Keywords

1 Introduction

In recent years, a huge number of technological devices appeared in the market that support various applications associated with data transfer automatically. In this perspective, a key role will be played by machine-type communications (MTC), which is a new concept where devices exchange data without any (or minimal) human intervention [1]. MTC is expected to open up unprecedented opportunities for telecom operators in the various fields of the new digital economy (home and office security and automation, smart metering and utilities, maintenance, building automation, automotive, healthcare and consumer electronics, etc.), and, therefore, will be one of the economic foundations of emerging 5G wireless networks [2, 3]. As in the case of any new technology, the analysis of the impact of MTC traffic features requires modification of both classical and modern methods [46].

Conventional wireless communication technologies, including 3GPP LTE network, do not allow establishing effectively machine-to-machine (M2 M) connections between a large number of interacting MTC devices. One possible solution of the problem is based on the use of random access (RA) procedure [7, 8]. The advantage of this method is that the MTC devices can access to the radio access channel (RACH), regardless of their arrangement and centralized management.

It is well known that an overload on the RACH level can lead to overload in the entire LTE network. Feature of the M2 M traffic that differs substantially from the traditional H2H traffic is that existing mechanisms cannot effectively overcome RA procedure overload. MTC devices such as fire detectors usually send small amounts of data periodically while operating in the normal mode. However, in the case of emergency MTC devices generate burst traffic, which can cause overloading [9, 10]. In the case of high network traffic access delay increases significantly, and this can be critical in various emergency situations [7]. Some other features of M2 M traffic transmission were considered in [1019] taking into account problems of optimal radio resources allocation [1115], overload control mechanisms based on Access Class Barring (ACB) schemes [10, 14] and other congestion control problems [16, 17].

The purpose of this paper is the analytical modeling of the access procedure which is able to support the simultaneous access of MTC devices. According to [7] the reference scheme of the procedure consists of a four-message handshake between the accessing devices and the base station. In the same 3GPP technical report main measures to RACH capacity evaluation for MTC are specified: collision probability, access success probability, access delay, the number of preamble transmissions to perform a random access procedure successfully, the number of simultaneous preamble transmissions in an access slot.

There are many papers devoted to modeling and simulation of RACH procedure, e.g. interesting results are obtained in [2], which also provides a review of known works on this issue. However, not many analytical models are known, which allow exploring main RACH performance metrics [7] on a qualitative level. We highlight [18], where the formulas for the calculation of these metrics were obtained. Unlike to known results, the objective of this study is to obtain a closed-form solution, which depends on the minimum number of RACH procedure parameters and is easy for calculation. This paper is an extension of [19], where the approach to analytical modeling using Markov chain apparatus was proposed and the Monte Carlo simulation model was developed. In contrast to [19], this paper concentrates on the analytical model of a random access procedure in LTE cell and focuses on two metrics for RACH capacity evaluation – the access success probability and the average access delay in the presence of collisions and physical channel congestion.

The rest of the paper is organized as follows. In Sect. 2 we shortly describe RACH signaling reference scheme, simultaneously discuss notations of the mathematical model and introduce its core assumptions. In Sect. 3, formulas for calculating key metrics in closed form are obtained. Further, in Sect. 4 main performance measures calculating is illustrated via the numerical example. Finally, we conclude the paper in Sect. 5.

2 Random Access Procedure, Model Notation and Assumptions

In this section we consider RACH procedure that is the initial synchronization process between user equipment (UE) and the base station eNB while data exchange performs over Physical RACH (PRACH) in LTE network [7]. Since UEs’ attempt for data transmission can be performed randomly and the value of distance to the eNB is unknown, requests for synchronization from various UEs should come with different delays, which is estimated by the level of incoming PRACH signal by eNB.

Widely known RACH procedure defines the sequence of signaling messages transmitted between the UE and the eNB. The procedure begins with a random access preamble transmission to the eNB (Msg 1) by means of one of available PRACH slots (RACH opportunity). The information about slots is broadcasted by the eNB in System Information Block messages. The number of RACH opportunities and the number of preambles depend on the particular LTE network configuration.

After preamble sending the UE waits for a random access response (RAR) (Msg 2) from the eNB within the time interval called a response window. RAR message transmitting over Physical Downlink Control Channel (PDCCH) contains a resource grant for transmission of the subsequent signaling messages. If after the response window is over the UE has not received Msg 2, it means that a collision occurs. The collision of a preamble transmission may occur when two or more UEs select the same preamble and send it at same time slot. In the case of a collision the UE should repeat preamble transmission attempt after a response window. If a preamble collision occurs, the eNB will not send RAR message to all UEs, which have chosen the same preamble. In that case, preambles will be resent after the time interval called the backoff window. If series of collisions occur for a UE after the number of failed attempts exceeds the preamble attempts limit, the RACH procedure is recognized failed.

In the case of successful preamble transmission after receiving Msg 2 from the eNB and RAR processing time, the UE sends connection request (Msg 3) to the eNB using resources of Physical Uplink Shared Channel (PUSCH) [20]. RACH procedure is considered completed after the UE received a contention resolution message (Msg 4) from the eNB. Hybrid automatic repeat request (HARQ) procedure guarantees a successful transmission of Msg 3/Msg 4. HARQ procedure provides a limit in Msg 3/Msg 4 sequential transmission attempts. If the limit is reached UE should start a new RACH procedure by sending a preamble.

Making a number of simplifying assumptions for the RACH procedure, we introduce below the basic notation and build a mathematical model in the form of a discrete Markov chain according to [19]. The time interval between the first RA attempt and the completion of the random access procedure is called an access delay [7]. To analyze this parameter we propose a mathematical model in the form of discrete Markov chain that follows the steps of RACH procedure. The state of the Markov chain determines the number of preamble attempt collisions and the number of sequential Msg 3/Msg 4 transmission attempts. With this model the access delay for each state of the Markov chain can be calculated by summing up the corresponding time intervals introduced below:

  • \( \Delta_{{_{1} }}^{1} \) – waiting time for a RACH opportunity to transmit a preamble;

  • \( \Delta_{{_{1} }}^{2} \) – preamble transmission time;

  • \( \Delta_{{_{1} }}^{3} \) – preamble processing time at the eNB;

  • \( \Delta_{{_{1} }}^{4} \) – RAR response window;

  • \( \Delta_{1} : = \Delta_{{_{1} }}^{1} + \Delta_{{_{1} }}^{2} + \Delta_{{_{1} }}^{3} + \Delta_{{_{1} }}^{4} \) – time from the beginning of RACH procedure until sending message Msg 3 or resending a preamble;

  • \( \Delta_{2} \) – backoff window;

  • \( \Delta_{3} \) – RAR processing time;

  • \( \Delta_{4} \) – time for Msg 3 transmission, waiting for Msg 4, and Msg 4 processing.

The model notation is illustrated in message sequence diagram for access success (Fig. 1) and access failure (Fig. 2).

Fig. 1.
figure 1

Message sequence diagram for successful access

Fig. 2.
figure 2

Message sequence diagram for access failure due to (a) preamble collision (b) contention resolution message retransmission

In the case of reliable connections the access delay is equal to the sum of the mentioned above variables \( \Delta_{i} \), \( i = 1,3,4 \). If a collision occurs or connection is unreliable the number of retransmissions is limited by \( N = 9 \) for Msg 1 and by \( M = 4 \) for Msg 3 [7]. Let \( p \) denote the collision probability, defined as the ratio between the number of occurrences when two or more MTC devices send a random access attempt using exactly the same preamble and the overall number of opportunities (with or without access attempts) in the period [7]. This value depends on the number of MTC devices at eNB coverage area, on intensity \( \gamma \) of incoming calls and on LTE network configuration. Also, let \( g \) denote the HARQ retransmission probability for Msg 3/Msg 4, and thus we entered all the variables needed further for obtaining formulas for calculation of the access success probability and the average access delay.

3 The Model and Results in a Closed Form

The formalization of the above-described RA procedure according to [19] is given by the absorbing discrete-time Markov’ chain \( \left\{ {\xi_{i} , \, i = 0, \ldots ,\left( {N + 1} \right)\left( {M + 1} \right) + 1} \right\} \) with the finite state space

$$ {\mathbf{X}} = \left\{ {\left( {n,m,k} \right), \, n = 0, \ldots ,N, \, m = 0, \ldots ,M, \, k = 0, \ldots ,n} \right\} \cup \left\{ {\omega ,\upsilon } \right\}, $$

initial state \( \left( {0,0,0} \right) \), and two absorbing states \( \omega \) and \( \upsilon \). The initial state \( \left( {0,0,0} \right) \) represents the beginning of the procedure followed by the first RA attempt, the absorbing state \( \omega \) stands for the access success, and the absorbing state \( \upsilon \) stands for the access failure. Other states denoted by \( \left( {n,m,k} \right) \), where n is the number of Msg 1 (preamble) retransmissions, m is the number of Msg 3 retransmissions after the last successful Msg 1 transmission, and k stands for the number of successful Msg 1 transmissions followed by M + 1 Msg 3 transmissions after each Msg 1 transmission. Figure 3 represents one of possible paths from state \( \left( {0,0,0} \right) \) to state \( \left( {n,m,k} \right) \) for successful access.

Fig. 3.
figure 3

The example of successful access with Msg 1 and Msg 3 retransmissions

Note, that the access delay for RA procedure is defined as the time interval from the instant when a UE sends its first random access preamble until the UE receives the random access response [7]. In the paper, we focus on the average value D of the access delay. To calculate it we consider all possible scenarios of the RA procedure, i.e. different number of Msg 1 and Msg 3 retransmissions for different combinations of messages’ sequences that influence on the overall access delay. For example, in the case of the successful access without any collision the sequence is \( {\text{Msg}}1 \to {\text{Msg}}2 \to {\text{Msg}}3 \to {\text{Msg}}4 \). For the successful access with two retransmissions of message Msg1 and without Msg3 retransmissions the sequence looks like \( {\text{Msg}}1 \to {\text{Msg}}1 \to {\text{Msg}}1 \to {\text{Msg}}2 \to {\text{Msg}}3 \to {\text{Msg}}4 \).

Note that we do not distinguish between two paths having the same delay between the first RA attempt and the same intermediate state \( \left( {n,m,k} \right) \), if the paths differ only Msg 1/Msg 3 positions. For example, the following message sequences (Msg 2 and Msg 4 are omitted) have the equal delays:

$$ {\text{Msg}}1 \to {\text{Msg}}1 \to {\text{Msg}}3 \to \ldots \to {\text{Msg}}3 \to {\text{Msg}}1 \to {\text{Msg}}3 $$

and

$$ {\text{Msg}}1 \to {\text{Msg}}3 \to \ldots \to {\text{Msg}}3 \to {\text{Msg}}1 \to {\text{Msg}}1 \to {\text{Msg}}3. $$

Under these assumptions, the probability \( P\left( {n,m,k} \right) \) of Markov chain \( \left\{ {\xi_{i} } \right\} \) visiting state \( \left( {n,m,k} \right) \) when starting from state \( \left( {0,0,0} \right) \) is determined by the formula

$$ P\left( {n,m,k} \right) = p^{n - k} C_{n}^{k} \left( {\left( {1 - p} \right)g^{M + 1} } \right)^{k} \left( {1 - p} \right)g^{m} ,\;\left( {n,m,k} \right) \in {\mathbf{X}}. $$
(1)

The first multiplier \( p^{n - k} \) stands for \( n - k \) Msg 1 collisions, the multiplier \( \left( {\left( {1 - p} \right)g^{M + 1} } \right)^{k} \) stands for \( k \) successful Msg 1 transmissions each followed by \( M + 1 \) Msg 3 transmissions, the multiplier \( \left( {1 - p} \right)g^{m} \) stands for a unique successful Msg 1 transmission followed by \( m \) Msg 3 retransmissions, and the binomial coefficient \( C_{n}^{k} \) reflects the number of \( k \) combinations (successful Msg 1 transmissions) of an \( n \) set (Msg 1 retransmissions).

The probabilities of being absorbed in the states \( \omega \) and \( \upsilon \) when starting from state \( \left( {0,0,0} \right) \) are

$$ P\left( \omega \right) = \sum\limits_{{\left( {n,m,k} \right) \in {\mathbf{X}}}} {P\left( {n,m,k} \right) \cdot \left( {1 - g} \right)} = 1 - \left( {p + \left( {1 - p} \right)g^{M + 1} } \right)^{N + 1} , $$
(2)
$$ P\left( \upsilon \right) = 1 - P\left( \omega \right) = \left( {p + \left( {1 - p} \right)g^{M + 1} } \right)^{N + 1} . $$
(3)

Note, that these probabilities for the RA procedure stand for the access success probability \( P\left( \omega \right) \) and for the access failure probability \( P\left( \upsilon \right) \).

For successful random access procedure we denote \( Q\left( {n,m,k} \right) \) the probability that the RA procedure will be completed right after state \( \left( {n,m,k} \right) \), i.e. there will not be any further Msg1/Msg3 collisions. Let \( D\left( {n,m,k} \right) \) be the corresponding access delay under the condition that random access procedure is successful.

The access delay \( D\left( {n,m,k} \right) \) can be calculated as follows

$$ \begin{aligned} & D\left( {n,m,k} \right) = \left( {n - k} \right)\left( {\Delta_{1} + \Delta_{2} } \right) + k\left( {\Delta_{1} + \Delta_{3} + M\Delta_{4} } \right) + \Delta_{1} + \Delta_{3} + \left( {m + 1} \right)\Delta_{4} \\ & = \left( {\Delta_{1} + \Delta_{2} } \right) \cdot n + \Delta_{4} \cdot m + \left( {\Delta_{3} + M\Delta_{4} - \Delta_{2} } \right) \cdot k + \Delta_{1} + \Delta_{3} + \Delta_{4} . \\ \end{aligned} $$
(4)

Form the definition of probability \( Q\left( {n,m,k} \right) \) we get the formula

$$ \begin{aligned} & Q\left( {n,m,k} \right) \\ & = {\rm P}\left\{ {{\text{no Msg1/Msg3 collisions after state }}\left( {n,m,k} \right)\; |\;{\text{successful access}}} \right\} \\ & = \frac{{{\rm P}\left\{ {{\text{no Msg1/Msg3 collisions after state }}\left( {n,m,k} \right),\;\;{\text{successful access}}} \right\}}}{{{\rm P}\left\{ {\text{successful access}} \right\}}} \\ & = \frac{{{\rm P}\left\{ {{\text{no Msg1/Msg3 collisions after state }}\left( {n,m,k} \right)} \right\}}}{{{\rm P}\left\{ {\text{successful access}} \right\}}} = \frac{{P\left( {n,m,k} \right) \cdot \left( {1 - g} \right)}}{P\left( \omega \right)}. \\ \end{aligned} $$
(5)

Now, taking into account that the average RA delay, which is calculated only for successfully accessed MTC devices, is determined by the formula

$$ D = \sum\limits_{{\left( {n,m,k} \right) \in \mathcal{X}}} {Q\left( {n,m,k} \right)D\left( {n,m,k} \right)} , $$
(6)

and taking into account (1)–(5), we finally obtain the formula to calculate the average access delay in closed form

$$ \begin{aligned} & D = \left( {\Delta_{1} + \Delta_{2} } \right) \cdot \frac{C}{{\left( {1 - p} \right)\left( {1 - g^{M + 1} } \right)}}\left( {1 - \left( {N + 1} \right)C^{N} + NC^{N + 1} } \right) \\ & + {\kern 1pt} \Delta_{4} \cdot \frac{{1 - \left( {M + 1} \right)g^{M} + Mg^{M + 1} }}{1 - g}\frac{{g\left( {1 - C^{N + 1} } \right)}}{{1 - g^{M + 1} }} \\ & + {\kern 1pt} \left( {\Delta_{3} + M\Delta_{4} - \Delta_{2} } \right) \cdot \frac{{g^{M + 1} }}{{1 - g^{M + 1} }}\left( {1 - \left( {N + 1} \right)C^{N} + NC^{N + 1} } \right) \\ & + {\kern 1pt} \left( {\Delta_{1} + \Delta_{3} + \Delta_{4} } \right) \cdot \left( {1 - C^{N + 1} } \right), \\ \end{aligned} $$
(7)

where \( C = p + g^{M + 1} \left( {1 - p} \right) \).

The numerical example in the next section illustrates the application of the formulas obtained for calculation the access success probability and the average access delay with given collision probability.

4 Numerical Example

We present an example of analysis of a single LTE FDD cell on 5 MHz supporting M2M communications to illustrate some performance measures for RACH with initial data closed to real ones [7, 9, 10, 18, 19].

In LTE, the RACH could be configured to occur once every subframe up to once every other radio frame. As in [7] we assume that the PRACH configuration index is equal to 6, and then for FDD cell we have 1st and 6th subframes of every frame for RACH opportunity, so the RACH occurs every 5 ms, that gives us 200 RACH opportunities per second. The total number of RACH preambles available in LTE is 64. A number of them are normally reserved for contention free RA procedure (i.e. for intra-system handover or downlink data arrival with lost synchronization), the rest are used for contention based RA procedure. According to [7] we assume that 10 preambles are configured to be dedicated for handovers, therefore, the other 54 can be used contention based random access.

For the scenario with a large number of UEs with RA procedure in the cell and uniformly distributed arrival of RACH requests the collision probability is given by [9]

$$ p = 1 - e^{{{{ - \gamma } \mathord{\left/ {\vphantom {{ - \gamma } {\left( {54*200} \right)}}} \right. \kern-0pt} {\left( {54*200} \right)}}}} . $$
(8)

Maximum number of preamble transmission is equal to 10, hence N = 9. Maximum number of Msg 3 retransmissions M = 4 [7]. The terms of the sum in (7) are given below: \( \Delta_{{_{1} }}^{1} \) = 2,5 ms; \( \Delta_{{_{1} }}^{2} \) = 1 ms; \( \Delta_{{_{1} }}^{3} \) = 2 ms; \( \Delta_{{_{1} }}^{4} \) = 5 ms; \( \Delta_{{_{2} }}^{{}} \) = 20 ms; \( \Delta_{{_{3} }}^{{}} \) = 5 ms; \( \Delta_{{_{4} }}^{{}} \) = 6 ms. The calculation were done for 4 values of the HARQ retransmission probability for Msg 3/Msg 4 \( g = 0.0 2;\;0. 5;\;0. 8;\;0. 9 5 \).

Typically, e.g. [7, 18], RACH performance metrics are analyzed vs the number of MTC devices per cell with maximum of 30 000. In the numerical example we analyze target metrics vs the collision probability \( p \), receiving its value from the formula (8) with given random access intensity \( \gamma \). Namely the value of \( \gamma \) indicates the number of MTC devices in the cell, but it does not reflect the number explicitly. For example, \( \gamma \) = 25 000 attempts per second corresponds to the case of overload with the collision probability \( p \) about 0.9. By changing the collision probability \( p \) from 0 to 1 we compute the access success probability \( P\left( \omega \right) \) using (2) and the average access delay \( D \) using (7).

Figure 4 introduces plots illustrating the access success probability \( P\left( \omega \right) \) for four values of the HARQ retransmission probability \( g \). The plots show that with \( g \) less than 0.5 even for \( \gamma \) = 10 000 attempts per second (\( p \) = 0.6) the access success probability is close to 1.

Fig. 4.
figure 4

Access success probability

Figure 5 indicates that the average access delay \( D \) varies significantly with the changing of the collision probability \( p \) and even for minor \( g \) can reach values exceeding 160 ms due to a significant number of preamble retransmissions.

Fig. 5.
figure 5

Average access delay

5 Conclusion

In this paper we addressed a RACH procedure for service M2 M traffic in LTE cell and introduced a mathematical model in the form of discrete Markov chain. Note that the access success probability is critical for applications such as fleet management service, when a large number of taxis equipped with fleet management devices gather in a cell, for example near the airport. Another measure, the average access delay, is critical for earthquake monitoring applications, because even tens of milliseconds are very important for an earthquake alarm. The proposed model allows calculating both mentioned performance measures for LTE FDD and TDD cell, UMTS FDD or UMTS 1.28Mcps TDD.

An interesting task for future study is to derive a formula for the cumulative distribution function (CDF) of the access delay between the first RA attempt and the completion of the random access procedure, for the successfully accessed MTC devices. Another important problem is the construction of analytical models of the overload control mechanisms based on Access Class Barring (ACB) schemes.