Propostas para controle de congestionamento em rede LTE ocasionado pela comunicação máquina-a-máquina

Detalhes bibliográficos
Ano de defesa: 2015
Autor(a) principal: Aragão, David Bôto Paz
Orientador(a): Não Informado pela instituição
Banca de defesa: Não Informado pela instituição
Tipo de documento: Dissertação
Tipo de acesso: Acesso aberto
Idioma: por
Instituição de defesa: Não Informado pela instituição
Programa de Pós-Graduação: Não Informado pela instituição
Departamento: Não Informado pela instituição
País: Não Informado pela instituição
Palavras-chave em Português:
Link de acesso: http://www.repositorio.ufc.br/handle/riufc/21386
Resumo: Machine-to-machine (M2M) is a communication model that will play an important role in vision of the Internet of Things (IoT). The Long-term Evolution (LTE) is expected to become a potential access networks for the M2M communication. A problem that arises from this scenario is the congestion caused by the huge number of M2M devices trying to access the network. Many solutions can be found in the literature that addresses this problem. However, only few mechanisms define priority among the different type of devices or present a dynamic approach to dynamically allocate resources of the random access channel. In this paper, we propose five mechanisms that aim to reduce the congestion caused by LTE network in the context of M2M devices. The first mechanism is centered in the devices and aim to control the access device to the network based in the congestion level presented by the network. The other four mechanisms model the scarcity of the time and preamble resources as a bankruptcy problem. For each resource, two approaches are proposed. The solutions presented to the bankruptcy problem follow from two an axiomatic approach and a cooperative game strategy. The impact over the H2H devices, the energy efficiency, and the prioritization among the different types of M2M devices are some of the main aspects analyzed by the proposed mechanisms. The result obtained through simulation show that the proposed mechanisms present advantages in one or more of the aspects analyzed. All approaches were simulated in the network simulator NS-3.