Compressive sensing based opportunistic protocol for exploiting multiuser diversity in wireless networks

Syed T. Qaseem, Tareq Y. Al-Naffouri, Tamim M. Al-Murad

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

9 Scopus citations

Abstract

A key feature in the design of any MAC protocol is the throughput it can provide. In wireless networks, the channel of a user is not fixed but varies randomly. Thus, in order to maximize the throughput of the MAC protocol at any given time, only users with large channel gains should be allowed to transmit. In this paper, a compressive sensing based opportunistic protocol for exploiting multiuser diversity in wireless networks is proposed. This protocol is based on the traditional protocol of R-ALOHA which allows users to compete for channel access before reserving the channel to the best user. We use compressive sensing to find the best user, and show that the proposed protocol requires less time for reservation and so it outperforms other schemes proposed in the literature. Also, as the proposed scheme requires less reservation time, it can be seen as an enhancement for R-ALOHA schemes in fast fading environment.

Original languageEnglish (US)
Title of host publication2009 IEEE 20th Personal, Indoor and Mobile Radio Communications Symposium, PIMRC 2009
DOIs
StatePublished - Dec 1 2009
Event2009 IEEE 20th Personal, Indoor and Mobile Radio Communications Symposium, PIMRC 2009 - Tokyo, Japan
Duration: Sep 13 2009Sep 16 2009

Conference

Conference2009 IEEE 20th Personal, Indoor and Mobile Radio Communications Symposium, PIMRC 2009
Country/TerritoryJapan
CityTokyo
Period09/13/0909/16/09

Keywords

  • Compressed sensing
  • Opportunistic communications
  • Protocols
  • Random access
  • Reservation ALOHA
  • Scheduling
  • Wireless networks

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Compressive sensing based opportunistic protocol for exploiting multiuser diversity in wireless networks'. Together they form a unique fingerprint.

Cite this