This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Performance Analysis and Blocklength Minimization of Uplink RSMA for Short
Packet Transmissions in URLLC

Yixin Zhang, Wenchi Cheng, Jingqing Wang, and Wei Zhang 
State Key Laboratory of Integrated Services Networks, Xidian University, Xi’an, China
School of Electrical Engineering and Telecommunications, The University of New South Wales, Sydney, Australia
E-mail: {[email protected], [email protected], [email protected], [email protected]}
Abstract

Rate splitting multiple access (RSMA) is one of the promising techniques for ultra-reliable and low-latency communications (URLLC) with stringent requirements on delay and reliability of multiple access. To fully explore the delay performance enhancement brought by uplink RSMA to URLLC, in this paper, we evaluate the performance of two-user uplink RSMA and propose the corresponding blocklength minimization problem. We analyze the impact of finite blocklength (FBL) code on the achievable rate region and the effective throughput of uplink RSMA. On this basis, we propose the problem of minimizing the blocklength for uplink RSMA with power allocation under constrained reliability and effective throughput. Then, we present an alternating optimization method to solve this non-convex problem. Simulation results show that different from the infinite blocklength (IBL) regime, the achievable rate region of the uplink RSMA is not always larger than that of uplink non-orthogonal multiple access (NOMA) in the FBL regime. But with the help of our proposed blocklength minimization scheme with power allocation, uplink RSMA can achieve the same achievable rate with a smaller blocklength compared to uplink NOMA, frequency division multiple access (FDMA), and time division multiple access (TDMA) in the FBL regime, showing the potential of uplink RSMA to achieve low delay without time sharing for URLLC.

Index Terms:
Rate splitting multiple access (RSMA), ultra-reliable and low-latency communications (URLLC), finite blocklength (FBL), blocklength minimization, power allocation.
publicationid: pubid: 979-8-3503-1090-0/23/$31.00 © 2023 IEEE

I Introduction

Awide range of real-time applications and services, such as autonomous vehicles, Industrial Internet of Things (IIoT), and augmented reality/virtual reality (AR/VR), are emerging at a fast speed in the upcoming sixth generation (6G) wireless networks [1]. Ultra-reliable and low-latency communications (URLLC), as the core service in the fifth generation (5G) communication networks, aims to provide end-to-end (E2E) delay of less than 1 ms for 32-bit packet transmission while ensuring packet error probability of less than 10510^{-5} [2]. To meet the ultra-high quality of service (QoS) demands for various delay-sensitive services, more stringent requirement on delay is put forward as sub-millisecond level in 6G networks [3]. One of the key methods to meet the delay requirements of real-time applications is to use finite blocklength (FBL) code for short packet transmissions [4]. The traditional Shannon capacity, which is used in the infinite blocklength (IBL) for high-capacity-demanded services, is no longer applicable to short packet transmissions in URLLC. The authors derived a closed-form expression of the achievable rate and the decoding error probability in the FBL regime [5]. In addition, the design of future 6G networks also requires support for large-scale access to ensure stringent delay and reliability requirements from a large number of devices [6]. In the existing network architecture, delay timeout under multiple access (MA) conditions remains a difficult problem, where time-saving and reliable solutions are still very important for future networks.

Recently, rate splitting multiple access (RSMA) has been proposed as a promising technology to enhance spectral efficiency (SE), energy efficiency (EE), coverage, QoS, user fairness, and reliability while entailing lower delay, feedback overhead, and complexity [7]. RSMA relies on rate splitting (RS) and superposition coding (SC) at the transmitter, as well as successive interference cancellation (SIC) at the receiver. RSMA has been widely studied for downlink systems, showing the SE, EE, and delay enhancement of downlink RSMA [8, 9]. As for the uplink RSMA, it was first proposed in [10] for the single-input single-output (SISO) multiple access channel (MAC) to achieve every point of the Gaussian MAC capacity region without the need for time sharing and joint encoding-decoding among users. In this way, uplink RSMA can avoid high complexity and overhead, resulting in a relatively high rate and low delay. The throughput improvement of uplink RSMA has been studied in [11]. However, the delay performance with FBL code of uplink RSMA has not been studied, which means how to take advantage of RSMA in the URLLC system still needs to be addressed. To fully explore the delay performance improvement brought by RSMA to URLLC, the FBL and RSMA combined analysis and delay minimization with blocklength optimization are highly needed.

In order to solve this problem, in this paper we analyze the impact of FBL code on uplink RSMA to obtain the achievable rate region and the effective throughput of uplink RSMA in the FBL regime. Based on the above analysis, we propose the blocklength minimization problem with power allocation for uplink RSMA under constrained reliability and effective throughput. Then, we present an alternating optimization algorithm to solve this non-convex problem. Simulation results show that our proposed uplink RSMA-based blocklength minimization problem with power allocation can use a lower blocklength with a lower delay to achieve the same achievable rate compared to uplink non-orthogonal multiple access (NOMA), frequency division multiple access (FDMA), and time division multiple access (TDMA).

The rest of this paper is organized as follows. Section II introduces the two-user uplink RSMA system model. Section III analyzes the performance of uplink RSMA in the FBL regime. Section IV presents the uplink RSMA-based blocklength minimization problem with power allocation and the corresponding algorithm. Section V provides the numerical results. Finally, we conclude this paper in Section VI.

II System Model

Refer to caption
Figure 1: Two-user uplink RSMA system model.

As shown in Fig. 1, we consider a two-user uplink RSMA system consisting of one base station (BS) and two users U1 and U2. In this paper, 1-layer RSMA is adopted to serve U1 and U2. The message W1W_{1} of U1 is split into two sub-messages W11W_{11} and W12W_{12}, which can be interpreted as creating 2 virtual users at U1 [7]. The messages W11W_{11} and W12W_{12} are independently encoded into streams s11s_{11} and s12s_{12}, which are then respectively allocated with certain powers P11P_{11} and P12P_{12}. Thus, the transmit signal at U1 is given by

x1=P11s11+P12s12.x_{1}=\sqrt{P_{11}}s_{11}+\sqrt{P_{12}}s_{12}. (1)

At U2, the message W2W_{2} is directly encoded into s2s_{2}. By allocating a certain power P2P_{2}, the transmit signal at U2 is given by x2=P2s2x_{2}=\sqrt{P_{2}}s_{2}. Thus, the signal received at the BS is given by

y=h1x1+h2x2+z,y=h_{1}x_{1}+h_{2}x_{2}+z, (2)

where hi(i=1,2)h_{i}\ (i=1,2) denotes the channel coefficient of Uii and zz denotes the additive white Gaussian noise (AWGN) at the BS with zero-mean and variance σn2\sigma_{n}^{2}. We assume that the decoding order is s11s2s12s_{11}\rightarrow s_{2}\rightarrow s_{12}. The BS first regards s12s_{12} and s2s_{2} as interference to decode s11s_{11}. Thus, the signal to interference noise ratio (SINR) of the first decoded stream s11s_{11}, denoted by γ11\gamma_{11}, can be expressed as

γ11=P11G1P12G1+P2G2+σn2,\gamma_{11}=\frac{P_{11}G_{1}}{P_{12}G_{1}+P_{2}G_{2}+\sigma_{n}^{2}}, (3)

where Gi=|hi|2(i=1,2)G_{i}=|h_{i}|^{2}\ (i=1,2) denotes the channel gain of Uii. Assuming that s11s_{11} is successfully decoded, the BS removes s11s_{11} and decodes s2s_{2} while treating s12s_{12} as noise. Through SIC, the SINR of the second decoded stream s2s_{2}, denoted by γ22\gamma_{22}, can be expressed as

γ22=P2G2P12G1+σn2.\gamma_{22}=\frac{P_{2}G_{2}}{P_{12}G_{1}+\sigma_{n}^{2}}. (4)

Next, the BS removes s2s_{2} and decodes s12s_{12} when s2s_{2} is successfully decoded. The SINR of the third decoded stream s12s_{12}, denoted by γ12\gamma_{12}, can be expressed as

γ12=P12G1σn2.\gamma_{12}=\frac{P_{12}G_{1}}{\sigma_{n}^{2}}. (5)

III Performance Analysis of Uplink RSMA
in The FBL Regime

III-A Blocklength Structure And Achievable Rate Region

Refer to caption
Figure 2: The power and blocklength of FDMA, TDMA, NOMA, and RSMA.

In the FBL regime, the blocklength is denoted by n=TBn=TB, where TT represents the time span (TTI) and BB represents the frequency resource occupied by the current block. As illustrated in Fig. 2, orthogonal multiple access (OMA), such as FDMA and TDMA, transmits signals in different frequency and time domains, i.e., different signals occupy different blocklengths [12]. As for NOMA and RSMA, they transmit signals in different power domains. Thus, NOMA and RSMA can share a common blocklength, which means the total required blocklength of RSMA and NOMA is smaller and leads to a lower delay when the bandwidth is fixed.

In the IBL regime, RSMA can reach every point of the Gaussian MAC capacity region with the error probability ε0\varepsilon\rightarrow 0. Thus, the achievable rate region of uplink RSMA in the IBL regime is given by R1IBL=R11IBL+R12IBLC(γ1)R_{1}^{\rm IBL}=R_{11}^{\rm IBL}+R_{12}^{\rm IBL}\leq C\left(\gamma_{1}\right), R2IBLC(γ2)R_{2}^{\rm IBL}\leq C\left(\gamma_{2}\right), and R1IBL+R2IBLC(γsum)R_{1}^{\rm IBL}+R_{2}^{\rm IBL}\leq C(\gamma_{\rm sum}), where C(γi)=log2(1+γi)(i=1,2,sum)C(\gamma_{i})={\log_{2}}\left(1+\gamma_{i}\right)\ \left(i=1,2,\rm sum\right) denotes the Shannon capacity, γ1=P1G1P2G2+σn2\gamma_{1}=\frac{P_{1}G_{1}}{P_{2}G_{2}+\sigma_{n}^{2}}, γ2=P2G2P1G1+σn2\gamma_{2}=\frac{P_{2}G_{2}}{P_{1}G_{1}+\sigma_{n}^{2}}, γsum=P1G1+P2G2σn2\gamma_{\rm sum}=\frac{P_{1}G_{1}+P_{2}G_{2}}{\sigma_{n}^{2}}, and P1=P11+P12P_{1}=P_{11}+P_{12}. However, in the case of FBL regime, the error probability no longer approaches to 0 and the blocklength has an impact on the achievable rate. To investigate the suitable RSMA scheme for short packet transmissions, we need to further analyze the impact of blocklength on the achievable rate and capacity region of uplink RSMA. The achievable rate of sis_{i} in the FBL regime, denoted by Ri(n,γi)R_{i}\left(n,\gamma_{i}\right), can be approximated as [5]

Ri(n,γi)log2(1+γi)VinQ1(εi)log2e,\displaystyle R_{i}\left(n,\gamma_{i}\right)\approx{\log_{2}}\left(1+\gamma_{i}\right)-\sqrt{\frac{V_{i}}{n}}Q^{-1}(\varepsilon_{i}){\log_{2}}e,
i={11,12,22},\displaystyle\hskip 85.35826pti=\{11,12,22\}, (6)

where Vi=1(1+γi)2V_{i}=1-(1+\gamma_{i})^{-2} and εi\varepsilon_{i} denote the channel dispersion and the predefined error probability of stream si(i=11,12,22)s_{i}\ (i=11,12,22), and Q1()Q^{-1}(\cdot) denotes the inverse of Q-function. Thus, the achievable rate region of U1 and U2 in the FBL regime can be expressed as follows:

{R1FBLC(γ1)D1,R2FBLC(γ2)D2,R1FBL+R2FBLR11(n,γ11)+R12(n,γ12)+R22(n,γ22)=C(γsum)D11D12D22,\begin{cases}R_{1}^{\rm FBL}\leq C\left(\gamma_{1}\right)-D_{1},\\ R_{2}^{\rm FBL}\leq C\left(\gamma_{2}\right)-D_{2},\\ R_{1}^{\rm FBL}+R_{2}^{\rm FBL}\\ \hskip 25.6073pt\leq R_{11}\left(n,\gamma_{11}\right)+R_{12}\left(n,\gamma_{12}\right)+R_{22}\left(n,\gamma_{22}\right)\\ \hskip 25.6073pt=C(\gamma_{\rm sum})-D_{11}-D_{12}-D_{22},\end{cases} (7)

where Di=1(1+γi)2nQ1(εi)log2e(i=1,2,11,12,22)D_{i}=\sqrt{\frac{1-(1+\gamma_{i})^{-2}}{n}}Q^{-1}(\varepsilon_{i}){\log_{2}}e\ (i=1,2,11,12,22).

Proof: The proof is provided in Appendix.

III-B Error Probability And Effective Throughput

According to the decoding order, the error probability of W1W_{1}, denoted by ε1\varepsilon_{1}, can be expressed as

ε1=ε11+(1ε11)ε22+(1ε11)(1ε22)ε12.\varepsilon_{1}=\varepsilon_{11}+\left(1-\varepsilon_{11}\right)\varepsilon_{22}+\left(1-\varepsilon_{11}\right)\left(1-\varepsilon_{22}\right)\varepsilon_{12}. (8)

Since the reliability requirement in URLLC is relatively small (e.g., 10510910^{-5}\sim 10^{-9}), the product of two error probabilities can be omitted. Thus, the error probability of W1W_{1} can be approximated as

ε1ε11+ε12+ε22.\varepsilon_{1}\approx\varepsilon_{11}+\varepsilon_{12}+\varepsilon_{22}. (9)

Similarly, the error probability of W2W_{2}, denoted by ε2\varepsilon_{2}, can be expressed as

ε2=ε11+(1ε11)ε22ε11+ε22.\varepsilon_{2}=\varepsilon_{11}+\left(1-\varepsilon_{11}\right)\varepsilon_{22}\approx\varepsilon_{11}+\varepsilon_{22}. (10)

Based on the above analysis, the effective throughput of U1 and U2, denoted by T1T_{1} and T2T_{2}, can be given as follows:

{T1=(1ε1)n[R11(n,γ11)+R12(n,γ12)],T2=(1ε2)nR2(n,γ22).\begin{cases}T_{1}=\left(1-\varepsilon_{1}\right)n\big{[}R_{11}\left(n,\gamma_{11}\right)+R_{12}\left(n,\gamma_{12}\right)\big{]},\\ T_{2}=\left(1-\varepsilon_{2}\right)nR_{2}\left(n,\gamma_{22}\right).\end{cases} (11)

IV Uplink RSMA-Based Blocklength Minimization Problem

To satisfy stringent delay requirements in URLLC, we propose the uplink RSMA-based blocklength minimization problem with power allocation scheme for short packet transmissions under reliability and effective throughput demands.

IV-A Problem Formulation

In this paper, we aim to minimize the blocklength while meeting reliability and effective throughput requirements. Thus, the blocklength minimization problem, denoted by P1, can be expressed as

P1: min𝑷n\displaystyle\min_{\boldsymbol{P}}\ n (12a)
s.t.\displaystyle\ \mathrm{s.t.}\ \ P11+P12Pt,\displaystyle P_{11}+P_{12}\leq P_{\rm t}, (12b)
P2Pt,\displaystyle P_{2}\leq P_{\rm t}, (12c)
TiTith,i={1,2},\displaystyle T_{i}\geq T^{\rm th}_{i},\ i=\{1,2\}, (12d)
NminnNmax,\displaystyle N_{\min}\leq n\leq N_{\max}, (12e)

where 𝑷=[P11,P12,P2]\boldsymbol{P}=\left[P_{11},P_{12},P_{2}\right], PtP_{\rm t} denotes the maximum transmit power, TithT^{\rm th}_{i} denotes the effective throughput threshold of Uii, NminN_{\min} and NmaxN_{\max} denote the minimum and maximum blocklength. Constraint (12d) guarantees the effective throughput demands, while the error probability of each stream is predefined to ensure the reliability requirements. The blocklength minimization problem P1 is non-convex due to constraint (12d) with coupled optimization variables.

IV-B Problem Transformation

To deal with the non-convex problem P1, we introduce slack variables 𝜹=[δ11,δ12,δ22]\boldsymbol{\delta}=\left[\delta_{11},\delta_{12},\delta_{22}\right] and 𝝉=[τ11,τ12]\boldsymbol{\tau}=\left[\tau_{11},\tau_{12}\right], where 𝜹\boldsymbol{\delta} and 𝝉\boldsymbol{\tau} are the lower bounds of SINR and effective throughput, respectively. With the introduced slack variables, P1 can be written as follows:

P2: min𝑷n\displaystyle\min_{\boldsymbol{P}}\ n (13a)
s.t.\displaystyle\ \mathrm{s.t.}\ \ P11+P12Pt,\displaystyle P_{11}+P_{12}\leq P_{\rm t}, (13b)
P2Pt,\displaystyle P_{2}\leq P_{\rm t}, (13c)
(1ε1)n[log2(1+δ1i)E1ν1i]\displaystyle\left(1-\varepsilon_{1}\right)n\Big{[}\log_{2}\left(1+\delta_{1i}\right)-E_{1}\nu_{1i}\Big{]}
τ1i,i={1,2}\displaystyle\hskip 119.50148pt\geq\tau_{1i},\ i=\{1,2\} (13d)
(1ε2)n[log2(1+δ22)E2ν2]T2th,\displaystyle\left(1-\varepsilon_{2}\right)n\Big{[}\log_{2}\left(1+\delta_{22}\right)-E_{2}\nu_{2}\Big{]}\geq T^{\rm th}_{2}, (13e)
P11G1P12G1+P2G2+σn2δ11,\displaystyle\frac{P_{11}G_{1}}{P_{12}G_{1}+P_{2}G_{2}+\sigma_{n}^{2}}\geq\delta_{11}, (13f)
P2G2P12G1+σn2δ22,\displaystyle\frac{P_{2}G_{2}}{P_{12}G_{1}+\sigma_{n}^{2}}\geq\delta_{22}, (13g)
P12G1σn2δ12,\displaystyle\frac{P_{12}G_{1}}{\sigma_{n}^{2}}\geq\delta_{12}, (13h)
τ11+τ12Tth,\displaystyle\tau_{11}+\tau_{12}\geq T_{\rm th}, (13i)

where E1=Q1(ε1)nlog2eE_{1}=\frac{Q^{-1}(\varepsilon_{1})}{\sqrt{n}}{\log_{2}}e, E2=Q1(ε2)nlog2eE_{2}=\frac{Q^{-1}(\varepsilon_{2})}{\sqrt{n}}{\log_{2}}e, and ν1i=1(1+δ1i)2(i=1,2)\nu_{1i}=\sqrt{1-\left(1+\delta_{1i}\right)^{2}}\ (i=1,2). Due to the non-convexity of constraints (13d)-(13g), P2 is still non-convex. Thus, we use the first order Taylor series to approximate the non-convex part in the constraints. Constraints (13d) and (13e) can be approximated at the point 𝜹(t)\boldsymbol{\delta}^{(t)} at the tt-th iteration as follows:

(1ε1)n[log2(1+δ1i)E1{[1(1+δ1i(t))2]12\displaystyle\left(1-{\varepsilon}_{1}\right)n\Bigg{[}\log_{2}\left(1+\delta_{1i}\right)-E_{1}\Bigg{\{}\left[1-\left(1+\delta_{1i}^{(t)}\right)^{-2}\right]^{\frac{1}{2}}
+(δ1iδ1i(t))[1(1+δ1i(t))2]12\displaystyle+\left(\delta_{1i}-\delta_{1i}^{(t)}\right)\left[1-\left(1+\delta_{1i}^{(t)}\right)^{-2}\right]^{-\frac{1}{2}}
×(1+δ1i(t))3}]τ1i,i={1,2},\displaystyle\hskip 56.9055pt\times\left(1+\delta_{1i}^{(t)}\right)^{-3}\Bigg{\}}\Bigg{]}\geq\tau_{1i},\ i=\{1,2\}, (14a)
and
(1ε2)n[log2(1+δ22)E2{[1(1+δ22(t))2]12+\displaystyle\left(1-{\varepsilon}_{2}\right)n\Bigg{[}\log_{2}\left(1+\delta_{22}\right)-E_{2}\Bigg{\{}\left[1-\left(1+\delta_{22}^{(t)}\right)^{-2}\right]^{\frac{1}{2}}+
(δ22δ22(t))[1(1+δ22(t))2]12(1+δ22(t))3}]Tth2.\displaystyle\left(\delta_{22}-\delta_{22}^{(t)}\right)\left[1-\left(1+\delta_{22}^{(t)}\right)^{-2}\right]^{-\frac{1}{2}}\left(1+\delta_{22}^{(t)}\right)^{-3}\Bigg{\}}\Bigg{]}\geq T^{\rm th}_{2}. (14b)

Constraints (13f) and (13g) can be approximated at the point 𝜹(t)\boldsymbol{\delta}^{(t)} and 𝑷(t)\boldsymbol{P}^{(t)} at the tt-th iteration as follows:

P12G1+P2G2+σn2P11G1δ11(t)\displaystyle\hskip 11.38092ptP_{12}G_{1}+P_{2}G_{2}+\sigma_{n}^{2}-\frac{P_{11}G_{1}}{\delta_{11}^{(t)}}
+(δ11δ11(t))P11(t)G1(δ11(t))20,\displaystyle\hskip 99.58464pt+\left(\delta_{11}-\delta_{11}^{(t)}\right)\frac{P_{11}^{(t)}G_{1}}{\left(\delta_{11}^{(t)}\right)^{2}}\leq 0, (15a)
and
P12G1+σn2P2G2δ22(t)+(δ22δ22(t))P2(t)G2(δ22(t))20.\displaystyle\hskip 7.11317ptP_{12}G_{1}+\sigma_{n}^{2}-\frac{P_{2}G_{2}}{\delta_{22}^{(t)}}\ +\left(\delta_{22}-\delta_{22}^{(t)}\right)\frac{P_{2}^{(t)}G_{2}}{\left(\delta_{22}^{(t)}\right)^{2}}\leq 0. (15b)

Based on the above first order Taylor series approximations, the non-convex problem P2 can be transformed into a convex problem as follows:

P3: min𝑷,𝜹,𝝉n\displaystyle\min_{\boldsymbol{P},\boldsymbol{\delta},\boldsymbol{\tau}}\ n (16)
s.t.\displaystyle\ \mathrm{s.t.}\ \ (13b),(13c),(13h),(13i),(14),(14b),(15),(15b).\displaystyle\text{(\ref{Eq:P_P_Pt_1}),(\ref{Eq:P_P_Pt_2}),(\ref{Eq:P_P_delta_12}),(\ref{Eq:P_P_Tth_1}),}\text{(\ref{T_1_appro}),(\ref{T_2_appro}),(\ref{SINR_1_appro}),(\ref{SINR_2_appro})}.

All the constraints are transformed into convex, thus P3 can be solved using the iterative alternating optimization (AO) method. At the tt-th iteration, based on the optimal solution obtained from the (t1)(t-1)-th iteration (𝑷(t1),𝜹(t1),𝝉(t1))\left(\boldsymbol{P}^{(t-1)},\boldsymbol{\delta}^{(t-1)},\boldsymbol{\tau}^{(t-1)}\right), solving the convex problem P3 to get the optimal solution of the tt-th iteration. Through alternating iteration, the corresponding minimum blocklength can be obtained until the blocklength converges. The detailed iterative algorithm flow is outlined in Algorithm 1.

Algorithm 1 AO algorithm for solving P1.
1:  Initialization: Initialize the index of iteration t=0t=0, the initial blocklength n(0)=106n^{(0)}=10^{6}, the converge threshold ξ\xi, and the transmit power 𝑷(0)\boldsymbol{P}^{(0)}. Initialize the slack variables 𝜹(0)\boldsymbol{\delta}^{(0)} and 𝝉(0)\boldsymbol{\tau}^{(0)}.
2:  repeat
3:     With the given 𝑷(t)\boldsymbol{P}^{(t)}, 𝜹(t)\boldsymbol{\delta}^{(t)}, and 𝝉(t)\boldsymbol{\tau}^{(t)}, optimize n(t+1)n^{(t+1)} by solving problem P3 and get the optimal solution 𝑷(t)\boldsymbol{P}^{(t)*}, 𝜹(t)\boldsymbol{\delta}^{(t)*}, and 𝝉(t)\boldsymbol{\tau}^{(t)*}.
4:     Update 𝑷(t+1)\boldsymbol{P}^{(t+1)}, 𝜹(t+1)\boldsymbol{\delta}^{(t+1)}, and 𝝉(t+1)\boldsymbol{\tau}^{(t+1)} as 𝑷(t)\boldsymbol{P}^{(t)*}, 𝜹(t)\boldsymbol{\delta}^{(t)*}, and 𝝉(t)\boldsymbol{\tau}^{(t)*}.
5:     Update t=t+1t=t+1.
6:  until |n(t)n(t+1)|ξ\left|n^{(t)}-n^{(t+1)}\right|\leq\xi.

IV-C Comparison to NOMA

In order to perform a comparative analysis with uplink RSMA, here we provide the performance analysis for two-user uplink NOMA, FDMA, and TDMA networks.

In uplink NOMA, the messages W1W_{1} and W2W_{2} of U1 and U2 are encoded into streams s1s_{1} and s2s_{2}. The BS first decodes s1s_{1} of the strongest user U1 while treating s2s_{2} as interference. After decoding s1s_{1}, the BS removes it and decodes s2s_{2}. Thus, the SINR of s1s_{1} is γ11N=P1G1P2G2+σn2\gamma_{11}^{\rm N}=\frac{P_{1}G_{1}}{P_{2}G_{2}+\sigma_{n}^{2}} and the SINR of s2s_{2} is γ22N=P2G2σn2\gamma_{22}^{\rm N}=\frac{P_{2}G_{2}}{\sigma_{n}^{2}}. Based on the SINRs and (III-A), we can get the achievable rate R1N(n,γ11N)R_{1}^{\rm N}\left(n,\gamma_{11}^{\rm N}\right) and R2N(n,γ22N)R_{2}^{\rm N}\left(n,\gamma_{22}^{\rm N}\right) of s1s_{1} and s2s_{2} in NOMA. The corresponding error probability of each stream in NOMA is set as εiN(i=11,22)\varepsilon_{i}^{\rm N}\ (i=11,22). According to NOMA decoding order, the error probability of W1W_{1} is ε1N=ε11N+(1ε11N)ε22Nε11N+ε22N\varepsilon_{1}^{\rm N}=\varepsilon_{11}^{\rm N}+\left(1-\varepsilon_{11}^{\rm N}\right)\varepsilon_{22}^{\rm N}\approx\varepsilon_{11}^{\rm N}+\varepsilon_{22}^{\rm N}, and the error probability of W2W_{2} is ε2N=ε22N\varepsilon_{2}^{\rm N}=\varepsilon_{22}^{\rm N}. Therefore, the effective throughput of U1 in uplink NOMA is T1N=(1ε1N)nR1N(n,γ11N)T_{1}^{\rm N}=\left(1-\varepsilon_{1}^{\rm N}\right)nR_{1}^{\rm N}\left(n,\gamma_{11}^{\rm N}\right) and the effective throughput of U2 in uplink NOMA is T2N=(1ε2N)nR2N(n,γ22N)T_{2}^{\rm N}=\left(1-\varepsilon_{2}^{\rm N}\right)nR_{2}^{\rm N}\left(n,\gamma_{22}^{\rm N}\right). Based on the above analysis, the blocklength minimization problem for uplink NOMA can be expressed as follows:

P4: min𝑷Nn\displaystyle\min_{\boldsymbol{P}^{\rm N}}\ n (17)
s.t.\displaystyle\ \mathrm{s.t.}\ \ P1Pt,(12c),(12d),(12e),\displaystyle P_{1}\leq P_{\rm t},\text{(\ref{Eq:P1_Pt2}),(\ref{Eq:P1_Tth}),(\ref{Eq:P1_Nmax})},

where 𝑷N=[P1,P2]\boldsymbol{P}^{\rm N}=\left[P_{1},P_{2}\right].

IV-D Comparison to OMA

We assume the bandwidth fraction is αF\alpha^{\rm F} in uplink FDMA and the time fraction is αT\alpha^{\rm T} in uplink TDMA. Thus, the blocklengths of U1 and U2 are n1F=αFnn_{1}^{\rm F}=\alpha^{\rm F}n and n2F=(1αF)nn_{2}^{\rm F}=(1-\alpha^{\rm F})n in FDMA, while n1T=αTnn_{1}^{\rm T}=\alpha^{\rm T}n and n2T=(1αT)nn_{2}^{\rm T}=(1-\alpha^{\rm T})n in TDMA, respectively. As a result, the SINRs of FDMA are given by γ1F=P1G1αFσn2\gamma_{1}^{\rm F}=\frac{P_{1}G_{1}}{\alpha^{\rm F}\sigma_{n}^{2}} and γ2F=P2G2(1αF)σn2\gamma_{2}^{\rm F}=\frac{P_{2}G_{2}}{\left(1-\alpha^{\rm F}\right)\sigma_{n}^{2}}, while the SINRs of TDMA are given by γ1T=P1G1σn2\gamma_{1}^{\rm T}=\frac{P_{1}G_{1}}{\sigma_{n}^{2}} and γ2T=P2G2σn2\gamma_{2}^{\rm T}=\frac{P_{2}G_{2}}{\sigma_{n}^{2}}, respectively. The corresponding error probabilities are given by εij(i={1,2},j={F,T})\varepsilon_{i}^{j}\ (i=\{1,2\},j=\{\rm{F,T}\}). Then, the achievable rate of U1 is R1j(n1j,γ1j)αjlog2(1+γ1j)V1jn1jQ1(ε1j)log2eR_{1}^{j}\left(n_{1}^{j},\gamma_{1}^{j}\right)\approx\alpha^{j}{\log_{2}}\left(1+\gamma_{1}^{j}\right)-\sqrt{\frac{V_{1}^{j}}{n_{1}^{j}}}Q^{-1}(\varepsilon_{1}^{j}){\log_{2}}e when j=Fj={\rm F} for FDMA and j=Tj={\rm T} for TDMA. Similarly, the achievable rate of U2 is R2j(n2j,γ2j)(1αj)log2(1+γ2j)V2jn2jQ1(ε2j)log2eR_{2}^{j}\left(n_{2}^{j},\gamma_{2}^{j}\right)\approx\left(1-\alpha^{j}\right){\log_{2}}\left(1+\gamma_{2}^{j}\right)-\sqrt{\frac{V_{2}^{j}}{n_{2}^{j}}}Q^{-1}(\varepsilon_{2}^{j}){\log_{2}}e when j=Fj={\rm F} for FDMA and j=Tj={\rm T} for TDMA. Thus, the effective throughput is Tij=(1εij)nijRij(nij,γij)(i={1,2},j={F,T})T_{i}^{j}=\left(1-\varepsilon_{i}^{j}\right)n_{i}^{j}R_{i}^{j}\left(n_{i}^{j},\gamma_{i}^{j}\right)\ \left(i=\{1,2\},j=\{\rm{F,T}\}\right). Therefore, the blocklength minimization problem for OMA (j=Fj=\rm F for FDMA and j=Tj=\rm T for TDMA) can be expressed as follows:

P5: min𝑷jn1j+n2j\displaystyle\min_{\boldsymbol{P}^{j}}\ n_{1}^{j}+n_{2}^{j} (18)
s.t.\displaystyle\ \mathrm{s.t.}\ \ P1Pt,(12c),(12d),(12e),\displaystyle P_{1}\leq P_{\rm t},\text{(\ref{Eq:P1_Pt2}),(\ref{Eq:P1_Tth}),(\ref{Eq:P1_Nmax})},

where 𝑷j=[P1,P2](j={F,T})\boldsymbol{P}^{j}=\left[P_{1},P_{2}\right]\ \left(j=\{\rm{F,T}\}\right).

V Numerical Results

In this section, we evaluate the achievable rate region performance and the proposed blocklength minimization of uplink RSMA. We set the channel gain G1=1G_{1}=1 for U1 and G2=0.7G_{2}=0.7 for U2 with G1>G2G_{1}>G_{2}. Without loss of generality, we assume the noise variance σ2=1\sigma^{2}=1. For NOMA, we set NOMA-12 with the decoding order s1s2s_{1}\rightarrow s_{2} and NOMA-21 with the decoding order s2s1s_{2}\rightarrow s_{1}. We set the bandwidth fraction and time fraction as αF=αT=P1P1+P2\alpha^{\rm F}=\alpha^{\rm T}=\frac{P_{1}}{P_{1}+P_{2}} in FDMA and TDMA. To satisfy the reliability requirements in URLLC, the predefined error probability of each stream is set to ε=106\varepsilon=10^{-6} to ensure the overall error probability of uplink RSMA is lower than 10510^{-5}. In addition, we set the maximum blocklength Nmax=3000N_{\max}=3000 and the minimum blocklength Nmin=100N_{\min}=100 [13].

Refer to caption
Figure 3: Achievable rate region comparison of different MA strategies with different blocklengths.

Figure 3 depicts the achievable rate region comparison of different MA strategies with different blocklengths as nn set to 500,1000,2000500,1000,2000, and infinite. The achievable rates of U1 and U2 both increase as blocklength increases, and therefore the achievable rate region also expands with the increase of blocklength. In the traditional IBL regime, uplink RSMA can achieve the Gaussian MAC capacity region, while NOMA without time sharing can achieve maximum rate only at one of the users. This is because by changing the transmit power allocation between two data streams s11s_{11} and s12s_{12}, RSMA can bridge NOMA-12 (allocate all the transmit power to s11s_{11}) and NOMA-21 (allocate all the transmit power to s12s_{12}), which leads to a larger rate region without time sharing. FDMA can only reach the capacity region at one point with αF=P1P1+P2\alpha^{\rm F}=\frac{P_{1}}{P_{1}+P_{2}}, while TDMA cannot reach the capacity region without variable transmit power.

However, in the FBL regime, uplink RSMA cannot achieve the Gaussian MAC capacity region and the achievable rate region of RSMA is not always larger than that of NOMA. On the one hand, the error probability no longer approaches 0 with the FBL code, resulting in a decrease in the achievable rate. On the other hand, the signal s1s_{1} is divided into two streams in uplink RSMA, which brings more channel dispersion terms than NOMA, resulting in a decrease in the total achievable rate. According to D=VnQ1(ε)log2eD=\sqrt{\frac{V}{n}}Q^{-1}(\varepsilon){\log_{2}}e, it can be observed that as the blocklength increases, the impact of channel dispersion gradually decreases. As shown in Fig. 3, the rate region of RSMA can gradually include NOMA with blocklength increasing.

Refer to caption
(a) Blocklength versus the maximum transmit power with T1th>T2thT^{\rm th}_{1}>T^{\rm th}_{2}.
Refer to caption
(b) Blocklength versus the maximum transmit power with T1th<T2thT^{\rm th}_{1}<T^{\rm th}_{2}.
Figure 4: Blocklength comparison of different MA strategies versus the maximum transmit power.

Figure 4 shows the blocklength comparison of different MA strategies versus the maximum transmit power with different effective throughput requirements. The blocklength gradually decreases as the maximum transmit power increases. As shown in Fig. 4(a), although RSMA and NOMA can use the common blocklength without dividing it to two users, RSMA can achieve a smaller blocklength. This is because NOMA decodes s1s_{1} first and removes s1s_{1} when decoding s2s_{2}, which can guarantee a high rate of s2s_{2} but result in a relatively low rate of s1s_{1}. When T1thT^{\rm th}_{1} is large, U1 needs a larger blocklength to reach T1thT^{\rm th}_{1} than that of RSMA. In FDMA and TDMA, U1 and U2 cannot share the common blocklength. As a result, the blocklength is divided into U1 and U2 in the frequency domain and time domain, resulting in a relatively large blocklength. It can be seen from Fig. 4(b) that the blocklengths of RSMA and NOMA are the same, which means NOMA can achieve the same rate as RSMA with the same blocklength. This is because when the effective throughput requirement is set as T1th<T2thT^{\rm th}_{1}<T^{\rm th}_{2}, the guaranteed rate of s2s_{2} can satisfy a larger requirement T2thT^{\rm th}_{2}. However, RSMA can adapt to different throughput requirements and achieve the smallest blocklength, which means it is more suitable and flexible than NOMA for heterogeneous networks with different QoS requirements.

Refer to caption
Figure 5: The blocklength comparison of different MA strategies versus the error probability with Pt=2P_{t}=2 dB and Pt=5P_{t}=5 dB.
Refer to caption
Figure 6: The sum of achievable rates comparison of different MA strategies versus the blocklength with Pt=5P_{t}=5 dB.

Figure 5 plots the blocklength comparison of different MA strategies versus the error probability with different maximum transmit powers. The blocklength decreases as the error probability increases for the four MA strategies, while the blocklength of RSMA is always lower than that of NOMA, FDMA, and TDMA. In addition, for vertical businesses with different reliability requirements in URLLC, as long as their reliability requirements are met, the minimum blocklength can be selected to achieve the minimum delay.

Figure 6 shows the sum of the achievable rates versus the blocklength. RSMA can achieve the highest rate in both IBL and FBL regimes. In the FBL regime, the sum of achievable rates increases with the blocklength increasing. Therefore, the minimum blocklength can be selected as long as the rate requirements are achieved to satisfy low-delay requirements in URLLC. In addition, for a fixed value of blocklength, the achievable rate of RSMA without power allocation (PA) is lower than those of RSMA, NOMA-12, and NOMA-21 with power allocation. This means that through power allocation can RSMA achieve the function of bridging NOMA-12 and NOMA-21, resulting in a higher rate with the same blocklength.

VI Conclusion

In this paper, we solved the problem of minimizing the blocklength with the power allocation for uplink RSMA in URLLC. In particular, we analyze the performance of uplink RSMA in the FBL regime, in terms of the achievable rate region and the effective throughput. On this basis, we proposed the uplink RSMA-based blocklength minimization problem under the reliability and effective throughput constraints to satisfy the low-delay and reliability requirements in URLLC. Furthermore, we developed an alternating optimization algorithm to solve this non-convex problem to obtain the optimal power allocation and the minimum blocklength. Numerical results demonstrated that uplink RSMA cannot achieve the Gaussian MAC capacity region in the FBL regime. However, with the help of our proposed blocklength minimization scheme, uplink RSMA can significantly reduce the blocklength to achieve a lower delay compared to uplink NOMA, FDMA, and TDMA, showing the potential of uplink RSMA for URLLC.

The achievable rate of U1 can be expressed as follows:

R11(n,γ11)+R12(n,γ12)\displaystyle\hskip 14.22636ptR_{11}\left(n,\gamma_{11}\right)+R_{12}\left(n,\gamma_{12}\right)
log2(1+γ11)D11+log2(1+γ12)D12\displaystyle\approx{\log_{2}}\left(1+\gamma_{11}\right)-D_{11}+{\log_{2}}\left(1+\gamma_{12}\right)-D_{12}
=log2(1+P11G1P12G1+P2G2+σn2)D11\displaystyle=\log_{2}\left(1+\frac{P_{11}G_{1}}{P_{12}G_{1}+P_{2}G_{2}+\sigma_{n}^{2}}\right)-D_{11}
+log2(1+P12G1σn2)D12\displaystyle\hskip 113.81102pt+\log_{2}\left(1+\frac{P_{12}G_{1}}{\sigma_{n}^{2}}\right)-D_{12}
=log2[(P11G1+P12G1+P2G2+σn2P12G1+P2G2+σn2)\displaystyle=\log_{2}\bigg{[}\left(\frac{P_{11}G_{1}+P_{12}G_{1}+P_{2}G_{2}+\sigma_{n}^{2}}{P_{12}G_{1}+P_{2}G_{2}+\sigma_{n}^{2}}\right)
(P12G1+σn2σn2)]D11D12\displaystyle\hskip 79.6678pt\cdot\left(\frac{P_{12}G_{1}+\sigma_{n}^{2}}{\sigma_{n}^{2}}\right)\bigg{]}-D_{11}-D_{12}
=log2[(P1G1+P2G2+σn2σn2)(P12G1+P2G2+σn2P12G1+σn2)]D11D12\displaystyle=\log_{2}\left[\frac{\left(\frac{P_{1}G_{1}+P_{2}G_{2}+\sigma_{n}^{2}}{\sigma_{n}^{2}}\right)}{\left(\frac{P_{12}G_{1}+P_{2}G_{2}+\sigma_{n}^{2}}{P_{12}G_{1}+\sigma_{n}^{2}}\right)}\right]-D_{11}-D_{12}
=log2(1+P1G1+P2G2σn2)\displaystyle=\log_{2}\left(1+\frac{P_{1}G_{1}+P_{2}G_{2}}{\sigma_{n}^{2}}\right)
log2(1+P2G2P12G1+σn2)D11D12\displaystyle\hskip 54.06006pt-\log_{2}\left(1+\frac{P_{2}G_{2}}{P_{12}G_{1}+\sigma_{n}^{2}}\right)-D_{11}-D_{12}
=C(γsum)R2(n,γ22)D11D12D22.\displaystyle=C(\gamma_{\rm sum})-R_{2}\left(n,\gamma_{22}\right)-D_{11}-D_{12}-D_{22}. (19)

Thus, we have R11(n,γ11)+R12(n,γ12)+R2(n,γ22)=C(γsum)D11D12D22R_{11}\left(n,\gamma_{11}\right)+R_{12}\left(n,\gamma_{12}\right)+R_{2}\left(n,\gamma_{22}\right)=C(\gamma_{\rm sum})-D_{11}-D_{12}-D_{22}.

Acknowledgment

This work was supported in part by the Key Area R&D Program of Guangdong Province under Grant 2020B0101110003, in part by the National Key R&D Program of China under Grant 2021YFC3002102, and in part by the Key R&D Plan of Shaanxi Province under Grant 2022ZDLGY05-09.

References

  • [1] C. She, R. Dong, Z. Gu, Z. Hou, Y. Li, W. Hardjawana, C. Yang, L. Song, and B. Vucetic, “Deep learning for ultra-reliable and low-latency communications in 6G networks,” IEEE Network, vol. 34, no. 5, pp. 219–225, 2020.
  • [2] 3GPP Tech. Rep. 38.913 v16.0.0, “Study on scenarios and requirements for next generation access technologies,” July 2020.
  • [3] M. Almekhlafi, M. A. Arfaoui, C. Assi, and A. Ghrayeb, “Superposition-based URLLC traffic scheduling in 5G and beyond wireless networks,” IEEE Transactions on Communications, vol. 70, no. 9, pp. 6295–6309, 2022.
  • [4] G. Durisi, T. Koch, and P. Popovski, “Toward massive, ultrareliable, and low-latency wireless communication with short packets,” Proceedings of the IEEE, vol. 104, no. 9, pp. 1711–1726, 2016.
  • [5] Y. Polyanskiy, H. V. Poor, and S. Verdu, “Channel coding rate in the finite blocklength regime,” IEEE Transactions on Information Theory, vol. 56, no. 5, pp. 2307–2359, 2010.
  • [6] B. Singh, O. Tirkkonen, Z. Li, and M. A. Uusitalo, “Contention-based access for ultra-reliable low latency uplink transmissions,” IEEE Wireless Communications Letters, vol. 7, no. 2, pp. 182–185, 2018.
  • [7] Y. Mao, O. Dizdar, B. Clerckx, R. Schober, P. Popovski, and H. V. Poor, “Rate-splitting multiple access: Fundamentals, survey, and future research trends,” IEEE Communications Surveys & Tutorials, vol. 24, no. 4, pp. 2073–2126, 2022.
  • [8] J. Park, J. Choi, N. Lee, W. Shin, and H. V. Poor, “Rate-splitting multiple access for downlink MIMO: A generalized power iteration approach,” IEEE Transactions on Wireless Communications, vol. 22, no. 3, pp. 1588–1603, 2023.
  • [9] Y. Xu, Y. Mao, O. Dizdar, and B. Clerckx, “Rate-splitting multiple access with finite blocklength for short-packet and low-latency downlink communications,” IEEE Transactions on Vehicular Technology, vol. 71, no. 11, pp. 12 333–12 337, 2022.
  • [10] B. Rimoldi and R. Urbanke, “A rate-splitting approach to the Gaussian multiple-access channel,” IEEE Transactions on Information Theory, vol. 42, no. 2, pp. 364–375, 1996.
  • [11] J. Xu, O. Dizdar, and B. Clerckx, “Rate-splitting multiple access for short-packet uplink communications: A finite blocklength analysis,” IEEE Communications Letters, vol. 27, no. 2, pp. 517–521, 2023.
  • [12] H. Ren, C. Pan, Y. Deng, M. Elkashlan, and A. Nallanathan, “Joint power and blocklength optimization for URLLC in a factory automation scenario,” IEEE Transactions on Wireless Communications, vol. 19, no. 3, pp. 1786–1801, 2020.
  • [13] B. Makki, T. Svensson, and M. Zorzi, “Finite block-length analysis of the incremental redundancy HARQ,” IEEE Wireless Communications Letters, vol. 3, no. 5, pp. 529–532, 2014.