2012
DOI: 10.1109/tit.2011.2173711
|View full text |Cite
|
Sign up to set email alerts
|

Random Access: An Information-Theoretic Perspective

Abstract: This paper considers a random access system where each sender can be in two modes of operation, active or not active, and where the set of active users is available to a common receiver only. Active transmitters encode data into independent streams of information, a subset of which are decoded by the receiver, depending on the value of the collective interference. The main contribution is to present an information-theoretic formulation of the problem which allows us to characterize, with a guaranteed gap to op… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
77
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 53 publications
(83 citation statements)
references
References 24 publications
1
77
0
Order By: Relevance
“…One possible solution to analyze the theoretical potential of NOMA with cross layer design is to formulate the Shannon informationtheoretic channel model. For example, grant-free NOMA can be formulated as the random access channel (RAC) as shown in Figure 34 [106], which uses the auxiliary receivers to represent different states of user activation in grant-free access. We note that this channel model is similar to the interference channel model, where applying rate splitting can achieve a good capacity region.…”
Section: Cross Layer Designmentioning
confidence: 99%
“…One possible solution to analyze the theoretical potential of NOMA with cross layer design is to formulate the Shannon informationtheoretic channel model. For example, grant-free NOMA can be formulated as the random access channel (RAC) as shown in Figure 34 [106], which uses the auxiliary receivers to represent different states of user activation in grant-free access. We note that this channel model is similar to the interference channel model, where applying rate splitting can achieve a good capacity region.…”
Section: Cross Layer Designmentioning
confidence: 99%
“…It was proved in [2] that decoding interference first and then decoding the intended message can enlarge an achievable rate region of the 2-user interference channel depicted in Figure 1, compared with orthogonalization and treating interference as additional nose when the cross channel gains |h 21 [5] that decoding interference can significantly improve the expected sum rate in medium access control with two sources, compared with orthogonalization and treating inference as noise. These results suggest that decoding a part of the interfering message performs well for many important classes of two-user communication systems.…”
Section: Traditional Approachesmentioning
confidence: 99%
“…Models of random access networks account for traffic burstiness and interference, but generally ignore the underlying communication process, e.g., noise and fading. Recently, there have been efforts to formulate the random access communication problem in terms of an information-theoretic approach, e.g., [15], [16]. In [15], a new channel coding approach that considers bursty traffic properties and packet collision detection was proposed for random access communication.…”
Section: Introductionmentioning
confidence: 99%
“…In [15], a new channel coding approach that considers bursty traffic properties and packet collision detection was proposed for random access communication. In [16] an information-theoretic formulation of random access is presented and the set of achievable rates is characterized.…”
Section: Introductionmentioning
confidence: 99%