2014
DOI: 10.1007/978-3-319-10353-2_26
|View full text |Cite
|
Sign up to set email alerts
|

Modelling a Random Access Channel with Collisions for M2M Traffic in LTE Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
7
0
3

Year Published

2016
2016
2021
2021

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(10 citation statements)
references
References 12 publications
0
7
0
3
Order By: Relevance
“…Msg. 2 from the e-NodeB within the time interval called a response window [3], i.e., if more than one MS use the same preamble for Msg. 1 and a collision occurs; the e-NodeB will detect this event and will not send reply to UE.…”
Section: Random Access Proceduresmentioning
confidence: 99%
See 1 more Smart Citation
“…Msg. 2 from the e-NodeB within the time interval called a response window [3], i.e., if more than one MS use the same preamble for Msg. 1 and a collision occurs; the e-NodeB will detect this event and will not send reply to UE.…”
Section: Random Access Proceduresmentioning
confidence: 99%
“…The finance approach is an important factor to increasing LTE network performance which is a problem facing the network planners. Random Access Procedure (RACH) is a possible solution for this problem [3].…”
mentioning
confidence: 99%
“…Making a number of simplifying assumptions for the RACH procedure, we introduce below the basic notation and build a mathematical model in the form of a discrete Markov chain according to [19]. The time interval between the first RA attempt and the completion of the random access procedure is called an access delay [7].…”
Section: Random Access Procedure Model Notation and Assumptionsmentioning
confidence: 99%
“…In the case of high network traffic access delay increases significantly, and this can be critical in various emergency situations [7]. Some other features of M2 M traffic transmission were considered in [10][11][12][13][14][15][16][17][18][19] taking into account problems of optimal radio resources allocation [11][12][13][14][15], overload control mechanisms based on Access Class Barring (ACB) schemes [10,14] and other congestion control problems [16,17].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation