2017
DOI: 10.1002/itl2.3
|View full text |Cite
|
Sign up to set email alerts
|

A look at random access for machine‐type communications in 5th generation cellular networks

Abstract: Machine-type communications represent a major challenge for the upcoming 5th generation (5G) technology. Future cellular systems, in fact, will be in charge of supporting a huge number of devices generating sporadic small packets at random times. In this context, the random access channel (RACH) protocol is generally used to initiate the communication sessions, aimed at delivering this kind of traffic. But, occasional peaks of requests, generated when many devices react to the same event, may severely degrade … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…Other studies in [ 27 , 28 ] considered an information redundancy approach in which RA response (RAR) messages are redundantly sent to users to reduce the collision rate and hence support an envisioned a large number of users. In the legacy system, if more than one user gets the same preamble, they collide or one of them obtains a RAR response.…”
Section: Ai and Recent Ra Enhancements In Literaturementioning
confidence: 99%
“…Other studies in [ 27 , 28 ] considered an information redundancy approach in which RA response (RAR) messages are redundantly sent to users to reduce the collision rate and hence support an envisioned a large number of users. In the legacy system, if more than one user gets the same preamble, they collide or one of them obtains a RAR response.…”
Section: Ai and Recent Ra Enhancements In Literaturementioning
confidence: 99%
“…The conclusions of most of these studies point out that for Machine-Type Communications (MTC) applications, the Random Access procedure can drastically limit network performance. Possible approaches to modify the PRACH access procedure have been proposed in [20,21,22].…”
Section: Related Workmentioning
confidence: 99%