Professional Documents
Culture Documents
Abstract—The cloud radio access network (C-RAN) has be- has garnered considerable attention from both academia and
come the foundational structure for various emerging com- industry, owing to its distinctive deployment structure and
arXiv:2311.09879v1 [cs.IT] 16 Nov 2023
munication paradigms, leveraging the flexible deployment of significant commercial potential [5], [6]. On the one hand, it
distributed access points (APs) and centralized task processing.
In this paper, we propose a cross-layer optimization framework leverages cloud computing and virtualization technologies to
based on a practical finite-length coding communication system decouple the base station (BS) into the baseband unit (BBU)
in C-RAN, aiming at maximizing bandwidth efficiency while and the remote radio head (RRH). The BBU is responsible
providing statistical quality of service (QoS) for individual ser- for baseband signal processing, while the RRH focuses on
vices. Based on the theoretical results from effective capacity and signal amplification and modulation. This centralization of
finite-length coding, we formulate a joint optimization problem
involving modulation and coding schemes (MCS), retransmission computing units, combined with the distributed deployment
count, initial bandwidth allocation and AP selection, which of radio frequency (RF) units, forms the technological un-
reflects the coordinated decision of parameters across the physical derpinning for various emerging technologies, such as mobile
layer, data link layer and transport layer. To tackle such a mixed- edge computing (MEC) and coordinated multipoint (CoMP)
integer nonlinear programming (MINLP) problem, we firstly transmission [7]–[9]. On the other hand, the sharing of BBU
decompose it into a transmission parameter decision (TPD) sub-
problem and a user association (UA) sub-problem, which can pools among multiple operators through computing unit rentals
be solved by a binary search-based algorithm and an auction- presents an effective approach to reduce operational costs [6].
based algorithm respectively. Simulation results demonstrate that Considering the immense potential and the derivative ar-
the proposed model can accurately capture the impact of QoS chitectures of C-RAN, extensive research has been conducted
requirements and channel quality on the optimal transmission in recent years to propose enhanced control schemes at each
parameters. Furthermore, compared with fixed transmission pa-
rameter setting, the proposed algorithms achieve the bandwidth layer of the system. The throughput is maximized through
efficiency gain up to 27.87% under various traffic and channel joint optimization in [10]–[13], considering constraints such as
scenarios. RRH associations, transmit power and bandwidth allocation.
Index Terms—cross-layer optimization, cloud radio access In the context of green communications, the minimization of
network (C-RAN), statistical quality of service, effective capacity, transmit power or maximization of energy efficiency under
finite-length coding specific service requirements has been extensively studied in
[14]–[20]. Authors in [9], [21], [22] integrate various system
I. I NTRODUCTION benefits into utility functions to achieve joint optimization
of system performance. Nevertheless, many works primarily
T HE advent of the fifth-generation and beyond (5G/B5G)
mobile communication technology has paved the way for
emerging communication paradigms and innovative services,
focus on pursuing optimal performance based on given system
resources without considering the specific QoS requirements
such as industrial automation, virtual reality (VR), remote of individual services [9]–[11], [15], [16], [20], [23]. More-
training [1], [2]. The rapid expansion of these services is over, other optimization efforts that take into account traffic
in turn providing a fertile ground for further advancements characteristics have not fully characterized the utilization of
in radio technology, driven by the escalating demand for en- underlying resources [21], [22]. In addition, the majority
hanced connectivity. As the crucial “last mile” of data delivery, of studies make decisions on user scheduling and power,
the radio access network (RAN) assumes critical significance bandwidth, and computational resource allocation based on
in meeting the stringent requirements of these services [3], ideal infinite-length channel codes, where Shannon capacity
particularly when operating alongside ultra-high-speed wired is considered as the actual throughput of users [9]–[17], [20],
links, thus circumventing the limitations imposed by user [21], [23]. Only a few references consider practical finite-
cables. Consequently, novel radio technologies and network length coding communication schemes and the associated bit
paradigms have been developed, such as massive multiple- error rate [18], [19], [22], but in-depth analyses are lacking
input-multiple-output (massive MIMO) and user-centric net- [18], [19]. Remarkably, performance analyses based on Shan-
works (UCN) [4]. Among them, the 5G cloud RAN (C-RAN) non capacity not only overestimate the actual performance of
communication systems but also lack analysis of the impact
Chang Wu, Hancheng Lu, Yuang Chen and Langtian Qin are with
CAS Key Laboratory of Wireless-Optical Communications, University of transmission parameters on service performance in finite-
of Science and Technology of China, Hefei 230027, China (e- length channel coding communication, which is the obstacle
mail: changwu@mail.ustc.edu.cn; hclu@ustc.edu.cn; {yuangchen21, we aim to overcome in this work.
qlt315}@mail.ustc.edu.cn). Hancheng Lu is also with Institute of Artificial
Intelligence, Hefei Comprehensive National Science Center, Hefei 230088, Aforementioned researches only optimize the transmission
China. in one or two layers of the system, which has natural lim-
2
The media access control (MAC) scheduler in CU allocates violating time domain to the total service data when the slot
a certain amount of transmission opportunities to the data length is sufficiently large [31], [32].
queues in the RLC queue based on the connection between Based on the above analysis, the service process of the
APs and users during each scheduling cycle. As a result, system across different slot is uncorrelated. Therefore, the
data units are read from the queue header and assembled effective capacity of the service system for user n can be
into a transmission block (TB) for transmission, and ARQ are represented as [31]
applied to improve the robustness of the delivery. The radio 1 n s
o
air-port delay of the data consists of the queuing delay in ECn (θn ) = − s
ln Eγ e−θn T ωn [t] , (3)
θn T
the RLC queue, the link transmission delay from CU to APs, where Eγ {·} indicates the statistical average of inner argu-
and the service delay at the AP. Among them, the queuing ments with respect to service rate, and θn ≥ 0 is the latency
delay caused by the mismatch between the arrival rate and exponent of the nth user, which indicates the tolerance of a
the service rate, as well as the the service delay (including satisfactory system to the occurrence of delay violations. Ac-
transmission and retransmission delay) dominates the air-port cording to [32], ECn (θn ) is a monotonic descending function
delay, which are performance requirements we need to meet with respect to θn when the service process of the system
in this work. In order to fulfill the low-latency requirement ωn [t] is determined. Therefore, the system does not guaran-
of real-time data flows and the distortion limitation caused by tee the LVP when the effective capacity gets the maximum
data loss, it is necessary to study the collaborative optimization value ECn (θn = 0) = Eγ {ωn [t]}, and ECn (θn = ∞) = 0
of UA and the parameter configuration of APs. indicates that the system cannot tolerate any possible delay vi-
olations, resulting in zero capacity. The gap between ECn (θn )
B. Service Model and the provided capacity provides a delay violation guarantee
with parameter θn . In other words, the effective capacity
The wireless channels between users and APs are charac- provides the maximum supported source rate for a given
terized as block fading, implying that the channel response service rate under the delay violation probability guarantee
remains constant in the duration of each fading block, assum- characterized by parameter θn . When the source rate satisfies
ing a slot with length T s, and varies randomly across different λn = ECn (θn ), the probability of violation of the delay
fading blocks. With a constant arrival rate λn , we define the threshold can be approximated as
data arrival process of user n during [0, t) as An (t) = λn ·t. Let q,th
[t] denote the t-th slot and (t) denote the moment t. Similarly, Pr Dnq > Dnq,th ≈ ϕn · e−θn λn Dn , (4)
the cumulative service process provided by the C-RAN system where ϕn is the non-empty probability of the queue that
for user n is represented as can be approximated as ϕn ≈ Eγ {ω λn
< 1, and Dnq is a
n [t]}
random variable representing the steady-state queuing delay
Sen (t) = Sn (t − t%T s ) + (t%T s ) ωn [t/T s + 1] , (1)
experienced by the data of user n before it is served.
where operator % denotes modulo operation, and ωn [t] is the
C. Modulation and Channel Coding Model
average service rate that the system could provide for user n in
the t-th slot, which may be greater than the rate required. So Considering the gap between the theoretical Shannon rate
the actual service
n process accepted
o by user n is represented as and the actual performance [33], [34], with the coefficient
Sn (t) = min Sen (t), An (t) . With the average service rate ̺ = −2 ln (5 · ρ) /3, the relationship between the maximum
available spectral efficiency and the signal-to-interference-
ωm,n [t] provided by AP m ∈ M for user n at slot t, the total
noise-ratio (SINR) of the channel can be expressed as υ̂ =
service rate can be represented as
log2 (1 + γ/̺), where SINR γ is the unique parameter used
X
ωn [t] = am,n ωm,n [t], (2) to describe channel quality in this article. Therefore, we select
m∈M the highest MCS index under the allowed BER ρ, with the
MCS switching threshold being represented as [34]
where am,n is UA indicator regarding the AP m and the user
2
n. In particular, am,n = 1 when the nth user is associated γj = (1 − 2υj ) ln (5 · ρ) , j ∈ {0, 1, · · · , J} , (5)
3
with the mth AP, and am,n = 0 otherwise.
where υj is the spectral efficiency when MCS j is selected.
Due to the diversity of QoS requirements for different traffic
And J is the maximum MCS index that can be selected, so
flows, such as latency and data loss rate, as well as the varying
we have γJ+1 = +∞. Meanwhile, the actual BER can be
degree of importance for the same content by different users,
calculated through channel SINR and selected MCS, which
we can flexibly adjust the service process provided for each
can be represented as
service flow according to its characteristics. By doing so, we
can maximize the bandwidth efficiency of the entire system 1 1.5 · γ
P b(j, γ) = exp − υj . (6)
within its acceptable QoS loss constraint. We assume that 5 2 −1
the maximum tolerable queuing delay for user n is Dnq,th . We adopt Rayleigh channel model to describe γ statistically.
The scheduler will discard the part of the queue that exceeds The SINR γ for each fading block is thus a random variable
the delay threshold, with a maximum allowable queue length with a probability density function (pdf):
q,th
Qth
n = λn Dn . Research shows that the LVP of user n can be 1 γ
represented as the ratio of the amount of data served in the pγ (γ) = e− γ̄ , (7)
γ̄
4
where γ̄ = Eγ [γ] is the average SINR related to the distance initial transmission. Hence, for the new data transmitted by AP
between APs and users. m to user n within a slot, the number of RBs required for the
x
In NR systems, data stored in RLC service data unit (SDU) xth transmission can be computed as rm,n = rm,n (P̄m,n )x−1 .
format is encapsulated, segmented, and assembled into TBs Finally, the average number of RBs consumed by AP m for
when the MAC scheduler notifies the queue of a transmission user n in cumulative Xn transmissions can be expressed as
opportunity. Then, the oversized TB will be divided into n −1
XX
smaller code blocks in the channel coding process. Code x
Rm,n = rm,n · P̄m,n
blocks have the same size due to the appropriate TB size x=0
Xn (10)
design [24], which are the basic unit of channel coding and
1 − P̄m,n
rate matching. With the maximum code block size L (bit) = rm,n · .
and AMC-induced BER Pb , per-transmission block error rate 1 − P̄m,n
L
(BLER) can be calculated as P (j, γ) = 1 − [1 − P b(j, γ)] . The average RB number that AP m consumes for data transfer
For the ergodic channel, the average BLER at the physical in the t-th slot (t is large enough to be stable) can be calculated
layer can be calculated as as
J Z
X
1 X γj+1 Rm [t] = am,n rm,n [t]
P̄ = P (j, γ) pγ (γ) dγ
PT j=0 γj n∈N
(8) X n −1
XX
J Z
Xn −x
1 X γj+1 h L
i + am,n rm,n t−x · T RTT · P̄m,n
= 1−[1−P b(j, γ)] pγ (γ) dγ, n∈N x=1
PT j=0 γj
X X n −1
XX
R +∞ x
where PT = γ0 pγ (γ) dγ is the probability that the channel ≈ am,n rm,n [t]+ am,n rm,n [t]· P̄m,n
n∈N n∈N x=1
has no deep fading and at least one MCS mode is available
X n −1
XX
[35]. By utilizing X transmissions of code blocks by ARQ, the x
actual BLER at the link layer can be calculated as P tr = P̄ X . = am,n rm,n [t] · P̄m,n
n∈N x=0
Furthermore, we assume that the block can be successfully X
decoded when the actual BLER falls below threshold ε0 due = am,n Rm,n [t],
to the cooperation with forward error correction (FEC) coding n∈N
(11)
[36]–[38].
where T RTT denotes the static delay from one transmission
to obtaining the feedback, including propagation delay and
D. Problem Formulation processing delay. The approximation is reasonable due to
For simplicity, orthogonal frequency division multiplexing similar RB consumption in close slots and less amount of
(OFDM) is adopted between APs and users to avoid interfer- retransmissions. In summary, the total bandwidth consumed
ence, which indicates that the SINR in the previous text can be by the C-RAN system in slot t can be calculated as
replaced by signal-to-noise-ratio (SNR). The scheduling slot
αβScs X X
period T s is obtained while selecting the subcarrier spacing B[t] = am,n Rm,n [t]. (12)
according to the numerology. According to the NR system, βs
m∈M n∈N
the resource block (RB) is the basic unit for wireless resource The service delay due to Xn transmission can be expressed
allocation, and any number of RBs not exceeding the total as
resources of system can be allocated for each transmission.
Dns (Xn ) = Xn · T s + T RTT . (13)
We assume that each RB contains α subcarrier and β OFDM
symbols with spectral efficiency υj in the C-RAN system, We aim to optimize the bandwidth efficiency by parameter
then the amount of information that can be transmitted by configurations in each AP and proper UA decision under the
an RB in MCS j mode can be expressed as ψj = αβυj . constraints of delay and loss QoS requirements. Then the
If rm,n RBs are assigned by AP m to user n for the first problem can be formulated as
transmission, the bandwidth consumption can be calculated as X X
Bm,n = αβrm,n Scs /βs , where Scs is the subcarrier spacing min am,n Rm,n (14a)
{rm,n },{θn },{am,n }
m∈M n∈N
related to numerology and βs is the number of data symbol in {ρm,n },{Xn }
one slot. Therefore, with the service rate ωm,n = rm,n ψj /T s, s.t. Pr Dnq > Dnq,th ≤ εn , ∀n ∈ N (14b)
the effective capacity of user n in (3) can be reinterpreted as ECn (θn ) = λn , ∀n ∈ N (14c)
1 Dns + Dnq,th ≤ Dnth , ∀n ∈ N
ECn (θn ) = − ln Eγ {exp (−θn T sωn )} (14d)
θn T s ( !) Xn
X P̄m,n ≤ ε0 , ∀n ∈ N , ∀m ∈ M (14e)
1 X
=− ln Eγ exp −θn ψ am,n rm,n . am,n ≤ 1, ∀n ∈ N (14f)
θn T s
m∈M
m∈M
(9) X
For each time slot, it is assumed that the error block is am,n ≥ 1, ∀m ∈ M (14g)
retransmitted with the same AP and parameters used for the n∈N
5
s
where (14f) and (14g) are UA constraints implying that each On the one hand, with an increased service latency Dm,n ,
user can be served by at most one AP and each AP serves at a greater number of transmissions can be employed, thereby
least one user, on the assumption that N ≥ M . It is worth enabling the establishment of a larger BER threshold, as
noting that the assumptions in (14f) and (14g) controls the outlined by Eq. (13) and the Theorem 1 below. On the other
q,th
complexity of the cross-layer optimization problem, which hand, a relaxed queuing delay threshold Dm,n can alleviate
will be further elaborated upon in subsequent sections of this the impact of RB resources on LVP constraints, in accordance
paper. Based on effective capacity theory, the constraints (14b) with Eq. (15b). Both avenues contribute to a reduction in RB
- (14d) implement statistical delay and loss QoS provision consumption. Consequently, it can be deduced that the optimal
for applications with different source rate requirements. The solution is assured when the condition set forth by Eq. (15d)
(14e) represents the BLER constraint of successful decoding, are satisfied as equality constraint. Furthermore, we obtain
concurrently exerting a direct influence upon the transmission from [32, Lemma 2, Theorem 1] that if the problem P1 is
latency by means of the transmission count. feasible, the inequality expressed as
∗ λm,n T s
III. P ROBLEM S OLUTION λm,n T s < Eγ rm,n ψ ρ∗m,n < (16)
εn
The problem (14) is a mixed-integer non-linear program- holds in the optimal solution and constraint (15b) satisfy
ming problem, indicating that its direct solution is typically equality. Therefore, We can obtain the relational expression
challenging. Due to the fact that the optimal parameters are of θm,n with respect to rm,n , ρm,n and Xm,n by limiting
determined solely by the user with specified QoS requirements (15b) and (15d) to equality, which can be calculated as
and the selected AP, the problem described in (14) can be
decomposed into two sub-problems, i.e., the TPD problem and (15b) 1 εn Eγ [rm,n ψ]
θm,n = − q,th
ln
UA problem, which can be addressed in sequence. First, we λm,n Dm,n λm,n T s
design the optimal transmission parameters for each potential
(15d) 1 εn Eγ [rm,n ψ]
AP-user pair in Sec. III-A to minimize the consumption of =− ln .
λm,n [Dnth −Xm,n ·(T s +T RTT)] λm,n T s
bandwidth resources while ensuring the QoS requirements of (17)
the users. Subsequently, we optimize the UA pattern based on Due to the finite set of integer variable values, P1 can be
the UA constraints and the optimal TPD for all possible pairs reformulated into a problem dependent upon θm,n and ρm,n
in Sec. III-B. by prescribing specific values for Xm,n and rm,n . Thus, with
ec
fixed rm,n and Xm,n , as well as Fm,n (ρm,n ) defined as
A. Parameter Configuration for Each AP-User Pair 1
ec
Fm,n (ρm,n ) = − ln Eγ e−θm,n rm,n ψ , (18)
Consider a particular AP-user pair of the mth AP (m ∈ M) θm,n Ts
and the nth user (n ∈ N ), which implies that the number of
allocated RBs and the maximum tolerable queuing delay of the problem P1 can be transformed into a BER threshold
user n only depends on the parameter configuration of AP configuration problem that is represented as
m. We first search for the optimum parameters configuration P2 : min Rm,n (ρm,n ) (19a)
for users across all potential APs, so that the AP consumes ρm,n
ec
the minimum amount of RBs while concurrently adhering to s.t. Fm,n (ρm,n ) = λm,n (19b)
the constraints of the source rate and QoS. This forms sub- λm,n T s
problem P1, the optimal solution of which is also the optimal λm,n T s < Eγ [rm,n ψ] < (19c)
εn
parameter configuration after the UA algorithm has made its Xm,n
P̄m,n (ρm,n ) ≤ ε0 (19d)
decision on the APs. Sub-problem P1 can be represented as
s
Rm,n (ρm,n ) ≤ R , (19e)
P1 : min Rm,n (rm,n , θm,n , ρm,n , Xm,n ) (15a)
{rm,n },{θm,n }
{ρm,n },{Xm,n }
where Rs denotes the total number of RBs in one slot and the
constraint (19c) obtained from (16) further limits θm,n > 0.
λm,n T s q,th
s.t. e−θm,n λm,n Dm,n ≤ εn (15b) According to the definition of spectrum efficiency υj and
Eγ [rm,n ψ]
average BLER P̄ , we present two properties of the optimal
1
− s
ln Eγ e−θm,n rm,n ψ = λm,n (15c) solution of problem P2, in what follows by Theorem 1
θm,n T and Theorem 2, proved in Appendix A and Appendix B
s q,th
Dm,n + Dm,n ≤ Dnth (15d) respectively.
Xm,n
P̄m,n ≤ ε0 . (15e) Theorem 1. Based on the calculation of BER in (6) and the
definition of spectrum efficiency [24] for each MCS mode in
It is worth noting that the utilization of subscripts (m, n)
NR, the average BLER P̄ (ρ) is monotonically increasing with
instead of (n) in this section serves the sole purpose of
BER threshold ρ for ρ > 0 when the distribution and average
indicating that the parameter configuration for user n remains
quality of channel are determined.
valid exclusively within the context of the mth AP. Finally,
ec
we obtain an nonlinear programming problem with optimal Theorem 2. If constraint (19c) holds, the Fm,n (ρm,n ) is
∗ ∗
solution rm,n , θm,n , ρ∗m,n , Xm,n
∗
. monotonically increasing with ρm,n for ρm,n > 0.
6
From the proof of Theorem 2, we also know that the Algorithm 1: Solution Procedure for Problem P1
expectation of the amount of information per RB Eγ [ψ] can using Binary Search
be calculated as Input: Minimum and maximum value ⊙min , ⊙max of
J Z
1 X γj+1 (ρ) ρm,n and Xm,n , Average SNR γ̄m,n ,
Eγ [ψ] = ψj · pγ (γ) dγ Traffic arrival rate λm,n , Total latency Dnth ,
PT j=0 γj (ρ)
(20) Decoding BLER threshold ε0 , LVP εn ,
J Z
1 X γj+1 (ρ) Total number of RBs for system Rs
= α · β · υj · pγ (γ) dγ, Output: The
PT j=0 γj (ρ) ∗ optimal parameter configuration
rm,n , ρ∗m,n , Xm,n ∗
for AP m and user n
which is monotonically increasing with ρm,n . Therefore, we ∗
1 Let the optimal value Rm,n = +∞,
can find the optimal solution ρ∗m,n corresponding to each AP- 2 Set error tolerance ǫ;
user pair by binary search. The θm,n is first calculated by max
3 for Xm,n = 1 to Xm,n do
(17), where Eγ [ψ] can be obtained by (20), and the effective q,th
4 Calculate Dm,n by (13) and (15d);
capacity in (18) can be rewritten as 5 for rm,n = 1 to Rs do
∗
1 6 if rm,n > Rm,n then
ec
Fm,n (ρm,n ) = − s
ln Eγ e−θm,n rm,n ψj break;
θ T 7
m,n 8 end
J Z
1 1 X γj+1 (ρm,n ) −θm,nrm,n ψj 9 if Fm,nec
(ρmax ) ≥ λm,n then
=− ln e p γ(γ)dγ .
θm,n T s PT γj (ρm,n )
j=0
10 Set ρmin
m,n = ρ
min
and ρmaxm,n = ρ
max
;
(21) 11 repeat
For each AP-user pair, the optimal solution to problem P1 12 ρm,n = ρmax min
m,n + ρm,n /2 ;
ec
can be obtained by solving problem P2 for all feasible 13 if Fm,n (ρm,n ) < λm,n then
transmission count and RB quantities. The proposed com- 14 ρmin
m,n = ρm,n ;
prehensive optimization solution is summarized in Algorithm 15 else
1, encompassing the procedure for solving problem P2. It is 16 ρmax
m,n = ρm,n ;
worth noting that a necessary condition to ensure the feasibility 17 end
of problem P2 is Fm,n ec
ρmax
m,n ≥ λm,n , as Fm,n ec
(ρm,n ) 18 until |ρmax min
m,n − ρm,n | ≤ ǫ;
increases monotonically with ρm,n . 19 if constraints (19c)-(19e) are satisfied &
∗
Rm,n > Rm,n (rm,n , ρm,n , Xm,n ) then
∗
B. UA Decision 20 R
m,n = Rm,n (rm,n , ρm,n , Xm,n );
∗
21 rm,n ,ρ∗m,n ,Xm,n
∗
= {rm,n ,ρm,n ,Xm,n};
In this section, the UA decisions for users are studied
∗ 22 end
based on the minimum bandwidth consumption Rm,n for each
23 end
AP-user pair obtained from section III-A, with the aim of
24 end
minimizing the bandwidth cost of the system. Given fixed
25 end ∗
transmission parameters, the problem can be formulated as ∗
26 return Rm,n , and rm,n ,ρ∗m,n ,Xm,n
∗
if it exists.
an asymmetric multi-assignment problem as follows
X X
∗
P3 : min am,n Rm,n (22a)
am,n
m∈M n∈N transform the problem P3 into a minimum cost flow problem
X
s.t. am,n = 1, ∀n ∈ N (22b) by introducing a supersource node e connected to each AP,
m∈M which can be represented as
X
am,n ≥ 1, ∀m ∈ M (22c) X X
∗
min Rm,n am,n (23a)
n∈N am,n
m∈M n∈N
am,n ∈ {0, 1} , ∀(m, n) ∈ A, (22d) X
s.t. am,n − ae,m = 1, ∀m ∈ M (23b)
where A represents the set of all AP-user pairs and the n∈N
condition in (14f) is converted to an equality constraint due X
∗
ae,m = N − M, ae,m ≥ 0, ∀m ∈ M (23c)
to positive resource rate. Bandwidth consumption Rm,n can m∈M
be viewed as the cost paid by AP m to satisfy the QoS X
constraints of user n at the source rate λn , thus the objective am,n = 1, ∀n ∈ N , am,n ≥ 0, ∀(m, n) ∈ A,
m∈M
function is the total system cost. We define S as a subset of
(23d)
A, consisting of paired AP-user pairs (m, n). Due to the UA
constraints (22b) and (22c), each AP m is a part of at least where am,n is extended to include the supersource node e
one pair (m, n) ∈ S and each user n is a part of only one pair and the constraint (23b) implies that each AP generates one
(m, n) ∈ S. By setting am,n = 1 if (m, n) ∈ S and am,n = 0 unit flow. Restriction (23c) means that the number of streams
otherwise, we can obtain a feasible assignment S of problem generated by the supersource node and AP is equal to the
P3. Based on network optimization theory [39], [40], we can number of users, and (23d) restricts each user to request one
7
50 10-6 10-3
1.6
9 1.4
40
Average BLER
8
30 1
0.8
20 7
0.6
0.4
10 6
0.2
0 5 0
5 10 15 20 25 30 35 5 10 15 20 25 30 35 0 5 10 15 20 25 30 35
Source Rate (Mbps) Source Rate (Mbps)
(a) bandwidth consumption (b) optimal BER threshold (c) BLER of practical FC system
Fig. 3. Bandwidth consumption and optimal BER threshold selection varying with the source data rate under different average channel quality, where the
th = 6 ms, the delay violation probability ε = 10−5 and the decoding BLER threshold ε = 10−3 .
total latency budget Dn n 0
35 10-3 6 5.5
10-4 4
20 4
3 3 3 3 3 3
3
15 3.5
2
10-5 2
10 3
1 1
5 1 2.5
0 10 -6 0 2
4 6 8 10 12 14 16 18 20 4 6 8 10 12 14 16 18 20 10-5 10-4 10-3
Total Latency (ms) Total Latency (ms) BER Threshold
(a) bandwidth consumption (b) optimal BER threshold and number of transfers (c) Spectrum Efficiency of practical FC system
Fig. 4. Bandwidth consumption, the optimal BER threshold selection and the corresponding optimal number of transmissions varying with the total latency
budget under different average channel quality, where the source data rate λ = 20 Mbps, the LVP εn = 10−5 and the decoding BLER threshold ε0 = 10−3 .
Bandwidth (MHz)
higher queuing delay results in greater bandwidth savings, 20
surpassing the effect achieved by higher spectral efficiency due
15
to increased BER thresholds caused by retransmissions. As the
total latency constraint is moderately relaxed (6 ≤ Dth ≤ 10 10
ms), the more efficient bandwidth utilization brought about
by the increase in BER threshold provides a greater con- 5
tribution to bandwidth savings. Consequently, the maximum
0
transmission count increases to adopt a higher BER threshold, 10-7 10-6 10-5 10-4 10-3 10-2
thereby enhancing bandwidth efficiency at the expense of a LVP
reduced tolerable queuing delay. The enhancement effect of (a) bandwidth consumption
3
increasing the BER threshold on spectral efficiency is not
always prominent but gradually diminishes, as illustrated in 2.5
-4
10
relaxed (Dth ≥ 10 ms), tolerating higher queuing latency 2
once again becomes the primary contributor to our objective.
Consequently, the decision to maintain a constant transmission 1.5
count and BER threshold is made again.
1
Fig. 5 illustrates the bandwidth consumption and optimal
transmission parameters under various channel conditions,
10-5 0.5
affected by different LVP constraints, when serving the same
source rate with an identical overall delay budget and de- 0
coding BLER threshold. Consistent with our analysis, the 10-7 10-6 10-5 10-4 10-3 10-2
required bandwidth monotonically decreases with LVP, and LVP
(b) optimal BER threshold and number of transfers
the difference in bandwidth demand for different LVPs is more
pronounced under poorer channel conditions, as illustrated Fig. 5. Bandwidth consumption, the optimal BER threshold selection and
the corresponding optimal number of transmissions varying with the LVP
in Fig. 5(a). When services with strict LVP requirements under different average channel quality, where the source data rate λ = 20
(εn ≤ 2·10−4 ) are requested, fewer transmissions are adopted, Mbps, the total latency budget D th = 6 ms and the decoding BLER threshold
resulting in a larger available queuing delay, which alleviates ε0 = 10−3 .
bandwidth consumption of the strict LVP. For services with
relaxed LVP requirements, our algorithm transfers part of the
queuing latency budget to the transmission latency budget, under the same channel conditions and source rate requests
which enables a higher BER threshold to improve the spectral decreases monotonically with decoding BLER and LVP. How-
efficiency, as evidenced by the increased resource savings ever, there are differences in the impact of decoding BLER
(εn > 2 · 10−4 ) in Fig. 5(a). The reason is that a higher BER requirements and LVP constraints on optimal parameter se-
threshold saves more bandwidth than a larger queuing delay lection. The abrupt change in the optimal BER threshold
budget under more relaxed LVP constraints. along the LVP axis in Fig. 6(b) is attributed to the adjustment
The joint effects of decoding BLER requirements and LVP decision of the optimal transmission from two to three. Un-
constraints on optimal bandwidth consumption and optimal like the continuous variation of transmission parameters with
parameter selection are elucidated in Fig. 6(a) and Fig. 6(b), decoding BLER requirements, the optimal BER threshold and
respectively. It is evident that the bandwidth consumption transmission times selection do not change with LVP until the
10
20
27.87%
Bandwidth (MHz)
15 3.5
10
2.5
2
20 21 22 23 24 25
5
5 10 15 20 25
SNR (dB)
(a) bandwidth consumption (a) eMBB traffic
12
10 18.51%
Bandwidth (MHz)
8 2
1.8
6 1.6
1.4
1.2
4
1
19 20 21 22 23 24 25
0
5 10 15 20 25
SNR (dB)
(b) optimal BER threshold (b) uRLLC traffic
Fig. 6. Bandwidth consumption, the optimal BER threshold selection varying Fig. 7. Bandwidth consumption for ablation experiment under different
with the LVP and the BLER requirements, where the source data rate λ = 20 channel qualities for eMBB and uRLLC traffic scenario, respectively.
Mbps, the total latency budget D th = 10 ms and the channel average SNR
γ̄ = 18 dB.
11 7
5
10 6
18.09%
4
9
Bandwidth (MHz)
Bandwidth (Mbps)
8 4 3
10 10.5 11 11.5 12
7
2
6 proposed+AA
proposed+BC
fixed ρ1+AA
1 fixed ρ2+AA
5 18.72%
fixed X 1+AA
fixed X 2+AA
4 0
10 12 14 16 18 20 eMBB uRLLC (3X)
Source Rate (Mbps) Traffic Type
(a) Bandwidth vs. source rate of eMBB
0.85
Fig. 9. Comparison of joint performance of TPD algorithms and AP selection
algorithms in different traffic scenarios.
0.8
Bandwidth (MHz)
P ROOF OF T HEOREM 1 when MCS is fixed to j and the P b• (j, γ) curve moves
The MCS selection scheme we adopt for the system is de- distance △γj in the positive direction of γ, we can get
fined in [24, Table 5.1.3.1-2], which implies that the available P b• (j, γ− △γj ) > P b◦ (j, γ) , γ ∈ [γj◦ , γj+1
•
). (31)
spectrum efficiency υj is monotonically increasing with the
MCS index j, that is, υj+1 > υj with a definite ρ. In addition, In addition, we already know that P decreases monotonically
there is υj > 0 and 5 · ρ ≪ 1 due to definition and realistic with respect to γ with fixed MCS, so we have
characteristics respectively. So we have
•
P b• j, γj+1 > P b◦ (j, γ) , γ ∈ [γj+1
• ◦
, γj+1 ). (32)
γj+1 > γj , ∀j ∈ {0, 1, · · · , J} , (26) Based on (31) and (32), we can conclude that
when ρ is fixed and Z γj+1
•
1
• P (j, γ) pγ (γ) dγ
γj (ρ• ) < γj (ρ◦ ) , ρ• > ρ◦ , 0 < ρ ≪ 1. (27) PT,j γj•
Z γj+1
◦
Similarly, we can conclude that P b (j, γ) and thus P (j, γ) 1
> ◦ P (j, γ) pγ (γ) dγ, ∀j ∈ {0, 1, · · · , J} ,
decrease monotonically with γ under same MCS j. We im- PT,j γj◦
plement the following proofs based on the determined channel Rγ (33)
distribution with a fixed average SNR γ̄. We study the function where PT,j = γjj+1 pγ (γ) dγ denotes the probability of
Fγ (j, γ) with respect to the MCS j and BER threshold ρ, adopting MCS mode j. By summing the two sides of the (33)
which is defined as for j ∈ {0, 1, · · · , J}, we can obtain
Fγ (j, ρ) = γj+1 (ρ) − γj (ρ) X J Z γj+1
•
1
2 (28) P (j, γ) pγ (γ) dγ
= (2υj − 2υj+1 ) ln (5 · ρ) . P•
j=0 T,j γj
•
3 (34)
X J Z γj+1
◦
Due to υj+1 > υj , we can conclude that Fγ (j, γ) decreases 1
> P (j, γ) pγ (γ) dγ.
monotonically with ρ when MCS fixes, which will be used P◦
j=0 T,j γj
◦
later.
First, we take a value ρ◦ and get the switching threshold γj◦ The above formula can be rephrased as
of MCS mode based on (5). And the BLER P̄ (ρ◦ ) can also J Z •
1 X γj+1
be calculated by (6)-(8), given by P (j, γ) pγ (γ) dγ
J Z ◦ PT• j=0 γj•
1 X γj+1 (35)
P̄ (ρ◦ ) = ◦ P (j, γ) pγ (γ) dγ J Z ◦
PT j=0 γj◦ 1 X γj+1
(29) > ◦ P (j, γ) pγ (γ) dγ,
J Z ◦ PT j=0 γj◦
1 X γj+1 h L
i
= ◦ 1−[1−P b(j, γ)] pγ (γ) dγ,
PT j=0 γj◦ which completes the proof by P̄ (ρ• ) > P̄ (ρ◦ ).
R +∞
where PT◦ = γ ◦ pγ (γ) dγ is the probability that at least
0 A PPENDIX B
one MCS mode is available with BER threshold ρ◦ . Then,
P ROOF OF T HEOREM 2
we slightly increase the BER threshold to ρ• = ρ◦ + ǫ with
0 < ǫ ≪ 1 and consider corresponding BLER P̄ (ρ•) with To prove this theorem, it is sufficient to demonstrate the
switching threshold γj (ρ• ), denoted by γj• for simplicity, monotonicity of functions ψj (ρ) and θ (ρ) with respect to ρ.
and probability PT• . It’s not difficult to obtain γj• < γj◦ by First, the average information per RB Eγ [ψ] in the ergodic
channel can be calculated as
(27), and thus we can conclude P j, γj > P j, γj◦ for
•
J Z
∀j ∈ {0, 1, · · · , J}, where P (j, γj ) denotes the BLER with 1 X γj+1
MCS j at switching threshold γj . In addition, we define the Eγ [ψ] = ψj · pγ (γ) dγ
PT j=0 γj
difference of MCS switching threshold between two BER (36)
J Z
thresholds under the same MCS as △γj = γj◦ − γj• , so we 1 X γj+1
have = α · β · υj · pγ (γ) dγ,
PT j=0 γj
◦ •
△γj+1 − △γj = γj+1 − γj+1 − γj◦ − γj•
where the definition of PT is consistent with the body. Similar
= [γj+1 (ρ◦ ) − γj (ρ◦ )] − [γj+1 (ρ• ) − γj (ρ• )] to (31) and (32) in the proof of property 1, we have υj+1 •
>
(28) ◦ • ◦ • ◦ ◦ •
= Fγ (j, ρ◦ ) − Fγ (j, ρ• ) . υj for γ ∈ [γj , γj ] and υj+1 = υj+1 for γ ∈ [γj+1 , γj+2 ].
(30) Therefore, Eγ [ψ] is increasing with BER threshold ρ since
We can then obtain △γj+1 − △γj > 0 from the monotonicity average spectrum efficiency Eγ [υ] increases with ρ.
of the Fγ (j, ρ) with respect to ρ, which implies that the From the expression of θ (ρ) in (17), we can obtain that
difference of MCS switching thresholds corresponding to the θ (ρ) decreases monotonically with ρ if (16) holds. Further,
two BER thresholds increases monotonously with the MCS since the effective capacity in (18) is increasing with ρ due to
index j. similar reason with Eγ [υ], we can conclude that Fm,n (ρm,n )
With MCS j, P b (j, γ) defined in [γj , γj+1 ) takes the same is monotonically increasing with ρm,n , which completes the
value as P b (j, γ−△) defined in [γj +△, γj+1 +△). Therefore, proof.
13