1. Introduction
An important aspect of wireless communication involves multiple users utilizing a shared resource such as a wireless channel. If more than one user transmits on the same channel at a given time, their signals interfere with each other and their messages cannot be decoded. Hence, we need intelligent channel access schemes to facilitate efficient use of the wireless resources. Recently, the idea of massive Internet of things (IoT) for smart cities and smart factories has become popular [Reference Navarro-Ortiz21]. In a massive IoT, a large number of users transmit short packets to a single receiver. Moreover, the users become active randomly and hence their transmissions cannot be governed by a predetermined schedule. For massive IoT scenarios, distributed random access (RA) schemes are better suited as they provide minimal signalling and control overhead [Reference Wu26].
Tree algorithms are a class of distributed RA schemes. If the receiver cannot decode a message from a user due to interference from other users, then all interfering users retransmit their message at a random time in the future as selected by the tree algorithm until each user can transmit in a unique time period without interfering with any other user. Note that users can only communicate with the receiver and not among themselves.
Tree algorithms solve the problem by iteratively splitting users into different groups until each group has only one user. This repeated splitting can be described by a tree, hence the name tree algorithm. Each group then transmits in a time slot determined by the algorithm. A metric of a tree algorithm’s efficiency is the ratio between the number of users n and the time it takes until all users have successfully transmitted their packet, called the throughput. Yu and Giannakis introduced the binary tree algorithm with successive interference cancellation (SICTA) in [Reference Yu and Giannakis27]. SICTA extends previous tree algorithms and offers high throughput. The key idea of SICTA is to successively remove user packets along the tree once they become decoded; this way, some of the previous groups may become reduced to having just a single user, propelling a new round of decoding and successive interference cancellation (SIC). In this work, we analyze the throughput of SICTA, as well as the mean number of collisions, successes, and idle slots, for the general version of the algorithm in which the users randomly split into d groups, $d \geq 2$ .
The rest of the paper is organized as follows. In Section 1.1, we give a brief overview of the novel aspects of our work. In Section 2, we first give a brief mathematical description of the model, for readers unfamiliar with SICTA. We then state the main results. In Section 3 we provide background on tree-splitting algorithms and mention related work (see Section 3.3). In Section 4, we prove our results, i.e. we derive the correct expression for the collision resolution interval (CRI) length conditioned on the number n of initially collided users for the d-ary SICTA. We then give asymptotic expressions for the throughput, number of collision slots, and number of immediately decodable slots (henceforth referred to as successes) when the number of users n tends to infinity. We also derive results on the mean delay experienced by a user.
1.1. Overview of our contributions
Compared to other tree algorithms such as standard tree algorithm (STA) and modified tree algorithm (MTA), studying the properties of SICTA requires a more careful approach. Indeed, SIC (see Section 3) introduces further dependencies into the model that are non-trivial, especially in the case $d\ge 3$ . These subtle dependencies have caused errors in the literature [Reference Yu and Giannakis27], which were identified in [Reference Deshpande, Stefanović, Gürsu and Kellerer6]. However, [Reference Deshpande, Stefanović, Gürsu and Kellerer6] does not include the formal analysis but provides simulation results indicating the value of the final result. In this work, by adding another coordinate (the split number $\textrm{M}\in\{1,\ldots,d\}$ ), we are able to reformulate the model as a Markovian branching process and prove the correct results.
The analysis of d-ary tree algorithms is mainly (despite a number of graph-theoretic approaches having been carried out; see [Reference Evseev and Turlikov8] and references therein) done by combining generating functions with tools from complex analysis; see [Reference Fayolle, Flajolet and Hofri9, Reference Massey17, Reference Mathys and Flajolet19, Reference Molle and Shih20, Reference Yu and Giannakis27], for example. With the Markovian structure at hand, we can use the aforementioned tools to derive closed-form expressions for many observables of the process. Arguably the most important characteristic of a tree algorithm is the CRI length, denoted by $(l_n)_{n\ge 0}$ , conditioned on the number of packets in the initial collision n. We analyze the law of $l_n$ by deriving a functional equation, which the moment-generating function for $l_n$ solves, see Proposition 1. To obtain an explicit formula for the mean $L_n=\mathbb{E}[l_n]$ , we differentiate the moment-generating function and solve the ensuing functional equation. This method also works for the variance of $l_n$ , as well as for the higher moments. We also give the functional relations for the moment-generating functions of the number of collisions and successes occurring during SICTA and derive explicit formulas for their means. We stress that our method works for a large class of observables, although the solution of the functional equations must be checked on a case-by-case basis; see the proof of Corollary 1.
Using the explicit formula for $L_n$ , we leverage asymptotic analysis to extract the leading term. Contrary to many tree models (see [Reference Drmota5] for an overview), the mean CRI length $L_n$ does not converge when divided by n but instead has small, non-vanishing fluctuations. Asymptotic analysis was done in detail for STA in the case of equal splitting in [Reference Mathys and Flajolet19], and for $d=2$ and biased splitting in [Reference Fayolle, Flajolet and Hofri9]. To derive the leading term from the explicit formulas for the mean throughput, number of collisions, and successes, we developed a more robust expansion that works for both fair and biased splitting and any $d\ge 2$ . We achieve this by using some explicit identities derived from the binomial series together with the geometric sum formula. This can then be combined with use of the residue theorem as in [Reference Mathys and Flajolet19].
We furthermore calculate the extremal points for the leading order of the observables. We verify the conjecture that the maximal throughput of $\log\!(2)$ can be achieved for any d-ary SICTA (with $d\ge 2$ ), given suitable splitting probabilities. This conjecture was formulated in [Reference Deshpande, Stefanović, Gürsu and Kellerer6], based on numerical simulations.
We also numerically simulate the minimal collision rate subject to a minimum-throughput constraint. As the number of collisions corresponds to the number of signals stored in the access point, this result helps to gauge memory requirements. We show that a small reduction in throughput allows for a (relatively) large reduction in collisions. This is of interest when the arrival rate is not too close to the critical stability threshold, as one is able to reduce collisions without affecting the mean throughput much.
In the final section of the paper, we give a recursive relation which allows for the calculation of the moment-generating function of $l_n$ up to arbitrary degree: see Proposition 3. We also solve a functional equation for the mean delay for SICTA in steady state: see Proposition 4.
2. Results
2.1. A mathematical model for SICTA
In this section we give an abridged description of SICTA from the mathematical point of view, in order to be able to state the main results rigorously. For readers familiar with SICTA this can be skipped on first reading. For a full description of the algorithm we refer the reader to Section 3.
The underlying objects of our study are d-ary ( $d\ge 2$ ) labelled trees with random, integer-valued labels. The label of the root is a fixed, non-random number in $\mathbb{N}_0$ . The nodes with label $n\in\{0,1\}$ have no children. Nodes with label $n>1$ have children $(c_1,\ldots,c_d)$ . The labels of the children are distributed according to the multinomial distribution $\textrm{Mult}(n,p)$ , where $p\in (0,1)^d$ is a vector of splitting probabilities, i.e. $\sum_{j=1}^dp_j=1$ . We keep p fixed throughout the entire tree. As $0<p_j<1$ for all $j\in\{1,\ldots,d\}$ , the resulting tree will almost surely be finite. Labelling only depends on the parent node, and hence the resulting tree has a Markovian structure.
For the STA, the CRI length $l_n$ is defined as the total number of nodes in the tree. However, for SICTA certain nodes are skipped: if the sum of the labels to the left of a node is greater than or equal to the label of the parent minus 1, this node will not be counted; see Section 3 for more details and a justification of this. We also refer the reader to Figure 1 for an example. A definition of the CRI length $l_n$ for SICTA is as follows: given a fixed node with label $n\ge 2$ , we denote the last non-skipped slot by M, which is defined as
where $\{I_j\}_{j\in\{1,\ldots,d\}}$ are the labels of the children $(c_1,\ldots,c_d)$ of the node. As $\{I_j\}_{j\in\{1,\ldots,d\}}$ are $\textrm{Mult}(n,p)$ distributed, their sum equals n and hence M is well defined. A recursive definition of the $l_n$ is then given by
see Section 3.2 for a derivation.
2.2. Main results
For $k\in\{0,\ldots,d-1\}$ , we write $\overline{\textrm{F}}(k)=\sum_{j=k+1}^dp_k$ .
Theorem 1. For any $d\ge 2$ and any probability vector $p\in (0,1)^d$ with $\sum_{j=1}^d p_j=1$ :
-
(i) For $n\ge 1$ ,
(3) \begin{equation} \mathbb{E}[l_n] = L_n = 1 + \sum_{i=2}^n\binom{n}{i} \frac{(-1)^{i}(i-1)\sum_{k=0}^{d-2}\overline{\textrm{F}}(k)^i}{1-\sum_{j=1}^dp_j^i} . \end{equation} -
(ii) As $n\to\infty$ ,
(4) \begin{equation} \frac{L_n}{n} = \frac{\sum_{k=0}^{d-2}\overline{\textrm{F}}(k)}{-\sum_{j=1}^dp_j\log p_j} + g_1(n) + o(1) , \end{equation}where $g_1(n)$ is given in (39). Furthermore, if (28) has no positive integer solution, then $g_1(n)=0$ . The term $g_1(n)$ is usually very small but has a lengthy expression, we have hence decided to delay its definition until later. -
(iii) The first term on the right-hand side of (4) is minimized for $p=p^\textrm{bi}\in (0,1)^d$ with $p_j=2^{-\min\{j,d-1\}}$ , $j\in\{1,\ldots,d\}$ . For $p^\textrm{bi}$ ,
\begin{equation*} \frac{\sum_{k=0}^{d-2}\overline{\textrm{F}}(k)}{-\sum_{j=1}^dp_j^{\textrm{bi}}\log p_j^{\textrm{bi}}} = \frac{1}{\log\!(2)} . \end{equation*}Furthermore, for $p^\textrm{bi}$ , $g_1(n)$ is bounded between $10^{-3}$ and $10^{-6}$ .
The proof of the first statement in Theorem 1 is given in Corollary 1, that of the second statement in Proposition 2, and the last statement in Lemma 3.
Remark 1. In applications, the important characteristic of a collision-resolution protocol (CRP) is given by its asymptotic throughput, which is given by $\lim_{n\to\infty}{n}/{L_n}$ . However, it is more convenient to work with $L_n/n$ from a mathematical perspective. Result-wise, there is no difference, as $L_n>0$ for all n.
We summarize the results for other important observables of the SICTA process in Table 1. We refer the reader to (22) and (24) for the formulas for the collisions and successes; see also Section 4. The proofs are very similar to those for the throughput, apart from the asymptotic leading term for the number of successes; see Lemma 2. Furthermore, we obtain a number of results regarding the mean delay of SICTA in steady state. We state them in Section 4.5, as they require more technical background.
3. Background
3.1. Tree algorithms
The first tree algorithm was introduced in [Reference Capetanakis3]; it is also known as the Capetanakis–Tsybakov–Mikhailov-type CRP, also known as the STA. The protocol addresses the classical RA problem where several users must transmit packets to an access point (AP) over a time-slotted shared multiple access channel with broadcast feedback. The most basic form of the algorithm is STA, which proceeds as follows. Assume that n packets are transmitted by n different users in a given slot.
-
If $n = 0$ , then the slot is idle.
-
If $n = 1$ , then there is only one packet in the slot (also called a singleton), and the packet can be successfully decoded.
-
If $n > 1$ , the signals of n different transmissions interfere with each other, and no packet can be decoded. This scenario is called a collision. The users must retransmit their packets according to the CRP.
Collision resolution protocol
At the end of every slot, the AP broadcasts the outcome of the slot, i.e., idle (0), success (1), or collision (e, where e stands for error), to all the users in the network. If the feedback is a collision, the n users independently split into d groups. The probability that a user joins group j is $p_j$ where $j \in \{1,\ldots,d\}$ , $d\ge 2$ , $p_j \in (0,1)$ , and $\sum_{j=1}^d p_j=1$ . In the next slot, all the users who chose the first group ( $j=1$ ) retransmit their packets. If this results in a collision once again, then the process continues recursively. Users who have chosen the $(j>1)$ th group observe the feedback. They wait until all users in the $(j-1)$ th group successfully transmit their packets to the AP. We can represent the progression of the CRP in terms of d-ary trees as shown in Figure 1. Here, we show an example with the initial number of collided users $n=4$ and $d=3$ . Each node on the tree represents a slot. The number inside the node shows the number of users that transmit in a given slot. The slot number is shown outside the node. After a collision node, the first group branches to the left of the tree, the second group branches in the middle, and the third group branches to the right. The number of slots needed from the first collision until the CRP is complete is known as the CRI.
The main performance parameter for tree algorithms is conditional throughput, defined as the ratio $n/L_n$ of the number of users n and the expected total number of slots in a CRI $L_n$ . In the example from Figure 1, it is $0.4$ packets/slot. Furthermore, the asymptotic throughput (as $n \rightarrow \infty$ ) is important for knowing the algorithm’s maximum stable throughput (MST). The MST gives the stability of the RA scheme for a given arrival rate of users, $\lambda\in \mathbb{R}^{+}$ . Users arrive according to a Poisson process with intensity $\lambda$ .
For example, the stability of the gated RA scheme is given by
We analyze the case of SICTA with a Poisson arrival rate $\lambda>0$ of new packets in Section 4.5 for $\lambda<\text{MST}$ .
3.2. Successive interference cancellation
In STA, collision signals are discarded at the receiver. A new method where the receiver saves collision signals and tries to resolve more packets per slot was introduced in [Reference Yu and Giannakis27]. Here, the receiver subtracts the signals of successful packets from the collision signals. This process is known as SIC. Let $Y_{s}$ be the signal of slot number s, and $X_{i}$ be the signal of the packet of user i. In the example from Figure 1, the receiver will save $Y_{1}$ and $Y_{2}$ . In an interference-limited channel, i.e. one for which noise can be effectively neglected, the received signal is the sum of all packets transmitted in that slot, $Y_{1} = X_{1} + X_{2} + X_{3} + X_{4}$ and $Y_{2} = X_{1} + X_{2} + X_{3}$ . We will keep the same slot indices as for STA in the diagram for legibility. Since all the users are treated the same, we assume that the first user to be resolved is user 1, then user 2, and so on until user 4. In slot 6, the receiver gets $Y_{6} = X_{1}$ . Since there is no interference in this slot, the receiver can decode the packet. It is then able to remove $X_{1}$ from $Y_{1}$ and $Y_{2}$ . Similarly, after slot 7 the receiver can remove $X_{2}$ from $Y_{1}$ and $Y_{2}$ . After removing $X_{1}$ and $X_{2}$ , only $X_{3}$ remains in $Y_{2}$ . Thus the packet from user 3 can be decoded. The receiver can then proceed to remove $X_4$ from $Y_{1}$ and decode $X_{2}$ without the need for user 4 to have transmitted a packet after the first slot. In this manner, the receiver can decode two packets after slot 7, resulting in a shorter CRI. We can easily see from the diagram that if all the signals from a particular node in the tree are removed, then all the remaining children of that node can be skipped. Another advantage of SICTA is the knowledge that the rightmost branch of the tree can always be skipped. If the algorithm reaches the rightmost branch of a node and still has not decoded all the signals from that node, this rightmost branch will be a definite collision and can hence be skipped.
The asymptotic throughput of SICTA was shown (incorrectly) to be $({\ln d})/({d-1})$ in [Reference Yu and Giannakis27], achieved for fair splitting. Thus, SICTA with fair splitting was thought to be the only configuration that achieves the optimal asymptotic throughput of $\ln{2}$ packets/slot. However, a premise in their analysis for $d > 2$ was shown to be wrong in [Reference Deshpande, Stefanović, Gürsu and Kellerer6]. In [Reference Yu and Giannakis27], it was assumed that only the rightmost branch can be skipped. It fails to consider a scenario for $d > 2$ where more than one child node can be skipped when all the signals in the parent node are resolved. In the example from Figure 1, [Reference Yu and Giannakis27] failed to consider that slot 9 would be skipped after all the signals in $Y_{1}$ are decoded after slot 7. The correction paper [Reference Deshpande, Stefanović, Gürsu and Kellerer6] did not provide the formal analysis but merely pointed out the mistake from [Reference Yu and Giannakis27]. However, it did provide simulation results indicating that a special biased distribution of splitting probabilities, where
achieved a throughput of $\log\!(2)\approx0.693$ packets/slot for all values of d. In this work, we formally prove this indication to be correct.
3.3. Related work
As mentioned before, tree algorithms were introduced by [Reference Capetanakis3]. A number of analytical results are due to Flajolet and Mathys, see [Reference Fayolle, Flajolet and Hofri9, Reference Mathys18, Reference Mathys and Flajolet19]. Delay analysis was done in [Reference Molle and Shih20]. Yu and Giannakis introduced SICTA in [Reference Yu and Giannakis27]. There have been several publications regarding SICTA; for example, in [Reference Andreev, Pustovalov and Turlikov1, Reference Peeters and Van Houdt23] variants of SICTA are considered and in [Reference Stefanović, Deshpande, Gürsu and Kellerer24, Reference Stefanović, Gürsu, Deshpande and Kellerer25] the case where $K>1$ packets can be decoded in each step (multi-packet reception) is examined. The case of windowed and free access was studied in [Reference Peeters and Van Houdt22]. Analysis of the depth of the resulting tree was carried out in [Reference Holmgren11, Reference Janson and Szpankowski12]. Recently, large-deviation analysis was applied to random access algorithms, see [Reference König and Kwofie13, Reference König and Shafigh15]. In these articles, the authors estimate the probability of rare events, such as large throughput deviations, from their expected mean.
4. Analysis
4.1. Derivation of the functional equations
Recall that given a vector of probabilities $p=(p_1,\ldots,p_d)$ , at each collision each user independently chooses a slot $j\in\{1,\ldots,d\}$ with probability $p_j$ . Let $I_j$ denote the number of users who have chosen the jth slot.
For a collision of n packets, we recall that the last non-skipped slot M for SICTA is defined in (1). The evolution of the CRI length $l_n$ of n collided users is then given by (2), which can be seen as follows: since the remaining slots $\{{I_{\textrm{M}+1}},\ldots,{I_d}\}$ hold at most one packet, they can be decoded from the original signal minus the decoded signals; see also [Reference Deshpande, Stefanović, Gürsu and Kellerer6]. Furthermore, the last slot can always be skipped, as it is the difference between the initial signal and the signals to the left.
Our first result is a functional equation for the moment-generating function for $l_n$ . For this, recall that
where we interpret this as a formal power series (see [Reference Drmota5, Chapter 2]) outside its region of convergence. It satisfies
Evaluating the derivative at $z=1$ gives the mean,
Proposition 1. Define for $x,z\in \mathbb{C}$ the formal power series
Then
where $\overline{\textrm{F}}(k)=\sum_{j=k+1}^d p_k$ . Furthermore, there exists $\delta>0$ such that $\widetilde{Q}(x,z)$ converges absolutely for all $x,z\in\mathbb{C}$ with $\|z| < 1 + \delta$ .
Before embarking on the proof, we remark that in the literature, see for example [Reference Yu and Giannakis27], researchers work with $Q(x,z)=\textrm{e}^{-x}\widetilde{Q}(x,z)$ . As it simplifies the notation, we work with $\widetilde{Q}(x,z)$ for now and use Q(x, z) in the later parts of the article. From Proposition 1, we can obtain closed formulas for the mean, variance, and higher-order terms. We apply this for the mean. The proof of Proposition 1 is given after the proof of Corollary 1.
Corollary 1. For all $n\ge 0$ ,
Proof. Note that, by definition, $\widetilde{Q}(x,1)=\textrm{e}^x$ . Set $K(x)= ({\textrm{d}\widetilde{Q}}/{\textrm{d}z})(x,1)$ , which exists as $z=1$ is an inner point in the region of convergence of $\widetilde{Q}(x,z)$ , and is analytic. By (taking the derivative of) (7), we have
Set $Q(x,z)=\textrm{e}^{-x}\widetilde{Q}(x,z)$ . Define the Poisson generating function L(x) of $L_n$ as
where the penultimate equality holds on account of (6). Equation (9) now yields
Using the expansion $L(x)=\sum_{n\ge 0}\alpha_n x^n$ gives, by comparing coefficients, for $n \ge 2$ ,
Hence,
Noting that by (10) we have $\textrm{e}^{-x}\sum_{n\ge 0}x^n L_n/n! = \sum_{n\ge 0}x^n\alpha_n$ , by comparing coefficients again we then have
By (2), we have $\alpha_0=1-\alpha_1=1$ . Hence, we obtain (8).
Remark 2. Note that for $d=2$ we obtain the same result as [Reference Yu and Giannakis27, (30)], as $\overline{\textrm{F}}(0)=1$ . Also note that by taking higher-order derivatives (with respect to z) in (7) we can obtain closed formulas for the variance of $l_n$ as well as higher moments. We leave that to the reader. The proof of Corollary 1 establishes the first claim in Theorem 1.
We now proceed to the proof of Proposition 1.
Proof of Proposition 1. The proof is split into three parts. We first use Lemma 4 to determine the radius of convergence. The main part of the proof consists of deriving a recursive formula for $\mathbb{E}[z^{l_n}]$ , where we need to do a case distinction for the value of M. Using the recursive expressions in (14) and (16) for $Q_n(z)$ , we then sum over all n, to obtain a functional equation for $\widetilde{Q}$ , making use of cancellation effects along the way.
By Lemma 4, there exist $C,\delta>0$ such that, for all z with $|z| < 1 + \delta$ , we have $|\mathbb{E}[z^{l_n}]| \le C^n|z|^n$ . This allows us to bound the moment-generating function
which converges. The moment-generating function $Q_n(z)$ is defined as
Note that for $k<d$ we can split
while for $k=d$ we have $\{\textrm{M}=d\}=\big\{\textrm{M}=d,\sum_{j=1}^\textrm{M}{I_j}=n\big\}$ , and hence
In order to facilitate the analysis, we set
Given a probability vector $p=(p_1,\ldots,p_d)$ , we also introduce
We now now do a case distinction with respect to the value of $\sum_{j=1}^\textrm{M}{I_j}$ .
For the case $\sum_{j=1}^\textrm{M}{I_j}=n$ , if $\textrm{M}=k$ and $\sum_{j=1}^k {I_j}=n$ , and then ${I_k}$ cannot be zero or one, because otherwise M would be at most $k-1$ . Hence, for $k\le d$ , we expand using (2) and the Markov property:
Note that $\mathbf{1}\{\mu_k>1\}$ can be written as $1-\mathbf{1}\{\mu_k=0\}-\mathbf{1}\{\mu_k=1\}$ , and furthermore that $\big\{\mu\in\mathfrak{P}_{n}^{(k)} \colon \mu_k=0\big\}$ is isomorphic to $\mathfrak{P}_{n}^{(k-1)}$ , and similarly $\big\{\mu\in\mathfrak{P}_{n}^{(k)} \colon \mu_k=1\big\}$ is isomorphic to $\mathfrak{P}_{n-1}^{(k-1)}$ . With this in mind, we rewrite (13) as
Note that the cases $\{\mu_k=0\}$ and $\{\mu_k=1\}$ give us an extra factor of z, as $Q_0(z)=Q_1(z)=z$ . The case $\{\mu_k=1\}$ gives an extra factor of $p_k^{\mu_k}=p_k$ .
For the case $\sum_{j=1}^\textrm{M}{I_j}=n-1$ , note that this implies $k<d$ given $\textrm{M}=k$ . Write $\textrm{F}(k)=\sum_{j=1}^k p_j$ and $\overline{\textrm{F}}(k)=1-\textrm{F}(k)$ for the cumulative distribution function induced by p. We obtain
Indeed, if $\sum_{j=1}^\textrm{M} {I_j}=n-1$ , we have n choices to select one packet and place it on the slots $\{\textrm{M}+1,\ldots, d\}$ . Summing over all possible slots gives us a probability of $p_{k+1}+\cdots+p_d=\overline{\textrm{F}}(k)$ . We have $n-1$ packages left to distribute amongst the k slots, which gives the multinomial coefficient.
In the same way as (14), we expand (15) as
where we have used $\mathbf{1}\{\mu_k>0\}=1-\mathbf{1}\{\mu_k=0\}$ and that $\big\{\mu\in\mathfrak{P}_{n-1}^{(k)}\colon\mu_k=0\big\}$ is isomorphic to $\mathfrak{P}_{n-1}^{(k-1)}$ .
Having the two recursive expressions (14) and (16) for $Q_n(z)$ at hand, the next step of the proof consists of summing over $n\ge 0$ and noticing cancellation.
On account of (2), by recalling that $l_0=l_1=1$ we have
We first examine the case $\textrm{M}=1$ , as it is a bit different from the rest. We have, for $n\ge 2$ ,
as for $\textrm{M}=1$ either n or $n-1$ packets must have picked the first slot. The first case has a probability of $p_1^n$ and the second of $np_1^{n-1}(1-p_1)=np_1^{n-1}\overline{\textrm{F}}(1)$ . Recall that $p_1+\overline{\textrm{F}}(1)=1$ . We hence get
by reindexing. Consider the first summand on the left-hand side of this equation. By employing an index shift, we obtain
The second summand follows in the same fashion.
Now fix $k\in\{2,\ldots,d\}$ and consider the case $\textrm{M}=k$ . We begin with the case $\sum_{j=1}^k {I_j}=n$ , which yields, for $k\le d$ ,
as, for $\textrm{M}\ge 2$ , we need to have $n\ge 2$ . By (13) and (14),
which we illustrate with the last term in (14): recall that for non-negative sequences $\{a_n^{(i)}\}_{i,n\ge 0}$ ,
Hence, employing an index shift, we obtain
The other terms in (18) follow similarly. Summing the right-hand side of (18) from $k=2$ to d gives
Using (16), the case $2\le k<d$ and $\sum_{j=1}^k {I_j}=n-1$ gives, in a similar fashion,
Summing the right-hand side of the above over all $k\in\{2,\ldots,d-1\}$ gives
When adding (17), (20), and (21), we notice that the terms with $d-1$ products (of $\widetilde{Q}(\cdot)$ ) cancel. Hence, we obtain the functional relation
This concludes the proof of Proposition 1.
We remark that from (14) and (16) we could derive a recursive formula for $L_n$ such as [Reference Yu and Giannakis27, (18)]. However, this is of no use to our analysis as the closed-form expression is more direct.
We can also look at the number of collisions $c_n$ , which follow the recursive equations
In this case, following similar steps as for the throughput, we obtain
The result relies on the functional relation for the exponential moment-generating function
given by
We also give the formula for $S_n$ , the expected number of successes:
based on
Its exponential moment-generating function $ \widetilde{S}(x,z)$ satisfies
Finally, the number of idle slots,
satisfies $i_n=l_n-c_n-s_n$ and hence
Note that the above procedure can be carried out for any observable as long as it is additive as we move down the tree. This is a common occurrence in the analysis of random trees [Reference Drmota5]. A further example of such an additive observable would be the number of nodes with degree R or greater. This might be of interest in practice since the interference of many signals could be difficult to control in terms of noise.
4.2 Asymptotic analysis
We extend the methods from [Reference Mathys and Flajolet19] to allow for asymptotic analysis in both the equal-split and biased cases. The first key identity for our method is
which follows from the geometric sum and the multinomial formula, as
The other identity is stated in a separate lemma.
Lemma 1. For all $x\in\mathbb{C}$ and all $n\in\mathbb{N}$ ,
Proof. Recall that the binomial theorem gives
where the second formula follows from the first by taking the derivative and then multiplying both sides by x. Using these,
We now state the main result of this section.
Proposition 2.
-
(i) If the equation
(28) \begin{equation} p_1^{1/k_1} = \cdots = p_d^{1/k_d} \end{equation}has no positive integer solution, then\begin{equation*} \frac{L_n}{n} = \frac{\sum_{k=0}^{d-2}\overline{\textrm{F}}(k)}{-\sum_{j=1}^d p_j\log p_j} + o(1) . \end{equation*} -
(ii) If (28) does have a positive integer solution, then
(29) \begin{equation} \frac{L_n}{n} = \frac{\sum_{k=0}^{d-2}\overline{\textrm{F}}(k)}{-\sum_{j=1}^d p_j\log p_j} + g_1(n) + o(1), \end{equation}where $g_1(n)$ is given in (39).
Note that Proposition 2 establishes the second claim in the proof of Theorem 1.
Proof. Recall that, due to (8),
It suffices to calculate the asymptotic behavior for $k\in \{0,\ldots,d-2\}$ fixed in this equation and then sum over k. Hence, our goal is to calculate the asymptotic value of
We first apply (26) to rewrite the above as
where $p(\mu)$ was defined in (12). Now we can apply (27) to eliminate the sum over i:
In order to increase legibility, we switch from $n-1$ to n. We write $a_n\sim b_n$ if $a_n=b_n(1+o(1))$ as $n\to\infty$ for sequences $(a_n)_n$ , $(b_n)_n$ . We use the expansion $(1-x)^n = \textrm{e}^{-xn+{\mathcal O}(x^2n)}$ , which yields
neglecting the $\textrm{e}^{{\mathcal O }(p(\mu)^2n)}$ term, which is negligible as $p(\mu)$ is mostly of order $n^{-1}$ ; see [Reference Knuth14, pp. 130–132] (or [Reference Mathys and Flajolet19, (3.51)]) for proof of this fact. We now write the above as
For a function $f\colon \mathbb{C}\to\mathbb{C}$ , its Mellin transform and the inverse are given by
for suitable $c\in\mathbb{R}$ [Reference Flajolet, Gourdon and Dumas10]. For $f(x)=1-\textrm{e}^{-x}(1+x)$ , $f(x)={\mathcal O }(x^2)$ as $x\to 0$ , and furthermore $f'(x)=x\textrm{e}^{-x}$ . Hence, using integration by parts in (32), we obtain
as long as $0>\Re(s)>-2$ . Here, $\Gamma$ denotes the (complex) gamma function which satisfies $\Gamma(s+1)=s\Gamma(s)$ for all $s, s+1$ in its domain. We now apply (32) to (31) to obtain
for some $c>-2$ . Note that
using (19) in the last step. If we could interchange integration and summation in (33), this would give
We now make the above rigorous. First, we need to choose $c>-2$ in (33). We first make sure that the function integrated in (34) does not have a pole at $c+\textrm{i}\mathbb{R}$ . Abbreviating $h(s)=\sum_{j=1}^d p_j^{-s}$ , we see that poles occur for $h(s)=1$ . Note that for $x,y\in\mathbb{R}$ , $h(x+\textrm{i}y)=1$ implies that $x\le -1$ , as $h(x+\textrm{i}y)=\sum_{j=1}^d p_j^{-x}\textrm{e}^{\textrm{i}y\log p_j}$ and thus $|h(x+\textrm{i}y)| \le \sum_{j=1}^d p_j^{-x}$ . We first examine the case where $x=-1$ : for y solutions to $h(x+\textrm{i}y)=1$ ,
Solutions other than $y=0$ only exist if (28) has no positive integer solution, see [Reference Mathys and Flajolet19, (3.67)]. Next, we show that there exists $\varepsilon>0$ such that there are no solutions $x+\textrm{i}y$ with $x\in [\!-\!1-\varepsilon,-1)$ . Suppose this was not the case; we could then choose two real sequences $(x_n)_n$ , $(y_n)_n$ such that $x_n\to -1$ and
If (28) has a positive integer solution, then there must exist some $c\in (0,1)$ and some $k_1,\ldots,k_d\in\mathbb{N}$ such that $\textrm{i}y\log p_j = \textrm{i}yk_j\log c$ for all $j=1,\ldots, d$ and $y\in\mathbb{R}$ . Hence, $y\mapsto \textrm{e}^{\textrm{i}y\log p_j}$ is periodic with period at most $2\pi|\log c|\prod_{j=1}^d k_j$ . This implies that we can assume, without loss of generality, that $(y_n)_n$ is a bounded sequence. Thus, there exists a converging subsequence $y_{k_n}\to y_o$ . However, $(x,y)\mapsto\sum_{j=1}^d p_j^{-x}\textrm{e}^{\textrm{i}y\log p_j}$ is holomorphic and non-constant in a neighborhood of $\big({-}1,\sum_{j=1}^d\textrm{e}^{\textrm{i}y_o\log p_j}\big)$ and hence cannot have infinitely many zeros in that neighborhood [Reference Conway4, p. 79]. If (28) has no positive integer solution, we cannot assume that $(y_n)_n$ is bounded. However, as $\textrm{e}^{\textrm{i}y_n\log p_j}$ is bounded, we may assume that $(y_n)_n$ is such that, for each $j\in \{1,\ldots, d\}$ ,
for some $a_j\in\mathbb{C}$ with $|a_j|=1$ [Reference Lawler and Limic16, p. 29]. By continuity, (35) gives $\sum_{j=1}^d p_ja_j=1$ , which implies that $a_j=1$ for all j. But this would imply that the function $\sum_{j=1}^dp_j^{-s}-1$ has infinitely many zeros in any neighborhood around the origin. This is a contradiction. Thus, we can choose an $\varepsilon>0$ such that $h(x+\textrm{i}y)\neq 1$ for all $x\in [\!-\!1-\varepsilon,-1)$ and $y\in\mathbb{R}$ .
Now choose $\varepsilon>0$ such that there are no poles of $(1-h(s))^{-1}$ in the set $[\!-\!1-\varepsilon,-1)\times\textrm{i}\mathbb{R}$ . Abbreviate $c=-1-\varepsilon$ from now on. Next, we show that we can interchange summation and integration, i.e.
For $s=c+\textrm{i}b=-1-\varepsilon+\textrm{i}b$ , we have
Recall the Stirling approximation [Reference Erdélyi and Bateman7, Section 1.18, (2)],
which is valid uniformly as $|z|\to\infty$ as a long as $\arg(z)<\pi-\delta$ for some arbitrary but fixed $\delta>0$ . Hence, we can bound $|\Gamma(z)| \le {\mathcal O}(|y|^{x-1/2}\textrm{e}^{-\pi|y|/2})$ (see also [Reference Erdélyi and Bateman7, Section 1.18, (6)]), which gives, for $s=c+\textrm{i}b$ , as $|b| \to \infty$ ,
which is integrable. Note that $|\Gamma(c+\textrm{i}b)|$ is bounded for b in a neighborhood around the origin. Furthermore, using (26),
Hence, by the dominated convergence theorem, we can interchange summation and integration.
We now want to analyze
using the residue theorem. For this, take $(\beta_N)_N$ such that $\beta_N\in\mathbb{R}$ , $|\beta_N|\to\infty$ , and $(1-h(s))^{-1}$ has no poles at $\pm\textrm{i}\beta_N$ for all $N\in\mathbb{N}$ . We then choose the following contours $\gamma_N^{(i)}$ for $i=1,2,3,4$ :
this describes a rectangle with length M, height $2\beta_N$ , and lower-right corner at $-1-\varepsilon-\textrm{i}\beta_N$ , as in [Reference Knuth14, p. 132]. We now proceed analogously to that reference, and write
for the function we integrate. By the bounds on the Gamma function, the integral over $\gamma_N^{(2)}$ is at most ${\mathcal O}\big(\alpha^\varepsilon n^\varepsilon[\beta_N+1]\textrm{e}^{-\beta_N} \int_{-1-\varepsilon}^M|M+\textrm{i}\beta_N|^t\,\textrm{d}t\big)$ , and the integral over $\gamma_N^{(4)}$ can be bounded in the same way. For $\gamma_N^{(3)}$ , we use the fact that $\int_{-\infty}^\infty|\Gamma((-1-e)+M+\textrm{i}t)|t\,\textrm{d}t < \infty$ to bound
for $C_M$ some constant depending on $M>0$ . Hence, for $\gamma_N=\gamma_N^{(1)}\cup\gamma_N^{(2)}\cup\gamma_N^{(3)}\cup\gamma_N^{(4)}$ ,
Take $M>0$ such that $-M+1+\varepsilon<-1$ , which causes the first term on the right-hand side to be negligible as $n\to\infty$ . Let S be the set of poles of r(s) with real part $-1$ :
Recall that all poles of r(s) have real part bounded from above by $-1$ and that there are no poles with real part in $[\!-\!1-\varepsilon,-1)$ . By the residue theorem,
and hence, taking the limit $N\to\infty$ and using (34) and (36),
Next, we calculate the residues. We first analyze the pole at $s=-1$ . We expand as $s\to -1$ :
Recall that $(s+1)\Gamma(s)\sim -1$ as $s\to -1$ [Reference Erdélyi and Bateman7, Section 1.1, after (8)]. Therefore, as $s\to -1$ ,
Hence, the residue of the integrand is given by
Recall that if (28) has no positive integer solution, $s=-1$ is the only pole [Reference Mathys and Flajolet19, (3.67)] and hence the residue theorem gives
Letting $N\to\infty$ gives
which concludes the proof in that case.
If there are positive integer solutions to (28), then there are a countable infinity of poles. Recall that the set of poles other than $s=-1$ (with real part $-1$ ) is given by the set S. We then have
where, as before, the residue theorem in (37) gives
By substituting $\alpha=\overline{\textrm{F}}(k)$ and taking the sum over k in (30), we get
with, recalling (38),
This completes the proof of Proposition 2.
For the bounds on $g_1(n)$ in the case $d=2$ and $p_1=p_2$ , we refer the reader to [Reference Mathys and Flajolet19, Table 1].
Similarly, one finds that
where $g_2(n) = f_1(n,1-p_d)$ . To obtain the asymptotic success rate, more work is needed. We sketch the main steps and leave the rest to the reader.
Lemma 2. For $d\ge 2$ ,
where $g_3$ is given in (42).
Proof. Starting from (24), we can write
where we write $\overline{\textrm{F}}(k-1)=q_k$ to keep the ensuing formulas shorter.
Using the expansion as in the proof of Proposition 2, we get
Note that $f_2(x) \sim x^2\sum_{k=2}^d p_k \textrm{F}(k-1)$ as $x\to 0$ . Here, recall that $\textrm{F}(i)=\sum_{j=1}^i p_j$ . The above expansion gives that, for $\Re(s)>-2$ , the Mellin transform of $f_2$ is well defined and equals
Furthermore, ${\mathcal M}[f_2;\;s]$ has a removable singularity at $s=-1$ :
where we used that $\Gamma(s)s\sim 1$ as $s\to 0$ [Reference Erdélyi and Bateman7, Section 1.1, after (8)], as well as $\overline{\textrm{F}}(k-1)=q_k$ . Hence, using (32),
From this, using the residue theorem as in the proof of Proposition 2,
where
unless (28) has no positive integer solution, in which case $g_3$ is equal to zero.
We can use the results for $L_n$ , $C_n$ , and $S_n$ to obtain
where $g_4(n)=g_1(n)-g_2(n)-g_3(n)$ ; see (39) for a definition of $g_1$ , (42) for a definition of $g_3$ , and note that $g_2$ is defined just after (40).
4.3. Minimization
In this section we calculate the values of p which maximize throughput and success rate, and minimize collisions and skipped slots.
Recall that $\overline{\textrm{F}}(k)=1-\sum_{j=1}^k p_j$ . To achieve the maximum throughput, we want to minimize the main term in (29), i.e.,
We do this in the next lemma.
Lemma 3. For $p^\textrm{bi}\in(0,1)^d$ (first defined in Theorem 1) given by $p^\textrm{bi}_j=2^{-\min\{j,d-1\}}$ (for $j=1,\ldots,d$ ), the function
is minimized. Furthermore, at $p^\textrm{bi}$ , we have
No other minima exist besides $p^\textrm{bi}$ .
Note that Lemma 3 establishes the final claim in Theorem 1, and also confirms the prediction from [Reference Deshpande, Stefanović, Gürsu and Kellerer6].
Proof. We write $N=\sum_{k=0}^{d-2}\overline{\textrm{F}}(k)$ and $D=-\sum_{j=1}^d p_j\log p_j$ , so that
in order to keep the ensuing equations shorter. Suppose that $\mu\in\mathbb{R}$ is our Lagrange multiplier from the Lagrange equation
We then obtain, for $i\le d-2$ ,
as the parameter $p_i$ appears in $(d-1-i)$ summands in the sum $\sum_{k=0}^{d-2}\overline{\textrm{F}}(k)$ . However, the parameters $p_{d-1}$ and $p_d$ do not appear in the numerator and hence, for $i=d-1,d$ ,
This implies that $p_{d-1}=p_d$ . Note that (44) also holds true for $d-1$ . Using the two equations for $\mu$ and multiplying by $D^2$ shows that, for $1\le i<j<d$ ,
Hence, for the above choice of i, j,
Choosing $j=i+1$ , we obtain that, for some $r>0$ , ${p_{j+1}}/{p_j} = r$ for all $j<d-1$ , and hence $p_j=2^{-j}$ for all $j<d$ . Write $p^\textrm{bi}\in (0,1)^d$ for the above distribution, given by $p^\textrm{bi}_i=2^{-\min\{j,d-1\}}$ ; for example, $p^\textrm{bi}=\big(\frac{1}{2},\frac{1}{2}\big)$ (here $d=2$ ) and $p^\textrm{bi}=\big(\frac{1}{2},\frac{1}{4},\frac{1}{8},\frac{1}{8}\big)$ (here $d=4$ ).
We have, for $p=p^\textrm{bi}$ ,
For the denominator, we obtain
where we have used the finite geometric sum formula in the last step. The two equations above imply that, for our throughput maximizing distribution,
i.e. the leading term of $\log\!(2)$ in the asymptotics of the throughput $n/L_n$ . This concludes the proof.
Alternatively, we can use the following inductive argument for why $L_n$ remains constant for $p^\textrm{bi}$ as $d\ge 2$ varies: For $d=3$ , we can combine the two $\frac14$ -weighted branches into one. As the $\frac12$ -weighted branch has the same law as the one for $d=2$ , and $L_n$ is additive in the branches, this shows that $L_n$ is the same for $d=2$ and $d=3$ , given $p^\textrm{bi}$ as the splitting probability. We can then inductively carry this over to higher values of d.
For $p^\textrm{bi}$ , we also obtain, using (40) and (41),
independently of d, the the number of slots.
Note that we can minimize $C_n$ by setting $p_i=0$ for $i<d$ and $p_d=1$ , which gives $C_n=0$ . However, this is not a sensible choice, as the algorithm will never terminate.
4.4. Collisions versus throughput
As we have seen in the previous section, the throughput-maximizing distribution does not minimize collisions for SICTA. We show (numerically) that a small reduction in throughput can lead to a large reduction in the number of collisions.
For $p=p^\textrm{bi}\in\mathbb{R}^d$ , the previous section showed that maximal throughput has the leading asymptotic term ${\log\!(2)}$ . It was also shown that, for $p=p^\textrm{bi}$ , we have an average of $(2\log\!(2))^{-1}\approx 0.72$ collisions per packet. We now show that by choosing p different from $p^\textrm{bi}$ we can reduce the average number of collisions, while only suffering a small reduction in throughput. For example, a 20% reduction in optimal throughput (from ${\log\!(2)}\approx 0.72$ down to $0.8\times{\log\!(2)}\approx 0.55$ ) allows for a 39% reduction in the number of collisions, from $(2\log\!(2))^{-1}$ collisions per package down to roughly $0.44$ collisions per package. In Figure 2 we have plotted the minimal achievable collision rate, given a throughput reduction of at most x percent, where x ranges from 0% to 20%, i.e. a throughput ranging from ${\log\!(2)}$ to $0.8\log\!(2)$ .
Our numerical method is constructed as follows. We use (40) for the asymptotic leading term of $C_n/n$ , given by
for the leading term of $n/L_n$ ; see (29). We then use a multivariable solver to minimize the function
over $p\in (0,1)^d$ subject to $\sum_{j=1}^dp_j=1$ and
which enforces a throughput reduction of at most $x\%$ . In Figure 2 we let x range from 0 to $0.2$ . The initial value for p for the multivariable solver was choosen as $p=p^\textrm{bi}$ .
The graph in Figure 2 does not change as we vary the number of branches d.
4.5. Delay analysis
In this section we look at SICTA with gated access. We give recursive formulas that allow for an approximation of the mean delay, as well as the transition matrix of the CRI lengths.
We now assume that packets arrive at random times with an arrival rate $\lambda>0$ . Packets wait and accumulate until the algorithm has resolved the previous collision. We define $\{c_{k+1}\}_{k=0}^\infty$ to be the (random) sequence where $c_k$ is the length of the kth CRI assuming a Poisson arrival rate $\lambda>0$ of new packets. Its randomness is twofold: once from the CRI itself, but also from the Poisson arrival of new packages. Let $\{s_{k+1}\}_{k=0}^\infty$ be the number of packages arriving during the kth CRI. If we condition on $c_k=i$ , $s_{k+1}$ is $\textrm{Poi}(\lambda i)$ distributed. Hence, $\{c_{k+1}\}_{k=0}^\infty$ is a Markov chain. Let $\pi=\{\pi_i\}_i$ be the invariant distribution, which exists for $\lambda<\textrm{MST}$ , since the drift $D_i$ is given by
as the number of new arrivals is $\textrm{Poi}(\lambda i)$ distributed. As $\lambda<\textrm{MST}$ , we can find $\varepsilon>0$ such that, for all k large enough, $L_k/k\le 1/\lambda -\varepsilon$ ; see (5). Recall that $k/i$ converges almost surely and in distribution to $\lambda$ as $i\to\infty$ , if k is $\textrm{Poi}(\lambda i)$ distributed. Hence, $D_i$ will be negative and bounded away from 0 for large enough i. This implies the existence of a stationary distribution, see [Reference Bertsekas and Gallager2, Appendix 3A.5]. The probability that a tagged packet joins the system during a CRI of length n is given by
see also [Reference Yu and Giannakis27, (42)].
Suppose we are given that a tagged packet arrives during a CRI of length n. Let $t=t_0+t_2$ be the total delay of that given packet, made up from waiting $t_0$ slots for the previous CRI to finish and then the time in the algorithm itself, denoted by $t_2$ . Note that $t_0$ is independent of $t_2$ , and that $t_0$ is distributed uniformly on (0, n), since the arrival times of a Poisson point process are uniform on a fixed interval. The distribution of $t_2$ is given by $l_{1+R_n}$ , where $R_n=\textrm{Poi}(\lambda n)$ , as $\textrm{Poi}(\lambda n)$ additional packets will enter the queue during an interval of length n and the processing time is given by the CRI length of the new arrivals, $1+R_n\mapsto l_{1+R_n}$ .
4.5.1. Steady-state distribution of the CRI length
In this section we state a functional recursive relation which allows for the computation of the moment-generating function Q(x, z) up to arbitrary order. This recursive relation also allows for an asymptotic computation of the transition matrix $P_{i,j}=\mathbb{P}(c_2=j\mid c_1=i)$ in steady state.
Proposition 3. Recall the moment-generating function $\textrm{e}^{-x}\sum_{n\ge 0}x^n\mathbb{E}[z^{l_n}]/n!$ (denoted by Q(x,z)) used for the computation of moments of $l_n$ . Write
where
For z in the region of convergence given in Proposition 1, there exists a recursive equation which, for every $j\ge 1$ , gives $q_j(z)$ in terms of $\{q_i(z)\}_{i=0}^{j-1}$ ; see (50). Furthermore, $q_0(z)=0$ .
Before embarking on a proof of Proposition 3, we show how it enables us to calculate the transition matrix of the CRI lengths.
Corollary 2. The probability at steady state of observing a CRI length of j after having observed a CRI length of i is given by $P_{i,j}=q_j(\lambda i)$ for $0<\lambda<\textrm{MST}$ .
Proof. Recall that new packets arrive according to a Poisson process with parameter $\lambda>0$ . Furthermore, recall that we have shown that for $\lambda<\textrm{MST}$ a stationary distribution must exist. Given that the current CRI has length i, we can write the probability that the next CRI has length j by doing a case distinction with respect to how many new users n arrive in i slots:
where $q_j(x)$ was given in Proposition 3 and we recall that the number of new packets is Poisson $\lambda$ in each slot.
We now prove Proposition 3.
Proof of Proposition 3. From (2).
as $\mathbb{P}(l_n=0)=0$ and $\mathbb{P}(l_n=1) = \mathbf{1}\{n=0,1\}$ .
Recall (46). Now, we use (7) to write
Set
Immediately,
As $q_0(x)=0$ , the largest value $\mu_i$ (for any $i\in\{1,\ldots,k\}$ ) can take in (49) is $j-(k-1)$ , as otherwise at least one of the other $\mu_t$ has to be zero (for $t\in\{1,\ldots,k\}\setminus\{i\}$ ). This means that Q(k, x, j) is a function of $\{q_i(z)\}_{i=0}^{j-(k-1)}$ .
Write $f_k(x) = (1+\overline{\textrm{F}}(k)x)\textrm{e}^{-\overline{\textrm{F}}(k)x}$ . Substituting (46) into (48) yields (see (19) for the mechanism)
This system of equations is recursively solvable for $q_j(x)$ , as the coefficients on the right-hand side depend only on $\{q_i(z)\}_{i=0}^{j-1}$ for each j. Furthermore, the initial conditions for $q_j(x)$ are given in (47).
4.5.2. Collision resolution delay analysis
In this section we give a formula for the mean delay $\mathbb{E}[t_2]$ caused by the resolution of the CRI in steady state.
To calculate the expectation of $t_2$ given that the previous CRI had length n, we employ a case distinction. Set $t_{2,m}$ as the CRI length of a tagged packet, given that there are m other packages. Then, as the arrival rates are $\textrm{Poi}(\lambda n)$ distributed,
which we abbreviate as $T_2(\lambda n)$ .
Let $g\in\{1,\ldots,d\}$ be the gate which the tagged packet joins. The evolution of $t_{2,m}$ is given by
Set $G_{m+1}(z)=\mathbb{E}[z^{t_{2,m}}]$ and $G(x,z)=\sum_{m\ge 0}G_{m+1}(z)\textrm{e}^{-x}({x^m}/{m!})$ . We first state a proposition giving a recursive equation for G(x, z).
Proposition 4.
where Q is the moment-generating function of $l_n$ , as previously. As $t_{2,m}\le l_m$ , the power series converges in the same region as in Proposition 1.
Before proving Proposition 4, we explain how we can use it to obtain a formula for $T_2(x)$ . Taking the derivative with respect to z at $z=1$ in (51), we obtain
where L(x) is the Poisson generating function for $L_n$ , as in the proof of Corollary 1. Using $\alpha_n$ defined in (11), this implies that, for $T(x)=\sum_{n\ge 0}t_nx^n$ ,
As in [Reference Yu and Giannakis27], from this equation we can calculate $t_n$ and then numerically approximate the average delay $T_2(\lambda n)$ as $n\to\infty$ .
Proof of Proposition 4. Recall that $g\in\{1,\ldots,d\}$ is the gate the tagged particle joins. Define $G_{m+1}^{(k)}(z) = \mathbb{E}[z^{t_{2,m}}\mid g=k]$ . Note that, by doing a case distinction, $G_{m+1}(z)=\sum_{k=1}^d p_kG_{m+1}^{(k)}(z)$ . Furthermore, by conditioning that $\mu_i$ users join slot i,
Recall that $G(x,z) = \sum_{m\ge 0}G_{m+1}(z)\textrm{e}^{-x}({x^m}/{m!})$ . We can substitute to obtain
Note that for $m=0$ the sum equals $p_k\textrm{e}^{-x}z^{k}$ , and hence
Now, we split the sum by first considering the subpartition $\{\mu_1,\ldots,\mu_k\}$ , whose cardinality we denote by i, and then the remaining partition $\{\mu_{k+1},\ldots,\mu_{d}\}$ , which consists of $d-k$ parts:
where we can switch the order of summation as all the terms are positive.
Note that
Furthermore, for $k=1,\ldots,d$ ,
Hence, we get
We now can simplify the $\sum_{i=0}^\infty\sum_{\mu\in\mathfrak{P}_i^{(k)}}(\ldots)$ as in (19). We hence find that
5. Discussions and conclusion
We have calculated the mean throughput, number of collisions, successes, and idle slots for tree algorithms with successive interference cancellation. We have furthermore given a recursive relation which allows for approximations of arbitrary order for the moment-generating function of the CRI length as well as the mean delay in steady state. We have shown numerically that a small reduction in throughput can lead to a bigger reduction in the number of collisions. Furthermore, our methods can be used for other observables of the random tree algorithm. We hence believe that by emulating our approach, more properties of random tree algorithms can be calculated.
Appendix A. Radius of convergence
In this appendix we prove some bounds on the radius of convergence. As we could not find these results in the literature, we consider them of independent interest.
Lemma 4. Let $p_{\textrm{max}}=\max_{i=j,\ldots,d}p_j$ be the largest splitting probability. Fix $\zeta=\sqrt{p_{\textrm{max}}}$ and $1>\varepsilon>0$ . Then, for all $n\in \mathbb{N}$ and all $z\in\mathbb{C}$ with $|z|\zeta<1-\varepsilon$ ,
Proof. Note that for $n=1$ the result is true, as $l_1=1$ almost surely. We prove the lemma via induction. We first show the result holds for $Q_2(z)$ . Note that, using the bound $p_j\le p_{\textrm{max}}$ repeatedly,
The packets split according to the feedback from the access point. Let $\tau$ be the first time we observe a partition with strictly more than one non-zero element, i.e. not all packets choose the same slot.
We first consider an initial collision of $n=2$ elements. Note that the probability of all packets choosing the same slot is given by $\sum_{i=1}^d p_i^2$ . As we split independently each time, the probability that $\tau=k$ is bounded by
If $\tau=k$ and $n=2$ , the largest element in the partition after k splits is 1. Recall that $Q_0(z)=Q_1(z)=z$ . Hence,
where $\zeta^{2k-2}$ is the bound on $\mathbb{P}(\tau=k)$ , $z^{k-1}$ is the factor from the first $k-1$ splits, and $z^2$ comes from the split into two groups.
Now fix $n>2$ initially collided packets. Assume that the statement is true for all k with $k<n$ . Abbreviate $\eta={1}/({1-(1-\varepsilon)\zeta})$ . We then get, as in (53), $\mathbb{P}(\tau=k) \le \zeta^{nk-n}$ . Note that by the induction hypothesis, if we split into a partition with more than one non-zero element (i.e. not all packets choose the same slot), we have a bound on the moment-generating function of
as for such a split $l_n$ becomes the sum of $l_i$ where each i is strictly smaller than n. Hence,
However, as
the result follows.
Acknowledgements
We would like to express our gratitude to both anonymous referees who offered many valuable comments on an earlier version of this article and helped to improve it. We also wish to thank Silke Rolles for her many valuable comments on earlier drafts.
Funding information
Y. Deshpande’s work was supported by the Bavarian State Ministry for Economic Affairs, Regional Development and Energy (StMWi) project KI.FABRIK under grant no. DIK0249.
Competing interests
There were no competing interests to declare that arose during the preparation or publication process of this article.