Ieee 802. 16 Broadband Wireless Access Working Group



Download 23.44 Kb.
Date conversion23.11.2016
Size23.44 Kb.

IEEE C80216p-11/0039




Project

IEEE 802.16 Broadband Wireless Access Working Group <http://ieee802.org/16>

Title

Network access with priority

Date Submitted

2011-3-11

Source(s)

Wei-Chieh Huang, Chia-Lung Tsai,

Ping-Heng Kuo, Yu-Tao Hsieh,

Pang-An Ting

ITRI


E-mail:

aj@itri.org.tw



Re:

Call for Comments on IEEE P802.16p AWD

Abstract

This contribution proposes addressing for M2M devices

Purpose

To be discussed and adopted by Machine-to-Machine(M2M) Task Group for IEEE P802.16p AWD

Notice

This document does not represent the agreed views of the IEEE 802.16 Working Group or any of its subgroups. It represents only the views of the participants listed in the “Source(s)” field above. It is offered as a basis for discussion. It is not binding on the contributor(s), who reserve(s) the right to add, amend or withdraw material contained herein.

Release

The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE’s name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEE’s sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE 802.16.

Patent Policy

The contributor is familiar with the IEEE-SA Patent Policy and Procedures:

and .

Further information is located at and .



Network access with priority

Wei-Chieh Huang, Chia-Lung Tsai, Ping-Heng Kuo, Yu-Tao Hsieh, Pang-An Ting



ITRI
  1. Introduction

In M2M network, there are supposed to be many different M2M applications. In particular, some applications are delay sensitive, e.g., remote, surveillance, and emergency alert. On the other hand, some applications are delay insensitive, e.g., smart metering and data collection. Based on various application characteristics, M2M devices shall be labeled with different priority levels. In addition, it is generally believed that the number of machine devices is 10 or even 100 times than that of human devices. Therefore, the collision problem in contention-based network access is an important issue worthy to be further investigated. Accordingly, this invention focuses on the foreseeable problems of network access with priority, in which large number devices are attempting to access the network simultaneously.

Considering a scenario that numerous devices attempt to enter network simultaneously after power outage or electricity shut off, the network may be congestion. In order to allow the devices being delay sensitive to enter the network more quickly, we may assign different opportunity periodicity to different devices. Since devices have different opportunity period, the devices having more opportunities are expected to enter the network more quickly.

The core of this contribution is explained subsequently. Devices are categorized into different levels and different levels are labeled with different priority factors. The level may be determined according to machine type, latency requirement, message content, or service level, which is for further studied. In general, the devices associating higher priority level have more opportunities, while the devices associating lower priority level have fewer opportunities.

In order to allow delay-sensitive devices to enter the network more quickly, we suggest that the priority factor is pre-established in devices. In addition, for each device, the corresponding opportunity periodicity is determined according to the pre-established priority factor and the opportunity configuration. In which, the opportunity configuration is included in the broadcast signal. After determining the opportunity period, the devices may determine the back-off time and then initiate network access. It is worthy to point out that, our proposal is capable of dispersing devices with different priority levels when they initiate network access simultaneously. In addition, the pre-established priority factor may be updated by using the received signal from base station. The received priority factor from base station may be stored in the device and adopted as a new priority factor. The flow chart for our proposal is described in the Fig. 1. Finally, Fig. 2 gives a simple example, where the level 1, level 2, and level 3 are classified into high, medium and low priority respectively.

Fig. 1 The flow chart for network access with priority


Fig. 2 An example of our proposal


Proposed text

Black text: text in the current 802.16p AWD

Red Text: delete text

Blue text: new text


---------------------------------------------------------Start of the Text #1--------------------------------------------------------

[16.2.15.X Network access with priority

The devices shall support to adjust the opportunity periodicity according to the opportunity configuration and priority factor. ]
[16.2.X Priority factor

The M2M devices shall support to be labeled with various priority factors. In addition, an M2M device shall know its own priority factor.]
16.2.15.X Network access with priority

The different M2M devices may have different opportunity periodicities in performing initial network access. In specific, their opportunity periodicities shall be determined according to the opportunity configuration and the priority factor.



16.2.3.9 AAI-REG-RSP

Field

Size (bits)

Value/Description

Condition

Priority factor

TBD

Opportunity configuration is defined in S-SFH message. An M2M device shall determine its opportunity based on the opportunity configuration and priority factor. In specific, an M2M device associating higher priority factor shall have more opportunities in performing initial network access.

Presents when an M2M device enters network.

16.2.X Priority factor

The M2M devices shall support to be labeled with priority factors. The priority factor is pre-established in an M2M device and may be updated by using the message from base-station.
---------------------------------------------------------End of the Text #1---------------------------------------------------------

Reference


[1] IEEE P802.16m/D12, “Part 16: Air Interface for Broadband Wireless Access Systems: Advanced Air Interface,” Feb. 2011.

[2] IEEE, “C802.16p-11/0002; IEEE 802.16p Machine to Machine (M2M): Proposed Text from Power Saving (PWR) Rapporteur Group”, Mar. 2011






The database is protected by copyright ©dentisty.org 2016
send message

    Main page