Rate Control under Finite Blocklength for Downlink Cellular Networks with Reliability Constraints

06/12/2018 ∙ by Onel L. Alcaraz Lopez, et al. ∙ University of Oulu 0

Coming cellular systems are envisioned to open up to new services and applications with high reliability and low latency requirements. In this paper we focus on the rate allocation problem in downlink cellular networks with Rayleigh fading and stringent reliability constraints. We propose a rate control strategy to cope with those requirements making use only of topological characteristics of the scenario, the reliability constraint and the number of antennas that are available at the receiver side. Numerical results show the feasibility of the ultra-reliable operation when the number of antennas increases, and also that our results remain valid even when operating at short blocklength as far as the amount of information to be transmitted is not too small.

READ FULL TEXT VIEW PDF
POST COMMENT

Comments

There are no comments yet.

Authors

page 1

page 2

page 3

page 4

This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.

I Introduction

The advent of fifth generation (5G) of wireless systems opens up new possibilities and gives rise to a new category of use cases termed ultra reliable low latency communications (URLLC) [1], where services are characterized by very stringent requirements. Some examples are [2]: factory automation, with maximum latency around -

ms and maximum error probability of

; smart grids (-ms, ), professional audio (ms, ), etc. In general, there is a fundamental trade-off between delay and reliability metrics due to the fact that by relaxing one of them, we can enhance the performance of the other. In fact, Long-Term Evolution (LTE) already offers guaranteed bit rate that can support packet error rates down to , however, the delay budget goes up to ms which includes radio, transport and core network latencies [3]. Therefore, the interplay between these metrics makes physical layer design of URLLC very complicated [4].

The principles for supporting URLLC are discussed in [5] including various elements of the system design, such as use of various diversity sources, design of packets and access protocols. Shared diversity resources are explored more deeply in [6] when multiple connections are only intermittently active in order to support URLLC. Authors in [7] address the delay and packet loss components in URLLC and the network availability for supporting the quality of service of users, while some tools for resource optimization are presented. The minimum energy required to transmit information bits with a given reliability over a multiple-antenna Rayleigh block-fading channel is investigated in [8], while also in a multi-antenna setup the trade-off between reliability, throughput, and latency when transmitting short packets is identified in [9]. In [10], an energy efficient power allocation strategy for the Chase Combining Hybrid Automatic Repeat Request (CCHARQ) is proposed to meet the reliability constraints of URLLC systems. Cooperative communications are also considered in literature, e.g., [11], and [12, 13] for wireless powered communications, as a viable alternative to direct communication setups [14].

In this paper we focus on the rate allocation problem in downlink URLLC cellular networks with Rayleigh fading. The system is composed of a multi-cell setup where multiple base stations (BSs) are interfering an URLLC link with multiple antennas at receiver side. The main contributions of this work can be listed as follows:

  • we propose a rate allocation scheme that meets the stringent reliability constraints of the system. The allocated rate depends only on topological characteristics of the scenario, the reliability constraint and the number of antennas that are available at the user equipment device (UE) side;

  • we attain accurate closed-form approximations for the rate to be allocated when the UE operates using the Selection Combining (SC) and Maximum Ratio Combining (MRC) schemes;

  • numerical results show the superiority of the MRC scheme and also the feasibility of the ultra-reliable operation when the number of antennas increases at the UE.

  • we show that our analytical results remain valid even when operating at short blocklength, low latency, as far as the amount of information to be transmitted is not too small.

Next, Section II introduces the system model and assumptions. Section III presents the rate allocation strategy, while Section IV discuss some aspects related with the low latency requirement. Finally, Section VI concludes the paper.

Notation:

is a normalized exponential distributed random variable with Cumulative Distribution Function (CDF)

, while

is a Lomax random variable with Probability Density Function (PDF)

and CDF . Also, and are the Gaussian Q-function and the incomplete gamma function, respectively.

Ii System Model

Consider a multi-cell downlink cellular network where a collection of BSs, , are spatially distributed in a given area . We denote the collection of those points as , and this deployment can be seen in general as an instantaneous realization of some Point Process (PP). We focus on the transmission over one given channel while assuming that each , is currently using that channel to transmit data to its corresponding , . We denote the distance between each and as and adopt a channel model that comprises standard path-loss with exponent and Rayleigh fading. We define the link between and , as the typical link, and we focus on its performance. Fig. 1 shows an example topology with interfering BSs.

is equipped with antennas sufficiently separated such that the fading affecting the received signal in each antenna can be assumed independent and full gain from spatial diversity can be attained. Channel State Information (CSI) is available at , and each BS transmits with fixed power. We consider an interference-limited wireless system given a dense deployment of small cells where the impact of noise is neglected111However, the impact of the noise could easily be incorporated without substantial changes.. Thus, the Signal-to-Interference Ratio (SIR) perceived in each antenna is , with

(1)

where are the power channel gain coefficients of the typical link at the -th antenna, and of the interfering channel between -th BS and -th antenna of , respectively. Finally, consider that signal transmitted by spans over channel uses and containing information bits, e.g., fixed transmission rate (bpcu).

Fig. 1: Illustration of the system model with .

Iii Asymptotic rate control under reliability constraint

Herein we consider the asymptotic formulation (infinite blocklength), in which an error in decoding the information occurs when , . Therefore, the distribution of the SIR, , is necessary and it is given in the following result.

Theorem 1.

The CDF of the SIR at each antenna is given by

(2)

which is upper-bounded by

(3)

with and .

Proof.

We proceed as follows

(4)

where follows from the complementary CDF of exponential random variable , and (2) comes directly after (4). Now we focus on the upper bound.

(5)

where comes from using the relation between the geometric and the arithmetic mean, follows from simple algebraic transformations, and by adopting . Substituting (5) into (2) we attain (3). ∎

Remark 1.

Both, (2) and (3), converge in the left tail. This becomes evident from the proof of Theorem 1. Therein notice that when operating in the left tail should be close to 1, therefore each of the terms

is expected to approximate to the unity. Hence, all of these terms are very similar between each other, and geometric mean approximates heavily to arithmetic mean in such scenarios.

Fig. 2: Comparison between the exact and approximate expressions of and for three different setups: , , ; , , ; , , . We set . The exact PDF was evaluated taking the derivative of the exact CDF (2) for each setup.

Also, as a consequence of (3) the SIR at each antenna is approximately a Lomax random variable with PDF given by

(6)

This can be represented as a scaled Lomax distribution such that with .

The accuracy of the approximations in the left tail is clearly illustrated in Fig. 2 for three different setups, thus, validating our findings.

Remark 2.

Obtaining the PDF of the SIR directly from (2) seems intractable for large , which is the case in dense network deployments. Also, since the upper bound is extremely tight in the left tail of the distribution, its utility is enormous because it is in that region where typical reliability constraints are, e.g., .

Remark 3.

Notice also that our results are not restrictive to the adopted path loss model. In fact, can be expressed in a generalized way as , where is the path loss in the typical link and is the path loss from the the -th interfering BS to . For static BS deployments these parameters can be easily obtained beforehand.

Henceforth, we assume fixed and we are interested in finding the maximum number of bits, , such that the reliability requirement is met. The target reliability is denoted by where is the admissible average error probability. In the following two subsection we solve this problem for SC and MRC schemes at the receiver side.

Iii-a Selection Combining – SC

When uses the SC scheme, the error in decoding the receiving message is defined as

(7)

where , follows from the fact that is distributed independently on each antenna. This is because the fading is i.i.d and the topology is deterministic (non random). Finally, comes from using the definition of the CDF of .

Theorem 2.

Assuming the distance from to the serving and interfering BSs is known and uses SC, the maximum number of bits to be transmitted, , while guaranteeing the reliability constraint given by , is the solution of

(8)

and is approximated by

(9)
Proof.

Based on (7) we know that is the solution of . Using the exact expression for given in (2) we attain (8), while using (3) as an approximation of (2) we reach (9). ∎

Notice that finding the solution of (8) for large is analytically heavy, and numerical methods would be required. Even for finite, and not so large , solving (8) is difficult, thus, (9) provides an easy way of doing so. Also, since (3) is tight in the left tail, it is expected that (9) to be very accurate for and we provide numerical evidence in Section V.

Finally, the PDF of the SIR after SC is given by

(10)

Iii-B Maximal Radio Combining – MRC

When uses the MRC scheme, the error in decoding the receiving message is defined as

(11)

where . From Remark 1, can be represented as where . Thus,

(12)
Corollary 1.

Assuming the distance from to the serving and interfering BSs is known and uses MRC, the maximum number of bits to be transmitted, , while guaranteeing the reliability constraint given by , is approximated by

(13)

where .

Proof.

Since we only require to isolate there while using . ∎

The distribution of was already attained in [15, CDF in Eq.(4.13)]. Unfortunately is very difficult to evaluate, therefore, very time-consuming. In fact, it is also impossible to be evaluated for many combinations of parameter values , e.g, relatively small and relatively large and/or , for which calculation crashes with the software/hardware limitations. Following result addresses that issue.

Theorem 3.

The PDF and CDF of are approximated by

(14)
(15)

where (15) converges to [15, Eq.(4.13)] in the left tail.

Proof.

The proof will be included in an extended version of this work. ∎

Fig. 3: Left tail of . Comparison between the exact, [15, Eq.(4.13)], approximate, (15), and lower bound, (17) with , expressions.

Fig. 3 shows the incredible accuracy of (15) in the left tail. Only a slight divergence from the exact expression is observable when is relatively small, e.g., , at the same time that the reliability is not too restrictive, . This is in-line with the arguments we used when proving Theorem 3. Using expressions (14) and (15) is twofold advantageous: i) they are relatively easy to evaluate and ii) they can be evaluated in regions where the exact expressions cannot. Regarding this last aspect notice that [15, Eq.(4.13)] was nonviable to evaluate for and also for , just for mentioning two examples.

Although an easy-to-evaluate expression for was given in (15), it is not analytically invertible, thus, requires to be computed numerically. Following result aims at alleviating this issue.

Corollary 2.

approximates to

(16)

specially when is very restrictive and is not too large.

Proof.

According to [16, Eq. (8.10.11)] we have that

(17)

where equality holds for and diverges slowly when increases. Additionally, this lower bound is very tight in the left tail of the curve, e.g., when is more restrictive. We require to isolate from , and notice that for we have , thus, we can take , which makes (17) even more accurate when is not too small. The tightness of the lower bound is clearly shown in Fig. 3. Finally we attain (16) straightforwardly. ∎

Iv Finite Blocklength Impact

The information theoretic analysis for infinite blocklength says that no error occurs as long as . However, if we communicate over a noisy channel and we are restricted to use a finite number of channel uses , then no protocol is able to achieve perfectly reliable communication. In that sense, Polyanskiy et. al. [17] attained, for AWGN and channel uses, an accurate approximation that characterizes the error probability non-asymptotically as

(18)

where is the Shannon capacity and is the channel dispersion, which measures the stochastic variability of the channel relative to a deterministic channel with the same capacity. Notice that since the CSI is available at the value of the is easy to obtain, thus, the quasi-static fading channel becomes conditionally Gaussian on that, and we only require to take expectation over random variable to attain the corresponding average error probability [18, eq.(59)]

(19)

where is given in (10) and (14) for SC and MRC, respectively. Thus, taking into account the finite blocklength formulation, the maximum number of bits to be transmitted is

(20)

that can be solve numerically by exhaustive search222This problem is equivalent to find the solution of in terms of and set . However, there is no numerically way to do that in one go; and solving (20) always requires to evaluate several values of until the solution is found..

However, and as it has been shown in [19] for Nakagami-m and Rice channels, the quasi-static fading makes disappear the effect of the finite blocklength, thus, the asymptotic outage probability, which is the Laplace approximation of (19), is a good match in those scenarios and specially when i) is not extremely small and ii) line of sight parameter is not extremely large. The latter condition is because the fading channel tends to behave as AWGN channel when the line of sight parameter increases significantly, and at AWGN the error probability given in (18) differs substantially from the asymptotic results. Therefore, using the value of obtained in Section III for the SC and MRC schemes as an initial guess when solving (20) reduces greatly the searching time. The procedure is

1:Calculate according to (9), (13), for SC and MRC schemes respectively
2:
3:Evaluate (19)
4:if  then
5:     Decrease and return to line 3
6:end if
7:End

V Numerical Analysis

Numerical results are presented in this section to evaluate the system performance in terms of maximum number of bits to be transmitted (Figs. 4, 5 and 6) and maximum reachable rate (Fig. 7), both under stringent reliability and delay constraints. We compare SC and MRC schemes, while evaluating also the performance under the asymptotic and non-asymptotic blocklength formulations.

Fig. 4: Performance of as function of for channel uses, , , and SC, MRC diversity schemes. Topology with , , .

Fig. 4 shows the results as a function of the error probability constraint for receiving devices with antennas and operating with a blocklength of 200 channel uses. The topology under study consists of BSs located (m), away from the link of interest which is m long, while the path loss exponent is set to , thus, . We can notice that

  • operating with only one antenna is practically unfeasible for the region where is required, while as the number of antennas increases we can operate in the ultra-reliable region, e.g., , with even relatively large data rates;

  • approximation (9) is very accurate, and only when and are relatively large, e.g., , the gap with respect to the exact value given in (8), although still small, can be observed. This is because (9) uses upper bound (3), which is tight when the required error probability, , is small as discussed in Remark 1 and 2. However, for multiple antenna setups the equivalent error probability is which increases with , thus, relatively affecting the accuracy. Unfortunately, this analysis could only be done for the SC scheme since for MRC the exact expression would come from first getting the PDF of from (8), which is already unfeasible. However, approximation for MRC is expected to be even more accurate since the target error probability remains unchanged;

  • as expected, MRC overcomes the SC scheme in all the region. As the number of antennas increases, the gap increases. Interestingly and for the example topology, MRC doubles the number of bits that can be transmitted under the SC scheme when operating with and with ;

  • the asymptotic and finite blocklength results match accurately when is not too small, e.g., bits, while for extremely small data payloads the gap increases considerably. For instance, operating with and SC scheme, the asymptotic formulation says that we can transmit with up to bits with an error probability of , while under the finite blocklength formulation the maximum amount of information to be transmitted is reduced to only bits.

Fig. 5: Performance of as function of for channel uses, , , , and SC, MRC diversity schemes.

All the other remaining figures focus only on the results coming from evaluating the provided approximate expressions, therefore, they rely entirely on the topological parameter . In fact, Fig. 5 shows the performance as a function of for a setup with interfering BSs, while operating with channel uses. As increases, the performance decreases as expected from observing (9) and (13). This is because a decrement on is due to a larger length of the desired link and/or smaller distances to the interfering BSs and/or greater pathloss exponent. Once again we can notice that the multi-antenna configuration enables the ultra-reliability operation, while the superiority of the MRC scheme is evidenced again. Also, the asymptotic formulation is accurate when is not too small as previously discussed.

Fig. 6: Performance of as function of for channel uses, , , , and SC, MRC diversity schemes.

Fig. 6 shows the performance as a function of when operating with interfering BSs, and channel uses. Once again MRC outperforms SC, and notice that the gap between these two schemes tends to increase as increases. It can be observed that the attainable data rates increase for the given reliability constraints as increases. Notice also that for a given , the asymptotic formulation differs more from the finite blocklength results when the required reliability increases. As discussed before this is more obvious for the region of extremely small , e.g., bits.

Fig. 7: Performance of the rate, , as function of blocklength, , and operating with SC with , , .

Finally, Fig. 7 shows the attainable rate, , as a function of the blocklength and under the SC operation333Here it is only shown SC for better visualization of the results, however notice that the performance of MRC is similar but shifted up. for a setup with interfering BSs and . The asymptotic curves are presented as straight lines because rather on independently the or values, the asymptotic formulation depends on the rate . Notice that the gap between the asymptotic and finite blocklength formulations tend to vanish as increases, however, this is a slower process as is smaller, which occurs when and/or decrease. As shown in this and all the previous figures, the stringent the reliability requirement, the smaller the amount of information that can be transmitted.

Vi Conclusion

In this paper, we proposed a rate allocation scheme for a downlink cellular system operating with stringent reliability constraints. The allocated rate depends on i) , which is a function of the pathloss exponent and the distances from the served UE to all BSs; ii) the number of interfering BSs; iii) the reliability constraint; and iv) the number of antennas that are available at the UE side. We reached accurate closed-form approximations for the attainable rate when the UE operates using the SC and MRC schemes. The numerical results show the superiority of the MRC scheme and also the feasibility of the ultra-reliable operation when the number of antennas increases at the UE. Finally, we show that our analytical results remain valid even when operating at short blocklength as far as the amount of information to be transmitted is not too small.

Acknowledgment

We thank the support of Academy of Finland 6Genesis Flagship (Grant n.318927, and n.303532, n.307492) and by the Finnish Funding Agency for Technology and Innovation (Tekes), Bittium Wireless, Keysight Technologies Finland, Kyynel, MediaTek Wireless, Nokia Solutions and Networks.

References

  • [1] P. Popovski, “Ultra-reliable communication in 5G wireless systems,” in 1st International Conference on 5G for Ubiquitous Connectivity, Nov 2014, pp. 146–151.
  • [2] P. Schulz and et. al., “Latency critical IoT applications in 5G: Perspective on the design of radio interface and network architecture,” IEEE Commun. Mag., vol. 55, no. 2, pp. 70–78, February 2017.
  • [3] B. Singh, Z. Li, and M. A. Uusitalo, “Flexible resource allocation for device-to-device communication in FDD system for ultra-reliable and low latency communications,” in 2017 Advances in Wireless and Optical Commun. (RTUWO), Nov 2017, pp. 186–191.
  • [4] H. Ji, S. Park, J. Yeo, Y. Kim, J. Lee, and B. Shim, “Ultra reliable and low latency communications in 5G downlink: Physical layer aspects,” arXiv preprint arXiv:1704.05565, 2017.
  • [5] P. Popovski, J. J. Nielsen, C. Stefanovic, E. de Carvalho, E. Ström, K. F. Trillingsgaard, A.-S. Bana, D. M. Kim, R. Kotaba, J. Park et al., “Ultra-reliable low-latency communication (URLLC): Principles and building blocks,” arXiv preprint arXiv:1708.07862, 2017.
  • [6] R. Kotaba, C. N. Manchón, T. Balercia, and P. Popovski, “Uplink transmissions in URLLC systems with shared diversity resources,” IEEE Wireless Commun. Letters, vol. PP, no. 99, pp. 1–1, 2018.
  • [7] C. She, C. Yang, and T. Q. S. Quek, “Radio resource management for ultra-reliable and low-latency communications,” IEEE Commun. Mag., vol. 55, no. 6, pp. 72–78, 2017.
  • [8] W. Yang, G. Durisi, and Y. Polyanskiy, “Minimum energy to send bits over multiple-antenna fading channels,” IEEE Trans. on Inf. Theory, vol. 62, no. 12, pp. 6831–6853, Dec 2016.
  • [9] G. Durisi, T. Koch, J. Östman, Y. Polyanskiy, and W. Yang, “Short-packet communications over multiple-antenna Rayleigh-fading channels,” IEEE Trans. on Commun., vol. 64, no. 2, pp. 618–629, Feb 2016.
  • [10] E. Dosti, M. Shehab, H. Alves, and M. Latva-aho, “Ultra reliable communication via CC-HARQ in finite block-length,” in 2017 European Conf. on Netw. and Commun. (EuCNC), June 2017, pp. 1–5.
  • [11] P. Nouri, H. Alves, R. D. Souza, and M. Latva-aho, “Ultra-reliable short message cooperative relaying protocols under Nakagami-m fading,” in 2017 Int. Symp. on Wireless Commun. Systems (ISWCS), Aug 2017.
  • [12] O. L. A. López, R. D. Souza, H. Alves, and E. M. G. Fernández, “Ultra reliable short message relaying with wireless power transfer,” in 2017 IEEE Int. Conf. on Commun. (ICC), May 2017, pp. 1–6.
  • [13] O. L. A. López, E. M. G. Fernández, R. D. Souza, and H. Alves, “Ultra-reliable cooperative short-packet communications with wireless energy transfer,” IEEE Sensors Journal, vol. 18, no. 5, pp. 2161–2177, 2018.
  • [14] O. L. A. López, H. Alves, R. D. Souza, and E. M. G. Fernández, “Ultrareliable short-packet communications with wireless energy transfer,” IEEE Sig. Proces. Let., vol. 24, no. 4, pp. 387–391, April 2017.
  • [15] Y. Zhang, “Physical layer security performance study for wireless networks with cooperative jamming,” 2017.
  • [16] I. Thompson, “NIST Handbook of mathematical functions, edited by Frank WJ Olver, et al.” 2011.
  • [17] Y. Polyanskiy, H. V. Poor, and S. Verdu, “Channel coding rate in the finite blocklength regime,” IEEE Trans. Inf. Theory, vol. 56, no. 5, pp. 2307–2359, May 2010.
  • [18] W. Yang, G. Durisi, T. Koch, and Y. Polyanskiy, “Quasi-static multiple-antenna fading channels at finite blocklength,” IEEE Transactions on Information Theory, vol. 60, no. 7, pp. 4232–4265, July 2014.
  • [19] P. Mary, J. M. Gorce, A. Unsal, and H. V. Poor, “Finite blocklength inf. theory: What is the practical impact on wireless commununications?” in 2016 IEEE Globecom Workshops, Dec 2016, pp. 1–6.