Research Article

An Improved LTE RACH Protocol for M2M Applications

Table 1

Comparison of LTE RACH approaches.

⁢Solution ReferencesMetricValidationTraffic
TypeSubtypeAccess delayAccess success probabilitySimulationM2MH2H

Optimized MACPreceded preamble[2]Ok
Data in message 3[2]Ok

Access class barring schemesIndividual ACB scaling[4]OkOk
Extended Access Barring[9]OkOkOkOkOk

Other solutionsDynamic allocation of RACH resources[3]OkOkOkOk
Slotted access[5]Ok
Prioritized Random Access[6]OkOkOkOkOk
Self-Optimizing Overload Control[7]OkOk
Code-expanded RA[8]OkOk