Performance of Non-orthogonal Multiple Access under Finite Blocklength

02/26/2019 ∙ by Endrit Dosit, et al. ∙ University of Oulu 0

In this paper, we present a finite-block-length comparison between the orthogonal multiple access (OMA) scheme and the non-orthogonal multiple access (NOMA) for the uplink channel. First, we consider the Gaussian channel, and derive the closed form expressions for the rate and outage probability. Then, we extend our results to the quasi-static Rayleigh fading channel. Our analysis is based on the recent results on the characterization of the maximum coding rate at finite block-length and finite block-error probability. The overall system throughput is evaluated as a function of the number of information bits, channel uses and power. We find what would be the respective values of these different parameters that would enable throughput maximization. Furthermore, we analyze the system performance in terms of reliability and throughput when applying the type-I ARQ protocol with limited number of retransmissions. The throughput and outage probability are evaluated for different blocklengths and number of information bits. Our analysis reveals that there is a trade-off between reliability and throughput in the ARQ. While increasing the number of retransmissions boosts reliability by minimizing the probability of reception error, it results in more delay which decreases the throughput. Nevertheless, the results show that NOMA always outperforms OMA in terms of throughput, reliability and latency regardless of the users priority or the number of retransmissions in both Gaussian and fading channels.



There are no comments yet.


page 1

page 2

page 3

page 4

This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.

1 Introduction

Driven by the market demands for extra services, the fifth generation of mobile communication is expected to provide seamless connectivity enabling Machine Type Communication (MTC) MTC and the Internet of Things (IoT) IoT . The IoT is considered as the next revolution in mobile cellular systems. It interconnects "things" (such as machines, sensors, smart meters) and facilitates autonomous data exchange between them bringing connectivity to anything that can benefit from internet connection ericsson ; Networks . Depending on their functionality, these devices will have different requirements and constraints. They might have limitations on hardware, energy efficiency, reliability, latency or even a combination of those. Most of the results that are present so far in the wireless communication theory are based on the Shannon capacity Shannon_paper . This is an asymptotic metric, which corresponds to the highest data rate that we can communicate, given that we want to maintain a certain level of reliability. It is asymptotic in the sense that if the transmission is done at a certain rate, which is lower than the Shannon capacity, then it would be possible to achieve arbitrarily low error probability only by using sufficiently long packets. This metric has been very successful so far because of large delay constrains ( e.g. 10 ms or more), and very large packet lengths (e.g. 10s of thousands channel uses) Devassy2014 . Another classical metric which is used is the outage capacity, which is the extension of the Shannon capacity to non-ergodic channels Biglieri1998 .

Meanwhile, short packet communication has become a mandatory solution in order to satisfy extremely low latency as envisioned for real time applications and emerging technologies such as e-health and road safety. Despite their small size, these packets need to be decoded at the intended receiver with very high reliability and very low latency, which of course depends on the system specifications. In the finite block-length regime, where the packets are short, the situation changes drastically. Since one of their fundamental assumptions (very large packet length) does not hold anymore, these metrics become a poor benchmark Durisi_1 ; iswcs18 . From an information theoretic point of view, communication on short packets does not comply to traditional metrics such as Shannon capacity paper11 . Alternatively, low latency communication is subject to the finite blocklength capacity model, where the length of metadata is of comparable size to the length of actual data. paper2 ; paper5 ; paper14 . In this context, the evaluation of the maximum achievable rate as a function of block-length and error probability has gathered much attention. It is defined as the largest coding rate for which there exists an encoder/decoder pair of packet length , whose packet error probability does not exceed . During these last few years, a lot of progress has been done in developing very tight non-asymptotic upper and lower bounds of for both Additive White Gaussian Noise (AWGN) and fading channels in Polyanskiy2010 ; Yang .

Recently, the study of finite block-length communication, has brought significant progress in the field of wireless communications with application to Ultra-Reliable Low-Latency Communications (URLLC) Popovski2014 . URLLC has emerged to provide solutions for reliable and low latency transmissions in wireless systems. The design of URLLC systems imposes strict quality of service (QoS) constraints to fulfill very low latency in the order of milliseconds with expected reliability of higher than 99.9 NokiacMTC2016 ; eucnc . In latency , Schulz et al. discussed the reliability requirements for different IoT applications. According to their study, latency bounds range from 1 ms in factory automation to 100 ms in road safety, while the packet loss rate constraints range from in printing machines to for traffic efficiency. Such requirements are far more stringent than the ones in the current long term evolution (LTE) standards Johan . In this context, in me the authors develop optimal power allocation strategy for type-I Automatic Repeat Request (ARQ) protocol, which enable communications at any target outage probability in finite blocklength. Furthermore, they show that the proposed strategy maximizes the overall system throughput in the ultra reliable region. Similarily, in Makki2014 the authors focus on minimizing the outage probability given a certain average power constraint for type-I ARQ protocol. The scheme proposed, is valid only when the maximum number of transmissions is set to two. In addition, the obtained results are valid only for a single user scenario.

Nowadays Orthogonal Multiple Access (OMA) schemes is the multiple access scheme mostly used in communication systems. Therein, the time and frequency resources are shared between users. Another approach is the Non-Orthogonal Multiple Access (NOMA) presented in Poor ; Higuchi2015 . The key feature of NOMA is to serve multiple users at the same time/frequency/ code, but with different power levels, which yields a significant spectral efficiency gain over conventional orthogonal MA Poor . In Higuchi2015 , the authors introduce another multiple access scheme, in which they exploit the power domain. In this scenario, all the resources are shared between users during the transmission. Then, their packets are demultiplexed in the base station (BS) using Successive Interference Cancellation (SIC) and following a certain pre-determined order. In their paper, it is shown that the rates of each of the users are increased if NOMA is utilized. The authors of SIC discussed the NOMA strategy for massive IoT where they derived the system stability requirements. They found out that the optimal strategy is to divide the whole bandwidth into a few sub-bands when there is no delay constraint and to utilize it as one sub-band when a delay constraint is imposed.

Similar to Higuchi2015 , in our system the highest priority is given to a certain user, and thus its transmitted packet is decoded last. In our analysis, we assume to have multiuser uplink setup, where all of the users will communicate to the same access point. Depending on their system requirements, these users will have different priorities. Therefore, various questions arise: “How will all these users transmit their information in a channel whose resources they share?”, “How will the BS process the information, given that the reliability requirements are met?”, “How would it be possible to meet these requirements,while spending minimal amount of resources?”, and finally "How to achieve all this in a delay limited system?".

In this paper, we analyze two different multiple access approaches, the orthogonal and non-orthogonal scheme to determine which one performs better in finite block-length. Not many works have been presented in the field of designing and analyzing multiple access schemes in this regime. In Devassy2014 , the authors analyze the scenario of having several uncoordinated users who transmit short coded packets, using frequency hopping and an automatic repeat request (ARQ) protocol. However, the interference is simply treated as noise. While in Tandon2013 the analysis is done for specific combinations of modulation and coding schemes. Part of the work in this journal was presented in balkan where we characterized the throughput of orthogonal and non-orthogonal scheme in both AWGN and fading channels.

Herein, we extend the previous work by analyzing the network throughput for each user when applying the type-I ARQ protocol. According to 5GNR , HARQ is considered to be a part of the 5G New Radio standard. When compared to other reliability enhancement techniques such as Chase Combining Hybrid Automatic Repeat Request (CCHARQ) EUCNC_endri and relaying, type-I ARQ has lower complexity and latency. Therefore, we choose type-I ARQ as a simple method to improve reliability in ULLRC networks at minimum complexity and latency cost. In type-I ARQ protocol, each user is allowed to retransmit its packet if it receives a NACK feedback from the BS, which means that the packet was not successfully decoded. Each user possesses trials to transmit a single packet, where is limited in order to suppress extra latency. The results will show that although applying ARQ reduces the throughput, it offers higher reliability in terms of lower outage probabilities specially for the NOMA scheme. Moreover, the latency penalty is less punishing for NOMA when compared to OMA.

The rest of the paper is organized as follows: in Section 2, we introduce the system model for NOMA and OMA in AWGN and quasi-static Rayleigh fading channels. Communication in finite blocklength is characterized in Section 3, where we define the achievable rate and then derive outage expressions. Next, Section 4 analyzes the throughput of type-I ARQ protocol with limited number of retransmissions. We present the numerical results and comparisons between OMA and NOMA schemes in terms of reliability, throughput, and latency in Section 5. Finally, Section 6 concludes the paper. On the last page, Table 1 includes the important abbreviations and symbols that will appear throughout the paper.

ARQ Automatic Repeat reQeust
NOMA Non-Orthogonal Multiple Access
QoS Quality Of Service
SINR Signal-to-Interference-plus-Noise Ratio
URLLC Ultra Reliable Low Latency Communication
Shannon capacity
expectation of
successfully transmitted information bits at the round
number of nodes
probability of
Gaussian Q-function
inverse Gaussian Q-function
achievable rate
total channel uses at the round
channel dispersion
exponential Euler’s number
fading coefficient of user
number of transmitted information bits

additive while Gaussian noise vector

transmitted signal vector of user
received signal vector

fading random variable

user 1 quota of channel uses in OMA
error probability
signal to noise ratio
Table 1: List of abbreviations and symbols.

2 System model

We start by investigating the OMA and NOMA schemes for both AWGN and fading channels. In the fading channel model, we assume that users are communicating in a quasi-static Rayleigh fading channel with coherence bandwidth and coherence time . For the OMA scenario, these coherence intervals are assigned to users depending on their priority. This implies that, portion of the available channel uses will be assigned to one user, and the remaining channel uses will be assigned to the other user. On the other hand, for the NOMA case the users can utilize all the resources whenever needed. Furthermore, we assume that the user transmissions will be uncoordinated. This implies that there will be interference between them. Each user in the system will transmit his packet, which will consist of symbols with duration . This guarantees that the channel will remain constant for the entire duration of the packet, while our analysis accounts for the short blocklength effect.

The received siganl vector consists of the coded packets , which were transmitted during the coherence interval. Thus, we have:


where is the fading coefficient for user which is assumed to be quasi-static with Rayleigh distribution and independent identically distributed from one packet duration to the other. is the transmitted packet of user , and

corresponds to the additive noise vector, whose entries are modeled as zero-mean circularly symmetric Gaussian random variables with unit variance. Further in (

1), the index spans over the entire set of interfering users.

In this model, we assume that the receiver is aware of the priority of the users. For the OMA scenario, this implies that the receiver knows which part of the available resources are allocated to each user. While, in the NOMA scenario, it only knows the decoding order to perform SIC Ekram . For the fading channel, we assume that the receiver has channel state information (CSI).

The number of information bits in each transmitted packet is ; thus all users will have the same payload. Furthermore, we suppose that these information bits are mapped to the same number of channel uses in order to minimize the transmission delay. For simplicity, we assume that there are only two users in our system as in 2users . The uplink model is depicted in Fig. 1 where 2 users transmit short data packets to the BS through interference channel. Each user transmits its data across different channel conditions where the CSI information is assumed to known at the BS. Moreover, We assume that User 1 has higher priority so the BS performs SIC to eliminate the interference resulting from User 2 on User 1 and thus, User 1 suffers no interference.

Figure 1: Uplink channel model with two users.

3 Maximum coding rate and outage at finite block-length

Herein, we characterize the individual rates and outage probabilities of the users in our system for both NOMA and OMA scenarios. First, we analyze the AWGN channel and then, we proceed with the Rayleigh fading channel as in Turkish .

3.1 AWGN channel

To model the AWGN channel, we assume that the channel gains in (1) have unity gain. Thus, we would obtain the received signal as


From Polyanskiy2010 , we compute the maximum achievable rate for a single user as:


where represents the signal-to-noise (SNR) ratio, is the Gaussian Q-function, and represents its inverse. C() is the channel capacity calculated as


Further in (3), V() denotes the channel dispersion, which can be found from (5)


and is the packet error probability given in (6):


where is the number of transmitted information bits. The throughput of the system for a certain user can be found as


Notice that in (3) the remainder terms and vanish as increases. Thus, we neglect these terms from (3) and compute the individual user rates for OMA scenario as follows:


where refers to the amount of resources that we allocate to the first user.

A very important metric used to evaluate the performance of a system is the outage probability of the user transmissions. For our system, it is derived from (6) as


In the NOMA scenario and after applying SIC at the BS , the SINR of the users changes as


The rates and outage probability can be computed from (8) and (9) by setting for the first user and for the second user.

3.2 Quasi-static fading channel

Now we turn to the quasi-static fading channel case where the channel coefficient remains constant during one transmission. The channel gains

, change independently between transmissions with exponentially distributed probability density function (pdf). Thus, the received signal would be

NOMA_arxiv :


From Yang4 , the maximum achievable rate for fading channels is approximated as:


where is remainder term and is the number of channel uses. Notice that as increases, . Finally, in (13) denotes the outage capacity, which is computed from


where and represents the squared envelope of the channel coefficients according to alouini . Let represent the S(I)NR of the received signal, and let . Also, refers to the ratio between the number of information bits that we have to transmit , and the number of channel uses , thus . The outage probability , for the quasi static fading channel can be found as Polyanskiy2010


In the OMA scenario, the outage probability can be found from (15). We recall that user utilizes channel uses, while user utilizes the remaining channel uses. Notice that (15) is not a closed form solution. However, it can be well-approximated by linearizing the function as in Makki2014 ; Q_linear . For this purpose we write as




Notice that for the NOMA case, we set in (17) and (19). While, in (18) and (20) we set to guarantee full sharing of resources. Further, in (21) and (22), for user 1 and user 2, respectively.

Then, we write the integral form of as


where corresponds to the probability density function of . After solving the integral for the OMA scenario, we obtain the outage expression in (24), which has the same form for both users


Next we characterize the case of NOMA with SIC. As mentioned in Section 2, we assume that user has the highest priority. This implies that its packets are decoded last, which results in an interference free decoding. Therefore, its outage probability can be computed from (24). However, the situation changes in the case of the user who is decoded first. To facilitate calculations, we consider that the interference is much larger than noise, and thus the following approximation holds


Therefore, the distribution of S(I)NR changes as a result of the presence of Rayleigh channel coefficients in both the numerator and denominator. To solve the integral presented in (23), we need to compute the pdf of which is given as


Then, by substituting (25) and (26) in (23), we can compute the integral. Finally, the outage probability of this user is given by (3.2) on the top.



4 ARQ and Throughput

As discussed in Section 1, finite blocklength communication plays a significant role in URLLC. However, achieving the ultra low outage probabilities needed for URLLC with a single transmission is a cumbersome task. As will be shown is Section 5, when an open loop setup is utilized (one shot transmission), the outage probability for both the users is relatively high. To cope with this issue, we rely on schemes that exploit diversity.

In this context, one well established approach is the deployment of retransmission schemes. Specifically, in this section we focus on Automatic Repeat Request (ARQ) scheme ARQ . Therein, each user retransmits the same packet in different transmission slots. The receiver fetches each of these packets, and checks if it can decode them. Once successful decoding of the packets is performed, a positive acknowledgment (ACK) packet is sent to the transmitter, who then moves on to sending new information. Assuming that each transmission faces different fading realizations, the outage probability after transmission rounds will be:


where is the outage probability of the transmission. The outage probability before the first transmission, .

We know that the utilization of schemes which are based on retransmissions causes the latency of a system to increase due to the presence of feedback, which is then reflected in the overall system throughput. In this section, we shall analyze the impact of type I ARQ scheme on the throughput.

In the open loop setup, the throughput of each user can be found as:


where the outage probability of each user is given from (24). When the throughput is analyzed, it is important to take into account that each transmission is associated with a degradation of spectral efficiency. As a result of this degradation, we can say that the codeword rate in the ARQ round would be . The total number of channel uses in the round as the sum of transmissions time till reaching the round plus the feedback overhead can be computed from


where is the feedback delay expressed in channel uses and is the packet drop probability Since transmissions are independent and outage probabilities are equal in all transmissions, the expression in (28) reduces to the product of the outage probabilities of each round given by . It is clear that utilizing ARQ boosts reliability to the power order. Next we find the expected number of information bits that will be transmitted successfully without error after trails as:


Finally, assuming that a maximum number of retransmissions occurs, the throughput would be the ratio of successfully transmitted bits to the total number of channel uses given by


Here refers to the outage probability up to the round. The main cost of this approach can be clearly seen from the equation above and is the throughput degradation due to the presence of feedback and transmission of multiple packets. The situation is a trade-off between reliability and delay. Since this throughput degradation becomes worse as we increase the number of retransmissions and we are also delay-limited in our system, we shall limit our analysis for the case when we have a maximum of 3 transmissions in our system.

5 Numerical results

In this section, we compare the performance of OMA and NOMA for . Thus, 80 of the resources are allocated to the User 1 (the user with high priority), and 20 to the User 2. First, we start by the AWGN channel, then we proceed with fading case and ARQ protocol.

5.1 AWGN channel

Figure 2: Throughput as a function of the number of information bits, considering channel uses and dB.

For AWGN channel, we examine the throughput of each multiple access scheme. First, the throughput is analyzed as a function of the number of information bits . For this purpose, we fix the number of channel uses to . Furthermore, the transmitted power of users is set to dB. Since the noise has unit variance, this power value will directly correspond to the S(I)NR. In Fig.2, we plot the throghput of NOMA and OMA as a function of for both users. We observe that NOMA scheme achieves higher throughput with respect to OMA. Apparantely, user 1 has greater throughput than user 2 because user 1 was assumed to have higher priority when applying the SIC. It is also noticed that different users have different values of for which this throughput is maximized. This result fully matches the system requirements. Since the users are communicating independently, their messages may have different sizes.

Next, we analyze the behavior of the throughput as a function of the channel uses. For this purpose, we fix bits and the transmitted power of both users in the system to dB. The results can be observed from Fig. 3. Notice that the approximations derived in Section. 3.1 hold only for the block-lengths of size channel uses Polyanskiy2010 . Again, NOMA scheme performs better than OMA. Furthermore, we notice that for different users, we have higher throughput for user 1 and different values of for which the throughput is maximized. Similarly as above, this result matches the intuition.

Figure 3: Throughput as a function of the number of channel uses, considering bits, dB.

Finally, for the AWGN channel we analyze the throughput as a function of transmission SNR for . The result is shown in Fig. 4. To attain this plot, we fixed the channel coding rate at bpcu. Here, for the OMA scheme, both scenarios when highest priority is given to one user (i.e. ), and when both users are treated equally (i.e. ) are evaluated. We observe that the throughput is maximized at low SNR levels and then it saturates. This implies that, increasing the transmission power above a certain level will not result in an increase of throughput. Furthermore, we notice that if the utilized multiple access scheme is NOMA, the throughput is maximized at lower SNR levels than OMA for each of the users. However, when OMA scheme is utilized and equal resources to both users are assigned, we observe that for the second user we can achieve higher throughput with lower power expenditure. Nevertheless, for the first user the power savings that come from the implementation of NOMA are significantly higher.

Figure 4: Throughput as a function of transmitted power for for NOMA and OMA with different values of

5.2 Fading channel

Now, we compare the performance of NOMA and OMA in quasi-static Rayleigh fading channel. First, we evaluate the throughput as a function of the number of information bits . The result is shown in Fig. 5 for and dB. From the figure, we notice that the non-orthogonal scheme outperforms OMA in the case of both users. When the number of information bits is large enough, we notice that for both users NOMA achieves higher throughput than OMA. Again the optimum number of information bits which maximizes the throughput differs from NOMA to OMA. To decrease the outage for the user we can increase the transmit power and apply ARQ with transmissions or decrease the rate as will be shown below.

Figure 5: Throughput as a function of the number of information bits in Rayleigh fading channel, considering channel uses and dB.

Next, we analyze the throughput as a function of the number of channel uses. For this purpose, we fix , and dB. From Fig. 6, we notice that in the short packet regime, in which we are operating, NOMA outperforms OMA for both users. For instance, when the throughput for the NOMA user 1 is more than the double when compare to the case of OMA.

Figure 6: Throughput as a function of the number of channel uses in Rayleigh fading channel, considering bits, dB.

Furthermore, we analyze the throughput as a function of the transmission power when bpcu and . The result is shown in Fig. 7. Same as in Section 5.1, for the OMA scheme we analyze the scenarios when highest priority is assigned to one user (i.e. ), or when both users are treated fairly (i.e. ). Again, we notice that NOMA maximizes the throughput while spending less power than OMA. However, when both users in OMA are treated equally, we notice that the power savings for the second user are higher. However, this comes at the cost of larger power expenditures, when compared to the user with highest priority in NOMA.

Figure 7: Transmitted power as a function of throughput .

In Fig. 8, the throughput of the ARQ protocol is plotted as a function of the blocklength in NOMA and OMA schemes for 2 and 3 transmissions. Here, we fix the system parameters as dB and and assume zero feedback delay . The figure depicts the throughput declination introduced by applying type-I ARQ protocol which verifies our expectations for (4). The throughput even becomes worse when increasing the number of retransmissions . However, NOMA still outperforms OMA for both users regardless of the number of retransmissions. It is noticed that the optimum blocklength for throughput maximization also changes with the number of transmissions.

Figure 8: Throughput of ARQ in NOMA and OMA schemes as a function of blocklength for dB and .

Fig. 9 includes a plot for the outage probability as a function of the blocklength in NOMA and OMA schemes for dB and . It illustrates the reliability enhancement which results from applying type-I ARQ protocol in terms of outage probability. It is obvious that increasing the number of retransmissions reduces the outage probability for both users and hence, boosts reliability. Thus, the relation between throughput and reliability is a trade-off which is subject to the design requirements. Moreover, the figure shows that for , the outage probability of NOMA is lower than OMA for user 1 which confirms that the reliability of NOMA is higher than OMA. Here, the reliability is greater for user 1 and it increases for longer packets. Fig. 8 and Fig. 9 assure that despite the throughput decrease which occurs when applying type-I ARQ protocol, there is a significant improvement in reliability specially for NOMA.

Finally Fig. 10 elucidates the latency as a function of the blocklength for both OMA and NOMA when applying ARQ. It is clear that enhancing reliability by increasing the number of retransmissions results in longer delays. However, the figure reveals that applying NOMA not only provides higher reliability as evinced in Fig. 9, but also renders lower latency specially for mid range blocklength ( symbol periods). Hence, NOMA matches the intuition of URLLC more than OMA in future 5G networks .

Figure 9: Outage probability of ARQ in NOMA and OMA schemes as a function of blocklength for dB and .
Figure 10: Latency of ARQ in NOMA and OMA schemes as a function of blocklength for dB and .

6 Conclusions

In this work, we compared the performance of NOMA and OMA as two different multiple access methods in the finite block-length regime. First, we derived the outage expressions for NOMA and OMA scenarios in the finite blocklength regime. In our analysis, we considered AWGN and quasi-static Rayleigh fading channel models. The results showed that even for short packets, NOMA allows transmission with higher rate and throughput than OMA and thus, NOMA clearly outperforms OMA. Furthermore, we have observed that NOMA provides larger power gains when compared to OMA. We analyzed the performance of type-I ARQ protocol and quantized the throughput declination when increasing the number of retransmissions to improve reliability in terms of outage probability. The results revealed that although the throughput becomes poor for higher number of transmissions, applying ARQ significantly enhances the reliability of NOMA scheme which is still better than OMA in this case. Moreover, the latency introduced by ARQ is reduced by applying NOMA rather than OMA. As future work, we intend to analyze the performance of these schemes in massive Machine Type Communication (m-MTC) setups and introduce scheduling algorithms that can be deployed when the number of machines is large. Specifically it would be of high interest to evaluate the reliability and latency levels that can be meet by deploying such schemes.

7 Acknowledgments

This work is partially supported by Aka Project SAFE (Grant no. 303532), and by Finnish Funding Agency for Technology and Innovation (Tekes), Bittium Wireless, Keysight Technologies Finland, Kyynel, MediaTek Wireless, and Nokia Solutions and Networks.


  • (1) K.-C. Chen, S.-Y. Lien, Machine-to-machine communications: Technologies and challenges, Ad Hoc Networks 18 (2014) 3 – 23.
  • (2) L. Atzori, A. Iera, G. Morabito, Understanding the internet of things: definition, potentials, and societal role of a fast evolving paradigm, Ad Hoc Networks 56 (2017) 122 – 140.
  • (3) Ericsson, Cellular networks for massive IoT, Ericsson white paper.
  • (4) Nokia Networks , LTE-M - optimizing LTE for the Internet of Things, Nokia networks white paper.
  • (5) C. E. Shannon, A mathematical theory of communication, The Bell System Technical Journal 27 (3).
  • (6) R. Devassy, G. Durisi, P. Popovski, E. G. Strom, Finite-blocklength analysis of the ARQ-protocol throughput over the Gaussian collision channel, 6th International Symposium on Communications, Control and Signal Processing, Proceedings (2014) 173–177doi:10.1109/ISCCSP.2014.6877843.
  • (7) E. Biglieri, J. Proakis, S. Shamai, Fading channels: information-theoretic and communications aspects, IEEE Transactions on Information Theory.
  • (8) G. Durisi, T. Koch, P. Popovski, Toward massive, ultrareliable, and low-latency wireless communication with short packets, Proceedings of the IEEE.
  • (9) M. Shehab, E. Dosti, H. Alves, M. Latva-aho, On the effective energy efficiency of ultra-reliable networks in the finite blocklength regime, in: 2017 International Symposium on Wireless Communication Systems (ISWCS), 2017, pp. 275–280. doi:10.1109/ISWCS.2017.8108124.
  • (10) C. E. Shannon, A mathematical theory of communication, The Bell System Technical Journal 27 (July 1928) (1948) 379–423.
  • (11) G. Durisi, T. Koch, P. Popovski, Toward Massive, Ultrareliable, and Low-Latency Wireless Communication with Short Packets, Proceedings of the IEEE 104 (9) (2016) 1711–1726.
  • (12) M. Gursoy, Throughput analysis of buffer-constrained wireless systems in the finite blocklength regime, in: EURASIP Journal on Wireless Communucations and Networking 2013, 2013.
  • (13) W. Yang, G. Durisi, T. Koch, Y. Polyanskiy, Block-Fading Channels at Finite Blocklength, ISWCS 2013 9 (2013) 410–413.
  • (14) Y. Polyanskiy, H. V. Poor, S. Verdu, Channel coding rate in the finite blocklength regime, IEEE Transactions on Information Theory 56 (5).
  • (15) W. Yang, G. Durisi, T. Koch, Y. Polyanskiy, Quasi-static simo fading channels at finite blocklength, in: 2013 IEEE International Symposium on Information Theory, 2013.
  • (16) P. Popovski, Ultra-reliable communication in 5G wireless systems, in: 1st International Conference on 5G for Ubiquitous Connectivity, 2014, pp. 146–151. doi:10.4108/icst.5gu.2014.258154.
  • (17) Nokia, 5G for Mission Critical Communication:Achieve ultra-reliability and virtual zero latency, Nokia White Paper.
  • (18) M. Shehab, E. Dosti, H. Alves, M. Latva-aho, On the effective capacity of MTC networks in the finite blocklength regime, in: EUCNC 2017, Oulu, Finland, 2017.
  • (19) P. Schulz et al., Latency Critical IoT Applications in 5G: Perspective on the Design of Radio Interface and Network Architecture, IEEE Communications Magazine 55 (2) (2017) 70–78. doi:10.1109/MCOM.2017.1600435CM.
  • (20) J. Oestman, G. Durisi, E. G. Stroem, J. Li, H. Sahlin, G. Liva, Low-latency ultra-reliable 5g communications: Finite-blocklength bounds and coding schemes, in: SCC 2017; 11th International ITG Conference on Systems, Communications and Coding, 2017, pp. 1–6.
  • (21) E. Dosti, U. L. Wijewardhana, H. Alves, M. Latva-aho, Ultra reliable communication via optimum power allocation for Type-I ARQ in finite Block-Length, in: IEEE ICC 2017 Wireless Communications Symposium (ICC’17 WCS), Paris, France, 2017, pp. 5168–5173.
  • (22) B. Makki, T. Svensson, M. Zorzi, Finite block-length analysis of the incremental redundancy HARQ, IEEE Wireless Communications Letters 3 (5) (2014) 529–532. arXiv:1409.3330, doi:10.1109/LWC.2014.2353059.
  • (23) Z. Ding, Y. Liu, J. Choi, Q. Sun, M. Elkashlan, C. L. I, H. V. Poor, Application of non-orthogonal multiple access in lte and 5g networks, IEEE Communications Magazine.
  • (24) K. Higuchi, A. Benjebbour, Non-Orthogonal Multiple Access (NOMA) with successive interference cancellation for future radio access, IEICE Transactions on Communications E98B (3) (2015) 403–414. doi:10.1587/transcom.E98.B.403.
  • (25) M. Shirvanimoghaddam, M. Condoluci, M. Dohler, S. J. Johnson, On the fundamental limits of random non-orthogonal multiple access in cellular massive iot, IEEE Journal on Selected Areas in Communications 35 (10) (2017) 2238–2252. doi:10.1109/JSAC.2017.2724442.
  • (26) A. Tandon, M. Motani, V. Srivastava, On the impact of channel coding on average packet delay in a multiuser environment, in: IEEE Wireless Communications and Networking Conference, WCNC, 2013. doi:10.1109/WCNC.2013.6554614.
  • (27) E. Dosti, M. Shehab, H. Alves, M. Latva-aho, On the performance of non-orthogonal multiple access in the finite block-length regime, in: BalkanCom 2017; First International Balkan Conference on Communications and Networkin, 2017.
  • (28) A. A. Zaidi, R. Baldemair, S. F. Mattias Andersson, V. Molés-Cases, Z. Wang, Designing for the future: the 5G NR physical layer, Ericsson Technology Review.
  • (29) E. Dosti, M. Shehab, H. Alves, M. Latva-aho, Ultra reliable communication via CC-HARQ in finite block-length, in: 2017 European Conference on Networks and Communications (EuCNC), 2017, pp. 1–5. doi:10.1109/EuCNC.2017.7980708.
  • (30) H. Tabassum, M. S. Ali, E. Hossain, M. J. Hossain, D. I. Kim, Non-orthogonal multiple access (NOMA) in cellular uplink and downlink: Challenges and enabling techniques, CoRR.
  • (31) Z. Zhang, H. Sun, R. Q. Hu, Downlink and uplink non-orthogonal multiple access in a dense wireless network, IEEE Journal on Selected Areas in Communications 35 (12) (2017) 2771–2784. doi:10.1109/JSAC.2017.2724646.
  • (32) M. E. Bayrakdar, S. Atmaca, A. Karahan, A slotted aloha-based random access cognitive radio network with capture effect in rayleigh fading channels, Turkish Journal of Electrical Engineering and Computer Sciences.
  • (33) X. Sun, S. Yan, N. J. Yang, Z. Ding, C. Shen, Z. Zhong, Short-packet communications in non-orthogonal multiple access systems, CoRR abs/1704.06420. arXiv:1704.06420.
  • (34) W. Yang, G. Durisi, T. Koch, Y. Polyanskiy, Quasi-static multiple-antenna fading channels at finite blocklength, IEEE Transactions on Information Theory 60 (7) (2014) 4232–4265. doi:10.1109/TIT.2014.2318726.
  • (35) M.-S. A. Marvin K. Simon, Digital Communication over Fading Channels: A Unified Approach to Performance Analysis, Copyright 2000 John Wiley & Sons, Inc., 2005.
  • (36) O. Lopez, H. Alves, R. D. Souza, E. M. G. Fernández, Ultrareliable short-packet communications with wireless energy transfer, IEEE Signal Processing Letters 24 (4) (2017) 387–391. doi:10.1109/LSP.2017.2667620.
  • (37) P. Larsson, L. K. Rasmussen, M. Skoglund, Analysis of rate optimized throughput for large-scale mimo-(h)arq schemes, in: 2014 IEEE Global Communications Conference, 2014, pp. 3760–3765. doi:10.1109/GLOCOM.2014.7037393.