Stability Properties of Network Diversity Multiple Access withMultiple-Antenna Reception and Imperfect CollisionMultiplicity Estimation

In NDMA (network diversity multiple access), protocol-controlled retransmissions are used to create a virtual MIMO (multipleinput multiple-output) system, where collisions can be resolved via source separation. By using this retransmission diversity approach for collision resolution, NDMA is the family of random access protocols with the highest potential throughput. However, several issues remain open today in the modeling and design of this type of protocol, particularly in terms of dynamic stable performance and backlog delay. is paper attempts to partially �ll this gap by proposing a Markov model for the study of the dynamic-stable performance of a symmetrical and non-blind NDMA protocol assisted by a multiple-antenna receiver. e model is useful in the study of stability aspects in terms of the backlog-user distribution and average backlog delay. It also allows for the investigation of the different states of the system and the transition probabilities between them. Unlike previous works, the proposed approach considers the imperfect estimation of the collision multiplicity, which is a crucial process to the performance of NDMA. e results suggest that NDMA improves not only the throughput performance over previous solutions, but also the average number of backlogged users, the average backlog delay and, in general, the stability of random access protocols. It is also shown that when multiuser detection conditions degrade, ALOHA-type backlog retransmission becomes relevant to the stable operation of NDMA.


Introduction
1.1.NDMA and Cross-Layer Design in Random Access.e last two decades have witnessed the proliferation of advanced random-access protocols assisted by signal processing tools [1].In these novel algorithms, spatial, code, or frequency resources are conveniently exploited in order to enable the simultaneous reception of more than one packet at the physical layer (PHY).Random-access protocols based on this innovative PHY layer have been termed multipacket reception (MPR) protocols [2].In the design of MPR protocols, the conventional collision model (where collisions imply the loss of all the contending packets) is no longer useful [2].A new approach that considers the co-design of medium access control (MAC) and PHY layers (MAC-PHY crosslayer design) is thus required [3,4].
A breakthrough in the literature of MAC-PHY crosslayer design was the work in [5], which proposed a new approach to achieve diversity in random access by exploiting retransmissions in the time domain.e new protocol, coined network diversity multiple access (NDMA), creates a receive diversity source by dynamically requesting from the contending users as many retransmissions as necessary to resolve collisions via source separation.erefore, in NDMA, packets with collision are not discarded as in the conventional protocols.Instead, they are stored in memory for further processing.Initially, the system uses the stored signals with collision to calculate the collision multiplicity (i.e., the number of contending users).e system then proceeds to request further retransmissions (which are also to be stored in memory) from the contending users, until the collected signals mimic a MIMO (multiple-input multiple-output) system.e collision can then be potentially resolved via source separation if the number of diversity sources is at least equal to the number of contending signals.In NDMA, MAC-PHY cross-layer design plays a more crucial role than that in conventional MPR protocols: PHY-layer diversity is explicitly created by retransmissions controlled by the MAC layer.In addition, the estimation of the required number of retransmissions depends on PHY layer processing to determine the collision-multiplicity.e performance of NDMA critically depends on this estimation process.Training-based versions have been proposed for non-dispersive and dispersive channels in [5,6], respectively.Two blind versions, one for slow-fading channels with source separation based on rotational invariance techniques and another one for fastfading channels with source separation based on independent component analysis, have been proposed in [7,8], respectively.Other modeling approaches for NDMA have been proposed in [9,10].

Open Issues and Paper Contributions.
Despite recent advances in the study of NDMA, several issues remain open today, particularly in terms of stability analysis.Stability in random access can be brie�y de�ned here as the ability to control/empty the queues of all users within a �nite period of time.Stability of NDMA in asymmetrical environments has been studied in the ideal case of perfect estimation of the collision multiplicity and perfect packet reception in [11].An outer bound for the stability region of NDMA in asymmetrical environments has been derived in [12] for the case of imperfect estimation of the collision multiplicity.is derivation assumed that packets incorrectly received are dropped from the system; that is, backlog traffic is not considered.is assumption, however, is valid only in scenarios with high signal-to-noise ratio (SNR).erefore, a lot of work is still required to analyze the backlog traf-�c of NDMA in scenarios with �nite SNR with imperfect collision multiplicity estimation and imperfect packet reception.
To address these issues, this paper proposes a novel Markov model for stability, throughput, and backlog traffic analysis of symmetrical and non-blind NDMA protocols assisted by MPR.is work assumes imperfect estimation of the collision multiplicity with a packet reception model given by the performance of the user detector.All the analysis work presented in this paper is carried out by assuming scenarios with �nite SNR.e analysis consists of two initial steps: (1) de�nition of the backlog states that describe the network at any given time, which in this case are given by the numbers of backlogged users, and (2) calculation of the transition probabilities between network states using channel and queuing statistics.e steady-state probabilities of the different network states are then mapped into a one-dimensional state vector.Similarly, each transition probability constitutes an element of a transition probability matrix.is state vector and transition probability matrix de�ne a Markov model that can be solved by conventional eigenvalue analysis.Each user is thus modeled in two possible states: idle or backlog.A user being in the backlog state means that it has previously transmitted a packet that was incorrectly detected by the receiver.e system performance is then evaluated for different values of packet transmission probability when users are in the idle state, and different values of the packet retransmission probability when the users are in the backlog state.e results in this paper show that NDMA with MPR provides a considerable improvement on stability over conventional collision-resolution algorithms.In addition, it is shown that ALOHA-type backlog retransmission schemes become relevant to the stability of NDMA when the multiuser detection conditions decline due to low SNR and/or due to a low number of receiver antennas (i.e., weak MPR).
1.3.Paper Structure.e remainder of this paper is organized as follows.Section 2 describes the system model.Section 3 provides the performance model for user detection and collision multiplicity estimation.Section 4 describes the proposed metrics and the Markov model.Section 5 presents the discussion of the results obtained by plotting the expressions derived in previous sections.Finally, Section 6 draws the conclusions of the paper.

Scenario Description and �DM� �poch-Slot De�nition.
Consider the slotted random access network depicted in Figure 1 with a set of  buffered users and one central node or base station (BS) with  receiver antennas that will be used for purposes of multipacket reception and user detection.e channel between user  and the th antenna of the BS is denoted by ℎ  .All channels are assumed to be non-dispersive, block-fading, and independently and identically distributed (i.i.d.) with Rayleigh statistics: ℎ  ∼ (  2  ).Whenever a terminal with a packet in its buffer is allowed to transmit, it proceeds to do so at the beginning of a time-slot.Since NDMA exploits the time domain to create diversity, the number of time slots used to resolve any packet collision will be a random variable that will be denoted here by .e period of time used to resolve a packet collision will be called contention resolution period or epoch-slot (see Figure 1).For convenience in the analysis, two types of epoch slots are de�ned: a relevant epoch, which is the epoch where a given user under analysis participates by transmitting a packet, and an irrelevant epoch, which is the epoch where a given user under analysis does not participate (no packet transmission).eir lengths will be denoted here by   and   , respectively.For example, in Figure 1, the �rst epoch is relevant to user 1 but irrelevant to user 5.By contrast, the second epoch in Figure 1 is relevant to all the users displayed in the �gure.

Signal Model for User Detection.
Each user of the network is preassigned with a unique orthogonal code with  symbols   = [  () …    (  1)  , where (⋅)  is the vector transpose operator.is code, which is attached as a header of each packet transmission, will be used for purposes of user detection and channel estimation [5].e orthogonality condition of the set of codes is given by e received signal header at the th antenna, which is formed by the superposition of all the headers of all the transmissions of the set of contending users (denoted here by ), can be written as follows: where is the zero-mean and circularly white complex gaussian noise vector in the received header.is means that  (ℎ)   ()  (0  2  ), where   0 …    .e BS uses a matched-�lter operation (    (ℎ)  ) to extract the detection statistics of user  from each antenna.e results from all the antennas are then combined as follows: e total detection statistic   for user  is then compared to a detection threshold  to decide whether user  is active or not.If   < , then the user is detected as inactive:    , where   is the estimated set of contending users.Otherwise, if   > , then the user is detected as active (   ).Since this detection process is prone to errors due to fading and noise, two cases of potential active user detection can be identi�ed: () user  can be correctly detected as active with probability   (probability of correct detection) provided the user has transmitted a packet and (2) user  is incorrectly detected as active with probability   (probability of false alarm) provided the user did not transmit a packet.By detecting the presence each one of the contending users, the BS can also have an estimation   =    of the real collision multiplicity  = , where  ⋅  is the set cardinality operator when applied to a set variable.

Protocol Operation and Signal Model for MPR.
At the beginning of every epoch slot, the BS proceeds to estimate the collision multiplicity as described in the previous subsection.e estimation of the collision multiplicity can be improved by exploiting the new retransmissions received in subsequent time slots within the collision resolution period.is type of detection is known as sequential user detection [5].is type of detector is, however, out of our scope of this paper, and thus we will focus on the conventional user detection considering only the �rst received transmission at the beginning of the collision resolution period as in [5].Once the BS has obtained an estimation   of the collision multiplicity , then it proceeds to calculate the number of retransmissions required to resolve the collision.Since the BS has  receiver antennas, the number of transmissions (including the initial transmission plus retransmissions) required in the non-blind version of NDMA is given by ⌈  , where ⌈⋅ is the ceil integer operator.is means that the number of diversity sources (time and space) must be greater than or equal to the estimated collision multiplicity.In Figure 1, we can observe two realizations of epochs with  = 2 antennas at the BS.In the �rst epoch, three users have collided in the �rst time slot.Since only two antennas are provided and three signals need to be recovered, then only one more retransmission is needed to potentially resolve the collision.In this case, the combined number of collected transmissions and space resources (antennas) is equal to four, which is enough to attempt the recovery of the three contending signals.e second epoch experiences �ve contending users, which requires two retransmissions (six diversity sources) to be resolved.Having more diversity sources than contending signals is necessary to ensure that the channel matrix is full rank, which in turn improves the probability of success of the source separation technique to be used [5].To request a retransmission for diversity purposes, the BS simply indicates with a feedback �ag at the end of each time slot to all the contending users that retransmission is required in the next time slot.e feedback �ag is kept on until all necessary retransmissions have been collected.is feedback channel is assumed to be ideal.All the collected (re)transmissions are kept in memory to create a MIMO system that can be expressed as follows [5,11]: where  is the array formed by the collection of all received signals from all the  antennas and from the    time slots of the epoch,  is the mixing matrix or MIMO channel,  is the array of stacked packets from all the contending users, each one with  symbols, and �nally W is the collected Gaussian noise components.e mixing matrix  can be estimated by using the outcome of the matched �lter operation from each antenna.e estimate   can be used to recover the contending packets using a zero forcing equalizer,   = (      −1    , or a minimum mean square error (MMSE) receiver,   = (      +  2   −1    , where the term   indicates the so estimate of the contending packets.is signal is then passed through a hard symbol detection stage to try to obtain the original packets  [5]. To facilitate NDMA MAC layer design, packet reception performance is usually approximated by the outcome of the collision multiplicity estimation [5].If all the contending users are correctly detected as active and none of the noncontending uses are incorrectly detected as active (false alarm), then all the packets are considered as correctly received by the BS.Otherwise, in the case of any detection error, all packets are assumed to be lost in the collision resolution process.e BS also indicates to all the contending users, by means of an ideal feedback �ag at the end of a resolution period, whether the resolution process was successful or not.All packets that were incorrectly detected enter a back-off retransmission process that is described in following sections.ese protocol steps are repeated for subsequent epoch slots.

Detector Performance Model
NDMA depends critically upon the performance of the user detector [12].is section deals with the modeling of the user detector in (3).is will be useful for subsequent calculations and design of the MAC layer.e probability of false alarm of a user that did not transmit a signal while still being detected as active can be de�ned more formally as follows: which is the probability that the detection statistic   is above the detection threshold , conditional on user  not being one of the contending users.Since noise is Gaussian distributed, the detection statistic   in (3), which consists of the summation of 2 squared i.i.d.zero-mean gaussian signals, can be easily proved to have for this particular case a central chi-square distribution with 2 degrees of freedom and parameter  2  .e term  2  comes from the matched-�lter operation in (3), which combines  different noise signals (coming from each one of the  symbols of the header).erefore, the probability of false alarm   can be expressed as the complementary cumulative distribution function (CCDF) of the central chi-squared distribution with 2 degrees of freedom [13]: Similarly, the probability of correct detection of user , conditional on user  being one of the contending users, can be de�ned as Since both channel and noise are Gaussian distributed; the detection statistic   in (3), which is given by the summation of 2 squared i.i.d.zero-mean gaussian signals, can also be proved for this particular case to have a central chi-square distribution with 2 degrees of freedom and parameter  2  2  +  2  .e term  2  2  comes from the matched-�lter operation in (3), which considers the channel term  times.e second term  2   has the same explanation as in the case of the probability of false alarm in (5).erefore, the probability of correct detection   is also given by the CCDF of the central chi-squared distribution with 2 degrees of freedom.is means that   can be obtained by replacing in (6) the term  2   with  2  2  +  2  .is concludes the de�nition of the receiver operational curve (�OC) of the user detector.

Markov Model and Backlog State Distribution.
To investigate the stability and dynamic properties of the system, each user will be assumed to be in two possible states: idle or backlog (see Figure 2).e backlog state means that the user has transmitted a packet in a previous epoch slot and its reception has failed.erefore, the user is waiting to retransmit the packet with probability   .When a user is in the backlog state, no new incoming packets in the queue are allowed to be transmitted [14].By contrast, when the user is in the idle state, a new incoming packet in the buffer is allowed to be transmitted with probability   .e total traffic arrival process (new incoming and backlog traffic) of each user will be assumed to have a Poisson distribution with parameter .e state of the network at any epoch slot is given by the number of users in backlog state, denoted here by  (see Figure 3).e transition probability between two states in two consecutive epoch slots will be denoted by   , which is the probability of having  backlogged users in the next epoch slot given that in the current epoch  users are in the backlog state.is is illustrated in Figure 3.By assuming that all packets are correctly received when all the contending users are correctly detected as active and none of the non-contending users incurs in a false alarm, the transition probabilities can be calculated by identifying three different cases: (1) when the number of backlogged users drops (  ), which means that all contending users were correctly detected; (2) when the number of backlogged users increases (  ), which means that a detection error has occurred; and (3) when there is no change in the number of backlogged users (  ).In the latter case, two subcases can be further identi�ed: one subcase when none of the idle users transmits while the backlogged users are not correctly detected, and the second subcase when none of the backlogged users transmits while all idle users that transmitted a packet are correctly detected.ese cases can be written in mathematical form as where (⋅)  1  (⋅).Since the probabilities in ( 8) can be easily derived by using the concepts of the binomial theorem or by referring to previous works on NDMA (e.g., [5,6,12]), their explicit derivation will be omitted here.e values of   from ( 8) can be rearranged in a matrix array , which de�nes the following Markov model characteristic equation: where    ()   ()  is the vector of steady-state probabilities of the network.Each element () indicates the probability of the network being in the th state or having  backlogged users.is equation can be solved by using standard eigenvalue techniques or iterative algorithms [14].Once the vector of steady-state probabilities   has been obtained, it is possible to calculate other relevant performance metrics by simply averaging over the calculated probability space.e average number of users in the backlog state is thus given by    where ⋅ indicates the statistical average operator.e average number of users in the backlog state is an indicator of the stability properties of the algorithm.e higher this indicator is, then the more the stability of the algorithm is degraded, as the users spend most of the time trying to retransmit a lost packet rather than attempting the transmission of new incoming packets., it is now possible to de�ne the throughput of the system as the long� term ratio of packets correctly received to the number of time slots used in the measurement.is can also be expressed as the ratio of the average number of packets correctly received to the average length of an epoch slot [12]: 4.3.Delay.e average backlog delay (  ), which can be de�ned as the average number of epochs that a user spends in the backlog state, can be calculated, using an extension of Little's theorem, as the ratio of the average number of backlogged users to the outgoing traffic [14]: e total average delay of the system () can then be expressed as the product of the backlog delay   from (15) and a term that considers both service and queuing delay due to the use of more than one time slot in the transmission of packets in NDMA.e second term is commonly modeled in the literature of NDMA by the M/G/1 queue delay formula as used in [5,11].erefore, the total delay can be expressed as where  is the total incoming traffic per user while [  ], [ 2  ], [  ], and [ 2  ] are the �rst� and second�order moments of the relevant and irrelevant epochs, respectively.e total incoming traffic  per user can be estimated using a traffic balance equation between the incoming and outgoing traffic per user [11]: where  is the total transmission probability of a user, and which can be further expressed as the contribution of idle and backlog states: where   = ∑  = ()(1  ) is the average probability of a user being in the idle state and   = ∑  = ()() is the average probability of a user being in the backlog state.To facilitate the derivation of expressions for the different types of epoch in ( 16), let us de�ne the following auxiliary functions where we consider whether a given user under analysis contributes or not to the epoch length.e following function considers all the contributions to the length of an epoch given  backlogged users have transmitted and only  have been detected as active:  22).is concludes the derivation of the expressions for the total average delay.

Results
Let us now present some results that will illustrate the behavior of the analytical expressions derived in this paper using different parameters of the system.In all cases, the probability of a false alarm has been set to a �xed value of   = 0.001 and the probability of detection is calculated according to the ROC model given in Section 3, particularly in (6) for   and   , and using different values of signalto-noise ratio SNR =  2  / 2  .In addition, for purposes of comparison, all the �gures have included the results of the S-ALOHA protocol with the same number of antennas and same channel conditions.Figure 4 displays the steadystate probability distribution   from (9) for the different protocols using three different numbers of antennas  = 1,  = 2, and  =  with an operational SNR of 7 dB.In addition, the results were calculated using a packet transmission probability for idle users of   = 0.2 and a packet retransmission probability of   = 0.01 for the backlogged users.It can be observed that in all the cases the NDMA protocol presents a distribution of backlogged users shied to the le side, which means that a low number of users remain, on average, in the backlog state.By contrast, the ALOHA protocol always stays at the right side of the �gure.is means that NDMA reduces the number of unsatis�ed users in the network, thereby presenting better stability features.Figure 5 displays the steady-state probability distribution of backlog states for the same con�guration used in Figure 4, except for the packet transmission probability for idle users which is now set to   = 0.5.Since the input traffic in this case is higher, the stability of all schemes has been considerably affected by showing a shi to the right side, that is, more backlogged users, in comparison with Figure 4. e NDMA protocol can still be seen as the best solution in the le-most side of Figure 5. Figure 6 displays the steady-state probability distribution of backlog states for the same con�guration used in Figure 4, but this time using SNR = −3 dB.e lower SNR conditions have affected the proposed algorithm and the reference ALOHA algorithm in different ways.e NDMA protocol with  =  antennas is still the best with the lowest number of backlogged users.However, the second best scheme is now the S-ALOHA protocol with  =  antennas, in contrast with the results in Figure 4 where NDMA with  = 2 was the second best scheme.e NDMA protocol  with    now tends to behave as its ALOHA counterparts, which indicates that at low SNR values the performance of NDMA asymptotically degrades to ALOHA.e results for throughput in Figure 7 using ( 14) and the total average delay performance in Figure 8 using (15) were calculated using a �xed value of packet transmission probability of idle users of   = 0.2, an operational SNR of SNR = −3 dB, and considering various values of the retransmission probability of backlogged users   .e case with SNR = 7 dB is illustrated in Figures 9 and 10.In both results, it can be observed that NDMA always outperforms its be applied to NDMA as well.By contrast, at high SNR or when a large number of antennas is used, the multiuser detection conditions considerably improve, thereby making NDMA very stable and without the need of a complex stabilization technique.is is an interesting result that shows how a strong PHY layer conveys the simpli�cation of the MAC layer scheme for stabilization purposes.On the other hand, when the ability of the PHY layer declines, then more complex stabilization and in general MAC layer techniques will be required.Another interesting feature observed in the �gures is that S-ALOHA and NDMA with  =  seem unaltered when working at low and high SNRs (see Figures 7 and 9).is is due to the detector combining mechanism in (3) that exploits the diversity of the 4 antennas to produce more reliable detection statistics.is indicates that even with SNR = −3 dB the detector gain allows the system to mimic a higher SNR scenario.

Conclusions
is paper has presented the analysis of the dynamic properties (stability, backlog delay, and stable throughput) of a random access protocol jointly assisted by spatial and retransmission diversity.e paper used a Markov model that captures both queuing and channel statistics in the system.e results indicate that NDMA with multiple antennas considerably improves stability, throughput, and delay over all other considered solutions, particularly when multiuser detection conditions are relatively good.e modeling technique presented in this paper can be used and improved in the future to cope with more complex cross-layer optimization problems considering, for example, asymmetrical scenarios or systems with decentralized channel state information.e results in this paper also shed light on the interactions and dependencies between PHY and MAC layers.In particular, it was observed that when the PHY layer multiuser detection capabilities become strong, then the design of the MAC layer stabilization technique can be considerably simpli�ed.On the contrary, when the PHY layer reduces its efficiency, it is necessary to design properly the MAC retransmission strategy for backlogged users so that the system behaves as desired.is conclusion can be useful for future investigations that address the joint performance of two or more layers of the OSI (open-system interconnection) model.

5 F 1 :
Random-access network assisted by retransmission diversity and multipacket reception.

F 2 :F 3 :
State model for each user in the network.Network states and transition probabilities.

4 F 10 :
Average delay ( versus backlog retransmission probability (   using   = 0.2 and SNR = 7 dB. BS (either correctly detected with probability   or due to false alarm with probability   ).is can be expressed as follows:  is the index for backlogged users,  is the index for idle users,   =          is the probability of a backlogged user being detected as active,   =         is the probability of an idle user being detected as active, and the second term is due to the contribution of one time slot when none of the users is detected as active with probability rectly detected (either as active in case they transmitted or as inactive in case they did not transmit) with probability (    +     ) 1 (    +     )  .e second term is given by the contribution of a non-backlogged user.Similarly, the average length of an epoch slot can be calculated by considering all the possible combinations of contributions of users (both backlogged and idle) that are detected as active by the   .�aving de�ned the terms  and [] ()   () =  is the probability of a user being in the backlog state given  users are in the backlog state.Similarly, the following function considers all the contributions to the length of an epoch given  idle users have transmitted and only  have been detected as active:  idle users have transmitted.Let us now provide the desired expression for the �rst�order moment of the length of a relevant epoch in terms of the auxiliary functions de�ned in (19)-(22).First, we must consider that a given contending user can be either in the idle or in the backlog state.In addition, it can also be either correctly detected with probability   (thereby contributing to the length of the epoch) or incorrectly detected as nonactive with probability   (thereby no contributing to the epoch length).edesired expression is thus given by the combination of all these possible detection cases as follows:    =       =     (1, 1) +   (1, 1) +     (1, 0) +   (1) +   (1, 0) +   (1) .