1. Introduction
The rapid evolution of the wireless communication technologies are inviting all human beings to the era of the Internet of Everything [1]. The future IoT system is required to guarantee diverse requirements for various applications, such as huge bandwidth, low latency, high reliability, etc. [2,3]. As a result, huge amount of IoT devices need to access to the wireless networks to exchange data, which brings new challenge to the wireless network design [4]. Specifically, convention network scheduling mechanism is mainly designed for human to human communications that cannot sustain a large amount of simultaneous random access requests, since the preamble resources are quite limited. How to support massive random access for IoT devices consequently becomes a critical issue to realize the future Internet of Everything [5,6].
In general, existing research focuses on how to optimize the high-layer performance of an IoT system through resource allocations [7,8,9,10,11,12]. Such performance metrics include throughput, latency, access capacity, etc. The resource allocation schemes, however, can be realized only if the devices can be access to the IoT system. Hence, random access guarantee is one of the key issues to support massive devices to send data at the same time. Typically, more RA-attempting devices may lead to heavier load and more preamble collisions, which degrades the performance of an IoT system. Thus, it is necessary to design new preamble structure and RA scheme to reduce the congestion for the physical random access channel (PRACH). In the literature, the idea of performance improvement on PRACH can be generalized into three categories, i.e., resource increasing [13], user scheduling [14], and resource reusing [15]. In fact, resource increasing is costly and impractical, since the total resource of an IoT system is usually limited. In addition, preamble collision probability cannot be reduced through user scheduling since the number of preambles in an IoT system is finite. Differently, the idea of resource reusing can allow multiple devices to send identical preambles on the same PRACH, which is applicable to the massive access scenario. However, how to design a preamble structure and an RA scheme to efficiently reuse the PRACH resources for a massive access IoT system is still an open problem.
Motivated by this, this paper proposes an effective preamble collision resolution scheme to sustain massive random access for an IoT system. A new preamble structure consisting of the shared sub-preamble and the dedicated sub-preamble is first designed. Based on the new designed preamble, a TA capturing scheme is then proposed to identify multiple devices that send identical sub-preambles to the gBN on the same PRACH. Thereafter, we propose a random access scheme to reduce the preamble collision probability. Furthermore, we prove analytically that the proposed RA scheme can guarantee better performance than the conventional one proposed by the 3GPP. In addition, the effectiveness of the proposed scheme is validated by the extensive simulations. The contributions of this paper can be summarized as follows.
- A new preamble structure is designed, where preamble diversity and location diversity are both acquired. The designed preamble is able to guarantee a much lower preamble collision probability than the conventional preamble designed by 3GPP with ignorable detection impairment.
- A multiple TA capturing scheme is proposed based on the designed preamble. With the idea that the sub-preambles sent by a device suffer from the same channel environment, the TA value of each device can be captured, which can be further used to device identification.
- A new random access scheme is proposed and studied analytically. It is verified that the proposed scheme outperforms the conventional scheme in terms of preamble collision probability, RA success probability, etc. Hence, the proposed scheme is more applicable to the IoT systems where massive access is requested.
The remaining of this paper is organized as follows. Section 2 introduces the related works. Section 3 introduces new preamble sequence design. In Section 4, the preamble collision resolution scheme based on the proposed preamble structure is studied. In Section 5, the advantage of the proposed random access scheme is analyzed. Simulation results are presented and discussed in Section 6. Finally, the paper is concluded in Section 7.
2. Related Work In the literature, performance improvement for massive access IoT systems is usually carried out from two aspects, i.e., cross-layer resource optimization and physical layer design.
On cross-layer resource optimization, researchers usually focused on performance optimization in terms of throughput, latency, and capacity. In [7], a throughput-oriented non-orthogonal random access (NORA) scheme was proposed to improve the access throughput for IoT networks by employing the technique of tagged preambles. With this, multiple devices shared the same physical uplink shared channel (PUSCH) for transmissions by multiplexing in the power domain. Wu et al. proposed a hybrid NORA and data transmission scheme to address the signalling overhead and resource allocation problems of IoT with non-orthogonal multiple access [8]. A relaying threshold-based random access and data transmission scheme for grouped IoT networks was proposed in [9]. Except for throughput optimization in [7,8,9], Chen et al. proposed an access class barring mechanism to accommodate heterogeneous IoT devices with different quality of service (QoS) requirements based on deep reinforcement learning algorithm in [10]. Additionally, a multi-slot pilot allocation scheme with unequal access latency protection for user equipments (UEs) was studied in [11]. The two solutions proposed in [10,11] devoted to reduce the latency in IoT networks. Moreover, in [12], the receiver is designed for the uplink transmission of a massive MIMO system to improve network access gain, where human-type communications and IoT communications coexisted.
On physical layer design, researchers usually focus on collision resolution. In [16], the multivariate Bernoulli model which exhibited the distributions of pilot states was proposed. With this, general correlation among device activities and relationship among the states of pilots assigned to one device could be specified. He et al. proposed a protocol which implemented multi-user detection and channel estimation by compressed sensing technology [17]. This protocol ensured that multiple collided packets could be recovered in one single time slot with low signaling overhead. The estimation of round-trip delays of multiple signals in NORA based on the maximum likelihood criterion was studied to assist the detection of collision in an IoT network [18]. Additionally, a contention control method that regulated the number of devices competing simultaneously for the RA channel was studied in a distributed manner [19]. Moreover, an RA scheme was proposed in [20], which introduced virtual preambles and associated them with RA channel indexes to discern multiple low-cost IoT devices. Works [16,17,18,19,20] all devoted to collision probability reduction. However, there was little attention on preamble collision in the physical layer of IoT. Please note that preamble detection is the prime of a successful random access.
Recently, preamble collision resolution was studied under the assumption that the TA values of the IoT devices were fixed [15]. Specifically, the TA value of each device was unique and the colliding devices could be discerned by the gNB. However, as the number of available preambles was finite, the scheme proposed in [15] was not applicable to the massive access scenario. Therefore, how to reduce preamble collision is still a challenge for an IoT system where huge amount of devices request access simultaneously, which motivates this paper.
3. Preamble Design In this section, the conventional contention-based RA procedure and the structure of conventional preamble sequence are first introduced respectively. To address the drawback of conventional preamble sequence, a new sub-preamble sequence design is then proposed. 3.1. Conventional RA Procedure
The RA procedure includes two manners, i.e., contention-based manner and non-contention-based RA manner [21]. Since preamble collisions only occur in contention-based manner, this paper mainly focuses on contention-based manner. As depicted in Figure 1, a conventional RA procedure consists of four steps [22].
- Step-1: A device randomly selects a preamble from the available preamble sequence set, and then transmits the selected preamble on the available PRACH slot. If different devices transmit identical preambles on the same PRACH resources, RA contention will occur.
- Step-2: The gNB sends Random Access Response (RAR) message to the device after it detects a received preamble and captures the corresponding TA value. The RAR message contains the TA command, an uplink resource grant for MSG3 and a temporary cell-radio network temporary identifier (C-RNTI) for the device.
- Step-3: After receiving the RAR message, the device sends MSG3 to the gNB. MSG3 includes Radio Resource Control (RRC) connection request, scheduling request, and temporary C-RNTI. If preamble collision occurs, the gNB will be unable to decode the MSG3 data correctly.
- Step-4: If the gNB decodes the MSG3 successfully, it sends back the contention resolution message including RNTI acquired from the decoded MSG data. If a device receives its own RNTI within corresponding time window, RA procedure is accomplished successfully. Otherwise, the device restarts a new RA procedure.
Zadoff-Chu (ZC) sequences are used as the root sequences of preambles due to its desirable periodic correlation. According to [23], a ZC root sequence with index u is defined as follows.
xu(n)=exp[−jπun(n+1)NZC],0≤n≤NZC−1,
whereNZCdenotes the length of the ZC root sequence. For the nth root ZC sequence, the corresponding preamble with zero correlation zones of lengthNCS−1is defined by cyclic shifts
xu,v(n)=xu((n+Cv)modNZC),
whereNCSandCv are given by [23]. A set of available preambles are generated from one or two root sequences by cyclic shifts.
Then, the received sequence in the gNB can be expressed by
y(n)=∑k=1nk∑e=1nk,ehk,e xk[(n+tk,e)modNZC]+z(n),
wherehk,edenotes the eth multi-path channel coefficient for the kth device,tk,edenotes the delay of the eth multi-path for the kth device,nkdenotes the total number of devices which attempt RAs on the same PRACH,nk,edenotes the amount of multi-path for the kth device, andz(n)denotes the circular symmetry complex Gaussian noise that can be expressed as
z(n)=zr(n)+jzi(n),
wherezr(n)andzi(n)both follow Gaussian distribution.
3.3. Sub-Preamble Sequence Design
To address the drawback of the conventional preamble structure that easily leads to RA collision in a massive connective scenario, this paper proposes a new preamble structure with more diversities to reduce the RA collision probability. Specifically, the new preamble is consists of two sub-preambles and an empty sequence, as depicted in Figure 2. The sub-preambles are known as shared sub-preamble and dedicated sub-preamble respectively. The location of the shared sub-preamble is fixed. The location of the dedicated sub-preamble includes two types, which are denoted byμ∈{1,2} , as depicted in Figure 2. In addition, we use subscripti∈{s,d}to represent the variables corresponding to the shared sub-preamble and dedicated sub-preamble respectively.
Thenith sub-preamble sequence with root indexuiand cyclic shift indexviis generated as follows.
xui,vi(ni)=xui ((ni+Cvi )modNi),0≤ni≤Ni−1,
whereNidenotes the length of thenith sub-preamble sequence, andxui denotes ZC root sequence that is obtained by Equation (2). As a result, the set of available sub-preamble can be obtained as
Si={xui,v0,xui,1,...,xui,Ni},i∈{s,d},
When an IoT device attempts to access to a gNB, it selects the shared sub-preamble and dedicated sub-preamble from the corresponding obtained set to compose a preamble randomly. In other words, each sub-preamble is generated by distinct ZC root sequence. According to the value ofμ, the generated preamble sequence can finally generated by
xus,vsud,vd(n)=α[xus,vs(ns),g1(ng1 ),x0(n0),g2(ng2 ),xud,vd(nd)],0≤ni≤Li,0≤ngi ≤Lg,
or
xus,vsud,vd(n)=α[xus,vs(ns),g1(ng1 ),xud,vd(nd),g2(ng2 ),x0(n0)],0≤ni≤Li,0≤ngi ≤Lg,
wherexus,vs(ns)andxud,vd(nd)represent the shared sub-preamble and dedicated sub-preamble respectively,gm(ngm )m∈{1,2}denotes Guard Interval (GI),x0(n0)=01×L0(0≤n0≤L0)denotes an empty sequence with lengthL0. Besides,Lidenotes the length of the sub-preambles,Lgdenotes the length of the GI andαrepresents the transmission power. The preamble sequence generation scheme is summarized as Algorithm 1.
Without loss of reliability, generality and fairness, the following guidelines are considered: (1) The length of each sub-preamble sequence, i.e.,Li, should be a prime number to guarantee the periodic correlation of ZC root sequences. (2) The length of each sub-preamble should be selected as long as possible so that ZC root sequences can offer a good performance for TA capturing. (3) The length of the dedicated sub-preamble should be identical to the length of the empty sequence. (4) The total length of sub-preambles and GIs should be no longer than the bandwidth of PRACH that is equal to 839 or 139 according to different scenarios.
Algorithm 1 Preamble generation scheme |
Require: The sets of available sub-preamblesSs,Sd; location index for the dedicated sub-preambleμ; Ensure: A preamble sequence for an RA-attempting devicexu1,vsu2,vd(n); 1: Randomly select a sub-preamble sequence fromSsas a shared sub-preamble,xus,vs(ns); 2: Randomly select a sub-preamble sequence fromSdas a dedicated sub-preamble,xud,vd(nd); 3: Randomly select a location index for the dedicated sub-preamble,μ; 4: if μ=1 then 5: Generating a preamble according to Equation (7); 6: else 7: Generating a preamble according to Equation (8); 8: end if |
4. Preamble Collision Resolution Scheme Based on our proposed preamble structure, this section studies how to reduce the preamble collision. The sub-preamble sequence reception scheme is first proposed. Then, we introduce how to capture multiple TA values in a single RA procedure. Thereafter, an integrated preamble collision resolution scheme is studied. 4.1. Sub-Preamble Sequence Reception
After sequencey(n)is received by the gNB,y(n)should be sliced into a shared sub-preamble and a dedicated sub-preamble. Since the sub-preamble structure is available to both IoT devices and gNB, the shared sub-preamble is apt to be obtained in the light of its predetermined length and location. Please note that the gNB is unable to recognize the dedicated sub-preamble, since the location index is random. However, the TA values obtained from the two types of the sub-preamble sequences sent by the same device should be identical, since those sub-preambles suffered from the same channel delay. Hence, for a specific shared sub-preamble, the corresponding dedicated sub-preamble can be identified via the TA values. Accordingly, the sub-preamble sequence reception scheme is summarized as Algorithm 2.
Please note that when multiple devices transmit their preambles on the same PRACH,ysconsists of multiple shared sub-preamble sequences. Likewise,ydcontain multiple dedicated sub-preamble sequences when the correspondingμis configured identically. How to identify those overlapping sub-preamble sequences for different devices will be introduced in the next subsection.
Algorithm 2 Preamble sequence reception scheme |
Require: The received preamble sequence in the gNBy(n); The length of the sub-preambleLi; The length of the GILg; The length of the empty sequenceL0; The sets of the local sub-preamble sequencesSi; Ensure: The received shared sub-preamble sequenceys(ns); The received dedicated sub-preamble sequenceyd(nd); 1: Intercept the firstLselements ofy(n)asys(ns); 2: Divide the residual sequence in the middle and obtain two sequences with the equal lengthLd+Lg, i.e.,y˜d,candidate1(nd)andy˜d,candidate2(nd); 3: Remove the GI fromy˜d,candidate1(nd)to obtainyd,candidate1(nd); 4: Outputyd(nd)=yd,candidate1(nd)forμ=1; 5: Remove the GI fromy˜d,candidate2(nd)to obtainyd,candidate2(nd); 6: Outputyd(nd)=yd,candidate2(nd)forμ=2; |
4.2. Multiple TA Values Capturing Method
Based on the sub-preamble sequence reception, the gNB can correlate each sub-preamble with the local sequences respectively. The value of correlation calculation with a delay for the sub-preamble is expressed as
di(τi)=1NZC∑ni=0Li−1|yi(ni)·ci*((ni−τi)modLi)|2,0≤ni≤Li−1,i∈{s,d}
whereτi∈{0,1,2,...,Li−1},ci(ni)∈Sidenotes local sub-preamble sequence, and(·)*denotes the complex conjugate. Additionally, the estimation TA value is related to the peak location of correlation, which can be expressed as
τ^i=argmaxτi{di(τi)≥rth},
whererthdenotes the pre-determined threshold.
After the gNB detects the received shared sub-preambles, a set of TA valuesΓs={τs1,τs2,...,τsθ}can be captured, whereθdenotes the number of detected shared sub-preambles. Similarly, another set of TA valuesΓd={τd1,τd2,...,τdσ}can be obtained, whereσrepresents the number of detected dedicated sub-preambles. For ease of description, in the subsequence, the TA values in setΓsare defined as shared TA values and those in setΓdare defined as dedicated TA values. Ifτs=τd, the corresponding shared sub-preamble and dedicated sub-preamble are considered to belong to the same devices. This is because the shared sub-preamble and dedicated sub-preamble that sent by the same device always suffer from the same channel delay. Consequently, the gNB can identify preambles sent from different devices through comparing the shared TA value and the dedicated TA value.
Figure 3 shows an example of capturing two TA values for two different devices. In the example, two RA-attempting devices send the shared sub-preambles with the same indexvs and different dedicated sub-preambles on the same PRACH. Therefore, the gNB receives a overlapping preamble sequence. During the detection of the shared sub-preamble, two TA values can be captured by Equation (10) because of the same shared sub-preamble index. Please note that the gNB is unable to distinguish which TA value belongs to which device. However, during the detection of two dedicated sub-preambles, two TA values can be captured respectively. In detail, the TA values of the two shared sub-preamblesτs1andτs2are captured on an identical detection zone, while the TA values of the two dedicated sub-preamblesτd1andτd2are captured on two different detection zones. Hence, the gNB can identify a device by findingτs1=τd1orτs2=τd2. The scheme of capturing multiple TA values is summarized as Algorithm 3.
Based on Algorithm 3, the TA value of each shared sub-preamble can be obtained by the gNB. If shared sub-preamble collision occurs, the TA value can still be captured with the corresponding dedicated sub-preamble. Only when the shared sub-preamble collision and dedicated sub-preamble collision occur simultaneously, the TA value is unable to be captured. Please note that sub-preamble collision implies more than one devices send dedicated sub-preambles with the same sub-preamble index on the same time-frequency resource. Hence, the probability that shared sub-preamble collision and dedicated sub-preamble collision occur simultaneously is low.
Algorithm 3 Multiple TA value capturing scheme. |
Require: Received shared sub-preamble sequenceys(ns); Received dedicated sub-preamble sequenceyd(nd); The sets of the local sub-preamble sequencesSi; Ensure: Captured TA value for the kth deviceτk; The shared sub-preamble index for the kth devicevsk; The dedicated sub-preamble index for the kth devicevdk; The location index for the kth deviceμk; 1: for all cs(ns)∈Ss do 2: Calculateds(τs)for the received shared sub-preambleys(ns) according to Equation (9); 3: if ds(τs)≥rth,s then 4: Record the sub-preamble indexvsofcs(ns)inΥs; 5: Calculateτ^s1,...,τ^sθ according to Equation (10), and record them inΓs; 6: end if 7: end for 8: for all μ∈{1,2} do 9: for all cd(nd)∈Sd do 10: Calculatedd(τd)for the received dedicated sub-preambleyd(nd) according to Equation (9); 11: if dd(τd)≥rth,d then 12: Record the sub-preamble indexvdofcd(nd)inΥd; 13: Calculateτ^d1,…..,τ^dσ according to Equation (10), and record them inΓd; 14: end if 15: end for 16: end for 17: for all τ^sk∈Γsdo 18: for all τ^dk∈Γd do 19: if τ^sk=τ^dk then 20: Outputτk=τ^skand the corresponding vsk,vdkandμk; 21: end if 22: end for 23: end for |
4.3. Random Access Scheme Based on the multiple TA value capturing scheme, the random access scheme for multiple devices is revised as follows.
-
Step-1: Sub-preambles selection and transmission. An IoT device randomly selects a shared sub-preamble and a dedicated sub-preamble from the available sub-preamble setsSsandSdrespectively. Applying Algorithm 1, the device randomly selects a location indexμto generate a preamble sequence and then transmits it to the gNB on an available PRACH slot.
-
Step-2: Random access response. When the gNB receives the preambles from multiple devices, applying Algorithm 2 to obtain the shared sub-preambles and dedicated sub-preambles respectively. Then, applying Algorithm 3, the gNB captures the TA value for each device and generates the corresponding RAR messages. The RAR message contains the TA command, uplink resource grant for MSG3, the shared sub-preamble index, the dedicated sub-preamble index and the location indexμ.
-
Step-3: MSG3 transmission. Devices can obtain their own RAR messages by confirming the shared sub-preamble index, the dedicated sub-preamble index and the location indexμ. If RAR message is decoded correctly, the corresponding device will transmit MSG3 data on the PUSCH resource blocks that are allocated at step-2. As a result, the gNB can recognize that an RA collision occurs in this case.
- Step-4: Contention resolution. If the gNB successfully decodes MSG3, it will transmit a contention resolution message to the corresponding device. Such message contains the device ID that includes sub-preamble indexes and location index. Otherwise, nothing will be sent to the device. If the device receives contention resolution message, it will send back an ACK message and complete RA procedure. Otherwise, the device will restart a new RA procedure.
Under the proposed scheme, the preamble collision probability is associated with the probabilities of sub-preamble collisions as well as location collision of the dedicated sub-preambles. In other words, the preamble collision occurs when multiple devices select the same shared sub-preambles, the same dedicated sub-preambles as well as the same location indexes at the same time. Assuming thatnkdevices attempt RAs withnpavailable preambles. Consider a target device with deterministic preamble selection, the probability that another device users the same preamble holds as1/np . Since the devices are independent of each other, the preamble collision probability for the target device under the conventional RA [24] scheme holds as
Pcollisionc=1−(1−1np)nk−1.
For the proposed RA scheme, we assume thatnkdevices attempt random access withnp,sshared sub-preambles andnp,ddedicated sub-preambles, and the number of available location index isnμ. For the target device and another device, if the shared sub-preamble, dedicated sub-preamble and location index used by those two devices are all the same, preamble collision will occur for the target device. The probability that another device uses identical shared sub-preamble, dedicated sub-preamble and location index at the same time holds as
PΔ=1np,s·1np,d·1nμ=1np,s np,d nμ
Hence, the preamble collision probability for the target device under the proposed RA scheme holds as
Pcollision=1−(1−PΔ)nk−1=1−(1−1np,s np,d nμ)nk−1
Comparing Equation (11) with Equation (13), when the number of available preambles in conventional RA scheme is equal to the number of available sub-preambles in the proposed RA scheme, i.e.,np=np,s,np=np,d, the proposed scheme can guarantee lower collision probability than the conventional scheme.
5.2. RA Success Probability During a complete RA procedure, the gNB allocates PUSCH resources for MSG3 transmission after successful preamble detection and TA capturing. For a conventional RA procedure, there are 4 cases for preamble collision and PUSCH resource allocation:
(1)
p1c=Pr{preamblecollision,PUSCHresourceallocated};
(2)
p2c=Pr{preamblecollision,PUSCHresourceunallocated};
(3)
p3c=Pr{nopreamblecollision,PUSCHresourceunallocated};
(4)
p4c=Pr{nopreamblecollision,PUSCHresourceallocated};
wherep4crepresents the RA success probability in conventional scheme. Typically, the RA success probability in the conventional scheme is defined as the probability that a device uses an exclusive preamble and is allocated an exclusive PUSCH resource. Besides,p1crepresents the probability that the PUSCH resources are wasted. Moreover, the RA failure probability in conventional scheme is equal top1c+p2c+p3c. Consequently, the RA success probability under conventional scheme can be expressed as
Psucc=p4c=(1−Pcollisionc)·Presc=(1−1np)nk−1·Presc
wherePrescdenotes the successful resource allocation rate for RA-step 3 under conventional scheme. Specifically, the PUSCH resources will be allocated to the IoT device in the RA-step 3 if its preamble is detected by the gNB sucessfully. Therefore, the successful resource allocation rate for RA-step 3 under the conventional scheme holds as
Presc=min{1,nPUSCHPr{ξm≥1}·min{nk,np}},
wherenPUSCHdenotes the number of available PUSCH resources,ξmdenotes the number of devices selecting the mth preamble to perform access request. Since the devices are independent of each other,ξmfollows a Binomial distribution. Hence, we have
Pr{ξm≥1}=1−Pr{ξm=0}=nk0(1−1np)nk =(1−1np)nk .
As a result, the RA success probability under conventional scheme can be obtained as
Psucc=p4c=(1−1np)nk−1·Presc=(1−1np)nk−1min{1,nPUSCH(1−1np)nk ·min{nk,np}}
Similarly, there are 6 cases for PA collision and PUSCH resource allocation for the proposed RA procedure:
(1)
p1=Pr{no shared preamble collision, PUSCH resource allocated};
(2)
p2=Pr{no shared preamble collision, PUSCH resource unallocated};
(3)
p3=Pr{shared preamble collision, no dedicated preamble collision, PUSCH resource allocated};
(4)
p4=Pr{shared preamble collision, no dedicated preamble collision, PUSCH resource unallocated};
(5)
p5=Pr{shared preamble collision, dedicated preamble collision, PUSCH resource allocated};
(6)
p6=Pr{shared preamble collision, dedicated preamble collision, PUSCH resource unallocated}.
It is easily verified that the RA success probability under the proposed scheme is equal top1+p3. On the contrary, the RA failure probability of the proposed scheme is equal top2+p4+p5+p6. Besides,p5represents the PUSCH resources waste probability. Therefore, the RA success probability under the proposed scheme holds as
Psuc=p1+p3=(1−Pcollision)·Pres=(1−1np,s np,d nμ)nk−1·Pres
wherePresdenotes the successful resource allocation rate under the proposed scheme. Additionally, letξs,mdenote the number of devices selecting the mth shared sub-preamble,ξd,mdenote the number of devices selecting the mth dedicated sub-preamble, andζμdenote the number of devices selecting theμth index location. The successful resource allocation rate for RA-step 3 under the proposed scheme holds as
Pres=min{1,nPUSCHPr{ξs,m≥1}Pr{ξd,m≥1}Pr{ζμ≥1}·min{nk,np,s np,d nμ}}
Here, asξs,m,ξd,m, andζμboth follow Binomial distributions, there holds
Pr{ξs,m≥1}=1−Pr{ξs,m=0}=nk0(1−1np,s)nk =(1−1np,s)nk Pr{ξs,d≥1}=1−Pr{ξs,d=0}=nk0(1−1np,d)nk =(1−1np,d)nk Pr{ζμ≥1}=1−Pr{ζμ=0}=nk0(1−1nμ)nk =(1−1nμ)nk
Thus, the RA success probability under under the proposed scheme holds as
Psuc=p1+p3=(1−1np,s np,d nμ)nk−1·Pres=(1−1np,s np,d nμ)nk−1min{1,nPUSCH(1−1np,s)nk (1−1np,d)nk (1−1nμ)nk ·min{nk,np,s np,d nμ}}
6. Simulation Results
In this section, the performance of the proposed RA scheme is simulated and analyzed in terms of preamble detection probability, preamble collision probability, RA success probability, resource efficiency and TA capturing. The simulation parameters and their configurations are listed in Table 1. The simulation experiments are carried out on a MATLAB platform. In the simulation, preamble sequences are first generated for the conventional RA scheme and the proposed RA scheme respectively. Then different preambles with distinct TA values are transmitted to the gNB, suffering from a small-scale fading channel and additive white Gaussian noise. In convention RA scheme, the receive preamble sequence is detected by calculating the correlation value with all the local available preamble sequences. In the proposed RA scheme, the received sequence is divided into three sub-sequences, and each sub-sequence is detected by calculating the correlation values with all the corresponding available sub-preambles. The TA estimation is determined as the peak location of correlation. Once a TA is captured, the PUSCH resource block will be allocated to the user by the gNB in RA-step 3. An RA failure occurs when the TA cannot be captured or the PUSCH resource blocks are used up. To avoid the impact of randomness on the simulation results, we simulate each case for 10,000 times and output the mean results finally.
6.1. Preamble Detection Probability To evaluate the impact of sub-preambles on the preamble detection probability, the proposed RA scheme is compared with conventional RA scheme when total P devices select exclusive sub-preambles to access to a gNB on the same PRACH. The preamble detection performance of the proposed RA scheme may be degraded, since the length of designed preambles is shorter than the conventional ones. To test the negative effect of sub-preambles, we randomly select sub-preamble sequence with different indexes from the available sub-preamble set.
Figure 4 depicts the average preamble detection probability for different case of the number of devices P. The following observations are obtained: (1) When SNR is higher than −14 dB, the preamble detection performance of proposed scheme is a little poorer than conventional RA scheme; (2) The detection performance variation caused by varying amount of RA-attempting devices can be neglected; (3) The difference in the average preamble detection probabilities of proposed RA scheme and conventional RA scheme is negligible. The above observations imply that the sub-preamble structure does not impair the preamble detection performance. Hence, it is applicable to the IoT scenario where massive devices may request random access at the same time.
6.2. Comparison of Collision Probability
Figure 5 depicts the relationship between the RA collision probability and the number of RA-attempting devices on a PRACH. In our simulations, the performance of the proposed RA scheme is compared with the conventional RA scheme, E_PACD scheme [14], and PACR scheme [15]. Firstly, the analytical results under the proposed RA scheme and that under the conventional scheme are both close to the simulation results, which verifies the accuracy of our analysis approach. It is also observed that the collision probability of the conventional RA scheme and that of E_PACD scheme are identical, since their collision probabilities only depend on the number of available preambles. Differently, the collision probability of PACR scheme depends on both the number of TA valuesNTAand the number of available preambles that can be allocated to the devices. Additionally, greaterNTAmeans the gNB can detect more preambles on a PRACH, which can reduce the collision probability. However,NTAdepends on the length of zero correlation zone of the detected preambles. Hence,NTA is finite. On the other hand, the RA collision probability of the proposed scheme depends on the size of sub-preamble sequence sets and the number of available locations of a dedicated sub-preamble. From Figure 5, we also observe that: (1) With the increase of the amount of RA-attempting devices, the collision probability of each scheme increases; (2) When the amount of RA-attempting devices is the same, the proposed scheme guarantees a lower RA collision probability than the other schemes, which means it is more suitable for massive connective scenarios.
6.3. Comparison of RA Success Probability
In this subsection, the RA success probability varying with the number of RA-attempting devices on a PRACH is analyzed. In our simulation experiment, we setnp=np,s=60 . Figure 6 and Figure 7 depict the simulation results with configurationnPUSCH=20andnPUSCH=100respectively.
Similar to Figure 5, the analytical results under the proposed and conventional schemes are both close to the simulation results, which validates the effectiveness of our theoretical analysis. As observed in Figure 6, the RA success probability under the proposed scheme is approximately 100%, whennk<20. This is because the RA collision probability of the proposed scheme is close to zero. Therefore, all PUSCH resources can be allocated to the collision-free devices. Whennk>20, the RA success probabilities under the proposed scheme, the conventional scheme, PACR and E_PACR scheme all decrease rapidly, since the number of available PUSCH resources is insufficient. In this case, PUSCH resources shortage is the main influence on RA success probability. Besides, the RA success probability under the proposed scheme performs better than the other schemes. It is observed that the RA success probability under PACR scheme can be convergent to the proposed scheme only ifNTA=∞+ that is impractical in a real-world system. In Figure 7,nPUSCHis extended to 100. It is found that with the increase ofnPUSCH, the proposed scheme can guarantee a high RA success probability even though the number of RA-attempting devices on a PRACH beyond 100. Hence, it is verified that the proposed scheme can guarantee a higher RA success probability as long as the PUSCH resource is enough.
6.4. Comparison of Resource Efficiency
In this subsection, the resource efficiency is analyzed under different schemes. The resource efficiency is defined as follows
η=Δnsuccess nPUSCH,
wherensuccess denotes the number of PUSCH resources which are allocated to collision-free devices. As shown in Figure 8, the resource efficiency under the proposed scheme is higher than that under other schemes, especially when the amount of RA-attempting devices on the same PRACH is large. Whennk>20, the resource efficiency under the proposed scheme and that under PACR scheme both decrease withnk. This is because the PUSCH resources are not enough to be allocated to the collision-free devices whennk>nPUSCH. However, the proposed scheme can still guarantee a high resource efficiency even thoughnkis large.
6.5. Analysis of TA Capturing Performance
In this subsection, the performance of TA capturing is evaluated in terms of TA capturing accuracy. Specifically, TA capturing accuracy is defined as
εTA=Ncaptured/Npreamble,
whereNcaptureddenotes the number of TA values which is captured correctly, andNpreambledenotes the number of received preambles on the same PRACH resource. Compared with the conventional preamble, the sub-preamble is shorter. As a result, sub-preamble structure may degrade the performance of TA capturing. For the sake of performance analysis of the proposed multiple TA value capturing scheme, we focus on the collision of the shared sub-preambles. Assume that M preambles from M different devices are received on the same PRACH where the shared sub-preambles are set to the same index. Besides, the dedicated sub-preamble indexes and location indexes are randomly selected. The number of the available dedicated sub-preambles is set to 60, the number of available locations is set to 2.
As depicted in Figure 9, the number of preambles sent on the same PRACH is set toM={2,4,6,8,10}. It is observed that better TA capturing performance can be guaranteed when less devices transmit identical preamble on the same PRACH. For the case ofM=2, the proposed scheme can guarantee over80%accuracy even though the SNR is low (i.e., −10 dB). Similar accuracy can be obtained when SNR reaches 6 dB for the case ofM=10 where interference is severe. Please note that the probability that 10 devices select the same shared sub-preamble is quite low. According to Equation (12), the probability is only2.59%when 1000 devices request RAs with 60 available preambles.
7. Conclusions In this work, a preamble collision resolution scheme was proposed for the IoT systems. The number of collision-free devices on the same PRACH was expanded by the proposed sub-preamble sequence structure. To obtain multiple TA values of the RA-attempting devices, a multiple TA capturing scheme was also proposed. Simulation results verified that the proposed RA scheme performed well in preamble collision probability, RA success probability, resource efficiency and TA capturing. In particular, the proposed scheme improved the RA success probability with ignorable degradation in preamble detection performance. Hence, the proposed scheme has a great potential for supporting massive access in the future IoT systems. In addition to the preamble design, preamble repetition is also an important way to improve the random access performance. Hence, our future work will focus on the preamble repetition mechanism design for a massive IoT system.
Number of available shared sub-preambles | 60 |
Number of available dedicated sub-preambles | 60 |
Length of ZC sequence | 839 |
Length of shared sub-preamble sequence | 431 |
Length of dedicated sub-preamble sequence | 199 |
Length of GI | 5 |
Number of communication devices on a PRACH | 1–1000 |
Signal strength (SNR) | −20∼15 dB |
Author Contributions
This work was a collaborative development by all authors. A.Z., Z.L., R.W., X.L., and B.G. proposed the idea, were involved in the theoretical performance analysis, designed and optimized the algorithm, and wrote the paper. All authors have read and agreed to the published version of the manuscript.
Funding
This research was funded by the National Natural Science Foundation of China under Grant 61871062; in part by the Natural Science Foundation of Chongqing under grant cstc2020jcyj-zdxmX0024; in part by the Science and Technology Research Program of Chongqing Municipal Education Commission under grant KJQN201900609; in part by the Program for Innovation Team Building at Institutions of Higher Education in Chongqing under Grant CXTDX201601020, and in part by the University Innovation Research Group of Chongqing under grant CXQT20017.
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
The data presented in this study are available on request from the corresponding author. The data are not publicly available due to further study will be carried out.
Conflicts of Interest
The authors declare no conflict of interest.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2021. This work is licensed under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
How to support massive access efficiently is one of the challenges in the future Internet of Things (IoT) systems. To address such challenge, this paper proposes an effective preamble collision resolution scheme to sustain massive random access (RA) for an IoT system. Specifically, a new sub-preamble structure is first proposed to reduce the preamble collision probability. To identify different devices that send the same preamble to the gNB on the same physical random access channel (PRACH), a multiple timing advance (TA) capturing scheme is then proposed. Thereafter, an RA scheme is designed to sustain massive access and the performance of the scheme is studied analytically. Finally, the effectiveness of the proposed RA scheme is validated by extensive simulation experiments in terms of preamble detection probability, preamble collision probability, RA success probability, resource efficiency and TA capturing.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer