2015
DOI: 10.1109/twc.2014.2377121
|View full text |Cite
|
Sign up to set email alerts
|

Modeling and Analysis of Random Access Channels With Bursty Arrivals in OFDMA Wireless Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

6
99
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
3
2
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 99 publications
(105 citation statements)
references
References 12 publications
6
99
0
Order By: Relevance
“…As analyzed in other studies [5,6,8,12] (or, the conventional case in shown Figure 6), the RA throughput is maximized when the number of accesses is same as the preamble size, i.e., n = V. However, if the Msg3 PR is used, the number of throughput-maximizing arrivals increases significantly. This result further demonstrates that, because of the capture effect on the RA procedure, optimization is needed if diverse RACH congestion-control schemes, such as ACB or M2M-specific back-off, are used.…”
Section: The Consequences Of the Capture Effect And Its Propertiesmentioning
confidence: 72%
See 1 more Smart Citation
“…As analyzed in other studies [5,6,8,12] (or, the conventional case in shown Figure 6), the RA throughput is maximized when the number of accesses is same as the preamble size, i.e., n = V. However, if the Msg3 PR is used, the number of throughput-maximizing arrivals increases significantly. This result further demonstrates that, because of the capture effect on the RA procedure, optimization is needed if diverse RACH congestion-control schemes, such as ACB or M2M-specific back-off, are used.…”
Section: The Consequences Of the Capture Effect And Its Propertiesmentioning
confidence: 72%
“…We formulated analysis models of the RA procedure considering the capture effect. Previous studies [4][5][6][12][13][14] adopted the collision model to analyze the RA procedure and assumed that the RA performance degradation due to the collisions of the preambles (Msg 1) could not be prevented. However, we provide an RA analysis model that considers the capture effect.…”
mentioning
confidence: 99%
“…The assumption that business models follow homogeneous Poisson or Bernoulli process is difficult to extend to application scenes of NBIoT. In combination with 3GPP beta type business model, approximate form of PDF for random access latency, is given in [34] by estimating the maximum retransmission times for terminals with successful access through mean value of latency. In [35], the lower bound for random access latency is deduced through approximate beta distribution of piecewise linear function, but the effect of maximum retransmission times is not taken into consideration.…”
Section: Related Workmentioning
confidence: 99%
“…In this section, we describe our model for sLTE-U connection establishment, which is based on the works of Bianchi [18] and Wei et. al [19]. In III-A, we explain the Markov chain model for the Wi-Fi/sLTE-U contention, and in III-B, we outline the performance model of preamble contention on RACH.…”
Section: System Modelmentioning
confidence: 99%
“…To analyze the performance of preamble contention, we apply a simplified drift approximation model proposed by Wei et al [19]. We consider discrete time divided into PRACH slots.…”
Section: Preamble Contention Modelmentioning
confidence: 99%