Table of Contents Author Guidelines Submit a Manuscript
Research Letters in Communications
Volume 2008, Article ID 730610, 5 pages
Research Letter

A High-Throughput Random Access Protocol for Multiuser MIMO Systems

1Shanghai Research Center for Wireless Communications, Shanghai Institute of Microsystem and Information Technology, Shanghai 200050, China
2Simula Research Laboratory, 1325 Lysaker, Norway

Received 14 March 2008; Accepted 28 April 2008

Academic Editor: Edward K. S. Au

Copyright © 2008 Haiyou Guo et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


We propose a high-throughput random access protocol for 2×2 multiuser multiple-input multiple-output (MIMO) systems. The cross-layer mechanism utilizes the packets combining technique to exploit the advantages of both spatial multiplexing and multipacket reception. Analytical result indicates that the proposed scheme achieves 0.669 per spatial degree of freedom in stable throughput, which is much higher than those in the existed studies.

1. Introduction

Random access (RA) is a cost-efficient medium access process in next generation wireless networks to support high-rate high-capacity multimedia services. The traditional RA schemes, for example, slotted ALOHA, incur the throughput penalty due to serious collision. The emerging multiple-input multiple-output (MIMO) technology provides a new dimension of performance enhancement for RA schemes. MIMO is able to improve the throughput in two aspects, that is, a single-user throughput improvement via the spatial multiplexing (SM) such as V-BLAST [1]; and the whole system throughput improvement via the multipacket reception (MPR) capability [2].

Collision resolution (CR) has been investigated in both MIMO systems and single-antenna systems. For MIMO systems, a multiuser detector was developed with space-time signature induced by the Alamouti-type space-time block code (STBC) [2]. Consequently, the slotted ALOHA can operate over Alamouti-type STBC to achieve the MPR capability. We will term this scheme as ALOHA-Alamouti. In the 2×2 multiuser MIMO system, however, such MPR is at most applicable for the 2-fold collision, and hence incurs the undesirable throughput loss for the moments of severe collision more than 2 folds due to the ineffective Alamouti-type coding. For the single-antenna systems, multiuser packets combining techniques were employed in network diversity multiple access (NDMA) [3] and successive interference cancellation tree algorithm (SICTA) [4] to improve the throughput. It has been shown that SICTA has the highest throughput 0.693 among the splitting algorithms. However, SICTA requires unbounded amount of memory to store the mixed packets, and NDMA may be inapplicable in multiuser MIMO due to the assumption of the fading channel coherence time in the order of the packet slot. This assumption may not be realistic since the channel coefficients are usually correlated over adjacent slots.

In this letter, we propose a high-throughput RA protocol for 2×2 multiuser MIMO systems. With a cross-layer design approach, our scheme utilizes the adaptive packets combining technique to reconstruct Alamouti-type STBC only for the 2-fold collision, and hence avoids the undesirable throughput loss. Then, the scheme can exploit the benefits of both V-BLAST and Alamouti-type STBC to improve the throughput. The proposed scheme is able to achieve stable throughput as high as 0.669 per spatial degree of freedom while maintaining the implementation simplicity like slotted ALOHA. In addition, the scheme can operate on the block fading channel without the constraint on the coherence time.

Bold uppercase letters denote matrices and bold lowercase letters denote vectors. Complex conjugate, transpose, and inverse operations are represented by (), ()𝑇, and ()1, respectively. [𝐀]𝑖𝑗 denotes the (𝑖,𝑗) entry of matrix 𝐀. 𝐈𝑀 is the identity matrix of size 𝑀. || represents the cardinality of a set.

2. Modeling Preliminaries

In a cellular network, there is a set of users, denoted as 𝑄={1,2,,𝑞,}, communicating with the base station (BS). All transmissions initiated by a source 𝑞 are directed to a single destination 𝑑𝑄. Each user and the BS are equipped with two antennas. The system is equally slotted in time, and the length of one time slot is 𝑇.

At each slot 𝑛, each user 𝑞 may transmit a packet consisting of 2𝐿 symbols, which can be demultiplexed into two subpackets with the same length and fed into two transmit antennas. We denote these subpackets as𝐱𝑞𝑥(𝑛)=𝑛,𝑞(1)𝑥𝑛,𝑞(2)𝑥𝑛,𝑞;𝐲(𝐿)𝑞𝑦(𝑛)=𝑛,𝑞(1)𝑦𝑛,𝑞(2)𝑦𝑛,𝑞.(𝐿)(1)The symbols 𝑥𝑛,𝑞(𝑙) and 𝑦𝑛,𝑞(𝑙), 𝑙=1,2,,𝐿, are assumed drawn from a finite QAM constellation. We assume the symbol period is 𝜏 such that 𝑇=𝐿𝜏. Let 𝐼(𝑛)𝑄 denote the set of users who are active at slot 𝑛. If |𝐼(𝑛)|2, we say that an |𝐼(𝑛)|-fold collision occurs in the channel.

In our proposed scheme as shown in Figure 1, we define three exclusive categories of time slot: remediable colliding slot (RC-Slot), compensating slot (𝐶-Slot), and trivial slot (𝑇-Slot). If and only if |𝐼(𝑛)|=2 and |𝐼(𝑛1)|2, we refer to slot 𝑛 and 𝑛+1 as the RC-Slot and the 𝐶-Slot, respectively. The 𝐶-Slot immediately follows the RC-Slot; and it is reserved to retransmit the contended packets during the RC-Slot. A slot is termed as 𝑇-Slot in case it is neither the RC-Slot nor the 𝐶-Slot. Each slot serves as only one of the three types. In Figure 1, slot 𝑛 and 𝑛+3 are RC-Slot; slot 𝑛+1 and 𝑛+4 are 𝐶-Slot; and the other slots are 𝑇-Slot.

Figure 1: Packet scheduling of the high-throughput random access protocol for 2×2 multiuser MIMO systems.

If slot 𝑛 acts as a 𝑇-Slot or an RC-Slot, the active user transmits/retransmits the packets in the original form of (1). The received baseband discrete-time signal at the BS is𝐳𝑛(𝑙)=𝑞𝐼(𝑛)𝐇𝑛,𝑞𝑥(𝑙)𝑛,𝑞𝑦(𝑙)𝑛,𝑞(𝑙)+𝐯𝑛(𝑙),𝑙=1,2,,𝐿,(2)where 𝐯𝑛(𝑙) is additive noise; and 𝐇𝑛,𝑞(𝑙) is the 𝑞th user's 2×2 channel matrix. On the other hand, if slot 𝑛 acts as a 𝐶-Slot, only the two users attributed to 𝐼(𝑛1) are allowed to retransmit their packets in the compensating form of 𝐱𝑞(𝑛1) and 𝐲𝑞(𝑛1). Specifically, the received signal at the 𝐶-Slot 𝑛 can be written as𝐳𝑛(𝑙)=𝑞𝐼(𝑛1)𝐇𝑛,𝑞(𝑙)𝑦𝑛1,𝑞𝑥(𝑙)𝑛1,𝑞(𝑙)+𝐯𝑛(𝑙),𝑙=1,2,,𝐿.(3)We assume a flat fading channel and the channel matrices are independent across different users. The BS has the perfect channel state information. These assumptions are reasonable in the pilot-assisted orthogonal frequency division multiplexing (OFDM) systems. All the entries of 𝐇𝑛,𝑞(𝑙) are with zero mean, independent real, and imaginary parts, forming an i.i.d. Gaussian collection. Note that the channel coefficients do not change significantly during the period of (𝐿+1)𝜏 to meet the requirement of correct demodulation for the reconstructed Alamouti codes, which indicates𝐇𝑛1,𝑞(𝑙)=𝐇𝑛,𝑞(𝑙),𝑙=1,2,,𝐿.(4)

3. High-Throughput RA Protocol for 2×2 Multiuser Mimo Systems

In the proposed scheme, the V-BLAST is designated as a basic mode while the Alamouti-type STBC can be reconstructed by the packets combining for the remediable 2-fold collision.

3.1. Descriptions of Proposed Protocol

The mechanism of the proposed protocol is specified as follows.

3.1.1. Immediate Feedback

At the end of each slot 𝑛, each user obtains a 4-ary feedback from the BS with the information of |𝐼(𝑛)|. Such a feedback indicates the information of |𝐼(𝑛)|=0, |𝐼(𝑛)|=1, |𝐼(𝑛)|=2, and |𝐼(𝑛)|>2. Based on the feedback and its own state, each user can deduce the category of the current slot and decide the operation in the next slot. To determine the number of the users involved in the collision, the appropriate collision detection technique is employed at the BS similar to that of NDMA [3].

3.1.2. Initial Transmission

If one packet arrives during an RC-Slot, its first transmission is randomly scheduled in a slot except the 𝐶-Slot. Otherwise, it is transmitted immediately at the next slot.

3.1.3. Collision or Perfect Reception

If only one user sends a packet in a given slot, the packet is correctly received. If two users send packets during an RC-Slot, then the receiver should store the colliding packets; and the next slot is reserved only for these two users as a 𝐶-Slot. After combining the stored packets with the packets received during the 𝐶-Slot, the receiver can recover the desired packets from the 2-fold collision. However, no packet information can be extracted from a severe collision more than 2 folds, and the irrecoverable packets are discarded.

3.1.4. Retransmission of Irremediable Collisions

Each packet involved in an irremediable collision, independent of the others, must be stochastically retransmitted in slots later other than the 𝐶-Slot until the packet is suc-cessfully received.

Figure 1 shows an example of the protocol operation. At the end of slot 𝑛, since two consecutive feedbacks indicate |𝐼(𝑛1)|2 and |𝐼(𝑛)|=2, the active users during slot 𝑛, that is, 𝐼(𝑛)={𝑞1,𝑞2}, can deduce that slot 𝑛 and the next slot 𝑛+1 are RC-Slot and 𝐶-Slot, respectively. Thus, the receiver stores the mixed packets in slot 𝑛; and {𝑞1,𝑞2} will retransmit packets in the compensating form at the immediate next slot. Meanwhile, the inactive users during slot 𝑛, that is, {𝑞3,𝑞4,𝑞5}, can understand the same situation and hence keep silent in the next slot, although {𝑞4,𝑞5} have new arrivals during slot 𝑛. Thereafter, {𝑞4,𝑞5} will randomly schedule the new arrivals in the future slot except the 𝐶-Slot to avoid the collision with {𝑞1,𝑞2} in slot 𝑛+1. In the proposed scheme, each user decides his own operation based on the local information. Particularly, each user behaves independently in the RC-Slot and 𝑇-Slot analogous to the slotted ALOHA. The RC-Slot and 𝑇-Slot occur stochastically whereas the 𝐶-Slot succeeds to the RC-Slot determinately.

3.2. CR through Reconstructed Alamouti-Type STBC

In the proposed scheme, the colliding packets can be remedied with the help of the Alamouti-type STBC. Let us consider the case in Figure 1 where two users collide in an RC-Slot 𝑛. Then, the receiver stores the 2-fold colliding packets during slot 𝑛, that is, 𝐙𝑛=[𝐳𝑛(1)𝐳𝑛(2)𝐳𝑛(𝐿)], where𝐳𝑛𝑧(𝑙)=𝑛,1𝑧(𝑙)𝑛,2=(𝑙)𝑞𝑞1,𝑞2𝐇𝑛,𝑞𝑥(𝑙)𝑛,𝑞𝑦(𝑙)𝑛,𝑞+𝑣(𝑙)𝑛,1𝑣(𝑙)𝑛,2,(𝑙)𝑙=1,2,,𝐿.(5)

Once the RC-Slot has been detected, the system immediately enters the 𝐶-Slot. Thus, the users {𝑞1,𝑞2} send the compensating packet at slot 𝑛+1. Another 2-fold colliding packets can be received at the BS, that is, 𝐙𝑛+1=[𝐳𝑛+1(1)𝐳𝑛+1(2)𝐳𝑛+1(𝐿)], where𝐳𝑛+1𝑧(𝑙)=𝑛+1,1𝑧(𝑙)𝑛+1,2=(𝑙)𝑞𝑞1,𝑞2𝐇𝑛+1,𝑞(𝑙)𝑦𝑛,𝑞𝑥(𝑙)𝑛,𝑞+𝑣(𝑙)𝑛+1,1𝑣(𝑙)𝑛+1,2,(𝑙)𝑙=1,2,,𝐿.(6)

Rearranging (5) and (6), with the assumption of (4), we can reconstruct the Alamouti-type STBC. Thus, we have [2]𝐳𝑛𝐇(𝑙)=𝑛,𝑞1(𝑙,1)𝐇𝑛,𝑞2𝐇(𝑙,1)𝑛,𝑞1(𝑙,2)𝐇𝑛,𝑞2𝐚(𝑙,2)𝑛,𝑞1𝐚(𝑙)𝑛,𝑞2+𝐯(𝑙)𝑛(𝑙),𝑙=1,2,,𝐿,(7) where 𝐳𝑛𝑧(𝑙)=𝑛,1(𝑙)𝑧𝑛+1,1(𝑙)𝑧𝑛,2(𝑙)𝑧𝑛+1,2(𝑙)𝑇;𝐯𝑛𝑣(𝑙)=𝑛,1(𝑙)𝑣𝑛+1,1(𝑙)𝑣𝑛,2(𝑙)𝑣𝑛+1,2(𝑙)𝑇;𝐚𝑛,𝑞𝑥(𝑙)=𝑛,𝑞(𝑙)𝑦𝑛,𝑞(𝑙)𝑇;𝐇𝑛,𝑞𝐇(𝑙,𝑖)=𝑛,𝑞(𝑙)𝑖,1𝐇𝑛,𝑞(𝑙)𝑖,2𝐇𝑛,𝑞(𝑙)𝑖,2𝐇𝑛,𝑞(𝑙)𝑖,1.(8)

By applying the following block linear filter:𝐈𝐖=2𝐇𝑛,𝑞2(𝑙,1)𝐇1𝑛,𝑞2(𝑙,2)𝐇𝑛,𝑞1(𝑙,2)𝐇1𝑛,𝑞1(𝑙,1)𝐈2(9)we extract the original packets from the packet mixture of (7). As a result, we obtain the interference free packets for users 𝑞1 and 𝑞2, shown as𝐖𝐳𝑛𝐇(𝑙)=𝑛,𝑞1(𝑙)𝐚𝑛,𝑞1𝐇(𝑙)𝑛,𝑞2(𝑙)𝐚𝑛,𝑞2𝐯(𝑙)+𝐖𝑛(𝑙),𝑙=1,2,,𝐿,(10)where𝐇𝑛,𝑞1(𝑙)=𝐇𝑛,𝑞1(𝑙,1)𝐇𝑛,𝑞2(𝑙,1)𝐇1𝑛,𝑞2(𝑙,2)𝐇𝑛,𝑞1𝐇(𝑙,2);𝑛,𝑞2(𝑙)=𝐇𝑛,𝑞2(𝑙,2)𝐇𝑛,𝑞1(𝑙,2)𝐇1𝑛,𝑞1(𝑙,1)𝐇𝑛,𝑞2(𝑙,1).(11)

Since 𝐇𝑛,𝑞1(𝑙) and 𝐇𝑛,𝑞2(𝑙) keep the Alamouti structure [2], the packets involved in the 2-fold collision are recovered with 2-fold diversity order merely through linear processing. However, to achieve the same diversity gain for the packet without collision, more sophisticated detection algorithm is required other than linear processing. Thus, the multiaccess interference (MAI) can be easily eliminated without sacrificing the space-time diversity gain. Consequently, in the proposed scheme, the transmission reliability is mainly impaired by the severe MAI rather than the noise. In the following throughput analysis, we will consider the error due to packet overlapping rather than that due to the noise.

3.3. Throughput Analysis

We evaluate the throughput using the tool similar to that developed for the standard ALOHA under the classical infinite population Poisson model [5, page 48]. Note that for the multiantenna scenario, the throughput is defined as the fraction of time during which the space-time channel carries useful information per spatial degree of freedom.

In the proposed scheme, each user behaves independently during the slots except for 𝐶-Slot. Then, we can assume that the start time of packets in the channel except for 𝐶-Slot follows a Poisson point process with parameter 𝛾 packets/second. Let Γ denote the normalized intensity, that is, Γ=𝛾𝑇. During a slot, the average number of the uncolliding subpackets is 2×Γ𝑒Γ, and the average number of the remediable colliding subpackets is 4×0.5Γ2𝑒Γ. Taking into account the extra cost of the 𝐶-Slot spent on the collision remediation, the average number of the required 𝐶-Slots is 0.5Γ2𝑒Γ. Therefore, the throughput, 𝑆, is given by𝑆=2Γ𝑒Γ+2Γ2𝑒Γ21+0.5Γ2𝑒Γ=2Γ+Γ2𝑒Γ2+Γ2𝑒Γ.(12)

Figure 2 compares the highest throughput of different RA schemes under the same scenario. Here 𝐺 is the normalized offered load [5] for ALOHA-Alamouti and ALOHA with V-BLAST. Since the highest throughput is unrelated to the scale of abscissa, we can derive that our proposed scheme, ALOHA-Alamouti, and ALOHA with V-BLAST can reach their own maximal throughput at 0.669, 0.420, and 0.36 per spatial degree of freedom, respectively. The latter two schemes improve the throughput only via MPR or SM, respectively. However, our strategy can permeate the flexibility of Alamouti codes to the MAC layer so as to employ the advantages of both MPR and SM. For the 𝑇-Slot without collision, the packet can be exactly received achieving the SM gain. For the RC-Slot and 𝐶-Slot, the packets of two active users can be resolved via the MPR capability of the reconstructed Alamouti-type STBC. Consequently, the proposed protocol achieves much higher throughput than the conventional ones. In addition, the achieved throughput approaches to the known highest throughput 0.693 in SICTA whereas the proposed protocol can behave as simple as slotted ALOHA.

Figure 2: Highest throughput per spatial degree of freedom achieved by different random access protocols for 2×2 MIMO systems.

We also make the network simulation for the proposed scheme used by a group of 𝐾 (𝐾=20,40,60) users each with single buffer. At each slot of the simulating system, if the user has no packet in his buffer, he independently generates a packet with probability 𝜎. If a packet transmission is unsuccessful, the packet is backlogged in the buffer and its retransmission is independently scheduled with probability 𝜈 except 𝐶-Slot, where 𝜈=𝜎. Figure 3 shows the throughput versus generation probability with different number of users. In Figure 3, the highest values of each throughput curve are closed to 0.669, and hence corroborate the theoretical analysis.

Figure 3: Throughput versus generation probability in the proposed scheme with 𝐾 users.

4. Conclusion

We have proposed a high-throughput random access protocol for the 2×2 multiuser MIMO systems. The throughput can be as high as 0.669 per spatial degree of freedom. Our scheme can be readily extended to the 2×𝑀 (𝑀>2) multiuser MIMO systems to accommodate 𝑀-fold collision [2].


The authors would like to thank the anonymous reviewers for their helpful comments, the research grants are from the Natural Science Foundation of Shanghai (no. 07ZR14104).


  1. G. J. Foschini, “Layered space-time architecture for wireless communication in a fading environment when using multi-element antennas,” Bell Labs Technical Journal, vol. 1, no. 2, pp. 41–59, 1996. View at Publisher · View at Google Scholar
  2. A. Stamoulis, N. Al-Dhahir, and A. R. Calderbank, “Further results on interference cancellation and space-time block codes,” in Proceedings of the 35th Asilomar Conference on Signals, Systems and Computers (ACSSC '01), vol. 1, pp. 257–261, Pacific Grove, Calif, USA, November 2001. View at Publisher · View at Google Scholar
  3. M. K. Tsatsanis, R. Zhang, and S. Banerjee, “Network-assisted diversity for random access wireless networks,” IEEE Transactions on Signal Processing, vol. 48, no. 3, pp. 702–711, 2000. View at Publisher · View at Google Scholar
  4. Y. Yu and G. B. Giannakis, “High-throughput random access using successive interference cancellation in a tree algorithm,” IEEE Transactions on Information Theory, vol. 53, no. 12, pp. 4628–4639, 2007. View at Publisher · View at Google Scholar
  5. R. Rom and M. Sidi, Multiple Access Protocols: Performance and Analysis, Springer, Berlin, Germany, 1990.