• Aucun résultat trouvé

Efficient support of the upcoming massive number of IoT devices

N/A
N/A
Protected

Academic year: 2021

Partager "Efficient support of the upcoming massive number of IoT devices"

Copied!
31
0
0

Texte intégral

(1)Efficient support of the upcoming massive number of IoT devices Yassine Hadjadj-Aoul. To cite this version: Yassine Hadjadj-Aoul. Efficient support of the upcoming massive number of IoT devices. SEOC 2019 - Journée Systèmes Embarqués et Objets Communicants, Apr 2019, Paris, France. pp.1-30. �hal-02443173�. HAL Id: hal-02443173 https://hal.inria.fr/hal-02443173 Submitted on 17 Jan 2020. HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers.. L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d’enseignement et de recherche français ou étrangers, des laboratoires publics ou privés..

(2) EFFICIENT SUPPORT OF THE UPCOMING MASSIVE NUMBER OF IOT DEVICES Yassine Hadjadj-Aoul Associate professor, Univ Rennes IRISA/INRIA Dionysos team-project. Monday, April 1st, 2019. 1.

(3) PLAN Introduction Access overview of IoT devices A model for the access Efficient support of a massive number of IoT devices Conclusions 2.

(4) INTRODUCTION. Massive access of IoT devices. 3.

(5) THE IOT IS GOING TO BE BIG THOUGH NOBODY REALLY KNOWS HOW BIG …. 28.1 BILLION Units by 2020. 25 BILLION. 25 BILLION. Units by 2021. M2M connections by 2022 OF WHICH. $1.7 TRILLION. $200 BILLION. 2.6 BILLION ARE CELLULAR. SERVICES REVENUES IN 2020. GLOBAL SOLUTION REVENUES BY 2020. $1.7 TRILLION GLOBAL ECONOMIC VALUE IN 2020 Source: May 2015. Source: November 2018. $1.2 TRILLION GLOBAL OPPORTUNIY BY 2022 Source: January 2013. 4.

(6) HOW TO HANDLE SUCH A LARGE NUMBER OF DEVICES? A large share of IoT devices will be served by short-range radio technologies ­ Unlicensed spectrum (e.g. Wi-Fi and Bluetooth) ­ Costless but … ­ Limited QoS and security requirements. A significant proportion will be enabled by wide area networks (WANs) ­ Unlicensed Low Power Wide Area (LPWA): LoRa, Sigfox, … ­ Very limited demands on throughput, reliability and QoS. ­ Licensed spectrum: 4G, NB-IoT, 5G, … ­ Largely responsible for wireless connectivity on a global scale ­ Adapted to deliver reliable, secure and diverse IoT services 5.

(7) CELLULAR NETWORK ARCHITECTURE CONGESTION LOCALIZATION A huge number of devices ... ... but a limited number of resources (i.e., # of opportunities to connect) Random access. ! !. ­ Only way to access the network (simplest) ­ The most critical area. !. Complex traffic pattern. !. ­ Poisson (e.g. credit machine in shops), Uniform (e.g. traffic lights), Beta (e.g. event driven). !. Different classes of IoT (including prioritized M2M) Adlen Ksentini, Yassine Hadjadj-Aoul, and Tarik Taleb: “Cellular-based Machine Type Communication: Overload control”. In IEEE Network, Vol. 26, Issue 6, Pages : 54 – 60 (November 2012). 6.

(8) RISK OF CONGESTION COLLAPSE AT THE RAN Even when having 54 opportunities, the risk of congestion is still high … (b). (a) 25. # of successful RA. # of Beta arrivals. 80. 60. 40. 20. 0. « RAN overload control … is identified as the first priority improvement area » … 3GPP TR 37.868. 20 15 10 5. 0. 2. 4 6 Time (s). 8. 10. 0. 0. 2. 4 6 Time (s). 8. 10. Meriam Bouzouita, Yassine Hadjadj-Aoul, Nawel Zangar, Sami Tabbane : “On the risk of congestion collapse in heavily congested M2M networks”. In proc. of IEEE ISNCC, Hammamet, Tunis (May 2016). 7.

(9) ACCESS OVERVIEW OF IOT DEVICES. Understanding the origin of the problem. 8.

(10) ATTACH PROCEDURE First PRACH opportunity. Attach procedure is needed before any connection The main steps to move from idle to connected ­ Cell search and Synchronization procedures ­ Acquiring the cell system information. ­ when and where the preamble can be transmitted ­ number of available RA preambles ­ maximum number of transmissions of the preamble when a failure takes place ­ size of Random Access Response (RAR) window (in number of subframes). ­ RACH Procedure (Random Access Channel) ­ Contention-based Random access. Limited radio resources opportunities (4-64 opportunity/Frame). 9.

(11) RANDOM ACCESS. Random selection of a preamble Collision. Successful. X. Preamble Transmission (Msg1) RAID : Random Access ID RAR Message : TA + UL grant + T-CRNTI (Msg2). TA: Timing Advance T-CRNTI : Temporary Cell Radio Network Identifier. Preambles RRC Connection Req. : terminal ID Msg3. RRC Connection Setup : Msg4 10.

(12) A MODEL FOR THE ACCESS. Fluid model approximating the access process. 11.

(13) MODEL FOR ACCESS (1) Could be modeled using the classical « Balls into Bins » problem M Balls ~ M IoT devices. Bin selection: random, uniform and independant. N Bins ~ N opportunities to connect. 12.

(14) MODEL FOR ACCESS (2) Could be modelled using the classical « Balls into Bins » problem ­ NI : # of idle preambles (# of bins with no ball). 1 ' !" # = ! 1 − ! ­ NS: # of successful access (# of bins with 1 ball) 1 ')* !( # = # 1 − !. N Bins ~ N opportunities to connect. Collision Successful preamble Idle preamble. M Balls ~ M IoT devices. 13.

(15) SOME EXISTING APPROACHES TO TACKLE THE CONGESTION AT THE ACCESS Access planning. ­ Limit the burden … but insufficient since some devices react to events which cannot be timed.. Grouping devices Pull based scheme. ­ A paging message may also include a back-off time for the MTC. Separate RACH resources for MTC. ­ Splitting the preambles into H2H group(s) and MTC group(s) ­ or allocating PRACH occasions in time or frequency to either H2H or MTC devices.. Dynamic allocation of RACH resources Access Class Barring (ACB) ­ UE individual Access Class Barring ­ Extended Access Barring. Meriam Bouzouita, Yassine Hadjadj-Aoul, Nawel Zangar, Sami Tabbane, César Viho: « A random access model for M2M communications in LTEadvanced mobile networks», In « Modeling and simulation of computer networks and systems », Elsevier/Morgan Kofmann, pp. 577 – 599 (2015). 14.

(16) FOCUS ON THE EAB Broadcast - BCCH Per-class ACB-factor p. Backlogged IoT device. Select a random q. ACB barring time. No. q< p. Arrival. Backlogged IoT devices x x. Starting RA and preamble transmission. Successful transmission Remaining RA steps. No. Max retransmissions Failure. x. Access with probability p. IoT devices that could attempt access 15.

(17) A FLUID MODEL FOR THE ACCESS *+ .. *+. Arrivals. *,. -+. 5+ -+,4. / -+. -,. 1 − $% 012+ -,. 1 − / -+. -+,4 Successful attempts IoT devices that could attempt access $% = 1 −. 1 ). $% 012+-,. 5, -,,4. Access with M IoT device probability p !" #. Backlogged IoT devices. *,. dx1 dt dx2 dt dx1,L dt dx2,L dt. -,,+. = λ − x1 + µ1 x1,L , = px1 + µ2 x2,L − x2 , = (1 − p)x1 − µ1 x1,L ,. ! " x2 −1 = 1 − qN x2 − µ2 x2,L .. 16.

(18) EFFICIENT SUPPORT OF IOT DEVICES. Estimating the access’s contention. 17.

(19) CHALLENGES AT THE ACCESS Setting up a control action. 1∗2. What is the optimal number of contending devices ­ Best target for a control strategy. How to estimate the number of contending devices (in states !" and !# ) ? ­ Difficulty: no direct way to know it. !" %. $". ." $",-. & $". $#. '( )*+"$#. .# $#,-. What is the best control action to optimize the number of contending devices ? ­ Optimal barring strategy ­ KPI: delay, energy, abandons, number of attempts… ­ Difficulty: Nonlinear model, non-affine in control. !#. 1 − '( )*+" $#. 1 − & $". $",-. $#,". How prioritize the contending devices (sharing the same resources)? ­ Per-class estimation, per-class barring Meriam Bouzouita, Yassine Hadjadj-Aoul, Nawel Zangar, Gerardo Rubino: “Estimating the number of contending IoT devices in 5G networks: revealing the invisible”. In Wiley, Transactions on Emerging Telecommunications Technologies (TETT). (August 2018). 18.

(20) HOW TO DETERMINE THE OPTIMAL NUMBER OF CONTENDING DEVICES? Contending devices vs. Successful accesses. 25. Method 1: Can be determined by Monte Carlo simulations Maximized when: # of contending devices = 54. (54, ~20.06) 20. 15. 10. Number of opportunities N 5. 0 0. 50. 100. 150. 200. 250. 19. 300.

(21) WHAT IF WE KNOW THE NUMBER OF CONTENDING DEVICES AT THE TWO STEPS ? The system can be solved optimally using a nonlinear version of the Linear Quadratic controller. Evolution of the number of M2M devices in x2 vs the arrival rate Meriam Bouzouita, Yassine Hadjadj-Aoul, Nawel Zangar, Gerardo Rubino, Sami Tabbane : « Applying nonlinear optimal control strategy for the access management of MTC devices ». In proc. of IEEE CCNC, Las Vegas, USA (January 2016). 20.

(22) DIFFICULTY TO KNOW IN ADVANCE HOW MUCH TERMINALS WILL CONTEND FOR THE ACCESS Planning doesn’t really solve the problem ­We may know the time interval for the connection but not the exact time. The access of event-driven applications cannot be quantified and cannot be planned. 21.

(23) WHAT ABOUT USING A MODEL AGNOSTIC APPROACH? The Discrete Proportional Integral Controller (PID) ­ Reduced complexity ­ Exploits the difference between the measured value and the targeted value. ­ Well know, common and robust controller. Does not really scale for a massive number of IoT devices ­ Adaptive version … ­ Improving the estimation of the number of IoT devices Meriam Bouzouita, Yassine Hadjadj-Aoul, Nawel Zangar, Gerardo Rubino, Sami Tabbane : « Multiple Access Class Barring factors Algorithm for M2M communications in LTE-Advanced Networks ». In proc. of ACM MSWIM, Cancun, Mexico (November 2015). 22.

(24) HOW TO DETERMINE THE OPTIMAL NUMBER OF CONTENDING DEVICES? (~53.50, ~20.05). Method 2: Can be determined analytically Analysis of !" , # $ = $ & '() , $ ≥ 0, ! > 1 1 & =1− !. We have # 0 = # ∞ = 0 and # 0 $ = & '() 1 + ln & ) giving a maximum at $ = $ ∗ = − 67 8. 23.

(25) HOW TO DETERMINE THE NUMBER OF CONTENDING IOT DEVICES? (1). Collision. Successful. X Preambles. Lower bound: !",$%& = () + 2 (, Knowing (- , one can have an idea of the number of contending devices. 2. (- = ( . /0 means that !" =. 1& 23 1& 4. Work only when having at least 1 available slot (Non too congested system) 24.

(26) HOW TO DETERMINE THE NUMBER OF CONTENDING IOT DEVICES? (2) (~53.50, ~20.05). Knowing !" , one can have an idea of the number of contending devices. !" = $% &. '( )*. means that $% =. + , -. , /0 -. ,. Work only when having at least 1 successful IoT access. (Non too congested system) But, two possible solutions … 25.

(27) SOME RESULTS … Evolution of x2 & x̂2. 100. x2 x̂2. 80 60 40 20 0. 0. 5. 10. 15 Time(s). 20. 25. 30. 26.

(28) SOME RESULTS … Estimation’s gap (%) of x2. 100 adaptive p=1 p = 0.8 p = 0.2. 80 60 40 20 0 16. 18. 20. 22. 24. 26. 28 30 32 λ(#/10ms). 34. 36. 38. 40. 42. Meriam Bouzouita, Yassine Hadjadj-Aoul, Nawel Zangar, Gerardo Rubino, Sami Tabbane : “Dynamic adaptive access barring scheme for heavily congested M2M networks”. In proc. of ACM MSWIM, Malta (November 2016). 27.

(29) HOW TO DETERMINE THE NUMBER OF IOT DEVICES WILLING TO CONNECT? Leveraging crowd sourcing for an optimized IoT access ­Realistic and requires a minor modification of the actual standard ­Enriching the connection request message with: ­ Counting the failing ACB attempts ­ Counting the number of RA attempts. The congestion level gives an idea of the accuracy of the estimation of the number of IoT devices willing to access Meriam Bouzouita, Yassine Hadjadj-Aoul, Nawel Zangar, Sami Tabbane : “Leveraging crowd sourcing technique for an optimized M2M access during emergency situations”. In proc. of IEEE ICT-DM 2016, Vienna, Austria (December 2016). 28.

(30) SOME RESULTS … 120. x1 x̂1. Evolution of x1 & x̂1. 100 80 60 40 20 0. 0. 5. 10. 15 Time(s). 20. 25. 30. 29.

(31) CONCLUSIONS Estimating the number of IoT devices willing to connect and the IoT devices contending for the access is a requirement ­ Only way to guarantee the QoE ­ Same technique could be used to estimate the number of different classes of IoT devices willing to connect. Need to develop such techniques for other networks than mobile networks (i.e. LoRa, Sigfox, …). 30.

(32)

Références

Documents relatifs

We compare the height- latitude pattern of temperature changes as simulated by the MIT 2D model with observed changes, using optimal fingerprint detection statistics2. Interpreted

Through the fine-grain analysis of a given low-bandwidth IoT device periodically sending data to a Cloud server using WiFi, we propose an end-to-end energy consumption model. This

Zhang, “Joint transmit beamforming and receive power splitting for MISO swipt systems,” IEEE Trans.. Wireless

Univ Lyon, Inria, INSA Lyon, CITI F-69621, Villeurbanne, France..

In fact, services are often oriented towards data processing (i.e., functions or tasks) and aim to be reusable in workflow processes where data are defined and

As the main contribution of this study, we develop an original decoding algorithm suitable for LOS LED-to-camera communication which demonstrates for the first time real

The answers show that most participants are aware of privacy risks, though they are inclined to keep using a device that infringes on their privacy.. Moreover, our results provide

To fill the gap, in this paper we propose a multi-level system to (1) contextually analyze customer behavior at a shopping space by means of Internet-of-Things devices and