RADB: Random Access with Differentiated Barring for Latency-Constrained Applications in NB-IoT Network

1School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China 2School of Automation, Huazhong University of Science and Technology, Wuhan 430074, China 3Graduate School of System Informatics, Kobe University, Kobe 657-8501, Japan 4Department of Software Engineering (SWE), College of Computer and Information Sciences (CCIS), King Saud University, Riyadh 11543, Saudi Arabia 5Computer Science Department, College of Science, Menoufia University, Menoufia 32721, Egypt


Introduction
With the increase of low-data-rate and low power services [1,2], research on LPWAN communication technology develops correspondingly [3].Based on whether the spectrum is licensed, LPWAN communication technologies [4] are divided into the following types: type 1 includes technologies that run in unlicensed frequency band, such as Lora and Sigfox.Mostly, these technologies are nonstandard and customized, so that safety cannot be guaranteed.Type 2 includes technologies that run in licensed frequency band, including mature technologies such as 2G/3G cellular communication technologies (GSM, CDMA, and WCDMA) and developing ones such as LTE and its evolution technology that are gradually deployed and applied at present which support terminals in various categories [5].Basically, standards of these technologies are defined by international organizations for standard such as 3GPP (mainly formulates standards related to GSM, WCDMA, LTE, and its evolution technology) and 3GPP2 (mainly formulates standards related to CDMA).
NB-IoT is a kind of mass LPWA (Low Power Wide Area) technology put forth by 3GPP for application scenes with objectives of sensing and data acquisition (such as smart electric meter and environment monitoring [6]), characterized by advantages such as huge amount of connections, ultralow power consumption, wide area coverage, and mutual triggering between signaling [7,8] and data [9][10][11].In the meantime, it has support of excellent communication networks [12], such as cognitive vehicular networks [13] and cooperative communication networks [14].
In NB-IoT network, if a user equipment has access to the base station and sends service request, preamble request transmitted in NPRACH (narrowband physical random access channel) should be considered first, that is, random access procedure.However, when many users request the same preamble, preamble conflict occurs.What is worse, if there are too many preamble conflicts in the network where huge amounts of users request NPRACH resources, network congestion would be caused inevitably.At that moment, huge amount of failures in random access and long-term latency in network would take place.Therefore, an optimized model for random access is extremely urgent in order to improve QoS of network and QoE of user [15].
In allusion to problem of network congestion caused by access of huge amount of devices [16] in M2M network [17], 3GPP determines the following alternatives: (1) access class barring schemes; (2) separate RACH resources for MTC; (3) dynamic allocation of RACH resources; (4) MTC specific backoff scheme; (5) slotted access; (6) pull based scheme.However, solutions mentioned above have not taken the aspect of latency in random access into consideration and thus cannot provide efficient and reliable random access for latency-sensitive devices, like application scene in [18][19][20].Therefore, RADB is put forth in this paper to solve problems mentioned above.
The remainder of this paper is organized as follows.Section 2 provides some related research work.Section 3 introduces the NPRACH (narrowband physical random access channel) features of NB-IoT, including random access concept and traditional dynamic access class barring method.Section 4 shows the proposed RADB and envisioned NB-IoT architecture.Section 5 provides simulation setup and discusses experimental results.Finally, Section 6 concludes this paper.

Related Work
3GPP explicitly points out that it is necessary to give the theoretical computing model for uplink access latency when NB-IoT undertakes periodical and sudden MAR services [21].Uplink access latency is composed of latencies in system synchronization, broadcast information reading, random access, resource allocation, data transmission and feedback response, and so on [7].Among these latencies, some are deterministic processing latency, some are latencies related to signal detection, and others are random access latencies related to business activity [22].Most projects of current research focus on computing of mean value and variance for random access latency; there are few projects of research that focus on probability density function (PDF) [23][24][25] of random access latency [26][27][28].With quantity of waiting users and channel busy/idle as state variables, the moment generating function (MGF) for PDF of random access latency is deduced based on Markov process in [25,29,30].But the problem of high computation complexity remains; it is even unsolvable when the quantity of users is too large.Reference [31] deduced PDF for random access latency on premise that time between arrivals and backoff obeys negative exponential distribution.References [23,32] deduced PDF for random access latency on premise that retransmission times are fixed value or they obey geometric distribution.In research projects mentioned above, uniform distribution, exponential distribution, geometric distribution, and backoff mechanism are involved, but limitation of maximum retransmission times is taken into consideration only in [26,33], which does not comply with actual protocol.The assumption that business models follow homogeneous Poisson or Bernoulli process is difficult to extend to application scenes of NB-IoT.In combination with 3GPP beta type business model, approximate form of PDF for random access latency, is given in [34] by estimating the maximum retransmission times for terminals with successful access through mean value of latency.In [35], the lower bound for random access latency is deduced through approximate beta distribution of piecewise linear function, but the effect of maximum retransmission times is not taken into consideration.In short, the theoretical computing model for random access latency has not been completely solved up to now, as well as the simplest Poisson business model and uniform backoff mechanism.Therefore, the research of statistic characteristics for random access latency in NB-IoT in any random access strength (two scenes C restricted PDCCH and unrestricted PDCCH C are taken into consideration, resp.)grows wide attention; not only should mean value and variance be included, but also its PDF and corresponding MGF should be deduced to perfect random access latency analysis theory for NB-IoT.

Narrowband Physical Random Access Channel Features
The transmission bandwidth for uplink of NB-IoT system is 180 kHz, supporting two kinds of subcarrier spacing: 3.75 kHz and 15 kHz.As for scenes with enhanced coverage, the subcarrier spacing of 3.75 kHz may provide larger system capacity when compared with subcarrier spacing of 15 kHz.However, in the scenes with internal operation mode, subcarrier spacing of 15 kHz has better compatibility with LTE, compared with subcarrier spacing of 3.75 kHz.NB-IoT also reduces types of uplink physical channel, and some uplink physical channels are redesigned.Specifically, NB-IoT redesigns NPRACH and does not support PUCCH (Physical Uplink Control Channel).

NPRACH Features.
Because the bandwidth of traditional LTE physical random access channel (PRACH) is 1.08 MHz, which exceeds restriction on bandwidth of 180 kHz for uplink of NB-IoT, random access channel is redesigned and named as NPRACH.An NPRACH preamble is composed of four symbol groups, and each symbol group is composed of one cyclic prefix (CP) and five symbols.The CP with length of 66.67 s (Format 0) is suitable for cell with radius of 10 km, and the CP with length of 266.7 s (Format 1) is suitable for cell with radius of 40 km; thus the objective of coverage gain is achieved.The value of each symbol is fixed to 1, and modulation is conducted at subcarrier spacing of 3.75 kHz (with symbol duration of 266.67 s).Thereinto, the frequency modulation index for each symbol group is different.However, the waveform of NPRACH preamble follows single-tone frequency hopping.Figure 1 shows a case of NPRACH frequency hopping [36].In order to support coverage gain, the repeated use of one NPRACH preamble will be permitted for as many as 128 times.

Random Access.
In allusion to requirements of coverage enhancement, random access based on coverage level is adopted by NB-IoT system.The terminal will judge the current coverage level based on signal strength measured, and appropriate random access resource shall be chosen based on corresponding coverage level to launch random access.In order to meet requirements on data transmission under different coverage levels, different times of repetition, transmission cycles, and so on will be allocated to each coverage level by base station.For example, the terminal under poor coverage level needs to adopt more times of repetition to guarantee correct transmission of data, while large transmission cycle may be allocated in order to prevent terminals under poor coverage level from occupying too many system resources.
Effective access control mechanism is required to guarantee and control access of terminal and preferential access of some abnormal data due to the huge amount of IoT terminals.As for access control mechanism of NB-IoT system, the EAB mechanism of LTE system (SIB14) and backoff mechanism of random access procedure are used for reference.Also, MIB-NB broadcasts indication of access control to reduce power consumption of SIB14-NB that tries to read at terminal.
In NB-IoT, random access is used in many aspects such as initial access during establishing wireless link [37] and scheduling request [38].A main objective of random access is to realize synchronization of uplink, which plays a vital role in maintaining orthogonality of uplink.Similar to random access mechanism of LTE, competition-based random access procedure of NB-IoT includes the following four steps: (1) user equipment (UE) sends a random access preamble; (2) a random access response (including timing advance command and uplink resources scheduling) will be transmitted by network for use of UE in the third step; (3) UE broadcasts its identity label in the network with scheduled resources; (4) contention-resolution message is transmitted by network to solve conflict caused when multiple UE pieces send the same random access preamble in the first step.
In order to better serve UE pieces under different coverage levels and with different degrees of path loss, up to 3 kinds of different NPRACH resources will be allocated in a cell by NB-IoT network.In each kind of allocation, each basic random access preamble has a given duplicate value for repeated use.UE will measure its signal receiving power at downlink to estimate its coverage level and adopt NPRACH resources allocated by network to send random access preamble for the estimated coverage level.In order to deploy NB-IoT network in different scenes, flexible allocation of NPRACH resources under time-frequency resource grid is allowed by NB-IoT; the specific parameters are as follows: (i) Time domain: NPRACH resource has periodicity referring to the start time of NPRACH resource in a period of time.(ii) Frequency domain: it includes frequency distribution (determined by subcarrier migration) and quantity of subcarrier.
In early field test and deployment of NB-IoT, some UE pieces do not support multitone transmission.Therefore, before transmission scheduling for uplink, the network should know multitone transmission capacity of UE.In addition, in the first step of random access procedure, a UE should express information on whether it supports multitone transmission, so that transmission scheduling for uplink can be realized by the network in the third stage of random access procedure.To be specific, network divides NPRACH subcarriers into two nonoverlapping sets by their frequency domain.In the third step of random access procedure, UE may choose one of the two sets to send its signal of random access preamble and thus to express whether it supports multitone transmission.
Consequently, UE determines its coverage level by measuring signal receiving power at downlink.After reading system information allocated by NPRACH resources, UE is able to conduct NPRACH resource allocation and to set retransmission times required by estimating its coverage level and transmission power of random access preamble.Then, UE is able to continuously and repeatedly transmit basic single-tone random access preamble within a period of NPRACH resources.
However, continuous retransmission of single-tone random access preamble in a single cycle may cause preamble request conflict.With a large amount of conflicts increasing the request and response delay time (i.e., random access latency would be longer), the network will fall into congestion inevitably.Access request of huge amount of devices will bring great challenge to wireless access capacity of access network while the main focus is on overload problem in a cell as for congestion in access network.For example, assuming that large amounts of devices access a cell simultaneously, the conflict probability of access channel in that cell will increase rapidly, and severe paralysis will be caused if control is not available in time.

Access Class Barring Schemes.
The solution to solve network congestion caused by large amount of access requests in cellular machine-to-machine (M2M) network is put forth in [39], that is, dynamic access class barring (ACB) method.
Figure 2 shows the ACB method, including base station selection and load balance strategy.Main steps are as follows: (i) Step 1: eNodeB evaluates the conflict probability  of random access based on the arrival rate and transmission rate of data package.Access class barring parameter  depends on PRACH condition (total preamble number and current requests number for preamble).
(ii) Step 2: every eNodeB periodically broadcasts conflict probability  and AC barring parameter .
(iii) Step 3: UE chooses the corresponding eNB when the maximum access success probability is achieved and conducts connection and communication to the eNB.
(iv) Step 4: each UE will generate a random number  (1 >  > 0), and start/prohibit random access procedure following ACB mechanism; that is, UE is able to successfully start random access procedure when and only when  < .

Random Access with Differentiated
Barring and Network Architecture Class  stands for latency-sensitive devices (that long for low data transmission latency), while Class  stands for non-latency-sensitive devices (that may tolerate longer data transmission latency).NPRACH period  is divided into  time slots and random number  () of UE pieces in each time slot is defined in formula (1), where  = 0, 1, 2, . . ., .
() ,  = 0, 1, 2, . . ., ;  () ∈ (0, 1) ,  = 0, 1, 2, . . ., . ( In allusion to preamble defined in eNodeB, we assume the sum is , request number of current preamble is , and channel conflict probability is , as shown in the following formula: . (2) If  = 1 − (1 − 1/) (−1) < 0.1, it is held that the channel conflict probability is low; that is, success rate for random access is high.In this case, it is assumed that the maximum value of  is , and  stands for the maximum request number of preamble when success rate for random access is guaranteed.Let number of Class  devices be   and number of Class  devices be   ; then the total number of devices  =   +   , and the number of devices with successful access   =   +   .Therefore, dynamic AC barring parameter  may be set as per the following formula: Because  () is always equal to 0 (remaining constant while  changes),  () is always less than or equal to ; in other words, devices in Class  have the right to start random access procedure preferentially.Only when redundancy in sum of preambles (sum of preambles is more than number of devices in Class  that request preamble) appears, could devices in Class  have the chance to access NB-IoT eNodeB.The pseudocode of RADB Scheme is shown as Algorithm 1.

NB-IoT Network Architecture.
In accordance with previous research [40], the architecture of NB-IoT network established based on OPNET Modeler platform in this paper is as shown in Figure 3, mainly including 5 parts: NB-IoT terminal, NB-IoT access network, NB-IoT core network, NB-IoT cloud platform, and vertical industry center [41,42].In order to embody coverage gain attribute of NB-IoT network and three corresponding NPRACH resource configuration options, the whole network is divided into 3 areas from long range to short range, and 3 MCSs (MCS 9, MCS 20, and MCS28) are selected, respectively, as modulation and coding strategy for each area based on MCS index table given in [40]; MCS index ID is made as area ID.In each area, NB-IoT Only delay-sensitive devices will not be barred in current period and can randomly select preambles.Non-sensitive devices will be barred in current period.end if end for Algorithm 1: Random access with differentiated barring.terminals (UE pieces, standing for devices carried by different mobile users) in different numbers are deployed; local ID in an area is made as identity label of these devices in that area.All user devices in the network send random access request to corresponding NB-IoT base station (improved LTE base station, eNodeB); whether an equipment could successfully enter random access procedure is determined through RADB.
As shown in Figure 4, when the synchronous relationship between an NB-IoT terminal and base station is not established, that terminal must send random access request before it could access network, that is, from idle state to connected state.At that moment, it is difficult for limited system information and channel information to guarantee reliability of transmission with closed loop random access control; therefore, Algorithm 1 is adopted to improve and set up random access process model in physical layer in this paper.

Simulation and Analysis
Table 1 lists the values of important parameters considered in the simulations [40].These values were selected to reflect real-world implementations of NB-IoT network and based on our previous research [40].The simulations were run multiple times and the presented results are an average of these runs.
Firstly, comparison is made between access success rate of NB-IoT network with different quantities of equipment under RADB and that of NB-IoT network under traditional access class barring scheme when barring parameter  is 0.2 or 0.8, as shown in Figure 5.When the quantity of equipment is less than 150, the performance of ACB scheme with  of 0.2 is still fine.However, with increase in quantity of equipment, the RADB that dynamically adjusts barring parameter shows strong controlling force over random access; it effectively makes sure that latency-sensitive equipment could successfully access network to the largest degree.
Figure 6 shows the comparative results for access latency generated with different random access models in NB-IoT network with 350 mobile devices; the random access models include RADB and traditional access class barring scheme with barring parameter  equal to 0.2, 0.4, 0.6, and 0.8.It is shown that the latency for ACB scheme with barring parameter  of 0.8 is the longest (latency for ACB scheme with barring parameter  of 0.6 is the second longest), which indicates that large amounts of devices access network at that time leading to the increasing probability of channel conflict and frequent network congestion.However, though the latency for ACB scheme with barring parameter  of 0.2 and 0.4 is short, the quantity of devices that can successfully access network at that time is too small; therefore instability of network is caused.As for RADB, with setting of dynamic     network with 350 mobile devices.The throughput (loading capacity) of a system is closely related to the consumption of CPU by request, peripheral interface, IO, and so on.If the consumption of CPU by single request is higher, the response rate of peripheral interface and IO is slower and the throughput of the system is lower.This situation is the opposite when the CPU consumption is very low.It can be seen that the response rate of base station is very slow when ACB scheme  is equal to 0.8 due to long access latency; therefore, the network throughput is very low.When ACB scheme  is equal to 0.2, though access latency is short, devices that access network are fewer, so the network throughput is not high.However, as for RADB put forth in this paper, because network latency is controlled, the requirements of latency-sensitive devices on network are met; thus network throughput is guaranteed.

Conclusion
In this paper, the background of NB-IoT is introduced and worldwide research related to optimized algorithms for random access is investigated.Then, characteristics related to NB-IoT uplink and narrowband physical random access channel are summarized, improvement is made in allusion to insufficiency of traditional dynamic access class barring method, and RADB is designed.Furthermore, the algorithms put forth in this paper are realized with established NB-IoT model, and simulation experiment is conducted.The results of simulation experiment show that RADB is able to effectively solve preamble request conflict generated by random access of numerous devices and to preferentially provide efficient and reliable random access for latencysensitive devices.Nevertheless, problems of channel resource distribution and resource utilization rate are not taken into consideration in algorithm put forth in this paper.In subsequent research, we will continue to study equipment access algorithms with high energy efficiency and low load and improve existing models, thus providing theoretical and experimental bases for future large-scale deployment of NB-IoT network in the real world.Also, how to use Big Data techniques [43] to support the NB-IoT based services is still interesting but challenging.

Figure 7 4 ACBFigure 7 :
Figure7shows the comparative results for network load generated with different random access models in NB-IoT of traditional ACB scheme are defined specifically; then corresponding improvement is made.Devices in NB-IoT network are divided into Class  and Class .
4.1.Random Access with Differentiated Barring.In RADB put forth in this paper, conflict probability, random number generation mechanism, AC barring parameter , and access recognition algorithm