This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Hybrid Resource Scheduling for Aggregation in Massive Machine-type Communication Networks

Onel L. Alcaraz López, Hirley Alves, Pedro H. J. Nardelli, Matti Latva-aho
Onel L. Alcaraz López, Hirley Alves and Matti Latva-aho are with the Centre for Wireless Communications (CWC), University of Oulu, Finland.{onel.alcarazlopez,hirley.alves,matti.latva-aho}@oulu.fiPedro H. J. Nardelli is with Laboratory of Control Engineering and Digital Systems, Lappeenranta University of Technology, Finland. pedro.nardelli@lut.fiThis work is partially supported by Academy of Finland (Aka) (Grants n.303532, n.307492, n.318927 (6Genesis Flagship)), SRC/Aka BCDC Energy (n. 292854), as well as the Finnish Foundation for Technology Promotion, the Finnish Funding Agency for Technology and Innovation (Tekes), Bittium Wireless, Keysight Technologies Finland, Kyynel, MediaTek Wireless, Nokia Solutions and Networks.
Abstract

Data aggregation is a promising approach to enable massive machine-type communication (mMTC). Here, we first characterize the aggregation phase where a massive number of machine-type devices transmits to their respective aggregator. By using non-orthogonal multiple access (NOMA), we present a hybrid access scheme where several machine-type devices (MTDs) share the same orthogonal channel. Then, we assess the relaying phase where the aggregatted data is forwarded to the base station. The system performance is investigated in terms of average number of MTDs that are simultaneously served under imperfect successive interference cancellation (SIC) at the aggregator for two scheduling schemes, namely random resource scheduling (RRS) and channel-dependent resource scheduling (CRS), which is then used to assess the performance of data forwarding phase.

Index Terms:
data aggregation, mMTC, resource scheduling, NOMA

I Introduction

Machine-type Communication (MTC) is an inherent part of the fifth generation (5G) cellular networks [1, 2], covering automatic data generation, exchange, processing and actuation that are the basis of intelligent machine networks. Such MTC networks are growing at an impressive rate and some predictions are pointing to 20 billion machine-type devices (MTDs) connected to wireless networks in 2023 and beyond [3]. Massive Machine-type Communication (mMTC) are envisaged to cope with that large number of, often low-complexity low-power, MTDs that are becoming part of wireless networks [4]. A survey on the requirements, technical challenges, and existing work on medium access control (MAC) layer protocols for supporting these new use cases, is presented in [5], while authors describe also the issues related to efficient, scalable, and fair channel access. In fact, different strategies have been proposed to provide more efficient access, e.g., access class barring [6], prioritized random access [7], backoff adjustment scheme [8], delay-estimation based random access [9], distributed queuing [10], data aggregation [2, 11]. Data aggregation consists in MTDs that organize themselves locally to MTC area networks, then, the area networks connect to the core network through MTC gateways or data aggregators. This alleviates the problem of massive signaling overhead on the architectural side and it is a key solution strategy to collect, process, and communicate data in MTC use cases with static devices, especially if the locations of the devices are known, such as smart utility meters or video surveillance cameras [12, 4, 13].

In [14], authors survey data aggregation strategies in large-scale wireless sensor networks (WSNs), while focusing on the processing challenges behind the large volume of data. In [15], an experimental study using state-of-the-art drive testing equipment is conducted in order to capture and analyze the impact of MTC data aggregation on signaling overhead in cellular networks with focus on static MTDs such as smart meters and monitoring sensors. Authors of [16] present a scheme designed to provide data aggregation for heterogeneous and concurrent sets of Constrained Application Protocol [17] (CoAP) data-requests. The problem of energy-optimal routing and multiple-sink aggregation is investigated in [18], as well as joint aggregation and dissemination of sensor measurement data in MTC edge networks. An aggregation scheme is proposed in [11] for capillary networks connected to the LTE network to improve their communication efficiency. Authors analyze the trade-offs between random access interaction, resource allocation, and communication latency, and reveal that accepting the extra latency for accumulating packets can significantly reduce the random access requests and the required resources for the data transmissions.

Notice that when aggregating a massive number of MTDs, the density of the aggregators, although it is considerably smaller compared to the density of the MTDs, will still be large. Hence, the interference generated by the devices sharing the same resource is not negligible. There is, though, limited literature considering the interference in mMTC with data aggregation and resource scheduling. Authors in [19] partially address those issues by considering a multi-cell network scenario, whose key metrics (namely MTD success probability, average number of successful MTDs and probability of successful channel utilization) are investigated for the random resource scheduling (RRS) and channel-dependent resource scheduling (CRS) schemes.

Another technique called non-orthogonal multiple access (NOMA) is seen as a promising technology for the 5G networks to improve the system spectral efficiency while meeting the demand of massive connectivity demanded by certain MTC applications (e.g [20]). The key idea behind NOMA is to exploit the power domain for multiple access so that multiple users can be multiplexed at different power levels, but at the same time/frequency/code employing SIC to separate superimposed messages [21]. The performance of NOMA is evaluated in [22, 23] by using the stochastic geometry tools. However, the inter-cell interference, which is a pervasive problem in most of the existing wireless networks, is not explicitly considered in [22], as many other works on NOMA. In contrast, authors in [23] do consider the inter-cell interference when evaluating the performance of NOMA on coverage probability and average achievable rate, but on a downlink setup. In [24], we propose and analyze a hybrid OMA-NOMA scheme for mMTC uplink scenarios by extending the scheduling schemes RRS and CRS initially proposed in [19]. Therein we deal with the limited resources and allow up to two MTDs to share the same orthogonal channel while we consider imperfect SIC. We show that even when the hybrid scheme would lead to a less reliable system with greater chances of outages per MTD, due to the additional intra-cluster interference, it can significantly improve the number of simultaneous active MTDs for high access demand scenarios.

Differently from [24], in this work we allow the RRS scheme to control the power coefficients of the MTDs sharing the same channel, thus both, RRS and CRS, have the same impact in terms of interference generated on the outside network (network outside of the aggregation zone of interest). Additionally, here we are agnostic of the outside network topology, nonetheless our proposed model captures the interference coming from outside. We also include the evaluation of the relaying phase of the aggregated data to the base stations, while we focus on the average number of simultaneous active MTDs. That allow us to highlight the advantages of our scheme which aims to provide massive connectivity in scenarios with high access demand, which is not covered by usual OMA setups. Although CRS achieves better performance by providing access to the MTDs with best channels, RRS could be more practical since the random pairing could model scenarios where some MTDs have urgency to be served. Results show that failing to efficiently eliminate the intra-cluster interference could reduce significantly the benefits from NOMA while challenging its practical implementation, thus, power control plays a main role in these systems. Finally, we attain approximated, yet accurate, expressions when analyzing the CRS scheme. In contrast to the time-consuming Monte-Carlo simulations, our analytical derivations allow for fast computation.

Next, Section II introduces the system model. Section III discusses the RRS and CRS scheduling schemes for the aggregation phase, while Section IV analyses the relaying phase and the overall system performance. Section V presents the numerical results and Section VI concludes the paper.

Refer to caption
Refer to caption
Figure 1: a), b) and c) Snapshot of the aggregation phase with m¯=6\bar{m}=6, L=2L=2 and N=4N=4. MTDs with the same shape and color are using the same channel across the entire network. (Different realizations: a) K<NK<N, b) N<K<LNN<K<L\cdot N, c) K>LNK>L\cdot N). d) Snapshot of the relaying phase.

Notation: 𝔼[]\mathbb{E}[\!\ \cdot\ \!] denotes expectation, Pr(A)\Pr(A) is the probability of event AA, Pr(A|B)\Pr(A|B) is the Pr(A)\Pr(A) conditioned on BB. 𝟙()\mathbbm{1}(\cdot) is an indicator function which is equal to 11 if its argument is true and 0 otherwise; while (nk)=n!k!(nk)!\binom{n}{k}=\frac{n!}{k!(n-k)!}. Γ(x)\Gamma(x) is the gamma function, ψ(x)=d[ln(Γ(x))]dx\psi(x)=\tfrac{d[\ln(\Gamma(x))]}{dx} is the digamma function, Q(a,x)=1Γ(a)xta1etdtQ(a,x)=\tfrac{1}{\Gamma(a)}\int_{x}^{\infty}t^{a-1}e^{-t}\mathrm{d}t is the regularized incomplete gamma function, and F11(a;b;z)\ {}_{1}F_{1}(a;b;z) is the Kummer confluent hypergeometric function. 𝐢=1\mathbf{i}=\sqrt{-1} and Im{z}\mathrm{Im}\{z\} is the imaginary part of zz\in\mathbb{C}. fX(x)f_{X}(x) and FX(x)F_{X}(x) are the Probability Density Function (PDF) and Cumulative Distribution Function (CDF) of random variable (RV) XX, respectively. XExp(1)X\sim\mathrm{Exp}(1) is an exponential distributed RV with unit mean, e.g., fX(x)=exf_{X}(x)=e^{-x} and FX(x)=1exF_{X}(x)=1-e^{-x}; while YPoiss(m¯)Y\sim\mathrm{Poiss}(\bar{m}) is a Poisson distributed RV with mean m¯\bar{m}, e.g., Pr(Y=y)=1y!m¯yem¯\Pr(Y\!=\!y)\!=\!\tfrac{1}{y!}\bar{m}^{y}e^{-\bar{m}} and FY(y)=Q(y+1,m¯)F_{Y}(y)\!=\!Q(y\!+\!1,\bar{m}).

II System Model and Assumptions

Consider interference-limited111The interference from other MTDs is much larger than the white noise in the receivers and, therefore, can be ignored. However, notice that the impact of the noise can be easily incorporated into our analysis. uplink of MTC network is divided into two phases. In the first phase (aggregation phase), the MTD tries to transmit its data with fixed payload size bb (bits) to its serving aggregator. The MTDs are served through NN orthogonal channels as in [19]; however, here the same orthogonal channel could be used for more than one MTD. When the access demand is not so high, the aggregator will be allocating one MTD per channel. But, when the access demand exceeds the availability of orthogonal channels, some MTDs are allowed to share the same orthogonal channel. This scheme is our proposed hybrid OMA-NOMA multiple access scenario [24]. The number of MTDs requiring service is modeled as KPoiss(m¯)K\sim\mathrm{Poiss}(\bar{m}). The maximum number of users per orthogonal channel is LL, where L=1L=1 reduces to an OMA scenario, and for simplicity we focus on the L=2L=2 setup. Furthermore, the scenario with L=2L=2 seems more practical than L>2L>2 when we take into consideration the processing complexity for SIC receivers, especially when SIC error propagation is considered as discussed in [25]. Figs.1a-c show snapshots of the considered aggregation phase for three different realizations. The silent MTDs are those out of the NLN\cdot L available resources being used by the active MTDs. The aggregator implements the resource scheduling according to one of the schemes presented in Section III, and the MTDs considered are those with granted access since the random access in the network is assumed to be performed222The resource scheduling schemes require that synchronization procedures, as well as the random access stage, are performed in advance. In fact, the work in [26] proposes a NOMA scheme allowing the combination of random access and data transmissions phases, where our resource scheduling schemes can be easily incorporated to improve the overall system performance. The details of such implementation are out of the scope of this work. as in [19, 27, 24].

After aggregating the MTDs’ data, the aggregator acts as an ordinary cellular user and relays the entire information to its associated BS in the second phase (relaying phase) as shown in Fig. 1d. For the aggregation phase with L>1L>1, there is both: outside interference ρIo,1\rho I_{o,1} (i.e. interference from MTDs operating on the same channels but being served by other aggregators), and inside interference (i.e. interference from MTDs within the serving area of the aggregator), which are both RVs. For the relaying phase, let ρIo,2\rho I_{o,2} be the interference at the BS from aggregators in other cells operating with the same channel resources. Notice that Io,xI_{o,x} relies on the outside network topology, which is assumed unknown, but with a Laplace transform of Io,xI_{o,x} in the form of

Io,x(s)=exp(ϕxΓ(1+2α)Γ(12α)s2α),x={1,2},\mathcal{L}_{I_{o,x}}(s)\!=\!\exp\left({\!-\phi_{x}\Gamma\big{(}1\!+\!\tfrac{2}{\alpha}\big{)}\Gamma\big{(}1\!-\!\tfrac{2}{\alpha}\big{)}s^{\frac{2}{\alpha}}}\right),\ x=\{1,2\}, (1)

which is a established result from the stochastic geometry for wireless networks generated as PPP with Rayleigh fading, where α\alpha is the path-loss exponent, while ϕx\phi_{x} accounts for network density, characteristics of the aggregation/relaying areas, and others [28, 19]. Also, (1) holds under the assumption of using statistical full inversion power control [29] with parameter ρ\rho, as we assume here to guarantee a uniform user experience while saving valuable energy. The latter implies that devices control their transmit power such that the average signal power received at the serving aggregator/BS is equal to the predefined value ρ\rho. Thus, the instantaneous received power at the receiver side is ρh\rho h, where hExp(1)h\sim\mathrm{Exp}(1) is the channel power gain under quasi-static Rayleigh fading, and ρ\rho does not impact the performance since we assume the network as interference-limited.

Notice that the process ϕx\phi_{x} could also be dependent of α\alpha, as discussed in [30, 31]. In that case, the Laplace transform of the interference for different point processes appear to be merely horizontally shifted versions of each other (in dB) as long as their diversity gain is the same. Thus, scaling the threshold ss by this SIR gain factor β\beta,333β\beta will also depend on ss, but finding β\beta for a fixed ss already gives a good approximation [31]. we get (βs)2α(\beta s)^{\frac{2}{\alpha}}, where β2α\beta^{\frac{2}{\alpha}} would be included in ϕx\phi_{x}. By properly selecting ϕx\phi_{x}, the outside interference for any given topology could be then characterized. Finally, full channel state information (CSI) is assumed at receiver side as in [19, 22, 23].

III Aggregation Phase

In this section we discuss the RRS and CRS scheduling schemes for our hybrid access protocol.

III-A RRS for the Hybrid Access

Under the RRS scheme, NN out of the KK instantaneous MTDs requiring transmissions are independently and randomly chosen and then matched, one-to-one, with the orthogonal channels. If KNK\!\leq\!N, all MTDs get channel resources, and even NKN\!-\!K channels will be unused. Otherwise, if K>NK\!>\!N, the channel allocation is executed again by allowing the remaining MTDs to share channels with the already served MTDs. This process is executed repeatedly until all the MTDs are allocated or the maximum number of MTDs per channel, LL, is reached for all the channels. The inside interference, coming from the MTDs within the same aggregation zone and sharing the same channel, is faced with SIC. The SIR, SIRj,ur\mathrm{SIR}^{r}_{j,u}, of the jjth MTD being decoded on a typical channel, given the number of MTDs uu on the same channel and the RRS scheme, is SIR1,1r=hIo,1\mathrm{SIR}^{r}_{1,1}=\frac{h}{I_{o,1}}, while

SIR1,2r\displaystyle\mathrm{SIR}^{r}_{1,2} =a1max(h1,h2)Io,1+a2min(h1,h2),\displaystyle=\frac{a_{1}\max(h_{1},h_{2})}{I_{o,1}+a_{2}\min(h_{1},h_{2})}, (2)
SIR2,2r\displaystyle\mathrm{SIR}^{r}_{2,2} =a2min(h1,h2)Io,1+μa1max(h1,h2),\displaystyle=\frac{a_{2}\min(h_{1},h_{2})}{I_{o,1}+\mu a_{1}\max(h_{1},h_{2})}, (3)

where μ[0,1]\mu\in[0,1] is used to model the impact caused by imperfect SIC [32], while h1h_{1} and h2h_{2} are the channel power coefficients of both MTDs sharing the channel when u=2u=2.

We can weight the power of coexistent nodes on the same channel through a1a_{1} and a2a_{2} coefficients. Of course, some kind of feedback from the aggregators would be required after pairing the MTDs444Since up to 2 MTDs can be scheduled to transmit over the same channel, acquiring and using CSI at the MTD side is not appropriate. Instead, the aggregator should acquire the CSI and use it for the scheduling and for determining the power control coefficients; while finally forwarding such information back to the MTDs.. By letting a1+a2=δa_{1}+a_{2}=\delta be a fixed value we impose some kind of total transmission power constraint. This is crucial for NOMA scenarios, and here it is particular important in order to control the interference generated on close aggregators in the outside area555Notice that power constraints are usually linked to each device individually since they are mostly related to hardware limitations. In fact a1,a2δa_{1},a_{2}\leq\delta, therefore, we are implicitly considering also individual power constraints. However, since one channel may be occupied by 2 MTDs, by setting a1+a2=δa_{1}+a_{2}=\delta we are able of controlling the interference generated on the given channel on close aggregators in the outside area, and even if δ1\delta\approx 1 we are making it comparable to the interference that would generate a single MTD if operating alone in that channel.. Also, limIo,10SIR1,2r\lim\limits_{I_{o,1}\rightarrow 0}\mathrm{SIR}_{1,2}^{r} is unbounded, but limIo,10SIR2,2ra2a1μ\lim\limits_{I_{o,1}\rightarrow 0}\mathrm{SIR}_{2,2}^{r}\leq\frac{a_{2}}{a_{1}\mu} since min(h1,h2)max(h1,h2)\min(h_{1},h_{2})\leq\max(h_{1},h_{2}), thus the performance of the second MTDs being decoded on the channel is strongly limited by the SIC imperfection parameter, but by properly selecting a1,a2a_{1},a_{2} that situation can be relaxed. Consider fixed rate coding scheme where the receiver decodes successfully if the SIR exceeds a threshold θ>0\theta>0, achieving the information rate of log2(1+θ)\log_{2}(1+\theta) [bits/symbol], we state the following theorem.

Theorem 1.

The RRS success probability, pj,urp^{r}_{j,u}, of the jjth MTD sharing a typical channel conditioned on uu MTDs, is given by

p1,1r\displaystyle p^{r}_{1,1} =Io,1(θ),\displaystyle\!=\!\mathcal{L}_{I_{o,1}}(\theta), (4)
p1,2r\displaystyle p^{r}_{1,2} ={2a1a1+θa2Io,1(θa1)a1θa2a1+θa2Io,1(2θa1θa2),if 0θa2a1<12a1a1+θa2Io,1(θa1),ifθa2a11,\displaystyle\!=\!\!\left\{\!\!\begin{array}[]{ll}\!\frac{2a_{1}}{a_{1}\!+\!\theta a_{2}}\mathcal{L}_{I_{o,1}}(\tfrac{\theta}{a_{1}})\!-\!\frac{a_{1}\!-\!\theta a_{2}}{a_{1}\!+\!\theta a_{2}}\mathcal{L}_{I_{o,1}}\Big{(}\!\frac{2\theta}{a_{1}\!-\!\theta a_{2}}\!\Big{)},&\!\!\!\mathrm{if}\ 0\!\leq\!\tfrac{\theta a_{2}}{a_{1}}\!<\!1\\ \frac{2a_{1}}{a_{1}+\theta a_{2}}\mathcal{L}_{I_{o,1}}(\tfrac{\theta}{a_{1}}),&\!\!\!\mathrm{if}\ \tfrac{\theta a_{2}}{a_{1}}\geq 1\end{array}\right.\!\!\!\!\!, (7)
p2,2r\displaystyle p^{r}_{2,2} ={a2θμa1a2+θμa1Io,1(2θa2θμa1),if 0θμa1a2<10,ifθμa1a21.\displaystyle=\!\left\{\begin{array}[]{ll}\frac{a_{2}-\theta\mu a_{1}}{a_{2}+\theta\mu a_{1}}\mathcal{L}_{I_{o,1}}\Big{(}\frac{2\theta}{a_{2}-\theta\mu a_{1}}\Big{)},&\mathrm{if}\ 0\leq\tfrac{\theta\mu a_{1}}{a_{2}}<1\\ 0,&\mathrm{if}\ \tfrac{\theta\mu a_{1}}{a_{2}}\geq 1\end{array}\right.\!\!. (10)
Proof.

See Appendix A.

Remark 1.

As long as θ2μ<1\theta^{2}\mu<1, it is advisable choosing a1,a2a_{1},a_{2} such that θ<a1a2<1θμ\theta<\tfrac{a_{1}}{a_{2}}<\tfrac{1}{\theta\mu}, and both MTDs operating on the same channel get the success probability shown in the first line of (7) and (10). Notice that by going closer to 1θμ\tfrac{1}{\theta\mu} we favor the first MTD being decoded, while if we choose a smaller a1a2\tfrac{a_{1}}{a_{2}}, the second MTDs benefits. However, finding the values of a1a_{1} and a2a_{2} for which the MTDs could perform with similar reliability for any setup, seems intractable.

Theorem 2.

The Probability Mass Function (PMF) of the number of active MTDs, K1rK_{1}^{r}, is given in (III-A) at the top of the next page, where f1(k1r)=min(k1r,2Nk)f_{1}(k_{1}^{r})=\min(k_{1}^{r},2N-k), f2(k1r,r1)=min(k1rr1,kN)f_{2}(k_{1}^{r},r_{1})=\min(k_{1}^{r}-r_{1},k-N) and f3(k1r)=min(k1r,N)f_{3}(k_{1}^{r})=\min(k_{1}^{r},N).

Proof.

See Appendix B.

Pr(K1r=k1r)=em¯p1,1r(m¯p1,1r)k1r[1k1r!(Nk1r+1)(N+1k1r)((Nk1r)!Γ(Nk1r+1,m¯(1p1,1r)))(N+1)!]+k=N+12N1r1=0f1(k1r)r2=0f2(k1r,r1)[\displaystyle\Pr(K_{1}^{r}\!=\!k_{1}^{r})=e^{-\bar{m}p_{1,1}^{r}}(\bar{m}p_{1,1}^{r})^{k_{1}^{r}}\Bigg{[}\frac{1}{k_{1}^{r}!}-\frac{(N-k_{1}^{r}+1)\binom{N+1}{k_{1}^{r}}\Big{(}(N-k_{1}^{r})!-\Gamma\big{(}N-k_{1}^{r}+1,\bar{m}(1-p_{1,1}^{r})\big{)}\Big{)}}{(N+1)!}\Bigg{]}+\sum_{k=N+1}^{2N-1}\sum\limits_{r_{1}=0}^{f_{1}(k_{1}^{r})}\!\sum\limits_{r_{2}=0}^{f_{2}(k_{1}^{r},r_{1})}\!\Bigg{[}
𝟙(k1rkN+r1+r2)(2Nkr1)(kNr2)(kNk1rr1r2)(p1,1r)r1(p1,2r)r2(p2,2r)k1rr1r2(1p1,1r)2Nkr1(1p1,2r)kNr2\displaystyle\qquad\qquad\qquad\mathbbm{1}\big{(}k_{1}^{r}\!\leq\!k\!-\!N\!+\!r_{1}\!+\!r_{2}\!\big{)}\!\binom{2N\!-\!k}{r_{1}}\!\binom{k\!-\!N}{r_{2}}\!\binom{k\!-\!N}{k_{1}^{r}\!-\!r_{1}\!-\!r_{2}}\!(p_{1,1}^{r})^{r_{1}}\!(p_{1,2}^{r})^{r_{2}}\!(p_{2,2}^{r})^{k_{1}^{r}\!-\!r_{1}\!-\!r_{2}}\!(1\!-\!p_{1,1}^{r})^{2N\!-\!k\!-\!r_{1}}\!(1\!-\!p_{1,2}^{r})^{k\!-\!N\!-\!r_{2}}\cdot
(1p2,2r)kNk1r+r1+r2em¯m¯kk!]+(1Q(2N,m¯))r1=0f3(k1r)𝟙(k1rN+r1)(Nr1)(Nk1rr1)(p1,2r)r1(p2,2r)k1rr1(1p1,2r)Nr1(1p2,2r)Nk1r+r1.\displaystyle\cdot(1\!-\!p_{2,2}^{r})^{k\!-\!N\!-\!k_{1}^{r}\!+\!r_{1}\!+\!r_{2}}\frac{e^{-\bar{m}}\bar{m}^{k}}{k!}\Bigg{]}\!+\!\big{(}1-Q(2N,\bar{m})\big{)}\sum\limits_{r_{1}=0}^{f_{3}(k_{1}^{r})}\!\!\!\mathbbm{1}\big{(}k_{1}^{r}\!\leq\!N\!+\!r_{1}\big{)}\binom{N}{r_{1}}\binom{N}{k_{1}^{r}\!-\!r_{1}}(p_{1,2}^{r})^{r_{1}}(p_{2,2}^{r})^{k_{1}^{r}\!-\!r_{1}}(1\!-\!p_{1,2}^{r})^{N\!-\!r_{1}}(1\!-\!p_{2,2}^{r})^{N\!-\!k_{1}^{r}\!+\!r_{1}}. (11)
 

III-B CRS for the Hybrid Access

The CRS scheme seeks to make better use of channel resources by strongly relying on all the CSI available for scheduling. The MTD with better fading (equivalently, better SIR) will be preferentially assigned with the available channel resources. An aggregator with KK instantaneous MTDs requiring transmission has the knowledge of their fading gains. Let {h1,,hi,,hK}\{h_{1},...,h_{i},...,h_{K}\} denote the decreasing ordered channel gains, where hi1>hih_{i-1}>h_{i}. If KNK\leq N all the MTDs will be chosen, but if K>NK>N the aggregator will pick the NN MTDs with better channel gains, i.e., h1,,hNh_{1},...,h_{N}, and then will assign randomly the orthogonal channels to them [19]. As a continuation, the remaining MTDs can be still allocated sharing those same resources, i.e., users N+1N+1,…,KK go to the second round for allocation. This process is executed repeatedly until all the MTDs are allocated or the maximum number of MTDs per channel, LL, is reached [24].666Notice that imperfect CSI would not only affect the information decoding procedure under this scheme, but also the resource scheduling stage since the channel coefficients’ ordering may be affected. A detailed performance analysis under imperfect CSI is regarded as our future work.

Under the CRS scheme and using SIC to face the inside interference, the SIR, SIRj,uc(i)\mathrm{SIR}^{c\ (i)}_{j,u}, of the jjth MTD being decoded on a typical channel, given the first MTD allocated there has the iith larger channel coefficient, hih_{i}, and there are uu MTDs sharing that same channel, is given by SIR1,1c(i)=hiIo,1\mathrm{SIR}^{c\ (i)}_{1,1}=\frac{h_{i}}{I_{o,1}} and

SIR1,2c(i)\displaystyle\mathrm{SIR}^{c\ (i)}_{1,2} =a1(i)hiIo,1+a2(i)hi+N,\displaystyle=\frac{a_{1}^{(i)}h_{i}}{I_{o,1}+a_{2}^{(i)}h_{i+N}}, (12)
SIR2,2c(i)\displaystyle\mathrm{SIR}^{c\ (i)}_{2,2} =a2(i)hi+NIo,1+μa1(i)hi.\displaystyle=\frac{a_{2}^{(i)}h_{i+N}}{I_{o,1}+\mu a_{1}^{(i)}h_{i}}. (13)

Notice that the bound performance is the same as previously discussed for the RRS scheme. Meanwhile, the feedback/signaling overhead is also the same as for the RRS scheme since the CSI acquisition would take place at the aggregator side, which in turn will only forward back the channel allocation for each MTD and the power control coefficients if necessary. We have assumed that such metadata information is sufficiently small such that the low-rate feedback is error-free. However, practical performances would be upper bounded by our results.

Now, assuming that the receiver can decode successfully (SIR exceeds a threshold θ\theta), we state the following theorem.

Theorem 3.

Given the first MTD allocated has the iith largest channel coefficient, hih_{i}, and that uu MTDs share that same channel, the CRS success probability, pj,uc(i)p^{c\ (i)}_{j,u}, of the jjth MTD being decoded on a typical channel is approximated as

pj,uc(i)\displaystyle p^{c\ (i)}_{j,\!u}\! 121π0eχcos(πα)φ2αsin(χsin(πα)φ2αφBj,u(i,K))φdφ,\displaystyle\!\approx\!\frac{1}{2}\!-\!\frac{1}{\pi}\!\!\int\limits_{0}^{\infty}\!\!\frac{e^{\!-\chi\cos(\tfrac{\pi}{\alpha})\varphi^{\frac{2}{\alpha}}}\!\!\sin\!\big{(}\chi\sin(\tfrac{\pi}{\alpha})\varphi^{\frac{2}{\alpha}}\!-\!\varphi B_{j,u}^{(i,K)}\!\big{)}}{\varphi}\mathrm{d}\varphi, (14)

where χ=ϕ1Γ(1+2α)Γ(12α)\chi=\phi_{1}\Gamma\big{(}1+\tfrac{2}{\alpha}\big{)}\Gamma\big{(}1-\tfrac{2}{\alpha}\big{)}, and

B1,1(i,K)\displaystyle B_{1,1}^{(i,K\!)} =ψ(K+1)ψ(i)θ,\displaystyle\!\!\!=\!\!\frac{\psi(K+1)-\psi(i)}{\theta}, (15)
B1,2(i,K)\displaystyle B_{1,2}^{(i,K\!)} =(a1(i)θa2(i))ψ(K+1)+a2(i)ψ(i+N)a1(i)θψ(i),\displaystyle\!\!\!=\!\!\Big{(}\!\tfrac{a_{1}^{(i)}}{\theta}\!-\!a_{2}^{(i)}\!\Big{)}\psi(K\!+\!1)\!+\!a_{2}^{(i)}\psi(i\!+\!N)\!-\!\tfrac{a_{1}^{(i)}}{\theta}\psi(i), (16)
B2,2(i,K)\displaystyle B_{2,2}^{(i,K\!)} =(a2(i)θμa1(i))ψ(K+1)+μa1(i)ψ(i)a2(i)θψ(i+N).\displaystyle\!\!\!=\!\!\Big{(}\!\tfrac{a_{2}^{(i)}}{\theta}\!-\!\mu a_{1}^{(i)}\!\Big{)}\!\psi(K\!+\!1)\!+\!\mu a_{1}^{(i)}\psi(i)\!-\!\tfrac{a_{2}^{(i)}}{\theta}\psi(i\!+\!N). (17)
Proof.

Theorem 3 in [24] states that

pj,uc(i)121π01φIm{Io,1(𝐢φ)e𝐢φBj,ui,K}dφ.\displaystyle p^{c\ \!(i)}_{j,u}\!\approx\!\frac{1}{2}\!-\!\frac{1}{\pi}\!\int\limits_{0}^{\infty}\!\frac{1}{\varphi}\mathrm{Im}\bigg{\{}\!\mathcal{L}_{I_{o,1}}(\!-\mathbf{i}\varphi)e^{\!-\!\mathbf{i}\varphi B^{i,K}_{j,u}}\!\bigg{\}}\mathrm{d}\varphi. (18)

Substituting (1) into (18) along with some algebraic transformations, e.g., χ=ϕ1Γ(1+2α)Γ(12α)\chi=\phi_{1}\Gamma\big{(}1+\tfrac{2}{\alpha}\big{)}\Gamma\big{(}1-\tfrac{2}{\alpha}\big{)}, (𝐢)2α=cos(πα)𝐢sin(πα)(-\mathbf{i})^{\frac{2}{\alpha}}=\cos(\tfrac{\pi}{\alpha})-\mathbf{i}\sin(\tfrac{\pi}{\alpha}) and Im{peq𝐢}=psin(q)\mathrm{Im}\{pe^{-q\mathbf{i}}\}=-p\sin(q), renders (14). ∎

Pr(K1c=k1c)\displaystyle\Pr(K_{1}^{c}\!=\!k_{1}^{c})\approx
em¯p1,1r(m¯p1,1r)k1r[1k1r!(Nk1r+1)(N+1k1r)((Nk1r)!Γ(Nk1r+1,m¯(1p1,1r)))(N+1)!]+k=N+12N1r1=0f1(k1r)r2=0f2(k1r,r1)[𝟙(k1ckN+r1+r2)\displaystyle e^{-\bar{m}p_{1,1}^{r}}(\bar{m}p_{1,1}^{r})^{k_{1}^{r}}\Bigg{[}\frac{1}{k_{1}^{r}!}-\frac{(N-k_{1}^{r}+1)\binom{N+1}{k_{1}^{r}}\Big{(}(N-k_{1}^{r})!-\Gamma\big{(}N-k_{1}^{r}+1,\bar{m}(1-p_{1,1}^{r})\big{)}\Big{)}}{(N+1)!}\Bigg{]}\!+\!\!\sum_{k=N+1}^{2N-1}\sum\limits_{r_{1}=0}^{f_{1}(k_{1}^{r})}\!\sum\limits_{r_{2}=0}^{f_{2}(k_{1}^{r},r_{1})}\!\Bigg{[}\!\mathbbm{1}\big{(}k_{1}^{c}\!\leq\!k\!-\!N\!+\!r_{1}\!+\!r_{2}\big{)}\cdot\!
(2Nkr1)(kNr2)(kNk1cr1r2)(p¯1,1c(k))r1(p¯1,2c1(k))r2(p¯2,2c1(k))k1cr1r2(1p¯1,1c(k))2Nkr1(1p¯1,2c1(k))kNr2(1p¯2,2c1(k))kNk1c+r1+r2\displaystyle\!\cdot\binom{2N\!-\!k}{r_{1}}\!\binom{k\!-\!N}{r_{2}}\!\binom{k\!-\!N}{k_{1}^{c}\!-\!r_{1}\!-\!r_{2}}\!\big{(}\bar{p}_{1,1}^{c}(k)\big{)}^{r_{1}}\!\big{(}\bar{p}_{1,2}^{c_{1}}(k)\big{)}^{r_{2}}\!\big{(}\bar{p}_{2,2}^{c_{1}}(k)\big{)}^{k_{1}^{c}\!-\!r_{1}\!-\!r_{2}}\!\big{(}1\!-\!\bar{p}_{1,1}^{c}(k)\big{)}^{2N\!-\!k\!-\!r_{1}}\!\big{(}1\!-\!\bar{p}_{1,2}^{c_{1}}(k)\big{)}^{k\!-\!N\!-\!r_{2}}\!\big{(}1\!-\!\bar{p}_{2,2}^{c_{1}}(k)\big{)}^{k\!-\!N\!-\!k_{1}^{c}\!+\!r_{1}\!+\!r_{2}}\cdot
em¯m¯kk!]+k=2Nr1=0f3(k1c)𝟙(f5(k1c)N)(Nr1)(Nf5(k1c))(p¯1,2c2(k))r1(p¯2,2c2(k))f5(k1c)(1p¯1,2c2(k))Nr1(1p¯2,2c2(k))Nf5(k1c)em¯m¯kk!.\displaystyle\qquad\cdot\frac{e^{-\bar{m}}\bar{m}^{k}}{k!}\Bigg{]}\!+\!\sum_{k=2N}^{\infty}\sum\limits_{r_{1}=0}^{f_{3}(k_{1}^{c})}\!\!\!\mathbbm{1}\big{(}f_{5}(k_{1}^{c})\!\leq\!N\big{)}\binom{N}{r_{1}}\binom{N}{f_{5}(k_{1}^{c})}\big{(}\bar{p}_{1,2}^{c_{2}}(k)\big{)}^{r_{1}}\big{(}\bar{p}_{2,2}^{c_{2}}(k)\big{)}^{f_{5}(k_{1}^{c})}\big{(}1\!-\!\bar{p}_{1,2}^{c_{2}}(k)\big{)}^{N\!-\!r_{1}}\big{(}1\!-\!\bar{p}_{2,2}^{c_{2}}(k)\big{)}^{N\!-\!f_{5}(k_{1}^{c})}\frac{e^{-\bar{m}}\bar{m}^{k}}{k!}. (19)
 
Theorem 4.

The PMF of the number of active MTDs, K1cK_{1}^{c}, is approximated by (III-B) at the top of the next page and below (III-A), where fz()f_{z}(\cdot) for z=1,2,3z=1,2,3 are given in Theorem 2 and

p¯1,1c(k)\displaystyle\bar{p}_{1,1}^{c}(k) =12Nki=kN+1Np1,1c(i),\displaystyle=\frac{1}{2N-k}\sum_{i=k-N+1}^{N}p_{1,1}^{c\ (i)}, (20)
p¯j,2c1(k)\displaystyle\bar{p}_{j,2}^{c_{1}}(k) =1kNi=1kNpj,2c(i),\displaystyle=\frac{1}{k-N}\sum_{i=1}^{k-N}p_{j,2}^{c\ (i)}, (21)
p¯j,2c2(k)\displaystyle\bar{p}_{j,2}^{c_{2}}(k) =1Ni=1Npj,2c(i).\displaystyle=\frac{1}{N}\sum_{i=1}^{N}p_{j,2}^{c\ (i)}. (22)
Proof.

The fact that the success probabilities for the CRS scheme, pj,uc(i)p_{j,u}^{c\ (i)}, depend on ii and kk complicates heavily the problem. Finding their average with regard the index ii allows us to use the same procedure when deriving Theorem 2 while attaining an accurate approximation. Now when N<K<2NN\!<\!K\!<\!2N in (56), we substitute each probability value, p1,1rp_{1,1}^{r} and pj,2rp_{j,2}^{r}, respectively by (20) and (21) since the success probability depends on the number of MTDs requiring transmission. When K2NK\geq 2N we do similar by replacing pj,2rp_{j,2}^{r} by (22) in (56). ∎

III-C Optimum Scheduling: Is it Feasible?

Notice that previous scheduling schemes do not guarantee an optimum performance. This is obvious for the case of RRS since such scheme relies entirely on random pairing, while CRS, even when it exploits CSI for making the pairing decisions, is also sub-optimal. As an example, notice that for K>2NK>2N a better scheduling when μ=0\mu=0 and Io,10I_{o,1}\approx 0 will probably be the one pairing the NN MTDs with better fading conditions with the ones having the worst fading. This is because such pairing benefits always the MTD to be decoded first, while the MTD to be decoded second is not going to be affected by significant outside interference neither by residual interference from SIC. Consequently, it is expected that as μ\mu and/or Io,1I_{o,1} take meaningful values, the CRS’s performance approaches (but not necessary reaches) the optimum.

The optimum scheduling requires an exhaustive search over all the feasible scheduling outcomes in order to adopt the one offering maximum performance. Notice that the dimension of the search space, DK,ND_{K,N}, depends on KK and NN since

  • If KNK\leq N there is only one feasible allocation, which is granting individual channel resources to all MTDs;

  • if N<K2NN<K\leq 2N, there are 2NK2N-K MTDs that will be scheduled alone in their channels. Thus, there is a total of (K2NK)\binom{K}{2N-K} for making such selection, while the remaining 2(KN)2(K-N) MTDs need to be paired between each others to share KNK-N channels; which can be performed in (2(KN)1)(KN)\big{(}2(K-N)-1\big{)}(K-N) different ways;

  • if K>2NK>2N, it is necessary selecting the 2N2N MTDs that will get the channel resources for which there are (K2N)\binom{K}{2N} possibilities; and also making the pairing by testing all the N(2N1)N(2N-1) different alternatives.

Therefore,

DK,N={1,ifKN(K2NK)(2(KN)1)(KN),ifN<K2N(K2N)N(2N1),ifK>2N,\displaystyle D_{K,N}\!=\!\left\{\begin{array}[]{ll}\!\!\!\!1,&\!\!\!\mathrm{if}\ K\leq N\\ \!\!\!\!\binom{K}{2N\!-\!K}\big{(}2(K\!-\!N)\!-\!1\big{)}(K\!-\!N),\!&\!\!\!\mathrm{if}\ N\!<\!K\!\leq\!2N\\ \!\!\!\!\binom{K}{2N}N(2N-1),&\!\!\!\mathrm{if}\ K\!>\!2N\end{array}\right., (26)

while on average the dimension of the search space is D¯N=k=0Dk,NPr(K=k)\bar{D}_{N}=\sum_{k=0}^{\infty}D_{k,N}\Pr(K=k), which can be stated as in (27) at the top of the next page. Notice that (a)(a) came from using (26), while (b)(b) followed from using the CDF of KK, evaluating the sums and using the definition of the Kummer confluent hypergeometric function, and performing some algebraic transformations and simplifications.

Refer to caption
Figure 2: Average dimension of the search space D¯N\bar{D}_{N} as a function of NN for m¯{10,20,60,120}\bar{m}\in\{10,20,60,120\}.
D¯N\displaystyle\bar{D}_{N} =(a)Pr(KN)+k=N+12N(k2Nk)(2(kN)1)(kN)Pr(K=k)+N(2N1)k=2N+1(k2N)Pr(K=k)\displaystyle\stackrel{{\scriptstyle(a)}}{{=}}\Pr(K\leq N)+\sum_{k=N+1}^{2N}\binom{k}{2N-k}\big{(}2(k-N)-1\big{)}(k-N)\Pr(K=k)+N(2N-1)\sum_{k=2N+1}^{\infty}\binom{k}{2N}\Pr(K=k)
=(b)Q(N+1,m¯)+em¯m¯1+N6(N1)![31F1(1N,32,m¯4)+m¯(N1)1F1(2N,52,m¯4)]+(1em¯)m¯2NN(2N1)(2N)!.\displaystyle\stackrel{{\scriptstyle(b)}}{{=}}Q(N+1,\bar{m})+\frac{e^{-\bar{m}}\bar{m}^{1+N}}{6(N-1)!}\bigg{[}3\ _{1}F_{1}\Big{(}1-N,\frac{3}{2},-\frac{\bar{m}}{4}\Big{)}+\bar{m}(N-1)\ _{1}F_{1}\Big{(}2-N,\frac{5}{2},-\frac{\bar{m}}{4}\Big{)}\bigg{]}+\frac{\big{(}1-e^{-\bar{m}}\big{)}\bar{m}^{2N}N(2N-1)}{(2N)!}. (27)
 

Fig. 2 shows D¯N\bar{D}_{N} as a function of NN for different values of m¯\bar{m}. Notice that unless m¯N\bar{m}\ll N, the dimension of the search space becomes extremely large on average, which makes the exhaustive search unfeasible. Since the scheduling problem appears exactly when the contrary occur, e.g., when m¯\bar{m} is comparable or greater than NN since otherwise 11 MTD per channel is frequently viable, we can conclude that indeed the optimum scheduling through brute force is unfeasible.

In the following section we discuss the overall system performance after analyzing the relaying phase, in which all collected data is forwarded to the BS.

IV Relaying Phase & Overall Performance

In the relaying phase, the aggregator transmits its aggregated data to the BS777For simplicity, we assume that each aggregator has no buffer and transmits all its aggregated data in one go as in [24, 19].888Notice that this transmission occurs over only one BS serving channel, therefore, the aggregation topology is reducing the number of BS channel allocations to the MTC devices in a cluster, from NN in the case of no aggregation, down to 11. The importance of such approach is highlighted in [2, 11].. The aggregated data can be successfully decoded by the BS if SIR meets the following condition log2(1+SIRrel)τK1\log_{2}(1+\mathrm{SIR_{rel}})\geq\tau K_{1}, where τ=bTW\tau=\tfrac{b}{TW} in bits per channel use per MTD (bpcu/MTD) with TT being the relaying transmission time and WW is the available bandwidth for that transmission. SIRrel\mathrm{SIR_{rel}} is the SIR of the signal received at the BS. Then, we write the relaying success probability conditioned on K1K_{1} active aggregated MTDs as

prel(K1)\displaystyle p_{\mathrm{rel}}(K_{1}) =Pr(SIRrel2τK11)\displaystyle\!=\!\Pr\big{(}\mathrm{SIR_{rel}}\geq 2^{\tau K_{1}}-1\big{)}
=(a)𝔼Io,2[Pr(h(2τK11)Io,2)|Io,2]\displaystyle\stackrel{{\scriptstyle(a)}}{{=}}\mathbb{E}_{I_{o,2}}\Big{[}\Pr\big{(}h\geq(2^{\tau K_{1}}-1)I_{o,2}\big{)}\Big{|}I_{o,2}\Big{]}
=(b)𝔼Io,2[exp((2τK11)Io,2)]\displaystyle\stackrel{{\scriptstyle(b)}}{{=}}\mathbb{E}_{I_{o,2}}\Big{[}\exp\big{(}-(2^{\tau K_{1}}-1)I_{o,2}\big{)}\Big{]}
=(c)Io,2(2τK11)\displaystyle\stackrel{{\scriptstyle(c)}}{{=}}\mathcal{L}_{I_{o,2}}(2^{\tau K_{1}}\!-\!1)
=(d)exp(ϕ2Γ(1+2α)Γ(12α)(2τK11)2α),\displaystyle\stackrel{{\scriptstyle(d)}}{{=}}\!\exp\left({\!-\phi_{2}\Gamma\big{(}1\!+\!\tfrac{2}{\alpha}\big{)}\Gamma\big{(}1\!-\!\tfrac{2}{\alpha}\big{)}\big{(}2^{\tau K_{1}}\!-\!1\big{)}^{\frac{2}{\alpha}}}\right), (28)

where (a)(a) comes from using SIRrel=g/Io,2\mathrm{SIR_{rel}}=g/I_{o,2} assuming that hh denotes the channel power gain of the link between the aggregator and the BS, (b)(b) comes from using FH(h)=1ehF_{H}(h)=1-e^{-h}, (c)(c) follows after using the definition of the Laplace transform, and finally (d)(d) comes from using (1).

We now are able to evaluate the average number of successful MTDs, which is an overall performance metric embracing both, the aggregation and relaying phases. That metric evaluates the average number of MTDs being served by the aggregator, whose data can be successfully received by the BS. We can formally write this metric as

K¯a&r\displaystyle\bar{K}_{\mathrm{a\&r}} =𝔼[K1𝟙(SIRrel>2τK11)]\displaystyle=\mathbb{E}\Big{[}K_{1}\mathbbm{1}\big{(}\mathrm{SIR_{rel}}>2^{\tau K_{1}}-1\big{)}\Big{]}
=k1=12Nk1Pr(K1=k1)prel(k1),\displaystyle=\sum_{k_{1}=1}^{2N}k_{1}\Pr(K_{1}=k_{1})p_{\mathrm{rel}}(k_{1}), (29)

where Pr(K1=k1)\Pr(K_{1}=k_{1}) is given in (III-A) and (III-B) for the RRS and CRS schemes, respectively.

V Numerical Results

Refer to caption
Figure 3: Average number of successful MTDs as a function of the number of channels for τ{0.1,0.3}\tau\in\{0.1,0.3\} bpcu/MTD.

Both, simulation and analytical results, are presented in this section to investigate the performance of our hybrid scheme as a function of the system parameters while comparing it with an OMA setup. Unless stated otherwise, results are obtained by setting m¯=60\bar{m}=60, α=3.6\alpha=3.6, μ=10%\mu=10\%, θ=1\theta=1, τ=0.2\tau=0.2 bpcu/MTD and a1=a1(i)=a2=a2(i)=δ/2a_{1}=a_{1}^{(i)}=a_{2}=a_{2}^{(i)}=\delta/2. We set ϕ1=10\phi_{1}=-10dB, which matches the scenario where all the outside aggregators, serving areas of radius 4040m, are operating with one MTD per channel, while forming a PPP with density 104.4/m210^{-4.4}/\mathrm{m}^{2}. Also, δ=1\delta=1 such that the average consumed power per orthogonal channel keeps the same for either the L=1L=1 or L=2L=2 setup, while the interference generated over MTDs sharing the same channel but outside the serving zone keeps similar as in the OMA setup. For the relaying phase we set ϕ2=26\phi_{2}=-26dB, which matches the scenario where BSs are serving circular areas of approximately 500500m, while forming a PPP with density 1π500/m2\tfrac{1}{\pi 500}/\mathrm{m}^{2}. Simulation results are generated using 20000 Monte Carlo runs999Note that simulations, proposed analytical expressions and approximations fit well in all the cases depicted Fig. 3-7, which validates our findings..

Fig. 3 shows that the hybrid scheme for the aggregation phase can improve the spectral efficiency by providing service to a greater number of MTDs when the access demand increases, e.g., m¯2N\bar{m}\gtrsim 2N. This claim comes from [24], where only the aggregation phase was analyzed. We now extend it by considering the relaying phase, where spite the fact that multiplexing a greater number of MTDs with the same rate degrades the system reliability, the advantage of the hybrid scheme over the purely OMA setup holds. Notice that spectral efficiency for both setups, e.g., L=1L=1 and L=2L=2, degrades by decreasing ϕ1\phi_{1}, ϕ2\phi_{2} as can be observed in Fig. 4, and/or by increasing τ\tau. In fact, when τ\tau increases the degradation of the relaying phase performance due to more data that it is being transmitted could be faster than the increase in the number of active MTDs in the aggregation phase when NN increases, thus, the overall performance may worsen as it is shown in Fig. 3 for the case of τ=0.3\tau=0.3 bpcu/MTD when N45N\gtrsim 45. On the other hand all the curves tend to overlap when NN increases since the probability of having two MTDs sharing the same orthogonal channel decreases so that performance is similar to OMA setup. The fluctuations observed in the CRS scheme for different values of NN is consequence of higher dependence/sensitivity on power control coefficients compared to RRS scheme. Thus, a careful selection of those parameters is required for each system setup.

Refer to caption
Figure 4: Relaying phase: average number of successful MTDs as a function of ϕ2\phi_{2} for ϕ1{15,5}\phi_{1}\in\{-15,-5\}dB and N=30N=30.

For the CRS scheme we were able to reach closed-form expressions in [24, Eqs. (33), (34)] for the power control coefficients while attaining similar reliability for both MTDs sharing the same channel. Notice that when using the RRS scheme, all MTDs have chance to transmit independently of the channel conditions, which could model more realistic scenarios where some MTDs require be served urgently. Also, RRS has a slight decreased performance compared to CRS scheme in the aggregation phase [24].

Fig. 5 investigates the required a1a_{1} for RRS to attain either similar reliability for both MTDs sharing the same channel or a maximum average number of simultaneously active MTDs in the aggregation phase K¯\bar{K} [24, Eq. (17)], as a function of ϕ1\phi_{1}. As outside interference increases, the required power control coefficient for the first MTD, a1a_{1}, decreases when similar reliability is the goal, since the performance of the second MTD deteriorates faster and the power control coefficient a2a_{2} should increase. Otherwise, when the goal is to maximize the number of simultaneously active MTDs, the performance of the second MTD needs to be sacrificed, even more so when the outside interference increases until the hybrid scheme performs as the OMA setup, e.g., a1=1,a2=0a_{1}=1,a_{2}=0. Notice that almost all the time, a greater SIC imperfection leads to a reduction in the required a1a_{1}, decreasing its impact on the performance of the second decoded MTD. Only when reaching K¯max\bar{K}_{\max} is the goal and the outside interference is sufficiently large, a greater SIC imperfection accelerates the transition to OMA by increasing a1a_{1}. Also, increasing ϕ1\phi_{1} deteriorates K¯\bar{K} (see numbered labels in Fig. 5).

Refer to caption
Figure 5: a1a_{1} (a2=δa1a_{2}=\delta-a_{1}) as a function of ϕ1\phi_{1} for the RRS scheme to attain either similar reliability for both MTDs sharing the same channel or a maximum average number of simultaneously active MTDs in the aggregation phase. μ={0,10}%\mu=\{0,10\}\% and N=30N=30.
Refer to caption
Figure 6: Maximum average of simultaneously served MTDs as a function of δ\delta, for N=30N=30 and τ{0.10.3}\tau\in\{0.10.3\} bpcu/MTD.
Refer to caption
Figure 7: Average number of successful MTDs as a function of the SIC imperfection parameter for N=30N=30.

The reachable maximum average of simultaneously served MTDs as a function total power constraint coefficient, δ\delta, is shown in Fig. 6. Therein, we find the coefficients a1a_{1} and a2a_{2} that maximize K¯a&r\bar{K}_{a\&r} such that a1+a2=δa_{1}+a_{2}=\delta. Notice that increasing δ\delta has a positive impact on the system performance as long as the appropriate values of a1a_{1} and a2a_{2} are selected, which can be deduced from numbered labels in the figure. For the case of τ=0.3\tau=0.3 bpcu/MTD this effect is not evident since the relaying phase is limiting the system performance much more than the aggregation phase. On the other hand, increasing δ\delta is not always feasible, e.g., due to transmit hardware limitations, or even advisable, e.g., due to the extra interference that might be generated over other OMA networks or because of a low energy efficiency performance. Therefore, the appropriate selection of δ\delta is of paramount importance.

Fig. 7 shows the average number of simultaneously served MTDs as a function of the SIC imperfection coefficient. We set N=30N=30 such that each channel is operating with two MTDs almost all the time, which are more sensitive to the interference and imperfection of the SIC. Since SIC is only related with the L=2L=2 setup, the OMA setup curves are shown with straight lines. Of course, when μ\mu increases, the performance of the L=2L=2 setup deteriorates, specifically if the power coefficients are not tuned accordingly. This is because those coefficients work well for certain system parameters but others will be required if they change, e.g. different μ\mu in this case. It is expected that a smaller a1a_{1}, hence larger a2a_{2}, work better as μ\mu increases as shown previously in Fig. 5. It is clear that failing to efficiently eliminate the inside interference could reduce significantly the benefits from NOMA, and can be a challenging issue for implementing NOMA in practice.

VI Conclusion

We analyzed the data aggregation and relaying in interference-limited mMTC network. We evaluate a hybrid access scheme, OMA-NOMA, while investigating its performance in terms of average number of simultaneously served MTDs. Power control coefficients are incorporated to the practical-interest RRS scheme, while we investigate them numerically. The numerical results also show that our hybrid access scheme aims at providing massive connectivity in scenarios with high access demand. However, inter-cluster interference could reduce significantly the benefits from NOMA, and challenging its implementation in practice.

Appendix A Proof of Theorem 1

As in [24, Th. 1], let us write the success probabilities as

p1,1r\displaystyle p^{r}_{1,1} =𝔼Io,1[Pr(h>θIo,1|Io,1)]=𝔼Io,1[eθIo,1|Io,1],\displaystyle=\mathbb{E}_{I_{o,1}}[\Pr(h>\theta I_{o,1}|I_{o,1})]=\mathbb{E}_{I_{o,1}}\Big{[}e^{-\theta I_{o,1}}\Big{|}I_{o,1}\Big{]}, (30)
p1,2r\displaystyle p^{r}_{1,2}\! =𝔼Io,1[Pr(max(h1,h2)θa2a1min(h1,h2)>θa1Io,1|Io,1)]\displaystyle=\!\mathbb{E}_{I_{o,1}}\!\Big{[}\!\Pr\big{(}\!\max(h_{1},h_{2})\!-\!\tfrac{\theta a_{2}}{a_{1}}\min(h_{1},h_{2}\!)\!\!>\!\tfrac{\theta}{a_{1}}I_{o,1}|I_{o,1}\big{)}\!\Big{]}
=𝔼Io,1[Pr(v1>θa1Io,1|Io,1)]\displaystyle=\!\mathbb{E}_{I_{o,1}}\Big{[}\Pr\big{(}v_{1}>\tfrac{\theta}{a_{1}}I_{o,1}|I_{o,1}\big{)}\Big{]}
=1𝔼Io,1[FV1(θa1Io,1)]\displaystyle=1-\mathbb{E}_{I_{o,1}}\Big{[}F_{V_{1}}\Big{(}\tfrac{\theta}{a_{1}}I_{o,1}\Big{)}\Big{]}
=(a)\displaystyle\!\!\!\!\stackrel{{\scriptstyle(a)}}{{=}}\! {𝔼[2a1a1+θa2eθa1Io,1a1θa2a1+θa2e2θa1θa2Io,1|Io,1],if0θa2a1<1𝔼[2a1a1+θa2eθa1Io,1|Io,1],otherwise\displaystyle\!\!\left\{\!\!\begin{array}[]{ll}\mathbb{E}\Big{[}\frac{2a_{1}}{a_{1}\!+\!\theta a_{2}}e^{\!-\!\frac{\theta}{a_{1}}I_{o,1}}\!-\!\frac{a_{1}\!-\!\theta a_{2}}{a_{1}\!+\!\theta a_{2}}e^{\!-\!\frac{2\theta}{a_{1}\!-\!\theta a_{2}}I_{o,1}}\Big{|}I_{o,1}\Big{]}\!,\!&\!\!\mathrm{if}0\!\leq\!\!\tfrac{\theta a_{2}}{a_{1}}\!\!<\!1\!\\ \mathbb{E}\Big{[}\frac{2a_{1}}{a_{1}+\theta a_{2}}e^{\!-\!\frac{\theta}{a_{1}}I_{o,1}}|I_{o,1}\Big{]},&\!\!\!\mathrm{otherwise}\end{array}\right.\! (33)
p2,2r\displaystyle p^{r}_{2,2}\! =𝔼Io,1[Pr(min(h1,h2)θμa1a2max(h1,h2)>θa2Io,1|Io,1)]\displaystyle=\!\mathbb{E}_{I_{o,1}}\!\Big{[}\!\Pr\big{(}\min(h_{1},h_{2})\!-\!\tfrac{\theta\mu a_{1}}{a_{2}}\max(h_{1},h_{2})\!>\!\tfrac{\theta}{a_{2}}I_{o,1}|I_{o,1}\!\big{)}\!\Big{]}\!
=𝔼Io,1[Pr(v2>θa2Io,1|Io,1)]\displaystyle=\mathbb{E}_{I_{o,1}}\Big{[}\Pr\big{(}v_{2}>\tfrac{\theta}{a_{2}}I_{o,1}|I_{o,1}\big{)}\Big{]}
=1𝔼Io,1[FV2(θa2Io,1)]\displaystyle=1-\mathbb{E}_{I_{o,1}}\Big{[}F_{V_{2}}\Big{(}\tfrac{\theta}{a_{2}}I_{o,1}\Big{)}\Big{]}
=(b)\displaystyle\!\stackrel{{\scriptstyle(b)}}{{=}}\! {𝔼[a2θμa1a2+θμa1e2θa2θμa1Io,1|Io,1],if 0θμa1a2<10,otherwise,\displaystyle\!\left\{\!\!\begin{array}[]{ll}\mathbb{E}\Big{[}\frac{a_{2}-\theta\mu a_{1}}{a_{2}+\theta\mu a_{1}}e^{-\frac{2\theta}{a_{2}-\theta\mu a_{1}}I_{o,1}}\Big{|}I_{o,1}\Big{]}\!,\!&\mathrm{if}\ 0\!\leq\!\tfrac{\theta\mu a_{1}}{a_{2}}\!<\!1\!\\ 0,&\!\!\mathrm{otherwise}\end{array}\right.\!, (36)

where pj,ur=Pr(SIRj,ur>θ)p^{r}_{j,u}\!=\!\Pr\big{(}\mathrm{{SIR}_{j,u}^{r}}\!>\!\theta\big{)}, v1=max(h1,h2)θa2a1min(h1,h2)v_{1}=\max(h_{1},h_{2})-\frac{\theta a_{2}}{a_{1}}\min(h_{1},h_{2}) and v2=min(h1,h2)θμa1a2max(h1,h2)v_{2}=\min(h_{1},h_{2})-\frac{\theta\mu a_{1}}{a_{2}}\max(h_{1},h_{2}), while (a)(a) and (b)(b) come from using their CDF expressions, which are obtained next.

FV1(v1)\displaystyle F_{V_{1}}(v_{1}) =Pr(max(h1,h2)θa2a1min(h1,h2)v1)\displaystyle=\Pr(\max(h_{1},h_{2})-\tfrac{\theta a_{2}}{a_{1}}\min(h_{1},h_{2})\leq v_{1})
=Pr(max(h1,h2)v1+θa2a1min(h1,h2))\displaystyle=\Pr\big{(}\max(h_{1},h_{2})\leq v_{1}+\tfrac{\theta a_{2}}{a_{1}}\min(h_{1},h_{2})\big{)}
=Pr(h1v1+θa2a1min(h1,h2)\displaystyle=\Pr\big{(}h_{1}\leq v_{1}+\tfrac{\theta a_{2}}{a_{1}}\min(h_{1},h_{2})~\bigcap~
h2v1+θa2a1min(h1,h2))\displaystyle\qquad\qquad\qquad\qquad h_{2}\leq v_{1}+\tfrac{\theta a_{2}}{a_{1}}\min(h_{1},h_{2})\big{)}
=Pr(min(h1,h2)(h1v1)a1θa2\displaystyle=\Pr\Big{(}\min(h_{1},h_{2})\geq\frac{(h_{1}-v_{1})a_{1}}{\theta a_{2}}~\bigcap~
min(h1,h2)(h2v1)a1θa2)\displaystyle\qquad\qquad\qquad\qquad\min(h_{1},h_{2})\geq\frac{(h_{2}-v_{1})a_{1}}{\theta a_{2}}\Big{)}
=Pr(h1(h1v1)a1θa2h2(h1v1)a1θa2\displaystyle=\Pr\Big{(}h_{1}\!\geq\!\frac{(h_{1}\!-\!v_{1})a_{1}}{\theta a_{2}}~\bigcap~h_{2}\!\geq\!\frac{(h_{1}\!-\!v_{1})a_{1}}{\theta a_{2}}~\bigcap
h1(h2v1)a1θa2h2(h2v1)a1θa2)\displaystyle\qquad~h_{1}\geq\frac{(h_{2}-v_{1})a_{1}}{\theta a_{2}}~\bigcap~h_{2}\geq\frac{(h_{2}-v_{1})a_{1}}{\theta a_{2}}\Big{)}
=Pr(h1(1θa2a1)v1h2h1a1θa2v1a1θa2\displaystyle=\Pr\Big{(}h_{1}(1\!-\!\tfrac{\theta a_{2}}{a_{1}})\!\leq\!v_{1}~\bigcap~h_{2}\!\geq\!\frac{h_{1}a_{1}}{\theta a_{2}}\!-\!\frac{v_{1}a_{1}}{\theta a_{2}}\bigcap
h2h1θa2a1+v1h2(1θa2a1)v1).\displaystyle\qquad h_{2}\leq h_{1}\tfrac{\theta a_{2}}{a_{1}}+v_{1}~\bigcap~h_{2}(1-\tfrac{\theta a_{2}}{a_{1}})\leq v_{1}\Big{)}. (37)
Refer to caption
Refer to caption
Figure 8: Region of intersection. a) 0θa2a1<10\leq\tfrac{\theta a_{2}}{a_{1}}<1 (top), b) θa2a11\tfrac{\theta a_{2}}{a_{1}}\geq 1 (bottom).

Lets consider the following cases:

  • 0θa2a1<10\leq\tfrac{\theta a_{2}}{a_{1}}<1, then we can continue from equation (37) as follows.

    FV1(v1)\displaystyle F_{V_{1}}(v_{1}) =Pr(h1v11θa2a1h2h1a1θa2v1a1θa2\displaystyle\!=\!\Pr\Big{(}h_{1}\!\leq\!\frac{v_{1}}{1\!-\!\tfrac{\theta a_{2}}{a_{1}}}~\bigcap~h_{2}\!\geq\!\frac{h_{1}a_{1}}{\theta a_{2}}\!-\!\frac{v_{1}a_{1}}{\theta a_{2}}~\bigcap~
    h2h1θa2a1+v1h2v11θa2a1)\displaystyle\qquad\!\!h_{2}\leq h_{1}\tfrac{\theta a_{2}}{a_{1}}+v_{1}~\bigcap~h_{2}\leq\frac{v_{1}}{1-\tfrac{\theta a_{2}}{a_{1}}}\Big{)} (38)

    and the intersection region is shown in Fig. 8a and notice that h1,h20h_{1},h_{2}\geq 0 are also restrictions. Therefore we can transform (38) to attain the result in (39) at the top of the next page.

    FV1(v1)\displaystyle F_{V_{1}}(v_{1}) =Pr(h1v1h2θa2a1h1+v1)+Pr(v1h1v11θa2a1a1θa2h1v1a1θa2h2θa2a1h1+v1)\displaystyle=\Pr\big{(}h_{1}\leq v_{1}~\bigcap~h_{2}\leq\frac{\theta a_{2}}{a_{1}}h_{1}+v_{1}\big{)}+\Pr\Big{(}v_{1}\leq h_{1}\leq\frac{v_{1}}{1-\frac{\theta a_{2}}{a_{1}}}~\bigcap~\frac{a_{1}}{\theta a_{2}}h_{1}-\frac{v_{1}a_{1}}{\theta a_{2}}\leq h_{2}\leq\frac{\theta a_{2}}{a_{1}}h_{1}+v_{1}\Big{)}
    =0v1FH2(θa2a1h1+v1)fH1(h1)dh1+v1v11θa2a1(FH2(θa2a1h1+v1)FH2(h1a1θa2v1a1θa2))fH1(h1)dh1\displaystyle=\int\limits_{0}^{v_{1}}F_{H_{2}}(\frac{\theta a_{2}}{a_{1}}h_{1}+v_{1})f_{H_{1}}(h_{1})\mathrm{d}h_{1}+\int\limits_{v_{1}}^{\frac{v_{1}}{1-\frac{\theta a_{2}}{a_{1}}}}\bigg{(}F_{H_{2}}(\frac{\theta a_{2}}{a_{1}}h_{1}+v_{1})-F_{H_{2}}\Big{(}\frac{h_{1}a_{1}}{\theta a_{2}}-\frac{v_{1}a_{1}}{\theta a_{2}}\Big{)}\bigg{)}f_{H_{1}}(h_{1})\mathrm{d}h_{1}
    =0v1(1e(θa2a1h1+v1))eh1dh1+v1v11θa2a1e(h1a1θa2v1a1θa2)eh1dh1v1v11θa2a1e(θa2a1h1+v1)eh1dh1\displaystyle=\int\limits_{0}^{v_{1}}\Big{(}1-e^{-\big{(}\frac{\theta a_{2}}{a_{1}}h_{1}+v_{1}\big{)}}\Big{)}e^{-h_{1}}\mathrm{d}h_{1}+\int\limits_{v_{1}}^{\frac{v_{1}}{1-\frac{\theta a_{2}}{a_{1}}}}e^{-\big{(}\frac{h_{1}a_{1}}{\theta a_{2}}-\frac{v_{1}a_{1}}{\theta a_{2}}\big{)}}e^{-h_{1}}\mathrm{d}h_{1}-\int\limits_{v_{1}}^{\frac{v_{1}}{1-\frac{\theta a_{2}}{a_{1}}}}e^{-\big{(}\frac{\theta a_{2}}{a_{1}}h_{1}+v_{1}\big{)}}e^{-h_{1}}\mathrm{d}h_{1}
    =12a1a1+θa2ev1+a1θa2a1+θa2e2v1a1a1θa2\displaystyle=1-\frac{2a_{1}}{a_{1}+\theta a_{2}}e^{-v_{1}}+\frac{a_{1}-\theta a_{2}}{a_{1}+\theta a_{2}}e^{-\frac{2v_{1}a_{1}}{a_{1}-\theta a_{2}}} (39)
     
  • θa2a11\tfrac{\theta a_{2}}{a_{1}}\geq 1, then we can continue from equation (37) as follows.

    FV1(v1)\displaystyle F_{V_{1}}(v_{1}) =Pr(h1v11θa2a1h2h1a1θa2v1a1θa2\displaystyle\!=\!\Pr\Big{(}h_{1}\!\geq\frac{v_{1}}{1\!-\!\tfrac{\theta a_{2}}{a_{1}}}\!~\bigcap~\!h_{2}\!\geq\frac{h_{1}a_{1}}{\theta a_{2}}-\frac{v_{1}a_{1}}{\theta a_{2}}\!~\bigcap~
    h2h1θa2a1+v1h2v11θa2a1),\displaystyle\qquad\!\!h_{2}\leq h_{1}\tfrac{\theta a_{2}}{a_{1}}+v_{1}\!~\bigcap~\!h_{2}\geq\frac{v_{1}}{1-\tfrac{\theta a_{2}}{a_{1}}}\Big{)}, (40)

    Notice that regions h1v11θa2a1<0h_{1}\geq\frac{v_{1}}{1-\tfrac{\theta a_{2}}{a_{1}}}<0 and h2v11θa2a1h_{2}\geq\frac{v_{1}}{1-\tfrac{\theta a_{2}}{a_{1}}} do not say nothing new because we already know that h1,h20h_{1},h_{2}\geq 0. Therefore we can write (40) as

    FV1(v1)\displaystyle F_{V_{1}}(v_{1}) =Pr(h2h1a1θa2v1a1θa2h2h1θa2a1+v1)\displaystyle=\Pr\Big{(}h_{2}\!\geq\!\frac{h_{1}a_{1}}{\theta a_{2}}\!-\!\frac{v_{1}a_{1}}{\theta a_{2}}\!~\bigcap~\!h_{2}\!\leq\!h_{1}\frac{\theta a_{2}}{a_{1}}\!+\!v_{1}\Big{)}
    =Pr(h1a1θa2v1a1θa2h2h1θa2a1+v1),\displaystyle=\Pr\Big{(}\frac{h_{1}a_{1}}{\theta a_{2}}\!-\!\frac{v_{1}a_{1}}{\theta a_{2}}\leq h_{2}\!\leq\!h_{1}\frac{\theta a_{2}}{a_{1}}\!+\!v_{1}\Big{)}, (41)

    and the intersection region is shown in Fig. 8b. Thus, by working on (41) we reach (42) at the top of next page (below (39)).

    FV1(v1)\displaystyle F_{V_{1}}(v_{1}) =0v1FH2(h1θa2a1+v1)fH1(h1)dh1+v1(FH2(h1θa2a1+v1)FH2(h1a1θa2v1a1θa2))fH1(h1)dh1\displaystyle=\int\limits_{0}^{v_{1}}F_{H_{2}}\Big{(}h_{1}\frac{\theta a_{2}}{a_{1}}+v_{1}\Big{)}f_{H_{1}}(h_{1})\mathrm{d}h_{1}+\int\limits_{v_{1}}^{\infty}\Bigg{(}F_{H_{2}}\Big{(}h_{1}\frac{\theta a_{2}}{a_{1}}+v_{1}\Big{)}-F_{H_{2}}\Big{(}\frac{h_{1}a_{1}}{\theta a_{2}}-\frac{v_{1}a_{1}}{\theta a_{2}}\Big{)}\Bigg{)}f_{H_{1}}(h_{1})\mathrm{d}h_{1}
    =0FH2(h1θa2a1+v1)fH1(h1)dh1v1FH2(h1a1θa2v1a1θa2)fH1(h1)dh1\displaystyle=\int\limits_{0}^{\infty}F_{H_{2}}\Big{(}h_{1}\frac{\theta a_{2}}{a_{1}}+v_{1}\Big{)}f_{H_{1}}(h_{1})\mathrm{d}h_{1}-\int\limits_{v_{1}}^{\infty}F_{H_{2}}\Big{(}\frac{h_{1}a_{1}}{\theta a_{2}}-\frac{v_{1}a_{1}}{\theta a_{2}}\Big{)}f_{H_{1}}(h_{1})\mathrm{d}h_{1}
    =0(1e(h1θa2a1+v1))eh1dh1v1(1eh1a1θa2+v1a1θa2)eh1dh1=12a1a1+θa2ev1\displaystyle=\int\limits_{0}^{\infty}\Big{(}1-e^{-\big{(}h_{1}\frac{\theta a_{2}}{a_{1}}+v_{1}\big{)}}\Big{)}e^{-h_{1}}\mathrm{d}h_{1}-\int\limits_{v_{1}}^{\infty}\Big{(}1-e^{-\frac{h_{1}a_{1}}{\theta a_{2}}+\frac{v_{1}a_{1}}{\theta a_{2}}}\Big{)}e^{-h_{1}}\mathrm{d}h_{1}=1-\frac{2a_{1}}{a_{1}+\theta a_{2}}e^{-v_{1}} (42)
     

By combining (39) and (42) we attain the general expression for FV1(v1)F_{V_{1}}(v_{1}), which is

FV1(v1)\displaystyle F_{V_{1}}(v_{1}) ={12a1a1+a2θev1+a1a2θa1+a2θe2a1v1a1a2θ,if 0a2θa1<112a1a1+a2θev1,ifa2θa11,\displaystyle\!=\!\!\left\{\!\!\begin{array}[]{ll}\!\!1-\frac{2a_{1}}{a_{1}\!+\!a_{2}\theta}e^{-v_{1}}\!+\!\frac{a_{1}\!-a_{2}\!\theta}{a_{1}\!+\!a_{2}\theta}e^{-\frac{2a_{1}v_{1}}{a_{1}\!-\!a_{2}\theta}},&\!\!\mathrm{if}\ 0\leq\!\frac{a_{2}\theta}{a_{1}}\!<1\\ \\ 1-\frac{2a_{1}}{a_{1}\!+\!a_{2}\theta}e^{-v_{1}},&\!\!\mathrm{if}\ \frac{a_{2}\theta}{a_{1}}\!\geq\!1\\ \end{array}\right.\!\!\!, (46)

while

FV2(v2)\displaystyle F_{V_{2}}(v_{2}) ={1a2θμa1a2+θμa1e2v2a2a2+θμa1,if 0θμa1a2<11,ifθμa1a21\displaystyle\!=\!\left\{\begin{array}[]{ll}1-\frac{a_{2}\!-\!\theta\mu a_{1}}{a_{2}\!+\!\theta\mu a_{1}}e^{-\frac{2v_{2}a_{2}}{a_{2}\!+\!\theta\mu a_{1}}},&\mathrm{if}\ 0\leq\tfrac{\theta\mu a_{1}}{a_{2}}\!<\!1\\ \\ 1,&\mathrm{if}\ \tfrac{\theta\mu a_{1}}{a_{2}}\!\geq\!1\\ \end{array}\right.\!\! (50)

can be attained by following a similar procedure.

Finally, by taking the expectation in (30), (33) and (36) we attain (4), (7) and (10), respectively. ∎

Pr(K1r=k1r|K)={0,K<k1r(Kk1r)(p1,1r)k1r(1p1,1r)Kk1r,k1rKNr1=0f1(k1r)r2=0f2(k1r,r1)[𝟙(k1rKN+r1+r2)(2NKr1)(KNr2)(KNk1rr1r2)(p1,1r)r1(p1,2r)r2(p2,2r)k1rr1r2(1p1,1r)2NKr1(1p1,2r)KNr2(1p2,2r)KNk1r+r1+r2],N<K<2Nr1=0f3(k1r)𝟙(k1rN+r1)(Nr1)(Nk1rr1)(p1,2r)r1(p2,2r)k1rr1(1p1,2r)Nr1(1p2,2r)Nk1r+r1,K2N\displaystyle\Pr(K_{1}^{r}\!=\!k_{1}^{r}|K)\!=\!\left\{\!\!\begin{array}[]{ll}\!\!0,&K<k_{1}^{r}\\ \!\binom{K}{k_{1}^{r}}(p_{1,1}^{r})^{k_{1}^{r}}(1\!-\!p_{1,1}^{r})^{K\!-\!k_{1}^{r}},&k_{1}^{r}\!\leq\!K\!\leq\!N\!\\ \sum\limits_{r_{1}=0}^{f_{1}(k_{1}^{r})}\!\sum\limits_{r_{2}=0}^{f_{2}(k_{1}^{r},r_{1})}\!\bigg{[}\mathbbm{1}\big{(}k_{1}^{r}\!\leq\!K\!-\!N\!+\!r_{1}\!+\!r_{2}\big{)}\binom{2N\!-\!K}{r_{1}}\binom{K\!-\!N}{r_{2}}\binom{K\!-\!N}{k_{1}^{r}\!-\!r_{1}\!-\!r_{2}}(p_{1,1}^{r})^{r_{1}}(p_{1,2}^{r})^{r_{2}}(p_{2,2}^{r})^{k_{1}^{r}\!-\!r_{1}\!-\!r_{2}}\cdot\\ \qquad\qquad\qquad\qquad\cdot(1\!-\!p_{1,1}^{r})^{2N\!-\!K\!-\!r_{1}}(1\!-\!p_{1,2}^{r})^{K\!-\!N\!-\!r_{2}}(1\!-\!p_{2,2}^{r})^{K\!-\!N\!-\!k_{1}^{r}\!+\!r_{1}\!+\!r_{2}}\bigg{]},&N\!<\!K\!<\!2N\!\\ \!\sum\limits_{r_{1}=0}^{f_{3}(k_{1}^{r})}\!\!\!\mathbbm{1}\big{(}k_{1}^{r}\!\leq\!N\!+\!r_{1}\big{)}\binom{N}{r_{1}}\binom{N}{k_{1}^{r}\!-\!r_{1}}(p_{1,2}^{r})^{r_{1}}(p_{2,2}^{r})^{k_{1}^{r}\!-\!r_{1}}(1\!-\!p_{1,2}^{r})^{N\!-\!r_{1}}(1\!-\!p_{2,2}^{r})^{N\!-\!k_{1}^{r}\!+\!r_{1}},&K\!\geq\!2N\!\\ \end{array}\right.\!\! (56)
 

Appendix B Proof of Theorem 2

For the system model in Section II the outside interference on each channel is independent. Let KK be the number of MTDs requiring data transmission, the conditional distribution of K1rK_{1}^{r} is given in (56) (on the top of the next page) where f1(k1r)=min(k1r,2NK)f_{1}(k_{1}^{r})=\min(k_{1}^{r},2N-K), f2(k1r,r1)=min(k1rr1,KN)f_{2}(k_{1}^{r},r_{1})=\min(k_{1}^{r}-r_{1},K-N) and f3(k1r)=min(k1r,N)f_{3}(k_{1}^{r})=\min(k_{1}^{r},N). Notice that when KNK\leq N all the MTDs are operating alone in their channels, while when N<K<2NN<K<2N, 2NK2N-K MTDs will be operating alone and KNK-N will be sharing their channels. Additionally, when K2NK\geq 2N, the NN MTDs with channel resources are sharing their channels. Thus, (56) comes from combinatorial and probability theories. The indicator function guarantees operation in the appropriate regions, e.g., N<K<2NN<K<2N and KNK\geq N, according to the particular case. After using Pr(K1r=k1r)=k=0Pr(K1r=k1r|k)Pr(K=k)\Pr(K_{1}^{r}\!=\!k_{1}^{r})\!=\!\sum_{k=0}^{\infty}\Pr(K_{1}^{r}\!=\!k_{1}^{r}|k)\Pr(K\!=\!k) along with some algebraic manipulations we attain the result in (III-A). ∎

References

  • [1] L. Atzori, A. Iera, and G. Morabito, “Understanding the Internet of Things: definition, potentials, and societal role of a fast evolving paradigm,” Ad Hoc Networks, vol. 56, pp. 122–140, 2017.
  • [2] K.-C. Chen and S.-Y. Lien, “Machine-to-machine communications: Technologies and challenges,” Ad Hoc Networks, vol. 18, pp. 3–23, 2014.
  • [3] Ericsson. (2017, nov) Ericsson mobility report. [Online]. Available: https://www.ericsson.com/en/mobility-report/reports/november-2017/internet-of-things-outlook
  • [4] Z. Dawy, W. Saad, A. Ghosh, J. G. Andrews, and E. Yaacoub, “Toward massive machine type cellular communications,” IEEE Wireless Commun., vol. 24, no. 1, pp. 120–128, February 2017.
  • [5] A. Rajandekar and B. Sikdar, “A survey of MAC layer issues and protocols for machine-to-machine communications,” IEEE Internet of Things Journal, vol. 2, no. 2, pp. 175–186, April 2015.
  • [6] 3GPP TS 36.331 V10.50.0, “Evolved universal terrestrial radio access (E-UTRA); radio resource control (RRC),” Mar 2012.
  • [7] T. M. Lin, C. H. Lee, J. P. Cheng, and W. T. Chen, “PRADA: Prioritized random access with dynamic access barring for MTC in 3GPP LTE-A networks,” IEEE Trans. on Vehic. Tech., vol. 63, no. 5, pp. 2467–2472, Jun 2014.
  • [8] X. Yang, A. Fapojuwo, and E. Egbogah, “Performance analysis and parameter optimization of random access backoff algorithm in LTE,” in IEEE VTC-Fall, Sept 2012, pp. 1–5.
  • [9] M. I. Hossain, A. Azari, and J. Zander, “DERA: Augmented random access for cellular networks with dense H2H-MTC mixed traffic,” in 2016 IEEE Globecom Workshops (GC Wkshps), Dec 2016, pp. 1–7.
  • [10] A. Laya, C. Kalalas, F. Vazquez-Gallego, L. Alonso, and J. Alonso-Zarate, “Goodbye, ALOHA!” IEEE Access, vol. 4, pp. 2029–2044, 2016.
  • [11] H. Shariatmadari, P. Osti, S. Iraji, and R. Jäntti, “Data aggregation in capillary networks for machine-to-machine communications,” in 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), Aug 2015, pp. 2277–2282.
  • [12] P. H. Nardelli, M. de Castro Tomé, H. Alves, C. H. de Lima, and M. Latva-aho, “Maximizing the link throughput between smart meters and aggregators as secondary users under power and outage constraints,” Ad Hoc Networks, vol. 41, pp. 57–68, 2016.
  • [13] I. Ramezanipour, P. Nouri, H. Alves, P. H. J. Nardelli, R. D. Souza, and A. Pouttu, “Finite blocklength communications in smart grids for dynamic spectrum access and locally licensed scenarios,” IEEE Sensors Journal, vol. 18, no. 13, pp. 5610–5621, July 2018.
  • [14] S. Boubiche, D. E. Boubiche, A. Bilami, and H. Toral-Cruz, “Big data challenges and data aggregation strategies in wireless sensor networks,” IEEE Access, vol. 6, pp. 20 558–20 571, 2018.
  • [15] N. Kouzayha, M. Jaber, and Z. Dawy, “M2M data aggregation over cellular networks: Signaling-delay trade-offs,” in 2014 IEEE Globecom Workshops (GC Wkshps), Dec 2014, pp. 1155–1160.
  • [16] A. Riker, E. Cerqueira, M. Curado, and E. Monteiro, “Data aggregation for group communication in machine-to-machine environments,” in 2014 IFIP Wireless Days (WD), Nov 2014, pp. 1–7.
  • [17] C. Bormann, A. P. Castellani, and Z. Shelby, “CoAP: An application protocol for billions of tiny Internet nodes,” IEEE Internet Computing, vol. 16, no. 2, pp. 62–67, March 2012.
  • [18] E. Fitzgerald, M. Pióro, and A. Tomaszewski, “Energy-optimal data aggregation and dissemination for the Internet of Things,” IEEE Internet of Things Journal, vol. 5, no. 2, pp. 955–969, April 2018.
  • [19] J. Guo, S. Durrani, X. Zhou, and H. Yanikomeroglu, “Massive machine type communication with data aggregation and resource scheduling,” IEEE Transactions on Communications, vol. 65, no. 9, pp. 4012–4026, Sept 2017.
  • [20] M. Shirvanimoghaddam, M. Dohler, and S. J. Johnson, “Massive non-orthogonal multiple access for cellular IoT: Potentials and limitations,” IEEE Communications Magazine, vol. 55, no. 9, pp. 55–61, 2017.
  • [21] Y. Saito, A. Benjebbour, Y. Kishiyama, and T. Nakamura, “System-level performance evaluation of downlink non-orthogonal multiple access (NOMA),” in IEEE PIMRC, Sept 2013, pp. 611–615.
  • [22] Z. Ding, Z. Yang, P. Fan, and H. V. Poor, “On the performance of non-orthogonal multiple access in 5G systems with randomly deployed users,” IEEE Sig. Proces. Lett., vol. 21, no. 12, Dec 2014.
  • [23] Z. Zhang, H. Sun, R. Q. Hu, and Y. Qian, “Stochastic geometry based performance study on 5G non-orthogonal multiple access scheme,” in IEEE GLOBECOM, Dec 2016, pp. 1–6.
  • [24] O. L. A. López, H. Alves, P. H. J. Nardelli, and M. Latva-aho, “Aggregation and resource scheduling in machine-type communication networks: A stochastic geometry approach,” IEEE Transactions on Wireless Communications, vol. 17, no. 7, pp. 4750–4765, July 2018.
  • [25] F. Liu, P. Mähönen, and M. Petrova, “Proportional fairness-based power allocation and user set selection for downlink NOMA systems,” in 2016 IEEE International Conference on Communications (ICC), May 2016, pp. 1–6.
  • [26] M. Shirvanimoghaddam, M. Dohler, and S. J. Johnson, “Massive multiple access based on superposition raptor codes for cellular M2M communications,” IEEE Trans. on Wireless Commun., vol. 16, no. 1, pp. 307–319, Jan 2017.
  • [27] D. Malak, H. S. Dhillon, and J. G. Andrews, “Optimizing data aggregation for uplink machine-to-machine communication networks,” IEEE Trans. on Commun., vol. 64, no. 3, pp. 1274–1290, March 2016.
  • [28] M. Haenggi, Stochastic geometry for wireless networks. Cambridge University Press, 2012.
  • [29] M. Gharbieh, H. ElSawy, A. Bader, and M. S. Alouini, “Spatiotemporal stochastic modeling of IoT enabled cellular networks: Scalability and stability analysis,” IEEE Transactions on Communications, vol. 65, no. 8, pp. 3585–3600, Aug 2017.
  • [30] M. Haenggi, “The mean interference-to-signal ratio and its key role in cellular and amorphous networks,” IEEE Wireless Commun. Letters, vol. 3, no. 6, pp. 597–600, Dec 2014.
  • [31] R. K. Ganti and M. Haenggi, “Asymptotics and approximation of the SIR distribution in general cellular networks,” IEEE Trans. on Wireless Commun., vol. 15, no. 3, pp. 2130–2143, March 2016.
  • [32] H. Sun, B. Xie, R. Q. Hu, and G. Wu, “Non-orthogonal multiple access with SIC error propagation in downlink wireless MIMO networks,” in IEEE Vehicular Technology Conference (VTC-Fall), Sept 2016, pp. 1–5.