- About this Journal ·
- Abstracting and Indexing ·
- Advance Access ·
- Aims and Scope ·
- Article Processing Charges ·
- Articles in Press ·
- Author Guidelines ·
- Bibliographic Information ·
- Citations to this Journal ·
- Contact Information ·
- Editorial Board ·
- Editorial Workflow ·
- Free eTOC Alerts ·
- Publication Ethics ·
- Reviewers Acknowledgment ·
- Submit a Manuscript ·
- Subscription Information ·
- Table of Contents

Journal of Computer Networks and Communications

Volume 2013 (2013), Article ID 984956, 10 pages

http://dx.doi.org/10.1155/2013/984956

## Stability Properties of Network Diversity Multiple Access with Multiple-Antenna Reception and Imperfect Collision Multiplicity Estimation

Instituto de Telecomunicações, Campus Universitário, 3810-193 Aveiro, Portugal

Received 23 March 2012; Accepted 15 December 2012

Academic Editor: Yang Yang

Copyright © 2013 Ramiro Samano-Robles and Atilio Gameiro. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

#### Abstract

In NDMA (network diversity multiple access), protocol-controlled retransmissions are used to create a virtual MIMO (multiple-input multiple-output) system, where collisions can be resolved via source separation. By using this retransmission diversity approach for collision resolution, NDMA is the family of random access protocols with the highest potential throughput. However, several issues remain open today in the modeling and design of this type of protocol, particularly in terms of dynamic stable performance and backlog delay. This paper attempts to partially fill this gap by proposing a Markov model for the study of the dynamic-stable performance of a symmetrical and non-blind NDMA protocol assisted by a multiple-antenna receiver. The model is useful in the study of stability aspects in terms of the backlog-user distribution and average backlog delay. It also allows for the investigation of the different states of the system and the transition probabilities between them. Unlike previous works, the proposed approach considers the imperfect estimation of the collision multiplicity, which is a crucial process to the performance of NDMA. The results suggest that NDMA improves not only the throughput performance over previous solutions, but also the average number of backlogged users, the average backlog delay and, in general, the stability of random access protocols. It is also shown that when multiuser detection conditions degrade, ALOHA-type backlog retransmission becomes relevant to the stable operation of NDMA.

#### 1. Introduction

##### 1.1. NDMA and Cross-Layer Design in Random Access

The last two decades have witnessed the proliferation of advanced random-access protocols assisted by signal processing tools [1]. In these novel algorithms, spatial, code, or frequency resources are conveniently exploited in order to enable the simultaneous reception of more than one packet at the physical layer (PHY). Random-access protocols based on this innovative PHY layer have been termed multipacket reception (MPR) protocols [2]. In the design of MPR protocols, the conventional collision model (where collisions imply the loss of all the contending packets) is no longer useful [2]. A new approach that considers the co-design of medium access control (MAC) and PHY layers (MAC-PHY cross-layer design) is thus required [3, 4].

A breakthrough in the literature of MAC-PHY cross-layer design was the work in [5], which proposed a new approach to achieve diversity in random access by exploiting retransmissions in the time domain. The new protocol, coined network diversity multiple access (NDMA), creates a receive diversity source by dynamically requesting from the contending users as many retransmissions as necessary to resolve collisions via source separation. Therefore, in NDMA, packets with collision are not discarded as in the conventional protocols. Instead, they are stored in memory for further processing. Initially, the system uses the stored signals with collision to calculate the collision multiplicity (i.e., the number of contending users). The system then proceeds to request further retransmissions (which are also to be stored in memory) from the contending users, until the collected signals mimic a MIMO (multiple-input multiple-output) system. The collision can then be potentially resolved via source separation if the number of diversity sources is at least equal to the number of contending signals. In NDMA, MAC-PHY cross-layer design plays a more crucial role than that in conventional MPR protocols: PHY-layer diversity is explicitly created by retransmissions controlled by the MAC layer. In addition, the estimation of the required number of retransmissions depends on PHY layer processing to determine the collision-multiplicity. The performance of NDMA critically depends on this estimation process. Training-based versions have been proposed for non-dispersive and dispersive channels in [5, 6], respectively. Two blind versions, one for slow-fading channels with source separation based on rotational invariance techniques and another one for fast-fading channels with source separation based on independent component analysis, have been proposed in [7, 8], respectively. Other modeling approaches for NDMA have been proposed in [9, 10].

##### 1.2. Open Issues and Paper Contributions

Despite recent advances in the study of NDMA, several issues remain open today, particularly in terms of stability analysis. Stability in random access can be briefly defined here as the ability to control/empty the queues of all users within a finite period of time. Stability of NDMA in asymmetrical environments has been studied in the ideal case of perfect estimation of the collision multiplicity and perfect packet reception in [11]. An outer bound for the stability region of NDMA in asymmetrical environments has been derived in [12] for the case of imperfect estimation of the collision multiplicity. This derivation assumed that packets incorrectly received are dropped from the system; that is, backlog traffic is not considered. This assumption, however, is valid only in scenarios with high signal-to-noise ratio (SNR). Therefore, a lot of work is still required to analyze the backlog traffic of NDMA in scenarios with finite SNR with imperfect collision multiplicity estimation and imperfect packet reception.

To address these issues, this paper proposes a novel Markov model for stability, throughput, and backlog traffic analysis of symmetrical and non-blind NDMA protocols assisted by MPR. This work assumes imperfect estimation of the collision multiplicity with a packet reception model given by the performance of the user detector. All the analysis work presented in this paper is carried out by assuming scenarios with finite SNR. The analysis consists of two initial steps: definition of the backlog states that describe the network at any given time, which in this case are given by the numbers of backlogged users, and calculation of the transition probabilities between network states using channel and queuing statistics. The steady-state probabilities of the different network states are then mapped into a one-dimensional state vector. Similarly, each transition probability constitutes an element of a transition probability matrix. This state vector and transition probability matrix define a Markov model that can be solved by conventional eigenvalue analysis. Each user is thus modeled in two possible states: idle or backlog. A user being in the backlog state means that it has previously transmitted a packet that was incorrectly detected by the receiver. The system performance is then evaluated for different values of packet transmission probability when users are in the idle state, and different values of the packet retransmission probability when the users are in the backlog state. The results in this paper show that NDMA with MPR provides a considerable improvement on stability over conventional collision-resolution algorithms. In addition, it is shown that ALOHA-type backlog retransmission schemes become relevant to the stability of NDMA when the multiuser detection conditions decline due to low SNR and/or due to a low number of receiver antennas (i.e., weak MPR).

##### 1.3. Paper Structure

The remainder of this paper is organized as follows. Section 2 describes the system model. Section 3 provides the performance model for user detection and collision multiplicity estimation. Section 4 describes the proposed metrics and the Markov model. Section 5 presents the discussion of the results obtained by plotting the expressions derived in previous sections. Finally, Section 6 draws the conclusions of the paper.

#### 2. System Model

##### 2.1. Scenario Description and NDMA Epoch-Slot Definition

Consider the slotted random access network depicted in Figure 1 with a set of buffered users and one central node or base station (BS) with receiver antennas that will be used for purposes of multipacket reception and user detection. The channel between user and the th antenna of the BS is denoted by . All channels are assumed to be non-dispersive, block-fading, and independently and identically distributed (i.i.d.) with Rayleigh statistics: .

Whenever a terminal with a packet in its buffer is allowed to transmit, it proceeds to do so at the beginning of a time-slot. Since NDMA exploits the time domain to create diversity, the number of time slots used to resolve any packet collision will be a random variable that will be denoted here by . The period of time used to resolve a packet collision will be called contention resolution period or *epoch-slot* (see Figure 1). For convenience in the analysis, two types of epoch slots are defined: a *relevant epoch*, which is the epoch where a given user under analysis participates by transmitting a packet, and an *irrelevant epoch*, which is the epoch where a given user under analysis does not participate (no packet transmission). Their lengths will be denoted here by and , respectively. For example, in Figure 1, the first epoch is relevant to user 1 but irrelevant to user 5. By contrast, the second epoch in Figure 1 is relevant to all the users displayed in the figure.

##### 2.2. Signal Model for User Detection

Each user of the network is preassigned with a unique orthogonal code with symbols , where is the vector transpose operator. This code, which is attached as a header of each packet transmission, will be used for purposes of user detection and channel estimation [5]. The orthogonality condition of the set of codes is given by The received signal header at the th antenna, which is formed by the superposition of all the headers of all the transmissions of the set of contending users (denoted here by ), can be written as follows: where is the zero-mean and circularly white complex gaussian noise vector in the received header. This means that , where . The BS uses a matched-filter operation to extract the detection statistics of user from each antenna. The results from all the antennas are then combined as follows: The total detection statistic for user is then compared to a detection threshold to decide whether user is active or not. If , then the user is detected as inactive: , where is the estimated set of contending users. Otherwise, if , then the user is detected as active . Since this detection process is prone to errors due to fading and noise, two cases of potential active user detection can be identified: user can be correctly detected as active with probability (probability of correct detection) provided the user has transmitted a packet and user is incorrectly detected as active with probability (probability of false alarm) provided the user did not transmit a packet. By detecting the presence each one of the contending users, the BS can also have an estimation of the real collision multiplicity , where is the set cardinality operator when applied to a set variable.

##### 2.3. Protocol Operation and Signal Model for MPR

At the beginning of every epoch slot, the BS proceeds to estimate the collision multiplicity as described in the previous subsection. The estimation of the collision multiplicity can be improved by exploiting the new retransmissions received in subsequent time slots within the collision resolution period. This type of detection is known as sequential user detection [5]. This type of detector is, however, out of our scope of this paper, and thus we will focus on the conventional user detection considering only the first received transmission at the beginning of the collision resolution period as in [5]. Once the BS has obtained an estimation of the collision multiplicity , then it proceeds to calculate the number of retransmissions required to resolve the collision. Since the BS has receiver antennas, the number of transmissions (including the initial transmission plus retransmissions) required in the non-blind version of NDMA is given by , where is the ceil integer operator. This means that the number of diversity sources (time and space) must be greater than or equal to the estimated collision multiplicity. In Figure 1, we can observe two realizations of epochs with antennas at the BS. In the first epoch, three users have collided in the first time slot. Since only two antennas are provided and three signals need to be recovered, then only one more retransmission is needed to potentially resolve the collision. In this case, the combined number of collected transmissions and space resources (antennas) is equal to four, which is enough to attempt the recovery of the three contending signals. The second epoch experiences five contending users, which requires two retransmissions (six diversity sources) to be resolved. Having more diversity sources than contending signals is necessary to ensure that the channel matrix is full rank, which in turn improves the probability of success of the source separation technique to be used [5]. To request a retransmission for diversity purposes, the BS simply indicates with a feedback flag at the end of each time slot to all the contending users that retransmission is required in the next time slot. The feedback flag is kept on until all necessary retransmissions have been collected. This feedback channel is assumed to be ideal. All the collected (re)transmissions are kept in memory to create a MIMO system that can be expressed as follows [5, 11]: where is the array formed by the collection of all received signals from all the antennas and from the time slots of the epoch, is the mixing matrix or MIMO channel, is the array of stacked packets from all the contending users, each one with symbols, and finally is the collected Gaussian noise components. The mixing matrix can be estimated by using the outcome of the matched filter operation from each antenna. The estimate can be used to recover the contending packets using a zero forcing equalizer, , or a minimum mean square error (MMSE) receiver, , where the term indicates the soft estimate of the contending packets. This signal is then passed through a hard symbol detection stage to try to obtain the original packets [5].

To facilitate NDMA MAC layer design, packet reception performance is usually approximated by the outcome of the collision multiplicity estimation [5]. If all the contending users are correctly detected as active and none of the non-contending uses are incorrectly detected as active (false alarm), then all the packets are considered as correctly received by the BS. Otherwise, in the case of any detection error, all packets are assumed to be lost in the collision resolution process. The BS also indicates to all the contending users, by means of an ideal feedback flag at the end of a resolution period, whether the resolution process was successful or not. All packets that were incorrectly detected enter a back-off retransmission process that is described in following sections. These protocol steps are repeated for subsequent epoch slots.

#### 3. Detector Performance Model

NDMA depends critically upon the performance of the user detector [12]. This section deals with the modeling of the user detector in (3). This will be useful for subsequent calculations and design of the MAC layer. The probability of false alarm of a user that did not transmit a signal while still being detected as active can be defined more formally as follows: which is the probability that the detection statistic is above the detection threshold , conditional on user not being one of the contending users. Since noise is Gaussian distributed, the detection statistic in (3), which consists of the summation of squared i.i.d. zero-mean gaussian signals, can be easily proved to have for this particular case a central chi-square distribution with degrees of freedom and parameter . The term comes from the matched-filter operation in (3), which combines different noise signals (coming from each one of the symbols of the header). Therefore, the probability of false alarm can be expressed as the complementary cumulative distribution function (CCDF) of the central chi-squared distribution with degrees of freedom [13]: Similarly, the probability of correct detection of user , conditional on user being one of the contending users, can be defined as Since both channel and noise are Gaussian distributed; the detection statistic in (3), which is given by the summation of squared i.i.d. zero-mean gaussian signals, can also be proved for this particular case to have a central chi-square distribution with degrees of freedom and parameter . The term comes from the matched-filter operation in (3), which considers the channel term times. The second term has the same explanation as in the case of the probability of false alarm in (5). Therefore, the probability of correct detection is also given by the CCDF of the central chi-squared distribution with degrees of freedom. This means that can be obtained by replacing in (6) the term with . This concludes the definition of the receiver operational curve (ROC) of the user detector.

#### 4. **Markov Model and Performance Metrics**

##### 4.1. Markov Model and Backlog State Distribution

To investigate the stability and dynamic properties of the system, each user will be assumed to be in two possible states: idle or backlog (see Figure 2). The backlog state means that the user has transmitted a packet in a previous epoch slot and its reception has failed. Therefore, the user is waiting to retransmit the packet with probability . When a user is in the backlog state, no new incoming packets in the queue are allowed to be transmitted [14]. By contrast, when the user is in the idle state, a new incoming packet in the buffer is allowed to be transmitted with probability . The total traffic arrival process (new incoming and backlog traffic) of each user will be assumed to have a Poisson distribution with parameter . The state of the network at any epoch slot is given by the number of users in backlog state, denoted here by (see Figure 3).

The transition probability between two states in two consecutive epoch slots will be denoted by , which is the probability of having backlogged users in the next epoch slot given that in the current epoch users are in the backlog state. This is illustrated in Figure 3. By assuming that all packets are correctly received when all the contending users are correctly detected as active and none of the non-contending users incurs in a false alarm, the transition probabilities can be calculated by identifying three different cases: when the number of backlogged users drops , which means that all contending users were correctly detected; when the number of backlogged users increases , which means that a detection error has occurred; and when there is no change in the number of backlogged users . In the latter case, two subcases can be further identified: one subcase when none of the idle users transmits while the backlogged users are not correctly detected, and the second subcase when none of the backlogged users transmits while all idle users that transmitted a packet are correctly detected. These cases can be written in mathematical form as where . Since the probabilities in (8) can be easily derived by using the concepts of the binomial theorem or by referring to previous works on NDMA (e.g., [5, 6, 12]), their explicit derivation will be omitted here. The values of from (8) can be rearranged in a matrix array , which defines the following Markov model characteristic equation: where is the vector of steady-state probabilities of the network. Each element indicates the probability of the network being in the th state or having backlogged users. This equation can be solved by using standard eigenvalue techniques or iterative algorithms [14]. Once the vector of steady-state probabilities has been obtained, it is possible to calculate other relevant performance metrics by simply averaging over the calculated probability space. The average number of users in the backlog state is thus given by where indicates the statistical average operator. The average number of users in the backlog state is an indicator of the stability properties of the algorithm. The higher this indicator is, then the more the stability of the algorithm is degraded, as the users spend most of the time trying to retransmit a lost packet rather than attempting the transmission of new incoming packets.

##### 4.2. Packet Throughput

The average number of packets correctly transmitted per epoch-slot can be obtained by averaging over the calculated probability space all the possible cases when all the users (both idle and backlogged) are correctly detected. This can be written as follows: where The first term in the previous expression contains the contribution of a backlogged user when the remaining users (either backlogged or nonbacklogged) are all correctly detected (either as active in case they transmitted or as inactive in case they did not transmit) with probability . The second term is given by the contribution of a non-backlogged user. Similarly, the average length of an epoch slot can be calculated by considering all the possible combinations of contributions of users (both backlogged and idle) that are detected as active by the BS (either correctly detected with probability or due to false alarm with probability ). This can be expressed as follows: where is the index for backlogged users, is the index for idle users, is the probability of a backlogged user being detected as active, is the probability of an idle user being detected as active, and the second term is due to the contribution of one time slot when none of the users is detected as active with probability . Having defined the terms and , it is now possible to define the throughput of the system as the long-term ratio of packets correctly received to the number of time slots used in the measurement. This can also be expressed as the ratio of the average number of packets correctly received to the average length of an epoch slot [12]:

##### 4.3. Delay

The average backlog delay , which can be defined as the average number of epochs that a user spends in the backlog state, can be calculated, using an extension of Little’s theorem, as the ratio of the average number of backlogged users to the outgoing traffic [14]: The total average delay of the system can then be expressed as the product of the backlog delay from (15) and a term that considers both service and queuing delay due to the use of more than one time slot in the transmission of packets in NDMA. The second term is commonly modeled in the literature of NDMA by the M/G/1 queue delay formula as used in [5, 11]. Therefore, the total delay can be expressed as where is the total incoming traffic per user while , , , and are the first- and second-order moments of the relevant and irrelevant epochs, respectively. The total incoming traffic per user can be estimated using a traffic balance equation between the incoming and outgoing traffic per user [11]: where is the total transmission probability of a user, and which can be further expressed as the contribution of idle and backlog states: where is the average probability of a user being in the idle state and is the average probability of a user being in the backlog state. To facilitate the derivation of expressions for the different types of epoch in (16), let us define the following auxiliary functions where we consider whether a given user under analysis contributes or not to the epoch length. The following function considers all the contributions to the length of an epoch given backlogged users have transmitted and only have been detected as active: where is the probability of a user being in the backlog state given users are in the backlog state. Similarly, the following function considers all the contributions to the length of an epoch given idle users have transmitted and only have been detected as active: where is the probability of a user being in the idle state given users are in the backlog state. Since the previous expressions only consider active contributions (i.e., users that are detected as active) to an epoch distribution, it is necessary to formulate two additional auxiliary functions to include those cases where no user is detected as active, thereby contributing with only one time slot to the epoch length. This can be expressed as for the case where backlogged users have transmitted, and for the case where idle users have transmitted. Let us now provide the desired expression for the first-order moment of the length of a relevant epoch in terms of the auxiliary functions defined in (19)–(22). First, we must consider that a given contending user can be either in the idle or in the backlog state. In addition, it can also be either correctly detected with probability (thereby contributing to the length of the epoch) or incorrectly detected as nonactive with probability (thereby no contributing to the epoch length). The desired expression is thus given by the combination of all these possible detection cases as follows: The expression for the irrelevant epoch can be simply obtained by replacing in the previous expression the term by . Second-order moments are obtained in a similar way by using the squared length of the epoch in the auxiliary functions in (19)–(22). This concludes the derivation of the expressions for the total average delay.

#### 5. Results

Let us now present some results that will illustrate the behavior of the analytical expressions derived in this paper using different parameters of the system. In all cases, the probability of a false alarm has been set to a fixed value of and the probability of detection is calculated according to the ROC model given in Section 3, particularly in (6) for and , and using different values of signal-to-noise ratio . In addition, for purposes of comparison, all the figures have included the results of the S-ALOHA protocol with the same number of antennas and same channel conditions. Figure 4 displays the steady-state probability distribution from (9) for the different protocols using three different numbers of antennas , , and with an operational of 7 dB. In addition, the results were calculated using a packet transmission probability for idle users of and a packet retransmission probability of for the backlogged users. It can be observed that in all the cases the NDMA protocol presents a distribution of backlogged users shifted to the left side, which means that a low number of users remain, on average, in the backlog state. By contrast, the ALOHA protocol always stays at the right side of the figure. This means that NDMA reduces the number of unsatisfied users in the network, thereby presenting better stability features. Figure 5 displays the steady-state probability distribution of backlog states for the same configuration used in Figure 4, except for the packet transmission probability for idle users which is now set to . Since the input traffic in this case is higher, the stability of all schemes has been considerably affected by showing a shift to the right side, that is, more backlogged users, in comparison with Figure 4. The NDMA protocol can still be seen as the best solution in the left-most side of Figure 5. Figure 6 displays the steady-state probability distribution of backlog states for the same configuration used in Figure 4, but this time using dB. The lower SNR conditions have affected the proposed algorithm and the reference ALOHA algorithm in different ways. The NDMA protocol with antennas is still the best with the lowest number of backlogged users. However, the second best scheme is now the S-ALOHA protocol with antennas, in contrast with the results in Figure 4 where NDMA with was the second best scheme. The NDMA protocol with now tends to behave as its ALOHA counterparts, which indicates that at low SNR values the performance of NDMA asymptotically degrades to ALOHA.

The results for throughput in Figure 7 using (14) and the total average delay performance in Figure 8 using (15) were calculated using a fixed value of packet transmission probability of idle users of , an operational SNR of dB, and considering various values of the retransmission probability of backlogged users . The case with dB is illustrated in Figures 9 and 10. In both results, it can be observed that NDMA always outperforms its ALOHA counterparts. It can be observed, however, that for the particular case of and dB the NDMA protocol exhibits a slight decline in throughput for relatively high values of . This indicates that at low SNR values, NDMA with needs a stabilization/optimization technique by selecting an appropriate value for . In all other cases with antennas, and dB the performance remains considerably smoother, which indicates that stabilization/optimization is not as essential as with . In terms of delay, NDMA exhibits only a slight improvement over ALOHA in Figure 8 for low SNR. In the high SNR regime, however, delay reduction is considerable larger for all NDMA protocols with respect to their ALOHA counterparts (see Figure 10). In terms of throughput performance, NDMA at high SNR shows an almost flat feature for all values of (see Figure 9).

These results indicate that when SNR is low and when the number of antennas is low, NDMA and S-ALOHA exhibit similar stability characteristics, which also means that the stabilization techniques used for the ALOHA system should be applied to NDMA as well. By contrast, at high SNR or when a large number of antennas is used, the multiuser detection conditions considerably improve, thereby making NDMA very stable and without the need of a complex stabilization technique. This is an interesting result that shows how a strong PHY layer conveys the simplification of the MAC layer scheme for stabilization purposes. On the other hand, when the ability of the PHY layer declines, then more complex stabilization and in general MAC layer techniques will be required. Another interesting feature observed in the figures is that S-ALOHA and NDMA with seem unaltered when working at low and high SNRs (see Figures 7 and 9). This is due to the detector combining mechanism in (3) that exploits the diversity of the 4 antennas to produce more reliable detection statistics. This indicates that even with dB the detector gain allows the system to mimic a higher SNR scenario.

#### 6. Conclusions

This paper has presented the analysis of the dynamic properties (stability, backlog delay, and stable throughput) of a random access protocol jointly assisted by spatial and retransmission diversity. The paper used a Markov model that captures both queuing and channel statistics in the system. The results indicate that NDMA with multiple antennas considerably improves stability, throughput, and delay over all other considered solutions, particularly when multiuser detection conditions are relatively good. The modeling technique presented in this paper can be used and improved in the future to cope with more complex cross-layer optimization problems considering, for example, asymmetrical scenarios or systems with decentralized channel state information. The results in this paper also shed light on the interactions and dependencies between PHY and MAC layers. In particular, it was observed that when the PHY layer multiuser detection capabilities become strong, then the design of the MAC layer stabilization technique can be considerably simplified. On the contrary, when the PHY layer reduces its efficiency, it is necessary to design properly the MAC retransmission strategy for backlogged users so that the system behaves as desired. This conclusion can be useful for future investigations that address the joint performance of two or more layers of the OSI (open-system interconnection) model.

#### References

- L. Tong, V. Naware, and P. Venkitasubramaniam, “Signal processing in random access,”
*IEEE Signal Processing Magazine*, vol. 21, no. 5, pp. 29–39, 2004. View at Publisher · View at Google Scholar · View at Scopus - M. H. Ngo and V. Krishnamurthy, “Game theoretic cross-layer transmission policies in multipacket reception wireless networks,”
*IEEE Transactions on Signal Processing*, vol. 55, no. 5 I, pp. 1911–1926, 2007. View at Publisher · View at Google Scholar · View at Scopus - J. Crichigno, M. Y. Wu, S. Jayaweera, and W. Shu, “Throughput optimization in multihop wireless networks with multipacket reception and directional antennas,”
*IEEE Transactions on Parallel and Distributed Systems*, vol. 22, no. 7, pp. 1206–1213, 2011. View at Publisher · View at Google Scholar · View at Scopus - G. Dimić, N. D. Sidiropoulos, and R. Zhang, “Medium access control-physical cross-layer design,”
*IEEE Signal Processing Magazine*, vol. 21, no. 5, pp. 40–50, 2004. View at Publisher · View at Google Scholar · View at Scopus - M. K. Tsatsanis, R. Zhang, and S. Banerjee, “Network-assisted diversity for random access wireless networks,”
*IEEE Transactions on Signal Processing*, vol. 48, no. 3, pp. 702–711, 2000. View at Publisher · View at Google Scholar · View at Scopus - R. Zhang and M. K. Tsatsanis, “Network-assisted diversity multiple access in dispersive channels,”
*IEEE Transactions on Communications*, vol. 50, no. 4, pp. 623–632, 2002. View at Publisher · View at Google Scholar · View at Scopus - R. Zhang, N. D. Sidiropoulos, and M. K. Tsatsanis, “Collision resolution in packet radio networks using rotational invariance techniques,”
*IEEE Transactions on Communications*, vol. 50, no. 1, pp. 146–155, 2002. View at Publisher · View at Google Scholar · View at Scopus - B. Ozgul and H. Deliç, “Wireless access with blind collision-multiplicity detection and retransmission diversity for quasi-static channels,”
*IEEE Transactions on Communications*, vol. 54, no. 5, pp. 858–867, 2006. View at Publisher · View at Google Scholar · View at Scopus - R. Samano-Robles, M. Ghogho, and D. C. McLernon, “A Multiaccess protocol assisted by retransmission diversity and multipacket reception,” in
*Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP '08)*, pp. 3005–3008, Las Vegas, Nev, USA, April 2008. View at Publisher · View at Google Scholar · View at Scopus - R. Samano-Robles, M. Ghogho, and D. C. McLernon, “An infinite user model for random access protocols assisted by multipacket reception and retransmission diversity,” in
*Proceedings of the IEEE 9th Workshop on Signal Processing Advances in Wireless Communications (SPAWC '08)*, pp. 111–115, July 2008. View at Publisher · View at Google Scholar · View at Scopus - G. Dimić, N. D. Sidiropoulos, and L. Tassiulas, “Wireless networks with retransmission diversity access mechanisms: stable throughput and delay properties,”
*IEEE Transactions on Signal Processing*, vol. 51, no. 8, pp. 2019–2030, 2003. View at Publisher · View at Google Scholar · View at Scopus - R. Samano-Robles, M. Ghogho, and D. C. McLernon, “Wireless networks with retransmission diversity and carrier-sense multiple access,”
*IEEE Transactions on Signal Processing*, vol. 57, no. 9, pp. 3722–3726, 2009. View at Publisher · View at Google Scholar · View at Scopus - Proakis,
*Digital Communications*, McGraw Hill, 4th edition, 2001. - F. A. Tobagi and L. Kleinrock, “Packet switching in radio channels: part IV–stability considerations and dynamic control in carrier sense multiple access,”
*IEEE Transactions on Communications*, vol. 25, no. 10, pp. 1103–1119, 1977. View at Google Scholar · View at Scopus