Hostname: page-component-89b8bd64d-b5k59 Total loading time: 0 Render date: 2026-05-06T19:20:01.168Z Has data issue: false hasContentIssue false

Analysis of ${\textit{d}}$-ary tree algorithms with successive interference cancellation

Published online by Cambridge University Press:  26 February 2024

Quirin Vogel*
Affiliation:
Technical University of Munich
Yash Deshpande*
Affiliation:
Technical University of Munich
Cedomir Stefanović*
Affiliation:
Aalborg University
Wolfgang Kellerer*
Affiliation:
Technical University of Munich
*
*Postal address: Department of Mathematics, School of Computation, Information and Technology, Technical University of Munich, Germany. Email address: quirin.vogel@tum.de
**Postal address: Lehrstuhl für Kommunikationsnnetze, School of Computation, Information and Technology, Technical University of Munich, Germany.
****Department of Electronic Systems, Aalborg University, 2450 København SV, Denmark. Email address: cs@es.aau.dk
**Postal address: Lehrstuhl für Kommunikationsnnetze, School of Computation, Information and Technology, Technical University of Munich, Germany.
Rights & Permissions [Opens in a new window]

Abstract

We calculate the mean throughput, number of collisions, successes, and idle slots for random tree algorithms with successive interference cancellation. Except for the case of the throughput for the binary tree, all the results are new. We furthermore disprove the claim that only the binary tree maximizes throughput. Our method works with many observables and can be used as a blueprint for further analysis.

Information

Type
Original Article
Creative Commons
Creative Common License - CCCreative Common License - BY
This is an Open Access article, distributed under the terms of the Creative Commons Attribution licence (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted re-use, distribution, and reproduction in any medium, provided the original work is properly cited.
Copyright
© The Author(s), 2024. Published by Cambridge University Press on behalf of Applied Probability Trust
Figure 0

Figure 1. Illustration of the ternary ($d=3$) tree algorithm. The number outside each node represents the slot number. The number inside each node in the tree represents the number of users transmitting in that slot. Slots 5, 8, 9, and 10 will be skipped in the SICTA.

Figure 1

Table 1. Summarizing the results for different observables of SICTA. See Section 4 for more details.

Figure 2

Figure 2. The minimal obtainable collision rate, constrained by achieving a certain throughput rate. The figure was obtained numerically using a standard solver for constraint non-linear optimization problems. $p^\textrm{bi}$ was used as the initial value.