Papers
Topics
Authors
Recent
Search
2000 character limit reached

Downlink Massive Random Access (DMRA)

Updated 29 January 2026
  • Downlink Massive Random Access (DMRA) is a communication paradigm where a base station sends a common message that allows each of k active users (out of n) to independently recover its unique data.
  • Techniques like random codebook construction and covering array methods reduce the identity overhead from O(k log n) to O(log k) or even O(1), especially for i.i.d. or uniform source distributions.
  • The integration of DMRA with massive MIMO beamforming and ARQ protocols enables scalable, low-latency, and reliable downlink transmissions, with overhead bounds independent of the total user pool size.

Downlink Massive Random Access (DMRA) refers to the setting in which a base station communicates individual messages or data symbols to a randomly selected, typically small, subset of active users among an extremely large pool of total users, by transmitting a single common downlink message. The DMRA paradigm arises in large-scale wireless networks and IoT scenarios requiring efficient downlink one-to-many communication, where each active user must recover its unique intended message given only the common broadcast and its own identity, without knowledge of the other active users or their messages.

1. Problem Formulation and Mathematical Structure

Let nn be the total user pool, from which knk \ll n users are randomly activated in each communication epoch. The set of active user indices is denoted

A=(A1,,Ak)A(n,k),A(n,k)={a[n]k:aiajij}.\mathbf{A} = (A_1, \ldots, A_k) \in \mathcal{A}^{(n,k)}, \qquad \mathcal{A}^{(n,k)} = \{\mathbf{a} \in [n]^k: a_i \ne a_j \,\, \forall i \ne j\}.

The base station (BS) has kk independent information symbols X=(X1,,Xk)\mathbf{X} = (X_1, \ldots, X_k), intended respectively for A1,,AkA_1, \ldots, A_k. The task is to construct a single common message M{0,1}M \in \{0,1\}^* such that each active user uu can recover its unique message XiX_i solely from its own index uu and the common MM.

Formally, an encoder f:Xk×A(n,k){1,2,}f: \mathcal{X}^k \times \mathcal{A}^{(n,k)} \to \{1,2,\dots\} is defined, with user-specific decoder dud_u guaranteeing

dAi(f(x,a))=xi(x,a),i=1,,k.d_{A_i}\bigl(f(\mathbf{x}, \mathbf{a})\bigr) = x_i \quad \forall (\mathbf{x}, \mathbf{a}),\, i=1,\ldots,k.

The minimal achievable rate is R=minH(f(X,A))R^* = \min H(f(\mathbf{X}, \mathbf{A})), where entropy coding is applied to ff.

This model encapsulates the key DMRA statistical challenge: efficiently mapping (X,A)(\mathbf{X}, \mathbf{A}) into MM so per-user retrieval is guaranteed without revealing the entire active set.

2. Identity-Encoding Overhead and Its Elimination

The naive DMRA coding strategy explicitly labels each source symbol with the recipient's index, incurring an overhead of klog2nk \log_2 n bits for active user identities, plus H(X1,,Xk)H(X_1,\dots,X_k) bits for the joint symbols. For n1n \gg 1, this identity-overhead dominates and rapidly becomes prohibitive (Song et al., 2024).

However, DMRA exploits statistical symmetries to eliminate this dependence on nn. When the sources are i.i.d., one can design coding schemes where identity-overhead depends only on kk or even disappears entirely:

  • i.i.d. sources: Overhead is at most O(logk)O(\log k) bits.
  • Uniform i.i.d. sources: Overhead is O(1)O(1) bits for large kk.
  • Exchangeable distributions: Overhead is O(k)O(k) bits; for finite-alphabet exchangeable sources, O(logk)O(\log k) bits.

The elimination of nn-dependence relies critically on symmetry properties of the message assignment and codebook construction.

3. Coding Techniques: Probabilistic and Deterministic Methods

Random Codebook Construction

For i.i.d. sources X1,,Xkp(x)X_1, \dots, X_k \sim p(x), a random codebook {c(t)}\{\mathbf{c}^{(t)}\} is constructed by sampling (nn-dimensional) codewords i.i.d. from p(x)p(x). The encoder selects the smallest index tt such that for all ii, cAi(t)=Xic^{(t)}_{A_i} = X_i. The number of required bits for tt is shown to satisfy

RkH(p)+log(kH(p)+1)+1,R^* \leq k H(p) + \log(k H(p) + 1) + 1,

demonstrating O(logk)O(\log k) identity-overhead (Song et al., 2024).

Covering Array Constructions

Recent work recognizes DMRA coding as a covering array problem: for alphabet-size qq, a covering array CA(M;k,n,q)CA(M; k, n, q) is constructed such that for every choice of kk distinct columns and every qq-ary kk-tuple, there is at least one row corresponding to that pattern. The mapping is deterministic: the encoder picks the first covering row matching the message pattern, and the index mm is encoded.

A strict upper bound on the expected codeword length is shown to be klog2q+1+log2ek \log_2 q + 1 + \log_2 e bits, independent of nn (Liao et al., 22 Jan 2026). The covering array method thus provides explicit, deterministic codes with tight overhead bounds.

Key Comparison Table

Coding Scheme Overhead Dependencies
Naive (explicit ID) klog2nk\log_2 n nn
Random codebook O(logk)O(\log k) / O(1)O(1) kk
Covering array klog2q+1+log2ek\log_2 q + 1 + \log_2 e kk, qq

The explicit covering array approach is comparable to probabilistic random coding but yields explicit codebooks and a deterministic worst-case overhead (Liao et al., 22 Jan 2026).

4. Exchangeability, Source Distributions, and Connection to de Finetti

If the message assignment exhibits exchangeable structure (the joint law of (X1,,Xk)(X_1, \ldots, X_k) is invariant under permutations), the rate can be bounded by

RH(X)+D(pq)+log(H(X)+D(pq)+1)+1,R^* \leq H(\mathbf{X}) + D\bigl(p\|q\bigr) + \log(H(\mathbf{X}) + D(p\|q) + 1) + 1,

where qq is an i.i.d. mixture law and D(pq)D(p\|q) denotes the KL divergence. For urn-based codebooks, D(pq)min{kloge,Xlog(k+1)}D(p\|q) \leq \min\{k\log e, |\mathcal{X}| \log(k+1)\}, giving overhead O(k)O(k) or O(logk)O(\log k) for finite alphabets (Song et al., 2024).

A major conceptual contribution is the connection to the finite de Finetti theorem, providing KL divergence bounds between finite exchangeable and i.i.d. mixture distributions. For dd-extendable exchangeable sources,

D(pq)min{log(dkdk),(X1)log(d1dk)}D(p\|q) \leq \min\left\{\log\left(\frac{d^k}{d^{\underline{k}}}\right), (|\mathcal{X}|-1)\log\left(\frac{d-1}{d-k}\right)\right\}

vanishes as dd \to \infty for fixed kk—recovering classical results in the limit.

This connection underpins the scaling-optimality of the coding schemes in DMRA, substantiating their fundamental rate bounds.

In two-way random access (IoT, wireless access), acknowledgment (ACK) messages must confirm successful packet delivery to active users. Listing identities in the ACK would require Blog2ΩB \geq \log_2|\Omega| bits where Ω|\Omega| is the number of possible decoded user subsets, incurring large overhead. Efficient joint encoding allows a negligible increase in BB by permitting a small false-positive rate ϵfp\epsilon_{fp}:

Blog2Ωlog2(1ϵ)B \geq \log_2 |\Omega| - \log_2(1 - \epsilon)

(Kalør et al., 2022). For practical settings (e.g., K=104K=10^4, A=100A=100), allowing ϵfp=1%\epsilon_{fp}=1\% increases BB by only 0.014\approx 0.014 bits, while reducing failure probability by over 8×8\times.

Multiround ARQ, in which users retransmit unless positively ACKed, achieves per-user failure rates as low as 10310^{-3}10410^{-4} and mean retransmission count E[L]1.05E[L] \approx 1.05 (Kalør et al., 2022). The approach is robust under massive user populations and stringent reliability needs.

6. Physical-Layer DMRA and Massive MIMO Beamforming

In crowded TDD massive-MIMO systems, DMRA is operationalized through uplink random access (RA), timing advance (TA) estimation, user grouping, and downlink random access response (RAR) beamforming (Mukherjee et al., 2018). The base station uses Zadoff–Chu sequence correlators to detect RA preambles, estimates group-common TA, and assigns users into spatial groups based on delay spread overlap.

For each group, a short RAR packet (24 bits) is BPSK-modulated and beamformed onto designated subcarriers. Maximum ratio transmission (MRT) is applied using per-group channel estimates. Per-user transmit and RAR beamforming power scales down as 1/M1/\sqrt{M} for MM base station antennas (yielding 1.5\approx 1.5 dB gain per doubling):

pu1/M,PT1/M.p_u \propto 1/\sqrt{M}, \quad P_T \propto 1/\sqrt{M}.

Group RAR transmission resolves preamble collisions, reduces access latency, and increases reliability compared to LTE-like protocols. All processing steps scale linearly in MM, making the approach practical for hundreds of antennas.

7. Practical Implications, Limitations, and Open Problems

The theory and explicit constructions show DMRA overhead can be bounded independently of nn, provided suitable codebooks—random or covering-array-based—are used. The per-user overhead can be held below $2.443$ bits (1+log2e1 + \log_2 e) (Liao et al., 22 Jan 2026). In practice, for large nn one can use log2M=O(loglogn)\lceil \log_2 M \rceil = O(\log \log n)-bit indexes.

Limitations include computational cost and storage for covering arrays with large kk or qq, and lack of structure complicating rapid addressing. Efficient algebraic constructions and joint source–channel coding extensions remain open research directions. A plausible implication is that integrating these combinatorial codes with channel coding could further reduce overall overhead in noisy environments.

8. Summary of Fundamental DMRA Rate Limits

The key DMRA rate overheads beyond H(X)H(\mathbf{X}) are:

  • i.i.d. sources: O(logk)O(\log k), O(1)O(1) if uniform.
  • Arbitrary exchangeable: O(k)O(k).
  • Finite-alphabet exchangeable: O(logk)O(\log k).
  • dd-extendable exchangeable: log(dk/dk)=O(k2/d)\log(d^k / d^{\underline{k}}) = O(k^2/d), vanishes as k2dk^2 \ll d.

These results establish the DMRA regime as supporting scalable, practical, and rate-optimal one-shot downlink schemes, independent of user pool size and fundamentally governed by the statistical properties of the source assignment and codebook construction (Song et al., 2024, Liao et al., 22 Jan 2026).

Topic to Video (Beta)

Whiteboard

Follow Topic

Get notified by email when new papers are published related to Downlink Massive Random Access (DMRA).