lossy Compression of Speech Signals
 
Masters Report 1
Masters Report 1Masters Report 1
Masters Report 1
 
Unit 2
Unit 2Unit 2
Unit 2
 
Intensity Constraint Gradient-Based Image Reconstruction
Intensity Constraint Gradient-Based Image ReconstructionIntensity Constraint Gradient-Based Image Reconstruction
Intensity Constraint Gradient-Based Image Reconstruction
 

Viewers also liked

Vivek_New_Resume
Vivek_New_ResumeVivek_New_Resume
Vivek_New_Resume
Vivek Jain
 
Music magazines - Audience
Music magazines - AudienceMusic magazines - Audience
Music magazines - Audience
MattR298
 

Viewers also liked (14)

Capturas de pantalla de los 3 planos
Capturas de pantalla de los 3 planosCapturas de pantalla de los 3 planos
Capturas de pantalla de los 3 planos
 
Stock exchanges
Stock exchangesStock exchanges
Stock exchanges
 
Sisntesis del curso academico
Sisntesis del curso academicoSisntesis del curso academico
Sisntesis del curso academico
 
Sustainability
SustainabilitySustainability
Sustainability
 
Periodico mural
Periodico mural Periodico mural
Periodico mural
 
Wrigleyville presentation
Wrigleyville presentationWrigleyville presentation
Wrigleyville presentation
 
Vivek_New_Resume
Vivek_New_ResumeVivek_New_Resume
Vivek_New_Resume
 
Govt high school no 2 mansehra tournament 2011 12
Govt high school no 2 mansehra tournament 2011 12Govt high school no 2 mansehra tournament 2011 12
Govt high school no 2 mansehra tournament 2011 12
 
Cleanliness
CleanlinessCleanliness
Cleanliness
 
Orang-Orang Tegaldowo
Orang-Orang TegaldowoOrang-Orang Tegaldowo
Orang-Orang Tegaldowo
 
La mia scuola
La mia scuolaLa mia scuola
La mia scuola
 
babfx باب افكس لادارة المحافظ
babfx باب افكس لادارة المحافظbabfx باب افكس لادارة المحافظ
babfx باب افكس لادارة المحافظ
 
Genre research
Genre researchGenre research
Genre research
 
Music magazines - Audience
Music magazines - AudienceMusic magazines - Audience
Music magazines - Audience
 

Similar to Poster

Exploiting 2-Dimensional Source Correlation in Channel Decoding with Paramete...
Exploiting 2-Dimensional Source Correlation in Channel Decoding with Paramete...Exploiting 2-Dimensional Source Correlation in Channel Decoding with Paramete...
Exploiting 2-Dimensional Source Correlation in Channel Decoding with Paramete...
IJECEIAES
 

Similar to Poster (20)

A genetic algorithm to solve the
A genetic algorithm to solve theA genetic algorithm to solve the
A genetic algorithm to solve the
 
11 appendix M.TECH ( M S WORD FILE )
11 appendix M.TECH ( M S WORD FILE )11 appendix M.TECH ( M S WORD FILE )
11 appendix M.TECH ( M S WORD FILE )
 
11 appendix M.TECH ( PDF FILE )
11 appendix M.TECH ( PDF FILE )11 appendix M.TECH ( PDF FILE )
11 appendix M.TECH ( PDF FILE )
 
DESIGN OF DELAY COMPUTATION METHOD FOR CYCLOTOMIC FAST FOURIER TRANSFORM
DESIGN OF DELAY COMPUTATION METHOD FOR CYCLOTOMIC FAST FOURIER TRANSFORMDESIGN OF DELAY COMPUTATION METHOD FOR CYCLOTOMIC FAST FOURIER TRANSFORM
DESIGN OF DELAY COMPUTATION METHOD FOR CYCLOTOMIC FAST FOURIER TRANSFORM
 
Integrating Adaptation Mechanisms Using Control Theory Centric Architecture M...
Integrating Adaptation Mechanisms Using Control Theory Centric Architecture M...Integrating Adaptation Mechanisms Using Control Theory Centric Architecture M...
Integrating Adaptation Mechanisms Using Control Theory Centric Architecture M...
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
 
An Open Shop Approach in Approximating Optimal Data Transmission Duration in ...
An Open Shop Approach in Approximating Optimal Data Transmission Duration in ...An Open Shop Approach in Approximating Optimal Data Transmission Duration in ...
An Open Shop Approach in Approximating Optimal Data Transmission Duration in ...
 
A comparison of efficient algorithms for scheduling parallel data redistribution
A comparison of efficient algorithms for scheduling parallel data redistributionA comparison of efficient algorithms for scheduling parallel data redistribution
A comparison of efficient algorithms for scheduling parallel data redistribution
 
Macromodel of High Speed Interconnect using Vector Fitting Algorithm
Macromodel of High Speed Interconnect using Vector Fitting AlgorithmMacromodel of High Speed Interconnect using Vector Fitting Algorithm
Macromodel of High Speed Interconnect using Vector Fitting Algorithm
 
THE RESEARCH OF QUANTUM PHASE ESTIMATION ALGORITHM
THE RESEARCH OF QUANTUM PHASE ESTIMATION ALGORITHMTHE RESEARCH OF QUANTUM PHASE ESTIMATION ALGORITHM
THE RESEARCH OF QUANTUM PHASE ESTIMATION ALGORITHM
 
Economic Dispatch of Generated Power Using Modified Lambda-Iteration Method
Economic Dispatch of Generated Power Using Modified Lambda-Iteration MethodEconomic Dispatch of Generated Power Using Modified Lambda-Iteration Method
Economic Dispatch of Generated Power Using Modified Lambda-Iteration Method
 
Plan economico
Plan economicoPlan economico
Plan economico
 
Plan economico
Plan economicoPlan economico
Plan economico
 
Plan economico del 2017
Plan economico del 2017Plan economico del 2017
Plan economico del 2017
 
Image Compression using DPCM with LMS Algorithm
Image Compression using DPCM with LMS AlgorithmImage Compression using DPCM with LMS Algorithm
Image Compression using DPCM with LMS Algorithm
 
COMPUTATIONAL PERFORMANCE OF QUANTUM PHASE ESTIMATION ALGORITHM
COMPUTATIONAL PERFORMANCE OF QUANTUM PHASE ESTIMATION ALGORITHMCOMPUTATIONAL PERFORMANCE OF QUANTUM PHASE ESTIMATION ALGORITHM
COMPUTATIONAL PERFORMANCE OF QUANTUM PHASE ESTIMATION ALGORITHM
 
COMPUTATIONAL PERFORMANCE OF QUANTUM PHASE ESTIMATION ALGORITHM
COMPUTATIONAL PERFORMANCE OF QUANTUM PHASE ESTIMATION ALGORITHMCOMPUTATIONAL PERFORMANCE OF QUANTUM PHASE ESTIMATION ALGORITHM
COMPUTATIONAL PERFORMANCE OF QUANTUM PHASE ESTIMATION ALGORITHM
 
Report Simulations of Communication Systems
Report Simulations of Communication SystemsReport Simulations of Communication Systems
Report Simulations of Communication Systems
 
2018867974 sulaim (2)
2018867974 sulaim (2)2018867974 sulaim (2)
2018867974 sulaim (2)
 
Exploiting 2-Dimensional Source Correlation in Channel Decoding with Paramete...
Exploiting 2-Dimensional Source Correlation in Channel Decoding with Paramete...Exploiting 2-Dimensional Source Correlation in Channel Decoding with Paramete...
Exploiting 2-Dimensional Source Correlation in Channel Decoding with Paramete...
 

Recently uploaded

AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
Tonystark477637
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 

Recently uploaded (20)

Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 

Poster

  • 1. Design of Persistence Probability in the M2M Random Access Network 1 Design of Persistence Probability in the M2M Random Access Network 何浩平 B97901049 陳姵伶 B97901075 Introduction Figure 1 M2M network [1] • For example: weather prediction - Sensors send data every second. - Delay needs to be minimized. - Power of sensors is limited. • Random access: machines compete for limited channels. • Persistence probability pm : a base station will broadcast pm to decide how many machines can start random access. • pm plays an important role in performance of random access. [1] TelecomTV: http://www.telecomtv.com System Model We use the random access channel and the random-access procedure in UMTS-LTE. Since we consider a scenario under M2M network, there are some assumptions as follows. 1. Bursting arrival of all machines happens at a time and each machine has only a set of data to send. 2. Before they doing random access, they should randomly pick up a q=[0, 1], if q is smaller than the pm, then a machine can start the random access. Otherwise, it’ll retry in the next slot until it successfully transmits. 3. When only one machine chooses a specific preamble, the machine is considered to be successful, and can start to transmit. 4. Backoff system is not considered since its effect is somewhat the same as persistence probability. Theorem A. Compete for preambles Except for the process of comparing to pm, at the procedure of random access, we define ! k | n,P( ) as a probability that k among v machines can start to transmit their packets under a total of P preambles ! k | n,P( )= 1 Pv Ck P Ck v k! "1( )m Cm P"k Cm v"k m! P " k " m( )v"k"m m=0 min v"k, P"k( ) # where min v " k, P " k( )$ 0 (1) Using the principle of inclusion and exclusion can derive this equation. Since there’re only k preambles being uniquely chosen, each of last preambles should contain more than 2 machines. With the above equation, we can derived the expected successful number: E[ k | n,P( )] = v 1! 1 P " #$ % &' v!1 (2) To find the maximal v given P, we have: d dv v 1! 1 P " #$ % &' v!1 = 0 (3) voptimal = !1 ln(1! 1 P) (4) Later, our analysis will use equation (4) again. B. Markov Chain Analysis Based on the assumptions mentioned in the section of System Model, it can be seen that the number of contending machines
  • 2. Design of Persistence Probability in the M2M Random Access Network 2 forms a finite discrete Markov chain. Here we use the same concept as [2] to solve the problem. The probability of transition from state u to v is: tuv = B i,u, pm( )! u " v | i,P( )i=u"v u # v $ u, u % 0, pm & 0,1( ) ! u " v | u,P( ) v $ u, u % 0, pm = 1 0 v > u or pm = 0 1 u, v = 0 ' ( ) )) * ) ) ) (5) Clearly, there is one absorbing state (0). Given the current state M (M machines come in the first slot), the mean delay of the system aM is: aM = 1 1! tMM 1+ tMkak k=1 M !1 " # $% & '( (6) With this equation, we can implement dynamic programming to find an optimal set of pm to let aM minimize. [2] M. Lotfinezhad, B. Liang and E. S. Sousa, “Adaptive Cluster-Based Data Collection in Sensor Networks with Direct Sink Access” IEEE Transactions on Mobile Computing, 7 (7) (2008), pp. 884–897 Design Method A: Using equation (6), we can implement dynamic algorithm to find an optimal set of pm to let aM minimize. Method B: (UMTS with pm, and consider the backoff system [3]) Based on equation (6), for a specific machine number M, we find a best pm to let aM minimize. Method C: Combine equation (4) and equation (6), we can find a set of pm to let aM close to the result of Method A. [3] 3GPPTS25.321V5.14.0,Third-GenerationPartnershipProject;Medium Access Control (MAC) Protocol Specification, Sophia-Antipolis, France, Sep. 2008. Estimation of the Machine Number Since the Method A, B and C need some feedback of estimation of contending machine number, here we provide a method to solve this problem. A base station will accurately know that the number of empty preamble which no one chooses (Pempty), the number of successful preamble which is only chosen by one machine (x) and the total number of preambles (P). With this information, assume the arriving machine number is v, we can derive the equation: ! x | v,P'( )= CPempty Ptotal Pv P' P'" x # $% & '( v P'" x # $% & '( P'" x( )! ("1)n Cn x Cn v"(P'"x) n!( ) "1( )m Cm x"n x " n " m( )v"(P'"x)"n m=0 x"n ) # $% & '( n=0 x ) * + , - . / (7) Where v ! P'! x( )" 2x, v ! P' " x, and P' = Ptotal ! Pempty. This equation uses the same concept as (1). With a specific Pempty, x and P, we can find a v* make (7) maximal, and this way is highly accurate. Protocol Figure 2 Flow Chart of Protocol Design Analysis Figure 3 Comparison among different settings with M=300 and P=54 • Method C is as good as Method A. • For Method B, under M=300, choosing pm=0.4~0.5 will have the lowest delay. Comparing to pm=1, pm=1 needs another 31 slots to deal the traffic. However, this method is still worse than the others.
  • 3. Design of Persistence Probability in the M2M Random Access Network 3 M 20 50 70 100 130 200 250 300 Pm, opt 1.0 1.0 0.8 0.53 0.41 0.28 0.22 0.2 M x Pm, opt 20 50 56 53 53.3 56 55 60 Table 1 a set of optimal pm by Method A • Method A tends to filter all machines such that the expected machine number allowed to start random access matches the best machine number that maximizes success probability. Figure 4 Comparison among different settings 2 • This again shows that Method C is as good as Method A. Besides, Method C and A show much more efficient than Method B especially when M grows. Figure 5 Differences between Method A and C • Method A and C is not the same, but when preamble number is large enough, their performance is almost the same. Figure 6 Difference of complexity of 2 Methods • This shows that the complexity of Method C is much simpler than Method A. It significantly reduces the complexity of programming. Figure 7 The impact of an inaccurate feedback • This shows that if there’s an inaccurate feedback that provides an inaccurate estimation of contending machine number, the impact on Method C seems slight. • The error caused by an inaccurate feedback can also be seen as the frequency of updating the pm is low. Thus, if a base station extends the period to broadcast a pm, the efficiency will be still good enough. Conclusion • By the above analysis, we can see that Method C is a flexible method since it doesn’t need a complex programming, and with a large tolerance for an error in the estimation of the coming machine number, • Although it may increase power consumption since a base station needs to continuously update the pm, the period of update pm is available to extend without losing much efficiency. Ø Overall, under these kind of scenerios, our work of designing persistence probability provides a general solution: Method C. With slightly increasing the system complexity, Method C truely gives a lot of efficiency.
  • 4. Design of Persistence Probability in the M2M Random Access Network 1