SlideShare a Scribd company logo
1 of 30
RACH : Random Access Channel
Done by: Issa Haidar
Supervised by : Dr. Hani el Fawal Date : 13-4-2017
1/30
• RACH: Random access channel
• Why RACH in uplink?
• RACH procedures
• Random Access Slots
• What is a Preamble?
• Preamble Structure
• Preamble format
• Zadoff–Chu (ZC) sequence
• 64 Preamble generation
• Why only 64?
• Preamble timing and Preamble type Determination
• RACH Contention based procedure
• Collisions in contention based procedure
• RACH PROCEDURE OVERLOAD PROBLEM DESCRIPTION
• LTE-A NETWORK ACCESS METHODS AND RESEARCH CHALLENGE
• RACH OVERLOAD CONTROL MECHANISMS.
Contents
http://patentimages.storage.googleapis.com/US7286841B2/US07286841-20071023-D00002.png
0/272/30
• What is RACH?!
The Random Access Channel (RACH) is an uplink channel in mobile communication
system that is used to transfer control information from a mobile terminal to the
network( Not to carrry data).
• Rach Purpose:
1. To get uplink Synchronization.
2. To Obtain the resource for Message 3
(e.g, RRC Connection Request)
RACH : Random Access Channel
http://patentimages.storage.googleapis.com/US7286841B2/US07286841-20071023-D00002.png
1/273/30
• Why we don’t use RACH in Downlink!?
• In LTE, the synchronization in downlink achieved by
the special synchronization channel .This downlink
sync signal gets broadcasted to everybody and it is
get transmitted all the time with a certain interval.
• Synchronization in Uplink :
• Broadcasting /always-on synchronization
mechanism is not efficient (actually waste of energy
and causing a lot of interference to other UEs) if UE
is using this kind of broadcasting/always-on
synchronization mechanism.
Why RACH In Uplink? 2/274/30
• Contention free procedure is under the full control of the eNodeB in order to
avoid delayed-constrained access requests therefore M2M devices will have no
effect on such traffic.
RACH Procedures
http://1.bp.blogspot.com/-aZpu6gP-nvw/UX5RdMRRkSI/AAAAAAAAErQ/WrBB44HaAkc/s1600/RACH+Type.png
3/27
• Occurs in Connected Mode:
i. Handover Process
ii. Radio Link Failure
• Occurs in idle mode when UE
doesn’t have uplink resources
yet
- Initial access
5/30
RACH Procedure 4/27
• In Rach , the UE should choose a unique signiture( Preamble )randomly from
the 64 Preambles that are provided by the EnodeB in order to allow this UE to
get access to the network.
• RA preamble is sent in one Random Access (RA) slot.
• Because of the random choosing and the
huge number of UEs that will try to get access,
a possibility may occur and two UEs may take
the same PREAMBLE which will result one of
the two UEs to have failure in connection,
this issue is solved in Contention based procedure.
6/30
• Random Acces channel is divided into Random Access slots ( RA slots).
• These RA slots are periodic time-frequency resources in the uplink channel which are
reserved to allow the UE to send its access requests ( preamble).
• Devices randomly select among these RA slots opportunities to transmit the preamble
• Each RA slot consists of 6 Rbs in frequency domain with 1.08MHz bandwidth (180 KHz x
6) and a duration of 1/2/3 ms in time domain depending on the preamble format.
.
Random Access Slots 5/277/30
• The RA-slots for PRACH are multiplexed with the Physical Uplink Shared
Channel (PUSCH) and the Physical Uplink Control Channel (PUCCH) as
illustrated in the figure.
Random Access Slots 6/278/30
• Preamble: is a signature used by devices to request access to the network.
• The random access preamble is generated using Zadoff-Chu sequences; From each root sequence,
multiple preambles can be obtained by applying different cyclic shifts.
• If all the preambles are generated from the same root sequence they are orthogonal to each other.
In such case, different preambles from multiple M2M Devices can be detected by the eNodeB when
they are transmitted in the same cell at the same time.
Preamble? 7/27
• Occurs in Connected Mode:
i. Handover Process
ii. Radio Link Failure
• Occurs in idle mode when UE
doesn’t have uplink resources
yet
- Initial access
9/30
• A Zadoff–Chu (ZC) sequence, a spreading code functions and complex valued
mathematical sequence(It is a sequence of special number) which they are generated by
a specific formula in which it generates a family of those sequences.
• A generated Zadoff–Chu sequence that has not been shifted is known as a "root
sequence.
• Each sequence contains 31 terms
• Property 1: A ZC sequence has constant amplitude. The constant amplitude property
limits the Peak-to-Average Power Ratio (PAPR). In addition. Constant amplitude is
desired over wireless channel as it places lesser strain on the power amplifier for
transmission.
• Property 2: Zero autocorrelation for cyclic shifts means the signals are orthogonal in
time. Orthogonality is desired so as to minimize interference between users. Zero auto
correlation means the correlative variance between the users is zero, so no interaction
or interference between the users.
Zadoff–Chu (ZC) sequence, 8/2710/30
• Because of the non-synchronization between the uplink UEs; in the time domain, the
cyclic prefix (CP) and guard time (GT) are used to avoid interference with the previous
and next subframes.
Preamble Structure
http://1.bp.blogspot.com/-aZpu6gP-nvw/UX5RdMRRkSI/AAAAAAAAErQ/WrBB44HaAkc/s1600/RACH+Type.png
9/2711/30
• Preamble Length in Frequency Domain :The
preamble has 893 subcarriers with spacing of
1.25KHz instead of 15KHz) (1.25* 839=1.05MHz)
.
• There will be 15KHz guard band on both the
sides and hence it uses total of 1.08MHz (equal
to 6 RBs).
• Preamble Length in Time Domain including
Guard Time (= CP Length + SEQUENCY Length +
GT Length) can be 1ms or 2ms or 3ms depending
on Preamble Format.
• There is a max. of 1 random access preamble per
a subframe but more than one UEs can use it.
Multiple UEs using same preamble resource
allocations are differentiated by their unique
preamble sequences.
Preamble Structure
http://www.rfwireless-world.com/Terminology/LTE-PRACH-Physical-Random-Access-Channel.html
10/2712/30
• Preamble has 4 formats and each of these formats varies in length . (
1ms/2ms/3ms/4ms)
Preamble Formats
http://1.bp.blogspot.com/-aZpu6gP-nvw/UX5RdMRRkSI/AAAAAAAAErQ/WrBB44HaAkc/s1600/RACH+Type.png
11/27
• Occurs in Connected Mode:
i. Handover Process
ii. Radio Link Failure
13/30
• We have multiple Preamble formats because it’s related to the Cell size:
• The larger the cell-size, the longer the preamble to ensure its proper reception.
• The longer Time sequence (T_SEQ) would help decoding PRACH under noised condition because it
provide longer correlation window to detect PRACH.
• Longer CP would give you better tolerance in fading environment and reducing Inter Symbol
Interference even in highly fading environment.
Preamble Formats
http://1.bp.blogspot.com/-aZpu6gP-nvw/UX5RdMRRkSI/AAAAAAAAErQ/WrBB44HaAkc/s1600/RACH+Type.png
12/27
• Occurs in Connected Mode:
i. Handover Process
ii. Radio Link Failure• Occurs in idle mode when UE
doesn’t have uplink resources
yet
- Initial access
14/30
• EXAMPLE:
• Let's suppose SIB2 broadcast the parameters as follows:
rootSequenceindex = 22
Highspeedflag = false
zeroCorrelationZoneConfig = 5
• This rootSequenceIndex is a logical value. The real number (physical number) is called 'u' (the
rootSequenceIndex is mapped to u by using a table.
• After finding the rootSequenceIndex and mapping it to “u”: you will get the base Zaddoff-Chu
sequence with u = 1 .
• After some complicated calculations: you will get the Ncs (Cyclicshift interval) = 26
• Now you can get the 64 different PRACH sequence as follows:
•
• PRACH Sequence[0] = base sequence
• PRACH Sequence[1] = do cyclic shift to base sequence by 1 * 26 samples
• PRACH Sequence[2] = do cyclic shift to base sequence by 2 * 26 samples
• PRACH Sequence[31] = do cyclic shift to base sequence by 31 * 26 samples
•
• PRACH Sequence[32] = do cyclic shift to base sequence +1
• PRACH Sequence[33] = do cyclic shift to base sequence +1 by 1 * 26 samples
• PRACH Sequence[34] = do cyclic shift to base sequence +1 by 2 * 26 samples
• PRACH Sequence[63] = do cyclic shift to base sequence+1 by 31 * 26 samples
64 Preambles Generation 13/2715/30
• Answer: With one rootsequenceindex UE
can able to generate MAX of 64 preambles
by doing simple cyclic shift. If it want to
generate more than that preambles it is
complex to generate preamble sequence
,that is the reason it is restricted to 64.
WHY only 64 Preambles?! 14/2716/30
1. How UE know which Preamble format it has to use when it generates PRACH and
transmit?
2. Exactly how many RA Slots (Preambles) should be generated per frame?
3. At which time( When) and at which frame and sub frame(Where) a UE is allowed to
transmit Preambles?
• They are determined by a SIB2 parameter called “prach-ConfigIndex”.
• In total, there are 64 possible configurations we will see in the next slide.
Preamble timing and Preamble type Determination 15/2717/30
• There are, at most, 10 RA slots per LTE frame, one ( RA slot every millisecond). And at least 1 RA
resource every 2 LTE frames ( 1 RA slot every 20 ms).
Preamble timing and Preamble type Determination
Massive Access in the Random Access Channel of LTE for M2M Communications
17/27
Sub frame Sub frame
18/30
Preamble timing and Preamble type Determination 16/27
• SFN and subframe Numbers:
• The transmitter and receiver should operates in
synchronized mode.
• In LTE , the clock synchronization between the transmitter
and the receiver is the same as our analog clock.
• It has two arms:
1. SFN : System Frame Number , is the numbers between 0
and 1023 and its ticks every 10 ms.
2. Sub Frame Number: are the numbers between 0 and 9
which ticks every ticks every 1 ms.
Before the transmitter (eNodeB) and the receiver (UE) in LTE
start communicating each of other they have to set these two
clock arms to be the same number and this synchronization
happens during cell search and timing synch process
19/30
• Many UE may choose the same preamble that will result in a conflict between them. The RACH
procedure has some steps in order to avoid this to happen:
1. Random Access preamble assignment: A UE chooses one RA slot from 64 preambles that are
provided by the EnodeB. ( 2 users may take the same Preamble but we will see how it will be
solved in step4).
2. Random access Response (RAR): A message response from the EnodeB indicating in it the
configurations of the RA slot (time/frequency slot, scheduling). When an UE receives these
configurations, it synchronizes its uplink timing and proceeds to the next step.
3. RRC Message: The UE sends a RRC message to EnodeB in order to establish a connection.
4. Contentions Resolution: If the RCC is successuly decoded by the eNodeB, it replies with a
contention-resolution message on the PDSCH, echoing the mobile terminal identity (mobile ID) in
order to acknowledge the correct reception of its request. Conversely, UEs that do not receive a
contention resolution message from the eNodeB assume that their access requests failed and,
after waiting a random backoff time, perform a new preamble transmission attempt in the next RA
slot.
RACH Contention Based Procedure 18/27
RACH Overload Congestion Mechanism for M2M Communication in LTE-A: Issues and Approaches
20/30
• Collision at Step1: If two or more devices transmit the same preamble, a collision
may occurs and the corresponding requests will not be detected by the eNodeB.
Collisions in RACH 19/27
The challenges of M2M massive access in wireless cellular networks
21/30
• Step1: UEs choose the same preamble and the eNodeB correctly Detects it.
• Step2: EnodeB transmits a Random access response on the PDSCH which includes timing alignment
and the PUSCH resources that have been assigned to the UE for the third step RRC connection
• Step3: The UEs involved in an undetected preamble collision will transmit over the same PUSCH
resource blocks, therefore a new collision will occur and they have to wait for some period and
resend the RACH again.
Collision at step 3 20/27
The challenges of M2M massive access in wireless cellular networks
22/30
• The RA success probability: which is the
probability that a preamble sequence does not
collide with another preamble sequence; it’s
determined by the number of available
preamble sequences and the terminal density in
a cell.
• Problem: Despite of the small packets that are
sent from the M2M devices; the Massive
number of packets sent may result in:
1. low random access success rate and a high
congestion.
2. Unexpected delay, increased packet loss,
and high power consumption.
3. inefficient utilization of radio resources.
4. Huge Load when the increased number of
devices will attempt to re-access the
network after collisions.
• Result: the RA procedure in LTE-A will not be
efficient in the existence of the massive number
of M2M devices and efficient overload control
mechanisms are required for RA-based M2M
communication.
RACH PROCEDURE OVERLOAD PROBLEM DESCRIPTION 21/27
Random Access for Machine-to-Machine Communication in LTE-Advanced Networks: Issues and Approaches
23/30
LTE-A NETWORK ACCESS METHODS AND RESEARCH CHALLENGE 22/27
• LTE-A Network Access Methods:
European Telecommunications Standards Institute (ETSI) addressed three methods of
how to access the LTE-A network:
1. Direct Access: This method will allow both M2M and H2H devices to access the network
via eNodeB without the need of any intermediate device which may result in congestion
problems when there are no enough resources for the massive number of M2M devices,
therefore this access is not suitable.
Random Access for Machine-to-Machine Communication in LTE-Advanced Networks: Issues and Approaches
24/30
2. Gateway Access: Adding an intermediate device to the LTE infrastructure which can help
in managing the high volume data between the eNodeB and M2M devices. This type of
access worth studying especially when we want to apply the QOS for H2H and M2M
traffic.
LTE-A NETWORK ACCESS METHODS AND RESEARCH CHALLENGE23/27
Random Access for Machine-to-Machine Communication in LTE-Advanced Networks: Issues and Approaches
25/30
3. Coordinator Access: In this type of access,
the M2M devices will be collected in one
group and sent to the eNodeB which will
result in reducing the signaling messages.
One M2M device will be selected to play
the role of temporary M2M gateway for
collecting the adjacent devices. Here the
challenging task is to develop an adaptive
algorithm for preamble allocation which
improves the overall network performance
(e.g., "Clustering Techniques“)
LTE-A NETWORK ACCESS METHODS AND RESEARCH CHALLENGE24/27
Random Access for Machine-to-Machine Communication in LTE-Advanced Networks: Issues and Approaches
26/30
Research challenges:
1. PRACH overload control (Massive number of devices influence on RACH
mechanism):massive access requests by M2m devices can overload the PRACH, yielding
an increase of the contention probability and, in turn, of the access delay and failure
rate.
2. Quality of service (QoS) provisioning: Both H2H and MTC devices will contend for their
data transmission channel using the same set of PRACHs. However, the MTC devices
should not collide with H2H devices and at the same time need to satisfy their own QoS
requirements.
3. Tackling energy efficiency : Group management and addressing (i.e., selection of a
group coordinator) of MTC devices could be vital for M2M communication. Therefore we
will have in such mechanisms a low power consumption because it allow multiple
devices data to be aggregated and sent all together.
4. LTE-A inefficient radio resource utilization: M2M devices are made to send smaller
packets than the H2H devices, therefore granting a one PRB for one M2M device will not
be efficient and it will result in overload congestion and wasting of resources.
LTE-A NETWORK ACCESS METHODS AND RESEARCH CHALLENGE25/2727/30
1. Access Class Barring (ACB) scheme: All UEs are members of one out of ten randomly
allocated mobile populations, defined as Access Classes (AC) 0 to 9. The population
number is stored in the SIM/USIM.
a. AC"0" to AC"9”: Represents Normal devices.
b. AC"10”: Represents Emergency calls.
c. AC"11" to AC"15": Represents specific high priority services.
2. RACH resource separation scheme: two approaches for resources allocation:
• Available RA Preambles are divided into two groups:
a. First Group: for M2M devices.
b. Second Group: for H2H devices.
• Available RA Preambles are divided into two groups:
a. First Group: for M2M devices.
b. Second Group: for M2M and H2H devices.
RACH OVERLOAD CONTROL MECHANISMS. 26/2728/30
3. Dynamic resource allocation: The Resources are allocated between both H2H and M2M
devices in a shared dynamic mechanism based on access requests (i.e. No dedication for
any resources).
4. Pull-based scheme: This is a centralize mechanism which let the EnodeB to control the
M2M devices based on the congestion and resources available. The M2M devices
initiates their RA requests when they receive a paging message from the EnodeB.
5. M2M-specific back off scheme: The backoff scheme counteracts the PRACH overload by
distributing different certain delays on RA attempts based on the device type.
6. Grouping or clustering scheme: UEs are grouped based on QoS applications or based on
their geographical locations. One device will be the coordinator of one group which will
play the role of relay agent and communicate with their EnodeB.
RACH OVERLOAD CONTROL MECHANISMS. 27/2729/30
RACH Procedures

More Related Content

What's hot

RACH procedure in LTE
RACH procedure in LTERACH procedure in LTE
RACH procedure in LTEdebamoha
 
Simplified Call Flow Signaling: Registration - The Attach Procedure
Simplified Call Flow Signaling: Registration - The Attach ProcedureSimplified Call Flow Signaling: Registration - The Attach Procedure
Simplified Call Flow Signaling: Registration - The Attach Procedure3G4G
 
Call flow and MS attach in LTE
Call flow and MS attach in LTECall flow and MS attach in LTE
Call flow and MS attach in LTEShashank Asthana
 
Lte basic parameters
Lte basic parametersLte basic parameters
Lte basic parametersLinh Phạm
 
3 lte mac_rrc(조봉열)
3 lte mac_rrc(조봉열)3 lte mac_rrc(조봉열)
3 lte mac_rrc(조봉열)Dattaraj Pangam
 
LTE RADIO PROTOCOLS
LTE RADIO PROTOCOLSLTE RADIO PROTOCOLS
LTE RADIO PROTOCOLSbrkavyashree
 
Lte power control
Lte power controlLte power control
Lte power controlPranay Akul
 
E2 e+call+setup+time+(cst)+enhacenments p3_benchmarking
E2 e+call+setup+time+(cst)+enhacenments p3_benchmarkingE2 e+call+setup+time+(cst)+enhacenments p3_benchmarking
E2 e+call+setup+time+(cst)+enhacenments p3_benchmarkingOtseakemhe
 
Lte network planning huawei technologies
Lte network planning huawei technologiesLte network planning huawei technologies
Lte network planning huawei technologiesChaudary Imran
 
rrc-procedures-in-lte
rrc-procedures-in-lterrc-procedures-in-lte
rrc-procedures-in-lteMorg
 
Lte random-access-procedure
Lte random-access-procedureLte random-access-procedure
Lte random-access-procedurePrashant Sengar
 
Interworking wcdma to lte
Interworking wcdma to lteInterworking wcdma to lte
Interworking wcdma to ltebahar
 
Huawei - Access failures troubleshooting work shop
Huawei - Access failures troubleshooting work shopHuawei - Access failures troubleshooting work shop
Huawei - Access failures troubleshooting work shopnavaidkhan
 
Lte ue initial attach & detach from networkx
Lte ue initial attach & detach from networkxLte ue initial attach & detach from networkx
Lte ue initial attach & detach from networkxtharinduwije
 
AIRCOM LTE Webinar 5 - LTE Capacity
AIRCOM LTE Webinar 5 - LTE CapacityAIRCOM LTE Webinar 5 - LTE Capacity
AIRCOM LTE Webinar 5 - LTE CapacityAIRCOM International
 
Ericsson important optimization parameters
Ericsson important optimization parametersEricsson important optimization parameters
Ericsson important optimization parametersPagla Knight
 

What's hot (20)

RACH procedure in LTE
RACH procedure in LTERACH procedure in LTE
RACH procedure in LTE
 
Simplified Call Flow Signaling: Registration - The Attach Procedure
Simplified Call Flow Signaling: Registration - The Attach ProcedureSimplified Call Flow Signaling: Registration - The Attach Procedure
Simplified Call Flow Signaling: Registration - The Attach Procedure
 
Call flow and MS attach in LTE
Call flow and MS attach in LTECall flow and MS attach in LTE
Call flow and MS attach in LTE
 
Lte basic parameters
Lte basic parametersLte basic parameters
Lte basic parameters
 
3 lte mac_rrc(조봉열)
3 lte mac_rrc(조봉열)3 lte mac_rrc(조봉열)
3 lte mac_rrc(조봉열)
 
LTE RADIO PROTOCOLS
LTE RADIO PROTOCOLSLTE RADIO PROTOCOLS
LTE RADIO PROTOCOLS
 
Drx in rrc idle
Drx in rrc idleDrx in rrc idle
Drx in rrc idle
 
Lte power control
Lte power controlLte power control
Lte power control
 
E2 e+call+setup+time+(cst)+enhacenments p3_benchmarking
E2 e+call+setup+time+(cst)+enhacenments p3_benchmarkingE2 e+call+setup+time+(cst)+enhacenments p3_benchmarking
E2 e+call+setup+time+(cst)+enhacenments p3_benchmarking
 
Lte network planning huawei technologies
Lte network planning huawei technologiesLte network planning huawei technologies
Lte network planning huawei technologies
 
Lte signaling
Lte signalingLte signaling
Lte signaling
 
rrc-procedures-in-lte
rrc-procedures-in-lterrc-procedures-in-lte
rrc-procedures-in-lte
 
Lte random-access-procedure
Lte random-access-procedureLte random-access-procedure
Lte random-access-procedure
 
Interworking wcdma to lte
Interworking wcdma to lteInterworking wcdma to lte
Interworking wcdma to lte
 
Paging in LTE
Paging in LTEPaging in LTE
Paging in LTE
 
Huawei - Access failures troubleshooting work shop
Huawei - Access failures troubleshooting work shopHuawei - Access failures troubleshooting work shop
Huawei - Access failures troubleshooting work shop
 
Lte ue initial attach & detach from networkx
Lte ue initial attach & detach from networkxLte ue initial attach & detach from networkx
Lte ue initial attach & detach from networkx
 
AIRCOM LTE Webinar 5 - LTE Capacity
AIRCOM LTE Webinar 5 - LTE CapacityAIRCOM LTE Webinar 5 - LTE Capacity
AIRCOM LTE Webinar 5 - LTE Capacity
 
Ericsson important optimization parameters
Ericsson important optimization parametersEricsson important optimization parameters
Ericsson important optimization parameters
 
LTE KPI
LTE KPILTE KPI
LTE KPI
 

Similar to RACH Procedures

5G PRACH Document-KPIs Improvemnt and understanding
5G PRACH Document-KPIs Improvemnt and understanding5G PRACH Document-KPIs Improvemnt and understanding
5G PRACH Document-KPIs Improvemnt and understandingQasimQadir3
 
Root_Sequence_Planning_RACH.pptx
Root_Sequence_Planning_RACH.pptxRoot_Sequence_Planning_RACH.pptx
Root_Sequence_Planning_RACH.pptxtahir620643
 
Intial acquisition sib rach_tlw_final ppt
Intial acquisition sib rach_tlw_final pptIntial acquisition sib rach_tlw_final ppt
Intial acquisition sib rach_tlw_final pptSATHISHHCHALAMALA
 
11_RA4120BEN50GLA0_Initial_Parameter_Planning .pptx
11_RA4120BEN50GLA0_Initial_Parameter_Planning .pptx11_RA4120BEN50GLA0_Initial_Parameter_Planning .pptx
11_RA4120BEN50GLA0_Initial_Parameter_Planning .pptxMrrRith2
 
Multithreading computer architecture
 Multithreading computer architecture  Multithreading computer architecture
Multithreading computer architecture Haris456
 
Satellite communications notes.thurd module
Satellite communications notes.thurd moduleSatellite communications notes.thurd module
Satellite communications notes.thurd modulesimranbisti
 
8. TDM Mux_Demux.pdf
8. TDM Mux_Demux.pdf8. TDM Mux_Demux.pdf
8. TDM Mux_Demux.pdfTabrezahmed39
 
Ad-Hoc Wireless Network
Ad-Hoc Wireless NetworkAd-Hoc Wireless Network
Ad-Hoc Wireless Networkmdfarhanh1
 
Network layer Part 7
Network layer Part 7Network layer Part 7
Network layer Part 7Tutun Juhana
 
Wireless Sensor Network
Wireless Sensor Network Wireless Sensor Network
Wireless Sensor Network Dr Praveen Jain
 
305090798 04-basic-parameter-planning-rules-v1-1
305090798 04-basic-parameter-planning-rules-v1-1305090798 04-basic-parameter-planning-rules-v1-1
305090798 04-basic-parameter-planning-rules-v1-1Nitin George Thomas
 
Ultra sonic sensor network communicating using NRF 24L01 radio
Ultra sonic sensor network communicating using NRF 24L01 radioUltra sonic sensor network communicating using NRF 24L01 radio
Ultra sonic sensor network communicating using NRF 24L01 radioAshok Raj
 
Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)Tutun Juhana
 

Similar to RACH Procedures (20)

5G PRACH Document-KPIs Improvemnt and understanding
5G PRACH Document-KPIs Improvemnt and understanding5G PRACH Document-KPIs Improvemnt and understanding
5G PRACH Document-KPIs Improvemnt and understanding
 
Root_Sequence_Planning_RACH.pptx
Root_Sequence_Planning_RACH.pptxRoot_Sequence_Planning_RACH.pptx
Root_Sequence_Planning_RACH.pptx
 
Intial acquisition sib rach_tlw_final ppt
Intial acquisition sib rach_tlw_final pptIntial acquisition sib rach_tlw_final ppt
Intial acquisition sib rach_tlw_final ppt
 
LTE Air Interface
LTE Air InterfaceLTE Air Interface
LTE Air Interface
 
11_RA4120BEN50GLA0_Initial_Parameter_Planning .pptx
11_RA4120BEN50GLA0_Initial_Parameter_Planning .pptx11_RA4120BEN50GLA0_Initial_Parameter_Planning .pptx
11_RA4120BEN50GLA0_Initial_Parameter_Planning .pptx
 
Multithreading computer architecture
 Multithreading computer architecture  Multithreading computer architecture
Multithreading computer architecture
 
Satellite communications notes.thurd module
Satellite communications notes.thurd moduleSatellite communications notes.thurd module
Satellite communications notes.thurd module
 
8. TDM Mux_Demux.pdf
8. TDM Mux_Demux.pdf8. TDM Mux_Demux.pdf
8. TDM Mux_Demux.pdf
 
Ad-Hoc Wireless Network
Ad-Hoc Wireless NetworkAd-Hoc Wireless Network
Ad-Hoc Wireless Network
 
Network layer Part 7
Network layer Part 7Network layer Part 7
Network layer Part 7
 
Wireless Sensor Network
Wireless Sensor Network Wireless Sensor Network
Wireless Sensor Network
 
305090798 04-basic-parameter-planning-rules-v1-1
305090798 04-basic-parameter-planning-rules-v1-1305090798 04-basic-parameter-planning-rules-v1-1
305090798 04-basic-parameter-planning-rules-v1-1
 
Wsn protocols
Wsn protocolsWsn protocols
Wsn protocols
 
final14-4
final14-4final14-4
final14-4
 
Ultra sonic sensor network communicating using NRF 24L01 radio
Ultra sonic sensor network communicating using NRF 24L01 radioUltra sonic sensor network communicating using NRF 24L01 radio
Ultra sonic sensor network communicating using NRF 24L01 radio
 
Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)
 
Mo cs call_flow
Mo cs call_flowMo cs call_flow
Mo cs call_flow
 
9_Network.ppt
9_Network.ppt9_Network.ppt
9_Network.ppt
 
serial.ppt
serial.pptserial.ppt
serial.ppt
 
serial.ppt
serial.pptserial.ppt
serial.ppt
 

Recently uploaded

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 

RACH Procedures

  • 1. RACH : Random Access Channel Done by: Issa Haidar Supervised by : Dr. Hani el Fawal Date : 13-4-2017 1/30
  • 2. • RACH: Random access channel • Why RACH in uplink? • RACH procedures • Random Access Slots • What is a Preamble? • Preamble Structure • Preamble format • Zadoff–Chu (ZC) sequence • 64 Preamble generation • Why only 64? • Preamble timing and Preamble type Determination • RACH Contention based procedure • Collisions in contention based procedure • RACH PROCEDURE OVERLOAD PROBLEM DESCRIPTION • LTE-A NETWORK ACCESS METHODS AND RESEARCH CHALLENGE • RACH OVERLOAD CONTROL MECHANISMS. Contents http://patentimages.storage.googleapis.com/US7286841B2/US07286841-20071023-D00002.png 0/272/30
  • 3. • What is RACH?! The Random Access Channel (RACH) is an uplink channel in mobile communication system that is used to transfer control information from a mobile terminal to the network( Not to carrry data). • Rach Purpose: 1. To get uplink Synchronization. 2. To Obtain the resource for Message 3 (e.g, RRC Connection Request) RACH : Random Access Channel http://patentimages.storage.googleapis.com/US7286841B2/US07286841-20071023-D00002.png 1/273/30
  • 4. • Why we don’t use RACH in Downlink!? • In LTE, the synchronization in downlink achieved by the special synchronization channel .This downlink sync signal gets broadcasted to everybody and it is get transmitted all the time with a certain interval. • Synchronization in Uplink : • Broadcasting /always-on synchronization mechanism is not efficient (actually waste of energy and causing a lot of interference to other UEs) if UE is using this kind of broadcasting/always-on synchronization mechanism. Why RACH In Uplink? 2/274/30
  • 5. • Contention free procedure is under the full control of the eNodeB in order to avoid delayed-constrained access requests therefore M2M devices will have no effect on such traffic. RACH Procedures http://1.bp.blogspot.com/-aZpu6gP-nvw/UX5RdMRRkSI/AAAAAAAAErQ/WrBB44HaAkc/s1600/RACH+Type.png 3/27 • Occurs in Connected Mode: i. Handover Process ii. Radio Link Failure • Occurs in idle mode when UE doesn’t have uplink resources yet - Initial access 5/30
  • 6. RACH Procedure 4/27 • In Rach , the UE should choose a unique signiture( Preamble )randomly from the 64 Preambles that are provided by the EnodeB in order to allow this UE to get access to the network. • RA preamble is sent in one Random Access (RA) slot. • Because of the random choosing and the huge number of UEs that will try to get access, a possibility may occur and two UEs may take the same PREAMBLE which will result one of the two UEs to have failure in connection, this issue is solved in Contention based procedure. 6/30
  • 7. • Random Acces channel is divided into Random Access slots ( RA slots). • These RA slots are periodic time-frequency resources in the uplink channel which are reserved to allow the UE to send its access requests ( preamble). • Devices randomly select among these RA slots opportunities to transmit the preamble • Each RA slot consists of 6 Rbs in frequency domain with 1.08MHz bandwidth (180 KHz x 6) and a duration of 1/2/3 ms in time domain depending on the preamble format. . Random Access Slots 5/277/30
  • 8. • The RA-slots for PRACH are multiplexed with the Physical Uplink Shared Channel (PUSCH) and the Physical Uplink Control Channel (PUCCH) as illustrated in the figure. Random Access Slots 6/278/30
  • 9. • Preamble: is a signature used by devices to request access to the network. • The random access preamble is generated using Zadoff-Chu sequences; From each root sequence, multiple preambles can be obtained by applying different cyclic shifts. • If all the preambles are generated from the same root sequence they are orthogonal to each other. In such case, different preambles from multiple M2M Devices can be detected by the eNodeB when they are transmitted in the same cell at the same time. Preamble? 7/27 • Occurs in Connected Mode: i. Handover Process ii. Radio Link Failure • Occurs in idle mode when UE doesn’t have uplink resources yet - Initial access 9/30
  • 10. • A Zadoff–Chu (ZC) sequence, a spreading code functions and complex valued mathematical sequence(It is a sequence of special number) which they are generated by a specific formula in which it generates a family of those sequences. • A generated Zadoff–Chu sequence that has not been shifted is known as a "root sequence. • Each sequence contains 31 terms • Property 1: A ZC sequence has constant amplitude. The constant amplitude property limits the Peak-to-Average Power Ratio (PAPR). In addition. Constant amplitude is desired over wireless channel as it places lesser strain on the power amplifier for transmission. • Property 2: Zero autocorrelation for cyclic shifts means the signals are orthogonal in time. Orthogonality is desired so as to minimize interference between users. Zero auto correlation means the correlative variance between the users is zero, so no interaction or interference between the users. Zadoff–Chu (ZC) sequence, 8/2710/30
  • 11. • Because of the non-synchronization between the uplink UEs; in the time domain, the cyclic prefix (CP) and guard time (GT) are used to avoid interference with the previous and next subframes. Preamble Structure http://1.bp.blogspot.com/-aZpu6gP-nvw/UX5RdMRRkSI/AAAAAAAAErQ/WrBB44HaAkc/s1600/RACH+Type.png 9/2711/30
  • 12. • Preamble Length in Frequency Domain :The preamble has 893 subcarriers with spacing of 1.25KHz instead of 15KHz) (1.25* 839=1.05MHz) . • There will be 15KHz guard band on both the sides and hence it uses total of 1.08MHz (equal to 6 RBs). • Preamble Length in Time Domain including Guard Time (= CP Length + SEQUENCY Length + GT Length) can be 1ms or 2ms or 3ms depending on Preamble Format. • There is a max. of 1 random access preamble per a subframe but more than one UEs can use it. Multiple UEs using same preamble resource allocations are differentiated by their unique preamble sequences. Preamble Structure http://www.rfwireless-world.com/Terminology/LTE-PRACH-Physical-Random-Access-Channel.html 10/2712/30
  • 13. • Preamble has 4 formats and each of these formats varies in length . ( 1ms/2ms/3ms/4ms) Preamble Formats http://1.bp.blogspot.com/-aZpu6gP-nvw/UX5RdMRRkSI/AAAAAAAAErQ/WrBB44HaAkc/s1600/RACH+Type.png 11/27 • Occurs in Connected Mode: i. Handover Process ii. Radio Link Failure 13/30
  • 14. • We have multiple Preamble formats because it’s related to the Cell size: • The larger the cell-size, the longer the preamble to ensure its proper reception. • The longer Time sequence (T_SEQ) would help decoding PRACH under noised condition because it provide longer correlation window to detect PRACH. • Longer CP would give you better tolerance in fading environment and reducing Inter Symbol Interference even in highly fading environment. Preamble Formats http://1.bp.blogspot.com/-aZpu6gP-nvw/UX5RdMRRkSI/AAAAAAAAErQ/WrBB44HaAkc/s1600/RACH+Type.png 12/27 • Occurs in Connected Mode: i. Handover Process ii. Radio Link Failure• Occurs in idle mode when UE doesn’t have uplink resources yet - Initial access 14/30
  • 15. • EXAMPLE: • Let's suppose SIB2 broadcast the parameters as follows: rootSequenceindex = 22 Highspeedflag = false zeroCorrelationZoneConfig = 5 • This rootSequenceIndex is a logical value. The real number (physical number) is called 'u' (the rootSequenceIndex is mapped to u by using a table. • After finding the rootSequenceIndex and mapping it to “u”: you will get the base Zaddoff-Chu sequence with u = 1 . • After some complicated calculations: you will get the Ncs (Cyclicshift interval) = 26 • Now you can get the 64 different PRACH sequence as follows: • • PRACH Sequence[0] = base sequence • PRACH Sequence[1] = do cyclic shift to base sequence by 1 * 26 samples • PRACH Sequence[2] = do cyclic shift to base sequence by 2 * 26 samples • PRACH Sequence[31] = do cyclic shift to base sequence by 31 * 26 samples • • PRACH Sequence[32] = do cyclic shift to base sequence +1 • PRACH Sequence[33] = do cyclic shift to base sequence +1 by 1 * 26 samples • PRACH Sequence[34] = do cyclic shift to base sequence +1 by 2 * 26 samples • PRACH Sequence[63] = do cyclic shift to base sequence+1 by 31 * 26 samples 64 Preambles Generation 13/2715/30
  • 16. • Answer: With one rootsequenceindex UE can able to generate MAX of 64 preambles by doing simple cyclic shift. If it want to generate more than that preambles it is complex to generate preamble sequence ,that is the reason it is restricted to 64. WHY only 64 Preambles?! 14/2716/30
  • 17. 1. How UE know which Preamble format it has to use when it generates PRACH and transmit? 2. Exactly how many RA Slots (Preambles) should be generated per frame? 3. At which time( When) and at which frame and sub frame(Where) a UE is allowed to transmit Preambles? • They are determined by a SIB2 parameter called “prach-ConfigIndex”. • In total, there are 64 possible configurations we will see in the next slide. Preamble timing and Preamble type Determination 15/2717/30
  • 18. • There are, at most, 10 RA slots per LTE frame, one ( RA slot every millisecond). And at least 1 RA resource every 2 LTE frames ( 1 RA slot every 20 ms). Preamble timing and Preamble type Determination Massive Access in the Random Access Channel of LTE for M2M Communications 17/27 Sub frame Sub frame 18/30
  • 19. Preamble timing and Preamble type Determination 16/27 • SFN and subframe Numbers: • The transmitter and receiver should operates in synchronized mode. • In LTE , the clock synchronization between the transmitter and the receiver is the same as our analog clock. • It has two arms: 1. SFN : System Frame Number , is the numbers between 0 and 1023 and its ticks every 10 ms. 2. Sub Frame Number: are the numbers between 0 and 9 which ticks every ticks every 1 ms. Before the transmitter (eNodeB) and the receiver (UE) in LTE start communicating each of other they have to set these two clock arms to be the same number and this synchronization happens during cell search and timing synch process 19/30
  • 20. • Many UE may choose the same preamble that will result in a conflict between them. The RACH procedure has some steps in order to avoid this to happen: 1. Random Access preamble assignment: A UE chooses one RA slot from 64 preambles that are provided by the EnodeB. ( 2 users may take the same Preamble but we will see how it will be solved in step4). 2. Random access Response (RAR): A message response from the EnodeB indicating in it the configurations of the RA slot (time/frequency slot, scheduling). When an UE receives these configurations, it synchronizes its uplink timing and proceeds to the next step. 3. RRC Message: The UE sends a RRC message to EnodeB in order to establish a connection. 4. Contentions Resolution: If the RCC is successuly decoded by the eNodeB, it replies with a contention-resolution message on the PDSCH, echoing the mobile terminal identity (mobile ID) in order to acknowledge the correct reception of its request. Conversely, UEs that do not receive a contention resolution message from the eNodeB assume that their access requests failed and, after waiting a random backoff time, perform a new preamble transmission attempt in the next RA slot. RACH Contention Based Procedure 18/27 RACH Overload Congestion Mechanism for M2M Communication in LTE-A: Issues and Approaches 20/30
  • 21. • Collision at Step1: If two or more devices transmit the same preamble, a collision may occurs and the corresponding requests will not be detected by the eNodeB. Collisions in RACH 19/27 The challenges of M2M massive access in wireless cellular networks 21/30
  • 22. • Step1: UEs choose the same preamble and the eNodeB correctly Detects it. • Step2: EnodeB transmits a Random access response on the PDSCH which includes timing alignment and the PUSCH resources that have been assigned to the UE for the third step RRC connection • Step3: The UEs involved in an undetected preamble collision will transmit over the same PUSCH resource blocks, therefore a new collision will occur and they have to wait for some period and resend the RACH again. Collision at step 3 20/27 The challenges of M2M massive access in wireless cellular networks 22/30
  • 23. • The RA success probability: which is the probability that a preamble sequence does not collide with another preamble sequence; it’s determined by the number of available preamble sequences and the terminal density in a cell. • Problem: Despite of the small packets that are sent from the M2M devices; the Massive number of packets sent may result in: 1. low random access success rate and a high congestion. 2. Unexpected delay, increased packet loss, and high power consumption. 3. inefficient utilization of radio resources. 4. Huge Load when the increased number of devices will attempt to re-access the network after collisions. • Result: the RA procedure in LTE-A will not be efficient in the existence of the massive number of M2M devices and efficient overload control mechanisms are required for RA-based M2M communication. RACH PROCEDURE OVERLOAD PROBLEM DESCRIPTION 21/27 Random Access for Machine-to-Machine Communication in LTE-Advanced Networks: Issues and Approaches 23/30
  • 24. LTE-A NETWORK ACCESS METHODS AND RESEARCH CHALLENGE 22/27 • LTE-A Network Access Methods: European Telecommunications Standards Institute (ETSI) addressed three methods of how to access the LTE-A network: 1. Direct Access: This method will allow both M2M and H2H devices to access the network via eNodeB without the need of any intermediate device which may result in congestion problems when there are no enough resources for the massive number of M2M devices, therefore this access is not suitable. Random Access for Machine-to-Machine Communication in LTE-Advanced Networks: Issues and Approaches 24/30
  • 25. 2. Gateway Access: Adding an intermediate device to the LTE infrastructure which can help in managing the high volume data between the eNodeB and M2M devices. This type of access worth studying especially when we want to apply the QOS for H2H and M2M traffic. LTE-A NETWORK ACCESS METHODS AND RESEARCH CHALLENGE23/27 Random Access for Machine-to-Machine Communication in LTE-Advanced Networks: Issues and Approaches 25/30
  • 26. 3. Coordinator Access: In this type of access, the M2M devices will be collected in one group and sent to the eNodeB which will result in reducing the signaling messages. One M2M device will be selected to play the role of temporary M2M gateway for collecting the adjacent devices. Here the challenging task is to develop an adaptive algorithm for preamble allocation which improves the overall network performance (e.g., "Clustering Techniques“) LTE-A NETWORK ACCESS METHODS AND RESEARCH CHALLENGE24/27 Random Access for Machine-to-Machine Communication in LTE-Advanced Networks: Issues and Approaches 26/30
  • 27. Research challenges: 1. PRACH overload control (Massive number of devices influence on RACH mechanism):massive access requests by M2m devices can overload the PRACH, yielding an increase of the contention probability and, in turn, of the access delay and failure rate. 2. Quality of service (QoS) provisioning: Both H2H and MTC devices will contend for their data transmission channel using the same set of PRACHs. However, the MTC devices should not collide with H2H devices and at the same time need to satisfy their own QoS requirements. 3. Tackling energy efficiency : Group management and addressing (i.e., selection of a group coordinator) of MTC devices could be vital for M2M communication. Therefore we will have in such mechanisms a low power consumption because it allow multiple devices data to be aggregated and sent all together. 4. LTE-A inefficient radio resource utilization: M2M devices are made to send smaller packets than the H2H devices, therefore granting a one PRB for one M2M device will not be efficient and it will result in overload congestion and wasting of resources. LTE-A NETWORK ACCESS METHODS AND RESEARCH CHALLENGE25/2727/30
  • 28. 1. Access Class Barring (ACB) scheme: All UEs are members of one out of ten randomly allocated mobile populations, defined as Access Classes (AC) 0 to 9. The population number is stored in the SIM/USIM. a. AC"0" to AC"9”: Represents Normal devices. b. AC"10”: Represents Emergency calls. c. AC"11" to AC"15": Represents specific high priority services. 2. RACH resource separation scheme: two approaches for resources allocation: • Available RA Preambles are divided into two groups: a. First Group: for M2M devices. b. Second Group: for H2H devices. • Available RA Preambles are divided into two groups: a. First Group: for M2M devices. b. Second Group: for M2M and H2H devices. RACH OVERLOAD CONTROL MECHANISMS. 26/2728/30
  • 29. 3. Dynamic resource allocation: The Resources are allocated between both H2H and M2M devices in a shared dynamic mechanism based on access requests (i.e. No dedication for any resources). 4. Pull-based scheme: This is a centralize mechanism which let the EnodeB to control the M2M devices based on the congestion and resources available. The M2M devices initiates their RA requests when they receive a paging message from the EnodeB. 5. M2M-specific back off scheme: The backoff scheme counteracts the PRACH overload by distributing different certain delays on RA attempts based on the device type. 6. Grouping or clustering scheme: UEs are grouped based on QoS applications or based on their geographical locations. One device will be the coordinator of one group which will play the role of relay agent and communicate with their EnodeB. RACH OVERLOAD CONTROL MECHANISMS. 27/2729/30