Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

M2M (machine to machine) user access control method in LTE (long term evolution) system

A control method and user technology, applied in electrical components, wireless communication, etc., can solve problems such as community system paralysis and increased channel access conflict probability in the community

Active Publication Date: 2013-08-07
FUJIAN NORMAL UNIV
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When a large number of M2M devices perform random access in a cell at the same time, the probability of channel access collision in the cell will increase. If it cannot be controlled in a timely and effective manner, the cell system may eventually be completely paralyzed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • M2M (machine to machine) user access control method in LTE (long term evolution) system
  • M2M (machine to machine) user access control method in LTE (long term evolution) system
  • M2M (machine to machine) user access control method in LTE (long term evolution) system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0100] When a large number of M2M users perform random access together with H2H, set the average number of H2H users arriving per second as a fixed value, and the value range of M2M users is 0≤λ M ≤10000, at this time, different M2M access ratios are set, and the graph of the relationship between the number of M2M users and the random access success probability can be obtained, as shown in figure 1 shown.

[0101] Depend on figure 1 It can be seen that when a large number of M2M users and H2H users perform random access together, setting the random access ratio for the M2M users can increase the success probability of random access in the case of the same number of users.

Embodiment 2

[0103] When the average number of H2H users arriving per second is set to be the same as the average number of M2M users arriving per second, and the random access ratios of M2M users are set to different values, the ratio between the M2M access ratio and random access success probability can be obtained The relationship diagram between, such as figure 2 shown.

[0104] Such as figure 2 It can be seen that no matter what value the M2M user random access ratio α takes, it can be The maximum value of random access success probability is obtained at the place.

[0105] The present invention also provides another M2M user access control method in the LTE system. When there are primary users, secondary users, and tertiary users in the LTE system, the control method is as follows:

[0106] 1) The time tolerance of the first-level users is set to be the lowest, the time tolerance of the second-level users is next, and the time tolerance of the third-level users is the highest; ...

Embodiment 3

[0154] In the LTE system, there are first-level users, second-level users, and third-level users accessing, and when the access ratio of the second-level and third-level users is controlled to a very small value, the image 3 It can be seen that as the number of users increases, the success rate of channel access increases.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an M2M (machine to machine) user access control method in an LTE (long term evolution) system. When only an H2H (human to human) user and an M2M user are accessed in the LTE system, the control method comprises the following steps that the LTE system is set as that i H2H users are accessed and j M2M users are accessed, the access ratio of the M2M users is alpha, the arrival rate of the H2H users and the M2M users respectively satisfies that parameters are in lambda H and lambda M Poisson distribution, PH and succ are the random access success probability of the H2H user, and PM and succ are the random access success probability of the M2M user; and when the access ratio of the M2M user is alpha, the random access success probability of the M2M user is the highest. According to the M2M user access control method in the LTE system, the optimal access ratio is set, so that the access success probability is biggest when a great quantity of M2M users is accessed into the LTE system, and the channel conflict probability is lowered.

Description

technical field [0001] The invention relates to a control method for M2M user access in an LTE system. Background technique [0002] When the application of the Internet extends to the Internet of Things, the traditional 2G / 3G network can no longer meet the needs of a large number of terminals for wireless bandwidth resources. 3GPP launched LTE / LTE-A on the basis of 3G. LTE is the abbreviation of Long Term Evolution. LTE is not 4G. It can only be said to be a stage of transition from 3G to 4G. It can be called 3.9G. What is really regarded as "quasi-4G" is LTE-Advanced ( Referred to as LTE-A). In fact, LTE has gradually become the de facto standard for next-generation cellular network technology. In fourth-generation broadband wireless multiple access systems, the data rate standard is on the order of hundreds of megabytes per second. For an LTE system with a bandwidth of 20 MHz, the peak data rate target for the downlink is 100 Mbps, and the peak data rate target for the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W74/08
Inventor 陈志德曾雅丽许力郑金花
Owner FUJIAN NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products