# Frameless ALOHA Protocol for Wireless Networks

###### Abstract

We propose a novel distributed random access scheme for wireless networks based on slotted ALOHA, motivated by the analogies between successive interference cancellation and iterative belief-propagation decoding on erasure channels. The proposed scheme assumes that each user independently accesses the wireless link in each slot with a predefined probability, resulting in a distribution of user transmissions over slots. The operation bears analogy with rateless codes, both in terms of probability distributions as well as to the fact that the ALOHA frame becomes fluid and adapted to the current contention process. Our aim is to optimize the slot access probability in order to achieve rateless-like distributions, focusing both on the maximization of the resolution probability of user transmissions and the throughput of the scheme.

## I Introduction

Slotted ALOHA (SA) [1] is a standard random access scheme, in which feedback to the contending terminals is sent after each slot. Framed ALOHA (FA) is a variant in which slots are organized in a frame. Prior to the frame start, each terminal randomly and independently chooses a single slot within the frame to transmit its packet, and it receives feedback at the end of the frame. A typical premise in ALOHA protocols is that the interference among user transmissions is destructive and only slots that contain single transmission are usable. The expected throughput of the classical SA is , where is the average number of packets sent per slot. The throughput is maximized for , when .

Recently, an important paradigm change was made in [2], where the collisions are not considered destructive, as they can be resolved using successive interference cancellation (SIC). The users repeat their transmissions in multiple slots of the frame and each transmission carries a pointer to the slots where the other replicas take place; this information is used by the SIC algorithm in order to remove replicas of the already resolved packets. Packet resolution and removal is performed in an iterative manner, as depicted in Fig. 1. In this way the throughput is increased; e.g., for the simple scenario when each user performs two repetitions in randomly selected slots of a frame, the throughput is .

In [3] another important upgrade of framed ALOHA has been proposed, based on the fact that the execution of SIC resembles the iterative belief-propagation (BP) decoding on erasure channel, which allows for employing the theory and tools from codes-on-graphs. The access method of framed ALOHA was further generalized, allowing probabilistic selection of the number of repetitions on a user basis; the related convergence of SIC was analyzed using standard and-or tree arguments [4] and the optimal repetition strategies (in terms of maximizing throughput of the scheme) were obtained. These strategies resemble the left-irregular LDPC distributions and achieve asymptotic throughput close to 1.

In this letter we investigate the potential of applying the paradigm of rateless codes [5] to the SA framework. Our objective is to design a random access solution based on analogous principles. We note that we are not just applying another type of erasure coding (i.e., fixed-rate codes vs. rateless codes), but the rateless analogy brings a major conceptual shift with respect to framed ALOHA: the frame length is not a priori set and becomes fluid, such that new slots are added until sufficiently high fraction of users has been resolved; therefore the name frameless ALOHA. This implies that the time instant at which feedback arrives also adapts to the contention process. The results demonstrate remarkably high throughput values, and the simulation results appear to lead the highest throughput compared to the reported literature. At the same time, the proposed scheme is rather simple to implement.

## Ii Frameless ALOHA protocol

### Ii-a Background: Rateless codes

Rateless codes have advantageous erasure-correcting properties as they are universally capacity-achieving, independently of the erasure channel conditions. They are rateless in a sense that the code rate is not a priori set and it depends on the channel conditions: the encoder produces and sends newly encoded symbols until receiving feedback that the message is decoded. The initial class of rateless codes, LT codes [5], use a simple encoding rule: each encoded symbol is produced by XOR-ing uniformly and randomly sampled source symbols, where degree is chosen from a distribution .

LT codes admit sparse-graph interpretation and iterative BP decoding [5]. In a LT code graph, the source and the encoded symbols represent the left- and the right-side nodes, respectively. The graph edges reflect the process of combining source symbols into encoded symbols. An LT code is designed by optimizing the right degree distribution, while the left one asymptotically tends to Poisson distribution due to random uniform source node sampling. In contrast, by defining the user behavior in random access scheme, one can influence only the left degree distribution, which puts new constraints in the design of LT-like code within the SA framework.

### Ii-B Terminology and notation

The relations among users and slots in SA scheme can be represented using a graph (Fig. 2), where the edges connect the users to slots in which their repeated transmissions take place. We refer to the number of edges incident to user (slot ) as a user degree (slot degree ). The user and slot degrees are selected from the degree distributions and , respectively, where and . Further, we introduce edge-perspective degree distributions and , where () is the probability that an edge is incident to a user of degree (to a slot of degree ):

(1) |

The execution of the SIC algorithm, in terms of SA graph, proceeds as follows. Initially, the degree-one slots are identified, allowing for resolution of the users (i.e., user packets) connected to these slots and identification of all the other edges (i.e., packet replicas) incident to resolved users. In the next step, using SIC, these edges are erased from the graph (i.e., replicas are removed), thus lowering the degrees of the incident slots and potentially resulting in new degree-one slots. These slots enable resolution of yet unresolved users, driving the SIC further. Fig. 3 shows the execution of the SIC algorithm on a graph corresponding to the SA example given in Fig. 1.

### Ii-C System model

We consider the following setup. The network consists of users which contend for the access to the Base Station (BS) with their uplink transmissions ( is assumed known). The channel is divided into equal-duration slots. A downlink beacon denotes the start of the contention round, synchronizing the users at two levels: i) the starting instants of the slots become aligned across users and ii) the numbering sequence of the slots after the beacon becomes a common knowledge across the users. In each slot every user attempts transmission with a predefined probability, denoted as slot access probability (received via the beacon at the start of the round); this probability is the same for all users in the given slot and, in general, is a function of the slot number. The round is terminated when the fraction of resolved users reaches a predefined threshold, which is signaled by the next beacon that acknowledges resolved users and initializes the next round.

Hereafter, we assume that the slot access probability that corresponds to slot is:

(2) |

where is the expected degree of slot (i.e., is the expected load of ). The actual degree of is given by the binomial distribution, which can be approximated by the Poisson distribution for the ranges of and that are of interest in this paper. It can be shown that:

(3) |

The degree distribution of is equal to:

(4) |

The slot degree distribution is LT-like, however, due to the constraints of the access method it can not be optimized directly, as in [5], but only implicitly by controlling the probability (and thus ), as elaborated in Section III.

Suppose that the round totals slots. The average slot degree distribution and the average slot degree are:

(5) | |||

(6) |

The user degree distribution is also a Poisson one, whose expected value depends on the total number of slots and average slot degree . In order to resolve all users, the total number of slots must be equal or greater than the number of users, i.e., , where is the overhead in number of slots with respect to the ideal case, in which . If we denote the average user degree by and use the relation , is:

(7) |

The main performance parameters of interest are probability of user resolution and throughput , calculated as:

(8) |

which is a measure of the efficiency of slot usage. We also note that both and are functions of and .

### Ii-D Analysis

An useful upper bound on can be derived by observing that if a user does not attempt to transmit at all (remains idle during the contention round), he cannot be resolved. The probability of a user being idle for consecutive slots is:

(9) |

Therefore:

(10) |

where . It could be shown that this bound can be seen as a special instance of the bound derived in [6]. From (10) it can be observed that the greater the average slot degree and/or overhead , the lower . If is fixed to , we get:

(11) |

Consider the slot with the degree distribution . The probability of slot being idle is then . Similarly as before, by increasing the expected degree , the probability of being idle is decreased. However, by increasing , the probability that is of low degree decreases as well, which can adversely affect the progress of the SIC. As elaborated in [5], a substantial fraction of slots is required to be of low degrees in order to drive the execution of SIC.

The and-or tree analysis [4] can be used to derive the evolution of over the iterations of the SIC algorithm. Let us denote by () the average probability that an edge in the graph incident to a user (slot) survives the -th iteration. Using the expressions given in [4], as well as Eqs. (1), (5) and (7), it can be shown that:

(12) | ||||

(13) |

The expected probability of user resolution after the -th iteration is . By varying in (6), (12) and (13), is obtained for changing number of slots, showing the expected behavior of the proposed approach where the contention round length is not a priori set.

The simplest case is when is constant and equal for all slots , i.e., , . In this case, all the slots share the same degree distribution , , while the user degree distribution is . Also, the corresponding expression for is now particularly simple and equal to .

## Iii Results

In this section we present results obtained both using the and-or tree analysis and simulations. We focus on the simplest case with the constant expected slot degree, as this strategy poses minimal requirements/coordination across the users. We seek for the optimal degree that yields the maximum and , denoted by and . Each instance of the optimization is performed for fixed and we vary over the instances. In the simulation part, we have considered users and all results are obtained averaging over 1000 simulation runs for every of interest. We have performed only MAC-layer simulations, abstracting the physical layer issues, as justified in [3]. The SIC was implemented using standard iterative BP decoder for erasure channels [5].

Fig. 4 presents as function of . The greater the number of users , the closer is to its asymptotic bound given by the and-or tree analysis. Also, displays steep increase after surpasses a threshold value, this threshold being closer to 1 as grows. As grows, saturates and reaches the upper bound given by (10), see the enlarged detail on Fig. 4. is calculated for obtained by the and-or tree analysis (i.e., the asymptotic upper bound).

Fig. 5 shows that maximize . The optimal value of the expected slot degree grows steadily as increases. Interestingly, the lower the number of users, the lower for the given with respect to its asymptotic value.

Finally, Fig. 6 shows the throughput corresponding to the given in Fig. 4, i.e., the maximum throughput obtained for the for the given . For the sake of comparison, we also included obtained for . Initially, as increases, the performance follows the performance, and reaches the maximum value shortly after ratio becomes greater than 1. As increases further, starts to decrease, since the performance saturates while grows, see Eq. (8). The maximum asymptotic throughput that can be attained is approximately and it is approached for large number of users . Nevertheless, the maximum throughput obtained for the realistic number of users is better than the throughput obtained by the more involved methods [3], while the average user degree (i.e., average number of transmissions) is lower. Particularly, the average user degree obtained for the example user degree distribution , given in [3], is equal to , while in the simple scheme presented here the average user degree for and that maximizes is always . At the same time, the maximum throughputs for the presented scheme are consistently better than for the distribution from [3], as showed in Fig. 6.

## Iv Discussion and practical considerations

In practice, the behavior of user over the slots is determined through a function , where denotes the -th slot. is a pseudorandom generator tailored to and , which has two outputs - stay silent or transmit, and the slots in which user transmits are completely determined by . We assume that each transmitted packet of carries the identifier of , such that upon a successful decoding of this packet, the BS can recover the slots in which has transmitted in the past and will transmit in the future.

The optimized slot access probability depends on the number of users , hence an estimate of should be available. For a batch arrival of terminals, the BS can use a fast estimation algorithm for , as in [7]. For continuous arrivals from a user population with arrived packets per slot, similar to framed ALOHA, is estimated as , where is the average frame duration, plus the retrying users from the previous frame. Fig. 5 indicates that varies slowly with , such that even a rough estimate of is likely to provide a good throughput, but this observation requires a further study.

Following Section III, where the varying was implicitly addressed, we investigated the strategy for maximizing the average throughput when the length of the frame (i.e. contention round) is not a priori set, as depicted in Fig. 7. The contention round lasts until the fraction of resolved users reaches a predetermined threshold, which corresponds to the (Fig. 4) which maximizes (Fig. 6). The slot access probability is selected according to that corresponds to the above and . As an example, for , the threshold is equal to , as this value maximizes , and the slot access probability is , as the expected slot degree that maximizes is , while the maximum should be reached for slots. Using this approach, by simulations we obtained that the average length of the contention round is indeed , with average throughput , as suggested in Fig. 6.

The BS is triggered to send the beacon when the fraction of resolved users reaches a predefined threshold. The beacon also carries ACK feedback to the resolved users. In Frequency Division Duplex (FDD) systems, the beacon can be sent through a dedicated downlink channel. In a Time Division Duplex (TDD) system, the beacon could be given precedence using carrier sensing or some other appropriate technique. These and other practical issues are subject of further work.

## References

- [1] L. G. Roberts, “Aloha packet system with and without slots and capture,” SIGCOMM Comput. Commun. Rev., vol. 5, no. 2, pp. 28–42, Apr. 1975.
- [2] E. Cassini, R. de Gaudenzi, and O. del Rio Herrero, “Contention Resolution Diversity Slotted ALOHA (CRDSA): An Enhanced Random Access Scheme for Satellite Access Packet Networks,” IEEE Trans. Wireless Commun., vol. 6, no. 4, pp. 1408–1419, Apr. 2007.
- [3] G. Liva, “Graph-Based Analysis and Optimization of Contention Resolution Diversity Slotted ALOHA,” IEEE Trans. Commun., vol. 59, no. 2, pp. 477–487, Feb. 2011.
- [4] M. Luby, M. Mitzenmacher, and A. Shokrollahi, “Analysis of random processes via and-or tree evaluation,” in ACM SODA ’98, San Francisco, USA, 1998.
- [5] M. Luby, “LT Codes,” in IEEE FOCS ’02, Vancouver, Canada, 2002.
- [6] E. Paolini, G. Liva, and M. Chiani, “Graph-Based Random Access for the Collision Channel without Feed-Back: Capacity Bound,” in IEEE Globecom, Houston, USA, 2011.
- [7] M. Kodialam and T. Nandagopal, “Fast and Reliable Estimation Schemes in RFID Systems,” in ACM MobiCom ’06, Los Angeles, USA, 2006.