Ultra Reliable Communication via Opportunistic ARQ Transmission in Cognitive Networks

01/29/2018 ∙ by Mohammad Shehab, et al. ∙ 0

This paper presents a novel opportunistic spectrum sharing scheme that applies ARQ protocol to achieve ultra reliability in the finite blocklength regime. A primary user shares its licensed spectrum to a secondary user, where both communicate to the same base station. The base station applies ARQ with the secondary user, which possess a limited number of trials to transmit each packet. We resort to the interweave model in which the secondary user senses the primary user activity and accesses the channel with access probabilities which depend on the primary user arrival rate and the number of available trials. We characterize the secondary user access probabilities and transmit power in order to achieve target error constraints for both users. Furthermore, we analyze the primary user performance in terms of outage probability and delay. The results show that our proposed scheme outperforms the open loop and non-opportunistic scenarios in terms of secondary user transmit power saving and primary user reliability.

READ FULL TEXT VIEW PDF
POST COMMENT

Comments

There are no comments yet.

Authors

page 1

page 2

page 3

page 4

This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.

I Introduction

Spectrum sharing has always been an imminent research topic through the current decade. Due to spectrum scarcity, researchers are studying the use of higher frequency bands e.g. millimeter-wave (mm-Wave) to uphold ultra broadband systems in fifth generation networks. Applying cognitive radio schemes represents a promising alternative and parallel solution at the same time [1]. The design of such networks is expected to support newly introduced technologies such as machine to machine (M2M) communication promoting the Internet of Things (IoT). Quality of service (QoS) constraints are imposed to fulfill very low latency with expected reliability of higher than 99.9 [2, 3, 4].

In order to achieve Ultra-Reliable Low Latency Communication (URLLC) in emerging technologies such as industrial automation [4], machines communicate using short messages whenever data sizes are reasonably small such as sensor readings or alarm notifications, which is the case in the most of machine type communication (MTC) scenarios [2, 4]. Consequently and as a result of the failure of Shannon’s model to provide an accurate benchmark for it, finite blocklength communication has been extensively studied recently [5, 2, 6, 7]. For instance, [5] characterizes the throughput of delay constrained systems communicating on short packets, while [6] defines the maximum achievable rate and throughput of ARQ protocols in the finite blocklength regime.

On the other hand, cognitive radios allow a primary user (PU) to share its licensed channel resources namely spectrum to unlicensed cognitive secondary user (SU). Previous works considered collision scenarios where the SU is allowed to transmit with constraints on the interference temperature affecting the PU [8, 9, 10, 1, 11]. For example, [8]

proposes a three-dimensional Markov chain model to analyze the SU performance in dynamic spectrum access with interference temperature constraints. In

[10], the authors studied the capacity and optimal power allocation in collision scenarios with PU SINR guarantees. Fan et al. introduced a non-cooperative game to maximize the throughput of mm-Wave ultra-dense networks (UDNs) using dynamic spectrum sharing in [1]. Makki et al. approached finite blocklength spectrum sharing via rate adaption in [11] and suggested ARQ protocol as a potential extension to their work. However, non of these endeavors studied applying ARQ and successive interference cancellation (SIC) in the finite blocklength regime.

In this paper, we propose a novel opportunistic transmission framework for a SU in interweave model in the finite blocklength regime. In an interweave model, the SU senses the PU activity and decides whether to transmit or not according to some QoS (outage) guarantees [9]. If the PU is active, the SU accesses the channel with a certain access probability based on the PU and SU arrival rates as characterized in our work. The base station (BS) applies ARQ and SIC on the SU packet. In ARQ protocol, the SU is allowed to retransmit its packet if it receives a NACK feedback from the BS, which means the packet is not successfully decoded. The SU possesses trails to transmit a single packet, where depends on the SU arrival rate to retain the SU queue stability. Once the BS decodes the SU packet, it applies SIC to eliminate interference from the PU packet and subsequently, reduces the error outage probability for the PU. Furthermore, we analyze the PU expected delay, which occurs due to the SIC process and the SU retransmissions. The results show that this scheme provides ultra reliability for both the PU and SU while reducing the SU transmit power.

The rest of the paper is organized as follows: in Section II, we characterize communication at finite blocklength and introduce the system model. Next, Sections III and IV include derivations of the SU outage probability and transmit power. After that, we analyze the PU outage probability and delay in Section V. The performance of the proposed scheme is evaluated in Section VI. Finally, Section VII concludes the paper.

Ii System layout

Consider an uplink scenario where the PU and the SU convey short packets with a fixed rate bits per channel use (bpcu) to a common BS. For finite blocklength transmission, packets are conveyed with error probability given by [12, 6]

(1)
(2)

where denotes the SINR, is the blocklength and is the channel dispersion.

Both PU and SU have a Bernoulli distributed arrival process with packet arrival probabilities of

and , respectively as in [13]. This implies that although we know the average arrival probability of the PU, we can not predict exactly when the PU will have packets to transmit. Whenever a packet arrives to the PU, the PU transmits it only once and remains silent until the next packet arrival. On the contrary, the SU applies opportunistic transmission. The SU possesses trials to transmit a single packet where denotes the trial. According to Loynes’ theorem [14], a queue is stable if its average service rate is higher than the average arrival rate. To guarantee SU queue stability at steady state and boost reliability, M varies from one packet to the other such that for fraction of time and for fraction of time. is selected to be slightly higher than or equal to with

(3)

On the other side, the BS applies the ARQ protocol with the SU where the BS calls the SU to retransmit its packet if an error occurs. Given that the SU’s packet is not successfully decoded before the trial, the SU accesses the channel with probability 1 if the PU is silent and with access probability if the PU is transmitting a packet. Here, we assume that the SU is able to sense the PU transmission perfectly as in [8].

Let and be the transmit powers of the PU and SU, respectively, while and denote their channel coefficients, respectively as shown in Fig. 1. Both channels are i.i.d quasi-static Rayleigh fading with coherence time of

symbol periods, and the channel coefficients are available at the BS. The noise entries are additive complex Gaussian of unit variance. Define the PU packet outage probability as

and the SU packet outage probability after exhausting its trials as .

Fig. 1: System layout.

If both users transmit at the same time, the BS applies SIC on the PU received signal. The BS is able to decode the SU interfering packet successfully with probability . In this case, the PU SINR is the same as if the PU transmits while the SU is silent, which is . This renders an outage probability of . Likewise, the BS fails to decode the SU packet with probability , which renders a PU SINR of . This causes an outage probability of . It is straightforward to infer that due to the interference in the second case. Leveraging, in case of simultaneous transmission, the PU outage probability is

(4)

At the trial, the SU has an outage probability of if the PU is silent and in case of concurrent transmission, where and . The targets of our analysis are as follows:

  1. Compute the PU and SU outage probabilities.

  2. Optimize the SU access probabilities to minimize the SU transmit power subject to outage constraints.

  3. Assess the performance of opportunistic ARQ transmission in terms of SU power saving and PU reliability.

Iii Secondary user Outage Probability

We start by deriving the outage expression for the SU in closed form. At a certain instant, suppose that a packet arrives at the SU’s buffer; the SU user starts to sense the channel for PU transmission and admits opportunistic transmission with ARQ as detailed in Section II. Define the probability of reaching the trial as . The probability tree of success and failure at the is projected in Fig. 2.

Lemma 1.

The SU’s cumulative outage probability can be formulated as

(5)

where , and .

Fig. 2: Probability tree of the trial.
Proof.

At the trial and according to Fig. 2, we define the following probabilities; the probability that the SU transmits at the trial is given by

(6)

while the probability that it remains silent is

(7)

Thus, the probability of success at the trial is

(8)

For the time slot, we obtain the fail probability as

(9)

which for corresponds to the probability of reaching the second trial. Similarly, we obtain the probability of reaching the third trial as

(10)

Following the above pattern, we attain the probability of reaching the trial as

(11)

The SU’s cumulative outage probability can be projected as the virtual probability of reaching the trial after the trial fails. That is, which according to (III) leads to (5). ∎

Proposition 1.

The SU outage probability is lower bounded by , and upper bounded by almost surely .

Proof.

The lowest possible SU outage probability occurs when the SU always transmits regardless of the state of the PU. Substituting {} in (5), we obtain

(12)

Likewise, the worst case outage occurs when the SU never transmits whenever the PU is active; that is {} in (5), which yields

(13)

Here, and are the lower and upper bounds, respectively for the SU outage probability and lies in the interval , where the value of is determined according to the access probabilities .

Iv Secondary user transmit power

In this section, we derive the SU transmit power required to achieve a target SU outage probability in the open loop, non-opportunistic, and opportunistic schemes. First, we start by the open loop scenario.

Iv-a Open Loop Scenario

To achieve a transmission rate at a target SU error probability with single transmission (open loop), the amount of allocated power according to (1) is the root of

(14)

which can be obtained using Matlab root-finding functions, e.g., fzero or plotting when setting in a similar way to [10]. Taking into consideration the interference that that occurs when the PU has a packet arrival with probability , the SU SINR becomes . Thus, the open loop SU transmission power is

(15)

where and are obtained by solving (14).

Iv-B Non-opportunistic Scenario

In non-opportunistic transmission, the SU keeps retransmitting its message with probability 1 till it is successfully decoded regardless of the state of the PU. In this case the SU needs trials to convey its packet, which can be obtained from the lower bound equation in (12) as

(16)

Thus, the transmit power is given by

(17)

Iv-C Opportunistic Scenario

Back to the transmission process, exploiting (6) and (III), we can say that a transmission occurs at the trial with probability

(18)

Thus, the SU transmit power needed to deliver one packet can be formulated as the sum of transmission probabilities times the power per transmission . That is

(19)

with

(20)

Since is constant in (20), it is clear that the power consumed per packet transmission solely depends on the objective function .

Reversing the problem, we aim at computing the necessary access probabilities to satisfy a certain target SU outage probability such that . A feasible solution can be obtained by setting , which implies equal access probabilities for all trials. From (5), we have

(21)

where . The solution of (21) gives

(22)

Indeed (22) represents a feasible solution that satisfies the outage constraint. The consumed power per packet can be obtained by substituting the resultant in (20), then (19). However, this solution seems to be sub-optimal since there is no evidence that it minimizes the objective function and hence, the consumed power per packet in (19).

To obtain the optimum access probabilities, we cast the following optimization problem to minimize the objective function with both PU and SU outage constraints

(23)

Taking a closer look on the above problem, we recognize that neither nor has a positive definite Hessian matrix an hence, neither is convex. Consequently, this problem can not be solved using Karush-Kuhn-Tucker (KKT) conditions [15]. Nevertheless, this problem can be easily solved by a numerical search with the same approach implemented in [9], since the access probabilities are bounded between 0 and 1. Moreover, the numerical search can be further simplified bearing that the optimum solution must be such that , which can be proven, and the mathematical proof is omitted due to lack of space.

V Primary user Performance analysis

Herein, we analyze the PU performance when the SU packet inter-arrival time is constant, which is the worst case scenario for the PU as the SU always has a new packet to transmit once it exhausts its trials for the previous packet.

V-a Primary User Outage Probability

Proposition 2.

The minimization of the objective function not only minimizes the SU transmit power, but also minimizes the PU overall outage probability .

Proof.

First, we characterize the PU outage probability. Considering that (20) represents the SU transmission probabilities and that a PU packet can arrive at any SU trial with probability , we can infer the probability of simultaneous transmission in terms of as

(24)

From (4), the PU outage probability can be written as

(25)

and the first derivative of w.r.t is

(26)

which is strictly positive since . ∎

V-B Primary User Delay

When decoding the PU packet, an extra delay occurs when the PU suffers from interference from the SU. This is because the decoder must wait for the SU packet to be decoded first to perform interference cancellation which may take up to time slots; then it can decode the PU packet without interference. To analyze the delay , first we assume that once the SU packet has been received with no error, the BS requires a virtual zero processing time to decode the SU packet and perform SIC. Thus, the only delay occurs due to the decoder waiting time for the SU retransmissions. A PU packet can arrive at any SU trial with probability . Therefore, at the time slot, PU suffers a virtual zero delay in the following cases:

  1. The SU is not present (did not reach the trial).

  2. It is present and decides not to transmit or transmits successfully.

  3. The SU is at its trial.

Thus, the virtual zero latency probability can be formulated by (28) on the the top of the next page and the above 3 cases are highlighted below each term. Following a similar procedure, we attain the probability of integer () packet duration latency as (29). The PU expected delay is bounded by

(27)
(28)

 

(29)

 

Vi Performance Evaluation

Fig. 3: SU outage probability vs PU arrival rate for , , , dB, dB.

This section includes different plots to elucidate the performance of ARQ opportunistic transmission with SIC in terms of SU outage, SU power allocation, and PU reliability. The following parameters are fixed for all plots: bpcu, dB, dB, , and (). In Fig. 3, we plot the SU outage probability as a function of the PU arrival rate according to (5). In this simulation, the SU access probabilities are constant for all trials as detailed in the figure. The plot shows the SU outage bounds obtained from Proposition 1. It is clear that the SU outage probability increases when the PU has higher arrival rate as well as when the SU access probability is low. Thus, to achieve ultra-reliability for the SU when the PU has high arrival rates, it is essential to rise the SU access probabilities.

In Fig. 4, we compare the SU power allocation in opportunistic transmission to non-opportunistic transmission and open loop (one shot) scenarios. The target outage constraints are set as for the next 3 figures. Fig. 4 shows the power allocation necessary to achieve the target SU outage probability in each scenario for different PU arrival rates . The figure depicts that the opportunistic scheme with equal or optimum power allocation requires significantly less power when compared to non-opportunistic transmission, while the open loop setup is the worst case. The amount of power saving increases when the PU queue becomes more congested, where it reaches more than 3 dB (half power) for with respect to non-opportunistic transmission and up to 20 dB with reference to the open loop scenario. It is also obvious that more power is consumed when the PU arrival rate increases. We also notice that the power gap between the optimum and equal power allocation is very tight and hence, the equal power allocation strategy highly approaches power optimality with low complexity.

Another observation worth mentioning is that although the transmission rate is low () bpcu, we had to transmit with high SNR to achieve ultra-reliability as envisaged by [16]. Bearing in mind that transmit power is normalized to a unit power of noise, transmission with 32 dB in case of opportunistic transmission is considered to be practically plausible specially when compared to 52 dB in the single transmission scheme or 35 dB in the non-opportunistic scenario. The fact that the SU has more chances to transmit when the PU is silent leads to the minimization of the interference for both users. This in turn reduces the power needed by the SU to transmit its packet and the sacrifice of reliability for the PU when the SU is present.

Fig. 4: Power allocation vs PU arrival rate for , , dB, dB, , and .

Fig. 5 depicts the PU error outage probability with and without the presence of SU for different PU arrival rates. The figure shows that the PU outage probability rises from to . It is obvious that applying the ARQ opportunistic scheme guarantees a very limited declination in the PU reliability in terms of error while serving the SU. Thus, we attain URC for both PU and SU at the same time.

Fig. 5: PU error probability vs PU arrival rate for , , dB, dB, , and .
Fig. 6: PU average delay vs PU arrival rate for , , dB, dB, , and .

Finally, we plot the PU average delay obtained from (27) as a function of PU arrival rate. The figure shows that the PU average delay for non-opportunistic scheme is higher than when applying the opportunistic transmission whether with equal or optimum power allocation. Unlike, the results in Fig. 4, the optimum power allocation strategy renders a considerable reduction in PU delay when compared to equal power allocation. For example, when , the delay is only 2 % of packet duration. In all cases, the PU delay rises when the PU queue becomes more congested.

Vii Conclusion

In this work, we introduced an efficient spectrum sharing model to achieve URC for short packets. The proposed model relies on ARQ opportunistic transmission of the SU after sensing the PU activity in an interweave scenario. We derived the SU outage expressions and defined the upper and lower bounds for this outage as a function of PU arrival rate. We characterized the optimum access probability and analyzed the average delay of the PU packets. The results showed that opportunistic transmission requires significantly lower power when compared to non-opportunistic and open loop scenarios. Moreover, the equal access probabilities highly approaches optimality in terms of power saving. However, we observe that applying the proposed opportunistic scheme with optimum power allocation strategy significantly reduces the PU delay. The proposed scheme serves the SU with a negligible sacrifice in the PU reliability.

Acknowledgments

This work is partially supported by Aka Project SAFE (Grant no. 303532), and by Finnish Funding Agency for Technology and Innovation (Tekes), Bittium Wireless, Keysight Technologies Finland, Kyynel, MediaTek Wireless, and Nokia Solutions and Networks.

References

  • [1] C. Fan, B. Li, C. Zhao, W. Guo, and Y. C. Liang, “Learning-based spectrum sharing and spatial reuse in mm-wave ultra dense networks,” IEEE Transactions on Vehicular Technology, vol. PP, no. 99, pp. 1–1, 2017.
  • [2] P. Popovski, “Ultra-reliable communication in 5G wireless systems,” in 1st International Conference on 5G for Ubiquitous Connectivity, Nov 2014, pp. 146–151.
  • [3] Nokia, “5G for Mission Critical Communication: Achieve ultra-reliability and virtual zero latency,” Nokia White Paper, 2016.
  • [4] P. Schulz et al., “Latency Critical IoT Applications in 5G: Perspective on the Design of Radio Interface and Network Architecture,” IEEE Communications Magazine, vol. 55, no. 2, pp. 70–78, February 2017.
  • [5] M. Gursoy, “Throughput analysis of buffer-constrained wireless systems in the finite blocklength regime,” in EURASIP Journal on Wireless Communucations and Networking 2013, 2013.
  • [6] R. Devassy, G. Durisi, P. Popovski, and E. G. Strom, “Finite-blocklength analysis of the ARQ-protocol throughput over the Gaussian collision channel,” ISCCSP 2014, pp. 173–177.
  • [7] M. Shehab, E. Dosti, H. Alves, and M. Latva-aho, “On the effective capacity of MTC networks in the finite blocklength regime,” in EUCNC 2017, Oulu, Finland, Jun. 2017.
  • [8] Z. Yan, X. Zhang, and W. Wang, “Performance analysis of secondary users in dynamic spectrum access under interference temperature constraints,” in 2010 10th IEEE International Conference on Computer and Information Technology, June 2010, pp. 2655–2661.
  • [9] A. M. Bedewy, K. G. Seddik, and A. Y. Elezabi, “A feedback-based access scheme for cognitive radio networks over interference channels with primary queue guarantees,” in WiOpt, May 2013, pp. 420–427.
  • [10] E. Pei, S. Wang, and Z. Zhang, “Capacity and optimal power allocation for spectrum-sharing with primary transmission consideration in fading channels,” IEEE Communications Letters, vol. 15, no. 4, pp. 389–391, April 2011.
  • [11] B. Makki, T. Svensson, and M. Zorzi, “Finite block-length analysis of spectrum sharing networks using rate adaptation,” IEEE Transactions on Communications, vol. 63, no. 8, pp. 2823–2835, Aug 2015.
  • [12] G. Durisi, T. Koch, and P. Popovski, “Toward Massive, Ultrareliable, and Low-Latency Wireless Communication with Short Packets,” Proceedings of the IEEE, vol. 104, no. 9, pp. 1711–1726, 2016.
  • [13] Y. P. Hsu, E. Modiano, and L. Duan, “Age of information: Design and analysis of optimal scheduling algorithms,” in 2017 IEEE International Symposium on Information Theory (ISIT), June 2017, pp. 561–565.
  • [14] R. M. Loynes, “The stability of a queue with non-independent inter-arrival and service times,” Mathematical Proceedings of the Cambridge Philosophical Society, vol. 58, no. 3, pp. 497–520, 1962.
  • [15] S. Boyd and L. Vandenberghe, Convex Optimization.   New York, NY, USA: Cambridge University Press, 2004.
  • [16] E. Dosti, U. L. Wijewardhana, H. Alves, and M. Latva-aho, “Ultra reliable communication via optimum power allocation for Type-I ARQ in finite Block-Length,” in IEEE ICC 2017, Paris, France, May 2017, pp. 5168–5173.