PDF  PubReader

Hui , Wei , and Chen: Fresh Multiple Access: A Unified Framework Based on Large Models and Mean-Field Approximations

Haiming Hui , Shuqi Wei and Wei Chen

Fresh Multiple Access: A Unified Framework Based on Large Models and Mean-Field Approximations

Abstract: Information freshness has attracted increasingly attention in the past decade as it plays a critical role in the emerging real-time applications. Age of information (AoI) holds the promise of effectively characterizing the information freshness, hence widely considered as a fundamental performance metric. However, in multiple-device scenarios, most existing works focus on the analysis and optimization of AoI based on queueing systems. The study for a unified approach for general multiple access control scheme in freshness-oriented scenarios remains open. In this paper, we take into consideration the combination of the fundamental freshness metric AoI and multiple access control schemes to achieve efficient cross-layer analysis and optimization in freshness-oriented scenarios, which is referred to as fresh multiple access. To this end, we build a unified framework with a discrete-time tandem queue model for fresh multiple access. The unified framework enables the analysis and optimization for general multiple access protocols in fresh multiple access. To handle the high dimension framework embedded in fresh multiple access, we introduce large model approaches for the Markov chain formulation in AoI oriented scenarios. Two typical AoI-based metric are studied including age of incorrect information (AoII) and peak AoII. Moreover, to address the computational complexity of the large model, we present mean-field approximations which significantly reduces the dimension of the Markov chain model by approximating the integral affect of massive devices in fresh multiple access.

Keywords: Access control , age of incorrect information , information freshness , Markov chain , mean-field approximations , multiple access , queueing model , random access , reservation , unified framework

I. INTRODUCTION

THe rapid development of 5G and 6G communications has promoted a vast range of real-time applications including industrial Internet of things (IIoT), autonomous driving, and unmanned aerial vehicles [1]. In these real-time applications, information freshness plays an increasing role and attracts much research interests. To effectively characterize the information freshness, age of information (AoI) was proposed in [2], which has been widely considered as a fundamental metric. The AoI for single device has been extensively studied in the past decade [3], [4].

In addition to AoI, extensive connectivity for massive devices are demanded to support the real-time applications. Efficient multiple access control scheme is expected to play a fundamental role in addressing the stringent requirement of connectivity with limited communication resources. However, conventional multiple access techniques can only be applied with a relatively small number of devices [5], [6]. To handle the access control of massive devices, random access schemes were developed as a distributed control protocol, which allows dynamic resource allocation for devices in a contention manner, hence attracting much research interest in massive access control [7], [8]. The earliest random access algorithm called Aloha was first developed in [9]. The Aloha algorithm is readily to implement because of its simple rules. Extensive analysis for Aloha algorithm were studied concerning its throughput and stability regions [10], [11]. Furthermore, the tree splitting algorithm [12] and first-come-first-serve (FCFS) splitting algorithm [13] with more sophisticated collision resolution rules were proposed to achieve higher throughput and lower delay than the simple Aloha algorithm.

In conventional metrics for information freshness, the state change or update of the monitored process itself is not taken into consideration. To overcome this limitation, a novel metric for the age of information is defined to be the time difference between the state change and remote update, for both monitor processes with alarms [14] and counting processes [15].To improve freshness in multi-user systems, AoI was considered in conventional multiple access schemes. However, the analysis and optimization of multiple access schemes in AoI oriented scenarios are quite challenging since the system is affected by the collective influence of multiple users. Most existing works focused on the characteristic of queueing systems in the analysis or optimization of AoI. Two typical sampling schemes are shown in Fig. 1. With periodic sampling or Poisson arrivals of data packets, old data packets are evicted to improve freshness. In this case, the scheduling policies based on queueing systems were studied for the analysis and optimization of average AoI [16]. The NOMA scheme and orthogonal multiple access (OMA) schemes are studied to reduce the average AoI [17]. The tradeoff between the average AoI and drop rate for two-user multi-access scenario was revealed in [18]. Furthermore, to address the access control for massive devices, random access based access protocols were applied to reduce the signaling overhead. The collision resolution algorithm for slotted Aloha scheme [19] and pure Aloha scheme [20] were further optimized to reduce the average AoI. Threshold-based access policy were investigated to reduce the average AoI by dynamically adjusting the access frequency [21]. When the instability embedded in fading channels is considered, a rate-adaptive transmission scheme was studied to minimize the average AoI under an average power constraint [22]. Since information content of data packets can be further exploited to achieve fresh applications, event-trigger scheme was considered to capture more informative data packets from the data source. All data packets are transmitted without eviction. In this case, timing side information was utilized in compression for the time stamp of data packets to evaluate AoI [23]. Compression distortion and AoI are jointly optimized in real-time monitoring to minimize the reconstruction distortion [24]. The AoI was reduced under the sampling scheme based on the scheduling policy [25]. A new AoI-based metric called age of incorrect information (AoII) was proposed as a new performance metric through event trigger scheme [26]. Through event trigger schemes, AoII was shown to be able to capture more meaningfully the purpose of data, thus attracting much attention in semantic communications [27]. The scheduling policy for multiple sensors in slotted Aloha systems was studied to minimize the AoII [28].

Fig. 1.

The evolution of AoI and AoII over time with periodic sampling and event trigger scheme.
1.png

In addition, peak AoI plays an important role in freshness oriented multiple access since the peak AoI characterizes the staleness of the transmitted information [29], as illustrated in Fig. 1. It is shown that peak AoII depends on the access delay [30]. Multiple access schemes can be further optimized to reduce the peak AoII or access delay. A cross-layer approach with NOMA was studied to minimize the average delay [31], which is further generalized into scenarios with arbitrary packet arrivals and adaptive transmission [32]. A mean-field approximation approach was adopted aiming at the analysis of delay-optimal scheduling [33]. Slotted uncoordinated random access schemes were developed to serve a massive number of devices with quality-of-service requirements guaranteed [34]. Polling schemes allow the central device to ask each device in sequence to conduct data transmission [35]. A device only consumes a short timeslot if the device has no data packets to transmit. Performance analysis of polling schemes were studied based on queueing models [36]. The scheduling policy under polling scheme were studied to minimize the average AoI with stochastic packet generation model [37]. Due to the high complexity in modeling the multiple access scheme for massive devices in AoI oriented scenarios, the analysis and optimization for multiple access scheme with more devices under various AoI-based performance metrics remains open.

Furthermore, reservation-based random access schemes hold the promise of addressing massive access control with limited resources. Particularly, the throughput of the Aloha and FCFS algorithm are around 0.368 and 0.487. The upper bound of the throughput is 0.568 [38], which means considerable resources are inevitably wasted from the collision. While the maximum throughput is limited due to the inevitable collision in the random access process [39], access protocols based on reservation techniques were investigated to approach the throughput of one [40]. In reservation-based schemes, each device needs to make a reservation prior to its data transmission. A basic reservation-based multiple access scheme through satellite network was proposed in [41], in which each minislot is allocated to a fixed node to make reservation. To extend the connectivity, random access techniques are adopted in the reservation procedure. Thus, all nodes were allowed to make reservation in any given minislot in a contention based manner [42]. The reservation-based random access1 scheme may significantly improve the throughput by sending short reservation signals to reserve resources for collision-free packet transmission [43].

1 The reservation-based random access is also referred to as the connectionbased random access in the literature, since the reservation process can be regarded as setting up the connection.

The main contents of this paper are illustrated in Fig. 2. In this paper, we build a unified framework to provide a general approach to analysis, optimization, and comparison of all these multiple access schemes in freshness-oriented scenarios, which is referred to as fresh multiple access. The general multiple access scheme is characterized by three consecutive stages. First, in the access trigger stage, new reservation is triggered at a user based on the threshold of the local buffer. Second, in the reservation stage, the user sends reservation signals in a contention or polling based manner. Third, in the transmission stage, the user transmits the data packets based on its reservation in a contention-free manner. Reservation-free multiple access schemes are also unified in this framework by considering zero service time for the transmission stage. In this case, the data packets to be transmitted is regarded as the reservation signal. Throughout the access procedure, a tandem queue structure including a virtual reservation queue and a virtual transmission queue are built in the protocol layer to characterize the users in each stages.

Fig. 2.

The illustration of the main contents of this paper based on the unified framework for multiple access.
2.png

Based on the unified framework, general multiple access scheme is modeled with Markov chain formulation. However, when the freshness metric is incorporated in the Markov chain model, the dimension of the Markov chain model for fresh multiple access becomes prohibitively high. To this end, we present large model based approaches for analysis and optimization of fresh multiple access. To formulate the large model Markov chain for fresh multiple access, we obtain the sparse transition probabilities for each state based on the characterization of multiple access protocols and arbitrary packet generation process. Thus, the whole transition matrix of the large model Markov chain can be obtained. Further analysis and optimization can be conducted based on the large model Markov chain. Note that arbitrary mechanisms can be adopted for the reservation stage, hence enabling further optimization towards the multiple access scheme. We focus on typical reservation schemes including polling, slotted Aloha, and tree splitting algorithm in the reservation stage to demonstrate the unified framework in this paper. Moreover, to address the high computational complexity of the large model for massive devices oriented scenarios, we present mean-field approximations for the performance analysis of fresh multiple access. Through mean-field approximation, the integral affect of massive devices in fresh multiple access are approximated as an environment affect. Thus the dimension of Markov chain is significantly reduced to comprise only the local state of a single user.

Based on the Markov chain model, we are able to analyze the TD, FD, and XD multiplexing schemes for either AoII or peak AoII. Specifically, for AoII oriented scenarios, we formulate large Markov model based on individual states of all devices in the system. For peak-AoII oriented scenarios, we only need the total number of data packets to obtain the average peak AoII. Thus, we formulate reduced-dimensional Markov model based on integral states of the whole system.

The main contributions in this paper are listed as follows.

1) We study two typical fresh multiple access scenarios oriented by AoII and peak AoII based on the unified framework.

2) We formulate the large model Markov chain to characterize various multiple access protocols and multiplexing schemes. Three multiplexing schemes of reservation signals and data packets are considered, including multiplexing in the time domain (TD) [44], frequency domain (FD), and dynamic bandwidth allocation scheme (XD).

3) In massive devices oriented scenarios, we present meanfield approximations to analyze the AoII and peak AoII, which simplifies the Markov chain formulation and reduces the computational complexity of large model. Thus, we formulate a small model Markov chain based on the local state of a single user with mean-field approximation. Based on the Markov chain, we can compute the steadystate probabilities which leads to the AoII or peak AoII performance metric.

4) Markov decision process (MDP) is applied to optimize the dynamic scheduling policy for the XD scheme. We present extensive numerical results to demonstrate the analysis for AoII and peak AoII with various access protocols based on the three kinds of Markov chain formulation.

The rest of this paper is organized as follows. The system model and the unified framework are described in Section II. The Markov chain formulation for AoII oriented scenarios and peak-AoII oriented scenarios are presented in Sections III and IV, respectively. Markov chain formulation with meanfield approximation for massive devices oriented scenario is presented in Section V. Numerical results are presented in Section VI. Finally, we present our conclusions in Section VII.

II. RELATED WORK

With reservation-based random access schemes, the freshness was further improved in scenarios with massive devices. Delay and stability of the reservation-based slotted Aloha scheme were analyzed in [45] based on the queueing model. Two typical reservation-based random access schemes are applied in the 802.11 protocol and the long term evolution (LTE) cellular networks. The primary access protocol of 802.11 is based on the carrier sense multiple access with collision avoidance (CSMA/CA) scheme, which defines request-tosend/ clear-to-send (RTS/CTS) signals as the reservation signal. An analytical model to compute the throughput of CSMA schemes was presented by Bianchi in [46]. More detailed analysis for particular p-persistent and non-persistent CSMA were studied in [47], [48]. The access delay of CSMA with unsaturated networks was investigated in [49] based on the queue modeling for nodes in the network. The scheduling policy based on the CSMA scheme can be optimized to reduce AoI in scenarios with power constraints [50]. The average AoI with CSMA scheme was optimized in both the sampling scenarios and stochastic arrivals scenarios [51]. Moreover, in the LTE networks, a physical random access channel, which appears periodically in time frames, is used to transmit the reservation signal referred to as preamble. The throughput and access delay of machine-to-machine (M2M) communications in LTE networks were optimized by tuning parameters of the inherent Aloha scheme [52], [53]. The resource consumption and throughput of random access were studied to obtain Pareto-optimal configuration [54]. The double-queue model presented in [53] does not consider the resource consumption of the packet transmission in its second queue. However, by taking into consideration the both the reservation and the packet transmission, we can obtain a more comprehensive model with unified analysis and optimization framework for freshness-oriented multiple access.

For the various widely used multiple access techniques, they are categorized into four types from the perspective of contention and reservation, as shown in Fig. 3, including time division multiple access (TDMA), polling scheme, random access (such as Aloha), and reservation based random access (such as CSMA/CA and LTE networks). It is shown that each scheme is shown to be superior in particular scenarios of different connectivity and packet size. Specifically, on one hand, TDMA and polling are contention-free schemes in which all users are allocated resources by the BS to access the channel in a contention-free manner. Random access and reservation based random access are contention-based schemes in which the BS does not guarantee resource allocation for each device. All devices attempt to access the channel in a contentionbased manner. The contention-based manner is more suitable for scenarios with massive devices with sporadic packet generations. Thus, as the number of devices increase, the contention-based manner is shown to outperforms contentionfree manner. On the other hand, TDMA and random access are reservation-free schemes, which means that the data packets are transmitted directly when the device access the channel. Polling and reservation based random access are reservation based schemes, which means that the device should send a reservation signal prior to its packet transmission. The reservation signal is transmitted based on TDMA or random access schemes in Polling or reservation based random access, respectively. The reservation mechanism alleviates the waste of resources from idle and collision. Thus, the reservation-based scheme is shown to outperform the reservation-free scheme in scenarios with large packet size.

Fig. 3.

The suitable multiple access schemes under different cases of the number of devices and packet size.
3.png

III. SYSTEM MODEL

We consider a multi-user system, of which our goal is to optimize the information freshness. To characterize the information freshness of multiple users, we consider the AoI metric. There are M users and a receiver in the system. Each user is regarded as a transmitter node, which is equipped with an infinite buffer to store data packets to be transmitted. Data packets of status updates are generated at each node and transmitted to the receiver. With periodic sampling schemes, the interval of status updates at each node is the same. Thus, the TDMA scheme can be applied, in which each node generates the data packet at the beginning of the timeslot allocated to the node for transmission.

However, periodic sampling may not capture the fresh informative updates efficiently. To address that, we consider incorrect information with event trigger scheme for the multiple access network model, as shown in Fig. 1. Specifically, with event trigger scheme, each node only generates a data packet of status update when the status changes, which leads to the AoII metric. The node does not transmit any data packets if the status remains the same, hence reducing the resource consumption. To study access control towards incorrect information, we build a unified framework including two virtual queues referred to as the reservation queue and the transmission queue, as shown in Fig. 4. The unified framework can be adopted for general multiple access schemes. We assume that the packet generation at each node is a Poisson process with the same arrival rate [TeX:] $$\bar{\lambda}=\lambda / M .$$ The packet arrival for the whole network is also Poisson with rate λ. Specifically, the probability that there are i packets arriving at all nodes in a unit of time is given by

(1)
[TeX:] $$a_i=\frac{(\lambda)^i}{i !} e^\lambda.$$

Fig. 4.

The unified framework for multiple access schemes and the tandem queue.
4.png

The local access model of the unified framework for each node is divided into three stages. First in the access trigger stage, the node triggers a new access attempt when there are K data packets in the local buffer. Thus, the threshold for triggering reservation is defined by K. After triggering a new access attempt, the node enters the reservation queue to begin the reservation. By sending only one reservation signal for K data packets, the number of reservation signals to be transmitted is reduced, which can be regarded as reducing the arrival rate for the reservation queue. Next in the reservation stage, the node sends the reservation signal in a contention-based manner based on the collision resolution algorithm or in a contention-free manner. The collision resolution algorithms are also known as random access algorithms. The node enters the transmission queue after it successfully transmits a reservation signal. Third in the transmission stage, the node transmits data packets sequentially in the transmission queue. When the node comes to the head of the transmission queue, the node transmits at most [TeX:] $$N_{\max }$$ data packets, which is referred to as the transmission constraint, in the local buffer. Note that [TeX:] $$N_{\max }$$ can be greater than K since new data packets can arrive during the reservation and transmission stage. If there are more than [TeX:] $$N_{\max }$$ data packets in the local buffer, the node may trigger a new reservation even when it still stays in the transmission queue. In the access procedure, each node enters the reservation queue and then the transmission queue. Since the departure process of the reservation queue is the same as the arrival process of the transmission queue, the two virtual queues constitute a tandem queue model. The reservation-based access protocol maintains a finite length of the tandem queue. Thus, we assume that the maximum length of the reservation queue and the transmission queue is given by [TeX:] $$N_1 \text{ and } N_2$$, respectively.

For the reservation stage, each node needs to successfully send a reservation signal prior to its packet transmission. An ACK signal is sent by the recerver after a reservation signal is successfully transmitted through a broadcast channel to inform all nodes. Thus, all nodes are aware of the current state of the reservation, which ensures the packet transmission based on reservation does not collide with each other. Based on the reservation of nodes, all data packets are transmitted sequentially in a contention-free manner. The sending of reservation signals is conducted in a contention-based manner of contention-free manner. Specifically, with the contentionbased manner, each node decides to send the reservation signal based on the collision resolution algorithm such as Aloha. A reservation signal is successfully transmitted by a node only when no other nodes send reservation signals in the same timeslot. In other words, if more than one node sends the reservation signal in the same timeslot, then a collision occurs in that timeslot while no reservation is made in that timeslot. It addresses the sporadic packet arrivals and the massive number nodes. With the contention-free manner, the receiver asks each node in a cyclic order whether the node has data packets to transmit. If a node has triggered an access and entered the reservation queue, then the node should answer the receiver when the receiver asks the node, which is regarded as successfully transmission of the reservation signal. After that, the node enters the transmission queue. Therefore, each node in the reservation stage waits for the receiver to ask instead of trying to send the reservation signal according to collision resolution algorithms, hence alleviating the collision among nodes. However, with the contention-free scheme, the node must wait for the receiver to ask all nodes one by one, which brings extra AoII in the reservation stage especially in scenarios with a massive number of nodes.

The reservation signal and data packets are multiplexed in the time domain or frequency domain for transmission. We consider that the bandwidth for the reservation signal and the data packets are [TeX:] $$w_1 \text { and } w_2$$, respectively. Since the transmission rate is proportional to the bandwidth, we simply denote the transmission rate as [TeX:] $$w_1 \text { and } w_2$$. The total transmission rate is constrained by [TeX:] $$w=w_1+w_2$$. Without loss of generality, we consider w = 1 throughout this paper. The bandwidth [TeX:] $$w_1 \text { and } w_2$$ can be fixed or adjusted dynamically to implement different access control protocols. We assume the size of each data packet is c while the size of a reservation signal is one. The time for sending the ACK signal by the receiver is assumed to be negligible. The time for transmitting a reservation signal is given by

(2)
[TeX:] $$T_1=\frac{1}{w_1},$$

which is inversely proportional to the bandwidth [TeX:] $$w_1$$. The time for transmitting each data packet is given by

(3)
[TeX:] $$T_2=\frac{c}{w_2} .$$

We consider the AoII metric to represent the performance of the multiple access network. To improve the freshness of the status updates, each node only stores the freshest data packet in the local buffer. The AoII is defined as the time elapse since a data packet is generated in the local buffer. When a new data packet is generated, the old one is evicted while AoII continues increasing with time. Thus, the AoII represents the freshness of information, which is defined as

(4)
[TeX:] $$\Delta_I(t)= \begin{cases}0, & \text { if no new data packet is generated } \\ & \text { after the last packet transmission, } \\ t-U(t), & \text { otherwise, }\end{cases}$$

where U(t) is the generation time of the first new data packet after the last packet transmission by the node. To analyze the average AoII metric, it requires large-model approaches since the Markov chain model can be high-dimensional.

Proposition 1. In multi-access communications where each user exclusively retains its own freshest packet, its average peak AoII is equal to the average waiting time of its successfully delivered packets.

Proof. In the scenario where each user exclusively retains the freshest packet in its buffer and computes the AoII independently, the AoII is equal to the duration a packet remains within the multi-access communications. Furthermore, the peak AoII corresponds to the total time a packet resides within the system. This alignment arises from the fact that each instance of a peak AoII occurs precisely when a packet is received. Consequently, the average peak AoII is equal to the average time a packet spends in multi-access communications.

Furthermore, we consider the average peak AoII metric to reduce the dimension of the modeling towards average peak AoII. Specifically, let [TeX:] $$\bar{L}$$ denote the average number of data packets in the tandem queue. The peak AoII of a data packet is defined as the maximum value of AoII achieved before the reception of a data packet. The average peak AoII in the second and third stages is obtained through the Little’s Law, given by

(5)
[TeX:] $$\ell=\frac{\bar{L}}{\lambda} .$$

Thus, we only need to track the state of the whole system in terms of the total queue length, instead of the individual state of each transmitter node, which simplifies the Markov chain formulation. A data packet may experience an extra delay in the access trigger stage when K > 1, which increases the peak AoII. The average time of waiting for a data packet arrival at a node is given by M/λ. Thus, the peak AoII in the first stage is given by

(6)
[TeX:] $$\begin{aligned} \ell_0 & =\frac{M}{\lambda K} l \sum_{i=0}^{K-1} i \\ & =\frac{M(K-1)}{2 \lambda} . \end{aligned}$$

Increasing K for the access trigger stage can reduce the signaling overhead while the peak AoII increases. In addition, the peak AoII [TeX:] $$\ell_0$$ increases linearly with the number of nodes in the network M. As the number of data packets transmitted related to each reservation signal increases, the signaling overhead for the reservation signal can approach zero. Thus, to attain finite peak AoII, the total arrival rate should be less than the maximal transmission rate of the transmission queue. Thus, the total arrival rate satisfies that [TeX:] $$\lambda\lt w / c$$.

IV. LARGE MARKOV MODEL FOR AOII ORIENTED MULTIPLE ACCESS

In this section, we formulate a large model Markov chain based on the unified framework towards the AoII metric. The local buffer of each node only stores the freshest data packet. We represent the system state based on the state of each node. The state of node i is [TeX:] $$\left(q_i, e_i\right)$$ in which [TeX:] $$q_i$$ represents the AoII at the node and [TeX:] $$e_i$$ represents the reservation state of the node. Let [TeX:] $$s \in\{1, \cdots, M\}$$ denote state of the reservation procedure. When a node begins transmission of data packets, the remaining length of data packets to be transmitted is denoted by [TeX:] $$t_d \in\{0, \cdots, c\}.$$ For [TeX:] $$t_d=0$$, it means that nodes in the reservation queue are trying to send reservation signal in the current timeslot based on their reservation state. Thus, the system state is denoted by [TeX:] $$S=\left(s, e_1, \cdots, e_M, q_1, \cdots, q_M, t_d\right)$$.

Both reservation signals and data packets consumes bandwidth resources for transmission. There are three typical multiplexing schemes for reservation signals and data packets including time-division (TD), frequency-division (FD), and dynamic bandwidth allocation scheme (XD). In this section, to reduce the average AoII, we focus on the XD scheme. Specifically, after a node successfully transmits a reservation signal, the node begins transmitting the data packet in the next timeslot while the transmission lasts for c timeslots. Other nodes cannot send the reservation signals until the current node finishes its transmission stage.

In each timeslot, the state transition is divided into two steps. First, each node send the reservation signal according to its reservation state and the state of the current reservation procedure. Second, new data packets may arrive at each node. In the first step, if [TeX:] $$t_d\gt 0$$, then a node is in the transmission queue and transmitting the data packet. Thus, the state [TeX:] $$t_d$$ transits to [TeX:] $$t_d-1$$ while other states do not change. If [TeX:] $$t_d=0$$, then nodes in the reservation queue send reservation signals based on the polling or contention mechanism. The reservation state of each node [TeX:] $$e_i$$ and the state of the reservation procedure s changes accordingly. After the first step, the state transits from [TeX:] $$S=\left(s, e_1, \cdots, e_M, q_1, \cdots, q_M, t_d\right)$$ to intermediate state [TeX:] $$S^{\prime}=\left(s^{\prime}, e_1^{\prime}, \cdots, e_M^{\prime}, q_1^{\prime}, \cdots, q_M^{\prime}, t_d^{\prime}\right).$$

In the second step, the transition probability is obtained based on the packet arrival distributions. Let [TeX:] $$\bar{a}$$ denote the probability that there are at least one data packets arriving at a node in a timeslot, given by

(7)
[TeX:] $$\bar{a}=1-e^{-\bar{\lambda}}.$$

The state [TeX:] $$q_i^{\prime}$$ is the age of the data packets at node i. Thus, when [TeX:] $$q_i^{\prime}\gt 0$$, then the age increases by one. When [TeX:] $$q_i^{\prime}=0,$$ it transits to [TeX:] $$q_i^{\prime \prime}=1$$ with probability [TeX:] $$\bar{a} .$$ The state [TeX:] $$s^{\prime}, e_1^{\prime}, \cdots, e_M^{\prime} \text { and } t_d^{\prime}$$ do not change in the second step. Consider the constraint of each node’s AoII is denoted by N, which is assumed to be finite for the purpose of formulating finite-dimension Markov chain.2 Thus the transition probability of state cccc is given by

(8)
[TeX:] $$p_{i, q_i^{\prime}, q_i^{\prime \prime}}^{\prime}= \begin{cases}\bar{a}, & q_i^{\prime \prime}=1, q_i^{\prime}=0, \\ 1-\bar{a}, & q_i^{\prime \prime}=q_i^{\prime}=0, \\ 1, & q_i^{\prime \prime}=\min \left(q_i^{\prime}+1, N\right), q_i^{\prime}\gt 0.\end{cases}$$

2 By setting the constraint N large enough, the probability that the age exceeds N can approach zero. Thus, this constraint may not affect the performance of AoII metric.

Since packet arrival for all nodes are independent, the transition probability from [TeX:] $$S^{\prime}=\left(s^{\prime}, e_1^{\prime}, \cdots, e_M^{\prime}, q_1^{\prime}, \cdots, q_M^{\prime}, t_d^{\prime}\right)$$ to [TeX:] $$S^{\prime \prime}=\left(s^{\prime \prime}, e_1^{\prime \prime}, \cdots, e_M^{\prime \prime}, q_1^{\prime \prime}, \cdots, q_M^{\prime \prime}, t_d^{\prime \prime}\right)$$ is given by

(9)
[TeX:] $$p_{S^{\prime}, S^{\prime \prime}}^{\prime}=\prod_{i=1}^M p_{i, q_i^{\prime}, q_i^{\prime \prime}}^{\prime}$$

A. Polling Scheme

We first consider the polling scheme in which the reservation signals are transmitted in a collision-free manner. Since the receiver asks each node in turn to send the reservation signal, the reservation state of each node is represented by waiting or being asked in the current timeslot. The state of the reservation procedure [TeX:] $$s \in\{1, \cdots, M\}$$ denote the index of node in the polling procedure that the receiver currently asks. For simplicity, we omit the reservation state [TeX:] $$e_i$$ of each node. Thus, the system state is denoted by [TeX:] $$S=\left(s, q_1, \cdots, q_M, t_d\right)$$. The entire state space is denoted by [TeX:] $$\mathcal{S} .$$

In the first step, when [TeX:] $$t_d=0$$, the receiver asks the next node [TeX:] $$s^{\prime}$$ (of index s+1 if s < M or index 0 if s = M). Then node [TeX:] $$s^{\prime}$$ begins transmitting data packets of length [TeX:] $$c q_{s^{\prime}}$$. Note that if [TeX:] $$q_{s^{\prime}}=0$$, then the node actually has nothing to transmit. As a result, the state transits from [TeX:] $$S=\left(s, q_1, \cdots, q_M, t_d\right)$$ to intermediate state [TeX:] $$S^{\prime}=\left(s^{\prime}, q_1^{\prime}, \cdots, q_M^{\prime}, t_d^{\prime}\right)$$ that is determined by S. Specifically, state [TeX:] $$s^{\prime} \text { and } d^{\prime}$$ is given by

(10)
[TeX:] $$s^{\prime}= \begin{cases}s+1, & t_d=0, s\lt M, \\ 1, & t_d=0, s=M, \\ s, & t_d\gt 0,\end{cases}$$

(11)
[TeX:] $$t_d^{\prime}= \begin{cases}q_{s^{\prime}} c, & t_d=0 \\ t_d-1, & t_d\gt 0.\end{cases}$$

For [TeX:] $$i=1, \cdots, M$$, the state [TeX:] $$q_i^{\prime}$$ is given by

(12)
[TeX:] $$q_i^{\prime}= \begin{cases}0, & t_d=1, i=s, \\ q_i, & \text { otherwise. }\end{cases}$$

Based on (8)–(12), we can derive the transition probability matrix of the Markov chain model. The transition probability matrix is denoted by P, of which the element [TeX:] $$p_{S, S^{\prime \prime}}$$ is the transition probability from S at the beginning of the current timeslot to state [TeX:] $$S^{\prime \prime}$$ at the beginning of the next timeslot. Specifically, the element [TeX:] $$p_{S, S^{\prime \prime}}$$ for each pair [TeX:] $$S, S^{\prime \prime}$$ is derived by first obtaining the intermediate state [TeX:] $$S^{\prime} \text{ from } S.$$ Then the probability is given by

(13)
[TeX:] $$p_{S, S^{\prime \prime}}=p_{S^{\prime}, S^{\prime \prime}}^{\prime}.$$

The transition matrix P is of order [TeX:] $$r_1=(N+1)^M M(c+1) .$$ The transition matrix is sparse since each state can only transits to a few states. Thus, we can obtain the transition probabilities starting from each state to reduce the complexity. The methods of obtaining the transition matrix is shown in Algorithm 1. Since any multiple access protocols can be regarded as a formal language [58], the algorithm to generate the transition matrix can be adopted for any multiple access protocols. We can also obtain the large but sparse transition matrix for other multiple access protocols through such algorithms accordingly.

Then we can compute the steady-state probabilities of all states. Let a row vector π denote the steady-state probabilities, which satisfy

(14)
[TeX:] $$\left\{\begin{array}{l} \boldsymbol{\pi} P=\boldsymbol{\pi}, \\ \boldsymbol{\pi} \mathbf{1}_{r_1}=1. \end{array}\right.$$

Thus, we have [TeX:] $$\boldsymbol{\pi}\left(P-I_{r_1}+\mathbf{1}_{r_1 \times r_1}\right)=\mathbf{1}_{r_1}^{\mathrm{T}}.$$ The steady-state probabilities are given by

(15)
[TeX:] $$\boldsymbol{\pi}=\mathbf{1}_{r_1}^{\mathrm{T}}\left(P-I_{r_1}+\mathbf{1}_{r_1 \times r_1}\right)^{-1}.$$

To address the high dimension embedded in the state space and transition matrix, large model based approaches are applied to solve the large sparse chain [55], [56].

The steady-state probability for a given state [TeX:] $$S=\left(s, q_1, \cdots, q_M, t_d\right)$$ is denoted by [TeX:] $$\pi_{s, q_1, \cdots, q_M, t_d}.$$ The average AoII of all nodes are given by

(16)
[TeX:] $$\bar{\Delta}=\sum_{q_1=0}^N \cdots \sum_{q_M=0}^N \sum_{i=1}^M \frac{q_i}{M} \sum_{t_d=0}^c \sum_{s=1}^M \pi_{s, q_1, \cdots, q_M, t_d}.$$

Algorithm 1
Algorithm to obtain transition matrix
pseudo1.png
B. Random Access Scheme

We next consider the random access scheme to allow each node to send reservation signals in a contention-based manner. The contention during the reservation stage is handled by the collision resolution algorithm. Thus, we first present a general characterization for arbitrary collision resolution algorithms, which are represented by Markov chains. Let [TeX:] $$\mathcal{S}_{\mathrm{R}}$$ denote the state space of the reservation procedure and [TeX:] $$r_0=\left|\mathcal{S}_{\mathrm{R}}\right|$$ denote the size of the state space. The transition of the Markov chain represents the process of contention among reservation signals in the reservation queue during each timeslot, while the reservation state of each node [TeX:] $$s_i$$ changes accordingly. On one hand, if no reservation signal is successfully transmitted in a timeslot, then the transition probability from state [TeX:] $$s_i \in \mathcal{S}_{\mathrm{R}}$$ to state [TeX:] $$s_j \in \mathcal{S}_{\mathrm{R}}$$ is given by [TeX:] $$X_{0, i j}$$. We can obtain an [TeX:] $$r_0 \times r_0$$ transition matrix [TeX:] $$X_0$$ with elements [TeX:] $$X_{0, i j}$$ for [TeX:] $$1 \leq i \leq r_0$$ and [TeX:] $$1 \leq j \leq r_0$$, given by

(17)
[TeX:] $$X_0=\left[\begin{array}{ccc} X_{0,11} & \cdots & X_{0,1 r_0} \\ \vdots & \ddots & \vdots \\ X_{0, r_0 1} & \cdots & X_{0, r_0 r_0} \end{array}\right].$$

On the other hand, if a reservation signal is successfully transmitted in a timeslot, then the transition probability from state [TeX:] $$s_i \in \mathcal{S}_{\mathrm{R}}$$ to state [TeX:] $$s_j \in \mathcal{S}_{\mathrm{R}}$$ is given by [TeX:] $$X_{1, i j}$$, which constitute an [TeX:] $$r_0 \times r_0$$, transition matrix [TeX:] $$X_1$$ given by

(18)
[TeX:] $$X_1=\left[\begin{array}{ccc} X_{1,11} & \cdots & X_{1,1 r_0} \\ \vdots & \ddots & \vdots \\ X_{1, r_0 1} & \cdots & X_{1, r_0 r_0} \end{array}\right].$$

At the beginning of each timeslot, a new collision resolution process (CRP) may begin. The state for a new CRP depends on the length of the reservation queue. When the current state is [TeX:] $$s_i$$ and there are n nodes in the reservation queue, the transition probability from state [TeX:] $$s_i$$ to state [TeX:] $$s_j$$ is denoted by [TeX:] $$Y_{n, i j}$$. We can obtain [TeX:] $$r_0 \times r_0$$ transition matrices [TeX:] $$Y_n \text { for } n=0,1, \cdots$$ with elements [TeX:] $$Y_{n, i j} \text { for } 1 \leq i \leq r_0 \text { and } 1 \leq j \leq r_0$$, given by

(19)
[TeX:] $$Y_n=\left[\begin{array}{ccc} Y_{n, 11} & \cdots & Y_{n, 1 r_0} \\ \vdots & \ddots & \vdots \\ Y_{n, r_0 1} & \cdots & Y_{n, r_0 r_0} \end{array}\right].$$

A collision resolution algorithm is defined by matrices [TeX:] $$X_0, X_1, \text { and } Y_n$$.

We present the matrices [TeX:] $$X_0, X_1, \text { and } Y_n$$ for a typical collision resolution algorithm known as the tree splitting algorithm [57]. All reservation signals involved in the collision resolution algorithm are referred to as packets here. When a collision occurs, a new CRP begins while all packets involved in the collision are split into two subsets with equal probabilities. Any newly generated packets should wait until all packets in the current CRP have been successfully transmitted. In each timeslot, a subset of packets are transmitted. If no collision occurs, then the next subset of packets are transmitted in the next timeslot. If a collision occurs, then these involved packets are split again into two subsets to be transmitted in the next timeslots.

The CRP is characterized by a binary tree. After the ith split to the ith layer, the number of packets in the split subset is [TeX:] $$m_i, \text { for } i=0,1, \cdots, R \text {. }$$ We assume that the tree splitting algorithm is split for at most R layers. Suppose the tree splitting algorithm has been split to the xth layer. The [TeX:] $$m_x$$ packets in the x layer is sent in the current timeslot. We set [TeX:] $$m_i=-1 \text { for } i\gt x \text {. Let } s=\left(m_0, \cdots, m_R\right)$$ denote the state of the tree splitting. The state transition is illustrated in Fig. 5. In addition, the reservation state of each node [TeX:] $$e_i$$ is represented by the layer of the node, i.e., [TeX:] $$e_i=x$$ when the node is at the xth layer of the binary tree. For an idle timeslot with [TeX:] $$m_x=0,$$ the splitting layer decreases by one. The reservation state of all nodes remains unchanged. When a collision occurs with [TeX:] $$m_x \geq 2,$$ then the [TeX:] $$m_x$$ packets are split into two subsets containing [TeX:] $$m_{x+1}^{\prime} \text { and } m_x-m_{x+1}^{\prime}$$ packets with probability given by

(20)
[TeX:] $$\frac{\left(\begin{array}{c} m_x \\ m_{x+1}^{\prime} \end{array}\right)}{2^{m_x}} .$$

Fig. 5.

An illustration of the tree splitting algorithm. There are 4 packets in the CRP, which takes 9 timeslots to address the collision. In each timeslot, the feedback e, 1, and 0 represent a collision, a successful transmission, and an idle timeslots, respectively.
5.png

Each node at the xth layer may be split to the next layer x+1 with probability 1/2. Particularly if a collision occurs when x = R, then the packets are moved out of the current CRP without split. These packets may join the next CRP and the reservation state of them becomes zero. If [TeX:] $$m_x=1,$$ then a packet is successfully transmitted in the current timeslot. The packet at the xth layer can begin its transmission. Thus, the reservation state of the node becomes zero. Therefore, for the reservation state of each node, only those at the xth layer of the binary tree may change the state. For a node at the xth layer, the transition probability of its reservation state from [TeX:] $$e_i=x \text { to } e_i^{\prime}$$ is given by

(21)
[TeX:] $$p_{i, e_i, e_i^{\prime}}= \begin{cases}1, & \text { if } x=R, m_x \geq 2, e_i^{\prime}=0, \\ 1, & \text { if } m_x=1, e_i^{\prime}=e_i \mathbb{1}_{\{d>1\}}, \\ \frac{1}{2}, & \text { if } m_x \geq 2, e_i^{\prime} \in\left\{e_i, e_i+1\right\}, \\ 0, & \text { otherwise. }\end{cases}$$

Hence, in cases where no packet is successfully transmitted, we can depict the transition matrix [TeX:] $$X_0$$ governing the states of the reservation procedure. The matrix’s elements are given by

(22)
[TeX:] $$\begin{aligned} & X_{0, i j}= \\ & \begin{cases}1, & \text { if } m_x=0, m_x^{\prime}=-1, m_k^{\prime}=m_k \text { for } k \neq x, \\ 1, & \text { if } x=R, m_x \geq 2, m_k^{\prime}=m_k-m_x, m_x^{\prime}=-1, \\ \frac{\left(\begin{array}{c} m_x \\ m_{x+1}^{\prime} \end{array}\right)}{2^{m_x}}, & \text { if } x\lt R, m_x \geq 2, m_k^{\prime}=m_k \text { for } k \neq x+1, \\ 0, & \text { otherwise, }\end{cases} \end{aligned}$$

which represents the transition probability of reservation procedure state from [TeX:] $$s_i=\left(m_0, \cdots, m_R\right)$$ to state [TeX:] $$s_j=\left(m_0^{\prime}, \cdots, m_R^{\prime}\right)$$

If [TeX:] $$m_x=1,$$ then a packet is successfully transmitted in the current timeslot and the splitting layer decreases by one. The number of packets [TeX:] $$m_k$$ for layers k < x is reduced by one. Thus, the elements of the transition matrix [TeX:] $$X_1$$ is given by

(23)
[TeX:] $$X_{1, i j}=\left\{\begin{aligned} 1, & \text { if } m_x=1, m_k^{\prime}=-1 \text { for } k \geq x, \\ & m_{\ell}^{\prime}=m_{\ell}-1 \text { for } \ell\lt x, \\ 0, & \text { otherwise. } \end{aligned}\right.$$

Note that the state of the reservation procedure characterizes the whole system while the reservation state of each node characterizes individual node information. Thus, in this case the total amount of the layer number for all nodes are obtained by e or s. The states satisfy that

(24)
[TeX:] $$\sum_{i=1}^x m_i=\sum_{i=1}^M e_i,$$

otherwise the state is not a feasible state in the state space.

At the beginning of a timeslot, a new CRP begins if all packets in the current CRP has been successfully transmitted with [TeX:] $$m_0=-1,$$ otherwise the state s remains unchanged. Therefore, when the number of packets in the reservation queue is n, the transition matrix [TeX:] $$Y_n$$ is given by

(25)
[TeX:] $$Y_{n, i j}= \begin{cases}1, & \text { if } m_0=-1, m_0^{\prime}=n, m_k^{\prime}=-1 \text { for } k\gt 0, \\ 1, & \text { if } m_0 \geq 0, m_k^{\prime}=m_k \text { for } k \geq 0, \\ 0, & \text { otherwise. }\end{cases}$$

According to the definition of the state for the tree splitting algorithm, it satisfies that [TeX:] $$m_i \leq m_j \text { for } i\gt j \text {, and } -1 \leq m_i \leq N.$$ The size of the state space of s is given by [TeX:] $$r_0=\left(\begin{array}{c} N+R+2 \\ R \end{array}\right) .$$ For the state of the whole system, the transition probability in the second step is the same as that under the polling scheme. In the first step, the transition probability of s and [TeX:] $$e_i$$ is given as above. As for state [TeX:] $$t_d$$ and [TeX:] $$q_i$$ in the first step, the next state [TeX:] $$d^{\prime} \text { and } q_i^{\prime} \text { for } i=1, \cdots, M$$ are given by

(26)
[TeX:] $$t_d^{\prime}= \begin{cases}c, & t_d=0, m_x=1, \\ 0, & t_d=0, m_x \neq 1, \\ t_d-1, & t_d\gt 0.\end{cases}$$

(27)
[TeX:] $$q_i^{\prime}= \begin{cases}0, & t_d=1, e_i=x, \\ q_i, & \text { otherwise. }\end{cases}$$

Therefore, we can derive the transition probability matrix P. The steady-state probability is computed by (15). Based on that, the average AoII of all nodes is given by

(28)
[TeX:] $$\bar{\Delta}=\sum_{q_1=0}^N \cdots \sum_{q_M=0}^N \sum_{i=1}^M \frac{q_i}{M} \sum_{t_d=0}^c \sum_{s, e_1, \cdots, e_M} \pi_{s, e_1, \cdots, e_M, q_1, \cdots, q_M, t_d},$$

in which [TeX:] $$\sum_{s, e_1, \cdots, e_M}$$ represents the summation for all state [TeX:] $$s, e_1, \cdots, e_M.$$

V. REDUCED-DIMENSIONAL MARKOV MODEL FOR AVERAGE PEAK AOII MINIMIZATION

In this section, we formulate the Markov chain towards the peak AoII metric. All data packets are transmitted to the receiver without eviction. The peak AoII analysis for the polling scheme with various characteristics has been studied in [36]. The existing methods and results can be adopted in the presented unified framework. Thus, we focus on the random access scheme in this section. In the peak-AoII oriented scenarios, we can formulate the Markov chain based on the total number of nodes in the reservation queue and transmission queue. Thus, the dimension does not increase with the number of nodes in the system. The dimension of the Markov chain is significantly reduced. We consider three multiplexing schemes of the reservation signals and data packets under the unified framework including TD, FD, and XD schemes.

A. Time-Division Multiplexing

We first consider the TD scheme, which is the basic structure for reservation-based random access in slotted systems. We consider the threshold for triggering reservation is K = 1 for the access trigger stage in this section. The transmission constraint is also [TeX:] $$N_{\max }=1.$$ The time axis is split into frames, which contains a fixed number of timeslots, as shown in Fig. 6. The reservation signal and data packets are multiplexed in timeslots of each frame. Specifically, in the first [TeX:] $$Z_1$$ timeslots of the frame, the nodes in the reservation queue send reservations signals. In the next [TeX:] $$c Z_2$$ timeslots of the frame, the nodes in the transmission queue transmit data packets. Thus, at most [TeX:] $$Z_1$$ reservation signals and [TeX:] $$Z_2$$ data packets can be transmitted in each frame. The principal formulation methods for the Markov chain of TD scheme can be found in our previous work [44]. We provide the detailed justification of this part under the unified framework in Appendix A.

Fig. 6.

An illustration of the structure of the frame.
6.png
B. Frequency-Division Multiplexing

We next consider the FD scheme that multiplexing the reservation signal and data packets in the frequency domain, as shown in Fig. 7. Since the reservation signals and data packets are transmitted with separate spectrum, we consider a reservation channel and a data channel allocated with a fixed amount of bandwidth [TeX:] $$w_1 \text { and } w_2$$ respectively. Thus, the reservation signals are transmitted in the reservation channel while the data packets are transmitted in the data channel. For the access trigger stage and transmission stage, we consider [TeX:] $$K=N_{\max }.$$ In other words, each successfully transmitted reservation signal can reserve a time interval of length [TeX:] $$K T_2$$ in the data channel for packet transmission. We denote the length of a reservation timeslot and a data timeslot by [TeX:] $$T_1 \text { and } K T_2 \text {, }$$ respectively.

Fig. 7.

The frequency division allocation scheme.
7.png

For the reservation stage, we consider the simple Aloha algorithm in this section. Each node sends the reservation signal in a timeslot with probability [TeX:] $$\beta_i$$ when there are i reservation signals in the reservation queue. Here, we assume that all nodes know the number of reservation signals in the reservation queue. Thus, the probability that a reservation signal is successfully transmitted in a timeslot when there are i reservation signals in the reservation queue is given by

(29)
[TeX:] $$\gamma_i=i \beta_i\left(1-\beta_i\right)^{i-1}.$$

The optimal [TeX:] $$\beta_i$$ maximizing the successful reservation probability [TeX:] $$\gamma_i$$ is given by [TeX:] $$\beta_i=1 / i \text {. }$$ Moreover, we assume that the number of nodes in the reservation queue is known by the receiver and all nodes through collision level estimation. Specifically, the received energy level at the receiver increases linearly with the number of reservation signals sent by nodes. Thus, the number of nodes sending reservation signals can be estimated based on the received energy level. With the knowledge of the number of nodes in the reservation queue, we can apply more effective access control schemes for the reservation-based random access. Therefore, we consider each node sends the reservation signal with probability [TeX:] $$\beta_i \text {. }$$ The probability that a reservation signal is successfully transmitted is given by

(30)
[TeX:] $$\gamma_i= \begin{cases}\left(1-\frac{1}{i}\right)^{i-1}, & i \geq 2, \\ 1, & i=1, \\ 0, & i=0,\end{cases}$$

where [TeX:] $$\gamma_0=0$$ since no reservation signal is transmitted when there is no reservation signal in the reservation queue. Particularly, for this type of Aloha, the state of collision resolution is the same as the length of the reservation queue since each node sends the reservation signal with a probability determined by the length of the reservation queue. Thus, for simplicity, the state of the tandem queue here is represented by [TeX:] $$\left(q_2, q_1\right)$$ including the length of the reservation queue and the transmission queue.

We define the length of each frame as [TeX:] $$K T_2,$$ which is the time for transmitting a combined packet. We focus on the state of the tandem queue at the beginning of each data timeslot and formulate a Markov chain model. The state transition depends on the packet arrival and reservation process during a data timeslot. If there are y new reservation signals and z successful transmission of reservation signals in a data timeslot, the state transition from state [TeX:] $$\left(q_2, q_1\right)$$ to state [TeX:] $$\left(q_2^{\prime}, q_1^{\prime}\right)$$ is represented by

(31)
[TeX:] $$q_2^{\prime}= \begin{cases}q_2-1+z, & q_2\gt 0, \\ z, & q_2=0,\end{cases}$$

(32)
[TeX:] $$q_1^{\prime}=q_1+y-z.$$

Next, we present the probability distribution for the number of new reservation signals y and the number of successful transmission of reservation signals z. First consider the case when [TeX:] $$x=K T_2 / T_1$$ is an integer. In this case, each frame contains x timeslots. The number of new reservation signals in the ith timeslot of a frame is [TeX:] $$y_i,$$ which follows Poisson distribution with mean [TeX:] $$\lambda T_1 / K$$ since K arrived data packets lead to a new reservation signal with a combined packet. Thus, the probability that there are [TeX:] $$y_1, \cdots, y_x$$ new reservation signals in each timeslots of the frame is given by

(33)
[TeX:] $$g_{y_1, \cdots, y_x}=e^{-\frac{\lambda T_1 x}{K}} \prod_{i=1}^x \frac{\left(\frac{\lambda T_1}{K}\right)^{y_i}}{y_{i} !}.$$

Let [TeX:] $$z_i \in\{0,1\}$$ denote the number of successfully transmitted reservation signals in the ith timeslot of the frame. The probability of [TeX:] $$z_i=1 \text { and } z_i=0 \text { are } \gamma_k \text { or } 1-\gamma_k,$$ respectively, when the length of the reservation queue is k. Given that the length of the reservation queue is [TeX:] $$q_1$$ at the beginning of the frame, the length of the reservation queue at the ith timeslot of the frame is given by [TeX:] $$k_i=q_1+\sum_{j=1}^{i-1}\left(y_j-z_j\right) .$$ Thus, we can derive the probability that there are [TeX:] $$z_1, \cdots, z_x$$ successfully transmitted reservation signals in each timeslot of the frame conditioned on [TeX:] $$q_1 \text { and } y_1, \cdots, y_x$$, given by

(34)
[TeX:] $$f_{z_1, \cdots, z_x \mid q_1, y_1, \cdots, y_x}=\prod_{i=1}^x\left[z_i \gamma_{k_i}+\left(1-z_i\right)\left(1-\gamma_{k_i}\right)\right].$$

Next, we consider general cases when [TeX:] $$x=K T_2 / T_1$$ is a non-integer. A frame may contains [TeX:] $$\left\lfloor K T_2 / T_1\right\rfloor \text { or }\left\lfloor K T_2 / T_1\right\rfloor+1$$ timeslots. We assume that the number of timeslots within each frame is independent. Specifically, each frame contains [TeX:] $$\left\lfloor K T_2 / T_1\right\rfloor$$ timeslots with probability

(35)
[TeX:] $$\sigma=1-\frac{K T_2}{T_1}+\left\lfloor\frac{K T_2}{T_1}\right\rfloor .$$

Each frame contains [TeX:] $$\left\lfloor K T_2 / T_1\right\rfloor+1$$ timeslots with probability [TeX:] $$1-\sigma$$. Let [TeX:] $$\underline{x}=\left\lfloor K T_2 / T_1\right\rfloor \text { and } \bar{x}=\left\lfloor K T_2 / T_1\right\rfloor+1 \text {. }$$ When the length of the reservation queue is [TeX:] $$q_1$$, we can derive the probability that the total number successfully transmitted reservation signals is [TeX:] $$z=\sum_{i=1}^x z_i$$ and the total number of new reservation signals is [TeX:] $$y=\sum_{i=1}^x y_i$$ in a frame, given by

(36)
[TeX:] $$\begin{aligned} & h_{y, z \mid q_1} \\ & =(1-\sigma) \sum_{\sum_{i=1}^{\bar{x}} y_i=y} g_{y_1, \cdots, y_{\bar{x}}} \sum_{\sum_{i=1}^{\bar{x}} z_i=z} f_{z_1, \cdots, z_{\bar{x}} \mid q_1, y_1, \cdots, y_{\bar{x}}} \\ & \quad+\sigma \sum_{\sum_{i=1}^{\underline{x}} y_i=y} g_{y_1, \cdots, y_{\underline{x}}} \sum_{\sum_{i=1}^{\underline{x}} z_i=z} f_{z_1, \cdots, z_{\underline{x}} \mid q_1, y_1, \cdots, y_{\underline{x}} .} . \end{aligned}$$

In (36), we use the notation [TeX:] $$\sum_{\sum_{i=1}^{\underline{x}} y_i=y} g_{y_1, \cdots, y_{\underline{x}}}$$ represents the summation of g for all [TeX:] $$y_1, \cdots, y_{\underline{x}}$$ in the set [TeX:] $$\left\{y_1, \cdots, y_{\underline{x}} \mid \sum_{i=1}^{\underline{x}} y_i=y\right\},$$ which is of space size [TeX:] $$\left(\begin{array}{c} y+\underline{x}+1 \\ y \end{array}\right).$$ The representation is similar for the four summation notations in (36). For simplicity, let [TeX:] $$(x)^{+}$$ represent [TeX:] $$\max \{x, 0\}.$$ When the state transits from [TeX:] $$\left(q_2, q_1\right) \text { to }\left(q_2^{\prime}, q_1^{\prime}\right),$$ the values y and z are obtained according to (31), given by [TeX:] $$y=q_1^{\prime}+q_2^{\prime}-q_1-\left(q_2-1\right)^{+}$$ and [TeX:] $$z=q_2^{\prime}-\left(q_2-1\right)^{+}.$$ Therefore, the transition probabilities are given by

(37)
[TeX:] $$p_{\left(q_2, q_1\right),\left(q_2^{\prime}, q_1^{\prime}\right)}=h_{q_1^{\prime}+q_2^{\prime}-q_1-\left(q_2-1\right)^{+}, q_2^{\prime}-\left(q_2-1\right)+\mid q_1}.$$

Moreover, the state satisfies that [TeX:] $$q_2^{\prime} \leq N_2 \text { and } q_1^{\prime} \leq N_1$$ due to the constraint of queue length for the tandem queue. If [TeX:] $$q_2^{\prime}\gt N_2 \text { or } q_1^{\prime}\gt N_1,$$ we just drop those data packets exceeding N in the reservation queue and the transmission queue to obtain a finite state space, then the state transits to [TeX:] $$q_2^{\prime}=N_2 \text { or } q_1^{\prime}=N_1$$ at the beginning of the next timeslot. The transition probabilities under the constraint of queue length N are given by

(38)
[TeX:] $$p_{\left(q_2, q_1\right),\left(q_2^{\prime}, q_1^{\prime}\right)}^{\prime}= \begin{cases}p_{\left(q_2, q_1\right),\left(q_2^{\prime}, q_1^{\prime}\right)}, & q_1^{\prime}\lt N_1, q_2^{\prime}\lt N_2 \\ \sum_{j=N_1}^{\infty} p_{\left(q_2, q_1\right),\left(q_2^{\prime}, j\right)}, & q_1^{\prime}=N_1, q_2^{\prime}\lt N_2 \\ \sum_{i=N_2}^{\infty} p_{\left(q_2, q_1\right),\left(i, q_1^{\prime}\right)}, & q_1^{\prime}\lt N_1, q_2^{\prime}=N_2 \\ \sum_{i=N_2}^{\infty} \sum_{j=N_1}^{\infty} p_{\left(q_2, q_1\right),(i, j)}, & q_1^{\prime}=N_1, q_2^{\prime}=N_2\end{cases}$$

With elements given by (38), we can obtain the transition matrix P of order [TeX:] $$r_3=\left(N_1+1\right)\left(N_2+1\right) \text {. }$$ Similar to the TD scheme, we can obtain the steady-state probabilities π of all states, which satisfy

(39)
[TeX:] $$\left\{\begin{array}{l} \boldsymbol{\pi} P=\boldsymbol{\pi}, \\ \boldsymbol{\pi} \mathbf{1}_{r_3}=1. \end{array}\right.$$

Then we can obtain the steady-state probabilities π by

(40)
[TeX:] $$\boldsymbol{\pi}=\mathbf{1}_{r_3}^{\mathrm{T}}\left(P-I_{r_3}+\mathbf{1}_{r_3 \times r_3}\right)^{-1}.$$

The steady-state probability for state [TeX:] $$\left(q_2, q_1\right)$$ is denoted by [TeX:] $$\pi_{q_2, q_1}$$. We can obtain the average length of the tandem queue given by

(41)
[TeX:] $$\bar{L}=\sum_{q_1=0}^{N_1} \sum_{q_2=0}^{N_2}\left(q_1+q_2\right) \pi_{q_2, q_1} .$$

Moreover, in addition to the peak AoII caused in the transmission queue, there exists an extra time elapse from the successful transmission of a reservation signal to the beginning of the next frame since we focus on the state at the beginning of each frame. This time elapse ranges from zero to [TeX:] $$KT_2$$. Thus, this time elapse is approximated by [TeX:] $$KT_2/2$$, which increases the peak AoII. The arrival rate of the combined packet is λ/K. Thus, the average peak AoII for the tandem queue is given by

(42)
[TeX:] $$\ell=\frac{K T_2}{2}+\frac{K}{\lambda} \sum_{q_1=0}^{N_1} \sum_{q_2=0}^{N_2}\left(q_1+q_2\right) \pi_{q_2, q_1} .$$

Intuitively, if more bandwidth are allocated for the reservation channel or the data channel, then the average peak AoII for the reservation queue or transmission queue is reduced. However, the total bandwidth for the two channels is constrained. To minimize the average peak AoII for the tandem queue, we optimize the bandwidth [TeX:] $$w_1 \text { and } w_2$$ for the reservation channel and data channel. Without loss of generality, we consider the total bandwidth constraint is normalized as [TeX:] $$w_1 \text { and } w_2 = 1.$$

In order to assure the finite average peak AoII, we should stabilize the tandem queue. To achieve this goal, the transmission rate of the reservation channel and the data channel should be greater than the packet arrival rate. In the following, we provide the condition for finite peak AoII. First, for the reservation channel, the maximal transmission rate is given by

(43)
[TeX:] $$\lim _{i \rightarrow \infty} q_i=e^{-1} \text {, }$$

which means that at most [TeX:] $$e^{-1}$$ reservation signals on average can be successfully transmitted in the reservation channel. The transmission rate of the reservation channel is given by [TeX:] $$e^{-1} w_1$$. The arrival rate of the reservation signals to the reservation queue is given by [TeX:] $$\lambda / K.$$. Thus, we have [TeX:] $$e^{-1} w_1\gt \lambda / K.$$. Second, for the data channel, the maximal transmission rate is given by [TeX:] $$w_2 = 1-w_1$$. The packet arrival rate is λc since the size of each packet is c. It requires that [TeX:] $$\lambda c\lt 1-w_1$$. Therefore, the bandwidth [TeX:] $$w_1$$ is constrained by

(44)
[TeX:] $$\frac{\lambda e}{K}\lt w_1\lt 1-\lambda c.$$

Furthermore, we can derive the feasible range of arrival rate λ to attain finite peak AoII with a feasible [TeX:] $$w_1$$. Thus, the inequality [TeX:] $$\lambda e / K\lt 1-\lambda c$$ should be satisfied. In other words, we have the following upper bound for λ given by

(45)
[TeX:] $$\lambda\lt \frac{K}{e+K c}.$$

When (45) holds, the tandem queue is stable. In this case, we can obtain the average peak AoII from (42). Based on (42), we can optimize the bandwidth [TeX:] $$w_1 \text{ and } w_2$$. that minimizes the average peak AoII under the constraint [TeX:] $$w_1+w_2=1.$$ To find the optimal bandwidth [TeX:] $$w_1,$$ we represent the average peak AoII as a function of [TeX:] $$w_1,$$ denoted by [TeX:] $$\ell\left(w_1\right) .$$ Specifically, we can obtain the first derivative of [TeX:] $$\ell\left(w_1\right)$$ with respect to [TeX:] $$w_1$$ by

(46)
[TeX:] $$\frac{\mathrm{d} \ell\left(w_1\right)}{\mathrm{d} w_1}=\frac{K c}{2\left(1-w_1\right)^2}+\frac{K}{\lambda} \sum_{q_1=0}^{N_1} \sum_{q_2=0}^{N_2}\left(q_1+q_2\right) \frac{\mathrm{d} \pi_{q_2, q_1}\left(w_1\right)}{\mathrm{d} w_1}.$$

Let [TeX:] $$\left.Q\left(w_1\right)=P-I_{(} r_3\right)+\mathbf{1}_{r_3 \times r_3}.$$ Based on (40), the first derivative of π with respect to [TeX:] $$w_1$$ in (46) is given by

(47)
[TeX:] $$\begin{aligned} \frac{\mathrm{d} \boldsymbol{\pi}\left(w_1\right)}{\mathrm{d} w_1} & =\mathbf{1}_{r_3}^{\mathrm{T}} \frac{\mathrm{d} Q\left(w_1\right)^{-1}}{\mathrm{~d} w_1} \\ & =-\mathbf{1}_{r_3}^{\mathrm{T}} Q\left(w_1\right)^{-1} \frac{\mathrm{d} Q\left(w_1\right)}{\mathrm{d} w_1} Q\left(w_1\right)^{-1}, \end{aligned}$$

in which [TeX:] $$\frac{\mathrm{d} Q\left(w_1\right)}{\mathrm{d} w_1}$$ is the first derivative of [TeX:] $$Q\left(w_1\right)$$ with respect to [TeX:] $$w_1$$. Each element of [TeX:] $$\frac{\mathrm{d} Q\left(w_1\right)}{\mathrm{d} w_1}$$ is determined by [TeX:] $$\frac{\mathrm{d} h_{y, z \mid q_1}\left(w_1\right)}{\mathrm{d} w_1}.$$ First, we derive the first derivative of [TeX:] $$g_{y_1, \cdots, y_x}\left(w_1\right)$$ with respect to [TeX:] $$w_1.$$ Let [TeX:] $$\bar{\lambda}=\lambda /\left(K w_1\right)$$ denote the average number of new reservation signals arriving at the reservation queue per timeslot. We can obtain that

(48)
[TeX:] $$\frac{\mathrm{d} g_{y_1, \cdots, y_x}\left(w_1\right)}{\mathrm{d} w_1}=\frac{\bar{\lambda}^y e^{-\bar{\lambda}}}{w_1 \prod_{i=1}^x y_{i} !}(\bar{\lambda} x-y),$$

in which y is the number of new reservation signals given by [TeX:] $$y=\sum_{i=1}^x y_i.$$ Next, we can derive the first derivative of σ. Although σ is discontinuous with respect to [TeX:] $$w_1$$, we can observe that [TeX:] $$h_{y, z \mid q_1}\left(w_1\right)$$ is continuous with respect to [TeX:] $$w_1$$. Thus, we can use left derivative or right derivative for discontinuous points since the left derivative and right derivative of σ are equal. The derivative of σ is denoted by [TeX:] $$-K c /\left(1-w_1\right)^2$$. Therefore, we can derive the first derivative of [TeX:] $$h_{y, z \mid q_1}\left(w_1\right)$$ with respect to [TeX:] $$w_1$$ given by (49). Thus, we can compute all elements of [TeX:] $$\frac{\mathrm{d} Q\left(w_1\right)}{\mathrm{d} w_1}$$ and [TeX:] $$\frac{\mathrm{d} \ell\left(w_1\right)}{\mathrm{d} w_1} .$$

(49)
[TeX:] $$\begin{aligned} & \frac{\mathrm{d} h_{y, z \mid q_1}\left(w_1\right)}{\mathrm{d} w_1}= \\ & (1-\sigma) \sum_{\sum_{i=1}^{\bar{x}} y_i=y} \frac{\mathrm{d} g_{y_1, \cdots, y_{\bar{x}}}\left(w_1\right)}{\mathrm{d} w_1} \sum_{\sum_{i=1}^{\bar{x}} z_i=z} f_{z_1, \cdots, z_{\bar{x}} \mid q_1, y_1, \cdots, y_{\bar{x}}}+\sigma \sum_{\sum_{i=1}^{\underline{x}} y_i=y} \frac{\mathrm{d} g_{y_1, \cdots, y_{\underline{x}}}\left(w_1\right)}{\mathrm{d} w_1} \sum_{\sum_{i=1}^{\underline{x}} z_i=z} f_{z_1, \cdots, z_{\underline{x}} \mid q_1, y_1, \cdots, y_{\underline{x}}} \\ & -\frac{K c}{\left(1-w_1\right)^2} \sum_{\sum_{i=1}^{\underline{x}} y_i=y} g_{y_1, \cdots, y_{\underline{x}}}\left(w_1\right) \sum_{\sum_{i=1}^{\underline{x}} z_i=z} f_{z_1, \cdots, z_{\underline{x}} \mid q_1, y_1, \cdots, y_{\underline{x}}}+\frac{K c}{\left(1-w_1\right)^2} \sum_{\sum_{i=1}^{\bar{x}} y_i=y} g_{y_1, \cdots, y_{\bar{x}}}\left(w_1\right) \sum_{\sum_{i=1}^{\bar{x}} z_i=z} f_{z_1, \cdots, z_{\bar{x}} \mid q_1, y_1, \cdots, y_{\bar{x}}} . \end{aligned}$$

To find the optimal bandwidth [TeX:] $$w_1$$ that minimizes the average peak AoII [TeX:] $$\ell,$$ we apply a binary searching algorithm in the interval [TeX:] $$(\lambda e / K, 1-\lambda c).$$ Specifically, the binary searching algorithm is described as follows. Step 0, let [TeX:] $$w_{1, 1}=\lambda e / K$$ and [TeX:] $$w_{1, 2}=1-\lambda c.$$ Step 1, Then find the point [TeX:] $$w_{1, 0}=\frac{1}{2}\left(w_{1,1}+w_{1,2}\right)$$ and compute [TeX:] $$\left.\frac{\mathrm{d} \ell\left(w_1\right)}{\mathrm{d} w_1}\right|_{w_1=w_{1,0}}$$ at point [TeX:] $$w_{1, 0}.$$ Step 2, If [TeX:] $$\left.\frac{\mathrm{d} \ell\left(w_1\right)}{\mathrm{d} w_1}\right|_{w_1=w_{1,0}}\lt 0,$$ then let [TeX:] $$w_{1,1}=w_{1,0},$$ otherwise let [TeX:] $$w_{1,2}=w 1,0$$ Step 3, If [TeX:] $$w_{1,2}-w_{1,1}\lt\epsilon$$ for a given [TeX:] $$\epsilon$$, then we can obtain the optimal bandwidth [TeX:] $$w_1^*=\frac{1}{2}\left(w_{1,1}+w_{1,2}\right),$$ otherwise go back to step 1.

C. Dynamic Bandwidth Allocation

Both the TD and FD schemes presented in Sections III and IV are static multiplexing schemes, as they maintain a fixed structure for multiplexing reservation signals and data packets, regardless of the tandem queue’s current state. To further improve the bandwidth efficiency, we present the XD scheme in this section. Specifically, the bandwidth [TeX:] $$w_1$$ for the reservation signals and [TeX:] $$w_2$$ for the data packets are modified dynamically based on the length of the reservation queue and the transmission queue. For the access trigger stage, we consider K = 1, while we consider [TeX:] $$N_{\max }=\infty$$ for the transmission stage. Thus, after a reservation signal is successfully transmitted by a node, the node can transmit all data packets in the local buffer when the node begins to transmit. The reservation stage applies the Aloha algorithm. We consider [TeX:] $$N_1=M \text { and } 0 \leq N_2 \leq M$$ so that each node can trigger a reservation with one data packet in the local buffer. Further reservation signals halt when [TeX:] $$N_2$$ nodes are in the transmission queue.

The length of each timeslot is set to be 1. The bandwidth can be [TeX:] $$w_1 \gt 0 \text{ or } w_1=0.$$ If [TeX:] $$w_1 \gt 0,$$ each reservation signal is sent within [TeX:] $$1/w_1$$ timeslots, which is referred to as the reservation interval. For simplicity, we can modify the bandwidth [TeX:] $$w_1$$ at the beginning of each timeslot. Particularly, when we set [TeX:] $$w_1=0,$$ then all bandwidth are allocated for the data packets and no reservation signal is transmitted. Let [TeX:] $$t_d$$ denote the index of timeslot within a reservation interval. Since each node may have different numbers of data packets in the local buffer, we use [TeX:] $$q_1 \text { and } q_2$$ to denote the number of nodes in the reservation queue and in the transmission queue, respectively. We use [TeX:] $$q_0$$ to denote the total number of data packets in all nodes except for those packets in the node at the head of the transmission queue. We use [TeX:] $$q_3$$ to denote the number of data packets in the node at the head of the data queue. In addition, let s denote the state of the collision resolution algorithm. Thus, the whole state of the tandem queue is denoted by [TeX:] $$S=\left(t_d, q_0, q_1, q_2, q_3, s\right).$$

Next, we present the state transition probability for a given bandwidth. The transition is considered in two steps. First, nodes in the reservation queue and at the head of transmission queue can transmit in the current timeslot. Second, the timeslot’s end can see data packet arrivals at nodes, and transmission queue head changes due to node completion. Specifically, in the first step, only the nodes at the head of transmission queue can transmit. When [TeX:] $$w_1=0$$, at most [TeX:] $$\frac{1}{c}$$ data packets can be transmitted in a timeslot. Thus, the number of data packets at the head of the transmission queue transits from [TeX:] $$q_3 \text { to } q_3^{\prime}$$ given by

(50)
[TeX:] $$q_3^{\prime}=\left(q_3-\frac{1}{c}\right)^{+}.$$

The other states do not change until the end of the timeslot. When [TeX:] $$w_1 \gt 0$$, both the reservation signals and data packets are allocated with bandwidth for transmission. Since a reservation interval lasts for [TeX:] $$1 / w_1$$, timeslots, A reservation interval spans [TeX:] $$1 / w_1$$ timeslots, during which bandwidth cannot be altered. The index [TeX:] $$t_d$$ increases from one to [TeX:] $$1 / w_1$$ to denote the progress of a reservation interval. When [TeX:] $$t_d \lt 1 / w_1$$, the index [TeX:] $$t_d$$ increases by one while [TeX:] $$q_1, q_2 \text {, and } s$$ does not change in the middle of a reservation interval. When [TeX:] $$t_d = 1 / w_1$$, a reservation interval is completed and the index changes to [TeX:] $$t_d^{\prime}=1$$. The state of the resolution algorithm s transits based on the transition probability matrix of the collision resolution algorithm [TeX:] $$X_0, X_1, \text { and } Y_n$$. Specifically, these states transit from [TeX:] $$\left(q_1, q_2, s_i\right) \text { to }\left(q_1, q_2, s_j\right)$$ with probability [TeX:] $$X_{0, i j},$$ or to [TeX:] $$\left(q_1-1, q_2+1, s_j\right)$$ with probability [TeX:] $$X_{1, i j},$$. For the transmission queue, at most [TeX:] $$w_2 / c$$ data packets can be transmitted by the node at the head of the transmission queue. Thus, the state [TeX:] $$q_3$$ transits to [TeX:] $$q_3^{\prime}=\left(q_3-w_2 / c\right)^{+}$$. Therefore, all state transition from state [TeX:] $$S=\left(t_d, q_0, q_1, q_2, q_3, s\right)$$ to state [TeX:] $$S^{\prime}=\left(t_d^{\prime}, q_0^{\prime}, q_1^{\prime}, q_2^{\prime}, q_3^{\prime}, s^{\prime}\right)$$ in the first step is given by

(51)
[TeX:] $$\begin{aligned} & P_{1, S, S^{\prime}, w_1} \\ & = \begin{cases}1, & w_1=0, \\ \sum_{k=1}^{r_0} X_{0, i k} Y_{q_1, k j}, & t_d=\frac{1}{w_1}, t_d^{\prime}=1, s=s_i, s^{\prime}=s_j, \\ \sum_{k=1}^{r_0} X_{1, i k} Y_{q_1, k j}, & t_d=\frac{1}{w_1}, t_d^{\prime}=1, q_2^{\prime}=q_2+1, \\ & q_1^{\prime}=q_1-1, s=s_i, s^{\prime}=s_j, \\ 1, & w_1\gt 0, t_d\lt\frac{1}{w_1}, t_d^{\prime}=t_d+1, \\ 0, & \text { otherwise. }\end{cases} \end{aligned}$$

All but the last case in (51) satisfies the conditions that [TeX:] $$q_3^{\prime}=\left(q_3-1-w_1 / c\right)^{+}$$ and other states remain unchanged if not specified.

The second step does not depend on the bandwidth. In the second step of transition, the state transits from [TeX:] $$S^{\prime}=\left(t_d^{\prime}, q_0^{\prime}, q_1^{\prime}, q_2^{\prime}, q_3^{\prime}, s^{\prime}\right)$$ to state [TeX:] $$S^{\prime \prime}=\left(t_d^{\prime \prime}, q_0^{\prime \prime}, q_1^{\prime \prime}, q_2^{\prime \prime}, q_3^{\prime \prime}, s^{\prime \prime}\right).$$ If the number of data packets in the node at the head of the transmission queue [TeX:] $$q_3^{\prime}$$ is greater than zero, then the state [TeX:] $$q_2^{\prime}$$ and [TeX:] $$q_3^{\prime}$$ does not change. However, if [TeX:] $$q_3^{\prime}=0,$$ then data packets of the next node in the transmission queue moves to the head starting transmission in the next timeslot. Since the packet arrivals are independent among all nodes, we assume that each arrived packet is regarded to be hold by all nodes with equal probability for simplicity. Thus, when there are [TeX:] $$q_0^{\prime}$$ packets in total and [TeX:] $$q_1^{\prime}+q_2^{\prime}$$ nodes in the tandem queue, if [TeX:] $$q_2^{\prime}\gt 0,$$ then the probability that the next node with i data packets moves to the head of the transmission queue is given by

(52)
[TeX:] $$\begin{aligned} u_{1, q_0^{\prime}, q_1^{\prime}, q_2^{\prime}, i}= & \left(\begin{array}{c} q_0^{\prime}-q_1^{\prime}-q_2^{\prime} \\ i-1 \end{array}\right)\left(\frac{1}{q_1^{\prime}+q_2^{\prime}}\right)^{i-1} \\ & \times\left(1-\frac{1}{q_1^{\prime}+q_2^{\prime}}\right)^{q_0^{\prime}-q_1^{\prime}-q_2^{\prime}-i} . \end{aligned}}$$

If [TeX:] $$q_2^{\prime}= 0,$$ then there are no more packets in the transmission queue. In this case, [TeX:] $$q_3^{\prime \prime}=0.$$ Since the next node in the transmission queue starts transmission in the next timeslot, we can subtract those packets from the total number of packets remained in the tandem queue. The state [TeX:] $$q_0^{\prime}$$ decreases by i and [TeX:] $$q_2^{\prime}$$ decreases by one becoming [TeX:] $$q_2^{\prime \prime}=q_2^{\prime}-1$$.

Moreover, new packets may arrive at nodes. The total number of data packets at all nodes [TeX:] $$q_0^{\prime}$$ increases by the number of newly arrived packets. According to the Poisson arrival, there are y newly arrived packets with probability [TeX:] $$a_y.$$ Each packet arrive at each node with equal probability. If a packet arrives at a node that does not have packets in the buffer currently, then the node enters the reservation queue to send reservation signals. The state [TeX:] $$q_1^{\prime}$$ transits to [TeX:] $$q_1^{\prime}+j$$ if there are j new nodes entering the reservation queue. Since there are M nodes in total with [TeX:] $$q_1^{\prime}+q_2^{\prime}$$ nodes that already have at least one packets in the buffer, the probability that there are j new reservation signals is given by

(53)
[TeX:] $$u_{2, M, q_1^{\prime}, q_2^{\prime}, y, j}=\frac{\left(\begin{array}{c} M-q_1^{\prime}-q_2^{\prime}+j-1 \\ M-q_1^{\prime}-q_2^{\prime}-1 \end{array}\right)\left(\begin{array}{c} q_1^{\prime}+q_2^{\prime}+y-j-1 \\ q_1^{\prime}+q_2^{\prime}-1 \end{array}\right)}{\left(\begin{array}{c} M+y-1 \\ M-1 \end{array}\right)}.$$

In the second step, state [TeX:] $$t_d$$ and s does not change. Therefore, the state transition probability from state [TeX:] $$S^{\prime}=\left(t_d^{\prime}, q_0^{\prime}, q_1^{\prime}, q_2^{\prime}, q_3^{\prime}, s^{\prime}\right)$$ to state [TeX:] $$S^{\prime \prime}=\left(t_d^{\prime \prime}, q_0^{\prime \prime}, q_1^{\prime \prime}, q_2^{\prime \prime}, q_3^{\prime \prime}, s^{\prime \prime}\right)$$ is given by (54).

(54)
[TeX:] $$P_{2, S^{\prime}, S^{\prime \prime}}= \begin{cases}a_y u_{1, q_0^{\prime}, q_1^{\prime}, q_2^{\prime}, i} u_{2, M, q_1^{\prime}, q_2^{\prime}, y, j}, & q_3^{\prime}=0, q_2^{\prime}\gt 0, q_3^{\prime \prime}=i, q_0^{\prime \prime}=q_0^{\prime}+y+i, q_1^{\prime \prime}=q_1^{\prime}+j, q_2^{\prime \prime}=q_2^{\prime}-1, \\ a_y u_{2, M, q_1^{\prime}, q_2^{\prime}, y, j}, & q_2^{\prime}=0, q_0^{\prime \prime}=q_0^{\prime}+y, q_1^{\prime \prime}=q_1^{\prime}+j, \\ a_y u_{2, M, q_1^{\prime}, q_2^{\prime}, y, j}, & q_3^{\prime}\gt 0, q_0^{\prime \prime}=q_0^{\prime}+y, q_1^{\prime \prime}=q_1^{\prime}+j, \\ 0, & \text { otherwise. }\end{cases}$$

The overall transition probability from state S at the beginning of a timeslot to state [TeX:] $$S^{\prime \prime}$$ at the beginning of the next timeslot is obtained by multiplying the transition probability of two steps given in (51) and (54). We next show that for each pair of states S and [TeX:] $$S^{\prime \prime}$$, there exists at most one intermediate state [TeX:] $$S^{\prime}$$. In other words, [TeX:] $$S^{\prime}$$ is determined by S and [TeX:] $$S^{\prime \prime}$$. Specifically, state [TeX:] $$S^{\prime}$$ satisfies that [TeX:] $$t_d^{\prime}=t_d^{\prime \prime}, q_0^{\prime}=q_0$$, [TeX:] $$q_3^{\prime}=\left(q_3-1-w_1 / c\right)^{+}, s^{\prime}=s^{\prime \prime}.$$ If [TeX:] $$S^{\prime \prime}=0$$, then [TeX:] $$S^{\prime}=0$$ since there is no nodes in the transmission queue. If [TeX:] $$q_3^{\prime \prime}\gt 0$$ and [TeX:] $$q_3^{\prime}= 0$$, then [TeX:] $$q_2^{\prime}=q_2^{\prime \prime}+1$$ since the node at the head of the transmission queue finishes transmission in the current timeslot. If [TeX:] $$q_3^{\prime \prime}\gt 0$$ and [TeX:] $$q_3^{\prime}=q_3^{\prime \prime},$$ then [TeX:] $$q_2^{\prime}=q_2^{\prime \prime}.$$ For [TeX:] $$q_1^{\prime},$$ it satisfies that [TeX:] $$q_1^{\prime}=q_1+q_2-q_2^{\prime}.$$ Therefore, we can obtain a unique [TeX:] $$S^{\prime}$$ as the intermediate state between two states S and [TeX:] $$S^{\prime \prime}$$ in the consecutive timeslots. The transition probability from state S to [TeX:] $$S^{\prime \prime}$$ is given by

(55)
[TeX:] $$P_{3, S, S^{\prime \prime}, w_1}=P_{1, S, S^{\prime}, w_1} P_{2, S^{\prime}, S^{\prime \prime}}.$$

Our goal is to minimize the average peak AoII, which is equivalent to minimizing the average queue length of the tandem queue according to (5). Therefore, the cost function for each timeslot is the total number of data packets in the tandem queue. Specifically, we define the cost function as [TeX:] $$C_{S, w_1}$$ given by

(56)
[TeX:] $$C_{S, w_1}=q_0+\left(q_3-\frac{1-w_1}{c}\right)^{+},$$

which represents the number of packets left in the tandem queue after the transmission in the current timeslot. The average cost per timeslot is equal to the average length [TeX:] $$\bar{L}$$ of the tandem queue.

We consider that the available actions are [TeX:] $$1 / i \text { for } i=1, \cdots, i_{\max }$$ to make the reservation interval contain i timeslots. The action space [TeX:] $$\mathcal{A}_S$$ depends on the state S. Since we modify the bandwidth [TeX:] $$w_1$$ only at the beginning of each reservation interval, the current bandwidth is also included in the system state. Thus, the state is given by [TeX:] $$\left(t_d, q_0, q_1, q_2, q_3, s, w_1\right),$$ in which [TeX:] $$w_1$$ is only used to constrain the available action in the current timeslot when [TeX:] $$t_d\gt 1.$$ We can formulate an infinite horizon MDP for the dynamic bandwidth scheme with the state space [TeX:] $$\mathcal{S}$$ of states [TeX:] $$\left(t_d, q_0, q_1, q_2, q_3, s, w_1\right),$$ action space [TeX:] $$\mathcal{A}_S$$, transition probabilities [TeX:] $$P_{3, S, S^{\prime}, w_1}$$, and the cost function [TeX:] $$C_{S, w_1}$$. Let v(S) denote the value function of state S for [TeX:] $$S \in \mathcal{S}$$. The optimal value function for the MDP satisfies the optimality equation, which is also known as Bellman equation, given by

(57)
[TeX:] $$\bar{L}+v(S)=\min _{w_1 \in \mathcal{A}}\left\{C_{S, w_1}+\sum_{S^{\prime} \in \mathcal{S}} P_{3, S, S^{\prime}, w_1} v\left(S^{\prime}\right)\right\}.$$

By solving the optimality equation (57), we can obtain the optimal value function, which gives the optimal dynamic bandwidth allocation policy minimizing the average queue length.

We apply the value iteration algorithm to solve the MDP [59, Chapter 8]. The optimal value function v(S) is computed iteratively, as shown in Algorithm 2. Through iteration computation of [TeX:] $$v_i(S)$$ for all states [TeX:] $$S \in \mathcal{S}$$, the value function converges to the optimal one. The stopping rule of the iteration is given by [TeX:] $$\varphi\left(v_i-v_{i-1}\right)\lt \varepsilon$$, in which [TeX:] $$v_i$$ represents all the values [TeX:] $$v_iS$$ for state [TeX:] $$S \in \mathcal{S} \text{ and } \varphi$$ is defined as

(58)
[TeX:] $$\begin{aligned} \varphi\left(v_i-v_{i-1}\right)= & \max _{S \in \mathcal{S}}\left\{v_i(S)-v_{i-1}(S)\right\} \\ & -\min _{S \in \mathcal{S}}\left\{v_i(S)-v_{i-1}(S)\right\}. \end{aligned}$$

Algorithm 2
Value iteration algorithm
pseudo2.png

Based on the optimal value function [TeX:] $$v_i$$ after the iteration converges, we can obtain an [TeX:] $$\varepsilon \text {-optimal }$$ dynamic bandwidth allocation policy, given by

(59)
[TeX:] $$w_1(S)=\underset{w_1 \in \mathcal{A}_S}{\arg \min }\left\{C_{S, w_1}+\sum_{S^{\prime} \in \mathcal{S}} P_{3, S, S^{\prime}, w_1} v_i\left(S^{\prime}\right)\right\} .$$

This policy is [TeX:] $$\varepsilon \text {-optimal }$$ because the gap of average cost between the policy and the theoretically optimal one is less than [TeX:] $$\epsilon \text {. }$$ Moreover, we can obtain an approximation of the average queue length attained by the dynamic bandwidth allocation policy [TeX:] $$w_1(S)$$ given in (59), given by

(60)
[TeX:] $$\bar{L}_{\varepsilon}=\frac{1}{2}\left[\max _{S \in \mathcal{S}}\left\{v_i(S)-v_{i-1}(S)\right\}+\min _{S \in \mathcal{S}}\left\{v_i(S)-v_{i-1}(S)\right\}\right] .$$

VI. MEAN-FIELD APPROXIMATIONS FOR MASSIVE USERS

As the number of nodes in the system increases, the dimension of the presented framework can be prohibitively large. To reduce the computational complexity, we formulate the Markov chain model for a single node based on mean-field approximations. According to the multiple access framework, a node cannot successfully send a reservation signal if other nodes are sending reservation signals or transmitting data packets. Such impact of all nodes’ reservation and transmission on a single node can be approximated by a simple statistical effect when the number of nodes M is large enough. The dependence among users vanishes as [TeX:] $$M \rightarrow \infty$$. Specifically, we assume that each time the node sends a reservation signal, the reservation signal is successfully transmitted with a constant probability that is independent with the states of other nodes. A fixed-point iteration-based method is presented to obtain the steady-state probability as well as the average AoII and peak AoII.

We study the mean-field approximation for dynamic bandwidth allocation scheme in this section. The mean-field approximations can also be applied to approximate the average AoII and peak AoII for other schemes. We focus on a single node and denote the state of the node by [TeX:] $$\left(q, t_d\right)$$ when the node has q data packets in the local buffer and the current timeslot is the [TeX:] $$t_d \text {th }$$ timeslot for transmission of the current data packet. When [TeX:] $$t_d =0,$$ it means that the node has not successfully transmitted the reservation signal. Consider that the constraint of the local buffer size is N, thus the node has at most N data packets. The finite buffer size N enables the formulation of Markov chain with finite state space. Note that when the constraint N is large enough, the packet loss rate is approximately zero. The state space is given by

(61)
[TeX:] $$\mathcal{S}=\{(0,0)\} \cup\left\{\left(q, t_d\right) \mid 1 \leq q \leq N, 0 \leq t_d \leq c\right\}.$$

The state space size is [TeX:] $$r_4=N(c+1)+1$$. Let π denote the steady-state probability of all states, while [TeX:] $$\pi_{q, t_d}$$ denote the steady-state probability of state [TeX:] $$\left(q, t_d\right)$$.

Consider [TeX:] $$N_2=0$$, thus the node begins transmission of data packets right after the node successfully sends a reservation signal. Specifically, when the state of the node is (q, 0), then the node may successfully send a reservation signal with a probability, which we assume to be identical and independent in all timeslots. Then the node enters state (q, 1) and the state changes as [TeX:] $$(q, 1),(q, 2), \cdots,(q, c)$$ in each subsequent timeslot. Then the node begins transmission of the next data packet thus the state transits from (q, c) to (q − 1, 1). The transmission process continues until the node finishes transmission of all data packets and enters state (0, 0). The transition of the Markov chain is shown in Fig. 8. In addition, new data packets may arrive at the end of each timeslot. Since the arrival rate for each node is [TeX:] $$\bar{\lambda}=\lambda / M$$ that approaches zero as the number of nodes M increases, we assume that at most one data packet can arrive in each timeslot. Specifically, the probability that a new data packet arrive is given by [TeX:] $$\bar{\lambda}.$$

Fig. 8.

The transition of the Markov chain.
8.png

Next, we justify the probability of successfully transmitting a reservation signal in a timeslot. The node can only send reservation signals when no other node is transmitting data packets. Let [TeX:] $$\bar{h}.$$ denote the expected number of data packets to be transmitted when a node successfully sends a reservation signal. Let γ denote the throughput of the reservation signal, which represents the probability that a reservation signal of any node is successfully transmitted in a timeslot of reservation. Here we consider Aloha scheme for the reservation stage thus we have [TeX:] $$\gamma=e^{-1}.$$ The number of timeslots used for reservation [TeX:] $$k_1$$ and the number of timeslots used for transmission [TeX:] $$k_2$$ satisfy that

(62)
[TeX:] $$k_1 \gamma \bar{h} c=k_2,$$

where [TeX:] $$k_1 \gamma$$ is the expected number of successfully transmitted reservation signals. For each successful reservation, the node transmits [TeX:] $$\bar{h}$$ data packets with total length [TeX:] $$\bar{h}c$$ in expectation, which consumes [TeX:] $$k_2$$ timeslots. Thus, the ratio of timeslots that used for reservation is given by

(63)
[TeX:] $$\begin{aligned} \eta & =\frac{k_1}{k_1+k_2} \\ & =\frac{1}{1+\gamma \bar{h} c} . \end{aligned}$$

We assume in each timeslot, the probability that there exists another node transmitting data packets is [TeX:] $$1-\eta$$, which is independent and idential among timeslots. When the current timeslot is used for reservation with probability [TeX:] $$\eta$$, a reservation signal is successfully transmitted with probability γ. The probability that a node has data packets in the local buffer is given by [TeX:] $$1-\pi_{0,0} .$$ Thus, the expected number of nodes in the reservation stage is [TeX:] $$M\left(1-\pi_{0,0}\right) .$$ Because of the symmetry among all nodes, the targeted node successfully sends a reservation signal with probability given by

(64)
[TeX:] $$\alpha=\frac{\eta \gamma}{M\left(1-\pi_{0,0}\right)}.$$

Therefore, for each state (q, 0) where q > 0, the transition probability to the next state [TeX:] $$\left(q^{\prime}, t_d^{\prime}\right)$$ is given by

(65)
[TeX:] $$p_{(q, 0),\left(q^{\prime}, t_d^{\prime}\right)}= \begin{cases}\alpha \bar{\lambda}, & q^{\prime}=q+1, t_d^{\prime}=1, \\ \alpha(1-\bar{\lambda}), & q^{\prime}=q, t_d^{\prime}=1, \\ (1-\alpha) \bar{\lambda}, & q^{\prime}=q+1, t_d^{\prime}=0, \\ (1-\alpha)(1-\bar{\lambda}), & q^{\prime}=q, t_d^{\prime}=0 .\end{cases}$$

In other cases of [TeX:] $$q^{\prime} \text { and } t_d^{\prime} \text {, }$$ the transition probability is zero. Note that if [TeX:] $$q^{\prime}\gt N,$$ then the next state just becomes [TeX:] $$q^{\prime}=N,$$ and the corresponding transition probability is accumulated in the transition probability for [TeX:] $$\left(N, t_d^{\prime}\right).$$ For state (0, 0), it transits to state (1, 0) with probability [TeX:] $$\bar{\lambda}$$ while state (0, 0) with probability [TeX:] $$1-\bar{\lambda}$$. Thus, we have

(66)
[TeX:] $$p_{(0,0),\left(q^{\prime}, 0\right)}= \begin{cases}\bar{\lambda}, & q^{\prime}=1, \\ 1-\bar{\lambda}, & q^{\prime}=0 .\end{cases}$$

Moreover, when [TeX:] $$t_d\gt 0,$$ the node continues transmits data packets in the current timeslot, thus the transition probability to the next stateccc [TeX:] $$\left(q^{\prime}, t_d^{\prime}\right)$$ is given by

(67)
[TeX:] $$p_{\left(q, t_d\right),\left(q^{\prime}, t_d^{\prime}\right)}= \begin{cases}\bar{\lambda}, & t_d\lt c, q^{\prime}=q+1, t_d^{\prime}=t_d+1, \\ \bar{\lambda}, & t_d=c, q^{\prime}=q, t_d^{\prime}=1, \\ 1-\bar{\lambda}, & t_d\lt c, q^{\prime}=q, t_d^{\prime}=t_d+1, \\ 1-\bar{\lambda}, & t_d=c, q^{\prime}=q-1, t_d^{\prime}=1 .\end{cases}$$

All transition probabilities defined by (65)–(67) constitute the transition matrix P for a single node with mean-field approximation. Next, we present a fixed-point iteration-based algorithm to find the steady-state probabilities π. The transition matrix P is affected by the value of [TeX:] $$\bar{h},$$ which is unknown yet. However, [TeX:] $$\bar{h}$$ is determined by the steady-state probabilities π. The reservation action of the node is independent of the number of data packets in the local buffer. Thus, we consider that the distribution of the number of data packets when the node successfully sends a reservation signal is determined by the distribution π conditioned on that the number of data packets q > 0. Specifically, [TeX:] $$\bar{h}$$ is given by

(68)
[TeX:] $$\bar{h}=\frac{1}{1-\pi_{0,0}} \sum_{q=1}^N q \sum_{t_d=0}^c \pi_{q, t_d}.$$

Therefore, we can compute the steady-state probabilities π, the expected number of data packets transmitted in a successful access [TeX:] $$\bar{h}$$, and the successful reservation probability α through an iterative algorithm. First, we randomly initialize the value of [TeX:] $$\bar{h}$$ and π. Compute α according to (64). Then in each iteration, we can derive the transition matrix of the Markov chain P, based on which we can compute the steady-state probabilities by

(69)
[TeX:] $$\boldsymbol{\pi}=\mathbf{1}_{r_4}^{\mathrm{T}}\left(P-I_{r_4}+\mathbf{1}_{r_4 \times r_4}\right)^{-1}.$$

Also we can find new values of [TeX:] $$\bar{h}$$ and α according to (68) and (64). After a number of iterations, the value of π converges. Thus, we can obtain the steady-state probabilities with the mean-field approximation. The average peak AoII is given by

(70)
[TeX:] $$\ell=\frac{1}{\bar{\lambda}} \sum_{q=1}^N q \sum_{t_d=0}^c \pi_{q, t_d}.$$

As for the AoII-oriented scenario, when the node only keeps the newest data packet, we formulate a Markov chain for a single node. Let s denote the state of the node. When s = 0, it represents that the node has no data packets in the local buffer. When the node has data packet in the local buffer, the state s > 0 is defined by the age of the data packet. When the node successfully transmits a reservation signal, then the node transmits the data packet in the next c timeslots. Thus, the state becomes -c after the node successfully sends a reservation signal. Then the state increases by one in each timeslot to represent the transmission procedure of the data packet. Thus, the state space is given by

(71)
[TeX:] $$\mathcal{S}=\{-c, \cdots, 0,1, \cdots\},$$

Let [TeX:] $$\pi_s$$ denote the steady-state probability of state [TeX:] $$s \in \mathcal{S} \text {. }$$

Next, we present the transition probability of the Markov chain. When the node is in state s = 0, then the state transits to s = 1 when a new data packet is generated with probability [TeX:] $$\bar{\lambda}$$. When s > 0, then the state increases by one in each timeslot until a reservation signal is successfully transmitted with probability α while the state transits to s = -c. The probability α is given by

(72)
[TeX:] $$\alpha=\frac{\eta \gamma}{M\left(1-\sum_{s=-c}^0 \pi_s\right)}.$$

The expected number of data packets transmitted is [TeX:] $$\bar{h}=1$$ in this AoII-oriented scenario. When s < 0, then the node is transmitting the data packet hence the state increases by one in each timeslot until the state becomes s = 0. Therefore, the transition probability from state s to state [TeX:] $$s^{\prime}$$ is given by

(73)
[TeX:] $$p_{s, s^{\prime}}= \begin{cases}\bar{\lambda}, & s=0, s^{\prime}=1, \\ 1-\bar{\lambda}, & s=0, s^{\prime}=0, \\ \alpha, & s\gt 0, s^{\prime}=-c, \\ 1-\alpha, & s\gt 0, s^{\prime}=s+1, \\ 1, & s\lt 0, s^{\prime}=s+1, \\ 0, & \text { otherwise. }\end{cases}$$

Based on the transition probability, we can obtain the transition matrix P for the Markov chain. We can obtain the steadystate probabilities π in closed form. Through each access procedure, the state of the device changes from [TeX:] $$s=1, \cdots \text{ to } s=-c, \cdots, 0$$. We can find that each time the state becomes s = 1, then the state must go through [TeX:] $$-c, \cdots, -1$$ eventually. Thus the steady-state probabilities are equal for state [TeX:] $$s \in\{-c, \cdots,-1,1\}$$. In addition, for state s > 1, the state in the previous timeslot must be s-1. According to the transition probability, for s > 1, we have

(74)
[TeX:] $$\begin{aligned} \pi_s & =\pi_{s-1}(1-\alpha) \\ & =\pi_1(1-\alpha)^{s-1}. \end{aligned}$$

For s = 1, the state in the previous timeslot must be 0. Thus, we have

(75)
[TeX:] $$\pi_0=\frac{1}{\bar{\lambda}} \pi_1 .$$

Thus, we can compute the steady-state probabilities [TeX:] $$\pi_1$$. as follows

(76)
[TeX:] $$\pi_1=\frac{1}{\frac{1}{\alpha}+c+\frac{1}{\lambda}}.$$

Substitute (64) into (76), we can obtain that the steady-state probability [TeX:] $$\pi_1$$ is a solution to the following quadratic equation.

(77)
[TeX:] $$-M\left(\frac{1}{\bar{\lambda}}+c\right) \pi_1^2+\left(M+\eta \gamma c+\frac{\eta \gamma}{\bar{\lambda}}\right) \pi_1-\eta \gamma=0.$$

Thus, we can obtain the closed-form steady-state probabilities. Let [TeX:] $$a=-M\left(\frac{1}{\lambda}+c\right), b=\left(M+\eta \gamma c+\frac{\eta \gamma}{\lambda}\right), d=\eta \gamma$$. The steady-state probability [TeX:] $$\pi_1$$ is given by

(78)
[TeX:] $$\pi_1=\frac{-b+\sqrt{b^2-4 a d}}{2 a}.$$

When the state s < 0, the age of the data packet is x+s+c+1, where x is the age when the node successfully sends the reservation signal. The expectation of x is given by

(79)
[TeX:] $$\bar{x}=\frac{\sum_{s=1}^{\infty} s \pi_s}{\sum_{s=1}^{\infty} \pi_s}.$$

After the value of π converges, the average AoII is given by

(80)
[TeX:] $$\begin{aligned} \bar{\Delta} & =\sum_{s=1}^{\infty} s \pi_s+\sum_{s=-c}^{-1}(\bar{x}+s+c+1) \pi_s \\ & =\left(\frac{1}{\alpha^2}+\frac{1}{\alpha}+\frac{c(c+1)}{2}\right) \pi_1 . \end{aligned}$$

VII. SIMULATION RESULTS

In this section, we evaluate the various schemes for the multiple access network based on the unified framework. For the AoII oriented scenario, the polling scheme and Aloha scheme are adopted for the reservation stage. For the average peak- AoII oriented scenario, Aloha is adopted for the reservation stage in FD and XD schemes. The tree splitting algorithm is adopted for the TD scheme. The maximum layers of split in the tree splitting algorithm is R = 3. The size of each data packet is c = 3. The access trigger stage is set as K = 1 for the TD and XD schemes. The transmission constraint is set as [TeX:] $$N_{\max }=1, N_{\max }=K, \text { and } N_{\max }=\infty$$ for the TD, FD, and XD schemes, respectively.

For the AoII oriented scenario, the average AoII [TeX:] $$\bar{\Delta}$$ versus the arrival rate λ under both the polling scheme and the Aloha scheme are shown in Fig. 9.We consider the number of transmitter nodes is M = 2 and the constraint of AoII is N = 10. The size of each data packet is c = 3, c = 4, and c = 5. When the arrival rate is relatively low, the random access scheme achieves a lower average AoII. However, as the arrival rate increases, the collision among nodes under the random access scheme causes increasingly significant waste of resources, hence reducing the average AoII significantly. When the arrival rate is relatively high, the polling scheme outperforms the random access scheme under the heavy traffic.

Fig. 9.

The average AoII [TeX:] $$\bar{\Delta}$$ versus the arrival rate λ under the polling scheme and the Aloha scheme.
9.png

Next, for the average peak-AoII oriented scenario, we evaluate the reservation based random access scheme. For the TD scheme with the tree splitting algorithm, the average peak AoII [TeX:] $$\ell$$ versus the arrival rate λ is shown in Fig. 10. The structure of the frame is structure of the frame is [TeX:] $$Z_1=3 \text{ and } Z_2=1.$$ We consider infinite-node model for this scheme since each packet requires an independent reservation. The constraint of the queue length is given by N = 3, N = 4, N = 5, and [TeX:] $$N \rightarrow \infty .$$ The presented tandem queue model is applied for finite queue length while the simulation result is provided with infinite queue length constraint. The packet loss rate approaches zero when the constraint of queue length N is large enough. When the arrival rate λ is small [TeX:] $$(\lambda \leq 0.02),$$ all these cases have the same average peak AoII performance and zero packet loss rate. As the arrival rate λ increases, the gap of average peak AoII for different constraints of queue length increases.

Fig. 10.

The average peak AoII [TeX:] $$\ell$$ versus the arrival rate λ under TD scheme.
10.png

For the FD scheme, we show the average peak AoII c versus the bandwidth [TeX:] $$w_1$$ in Fig. 11. The threshold for triggering reservation is K = 1. The arrival rate is given by λ = 0.05, λ = 0.1, and λ = 0.15. Since all data packets are independent with each other in reservation and transmission, the number of nodes does not affect the average in the reservation queue and transmission queue. The number of nodes only affects the peak AoII [TeX:] $$\ell_0$$ in the access trigger stage, which is zero when K = 1. Note that the average peak AoII becomes extremely high when the bandwidth for the reservation channel is too small or too large. Thus, we can find the optimal bandwidth allocation scheme that minimizes the average peak AoII. The optimal bandwidth [TeX:] $$w_1$$ is different with different arrival rate.

Fig. 11.

The average peak AoII [TeX:] $$\ell$$ versus the bandwidth [TeX:] $$w_1$$ under FD scheme.
11.png

Furthermore, we show the tradeoff between the average peak AoII and the supported arrival rate for the FD scheme in Fig. 12. The number of nodes is given by M = 5. When K > 1, the average peak AoII first decreases then increases with the arrival rate since the time for waiting packet combining can be high with a low arrival rate. If the access trigger stage requires each node to wait more data packets before entering the reservation queue, then the maximum arrival rate that is supported by this scheme is improved since less reservation signals are transmitted. However, the average peak AoII can increase rapidly with a larger K at a large arrival rate. It provides much insight that we can transmit different number of data packets for different scenarios in an adaptive way, which indicates the presented XD scheme.

Fig. 12.

The average peak AoII [TeX:] $$\ell$$ versus the arrival rate λ under FD scheme.
12.png

Next, we turn our attention to the XD scheme for average peak AoII oriented random access. We obtain that under the optimal allocation scheme, all bandwidth are allocated to either the reservation signal or the data packets in each timeslot. The average peak AoII [TeX:] $$\ell$$ versus the arrival rate λ with different constraint of the transmission queue [TeX:] $$N_2$$ is shown in Fig. 13. The number of users is M = 5. When the arrival rate is low, the transmission queue can hardly contains much packets. Thus, the average peak AoII with different [TeX:] $$N_2$$ are nearly the same with each other and increase slowly with the arrival rate. As the arrival rate increases, more packets may arrive resulting in more collisions for the reservation. Thus, the average peak AoII [TeX:] $$\ell$$ increases rapidly with the arrival rate. In this case, larger transmission queue length constraint [TeX:] $$N_2$$ may allow more nodes to make reservations when the number of nodes in the reservation queue is small, which alleviates the collision hence significantly reducing the average peak AoII.

Fig. 13.

The average peak AoII [TeX:] $$\ell$$ versus the arrival rate λ under the XD scheme.
13.png

The average peak AoII [TeX:] $$\ell$$ versus the maximum queue length [TeX:] $$N_2$$ with different arrival rate λ is shown in Fig. 14. The arrival rate is given by λ = 0.15, λ = 0.2, λ = 0.25, and λ = 0.3. The number of users is M = 10. If the maximum queue length [TeX:] $$N_2$$ of the transmission queue is too small, some nodes have to wait in the reservation queue until the nodes in the transmission queue finishes transmission when they can make reservations. Thus, nodes can be congested in the reservation queue, which results in more collisions and higher peak AoII. When [TeX:] $$N_2=0$$, it is similar to the CSMA/CA scheme in which a node begins transmission right after it successfully sends a reservation signal. Since the average peak AoII decreases with [TeX:] $$N_2$$, the presented dynamic allocation scheme outperforms the CSMA/CA protocol when the number of nodes in the reservation queue can be obtained through collision level estimation. When the arrival rate is small, the average peak AoII decreases to the minimum with any [TeX:] $$N_2$$. When the arrival rate is large, the average peak AoII is further reduced with a larger [TeX:] $$N_2$$.

Fig. 14

The average peak AoII [TeX:] $$\ell$$ versus the constraint of transmission queue length [TeX:] $$N_2$$ under the XD scheme.
14.png

The average peak AoII [TeX:] $$\ell$$ versus the number of nodes M in the network with different arrival rate is shown in Fig. 15. The arrival rate is given by λ = 0.1, λ = 0.15, and λ = 0.2. We consider two typical cases of transmission queue constraints including [TeX:] $$N_2=0$$ and [TeX:] $$N_2=M$$. It is shown that the average peak AoII does not increase with the number of nodes only when the total arrival rate is low. With a larger arrival rate, the average peak AoII with [TeX:] $$N_2=0$$ increases more rapidly, while the average peak AoII without constraint of the transmission queue increases slowly and approaches a constant as the number of nodes increases. This indicates that the dynamic allocation scheme is scalable with the number of nodes by significantly alleviating the collision among nodes. Thus, it holds the promise of addressing the access control for a massive number of nodes.

Fig. 15

The average peak AoII [TeX:] $$\ell$$ versus the number of transmitter nodes M under the XD scheme.
15.png

Next, we compare the TD, FD, and XD schemes in Fig. 16. The number of nodes is M = 5. The XD scheme significantly outperforms the TD and FD schemes since the dynamic allocation scheme can avoid much waste of the bandwidth resources. Moreover, the XD scheme can achieve higher network throughput with finite average peak AoII. In The FD scheme, the access trigger stage with a higher waiting number K improves the achievable network throughput with the cost of extra peak AoII. The adaptive reservation and transmission scheme with [TeX:] $$K=1 \text { and } N_{\max }=\infty$$ significantly reduces the average peak AoII since the data packet does not wait for more packets before the reservation. Releasing the constraints of the transmission queue in the XD scheme can further reduce the average peak AoII since nodes can make reservations with less collision in the reservation queue while waiting more time in the transmission queue.

Fig. 16

Comparison between the TD, FD, and XD schemes.
16.png

Finally, we demonstrate the effectiveness of the mean-field approximations average AoII and peak AoII with a large amount of transmitter nodes. The average AoII [TeX:] $$\bar{\Delta}$$ versus the number of transmitter nodes M is shown in Fig. 17. The total arrival rate of all transmitter nodes is λ = 0.2 and λ = 0.4. It is shown that the average AoII increases with the number of transmitter nodes M. The mean-field approximation approaches the simulation results when the number of transmitter nodes becomes large enough. When the arrival rate is relatively large, the mean-field approximation can be quite close even with M = 20. In addition, the average peak AoII [TeX:] $$\ell$$ versus the number of transmitter nodes M is shown in Fig. 18. The total arrival rate is λ = 0.2 and λ = 0.25. As the average peak AoII increases with the number of transmitter nodes, the accuracy of the mean-field approximation increases. Moreover, the mean-field approximation is more accurate with larger arrival rate. Thus, the mean-field approximations is also applicable for scenarios with heavy traffic or massive number of transmitter nodes.

Fig. 17

The average AoII [TeX:] $$\bar{\Delta}$$ versus the number of transmitter nodes M.
17.png

Fig. 18

The average peak AoII [TeX:] $$\ell$$ versus the number of transmitter nodes M.
18.png

VIII. CONCLUSION

In this paper, we have built a unified framework based on large models and mean-field approximations. Based on the unified framework, we analyze freshness-oriented multiple access, which is referred to as fresh multiple access, focusing on AoII and peak AoII scenarios. The average AoII and average peak AoII are analyzed for multiple access schemes characterized by Markov chain model. For AoII-oriented cases, we formulate a large Markov model for general multiple access schemes using our unified framework. We devise an algorithm to derive a sparse transition matrix for this model, enabling efficient computation of large, high-dimensional Markov models. In scenarios centered on average peak AoII, we reduce dimensionality through integral states of the system. Three multiplexing schemes of reservation signals and data packets are studied for the analysis and optimization of average peak AoII. Moreover, to address the high dimensional model with massive users, mean-field approximations is presented to approximate the impact of all nodes by a simple statistical effect. Using the mean-field approximation, we analyze the average AoII and average peak AoII based on a small Markov model of a single node. Extensive simulations are presented to demonstrate the analysis for AoII and average peak AoII based on different Markov chain model formulation. However, it’s important to note that we currently do not address the class of random access schemes that depend on the AoI or AoII. This area represents a significant aspect of our future research focus.

Biography

Haiming Hui

Haiming Hui received the B.S. degree from Tsinghua University, Beijing, China, in 2018, where he is currently pursuing the Ph.D. degree with the Department of Electronic Engineering. His research interest includes age of information and the proactive pushing techniques in wireless networks.

Biography

Shuqi Wei

Shuqi Wei received the B.S. degree from Tsinghua University, Beijing, China, in 2023, where she is pursuing the Ph.D. degree with the Department of Electronic Engineering. Her research interests are in the areas of real-time communications and taskoriented communications.

Biography

Wei Chen

Wei Chen (Senior Member, IEEE) received the B.S. and Ph.D. degrees (Hons.) from Tsinghua University in 2002 and 2007, respectively. Since 2007, he has been a Faculty Member with Tsinghua University, where he is currently a Tenured Full Professor and a University Council Member. During 20162021, he was the Director of the Degree Office of Tsinghua University. During 2014-2016, he was the Deputy Head of the Department of Electronic Engineering in Tsinghua University. From 2005 to 2007, he was a Visiting Ph.D. Student with the Hong Kong University of Science and Technology. He visited the University of Southampton in 2010, Telecom Paris Tech in 2014, and Princeton University, Princeton, NJ, USA, in 2016. His research interests are in the areas of real-time communications, task-oriented communications, and co-design of communications, control, and optimizations. He is a Cheung Kong Young Scholar and a member of the National Program for Special Support of Eminent Professionals, also known as 10,000 talent program. He received the IEEE Marconi Prize Paper Award in 2009 and the IEEE Comsoc Asia Pacific Board Best Young Researcher Award in 2011. He is a recipient of the National May 1st Labor Medal and the China Youth May 4th Medal. He has also been supported by the National 973 Youth Project, the NSFC Excellent Young Investigator Project, the New Century Talent Program of the Ministry of Education, and the Beijing Nova Program. He serves as an Editor for IEEE Trans.WIRELESS COMMUNICATIONS. He also serves as a standing committee member of All-China Youth Federation and the secretary-general of its education board. He has served as Editors for IEEE Trans.COMMUNICATIONS and IEEE Wireless Commun. LETTERS, a TPC Co-Chair for IEEE VTC-Spring in 2011 and a Symposium Co-Chair for IEEE ICC and Globecom.

References

  • 1 K. B. Letaief, W. Chen, Y . Shi, J. Zhang, and Y . A. Zhang, "The roadmap to 6G: AI empowered wireless networks," IEEE Commun. Mag., vol. 57, no. 8, pp. 84-90, Aug. 2019.custom:[[[https://ieeexplore.ieee.org/document/8808168]]]
  • 2 S. Kaul, R. Yates, and M. Gruteser, "Real-time status: How often should one update?," in Proc. IEEE INFOCOM, 2012.custom:[[[https://ieeexplore.ieee.org/document/6195689]]]
  • 3 A. Kosta, N. Pappas, A. Ephremides, and V . Angelakis, "The age of information in a discrete time queue: Stationary distribution and nonlinear age mean analysis," IEEE J. Sel. Areas Commun., vol. 39, no. 5, pp. 1352-1364, May 2021.doi:[[[10.48550/arXiv.2002.08798]]]
  • 4 R. D. Yates et al., "Age of information: An introduction and survey," IEEE J. Sel. Areas Commun., vol. 39, no. 5, pp. 1183-1210, May 2021doi:[[[10.48550/arXiv.2007.08564]]]
  • 5 Y . Mao et al., "Rate-splitting multiple access: Fundamentals, survey, and future research trends," IEEE Commun. Surveys Tuts., early access, 2022.custom:[[[https://arxiv.org/abs/2201.03192]]]
  • 6 H. H. Permuter, T. Weissman, and J. Chen, "Capacity region of the finitestate multiple-access channel with and without feedback," IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2455-2477, Jun. 2009.doi:[[[10.48550/arXiv.0708.0271]]]
  • 7 A. Ephremides and S. Verdu, "Control and optimization methods in communication network problems," IEEE Trans. Autom. Control, vol. 34, no. 9, pp. 930-942, Sep. 1989.custom:[[[https://ieeexplore.ieee.org/document/35806]]]
  • 8 Y . Wuetal., "Massive access for future wireless communication systems," IEEE Wireless Commun., vol. 27, no. 4, pp. 148-156, Aug. 2020.custom:[[[https://arxiv.org/abs/1910.12678]]]
  • 9 N. Abramson, "The Aloha system: Another alternative for computer communications," in Proc. AFIPS Fall, vol. 44, pp. 281-285, Nov. 1970.doi:[[[10.1145/1478462.1478502]]]
  • 10 W. Luo and A. Ephremides, "Stability of N interacting queues in random-access systems," IEEE Trans. Inf. Theory, vol. 45, no. 5, pp. 1579-1587, Jul. 1999.custom:[[[https://ieeexplore.ieee.org/document/771161]]]
  • 11 J. Luo and A. Ephremides, "On the throughput, capacity, and stability regions of random multiple access," IEEE Trans. Inf. Theory, vol. 52, no. 6, pp. 2593-2607, Jun. 2006.custom:[[[https://ieeexplore.ieee.org/abstract/document/1638545]]]
  • 12 J. Capetanakis, "Tree algorithms for packet broadcast channels," IEEE Trans. Inf. Theory, vol. 25, no. 5, pp. 505-515, Sep. 1979.custom:[[[https://ieeexplore.ieee.org/document/1056093]]]
  • 13 J. Mosely and P. Humblet, "A class of efficient contention resolution algorithms for multiple access channels," IEEE Trans. Commun., vol. 33, no. 2, pp. 145-151, Feb. 1985.custom:[[[https://ieeexplore.ieee.org/document/1096261]]]
  • 14 G. Stamatakis, N. Pappas and A. Traganitis, "Control of status updates for energy harvesting devices that monitor processes with alarms," in Proc. IEEE GLOBECOM Workshops, 2019.custom:[[[https://ieeexplore.ieee.org/document/9024463]]]
  • 15 M. Wang, W. Chen and A. Ephremides, "Real-Time Reconstruction of a Counting Process Through First-Come-First-Serve Queue Systems,"IEEE Trans. Inf. Theory, vol. 66, no. 7, pp. 4547-4562, Jul. 2020.custom:[[[https://ieeexplore.ieee.org/document/9024463]]]
  • 16 C. Kam, S. Kompella, G. D. Nguyen, J. E. Wieselthier, and A. Ephremides, "On the age of information with packet deadlines," IEEE Trans. Inf. Theory, vol. 64, no. 9, pp. 6419-6428, Sep. 2018.custom:[[[https://ieeexplore.ieee.org/document/8323423]]]
  • 17 A. Maatouk, M. Assaad, and A. Ephremides, "Minimizing the age of information: NOMA or OMA?," in Proc. IEEE INFOCOM Workshops, 2019.doi:[[[10.48550/arXiv.1901.03020]]]
  • 18 E. Fountoulakis, T. Charalambous, N. Nomikos, A. Ephremides, and N. Pappas, "Information freshness and packet drop rate interplay in a two-user multi-access channel," J. Commun. Netw., vol. 24, no. 3, pp. 357-364, Jun. 2022.doi:[[[10.48550/arXiv.2006.01515]]]
  • 19 R. D. Yates and S. K. Kaul, "Status updates over unreliable multiaccess channels," in Proc. IEEE ISIT, 2017.doi:[[[10.48550/arXiv.1705.02521]]]
  • 20 R. D. Yates and S. K. Kaul, "Age of information in uncoordinated unslotted updating," in Proc. IEEE ISIT, 2020.doi:[[[10.48550/arXiv.2002.02026]]]
  • 21 X. Chen, K. Gatsis, H. Hassani, and S. S. Bidokhti, "Age of information in random access channels," IEEE Trans. Inf. Theory, vol. 68, no. 10, pp. 6548-6568, Oct. 2022.doi:[[[10.48550/arXiv.1912.01473]]]
  • 22 Y . Wang and W. Chen, "Adaptive power and rate control for real-time status updating over fading channels," IEEE Trans. Wireless Commun., vol. 20, no. 5, pp. 3095-3106, May 2021.custom:[[[https://ieeexplore.ieee.org/document/9316992]]]
  • 23 S. Yu, W. Chen, and H. V . Poor, "Real-time monitoring with timing side information," IEEE Trans. Commun., vol. 71, no. 4, pp. 1953-1969, Apr. 2023.custom:[[[https://ieeexplore.ieee.org/document/10025775]]]
  • 24 H. Hui, S. Hu, and W. Chen, "Real time monitoring of Brownian motions," IEEE Trans. Commun., vol. 70, no. 9, pp. 5867-5881, Sep. 2022.custom:[[[https://ieeexplore.ieee.org/document/9829866]]]
  • 25 I. Kadota, A. Sinha, and E. Modiano, "Scheduling algorithms for optimizing age of information in wireless networks with throughput constraints," IEEE/ACM Trans. Netw., vol. 27, no. 4, pp. 1359-1372, Aug. 2019.custom:[[[https://ieeexplore.ieee.org/abstract/document/8734015]]]
  • 26 A. Maatouk, S. Kriouile, M. Assaad, and A. Ephremides, "The age of incorrect information: A new performance metric for status updates," IEEE/ACM Trans. Netw., vol. 28, no. 5, pp. 2215-2228, Oct. 2020.doi:[[[10.1109/TNET.2020.3005549]]]
  • 27 A. Maatouk, M. Assaad, and A. Ephremides, "The age of incorrect information: An enabler of semantics-empowered communication," IEEE Trans. Wireless Commun., vol. 22, no. 4, pp. 2621-2635, Apr. 2023.custom:[[[https://ieeexplore.ieee.org/document/9838737]]]
  • 28 A. Nayak, A. E. Kalor, F. Chiariotti, and P. Popovski, "A decentralized policy for minimization of age of incorrect information in slotted ALOHA systems," arXiv preprint arXiv:2301.10987, Jan. 2023.doi:[[[10.48550/arXiv.2301.10987]]]
  • 29 M. Costa, M. Codreanu, and A. Ephremides, "On the age of information in status update systems with packet management," IEEE Trans. Inf. Theory, vol. 62, no. 4, pp. 1897-1910, Apr. 2016.custom:[[[https://ieeexplore.ieee.org/abstract/document/7415972]]]
  • 30 A. Kosta, N. Pappas, A. Ephremides, and V . Angelakis, "The cost of delay in status updates and their value: Non-linear ageing," IEEE Trans. Commun., vol. 68, no. 8, pp. 4905-4918, Aug. 2020.custom:[[[https://ieeexplore.ieee.org/document/9068225]]]
  • 31 X. Zhao and W. Chen, "Non-orthogonal multiple access for delaysensitive communications: A cross-layer approach," IEEE Trans. Commun., vol. 67, no. 7, pp. 5053-5068, Jul. 2019.custom:[[[https://ieeexplore.ieee.org/document/8666055]]]
  • 32 Y . Liu, W. Chen, and J. Lee, "Joint queue-aware and channel-aware scheduling for non-orthogonal multiple access," IEEE Trans. Wireless Commun., vol. 21, no. 1, pp. 264-279, Jan. 2022.custom:[[[https://ieeexplore.ieee.org/document/9484417]]]
  • 33 C. Li, W. Chen, and K. B. Letaief, "Achieving low latency in massive access: A mean-field approach," IEEE J. Sel. Areas Commun., vol. 40, no. 5, pp. 1473-1488, May 2022.custom:[[[https://ieeexplore.ieee.org/document/9681842]]]
  • 34 R. Abbas, M. Shirvanimoghaddam, Y . Li, and B. Vucetic, "Random access for M2M communications with QoS guarantees," IEEE Trans. Commun., vol. 65, no. 7, pp. 2889-2903, Jul. 2017.custom:[[[https://ieeexplore.ieee.org/document/7891878]]]
  • 35 J. F. Hayes, Modeling and Analysis of Computer Communications Networks, Springer Science & Business Media, 2013.custom:[[[-]]]
  • 36 H. Takagi, "Queuing analysis of polling models," ACM CSUR, vol. 20, no. 1, pp. 5-28, Mar. 1988.doi:[[[10.1145/62058.62059]]]
  • 37 A. Kosta, N. Pappas, A. Ephremides, and V . Angelakis, "Age of information performance of multiaccess strategies with packet management," J. Commun. Netw., vol. 21, no. 3, pp. 244-255, Jun. 2019.custom:[[[https://ieeexplore.ieee.org/document/8764468]]]
  • 38 B. Tsybakov and N. B. Likhanov, "Upper bound on the capacity of a random multiple-access system,"ProblemyPeredachiInformatsii, vol. 23, no. 3, pp. 224-236, 1987.custom:[[[https://link.springer.com/chapter/10.1007/11889342_10]]]
  • 39 A. Ephremides and B. Hajek, "Information theory and communication networks: An unconsummated union," IEEE Trans. Inf. Theory, vol. 44, no. 6, pp. 2416-2434, Oct. 1998.custom:[[[https://ieeexplore.ieee.org/document/720543]]]
  • 40 J. E. Wieselthier, A. Ephremides, and J. A. B. Tarr, "A distributed reservation-based CDMA protocol that does not require feedback information," IEEE Trans. Commun., vol. 36, no. 8, pp. 913-923, Aug. 1988.custom:[[[https://ieeexplore.ieee.org/document/3771]]]
  • 41 J. Wieselthier and A. Ephremides, "A new class of protocols for multiple access in satellite networks," IEEE Trans. Autom. Control, vol. 25, no. 5, pp. 865-879, Oct. 1980.custom:[[[https://ieeexplore.ieee.org/document/1102478]]]
  • 42 A. Vinel, Q. Ni, D. Staehle, and A. Turlikov, "Capacity analysis of reservation-based random access for broadband wireless access networks," IEEE J. Sel. Areas Commun., vol. 27, no. 2, pp. 172-181, Feb. 2009.custom:[[[https://ieeexplore.ieee.org/document/4769392]]]
  • 43 Y . Gao and L. Dai, "Random access: Packet-based or connectionbased?" IEEE Trans. Wireless Commun., vol. 18, no. 5, pp. 2664-2678, May 2019.custom:[[[https://ieeexplore.ieee.org/document/8675765]]]
  • 44 H. Hui and W. Chen, "Delay analysis of reservation based random access: A tandem queue model," in Proc. IEEE GLOBECOM, 2022.custom:[[[https://ieeexplore.ieee.org/document/10001084]]]
  • 45 H. Huang, T. Ye, T. T. Lee, and W. Sun, "Delay and stability analysis of connection-based slotted-aloha," IEEE/ACM Trans. Netw., vol. 29, no. 1, pp. 203-219, Feb. 2021.custom:[[[https://ieeexplore.ieee.org/document/9244230]]]
  • 46 G. Bianchi, "Performance analysis of the IEEE 802.11 distributed coordination function," IEEE J. Sel. Areas Commun., vol. 18, no. 3, pp. 535-547, Mar. 2000.custom:[[[https://ieeexplore.ieee.org/document/840210]]]
  • 47 R. MacKenzie and T. O’Farrell, "Throughput and delay analysis for p-persistent CSMA with heterogeneous traffic," IEEE Trans. Commun., vol. 58, no. 10, pp. 2881-2891, Oct. 2010.custom:[[[https://ieeexplore.ieee.org/document/5567013]]]
  • 48 P. K. Wong, D. Yin, and T. T. Lee, "Analysis of non-persistent CSMA protocols with exponential backoff scheduling," IEEE Trans. Commun., vol. 59, no. 8, pp. 2206-2214, Aug. 2011.doi:[[[10.48550/arXiv.1005.0178]]]
  • 49 O. Tickoo and B. Sikdar, "Modeling queueing and channel access delay in unsaturated IEEE 802.11 random access MAC based wireless networks," IEEE/ACM Trans. Netw., vol. 16, no. 4, pp. 878-891, Aug. 2008.custom:[[[https://ieeexplore.ieee.org/document/4457810]]]
  • 50 A. M. Bedewy, Y . Sun, R. Singh, and N. B. Shroff, "Low-power status updates via sleep-wake scheduling," IEEE/ACM Trans. Netw., vol. 29, no. 5, pp. 2129-2141, Oct. 2021.doi:[[[10.48550/arXiv.2102.02846]]]
  • 51 A. Maatouk, M. Assaad, and A. Ephremides, "On the age of information in a CSMA environment," IEEE/ACM Trans. Netw., vol. 28, no. 2, pp. 818-831, Apr. 2020.custom:[[[https://ieeexplore.ieee.org/document/9007478]]]
  • 52 W. Zhan and L. Dai, "Access delay optimization of M2M communications in LTE networks," IEEE Wireless Commun. Lett., vol. 8, no. 6, pp. 1675-1678, Dec. 2019.custom:[[[https://ieeexplore.ieee.org/document/8804210]]]
  • 53 W. Zhan and L. Dai, "Massive random access of machine-to-machine communications in LTE networks: Modeling and throughput optimization," IEEE Trans. Wireless Commun., vol. 17, no. 4, pp. 2771-2785, Apr. 2018.custom:[[[https://ieeexplore.ieee.org/document/8288613]]]
  • 54 M. Vilgelm, S. R. Li˜ nares, and W. Kellerer, "On the resource consumption of M2M random access: Efficiency and pareto optimality," IEEE Wireless Commun. Letters, vol. 8, no. 3, pp. 709-712, Jun. 2019.doi:[[[10.48550/arXiv.1811.02249]]]
  • 55 T. Dayar and W. J. Stewart, "Comparison of partitioning techniques for two-level iterative solvers on large, sparse Markov chains," SIAM J. Sci. Comput., vol. 21, no. 5, pp. 1691-1705, Apr. 2000.doi:[[[10.1137/S1064827598338159]]]
  • 56 M. Benzi and M. Tuma, "A parallel solver for large-scale Markov chains," Appl. Numer. Math., vol. 41, no. 1, pp. 135-153, Apr. 2002.doi:[[[10.1016/S0168-9274(01)00116-7]]]
  • 57 D. P. Bertsekas and R. G. Gallager, Data Networks, Englewood Cliffs, NJ, USA: Prentice-Hall, 1992.custom:[[[https://www.jstor.org/stable/1878038]]]
  • 58 J. E. Hopcroft, R. Motwani, and J. D. Ullman, Introduction to automata theory, languages, and computation, 3rd ed. Addison-Wesley, 2007.custom:[[[-]]]
  • 59 M. L. Puterman, Markov Decision Processes: Discrete Stochastic Dynamic Programming, 1st ed. Hoboken, NJ, USA: John Wiley & Sons, Inc, 1994.custom:[[[https://www.semanticscholar.org/paper/Markov-Decision-Processes%3A-Discrete-Stochastic-Puterman/8090121ad488b4af27bc59bf91b62e9c6a6f49c6]]]
  • 60 J. G. Proakis and M. Salehi, Digital Communications, 5th ed. McGrawHill Companies, Inc, 2008.custom:[[[-]]]