Bounding Queue Length Violation Probability of Joint Channel and Buffer Aware Transmission
Abstract
Queue length violation probability, i.e., the tail distribution of the queue length, is a widely used statistical quality-of-service (QoS) metric in wireless communications. Characterizing and optimizing the queue length violation probability have great significance in time sensitive networking (TSN) and ultra reliable and low-latency communications (URLLC). However, it still remains an open problem. In this paper, we put our focus on the analysis of the tail distribution of the queue length from the perspective of cross-layer design in wireless link transmission. We find that, under the finite average power consumption constraint, the queue length violation probability can achieve zero with diversity gains, while it can have a linear-decay-rate exponent according to large deviation theory (LDT) with limited receiver sensitivity. Besides, we find that the arbitrary-decay-rate queue length tail distribution with the finite average power consumption exists in the Rayleigh fading channel. Then, we generalize the sufficient conditions for the communication system belonging to these three scenarios, respectively. Moreover, we apply the above results to analyze the wireless link transmission in the Nakagami-m fading channel. Numerical results with approximation validate our analysis.
I Introduction
In the fifth-generation (5G) communication networks, tremendous demand has been raised on the higher transmission rate and communication reliability. To achieve these goals, ultra reliable and low-latency communications (URLLC) attracts many researchers to work on it. Moreover, the extreme URLLC scenarios in the envision of the six-generation (6G) communication networks also require more efforts on ensuring the quality-of-service (QoS) in communication systems [1]. In recent years, an emerging concept of time sensitive networking (TSN) also put requirements on the delay performance [2]. Therefore, it is essential to characterize and improve the QoS performance in communication systems.
To reduce the transmission latency and power consumption, cross-layer design has been adopted in many works, which combined the queue and channel states to make decisions on transmission rate or power. In our previous works, the optimal control policies and delay-power tradeoffs were obtained by using constrained Markov decision process (CMDP) in adaptive transmission [3], bursty random arrivals [4], and Markovian arrivals systems [5]. Besides, work [6] proposed the cross-layer power allocation scheme to minimize the overall delay in multi-access channels. These works give us a way to obtain the optimal cross-layer control policies in different communication systems.
Having obtained the transmission policies, we then need to analyze the QoS performance in communication systems by adopting these policies. In wireless link transmission, our focus is mainly on the statistical QoS performance, i.e., length or delay violation probabilities. One of the most widely used analysis tools is the large deviation theory (LDT), which gives a closed-form approximation for length violation probability. Based on LDT, in [7], effective capacity was proposed to characterize the service ability of wireless communication systems with QoS constraints. The maximum throughput constrained by the QoS requirements was studied in [8] using a large deviations framework. The authors of [9] investigated different downlink transmission scheduling schemes in a cellular network under QoS constraints. Both [8] and [9] derived the exponent of the length violation probability by finding the most likely path to overflow. In [10], the authors combined sample-path LDT with Lyapunov functions to generalize the above analysis. However, since the analysis is complex, only the max-queue policy with on-off channels was analyzed in detail. Besides, in these works, the authors all assumed that the condition of LDT is satisfied by the policy, i.e., the queue length violation probability has a linear-decay-rate exponent with the queue length. However, not all policies meet that condition, which means the analysis based on LDT has its limitation. Thus, characterizing the achievable decay rate of the queue length violation probability is important. It has significance in evaluating the optimality of the proposed policies.
In this paper, we put our focus on the analysis of the length violation probability, i.e., the queue length tail distribution, from the perspective of cross-layer design in the single-input single-output (SISO) system. We find that, in the Rayleigh fading channel, under the finite average power consumption constraint, the queue length violation probability can be equal to zero with diversity gains, while it can have a linear-decay-rate exponent according to LDT with limited receiver sensitivity. Besides, we find that the arbitrary-decay-rate queue length tail distribution exists in the Rayleigh fading channel with the finite average power consumption. Based on the above findings, we divide the wireless link transmission systems into three scenarios according to the decay rate of the queue length tail distribution with the finite average power consumption. We then generalize the sufficient conditions for the communication system belonging to these three scenarios, respectively. Then, we use the above results to conduct analysis in the Nakagami-m fading channel.
Through the analysis in this paper, we prove the existence of the queue length tail distribution with arbitrary-decay-rate exponents under the finite average power consumption constraint. This result indicates that LDT is not enough for analyzing the queue length violation probability in wireless link transmission systems. Besides, by characterizing the achievable decay rate of the queue length violation probability and their corresponding sufficient conditions in different scenarios, we give guidance on designing a high-performance wireless transmission policy.
Throughout this paper, denotes the expectation of random variable . and denote the set of real numbers and complex numbers, respectively.
II System Model
Consider a wireless link transmission system, in which the transmitter sends data to the receiver via a time-varying channel as shown in Fig. 1. In this section, we will introduce the physical layer and network layer model, respectively.
II-A Physical Layer
In this system, time is divided into timeslots with equal length . The data will be transmitted over a block fading channel, in which the channel coefficient varies in an manner across time slots. Let denote the channel coefficient in the time slot . Then, for the input in time slot , the corresponding output is given by
(1) |
where is the additive Gaussian noise with power . We assume that the channel state information (CSI) is available at both the transmitter and the receiver. The adaptive transmitter determines the transmission rate in each time slot. According to Shannon’s formula, with the bandwidth , the power consumption corresponding to the transmission rate (in nats/s) is given by
(2) |
II-B Network Layer
In this paper, we assume that the size of arrival data is deterministic in each time slot, i.e., nats data arrive in each time slot. Besides, we denote as the size of transmission data at the end of time slot , which is equal to in this system. At the transmitter, an infinite-length buffer is equipped to backlog the arrival data. Let denote the length of the queue at the beginning of time slot . Consequently, the queue length is updated as
(3) |
To keep the stability of the queue, we assume that .
For a cross-layer scheduling policy, the transmitter determines according to and . Let denote the probability density function () of , denote the of , and denote the probabilistic cross-layer scheduling policy, which is the conditional for under the condition that and . Then, the average power consumption of this policy is given by
(4) |
Given a queue length threshold , the queue length violation probability , i.e., the tail distribution of the queue length, is defined as
(5) |
where is the indicator function.
III Tail Distribution Analysis of the Queue Length
In this section, we will present the relationships between the channel distribution and the tail distribution of the queue length adopting control policies with the finite average power consumption. Specifically, we first give the sufficient conditions on the channel distribution for achieving zero queue length violation probability with finite , which is called Scenario 1 in the following. Besides, we also present sufficient conditions on the channel distribution for achieving the tail distributions of the queue length with the linear-decay-rate and arbitrary-decay-rate exponent given finite , which are called Scenario 2 and Scenario 3, respectively. For simplicity, we assume and in this section.
III-A Non-Length-Violation Scenario
For Scenario 1, to achieve zero queue length violation probability for arbitrary , one intuitive way is that the transmitter sends all the arrival data in each time slot, i.e., . However, this policy may result in infinite power consumption. For example, in [11], the author proved that the channel inversion policy has an infinite average power consumption in Rayleigh fading channels. We can find that, with diversity gains, the wireless link transmission system in the Rayleigh fading channel belongs to Scenario 1. In Lemma 1, we give the sufficient condition on the channel distribution for achieving zero queue length violation probability with finite .
Lemma 1. The sufficient condition for , , with finite , is given by
(6) |
and
(7) |
where is the derivative of .
Proof:
Based on Eq. (4), to transmit all the arrival data in each time slot, the average power consumption can be expressed as
(8) |
To keep this integral finite, the key point is to avoid the influence of . One sufficient condition is to control the integrand not approaching infinity when approaches 0, i.e. . From Eq. (8), we can find that if is finite, then . Since , can then be expanded as
(9) |
where denote the higher-order infinitesimal of . Based on Eq. (9), now is equivalent to . Thus, if Eqs. (6) and (7) hold, must be finite. ∎
For satisfying Lemma 1, we can conclude that with this channel the length violation probability for arbitrary is zero with finite power consumption. Thus, the communication system with satisfying Lemma 1 belongs to Scenario 1.
III-B Tail Distributions of the Queue Length with Linear-Decay-Rate and Arbitrary-Decay-Rate Exponents
According to the proof of Lemma 1, for not satisfying Lemma 1, we can divide them into two kinds. One kind can guarantee at least the tail distribution of queue length with a linear-decay exponent given finite , i.e., it belongs to Scenario 2. Another kind can make sure that the tail distribution of queue length has arbitrary-decay-rate exponent given finite , i.e., it belongs to Scenario 3.
For the fixed power policy, i.e., , according to effective capacity [7], with the help of LDT, the length violation probability satisfies
(10) |
where is called the decay exponent. It can be obtained by solving
(11) |
Above results in [7] shows that the fixed power policy has a linear-decay-rate exponent along with . Lemma 2 gives an intuitive condition for belongs to Scenario 2 instead of Scenario 1.
Lemma 2. If satisfies
(12) |
then it belongs to Scenario 2.
Eq. (12) indicates that has an impulse on , which means there are probabilities that occurs. This is possible because the receiver can not work with the limited receiver sensitivity if is too small. When it occurs, the transmitter can not send any data on that time slot with the finite power consumption, which is equivalent to . This indicates that satisfying Eq. (12) does not belong to Scenario 1. Whether it belongs to Scenario 3 is not sure. However, we can adopt the fixed power policy to at least guarantee that the queue length tail distribution has a linear-decay-rate exponent with finite , i.e., it belongs to Scenario 2.
Before conducting an analysis on Scenario 3, we first give its definition as follows.
Definition 1. In Scenario 3, the queue length tail distribution satisfies the following relationship with finite :
(13) |
where is a constant, and .
For Scenario 3, we first conceive one transmission policy, in which the queue length and transmission rate can only be integer. Let denote the threshold of the channel power gain with queue length . When and , the transmitter will not send any data at time slot . The policy can be expressed as
(14) |
Let denote the probability of not sending any data when . The relationship between and is given by
(15) |
Thus, we can control this policy by presenting different sequences of .
Then, we will prove that, by adopting this policy, the tail distribution of queue length can have arbitrary-decay-rate exponents with finite in the Rayleigh fading channel. In Theorem 1, we first give the sufficient condition for that the above transmission policy has finite in the Rayleigh fading channel.
(23) |
(25) |
Theorem 1. For a Rayleigh fading channel with , a sufficient condition for that the above transmission policy has finite is given by
(16) |
where .
Proof:
We start this proof by obtaining the steady state probability of the queue length with the transmission policy. Let denote the steady state probability of queue length being equal to , . To obtain , we present the steady state equation and normalization condition, which are given by
(17) |
By substituting the steady state equation into the normalization condition, we obtain as
(18) |
Besides, from the steady state equation, we can obtain the local equilibrium equation as
(19) |
By substituting Eq. (18) into Eq. (19), , , is given by
(20) |
For a Rayleigh fading channel with , Eq. (15) can be simplified as
(21) |
From Eq. (21), we have . Let denote the average power consumption with the queue length , which is given by
(22) |
Then, by combining Eqs. (20), (18), and (22), we obtain Eq. (23).
According to [12], the function has the property that
(24) |
The Taylor’s expansion of can be expressed as . Therefore, we obtain that , which indicates . Then, Eq. (25) can be further expressed as
(26) |
Therefore, if the sequence in Eq. (26) is convergent, the average power of this policy is finite. According to D’Alembert’s ratio test [13], we can obtain a sufficient condition of the finite average power consumption as shown in Eq. (16). ∎
Corollary 1. For decreasing sequences with , a sufficient condition for the above transmission policy having finite can be simplified as
(27) |
Proof:
Based on Theorem 1 and Corollary 1, we give the conclusion that the tail distribution of queue length can have an arbitrary-decay-rate exponent in Rayleigh fading channels with finite . We summary it in Theorem 2.
Theorem 2. By adopting the above transmission policy, the tail distribution of queue length has an arbitrary-decay-rate exponent with finite in Rayleigh fading channels. The decay rate is dominated by .
Proof:
According to Eqs. (16) and (27), it is easy to verify that, sequences , satisfy Eqs. (16) and (27). We first give a proof on why these sequences can guarantee the finite .
Above sequences are all decreasing sequences with . According to Corollary 1, we have to prove that Eq. (27) holds for these sequences. For these sequences, they obey
(28) |
Besides, with , and are the same-order infinity. Thus, we obtain
(29) |
where is a constant. According to Eqs. (28) and (29), these two limits have finite values. Therefore, according to the Limit Laws [13], the limit of a product is equal to the product of the limits, which proves that for these sequences,
(30) |
The length violation probability for the above transmission policy is given by
(31) |
Since , , and , satisfies
(32) |
For sequences , with . Thus, according to Eq. (32), the decay rate of the queue length violation probability is dominated by It indicates that, by adopting the above transmission policy, the exponent of the queue length violation probability can have an arbitrarily high decay rate with finite . ∎
In Theorem 2, we have proved that the Rayleigh fading channel belongs to Scenario 3. Based on the above lemmas and theorems, we will then conduct the tail distribution analysis on the more general fading distributions. In Theorem 3, we generalize the analysis to the Nakagami-m fading channel. According to [14], the channel power gain distribution of Nakagami-m is given by
(33) |
where and are two parameters. Besides, is the Gamma function. To simplify the derivation, we will discuss the distribution of with in Theorem 3, which is given by
(34) |
Theorem 3. For a wireless link transmission system with Nakagami-m channels,
-
•
if , it belongs to Scenario 1;
-
•
if , it belongs to Scenario 3;
-
•
if , it belongs to Scenario 2.
Proof:
If , we obtain
(35) |
and
(36) |
According to Lemma 1, we have proved that if , the system can achieve zero queue length violation probability with finite . Thus, with , the system belongs to Scenario 1.
For , we have proved in Theorems 1 and 2 that the tail distribution of queue length can have arbitrary-decay-rate exponents with finite . Based on this result, we then prove that for , the system belongs to Scenario 3.
Given , and are finite positive constants. Intuitively, whether the system belongs to Scenario 3 should be determined by the remaining part in except these constants. Thus, for the simplicity of expression in the following proof, we define as
(37) |
Here, we provide a sketch of the proof of the system belonging to Scenario 3 when . First, we will prove that with can ensure that the system belongs to Scenario 3 with the help of Theorems 1 and 2. Based on this conclusion, we will then prove , , can ensure that the system belongs to Scenario 3.
We see as a function of , which we denote as . The derivative of is given by
(38) |
Since for arbitrary , , we have with . Thus, is a decreasing function on . Then, for arbitrary , we have , , which is equivalent to
(39) |
Let denote the channel power gain threshold of the heuristic policy under the queue length given . Then, given the sequence , the relationship between and is given by
(40) |
By combining Eqs. (39) and (40), we obtain that, with given , , .
Let denote the average power consumption under the queue length given . By comparing with Eq. (22), we find that the integrand in the definition of , i.e., , is smaller than according to Eq. (39). Besides, the integral interval in the definition of is . The length of is smaller than since , . Therefore, given the sequence , with smaller integrand and integral interval,
(41) |
Note that, the steady state probability of queue length under the heuristic policy is determined by the sequence only. Thus, given the same sequence, the steady state probability of queue length with is equal to that with . Moreover, for each queue length , Eq. (41) holds. Thus, we have proved that, with the same sequence , of is larger than of , which indicates with can ensure that the system belongs to Scenario 3.
Then, we present the proof that , , can ensure that the system belongs to Scenario 3.
Let denote the channel power gain threshold of the heuristic policy under the queue length given for , while denote that for . The relationships between and , are given by
(42) |
(43) |
Since when , we obtain . Let and denote the average power consumption under the queue length given of and , respectively. and are given by
(44) |
(45) |
where is given by
(46) |
Based on Eq. (44) and , we decompose Eq. (45) as
(47) |
where the second term of the right side of Eq. (47) is equal to . Let and denote the average power consumption of the heuristic policy with and , respectively. Then, based on Eq. (47), is given by
(48) |
As we proved before, is finite with satisfying Eq. (16). Thus, is finite with with the same sequence.
For the first term on the right side of Eq. (47), it satisfies
(49) |
For , given a decreasing sequence which satisfies , we obtain that , . Thus, given sequence satisfying Eq. (27), the first term on the right side of Eq. (47) is finite. Now we have proved that given sequence satisfying Eq. (16), is finite, which indicates that with can ensure that the system belongs to Scenario 3.
For , we find that
(50) |
Besides, similar to the proof for , given the sequence , of is smaller than of . Therefore, we can not ensure whether the system belongs to Scenario 1 or Scenario 3 when . However, at least we can guarantee that the system belongs to Scenario 2 by adopting the fixed power policy. ∎
IV Simulation Result
In this section, we conduct simulations to verify the proposed conclusion in Section III.
In Fig. 2, we choose three sequences of the transmission policy mentioned in Section III in the Rayleigh fading channel. In Section II we assume the system is equipped with an infinite-length buffer, while in the simulation we set the buffer size equal to 50 to approximate the result. The other parameters are set as , , and . As shown in Fig. 2, the average power consumption of the transmission policy with these three sequences are 2.5874, 3.4255, and 4.4964, respectively. Besides, the queue length tail distribution with has the maximum-decreasing-rate exponent. These results validate Theorems 1 and 2. Fig. 2 also indicates that, in the Rayleigh fading channel, the queue length tail distribution can have an exponent which decreases faster than the linear rate proposed in LDT with the finite average power consumption.
In Fig. 3, we compare the , i.e., the average power consumption with queue length , in different Nakagami-m channels by adopting the transmission policy mentioned in Section III with . Since the sequence is same, the steady state probabilities for these three systems with , , and are identical. As shown in Fig. 3, with a higher , the is less, which results in the less . This tradeoff meets our expectations since higher means better performance on avoiding severe fading.
V Conclusion
In this paper, we analyzed the decay rate of the queue length tail distribution with the cross-layer design. Specifically, we divided the communication systems into three scenarios according to the decay rate of the queue length tail distribution with the finite average power consumption. We presented sufficient conditions for the systems belonging to Scenario 1 and Scenario 2, respectively. Then, we conceived a transmission policy to analyze the communication system with Rayleigh fading channels. By presenting the sufficient condition that the arbitrary-decay-rate tail distribution with finite average power consumption exists, we proved that the system with Rayleigh fading channels belongs to Scenario 3. Finally, the analysis for Rayleigh fading channels was generalized to Nakagami-m fading channels. The analysis in this paper provides the achievable decay rate of the queue length tail distribution, which can be used to instruct the estimate and analysis for the optimal cross-layer control policy. Future promising research directions include generalizing the analysis for more complex channel models and finding necessary and sufficient conditions for the systems belonging to three scenarios, respectively.
References
- [1] K. B. Letaief, W. Chen, Y. Shi, J. Zhang, and Y. A. Zhang, “The roadmap to 6G: AI empowered wireless networks,” IEEE Commun. Mag., vol. 57, no. 8, pp. 84–90, Aug. 2019.
- [2] A. Nasrallah, A. S. Thyagaturu, Z. Alharbi, C. Wang, X. Shao, M. Reisslein, and H. ElBakoury, “Ultra-low latency (ULL) networks: The IEEE TSN and IETF DetNet standards and related 5G ULL research,” IEEE Commun. Surveys Tuts., vol. 21, no. 1, pp. 88–145, Sept. 2019.
- [3] X. Chen, W. Chen, J. Lee, and N. B. Shroff, “Delay-optimal buffer-aware scheduling with adaptive transmission,” IEEE Trans. Commun., vol. 65, no. 7, pp. 2917–2930, Apr. 2017.
- [4] M. Wang, J. Liu, W. Chen, and A. Ephremides, “Joint queue-aware and channel-aware delay optimal scheduling of arbitrarily bursty traffic over multi-state time-varying channels,” IEEE Trans. Commun., vol. 67, no. 1, pp. 503–517, Oct. 2019.
- [5] X. Zhao, W. Chen, J. Lee, and N. B. Shroff, “Delay-optimal and energy-efficient communications with markovian arrivals,” IEEE Trans. Commun., vol. 68, no. 3, pp. 1508–1523, Dec. 2020.
- [6] J. Yang and S. Ulukus, “Delay-minimal transmission for average power constrained multi-access communications,” IEEE Trans. Wireless Commun., vol. 9, no. 9, pp. 2754–2767, Jul. 2010.
- [7] D. Wu and R. Negi, “Effective capacity: a wireless link model for support of quality of service,” IEEE Trans. Wireless Commun., vol. 2, no. 4, pp. 630–643, Jul. 2003.
- [8] S. Shakkottai, “Effective capacity and QoS for wireless scheduling,” IEEE Trans. Autom. Control, vol. 53, no. 3, pp. 749–761, Apr. 2008.
- [9] L. Ying, R. Srikant, A. Eryilmaz, and G. Dullerud, “A large deviations analysis of scheduling in wireless networks,” IEEE Trans. Inf. Theory, vol. 52, no. 11, pp. 5088–5098, Oct. 2006.
- [10] V. J. Venkataramanan and X. Lin, “On the queue-overflow probability of wireless systems: A new approach combining large deviations with lyapunov functions,” IEEE Trans. Inf. Theory, vol. 59, no. 10, pp. 6367–6392, Jun. 2013.
- [11] A. J. Goldsmith and P. P. Varaiya, “Capacity of fading channels with channel side information,” IEEE Trans. Inf. Theory, vol. 43, no. 6, pp. 1986–1992, Nov. 1997.
- [12] M. Abramowitz and I. A. Stegun, Handbook of mathematical functions with formulas, graphs, and mathematical tables. US Government printing office, 1964, vol. 55.
- [13] W. Rudin et al., Principles of mathematical analysis. McGraw-hill New York, 1964, vol. 3.
- [14] A. Goldsmith, Wireless communications. Cambridge university press, 2005.
- [15] L. Li, W. Chen, and K. B. Letaief, ”Bounding Queue Length Violation Probability of Joint Channel and Buffer Aware Transmission,” 2021, arXiv:2111.06569. [Online]. Available: https://arxiv.org/abs/2111.06569.