Evolution of random access process: From Legacy networks to 5G and beyond

In this paper, we discuss the random access procedures in legacy networks, long‐term evolution, LTE‐Advanced, and 5G networks. Random access is the first and incumbent step for connection establishment between base station/eNodeB/gNodeB and user equipment. Keeping in view its importance, there has b...

Full description

Saved in:
Bibliographic Details
Published inTransactions on emerging telecommunications technologies Vol. 33; no. 6
Main Authors Toor, Waqas Tariq, Basit, Abdul, Maroof, Naeem, Khan, Saqib Ali, Saadi, Muhammad
Format Journal Article
LanguageEnglish
Published 01.06.2022
Online AccessGet full text

Cover

Loading…
More Information
Summary:In this paper, we discuss the random access procedures in legacy networks, long‐term evolution, LTE‐Advanced, and 5G networks. Random access is the first and incumbent step for connection establishment between base station/eNodeB/gNodeB and user equipment. Keeping in view its importance, there has been a regular thrive to improve the procedures of random access in communication networks. With the advent of new concepts such as machine‐type communication and Internet of Things, random access becomes extremely critical because huge number of devices try to connect to the network simultaneously. We present the evolution of random access process from legacy networks such as global system for mobile or wideband code division multiple access to 5G networks and beyond and their analysis. Simulations are performed in MATLAB to show various performance metrics such as access delay, total service time, and collision probability to demonstrate the pros and cons of one technique over another. In this paper, we discuss and analyse random access procedures in legacy networks, current and next generation networks. With the evolution of machine‐type communication and Internet of Things, random access becomes crucial because huge number of devices try to connect to the network at a given instant. Simulations are performed in MATLAB to show various performance metrics such as access delay, total service time, and collision probability to demonstrate the pros and cons of one technique over another.
ISSN:2161-3915
2161-3915
DOI:10.1002/ett.3776