Elsevier

Pervasive and Mobile Computing

Volume 48, August 2018, Pages 59-68
Pervasive and Mobile Computing

Traffic characterization and LTE performance analysis for M2M communications in smart cities

https://doi.org/10.1016/j.pmcj.2018.05.006Get rights and content

Abstract

The paper presents a model for the characterization of Machine-to-machine (M2M) traffic and the performance evaluation of LTE access to support M2M communication, embedded into a web-based application. The application enables the study of the traffic produced by realistic M2M elements in the context of smart cities. Packet generation for each machine is modeled by means of three mathematical distributions (Poisson, Beta, and Deterministic), which makes it possible to represent a wide variety of M2M applications. A case study was constructed based on the city of Montreal. Real data on the position of machines were retrieved from public datasets. The case study includes a realistic representation of the LTE infrastructure that allows the estimation of traffic load at each eNodeB, as well as other performance indexes, such as collision probability and access delay. The use of real geographic information enables visual analyses aiming at identifying bottlenecks and possible roadblocks to the M2M integration in the LTE infrastructure.

Introduction

M2M communications are usually referred to as the transmission of information among smart objects (i.e., devices with communication capabilities), without any human intervention. The importance of this kind of communication has risen in the last decade, due to the steep increase in the number of devices that are able to autonomously communicate with each other. The growth will accelerate in the next future, and the number of communicating devices is expected to rise to several billions in 2020. The connection of this large amount of communicating objects, also known as Internet of Things (IoT), needs to be supported by one of the existing communication infrastructures. LTE is currently seen as one of the best candidates due to its ubiquitous access and large spectrum availability. Moreover, 3GPP has – in Release 13 in 2014 – proposed Narrow Band IoT (NB-IoT), a new LTE-protocol specifically conceived to provide low power access to a large number of devices. The small transmission power and the reduced bandwidth (i.e., 200 kHz), makes NB-IoT particularly suitable for M2M communications.

The LTE infrastructure was, however, originally conceived to support human traffic, that is sensitively different from M2M traffic. First of all, M2M traffic is mostly in the uplink direction, whereas Human Type Communications (HTC) are most frequently distributed in the downlink. Second, the packet size in M2M applications is essentially in the order of hundreds of bits, considerably smaller than in HTC. Third, M2M devices are predominantly1 installed in fixed locations and do not require mobility, which is often needed in HTC. Moreover, human traffic is strongly correlated to human activity time (e.g., busy during the day and sleeping at night), whereas that is not necessarily the case for machines.

Finally, the cellular infrastructure – in particular the location and the settings of the base stations – is customized around the expected human position. This is why, for example, base stations are closer to each others in crowded urban areas and further apart in rural areas where the presence of humans is not very prominent. For all these reasons, M2M traffic needs to be thoroughly studied and the suitability of LTE, as well as other candidate solutions, needs to be assessed through customized performance evaluations.

LTE is basically composed of the Evolved Universal Terrestrial Radio Access Network (E-UTRAN) and the Evolved Packet Core (EPC). The E-UTRAN is supposed to be the segment that will be most affected by the introduction of massive M2M traffic. The resource scheduling in the uplink is based on an initial random access with a limited number of frequency slots to be used: this capacity might be the bottleneck when a large number of concurrent devices try to access the network. It is therefore important to assess whether the E-UTRAN is able to manage the traffic generated by M2M applications.

To examine this problem, we propose a web-based framework that can be used to characterize M2M traffic and study the suitability of standard LTE access mechanisms for massive M2M communications. The framework takes into account real geographic data on the position of machines, retrieved from public online databases. The traffic generated by realistic M2M applications is represented by means of three types of mathematical distributions (e.g., Poisson, Beta, and Deterministic). A network simulator was also implemented using Java to model the LTE random access procedure evaluating its performance. The proposed framework permits to visually analyze the performance of the LTE infrastructure, when simultaneously supporting multiple realistic M2M applications.

The remainder of this document is structured as follows: Section 2 contains a brief overview of the literature about M2M traffic characterization and performance analysis over LTE; Section 3 describes the implemented web application; Section 4 presents a case study with some numerical results; Section 5 contains the conclusions of this work.

Section snippets

State of the art

A good survey on the state of the art of M2M traffic issues over LTE can be found in [1]. The authors provide an accurate overview of the LTE network, pointing out the specific issues related to a massive integration of M2M communications. They also present an overview of the M2M traffic models proposed in the current literature, and of access techniques anticipated in the LTE standard in order to cope with M2M communications strict requirements.

The use of LTE as supporting communication

The web application

The architecture of the web application at hand is shown in Fig. 1. The proposed framework encompasses three building blocks: (i) the geographic database, (ii) the M2M application definition, and (iii) the network simulator. As one can notice, the third block is further divided into traffic generation and LTE access performance evaluation. Each of these units are separately described in what follows.

Case study: Montreal

Montreal, the second largest city in Canada, was chosen as case study for the proposed framework, available at www.trafficm2modelling.com. This city represents a good fit for M2M applications, because it was recently acknowledged as one of the top intelligent cities in the world in 2016 by the Intelligent City Forum (ICF). Publicly available data on the position of several machine types in Montreal are provided, as well as the LTE infrastructures of several providers. The proposed web

Conclusions and future work

This work focused on the M2M traffic characterization and on the performance evaluation of the LTE access to support massive M2M communications. A web-application was implemented for this study, and is publicly available at www.trafficm2modelling.com.

The web-application allows to consider the exact position of different sets of machines (e.g., traffic lights, smart meters, bus stops). The geographic position permits to increase the fidelity of studies to actually implemented M2M systems. The

Acknowledgments

This web application is hosted in Compute Canada servers. The authors kindly thanks Compute Canada for its support. Further details at www.computecanada.ca.

References (21)

  • E. Soltanmohammadi, K. Ghavami, M. Naraghi-Pour, A survey of traffic issues in machine-to-machine communications over...
  • 3GPP, Study on RAN improvements for machine-type communications (release 11) - tr 37.868, Report,...
  • ChengR.-G. et al.

    RACH collision probability for machine-type communications

  • ZhouK. et al.

    Contention based access for machine-type communications over LTE

  • RatasukR. et al.

    Coverage and capacity analysis for machine type communications in LTE

  • M. Laner, P. Svoboda, N. Nikaein, M. Rupp, Traffic models for machine type communications, in: Wireless Communication...
  • ShafiqM.Z. et al.

    A first look at cellular machine-to-machine traffic: large scale measurement and characterization

  • G. Piro, N. Baldo, M. Miozzo, An LTE module for the ns-3 network simulator, in: Proceedings of the 4th International...
  • BaldoN. et al.

    An open source product-oriented LTE network simulator based on ns-3

  • PoleseM. et al.

    M2m massive access in LTE: Rach performance evaluation in a smart city scenario

There are more references available in the full text version of this article.

Cited by (33)

  • A new scalable authentication and access control mechanism for 5G-based IoT

    2020, Future Generation Computer Systems
    Citation Excerpt :

    Executing these AKA protocols to establish a secure connection with the cellular system is mandatory for each UE (composed of a mobile device and a secured element) to obtain its cellular connectivity [1,2]. However, these well-established principles may prevent cellular systems from supporting the connectivity of a massive number of devices [3], in particular when considering the context of the IoT — where a high growth rate of connected devices is anticipated [4–6]. On one hand, most devices are constrained in terms of energy supply and computational capacities preventing them from running complex security protocols like EPS-AKA [7–9].

  • Interrelationship between energy efficiency and spectral efficiency in cognitive femtocell networks: A survey

    2019, Pervasive and Mobile Computing
    Citation Excerpt :

    Scarcity of spectrum resources is a significant challenging issue in present military, commercial and civil applications. Therefore, it is quite obvious that communication equipments will need more spectral resources [1]. By utilizing the cognitive radio (CR) technology, unused spectrum named as cognitive spectrum hole can be detected.

View all citing articles on Scopus
View full text