Skip to main content

Channel-aware MAC performance of AMC-ARQ-based wireless systems

Abstract

This paper proposes a novel framework for the cross-layer design and optimization of wireless networks combining adaptive modulation and coding (AMC) at the physical (PHY) layer with automatic repeat request and channel-aware multiuser scheduling protocols at the data link control (DLC) layer. The proposed framework is based on the use of first-order two-dimensional discrete time Markov chains (DTMCs) jointly modeling the AMC scheme and the amplitude and rate of change of the wireless channel fading envelope. The behavior of the scheduler is embedded into the multidimensional PHY layer Markov model through the use of a service-vacation process. Using this PHY-media access control (MAC) Markov model, the quality of service performance at the DLC layer is discussed considering two different approaches. The first one relies on an analytical framework that is based on the multidimensional DTMC jointly describing the statistical behavior of the arrival process, the queuing system, and the PHY layer. The second one is rooted in the use of the effective bandwidth theory to model the packet arrival process and the effective capacity theory to model the PHY/MAC behavior. Both the DTMC-based and effective bandwidth/capacity-based approaches are analyzed and compared in a cross-layer design aiming at maximizing the average throughput of the system where constraints on the maximum tolerable average packet loss and delay are to be fulfilled.

1 Introduction

Scheduling and automatic repeat request (ARQ) error control protocols at the data link control (DLC) layer and adaptive modulation and coding (AMC) strategies at the physical (PHY) layer are some of the key technologies underpinning state-of-the-art and next-generation wireless communication systems. They are used to optimize resource utilization while providing support to a wide range of multimedia applications with heterogeneous quality of service (QoS) requirements. However, owing to the strong dependencies between DLC and PHY layers in wireless networks, efficiency in system performance may not be warranted using a strictly layered optimization approach. Consequently, cross-layer designs able to jointly optimize the scheduling, ARQ, and AMC functions should be devised.

Although many recent works focus on cross-layer designs that combine AMC schemes with ARQ error control protocols (see, e.g.,[112]), proposals also incorporating the multiuser scheduling process at the media access control (MAC) sublayer are much less common (see, e.g.,[1315]). Liu et al. in[15] presented an opportunistic scheduling scheme to improve the delay performance of secondary users with bursty traffic in cognitive radio (CR) systems. They consider a relay-assisted CR network with a decode-and-forward relaying scheme. Cooperative beamforming is used by the relays to forward packets in either idle or busy time slots without causing interference to primary users. However, in the proposed scheme, although there is a scheduler planning the transmissions of the source and the relays, only one user is considered and the use of AMC is not taken into account. Poggioni et al. in[13] developed a theoretical framework based on a finite-state Markov chain (FSMC) modeling a heterogeneous multiuser scenario where groups of users with different QoS requirements coexist. In this analysis, it is assumed that the Markov chain steady-state probabilities of any user can be considered independent from the steady-state probabilities of all the other users in the system. Furthermore, it is assumed that the steady-state probabilities of different users belonging to the same QoS class are identical. These assumptions restrict the possible application scenarios of this approach as they imply that the traffic and channel characteristics are exactly the same for all users belonging to the same QoS class.

The first-order amplitude-based finite state Markov chain (AFSMC) model developed by Le et al. in[5], including both the AMC and ARQ procedures, was extended by the same authors in[14] to incorporate the multiuser scheduling process. The max-rate multiuser scheduler was included in the model through a service-vacation process allowing a manageable number of system states irrespective of the number of users sharing the channel. Nevertheless, the analysis in[14] suffers from an inaccurate modeling of the flat-fading wireless channel caused by the use of a first-order AFSMC (see[912] for an in-depth discussion of this and related issues). Moreover, the approach in[14] does not define a cross-layering scheme as a means to optimize the system performance, and on top of this, users are assumed to operate in channels with equal characteristics, thus restricting the usefulness of the presented results.

In this paper, capitalizing on the approach described in[14], a service-vacation process is used to embed the channel-aware scheduling protocol behavior into the AMC/ARQ multidimensional discrete time Markov chain (DTMC) model described in some of our previous contributions[912]. Our approach is based on a first-order two-dimensional (2D) Markov model for the wireless flat-fading channel that, as was shown in[912], solves most of the drawbacks of the AFSMC model used in[18, 13, 14]. In addition to the max-rate scheduling algorithm discussed in[14], our approach can be extended to the analysis of more sophisticated scheduling algorithms, including the proportional fairness multiuser scheduler. Moreover, it is not constrained by assumptions on the users’ traffic and/or channel characteristics. Furthermore, as in[10], two of the principal approaches used in the technical literature to model the DLC layer behavior, namely the DTMC model[4, 5] and the effective capacity and effective bandwidth theories[16], are compared in this paper. Both schemes are used to jointly characterize the effects of the multiuser scheduler, the ARQ error control protocols, and the AMC strategies. Finally, another contribution of this paper is the proposal of a cross-layer optimization design that, by tuning selected system parameters such as the average target packet error rate (PER) and/or the average packet arrival rate, is able to coordinate the behavior of AMC, ARQ, and scheduling procedures. The main objective is to optimize the global system performance in terms of average throughput, delay, queue length, and packet loss ratio.

The organization of this paper is as follows: The system model is introduced in Section 2, including subsections describing the AMC scheme, the PHY layer first-order 2D Markov model, and the joint MAC-PHY Markov model. Sections 3 and 4 describe the max-rate and proportional fair schedulers, respectively. Section 5 is devoted to discuss the different approaches that have been used to analyze the interactions between PHY and DLC layers, namely the embedded DTMC approach and the effective bandwidth/capacity theory-based approach. The PHY-MAC cross-layer designs for max-rate and proportional fair schedulers are described in Section 6. In Section 7, analytical and Monte Carlo simulation results are used to validate our model and to establish a fair comparison between DTMC-based and effective bandwidth/capacity-based cross-layer approaches. Finally, the paper concludes in Section 8 with a summary of the main results and contributions.

2 System model and assumptions

A block diagram of the system under consideration is shown in Figure1. As it can be observed, the downlink scenario of a wireless system with a base station (BS) serving N s users is considered. At the BS, there are N s separate radio link level buffers that are used to queue packet arrivals corresponding to every user connected to the BS. These buffers operate in a first-in-first-out (FIFO) fashion and can store up to Q ¯ ={ Q ¯ 1 ,, Q ¯ N s } packets, where Q ¯ u is the queue length of user u. The scheduler, based on channel state information (CSI) collected from the N s users and using a time division multiplexing scheme, takes scheduling decisions to allocate transmission opportunities to active users. Adaptive transmission is performed by using an ARQ error control scheme at the DLC layer and an AMC strategy at the PHY layer. The processing unit at the DLC layer is a packet and the processing unit at the PHY layer is a frame. The link is assumed to support QoS-guaranteed traffic characterized by a maximum average packet delay D l max and a target link layer packet loss rate (PLR) P l max .

Figure 1
figure 1

System model.

The AMC scheme is assumed to have a set M p ={0,, M p 1} of M p possible transmission modes (TMs), each of which corresponding to a particular combination of modulation and coding strategies. It is assumed that when the system uses TMn M p , it transmits p n  = b R n packets per frame, where R n denotes the number of information bits per symbol used by TM n and b is a parameter that determines the number of transmitted packets per frame, which is up to the designer’s choice. For convenience, we consider that p 0 << p M p 1 , with p0 = 0 (i.e., TM 0 corresponds to the absence of transmission) and p M p 1 C p . As it was shown in[9], depending on the channel conditions and the QoS requirements of the different users, some of these M p possible TMs may be deemed useless, and thus, only a setM={0,, M u 1} of Muuseful TMs will be available to the AMC scheme for user u. It will be assumed that when user u is allocated useful TMn M u , the system transmits c n packets and, for convenience, we also consider that c 0 << c M u 1 , with c0 ≥ 0 and c M u 1 = C u C p .

A Rayleigh block-fading model[17] is adopted for the propagation channel, according to which the channel is assumed to remain invariant over a time frame interval T f and is allowed to vary across successive frame intervalsa. Perfect CSI is assumed to be available at the receiver side, and thus, an ideal frame-by-frame TM selection process is performed at the AMC controller of the receiver. Furthermore, an error-free and instantaneous ARQ feedback channel is assumed.

As in[5, 912], we assume that the packet generation of user u adheres to a discrete batch Markovian arrival process (D-BMAP). As stated by Blondia in[18], a D-BMAP can be described by substochastic matrices U a u , a = 0,1,2,…,n, of the order A u × A u , with elements u a u (i,j) denoting the probability of a transition from phase i to phase j with a batch arrival of size a and a = 0 j = 1 A u u a u (i,j)=1. The transition probability matrix can be obtained as U u = a = 0 U a u .

Owing to the Markovian property of the arrival process, we have ωu = ωuUu and ω u 1 A u =1, where ωu denotes the D-BMAP steady-phase probability vector and 1 A u is an all-ones column vector of length A u . Then, the average arrival rate λu can be calculated as

λ u = ω u a = 0 A u 1 a U a u 1 A u .
(1)

It will be assumed that the average arrival rate to the DLC layer λu is a system parameter that can be controlled through a traffic shaping and modeling mechanism in order to comply with the QoS requirements of the system.

2.1 Adaptive modulation and coding

Let γ ν u denote the instantaneous received signal-to-noise ratio (SNR) of user u at time instant t = ν T f . For the assumed Rayleigh block-fading channel model, γ ν u can be modeled as an exponentially distributed random variable with mean γ ¯ u =E{ γ ν u }. Given γ ν u , the objective of AMC is to select the TM that maximizes the data rate while maintaining an average PER less than or equal to a prescribed value P 0 u . To this end, and according to[3], the entire SNR range is partitioned into a set of nonoverlapping intervals defined by the partition Γ u , m = 0 , γ 1 u , m , γ 2 u , m , , γ M u 1 u , m , and TM n will be selected when γ ν u γ n u , m , γ n + 1 u , m . In this paper, the partition Γu,m is obtained by using the threshold searching algorithm described in[10]. This searching algorithm has the capability to discriminate between useful and useless TMs, while guarantying that the average PER fulfills the prescribed constraint. We also assume, without loss of generality, that convolutionally coded M-QAM, adopted from the IEEE 802.11a standard[19], are used in the AMC pool. All possible TMs are listed in ([8], Table one).

2.2 Two-dimensional Markov channel modeling

Let us define the rate of change of the fading as δ ν u = γ ν 1 u γ ν u . Let us also divide the ranges of γ ν u and δ ν u into sets of nonoverlapping 2D cells defined by the partitions Γ u , c = 0 , γ 1 u , c , γ 2 u , c , , γ K 1 u , c , and Δ = {−,0,}, respectively. A first-order 2D Markov channel model can now be defined where each state of the channel corresponds to one of such cells. That is, the Markov chain state of the channel at time instant t = ν T f can be denoted as ζ ν u = χ ν u , Δ ν u , ν = 0,1,…,, where χ ν u =k if and only if γ k u , c < γ ν u γ k + 1 u , c , and Δ ν u =0 (or Δ ν u =1) if and only if δ ν u <0 (or δ ν u 0).

In our approach the partition Γu,c is designed assuming that the observable dummy output of our improved first-order 2D Markov model at time instant t = ν T f belongs to a codebook of nominal values of SNR Ψ u , c = Ψ 1 u , c , Ψ 2 u , c , , Ψ K u , c . The Max-Lloyd algorithm[20, 21], developed for the optimum design of nonuniform quantizers, is then used to determine the partition and codebook minimizing the mean square error between γ ν u and the quantizer output.

2.3 Physical layer 2D Markov model

Based on the TM selection process used by the AMC scheme (which is defined by the partition Γu,m) and the first-order 2D Markov channel model (which is characterized by the partitions Γu,c and Δ), the range of γ ν u is partitioned into the set of nonoverlapping intervals defined by Γ u,m,c = γ 0 u,m,c , γ 1 u,m,c γ N PHY u - 1 u,m,c , γ N PHY u u,m,c , where N PHY u denotes the number of PHY states corresponding to user u, and γ 1 u,m,c , , γ N PHY u - 1 u,m,c =sort γ 1 u,m , , γ M u - 1 u,m γ 1 u,c , , γ K - 1 u,c , with γ 0 u,m,c =0 and γ N PHY u u,m,c =. Each partition interval γ k u,m,c , γ k + 1 u,m,c is characterized by a particular combination of TM and channel state. As in Subsection 2.2, the range of δ ν u is also partitioned into the set of nonoverlapping intervals Δ = {−,0,}.

Using this 2D partitioning, a first-order 2D Markov model for the PHY layer of user u can be defined where each state corresponds to one of such 2D rectangular-shaped cells. Furthermore, the PHY layer Markov chain state at time instant t = ν T f is denoted by ς ν u = φ ν u , Δ ν u , ν = 0,1,…,, where φ ν u {0,, N PHY u 1} represents the combination of TM and channel state in this frame interval and Δ ν u {0,1} is used to denote the up or downb characteristic of the instantaneous SNR over the time frame interval t = (ν − 1)T f . At any time instant t = ν T f , the PHY layer state can be univocally identified by an integer number y ν u =2 φ ν u + Δ ν u , with y ν u {0,,2 N PHY u 1}, which can be characterized by an steady-state probability P PHY ( y ν u ) and a corresponding conditional average PER PER ¯ PHY ( y ν u ). Additionally, the PHY layer FSMC will be characterized by a transition probability matrix H s u = H i , j u 0 i , j 2 N PHY u 1 , where H i , j u =Pr{ y ν + 1 u =j| y ν u =i}. Throughout this paper, the steady-state probabilities, the conditional average PERs, and the state-transition probabilities have all been computed either numerically or by simulation.

2.4 Joint PHY-MAC layer Markov model

Channel-aware-only schedulers can be incorporated to the joint PHY-MAC Markov model by means of a service-vacation process[14]. When a particular user u is selected for transmission in a given time slot, it is said that this user PHY layer is in service, otherwise, it is said to be on vacation. The parameter zu {0,1} is used to denote the service (zu = 0) or vacation (zu = 1) state. The decision wether a user u will be in service or vacation during the next time slot will depend on the possible PHY layer states of all users in the next time slot and on previous scheduling decisions. A D-step memory in the service-vacation process represents the scheduling dependence on D previous decisions and can be used to account for an increased degree of fairness between users.

The joint PHY-MAC layer FSMC state for user u at time instant t = ν T f is denoted by the vector of random variables ι ν u =( z ν u , z ν 1 u ,, z ν D + 1 u , y ν u ). At any time instant t = ν T f , the joint PHY-MAC layer state can be univocally identified by an integer number n ν u with n ν u {0,, N PHY-MAC u 1}, where N PHY-MAC u = 2 D + 1 N PHY u . The joint MAC-PHY layer will be in state n ν u with a steady-state probability P PHY-MAC u ( n ν u ). Taking into account that user u transmits only when it is in service, the different PHY-MAC states will have a transmission rate (TR), measured in packets per slot, of c ̂ n ν u = c y ν u (1 z ν u ), where c y ν u is the TR characterizing PHY layer state y ν u . Furthermore, the PHY-MAC layer FSMC will be described by a transition probability matrix P s u = P i , j u 0 i , j N PHY-MAC u 1 , with state transition probabilities

P i , j u =Pr n ν + 1 u = j | n ν u = i
(2)

that can be analytically calculated for a significant number of scheduling schemes. Without loss of generality, these probabilities are derived in the following sections for the max-rate and proportional fair algorithms, which, in both cases, can be modeled by a service-vacation process with one-step memory (D = 1).

3 The max-rate scheduling example

In the max-rate (MR) scheduling rule, the PHY layer states of all active users are assumed to be available at the scheduler without delay. The MR scheduler grants the transmission opportunity to the user that can achieve the highest TR in the current frame. If more than one user can attain this maximum rate, the scheduler chooses one of them randomly. Although this case was covered in[14], several modifications are included in our analysis in order to adapt it to the 2D PHY layer model and, also, to generalize its application to more realistic scenarios with users experiencing heterogeneous average SNRs.

In one-step memory service-vacation processes, scheduling decisions only rely on the actual system state, and thus, the state transition probabilities in (2) can be simplified to P i , j u =Pr z ν + 1 u , y ν + 1 u | z ν u , y ν u . The transition probability matrix can be expressed as

P s u = S 0 , 0 u S 0 , 1 u S 1 , 0 u S 1 , 1 u ,

where S i , j u is a(2 N PHY u )×(2 N PHY u ) matrix with elements S i , j u (k,l)=Pr z ν + 1 u = j , y ν + 1 u = l | z ν u = i , y ν u = k .

Without loss of generality, user u = 1 is considered to be the user of interest and, for notation simplicity, it is assumed that z ν 1 = z ν and y ν 1 = y ν . Taking into account that the PHY layer and service-vacation processes are independent, the elements of the S i , j 1 matrices can be written as

Pr z ν + 1 , y ν + 1 | z ν , y ν = Pr z ν + 1 | z ν , y ν + 1 , y ν × Pr y ν + 1 | y ν ,

the latter term being an element of the PHY layer state transition probability matrix H s 1 . Moreover, since zν+1 {0,1}, it holds that

Pr z ν + 1 = 1 | z ν = i , y ν + 1 = l , y ν = k = 1 Pr z ν + 1 = 0 | z ν = i , y ν + 1 = l , y ν = k ,

and therefore, only the case zν+1 = 0 needs to be discussed. Considering now that the service state at time ν depends only on the PHY layer state at time ν, it holds that

Pr z ν + 1 = 0 | z ν = i , y ν + 1 = l , y ν = k = Pr z ν + 1 = 0 , z ν = i | y ν + 1 = l , y ν = k Pr z ν = i | y ν = k .
(3)

3.1 Calculation of Pr{z ν  = i|y ν  = k}

Assuming z ν  = 0, the denominator of (3) can be calculated as

Pr z ν = 0 | y ν = k = y ν 2 = 0 N ̂ PHY 2 y ν 3 = 0 N ̂ PHY 3 y ν N s = 0 N ̂ PHY N s Pr z ν = 0 , y ν 2 , y ν 3 , , y ν N s | y ν = k ,

where N ̂ PHY u 2 N PHY u 1. At time slot ν, user 1, whose PHY layer is in state k, can only be in service if the rest of users have a PHY layer state with a lower or equal TR. When a users (including user 1) can transmit at maximum TR, then user 1 is chosen for transmission with a probability 1/a. Thus,

Pr z ν = 0 , y ν 2 , y ν 3 , , y ν N s | y ν = k = 0 , if u U : c y ν u > c k 1 a u = 2 N s P PHY u ( y ν u ) , if u i U i = 1 a 1 : c y ν u i = c k i ,
(4)

whereU= 2 , , N s is the set of competitor users and c k is the TR corresponding to y ν  = k.

3.2 Calculation of Pr{zν+1 = 0,z ν  = i|yν+1 = l,y ν  = k}

The numerator of (3) can be written as

Pr z ν = z , z ν + 1 = v | y ν = k , y ν + 1 = l = y ν + 1 2 = 0 N ̂ PHY 2 y ν + 1 N s = 0 N ̂ PHY N s y ν 2 = 0 N ̂ PHY 2 × y ν N s = 0 N ̂ PHY N s Pr z ν = z , z ν + 1 = v , y ν 2 , , y ν N s , y ν + 1 2 , , y ν + 1 N s | y ν = k , y ν + 1 = l .
(5)

In order to obtain the terms inside the summations of this expression, two different cases should be considered:

  1. 1.

    Case 1 (z ν+1 = 0, z ν  = 0). In this case, user 1 is in service during time slots ν and ν + 1 if its PHY states in these time slots are k and l, respectively. This will only happen when the potential TRs of the other N s −1 users are smaller than or equal to the TRs of user 1 in PHY states k and l during time slots ν and ν + 1, respectively. If a and b users (including user 1) can transmit at maximum TR during the ν and ν + 1 time slots, respectively, then user 1 will be granted transmission for both time slots with probability 1/(a b). Therefore, in this case the probabilities in (5) can be calculated as

    Pr { z ν = 0 , z ν + 1 = 0 , y ν 2 , , y ν N s , y ν + 1 2 , , y ν + 1 N s | y ν = k , y ν + 1 = l } = 0 , if u U : c y ν u > c k or c y ν + 1 u > c l 1 ab u = 2 N s Pr { y ν u , y ν + 1 u } , if { u i U } i = 1 a - 1 : c y ν u i = c k i and { u j U } j = 1 b - 1 : c y ν + 1 u j = c k j ,
    (6)

    wherePr{ y ν =k, y ν + 1 =l}= H k , l 1 P PHY 1 (k).

  2. 2.

    Case 2 (z ν+1 = 0, z ν  = 1). In this case, user 1 makes a transition from the vacation state during time slot ν to the service state at ν + 1. The service state in time slot ν + 1 can occur if b users (including user 1) can transmit at maximum TR and user 1 is selected for transmission with probability 1/b. A vacation state during time slot ν can happen as a result of two different situations, either there are users with higher TRs than user 1 or a users (including user 1) can transmit with the maximum TR and user 1 is not selected with probability (1 1 a ). Then, in case 2, the probabilities in (5) can be obtained using

    Pr { z ν = 1 , z ν + 1 = 0 , y ν 2 , , y ν N s , y ν + 1 2 , , y ν + 1 N s | y ν = k , y ν + 1 = l } = 0 , if c y ν u < c k u U or u U : c y ν + 1 u > c l 1 b u = 2 N s Pr { y ν u , y ν + 1 u } if u U : c y ν u > c k and { u j U } j = 1 b 1 : c y ν + 1 u j = c k j a 1 ab u = 2 N s Pr { y ν u , y ν + 1 u } if { u i U } i = 1 a 1 : c y ν u i = c k i and { u j U } j = 1 b 1 : c y ν + 1 u j = c k j .
    (7)

4 The proportional fair scheduling example

Originally proposed in the wired network scheduling context, a proportional fair (PF) scheduler promises a trade-off between the maximization of average throughput and system fairness. At each time instant, the user experiencing the highest instantaneous rate with respect to its average rate is scheduled. That is, user q is selected for transmission during time slot ν if

q=arg max u { 1 , , N s } c y ν u T ν u ,
(8)

where T ν u is the average rate of user u. The scheduler defined in (8) maximizes the logarithmic sum of system throughput[22]. The average rate can be computed as a moving average over a time window of length W, that is,

T ν + 1 u = 1 1 W T ν u + ( 1 z ν u ) 1 W c y ν u .

We define T ̂ u lim W T u as the stationary throughput of user u and

H u = y = 0 2 N PHY u 1 c y [ 1 PER ¯ PHY ( y ) ] P PHY ( y )

as the user u effective channel average rate. In this case, using the results presented by Holtzman in[23] and assuming that the fast fading components of all users in the system are identically distributed, it can be shown thatif the rate of user u is a function of its SNRf( γ ν u ), the fixed point equation described in[23] has a unique solution when the throughputs are proportional to the average rate given by f ( γ ν ) ¯ =H. Thus, given users u and v, T ̂ u T ̂ v = H u H v , then the PF weight of user u in time slot ν can be defined as F ν u = c y ν u H u . The transition probability matrix can be constructed as in the max-rate example. Expressions (4), (6), and (7) can be rewritten by substituting the TRs c y ν u with the corresponding PF weights F ν u . Now a and b will denote the number of users with the maximum PF weights during time slots ν and ν + 1, respectively.

5 Queueing model and analysis

Once the PHY layer and MAC sublayer have been properly modeled, the queuing behavior of the DLC layer has to be introduced in the analysis. Two different techniques are proposed.

5.1 Queuing Markov model-based approach

Following the work described in[912], the queueing process induced by both the ARQ protocol and the AMC scheme can be formulated in discrete time with one time unit equal to one frame interval. Each user’s subsystem states are observed at the beginning of each time unit. Let σ ν u = q ν u , a ν u , ι ν u denote the user u subsystem state at time instant t = ν T f , where q ν u {0,, Q ¯ u } denotes the queue length at this time instant, a ν u {0,, A u 1} represents the phase of the D-BMAP, and ι ν u {0,, N PHY-MAC u 1} represents the combination of PHY layer state and scheduling decision for user u during this frame interval. Focusing on the set of time instants t = ν T f , ν = 0,1,…,, the transitions between states σ ν u are Markovian. Therefore, an embedded Markov chain can be used to describe the underlying queueing process for each user u.

In previous work, we developed the embedded Markov chains describing the underlying queueing process for different AMC schemes, such as the ones described in 802.11 and 802.16 proposals, and different ARQ protocols, including infinitely persistent ARQ[9, 10], hybrid ARQ[11], and truncated hybrid ARQ[12] schemes. Using the same technique described in Subsection 2.4, the MAC layer can be incorporated to the models described in these papers and the multiuser case could be also analyzed for those systems. In this paper, as an example and without loss of generality, we have used the model developed in[10] using the transmission mode pool of the IEEE 802.11a system combined with an infinitely persistent selective repeat (SR) ARQ procedure and it has been adapted to the multiuser case. The state space of the user u embedded finite state Markov chain is S u = S μ u μ = 1 N s u , where N s u =( Q u ¯ +1) A u N PHY-MAC u 1 and S μ u = q μ u , a μ u , ι μ u q μ u , a μ u , n μ u .

Taking into account that infinitely persistent SR-ARQ is used at the DLC layer, and assuming that it is conditioned on the instantaneous channel fading, the transmission outcomes (success or failure) of consecutive packets in a frame interval are independent, and the probability that k packets of user u are successfully transmitted (leave the queue) given c n μ u packets are transmitted when the PHY-MAC layer of user u is in state S μ u can be written as

p k , c n μ u ( n μ u ) = c n μ u k PER ¯ n μ u PHY-MAC c n μ u k 1 PER ¯ n μ u PHY-MAC k .
(9)

Thus, the probability that h packets are successfully transmitted given that there are q packets in the queue before transmission and the PHY-MAC layer changes from state n μ u to state n μ u can be expressed as

t h , q u n μ u , n μ u = p h , min c n μ u , q ( n μ u ) P n μ u , n μ u u ,
(10)

forq{0,, Q ¯ u },h{0,,min{q, C u }}, and n μ u , n μ u 0 , , N PHY-MAC u 1 . The N PHY-MAC u × N PHY-MAC u terms in (10) capturing all the cases where h packets are successfully transmitted given that there are q packets in the queue before transmission can be expressed in matrix form as T h , q u =D p h , q u P s u , forq{0,, Q ¯ u } andh{0,,min{q, C u }}, where p h , q u = p h , min C 0 u , q ( 0 ) p h , min C N PHY-MAC u 1 , q ( N PHY-MAC u 1 ) andD(x) is used to denote a diagonal matrix with the elements of the vector x in its main diagonal. Notice that forq C N PHY-MAC u 1 = C u , the probabilities in these matrices do not depend on q and T h , q u = T h , C u u .

Let q μ  = q and q μ =q+ A u l1 be the number of packets in the queue of user u in two consecutive framesc. Also, let a and h be the number of arriving packets and the number of packets successfully transmitted in the first one of these frame intervals, respectively. In this case, q μ q μ = A u l1=ah orh=l A u +a+1. Thus, given that0l A u +a+1min{q, C u } or A u l1a A u l+min{q, C u }1, and0a A u 1, the probability that the queueing system changes from a generic state S μ u =(q, a μ , n μ ) S u to another generic state S μ u =(q+ A u l1, a μ , n μ ) S u can be expressed as

A q , l u S μ u , S μ u = a = a min a max u a u ( a μ , a μ ) t l A + a + 1 , q u n μ , n μ ,
(11)

where a min =max{0, A u l1} and a max =min{ A u 1, A u +min{q, C u }1l}, forq{0,, Q ¯ u },l{0,, A u +min{q, C u }1}, a μ , a μ {0,, A u 1}, and n μ , n μ 0 , , N PHY-MAC u 1 . The A u N PHY-MAC u × A u N PHY-MAC u terms capturing all the cases where the queue length changes from q packets in one frame interval toq+ A u l1 packets in the next frame interval can be expressed in matrix form as

A q , l u = a = a min a max U a u T l A u + a + 1 , q u , l { 0 , , l max u ( q ) } 0 , otherwise
(12)

forq{0,, Q ¯ u }, where denotes the Kronecker product and l max u (q)= A u +min{q, C u }1. The resulting transition matrix of the Markov chain can then be written as

P u = A 0 , A u 1 u A 0 , A u Q ¯ u u A ¯ 0 , A u Q ¯ u 1 u A Q ¯ u , A u + Q ¯ u 1 u A Q ¯ u , A u u A u ¯ Q ¯ u , A u 1 ,
(13)

where A ¯ q , i u = a = 0 i A q , a u . Notice that forq C u , the transition probabilities in these matrix blocks do not depend on q, and therefore, for simplicity this index can be omitted, that is, A q , l u = A l u and A ¯ q , l u = A ¯ l u for allq C u .

To derive the system performance measures, we need to obtain the steady-state probability vectors corresponding to each level of the transition matrix, which can be calculated using the fact that the transition probability matrix Pu and steady-state probability vector π u = π 0 u π 1 u π Q ¯ u u satisfy πuPu = πu along with the normalization condition i = 0 Q ¯ u π i u 1 =1, where 1 is a column vector of all ones with the appropriate length. To calculate πu, the method described by Le et al. in[5] is used to reduce the complexity in solving the matrix Pu.

5.2 Performance measures

In our finite buffering ARQ-based error control system with infinite persistence, the PLR of user u, P l u (measured in packets per second), is simply equal to the buffer overflow probability. As in[5], we denote by V k u the stationary vector describing the probabilities that k packets are lost due to buffer overflow upon arrival of a burst of data packets. Assuming that a batch of a packets arrive at the link layer buffer, if there areq> Q ¯ u a packets in the queue at the end of the previous frame interval and h packets are successfully transmitted, then the number of packets that will be lost due to buffer overflow isk=ah Q ¯ u +q. Therefore, V k u can be written as

V k u = a = 1 A u 1 q = max { 0 , Q ¯ u a + 1 } Q ¯ u π q u h = 0 a h = Q ¯ u q + k C u U a u T h , q u .
(14)

The PLR of user u can then be calculated as the ratio between the average number of lost packets due to buffer overflow N l u and the average number of arriving packets λu in one frame interval, that is,

P l u = N l u / λ u =(1/λ) k = 1 A u 1 k V k u 1 .
(15)

Given the PLR, the average throughput (measured in packets per frame) can be calculated as

η u = λ u (1 P l u ).
(16)

Then, using the well-known Little’s formula[24], the average delay can be calculated as

D l u = L q u /λ(1 P l u )= L q u / η u ,
(17)

where L q u denotes the average number of packets in queue of user u, which can be obtained as L q u = q = 1 Q ¯ u q π q u 1 .

5.3 Effective bandwidth/capacity-based approach

The DLC layer can also be modeled by applying the effective bandwidth/capacity-based approach[16]. The effective capacity and effective bandwidth allow the analysis of the so-called PLR bound probability. The analysis is analogous to the one developed in[10]. The effective bandwidth of the D-BMAP arrival process of user u, characterized by a transition matrix Uu, can be calculated as[25] E B u (ψ)= ψ 1 log( Υ U u (ψ)), where Υ U u is the Perron-Frobenius eigenvalue of the matrix U ϖ u =D( ϖ u ) U u , withϖ e λ 0 u ψ , , e λ A u 1 u ψ , where λ n u denotes the number of packets per frame generated when the source of user u is in state n. The effective capacity of the service process that models the behavior of the MAC and PHY layers for the user of interest, which is characterized by a transition probability matrix P s u , can be obtained as E C u (ψ)= ψ 1 log( Υ P u (ψ)). In this expression, Υ P u denotes the Perron-Frobenius eigenvalue of the matrix P υ ν u =D( υ ν u ) P s u , with υ ν u e c ̆ 0 u ψ , , e c ̆ ( 4 N PHY u 1 ) u ψ , where c ̆ n u denotes the number of packets per frame leaving the queue when the PHY-MAC for user u is in state n, which, for an SR-ARQ infinitely persistent scheme, can be calculated as c ̆ n u = k = 0 c ̂ n u k p k , c ̂ n u ( n u ) with p k , c ̂ n u ( n u ) defined in (9).

The effective bandwidth/capacity-based approach can only provide statistical QoS guarantees. For instance, the target link layer PLR P l max can only be guaranteed with a small violation probability ε, that is,Pr{ P l u P l max } κ u e ψ u P l max ε, where ψ u is the unique real solution of E B u (ψ) E C u (ψ)=0 and κu is the relation between average arrival rate ϖ A u lim ψ 0 E B u (ψ) and average service rate ϖ S u lim ψ 0 E C u (ψ), as shown by Tang and Zhang in[26]. It is worth stating at this point that except for low input data rates, the tail probability tends to overestimate the packet loss probability and it can only be used as long as ϖ A  ≤ ϖ S . Then, the throughput of user u can be calculated as

η u = λ u ( 1 P l u ) λ u ( 1 κ u e ψ u Q ¯ u ) .

6 Cross-layer design

Given the sets of maximum allowable queue lengths Q ¯ ={ Q ¯ 1 ,, Q ¯ N s }, average SNRs γ ̄ ={ γ ̄ 1 ,, γ ̄ N s }, normalized maximum Doppler frequencies f d T f with f d ={ f d 1 ,, f d N s }, and assuming the use of the MR algorithm in the MAC layer, the derived PHY-MAC-DLC model basically depends on both the set of prescribed average PERs P 0 ={ P 0 1 ,, P 0 N s }, with P 0 u being a real number in the range Φ = [0,1], and the set of measured or estimated arrival packet rates λuΘ, where Θ is the range of feasible arrival rate values controlled by the traffic shaping mechanism. Thus, if the users in the system are to support QoS-guaranteed traffic characterized by a maximum PLR P l max and a maximum average packet delay D l max , the proposed cross-layer design must aim at determining the prescribed average PER vector P 0 and average packet arrival rate vectorλ={ λ 1 ,, λ N s } solving the constrained optimization problem given by

P 0 opt , λ opt = arg max P 0 Φ , λ Θ ̂ u = 1 N s η u ( P 0 , λ ) subject to P l u ( P 0 , λ ) P l max , u D l u ( P 0 , λ ) D l max , u .
(18)

A similar cross-layer design can be derived for the PF algorithm, but taking into account that this algorithm maximizes the logarithmic sum of throughput, the optimization function must be designed accordingly as

P 0 opt , λ opt = arg max P 0 Φ , λ Θ ̂ u = 1 N s log ( η u ( P 0 , λ ) ) .
(19)

In both cases, the analytical expressions for ηu, P l u , and D l u do not leave much room for developing efficient algorithms in solving our constrained optimization problem. However, considering that P 0 and λ lie in a bounded space Φu × Θu, a multidimensional exhaustive search can be used to numerically solve the proposed cross-layer optimization problem.

7 Numerical results

In order to verify the validity of the proposed cross-layer framework, analytical results will be confronted with computer simulation results obtained using Clarke’s statistical Rayleigh fading model of the wireless flat-fading channel[27]. Unless otherwise specified, numerical results are presented for the following default parameters: a normalized maximum Doppler frequency f d T f  = 0.02, a queue length Q ¯ =50, a number of channel states K = 10, a parameter b = 2, and a D-BMAP parameterized to obtain a truncated Poisson process with a variable average arrival rate λ. These parameters apply to all users in the system.

Figure2 shows the dependence of the average delay D l u and throughput ηu on the target average PER P 0 u of the two users in the system. In this figure, P 0 1 and P 0 2 have been set to a common value P0 in order to show the analytical and simulation results of both users simultaneously. As it can be observed, in all cases, the behavior of the simulation of the system under consideration with different scheduling algorithms, namely the MR algorithm (left) and the PF algorithm (right), is faithfully reproduced by our analytical PHY-MAC-DLC layer model. In particular, it is interesting to note how the shape and location of the minimum/maximum of the curves obtained by simulation (Clarke’s model) coincide with those obtained using the analytical framework, even for a small number of channel states K. The accuracy in determining the location of the maximum of the throughput and the minimum of the average packet loss rate or the average packet delay is particularly important in order to ensure an optimal cross-layer design. Regarding the scheduling performance, it can be observed in Figure2 that, as expected, PF attains higher fairness at the expense of a global throughput loss.

Figure 2
figure 2

Average delay ( D p ) and throughput ( η ) of the max-rate (left) and PF algorithms (right) vs. target PER.

Figure3 shows the system sum throughput as a function of the number of active users in the system when using either the MR or the PF scheduling algorithm. Results presented in this figure have been obtained by placing N s users on the coverage area at distances R/(N s  + 1),2R/(N s  + 1),…,N s R/(N s  + 1) from the BS, where R denotes the cell radius. The traffic arrival for each active user in the system has been modeled as a D-BMAP parameterized to obtain a truncated Poisson process with an average arrival rate λ 3 packets/frame. Furthermore, the target PER has been set to P 0 u =1 0 0.4 , for all u {1,…,N s }. As it can be observed, the sum throughput increases with the number of active users in the system. However, it can also be seen that the sum throughput gain is subject to the diminishing capacity returns as the number of users increases. Furthermore, as expected, Figure3 shows that the MR algorithm achieves a higher sum throughput in comparison with the PF strategy, at the cost of unfair treatment of the arriving traffic flows.

Figure 3
figure 3

Sum throughput vs. number of users using max-rate and PF algorithms.

Figure4a,b,c shows the system sum throughput and per-user throughput when applying the cross-layer optimization defined in (18) for the MR algorithm. These figures have been obtained applying a maximum affordable PLR P l max 0.01 and using either a Markov model or the effective bandwidth/capacity-based approach to model the DLC buffer behavior as described in Section 5. As expected, the effective bandwith approximation tends to overestimate the PLR, thus predicting a lower throughput than the Markov model except for low input data rates. The optimization process further increases the aggregate throughput of the MR policy while maintaining a desired level of QoS in the form of a maximum PLR. This is accomplished by tuning the PHY layers of the users through the P 0 u parameters and shaping the users’ average arrival rate λu. Figure4a reveals that for short queue lengths ( Q ¯ <50), the higher sum throughput is obtained by assigning a very low P0 to the user with a lower average SNR (γ = 6 dB), which results in a very low throughput for that user. The same behavior is observed in Figure4c for high Doppler frequencies (f d  > 20 Hz). When the queue length increases or the Doppler frequency decreases, the system achieves higher capacity by assigning similar P0 values to both users and the throughput of the lower SNR user increases accordingly. Logically, when both users are subject to similar average SNR values, as shown in Figure4b, the maximum sum throughput is always achieved by assigning similar P0 values.

Figure 4
figure 4

Max-rate algorithm example.

Figure5a,b shows the aggregated and per-user throughputs obtained when applying the cross-layer optimization defined by (19) for the PF algorithm. Results presented in Figure5a have been derived using a maximum packet loss constraint P l max 0.01 and a maximum average delay constraint D l max 10. As expected, for low values of the queue length, Q ¯ <40, the constraint limiting the throughput is the packet loss, which is mainly caused by the buffer overflow, and therefore, the throughput increases with Q ¯ . For higher queue lengths, Q ¯ >50, the limiting constraint is the maximum average delay, and in this case, additional increases in the queue length have a negligible effect over the throughput. Figure5b depicts results obtained when using an optimization performed using the effective bandwidth model formulated in (19). In this case, the constraint in (19) has been modified toPr{ D l u ( P 0 ,λ) D l max }εu, as the effective bandwidth theory only offers statistical QoS guarantees. The specific values of the constraint used to generate this figure arePr{ D l u 50}0.01u. Results presented in Figure5b show a similar behavior as those in Figure5a. For a queue length below Q ¯ =50, the limiting constraint is the PLR, and therefore, the throughput increases with Q ¯ . In contrast, for Q ¯ >50, the active constraint is the maximum affordable delay, which does not depend on the queue length, causing the throughput to remain nearly constant with respect to the queue length.

Figure 5
figure 5

Proportional fair example.

8 Conclusions

This paper extends the analytical framework presented in[10] to incorporate the MAC sublayer in the proposed analytical model that now includes a multiple-user-shared channel scenario. Channel-aware-only schedulers have been embedded in a joint PHY-MAC Markov model by using a service-vacation process to model the scheduling decisions. Two widely used scheduling rules have been considered, the MR and PF algorithms. As in[10], two different approaches have been used to model the DLC level queueing behavior: an analytical Markov model and an approach based on the effective bandwidth theory. Results show that the use of the effective bandwidth approach significantly simplifies the global model and is therefore an interesting technique to use by the resource allocation algorithms. Numerical examples confirm that the derived performance metrics obtained with the PHY-MAC-DLC analytical model faithfully reproduce simulation results. It is important to point out that the multiple user model obtained in this paper can be easily adapted to include truncated or hybrid ARQ techniques in the DLC layer as it was proposed in[11, 12]. Finally, a cross-layer design interrelating the PHY, MAC, and DLC layers has been described. The obtained results show the potential of cross-layer resource allocation designs where slot-by-slot decisions are left to simple and efficient channel-aware schedulers, such as the MR or PF algorithm, while QoS control is performed at a higher level by well-selected optimization functions. These optimization functions enhance and complement the scheduling algorithms while maintaining an adequate QoS performance by modifying average parameters of the different layers in the system. The proposed cross-layer approach fits in the radio resource management (RRM) framework proposed for state-of-the-art networks such as LTE that define a division between fast dynamic layer 1 and layer 2 RRM functions working at the transmission time interval level and semi-dynamic layer 3 RRM procedures.

Endnotes

a It is assumed in this paper that the frame duration is smaller than the coherence time of the channel.

b If γ ν u < γ ν 1 u , then the instantaneous SNR is descending and it can be tagged as down( Δ ν u =1), on the contrary, if γ ν u γ ν 1 u , then the instantaneous SNR is ascending and it can be tagged as up( Δ ν u =0).

c The maximum number of packet arrivals in one frame interval is equal to A u 1, and the maximum number of successfully transmitted packets in one frame interval is equal tomin{q, C u }, thus, it is quite obvious that q μ min{q, C u } q μ q μ + A u 1 or0l A u +min{q, C u }1.

References

  1. Liu Q, Zhou S, Giannakis GB: Cross-layer combining of adaptive modulation and coding with truncated ARQ over wireless links. IEEE Trans. Wireless Commun 2004, 3(5):1746—1755.

    Article  Google Scholar 

  2. Liu Q, Zhou S, Giannakis GB: Queuing with adaptive modulation and coding over wireless links: cross-layer analysis and design. IEEE Trans. Wireless Commun 2005, 4(3):1142-1153.

    Article  Google Scholar 

  3. Liu Q, Zhou S, Giannakis GB: Cross-layer scheduling with prescribed QoS guarantees in adaptive wireless networks. IEEE J. Selected Areas Commun 2005, 23(5):1056-1066.

    Article  Google Scholar 

  4. Le LB, Hossain E, Alfa AS: Service differentiation in multirate wireless networks with weighted round-robin scheduling and ARQ-based error control. IEEE Trans. Commun 2006, 54(2):208-215.

    Article  Google Scholar 

  5. Le LB, Hossain E, Alfa AS: Radio link level performance evaluation in wireless networks using multi-rate transmission with ARQ-based error control. IEEE Trans. Wireless Commun 2006, 5(10):2647-2653.

    Article  Google Scholar 

  6. Ishizaki F, Hwang GU: Cross-layer design and analysis of wireless networks using the effective bandwidth function. IEEE Trans. Wireless Commun 2007, 6(9):3214-3219.

    Article  Google Scholar 

  7. Poggioni M, Rugini L, Banelli P: Analyzing performance of multi-user scheduling jointly with AMC and ARQ. In Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM). Washington, D.C.; 26:3483-3488.

    Google Scholar 

  8. Wang X, Liu Q, Giannakis GB: Analyzing and optimizing adaptive modulation coding jointly with ARQ for QoS-guaranteed traffic. IEEE Trans. Veh. Technol 2007, 56(2):710-720.

    Article  Google Scholar 

  9. Ramis J, Carrasco L, Femenias G: A two-dimensional Markov model for cross-layer design in AMC/ARQ-based wireless networks. In Proceedings of the IEEE GLOBECOM. New Orleans; 30 Nov–4 Dec 2008:4637-4642.

    Google Scholar 

  10. Femenias G, Carrasco L, Ramis J: Using two-dimensional Markov models and the effective-capacity approach for cross-layer design in AMC/ARQ-based wireless networks. IEEE Trans. Veh. Technol 2009, 58(8):4193-4203.

    Article  Google Scholar 

  11. Ramis J, Femenias G, Riera-Palou F, Carrasco L: Cross-layer optimization of adaptive multi-rate wireless networks using truncated chase combining HARQ. In Proceedings of the IEEE GLOBECOM. Miami; 6–10 Dec 2010.

    Google Scholar 

  12. Ramis J, Femenias G: Cross-layer design of adaptive multirate wireless networks using truncated HARQ. IEEE Trans. Veh. Technol 2011, 60(3):944-954.

    Article  Google Scholar 

  13. Poggioni M, Rugini L, Banelli P: QoS analysis of a scheduling policy for heterogeneous users employing AMC jointly with ARQ. IEEE Trans. Commun 2010, 58: 9.

    Article  Google Scholar 

  14. Le LB, Hossain E, Alfa AS: Delay statistics and throughput performance for multi-rate wireless networks under multiuser diversity. IEEE Trans. Wireless Commun 2006, 5(11):3234-3243.

    Article  Google Scholar 

  15. Liu J, Chen W, Cao Z, Zhang YJ: Delay optimal scheduling for cognitive radios with cooperative beamforming: a structured matrix-geometric method. IEEE Trans. Mobile Comput 2012, 11(8):1412-1423.

    Article  MathSciNet  Google Scholar 

  16. Wu D, Negi R: Effective capacity: a wireless link model for support of quality of service. IEEE Trans. Wireless Commun 2003, 2(4):630-643.

    Google Scholar 

  17. Biglieri E, Caire G, Taricco G: Limiting performance of block fading channels with multiple antennas. IEEE Trans. Inf. Theory 2001, 47(4):1273-1289. 10.1109/18.923715

    Article  MathSciNet  MATH  Google Scholar 

  18. Blondia C: A discrete time batch Markovian arrival process as B-ISDN traffic model. Belgian J. Oper. Res. Stat. Comput. Sci 1993, 32(3/4):3-23.

    MATH  Google Scholar 

  19. IEEE: 802.11: Standard for Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. New York: IEEE; 1997.

    Google Scholar 

  20. Max J: Quantization for minimum distortion. IRE Trans. Inf. Theory 1960, IT-6: 7-12.

    Article  MathSciNet  Google Scholar 

  21. Lloyd SP: Least squares quantization in PCM. IEEE Trans. Inf. Theory 1982, IT-28: 129-137.

    Article  MathSciNet  MATH  Google Scholar 

  22. Kim KKH, Han Y: An efficient scheduling algorithm for QoS provision in wireless packet data transmission. In Proceedings of the IEEE PIMRC. Lisboa; 15–18 Sept 2002:73-77.

    Google Scholar 

  23. Holtzman J: Asymptotic analysis of the proportional fair algorithm. In Proceedings of the IEEE PIMRC. San Diego; 30 Sept–3 Oct 2001:F33—F37-F33—F37.

    Google Scholar 

  24. Kleinrock L: Queuing Systems, vol. 1. New York: Wiley; 1975.

    MATH  Google Scholar 

  25. Chang C (ed.): Performance Guarantees in Communication Networks, 1st edn.. Berlin: Springer; 2000.

    Book  Google Scholar 

  26. Tang J, Zhang X: Cross-layer modeling for quality of service guarantees over wireless links. IEEE Trans. Wireless Commun 2007, 6(12):4504-4512.

    Article  Google Scholar 

  27. Clarke RH: A statistical theory of mobile radio reception. Bell Syst. Tech. J 1968, 47(6):957-1000. 10.1002/j.1538-7305.1968.tb00069.x

    Article  Google Scholar 

Download references

Acknowledgments

This work has been partially funded by MEC and FEDER through project COSMOS (TEC2008-02422) and project AM3DIO (TEC2011-25446).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Loren Carrasco.

Additional information

Competing interests

The authors declare that they have no competing interests.

Authors’ original submitted files for images

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Reprints and permissions

About this article

Cite this article

Carrasco, L., Femenias, G. & Ramis, J. Channel-aware MAC performance of AMC-ARQ-based wireless systems. J Wireless Com Network 2013, 213 (2013). https://doi.org/10.1186/1687-1499-2013-213

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/1687-1499-2013-213

Keywords