 Research
 Open access
 Published:
Resource allocation for ultrareliable low latency communications in sparse code multiple access networks
EURASIP Journal on Wireless Communications and Networking volume 2018, Article number: 282 (2018)
Abstract
In this paper, we propose an optimal resource allocation policy for sparse code multiple access (SCMA) networks supporting ultrareliable lowlatency communications (URLLC). The network is assumed to operate with finite blocklength (FBL) codes, which is opposed to the classical informationtheoretic works with infinite blocklength (IBL) codes. In particular, we aim at maximizing the average transmission rate in the FBL regime while guaranteeing the transmission reliability. A joint design is proposed, which combines the power allocation with the codebook assignment. The convexity of the corresponding optimization problem is analyzed and an iterative search algorithm is further provided. We study the impact of reliability and short blocklength constraints on the performance of the proposed optimal resource allocation policy through numerical simulations. In addition, we evaluate the FBL performance of the proposed joint design in comparison to the scenario with an IBL assumption.
1 Introduction
5G new radio is expected to serve ubiquitous applications with excessive data rates and reliability demands for a large number of users. To accomplish this goal, advanced multiple access techniques have been developed while satisfying many requirements such as spectrum efficiency, high system throughput, and massive connectivity. In the last decade, orthogonal frequency division multiple access (OFDMA) [1], which is known as one of the efficient multiple access techniques, has been wellstudied and adopted in the standardization of 3GPP. Recently, nonorthogonal multiple access (NOMA) has been widely investigated, as it allows the network to server more transmissions with limited frequency resource, thus improving the frequency utilization [2–4]. In particular, a new promising NOMA technique, sparse code multiple access (SCMA), has been proposed and investigated [5, 6]. In general, the SCMA is a codebookbased method where each unique codebook consists of several sparse codewords that utilize only the corresponding subcarriers. Therefore, a subcarrier in an SCMA network can be shared among different codebooks. Owing to the sparsity of codewords, the multiplexed signals on the same subcarriers can be retrieved with the message passing algorithm (MPA) successfully. Recently, resource allocation has been employed in SCMA networks to improve the system performance. In [7], a swapmatching algorithm is proposed to optimize the codebook assignment and power allocation such that the total sumrate of the network can be maximized. An optimal resource allocation scheme is introduced for the SCMA network with simultaneous wireless information and power transfer (SWIPT) in [8]. Furthermore, this model is extended to a relayassisted SCMA network [9] and the resource allocation schemes of SCMA networks for machinetomachine (M2M) and devicetodevice (D2D) communications are discussed in [10, 11], respectively. However, all of the above studies on resource allocation in SCMA networks are performed under the ideal assumption of communicating arbitrarily reliable at Shannon’s capacity, i.e., codewords are assumed to be of an arbitrary long blocklength.
On the other hand, researchers and designers of nextgeneration wireless networks are increasingly interested in having wireless links support delaysensitive data traffic. In particular, supporting ultrareliable low latency communications (URLLC) becomes a major concern in the design of 5G networks [12, 13]. To support URLLC transmissions, most existing works consider OFDMA networks and contribute to the system design. Motivated by the performance advantage (i.e., frequency utilization) of NOMA networks, enabling NOMA systems to support URLLC transmissions has recently emerged and fast developed. In [14, 15], the power domain NOMAbased URLLC for 5G vehicletoeverything (V2X) services are introduced and studied. As for the SCMAbased uplink URLLC, the performance of it has been shown is superior to the OFDMAbased one in [16].
However, the above studies and designs for URLLC simply follow Shannon’s capacity, i.e., are not taking the impact of the finite blocklength into consideration. It is more accurate to incorporate FBL coding assumptions into the analysis and design of URLLC networks with lowlatency constraints. In such an FBL regime, data transmissions are no longer arbitrarily reliable. Especially when the blocklength is short, the error probability becomes significant even if the rate is selected below the Shannon limit. Taking this into account, an accurate approximation of the achievable coding rate under the finite blocklength assumption for an additive white Gaussian noise (AWGN) channel was studied in [17, 18]. Following the accurate FBL performance model, multiple user scheduling [19] and power allocation [20] of an OFDMA network has been studied. More recently, the FBL throughput [21] and energy efficiency [22] of powerdomain NOMA networks have been discussed. However, the FBL performance and optimal resource allocation for codedomain NOMA networks, e.g., SCMA, have not been addressed so far.
In this paper, we investigate the power allocation and codebook assignment of an SCMA network in URLLC scenario. We first derive the FBL sumrate of the considered network. Then, a joint optimal design is proposed to maximize the sumrate, that combines the power allocation with the codebook assignment. The convexity of the corresponding optimization problem is analyzed while an iterative search algorithm is further provided. Via simulations, the impacts of the reliability constraint and the blocklength on the performance of the proposed optimal resource allocation policy are investigated. In particular, we evaluate the FBL performance of the proposed joint design in comparison to the scenario with an infinite blocklength (IBL) assumption. As expected, significant performance differences between the FBL and IBL regimes are observed, which confirms the necessity of adopting the FBL model as the performance indicator in designing a URLLCsupporting SCMA network. More importantly, we find that the optimal resource allocation solutions in the FBL regime and in the IBL regimes are different, i.e., directly applying the optimal resource allocation policy (from existing works) in the IBL regime to a URLLC network results in a considerable performance loss. This again confirms the necessity and contribution of our special design in the FBL regime. Finally, this design is more beneficial for scenarios with a short blocklength or/and a rigorous reliability constraint.
We structure this paper as follows. Section 2 provides a system description and the background of an FBL regime. We propose our optimal resource allocation in the FBL regime in Section 3. The simulation results are provided in Section 4 while the paper is concluded in Section 5.
2 Preliminaries
In this section, we describe the system model and provide a brief introduction to the background on an FBL regime.
2.1 System description
Consider a downlink multiple access system within a single cell, which consists of only one base station (BS), K user equipments (UEs) and N subcarriers. In the conventional OFDMA system, N must be greater or equal to K to guarantee each UE is at least served by one independent orthogonal subcarrier. In the SCMA network, N can be smaller than K due to the introduction of the nonorthogonality.
In the SCMA system, an SCMA encoder is defined as a map from log2M binary bits to an Ndimensional complex codeword selected from the codebook of size M, i.e., \(f:\mathbb {B}^{\log _{2} M}\rightarrow \mathcal {X}\), where \(\mathcal {X} \subset \mathbb {C}^{N}\) with cardinality \(\mathcal {X}=M\) and symbols \(\mathbb {B}\) and \(\mathbb {C}\) represent binary and complex numbers, respectively. Thus, a codebook can be treated as an N×M matrix. For each codebook, only J subcarriers are active with J<N, which makes the codewords sparse. In addition, all the codewords within the same codebook contain zero entries in the same N−J dimensions. Obviously, the maximum number of codebooks C is the number of combinations of N elements choose J, i.e., \(C= {N \choose J}\). An example of the codebooks with M=4, N=4, and J=2 are given in Fig. 1. In this case, there are C=6 codebooks in total. Moreover, each codebook consists of four codewords and only occupies two subcarriers. For example, codebook 1 only utilizes the first and the last subcarriers to form the codewords. We use a C×N matrix T={T_{c,n}} to represent the mapping relationship between codebooks and subcarriers. When subcarrier n is employed in codebook c, then T_{c,n}=1, otherwise T_{c,n}=0. And this matrix is predefined as a known parameter. Similarly, the assignment of C codebooks to K users is denoted as a matrix S={S_{k,c}} with S_{k,c}=1 when codebook c is allocated to user k. Note that each codebook can only be assigned to one user. Hence, in order to ensure that every UE can be served by at least one codebook, we need to make the number of UEs less than or equal to the number of codebooks, i.e., K≤C always holds. An example of mapping relationship among subcarriers, codebooks and users is illustrated in Fig. 2.
In the SCMA network, we let P={P_{k,c}} denote the power allocation coefficients with P_{k,c} representing the transmit power from the BS to UE k on codebook c. Therefore, the total transmit power of BS is
We denote the indices of the utilized J subcarriers for codebook c as set \(\mathcal {J}_{c}\), e.g., for codebook 1 given in Fig. 1, we have \(\mathcal {J}_{1}=\{1,4\}\). Thus, the transmit power for UE k with codebook c on subcarrier n is calculated by P_{k,c,n}=P_{k,c}α_{c,n}, where \(n \in \mathcal {J}_{c}\) and α_{c,n} is a known power allocation fraction for each codebook c on subcarrier n. Furthermore, the fractions must meet the requirement \({\sum }_{n \in \mathcal {J}_{c}} \alpha _{c,n}=1\). Due to the property of the SCMA system, these codebooks can be regarded as orthogonal to each other [8]. Hence, there is no interference between each UE and the signaltonoise ratio (SNR) of user k on codebook c is given as
where \(\sigma ^{2}_{k,c}\) is the noise power on codebook c of user k and h_{k,n} is the channel coefficient of user k on subcarrier n. In this paper, we consider a quasistatic fading channel; thus, h_{k,n} remains unchanged during a transmission frame.
When compared with the OFDMA, SCMA system can utilize same subcarriers to serve more users. As we know, the OFDMA system employs the orthogonality of the subcarriers to reduce the interference between each user. While the SCMA system utilize the same subcarriers to form more codebooks, then assign these codebooks to each user. These codebooks can be treated as orthogonal as the information conveyed by the codebooks can be decoded with limited interference by MPA successfully [8].
2.2 Finite blocklength coding
In [17, 18], the authors developed the FBL performance model for a single link transmission by applying a normal approximation. Later on in [23], the thirdorder term of the normal approximation is further provided for the FBL model. In comparison to the Shannon capacity bound with the IBL assumption, the FBL performance bound is more accurate, especially when the blocklength is short. In particular, for an AWGN channel, the coding rate \(\mathcal {R}\) (in bits per channel use) with error probability 0<ε<1, SNR γ, and blocklength v is shown to have the following asymptotic expression [23]:
where \(Q\left (x \right) = {\int }_{x}^{\infty } {\frac {1}{{\sqrt {2\pi } }}} {e^{ {t^{2}}/2}}dt\) is the Gaussian Qfunction.
Note that under a quasistatic fading model, each channel remains constant during a frame. In this work, we will apply the above the FBL coding rate model in our perframe optimal resource allocation. As the approximation has been shown to be accurate for a sufficiently large value of v [18, 23], for simplicity we will employ it as the rate expression in our analysis.
Equation (3) facilitates the design in the URLLC networks, as it clearly illustrates the tradeoff between the target error probability e and blocklength v which directly influences the reliability and latency of URLLC transmissions. In particular, to fulfill the ultrareliability, ε must be set small enough as the lower the error probability is the better the reliability is. On the other hand, the lowlatency requirement is highly related to v as a smaller blocklength leads to a shorter transmission delay.
3 Optimal resource allocation
In this section, we study the optimal resource allocation policy for the considered network. First, the optimization problem is stated. Subsequently, the problem is relaxed and studied. Then, an iterative algorithm is proposed to tackle this problem according to the analysis.
3.1 Problem statement
Recall that, we are interested in supporting efficient URLLC transmissions. On the one hand, the served data rate for a UE k should satisfy the basic requirement of the UE, i.e., \(R_{k} \ge R_{k}^{\text {req}}\) for a UE k. On the other hand, the transmission via each channel is required to be reliable enough, i.e., the error probability of each user’s transmission should be lower than a threshold ε^{th}. This condition in terms of channel gain is \(h_{k,n}^{2} \ge h_{\text {min}}^{2} \), i.e., to support a reliable transmission for user k via a channel n, the channel gain h_{k,n}^{2} should be higher than the minimum required channel gain \(h_{\text {min}}^{2} \). Consequently, when a codebook contains a channel whose channel gain is smaller than the minimum requirement \(h_{\text {min}}^{2} \), it must be excluded as the transmission is no longer reliable. Hence, the feasible codebook set for a UE k is defined by
where Ω is the integer set {1,2,3,…,C}.
It is possible that all the channels are extremely bad for a UE k, i.e., a reliable transmission for the user cannot be guaranteed. Then, we have \(\mathcal {C}_{k}=\emptyset \), i.e., no codebooks can serve this user. Thus, this user must be eliminated from the feasible UEs set. We denote by \(\mathcal {K}\) the feasible UEs set after the above UE elimination due to the random channel qualities. Then, each feasible UE in the set should be assigned codebooks and allocated power. Note that each UE has a basic data rate requirement and each transmission has a reliability constraint. This generally requires that the SNR of user k on an allocated codebook c cannot be lower than the basic SNR requirement, i.e., γ_{k,c}≥γ_{min}≥0 dB The 0 dB lower bound is due to a practical assumption that to support a reliable transmission, the power of the signal at least should not be lower than the noise.
According to (3), the achievable coding rate from the BS to UE k, \(k \in \mathcal {K}\), via a codebook c is given by \(\mathcal {R} \left (\gamma _{k,c},\epsilon ^{\text {th}}, v \right)\). The throughput (expected amount of bits successfully decoded) of the UE over all assigned codebooks is expressed as
We consider a general assumption that UEs may have different priorities. We model this by introducing w_{k} as the weighted coefficient for UE k. Then, the weighted sumrate over all UEs is given by \({\sum }_{k\in \mathcal {K}} w_{k} R_{k}\). It is notable that the URLLC requirements have already been considered in this weighted sumrate, i.e., the two parameters target error probability ε and blocklength v in (5). The former influences the reliability of the system while the latter affects the latency. Therefore, the maximization problem for optimally assigning codebooks and allocating power of the SCMA network in the FBL regime is formulated as
where D_{n} is the maximal reuse time of subcarrier n (by codebooks). P^{tot} and P^{max} represent the total and the maximum transmit power of the BS. Moreover, constraint C1 guarantees that each UE can be served with a required rate while C2 ensures that the maximum transmit power of the BS cannot be exceed. Furthermore, C3 confirms that the SNR of user k on codebook c is greater than the basic SNR requirement. Constrains C4 and C5 together restrict that the codebooks are assigned to the UEs exclusively. Finally, C6 guarantees that each subcarrier can be reused with a maximum number D_{n}.
3.2 Resource allocation policy
Obviously, Problem (6) is a mixedinteger nonconvex problem, since the feasible set of S is not convex. In order to make the problem tractable, we first relax each S_{k,c} from integer to a continuous interval, i.e., S_{k,c}∈[0,1]. Furthermore, we employ a new variable X={X_{k,c}}={S_{k,c}P_{k,c}}, therefore, the SNR in (2) can be written as
where \(\beta _{k,c}=\frac {{\sum }_{n \in \mathcal {J}_{c}}\alpha _{c,n}  h_{k,n}^{2} }{\gamma _{\text {min}} \sigma ^{2}_{k,c}} \). Hence, Problem (6) can be transferred to the following problem
In the following, we propose the optimal resource allocation policy by solving Problem (8). We start with the following proposition illustrating the convexity of Problem (8). Note that the values for blocklength and decoding error probability in the proposition are useful for practical application.
Proposition 1
Problem (8) is a convex optimization problem when v≥100 and ε≥10^{−20}.
Proof
It holds that the objective function of Problem (8) is a linear combination of the coding rate expression \(\mathcal {R}\) under FBL regime. As shown in (3), \(\mathcal {R}\) is not a convex function. However, with the given assumption γ≥γ_{min}=0 dB, it is easy to prove that \(\mathcal {R}\) is increasing and concave over γ for v≥100 and ε≥10^{−20}. The first and second derivatives of \(\mathcal {R}\) with respect to γ can be calculated as
where \(\delta =\sqrt {\frac {1}{v}}Q^{1}(\epsilon)\), decreasing in v and ε. With the given constraints, the maximum value of δ is δ_{max}=1.085. For the first derivative, considering that γ≥1, the fractional part in the bracket is always smaller than 1, thus, \(\frac {\partial \mathcal {R}}{\partial \gamma }>0\) always holds, i.e., the expression of \(\mathcal {R}\) is increasing in γ with v≥100 and ε≥10^{−20}. For the second derivative, when ε≥0.5, we have δ≤0, obviously, \(\frac {\partial ^{2} \mathcal {R}}{\partial \gamma ^{2}}<0\) holds. And when A>0, we let \(\phi (\gamma)=\left (1+\gamma \right)+\frac {\delta }{2\left (\gamma ^{2}+2\gamma \right)^{\frac {3}{2}}}+\frac {3\delta }{\sqrt {\gamma ^{2}+2\gamma }}\). Intuitively, ϕ(γ) is increasing in δ and thereby decreasing in v and ε. Meanwhile, ϕ(γ) is decreasing in γ for δ>0 as well. By considering the condition γ≥1 and substituting δ_{max} into ϕ(γ), we have ϕ(1)=−0.2175<0. Hence, ϕ(γ)<0 is true for all γ≥1. In other words, \(\frac {\partial ^{2} \mathcal {R}}{\partial \gamma ^{2}}<0\) always holds with the given constraints. Thus, we prove that the coding rate \(\mathcal {R}\) is increasing and concave for γ>0 dB while the blocklength and target error probability are of practical interest, i.e., v≥100, ε≥10^{−20}. Obviously, the convexity of the objective function also holds as it is a linear combination of \(\mathcal {R}\). Furthermore, it can be seen that the feasible set of (8) is a convex set. Therefore, Problem (8) is convex. □
Proposition 2
When v≥100 and ε≥10^{−20}, the equality of the constraint C2^{′} in Problem (8), i.e., \(\sum \limits _{k\in \mathcal {K}} \sum \limits _{c\in \mathcal {C}_{k}} X_{k,c} = P^{\text {max}}\), is always required in order to maximize the objective function \(\sum \limits _{k\in \mathcal {K}} w_{k} R_{k}\).
Proof
We can prove Proposition 2 by contradiction. First of all, we assume that when v≥100 and ε≥10^{−20}, there exists an optimal solution (X^{∗},S^{∗}) for Problem (8) which satisfies the constraint C2^{′} with a strict inequality, i.e., \(\sum \limits _{k\in \mathcal {K}} \sum \limits _{c\in \mathcal {C}_{k}} X^{\ast }_{k,c} < P^{\text {max}}\). Hence, the remaining power can be obtained and denoted as \(P^{\text {rmd}}=P^{\text {max}}\sum \limits _{k\in \mathcal {K}} \sum \limits _{c\in \mathcal {C}_{k}} X^{\ast }_{k,c}\). Furthermore, we can partition P^{rmd} into several pieces, proportionally to \( X^{\ast }_{k,c}\). By denoting these power slices as \(X^{\prime }_{k,c}\), we have \(\sum \limits _{k\in \mathcal {K}} \sum \limits _{c\in \mathcal {C}_{k}} X^{\prime }_{k,c}=P^{\text {rmd}}\) and \(\frac {X^{\prime }_{k,c}}{X^{\ast }_{k,c}}=\frac {P^{\text {rmd}}}{P^{\text {tot}}}, \forall k\in \mathcal {K}, c\in \mathcal {C}\). In addition, these sliced remainder power \(X^{\prime }_{k,c}\) can be added to the optimal ones \( X^{\ast }_{k,c}\) accordingly, thus, form new power symbols denoted as \(\hat {X}_{k,c}\), i.e., \(\hat {X}_{k,c}= X^{\ast }_{k,c}+X^{\prime }_{k,c}, \forall k\in \mathcal {K}, c\in \mathcal {C}\). Obviously, the inequality \(\hat {X}_{k,c}> X^{\ast }_{k,c}\) always holds. Thus, we can obtain another solution for Problem (8) by replacing each \(X^{\ast }_{k,c}\) with \(\hat {X}_{k,c}\) while keeping the optimal codebook assignment S^{′} unchanged, i.e., \(({\hat {\mathbf {X}},S^{\ast }})\). Now, the values of the objective function for these two solutions must be compared. As all the other system parameters stay the same, the value of \({\sum }_{k\in \mathcal {K}} w_{k} R_{k}\) must increase with R_{k}. Furthermore, from Eq. (5), we can see that the value of R_{k} increases with \(\mathcal {R} \left (\gamma _{k,c},\epsilon ^{\text {th}}, v \right)\). As proved in Proposition 1, we know that \(\mathcal {R}\) is increasing in γ when v≥100 and ε≥10^{−20}. And as given in Eq. (7), the value of γ_{k,c} is increasing in X_{k,c} while keeping β_{k,c} and S_{k,c} unchanged. Hence, based on the analysis above, the relationship between the value of the objective function and X_{k,c} can be derived, i.e., \(\sum \limits _{k\in \mathcal {K}} w_{k} R_{k}\) is increasing in X_{k,c}. As in the proposed new solution \(({\hat {\mathbf {X}},S^{\ast }})\) and the assumed optimal solution (X^{∗},S^{∗}), the inequality \(\hat {X}_{k,c}> X^{\ast }_{k,c}\) always holds for all \(k\in \mathcal {K}\) and \( c\in \mathcal {C}\), which leads to the value of the objective function with solution \(({\hat {\mathbf {X}},S^{\ast }})\) must be always greater than the one with the optimal solution (X^{∗},S^{∗}). Therefore, the assumption that (X^{∗},S^{∗}) is the optimal solution of Problem (8) is violated and the proposed proposition is proved. □
As proven in Proposition 1, Problem (8) is a convex problem under the practical symbol blocklength and error probability constraints, i.e., v ≥ 100 and ε ≥ 10^{−20}. We assume that these constraints are always satisfied in the following derivations. Therefore, based on Proposition 2, Problem (8) can be simplified as
Since convexity and the Slater’s constraint qualification are satisfied by (11), strong duality holds. To increase the convergence speed, the partial Lagrangian method is utilized here, which is constructed as
where \(\boldsymbol {\lambda } = \{\lambda _{k}, k\in \mathcal {K} \}\) is the Lagrange multipliers set for the inequality constraint C1 and μ is the multiplier for the equality constraint C2". Therefore, the dual problem is obtained as
Note that X and S in the objective function of Problem (13) can be decoupled and optimized separately as \(\textstyle \max \limits _{\mathbf {X,S}} \mathcal {L} = \max \limits _{\mathbf {S}} \max \limits _{\mathbf {X}} \mathcal {L}\). This allows us to obtain the corresponding optimal solutions of X and S first, then solve the outer minimization problem with λ and μ subsequently, i.e., Problem (13) can be efficiently solved by applying an iterative algorithm. Consequently, the operations in each iteration loop can be generalized into the following three steps:
3.2.1 Power allocation
In the first step, we determine/update the power allocation solution P^{∗}. In particular, by solving \(\frac {{\partial \mathcal {L}}}{{\partial {\mathbf X}}} = 0\), we have (14). Based on the given values of λ, μ, and S, which are either with initialized values (if this is the first iteration loop) or updated values (from the previous iteration loop), P^{∗} can be obtained/updated by solving (14).
The left side of (14) is a product of two terms within two brackets. Obviously, the optimal \(P^{\ast }_{k,c}\) has to at least make the value of either the first term or the second term be 0. In the following we discuss these cases respectively. To make the first term (in the first bracket) be zero, this requires
where y_{k,c}=1+P_{k,c}β_{k,c}, \(A=\sqrt {\frac {1}{v}}Q^{1}(\epsilon)\), and \(B_{k,c}=\frac {\mu \ln 2}{\left (w_{k}+\lambda _{k}\right)\beta _{k,c}}\). Solving (15) with respect to y_{k,c} results in six roots. Denote by \(y_{k,c}^{\ast }\) the optimal solution of y_{k,c}. Then, \(y_{k,c}^{\ast }\) should be the one with the largest real value among all the six roots. In particular, as P_{k,c} must be a positive real number, \(y_{k,c}^{\ast }\) should be greater than 1. Otherwise, there is no solution in this case. As long as we have \(y_{k,c}^{\ast }\), the optimal power is determined, i.e., \(\overline {P}_{k,c}^{\ast }=(y_{k,c}^{\ast }1)/\beta _{k,c}\). On the other hand, Eq. (14) also holds if the second term (on the left side) is zero, i.e., \(P_{k,c}\frac {1}{\beta _{k,c}}=0\). Combined with the power constraint in (8), the optimal power \(P_{k,c}^{\ast }\) under this case is
3.2.2 Codebook assignment
After determining the optimal power P^{∗}, the codebook assignment problem can be tackled. By substituting (16) into (12) and eliminating the terms not involving S, the maximization problem with variable S in (13) can be transferred to a linear program
where \(Z_{k,c} = \left (w_{k}+\lambda _{k} \right) \mathcal {R} \left (\beta _{k,c}P^{\ast }_{k,c},\epsilon ^{\text {th}},v \right) \mu P^{\ast }_{k,c}\), ∀k,c. It should be noted that C6 is guaranteed by the predefined mapping matrix T between codebooks and subcarriers when the constraints C4 and C5’ are satisfied. And the optimal solution of problem (17) is given by
\(\forall k \in \mathcal {K}, c \in \mathcal {C}_{k}\). Thus, the optimal codebook assignment matrix S^{∗} is obtained.
3.2.3 Subgradient method
As P^{∗} and S^{∗} have been obtained, in the last step, we have to solve the outer minimization problem in (13). It has been proven [8, 9] that applying the subgradient method can efficiently achieve the dual solutions. The subgradient method is an iterative method for tackling the convex minimization problems and can ensure the convergence when adopting to nondifferentiable objective functions. In details, the update processes for \(\lambda _{k}, k\in \mathcal {K} \) and μ are
where φ_{k}(t) and ψ(t) are small positive step sizes of λ_{k} and μ in the t^{th} iteration, respectively. It has been shown that the convergence can be guaranteed with properly selected step sizes [8, 9].
Combining the above three steps, we provide in Algorithm 1 the overall resource allocation policy solving problem (6).
4 Simulation results and discussion
We resort to Monte Carlo simulations to evaluate the performance of the proposed algorithm and to study how the blocklength, the target error probability and the SNR effect the FBL throughput. In the simulation, we compare the throughput performance of the proposed algorithm in the FBL regime with existing works which consider maximizing the Shannon capacity in the IBL regime. In particular, two groups of reference performances are provided. One is called “Shannon” results, i.e., the Shannon capacity in the IBL regime. The other one is called “Mixed” scheme results, which is the FBL throughput obtained by directly applying the optimal resource allocation solutions maximizing the Shannon capacity (in the IBL regime) to the FBL regime.
In all simulations, an SCMA downlink network with 1 BS and 5 UEs is considered. The Rayleigh multipath fading is employed here. We let the average channel gain for each UE is h^{2}=1 and set the minimum required channel gain \(h_{\text {min}}^{2} = 0.01\). Thus, less than 1% UE cannot be served. Meanwhile, we set the path loss for each link to 80 dB. The noise power is δ=−80 dBm. And we let the average transmit power for each user be equal to 5 dBm. In terms of SCMA, we set N=4 and J=2. Thus, the total available codebook is \(C = {N \choose J} = 6\). In addition, the power allocation fraction is α_{c,n}=0.5 when the subcarrier n is used by the codebook c, ∀c∈{1,2,…,C}, n∈{1,2,…,N}. Finally, we have a homogeneous assumption on UEs’ requirements, i.e., \(R^{\text {req}}_{k} = 1\) bits/ch.use and w_{k}=1.
To start with, the relationship between target error probability and throughput is illustrated in Fig. 3. The blocklength is set to 100 symbols, i.e., corresponding to a latency critical scenario. Then, Fig. 3 actually demonstrates under a latency critical scenario the cost of guaranteeing a certain level of reliability with respects to the throughput. It can be observed that the Shannon capacity is constant in the error probability while the FBL throughputs of the mixed and the proposed schemes are increasing in the error probability. More importantly, the achievable performances under the FBL and IBL regimes (FBL throughputs vs. Shannon capacity) are significantly different. Moreover, there is also a considerable gap between the FBL throughput of the proposed algorithm and the one with the mixed scheme. In other words, directly applying the optimal resource allocation policy in the IBL regime to a URLLC network results in a considerable throughput loss. Finally, the above two performance gaps are decreasing in the error probability.
Next, we analyze in Fig. 4 the impact of the blocklength on the throughput performance. The error probability is set to 10^{−5}, which ensures 99.999% system transmission correctness. In addition, note that in a URLLC network design, the (maximal allowed) blocklength is affine in the latency requirement. Hence, the results in Fig. 4 indicate the costs (with respects to throughput) of guaranteeing reliably of 99.999% under different latency constraints. Again, significant performance differences among the Shannon capacity, the FBL throughputs of the proposed policy, and the mixed scheme in the IBL regime are observed. These differences are reduced as the blocklength increases. This holds as the longer the blocklength is, the closer it is to the infinite blocklength. Thus, the performance gain achieved by considering the blocklength into the system design becomes less. Finally, we have done the same simulations with different setups of SNRs. The plots in these cases are quite similar to the plots in Figs. 3 and 4 and not provided in the paper, while it should be mentioned that the performance gaps between FBL and IBL regimes become relatively small in a high SNR region.
In addition to the throughput, spectral efficiency and energy efficiency are also interesting performance indicators in the SCMA network design. In the system we considered in this work, all subcarriers have the same frequency occupancy. Hence, the plots for spectral efficiency against error probability or blocklength are just a scaling on the yaxis of Figs. 3 and 4. On the other hand, for the energy efficiency, based on Proposition 2, we can derive that the energy consumption of all these schemes are the same, i.e., the maximum. Therefore, similar to the case for spectral efficiency, the energy efficiency can be treated as a scaling factor as well. In summary, both the energy and the spectral efficiency performance of these schemes are just scaling of their throughput plots. Hence, the proposed scheme always outperforms the mixscheme with respects to throughput, spectral efficiency and energy efficiency.
5 Conclusions
In this work, we study an SCMA network supporting URLLC transmissions in the FBL regime. An optimal resource allocation policy is proposed to maximize the throughput. Via simulations, we evaluate the (achievable) FBL throughput performance of the considered network with the proposed resource allocation policy. In particular, we compare this (achievable) FBL throughput with the Shannon capacity in the IBL regime and with the FBL throughput obtained by applying the optimal solution of maximizing the Shannon capacity to the FBL model. Significant performance differences between these throughputs/capacity are observed, which confirm the necessity and contribution of this study: First, the system designs following the Shannon capacity are not accurate for the design of SCMA networks supporting URLLC transmissions. Moreover, a special design as provided in this work is necessary as the optimal solutions in the FBL regime and in the IBL regimes are different, i.e., directly applying the optimal resource allocation policy (from existing works) in the IBL regime to a URLLC network results in a considerable performance loss. Finally, this special design in the FBL regime is more beneficial for scenarios with a short blocklength or/and a rigorous reliability constraint.
In our future work, we will consider to employ the game theorybased resource allocation schemes, e.g., the swapmatching algorithm [7], to SCMA networks and provide designs to enable the URLLC transmissions.
Abbreviations
 AWGN:

Additive white Gaussian noise
 BS:

Base station
 D2D:

Devicetodevice
 FBL:

Finite blocklength
 IBL:

Infinite blocklength
 M2M:

Machinetomachine
 MPA:

Message passing algorithm
 NOMA:

Nonorthogonal multiple access
 OFDMA:

Orthogonal frequency division multiple access
 SCMA:

Sparse code multiple access
 SNR:

Signaltonoise ratio
 SWIPT:

Simultaneous wireless information and power transfer
 UE:

User equipment
 URLLC:

Ultrareliable low latency communications
 V2X:

Vehicletoeverything
References
Y Sun, C Li, Y Hung, L Yang, Joint Fronthaul Rate Allocation and Power Control in OFDMAbased CRANs: MultiObjective Approach. Adhoc Sens Wirel. Netw.37(14), 197–229 (2017). 33p.
Y. Liu, Z. Qin, M. Elkashlan, Z. Ding, A. Nallanathan, L. Hanzo, Nonorthogonal multiple access for 5g and beyond. Proc. IEEE. 105(12), 2347–2381 (2017). https://doi.org/10.1109/JPROC.2017.2768666.
Z. Chang, L. Lei, H. Zhang, T. Ristaniemi, S. Chatzinotas, B. Ottersten, Z. Han, Energyefficient and secure resource allocation for multipleantenna NOMA with wireless power transfer. IEEE Trans. Green Commun. Networking, 1–1 (2018). https://doi.org/10.1109/TGCN.2018.2851603.
T. Qi, W. Feng, Y. Chen, Y. Wang, When NOMA meets sparse signal processing: Asymptotic performance analysis and optimal sequence design. IEEE Access. 5:, 18516–18525 (2017). https://doi.org/10.1109/ACCESS.2017.2727518.
H. Nikopour, H. Baligh, in 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), London. Sparse code multiple access (IEEE, 2013), pp. 332–336. https://doi.org/10.1109/PIMRC.2013.6666156.
M. Taherzadeh, H. Nikopour, A. Bayesteh, H. Baligh, in 2014 IEEE 80th Vehicular Technology Conference (VTC2014Fall), Vancouver, BC. SCMA Codebook Design (IEEE, 2014), pp. 1–5. https://doi.org/10.1109/VTCFall.2014.6966170.
B. Di, L. Song, Y. Li, in 2016 IEEE International Conference on Communications (ICC), Kuala Lumpur. Radio resource allocation for uplink sparse code multiple access (SCMA) networks using matching game (IEEE, 2016), pp. 1–6. https://doi.org/10.1109/ICC.2016.7511409.
D. Zhai, M. Sheng, X. Wang, Y. Li, J. Song, J. Li, Rate and energy maximization in scma networks with wireless information and power transfer. IEEE Commun. Lett. 20(2), 360–363 (2016). https://doi.org/10.1109/LCOMM.2015.2504439.
L. Luo, L. Li, X. Su, in 2017 International Conference on Computing, Networking and Communications (ICNC), Santa Clara, CA. Optimization of resource allocation in relay assisted multiuser SCMA uplink network (IEEE, 2017), pp. 282–286. https://doi.org/10.1109/ICCNC.2017.7876140.
J. Shang, L. Gui, H. Zhou, M. Dong, J. Chen, in 2016 8th International Conference on Wireless Communications & Signal Processing (WCSP), Yangzhou. A groupbased M2M multiple access scheme in massive MIMO MUSCMA cellular networks (IEEE, 2016), pp. 1–6. https://doi.org/10.1109/WCSP.2016.7752657.
D. Zhai, M. Sheng, X. Wang, Z. Sun, C. Xu, J. Li, Energysaving resource management for D2D and cellular coexisting networks enhanced by hybrid multiple access technologies. IEEE Trans. Wirel. Commun. 16(4), 2678–2692 (2017). https://doi.org/10.1109/TWC.2017.2671863.
C. She, C. Yang, T. Q. S. Quek, Radio resource management for ultrareliable and lowlatency communications. IEEE Commun. Mag. 55(6), 72–78 (2017). https://doi.org/10.1109/MCOM.2017.1601092.
Y. Hu, M. C. Gursoy, A. Schmeink, Relayingenabled ultrareliable lowlatency communications in 5G. IEEE Netw. 32(2), 62–68 (2018). https://doi.org/10.1109/MNET.2018.1700252.
B. Di, L. Song, Y. Li, G. Y. Li, in GLOBECOM 2017  2017 IEEE Global Communications Conference, Singapore. NOMAbased lowlatency and highreliable broadcast communications for 5G V2X services (IEEE, 2017), pp. 1–6. https://doi.org/10.1109/GLOCOM.2017.8254830.
B. Di, L. Song, Y. Li, Z. Han, V2X meets NOMA: Nonorthogonal multiple access for 5Genabled vehicular networks. IEEE Wirel. Commun. 24(6), 14–21 (2017). https://doi.org/10.1109/MWC.2017.1600414.
C. Wang, Y. Chen, Y. Wu, L. Zhang, in 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), Sydney, NSW. Performance evaluation of grantfree transmission for uplink URLLC services (IEEE, 2017), pp. 1–6. https://doi.org/10.1109/VTCSpring.2017.8108593.
Y. Polyanskiy, H. V. Poor, S. Verdu, in 2009 IEEE International Symposium on Information Theory, Seoul. Dispersion of Gaussian channels (IEEE, 2009), pp. 2204–2208. https://doi.org/10.1109/ISIT.2009.5205834.
Y. Polyanskiy, H. V. Poor, S. Verdu, Channel coding rate in the finite blocklength regime. IEEE Trans. Inf. Theory. 56(5), 2307–2359 (2010). https://doi.org/10.1109/TIT.2010.2043769.
S. Xu, T. Chang, S. Lin, C. Shen, G. Zhu, Energyefficient packet scheduling with finite blocklength codes: Convexity analysis and efficient algorithms. IEEE Trans. Wirel. Commun. 15(8), 5527–5540 (2016). https://doi.org/10.1109/TWC.2016.2561273.
Y. Hu, M. Ozmen, M. C. Gursoy, A. Schmeink, in 2018 IEEE Wireless Communications and Networking Conference (WCNC), Barcelona. Optimal power allocation for QoSconstrained downlink networks with finite blocklength codes (IEEE, 2018), pp. 1–6. https://doi.org/10.1109/WCNC.2018.8377030.
Y. Hu, M. C. Gursoy, A. Schmeink, in 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), Montreal, QC. Efficient transmission schemes for lowlatency networks: NOMA vs. relaying (IEEE, 2017), pp. 1–6. https://doi.org/10.1109/PIMRC.2017.8292490.
Y. Xu, C. Shen, T. Chang, S. Lin, Y. Zhao, G. Zhu, in 2017 IEEE Globecom Workshops (GC Wkshps), Singapore. Energyefficient nonorthogonal transmission under reliability and finite blocklength constraints (IEEE, 2017), pp. 1–6. https://doi.org/10.1109/GLOCOMW.2017.8269136.
V. Y. F. Tan, M. Tomamichel, The thirdorder term in the normal approximation for the AWGN channel. IEEE Trans. Inf. Theory. 61(5), 2430–2438 (2015). https://doi.org/10.1109/TIT.2015.2411256.
Funding
This work is supported by Deutsche Forschungsgemeinschaft (DFG) research grant SCHM 2643/131 and RWTH startup grant StUpPD 26217.
Availability of data and materials
The paper is selfcontained. Simulation description and parameters are provided in details in Section 4.
Author information
Authors and Affiliations
Contributions
All authors have contributed to this manuscript and approved the submitted manuscript.
Corresponding author
Ethics declarations
Competing interests
The authors declare that they have no competing interests.
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
About this article
Cite this article
He, Q., Hu, Y. & Schmeink, A. Resource allocation for ultrareliable low latency communications in sparse code multiple access networks. J Wireless Com Network 2018, 282 (2018). https://doi.org/10.1186/s1363801813005
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/s1363801813005