Open Access
This article is

- freely available
- re-usable

*Technologies*
**2019**,
*7*(1),
22;
https://doi.org/10.3390/technologies7010022

Article

Stability and Delay of NDMA-MPR Protocol in Rice-Correlated Channels with Co-Channel Interference †

Research Centre in Real-Time and Embedded Comput-ing Systems, Intituto Politecnico do Porto, 4200-135 Porto, Portugal

^{†}

This paper is an extended version of our paper published in the Second International Conference on Advances in Signal, Image and Video Processing—From Sensing to Applications (SIGNAL 2017), Barcelona, Spain, 21–25 May 2017.

Received: 7 December 2018 / Accepted: 2 February 2019 / Published: 13 February 2019

## Abstract

**:**

This paper investigates backlog retransmission strategies for a class of random access protocols with retransmission diversity (i.e., network diversity multiple access or NDMA) combined with multiple-antenna-based multi-packet reception (MPR). This paper proposes NDMA-MPR as a candidate for 5G contention-based and ultra-low latency multiple access. This proposal is based on the following known features of NDMA-MPR: (1) near collision-free performance, (2) very low latency values, and (3) reduced feedback complexity (binary feedback). These features match the machine-type traffic, real-time, and dense object connectivity requirements in 5G. This work is an extension of previous works using a multiple antenna receiver with correlated Rice channels and co-channel interference modelled as a Rayleigh fading variable. Two backlog retransmission strategies are implemented: persistent and randomized. Boundaries and extended analysis of the system are here obtained for different network and channel conditions. Average delay is evaluated using the M/G/1 queue model with statistically independent vacations. The results suggest that NDMA-MPR can achieve very low values of latency that can guarantee real- or near-real-time performance for multiple access in 5G, even in scenarios with high correlation and moderate co-channel interference.

Keywords:

multiple access in 5G; retransmission diversity; signal-processing; multi-user detection; random access; multi-packet reception## 1. Introduction

The number of objects connected to the cloud is expected to rise dramatically in the next years [1]. Existing algorithms are not ready for the machine-type, ultra-low latency, and dense object connectivity requirements of 5G [2]. The dedicated allocation algorithms of 3G/4G have been proven useful in settings with long, high-rate sessions and finite numbers of simultaneous requests. This is a disadvantage for industrial connectivity, where a large number of simultaneous short (bursty) sessions can arise. To address these issues, random access protocols turn out to be ideal for bursty traffic sources by showing low latency and reduced complexity. The disadvantage occurs with long sessions or high loads. However, the last few decades have witnessed improvements in random access that can overcome these problems and thus, make this type of protocols a good candidate for 5G.

Multi-packet reception (MPR) is one of the main candidates to improve the performance of random access protocols [3,4,5]. MPR algorithms have been analyzed extensively using multiple antennas, frequency resources or power capture, to name a few. However, the performance of random access with MPR declines when the fixed MPR capacity is surpassed by the number of simultaneous connection requests. A breakthrough in the literature of signal-processing-assisted random access protocols was presented in [6] where the authors use an adaptive source of diversity via retransmissions to achieve MPR. The algorithm was called NDMA or network diversity multiple access, and in ideal conditions it can achieve almost collision free performance, ultra low latency, and minimum feedback complexity. These features are very attractive for contention-based access in 5G. In NDMA, the MPR capabilities are adaptive and therefore, the algorithm can deal, in principle, with collisions of any size. NDMA is the perfect example of cross-layer algorithm: retransmissions induced by MAC (medium access control) layer create a source of physical (PHY)-layer diversity to resolve a collision.

In NDMA, the Base Station (BS) uses signal-processing to estimate the size of a collision. This is used to calculate the number of retransmissions required to achieve MPR and recover the colliding signals (i.e., resolve the collision). Retransmissions are stored in memory and the BS uses MIMO (multiple-input multiple-output) tools to recover and decode the signals in conflict. Training-based versions of NDMA have been proposed in non-dispersive and dispersive channels in [6,7], respectively. Blind versions can be found in [8,9]. Stability analysis with perfect channel and reception conditions were presented in [10]. NDMA with MPR has been investigated in [11] using Markov chains improving data rates and delay. In our work in [12] an addition to NDMA-MPR based on Successive Interference Cancellation (SIC) was shown to surpass the capacity of previous protocols. Hybrid combination of NDMA with Automatic Repeat reQuest (ARQ) was presented in [13]. Feedback free NDMA was presented in [14], and an asynchronous blind NDMA was recently presented in [15]. NDMA with sequential detection and non-orthogonal sequences was presented in [16].

This paper is the extension of [2], comprising MPR capabilities in Rice fading correlated channels with co-channel interference. This is the first attempt to investigate the effects of line-of-sight (LOS) and co-channel interference in NDMA. The original work in [2] extends the NDMA protocol expressions to include backlog retransmission of collisions that remain unresolved. Two strategies were implemented: persistent and randomized retransmission schemes. In the persistent retransmission approach, signals involved in an unsuccessful collision resolution period reattempt transmission immediately in a new resolution period generating an identical collision event but with different channel conditions. The process is repeated until the original collision is resolved. In the case of the randomized strategy, the signals involved in an unsuccessful collision resolution period retransmit at a randomly selected resolution period, thus, creating different randomized collision events in future resolution periods. All protocol expressions have been upgraded to reflect the new settings with spatial correlation, multiple antenna reception, and co-channel interference. The results show that NDMA surpasses by a significant margin its ALOHA counterparts, and when the SNR (signal-to-noise ratio) is high enough and with moderate traffic loads, low latency values and high throughput performance could be attractive for future 5G networks. Summarizing, the achievements of this paper are as follows:

- Extension of NDMA-MPR to Correlated Rice channels.
- Analysis of backlog retransmission strategies.
- Analysis of NMDA detection protocol with co-channel interference.

The organization of this paper is as follows. Section 2 presents the system assumptions. Section 5 presents the details of the first retransmission strategy (also called here persistent retransmission strategy). Section 6 details the random retransmission strategy. Results of the retransmission schemes are displayed and discussed in Section 7. The conclusions of the paper are then presented in Section 8.

Notation: lower case bold letters denote vector variables and upper case bold letters denote matrix variables. $E[\xb7]$ is the statistical average operator, $E\left[x\right|y]$ is the average of random variable x conditional on a particular instance of random variable y, ${E}_{x}[\xb7]$ is the statistical average operation over the random variable x, $\overline{(\xb7)}=1-(\xb7)$ is the complement to one operator (i.e., $\overline{a}=1-a$ for any a), $\left(\begin{array}{c}{N}_{1}\\ {N}_{2}\end{array}\right)=\frac{{N}_{1}!}{(N1-{N}_{2})!{N}_{2}!}$ is the combinatorial number of ${N}_{1}$ elements (objects) in ${N}_{2}$ positions, ${\mathsf{\Psi}}_{x}\left(i\omega \right)$ is the characteristic function of random variable x, and $\omega $ is the frequency domain variable. ${\mathit{I}}_{\mathit{Q}}$ denotes the identity matrix of order Q, ${\mathbf{0}}_{\mathit{Q}}$ is the column vector of size $Q\times 1$ with all elements equal to zero, and ${\mathbf{1}}_{\mathit{Q}}$ is the column vector of size $\mathit{Q}\times \mathbf{1}$ with all elements equal to 1. ${(\xb7)}^{\mathit{H}}$ is the Hermitian vector transpose operator and ${(\xb7)}^{\mathit{T}}$ is the vector transpose operator.

## 2. System Model and Assumptions

#### 2.1. Scenario Description and NDMA Protocol Operation

Consider the wireless random access network depicted in Figure 1 with one base station (BS) enabled with $\mathit{M}$ receiving antennas and $\mathit{J}$ one-antenna terminals. Each terminal is assumed to have a buffer experiencing a packet arrival process with Poisson statistics described by the parameter $\mathit{\lambda}$. The transmission probability of any terminal at the beginning of any resolution period is denoted by $\mathit{p}$. The channel between terminal $\mathit{j}$ and the $\mathit{m}$th antenna of the BS is assumed to be non-dispersive, block fading and independently distributed with Rice envelope statistics: ${\mathit{h}}_{\mathit{j},\mathit{m}}\sim \mathcal{CN}(\mathit{\mu},\mathit{\gamma})$, where $\mathit{\mu}$ is the line-of-sight (LOS) component and $\mathit{\gamma}$ is the variance of the random component. The channel model can be rewritten for convenience as follows:
where ${\mathit{\alpha}}_{\mathit{j},\mathit{m}}\sim \mathcal{CN}(\mathbf{0},\mathit{\gamma})$. Channels will be correlated in space: $\mathit{E}\left[{\mathit{\alpha}}_{\mathit{j},\mathit{m}}^{*}{\mathit{\alpha}}_{\mathit{j},\tilde{\mathit{m}}}\right]={\mathit{\rho}}_{\mathit{m},\tilde{\mathit{m}}}\mathit{\gamma}$, where ${(\xb7)}^{*}$ is the complex conjugate operator, $\mathit{E}[\xb7]$ is the statistical average operator, and ${\mathit{\rho}}_{\mathit{m},\tilde{\mathit{m}}}$ is the correlation coefficient between the signal of antenna $\mathit{m}$ with the signal of antenna $\tilde{\mathit{m}}$. All channels can be thus, generated using a generalized linear correlation model given by:
where the variables ${\mathit{Y}}_{\mathit{j},\mathit{m}}$ and ${\mathit{Z}}_{\mathit{j}}^{(\mathit{m},\tilde{\mathit{m}})}$ are independent circular complex Gaussian random variables with zero mean and variance $\mathit{\gamma}$.

$${\mathit{h}}_{\mathit{j},\mathit{m}}=\mathit{\mu}+{\mathit{\alpha}}_{\mathit{j},\mathit{m}},$$

$${\mathit{\alpha}}_{\mathit{j},\mathit{m}}=\sqrt{\mathbf{1}-\sum _{\tilde{\mathit{m}}\ne \mathit{m}}{\mathit{\rho}}_{\mathit{m},\tilde{\mathit{m}}}}{\mathit{Y}}_{\mathit{j},\mathit{m}}+\sum _{\tilde{\mathit{m}}\ne \mathit{m}}\sqrt{{\mathit{\rho}}_{\mathit{m},\tilde{\mathit{m}}}}{\mathit{Z}}_{\mathit{j}}^{(\mathit{m},\tilde{\mathit{m}})},\phantom{\rule{1.em}{0ex}}\phantom{\rule{1.em}{0ex}}{\mathit{Z}}_{\mathit{j}}^{(\mathit{m},\tilde{\mathit{m}})}={\mathit{Z}}_{\mathit{j}}^{(\tilde{\mathit{m}},\mathit{m})},$$

Whenever the terminals are allowed to transmit a packet, they do so at the beginning of a new collision resolution period or epoch-slot. At the beginning of every epoch slot, the BS proceeds to obtain an estimate of the identity of the colliding terminals by means of signal-processing tools (details can be found in [6] and later in this paper). Each terminal uses (as packet header) an orthogonal code previously assigned. The BS exploits this header using a matched filter receiver and energy detection processing to estimate the presence of each terminal in the collision event. Since this process is prone to errors due to fading and noise, the conditional probability of detection given that the terminal has transmitted a packet in the current time-slot is given by ${\mathit{P}}_{\mathit{D}}$ (probability of correct presence detection). On the other hand, the conditional probability of presence detection given that the terminal did not engaged transmission is given by ${\mathit{P}}_{\mathit{F}}$ or probability of false alarm.

The detection of the presence of the different active terminals provides an estimation of the collision size. Based on this information, the BS proceeds to request retransmissions from the contending terminals so as to construct a virtual Multiple-Input Multiple-Output (MIMO) system with the convenient rank conditions that will ensure that the collision can be resolved. The conventional NDMA retransmission process in ideal detection settings with two collision resolution periods is displayed in Figure 2. The main principle of retransmission diversity is that terminals transmit in consecutive time slots. Different packet transmissions of different terminals are shown in different colours in Figure 2. The first epoch shows three terminals colliding in the first time slot of epoch 1, and one more retransmission is necessary to have the necessary degrees of freedom ($\mathit{M}=\mathbf{2}$ antennas and two time slots) to resolve the collision of three signals. The second epoch deals with a collision of five terminals in two time slots with $\mathit{M}=\mathbf{2}$ antennas. The collision resolution process of NDMA is also explained in block diagram in Figure 3.

All signal-processing stages are prone to errors, so there will be cases where the collision is not resolved correctly or remaining decoding errors need to be controlled. Backlog retransmission strategies are therefore, necessary to recover the information lost in previous collision events.

#### 2.2. Backlog Retransmission Schemes

In NDMA, it is conventionally assumed that any detection error at the BS side yields the loss of all packets involved in the collision. Conversely, the collision is successfully resolved only when all the terminals are correctly detected (both active and idle terminals). This paper proposes two backlog retransmission schemes to deal with the packets that were involved in an unsuccessful collision resolution period. The first scheme (also called persistent) allows the colliding terminals to engage immediately in a new resolution period. The BS indicates to the terminals that the previous resolution process did not succeed, and therefore, the same set of colliding terminals transmit again at the beginning of the new resolution period. This procedure is repeated until all the packets involved in the collision are correctly decoded by the destination.

In the second retransmission strategy, the backlogged terminal retransmits randomly in a future epoch slot with probability $\mathit{p}$, which is exactly the same probability as the overall system attempt rate. This scheme is also called random retransmission scheme.

#### 2.3. Epoch-Slot Definition and Feedback Flags

The collision multiplicity at the beginning of any epoch slot will be denoted by the random variable $\mathit{K}$. The length of a simple collision resolution period will be denoted by the random variable $\mathit{l}$. The period of time used for a packet to be correctly decoded by the BS will be denoted by $\mathit{L}$, and it will be called super-epoch. Two types of epoch and super-epoch are defined: relevant, where a particular terminal under analysis is always present, and irrelevant, where such an incumbent terminal is idle.

The BS has two binary feedback flags that are considered to be ideal and instantaneous. One flag is used to indicate to the colliding terminals that retransmission is needed in the next time slot for purposes of diversity. The second feedback flag occurs at the end of a collision resolution period and indicates whether the epoch was successful or not. Based on this information, the colliding terminals decide to enter in one of the backlog retransmission schemes presented in this paper.

#### 2.4. Examples

To further illustrate the proposed algorithms, Figure 4 shows the realization of the two retransmission strategies over 4 epoch-slots. In the first epoch ($\mathit{e}=\mathbf{1}$) of retransmission strategy 1, four terminals collide at the beginning of the epoch slot. However, only two of them were detected correctly as active ({2,8}). The system has requested no more retransmissions when indeed it was necessary to collect one more retransmissions to obtain a total of 4 degress of freedom to resolve a collision of size $\mathit{K}=\mathbf{4}$. This means this epoch $\mathit{e}=\mathbf{1}$ is unsuccessful. The terminals are now in backlog state and retransmit immediately in the next resolution period. Once again, the detection process was incorrect, by miss-detecting three of the contending terminals ({1,2,3}) and estimating two of the idle terminals ({4,5}) as active (false alarm). The backlogged terminals proceed then to retransmit again in a third consecutive epoch slot ($\mathit{e}=\mathbf{3}$). This time all terminals were correctly detected, one retransmission is requested, and the collision is conveniently resolved. The fourth epoch ($\mathit{e}=\mathbf{4}$) allows new terminals to transmit, and it can be observed that this case was a successful epoch. Note that the first collision took three epoch slots to be correctly resolved with total length of $\mathit{L}=\mathbf{5}$. This set of epoch slots that a collision experiences to be resolved is called super epoch.

In the second retransmission strategy in Figure 5, the four contending terminals involved in the first resolution period become backlogged. However, they start retransmission randomly over the next epoch slots. In the second epoch slot, terminal $\mathit{j}=\mathbf{1}$ retransmits the backlogged packet and this time the resolution is successful. By contrast, the third epoch sees terminal $\mathit{j}=\mathbf{3}$ to experience again an incorrect detection with one case of false alarm. The last epoch shows that two non-backlogged terminals experience a successful collision resolution. Note that the super-epoch for terminal $\mathit{j}=\mathbf{1}$ is given by the first and second resolution periods with a total length of $\mathit{L}=\mathbf{3}$.

## 3. Signal Model

Each terminal is pre-assigned with an orthogonal code consisting of $\mathit{J}$ symbols: ${\mathbf{w}}_{\mathit{j}}\phantom{\rule{3.33333pt}{0ex}}=\phantom{\rule{3.33333pt}{0ex}}{[{\mathit{w}}_{\mathit{j}}\left(\mathbf{0}\right),{\mathit{w}}_{\mathit{j}}\left(\mathbf{1}\right),\dots ,{\mathit{w}}_{\mathit{j}}(\mathit{J}-\mathbf{1})]}^{\mathit{T}}$. This code is attached as header of each packet transmission of terminal $\mathit{j}$, and is employed for purposes of presence detection (collision multiplicity estimation) and channel estimation. The orthogonality condition of the set of codes is given by: ${\mathbf{w}}_{\mathit{j}}^{\mathit{H}}{\mathbf{w}}_{\mathit{k}}=\left\{\begin{array}{cc}\mathit{J},& \mathit{k}=\mathit{j}\\ \mathbf{0},& \mathit{k}\ne \mathit{j}\end{array}\right.$. The received signal in antenna $\mathit{m}$ coming from all the headers of the set of colliding terminals (denoted here by $\mathcal{T}$) can be written as:
where $\mathbf{g}$ is the interference term modelled as a circular Gaussian variable that remains constant along the transmitted header: ${\mathbf{g}}_{\mathit{m}}^{\left(\mathit{h}\right)}=\sqrt{{\mathit{\xi}}_{\mathit{m}}^{\left(\mathit{h}\right)}}{\mathbf{1}}_{\mathit{J}}$ and ${\mathbf{v}}_{\mathit{m}}^{\left(\mathit{h}\right)}={[{\mathit{v}}^{\left(\mathit{h}\right)}\left(\mathbf{0}\right),{\mathit{v}}^{\left(\mathit{h}\right)}\left(\mathbf{1}\right),\dots ,{\mathit{v}}^{\left(\mathit{h}\right)}(\mathit{J}-\mathbf{1})]}^{\mathit{T}}$ is the zero-mean and white complex Gaussian noise vector in the header with variance ${\mathit{\sigma}}_{\mathit{v}}^{\mathbf{2}}$. This means that ${\mathbf{v}}^{\left(\mathit{h}\right)}\sim \mathcal{CN}({\mathbf{0}}_{\mathit{J}},{\mathit{\sigma}}_{\mathit{v}}^{\mathbf{2}}{\mathbf{I}}_{\mathit{J}})$. The BS uses a matched-filter operation (${\mathbf{w}}_{\mathit{j}}^{\mathit{T}}{\mathbf{y}}^{\left(\mathit{h}\right)}$) to extract the presence information of each terminal $\mathit{j}$. The result is computed as follows:

$${\mathbf{y}}_{\mathit{m}}^{\left(\mathit{h}\right)}=\sum _{\mathit{j}\in \mathcal{T}}{\mathit{h}}_{\mathit{j},\mathit{m}}{\mathbf{w}}_{\mathit{j}}+{\mathbf{g}}_{\mathit{m}}^{\left(\mathit{h}\right)}+{\mathbf{v}}_{\mathit{m}}^{\left(\mathit{h}\right)},$$

$${\mathit{z}}_{\mathit{j}}=\sum _{\mathit{m}=\mathbf{1}}^{\mathit{M}}{\left|{\mathbf{w}}_{\mathit{j}}^{\mathit{T}}{\mathbf{y}}_{\mathit{m}}^{\left(\mathit{h}\right)}\right|}^{\mathbf{2}}.$$

The presence detection variable ${\mathit{z}}_{\mathit{j}}$ for terminal $\mathit{j}$ in (4) is compared to a detection threshold $\mathit{\beta}$ to decide whether terminal $\mathit{j}$ is present or not in the collision. If ${\mathit{z}}_{\mathit{j}}<\mathit{\beta}$, then terminal $\mathit{j}$ is considered as inactive or not present in the collision: $\mathit{j}\notin \widehat{\mathcal{T}}$, where $\widehat{\mathcal{T}}$ is the estimated set of contending terminals. Otherwise, if ${\mathit{z}}_{\mathit{j}}>\mathit{\beta}$, then terminal $\mathit{j}$ is considered as active or present in the collision ($\mathit{j}\in \widehat{\mathcal{T}}$). The estimated set of contending terminals can be therefore, defined as the set $\widehat{\mathcal{T}}$ of all the terminals whose detection variable ${\mathit{z}}_{\mathit{j}}$ exceeds the detection threshold: $\widehat{\mathcal{T}}=\left\{\mathit{j}\right|{\mathit{z}}_{\mathit{j}}\ge \mathit{\beta}$. Since this detection process is prone to errors due to channel fading and noise, two conditional presence detection cases can be identified: (1) terminal $\mathit{j}$ can be correctly detected as active with probability ${\mathit{P}}_{\mathit{D}}$ provided the terminal has transmitted a packet, and (2) terminal $\mathit{j}$ is incorrectly detected as active with probability ${\mathit{P}}_{\mathit{F}}$ (probability of false alarm) provided the terminal did not transmit a packet. By detecting the presence of each one of the contending terminals, the BS also has an estimation $\widehat{\mathit{K}}=\left|\widehat{\mathcal{T}}\right|$ of the collision multiplicity $\mathit{K}=\left|\mathcal{T}\right|$, where, $\widehat{\mathit{K}}$ is the estimated number of contending signals, and $\mathit{K}$ is the number of contending signals.

The BS proceeds to request the estimated retransmissions $\left(\mathit{r}=\u2308\frac{\widehat{\mathit{K}}}{\mathit{M}}\u2309-\mathbf{1}\right)$ considering the number of degrees of freedom. The signal model for all the received signals in time slot $\mathit{n}$ of a collision resolution period is given by:
where ${\mathbf{y}}_{\mathit{m}}\left(\mathit{n}\right)$ is the signal vector received in time slot $\mathit{n}$, ${\mathit{s}}_{\mathit{j}}$ is the transmitted signal vector by terminal $\mathit{j}$ ($\mathit{E}\left[{\mathbf{s}}_{\mathit{j}}^{\mathit{H}}{\mathbf{s}}_{\mathit{j}}\right]=\mathbf{1}$), and ${\mathbf{g}}_{\mathit{m}}\left(\mathit{n}\right)$ is the interference vector in time-slot $\mathit{n}$. The signals are stored in memory after each retransmission and they can be arranged in a linear MIMO (multiple-input multiple output) model as follows:
where $\mathbf{Y}$ is the stacked received signals across all time-slots of the resolution period and the antennas of the BS, $\mathbf{H}$ is the composite MIMO channel, $\mathbf{S}$ is the matrix of stacked colliding signals, $\mathbf{G}$ is the interference term, and $\mathbf{V}$ is the white Gaussian noise. The original signals can then be recovered using ZF, i.e., zero-forcing, ($\widehat{\mathbf{S}}\phantom{\rule{3.33333pt}{0ex}}=\phantom{\rule{3.33333pt}{0ex}}{\mathbf{H}}^{-\mathbf{1}}\mathbf{Y}$) or minimum mean square error (MMSE) detection ($\widehat{\mathbf{S}}={(\mathbf{H}+\mathbf{I}{\mathit{\sigma}}_{\mathit{v}}^{\mathbf{2}})}^{-\mathbf{1}}\mathbf{Y}$). Each signal will experience a post-processing signal-to-interference-plus-noise ratio (SINR) denoted by ${\mathsf{\Gamma}}_{\mathit{j}}$. The packet can be considered to be correctly received by the destination when this post-processing SINR surpasses a given threshold.

$${\mathbf{y}}_{\mathit{m}}\left(\mathit{n}\right)=\sum _{\mathit{j}\in \mathcal{T}}{\mathit{h}}_{\mathit{j},\mathit{m}}\left(\mathit{n}\right){\mathbf{s}}_{\mathit{j}}+{\mathbf{g}}_{\mathit{m}}\left(\mathit{n}\right)+{\mathbf{v}}_{\mathit{m}}\left(\mathit{n}\right),$$

$$\mathbf{Y}=\mathbf{H}\mathbf{S}+\mathbf{G}+\mathbf{V},$$

## 4. Receiver Operational Characteristic (ROC) for Terminal Presence Detection

NDMA highly depends on the performance of the terminal presence detector. Any detection error, usually leads either to the loss of a significant percentage of the colliding signals in case of underestimation of collision multiplicity, or to the waste of transmission resources in case of overestimation of the collision size. This section deals with the statistical modelling of the terminal presence detector in (4). This will be useful for subsequent calculations and design of the MAC layer. The probability of false alarm of a terminal that did not transmit a signal while still being detected as active can be defined more formally as follows:
which is the probability that the detection variable ${\mathit{z}}_{\mathit{j}}$ exceeds the detection threshold $\mathit{\beta}$, conditional on terminal $\mathit{j}$ not being one of the contending terminals. Since the noise is Gaussian distributed, the detection variable ${\mathit{z}}_{\mathit{j}}$ in (4) follows a central chi-square distribution, and therefore, the probability of false alarm can be expressed in closed-form [6] as:

$${\mathit{P}}_{\mathit{F}}=\mathrm{Pr}\{{\mathit{z}}_{\mathit{j}}>\mathit{\beta}|\mathit{j}\notin \mathcal{T}\}=\mathrm{Pr}\{\mathit{j}\in \widehat{{\mathcal{T}}_{\mathit{d}}}|\mathit{j}\notin \mathcal{T}\},$$

$${\mathit{P}}_{\mathit{F}}=\sum _{\mathit{m}=\mathbf{0}}^{\mathit{M}-\mathbf{1}}\frac{\mathbf{1}}{\mathit{m}!}{\left(\frac{\mathit{\beta}}{\mathit{J}{\mathit{\sigma}}_{\mathit{v}}^{\mathbf{2}}+{\mathit{\sigma}}_{\mathit{g}}^{\mathbf{2}}}\right)}^{\mathit{m}}{\mathit{e}}^{-\frac{\mathit{\beta}}{\mathit{J}{\mathit{\sigma}}_{\mathit{v}}^{\mathbf{2}}+{\mathit{\sigma}}_{\mathit{g}}^{\mathbf{2}}}}.$$

Similarly, the probability of detection of terminal $\mathit{j}$, conditional on terminal $\mathit{j}$ being one of the contending terminals can be defined as:

$${\mathit{P}}_{\mathit{D}}=\mathrm{Pr}\{{\mathit{z}}_{\mathit{j}}\ge \mathit{\beta}|\mathit{j}\in \mathcal{T}\}=\mathrm{Pr}\{\mathit{j}\in \widehat{{\mathcal{T}}_{\mathit{d}}}|\mathit{j}\in \mathcal{T}\}.$$

Since both channel and noise components are Gaussian distributed with mean $\mathit{\mu}$, the detection variable ${\mathit{z}}_{\mathit{j}}$ in (4) also follows a non-central chi-square distribution. The conditional characteristic function of the terminal presence indicator ${\mathit{z}}_{\mathit{j}}$ can be proved to be:
where ${\mathit{\gamma}}_{\mathit{m}}={\left|\mathbf{1}-{\sum}_{\tilde{\mathit{m}}\ne \mathit{m}}{\mathit{\rho}}_{\mathit{m},\tilde{\mathit{m}}}\right|}^{\mathbf{2}}\mathit{\gamma}+{\mathit{\sigma}}_{\mathit{g}}^{\mathbf{2}}$. The unconditional CF can be obtained by averaging the previous expression over the PDF of the random variables ${\mathit{Z}}_{\mathit{j}}^{(\mathit{m},\tilde{\mathit{m}})}$.Using numerical methods for the integration, ${\mathit{P}}_{\mathit{D}}$ can be obtained as the complementary cumulative distribution function:${\mathit{P}}_{\mathit{D}}={\overline{\mathit{F}}}_{\mathit{z}}\left(\mathit{\beta}\right)$. This concludes the definition of the receiver operating characteristic (ROC) of the terminal presence detector. A list of symbols and variables used in this paper is available in Table 1.

$${\mathsf{\Psi}}_{{\mathit{z}}_{\mathit{j}}|{\mathit{Z}}_{\mathit{j}}}\left(\mathit{i}\mathit{\omega}\right)=\prod _{\mathit{m}=\mathbf{1}}^{\mathit{M}}\frac{\mathbf{1}}{\mathbf{1}-\mathit{i}\mathit{\omega}{\mathit{\gamma}}_{\mathit{m}}}{\mathit{e}}^{\frac{\mathit{i}\mathit{\omega}{\left|\mathit{\mu}+{\sum}_{\tilde{\mathit{m}}\ne \mathit{m}}\sqrt{{\mathit{\rho}}_{\mathit{m},\tilde{\mathit{m}}}}{\mathit{Z}}_{\mathit{j}}^{(\mathit{m},\tilde{\mathit{m}})}\right|}^{\mathbf{2}}}{\mathbf{1}-\mathit{i}\mathit{\omega}{\mathit{\gamma}}_{\mathit{m}}}},$$

## 5. Persistent Retransmission Strategy

In the first retransmission strategy, all the terminals involved in an incorrect resolution period are forced to retransmit immediately in the next resolution period(s). This process is repeated until the collision is correctly resolved. The steps of the persistent retransmission strategy are described in Algorithm 1. Stability will be investigated here by using a modified traffic balance equation. This equation has been used before in [10] for stability analysis of NDMA. The expression states the balance between the incoming and outgoing traffic in the NDMA system. It is a modification of Loynes’ theorem of stability in queuing systems, and it can be written, in our context, as follows:
which states the balance between the transmission rate $\mathit{p}$ and the incoming traffic rate per super-epoch-slot. In conventional NDMA, correct resolution means all terminals are correctly detected. This occurs when all $\mathit{K}$ contending terminals have been correctly detected with probability ${\mathit{P}}_{\mathit{D}}^{\mathit{K}}$ and all $\mathit{J}-\mathit{K}$ idle terminals are not incorrectly detected as active with probability ${\overline{\mathit{P}}}_{\mathit{F}}^{\mathit{J}-\mathit{K}}$, where ${\overline{\mathit{P}}}_{\mathit{F}}=\mathbf{1}-{\mathit{P}}_{\mathit{F}}$.

$$\mathit{p}=\mathit{\lambda}\mathit{E}\left[\mathit{L}\right],$$

Algorithm 1 Algorithm NDMA with persistent backlog retransmission control. | |

1. | Generate set of colliding terminals $\mathcal{T}$ using traffic model. |

2. | Start super-epoch slot. |

3. | Start of a conventional epoch-slot of NDMA ($\mathit{e}=\mathbf{1}$). |

4. | Detect the presence of contending terminals using ${\mathit{z}}_{\mathit{j}}$ in (4). |

5. | Request retransmissions $\left(\mathit{r}=\u2308\frac{\widehat{\mathit{K}}}{\mathit{M}}\u2309-\mathbf{1}\right)$ to create a virtual MIMO system as in (6) |

6. | Attempt the decoding of the colliding terminals using ZF ($\widehat{\mathbf{S}}={\mathbf{H}}^{-\mathbf{1}}\mathbf{Y}$) or minimum mean square error (MMSE) detection ($\widehat{\mathbf{S}}={(\mathbf{H}+\mathbf{I}{\mathit{\sigma}}_{\mathit{v}}^{\mathbf{2}})}^{-\mathbf{1}}\mathbf{Y}$). |

7. | Is the collision resolved? If Yes, then end of a super-epoch and go back to step 1. If not, the same contending terminals restart one more epoch slot. Go back to step 3. |

Consider now a collision of $\mathit{K}$ out of $\mathit{J}$ terminals. The probability of correct resolution is equal to the joint probability of correct detection of all terminals (active and idle):

$${\mathit{P}}_{\mathit{c},\mathit{K}}={\mathit{P}}_{\mathit{D}}^{\mathit{K}}{\overline{\mathit{P}}}_{\mathit{F}}^{\mathit{J}-\mathit{K}}.$$

To obtain the expression for the average length of a super epoch $\mathit{E}\left[\mathit{L}\right]$ we consider that the resolution of any collision of size $\mathit{K}$ takes a random number of attempts described by a geometric distribution with parameter ${\overline{\mathit{P}}}_{\mathit{c},\mathit{K}}$ from (11) and with average number of attempts given by $\mathbf{1}/{\mathit{P}}_{\mathit{c},\mathit{K}}$. Therefore the average length of a super epoch conditional on the collision size is given by:
where

$$\mathit{E}\left[\mathit{L}\right|\mathit{K}]=\frac{\mathit{E}\left[\mathit{l}\right|\mathit{K}]}{{\mathit{P}}_{\mathit{c},\mathit{K}}},$$

$$\mathit{E}\left[\mathit{l}\right|\mathit{K}]=\sum _{{\mathit{k}}_{\mathit{d}}=\mathbf{0}}^{\mathit{K}}\sum _{{\mathit{k}}_{\mathit{f}}=\mathbf{1}}^{\mathit{J}-\mathit{K}}\left(\begin{array}{c}\mathit{K}\\ {\mathit{k}}_{\mathit{d}}\end{array}\right)\left(\begin{array}{c}\mathit{J}-\mathit{K}\\ {\mathit{k}}_{\mathit{f}}\end{array}\right)\u2308\frac{{\mathit{k}}_{\mathit{d}}+{\mathit{k}}_{\mathit{f}}}{\mathit{M}}\u2309{\mathit{P}}_{\mathit{D}}^{{\mathit{k}}_{\mathit{d}}}{\mathit{P}}_{\mathit{F}}^{{\mathit{k}}_{\mathit{f}}}{\overline{\mathit{P}}}_{\mathit{D}}^{\mathit{K}-{\mathit{k}}_{\mathit{d}}}{\overline{\mathit{P}}}_{\mathit{F}}^{\mathit{J}-\mathit{K}-{\mathit{k}}_{\mathit{f}}}+{\overline{\mathit{P}}}_{\mathit{D}}^{\mathit{K}}{\overline{\mathit{P}}}_{\mathit{F}}^{\mathit{J}-\mathit{K}}.$$

Averaging over the probability space of all potential collision sizes we obtain:

$$\mathit{E}\left[\mathit{L}\right]=\sum _{\mathit{K}=\mathbf{1}}^{\mathit{J}}\left(\begin{array}{c}\mathit{J}\\ \mathit{K}\end{array}\right){\mathit{p}}^{\mathit{K}}{\overline{\mathit{p}}}^{\mathit{J}-\mathit{K}}\frac{\mathit{E}\left[\mathit{l}\right|\mathit{K}]}{{\mathit{P}}_{\mathit{c},\mathit{K}}}$$

Consider the case of perfect detection and resolution. This means that ${\mathit{P}}_{\mathit{c},\mathit{K}}=\mathbf{1}$. Therefore the expression above becomes $\mathit{E}\left[\mathit{L}\right]={\sum}_{\mathit{K}=\mathbf{1}}^{\mathit{J}}\u2308\frac{\mathit{K}}{\mathit{N}}\u2309{\mathit{p}}^{\mathit{K}}{\overline{\mathit{p}}}^{\mathit{J}-\mathit{K}}+{\overline{\mathit{p}}}^{\mathit{J}}$. In this case the stability condition then becomes:

$${\mathit{\lambda}}_{\mathit{max}}<\underset{\mathit{p}}{max}\frac{\mathit{p}}{\mathit{E}\left[\mathit{L}\right]}$$

It can be proved that the maximum of the righ-hand side is achieved when $\mathit{p}=\mathbf{1}$, and therefore, we obtain:

$${\mathit{\lambda}}_{\mathit{max}}<{\u2308\frac{\mathit{J}}{\mathit{M}}\u2309}^{-\mathbf{1}}.$$

The access delay for NDMA is usually approximated by the formula of delay for an M/G/1 queue with vacations [6]:
where, $\mathit{E}\left[{\mathit{L}}_{\mathit{r}}\right]$, $\mathit{E}\left[{\mathit{L}}_{\mathit{ir}}\right]$, $\mathit{E}\left[{\mathit{L}}_{\mathit{r}}^{\mathbf{2}}\right]$, and $\mathit{E}\left[{\mathit{L}}_{\mathit{ir}}^{\mathbf{2}}\right]$ denote, respectively, the first- and second-order moments of the length of a relevant and irrelevant super-epochs. For the the persistent retransmission scheme we obtain:
and

$$\mathit{D}=\mathit{E}\left[{\mathit{L}}_{\mathit{r}}\right]+\frac{\mathit{\lambda}\mathit{E}\left[{\mathit{L}}_{\mathit{r}}^{\mathbf{2}}\right]}{\mathbf{2}(\mathbf{1}-\mathit{\lambda}\mathit{E}\left[{\mathit{L}}_{\mathit{r}}\right])}+\frac{\mathit{E}\left[{\mathit{L}}_{\mathit{ir}}^{\mathbf{2}}\right]}{\mathbf{2}\mathit{E}\left[{\mathit{L}}_{\mathit{ir}}\right]},$$

$$\mathit{E}\left[{\mathit{L}}_{\mathit{r}}\right]=\sum _{\mathit{K}=\mathbf{1}}^{\mathit{J}}\left(\begin{array}{c}\mathit{J}\\ \mathit{K}\end{array}\right){\mathit{p}}^{\mathit{K}-\mathbf{1}}{\overline{\mathit{p}}}^{\mathit{J}-\mathit{K}}\frac{\mathit{E}\left[\mathit{l}\right|\mathit{K}]}{{\mathit{P}}_{\mathit{c},\mathit{K}}}$$

$$\mathit{E}\left[{\mathit{L}}_{\mathit{ir}}\right]=\sum _{\mathit{K}=\mathbf{1}}^{\mathit{J}-\mathbf{1}}\left(\begin{array}{c}\mathit{J}-\mathbf{1}\\ \mathit{K}\end{array}\right){\mathit{p}}^{\mathit{K}}{\overline{\mathit{p}}}^{\mathit{J}-\mathbf{1}-\mathit{K}}\frac{\mathit{E}\left[\mathit{l}\right|\mathit{K}]}{{\mathit{P}}_{\mathit{c},\mathit{K}}}$$

The second order moments of the two types of super-epoch are given by
and
where

$$\mathit{E}\left[{\mathit{L}}_{\mathit{r}}^{\mathbf{2}}\right]=\sum _{\mathit{K}=\mathbf{1}}^{\mathit{J}}\left(\begin{array}{c}\mathit{J}\\ \mathit{K}\end{array}\right){\mathit{p}}^{\mathit{K}-\mathbf{1}}{\overline{\mathit{p}}}^{\mathit{J}-\mathit{K}}\mathit{E}\left[{\mathbf{l}}^{\mathbf{2}}\right|\mathit{K}]\frac{\mathbf{2}-{\mathit{P}}_{\mathit{c},\mathit{K}}}{{\mathit{P}}_{\mathit{c},\mathit{K}}^{\mathbf{2}}}$$

$$\mathit{E}\left[{\mathit{L}}_{\mathit{ir}}^{\mathbf{2}}\right]=\sum _{\mathit{K}=\mathbf{1}}^{\mathit{J}-\mathbf{1}}\left(\begin{array}{c}\mathit{J}-\mathbf{1}\\ \mathit{K}\end{array}\right){\mathit{p}}^{\mathit{K}}{\overline{\mathit{p}}}^{\mathit{J}-\mathbf{1}-\mathit{K}}\mathbf{E}\left[{\mathbf{l}}^{\mathbf{2}}\right|\mathit{K}]\frac{\mathbf{2}-{\mathit{P}}_{\mathit{c},\mathit{K}}}{{\mathit{P}}_{\mathit{c},\mathit{K}}^{\mathbf{2}}}$$

$$\mathit{E}\left[{\mathbf{l}}^{\mathbf{2}}\right|\mathit{K}]=\sum _{{\mathit{k}}_{\mathit{d}}=\mathbf{0}}^{\mathit{K}}\sum _{{\mathit{k}}_{\mathit{f}}=\mathbf{1}}^{\mathit{J}-\mathit{K}}\left(\begin{array}{c}\mathit{K}\\ {\mathit{k}}_{\mathit{d}}\end{array}\right)\left(\begin{array}{c}\mathit{J}-\mathit{K}\\ {\mathit{k}}_{\mathit{f}}\end{array}\right){\u2308\frac{{\mathit{k}}_{\mathit{d}}+{\mathit{k}}_{\mathit{f}}}{\mathit{M}}\u2309}^{\mathbf{2}}{\mathit{P}}_{\mathit{D}}^{{\mathit{k}}_{\mathit{d}}}{\mathit{P}}_{\mathit{F}}^{{\mathit{k}}_{\mathit{f}}}{\overline{\mathit{P}}}_{\mathit{D}}^{\mathit{K}-{\mathit{k}}_{\mathit{d}}}{\overline{\mathit{P}}}_{\mathit{F}}^{\mathit{J}-\mathit{K}-{\mathit{k}}_{\mathit{f}}}+{\overline{\mathit{P}}}_{\mathit{D}}^{\mathit{K}}{\overline{\mathit{P}}}_{\mathit{F}}^{\mathit{J}-\mathit{K}}$$

## 6. Random Backlog Retransmission Strategy

In the second retransmission strategy, backlogged terminals use a random retransmission strategy with a probability that is forced to match the transmission probability of the system $\mathit{p}$. This assumption simplifies the derivation of metrics in the system. In the case of different selection of retransmission probability, it is necessary to use a Markov chain model of the system and a two-state model for each terminal in the network (see [11]). Terminals involved in a collision with an unsuccessful first epoch will retransmit at different time slots randomly selected. The steps of the random retransmission strategy are enumerated in Algorithm 2. To investigate this strategy, we will use a modified traffic balance equation written as follows:
where ${\mathit{L}}_{\mathit{r}}$ and ${\mathit{l}}_{\mathit{ir}}$ indicate, respectively, the length of a relevant super-epoch and irrelevant epochs. It is called relevant because it denotes the super-epoch where a given terminal is involved in transmission. In the random retransmission strategy, the average number of attempts is dictated by the probability of success resolution, denoted here by ${\mathit{P}}_{\mathit{c}}$ and given by:

$$\mathit{p}=\mathit{\lambda}\mathit{E}\left[\mathit{L}\right]=\mathit{\lambda}(\mathit{pE}\left[{\mathit{L}}_{\mathit{r}}\right]+\overline{\mathit{p}}\mathit{E}\left[{\mathit{l}}_{\mathit{ir}}\right]),$$

$${\mathit{P}}_{\mathit{c}}={\mathit{P}}_{\mathit{D}}{({\mathit{pP}}_{\mathit{D}}+\overline{\mathit{p}}\overline{{\mathit{P}}_{\mathit{F}}})}^{\mathit{J}-\mathbf{1}}$$

The number of attempts has therefore, a geometric distribution with parameter ${\overline{\mathit{P}}}_{\mathit{c}}$ and with average given by $\frac{{\overline{\mathit{P}}}_{\mathit{c}}}{{\mathit{P}}_{\mathit{c}}}$. Now, since the retransmission attempt is randomized, there is a number of resolution periods ignored by the backlogged terminal. Another geometric distribution of this inter attempt process is modelled with parameter $\overline{\mathit{p}}$ and average given by $\frac{\overline{\mathit{p}}}{\mathit{p}}$. The final expression is thus, given by:
where the average length of a relevant and an irrelevant epoch can be written, respectively, as follows:
where ${\mathit{P}}_{\mathit{A}}={\mathit{pP}}_{\mathit{D}}+\overline{\mathit{p}}{\overline{\mathit{P}}}_{\mathit{F}}$ is the total probability of correct detection and

$$\mathit{E}\left[{\mathit{L}}_{\mathit{r}}\right]=\frac{{\overline{\mathit{P}}}_{\mathit{c}}}{{\mathit{P}}_{\mathit{c}}}\left(\frac{\overline{\mathit{p}}}{\mathit{p}}\mathit{E}\left[{\mathit{l}}_{\mathit{ir}}\right]+\mathit{E}\left[{\mathit{l}}_{\mathit{r}}\right]\right)+\mathit{E}\left[{\mathit{l}}_{\mathit{r}}\right],$$

$$\mathit{E}\left[{\mathit{l}}_{\mathit{r}}\right]=\sum _{\widehat{\mathit{K}}=\mathbf{1}}^{\mathit{J}}\left(\begin{array}{c}\mathit{J}-\mathbf{1}\\ \widehat{\mathit{K}}-\mathbf{1}\end{array}\right)\u2308\frac{\widehat{\mathit{K}}}{\mathit{M}}\u2309{\mathit{P}}_{\mathit{D}}{\mathit{P}}_{\mathit{A}}^{\widehat{\mathit{K}}-\mathbf{1}}{\overline{\mathit{P}}}_{\mathit{A}}^{\mathit{J}-\widehat{\mathit{K}}}+\sum _{\widehat{\mathit{K}}=\mathbf{0}}^{\mathit{J}-\mathbf{1}}\left(\begin{array}{c}\mathit{J}-\mathbf{1}\\ \widehat{\mathit{K}}\end{array}\right)\u2308\frac{\widehat{\mathit{K}}}{\mathit{M}}\u2309{\overline{\mathit{P}}}_{\mathit{D}}{\mathit{P}}_{\mathit{A}}^{\widehat{\mathit{K}}}{\overline{{P}}}_{\mathit{A}}^{\mathit{J}-\mathbf{1}-\widehat{\mathit{K}}}+{\overline{\mathit{P}}}_{\mathit{D}}{\overline{\mathit{P}}}_{\mathit{A}}^{\mathit{J}-\mathbf{1}},$$

$$\mathit{E}\left[{\mathit{l}}_{\mathit{ir}}\right]=\sum _{\widehat{\mathit{K}}=\mathbf{1}}^{\mathit{J}}\left(\begin{array}{c}\mathit{J}-\mathbf{1}\\ \widehat{\mathit{K}}-\mathbf{1}\end{array}\right)\u2308\frac{\widehat{\mathit{K}}}{\mathit{M}}\u2309{\mathit{P}}_{\mathit{F}}{\mathit{P}}_{\mathit{A}}^{\widehat{\mathit{K}}-\mathbf{1}}{\overline{\mathit{P}}}_{\mathit{A}}^{\mathit{J}-\widehat{\mathit{K}}}+\sum _{\widehat{\mathit{K}}=\mathbf{0}}^{\mathit{J}-\mathbf{1}}\left(\begin{array}{c}\mathit{J}-\mathbf{1}\\ \widehat{\mathit{K}}\end{array}\right)\u2308\frac{\widehat{\mathit{K}}}{\mathit{M}}\u2309{\overline{\mathit{P}}}_{\mathit{D}}{\mathit{P}}_{\mathit{A}}^{\widehat{\mathit{K}}}{\overline{\mathit{P}}}_{\mathit{A}}^{\mathit{J}-\mathbf{1}-\widehat{\mathit{K}}}+{\overline{\mathit{P}}}_{\mathit{F}}{\overline{\mathit{P}}}_{\mathit{A}}^{\mathit{J}-\mathbf{1}}.$$

Algorithm 2 Algorithm NDMA-MPR with random backlog retransmission control. | |

1. | Generate set of colliding terminals $\mathcal{T}$ using traffic model. |

2. | Start of a conventional epoch-slot of NDMA |

3. | Detect the presence of contenting terminals using ${\mathit{z}}_{\mathit{j}}$ in (4). |

4. | Request retransmissions $\left(\mathit{r}=\u2308\frac{\widehat{\mathit{K}}}{\mathit{M}}\u2309-\mathbf{1}\right)$ to create a virtual MIMO system as in (6) |

5. | Attempt the decoding of the colliding terminals using ZF ($\widehat{\mathbf{S}}={\mathbf{H}}^{-\mathbf{1}}\mathbf{Y}$) or minimum mean square error (MMSE) detection ($\widehat{\mathbf{S}}={(\mathbf{H}+\mathbf{I}{\mathit{\sigma}}_{\mathit{v}}^{\mathbf{2}})}^{-\mathbf{1}}\mathbf{Y}$). |

6. | Is the collision resolved? If Yes, then go back to step 1. If not, terminals backlog randomly the lost packet with probability $\mathit{p}$. Go back to step 3. |

The average delay for NDMA is usually approximated by the formula of delay an M/G/1 queue with vacations [6]:
$$\mathit{D}=\mathit{E}\left[{\mathit{L}}_{\mathit{r}}\right]+\frac{\mathit{\lambda}\mathit{E}\left[{\mathit{L}}_{\mathit{r}}^{\mathbf{2}}\right]}{\mathbf{2}(\mathbf{1}-\mathit{\lambda}\mathit{E}\left[{\mathit{L}}_{\mathit{r}}\right])}+\frac{\mathit{E}\left[{\mathit{L}}_{\mathit{ir}}^{\mathbf{2}}\right]}{\mathbf{2}\mathit{E}\left[{\mathit{L}}_{\mathit{ir}}\right]},$$
where using an approximation based on the properties of binomial and geometric probability distributions we can obtain:
where
and

$$\mathit{E}\left[{\mathit{L}}_{\mathit{r}}^{\mathbf{2}}\right]=\frac{(\mathbf{2}-{\mathit{P}}_{\mathit{c}})(\mathbf{1}-{\mathit{P}}_{\mathit{c}})}{{\mathit{P}}_{\mathit{c}}^{\mathbf{2}}}\left\{\frac{(\mathbf{2}-\mathit{p})(\mathbf{1}-\mathit{p})}{{\mathit{p}}^{\mathbf{2}}}\mathit{E}\left[{\mathit{l}}_{\mathit{ir}}^{\mathbf{2}}\right]+\mathit{E}\left[{\mathit{l}}_{\mathit{r}}^{\mathbf{2}}\right]\right\}+\mathit{E}\left[{\mathit{l}}_{\mathit{r}}^{\mathbf{2}}\right],$$

$$\mathit{E}\left[{\mathit{l}}_{\mathit{r}}^{\mathbf{2}}\right]=\sum _{\widehat{\mathit{K}}=\mathbf{1}}^{\mathit{J}}\left(\begin{array}{c}\mathit{J}-\mathbf{1}\\ \widehat{\mathit{K}}-\mathbf{1}\end{array}\right){\u2308\frac{\widehat{\mathit{K}}}{\mathit{M}}\u2309}^{\mathbf{2}}{\mathit{P}}_{\mathit{D}}{\mathit{P}}_{\mathit{A}}^{\widehat{\mathit{K}}-\mathbf{1}}{\overline{\mathit{P}}}_{\mathit{A}}^{\mathit{J}-\widehat{\mathit{K}}}+\sum _{\widehat{\mathit{K}}=\mathbf{0}}^{\mathit{J}-\mathbf{1}}\left(\begin{array}{c}\mathit{J}-\mathbf{1}\\ \widehat{\mathit{K}}\end{array}\right){\u2308\frac{\widehat{\mathit{K}}}{\mathit{M}}\u2309}^{\mathbf{2}}{\overline{\mathit{P}}}_{\mathit{D}}{\mathit{P}}_{\mathit{A}}^{\widehat{\mathit{K}}}{\overline{\mathit{P}}}_{\mathit{A}}^{\mathit{J}-\mathbf{1}-\widehat{\mathit{K}}}+{\overline{\mathit{P}}}_{\mathit{D}}{\overline{\mathit{P}}}_{\mathit{A}}^{\mathit{J}-\mathbf{1}},$$

$$\mathit{E}\left[{\mathit{L}}_{\mathit{ir}}^{\mathbf{2}}\right]=\sum _{\widehat{\mathit{K}}=\mathbf{1}}^{\mathit{J}}\left(\begin{array}{c}\mathit{J}-\mathbf{1}\\ \widehat{\mathit{K}}-\mathbf{1}\end{array}\right){\u2308\frac{\widehat{\mathit{K}}}{\mathit{M}}\u2309}^{\mathbf{2}}{\mathit{P}}_{\mathit{F}}{\mathit{P}}_{\mathit{A}}^{\widehat{\mathit{K}}-\mathbf{1}}{\overline{\mathit{P}}}_{\mathit{A}}^{\mathit{J}-\widehat{\mathit{K}}}+\sum _{\widehat{\mathit{K}}=\mathbf{0}}^{\mathit{J}-\mathbf{1}}\left(\begin{array}{c}\mathit{J}-\mathbf{1}\\ \widehat{\mathit{K}}\end{array}\right){\u2308\frac{\widehat{\mathit{K}}}{\mathit{M}}\u2309}^{\mathbf{2}}{\overline{\mathit{P}}}_{\mathit{D}}{\mathit{P}}_{\mathit{A}}^{\widehat{\mathit{K}}}{\overline{\mathit{P}}}_{\mathit{A}}^{\mathit{J}-\mathbf{1}-\widehat{\mathit{K}}}+{\overline{\mathit{P}}}_{\mathit{F}}{\overline{\mathit{P}}}_{\mathit{A}}^{\mathit{J}-\mathbf{1}}.$$

## 7. Results

The results discussed in this section have been obtained with a network configuration with $\mathit{J}=\mathbf{16}$ terminals with a fixed average SNR $\mathit{\gamma}$ of 3 dB and two antennas at the BS ($\mathit{M}=\mathbf{2}$). The detection threshold has been adjusted to obtain a probability of false alarm of ${\mathit{P}}_{\mathit{F}}=\mathbf{0.01}$. Figure 6 and Figure 7 show the stable throughput $\mathit{T}=\mathit{J}\mathit{\lambda}$ versus different traffic load values for both strategies. Figure 8 and Figure 9 show the average delay experienced by the two retransmission strategy. It can be observed that the persistent retransmission scheme only slightly outperforms the random retransmission strategy. Both strategies seem to be able to achieve the maximum throughput estimates in previous workd and also in this paper in (14): ${\mathit{\lambda}}_{\mathit{max}}<{\u2308\frac{\mathit{J}}{\mathit{M}}\u2309}^{-\mathbf{1}}$. This is a significant result that paves the way for further analysis about the equivalence of stability and throughout metrics of the protocol. The use of a multiple antenna receiver has improved significantly the throughput and delay of the protocol in comparison with the results in our conference paper. They can be further improved by adding more antennas at the receiver side. The effects of channel correlation and line of sight are also visible as degrading issues. However, the gain provided by the diversity combining multiple antenna receiver is still significant enough to justify the rise of complexity of a multiple antenna receiver.

It is worth pointing out that the main virtues of the random retransmission strategy cannot be fully observed in the figures provided here. The random strategy will be optimum in networks affected by deep and long fades, or with terminals with long term degrading channel conditions. Therefore, the reader should keep in mind that random retransmission will play an important role in particular network situations. Future networks are meant to be more adaptive and cognitive to network and channel conditions, and therefore, it is expected that different backlog retransmission strategies can be adopted on the fly to maximize performance. Another aspect to point out is that in comparison with ALOHA solutions, NDMA protocols are capable to adopt persistent retransmission strategies, which in ALOHA is practically impossible. Once a collision event occurs in ALOHA, terminals must engage in random backlog retransmission algorithms, mainly because the repetition of the same collision event (used in persistent retransmission schemes) leads inevitably to unstable performance. This is another proof that NDMA is considerably better in terms of stability than its ALOHA counterparts.

Regarding delay, both algorithms seem to achieve the same performance. Delay is degraded as traffic load reaches the maximum channel transmission rate. The values of delay suggest that NDMA has good performance for real-time systems only at moderate traffic loads. The persistent strategy seemed to have the best performance. We remind the reader that the original protocol ignores the effects of backlog traffic, whereas in the present approach we estimate the effects of backlog traffic by inducing further retransmissions so that we can evaluate the performance of the algorithm in such conditions.

The results shown in here have been obtained using the assumption of independence of queues. This assumption is valid at medium traffic loads. Therefore, in particular delay, will lose accuracy at high traffic loads. It is also worth pointing out that the results of the random retransmission strategy were obtained under the assumption of the backlog retransmission process to match the transmission rate of the system. In practice, it is difficult to achieve this transmission control at low traffic loads. Therefore the validity of the results increases at medium and relatively high traffic loads.

## 8. Conclusions

This paper has presented two retransmission schemes of backlog traffic for the NDMA protocol with MPR capabilities in Rice block fading and non-dispersive channels. It has been observed that under these assumptions the persistent retransmission strategy, where terminals involved in an unsuccessful resolution keep retransmitting until the collision is resolved, provides the best results achieving an almost identical value as the throughput without backlog traffic consideration. However, the random retransmission strategy with a retransmission probability equal to the system transmission rate performs also very well, but it has the further advantage of being suitable for scenarios with deep and long-term fades or with terminals with persistent bad channels conditions. The results show that NDMA-MPR considerably outperforms stability of ALOHA solutions. It has been also shown that for high SNR values, the persistent retransmission scheme boils down to the conventional NDMA solution. The importance of the results in this paper is that NDMA shows great potential for handling future low-latency traffic, particularly at high values of SNR and moderate traffic loads. Additionally, we have obtained for the first time a figure of the performance of NDMA with backlog traffic, thus, helping in the evaluation of the stability properties of this type of protocol.

## Funding

SCOTT (www.scottproject.eu) has received funding from the Electronic Component Systems for European Leadership Joint Undertaking under grant agreement No. 737422. This Joint Undertaking receives support from the European Union’s Horizon 2020 research and innovation programme and Austria, Spain, Finland, Ireland, Sweden, Germany, Poland, Portugal, Netherlands, Belgium, Norway. Funded also by FCT/MEC (Fundacão para a Ciência e a Tecnologia), ERDF (European Regional Development Fund) under PT2020, and by CISTER Research Unit (CEC/04234).

## Conflicts of Interest

The author declares no conflict of interest.

## References

- Evans, D. The Internet of Things. How the next evolution of the Internet is changing everything. White paper. Available online: https://www.cisco.com/c/dam/en_us/about/ac79/docs/innov/IoT_IBSG_0411FINAL.pdf (accessed on 1 February 2019).
- Samano-Robles, R. Stability and Delay of Network-Diversity Multiple Access with Backlog Retransmission Control. In Proceedings of the Second International Conference on Advances in Signal, Image and Video Processing—From Sensing to Applications (SIGNAL 2017), Barcelona, Spain, 21–25 May 2017. [Google Scholar]
- Naware, V.; Mergen, G.; Tong, L. Stability and delay of finite-user slotted ALOHA with multipacket reception. IEEE Trans. Inf. Theory
**2005**, 51, 2636–2656. [Google Scholar] [CrossRef] - Ngo, M.H.; Krishnamurthy, V.; Tong, L. Optimal Channel-Aware ALOHA Protocol for Random Access in WLANs with Multipacket reception and Decentralized CSI. IEEE Trans. Signal Process.
**2008**, 56, 2575–2588. [Google Scholar] [CrossRef] - Adireddy, S.; Tong, L. Exploiting decentralized CSI for Random Access. IEEE Trans. Inf. Theory
**2005**, 51, 537–561. [Google Scholar] [CrossRef] - Tsatsanis, M.K.; Zhang, R.; Banerjee, S. Network-Assisted Diversity for Random Access Wireless Networks. IEEE Trans. Signal Proc.
**2000**, 48, 702–711. [Google Scholar] [CrossRef] - Tsatsanis, M.K.; Zhang, R.; Banerjee, S. Network-Assisted Diversity for Random Access systems in dispersive channels. IEEE Trans. Commun.
**2002**, 50, 623–632. [Google Scholar] - Zhang, R.; Sidiropoulos, N.D.; Tsatsanis, M.K. Collision resolution in packet radio networks using rotational invariance techniques. IEEE Trans. Commun.
**2002**, 50, 146–155. [Google Scholar] [CrossRef] - Ozgul, B.; Delic, H. Wireless access with blind collision-multiplicity detection and retransmission diversity for quasi-static channels. IEEE Trans. Commun.
**2006**, 54, 858–867. [Google Scholar] [CrossRef] - Dimic, G.; Sidiropoulos, N.D.; Tassiulas, L. Wireless networks with retransmission diversity access mechanisms: stable throughput and delay properties. IEEE Trans. Signal Process.
**2003**, 51, 2019–2030. [Google Scholar] [CrossRef][Green Version] - Samano-Robles, R.; Gameiro, A. Stability properties of network diversity multiple access protocols with multiple antenna reception and imperfect collision multiplicity estimation. J. Comput. Netw. Commun.
**2013**, 2013, 984956. [Google Scholar] - Samano-Robles, R.; McLernon, D.C.; Ghogho, M. A Random Access Protocol incorporating Retransmission Diversity, Multipacket Reception, and Successive Interference Cancellation. In Multiple Access Communications: MACOM 2015; Lecture Notes in Computer Science; Springer: Cham, Switzerland, 2015; pp. 70–86. [Google Scholar]
- Pereira, M.; Bernardo, L.; Dinis, R.; Oliveira, R.; Pinto, P. Performance Analysis of an Hybrid ARQ Adaptation of NDMA Schemes. IEEE Trans. Commun.
**2013**, 61, 3304–3317. [Google Scholar] - Lagen, S.; Agustin, A.; Vidal, J.; Garcia, J. Performance analysis of feedback-free collision resolution NDMA protocol. In Proceedings of the IEEE Vehicular Technology Conference VTC 2018, Porto, Portugal, 3–6 June 2018. [Google Scholar]
- Akl, N.; Tewfik, A. Asynchronous Blind Network Diversity Multiple Access. In Proceedings of the IEEE International Conference on Acoustic, Speech and Signal Processing (ICASP), Calgary, AB, Canada, 15–20 April 2018. [Google Scholar]
- Samano-Robles, R. Performance Analysis of Network Diversity multiple Access with Sequential Detection and non-orthogonal training Sequences. In Proceedings of the IEEE Vehicular Technology Conference VTC 2018, Porto, Portugal, 3–6 June 2018. [Google Scholar]

**Figure 6.**Stable throughput ($\mathit{T}=\mathit{\lambda}\mathit{J}$) vs. transmission probability ($\mathit{p}$) using the first proposed backlog retransmission scheme (persistent) for various values of correlation coefficient $\mathit{\rho}$ and Rice factor ($\mathit{\kappa}$).

**Figure 7.**Stable throughput ($\mathit{T}=\mathit{\lambda}\mathit{J}$) vs. transmission probability ($\mathit{p}$) using the second proposed backlog retransmission scheme for various values of correlation coefficient $\mathit{\rho}$ and Rice factor ($\mathit{\kappa}$).

**Figure 8.**Average Delay ($\mathit{D}$) vs. transmission probability ($\mathit{p}$) using the first proposed backlog retransmission scheme for various values of correlation coefficient $\mathit{\rho}$ and Rice factor ($\mathit{\kappa}$).

**Figure 9.**Average Delay ($\mathit{D}$) vs. transmission probability ($\mathit{p}$) using the second proposed backlog retransmission scheme for various values of correlation coefficient $\mathit{\rho}$ and Rice factor ($\mathit{\kappa}$).

Variable | Meaning |
---|---|

$\mathit{J}$ | Total number of terminals in the network |

$\mathit{M}$ | Number of antennas at the BS. |

$\mathit{e}$ | Epoch-slot indicator |

$\mathit{l}$ | Length of an epoch-slot |

$\mathit{L}$ | Length of a epoch-slot |

${\mathit{L}}_{\mathit{r}}$ | Length of a relevant super epoch-slot |

${\mathit{L}}_{\mathit{ir}}$ | Length of an irrelevant super epoch-slot |

${\mathit{h}}_{\mathit{j},\mathit{m}}$ | Channel between terminal $\mathit{j}$ and the $\mathit{m}$th antenna of the BS |

${\mathit{\alpha}}_{\mathit{j},\mathit{m}}$ | Random component channel between terminal $\mathit{j}$ and the $\mathit{m}$th antenna of the BS |

${\mathit{\rho}}_{\mathit{m},\tilde{\mathit{m}}}$ | Correlation coefficient between the signal of antenna $\mathit{m}$ with the signal of antenna $\tilde{\mathit{m}}$ |

$\mathit{\gamma}$ | Channel variance between terminals and the BS |

${\mathit{\sigma}}_{\mathit{v}}^{\mathbf{2}}$ | Noise variance |

${\mathit{\sigma}}_{\mathit{g}}^{\mathbf{2}}$ | Interference variance |

$\mathit{\lambda}$ | Packet arrival rate |

$\mathit{p}$ | Terminal transmission probability |

$\mathit{K}$ | Collision multiplicity |

$\widehat{\mathit{K}}$ | Estimated collision multiplicity |

${\mathit{k}}_{\mathit{d}}$ | Number of active terminals correctly detected as active |

${\mathit{k}}_{\mathit{f}}$ | Number of idle terminals incorrectly detected as active |

$\mathcal{T}$ | Set of colliding terminals |

$\widehat{\mathcal{T}}$ | Estimated set of colliding terminals |

${\mathit{z}}_{\mathit{j}}$ | Terminal presence indicator |

$\mathit{\beta}$ | Energy presence detection threshold |

${\mathit{P}}_{\mathit{D}}$ | Terminal presence detection probability |

${\mathit{P}}_{\mathit{F}}$ | Probability of false alarm |

${\mathit{P}}_{\mathit{A}}$ | Total probability of detection |

${\mathit{P}}_{\mathit{c}}$ | Probability of correct resolution |

$\mathsf{\Gamma}$ | Post processing instantaneous Signal-to-Interference-plus-Noise Ratio |

$\mathit{\mu}$ | Line-of-Sight (LOS) component |

${\mathbf{w}}_{\mathit{j}}$ | Orthogonal training sequence for terminal $\mathit{j}$ |

${\mathbf{s}}_{\mathit{j}}$ | Signal transmitted by terminal $\mathit{j}$ |

$\mathbf{H}$ | Mixing channel matrix |

$\mathbf{Y}$ | Signal received by the BS |

$\mathbf{V}$ | Noise vector at the BS |

$\mathbf{G}$ | Interference vector at the BS |

$\mathit{T}$ | Packet throughput |

$\mathit{D}$ | Delay |

$\mathit{\kappa}$ | Rice factor |

© 2019 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).