Random Access Schemes in Wireless Systems With Correlated User Activity

Traditional random access schemes are designed based on the aggregate process of user activation, which is created on the basis of independent activations of the users. However, in Machine-Type Communications (MTC), some users are likely to exhibit a high degree of correlation, e.g. because they observe the same physical phenomenon. This paves the way to devise access schemes that combine scheduling and random access, which is the topic of this work. The underlying idea is to schedule highly correlated users in such a way that their transmissions are less likely to result in a collision. To this end, we propose two greedy allocation algorithms. Both attempt to maximize the throughput using only pairwise correlations, but they rely on different assumptions about the higher-order dependencies. We show that both algorithms achieve higher throughput compared to the traditional random access schemes, suggesting that user correlation can be utilized effectively in access protocols for MTC.


page 1

page 2

page 3

page 4


Minimum-Latency Scheduling For Partial-Information Multiple Access Schemes

Partial-information multiple access (PIMA) is an orthogonal multiple acc...

Throughput of CDM-based Random Access With SINR Capture

Code division multiplexing (CDM)-based random access is used in many pra...

Deep Reinforcement Learning for Random Access in Machine-Type Communication

Random access (RA) schemes are a topic of high interest in machine-type ...

Activity Detection in Distributed Massive MIMO With Pilot-Hopping and Activity Correlation

Many real-world scenarios for massive machine-type communication involve...

Coordinated Random Access for Industrial IoT With Correlated Traffic By Reinforcement-Learning

We propose a coordinated random access scheme for industrial internet-of...

Reinforcement Learning Random Access for Delay-Constrained Heterogeneous Wireless Networks: A Two-User Case

In this paper, we investigate the random access problem for a delay-cons...

On the Effect of Shadowing Correlation on Wireless Network Performance

We propose and analyze a new shadowing field model meant to capture spat...

Please sign up or login with your details

Forgot password? Click here to reset