Research Article
An Improved LTE RACH Protocol for M2M Applications
Table 1
Comparison of LTE RACH approaches.
| Solution | References | Metric | Validation | Traffic | Type | Subtype | Access delay | Access success probability | Simulation | M2M | H2H |
| Optimized MAC | Preceded preamble | [2] | Ok | — | — | — | — | Data in message 3 | [2] | Ok | — | — | — | — |
| Access class barring schemes | Individual ACB scaling | [4] | Ok | Ok | — | — | — | Extended Access Barring | [9] | Ok | Ok | Ok | Ok | Ok |
| Other solutions | Dynamic allocation of RACH resources | [3] | Ok | Ok | Ok | Ok | — | Slotted access | [5] | Ok | — | — | — | — | Prioritized Random Access | [6] | Ok | Ok | Ok | Ok | Ok | Self-Optimizing Overload Control | [7] | Ok | Ok | — | — | — | Code-expanded RA | [8] | Ok | — | — | Ok | — |
|
|