Professional Documents
Culture Documents
PII: S0140-3664(17)30680-1
DOI: 10.1016/j.comcom.2018.01.009
Reference: COMCOM 5634
Please cite this article as: Vyacheslav Begishev, Vitaly Petrov, Andrey Samuylov, Dmitri Moltchanov,
Sergey Andreev, Yevgeni Koucheryavy, Konstantin Samouylov, Resource Allocation and Sharing for
Heterogeneous Data Collection over Conventional 3GPP LTE and Emerging NB-IoT Technologies,
Computer Communications (2018), doi: 10.1016/j.comcom.2018.01.009
This is a PDF file of an unedited manuscript that has been accepted for publication. As a service
to our customers we are providing this early version of the manuscript. The manuscript will undergo
copyediting, typesetting, and review of the resulting proof before it is published in its final form. Please
note that during the production process errors may be discovered which could affect the content, and
all legal disclaimers that apply to the journal pertain.
ACCEPTED MANUSCRIPT
Vyacheslav Begisheva , Vitaly Petrovb,∗, Andrey Samuylovb , Dmitri Moltchanovb , Sergey Andreevb , Yevgeni
Koucheryavyb , Konstantin Samouylova
a Peoples’ Friendship University of Russia (RUDN University), Moscow, Russia
b Tampere University of Technology (TUT), Tampere, Finland
T
Abstract
IP
Tremendous growth in the volumes and diversity of data to be collected in future Internet of Things (IoT) applications
is one of the key challenges for the networking infrastructures as they evolve from 4G+ to true 5G systems. Particu-
CR
larly, ubiquitous deployments of wireless video surveillance cameras force the IoT service providers to support massive
multimedia data transfer together with more ‘conventional’ machine-type communications. Hence, the data services in a
complex IoT network may become heterogeneous, since several categories of traffic need to be supported simultaneously,
each having its own loads, quality-of-service requirements, and radio technology preferences. An emerging example of
US
the latter is the in-band deployment mode of the recently standardized NarrowBand IoT (NB-IoT) technology, where
the same spectrum is shared between 3GPP LTE-connected high-end equipment and NB-IoT-connected low-end devices.
However, while all of the necessary technology enablers are already in place, the question of how to share the available
bandwidth efficiently has not been addressed comprehensively. Targeting the indicated challenge, this paper introduces
AN
feasible strategies for resource sharing between the multimedia and sensory data in a hybrid LTE/NB-IoT wireless
deployment as well as compares them within our rigorous analytical methodology. The conducted numerical study
advocates for one of the allocation strategies – dynamic resource sharing with reservation – as the preferred solution for
reliable collection of heterogeneous data in large-scale 5G-grade IoT deployments.
M
as smart meters, surveillance cameras may be deployed our study, we advocate for the third strategy as the most
across a larger area (e.g., a factory, plant, or city block) appropriate in the heterogeneous traffic scenarios as well
and placed in locations where wired connectivity is not fea- as demonstrate how to best parametrize it for particular
sible due to technical or economic reasons, such as lamp- IoT traffic patterns.
posts, walls, and roofs of buildings. Meanwhile, the exist- The main contributions of our work are therefore the
ing 4G and 4G+ machine-type communications solutions following:
cannot fully support the scalability and reliability require-
ments of such massive video surveillance due to insufficient • We demonstrate that static resource sharing between
capacity for video streaming purposes. Hence, the use of LTE and NB-IoT is highly sensitive to the offered
long-range high-rate (naturally, cellular) wireless technolo- traffic load. To achieve the optimal performance,
gies becomes the primary viable option. the allocations need to be dynamically updated ac-
The combination of two or more heterogeneous big data cording to immediate traffic fluctuations. The latter
T
streams is one of the key features in 5G mobile networks, requires precise knowledge of the arrival patterns,
which increases the intelligence and reliability of decision- which may not be available in practice;
IP
making and, consequently, unleashes the full potential of • We confirm that dynamic resource sharing between
the IoT [20, 21]. For instance, intrusion or fire detection LTE and NB-IoT drastically improves the overall
signals reported by a group of smart meters may be im-
CR
system performance. However, it does not auto-
mediately cross-verified against the video monitoring infor- matically provide any performance guarantees to the
mation. At the same time, the collection of such hetero- over-the-top services and may unpredictably degrade
geneous big data poses a number of specific resource man- performance, especially when the offered traffic load
agement related challenges, where the reliability of data
streams plays a key role [22]. This need has been recently
recognized by 3GPP with the ratification of a dedicated in-
band deployment mode in LTE Rel. 13 [23–25], where the
“conventional” LTE radio – that can be used for large-
US across sub-systems is non-uniform;
• We illustrate that the introduction of minimal re-
source guarantees on top of dynamic resource sharing
between LTE and NB-IoT alleviates the problem of
AN
scale video surveillance [26] – shares the radio spectrum system performance degradation, while keeping the
with the emerging NB-IoT technology for low-end sensor network-centric metrics at adequate levels.
traffic [27]. Today, this combination receives significant
support from industry and is predicted to become one of The rest of the paper is organized as follows. In Sec-
tion 2, a model of the envisioned IoT system that serves
M
technologies, 3GPP does not provide specific guidelines on sions are drawn in the last section.
how these resources should be shared. Meanwhile, assum-
ing the limited amounts of radio resources owned by the 2. Proposed System Model
IoT service provider, the choice of the best resource allo-
PT
cation strategy for both (i) a smaller number of high-rate In this section, we first introduce our model of a surveil-
video cameras and (ii) a larger number of low-rate smart lance operator that establishes heterogeneous monitoring
meters will have significant implications on the decision- services in LTE bands by using both LTE and NB-IoT ca-
CE
making accuracy as well as the overall system performance. pabilities. Then, we proceed with formalizing the deploy-
Along these lines, one has to carefully balance the analytics- ment and traffic processes, the resource allocation strate-
centric metrics, such as the session loss probability for in- gies, as well as the metrics of interest. The notation used
dividual data streams, with the network-centric metrics, in this paper is summarized in Table 1.
AC
Dedicated network
spectrum resource Radio resources
with network slicing Data analytics servers
Dynamic separation
Heterogeneous subject to resource
data sources allocation strategy LTE/NB-IoT Operator’s cloud network
base station
T
Figure 1: Considered system design in a nutshell.
IP
Table 1: Notation used in this paper.
ing of acquired spectrum resources between the two types
Parameter Description of end nodes, surveillance cameras and NB-IoT sensors,
C Number of basic channels thus raising the key question of efficient resource alloca-
CR
S Number of RBs in a cell
c Number of basic channels in a single RB tion. Here, the reliability of both traffic streams becomes
λ Intensity of NB-IoT session arrivals of primary importance since the processing server may sur-
λ(1) Intensity of NB-IoT session arrivals per device vive without some of the sensed data, but cannot make in-
NN Number of connected NB-IoT devices
formed decisions if the entire stream becomes temporarily
US
θ Mean NB-IoT session volume
ν Intensity of LTE session arrivals unavailable (i.e., the amount of received data drops under
ν (1) Intensity of LTE session arrivals per device
NL Number of connected LTE devices
a certain limit). One of the possible examples here is a fire
1/µ Mean LTE session duration detection system, which is deployed across a certain area
ρ = λθ NB-IoT offered traffic load where any false positive alert is extremely costly (e.g., an
AN
a = ν/µ LTE offered traffic load
RN Number of basic channels reserved for NB-IoT industrial factory). Hence, if the processing unit gener-
RL Number of basic channels reserved for LTE ates a fire alert from smoke/temperature sensor readings,
c(m) Number of channels currently occupied by NB-IoT
CL Maximal number of channels allocated for LTE it needs to first cross-check it with the video monitoring
CN Maximal number of channels allocated for NB-IoT channel (video stream from a camera nearby), and only
M
E[bN L ] Mean number of occupied channels by NB-IoT+LTE of its smallest granularity, termed an NB-IoT channel. In
what follows, we name it the basic channel. There are C
NB-IoT channels available in the uplink direction that can
be characterized as C = cS, where S is the number of re-
parking spots), LTE is assumed as a connectivity option
AC
CN > RN > 0
RL = 0, CL = C
RN = 0, CN = C
RL=CL=C-CN
CL > RL > 0
T
a) static b) fully dynamic c) dynamic with reservation
IP
Figure 2: Considered resource allocations strategies.
the intensity of NB-IoT session arrivals per an individual A unique property of the considered model is that the
CR
connected device. Each arrival is characterized by an ex- basic channels are assumed to be scheduled sequentially by
ponentially distributed data volume with the mean of 1/θ taking into account the features of in-band NB-IoT tech-
and requires exactly b basic channels. We also let ρ = λθ nology [34, 35]. This process is illustrated in Fig. 3. Ac-
denote the offered traffic load over NB-IoT. Similarly to cordingly, consider a system with no active sessions and
the LTE sessions, NB-IoT devices are assumed to remain
static throughout the entire duration of their session.
basic channels allocated to NB-IoT and LTE coin- dropped due to the insufficient amount of available radio
cide, such that RL = CL and RN = CN . In other resources – for both NB-IoT and LTE sessions. As an
words, all of the resources are strictly divided be- example of the system performance indicator pertaining to
CE
tween NB-IoT and LTE and no resources are shared the economic factors of running the service, we concentrate
between them. on the radio resource utilization – the ergodic fraction of
radio resources jointly occupied by both types of service
• Dynamic (DYN). In this case, no minimum amount in frequency–time domain.
of resources are allocated to both NB-IoT and LTE,
AC
to that employed by LTE. As an example, the LTE plus process, {m(t), n(t), t > 0}, over the following state-space
NB-IoT deployment studied in this paper may be replaced
with the LTE plus LTE-M [36] or LTE-M plus NB-IoT X = {m ≥ 0, n ≥ 0 :
setup by adjusting the corresponding numerical parame- nd ≤ C − RN , c(m) ≤ C − RL , nd + c(m) ≤ C}, (1)
ters.
where c(m) = cdbm/M e is the number of basic channels
occupied by the NB-IoT sessions, M is the maximum num-
3.1. Analytical Model of Service
ber of NB-IoT sessions that can be served in a single RB,
M = dc/be, and bm is the number of basic channels re-
quired to serve these sessions.
It is easy to see that {m(t), n(t), t > 0} is Markov in
nature. The generic state of the state transition diagram
with the associated transition rates is illustrated in Fig. 4.
T
Let p(m, n)(t), {m, n} ∈ X , be the probability of having m
IP
NB-IoT and n LTE sessions in the system at an arbitrary
time t. Due to the lossy nature of the system, there is
always stationary state distribution
CR
p(m, n) = lim p(m, n)(t), {m, n} ∈ X . (2)
t→∞
US
Figure 4: Generic state and related transitions of {m(t), n(t), t > 0}.
To derive the local balance equations, consider an ar-
bitrary contour in the state transition diagram demon-
strated in Fig. 5. First, as one may observe, the pro-
cess {m(t), n(t), t > 0} is reversible, which implies that
AN
the stationary state distribution satisfies the local balance
The system described in Section 2 can be modeled by equations
using a mixed service queuing system with two arrival pro- m
cesses having different block-based service disciplines, re- p(m, n) = p(m − 1, n)λ, m > 0, (m, n) ∈ X ,
θ
spectively [37]. Observe that the system permits for losses
M
RB scheduled for NB-IoT and the number of basic chan- p(m, n) = p(0, n) =
m(m − 1)(m − 2) . . . 1
nels in this RB is higher than b, then the NB-IoT session ρm
is accepted to this RB. If the number of available basic = p(0, n), (5)
m!
channels is lower than b and a new RB is available for the
NB-IoT traffic, then this RB is scheduled for NB-IoT and where m > 0, (m, n) ∈ X .
the session is accepted, thus decreasing the number of ba- Using (3), we can also establish p(0, n) as
sic channels in this RB by b. In other cases, the NB-IoT a
session is dropped. p(0, n) = p(0, n − 1) =
n
Let m(t), t > 0, and n(t), t > 0, define the numbers of a2
active NB-IoT and LTE sessions, respectively. Hence, the = p(0, n − 2) = ... =
n(n − 1)
system state of the LTE cell serving both NB-IoT and LTE
an
traffic can be described by a two-dimensional stochastic = p(0, 0), n > 0, (m, n) ∈ X . (6)
n!
5
ACCEPTED MANUSCRIPT
[
C − RN RN
BL = m, :0≤m≤
d b
[
RL C − RN C − (n + 1)d C − nd
(m, n) : ≤n≤ − 1, +1≤m≤ . (17)
d d b b
Substituting (5) and (6) into (3), we produce Define the following division of the state space X
ρm an S
[
p (m, n) = G−1 (X ) , (7) X = Xs , (15)
m! n!
T
s=0
where the normalization constant G(X ) is given by
where Xs = {(m, n) ∈ X : c(m) = sc}.
IP
X ρm an The proposed division of the state space is shown in
G(X ) = . (8)
m! n! Fig. 6. Here, we also illustrate the subspaces correspond-
(m,n)∈X
ing to the blocking states of LTE and NB-IoT sessions.
CR
Knowing the stationary state distribution of the system
provided in (7) and (8) and operating over (15), the sought
blocking probabilities specified in (12) follow readily. Par-
ticularly, using (15) the blocking subspaces for the LTE
C − max(sc, RN ) mb
= X :n+1> , =s =
3.3. Performance Metrics s=0
d c
[
The drop probability for LTE and NB-IoT may be writ- C − RN RN
= X :n= ,0≤m≤
ED
ten as d b
X X [S
pN = p(m, n); pL = p(m, n), (12) C − max(sc, RN ) mb
X :n= , s−1< <s ,
(m,n)∈BN (m,n)∈BL s=0
d c
PT
(16)
where the associated sets are
and, finally, the sought subspace takes the form of (17),
BL = {(m, n) ∈ X : d(n + 1) > C − max(c(m), RN )} , thus leading to the following LTE session blocking proba-
CE
P C − RN
pL = p m, +
(m,n)∈X mp(m, n) d
E[TN ] = . (14) m=0
λ (1 − pN ) C−RN
d X−1 b C−nd
Xb c
The calculation of session drop probabilities in (12) + p(m, n). (18)
by directly applying (13) is computationally expensive. R
n= dL m=b
C−(n+1)d
b c+1
The reason is that the state space of the system is rather
large and may reach the value of few tens of thousands.
To alleviate this limitation, we develop a dedicated nu-
merical algorithm based on a recurrent relation between
non-normalized probabilities of macro states that is briefly
sketched below.
6
ACCEPTED MANUSCRIPT
[
C − RL c RL C − mb RN C − RL c
BN = ,n : 0 ≤ n ≤ (m, n) : n = , ≤m≤ . (20)
c b d d b c b
T
(m,n)∈X m=0 n=0
IP
...
CR
M
... ... ber of NB-IoT sessions and the mean number of channels
0 m
allocated to the NB-IoT sessions need to be established
s =1 s s=S
separately. Particularly, the mean number of RBs allo-
cated to the NB-IoT sessions is
Figure 6: Proposed division of X by macro states.
X b
k
$
C−max (d M
X
d
e N)
m c, R
%
lmm
p(m, n). (24)
AN
M
BN = {(m, n) ∈ X : c(m + 1) > C − nd } ∪ m=0 n=0
∪ {(m, n) ∈ X : c(m + 1) > C − RL } = The mean number of basic channels occupied by a sin-
S
[ gle NB-IoT session is provided by
= {X : c(m + 1) > C − max(nd, RL ), c(m) = sc} =
M
$ %
s=0 j k C−max (d M e N)
m c, R
d C−RL
RL C − RL c [ X X lmm b
m=0 n=0
[S
C − mb max(RN , C − sc) c
X :n= ,m = , The mean number of RBs allocated to the LTE sessions
s=0
d c b
is
(19) $ %
PT
k C−max(d M ec, RN )
m
j
C−RL
thus eventually yielding (20) and resulting in the following Xb
X
d
expressions for the NB-IoT session blocking probability E [sL ] = n p(m, n). (26)
CE
j k m=0 n=0
RL
X d
C − RL c The mean number of channels occupied by the LTE
pN = p ,n +
n=0
c b sessions is
j k $ %
AC
C−RL
c
c
b j k C−max (d M e N)
m c, R
X C − mb C−RL d
b
+ p m, . (21) X X
j
R
k d E[bL ] = d n p(m, n). (27)
m= bN
m=0 n=0
The mean session duration in (14) takes the form of The mean of the total number of the basic channels
$ % occupied by both types of traffic is finally delivered as
j k C−max (d M e N)
m c, R
E [bN L ] = E [bN ] + E [bL ].
RL d
Pd
P m
M p(m, n)
E[TN ] = n=0 n=0
. (22) 4. Numerical Assessment
λ (1 − pN )
In this section, we apply our developed analytical model
to produce the quantitative and qualitative performance
7
ACCEPTED MANUSCRIPT
0.35 STAT, γ =0.8 sion drop probability over LTE as a function of the to-
DYNRES, RL =0.8C tal number of connected NB-IoT sensors in static resource
0.30 DYN
allocation scheme, STAT, where the entire pool of radio
0.25
resources is strictly divided between the two services. For
0.20 this strategy, we introduce a resource division coefficient,
0.15 γ, which characterizes the fraction of resources reserved
0.10 for the NB-IoT service, γ = RN /C. As one may observe,
0.05 the characteristics of STAT strategy depend only on the
0.00 selected γ value, but not on the load from the NB-IoT sen-
0 20K 40K 60K 80K 100K sor nodes due to the hard separation between the resources
Number of NB-IoT devices
T
allocated to LTE and NB-IoT services. The reason is that
STAT strategy constructs two independent virtual wireless
IP
Figure 7: LTE drop probability vs. NB-IoT load.
systems: one for the LTE and another one for the NB-IoT
0.35 traffic. While this strategy is the simplest in terms of its
STAT, γ =0.4 implementation, it can be recommended only for systems
CR
Probability of NB-IoT session drop
0.10
US In contrast, the drop probability in DYN strategy, where
the entire pool of resources is available to both services,
heavily depends on the current load from the NB-IoT seg-
ment. For lower numbers of connected NB-IoT devices,
AN
0.05
DYN strategy clearly outperforms STAT solution in that
0.00 it makes the full band available to the LTE devices in the
0 100 200 300 400
Number of LTE devices absence of the NB-IoT traffic. The growth of the NB-
IoT traffic is naturally followed by an increase in the drop
M
Figure 8: NB-IoT drop probability vs. LTE load. probability for DYN strategy as the NB-IoT traffic starts
competing for the resources with the constant load com-
ing from the LTE traffic. Finally, with the extremely large
results for the considered system in a characteristic sce- number of NB-IoT devices, sensor traffic begins dominat-
ED
nario. We compare the properties of the discussed resource ing in the shared band. Eventually, the drop probability
allocation strategies by focusing on the underlying scaling becomes higher than that for STAT strategy, regardless of
laws and optimization. Particularly, we first address the the chosen resource division coefficient value. Therefore,
performance of service-related metrics that concentrate on DYN resource allocation strategy can be recommended
PT
LTE and NB-IoT session drop probabilities. Then, we ana- for systems where the average loads demanded by each
lyze operator-centric resource utilization metrics. Finally, stream (measured in Hz/s) are comparable. At the same
we demonstrate the process of adjusting the selected strat- time, DYN strategy remains an adequate solution for un-
egy by taking into account the requirements of data ana-
CE
100 100
95
Radio resource utilization, %
T
IP
Figure 9: Resource utilization vs. NB-IoT load. Figure 10: Resource utilization vs. LTE load.
CR
by RL . Further, for higher loads of NB-IoT traffic, the 4.2. System-Level Performance
LTE drop probability for DYNRES never climbs higher After discussing the reliability performance of the con-
than the respective value for the system with STAT strat- sidered strategies, we focus on the system-centric metrics
egy. For extremely high numbers of NB-IoT devices, the and, particularly, the resource utilization.
curve for DYNRES asymptotically approaches the curve
for STAT, but never crosses it.
Summarizing, the performance of DYNRES strategy
is never worse than that of STAT and DYN strategies.
US To this end, Fig. 9 and Fig. 10 display the average re-
source utilization for the parameters employed to construct
Fig. 7 and Fig. 9, respectively. Using this parametrization,
we learn the scaling laws of the resource utilization value
AN
The explanation is in that DYNRES strategy combines versus both LTE and NB-IoT loads. Studying Fig. 9 and
the strengths of the first two, thus behaving similarly to Fig. 10, we observe that the results are opposite to those
DYN strategy at low loads and similarly to STAT strat- reported by Fig. 7 and Fig. 8. Here, DYN strategy clearly
egy at high loads. Hence, DYNRES strategy can be rec- outperforms all its competitors due to a more aggressive re-
ommended to improve reliability-centric operation. Then, source allocation mechanism: any available RB is immedi-
M
the question of interest is appropriate parametrization of ately granted when requested by any type of traffic. Mean-
the selected strategy. while, STAT strategy demonstrates worse performance as
In more detail, we study an orthogonal cut in Fig. 8 the dominating traffic from one service can never be of-
ED
that presents the NB-IoT session drop probability versus fered resources reserved for another service, even when the
the total number of connected LTE devices. Similarly to latter is currently underloaded. Finally, DYNRES strat-
the previous case, we parametrize DYNRES strategy in a egy demonstrates the median behavior by “cuddling” the
way that the number of resources reserved for NB-IoT in DYN curve at low loads and asymptotically approaching
PT
STAT and DYNRES cases match perfectly. It is important the STAT curve at high loads.
to note that in this case, RN is equal to (1 − γ)C instead
of γC. The values of RL are assumed to be zero. For 4.3. Adjustment of Strategies
such a symmetric case, we observe identical qualitative
CE
behavior with that in Fig. 7. However, there are noticeable Applying our intuition developed in the course of the
quantitative differences between Fig. 7 and Fig. 8. The first two parts of the conducted numerical study, we now
values of NB-IoT drop probability are orders of magnitude consider a more practical scenario: setting dynamic thresh-
lower that those observed for LTE. This is mainly due to olds for the discussed traffic types depending on the re-
AC
lower resource demands of an individual NB-IoT session, quirements as defined by the data analytics algorithms.
hence leading to higher chances of getting served even in These requirements are expressed in terms of the LTE and
a near fully loaded system. In addition, the way NB-IoT NB-IoT drop probabilities. For this study, we disregard
channels are allocated in the in-band mode also favors the DYN strategy as it does not provide the means to achieve
sensor traffic. Indeed, the LTE sessions occupy an integer performance guarantees. Hence, we offer a comparison be-
number of RBs, while the NB-IoT traffic acquires a full RB tween STAT and DYNRES strategies.
even though a single session does not occupy it completely. To parametrize the resource allocation strategies, we
Therefore, the next several NB-IoT sessions will definitely first determine the maximum tolerable level of drop prob-
be served, since the remaining part of the already allocated ability for the LTE and NB-IoT services. Here, we set this
RB cannot be occupied by any LTE stream. Regardless value to 1% for both types of traffic. We then apply our
of the quantitative values for the LTE traffic, DYNRES framework described in Section 3 to determine the mini-
system always wins the competition. mum and maximum values of γ, γmin , and γmax required
to “protect” the traffic streams from each other. We also
9
ACCEPTED MANUSCRIPT
10-1 46.70
10-2 46.65
10-3
46.60
10-4
46.55
10-5
46.50
10-6
46.45
10-7 STAT, LTE session DYNRES, LTE session
STAT, NB-IoT session DYNRES, NB-IoT session STAT DYNRES
10-8 46.40 0.56 0.58 0.60 0.62 0.64 0.66 0.68 0.70
0.56 0.58 0.60 0.62 0.64 0.66 0.68 0.70
STAT strategy LTE resource share STAT strategy LTE resource share
T
IP
Figure 11: Drop probability vs. resource division coefficient, γ. Figure 12: Resource utilization vs. resource division coefficient, γ.
CR
set the same resource division coefficients for DYNRES
strategy, such that RL = γmin C, while RN = (1 − γmax )C. ence is on the order of few percents and is accompanied
For the selected drop probability thresholds and the cho- by the considerably higher reliability levels, since the drop
sen stream loads, 50 LTE-connected video cameras and probabilities for DYNRES in such extreme conditions are
30K NB-IoT sensors, the resource division coefficient val- an order of magnitude lower than those achievable with
ues are γmin = 0.55 and γmax = 0.7. In other words, 55%
or resources have to be allocated exclusively to the LTE
segment, while 30% more resources are to be “protected”
US DYN, see Fig. 7 and Fig. 8.
5. Conclusions
AN
for the NB-IoT sessions. The question of interest is how to
efficiently share the resources between the γ values, 15% In this paper, we studied efficient collection of hetero-
in our case. geneous data over an IoT wireless network. We partic-
Targeting to answer the above question, we compare ularly focused on the simultaneous transmission of high-
STAT strategy, where γ ∈ [γmin , γmax ] with DYNRES al- rate video streams coming from LTE-connected surveil-
M
ternative, where the available common resources are dy- lance cameras and low-rate sensory data collected from
namically shared between the streams depending on their numerous NB-IoT-connected devices (considering the in-
instantaneous loads. Fig. 11 presents an analytics-centric band LTE/NB-IoT deployment). We thus developed an
ED
study of the drop probabilities for both LTE and NB-IoT analytical performance evaluation framework that captures
streams, while Fig. 12 focuses on the resource utilization both service- and network-centric metrics of interest as
analysis. Regarding Fig. 11, we notice that DYNRES is well as considers the peculiarities of resource sharing be-
preferred over STAT: there is a very “narrow” operational tween LTE and NB-IoT transmissions. Finally, by ex-
PT
regime (γ ≤ 0.56), where NB-IoT drop probability for ample of a surveillance operator implementing a complex
STAT is lower than that for DYNRES (0.5·10−6 vs. 10−6 ). monitoring system for further data processing, we evalu-
At the same time, this slight advantage is compensated by ated three alternative resource sharing strategies between
a considerable loss in the LTE session drop probability: multimedia and sensory data.
CE
10−2 for STAT vs. only 0.5 · 10−3 for DYNRES. Mean- Our numerical study demonstrated that the simplest
while, any higher values of γ lead to much worse perfor- STAT strategy with complete isolation between services
mance of STAT in terms of both probabilities. by strictly assigning resources to them is highly sensitive
Finally, we focus on the resource utilization curves in to the offered load and requires precise knowledge of the
AC
the same conditions, as shown by Fig. 12. Here, we ob- traffic through dynamic updates to achieve the desired
serve that DYNRES clearly outperforms STAT for all of performance. We also revealed that DYN strategy with
the allowed values of γ. Despite this fact, the quantitative the fully dynamic allocation, on the one hand, achieves
difference is not massive and we can still conclude that the highest system throughput, but on the other hand,
DYNRES resource allocation strategy is the best option for cannot guarantee any demanded service reliability. Our
the considered heterogeneous data collection system under preferred dynamic allocation strategy with resource reser-
both stable and time-varying loads. With adequate selec- vation, DYNRES, allows for satisfying the feasible relia-
tion of RL and RN parameters, DYNRES always performs bility requirements defined by the needs of big data ana-
better than STAT. At the same time, there is a single load lytics, while keeping the resource utilization at high lev-
regime, where DYNRES is worse than DYN in terms of els. The proposed DYNRES strategy is therefore recom-
the resource utilization: a clear domination of one type of mended for the forthcoming IoT deployments over 5G mo-
traffic over another one, e.g., extreme load from LTE and bile networks.
10
ACCEPTED MANUSCRIPT
The constructed analytical framework additionally of- derstanding the IoT connectivity landscape: A contemporary
fers a baseline model with moderate complexity, which is M2M radio technology roadmap, IEEE Communications Mag-
azine 53 (9) (2015) 32–40.
open to many possible extensions. Our formulations can [15] A. Rico-Alvarino, M. Vajapeyam, H. Xu, X. Wang, Y. Blanken-
be further developed to incorporate more sophisticated ship, J. Bergman, T. Tirronen, E. Yavuz, An overview of 3GPP
scenarios, which include but are not limited to the im- enhancements on machine to machine communications, IEEE
plementation of priorities between the LTE and NB-IoT Communications Magazine 54 (6) (2016) 14–21.
[16] Y. Miao, W. Li, D. Tian, M. S. Hossain, M. F. Alhamid, Nar-
connections, the addition of multiple thresholds for the row band Internet of Things: Simulation and modelling, IEEE
simultaneous operation of multiple clients with fixed guar- Internet of Things Journal PP (99).
antees, and the support of multi-tenancy where more than [17] W. Zhu, P. Cui, Z. Wang, G. Hua, Multimedia big data com-
one IoT operator exploits the shared spectrum. With ap- puting, IEEE MultiMedia 22 (3) (2015) 96–105.
[18] D. Lyon, Surveillance, Snowden, and Big Data: Capacities, con-
propriate parametrization, the present framework can also sequences, critique, Big Data & Society 1 (2).
be applied to other cellular IoT radio access technologies, [19] F. Bjorklund, O. Svenonius, Video Surveillance and Social Con-
T
such as LTE-M. Finally, our model can be utilized to ad- trol in a Comparative Perspective, Routledge, 2013.
dress various optimization problems that focus on capac- [20] D. Che, M. Safran, Z. Peng, From big data to big data min-
IP
ing: Challenges, issues, and opportunities, in: Proc. of the 18th
ity, session continuity, and average data rate maximization International Conference on Database Systems for Advanced
in multi-radio IoT deployments. Applications, 2013, pp. 1–15.
[21] E. Olshannikova, A. Ometov, Y. Koucheryavy, T. Olsson, Visu-
CR
alizing Big Data with augmented and virtual reality: challenges
References and research agenda, Journal of Big Data 2 (1) (2015) 22.
[22] R. Zuech, T. M. Khoshgoftaar, R. Wald, Intrusion detection
[1] Cisco, The Zettabyte Era: Trends and analysis, White Paper. and Big Heterogeneous Data: a Survey, Journal of Big Data
[2] H. V. Jagadish, J. Gehrke, A. Labrinidis, Y. Papakonstantinou, 2 (1) (2015) 3.
J. M. Patel, R. Ramakrishnan, C. Shahabi, Big data and its
technical challenges, Communications of the ACM 57 (7) (2014)
86–94.
[3] T. B. Murdoch, A. S. Detsky, The inevitable application of big
data to health care, JAMA 309 (13) (2013) 1351–1352.
US [23]
[24]
R. Ratasuk, B. Vejlgaard, N. Mangalvedhe, A. Ghosh, NB-IoT
system for M2M communication, in: Proc. of the IEEE Wireless
Communications and Networking Conference (IEEE WCNC),
2016, pp. 1–5.
Study on provision of low-cost Machine-Type Communications
AN
[4] H. Chen, R. H. L. Chiang, V. C. Storey, Business intelligence (MTC) User Equipments (UEs) based on LTE, 3GPP Technical
and analytics: From big data to big impact, Management In- Report (TR) 36.888/r12 (June 2013).
formation Systems Quarterly 36 (4) (2012) 1165–1188. [25] Cellular system support for ultra-low complexity and low
URL http://dl.acm.org/citation.cfm?id=2481674.2481683 throughput Internet of Things (CIoT), 3GPP Technical Report
[5] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, A (TR) 45.820/r13 (December 2015).
survey on sensor networks, IEEE Communications Magazine
M
ability and adoption, IEEE Communications Magazine 55 (12) [27] 3GPP, “Standardization of NB-IOT completed”, http://www.
(2017) 156–164. 3gpp.org/news-events/3gpp-news/1785-nb_iot_complete,
[7] P. Jain, P. Hedman, H. Zisimopoulos, Machine Type Commu- June 2016.
nications in 3GPP systems, IEEE Communications Magazine [28] Nokia, LTE evolution for IoT connectivity, White Paper.
50 (11) (2012) 28–35. [29] Huawei, NB-IoT: Enabling new business opportunities, White
PT
11
ACCEPTED MANUSCRIPT
T
IP
CR
US
AN
M
ED
PT
CE
AC
12