SlideShare une entreprise Scribd logo
1  sur  215
Télécharger pour lire hors ligne
Page 1The University of Sydney
URLLC for 5G and Beyond:
Physical, MAC and Network
Solutions
2020 IEEE WCNC Tutorial
Yonghui Li
Mahyar Shirvanimoghaddam
Rana Abbas
Changyang She
Centre of IoT and Telecommunications
School of Electrical and Information Engineering
Faculty of Engineering and Information Technologies
*A modified version of this tutorial was presented at IEEE
Globecom, Kona, Hawaii, USA Dec 2019
Page 2The University of Sydney
About Us
Page 3The University of Sydney
University of Sydney
Australia's oldest university established in 1850, ranked 36th in World
University Rankings by the Times higher Education Supplement (UK)
Page 4The University of Sydney
University of Sydney
Breakthrough Innovations
Ultrasound scanner, George Kossof
Artificial Heart Pacemaker, Edgar Booth
Ventilator
Cochlear, Graeme Clark
Aircraft black box
WI-FI
...
Page 5The University of Sydney
Centre of IoT and Telecommunications
– A world renown and largest Research Centre in
Australia in Telecommunications
– Mission: provide innovative solutions to
the telecommunication industry
– R&D team:
– 7 Academic staff (3 IEEE Fellows)
– 6 Research Fellow
– More than 40 PG students
– Areas: 5G, uRLLC, Networks, Industrial Internet
of Things, Signal processing, Wireless
Networked Control, AI in Wireless
Communications
– Activities: Research, product development,
system design and industry consultancy
– Publications: >200 IEEE journal papers in the
past five years
Page 6The University of Sydney
Centre of IoT and Telecommunications
Over 40 industry projects, more than $20million
Design of last mile and home area networks for $500 million Australian Smart Grid Smart
City project
Participate in 7-years’ $100million SmartSat CRC project
Contributions to the IEEE Standard (802.X)
Soft output detection and decoding used in 2G, 3G and 4G base stations and terminals
Adaptive CDMA receivers used in 3G cellular systems
Soft frequency reuse has been adopted by 3GPP standard
Patents: 15 (wireless system architecture, solutions, protocols, core technology)
Page 7The University of Sydney
Presenters
Dr. Mahyar
Shirvanimoghaddam
Dr. Rana Abbas Dr. Changyang SheProf. Yonghui Li
Page 8The University of Sydney
Introduction to URLLC & Timeliness
Professor Yonghui Li
Page 9The University of Sydney
Introduction to URLLC& Timeliness
→ 5G: From H2H to M2M
What is URLLC?
Why do we need URLLC?
Latency and Reliability Components
How do we achieve URLLC?
Page 10The University of Sydney
G. Fettweis and S. Alamouti, “5G: Personal mobile internet beyond: What cellular did to telephony,” IEEE Communications Magazine, February 2014.
Kumar, Liu, Sengupta and Divya, “Evolution of Mobile Wireless communication Networks: 1G to 4G,” IJECT, December 2010. 4GAmericas.org, “Infographic:
Mobile Broadband Connected Future,” White, “Tablets trump smartphones in global website traffic” Adobe Digital Marketing blog, March 6, 2013. Meeker and
Wu, “Internet Trends 2013” kpcb.com. Ericsson Consumer Insight Summary Report, June 2013
Cellular Network Development
Wireless Moore’s
Law
Page 11The University of Sydney
5G Paradigm Shift:
From H2H to IoT M2M Communications
Page 12The University of Sydney
M2M is Everywhere
Page 13The University of Sydney
https://www.accenture.com/t00010101t000000z__w__/it-it/_acnmedia/pdf-5/accenture-industrial-internet-of-things-positioning-paper-report-2015.pdf
Industrial Internet of Things (IIoT)
Page 14The University of Sydney
What is M2M ?
M2M = Sensors + Connectivity + Intelligence
Machine – To – Machine (M2M) means no human
intervention whilst devices are communicating end-to-end.
• Support of a huge amount of nodes, sending small data each
• Mission-critical data provision
• Autonomous operation
• Self-organization
• Power efficiency
• Reliability
• etc.
This assumes some fundamental M2M system
characteristics:
Page 15The University of Sydney
Introduction to URLLC& Timeliness
✔ 5G: From H2H to M2M
→ What is URLLC?
Why do we need URLLC?
Latency and Reliability Components
How do we achieve URLLC?
Page 16The University of Sydney
IIoT Communication Network Requirements
Image Source: G Empowering vertical industries. White Paper, 2016, https://5g-ppp.eu/wp-content/uploads/2016/02/BROCHURE_5PPP_BAT2_PL.pdf
• High range of reliability from medium to
ultrahigh, PER 10-3 to 10-9
• High capacity
• High range of data rates, 1kbps to 10Gbps
• High range of latencies from 200ns to 1000s
• Low cost - $1 hardware, $1/year connectivity
• Flexible access
• High range of the number of nodes, from 100 to
1 million per cell
• Long battery life >10 years
• Message prioritisation
• Internet protocol (IP)
• Standard-based
• Ubiquitous coverage
• High security
• Fast configuration
• No current network meeting these
requirements!
Page 17The University of Sydney
5G Technical Requirements
Image Source: 5G Americas
– 1000 times higher mobile data capacity per cell
– 100 times higher typical user data rate
– 100 times higher number of connected devices
– 10 times longer battery life for low power M2MC
– 10 times reduced latency
Page 18The University of Sydney
URLLC for Mission Critical IoT
Ultralow latency <1ms air link; <10ms E2E
Ultra reliable networks
No wireless standard available
Image Source: LoRa Alliance
Page 19The University of Sydney
Industrial Network Requirements
– Ultra-low latency
– Link level latency <1ms vs 100ms in 4G
– Ultra-high reliability
– Packet error rate < 10-9 vs 10-2 in 4G
– Determinism
– Criticality
– Scalability
Image Source: https://www.roboticsbusinessreview.com/sme-building-a-smart-factory-with-ai-and-robotics/
Page 20The University of Sydney
Image Source: https://andersontech.com/three-critical-reasons-choose-wired-network-small-business/
Wireless vs Wired Networks for IoT
– Currently wired networks are
dominant
– Trends towards wireless due to
– lower installation cost
– lower maintenance
– easier redundancy
– higher flexibility
– enable mobile applications
– even higher long-term reliability
Page 21The University of Sydney
Introduction to URLLC & Timeliness
✔ 5G: From H2H to M2M
✔ What is URLLC?
→ Why do we need URLLC?
Latency and Reliability Components
How do we achieve URLLC?
Page 22The University of Sydney
Why do we need URLLC?
– Industry Automation URLLC is
one of the enabling
technologies in Industry 4.0
– Industrial control is automated
by deploying networks in
factories which are
traditionally wired.
– End-to-end latency lower than
0.5 ms and an exceedingly
high reliability with BLER of
10–9 should be supported.
Industrial Automation
Page 23The University of Sydney
IoT in Industrial Automation
– Current industrial robots form a closed
system of manipulators and controllers
– They are connected via wired networks
– Expensive set-up
– New architecture (fog and roof)
enables their separation
– High performance wireless networks
enable their connectivity
– Controllers located in general purpose
computers
Page 24The University of Sydney
Wireless Networked Control
– Enabling mobile robotics
– Enabling a pool of controllers
– Enabling High-Precision Robotic Arms
Page 25The University of Sydney
Why do we need URLLC ?
– Automated driving
– Road safety
– Traffic efficiency services
– The typical use cases of this
application are automated
overtake, cooperative collision
avoidance and high-density
platooning, which require an
end-to-end latency of 5–10 ms
and a BLER down to10–5 [S-2].Fully connected vehicles can be enabled with URLLC
Image Source: Wikipedia
Intelligent Transportation Systems
Page 26The University of Sydney
Why do we need URLLC?
– Remote surgical consultations:
– Can occur during complex life-saving
procedures after serious accidents with the
patient having a health emergency that
cannot wait for transporting to a hospital.
– First-responders at an accident venue may
need to connect to surgeons in a hospital to
get advice and guidance to conduct complex
medical operations.
– Remote surgery:
– The entire treatment procedure of patients is
executed by a surgeon at a remote site,
where hands are replaced by robotic arms.
Example of remote surgery with robotic arms
Image Source: BMC Biomedical Engineering
Telesurgery
Page 27The University of Sydney
URLLC Applications, Requirements & Markets
Lema, Maria A., et al. "Business case and technology analysis for 5G low latency applications." IEEE Access 5 (2017):
5917-5935.
Page 28The University of Sydney
Why do we need URLLC?
What levels of latency and reliability do we need?
[S-2] Chen, He, et al. "Ultra-reliable low latency cellular networks: Use cases, challenges and approaches." IEEE
Communications Magazine 56.12 (2018): 119-125. https://doi.org/10.1109/MCOM.2018.1701178
Page 29The University of Sydney
Introduction to URLLC& Timeliness
✔ 5G: From H2H to M2M
✔ What is URLLC?
✔ Why do we need URLLC?
→ Latency and Reliability Components
How do we achieve URLLC?
Page 30The University of Sydney
Reliability in URLLC
What kind of reliability are we after?
• Reliability is defined as the probability that the latency does not exceed a
predetermined deadline (1 – Pe)
• Pe is the probability of a packet drop/packet error = the probability that the
latency exceeds a predetermined deadline
• The exact deadline and the reliability level are application-dependent.
Popovski, P., Nielsen, J.J., Stefanovic, C., De Carvalho, E., Strom, E., Trillingsgaard, K.F., Bana, A.S., Kim, D.M.,
Kotaba, R., Park, J. and Sorensen, R.B., 2018. Wireless access for ultra-reliable low-latency communication: Principles
and building blocks. Ieee Network, 32(2), pp.16-23.
Page 31The University of Sydney
Latency in URLLC
Latency Components
Page 32The University of Sydney
Latency in URLLC
Latency in Wireless Networks
Page 33The University of Sydney
Latency in URLLC
– Fundamental trade-offs between capacity, coverage, latency,
reliability and spectral efficiency….
– One metric is optimized for improvement à degradation of another
metric
– High capacity needs large control overhead (e.g., cyclic prefix,
transmission mode, and pilot symbols); this makes the portion of
overhead unacceptably high in shorter TTI.
– In LTE, packet retransmission takes around 8ms, and removal of
retransmission will affect packet error significantly.
Constraints for achieving low latency
Page 34The University of Sydney
Introduction to URLLC& Timeliness
✔ 5G: From H2H to M2M
✔ What is URLLC?
✔ Why do we need URLLC?
✔ Latency and Reliability Components
→ How do we achieve URLLC?
Page 35The University of Sydney
URLLC
PHY
Theoretical Bounds
Channel code
candidates
Potential of
Fountain Codes
Advanced
Ordered Statistic
Decoding Scheme
MAC
Grant-Based
Orthogonal Access
Non-Orthogonal
Access (NOMA)
Grant-Free Access
Cross-Layer
Design
Network
Network
Availability
Multi-connectivity
in Terrestrial
Communications
Mobile-Edge
Computing
Systems
Deep Learning for
Network
Management
Page 36The University of Sydney
PHY
Theoretical
Bounds
Channel code
candidates
Potential of
Fountain Codes
Advanced
Ordered Statistic
Decoding Scheme
• Revisit the Shannon
Bound
• Normal Approximation
• Turbo Codes
• Convolutional Codes
• BCH Codes
• LDPC Codes
• Polar Codes
• Approach near MLD
Performance
• Reduced Complexity
• Reduced Decoding
Latency
How do we address URLLC at the Physical Layer (PHY)?
• Motivation for Rateless
Codes
• Rateless Code Design
for Short Block lengths
• Rateless Code
Performance
Page 37The University of Sydney
Fundamental Limit of Finite Block Length
– Existing systems are designed to efficiently transmit long data
packets
– Several thousands of channel uses
– Moderately low packet-error rates (around 0.01)
– Relevant for current mobile broadband services
– Shannon proved that a communication link can achieve zero
probability of error if the code is long enough, as long as the data
rate is below the channel capacity
– Most of the recent advances in the design of high-speed wireless
systems are based on the Shannon formula
Page 38The University of Sydney
– URLLC is usually characterised by short packet communications (~100s
bits in a packet) and stringent packet-error requirement (e.g., 10^-9)
– Errors cannot be avoided even the transmission rate is below the
Shannon Capacity. Shannon bound is no longer accurate!
– Polyanskiy-Verdu-Poor Bound:
– The existing analyses, designs, optimisations based on Shannon bound
should be re-visited or re-formulated.
– Develop fundamental trade-offs between capacity, latency and
reliability for single and multi-user scenarios.
– New trade-offs require different designs of many communication
algorithms and protocols
Fundamental Limit of Finite Block Length
Page 39The University of Sydney
– Low latency goal prohibits long Shannon capacity approaching
codes
– Fundamental capacity bound defined by Polyanskiy for limited
length codes
– Conventional capacity approaching codes, such as LDPC and
turbo codes, do not perform well in the short block length regime
– The conventional short codes, such as BCH and convolutional
codes are too complex for decoding
– The decoding is the dominant part of receiver processing delay
– Design of high performance and low complexity decoding is
required
– Each retransmissions introduces 8ms delay in LTE
– How to design the techniques which can avoid retransmissions
Short Code Design for reducing TTI
Page 40The University of Sydney
Codes with Diversity
– For short codes, achieving a high reliability requires very high
SNR, which is not feasible for IoT devices with only limited
transmission power.
– To reduce the SNR requirements, diversity techniques are needed.
– Time diversity is not appropriate as it increases latency.
– How to design space frequency codes to achieve the spatial and
frequency diversity?
– How to explore multi-connectivity diversity in wireless networks?
Page 41The University of Sydney
MAC
Grant-Based
Orthogonal
Access Techniques
Non-Orthogonal
Access (NOMA)
Grant-Free
Access
Cross-Layer
Design
• Why can’t 4G support
URLLC ?
• Why can’t 5G support
massive URLLC?
• Information theoretic
bounds
• Existing NOMA schemes
• Queueing Delay
• Effective Bandwidth
• Packet Dropping
How do we address URLLC at the Medium Access Control Layer
(MAC)?
• Motivation for Grant-
Free Access
• Performance analysis
• Different transmission
schemes for Grant-Free
NOMA
• Deep Learning
Approach for Grant-
Free NOMA
Page 42The University of Sydney
Resource reservation for uRLLC
Problem and challenge
In the request contention period, uRLLC needs to compete with other
services, leading to uncertain access delay;
In the joint scheduling among uRLLC and other services, uRLCC need to
be served immediately, which would interrupt ongoing transmission of
other services.
Solution
reserve resources for uRLLC to ensure its immediate transmission
– trade-off between latency and reserved resources
Page 43The University of Sydney
Grant-free access for reducing access delay
• Grant acquisition and random access procedures in current standards are two
major sources of delay
• BS needs to first identify the users through contention-based random access.
Key problems: severe collisions and high latencies when the number of users
increases
• In grant-free multiple access, users encode their IDs and data together and
transmit them directly without grant acquisition. This eliminates the contention
and random access phase, significantly reducing the latency, at the expense of
larger interference. Signals from multiple users are superimposed and
successive interference cancellation (SIC) is used at the receiver to decode the
messages
Page 44The University of Sydney
Network
Network
Availability
Multi-
connectivity
Mobile-Edge
Computing
Systems
Deep Learning
for Network
Management
• Definitions • Improving Network
Availability
• Terrestrial
Communications
• Air-to-Ground and
Ground-to-Air
Communications
• Summary of our recent
results
• Motivation of using
deep learning in URLLC
• Examples
How do we address URLLC at the Network Layer ?
• Analysis of the
computing delay using
short packets
• Optimisation of user
association, computing
offloading, and radio
Cross-Layer Design
Page 45The University of Sydney
Edge computing for reducing backhaul latency
• To reduce backhaul latency, computation and content resources should be
moved from cloud to the edge – VR, AR, Vehicular networks (driving, urban
sensing, content distribution, mobile advertising and intelligent transportation);
• Proximal users are allowed to communicate directly;
cloud
P. Mach and Z. Becvar, "Mobile Edge Computing: A Survey on Architecture and Computation Offloading," in IEEE Communications
Surveys & Tutorials, 19(3), 2017.
The University of Sydney
Channel Coding Techniques for URLLC
Dr. Mahyar Shirvanimoghaddam
Page 47The University of Sydney
Channel Coding Techniques for URLLC
→ Performance metric: Reliability and flexibility
Channel code candidates
Comparison of Channel Codes
Advanced Ordered Statistic Decoder
Short Analog Fountain Codes
Page 48The University of Sydney
– Reliability is defined as the success probability of transmitting K
information bits within the desired user plane latency at a
certain channel quality.
– Sources of failure from a higher layer perspective are when the
packet is lost, or it is received late, or it has residual errors.
– It is essential to maximize the reliability of every packet in order
to minimize the error rate, so as to minimize the number of
retransmissions.
– To provide a high level of reliability, a channel code with low
code rates is generally used.
Reliability
[S-3] M. Shirvanimoghaddam et al., "Short Block-Length Codes for Ultra-Reliable Low Latency Communications," in IEEE Communications
Magazine, vol. 57, no. 2, pp. 130-137, February 2019. https://doi.org/10.1109/MCOM.2018.1800181
Page 49The University of Sydney
– Bit-level granularity of the codeword size and code operating
rate is desired for URLLC.
– The actual coding rate used in transmission could not be
restricted and optimized for specified ranges.
– The channel codes therefore need to be flexible to enable
hybrid automatic repeat request (HARQ).
– The number of retransmissions, however, needs to be kept as low
as possible to minimize latency
Flexibility
[S-3] M. Shirvanimoghaddam et al., "Short Block-Length Codes for Ultra-Reliable Low Latency Communications," in IEEE Communications
Magazine, vol. 57, no. 2, pp. 130-137, February 2019. https://doi.org/10.1109/MCOM.2018.1800181
Page 50The University of Sydney
– There are two effects that should be distinguished here to better
understand the code design problem for short blocks.
– The first one is the gap to Shannon’s limit
If we decrease the block length, the coding gain will be reduced and
the gap to Shannon’s limit will increase. This is not a problem of code
design but is mainly due to the reduction in channel observations that
comes with finite block lengths.
Performance Benchmark
[S-3] M. Shirvanimoghaddam et al., "Short Block-Length Codes for Ultra-Reliable Low Latency Communications," in IEEE Communications
Magazine, vol. 57, no. 2, pp. 130-137, February 2019. https://doi.org/10.1109/MCOM.2018.1800181
Page 51The University of Sydney
We will use the normal approximation (NA) that incorporates the
reduction in channel observations, as the performance benchmark
for comparison.
C is the channel capacity (a function of SNR)
V is the channel distortion (a function of block length and SNR)
n is the block length
Pe is the error rate
Performance Benchmark: Normal Approximation
[S-3] M. Shirvanimoghaddam et al., "Short Block-Length Codes for Ultra-Reliable Low Latency Communications," in IEEE Communications
Magazine, vol. 57, no. 2, pp. 130-137, February 2019. https://doi.org/10.1109/MCOM.2018.1800181
Y. Polyanskiy, H. V. Poor and S. Verdu, "Channel Coding Rate in the Finite Blocklength Regime," in IEEE Transactions on Information
Theory, vol. 56, no. 5, pp. 2307-2359, May 2010.
Page 52The University of Sydney
Performance Benchmark: Normal Approximation for BI-AWGN
T. Erseghe, "Coding in the Finite-Blocklength Regime: Bounds Based on Laplace Integrals and Their Asymptotic Approximations," in IEEE
Transactions on Information Theory, vol. 62, no. 12, pp. 6854-6883, Dec. 2016.
Page 53The University of Sydney
– The second effect is the gap to the finite length bounds, that is if
we decrease the block length, modern codes, such as LDPC or
Turbo codes, show a gap to finite length bounds.
– This is often due to the suboptimal decoding algorithms.
Performance Benchmark
[S-3] M. Shirvanimoghaddam et al., "Short Block-Length Codes for Ultra-Reliable Low Latency Communications," in IEEE Communications
Magazine, vol. 57, no. 2, pp. 130-137, February 2019. https://doi.org/10.1109/MCOM.2018.1800181
Page 54The University of Sydney
Channel Coding Techniques for URLLC
✔ Performance metric: Reliability and flexibility
→ Channel code candidates
Comparison of Channel Codes
Advanced Ordered Statistic Decoder
Short Analog Fountain Codes
Page 55The University of Sydney
– Bose, Chaudhuri, and Hocquenghem (BCH) codes are a class of
powerful cyclic error-correcting codes that are constructed using
polynomials over finite fields.
– The main feature of BCH codes is that the number of guaranteed
correctable symbols, t, is defined during the code design process.
The minimum distance dmin of BCH codes is at least 2t + 1.
– The decoding of BCH codes is usually done using a bounded
distance decoder, like the Berlekamp-Massey algorithm, that can
correct any combination of up to t symbol errors.
– In order to increase the coding gain, in particular on noisy
channels, one may use a soft-input decoder, such as ordered
statistics decoder (OSD).
BCH
[S-3] M. Shirvanimoghaddam et al., "Short Block-Length Codes for Ultra-Reliable Low Latency Communications," in IEEE
Communications Magazine, vol. 57, no. 2, pp. 130-137, February 2019. https://doi.org/10.1109/MCOM.2018.1800181
S. Lin, D. Costello, Error Control Coding: Fundamentals and Applications, Pearson-Prentice Hall, 2004.
Page 56The University of Sydney
Convolutional Codes
• Convolutional codes (CC) were first
introduced by Elias in 1955.
• They differ from block codes as the
encoder contains memory.
[S-3] M. Shirvanimoghaddam et al., "Short Block-Length Codes for Ultra-Reliable Low Latency Communications," in IEEE
Communications Magazine, vol. 57, no. 2, pp. 130-137, February 2019. https://doi.org/10.1109/MCOM.2018.1800181
S. Lin, D. Costello, Error Control Coding: Fundamentals and Applications, Pearson-Prentice Hall, 2004.
• Generally, a rate R = k/n convolutional encoder with memory
order m can be realized as a linear sequential circuit with input
memory m, k inputs, and n outputs, where inputs remain in the
encoder for m time units after entering.
• Large minimum distances and low error probabilities for
convolutional can be achieved by changing m.
Page 57The University of Sydney
Turbo Codes
– In 1993, Berrou, Glavieux, and Thitimajshima introduced Turbo coding,
which combines a parallel concatenation of two convolutional encoders
and iterative maximum a-posteriori probability (MAP) decoding.
– Turbo codes have been extensively used for the data channel in LTE.
– For large blocks, Turbo codes are capable of performing within a few
tenths of dB from Shannon’s limit.
– Turbo codes with iterative decoding in short and moderate block
lengths show a gap of more than 1 dB to the finite-length performance
benchmark.
– For Turbo codes, 1-bit granularity is feasible for all coding rates and
for a full range of block sizes, and the ability of Turbo codes to
support both Chase combining and incremental redundancy HARQ is
well known.
Page 58The University of Sydney
LDPC Codes
• Low-density parity-check (LDPC)
codes were originally proposed by
Gallager in the early 1960s and
later rediscovered in the 1990s,
when researchers began to
investigate codes-on-graph based.
• LDPC codes are now being used in WiFi and will be used for 5G eMBB.
• The main benefit of LDPC codes is the low-complexity decoding algorithm
which can be implemented using parallel processing.
• They also closely approach the Shannon limit in large block lengths using
iterative belief propagation decoder.
Page 59The University of Sydney
Polar Codes
• Polar codes as introduced by Arikan are
binary linear codes that can provably
achieve the capacity of a binary-input
discrete memoryless channel using low-
complexity encoding and decoding as
the code length tends to infinity.
E. Arikan, "Channel Polarization: A Method for Constructing Capacity-Achieving Codes for Symmetric Binary-Input Memoryless
Channels", IEEE Trans. Inf. Theory, vol. 55, no. 7, pp. 3051-73, July 2009.
• Channel polarization is a central technique in the construction of these codes, in
which the block code translates N independent and identical binary-input
discrete memoryless channels into N synthesized channels with capacities either
(close to) zero or one.’
• The message is only sent over the set of near-perfect channels, and the
unreliable channels are unused; in practice, they are assigned constant inputs a
priori known for both the encoder and decoder (frozen symbols).
Page 60The University of Sydney
Channel Coding Techniques for URLLC
✔ Performance metric: Reliability and flexibility
✔ Channel code candidates
→ Comparison of Channel Codes
Advanced Ordered Statistic Decoder
Short Analog Fountain Codes
Page 61The University of Sydney
Comparison
[S-3] M. Shirvanimoghaddam et al., "Short Block-Length Codes for Ultra-Reliable Low Latency Communications," in IEEE
Communications Magazine, vol. 57, no. 2, pp. 130-137, February 2019. https://doi.org/10.1109/MCOM.2018.1800181
Code Rate = ½ and Block length =128
Maximum Likelihood Decoding​
Page 62The University of Sydney
Comparison
[S-3] M. Shirvanimoghaddam et al., "Short Block-Length Codes for Ultra-Reliable Low Latency Communications," in IEEE
Communications Magazine, vol. 57, no. 2, pp. 130-137, February 2019. https://doi.org/10.1109/MCOM.2018.1800181
Code Rates = 1/3 (blue), 1/6 (red), and 1/12 (black)​
Information Block length = 40 and 128​
Practical Decoder
Page 63The University of Sydney
Comparison
– Under maximum likelihood decoding, the BCH code
outperforms all other existing codes owing to its better distance
spectrum.
– Other codes are mainly designed to provide good
performance while maintaining the decoding complexity at a
reasonable order.
– Using practical decoders, Polar codes show very
good performance with no error floor.
– LPDC code suffer from error floor at short block lengths
and Turbo codes perform well only at large block lengths.
[S-3] M. Shirvanimoghaddam et al., "Short Block-Length Codes for Ultra-Reliable Low Latency Communications," in IEEE
Communications Magazine, vol. 57, no. 2, pp. 130-137, February 2019. https://doi.org/10.1109/MCOM.2018.1800181
Page 64The University of Sydney
Comparison
Rate performance of different candidate codes at a BLER of 10–4 when the codeword
length is N = 128.
[S-3] M. Shirvanimoghaddam et al., "Short Block-Length Codes for Ultra-Reliable Low Latency Communications," in IEEE
Communications Magazine, vol. 57, no. 2, pp. 130-137, February 2019. https://doi.org/10.1109/MCOM.2018.1800181
Page 65The University of Sydney
Channel Coding Techniques for URLLC
✔ Performance metric: Reliability and flexibility
✔ Channel code candidates
✔ Comparison of Channel Codes
→ Advanced Ordered Statistic Decoder
Short Analog Fountain Codes
Page 66The University of Sydney
Segmentation-Discarding Algorithm
– Pre-processing
– Reprocessing
Preprocessing
𝐫 = 𝐬 + 𝐧
AWGN channel
output
abs
Reliabilities
𝛂 = 𝐫
Permutation 𝜋1
&
Permutation 𝜋2
෨𝐆 = 𝜋1(𝜋2(𝐆))
෤𝐫 = π1(π2(𝐫))
෥𝛂 = 𝜋1(𝜋2(𝛂))
Reprocessing
MRB
positions Calculate distance 𝒟 𝑒,
and update the minimum
distance 𝒟 𝑚𝑖𝑛. Output
corresponding estimation.
෤𝐲
෤𝐲 𝐵
Re-encoding
෤𝐜 𝑒 = ෤𝐲 𝐵 ⊕ 𝐞 ෨𝐆
TEP
s
෤𝐜 𝑒
෤𝐫, 𝒟 𝑚𝑖𝑛
Ƹ𝐜 𝑜𝑝𝑡
Estimated
codeword
OSD algorithm [6]
First K positions: Most Reliable Basis (MRB)
[P-7] C. Yue, M. Shirvanimoghaddam, Y. Li and B. Vucetic, . "Segmentation-Discarding Ordered-Statistic Decoding for Linear Block Codes." IEEE Global Communication
Conference, Kona, HI, 2019 https://arxiv.org/abs/1901.02603
Page 67The University of Sydney
Segmentation-Discarding Algorithm
Segmentation-Discarding Algorithm (SDA)
67
– All the weight-𝑙 TEPs are cut into several segments in 𝑙-th order decoding.
– Some least reliable segments are discarded according to a discarding rule.
– Complexity is significantly reduced.
Segmentation-Discarding Algorithm
𝐫 = 𝐬 + 𝐧
AWGN channel
output
Preprocessing
෨𝐆, ෤𝐫
0-reprocessing
(Hard-decision)
𝑙-reprocessing
𝑙 = 1: 𝑚
(stopping rule)
෤𝐲, ෤𝐫
Ƹ𝐜 𝑜𝑝𝑡
Estimated
codeword
Producing
𝑙-TEPs
TEPs
Segmentation Discarding
𝒟 𝑚𝑖𝑛
𝒟 𝑚𝑖𝑛...෥𝛂
...
𝑆𝑙1
𝑆𝑙 𝑄
𝑆𝑙1
𝑆𝑙 𝑖
𝑄: maximum segments number 𝑆𝑙 𝑖
: the 𝑖-th TEP segment in 𝑙-reprocessing
[P-7] C. Yue, M. Shirvanimoghaddam, Y. Li and B. Vucetic, . "Segmentation-Discarding Ordered-Statistic Decoding for Linear Block Codes." IEEE Global Communication
Conference, Kona, HI, 2019 https://arxiv.org/abs/1901.02603
for an order d OSD algorithm one need to generate O(kd) test error patterns.
Page 68The University of Sydney
Segmentation and Discarding Rules
Discarding Rule
68
– Decoding scheme combining segmentation and discarding
– Light-colored blocks represent the segments that are discarded
– Dark-colored segments are retained
[P-7] C. Yue, M. Shirvanimoghaddam, Y. Li and B. Vucetic, . "Segmentation-Discarding Ordered-Statistic Decoding for Linear Block
Codes." IEEE Global Communication Conference, Kona, HI, 2019 https://arxiv.org/abs/1901.02603
Page 69The University of Sydney
Performance and Complexity Comparison
69
Performance comparison in decoding (128,64,22) eBCH code (code rate 0.5)
[P-7] C. Yue, M. Shirvanimoghaddam, Y. Li and B. Vucetic, . "Segmentation-Discarding Ordered-Statistic Decoding for Linear Block
Codes." IEEE Global Communication Conference, Kona, HI, 2019 https://arxiv.org/abs/1901.02603
M. P. C. Fossorier and S. Lin, “Soft-decision decoding of linear block codes based on ordered statistics,” IEEE Transactions on
Information Theory, vol. 41, no. 5, pp. 1379–1396, Sep 1995.
J. Van Wonterghem, A. Alloum, J. J Boutros, and M. Moeneclaey, “On performance and complexity of OSD for short error correcting
codes in 5G-NR,” 06 2017.
Page 70The University of Sydney
Performance and Complexity Comparison
Performance comparison in decoding (128,22,48) eBCH code (code rate 0.17)
[P-7] C. Yue, M. Shirvanimoghaddam, Y. Li and B. Vucetic, . "Segmentation-Discarding Ordered-Statistic Decoding for Linear Block
Codes." IEEE Global Communication Conference, Kona, HI, 2019 https://arxiv.org/abs/1901.02603
M. P. C. Fossorier and S. Lin, “Soft-decision decoding of linear block codes based on ordered statistics,” IEEE Transactions on
Information Theory, vol. 41, no. 5, pp. 1379–1396, Sep 1995.
J. Van Wonterghem, A. Alloum, J. J Boutros, and M. Moeneclaey, “On performance and complexity of OSD for short error correcting
codes in 5G-NR,” 06 2017.
Page 71The University of Sydney
Reduced Complexity OSD algorithm
– The complexity of OSD can be further reduced by utilizing
efficient techniques.
– In our latest work recently submitted to IEEE Transaction
on Information Theory, we fully analyzed the OSD decoder
and devised several low complexity alternatives based on sufficient
and necessary conditions.
– The paper can be found on Arxiv
C. Yue, M. Shirvanimoghaddam, Y. Li and B. Vucetic, A Revisit
to Ordered Statistic Decoding: Distance Distribution and
Decoding Rules https://arxiv.org/abs/2004.04913
Page 72The University of Sydney
Comparison: Complexity vs. Performance
[S-3] M. Shirvanimoghaddam et al., "Short Block-Length Codes for Ultra-Reliable Low Latency Communications," in IEEE Communications
Magazine, vol. 57, no. 2, pp. 130-137, February 2019. https://doi.org/10.1109/MCOM.2018.1800181
Page 73The University of Sydney
Channel Coding Techniques for URLLC
✔ Performance metric: Reliability and flexibility
✔ Channel code candidates
✔ Comparison of Channel Codes
✔ Advanced Ordered Statistic Decoder
→ Short Analog Fountain Codes
Page 74The University of Sydney
Short Analog Fountain Codes
– In conventional wireless communication, the transmitter is fed back
some indicator of its channel state such that it can choose the best
modulation and coding scheme.
– For asymptotically long blocks, the overhead associated with this
control information is negligible in comparison to the block length.
This signaling is estimated to incur 5–8 ms latency which violates
the low latency requirement of URLLC
– The signaling overhead is estimated to be around 30–50% for
payloads of length 200 symbols with 7–10 users, which is very
costly and inefficient (even for mMTC).
Motivation
Page 75The University of Sydney
Short Analog Fountain Codes
– We propose a class of self-adaptive channel codes, that can
transmit the required block length without any CSIT.
– The coded symbols are sequentially transmitted until the receiver
can successfully decode the information. A stop-feedback is sent to
the transmitter to terminate the transmission.
– Existing self-adaptive codes:
– Luby Transform codes
– Raptor codes
– Protograph-based raptor like codes
– Rate compatible modulation (RCM)
– Strider codes
– Analog fountain codes (AFC)
Motivation
Tailored for asymptotically
long block lengths
Page 76The University of Sydney
Short Analog Fountain Codes
Encoding
Precoder BPSK
S-AFC
Encoder
AWGN
S-AFC
Decoder
Binary
Decoder
High-rate LDPC (~0.95), for long block lengths
High-rate BCH (~0.95) – short block lengths
Iterative belief propagation
Belief propagation for LDPC
Ordered Statistics Decoder for BCH
Variable block length
Page 77The University of Sydney
Performance of AFC in the Asymptotic Block-Length Regime
– AFC can achieve near capacity
performance for asymptotically
long blocks
– The design of AFC is based on a
degree d and a weight set W(set of
real numbers)
Near-Capacity Performance when k = 10,000 bits
𝑐 𝑛
𝑏1 𝑏 2 … 𝑏 𝑑
Set of chosen information symbols in each
encoding stage is random!
[P-6] M. Shirvanimoghaddam, Y. Li and B. Vucetic, "Near-Capacity Adaptive Analog Fountain Codes for Wireless Channels," in IEEE
Communications Letters, vol. 17, no. 12, pp. 2241-2244, December 2013. https://doi.org/10.1109/LCOMM.2013.101813.131972
Page 78The University of Sydney
Performance of AFC in the Short Block-Length Regime
Poor performance at low SNR in comparison to the Polyanskiy-Poor and Verdu
Bound (Normal Approximation), k = 192
[P-1] R. Abbas, M. Shirvanimoghaddam, T. Huang, Y. Li and B. Vucetic, "Novel Design for Short Analog Fountain Codes," in IEEE
Communications Letters, vol. 23, no. 8, pp. 1306-1309, Aug. 2019. https://doi.org/10.1109/LCOMM.2019.2910517
Page 79The University of Sydney
Design of Short AFC
We propose a new weight set design based on two
rules:
- Power constraint
- Distance constraint
We want to maximize the minimum Euclidean
distance of the constellation while ensuring
the power constraint is met!
[P-1] R. Abbas, M. Shirvanimoghaddam, T. Huang, Y. Li and B. Vucetic, "Novel Design for Short Analog Fountain Codes," in IEEE
Communications Letters, vol. 23, no. 8, pp. 1306-1309, Aug. 2019. https://doi.org/10.1109/LCOMM.2019.2910517
Page 80The University of Sydney
Performance of Short AFC
Much better performance in comparison to original AFC
[P-1] R. Abbas, M. Shirvanimoghaddam, T. Huang, Y. Li and B. Vucetic, "Novel Design for Short Analog Fountain Codes," in IEEE
Communications Letters, vol. 23, no. 8, pp. 1306-1309, Aug. 2019. https://doi.org/10.1109/LCOMM.2019.2910517
Page 81The University of Sydney
Performance of Short AFC
Great tail distribution!
[P-1] R. Abbas, M. Shirvanimoghaddam, T. Huang, Y. Li and B. Vucetic, "Novel Design for Short Analog Fountain Codes," in IEEE
Communications Letters, vol. 23, no. 8, pp. 1306-1309, Aug. 2019. https://doi.org/10.1109/LCOMM.2019.2910517
Page 82The University of Sydney
Performance of Short AFC
No error floors exhibited up to 10-7
[P-1] R. Abbas, M. Shirvanimoghaddam, T. Huang, Y. Li and B. Vucetic, "Novel Design for Short Analog Fountain Codes," in IEEE Communications Letters,
vol. 23, no. 8, pp. 1306-1309, Aug. 2019. https://doi.org/10.1109/LCOMM.2019.2910517
Page 83The University of Sydney
Performance of Short AFC
Orders of magnitude improvement for very short blocks
[P-1] R. Abbas, M. Shirvanimoghaddam, T. Huang, Y. Li and B. Vucetic, "Novel Design for Short Analog Fountain Codes," in IEEE
Communications Letters, vol. 23, no. 8, pp. 1306-1309, Aug. 2019. https://doi.org/10.1109/LCOMM.2019.2910517
Page 84The University of Sydney
Analog Fountain Codes
Potentials:
– Low complexity encoder and decoder
– 1-bit granularity can be achieved for code rate and block length
– A very suitable candidate for URLLC because of its excellent
performance across SNRs at short block lengths
– Eliminate the need for CSI feedback
Challenges
The precoder design
Narrowing down the CDF for guaranteed reliability
Page 85The University of Sydney
Conclusion and future work
85
– Channel code for the URLLC has not been standardized yet.
– Polar codes suffer from latency due to the SIC.
– LDPC codes show error floor in low-to-moderate block lengths and
gap to the NA in short blocks.
– BCH codes suffer from high complexity OSD decoder
Moving Forward:
1. Reducing complexity of OSD to enable real time BCH decoding to
achieve the best error rate performance
2. Using analog fountain codes for autmatic adaptation to the
channel, therefore reducing the latency.
The University of Sydney
Medium Access Control Layer for URLLC
Dr. Rana Abbas
The University of Sydney
Medium Access Control Layer (MAC)
Link Request/Establishment
& Retransmissions
The University of Sydney
Medium Access Control Layer for URLLC
→ Why 4G MAC techniques cannot support massive URLLC
5G Approaches to Reducing Latency in Channel Access
Motivation for Grant-Free NOMA & Key Challenges
Performance Analysis of Massive Grant-Free NOMA
Grant-Free NOMA with Rateless Codes
Multi-Layer Grant-Free NOMA (Power and Code Domain)
Deep Learning Approach for Grant-Free NOMA
Conclusions and Future Directions
The University of Sydney
Why 4G cannot support Massive URLLC ?
Existing systems are designed to efficiently
transmit long data packets and few human
users:
– Several thousands of channel uses
– Moderately low packet-error rates (around
0.01)
– Control overhead is negligible to the size
of the payload
Current uplink transmissions based on multi-stage
and heavy signaling have a tremendous impact on
latency and reliability:
– For asymptotically long blocks, the
overhead associated with this control
information is negligible in comparison to
the block length. This signaling is
estimated to incur 5–8 ms latency
which violates the low latency
requirement of URLLC
– The signaling overhead is estimated to
be around 30–50% for payloads of
length 200 symbols with 7–10 users,
which is very costly and inefficient (even
for mMTC).
Current LTE end-to-end latency is
not guaranteed and ranges from
100 ms to a few seconds.
The University of Sydney
Medium Access Control Layer for URLLC
✔ Why 4G MAC techniques cannot support massive URLLC
→ 5G Approaches to Reducing Latency in Channel Access
Motivation for Grant-Free NOMA & Key Challenges
Performance Analysis of Massive Grant-Free NOMA
Grant-Free NOMA with Rateless Codes
Multi-Layer Grant-Free NOMA (Power and Code Domain)
Deep Learning Approach for Grant-Free NOMA
Conclusions and Future Directions
The University of Sydney
1. Cat-M1 uses 6 Resource Blocks (RBs) with 12 tones per RB at 15 kHZ SCS;
2. Cat-NB1 uses 1 Resource Block (RB) with 12 tones with 12 tones per RB at 15 kHz SCS, single-tone option also available
5G New Radio Rel-15,16
Pre-configured/semi-persistent
scheduling.
– This is only suitable
for predictable traffic patterns,
but otherwise exhibits low
efficiency.
– It is also only suitable for the
initial transmission (not for
HARQ)
For retransmissions (HARQ),
– K-repetition
– Proactive repetition
Spectrum Flexibility
(Subcarrier Spacing 15 kHz)
Low Latency
(TTI 0.125 ms)
Instant Uplink Access
The University of Sydney
5G New Radio Rel-15,16 : 2-Step Random Access Procedure
https://www.5gamericas.org/wp-content/uploads/2020/01/5G-Evolution-3GPP-R16-R17-FINAL.pdf
The University of Sydney
Medium Access Control Layer for URLLC
✔ Why 4G MAC techniques cannot support massive URLLC
✔ 5G Approaches to Reducing Latency in Channel Access
→ Motivation for Grant-Free NOMA & Key Challenges
Performance Analysis of Massive Grant-Free NOMA
Grant-Free NOMA with Rateless Codes
Multi-Layer Grant-Free NOMA (Power and Code Domain)
Deep Learning Approach for Grant-Free NOMA
Conclusions and Future Directions
The University of Sydney
Motivation for NOMA: Multiple Access Channel Capacity
The traditional capacity region is valid when the block length T is close to
10,000 symbols and more!
The University of Sydney
Motivation for NOMA
95
The sub-optimality of orthogonal
multiple access schemes increases
with the decrease in block length
and with the increase in the
number of users!
E. MolavianJazi and J. N. Laneman, "A Second-Order Achievable Rate Region for Gaussian Multi-Access Channels via a
Central Limit Theorem for Functions," in IEEE Transactions on Information Theory, vol. 61, no. 12, pp. 6719-6733, Dec. 2015,
doi: 10.1109/TIT.2015.2492547.
The University of Sydney
Study on NOMA for 5G-NR (Rel-16)*
MA
Signatures
Bit-Level Processing Scrambling LCRS
NCMA
Interleaving IDMA
IGMA
Symbol-Level Processing Welch-Bound RSMA
WCMA
Complex-Valued MUSA
Sparse Spread SCMA
PDMA
*3GPP TR 38.812 V16.0.0 (2018-12)
[S-4] M.B. Shahab, R. Abbas, M. Shirvanimoghaddam, and S. J. Johnson. "Grant-free Non-orthogonal Multiple Access for IoT: A Survey." arXiv
preprint arXiv:1910.06529 (2019). https://arxiv.org/abs/1910.06529, accepted to appear in IEEE Communications Surveys and Tutorials
The University of Sydney
Key Challenges for Grant-Free NOMA
User detection/identification
Collision avoidance/detection/resolution
Low-complexity decoders for joint user decoding
Load estimation for parameter tuning e.g. code rate
Synchronisation
The University of Sydney
Medium Access Control Layer for URLLC
✔ Why 4G MAC techniques cannot support massive URLLC
✔ 5G Approaches to Reducing Latency in Channel Access
✔ Motivation for Grant-Free NOMA & Key Challenges
→ Performance Analysis of Massive Grant-Free NOMA
Grant-Free NOMA with Rateless Codes
Multi-Layer Grant-Free NOMA (Power and Code Domain)
Deep Learning Approach for Grant-Free NOMA
Conclusions and Future Directions
The University of Sydney
Grant-Free NOMA: Framework
The University of Sydney
Grant-Free NOMA: Transmission Scheme
We have a set of 𝐿 orthogonal pilot sequences of length 𝑞 symbols, e.g.,
Zadoffchu, Golden codes, m-sequences, etc.
We have a set of 𝐿 codebooks.
Each device chooses a pilot uniformly at random and submits
simultaneously with the remaining devices.
The device that chose pilot sequence 𝑖 will use codebook 𝐶𝑖.
A collision event is defined as the event of two or more devices choosing
the same pilot.
The University of Sydney
Grant-Free NOMA: Detection & Decoding Scheme
The AP performs cross-correlations to detect the transmitted pilot
sequences and estimate the channel parameters for each codebook used.
Let us assume for now that the AP knows which “layers” are in collision:
In the literature, interference is
treated as binary!
The University of Sydney
Aggregate Interference Power: PPP Approximation
The number of collided devices is
a truncated Poisson random
variable.
However, their aggregate power,
for a given Ls, can be well-
approximated by a PPP.
For a PPP, the aggregate power
follows a skewed truncated stable
distribution.
102
Aggregate interference power for Lc = 200
The University of Sydney
Grant-Free NOMA: Case Studies
Performance
Metric
Coding Scheme Decoding Scheme
Outage
Probability
The probability that a
device, which has not
collided, is not
successfully decoded in a
given time slot.
Fixed Rate
Rate is fixed a priori and
does not change (Fixed
codeword lengths)
Successive Joint
Decoding
Successively jointly
decoding a subset of the
users (strongest) while
regarding the rest as
interference. This persists
until decoding is
successful.
Throughput
The ratio of the number of
successfully decoded
information bits to the
length of the transmitted
codeword (M −q),
averaged over all slots
Rateless
Rate is not fixed a priori
and can adapt to network
conditions e.g. load,
channel quality, etc.
Successive
Interference
Cancellation
Successively decoding the
strongest user while
regarding the rest as
interference
The University of Sydney
Case of Successive Joint Decoding
The University of Sydney
Comparison between Successive Joint Decoding &
Successive Interference Cancellation
The University of Sydney
- Open loop power control performs poorly with GF-NOMA
- The collision probability is the dominating factor of performance
- Open loop power control requires prohibitively long preamble sequences
(large number of contention transmit units)
- Joint decoding is far more superior than SIC in throughput
- We cannot hope to recover more than 3 users at a time with SIC (in practical
scenarios) due to error propagation
Key Take-aways
The University of Sydney
Medium Access Control Layer for URLLC
✔ Why 4G MAC techniques cannot support massive URLLC
✔ 5G Approaches to Reducing Latency in Channel Access
✔ Motivation for Grant-Free NOMA & Key Challenges
✔ Performance Analysis of Massive Grant-Free NOMA
→ Grant-Free NOMA with Rateless Codes
Multi-Layer Grant-Free NOMA (Power and Code Domain)
Deep Learning Approach for Grant-Free NOMA
Conclusions and Future Directions
The University of Sydney
Overview of Rateless Codes
In conventional wireless communication, the transmitter is fed back some
indicator of its channel state such that it can choose the best modulation
and coding scheme.
For asymptotically long blocks, the overhead associated with this control
information is negligible in comparison to the block length. This signaling is
estimated to incur 5–8 ms latency which violates the low latency
requirement of URLLC
The signaling overhead is estimated to be around 30–50% for payloads of
length 200 symbols with 7–10 users, which is very costly and inefficient
(even for mMTC).
Motivation
The University of Sydney
M. Shirvanimoghaddam, M. Dohler and S. J. Johnson, "Massive Non-Orthogonal Multiple Access for Cellular IoT: Potentials and Limitations,"
in IEEE Communications Magazine, vol. 55, no. 9, pp. 55-61, Sept. 2017.
Grant-Free NOMA with Rateless Codes
The University of Sydney
Grant-Free NOMA with Rateless Codes
The maximum arrival rate versus the initial backlog obtained from the weak and
strong stability conditions for different Ms, when Ns = 20, W = 1 MHz, L = 1000
M. Shirvanimoghaddam, M. Condoluci, M. Dohler and S. J. Johnson, "On the Fundamental Limits of Random Non-Orthogonal Multiple Access in
Cellular Massive IoT," in IEEE Journal on Selected Areas in Communications, vol. 35, no. 10, pp. 2238-2252, Oct. 2017.
The University of Sydney
Grant-Free NOMA with Rateless Codes
The University of Sydney
The maximum packet arrival rate versus the delay constraint under weak and
strong stability conditions, when W = 1 MHz, L = 1000, and collision
probability is set to pc = 0.01.
M. Shirvanimoghaddam, M. Condoluci, M. Dohler and S. J. Johnson, "On the Fundamental Limits of Random Non-Orthogonal Multiple Access in
Cellular Massive IoT," in IEEE Journal on Selected Areas in Communications, vol. 35, no. 10, pp. 2238-2252, Oct. 2017.
Grant-Free NOMA with Rateless Codes
The University of Sydney
Medium Access Control Layer for URLLC
✔ Why 4G MAC techniques cannot support massive URLLC
✔ 5G Approaches to Reducing Latency in Channel Access
✔ Motivation for Grant-Free NOMA & Key Challenges
✔ Performance Analysis of Massive Grant-Free NOMA
✔ Grant-Free NOMA with Rateless Codes
→ Multi-Layer Grant-Free NOMA (Power and Code Domain)
Deep Learning Approach for Grant-Free NOMA
Conclusions and Future Directions
The University of Sydney
Grant-Free NOMA with Multi-Layer Design
Transmission Scheme
Layer 2 (P2)
Layer 1 (P1)
The University of Sydney
Grant-Free NOMA with Multi-Layer Design
Example of Superposition of Signals
The University of Sydney
Grant-Free NOMA with Multi-Layer Design
Mixed-Linear Integer Programming (MILP)
The University of Sydney
Grant-Free NOMA with Multi-Layer Design
Page 118The University of Sydney
Medium Access Control Layer for URLLC
✔ Why 4G MAC techniques cannot support massive URLLC
✔ 5G Approaches to Reducing Latency in Channel Access
✔ Motivation for Grant-Free NOMA & Key Challenges
✔ Performance Analysis of Massive Grant-Free NOMA
✔ Grant-Free NOMA with Rateless Codes
✔ Multi-Layer Grant-Free NOMA (Power and Code Domain)
→ Deep Learning Approach for Grant-Free NOMA
Conclusions and Future Directions
Page 119The University of Sydney
Deep Learning Approach for GF-NOMA
[S-6] R. Abbas, T. Huang, M.B. Shahab, M. Shirvanimoghaddam, Y. Li and B. Vucetic. "Grant-Free Non-Orthogonal Multiple Access: A Key Enabler
for 6G-IoT.” arXiv preprint arXiv:2003.10257 (2020). https://arxiv.org/abs/2003.10257
Page 120The University of Sydney
Fully Connected Neural Network Architecture
• We adopt the structure of the auto-
encoder: 4 hidden layers, where each
layer consists of 2048 neurons.
• The activation function used for each
hidden layer in the encoder is ReLU
and the activation function used for its
output layer is a Sigmoid function.
• For the decoder, we also used 4
hidden layers and each layer consists
of 2048 neurons. The activation
function for each hidden layer is ReLU.
The output layer of the decoder
contains 2k-1 nodes, and the loss
function used is a binary cross-entropy
function.
[S-6] R. Abbas, T. Huang, M.B. Shahab, M. Shirvanimoghaddam, Y. Li and B. Vucetic. "Grant-Free Non-Orthogonal Multiple Access: A Key Enabler
for 6G-IoT.” arXiv preprint arXiv:2003.10257 (2020). https://arxiv.org/abs/2003.10257
Page 121The University of Sydney
Performance Evaluation : Code Rate = 1/2
[S-6] R. Abbas, T. Huang, M.B. Shahab, M. Shirvanimoghaddam, Y. Li and B. Vucetic. "Grant-Free Non-Orthogonal Multiple Access: A Key Enabler
for 6G-IoT.” arXiv preprint arXiv:2003.10257 (2020). https://arxiv.org/abs/2003.10257
Page 122The University of Sydney
Performance Evaluation : Code Rate = 1
[S-6] R. Abbas, T. Huang, M.B. Shahab, M. Shirvanimoghaddam, Y. Li and B. Vucetic. "Grant-Free Non-Orthogonal Multiple Access: A Key Enabler
for 6G-IoT.” arXiv preprint arXiv:2003.10257 (2020). https://arxiv.org/abs/2003.10257
Page 123The University of Sydney
Performance Evaluation : Different Loss Functions
[S-6] R. Abbas, T. Huang, M.B. Shahab, M. Shirvanimoghaddam, Y. Li and B. Vucetic. "Grant-Free Non-Orthogonal Multiple Access: A Key Enabler
for 6G-IoT.” arXiv preprint arXiv:2003.10257 (2020). https://arxiv.org/abs/2003.10257
Page 124The University of Sydney
Medium Access Control Layer for URLLC
✔ Why 4G MAC techniques cannot support massive URLLC
✔ 5G Approaches to Reducing Latency in Channel Access
✔ Motivation for Grant-Free NOMA & Key Challenges
✔ Performance Analysis of Massive Grant-Free NOMA
✔ Grant-Free NOMA with Rateless Codes
✔ Multi-Layer Grant-Free NOMA (Power and Code Domain)
✔ Deep Learning Approach for Grant-Free NOMA
→ Conclusions and Future Directions
Page 125The University of Sydney
– Existing grant-based access techniques are ill-suited for Massive
URLLC due to overhead and access delays
– Sporadic traffic in Massive URLLC is especially challenging to
solve with Grant-Free NOMA being a promising solution
– The bottleneck of performance are collisions, with collision
detection/resolution schemes are lacking in the literature.
– Joint decoding significantly outperforms SIC
– Rateless codes present a promising solution to improve reliability
– Multi-layer Grant Free NOMA presents a promising solution for
power improvements and reducing collisions
MAC: Summary
Page 126The University of Sydney
– Develop Multi-Layer Grant free NOMA schemes with rateless
codes
– Develop low complexity decoders for joint user decoding
– Develop deep learning techniques that aim at joint detection
and decoding of users in Grant-Free NOMA
MAC: Future Research Directions
Page 127The University of Sydney
Cross Layer Solutions for URLLC
Page 128The University of Sydney
X. Wu, X. Zhu, G. Q. Wu, and W. Ding, “Data mining with big data,” IEEE Trans. Knowl. Data Eng., vol. 26, no. 1, pp. 97–107, Jan. 2014.
Cross-Layer Design: Major Problems
– Some fragmental ideas for related
problems:
– Cross-layer design is missing
– Our understanding:
– E2E delay
– Overall reliability
– Network availability
We need the whole picture!
Page 129The University of Sydney
Cross-Layer Design: Major Problems
– Transmission delay (How to design frame structure? Is
retransmission helpful? )
– Queueing delay (Will a packet wait in a queue? How to design
queueing policy?)
–random arrival rate that could be higher than service rate
– Computing delay (How to characterize such delay?)
– Backhaul delay (Which kind of backhaul shall we use?)
–one-hop fiber backhaul or mmWave backhaul with LOS path
– Propagation delay (When is propagation delay dominated?)
–light travels 300 km in 1 ms
E2E delay
Page 130The University of Sydney
What are the factors leading to packet loss?
– Transmission error: non-zero in the short blocklength regime!
– Queueing delay violation: a packet becomes useless if it is
delayed
– Packet dropping in deep fading channel: wireless channel is
never reliable
How to reduce these packet loss probabilities?
What is the dominating factor?
Cross-Layer Design: Major Problems
Page 131The University of Sydney
How to characterize network availability?
– Can we ignore shadowing as what we did for traditional real-
time service?
– How long is the communication distance of URLLC?
• propagation delay in core network/backhaul
• distance attenuation in radio access network
– How to handle interference?
• This is also an issue for traditional real-time service!
How to improve network availability?
Cross-Layer Design: Major Problems
Page 132The University of Sydney
Y. Polyanskiy, H. V. Poor, and S. Verdu, “Channel coding rate in the finite blocklength regime,” IEEE Trans. Inf. Theory, pp. 2307–2359, May 2010.
Cross-Layer Design: Useful Tools
– Achievable rate in finite blocklength regime
– Transmission delay and transmission error probability
2
0
log 1t gP
C D W
WN
 
= + 
 
( )1
0
1
ln 1
ln2
t
t
Qt
D W gP
s f
WN D W
−
  
= + −  
  
( )t t
D ,
Page 133The University of Sydney
W. Yang, G. Durisi, T. Koch, and Y. Polyanskiy, “Quasi-static multiple-antenna fading channels at finite blocklength,” IEEE Trans. Inf. Theory, pp.
4232–4264, Jul. 2014.
Cross-Layer Design: Useful Tools
– Achievable rate in MIMO system
are the eigenvalues of channel matrix
– Approximation in high SNR regime
( )
( )
t r
1
1
min ,
0
( ) ln 1
ln2
Nt
tk k
N
t
k
Qk
D W g p V
s n f
N W D W
−
=
   
 + −  
   

( )
( )
( )
rtmin ,
r rt t2
1
0
min ,
1
,
1
min
N
k
k k
N
V N N
p g
N W
N N
=
= − 
 
+ 
 

kg
Page 134The University of Sydney
S. Schiessl, J. Gross, and H. Al-Zubaidy, “Delay analysis for wireless fading channels with finite blocklength channel coding,” in Proc. ACM MSWiM,
2015.
Cross-Layer Design: Useful Tools
– Ensuring queueing delay with Stochastic network
calculus
–From bit domain to SNR domain (given bandwidth)
–A useful tool to analyzing delay with given resource allocation
– Not applicable when one needs to optimize bandwidth
– Not applicable with unbounded arrival process, e.g., Poisson
– No closed-form result, inconvenient in cross-layer optimization
( ),q q
D 
Page 135The University of Sydney
Cross-Layer Design: System Model
Local Communication Scenarios:
Negligible propagation delay and short backhaul latency
Page 136The University of Sydney
Cross-Layer Design: System Model
– Each user requests packets from multiple users
– Arrival process:
– Departure process:
Queueing model
( )ki ia n A
( ) ( ) ( ) min ,k k kb n Q n s n=
( ) ( ) ( )1 ( )
k
k k i k
i
Q n Q n a n b n

+ − = −A
Page 137The University of Sydney
– Frame structure
– Channel model
– Multiple transmit antennas; single receive antenna
– Flat fading channel
– Quasi-static: delay bound < channel coherence time
Cross-Layer Design: System Model
137
Page 138The University of Sydney
Bursty arrivals: Interrupt Poisson process
Auto-correlated arrivals: Switched Poisson process
Cross-Layer Design: Arrival Procceses
138
Page 139The University of Sydney
– Achievable rate in short blocklength regime
– Queueing delay violation (Poisson process)
Cross-Layer Design: Finite Blocklength Regime
139
ln(1/ )
(packets/frame)
ln(1/ )
ln 1
q
f kB
k q
f kq
q
k
T
E
T
D
D



=
 
+ 
 
( )
( ) ( )1
0
( ) ln 1 packets/frame
ln2
t
tk k kt k
k q k
k t k
g p nDW V
s n f
u N W DW

−
   
 + −  
   
t fD T=
Page 140The University of Sydney
C. Chang and J. A. Thomas, “Effective bandwidth in high-speed digital networks,” IEEE J. Sel. Areas Commun., pp. 1091–1100, Aug. 1995.
[M-7] She, Changyang, et al. "Cross-layer design for mission-critical iot in mobile edge computing systems." IEEE Internet of Things Journal (2019).
https://doi.org/10.1109/JIOT.2019.2930983
Cross-Layer Design: Effective Bandwidth
– Ensuring queueing delay with effective bandwidth
(e.g. Poisson)
( ),q q
D 
ln(1/ )
(packets/s)
ln(1/ )
ln 1
q
B
q
fq
q
E
T
D
D



=
 
+ 
 
Page 141The University of Sydney
[1] G. L. Choudhury, D. M. Lucantoni, and W. Whitt, “Squeezing the most out of ATM,” IEEE Trans. Commun., vol. 44, no. 2, pp. 203–217, Feb. 1996.
[[M-7] She, Changyang, et al. "Cross-layer design for mission-critical iot in mobile edge computing systems." IEEE Internet of Things Journal (2019).
https://doi.org/10.1109/JIOT.2019.2930983
Cross-Layer Design: Effective Bandwidth
– In general, effective bandwidth is only applicable with large
queue length or delay
– Applicable for arrival processes that are more bursty than Poisson
– We validated that effective bandwidth can be used in short
delay region for bursty arrival processes
Page 142The University of Sydney
– Constraint on and
– Power control scheme: channel inverse
– Finite transmit power
– Proactive packet dropping
– Overall reliability requirement
Cross-Layer Design: Overall Reliability
( ) B
k ks n E
max B
k ks Eth
k kg g
( )max
max 0, B
k kE s−
( ),q q
D  ( )t t
D ,
( )( )( ) max1 1 1 1c q h c q h
k k k k k k      − − − −  + + 
Page 143The University of Sydney
Cross-Layer Design: Optimisation
143
Optimising the packet loss probabilities
tot th
, , ,
1
1,2,...,
minq c h
k k kk
K
k
W
k
k K
P P
  
=
=

( )
( )
0
th
th
0
g
0
ln 1
s.t. 1
ln 1
k k
k k
k k
N W
kP
k
h
k
P g
N W
f g dg





  
+  
   −
 +
 
 

( ) ( ) ( )1
Q
ln2
,ln 1 q t
q k k
t t
B
k k
k k
D
D
u V
E f
W WD
  −
+ = +
max
c q h
k k k   + + 
max
0, , 1,...,
K
k k
k
W W W W k K  =
Page 144The University of Sydney
Cross-Layer Design: Solutions
– Flat-fading → frequency-selective channel
– Channel coefficient on subchannel j of user k
– Apply the achievable rate over MIMO channel in:
144
Extension II: Different Channel Models
1 1
kjh 

sc
1
2
0 ... 0
0 ... 0
...
0 0 ...
kkN
k
k
h
h
h
 
 
 =
 
 
  
H
( )
sc
1t
1 0 t
( ) ln 1
ln2
k
kj kj t
k k
j
N
Q
g pDW V
s n f
N W DW
−
=
   
 + −  
   

W. Yang, G. Durisi, T. Koch, and Y. Polyanskiy, “Quasi-static multiple-antenna fading channels at finite blocklength,” IEEE Trans. Inf.
Theory, pp. 4232–4264, Jul. 2014.
Page 145The University of Sydney
Cross-Layer Design: Numerical Results
145
M//D/1 queue: Poisson arrival process & Constant service rate
D. Gross and C. Harris, Fundamentals of Queueing Theory. Wiley, 1985.
Page 146The University of Sydney
Cross-Layer Design: Numerical Results
– Poisson arrival process
– IPP (bursty)
– SPP (auto-correlated)
– Effective bandwidth is applicable
for Poisson process and processes
that are more bursty!
146
Page 147The University of Sydney
Cross-Layer Design: Numerical Results
Three packet loss probabilities are in the same level, none of them
can be ignored
147
Page 148The University of Sydney
Setting the three packet loss probabilities equal will cause minor power
loss
Cross-Layer Design: Numerical Results
Page 149The University of Sydney
Cross-Layer Design: Summary
– A framework is proposed for cross-layer optimization for URLLC
– Effective bandwidth can be used to design resource allocation
policy for Poisson processes and the processes that are more bursty
than Poisson
– Proposed a proactive packet dropping mechanism to ensure the
strict QoS with finite maximal transmit power
– Transmission error, queueing delay violation and packet dropping
are in the same order of magnitude, and setting the three packet
loss probabilities equal will cause minor power loss
149
Page 150The University of Sydney
Network-Layer Solutions for URLLC
Dr. Changyang She
Page 151The University of Sydney
Network-Layer Solutions for URLLC
→ Performance metric: network availability
Multi-connectivity in terrestrial communications
Antenna deployment for ground-to-air communications
Mobile edge computing systems for mission-critical IoT
Deep learning for network management
Page 152The University of Sydney
– E2E delay: 1 to 2 ms [1]
– Overall reliability (packet loss probability: 10-5 to 10-7)
– Network Availability (99.9% to 99.999% ) [2,3]
– One user: percentage of service time
– Multiple users: percentage of the total number of users
– Unavailable: delay and reliability requirements cannot be
satisfied
Note: the requirements on QoS and network availability depend on specific applications
[1] 3GPP, “Study on scenarios and requirements for next generation access technologies.” TSG RAN
TR38.913 R14, Jun. 2017.
[2] D. Ohmann, A. Awada, I. Viering, et al., “Modeling and Analysis of Intra-Frequency Multi-Connectivity for
High Availability in 5G”, VTC-Spring 2018
[3] P. Popovski, et al., Deliverable D6.3 Intermediate system evaluation results, 2014
QoS requirements in URLLC
Page 153The University of Sydney
— Spectral efficiency
— For URLLC and other services in 5G
— Energy efficiency
— Battery lifetime of mobile devices
— Cost for operating BSs
Resource Utilization Efficiency
Page 154The University of Sydney
— How to guarantee QoS requirements of URLLC?
— How to maximize resource utilization efficiency subject to
diverse QoS requirements of eMBB, mMTC, and URLLC?
— How to design practical solutions for real-time
implementation?
Research Problems
Page 155The University of Sydney
Network-Layer Solutions for URLLC
✔ Performance metric: network availability
→ Multi-connectivity in terrestrial communications
Antenna deployment for ground-to-air communications
Mobile edge computing systems for mission-critical IoT
Deep learning for network management
Page 156The University of Sydney
Improving Network Availability
Network availability & QoS requirement [1]
—Definition: Ratio of users with QoS guarantee in a wireless network
—For one mobile user: fraction of service time with QoS guarantee
How to characterize the network availability?
How to achieve high available range with stringent QoS?
—Distance attenuation and shadowing lead to short commun. Range
—Given locations of users, increase availability (existing studies)
—Given availability requirement (99.999%), increase available range
Motivation
[1] P. Popovski, et al., “Deliverable d6.3 intermediate system evaluation results.” ICT-317669-
METIS/D6.3, 2014.
[N-4] C. She, Z. Chen, C. Yang, T. Q. S. Quek, Y. Li and B. Vucetic, “Improving Available Range of
Ultra-reliable and Low-latency Communications with Different Transmission Modes ”, IEEE Trans. on
Commun., Nov. 2018. https://doi.org/10.1109/TCOMM.2018.2791598
Page 157The University of Sydney
Improving Network Availability
– Different users broadcast
packets on different
subchannels
– Available range: maximal
communication distance with
QoS guaranteeing
Illustration of system model
Page 158The University of Sydney
Improving Network Availability
Two-phase transmission protocol:
– Cellular mode (UL+DL)
– Decode at BS
(with processing delay)
– Amplify-and-forward at BS
(without processing delay)
– D2D mode
Retransmission with frequency-
hopping
Page 159The University of Sydney
Improving Network Availability
— Multi-Connectivity (MC) Modes
— AF MC mode (Amplify, without processing delay at BS)
— DF MC mode (decoded, with processing delay at BS)
Page 160The University of Sydney
Improving Network Availability
– Shadowing
– Shadowing: lognormal
– Correlation model [1]
– Large-scale channel gains
( )sb br sr 0( , ) exp /r r   = −
[1] S. S. Szyszkowicz, H. Yanikomeroglu, and J. S. Thompson, “On the feasibility of
wireless shadowing correlation models,” IEEE Trans. Commun., Nov. 2010.
Page 161The University of Sydney
Improving Network Availability
– Decoding error probability (UL) [1]
– Packet loss probabilities
– Cellular mode (decode)
– D2D mode
– MC mode (decode)
– Constraint on network availability
u u m
u u1 t
Q
0 1
ln2
ln 1 |g
TW g P b
f
V N W TW

 
     
 + −          
E
C u d u d
lP    + −=
D m m
1 2lP  =
( )  H m u m ud m C D
1 1 21 min ,l l lP P P     = − + 
 max 1 2 p b max APr ,lP T T D D D P + + +  
[1] W. Yang, G. Durisi, T. Koch, and Y. Polyanskiy, “Quasi-static multiple-antenna
fading channels at finite blocklength,” IEEE Trans. Inf. Theory, Jul. 2014.
Page 162The University of Sydney
Improving Network Availability
– Problem formulation (DF MC mode)
– Optimize the transmission durations in the two phases, and
adjust the deployment of BSs
 
1 2
d
A
,
10 c 10 cell c 0
c
10 sr 10 A
max 1 2 p b ma
sr 0
1 2 t 1 1 f 2 2 f
x APr ,
max
s.t. 10log 10 log ( )
10log 10 log ( )
, .,
l
T T
P T T D D D P
r
R
r
T T D T k T T k T
   
   
 +
= − + +
= − + +
+  = =
+ +  
Page 163The University of Sydney
Improving Network Availability
– We established a framework for improving available ranges
– Decoding-based MC mode can achieve large available ranges
than other modes when processing delay is negligible
– Amplifying-based MC mode can approach the performance of the
decoding-based MC mode when the UL SNR is high
– There is a tradeoff between available range of D2D links and
cellular links with MC modes
– It is better to use decoding-based mode in macro cells and use
amplifying-based mode in micro cells
Conclusions
Page 164The University of Sydney
Network-Layer Solutions for URLLC
✔ Performance metric: network availability
✔ Multi-connectivity in terrestrial communications
→ Antenna deployment for ground-to-air communications
Mobile edge computing systems for mission-critical IoT
Deep learning for network management
Page 165The University of Sydney
Ground-to-Air Communications
– Motivation
– Integrating unmanned aerial vehicles (UAVs) into cellular networks
has recently been recommended by the 3GPP [1]
– The latency and reliability of control & non-payload
communication (CNPC) links are crucial for UAVs
– How to support URLLC in CNPC links of UAV communications?[N-7]
– How to characterize the performance of CNPC links?
– How to improve the available range of CNPC links?
[1] 3GPP TR 36.777, “Study on enhanced LTE support for aerial vehicles.” TSG RAN,
v15.0.0, Dec. 2017.
[N-7] C. She, C. Liu, T. Q. S. Quek, C. Yang, and Y. Li, "Ultra-reliable and Low-latency
Communications in Unmanned Aerial Vehicle Communication Systems", IEEE Trans. on
Commun., May 2019. https://doi.org/10.1109/TCOMM.2019.2896184
Page 166The University of Sydney
Ground-to-Air Communications
– Illustration of system model
– High array gain in centralized multi-antenna systems
– High macro-diversity gain in distributed multi-antenna systems
– Both edge cloud and central cloud
Page 167The University of Sydney
Ground-to-Air Communications
– Delay components
– E2E delay (UAV to central cloud)
– UL transmission delay
– Processing delay
– Backhaul delay
– Round-trip delay (UAV to edge cloud, edge cloud to UAV)
– UL transmission delay
– Processing delay
– DL transmission delay
Page 168The University of Sydney
Ground-to-Air Communications
– Probability with Line-of-Sight (LoS) path
– A single link
– Multiple correlated links
Page 169The University of Sydney
Ground-to-Air Communications
Problem formulation
Page 170The University of Sydney
Ground-to-Air Communications
– Conclusions
– We proposed a framework of maximizing the available range of
the ground control station for ultra-reliable and low-latency UAV
communications
– We characterized the correlation of whether co-located APs have
LoS path towards to a UAV using a two-state Markov Chain, and
derived the probability that at least one of the APs has a LoS
path towards a UAV
– To solve the non-convex problem of maximizing the available
range, we proposed an algorithm that converges to the optimal
solution in two asymptotic scenarios
– We then generalized the algorithm to the general scenario of the
arbitrary number of antennas at each AP.
Page 171The University of Sydney
Network-Layer Solutions for URLLC
Performance metric: network availability
Multi-connectivity in terrestrial communications
Antenna deployment for ground-to-air communications
→ Mobile edge computing systems for mission-critical IoT
Deep learning for network management
Page 172The University of Sydney
Mission-critical IoT in MEC
– Background
– URLLC and eMBB services co-exist in future wireless networks
– Mission-critical IoT in smart factory, virtual/augmented reality, and
autonomous vehicles
– URLLC: short packets, short processing time
– eMBB: long packets (3D video), long processing time
– Motivation
– Design service order of MEC with both URLLC and eMBB
– Analyzing the distribution of delay experienced by URLLC
– Optimizing user association, offloading probability, and radio
resource allocation for URLLC
Page 173The University of Sydney
Mission-critical IoT in MEC
– MC-IoT and eMBB (background
service) in a MEC system
– Multiple APs equipped with edge
servers
– One partially centralized control
plane of user association
Illustration of system model
Page 174The University of Sydney
Mission-critical IoT in MEC
– Queueing system
– FCFS order at the local server of each device
– Processor sharing server at the MEC
– Service ability is equally allocated to all the tasks in the server
– Short packets do not need to wait for the processing of long packets
Page 175The University of Sydney
Mission-critical IoT in MEC
– Delay analysis in M/G/1/PS
– Service time of short packets is much shorter than long packets
– The number of tasks in the buffer does not change significantly
during the short service time of a short packet
– The service rate of a short packet can be approximated by
– The service delay can be approximated by
– According to the distribution of q,
Page 176The University of Sydney
Mission-critical IoT in MEC
– Cross-layer optimization framework
– User association: the AP a device will offload its’ packets to
– Offloading rate: the probability that a packet is offloaded to
MEC
– Bandwidth allocation: UL and DL bandwidth allocation for data
transmission between a user and an MEC
– Objective: minimizing the maximal packet loss probability
Page 177The University of Sydney
Mission-critical IoT in MEC
Problem formulation
Page 178The University of Sydney
Mission-critical IoT in MEC
– Two asymptotic scenarios: communication or computing is
the bottleneck of reliability
– Communication is the bottleneck: highest large-scale
channel gain
– Computing is the bottleneck: MEC with the lowest
workload
– Extend the algorithm into the general scenario
Finding the solution of this non-convex problem:
Page 179The University of Sydney
Mission-critical IoT in MEC
Distribution of delay experienced by short packets
Page 180The University of Sydney
Overall packet loss probability
Mission-critical IoT in MEC
Page 181The University of Sydney
Overall packet loss probability
Mission-critical IoT in MEC
Page 182The University of Sydney
Mission-critical IoT in MEC
– We analyzed the processing delay of short packets in the
M/G/1/PS server and derived the closed-form expression
of the CCDF of the processing delay
– We minimized the overall packet loss probability under the
constraint on E2E delay by optimizing association scheme,
packet offloading rates, and bandwidth allocation.
– We derived the optimal solutions of the problem in two
asymptotic cases: communication or computing is the
bottleneck of reliability
– We then generalized the algorithm to the general scenario.
Conclusions
Page 183The University of Sydney
Network-Layer Solutions for URLLC
✔ Performance metric: network availability
✔ Multi-connectivity in terrestrial communications
✔ Antenna deployment for ground-to-air communications
✔ Mobile edge computing systems for mission-critical IoT
→ Deep learning for network management
Page 184The University of Sydney
Deep learning for URLLC
Learning at three levels (User-, Cell-, Network-levels)
Page 185The University of Sydney
Our Results on AI for URLLC
User-level
• Burstiness aware bandwidth reservation (AI for traffic state
classification in tactile internet) [N-5]
• Prediction & communication co-design (AI for mobility prediction in
remote control applications) [N-8]
Cell-level
• Deep learning for resource management [N-9]
• Deep reinforcement learning for downlink scheduler design
Network-level
• Deep learning for user association [N-11]
• Deep reinforcement learning in software-defined networks
Page 186The University of Sydney
User-level Results
– Classify the packet arrival process into high and low traffic states
– Design bandwidth reservation according to traffic states
– Can save up 43.2% bandwidth subject to QoS constraints
User-level: Generating packet arrivals from a tactile device [N-5]
[N-5] Z. Hou, C. She, Y. Li, T. Q. S. Quek, and B. Vucetic, “Burstiness Aware Bandwidth Reservation for Ultra-reliable and Low-latency
Communications in Tactile Internet,” IEEE J. Sel. Areas Commun., Nov. 2018. https://doi.org/10.1109/JSAC.2018.2874113
Page 187The University of Sydney
User-level Results
– Predict the trajectory of the
device and transmit
predicted trajectory in
advance
– Can save user experienced
delay and achieve a better
reliability-delay tradeoff
User-level: Trajectory of a tactile device [N-8]
[N-8] Z. Hou, C. She, Y. Li, Z. Li, and B. Vucetic, “Prediction and Communication Co-design for Ultra-Reliable and Low-Latency Communications”, IEEE
TWC, 2019. https://doi.org./10.1109/TWC.2019.2951660
Page 188The University of Sydney
Cell-level Results
– Find labelled training samples
from optimization algorithms
– Train deep neural network
(DNN) offline for resource
allocation
– Input channel state
information and average
packet arrival rates of users
– Output number of subcarriers
and transmit power allocated
to users
– The pre-trained DNN can find
near-optimal solution in real time
Cell-level: Base station optimizes resource allocation [N-9]
[N-9] R. Dong, C. She, W. Hardjawana, Y. Li, and B. Vucetic, “Deep Learning for Radio Resource Allocation with Diverse Quality-of-Service
Requirements in 5G” IEEE TWC, submitted. (Conference version accepted by IEEE Globecom 2019) https://arxiv.org/pdf/2004.00507.pdf
Page 189The University of Sydney
Network-level Results
– Find labelled training samples
in a simulation platform
– Train a DNN offline (From
channel and traffic states to
association scheme)
– Outperforms benchmarks
– Nearest access point
– Highest SNR
– Game theory approach
– Close to the optimal scheme
Network-level: Mobility management entity optimizes user association [N-11]
[N-11] R. Dong, C. She, W. Hardjawana, Y. Li, and B. Vucetic, “Deep Learning for Hybrid 5G Services in Mobile Edge Computing Systems: Learn
from a Digital Twin” IEEE Trans. on Wireless Commun., Oct., 2019. https://doi.org/10.1109/TWC.2019.2927312
The University of Sydney
URLLC for Beyond 5G
Professor Yonghui Li
The University of Sydney
URLLC for Beyond 5G
5G Road map
URLLC: Key enabler of 6G Applications
Machine-Learning Based Communication Systems
URLLC and Time Sensitive Networks
URLLC and Satellite Communications
URLLC and Quantum Computing
URLLC and Wireless Networked Control
The University of Sydney
5G Road map
The University of Sydney
Joint URLLC and Time Sensitive Networks (TSN)
URLLC Time Sensitive Networks (TSN) Flexible Spectrum
Sub ms delay
10−5 BLER
Microsec time synchronization Dedicated,
licensed or
unlicensed/shared
spectrum
The University of Sydney
https://www.smartcitiesworld.net/
6G Applications
The sixth-generation (6G) system,
with the full support of artificial
intelligence is expected to be
deployed between 2027 and 2030
– Artificial Intelligence
– Terahertz Communications
– Optical wireless technology
– Free space optic network
– Block chains
– 3D networking
– Quantum computing and
communications
– Big data analytics
– …
The University of Sydney
Satellite Communications
Existing communication network design has mainly focused
on terrestrial communication networks
LEO Satellite network has a key role to play here
Elon Musk's SpaceX is going to launch 42000 LEOs
to provide Global internet communications
Altitude of several hundreds kilometres, latency of few ms
Employ optical feeder links/ inter-satellite links and phased
array beam forming and digital processing technologies in
the Ku- and Ka-band
The system will be able to provide high speed (up to 1 Gbps
per user, which is 200 times faster than current average
internet speed), low latency broadband services for
consumers and businesses​
Reliability due to rain attenuation, inter-beam-interference,
real-time data services, low latency, channel estimation due
to fast moving satellite
Visualisation of Elon Musk’s space internet
https://hipertextual.com/
Joint design of Satellite and Terrestrial communication networks​
The University of Sydney
Deep Learning
Artificial Intelligence: The most important and newly introduced technology for 6G
communication systems
The upcoming 5G will support partial or very limited AI.
6G will be fully Draft supported by AI for automatization.
Advancements in machine learning will create more intelligent networks for real-
time communications in 6G.
AI will increase the efficiency and reduce the processing delay of the
communication steps. Time-consuming tasks, such as handover and network
selection, can be performed promptly by using AI.
AI is the key enabling technology for 6G for network automation and
intelligent management
https://arxiv.org/ftp/arxiv/papers/1909/1909.11315.pdf
The University of Sydney
N. Farsad, A. Goldsmith, Detection Algorithms for Communication Systems Using Deep Learning;
Machine Learning-Based Communication Systems
Existing communication system design is divided the whole system
into a chain of multiple processing blocks, each responsible for a
specific sub-task, e.g., source coding, channel coding, modulation,
channel estimation and equalization – though it is efficient, but
suboptimal – do not achieve the optimal end-to-end performance.
DL end-to-end learning of communications systems jointly
optimizes transmitter and receiver in a single process and does not
have such a rigid modular structure;
DL can be executed in parallel processing architectures with GPUs
and specialized machine learning chips – high processing speed,
low processing latency and low energy cost
The University of Sydney
S. Dörner, S. Cammerer, J. Hoydis, S. ten Brink, “Deep Learning-Based Communication Over the Air.
Deep Learning
Existing design relies on the prior mathematical modelling and
analysis. Algorithms are optimized for tractable mathematical
models, which are usually linear, stationary and Gaussian
distributed – practical systems have many imperfections and non-
linearity, which cannot be captured by such models
Deep learning (DL) based communication system (or processing
blocks) does not require a mathematically trackatble model. It treats
the system as a black box.
The recent significant advances in DL libraries and readily available
specialized ML chips can escalate the development of DL
communication systems
Machine learning communication systems
The University of Sydney
S. Dörner, S. Cammerer, J. Hoydis, S. ten Brink, “Deep Learning-Based Communication Over the Air.
Deep Learning
Current progress:
DL based channel decoding, modulation classifications, MIMO detection,
compressive sensing, compression, encryption/decryption of an
eavesdropper channel
An DL based SDR prototype of a complete uncoded end-to-end
communication systems with open source DL software libraries
Open challenges:
Biggest challenge is to scale to large message size – possible approach is
to embed the code structure and modulation information in the DL
Training SNRs – the learned system should operate at any SNR, regardless
at which SNR it was trained
Optimal choice of loss function
Channel state information learning ….
Leaning for random access …..
Machine learning communication systems
The University of Sydney
Quantum Computing
Google recently announced new record-breaking
72-qubit quantum processor, achieving quantum
supremacy, the point at which quantum computers
can perform calculations that are beyond
the capabilities of even the most advanced
supercomputers.
Time for decryption can be reduced from years to
minutes – new challenge for security protocols;
Google is also developing Quantum machine
learning chip, which can significantly speed up the
machine learning process – complexity may not be
a big issue with quantum processing
How to develop parallel communication
architecture tailored for Quantum
processor? Machine learning based
communication systems may be one possible
approach.
Google's Sycamore chip is kept cool inside their quantum
cryostat.
(Image: © Eric Lucero/Google, Inc.)
What’s the key takeaway?
The University of Sydney
Wireless Network Control
One key major application of uRLLC is in wireless networked control
Existing studies on how wireless communication can affect the control
performance, such as the effect of delay and packet dropouts on the stability
of the networked control system
The effects of practical wireless communication techniques on the
performance (i.e., stability + cost) of wireless control systems
– MIMO (diversity-multiplexing tradeoff),
– Short packet communication (latency-reliability tradeoff)
Resource allocation in future wireless control networks
– Joint downlink uplink scheduling/resource allocation
– Broadcast channel
– Multiple access channel
– Interference channel
The University of Sydney
References
The University of Sydney
[S-1] C. She, C. Yang, and T. Q. S. Quek, “Radio Resource Management for Ultra-reliable
and Low-latency Communications,” IEEE Commun. Mag., Jun. 2017.
https://doi.org/10.1109/MCOM.2017.1601092
[S-2] H. Chen, R. Abbas, M. Shirvanimoghaddam, W. Hardjawana, W. Bao, Y. Li and B.
Vucetic. "Ultra-reliable low latency cellular networks: Use cases, challenges and
approaches." IEEE Communications Magazine 56.12 (2018): 119-125.
https://doi.org/10.1109/MCOM.2018.1701178
[S-3] M. Shirvanimoghaddam et al., Short Block-Length Codes for Ultra-Reliable Low-
Latency Communications, in IEEE Communications Magazine, vol. 57, no. 2, 2019.
https://doi.org/10.1109/MCOM.2018.1800181
[S-4] M.B. Shahab, R. Abbas, M. Shirvanimoghaddam, and S. J. Johnson. "Grant-free
Non-orthogonal Multiple Access for IoT: A Survey." arXiv preprint arXiv:1910.06529 (2019).
https://arxiv.org/abs/1910.06529, accepted to appear in IEEE Communications Surveys
and Tutorials
[S-5] D. Feng, C. She, K. Ying, et al., "Towards Ultra-Reliable Low-Latency
Communications: Typical Scenarios, Possible Solutions, and Open Issues", IEEE Veh.
Tech. Mag., Jun. 2019. https://doi.org/10.1109/MVT.2019.2903657
[S-6] R. Abbas, T. Huang, M.B. Shahab, M. Shirvanimoghaddam, Y. Li and B. Vucetic.
"Grant-Free Non-Orthogonal Multiple Access: A Key Enabler for 6G-IoT.” arXiv preprint
arXiv:2003.10257 (2020). https://arxiv.org/abs/2003.10257
References – Survey Papers
The University of Sydney
References – (PHY)
[P-1] R. Abbas, M. Shirvanimoghaddam, T. Huang, Y. Li and B. Vucetic, Novel Design for
Short Analog Fountain Codes, in IEEE COMM Letter, vol. 23, no. 8, 2019.
https://doi.org/10.1109/LCOMM.2019.2910517
[P-2] M. Shirvanimoghaddam et al., Short Block-Length Codes for Ultra-Reliable Low-
Latency Communications, in IEEE Communications Magazine, vol. 57, no. 2, 2019.
https://doi.org/10.1109/MCOM.2018.1800181
[P-3] S. Jayasooriya, M. Shirvanimoghaddam, L. Ong and S. J. Johnson, Analysis and
design of Raptor codes using a multi-edge framework, in IEEE TCOM, vol. 65, no. 12, Oct.
2017. https://doi.org/10.1109/TCOMM.2017.2750179
[P-4] S. Jayasooriya, M. Shirvanimoghaddam, L. Ong, G. Lechner and S. J. Johnson, A New
Density Evolution Approximation for LDPC and Multi-Edge Type LDPC Codes, in IEEE
TCOM, vol. 64, no. 10, 2016. 13. M. Shirvanimoghaddam and S. J. Johnson, Raptor Codes
in the Low SNR Regime, in IEEE TCOM, vol. 64, no. 11, 2016.
https://doi.org/10.1109/TCOMM.2016.2600660
[P-5] M. Shirvanimoghaddam, Y. Li, B. Vucetic, J. Yuan, P. Zhang, Binary Compressive
Sensing via Analog Fountain Coding, IEEE TSP, vol. 63, no. 24, 2015.
https://doi.org/10.1109/TSP.2015.2472362
[P-6] M. Shirvanimoghaddam, Y. Li, B. Vucetic, Near-Capacity Adaptive Analog Fountain
Codes for Wireless Channels, IEEE Communications Letters, vol. 17, no. 12, 2013.
https://doi.org/10.1109/LCOMM.2013.101813.131972
The University of Sydney
References – (PHY)
[P-7] C. Yue, M. Shirvanimoghaddam, et al, Segmentation-Discarding Ordered-Statistic
Decoding for Linear Block Codes, IEEE Globcom, Kona, HI, Dec. 2019.
https://arxiv.org/abs/1901.02603
[P-8] R. Abbas, M. Shirvanimoghaddam, et al, Performance Analysis of Short Analog
Fountain Codes, IEEE Globecom, Kona, HI, Dec. 2019.
[P-9] W. Lim, M. Shirvanimoghaddam, et al, On the Design of Analog Fountain Codes for
Short Packet Communications in 5G URLLC, IEEE VTC-Spring, Honolulu, HI, Sep. 2019.
https://doi.org/10.1109/VTCFall.2019.8891550
[P-10] C. Yue, M. Shirvanimoghaddam, Y. Li and B. Vucetic, Hamming Distance Distribution
of the 0-reprocessing Estimate of the Ordered Statistic Decoder, IEEE ISIT, Paris, France,
July 2019. https://doi.org/10.1109/ISIT.2019.8849229
The University of Sydney
References – (MAC)
[M-1] M. Shirvanimoghaddam, Y. Li, M. Dohler, B. Vucetic, S. Feng, Probabilistic Rateless
Multiple Access for Machine-to-Machine Communication, IEEE TWC, vol. 14, no. 12, 2015.
https://doi.org/10.1109/TWC.2015.2460254
[M-2] R. Abbas, M. Shirvanimoghaddam, Y. Li and B. Vucetic. "A Novel Analytical Framework
for Massive Grant-Free NOMA." IEEE Transactions on Communications (2018).
https://doi.org/10.1109/TCOMM.2018.2881120
[M-3] R. Abbas, M. Shirvanimoghaddam, Y. Li and B. Vucetic, "A Multi-Layer Grant-Free
NOMA Scheme for Short Packet Transmissions." 2018 IEEE Global Communications
Conference (GLOBECOM). IEEE, 2018. https://doi.org/10.1109/GLOCOM.2018.8647968
[M-4] M. Shirvanimoghaddam, M. Condoluci, M. Dohler and S. Johnson. "On the
fundamental limits of random non-orthogonal multiple access in cellular massive IoT." IEEE
Journal on Selected Areas in Communications 35.10 (2017): 2238-2252.
https://doi.org/10.1109/JSAC.2017.2724442
[M-5] M. B. Shahab, R. Abbas, M. Shirvanimoghaddam, and S. J. Johnson. "Grant-free Non-
orthogonal Multiple Access for IoT: A Survey." arXiv preprint arXiv:1910.06529 (2019). ).
https://arxiv.org/abs/1910.06529
The University of Sydney
References – (Cross-Layer)
[C-6] C. She, C. Yang, and TQS Quek. "Cross-layer optimization for ultra-reliable and low-
latency radio access networks." IEEE Transactions on Wireless Communications 17.1
(2017): 127-141. https://doi.org/10.1109/TWC.2017.2762684
[C-7] C. She, et al. "Cross-layer design for mission-critical iot in mobile edge computing
systems." IEEE Internet of Things Journal (2019). https://doi.org/10.1109/JIOT.2019.2930983
The University of Sydney
References – (Network)
[N-1] C. She, C. Yang, and T. Q. S. Quek, “Radio Resource Management for Ultra-reliable and Low-
latency Communications,” IEEE Commun. Mag., Jun. 2017.
https://doi.org/10.1109/MCOM.2017.1601092
[N-2] C. She, C. Yang, and T. Q. S. Quek, “Cross-layer Optimization for Ultra-reliable and Low-latency
Radio Access Networks,” IEEE Trans. Wireless Commun., Jan. 2018.
https://doi.org./10.1109/TWC.2017.2762684
[N-3] C. She, C. Yang, and T. Q. S. Quek, “Joint Uplink and Downlink Resource Configuration for
Ultra-reliable and Low-latency Communications,” IEEE Trans. Commun., Jan. 2018.
https://doi.org./10.1109/TCOMM.2018.2791598
[N-4] C. She, Z. Chen, C. Yang, T. Q. S. Quek, Y. Li and B. Vucetic, “Improving Available Range of
Ultra-reliable and Low-latency Communications with Different Transmission Modes ”, IEEE Trans. on
Commun., Nov. 2018. https://doi.org/10.1109/TCOMM.2018.2791598
[N-5] Z. Hou, C. She, Y. Li, T. Q. S. Quek, and B. Vucetic, “Burstiness Aware Bandwidth Reservation
for Ultra-reliable and Low-latency Communications in Tactile Internet,” IEEE J. Sel. Areas Commun.,
Nov. 2018. https://doi.org/10.1109/JSAC.2018.2874113
[N-6] C. Sun, C. She, C. Yang, T. Q. S. Quek, Y. Li, and B. Vucetic, "Optimizing Resource Allocation in
Short Blocklength Regime for Ultra-reliable and Low-latency Communications", IEEE Trans. on
Wireless Commun., Jan. 2019. https://doi.org/10.1109/TWC.2018.2880907
[N-7] C. She, C. Liu, T. Q. S. Quek, C. Yang, and Y. Li, "Ultra-reliable and Low-latency
Communications in Unmanned Aerial Vehicle Communication Systems", IEEE Trans. on Commun.,
May 2019. https://doi.org/10.1109/TCOMM.2019.2896184
The University of Sydney
[N-8] Z. Hou, C. She, Y. Li, Z. Li, and B. Vucetic, “Prediction and Communication Co-design for
Ultra-Reliable and Low-Latency Communications”, IEEE TWC, 2019.
https://doi.org./10.1109/TWC.2019.2951660
[N-9] R. Dong, C. She, W. Hardjawana, Y. Li, and B. Vucetic, “Deep Learning for Radio Resource
Allocation with Diverse Quality-of-Service Requirements in 5G” IEEE TWC, submitted.
(Conference version accepted by IEEE Globecom 2019) https://arxiv.org/pdf/2004.00507.pdf
[N-10] D. Feng, C. She, K. Ying, et al., "Towards Ultra-Reliable Low-Latency Communications:
Typical Scenarios, Possible Solutions, and Open Issues", IEEE Veh. Tech. Mag., Jun. 2019.
https://doi.org/10.1109/MVT.2019.2903657
[N-11] R. Dong, C. She, W. Hardjawana, Y. Li, and B. Vucetic, “Deep Learning for Hybrid 5G
Services in Mobile Edge Computing Systems: Learn from a Digital Twin” IEEE Trans. on Wireless
Commun., Oct., 2019. https://doi.org/10.1109/TWC.2019.2927312
[N-12] C. She, Y. Duan, G. Zhao, T. Q. S. Quek, Yonghui Li, and Branka Vucetic, "Cross-Layer
Design for Mission-Critical IoT in Mobile Edge Computing Systems", IEEE Internet-of-Things J.,
early access, 2019. https://doi.org/10.1109/JIOT.2019.2930983
[N-13] C. Pradhan, A. Li, C. She, Y. Li, B. Vucetic, “Computation Offloading for IoT in C-RAN:
Optimization and Deep Learning”, IEEE Trans. on Commun., submitted.
https://arxiv.org/abs/1909.10696
[N-14] C. She, R. Dong, Z. Gu, et al., "Deep learning for Ultra-Reliable and Low-Latency
Communications in 6G networks", IEEE Network, submitted. https://arxiv.org/abs/2002.11045
References – (Network)
The University of Sydney
Presenter Biographies
The University of Sydney
Professor Yonghui Li
Yonghui Li is now a Professor in School
of Electrical and Information
Engineering, University of Sydney. He is
the recipient of the Australian Queen
Elizabeth II Fellowship in 2008 and the
Australian Future Fellowship in
2012. His current research interests are
in the area of wireless communications,
with a particular focus on MIMO,
millimeter wave communications,
machine to machine communications,
coding techniques and cooperative
communications. He is Fellow of IEEE.
https://sydney.edu.au/engineering/about/our-people/academic-
staff/yonghui-li.html
URLLC for 5G and Beyond: Physical, MAC, and Network Solutions
URLLC for 5G and Beyond: Physical, MAC, and Network Solutions
URLLC for 5G and Beyond: Physical, MAC, and Network Solutions
URLLC for 5G and Beyond: Physical, MAC, and Network Solutions

Contenu connexe

Tendances

Advanced: True Fixed-Mobile Convergence (FMC) with 5G
Advanced: True Fixed-Mobile Convergence (FMC) with 5GAdvanced: True Fixed-Mobile Convergence (FMC) with 5G
Advanced: True Fixed-Mobile Convergence (FMC) with 5G3G4G
 
lte physical layer overview
 lte physical layer overview lte physical layer overview
lte physical layer overviewPraveen Kumar
 
DWDM Presentation
DWDM PresentationDWDM Presentation
DWDM Presentationayodejieasy
 
4G LTE full tutorial
4G LTE full tutorial4G LTE full tutorial
4G LTE full tutorialAfzaal Anwar
 
5G NR: Key features and enhancements
5G NR: Key features and enhancements5G NR: Key features and enhancements
5G NR: Key features and enhancements3G4G
 
Non orthogonal multiple access
Non orthogonal multiple accessNon orthogonal multiple access
Non orthogonal multiple accessShalikramRajpoot
 
EC8702 adhoc and wireless sensor networks iv ece
EC8702 adhoc and wireless sensor networks iv eceEC8702 adhoc and wireless sensor networks iv ece
EC8702 adhoc and wireless sensor networks iv eceGOWTHAMMS6
 
An Introduction to 5G and ‘Real’ 5G
An Introduction to 5G and ‘Real’ 5GAn Introduction to 5G and ‘Real’ 5G
An Introduction to 5G and ‘Real’ 5G3G4G
 
Timing and synchronization for 5G over optical networks
Timing and synchronization for 5G over optical networksTiming and synchronization for 5G over optical networks
Timing and synchronization for 5G over optical networksADVA
 
The coherent optical edge
The coherent optical edgeThe coherent optical edge
The coherent optical edgeADVA
 
Prof. Andy Sutton: 5G RAN Architecture Evolution - Jan 2019
Prof. Andy Sutton: 5G RAN Architecture Evolution - Jan 2019Prof. Andy Sutton: 5G RAN Architecture Evolution - Jan 2019
Prof. Andy Sutton: 5G RAN Architecture Evolution - Jan 20193G4G
 
5G physical layer
5G physical layer 5G physical layer
5G physical layer Ali Nikfal
 
5G Technology Tutorial
5G Technology Tutorial5G Technology Tutorial
5G Technology TutorialAPNIC
 
FDM,OFDM,OFDMA,MIMO
FDM,OFDM,OFDMA,MIMOFDM,OFDM,OFDMA,MIMO
FDM,OFDM,OFDMA,MIMONadeem Rana
 
5G Interview Questions: 50 Questions on Spectrum
5G Interview Questions: 50 Questions on Spectrum5G Interview Questions: 50 Questions on Spectrum
5G Interview Questions: 50 Questions on Spectrum3G4G
 
Cognitive Radio, Introduction and Main Issues
Cognitive Radio, Introduction and Main IssuesCognitive Radio, Introduction and Main Issues
Cognitive Radio, Introduction and Main IssuesKuncoro Wastuwibowo
 

Tendances (20)

Advanced: True Fixed-Mobile Convergence (FMC) with 5G
Advanced: True Fixed-Mobile Convergence (FMC) with 5GAdvanced: True Fixed-Mobile Convergence (FMC) with 5G
Advanced: True Fixed-Mobile Convergence (FMC) with 5G
 
lte physical layer overview
 lte physical layer overview lte physical layer overview
lte physical layer overview
 
DWDM Presentation
DWDM PresentationDWDM Presentation
DWDM Presentation
 
4G LTE full tutorial
4G LTE full tutorial4G LTE full tutorial
4G LTE full tutorial
 
5G NR: Key features and enhancements
5G NR: Key features and enhancements5G NR: Key features and enhancements
5G NR: Key features and enhancements
 
Non orthogonal multiple access
Non orthogonal multiple accessNon orthogonal multiple access
Non orthogonal multiple access
 
EC8702 adhoc and wireless sensor networks iv ece
EC8702 adhoc and wireless sensor networks iv eceEC8702 adhoc and wireless sensor networks iv ece
EC8702 adhoc and wireless sensor networks iv ece
 
An Introduction to 5G and ‘Real’ 5G
An Introduction to 5G and ‘Real’ 5GAn Introduction to 5G and ‘Real’ 5G
An Introduction to 5G and ‘Real’ 5G
 
Timing and synchronization for 5G over optical networks
Timing and synchronization for 5G over optical networksTiming and synchronization for 5G over optical networks
Timing and synchronization for 5G over optical networks
 
The coherent optical edge
The coherent optical edgeThe coherent optical edge
The coherent optical edge
 
Introduction to 5G NR
Introduction to 5G NRIntroduction to 5G NR
Introduction to 5G NR
 
Optical networking
Optical networkingOptical networking
Optical networking
 
3G Radio Network Planning
3G Radio Network Planning3G Radio Network Planning
3G Radio Network Planning
 
Prof. Andy Sutton: 5G RAN Architecture Evolution - Jan 2019
Prof. Andy Sutton: 5G RAN Architecture Evolution - Jan 2019Prof. Andy Sutton: 5G RAN Architecture Evolution - Jan 2019
Prof. Andy Sutton: 5G RAN Architecture Evolution - Jan 2019
 
Optical Transport Network
Optical Transport NetworkOptical Transport Network
Optical Transport Network
 
5G physical layer
5G physical layer 5G physical layer
5G physical layer
 
5G Technology Tutorial
5G Technology Tutorial5G Technology Tutorial
5G Technology Tutorial
 
FDM,OFDM,OFDMA,MIMO
FDM,OFDM,OFDMA,MIMOFDM,OFDM,OFDMA,MIMO
FDM,OFDM,OFDMA,MIMO
 
5G Interview Questions: 50 Questions on Spectrum
5G Interview Questions: 50 Questions on Spectrum5G Interview Questions: 50 Questions on Spectrum
5G Interview Questions: 50 Questions on Spectrum
 
Cognitive Radio, Introduction and Main Issues
Cognitive Radio, Introduction and Main IssuesCognitive Radio, Introduction and Main Issues
Cognitive Radio, Introduction and Main Issues
 

Similaire à URLLC for 5G and Beyond: Physical, MAC, and Network Solutions

Performance Analysis of Resource Allocation in 5G & Beyond 5G using AI
Performance Analysis of Resource Allocation in 5G & Beyond 5G using AIPerformance Analysis of Resource Allocation in 5G & Beyond 5G using AI
Performance Analysis of Resource Allocation in 5G & Beyond 5G using AIIRJET Journal
 
6G Technology.pdf
6G Technology.pdf6G Technology.pdf
6G Technology.pdfApril Smith
 
Hsing cuhk talk wireless 5_g_why-how-what_mar 31 2014
Hsing cuhk talk wireless 5_g_why-how-what_mar 31 2014Hsing cuhk talk wireless 5_g_why-how-what_mar 31 2014
Hsing cuhk talk wireless 5_g_why-how-what_mar 31 2014HarshitParkar6677
 
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...IJCSIS Research Publications
 
56_5G Wireless Communication Network Architecture and Its Key Enabling Techno...
56_5G Wireless Communication Network Architecture and Its Key Enabling Techno...56_5G Wireless Communication Network Architecture and Its Key Enabling Techno...
56_5G Wireless Communication Network Architecture and Its Key Enabling Techno...EdisonAndresZapataOc
 
5G NETWORK AND INTERNET OF THINGS doc
5G NETWORK AND INTERNET OF THINGS doc5G NETWORK AND INTERNET OF THINGS doc
5G NETWORK AND INTERNET OF THINGS docBhadra Gowdra
 
[email protected]Received December 4, 2019, accepted Janua
[email protected]Received December 4, 2019, accepted Janua[email protected]Received December 4, 2019, accepted Janua
[email protected]Received December 4, 2019, accepted JanuaTatianaMajor22
 
A REVIEW PAPER ON 5G NETWORK.pdf
A REVIEW PAPER ON 5G NETWORK.pdfA REVIEW PAPER ON 5G NETWORK.pdf
A REVIEW PAPER ON 5G NETWORK.pdfAddison Coleman
 
Nanotechnology in 5G Wireless Communication Network: An Approach
Nanotechnology in 5G Wireless Communication Network: An ApproachNanotechnology in 5G Wireless Communication Network: An Approach
Nanotechnology in 5G Wireless Communication Network: An ApproachIRJET Journal
 
Sustainability, the all fiber future
Sustainability, the all fiber futureSustainability, the all fiber future
Sustainability, the all fiber futureMelanie Brandt
 
Optimization Technologies for Low-Bandwidth Networks
Optimization Technologies for Low-Bandwidth NetworksOptimization Technologies for Low-Bandwidth Networks
Optimization Technologies for Low-Bandwidth NetworksIOSR Journals
 
Key Enabling Technologies of 5G Wireless Mobile Communication.pdf
Key Enabling Technologies of 5G Wireless Mobile Communication.pdfKey Enabling Technologies of 5G Wireless Mobile Communication.pdf
Key Enabling Technologies of 5G Wireless Mobile Communication.pdfYAAKOVSOLOMON1
 
Security_for_5G_Mobile_Wireless_Networks (1).pdf
Security_for_5G_Mobile_Wireless_Networks (1).pdfSecurity_for_5G_Mobile_Wireless_Networks (1).pdf
Security_for_5G_Mobile_Wireless_Networks (1).pdf4nm18is123SunidhiSir
 
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network SecuritySECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network SecurityIRJET Journal
 
Defining Future 5G Networks - All Slides
Defining Future 5G Networks - All SlidesDefining Future 5G Networks - All Slides
Defining Future 5G Networks - All SlidesDigital Catapult
 

Similaire à URLLC for 5G and Beyond: Physical, MAC, and Network Solutions (20)

Performance Analysis of Resource Allocation in 5G & Beyond 5G using AI
Performance Analysis of Resource Allocation in 5G & Beyond 5G using AIPerformance Analysis of Resource Allocation in 5G & Beyond 5G using AI
Performance Analysis of Resource Allocation in 5G & Beyond 5G using AI
 
6G Technology.pdf
6G Technology.pdf6G Technology.pdf
6G Technology.pdf
 
6G Technology
6G Technology6G Technology
6G Technology
 
5G Research Cooperation?, Knud Erik Skouby, Aaborg University
5G Research Cooperation?, Knud Erik Skouby, Aaborg University5G Research Cooperation?, Knud Erik Skouby, Aaborg University
5G Research Cooperation?, Knud Erik Skouby, Aaborg University
 
Stuart Revelle, 5GIC - INCA Full Fibre & 5G Seminar 12/7/17
Stuart Revelle, 5GIC - INCA Full Fibre & 5G Seminar 12/7/17Stuart Revelle, 5GIC - INCA Full Fibre & 5G Seminar 12/7/17
Stuart Revelle, 5GIC - INCA Full Fibre & 5G Seminar 12/7/17
 
Hsing cuhk talk wireless 5_g_why-how-what_mar 31 2014
Hsing cuhk talk wireless 5_g_why-how-what_mar 31 2014Hsing cuhk talk wireless 5_g_why-how-what_mar 31 2014
Hsing cuhk talk wireless 5_g_why-how-what_mar 31 2014
 
Ijsrp p10274
Ijsrp p10274Ijsrp p10274
Ijsrp p10274
 
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
 
56_5G Wireless Communication Network Architecture and Its Key Enabling Techno...
56_5G Wireless Communication Network Architecture and Its Key Enabling Techno...56_5G Wireless Communication Network Architecture and Its Key Enabling Techno...
56_5G Wireless Communication Network Architecture and Its Key Enabling Techno...
 
5G NETWORK AND INTERNET OF THINGS doc
5G NETWORK AND INTERNET OF THINGS doc5G NETWORK AND INTERNET OF THINGS doc
5G NETWORK AND INTERNET OF THINGS doc
 
[email protected]Received December 4, 2019, accepted Janua
[email protected]Received December 4, 2019, accepted Janua[email protected]Received December 4, 2019, accepted Janua
[email protected]Received December 4, 2019, accepted Janua
 
A REVIEW PAPER ON 5G NETWORK.pdf
A REVIEW PAPER ON 5G NETWORK.pdfA REVIEW PAPER ON 5G NETWORK.pdf
A REVIEW PAPER ON 5G NETWORK.pdf
 
Nanotechnology in 5G Wireless Communication Network: An Approach
Nanotechnology in 5G Wireless Communication Network: An ApproachNanotechnology in 5G Wireless Communication Network: An Approach
Nanotechnology in 5G Wireless Communication Network: An Approach
 
Sustainability, the all fiber future
Sustainability, the all fiber futureSustainability, the all fiber future
Sustainability, the all fiber future
 
Optimization Technologies for Low-Bandwidth Networks
Optimization Technologies for Low-Bandwidth NetworksOptimization Technologies for Low-Bandwidth Networks
Optimization Technologies for Low-Bandwidth Networks
 
C010130917
C010130917C010130917
C010130917
 
Key Enabling Technologies of 5G Wireless Mobile Communication.pdf
Key Enabling Technologies of 5G Wireless Mobile Communication.pdfKey Enabling Technologies of 5G Wireless Mobile Communication.pdf
Key Enabling Technologies of 5G Wireless Mobile Communication.pdf
 
Security_for_5G_Mobile_Wireless_Networks (1).pdf
Security_for_5G_Mobile_Wireless_Networks (1).pdfSecurity_for_5G_Mobile_Wireless_Networks (1).pdf
Security_for_5G_Mobile_Wireless_Networks (1).pdf
 
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network SecuritySECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
 
Defining Future 5G Networks - All Slides
Defining Future 5G Networks - All SlidesDefining Future 5G Networks - All Slides
Defining Future 5G Networks - All Slides
 

Dernier

Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 

Dernier (20)

Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 

URLLC for 5G and Beyond: Physical, MAC, and Network Solutions

  • 1. Page 1The University of Sydney URLLC for 5G and Beyond: Physical, MAC and Network Solutions 2020 IEEE WCNC Tutorial Yonghui Li Mahyar Shirvanimoghaddam Rana Abbas Changyang She Centre of IoT and Telecommunications School of Electrical and Information Engineering Faculty of Engineering and Information Technologies *A modified version of this tutorial was presented at IEEE Globecom, Kona, Hawaii, USA Dec 2019
  • 2. Page 2The University of Sydney About Us
  • 3. Page 3The University of Sydney University of Sydney Australia's oldest university established in 1850, ranked 36th in World University Rankings by the Times higher Education Supplement (UK)
  • 4. Page 4The University of Sydney University of Sydney Breakthrough Innovations Ultrasound scanner, George Kossof Artificial Heart Pacemaker, Edgar Booth Ventilator Cochlear, Graeme Clark Aircraft black box WI-FI ...
  • 5. Page 5The University of Sydney Centre of IoT and Telecommunications – A world renown and largest Research Centre in Australia in Telecommunications – Mission: provide innovative solutions to the telecommunication industry – R&D team: – 7 Academic staff (3 IEEE Fellows) – 6 Research Fellow – More than 40 PG students – Areas: 5G, uRLLC, Networks, Industrial Internet of Things, Signal processing, Wireless Networked Control, AI in Wireless Communications – Activities: Research, product development, system design and industry consultancy – Publications: >200 IEEE journal papers in the past five years
  • 6. Page 6The University of Sydney Centre of IoT and Telecommunications Over 40 industry projects, more than $20million Design of last mile and home area networks for $500 million Australian Smart Grid Smart City project Participate in 7-years’ $100million SmartSat CRC project Contributions to the IEEE Standard (802.X) Soft output detection and decoding used in 2G, 3G and 4G base stations and terminals Adaptive CDMA receivers used in 3G cellular systems Soft frequency reuse has been adopted by 3GPP standard Patents: 15 (wireless system architecture, solutions, protocols, core technology)
  • 7. Page 7The University of Sydney Presenters Dr. Mahyar Shirvanimoghaddam Dr. Rana Abbas Dr. Changyang SheProf. Yonghui Li
  • 8. Page 8The University of Sydney Introduction to URLLC & Timeliness Professor Yonghui Li
  • 9. Page 9The University of Sydney Introduction to URLLC& Timeliness → 5G: From H2H to M2M What is URLLC? Why do we need URLLC? Latency and Reliability Components How do we achieve URLLC?
  • 10. Page 10The University of Sydney G. Fettweis and S. Alamouti, “5G: Personal mobile internet beyond: What cellular did to telephony,” IEEE Communications Magazine, February 2014. Kumar, Liu, Sengupta and Divya, “Evolution of Mobile Wireless communication Networks: 1G to 4G,” IJECT, December 2010. 4GAmericas.org, “Infographic: Mobile Broadband Connected Future,” White, “Tablets trump smartphones in global website traffic” Adobe Digital Marketing blog, March 6, 2013. Meeker and Wu, “Internet Trends 2013” kpcb.com. Ericsson Consumer Insight Summary Report, June 2013 Cellular Network Development Wireless Moore’s Law
  • 11. Page 11The University of Sydney 5G Paradigm Shift: From H2H to IoT M2M Communications
  • 12. Page 12The University of Sydney M2M is Everywhere
  • 13. Page 13The University of Sydney https://www.accenture.com/t00010101t000000z__w__/it-it/_acnmedia/pdf-5/accenture-industrial-internet-of-things-positioning-paper-report-2015.pdf Industrial Internet of Things (IIoT)
  • 14. Page 14The University of Sydney What is M2M ? M2M = Sensors + Connectivity + Intelligence Machine – To – Machine (M2M) means no human intervention whilst devices are communicating end-to-end. • Support of a huge amount of nodes, sending small data each • Mission-critical data provision • Autonomous operation • Self-organization • Power efficiency • Reliability • etc. This assumes some fundamental M2M system characteristics:
  • 15. Page 15The University of Sydney Introduction to URLLC& Timeliness ✔ 5G: From H2H to M2M → What is URLLC? Why do we need URLLC? Latency and Reliability Components How do we achieve URLLC?
  • 16. Page 16The University of Sydney IIoT Communication Network Requirements Image Source: G Empowering vertical industries. White Paper, 2016, https://5g-ppp.eu/wp-content/uploads/2016/02/BROCHURE_5PPP_BAT2_PL.pdf • High range of reliability from medium to ultrahigh, PER 10-3 to 10-9 • High capacity • High range of data rates, 1kbps to 10Gbps • High range of latencies from 200ns to 1000s • Low cost - $1 hardware, $1/year connectivity • Flexible access • High range of the number of nodes, from 100 to 1 million per cell • Long battery life >10 years • Message prioritisation • Internet protocol (IP) • Standard-based • Ubiquitous coverage • High security • Fast configuration • No current network meeting these requirements!
  • 17. Page 17The University of Sydney 5G Technical Requirements Image Source: 5G Americas – 1000 times higher mobile data capacity per cell – 100 times higher typical user data rate – 100 times higher number of connected devices – 10 times longer battery life for low power M2MC – 10 times reduced latency
  • 18. Page 18The University of Sydney URLLC for Mission Critical IoT Ultralow latency <1ms air link; <10ms E2E Ultra reliable networks No wireless standard available Image Source: LoRa Alliance
  • 19. Page 19The University of Sydney Industrial Network Requirements – Ultra-low latency – Link level latency <1ms vs 100ms in 4G – Ultra-high reliability – Packet error rate < 10-9 vs 10-2 in 4G – Determinism – Criticality – Scalability Image Source: https://www.roboticsbusinessreview.com/sme-building-a-smart-factory-with-ai-and-robotics/
  • 20. Page 20The University of Sydney Image Source: https://andersontech.com/three-critical-reasons-choose-wired-network-small-business/ Wireless vs Wired Networks for IoT – Currently wired networks are dominant – Trends towards wireless due to – lower installation cost – lower maintenance – easier redundancy – higher flexibility – enable mobile applications – even higher long-term reliability
  • 21. Page 21The University of Sydney Introduction to URLLC & Timeliness ✔ 5G: From H2H to M2M ✔ What is URLLC? → Why do we need URLLC? Latency and Reliability Components How do we achieve URLLC?
  • 22. Page 22The University of Sydney Why do we need URLLC? – Industry Automation URLLC is one of the enabling technologies in Industry 4.0 – Industrial control is automated by deploying networks in factories which are traditionally wired. – End-to-end latency lower than 0.5 ms and an exceedingly high reliability with BLER of 10–9 should be supported. Industrial Automation
  • 23. Page 23The University of Sydney IoT in Industrial Automation – Current industrial robots form a closed system of manipulators and controllers – They are connected via wired networks – Expensive set-up – New architecture (fog and roof) enables their separation – High performance wireless networks enable their connectivity – Controllers located in general purpose computers
  • 24. Page 24The University of Sydney Wireless Networked Control – Enabling mobile robotics – Enabling a pool of controllers – Enabling High-Precision Robotic Arms
  • 25. Page 25The University of Sydney Why do we need URLLC ? – Automated driving – Road safety – Traffic efficiency services – The typical use cases of this application are automated overtake, cooperative collision avoidance and high-density platooning, which require an end-to-end latency of 5–10 ms and a BLER down to10–5 [S-2].Fully connected vehicles can be enabled with URLLC Image Source: Wikipedia Intelligent Transportation Systems
  • 26. Page 26The University of Sydney Why do we need URLLC? – Remote surgical consultations: – Can occur during complex life-saving procedures after serious accidents with the patient having a health emergency that cannot wait for transporting to a hospital. – First-responders at an accident venue may need to connect to surgeons in a hospital to get advice and guidance to conduct complex medical operations. – Remote surgery: – The entire treatment procedure of patients is executed by a surgeon at a remote site, where hands are replaced by robotic arms. Example of remote surgery with robotic arms Image Source: BMC Biomedical Engineering Telesurgery
  • 27. Page 27The University of Sydney URLLC Applications, Requirements & Markets Lema, Maria A., et al. "Business case and technology analysis for 5G low latency applications." IEEE Access 5 (2017): 5917-5935.
  • 28. Page 28The University of Sydney Why do we need URLLC? What levels of latency and reliability do we need? [S-2] Chen, He, et al. "Ultra-reliable low latency cellular networks: Use cases, challenges and approaches." IEEE Communications Magazine 56.12 (2018): 119-125. https://doi.org/10.1109/MCOM.2018.1701178
  • 29. Page 29The University of Sydney Introduction to URLLC& Timeliness ✔ 5G: From H2H to M2M ✔ What is URLLC? ✔ Why do we need URLLC? → Latency and Reliability Components How do we achieve URLLC?
  • 30. Page 30The University of Sydney Reliability in URLLC What kind of reliability are we after? • Reliability is defined as the probability that the latency does not exceed a predetermined deadline (1 – Pe) • Pe is the probability of a packet drop/packet error = the probability that the latency exceeds a predetermined deadline • The exact deadline and the reliability level are application-dependent. Popovski, P., Nielsen, J.J., Stefanovic, C., De Carvalho, E., Strom, E., Trillingsgaard, K.F., Bana, A.S., Kim, D.M., Kotaba, R., Park, J. and Sorensen, R.B., 2018. Wireless access for ultra-reliable low-latency communication: Principles and building blocks. Ieee Network, 32(2), pp.16-23.
  • 31. Page 31The University of Sydney Latency in URLLC Latency Components
  • 32. Page 32The University of Sydney Latency in URLLC Latency in Wireless Networks
  • 33. Page 33The University of Sydney Latency in URLLC – Fundamental trade-offs between capacity, coverage, latency, reliability and spectral efficiency…. – One metric is optimized for improvement à degradation of another metric – High capacity needs large control overhead (e.g., cyclic prefix, transmission mode, and pilot symbols); this makes the portion of overhead unacceptably high in shorter TTI. – In LTE, packet retransmission takes around 8ms, and removal of retransmission will affect packet error significantly. Constraints for achieving low latency
  • 34. Page 34The University of Sydney Introduction to URLLC& Timeliness ✔ 5G: From H2H to M2M ✔ What is URLLC? ✔ Why do we need URLLC? ✔ Latency and Reliability Components → How do we achieve URLLC?
  • 35. Page 35The University of Sydney URLLC PHY Theoretical Bounds Channel code candidates Potential of Fountain Codes Advanced Ordered Statistic Decoding Scheme MAC Grant-Based Orthogonal Access Non-Orthogonal Access (NOMA) Grant-Free Access Cross-Layer Design Network Network Availability Multi-connectivity in Terrestrial Communications Mobile-Edge Computing Systems Deep Learning for Network Management
  • 36. Page 36The University of Sydney PHY Theoretical Bounds Channel code candidates Potential of Fountain Codes Advanced Ordered Statistic Decoding Scheme • Revisit the Shannon Bound • Normal Approximation • Turbo Codes • Convolutional Codes • BCH Codes • LDPC Codes • Polar Codes • Approach near MLD Performance • Reduced Complexity • Reduced Decoding Latency How do we address URLLC at the Physical Layer (PHY)? • Motivation for Rateless Codes • Rateless Code Design for Short Block lengths • Rateless Code Performance
  • 37. Page 37The University of Sydney Fundamental Limit of Finite Block Length – Existing systems are designed to efficiently transmit long data packets – Several thousands of channel uses – Moderately low packet-error rates (around 0.01) – Relevant for current mobile broadband services – Shannon proved that a communication link can achieve zero probability of error if the code is long enough, as long as the data rate is below the channel capacity – Most of the recent advances in the design of high-speed wireless systems are based on the Shannon formula
  • 38. Page 38The University of Sydney – URLLC is usually characterised by short packet communications (~100s bits in a packet) and stringent packet-error requirement (e.g., 10^-9) – Errors cannot be avoided even the transmission rate is below the Shannon Capacity. Shannon bound is no longer accurate! – Polyanskiy-Verdu-Poor Bound: – The existing analyses, designs, optimisations based on Shannon bound should be re-visited or re-formulated. – Develop fundamental trade-offs between capacity, latency and reliability for single and multi-user scenarios. – New trade-offs require different designs of many communication algorithms and protocols Fundamental Limit of Finite Block Length
  • 39. Page 39The University of Sydney – Low latency goal prohibits long Shannon capacity approaching codes – Fundamental capacity bound defined by Polyanskiy for limited length codes – Conventional capacity approaching codes, such as LDPC and turbo codes, do not perform well in the short block length regime – The conventional short codes, such as BCH and convolutional codes are too complex for decoding – The decoding is the dominant part of receiver processing delay – Design of high performance and low complexity decoding is required – Each retransmissions introduces 8ms delay in LTE – How to design the techniques which can avoid retransmissions Short Code Design for reducing TTI
  • 40. Page 40The University of Sydney Codes with Diversity – For short codes, achieving a high reliability requires very high SNR, which is not feasible for IoT devices with only limited transmission power. – To reduce the SNR requirements, diversity techniques are needed. – Time diversity is not appropriate as it increases latency. – How to design space frequency codes to achieve the spatial and frequency diversity? – How to explore multi-connectivity diversity in wireless networks?
  • 41. Page 41The University of Sydney MAC Grant-Based Orthogonal Access Techniques Non-Orthogonal Access (NOMA) Grant-Free Access Cross-Layer Design • Why can’t 4G support URLLC ? • Why can’t 5G support massive URLLC? • Information theoretic bounds • Existing NOMA schemes • Queueing Delay • Effective Bandwidth • Packet Dropping How do we address URLLC at the Medium Access Control Layer (MAC)? • Motivation for Grant- Free Access • Performance analysis • Different transmission schemes for Grant-Free NOMA • Deep Learning Approach for Grant- Free NOMA
  • 42. Page 42The University of Sydney Resource reservation for uRLLC Problem and challenge In the request contention period, uRLLC needs to compete with other services, leading to uncertain access delay; In the joint scheduling among uRLLC and other services, uRLCC need to be served immediately, which would interrupt ongoing transmission of other services. Solution reserve resources for uRLLC to ensure its immediate transmission – trade-off between latency and reserved resources
  • 43. Page 43The University of Sydney Grant-free access for reducing access delay • Grant acquisition and random access procedures in current standards are two major sources of delay • BS needs to first identify the users through contention-based random access. Key problems: severe collisions and high latencies when the number of users increases • In grant-free multiple access, users encode their IDs and data together and transmit them directly without grant acquisition. This eliminates the contention and random access phase, significantly reducing the latency, at the expense of larger interference. Signals from multiple users are superimposed and successive interference cancellation (SIC) is used at the receiver to decode the messages
  • 44. Page 44The University of Sydney Network Network Availability Multi- connectivity Mobile-Edge Computing Systems Deep Learning for Network Management • Definitions • Improving Network Availability • Terrestrial Communications • Air-to-Ground and Ground-to-Air Communications • Summary of our recent results • Motivation of using deep learning in URLLC • Examples How do we address URLLC at the Network Layer ? • Analysis of the computing delay using short packets • Optimisation of user association, computing offloading, and radio Cross-Layer Design
  • 45. Page 45The University of Sydney Edge computing for reducing backhaul latency • To reduce backhaul latency, computation and content resources should be moved from cloud to the edge – VR, AR, Vehicular networks (driving, urban sensing, content distribution, mobile advertising and intelligent transportation); • Proximal users are allowed to communicate directly; cloud P. Mach and Z. Becvar, "Mobile Edge Computing: A Survey on Architecture and Computation Offloading," in IEEE Communications Surveys & Tutorials, 19(3), 2017.
  • 46. The University of Sydney Channel Coding Techniques for URLLC Dr. Mahyar Shirvanimoghaddam
  • 47. Page 47The University of Sydney Channel Coding Techniques for URLLC → Performance metric: Reliability and flexibility Channel code candidates Comparison of Channel Codes Advanced Ordered Statistic Decoder Short Analog Fountain Codes
  • 48. Page 48The University of Sydney – Reliability is defined as the success probability of transmitting K information bits within the desired user plane latency at a certain channel quality. – Sources of failure from a higher layer perspective are when the packet is lost, or it is received late, or it has residual errors. – It is essential to maximize the reliability of every packet in order to minimize the error rate, so as to minimize the number of retransmissions. – To provide a high level of reliability, a channel code with low code rates is generally used. Reliability [S-3] M. Shirvanimoghaddam et al., "Short Block-Length Codes for Ultra-Reliable Low Latency Communications," in IEEE Communications Magazine, vol. 57, no. 2, pp. 130-137, February 2019. https://doi.org/10.1109/MCOM.2018.1800181
  • 49. Page 49The University of Sydney – Bit-level granularity of the codeword size and code operating rate is desired for URLLC. – The actual coding rate used in transmission could not be restricted and optimized for specified ranges. – The channel codes therefore need to be flexible to enable hybrid automatic repeat request (HARQ). – The number of retransmissions, however, needs to be kept as low as possible to minimize latency Flexibility [S-3] M. Shirvanimoghaddam et al., "Short Block-Length Codes for Ultra-Reliable Low Latency Communications," in IEEE Communications Magazine, vol. 57, no. 2, pp. 130-137, February 2019. https://doi.org/10.1109/MCOM.2018.1800181
  • 50. Page 50The University of Sydney – There are two effects that should be distinguished here to better understand the code design problem for short blocks. – The first one is the gap to Shannon’s limit If we decrease the block length, the coding gain will be reduced and the gap to Shannon’s limit will increase. This is not a problem of code design but is mainly due to the reduction in channel observations that comes with finite block lengths. Performance Benchmark [S-3] M. Shirvanimoghaddam et al., "Short Block-Length Codes for Ultra-Reliable Low Latency Communications," in IEEE Communications Magazine, vol. 57, no. 2, pp. 130-137, February 2019. https://doi.org/10.1109/MCOM.2018.1800181
  • 51. Page 51The University of Sydney We will use the normal approximation (NA) that incorporates the reduction in channel observations, as the performance benchmark for comparison. C is the channel capacity (a function of SNR) V is the channel distortion (a function of block length and SNR) n is the block length Pe is the error rate Performance Benchmark: Normal Approximation [S-3] M. Shirvanimoghaddam et al., "Short Block-Length Codes for Ultra-Reliable Low Latency Communications," in IEEE Communications Magazine, vol. 57, no. 2, pp. 130-137, February 2019. https://doi.org/10.1109/MCOM.2018.1800181 Y. Polyanskiy, H. V. Poor and S. Verdu, "Channel Coding Rate in the Finite Blocklength Regime," in IEEE Transactions on Information Theory, vol. 56, no. 5, pp. 2307-2359, May 2010.
  • 52. Page 52The University of Sydney Performance Benchmark: Normal Approximation for BI-AWGN T. Erseghe, "Coding in the Finite-Blocklength Regime: Bounds Based on Laplace Integrals and Their Asymptotic Approximations," in IEEE Transactions on Information Theory, vol. 62, no. 12, pp. 6854-6883, Dec. 2016.
  • 53. Page 53The University of Sydney – The second effect is the gap to the finite length bounds, that is if we decrease the block length, modern codes, such as LDPC or Turbo codes, show a gap to finite length bounds. – This is often due to the suboptimal decoding algorithms. Performance Benchmark [S-3] M. Shirvanimoghaddam et al., "Short Block-Length Codes for Ultra-Reliable Low Latency Communications," in IEEE Communications Magazine, vol. 57, no. 2, pp. 130-137, February 2019. https://doi.org/10.1109/MCOM.2018.1800181
  • 54. Page 54The University of Sydney Channel Coding Techniques for URLLC ✔ Performance metric: Reliability and flexibility → Channel code candidates Comparison of Channel Codes Advanced Ordered Statistic Decoder Short Analog Fountain Codes
  • 55. Page 55The University of Sydney – Bose, Chaudhuri, and Hocquenghem (BCH) codes are a class of powerful cyclic error-correcting codes that are constructed using polynomials over finite fields. – The main feature of BCH codes is that the number of guaranteed correctable symbols, t, is defined during the code design process. The minimum distance dmin of BCH codes is at least 2t + 1. – The decoding of BCH codes is usually done using a bounded distance decoder, like the Berlekamp-Massey algorithm, that can correct any combination of up to t symbol errors. – In order to increase the coding gain, in particular on noisy channels, one may use a soft-input decoder, such as ordered statistics decoder (OSD). BCH [S-3] M. Shirvanimoghaddam et al., "Short Block-Length Codes for Ultra-Reliable Low Latency Communications," in IEEE Communications Magazine, vol. 57, no. 2, pp. 130-137, February 2019. https://doi.org/10.1109/MCOM.2018.1800181 S. Lin, D. Costello, Error Control Coding: Fundamentals and Applications, Pearson-Prentice Hall, 2004.
  • 56. Page 56The University of Sydney Convolutional Codes • Convolutional codes (CC) were first introduced by Elias in 1955. • They differ from block codes as the encoder contains memory. [S-3] M. Shirvanimoghaddam et al., "Short Block-Length Codes for Ultra-Reliable Low Latency Communications," in IEEE Communications Magazine, vol. 57, no. 2, pp. 130-137, February 2019. https://doi.org/10.1109/MCOM.2018.1800181 S. Lin, D. Costello, Error Control Coding: Fundamentals and Applications, Pearson-Prentice Hall, 2004. • Generally, a rate R = k/n convolutional encoder with memory order m can be realized as a linear sequential circuit with input memory m, k inputs, and n outputs, where inputs remain in the encoder for m time units after entering. • Large minimum distances and low error probabilities for convolutional can be achieved by changing m.
  • 57. Page 57The University of Sydney Turbo Codes – In 1993, Berrou, Glavieux, and Thitimajshima introduced Turbo coding, which combines a parallel concatenation of two convolutional encoders and iterative maximum a-posteriori probability (MAP) decoding. – Turbo codes have been extensively used for the data channel in LTE. – For large blocks, Turbo codes are capable of performing within a few tenths of dB from Shannon’s limit. – Turbo codes with iterative decoding in short and moderate block lengths show a gap of more than 1 dB to the finite-length performance benchmark. – For Turbo codes, 1-bit granularity is feasible for all coding rates and for a full range of block sizes, and the ability of Turbo codes to support both Chase combining and incremental redundancy HARQ is well known.
  • 58. Page 58The University of Sydney LDPC Codes • Low-density parity-check (LDPC) codes were originally proposed by Gallager in the early 1960s and later rediscovered in the 1990s, when researchers began to investigate codes-on-graph based. • LDPC codes are now being used in WiFi and will be used for 5G eMBB. • The main benefit of LDPC codes is the low-complexity decoding algorithm which can be implemented using parallel processing. • They also closely approach the Shannon limit in large block lengths using iterative belief propagation decoder.
  • 59. Page 59The University of Sydney Polar Codes • Polar codes as introduced by Arikan are binary linear codes that can provably achieve the capacity of a binary-input discrete memoryless channel using low- complexity encoding and decoding as the code length tends to infinity. E. Arikan, "Channel Polarization: A Method for Constructing Capacity-Achieving Codes for Symmetric Binary-Input Memoryless Channels", IEEE Trans. Inf. Theory, vol. 55, no. 7, pp. 3051-73, July 2009. • Channel polarization is a central technique in the construction of these codes, in which the block code translates N independent and identical binary-input discrete memoryless channels into N synthesized channels with capacities either (close to) zero or one.’ • The message is only sent over the set of near-perfect channels, and the unreliable channels are unused; in practice, they are assigned constant inputs a priori known for both the encoder and decoder (frozen symbols).
  • 60. Page 60The University of Sydney Channel Coding Techniques for URLLC ✔ Performance metric: Reliability and flexibility ✔ Channel code candidates → Comparison of Channel Codes Advanced Ordered Statistic Decoder Short Analog Fountain Codes
  • 61. Page 61The University of Sydney Comparison [S-3] M. Shirvanimoghaddam et al., "Short Block-Length Codes for Ultra-Reliable Low Latency Communications," in IEEE Communications Magazine, vol. 57, no. 2, pp. 130-137, February 2019. https://doi.org/10.1109/MCOM.2018.1800181 Code Rate = ½ and Block length =128 Maximum Likelihood Decoding​
  • 62. Page 62The University of Sydney Comparison [S-3] M. Shirvanimoghaddam et al., "Short Block-Length Codes for Ultra-Reliable Low Latency Communications," in IEEE Communications Magazine, vol. 57, no. 2, pp. 130-137, February 2019. https://doi.org/10.1109/MCOM.2018.1800181 Code Rates = 1/3 (blue), 1/6 (red), and 1/12 (black)​ Information Block length = 40 and 128​ Practical Decoder
  • 63. Page 63The University of Sydney Comparison – Under maximum likelihood decoding, the BCH code outperforms all other existing codes owing to its better distance spectrum. – Other codes are mainly designed to provide good performance while maintaining the decoding complexity at a reasonable order. – Using practical decoders, Polar codes show very good performance with no error floor. – LPDC code suffer from error floor at short block lengths and Turbo codes perform well only at large block lengths. [S-3] M. Shirvanimoghaddam et al., "Short Block-Length Codes for Ultra-Reliable Low Latency Communications," in IEEE Communications Magazine, vol. 57, no. 2, pp. 130-137, February 2019. https://doi.org/10.1109/MCOM.2018.1800181
  • 64. Page 64The University of Sydney Comparison Rate performance of different candidate codes at a BLER of 10–4 when the codeword length is N = 128. [S-3] M. Shirvanimoghaddam et al., "Short Block-Length Codes for Ultra-Reliable Low Latency Communications," in IEEE Communications Magazine, vol. 57, no. 2, pp. 130-137, February 2019. https://doi.org/10.1109/MCOM.2018.1800181
  • 65. Page 65The University of Sydney Channel Coding Techniques for URLLC ✔ Performance metric: Reliability and flexibility ✔ Channel code candidates ✔ Comparison of Channel Codes → Advanced Ordered Statistic Decoder Short Analog Fountain Codes
  • 66. Page 66The University of Sydney Segmentation-Discarding Algorithm – Pre-processing – Reprocessing Preprocessing 𝐫 = 𝐬 + 𝐧 AWGN channel output abs Reliabilities 𝛂 = 𝐫 Permutation 𝜋1 & Permutation 𝜋2 ෨𝐆 = 𝜋1(𝜋2(𝐆)) ෤𝐫 = π1(π2(𝐫)) ෥𝛂 = 𝜋1(𝜋2(𝛂)) Reprocessing MRB positions Calculate distance 𝒟 𝑒, and update the minimum distance 𝒟 𝑚𝑖𝑛. Output corresponding estimation. ෤𝐲 ෤𝐲 𝐵 Re-encoding ෤𝐜 𝑒 = ෤𝐲 𝐵 ⊕ 𝐞 ෨𝐆 TEP s ෤𝐜 𝑒 ෤𝐫, 𝒟 𝑚𝑖𝑛 Ƹ𝐜 𝑜𝑝𝑡 Estimated codeword OSD algorithm [6] First K positions: Most Reliable Basis (MRB) [P-7] C. Yue, M. Shirvanimoghaddam, Y. Li and B. Vucetic, . "Segmentation-Discarding Ordered-Statistic Decoding for Linear Block Codes." IEEE Global Communication Conference, Kona, HI, 2019 https://arxiv.org/abs/1901.02603
  • 67. Page 67The University of Sydney Segmentation-Discarding Algorithm Segmentation-Discarding Algorithm (SDA) 67 – All the weight-𝑙 TEPs are cut into several segments in 𝑙-th order decoding. – Some least reliable segments are discarded according to a discarding rule. – Complexity is significantly reduced. Segmentation-Discarding Algorithm 𝐫 = 𝐬 + 𝐧 AWGN channel output Preprocessing ෨𝐆, ෤𝐫 0-reprocessing (Hard-decision) 𝑙-reprocessing 𝑙 = 1: 𝑚 (stopping rule) ෤𝐲, ෤𝐫 Ƹ𝐜 𝑜𝑝𝑡 Estimated codeword Producing 𝑙-TEPs TEPs Segmentation Discarding 𝒟 𝑚𝑖𝑛 𝒟 𝑚𝑖𝑛...෥𝛂 ... 𝑆𝑙1 𝑆𝑙 𝑄 𝑆𝑙1 𝑆𝑙 𝑖 𝑄: maximum segments number 𝑆𝑙 𝑖 : the 𝑖-th TEP segment in 𝑙-reprocessing [P-7] C. Yue, M. Shirvanimoghaddam, Y. Li and B. Vucetic, . "Segmentation-Discarding Ordered-Statistic Decoding for Linear Block Codes." IEEE Global Communication Conference, Kona, HI, 2019 https://arxiv.org/abs/1901.02603 for an order d OSD algorithm one need to generate O(kd) test error patterns.
  • 68. Page 68The University of Sydney Segmentation and Discarding Rules Discarding Rule 68 – Decoding scheme combining segmentation and discarding – Light-colored blocks represent the segments that are discarded – Dark-colored segments are retained [P-7] C. Yue, M. Shirvanimoghaddam, Y. Li and B. Vucetic, . "Segmentation-Discarding Ordered-Statistic Decoding for Linear Block Codes." IEEE Global Communication Conference, Kona, HI, 2019 https://arxiv.org/abs/1901.02603
  • 69. Page 69The University of Sydney Performance and Complexity Comparison 69 Performance comparison in decoding (128,64,22) eBCH code (code rate 0.5) [P-7] C. Yue, M. Shirvanimoghaddam, Y. Li and B. Vucetic, . "Segmentation-Discarding Ordered-Statistic Decoding for Linear Block Codes." IEEE Global Communication Conference, Kona, HI, 2019 https://arxiv.org/abs/1901.02603 M. P. C. Fossorier and S. Lin, “Soft-decision decoding of linear block codes based on ordered statistics,” IEEE Transactions on Information Theory, vol. 41, no. 5, pp. 1379–1396, Sep 1995. J. Van Wonterghem, A. Alloum, J. J Boutros, and M. Moeneclaey, “On performance and complexity of OSD for short error correcting codes in 5G-NR,” 06 2017.
  • 70. Page 70The University of Sydney Performance and Complexity Comparison Performance comparison in decoding (128,22,48) eBCH code (code rate 0.17) [P-7] C. Yue, M. Shirvanimoghaddam, Y. Li and B. Vucetic, . "Segmentation-Discarding Ordered-Statistic Decoding for Linear Block Codes." IEEE Global Communication Conference, Kona, HI, 2019 https://arxiv.org/abs/1901.02603 M. P. C. Fossorier and S. Lin, “Soft-decision decoding of linear block codes based on ordered statistics,” IEEE Transactions on Information Theory, vol. 41, no. 5, pp. 1379–1396, Sep 1995. J. Van Wonterghem, A. Alloum, J. J Boutros, and M. Moeneclaey, “On performance and complexity of OSD for short error correcting codes in 5G-NR,” 06 2017.
  • 71. Page 71The University of Sydney Reduced Complexity OSD algorithm – The complexity of OSD can be further reduced by utilizing efficient techniques. – In our latest work recently submitted to IEEE Transaction on Information Theory, we fully analyzed the OSD decoder and devised several low complexity alternatives based on sufficient and necessary conditions. – The paper can be found on Arxiv C. Yue, M. Shirvanimoghaddam, Y. Li and B. Vucetic, A Revisit to Ordered Statistic Decoding: Distance Distribution and Decoding Rules https://arxiv.org/abs/2004.04913
  • 72. Page 72The University of Sydney Comparison: Complexity vs. Performance [S-3] M. Shirvanimoghaddam et al., "Short Block-Length Codes for Ultra-Reliable Low Latency Communications," in IEEE Communications Magazine, vol. 57, no. 2, pp. 130-137, February 2019. https://doi.org/10.1109/MCOM.2018.1800181
  • 73. Page 73The University of Sydney Channel Coding Techniques for URLLC ✔ Performance metric: Reliability and flexibility ✔ Channel code candidates ✔ Comparison of Channel Codes ✔ Advanced Ordered Statistic Decoder → Short Analog Fountain Codes
  • 74. Page 74The University of Sydney Short Analog Fountain Codes – In conventional wireless communication, the transmitter is fed back some indicator of its channel state such that it can choose the best modulation and coding scheme. – For asymptotically long blocks, the overhead associated with this control information is negligible in comparison to the block length. This signaling is estimated to incur 5–8 ms latency which violates the low latency requirement of URLLC – The signaling overhead is estimated to be around 30–50% for payloads of length 200 symbols with 7–10 users, which is very costly and inefficient (even for mMTC). Motivation
  • 75. Page 75The University of Sydney Short Analog Fountain Codes – We propose a class of self-adaptive channel codes, that can transmit the required block length without any CSIT. – The coded symbols are sequentially transmitted until the receiver can successfully decode the information. A stop-feedback is sent to the transmitter to terminate the transmission. – Existing self-adaptive codes: – Luby Transform codes – Raptor codes – Protograph-based raptor like codes – Rate compatible modulation (RCM) – Strider codes – Analog fountain codes (AFC) Motivation Tailored for asymptotically long block lengths
  • 76. Page 76The University of Sydney Short Analog Fountain Codes Encoding Precoder BPSK S-AFC Encoder AWGN S-AFC Decoder Binary Decoder High-rate LDPC (~0.95), for long block lengths High-rate BCH (~0.95) – short block lengths Iterative belief propagation Belief propagation for LDPC Ordered Statistics Decoder for BCH Variable block length
  • 77. Page 77The University of Sydney Performance of AFC in the Asymptotic Block-Length Regime – AFC can achieve near capacity performance for asymptotically long blocks – The design of AFC is based on a degree d and a weight set W(set of real numbers) Near-Capacity Performance when k = 10,000 bits 𝑐 𝑛 𝑏1 𝑏 2 … 𝑏 𝑑 Set of chosen information symbols in each encoding stage is random! [P-6] M. Shirvanimoghaddam, Y. Li and B. Vucetic, "Near-Capacity Adaptive Analog Fountain Codes for Wireless Channels," in IEEE Communications Letters, vol. 17, no. 12, pp. 2241-2244, December 2013. https://doi.org/10.1109/LCOMM.2013.101813.131972
  • 78. Page 78The University of Sydney Performance of AFC in the Short Block-Length Regime Poor performance at low SNR in comparison to the Polyanskiy-Poor and Verdu Bound (Normal Approximation), k = 192 [P-1] R. Abbas, M. Shirvanimoghaddam, T. Huang, Y. Li and B. Vucetic, "Novel Design for Short Analog Fountain Codes," in IEEE Communications Letters, vol. 23, no. 8, pp. 1306-1309, Aug. 2019. https://doi.org/10.1109/LCOMM.2019.2910517
  • 79. Page 79The University of Sydney Design of Short AFC We propose a new weight set design based on two rules: - Power constraint - Distance constraint We want to maximize the minimum Euclidean distance of the constellation while ensuring the power constraint is met! [P-1] R. Abbas, M. Shirvanimoghaddam, T. Huang, Y. Li and B. Vucetic, "Novel Design for Short Analog Fountain Codes," in IEEE Communications Letters, vol. 23, no. 8, pp. 1306-1309, Aug. 2019. https://doi.org/10.1109/LCOMM.2019.2910517
  • 80. Page 80The University of Sydney Performance of Short AFC Much better performance in comparison to original AFC [P-1] R. Abbas, M. Shirvanimoghaddam, T. Huang, Y. Li and B. Vucetic, "Novel Design for Short Analog Fountain Codes," in IEEE Communications Letters, vol. 23, no. 8, pp. 1306-1309, Aug. 2019. https://doi.org/10.1109/LCOMM.2019.2910517
  • 81. Page 81The University of Sydney Performance of Short AFC Great tail distribution! [P-1] R. Abbas, M. Shirvanimoghaddam, T. Huang, Y. Li and B. Vucetic, "Novel Design for Short Analog Fountain Codes," in IEEE Communications Letters, vol. 23, no. 8, pp. 1306-1309, Aug. 2019. https://doi.org/10.1109/LCOMM.2019.2910517
  • 82. Page 82The University of Sydney Performance of Short AFC No error floors exhibited up to 10-7 [P-1] R. Abbas, M. Shirvanimoghaddam, T. Huang, Y. Li and B. Vucetic, "Novel Design for Short Analog Fountain Codes," in IEEE Communications Letters, vol. 23, no. 8, pp. 1306-1309, Aug. 2019. https://doi.org/10.1109/LCOMM.2019.2910517
  • 83. Page 83The University of Sydney Performance of Short AFC Orders of magnitude improvement for very short blocks [P-1] R. Abbas, M. Shirvanimoghaddam, T. Huang, Y. Li and B. Vucetic, "Novel Design for Short Analog Fountain Codes," in IEEE Communications Letters, vol. 23, no. 8, pp. 1306-1309, Aug. 2019. https://doi.org/10.1109/LCOMM.2019.2910517
  • 84. Page 84The University of Sydney Analog Fountain Codes Potentials: – Low complexity encoder and decoder – 1-bit granularity can be achieved for code rate and block length – A very suitable candidate for URLLC because of its excellent performance across SNRs at short block lengths – Eliminate the need for CSI feedback Challenges The precoder design Narrowing down the CDF for guaranteed reliability
  • 85. Page 85The University of Sydney Conclusion and future work 85 – Channel code for the URLLC has not been standardized yet. – Polar codes suffer from latency due to the SIC. – LDPC codes show error floor in low-to-moderate block lengths and gap to the NA in short blocks. – BCH codes suffer from high complexity OSD decoder Moving Forward: 1. Reducing complexity of OSD to enable real time BCH decoding to achieve the best error rate performance 2. Using analog fountain codes for autmatic adaptation to the channel, therefore reducing the latency.
  • 86. The University of Sydney Medium Access Control Layer for URLLC Dr. Rana Abbas
  • 87. The University of Sydney Medium Access Control Layer (MAC) Link Request/Establishment & Retransmissions
  • 88. The University of Sydney Medium Access Control Layer for URLLC → Why 4G MAC techniques cannot support massive URLLC 5G Approaches to Reducing Latency in Channel Access Motivation for Grant-Free NOMA & Key Challenges Performance Analysis of Massive Grant-Free NOMA Grant-Free NOMA with Rateless Codes Multi-Layer Grant-Free NOMA (Power and Code Domain) Deep Learning Approach for Grant-Free NOMA Conclusions and Future Directions
  • 89. The University of Sydney Why 4G cannot support Massive URLLC ? Existing systems are designed to efficiently transmit long data packets and few human users: – Several thousands of channel uses – Moderately low packet-error rates (around 0.01) – Control overhead is negligible to the size of the payload Current uplink transmissions based on multi-stage and heavy signaling have a tremendous impact on latency and reliability: – For asymptotically long blocks, the overhead associated with this control information is negligible in comparison to the block length. This signaling is estimated to incur 5–8 ms latency which violates the low latency requirement of URLLC – The signaling overhead is estimated to be around 30–50% for payloads of length 200 symbols with 7–10 users, which is very costly and inefficient (even for mMTC). Current LTE end-to-end latency is not guaranteed and ranges from 100 ms to a few seconds.
  • 90. The University of Sydney Medium Access Control Layer for URLLC ✔ Why 4G MAC techniques cannot support massive URLLC → 5G Approaches to Reducing Latency in Channel Access Motivation for Grant-Free NOMA & Key Challenges Performance Analysis of Massive Grant-Free NOMA Grant-Free NOMA with Rateless Codes Multi-Layer Grant-Free NOMA (Power and Code Domain) Deep Learning Approach for Grant-Free NOMA Conclusions and Future Directions
  • 91. The University of Sydney 1. Cat-M1 uses 6 Resource Blocks (RBs) with 12 tones per RB at 15 kHZ SCS; 2. Cat-NB1 uses 1 Resource Block (RB) with 12 tones with 12 tones per RB at 15 kHz SCS, single-tone option also available 5G New Radio Rel-15,16 Pre-configured/semi-persistent scheduling. – This is only suitable for predictable traffic patterns, but otherwise exhibits low efficiency. – It is also only suitable for the initial transmission (not for HARQ) For retransmissions (HARQ), – K-repetition – Proactive repetition Spectrum Flexibility (Subcarrier Spacing 15 kHz) Low Latency (TTI 0.125 ms) Instant Uplink Access
  • 92. The University of Sydney 5G New Radio Rel-15,16 : 2-Step Random Access Procedure https://www.5gamericas.org/wp-content/uploads/2020/01/5G-Evolution-3GPP-R16-R17-FINAL.pdf
  • 93. The University of Sydney Medium Access Control Layer for URLLC ✔ Why 4G MAC techniques cannot support massive URLLC ✔ 5G Approaches to Reducing Latency in Channel Access → Motivation for Grant-Free NOMA & Key Challenges Performance Analysis of Massive Grant-Free NOMA Grant-Free NOMA with Rateless Codes Multi-Layer Grant-Free NOMA (Power and Code Domain) Deep Learning Approach for Grant-Free NOMA Conclusions and Future Directions
  • 94. The University of Sydney Motivation for NOMA: Multiple Access Channel Capacity The traditional capacity region is valid when the block length T is close to 10,000 symbols and more!
  • 95. The University of Sydney Motivation for NOMA 95 The sub-optimality of orthogonal multiple access schemes increases with the decrease in block length and with the increase in the number of users! E. MolavianJazi and J. N. Laneman, "A Second-Order Achievable Rate Region for Gaussian Multi-Access Channels via a Central Limit Theorem for Functions," in IEEE Transactions on Information Theory, vol. 61, no. 12, pp. 6719-6733, Dec. 2015, doi: 10.1109/TIT.2015.2492547.
  • 96. The University of Sydney Study on NOMA for 5G-NR (Rel-16)* MA Signatures Bit-Level Processing Scrambling LCRS NCMA Interleaving IDMA IGMA Symbol-Level Processing Welch-Bound RSMA WCMA Complex-Valued MUSA Sparse Spread SCMA PDMA *3GPP TR 38.812 V16.0.0 (2018-12) [S-4] M.B. Shahab, R. Abbas, M. Shirvanimoghaddam, and S. J. Johnson. "Grant-free Non-orthogonal Multiple Access for IoT: A Survey." arXiv preprint arXiv:1910.06529 (2019). https://arxiv.org/abs/1910.06529, accepted to appear in IEEE Communications Surveys and Tutorials
  • 97. The University of Sydney Key Challenges for Grant-Free NOMA User detection/identification Collision avoidance/detection/resolution Low-complexity decoders for joint user decoding Load estimation for parameter tuning e.g. code rate Synchronisation
  • 98. The University of Sydney Medium Access Control Layer for URLLC ✔ Why 4G MAC techniques cannot support massive URLLC ✔ 5G Approaches to Reducing Latency in Channel Access ✔ Motivation for Grant-Free NOMA & Key Challenges → Performance Analysis of Massive Grant-Free NOMA Grant-Free NOMA with Rateless Codes Multi-Layer Grant-Free NOMA (Power and Code Domain) Deep Learning Approach for Grant-Free NOMA Conclusions and Future Directions
  • 99. The University of Sydney Grant-Free NOMA: Framework
  • 100. The University of Sydney Grant-Free NOMA: Transmission Scheme We have a set of 𝐿 orthogonal pilot sequences of length 𝑞 symbols, e.g., Zadoffchu, Golden codes, m-sequences, etc. We have a set of 𝐿 codebooks. Each device chooses a pilot uniformly at random and submits simultaneously with the remaining devices. The device that chose pilot sequence 𝑖 will use codebook 𝐶𝑖. A collision event is defined as the event of two or more devices choosing the same pilot.
  • 101. The University of Sydney Grant-Free NOMA: Detection & Decoding Scheme The AP performs cross-correlations to detect the transmitted pilot sequences and estimate the channel parameters for each codebook used. Let us assume for now that the AP knows which “layers” are in collision: In the literature, interference is treated as binary!
  • 102. The University of Sydney Aggregate Interference Power: PPP Approximation The number of collided devices is a truncated Poisson random variable. However, their aggregate power, for a given Ls, can be well- approximated by a PPP. For a PPP, the aggregate power follows a skewed truncated stable distribution. 102 Aggregate interference power for Lc = 200
  • 103. The University of Sydney Grant-Free NOMA: Case Studies Performance Metric Coding Scheme Decoding Scheme Outage Probability The probability that a device, which has not collided, is not successfully decoded in a given time slot. Fixed Rate Rate is fixed a priori and does not change (Fixed codeword lengths) Successive Joint Decoding Successively jointly decoding a subset of the users (strongest) while regarding the rest as interference. This persists until decoding is successful. Throughput The ratio of the number of successfully decoded information bits to the length of the transmitted codeword (M −q), averaged over all slots Rateless Rate is not fixed a priori and can adapt to network conditions e.g. load, channel quality, etc. Successive Interference Cancellation Successively decoding the strongest user while regarding the rest as interference
  • 104. The University of Sydney Case of Successive Joint Decoding
  • 105. The University of Sydney Comparison between Successive Joint Decoding & Successive Interference Cancellation
  • 106. The University of Sydney - Open loop power control performs poorly with GF-NOMA - The collision probability is the dominating factor of performance - Open loop power control requires prohibitively long preamble sequences (large number of contention transmit units) - Joint decoding is far more superior than SIC in throughput - We cannot hope to recover more than 3 users at a time with SIC (in practical scenarios) due to error propagation Key Take-aways
  • 107. The University of Sydney Medium Access Control Layer for URLLC ✔ Why 4G MAC techniques cannot support massive URLLC ✔ 5G Approaches to Reducing Latency in Channel Access ✔ Motivation for Grant-Free NOMA & Key Challenges ✔ Performance Analysis of Massive Grant-Free NOMA → Grant-Free NOMA with Rateless Codes Multi-Layer Grant-Free NOMA (Power and Code Domain) Deep Learning Approach for Grant-Free NOMA Conclusions and Future Directions
  • 108. The University of Sydney Overview of Rateless Codes In conventional wireless communication, the transmitter is fed back some indicator of its channel state such that it can choose the best modulation and coding scheme. For asymptotically long blocks, the overhead associated with this control information is negligible in comparison to the block length. This signaling is estimated to incur 5–8 ms latency which violates the low latency requirement of URLLC The signaling overhead is estimated to be around 30–50% for payloads of length 200 symbols with 7–10 users, which is very costly and inefficient (even for mMTC). Motivation
  • 109. The University of Sydney M. Shirvanimoghaddam, M. Dohler and S. J. Johnson, "Massive Non-Orthogonal Multiple Access for Cellular IoT: Potentials and Limitations," in IEEE Communications Magazine, vol. 55, no. 9, pp. 55-61, Sept. 2017. Grant-Free NOMA with Rateless Codes
  • 110. The University of Sydney Grant-Free NOMA with Rateless Codes The maximum arrival rate versus the initial backlog obtained from the weak and strong stability conditions for different Ms, when Ns = 20, W = 1 MHz, L = 1000 M. Shirvanimoghaddam, M. Condoluci, M. Dohler and S. J. Johnson, "On the Fundamental Limits of Random Non-Orthogonal Multiple Access in Cellular Massive IoT," in IEEE Journal on Selected Areas in Communications, vol. 35, no. 10, pp. 2238-2252, Oct. 2017.
  • 111. The University of Sydney Grant-Free NOMA with Rateless Codes
  • 112. The University of Sydney The maximum packet arrival rate versus the delay constraint under weak and strong stability conditions, when W = 1 MHz, L = 1000, and collision probability is set to pc = 0.01. M. Shirvanimoghaddam, M. Condoluci, M. Dohler and S. J. Johnson, "On the Fundamental Limits of Random Non-Orthogonal Multiple Access in Cellular Massive IoT," in IEEE Journal on Selected Areas in Communications, vol. 35, no. 10, pp. 2238-2252, Oct. 2017. Grant-Free NOMA with Rateless Codes
  • 113. The University of Sydney Medium Access Control Layer for URLLC ✔ Why 4G MAC techniques cannot support massive URLLC ✔ 5G Approaches to Reducing Latency in Channel Access ✔ Motivation for Grant-Free NOMA & Key Challenges ✔ Performance Analysis of Massive Grant-Free NOMA ✔ Grant-Free NOMA with Rateless Codes → Multi-Layer Grant-Free NOMA (Power and Code Domain) Deep Learning Approach for Grant-Free NOMA Conclusions and Future Directions
  • 114. The University of Sydney Grant-Free NOMA with Multi-Layer Design Transmission Scheme Layer 2 (P2) Layer 1 (P1)
  • 115. The University of Sydney Grant-Free NOMA with Multi-Layer Design Example of Superposition of Signals
  • 116. The University of Sydney Grant-Free NOMA with Multi-Layer Design Mixed-Linear Integer Programming (MILP)
  • 117. The University of Sydney Grant-Free NOMA with Multi-Layer Design
  • 118. Page 118The University of Sydney Medium Access Control Layer for URLLC ✔ Why 4G MAC techniques cannot support massive URLLC ✔ 5G Approaches to Reducing Latency in Channel Access ✔ Motivation for Grant-Free NOMA & Key Challenges ✔ Performance Analysis of Massive Grant-Free NOMA ✔ Grant-Free NOMA with Rateless Codes ✔ Multi-Layer Grant-Free NOMA (Power and Code Domain) → Deep Learning Approach for Grant-Free NOMA Conclusions and Future Directions
  • 119. Page 119The University of Sydney Deep Learning Approach for GF-NOMA [S-6] R. Abbas, T. Huang, M.B. Shahab, M. Shirvanimoghaddam, Y. Li and B. Vucetic. "Grant-Free Non-Orthogonal Multiple Access: A Key Enabler for 6G-IoT.” arXiv preprint arXiv:2003.10257 (2020). https://arxiv.org/abs/2003.10257
  • 120. Page 120The University of Sydney Fully Connected Neural Network Architecture • We adopt the structure of the auto- encoder: 4 hidden layers, where each layer consists of 2048 neurons. • The activation function used for each hidden layer in the encoder is ReLU and the activation function used for its output layer is a Sigmoid function. • For the decoder, we also used 4 hidden layers and each layer consists of 2048 neurons. The activation function for each hidden layer is ReLU. The output layer of the decoder contains 2k-1 nodes, and the loss function used is a binary cross-entropy function. [S-6] R. Abbas, T. Huang, M.B. Shahab, M. Shirvanimoghaddam, Y. Li and B. Vucetic. "Grant-Free Non-Orthogonal Multiple Access: A Key Enabler for 6G-IoT.” arXiv preprint arXiv:2003.10257 (2020). https://arxiv.org/abs/2003.10257
  • 121. Page 121The University of Sydney Performance Evaluation : Code Rate = 1/2 [S-6] R. Abbas, T. Huang, M.B. Shahab, M. Shirvanimoghaddam, Y. Li and B. Vucetic. "Grant-Free Non-Orthogonal Multiple Access: A Key Enabler for 6G-IoT.” arXiv preprint arXiv:2003.10257 (2020). https://arxiv.org/abs/2003.10257
  • 122. Page 122The University of Sydney Performance Evaluation : Code Rate = 1 [S-6] R. Abbas, T. Huang, M.B. Shahab, M. Shirvanimoghaddam, Y. Li and B. Vucetic. "Grant-Free Non-Orthogonal Multiple Access: A Key Enabler for 6G-IoT.” arXiv preprint arXiv:2003.10257 (2020). https://arxiv.org/abs/2003.10257
  • 123. Page 123The University of Sydney Performance Evaluation : Different Loss Functions [S-6] R. Abbas, T. Huang, M.B. Shahab, M. Shirvanimoghaddam, Y. Li and B. Vucetic. "Grant-Free Non-Orthogonal Multiple Access: A Key Enabler for 6G-IoT.” arXiv preprint arXiv:2003.10257 (2020). https://arxiv.org/abs/2003.10257
  • 124. Page 124The University of Sydney Medium Access Control Layer for URLLC ✔ Why 4G MAC techniques cannot support massive URLLC ✔ 5G Approaches to Reducing Latency in Channel Access ✔ Motivation for Grant-Free NOMA & Key Challenges ✔ Performance Analysis of Massive Grant-Free NOMA ✔ Grant-Free NOMA with Rateless Codes ✔ Multi-Layer Grant-Free NOMA (Power and Code Domain) ✔ Deep Learning Approach for Grant-Free NOMA → Conclusions and Future Directions
  • 125. Page 125The University of Sydney – Existing grant-based access techniques are ill-suited for Massive URLLC due to overhead and access delays – Sporadic traffic in Massive URLLC is especially challenging to solve with Grant-Free NOMA being a promising solution – The bottleneck of performance are collisions, with collision detection/resolution schemes are lacking in the literature. – Joint decoding significantly outperforms SIC – Rateless codes present a promising solution to improve reliability – Multi-layer Grant Free NOMA presents a promising solution for power improvements and reducing collisions MAC: Summary
  • 126. Page 126The University of Sydney – Develop Multi-Layer Grant free NOMA schemes with rateless codes – Develop low complexity decoders for joint user decoding – Develop deep learning techniques that aim at joint detection and decoding of users in Grant-Free NOMA MAC: Future Research Directions
  • 127. Page 127The University of Sydney Cross Layer Solutions for URLLC
  • 128. Page 128The University of Sydney X. Wu, X. Zhu, G. Q. Wu, and W. Ding, “Data mining with big data,” IEEE Trans. Knowl. Data Eng., vol. 26, no. 1, pp. 97–107, Jan. 2014. Cross-Layer Design: Major Problems – Some fragmental ideas for related problems: – Cross-layer design is missing – Our understanding: – E2E delay – Overall reliability – Network availability We need the whole picture!
  • 129. Page 129The University of Sydney Cross-Layer Design: Major Problems – Transmission delay (How to design frame structure? Is retransmission helpful? ) – Queueing delay (Will a packet wait in a queue? How to design queueing policy?) –random arrival rate that could be higher than service rate – Computing delay (How to characterize such delay?) – Backhaul delay (Which kind of backhaul shall we use?) –one-hop fiber backhaul or mmWave backhaul with LOS path – Propagation delay (When is propagation delay dominated?) –light travels 300 km in 1 ms E2E delay
  • 130. Page 130The University of Sydney What are the factors leading to packet loss? – Transmission error: non-zero in the short blocklength regime! – Queueing delay violation: a packet becomes useless if it is delayed – Packet dropping in deep fading channel: wireless channel is never reliable How to reduce these packet loss probabilities? What is the dominating factor? Cross-Layer Design: Major Problems
  • 131. Page 131The University of Sydney How to characterize network availability? – Can we ignore shadowing as what we did for traditional real- time service? – How long is the communication distance of URLLC? • propagation delay in core network/backhaul • distance attenuation in radio access network – How to handle interference? • This is also an issue for traditional real-time service! How to improve network availability? Cross-Layer Design: Major Problems
  • 132. Page 132The University of Sydney Y. Polyanskiy, H. V. Poor, and S. Verdu, “Channel coding rate in the finite blocklength regime,” IEEE Trans. Inf. Theory, pp. 2307–2359, May 2010. Cross-Layer Design: Useful Tools – Achievable rate in finite blocklength regime – Transmission delay and transmission error probability 2 0 log 1t gP C D W WN   = +    ( )1 0 1 ln 1 ln2 t t Qt D W gP s f WN D W −    = + −      ( )t t D ,
  • 133. Page 133The University of Sydney W. Yang, G. Durisi, T. Koch, and Y. Polyanskiy, “Quasi-static multiple-antenna fading channels at finite blocklength,” IEEE Trans. Inf. Theory, pp. 4232–4264, Jul. 2014. Cross-Layer Design: Useful Tools – Achievable rate in MIMO system are the eigenvalues of channel matrix – Approximation in high SNR regime ( ) ( ) t r 1 1 min , 0 ( ) ln 1 ln2 Nt tk k N t k Qk D W g p V s n f N W D W − =      + −        ( ) ( ) ( ) rtmin , r rt t2 1 0 min , 1 , 1 min N k k k N V N N p g N W N N = = −    +     kg
  • 134. Page 134The University of Sydney S. Schiessl, J. Gross, and H. Al-Zubaidy, “Delay analysis for wireless fading channels with finite blocklength channel coding,” in Proc. ACM MSWiM, 2015. Cross-Layer Design: Useful Tools – Ensuring queueing delay with Stochastic network calculus –From bit domain to SNR domain (given bandwidth) –A useful tool to analyzing delay with given resource allocation – Not applicable when one needs to optimize bandwidth – Not applicable with unbounded arrival process, e.g., Poisson – No closed-form result, inconvenient in cross-layer optimization ( ),q q D 
  • 135. Page 135The University of Sydney Cross-Layer Design: System Model Local Communication Scenarios: Negligible propagation delay and short backhaul latency
  • 136. Page 136The University of Sydney Cross-Layer Design: System Model – Each user requests packets from multiple users – Arrival process: – Departure process: Queueing model ( )ki ia n A ( ) ( ) ( ) min ,k k kb n Q n s n= ( ) ( ) ( )1 ( ) k k k i k i Q n Q n a n b n  + − = −A
  • 137. Page 137The University of Sydney – Frame structure – Channel model – Multiple transmit antennas; single receive antenna – Flat fading channel – Quasi-static: delay bound < channel coherence time Cross-Layer Design: System Model 137
  • 138. Page 138The University of Sydney Bursty arrivals: Interrupt Poisson process Auto-correlated arrivals: Switched Poisson process Cross-Layer Design: Arrival Procceses 138
  • 139. Page 139The University of Sydney – Achievable rate in short blocklength regime – Queueing delay violation (Poisson process) Cross-Layer Design: Finite Blocklength Regime 139 ln(1/ ) (packets/frame) ln(1/ ) ln 1 q f kB k q f kq q k T E T D D    =   +    ( ) ( ) ( )1 0 ( ) ln 1 packets/frame ln2 t tk k kt k k q k k t k g p nDW V s n f u N W DW  −      + −       t fD T=
  • 140. Page 140The University of Sydney C. Chang and J. A. Thomas, “Effective bandwidth in high-speed digital networks,” IEEE J. Sel. Areas Commun., pp. 1091–1100, Aug. 1995. [M-7] She, Changyang, et al. "Cross-layer design for mission-critical iot in mobile edge computing systems." IEEE Internet of Things Journal (2019). https://doi.org/10.1109/JIOT.2019.2930983 Cross-Layer Design: Effective Bandwidth – Ensuring queueing delay with effective bandwidth (e.g. Poisson) ( ),q q D  ln(1/ ) (packets/s) ln(1/ ) ln 1 q B q fq q E T D D    =   +   
  • 141. Page 141The University of Sydney [1] G. L. Choudhury, D. M. Lucantoni, and W. Whitt, “Squeezing the most out of ATM,” IEEE Trans. Commun., vol. 44, no. 2, pp. 203–217, Feb. 1996. [[M-7] She, Changyang, et al. "Cross-layer design for mission-critical iot in mobile edge computing systems." IEEE Internet of Things Journal (2019). https://doi.org/10.1109/JIOT.2019.2930983 Cross-Layer Design: Effective Bandwidth – In general, effective bandwidth is only applicable with large queue length or delay – Applicable for arrival processes that are more bursty than Poisson – We validated that effective bandwidth can be used in short delay region for bursty arrival processes
  • 142. Page 142The University of Sydney – Constraint on and – Power control scheme: channel inverse – Finite transmit power – Proactive packet dropping – Overall reliability requirement Cross-Layer Design: Overall Reliability ( ) B k ks n E max B k ks Eth k kg g ( )max max 0, B k kE s− ( ),q q D  ( )t t D , ( )( )( ) max1 1 1 1c q h c q h k k k k k k      − − − −  + + 
  • 143. Page 143The University of Sydney Cross-Layer Design: Optimisation 143 Optimising the packet loss probabilities tot th , , , 1 1,2,..., minq c h k k kk K k W k k K P P    = =  ( ) ( ) 0 th th 0 g 0 ln 1 s.t. 1 ln 1 k k k k k k N W kP k h k P g N W f g dg         +      −  +      ( ) ( ) ( )1 Q ln2 ,ln 1 q t q k k t t B k k k k D D u V E f W WD   − + = + max c q h k k k   + +  max 0, , 1,..., K k k k W W W W k K  =
  • 144. Page 144The University of Sydney Cross-Layer Design: Solutions – Flat-fading → frequency-selective channel – Channel coefficient on subchannel j of user k – Apply the achievable rate over MIMO channel in: 144 Extension II: Different Channel Models 1 1 kjh   sc 1 2 0 ... 0 0 ... 0 ... 0 0 ... kkN k k h h h      =        H ( ) sc 1t 1 0 t ( ) ln 1 ln2 k kj kj t k k j N Q g pDW V s n f N W DW − =      + −        W. Yang, G. Durisi, T. Koch, and Y. Polyanskiy, “Quasi-static multiple-antenna fading channels at finite blocklength,” IEEE Trans. Inf. Theory, pp. 4232–4264, Jul. 2014.
  • 145. Page 145The University of Sydney Cross-Layer Design: Numerical Results 145 M//D/1 queue: Poisson arrival process & Constant service rate D. Gross and C. Harris, Fundamentals of Queueing Theory. Wiley, 1985.
  • 146. Page 146The University of Sydney Cross-Layer Design: Numerical Results – Poisson arrival process – IPP (bursty) – SPP (auto-correlated) – Effective bandwidth is applicable for Poisson process and processes that are more bursty! 146
  • 147. Page 147The University of Sydney Cross-Layer Design: Numerical Results Three packet loss probabilities are in the same level, none of them can be ignored 147
  • 148. Page 148The University of Sydney Setting the three packet loss probabilities equal will cause minor power loss Cross-Layer Design: Numerical Results
  • 149. Page 149The University of Sydney Cross-Layer Design: Summary – A framework is proposed for cross-layer optimization for URLLC – Effective bandwidth can be used to design resource allocation policy for Poisson processes and the processes that are more bursty than Poisson – Proposed a proactive packet dropping mechanism to ensure the strict QoS with finite maximal transmit power – Transmission error, queueing delay violation and packet dropping are in the same order of magnitude, and setting the three packet loss probabilities equal will cause minor power loss 149
  • 150. Page 150The University of Sydney Network-Layer Solutions for URLLC Dr. Changyang She
  • 151. Page 151The University of Sydney Network-Layer Solutions for URLLC → Performance metric: network availability Multi-connectivity in terrestrial communications Antenna deployment for ground-to-air communications Mobile edge computing systems for mission-critical IoT Deep learning for network management
  • 152. Page 152The University of Sydney – E2E delay: 1 to 2 ms [1] – Overall reliability (packet loss probability: 10-5 to 10-7) – Network Availability (99.9% to 99.999% ) [2,3] – One user: percentage of service time – Multiple users: percentage of the total number of users – Unavailable: delay and reliability requirements cannot be satisfied Note: the requirements on QoS and network availability depend on specific applications [1] 3GPP, “Study on scenarios and requirements for next generation access technologies.” TSG RAN TR38.913 R14, Jun. 2017. [2] D. Ohmann, A. Awada, I. Viering, et al., “Modeling and Analysis of Intra-Frequency Multi-Connectivity for High Availability in 5G”, VTC-Spring 2018 [3] P. Popovski, et al., Deliverable D6.3 Intermediate system evaluation results, 2014 QoS requirements in URLLC
  • 153. Page 153The University of Sydney — Spectral efficiency — For URLLC and other services in 5G — Energy efficiency — Battery lifetime of mobile devices — Cost for operating BSs Resource Utilization Efficiency
  • 154. Page 154The University of Sydney — How to guarantee QoS requirements of URLLC? — How to maximize resource utilization efficiency subject to diverse QoS requirements of eMBB, mMTC, and URLLC? — How to design practical solutions for real-time implementation? Research Problems
  • 155. Page 155The University of Sydney Network-Layer Solutions for URLLC ✔ Performance metric: network availability → Multi-connectivity in terrestrial communications Antenna deployment for ground-to-air communications Mobile edge computing systems for mission-critical IoT Deep learning for network management
  • 156. Page 156The University of Sydney Improving Network Availability Network availability & QoS requirement [1] —Definition: Ratio of users with QoS guarantee in a wireless network —For one mobile user: fraction of service time with QoS guarantee How to characterize the network availability? How to achieve high available range with stringent QoS? —Distance attenuation and shadowing lead to short commun. Range —Given locations of users, increase availability (existing studies) —Given availability requirement (99.999%), increase available range Motivation [1] P. Popovski, et al., “Deliverable d6.3 intermediate system evaluation results.” ICT-317669- METIS/D6.3, 2014. [N-4] C. She, Z. Chen, C. Yang, T. Q. S. Quek, Y. Li and B. Vucetic, “Improving Available Range of Ultra-reliable and Low-latency Communications with Different Transmission Modes ”, IEEE Trans. on Commun., Nov. 2018. https://doi.org/10.1109/TCOMM.2018.2791598
  • 157. Page 157The University of Sydney Improving Network Availability – Different users broadcast packets on different subchannels – Available range: maximal communication distance with QoS guaranteeing Illustration of system model
  • 158. Page 158The University of Sydney Improving Network Availability Two-phase transmission protocol: – Cellular mode (UL+DL) – Decode at BS (with processing delay) – Amplify-and-forward at BS (without processing delay) – D2D mode Retransmission with frequency- hopping
  • 159. Page 159The University of Sydney Improving Network Availability — Multi-Connectivity (MC) Modes — AF MC mode (Amplify, without processing delay at BS) — DF MC mode (decoded, with processing delay at BS)
  • 160. Page 160The University of Sydney Improving Network Availability – Shadowing – Shadowing: lognormal – Correlation model [1] – Large-scale channel gains ( )sb br sr 0( , ) exp /r r   = − [1] S. S. Szyszkowicz, H. Yanikomeroglu, and J. S. Thompson, “On the feasibility of wireless shadowing correlation models,” IEEE Trans. Commun., Nov. 2010.
  • 161. Page 161The University of Sydney Improving Network Availability – Decoding error probability (UL) [1] – Packet loss probabilities – Cellular mode (decode) – D2D mode – MC mode (decode) – Constraint on network availability u u m u u1 t Q 0 1 ln2 ln 1 |g TW g P b f V N W TW           + −           E C u d u d lP    + −= D m m 1 2lP  = ( )  H m u m ud m C D 1 1 21 min ,l l lP P P     = − +   max 1 2 p b max APr ,lP T T D D D P + + +   [1] W. Yang, G. Durisi, T. Koch, and Y. Polyanskiy, “Quasi-static multiple-antenna fading channels at finite blocklength,” IEEE Trans. Inf. Theory, Jul. 2014.
  • 162. Page 162The University of Sydney Improving Network Availability – Problem formulation (DF MC mode) – Optimize the transmission durations in the two phases, and adjust the deployment of BSs   1 2 d A , 10 c 10 cell c 0 c 10 sr 10 A max 1 2 p b ma sr 0 1 2 t 1 1 f 2 2 f x APr , max s.t. 10log 10 log ( ) 10log 10 log ( ) , ., l T T P T T D D D P r R r T T D T k T T k T          + = − + + = − + + +  = = + +  
  • 163. Page 163The University of Sydney Improving Network Availability – We established a framework for improving available ranges – Decoding-based MC mode can achieve large available ranges than other modes when processing delay is negligible – Amplifying-based MC mode can approach the performance of the decoding-based MC mode when the UL SNR is high – There is a tradeoff between available range of D2D links and cellular links with MC modes – It is better to use decoding-based mode in macro cells and use amplifying-based mode in micro cells Conclusions
  • 164. Page 164The University of Sydney Network-Layer Solutions for URLLC ✔ Performance metric: network availability ✔ Multi-connectivity in terrestrial communications → Antenna deployment for ground-to-air communications Mobile edge computing systems for mission-critical IoT Deep learning for network management
  • 165. Page 165The University of Sydney Ground-to-Air Communications – Motivation – Integrating unmanned aerial vehicles (UAVs) into cellular networks has recently been recommended by the 3GPP [1] – The latency and reliability of control & non-payload communication (CNPC) links are crucial for UAVs – How to support URLLC in CNPC links of UAV communications?[N-7] – How to characterize the performance of CNPC links? – How to improve the available range of CNPC links? [1] 3GPP TR 36.777, “Study on enhanced LTE support for aerial vehicles.” TSG RAN, v15.0.0, Dec. 2017. [N-7] C. She, C. Liu, T. Q. S. Quek, C. Yang, and Y. Li, "Ultra-reliable and Low-latency Communications in Unmanned Aerial Vehicle Communication Systems", IEEE Trans. on Commun., May 2019. https://doi.org/10.1109/TCOMM.2019.2896184
  • 166. Page 166The University of Sydney Ground-to-Air Communications – Illustration of system model – High array gain in centralized multi-antenna systems – High macro-diversity gain in distributed multi-antenna systems – Both edge cloud and central cloud
  • 167. Page 167The University of Sydney Ground-to-Air Communications – Delay components – E2E delay (UAV to central cloud) – UL transmission delay – Processing delay – Backhaul delay – Round-trip delay (UAV to edge cloud, edge cloud to UAV) – UL transmission delay – Processing delay – DL transmission delay
  • 168. Page 168The University of Sydney Ground-to-Air Communications – Probability with Line-of-Sight (LoS) path – A single link – Multiple correlated links
  • 169. Page 169The University of Sydney Ground-to-Air Communications Problem formulation
  • 170. Page 170The University of Sydney Ground-to-Air Communications – Conclusions – We proposed a framework of maximizing the available range of the ground control station for ultra-reliable and low-latency UAV communications – We characterized the correlation of whether co-located APs have LoS path towards to a UAV using a two-state Markov Chain, and derived the probability that at least one of the APs has a LoS path towards a UAV – To solve the non-convex problem of maximizing the available range, we proposed an algorithm that converges to the optimal solution in two asymptotic scenarios – We then generalized the algorithm to the general scenario of the arbitrary number of antennas at each AP.
  • 171. Page 171The University of Sydney Network-Layer Solutions for URLLC Performance metric: network availability Multi-connectivity in terrestrial communications Antenna deployment for ground-to-air communications → Mobile edge computing systems for mission-critical IoT Deep learning for network management
  • 172. Page 172The University of Sydney Mission-critical IoT in MEC – Background – URLLC and eMBB services co-exist in future wireless networks – Mission-critical IoT in smart factory, virtual/augmented reality, and autonomous vehicles – URLLC: short packets, short processing time – eMBB: long packets (3D video), long processing time – Motivation – Design service order of MEC with both URLLC and eMBB – Analyzing the distribution of delay experienced by URLLC – Optimizing user association, offloading probability, and radio resource allocation for URLLC
  • 173. Page 173The University of Sydney Mission-critical IoT in MEC – MC-IoT and eMBB (background service) in a MEC system – Multiple APs equipped with edge servers – One partially centralized control plane of user association Illustration of system model
  • 174. Page 174The University of Sydney Mission-critical IoT in MEC – Queueing system – FCFS order at the local server of each device – Processor sharing server at the MEC – Service ability is equally allocated to all the tasks in the server – Short packets do not need to wait for the processing of long packets
  • 175. Page 175The University of Sydney Mission-critical IoT in MEC – Delay analysis in M/G/1/PS – Service time of short packets is much shorter than long packets – The number of tasks in the buffer does not change significantly during the short service time of a short packet – The service rate of a short packet can be approximated by – The service delay can be approximated by – According to the distribution of q,
  • 176. Page 176The University of Sydney Mission-critical IoT in MEC – Cross-layer optimization framework – User association: the AP a device will offload its’ packets to – Offloading rate: the probability that a packet is offloaded to MEC – Bandwidth allocation: UL and DL bandwidth allocation for data transmission between a user and an MEC – Objective: minimizing the maximal packet loss probability
  • 177. Page 177The University of Sydney Mission-critical IoT in MEC Problem formulation
  • 178. Page 178The University of Sydney Mission-critical IoT in MEC – Two asymptotic scenarios: communication or computing is the bottleneck of reliability – Communication is the bottleneck: highest large-scale channel gain – Computing is the bottleneck: MEC with the lowest workload – Extend the algorithm into the general scenario Finding the solution of this non-convex problem:
  • 179. Page 179The University of Sydney Mission-critical IoT in MEC Distribution of delay experienced by short packets
  • 180. Page 180The University of Sydney Overall packet loss probability Mission-critical IoT in MEC
  • 181. Page 181The University of Sydney Overall packet loss probability Mission-critical IoT in MEC
  • 182. Page 182The University of Sydney Mission-critical IoT in MEC – We analyzed the processing delay of short packets in the M/G/1/PS server and derived the closed-form expression of the CCDF of the processing delay – We minimized the overall packet loss probability under the constraint on E2E delay by optimizing association scheme, packet offloading rates, and bandwidth allocation. – We derived the optimal solutions of the problem in two asymptotic cases: communication or computing is the bottleneck of reliability – We then generalized the algorithm to the general scenario. Conclusions
  • 183. Page 183The University of Sydney Network-Layer Solutions for URLLC ✔ Performance metric: network availability ✔ Multi-connectivity in terrestrial communications ✔ Antenna deployment for ground-to-air communications ✔ Mobile edge computing systems for mission-critical IoT → Deep learning for network management
  • 184. Page 184The University of Sydney Deep learning for URLLC Learning at three levels (User-, Cell-, Network-levels)
  • 185. Page 185The University of Sydney Our Results on AI for URLLC User-level • Burstiness aware bandwidth reservation (AI for traffic state classification in tactile internet) [N-5] • Prediction & communication co-design (AI for mobility prediction in remote control applications) [N-8] Cell-level • Deep learning for resource management [N-9] • Deep reinforcement learning for downlink scheduler design Network-level • Deep learning for user association [N-11] • Deep reinforcement learning in software-defined networks
  • 186. Page 186The University of Sydney User-level Results – Classify the packet arrival process into high and low traffic states – Design bandwidth reservation according to traffic states – Can save up 43.2% bandwidth subject to QoS constraints User-level: Generating packet arrivals from a tactile device [N-5] [N-5] Z. Hou, C. She, Y. Li, T. Q. S. Quek, and B. Vucetic, “Burstiness Aware Bandwidth Reservation for Ultra-reliable and Low-latency Communications in Tactile Internet,” IEEE J. Sel. Areas Commun., Nov. 2018. https://doi.org/10.1109/JSAC.2018.2874113
  • 187. Page 187The University of Sydney User-level Results – Predict the trajectory of the device and transmit predicted trajectory in advance – Can save user experienced delay and achieve a better reliability-delay tradeoff User-level: Trajectory of a tactile device [N-8] [N-8] Z. Hou, C. She, Y. Li, Z. Li, and B. Vucetic, “Prediction and Communication Co-design for Ultra-Reliable and Low-Latency Communications”, IEEE TWC, 2019. https://doi.org./10.1109/TWC.2019.2951660
  • 188. Page 188The University of Sydney Cell-level Results – Find labelled training samples from optimization algorithms – Train deep neural network (DNN) offline for resource allocation – Input channel state information and average packet arrival rates of users – Output number of subcarriers and transmit power allocated to users – The pre-trained DNN can find near-optimal solution in real time Cell-level: Base station optimizes resource allocation [N-9] [N-9] R. Dong, C. She, W. Hardjawana, Y. Li, and B. Vucetic, “Deep Learning for Radio Resource Allocation with Diverse Quality-of-Service Requirements in 5G” IEEE TWC, submitted. (Conference version accepted by IEEE Globecom 2019) https://arxiv.org/pdf/2004.00507.pdf
  • 189. Page 189The University of Sydney Network-level Results – Find labelled training samples in a simulation platform – Train a DNN offline (From channel and traffic states to association scheme) – Outperforms benchmarks – Nearest access point – Highest SNR – Game theory approach – Close to the optimal scheme Network-level: Mobility management entity optimizes user association [N-11] [N-11] R. Dong, C. She, W. Hardjawana, Y. Li, and B. Vucetic, “Deep Learning for Hybrid 5G Services in Mobile Edge Computing Systems: Learn from a Digital Twin” IEEE Trans. on Wireless Commun., Oct., 2019. https://doi.org/10.1109/TWC.2019.2927312
  • 190. The University of Sydney URLLC for Beyond 5G Professor Yonghui Li
  • 191. The University of Sydney URLLC for Beyond 5G 5G Road map URLLC: Key enabler of 6G Applications Machine-Learning Based Communication Systems URLLC and Time Sensitive Networks URLLC and Satellite Communications URLLC and Quantum Computing URLLC and Wireless Networked Control
  • 192. The University of Sydney 5G Road map
  • 193. The University of Sydney Joint URLLC and Time Sensitive Networks (TSN) URLLC Time Sensitive Networks (TSN) Flexible Spectrum Sub ms delay 10−5 BLER Microsec time synchronization Dedicated, licensed or unlicensed/shared spectrum
  • 194. The University of Sydney https://www.smartcitiesworld.net/ 6G Applications The sixth-generation (6G) system, with the full support of artificial intelligence is expected to be deployed between 2027 and 2030 – Artificial Intelligence – Terahertz Communications – Optical wireless technology – Free space optic network – Block chains – 3D networking – Quantum computing and communications – Big data analytics – …
  • 195. The University of Sydney Satellite Communications Existing communication network design has mainly focused on terrestrial communication networks LEO Satellite network has a key role to play here Elon Musk's SpaceX is going to launch 42000 LEOs to provide Global internet communications Altitude of several hundreds kilometres, latency of few ms Employ optical feeder links/ inter-satellite links and phased array beam forming and digital processing technologies in the Ku- and Ka-band The system will be able to provide high speed (up to 1 Gbps per user, which is 200 times faster than current average internet speed), low latency broadband services for consumers and businesses​ Reliability due to rain attenuation, inter-beam-interference, real-time data services, low latency, channel estimation due to fast moving satellite Visualisation of Elon Musk’s space internet https://hipertextual.com/ Joint design of Satellite and Terrestrial communication networks​
  • 196. The University of Sydney Deep Learning Artificial Intelligence: The most important and newly introduced technology for 6G communication systems The upcoming 5G will support partial or very limited AI. 6G will be fully Draft supported by AI for automatization. Advancements in machine learning will create more intelligent networks for real- time communications in 6G. AI will increase the efficiency and reduce the processing delay of the communication steps. Time-consuming tasks, such as handover and network selection, can be performed promptly by using AI. AI is the key enabling technology for 6G for network automation and intelligent management https://arxiv.org/ftp/arxiv/papers/1909/1909.11315.pdf
  • 197. The University of Sydney N. Farsad, A. Goldsmith, Detection Algorithms for Communication Systems Using Deep Learning; Machine Learning-Based Communication Systems Existing communication system design is divided the whole system into a chain of multiple processing blocks, each responsible for a specific sub-task, e.g., source coding, channel coding, modulation, channel estimation and equalization – though it is efficient, but suboptimal – do not achieve the optimal end-to-end performance. DL end-to-end learning of communications systems jointly optimizes transmitter and receiver in a single process and does not have such a rigid modular structure; DL can be executed in parallel processing architectures with GPUs and specialized machine learning chips – high processing speed, low processing latency and low energy cost
  • 198. The University of Sydney S. Dörner, S. Cammerer, J. Hoydis, S. ten Brink, “Deep Learning-Based Communication Over the Air. Deep Learning Existing design relies on the prior mathematical modelling and analysis. Algorithms are optimized for tractable mathematical models, which are usually linear, stationary and Gaussian distributed – practical systems have many imperfections and non- linearity, which cannot be captured by such models Deep learning (DL) based communication system (or processing blocks) does not require a mathematically trackatble model. It treats the system as a black box. The recent significant advances in DL libraries and readily available specialized ML chips can escalate the development of DL communication systems Machine learning communication systems
  • 199. The University of Sydney S. Dörner, S. Cammerer, J. Hoydis, S. ten Brink, “Deep Learning-Based Communication Over the Air. Deep Learning Current progress: DL based channel decoding, modulation classifications, MIMO detection, compressive sensing, compression, encryption/decryption of an eavesdropper channel An DL based SDR prototype of a complete uncoded end-to-end communication systems with open source DL software libraries Open challenges: Biggest challenge is to scale to large message size – possible approach is to embed the code structure and modulation information in the DL Training SNRs – the learned system should operate at any SNR, regardless at which SNR it was trained Optimal choice of loss function Channel state information learning …. Leaning for random access ….. Machine learning communication systems
  • 200. The University of Sydney Quantum Computing Google recently announced new record-breaking 72-qubit quantum processor, achieving quantum supremacy, the point at which quantum computers can perform calculations that are beyond the capabilities of even the most advanced supercomputers. Time for decryption can be reduced from years to minutes – new challenge for security protocols; Google is also developing Quantum machine learning chip, which can significantly speed up the machine learning process – complexity may not be a big issue with quantum processing How to develop parallel communication architecture tailored for Quantum processor? Machine learning based communication systems may be one possible approach. Google's Sycamore chip is kept cool inside their quantum cryostat. (Image: © Eric Lucero/Google, Inc.) What’s the key takeaway?
  • 201. The University of Sydney Wireless Network Control One key major application of uRLLC is in wireless networked control Existing studies on how wireless communication can affect the control performance, such as the effect of delay and packet dropouts on the stability of the networked control system The effects of practical wireless communication techniques on the performance (i.e., stability + cost) of wireless control systems – MIMO (diversity-multiplexing tradeoff), – Short packet communication (latency-reliability tradeoff) Resource allocation in future wireless control networks – Joint downlink uplink scheduling/resource allocation – Broadcast channel – Multiple access channel – Interference channel
  • 202. The University of Sydney References
  • 203. The University of Sydney [S-1] C. She, C. Yang, and T. Q. S. Quek, “Radio Resource Management for Ultra-reliable and Low-latency Communications,” IEEE Commun. Mag., Jun. 2017. https://doi.org/10.1109/MCOM.2017.1601092 [S-2] H. Chen, R. Abbas, M. Shirvanimoghaddam, W. Hardjawana, W. Bao, Y. Li and B. Vucetic. "Ultra-reliable low latency cellular networks: Use cases, challenges and approaches." IEEE Communications Magazine 56.12 (2018): 119-125. https://doi.org/10.1109/MCOM.2018.1701178 [S-3] M. Shirvanimoghaddam et al., Short Block-Length Codes for Ultra-Reliable Low- Latency Communications, in IEEE Communications Magazine, vol. 57, no. 2, 2019. https://doi.org/10.1109/MCOM.2018.1800181 [S-4] M.B. Shahab, R. Abbas, M. Shirvanimoghaddam, and S. J. Johnson. "Grant-free Non-orthogonal Multiple Access for IoT: A Survey." arXiv preprint arXiv:1910.06529 (2019). https://arxiv.org/abs/1910.06529, accepted to appear in IEEE Communications Surveys and Tutorials [S-5] D. Feng, C. She, K. Ying, et al., "Towards Ultra-Reliable Low-Latency Communications: Typical Scenarios, Possible Solutions, and Open Issues", IEEE Veh. Tech. Mag., Jun. 2019. https://doi.org/10.1109/MVT.2019.2903657 [S-6] R. Abbas, T. Huang, M.B. Shahab, M. Shirvanimoghaddam, Y. Li and B. Vucetic. "Grant-Free Non-Orthogonal Multiple Access: A Key Enabler for 6G-IoT.” arXiv preprint arXiv:2003.10257 (2020). https://arxiv.org/abs/2003.10257 References – Survey Papers
  • 204. The University of Sydney References – (PHY) [P-1] R. Abbas, M. Shirvanimoghaddam, T. Huang, Y. Li and B. Vucetic, Novel Design for Short Analog Fountain Codes, in IEEE COMM Letter, vol. 23, no. 8, 2019. https://doi.org/10.1109/LCOMM.2019.2910517 [P-2] M. Shirvanimoghaddam et al., Short Block-Length Codes for Ultra-Reliable Low- Latency Communications, in IEEE Communications Magazine, vol. 57, no. 2, 2019. https://doi.org/10.1109/MCOM.2018.1800181 [P-3] S. Jayasooriya, M. Shirvanimoghaddam, L. Ong and S. J. Johnson, Analysis and design of Raptor codes using a multi-edge framework, in IEEE TCOM, vol. 65, no. 12, Oct. 2017. https://doi.org/10.1109/TCOMM.2017.2750179 [P-4] S. Jayasooriya, M. Shirvanimoghaddam, L. Ong, G. Lechner and S. J. Johnson, A New Density Evolution Approximation for LDPC and Multi-Edge Type LDPC Codes, in IEEE TCOM, vol. 64, no. 10, 2016. 13. M. Shirvanimoghaddam and S. J. Johnson, Raptor Codes in the Low SNR Regime, in IEEE TCOM, vol. 64, no. 11, 2016. https://doi.org/10.1109/TCOMM.2016.2600660 [P-5] M. Shirvanimoghaddam, Y. Li, B. Vucetic, J. Yuan, P. Zhang, Binary Compressive Sensing via Analog Fountain Coding, IEEE TSP, vol. 63, no. 24, 2015. https://doi.org/10.1109/TSP.2015.2472362 [P-6] M. Shirvanimoghaddam, Y. Li, B. Vucetic, Near-Capacity Adaptive Analog Fountain Codes for Wireless Channels, IEEE Communications Letters, vol. 17, no. 12, 2013. https://doi.org/10.1109/LCOMM.2013.101813.131972
  • 205. The University of Sydney References – (PHY) [P-7] C. Yue, M. Shirvanimoghaddam, et al, Segmentation-Discarding Ordered-Statistic Decoding for Linear Block Codes, IEEE Globcom, Kona, HI, Dec. 2019. https://arxiv.org/abs/1901.02603 [P-8] R. Abbas, M. Shirvanimoghaddam, et al, Performance Analysis of Short Analog Fountain Codes, IEEE Globecom, Kona, HI, Dec. 2019. [P-9] W. Lim, M. Shirvanimoghaddam, et al, On the Design of Analog Fountain Codes for Short Packet Communications in 5G URLLC, IEEE VTC-Spring, Honolulu, HI, Sep. 2019. https://doi.org/10.1109/VTCFall.2019.8891550 [P-10] C. Yue, M. Shirvanimoghaddam, Y. Li and B. Vucetic, Hamming Distance Distribution of the 0-reprocessing Estimate of the Ordered Statistic Decoder, IEEE ISIT, Paris, France, July 2019. https://doi.org/10.1109/ISIT.2019.8849229
  • 206. The University of Sydney References – (MAC) [M-1] M. Shirvanimoghaddam, Y. Li, M. Dohler, B. Vucetic, S. Feng, Probabilistic Rateless Multiple Access for Machine-to-Machine Communication, IEEE TWC, vol. 14, no. 12, 2015. https://doi.org/10.1109/TWC.2015.2460254 [M-2] R. Abbas, M. Shirvanimoghaddam, Y. Li and B. Vucetic. "A Novel Analytical Framework for Massive Grant-Free NOMA." IEEE Transactions on Communications (2018). https://doi.org/10.1109/TCOMM.2018.2881120 [M-3] R. Abbas, M. Shirvanimoghaddam, Y. Li and B. Vucetic, "A Multi-Layer Grant-Free NOMA Scheme for Short Packet Transmissions." 2018 IEEE Global Communications Conference (GLOBECOM). IEEE, 2018. https://doi.org/10.1109/GLOCOM.2018.8647968 [M-4] M. Shirvanimoghaddam, M. Condoluci, M. Dohler and S. Johnson. "On the fundamental limits of random non-orthogonal multiple access in cellular massive IoT." IEEE Journal on Selected Areas in Communications 35.10 (2017): 2238-2252. https://doi.org/10.1109/JSAC.2017.2724442 [M-5] M. B. Shahab, R. Abbas, M. Shirvanimoghaddam, and S. J. Johnson. "Grant-free Non- orthogonal Multiple Access for IoT: A Survey." arXiv preprint arXiv:1910.06529 (2019). ). https://arxiv.org/abs/1910.06529
  • 207. The University of Sydney References – (Cross-Layer) [C-6] C. She, C. Yang, and TQS Quek. "Cross-layer optimization for ultra-reliable and low- latency radio access networks." IEEE Transactions on Wireless Communications 17.1 (2017): 127-141. https://doi.org/10.1109/TWC.2017.2762684 [C-7] C. She, et al. "Cross-layer design for mission-critical iot in mobile edge computing systems." IEEE Internet of Things Journal (2019). https://doi.org/10.1109/JIOT.2019.2930983
  • 208. The University of Sydney References – (Network) [N-1] C. She, C. Yang, and T. Q. S. Quek, “Radio Resource Management for Ultra-reliable and Low- latency Communications,” IEEE Commun. Mag., Jun. 2017. https://doi.org/10.1109/MCOM.2017.1601092 [N-2] C. She, C. Yang, and T. Q. S. Quek, “Cross-layer Optimization for Ultra-reliable and Low-latency Radio Access Networks,” IEEE Trans. Wireless Commun., Jan. 2018. https://doi.org./10.1109/TWC.2017.2762684 [N-3] C. She, C. Yang, and T. Q. S. Quek, “Joint Uplink and Downlink Resource Configuration for Ultra-reliable and Low-latency Communications,” IEEE Trans. Commun., Jan. 2018. https://doi.org./10.1109/TCOMM.2018.2791598 [N-4] C. She, Z. Chen, C. Yang, T. Q. S. Quek, Y. Li and B. Vucetic, “Improving Available Range of Ultra-reliable and Low-latency Communications with Different Transmission Modes ”, IEEE Trans. on Commun., Nov. 2018. https://doi.org/10.1109/TCOMM.2018.2791598 [N-5] Z. Hou, C. She, Y. Li, T. Q. S. Quek, and B. Vucetic, “Burstiness Aware Bandwidth Reservation for Ultra-reliable and Low-latency Communications in Tactile Internet,” IEEE J. Sel. Areas Commun., Nov. 2018. https://doi.org/10.1109/JSAC.2018.2874113 [N-6] C. Sun, C. She, C. Yang, T. Q. S. Quek, Y. Li, and B. Vucetic, "Optimizing Resource Allocation in Short Blocklength Regime for Ultra-reliable and Low-latency Communications", IEEE Trans. on Wireless Commun., Jan. 2019. https://doi.org/10.1109/TWC.2018.2880907 [N-7] C. She, C. Liu, T. Q. S. Quek, C. Yang, and Y. Li, "Ultra-reliable and Low-latency Communications in Unmanned Aerial Vehicle Communication Systems", IEEE Trans. on Commun., May 2019. https://doi.org/10.1109/TCOMM.2019.2896184
  • 209. The University of Sydney [N-8] Z. Hou, C. She, Y. Li, Z. Li, and B. Vucetic, “Prediction and Communication Co-design for Ultra-Reliable and Low-Latency Communications”, IEEE TWC, 2019. https://doi.org./10.1109/TWC.2019.2951660 [N-9] R. Dong, C. She, W. Hardjawana, Y. Li, and B. Vucetic, “Deep Learning for Radio Resource Allocation with Diverse Quality-of-Service Requirements in 5G” IEEE TWC, submitted. (Conference version accepted by IEEE Globecom 2019) https://arxiv.org/pdf/2004.00507.pdf [N-10] D. Feng, C. She, K. Ying, et al., "Towards Ultra-Reliable Low-Latency Communications: Typical Scenarios, Possible Solutions, and Open Issues", IEEE Veh. Tech. Mag., Jun. 2019. https://doi.org/10.1109/MVT.2019.2903657 [N-11] R. Dong, C. She, W. Hardjawana, Y. Li, and B. Vucetic, “Deep Learning for Hybrid 5G Services in Mobile Edge Computing Systems: Learn from a Digital Twin” IEEE Trans. on Wireless Commun., Oct., 2019. https://doi.org/10.1109/TWC.2019.2927312 [N-12] C. She, Y. Duan, G. Zhao, T. Q. S. Quek, Yonghui Li, and Branka Vucetic, "Cross-Layer Design for Mission-Critical IoT in Mobile Edge Computing Systems", IEEE Internet-of-Things J., early access, 2019. https://doi.org/10.1109/JIOT.2019.2930983 [N-13] C. Pradhan, A. Li, C. She, Y. Li, B. Vucetic, “Computation Offloading for IoT in C-RAN: Optimization and Deep Learning”, IEEE Trans. on Commun., submitted. https://arxiv.org/abs/1909.10696 [N-14] C. She, R. Dong, Z. Gu, et al., "Deep learning for Ultra-Reliable and Low-Latency Communications in 6G networks", IEEE Network, submitted. https://arxiv.org/abs/2002.11045 References – (Network)
  • 210. The University of Sydney Presenter Biographies
  • 211. The University of Sydney Professor Yonghui Li Yonghui Li is now a Professor in School of Electrical and Information Engineering, University of Sydney. He is the recipient of the Australian Queen Elizabeth II Fellowship in 2008 and the Australian Future Fellowship in 2012. His current research interests are in the area of wireless communications, with a particular focus on MIMO, millimeter wave communications, machine to machine communications, coding techniques and cooperative communications. He is Fellow of IEEE. https://sydney.edu.au/engineering/about/our-people/academic- staff/yonghui-li.html