Skip to main content

Slotted Aloha with multi-AP diversity and APS transmit beamforming

Abstract

Slotted Aloha is an effective random access protocol and can also be an important element of more advanced media access protocols. This paper investigates slotted Aloha in a radio environment with multiple access points. Specifically, we examine the impact of multi-access-point (multi-AP) diversity on the performance of slotted Aloha. The paper considers both omni-directional (OM) and beamforming (BF) antennas at transmission nodes. This leads to the investigation and comparison of four different network scenarios, i.e., OM with multi-AP diversity, OM without multi-AP diversity, BF with multi-AP diversity and BF without multi-AP diversity. Performance evaluations and comparisons are presented in terms of throughput and average packet delay.

I. Introduction

Slotted Aloha has been extensively used in wireless environments [14], in which the power levels of received packets can be different due to independent fading. It is possible that the strongest packet captures the receiver even when there is a packet collision [5], which could increase throughput. This phenomenon is referred to as the capture effect. A lot of research have been conducted for the investigations of the capture effect under various fading channels, including Rayleigh, Rician and Nakagami [68].

Besides the capture effect, beamforming (BF) techniques can also potentially increase throughput since they are able to reduce collisions in slotted Aloha as compared to omni-directional (OM) antennas. The applications of BF at both receiving and transmitting sides have been investigated. It is shown that a single-beam adaptive array at the receiver improves the performance of a slotted Aloha network by creating a strong capture effect [9] and a multiple receiving beam adaptive array can successfully receive two or more overlapping packets at the same time [10]. Slotted Aloha using transmit BF at mobile entities in mobile ad hoc networks has also been studied [11].

Notice that there can be two types of interference in slotted Aloha in a cellular environment, multiple access interference and cochannel interference. For a given user, multiple access interference is due to users within the same cell and cochannel interference is due to users in cochannel cells. The performance of slotted Aloha in Nakagami fading channels considering both synchronized and asynchronous cochannel cells is analyzed in [12], highlighting the differences between these two types of interference. While all cochannel interfering packets are discarded in [12], a model, in which multiple base stations are able to accept a packet from the same user as long as it captures the receivers, is studied in [13] through simulations. Clearly, such a scheme potentially improves the throughput of slotted Aloha as compared to the approach in [12].

The model in [13] is a type of multi-access-point (multi-AP) diversity, a concept also addressed in [14] which considers downlinks in cellular communications. It is pointed out that a user can simultaneously receive pilot channels from multiple base stations, which introduces multi-AP diversity due to independent channel variations between the user and the base stations [14]. Therefore, a user could choose one base station among a set of base stations as its server according to channel conditions. Similarly, a multi-AP architecture has been proposed for wireless local area networks, in which one user can associate with more than one access point [15].

This paper investigates slotted Aloha with multi-AP diversity and it differs from previous research in the following aspects. Firstly, we develop analytical models and derive closed-form solutions for the throughput and average packet delay. Secondly, we investigate the joint use of transmit BF and multi-AP diversity. We thus specifically study four network scenarios, i.e., OM with multi-AP diversity, OM without multi-AP diversity, BF with multi-AP diversity and BF without multi-AP diversity, to exam and compare various technical options.

The rest of this paper is organized as follows. Section 2 gives the system model of slotted Aloha with multi-AP diversity, including two cases in which OM and directional antennas are applied, respectively. Sections 3 and 4 analyze these two cases and derive the capture probabilities, throughput and average packet delay. In Section 5, numerical results are presented and, finally, Section 6 draws conclusions.

II. System Model

A. Network model

We consider a network with two access points (AP) A and B (two servers) (Figure 1) placed to cover a given area. Around AP A, there are a set of N A users (User Set A), and around AP B, there are a set of N B users (User Set B). A user u i (1 ≤ iN A ) in User Set A transmits its packet to AP A and/or AP B depending on its antenna structures (OM or BF). Similarly, a user v j (1 ≤ j ≤ N B ) in User Set B transmits its packet to AP B and/or AP A.

Figure 1
figure 1

System model. (a) Omnidirectional antenna, (a) Beamforming antenna.

We apply a traffic and retransmission model as in [16]. If no packet retransmission is needed, each user generates a new packet with a probability σ and no packet with a probability 1 − σ during each time slot. Once a user generates a packet, it transmits the packet immediately. If the packet transmission fails, it will be retransmitted in each of the following slots with a probability σ until it is successfully transmitted. When a user needs to perform packet retransmissions, it does not generate any new packet.

B. Signal capture model

A transmission collision in fading channels does not always result in transmission failures of all packets due to the capture effect, in which a packet may capture a receiver if its power level is higher than the sum of powers of all interfering packets [17, 18]. The capture probability, Pcap, can thus be calculated by

P cap ( I , J ) = Pr x i = 1 I y i + j = 1 J z j > R
(1)

for R ≥ 1, I ≥ 0, J ≥ 0, where x is the power of the desired packet; R is a capture ratio; I and J are the total numbers of interfering packets from the same user set as the desired packet and from the other user set, respectively. y i and z j indicate the powers of interfering packets from the two user sets. In a Rayleigh fading channel, x, y i , z j follow exponential distributions [17, 19]. There are two scenarios in determining the mean powers of x, y i , and z j . When the desired packet is transmitted from User Set A (or B) to AP A (or B), the mean powers are assumed to be X, Y and Z. When the desired packet is transmitted from User Set A (or B) to AP B (or A), the mean powers are assumed to be X, Y and Z. Notice that the mean powers X, Y and Z relate to packet transmissions (desired or interfering) from User Set A (or B) to AP A (or B). The mean powers X, Y and Z relate to packet transmissions (desired or interfering) from User Set A (or B) to AP B (or A). Figure 2 illustrates the packet transmissions and the notations of signal and interference powers and their mean powers. We assume that the mean powers satisfy

Figure 2
figure 2

Signal and interference modeling.

X = Y = Z
(2)

and

X = Y = Z
(3)

We further define

γ = X X = Y Y = Z Z
(4)

Notice that the signal and capture model consider a Rayleigh fading channel environment. There are several capture models which have been investigated in literatures [1720]. This paper only considers one model as defined in Equation 1. Near-far effects [19, 20] due to user spatial distributions are not considered in this model and the combined effect of Rayleigh fading and user spatial distributions will be investigated in our future research.

C. Multi-AP diversity

Multi-AP diversity, in which one user can be associated with more than one access point (e.g., base stations in cellular networks or hot spots in wireless local area networks), is investigated in [14, 15]. In the network model we defined above, each user could potentially transmit a packet through two independent channels to two APs. Therefore, there is multi-AP diversity in the system to potentially provide diversity gains. The following explains how the diversity is exploited when OM or BF antennas are applied at the transmit side.

D. OM versus BF antennas

When users employ OM transmit antennas, any packet transmitted by any user can potentially reach both APs (see Figure 1a). Therefore, a packet has to compete with other packets from all users (User Set A and User Set B) in order to capture a receiver. If transmit BF is used, each user can choose one AP as its server where its packet will have stronger power as compared to that at the other AP. Such an AP selection task can be accomplished based on feedback information or pilot signals. The user steers its beam towards only the chosen AP. Therefore, under the BF antenna mode, any packet can only reach one AP (see Figure 1b). And this leads to potentially less interference.

III. Slotted Aloha with Multi-AP Diversity and OM Antenna

A. Capture probability

Considering the transmission of a desired packet from User Set A to AP A, following the definition in Section 2.A, we find its capture probability as follows,

P cap S A A ( I , J ) = Pr x i = 1 I y i + j = 1 J z j > R = 0 0 R ( i = 1 I y i + j = 1 J z j ) 1 X e - x X d x i = 1 I 1 Y e - y i Y j = 1 J 1 Z e - z j Z d y 1 d y I d z 1 d z J = X R Y + X I X R Z + X J
(5)

Following (2)-(4), (5) can be rewritten as

P cap S A A ( I , J ) = 1 R + 1 I 1 R γ + 1 J
(6)

Similarly, considering other transmission scenarios, we are able to obtain the following capture probabilities (from User Set A to AP B, from User Set B to AP B, and from User Set B to AP A).

P cap S A B ( I , J ) = 1 R + 1 I γ R + γ J
(7)
P cap S B B ( I , J ) = 1 R + 1 I 1 R γ + 1 J
(8)
P cap S B A ( I , J ) = 1 R + 1 I γ R + γ J
(9)

B. Throughput

We consider the throughput per AP, S, which is defined as the total number of packets successfully received by the two APs during one time slot and divided by two. The following defines several events during a period of one time slot.

E: AP A successfully receives one packet and AP B successfully receives one packet and the packets are different.

F : AP A and AP B both successfully receive the same packet.

G: Only AP A successfully receives a packet.

H : Only AP B successfully receives a packet.

T i, j : There are i users in User Set A and j users in User Set B attempting to transmit. If one packet is received successfully at both APs, it is only counted as one. The throughput is thus calculated as

S = 0 . 5 × 2 Pr ( E ) + Pr ( F ) + Pr ( G ) + Pr ( H ) = 0 . 5 × i = 0 N A j = 0 N B N A i σ i ( 1 - σ ) N A - i N B j σ j ( 1 - σ ) N B - j × 2 Pr ( E | T i , j ) + Pr ( F | T i , j ) + Pr ( G | T i , j ) + Pr ( H | T i , j )
(10)

in which

Pr ( E | T i , j ) = Pr ( AP A successfully receives a packet| T i , j ) × Pr ( AP B successfully receives a packet| T i , j ) ( Pr ( A user in U s e r S e t A successfully transmits a packet to AP A and AP B | T i , j ) + Pr ( A user in U s e r S e t B successfully transmits a packet to AP A and AP B | T i , j ) )
(11)

where

Pr ( AP A successfully receives a packet | T i , j ) = i P cap S A A ( i - 1 , j ) + j P cap S B A ( j - 1 , i )
(12)
Pr ( AP B successfully receives a packet | T i , j ) = i P cap S A B ( i - 1 , j ) + j P cap S B B ( j - 1 , i )
(13)
Pr ( A user in U s e r S e t A successfully transmits a packet to AP A and AP B | T i , j ) = i P cap S A A ( i - 1 , j ) P cap S A B ( i - 1 , j )
(14)
Pr ( A user in U s e r S e t B succesfully transmits a packet to AP A and AP B | T i , j ) = j P cap S B A ( j - 1 , i ) P cap S B B ( j - 1 , i )
(15)

Combining (6)-(9) and (11)-(15) we obtain

Pr ( E | T i , j ) = i 1 R + 1 i - 1 1 R γ + 1 j + j 1 R + 1 j - 1 γ R + γ i × i 1 R + 1 i - 1 γ R + γ j + j 1 R + 1 j - 1 1 R γ + 1 i - i 1 R + 1 i - 1 1 R γ + 1 j 1 R + 1 i - 1 γ R + γ j + j 1 R + 1 j - 1 γ R + γ i 1 R + 1 j - 1 1 R γ + 1 i
(16)

Considering Pr(F|T i, j ) in (10), we have

Pr ( F | T i , j ) = Pr ( A user in U s e r S e t A successfully transmits a packet to AP A and AP B | T i j ) + Pr ( A user in U s e r S e t B successfully transmits a packet to AP A and AP B | T i j )
(17)

After combining (6)-(9), (14), (15) and (17), we obtain

Pr ( F | T i , j ) = i 1 R + 1 i - 1 1 R γ + 1 j 1 R + 1 i - 1 γ R + γ j + j 1 R + 1 j - 1 γ R + γ i 1 R + 1 j - 1 1 R γ + 1 i
(18)

We also have

Pr ( G | T i , j ) = Pr ( AP A successfully receives a packet | T i , j ) × ( 1 - Pr ( AP B successfully receives a packet | T i , j ) )
(19)

After combining (6)-(9), (12), (13) and (19), we obtain

Pr ( G | T i , j ) = i 1 R + 1 i - 1 1 R γ + 1 j + j 1 R + 1 j - 1 γ R + γ i × 1 - i 1 R + 1 i - 1 γ R + γ j - j 1 R + 1 j - 1 1 R γ + 1 i
(20)

Similarly, we are able to obtain

Pr ( H | T i , j ) = 1 - i 1 R + 1 i - 1 1 R γ + 1 j - j 1 R + 1 j - 1 γ R + γ i × i 1 R + 1 i - 1 γ R + γ j + j 1 R + 1 j - 1 1 R γ + 1 i
(21)

Finally, the average throughput per access point, S, can be obtained by inserting (16), (18), (20) and (21) into (10).

C. Delay

One method to quantify the delay characteristics is to examine the average number of transmission attempts for each successful transmission, which is defined as Aavg. We define p as the probability of a successful reception of a packet when it is transmitted. We have

A avg = 1 p
(22)

Let the probability that a user successfully transmits a packet after it is generated is p A or p B when this packet is in User Set A or User Set B. We have

p = p A N A N A + N B + p B N B N A + N B
(23)

in which

p A = i = 0 N A - 1 j = 0 N B N A - 1 i σ i ( 1 - σ ) N A - 1 - i N B j σ j ( 1 - σ ) N B - j Pr ( The concerned packet is successfully transmitted to both AP A and AP B | T i + 1 , j ) + Pr ( The concerned packet is successfully transmitted to AP A only | T i + 1 , j ) + Pr ( The concerned packet is successfully transmitted to AP B only | T i + 1 , j ) = i = 0 N A - 1 j = 0 N B N A - 1 i σ i ( 1 - σ ) N A - 1 - i N B j σ j ( 1 - σ ) N B - j × P cap S A A ( i , j ) P cap S A B ( i , j ) + P cap S A A ( i , j ) 1 - P cap S A B ( i , j ) + P cap S A B ( i , j ) 1 - P cap S A A ( i , j )
(24)

Inserting (6) and (7) into (24), we obtain

p A = i = 0 N A - 1 j = 0 N B N A - 1 i σ i ( 1 - σ ) N A - 1 - i N B j σ j ( 1 - σ ) N B - j × 1 R + 1 i 1 R γ + 1 j 1 R + 1 i γ R + γ j + 1 R + 1 i 1 R γ + 1 j 1 - 1 R + 1 i γ R + γ j + 1 R + 1 i γ R + γ j 1 - 1 R + 1 i 1 R γ + 1 j
(25)

Similarly, we are able to find

p B = i = 0 N B - 1 j = 0 N A N B - 1 i σ i ( 1 - σ ) N B - 1 - i N A j σ j ( 1 - σ ) N A - j × 1 R + 1 i 1 R γ + 1 j 1 R + 1 i γ R + γ j + 1 R + 1 i 1 R γ + 1 j 1 - 1 R + 1 i γ R + γ j + 1 R + 1 i γ R + γ j 1 - 1 R + 1 i 1 R γ + 1 j
(26)

Combining (22), (23), (25) and (26), the average number of transmission attempts is obtained.

D. Special case comparison: no multi-AP diversity

The following gives the performance results of slotted Aloha without multi-AP diversity in an OM transmit scenario. Following [12] and based on the derivations in Section 3.B, we are able to obtain the throughput as

S = 0 . 5 × i = 0 N A j = 0 N B N A i σ i ( 1 - σ ) N A - i N B j σ j ( 1 - σ ) N B - j i 1 R + 1 i - 1 1 R γ + 1 j + i = 0 N B j = 0 N A N B i σ i ( 1 - σ ) N B - i N A j σ j ( 1 - σ ) N A - j i 1 R + 1 i - 1 1 R γ + 1 j
(27)

The average number of transmission attempts expressed in (22) and (23) still applies with p A and p B as follows,

p A = i = 0 N A - 1 j = 0 N B N A - 1 i σ i ( 1 - σ ) N A - 1 - i N B j σ j ( 1 - σ ) N B - j 1 R + 1 i 1 R γ + 1 j
(28)
p B = i = 0 N B - 1 j = 0 N A N B - 1 i σ i ( 1 - σ ) N B - 1 - i N A j σ j ( 1 - σ ) N A - j 1 R + 1 i 1 R γ + 1 j
(29)

IV. Slotted Aloha with Multi-AP Diversity and BF Antenna

A. Capture probability

In order to investigate the capture effect in this multi-AP diversity and BF scenario, we define a function

f ( I , J , Γ ) = Pr x i = 1 I y i + j = 1 J z j > R , x > x ̃ , y i > i , z j > z ̃ j
(30)

where x, y i , and z j are the received power of the desired packet, the received power of interfering packets from the same user set as the desired packet, and the received power of interfering packets from the different user set as the desired packet, and respectively, for a target AP; x ̃ is the received power of the desired packet if the desired packet is received at the AP other than the target AP. i and z ̃ j are similarly defined. We let

E [ x ̃ ] E [ x ] = E [ i ] E [ y i ] = E [ z j ] E [ z ̃ j ] = Γ
(31)

For examples, f (m − 1, n, γ) denotes the probability that for a given AP (say AP A), m transmitting users of user set A and n transmitting users of user set B choose AP A and one of the m users successfully captures AP A; f ( m - 1 , n , 1 γ ) denotes the probability that for a given AP (say AP A), m transmitting users of user set B and n transmitting users of user set A choose AP A and one of the m users successfully captures AP A. The following equation derives this function.

f ( I , J , Γ ) = i = 1 I y ˜ i 1 μ e y i µ d y i j = 1 J z ˜ j 1 v e z j v d z j i = 1 I 0 1 v e y ˜ i v d y ˜ i j = 1 J 0 1 Z 2 e z ˜ j µ d z ˜ j × [ R ( i = 1 I y i + j = 1 J z j ) 1 µ e x µ d x 0 R ( i = 1 I y i + j = 1 J z j ) 1 v e x ˜ v d x ˜ + x ˜ 1 µ e x µ d x R ( i = 1 I x i + j = 1 J y j ) 1 v e x ˜ v d x ˜ ] = 1 [ ( 1 + R ) ( 1 + Γ + R Γ ) ] I 1 [ ( 1 + R Γ ) ( 1 + 1 Γ + R ) ] J 1 1 Γ + 1 × 1 { [ 1 + R ( 1 + 1 Γ ) ] [ 1 + Γ + R ( Γ + 1 ) ] } I 1 { [ 1 + R ( Γ + 1 ) ] [ 1 + 1 Γ + R ( 1 + 1 Γ ) ] } J
(32)

B. Throughput

To calculate the average throughput per access point in the BF cases, we can still use the modeling approach based on the event T ij as defined in Section 3.B. Furthermore, a new event Qm, n is defined below.

Qm, n : m transmitting users in User Set A choose AP A and n transmitting users in User Set B choose AP A as their server.

The throughput of AP A, S a , can be calculated as follows.

S a = i = 0 N A j = 0 N B ( N A i ) σ i ( 1 σ ) N A i ( N B j ) σ j ( 1 σ ) N B j Pr ( AP A successfully receives a packet| T i , j ) = i = 0 N A j = 0 N B ( N A i ) σ i ( 1 σ ) N A i ( N B j ) σ j ( 1 σ ) N B j m = 0 i n = 0 j Pr ( Q m , n | T i , j ) × P r ( AP A successfully receives a packet| T i , j Q m , n )
(33)

Expanding the conditional probability Pr(Qm, n|Ti, j), the throughput of AP A is expressed as

S a = i = 0 N A j = 0 N B N A i σ i ( 1 - σ ) N A - i N B j σ j ( 1 - σ ) N B - j m = 0 i n = 0 j i m j n × ( Pr ( a transmitting user in U s e r S e t A chooses AP A ) ) m × ( Pr ( a transmitting user in U s e r S e t B chooses AP A ) ) n × ( 1 - Pr ( a transmitting user in U s e r S e t A chooses AP A ) ) i - m × ( 1 - Pr ( a transmitting user in U s e r S e t B chooses AP A ) ) j - n × Pr ( AP A successfully receives one packet | T i , j Q m , n )
(34)

Notice

Pr ( AP A successfully receives one packet | T i , j Q m , n ) = Pr ( AP A successfully receives one packet from U s e r S e t A | T i , j Q m , n ) + Pr ( AP A successfully receives one packet from U s e r S e t B | T i , j Q m , n )
(35)

and

( Pr ( a transmitting users in U s e r S e t A chooses AP A ) ) m × ( Pr ( a transmitting users in U s e r S e t B chooses AP A ) ) n × Pr ( AP A successfully receives one packet from U s e r S e t A | T i , j Q m , n )  =  m Pr x i = 1 m - 1 y i + j = 1 n z j > R | x > x ̃ , y i > i , z j > z ̃ j Pr ( x > x ̃ , y i > i , z j > z ̃ j )  =  m f ( m - 1 , n , γ )
(36)

Similarly, we are able to obtain

( Pr ( a transmitting users in U s e r S e t A chooses AP A ) ) m × ( Pr ( a transmitting users in U s e r S e t B chooses AP A ) ) n × Pr ( AP A successfully receives one packet from U s e r S e t B | T i , j Q m , n )  =  n f ( n - 1 , m , 1 γ )
(37)

Inserting (34)-(36) into (33), we obtain

S a = i = 0 N A j = 0 N B ( N A i ) σ i ( 1 σ ) N A i ( N B j ) σ j ( 1 σ ) N B j × m = 0 i n = 0 j ( i m ) ( j n ) ( m f ( m 1 , n , γ ) + n f ( n 1 , m , 1 γ ) × ( 1 Pr ( a transmitting users in U s e r S e t A chooses AP A ) ) i m × ( 1 Pr ( a transmitting users in U s e r S e t B chooses AP A ) ) j n
(38)

Following the derivations in (5), we get

Pr ( a transmitting user in U s e r S e t A chooses AP A ) = X X + X
(39)

and

Pr ( a transmitting user in U s e r S e t B chooses AP A ) = X X + X
(40)

Using (2)-(4) and inserting (31), (38), (39) into (37), we obtain

S a = i = 0 N A j = 0 N B N A i σ i ( 1 - σ ) N A - i N B j σ j ( 1 - σ ) N B - j × m = 0 i n = 0 j i m j n m [ ( 1 + R ) ( 1 + γ + R γ ) ] m - 1 [ ( 1 + R γ ) ( 1 + 1 γ + R ) ] n - m γ ( 1 + γ ) [ ( R + 1 ) ( 1 + R ( 1 + 1 γ ) ) ( 1 + γ ) ] m - 1 [ ( R + 1 ) ( 1 + R ( 1 + γ ) ) ( 1 + 1 γ ) ] n + n [ ( 1 + R ) ( 1 + 1 γ + R γ ) ] n - 1 [ ( 1 + R γ ) ( 1 + γ + R ) ] m - n ( 1 + γ ) [ ( R + 1 ) ( 1 + R ( 1 + γ ) ) ( 1 + 1 γ ) ] n - 1 [ ( R + 1 ) ( 1 + R ( 1 + 1 γ ) ) ( 1 + γ ) ] m × γ γ + 1 i - m 1 1 + γ j - n
(41)

Following a similar derivation process as (32)-(40), we obtain the throughput of access point B, S b , as

S b = i = 0 N B j = 0 N A N B i σ i ( 1 - σ ) N B - i N A j σ j ( 1 - σ ) N A - j × m = 0 i n = 0 j i m j n m [ ( 1 + R ) ( 1 + γ + R γ ) ] m - 1 [ ( 1 + R γ ) ( 1 + 1 γ + R ) ] n - m γ ( 1 + γ ) [ ( R + 1 ) ( 1 + R ( 1 + 1 γ ) ) ( 1 + γ ) ] m - 1 [ ( R + 1 ) ( 1 + R ( 1 + γ ) ) ( 1 + 1 γ ) ] n + n [ ( 1 + R ) ( 1 + 1 γ + R γ ) ] n - 1 [ ( 1 + R γ ) ( 1 + γ + R ) ] m - n ( 1 + γ ) [ ( R + 1 ) ( 1 + R ( 1 + γ ) ) ( 1 + 1 γ ) ] n - 1 [ ( R + 1 ) ( 1 + R ( 1 + 1 γ ) ) ( 1 + γ ) ] m × γ γ + 1 i - m 1 1 + γ j - n
(42)

The average throughput per AP, S, is thus S a + S b 2 .

C. Delay

The derivation of the delay in the BF case is similar to that in the OM case. We use the parameters p, p A , p B defined in Section 3.C and event Ti, j defined in Section 3.B. The user transmitting a concerned packet is referred to as a concerned user and all other users are called non-concerned users. Furthermore, a new event Jm, n is defined below.

Jm, n : Excluding the concerned user, m transmitting users in User Set A choose AP A and n transmitting users in User Set B choose AP A as their server.

We have

p A = i = 0 N A - 1 j = 0 N B N A - 1 i σ i ( 1 - σ ) N A - 1 - i N B j σ j ( 1 - σ ) N B - j × Pr ( AP A or AP B successfully receives the concerned packet | T i + 1 , j ) = i = 0 N A - 1 j = 0 N B N A - 1 i σ i ( 1 - σ ) N A - 1 - i N B j σ j ( 1 - σ ) N B - j m = 0 i n = 0 j Pr ( J m , n | T i + 1 , j ) × Pr ( AP A or AP B successfully receives the concerned packet | T i + 1 , j J m , n )
(43)

Expanding Pr(Jm, n|Ti+1, j) and Pr(AP A or AP B successfully receives the concerned packet |Ti+1,jJm, n), we have

p A = i = 0 N A - 1 j = 0 N B N A i σ i ( 1 - σ ) N A - i - 1 N B j σ j ( 1 - σ ) N B - j m = 0 i n = 0 j i m j n × ( Pr ( a non - concerned transmitting user in U s e r S e t A chooses AP A ) ) m × ( Pr ( a non - concerned transmitting user in U s e r S e t B chooses AP A ) ) n × ( 1 - Pr ( a non - concerned transmitting user in U s e r S e t A chooses AP A ) ) i - m × ( 1 - Pr ( a non - concerned transmitting user in U s e r S e t B chooses AP A ) ) j - n × Pr ( AP A successfully receives the concerned packet | T i + 1 , j J m , n ) + Pr ( AP B successfully receives the concerned packet | T i + 1 , j J m , n )
(44)

Notice that

( Pr ( a non-concerned transmitting user in U s e r S e t A chooses AP A ) ) m × ( Pr ( a non-concerned transmitting user in U s e r S e t B chooses AP A ) ) n × Pr ( AP A successfully receives the concerned packet | T i + 1 , j J m , n ) ) = Pr ( x i = 1 m y i + j = 1 n z j > R , x > x ˜ | y i > y ˜ i , z j > z ˜ j ) Pr ( y i > y ˜ i , z j > z ˜ j ) = f ( m , n , γ )
(45)

Similarly, we have

( 1 Pr ( a non-concerned transmitting user in U s e r S e t A chooses AP A ) ) i m × ( 1 Pr ( a non-concerned transmitting user in U s e r S e t B chooses AP A ) ) j n + Pr ( AP B successfully receives the concerned packet| T i + 1 , j J m , n ) ) = f ( i m , j n , 1 γ )
(46)

Inserting (38), (39), (44), (45) into (43) and using (2)-(4) and the function defined in (31), (43) can be rewritten as

p A = i = 0 N A - 1 j = 0 N B N A - 1 i σ i ( 1 - σ ) N A - 1 - i N B j σ j ( 1 - σ ) N B - j m = 0 i n = 0 j i m j n × γ γ + 1 i - m 1 1 + γ j - n 1 [ ( 1 + R ) ( 1 + γ + R γ ) ] m [ ( 1 + R γ ) ( 1 + 1 γ + R ) ] n - γ ( 1 + γ ) [ ( R + 1 ) ( 1 + R ( 1 + 1 γ ) ) ( 1 + γ ) ] m [ ( R + 1 ) ( 1 + R ( 1 + γ ) ) ( 1 + 1 γ ) ] n + 1 γ + 1 m γ 1 + γ n 1 [ ( 1 + R ) ( 1 + 1 γ + R γ ) ] i - m [ ( 1 + R γ ) ( 1 + γ + R ) ] j - n - 1 ( 1 + γ ) [ ( R + 1 ) ( 1 + R ( 1 + γ ) ) ( 1 + 1 γ ) ] i - m [ ( R + 1 ) ( 1 + R ( 1 + 1 γ ) ) ( 1 + γ ) ] j - n
(47)

The probability p B can be similarly found as

p B = i = 0 N B - 1 j = 0 N A N B - 1 i σ i ( 1 - σ ) N B - 1 - i N A j σ j ( 1 - σ ) N A - j m = 0 i n = 0 j i m j n × γ γ + 1 i - m 1 1 + γ j - n 1 [ ( 1 + R ) ( 1 + γ + R γ ) ] m [ ( 1 + R γ ) ( 1 + 1 γ + R ) ] n - γ ( 1 + γ ) [ ( R + 1 ) ( 1 + R ( 1 + 1 γ ) ) ( 1 + γ ) ] m [ ( R + 1 ) ( 1 + R ( 1 + γ ) ) ( 1 + 1 γ ) ] n + 1 γ + 1 m γ 1 + γ n 1 [ ( 1 + R ) ( 1 + 1 γ + R γ ) ] i - m [ ( 1 + R γ ) ( 1 + γ + R ) ] j - n - 1 ( 1 + γ ) [ ( R + 1 ) ( 1 + R ( 1 + γ ) ) ( 1 + 1 γ ) ] i - m [ ( R + 1 ) ( 1 + R ( 1 + 1 γ ) ) ( 1 + γ ) ] j - n
(48)

Applying p A and p B into (22) and (23), the average number of transmission attempts is obtained.

D. Special case comparison: no Multi-AP diversity

The following presents the throughput and delay expressions considering BF but without multi-AP diversity. Following [19], we are able to obtain the throughput as

S = 0 . 5 × i = 0 N A N A i σ i ( 1 - σ ) N A - i i ( R + 1 ) i - 1 + j = 0 N B N B j σ j ( 1 - σ ) N B - j j ( R + 1 ) j - 1
(49)

The delay expression follows (22) and (23), with the probabilities p A and p B given as

p A = i = 0 N A - 1 N A - 1 i σ i ( 1 - σ ) N A - 1 - i 1 ( R + 1 ) i
(50)
p B = j = 0 N B N B - 1 i σ j ( 1 - σ ) N B - 1 - j 1 ( R + 1 ) j
(51)

V. Numerical Results: Theoretical and Simulation

Numerical results presented in this section are mostly based on theoretical formulas. For the comparison purpose, a number of simulation results are also presented. All simulation results are obtained by running MATLAB programs for 500000 time slots. Rayleigh fading and independent transmission links are assumed in generating signal strength values. For packet arrivals, a Poisson distribution is used in determining the number of packets generated in each time slot. Signaling is not implemented in the simulation, assuming that all acknowledgments are received successfully.

Figure 3 compares the throughput of slotted Aloha when BF with multi-AP diversity and OM with multi-AP diversity are used. Both analytical and simulation results are presented. System parameters considered include N A = N B = 25, γ = 0.1, and R = 3 dB. Numerical results illustrate that the analytical evaluation and simulation results match very well. The scenario with BF clearly outperforms the OM case under high traffic load conditions with an approximately 12% improvement in peak throughput.

Figure 3
figure 3

Throughput comparison: OM versus BF, with AP diversity; analytical versus simulation results, N A = N B = 25, γ = 0.1, R = 3 dB.

Figure 4 considers the OM case and examines the impact of the capture ratio, R. System parameters N A and N B are assumed to be 25 and γ is assumed to be 0.1. It is seen that a lower capture ratio leads to higher throughput. The OM case with AP diversity consistently outperforms that without AP diversity, especially when the capture ratio is small.

Figure 4
figure 4

Throughput of OM with different R values, N A = N B = 25, γ = 0.1.

Figure 5 considers the OM case and examines the impact of γ values (see (4)). System parameters N A and N B are assumed to be 25 and R is assumed to be 3 dB. The throughput decreases as γ increases (due to more interference between the two APs). It is also noted that the throughput gain due to multi-AP diversity is more significant when γ is larger.

Figure 5
figure 5

Throughput of OM with different γ values, N A = N B = 25, R = 3 dB.

Figure 6 examines the impact of user distributions (N A versus N B ) in the OM case with multi-AP diversity. The system parameter γ is assumed to be 0.1 and R is assumed to be 3 dB. The scenario with even user distributions (N A = 25 and N B = 25) outperforms other scenarios with uneven distributions. When the user distributions become very uneven (e.g., N A = 40 and N B = 10), throughput is noticeably lower due to the potential of a higher collision probability at the heavy-load AP (N A = 40).

Figure 6
figure 6

Throughput of OM with different user distributions, γ = 0.1, R = 3 dB.

Figure 7a, b, c considers the BF scenario and examines the impact of multi-AP diversity. System parameter γ is assumed to be 0.1 and R is assumed to be 3 dB. The figures show that the advantage, if any, of multi-AP diversity in the BF case depends on the user distributions between the two user sets. When the distributions are extremely uneven (e.g., N A = 45 and N B = 5), the multi-AP diversity clearly shows its advantage. When the distributions become less uneven (e.g., N A = 40 and N B = 10), the advantage of multi-AP diversity is seen for a wide traffic load range, but not for extremely high traffic load conditions. When the user distributions become even (e.g., N A = 25 and N B = 25), the advantage of multi-AP diversity disappears. These observations are due to a traffic redistribution characteristics of AP diversity. When the user distribution is uneven, with AP diversity, some users could effectively migrate from the AP with a heavy load to the AP with a light load, which may lead to an overall performance improvement. However, when the user distribution is even, AP diversity may cause a situation where one AP gets overly loaded, which brings down overall throughput.

Figure 7
figure 7

Throughput of BF with different user distributions, γ = 0.1 and R = 3 dB.

One method to study the delay performance is to examine the average number of transmission attempts for each successful packet transmission. In Figure 8, OM with multi-AP diversity and BF with multi-AP diversity are compared in terms of the average number of transmission attempts for each successful transmission. System parameters considered include N A = 25, N B = 25, γ = 0.1, and R = 3 dB. Both analytical and simulation results are presented in Figure 8 and the analytical evaluation and simulation match very well. Figure 8, which illustrates that BF with multi-AP diversity outperforms OM with multi-AP diversity in the delay performance.

Figure 8
figure 8

Average number of transmission attempts for a successful packet transmission: OM versus BF, with AP diversity; analytical versus simulation results, N A = N B = 25, γ = 0.1, R = 3dB.

VI. Conclusions

This paper investigates the impact of multi-AP diversity and BF in slotted Aloha. A total of four network scenarios are examined, i.e., OM with multi-AP diversity, OM without multi-AP diversity, BF with multi-AP diversity and BF without multi-AP diversity. Performance evaluations conclude that, for OM systems, a configuration with multi-AP diversity always outperforms that without multi-AP diversity (Figures 4 and 5). For BF systems, multi-AP diversity provides performance advantages only under conditions with extremely uneven user distributions (Figure 7). Considering multi-AP diversity, BF systems outperform OM systems in terms of throughput and delay (Figures 3 and 8).

Abbreviations

AP:

access points

BF:

beamforming

multi-AP:

multi-access-point

OM:

omni-directional.

References

  1. Abramson N: The Aloha system-another alternative for computer communications. In Proc 1970 Fall Joint Comput Conf AFIPS Conf. Montvale, NJ. AFIPS Press; 1970:281-285.

    Google Scholar 

  2. Mergen G, Tong L: Maximum asymptotic stable throughput of opportunistic slotted ALOHA and applications to CDMA networks. IEEE Trans Wireless Commun 2007, 6: 1159-1163.

    Article  Google Scholar 

  3. Naware V, Mergen G, Tong L: Stability and delay of finite-user slotted ALOHA with multipacket reception. IEEE Trans Inf Theory 2005, 51: 2636-2656. 10.1109/TIT.2005.850060

    Article  MATH  MathSciNet  Google Scholar 

  4. Jamalipour A, Katayama M, Yamazato T, Ogawa A: Transmit permission control on spread ALOHA packets in LEO satellite systems. IEEE J Sel Areas Commmun 1996, 14: 1748-1757. 10.1109/49.545697

    Article  Google Scholar 

  5. Metzner JJ: On improving utilization in ALOHA networks. IEEE Trans Commmun 1976, 24: 447-448. 10.1109/TCOM.1976.1093317

    Article  Google Scholar 

  6. Yao YD, Sheikh AUH: Outage probability analysis for microcell mobile radio systems with cochannel interferers in Rician/Rayleigh fading environment. Electron Lett 1990, 26: 864-866. 10.1049/el:19900566

    Article  Google Scholar 

  7. van der Plas C, Linnartz JP: Stability of mobile slotted AlOHA network with Rayleight fading, shadowing and near-far effects. IEEE Trans Veh Technol 1990, 39: 359-366. 10.1109/25.61357

    Article  Google Scholar 

  8. Linnartz JP: Near-far effects in land mobile random access networks with narrow-band Rayleigh fading channels. IEEE Trans Veh Technol 1992, 41: 77-89. 10.1109/25.120148

    Article  Google Scholar 

  9. Ward J, Compton RT Jr: Improving the performance of a slotted ALOHA packet radio ntwork with an adaptive array. IEEE Trans Commun 1992, 40(2):292-300. 10.1109/26.129191

    Article  Google Scholar 

  10. Ward J, Compton RT Jr: High throughput slotted ALOHA packet radio networks with adaptive arrays. IEEE Trans Commun 1993, 41(3):460-470. 10.1109/26.221075

    Article  MATH  Google Scholar 

  11. Hsu J, Rubin I: Performance analysis of directional random access scheme for multiple access mobile ad-hoc wireless networks. Proc MILCOM 2005, 1: 45-51.

    Google Scholar 

  12. Zhou L, Yao Y, Heffes H, Ruifeng Z: Investigation of slotted ALOHA under Nakagami fading with synchronized and asynchronous cochannel cells. IEEE Trans Veh Technol 2003, 52(6):1642-1651. 10.1109/TVT.2003.819622

    Article  Google Scholar 

  13. Yamada M, Hara Y, Kamio Y, Hara S: Packet communications with slotted ALOHA in a mobile cellular system. Proc VTC 2001, 3: 1363-1367.

    Google Scholar 

  14. Navaie K, Yanikomeroglu H: Optimal downlink resoruce allocation for non-realtime traffic cellular CDMA/TDMA networks. IEEE Commun Lett 2006, 10(4):278-280. 10.1109/LCOMM.2006.1613746

    Article  Google Scholar 

  15. Zhu Y, Zhang Q, Zhu J: Improve transmission reliability with multi-AP diversity in wireless networks: architecture and performance analysis. Proc. 3rd International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks 2006.

    Google Scholar 

  16. Rom R, Sidi M: Multiple Access Protocols: Performance and Analysis. Springer Verlag: New York; 1990.

    Book  MATH  Google Scholar 

  17. Arnbak J, Blitterswijk W: Capacity of slotted ALOHA in Rayleigh-fading channels. IEEE J Sel Areas Commmun 1987, 5: 685-692. 10.1109/JSAC.1987.1146575

    Article  Google Scholar 

  18. Namislo C: Analysis of mobile radio slotted ALOHA networks. IEEE Trans Veh Technol 1984, 33: 199-204.

    Article  Google Scholar 

  19. Sheikh A, Yao Y, Wu X: The ALOHA systems in shadowed mobile radio channels with slow or fast fading. IEEE Trans Veh Technol 1990, 39(3):289-298.

    Article  Google Scholar 

  20. Goodman D, Saleh A: The near/far effect in local ALOHA radio communication. IEEE Trans Veh Technol 1987, 36: 19-27.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yu-Dong Yao.

Additional information

VII. Competing interests

The authors declare that they have no competing interests.

Authors’ original submitted files for images

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Reprints and permissions

About this article

Cite this article

Zheng, D., Yao, YD. Slotted Aloha with multi-AP diversity and APS transmit beamforming. J Wireless Com Network 2011, 119 (2011). https://doi.org/10.1186/1687-1499-2011-119

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/1687-1499-2011-119

Keywords