Detalhes bibliográficos
Ano de defesa: |
2015 |
Autor(a) principal: |
Aragão, David Bôto Paz |
Orientador(a): |
Não Informado pela instituição |
Banca de defesa: |
Não Informado pela instituição |
Tipo de documento: |
Dissertação
|
Tipo de acesso: |
Acesso aberto |
Idioma: |
por |
Instituição de defesa: |
Não Informado pela instituição
|
Programa de Pós-Graduação: |
Não Informado pela instituição
|
Departamento: |
Não Informado pela instituição
|
País: |
Não Informado pela instituição
|
Palavras-chave em Português: |
|
Link de acesso: |
http://www.repositorio.ufc.br/handle/riufc/21386
|
Resumo: |
Machine-to-machine (M2M) is a communication model that will play an important role in vision of the Internet of Things (IoT). The Long-term Evolution (LTE) is expected to become a potential access networks for the M2M communication. A problem that arises from this scenario is the congestion caused by the huge number of M2M devices trying to access the network. Many solutions can be found in the literature that addresses this problem. However, only few mechanisms define priority among the different type of devices or present a dynamic approach to dynamically allocate resources of the random access channel. In this paper, we propose five mechanisms that aim to reduce the congestion caused by LTE network in the context of M2M devices. The first mechanism is centered in the devices and aim to control the access device to the network based in the congestion level presented by the network. The other four mechanisms model the scarcity of the time and preamble resources as a bankruptcy problem. For each resource, two approaches are proposed. The solutions presented to the bankruptcy problem follow from two an axiomatic approach and a cooperative game strategy. The impact over the H2H devices, the energy efficiency, and the prioritization among the different types of M2M devices are some of the main aspects analyzed by the proposed mechanisms. The result obtained through simulation show that the proposed mechanisms present advantages in one or more of the aspects analyzed. All approaches were simulated in the network simulator NS-3. |