2019
DOI: 10.1109/lwc.2018.2886892
|View full text |Cite
|
Sign up to set email alerts
|

On the Resource Consumption of M2M Random Access: Efficiency and Pareto Optimality

Abstract: The advent of Machine-to-Machine communication has sparked a new wave of interest to random access protocols, especially in application to LTE Random Access (RA). By analogy with classical slotted ALOHA, state-of-the-art models LTE RA as a multi-channel slotted ALOHA. In this letter, we direct the attention to the resource consumption of RA. We show that the consumption is a random variable dependent on the contention parameters. We consider two approaches to include the consumption into RA optimization: by de… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
17
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 8 publications
(17 citation statements)
references
References 8 publications
0
17
0
Order By: Relevance
“…For IIoT applications, reliability and delay play an important role, therefore, choosing reliability as an objective can increase the application performance at the cost of extra resources. The trade-off between performance and resource consumption should also be studied as a multi-objective optimization [19].…”
Section: Conclusion and Discussionmentioning
confidence: 99%
“…For IIoT applications, reliability and delay play an important role, therefore, choosing reliability as an objective can increase the application performance at the cost of extra resources. The trade-off between performance and resource consumption should also be studied as a multi-objective optimization [19].…”
Section: Conclusion and Discussionmentioning
confidence: 99%
“…In [8]- [18], the authors consider the random access procedure and study the effect of preamble selection under certain assumptions on the knowledge of device activities. Specifically, [8]- [10], [13], [16]- [18] assume that the number of active devices is known; [14], [15] assume that the distribution of the number of active devices is known; [11], [12] assume that the statistics of the data queue of each device are known. In [8]- [18], preambles are selected according to a uniform distribution, the average throughput [8]- [18], average access efficiency [16] and resource consumption [10] are analyzed, and the number of allocated preambles is optimized to maximize the average throughput [10], [17] or access efficiency [16].…”
Section: Introductionmentioning
confidence: 99%
“…In [2]- [9], the authors consider the random access procedure and study the effect of preamble selection under certain assumptions on the knowledge of device activities. Specifically, [2]- [4], [6], [8], [9] assume that the number of active devices is known; [7] assume that the distribution of the number of active devices is known; [5] assume that the statistics of the data queue of each device are known. In [2]- [9], preambles are selected according to a uniform distribution, and the average throughput [2]- [9], average access delay [8] and resource consumption [4] are analyzed.…”
mentioning
confidence: 99%
“…Specifically, [2]- [4], [6], [8], [9] assume that the number of active devices is known; [7] assume that the distribution of the number of active devices is known; [5] assume that the statistics of the data queue of each device are known. In [2]- [9], preambles are selected according to a uniform distribution, and the average throughput [2]- [9], average access delay [8] and resource consumption [4] are analyzed. Assuming that all devices have the same preamble selection distribution, the authors in [4], [8], [9] optimize the number of allocated preambles to maximize the average throughput [4], [9] or access efficiency [8].…”
mentioning
confidence: 99%
See 1 more Smart Citation