This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

\UseRawInputEncoding

On 1-Persistent Retransmission in Grant-free Access for URLLC Service

Dannan Hong, Tong Ye Dannan Hong, Tong Ye are with the State Key Laboratory of Advanced Optical Communication Systems and Networks, Shanghai Jiao Tong University, Shanghai 200240, China (e-mail: hdn0514@sjtu.edu.cn; yetong@sjtu.edu.cn).
Abstract

Ultra-reliable and low-latency communication (URLLC) is one of three major application scenarios of the 5G new radio, which has strict latency and reliability requirements. Contention-based grant-free (GF) access protocols, such as Reactive, K-Repetition, and Proactive, have been proposed for uplink URLLC service. In the GF access, user equipment (UE) resends packet immediately after an unsuccessful transmission such that the latency requirement can be satisfied. Taking Reactive as an example, this paper studies the impact of 1-persistent retransmission (1-pR) on the distribution of user-plane delay. We define the number of UEs that try to send packets in each mini-slot as attempt rate. We show that the 1-pR makes the attempt rate seen by the packet in retransmission larger than that seen by the packet in the first transmission. As a result, the successful probability of retransmission is lower than that of the first transmission. Based on this observation, we derive the distribution of user-plane delay, which also takes into account the delay incurred by queueing process. We demonstrate that whether to include the effect of 1-pR and queueing process in the analysis would have a significant impact on the prediction accuracy of delay distribution.

Index Terms:
Ultra-reliable and low-latency communication, grant-free access, 1-persistent retransmission, user-plane delay.

I Introduction

Ultra-reliable and low-latency communication (URLLC) is an important application in future wireless networks. One of the design purposes is to provide communication service for a class of sporadic event-driven traffic [1], which has very strict requirements on latency and reliability. According to the 3GPP standard [2], the user-plane delay, which is defined as the time from when a packet arrives at a user equipment (UE) to when it is successfully received by the base station (BS), should be less than 1ms with probability 0.99999.

To meet such requirements, several grant-free (GF) access protocols, such as Reactive, K-Repetition, and Proactive [3] have been proposed for URLLC service. Different from the traditional grant-based (GB) access protocol for enhanced mobile broadband (eMBB), the GF protocols do not require the UE to request resource blocks (RBs) from the BS before data transmission. The wireless access network is a slotted system, where the duration of a mini-slot is called transmission time interval (TTI). A typical TTI is 1/7ms [4]. If a packet arrives in a TTI, the UE randomly selects an RB and transmits the packet to the BS at the beginning of the next TTI, without the need for a time-consuming handshake process similar to that in GB protocols. Compared to the GB access, the GF scheme can eliminate a \sim10-ms delay overhead [5]. Thus, the GF access mode has been included in the 3GPP standard [2] to cope with URLLC traffic in the uplink direction.

However, the GF access will inevitably lead to data collisions, due to the lack of coordination. Because of very strict latency requirement of URLLC traffic, a very-small collision probability may have a significant impact on the reliability of transmission. After a UE starts to send a packet, it will receive an acknowledgment (ACK) or negative acknowledgment (NACK) from the BS in the 3-th TTI, depending on whether the transmission is successful or not. To ensure the user-plane delay is lower than 1ms as much as possible in the case where the transmission fails, the UE has to retransmit the packet in the next TTI with probability 1, called 1-persistent retransmission (1-pR) in this paper. A similar concept is the 1-persistent carrier sense multiple access (CSMA) [6]. To meet the delay requirement, the network should assign a proper number of RBs in each TTI to the URLLC traffic according to the population of UEs in the cell, such that a packet can be received by the BS successfully via one or two transmissions with probability 0.99999. Therefore, understanding the transmission mechanism of GF access would be significant to proper wireless spectrum allocation.

To serve this purpose, several analytical models [5, 7, 8, 9, 10] have been developed to analyze the delay performance of GF access. Ref. [5] proposes an iterative approach to derive the outage probability, which is defined as the probability that the user-plane delay is higher than the delay requirement. Based on the method reported in [5], Refs. [7] and [8] solve the outage probability, taking the finite block length coding theory into consideration. In the context of millimeter wave (mmWave) and massive multiple input multiple output (MIMO), Ref. [9] obtains a closed-form approximation of latent access failure probability, using stochastic geometric spatiotemporal tools. Ref. [10] models the transmission process of each UE as a discrete-time Markov process, deriving packet loss probability to characterize reliability. Aside from ignoring the queueing process of packets, most of these works assume that a UE can randomly move to the coverage of an arbitrary BS in different TTIs, i.e., the location of UEs follows a Poisson point process (PPP) [5, 7, 8, 9]. The data collision of UEs in a TTI is then considered independent of that in other TTIs. However, this assumption is too ideal to be consistent with practical situations.

As Ref. [11] points out, the UE positions in different TTIs are correlated. The moving speed of the UE is limited. For example, in urban areas, the velocity of a car is 30-60km/h, while that of a pedestrian is 3-5km/h. Moreover, the UEs in some scenarios, e.g., the sensor installed in factories [12, 13], may even keep unmoved. This means a UE may stay in the coverage of the same BS during a long period. Under this condition, the 1-pR in GF access will introduce a dependency among the data collisions in different TTIs and such a dependency will remarkably affect the delay distribution of packets, as section II will show.

I-A Our Work

In this paper, we study the effect of 1-pR on the collision process of GF access, under the condition that the group of UEs in the coverage of a BS is relatively fixed. Though there are three strategies for GF access, we model the Reactive strategy [3] in this paper. We define the number of UEs that try to send packets as the attempt rate. We show that the 1-pR makes the attempt rate seen by the packet in retransmission larger than that seen by the packet in the first transmission. As a result, the successful probability of retransmission is lower than that of the first transmission. Taking this observation into consideration, we derive the distribution of the user-plane delay of URLLC packets, which includes the delay incurred by queueing process. We demonstrate that whether to include the effect of 1-pR and queueing process in the analysis would have a significant impact on the prediction accuracy of delay distribution. We further show that our analytical result can be used to predict the maximum number of UEs that can be supported, if other parameters, such as the number of available RBs and the traffic rate are known.

In summary, the contributions of this paper are as follows:

  1. 1.

    We study the impact of the 1-pR of GF access on user-plane latency in the case where the group of UEs in the coverage of a BS is relatively fixed.

  2. 2.

    Different from previous works [5, 7, 8, 9, 10], we take into account the queueing process of packets in our model and show that it has a significant influence on delay performance.

  3. 3.

    Our result can be used to predict the number of UEs that can be supported when the number of RBs is known.

The rest of this paper is organized as follows. Section II presents the system model and our assumptions. Section III analyzes the impact of 1-pR on the attempt rates seen by the packets in the first transmission and retransmission. Taking into account the queueing process of packets, we derive the distribution of user-plane delay in section IV, based on which section V demonstrates the impact of 1-pR and queueing process on delay performance and system design. Section VI concludes this paper.

II System Model and Assumptions

In this paper, we study the uplink transmission of URLLC traffic via GF access in the coverage of a BS. In the network, NN UEs compete for BB RBs in each TTI. The arrival rate of URLLC packets to the access network is λ^\hat{\lambda} packets/s, and to each UE is λ=λ^/N\lambda=\hat{\lambda}/N packets/s.

This paper considers a fading channel, which has an additive noise with an average power of σ2\sigma^{2} and experiences frequency-flat Rayleigh fading. All UEs adopt full path-loss power control to compensate for the “near/far” effect [14], such that the packets from different UEs have the same mean received power, denoted by P¯\bar{P}, at the BS. Consider a packet jj, which selects the same RB with a set of other packets at a TTI, denoted by QjQ_{j}. The signal to noise plus interference ratio (SINR) of packet jj at the BS is given by

SINR=Pjσ2+iQjPi,SINR=\frac{P_{j}}{\sigma^{2}+\sum_{i\in Q_{j}}P_{i}}, (1)

where Pj=P¯|hj|2P_{j}=\bar{P}\left|h_{j}\right|^{2} is instantaneous received power and |hj|2Exp(1)\left|h_{j}\right|^{2}\sim\operatorname{Exp}(1) is channel power gain.

Sometimes, we also consider the ideal channel, which has no additive noise. In this case, the transmission fails only due to packet collision. The discussion of the situation of the ideal wireless channel helps to better demonstrate the effect of 1-pR on the transmission process of packets.

We take into consideration the capture effect [15] of the radio receiver at the BS in our model. With the capture effect, the radio receiver can independently decode each UE’s packet by treating others as background noise, when several packets compete for the same RB. The receiver can decode a packet successfully, as long as the received SINR is above a certain threshold, denoted by μ\mu.

The UEs compete for the RBs using the Reactive strategy. As Fig. 1 plots, after a packet arrives at the UE, it first experiences an alignment delay. The UE randomly selects an RB to transmit the packet at the beginning of the next TTI, called TTI 1. At the end of TTI 1, the BS receives the packet. After that, the BS takes one TTI to process the packet. If the BS decodes the packet successfully, the BS submits the packet to the upper protocol layer and feeds back an ACK to the UE. The BS may fail to decode the packet due to insufficient SINR induced by channel fading or data collision. In this case, the BS sends NACK to the UE, which costs one TTI also. The UE spends one TTI processing the NACK and retransmits the packet at the start of TTI 5, which is called 1-pR in this paper.

Refer to caption

Figure 1: Reactive strategy, where A, T, P, and R stand for (A)lignment, (T)ransmission, (P)rocessing, and (R)etransmission, respectively [4].

In addition to the above description, we adopt the following assumptions in our analysis:

  1. A1

    The number of UEs within the coverage of the BS NN is sufficiently large.

  2. A2

    The group of UEs keeps unchanged under the coverage of a BS during a large number of TTIs.

  3. A3

    The total arrival rate of the URLLC traffic input to the network λ^\hat{\lambda} is not large, such that a high successful probability of packet transmission can be ensured.

  4. A4

    The arrival process of packets to each UE is a Poisson process with rate λ\lambda.

  5. A5

    The number of RBs assigned for URLLC service BB is sufficiently large.

  6. A6

    The retransmission continues until a packet is successfully received by the BS.

III Effect of 1-Persistent Retransmission

Given that the UE group under the coverage of a BS keeps unchanged during a long period, the 1-pR has an effect on the competition process of URLLC. Define the number of UEs that attempt to transmit packets in each TTI as attempt rate. Consider a UE, denoted by 𝒜\mathcal{A}. When it transmits the head-of-line (HOL) packet for the first time, whether or not the remaining N1N-1 UEs send packets is independent of 𝒜\mathcal{A}. One of possibilities that the transmission fails is that the packet of 𝒜\mathcal{A} competes with those of other nodes for the same RB. When 𝒜\mathcal{A} retransmits the packet, the UEs that fail in the competition with 𝒜\mathcal{A} will reattempt definitely. For example, the packets of UE 1 and UE 2 collide in the same RB and their transmissions fail in TTI 1, and both of them will be resent in TTI 5. Intuitively, this will make the attempt rate seen by the packet of 𝒜\mathcal{A} in retransmission larger than that seen by the packet in the first transmission.

Refer to caption

Figure 2: The 1-pR in the Reactive strategy.

Let GFG_{F} and GRiG_{R_{i}} be the attempt rates seen by the HOL packet in the first transmission and the ii-th retransmission, respectively, where i=1,2,i=1,2,\cdots. In this section, we show that GF<GR1GR2G_{F}<G_{R_{1}}\approx G_{R_{2}}\approx\cdots in most cases, due to the 1-pR.

III-A Transmission of HOL Packet

To derive the attempt rates, we need to study the competition process that an HOL packet will experience before it is successfully received by the BS. After a packet becomes an HOL packet, it experiences the first transmission lasting for 1 TTI, as Fig. 2 shows. After that, it waits 3 TTIs in the buffer. If the transmission fails, it will undergo a retransmission in the 5-th TTIs after the first transmission. This process continues until this packet is received by the BS successfully.

As Fig. 3 plots, the transmission process of an HOL packet can be described by a Markov chain, where FF and RiR_{i} are the state of the first transmission and the state of the ii-th retransmission, WFW_{F} and WRiW_{R_{i}} are the waiting states after the first transmission and the ii-th retransmission, and pFp_{F} and pRip_{R_{i}} are the successful probabilities of the first transmission and the ii-th retransmission, respectively. Clearly, the duration times of FF and RiR_{i} are 1 TTI, and those of WFW_{F} and WRiW_{R_{i}} are 3 TTIs. Let πF\pi_{F}, πWF\pi_{W_{F}}, πRi\pi_{R_{i}}, and πWRi\pi_{W_{R_{i}}} be the limiting probabilities of states FF, WFW_{F}, RiR_{i}, and WRiW_{R_{i}}. According to Fig. 3, we have the following equilibrium equations:

πF=pFπWF+j=1pRjπWRj,\pi_{F}=p_{F}\pi_{W_{F}}+\sum_{j=1}^{\infty}p_{R_{j}}\pi_{W_{R_{j}}},
πWF=πF,\pi_{W_{F}}=\pi_{F},
πWRi=πRi,\pi_{W_{R_{i}}}=\pi_{R_{i}},
πR1=(1pF)πWF,\pi_{R_{1}}=\left(1-p_{F}\right)\pi_{W_{F}},
πRi+1=(1pRi)πWRi.\pi_{R_{i+1}}=\left(1-p_{R_{i}}\right)\pi_{W_{R_{i}}}.

Solving them together with the normalization condition

πF+πWF+j=1(πRj+πWRj)=1,\pi_{F}+\pi_{W_{F}}+\sum_{j=1}^{\infty}\left(\pi_{R_{j}}+\pi_{W_{R_{j}}}\right)=1,

we have the limiting probabilities as follows

{πF=πWF=12[1+(1pF)+(1pF)i=2j=1i1(1pRj)],πRi=πWRi=(1pF)j=1i1(1pRj)2[1+(1pF)+(1pF)i=2j=1i1(1pRj)].\left\{\begin{array}[]{c}\pi_{F}=\pi_{W_{F}}=\frac{1}{2\left[1+\left(1-p_{F}\right)+\left(1-p_{F}\right)\sum_{i=2}^{\infty}\prod_{j=1}^{i-1}\left(1-p_{R_{j}}\right)\right]},\\ \pi_{R_{i}}=\pi_{W_{R_{i}}}=\frac{\left(1-p_{F}\right)\prod_{j=1}^{i-1}\left(1-p_{R_{j}}\right)}{2\left[1+\left(1-p_{F}\right)+\left(1-p_{F}\right)\sum_{i=2}^{\infty}\prod_{j=1}^{i-1}\left(1-p_{R_{j}}\right)\right]}.\\ \end{array}\right. (2)

Let f~\tilde{f} and r~i\tilde{r}_{i} be the time-average probabilities that the UE stays at states FF and RiR_{i} during the time interval when the UE is busy with HOL-packet transmission. From (2), we can easily obtain f~\tilde{f} and r~i\tilde{r}_{i} as follows

f~=πFπF+3πWF+j=1πRj+3πWRj=12πF,\tilde{f}=\frac{\pi_{F}}{\pi_{F}+3\pi_{W_{F}}+\sum_{j=1}^{\infty}\pi_{R_{j}}+3\pi_{W_{R_{j}}}}=\frac{1}{2}\pi_{F}, (3)

and

r~i=πRiπF+3πWF+j=1πRj+3πWRj=12πRi.\tilde{r}_{i}=\frac{\pi_{\mathrm{R}_{i}}}{\pi_{F}+3\pi_{W_{F}}+\sum_{j=1}^{\infty}\pi_{R_{j}}+3\pi_{W_{R_{j}}}}=\frac{1}{2}\pi_{R_{i}}.

It follows that the probability that a UE is non-empty, denoted by α\alpha, is given by [16]

α=λf~1.\alpha=\lambda\tilde{f}^{-1}. (4)

Refer to caption

Figure 3: Markov chain of the competition process of an HOL packet.

III-B Attempt Rates

When UE 𝒜\mathcal{A} transmits the HOL packet for the first time, the average number of non-empty UEs seen by UE 𝒜\mathcal{A} is (N1)α(N-1)\alpha. Also, the probability that a UE is busy in transmission is f~+i=1r~i\tilde{f}+\sum_{i=1}^{\infty}\tilde{r}_{i}. The attempt rate seen by the packet in the first transmission is thus given by

GF=(N1)α(f~+i=1r~i)=α4(N1).G_{F}=(N-1)\alpha\left(\tilde{f}+\sum_{i=1}^{\infty}\tilde{r}_{i}\right)=\frac{\alpha}{4}(N-1). (5)

Intuitively, the attempt rate seen by the packet in the ii-th retransmission GRiG_{R_{i}} depends on the attempt rate seen by the packet in the (i1)(i-1)-th retransmission GRi1G_{R_{i-1}}. In the following, we first derive GR1G_{R_{1}} from GFG_{F}, and then calculate GRiG_{R_{i}} from GRi1G_{R_{i-1}}, where i=2,3,i=2,3,\cdots.

GR1G_{R_{1}} consists of two parts. Let g1g_{1} be the average number of UEs that do not compete for the same RB with UE 𝒜\mathcal{A} in 𝒜\mathcal{A}’s first transmission and send packets in 𝒜\mathcal{A}’s first retransmission, and g2g_{2} be the average number of UEs that fail in the competition with UE 𝒜\mathcal{A} in 𝒜\mathcal{A}’s first transmission. Clearly, GR1=g1+g2G_{R_{1}}=g_{1}+g_{2}.

Before calculating g1g_{1} and g2g_{2}, we need to know the condition probability Pr{SkH}\operatorname{Pr}\left\{S_{k}\mid H\right\}, where SkS_{k} is the event that kk UEs compete for the same RB with 𝒜\mathcal{A}, and HH is the event that 𝒜\mathcal{A} fails in the first transmission of HOL packet. According to the Bayes’ theorem

Pr{SkH}=Pr{HSk}Pr{Sk}Pr{H}.\operatorname{Pr}\left\{S_{k}\mid H\right\}=\frac{\operatorname{Pr}\left\{H\mid S_{k}\right\}\operatorname{Pr}\left\{S_{k}\right\}}{\operatorname{Pr}\{H\}}. (6)

When NN is sufficiently large, it is easy to show that the number of UEs sending packets in a TTI obeys the Poisson distribution, that is,

Pr{Sk}=(GFB)keGFBk!.\operatorname{Pr}\left\{S_{k}\right\}=\frac{\left(\frac{G_{F}}{B}\right)^{k}e^{-\frac{G_{F}}{B}}}{k!}. (7)

According to Ref. [17], the probability that 𝒜\mathcal{A} fails in the first transmission under the condition that kk UEs compete for the same RB with 𝒜\mathcal{A} is given by

Pr{HSk}=1eμρ(μ+1)k,\operatorname{Pr}\left\{H\mid S_{k}\right\}=1-\frac{e^{-\frac{\mu}{\rho}}}{(\mu+1)^{k}}, (8)

where ρ=P¯/σ2\rho=\bar{P}/\sigma^{2} is mean received signal-to-noise ratio (SNR). Also, Pr{H}\operatorname{Pr}\{H\} can be determined via the total probability formula as follows

Pr{H}\displaystyle\operatorname{Pr}\{H\} =k=0N1Pr{HSk}Pr{Sk}\displaystyle=\sum_{k=0}^{N-1}\operatorname{Pr}\left\{H\mid S_{k}\right\}\operatorname{Pr}\left\{S_{k}\right\}
k=0Pr{HSk}Pr{Sk},\displaystyle\rightarrow\sum_{k=0}^{\infty}\operatorname{Pr}\left\{H\mid S_{k}\right\}\operatorname{Pr}\left\{S_{k}\right\}, (9)

where we use the condition that NN is sufficiently large for the second step. We verify via simulation that the difference between the second and the third terms of (9) is less than 107610^{-76}, when N20N\geq 20 and B=20B=20. Substituting (7) through (9) into (6), we have

Pr{SkH}=(GFB)keGFBk![1eμρ(μ+1)k]1eμμ+1GFBμρ.\operatorname{Pr}\left\{S_{k}\mid H\right\}=\frac{\frac{\left(\frac{G_{F}}{B}\right)^{k}e^{-\frac{G_{F}}{B}}}{k!}\left[1-\frac{e^{-\frac{\mu}{\rho}}}{(\mu+1)^{k}}\right]}{1-e^{-\frac{\mu}{\mu+1}\frac{G_{F}}{B}-\frac{\mu}{\rho}}}. (10)

Consider the term GF/BG_{F}/B in (10). As Eq. (4) shows, GFλ^/(4f~)G_{F}\rightarrow\hat{\lambda}/(4\tilde{f}) when NN is sufficiently large. Also, the network must keep the successful probability of packet transmission very high to meet the strict delay requirement. This implies that f~\tilde{f} in (3) is approximately equal to 1/4. It follows that GFG_{F} is almost equal to λ^\hat{\lambda}. According to assumptions A3 and A5, GF/BG_{F}/B will be very small, such that eGF/B1GF/Be^{-G_{F}/B}\rightarrow 1-G_{F}/B. Our simulation verifies that GF=0.0286G_{F}=0.0286 and the difference eGF/B(1GF/B)e^{-G_{F}/B}-(1-G_{F}/B) is less than 10610^{-6} when B20B\geq 20 and N=20N=20. Therefore, (10) can be rewrote as follows

Pr{SkH}=(GFB)kk![1eμρ(μ+1)k]1eμρ(1μμ+1GFB).\operatorname{Pr}\left\{S_{k}\mid H\right\}=\frac{\frac{\left(\frac{G_{F}}{B}\right)^{k}}{k!}\left[1-\frac{e^{-\frac{\mu}{\rho}}}{(\mu+1)^{k}}\right]}{1-e^{-\frac{\mu}{\rho}}\left(1-\frac{\mu}{\mu+1}\frac{G_{F}}{B}\right)}. (11)

From (11), we can find that

  1. 1)

    When k=0k=0,

    Pr{S0H}=1eμρ1eμρ(1μμ+1GFB).\operatorname{Pr}\left\{S_{0}\mid H\right\}=\frac{1-e^{-\frac{\mu}{\rho}}}{1-e^{-\frac{\mu}{\rho}}\left(1-\frac{\mu}{\mu+1}\frac{G_{F}}{B}\right)}.
  2. 2)

    When k=1k=1,

    Pr{S1H}=GFB(1eμρμ+1)1eμρ(1μμ+1GFB).\operatorname{Pr}\left\{S_{1}\mid H\right\}=\frac{\frac{G_{F}}{B}\left(1-\frac{e^{-\frac{\mu}{\rho}}}{\mu+1}\right)}{1-e^{-\frac{\mu}{\rho}}\left(1-\frac{\mu}{\mu+1}\frac{G_{F}}{B}\right)}.
  3. 3)

    When k2k\geq 2, Pr{SkH}\operatorname{Pr}\left\{S_{k}\mid H\right\} becomes the high-order infinitesimal of GF/BG_{F}/B, indicating that the failure of 𝒜\mathcal{A} in the first transmission is induced by the collision with more than one UE with negligible probability.

In other words, when BB is sufficiently large, Pr{SkH}0\operatorname{Pr}\left\{S_{k}\mid H\right\}\rightarrow 0 for k2k\geq 2.

Let ss be the probability that a UE competes for the same RB with UE 𝒜\mathcal{A} in 𝒜\mathcal{A}’s first transmission, given that 𝒜\mathcal{A} fails in the first transmission. Using (11), we have

s=1N1i=0N1(k×Pr{SkH})=Pr{S1H}N1.s=\frac{1}{N-1}\sum_{i=0}^{N-1}\Big{(}k\times\operatorname{Pr}\left\{S_{k}\mid H\right\}\Big{)}=\frac{\operatorname{Pr}\left\{S_{1}\mid H\right\}}{N-1}.

It follows that (N1)(1s)(N-1)(1-s) is the average number of UEs that do not compete for the same RB with UE 𝒜\mathcal{A} in 𝒜\mathcal{A}’s first transmission. Each of these UEs will send a packet when 𝒜\mathcal{A} makes the first retransmission with probability α/4\alpha/4. Thus, we have

g1=(N1)(1s)α4=(1s)GF.g_{1}=(N-1)(1-s)\frac{\alpha}{4}=(1-s)G_{F}. (12)

As (11) indicates, 𝒜\mathcal{A} collides with at most 1 UE if it fails in the first transmission. If 𝒜\mathcal{A} collides with a UE and both of them fail, 𝒜\mathcal{A} will see this UE make a retransmission 4 TTIs later. In this case, this UE will contribute to g2g_{2}, which is the average number of UEs that fail in the competition with UE 𝒜\mathcal{A} in 𝒜\mathcal{A}’s first transmission. Let p1p_{1} be the probability that a UE fails in the competition with 𝒜\mathcal{A} when 𝒜\mathcal{A} sends a packet, given that 𝒜\mathcal{A} fails in the first transmission. According to Appendix A, we have

p1={121+μeμρ+1μ1+μe2μ(1μ)ρ11μ+1eμρ0<μ1121+μeμρ11μ+1eμρμ>1.p_{1}=\left\{\begin{array}[]{cl}\dfrac{1-\frac{2}{1+\mu}e^{-\frac{\mu}{\rho}}+\frac{1-\mu}{1+\mu}e^{-\frac{2\mu}{(1-\mu)\rho}}}{1-\frac{1}{\mu+1}e^{-\frac{\mu}{\rho}}}&0<\mu\leq 1\\ \dfrac{1-\frac{2}{1+\mu}e^{-\frac{\mu}{\rho}}}{1-\frac{1}{\mu+1}e^{-\frac{\mu}{\rho}}}&\mu>1\end{array}\right.. (13)

Combining (13) with the fact that the failure of 𝒜\mathcal{A} in the first transmission is induced by the collision with at most one UE yields g2=0×Pr{S0H}+1×p1Pr{S1H}g_{2}=0\times\operatorname{Pr}\left\{S_{0}\mid H\right\}+1\times p_{1}\operatorname{Pr}\left\{S_{1}\mid H\right\}. As a result, the attempt rate seen by 𝒜\mathcal{A} in the first retransmission is equal to

GR1\displaystyle G_{R_{1}} =g1+g2\displaystyle=g_{1}+g_{2}
={1GFB(1eμρμ+1)(N1)[1eμρ(1μμ+1GFB)]}GF\displaystyle=\left\{1-\frac{\frac{G_{F}}{B}\left(1-\frac{e^{-\frac{\mu}{\rho}}}{\mu+1}\right)}{(N-1)\left[1-e^{-\frac{\mu}{\rho}}\left(1-\frac{\mu}{\mu+1}\frac{G_{F}}{B}\right)\right]}\right\}G_{F}
+p1GFB(1eμρμ+1)1eμρ(1μμ+1GFB).\displaystyle+\frac{p_{1}\frac{G_{F}}{B}\left(1-\frac{e^{-\frac{\mu}{\rho}}}{\mu+1}\right)}{1-e^{-\frac{\mu}{\rho}}\left(1-\frac{\mu}{\mu+1}\frac{G_{F}}{B}\right)}. (14)

Following the similar argument, we can derive GRiG_{R_{i}} as follows

GRi\displaystyle G_{R_{i}} ={1GRi1B(1eμρμ+1)(N1)[1eμρ(1μμ+1GRi1B)]}GF\displaystyle=\left\{1-\frac{\frac{G_{R_{i-1}}}{B}\left(1-\frac{e^{-\frac{\mu}{\rho}}}{\mu+1}\right)}{(N-1)\left[1-e^{-\frac{\mu}{\rho}}\left(1-\frac{\mu}{\mu+1}\frac{G_{R_{i-1}}}{B}\right)\right]}\right\}G_{F}
+p1GRi1B(1eμρμ+1)1eμρ(1μμ+1GRi1B),\displaystyle+\frac{p_{1}\frac{G_{R_{i-1}}}{B}\left(1-\frac{e^{-\frac{\mu}{\rho}}}{\mu+1}\right)}{1-e^{-\frac{\mu}{\rho}}\left(1-\frac{\mu}{\mu+1}\frac{G_{R_{i-1}}}{B}\right)}, (15)

where i=2,3,i=2,3,\cdots.

To clearly demonstrate the relationship between GFG_{F} and GRiG_{R_{i}}, we consider the ideal wireless channel, where there is no noise [18]. In this case, the mean SNR ρ=P¯/σ2\rho=\bar{P}/\sigma^{2}\rightarrow\infty and μ/ρ0\mu/\rho\rightarrow 0, and thus

GRi=(11N1)GF+p1,G_{R_{i}}^{*}=\left(1-\frac{1}{N-1}\right)G_{F}^{*}+p_{1}^{*}, (16)

where

p1=limρp1={0 if 0<μ111/μμ>1.p_{1}^{*}=\lim_{\rho\rightarrow\infty}p_{1}=\left\{\begin{array}[]{cc}0&\text{ if }0<\mu\leq 1\\ 1-1/\mu&\mu>1\end{array}\right..

In the case of ideal channel, Eq. (16) shows that GR1=GR2==GRGF+p1G_{R_{1}}^{*}=G_{R_{2}}^{*}=\cdots=G_{R_{\infty}}^{*}\approx G_{F}^{*}+p_{1}^{*}, where p1p_{1}^{*} is actually the reduction of g2g_{2} and is contributed by the UE who fails in the competition with 𝒜\mathcal{A} in the last transmission. This result is formally stated by the following theorem.

Theorem 1.

If the number of RBs is sufficiently large such that the attempt rate on each RB is very small and the channel has no noise, all the attempt rates GR1,GR2,G_{R_{1}}^{*},G_{R_{2}}^{*},\cdots seen by a UE in retransmissions are the same, and are approximately increased by p1p_{1}^{*} when compared with the attempt rate GFG_{F}^{*} seen by the UE in the first transmission.

Note that if the SINR threshold μ\mu satisfies 0<μ10<\mu\leq 1, the difference p1=0p_{1}^{*}=0, which means the UE in collision with 𝒜\mathcal{A} in the last transmission succeeds. This can be interpreted as follows. The ideal channel has no additive noise, i.e., σ2=0\sigma^{2}=0. In this case, the SINRs of 𝒜\mathcal{A} and the UE in collision with 𝒜\mathcal{A} are reciprocal of each other, according to (1). It follows that given 𝒜\mathcal{A} fails, i.e., its SINR is less than 1, the SINR of the other UE must be larger than 1 and thus succeed in the competition.

As Eqs. (14) and (15) exhibit, the relationship between GFG_{F} and GRiG_{R_{i}} in general cases is quite complicated. We thus use numerical results and simulations to demonstrate that Theorem 1 approximately holds. For a channel in general cases, it is necessary to keep the mean received SNR ρ\rho much larger than the SINR threshold μ\mu, i.e., μ/ρ1\mu/\rho\ll 1, such that very high reliability of URLLC service can be guaranteed. Under this condition, Fig. 4 plots GRiG_{R_{i}} as a function of retransmission times ii, where the UE population is N=100N=100, the number of RBs is B=48B=48, the average power of additive noise is σ2=112\sigma^{2}=-112dBm, and the mean received power of packets is P¯=60dBm\bar{P}=-60\mathrm{dBm} [19]. Note that GR0G_{R_{0}} in Fig. 4 stands for GFG_{F}, as we mark. From the result, we can find that the difference among the GRiG_{R_{i}}s is much smaller than that between GRiG_{R_{i}} and GFG_{F}, except when 0<μ10<\mu\leq 1.

Refer to caption

Figure 4: Effect of 1-pR on the attempt rates seen by a UE in different rounds of retransmission, where σ2=112\sigma^{2}=-112dBm, P¯=60\bar{P}=-60dBm, N=100N=100, B=48B=48 and λ=10\lambda=10packets/s.

IV Delay Performance Analysis

This section studies the user-plane delay, denoted by DD. Different from the previous works [5, 7, 8, 9, 10], we take into consideration the queueing process of packets. Following the idea of two-stage queueing model reported in [16, 20, 21], we model each UE as an M/G/1 queue, where the time from when the packet becomes an HOL packet to when the UE finishes processing an ACK from the BS is treated as the service time of a packet and denoted by XX. Using the result of Theorem 1, we first derive XX in section IV-A, and then the distribution of DD in section IV-B.

IV-A Service Time of an HOL Packet

Section III demonstrates that all the GRiG_{R_{i}}s are almost equal. This indicates that it is reasonable to adopt the following simplification:
(*) All the attempt rates seen by the packet in different rounds of retransmission are all equal,
when we solve the service time, such that the derivation can be largely simplified. Accordingly, the Markov chain in Fig. 3 reduces to a four-state Markov chain in Fig. 5, where there is a first-transmission state F^\widehat{F}, a waiting state after the first transmission W^F\widehat{W}_{F}, a retransmission state R^\widehat{R}, and a waiting state after the retransmission W^R\widehat{W}_{R}. In the simplified model, the attempt rates seen by the packet in the first transmission and the packet in retransmissions are denoted as G^F\widehat{G}_{F} and as G^R\widehat{G}_{R}, respectively. In Fig. 5, p^F\widehat{p}_{F} and p^R\widehat{p}_{R} denote the successful probabilities of the first transmission and the retransmissions, respectively.

Refer to caption

Figure 5: Simplified Markov chain of the competition process of an HOL packet.

According to the simplified Markov chain in Fig. 5, we can obtain the stationary probabilities of F^\widehat{F}, W^F\widehat{W}_{F}, R^\widehat{R}, and W^R\widehat{W}_{R} as follows

πF^=πW^F=p^R2(1+p^Rp^F),\pi_{\hat{F}}=\pi_{\widehat{W}_{F}}=\frac{\hat{p}_{R}}{2\left(1+\hat{p}_{R}-\hat{p}_{F}\right)},

and

πR^=πW^R=1p^F2(1+p^Rp^F),\pi_{\hat{R}}=\pi_{\widehat{W}_{R}}=\frac{1-\hat{p}_{F}}{2\left(1+\hat{p}_{R}-\hat{p}_{F}\right)},

from which we further obtain the non-empty probability

α^=2λπF^=4(1+p^Rp^F)λp^R.\hat{\alpha}=\frac{2\lambda}{\pi_{\hat{F}}}=\frac{4\left(1+\hat{p}_{R}-\hat{p}_{F}\right)\lambda}{\hat{p}_{R}}.

Accordingly, we have

G^F=(N1)α^/4,\widehat{G}_{F}=(N-1)\hat{\alpha}/4, (17)

and

G^R\displaystyle\widehat{G}_{R} ={1G^FB(1eμρμ+1)(N1)[1eμρ(1μμ+1G^FB)]}G^F\displaystyle=\left\{1-\frac{\frac{\widehat{G}_{F}}{B}\left(1-\frac{e^{-\frac{\mu}{\rho}}}{\mu+1}\right)}{(N-1)\left[1-e^{-\frac{\mu}{\rho}}\left(1-\frac{\mu}{\mu+1}\frac{\hat{G}_{F}}{B}\right)\right]}\right\}\hat{G}_{F}
+p1G^FB(1eμρμ+1)1eμρ(1μμ+1G^FB).\displaystyle+\frac{p_{1}\frac{\widehat{G}_{F}}{B}\left(1-\frac{e^{-\frac{\mu}{\rho}}}{\mu+1}\right)}{1-e^{-\frac{\mu}{\rho}}\left(1-\frac{\mu}{\mu+1}\frac{\hat{G}_{F}}{B}\right)}. (18)

Following the argument that the packet can successfully transmitted if the received SINR is larger than the preset threshold μ\mu, we drive p^F\widehat{p}_{F} and p^R\widehat{p}_{R} according to (17) and (18) as follows

p^F=eμρ(1μμ+1G^FB),\hat{p}_{F}=e^{-\frac{\mu}{\rho}}\left(1-\frac{\mu}{\mu+1}\frac{\widehat{G}_{F}}{B}\right), (19)

and

p^R=eμρ(1μμ+1G^RB).\hat{p}_{R}=e^{-\frac{\mu}{\rho}}\left(1-\frac{\mu}{\mu+1}\frac{\widehat{G}_{R}}{B}\right). (20)

In this case of ideal channel where μ/ρ0\mu/\rho\rightarrow 0, (18), (19) and (20) can be simplified as follows

G^R=(11N1)G^F+p1=α^4(N2)+p1,\hat{G}_{R}^{*}=\left(1-\frac{1}{N-1}\right)\hat{G}_{F}+p_{1}^{*}=\frac{\hat{\alpha}}{4}(N-2)+p_{1}^{*},
p^F=1μμ+1α^4B(N1),\hat{p}_{F}^{*}=1-\frac{\mu}{\mu+1}\frac{\hat{\alpha}}{4B}(N-1),

and

p^R=(11N1)p^Fμμ+1p1B.\hat{p}_{R}^{*}=\left(1-\frac{1}{N-1}\right)\hat{p}_{F}^{*}-\frac{\mu}{\mu+1}\frac{p_{1}^{*}}{B}.

These two equations indicate that pRp_{R}^{*} is less than pFp_{F}^{*} by a constant, which is the consequence of (16).

As Fig. 5 shows, a UE may need several attempts for a successful transmission. The service time is 4 TTIs if the first transmission is successful with probability pFp_{F}, and 4+4i4+4i if the packet is sent successfully until the ii-th retransmission with probability (1p^F)p^R(1p^R)i1\left(1-\hat{p}_{F}\right)\hat{p}_{R}\left(1-\hat{p}_{R}\right)^{i-1}. It follows that the distribution of service time XX is given by

Pr{X=x}={p^Fx=4(1p^F)(1p^R)i1p^Rx=4(i+1)0 otherwise ,\operatorname{Pr}\{X=x\}=\left\{\begin{array}[]{cc}\hat{p}_{F}&x=4\\ \left(1-\hat{p}_{F}\right)\left(1-\hat{p}_{R}\right)^{i-1}\hat{p}_{R}&x=4(i+1)\\ 0&\text{ otherwise }\end{array}\right., (21)

where i=1,2,3i=1,2,3\cdots.

IV-B User-plane Delay Distribution

As Fig. 6 plots, the user-plane delay of packet 𝒶\mathcal{a} consists of the following parts. After arriving at the UE, 𝒶\mathcal{a} will experience an alignment delay, denoted by AA, which is the time interval from the arrival to the start of the next TTI. After that, 𝒶\mathcal{a} enters the queue and experiences a waiting time, denoted by WW, which includes the following two components. First, 𝒶\mathcal{a} has to wait a residual service time, denoted by RR, if 𝒶\mathcal{a} sees a packet in service when it enters the queue. Second, 𝒶\mathcal{a} may need to wait the service completion of the packets waiting in the queue before 𝒶\mathcal{a}. After 𝒶\mathcal{a} becomes an HOL packet, it will be successfully decoded by the BS after X2X-2 TTIs, called transmission time and denoted by ZZ. Thus, the user-plane delay is given by

D=A+W+Z=A+W+X2.D=A+W+Z=A+W+X-2. (22)

Refer to caption

Figure 6: User-plane delay of packet 𝒶\mathcal{a} is equal to D=A+W+ZD=A+W+Z.

The packet can be removed from the buffer of UE, only when the UE finishes processing an ACK from the BS. Let V=W+XV=W+X be the sojourn time that the packet spends in the queue. Let d(t)d(t), w(t)w(t) and v(t)v(t) be the probability density functions (PDFs) of the user-plane delay, the waiting time and the sojourn time, the Laplace transforms of which are respectively denoted by D(s)D(s), W(s)W(s), and V(s)V(s). According to (22), D(s)=A(s)W(s)X(s)e2s=A(s)V(s)e2sD(s)=A(s)W(s)X(s)e^{2s}=A(s)V(s)e^{2s}.

According to the P-K formula of M/G/1 queue [22], V(s)V(s) is given by

V(s)=(1λX¯)ssλ+λX(s)X(s),V(s)=\frac{(1-\lambda\bar{X})s}{s-\lambda+\lambda X(s)}X(s), (23)

where X¯E[X]=4(1+p^Rp^F)/p^R,\bar{X}\triangleq E[X]=4\left(1+\hat{p}_{R}-\hat{p}_{F}\right)/\hat{p}_{R}, and X(s)X(s) is the Laplace transform of (21)

X(s)=p^Fe4s+(1p^F)p^Re8s1(1p^R)e4s.X(s)=\hat{p}_{F}e^{-4s}+\frac{\left(1-\hat{p}_{F}\right)\hat{p}_{R}e^{-8s}}{1-\left(1-\hat{p}_{R}\right)e^{-4s}}. (24)

Also, since the arrival process of packets at the UE is a Poisson process, AA is a uniformly distributed random variable in the range between 0 and 1 TTI, the Laplace transform of which is given by

A(s)=1s(1es).A(s)=\frac{1}{s}\left(1-e^{-s}\right). (25)

Substituting (23), (24), and (25) into D(s)D(s)

D(s)=1s(e2ses)(1λX¯)ssλ+λX(s)X(s).D(s)=\frac{1}{s}\left(e^{2s}-e^{s}\right)\frac{(1-\lambda\bar{X})s}{s-\lambda+\lambda X(s)}X(s). (26)

We can obtain d(t)d(t) through the inversion transform of (26), and finally the delay distribution D(t)D(t).

V Numerical Discussions

In the scenario where the group of UEs is relatively fixed in the coverage of a BS, we show that it is necessary to take into account the effect of 1-pR and queueing process of packets in the analytical model to provide an accurate performance prediction. We further show that this is especially important if we employ the analytical results to aid system design. We demonstrate this point through the comparison of analytical results and simulations, where we assume that the additive noise of wireless channel is σ2=112\sigma^{2}=-112dBm, the average received power is P¯=60\bar{P}=-60dBm [19], and the SINR threshold of the BS receiver is μ=4\mu=4dB.

V-A Effect of 1-pR on Model Accuracy

As sections III and IV discuss, the 1-pR will cause the attempt rate seen by the packet in retransmissions larger than that in the first transmission. It follows that the 1-pR will lower the successful probability of packet retransmission, which will enlarge the distribution tail of user-plane delay. This implies that whether to consider the effect of 1-pR in the analysis would have a significant impact on the accuracy of the analytical results.

To better verify this point, we first derive the distribution of user-plane delay without considering the effect of 1-pR for comparison. Ignoring the effect of 1-pR is equivalent to set p^R=p^F=p~\hat{p}_{R}=\hat{p}_{F}=\tilde{p} in Fig. 3. Following the similar derivation process in section IV, we have

p~=12eμρ(1+14eμρ(N1)μλB(μ+1)),\tilde{p}=\frac{1}{2}e^{-\frac{\mu}{\rho}}\left(1+\sqrt{1-\frac{4e^{\frac{\mu}{\rho}}(N-1)\mu\lambda}{B(\mu+1)}}\right),

and

D~(s)=1s(e2ses)(14λ/p~)ssλ+λX~(s)X~(s),\widetilde{D}(s)=\frac{1}{s}\left(e^{2s}-e^{s}\right)\frac{(1-4\lambda/\tilde{p})s}{s-\lambda+\lambda\tilde{X}(s)}\widetilde{X}(s), (27)

where

X~(s)=p~e8s1(1p~)e4s,\tilde{X}(s)=\frac{\tilde{p}e^{-8s}}{1-(1-\tilde{p})e^{-4s}},

is the Laplace transform of the PDF of the service time when the effect of 1-pR is ignored.

Using (26) and (27), Fig. 7 compares the complementary cumulative distribution functions (CCDFs) of user-plane delay when the effect of 1-pR is or is not considered in the analysis. The input traffic rates to a UE in Fig. 7(a) and 7(b) are 5 and 10 packets/s. As Fig. 7 plots, the curves are roughly stair-like, and the ii-th step describes the delay distribution of packets that are transmitted ii times before success. Since the 1-pR is considered in the derivation of (26), our analytical result DD agrees with the simulation result very well. As a comparison, D~\widetilde{D} in (27) that is obtained by assuming p^R=p^F\hat{p}_{R}=\hat{p}_{F} has a remarkable error on the second step. This is attributed to the reason that the assumption p^R=p^F\hat{p}_{R}=\hat{p}_{F} overestimates the successful probability of retransmission, which leads to the curve of D~\widetilde{D} is lower than the simulation curve in the second step. This clearly indicates that taking into consideration the effect of 1-pR in delay analysis is necessary.

Refer to caption
(a) λ=5\lambda=5 packets/s
Refer to caption
(b) λ=10\lambda=10 packets/s
Figure 7: Effect of the 1-pR on delay performance, where N=40N=40, B=48B=48, σ2=112\sigma^{2}=-112dBm, P¯=60\bar{P}=-60dBm and μ=4\mu=4dB.

V-B Effect of Queueing Process on Model Accuracy

Though the arrive rate of URLLC traffic is very low, it is still necessary to consider the effect of queueing process on the user-plane delay. We demonstrate this point by comparing the delay performance with and without considering the queueing process. Let DnqD_{nq} be the user-plane delay when the arriving packet is assumed to see the UE with empty queue. The user-plane delay in this case consists of the alignment delay AA and the transmission delay ZZ, i.e., Dnq=A+Z=A+X2D_{nq}=A+Z=A+X-2. Let dnq(t)d_{nq}(t) be the PDF of DnqD_{nq}. Using (24) and (25), we have

dnq(t)={p^F2t<3(1p^F)(1p^R)i1p^R2+4it<3+4i0 otherwise d_{nq}(t)=\left\{\begin{array}[]{cc}\hat{p}_{F}&2\leq t<3\\ \left(1-\hat{p}_{F}\right)\left(1-\hat{p}_{R}\right)^{i-1}\hat{p}_{R}&2+4i\leq t<3+4i\\ 0&\text{ otherwise }\end{array}\right. (28)

where i=1,2,3i=1,2,3\cdots. From (28), we can obtain Dnq(t)D_{nq}(t).

We compare DnqD_{nq}, DD, and simulation in Fig. 8, where the input traffic rates to a UE are 5 and 10 packets/s. A packet will have to wait several TTIs in the buffer before transmission if it sees a nonempty queue when it arrives at the UE. Therefore, the stair-like curves of the simulation result and DD are sloped in each step, as Fig. 8 plots. However, if we assume that the arriving packet always sees an empty UE, the user-plane delay will not take some specific values. For example, the user-plane delay in this case will not take values like 4 and 5, as (28) shows. Accordingly, in Fig. 8, there includes a horizontal line segment in each step of the curve of DnqD_{nq}, e.g., the horizontal line segment from the 3rd TTI to the 6th TTI in the first step. This makes the curve of DnqD_{nq} remarkably lower than that of the simulation and DD at each step.

Refer to caption
(a) λ=5\lambda=5 packets/s
Refer to caption
(b) λ=10\lambda=10 packets/s
Figure 8: Effect of the queueing process on delay performance, where N=40N=40, B=48B=48, σ2=112\sigma^{2}=-112dBm, P¯=60\bar{P}=-60dBm and μ=4\mu=4dB.

We further observe the impact of queueing process on user-plane delay under different input traffic rates to a UE, while fixing the aggregate input traffic rate λ^=200\hat{\lambda}=200 packets/s. It is very interesting to see from Fig. 9 that the curve of small NN and relatively large λ\lambda is higher than that of large NN and relatively small λ\lambda in each step. This clearly indicates that the input traffic rate has a greater impact on the delay performance than the UE population, because an arriving packet in the case with relatively large λ\lambda and small NN will have more chance to see a non-empty UE and hence suffer a larger queueing delay. In particular, the access network in the case with λ=10\lambda=10 packets/s and N=20N=20 already cannot meet the reliability requirement that the user-plane delay of >99.999%>99.999\% packets should be less than 1ms. This suggests that, due to the impact of queueing process, we should consider the traffic rate to each UE λ\lambda, not just the aggregate rate λ^\hat{\lambda}, in the system design.

Refer to caption

Figure 9: CCDF of user-plane delay under different λ\lambdas, where λ^=200\hat{\lambda}=200 packets/s, B=48B=48 and μ=4\mu=4dB.

V-C Applications in System Design

Compared to the simulation, the analytical result can obtain the outage probability very fast, such that it can be used to assist the design of networks. In practice, the BS is able to know if there is a UE that newly joins or departs from its coverage, via Dual Active Protocol Stack [23]. Hence, a possible application of analytical results is to assign a proper number of RBs, denoted by BB^{*}, to the URLLC traffic, according to the channel state, the number of UEs, and the input traffic rate to a UE . However, if the analytical model is not accurate enough, it will exert a negative influence on system configuration, as we demonstrate below.

The outage probability, denoted by PoP_{o}, is defined as the probability that the user-plane delay of a packet is larger than a preset threshold. According to the 3GPP standard [2], PoP_{o}, must be less than 105,10^{-5}, given that the delay threshold is 1ms. Clearly, the outage probability can be easily calculated from the PDF of user-plane delay. For example, we can find the outage probability using d(t)d(t):

Po=107d(t)𝑑t.P_{o}=1-\int_{0}^{7}d(t)dt.

Assuming that σ2\sigma^{2}, P¯\bar{P}, NN, and λ\lambda are known, we find the proper number of RBs BB^{*} via a simple method as follows. Initially, select a BB and calculate PoP_{o}. If Po>105P_{o}>10^{-5}, increase BB by a step size b<Bb<B and recalculate PoP_{o}. Repeat the process until Po<105P_{o}<10^{-5}. We plot PoP_{o} as a function of BB, and find the intersection of the curve with the line Po=105P_{o}=10^{-5}. The rounding up of the abscissa of the intersection point is the BB^{*} to be found. If the initial PoP_{o} is small than 10510^{-5}, we can find BB^{*} in the similar way. Table I compares the BB^{*} predicted by simulation, DD, D~\tilde{D}, and DnqD_{nq}, where λ=5\lambda=5 packets/s and NN changes from 40 to 100. It can be seen that DD can provide an exact prediction, while D~\widetilde{D} and DnqD_{nq} lead to a remarkably underestimated BB^{*}. Clearly, the underestimation of BB^{*} will lead to a bad consequence that the reliability cannot be guaranteed. For example, when N=60N=60, the BB^{*}s predicted by D~\widetilde{D} and DnqD_{nq} are 29 and 39, respectively. If we employ these predicted BB^{*}s, our simulation shows that the outage probabilities would be 2.4×1052.4\times 10^{-5} and 1.7×1051.7\times 10^{-5}, respectively, which are higher than 10510^{-5}.

TABLE I: σ2=112\sigma^{2}=-112dBm, P¯=60\bar{P}=-60dBm, and λ=5\lambda=5packets/s
NN BB^{*} by sim BB^{*} by DD BB^{*} by D~\widetilde{D} BB^{*} by DnqD_{nq}
40 47 47 20 32
60 60 60 29 39
80 73 73 39 45
100 84 84 49 52

Note that we also consider the case where λ=10\lambda=10 packets/s. We fail to find a BB^{*} such that the network can support, no matter what value NN takes and whether we use the simulation or the analytical model. This is because a considerable portion of packets will experience the queueing process. In this case, some additional mechanism should be taken to eliminate the queue delay, such as 4 stop-and-wait (SAW) channel discussed in [4].

V-D Case Study: A Dynamic Scenario

Our model is developed under the assumption that the group of UEs in the coverage of a BS is fixed. However, the UE in reality may move from one cell to another. We thus verify the effectiveness of our model in a dynamic scenario, where the UE group changes slowly.

To do that, we make the following assumptions. We assume the radius of a cell is 250m [24], and the moving speed of a UE is 30km/h, meaning that a UE will leave a cell with probability pl=2.3×106p_{l}=2.3\times 10^{-6} in each TTI. Let NtN_{t} be the number of UEs in TTI tt and N¯\bar{N} be the average number of UEs in a cell. Suppose that the average number of UEs moving into a cell is (2N¯Nt)pl\left(2\bar{N}-N_{t}\right)p_{l}, such that NtN_{t} fluctuates around N¯\bar{N}. At last, we assume that the channel condition keeps unchanged.

To utilize the analytical results in such a dynamic scenario, we calculate the BB^{*}s for all possible NNs beforehand and store them in a table similar to Table I. Once the BS detects the variation of NtN_{t}, it adjusts BB^{*} according to the table, such that spectrum utilization can be enhanced.

We perform simulation according to the above description. Table II gives the outage probability when the BS adjusts the number of RBs according to NtN_{t}, using DD, D~\widetilde{D} and DnqD_{nq}, and confirms that the adjustment based on DD can ensure an outage probability of less than 10510^{-5} in the dynamic situation.

TABLE II: σ2=112\sigma^{2}=-112dBm, P¯=60\bar{P}=-60dBm, and λ=5\lambda=5packets/s
pop_{o} of DD pop_{o} of D~\widetilde{D} pop_{o} of DnqD_{nq}
9.24×1069.24\times 10^{-6} 3×1053\times 10^{-5} 1.65×1051.65\times 10^{-5}

VI Conclusion

This paper studies the impact of 1-pR on the competition process of packets when the UE group under the coverage of a BS is relatively fixed. We derive the distribution of user-plane delay, taking into account the queueing process. We verify our analytical result via simulation. According to our analysis, we have the following findings:

  1. a)

    The 1-pR increases the attempt rate seen by retransmitted packets, and thus reduces the successful probability of retransmission;

  2. b)

    The user-plane delay will be underestimated if the analytical model does not consider the effect of 1-pR;

  3. c)

    Though only a few packets suffer queueing process, it is already enough to affect the delay performance.

We further apply our analytical result to system configuration, and show that it can ensure an outage probability of less than 10510^{-5}. In the future, we will extend our model to analyze the Reactive with multiple SAW channels and the K-repetition.

Appendix A Derivation of p1p_{1}

Recall that p1p_{1} is the probability that a UE, denoted by \mathcal{B}, fails in the competition with a specific UE 𝒜\mathcal{A} when 𝒜\mathcal{A} transmits the HOL packet for the first time, given that 𝒜\mathcal{A} fails in the first transmission, S1S_{1} is the event that \mathcal{B} competes with 𝒜\mathcal{A} for the same RB when 𝒜\mathcal{A} sends its HOL packet for the first time, and HH is the event that 𝒜\mathcal{A} fails in the first transmission of HOL packet. Let EE be the event that a UE fails in the competition with 𝒜\mathcal{A}. p1p_{1} can be represented as follows:

p1=Pr{EH,S1}=Pr{E,HS1}Pr{HS1},p_{1}=\operatorname{Pr}\left\{E\mid H,S_{1}\right\}=\frac{\operatorname{Pr}\left\{E,H\mid S_{1}\right\}}{\operatorname{Pr}\left\{H\mid S_{1}\right\}}, (A-1)

Pr{E,HS1}\operatorname{Pr}\left\{E,H\mid S_{1}\right\} is the probability that \mathcal{B} and 𝒜\mathcal{A} compete for the same RB and both of them fail in packet transmission. Let |h𝒜|2\left|h_{\mathcal{A}}\right|^{2} and |h|2\left|h_{\mathcal{B}}\right|^{2} be the channel power gains of 𝒜\mathcal{A} and \mathcal{B}, respectively. According to [5], the channel power gain is an exponential distributed random variable with parameter 1. Assume that |h𝒜|2\left|h_{\mathcal{A}}\right|^{2} and |h|2\left|h_{\mathcal{B}}\right|^{2} are independent. The joint PDF of |h𝒜|2\left|h_{\mathcal{A}}\right|^{2} and |h|2\left|h_{\mathcal{B}}\right|^{2} is given by f(γ1,γ2)=eγ1γ2f\left(\gamma_{1},\gamma_{2}\right)=e^{-\gamma_{1}-\gamma_{2}}, where γ1>0\gamma_{1}>0 and γ2>0\gamma_{2}>0. It follows that

Pr{E,HS1}=Uf(γ1,γ2)𝑑γ1𝑑γ2,\operatorname{Pr}\left\{E,H\mid S_{1}\right\}=\iint_{U}f\left(\gamma_{1},\gamma_{2}\right)d\gamma_{1}d\gamma_{2}, (A-2)

where the domain of integration UU is defined by following inequalities:

P¯γ1σ2+P¯γ2μ,\frac{\bar{P}\gamma_{1}}{\sigma^{2}+\bar{P}\gamma_{2}}\leq\mu,

and

P¯γ2σ2+P¯γ1μ,\frac{\bar{P}\gamma_{2}}{\sigma^{2}+\bar{P}\gamma_{1}}\leq\mu,

which means both 𝒜\mathcal{A} and \mathcal{B} fail because of insufficient received SINR. Substituting (8) with k=1k=1 and (A-2) into (A-1), we finally obtain (13) in section III.

References

  • [1] L. Zhao, X. Chi, L. Qian, and W. Chen, “Analysis on latency-bounded reliability for adaptive grant-free access with multipackets reception (MPR) in URLLCs,” IEEE Commun. Lett., vol. 23, no. 5, pp. 892–895, 2019.
  • [2] 3GPP, “Study on scenarios and requirements for next generation access technologies,” Technical Specification Group Radio Access Network, Technical Report 38.913, 2016.
  • [3] J. Ding, M. Nemati, S. R. Pokhrel, O.-S. Park, J. Choi, and F. Adachi, “Enabling grant-free URLLC: an overview of principle and enhancements by massive MIMO,” IEEE Internet Things J., vol. 9, no. 1, pp. 384–400, 2022.
  • [4] T. Jacobsen, R. Abreu, G. Berardinelli, K. Pedersen, P. Mogensen, I. Z. Kovács, and T. K. Madsen, “System level analysis of uplink grant-free transmission for URLLC,” in Proc. IEEE GLOBECOM, 2017, pp. 1–6.
  • [5] Y. Liu, Y. Deng, M. Elkashlan, A. Nallanathan, and G. K. Karagiannidis, “Analyzing grant-free access for URLLC service,” IEEE J. Sel. Areas Commun., vol. 39, no. 3, pp. 741–755, 2020.
  • [6] P. K. Wong, D. Yin, and T. T. Lee, “Performance analysis of markov modulated 1-persistent CSMA/CA protocols with exponential backoff scheduling,” Wireless Netw., vol. 17, no. 8, pp. 1763–1774, 2011.
  • [7] N. Zhang, H. Zhang, and J.-B. Wang, “Analyzing uplink outage probability of grant-free access and retransmission for URLLC,” in Proc. IEEE WCSP, 2021, pp. 1–6.
  • [8] N. Zhang, H. Zhang, and J.-B. Wang, “Performance analysis of repetition-based grant-free access for URLLC,” in Proc. IEEE ICCC, 2021, pp. 1738–1742.
  • [9] J. V. Evangelista, G. Kaddoum, and Z. Sattar, “Reliability and user-plane latency analysis of mmWave massive MIMO for grant-free URLLC applications,” arXiv preprint arXiv:2107.08151, 2021.
  • [10] Y. Xie and P. Ren, “Reliability analysis of grant-free uplink data transmission for URLLC,” in Proc. IEEE GLOBECOM, 2021, pp. 1–5.
  • [11] Z. Gong and M. Haenggi, “Interference and outage in mobile random networks: expectation, distribution, and correlation,” IEEE Trans. Mobile Comput., vol. 13, no. 2, pp. 337–349, 2012.
  • [12] B. Chang, L. Li, G. Zhao, Z. Chen, and M. A. Imran, “Autonomous D2D transmission scheme in URLLC for real-time wireless control systems,” IEEE Trans. Commun., vol. 69, no. 8, pp. 5546–5558, 2021.
  • [13] M. Li, X. Guan, C. Hua, C. Chen, and L. Lyu, “Predictive pre-allocation for low-latency uplink access in industrial wireless networks,” in Proc. IEEE INFOCOM, 2018, pp. 306–314.
  • [14] D. J. Goodman and A. A. Saleh, “The near/far effect in local aloha radio communications,” IEEE Trans. Veh. Technol., vol. 36, no. 1, pp. 19–27, 1987.
  • [15] J. E. Wieselthier, G. D. Nguyen, and A. Ephremides, “Throughput (bits/sec/hz) of capture-based random-access systems with SINR channel models,” in Proc. IEEE ISIT, 2007, pp. 2401–2405.
  • [16] P. K. Wong, D. Yin, and T. T. Lee, “Analysis of non-persistent CSMA protocols with exponential backoff scheduling,” IEEE Trans. Commun., vol. 59, no. 8, pp. 2206–2214, 2011.
  • [17] A. Dua, “Random access with multi-packet reception,” IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2280–2288, 2008.
  • [18] S. Kandukuri and S. Boyd, “Optimal power control in interference-limited fading wireless channels with outage-probability specifications,” IEEE Trans. Wireless Commun., vol. 1, no. 1, pp. 46–55, 2002.
  • [19] W. Tang, R. Zhang, and S. Feng, “A spatiotemporal model for hard-deadline multistream traffic in uplink IoT networks,” IEEE Internet Things J., vol. 9, no. 1, pp. 601–615, 2022.
  • [20] P. K. Wong, D. J. Yin, and T. T. Lee, “Throughput analysis of CSMA protocol with exponential backoff,” in Proc. IEEE WOCC, 2010, pp. 1–5.
  • [21] H. Huang, T. Ye, T. T. Lee, and W. Sun, “Delay and stability analysis of connection-based slotted-aloha,” IEEE/ACM Trans. Netw., vol. 29, no. 1, pp. 203–219, 2021.
  • [22] L. Kleinrock, Queueing Systems. Volume 1: Theory.   Wiley-Interscience, 1975, pp. 196–199.
  • [23] C. Lee, J. Jung, and J.-M. Chung, “Intelligent dual active protocol stack handover based on double DQN deep reinforcement learning for 5G mmWave networks,” IEEE Trans. Veh. Technol., vol. 71, no. 7, pp. 7572–7584, 2022.
  • [24] L. Zhang, X. Chen, and Y. Ma, “A similarity-based method for base station selection in 5G networks,” in Proc. IEEE ISPA, 2021, pp. 1060–1066.