 Research
 Open access
 Published:
Statistical QoS provisioning for MTC networks under finite blocklength
EURASIP Journal on Wireless Communications and Networking volume 2018, Article number: 194 (2018)
Abstract
This paper analyzes the effective capacity of delayconstrained machinetype communication (MTC) networks operating in the finite blocklength regime. First, we derive a closedform mathematical approximation for the effective capacity in quasistatic Rayleigh fading channels. We characterize the optimum error probability to maximize the concave effective capacity function with reliability constraint and study the effect of signaltointerferenceplusnoise ratio (SINR) variations for different delay constraints. The tradeoff between reliability and effective capacity maximization reveals that we can achieve higher reliability with limited sacrifice in effective capacity specially when the number of machines is small. Our analysis reveals that SINR variations have less impact on effective capacity for strict delayconstrained networks. We present an exemplary scenario for massive MTC access to analyze the interference effect proposing three methods to restore the effective capacity for a certain node which are power control, graceful degradation of delay constraint, and joint compensation. Joint compensation combines both power control and graceful degradation of delay constraint, where we perform the maximization of an objective function whose parameters are determined according to the delay and SINR priorities. Our results show that networks with stringent delay constraints favor power controlled compensation, and compensation is generally performed at higher costs for shorter packets.
1 Introduction
Modern communication systems are becoming an indispensable part of our lives. Driven by the demands of users for extra services, the fifth generation (5G) of mobile communication is expected to introduce new features such as ultrareliable lowlatency communications (URLLC) and massive machinetype communication (mMTC) [1–6]. These features may serve many yet unforeseen applications to enable the Internet of Things (IoT). IoT aims at bringing connectivity to anything that can benefit from internet connection [7]. URLLC has emerged to provide solutions for reliable and lowlatency transmissions in wireless systems. The design of URLLC systems imposes strict quality of service (QoS) constraints to fulfill very low latency in the order of milliseconds with expected reliability of higher than 99.9% [1, 4]. In [8], Schulz et al. discussed the reliability requirements for different IoT applications. According to their study, latency bounds range from 1 ms in factory automation to 100 ms in road safety. In addition, the packet loss rate constraints range from 10^{−9} in printing machines to 10^{−3} for traffic efficiency. Such requirements are far more stringent than the ones in the current LongTerm Evolution (LTE) standards [9].
The mMTC refers to networks that can support a variety of connected smart devices at the same time with the same base station (BS). It obligates a certain level of connectivity to a machine via ultrareliable communication (URC) over relatively long term (> 10 ms) [1]. The number of connected devices is expected to cross the 28 billion border by 2021, where a single macrocell may need to uphold 10,000 or more devices in the future [10, 11]. Moreover, the traffic behavior of MTC is quite different from the HTC (humantype communication), where [12]:

MTC is coordinated (i.e, there are simultaneous access attempts from many machine reacting to the same events), while HTC is uncoordinated.

MTC uses short as well as small number of packets.

MTC traffic is real as well as nonrealtime, periodic, and eventdriven.

MTC QoS requirement is different from HTC (i.e., different reliability and latency requirements).
In this context, MTC has gained an increasing interest in recent years via employing new multiple radio access technologies and efficient utilization of spectrum resources to improve reliability and robustness [13–15]. Another research topic that has gathered much attention is the cooperative transmission in MTC, where in [11], the authors proposed a locationbased cooperative strategy to reduce the error outage probability, but without study of the latency aspects.
Traditional communication systems are based on Shannon theoretic models and utilize metrics such as channel capacity or ergodic capacity [16]. Unlike classical systems, URLLC networks are designed to communicate on short packets in order to satisfy extremely low latency in realtime applications and emerging technologies such as ehealth, industrial automation, and smart grids whenever data sizes are reasonably small such as sensor readings or alarm notifications. In the finite blocklength regime, the length of metadata is of comparable size with the length of data. Such demands stimulated a revolutionary trend in information theory studying communication at finite blocklength (FB) [17–19]. In this context, conventional metrics (e.g., channel capacity or ergodic capacity) become highly suboptimal [17]. For this reason, the maximum achievable rate for quasistatic fading channels was characterized in [19] as a function of blocklength and error probability ε. In [9], the authors analyzed the effect of using smaller resource blocks on error probability bounds in OFDM. The effect of relaying of blocklengthlimited packets was studied and compared to direct transmission in [20, 21] where the authors concluded that relaying is more efficient than direct transmission in the FB regime specially with an average channel state information (CSI). Furthermore, the authors of [3] introduced a pernode throughput model for additive white Gaussian noise (AWGN) and quasistatic collision channels. Therein, average delay is considered, and interference is treated as AWGN.
To model the delay requirements in URLLC and MTC networks, we resort to the effective capacity (EC) metric which was introduced in [22]. It indicates the maximum possible arrival rate that can be supported by a network with a target delay constraint. In [18], the authors considered quasistatic Rayleigh fading channels and introduced a statistical model for a single node effective rate in bits per channel use (bpcu) for a certain error probability and delay exponent which reflects the latency requirement. However, throughout the paper, a closedform expression for the EC was not provided. Exploiting the EC theory, the authors of [23] characterized the latencythroughput tradeoff for cellular networks. In [24], Musavian and LeNgoc analyzed the EC maximization of secondary node with some interference power constraints for primary node in a cognitive radio environment with interference constraints. Three types of constraints were imposed, namely average interference power, peak interference power, and interference power outage. The fundamental tradeoff between EC and consumed power was studied in [25] where the authors suggested an algorithm to maximize the EC subject to power constraint for a single node scenario. In [26], we studied the pernode EC in MTC networks operating in quasistatic Rayleigh fading proposing three methods to alleviate interference, namely power control, graceful degradation of delay constraint, and the joint method. To the best of our knowledge, EC for FB packet transmission in multinode MTC scenario has not been investigated until part of the work in this journal was presented in [26], which will be depicted here with extra details.
Based on its intuition, the EC theory provides a mathematical framework to study the interplay among transmit power, interference, delay, and the achievable rate for different wireless channels. In this paper, we derive a mathematical expression for EC in quasistatic Rayleigh fading for delayconstrained networks. Our results depict that a system can achieve higher reliability with a negligible sacrifice in its EC. We consider dense MTC networks and characterize the effect of interference on their EC. We propose three methods to allow a certain node maintain its EC which are (i) power control, (ii) graceful degradation of delay constraint, and (iii) joint model. Power control depends on increasing the power of a certain node to recover its EC which in turn degrades the SINR of other nodes. Our analysis proves that SINR variations have limited effect on EC in networks with stringent delay limits. Hence, the side effect of power control is worse for less stringent delay constraints and vice versa. We illustrate the tradeoff between power control and graceful degradation of delay constraint. Furthermore, we introduce a joint model which combines both of them. The operational point to determine the amount of compensation performed by each of the two methods in the joint model is determined by maximization of an objective function leveraging the network performance.
The motivation beyond this paper is to provide a solid understanding of the tradeoff between power, delay, and reliability in MTC networks in the finite blocklength regime. Our objective is to pave the road for utilizing short packets in 5G and machinetype networks. Extra plots that were not present in [26] are illustrated to provide the reader with full understanding of the objective function in joint compensation and the compensation process itself. Moreover, we extend the analysis in [26] by solving the optimization problem to obtain the optimum error probability which maximizes the EC in the ultrareliable region. We also characterize the tradeoff between reliability and EC which shows that we can obtain a huge gain in reliability in return for a slight reduction in EC.
The rest of the paper is organized as follows: in Section 2, we introduce the system model and define some concepts such as communication at finite blocklength and EC. A closed form for the EC in quasistatic Rayleigh fading is derived in Section 3, where we also show the effect of interference on the pernode EC in multinode MTC networks. Next, Section 4 depicts the optimization problem to maximize the EC in the ultrareliable (UR) region. We present the interference alleviation methods and the tradeoff between them in Section 5, while the results are depicted in Section 6. Finally, Section 7 concludes the paper. Table 1 includes the important abbreviations and symbols that will appear throughout the paper.
2 Preliminaries
2.1 Network model
We consider a transmission scenario in which N nodes transmit packets with equal power to a common controller through a quasistatic Rayleigh fading collision channel with blocklength T_{f} as shown in Fig. 1. For convenience in this paper, we refer to one machine terminal as node. Given that all nodes transmit at the same time slot, the controller attempts to decode the transmitted symbols arriving from all nodes. When the controller decodes one node’s data, the other streams appear as interference to it. For this model, imagine that a node needs to rise its rate temporarily for a critical reason. Later on, we study the interference alleviation scenarios for one node at a certain time slot while all nodes also keep transmitting at the same time.
Based on our network model, the received vector \(\mathbf {y}_{n}\in \mathbb {C}^{n}\) of node n is given by:
where \(\mathbf {x}_{n} \in \mathbb {C}^{n}\) is the transmitted packet of node n, and h_{n} is the fading coefficient for node n which is assumed to be quasistatic with Rayleigh distribution. This implies that the fading coefficient h_{n} remains constant for each block of T_{f} channel uses which span the whole packet duration and changes independently from one block to another. The index s includes all N−1 interfering nodes which collide with node n, and w is the additive complex Gaussian noise vector whose entries are defined to be circularly symmetric with unit variance. Given the signaltonoise ratio ρ of a single node, the signaltointerferenceplusnoise ratio of any node n is
To simplify the analysis, we assume that (i) each node always has a packet to transmit (buffer is always nonempty), (ii) all nodes are equidistant from the common controller (i.e., same path loss), and (iii) the fading coefficients h_{s} are independent and identically distributed and perfectly known to the receiver. Thus, as the number of nodes increases, the sum of Rayleighdistributed fading envelopes of N−1 interfering nodes becomes \(\sum _{s} h_{s}^{2}\approx N1\) [27], and the interference resulting from nodes in set s can be modeled as in [3] where (2) reduces to:
Note that CSI acquisition in this setup is not trivial, and its cost is negligible whenever the channel remains constant over multiple symbols. Additionally, as in [3], we aim to provide a performance benchmark for such networks without interference coordination.
2.2 Communication at finite blocklength
In this section, we present the notion of FB transmission, in which short packets are conveyed at rate that depends not only on the SNR, but also on the blocklength and the probability of error ε [17]. In this case, ε has a small value but not vanishing. For error probability ε∈[0,1], the normalized achievable rate in bits per channel use is given by:
where
is Shannon’s channel capacity for sufficiently long packets, while
denotes the channel dispersion which appears for relatively short packets (T_{f}<2000 channel uses) [18], \(Q(t)=\int _{t}^{\infty }\frac {1}{\sqrt {2 \pi }}e^{\frac {s^{2}}{2}} ds\) is the Gaussian Qfunction, and Q^{−1}(t) represents its inverse, ρ_{i} is the SINR, and h^{2} is the fading envelope.
The channel is assumed to be Rayleigh quasistatic fading where the fading coefficients remain constant over T_{f} symbols which spans the whole packet duration. For Rayleigh channels [28], the fading coefficients Z=h^{2} have the following probability density function distribution:
2.3 Effective capacity
The concept of EC indicates the capability of communication nodes to exchange data with maximum rate and certain latency constraint and thus guarantees QoS by capturing the physical and link layer aspects. A statistical delay violation model implies that an outage occurs when a packet delay exceeds a maximum delay bound D_{max}, and its probability is defined as [22]:
where Pr(·) denotes the probability of a certain event. Conventionally, a network’s tolerance to long delay is measured by the delay exponent θ. The network has more tolerance to large delays for small values of θ (i.e., θ→0), while for large values of θ, it becomes more delay strict. For the infinite blocklength model, the EC capacity is defined as:
In quasistatic fading, the channel remains constant within each transmission period T_{f} [21], and the EC is subject to the finite blocklength error bounds and thus according to [18] can be written as:
where
In [18, 29], the effective capacity is statistically studied for single node scenario in block fading but never to a closed form expression. It has been proven that the EC is concave in ε and, hence, has a unique maximizer. In what follows, we shall represent the EC expression for quasistatic Rayleigh fading.
3 Effective capacity analysis under finite blocklength
Lemma 1
The effective capacity of a certain node communicating in a quasistatic Rayleigh fading channel is approximated by:
with
where \(d=\frac {\theta T_{f}}{\ln (2)}\). Also, let \(c=\theta \sqrt {T_{f}} Q^{1}(\epsilon)\log _{2}e\) and \(x=\sqrt {1\frac {1}{(1+\rho _{i} z)^{2}}}\), and Γ(·,·) is the upper incomplete gamma function ([30], § 8.3502).
Proof
Please refer to Appendix 1. □
Lemma 2
There is a unique local and global maximizer in ε for the pernode EC in quasistatic Rayleigh fading channels which is given by:
Proof
The expectation in (10) is shown to be convex in ε in [18] independent of the distribution of channel coefficients z=h^{2}. Thus, it has a unique minimizer ε^{∗} which is consequently the EC maximizer given by (14). □
Note that \(c=\theta \sqrt {T_{f}} Q^{1}(\epsilon)\log _{2}e\) is not a function of z, so it can be taken out of the integration which simplifies the optimization problem. To obtain the maximum pernode effective capacity EC_{max}, we simply insert ε^{∗} into (12).
Having obtained the closedform solution for EC, we proceed with studying the effect of multinode interference on the pernode EC. We elaborate the effect of interference in quasistatic Rayleigh fading by plotting the pernode EC obtained from Lemma 1 and (3) for 1, 5, and 10 machines in Fig. 2. The network parameters are set as T_{f}=1000,ρ=2, and θ=0.01. It is obvious that the pernode EC decreases when increasing the number of machine N as more interference is added. Notice that the EC curves are concave in ε as envisaged by [18] and hence have a unique maximizer which is obtained from Lemma 2 and depicted in the figure. Another observation worth mentioning is that the optimum probability of error ε^{∗} which maximizes the EC becomes higher when increasing the number of machines. Notice that Fig. 2 confirms that Lemma 2 renders an accurate approximation to (10).
4 Maximization of effective capacity in the ultrareliable region
Taking a closer look at Fig. 2, we observe the tradeoff between the pernode EC and error probability ε. It is apparent that we can earn a lower error probability ε by sacrificing only a small amount of EC. For example, we observe that for the fivenode network operating in quasistatic Rayleigh fading channel, if we tolerate a decrease in the EC from 0.11 to 0.1 bpcu, the error probability ε improves to 10^{−3} instead of 2.5×10^{−2}. Thus, sacrificing only 9% of the EC maximum value boosts the error probability by nearly 1250% and hence leads to a dramatic enhancement of reliability. This observation is an open topic for analysis of the EC ε tradeoff with a target of maximizing the EC with some error constraint reflecting the reliability guarantees.
In this section, we discuss the EC maximization in ultrareliable (UR) region (i.e., when the probability of error is extremely low). We maximize the EC so that the error outage probability stays below a very small target value ε_{t}. We define the optimization problem as:
which according to (40) in Appendix 1 can be interpreted to
The solution of (16) renders the operational EC which guarantees ultrareliability according to the error constraint. Operational EC in this case is smaller than or equal to the maximum effective capacity EC_{max} obtained from Lemma 2. Due to the convexity of ψ(ε) [18], the first derivative of ψ(ε) is positive if ε is greater than the global maximum and vice versa. Thus, we can check if the optimum solution is given by ε_{t} or not through the first derivative of ψ(ε). To elucidate, we write down the Lagrangian of (16) as:
where λ is the Lagrangian multiplier. This leads to the following KarushKuhnTucker (KKT) conditions [31]
From the second condition, if λ is greater than zero, this means that the constraint is active, where ε^{∗}=ε_{t} and \(\frac {\partial \psi (\epsilon)}{\partial \epsilon }_{\epsilon =\epsilon _{t}}\) is indeed negative. Reversing this conclusion, we can infer whether the constraint is active or not from the sign of \(\frac {\partial \psi (\epsilon)}{\partial \epsilon }_{\epsilon =\epsilon _{t}}\) so that
The first derivative of ψ(ε) with respect to ε is derived as follows. From (40), we have:
where
Let \(\delta =\theta \sqrt {T_{f}}\log _{2}e\), then
and \(q(\epsilon) = \frac {\partial Q^{1} (\epsilon)}{\partial \epsilon }=\sqrt {2\pi } e^{\frac {Q^{1}(\epsilon)}{2}}\) is the first derivative of Q^{−1}(ε) w.r.t ε. Substituting, we get
5 Methods
Given that all nodes transmit at the same time slot, the controller attempts decoding the transmitted symbols arriving from all of them. When the controller decodes one node’s data, the other streams appear as interference to it [3]. For this model, imagine that a node needs to raise its EC in order to meet its QoS constraint. At first glance, applying successive interference cancelation at the base station would seem to be an attractive solution. However, this will result in extra delay for lower priority nodes where the decoder must wait for the higher priority packets to be decoded first to perform interference cancelation which dictates parallel decoding [32]. We study the interference alleviation scenarios for one node at a certain time slot, while other nodes’ packets also are transmitted and decoded at the same time as a lower bound worse case.
5.1 Power control
The method of power control is based on increasing the SNR of node n to allow it recover from the interference effect. Let ρ_{c} be the new SNR of node n, while the other nodes still transmit with SNR equal to ρ. Then, we equate the SINR equation in (3) to the case where no collision occurs (N=1) to obtain:
When a certain node transmits with SNR of ρ_{c}, its EC is the same as in the case when transmitting with SNR equals to ρ while other nodes are silent. The method of power control is simple; however, it causes extra interference into the other nodes due to the power increase of the recovering node.
From (24), we define the SINR of other nodes colliding in the same network (nodes in set s) after the compensation of one node as:
Now, we are interested in comparing the pernode EC in three cases: (i) no collision, (ii) collision without compensation, and (iii) collision with compensation of one node. Here, we look for the maximum achievable pernode EC in each case. Define the collision loss factor α as the ratio between the maximum effective capacity EC_{max} in case of collision and in case of no collision as:
where ε^{∗} and \(\epsilon _{i}^{*}\) are the optimal error probabilities for the cases of no collision (N=1) and collision without compensation, respectively, and both are obtained from (19).
To determine the effect of compensation of one node on the other nodes, we define the compensation loss factor α_{c} as the ratio between maximum EC of other nodes (set s) in case of one node compensation and in case of no compensation, that is:
where \(\epsilon _{s}^{*}\) is the optimum error probability obtained from (14) when the SINR is set to ρ_{s}. To understand the effect of increased interference on the network performance, we study the effect of SINR variations on EC for different delay constraints.
Proposition 1
SINR variations have comparably limited effect on EC when the delay constraint becomes more strict and vice versa.
Proof
Please refer to Appendix 2. □
Furthermore, we include the compensation factor γ_{c} as the ratio of the maximum achievable EC of the compensated node after and before compensation which is expressed as:
where γ_{c} is a gain factor (i.e., γ_{c}≥1). Finally, we define the total loss factor α_{t} as the ratio between the maximum attainable effective capacity of colliding nodes in the system (set s) when a node compensates to the maximum attainable EC of these nodes if they were not colliding at all, that is:
5.2 Graceful degradation of the delay constraint
Here, we discuss how to compensate for the decrease in the peruser EC for the multiuser interference scenario by changing the value of delay constraint θ. More specifically, we determine how the delay exponent θ should be gracefully degraded to obtain the same EC_{max} as if the target node was transmitting without collision. This represents the cases where a node has flexible QoS constraint delay wise, so that the EC could be attained given a slight variation on the overall delay as envisioned in [1]. Let θ be the original delay exponent and θ_{i} represent the new gracefully degraded one; θ_{i} is obtained by solving:
where \(\epsilon _{i}^{*}\) is the maximizer of EC for the parameters ρ_{i} and θ_{i}, and \(\epsilon _{i}^{*}\) is the optimum error probability for ρ_{i} and θ_{i}. The solution of (30) renders the necessary value of θ_{i} to compensate for the EC decrease due to collision in this case. Notice that (30) can be solved numerically to obtain the necessary value of θ_{2} to compensate for the rate decrease due to collision in this case.
5.3 Joint compensation model
To mitigate the side effects of power control and graceful delay constraint degradation, we apply a joint model in which both methods are partially employed. Define the operational SINR in power controlled compensation for nodes in set s as \(\rho _{s_{o}}\), where \(\rho _{s_{o}}\) lies on the interval [ ρ_{s} ρ_{i}]. Using (25), the operational SNR for the recovering node can be written as:
and the operational point of the compensation loss factor \(\alpha _{c_{o}}\) is
where \(\epsilon _{s_{o}}^{*}\) is the optimum error probability obtained from (14) for the parameters \(\rho _{s_{o}}\) and θ_{1}. \(\alpha _{c_{o}}\) is considered to be the loss factor caused by the part of compensation performed via power control.
Next, we perform the rest of compensation via graceful degradation of θ as in Section 5.2. To obtain θ_{2}, we solve:
From (33), we compute the necessary value of θ_{2} to continue the compensation process via graceful degradation of the delay constraint.
Now, we propose an objective function leveraging the network performance for the joint model. First, we define the priority factor η_{α} as a measure of the risk of decrease in EC of nodes in set s when the compensating node boosts its transmission power. In other words, the higher the value of η_{α}, the more important it is not to allow much degradation of EC of nodes in set s, and hence, we try not to compensate via power control and shift compensation towards θ graceful degradation. On the other hand, we define the priority factor η_{θ} as a measure of strictness of the delay constraint (i.e., the higher the value of η_{θ}, the more strict it is not to degrade delay constraint and hence the less we are allowed to relax θ to get higher EC for the compensating user). Thus, we can formalize our objective function as the summation:
where \(\alpha _{c_{o}}\) and θ_{2} are the operational point. Now, we choose this operational point to satisfy:
where the solution to this problem gives the optimum operational point which can be found from (31), (32), and (33).
6 Results and discussion
Figure 3 depicts the operational and maximum EC as a function of the number of nodes N for T_{f}=1000,ρ=10 dB, ε_{t} different values of θ. The figure reveals that operating in the UR region necessitates a considerable sacrifice in the EC. Specifically, as the number of nodes increases and the SINR decreases, the amount of EC sacrifice becomes more significant as the gap between operational and optimum EC becomes higher. For example, at N=30, the nodes lose up to 50% of its EC to maintain reliability.
As an example, consider three colliding nodes where T_{f}=500,θ=0.01, and ρ=0.5. Applying (24), we get ρ_{c}=1. Hence, the interference effect is canceled for a certain node by boosting its SNR from 0.5 to 1. To elucidate more, Fig. 4 shows the effect of the collision of five nodes with and without compensation for T_{f}=1000,θ=0.1, and ρ=1. We plot the pernode EC before the compensation of one node. Then, we compare it to the effective capacities of the four remaining nodes after one node compensates using (24). The figure also shows the EC of the compensating node.
Consider T_{f}=1000 and ρ=1, then the left axis of Fig. 5 depicts the compensation loss factor α_{c} for different number of nodes N with θ=0.1 and 0.001. The figure shows that α_{c} is lower for smaller values of θ. Hence, the effect of compensation appears to be more severe for less stringent delay constraints. This follows from Proposition 1, which states that SINR variations have less of an effect on delay strict networks and vice versa. Finally, we notice that the compensation loss factor decreases rapidly for a less dense network. The right axis of Fig. 5 shows the compensation factor γ_{c} vs the number of nodes in the system N. γ_{c} appears to have a linear behavior as a function of N. That is, the effect of compensation for the compensated node increases linearly with N. The rate by which γ_{c} increases is faster for smaller θ. The compensation factor γ_{c} (compensation gain) is higher for less stringent delay constraint (less θ). It appears that α_{c} and γ_{c} are inversely correlated to each other as envisioned by (28).
The collision loss factor α and the total loss factor α_{t} are also depicted in Fig. 6. As observed from the figure, the total loss is nearly the same as the collision loss for small N. The gap starts to appear and becomes almost constant for high number of nodes. This gap is tighter in the case of small θ (i.e., the collision loss α is more dominant). Also, there is a higher loss (both collision and total) in case of less stringent delay constraint θ. Thus, the effect of collision and compensation is more annoying in case of less stringent delay constraint (smaller θ). Furthermore, α and α_{t} have the same behavior as α_{c}. They decrease rapidly for small number of nodes and tend to be constant for high N.
Consider (30) with N=5, θ_{1}=0.05, ρ=1, and T_{f}=1000, we get θ_{i}=0.023. Thus, by gracefully degrading the delay constraint from 0.05 to 0.023, we attain the same value for the maximum effective capacity EC_{max}=0.066 as was depicted in Fig. 4 in [26]. Here, in Fig. 7, we illustrate the graceful degradation of the delay constraint by plotting the delay outage probability \(P_{\mathrm {out\_ delay}}\) as a function of the maximum delay bound D_{max} before and after compensation. The figure shows that for a delay outage probability of 10^{−3}, the compensation process is performed by extending the allowable delay D_{max} from 3600 to 4600 channel uses. We perform a limited delay extension (≈25%) because the rise in EC partially compensates the graceful degradation of θ in (8). Note that the optimum error probabilities have different values in each case due to the change in SINR in (13) [26].
Figure 8 illustrates different operational points for the joint model for different blocklength T_{f} where N=5, ρ=1, P_{out_delay}=10^{−3}, and θ_{1}=0.1. For example, when T_{f}=700, we select the operational point \(\alpha _{c_{o}}=0.9\) and θ_{2}=0.075. This implies that a part of compensation will be performed via power control, which leads to a 10% loss in EC of other nodes (set s). Then, the rest of the compensation will be performed by gracefully degrading its θ from 0.1 to 0.075. The maximum delay of the recovering node remains 2500 channel uses before and after recovery as restoring the EC compensates for the decrease in θ in (8). The figure also shows that for smaller packet sizes, the amount of losses due to compensation is higher.
According to the system parameters, certain values of the priority factors η_{α} and η_{θ} may produce a concave maximization problem for the objective function η. For an MTC network with 15 devices where T_{f}=1000,ρ=2,θ_{1}=0.1,η_{α}=1, and η_{θ}=4, the optimum value of \(\rho _{s_{o}}\) which maximizes the objective function η will be 0.057 according to Fig. 9. This value corresponds to the operational point \(\alpha _{c_{o}}=0.9397\) and θ_{2}=0.053. The SNR of the recovering node becomes \(\rho _{c_{o}}=8.08\). In other words, in order to maximize the network throughput according to the given priority factors, the compensating node boosts its SNR from 2 to 8.08 and gracefully degrades its delay exponent from 0.1 to 0.053. This results in only 6% loss in EC of other nodes as depicted in Fig. 10. Priority factors are left for the designer’s preferences depending on the reliability or latency requirements.
Finally in Fig. 11, we compare the EC vs the delay constraint θ for fixed and variable rate transmissions. The SNR and the blocklength are set as ρ=1 and T_{f}=1000, respectively. It can be observed that for high values of θ, fixedrate transmission performs strictly better. The figure also confirms the fact that EC degrades with the increase of delay constraint θ.
7 Conclusions
In this work, we presented a detailed analysis of the EC for delayconstrained MTC networks in the finite blocklength regime. For quasistatic Rayleigh fading channels, we proposed an approximation for the EC and defined the optimum error probability. We characterized the optimization problem to maximize EC with error constraint which showed that there is a relatively small sacrifice in EC for high SINR. Our analysis indicated that SINR variations have minimum effect on EC under strict delay constraints. In a dense MTC network scenario, we illustrated the effect of interference on EC. We proposed power control as an adequate method to restore the EC in networks with less stringent delay constraints. Another method is graceful degradation of delay constraint, where we showed that a very limited extension in the delay bound could successfully recover the EC. Joint compensation emerges as a combination between these two methods, where an operational point is selected to maximize an objective function according to the networks design aspects. Finally, we concluded that for high values of θ, fixedrate transmission performs strictly better. As future work, we aim to analyze the impact of imperfect CSI on the EC and coordination algorithms that maximize EC with fairness constraints.
8 Appendix 1: Proof of Lemma 1
For Rayleigh envelope of PDF given in (7), the EC expression in (10) can be written as:
From (4), we have
Elaborating, we attain
We resort to the second order Taylor expansion to obtain \(e^{c x} = 1+c x+\frac {(c x)^{2}}{2}\) and place it into (37), then (36) becomes:
The first integral reduces to unity. Applying Laurent’s expansion for x [33], we attain:
Replacing (41) into (40) yields
After manipulating (42) and inserting it into (10), we obtain (12).
9 Appendix 2: Proof of Proposition 1
Differentiating (10) with respect to ρ_{i}
where \(\mathcal {K}= \frac {\partial r}{\partial \rho _{i}} (1\epsilon)\) is strictly positive since the achievable rate r is an increasing function of the SINR ρ_{i}. Differentiating once more with respect to θ:
which is strictly negative and thus validating our proposition.
References
P Popovski, in 1st International Conference on 5G for Ubiquitous Connectivity. Ultrareliable communication in 5G wireless systems (Akaslompolo, 2014), pp. 146–151.
E Dosti, UL Wijewardhana, H Alves, M Latvaaho, in IEEE ICC 2017. Ultra reliable communication via optimum power allocation for typeI ARQ in finite blocklength (IEEEParis, 2017), pp. 5168–5173.
R Devassy, G Durisi, P Popovski, EG Strom, Finiteblocklength analysis of the ARQprotocol throughput over the Gaussian collision channel. 2014 6th International Symposium on Communications, Control and Signal Processing (ISCCSP), Athens, 173–177 (2014).
Nokia, 5G for Mission Critical Communication: achieve ultrareliability and virtual zero latency. Nokia White Paper (2016).
H Shariatmadari, S Iraji, R Jantti, Analysis of transmission methods for ultrareliable communications. IEEE Int. Symp. Pers. Indoor Mob. Radio Commun. PIMRC. 2015Decem:, 2303–2308 (2015).
E Dosti, M Shehab, H Alves, M Latvaaho, in 2017 European Conference on Networks and Communications (EuCNC). Ultra reliable communication via CCHARQ in finite blocklength, (2017), pp. 1–5. https://doi.org/10.1109/EuCNC.2017.7980708.
Ericsson, Cellular networks for massive IoT. Ericsson White Paper (2016).
P Schulz, et al., Latency critical IoT applications in 5G: perspective on the design of radio interface and network architecture. IEEE Commun. Mag. 55(2), 70–78 (2017). https://doi.org/10.1109/MCOM.2017.1600435CM.
J Oestman, G Durisi, EG Stroem, J Li, H Sahlin, G Liva, in SCC 2017; 11th International ITG Conference on Systems, Communications and Coding. Lowlatency ultrareliable 5G communications: finiteblocklength bounds and coding schemes (Hamburg, 2017), pp. 1–6.
A Ali, W Hamouda, M Uysal, Next generation M2M cellular networks: challenges and practical considerations. IEEE Commun. Mag. 53(9), 18–24 (2015). https://doi.org/10.1109/MCOM.2015.7263368.
H Chen, et al., in 2016 IEEE GLOBECOM. Cooperative retransmission for massive MTC under spatiotemporally correlated interference, (2016), pp. 1–6. https://doi.org/10.1109/GLOCOM.2016.7841698.
E Soltanmohammadi, K Ghavami, M NaraghiPour, A survey of traffic issues in machinetomachine communications over LTE. IEEE Internet Things J. 3(6), 865–884 (2016). https://doi.org/10.1109/JIOT.2016.2533541.
A Orsino, et al., Effects of heterogeneous mobility on D2D and droneassisted missioncritical MTC in 5G. IEEE Commun. Mag.55(2), 79–87 (2017).
JF Monserrat, G Mange, V Braun, H Tullberg, G Zimmermann, Ö Bulakci, Metis research advances towards the 5G mobile and wireless system definition. EURASIP J. Wirel. Commun. Netw.2015(1), 53 (2015). https://doi.org/10.1186/s1363801503029.
Y Mehmood, C Görg, M Muehleisen, A TimmGiel, Mobile M2M communication architectures, upcoming challenges, applications, and future directions. EURASIP J. Wirel. Commun. Netw.2015(1), 250 (2015). https://doi.org/10.1186/s136380150479y.
CE Shannon, A mathematical theory of communication. Bell Syst. Tech. J.27(July 1928), 379–423 (1948).
G Durisi, T Koch, P Popovski, Toward massive, ultrareliable, and lowlatency wireless communication with short packets. Proc. IEEE. 104(9), 1711–1726 (2016).
M Gursoy, in EURASIP Journal on Wireless Communucations and Networking 2013. Throughput analysis of bufferconstrained wireless systems in the finite blocklength regime, (2013).
W Yang, G Durisi, T Koch, Y Polyanskiy, Blockfading channels at finite blocklength. ISWCS 2013. 9:, 410–413 (2013).
Y Hu, J Gross, A Schmeink, On the capacity of relaying with finite blocklength. IEEE Trans. Veh. Technol.65(3), 1790–1794 (2016).
Y Hu, A Schmeink, J Gross, Blocklengthlimited performance of relaying under quasistatic Rayleigh channels. IEEE Trans. Wirel. Commun.2(4), 630–643 (2016).
D Wu, R Negi, Effective capacity: a wireless link model for support of quality of service. IEEE Trans. Wirel. Commun.2(4), 630–643 (2003).
B Soret, et al., in 2014 IEEE Globecom Workshops (GC Wkshps). Fundamental tradeoffs among reliability, latency and throughput in cellular networks, (2014), pp. 1391–1396. https://doi.org/10.1109/GLOCOMW.2014.7063628.
L Musavian, T LeNgoc, in Trans. Emerging Tel. Tech, 27. QoSbased power allocation for cognitive radios with AMC and ARQ in Nakagamim fading channels (WileyNew York, 2014), pp. 266–277.
L Musavian, Q Ni, Effective capacity maximization with statistical delay and effective energy efficiency requirements. IEEE Trans. Wirel. Commun.14(7), 3824–3835 (2015). https://doi.org/10.1109/TWC.2015.2412542.
M Shehab, E Dosti, H Alves, M Latvaaho, in EUCNC 2017. On the effective capacity of MTC networks in the finite blocklength regime (IEEEOulu, 2017).
D Tse, P Viswanath, Fundamentals of wireless communication (2005).
MK Simon, A MS, Digital communication over fading channels: a unified approach to performance analysis (Wiley, New York, 2005).
MC Gursoy, Throughput analysis of bufferconstrained wireless systems in the finite blocklength regime. IEEE Int. Conf. Commun. Kyoto, 1–5 (2011).
IS Gradshteyn, IM Ryshik, Table of integrals, series, and products, 7th edn. (Academic Press, London, 2007).
S Boyd, L Vandenberghe, Convex optimization (Cambridge University Press, New York, 2004).
M Shirvanimoghaddam, M Condoluci, M Dohler, SJ Johnson, On the fundamental limits of random nonorthogonal multiple access in cellular massive iot. IEEE J. Sel. Areas Commun.35(10), 2238–2252 (2017). https://doi.org/10.1109/JSAC.2017.2724442.
R Rodriguez, K Irwin, J Gilman, Complex analysis: in the spirit of Lipman Bers (SpringerVerlag, New York, 2012).
Funding
This work is partially supported by Aka Project SAFE (Grant no. 303532) and by Finnish Funding Agency for Technology and Innovation (Tekes), Bittium Wireless, Keysight Technologies Finland, Kyynel, MediaTek Wireless, and Nokia Solutions and Networks.
Availability of data and materials
The paper is selfcontained, since we provide a mathematical framework which can be reproduced with the details provided in Sections 2 to 5, and in Section 5, numerical results and parameter settings are described in details.
Author information
Authors and Affiliations
Contributions
MS derived the equations and performed the system simulations. ED revised the equations and contributed to the writing of the introduction, system model, and conclusion. HA supervised and reviewed the paper, while ML directed and supervised the research. All authors participated in this work, and approved the final manuscript.
Corresponding author
Ethics declarations
Competing interests
The authors declare that they have no competing interests.
Publisher’s Note
Springer institutional affiliations.
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License(http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
About this article
Cite this article
Shehab, M., Dosti, E., Alves, H. et al. Statistical QoS provisioning for MTC networks under finite blocklength. J Wireless Com Network 2018, 194 (2018). https://doi.org/10.1186/s1363801812133
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/s1363801812133