Skip to main content
Top

2019 | Book

Massive Machine Type Communications

Multiple Access Schemes

insite
SEARCH

About this book

This SpringerBrief introduces the current research status on emerging multiple access schemes for mMTC, which provides an integrated reference for future research works. A brief introduction on mMTC scenario is provided, and then the suitable random access procedure is discussed. Various multiple access schemes for mMTC are also described and analyzed in detail. It assumes a background in communication theory and wireless communication fundamentals.

With the thriving of Internet of Things (IoT) industry, an emerging scenario named massive machine-type communication (mMTC) is considered in the future 5G networks. One main challenge in mMTC is how to support massive connections with limited radio resources and low energy consumption. Therein, novel multiple access scheme is the key to overcome the challenge.

This SpringerBrief targets researchers and engineers, who are engaged in 5G and future IoT related communications system. It can also be a used as a reference book or a secondary text for graduate students, who major in communications.

Table of Contents

Frontmatter
Chapter 1. Introduction on Massive Machine-Type Communications (mMTC)
Abstract
With the rise of a new round of scientific and technological revolutions and industrial changes in the world, the emergence of a large number of new applications, new businesses, new fields and new markets pose more requirements and challenges to existing mobile communication technologies [1]. To this end, a cellular communication paradigm shift from the fourth-generation (4G) to the fifth-generation (5G) is provoked [2, 3]. In 2012, the European Union (EU) officially launched the mobile and wireless communications enables for the 2020 information society (METIS) project to conduct research on 5G mobile communication networks. In addition to METIS, the EU has launched a larger research project named 5G-PPP. Moreover, the UK government has established a 5G R&D center with a number of companies at Surrey University.
Fanggang Wang, Guoyu Ma
Chapter 2. Random Access Procedure for mMTC
Abstract
In this chapter, the random access procedure for mMTC is discussed. First, the grant-based random access including the long term evolution (LTE) random access channel (RACH) is introduced. Then a suitable random access procedure for mMTC called grant-free random access is presented.
Fanggang Wang, Guoyu Ma
Chapter 3. Compressive Sensing Based Multi-user Detection (CSMUD)
Abstract
Compressive sensing based multi-user detection (CSMUD) is a code domain PHY layer solution which attracts a lot of attentions [18, 19]. CSMUD takes advantage of the sparse user activity of the mMTC sporadic transmission for user identification and data detection. In CSMUD, compressive sensing theory is effectively applied to alleviate the influence caused by the cross-correlation between non-orthogonal spreading sequence on user identification and data detection.
Fanggang Wang, Guoyu Ma
Chapter 4. Coded Slotted ALOHA (CSA)
Abstract
In this chapter, a MAC layer scheme named coded slotted ALOHA (CSA) is presented with illustrative example and theoretical analysis [25, 26]. The difference between the PHY layer schemes and the MAC layer schemes is that the PHY layer solutions are used for the single slot transmission process while the MAC layer solutions are used for multi-slot transmission process. In CSA, each served UE selects multiple time slots to transmit the replica of its data packet and successive interference cancellation (SIC) is implemented at the receiver to resolve the collision to realize high connectivity.
Fanggang Wang, Guoyu Ma
Chapter 5. Tandem Spreading Multiple Access
Abstract
Currently, high connectivity in the mMTC system can be achieved by the cutting-edge multiple access approaches. Nevertheless, a comprehensive multiple access scheme to cover both high connectivity and reliability in grant-free random access system is potentially demanded by the future MTC applications. Motivated by this, a novel spreading based multiple access technique named tandem spreading multiple access has been proposed. This approach is initiated from the scheme called tandem spreading network-coded division multiple access (TSNDMA) [30]. Then a generalized version of TSNDMA named coded tandem spreading multiple access (CTSMA) is introduced [31]. In the following subsections, those two versions are presented. In addition, the multi-slot design of CTSMA is described [32].
Fanggang Wang, Guoyu Ma
Chapter 6. Conclusion
Abstract
In this book, various emerging multiple access schemes for the mMTC system have been introduced. First the characteristics and requirements of the mMTC scenario are described. For the sake of saving the enormous control signaling overheads in the small data packet transmissions, grant-free random access is regarded as a suitable random access procedure for mMTC. Nevertheless, new challenges including anonymous transmission and collision are arisen in grant-free random access. The researchers are driven to consider novel multiple access schemes. Therein, CSMUD, CSA and CTSMA are discussed. In CSMUD, sparse user activity based on sporadic transmission in mMTC is exploited to mitigate the influence of MAI. CSA enhances the collision resolution capability of ALOHA by employing SIC on multiple slots. In CTSMA, tandem spreading and segment coding are applied to confine the impact of collision to a deterministic number of segments and resolve them.
Fanggang Wang, Guoyu Ma
Backmatter
Metadata
Title
Massive Machine Type Communications
Authors
Fanggang Wang
Guoyu Ma
Copyright Year
2019
Electronic ISBN
978-3-030-13574-4
Print ISBN
978-3-030-13573-7
DOI
https://doi.org/10.1007/978-3-030-13574-4