A Survey on Multipacket Reception for Wireless Random Access Networks

. Multipacket reception (MPR) is the capability of simultaneous decoding of more than one packet from multiple concurrent transmissions. Continuous investigations on increasing the reception capability are giving new scientiﬁc contributions. In this paper, we provide an overview of MPR-related research work covering (1) the theoretically proved impacts and advantages of using MPR from a channel perspective to network capacity and throughput; (2) the various technologies that enable MPR from transmitter, transreceiver, and receiver perspectives; (3) previous work on protocol improvement to better exploit MPR. Indeed, MPR approaches have been applied in modern wireless mobile systems but the focus of this paper is to discuss MPR in random access wireless networks. Using MPR in such multihop environments calls for new adaptation on protocols, especially a cross-layer approach. To this end, we detail a scheduling method that targets full utilization of MPR capability.


Introduction
In the past decade, wireless technologies have become key technologies, offering mobile and flexible communications for industries, enterprises and individuals.Unlike a wired network where various kinds of physical connection, over copper, or fiber optics are used, nodes in a wireless network send information to each other sharing the common medium, air.An analogy to the problem is that people want to communicate with each other during a meeting in a room.The key is how to organize the conversations in this small room to let people get as much information as they can.This organization is known as medium access control.The most common assumption is that if several people talk at the same time, their voices will all be perturbed and communication will fail.There are two models for this common phenomenon.(1) From a channel-based point of view, the room is a single communication channel and the key is to enable multiple signals to occupy this channel.There are three basic types of techniques: Time-Division Multiple Access (TDMA), Frequency-Division Multiple Access (FDMA), and Code-Division Multiple Access (CDMA).( 2) From a packet-based point of view, the room is the medium, and any simultaneous transmissions will cause collisions.Traditional medium access controls based on the collision model are viewed as collision recovery (e.g., Aloha), collision avoidance (e.g., CSMA/CA), or collision-free (Token Ring) techniques.
Different methods of analysis are used for different networks; a channel-based approach is often used for telecommunication systems such as wireless mobile systems, while a packet-based approach has been intensively investigated in computer networks such as wireless random access networks.However, the design of modern communicating systems involves both approaches.The signal processing techniques [3][4][5][6][7] in channel access enable a receiver to decode simultaneous signals from different transmitters.The notion of Multipacket reception (MPR) was also introduced in some of these works [4,5] and is applied in telecommunication systems.It was in [6] that MPR was first discussed for the slotted Aloha protocol and for a random access wireless network.
Why does this have a large impact?MPR subverts the fundamental assumption of a wireless random access network, the collision model.Under the collision model, the capacity of a wireless network is limited mainly by the concurrent Journal of Computer Networks and Communications packet transmissions.Simultaneous transmissions lead to useless collisions and a significant degradation of network throughput, and retransmissions often make the situation even worse.All these disadvantages are related to the receiver capability of Single Packet Reception (SPR).But MPR can totally overturn the collision model by receiving the lost packet in a collision.
After several proposals on channel and medium access protocols on MPR [6][7][8]22] were presented in the 90 s, [23] was a seminal paper, the first to examine MPR, as an interaction between the physical and medium access control layers for a wireless random access network.The MPR node model used in [23] was derived from [6].The MPR capability of a node is modeled by an MPR matrix with conditional probability R n,k that k packets are correctly received given that n packets are transmitted.
The fundamental change of this model compared to the collision model is that the reception can be described by conditional probabilities instead of deterministic failure when simultaneous transmissions occur.
An interesting observation on the recent work on MPR is that significant results have been obtained on the capacity and throughput analysis based on the MPR model, while the enabling MPR technologies are rarely mentioned in these papers.Many studies are based on an assumption that receivers are able to extract, in some optimal way, the signals from multiple transmitters despite the interference with one another.We find an increase of confusion in MPR techniques and how to use MPR techniques.We think that it comes from the gap of channel-based approach and packet-based approach.
One of the purposes of this survey is to clarify MPR enabling techniques by classifying them into transmitter, trans-receiver, and receiver perspectives (Section 3).We expect this survey would help researchers working in related areas to make more realistic hypothesis with the MPR model.The second purpose is to discuss how to use MPR.MPR can bring significant improvement in capacity and throughput (Section 2) but it needs to cope with MAC and the networking layer to achieve real improvement.We will discuss major work on MAC and networking protocol design to exploit MPR (Section 4) and in the same part we detail a scheduling method that targets full utilization of MPR capability using a cross-layer approach.

Impacts of MPR
The MPR matrix given in (1) describes the capability of a receiver through a channel.The weakest MPR is equivalent to a conventional collision channel R 0 , while the strongest MPR R 1 corresponds to the case that all transmitted packets are perfectly received and separated: In between, the form of the MPR matrix depends on the channel conditions, capture models, and signal separation algorithms [23].This MPR matrix was initially proposed to model a multiple reception channel and today it is the usual model for a receiver from the packet access point of view.

One-Hop
Throughput.Let's first discuss the throughput on a node.In [8], the number of successfully received packets in a time slot is defined as the one-hop throughput.It is the MPR channel capacity from the channel-based point of view.It is easy to understand that when we take an arbitrary node, the number of packets that are allowed to go through the node describes exactly the receiver channel characteristics.The average throughput is upper bounded by where R n is the expected number of correctly received packets given that n packets are transmitted.η is defined as the capacity of the MPR channel.
The above statement is validated under saturation traffic.When we consider a Poisson distribution of the intervals between packet arrivals, the following formula should be considered: The maximum stable one-hop throughput of a MPR node with n neighbors using Aloha-like protocols is given by [6].According to (5), the maximum one-hop throughput of the conventional collision model can be obtained as η Aloha = sup λ≥0 e −λ λ by taking R 1 = 1 and R i = 0, i > 1. R i is therefore the only factor that impacts the one-hop throughput in MPR model over conventional collision model.

Spatial Throughput.
The spatial throughput is used to move the focus from one arbitrary node to a packet radio network node.In [9], the authors consider such a network with nodes spatially distributed in the plane according to a Poisson process with parameter λ.A set of assumptions is adopted from [4] to extend the spatial throughput analysis to networks with MPR nodes.
Given the probability p of a node transmitting at a given time slot (in Slotted Aloha), the probability that one node r receives x packets is where A is the event that r does not transmit; therefore P[A] equals (1 − p).P[X = x|A] depends on the probability P[T] of the event T that a sender t transmits in the time slot and the density of the senders, hence the following expression: where r 0 is the transmission range and R n,k is the conditional probability in the MPR matrix (1).According to Equations ( 6) and ( 7), the probability distribution function of X can be obtained.The spatial throughput on receiver r is immediately obtained by taking the expectation of X: If there are N nodes in the network, the local throughput, S, of the network is The spatial local throughput with different values of k is summarized in Figure 1, in which we observe as expected that the MPR feature improves the maximum achievable local throughput.The improvement ratio is close to a liner function of k.

Capacity.
Since 2007, a series of results on capacity improvement by protocol architectures that exploit MPR has been published in [10][11][12].Extensive results for k-MPR and a combination of MPR, multichannel, and multiinterface can be found in [13,24].Hereafter, Θ, O, and Ω stand, respectively, for a tight bound, upper bound and lower bound.
Given n as the number of nodes in the network, Garcia-Luna-Aceves et al. [10] have shown that a 3D random MPRbased wireless network has a capacity gain of Θ(log n).And MPR is proved to achieve a better capacity improvement for wireless ad hoc networks than Network Coding (NC) when the network experiences a single-source multicast and multipair unicasts.
Also assuming that all the transmissions within receiving range can be decoded, they [11] further prove that MPR does increase the order of the transport capacity of random wireless ad hoc networks for multi-pair unicast applications by a factor of Θ(log(log n)) under the SINR (Signal to Interference plus Noise Ratio) model.In [12], energy efficiency is taken into account as a factor to increase the capacity of the network.They showed that λ(n) = Θ(R(n) (1−2/α) /n 1/α ) bits per second constitutes a tight upper and lower bound for the throughput capacity of random wireless ad hoc networks, where α > 2 is the path loss parameter in the physical model, n is the total number of nodes in the network, and R(n) is the MPR receiver range.The MPR achieves a capacity gain of at least Θ((log n) ((α−2)/2α) ) when R(n) = Θ( log n/n) compared to Gupta and Kumar's result.
Several important results on the improvement of k-MPR over collision-based wireless networks (1-MPR) are given in [13].
(i) For an arbitrary k-MPR network, the capacity gain over 1-MPR networks is Θ( (ii) The capacity is Θ(W n ) bit-meter/sec and the network is scalable, when k = Ω(n).
(iii) For random k-MPR networks, the capacity upper bound and lower bound match and the capacity gain over 1-MPR networks is Θ(k) when k = O( log n).
(iv) Even the lower bound has a capacity gain of Θ( log n) when k = Ω(n).
In [25], Wang et al. summarize their work on MPR by presenting a unifying approach for the computation of throughput capacity of wireless ad hoc networks under all data traffic patterns including unicast, multicast, broadcast, and anycast.They use an (n, m, k)-cast formulation, where n, m, and k denote the number of nodes in the network, the number of destinations for each communication group, and the actual number of communication group members that receive the information, respectively.The protocol model in [11] is used.They show that the per source-destination respectively.The most important fact that they proved is that for the minimum value of the received range (R(n) = Ω( log n/n)) required to guarantee network connectivity; the (n, m, k)-cast throughput capacity with MPR has a gain of Θ(log n) compared to the throughput attained with SPR.In Table 1, we recapitulate the theoretical capacity results related to MPR.

Stability.
The majority of capacity and throughput calculations assume that the network is saturated.It is very important in this condition to analyze the stability.The stability relies on whether a maximum stable throughput is reachable, that is, whether the probability of packet buffer overflow can be made arbitrarily small by making the buffer size sufficiently large.In [5], Ghez et al. give two important theorems for the Slotted Aloha network with MPR, (1) If Rn has a limit R = lim n → ∞ R n , then the system is stable for all arrival distributions such that λ < R and is unstable for λ > R.
(2) The system is stable for λ < lim inf n → ∞ R n and unstable for λ > lim sup n → ∞ Rn.
In [26], a general asymmetric MPR model is introduced and the medium-access control (MAC) capacity region is specified.It is shown that the stability region undergoes a phase transition from a concave region to a convex polyhedral region as the MPR capability improves in a twouser system.Furthermore, it is shown that persistent Aloha is also optimal for the symmetric MPR model in a wide range of MPR regimes.
From these two theorems, it is clear that if the number of simultaneous transmissions is greater than the average MPR capacity, the system cannot achieve a maximum stable throughput.Therefore, to exploit MPR, scheduling should still be used among the transmitters.Some recent papers which begin to address this problem [2,19] will be discussed in Section 4.2.
Dua [27] analyzed a one-dimensional Markov chain which captures the evolution of the queue of a typical transmitter in isolation in an MPR system.Both static channels under ideal power control and fading channels under ideal slow power control are studied.He provides sufficient conditions under which the system converges to a unique steady state.And the average delay per packet for an MPR network is given by where η is the effective probability of transmission for a transmitter in steady state Δ is the actual probability for a transmitter with a nonempty queue.In [28,29], the analytical equations for the characteristics of a relay node's queue such as average queue length and stability conditions are studied for the throughput per user.
The authors consider a network with N users sources, one relay node with MPR, and a single destination node with MPR as well.By modeling the relay node's queue with a onedimension Markov Chain, they show that the throughput with N source nodes with a relay node is N times the throughput without a relay: μ total = Nμ, and the throughput is stable if the transmission probability of the relay is bigger than a reference probability Q 0 min that can be computed with the stability condition of the Markov chain.

How to Realize MPR
Significant improvements to both throughput and capacity of a wireless network can be obtained with MPR.There are a number of techniques which allow simultaneous decoding of packets on a receiver but in many papers MPR is said to be realized with CDMA or MIMO.The appearance of these notions together with MPR brings some ambiguities to the understanding of MPR enabling techniques.Examples such as CDMA and MIMO cover a wide range of techniques in signal processing and wireless systems.Give the current research achievements around MPR, it is worthwhile to set up a clear classification of MPR technologies and to exclude misleading notions.To this end, we give a classification based on transmitter perspective, trans-receiver perspective, and receiver perspective.

Transmitter Perspective.
The first class of techniques that enable MPR require a significant effort by the transmitter.Examples such as CDMA and OFDMA fall into this class.CDMA allows multiple users to be multiplexed over the same wireless channel by employing a coding scheme where each transmitter is assigned a code.The baseband signal is multiplexed with a spreading code running at a much higher rate.The spreading code is a pseudorandom code, and all codes used for one channel are orthogonal.Therefore, on the receiver side, an unwanted signal will be eliminated by the cross-correlation decode, and only the relevant signals are conserved.This technique allows the receiver to decode multiple data streams with the different codes that are known a priori.The ability to decode multiple data packets depends on the selection of code.For example, the orthogonality is the key that allows the receiver to decode the set of simultaneous arrived signals, and this is done on the transmitter side.
OFDMA competes with CDMA as a major multiaccess technique.It is used to increase the wireless channel efficiency based on multicarrier modulation methods (in IEEE802.11a,g,n).For each packet, several data streams are transmitted over the subcarrier frequencies as many slowlymodulated narrow-band signals rather than one rapidlymodulated wide-band signal.In OFDMA, the transmitters of a receiver are assigned different OFDM subchannels.Since the sub-channels do not interfere with each other, MPR is enabled on a frequency basis.In [30], the authors describe a many-to-many communication in which the transmissions are divided in frequency to allow the receiver to decode the packets.Again, OFDMA enables MPR with a great effort for the transmitter in sub-channel selection.Furthermore, it Throughput (tight bound) per source-destination Protocol model (graph model) Throughput (lower bound) per source-destination Physical model (SINR model) Throughput (tight bound) per source-destination Multiflow SINR model The BS is MPR in a MIMO system with multiple antennas.
is a pseudo-MPR capability, because the bandwidth is also divided at the same time, when the radio channel is divided into sub-channels.

Transreceiver Perspective.
In this class of techniques, to enable MPR, transmitters and receivers should cooperate on some operations.Multiantenna MIMO system [14] can achieve MPR by exploiting the spatial diversity of the transmissions.In such a system, each antenna corresponds to a different channel characteristic H(t).A packet sent through one antenna can be easily distinguished from one sent with another antenna by channel estimators.In case of a cellular or AP-based wireless network, the communication between Mobile Station (MS) and Base Station (BS) is based on the MPR capability of the BS (Figure 2).The realization of MPR in a multi-antenna MIMO system requires both transmitters and receivers to implement specific functionalities.That is how it differs from pure transmitter-based techniques.
Another type of technique that could in principle be used for MPR is signal separation.The problem of packet separation can be formulated as one of signal separation in a MIMO system.In [31], the authors present Known Modulus Algorithms (KMA) to allow packet separation in asynchronous ad hoc networks.In the algorithm, a transmitter needs to send a constant modulus signal multiplied by an amplitude modulating code known at the receiver and an antenna array is used on the receiver side which can detect and filter out the desired user among the other interfering signals with the help of this modulation code.The modulation code can be a random binary sequence determined either by the transmitter or the receiver.In [32], a variation of KMA, Algebraic KMA (AKMA), is proposed based on a matrix perturbation analysis.Other signal separation techniques based on a Constant Modulus Algorithm (CMA) or Multiple Modulus Algorithm (MMA) [33] require blind equalization and are usually not efficient for MPR.
In [34], the authors propose to use polynomial phasemodulating sequences to provide MPR capability.The algorithm exploits the fact that the baseband signal exhibits cyclostationarity properties, which are induced at the transmitters after modulation with polynomial phase sequences.So the proposed modulation does not expand the bandwidth and can be considered as a color code to distinguish packets from different users.Some resource allocation base techniques fall also in this class.It is mainly based on a network-assisted approach.The network-assisted diversity is firstly introduced in [35] as a technique to separate the collided packets.The collided packets are kept in memory rather than being discarded and are later combined with future retransmissions to extract all the collided information packets.The proposed method is suitable for multiplexing variable-bit-rate sources without affecting the physical layer bit rate parameter of each source.In [36], a bit-map-assisted dynamic queue (BMDQ) protocol is presented.In the proposed protocol, the traffic in the channel is viewed as a flow of transmission periods, each of which has a bit-map slot for user detection so that accurate knowledge of active users can be obtained.To summarize, resource allocation reuses signal processing principles on packet level.

Receiver Perspective.
Next, we present a class of techniques that involve only the receiver for decoding several packets simultaneously.Compared to the previous two classes, this class of solutions comes closer to the ideal of MPR, to shift the responsibility from transmitters to receivers.
The Match Filter (MF) approach is widely used for single user detection.Even though it is not optimal when multiple users are present, still a receiver can use a bank of Match Filters [9] to decode packets coded with spreading codes that need not even be orthogonal.
Techniques used to separate signals for Multiuser Detection (MUD) are more applicable for MPR.That is why many papers [2,[10][11][12] on network capacity with MPR cited it as the technique to realize MPR.It is a way to alleviate Multiple Access Interference (MAI) during the simultaneous transmissions on the same channel.
An optimal MUD detector refers to maximum likelihood sequence estimation (MLSE) [37] which requires knowledge of all transmitters' spreading codes (e.g., base stations in a cellular CDMA system).This optimal detector is too complicated for practical application although it has excellent performance.One of the reasons, given in [38], is that cellular system is centrally controlled and always has synchronization among different users to some extent.However, in distributed wireless networks, it is quite difficult to apply signal processing techniques to separate the asynchronous transmissions.Therefore, MLSE is not a candidate for MPR.
In suboptimal MUD techniques, two approaches can be identified, namely, linear and nonlinear MUD.In linear MUD, a linear transformation is applied to the soft outputs of the conventional detector in order to produce a new set of decision variables with MAI greatly decoupled.Two most cited linear multiuser detectors are decorrelated detectors [39] and the Minimum Mean Square Error (MMSE) detector [9].They are generally complex but yield an optimal value of the near-far resistance performance metric.
On the other hand, non-linear MUDs use interference estimators and remove the interference from the received signal before detection.They are much simpler but have an inferior performance compared to linear MUD.Multistage Interference Cancellation (IC) is one of the most interesting in this category, where cancellation can be carried out either successively (SIC) or in parallel (PIC).
For SIC, the multi-user's signals are demodulated and cancelled from the strongest to the weakest according to their received signal power.References [2,[10][11][12] assume the receiver node utilizes MUD and SIC to decode multiple packets.It is a misleading phrase, because SIC is a method in MUD.Indeed, it may be the most practical way to realize MPR given the current state of the art.
For PIC, without the exact knowledge of the interfering bits, their estimates in the previous stage are used instead.To enhance the performance of PIC, a multistage approach is often adopted, in which the detector at nth stage uses the bit decision from the (n − 1)th stage.In theory, PIC could support more simultaneous packets from different users, but a perfect power control is necessary.In practice, it is shown in [40] that in a single of a 2-path Rayleigh fading channel, 2-stage PIC, and SIC have very close performance.
In Figure 3, the techniques that are applied for MPR are summarized with a tree classification.Again, many of these techniques were applied to mobile communication systems such as cellular networks; for wireless random access network only a subset of techniques is possible due to the distributed random channel access nature.Among the three classes, our view is that the receiver-based techniques are more applicable for wireless random access networks.They also meet the objective of the introduction of MPR in a wireless random access network, which is shifting the responsibility from the transmitters to the receivers.

Enabling MPR in a
Wireless LAN.The techniques described in the previous section work for random access wireless networks.However, there is a class of technologies which are specific to WLANs based on an access point (AP).
In [1], Zheng et al. consider the uplink MPR in a WLAN, that is, from client station to AP.The AP has M antennas, while each client station has only one antenna Figure 4.
Based on this model, Zhang et al. investigate a number of topics on MPR in WLANs: [41] gives a delay analysis; [42] studies the impact of capacity improvement with MPR in a WLAN; [43] proposes a multiround contention randomaccess protocol to increase the channel utilization; [44] extends the investigation to the nonsaturation case and shows that super-linear scaling also holds for two newly defined situations, networks with with bounded mean delay, and bounded delay jitter.The focus of this survey is general wireless random access networks; therefore, the above works focusing particularly on WLANs will not be further detailed.
In [14], an MPR-based MAC protocol with adaptive resource allocation is proposed for a MIMO/OFDM-based WLAN.The idea of MPR is applied through a request-tosend/clear-to-send-(RTS/CTS-) based MAC protocol along with MUD to resolve the collision problem.A realistic collision model is employed, taking into consideration the PHY layer parameters such as channel information, spacetime-coded beam-forming, and multiuser detection, as well as subcarrier, bit, and power allocation.Several numerical results show that this PHY-MAC cross-layer optimization enhances the throughput of the system, because MPR can greatly reduce the probability of collisions.
In [15], contention resolution algorithms are proposed for MPR in a slotted Aloha WLAN.These algorithms require centralized information, the retransmission probability computed by the base station.Based on this information, the algorithm chooses the optimal retransmission probability to maximize the expectation of the system throughput conditioned on the number of retransmitting terminals.
Table 2 lists the realization of MPR in a WLAN.

Protocols with MPR
As discussed in the previous section, a set of technologies enable MPR capability for wireless nodes, and each has easy and hard parts in practice.MPR has also been proven to   improve the network capacity in various works reviewed in Section 2. At the same time, MPR introduces greater challenges in network protocol design, and it requires closer interactions between the layers of the wireless network.We consider the design and analysis of MAC and networking protocols which employ adaptations to fully utilize MPR capability.[8] proposed a multiple-access protocol based on receiver controlled transmission (RCT).RCT is a hybrid scheduled and random access MAC, which applies scheduling to determine the receiving nodes and then the transmitters for each receiving node.RCT aims to maximize local throughput by granting an appropriate subset of users so that the varying levels of MPR capability are exploited.The simulation results show that using RCT with MPR achieves almost double the local throughput of the slotted Aloha protocol.Although this first work pointed out that adaptation on the MAC layer is necessary to fully exploit MPR capability, the proposed scheduling works with predefined network topologies and is hard to extend to general ad hoc networks.

MAC with MPR. Mergen and Tong
Later in [16], Zhao and Tong designed a multiqueue service room (MQSR) protocol, which exploits MPR capability to handle users with different quality of service constraints.For each slot, the number of users is computed to maximize the expected number of successfully received packets.The performance of MQSR is compared with slotted Aloha and URN [3] with 2-MPR.The URN protocol manages to optimally adapt to the network load.In Figure 5, both MQSR and URN can extend the network capacity.But MQSR approaches the maximum throughput upon the transmission probability P = 0.5, while URN and slotted Aloha achieve their maximum throughput when P close to 1.
Yu and Giannakis associate a contention tree algorithm with SIC to propose SICTA in [45].They aim to create a collision resolution access protocol, from the packet point of view.It turns out to be an interesting approach for MPR.Performance metrics including throughput and delay are analyzed to establish that SICTA outperforms existing contention tree algorithms reaching 0.693 in stable throughput.
Celik et al. point out in [17,46] that the near-far problem reminds an important factor which degrades the throughput and the fairness in a wireless network even with MPR capability.To overcome this problem, they added an alternative model to the MAC protocol in which a node decreases its transmission probability following success and increases it following failure.This approach makes no sense in the conventional collision model, but was proved to outperform the standard model in terms of both throughput and fairness in a network with MPR capability.They also present a modified contention window technique as the easier implementation of GDP protocol.The most important contribution of [17,46] is that a MAC protocol designed for MPR may diverge from the traditional backoff mechanisms in random access.
Reference [18] proposed a dynamic multi-group priority queueing protocol to exploit the cooperative diversity for improving the system throughput.Cooperative diversity is a well-established notion in MIMO systems; it can be also applied on MAC protocol design for MPR.The proposed cooperative multi-group priority queueing MAC protocol has two independent parts, one in the base station and the other in the wireless nodes, so it is based on a server-client model, which is not scalable.

Network-Layer Adaptation.
Wang and Garcia-Luna-Aceves analyzed the performance upper bound of joint routing and scheduling for wireless ad hoc networks that embrace interference by using MPR [2].They propose a polynomial-time heuristic algorithm to approximate the optimal solution which consists of route selection followed by link scheduling.By maximizing the number of nodedisjoint multipaths, the throughput can better approximate the performance upper bound (Table 3).A simple example to illustrate is given in Figure 6.
In case Figure 6(b), two links can be scheduled to transmit in each time slot and fully exploit the MPR capability.
The routing and link scheduling in MPR is still an open topic.To fully exploit MPR, appropriate routing algorithm and scheduling schemes should be designed.A set of parameters could be optimized, such as schedule length or number of simultaneous paths in the network.
In [19], Crichigno et al. address the minimum length scheduling problem in one-hop multiaccess networks.They define the capacity region as the closure of the convex hull of a set of rate vectors.Figure 7 gives an example of the capacity region extension of 2-MPR over a single user channel.The function ϕi(P/η) denotes the channel capacity for a given reception power P and a given channel noise η.The upper bound capacity is achieved at sum rate, and the length of a schedule is minimized when concurrent transmitters operate at these sum points.They propose a linear program for the Minimum Length Scheduling Problem (MLSP) which their representation defines.
Reference [20] studies the neighbor discovery algorithm by incorporate multi-packet reception capability.Jeon and Ephremides consider neighbor discovery by incorporating MPR and Physical-Layer signal processing.They adopt the viewpoint of random set theory (RST) to propose a method for estimating the set of transmitting neighbors.
Almost simultaneously, Zeng et al. studied the time for achieving neighbor discovery on an arbitrary node with MPR [21].For an idealized MPR network, the time for all the nodes to discover their respective neighbors is Θ(ln n) when a simple Aloha-like algorithm is used.With a more realistic k-MPR model, they show that the time to discover all neighbors is Θ(n ln n/k).Table 4 lists the discussed works related to networking.A trend of a cross-layer approach to better exploit the MPR advantages is introduced by these works.In the next part, we detail an example realized on a network with scheduling.

Scheduling for Multihop Routing with MPR.
Reference [2] proposed to maximize the number of node-disjoint Capacity region of a multiaccess channel for a receiver node receiving data from two simultaneous transmitters.Neighbor discover [21] multi-paths with joint routing and scheduling, but by using node-disjoint paths, at any time slot, each receiver only receives one packet for relaying.The intermediate nodes in routing paths cannot be effective MPR receivers.Figure 8 gives an example with two data flows (A to D via C, and B to E via C).Ideally, C could benefit from its 2-MPR to receive simultaneously from A and B at slot 1 and use the next two slots to transmit the received packets to D and E. But with node-disjoint paths, it requires four slots to transport two flows.This example also shows that the intermediate nodes in a wireless network might become bottlenecks for throughput.
Adopting the notation of the one-hop scheduling problem as defined in [19], the channel capacity for a K-MPR receiver is where ϕ v is the channel capacity of the receiver v for a given reception power P v on it.For a general number of transceivers, the sum of transmission rates is within the channel capacity given in (11).Therefore, we have the following inequality: where r iv denotes the transmission rate on i to v.
For M data flows, we denote the source and the destination of mth flow s m and d m .The flow rate on a directed link (u, v) is denoted by f m uv .It is worth noting that this flow rate is an average rate and the transmission rate r m uv could be much higher for an intermediate receiver.For instance, if node v decodes k packets from different transmitters including u and takes t r slots to relay the received packets, then the relation between flow rate f m uv and transmission rate r m uv can be expressed as  (14) subject to the following three constraints: (1) flow conservation constraint: (2) receiver constraint: (3) transmitter constraint: We have adopted the flow conservation constraint (15) from [2].However, the other two constraints are different.
Receiver Constraint.A receiver v cannot decode more than K packets at the same time, and hence the number of transmitters in S v should be limited to K for any slot.This constraint covers the receiver's pair-wise interference.
Transmitter Constraint.Each transmitter should operate at sumrate to fully explore the bandwidth of the receiver's multiuser channel, as given in (11).
By resolving TMP as an optimization problem, we can obtain a performance upper bound.Similar problems have been shown to be NP-hard [2,48].The size of our optimization problem increases exponentially with the number of routing paths.Let us focus more on the computation of its upper bound with ideal time-space scheduling.

Heuristic Scheme with Distributed Scheduling on k-CDS.
A heuristic approach with distributed scheduling based on a k-CDS backbone can approximate the upper bound.The k-CDS (k-connected dominating set) [49] in a network is a set of nodes which is k-dominating and k-connected, meaning that every node in the network is either in the k-CDS or has k neighbors in it.The subgraph of this node set is kvertex connected.The properties of k-dominating and kconnected are a perfect match for intermediate relay nodes to exploit MPR capability, because each of them is required to collaborate with at least K + 1 neighbors for both receptions and transmissions.
(i) If a receiver is a k-dominated node, then the set consisting of all its k-dominating nodes is the schedulable set S.
(ii) If a receiver is a dominating node in k-CDS, then the k-connected property guarantees that it is connected to at least k dominating nodes.These nodes can be selected to form schedulable set S for each reception slot.
(iii) If a transmitter is a k-dominated node, then it could schedule with k dominating nodes to transmit.
(iv) If a transmitter is a dominating node, then it could schedule with k dominating neighbors to transmit.
Based on the k-CDS backbone, only dominating nodes are selected as intermediate relay nodes for multi-hop routing and a dominated node does not participate in the routing unless it is the source or the destination of a flow.This simple rule reduces the complexity of design time-space scheduling in the network.
Many algorithms tend to generate a minimal k-CDS, but the transmission will be too concentrated to this set of nodes.On the other hand, a high cardinality means little reduction from the original network topology, which is not efficient to reduce the complexity of the scheduling based on the (K + 1)-CDS.This tradeoff on the cardinality of a (K + 1)-CDS can be calculated as follows.Let us assume that the average routing path length is pl.The dominated nodes only participate in the first-hop communications as source nodes or in the last-hop communications as destination nodes, while the dominating nodes can take part in each hop in a routing path.By assuming the scheduling has a good fairness for all nodes, the amount of flows that the dominated nodes take is approximately To meet the above constraints, we develop a construction algorithm based on a coverage rule [50].Each node verifies if any pair of its neighbors are k-connected via nodedisjoint paths and a higher ID's rule is added to avoid mutual decision blocking.This verification is known as the k-Coverage condition.To realize this algorithm in a distributed and localized manner, nodes exchange their routing tables with their neighbors.The k-Coverage condition is checked via the routing table to count the number of node-disjoint paths from any pair of neighbors.
The (K + 1)-CDS construction algorithm results in a backbone for multi-path routing.We present here a transmitter-receiver scheduling to fully exploit K-MPR capability on dominating and dominated nodes, which allows the use of multiple paths for each flow to eliminate bottlenecks on the intermediate nodes.
A potential transmitter i constructs a receiver set ξ i .The receivers are ordered in each set along with their distances to the final destination d m in number of hops.If d m belongs to N(i), the neighbor set of i, then {ξ i } contains only d m .
With the link scheduling algorithm, a receiver aims to let transmitters operate at a rate based on (K + 1)-CDS.It schedules transmitter nodes with the priority pr i in an arbitrary order.Every node's priority is set to minimal before any transmissions.A transmitter node i is chosen, and checks its possible receivers set ξ i .If the transmitter finds a receiver v who can receive more flows, then it will be added in the receiver's schedulable set S v .If the transmitter node cannot find any available receiver, then its priority pr i will be increased.Hence, during the next time slot, the transmitter i has a higher priority than other transmitters and will be added to the schedulable set sooner.
For each transmitter allowed to transmit, the algorithm selects the corresponding temporary datarate, according to the sum-rate constraint.For a schedulable set S v = {u 1 , u 2 , . . ., u K }, the corresponding data-rates are The sum of all the data rates is equal to ϕ v (( i∈Sv P i )/η).Those data rates obey the sum-rate constraint, whatever the number of transmitters in schedulable set S v .The link scheduling algorithm allows the transmitter i an amount of time t i = T/K, where T is the time slot duration.This ensures that all transmitters will have the same time slot fraction to send their data.Since the first temporary data rate is much higher than the others, the channel utilization needs to be respread to the selected transmitters in order to achieve fairness and avoid generating bottlenecks on the lowrate transmitters.As a result, the overall throughput can be improved.
The final data rates also obey the sum-rate constraint.Let b m i (t) be the transmitter i's initial amount of data to send during time slot t for the flow m.The amount of effectively transmitted data is t i × r i and hence the remaining amount of data to transmit for the flow m can be represented as b m i (t + 1) = b m i (t) − t i × r i .The transmitter i's priority pr i will be increased, if b m i (t + 1) is not equal to 0. The numerical results on upper bound of TMP are obtained through lpslove [51], a mixed linear programming solver.We simulate our heuristic-based (K + 1)-CDS and heuristic based on node-disjoint path [2] in NetLogo4.1 simulator [52].We performed 100 simulations with a duration of 2000 time slots.For each flow injected in the network, it has fixed source and destination.And it generates one packet per time slot in a saturation condition.
The metrics used are as follows: the throughput represents the number of flows which arrive at destinations during a predefined number of time slots; the average delay represents the difference between the moment the flow was sent and the moment it is received; the average acceptance ratio is the ratio of traffic accepted to the total traffic demand.
The overall throughput results obtained are shown in Figure 9 with a 3D representation.The throughput upper bound describes the maximal amount of occupied reception time slots at all destinations, which is independent of the number of flows.However, it is shown that it increases with MPR capability.Our heuristic based on (K + 1)-CDS outperforms the heuristic with node-disjoint paths on almost all simulation settings.The node-disjoint heuristic reaches the limit very quickly with the increase of the number of flows, because node-disjoint paths are fewer than the routing paths on k-CDS.Our heuristic has a higher throughput limit, although it decreases when the number of flows is large (15 flows).
We also note that there is a local highest throughput for K-MPR.The throughput of 3-MPR is highest.It is also confirmed in Figure 10.This is a very interesting observation that the throughput decreases when K becomes bigger with both heuristics.One possible explanation is that the 4-MPR capability requires a much higher density to be fully exploited.The increase of node degree results in more links interfering with each other, which could decrease the network throughput.For our heuristic, the decrease of throughput with 4-MPR is also related to our link scheduling algorithm, particularly the way we spread the receiver's channel capacity between its transmitters.Indeed, the increase of channel capacity is not very large with MPR capability, while the amount of data to send is much higher (Figure 11).  Figure 12 shows that the average delay of a flow increases with the number of flows.Despite that, using MPR can reduce flow delay by around 20% compared to the single reception model.The increase of delay also confirms the presence of bottlenecks, which also cause a degradation of the flow acceptance ratio as indicated in Figure 13.Again, MPR could improve the acceptance ratio by using time-space scheduling to avoid bottleneck generation.

Conclusion
The capacity of current wireless random access networks is constrained mainly by concurrent packet transmissions.Multi-access techniques are investigated to avoid concurrent access to the medium.MPR provides another way to shift the responsibility from the transmitters to the receivers.Originally, MPR techniques were proposed for mobile communication systems and then later introduced to wireless random access networks.Therefore, it is important to survey the techniques that enable MPR and in particular those that are applicable for wireless random access networks.This paper provides such a survey.
We also list and compare all the results on the network capacity, throughput, and stability and classify the research efforts on protocol design.Basic MPR techniques have already been applied to telecommunication services, but for wireless networks with typical random access protocols (such as MAC and Network); the protocols should be revised to fully exploit the advantage of MPR.One direction is to jointly consider routing and scheduling.We detailed such work in this paper with extensive performance comparisons.The intent of this paper is to provide a good starting point for future exploration in the area.

Figure 1 :
Figure 1: Local throughput in packets/timeslot for the simple model of multipacket.

Figure 3 :
Figure 3: Classification of techniques applied for MPR.

1 .Definition 1 .
Problem Formulation of TMP.We formulate the Throughput Maximizing Problem (TMP) for multi-flow multi-hop communications in[47] as follows.Maximize the sum of flow rate reaching all destinations:

Figure 9 :
Figure 9: The throughput of upper bound and heuristics.

Figure 10 :
Figure 10: The 3-MPR can achieve the highest throughput.

Figure 11 :
Figure 11: The heuristics' efficiency, subject to upper bound.

Figure 12 :
Figure 12: The delay increases with the number of flows.

Figure 13 :
Figure 13: The flow acceptance ratio of K-MPR chutes.

Table 1 :
Theoretical results on the capacity.