1 Introduction
Driven by the market demands for extra services, the fifth generation of mobile communication is expected to provide seamless connectivity enabling Machine Type Communication (MTC) MTC and the Internet of Things (IoT) IoT . The IoT is considered as the next revolution in mobile cellular systems. It interconnects "things" (such as machines, sensors, smart meters) and facilitates autonomous data exchange between them bringing connectivity to anything that can benefit from internet connection ericsson ; Networks . Depending on their functionality, these devices will have different requirements and constraints. They might have limitations on hardware, energy efficiency, reliability, latency or even a combination of those. Most of the results that are present so far in the wireless communication theory are based on the Shannon capacity Shannon_paper . This is an asymptotic metric, which corresponds to the highest data rate that we can communicate, given that we want to maintain a certain level of reliability. It is asymptotic in the sense that if the transmission is done at a certain rate, which is lower than the Shannon capacity, then it would be possible to achieve arbitrarily low error probability only by using sufficiently long packets. This metric has been very successful so far because of large delay constrains ( e.g. 10 ms or more), and very large packet lengths (e.g. 10s of thousands channel uses) Devassy2014 . Another classical metric which is used is the outage capacity, which is the extension of the Shannon capacity to nonergodic channels Biglieri1998 .
Meanwhile, short packet communication has become a mandatory solution in order to satisfy extremely low latency as envisioned for real time applications and emerging technologies such as ehealth and road safety. Despite their small size, these packets need to be decoded at the intended receiver with very high reliability and very low latency, which of course depends on the system specifications. In the finite blocklength regime, where the packets are short, the situation changes drastically. Since one of their fundamental assumptions (very large packet length) does not hold anymore, these metrics become a poor benchmark Durisi_1 ; iswcs18 . From an information theoretic point of view, communication on short packets does not comply to traditional metrics such as Shannon capacity paper11 . Alternatively, low latency communication is subject to the finite blocklength capacity model, where the length of metadata is of comparable size to the length of actual data. paper2 ; paper5 ; paper14 . In this context, the evaluation of the maximum achievable rate as a function of blocklength and error probability has gathered much attention. It is defined as the largest coding rate for which there exists an encoder/decoder pair of packet length , whose packet error probability does not exceed . During these last few years, a lot of progress has been done in developing very tight nonasymptotic upper and lower bounds of for both Additive White Gaussian Noise (AWGN) and fading channels in Polyanskiy2010 ; Yang .
Recently, the study of finite blocklength communication, has brought significant progress in the field of wireless communications with application to UltraReliable LowLatency Communications (URLLC) Popovski2014 . URLLC has emerged to provide solutions for reliable and low latency transmissions in wireless systems. The design of URLLC systems imposes strict quality of service (QoS) constraints to fulfill very low latency in the order of milliseconds with expected reliability of higher than 99.9 NokiacMTC2016 ; eucnc . In latency , Schulz et al. discussed the reliability requirements for different IoT applications. According to their study, latency bounds range from 1 ms in factory automation to 100 ms in road safety, while the packet loss rate constraints range from in printing machines to for traffic efficiency. Such requirements are far more stringent than the ones in the current long term evolution (LTE) standards Johan . In this context, in me the authors develop optimal power allocation strategy for typeI Automatic Repeat Request (ARQ) protocol, which enable communications at any target outage probability in finite blocklength. Furthermore, they show that the proposed strategy maximizes the overall system throughput in the ultra reliable region. Similarily, in Makki2014 the authors focus on minimizing the outage probability given a certain average power constraint for typeI ARQ protocol. The scheme proposed, is valid only when the maximum number of transmissions is set to two. In addition, the obtained results are valid only for a single user scenario.
Nowadays Orthogonal Multiple Access (OMA) schemes is the multiple access scheme mostly used in communication systems. Therein, the time and frequency resources are shared between users. Another approach is the NonOrthogonal Multiple Access (NOMA) presented in Poor ; Higuchi2015 . The key feature of NOMA is to serve multiple users at the same time/frequency/ code, but with different power levels, which yields a significant spectral efficiency gain over conventional orthogonal MA Poor . In Higuchi2015 , the authors introduce another multiple access scheme, in which they exploit the power domain. In this scenario, all the resources are shared between users during the transmission. Then, their packets are demultiplexed in the base station (BS) using Successive Interference Cancellation (SIC) and following a certain predetermined order. In their paper, it is shown that the rates of each of the users are increased if NOMA is utilized. The authors of SIC discussed the NOMA strategy for massive IoT where they derived the system stability requirements. They found out that the optimal strategy is to divide the whole bandwidth into a few subbands when there is no delay constraint and to utilize it as one subband when a delay constraint is imposed.
Similar to Higuchi2015 , in our system the highest priority is given to a certain user, and thus its transmitted packet is decoded last. In our analysis, we assume to have multiuser uplink setup, where all of the users will communicate to the same access point. Depending on their system requirements, these users will have different priorities. Therefore, various questions arise: “How will all these users transmit their information in a channel whose resources they share?”, “How will the BS process the information, given that the reliability requirements are met?”, “How would it be possible to meet these requirements,while spending minimal amount of resources?”, and finally "How to achieve all this in a delay limited system?".
In this paper, we analyze two different multiple access approaches, the orthogonal and nonorthogonal scheme to determine which one performs better in finite blocklength. Not many works have been presented in the field of designing and analyzing multiple access schemes in this regime. In Devassy2014 , the authors analyze the scenario of having several uncoordinated users who transmit short coded packets, using frequency hopping and an automatic repeat request (ARQ) protocol. However, the interference is simply treated as noise. While in Tandon2013 the analysis is done for specific combinations of modulation and coding schemes. Part of the work in this journal was presented in balkan where we characterized the throughput of orthogonal and nonorthogonal scheme in both AWGN and fading channels.
Herein, we extend the previous work by analyzing the network throughput for each user when applying the typeI ARQ protocol. According to 5GNR , HARQ is considered to be a part of the 5G New Radio standard. When compared to other reliability enhancement techniques such as Chase Combining Hybrid Automatic Repeat Request (CCHARQ) EUCNC_endri and relaying, typeI ARQ has lower complexity and latency. Therefore, we choose typeI ARQ as a simple method to improve reliability in ULLRC networks at minimum complexity and latency cost. In typeI ARQ protocol, each user is allowed to retransmit its packet if it receives a NACK feedback from the BS, which means that the packet was not successfully decoded. Each user possesses trials to transmit a single packet, where is limited in order to suppress extra latency. The results will show that although applying ARQ reduces the throughput, it offers higher reliability in terms of lower outage probabilities specially for the NOMA scheme. Moreover, the latency penalty is less punishing for NOMA when compared to OMA.
The rest of the paper is organized as follows: in Section 2, we introduce the system model for NOMA and OMA in AWGN and quasistatic Rayleigh fading channels. Communication in finite blocklength is characterized in Section 3, where we define the achievable rate and then derive outage expressions. Next, Section 4 analyzes the throughput of typeI ARQ protocol with limited number of retransmissions. We present the numerical results and comparisons between OMA and NOMA schemes in terms of reliability, throughput, and latency in Section 5. Finally, Section 6 concludes the paper. On the last page, Table 1 includes the important abbreviations and symbols that will appear throughout the paper.
ARQ  Automatic Repeat reQeust 

NOMA  NonOrthogonal Multiple Access 
QoS  Quality Of Service 
SINR  SignaltoInterferenceplusNoise Ratio 
URLLC  Ultra Reliable Low Latency Communication 
Shannon capacity  
expectation of  
successfully transmitted information bits at the round  
number of nodes  
probability of  
Gaussian Qfunction  
inverse Gaussian Qfunction  
achievable rate  
total channel uses at the round  
channel dispersion  
exponential Euler’s number  
fading coefficient of user  
number of transmitted information bits  
blocklength  
additive while Gaussian noise vector 

transmitted signal vector of user  
received signal vector  
fading random variable 

user 1 quota of channel uses in OMA  
error probability  
throughput  
signal to noise ratio 
2 System model
We start by investigating the OMA and NOMA schemes for both AWGN and fading channels. In the fading channel model, we assume that users are communicating in a quasistatic Rayleigh fading channel with coherence bandwidth and coherence time . For the OMA scenario, these coherence intervals are assigned to users depending on their priority. This implies that, portion of the available channel uses will be assigned to one user, and the remaining channel uses will be assigned to the other user. On the other hand, for the NOMA case the users can utilize all the resources whenever needed. Furthermore, we assume that the user transmissions will be uncoordinated. This implies that there will be interference between them. Each user in the system will transmit his packet, which will consist of symbols with duration . This guarantees that the channel will remain constant for the entire duration of the packet, while our analysis accounts for the short blocklength effect.
The received siganl vector consists of the coded packets , which were transmitted during the coherence interval. Thus, we have:
(1) 
where is the fading coefficient for user which is assumed to be quasistatic with Rayleigh distribution and independent identically distributed from one packet duration to the other. is the transmitted packet of user , and
corresponds to the additive noise vector, whose entries are modeled as zeromean circularly symmetric Gaussian random variables with unit variance. Further in (
1), the index spans over the entire set of interfering users.In this model, we assume that the receiver is aware of the priority of the users. For the OMA scenario, this implies that the receiver knows which part of the available resources are allocated to each user. While, in the NOMA scenario, it only knows the decoding order to perform SIC Ekram . For the fading channel, we assume that the receiver has channel state information (CSI).
The number of information bits in each transmitted packet is ; thus all users will have the same payload. Furthermore, we suppose that these information bits are mapped to the same number of channel uses in order to minimize the transmission delay. For simplicity, we assume that there are only two users in our system as in 2users . The uplink model is depicted in Fig. 1 where 2 users transmit short data packets to the BS through interference channel. Each user transmits its data across different channel conditions where the CSI information is assumed to known at the BS. Moreover, We assume that User 1 has higher priority so the BS performs SIC to eliminate the interference resulting from User 2 on User 1 and thus, User 1 suffers no interference.
3 Maximum coding rate and outage at finite blocklength
Herein, we characterize the individual rates and outage probabilities of the users in our system for both NOMA and OMA scenarios. First, we analyze the AWGN channel and then, we proceed with the Rayleigh fading channel as in Turkish .
3.1 AWGN channel
To model the AWGN channel, we assume that the channel gains in (1) have unity gain. Thus, we would obtain the received signal as
(2) 
From Polyanskiy2010 , we compute the maximum achievable rate for a single user as:
(3) 
where represents the signaltonoise (SNR) ratio, is the Gaussian Qfunction, and represents its inverse. C() is the channel capacity calculated as
(4) 
Further in (3), V() denotes the channel dispersion, which can be found from (5)
(5) 
and is the packet error probability given in (6):
(6) 
where is the number of transmitted information bits. The throughput of the system for a certain user can be found as
(7) 
Notice that in (3) the remainder terms and vanish as increases. Thus, we neglect these terms from (3) and compute the individual user rates for OMA scenario as follows:
(8) 
where refers to the amount of resources that we allocate to the first user.
A very important metric used to evaluate the performance of a system is the outage probability of the user transmissions. For our system, it is derived from (6) as
(9) 
3.2 Quasistatic fading channel
Now we turn to the quasistatic fading channel case where the channel coefficient remains constant during one transmission. The channel gains
, change independently between transmissions with exponentially distributed probability density function (pdf). Thus, the received signal would be
NOMA_arxiv :(12) 
From Yang4 , the maximum achievable rate for fading channels is approximated as:
(13) 
where is remainder term and is the number of channel uses. Notice that as increases, . Finally, in (13) denotes the outage capacity, which is computed from
(14) 
where and represents the squared envelope of the channel coefficients according to alouini . Let represent the S(I)NR of the received signal, and let . Also, refers to the ratio between the number of information bits that we have to transmit , and the number of channel uses , thus . The outage probability , for the quasi static fading channel can be found as Polyanskiy2010
(15) 
In the OMA scenario, the outage probability can be found from (15). We recall that user utilizes channel uses, while user utilizes the remaining channel uses. Notice that (15) is not a closed form solution. However, it can be wellapproximated by linearizing the function as in Makki2014 ; Q_linear . For this purpose we write as
(16) 
where
(17)  
(18)  
(19)  
(20)  
(21)  
(22) 
Notice that for the NOMA case, we set in (17) and (19). While, in (18) and (20) we set to guarantee full sharing of resources. Further, in (21) and (22), for user 1 and user 2, respectively.
Then, we write the integral form of as
(23) 
where corresponds to the probability density function of . After solving the integral for the OMA scenario, we obtain the outage expression in (24), which has the same form for both users
(24) 
Next we characterize the case of NOMA with SIC. As mentioned in Section 2, we assume that user has the highest priority. This implies that its packets are decoded last, which results in an interference free decoding. Therefore, its outage probability can be computed from (24). However, the situation changes in the case of the user who is decoded first. To facilitate calculations, we consider that the interference is much larger than noise, and thus the following approximation holds
(25) 
Therefore, the distribution of S(I)NR changes as a result of the presence of Rayleigh channel coefficients in both the numerator and denominator. To solve the integral presented in (23), we need to compute the pdf of which is given as
(26) 
Then, by substituting (25) and (26) in (23), we can compute the integral. Finally, the outage probability of this user is given by (3.2) on the top.
(27) 
4 ARQ and Throughput
As discussed in Section 1, finite blocklength communication plays a significant role in URLLC. However, achieving the ultra low outage probabilities needed for URLLC with a single transmission is a cumbersome task. As will be shown is Section 5, when an open loop setup is utilized (one shot transmission), the outage probability for both the users is relatively high. To cope with this issue, we rely on schemes that exploit diversity.
In this context, one well established approach is the deployment of retransmission schemes. Specifically, in this section we focus on Automatic Repeat Request (ARQ) scheme ARQ . Therein, each user retransmits the same packet in different transmission slots. The receiver fetches each of these packets, and checks if it can decode them. Once successful decoding of the packets is performed, a positive acknowledgment (ACK) packet is sent to the transmitter, who then moves on to sending new information. Assuming that each transmission faces different fading realizations, the outage probability after transmission rounds will be:
(28) 
where is the outage probability of the transmission. The outage probability before the first transmission, .
We know that the utilization of schemes which are based on retransmissions causes the latency of a system to increase due to the presence of feedback, which is then reflected in the overall system throughput. In this section, we shall analyze the impact of type I ARQ scheme on the throughput.
In the open loop setup, the throughput of each user can be found as:
(29) 
where the outage probability of each user is given from (24). When the throughput is analyzed, it is important to take into account that each transmission is associated with a degradation of spectral efficiency. As a result of this degradation, we can say that the codeword rate in the ARQ round would be . The total number of channel uses in the round as the sum of transmissions time till reaching the round plus the feedback overhead can be computed from
(30) 
where is the feedback delay expressed in channel uses and is the packet drop probability Since transmissions are independent and outage probabilities are equal in all transmissions, the expression in (28) reduces to the product of the outage probabilities of each round given by . It is clear that utilizing ARQ boosts reliability to the power order. Next we find the expected number of information bits that will be transmitted successfully without error after trails as:
(31) 
Finally, assuming that a maximum number of retransmissions occurs, the throughput would be the ratio of successfully transmitted bits to the total number of channel uses given by
(32) 
Here refers to the outage probability up to the round. The main cost of this approach can be clearly seen from the equation above and is the throughput degradation due to the presence of feedback and transmission of multiple packets. The situation is a tradeoff between reliability and delay. Since this throughput degradation becomes worse as we increase the number of retransmissions and we are also delaylimited in our system, we shall limit our analysis for the case when we have a maximum of 3 transmissions in our system.
5 Numerical results
In this section, we compare the performance of OMA and NOMA for . Thus, 80 of the resources are allocated to the User 1 (the user with high priority), and 20 to the User 2. First, we start by the AWGN channel, then we proceed with fading case and ARQ protocol.
5.1 AWGN channel
For AWGN channel, we examine the throughput of each multiple access scheme. First, the throughput is analyzed as a function of the number of information bits . For this purpose, we fix the number of channel uses to . Furthermore, the transmitted power of users is set to dB. Since the noise has unit variance, this power value will directly correspond to the S(I)NR. In Fig.2, we plot the throghput of NOMA and OMA as a function of for both users. We observe that NOMA scheme achieves higher throughput with respect to OMA. Apparantely, user 1 has greater throughput than user 2 because user 1 was assumed to have higher priority when applying the SIC. It is also noticed that different users have different values of for which this throughput is maximized. This result fully matches the system requirements. Since the users are communicating independently, their messages may have different sizes.
Next, we analyze the behavior of the throughput as a function of the channel uses. For this purpose, we fix bits and the transmitted power of both users in the system to dB. The results can be observed from Fig. 3. Notice that the approximations derived in Section. 3.1 hold only for the blocklengths of size channel uses Polyanskiy2010 . Again, NOMA scheme performs better than OMA. Furthermore, we notice that for different users, we have higher throughput for user 1 and different values of for which the throughput is maximized. Similarly as above, this result matches the intuition.
Finally, for the AWGN channel we analyze the throughput as a function of transmission SNR for . The result is shown in Fig. 4. To attain this plot, we fixed the channel coding rate at bpcu. Here, for the OMA scheme, both scenarios when highest priority is given to one user (i.e. ), and when both users are treated equally (i.e. ) are evaluated. We observe that the throughput is maximized at low SNR levels and then it saturates. This implies that, increasing the transmission power above a certain level will not result in an increase of throughput. Furthermore, we notice that if the utilized multiple access scheme is NOMA, the throughput is maximized at lower SNR levels than OMA for each of the users. However, when OMA scheme is utilized and equal resources to both users are assigned, we observe that for the second user we can achieve higher throughput with lower power expenditure. Nevertheless, for the first user the power savings that come from the implementation of NOMA are significantly higher.
5.2 Fading channel
Now, we compare the performance of NOMA and OMA in quasistatic Rayleigh fading channel. First, we evaluate the throughput as a function of the number of information bits . The result is shown in Fig. 5 for and dB. From the figure, we notice that the nonorthogonal scheme outperforms OMA in the case of both users. When the number of information bits is large enough, we notice that for both users NOMA achieves higher throughput than OMA. Again the optimum number of information bits which maximizes the throughput differs from NOMA to OMA. To decrease the outage for the user we can increase the transmit power and apply ARQ with transmissions or decrease the rate as will be shown below.
Next, we analyze the throughput as a function of the number of channel uses. For this purpose, we fix , and dB. From Fig. 6, we notice that in the short packet regime, in which we are operating, NOMA outperforms OMA for both users. For instance, when the throughput for the NOMA user 1 is more than the double when compare to the case of OMA.
Furthermore, we analyze the throughput as a function of the transmission power when bpcu and . The result is shown in Fig. 7. Same as in Section 5.1, for the OMA scheme we analyze the scenarios when highest priority is assigned to one user (i.e. ), or when both users are treated fairly (i.e. ). Again, we notice that NOMA maximizes the throughput while spending less power than OMA. However, when both users in OMA are treated equally, we notice that the power savings for the second user are higher. However, this comes at the cost of larger power expenditures, when compared to the user with highest priority in NOMA.
In Fig. 8, the throughput of the ARQ protocol is plotted as a function of the blocklength in NOMA and OMA schemes for 2 and 3 transmissions. Here, we fix the system parameters as dB and and assume zero feedback delay . The figure depicts the throughput declination introduced by applying typeI ARQ protocol which verifies our expectations for (4). The throughput even becomes worse when increasing the number of retransmissions . However, NOMA still outperforms OMA for both users regardless of the number of retransmissions. It is noticed that the optimum blocklength for throughput maximization also changes with the number of transmissions.
Fig. 9 includes a plot for the outage probability as a function of the blocklength in NOMA and OMA schemes for dB and . It illustrates the reliability enhancement which results from applying typeI ARQ protocol in terms of outage probability. It is obvious that increasing the number of retransmissions reduces the outage probability for both users and hence, boosts reliability. Thus, the relation between throughput and reliability is a tradeoff which is subject to the design requirements. Moreover, the figure shows that for , the outage probability of NOMA is lower than OMA for user 1 which confirms that the reliability of NOMA is higher than OMA. Here, the reliability is greater for user 1 and it increases for longer packets. Fig. 8 and Fig. 9 assure that despite the throughput decrease which occurs when applying typeI ARQ protocol, there is a significant improvement in reliability specially for NOMA.
Finally Fig. 10 elucidates the latency as a function of the blocklength for both OMA and NOMA when applying ARQ. It is clear that enhancing reliability by increasing the number of retransmissions results in longer delays. However, the figure reveals that applying NOMA not only provides higher reliability as evinced in Fig. 9, but also renders lower latency specially for mid range blocklength ( symbol periods). Hence, NOMA matches the intuition of URLLC more than OMA in future 5G networks .
6 Conclusions
In this work, we compared the performance of NOMA and OMA as two different multiple access methods in the finite blocklength regime. First, we derived the outage expressions for NOMA and OMA scenarios in the finite blocklength regime. In our analysis, we considered AWGN and quasistatic Rayleigh fading channel models. The results showed that even for short packets, NOMA allows transmission with higher rate and throughput than OMA and thus, NOMA clearly outperforms OMA. Furthermore, we have observed that NOMA provides larger power gains when compared to OMA. We analyzed the performance of typeI ARQ protocol and quantized the throughput declination when increasing the number of retransmissions to improve reliability in terms of outage probability. The results revealed that although the throughput becomes poor for higher number of transmissions, applying ARQ significantly enhances the reliability of NOMA scheme which is still better than OMA in this case. Moreover, the latency introduced by ARQ is reduced by applying NOMA rather than OMA. As future work, we intend to analyze the performance of these schemes in massive Machine Type Communication (mMTC) setups and introduce scheduling algorithms that can be deployed when the number of machines is large. Specifically it would be of high interest to evaluate the reliability and latency levels that can be meet by deploying such schemes.
7 Acknowledgments
This work is partially supported by Aka Project SAFE (Grant no. 303532), and by Finnish Funding Agency for Technology and Innovation (Tekes), Bittium Wireless, Keysight Technologies Finland, Kyynel, MediaTek Wireless, and Nokia Solutions and Networks.
References
 (1) K.C. Chen, S.Y. Lien, Machinetomachine communications: Technologies and challenges, Ad Hoc Networks 18 (2014) 3 – 23.
 (2) L. Atzori, A. Iera, G. Morabito, Understanding the internet of things: definition, potentials, and societal role of a fast evolving paradigm, Ad Hoc Networks 56 (2017) 122 – 140.
 (3) Ericsson, Cellular networks for massive IoT, Ericsson white paper.
 (4) Nokia Networks , LTEM  optimizing LTE for the Internet of Things, Nokia networks white paper.
 (5) C. E. Shannon, A mathematical theory of communication, The Bell System Technical Journal 27 (3).
 (6) R. Devassy, G. Durisi, P. Popovski, E. G. Strom, Finiteblocklength analysis of the ARQprotocol throughput over the Gaussian collision channel, 6th International Symposium on Communications, Control and Signal Processing, Proceedings (2014) 173–177doi:10.1109/ISCCSP.2014.6877843.
 (7) E. Biglieri, J. Proakis, S. Shamai, Fading channels: informationtheoretic and communications aspects, IEEE Transactions on Information Theory.
 (8) G. Durisi, T. Koch, P. Popovski, Toward massive, ultrareliable, and lowlatency wireless communication with short packets, Proceedings of the IEEE.
 (9) M. Shehab, E. Dosti, H. Alves, M. Latvaaho, On the effective energy efficiency of ultrareliable networks in the finite blocklength regime, in: 2017 International Symposium on Wireless Communication Systems (ISWCS), 2017, pp. 275–280. doi:10.1109/ISWCS.2017.8108124.
 (10) C. E. Shannon, A mathematical theory of communication, The Bell System Technical Journal 27 (July 1928) (1948) 379–423.
 (11) G. Durisi, T. Koch, P. Popovski, Toward Massive, Ultrareliable, and LowLatency Wireless Communication with Short Packets, Proceedings of the IEEE 104 (9) (2016) 1711–1726.
 (12) M. Gursoy, Throughput analysis of bufferconstrained wireless systems in the finite blocklength regime, in: EURASIP Journal on Wireless Communucations and Networking 2013, 2013.
 (13) W. Yang, G. Durisi, T. Koch, Y. Polyanskiy, BlockFading Channels at Finite Blocklength, ISWCS 2013 9 (2013) 410–413.
 (14) Y. Polyanskiy, H. V. Poor, S. Verdu, Channel coding rate in the finite blocklength regime, IEEE Transactions on Information Theory 56 (5).
 (15) W. Yang, G. Durisi, T. Koch, Y. Polyanskiy, Quasistatic simo fading channels at finite blocklength, in: 2013 IEEE International Symposium on Information Theory, 2013.
 (16) P. Popovski, Ultrareliable communication in 5G wireless systems, in: 1st International Conference on 5G for Ubiquitous Connectivity, 2014, pp. 146–151. doi:10.4108/icst.5gu.2014.258154.
 (17) Nokia, 5G for Mission Critical Communication:Achieve ultrareliability and virtual zero latency, Nokia White Paper.
 (18) M. Shehab, E. Dosti, H. Alves, M. Latvaaho, On the effective capacity of MTC networks in the finite blocklength regime, in: EUCNC 2017, Oulu, Finland, 2017.
 (19) P. Schulz et al., Latency Critical IoT Applications in 5G: Perspective on the Design of Radio Interface and Network Architecture, IEEE Communications Magazine 55 (2) (2017) 70–78. doi:10.1109/MCOM.2017.1600435CM.
 (20) J. Oestman, G. Durisi, E. G. Stroem, J. Li, H. Sahlin, G. Liva, Lowlatency ultrareliable 5g communications: Finiteblocklength bounds and coding schemes, in: SCC 2017; 11th International ITG Conference on Systems, Communications and Coding, 2017, pp. 1–6.
 (21) E. Dosti, U. L. Wijewardhana, H. Alves, M. Latvaaho, Ultra reliable communication via optimum power allocation for TypeI ARQ in finite BlockLength, in: IEEE ICC 2017 Wireless Communications Symposium (ICC’17 WCS), Paris, France, 2017, pp. 5168–5173.
 (22) B. Makki, T. Svensson, M. Zorzi, Finite blocklength analysis of the incremental redundancy HARQ, IEEE Wireless Communications Letters 3 (5) (2014) 529–532. arXiv:1409.3330, doi:10.1109/LWC.2014.2353059.
 (23) Z. Ding, Y. Liu, J. Choi, Q. Sun, M. Elkashlan, C. L. I, H. V. Poor, Application of nonorthogonal multiple access in lte and 5g networks, IEEE Communications Magazine.
 (24) K. Higuchi, A. Benjebbour, NonOrthogonal Multiple Access (NOMA) with successive interference cancellation for future radio access, IEICE Transactions on Communications E98B (3) (2015) 403–414. doi:10.1587/transcom.E98.B.403.
 (25) M. Shirvanimoghaddam, M. Condoluci, M. Dohler, S. J. Johnson, On the fundamental limits of random nonorthogonal multiple access in cellular massive iot, IEEE Journal on Selected Areas in Communications 35 (10) (2017) 2238–2252. doi:10.1109/JSAC.2017.2724442.
 (26) A. Tandon, M. Motani, V. Srivastava, On the impact of channel coding on average packet delay in a multiuser environment, in: IEEE Wireless Communications and Networking Conference, WCNC, 2013. doi:10.1109/WCNC.2013.6554614.
 (27) E. Dosti, M. Shehab, H. Alves, M. Latvaaho, On the performance of nonorthogonal multiple access in the finite blocklength regime, in: BalkanCom 2017; First International Balkan Conference on Communications and Networkin, 2017.
 (28) A. A. Zaidi, R. Baldemair, S. F. Mattias Andersson, V. MolésCases, Z. Wang, Designing for the future: the 5G NR physical layer, Ericsson Technology Review.
 (29) E. Dosti, M. Shehab, H. Alves, M. Latvaaho, Ultra reliable communication via CCHARQ in finite blocklength, in: 2017 European Conference on Networks and Communications (EuCNC), 2017, pp. 1–5. doi:10.1109/EuCNC.2017.7980708.

(30)
H. Tabassum, M. S. Ali, E. Hossain, M. J. Hossain, D. I. Kim,
Nonorthogonal multiple access
(NOMA) in cellular uplink and downlink: Challenges and enabling
techniques, CoRR.
URL http://arxiv.org/abs/1608.05783  (31) Z. Zhang, H. Sun, R. Q. Hu, Downlink and uplink nonorthogonal multiple access in a dense wireless network, IEEE Journal on Selected Areas in Communications 35 (12) (2017) 2771–2784. doi:10.1109/JSAC.2017.2724646.
 (32) M. E. Bayrakdar, S. Atmaca, A. Karahan, A slotted alohabased random access cognitive radio network with capture effect in rayleigh fading channels, Turkish Journal of Electrical Engineering and Computer Sciences.

(33)
X. Sun, S. Yan, N. J. Yang, Z. Ding, C. Shen, Z. Zhong,
Shortpacket communications in
nonorthogonal multiple access systems, CoRR abs/1704.06420.
arXiv:1704.06420.
URL http://arxiv.org/abs/1704.06420  (34) W. Yang, G. Durisi, T. Koch, Y. Polyanskiy, Quasistatic multipleantenna fading channels at finite blocklength, IEEE Transactions on Information Theory 60 (7) (2014) 4232–4265. doi:10.1109/TIT.2014.2318726.
 (35) M.S. A. Marvin K. Simon, Digital Communication over Fading Channels: A Unified Approach to Performance Analysis, Copyright 2000 John Wiley & Sons, Inc., 2005.
 (36) O. Lopez, H. Alves, R. D. Souza, E. M. G. Fernández, Ultrareliable shortpacket communications with wireless energy transfer, IEEE Signal Processing Letters 24 (4) (2017) 387–391. doi:10.1109/LSP.2017.2667620.
 (37) P. Larsson, L. K. Rasmussen, M. Skoglund, Analysis of rate optimized throughput for largescale mimo(h)arq schemes, in: 2014 IEEE Global Communications Conference, 2014, pp. 3760–3765. doi:10.1109/GLOCOM.2014.7037393.
Comments
There are no comments yet.