You are on page 1of 13

1

Cross-Layer Optimization for Statistical QoS


Provision in C-RAN with Finite-Length Coding
Chang Wu, Hancheng Lu, Senior Member, IEEE, Yuang Chen, Student Member, IEEE, and Langtian Qin

Abstract—The cloud radio access network (C-RAN) has be- has garnered considerable attention from both academia and
come the foundational structure for various emerging com- industry, owing to its distinctive deployment structure and
arXiv:2311.09879v1 [cs.IT] 16 Nov 2023

munication paradigms, leveraging the flexible deployment of significant commercial potential [5], [6]. On the one hand, it
distributed access points (APs) and centralized task processing.
In this paper, we propose a cross-layer optimization framework leverages cloud computing and virtualization technologies to
based on a practical finite-length coding communication system decouple the base station (BS) into the baseband unit (BBU)
in C-RAN, aiming at maximizing bandwidth efficiency while and the remote radio head (RRH). The BBU is responsible
providing statistical quality of service (QoS) for individual ser- for baseband signal processing, while the RRH focuses on
vices. Based on the theoretical results from effective capacity and signal amplification and modulation. This centralization of
finite-length coding, we formulate a joint optimization problem
involving modulation and coding schemes (MCS), retransmission computing units, combined with the distributed deployment
count, initial bandwidth allocation and AP selection, which of radio frequency (RF) units, forms the technological un-
reflects the coordinated decision of parameters across the physical derpinning for various emerging technologies, such as mobile
layer, data link layer and transport layer. To tackle such a mixed- edge computing (MEC) and coordinated multipoint (CoMP)
integer nonlinear programming (MINLP) problem, we firstly transmission [7]–[9]. On the other hand, the sharing of BBU
decompose it into a transmission parameter decision (TPD) sub-
problem and a user association (UA) sub-problem, which can pools among multiple operators through computing unit rentals
be solved by a binary search-based algorithm and an auction- presents an effective approach to reduce operational costs [6].
based algorithm respectively. Simulation results demonstrate that Considering the immense potential and the derivative ar-
the proposed model can accurately capture the impact of QoS chitectures of C-RAN, extensive research has been conducted
requirements and channel quality on the optimal transmission in recent years to propose enhanced control schemes at each
parameters. Furthermore, compared with fixed transmission pa-
rameter setting, the proposed algorithms achieve the bandwidth layer of the system. The throughput is maximized through
efficiency gain up to 27.87% under various traffic and channel joint optimization in [10]–[13], considering constraints such as
scenarios. RRH associations, transmit power and bandwidth allocation.
Index Terms—cross-layer optimization, cloud radio access In the context of green communications, the minimization of
network (C-RAN), statistical quality of service, effective capacity, transmit power or maximization of energy efficiency under
finite-length coding specific service requirements has been extensively studied in
[14]–[20]. Authors in [9], [21], [22] integrate various system
I. I NTRODUCTION benefits into utility functions to achieve joint optimization
of system performance. Nevertheless, many works primarily
T HE advent of the fifth-generation and beyond (5G/B5G)
mobile communication technology has paved the way for
emerging communication paradigms and innovative services,
focus on pursuing optimal performance based on given system
resources without considering the specific QoS requirements
such as industrial automation, virtual reality (VR), remote of individual services [9]–[11], [15], [16], [20], [23]. More-
training [1], [2]. The rapid expansion of these services is over, other optimization efforts that take into account traffic
in turn providing a fertile ground for further advancements characteristics have not fully characterized the utilization of
in radio technology, driven by the escalating demand for en- underlying resources [21], [22]. In addition, the majority
hanced connectivity. As the crucial “last mile” of data delivery, of studies make decisions on user scheduling and power,
the radio access network (RAN) assumes critical significance bandwidth, and computational resource allocation based on
in meeting the stringent requirements of these services [3], ideal infinite-length channel codes, where Shannon capacity
particularly when operating alongside ultra-high-speed wired is considered as the actual throughput of users [9]–[17], [20],
links, thus circumventing the limitations imposed by user [21], [23]. Only a few references consider practical finite-
cables. Consequently, novel radio technologies and network length coding communication schemes and the associated bit
paradigms have been developed, such as massive multiple- error rate [18], [19], [22], but in-depth analyses are lacking
input-multiple-output (massive MIMO) and user-centric net- [18], [19]. Remarkably, performance analyses based on Shan-
works (UCN) [4]. Among them, the 5G cloud RAN (C-RAN) non capacity not only overestimate the actual performance of
communication systems but also lack analysis of the impact
Chang Wu, Hancheng Lu, Yuang Chen and Langtian Qin are with
CAS Key Laboratory of Wireless-Optical Communications, University of transmission parameters on service performance in finite-
of Science and Technology of China, Hefei 230027, China (e- length channel coding communication, which is the obstacle
mail: changwu@mail.ustc.edu.cn; hclu@ustc.edu.cn; {yuangchen21, we aim to overcome in this work.
qlt315}@mail.ustc.edu.cn). Hancheng Lu is also with Institute of Artificial
Intelligence, Hefei Comprehensive National Science Center, Hefei 230088, Aforementioned researches only optimize the transmission
China. in one or two layers of the system, which has natural lim-
2

itations compared with cross-layer optimization that jointly


considers the upper-layer applications and the lower-layer
resources. In other words, applications with diverse quality-of-
service (QoS) requirements drive optimization across multiple
layers. The ultra-reliable low-latency communication (uRLLC)
services, for example, require strong reliability (∼99.999%)
and ultra-low latency (∼1ms), while the enhanced mobile
broadband (eMBB) applications expect high capacity with
some tolerance for loss [2]. If the same robustness guarantee
and latency tolerance is applied uniformly to all types of
business, some will fail to fulfill the requirements, while others
will waste scarce wireless resources. On the other hand, the
distributed RF units provide a structural foundation for imple-
menting coordinated and collaborative transmission/reception Fig. 1. C-RAN system with one buffer queue per user flow.
strategies between RRHs, thereby improving spectrum effi-
ciency and energy efficiency [5], [9], [14], [15]. However, just
as there is no free lunch, efficient User Association (UA) and complexity.
resource allocation algorithms have to be carefully studied to • Extensive numerical simulations are conducted to validate
fully realize the potential of system. the rationality of the finite-length coding system and the
To overcome the aforementioned challenges, the relation- effective capacity model, as well as the effectiveness
ship between the QoS requirements of the applications and of our proposed algorithms in terms of statistical QoS
the transmission parameters in the lower layer is analyzed and provision and bandwidth efficiency improvement. The
correlated from cross-layer perspective. In view of the rigid algorithms achieve maximum bandwidth efficiency while
transmission parameter decision (TPD) in the current commu- satisfying the requirements of statistical QoS provision.
nication system, i.e., the fixed bit error rate (BER) threshold The rest of this paper is organized as follows. In Section II,
used to derive MCS [24] and the maximum retransmission we formulate a bandwidth consumption minimization problem
count in automatic retransmission request (ARQ) protocol in C-RAN based on the effective capacity theory and the finite-
[25], we design a flexible TPD algorithm to achieve the min- length coding model. In Section III, parameter decoupling is
imum bandwidth consumption under individual services with implemented and algorithms are designed to address two sub-
statistical QoS requirements, i.e., the maximum bandwidth problems separately, aiming to solve the initial optimization
efficiency. Deterministic QoS provision is typically hard due to problem. Simulation results of the proposed algorithm are
the high volatility of wireless channels [26]–[30]. Therefore, discussed in Section IV. Finally, Section V concludes the
the statistical delay QoS provision is characterized based on whole paper and gives future research directions.
effective capacity theory [31], [32]. The main contributions of
our work can be summarized as follows: II. S YSTEM M ODEL AND P ROBLEM F ORMULATION
• We propose a QoS provision framework for finite- This section will first present the network model, service
length coding communication systems in C-RAN. This model and the AMC model, and then formulate a joint
framework jointly controls the transmission parameters optimization problem aiming to maximize the bandwidth ef-
at each layer to provide statistical QoS guarantee for ficiency of the C-RAN system subject to constraints on the
diverse services, thereby leading to maximum bandwidth delay and loss QoS requirements.
efficiency. The framework takes into account queuing
delay and transmission delay constraints, as well as data
loss rate constraints caused by queuing timeouts and A. Network Model
transmission errors, forming an optimization space that As shown in Fig. 1, N users are collaboratively served by
includes bandwidth allocation for initial transmission, M radio access points (RAPs) in the C-RAN system, where
UA in the transport layer, maximum transmission count the set of user indexes and the AP indexes are denoted as
in the link layer, and MCS in the physical layer. The N = {1, 2, · · · , N } and M = {1, 2, · · · , M }, respectively.
data loss rate due to queuing timeout is represented by All APs are controlled by a scheduler located in the Central
the latency violation probability (LVP) in the effective Unit (CU). We consider each user requesting a downlink real-
capacity theory. time data flow with certain QoS requirements, such as mul-
• Considering the complexity of the problem, we decom- timedia teleconferencing and live. Considering the fluctuating
pose the original optimization problem into TPD sub- channel capacity arising from the dynamic nature of wireless
problem within each AP-user pair and UA decision sub- channels, the buffer is configured to optimize the utilization
problem, which can be solved respectively by a binary of channel resources. The data packet from the source server
search-based algorithm and an auction-based algorithm. first enters the RLC buffer allocated for each user in the CU
The algorithm can ultimately find the global optimal to wait for service. Assuming that the data of user n ∈ N
solution of the original problem with polynomial time enters the corresponding queue at a constant rate λn .
3

The media access control (MAC) scheduler in CU allocates violating time domain to the total service data when the slot
a certain amount of transmission opportunities to the data length is sufficiently large [31], [32].
queues in the RLC queue based on the connection between Based on the above analysis, the service process of the
APs and users during each scheduling cycle. As a result, system across different slot is uncorrelated. Therefore, the
data units are read from the queue header and assembled effective capacity of the service system for user n can be
into a transmission block (TB) for transmission, and ARQ are represented as [31]
applied to improve the robustness of the delivery. The radio 1 n s
o
air-port delay of the data consists of the queuing delay in ECn (θn ) = − s
ln Eγ e−θn T ωn [t] , (3)
θn T
the RLC queue, the link transmission delay from CU to APs, where Eγ {·} indicates the statistical average of inner argu-
and the service delay at the AP. Among them, the queuing ments with respect to service rate, and θn ≥ 0 is the latency
delay caused by the mismatch between the arrival rate and exponent of the nth user, which indicates the tolerance of a
the service rate, as well as the the service delay (including satisfactory system to the occurrence of delay violations. Ac-
transmission and retransmission delay) dominates the air-port cording to [32], ECn (θn ) is a monotonic descending function
delay, which are performance requirements we need to meet with respect to θn when the service process of the system
in this work. In order to fulfill the low-latency requirement ωn [t] is determined. Therefore, the system does not guaran-
of real-time data flows and the distortion limitation caused by tee the LVP when the effective capacity gets the maximum
data loss, it is necessary to study the collaborative optimization value ECn (θn = 0) = Eγ {ωn [t]}, and ECn (θn = ∞) = 0
of UA and the parameter configuration of APs. indicates that the system cannot tolerate any possible delay vi-
olations, resulting in zero capacity. The gap between ECn (θn )
B. Service Model and the provided capacity provides a delay violation guarantee
with parameter θn . In other words, the effective capacity
The wireless channels between users and APs are charac- provides the maximum supported source rate for a given
terized as block fading, implying that the channel response service rate under the delay violation probability guarantee
remains constant in the duration of each fading block, assum- characterized by parameter θn . When the source rate satisfies
ing a slot with length T s, and varies randomly across different λn = ECn (θn ), the probability of violation of the delay
fading blocks. With a constant arrival rate λn , we define the threshold can be approximated as
data arrival process of user n during [0, t) as An (t) = λn ·t. Let  q,th
[t] denote the t-th slot and (t) denote the moment t. Similarly, Pr Dnq > Dnq,th ≈ ϕn · e−θn λn Dn , (4)
the cumulative service process provided by the C-RAN system where ϕn is the non-empty probability of the queue that
for user n is represented as can be approximated as ϕn ≈ Eγ {ω λn
< 1, and Dnq is a
n [t]}
random variable representing the steady-state queuing delay
Sen (t) = Sn (t − t%T s ) + (t%T s ) ωn [t/T s + 1] , (1)
experienced by the data of user n before it is served.
where operator % denotes modulo operation, and ωn [t] is the
C. Modulation and Channel Coding Model
average service rate that the system could provide for user n in
the t-th slot, which may be greater than the rate required. So Considering the gap between the theoretical Shannon rate
the actual service
n process accepted
o by user n is represented as and the actual performance [33], [34], with the coefficient
Sn (t) = min Sen (t), An (t) . With the average service rate ̺ = −2 ln (5 · ρ) /3, the relationship between the maximum
available spectral efficiency and the signal-to-interference-
ωm,n [t] provided by AP m ∈ M for user n at slot t, the total
noise-ratio (SINR) of the channel can be expressed as υ̂ =
service rate can be represented as
log2 (1 + γ/̺), where SINR γ is the unique parameter used
X
ωn [t] = am,n ωm,n [t], (2) to describe channel quality in this article. Therefore, we select
m∈M the highest MCS index under the allowed BER ρ, with the
MCS switching threshold being represented as [34]
where am,n is UA indicator regarding the AP m and the user
2
n. In particular, am,n = 1 when the nth user is associated γj = (1 − 2υj ) ln (5 · ρ) , j ∈ {0, 1, · · · , J} , (5)
3
with the mth AP, and am,n = 0 otherwise.
where υj is the spectral efficiency when MCS j is selected.
Due to the diversity of QoS requirements for different traffic
And J is the maximum MCS index that can be selected, so
flows, such as latency and data loss rate, as well as the varying
we have γJ+1 = +∞. Meanwhile, the actual BER can be
degree of importance for the same content by different users,
calculated through channel SINR and selected MCS, which
we can flexibly adjust the service process provided for each
can be represented as
service flow according to its characteristics. By doing so, we  
can maximize the bandwidth efficiency of the entire system 1 1.5 · γ
P b(j, γ) = exp − υj . (6)
within its acceptable QoS loss constraint. We assume that 5 2 −1
the maximum tolerable queuing delay for user n is Dnq,th . We adopt Rayleigh channel model to describe γ statistically.
The scheduler will discard the part of the queue that exceeds The SINR γ for each fading block is thus a random variable
the delay threshold, with a maximum allowable queue length with a probability density function (pdf):
q,th
Qth
n = λn Dn . Research shows that the LVP of user n can be 1 γ
represented as the ratio of the amount of data served in the pγ (γ) = e− γ̄ , (7)
γ̄
4

where γ̄ = Eγ [γ] is the average SINR related to the distance initial transmission. Hence, for the new data transmitted by AP
between APs and users. m to user n within a slot, the number of RBs required for the
x
In NR systems, data stored in RLC service data unit (SDU) xth transmission can be computed as rm,n = rm,n (P̄m,n )x−1 .
format is encapsulated, segmented, and assembled into TBs Finally, the average number of RBs consumed by AP m for
when the MAC scheduler notifies the queue of a transmission user n in cumulative Xn transmissions can be expressed as
opportunity. Then, the oversized TB will be divided into n −1
XX
smaller code blocks in the channel coding process. Code x
Rm,n = rm,n · P̄m,n
blocks have the same size due to the appropriate TB size x=0
Xn (10)
design [24], which are the basic unit of channel coding and
1 − P̄m,n
rate matching. With the maximum code block size L (bit) = rm,n · .
and AMC-induced BER Pb , per-transmission block error rate 1 − P̄m,n
L
(BLER) can be calculated as P (j, γ) = 1 − [1 − P b(j, γ)] . The average RB number that AP m consumes for data transfer
For the ergodic channel, the average BLER at the physical in the t-th slot (t is large enough to be stable) can be calculated
layer can be calculated as as
J Z
X
1 X γj+1 Rm [t] = am,n rm,n [t]
P̄ = P (j, γ) pγ (γ) dγ
PT j=0 γj n∈N
(8) X n −1
XX
J Z
  Xn −x
1 X γj+1 h L
i + am,n rm,n t−x · T RTT · P̄m,n
= 1−[1−P b(j, γ)] pγ (γ) dγ, n∈N x=1
PT j=0 γj
X X n −1
XX
R +∞ x
where PT = γ0 pγ (γ) dγ is the probability that the channel ≈ am,n rm,n [t]+ am,n rm,n [t]· P̄m,n
n∈N n∈N x=1
has no deep fading and at least one MCS mode is available
X n −1
XX
[35]. By utilizing X transmissions of code blocks by ARQ, the x
actual BLER at the link layer can be calculated as P tr = P̄ X . = am,n rm,n [t] · P̄m,n
n∈N x=0
Furthermore, we assume that the block can be successfully X
decoded when the actual BLER falls below threshold ε0 due = am,n Rm,n [t],
to the cooperation with forward error correction (FEC) coding n∈N
(11)
[36]–[38].
where T RTT denotes the static delay from one transmission
to obtaining the feedback, including propagation delay and
D. Problem Formulation processing delay. The approximation is reasonable due to
For simplicity, orthogonal frequency division multiplexing similar RB consumption in close slots and less amount of
(OFDM) is adopted between APs and users to avoid interfer- retransmissions. In summary, the total bandwidth consumed
ence, which indicates that the SINR in the previous text can be by the C-RAN system in slot t can be calculated as
replaced by signal-to-noise-ratio (SNR). The scheduling slot
αβScs X X
period T s is obtained while selecting the subcarrier spacing B[t] = am,n Rm,n [t]. (12)
according to the numerology. According to the NR system, βs
m∈M n∈N
the resource block (RB) is the basic unit for wireless resource The service delay due to Xn transmission can be expressed
allocation, and any number of RBs not exceeding the total as
resources of system can be allocated for each transmission. 
Dns (Xn ) = Xn · T s + T RTT . (13)
We assume that each RB contains α subcarrier and β OFDM
symbols with spectral efficiency υj in the C-RAN system, We aim to optimize the bandwidth efficiency by parameter
then the amount of information that can be transmitted by configurations in each AP and proper UA decision under the
an RB in MCS j mode can be expressed as ψj = αβυj . constraints of delay and loss QoS requirements. Then the
If rm,n RBs are assigned by AP m to user n for the first problem can be formulated as
transmission, the bandwidth consumption can be calculated as X X
Bm,n = αβrm,n Scs /βs , where Scs is the subcarrier spacing min am,n Rm,n (14a)
{rm,n },{θn },{am,n }
m∈M n∈N
related to numerology and βs is the number of data symbol in {ρm,n },{Xn }

one slot. Therefore, with the service rate ωm,n = rm,n ψj /T s, s.t. Pr Dnq > Dnq,th ≤ εn , ∀n ∈ N (14b)
the effective capacity of user n in (3) can be reinterpreted as ECn (θn ) = λn , ∀n ∈ N (14c)
1 Dns + Dnq,th ≤ Dnth , ∀n ∈ N
ECn (θn ) = − ln Eγ {exp (−θn T sωn )} (14d)
θn T s ( !) Xn
X P̄m,n ≤ ε0 , ∀n ∈ N , ∀m ∈ M (14e)
1 X
=− ln Eγ exp −θn ψ am,n rm,n . am,n ≤ 1, ∀n ∈ N (14f)
θn T s
m∈M
m∈M
(9) X
For each time slot, it is assumed that the error block is am,n ≥ 1, ∀m ∈ M (14g)
retransmitted with the same AP and parameters used for the n∈N
5

s
where (14f) and (14g) are UA constraints implying that each On the one hand, with an increased service latency Dm,n ,
user can be served by at most one AP and each AP serves at a greater number of transmissions can be employed, thereby
least one user, on the assumption that N ≥ M . It is worth enabling the establishment of a larger BER threshold, as
noting that the assumptions in (14f) and (14g) controls the outlined by Eq. (13) and the Theorem 1 below. On the other
q,th
complexity of the cross-layer optimization problem, which hand, a relaxed queuing delay threshold Dm,n can alleviate
will be further elaborated upon in subsequent sections of this the impact of RB resources on LVP constraints, in accordance
paper. Based on effective capacity theory, the constraints (14b) with Eq. (15b). Both avenues contribute to a reduction in RB
- (14d) implement statistical delay and loss QoS provision consumption. Consequently, it can be deduced that the optimal
for applications with different source rate requirements. The solution is assured when the condition set forth by Eq. (15d)
(14e) represents the BLER constraint of successful decoding, are satisfied as equality constraint. Furthermore, we obtain
concurrently exerting a direct influence upon the transmission from [32, Lemma 2, Theorem 1] that if the problem P1 is
latency by means of the transmission count. feasible, the inequality expressed as
 ∗  λm,n T s
III. P ROBLEM S OLUTION λm,n T s < Eγ rm,n ψ ρ∗m,n < (16)
εn
The problem (14) is a mixed-integer non-linear program- holds in the optimal solution and constraint (15b) satisfy
ming problem, indicating that its direct solution is typically equality. Therefore, We can obtain the relational expression
challenging. Due to the fact that the optimal parameters are of θm,n with respect to rm,n , ρm,n and Xm,n by limiting
determined solely by the user with specified QoS requirements (15b) and (15d) to equality, which can be calculated as
and the selected AP, the problem described in (14) can be  
decomposed into two sub-problems, i.e., the TPD problem and (15b) 1 εn Eγ [rm,n ψ]
θm,n = − q,th
ln
UA problem, which can be addressed in sequence. First, we λm,n Dm,n λm,n T s
design the optimal transmission parameters for each potential  
(15d) 1 εn Eγ [rm,n ψ]
AP-user pair in Sec. III-A to minimize the consumption of =− ln .
λm,n [Dnth −Xm,n ·(T s +T RTT)] λm,n T s
bandwidth resources while ensuring the QoS requirements of (17)
the users. Subsequently, we optimize the UA pattern based on Due to the finite set of integer variable values, P1 can be
the UA constraints and the optimal TPD for all possible pairs reformulated into a problem dependent upon θm,n and ρm,n
in Sec. III-B. by prescribing specific values for Xm,n and rm,n . Thus, with
ec
fixed rm,n and Xm,n , as well as Fm,n (ρm,n ) defined as
A. Parameter Configuration for Each AP-User Pair 1 
ec
Fm,n (ρm,n ) = − ln Eγ e−θm,n rm,n ψ , (18)
Consider a particular AP-user pair of the mth AP (m ∈ M) θm,n Ts
and the nth user (n ∈ N ), which implies that the number of
allocated RBs and the maximum tolerable queuing delay of the problem P1 can be transformed into a BER threshold
user n only depends on the parameter configuration of AP configuration problem that is represented as
m. We first search for the optimum parameters configuration P2 : min Rm,n (ρm,n ) (19a)
for users across all potential APs, so that the AP consumes ρm,n
ec
the minimum amount of RBs while concurrently adhering to s.t. Fm,n (ρm,n ) = λm,n (19b)
the constraints of the source rate and QoS. This forms sub- λm,n T s
problem P1, the optimal solution of which is also the optimal λm,n T s < Eγ [rm,n ψ] < (19c)
εn
parameter configuration after the UA algorithm has made its  Xm,n
P̄m,n (ρm,n ) ≤ ε0 (19d)
decision on the APs. Sub-problem P1 can be represented as
s
Rm,n (ρm,n ) ≤ R , (19e)
P1 : min Rm,n (rm,n , θm,n , ρm,n , Xm,n ) (15a)
{rm,n },{θm,n }
{ρm,n },{Xm,n }
where Rs denotes the total number of RBs in one slot and the
constraint (19c) obtained from (16) further limits θm,n > 0.
λm,n T s q,th
s.t. e−θm,n λm,n Dm,n ≤ εn (15b) According to the definition of spectrum efficiency υj and
Eγ [rm,n ψ]
average BLER P̄ , we present two properties of the optimal
1 
− s
ln Eγ e−θm,n rm,n ψ = λm,n (15c) solution of problem P2, in what follows by Theorem 1
θm,n T and Theorem 2, proved in Appendix A and Appendix B
s q,th
Dm,n + Dm,n ≤ Dnth (15d) respectively.
Xm,n
P̄m,n ≤ ε0 . (15e) Theorem 1. Based on the calculation of BER in (6) and the
definition of spectrum efficiency [24] for each MCS mode in
It is worth noting that the utilization of subscripts (m, n)
NR, the average BLER P̄ (ρ) is monotonically increasing with
instead of (n) in this section serves the sole purpose of
BER threshold ρ for ρ > 0 when the distribution and average
indicating that the parameter configuration for user n remains
quality of channel are determined.
valid exclusively within the context of the mth AP. Finally,
ec
we obtain an nonlinear programming problem with optimal Theorem 2. If constraint (19c) holds, the Fm,n (ρm,n ) is
∗ ∗
solution rm,n , θm,n , ρ∗m,n , Xm,n

. monotonically increasing with ρm,n for ρm,n > 0.
6

From the proof of Theorem 2, we also know that the Algorithm 1: Solution Procedure for Problem P1
expectation of the amount of information per RB Eγ [ψ] can using Binary Search
be calculated as Input: Minimum and maximum value ⊙min , ⊙max of
J Z
1 X γj+1 (ρ) ρm,n and Xm,n , Average SNR γ̄m,n ,
Eγ [ψ] = ψj · pγ (γ) dγ Traffic arrival rate λm,n , Total latency Dnth ,
PT j=0 γj (ρ)
(20) Decoding BLER threshold ε0 , LVP εn ,
J Z
1 X γj+1 (ρ) Total number of RBs for system Rs
= α · β · υj · pγ (γ) dγ, Output: The
PT j=0 γj (ρ)  ∗ optimal parameter configuration
rm,n , ρ∗m,n , Xm,n ∗
for AP m and user n
which is monotonically increasing with ρm,n . Therefore, we ∗
1 Let the optimal value Rm,n = +∞,
can find the optimal solution ρ∗m,n corresponding to each AP- 2 Set error tolerance ǫ;
user pair by binary search. The θm,n is first calculated by max
3 for Xm,n = 1 to Xm,n do
(17), where Eγ [ψ] can be obtained by (20), and the effective q,th
4 Calculate Dm,n by (13) and (15d);
capacity in (18) can be rewritten as 5 for rm,n = 1 to Rs do
  ∗
1 6 if rm,n > Rm,n then
ec
Fm,n (ρm,n ) = − s
ln Eγ e−θm,n rm,n ψj break;
θ T 7
 m,n  8 end
 J Z 
1 1 X γj+1 (ρm,n ) −θm,nrm,n ψj  9 if Fm,nec
(ρmax ) ≥ λm,n then
=− ln e p γ(γ)dγ .
θm,n T s PT γj (ρm,n )
j=0
 10 Set ρmin
m,n = ρ
min
and ρmaxm,n = ρ
max
;
(21) 11 repeat 
For each AP-user pair, the optimal solution to problem P1 12 ρm,n = ρmax min
m,n + ρm,n /2 ;
ec
can be obtained by solving problem P2 for all feasible 13 if Fm,n (ρm,n ) < λm,n then
transmission count and RB quantities. The proposed com- 14 ρmin
m,n = ρm,n ;
prehensive optimization solution is summarized in Algorithm 15 else
1, encompassing the procedure for solving problem P2. It is 16 ρmax
m,n = ρm,n ;
worth noting that a necessary condition to ensure the feasibility 17 end

of problem P2 is Fm,n ec
ρmax
m,n ≥ λm,n , as Fm,n ec
(ρm,n ) 18 until |ρmax min
m,n − ρm,n | ≤ ǫ;
increases monotonically with ρm,n . 19 if constraints (19c)-(19e) are satisfied &

Rm,n > Rm,n (rm,n , ρm,n , Xm,n ) then

B. UA Decision 20 R
 m,n = Rm,n (rm,n , ρm,n , Xm,n );

21 rm,n ,ρ∗m,n ,Xm,n

= {rm,n ,ρm,n ,Xm,n};
In this section, the UA decisions for users are studied
∗ 22 end
based on the minimum bandwidth consumption Rm,n for each
23 end
AP-user pair obtained from section III-A, with the aim of
24 end
minimizing the bandwidth cost of the system. Given fixed
25 end ∗
transmission parameters, the problem can be formulated as ∗
26 return Rm,n , and rm,n ,ρ∗m,n ,Xm,n

if it exists.
an asymmetric multi-assignment problem as follows
X X

P3 : min am,n Rm,n (22a)
am,n
m∈M n∈N transform the problem P3 into a minimum cost flow problem
X
s.t. am,n = 1, ∀n ∈ N (22b) by introducing a supersource node e connected to each AP,
m∈M which can be represented as
X
am,n ≥ 1, ∀m ∈ M (22c) X X

min Rm,n am,n (23a)
n∈N am,n
m∈M n∈N
am,n ∈ {0, 1} , ∀(m, n) ∈ A, (22d) X
s.t. am,n − ae,m = 1, ∀m ∈ M (23b)
where A represents the set of all AP-user pairs and the n∈N
condition in (14f) is converted to an equality constraint due X

ae,m = N − M, ae,m ≥ 0, ∀m ∈ M (23c)
to positive resource rate. Bandwidth consumption Rm,n can m∈M
be viewed as the cost paid by AP m to satisfy the QoS X
constraints of user n at the source rate λn , thus the objective am,n = 1, ∀n ∈ N , am,n ≥ 0, ∀(m, n) ∈ A,
m∈M
function is the total system cost. We define S as a subset of
(23d)
A, consisting of paired AP-user pairs (m, n). Due to the UA
constraints (22b) and (22c), each AP m is a part of at least where am,n is extended to include the supersource node e
one pair (m, n) ∈ S and each user n is a part of only one pair and the constraint (23b) implies that each AP generates one
(m, n) ∈ S. By setting am,n = 1 if (m, n) ∈ S and am,n = 0 unit flow. Restriction (23c) means that the number of streams
otherwise, we can obtain a feasible assignment S of problem generated by the supersource node and AP is equal to the
P3. Based on network optimization theory [39], [40], we can number of users, and (23d) restricts each user to request one
7

Algorithm 2: Auction-based Decision for AP Selection


N M
1 Input: R∗ , {M}n=1 , {N }m=1 , M◦ = M, N ◦ = N ,
Init of S, (π, p), ǫ and µ.
2 Ensure: S and (π, p) satisfy (25a) and (25b);
Repeat following cycles until M◦ = N ◦ = ∅;
3 while M◦ 6= ∅ do
4 for m ∈ M◦ do
5 find its best user nm  that

6 nm = arg minn∈N  ∗ Rm,n + pn .
7 ξm = minn∈N Rm,n+ pn ;

8 ζm = minn∈N ,n6=nm Rm,n + pn ; Fig. 2. The system framework of the distributed TPD and UA for cross-layer
9 if nm is the only user in N then optimization of C-RAN network.
10 ζm → −∞;
11 end
12 bm,nm = pnm +ξm −ζm +ǫ = −Rm,n ∗
−ζm +ǫ; the price of each AP m, µ as the price of the supersource node
m
13 end e, and pn as the price of each user n. The optimal solution
14 for n ∈ N & Mb 6= ∅ do to problem (22) can be derived from the optimal solution to
15 Mb is set of APs from which user n received a problem (24). Then the ǫ-complementary slackness (ǫ−CS)
bid during bidding. is introduced to solve the multi-assignment problem. By
16 S = S\{(m′ , n)}; S = S ∪ {(mn ,n)} with introducing a positive scalar ǫ, we declare that the assignment
mn=arg maxm∈Mb bm,n ; S and the binary pair (π, p) satisfy the ǫ−CS condition if
17 Update M◦ and N ◦ ; ∗
πm + pn ≥ −Rm,n − ǫ, ∀(m, n) ∈ A (25a)

18 pn := maxm∈Mb bm,n ; πmn = −(Rm n ,n
+pn ). ∗
πm + pn = −Rm,n , ∀(m, n) ∈ S (25b)
19 end
20 end πm = max πk , if m has multi-pairs (m, n) ∈ S (25c)
k=1,...,M
21 µ = maxm=1,··· ,M πm ; ∗
22 while N ◦ 6= ∅ do Theorem 3. Assume that the benefits −Rm,n are integer. If
Select user n ∈ N ◦ , find ǫ−CS condition are satisfied by feasible assignment S and the
23
 ∗ its best AP mn that binary pair (π, p) for ǫ < 1/M , then S is the optimal assign-
24 mn = arg minm∈M  ∗ Rm,n + πm .
χn = minm∈M Rm,n ment for the initial asymmetric multi-assignment problem.
25
+ ∗πm ,
26 ζn = minm∈M,m6=mn Rm,n + πm ; Proof. The proof naturally originates from [39, Proposition 1],
27 if mn is the only AP in M then thus, it will not be elaborated in this paper.
28 ζn → −∞;
29 end Based on the significance of the ǫ−CS condition stated
30 S = S ∪ {(mn ,n)}; in the Theorem 3, The auction-based algorithm is proposed
31 δ = min {µ − πmn , χn − ζn + ǫ}; to solve the asymmetric multi-assignment problem, which is
32 πmn = πmn + δ, pn = χn − δ; explained in Algorithm 2. The forward (line 3-20) and reverse
33 if δ > 0 then auction (line 21-37) processes are iteratively executed until the
34 S = S\{(mn ,n′ )}, where n′ was assigned to sets of unallocated APs and users satisfy M◦ = N ◦ = ∅. In the
mn under S; forward auction, each unassigned AP m selects  ∗ its best user
35 end nm based on the maximum profit minn∈N Rm,n + pn and
36 Update M◦ and N ◦ . bid on it (line 4-13). The user n that receives bids will be as-
37 end signed to the AP mn with the highest bid, and the pair (mn , n)
Output: A feasible optimal assignment S. will be added to the assignment S. Any existing association
between the user n and other AP will be cancelled and the
values of (π, p) are updated to satisfy the ǫ−CS condition (line
unit stream. The optimal solution of problem (23) is the same 14-19). Reverse auction is executed after the maximum initial
to the initial asymmetric multi-assignment problem (22). AP profit update. The unassigned user n selects  its best AP

By leveraging duality theory, we can express the duality mn based on the maximum price arg minm∈M Rm,n + πm
problem of the minimum cost flow problem (23) as follows: and adds the AP-user pair (mn , n) to the assignment S (line
X X 23-30). The allocation needs to be adjusted further to meet
min πm + pn + (N − M )µ (24a) ǫ−CS condition (line 31-36).
πm ,pn ,µ
m∈M n∈N

s.t. πm + pn ≥ −Rm,n , ∀(m, n) ∈ A (24b)
C. Algorithm Deployment and Complexity Analysis
µ ≥ πm , ∀m ∈ M (24c)
The deployment of the algorithm can be either centralized,
where −πm , µ and pn are Lagrange multipliers associated leveraging the abundant computing resources provided by the
with (23b), (23c), and (23d), respectively. We denote −πm as cloud, or distributed, taking advantage of parallel processing
8

50 10-6 10-3
1.6

9 1.4
40

Optimal BER Threshold


1.2
Bandwidth (MHz)

Average BLER
8
30 1

0.8
20 7
0.6

0.4
10 6
0.2

0 5 0
5 10 15 20 25 30 35 5 10 15 20 25 30 35 0 5 10 15 20 25 30 35
Source Rate (Mbps) Source Rate (Mbps)
(a) bandwidth consumption (b) optimal BER threshold (c) BLER of practical FC system
Fig. 3. Bandwidth consumption and optimal BER threshold selection varying with the source data rate under different average channel quality, where the
th = 6 ms, the delay violation probability ε = 10−5 and the decoding BLER threshold ε = 10−3 .
total latency budget Dn n 0

at APs. As an illustration, we propose a distributed scheme to A. Model Validation


implement our proposed algorithm. The solution is based on
the idea of multi-point collaborative processing, which is fully The coupling between transmission parameters and their
illustrated in Fig. 2. The calculation of transmission parameters relationship with performance requirements is elucidated to
is implemented in the distributed units (DUs) equipped in validate the rationality of finite-length encoding models and
each AP, based on the average channel quality and QoS re- effective capacity models, which serve as the foundation of
quirements of each user. The optimal transmission parameters performance assessment. Taking into account a user n being
and their corresponding minimum bandwidth consumption for served by AP m, we generate a random channel realization
serving different users in a slot will be transmitted to the with average channel quality γ̄ to evaluate the bandwidth
scheduler through the backhaul link. The UA algorithm for consumption obtained by Algorithm 1 under various channel
each user determined by the CU of the scheduler through conditions for services with different source rates and specific
Algorithm 2 is implemented in the buffer. It is worth noting QoS requirements. With the maximum total service delay
that the parameter table needs to be updated only when limitation Dnth = 6 ms, the queue LVP εn = 10−5 , and the
the channel quality changes, which significantly reduce the decoding BLER threshold ε0 = 10−3 , the simulation results
performance requirements of AP and backhaul links. are depicted in Fig. 3. The line types represent bandwidth
With the analysis above, the time complexity of Al- consumption obtained by Shannon channel capacity (IFC, C)
gorithm 1 for each AP-user pair can be represented as for specific source rates, considering delay and LVP addition-
O(X max Rs log 1/ǫ). Therefore, the average complexity of Al- ally (IFC) and actual finite-length coding system on top of the
max s previous considerations (FC), respectively.
gorithm 1 deployed
1
PM on each AP is O(N̄ X R log 1/ǫ),
where N̄ = M m=1 |N | is the average number of times The bandwidth consumption obtained by the Shannon ca-
Algorithm 1 is triggered at each AP. According to [39], pacity assumes that there exists a theoretically perfect modu-
the complexity of Algorithm 2 executed by the scheduler is lation and coding scheme that enables error-free transmission.
mainly determined by the value of ǫ and the greatest difference This results in the minimum bandwidth requirement and a rela-
of the cost ∆ = max Rm,n ∗
− min Rm,n ∗
. The time tively small increase when considering the delay requirement
(m,n)∈A (m,n)∈A and LVP, as illustrated in Fig. 3(a). When the actual MCS
complexity of forward and reverse auction can be expressed
is implemented considering BLER requirements, significantly
as ⌈∆/ǫ⌉|A| = O(⌈∆/ǫ⌉M N ) and O(⌈∆/ǫ⌉M (N − M )),
increased bandwidth resources are consumed serving the same
respectively, which shows that forward auction is dominant
source rate, due to the low spectral efficiency affected by
due to N > N − M .
limited BER threshold. The situation becomes even worse
when channel deteriorates because of the lower modulation
IV. P ERFORMANCE E VALUATION order, i.e., the lower spectral efficiency, determined by the
switching threshold and channel quality in the actual MCS.
In this section, extensive simulations and discussions are Furthermore, the average BLER increases with channel quality
presented to evaluate the performance of the proposed optimal optimization when the channel SNR is in [10, 20] dB due to the
TPD algorithm based on the finite-length coding and the UA characteristics of actual MCS, as illustrated in Fig. 3(c), which
algorithm based on the auction (i.e., the proposed Algorithm results in lower BER threshold selection in Fig. 3(b) with
1 and Algorithm 2, respectively) in the C-RAN system. Prior better channel quality. The above results verify the rationality
to conducting performance evaluations, we first examine the of the finite length coding model and the effective capacity
impact of flexible TPD on performance to verify the rationality model.
and practicality of the model. Subsequently, ablation experi- Fig. 4 illustrates the bandwidth consumption and the optimal
ments and performance comparisons with baseline schemes transmission parameters under various channel conditions,
are conducted to validate the effectiveness of our proposed affected by different overall transmission delay constraints,
algorithms for QoS guarantee and bandwidth saving. when serving the same source rate with an identical LVP and
9

35 10-3 6 5.5

Average Spectrum Efficiency (bps/Hz)


30 5
5

Optimal Number of Transfers


Optimal BER Threshold
25 4.5
Bandwidth (MHz)

10-4 4
20 4
3 3 3 3 3 3
3
15 3.5
2
10-5 2
10 3
1 1
5 1 2.5

0 10 -6 0 2
4 6 8 10 12 14 16 18 20 4 6 8 10 12 14 16 18 20 10-5 10-4 10-3
Total Latency (ms) Total Latency (ms) BER Threshold
(a) bandwidth consumption (b) optimal BER threshold and number of transfers (c) Spectrum Efficiency of practical FC system
Fig. 4. Bandwidth consumption, the optimal BER threshold selection and the corresponding optimal number of transmissions varying with the total latency
budget under different average channel quality, where the source data rate λ = 20 Mbps, the LVP εn = 10−5 and the decoding BLER threshold ε0 = 10−3 .

decoding BLER threshold. In cases where the total latency 30

is minimal (Dth ≤ 6 ms), the scarcity of time resources


25
is the primary concern. Providing services that can tolerate

Bandwidth (MHz)
higher queuing delay results in greater bandwidth savings, 20
surpassing the effect achieved by higher spectral efficiency due
15
to increased BER thresholds caused by retransmissions. As the
total latency constraint is moderately relaxed (6 ≤ Dth ≤ 10 10
ms), the more efficient bandwidth utilization brought about
by the increase in BER threshold provides a greater con- 5
tribution to bandwidth savings. Consequently, the maximum
0
transmission count increases to adopt a higher BER threshold, 10-7 10-6 10-5 10-4 10-3 10-2
thereby enhancing bandwidth efficiency at the expense of a LVP
reduced tolerable queuing delay. The enhancement effect of (a) bandwidth consumption
3
increasing the BER threshold on spectral efficiency is not
always prominent but gradually diminishes, as illustrated in 2.5

Optimal Number of Transfers


Fig. 4(c). Therefore, when the total latency constraint is further
Optimal BER Threshold

-4
10
relaxed (Dth ≥ 10 ms), tolerating higher queuing latency 2
once again becomes the primary contributor to our objective.
Consequently, the decision to maintain a constant transmission 1.5
count and BER threshold is made again.
1
Fig. 5 illustrates the bandwidth consumption and optimal
transmission parameters under various channel conditions,
10-5 0.5
affected by different LVP constraints, when serving the same
source rate with an identical overall delay budget and de- 0
coding BLER threshold. Consistent with our analysis, the 10-7 10-6 10-5 10-4 10-3 10-2
required bandwidth monotonically decreases with LVP, and LVP
(b) optimal BER threshold and number of transfers
the difference in bandwidth demand for different LVPs is more
pronounced under poorer channel conditions, as illustrated Fig. 5. Bandwidth consumption, the optimal BER threshold selection and
the corresponding optimal number of transmissions varying with the LVP
in Fig. 5(a). When services with strict LVP requirements under different average channel quality, where the source data rate λ = 20
(εn ≤ 2·10−4 ) are requested, fewer transmissions are adopted, Mbps, the total latency budget D th = 6 ms and the decoding BLER threshold
resulting in a larger available queuing delay, which alleviates ε0 = 10−3 .
bandwidth consumption of the strict LVP. For services with
relaxed LVP requirements, our algorithm transfers part of the
queuing latency budget to the transmission latency budget, under the same channel conditions and source rate requests
which enables a higher BER threshold to improve the spectral decreases monotonically with decoding BLER and LVP. How-
efficiency, as evidenced by the increased resource savings ever, there are differences in the impact of decoding BLER
(εn > 2 · 10−4 ) in Fig. 5(a). The reason is that a higher BER requirements and LVP constraints on optimal parameter se-
threshold saves more bandwidth than a larger queuing delay lection. The abrupt change in the optimal BER threshold
budget under more relaxed LVP constraints. along the LVP axis in Fig. 6(b) is attributed to the adjustment
The joint effects of decoding BLER requirements and LVP decision of the optimal transmission from two to three. Un-
constraints on optimal bandwidth consumption and optimal like the continuous variation of transmission parameters with
parameter selection are elucidated in Fig. 6(a) and Fig. 6(b), decoding BLER requirements, the optimal BER threshold and
respectively. It is evident that the bandwidth consumption transmission times selection do not change with LVP until the
10

20

27.87%

Bandwidth (MHz)
15 3.5

10
2.5

2
20 21 22 23 24 25
5

5 10 15 20 25
SNR (dB)
(a) bandwidth consumption (a) eMBB traffic
12

10 18.51%

Bandwidth (MHz)
8 2

1.8

6 1.6

1.4

1.2
4
1
19 20 21 22 23 24 25

0
5 10 15 20 25
SNR (dB)
(b) optimal BER threshold (b) uRLLC traffic
Fig. 6. Bandwidth consumption, the optimal BER threshold selection varying Fig. 7. Bandwidth consumption for ablation experiment under different
with the LVP and the BLER requirements, where the source data rate λ = 20 channel qualities for eMBB and uRLLC traffic scenario, respectively.
Mbps, the total latency budget D th = 10 ms and the channel average SNR
γ̄ = 18 dB.

the auction algorithm based algorithm and the optimal channel


LVP requirements are relaxed enough to allow for a partial quality based algorithm for AP selection is implemented to
transfer of queuing time to transmission time, resulting in verify the balance between load balancing and bandwidth
reduced bandwidth consumption, consistent with Fig. 5(b). efficiency of the proposed algorithm.
Furthermore, for a lower BLER constraint, the increase in the The bandwidth consumption when transmitting eMBB or
maximum number of transmissions (i.e., the conversion from uRLLC traffic through above TPD algorithm under different
queuing time to transmission time) will occur at a smaller average channel qualities is shown in Fig. 7. The rate require-
LVP. The above analysis verifies the rationality of the model ment and latency budget for eMBB traffic are λ = 10 Mbps
and the integrated impact of the coupled parameters on system and Dth = 10 ms with LVP=10−3 , while for uRLLC traffic
performance. λ = 4 Mbps and Dth = 5 ms with LVP=10−6. The bandwidth
consumption caused by the proposed cross-layer scheme in
different traffic scenarios and channel qualities is lower than
B. Performance Evaluation when the transmission parameter is set to fixed value, which
In this section, we conduct a series of ablation experiments effectively verifies the superior performance of the algorithms.
to evaluate the performance of the proposed cross-layer op- It can be obtained from Fig. 7(a) that the bandwidth efficiency
timization framework. Specifically, transmission parameter is for eMBB traffic under proposed algorithms is up to 27.87%
assigned fixed value in each layer separately, which is used higher than that of schemes with fixed transmission parameter,
in the current communication system. Joint optimization of and up to 18.51% higher in uRLLC scenario from Fig.
parameters is compared with ablation schemes to demonstrate 7(b). Moreover, the intersection of bandwidth curves occurs
the optimality of our proposed algorithms. eMBB and uRLLC in several fixed value schemes, which also proves the non
traffic are tested separately to evaluate the effectiveness of optimality of fixed value schemes from the opposite side.
the algorithms for different types of traffic. Different delay The performance comparison results of the algorithms under
budgets and LVP thresholds are set for two types of traffic different source rates and LVP requirements are illustrated
based on their characteristics. For AP selection, M = 20 in Fig. 8, where source rate changes to simulate the eMBB
APs and N = 40 users are randomly distributed in a certain traffic scenario and LVP changes to simulate the uRLLC
area, resulting in different channel qualities for each user traffic scenario. The average quality of the channel is set
when associated with different APs. A comparison between to the same γ̄ = 15 dB in both scenarios. The parameters
11

11 7
5
10 6
18.09%
4
9
Bandwidth (MHz)

Bandwidth (Mbps)
8 4 3
10 10.5 11 11.5 12

7
2
6 proposed+AA
proposed+BC
fixed ρ1+AA
1 fixed ρ2+AA
5 18.72%
fixed X 1+AA
fixed X 2+AA
4 0
10 12 14 16 18 20 eMBB uRLLC (3X)
Source Rate (Mbps) Traffic Type
(a) Bandwidth vs. source rate of eMBB
0.85
Fig. 9. Comparison of joint performance of TPD algorithms and AP selection
algorithms in different traffic scenarios.
0.8
Bandwidth (MHz)

0.75 are consistent with the previous ablation experiments. Fig. 9


19.40%
presents the performance comparison of different parameter
0.7
21.18% configuration algorithms combined with AP decision algo-
0.65
rithms under various service scenarios. It is worth noting that
we enlarge the bandwidth in the uRLLC scenario to three
0.6 times the original value for visual display. It can be seen that
our proposed cross-layer parameter configuration algorithm
0.55 achieves the best bandwidth efficiency performance in the
10-6 10-5 10-4
LVP auction-based algorithms (AA) for UA. On the other hand, the
(b) Bandwidth vs. LVP of uRLLC auction-based UA algorithm achieves the performance inferior
Fig. 8. Bandwidth consumption for ablation experiment under different to the best channel-based (BC) UA algorithm due to the higher
source rate and LVP requirements for eMBB and uRLLC traffic scenario, spectral efficiency achievable with better channels, which is
respectively. achieved at the expense of unbalanced load between APs.
Therefore, our algorithm achieves a better balance between
bandwidth efficiency performance and AP load balancing.
remain the same as before in the eMBB scenario, while
for uRLLC traffic, the source rate requirement is reset to V. C ONCLUSION
λ = 1 Mbps. It is obvious that the proposed cross-layer In this paper, we have proposed a cross-layer parameters
scheme outperforms all other schemes equipped with fixed optimization and AP selection problem in C-RAN network
transmission parameters. Additionally, from Fig. 8(a), it can be to minimize the bandwidth consumption of system while
observed that the higher delay budget of eMBB traffic leads to satisfying statistical QoS requirements. We have designed the
a higher optimal transmission count, which can achieve higher optimal cross-layer TPD algorithm for each possible AP-user
spectral efficiency by configuring a higher BER threshold. For pair, and then optimized the UA pattern through auction-based
uRLLC traffic, the optimal transmission count is 2 due to the decision-making. The developed polynomial-time complexity
lower delay budget, which is consistent with the analysis in the algorithm can find the globally optimal transmission parameter
Sec. IV-A. The proposed algorithm can provide up to 18.72% configuration and AP selection, as the AP-user combinations
bandwidth efficiency gain in the EMBB scenario and up to are optimally selected from all possible pairs based on their
21.18% in the uRLLC scenario compared with the schemes optimal transmission parameters. Finally, numerical results
with fixed parameter. It is worth noting that the reason for validate the accuracy of the proposed QoS provision model
partial curve in Fig. 8(b) being parallel to the LVP axis is the and the effectiveness of the developed algorithm in terms of
low bandwidth consumption of uRLLC traffic and the resource bandwidth savings.
blocks-based bandwidth allocation. In the future, some meaningful researches including short-
By randomly placing N = 40 users served by M = 20 APs packet transmission and uRLLC in finite-length coding sys-
in a certain space, we simulate a realistic C-RAN scenario tems, are desirable of consideration. Analysis based on finite-
where half of the users request eMBB services and the other length encoding is meaningful and important as we have men-
half request uRLLC services. For eMBB users, the source rate tioned, which will be more complicated in the C-RAN systems
requirements and delay budgets are set to [10, 20] Mbps and by jointly considering with packet type and QoS requirements.
[10, 16] ms, respectively, with LVP thresholds of [10−4 , 10−3 ]. And it is worthy to find a more accurate representation of the
We set the source rate requirements to [1, 5] Mbps for uRLLC spectral efficiency for more instructive performance results.
traffic, with delay budgets [3, 9] ms and LVP thresholds
[10−6 , 10−5 ]. The fixed parameters in the comparison scheme A PPENDIX A
12

P ROOF OF T HEOREM 1 when MCS is fixed to j and the P b• (j, γ) curve moves
The MCS selection scheme we adopt for the system is de- distance △γj in the positive direction of γ, we can get
fined in [24, Table 5.1.3.1-2], which implies that the available P b• (j, γ− △γj ) > P b◦ (j, γ) , γ ∈ [γj◦ , γj+1

). (31)
spectrum efficiency υj is monotonically increasing with the
MCS index j, that is, υj+1 > υj with a definite ρ. In addition, In addition, we already know that P decreases monotonically
there is υj > 0 and 5 · ρ ≪ 1 due to definition and realistic with respect to γ with fixed MCS, so we have
characteristics respectively. So we have 

P b• j, γj+1 > P b◦ (j, γ) , γ ∈ [γj+1
• ◦
, γj+1 ). (32)
γj+1 > γj , ∀j ∈ {0, 1, · · · , J} , (26) Based on (31) and (32), we can conclude that
when ρ is fixed and Z γj+1

1
• P (j, γ) pγ (γ) dγ
γj (ρ• ) < γj (ρ◦ ) , ρ• > ρ◦ , 0 < ρ ≪ 1. (27) PT,j γj•
Z γj+1

Similarly, we can conclude that P b (j, γ) and thus P (j, γ) 1
> ◦ P (j, γ) pγ (γ) dγ, ∀j ∈ {0, 1, · · · , J} ,
decrease monotonically with γ under same MCS j. We im- PT,j γj◦
plement the following proofs based on the determined channel Rγ (33)
distribution with a fixed average SNR γ̄. We study the function where PT,j = γjj+1 pγ (γ) dγ denotes the probability of
Fγ (j, γ) with respect to the MCS j and BER threshold ρ, adopting MCS mode j. By summing the two sides of the (33)
which is defined as for j ∈ {0, 1, · · · , J}, we can obtain
Fγ (j, ρ) = γj+1 (ρ) − γj (ρ) X J Z γj+1

1
2 (28) P (j, γ) pγ (γ) dγ
= (2υj − 2υj+1 ) ln (5 · ρ) . P•
j=0 T,j γj

3 (34)
X J Z γj+1

Due to υj+1 > υj , we can conclude that Fγ (j, γ) decreases 1
> P (j, γ) pγ (γ) dγ.
monotonically with ρ when MCS fixes, which will be used P◦
j=0 T,j γj

later.
First, we take a value ρ◦ and get the switching threshold γj◦ The above formula can be rephrased as
of MCS mode based on (5). And the BLER P̄ (ρ◦ ) can also J Z •
1 X γj+1
be calculated by (6)-(8), given by P (j, γ) pγ (γ) dγ
J Z ◦ PT• j=0 γj•
1 X γj+1 (35)
P̄ (ρ◦ ) = ◦ P (j, γ) pγ (γ) dγ J Z ◦
PT j=0 γj◦ 1 X γj+1
(29) > ◦ P (j, γ) pγ (γ) dγ,
J Z ◦ PT j=0 γj◦
1 X γj+1 h L
i
= ◦ 1−[1−P b(j, γ)] pγ (γ) dγ,
PT j=0 γj◦ which completes the proof by P̄ (ρ• ) > P̄ (ρ◦ ).
R +∞
where PT◦ = γ ◦ pγ (γ) dγ is the probability that at least
0 A PPENDIX B
one MCS mode is available with BER threshold ρ◦ . Then,
P ROOF OF T HEOREM 2
we slightly increase the BER threshold to ρ• = ρ◦ + ǫ with
0 < ǫ ≪ 1 and consider corresponding BLER P̄ (ρ•) with To prove this theorem, it is sufficient to demonstrate the
switching threshold γj (ρ• ), denoted by γj• for simplicity, monotonicity of functions ψj (ρ) and θ (ρ) with respect to ρ.
and probability PT• . It’s not difficult to obtain γj• < γj◦ by First, the average information per RB Eγ [ψ] in the ergodic
 channel can be calculated as
(27), and thus we can conclude P j, γj > P j, γj◦ for

J Z
∀j ∈ {0, 1, · · · , J}, where P (j, γj ) denotes the BLER with 1 X γj+1
MCS j at switching threshold γj . In addition, we define the Eγ [ψ] = ψj · pγ (γ) dγ
PT j=0 γj
difference of MCS switching threshold between two BER (36)
J Z
thresholds under the same MCS as △γj = γj◦ − γj• , so we 1 X γj+1
have = α · β · υj · pγ (γ) dγ,
  PT j=0 γj
◦ •
△γj+1 − △γj = γj+1 − γj+1 − γj◦ − γj•
where the definition of PT is consistent with the body. Similar
= [γj+1 (ρ◦ ) − γj (ρ◦ )] − [γj+1 (ρ• ) − γj (ρ• )] to (31) and (32) in the proof of property 1, we have υj+1 •
>
(28) ◦ • ◦ • ◦ ◦ •
= Fγ (j, ρ◦ ) − Fγ (j, ρ• ) . υj for γ ∈ [γj , γj ] and υj+1 = υj+1 for γ ∈ [γj+1 , γj+2 ].
(30) Therefore, Eγ [ψ] is increasing with BER threshold ρ since
We can then obtain △γj+1 − △γj > 0 from the monotonicity average spectrum efficiency Eγ [υ] increases with ρ.
of the Fγ (j, ρ) with respect to ρ, which implies that the From the expression of θ (ρ) in (17), we can obtain that
difference of MCS switching thresholds corresponding to the θ (ρ) decreases monotonically with ρ if (16) holds. Further,
two BER thresholds increases monotonously with the MCS since the effective capacity in (18) is increasing with ρ due to
index j. similar reason with Eγ [υ], we can conclude that Fm,n (ρm,n )
With MCS j, P b (j, γ) defined in [γj , γj+1 ) takes the same is monotonically increasing with ρm,n , which completes the
value as P b (j, γ−△) defined in [γj +△, γj+1 +△). Therefore, proof.
13

R EFERENCES [23] L. Ferdouse, A. Anpalagan, and S. Erkucuk, “Joint communication and


computing resource allocation in 5G cloud radio access networks,” IEEE
Trans. Veh. Technol., vol. 68, no. 9, pp. 9122–9135, 2019.
[1] A. Morgado, K. M. S. Huq, S. Mumtaz, and J. Rodriguez, “A survey of
[24] 3GPP, “NR; Physical layer procedures for data;,” 3rd Generation Part-
5G technologies: regulatory, standardization and industrial perspectives,”
Digit. Commun. Netw., vol. 4, no. 2, pp. 87–97, 2018. nership Project (3GPP), Technical Specification (TS) 38.214, Mar 2023,
version 17.5.0.
[2] J. Navarro-Ortiz, P. Romero-Diaz, S. Sendra, P. Ameigeiras, J. J. Ramos-
[25] A. Ahmed, A. Al-Dweik, Y. Iraqi, H. Mukhtar, M. Naeem, and
Munoz, and J. M. Lopez-Soler, “A survey on 5G usage scenarios and
E. Hossain, “Hybrid automatic repeat request (HARQ) in wireless
traffic models,” IEEE Commun. Surveys Tuts., vol. 22, no. 2, pp. 905–
communications systems and standards: A contemporary survey,” IEEE
929, 2020.
Commun. Surveys Tuts., vol. 23, no. 4, pp. 2711–2752, 2021.
[3] H. Haile, K.-J. Grinnemo, S. Ferlin, P. Hurtig, and A. Brunstrom, “End- [26] D. Wu and R. Negi, “Effective capacity: a wireless link model for
to-end congestion control approaches for high throughput and low delay support of quality of service,” IEEE Trans. Wirel. Commun., vol. 2,
in 4G/5G cellular networks,” Comput. Netw., vol. 186, p. 107692, 2021. no. 4, pp. 630–643, 2003.
[4] H. A. Ammar, R. Adve, S. Shahbazpanahi, G. Boudreau, and K. V. [27] X. Zhang, W. Cheng, and H. Zhang, “Heterogeneous statistical QoS
Srinivas, “User-centric cell-free massive MIMO networks: A survey of provisioning over airborne mobile wireless networks,” IEEE J. Sel. Areas
opportunities, challenges and solutions,” IEEE Commun. Surveys Tuts., Commun., vol. 36, no. 9, pp. 2139–2152, 2018.
vol. 24, no. 1, pp. 611–652, 2021. [28] Y. Chen, H. Lu, L. Qin, C. Wu, and C. W. Chen, “Streaming 360-degree
[5] M. F. Hossain, A. U. Mahin, T. Debnath, F. B. Mosharrof, and K. Z. VR video with statistical QoS provisioning in mmWave networks from
Islam, “Recent research in cloud radio access network (C-RAN) for 5G delay and rate perspectives,” arXiv preprint arXiv:2305.07935, 2023.
cellular systems-A survey,” J. Netw. Comput. Appl., vol. 139, pp. 31–48, [29] Y. Chen, H. Lu, L. Qin, and C. W. Chen, “Statistical QoS provisioning
2019. analysis and performance optimization in xURLLC-enabled massive
[6] V. Suryaprakash, P. Rost, and G. Fettweis, “Are heterogeneous cloud- MU-MIMO networks: A stochastic network calculus perspective,” arXiv
based radio access networks cost effective?” IEEE J. Sel. Areas Com- preprint arXiv:2302.10092, 2023.
mun., vol. 33, no. 10, pp. 2239–2251, 2015. [30] Y. Chen et al., “When xURLLC meets NOMA: A stochastic network
[7] L. Qin, H. Lu, and F. Wu, “When user-centric network meets mobile calculus perspective,” IEEE Commun. Mag., 2023.
edge computing: Challenges and pptimization,” IEEE Commun. Mag., [31] L. Musavian and Q. Ni, “Effective capacity maximization with statistical
2022. delay and effective energy efficiency requirements,” IEEE Trans. Wirel.
[8] N. Moosavi, M. Sinaie, P. Azmi, and J. Huusko, “Delay aware resource Commun., vol. 14, no. 7, pp. 3824–3835, 2015.
allocation with radio remote head cooperation in user-centric C-RAN,” [32] C. Guo, L. Liang, and G. Y. Li, “Resource allocation for low-latency
IEEE Commun. Lett., vol. 25, no. 7, pp. 2343–2347, 2021. vehicular communications: An effective capacity perspective,” IEEE J.
[9] M. Elhattab, M.-A. Arfaoui, and C. Assi, “CoMP transmission in Sel. Areas Commun., vol. 37, no. 4, pp. 905–917, 2019.
downlink NOMA-based heterogeneous cloud radio access networks,” [33] X. Qiu and K. Chawla, “On the performance of adaptive modulation in
IEEE Trans. Commun., vol. 68, no. 12, pp. 7779–7794, 2020. cellular systems,” IEEE Trans. Commun., vol. 47, no. 6, pp. 884–895,
[10] M. S. Al-Abiad, A. Douik, S. Sorour, and M. J. Hossain, “Throughput 1999.
maximization in cloud-radio access networks using cross-layer network [34] H. Seo and B. G. Lee, “A proportional-fair power allocation scheme for
coding,” IEEE Trans. Mobile Comput., vol. 21, no. 2, pp. 696–711, 2020. fair and efficient multiuser OFDM systems,” in IEEE Global Telecom-
[11] S. H. Lee and I. Sohn, “Message-passing-based dynamic point selection munications Conference, 2004. GLOBECOM’04., vol. 6. IEEE, 2004,
for coordinated multipoint transmission,” IEEE Commun. Lett., vol. 19, pp. 3737–3741.
no. 10, pp. 1850–1853, 2015. [35] D. Wu, S. Ci, and H. Wang, “Cross-layer optimization for video
[12] M. S. Al-Abiad, M. J. Hossain, and S. Sorour, “Cross-layer cloud summary transmission over wireless networks,” IEEE J. Sel. Areas
offloading with quality of service guarantees in fog-RANs,” IEEE Trans. Commun., vol. 25, no. 4, pp. 841–850, 2007.
Commun., vol. 67, no. 12, pp. 8435–8449, 2019. [36] J. Hagenauer and E. Lutz, “Forward error correction coding for fading
[13] M. S. Al-Abiad, M. Z. Hassan, and M. J. Hossain, “A joint compensation in mobile satellite channels,” IEEE J. Sel. Areas Commun.,
reinforcement-learning enabled caching and cross-layer network code vol. 5, no. 2, pp. 215–225, 1987.
in F-RAN with D2D communications,” IEEE Trans. Commun., vol. 70, [37] T. Mizuochi, “Recent progress in forward error correction and its
no. 7, pp. 4400–4416, 2022. interplay with transmission impairments,” IEEE J. Quantum Electron.,
[14] A. Iqbal, M.-L. Tham, and Y. C. Chang, “Double deep Q-network-based vol. 12, no. 4, pp. 544–554, 2006.
energy-efficient resource allocation in cloud radio access network,” IEEE [38] H. Paul, D. Wübben, and P. Rost, “Implementation and analysis of
Access, vol. 9, pp. 20 440–20 449, 2021. forward error correction decoding for cloud-RAN systems,” in 2015
IEEE International Conference on Communication Workshop (ICCW).
[15] J. Tang, W. P. Tay, and T. Q. Quek, “Cross-layer resource allocation
IEEE, 2015, pp. 2708–2713.
with elastic service scaling in cloud radio access network,” IEEE Trans.
[39] D. Zhao, H. Lu, Y. Wang, H. Sun, and Y. Gui, “Joint power allocation
Wirel. Commun., vol. 14, no. 9, pp. 5068–5081, 2015.
and user association optimization for IRS-assisted mmWave systems,”
[16] C. She, C. Yang, and T. Q. S. Quek, “Cross-layer optimization for IEEE Trans. Wirel. Commun., vol. 21, no. 1, pp. 577–590, 2021.
ultra-reliable and low-latency radio access networks,” IEEE Trans. Wirel. [40] G. Athanasiou, P. C. Weeraddana, and C. Fischione, “Auction-based
Commun., vol. 17, no. 1, pp. 127–141, 2018.
resource allocation in millimeterwave wireless access networks,” IEEE
[17] J. Li, M. Peng, Y. Yu, and Z. Ding, “Energy-efficient joint congestion Commun. Lett., vol. 17, no. 11, pp. 2108–2111, 2013.
control and resource optimization in heterogeneous cloud radio access
networks,” IEEE Trans. Veh. Technol., vol. 65, no. 12, pp. 9873–9887,
2016.
[18] Tham, Mau-Luen and Chien, Su Fong and Holtby, Derek William and
Alimov, Shavkat, “Energy-efficient power allocation for distributed an-
tenna systems with proportional fairness,” IEEE Trans. Green Commun.
Netw., vol. 1, no. 2, pp. 145–157, 2017.
[19] C. He, G. Y. Li, F.-C. Zheng, and X. You, “Energy-efficient resource
allocation in OFDM systems with distributed antennas,” IEEE Trans.
Veh. Technol., vol. 63, no. 3, pp. 1223–1231, 2014.
[20] C. Pradhan, A. Li, C. She, Y. Li, and B. Vucetic, “Computation
offloading for IoT in C-RAN: Optimization and deep learning,” IEEE
Trans. Commun., vol. 68, no. 7, pp. 4565–4579, 2020.
[21] J. Tang, T. Q. S. Quek, T.-H. Chang, and B. Shim, “Systematic resource
allocation in cloud RAN with caching as a service under two timescales,”
IEEE Trans. Commun., vol. 67, no. 11, pp. 7755–7770, 2019.
[22] L. Liu, Y. Zhou, J. Yuan, W. Zhuang, and Y. Wang, “Economically
optimal MS association for multimedia content delivery in cache-
enabled heterogeneous cloud radio access networks,” IEEE J. Sel. Areas
Commun., vol. 37, no. 7, pp. 1584–1593, 2019.

You might also like