This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Bounding Queue Length Violation Probability of Joint Channel and Buffer Aware Transmission

Lintao Li12, Wei Chen12, Senior Member, IEEE, and Khaled B. Letaief34, Fellow, IEEE 1Department of Electronic Engineering, Tsinghua University, Beijing, 100084, CHINA 2Beijing National Research Center for Information Science and Technology (BNRist) 3School of Engineering, Hong Kong University of Science and Technology, Hong Kong 4Peng Cheng Laboratory, Shenzhen, 518066, CHINA Email: [email protected], {[email protected], [email protected]}, [email protected]
Abstract

Queue length violation probability, i.e., the tail distribution of the queue length, is a widely used statistical quality-of-service (QoS) metric in wireless communications. Characterizing and optimizing the queue length violation probability have great significance in time sensitive networking (TSN) and ultra reliable and low-latency communications (URLLC). However, it still remains an open problem. In this paper, we put our focus on the analysis of the tail distribution of the queue length from the perspective of cross-layer design in wireless link transmission. We find that, under the finite average power consumption constraint, the queue length violation probability can achieve zero with diversity gains, while it can have a linear-decay-rate exponent according to large deviation theory (LDT) with limited receiver sensitivity. Besides, we find that the arbitrary-decay-rate queue length tail distribution with the finite average power consumption exists in the Rayleigh fading channel. Then, we generalize the sufficient conditions for the communication system belonging to these three scenarios, respectively. Moreover, we apply the above results to analyze the wireless link transmission in the Nakagami-m fading channel. Numerical results with approximation validate our analysis.

I Introduction

In the fifth-generation (5G) communication networks, tremendous demand has been raised on the higher transmission rate and communication reliability. To achieve these goals, ultra reliable and low-latency communications (URLLC) attracts many researchers to work on it. Moreover, the extreme URLLC scenarios in the envision of the six-generation (6G) communication networks also require more efforts on ensuring the quality-of-service (QoS) in communication systems [1]. In recent years, an emerging concept of time sensitive networking (TSN) also put requirements on the delay performance [2]. Therefore, it is essential to characterize and improve the QoS performance in communication systems.

To reduce the transmission latency and power consumption, cross-layer design has been adopted in many works, which combined the queue and channel states to make decisions on transmission rate or power. In our previous works, the optimal control policies and delay-power tradeoffs were obtained by using constrained Markov decision process (CMDP) in adaptive transmission [3], bursty random arrivals [4], and Markovian arrivals systems [5]. Besides, work [6] proposed the cross-layer power allocation scheme to minimize the overall delay in multi-access channels. These works give us a way to obtain the optimal cross-layer control policies in different communication systems.

Having obtained the transmission policies, we then need to analyze the QoS performance in communication systems by adopting these policies. In wireless link transmission, our focus is mainly on the statistical QoS performance, i.e., length or delay violation probabilities. One of the most widely used analysis tools is the large deviation theory (LDT), which gives a closed-form approximation for length violation probability. Based on LDT, in [7], effective capacity was proposed to characterize the service ability of wireless communication systems with QoS constraints. The maximum throughput constrained by the QoS requirements was studied in [8] using a large deviations framework. The authors of [9] investigated different downlink transmission scheduling schemes in a cellular network under QoS constraints. Both [8] and [9] derived the exponent of the length violation probability by finding the most likely path to overflow. In [10], the authors combined sample-path LDT with Lyapunov functions to generalize the above analysis. However, since the analysis is complex, only the max-queue policy with on-off channels was analyzed in detail. Besides, in these works, the authors all assumed that the condition of LDT is satisfied by the policy, i.e., the queue length violation probability has a linear-decay-rate exponent with the queue length. However, not all policies meet that condition, which means the analysis based on LDT has its limitation. Thus, characterizing the achievable decay rate of the queue length violation probability is important. It has significance in evaluating the optimality of the proposed policies.

In this paper, we put our focus on the analysis of the length violation probability, i.e., the queue length tail distribution, from the perspective of cross-layer design in the single-input single-output (SISO) system. We find that, in the Rayleigh fading channel, under the finite average power consumption constraint, the queue length violation probability can be equal to zero with diversity gains, while it can have a linear-decay-rate exponent according to LDT with limited receiver sensitivity. Besides, we find that the arbitrary-decay-rate queue length tail distribution exists in the Rayleigh fading channel with the finite average power consumption. Based on the above findings, we divide the wireless link transmission systems into three scenarios according to the decay rate of the queue length tail distribution with the finite average power consumption. We then generalize the sufficient conditions for the communication system belonging to these three scenarios, respectively. Then, we use the above results to conduct analysis in the Nakagami-m fading channel.

Through the analysis in this paper, we prove the existence of the queue length tail distribution with arbitrary-decay-rate exponents under the finite average power consumption constraint. This result indicates that LDT is not enough for analyzing the queue length violation probability in wireless link transmission systems. Besides, by characterizing the achievable decay rate of the queue length violation probability and their corresponding sufficient conditions in different scenarios, we give guidance on designing a high-performance wireless transmission policy.

Throughout this paper, 𝔼{x}\mathbb{E}\{x\} denotes the expectation of random variable xx. \mathbb{R} and \mathbb{C} denote the set of real numbers and complex numbers, respectively.

II System Model

Consider a wireless link transmission system, in which the transmitter sends data to the receiver via a time-varying channel as shown in Fig. 1. In this section, we will introduce the physical layer and network layer model, respectively.

II-A Physical Layer

In this system, time is divided into timeslots with equal length T0T_{0}. The data will be transmitted over a block fading channel, in which the channel coefficient varies in an i.i.d.i.i.d. manner across time slots. Let h[n]h[n]\in\mathbb{C} denote the channel coefficient in the time slot nn. Then, for the input x[n]x[n]\in\mathbb{C} in time slot nn, the corresponding output y[n]y[n]\in\mathbb{C} is given by

y[n]=h[n]x[n]+z[n],y[n]=h[n]x[n]+z[n], (1)

where z[n]z[n]\in\mathbb{C} is the additive Gaussian noise with power σ2\sigma^{2}. We assume that the channel state information (CSI) is available at both the transmitter and the receiver. The adaptive transmitter determines the transmission rate in each time slot. According to Shannon’s formula, with the bandwidth BB, the power consumption P[n]P[n] corresponding to the transmission rate R[n]R[n] (in nats/s) is given by

P[n]=σ2|h[n]|2(e(R[n]B)1).P[n]=\frac{\sigma^{2}}{|h[n]|^{2}}\bigg{(}e^{\big{(}\frac{R[n]}{B}\big{)}}-1\bigg{)}. (2)

Refer to caption

Figure 1: System Model.

II-B Network Layer

In this paper, we assume that the size of arrival data is deterministic in each time slot, i.e., AA nats data arrive in each time slot. Besides, we denote s[n]s[n] as the size of transmission data at the end of time slot nn, which is equal to T0R[n]T_{0}R[n] in this system. At the transmitter, an infinite-length buffer is equipped to backlog the arrival data. Let q[n]q[n] denote the length of the queue at the beginning of time slot nn. Consequently, the queue length is updated as

q[n+1]=max{q[n]+As[n],0}q[n+1]=\max\big{\{}q[n]+A-s[n],0\big{\}} (3)

To keep the stability of the queue, we assume that A<𝔼{s[n]}A<\mathbb{E}\{s[n]\}.

For a cross-layer scheduling policy, the transmitter determines s[n]s[n] according to q[n]q[n] and h[n]h[n]. Let g(x)g(x) denote the probability density function (p.d.f.p.d.f.) of |h[n]|2|h[n]|^{2}, u(x)u(x) denote the p.d.f.p.d.f. of q[n]q[n], and fq,hsf_{q,h}^{s} denote the probabilistic cross-layer scheduling policy, which is the conditional p.d.f.p.d.f. for s[n]=ss[n]=s under the condition that |h[n]|2=h|h[n]|^{2}=h and q[n]=qq[n]=q. Then, the average power consumption of this policy is given by

Pavg=000q+Aσ2h(esT0B1)fq,hsg(h)u(q)𝑑s𝑑h𝑑q.P_{\rm avg}=\int_{0}^{\infty}\int_{0}^{\infty}\int_{0}^{q+A}\!\!\frac{\sigma^{2}}{h}\big{(}e^{\frac{s}{T_{0}B}}\!-\!1\big{)}f_{q,h}^{s}g(h)u(q)ds\,dh\,dq. (4)

Given a queue length threshold qthq_{\rm th}, the queue length violation probability ε(qth)\varepsilon(q_{\rm th}), i.e., the tail distribution of the queue length, is defined as

ε(qth)=limT1Tt=1T𝕀{q[t]>qth},\varepsilon(q_{\rm th})=\lim_{T\to\infty}\frac{1}{T}\sum_{t=1}^{T}\mathbb{I}\{q[t]>q_{\rm th}\}, (5)

where 𝕀{}\mathbb{I}\{\cdot\} is the indicator function.

III Tail Distribution Analysis of the Queue Length

In this section, we will present the relationships between the channel distribution and the tail distribution of the queue length adopting control policies with the finite average power consumption. Specifically, we first give the sufficient conditions on the channel distribution for achieving zero queue length violation probability with finite PavgP_{\rm avg}, which is called Scenario 1 in the following. Besides, we also present sufficient conditions on the channel distribution for achieving the tail distributions of the queue length with the linear-decay-rate and arbitrary-decay-rate exponent given finite PavgP_{\rm avg}, which are called Scenario 2 and Scenario 3, respectively. For simplicity, we assume A=1A=1 and T0B=1T_{0}B=1 in this section.

III-A Non-Length-Violation Scenario

For Scenario 1, to achieve zero queue length violation probability for arbitrary qthq_{\rm th}, one intuitive way is that the transmitter sends all the arrival data in each time slot, i.e., s[n]=1s[n]=1. However, this policy may result in infinite power consumption. For example, in [11], the author proved that the channel inversion policy has an infinite average power consumption in Rayleigh fading channels. We can find that, with diversity gains, the wireless link transmission system in the Rayleigh fading channel belongs to Scenario 1. In Lemma 1, we give the sufficient condition on the channel distribution for achieving zero queue length violation probability with finite PavgP_{\rm avg}.

Lemma 1. The sufficient condition for ε(qth)=0\varepsilon(q_{\rm th})=0, qth>1q_{\rm th}>1, with finite PavgP_{\rm avg}, is given by

limx0+g(x)=0,\lim_{x\to 0^{+}}g(x)=0, (6)

and

limx0+g(x)<,\lim_{x\to 0^{+}}g^{\prime}(x)<\infty, (7)

where g(x)g^{\prime}(x) is the derivative of g(x)g(x).

Proof:

Based on Eq. (4), to transmit all the arrival data in each time slot, the average power consumption can be expressed as

Pavg=(e1)σ20g(x)x𝑑x.P_{\rm avg}=(e-1)\sigma^{2}\int_{0}^{\infty}\frac{g(x)}{x}dx. (8)

To keep this integral finite, the key point is to avoid the influence of limx0+1x=\lim_{x\to 0^{+}}\frac{1}{x}=\infty. One sufficient condition is to control the integrand not approaching infinity when xx approaches 0, i.e. limx0+g(x)x<\lim_{x\to 0^{+}}\frac{g(x)}{x}<\infty. From Eq. (8), we can find that if PavgP_{\rm avg} is finite, then limx0+g(x)=0\lim_{x\to 0^{+}}g(x)=0. Since limx0+g(x)=0\lim_{x\to 0^{+}}g(x)=0, g(x)g(x) can then be expanded as

g(x)=g(x)x+𝒪(x),g(x)=g^{\prime}(x)x+\mathcal{O}(x), (9)

where 𝒪(x)\mathcal{O}(x) denote the higher-order infinitesimal of xx. Based on Eq. (9), now limx0+g(x)x<\lim_{x\to 0^{+}}\frac{g(x)}{x}<\infty is equivalent to limx0+g(x)<\lim_{x\to 0^{+}}g^{\prime}(x)<\infty. Thus, if Eqs. (6) and (7) hold, PavgP_{\rm avg} must be finite. ∎

For g(x)g(x) satisfying Lemma 1, we can conclude that with this channel the length violation probability for arbitrary qth>1q_{\rm th}>1 is zero with finite power consumption. Thus, the communication system with g(x)g(x) satisfying Lemma 1 belongs to Scenario 1.

III-B Tail Distributions of the Queue Length with Linear-Decay-Rate and Arbitrary-Decay-Rate Exponents

According to the proof of Lemma 1, for g(x)g(x) not satisfying Lemma 1, we can divide them into two kinds. One kind can guarantee at least the tail distribution of queue length with a linear-decay exponent given finite PavgP_{\rm avg}, i.e., it belongs to Scenario 2. Another kind can make sure that the tail distribution of queue length has arbitrary-decay-rate exponent given finite PavgP_{\rm avg}, i.e., it belongs to Scenario 3.

For the fixed power policy, i.e., P[n]=PP[n]=P, according to effective capacity [7], with the help of LDT, the length violation probability satisfies

limqthln(ε(qth))qth=θ,\lim_{q_{\rm th}\to\infty}\frac{\ln\big{(}\varepsilon(q_{\rm th})\big{)}}{q_{\rm th}}=-\theta, (10)

where θ\theta is called the decay exponent. It can be obtained by solving

limn1nθln𝔼{eθBT0ln(1+|h[n]|2Pσ2)}=A.-\lim_{n\to\infty}\frac{1}{n\theta}\ln\mathbb{E}\bigg{\{}e^{-\theta BT_{0}\ln\big{(}1+\frac{|h[n]|^{2}P}{\sigma^{2}}\big{)}}\bigg{\}}=A. (11)

Above results in [7] shows that the fixed power policy has a linear-decay-rate exponent θqth-\theta q_{\rm th} along with qthq_{\rm th}. Lemma 2 gives an intuitive condition for g(x)g(x) belongs to Scenario 2 instead of Scenario 1.

Lemma 2. If g(x)g(x) satisfies

limϵ0+0ϵg(x)0,\lim_{\epsilon\to 0^{+}}\int_{0}^{\epsilon}g(x)\neq 0, (12)

then it belongs to Scenario 2.

Eq. (12) indicates that g(x)g(x) has an impulse on x=0x=0, which means there are probabilities that |h[n]|2=0|h[n]|^{2}=0 occurs. This is possible because the receiver can not work with the limited receiver sensitivity if |h[n]|2|h[n]|^{2} is too small. When it occurs, the transmitter can not send any data on that time slot with the finite power consumption, which is equivalent to |h[n]|2=0|h[n]|^{2}=0. This indicates that g(x)g(x) satisfying Eq. (12) does not belong to Scenario 1. Whether it belongs to Scenario 3 is not sure. However, we can adopt the fixed power policy to at least guarantee that the queue length tail distribution has a linear-decay-rate exponent with finite PavgP_{\rm avg}, i.e., it belongs to Scenario 2.

Before conducting an analysis on Scenario 3, we first give its definition as follows.

Definition 1. In Scenario 3, the queue length tail distribution satisfies the following relationship with finite PavgP_{\rm avg}:

limqthln(ε(qth))cm(qth)=Vm,\lim_{q_{\rm th}\to\infty}\frac{\ln\big{(}\varepsilon(q_{\rm th})\big{)}}{c_{m}(q_{\rm th})}=V_{m}, (13)

where Vm[0,)V_{m}\in[0,\infty) is a constant, and {cm(qth),m=0,1,2}={qth,exp(qth),exp(exp(qth)),}\{c_{m}(q_{\rm th}),m=0,1,2\cdots\}=\{-q_{\rm th},-\exp(q_{\rm th}),-\exp\big{(}\exp(q_{\rm th})\big{)},\cdots\}.

For Scenario 3, we first conceive one transmission policy, in which the queue length and transmission rate can only be integer. Let hthkh_{\rm th}^{k} denote the threshold of the channel power gain with queue length kk. When q[n]=kq[n]=k and |h[n]|2<hthk|h[n]|^{2}<h_{\rm th}^{k}, the transmitter will not send any data at time slot nn. The policy can be expressed as

s[n]={1,If h[n]hth0k=0,2,If h[n]hthkk1,0,If h[n]<hthkk0.\displaystyle s[n]=\begin{cases}1,\quad\text{If $h[n]\geq h_{\rm th}^{0}$, $k=0$},\\ 2,\quad\text{If $h[n]\geq h_{\rm th}^{k}$, $k\geq 1$},\\ 0,\quad\text{If $h[n]<h_{\rm th}^{k}$, $k\geq 0$}.\end{cases} (14)

Let pkp_{k} denote the probability of not sending any data when q[n]=kq[n]=k. The relationship between pkp_{k} and hthkh_{\rm th}^{k} is given by

pk=0hthkg(x)𝑑x.p_{k}=\int_{0}^{h_{\rm th}^{k}}g(x)dx. (15)

Thus, we can control this policy by presenting different sequences of pkp_{k}.

Then, we will prove that, by adopting this policy, the tail distribution of queue length can have arbitrary-decay-rate exponents with finite PavgP_{\rm avg} in the Rayleigh fading channel. In Theorem 1, we first give the sufficient condition for that the above transmission policy has finite PavgP_{\rm avg} in the Rayleigh fading channel.

Pavg=(1+k=1m=0k1(pmμm+1))1(C0+(e21)k=1(m=0k1pmμm+1)ln(1pk)exx𝑑x),P_{\rm avg}=\Bigg{(}1+\sum_{k=1}^{\infty}\prod_{m=0}^{k-1}\bigg{(}\frac{p_{m}}{\mu_{m+1}}\bigg{)}\Bigg{)}^{-1}\Bigg{(}C_{0}+(e^{2}-1)\sum_{k=1}^{\infty}\bigg{(}\prod_{m=0}^{k-1}\frac{p_{m}}{\mu_{m+1}}\bigg{)}\int_{-\ln(1-p_{k})}^{\infty}\frac{e^{-x}}{x}dx\Bigg{)}, (23)
Pavg\displaystyle P_{\rm avg} =π0(e21)k=1(m=0k1pmμm+1)ln(1pk)exx𝑑x+π0C0\displaystyle=\pi_{0}(e^{2}-1)\sum_{k=1}^{\infty}\bigg{(}\prod_{m=0}^{k-1}\frac{p_{m}}{\mu_{m+1}}\bigg{)}\int_{-\ln(1-p_{k})}^{\infty}\frac{e^{-x}}{x}dx+\pi_{0}C_{0}
<π0(e21)k=1(m=0k1pmμm+1)μkln(11ln(1pk))+π0C0.\displaystyle<\pi_{0}(e^{2}-1)\sum_{k=1}^{\infty}\bigg{(}\prod_{m=0}^{k-1}\frac{p_{m}}{\mu_{m+1}}\bigg{)}\mu_{k}\ln\bigg{(}1-\frac{1}{\ln(1-p_{k})}\bigg{)}+\pi_{0}C_{0}. (25)

Theorem 1. For a Rayleigh fading channel with 𝔼{|h[n]|2}=1\mathbb{E}\{|h[n]|^{2}\}=1, a sufficient condition for that the above transmission policy has finite PavgP_{\rm avg} is given by

limkpkln(1+1pk+1)μkln(1+1pk)<1,\lim_{k\to\infty}\frac{p_{k}\ln(1+\frac{1}{p_{k+1}})}{\mu_{k}\ln(1+\frac{1}{p_{k}})}<1, (16)

where μk=1pk\mu_{k}=1-p_{k}.

Proof:

We start this proof by obtaining the steady state probability of the queue length with the transmission policy. Let πk\pi_{k} denote the steady state probability of queue length being equal to kk, k=0,1,k=0,1,\cdots. To obtain πk\pi_{k}, we present the steady state equation and normalization condition, which are given by

{p0π0=μ1π1,(μk+pk)πk=pk1πk1+μk+1πk+1,k=1,2,k=0πk=1.\displaystyle\begin{cases}p_{0}\pi_{0}=\mu_{1}\pi_{1},\\ (\mu_{k}+p_{k})\pi_{k}=p_{k-1}\pi_{k-1}+\mu_{k+1}\pi_{k+1},\,\,\text{$k=1,2,\cdots$}\\ \sum_{k=0}^{\infty}\pi_{k}=1.\end{cases} (17)

By substituting the steady state equation into the normalization condition, we obtain π0\pi_{0} as

π0=(1+k=1m=0k1(pmμm+1))1.\pi_{0}=\Bigg{(}1+\sum_{k=1}^{\infty}\prod_{m=0}^{k-1}\bigg{(}\frac{p_{m}}{\mu_{m+1}}\bigg{)}\Bigg{)}^{-1}. (18)

Besides, from the steady state equation, we can obtain the local equilibrium equation as

μkπk=pk1πk1,k=1,2,.\mu_{k}\pi_{k}=p_{k-1}\pi_{k-1},\quad\text{$k=1,2,\cdots$}. (19)

By substituting Eq. (18) into Eq. (19), πk\pi_{k}, k=1,k=1,\cdots, is given by

πk=π0m=0k1(pmμm+1),\pi_{k}=\pi_{0}\prod_{m=0}^{k-1}\bigg{(}\frac{p_{m}}{\mu_{m+1}}\bigg{)}, (20)

For a Rayleigh fading channel with 𝔼{|h[n]|2}=1\mathbb{E}\{|h[n]|^{2}\}=1, Eq. (15) can be simplified as

pk=0hthkex𝑑x.p_{k}=\int_{0}^{h_{\rm th}^{k}}e^{-x}dx. (21)

From Eq. (21), we have hthk=ln(1pk)h_{\rm th}^{k}=-\ln(1-p_{k}). Let CkC_{k} denote the average power consumption with the queue length kk, which is given by

Ck={(e21)ln(1pk)exx𝑑x,k=1,2, ,(e1)ln(1p0)exx𝑑x,k=0.\displaystyle C_{k}=\begin{cases}(e^{2}-1)\int_{-\ln(1-p_{k})}^{\infty}\frac{e^{-x}}{x}dx,\quad&\text{$k=1,2,\cdots$ ,}\\ (e-1)\int_{-\ln(1-p_{0})}^{\infty}\frac{e^{-x}}{x}dx,\quad&\text{$k=0$}.\end{cases} (22)

Then, by combining Eqs. (20), (18), and (22), we obtain Eq. (23).

According to [12], the function E1(x)=xett𝑑tE_{1}(x)=\int_{x}^{\infty}\frac{e^{-t}}{t}dt has the property that

E1(x)<exln(1+1x),x>0E_{1}(x)<e^{-x}\ln(1+\frac{1}{x}),\quad x>0 (24)

By combining Eq. (24) with Eq. (23), we obtain Eq. (25).

The Taylor’s expansion of ln(1pk)\ln(1-p_{k}) can be expressed as pk12pk2+O(pk2)-p_{k}-\frac{1}{2}p_{k}^{2}+O(p_{k}^{2}). Therefore, we obtain that ln(1pi)<pi\ln(1-p_{i})<-p_{i}, which indicates ln(11ln(1pk))<ln(1+1pk)\ln(1-\frac{1}{\ln(1-p_{k})})<\ln(1+\frac{1}{p_{k}}). Then, Eq. (25) can be further expressed as

Pavg<π0(e21)k=1(m=0k1pmμm+1)μkln(1+1pk)+π0C0.P_{\rm avg}<\pi_{0}(e^{2}-1)\sum_{k=1}^{\infty}\bigg{(}\prod_{m=0}^{k-1}\frac{p_{m}}{\mu_{m+1}}\bigg{)}\mu_{k}\ln(1+\frac{1}{p_{k}})+\pi_{0}C_{0}. (26)

Therefore, if the sequence in Eq. (26) is convergent, the average power of this policy is finite. According to D’Alembert’s ratio test [13], we can obtain a sufficient condition of the finite average power consumption as shown in Eq. (16). ∎

Corollary 1. For decreasing sequences {pk,k=0,1,}\{p_{k},k=0,1,\cdots\} with limkpk=0\lim_{k\to\infty}p_{k}=0, a sufficient condition for the above transmission policy having finite PavgP_{\rm avg} can be simplified as

limkpkln(pk+1)μkln(pk)<1.\lim_{k\to\infty}\frac{p_{k}\ln(p_{k+1})}{\mu_{k}\ln(p_{k})}<1. (27)
Proof:

If pkp_{k} approaches 0, then ln(1+1pk)ln(1pk)\ln(1+\frac{1}{p_{k}})\approx\ln(\frac{1}{p_{k}}). Combined with Eq. (16), the sufficient condition is simplified as Eq. (27). ∎

Based on Theorem 1 and Corollary 1, we give the conclusion that the tail distribution of queue length can have an arbitrary-decay-rate exponent in Rayleigh fading channels with finite PavgP_{\rm avg}. We summary it in Theorem 2.

Theorem 2. By adopting the above transmission policy, the tail distribution of queue length has an arbitrary-decay-rate exponent with finite PavgP_{\rm avg} in Rayleigh fading channels. The decay rate is dominated by k=qth+1m=0k1pm\sum_{k=q_{\rm th}+1}^{\infty}\prod_{m=0}^{k-1}p_{m}.

Proof:

According to Eqs. (16) and (27), it is easy to verify that, sequences {pk=ek,k=0,1,},{pk=eek,k=0,1,},{pk=eeek,k=0,1,},\{p_{k}=e^{-k},k=0,1,\cdots\},\{p_{k}=e^{-e^{k}},k=0,1,\cdots\},\{p_{k}=e^{-e^{e^{k}}},k=0,1,\cdots\},\cdots, satisfy Eqs. (16) and (27). We first give a proof on why these sequences can guarantee the finite PavgP_{\rm avg}.

Above sequences are all decreasing sequences with limkpk=0\lim_{k\to\infty}p_{k}=0. According to Corollary 1, we have to prove that Eq. (27) holds for these sequences. For these sequences, they obey

limkpkμk=limkpk1pk=0.\lim_{k\to\infty}\frac{p_{k}}{\mu_{k}}=\lim_{k\to\infty}\frac{p_{k}}{1-p_{k}}=0. (28)

Besides, with kk\to\infty, ln(pk+1)\ln(p_{k+1}) and ln(pk)\ln(p_{k}) are the same-order infinity. Thus, we obtain

limkln(pk+1)ln(pk)=C,\lim_{k\to\infty}\frac{\ln(p_{k+1})}{\ln(p_{k})}=C, (29)

where CC\in\mathbb{R} is a constant. According to Eqs. (28) and (29), these two limits have finite values. Therefore, according to the Limit Laws [13], the limit of a product is equal to the product of the limits, which proves that for these sequences,

limkpkln(pk+1)μkln(pk)=0.\lim_{k\to\infty}\frac{p_{k}\ln(p_{k+1})}{\mu_{k}\ln(p_{k})}=0. (30)

The length violation probability for the above transmission policy is given by

ε(qth)\displaystyle\varepsilon(q_{\rm th}) =k=qth+1πk\displaystyle=\sum_{k=q_{\rm th}+1}^{\infty}\pi_{k}
=π0k=qth+1m=0k1(pmμm+1)\displaystyle=\pi_{0}\sum_{k=q_{\rm th}+1}^{\infty}\prod_{m=0}^{k-1}\bigg{(}\frac{p_{m}}{\mu_{m+1}}\bigg{)} (31)

Since μm<1\mu_{m}<1, pm/μm+1<1p_{m}/\mu_{m+1}<1, and π0<1\pi_{0}<1, ε(qth)\varepsilon(q_{\rm th}) satisfies

π0k=qth+1m=0k1pm<ε(qth)<k=qth+1m=0qth(pmμm+1).\pi_{0}\!\!\!\sum_{k=q_{\rm th}+1}^{\infty}\prod_{m=0}^{k-1}p_{m}<\varepsilon(q_{\rm th})<\!\!\!\sum_{k=q_{\rm th}+1}^{\infty}\prod_{m=0}^{q_{\rm th}}\bigg{(}\frac{p_{m}}{\mu_{m+1}}\bigg{)}. (32)

For sequences {pk=ek,k=0,1,},{pk=eek,k=0,1,},{pk=eeek,k=0,1,},\{p_{k}=e^{-k},k=0,1,\cdots\},\{p_{k}=e^{-e^{k}},k=0,1,\cdots\},\{p_{k}=e^{-e^{e^{k}}},k=0,1,\cdots\},\cdots, μk=1pk1\mu_{k}=1-p_{k}\approx 1 with kk\to\infty. Thus, according to Eq. (32), the decay rate of the queue length violation probability is dominated by k=qth+1m=0k1pm\sum_{k=q_{\rm th}+1}^{\infty}\prod_{m=0}^{k-1}p_{m} It indicates that, by adopting the above transmission policy, the exponent of the queue length violation probability can have an arbitrarily high decay rate with finite PavgP_{\rm avg}. ∎

In Theorem 2, we have proved that the Rayleigh fading channel belongs to Scenario 3. Based on the above lemmas and theorems, we will then conduct the tail distribution analysis on the more general fading distributions. In Theorem 3, we generalize the analysis to the Nakagami-m fading channel. According to [14], the channel power gain distribution of Nakagami-m is given by

f|h|2(x)=(mΩ)mxm1Γ(m)emxΩ,x>0,m0.5,f_{|h|^{2}}(x)=\bigg{(}\frac{m}{\Omega}\bigg{)}^{m}\frac{x^{m-1}}{\Gamma(m)}e^{-\frac{mx}{\Omega}},\quad x>0,\,m\geq 0.5, (33)

where mm and Ω\Omega are two parameters. Besides, Γ(m)\Gamma(m) is the Gamma function. To simplify the derivation, we will discuss the distribution of |h[n]|2|h[n]|^{2} with Ω=1\Omega=1 in Theorem 3, which is given by

g(x)=mmΓ(m)xm1emxx>0,m0.5.g(x)=\frac{m^{m}}{\Gamma(m)}x^{m-1}e^{-mx}\quad x>0,\,m\geq 0.5. (34)

Theorem 3. For a wireless link transmission system with Nakagami-m channels,

  • if m2m\geq 2, it belongs to Scenario 1;

  • if 1m<21\leq m<2, it belongs to Scenario 3;

  • if 0.5m<10.5\leq m<1, it belongs to Scenario 2.

Proof:

If m2m\geq 2, we obtain

limx0+g(x)=0,\lim_{x\to 0^{+}}g(x)=0, (35)

and

limx0+g(x)=mmΓ(m)(limx0+\displaystyle\lim_{x\to 0^{+}}g^{{}^{\prime}}(x)=\frac{m^{m}}{\Gamma(m)}\bigg{(}\lim_{x\to 0^{+}} (m1)x(m2)emx\displaystyle(m-1)x^{(m-2)}e^{-mx}
mxm1emx)=0.\displaystyle-mx^{m-1}e^{-mx}\bigg{)}=0. (36)

According to Lemma 1, we have proved that if m2m\geq 2, the system can achieve zero queue length violation probability with finite PavgP_{\rm avg}. Thus, with m2m\geq 2, the system belongs to Scenario 1.

For m=1m=1, we have proved in Theorems 1 and 2 that the tail distribution of queue length can have arbitrary-decay-rate exponents with finite PavgP_{\rm avg}. Based on this result, we then prove that for 1<m<21<m<2, the system belongs to Scenario 3.

Given mm, mmm^{m} and Γ(m)\Gamma(m) are finite positive constants. Intuitively, whether the system belongs to Scenario 3 should be determined by the remaining part in g(x)g(x) except these constants. Thus, for the simplicity of expression in the following proof, we define (x)\ell(x) as

(x)=Γ(m)mmg(x)=xm1emx,x>0,m0.5.\ell(x)=\frac{\Gamma(m)}{m^{m}}g(x)=x^{m-1}e^{-mx},\quad x>0,\,m\geq 0.5. (37)

Here, we provide a sketch of the proof of the system belonging to Scenario 3 when 1<m<21<m<2. First, we will prove that (x)\ell(x) with 1<m<21<m<2 can ensure that the system belongs to Scenario 3 with the help of Theorems 1 and 2. Based on this conclusion, we will then prove g(x)=mmΓ(m)(x)g(x)=\frac{m^{m}}{\Gamma(m)}\ell(x), 1<m<21<m<2, can ensure that the system belongs to Scenario 3.

We see (x)\ell(x) as a function of mm, which we denote as w(m)w(m). The derivative of w(m)w(m) is given by

w(m)=emxxm1(lnxx).w^{{}^{\prime}}(m)=e^{-mx}x^{m-1}\big{(}\ln x-x\big{)}. (38)

Since for arbitrary x>0x>0, lnxx<0\ln x-x<0, we have w(m)<0w^{\prime}(m)<0 with 1m<21\leq m<2. Thus, w(m)w(m) is a decreasing function on [1,2)[1,2). Then, for arbitrary x>0x>0, we have w(1)>w(m)w(1)>w(m), m(1,2)m\in(1,2), which is equivalent to

ex>xm1emx,m(1,2).e^{-x}>x^{m-1}e^{-mx},\quad m\in(1,2). (39)

Let hthk(m)h_{\rm th}^{k}(m) denote the channel power gain threshold of the heuristic policy under the queue length kk given mm. Then, given the sequence {pk,k=0,1,}\{p_{k},k=0,1,\cdots\}, the relationship between pkp_{k} and hthk(m)h_{\rm th}^{k}(m) is given by

pk=0hthk(m)xm1emx𝑑x.p_{k}=\int_{0}^{h_{\rm th}^{k}(m)}x^{m-1}e^{-mx}dx. (40)

By combining Eqs. (39) and (40), we obtain that, with given pkp_{k}, hthk(1)<hthk(m)h_{\rm th}^{k}(1)<h_{\rm th}^{k}(m), m(1,2)m\in(1,2).

Let Ck(m)C_{k}(m) denote the average power consumption under the queue length kk given m(1,2)m\in(1,2). By comparing with Eq. (22), we find that the integrand in the definition of Ck(m)C_{k}(m), i.e., xm2emxx^{m-2}e^{-mx}, is smaller than ex/xe^{-x}/x according to Eq. (39). Besides, the integral interval in the definition of Ck(m)C_{k}(m) is (hthk(m),)(h_{\rm th}^{k}(m),\infty). The length of (hthk(m),)(h_{\rm th}^{k}(m),\infty) is smaller than (hthk(1),)(h_{\rm th}^{k}(1),\infty) since hthk(1)<hthk(m)h_{\rm th}^{k}(1)<h_{\rm th}^{k}(m), m(1,2)m\in(1,2). Therefore, given the sequence {pk,k=0,1,}\{p_{k},k=0,1,\cdots\}, with smaller integrand and integral interval,

Ck(m)<Ck(1),m(1,2).C_{k}(m)<C_{k}(1),\quad m\in(1,2). (41)

Note that, the steady state probability of queue length under the heuristic policy is determined by the {pk,k=0,1,}\{p_{k},k=0,1,\cdots\} sequence only. Thus, given the same {pk,k=0,1,}\{p_{k},k=0,1,\cdots\} sequence, the steady state probability of queue length with m=1m=1 is equal to that with m(1,2)m\in(1,2). Moreover, for each queue length kk, Eq. (41) holds. Thus, we have proved that, with the same sequence {pk,k=0,1,}\{p_{k},k=0,1,\cdots\}, PavgP_{\rm avg} of m=1m=1 is larger than PavgP_{\rm avg} of m(1,2)m\in(1,2), which indicates (x)\ell(x) with 1<m<21<m<2 can ensure that the system belongs to Scenario 3.

Then, we present the proof that g(x)=mmΓ(m)(x)g(x)=\frac{m^{m}}{\Gamma(m)}\ell(x), 1<m<21<m<2, can ensure that the system belongs to Scenario 3.

Let hthk,1(m)h^{k,1}_{\rm th}(m) denote the channel power gain threshold of the heuristic policy under the queue length kk given mm for (x)\ell(x), while hthk,2(m)h^{k,2}_{\rm th}(m) denote that for g(x)g(x). The relationships between pkp_{k} and hthk,1(m)h^{k,1}_{\rm th}(m), hthk,2(m)h^{k,2}_{\rm th}(m) are given by

pk=0hthk,1(m)xm1emx𝑑x,p_{k}=\int_{0}^{h_{\rm th}^{k,1}(m)}x^{m-1}e^{-mx}dx, (42)
pk=0hthk,2(m)mmΓ(m)xm1emx𝑑x.p_{k}=\int_{0}^{h_{\rm th}^{k,2}(m)}\frac{m^{m}}{\Gamma(m)}x^{m-1}e^{-mx}dx. (43)

Since mm/Γ(m)>1m^{m}/\Gamma(m)>1 when m(1,2)m\in(1,2), we obtain hthk,1(m)>hthk,2(m)h^{k,1}_{\rm th}(m)>h^{k,2}_{\rm th}(m). Let Ck(1)(m)C_{k}^{(1)}(m) and Ck(2)(m)C_{k}^{(2)}(m) denote the average power consumption under the queue length kk given mm of (x)\ell(x) and g(x)g(x), respectively. Ck(1)(m)C_{k}^{(1)}(m) and Ck(2)(m)C_{k}^{(2)}(m) are given by

Ck(1)(m)=akhthk,1(m)xm2emx𝑑x,C_{k}^{(1)}(m)=a_{k}\int_{h^{k,1}_{\rm th}(m)}^{\infty}x^{m-2}e^{-mx}dx, (44)
Ck(2)(m)=akmmΓ(m)hthk,2(m)xm2emx𝑑x,C_{k}^{(2)}(m)=\frac{a_{k}m^{m}}{\Gamma(m)}\int_{h^{k,2}_{\rm th}(m)}^{\infty}x^{m-2}e^{-mx}dx, (45)

where aka_{k} is given by

ak={e21,k1,e1,k=0.a_{k}=\begin{cases}e^{2}-1,\quad&k\geq 1,\\ e-1,\quad&k=0.\end{cases} (46)

Based on Eq. (44) and hthk,1(m)>hthk,2(m)h^{k,1}_{\rm th}(m)>h^{k,2}_{\rm th}(m), we decompose Eq. (45) as

Ck(2)(m)=\displaystyle C_{k}^{(2)}(m)= akmmΓ(m)hthk,2(m)hthk,1(m)xm2emx𝑑x\displaystyle\frac{a_{k}m^{m}}{\Gamma(m)}\int_{h^{k,2}_{\rm th}(m)}^{h^{k,1}_{\rm th}(m)}x^{m-2}e^{-mx}dx
+akmmΓ(m)hthk,1(m)xm2emx𝑑x,\displaystyle+\frac{a_{k}m^{m}}{\Gamma(m)}\int_{h^{k,1}_{\rm th}(m)}^{\infty}x^{m-2}e^{-mx}dx, (47)

where the second term of the right side of Eq. (47) is equal to mmΓ(m)Ck(1)(m)\frac{m^{m}}{\Gamma(m)}C_{k}^{(1)}(m). Let Pavg(1)P_{\rm avg}^{(1)} and Pavg(2)P_{\rm avg}^{(2)} denote the average power consumption of the heuristic policy with (x)\ell(x) and g(x)g(x), respectively. Then, based on Eq. (47), Pavg(2)P_{\rm avg}^{(2)} is given by

Pavg(2)=k=0(πkakmmΓ(m)hthk,2(m)hthk,1(m)xm2emx𝑑x)+mmΓ(m)Pavg(1).P_{\rm avg}^{(2)}=\sum_{k=0}^{\infty}\bigg{(}\pi_{k}\frac{a_{k}m^{m}}{\Gamma(m)}\int_{h^{k,2}_{\rm th}(m)}^{h^{k,1}_{\rm th}(m)}x^{m-2}e^{-mx}dx\bigg{)}+\frac{m^{m}}{\Gamma(m)}P_{\rm avg}^{(1)}. (48)

As we proved before, Pavg(1)P_{\rm avg}^{(1)} is finite with {pk,k=0,1,}\{p_{k},k=0,1,\cdots\} satisfying Eq. (16). Thus, mmΓ(m)Pavg(1)\frac{m^{m}}{\Gamma(m)}P_{\rm avg}^{(1)} is finite with m(1,2)m\in(1,2) with the same {pk,k=0,1,}\{p_{k},k=0,1,\cdots\} sequence.

For the first term on the right side of Eq. (47), it satisfies

akmmΓ(m)hthk,2(m)hthk,1(m)xm2emx𝑑x\displaystyle\frac{a_{k}m^{m}}{\Gamma(m)}\int_{h^{k,2}_{\rm th}(m)}^{h^{k,1}_{\rm th}(m)}x^{m-2}e^{-mx}dx <akmmΓ(m)hthk,2(m)hthk,1(m)xm2𝑑x\displaystyle<\frac{a_{k}m^{m}}{\Gamma(m)}\int_{h^{k,2}_{\rm th}(m)}^{h^{k,1}_{\rm th}(m)}x^{m-2}dx
<akmmΓ(m)0hthk,1(m)xm2𝑑x\displaystyle<\frac{a_{k}m^{m}}{\Gamma(m)}\int_{0}^{h^{k,1}_{\rm th}(m)}x^{m-2}dx
=akmmΓ(m)(hthk,1(m))m1m1rk(m).\displaystyle=\frac{a_{k}m^{m}}{\Gamma(m)}\underbrace{\frac{\Big{(}h^{k,1}_{\rm th}(m)\Big{)}^{m-1}}{m-1}}_{r_{k}(m)}. (49)

For m(1,2)m\in(1,2), given a decreasing sequence {pk,k=0,1,}\{p_{k},k=0,1,\cdots\} which satisfies limkpk=0\lim_{k\to\infty}p_{k}=0, we obtain that limkrk(m)=0\lim_{k\to\infty}r_{k}(m)=0, m(1,2)m\in(1,2). Thus, given sequence {pk,k=0,1,}\{p_{k},k=0,1,\cdots\} satisfying Eq. (27), the first term on the right side of Eq. (47) is finite. Now we have proved that given sequence {pk,k=0,1,}\{p_{k},k=0,1,\cdots\} satisfying Eq. (16), Pavg(2)P_{\rm avg}^{(2)} is finite, which indicates that g(x)g(x) with 1<m<21<m<2 can ensure that the system belongs to Scenario 3.

For 0.5m<10.5\leq m<1, we find that

limϵ0+g(x)=.\lim_{\epsilon\to 0^{+}}g(x)=\infty. (50)

Besides, similar to the proof for m(1,2)m\in(1,2), given the sequence {pk,k=0,1,}\{p_{k},k=0,1,\cdots\}, PavgP_{\rm avg} of m=1m=1 is smaller than PavgP_{\rm avg} of m[0.5,1)m\in[0.5,1). Therefore, we can not ensure whether the system belongs to Scenario 1 or Scenario 3 when m[0.5,1)m\in[0.5,1). However, at least we can guarantee that the system belongs to Scenario 2 by adopting the fixed power policy. ∎

IV Simulation Result

In this section, we conduct simulations to verify the proposed conclusion in Section III.

Refer to caption

Figure 2: Exponent of the queue length tail distribution with different pkp_{k} sequence in the Rayleigh fading channel.

Refer to caption

Figure 3: CqC_{q} versus qq with the pk=exp(0.1(k+1))p_{k}=\exp(-0.1(k+1)) in Nakagami-m channels.

In Fig. 2, we choose three {pk,k=0,1,}\{p_{k},k=0,1,\cdots\} sequences of the transmission policy mentioned in Section III in the Rayleigh fading channel. In Section II we assume the system is equipped with an infinite-length buffer, while in the simulation we set the buffer size equal to 50 to approximate the result. The other parameters are set as A=1A=1, 𝔼{|h[n]|2}=1\mathbb{E}\{|h[n]|^{2}\}=1, and σ2=1\sigma^{2}=1. As shown in Fig. 2, the average power consumption of the transmission policy with these three pkp_{k} sequences are 2.5874, 3.4255, and 4.4964, respectively. Besides, the queue length tail distribution with pk=exp(0.1exp(k+1))p_{k}=\exp(-0.1\exp(k+1)) has the maximum-decreasing-rate exponent. These results validate Theorems 1 and 2. Fig. 2 also indicates that, in the Rayleigh fading channel, the queue length tail distribution can have an exponent which decreases faster than the linear rate proposed in LDT with the finite average power consumption.

In Fig. 3, we compare the CqC_{q}, i.e., the average power consumption with queue length qq, in different Nakagami-m channels by adopting the transmission policy mentioned in Section III with 1m<21\leq m<2. Since the pkp_{k} sequence is same, the steady state probabilities for these three systems with m=1m=1, m=1.2m=1.2, and m=1.5m=1.5 are identical. As shown in Fig. 3, with a higher mm, the CqC_{q} is less, which results in the less PavgP_{\rm avg}. This tradeoff meets our expectations since higher mm means better performance on avoiding severe fading.

V Conclusion

In this paper, we analyzed the decay rate of the queue length tail distribution with the cross-layer design. Specifically, we divided the communication systems into three scenarios according to the decay rate of the queue length tail distribution with the finite average power consumption. We presented sufficient conditions for the systems belonging to Scenario 1 and Scenario 2, respectively. Then, we conceived a transmission policy to analyze the communication system with Rayleigh fading channels. By presenting the sufficient condition that the arbitrary-decay-rate tail distribution with finite average power consumption exists, we proved that the system with Rayleigh fading channels belongs to Scenario 3. Finally, the analysis for Rayleigh fading channels was generalized to Nakagami-m fading channels. The analysis in this paper provides the achievable decay rate of the queue length tail distribution, which can be used to instruct the estimate and analysis for the optimal cross-layer control policy. Future promising research directions include generalizing the analysis for more complex channel models and finding necessary and sufficient conditions for the systems belonging to three scenarios, respectively.

References

  • [1] K. B. Letaief, W. Chen, Y. Shi, J. Zhang, and Y. A. Zhang, “The roadmap to 6G: AI empowered wireless networks,” IEEE Commun. Mag., vol. 57, no. 8, pp. 84–90, Aug. 2019.
  • [2] A. Nasrallah, A. S. Thyagaturu, Z. Alharbi, C. Wang, X. Shao, M. Reisslein, and H. ElBakoury, “Ultra-low latency (ULL) networks: The IEEE TSN and IETF DetNet standards and related 5G ULL research,” IEEE Commun. Surveys Tuts., vol. 21, no. 1, pp. 88–145, Sept. 2019.
  • [3] X. Chen, W. Chen, J. Lee, and N. B. Shroff, “Delay-optimal buffer-aware scheduling with adaptive transmission,” IEEE Trans. Commun., vol. 65, no. 7, pp. 2917–2930, Apr. 2017.
  • [4] M. Wang, J. Liu, W. Chen, and A. Ephremides, “Joint queue-aware and channel-aware delay optimal scheduling of arbitrarily bursty traffic over multi-state time-varying channels,” IEEE Trans. Commun., vol. 67, no. 1, pp. 503–517, Oct. 2019.
  • [5] X. Zhao, W. Chen, J. Lee, and N. B. Shroff, “Delay-optimal and energy-efficient communications with markovian arrivals,” IEEE Trans. Commun., vol. 68, no. 3, pp. 1508–1523, Dec. 2020.
  • [6] J. Yang and S. Ulukus, “Delay-minimal transmission for average power constrained multi-access communications,” IEEE Trans. Wireless Commun., vol. 9, no. 9, pp. 2754–2767, Jul. 2010.
  • [7] D. Wu and R. Negi, “Effective capacity: a wireless link model for support of quality of service,” IEEE Trans. Wireless Commun., vol. 2, no. 4, pp. 630–643, Jul. 2003.
  • [8] S. Shakkottai, “Effective capacity and QoS for wireless scheduling,” IEEE Trans. Autom. Control, vol. 53, no. 3, pp. 749–761, Apr. 2008.
  • [9] L. Ying, R. Srikant, A. Eryilmaz, and G. Dullerud, “A large deviations analysis of scheduling in wireless networks,” IEEE Trans. Inf. Theory, vol. 52, no. 11, pp. 5088–5098, Oct. 2006.
  • [10] V. J. Venkataramanan and X. Lin, “On the queue-overflow probability of wireless systems: A new approach combining large deviations with lyapunov functions,” IEEE Trans. Inf. Theory, vol. 59, no. 10, pp. 6367–6392, Jun. 2013.
  • [11] A. J. Goldsmith and P. P. Varaiya, “Capacity of fading channels with channel side information,” IEEE Trans. Inf. Theory, vol. 43, no. 6, pp. 1986–1992, Nov. 1997.
  • [12] M. Abramowitz and I. A. Stegun, Handbook of mathematical functions with formulas, graphs, and mathematical tables.   US Government printing office, 1964, vol. 55.
  • [13] W. Rudin et al., Principles of mathematical analysis.   McGraw-hill New York, 1964, vol. 3.
  • [14] A. Goldsmith, Wireless communications.   Cambridge university press, 2005.
  • [15] L. Li, W. Chen, and K. B. Letaief, ”Bounding Queue Length Violation Probability of Joint Channel and Buffer Aware Transmission,” 2021, arXiv:2111.06569. [Online]. Available: https://arxiv.org/abs/2111.06569.