4,960 research outputs found

    ๋Œ€๊ทœ๋ชจ ์‚ฌ๋ฌผ ํ†ต์‹ ์„ ์œ„ํ•œ ์••์ถ•์„ผ์‹ฑ ๊ธฐ๋ฐ˜ ๋‹ค์ค‘ ์‚ฌ์šฉ์ž ๊ฒ€์ถœ

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ (๋ฐ•์‚ฌ)-- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› : ๊ณต๊ณผ๋Œ€ํ•™ ์ „๊ธฐยท์ปดํ“จํ„ฐ๊ณตํ•™๋ถ€, 2019. 2. ์ด๊ด‘๋ณต.Massive machine-type communication (mMTC) is a newly introduced service category in 5G wireless communication systems to support a variety of Internet-of-Things (IoT) applications. In the mMTC network, a large portion of devices is inactive and hence does not transmit data. Thus, the transmit vector consisting of data symbols of both active and inactive devices can be readily modeled as a sparse vector. In recovering sparsely represented multi-user vectors, compressed sensing based multi-user detection (CS-MUD) can be used. CS-MUD is a feasible solution to the grant-free uplink non-orthogonal multiple access (NOMA) environments. In this dissertation, two novel techniques regarding CS-MUD for mMTC networks are proposed. In the first part of the dissertation, the sparsity-aware ordered successive interference cancellation (SA-OSIC) technique is proposed. In CS-MUD, multi-user vectors are detected based on a sparsity-aware maximum a posteriori probability (S-MAP) criterion. To reduce the computational complexity of S-MAP detection, sparsity-aware successive interference cancellation (SA-SIC) can be used. SA-SIC is a simple low-complexity scheme that recovers transmit symbols in a sequential manner. However, SA-SIC does not perform well without proper layer sorting due to error propagation. When multi-user vectors are sparse and each device is active with a distinct probability, the detection order determined solely by channel gains might not be optimal. In this dissertation, to reduce the error propagation and enhance the performance of SA-SIC, an activity-aware sorted QR decomposition (A-SQRD) algorithm that finds the optimal detection order is proposed. The proposed technique finds the optimal detection order based on the activity probabilities and channel gains of machine-type devices. Numerical results verify that the proposed technique greatly improves the performance of SA-SIC. In the second part of the dissertation, the expectation propagation based joint AUD and CE (EP-AUD/CE) technique is proposed. In several studies regarding CS-MUD, the uplink channel state information (CSI) from the MTD to the BS is assumed to be perfectly known to the BS. In practice, however, the uplink CSI from the devices to the BS should be estimated before data detection. To address this issue, various joint active user detection (AUD) and channel estimation (CE) schemes have been proposed. Since only a few devices are active at one time, an element-wise (i.e., Hadamard) product of the binary activity pattern and the channel vector is also a sparse vector and thus compressed sensing (CS)-based technique is a good fit for the problem at hand. One potential shortcoming in these studies is that a prior distribution of the sparse vector is not exploited. In fact, these studies are based on the non-Bayesian greedy algorithms such as the orthogonal matching pursuit (OMP) and approximate message passing (AMP) algorithms, which do not require a prior distribution of the sparse vector. In essence, these algorithms find out non-zero values based on the instantaneous correlation between the sensing matrix and the observation vector so that they might not be effective in the situation where the prior distribution is available. In this case, clearly, by exploiting the statistical distribution of the sparse vector, the performance of AUD and CE can be improved substantially. The proposed technique finds the best approximation of the posterior distribution of the sparse channel vector based on the expectation propagation (EP) algorithm. Using the approximate distribution, AUD and CE are jointly performed. Numerical simulations show that the proposed technique substantially enhances AUD and CE performances over competing algorithms.๋Œ€๊ทœ๋ชจ ์‚ฌ๋ฌผ ํ†ต์‹ (massive machine-type communications, mMTC)์€ ๋‹ค์–‘ํ•œ ์‚ฌ๋ฌผ ์ธํ„ฐ๋„ท(internet of things, IoT) ์„œ๋น„์Šค๋ฅผ ์ง€์›ํ•˜๊ธฐ ์œ„ํ•ด ์ฐจ์„ธ๋Œ€ ๋ฌด์„  ํ†ต์‹  ํ‘œ์ค€์— ์ƒˆ๋กœ ๋„์ž…๋œ ์„œ๋น„์Šค ๋ฒ”์ฃผ์ด๋‹ค. ๋Œ€๊ทœ๋ชจ ์‚ฌ๋ฌผ ํ†ต์‹  ํ™˜๊ฒฝ์—์„œ๋Š” ๋งŽ์€ ์ˆ˜์˜ ์‚ฌ๋ฌผ ๊ธฐ๊ธฐ(machine-type device, MTD)๊ฐ€ ๋Œ€๋ถ€๋ถ„์˜ ํƒ€์ž„ ์Šฌ๋กฏ(time slot)์—์„œ ๋น„ํ™œ์„ฑ ์ƒํƒœ์ด๋ฉฐ ๋ฐ์ดํ„ฐ๋ฅผ ์ „์†กํ•˜์ง€ ์•Š๋Š”๋‹ค. ๋”ฐ๋ผ์„œ, ํ™œ์„ฑ ๋ฐ ๋น„ํ™œ์„ฑ ๊ธฐ๊ธฐ ๋ชจ๋‘์˜ ๋ฐ์ดํ„ฐ ์‹ฌ๋ณผ๋กœ ๊ตฌ์„ฑ๋œ ์ „์†ก ๋ฒกํ„ฐ๋Š” ํฌ์†Œ(sparse) ๋ฒกํ„ฐ๋กœ ํ‘œํ˜„๋  ์ˆ˜ ์žˆ๋‹ค. ํฌ์†Œ ๋ฒกํ„ฐ๋กœ ํ‘œํ˜„๋œ ๋‹ค์ค‘ ์‚ฌ์šฉ์ž ๋ฒกํ„ฐ๋ฅผ ๋ณต์›ํ•˜๊ธฐ ์œ„ํ•ด, ์••์ถ• ์„ผ์‹ฑ ๊ธฐ๋ฐ˜ ๋‹ค์ค‘ ์‚ฌ์šฉ์ž ๊ฒ€์ถœ(CS-MUD)์ด ์‚ฌ์šฉ๋  ์ˆ˜ ์žˆ๋‹ค. CS-MUD๋Š” ์Šค์ผ€์ค„๋ง(scheduling) ์ ˆ์ฐจ๊ฐ€ ์—†๋Š” ์ƒํ–ฅ๋งํฌ(uplink) ๋น„์ง๊ต ๋‹ค์ค‘ ์ ‘์†(non-orthogonal multiple access, NOMA)์„ ์œ„ํ•œ ํ•ต์‹ฌ ๊ธฐ์ˆ  ์ค‘ ํ•˜๋‚˜์ด๋‹ค. ๋ณธ ํ•™์œ„ ๋…ผ๋ฌธ์—์„œ๋Š” ๋Œ€๊ทœ๋ชจ ์‚ฌ๋ฌผ ํ†ต์‹ ์„ ์œ„ํ•œ ์ƒˆ๋กœ์šด CS-MUD ๊ธฐ์ˆ ๋“ค์„ ์ œ์•ˆํ•œ๋‹ค. ๋…ผ๋ฌธ์˜ ์ฒซ ๋ฒˆ์งธ ๋ถ€๋ถ„์—์„œ๋Š”, ํฌ์†Œ์„ฑ์„ ๊ณ ๋ คํ•œ ์ •๋ ฌ ์ˆœ์ฐจ์  ๊ฐ„์„ญ ์ œ๊ฑฐ(sparsity-aware ordered successive interference cancellation, SA-OSIC) ๊ธฐ์ˆ ์„ ์ œ์•ˆํ•œ๋‹ค. CS-MUD์—์„œ ๋‹ค์ค‘ ์‚ฌ์šฉ์ž ๋ฒกํ„ฐ๋Š” ํฌ์†Œ์„ฑ์„ ๊ณ ๋ คํ•œ ์ตœ๋Œ€ ์‚ฌํ›„ ํ™•๋ฅ (sparsity-aware maximum a posteriori probability, S-MAP) ๊ธฐ์ค€์— ๋”ฐ๋ผ ๊ฒ€์ถœ๋œ๋‹ค. S-MAP ๊ฒ€์ถœ์˜ ๊ณ„์‚ฐ ๋ณต์žก์„ฑ์„ ์ค„์ด๊ธฐ ์œ„ํ•ด ํฌ์†Œ์„ฑ์„ ๊ณ ๋ คํ•œ ์ˆœ์ฐจ์  ๊ฐ„์„ญ ์ œ๊ฑฐ(sparsity-aware successive interference cancellation, SA-SIC)๋ฅผ ์‚ฌ์šฉํ•  ์ˆ˜ ์žˆ๋‹ค. ํฌ์†Œ ๋ฐ์ดํ„ฐ ๋ฒกํ„ฐ ๊ฒ€์ถœ์˜ ๊ณ„์‚ฐ ๋ณต์žก์„ฑ์„ ์ค„์ด๊ธฐ ์œ„ํ•ด ์‚ฌ์šฉ๋˜๋Š” ํฌ์†Œ์„ฑ ๊ณ ๋ ค ์—ฐ์† ๊ฐ„์„ญ ์ œ๊ฑฐ ๊ธฐ์ˆ ์€ ์˜ค๋ฅ˜ ์ „ํŒŒ(error propagation)๋กœ ์ธํ•ด ์ ์ ˆํ•œ ์‚ฌ์šฉ์ž ์ •๋ ฌ ์—†์ด๋Š” ์„ฑ๋Šฅ์ด ์ข‹์ง€ ์•Š๋‹ค. ๋‹ค์ค‘ ์‚ฌ์šฉ์ž ๋ฒกํ„ฐ๊ฐ€ ํฌ์†Œ ๋ฒกํ„ฐ์ด๊ณ  ๊ฐ ๊ธฐ๊ธฐ๊ฐ€ ๋‹ค๋ฅธ ํ™•๋ฅ ๋กœ ํ™œ์„ฑ์ผ ๊ฒฝ์šฐ ์ฑ„๋„ ์ด๋“(channel gain)์— ์˜ํ•ด์„œ๋งŒ ๊ฒฐ์ •๋œ ์‚ฌ์šฉ์ž ๊ฒ€์ถœ ์ˆœ์„œ๋Š” ์ตœ์ ์ด ์•„๋‹ ์ˆ˜ ์žˆ๋‹ค. ๋ณธ ๋…ผ๋ฌธ์—์„œ๋Š”, ์˜ค๋ฅ˜ ์ „ํŒŒ๋ฅผ ์ค„์ด๊ณ  ํฌ์†Œ์„ฑ ๊ณ ๋ ค ์—ฐ์† ๊ฐ„์„ญ ์ œ๊ฑฐ์˜ ์„ฑ๋Šฅ์„ ํ–ฅ์ƒํ•˜๊ธฐ ์œ„ํ•ด ๊ฐ ์‚ฌ๋ฌผ ๊ธฐ๊ธฐ์˜ ํ™œ์„ฑ ํ™•๋ฅ (activity probability)๊ณผ ์ฑ„๋„ ์ด๋“์„ ๊ธฐ๋ฐ˜์œผ๋กœ ์ตœ์ ์˜ ๊ฒ€์ถœ ์ˆœ์„œ๋ฅผ ์ฐพ๋Š” ์ƒˆ๋กœ์šด ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ์ œ์•ˆํ•œ๋‹ค. ์‹œ๋ฎฌ๋ ˆ์ด์…˜์„ ํ†ตํ•ด ์ œ์•ˆํ•œ ๊ฒ€์ถœ ์ˆœ์„œ ์ •๋ ฌ ๊ธฐ์ˆ ์€ ๋ฐ์ดํ„ฐ ๊ฒ€์ถœ์˜ ์„ฑ๋Šฅ์„ ํฌ๊ฒŒ ํ–ฅ์ƒํ•จ์„ ๊ฒ€์ฆํ•˜์˜€๋‹ค. ๋…ผ๋ฌธ์˜ ๋‘ ๋ฒˆ์งธ ๋ถ€๋ถ„์—์„œ๋Š”, ๊ธฐ๋Œ“๊ฐ’ ์ „ํŒŒ ๊ธฐ๋ฐ˜ ํ™œ์„ฑ ์‚ฌ์šฉ์ž ๊ฒ€์ถœ ๋ฐ ์ฑ„๋„ ์ถ”์ •(expectation propagation based active user detection channel estimation, EP-AUD/CE) ๊ธฐ์ˆ ์„ ์ œ์•ˆํ•œ๋‹ค. CS-MUD์— ๊ด€ํ•œ ๋ช‡๋ช‡ ์—ฐ๊ตฌ์—์„œ, ๊ฐ ์‚ฌ๋ฌผ ๊ธฐ๊ธฐ๋กœ๋ถ€ํ„ฐ ๊ธฐ์ง€๊ตญ(base station, BS)์œผ๋กœ์˜ ์ƒํ–ฅ๋งํฌ ์ฑ„๋„ ์ƒํƒœ ์ •๋ณด(channel state information, CSI)๋Š” ๊ธฐ์ง€๊ตญ์— ์™„์ „ํžˆ ์•Œ๋ ค์ ธ ์žˆ๋‹ค๊ณ  ๊ฐ€์ •๋œ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ์‹ค์ œ๋กœ๋Š”, ๋ฐ์ดํ„ฐ ๊ฒ€์ถœ ์ „์— ๊ฐ ๊ธฐ๊ธฐ๋กœ๋ถ€ํ„ฐ ๊ธฐ์ง€๊ตญ์œผ๋กœ์˜ ์ƒํ–ฅ๋งํฌ ์ฑ„๋„ ์ƒํƒœ ์ •๋ณด๋ฅผ ์ถ”์ •ํ•ด์•ผ ํ•œ๋‹ค. ์ด ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•˜๊ธฐ ์œ„ํ•ด ๋‹ค์–‘ํ•œ ํ™œ์„ฑ ์‚ฌ์šฉ์ž ๊ฒ€์ถœ(active user detection, AUD) ๋ฐ ์ฑ„๋„ ์ถ”์ •(channel estimation, CE) ๊ธฐ์ˆ ์ด ์ œ์•ˆ๋˜์—ˆ๋‹ค. ๋Œ€๊ทœ๋ชจ ์‚ฌ๋ฌผ ํ†ต์‹ ์—์„œ๋Š” ํ•˜๋‚˜์˜ ํƒ€์ž„ ์Šฌ๋กฏ์— ์ ์€ ์ˆ˜์˜ ์žฅ์น˜๋งŒ ํ™œ์„ฑํ™”๋˜๊ธฐ ๋•Œ๋ฌธ์— ์ด์ง„(binary)๊ฐ’์œผ๋กœ ์ด๋ฃจ์–ด์ง„ ํ™œ์„ฑ ์—ฌ๋ถ€ ๋ฒกํ„ฐ์™€ ์ฑ„๋„ ๋ฒกํ„ฐ์˜ ๊ณฑ์€ ํฌ์†Œ ๋ฒกํ„ฐ๊ฐ€ ๋˜์–ด ์••์ถ•์„ผ์‹ฑ ์•Œ๊ณ ๋ฆฌ์ฆ˜์œผ๋กœ ๋ณต์›์ด ๊ฐ€๋Šฅํ•˜๋‹ค. ํ•˜์ง€๋งŒ, ์ด๋Ÿฌํ•œ ์—ฐ๊ตฌ๋“ค์˜ ๋‹จ์  ์ค‘ ํ•˜๋‚˜๋Š” ํฌ์†Œ ๋ฒกํ„ฐ์˜ ์‚ฌ์ „ ๋ถ„ํฌ(prior distritubion)๊ฐ€ ํ™œ์šฉ๋˜์ง€ ์•Š๋Š”๋‹ค๋Š” ๊ฒƒ์ด๋‹ค. ํฌ์†Œ ๋ฒกํ„ฐ์˜ ํ†ต๊ณ„์  ์‚ฌ์ „ ๋ถ„ํฌ๋ฅผ ์ด์šฉํ•˜๋ฉด ํ™œ์„ฑ ์‚ฌ์šฉ์ž ๊ฒ€์ถœ ๋ฐ ์ฑ„๋„ ์ถ”์ •์˜ ์„ฑ๋Šฅ์„ ํฌ๊ฒŒ ํ–ฅ์ƒํ•  ์ˆ˜ ์žˆ๋‹ค. ๋ณธ ํ•™์œ„ ๋…ผ๋ฌธ์—์„œ๋Š”, ๊ธฐ๋Œ“๊ฐ’ ์ „ํŒŒ(expectation propagation, EP) ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ์ด์šฉํ•ด ํฌ์†Œ ์ฑ„๋„ ๋ฒกํ„ฐ์˜ ์‚ฌํ›„ ๋ถ„ํฌ(posterior distribution)์˜ ๊ทผ์‚ฌ ๋ถ„ํฌ๋ฅผ ์ฐพ๊ณ , ํ•ด๋‹น ๊ทผ์‚ฌ ๋ถ„ํฌ๋ฅผ ์ด์šฉํ•˜์—ฌ ํ™œ์„ฑ ์‚ฌ์šฉ์ž ๊ฒ€์ถœ๊ณผ ์ฑ„๋„ ์ถ”์ •์„ ๋™์‹œ์— ์ˆ˜ํ–‰ํ•˜๋Š” ๊ธฐ์ˆ ์„ ์ œ์•ˆํ•œ๋‹ค. ์‹œ๋ฎฌ๋ ˆ์ด์…˜์„ ํ†ตํ•ด ์ œ์•ˆํ•œ ์‚ฌ์šฉ์ž ๊ฒ€์ถœ ๋ฐ ์ฑ„๋„ ์ถ”์ • ๊ธฐ์ˆ ์€ ํ™œ์„ฑ ์‚ฌ์šฉ์ž ๊ฒ€์ถœ ๋ฐ ์ฑ„๋„ ์ถ”์ •์˜ ์„ฑ๋Šฅ์„ ์ƒ๋‹นํžˆ ํ–ฅ์ƒํ•จ์„ ๊ฒ€์ฆํ•˜์˜€๋‹ค.1 Introduction . . . . . 1 1.1 Sparsity-Aware Ordered Successive Interference Cancellation . . . . . 3 1.2 Expectation Propagation-based Joint Active User Detection and Channel Estimation . . . . . 4 2 Sparsity-Aware Ordered Successive Interference Cancellation . . . . . 7 2.1 System model . . . . . 7 2.2 Sparsity-Aware Successive Interference Cancellation (SA-SIC) . . . . . 9 2.2.1 Derivation of S-MAP Detection . . . . . 9 2.2.2 Sparsity-Aware SIC (SA-SIC) Detection . . . . . 10 2.3 Proposed Activity-Aware Sorted-QRD (A-SQRD) Algorithm . . . . . 11 2.4 Complexity Analysis . . . . . 15 2.5 Numerical Results . . . . . 15 2.5.1 Simulation Setup . . . . . 16 2.5.2 Simulation Results . . . . . 20 3 Expectation Propagation-based Joint Active User Detection and Channel Estimation . . . . . 21 3.1 System model . . . . . 21 3.2 Joint Active User Detection and Channel Estimation . . . . . 23 3.3 EP-Based Active User Detection and Channel Estimation . . . . . 26 3.3.1 A Brief Review of Expectation Propagation . . . . . 29 3.3.2 Form of the Approximation . . . . . 30 3.3.3 Iterative EP Update Rules . . . . . 31 3.3.4 Active User Detection and Channel Estimation . . . . . 36 3.3.5 Data Detection . . . . . 37 3.3.6 Comments on Complexity . . . . . 38 3.4 Simulation Results and Discussions . . . . . 39 3.4.1 Simulation Setup . . . . . 39 3.4.2 Simulation Results . . . . . 52 4 Conclusion . . . . . 54 Abstract (In Korean) . . . . . 60Docto

    Massive MIMO for Internet of Things (IoT) Connectivity

    Full text link
    Massive MIMO is considered to be one of the key technologies in the emerging 5G systems, but also a concept applicable to other wireless systems. Exploiting the large number of degrees of freedom (DoFs) of massive MIMO essential for achieving high spectral efficiency, high data rates and extreme spatial multiplexing of densely distributed users. On the one hand, the benefits of applying massive MIMO for broadband communication are well known and there has been a large body of research on designing communication schemes to support high rates. On the other hand, using massive MIMO for Internet-of-Things (IoT) is still a developing topic, as IoT connectivity has requirements and constraints that are significantly different from the broadband connections. In this paper we investigate the applicability of massive MIMO to IoT connectivity. Specifically, we treat the two generic types of IoT connections envisioned in 5G: massive machine-type communication (mMTC) and ultra-reliable low-latency communication (URLLC). This paper fills this important gap by identifying the opportunities and challenges in exploiting massive MIMO for IoT connectivity. We provide insights into the trade-offs that emerge when massive MIMO is applied to mMTC or URLLC and present a number of suitable communication schemes. The discussion continues to the questions of network slicing of the wireless resources and the use of massive MIMO to simultaneously support IoT connections with very heterogeneous requirements. The main conclusion is that massive MIMO can bring benefits to the scenarios with IoT connectivity, but it requires tight integration of the physical-layer techniques with the protocol design.Comment: Submitted for publicatio

    Sparse Message Passing Based Preamble Estimation for Crowded M2M Communications

    Full text link
    Due to the massive number of devices in the M2M communication era, new challenges have been brought to the existing random-access (RA) mechanism, such as severe preamble collisions and resource block (RB) wastes. To address these problems, a novel sparse message passing (SMP) algorithm is proposed, based on a factor graph on which Bernoulli messages are updated. The SMP enables an accurate estimation on the activity of the devices and the identity of the preamble chosen by each active device. Aided by the estimation, the RB efficiency for the uplink data transmission can be improved, especially among the collided devices. In addition, an analytical tool is derived to analyze the iterative evolution and convergence of the SMP algorithm. Finally, numerical simulations are provided to verify the validity of our analytical results and the significant improvement of the proposed SMP on estimation error rate even when preamble collision occurs.Comment: submitted to ICC 2018 with 6 pages and 4 figure

    Thirty Years of Machine Learning: The Road to Pareto-Optimal Wireless Networks

    Full text link
    Future wireless networks have a substantial potential in terms of supporting a broad range of complex compelling applications both in military and civilian fields, where the users are able to enjoy high-rate, low-latency, low-cost and reliable information services. Achieving this ambitious goal requires new radio techniques for adaptive learning and intelligent decision making because of the complex heterogeneous nature of the network structures and wireless services. Machine learning (ML) algorithms have great success in supporting big data analytics, efficient parameter estimation and interactive decision making. Hence, in this article, we review the thirty-year history of ML by elaborating on supervised learning, unsupervised learning, reinforcement learning and deep learning. Furthermore, we investigate their employment in the compelling applications of wireless networks, including heterogeneous networks (HetNets), cognitive radios (CR), Internet of things (IoT), machine to machine networks (M2M), and so on. This article aims for assisting the readers in clarifying the motivation and methodology of the various ML algorithms, so as to invoke them for hitherto unexplored services as well as scenarios of future wireless networks.Comment: 46 pages, 22 fig

    Grant-Free Massive MTC-Enabled Massive MIMO: A Compressive Sensing Approach

    Full text link
    A key challenge of massive MTC (mMTC), is the joint detection of device activity and decoding of data. The sparse characteristics of mMTC makes compressed sensing (CS) approaches a promising solution to the device detection problem. However, utilizing CS-based approaches for device detection along with channel estimation, and using the acquired estimates for coherent data transmission is suboptimal, especially when the goal is to convey only a few bits of data. First, we focus on the coherent transmission and demonstrate that it is possible to obtain more accurate channel state information by combining conventional estimators with CS-based techniques. Moreover, we illustrate that even simple power control techniques can enhance the device detection performance in mMTC setups. Second, we devise a new non-coherent transmission scheme for mMTC and specifically for grant-free random access. We design an algorithm that jointly detects device activity along with embedded information bits. The approach leverages elements from the approximate message passing (AMP) algorithm, and exploits the structured sparsity introduced by the non-coherent transmission scheme. Our analysis reveals that the proposed approach has superior performance compared to application of the original AMP approach.Comment: Submitted to IEEE Transactions on Communication

    A Random Access Protocol for Pilot Allocation in Crowded Massive MIMO Systems

    Full text link
    The Massive MIMO (multiple-input multiple-output) technology has great potential to manage the rapid growth of wireless data traffic. Massive MIMO achieves tremendous spectral efficiency by spatial multiplexing of many tens of user equipments (UEs). These gains are only achieved in practice if many more UEs can connect efficiently to the network than today. As the number of UEs increases, while each UE intermittently accesses the network, the random access functionality becomes essential to share the limited number of pilots among the UEs. In this paper, we revisit the random access problem in the Massive MIMO context and develop a reengineered protocol, termed strongest-user collision resolution (SUCRe). An accessing UE asks for a dedicated pilot by sending an uncoordinated random access pilot, with a risk that other UEs send the same pilot. The favorable propagation of Massive MIMO channels is utilized to enable distributed collision detection at each UE, thereby determining the strength of the contenders' signals and deciding to repeat the pilot if the UE judges that its signal at the receiver is the strongest. The SUCRe protocol resolves the vast majority of all pilot collisions in crowded urban scenarios and continues to admit UEs efficiently in overloaded networks.Comment: To appear in IEEE Transactions on Wireless Communications, 16 pages, 10 figures. This is reproducible research with simulation code available at https://github.com/emilbjornson/sucre-protoco
    • โ€ฆ
    corecore