
paper we start to bridge this gap focusing on a modern random
access protocol, namely irregular repetition slotted ALOHA
(IRSA) [34]. We discuss the implications and costs of imple-
menting a feedback for such scheme, and propose a variation
of the algorithm, referred to as age-threshold IRSA (AT-IRSA),
which lets the receiver dynamically select a minimum level
of AoI required for nodes to contend. By means of detailed
network simulations we prove the remarkable benefits of such
approach compared to the basic version of IRSA, especially for
large terminal populations. Furthermore, we present a simple
yet tight analytical approximation for the performance of the
scheme, and show that substantial improvements over some
state-of-the-art feedback-based slotted ALOHA policies [31],
[33] are attained.
II. SYSTEM MODEL AND PRELIMINARIES
Throughout our discussion we focus on a system composed
by a large number of terminals which share a common wireless
channel to communicate to a common receiver (also referred
to as sink, or monitor). Each of the Udevices becomes active
sporadically, attempting transmission of a time-stamped status
update, e.g., containing the reading of a monitored physical
process. In this setting, we aim to maintain a fresh and up-to-
date perception of the monitored processes at the receiver.
As customary in massive IoT applications, a random access
approach is implemented at the link layer, following a variation
of the irregular repetition slotted ALOHA protocol (IRSA)
described in details in Sec. II-A and III. In the remainder of
our discussion, we assume time to be divided in slots of equal
duration, and all devices to be synchronized to such pattern.
The transmission parameters are set such that a slot fits a single
packet. Furthermore, following a well-established modeling
approach, we regard collisions as destructive. Accordingly, the
receiver cannot extract any information from a slot containing
the superposition of two or more packets. Conversely, a data
unit without interference (singleton slot) is always correctly
decoded. In addition, we assume the sink to be able to
differentiate among idle, singleton and collided slots.
A. Irregular Repetition Slotted ALOHA
Originally introduced in [34], IRSA is a grant-free scheme
designed to go beyond the intrinsic reliability and throughput
limitations of slotted ALOHA. The protocol operates over
frames of mslots each,1and the delivery of a packet can only
be initiated at the start over a new frame. Specifically, when
a terminal has data to send, it will transmit `copies of the
packet, uniformly distributed at random over the mavailable
slots in the upcoming frame. Each replica contains a pointer
to the positions in which its twins are sent.2The number of
copies is drawn from a pre-defined distribution, shared by all
1Variations of the protocol operating over group of resources allocated in
a time-frequency thread are also possible, see, e.g. [35].
2This can be implemented by signaling the slots over which transmissions
are performed in the packet header. Alternative solutions to reduce overhead
are also possible, e.g. using the payload as seed for a random number
generator, used both at the sender and receiver side to place and locate replicas.
devices in the network. Following a well-established notation,
we specify such distribution in polynomial form as
Λ(x) =
L
X
`=1
Λ`x`
where Λ`is the probability to send `packet copies, up to a
maximum degree L.
At the sink, decoding relies on successive interference
cancellation (SIC) procedures. After buffering a whole frame,
the receiver starts by identifying singleton slots, which al-
low retrieval of non-collided packets. The incoming signal
contribution of each decoded data unit is then subtracted
from all the slots in which its copies were transmitted. This
interference cancellation procedure can thus potentially lead to
the identification of additional singleton slots, and is iterated
until either all packets have been decoded or only slots with
collisions remain in the frame. An example of the described
receiver operation is reported in Fig. 1. In this case, 4users
access a frame of duration 5slots. Users 1,2and 3transmit
three copies of their packet, whereas user 4only sends two
replicas, leading to the initial configuration of Fig. 1a. The
receiver starts by decoding user 3from slot 3(singleton), and
removes the contribution of such packet from slots 2and 4
(Fig. 1b). At this point, slot 4only contains the packet of user
1, which can be retrieved. Once more, the corresponding signal
is canceled from slots 1and 5, obtaining the configuration of
Fig. 1c. Here, user 2is decoded from the first slot, eventually
resolving all collisions involving user 4as well (Fig.1d).
To characterize the performance of IRSA in the remainder
of our discussion we resort to two key figures: channel load
and throughput. The former, denoted by G, captures the level
of contention over a frame. More precisely, let us introduce
the random variable (r.v.)
G`:= U`
m
describing the instantaneous channel load over the `-th frame,
where the r.v. U`indicates the number of terminals attempting
a transmission. The average channel load is accordingly
G=E[G`].
In turn, the throughput Sis defined as the average number of
terminals decoded per slot The throughput behavior of IRSA
has been thoroughly studied in the literature, see e.g., [24],
[34], and an example of the achievable performance is reported
in Fig. 2 for a frame size m= 100 and an overall population
of U= 4000 users.
B. Age of Information: Preliminaries
To gauge the ability of a random access policy to maintain
a fresh perception of monitored processes at the sink, we
consider the age of information metric. Focusing without loss
of generality on an arbitrary terminal uin the system, let us
denote as δu(t)its instantaneous AoI, defined as
δu(t) := t−σu(t)