This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

​​Performance Optimization in RSMA-assisted Uplink xURLLC IIoT Networks with Statistical QoS Provisioning

Yuang Chen, , Hancheng Lu, ,
Chang Wu, , Langtian Qin, and Xiaobo Guo
Yuang Chen, Hancheng Lu, Chang Wu, and Langtian Qin are with the University of Science and Technology of China, Hefei 230027, China (email: [email protected]; [email protected]; {changwu, qlt315}@mail.ustc.edu.cn). Hancheng Lu is also with the Institute of Artificial Intelligence, Hefei Comprehensive National Science Center, Hefei 230088. Xiaobo Guo is with the National Key Laboratory of Advanced Communication Networks, Academy for Network &\& Communications of CETC, Shijiazhuang, China (email: [email protected]).
Abstract

Industry 5.0 and beyond networks have driven the emergence of numerous mission-critical applications, prompting contemplation of the neXt-generation ultra-reliable low-latency communication (xURLLC). To guarantee low-latency requirements, xURLLC heavily relies on short-blocklength packets with sporadic arrival traffic. As a disruptive multi-access technique, rate-splitting multiple access (RSMA) has emerged as a promising avenue to enhance quality of service (QoS) and flexibly manage interference for next-generation communication networks. In this paper, we investigate an innovative RSMA-assisted uplink xURLLC industrial internet-of-things (IIoT) (RSMA-xURLLC-IIoT) network. To unveil reliable insights into the statistical QoS provisioning (SQP) for our proposed network with sporadic arrival traffic, we leverage stochastic network calculus (SNC) to develop a dependable theoretical framework. Building upon this theoretical framework, we formulate the SQP-driven short-packet size maximization problem and the SQP-driven transmit power minimization problem, aiming to guarantee the SQP performance to latency, decoding, and reliability while maximizing the short-packet size and minimizing the transmit power, respectively. By exploiting Monte-Carlo methods, we have thoroughly validated the dependability of the developed theoretical framework. Moreover, through extensive comparison analysis with state-of-the-art multi-access techniques, including non-orthogonal multiple access (NOMA) and orthogonal multiple access (OMA), we have demonstrated the superior performance gains achieved by the proposed RSMA-xURLLC-IIoT networks.

Index Terms:
next-generation ultra-reliable and low-latency communications (xURLLC), stochastic network calculus, rate-splitting multiple access (RSMA), industrial internet-of-things.

I Introduction

With the rapid evolution of mobile wireless network technologies, there has been a proliferation of numerous high-stack control and mission-critical emergent industrial applications, such as metaverse, robot control, and industrial automation [1, 2]. These industrial applications have sparked unprecedented stringent quality of service (QoS) requirements, encompassing flexible interference management, robust multi-access, impeccable reliability, and resilient low latency, prompting people’s envisioning for neXt-generation ultra-reliable and low-latency communications (xURLLC) [1, 3, 4, 5, 6]. xURLLC stands as a pivotal cornerstone within the wireless IIoT ecosystems, the heightened anticipation regarding xURLLC has accelerated the development and customized standardization of Industry 5.0 and beyond networks [7, 2, 1].

In IIoT scenarios requiring precision critical to mission success, base station (BS) and IIoT devices are typically deployed within confined environments. These IIoT devices transmit short-packet data, awakened periodically by internal events and sporadically triggered by external events, via the uplink to BS [8]. The BS seamlessly forwards these data to the data fusion center (DFC), where actionable insights are promptly derived and executed. Effectively meeting xURLLC’s low-latency requirements imperatives necessitates the organization of extensive short-packet data transmissions within dynamic wireless networks [5, 4, 3]. However, under Shannon regimes, the decoding error probability (DEP) associated with long blocklength channel codes virtually approaches zero [9, 10, 3], rendering the maximum achievable rate (MAR) inadequate for characterizing xURLLC’s short-packet data transmissions. To address this theoretical limitation, finite blocklength coding (FBC) theory has been advanced, revealing MARs for short-packet data transmissions and elucidating the intricate tradeoff between DEP and target latency [9, 10, 3, 4]. This tradeoff is influenced not only by blocklength but also by factors such as transmit power, inter-user interference, and transmission rate. Therefore, to guarantee xURLLC’s QoS requirements, there arises an urgent need for robust multi-access techniques that provide more flexible interference management, higher spectrum efficiency (SE), and broader coverage.

Rate-splitting multiple access (RSMA), positioned as a candidate technique for next-generation wireless networks, has garnered widespread attention owing to its flexible interference management, effective resource sharing, and superior SE [11, 12, 13]. In uplink RSMA scenarios, users split their transmitted messages into multiple streams, allocating suitable transmit power to each stream based on specific power allocation schemes [14]. At the BS receiver, successive interference cancellation (SIC) is performed to decode each stream in designated orders, subsequently combining and reconstructing these streams. Through message splitting, RSMA facilitates flexible management of inter-user interference in the uplink without resorting to time sharing among users to achieve capacity [11, 12, 13]. Remarkably, non-orthogonal multiple access (NOMA) falls within the subset of RSMA, with the distinction that NOMA does not involve the splitting of users’ messages. RSMA’s message splitting mechanism naturally aligns with core services (e.g., xURLLC) with sporadic access request behavior.

I-A Motivations and Challenges

Although RSMA has demonstrated promise in enhancing the QoS in next-generation wireless networks, recent research has predominantly concentrated on downlink multi-antenna and multi-access scenarios under Shannon regimes with long blocklengths [15, 16, 17]. Studies reveal that uplink RSMA can realize the optimal rate region of a 2M2M-user Gaussian Multiple Access Channel (MAC) by exploiting up to 4M14M-1 virtual point-to-point Gaussian channels generated through message splitting, thereby providing superior reliability, sum-throughput, and lower latency compared to non-orthogonal multiple access (NOMA) [18] and orthogonal multiple access (OMA) [14]. Furthermore, most studies on uplink RSMA are conducted under Shannon regimes with long blocklengths [19, 20, 21], while the exploration of RSMA-assisted xURLLC under FBL regimes is still in its infancy, accompanied by various challenges.

On the one hand, the stringent low-latency demands of IIoT devices necessitate xURLLC to operate under FBL regimes, underscoring the need to investigate the DEP and total throughput of uplink RSMA-assisted xURLLC networks. However, RSMA’s flexible interference management, involving message splitting and combining, potentially introduces complexity to networks and poses challenges for seamless xURLLC integration [5, 12, 11]. On the other hand, previous research endeavors on xURLLC have predominantly focused on deterministic QoS provisioning (DQP) mechanisms, which are insufficient for analyzing the QoS requirements of extreme and rare events [4, 1, 3, 22, 2, 23]. Specifically, xURLLC demands 99.9999%99.9999\% reliability, sub-1 ms latency, statistical QoS provisioning (SQP), and relies on short-blocklength packets with sporadic arrival traffic, presenting unparalleled challenges to the existing Industrial Internet [4, 1]. Moreover, given the highly time-varying nature of wireless fading channels, DQP fails to accurately capture the queueing behavior of xURLLC traffic [4, 3, 22]. This deviates from the fundamental design principles mandated by xURLLC, which involve analyzing the tail distribution of stringent QoS, underscores the need for a paradigm shift. Consequently, a thorough understanding of statistical metrics associated with rare and extreme events, known as the tail distribution, is essential to accommodate xURLLC’s stringent QoS requirements [4, 3, 22].

Although embracing the SQP mechanism for xURLLC appears more feasible, there is a dearth of relevant studies in this area, leaving the underlying principles enigmatic [2, 1, 3, 4, 23, 22]. Currently, SQP theory championed by stochastic network calculus (SNC), has gained extensive traction [24, 25, 26]. SNC has evolved into a prominent methodology providing dependable theoretical insights into the SQP performance of latency-sensitive services [4, 3, 22]. Nevertheless, current endeavors fall short of providing sufficient guidance for xURLLC’s SQP, and existing state-of-the-art solutions for xURLLC operate independently, lacking direct compatibility and seamless integration [27, 28, 29, 30, 31, 32]. Therefore, tailoring an innovative RSMA-assisted transmission framework for xURLLC looms large.

I-B Related Work

State-of-the-art research endeavors have extensively focused on uplink RSMA under Shannon regimes with long blocklengths [19, 20, 21, 33], and relatively little research has focused on uplink RSMA under FBL regimes [34], let alone considering the SQP-based tail analysis for uplink RSMA-assisted xURLLC networks. The authors in [19] have investigated a two-user uplink cooperative RSMA (C-RSMA) scheme, which jointly optimizes beamforming and device transmit power. In [20], authors have tackled the optimization problem of maximizing the minimum SE of uplink RSMA-assisted user-centric massive MIMO networks. To enhance SE and user fairness, the authors in [21] have proposed a novel C-RSMA scheme for uplink user cooperation. Additionally, the authors in [33] have studied the optimization problems of power allocation and decoding order, and have proposed a low-complexity user-pair-based resource allocation algorithm to minimize the maximum latency. To study the impact of target rate and blocklength on the DEP and throughput performance, the authors in [34] have investigated the performance of uplink RSMA under FBL regimes.

xURLLC underscores extreme and rare events such as 99.9999% reliability and sub-1 ms latency [1, 35]. Currently, some relevant studies have explored the statistical QoS provisioning for xURLLC [4, 3, 22, 36, 37, 38]. In [4], we have proposed a NOMA-assisted uplink xURLLC network and analyzed the tail distributions of latency, age-of-information (AoI), and reliability of xURLLC leveraging SNC theory. To explore xURLLC’s fundamentals and performance tradeoffs, we have developed an xURLLC-enabled massive MIMO network and proposed a theoretical framework for statistical QoS provisioning analysis for xURLLC by leveraging and promoting SNC theory [3]. In [22], the authors have proposed a 360 virtual reality (VR) streaming architecture with statistical QoS provisioning by developing an SNC-based SQP theoretical framework from delay and rate perspectives. To fulfill QoS guarantees for URLLC slicing, the authors in [36] have proposed an SNC-based URLLC slicing allocation scheme, which effectively ensures the QoS violation probability remains consistently lower than the target value over the long term with a certain probability. To investigate the violation probability of end-to-end (E2E) latency for target services in IIoT, the authors in [37] have introduced an SNC-based cascaded theorem to evaluate the service capability of xURLLC networks and studied the service processes across various wireless fading channels.

I-C Main Contributions

To effectively overcome the aforementioned challenges, we have developed an innovative RSMA-assisted uplink xURLLC IIoT (RSMA-xURLLC-IIoT) network architecture under FBL regimes and imperfect channel-state-information (CSI) scenarios. To accurately capture the queueing behavior of sporadic xURLLC traffic, we have proposed an SNC-based SQP (SNC-SQP) theoretical framework to analyze the tail distribution of xURLLC’s QoS requirements. Building upon this theoretical framework, we have formulated two SQP-driven optimization problems tailored for the developed RSMA-xURLLC-IIoT network architecture and proposed a low-complexity algorithm to tackle them. Extensive simulations demonstrate the dependability of the proposed theoretical framework, and comprehensive comparisons validate the superior performance of our developed RSMA-xURLLC-IIoT network architecture. The primary contributions of this paper are summarized as follows:

  • We have developed an innovative RSMA-xURLLC-IIoT network architecture, which seamlessly bridges the integration gaps between RSMA and xURLLC under FBL regimes and imperfect CSI scenarios, providing flexible interference management, robust multi-access, impeccable reliability, and resilient low latency.

  • Leveraging SNC theory, we have proposed a dependable SNC-SQP theoretical framework. In particular, a novel terminology named statistical delay violation probability (SDVP) is introduced to access the SQP performance of xURLLC’s delay. Subsequently, we derive a closed-form upper-bounded expression for SDVP termed UB-SDVP to quantify SDVP accurately. Additionally, we have derived various closed-form expressions for the probability density functions (PDFs) of wireless channels involved in our developed RSMA-xURLLC-IIoT network architecture.

  • Building upon the proposed theoretical framework, we have delved into two critical optimization problems. The first one addresses the SQP-driven short-packet size maximization problem, which holds extraordinary significance for the IIoT since it guarantees not only the execution of complex machine instructions but also the accomplishment of coherent mission-critical tasks. The second problem deals with the SQP-driven transmit power minimization, which is also of great importance, particularly with the application prospect of massive xURLLC networks and battery-constrained IIoT devices. Then, we have proposed a low-complexity three-step sequential optimization algorithm (TSOO) for their efficient resolutions.

  • Extensive simulations have reliably demonstrated the effectiveness of our developed RSMA-xURLLC-IIoT network architecture. Comprehensive comparisons with results from Monte-Carlo methods rigorously validate the dependability of the proposed SNC-SQP theoretical framework. Furthermore, through comparisons with prevalent NOMA and OMA, we have further substantiated the remarkable performance gains achieved by our developed network architecture.

The remainder of this paper is organized as follows. In Sec. II, the RSMA-xURLLC IIoT network architecture is investigated. In Sec. III, the SNC-SQP theoretical framework is developed. In Sec. IV, two optimal SQP-driven optimization problems are formulated and addressed, followed by the performance evaluation and comparisons. Finally, a conclusion of this paper is given.

II RSMA-Assisted Uplink xURLLC IIoT Networks Architecture

As illustrated in Fig. 1, we consider an RSMA-assisted uplink IIoT network architecture accessed with multiple IIoT devices, where 2M2M single-antenna IIoT devices simultaneously transmit short-packet data to a base station (BS) equipped with a single antenna. These 2M2M IIoT devices are randomly grouped into MM pairs, each pair comprising two IIoT devices. The available spectrum is evenly divided into MM orthogonal subchannels, with each assigned to an IIoT device pair. Without loss of generality, we focus on a specific IIoT device pair designated as 𝒰={1,2}\mathcal{U}\!=\!\left\{1,2\right\} 111To facilitate the analysis of the SQP performance for the developed RSMA-xURLLC-IIoT network architecture, without loss of generality, this paper considers the single-antenna setup, which is consistent with the most prevailing uplink RSMA-assisted IIoT systems [34, 33, 21, 27]. While the multi-antenna setup enhances the performance of our developed RSMA-xURLLC-IIoT network architecture, it leads to the increased complexity of IIoT system design, which is also beyond the scope of this article. However, it is worth noting that the network architecture considered in this paper can be reasonably extended to multi-antenna scenarios, with recent references expected to provide valuable insights into this aspect[19, 20, 28, 3]..

Refer to caption
Figure 1: The RSMA-assisted uplink xURLLC IIoT network architecture.

II-A RSMA for Uplink xURLLC with Imperfect CSI

At the transmitter side, the message from IIoT device-uu at time slot tt is represented as Mu(t),u𝒰M_{u}(t),u\!\in\!\mathcal{U}. Following RSMA principles [12, 11], the message M1(t)M_{1}(t) from IIoT device-11 is split into two components, denoted as M1,k(t),k{1,2}M_{1,k}(t),k\!\in\!\left\{1,2\right\}. The message Mq(t)M_{q}(t) can be first encoded into the stream xq(t)x_{q}(t), where q𝒬{(1,1),(1,2),(2)}q\in\mathcal{Q}\triangleq\{(1,1),(1,2),(2)\}. These streams are mapped into finite-length codewords and transmitted over wireless fading channels. The received signal at the BS can be given as follows:

y(t)\displaystyle y(t) =(p1,1x1,1(t)+p1,2x1,2(t))g1(t),\displaystyle=\left(\sqrt{p_{1,1}}x_{1,1}(t)+\sqrt{p_{1,2}}x_{1,2}(t)\right)g_{1}(t), (1)
+p2x2(t)g2(t)+n(t),\displaystyle\quad+\sqrt{p_{2}}x_{2}(t)g_{2}(t)+n(t),

where pqp_{q} is the uplink transmit power of xqx_{q}, gu(t)=ζu(t)hu(t)g_{u}(t)\!\!=\!\!\sqrt{\zeta_{u}(t)}h_{u}(t) represents the channel coefficient of IIoT device-u𝒰\!u\!\in\!\mathcal{U}, and n(t)𝒞𝒩(0,σn2)n(t)\!\sim\!\mathcal{CN}\left(0,\sigma_{n}^{2}\right) is the Additive White Gaussian Noise. ζu(t)\zeta_{u}(t) and hu(t)h_{u}(t) denote the large-scale fading coefficient and small-scale fading coefficient, respectively.

In realistic industrial scenarios, channel estimation is essential since IIoT devices do not have perfect prior knowledge of channel states, and the actual channel coefficient hu(t)h_{u}(t) can not be perfectly known. We consider each IIoT device-uu transmits a known orthogonal pilot sequence of length Np,uN_{p,u} to the BS at the beginning of each time slot. As a result, the BS can obtain the minimum mean squared error (MMSE) channel estimation h^u(t)\hat{h}_{u}(t) for IIoT device-uu. Given the obtained h^u(t)\hat{h}_{u}(t), the hu(t)h_{u}(t) can be given as

hu(t)=h^u(t)+e~u(t),u𝒰,h_{u}(t)=\hat{h}_{u}(t)+\tilde{e}_{u}(t),u\in\mathcal{U}, (2)

where e~u(t)𝒞𝒩(0,σe,u2)\tilde{e}_{u}(t)\!\sim\!\mathcal{CN}\left(0,\sigma_{e,u}^{2}\right), with σe,u2=11+γ¯p,u(t)Np,u\sigma_{e,u}^{2}\!=\!\frac{1}{1+\bar{\gamma}_{p,u}(t)N_{p,u}}, and γ¯p,u(t)\bar{\gamma}_{p,u}(t) denotes the actual signal-noise-ratio (SNR) of IIoT device-uu during the training phase, which is constant and known at both transmitter and receiver. The channel estimation h^u\hat{h}_{u} is Gaussian distributed as h^u𝒞𝒩(0,ρu2)\hat{h}_{u}\!\sim\!\mathcal{CN}\left(0,\rho_{u}^{2}\right) with ρu2=γ¯p,uNp,u/(1+γ¯p,uNp,u)\rho_{u}^{2}\!=\!\bar{\gamma}_{p,u}N_{p,u}/\left(1+\bar{\gamma}_{p,u}N_{p,u}\right). Then, the actual SNR Γq=γ¯q|hu|2\Gamma_{q}=\bar{\gamma}_{q}|h_{u}|^{2} can be given as follows:

Γq=γ¯q|h^u|2+2γ¯q|h^u|{ej(h^u)e~u}+γ¯q|e~u|2,\Gamma_{q}=\bar{\gamma}_{q}|\hat{h}_{u}|^{2}+2\bar{\gamma}_{q}|\hat{h}_{u}|\Re\left\{e^{-j\angle\left(\hat{h}_{u}\right)}\tilde{e}_{u}\right\}+\bar{\gamma}_{q}|\tilde{e}_{u}|^{2}, (3)

where operators {}\Re\{\cdot\} and {}\angle\{\cdot\} represent the real part and phase of the complex number, respectively. The term {ej(h^u)e~u}\Re\left\{e^{-j\angle\left(\hat{h}_{u}\right)}\tilde{e}_{u}\right\} follows a Gaussian distribution with variance σe,u2/2\sigma_{e,u}^{2}/2, and the term of estimation error γ¯q|e~u|2\bar{\gamma}_{q}|\tilde{e}_{u}|^{2} becomes quite small after sufficient pilot training, i.e., |e~u||h^u||\tilde{e}_{u}|\ll|\hat{h}_{u}|, which can be reasonably neglected in (3). In this case, the distribution of Γq\Gamma_{q} can be approximated as Γq𝒩(γ^q,σ^q)\Gamma_{q}\sim\mathcal{N}\left(\widehat{\gamma}_{q},\widehat{\sigma}_{q}\right), where γ^q=γ¯q|h^u|2\widehat{\gamma}_{q}=\bar{\gamma}_{q}|\hat{h}_{u}|^{2}, σ^q=2γ¯u2|h^u|2σe,u2\widehat{\sigma}_{q}=2\bar{\gamma}_{u}^{2}|\hat{h}_{u}|^{2}\sigma_{e,u}^{2}, and γ¯q=pqζu/σn2\bar{\gamma}_{q}=p_{q}\zeta_{u}/\sigma_{n}^{2} denotes the average SNR of stream xqx_{q}. If q{(1,1),(1,2)}q\in\big{\{}(1,1),(1,2)\big{\}}, then u=1u=1; otherwise, u=2u=2. The blocklength used for short-packet communications and channel estimation is typically extremely limited. We consider that the blocklength of each time slot is N0N_{0}, then only Nd=N0Np,1Np,2N_{d}\!=\!N_{0}-N_{p,1}-N_{p,2} channel uses (CUs) available for short-packet data transmission.

At the receiver side, we consider that the streams are decoded in the order of x1,1x1,2x2x_{1,1}\!\rightarrow\!x_{1,2}\!\rightarrow\!x_{2}222The decoding order can be categorized into six cases, including (1) x1,1x2x1,2x_{1,1}\!\rightarrow\!x_{2}\!\rightarrow\!x_{1,2}, (2) x1,2x2x1,1x_{1,2}\!\rightarrow\!x_{2}\!\rightarrow\!x_{1,1}, (3) x1,1x1,2x2x_{1,1}\!\rightarrow\!x_{1,2}\!\rightarrow\!x_{2}, (4) x1,2x1,1x2x_{1,2}\!\rightarrow\!x_{1,1}\!\rightarrow\!x_{2}, (5) x2x1,1x1,2x_{2}\!\rightarrow\!x_{1,1}\!\rightarrow\!x_{1,2}, (6) x2x1,2x1,1x_{2}\!\rightarrow\!x_{1,2}\!\rightarrow\!x_{1,1}. Without loss of generality, we select the decoding order (3) in this paper.. Accordingly, x1,1(t)x_{1,1}(t) is first decoded by treating x1,2(t)x_{1,2}(t) and x2(t)x_{2}(t) as noise. Then, the SINR of x1,1(t)x_{1,1}(t) is represented as

Γ^1,1(t)=Γ1,1(t)Γ1,2(t)+Γ2(t)+1.\widehat{\Gamma}_{1,1}(t)=\frac{\Gamma_{1,1}(t)}{\Gamma_{1,2}(t)+\Gamma_{2}(t)+1}. (4)

If x1,1(t)\!x_{1,1}(t)\! is decoded successfully, it can be reconstructed into M^1,1(t)\!\widehat{M}_{1,1}(t), and then removed from the received signal y(t)y(t). Secondly, x1,2(t)x_{1,2}(t) is decoded by treating x2(t)\!x_{2}(t)\! as noise. Thus, the SINR of x1,2(t)x_{1,2}(t) can be expressed as

Γ^1,2(t)=Γ1,2(t)Γ2(t)+1.\widehat{\Gamma}_{1,2}(t)=\frac{\Gamma_{1,2}(t)}{\Gamma_{2}(t)+1}. (5)

If x1,2(t)x_{1,2}(t)\! is decoded successfully, it can also be reconstructed into M^1,2(t)\!\!\widehat{M}_{1,2}(t), and removed from y(t)y(t). Using a message combiner, the estimated message of IIoT device-11 is M^1(t)=M^1,1(t)+M^1,2(t)\!\widehat{M}_{1}(t)\!=\!\widehat{M}_{1,1}(t)\!+\!\widehat{M}_{1,2}(t). Finally, the SINR of x2(t)x_{2}(t) can be given as follows:

Γ^2(t)=Γ2(t).\widehat{\Gamma}_{2}(t)=\Gamma_{2}(t). (6)

If x2(t)x_{2}(t) is decoded successfully, it can be reconstructed into M^2(t)\widehat{M}_{2}(t).

II-B Short-packet Data Communications Model

Considering the short-packet size of xqx_{q} to be BqB_{q} bits, typically Bq500B_{q}\!\leq\!500 bits, q𝒬q\!\in\!\mathcal{Q}. Then, the achievable coding rate can be expressed as Rq=BqNdR_{q}=\frac{B_{q}}{N_{d}} (bpcu). Following the finite blocklength coding (FBC) theory [3, 4, 9], the decoding error probability can be given by

ϵ¯q(𝐁,𝐩)\displaystyle\bar{\bm{\epsilon}}_{q}\left(\bm{\mathrm{B}},\bm{\mathrm{p}}\right) =𝔼Γ^q[Q(ln(1+Γ^q(t))BqNdln21Nd(11(1+Γ^q)2))]\displaystyle=\mathbb{E}_{\widehat{\Gamma}_{q}}\left[Q\left(\frac{\ln\left(1+\widehat{\Gamma}_{q}(t)\right)-\frac{B_{q}}{N_{d}}\ln 2}{\sqrt{\frac{1}{N_{d}}\left(1-\frac{1}{(1+\widehat{\Gamma}_{q})^{2}}\right)}}\right)\right] (7)
𝔼Γ^q[Q(f(𝐁,𝐩))].\displaystyle\triangleq\mathbb{E}_{\widehat{\Gamma}_{q}}\bigg{[}Q\big{(}f(\bm{\mathrm{B}},\bm{\mathrm{p}})\big{)}\bigg{]}.

where Q()Q(\cdot) denotes the Q-function, which can be expressed by Q(x)=x12πex2/2dxQ(x)=\int_{x}^{\infty}\frac{1}{\sqrt{2\pi}}e^{-x^{2}/2}\mathrm{d}x. According to RSMA principles [5, 12, 11], since the rate of the IIoT device-11 R1R_{1} is split, the achievable data rate of x1,1(t)x_{1,1}(t) and x1,2(t)x_{1,2}(t) can be represented as R1,1(t)=αR1(t)R_{1,1}(t)\!=\!\alpha R_{1}(t) and R1,2(t)=(1α)R1(t)R_{1,2}(t)\!=\!(1-\alpha)R_{1}(t), respectively, where 0α10\leq\alpha\leq 1 denotes the rate allocation ratio [12, 11].

III SNC-Based SQP Theoretical Framework

In this section, we develop a dependable SNC-SQP theoretical framework. In particular, we introduce a novel terminology termed SDVP to characterize the tail distribution of delays. We derive the closed-form expressions for the PDFs of Γ^1,1\widehat{\Gamma}_{1,1}, Γ^1,2\widehat{\Gamma}_{1,2}, and Γ^2\widehat{\Gamma}_{2}, and subsequently induced the closed-form expression of UB-SDVP.

III-A Statistical Delay Violation Probability

To facilitate system-level analysis, we consider a statistical QoS-driven queueing system that employs the first-come-first-serve (FCFS) policy [3, 22, 26]. The cumulative arrival, service, and departure processes of xqx_{q} within the time interval [s,t)[s,t) are given as Aq(s,t)i=st1aq(i)A_{q}(s,t)\!\triangleq\!\sum_{i=s}^{t-1}a_{q}(i), Sq(s,t)i=st1sq(i)S_{q}(s,t)\!\triangleq\!\sum_{i=s}^{t-1}s_{q}(i), and Dq(s,t)i=st1dq(i)D_{q}(s,t)\!\triangleq\!\sum_{i=s}^{t-1}d_{q}(i), respectively. Here, aq(i)a_{q}(i) and sq(i)s_{q}(i) represent the amount of short-packet data generated by xq(i)x_{q}(i) and transmitted over wireless channels at time slot ii, respectively, while dq(i)d_{q}(i) indicates the amount of short-packet data of xq(i)x_{q}(i) that is successfully received at time slot ii. Then, to facilitate the analysis of SQP performance, we introduce a succinct and novel operator by leveraging moment generating function (MGF)-based SNC theory, which is termed min-deconvolution ^\widehat{\oslash} as follows:

Definition 1.

(min-deconvolution ^\widehat{\oslash}): The min-deconvolution between Aq(s,t)A_{q}(s,t) and Sq(s,t)S_{q}(s,t) for stream xq,q𝒬x_{q},q\!\in\!\mathcal{Q} can be given as follows:

𝐌Aq^Sq(θq,s,t)=v=1min{s,t}𝕄Aq(θq,v,t)𝕄¯Sq(θq,v,s),\mathrm{\mathbf{M}}_{A_{q}\widehat{\oslash}S_{q}}\!(\theta_{q},s,t)=\!\!\sum\limits_{v=1}^{\min\{s,t\}}\!\!\!\!\mathbb{M}_{A_{q}}(\theta_{q},v,t)\cdot\overline{\mathbb{M}}_{S_{q}}(\theta_{q},v,s), (8)

where the parameter θq>0\theta_{q}\!\!>\!\!0 denotes the statistical QoS exponent of xqx_{q}. 𝕄Aq(θq,v,t)\mathbb{M}_{A_{q}}(\theta_{q},v,t)\! and 𝕄¯Sq(θq,v,t)\overline{\mathbb{M}}_{S_{q}}(\theta_{q},v,t)\! refer to the MGF of AqA_{q} and inverse-MGF of SqS_{q}, respectively 333 In SNC theory [3, 26], θq\theta_{q} is exploited to characterize the decay rate of the queue length for statistical QoS-driven queueing systems. A larger θq\theta_{q} corresponds to xqx_{q} having stricter statistical QoS requirements. Conversely, a smaller θq\theta_{q} implies looser statistical QoS requirements [3, 26]. Given a random process U(s,t),0stU(s,t),0\leq s\leq t, the MGF of U(s,t)U(s,t) is denoted as 𝕄U(θ,s,t)=𝔼[eθU(s,t)]\mathbb{M}_{U}(\theta,s,t)=\mathbb{E}\left[e^{\theta U(s,t)}\right], and the inverse-MGF of U(s,t)U(s,t) is 𝕄¯U(θ,s,t)=𝔼[eθU(s,t)]\overline{\mathbb{M}}_{U}(\theta,s,t)=\mathbb{E}\left[e^{-\theta U(s,t)}\right] [chen2023statistical, 26]..

Based on the operator min-deconvolution, we have the following Theorem 1:

Theorem 1.

Given Aq(s,t)\!A_{q}(s,t) and Sq(s,t)S_{q}(s,t), the SDVP of xq,q𝒬x_{q},q\!\in\!\mathcal{Q} can be expressed as follows:

(Wq(t)>wqth)infθq>0𝐌Aq^Sq(θq,t+wqth,t),\mathbb{P}\left(W_{q}(t)\!>\!w_{q}^{th}\right)\!\leq\!\inf_{\theta_{q}>0}\mathrm{\mathbf{M}}_{A_{q}\widehat{\oslash}S_{q}}(\theta_{q},t+w_{q}^{th},t),\vspace{-0.8em} (9)

where Wq(t)W_{q}(t) and wqthw_{q}^{th} denote the actual delay and target delay of xqx_{q}, respectively.

Proof.

The proof of Theorem 1 is given in Appendix A. ∎

III-B The Closed-Form Expression of UB-SDVP

The promotion of MGF-SNC theory in Theorem 1 provides a crucial theoretical foundation for further deriving the closed-form expression of UB-SDVP for the developed RSMA-xURLLC-IIoT network architecture. We consider Aq(s,t)A_{q}(s,t), Sq(s,t)S_{q}(s,t), and Dq(s,t)D_{q}(s,t) have independent and identically distributed (i.i.d.) increments. Then, the MGF and the inverse-MGF of Aq(s,t)A_{q}(s,t) and Sq(s,t)S_{q}(s,t) can be respectively expressed as follows:

𝕄Aq(θq,s,t)=(𝔼[eθqaq])ts=(𝕄aq(θq))ts,\displaystyle\mathbb{M}_{A_{q}}\left(\theta_{q},s,t\right)=\left(\mathbb{E}\left[e^{\theta_{q}a_{q}}\right]\right)^{t-s}=\left(\mathbb{M}_{a_{q}}\left(\theta_{q}\right)\right)^{t-s}, (10a)
𝕄¯Sq(θq,s,t)=(𝔼[eθqsq])ts=(𝕄¯sq(θq))ts.\displaystyle\overline{\mathbb{M}}_{S_{q}}\left(\theta_{q},s,t\right)=\left(\mathbb{E}\left[e^{\theta_{q}s_{q}}\right]\right)^{t-s}=\left(\overline{\mathbb{M}}_{s_{q}}\left(\theta_{q}\right)\right)^{t-s}. (10b)

Combining Definition 1 with (10a) and (10b), we can derive the closed-form expression of UB-SDVP, as stated in Theorem 2.

Theorem 2.

Given the target delay wqthw_{q}^{th}, the SDVP of xq(t),q𝒬x_{q}(t),q\!\in\!\mathcal{Q} can be upper bounded by

(Wq(t)wqth)inf0<θq<θ0{(𝕄¯sq(θq))wqth1𝕄aq(θq)𝕄¯sq(θq)},\mathbb{P}\left(W_{q}\left(t\right)\!\geq\!w_{q}^{th}\right)\!\leq\!\inf_{0<\theta_{q}<\theta_{0}}\!\!\left\{\!\!\frac{\big{(}\overline{\mathbb{M}}_{s_{q}}\left(\theta_{q}\right)\big{)}^{w_{q}^{th}}}{1\!-\!\mathbb{M}_{a_{q}}\left(\theta_{q}\right)\cdot\overline{\mathbb{M}}_{s_{q}}\left(\theta_{q}\right)}\!\!\right\}, (11)

where 𝕄aq(θq)𝕄¯sq(θq)<1\mathbb{M}_{a_{q}}\left(\theta_{q}\right)\cdot\overline{\mathbb{M}}_{s_{q}}\left(\theta_{q}\right)<1 denotes the stability condition, and θ0=sup{θq:𝕄aq(θq)𝕄¯sq(θq)<1}\theta_{0}\!=\!\sup\left\{\!\theta_{q}\!:\!\mathbb{M}_{a_{q}}\!\!\left(\theta_{q}\right)\!\cdot\!\overline{\mathbb{M}}_{s_{q}}\!\!\left(\theta_{q}\right)\!<\!1\right\}.

Proof.

According to Definition 1, the min-deconvolution between Aq(s,t)A_{q}\left(s,t\right) and Sq(s,t)S_{q}\left(s,t\right) can be expressed by (12), where τ=max{0,st}\tau=\max\left\{0,s-t\right\}. Substituting (10a) and (10b) into (12), respectively, we can derive the inequality (a). Based on inequality (a), equality (b) can be further deduced by taking variable replacement, i.e., v=suv=s-u. Inequality (c) can be derived by scaling the upper bound of the summation sign in (b) from ss to ++\infty. Finally, according to the relevant properties of the geometric series, when the stability condition 𝕄aq(θq)𝕄¯sq(θq)<1\mathbb{M}_{a_{q}}\left(\theta_{q}\right)\cdot\overline{\mathbb{M}}_{s_{q}}\left(\theta_{q}\right)<1 holds, equality (d) can be easily derived.

𝐌Aq^Sq(θq,s,t)\displaystyle\bm{\mathrm{M}}_{A_{q}\widehat{\oslash}S_{q}}\left(\theta_{q},s,t\right) (a)u=0min(s,t)(𝕄aq(θq))tu(𝕄¯sq(θq))su=(b)(𝕄aq(θq))tsv=τs(𝕄aq(θq)𝕄¯sq(θq))v\displaystyle\overset{(a)}{\leq}\sum_{u=0}^{\min\left(s,t\right)}\left(\mathbb{M}_{a_{q}}\left(\theta_{q}\right)\right)^{t-u}\cdot\left(\overline{\mathbb{M}}_{s_{q}}\left(\theta_{q}\right)\right)^{s-u}\overset{(b)}{=}\left(\mathbb{M}_{a_{q}}\left(\theta_{q}\right)\right)^{t-s}\cdot\sum\limits_{v=\tau}^{s}\left(\mathbb{M}_{a_{q}}\left(\theta_{q}\right)\overline{\mathbb{M}}_{s_{q}}\left(\theta_{q}\right)\right)^{v} (12)
(c)(𝕄aq(θq))tsv=τ(𝕄aq(θq)𝕄¯sq(θq))v=(d)(𝕄aq(θq))ts(𝕄aq(θq)𝕄¯sq(θq))τ1𝕄aq(θq)𝕄¯sq(θq)\displaystyle\overset{(c)}{\leq}\left(\mathbb{M}_{a_{q}}\left(\theta_{q}\right)\right)^{t-s}\cdot\sum\limits_{v=\tau}^{\infty}\left(\mathbb{M}_{a_{q}}\left(\theta_{q}\right)\overline{\mathbb{M}}_{s_{q}}\left(\theta_{q}\right)\right)^{v}\overset{(d)}{=}\frac{\left(\mathbb{M}_{a_{q}}\left(\theta_{q}\right)\right)^{t-s}\cdot\left(\mathbb{M}_{a_{q}}\left(\theta_{q}\right)\overline{\mathbb{M}}_{s_{q}}\left(\theta_{q}\right)\right)^{\tau}}{1-\mathbb{M}_{a_{q}}\left(\theta_{q}\right)\overline{\mathbb{M}}_{s_{q}}\left(\theta_{q}\right)}

So the proof of Theorem 2 can be concluded. ∎

Theorem 2 refers that further derivation of the inverse-MGF of the service process increment sqs_{q} (i.e., 𝕄¯sq(θq)\overline{\mathbb{M}}_{s_{q}}\left(\theta_{q}\right)) and the MGF of the arrival increment aqa_{q} (i.e., 𝕄aq(θq)\mathbb{M}_{a_{q}}\left(\theta_{q}\right)) is essential to determine the closed-form expression for UB-SDVP. In this case, we consider the arrival process follows a Poisson distribution, as follows:

𝕄aq(θq)=z=1ezθq(λq)zeλqz!=eλq(eθq1),\mathbb{M}_{a_{q}}\!\left(\theta_{q}\right)\!=\!\sum\limits_{z=1}^{\infty}\!e^{z\theta_{q}}\frac{(\lambda_{q}^{{\dagger}})^{z}e^{-\lambda_{q}^{{\dagger}}}}{z!}\!=\!e^{\lambda_{q}^{{\dagger}}\left(\!e^{\theta_{q}}-1\!\right)}, (13)

where λq\!\lambda_{q}^{{\dagger}}\! denotes the average arrival rate of Aq(s,t)\!A_{q}\!\left(s,t\right).

The inverse-MGF 𝕄¯sq(θq)\overline{\mathbb{M}}_{s_{q}}\!(\theta_{q}) depends on Γ^q(t)\widehat{\Gamma}_{q}(t), which varies from time slots, thus 𝕄¯sq(θq)\overline{\mathbb{M}}_{s_{q}}\!(\theta_{q}) can be given by

𝕄¯sq(θq)=𝔼Γ^q[eθqNdRq]+ϵq(B,Nd,𝐩)(1𝔼Γ^q[eθqNdRq]),\overline{\mathbb{M}}_{s_{q}}\!\!\left(\theta_{q}\right)\!=\!\mathbb{E}_{\widehat{\Gamma}_{\!q}}\!\!\left[e^{-\theta_{q}N_{d}R_{q}}\right]\!+\epsilon_{q}\left(B,N_{d},\bm{\mathrm{p}}\right)\big{(}1\!-\!\mathbb{E}_{\widehat{\Gamma}_{\!q}}\!\!\left[e^{-\theta_{q}N_{d}R_{q}}\right]\big{)}, (14)

where 𝔼Γ^q[]\mathbb{E}_{\widehat{\Gamma}_{q}}\left[\cdot\right] denotes the expectation operator of Γ^q(t)\widehat{\Gamma}_{q}(t). From (14), the expression of p.d.f. for Γ^q(t)\widehat{\Gamma}_{q}(t) is indispensable for determining 𝕄¯sq(θq)\overline{\mathbb{M}}_{s_{q}}\!\!\left(\theta_{q}\right), which motivates Lemma 1 as follows:

Lemma 1.

Given the transmit power 𝐩=[p1,1,p1,2,p2]\bm{\mathrm{p}}\!=\!\big{[}p_{1,1},p_{1,2},p_{2}\big{]}, the PDF of Γ^q\widehat{\Gamma}_{q} can be given as follows:

fΓ^q(x)=\displaystyle f_{\widehat{\Gamma}_{q}}\!(x)= (15)
{1σ^22πexp{(xγ^2)22σ^22},if Γ^q=Γ^2;01+y2πσ1,2σ2exp{((x+xyγ^1,2)22σ^1,22+(yγ^2)22σ^22)}dy,if Γ^q=Γ^1,2;01+y2πσ^1,1σ^exp{((x+xyγ^1,1)22σ^1,12+(yγ^)22σ^2)}dy,if Γ^q=Γ^1,1,\displaystyle\!\!\!\!\left\{\begin{array}[]{ll}\!\!\!\!\frac{1}{\widehat{\sigma}_{2}\sqrt{2\pi}}\exp\!\left\{\!-\frac{(x-\widehat{\gamma}_{2})^{2}}{2\widehat{\sigma}_{2}^{2}}\!\right\},\!\!\!&\hbox{if $\widehat{\Gamma}_{\!q}\!=\!\widehat{\Gamma}_{\!2}$;}\\ \!\!\!\!\int_{0}^{\infty}\!\!\!\frac{1+y}{2\pi\sigma_{1,2}\sigma_{2}}\!\cdot\!\exp\!\left\{\!\!-\!\!\left(\!\frac{\left(x+xy-\widehat{\gamma}_{1,2}\right)^{2}}{2\widehat{\sigma}_{1,2}^{2}}\!+\!\frac{\left(y-\widehat{\gamma}_{2}\right)^{2}}{2\widehat{\sigma}_{2}^{2}}\!\right)\!\!\right\}\!\!\,\mathrm{d}y,\!\!\!&\hbox{if $\widehat{\Gamma}_{\!q}\!=\!\widehat{\Gamma}_{\!1,2}$;}\\ \!\!\!\!\int_{0}^{\infty}\!\!\!\frac{1+y}{2\pi\widehat{\sigma}_{1,1}\widehat{\sigma}_{\sum}}\!\cdot\!\exp\!\left\{\!\!-\!\!\left(\!\!\frac{\left(x+xy-\widehat{\gamma}_{1,1}\right)^{2}}{2\widehat{\sigma}_{1,1}^{2}}\!+\!\frac{\left(y-\widehat{\gamma}_{\sum}\right)^{2}}{2\widehat{\sigma}_{\sum}^{2}}\!\right)\!\!\right\}\!\!\,\mathrm{d}y,\!\!\!&\hbox{if $\widehat{\Gamma}_{\!q}\!=\!\widehat{\Gamma}_{\!1,1}$,}\end{array}\right.

where σ^2=σ^1,22+σ^22\widehat{\sigma}_{\sum}^{2}=\widehat{\sigma}_{1,2}^{2}+\widehat{\sigma}_{2}^{2} and γ^=γ^1,2+γ^2\widehat{\gamma}_{\sum}=\widehat{\gamma}_{1,2}+\widehat{\gamma}_{2}.

Proof.

The proof of Lemma 1 is given in Appendix B. ∎

Combining Theorem 1, Theorem 2, and Lemma 1, the closed-form expression of UB-SDVP can be finally derived.

IV Problem Formulation And Solutions

In this section, building upon the proposed SNC-SQP theoretical framework, we delve into two critical optimization problems within our developed RSMA-xURLLC-IIoT network architecture:

  • The SQP-driven short-packet size maximization problem, the study of which is of extraordinary significance for IIoT networks since it guarantees not only the execution of complex machine instructions but also the accomplishment of coherent mission-critical tasks.

  • The SQP-driven transmit power minimization problem, which is also of great importance, particularly with the application prospect of massive xURLLC networks and battery-constrained IIoT devices.

Significantly, in both optimization problems, we jointly optimize the rate-allocation ratio, transmit power, and information bit number with the aim of maximizing short-packet size and minimizing transmit power for RSMA-xURLLC while guaranteeing the SQP performance, respectively.

IV-A The SQP-driven Short-packet Size Maximization Problem

Given the statistical QoS requirements (ξqth,wqth,εqth)\left(\xi_{q}^{th},w_{q}^{th},\varepsilon_{q}^{th}\right), where ξqth\xi_{q}^{th} denotes the threshold od SDVP, wqthw_{q}^{th} indicates the threshold of target delay, and εqth\varepsilon_{q}^{th} represents the threshold of decoding error probability. As a result, the SQP-driven short-packet size maximization problem can be formulated as

𝒫1:\displaystyle\mathcal{P}1: max{𝐁,𝐩,α}q𝒬Bq,\displaystyle\quad\max_{\{\bm{\mathrm{B}},\bm{\mathrm{p}},\alpha\}}\sum\limits_{q\in\mathcal{Q}}B_{q}, (16a)
s.t.\displaystyle\quad s.t. (Wq(t)wqth)ξqth,q𝒬,\displaystyle\quad\mathbb{P}\!\left(W_{q}\!\left(t\right)\!\geq\!w_{q}^{th}\right)\!\leq\!\xi_{q}^{th},\ \forall q\in\mathcal{Q}, (16b)
ϵ¯q(𝐁,𝐩)εqth,q𝒬,\displaystyle\quad\bar{\bm{\epsilon}}_{q}\left(\bm{\mathrm{B}},\bm{\mathrm{p}}\right)\!\leq\!\varepsilon_{q}^{th},\ \forall q\in\mathcal{Q}, (16c)
0pqpmax,q𝒬,\displaystyle\quad 0\leq p_{q}\leq p_{max},\ \forall q\in\mathcal{Q}, (16d)
BminBqBmax,q𝒬,\displaystyle\quad B_{min}\leq B_{q}\leq B_{max},\ \forall q\in\mathcal{Q}, (16e)
0α1,\displaystyle\quad 0\leq\alpha\leq 1, (16f)

where 𝐁[B1,1,B1,2,B2]\bm{\mathrm{B}}\!\triangleq\!\big{[}B_{1,1},B_{1,2},B_{2}\big{]} and 𝐩[p1,1,p1,2,p2]\bm{\mathrm{p}}\!\triangleq\!\big{[}p_{1,1},p_{1,2},p_{2}\big{]}, and (16a) defines the objective function and optimization variables; (16b) imposes a limit of ξqth\xi_{q}^{th} on the SDVP of xqx_{q}, where ξqth\xi_{q}^{th}\! is the SDVP threshold; (16c) indicates the constraint on the decoding error probability of xqx_{q}, with εqth\varepsilon_{q}^{th} as the decoding error probability threshold; (16d) restricts the transmit power pup_{u} of IIoT device-uu to a maximum value of pmaxp_{max}; (16e) specifies the constraint on the short-packet size of IIoT device-uu. Finally, (16f) defines the range of values for the rate-splitting ratio.

IV-B The SQP-driven Transmit Power Minimization Problem

Given (ξqth,wqth,εqth),q𝒬\left(\xi_{q}^{th},w_{q}^{th},\varepsilon_{q}^{th}\right),q\!\in\!\mathcal{Q}, the SQP-driven transmit power minimization problem can be formulated as

𝒫2:\displaystyle\mathcal{P}2: min{𝐁,𝐩,α}q𝒬pq,\displaystyle\quad\min_{\{\bm{\mathrm{B}},\bm{\mathrm{p}},\alpha\}}\sum\limits_{q\in\mathcal{Q}}p_{q}, (17a)
s.t.\displaystyle\quad s.t. (16b)(16f).\displaystyle\quad(\ref{e14b})-(\ref{e14f}). (17b)

The intertwined co-channel interference [12, 11] and the highly-varying wireless fading channels [3, 4] in RSMA-xURLLC-IIoT network architecture render the analytical expression for SDVP in (16b) is inaccessible [26, 22]. Additionally, the closed-form expression for the decoding error probability of short-packet data transmission becomes exceedingly complex in FBL regimes [22]. As a result, 𝒫1\mathcal{P}1 and 𝒫2\mathcal{P}2 become exceedingly intractable and cannot be tackled analytically. Fortunately, by leveraging the proposed SNC-SQP theoretical framework, the inaccessible SDVP can be converted into the manageable UB-SDVP, which not only provides insightful theoretical guidance but also guarantees relatively conservative information bit transmission and power allocation schemes. Consequently, (16b) in 𝒫1\mathcal{P}1 and 𝒫2\mathcal{P}2 can be reformulated as follows:

𝒦q(wqth,𝐁,𝐩,α)=inf0<θqθ0{(𝕄¯sq(θq))wqth1𝕄aq(θq)𝕄¯sq(θq)}ξqth,\displaystyle\mathcal{K}_{q}\left(w_{q}^{th},\bm{\mathrm{B}},\bm{\mathrm{p}},\alpha\right)=\inf_{0<\theta_{q}\leq\theta_{0}}\!\!\left\{\!\!\frac{\left(\overline{\mathbb{M}}_{s_{q}}\!\!\left(\theta_{q}\right)\right)^{w_{q}^{th}}}{1\!-\!\mathbb{M}_{a_{q}}\!\!\left(\theta_{q}\right)\cdot\overline{\mathbb{M}}_{s_{q}}\!\!\left(\theta_{q}\right)}\!\!\right\}\!\leq\!\xi_{q}^{th}, (18a)
𝕄aq(θq)𝕄¯sq(θq)<1,q𝒬,\displaystyle\mathbb{M}_{a_{q}}\!\!\left(\theta_{q}\right)\cdot\overline{\mathbb{M}}_{s_{q}}\!\!\left(\theta_{q}\right)<1,\ \forall q\in\mathcal{Q}, (18b)

where (18a) imposes a limit of ξqth\xi_{q}^{th} on the UB-SDVP for stream xqx_{q}, and (18b)(\ref{e16}b) represents the stability condition of UB-SDVP.

IV-C Proposed Solutions

Due to the complex constraints, solving 𝒫1\mathcal{P}1 and 𝒫2\mathcal{P}2 remains non-trivial. Therefore, we focus on exploring the intrinsic properties of 𝒫1\mathcal{P}1 and 𝒫2\mathcal{P}2.

Corollary 1.

Given the transmit power 𝐩\bm{\mathrm{p}}, the short-packet size 𝐁\bm{\mathrm{B}}, and the rate-allocation ratio α\alpha, both (18a) and (18b) are the convex functions with respect to θq\theta_{q}, and there exists the maximum feasible region [0,θqmax(𝐩,𝐁,α)]\left[0,\theta_{q}^{max}\left(\bm{\mathrm{p}},\bm{\mathrm{B}},\alpha\right)\right] and the optimal value of θq(𝐩,𝐁,α)\theta_{q}^{\ast}\!\left(\bm{\mathrm{p}},\bm{\mathrm{B}},\alpha\right) for xq,q𝒬x_{q},q\!\in\!\mathcal{Q}.

Proof.

The detailed proof of Corollary 1 can be found in Appendix C. ∎

From Corollary 1, [0,θqmax(𝐩,𝐁,α)]\left[0,\theta_{q}^{max}\!\left(\bm{\mathrm{p}},\bm{\mathrm{B}},\alpha\right)\right] can be easily determined by the one-dimensional search method. According to the properties of the convex function, we can easily determine θq(𝐩,𝐁,α)\theta_{q}^{\ast}\!\left(\bm{\mathrm{p}},\bm{\mathrm{B}},\alpha\right) through stochastic gradient descent (SGD) method444Due to space limitations, we have omitted detailed descriptions of one-dimensional search method and SGD method here since they are the fundamental content of optimization theory..

Corollary 2.

The decoding error probability ϵ¯q(𝐁,𝐩)\bm{\bar{\epsilon}}_{q}\!\left(\bm{\mathrm{B}},\bm{\mathrm{p}}\right) given by (7)(\ref{e7}) is strictly decreasing with respect to pqp_{q}, and strictly increasing with respect to BqB_{q}.

Proof.

According to (7), we can obtain ϵ¯q(𝐁,𝐩)pq\frac{\partial\bm{\bar{\epsilon}}_{q}\!\left(\bm{\mathrm{B}},\bm{\mathrm{p}}\right)}{\partial p_{q}} as follows:

ϵ¯q(𝐁,𝐩)pq=Γ^qpqϵ¯q(𝐁,𝐩)Γ^q=Γ^qpq𝔼Γ^q[Q(f(𝐁,𝐩))Γ^q].\frac{\partial\bm{\bar{\epsilon}}_{q}\!\left(\bm{\mathrm{B}},\bm{\mathrm{p}}\right)}{\partial p_{q}}=\frac{\partial\widehat{\Gamma}_{q}}{\partial p_{q}}\cdot\frac{\partial\bm{\bar{\epsilon}}_{q}\!\left(\bm{\mathrm{B}},\bm{\mathrm{p}}\right)}{\partial\widehat{\Gamma}_{q}}=\frac{\partial\widehat{\Gamma}_{q}}{\partial p_{q}}\cdot\mathbb{E}_{\widehat{\Gamma}_{q}}\!\bigg{[}\frac{\partial Q\big{(}f(\bm{\mathrm{B}},\bm{\mathrm{p}})\big{)}}{\partial\widehat{\Gamma}_{q}}\bigg{]}.

From [3, Theorems 5], ϵ¯q(𝐁,𝐩)\bm{\bar{\epsilon}}_{q}\left(\bm{\mathrm{B}},\bm{\mathrm{p}}\right) is a monotonically decreasing function with respect to Γ^q\widehat{\Gamma}_{q}. Moreover, it can be easily obtained that Γ^qpq>0\frac{\partial\widehat{\Gamma}_{q}}{\partial p_{q}}>0, thus ϵ¯q(𝐁,𝐩)pq<0\frac{\partial\bm{\bar{\epsilon}}_{q}\!\left(\bm{\mathrm{B}},\bm{\mathrm{p}}\right)}{\partial p_{q}}<0.

Next, we prove the monotonic increasing property of ϵ¯q(𝐁,𝐩)\bm{\bar{\epsilon}}_{q}\!\left(\bm{\mathrm{B}},\bm{\mathrm{p}}\right) with respect to BqB_{q}. The partial derivative of ϵ¯q(𝐁,𝐩)\bm{\bar{\epsilon}}_{q}\!\left(\bm{\mathrm{B}},\bm{\mathrm{p}}\right) in BqB_{q} can be given by

ϵ¯q(𝐁,𝐩)Bq=𝔼Γ^q[Q(f(𝐁,𝐩))Bq].\frac{\partial\bm{\bar{\epsilon}}_{q}\!\left(\bm{\mathrm{B}},\bm{\mathrm{p}}\right)}{\partial B_{q}}=\mathbb{E}_{\widehat{\Gamma}_{q}}\!\bigg{[}\frac{\partial Q\big{(}f(\bm{\mathrm{B}},\bm{\mathrm{p}})\big{)}}{\partial B_{q}}\bigg{]}. (19)

The partial derivative of Q(f(𝐁,𝐩))Q\big{(}f(\bm{\mathrm{B}},\bm{\mathrm{p}})\big{)} with respect to BqB_{q} can be derived as follows:

Q(f(𝐁,𝐩))Bq=ln2exp(12f2(𝐁,𝐩))2πNd(11(1+Γ^)2)>0.\frac{\partial Q\big{(}f(\bm{\mathrm{B}},\bm{\mathrm{p}})\big{)}}{\partial B_{q}}=\frac{\ln 2\exp\left(-\frac{1}{2}f^{2}(\bm{\mathrm{B}},\bm{\mathrm{p}})\right)}{\sqrt{2\pi N_{d}\left(1-\frac{1}{(1+\widehat{\Gamma})^{2}}\right)}}>0.\vspace{-0.2em} (20)

Combining (19) and (20), it is obvious that ϵ¯q(𝐁,𝐩)\bm{\bar{\epsilon}}_{q}\!\left(\bm{\mathrm{B}},\bm{\mathrm{p}}\right) is a strictly increasing function of BqB_{q}. So the proof of Corollary 2 is concluded. ∎

In addition, we also investigate the intrinsic properties of UB-SDVP as follows:

Corollary 3.

The UB-SDVP 𝒦q(wqth,𝐁,𝐩,α)\mathcal{K}_{q}\left(w_{q}^{th},\bm{\mathrm{B}},\bm{\mathrm{p}},\alpha\right) given by (18a) is strictly decreasing with respect to transmit power pqp_{q}, and strictly increasing with respect to the information bit number (i.e., the short-packet size) BqB_{q}.

Proof.

The partial derivative of 𝒦q(wqth,𝐁,𝐩,α)\mathcal{K}_{q}\left(w_{q}^{th},\bm{\mathrm{B}},\bm{\mathrm{p}},\alpha\right) in pqp_{q} can be given as follows:

𝒦q(wqth,𝐁,𝐩,α)pq=𝒦q(wqth,𝐁,𝐩,α)𝕄¯sq(θq)𝕄¯sq(θq)pq.\frac{\partial\mathcal{K}_{q}\left(w_{q}^{th},\bm{\mathrm{B}},\bm{\mathrm{p}},\alpha\right)}{\partial p_{q}}=\frac{\partial\mathcal{K}_{q}\left(w_{q}^{th},\bm{\mathrm{B}},\bm{\mathrm{p}},\alpha\right)}{\partial\overline{\mathbb{M}}_{s_{q}}\left(\theta_{q}\right)}\frac{\partial\overline{\mathbb{M}}_{s_{q}}\left(\theta_{q}\right)}{\partial p_{q}}. (21)

It can be easily obtained that 𝒦q(wqth,𝐁,𝐩,α)𝕄¯sq(θq)>0\frac{\partial\mathcal{K}_{q}\left(w_{q}^{th},\bm{\mathrm{B}},\bm{\mathrm{p}},\alpha\right)}{\partial\overline{\mathbb{M}}_{s_{q}}\left(\theta_{q}\right)}>0. Next, we examine the monotonicity of 𝕄¯sq(θq)\overline{\mathbb{M}}_{s_{q}}\left(\theta_{q}\right) as follows:

𝕄¯sq(θq)pq=0+(1𝔼Γ^q[eθqNdRq])pq{ϵ¯(𝐁,𝐩)}<0.\frac{\partial\overline{\mathbb{M}}_{s_{q}}\left(\theta_{q}\right)}{\partial p_{q}}=0+\big{(}1\!-\!\mathbb{E}_{\widehat{\Gamma}_{\!q}}\!\!\left[e^{-\theta_{q}N_{d}R_{q}}\right]\!\big{)}\!\cdot\!\frac{\partial}{\partial p_{q}}\big{\{}\bm{\bar{\epsilon}}\left(\bm{\mathrm{B}},\bm{\mathrm{p}}\right)\!\big{\}}<0.\vspace{-0.5em} (22)

Thus, 𝒦q(wqth,𝐁,𝐩,α)\mathcal{K}_{q}\!\!\left(w_{q}^{th},\bm{\mathrm{B}},\bm{\mathrm{p}},\alpha\right) is strictly decreasing with pqp_{q}. And the partial derivative of 𝒦q(wqth,𝐁,𝐩,α)\mathcal{K}_{q}\!\!\left(w_{q}^{th},\bm{\mathrm{B}},\bm{\mathrm{p}},\alpha\right) in BqB_{q} can be given as follows:

𝒦q(wqth,𝐁,𝐩,α)Bq=𝒦q(wqth,𝐁,𝐩,α)𝕄¯sq(θq)𝕄¯sq(θq)Bq.\frac{\partial\mathcal{K}_{q}\!\left(w_{q}^{th},\bm{\mathrm{B}},\bm{\mathrm{p}},\alpha\right)}{\partial B_{q}}=\frac{\partial\mathcal{K}_{q}\!\left(w_{q}^{th},\bm{\mathrm{B}},\bm{\mathrm{p}},\alpha\right)}{\partial\overline{\mathbb{M}}_{s_{q}}\left(\theta_{q}\right)}\frac{\partial\overline{\mathbb{M}}_{s_{q}}\left(\theta_{q}\right)}{\partial B_{q}}. (23)

Then, we examine the notation of 𝕄¯sq(θq)Bq\frac{\partial\overline{\mathbb{M}}_{s_{q}}\left(\theta_{q}\right)}{\partial B_{q}} as follows:

𝕄¯sq(θq)Bq=Bq{𝔼Γ^q[eθqBq]}+Bq{ϵ¯(𝐁,𝐩)}\displaystyle\frac{\partial\overline{\mathbb{M}}_{s_{q}}\left(\theta_{q}\right)}{\partial B_{q}}=\frac{\partial}{\partial B_{q}}\!\!\left\{\!\mathbb{E}_{\widehat{\Gamma}_{\!q}}\!\!\left[e^{-\theta_{q}B_{q}}\right]\!\right\}+\frac{\partial}{\partial B_{q}}\big{\{}\!\bm{\bar{\epsilon}}\left(\bm{\mathrm{B}},\bm{\mathrm{p}}\right)\!\!\big{\}}- (24)
(ϵ¯(𝐁,𝐩)Bq{𝔼Γ^q[eθqBq]}+𝔼Γ^q[eθqBq]Bq{ϵ¯(𝐁,𝐩)})\displaystyle\left(\!\bm{\bar{\epsilon}}\left(\bm{\mathrm{B}},\bm{\mathrm{p}}\right)\frac{\partial}{\partial B_{q}}\!\!\left\{\!\mathbb{E}_{\widehat{\Gamma}_{\!q}}\!\!\left[e^{-\theta_{q}B_{q}}\right]\!\right\}+\mathbb{E}_{\widehat{\Gamma}_{\!q}}\!\!\left[e^{-\theta_{q}B_{q}}\right]\frac{\partial}{\partial B_{q}}\!\big{\{}\!\bm{\bar{\epsilon}}\left(\bm{\mathrm{B}},\bm{\mathrm{p}}\right)\!\!\big{\}}\!\!\right)
=(1ϵ¯(𝐁,𝐩))𝔼Γ^q[eθqBq]+(1eθqBq)Bq{ϵ¯(𝐁,𝐩)}>0.\displaystyle=\!\big{(}1\!-\!\bm{\bar{\epsilon}}\left(\bm{\mathrm{B}},\bm{\mathrm{p}}\right)\big{)}\mathbb{E}_{\widehat{\Gamma}_{\!q}}\!\!\left[e^{-\theta_{q}B_{q}}\right]\!\!+\!\!\left(1\!-\!e^{-\theta_{q}B_{q}}\!\right)\!\frac{\partial}{\partial B_{q}}\big{\{}\!\bm{\bar{\epsilon}}\left(\bm{\mathrm{B}},\bm{\mathrm{p}}\right)\!\!\big{\}}\!>\!0.

From (23) and (24), we can obtain that 𝒦q(wqth,𝐁,𝐩,α)\mathcal{K}_{q}\!\!\left(w_{q}^{th},\bm{\mathrm{B}},\bm{\mathrm{p}},\alpha\right) is a strictly increasing function of BqB_{q}. ∎

From Corollary 2 and Corollary 3, Theorem 3 can be derived as follows:

Theorem 3.

For 𝒫1\mathcal{P}1, the optimal transmit power is determined as pq=pmaxp_{q}^{\star}\!\!=\!\!p_{max}, and the optimal rate-allocation ratio is α=B1,1B1,1+B1,2\alpha^{\star}\!=\!\frac{B_{1,1}^{\star}}{B_{1,1}^{\star}+B_{1,2}^{\star}}, where B1,1B_{1,1}^{\star} and B1,2B_{1,2}^{\star} represent the optimal short-packet sizes for x1,1x_{1,1} and x1,2x_{1,2}, respectively. As for 𝒫2\mathcal{P}2, the optimal short-packet size is determined as Bq=Bmin,q𝒬B_{q}^{\star}\!=\!B_{min},q\!\in\!\mathcal{Q}, and the optimal rate-splitting ratio is α=12\alpha^{\star}\!=\!\frac{1}{2}.

Proof.

According to Corollary 2 and Corollary 3, the transmit power should be as high as possible to maximize the short-packet size. Therefore, we have pq=pmax,q𝒬p_{q}^{\star}\!\!=\!\!p_{max},q\!\in\!\mathcal{Q}. We denote that the optimal short-packet sizes for x1,1x_{1,1} and x1,2x_{1,2} are B1,1B_{1,1}^{\star} and B1,2B_{1,2}^{\star}, respectively. Based on (7), we have R1,1R1,2=B1,1/NdB1,2/Nd=α1α\frac{R_{1,1}^{\star}}{R_{1,2}^{\star}}=\frac{B_{1,1}^{\star}/N_{d}}{B_{1,2}^{\star}/N_{d}}=\frac{\alpha^{\star}}{1-\alpha^{\star}}, thus, α=B1,1B1,1+B1,2\alpha^{\star}=\frac{B_{1,1}^{\star}}{B_{1,1}^{\star}+B_{1,2}^{\star}}. Furthermore, we have Bq=BminB_{q}^{\star}=B_{min} to minimize the transmit power of short-packet communications, and we can obtain that α=12\alpha^{\star}=\frac{1}{2} since B1,1=B1,2B_{1,1}^{\star}=B_{1,2}^{\star}. ∎

Input: (wqth,ξqth)(w_{q}^{th},\xi_{q}^{th}); pmaxp_{max}; BminB_{min}; BmaxB_{max}; convergence criteria πth\pi_{th}; maximum iterations MiterM_{iter}.
Output: The optimal solution for 𝒫1\mathcal{P}1: {𝐁~,𝐩~,α~}\{\bm{\mathrm{\widetilde{B}}},\bm{\mathrm{\widetilde{p}}},\widetilde{\alpha}\}; The optimal solution for 𝒫2\mathcal{P}2: {𝐁^,𝐩^,α^}\{\bm{\mathrm{\widehat{B}}},\bm{\mathrm{\widehat{p}}},\widehat{\alpha}\}.
// Solving 𝒫1\mathcal{P}1
1 Setting p~q=pmax\widetilde{p}_{q}=p_{max}, lower-search bound Bql=BminB_{q}^{l}=B_{min}, upper-search bound Bqu=BmaxB_{q}^{u}=B_{max}, iteration index kq=1k_{q}=1, UB-SDVP ξq=0\xi_{q}=0, decoding error probability εq=0\varepsilon_{q}=0;
// ​​​​Step ​​​​​​ 1:​​​ Optimize B~2\!\!\widetilde{B}_{2}\!\! for stream x2\!x_{2}.
2 while |ξ2/ξ2th1|>πth|\xi_{2}/\xi_{2}^{th}\!-\!1|\!>\!\pi_{th} 𝐨𝐫\bm{\mathrm{or}} |ε2/ε2th1|>πth|\varepsilon_{2}/\varepsilon_{2}^{th}\!-\!1|\!>\!\pi_{th} 𝐚𝐧𝐝\bm{\mathrm{and}} k2<Miterk_{2}\!<\!M_{iter} do
3       B~2(B2l+B2u)/2\widetilde{B}_{2}\leftarrow(B_{2}^{l}+B_{2}^{u})/2;
4       Determine feasible region [0,θ2max(𝐩~,B~2)]\left[0,\theta_{2}^{max}\left(\bm{\mathrm{\widetilde{p}}},\widetilde{B}_{2}\right)\right];
5       Determine optimal QoS exponent θ2(𝐩~,B~2)\theta_{2}^{\ast}\!\left(\bm{\mathrm{\widetilde{p}}},\widetilde{B}_{2}\right);
6       Update ξ2=𝒦2(w2th,B~2,𝐩~)\xi_{2}=\mathcal{K}_{2}\big{(}w_{2}^{th},\widetilde{B}_{2},\bm{\mathrm{\widetilde{p}}}\big{)} and ε2=ϵ¯(B~2,𝐩~)\varepsilon_{2}=\bm{\bar{\epsilon}}\left(\widetilde{B}_{2},\bm{\mathrm{\widetilde{p}}}\right);
7       if ξ2/ξ2th>1\xi_{2}/\xi_{2}^{th}>1 𝐨𝐫\bm{\mathrm{or}} ε2/ε2th>1\varepsilon_{2}/\varepsilon_{2}^{th}>1 then
8             B2l(B2l+B2u)/2B_{2}^{l}\leftarrow(B_{2}^{l}+B_{2}^{u})/2;
9            
10      else
11             B2u(B2l+B2u)/2B_{2}^{u}\leftarrow(B_{2}^{l}+B_{2}^{u})/2;
12            
13       end if
14      k2k2+1k_{2}\leftarrow k_{2}+1;
15      
16 end while
// ​​​​Step ​​​​​​ 2:​​​ Optimize B~1,2\widetilde{B}_{1,2} for stream x1,2x_{1,2}.
17 Use B~2\widetilde{B}_{2} as the input of Step 2;
18 Perform similar procedures of Step 1: 4-15 to solve B~1,2\widetilde{B}_{1,2};
// ​​​​Step ​​​​​​ 3:​​​ Optimize B1,1B_{1,1} for stream x1,1x_{1,1}.
19 Use B~2\widetilde{B}_{2} and B~1,2\widetilde{B}_{1,2} as the inputs of Step 3;
20 Perform similar procedures of Step 1: 4-15 to solve B~1,1\widetilde{B}_{1,1};
21 Setting the optimal rate-split ratio α~=B~1,1/(B~1,1+B~1,2)\widetilde{\alpha}=\widetilde{B}_{1,1}/\left(\widetilde{B}_{1,1}+\widetilde{B}_{1,2}\right);
// Solving 𝒫2\mathcal{P}2
22 Setting B^q=Bmin\widehat{B}_{q}=B_{min}, α^=1/2\widehat{\alpha}=1/2, lower-search bound pql=0p_{q}^{l}=0, upper-search bound pqu=pmaxp_{q}^{u}=p_{max}, kq=1k_{q}=1, ξq=0\xi_{q}=0, εq=0\varepsilon_{q}=0;
// ​​​​Step ​​​​​​ 1:​​​ Optimize p^2\!\!\widehat{p}_{2}\!\! for stream x2\!x_{2}.
23 while |ξ2/ξ2th1|>πth|\xi_{2}/\xi_{2}^{th}\!-\!1|\!>\!\pi_{th} 𝐨𝐫\bm{\mathrm{or}} |ε2/ε2th1|>πth|\varepsilon_{2}/\varepsilon_{2}^{th}\!-\!1|\!>\!\pi_{th} 𝐚𝐧𝐝\bm{\mathrm{and}} k2<Miterk_{2}\!<\!M_{iter} do
24       p^2(p2l+p2u)/2\widehat{p}_{2}\leftarrow(p_{2}^{l}+p_{2}^{u})/2;
25       Determine feasible region [0,θ2max(p^2,𝐁^)]\left[0,\theta_{2}^{max}\left(\widehat{p}_{2},\bm{\mathrm{\widehat{B}}}\right)\right];
26       Determine optimal QoS exponent θ2(p^2,𝐁^)\theta_{2}^{\ast}\!\left(\widehat{p}_{2},\bm{\mathrm{\widehat{B}}}\right);
27       Update ξ2=𝒦2(w2th,B~2,𝐩~)\xi_{2}=\mathcal{K}_{2}\big{(}w_{2}^{th},\widetilde{B}_{2},\bm{\mathrm{\widetilde{p}}}\big{)} and ε2=ϵ¯(B~2,𝐩~)\varepsilon_{2}=\bm{\bar{\epsilon}}\left(\widetilde{B}_{2},\bm{\mathrm{\widetilde{p}}}\right);
28       if ξ2/ξ2th>1\xi_{2}/\xi_{2}^{th}>1 𝐨𝐫\bm{\mathrm{or}} ε2/ε2th>1\varepsilon_{2}/\varepsilon_{2}^{th}>1 then
29             p2l(p2l+p2u)/2p_{2}^{l}\leftarrow(p_{2}^{l}+p_{2}^{u})/2;
30            
31      else
32             p2u(p2l+p2u)/2p_{2}^{u}\leftarrow(p_{2}^{l}+p_{2}^{u})/2;
33            
34       end if
35      k2k2+1k_{2}\leftarrow k_{2}+1;
36      
37 end while
// ​​​​Step ​​​​​​ 2:​​​ Optimize p^1,2\widehat{p}_{1,2} for stream x1,2x_{1,2}.
38 Use B~2\widetilde{B}_{2} as the input of Step 2;
39 Perform similar procedures of Step 1: 26-37 to solve p^1,2\widehat{p}_{1,2};
// ​​​​Step ​​​​​​ 3:​​​ Optimize p^1,1\widehat{p}_{1,1} for stream x1,1x_{1,1}.
40 Use p^2\widehat{p}_{2} and p^1,2\widehat{p}_{1,2} as the inputs of Step 3;
Perform similar procedures of Step 1: 26-37 to solve p^1,1\widehat{p}_{1,1};
Algorithm 1 The proposed TSSO algorithm.
Refer to caption
Figure 2: Convergence behavior of short-packet size maximization in the TSSO algorithm.
Refer to caption
Figure 3: Convergence behavior of transmit power minimization in the TSSO algorithm.

Following RSMA principles [12, 11], x2x_{2} is immune to interference, x1,2x_{1,2} experiences co-channel interference from x2x_{2}, and x1,1x_{1,1} is affected by co-channel interference from both x2x_{2} and x1,2x_{1,2}. Based on the distinct characteristics of streams, we propose leveraging sequential optimization techniques to effectively solve 𝒫1\mathcal{P}1 and 𝒫2\mathcal{P}2 [39]. Specifically, we decompose 𝒫1\mathcal{P}1 and 𝒫2\mathcal{P}2 into three subproblems that need to be tackled sequentially. For Subproblem I, we focus on maximizing(or minimizing) the short-packet size (or transmit power) of stream x2x_{2}. For Subproblem II and Subproblem III, we concentrate on maximizing (or minimizing) the short-packet size (or transmit power) of streams x1,2x_{1,2} and x1,1x_{1,1}, respectively.

It can be easily observed that if these three subproblems are optimized sequentially in the reverse decoding order, i.e., x2x1,2x1,1x_{2}\!\rightarrow\!x_{1,2}\!\rightarrow\!x_{1,1}, 𝒫1\mathcal{P}1 and 𝒫2\mathcal{P}2 can be successfully decoupled into three independent subproblems [39]. For each subproblem, if 𝒦q(wqth,𝐁,𝐩,α)ξqth\mathcal{K}_{q}\!\left(w_{q}^{th},\bm{\mathrm{B}},\bm{\mathrm{p}},\alpha\right)\!\!\leq\!\!\xi_{q}^{th} and ϵ¯(𝐁,𝐩)εqth\bm{\bar{\epsilon}}\left(\bm{\mathrm{B}},\bm{\mathrm{p}}\right)\!\!\leq\!\!\varepsilon_{q}^{th}, it indicates that the short-packet size BqB_{q} (or transmit power pqp_{q}) is too small (or large) and needs to be increase (or reduced); if 𝒦q(wqth,𝐁,𝐩,α)>ξqth\mathcal{K}_{q}\!\left(w_{q}^{th},\bm{\mathrm{B}},\bm{\mathrm{p}},\alpha\right)>\xi_{q}^{th} or ϵ¯q(𝐁,𝐩)>εqth\bm{\bar{\epsilon}}_{q}\left(\bm{\mathrm{B}},\bm{\mathrm{p}}\right)>\varepsilon_{q}^{th}, it indicates that the short-packet size BqB_{q} (or pqp_{q}) is too large (or small) and needs to be reduced (or increased). In this case, we propose a low-complexity algorithm termed the three-step sequential optimization algorithm (TSSO) to effectively tackle 𝒫1\mathcal{P}1 and 𝒫2\mathcal{P}2. The detailed descriptions of TSSO are outlined in Algorithm 1.

IV-D Computational Complexity Analysis

Algorithm 1 primarily involves the one-dimensional search method and SGD algorithm. The complexity of the one-dimensional search method can be represented as 𝒪(log(ψθ/ψth))\mathcal{O}\!\left(\log\!\left(\psi_{\theta}/\psi_{th}\!\right)\right), where ψθ\psi_{\theta} and ψth\psi_{th} denote the step-length factor and step-length threshold, respectively. The complexity of the SGD method can be denoted as 𝒪(log(|𝒦q(wqth,𝒑,α)Λs|/ϕth))\mathcal{O}\left(\log(|\nabla\mathcal{K}_{q}\left(w_{q}^{th},\bm{p},\alpha\right)\Lambda_{s}|/\phi_{th})\right), where Λs\Lambda_{s} and ϕth\phi_{th} indicate the step-length factor and convergence accuracy, respectively. As a result, the complexity of Algorithm 1 is 𝒪(q𝒬kq(log(ψθ/ψth)+log(|𝒦q(wqth,𝒑,α)Λs|/ϕth)))\mathcal{O}\!\left(\sum_{q\in\mathcal{Q}}k_{q}\big{(}\!\log\left(\psi_{\theta}/\psi_{th}\right)+\log(|\nabla\mathcal{K}_{q}\!\!\left(w_{q}^{th},\bm{p},\alpha\right)\Lambda_{s}|/\phi_{th})\big{)}\!\!\right), where kqk_{q} is the number of iterations for Step i, i{1,2,3}i\in\left\{1,2,3\right\}.

V Performance Evaluation

In this section, extensive simulations are conducted to demonstrate the effectiveness of the proposed RSMA-xURLLC. The BS service radius is 500500 m, with each subcarrier operating at a bandwidth of 22 MHz and a time-slot length of 0.50.5 ms. Thus, the maximum available blocklength is N0=103N_{0}\!=\!10^{3} CUs. The lengths of the orthogonal pilot sequence is set to Np,1=Np,2=50N_{p,1}=N_{p,2}=50 CUs. The average arrival rate is 250250 kbps. The maximum uplink transmit power for each stream of IIoT devices is 1W1W, the minimum short-packet size is Bmin=80B_{min}=80 bits, and the maximum short-packet size is Bmax=500B_{max}=500 bits. The noise power level is at 176\!-176\! dBm/Hz, and the path-loss factor is 2.5\!2.5. Shadow fading is modeled as a lognormal distribution with a standard variance of 88 dB and small-scale fading follows a Rayleigh fading distribution. The parameters involved in Algorithm 1 are as follows: πth=ϕth=1015\pi_{th}\!=\!\phi_{th}\!=\!10^{-15}, Miter=200M_{iter}\!=\!200, ψθ=1\psi_{\theta}\!=\!1, ψth=Λs=106\psi_{th}\!=\!\Lambda_{s}\!=\!10^{-6}.

V-A Convergence Analysis

In Fig. 3 and Fig. 3, we showcase the superior convergence performance exhibited by the proposed TSSO in tackling 𝒫1\mathcal{P}1 and 𝒫2\mathcal{P}2, respectively. Fig. 3 reveals that the upper and lower bounds associated with short-packet sizes of streams x2x_{2}, x12x_{12}, and x11x_{11} rapidly converge as the number of iterations increases. Specifically, the short-packet sizes of streams x2x_{2}, x12x_{12}, and x11x_{11} converge after 1010, 88, and 77 iterations, respectively. Similarly, it can be observed from Fig. 3 that the upper and lower bounds of the required transmit power for streams x2x_{2}, x12x_{12}, and x11x_{11} also converge rapidly with increasing iterations. In particular, the transmit power of streams x2x_{2}, x12x_{12}, and x11x_{11} converge after 1010, 1111, and 99 iterations, respectively. Henceforth, the proposed TSSO algorithm demonstrates exceptional convergence performance, culminating in stable solutions within several iterations. Significantly, stream x11x_{11} requires the highest transmit power but it can only accommodate the smallest short-packet size. Following closely is stream x12x_{12}, while stream x2x_{2} demands the lowest transmit power while supporting the largest short-packet data size. These distinctions primarily stem from the distinctive co-channel interference characteristics inherent to streams x2x_{2}, x1,2x_{1,2}, and x1,2x_{1,2} themselves. Notably, x11x_{11} experiences interference from both streams x2x_{2} and x12x_{12} simultaneously.

V-B Validation of SNC-SQP Theoretical Framework

As illustrated in Fig. 4, we substantiate the dependability of the developed SNC-SQP theoretical framework for capturing the SQP performance. We employ Monte Carlo methods to stochastically generate 10810^{8} channels, meticulously evaluating the actual SDVP, yielding Sim-SDVP. Subsequently, we conduct a comprehensive comparative analysis by juxtaposing the UB-SDVP with the Sim-SDVP. The precisely calculated slopes of Sim-SDVP and UB-SDVP on the XX-log(Y)log(Y) axis for x11x_{11}, x12x_{12}, and x2x_{2} reveal near-identical slopes within the logarithmic domain. This compellingly demonstrates the accuracy of the developed SNC-based SQP theoretical framework in capturing the SQP performance of our developed RSMA-xURLLC-IIoT network architecture. Moreover, the observable horizontal gap between UB-SDVP and Sim-SDVP primarily arises from the fact that our theoretical framework is grounded in (min,×)(min,\times)-algebra theory [24, 26, 25], which can effectively utilize arrival processes and the distribution of fading channels to elucidate the queuing system of our developed RSMA-xURLLC-IIoT network architecture. These numerical results undeniably validate the feasibility of our theoretical framework in converting unavailable SDVP into manageable UB-SDVP, providing profound theoretical guidance for SQP-driven optimization problems. Additionally, the developed RSMA-xURLLC-IIoT network architecture incorporates the statistical QoS provisioning mechanism, which provides a more flexible and QoS-guaranteed short-packet size maximization scheme and transmit power allocation scheme, in contrast to traditional deterministic QoS provisioning mechanisms.

Refer to caption
Figure 4: Validation of the dependability for the developed SNC-SQP theoretical framework.

V-C Comprehensive Performance Comparison

To comprehensively evaluate the effectiveness of our developed RSMA-xURLLC-IIoT network architecture, we conduct an exhaustive performance comparison with state-of-the-art multi-access techniques exploited in current IIoT networks, including NOMA and OMA [4, 12, 11].

As shown in Fig. 5, the relationship between the maximum short-packet size and target delay is investigated. We have carefully examined the sequential optimization process of streams x2x_{2}, x12x_{12}, and x11x_{11} conducted by our proposed TSSO algorithm, the performance of the proposed schemes across varied scenarios, and comparisons with NOMA and OMA. It can be easily seen that as the target delay increases, the maximum short-packet size supported by the developed RSMA-xURLLC-IIoT network architecture improves as the target delay becomes relaxed. Moreover, it can be observed that increasing the allocated blocklength NdN_{d} or relaxing the SDVP threshold ξth\xi_{th} contributes to enhancing the maximum short-packet size. With Nd=400N_{d}=400 CUs and ξth=106\xi_{th}=10^{-6}, the developed RSMA-xURLLC-IIoT network architecture outperforms NOMA and OMA schemes by margins of 21.8%21.8\% and 30.2%30.2\%, respectively.

Refer to caption
Figure 5: The maximum short-packet size versus target delay.

As depicted in Fig. 6, the relationship between minimum transmit power and target latency is explored. It is readily apparent that when the target delay is relatively relaxed, the minimum transmit power required to guarantee the expected QoS requirements rapidly decreases. It demonstrates that the minimum required transmit power of our network architecture is sensitive to the target delay. Furthermore, increasing the allocated blocklength and relaxing the SDVP threshold effectively reduce the required minimum transmit power. Under Nd=400N_{d}=400 CUs and ξth=9×107\xi_{th}\!=\!9\!\times\!10^{-7}, compared to NOMA and OMA schemes, the developed RSMA-xURLLC-IIoT network architecture achieves performance improvements in terms of power consumption of 44.15%44.15\% and 62.32%62.32\%, respectively.

Refer to caption
Figure 6: The minimum transmit power versus target delay.
Refer to caption
Refer to caption
Figure 7: Performance comparison of different schemes. (a) The maximum short-packet size versus SDVP threshold; (b) The maximum short-packet size versus DEP threshold.
Refer to caption
Refer to caption
Figure 8: Performance comparison of different schemes. (a) The minimum transmit power versus SDVP threshold; (b) The minimum transmit power versus DEP threshold.

In Fig. 7, we investigate the relationship between the maximum short-packet size and the reliability of xURLLC compared to NOMA and OMA schemes across various scenarios. It can be observed that as the SDVP threshold and DEP threshold become more relaxed, the short-packet size supported by our proposed RSMA-xURLLC-IIoT network architecture can be significantly enhanced, which is extremely favorable for accomplishing diverse and complex mission-critical tasks in IIoT networks. Remarkably, x2x_{2} supports the largest short-packet size, followed by x12x_{12}, and finally x11x_{11}. These distinctions primarily arise from the flexible interference management strategy of the developed RSMA-xURLLC-IIoT network architecture, which splits x1x_{1} into x11x_{11} and x12x_{12} through rate splitting. As a result, x11x_{11}, decoded first, experiences the most severe interference, including co-channel interference from x2x_{2} and x12x_{12}. Subsequent decoding of x12x_{12} only experiences co-channel interference from x2x_{2}. In contrast, the last decoded x2x_{2} remains free from co-channel interference. It ultimately results in distinct co-channel interference characteristics for x2x_{2}, x12x_{12}, and x11x_{11}. Despite more complex interference management in our proposed RSMA-xURLLC-IIoT network architecture, numerical results consistently underscore the remarkable performance advantages. In Fig. 7 (a) and Fig. 7 (b), we provide details of the sequential optimization process performed by the proposed TSSO. Numerical results distinctly demonstrate that, under different SDVP thresholds, our developed RSMA-xURLLC-IIoT network architecture can achieve 14.05%14.05\% and 31.76%31.76\% performance gains in terms of augmenting short-packet size compared to NOMA and OMA schemes, respectively. Moreover, as depicted in Fig. 7 (b), we further emphasize that under varying DEP thresholds, our developed RSMA-xURLLC-IIoT network architecture realizes performance enhancements of 13.7%13.7\% and 30.14%30.14\% when compared with NOMA and OMA schemes, respectively.

As depicted in Fig. 8, we have presented the minimum transmit power required by our developed RSMA-xURLLC-IIoT network architecture compared to NOMA and OMA schemes across various scenarios. It can be observed that as the SDVP threshold and DEP threshold become more lenient, the transmit power required to guarantee the expected SQP performance decreases significantly. Fig. 8 (a) shows that for varying SDVP thresholds, our developed RSMA-xURLLC-IIoT network architecture is capable of conserving 18.38%18.38\% and 31.14%31.14\% of the transmit power in terms of improving the power consumption for short-packet transmissions when compared to NOMA and OMA schemes, respectively. As depicted in Fig. 8 (b), with different DEP thresholds, our developed RSMA-xURLLC-IIoT network architecture outperforms NOMA and OMA schemes by achieving 18.66%18.66\% and 41.30%41.30\% performance improvements in terms of power consumption for short-packet transmission, respectively.

In Fig. 7 and Fig. 8, the fact-filled comparative analyses against NOMA and OMA schemes highlight that our developed RSMA-xURLLC-IIoT network architecture not only facilitates larger short-packet sizes but also achieves superior energy efficiency. This primarily stems from the fact that our developed network architecture empowers multiple access with the potential for concurrent non-orthogonal interference management by partially treating interference as noise while partially decoding it, thereby maximizing interference management optimally. In contrast, NOMA and OMA schemes exhibit disadvantages from two critical perspectives. On the one hand, the NOMA scheme essentially epitomizes an extreme interference management paradigm, which treats interference fully as noise and completely decodes interference [4, 12, 11]. This severely limits the flexible concurrent non-orthogonal interference management empowerment for multi-access IIoT networks, which in turn leads to poor spectral efficiency and more radio resource overhead. On the other hand, although the OMA scheme can facilitate interference-free multiple access through orthogonal resource allocation, it results in diminished spectrum efficiency. From Fig. 7 and Fig. 8, it can be observed that this deficiency becomes particularly pronounced for xURLLC services with stringent SQP requirements. Therefore, the orthogonal resource allocation in the OMA scheme is unsuitable for multi-access IIoT networks, which intuitively indicates that the OMA scheme can only support relatively small short packets and requires more transmit power to fulfill the expected SQP performance.

VI Conclusion And Future Outlook

In this paper, we have embarked on a pioneering exploration of xURLLC in Industrial 5.0 and beyond networks by investigating an innovative RSMA-xURLLC-IIoT network architecture. Leveraging SNC theory, we have proposed the SNC-SQP theoretical framework, which is precision-engineered to unveil dependable insights into the SQP analysis for our developed RSMA-xURLLC-IIoT network architecture. Building upon this theoretical framework, we have formulated two SQP-driven optimization problems that hold immense significance in massive-access IIoT networks. To engineer efficient resolution, we have harnessed sequential optimization techniques to propose a low-complexity TTSO algorithm. Through Monte-Carlo methods, we have thoroughly verified the dependability of the proposed SNC-SQP theoretical framework. Additionally, through extensive comparison analyses with prevalent NOMA and OMA schemes, we have further corroborated the superior performance gains achievable by our developed RSMA-xURLLC-IIoT network architecture.

For future endeavors, we have deeply contemplated four intimately intertwined perspectives. Firstly, we intend to expand our proposed system model to encompass massive MIMO scenarios, aiming to further elevate network performance [40]. Secondly, recognizing age-of-information (AoI) as another critical metric in mission-critical IIoT networks, we plan to incorporate the SQP analysis of AoI for xURLLC traffic into our forthcoming research. Moreover, under FBL regimes, the transmission of machine instructions entails potential security risks [4]. Therefore, the tailored physical layer security mechanisms crafted for our developed RSMA-xURLLC-IIoT network architecture are paramount to guarantee the privacy, stability, and integrity of data [41]. Henceforth, another significant facet of our future work entails drafting relevant security metrics for xURLLC, such as false alarm probability and missed detection probability, to combat malicious attacks and data breaches [42]. In essence, our proposed SNC-SQP theoretical framework requires further refinement, necessitating the inclusion of additional QoS indicators into the formulated SQP-driven optimization problems, along with corresponding algorithm enhancements.

Appendix A Proof of Theorem 1

According to the definitions of MGF and deconvolution operator \oslash [3, 26], we have

(Wq(t)>wqth)((AqSq)(t+wqth,t)0).\mathbb{P}\left(W_{q}\left(t\right)>w_{q}^{th}\right)\leq\mathbb{P}\left(\left(A_{q}\oslash S_{q}\right)\left(t+w_{q}^{th},t\right)\geq 0\right). (A-1)

According to Chernoff’s bound for (A-1) [26, 25], for any random process XX, the inequality (Xx)eθx𝕄X(θ)\mathbb{P}\left(X\geq x\right)\leq e^{-\theta x}\mathbb{M}_{X}\left(\theta\right) holds for x>0\forall x>0. By substituting it into A-1, we can immediately derive that

(Wq(t)>wqth)\displaystyle\mathbb{P}\left(W_{q}\left(t\right)>w_{q}^{th}\right) ((AqSq)(t+wqth,t)0)\displaystyle\leq\mathbb{P}\left(\left(A_{q}\oslash S_{q}\right)\left(t+w_{q}^{th},t\right)\geq 0\right) (A-2)
infθ>0𝕄AqSq(θ,t+wqth,t).\displaystyle\leq\inf_{\theta>0}\mathbb{M}_{A_{q}\oslash S_{q}}\left(\theta,t+w_{q}^{th},t\right).

Based on the definition of MGF, the right-hand side of (A-2) satisfies

𝕄AqSq(θ,t+wqth)\displaystyle\mathbb{M}_{A_{q}\oslash S_{q}}\left(\theta,t+w_{q}^{th}\right) (A-3)
u=0t+wqth𝕄Aq(θ,u,t)𝕄¯Sq(θ,u,t+wqth).\displaystyle\leq\sum\limits_{u=0}^{t+w_{q}^{th}}\!\!\mathbb{M}_{A_{q}}\!\left(\theta,u,t\right)\cdot\overline{\mathbb{M}}_{S_{q}}\!\left(\theta,u,t+w_{q}^{th}\right).

Referring to (6) and (A-3), we can obtain that

infθ>0𝕄AqSq(θ,t+wqth,t)infθ>0𝕄Aq^Sq(θ,t+wqth,t).\inf_{\theta>0}\mathbb{M}_{A_{q}\oslash S_{q}}\left(\theta,t+w_{q}^{th},t\right)\leq\inf_{\theta>0}\mathbb{M}_{A_{q}\widehat{\oslash}S_{q}}\left(\theta,t+w_{q}^{th},t\right). (A-4)

According to (A-1)-(A-4), the proof of Theorem 1 can be concluded.

Appendix B Proof of Lemma 1

According to (6), stream x2x_{2} is immune to co-channel interference, thus Γ^2𝒩(γ^2,σ^q2)\widehat{\Gamma}_{2}\!\sim\!\mathcal{N}\left(\widehat{\gamma}_{2},\widehat{\sigma}_{q}^{2}\right), and the closed-form expression of PDF for Γ^2\widehat{\Gamma}_{2} can be expressed as follows:

fγ^2(x)=1σ^22πexp{(xγ^2)22σ^22}.f_{\widehat{\gamma}_{2}}(x)=\frac{1}{\widehat{\sigma}_{2}\sqrt{2\pi}}\exp\left\{-\frac{(x-\widehat{\gamma}_{2})^{2}}{2\widehat{\sigma}_{2}^{2}}\right\}. (B-1)

Based on (7), stream x1,2x_{1,2} experiences co-channel interference from stream x2x_{2}. The c.d.f. of Γ^1,2\widehat{\Gamma}_{1,2} can be given as follows:

FΓ^1,2(x)\displaystyle F_{\widehat{\Gamma}_{1,2}}\!\!\left(x\right) ={Γ1,2Γ2+1x}={Γ1,2x(1+Γ2)}\displaystyle=\mathbb{P}\!\left\{\!\frac{\Gamma_{1,2}}{\Gamma_{2}+1}\!\leq\!x\!\right\}=\mathbb{P}\big{\{}\Gamma_{1,2}\!\leq\!x\left(1\!+\!\Gamma_{2}\right)\!\big{\}} (B-2)
=0FΓ1,2(x+xΓ2)fΓ2(Γ2)dΓ2.\displaystyle=\int_{0}^{\infty}\!\!F_{\Gamma_{1,2}}\!\left(x\!+\!x\Gamma_{2}\right)\cdot f_{\Gamma_{2}}\!\left(\Gamma_{2}\right)\!\,\mathrm{d}\Gamma_{2}.

Taking the derivative of (B-2) with respect to xx, yields:

fΓ^1,2(x)=FΓ^1,2(x)x\displaystyle f_{\widehat{\Gamma}_{1,2}}\!\left(x\right)=\frac{\partial F_{\widehat{\Gamma}_{1,2}}\left(x\right)}{\partial x} (B-3)
=0(1+Γ2)fΓ1,2(x+xΓ2)fΓ2(Γ2)dΓ2\displaystyle=\int_{0}^{\infty}\left(1+\Gamma_{2}\right)\cdot f_{\Gamma_{1,2}}\left(x+x\Gamma_{2}\right)\cdot f_{\Gamma_{2}}\left(\Gamma_{2}\right)\,\mathrm{d}\Gamma_{2}
=01+y2πσ^1,2σ^2exp{((x+xyγ^1,2)22σ^1,22+(yγ^2)22σ^22)}dy.\displaystyle=\int_{0}^{\infty}\!\!\!\frac{1+y}{2\pi\widehat{\sigma}_{1,2}\widehat{\sigma}_{2}}\cdot\exp\!\!\left\{\!-\!\left(\!\!\frac{\left(\!\!x+xy-\widehat{\gamma}_{1,2}\right)^{2}}{2\widehat{\sigma}_{1,2}^{2}}\!+\!\frac{\left(y-\widehat{\gamma}_{2}\right)^{2}}{2\widehat{\sigma}_{2}^{2}}\!\!\right)\!\!\right\}\,\mathrm{d}y.

Since Γ1,2𝒩(γ^1,2,σ^1,22)\Gamma_{1,2}\!\sim\!\mathcal{N}\!\left(\widehat{\gamma}_{1,2},\widehat{\sigma}_{1,2}^{2}\right) and Γ2𝒩(γ^2,σ^22)\Gamma_{2}\!\sim\!\mathcal{N}\!\left(\widehat{\gamma}_{2},\widehat{\sigma}_{2}^{2}\right), we can obtain that Γ1,2+Γ2𝒩(γ^1,2+γ^2,σ^1,22+σ^22)\Gamma_{1,2}+\Gamma_{2}\!\sim\!\mathcal{N}\!\left(\widehat{\gamma}_{1,2}+\widehat{\gamma}_{2},\widehat{\sigma}_{1,2}^{2}+\widehat{\sigma}_{2}^{2}\right). Following a process similar to (B-1)-(B-3), we can obtain that

fΓ^1,1(x)\displaystyle f_{\widehat{\Gamma}_{1,1}}(x) =01+y2πσ^1,1σ^\displaystyle=\int_{0}^{\infty}\frac{1+y}{2\pi\widehat{\sigma}_{1,1}\widehat{\sigma}_{\sum}}\cdot (B-4)
exp{((x+xyγ^1,1)22σ^1,12+(yγ^2)22σ^2)}dy,\displaystyle\exp\left\{\!-\!\left(\frac{\left(x+xy-\widehat{\gamma}_{1,1}\right)^{2}}{2\widehat{\sigma}_{1,1}^{2}}\!+\!\frac{\left(y-\widehat{\gamma}_{\sum}^{2}\right)^{2}}{2\widehat{\sigma}_{\sum}^{2}}\!\right)\!\!\right\}\!\!\,\mathrm{d}y,

where σ^2=σ^1,22+σ^22\widehat{\sigma}_{\sum}^{2}=\widehat{\sigma}_{1,2}^{2}+\widehat{\sigma}_{2}^{2} and γ^=γ^1,2+γ^2\widehat{\gamma}_{\sum}=\widehat{\gamma}_{1,2}+\widehat{\gamma}_{2}. So the proof of Lemma 1 is concluded.

Appendix C Proof of Corollary 1

We first prove the convexity property of the stability condition (18b). The stability condition (18b) can be rewritten as follows

S(θq)=𝕄aq(θq)𝕄¯sq(θq)\displaystyle S(\theta_{q})=\mathbb{M}_{a_{q}}(\theta_{q})\cdot\overline{\mathbb{M}}_{s_{q}}(\theta_{q}) (C-1)
=𝔼[eaqθq]𝔼[eθqsq]\displaystyle=\mathbb{E}\left[e^{a_{q}\theta_{q}}\right]\cdot\mathbb{E}\left[e^{-\theta_{q}s_{q}}\right]
=𝔼[eθq𝒳q]<1,\displaystyle=\mathbb{E}\left[e^{-\theta_{q}\mathcal{X}_{q}}\!\right]<1,

where the independent property between aqa_{q} and sqs_{q} is utilized, and the variable substitution 𝒳q=sqaq\mathcal{X}_{q}=s_{q}-a_{q} is exploited. According to the definition of convex functions, we can obtain that θq1θq2\forall\theta_{q}^{1}\neq\theta_{q}^{2} and 0ϱ1\forall 0\leq\varrho\leq 1, where θq1,θq2(0,θqmax)\theta_{q}^{1},\theta_{q}^{2}\in(0,\theta_{q}^{max}), the following inequality must hold:

𝔼[e(ϱθq1+(1ϱ)θq2)𝒳q]\displaystyle\mathbb{E}\left[e^{-\left(\varrho\theta_{q}^{1}+(1-\varrho)\theta_{q}^{2}\right)\mathcal{X}_{q}}\!\right] (C-2)
ϱ𝔼[eϱθq1𝒳q]+(1ϱ)𝔼[eϱθq2𝒳q].\displaystyle\leq\varrho\mathbb{E}\left[e^{-\varrho\theta_{q}^{1}\mathcal{X}_{q}}\right]+(1-\varrho)\mathbb{E}\left[e^{-\varrho\theta_{q}^{2}\mathcal{X}_{q}}\right].

According to Hölder’s inequality, we can derive that

𝔼[e(ϱθq1+(1ϱ)θq2)𝒳q]=𝔼[|eϱθq1𝒳qe(1ϱ)θq2𝒳q|]\displaystyle\mathbb{E}\left[e^{-\left(\varrho\theta_{q}^{1}+(1-\varrho)\theta_{q}^{2}\right)\mathcal{X}_{q}}\right]=\mathbb{E}\left[\left|e^{-\varrho\theta_{q}^{1}\mathcal{X}_{q}}\cdot e^{-(1-\varrho)\theta_{q}^{2}\mathcal{X}_{q}}\!\right|\right] (C-3)
(𝔼[|e(1ϱ)θq2𝒳q|1/1ϱ])1ϱ(𝔼[|eϱθq1𝒳q|1/ϱ])ϱ\displaystyle\leq\left(\mathbb{E}\left[\left|e^{-(1-\varrho)\theta_{q}^{2}\mathcal{X}_{q}}\right|^{1/1-\varrho}\right]\right)^{1-\varrho}\cdot\left(\mathbb{E}\left[\left|e^{-\varrho\theta_{q}^{1}\mathcal{X}_{q}}\!\right|^{1/\varrho}\right]\right)^{\varrho}
=(𝔼[eθq1𝒳q])ϱ(𝔼[eθq2𝒳q])1ϱ\displaystyle=\left(\mathbb{E}\left[e^{-\theta_{q}^{1}\mathcal{X}_{q}}\right]\right)^{\varrho}\cdot\left(\mathbb{E}\left[e^{-\theta_{q}^{2}\mathcal{X}_{q}}\right]\right)^{1-\varrho}
(a)ϱ𝔼[eϱθq1𝒳q]+(1ϱ)𝔼[eϱθq2𝒳q],\displaystyle\overset{(a)}{\leq}\varrho\mathbb{E}\left[e^{-\varrho\theta_{q}^{1}\mathcal{X}_{q}}\right]+(1-\varrho)\mathbb{E}\left[e^{-\varrho\theta_{q}^{2}\mathcal{X}_{q}}\right],

where the inequality (a) in (C-3) holds due to the fact that

x1ϱx21ϱϱx1+(1ϱ)x2,0ϱ1.x_{1}^{\varrho}x_{2}^{1-\varrho}\leq\varrho x_{1}+(1-\varrho)x_{2},\forall 0\leq\varrho\leq 1. (C-4)

As a result, we define the function f(ϱ)=ϱx1+(1ϱ)x2x1ϱx21ϱf(\varrho)=\varrho x_{1}+(1-\varrho)x_{2}-x_{1}^{\varrho}x_{2}^{1-\varrho}. ϱ[0,1]\forall\varrho\in[0,1] and x2,x2<1x_{2},x_{2}<1, the second-order derivation f′′(ϱ)=x1ϱx21ϱ(log(x2)log(x1))20f^{{}^{\prime\prime}}(\varrho)=-x_{1}^{\varrho}x_{2}^{1-\varrho}\left(\log(x_{2})-\log(x_{1})\right)^{2}\leq 0. Since f(0)=f(1)=0f(0)=f(1)=0 and f′′(ϱ)0f^{{}^{\prime\prime}}(\varrho)\leq 0, it follows that f(ϱ)f(\varrho) reaches a local maximum for ϱ[0,1]\varrho\in[0,1]. Thus, ϱ[0,1]\forall\varrho\in[0,1], f(ϱ)0f(\varrho)\geq 0 and (C-4) holds. Therefore, we show that the stability condition is convex.

Secondly, we prove the convexity property of the UB-SDVP (18a). According to the convexity property of stability condition, in the feasible domain (0,θqmax)(0,\theta_{q}^{max}), it follows that 1S(θq)1-S(\theta_{q}) is a concave and positive function. Hence, its reciprocal is convex, i.e., 11S(θq)\frac{1}{1-S(\theta_{q})} [43]. According to the definition of convex function, θq1,θq2(0,θqmax)\forall\theta_{q}^{1},\theta_{q}^{2}\in(0,\theta_{q}^{max}) and 0ϱ10\leq\varrho\leq 1, we have

11𝔼[e(ϱθq1+(1ϱ)θq2)aq]𝔼[e(ϱθq1+(1ϱ)θq2)sq]\displaystyle\frac{1}{1-\mathbb{E}\left[e^{\left(\varrho\theta_{q}^{1}+(1-\varrho)\theta_{q}^{2}\right)a_{q}}\right]\cdot\mathbb{E}\left[e^{-\left(\varrho\theta_{q}^{1}+(1-\varrho)\theta_{q}^{2}\right)s_{q}}\right]}\leq (C-5)
ϱ1𝔼[eθq1aq]𝔼[eθq1sq]+1ϱ1𝔼[eθq2aq]𝔼[eθq2sq].\displaystyle\frac{\varrho}{1-\mathbb{E}\left[e^{\theta_{q}^{1}a_{q}}\right]\cdot\mathbb{E}\left[e^{-\theta_{q}^{1}s_{q}}\right]}+\frac{1-\varrho}{1-\mathbb{E}\left[e^{\theta_{q}^{2}a_{q}}\right]\cdot\mathbb{E}\left[e^{-\theta_{q}^{2}s_{q}}\right]}.

By multiplying both the left and right sides of the inequality (C-5) by (𝔼[e(ϱθq1+(1ϱ)θq2)sq])wq\left(\!\mathbb{E}\!\!\left[e^{-(\varrho\theta_{q}^{1}+(1-\varrho)\theta_{q}^{2}\!)s_{q}}\!\right]\!\right)^{w_{q}^{\ast}}, we derive that

(𝔼[e(ϱθq1+(1ϱ)θq2)sq])wq1𝔼[e(ϱθq1+(1ϱ)θq2)aq]𝔼[e(ϱθq1+(1ϱ)θq2)sq]\displaystyle\frac{\left(\mathbb{E}\left[e^{-(\!\varrho\theta_{q}^{1}+(1-\varrho)\theta_{q}^{2})s_{q}}\right]\right)^{w_{q}^{\ast}}}{1-\mathbb{E}\left[e^{\left(\varrho\theta_{q}^{1}+(1-\varrho)\theta_{q}^{2}\right)a_{q}}\right]\cdot\mathbb{E}\left[e^{-\left(\varrho\theta_{q}^{1}+(1-\varrho)\theta_{q}^{2}\right)s_{q}}\right]}\leq (C-6)
ϱ(𝔼[e(ϱθq1+(1ϱ)θq2)sq])wq1𝔼[eθq1aq]𝔼[eθq1sq]+1ϱ1𝔼[eθq2aq]𝔼[eθq2sq]\displaystyle\frac{\varrho\left(\mathbb{E}\left[e^{-(\varrho\theta_{q}^{1}+(1-\varrho)\theta_{q}^{2})s_{q}}\right]\right)^{w_{q}^{\ast}}}{1-\mathbb{E}\left[e^{\theta_{q}^{1}a_{q}}\right]\cdot\mathbb{E}\left[e^{-\theta_{q}^{1}s_{q}}\right]}+\frac{1-\varrho}{1-\mathbb{E}\left[e^{\theta_{q}^{2}a_{q}}\right]\cdot\mathbb{E}\left[e^{-\theta_{q}^{2}s_{q}}\!\right]}
×(𝔼[e(ϱθq1+(1ϱ)θq2)sq])wq\displaystyle\times\left(\mathbb{E}\left[e^{-(\varrho\theta_{q}^{1}+(1-\varrho)\theta_{q}^{2})s_{q}}\right]\right)^{w_{q}^{\ast}}

By using Hölder’s inequality, we can derive that

(𝔼[e(ϱθq1+(1ϱ)θq2)sq])wq=(𝔼[|eϱθq1sq|]𝔼[|e(1ϱ)θq2sq|])wq\displaystyle\left(\!\mathbb{E}\!\left[e^{-(\varrho\theta_{q}^{1}+(1-\varrho)\theta_{q}^{2})s_{q}}\!\!\right]\!\right)^{\!\!w_{q}^{\ast}}\!=\!\left(\!\!\mathbb{E}\!\!\left[\left|e^{-\varrho\theta_{q}^{1}s_{q}}\!\right|\right]\!\cdot\!\mathbb{E}\!\!\left[\left|e^{-(1-\varrho)\theta_{q}^{2}s_{q}}\right|\right]\right)^{\!\!w_{q}^{\ast}} (C-7)
(𝔼[|e(1ϱ)θq2sq|1/1ϱ])wq(1ϱ)×(𝔼[|eϱθq1sq|1/ϱ])wqϱ\displaystyle\leq\left(\mathbb{E}\left[\left|e^{-(1-\varrho)\theta_{q}^{2}s_{q}}\right|^{1/1-\varrho}\right]\right)^{w_{q}^{\ast}(1-\varrho)}\!\!\times\!\!\left(\mathbb{E}\left[\left|e^{-\varrho\theta_{q}^{1}s_{q}}\right|^{1/\varrho}\right]\right)^{w_{q}^{\ast}\varrho}
=(𝔼[|eθq1sq|])wqϱ(𝔼[|eθq2sq|])wq(1ϱ)\displaystyle=\left(\mathbb{E}\left[\left|e^{-\theta_{q}^{1}s_{q}}\right|\right]\right)^{w_{q}^{\ast}\varrho}\cdot\left(\mathbb{E}\left[\left|e^{-\theta_{q}^{2}s_{q}}\right|\right]\right)^{w_{q}^{\ast}(1-\varrho)}
(𝔼[|eθq1sq|]𝔼[|eθq2sq|])wq,\displaystyle\leq\left(\mathbb{E}\left[\left|e^{-\theta_{q}^{1}s_{q}}\right|\right]\cdot\mathbb{E}\left[\left|e^{-\theta_{q}^{2}s_{q}}\right|\right]\right)^{w_{q}^{\ast}},

Due to the fact that (𝔼[|eθqsq|])wq>0\left(\mathbb{E}\left[\left|e^{-\theta_{q}s_{q}}\right|\right]\right)^{w_{q}^{\ast}}>0. Then, the following inequality applies to the right side of (C-6), and we can derive that

ϱ(𝔼[e(ϱθq1+(1ϱ)θq2)sq])wq1𝔼[eθq1aq]𝔼[eθq1sq]+(1ϱ)(𝔼[e(ϱθq1+(1ϱ)θq2)sq])wq1𝔼[eθq2aq]𝔼[eθq2sq]\displaystyle\frac{\varrho\!\left(\mathbb{E}\!\!\left[e^{-(\varrho\theta_{q}^{1}+(1-\varrho)\theta_{q}^{2})s_{q}}\!\right]\right)^{w_{q}^{\ast}}}{1\!-\!\mathbb{E}\!\!\left[e^{\theta_{q}^{1}a_{q}}\right]\!\cdot\!\mathbb{E}\!\!\left[e^{-\theta_{q}^{1}s_{q}}\!\right]}\!+\!\frac{(1\!-\!\varrho)\!\left(\mathbb{E}\!\!\left[e^{-(\varrho\theta_{q}^{1}+(1-\varrho)\theta_{q}^{2})s_{q}}\!\right]\!\right)^{w_{q}^{\ast}}}{1\!-\!\mathbb{E}\!\left[e^{\theta_{q}^{2}a_{q}}\right]\!\cdot\!\mathbb{E}\!\left[e^{-\theta_{q}^{2}s_{q}}\!\right]} (C-8)
(ϱ(𝔼[|eθq1sq|]𝔼[|eθq2sq|])wq1𝔼[eθq1aq]𝔼[eθq1sq]+(1ϱ)1𝔼[eθq2aq]𝔼[eθq2sq]\displaystyle\leq\!\!\Biggl{(}\!\!\frac{\varrho\!\left(\mathbb{E}\left[\big{|}e^{-\theta_{q}^{1}s_{q}}\big{|}\right]\!\cdot\!\mathbb{E}\left[\big{|}e^{-\theta_{q}^{2}s_{q}}\big{|}\right]\right)^{w_{q}^{\ast}}}{1-\mathbb{E}\left[e^{\theta_{q}^{1}a_{q}}\right]\cdot\mathbb{E}\left[e^{-\theta_{q}^{1}s_{q}}\right]}\!+\!\frac{(1\!-\!\varrho)}{1\!-\!\mathbb{E}\!\!\left[e^{\theta_{q}^{2}a_{q}}\!\right]\!\cdot\!\mathbb{E}\!\!\left[\!e^{-\theta_{q}^{2}s_{q}}\!\right]}
×(𝔼[|eθq1sq|]𝔼[|eθq2sq|])wq)ϱ(𝔼[|eθq1sq|])wq1𝔼[eθq1aq]𝔼[eθq1sq]\displaystyle\times\!\!\left(\mathbb{E}\!\!\left[\big{|}e^{-\theta_{q}^{1}s_{q}}\big{|}\right]\!\cdot\!\mathbb{E}\!\!\left[\big{|}e^{-\theta_{q}^{2}s_{q}}\big{|}\right]\right)^{\!\!w_{q}^{\ast}}\!\!\!\Biggl{)}\leq\frac{\varrho\left(\mathbb{E}\left[\big{|}e^{-\theta_{q}^{1}s_{q}}\big{|}\right]\right)^{w_{q}^{\ast}}}{1-\mathbb{E}\left[e^{\theta_{q}^{1}a_{q}}\right]\cdot\mathbb{E}\left[e^{-\theta_{q}^{1}s_{q}}\right]}
+(1ϱ)(𝔼[|eθq1sq|]𝔼[|eθq2sq|])wq.1𝔼[eθq2aq]𝔼[eθq2sq]\displaystyle+\frac{(1-\varrho)\left(\mathbb{E}\left[\big{|}e^{-\theta_{q}^{1}s_{q}}\big{|}\right]\cdot\mathbb{E}\left[\big{|}e^{-\theta_{q}^{2}s_{q}}\big{|}\right]\right)^{w_{q}^{\ast}}.}{1-\mathbb{E}\left[e^{\theta_{q}^{2}a_{q}}\right]\cdot\mathbb{E}\left[e^{-\theta_{q}^{2}s_{q}}\right]}

Combining (C-6), (C-7), and (C-8), as well as the definition of convex functions, we can finally prove that the kernel function Kq(θq,wq)K_{q}(\theta_{q},-w_{q}^{\ast}) is convex. So Corollary 1 can be concluded.

References

  • [1] J. Park et al., “Extreme ultra-reliable and low-latency communication,” Nat. Electron., vol. 5, no. 3, pp. 133–141, Mar. 2022.
  • [2] C. She et al., “A tutorial on ultrareliable and low-latency communications in 6G: Integrating domain knowledge into deep learning,” Proc. IEEE, vol. 109, no. 3, pp. 204–246, Mar. 2021.
  • [3] Y. Chen et al., “Statistical QoS provisioning analysis and performance optimization in xURLLC-enabled massive MU-MIMO networks: A stochastic network calculus perspective,” IEEE Trans. Wireless Commun., pp. 1–1, 2024.
  • [4] Y. Chen et al., “When xURLLC meets NOMA: A stochastic network calculus perspective,” IEEE Commun. Mag., Jul. 2023.
  • [5] Y. Chen et al., “Enhancing xURLLC with RSMA-assisted massive-MIMO networks: Performance analysis and optimization,” arXiv preprint arXiv:2402.16027, 2024.
  • [6] Y. Liu et al., “Deep reinforcement learning-based grant-free NOMA optimization for mURLLC,” IEEE Trans. Commun., vol. 71, no. 3, pp. 1475–1490, 2023.
  • [7] W. Xian et al., “Advanced manufacturing in industry 5.0: A survey of key enabling technologies and future trends,” IEEE Trans. Ind. Informat., 2023.
  • [8] M. Khoshnevisan et al., “5G industrial networks with CoMP for URLLC and time sensitive network architecture,” IEEE J. Sel. Areas Commun., vol. 37, no. 4, pp. 947–959, 2019.
  • [9] Y. Polyanskiy et al., “Channel coding rate in the finite blocklength regime,” IEEE Trans. Inf. Theory, vol. 56, no. 5, pp. 2307–2359, May 2010.
  • [10] W. Yang et al., “Quasi-static multiple-antenna fading channels at finite blocklength,” IEEE Trans. Inf. Theory, vol. 60, no. 7, pp. 4232–4265, Jul. 2014.
  • [11] Y. Mao et al., “Rate-splitting multiple access: Fundamentals, survey, and future research trends,” IEEE Commun. Surv. Tutorials, 2022.
  • [12] B. Clerckx et al., “A primer on rate-splitting multiple access: Tutorial, myths, and frequently asked questions,” IEEE J. Sel. Areas Commun., 2023.
  • [13] A. Mishra et al., “Rate-splitting multiple access for 6G—part i: Principles, applications and future works,” IEEE Commun. Lett., vol. 26, no. 10, pp. 2232–2236, 2022.
  • [14] B. Rimoldi and R. Urbanke, “A rate-splitting approach to the gaussian multiple-access channel,” IEEE Trans. Inf. Theory, vol. 42, no. 2, pp. 364–375, 1996.
  • [15] H. Li et al., “Synergizing beyond diagonal reconfigurable intelligent surface and rate-splitting multiple access,” IEEE Trans. Wireless Commun., 2024.
  • [16] O. Dizdar and S. Wang, “Rate-splitting multiple access for semantic-aware networks: an age of incorrect information perspective,” IEEE Wireless Commun. Lett., 2024.
  • [17] H. Lei et al., “On secure mmWave RSMA systems,” IEEE Internet Things J., 2024.
  • [18] L. Qin et al., “Joint transmission and resource optimization in NOMA-assisted IoVT with mobile edge computing,” IEEE Trans. Veh. Technol., pp. 1–16, 2024.
  • [19] S. Khisa et al., “Power allocation and beamforming design for uplink rate-splitting multiple access with user cooperation,” IEEE Trans. Veh. Technol., 2024.
  • [20] M. Sarker and A. O. Fapojuwo, “Uplink power allocation for RSMA-aided user-centric cell-free massive MIMO systems,” in 2023 IEEE 97th Vehicular Technology Conference (VTC2023-Spring).   IEEE, 2023, pp. 1–5.
  • [21] O. Abbasi et al., “Transmission scheme, detection and power allocation for uplink user cooperation with NOMA and RSMA,” IEEE Trans. Wireless Commun., vol. 22, no. 1, pp. 471–485, 2023.
  • [22] Y. Chen et al., “Streaming 360-degree VR video with statistical QoS provisioning in mmWave networks from delay and rate perspectives,” arXiv preprint arXiv:2305.07935, 2023.
  • [23] M. Bennis et al., “Ultrareliable and low-latency wireless communication: Tail, risk, and scale,” Proc. IEEE, vol. 106, no. 10, pp. 1834–1853, Oct. 2018.
  • [24] H. Al-Zubaidy et al., “Network-layer performance analysis of multihop fading channels,” IEEE/ACM Trans. Networking, vol. 24, no. 1, pp. 204–217, Feb. 2014.
  • [25] M. Fidler, “Survey of deterministic and stochastic service curve models in the network calculus,” IEEE Commun. Surv. Tutorials, vol. 12, no. 1, pp. 59–86, First Quarter 2010.
  • [26] M. Fidler and A. Rizk, “A guide to the stochastic network calculus,” IEEE Commun. Surv. Tutorials, vol. 17, no. 1, pp. 92–105, Firstquarter 2014.
  • [27] S. K. Singh et al., “RSMA for hybrid RIS-UAV-aided Full-Duplex communications with finite blocklength codes under imperfect SIC,” IEEE Trans. Wireless Commun., 2023.
  • [28] X. Ou et al., “Resource allocation in MU-MISO rate-splitting multiple access with SIC errors for URLLC services,” IEEE Trans. Commun., 2022.
  • [29] Y. Wang et al., “Flexible rate-splitting multiple access with finite blocklength,” IEEE J. Sel. Areas Commun., vol. 41, no. 5, pp. 1398–1412, 2023.
  • [30] S. Kurma et al., “URLLC-based cooperative industrial IoT networks with nonlinear energy harvesting,” IEEE Trans. Ind. Informat., vol. 19, no. 2, pp. 2078–2088, 2022.
  • [31] I. Muhammad et al., “Mission effective capacity—a novel dependability metric: A study case of multiconnectivity-enabled URLLC for IIoT,” IEEE Trans. Ind. Informat., vol. 18, no. 6, pp. 4180–4188, 2021.
  • [32] S.-Y. Lien and D.-J. Deng, “Intelligent session management for URLLC in 5G open radio access network: A deep reinforcement learning approach,” IEEE Trans. Ind. Informat., vol. 19, no. 2, pp. 1844–1853, 2022.
  • [33] J. Hu et al., “Low-complexity resource allocation for uplink RSMA in future 6G wireless networks,” IEEE Wireless Commun. Lett., vol. 13, no. 2, pp. 565–569, 2024.
  • [34] J. Xu et al., “Rate-splitting multiple access for short-packet uplink communications: A finite blocklength analysis,” IEEE Commun. Lett., vol. 27, no. 2, pp. 517–521, 2023.
  • [35] O. L. A. López et al., “Statistical tools and methodologies for ultrareliable low-latency communication—a tutorial,” Proc. IEEE, vol. 111, no. 11, pp. 1502–1543, 2023.
  • [36] O. Adamuz-Hinojosa et al., “A stochastic network calculus (SNC)-based model for planning B5G uRLLC RAN slices,” IEEE Trans. Wireless Commun., vol. 22, no. 2, pp. 1250–1265, 2023.
  • [37] P. Cui et al., “End-to-end delay performance analysis of industrial internet of things: A stochastic network calculus perspective,” IEEE Internet Things J., vol. 11, no. 3, pp. 5374–5387, 2024.
  • [38] C. Wu et al., “Cross-layer optimization for statistical QoS provision in C-RAN with finite-length coding,” IEEE Trans. Commun., pp. 1–1, 2024.
  • [39] X. Du et al., “Sequential optimization and reliability assessment method for efficient probabilistic design,” J. Mech. Des., vol. 126, no. 2, pp. 225–233, 2004.
  • [40] G. Zheng et al., “Joint hybrid precoding and rate allocation for RSMA in near-field and far-field massive MIMO communications,” IEEE Wireless Commun. Lett., pp. 1–1, 2024.
  • [41] L. Qin et al., “Energy-efficient blockchain-enabled user-centric mobile edge computing,” IEEE Trans. Cogn. Commun. Netw., pp. 1–1, 2024.
  • [42] H. Forssell et al., “Physical layer authentication in mission-critical MTC networks: A security and delay performance analysis,” IEEE J. Sel. Areas Commun., vol. 37, no. 4, pp. 795–808, 2019.
  • [43] S. P. Boyd and L. Vandenberghe, Convex optimization.   Cambridge university press, 2004.