Non-Orthogonal Contention-Based Access for URLLC Devices with Frequency Diversity

05/03/2019 ∙ by Christopher Boyd, et al. ∙ aalto Aalborg University 0

We study coded multichannel random access schemes for ultra-reliable low-latency uplink transmissions. We concentrate on non-orthogonal access in the frequency domain, where users transmit over multiple orthogonal subchannels and inter-user collisions limit the available diversity. Two different models for contention-based random access over Rayleigh fading resources are investigated. First, a collision model is considered, in which the packet is replicated onto K available resources, K' ≤ K of which are received without collision, and treated as diversity branches by a maximum-ratio combining (MRC) receiver. The resulting diversity degree K' depends on the arrival process and coding strategy. In the second model, the slots subject to collisions are also used for MRC, such that the number of diversity branches K is constant, but the resulting combined signal is affected by multiple access interference. In both models, the performance of random and deterministic repetition coding is compared. The results show that the deterministic coding approach can lead to a significantly superior performance when the arrival rate of the intermittent URLLC transmissions is low.

READ FULL TEXT VIEW PDF
POST COMMENT

Comments

There are no comments yet.

Authors

page 1

page 2

page 3

page 4

This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.

I Introduction

Machine-Type Communication (MTC) is one of the main technologies in 5th Generation (5G) mobile communication. Within this very general category, we can distinguish two main use cases [1] with widely differing requirements—massive MTC (mMTC), capable of supporting a large number of sporadically communicating devices, possibly battery-operated, and Ultra-Reliable Low Latency Communication (URLLC) enabling mission-critical MTC. Of the two, the latter especially has been igniting researchers’ imaginations, as it would enable the implementation applications previously unattainable and considered futuristic, such as self-driving cars, remote surgery and telemetry, and more [2].

While downlink communications in a cellular setting is fairly flexible, a radical change in the uplink access protocol might be necessary in order to fulfill the requirements of the more demanding MTC use cases. One solution is communication based on random access. For mMTC, this is motivated by the sporadic, infrequent traffic patterns which require energy efficient protocols, and the fact that the control overhead involved in establishing the connection significantly exceeds the amount of actual data to be transmitted. In URLLC, traffic also contains elements of randomness and is characterised by intermittent activation, but the random access is a means of achieving low latency levels, which could not be possible with the scheduling request/grant procedure in place. However, a solution based on random access is inherently unreliable, as it is subject to interference and collisions, so the random access for URLLC needs to be augmented by other mechanisms that introduce redundancy to compensate for unavoidable collisions.

Multiple technologies to improve reliability of random access have been recently studied. Coded random access [3, 4] improves throughput and reliability by exploiting repetition coding and interference cancellation. Diversity slotted ALOHA has been considered by 3GPP as a potential solution for grant-free access [5], while in [6, 7], the possibility to increase access reliability by preassigning non-orthogonal access sequences to users has been investigated. In [8], a similar idea of preassigned patterns is treated, but with focus on the performance of successive interference cancellation (SIC) with imperfect channel state information (CSI). These technologies can be collectively called -repetition schemes.

In this paper we explore the diversity aspects of random access schemes based on packet repetition. If access opportunities that are exploited in a -repetition scheme are independently fading, e.g., if access packets are transmitted over distinct frequency domain resource blocks experiencing different fading conditions, the reliability of communication is improved by diversity gains, in addition to the possible collision mitigation benefits. However, due to the fact that devices access the medium in a random manner, possibly causing collisions, this leads to a communication channel where

the diversity degree is a random variable

, governed by the arrival process of other users. We treat such a communication model by analyzing the probability distribution of the diversity degree, distribution of the contention level (number of simultaneous interferers) and total outage probability. We compare the performance of a simple receiver utilising a destructive collision-model, which discards all overlapping packets, with a more advanced system capable of optimally combining the replicas based on their signal-to-interference-plus-noise-ratio (SINR). Furthermore, we provide such analysis for the two coding approaches: uncoordinated, random selection of subchannels and deterministic assignment of patterns to the users. The latter technique is based on a code construction given by a Steiner system, as in 

[10, 7].

Ii System Model

We consider a communication system where URLLC users attempt to randomly access the uplink resources of a centralized receiver. Users active during a single timeslot transmit in an uncoordinated, grant-free fashion, and employ -repetition coding of their access packets over orthogonal frequency subchannels. Users are slot synchronised to the receiver, and access packets are of equivalent size and occupy an entire subchannel. The users are assumed to become active randomly, such that the number of users active during a time instance follows a Poisson process with intensity .

Repetition coding of access packets provides robustness to inter-user collisions and facilitates diversity gain, which are integral for reliability in contention-based access over fading channels. Here we consider two approaches to coding: (i) users transmit packet replicas randomly over the slotted frequency resources, as in ALOHA-type schemes, and (ii) users transmit their replicas according to a deterministic and uniquely preallocated pattern from a designed access code.

Fig. 1: An example of the system with active users, frequency subchannels and repetitions of each packet. Users and manage to have a single interference-free replica, while the user has two. The subchannels where collisions occur might be used to further increase the reliability if a more advanced processing is available.

Two receiver models are investigated: (i) a destructive collision model, a PHY layer abstraction to the MAC layer which assumes that colliding packets are lost and only interference-free packets may be correctly received, and (ii) a multi-user interference (MUI) model, where all packets are used to decode the signal but their contribution depends on their effective SINRs. In this paper, maximum-ratio combining is applied to the different packet replicas to achieve this.

The received complex baseband signal corresponding to the symbol transmitted by a device reads

(1)

where is a random number of interferers perceived by user , are the channel gains of the signal of interest and its -th interferer respectively (which are assumed to be known at the receiver), are the interfering symbols,

is the additive white Gaussian noise (AWGN) with zero mean and variance

, and is the joint interference-plus-noise term. Note, that interferers might occupy only some of the slots of , in which case the remaining entries of are . We define the linear filter

(2)

where is a diagonal matrix of real-valued reliability weights that depend on the combining strategy. Applying the combiner yields

(3)

The post combining SINR of -th user’s signal is approximated in uncorrelated interference by

(4)

where the reliability weights for MRC in the multi-user interference model that maximize are given by

(5)

In the destructive collision model only those replicas which were received collision-free can be combined together. Let us further denote by a subset of indices which correspond to those packets. Then, the signal model can be simplified since and

(6)

resulting in the final signal-to-noise-ratio (SNR)

(7)

In the remainder of this paper we will often discuss a signal from the perspective of a single device and omit the index whenever it does not create ambiguity.

Iii Available Diversity after Collisions

Consider a timeslot in which a given user of population is active and transmitting packet replicas randomly over the access resources, along with simultaneously active users. The probability that of replicas are received without interference depends on the coding strategy.

Iii-a Diversity Slotted ALOHA

In diversity slotted ALOHA (DSA), users transmit their packet replicas over the

subchannels randomly, following a uniform distribution. From the perspective of user

, the probability that the other users collide is such a way that of subchannels are unoccupied by packet replicas follows from the classical occupation problem, and is given by

(8)

where , , , , and .

The probability that user occupies interference-free subchannels, conditioned on the arrival process, is

(9)

Iii-B Designed Codes

Designed and uniquely preallocated user codes have been shown to outperform the random coding approach in a URLLC context [9, 6]. Such codes limit the number of supportable users in order to coordinate the interference over that population. The performance of combinatorial code designs such as Steiner system as random access codes has been explored in [10, 7]. Here we consider Steiner designs, as their highly symmetric structure makes for ready analysis. Note that designs may produce significantly larger codes, and may therefore be more practical.

Consider the scenario where each of the users is uniquely allocated a repetition pattern from a code [11]. The maximum supportable user population is limited to . However, the structure of the code ensures that the number of users that may overlap with user in a single subchannel is at most . When user is active, the simultaneously active users will be employing repetition patterns from the remaining , of which at most can overlap user in slots. The probability that user has of diversity branches post collisions is therefore

(10)

where , and the same restrictions on as in (8) apply. The probability can be found similarly to (9), with in place of .

Fig. 2: Probability distribution of the available diversity for DSA (black) and Steiner (grey) with and under Poisson arrivals.

Figure 2 compares the probability of diversity branches being available post collisions for the DSA scheme over subchannels with repetition factor , and a deterministic coding scheme employing a Steiner system with , as a function of the arrival intensity . Evident in the plot is how, at lower intensities, the Steiner code trades-off the probability of producing the best outcome () to increase the probability of good outcomes (e.g. ), and reduce the probability of the worst outcome (). Since this worst outcome is especially detrimental in the collision model, we can expect significant deterministic gain in this intensity region. As approaches , the structure of the deterministic code becomes a disadvantage. If the URLLC users are activated in an intermittent and uncorrelated manner, then the expected number of users simultaneously active during a given slot is .

Iv Interferers per Subchannel

Consider again a user transmitting during a timeslot with other users. In the case of weighted MRC, we are interested in the number of packets from interferers present in the subchannels occupied by . Let be the number of independently Rayleigh faded packets from the interfering users in a given subchannel of user . The probability distribution of depends on the coding strategy.

Iv-a Diversity Slotted ALOHA

In DSA, the repetition coding procedure amounts to users independently selecting one of the possible binary patterns with replacement. As such, the maximum number of interferers observed by in one subchannel is . The probability of interfering packets in a given subchannel occupied by user is given by

(11)

Note that this is an approximation assuming the interferers select the subchannels independently. The probability can be found as in (9

) by marginalizing over Poisson distributed

.

Iv-B Designed Codes

With a finite set of deterministic access patterns, the probability that user sees interferers in a given subchannel in which it is active, is the probability that of the other users are using patterns from the that overlap in that subchannel. Since patterns are uniquely preallocated, selection from the available codes is done without replacement. The random variable

therefore follows the hypergeometric distribution, such that

(12)

and is found as in (9).

Fig. 3: Probability distribution of the number of interferers in a subchannel for DSA (black) and Steiner (grey) with and under Poisson arrivals.

Figure 3 compares the probability distributions of for the DSA scheme over subchannels with and the Steiner code with , as functions of . Here, the Steiner codes slightly increases the probability of the best outcome () at lower intensities, but decreases it as approaches . More pronounced is how the Steiner code increases the probability of lower numbers of interferers (e.g. ) in certain windows of intensity.

V Diversity Combining

Lastly, let us analyse the outage probability performance of the different schemes. The outage probability is defined as the probability that the post-processing SINR falls below a certain threshold , i.e

(13)

This metric will depend on both the coding technique as well as the applied receiver processing.

V-a Collision Model

After discarding the packets which experienced collision, the remaining replicas transmitted by user

can be combined by the receiver. Assuming perfect CSI is available, and the SNR of a single packet is exponentially distributed (following the Rayleigh fading assumption), the post processing SNR has the distribution

(14)
(15)

where is the expected SNR per packet and is either or depending on the scenario. The (15) follows from the fact that the sum of exponentially distributed random variables with scale is distributed.

V-B Multi-User Interference Model

Fig. 4: Probability of outage for DSA (black) and Steiner (grey) with , and dB, under Poisson arrivals with .

In the case of MUI, obtaining closed form expressions of even the conditional SINR distribution is not feasible, as it quickly becomes intractable (i.e. for more than one interferer)

(16)

Furthermore, the full distribution would require marginalizing the convolution of individual SINRs of the replicas over all and all possible realizations of

(17)

To obtain , and eventually , for the multi-user interference model we resort to simulation. We generate multiple instances of , i.e. number of transmitting devices, their channel gains and patterns accordingly (DSA or Steiner), and evaluate the effective SNR according to (4) and (5). Figures 4 and 5 show the outage probability performance as function of the SINR threshold

, for the MRC receiver in the collision and MUI models, with random and deterministic repetition coding. Additionally, included in the plots is the outage probability for a white noise approximated match filter (WN-MF), for which the reliability weights in (

2) are set to for all packets.

For low access intensity, represented here by Figure 4 with , the gains offered by deterministic codes are significant compared to the uncoordinated traffic, e.g. at dB the difference in offered reliability is more than an order of magnitude (and further two orders of magnitude compared to the white noise approximation). This gain diminishes as the intensity of traffic increases (cf. Figure 5), since the structure of the Steiner code becomes irrelevant as the channel becomes flooded with packet replicas. The collision model exhibits a clear error floor related to .

Fig. 5: Probability of outage for DSA (black) and Steiner (grey) with , and dB, under Poisson arrivals with .

With regard to required processing and complexity, the receiver in the collision model is the simplest—it only needs to detect whether or not there were collisions in the subchannels occupied by a given user, and measure the SNR of each of their

interference-free packets. The MRC receiver, however, requires accurate measurements of the channel gain (and phase), as well as a precise estimate of the interference and noise corrupting each packet. The white noise approximation requires precise channel information for each packet, but does not need an interference plus noise estimate. The white noise approximation shows to what degree neglecting interference plus noise whitening is detrimental to the performance of the MRC receiver. In collision channels of the type discussed here, noise plus interference whitening is of prime importance.

Vi Conclusion

We have presented a study of multichannel random access mechanisms for supporting low-latency uplink transmission from a set of uncoordinated devices. This study is in the context of Ultra-Reliable Low-Latency Communication (URLLC), a new generic service in 5G wireless systems that puts extreme requirements on reliability. It is therefore interesting to investigate how random access with diversity transmissions of replicas can support very high reliability levels. The study treats two different models, one with destructive collisions and other where the collided slots are still used through a combining process to contribute to the overall SINR. For these two models, we compared two different types of repetition coding, random and deterministic, respectively. The deterministic codes, designed according to a Steiner system, lead to a significantly superior performance when the arrival rate of the intermittent URLLC transmissions is low.

An interesting direction for future work can be identified in the model with non-destructive collisions. Namely, the current combining algorithm does not take into account that the interference is created from signals that are also packet replicas, just from different users. This fact can be used to devise a multi-user decoding that is capable to cancel the interference from different users, similar to the mechanisms applied in coded random access.

Acknowledgement

This work was funded in part by the Academy of Finland (grant 299916) and EIT ICT (HII:ACTIVE) and by the European Research Council (ERC), Consolidator Grant Nr. 648382 (WILLOW), under the European Union Horizon 2020 research and innovation program.

References

  • [1] P. Popovski, K. F. Trillingsgaard, O. Simeone and G. Durisi, “5G Wireless Network Slicing for eMBB, URLLC, and mMTC: A Communication-Theoretic View”, IEEE Access, vol. 6, pp. 55765–55779, Aug. 2018
  • [2] 3GPP, TS 22.261, “Service requirements for the 5G system; Stage 1,” V16.6.0, Dec. 2018
  • [3] E. Paolini, C. Stefanovic, G. Liva and P. Popovski, “Coded random access: applying codes on graphs to design random access protocols”, IEEE Comm. Mag., vol. 53, no. 6, pp. 144–150, June 2015.
  • [4] J. Choi, “Throughput Analysis for Coded Multichannel ALOHA Random Access,” IEEE Comm. Lett., vol. 21, no. 8, pp. 1803–1806, Aug. 2017.
  • [5] B. Singh, O. Tirkkonen, Z. Li and M. A. Uusitalo, “Contention-Based Access for Ultra-Reliable Low Latency Uplink Transmissions”, IEEE Wireless Comm. Lett., vol. 7, no. 2, pp. 182–185, Apr. 2018.
  • [6] C. Boyd, R. Vehkalahti and O. Tirkkonen, “Interference Cancelling Codes for Ultra-Reliable Random Access,” Int. J. Wireless Inf. Networks, vol. 25, pp. 422–433, Dec. 2018.
  • [7] C. Boyd, R. Vehkalahti and O. Tirkkonen, “Grant-Free Access in URLLC with Combinatorial Codes and Interference Cancellation”, in Proc. IEEE Global Comm. Conf., Dec. 2018, pp. 1–5.
  • [8] R. Kotaba, C. N. Manchón, T. Balercia and P. Popovski , “Uplink Transmissions in URLLC Systems With Shared Diversity Resources”, IEEE Wireless Comm. Lett., vol. 7, no. 4, pp. 590–593, Aug. 2018.
  • [9] E. Paolini, G. Liva, and A. G. i Amat, “A Structured Irregular Repetition Slotted ALOHA Scheme with Low Error Floors,” in Proc. Int. Conf. on Comm., May 2017, pp. 1–6.
  • [10] G. T. Peeters, R. Bocklandt and B. V. Houdt, “Multiple Access Algorithms Without Feedback Using Combinatorial Designs”, IEEE Trans. on Comm., vol. 57, no. 9, pp. 2724–2733, Sep. 2009.
  • [11] La Jolla Covering Repository. Steiner Systems. [Online]. Available: http://dmgordon.org/cover/
  • [12] O. Galinina, A. Turlikov, S. Andreev and Y. Koucheryavy, “Multi-channel random access with replications”, in Proc. IEEE Int. Sym. on Inf. Theory, Jun. 2017, pp. 2538–2542.