Ieee 802. 16 Broadband Wireless Access Working Group

Download 23.02 Kb.
Date conversion23.11.2016
Size23.02 Kb.

IEEE C80216p-11/0038


IEEE 802.16 Broadband Wireless Access Working Group <>


Prioritized network reentry from idle mode

Date Submitted



Wei-Chieh Huang, Chia-Lung Tsai,

Ping-Heng Kuo, Yu-Tao Hsieh,

Pang-An Ting




Call for Comments on IEEE P802.16p AWD


This contribution proposes addressing for M2M devices


To be discussed and adopted by Machine-to-Machine(M2M) Task Group for IEEE P802.16p AWD


This document does not represent the agreed views of the IEEE 802.16 Working Group or any of its subgroups. It represents only the views of the participants listed in the “Source(s)” field above. It is offered as a basis for discussion. It is not binding on the contributor(s), who reserve(s) the right to add, amend or withdraw material contained herein.


The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE’s name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEE’s sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE 802.16.

Patent Policy

The contributor is familiar with the IEEE-SA Patent Policy and Procedures:

and .

Further information is located at and .

Prioritized network reentry from idle mode

Wei-Chieh Huang, Chia-Lung Tsai, Ping-Heng Kuo, Yu-Tao Hsieh, Pang-An Ting

  1. Introduction

In M2M network, there are supposed to be many different M2M applications. In particular, some applications are delay sensitive, e.g., remote, surveillance, and emergency alert. On the other hand, some applications are delay insensitive, e.g., smart metering and data collection. Based on various application characteristics, M2M devices shall be labeled with different priority levels. In addition, it is generally believed that the number of machine devices is 10 or even 100 times than that of human devices. Therefore, the collision problem in contention-based network access is an important issue worthy to be further investigated. Accordingly, this invention focuses on the foreseeable problems of network access with priority, in which large number devices are attempting to access the network simultaneously.

Considering a scenario that numerous devices attempt to perform network reentry from idle more simultaneously, the network may be congestion. In order to allow delay sensitive devices to enter the network more quickly, we may assign different opportunity periodicity to different devices. Since devices have different opportunity period, the devices having more opportunities are expected to enter the network more quickly.

The core of this contribution is explained subsequently. Devices are categorized into different levels and different levels are labeled with different priority factors. The level may be determined according to machine type, latency requirement, message content, or service level, which is for further studied. In general, the devices associating higher priority level have more opportunities, while the devices associating lower priority level have fewer opportunities.

In order to categorize M2M devices into different levels, an M2M device shall be labeled with a priority factor during connective mode. This priority factor will be used for M2M devices performing network reentry from idle mode. Specifically, for each device, the corresponding opportunity periodicity is determined according to the priority factor and the opportunity configuration. In which, the opportunity configuration is included in the broadcast signal. After determining the opportunity period, the devices may determine the back-off time and then perform network reentry from idle mode. It is worthy to point out that, our proposal is capable of dispersing devices with different priority levels when they perform network reentry from idle mode simultaneously. In addition, the priority factor may be updated by using the message from base station. The flow chart for our proposal is described in the Fig. 1. Finally, Fig. 2 gives a simple example, where the level 1, level 2, and level 3 are classified into high, medium and low priority respectively.

Fig. 1 The flow chart for network access with priority

Fig. 2 An example of our proposal

Proposed text

Black text: text in the current 802.16p AWD

Red Text: delete text

Blue text: new text

---------------------------------------------------------Start of the Text #1--------------------------------------------------------

[16.2.18.X Network reentry from idle mode with priority

The devices shall support to adjust the opportunity periodicity according to the opportunity configuration and priority factor. ]
16.2.18.X Network reentry from idle mode with priority

The different M2M devices may have different opportunity periodicities in performing network reentry. In specific, their opportunity periodicities shall be determined according to the opportunity configuration and the priority factor. . AAI-REG-RSP


Size (bits)



Priority factor


Opportunity configuration is defined in S-SFH message. An M2M device shall determine its opportunity using the opportunity configuration and priority factor. In specific, an M2M device associating higher priority factor have more opportunities in performing initial network ranging

Presents when an M2M device enters network

---------------------------------------------------------End of the Text #1---------------------------------------------------------


[1] IEEE P802.16m/D12, “Part 16: Air Interface for Broadband Wireless Access Systems: Advanced Air Interface,” Feb. 2011.

[2] IEEE, “C802.16p-11/0002; IEEE 802.16p Machine to Machine (M2M): Proposed Text from Power Saving (PWR) Rapporteur Group”, Mar. 2011

The database is protected by copyright © 2016
send message

    Main page