Code-expanded radio access protocol for machine-to-machine communications

Henning Thomsen, Nuno Kiilerich Pratas, Cedomir Stefanovic, Petar Popovski

Research output: Contribution to journalConference article in JournalResearchpeer-review

40 Citations (Scopus)

Abstract

The random access methods used for support of machine-to-machine, also referred to as Machine-Type Communications, in current cellular standards are derivatives of traditional framed slotted ALOHA and therefore do not support high user loads efficiently. We propose an approach that is motivated by the random access method employed in LTE, which significantly increases the amount of contention resources without increasing the system resources, such as contention subframes and preambles. This is accomplished by a logical, rather than physical, extension of the access method in which the available system resources are interpreted in a novel manner. Specifically, in the proposed scheme, users perform random access by transmitting orthogonal preambles in multiple random access subframes, in this way creating access codewords that are used for contention. We show that, for the same number of random access subframes and orthogonal preambles, the amount of available contention resources is drastically increased, enabling the massive support of Machine-Type Communication users that is beyond the reach of current systems.
Original languageEnglish
JournalTransactions on Emerging Telecommunications Technologies
Volume24
Issue number4
Pages (from-to)355-365
Number of pages11
ISSN2161-3915
DOIs
Publication statusPublished - Jun 2013
EventIEEE Globecom 2012: Globecom Communications Conference - Disneyland Hotel, Anaheim, California, United States
Duration: 3 Dec 20127 Dec 2012

Conference

ConferenceIEEE Globecom 2012
LocationDisneyland Hotel
Country/TerritoryUnited States
CityAnaheim, California
Period03/12/201207/12/2012

Fingerprint

Dive into the research topics of 'Code-expanded radio access protocol for machine-to-machine communications'. Together they form a unique fingerprint.

Cite this