2018
DOI: 10.1109/tvt.2018.2793101
|View full text |Cite
|
Sign up to set email alerts
|

Collision-Aware Resource Access Scheme for LTE-Based Machine-to-Machine Communications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(19 citation statements)
references
References 6 publications
0
19
0
Order By: Relevance
“…On the other hand, for the highly loaded networks, this issue is expected since (7) actually does not satisfy the assumption µ > λ of M/M/1 models. In order to prevent the case where W est j < 0, we are not able to increase the system resources but we may revise (9) as…”
Section: B Estimation Of S Jmentioning
confidence: 99%
See 1 more Smart Citation
“…On the other hand, for the highly loaded networks, this issue is expected since (7) actually does not satisfy the assumption µ > λ of M/M/1 models. In order to prevent the case where W est j < 0, we are not able to increase the system resources but we may revise (9) as…”
Section: B Estimation Of S Jmentioning
confidence: 99%
“…The Massive Access Problem has been addressed with reactive techniques [8], [9], [10], [11], [12], [13], [14], [15], [16], [3], [17], [18], [19], [20], [21], [22], [7], [23] for IoT traffic that is generated in a random fashion. On the other hand, some work [24] has shown that IoT traffic at the MAC-layer can be predicted with acceptable accuracy via certain machine-learning models for distinct IoT traffic classes.…”
Section: Introductionmentioning
confidence: 99%
“…For example, the preamble shortage is addressed either by increasing the number of available preambles [8] or by preamble reusing [9]. Early preamble collision detection schemes were proposed to avoid RB wastage [10], [11]. The early collision detection [10] is performed based on tagged preambles which is also exploited to monitor the RA load.…”
Section: B Related Workmentioning
confidence: 99%
“…MAP was addressed in early research [10]- [12] through adaptive routing to reduce congestion in networks with multiple paths and gateways, and via information theoretic techniques to reduce the amount of traffic that is sent [13]. More recent work [7], [8], [14]- [29] commonly assumes that IoT traffic arrives at random, leading to solutions to MAP that include Access Class Barring (ACB) [8], [14], [16], [23]- [26], Cognitive Machine-to-Machine (M2M) communication [17], [19], game theory [18], clustering of devices [20], [27], data rate adaptation [21], Spread-spectrum, Non-Orthogonal Multiple Access (NOMA) [22], Interference Cancellation (SIC) [7], the use of CSMA/CA or slotted-ALOHA [15], [28] and collision awareness [29]. Other work [30]- [35] has suggested proactive network solutions for MAP, which can include techniques such as adaptive traffic ofloading to storage areas or less congested gateways [36].…”
Section: Introductionmentioning
confidence: 99%