A Multigroup Priority Queueing MAC Protocol for Wireless Networks with Multipacket Reception

Relying on a simple ﬂag-assisted mechanism, a multigroup priority queueing (MGPQ) medium access control (MAC) protocol is proposed for the wireless networks with multipacket reception (MPR). The proposed MGPQ scheme is capable of overcoming two major performance bottlenecks inherent in the existing MPR MAC protocols. First, the proposed solution can automatically produce the list of active users by observing the network tra ﬃ c conditions, remove the need of active user estimation algorithm, and thus can largely reduce the algorithm complexity. Second, the packet blocking constraint imposed on the active users for keeping compliant with prediction is relaxed. As a result, the proposed MGPQ is not only applicable to both homogeneous and heterogeneous cases, but also outperforms the existing MPR MAC protocols. Simulation results show that the network throughput can be improved by 40% maximum and 14% average as compared with the well-known dynamic queue (DQ) MAC protocol.


Overview
An efficient medium access control (MAC) mechanism is characterized by high throughput and low delay.Traditionally, the design of MAC protocols is based on the so-called collision channel model, that is, a transmitted packet is successfully received only when no concurrent transmission occurs.Such a paradigm, however, ignores the multipacket reception (MPR) capability at the physical layer, for example, multiuser detection [1].Recently MAC protocols with the MPR capability draw increasing attention.Several proposals have been reported in the literatures [2][3][4][5][6][7][8][9][10][11], almost all of which are devised for the homogeneous environment, that is, all users are associated with the same packet generating probability.An initial attempt to reflect the MPR facility is the channel model with capture effect characterized via the probability of successful reception [2].The impact of capture effects on various existing MAC protocols such as slotted ALOHA, and FCFS has been addressed in [3][4][5].However, the capture model overall remains a simplified representation of the actual channel characteristics and does not explicitly account for the MPR capability.This thus motivates the development of more realistic MPR channel model [6], based on which several MAC protocols have been proposed for realizing various system-wide performance requirements [7][8][9][10][11].The multiqueue service room (MQSR) protocol [7] is, to the best of our knowledge, the first proposal which relies on the MPR model [6] for user scheduling.It calls for active user prediction via an exhaustive search over all the available network-traffic and physical layer channel capacity information up to the current slot.However, as the total number of users increases, the number of search states grows exponentially thereby incurring high-computational complexity.Moreover, the transmission of the newly generated packets of selected users is not allowed in order to maintain the active user prediction determined via the previous network traffic, inevitably resulting in throughput degradation.The dynamic queue (DQ) protocol introduced in [8] delivers a large portion of performance gain attained by MQSR solution but at reduced complexity.By viewing the traffic as a flow of transmission periods (TP), the DQ protocol otherwise aims for minimization of the expected TP duration by exploiting the MPR property.To further reduce the idle period of users with empty buffer, a modification of DQ scheme that includes active user identification at the receiver is subsequently introduced in [9].In [10],  a predictive multicast polling (PMP) scheme was proposed for the general finite buffer size.This approach relies on active user prediction slot by slot, and can significantly improve system throughput since packet blocking is no longer necessary.However, the computational complexity is still a concern.The bit-map assisted dynamic queue (BMDQ) protocol [11], which is essentially a modified DQ scheme, inserts an extra TDMA slot at the head of each TP for channel access/reservation request.However, such an overhead will reduce the bandwidth efficiency, especially when the number of users is large.The two major performance bottlenecks inherent in the existing multipacket reception (MPR) MAC protocols are the computational complexity and the packet blocking constraints.In order to optimize the number of concurrent transmissions, the central controller may rely on an exhaustive search to estimate the buffer status of each user, thus resulting in a high-computational load.Second, the newly generated packets are not allowed to enter the buffer (hence blocked) for maintaining a static buffer status during each processing round.

Paper contributions
Relying on a simple flag-assisted mechanism and on an associated multipriority user grouping strategy, this paper proposes a new MPR MAC protocol which is applicable to both the homogeneous and heterogeneous cases.Compared with existing protocols, the proposed scheme through grouping users according to the prescribed service priority has two unique advantages.First, it avoids the search for the active users and thus reduces computational complexity [7,10].Second, it is free from the packet blocking constraint and can further improve the throughput performance [7][8][9].Also, unlike [11] in which a longer overhead is appended for aiding protocol design, the proposed approach relies only on a single bit redundancy and hence minimizes bandwidth expansion.The novel aspects of the proposed MPR MAC scheme can be specially summarized as follows.
(1) A single flag-bit is appended on the tail of the transmitted packet for indicating the existence of the following packet in the buffer.This scheme provides the central controller with the certain partial knowledge about the subsequent network traffic in a deterministic fashion.The flagassisted information can greatly simplify the channel access which can be reserved directly for the users with packets ready to transmit.Note that the deterministic knowledge is only available for those users whose packets are successfully received by the base station.Although the mechanism similar to the flag-bit may be available in the existing network protocol such as IEEE 802.11 [12], it is never exploited for facilitating the MPR MAC protocol design.
(2) By exploiting the on-off flag signature, we propose to classify the users into three groups with different service priorities: the ACTIVE group consisting of the users with packets to send, the STANDBY group consisting of those with empty buffers, and the PRe-EMptive (PREM) group accommodating those who have stayed in the STANDBY or the ACTIVE group longer than certain waiting period.The users in the ACTIVE group are guaranteed to have packets waiting for transmission.However, those users in the STANDBY group are NOT guaranteed to have no packets waiting for transmission, because there may be packets generated after last successful transmission (note that the successful transmission is the only way for the users to convey the flag-bit information to the base station).The inclusion of the complementary PREM group is to avoid unfair scheduling that can occur in a binary grouping strategy.(If there are merely two groups, users in the STANDBY group would suffer an unlimited service delay since the channels could be constantly reserved for some ACTIVE links with heavy traffic.)With the trigroup user classification scheme, the priorities of service (from high to low, resp.) are PREM, ACTIVE, and STANDBY.The proposed method integrates the deterministic knowledge of those users in the ACTIVE group and the estimated states of those users in the STANDBY group to derive the optimal waiting period for the PREM group.
(3) Through a Markov chain model of the proposed protocol and an associated analysis of the steady-state transition probabilities, we propose a method for determining the optimal waiting period, subject to the constraint that a uniform mean delay requirement among all users must be met.
(4) In the proposed scheme, the number of users permitted for channel access is deterministically set to be that attaining the MPR channel capacity.This prevents the channel from being overloaded and hence avoids irrecoverable packet collision in a heavy traffic environment.
The rest of paper is organized as follows.Section 2 introduces the MPR channel model.Section 3 describes the proposed MGPQ protocol.The problem of optimal waiting period selection is addressed in Section 4. Simulation results are given in Section 5. Finally, Section 6 concludes this paper.

MPR CHANNEL MODEL
Following [8], the MPR channel matrix for M users is described as where C n,k = P r {k packets correctly received|n packets transmitted} (2) for 1 ≤ n ≤ M and 0 ≤ k ≤ n.Denote C n = n k=1 kC n,k the expected number of the correctly received packets when n packets are concurrently transmitted.The capacity of an MPR channel is defined as η = max n=1,...,M C n .Note that the numbers of simultaneously transmitted packets to achieve the channel capacity may not be unique.Let be the minimum amount of capacity-achieving packets.
Hence the maximal number of users permitted to access the channel should be n 0 , since there will be no further improvement in system capacity if more than n 0 users are simultaneously served.Note that the MPR matrix (1) can be determined via the physical layer performance metric such as bit error rate; an illustrative example based on CDMA communication can be found in [8].

System description
A centralized network typically involves two-side communications, namely, downlink and uplink.The former is the transmission from the central controller to users, and the latter is the transmission from users to the central controller.As all the packets of downlink are stored at the buffer of the central controller, MAC can easily exploit the multipacket capability of PHY layer due to the full knowledge about the packet status for all users.Nevertheless, there must be some specially designed mechanism for scheduling the uplink transmission due to the lack of full knowledge about the status of users' buffers in which the packets are stored.We will focus on the uplink in this paper.In the proposed system model, all accesses to the common wireless channel are controlled by the central controller.At the beginning of each slot, the central controller broadcasts an access set to inform the users who are allowed to access the channel in the current slot.Upon reception, the central controller acknowledges the users whose packets are successfully received.Users who transmit packets but do not receive the acknowledgments assume their packets are lost, and will retransmit whenever they are enabled.At the end of this slot, the central controller updates the access set by the proposed multipriority grouping strategy.In this paper, it is assumed that feedback acknowledgement channel (from the central controller to the users) is error free and the incurred time delay is negligible.As in [8], we assume that each user has a buffer of size two.We propose to append one flag bit on the tail of the transmitted packet for indicating if there is a following packet in the buffer.The extra flag bit has the advantage to provide explicit information about the incoming traffic condition, as discussed next.

An illustrative example
Figure 1 shows an illustrative example for the proposed MGPQ protocol, where the total number of users is M = 4 and n 0 = 2 users are selected to simultaneously access the channel.In MGPQ, all users are classified into three different priority groups (PREM, ACTIVE, and STANDBY).The condition of the user i is summarized in a tag as shown in Figure 1(a), in which the first field represents user ID, second field is the count of waiting slots, third field marks the on/off status of the flag bit, fourth and fifth fields represent the contents of the buffer.Figure 1(b) depicts the operation of the proposed protocol during three consecutive time slots.At the end phase of slot t − 1, there is no user in the PREM group, user 1 with two packets and user 2 with one packet are in the ACTIVE group, and user 3 with one packet and user 4 with two packets are in the STANDBY group.The detailed operations of the proposed MGPQ are described as follows.
(1) At the start phase of slot t, with empty PREM group, users 1 and 2 in the ACTIVE group are selected for transmitting packets.
(2) At the end phase of slot t, (i) upon successful packet reception, user 1 with flag bit on in the start phase is retained in the ACTIVE group; the flag bit is then switched off since there is no packet in the second buffer.User 2 is moved to the tail of the STANDBY group since the flag bit is off; (ii) the waiting slots of both users 1 and 2 are reset to 1, and the waiting slots of the yet-to-be-served users 3 and 4 are increased to 2; (iii) user 3 has a newly generated packet in the second buffer, and the associated flag bit is switched on.
(3) At the start phase of slot t + 1, there is no user in the PREM group and there is only one user in the ACTIVE group, so users 1 and 3 are selected.
(4) At the end phase of slot t + 1, (i) upon successful packet reception, user 1 is moved to the tail of the STANDBY group (flag bit off).User 3 is moved into the ACTIVE group, and then flag-bit is switched off; (ii) both the waiting slots of users 1 and 3 are reset to 1, and the waiting slots of the yet-to-be-served users 2 and 4 are increased to 2 and 3 respectively; (iii) because user 4 has stayed in the STANDBY group for a certain waiting period S = 3 (to be specified later), it is moved into the PREM group.
(5) At the start phase of slot t + 2, there is one user in the PREM group and one user in the ACTIVE group, so users 4 and 3 will be selected.

Proposed MGPQ algorithm
The proposed MGPQ protocol is now stated as follows, and the resulting state transition conditions are summarized in Table 1.
(I) Put all users into the PREM group.
(II) Select first n 0 users (by the order of PREM, ACTIVE, and then STANDBY group) to access the channel.
(a) If the packet of a certain user is received successfully, then put the user to the tail of the ACTIVE (if the flag-bit is on) or STANDBY group (if the flag-bit is off).And reset its count of waiting slots to zero.
(b) If, for a certain user, the buffer is empty (no packet sent) or there is packet transmitted but not successfully received, and then put the user back to the tail of the STANDBY or ACTIVE group in which the user originally stayed.
(III) Increase waiting slots of all users by one.
(IV) Move those users with waiting slots equal to S to the PREM group.
(V) Repeat steps (II) to (IV).We note that, in the initial step, all users should be put in the PREM group rather than the STANDBY group.The rationale behind this choice is to avoid unfair scheduling when the packet generating probability is high.Indeed, if the protocol starts with all users in the STANDBY group, the first-selected n 0 users are likely to stay ACTIVE for a long time.The channel will thus be reserved for such ACTIVE users (with higher service priority), and those in the STANDBY group will then suffer a long delay.

Stability
System stability in the MAC design is extremely important since it guarantees all users with acceptable delays.A fixed packet arrival rate vector is stable if a transmission probability vector can be found to make all the queues in the corresponding system are stable [13].However, it is difficult to derive the stability region for MPR protocols due to the complicated interactive queue behavior.Another approach to characterize the stability in the systems with finite buffer size is the absence of deadlock [14], or equivalently, all packets will be successfully received with finite delay.In this section, instead of finding the stability region, we will prove that the MGPQ MAC protocol is stable in terms of the finitedelay criterion.
According to the proposed protocol, the worst case occurs when a certain user is assigned with the lowest service priority in the STANDBY group while having two packets in the buffer.In this case, the second buffered packet will experience the longest service delay d max .To prove that the average of d max is finite, we need the following two lemmas (the detailed proofs can be found in Appendices A and B, resp.).Lemma 1.Let p ms be the minimal probability that a packet can be successfully received.Then p ms is bounded away from zero.That is, there exists δ > 0 such that p ms ≥ δ > 0.
Lemma 2. Let t k be the total time slots elapsed after k rounds of channel access (k ≥ 1), and let t max denote the maximal waiting slots for each access.Then we have where and S is the waiting period. ( Based on the above two lemmas, the following theorem can be sustained.

Theorem 1. The mean worst-case delay E[d max ] satisfies
Proof.The mean worst-case delay can be expressed as , where E[d 1 ] and E[d 2 ] are the averaged delays upon which the first and the second packets associated with the last-to-be-served user are successfully received, respectively.We first observe that We note that the considered user will be moved to the ACTIVE group when the first packet is successfully received.
In the worst-case, d 2 will incur when all the M users are in the ACTIVE group.Therefore, the central controller will assign users to access the channel in a round-robin way, and the average time slots elapsed per service round is thus M/n 0 .Thus, it is implied that Combining ( 7) and ( 8), we obtain Note that for those protocols with more than n 0 users allowed to access the channel simultaneously, deadlock may occur if C n0+i,0 = 1 for i ≥ 1.With the benefit from the EURASIP Journal on Wireless Communications and Networking fixed n 0 accesses, MGPQ is more robust in such a channel environment.

OPTIMAL WAITING PERIOD SELECTION
In the proposed protocol, the number of users permitted for channel access is fixed to be n 0 , namely, the one attaining the MPR channel capacity.A natural criterion for determining the waiting period S is to maximize the probability that each of the selected n 0 users has a packet to send.We first note the probability of the user i (selected from PREM) with a packet to transmit after waiting a period of S is at least [15] where p i denotes the packet generating probability of the user i.This implies that the larger the waiting period S, the more likely the users in the PREM group have packets to send.As a result, S should be kept as large as possible.However, the unlimited increase in S may incur severe delay penalty.Particularly if S→∞, the transition from STANDBY to PREM is prevented and the proposed trigroup priority queuing protocol degenerates into a bigroup scheme.To determine an S for striking a balance between large p i and small delay, we propose to seek the optimal S opt with which the following set of constraints on the mean delay per user is satisfied: where D i (S) stands for the mean delay of the user i and D r is a uniform delay requirement.
To find the desired S from (11), one crucial step is to determine an explicit expression of D i (S) in terms of S. Toward this end, we shall determine all the possible transitions of states (an exact definition of a "state" will be specified later) in the proposed protocol.This can be solved by applying Markov chain analysis shown below.

Markov chain
Associated with the user i (1 ≤ i ≤ M), we define x i (t), y i (t), and z i (t) to be the assumed value of the waiting slots, the indication of the flag, and the number of packets in the buffer at the tth time slot, respectively.Hence we have x i (t) ∈ {1, . . ., S}, y i (t) ∈ {0, 1}, and z i (t) ∈ {0, 1, 2}.(The waiting period S ≥ M/n 0 and the buffer of size two are assumed hereafter if not specified otherwise.)Let us further collect x i (t), y i (t), and z i (t) for all users to form X(t) = (x 1 (t), . . ., x M (t)), Y (t) = (y 1 (t), . . ., y M (t)), and Z(t) = (z 1 (t), . . ., z M (t)).The proposed protocol can be modeled by a Markov chain with state space We note that the number of states is at most (S•2•3) M .However, since in each time slot, exact n 0 users can simultaneously access the channel, it follows that (i) the number of "1" in X(t) must be equal to n 0 ; (ii) no more than n 0 entries in X(t) will assume the same value.Taking the above constraints into account and using the permutation and combination theory, the number of distinct outcomes of X(t) is (see Appendix C for proof) where the integers m i s are found as the solutions to the following equations: With ( 13) and the constraint that there must be packet(s) in the buffer for the users in the ACTIVE group (i.e., (y i , z i ) / =(1, 0)), the total number of possible states in the system can be reduced to If there exists some p i = 0 or 1, the total number of states will be further reduced.

State transition probability
We proceed to compute the state transition probabilities as follows.Assuming that the events of packet generation among users are independent, we have where In this paper, we assume that the above limit exists, and the assumption is justified by numerical results.The mean delay D i (S) can be then determined as follows.

Computation of the mean delay
According to Little's law [16], we have where N i (S) is the average number of packets in the buffer of the user i, and λ i (S) is the packet departure rate (i.e., throughput) of the user i.Let z i, j be the number of buffered packets of the user i in the jth state, then we have Also, denoted by p B,i (S) the packet blocking probability of user i, therefore where access set A and success probability P S are defined in Appendix D. Then it follows that Substituting ( 19) and ( 21) into (18), we can obtain a functional relation of D i (S) in terms of S. The solution to (11) can then be computed via numerical search.

Homogeneous case
In the homogeneous environment, that is, the packet generating probabilities of all users are identical, it can be shown that the mean delay in (18) is independent of waiting period S (the detailed proof is referred to Appendix E).An intuitive explanation of this phenomenon is that, when subject to the same packet generating probability, all users tend to share the same service priority, and hence experience the same average service delay irrespective of the choice of S.

Extension to finite buffer size
Although the previous derivation is obtained under the assumption that each user has a buffer of size two, it can be easily extended to the case with finite buffer size B by allowing z i (t) ∈ {0, 1, 2, . . ., B}.The N S in (15) must also be increased to N C (2B + 1) M accordingly.This case will be simulated and compared with other MPR MACs in the next section.

NUMERICAL RESULTS
In this section, simulations are carried out by Matlab and we first compare the results with the theoretical analysis for a simple scenario to validate the derivation in Section 4. In this paper, throughput is defined as the average of successful packet transmissions per slot; delay is defined as the average elapsed time slots for a packet to be successfully received by central controller; packet loss ratio (PLR) is defined as the average ratio of the number of blocked packets to the number of generated packets.Then in the heterogeneous case, the individual delay curves with increasing S are plotted to show the effect of S on system performance.In the homogeneous case, throughput, delay, and PLR of MGPQ are further compared with those of DQ.Finally, the throughput performance with more users and finite buffer size of MGPQ, predictive multicast polling (PMP) [10], and DQ [8] are compared to verify their scalability.

Validation of analytical results
This simulation aims at validating the analytical performance results in Section 4. The test system is a CDMA network with random spreading; the packet length, spreading gain, number of correctable errors in a packet, and noise variance are, respectively, 200, 6, 2, and 10 dB as adopted in [8].The capacity of such an MPR channel in this scenario is 1.7925, which is attained by n 0 = 2 concurrent transmissions in each time slot.The total number of users is set to be M = 3.We note that the incurred overhead due to the insertion of a flag bit is 1/201 < 0.005, which is rather small and is thus neglected in the performance evaluation.Figures 2  and 3, respectively, show the mean throughput and mean delay curves for the two scenarios: (i) the heterogeneous case with packet generating probabilities [p 1 , p 2 , p 3 ] = [0.1,0.9, 0.9], and (ii) the homogeneous case with an equal packet generating probability p 1 = p 2 = p 3 = 0.5.As we can see from the figures, in both cases the theoretical results well predict the corresponding simulated outcomes.It can also be seen that, in the homogeneous environment, the mean throughput and mean delays remain unchanged as the waiting period increases: this confirms the assertion in Section 4.4.For the heterogeneous case, we impose the mean delay requirement of each user to be less than 4 time slots; by using the results in Section 4.3, the optimal waiting period is computed to be S opt = 7. Figure 4 depicts the mean delay of each user.It can be seen that the delays of all the three users are indeed kept below 4 when S = S opt = 7.We also note from Figure 4 that users with large (or small, resp.)packet generating probabilities p i experience less (or more) delay.This is not unexpected since, if p i is large, the flag bit will be on with a high probability and the user will be allowed for accessing the channel more frequently.

Comparison with previous work of [8]
This simulation further compares the proposed MGPQ scheme with the DQ protocol [8].We will consider the homogeneous case since the DQ protocol is exclusively tailored for this scenario.The respective throughput curves, including the slotted ALOHA with optimal retransmission probability [8], are plotted in Figure 5.As we can see, the proposed solution can outperform the DQ protocol over a wide range of the packet generating probabilities.The maximal achievable throughput improvement is about 40% for p = 0.25.Also, the proposed approach almost achieves the channel capacity 1.7925 whenever P ≥ .3,whereas the DQ protocol can attain at most 96% of the capacity for P ≥ .8. Figure 6 shows the delay performances (measured via time slots per packet) of the two schemes.As shown, the proposed method yields a smaller mean delay with light traffic (P < .4).This is because the MGPQ method tends to reserve the channel access for those who are more likely to 1

Homogeneous users
Simulation: p = [0.1,0.9, 0.9] Analysis: p = [0.1,0.9, 0.9] Simulation: p = [0.5, 0.5, 0.5] Analysis: p = [0.5, 0.5, 0.5] have packets to send, thus avoiding the time latency incurred by the procedure of network-wide active user prediction.In a heavy-traffic environment, the DQ protocol will block the incoming packets, thereby reduce the mean delay.However, this comes at the expense of a larger PLR, as evidenced in Figure 7.

General case
In this simulation, we test the proposed protocol with finite buffer size, and compare the performance with the DQ [8] Simulation, user 1: p = 0.1 Simulation, user 2: p = 0.9 Simulation, user 3: p = 0.9 Analysis, user 1: p = 0.1 Analysis, user 2 & 3: p = 0.9 and PMP [10] methods (the latter is specifically devised for the case with finite buffer size).We consider the system setup as in [10] which is described in terms of the MPR matrix as  thus with n 0 = 2, η = 2, and set the total traffic load to be the same with channel capacity. Figure 8 shows the throughput curves of the three methods as the buffer size increases from 2 to 100.It is seen that the DQ scheme results in the lowest throughput, mainly due to the packet blocking constraint.The proposed MGPQ protocol outperforms the PMP solution, thanks to the benefits from the priority mechanism which can reduce the blocking rate especially when the buffer size is small.Figure 9 further depicts the respective throughput performance as the number of user increases from 2 to 100.The result shows that the DQ protocol degrades the performance severely when there are more than two users.This is mainly because in the DQ protocol all users, no matter with packet or not, will be served continually until their packets are received successfully or empty slot occurs.With more than n 0 users in the system, the probability of serving idle users is definitely increased.

CONCLUSION
In this paper, we proposed a new approach to design the MAC protocol for wireless networks with multipacket reception (MPR) capability.The proposed approach relies on the flag-bit-assisted knowledge about the presence of buffered packets as well as a multipriority user grouping strategy.The advantages of the proposed method are three folds: (1) it is applicable to both the heterogeneous and homogeneous environments, whereas almost all existing protocols developed for the MPR channel are exclusively tailored for the latter case; (2) the insertion of a single bit facilitates the acquisition of network traffic condition with minimal bandwidth expansion; (3) the adopted user grouping policy avoids computationally intensive search for the active users as required in the existing protocols.To prevent an infinitely long service delay in the heterogeneous environment, the waiting period of those yet-to-be-served users can be determined subject to a specified delay requirement.Simulation results show that, compared with the DQ protocol, the proposed scheme achieves higher throughput, reduces the mean delay penalty in light traffic condition, and yields a smaller packet loss ratio.Also, the proposed MGPQ protocol outperforms the predictive multicast polling (PMP) protocol for the general case with finite buffer size.Future work will focus on generalizing the result in this paper to the more realistic generalized MPR channel model [17].

APPENDICES A. PROOF OF LEMMA 1
According to the definition of η in Section 2, we have If C n0,n0 = 0, then (A.1) becomes where η corresponds to a higher or equal channel capacity but achieved by sending n 0 − 1 packets simultaneously.Note that the inequality in (A.2) holds because the success probability of transmitting more packets simultaneously is less than or equal to that of transmitting less packets under the same channel condition, that is, 2) conflicts with the definition of channel capacity, we conclude that C n0,n0 > 0 with proof by contradiction.Thus, we have p ms ≥ C n0,n0 = δ > 0.

B. PROOF OF LEMMA 2
We first derive the t max as follows.
For 1 ≤ S ≤ M/n 0 , do the following.
Let n PREM , n ACTIVE , and n STANDBY denote the number of users in the PREM, ACTIVE, and STANDBY groups, respectively, and then we have Because the user with waiting slots equal to S will be moved to the PREM group, the waiting slots of the users in the ACTIVE and STANDBY groups must be less than S, that is, equal to 1, 2, . . ., or S − 1. Besides, as n 0 users are selected to access the channel in each slot, the maximal number of users with the same waiting slots must be less than or equal to n 0 .Therefore, it can be seen that Combining (B.1) and (B.2), we have 3) shows that there will always be at least n 0 users in the PREM group waiting for channel access, which implies that all users will be selected (n 0 users per slot) to access the channel in turn in the PREM group, that is, For M/n 0 < S < ∞, the following hold.According to the MGPQ protocol defined in Section 3.3, all users are in the PREM group initially.After M/n 0 slots, there will be less than n 0 users left in the PREM group because M − M/n 0 n 0 < n 0 ; and no user reenters the PREM group because M/n 0 ≤ M/n 0 < S. Hereafter, the input rate of the PREM group is less than or equal to the output rate (n 0 /slot) of the PREM group, which implies that the users entering the PREM group will be immediately selected to access the channel, that is, t max = S. (13) It is known from the multinomial theorem that [15]

C. PROOF OF N C IN
The above multinomial coefficient can be interpreted as the number of distinct ways to permute a multiset of n elements, and k i 's are the multiplicities of each distinct element.According to the MGPQ protocol defined in Section 3.3, there will be always exactly n 0 users whose waiting slots are one.However, there may be 0 to n 0 users with the same waiting slots ranging from 2 to S, because the users in the ACTIVE group may be selected with higher priority than those in the STANDBY group.Let m i stand for the number of distinct waiting slots which i users have waited for, 0 ≤ i ≤ n 0 .Then we have In (C.2),(a) is the possible combinations for distinct n 0 users whose waiting slots equal 1; (b) accounts for possible combinations of m i 's in the remaining S − 1 waiting slots; (c) accounts for possible combinations of i's in the remaining M −n 0 users; (d) is the constraint for multinomial coefficient (b), that is, summation of m i 's must equal S − 1; and (e) is the constraint for multinomial coefficients (c), that is, summation of users in each m i 's must equal M − n 0 .

D. DESCRIPTION OF STATE TRANSITION PROBABILITY IN SECTION 4.2
Denoted by A = {a 1 , a 2 , . . ., a n0 } the index set of the users who are allowed to access the channel.Also, let n a be the number of nonzero elements in {z a1 , z a2 , . . ., z an 0 }, that is, the number of packets that will be sent simultaneously.Define P S as the success probability of selected user with packet to send in each slot, then Thus, the probabilities of the increment of state for X, Y , Z components, that is, P x (Δx i ), P y (Δy i ), and P z (Δz i ) can be calculated by (D.2) according to current state (X, Y , Z).If each user has equal packet generating probability, without loss of generality, we can write the transition matrix as   .
According to the property of Kronecker product, we have , where NC α=1 g α = 1; , where Now, (17) can be written as The above derivations prove the throughput (E.6), mean delay (E.7), and blocking probability (E.5) of the system with equal packet generating probability are the functions of packet generating probabilities, but independent of S.

4
The tag designating the status of the ith user, 1 ≤ i ≤ The priority grouping process within three consecutive time slots

Figure 1 :
Figure 1: An illustrative example of MGPQ with four users.

Table 1 :
Transition conditions among three different priority groups.From To PREM (1st priority) ACTIVE (2nd priority) STANDBY (3rd priority) PREM (1st priority) -without getting permission -transmitted packet (flag-bit = 1) -transmitted packet (flag-bit = 0) to access the channel being successfully received being successfully received -transmitted packet not -transmitted packet not being being successfully received, successfully received, and previous flag-bit = 1 and previous flag-bit = 0 -no packet for transmission ACTIVE (2nd priority) -without getting permission -transmitted packet (flag-bit = 1) -transmitted packet (flag-bit = 0) to access the channel being successfully received being successfully received for S slots -transmitted packet not being successfully received -without getting permission to access the channel for less than S slots STANDBY (3rd priority) -without getting permission -transmitted packet (flag-bit = 1) -transmitted packet (flag-bit = 0) to access the channel being successfully received being successfully received for S slots -transmitted packet not being successfully received -no packet for transmission -without getting permission to access the channel for less than S slots

Figure 2 :
Figure 2: Mean throughput performance of the proposed MGPQ.

Figure 3 :
Figure 3: Mean delay performance of the proposed MGPQ.