Random Access Schemes in Wireless Systems With Correlated User Activity

03/09/2018
by   Anders Ellersgaard Kalør, et al.
0

Traditional random access schemes are designed based on the aggregate process of user activation, which is created on the basis of independent activations of the users. However, in Machine-Type Communications (MTC), some users are likely to exhibit a high degree of correlation, e.g. because they observe the same physical phenomenon. This paves the way to devise access schemes that combine scheduling and random access, which is the topic of this work. The underlying idea is to schedule highly correlated users in such a way that their transmissions are less likely to result in a collision. To this end, we propose two greedy allocation algorithms. Both attempt to maximize the throughput using only pairwise correlations, but they rely on different assumptions about the higher-order dependencies. We show that both algorithms achieve higher throughput compared to the traditional random access schemes, suggesting that user correlation can be utilized effectively in access protocols for MTC.

READ FULL TEXT

Authors

page 1

page 2

page 3

page 4

10/11/2019

Throughput of CDM-based Random Access With SINR Capture

Code division multiplexing (CDM)-based random access is used in many pra...
01/24/2022

Deep Reinforcement Learning for Random Access in Machine-Type Communication

Random access (RA) schemes are a topic of high interest in machine-type ...
06/10/2019

Random Access for Massive Machine-Type Communications

The thesis is dedicated to studying methods to improve the efficiency of...
09/17/2021

Coordinated Random Access for Industrial IoT With Correlated Traffic By Reinforcement-Learning

We propose a coordinated random access scheme for industrial internet-of...
03/27/2021

Reinforcement Learning Random Access for Delay-Constrained Heterogeneous Wireless Networks: A Two-User Case

In this paper, we investigate the random access problem for a delay-cons...
04/21/2021

How to Identify and Authenticate Users in Massive Unsourced Random Access

Identification and authentication are two basic functionalities of tradi...
12/04/2017

On the Effect of Shadowing Correlation on Wireless Network Performance

We propose and analyze a new shadowing field model meant to capture spat...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.