 Published:
We’re sorry, something doesn't seem to be working properly.
Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.
Reducing interference via link adaptation in delaycritical wireless networks
EURASIP Journal on Wireless Communications and Networking volume 2022, Article number: 109 (2022)
Abstract
One of the current (6G) wireless networks research’s trends is to investigate short distance and dense scenarios, where users are locally connected in subnetworks. Such use case is critical to support the advances of industrial internet of things or Industry 4.0 (I4.0), e.g. connecting an entire group of sensors and actuators of a robot. Therefore, schemes that can properly manage the interference must be deployed in practical systems to allow the promised performance advances of 6G. Targeting these high density scenarios, we describe the Power Optimization for Low Interference and Throughput Enhancement (POLITE) paradigm for link adaptation and power allocation, which leverages available radio resources to stabilize and reduce the interference. The baseline link adaptation schemes are compared with POLITE in their performance in a 3rd generation partnership project (3GPP) calibrated system level simulator for industrial scenarios. As services in industrial environments require high reliability under constrained delays, we propose different delayaware formulations in the POLITE design. In this work, we provide solutions both for relaxed delay requirements and for latency critical traffic, whose delay must be minimized. In particular, in the latter case, we propose also modifications of user selection and resource allocation procedures to further improve the reliability and latency. Simulation results prove the benefits of POLITE in terms of increased throughput, fulfillment of relaxed and delaycritical requirements, with an overall reduced transmit power compared to the current baseline link adaptation schemes.
1 Introduction
With the consolidation of the first releases of 3rd generation partnership project (3GPP) standards for the deployment of the (5G) wireless networks, the research community is already defining the scenarios and directions for 6th generation (6G) systems [1]. Among the different scenarios envisioned in 6G [2], the 6G short range and low power subnetworks will support lifecritical and futuristic applications, like intrabody heart rate control, intravehicle break control and Industry 4.0 (I4.0) devices of a central machine hub [3]. Accordingly, the research effort on studying and improving the performance of (URLLC) is pivotal not only in the legacy macro area wireless systems, but also in these new subnetworks scenarios. It becomes clear the need of simple and efficient distributed algorithms to guarantee coexistence of wireless networks, that would typically operate in an interferencelimited regime.
In this work, we address the paradigm for (LA) and power allocation introduced in [4, 5] to improve performance of wireless networks by leveraging all the available radio timefrequency resources of every cell. The Power Optimization for Low Interference and Throughput Enhancement (POLITE) in [4] exploits the significant underutilization of wireless resources of current systems [6]. By applying POLITE, each transmission can be stretched on a bigger amount of resources, allowing to reduce the transmit power while preserving the transmission’s reliability. As a consequence, the system benefits from an overall reduced and stabler interference, that is particularly advantageous for URLLC traffic.
1.1 Related work
In the literature, longterm power adaptation techniques are proposed as potential solutions for 6G subnetworks [3], together with uplink power control to reduce interference from close neighbor cell mobiles. However, techniques involving optimization routines [7], game theory [8] or artificial intelligence [9, 10] are not tailored for real time medium access control (MAC) procedures. In particular, they either increase significantly the computational complexity, or they require additional signaling among network nodes compared to current Baseline link adaptation (BLA) schemes [11,12,13] and POLITE. Focusing on recent year’s progress in MAC design for URLLC, the two closest approaches to ours are [11, 14], where the authors propose to give up in URLLC flows’ spectral efficiency to boost reliability. Nonetheless, both approaches do not unveil the potential of more efficient timefrequency resource utilization to reduce and stabilize the interference, that is POLITE’s goal. In particular, the better shape of the interference in POLITE brings benefits in terms of higher system capacity and lower overall transmit power compared to the current extensively used BLA paradigm, consisting in the maximization of the user’s spectral efficiency.
Although POLITE’s benefits are interesting, one of the main limitations of the original POLITE scheme [4] was the unawareness of packet delay budgets and its incapacity to enforce these. The more recent [5] formulates how packet delays can be matched, evaluating its performance in indoor factory (InF) scenarios [15], showing performance improvements in terms of system capacity, packet delays fulfillment, and reduced transmit power. However, in the previous works [4, 5], only LA was under the scope of POLITE methods. Focusing on URLLC use cases, in this work we consider how POLITE can interact with user scheduling and resource allocation to minimize latency and increase reliability of latencycritical traffic.
1.2 Contribution
The contribution of the paper can be summarized as follows.

The most recent POLITE schemes [5] have been further enhanced to minimize the latency experienced by critical traffic users, in addition to the mere verification of nonstringent latency budgets. Differently from previous work, we do not only propose a new LA paradigm, but we also provide novel user selection and resource allocation mechanisms. This extension is an enabler for future support of URLLC traffic types.

Extensive system level simulations of indoor factory floors are reported. Thanks to a proper delayaware rate reduction policy, it is possible to show more than one degree of magnitude gains in terms of latency critical traffic’s reliability compared to baseline schemes, for current 5QI [16]. The obtained results validate the POLITE’s benefits with short intersite distances and the typical severe interference conditions of industrial scenarios, such as the future subnetworks of Beyond 5G and 6G wireless systems.
1.3 Structure of the paper
The remainder of the paper is organized as follows. In Sect. 2, the MAC layer procedures of interest are introduced, namely LA and resource allocation, together with the terminology and the notation adopted in this work. The stateoftheart LA and the novel POLITE scheme are formally described in Sect. 3, while in Sects. 4 and 5 the basic and the more advanced delayaware algorithmic implementations of POLITE are discussed, respectively. Simulation results and numerical experiments are performed in Sect. 6, where the different approaches are compared with the stateoftheart. Finally, the summary in Sect. 7 concludes the paper.
2 MAC layer models
The MAC layer procedures necessary to motivate and understand this paper are (i) LA and (ii) scheduling, consisting in user selection and radio resource allocation. The skeleton of their operation is depicted in Fig. 1. At each transmission time interval (TTI) one should (i) determine from the set of connected users \(\mathcal {C}\), the set of active users \(\mathcal {I} \subseteq \mathcal {C}\), that have an amount of bits \(Q_i > 0\) to transmit, \(\forall i \in \mathcal {I}\), (ii) perform LA for each of them and (iii) determine which user is scheduled in each schedulable resource block (SRB), defined as the atomic entity of schedulable wireless resources. A SRB can consist of multiple time, frequency and/or spatial radio resource elements. In the next two subsections, we formalize the LA and scheduling models and terminology used in this paper.
2.1 LA notation
The LA problem in wireless communication can be defined as the selection, for a generic user, of

(1)
the modulation and coding scheme (MCS) m, having rate \(a_m\) to be used during communication, chosen among the MCS set M, that is sorted with ascending order of rate,

(2)
the transmit power P—or power spectral density (PSD) S—to be used,
given or subject to

(A)
maximum transmit power, \(P^{\text {(MAX)}}\), or PSD, \(S^{\text {(MAX)}}\),

(B)
an estimate of the channel quality \(\alpha\), that is equal to the equivalent channel power gain divided by the sum of interference plus noise PSD, leading to a signal to interference plus noise ratio (SINR) \(\gamma = S\alpha\),

(C)
a desired target BLER \(\epsilon '\) for the first transmission attempt,

(D)
The amount of bits to be transmitted Q.
In MAC procedures, LA is typically performed for every active user and its output is fed to the resource scheduler, that is the object of the next subsection. Note that, assuming to have a pool of \(\mathcal {B} = \{ b_1, \cdots , b_B \}\) SRBs, one may select a different MCS \(m_b\) and transmit power \(P_b\)  or PSD \(S_b\)  depending on which SRB b is allocated to the user.
2.2 Resource scheduling (RS)
It is important to recall that some resource schedulers, like the wellknown round robin scheduling [17], may not need LA’s output before scheduling. However, in wireless literature the most common baseline for scheduling has always been proportional fair (PF), thanks to its simplicity and its performance gains on simple baselines. Therefore, we consider a frequencyselective PF scheduler, that computes the following metric
where \({m_b^{(i)}}\) and \(r^{(i)}\) are the MCS assigned by LA to the user i on the SRB b, and user i’s temporally smoothed past experienced throughput, respectively. The main reason to use PF are its time and frequency opportunistic gains. These are given by the fact that active users obtain in average the same amount of resources, but each user obtains more resources when it can achieve higher spectral efficiency than its average. For more details on PF, or similar scheduling metrics with QoS awareness, the reader can resort to [18].
In this work, unless mentioned otherwise, we consider Algorithm 1, that describes a frequencyselective singleuser resource allocation with PF scheduling. It corresponds to the allocation of resources to the combination of user and SRB having the highest PF metric, determined as in (1). The procedure is run until either all resources are exhausted or all active users have emptied their buffer \(Q^{(i)}\). After determining which user \(I_b \in \mathcal {I}\) is to be scheduled on each SRB \(b \in \mathcal {B}\) in the current TTI, this information is passed to the physical layer, together with the user’s MCS and PSD, for the effective transmission. If \(I_b = 0\), it means that the SRB has not been assigned and nothing is transmitted over those timefrequency resources. The remaining bits to be transmitted for a generic selected user \(i^*\) are updated based on the amount of bits that can be transmitted over the overall resources assigned to it in the current TTI, using the selected MCS (see line 10 in Algorithm 1). Note that the MCS decision is updated considering an equivalent SINR over all the resources assigned so far, therefore determining a unique transport block size. More information on the considered MCS, their performance and SINR mappings considered in this work are given in Sect. 6.
However, some users may have such tight latency constraints that require more attention. This could be the case of URLLC traffic or any hard priority services that, if active, can completely preempt other users. We can therefore define the set of active hard priority users as \(\mathcal {I}' \subseteq \mathcal {I}\), where \(\mathcal {C}' \subseteq \mathcal {I}'\) denotes the set of active users in the cell with hard priority. Differently from the pure PF formulation, this information is used by the proportional fair with hard priority (PFHP) scheduler by changing how the users are prioritized during scheduling. We propose to substitute the user selection procedure of PF (reported line 7 of Algorithm ) as follows
Namely, if there is at least a hard priority user requiring resources, users without hard priority, i.e. in the set \(\mathcal {I} \setminus \mathcal {I}'\), are not considered for resource assignment.
3 Link adaptation schemes
In this section, we introduce two families of link adaptation algorithms and discuss their problem formulation, by adopting the same formalism introduced in Sect. 2.
3.1 Baseline link adaptation (BLA)
This first algorithm family frames the LA problem as in [11,12,13]
where \(\epsilon _m(\gamma ,b)\) are the BLER curves for MCS m, the SINR estimate \(\gamma\) and packet size b. Note that the sorting rule of the set of MCS \(M_{\epsilon ', \gamma , b} \subseteq M\) satisfying the BLER target is also ordered with ascending rate \(a_m\), hence \(m< m' \Leftrightarrow a_m < a_{m'}, \text { with } m,m' \in M\). This scheme corresponds to the stateoftheart LA operations, which, therefore, will be referred to as Baseline link adaptation (BLA) in what follows. In a more formal way, the BLA approach (3) can also be framed as the rate maximization problem below.
3.2 POLITE general concept
In contrast to the BLA approach described in the previous subsection, POLITE exploits additional information to determine the MCS. Previous works [6] demonstrated that typical macroarea wireless systems—working with BLA—are highly underloaded. Similarly, the more recently addressed 6G subnetworks will likely not operate with full load in every subnetwork present in the system if adopting the legacy BLA approach. Therefore, we assume that the MAC layer of each cell can monitor the ratio of resource utilization \(\beta\) if BLA is adopted in the system. If \({\beta } < 1\), the system could slow down its transmission rate, allowing to reduce the transmit power accordingly, leading to the POLITE formulation below
where \(a_m\) is the solution of (4). Notice that the same BLER target is guaranteed (cf. Eq. (4a) and Eq. (5a)), but in the problem formulation in (5) the power spectral density is minimized, rather than fixed to a predefined value (cf. Eq. (4b)). Note that the POLITE scheme can operate in a distributed way across each single cell, without the need of coordination among them. It can be shown that the complexity increase compared to BLA is dominated at each time slot by a term \(\mathcal {O}(\mathcal {I} \log _2(M)\). Given the linear scaling with number of users, we consider this to be practically negligible.
In [4] the authors proved that POLITE is theoretically able to convey information rates with infinite and finite packet sizes with lower power spectral density and total transmit power. Results in [4] demonstrated that  in urban macro scenarios [15]—reduced transmit power and higher throughput in congested cells can be achieved with POLITE, due to lower and stabler interference from neighboring cells. One of the key challenges of POLITE schemes in practical systems is determining the factor \(\beta\) of Eq. (5b), hereafter referred as slowing factor. Different proposals lead to different effects and will be investigated in the next two sections.
4 Basic POLITE implementation
4.1 Loaddriven POLITE (LP)
The first proposal from [4] to estimate the slowing factor \(\beta\) aims at serving all the incoming traffic as follows.
where \(\rho _i, \eta _i\) are, respectively, the exponentially smoothed traffic arrival rate and spectral efficiency of user i, while N the number of resource elements available per TTI, and \(\chi \le 1\) is a multiplicative factor to further enhance system performance [4]. This way to compute \(\beta\) will hereafter be called LP. Note the insensitivity of LP schemes to packet delays.
4.2 Aggressive POLITE (AP)
The “Aggressive POLITE” scheme defines an heuristics to handle extreme delay requirements within the POLITE framework. For all the users with extreme delay requirements (cf. Sect. 2.2), we assume that their transmissions are not affected by POLITE, thus \(\beta _{j} = 1, \forall j \in \mathcal {C}'\). Accordingly, the computation of \(\beta\) for all the remaining users in the set \(\mathcal {C} \setminus \mathcal {C}'\), i.e. with no stringent delay requirements, is adapted from the LP formulation in (6) to
However, even if it seems counterintuitive, reducing the rate of urgent (delaycritical) transmissions does not necessarily have a negative impact on their performance. For instance, falling back to more conservative MCS to occupy all remaining unused resources of a single TTI was already suggested in [11] to increase URLLC’s reliability. Moreover, if the delay budget allows it, one could also exploit following TTIs for the same purpose [14]. Nevertheless, even if the packet delay budget could be anyway satisfied, previous solutions did not propose to reduce transmit power to reduce and stabilize interference.
5 POLITE with delay budgets
In this section, we account for the latency requirements of critical applications by adopting the specifics of the 3GPP FTP3 traffic model in [19], where the users in the systems download packets with

constant size Q,

exponentially distributed interarrival times,

delay budget—of each packet—B,

an infinite queue (buffer).
In this work, we assume that a packet is discarded whenever its delay exceeds the packet delay budget. Moreover, all packets of a single user are served according to a first in first out (FIFO) policy, bringing the system into congestion once the incoming traffic approaches the cell capacity.
5.1 Delayaware POLITE (DP)
In the LP version [4], the POLITE \(\beta\) is computed considering only an estimate of the arrival rate \(\rho _i\) of every connected user in the cell, as done in (6). The limitation of LP is that the estimate of the required amount of resources does not account for delaysensitive transmissions, whose requests must be served within a certain delay budget. Therefore, DP implements a more general rule to estimate the \(\beta\) to be used by POLITE when performing LA. In particular, for every packet \(p \in P_i\) waiting in the ith user’s queue, we consider

the amount of data still to be transmitted \(Q_{i,p}\),

the arrival time \(T_{i,p}\),

an arbitrary/configurable “desired” delay \(D_{i,p} \le B_{i,p}\),

an arbitrary/configurable “delay normalizing factor” \(D_{i,p}^{0} \ge 0\), with \(D_{i,p}^{0} \ll B_{i,p}\).
The scheduler can then estimate the ith user’s required throughput at time t, \(\hat{\rho }_i(t)\), by taking the maximum value between the longterm arrival rate and the maximum throughput needed to serve all its packets within their latency budgets:
where \(\rho '_i(t)\) is the single user exponentially smoothed average arrival rate at time t, as done in [4]. Therefore, the DP’s \(\beta\) is computed as
Note that the factor \(\chi\) is applied only to the longterm average incoming traffic and not the required throughput to serve packets within their delay budgets. For the remainder of the subsection, the dependency on the user i is removed for ease of notation. The value \(\tau _p(t)\) (i.e., \(\tau _{i,p}(t)\)) in Eq. (8) defines the time needed to serve a packet p within delay budget,
where

\({\tau _p^{\text {act}}(t) = \max \left[ \tau ^{\text {min}}, B_p  t + T_p \right] }\), which denotes the actual expiring time, and

\(\tau _p^{\text {des}}(t) = \max \left[ \tau ^{\text {min}}, D_p  t + T_p \right]\), that is an artificial desired expiring time.
An illustrative example of the quantity \(\tau _p(t)\) in Eq. (10) is plotted in Fig. 2 for the parameters \(B_p = 30\) ms, \(D_p = 15\) ms, \(D_p^0 = 5\) ms and \(\tau ^{\text {min}} = 1\) ms. In particular, the choice of \(\tau ^{\text {min}} = 1\) ms reflects the scheduling TTI duration and it is introduced for practical implementation to avoid divisions by zero in (8). From the graphical representation, one can observe the effect of each component defined in (10). The term \(\tau _p^{\text {act}}(t)\) is a linear decreasing function of the delay budget and elapsed time (dotted purple line with circles). Considering only such a value, DP would not react in time if deep channel fades occur at the end of the delay budget, making some packets fail. To avoid that the system accumulates packet close to their expiring time \(B_p\), the desired delay \(D_p<B_p\) is introduced in \(\tau _p^{\text {des}}(t)\). Accordingly, e.g. with \(D_p=15\) ms, the system reacts faster to deliver the packets. Nevertheless, big fluctuations of the \(\beta ^{\text {DP}}\) may occur due to the unnecessary low values of \(\tau _p^\text {des}(t)\) when approaching the desired delay. Therefore, a flat region, corresponding to \(D_p^0 = 5\) ms, is interposed between the two lines between the desired and the target delay budget.
5.2 Latencycritical POLITE (LCP)
Although DP allows to satisfy delay budgets, it does not aim at minimizing the delay for latencycritical users. For some type of traffic, we do not only need to meet their latency budgets, but also to minimize the overall latency. For example, latencycritical applications like URLLC are very sensitive to packet delay, and they should be transmitted in the shortest time possible. By using DP with \(\beta ^{DP}< 1\), it could occur that the transmission of some latencycritical packets cannot be completed at the current TTI, while with BLA it could have been possible to fully transmit it. As a result, these packets will experience an increase in delay with DP, with a negative impact on their performance. As a solution one might consider to apply AP, thus no rate reduction of latencycritical traffic. However, this leads to interference spikes that further lower performance, as demonstrated in [5] and will be discussed in Sect. 6. Therefore, we introduce the LCP, an extension which aims to minimize the delay of latencycritical packets, while still achieving power reduction.
The LCP algorithm works as follows: first, it applies DP and RS with PFHP to assign to the latencycritical users the highest priority (line 1 of Algorithm 2). If all the latencycritical packets are transmitted at the current TTI, there is no need to intervene, the latency is minimized and DP can be executed. If there are still some pending transmissions for latencycritical users, the following procedures is considered. With BLA and PFHP the initial resource allocation for delaycritical users is computed (lines 67 of Algorithm 2). If there are still available resources, these are further distributed among the delaycritical users in a weighted round robin (WRR) fashion (see lines 912 of Algorithm 2). Notice that, to account for the discrete nature of SRBs, WRR allocates resource blocks one per time (line 11), until completion of resources, which might result in an uneven allocation of resources among users. The actual allocation of resources is then computed with a redefined version of PFHP (lines 1318 in Algorithm 2), where line 17 defines the maximum resource allowance of a user, as defined by WRR in the previous steps of the algorithm. Finally, based on the amount of resources to be assigned to each user, a peruser slowing factor \(\beta\) can be calculated as
where the denominator \(\xi _i\) is the amount of bits that can be transmitted to user i when using the MCS determined with BLA on the SRBs allocated to i. Finally, LA is performed on the scheduled SRBs, using for every user its corresponding \(\beta ^{\text {LCP}}_i\) (line 20 of Algorithm 2).
The reasoning behind the computation of BLA and PFHP in line 67 of Algorithm 2 is that it ensures the transmission of all latencycritical packets, if enough resources are available. Only after the transmission of those packets is guaranteed, additional SRBs are exploited to reduce the required Tx power. In particular, differently from DP, LCP estimates a peruser slowing factor \(\beta _i\), by allowing different power reduction factors for different latencycritical users. This choice is needed due to the integer—and not rational—number of SRBs allocated to each user. Therefore, one could not arbitrarily redistribute resources to have a common slowing factor. However, one should rather compute a peruser slowing factor depending on each user’s buffer size and resource elements allocated to it in the current TTI.
6 Simulation method, results and discussion
6.1 Simulation method and scenario description
The experiments are performed in a downlink (DL) data channel systemlevel simulator, since implementing the proposed scheme in (DL) does not require any additional signaling between base station and users [4]. The 3GPP calibrated InF [15] channel model is considered in our simulations, abstracting the physicallayer effects through a link to systemlevel interface computing equivalent SINR at transmission time, given the cell/user topology and active transmissions. The simulation environment consists of a confined industrial area of 120x60 \(\text {m}^2\), split into a 6 × 3 cell topology with 20 m intersite distance. The main simulation parameters can be found in Table 1.
The interference covariance matrix is estimated by each user by observing real data transmission, thus knowing if there were interfering data transmissions in the past, as done in [11, 18]. The maximum transmit power is enforced with a power spectral density limitation over all the available subcarriers at every TTI. Therefore, the total irradiated power is lower if some subcarriers are not used for transmission. In case of 2x2 multiple input, multiple output (MIMO) simulations, an interference rejection combining (IRC) receiver [22] is used to compute the receive combining weights and the transmission rank is determined by the base station based on the maximum throughput achievable. The traffic is mainly due to two classes of FTP3 [19] users randomly deployed in the system, that download packets of fixed dimensions with varying packet exponential interarrival time, allowing to tune the average offered load in each cell. The two classes FTP3 long (FTP3L) and FTP3 short (FTP3S) represent long, but relaxed, file transfers and short, but delaycritical, packet transmissions, respectively, and their parameters are resumed in Table 2. The delaycritical traffic users have a latency target of 30 ms, that is corresponding to the delay of “Intelligent Transport System” 5QI number 84 of “DelayAware guarateed bit rate (GBR)” services in 5G systems [16]. Note that enabling subms delays for future 6G subnetworks applications could be achieved by considering systems with shorter TTIs than 1 ms, as shown in [11]. Compared to the simulations in [5], the FTP3S packet dimension and arrival rate has been increased to challenge the system with bigger and more frequent bursts of delay critical traffic. Moreover, differently from [5], we always assign hard priority at scheduling to FTP3S traffic to reduce its delay as much as possible. The incoming traffic estimation by every user is performed observing the buffer status changes and applying exponential smoothing, more details are given in [4]. Finally, a FB user having always data to transmit is placed in a random cell. In this cell, all resources will be always occupied due to this user, that has an infinite thirst for resources.
The analyzed algorithms are

the original LP of Sect. 4.1 with \(\chi = 0.8\).

the delayaware DP of Sect. 5.1 with \(\chi = 0.8\).

the more aggressive AP of Sect. 4.2, but only applied for FTP3S traffic, while FTP3L delay is still enforced with DP with \(\chi = 0.8\).

the final LCP proposal of Sect. 5.2 with \(\chi = 0.8\). As in the previous case, LCP is only applied for FTP3S traffic, while FTP3L delay is still enforced with DP.

The stateoftheart BLA of Sect. 3.1.
The rationale behind the adoption of \(\chi\) is that the finite set of available MCS (i) limits the minimum available rate and (ii) forces the MCS selection of Eq. (5b) to have a rate typically higher than the desired one. Moreover, (iii) the channel selectivity in frequency and the opportunistic nature of the PF scheduling described in Algorithm 1 allow users to be allocated resources where their rate can be higher than the average rate over the full bandwidth. Therefore, a further slowing factor \(\chi < 1\) can push the resource utilization closer to \(100\%\), thus increasing POLITE’s performance [4].
In this work, the discussion in [4, 5] is extended by analyzing (i) LCP’s performance, and (ii) the tradeoff between the delay budgets satisfaction and generic system performance of different POLITE algorithms. To improve clarity, the result section is structured in two main parts. In the first, packet delay performance is addressed, whereas in the second part generic system performance are investigated, namely the FB throughput and the required average transmit power.
6.2 Delay results
In order to assess the ability of the proposed schemes to convey the offered traffic within its delay budget, the performance of the two traffic types, FTP3S and FTP3L, are discussed separately. The performance are evaluated in terms of average and, for FTP3S, distribution of the transmission delay. Moreover, we analyze the failure ratio, measured as the ratio between the number of packets that cannot be transmitted within their delay budget versus the total number of offered packets in the system. In the following plots, the same colors (and markers) are used to distinguish the different algorithm proposals.
FTP3S average delay and failure ratio In Fig. 3, the average delay and the packet failure ratio for the FTP3S are shown, respectively, in solid lines and dotted lines. One can see that, as general trend, the performance of the FTP3S users worsen as the offered traffic of FTP3L users increases, due to the corresponding interference generated, reducing the spectral efficiency, thus capacity, of neighboring cells. In particular, one can appreciate that the average delay is minimized by the proposed LCP (solid purple line), followed by AP, which consists of the most conservative approach to serve the delaycritical users. Note that the interference spikes of AP still make it underperform compared to LCP. On the contrary, especially at low load, the LP and DP exhibit higher average delay, due to the fact that they do not aim at minimizing latency. The failure ratio plot in Fig. 3 with dashed lines allows to analyze how the investigated algorithms match delay budgets: the delay unaware LP, as expected, underperforms compared to BLA at low offered traffic due to its excessive tendency of slowing down, improving at higher loads. Then, both the AP and the DP can match FTP3S delay budgets better than BLA at all loads. However, the LCP is the only one that manages to significantly improve the performance of the FTP3S traffic for any cell load condition, achieving more than one order of magnitude less failure ratio than its competitors at low loads, with its gains shrinking, but not nulling, as the load increases.
FTP3S complementary cumulative density function (CCDF) To better describe the behavior of the LA schemes in different load conditions, in Fig. 4 the CCDF of the packet delay is plotted in two scenarios: a high and a low interference scenario, consisting of 0.4 and 4 Mbps of FTP3L offered traffic per cell. One can notice the impact of the interference from other cells in the drastic increase of the latency, thus of the probability of experiencing latencies of 30 ms or more, thus failing the delay budget. Except from LP at low loads, it’s worth noticing the better behavior of all POLITE proposals compared to BLA regarding failure ratio. In particular, at low load (0.4 Mbps of FTP3L traffic) DP tries only to match the delay budget, achieving higher latencies than BLA, whereas LP is completely outperformed. On the other hand, the two approaches that try to minimize latency, i.e. AP and LCP, achieve always better performance than BLA, with the latter achieving lower delay than the former. In particular, LCP outperforms BLA by one order of magnitude in CCDF already after 8 ms delay.
FTP3L average delay and failure ratio In Fig. 5 the performance of the FTP3L users are shown, in terms of packet average delay and failure ratio. One can observe that all POLITE proposals, due to their slowing down of the FTP3L best effort traffic, experience higher average delay, especially at low load, compared to BLA. Moreover, due to lower amount of resources needed for FTP3S of AP and LCP, their average delay is lower at low to mid loads compared to DP and LP. However, as the load increases the better capacity of DP to handle interference and loose delay budgets makes it the best POLITE proposal in terms of average delay, with less than 100 ms losses with respect to BLA, over a 3 seconds delay budget. While with POLITE all the transmissions are slowed down, resulting in higher average delay, if one analyses the FTP3L failure ratio, the trend changes.
Given the reduced and stabler interference compared to BLA, the network performance can increase (which will be addressed further in the next subsection), and, thus, even the failure ratio of low priority traffic can be reduced. By analyzing the failure ratio (dashed lines) in Fig. 5, one can notice that BLA, although not slowing down any user, provides a worse performance than all the POLITE schemes, with the exception of the delay unaware LP. In particular, the FTP3L load, at which the failure ratio is greater than \(1\%\), is ca. 1.1, 1.45, 1.45 and 1.7 Mbps for BLA, AP, LCP and DP, respectively. This shows that AP, LCP and DP can bear ca. \(32\%\), \(32\%\) and \(54\%\) higher FTP3L load than BLA if the failure rate target is \(1\%\). One should notice that at high loads, BLA slightly improves performance compared to LCP—applied for FTP3S only—showing its negative impact on FTP3L failure ratio. However, this shortcoming is highly compensated by the gains achieved by LCP on FTP3S’s delay (as shown in Figs. 3 and 4). On the other hand, the DP solution already introduced in [5] remains the best option if the served traffic does not require to minimize its latency, outperforming all the other proposals in terms of failure ratio, at any load condition, and average delay at midhigh loads.
6.3 FB Throughput and T× Power comments
In this subsection, the overall system performance is evaluated and compared among the baseline BLA and the diverse POLITE variants.
FB user throughput In Figs. 6 and 7, the achieved throughput of the FB user is plotted with 1 × 1 and 2 × 2 MIMO schemes, respectively, allowing to assess the performance in cells that are fully congested, while others operate with varying load conditions. This situation may happen in realistic systems, for instance in industrial scenarios where big downloads may happen on top of normal traffic, e.g. due to log data or firmware downloads, requiring full capacity in certain cells. The results in Fig. 6 show that the proposed POLITE schemes achieve higher throughput than BLA, when considering a 1 × 1 antenna configuration. In particular, when comparing the POLITE schemes amongst themselves, one can notice that LP outperforms the delayaware schemes (both LCP and DP). This is the price to pay in order to meet the delay targets of FTP3L and FTP3S users, which significantly improve their performance, especially the FTP3S thanks to LCP. Still, a boost of \(8090\%\) of achieved throughput at lowmid loads can be achieved by LP, DP, and LCP, when compared to BLA. Note that AP performs as the worst among the POLITE schemes, due to the spikes of interference generated by the transmission of delaycritical users. As expected, the gain in performance starts decreasing when the load of FTP3L users increase, almost vanishing when the system operates at almost full capacity. This result can be explained by the difficulty of the POLITE schemes to further reduce transmission rates in congested scenarios. Still small gains can be achieved, thanks to the ability of POLITE to reduce interference when single cells are not fully loaded.
The gains are more evident in the 2 × 2 MIMO configuration, in Fig. 7, where one can notice an improvement of ca. \(100\%\) in the region between 2 Mbps and 5 Mbps of carried load. Also for the 2 × 2 MIMO scheme, the same observations can be drawn when comparing the different POLITE proposals. Interestingly, the gains are higher at mid loads than at high loads—as with 1 × 1 MIMO—and low loads. At particularly low loads, 2 × 2 MIMO allows to deliver all the offered FTP3S and FTP3L traffic with minimal resource consumption. Therefore, there could be many transmissions without any interference from the neighboring cells with BLA, thus not requiring the interference reduction properties of the POLITE schemes.
Average required transmit power Similar considerations can be done when looking at the plots in Fig. 8, where the average transmitted power is plotted for all the tested LA schemes. When comparing the different investigated solutions, transmit power savings can be sorted as LP > DP > LCP > AP \(\gg\) BLA. The gains of DP and LCP schemes are more significant at mid low, with a reduction of ca. \(45\) dB at around 1 Mbps in 1 × 1 MIMO configuration (solid line) and \(56\) dB at around 5 Mbps for the 2 × 2 MIMO configuration (dashed line). However, one can notice that, in case of 2 × 2 MIMO and at very low loads, BLA requires a lower average transmit power. This is due to the fact that at extremely low loads, transmitting short bursts of traffic could be done with a higher energy efficiency due to a negligible probability of being interfered. However, the rare interference events at full power of BLA still provide lower performance in terms of both throughput for full buffer users (Figs. 6, 7) and latency for delaycritical users (Figs. 3, 4).
Concluding, we highlight that LCP’s gains of URLLC performance observed in the previous subsection is tradedoff for minor losses in terms of peak throughput and overall needed transmit power compared to DP. Still, the overall performance of DP and LCP proposals severely outperform the baseline scheme BLA, justifying them as suggested schemes to be adopted in future wireless networks.
7 Conclusion
The proposed POLITE methods leverage the unused wireless timefrequency resources in noncongested cells to minimize the transmit power, thus interference, allowing overall performance gains in the system. In this work, delay of latency critical traffic has been minimized by introducing the Latencycritical POLITE (LCP) paradigm, that integrates modifications of current link adaptation, user scheduling and resource allocation procedures. System level simulations of 3GPP indoor factory scenarios show that, compared to stateoftheart mechanisms, LCP can improve reliability up to an order of magnitude compared to stateoftheart BLA approaches, outperforming also previous POLITE proposals.
The important gains for latency critical traffic require a minor price to pay in terms of overall system performance. Still, the LCP proposal delivers from circa \(60\%\) to \(100\%\) more bearable throughput for full buffer users in the congested cell, more than 4 dB transmit power reduction in non congested cells, \(32\%\) increased bearable load with \(1\%\) failures of traffic with long deadlines, when it is compared to baseline BLA, in the considered scenario. Therefore, the proposed POLITE paradigm is particularly promising due to its simple and distributed implementation, that leads to improved system performance for all the traffic types that are of interest in current and future wireless systems.
Abbreviations
 3GPP:

3rd generation partnership project
 5G:

5th generation
 5QI:

5G QoS indicator
 6G:

6th generation
 AP:

Aggressive POLITE
 BLA:

Baseline link adaptation
 BLER:

Block error rate
 CCDF:

Complementary cumulative density function
 CQI:

Channel quality indicator
 DH:

Dense high
 DL:

Downlink
 DP:

Delayaware POLITE
 FB:

Full buffer
 FIFO:

First in first out
 FTP3:

File transfer protocol 3
 FTP3S:

FTP3 short
 FTP3L:

FTP3 long
 GBR:

Guarateed bit rate
 I4.0:

Industry 4.0
 InF:

Indoor factory
 IRC:

Interference rejection combining
 LA:

Link adaptation
 LCP:

Latencycritical POLITE
 LDCP:

Lowdensity parity check
 LP:

Loaddriven POLITE
 MAC:

Medium access control
 MCS:

Modulation and coding scheme
 MIMO:

Multiple input, multiple output
 PF:

Proportional fair
 PFHP:

Proportional fair with hard priority
 POLITE:

Power optimization for lInterference and throughput enhancement
 PSD:

Power spectral density
 QoS:

Quality of service
 RS:

Resource scheduling
 SINR:

Signal to interference plus noise ratio
 SRB:

Schedulable resource block
 TTI:

Transmission time interval
 URLLC:

Ultra reliable low latency communications
 WRR:

Weighted round robin
References
Z. Zhang, Y. Xiao, Z. Ma, M. Xiao, Z. Ding, X. Lei, G.K. Karagiannidis, P. Fan, 6G wireless networks: vision, requirements, architecture, and key technologies. IEEE Veh. Technol. Mag. 14(3), 28–41 (2019)
H. Viswanathan, P.E. Mogensen, Communications in the 6G Era. IEEE Access 8, 57063–57074 (2020)
G. Berardinelli, P. Baracca, R.O. Adeogun, S.R. Khosravirad, F. Schaich, K. Upadhya, D. Li, T. Tao, H. Viswanathan, P. Mogensen, Extreme communication in 6G: vision and challenges for ‘inx’ subnetworks. IEEE Open J. Commun. Soc. (2021). https://doi.org/10.1109/OJCOMS.2021.3121530
S. Mandelli, A. Lieto, P. Baracca, A. Weber, T. Wild, Power optimization for low interference and throughput enhancement for 5G and 6G systems, in IEEE wireless communications and networking conference workshops (WCNCW) (2021)
S. Mandelli, A.Lieto, A. Weber, T. Wild, Power optimization and throughput enhancement in 6G networks by delayaware resource leverage, in IEEE joint European conference on networks and communications & 6G summit (EuCNC/6G Summit), pp. 176–181 (2021)
S. Park, M. Agiwal, H. Kwon, H. Jin, An evaluation methodology for spectrum usage in LTEA networks: Traffic volume and resource utilization perspective. IEEE Access 7, 67863–67873 (2019)
A. RamezaniKebrya, M. Dong, B. Liang, G. Boudreau, S.H. Seyedmehdi, Joint power optimization for devicetodevice communication in cellular networks with interference control. IEEE Trans. Wirel. Commun. 16(8), 5131–5146 (2017)
G. Miao, N. Himayat, G.Y. Li, S. Talwar, Distributed interferenceaware energyefficient power optimization. IEEE Trans. Wirel. Commun. 10(4), 1323–1333 (2011)
M.A. Wijaya, K. Fukawa, H. Suzuki, Intercellinterference cancellation and neural network transmit power optimization for MIMO channels, in IEEE 82nd vehicular technology conference (VTCFall) (2015)
R.O. Adeogun, G. Berardinelli, P.E. Mogensen, Learning to dynamically allocate radio resources in mobile 6G inx subnetworks, in IEEE international symposium on personal, indoor and mobile radio communications (PIMRC) (2021)
G. Pocovi, K.I. Pedersen, P. Mogensen, Joint link adaptation and scheduling for 5G ultrareliable lowlatency communications. IEEE Access 6, 28912–28922 (2018)
Y.S. Choi, S.M. Alamouti, A pragmatic phy abstraction technique for link adaptation and mimo switching. IEEE J. Sel. Areas Commun. 26(6), 960–971 (2008)
T.L. Jensen, S. Kant, J. Wehinger, B.H. Fleury, Fast link adaptation for mimo ofdm. IEEE Trans. Veh. Technol. 59(8), 3766–3778 (2010)
A. Belogaev, E. Khorov, A. Krasilov, D. Shmelkin, S. Tang, Conservative link adaptation for ultra reliable low latency communications, in IEEE international black sea conference on communications and networking (BlackSeaCom) (2019)
3GPP: TR 38.901. Study on channel model for frequencies from 0.5 to 100 GHz. Technical report (2020)
3GPP: TS23.501. System architecture for the 5G System (5GS). Technical specification (2020)
L. Kleinrock, Analysis of a timeshared processor. Naval Res. Logist. q. 11(1), 59–73 (1964)
S. Mandelli, M. Andrews, S. Borst, S. Klein, Satisfying Network Slicing Constraints via 5G MAC Scheduling, in IEEE conference on computer communications (INFOCOM) (2019)
3GPP: TR 36.872. Small cell enhancements for EUTRA and EUTRAN  Physical layer aspects. Technical report (2013)
3GPP: TS38.214. NR; Physical layer procedures for data. Technical specification (2020)
3GPP: TS38.212. NR; Multiplexing and channel coding. Technical specification (2020)
3GPP: Study on networkassisted interference cancellation and suppression (NAIC) for LTE. Technical report (2014)
L. Wan, S. Tsai, M. Almgren, A fadinginsensitive performance metric for a unified link quality model, in IEEE wireless communications and networking conference (WCNC) (2006)
Acknowledgements
The authors thank Paolo Baracca for the fruitful exchange when developing the initial POLITE concept and his support.
Author information
If needed, they will be added in the camera ready version.
Funding
Not applicable
Author information
Authors and Affiliations
Contributions
Silvio Mandelli and Alessandro Lieto have the main paper contribution on the ideas, simulation study and writing. Mark Razenberg contributed to the development and implementation of the most recent contribution, the LCP algorithm. Andreas Weber and Thorsten Wild supported the work with ideas and precious feedback. All authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Competing interests
Not applicable.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Mandelli, S., Lieto, A., Razenberg, M. et al. Reducing interference via link adaptation in delaycritical wireless networks. J Wireless Com Network 2022, 109 (2022). https://doi.org/10.1186/s13638022021855
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/s13638022021855