81,715 research outputs found
Code-Expanded Random Access for Machine-Type Communications
The random access methods used for support of machine-type communications
(MTC) in current cellular standards are derivatives of traditional framed
slotted ALOHA and therefore do not support high user loads efficiently.
Motivated by the random access method employed in LTE, we propose a novel
approach that is able to sustain a wide random access load range, while
preserving the physical layer unchanged and incurring minor changes in the
medium access control layer. The proposed scheme increases the amount of
available contention resources, without resorting to the increase of system
resources, such as contention sub-frames and preambles. This increase is
accomplished by expanding the contention space to the code domain, through the
creation of random access codewords. Specifically, in the proposed scheme,
users perform random access by transmitting one or none of the available LTE
orthogonal preambles in multiple random access sub-frames, thus creating access
codewords that are used for contention. In this way, for the same number of
random access sub-frames and orthogonal preambles, the amount of available
contention resources is drastically increased, enabling the support of an
increased number of MTC users. We present the framework and analysis of the
proposed code-expanded random access method and show that our approach supports
load regions that are beyond the reach of current systems.Comment: 6 Pages, 7 figures, This paper has been submitted to GC'12 Workshop:
Second International Workshop on Machine-to-Machine Communications 'Key' to
the Future Internet of Thing
Random Access for Machine-Type Communication based on Bloom Filtering
We present a random access method inspired on Bloom filters that is suited
for Machine-Type Communications (MTC). Each accessing device sends a
\emph{signature} during the contention process. A signature is constructed
using the Bloom filtering method and contains information on the device
identity and the connection establishment cause. We instantiate the proposed
method over the current LTE-A access protocol. However, the method is
applicable to a more general class of random access protocols that use
preambles or other reservation sequences, as expected to be the case in 5G
systems. We show that our method utilizes the system resources more efficiently
and achieves significantly lower connection establishment latency in case of
synchronous arrivals, compared to the variant of the LTE-A access protocol that
is optimized for MTC traffic. A dividend of the proposed method is that it
allows the base station (BS) to acquire the device identity and the connection
establishment cause already in the initial phase of the connection
establishment, thereby enabling their differentiated treatment by the BS.Comment: Accepted for presentation on IEEE Globecom 201
D2D-Based Grouped Random Access to Mitigate Mobile Access Congestion in 5G Sensor Networks
The Fifth Generation (5G) wireless service of sensor networks involves
significant challenges when dealing with the coordination of ever-increasing
number of devices accessing shared resources. This has drawn major interest
from the research community as many existing works focus on the radio access
network congestion control to efficiently manage resources in the context of
device-to-device (D2D) interaction in huge sensor networks. In this context,
this paper pioneers a study on the impact of D2D link reliability in
group-assisted random access protocols, by shedding the light on beneficial
performance and potential limitations of approaches of this kind against
tunable parameters such as group size, number of sensors and reliability of D2D
links. Additionally, we leverage on the association with a Geolocation Database
(GDB) capability to assist the grouping decisions by drawing parallels with
recent regulatory-driven initiatives around GDBs and arguing benefits of the
suggested proposal. Finally, the proposed method is approved to significantly
reduce the delay over random access channels, by means of an exhaustive
simulation campaign.Comment: First submission to IEEE Communications Magazine on Oct.28.2017.
Accepted on Aug.18.2019. This is the camera-ready versio
Recommended from our members
Integrating biomedical research and electronic health records to create knowledge-based biologically meaningful machine-readable embeddings.
In order to advance precision medicine, detailed clinical features ought to be described in a way that leverages current knowledge. Although data collected from biomedical research is expanding at an almost exponential rate, our ability to transform that information into patient care has not kept at pace. A major barrier preventing this transformation is that multi-dimensional data collection and analysis is usually carried out without much understanding of the underlying knowledge structure. Here, in an effort to bridge this gap, Electronic Health Records (EHRs) of individual patients are connected to a heterogeneous knowledge network called Scalable Precision Medicine Oriented Knowledge Engine (SPOKE). Then an unsupervised machine-learning algorithm creates Propagated SPOKE Entry Vectors (PSEVs) that encode the importance of each SPOKE node for any code in the EHRs. We argue that these results, alongside the natural integration of PSEVs into any EHR machine-learning platform, provide a key step toward precision medicine
Massive M2M Access with Reliability Guarantees in LTE Systems
Machine-to-Machine (M2M) communications are one of the major drivers of the
cellular network evolution towards 5G systems. One of the key challenges is on
how to provide reliability guarantees to each accessing device in a situation
in which there is a massive number of almost-simultaneous arrivals from a large
set of M2M devices. The existing solutions take a reactive approach in dealing
with massive arrivals, such as non-selective barring when a massive arrival
event occurs, which implies that the devices cannot get individual reliability
guarantees. In this paper we propose a proactive approach, based on a standard
operation of the cellular access. The access procedure is divided into two
phases, an estimation phase and a serving phase. In the estimation phase the
number of arrivals is estimated and this information is used to tune the amount
of resources allocated in the serving phase. Our results show that the
proactive approach is instrumental in delivering high access reliability to the
M2M devices.Comment: Accepted for presentation in ICC 201
- …