Somen
Somen
Keywords: In this paper, we analyze throughput and delay performance of clustered Machine Type Communication (MTC)
Cognitive radio (CR) devices which access an eNodeB utilizing a primary spectrum in underlay mode. We assume that the MTC
Machine type communication (MTC) devices form two clusters and there is an optimal preamble allocation between the two clusters to maximize the
Machine-to-machine (M2M)
throughput. We further investigate the impact of the tolerable interference threshold on throughput, successful
eNodeB
preamble decoding probability, and delay. Then, the impact of the preamble partition factor and the access
barring factor on throughput and delay is analyzed. Finally, we evaluate the impact of the number of devices,
retransmission requests, and preamble partitions on the delay.
∗ Corresponding author.
E-mail addresses: [email protected] (S. Mondal), [email protected] (L. Davoli), [email protected] (S. Dhar Roy),
[email protected] (S. Kundu), [email protected] (G. Ferrari), [email protected] (R. Raheli).
https://doi.org/10.1016/j.jnca.2024.103856
Received 1 May 2023; Received in revised form 20 December 2023; Accepted 28 February 2024
Available online 2 March 2024
1084-8045/© 2024 The Authors. Published by Elsevier Ltd. This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/).
S. Mondal et al. Journal of Network and Computer Applications 225 (2024) 103856
2
S. Mondal et al. Journal of Network and Computer Applications 225 (2024) 103856
Table 1
Comparison between the proposed work and literature references.
Ref. Device Underlay Overlay Metric Clustering Optimization Preamble partition
Li et al. (2018) NB-IoT ✗ ✓ Throughput ✗ Throughput ✗
Zhang et al. (2019) MTC ✗ ✗ Throughput, delay ✓ Throughput via choice ✗
of back-off parameter Partition of back-off
parameter
Abdullah et al. MTC ✗ ✓ Outage ✓ Outage probability ✗
(2019) Sharing cellular BS
in TDMA mode
Our work MTC ✓ ✗ Throughput, delay ✓ Throughput via optimal ✓
Two clusters preamble partition
pu−out1 ≤ 𝛿 . (2)
(pu)
Taking into account the exponential distribution of 𝑖,1 , it follows that:
⎧ ⎫
⎪ (pu) 𝜂𝐼th ⎪
1 − pu−out1 = Pr ⎨𝑖,1 ≤
⎪ 𝑃TX(pu) ⎬
⎪
⎩ 𝑖,1 ⎭
⎪ ⎪
⎩ 𝑖,1 ⎭
where: (e1)
𝑖,1
is the channel gain (adimensional and exponentially dis-
where: 𝑃TX(pu) is the transmit power (dimension: [mW]) of the 𝑖th MTC tributed with mean of 1/𝜆𝑣 ) from the 𝑖th MTC device of cluster #1
to eNodeB1; 𝑃TX(pu) is the PU transmit power (dimension: [mW]); (e1)
𝑖,1
(pu)
device from cluster #1 to PU; 𝑖,1
is the channel gain (adimensional), 𝑖,2
exponentially distributed with mean 𝜇1 , from the 𝑖th device of clus- is the channel gain (adimensional and exponentially distributed with
ter #1 to PU; 𝜂 is the reserved fraction (adimensional) of 𝐼th , where 𝐼th mean of 1∕𝜆𝑥 ) from the 𝑖th device of cluster #2 to eNodeB1; (e1)
(pu)
is the
3
S. Mondal et al. Journal of Network and Computer Applications 225 (2024) 103856
channel gain (adimensional and exponentially distributed with mean of before letting the MTC devices access the network. In a certain RA slot,
1∕𝜆𝑦 ) from PU to eNodeB1; 𝑃TX(e1) is the transmit power (dimension: we denote: 𝑁1 as the number of MTC devices in cluster #1; 𝑁2 as the
𝑖,1 number of MTC devices in cluster #2; 𝑁tot as the total number of the
[mW]) from the 𝑖th device in cluster #1 to eNodeB1; 𝑃TX(e1) is the MTC devices, i.e., 𝑁tot = 𝑁1 + 𝑁2 . We define the preamble partition 𝛽
𝑖,2
as follows (Li et al., 2015):
transmit power (dimension: [mW]) from the 𝑖th device in cluster #2
to eNodeB1; 𝛾1 is the threshold (adimensional) above which an MTC 𝑀1
𝛽≜ (14)
device in cluster #1 is decodable at eNodeB1; and 𝑛0 is the thermal 𝑀2
noise power (dimension: [mW]), which can be neglected in the scenario
of interest. 𝑀1 + 𝑀2 = 𝑀tot (15)
Let 𝑉 = 𝑎𝑋 + 𝑏𝑌 , where 𝑎 ≜ 𝑃TX(e1) , 𝑏 ≜ 𝑃TX(pu) , 𝑋 ≜ (e1)
𝑖,2
, 𝑌 ≜ (e1)
(pu)
, where: 𝑀1 represents the number of preambles allocated for cluster #1;
𝑖,2
𝑈 ≜ (e1) . From (8), one can write: 𝑀2 represents the number of preambles allocated for cluster #2; and
𝑖,1
𝑀tot is the total number of preambles (Li et al., 2015). From (14) and
⎧ ⎫ (15), it follows that:
⎪𝑈 𝛾1 ⎪
dec(e1) = Pr ⎨ >
𝑃TX(pu) ⎬
𝑀tot 𝛽
𝑖,1 ⎪𝑉 ⎪ 𝑀1 =
1+𝛽
(16)
⎩ 𝑖,1 ⎭
{ } 𝑀tot
= Pr 𝑊 > 𝛼1 𝑀2 = . (17)
1+𝛽
= 1 − 𝐹𝑊 (𝛼1 ) (9) Since every MTC device selects the preamble randomly from the
where 𝑊 = 𝑈 ∕𝑉 and 𝛼1 = 𝛾1 ∕𝑃TX(pu) . available pool, collisions may occur if more than one MTC device
𝑖,1
In order to evaluate dec(e1) , the Probability Density Function (PDF) selects the same preamble (Laya et al., 2013). Moreover, according
𝑖,1 to the contention-based RA procedure, slotted Aloha is the adopted
of 𝑉 = 𝑎𝑋 + 𝑏𝑌 can be expressed as multiple access protocol, with the number of available preambles equal
𝜆𝑥 𝜆𝑦 ( −𝜆 𝑣 𝑣) to the number of slots (Li et al., 2015). In this way, the access success
𝑓𝑉 (𝑣) = 𝑒 𝑥 𝑎 − 𝑒−𝜆𝑦 𝑏 . (10)
𝜆𝑦 𝑎 − 𝜆𝑥 𝑏 probability can be expressed as (Li et al., 2015)
𝑁
The corresponding Cumulative Distribution Function (CDF) of 𝑃𝑠 = 𝑒− 𝑀 (18)
𝐹𝑊 (𝛼1 ) in (9) can then be written as
{ } where 𝑁 is the number of devices and 𝑀 is the number of preambles
𝑈
𝐹𝑊 (𝛼1 ) = Pr < 𝛼1 available within a RA slot. The average number of devices successfully
𝑉
∞ ( ) completing the access attempts from the two clusters can be expressed
= 𝐹𝑈 𝛼1 𝑣 𝑓𝑉 (𝑣)𝑑𝑣 as follows (Li et al., 2015):
∫0
𝜆𝑥 𝜆𝑦 𝑁1 𝑓1
− 𝑀
=1− ( )(𝜆 ). (11) 𝑁ssa,1 = 𝑁1 𝑓1 𝑒 1 (19)
𝜆𝑥 𝑦
𝑎𝑏 𝑎 + 𝛼1 𝜆𝑣 𝑏
+ 𝛼1 𝜆𝑣 𝑁2 𝑓2
− 𝑀
𝑁ssa,2 = 𝑁2 𝑓2 𝑒 2 (20)
Finally, one obtains (see Appendix for details)
where: 𝑓1 is the ACB factor of cluster #1; and 𝑓2 is the ACB factor of
dec(e1) = 1 − 𝐹𝑊 (𝛼1 )
𝑖,1 cluster #2.
𝜆𝑥 𝜆𝑦 (12) At this point, we can express the throughput of a device from
= ( )(𝜆 ). cluster #1, the throughput of a device from cluster #2, and the total
𝜆𝑥 𝑦
𝑎𝑏 + 𝛼1 𝜆𝑣 + 𝛼1 𝜆𝑣
𝑎 𝑏 throughput as follows, respectively (Lee et al., 2011; Li et al., 2015):
Similarly, the decoding probability of the 𝑖th MTC device
1 = 𝑁ssa,1 dec(e1) (21)
(𝑖 ∈ {1, 2, … , 𝑁2 }) in cluster #2 at eNodeB2 can be expressed as: 𝑖,1
4
S. Mondal et al. Journal of Network and Computer Applications 225 (2024) 103856
Considering the logarithm of both sides of (26), one obtains: Indicating as 𝑇𝑠 the duration of a transmission act, the expected
( ) { } ( ) delay E(𝐷1 ) can be written as follows:
𝑁1 𝑓1 1
log dec(e1) + 2 log(𝑁1 ) + 2 log(𝑓1 ) − (1 + 𝛽) + log ( )
𝑖,1 𝑀tot 𝛽 𝛽2 ∑
𝑊 −1
(1 − 𝑓 )𝑗 𝑓
( ) { } E(𝐷1 ) = 𝑇𝑠 𝑗∑ 1 − dec(e1) . (32)
𝑁2 𝑓2 𝑊 −1 𝑘
= log dec(e2) + 2 log(𝑁2 ) + 2 log(𝑓2 ) − (1 + 𝛽) (27) 𝑘=0 (1 − 𝑓 ) 𝑓
𝑖,1
𝑗=0
𝑖,2 𝑀tot
In order to account for the delay in the absence of collisions,
and, finally,
according to 3GPP (2011) we add 𝑇𝑠 ∕2, which is the expected value
⎛ dec(e1) ⎞ ( ) ( ) for a uniform delay in [0, 𝑇𝑠 ] (Tyagi et al., 2012). Thus, the expected
log ⎜
𝑖,1
⎟ + 2 log 𝑁1 + 2 log 𝑓1 delay in (32) can be expressed as follows:
⎜ dec(e2) ⎟ 𝑁2 𝑓2
⎝ 𝑖,2 ⎠ ( )
{ } { } ( ) 𝑇
𝑊∑ −1
(1 − 𝑓 )𝑗 𝑓
=
𝑁1 𝑓1
(1 + 𝛽) −
𝑁2 𝑓2
(1 + 𝛽) − log
1
. (28) E(𝐷1 ) = 𝑠 + 𝑇𝑠 𝑗∑ 1 − dec(e1) (33)
2 𝑊 −1 𝑘
𝑘=0 (1 − 𝑓 ) 𝑓
𝑖,1
𝑀tot 𝛽 𝑀tot 𝛽2 𝑗=0
( )
The optimal value of 𝛽 which maximizes the throughput is obtained 𝑇 𝑇𝑠 ∑
𝑊 −1
by solving (28). Since a closed-form expression of the optimal value of = 𝑠 +∑ 𝑗(1 − 𝑓 )𝑗 1 − dec(e1) . (34)
2 𝑊 −1 𝑘
𝑘=0 (1 − 𝑓 ) 𝑗=0
𝑖,1
𝛽 is not available, we obtain such a value by solving the transcendental
equation (28) numerically. The highest throughput1 is obtained by Assuming 𝓁 < 1, it holds that
inserting the obtained value of 𝛽 in (24). ∑
𝑊 −1
1 − 𝓁𝑊
𝓁𝑘 = (35)
3.2. Delay analysis of M2M communications 𝑘=0
1−𝓁
and
We now investigate the system performance in terms of delay. MTC
∑
𝑊 −1
1 + (𝑊 − 1)𝓁 𝑊 − 𝑊 𝓁 𝑊 −1
devices transmit RA requests to the eNB with a period of duration 𝑇𝑠 . 𝑘𝓁 𝑘 = 𝓁 . (36)
If more than one MTC device sends requests to the eNB using the same 𝑘=0 (1 − 𝓁)2
preamble at the same time, then RA requests collide and the eNB cannot
Using (34) and denoting 𝛾 ≜ 1 − 𝑓 , the average delay for an MTC
decode any RA attempt. Whenever a collision occurs, contention is not
device in cluster #1 can be expressed as follows:
considered to be resolved. MTC devices can identify the contention ( )
resolution results at the last step of the RA. If contention is resolved, 𝑇 𝑇 𝛾(1 + (𝑊 − 1)𝛾 𝑊 − 𝑊 𝛾 𝑊 −1 )
E(𝐷1 ) = 𝑠 + 𝑠 1 − (e1)
dec𝑖,1
. (37)
then MTC devices will get into RRC connected mode to transmit the 2 (1 − 𝛾)(1 − 𝛾 𝑊 )
data to the eNB. MTC devices repeat the process of transmitting the Similarly, the average delay for an MTC device in cluster #2 be-
preambles when contention is not resolved. In this case, devices wait for comes
a specific period of time, denoted as back-off interval (ranging from 0 ms ( )
𝑇 𝑇 𝛾(1 + (𝑊 − 1)𝛾 𝑊 − 𝑊 𝛾 𝑊 −1 )
to 960 ms Tyagi et al., 2012; Althumali et al., 2020), before retransmit- E(𝐷2 ) = 𝑠 + 𝑠 1 − (e2)
dec𝑖,2
. (38)
ting to the eNB. For simplicity, we consider a back-off interval equal to 2 (1 − 𝛾)(1 − 𝛾 𝑊 )
0 ms, i.e., no back-off (Tyagi et al., 2012). If more than one MTC device Using expressions (12) and (13) for dec(e1) and dec(e2) in (37) and
𝑖,1 𝑖,2
selects the same preamble at the same time, then they re-transmit in (38), respectively, one obtains the following final expressions of the
the next time. In our system model, we assume that (i) MTC devices average delays:
re-transmitting the preambles randomly choose a preamble from the
available 𝑀tot preambles and (ii) choosing the same preamble again is 𝑇𝑠 𝑇𝑠 𝛾(1 + (𝑊 − 1)𝛾 𝑊 − 𝑊 𝛾 𝑊 −1 )
E(𝐷1 ) = +
allowed. Denoting the preamble transmission success probability as 𝑓 , 2 (1 − 𝛾)(1 − 𝛾 𝑊 )
the probability of 𝑐 collisions before a success can be written as (Tyagi ⎛ ⎞
et al., 2012) ⎜ 𝜆𝑥 𝜆𝑦 ⎟
⋅ ⎜1 − ( )(𝜆 )⎟ (39)
( ) ⎜ 𝜆
1 𝑣 ⎟
𝑦
𝑎𝑏 𝑎𝑥 + 𝛼1 𝜆𝑣 + 𝛼 𝜆
Pr {𝑐 consecutive collisions} = (1 − 𝑓 )𝑐 𝑓 1 − dec(e1) (29) ⎝ 𝑏 ⎠
𝑖,1
𝑇𝑠 𝑇𝑠 𝛾(1 + (𝑊 − 1)𝛾 𝑊 − 𝑊 𝛾 𝑊 −1 )
under the assumption of 𝑐 independent unsuccessful consecutive trans- E(𝐷2 ) = +
2 (1 − 𝛾)(1 − 𝛾 𝑊 )
missions, each with probability (1 − 𝑓 ), followed by a successful trans-
⎛ ⎞
mission, with probability 𝑓 , at the (𝑐 + 1)th attempt. ⎜ 𝜆′𝑥 𝜆′𝑦 ⎟
⎜ )⎟ .
The probability of an MTC device to experience 𝑐 ∈ {0, 1, … , 𝑊 − 1} ⋅ 1−
⎜ ( ′ ) ( 𝜆′ ⎟
(40)
collisions can be expressed as follows: 𝜆 𝑦
⎜ 𝑎1 𝑏1 𝑎𝑥 + 𝛼2 𝜆′𝑣 + 𝛼2 𝜆′𝑣 ⎟
⎝ 1 𝑏1 ⎠
Pr {MTC device to experience 𝑐 consecutive collisions} =
Pr {𝑐 consecutive collisions} 4. Results
= ∑
𝑊 −1
𝑘=0 Pr {𝑘 consecutive collisions}
( ) For the sake of completeness, Table 2 summarizes the notation
(1 − 𝑓 )𝑐 𝑓 adopted in the analytical formulation at a glance, as well as the
= ∑ 1 − dec(e1) (30)
𝑊 −1 𝑘
𝑘=0 (1 − 𝑓 ) 𝑓 specific values chosen for the involved parameters in the experimental
𝑖,1
where 𝑊 is the maximum number of allowed retransmissions. The evaluation. In Fig. 3, the throughput is shown as a function of the
expected number of collisions E(𝐶) is (Tyagi et al., 2012) interference threshold 𝐼th . The number of preambles allocated for clus-
ter #1 (namely, 𝑀1 ) is larger than the number of preambles allocated
∑
𝑊 −1
(1 − 𝑓 )𝑗 𝑓 ( )
for cluster #2 (namely, 𝑀2 ). The throughput performance at eNodeB1
E(𝐶) = 𝑗∑ 1 − dec(e1) . (31)
𝑊 −1 (denoted as 1 ) is better than that at eNodeB2 (denoted as 2 ). As the
𝑗=0 𝑘=0 (1 − 𝑓 )𝑘 𝑓 𝑖,1
interference threshold increases, the throughput of both eNBs increases.
A higher value of the interference threshold leads to an increase of the
1
Considering the throughput expression in (24) it can be verified that tot transmit power of the devices, which, in turn, increases the decoding
is monotonically increasing for 𝛽 between 0 and the value which solves (28), probability and the throughput.
whereas it is monotonically decreasing for larger values. Hence, the value of 𝛽 In Fig. 4, the decoding probability is shown as a function of the
which solves (28) is indeed the maximizer of the throughput. interference threshold 𝐼th . As the value of 𝜂 is higher in cluster #1 than
5
S. Mondal et al. Journal of Network and Computer Applications 225 (2024) 103856
Table 2
Notation adopted in the analytical formulation at a glance, and consequent values chosen for those parameters for the experimental
evaluation.
Parameters Value Description
(pu) (pu)
𝜇1 , 𝜇2 , 𝜆𝑣 , 𝜆𝑥 , 𝜆𝑦 , 𝜆′𝑣 , 𝜆′𝑦 , 𝜆′𝑥 1 Mean of 𝑖,1 , 𝑖,2 , (e2)
𝑖,2
, (e1)
𝑖,2
, (e1)
(pu)
, (e2)
𝑖,2
, (e2)
(pu)
, (e2)
𝑖,1
, respectively (Zhang et al., 2013)
𝑃TX(pu) 5 W PU’s transmit power
𝑁1 60 Number of devices in cluster #1
𝑁2 50 Number of devices in cluster #2
𝑀1 30 Number of preambles allocated for cluster #1 (Vardakas et al., 2015)
𝑀2 24 Number of preambles allocated for cluster #2 (Vardakas et al., 2015)
𝑓1 0.7 ACB factor of cluster #1 (Tello-Oquendo et al., 2017)
𝑓2 0.5 ACB factor of cluster #2 (Tello-Oquendo et al., 2017)
𝛾1 1 dB SINR threshold for cluster #1
𝛾2 2 dB SINR threshold for cluster #2
𝜂 0.6 Fraction of 𝐼th
𝛿 0.01 PU outage constraint
in cluster #2, the decoding probability of an MTC device in cluster #1 the same preamble during the same slot so that the eNB is unable to
is higher than that of an MTC device in cluster #2. If we increases the decode any preamble: therefore, a larger number of collisions occurs
tolerable interference threshold level at PU, the decoding probability and the throughput at the eNB reduces.
increases at the eNB (in both cluster #1 and cluster #2).
In Fig. 6, the throughput is shown as a function of the interference
In Fig. 5, the throughput at the eNB (for both cluster #1 and
threshold, for various values of the outage constraint. The throughput
cluster #2) is shown as a function of the interference threshold for
various values of the ACB factor. It can be observed that the throughput is higher for higher outage constraint, as higher values of the outage
is higher at both eNBs when the ACB factor is 0.5. For higher values of constraint allow the transmit power of the devices to increase. The
the ACB factor, the throughput reduces. As the ACB factor increases, the results in Table 3 highlight that the throughput is maximized in cor-
traffic intensity increases because of a larger number of access attempts. respondence to the optimal value of the preamble partition 𝛽 (which
Because of this, there is a higher chance that two or more devices select solves (28)) that depends on the values of 𝑁1 and 𝑁2 .
6
S. Mondal et al. Journal of Network and Computer Applications 225 (2024) 103856
Fig. 5. Throughput as a function of the interference threshold 𝐼th for various values of the ACB factor 𝑓 .
Fig. 6. Throughput as a function of the interference threshold 𝐼th for various values of the outage constraint 𝛿.
7
S. Mondal et al. Journal of Network and Computer Applications 225 (2024) 103856
Fig. 8. Average delay E(𝐷) as a function of the number of MTC devices 𝑁tot , for various values of the number of preambles 𝑀tot .
Fig. 9. Average delay E(𝐷) as a function of the number of MTC devices 𝑁tot with different interference thresholds 𝐼th .
8
S. Mondal et al. Journal of Network and Computer Applications 225 (2024) 103856
Fig. 10. Average delay E(𝐷) as a function of the number of MTC devices 𝑁tot with different number of requests 𝑊 made to an eNB.
Fig. 11. Optimal value of the preamble partition 𝛽 as a function of the interference threshold 𝐼th .
maximize the throughput, which also depends on the ACB factor, the Declaration of competing interest
number of MTC devices in each cluster, as well as the interference
threshold via decoding probability. A higher value of the ACB factor The authors declare that they have no known competing finan-
reduces the throughput. The average delay is an increasing function of cial interests or personal relationships that could have appeared to
the number of preambles and re-transmission attempts. influence the work reported in this paper.
Data availability
CRediT authorship contribution statement
The authors are unable or have chosen not to specify which data
has been used.
Soumen Mondal: Conceptualization, Data curation, Formal anal-
ysis, Investigation, Methodology, Resources, Software, Validation, Vi- Appendix. Derivation of (11)
sualization, Writing – original draft, Writing – review & editing. Luca
Davoli: Investigation, Methodology, Visualization, Writing – original The CDF 𝐹𝑊 (𝛼1 ) can be expressed as follows:
draft, Writing – review & editing. Sanjay Dhar Roy: Conceptualiza- { }
𝑈
𝐹𝑊 (𝛼1 ) = Pr < 𝛼1
tion, Data curation, Formal analysis, Funding acquisition, Investigation, 𝑉
{ }
Methodology, Project administration, Resources, Supervision, Valida- = Pr 𝑈 < 𝛼1 𝑉
tion, Writing – original draft, Writing – review & editing. Sumit Kundu: ∞ { }
Conceptualization, Data curation, Formal analysis, Funding acquisition, = Pr 𝑈 < 𝛼1 𝑣 ∣ 𝑉 = 𝑣 𝑓𝑉 (𝑣) 𝑑𝑣
∫0
Investigation, Methodology, Project administration, Resources, Super- ∞ ( )
vision, Validation, Visualization, Writing – original draft, Writing – = 𝐹𝑈 𝛼1 𝑣 𝑓𝑉 (𝑣) 𝑑𝑣
∫0
review & editing. Gianluigi Ferrari: Conceptualization, Data cura- ∞( ) 𝜆𝑥 𝜆𝑥 ( −𝜆 𝑣 𝑣)
= 1 − 𝑒−𝜆𝑣 𝛼1 𝑣 𝑒 𝑥 𝑎 − 𝑒−𝜆𝑥 𝑏 𝑑𝑣
tion, Formal analysis, Funding acquisition, Investigation, Methodology, ∫0 𝜆𝑥 𝑎 − 𝜆𝑥 𝑏
Project administration, Resources, Supervision, Validation, Visualiza- ∞ 𝜆𝑥 𝜆𝑥 ( −𝜆𝑥 𝑣 𝑣)
tion, Writing – original draft, Writing – review & editing. Riccardo =1− 𝑒 𝑎 − 𝑒−𝜆𝑥 𝑏 𝑒−𝜆𝑣 𝛼1 𝑣 𝑑𝑣
∫0 𝜆𝑥 𝑎 − 𝜆𝑥 𝑏
( )
Raheli: Conceptualization, Data curation, Formal analysis, Funding 𝜆𝑥 𝜆𝑥 ∞ 𝜆
− 𝑥 +𝛼 𝜆 𝑣
acquisition, Investigation, Methodology, Project administration, Re- =1− 𝑒 𝑎 1 𝑣 𝑑𝑣
𝜆𝑥 𝑎 − 𝜆𝑥 𝑏 ∫ 0
( )
sources, Supervision, Validation, Visualization, Writing – original draft, 𝜆𝑥 𝜆𝑥 ∞ 𝜆
− 𝑥 +𝛼 𝜆 𝑣
Writing – review & editing. + 𝑒 𝑏 1 𝑣 𝑑𝑣
𝜆𝑥 𝑎 − 𝜆𝑥 𝑏 ∫0
9
S. Mondal et al. Journal of Network and Computer Applications 225 (2024) 103856
𝜆𝑥 𝜆𝑥 1 𝜆𝑥 𝜆𝑥 1
=1− + Tello-Oquendo, L., Leyva-Mayorga, I., Pla, V., Martinez-Bauset, J., Vidal, J.-R., Casares-
𝜆𝑥 𝑎 − 𝜆𝑥 𝑏 𝜆𝑥 𝜆𝑥 𝑎 − 𝜆𝑥 𝑏 𝜆𝑥
𝑎
+ 𝛼1 𝜆𝑣 𝑏
+ 𝛼1 𝜆𝑣 Giner, V., Guijarro, L., 2017. Performance analysis and optimal access class barring
parameter configuration in LTE-A networks with massive M2M traffic. IEEE Trans.
𝜆𝑥 𝜆𝑥 ⎡⎢ 1 1
⎤
⎥
Veh. Technol. 67 (4), 3505–3520. http://dx.doi.org/10.1109/TVT.2017.2776868.
=1− − Tyagi, R.R., Lee, K.-D., Aurzada, F., Kim, S., Reisslein, M., 2012. Efficient delivery
𝜆𝑥 𝑎 − 𝜆𝑥 𝑏 ⎢ 𝜆𝑥
+ 𝛼1 𝜆𝑣
𝜆𝑥
+ 𝛼1 𝜆𝑣 ⎥⎦
⎣ 𝑎 𝑏 of frequent small data for U-healthcare applications over LTE-advanced networks.
𝜆𝑥 𝜆𝑥 In: Proceedings of the 2nd ACM International Workshop on Pervasive Wireless
=1− ( )( ). Healthcare. MobileHealth ’12, Hilton Head, South Carolina, USA, pp. 27—-32.
𝜆𝑥 𝜆𝑥
𝑎𝑏 𝑎
+ 𝛼1 𝜆𝑣 𝑏
+ 𝛼1 𝜆𝑣 http://dx.doi.org/10.1145/2248341.2248354.
Vardakas, J.S., Zorba, N., Skianis, C., Verikoukis, C.V., 2015. Performance analysis of
M2M communication networks for QoS-differentiated smart grid applications. In:
2015 IEEE Globecom Workshops. GC Wkshps, IEEE, pp. 1–6. http://dx.doi.org/10.
References 1109/GLOCOMW.2015.7414116.
Yang, B., Wei, F., She, X., Jiang, Z., Zhu, J., Chen, P., Wang, J., 2023. Intelligent ran-
3GPP, 2011. RAN Improvements for Machine-type Communications. Technical dom access for massive-machine type communications in sliced mobile networks.
Specification (TS) 37.868, 3rd Generation Partnership Project (3GPP), URL Electronics 12 (2), 329. http://dx.doi.org/10.3390/electronics12020329.
https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx? Yao, H., Huang, T., Zhao, C., Kang, X., Liu, Z., 2014. Optimal power allocation in
specificationId=2630, Version 1.0.0. cognitive radio based machine-to-machine network. EURASIP J. Wireless Commun.
Abdullah, M.A., Abdullah, Z., Chen, G., Tang, J., Chambers, J., 2019. Performance Networking 2014, 1–9. http://dx.doi.org/10.1186/1687-1499-2014-82.
analysis of cognitive clustered M2M random networks with joint user and machine Zhang, C., Sun, X., Xia, W., Huang, R., Zhou, M., Zhu, H., 2023. Access delay
device selection. IEEE Access 7, 83515–83525. http://dx.doi.org/10.1109/ACCESS. optimization of double-contention random access scheme in machine-to-machine
2019.2924522. communications. IEEE Commun. Lett. http://dx.doi.org/10.1109/LCOMM.2023.
Aijaz, A., Aghvami, A.H., 2015. Cognitive machine-to-machine communications for 3280920.
internet-of-things: A protocol stack perspective. IEEE Internet Things J. 2 (2), Zhang, C., Sun, X., Xia, W., Zhang, J., Zhu, H., Wang, X., 2022. Deep learning
103–112. http://dx.doi.org/10.1109/JIOT.2015.2390775. based double-contention random access for massive machine-type communication.
Alhussien, N., Gulliver, T.A., 2022. Energy-efficient interference-aware cognitive IEEE Trans. Wireless Commun. 22 (3), 1794–1807. http://dx.doi.org/10.1109/
machine-to-machine communications underlaying cellular networks. IEEE Access TWC.2022.3206769.
10, 33932–33942. http://dx.doi.org/10.1109/ACCESS.2022.3162252. Zhang, C., Sun, X., Zhang, J., Wang, X., Jin, S., Zhu, H., 2019. Throughput optimization
Althumali, H.D., Othman, M., Noordin, N.K., Hanapi, Z.M., 2020. Dynamic backoff with delay guarantee for massive random access of M2M communications in
collision resolution for massive M2M random access in cellular IoT networks. IEEE industrial IoT. IEEE Internet Things J. 6 (6), 10077–10092. http://dx.doi.org/10.
Access 8, 201345–201359. http://dx.doi.org/10.1109/ACCESS.2020.3036398. 1109/JIOT.2019.2935548.
Chowdhury, M.R., De, S., 2022. Queue-aware access prioritization for massive machine- Zhang, X., Xing, J., Yan, Z., Gao, Y., Wang, W., 2013. Outage performance study of
type communication. IEEE Internet Things J. 9 (17), 15858–15873. http://dx.doi. cognitive relay networks with imperfect channel knowledge. IEEE Commun. Lett.
org/10.1109/JIOT.2022.3151408. 17 (1), 27–30. http://dx.doi.org/10.1109/LCOMM.2012.112812.121371.
Debbabi, F., Jmal, R., Fourati, L.C., Aguiar, R.L., 2022. An overview of interslice
and intraslice resource allocation in B5G telecommunication networks. IEEE Trans.
Netw. Serv. Manag. 19 (4), 5120–5132. http://dx.doi.org/10.1109/TNSM.2022.
Soumen Mondal received his B.Tech degree in Electron-
3189925.
ics and Communication Engineering in 2008 from Haldia
Di, C., Zhang, B., Liang, Q., Li, S., Guo, Y., 2019. Learning automata-based access class
Institute of Technology, Haldia, India, and M.Tech. de-
barring scheme for massive random access in machine-to-machine communications.
gree in Telecommunication Engineering in 2010 from NIT,
IEEE Internet Things J. 6 (4), 6007–6017. http://dx.doi.org/10.1109/JIOT.2018.
Durgapur. After that he joined Central Mechanical Engi-
2867937.
neering Research Institute, Durgapur as a Junior Research
Ejaz, W., Ibnkahla, M., 2015. Machine-to-machine communications in cognitive cellular
Fellow in 2010. After that he joined Bengal College of
systems. In: 2015 IEEE International Conference on Ubiquitous Wireless Broadband.
Engineering and Technology, Durgapur as an Assistant Pro-
ICUWB, Montreal, QC, Canada, pp. 1–5. http://dx.doi.org/10.1109/ICUWB.2015.
fessor in Electronics and Communication Dept on 2012. He
7324472.
completed his Ph.D. under Vivesvaraya Ph.D. scheme in
Guo, Z., Zhu, X., Wei, Z., Jiang, Y., Wang, Y., 2022. Collision-aware random access
department of Electronics and Communication Engineering,
control with preamble reuse for industrial IoT. In: 2022 IEEE 95th Vehicular
National Institute of Technology Durgapur in 2021. His
Technology Conference:(VTC2022-Spring). IEEE, pp. 1–6. http://dx.doi.org/10.
research interests include Cognitive Radio Networks, Energy
1109/VTC2022-Spring54318.2022.9860484.
Harvesting, NOMA, MIMO, and FSO. He is serving as
Ha, S., Seo, H., Moon, Y., Lee, D., Jeong, J., 2018. A novel solution for NB-IoT cell
reviewer of IEEE Wireless Communication Letter and IEEE
coverage expansion. In: 2018 Global Internet of Things Summit. GIoTS, Bilbao,
Communication Letter.
Spain, pp. 1–5. http://dx.doi.org/10.1109/GIOTS.2018.8534519.
Jiang, N., Deng, Y., Condoluci, M., Guo, W., Nallanathan, A., Dohler, M., 2018. RACH
preamble repetition in NB-IoT network. IEEE Commun. Lett. 22 (6), 1244–1247. Luca Davoli is a non-tenured Assistant Professor at the
http://dx.doi.org/10.1109/LCOMM.2018.2793274. Internet of Things (IoT) Laboratory, Department of Engi-
Laya, A., Alonso, L., Alonso-Zarate, J., 2013. Is the random access channel of LTE and neering and Architecture, University of Parma, Italy. He
LTE-A suitable for M2M communications? A survey of alternatives. IEEE Commun. obtained his Dr. Ing. degree in Computer Engineering and
Surv. Tutor. 16 (1), 4–16. http://dx.doi.org/10.1109/SURV.2013.111313.00244. his Ph.D. in Information Technologies at the Department
Lee, K.-D., Kim, S., Yi, B., 2011. Throughput comparison of random access methods for of Information Engineering of the same university, in 2013
M2M service over LTE networks. In: GLOBECOM Workshops (GC Wkshps), 2011 and 2017, respectively. He is an IEEE member. His research
IEEE. Houston, TX, USA, pp. 373–377. http://dx.doi.org/10.1109/GLOCOMW.2011. interests focus on Internet of Things (IoT), Pervasive Com-
6162474. puting, Software-Defined Networking, and smart systems.
Li, W., Du, Q., Liu, L., Ren, P., Wang, Y., Sun, L., 2015. Dynamic allocation of RACH He has served as Editorial Board Member and Technical
resource for clustered M2M communications in LTE networks. In: Identification, Program Committee Member of international journals and
Information, and Knowledge in the Internet of Things (IIKI), 2015 International conferences.
Conference on. Beijing, China, pp. 140–145. http://dx.doi.org/10.1109/IIKI.2015.
38.
Li, T., Yuan, J., Torlak, M., 2018. Network throughput optimization for random access Sanjay Dhar Roy received his B. E. (Hons.) degree in
narrowband cognitive radio Internet of Things (NB-CR-IoT). IEEE Internet Things Electronics & Telecommunication Engineering in 1997 from
J. 5 (3), 1436–1448. http://dx.doi.org/10.1109/JIOT.2017.2789217. Jadavpur University, Kolkata, India, and M. Tech. in
Mitola, J., Maguire, G.Q., 1999. Cognitive radio: Making software radios more personal. Telecommunication Engineering in 2008 from NIT Durga-
IEEE Pers. Commun. 6 (4), 13–18. http://dx.doi.org/10.1109/98.788210. pur, and Ph.D. in Wireless Communication in 2011 from NIT
Oh, S.-M., Shin, J., 2017. An efficient small data transmission scheme in the 3GPP Durgapur, respectively. He worked for UshaFone, a mobile
NB-IoT system. IEEE Commun. Lett. 21 (3), 660–663. http://dx.doi.org/10.1109/ communication company, from 1997 to 2000. He joined the
LCOMM.2016.2632128. Department of Electronics & Communication Engineering,
Swain, S.N., Subudhi, A., 2023. Recurrent neural network based RACH scheme NIT Durgapur as a lecturer in 2000 and is currently an
minimizing collisions in 5G and beyond networks. In: IEEE INFOCOM 2023-IEEE Associate Professor there. He is an IEEE senior member.
Conference on Computer Communications Workshops. INFOCOM WKSHPS, IEEE, His research interests include Radio Resource Management,
pp. 1–7. http://dx.doi.org/10.1109/INFOCOMWKSHPS57453.2023.10226096. Handoff, Device to Device Communication, Cognitive Radio
10
S. Mondal et al. Journal of Network and Computer Applications 225 (2024) 103856
Networks, CR Femto Cell Networks, Physical Layer Secu- senior member. He is reviewer of several papers for IEEE,
rity and Energy Harvesting in Cognitive Radio Networks, Elsevier, Wiley journals, etc., and many important national
Cooperative Cognitive Relay Networks, Cellular IoT and 5G and international IEEE conferences.
networks. As of today, he has published more than two hun-
dred (200) research papers in various reputed journals and
conferences. He has reviewed for various IEEE journals and Gianluigi Ferrari received the Laurea (summa cum laude)
different journal papers and books from Elsevier, Springer, and Ph.D. degrees in Electrical Engineering from the Univer-
and Wiley, etc. He has reviewed for IEEE Globecom, IEEE sity of Parma, Parma, Italy, in 1998 and 2002, respectively.
WCNC, IEEE VTC, IEEE PIMRC, IEEE WIMob and NCC on Since 2002, he has been with the University of Parma,
several occasions. where he is currently a Full Professor of Telecommunica-
tions and also the coordinator of the Internet of Things (IoT)
Laboratory, Department of Engineering and Architecture.
Sumit Kundu received Bachelor of Engineering (Hons) in He is co-founder and President of things2i ltd., a spin-off
Electronics & Communication Engineering from National of the University of Parma dedicated to IoT and smart
Institute of Technology, Durgapur (Erstwhile Regional Engg systems. He is an IEEE senior member. His current research
College, Durgapur, University of Burdwan) with University interests include signal processing, advanced communication
Gold medal in 1991, Master of Technology (M.Tech) in and networking, IoT and smart systems.
Telecommunication Systems Engineering from IIT Kharag-
pur in 1993–94 and Ph.D (Wireless Communication) from
IIT Kharagpur in 2004. He has been a faculty in the Riccardo Raheli is Professor of Communication Engineering
Department of ECE, NIT Durgapur since 1995 where he at the University of Parma, Italy, which he joined in 1991.
is currently a Full Time Professor (Higher Administrative From 1988 to 1991, he was with the Sant’Anna School of
Grade). He also served as an Assistant Professor in the Advanced Studies, Pisa, Italy. From 1986 to 1988 he was
G.S.Sanyal School of Telecommunications, IIT Kharagpur with Siemens Telecommunications, Milan, Italy. In 1990 and
for a year in 2007. He has supervised 11 PhDs so far 1993, he spent leaves as a Visiting Assistant Professor at
in the domain of Wireless Communication and Networking the University of Southern California, Los Angeles, USA. His
and continuing supervision for several more students. He scientific interests are in the general area of systems for
has published more than 200 research papers in interna- communication, processing and storage of information, in
tional journal, national and international conferences, and which he has published diversely and extensively. He is an
contributed to several book chapters. His current areas of IEEE life member. He has served as Editorial Board Member
research includes Cooperative Communication, NOMA for and Technical Program Committee Co-Chair of prestigious
5G, Intelligent Reflecting Surfaces (IRS), Cognitive Radio international journals and conferences.
Network, Energy Harvesting in Wireless Networks, Physical
Layer Security, Wireless Sensor Networks. He is an IEEE
11