Energy efficient random access for the quasi-static fading MAC

We discuss the problem of designing channel access architectures for enabling fast, low-latency, grant-free and uncoordinated uplink for densely packed wireless nodes. Specifically, we extend the concept of random-access code introduced at ISIT'2017 by one of the authors to the practically more...

Full description

Bibliographic Details
Format: Article
Language:English
Published: Institute of Electrical and Electronics Engineers (IEEE), 2021-11-01T17:29:01Z.
Subjects:
Online Access:Get fulltext
LEADER 01816 am a22001453u 4500
001 136994
042 |a dc 
245 0 0 |a Energy efficient random access for the quasi-static fading MAC 
260 |b Institute of Electrical and Electronics Engineers (IEEE),   |c 2021-11-01T17:29:01Z. 
856 |z Get fulltext  |u https://hdl.handle.net/1721.1/136994 
520 |a We discuss the problem of designing channel access architectures for enabling fast, low-latency, grant-free and uncoordinated uplink for densely packed wireless nodes. Specifically, we extend the concept of random-access code introduced at ISIT'2017 by one of the authors to the practically more relevant case of the AWGN multiple-access channel (MAC) subject to Rayleigh fading, unknown to the decoder. We derive bounds on the fundamental limits of random-access coding and propose an alternating belief-propagation scheme as a candidate practical solution. The latter's performance was found to be surprisingly close to the information-theoretic bounds. It is curious, thus, that while fading significantly increases the minimal required energy-per-bit Eb/N0 (from about 0-2 dB to about 8-11 dB), it appears that it is much easier to attain the optimal performance over the fading channel with a practical scheme by leveraging the inherent randomization introduced by the channel. Finally, we mention that while a number of candidate solutions (MUSA, SCMA, RSMA, etc.) are being discussed for the 5G, the information-theoretic analysis and benchmarking has not been attempted before (in part due to lack of common random-access model). Our work may be seen as a step towards unifying performance comparisons of these methods. 
546 |a en 
655 7 |a Article 
773 |t 10.1109/ISIT.2019.8849288 
773 |t 2019 IEEE International Symposium on Information Theory (ISIT)