2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC) 2014
DOI: 10.1109/pimrc.2014.7136422
|View full text |Cite
|
Sign up to set email alerts
|

Load-aware modeling for uplink cellular networks in a multi-channel environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
35
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
4
2

Relationship

6
0

Authors

Journals

citations
Cited by 19 publications
(35 citation statements)
references
References 10 publications
0
35
0
Order By: Relevance
“…It is assumed that the BSs are dense enough such that each of the CHs can invert its path-loss towards the closest BS almost surely, and hence the maximum transmit power of the IoT devices is not a binding constraint for packet transmission. Extension to fractional power control and/or adding a maximum power constraint can be done by following the methodologies in [29] and [30]. An RA transmission is assumed to be decodable if the signal to interference and noise ratio (SINR), denoted by Υ RA , is greater than a certain threshold θ RA .…”
Section: B Random Access Over the Lte Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…It is assumed that the BSs are dense enough such that each of the CHs can invert its path-loss towards the closest BS almost surely, and hence the maximum transmit power of the IoT devices is not a binding constraint for packet transmission. Extension to fractional power control and/or adding a maximum power constraint can be done by following the methodologies in [29] and [30]. An RA transmission is assumed to be decodable if the signal to interference and noise ratio (SINR), denoted by Υ RA , is greater than a certain threshold θ RA .…”
Section: B Random Access Over the Lte Networkmentioning
confidence: 99%
“…The constraint of scheduling one CM per Voronoi cell of the cluster leads to a Voronoiperturbed point process for the set of mutually interfering CMs. Approximation 2 is commonly used in the literature to maintain tractability [29], [30], [34]- [38]. Remark 3.…”
Section: Approximation 2 For the D2d Transmission The Point Processmentioning
confidence: 99%
“…It is assumed the BSs are dense enough such that each of the devices can invert its path loss towards the closest BS almost surely, so the maximum transmit power of the UEs is not a binding constraint for the RACH access. Extension to RACH access with fractional power control and adding a maximum power constraint can be done by following the methodologies in [9] and [10], respectively. Upon RACH access failure, the ZC code selection is repeated and the device follow one of the following three schemes:…”
Section: B Rach Access Schemementioning
confidence: 99%
“…α-Duplex Model Universal frequency reuse is adopted with no intra-cell interference. Hence, only one UE per BS is active at a given 2 Truncation outage and the effect of allowing UEs in truncation to transmit with the maximum transmit power has been studied in [7], [12] and are out of the scope of the current paper. frequency channel.…”
Section: A Network Modelmentioning
confidence: 99%
“…Let the LT of the RV variable y in this case be donated by L I d (z), then using (12), the BER in the downlink direction is given by,…”
Section: Performance Analysismentioning
confidence: 99%