Random Access Protocols
When Scheduling Is Too Expensive
The multiple access schemes of Sections 19.1--19.3 all require some form of coordination: the base station must know which users are active, assign them resources (frequency, time, or codes), and often perform power control. This scheduling overhead is acceptable when users transmit continuously (voice calls, video streaming) but becomes prohibitively expensive when many users transmit sporadically β short packets arriving at unpredictable times. Examples include IoT sensor networks, initial access in cellular systems, and Wi-Fi networks.
Random access protocols allow users to transmit without prior scheduling. The price is collisions: when two users transmit simultaneously, their packets may be lost. The fundamental question is how to balance throughput against collision probability, and whether the simplicity of uncoordinated access outweighs its inefficiency.
Definition: Pure ALOHA and Slotted ALOHA
Pure ALOHA and Slotted ALOHA
Pure ALOHA (Abramson, 1970): Each user transmits its packet immediately upon arrival, without waiting. A collision occurs whenever any part of two packets overlaps in time. If a packet of duration is transmitted, it is vulnerable to collisions during a window of .
Let be the offered load (average number of transmission attempts per packet duration). Modelling arrivals as a Poisson process, the probability of a successful transmission is , and the throughput is:
The maximum throughput is at .
Slotted ALOHA (Roberts, 1972): Time is divided into slots of duration , and users are synchronised to transmit only at slot boundaries. A collision occurs when two or more users transmit in the same slot. The vulnerability window is reduced from to , yielding:
The maximum throughput is at .
Slotted ALOHA exactly doubles the throughput of pure ALOHA by halving the vulnerability period. Both protocols exhibit instability: if the load exceeds the throughput peak, collisions increase, causing retransmissions that further increase the load, leading to congestion collapse. Stabilisation mechanisms (binary exponential backoff) are essential in practice.
Theorem: Maximum Throughput of Slotted ALOHA
For slotted ALOHA with Poisson arrivals at offered load , the throughput is:
This function achieves its unique maximum at , where:
That is, at most 36.8% of the slots carry successful transmissions, even under optimal offered load.
At , on average one user attempts per slot. But "on average one" does not mean "exactly one" β the Poisson distribution places probability on exactly one arrival, which is the success probability. At higher loads, more slots have collisions; at lower loads, more slots are empty. The ceiling reflects the inherent waste of uncoordinated access: roughly one-third successes, one-third empty slots, and one-third collisions.
Throughput derivation
In a given slot, the number of transmitting users is Poisson with mean . A slot is successful if and only if exactly one user transmits:
where . The throughput (fraction of successful slots) is therefore .
Optimisation
Taking the derivative:
Setting gives . The second derivative is , which at equals , confirming a maximum.
Slotted ALOHA: Throughput Peak and Collapse
ALOHA Throughput vs. Offered Load
Compare the throughput of pure ALOHA () and slotted ALOHA () as functions of the offered load . Observe the throughput peaks at (pure) and (slotted), and the throughput collapse at high loads. Adjust the maximum offered load to zoom into different regions of the curve.
Parameters
Slotted ALOHA Collision Animation
Watch a slotted ALOHA system in action. Each user (row) randomly decides to transmit in each slot. Green indicates a successful transmission (the only user in that slot), red indicates a collision, and white indicates an idle slot. Adjust the offered load to see the transition from mostly idle to mostly collisions.
Parameters
Definition: CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance)
CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance)
CSMA/CA improves upon ALOHA by requiring each user to sense the channel before transmitting. If the channel is detected as busy, the user defers its transmission and enters a random backoff.
The protocol proceeds as follows:
- Sense: If the channel is idle for a duration DIFS (Distributed Inter-Frame Space), proceed to step 2. Otherwise, wait until idle and go to step 2.
- Backoff: Choose a random backoff counter , where is the contention window. Decrement each idle slot. If the channel becomes busy, freeze the counter. When , transmit.
- Transmit and wait for ACK. If an ACK is received, the transmission succeeded. If no ACK (collision detected), double the contention window: (binary exponential backoff) and return to step 1.
CSMA/CA is used in IEEE 802.11 (Wi-Fi). Its throughput exceeds ALOHA significantly because carrier sensing avoids most collisions when propagation delays are small relative to packet durations.
CSMA/CA cannot detect collisions during transmission (unlike wired Ethernet's CSMA/CD) because wireless half-duplex transceivers cannot transmit and receive simultaneously. The optional RTS/CTS handshake mitigates the hidden terminal problem, where two users cannot hear each other but both interfere at a common receiver.
Example: ALOHA Throughput and Collision Probability
A satellite network with ground terminals uses slotted ALOHA. Each terminal generates a packet with probability per slot.
(a) Compute the offered load . (b) Compute the throughput and the fraction of wasted slots. (c) What value of maximises the throughput?
Offered load
This is exactly the optimal load for slotted ALOHA.
Throughput and waste
Approximately 36.8% of slots carry successful transmissions.
Fraction of empty slots: .
Fraction of collision slots: .
So roughly 36.8% success, 36.8% empty, 26.4% collisions.
Optimal transmission probability
To maximise , we need , so .
For : (already optimal).
For : . As the number of users grows, each must become more conservative to maintain the optimal throughput.
Quick Check
A system switches from pure ALOHA to slotted ALOHA. By what factor does the maximum throughput increase?
Factor of 2 (from 1/(2e) to 1/e)
Factor of e (from 1/(2e) to 1/2)
Factor of 4
No improvement; both have the same throughput
Pure ALOHA: . Slotted ALOHA: . The ratio is exactly 2. Slotting halves the vulnerability window, doubling the throughput.
Historical Note: The ALOHAnet (1970)
1970Norman Abramson at the University of Hawaii created the ALOHAnet in 1970, the first wireless packet-switched network. It connected terminals on the Hawaiian islands to a central computer at the university via UHF radio. The pure ALOHA protocol was born from a practical constraint: the terminals were too simple and too widely separated for carrier sensing or scheduling.
Abramson's insight was that if collisions are detected (via acknowledgements) and retransmissions are randomised, a useful amount of throughput can be achieved with zero coordination. The throughput limit may seem low, but it was sufficient for the bursty terminal traffic of the early 1970s. Roberts (1972) showed that slotting doubles the throughput, and Metcalfe later adapted these ideas for Ethernet (carrier sensing on a wire), which evolved into the modern Internet infrastructure. The ALOHA protocol remains the conceptual ancestor of every random access scheme used today, including Wi-Fi and LTE's random access channel (RACH).
Common Mistake: ALOHA Throughput Collapse at High Load
Mistake:
Assuming that slotted ALOHA can sustain any offered load below its maximum throughput of .
Correction:
The throughput curve has two solutions for at any throughput : a low-load stable point and a high-load unstable point. If the system drifts past (e.g., due to a burst of arrivals), collisions increase, triggering retransmissions that push even higher, creating a positive feedback loop that drives throughput to zero.
This congestion collapse is the Achilles' heel of ALOHA. Practical systems must implement stabilisation: binary exponential backoff (IEEE 802.11), pseudo-Bayesian broadcast (Rivest, 1987), or admission control. Without stabilisation, ALOHA systems are bistable: they oscillate between low-load (high throughput) and high-load (near-zero throughput) regimes.
Coded Compressed Sensing for Unsourced Random Access
Fengler, Jung, and Caire developed a coded compressed sensing framework for unsourced random access β a model introduced by Polyanskiy (2017) where all active users share the same codebook and the receiver must recover the list of transmitted messages without knowing user identities.
Their approach combines:
-
Sparse regression codes (SPARCs): each user encodes its message as a sparse linear combination of columns from a shared dictionary, enabling compressed sensing-based activity detection.
-
Coded demixing: a concatenated coding scheme with an outer tree code that stitches together sub-block estimates, achieving near-optimal energy-per-bit efficiency.
-
AMP-based decoding: approximate message passing (AMP) provides a computationally efficient decoder with rigorous performance guarantees via state evolution.
This work showed that reliable massive random access with active users (out of potentially millions) is feasible at energy-per-bit close to the Shannon limit, with per-user error probability below . The framework is directly relevant to 5G mMTC (massive machine-type communication) and future 6G grant-free access, where scheduling millions of IoT devices is infeasible.
Grant-Free Access for Massive IoT in 5G NR
The random access protocols of this section (ALOHA, CSMA/CA) were designed for moderate numbers of users. 5G mMTC targets devices/km, far beyond what scheduling-based protocols can handle (pilot overhead alone would exceed the coherence interval).
5G NR grant-free access (configured grant):
- Pre-configured resources: the gNB assigns time-frequency slots that devices can use without requesting a grant (3GPP TS 38.321)
- Collision resolution: K-repetition with power ramping, combined with advanced receiver techniques (SIC, compressed sensing)
- DMRS-based activity detection: the gNB detects which devices transmitted by correlating received signals with known pilot sequences from a shared pool
Practical limits:
- Maximum active devices per slot: -100 (limited by pilot pool size and receiver complexity)
- Reliability: BLER with 1 transmission, with HARQ retransmissions
- Latency: 1-10 ms (grant-free) vs. 10-50 ms (grant-based RACH)
The CommIT group's coded compressed sensing framework (Fengler, Jung, Caire) provides the theoretical underpinning for next-generation grant-free access protocols that could scale to + active devices.
- β’
5G NR configured grant: 50-100 active devices per slot
- β’
Pilot pool size limits collision resolution capability
- β’
AMP decoder complexity: O(N_pilots Γ K_active) per iteration
ALOHA
A random access protocol in which users transmit without prior coordination. Pure ALOHA transmits immediately; slotted ALOHA synchronises transmissions to slot boundaries. Maximum throughput: (pure) and (slotted).
Related: CSMA/CA, Random Access
CSMA/CA
Carrier Sense Multiple Access with Collision Avoidance: a random access protocol in which users sense the channel before transmitting and use random backoff to reduce collision probability. The access method used in IEEE 802.11 (Wi-Fi).
Related: ALOHA, Random Access