Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

5G FOR ULTRA-RELIABLE LOW-LATENCY COMMUNICATIONS

Wireless Access for Ultra-Reliable Low-Latency Communication:


Principles and Building Blocks
Petar Popovski, Jimmy J. Nielsen, Čedomir Stefanović, Elisabeth de Carvalho, Erik Ström, Kasper F. Trillingsgaard, Alexandru-Sabin Bana, Dong Min Kim,
Radoslaw Kotaba, Jihong Park, and René B. Sørensen

Abstract munication theory and elaborating why a new


view is required. We then describe several import-
URLLC is an important new feature brought ant building blocks of a wireless communication
by 5G, with a potential to support a vast set of system for supporting URLLC connections: fram-
applications that rely on mission-critical links. ing/packetization, use of diversity, network topol-
In this article, we first discuss the principles for ogy, and access protocols. The objective of this
supporting URLLC from the perspective of the article is to describe their properties as essential
traditional assumptions and models applied in ingredients in practically any URLLC solution, rath-
communication/information theory. We then dis- er than combining them into a full proposal.
cuss how these principles are applied in various
elements of system design, such as use of various
diversity sources, design of packets, and access
Communication-Theoretic Principles for
protocols. The important message is that there is URLLC
a need to optimize the transmission of signaling The simple but seminal communication model
information, as well as a need for lean use of vari- by Shannon [3] captures the essential stochastic
ous sources of diversity. nature of a communication system. The key infor-
mation-theoretic result is that, given sufficiently
Introduction long time and sufficiently many communication
The big difference between the fifth generation channel uses, one can obtain almost a determinis-
(5G) and the previous generations of mobile wire- tic, error-free data transmission whose rate is dic-
less systems is that 5G is natively addressing two tated by the channel capacity. Here “sufficiently
generic modes of machine-type communications many” means that the law of large numbers (LLN)
(MTC): ultra-reliable low-latency communications averages out the stochastic variations. This is chal-
(URLLC) and massive MTC (mMTC). URLLC is lenged in URLLC in at least three aspects:
arguably the most innovative feature brought in • Due to the latency constraints, the number
5G, as it will be used for mission critical commu- of available channel uses is limited, such that
nications, like reliable remote action with robots the LLN cannot be put to work and offer
or coordination among vehicles. Ultra-reliable arbitrarily high reliability.
communication [1] is potentially an enabler of • Transmission of the actual data is only one
a vast set of applications, some of which are yet ingredient of the whole communication pro-
unknown. To put this in perspective, wireless tocol, which involves transmission/exchange
connectivity and embedded processing have sig- of metadata as well as other auxiliary proce-
nificantly transformed many products by expand- dures, including channel estimation, packet
ing functionality and transcending the traditional detection, additional protocol exchanges,
product boundaries [2]; for example, a product and so on.
stays connected to its manufacturer through its • The performance that can be guaranteed
lifetime for maintenance and update. Ultra-reli- depends on the model used during the
able connectivity brings this transformation to design, and URLLC requires that the models
the next level: Once a system designer can safely are considered in regimes not treated previ-
assume that wireless connectivity is “truly any- ously (e.g., very rare events).
where and anytime,” for example, guaranteed > In the following we elaborate on the principles
99.999 percent of the time, the approach to sys- to address these aspects, which set the basis for
tem design and operation changes fundamentally. the building blocks and the associated research
An example is Industrie 4.0, where different parts challenges.
of an object or a machine need not be physical-
ly attached as long as they can use mission-criti- Latency Constraints
cal ultra-reliable links to work in concert toward Latency is defined as the delay a packet (contain-
accomplishing a production task. ing a certain number of data bits) experiences
In this article, we first describe the principles from the ingress of a protocol layer at the trans-
for achieving wireless URLLC, relating them to the mitter to the egress of the same layer at the
traditional assumptions in information and com- receiver. Some packets will be dropped (i.e.,
Digital Object Identifier:
10.1109/MNET.2018.1700258 The authors are with Aalborg University, except for Erik Ström, who is with Chalmers University of Technology.

16 0890-8044/18/$25.00 © 2018 IEEE IEEE Network • March/April 2018


never delivered) due to buffer overflows, synchro-
nization failures, and so on. Moreover, we assume
that packets which are decoded in error are also Using the convention that dropped packets have infinite latency, we can define the reliability as the
dropped — either by the protocol itself or by probablility that the latency does not exceed a pre-described deadline.
higher layers. Using the convention that dropped
packets have infinite latency, we can define the
reliability as the probability that the latency does
not exceed a pre-described deadline. Figure 1
Pr{latency  x}
shows the generic requirement in terms of latency 1
and reliability, applicable not only to a point-to- Outage
Pe
point link, but also arbitrary communication setup.
The exact numbers on the deadline and the reli-
ability are application -dependent. We note that Reliability
the latency cumulative distribution function (CDF)
asymptote is equal to 1 – Pe, where Pe is the prob- Deadline x
ability of packet drop or packet error.
Clearly, high reliability implies low Pe, but the FIGURE 1. Relation between outage, reliability, laten-
opposite is not necessarily true, as in URLLC we cy, and deadline.
need to achieve low Pe in a time duration limited
by the deadline. The number of available chan- the number of channel uses for metadata N M
nel uses is (approximately) proportional to the is sufficiently large to guarantee high reliability,
product of the time duration and the bandwidth while it still holds that NM << N D. This does not
of the transmitted signal. Hence, by increasing hold in URLLC, since the data size is often small
the bandwidth, we obtain two advantages: more and comparable to the metadata size, and one
available channel uses and (typically) more fre- explicitly needs to optimize the coding/transmis-
quency diversity. Increasing bandwidth enables us sion of metadata.
to decrease the channel use time duration, or to Further, considering the high reliability levels
keep the duration fixed and to increase the num- treated in URLLC, such as > 99.999 percent, one
ber of channel uses in frequency. The trade-offs can no longer assume that the metadata trans-
arising in relation to the definition of time-frequen- mission, as well as all auxiliary procedures, are
cy resources are captured in the flexible numerol- perfectly reliable. To illustrate this, consider that
ogy used to design the 5G frames [4]. the probability of success for a given data packet
It is important to note a conceptual difference p, denoted by PS(p), is a product of the success
between increasing the channel uses in time probabilities for the data PS(D), metadata PS(M),
vs. frequency. Assume that Alice sends a pack- and the auxiliary procedures PS(A):
et to Bob by using a common packet structure
in which data is preceded by metadata. Let the PS(p) = PS(A)PS(M)PS(D) (1)
packet transmission consume N = NM + ND chan-
nel uses, where N M are intended for metadata This calculation assumes that each procedure
and ND for data. If the NM metadata channel uses is executed independent of the others and thus
precede the data channel uses, after decoding the each of them is designed separately to take
metadata, Bob can decide whether to continue to place over dedicated communication resources.
decode the data from the remaining ND channel However, in principle, one can gather all com-
uses (if he is the intended recipient of the data) munication resources and apply a joint design
or to shut down the receiver and save energy. of the three elements: auxiliary (A), metadata
Bob cannot save energy in the same way if these (M), and data (D). Denote the highest proba-
N channel uses occur in parallel in frequency, as bility of success that can be obtained in that
he needs to receive all symbols before deciding case by Q S (p, AMD). Clearly, Q S (p, AMD) ≥
if the packet is intended for him. This follows the PS(p), since PS(p) is obtained by using a specific
intuition that higher reliability necessarily leads to instance in which A, M, and D are separated.
higher energy expenditure. Why then do we not always use joint design of
Besides frequency, URLLC can rely on other A, M, and D? This is due to the layered approach
types of diversity, such as access point diversity to the communication system design, but also
due to densification, spatial diversity due to mas- due to energy consumption, discussed in relation
sive number of antennas, and interface diversity. to frequency diversity as well. Namely, in the
Further elaboration on these is given later. common system design, the decoding of data
and metadata is causally dependent on the suc-
Metadata , Auxiliary Procedures, and cessful completion of the auxiliary procedures
Protocol Exchanges (e.g., detection that the packet is there), and,
The capacity results of information theory implic- likewise, the decoding of data is causally depen-
itly assume that when Alice transmits data to dent on the successful decoding of metadata. If
Bob, both of them know that the transmission is the receiver Bob detects that there is a packet,
taking place as well as when it starts and ends. it proceeds to decode the metadata and, if the
In practice, this information needs to be con- packet is relevant, to decode the data. When
veyed through transmission of metadata (con- A, M, and D are not separated by design, Bob
trol information). When the size of the data is needs to perform all the decoding steps and
much larger than the metadata, as in the classi- spend energy, although the received data may
cal information-theoretic setup, the amount of not be relevant for him.
resources (channel uses) spent on sending meta- The above discussion concerns a single pack-
data is negligible. Moreover, it is assumed that et transmission from Alice to Bob. However,

IEEE Network • March/April 2018 17


mission power or infrastructure. Therefore, proper
As an alternative to the conventional frame structure for downlink broadcast, the transmitter can jointly stochastic models of the wireless environment are
encode all messages into one packet, thereby leveraging the improved achievable rates when crucial for making URLLC affordable.
encoding larger messages. As a result, all messages can be delivered with the same reliability, Framing and Packetization
but with a shorter frame. As discussed above, when the sizes of the pre-
amble, the metadata, and the data are compara-
ble, it is no longer obvious that the conventional
the communication protocols often use multiple frame or packet structure is close to optimal. In
exchanges between the communicating parties. this regime, the channel capacity becomes an
One example is user authentication. As another inaccurate metric for assessing the necessary
example, if Bob is a base station (BS) to which blocklength required to achieve a certain reli-
Alice wants to transmit, Bob should send a packet ability. Instead, an essential quantity is the maxi-
that grants access to Alice, such that Alice can mum coding rate for which [5, references therein]
send her data.1 In a simple example, assume that developed nonasymptotic bounds and approxi-
Bob needs to grant access to Alice via packet p1, mations. For AWGN channels, the key result from
Alice sends her packet p2 to Bob, and finally Bob these works states that the maximum coding rate
sends an acknowledgment, p 3. The probability is subject to a backoff from the capacity that is
of success for the packet pi is denoted by PS(pi), approximately proportional to the square root of
incorporating in it the data and the auxiliary pro- the blocklength.
cedures. Here we cannot do the trick of jointly A recent study [6] has shown that for cases
encoding p 1, p 2, and p 3, since each of them is when channel state information (CSI) is unknown
sent by a different party! The overall probability and the channel uses are limited, there is an opti-
of success is mal size of the preamble used for CSI acquisition,
which depends on the reliability requirement, sig-
PS = PS(p1)PS(p2)PS(p3) (2) nal-to-noise ratio (SNR), frame length, and data
rate. This suggests that there might also be an
such that every additional protocol step decreases optimal trade-off between the amount of channel
the overall reliability. This has been noticed by uses used for detection and decoding, which may
researchers, giving rise to grant-free access proto- also depend on the reliability requirement, SNR,
cols. This simple analysis also shows that a system- and available channel uses. If the optimal size for
atic redesign of the protocols is required when the preamble becomes considerably large, joint
considering the ultra-reliability regime. encoding of training symbols and data symbols
The design of packets and access protocols in could prove to be a more suitable alternative for
the URLLC regime is further discussed below. achieving the latency-reliability requirements. This
is in the spirit of joint design of the auxiliary pro-
Use of Appropriate Stochastic Models cedures and data/metadata, discussed before.
The nature of communication systems and the Furthermore, the insights gained from finite
Shannon-like stochastic models can be used to blocklength information theory also allow for
provide reliability guarantees, provided that the rethinking the frame structure in multiuser sys-
model accurately captures the statistics of all rel- tems. Here we show how this structure can be
evant factors. A communication engineer usually changed for downlink transmissions to URLLC
models “known unknowns,”2 but the challenge devices. Specifically, consider a wireless system
of URLLC is that they require modeling of fac- serving multiple URLLC devices with short pack-
tors occurring very rarely (e.g., with probability ets using time-division multiple access (TDMA).
of 10–6) within the packet duration, if the target The BS serves the devices in frames with the
reliability is higher (e.g., outage probability in the aim of delivering independent messages to each
same period < 10 –7). Hence, there is a need to device with a certain reliability. In the convention-
consider factors that so far have been treated as al approach, depicted in Fig. 2a, the BS encodes
“unknown unknowns” in wireless design and per- each message into separate packets and orga-
formance evaluation. nizes them in a frame with a header containing
Specifically, consider a simple model for the pointers to each packet. This approach is optimal
signal at a single-antenna receiver: from an information-theoretic perspective when
the messages are large, because each message
y = hx + z + w can be encoded with a rate close to the channel
1 This type of coordinated capacity. When the messages are small, however,
access is used in, for exam- where x is the transmitted signal, h is the channel the results from finite blocklength information the-
ple. Third Generation Partner-
ship Project (3GPP) cellular
coefficient, z is the noise, and w is the interfer- ory imply that the rate is subject to a backoff from
systems, but not in typical ence. By selecting licensed spectrum, the designer the channel capacity that is inversely proportional
WiFi deployments. makes w a known unknown. The noise z is there to the square root of the packet length, which is
to represent the stochastic fluctuations, but it is still a significant penalty for short packet communica-
2 Borrowed from the famous
a known unknown, as its variance is upper-bound- tions.
quote by D. Rumsfeld:
“There are known knowns;
ed. If h is known, w = 0, and the noise is Gauss- As an alternative to the conventional frame
there are things we know we ian, we get the classical Gaussian channel often structure for downlink broadcast, the transmitter
know. We also know there used to benchmark coding and transmission tech- can jointly encode all messages into one pack-
are known unknowns; that niques. However, accurate knowledge of h or et, thereby leveraging the improved achievable
is to say we know there are
some things we do not know.
its (tail) statistics is critical for URLLC. Using very rates when encoding larger messages. As a result,
But there are also unknown conservative estimates for the random factors h, all messages can be delivered with the same reli-
unknowns — the ones we z, and w to be able to guarantee high reliability ability, but with a shorter frame. We depict this
don’t know we don’t know.” may lead to very large margins in terms of trans- approach in Fig. 2b. The approach is not uniform-

18 IEEE Network • March/April 2018


ly better than the conventional one, though, as it
requires that each device receives and decodes Header Header
the full packet containing all messages. From a
device perspective, this implies increased power Packet 1 Packet 2 Packet 3 Packet 4 Packet 5 Packet 1 Packet 2
consumption, which is not desirable for devices (a) (b)
with power constraints. Finally, the two approach-
es can be considered the extremes of a trade-off FIGURE 2. Two approaches to structuring a frame with a header and messages
between frame duration and power consumption M1, … , M4 to four devices: a) each message is encoded into a separate
at the devices. In this context, finite blocklength packet; b) all messages are jointly encoded in a single packet.
information theory can help in finding the optimal
operating point on this trade-off curve, a problem
addressed in greater detail in [7]. but remains critical. For URLLC it is preferable
to depart from the conventional use of instan-
Types of Diversity taneous CSIT, so the question is how to benefit
Diversity with respect to paths can be achieved from the large number of transmit antennas for
both through using multiple antennas and by downlink transmission. One solution consists of
using multiple communication interfaces and beamforming based on the multipath structure
technologies. These complementary techniques of the channel, which varies on a large scale.
are presented in the following. This structure can be estimated via the covari-
ance matrix of the vectorial received signal from
Multi -Antenna Diversity which directions of arrival or singular vectors are
It is well understood that multiple antennas at determined. For example, a directional beam with
the BS or terminals are instrumental to guaran- an angular spread encompassing a subset of the
tee reliable and low-latency communications. The directional propagation paths can be formed. This
extreme number of spatial degrees of freedom results in a less precise beam, sacrificing the SNR
present in massive multiple-input multiple-output and thus the rate, but gaining in latency (short
(MIMO) can potentially be a significant contribu- auxiliary procedure) and robustness to serve mul-
tor to URLLC. Indeed, the remarkable properties tiple terminals. Furthermore, when multiple termi-
of massive MIMO that are tailored for URLLC are: nals are served in the downlink, the design of a
• Very high SNR links joint CSI acquisition procedure for all of them and
• Quasi-deterministic links, quasi-immune to adjusting the beams to the broadcast transmis-
fading sion is parallel to the ideas of joint data/metadata
• Extreme spatial multiplexing capability encoding discussed in the previous section.
The first property occurs due to the array gain. Uplink: Coherent vs. Non-Coherent Recep-
Along with the second property, it relaxes the tion: Since the pilots are sent in the uplink along
need for strong coding schemes, hence maintain- with the data, there is less delay involved in CSI at
ing high reliability for shorter packets, and can the receiver (CSIR) acquisition. Coherent multi-an-
dramatically reduce retransmission occurrences. tenna processing can be employed at the receiv-
The second and third properties are each ground- er under low-mobility conditions [8]. Hence, the
ed in the ability of multiple antennas to create massive spatial multiplexing capabilities of mas-
spatial diversity paths. With hundreds of anten- sive MIMO can be exploited to accommodate
nas at a massive BS, hundreds of spatial diversity massive connectivity in the uplink. In URLLC, the
paths can be created if the propagation channel processing delay to separate the signals from the
offers enough scattering. In practice, if the propa- different devices might become critical and has to
gation channel provides an order of tens of diver- be accounted for, especially when the number of
sity paths, it is sufficient to offer statistically stable multiplexed devices grows.
links. In high-mobility scenarios, non-coherent com-
Nevertheless, the benefits of massive MIMO munications may offer better performance with-
are conditioned on the acquisition of the instan- out requiring precise CSI, even in multi-device
taneous CSI, particularly at the massive BS. Using communications. In high-mobility or low-SNR sce-
the terminology from above, massive MIMO is narios, fulfilling the requirements of URLLC might
critically dependent on the reliability/latency of require shifting to a basic TDMA system with
the auxiliary procedures. In a mobile environment non-coherent receivers based on energy detec-
constrained by channel coherence time as well as tion (ED) [9]. In massive MIMO, ED has advan-
extreme latency requirements, instantaneous CSI tageous features, as channel and noise energy
acquisition becomes the most severe limitation becomes deterministic and offers stable perfor-
to achieve URLLC. In the general multi-device mance.
massive MIMO URLLC framework, reliability and Simulations of a single-input multiple-output
latency are characterized by a trade-off between (SIMO) system with 128 antennas at the receiver
spatial diversity and multiplexing, as well as laten- have been performed, where the mobility is mod-
cy due to CSI acquisition or possibly to multiple eled as an imperfection of the received channel
antenna processing. estimate. Figure 3 shows that mobility enables a
Downlink: Beamforming Based on Chan- couple of orders of magnitude improvement of
nel Structure: Acquisition of the instantaneous the symbol error rate (SER) when using non-co-
CSI at the transmitter (CSIT) is a nontrivial task herent ED compared to coherent maximum ratio
for multi-antenna systems. In frequency-division combining (MRC). A mobility index s = 0 means
duplex (FDD) systems, it requires a feedback loop no mobility, that is, the channel coefficients do
from the terminals, inducing a significant laten- not change from the training symbol to the data
cy. In time-division duplex (TDD), latency can symbol, whereas s = 1 means no correlation
still be reduced by exploiting channel reciprocity, between the channel and the estimate.

IEEE Network • March/April 2018 19


Release-12. This technique allows for bearer- or
-6 3 packet-level split of traffic flows between a master
-5 2.5 eNB and secondary eNB for enhanced through-
put. Discussions are ongoing in 3GPP to enable
2
-4 data duplication for URLLC in multi-connectivity
-3
1.5 scenarios [10].
1 An example of the achievable latency and
-2 reliability performance of multi-interface commu-
0.5 nication is shown in Fig. 4, depicting the perfor-
SNR (dB)

-1
0 mance of LTE, HSPA, and WiFi in different single
0 link and PD configurations. The results are based
-0.5
1
on applying the different configurations in a sim-
-1 ulation, where full-day measurement traces of
2 -1.5 packet latency of the different technologies are
played back simultaneously. The measurements
3 -2 have been obtained on a typical weekday at the
4 -2.5 Aalborg University campus.
While the LTE+WiFi and HSPA+WiFi PD con-
5 -3
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 SER gain figurations achieve very low latency ( 10 ms)
at 0.9 reliability, both perform relatively badly in
the high reliability domains (0.9999–0.99999)
FIGURE 3. Heat plot showing SER gain expressed in orders of magnitude by using with latencies above 100 ms. In comparison, the
non-coherent ED compared to coherent MRC, with respect to SNR and the LTE+HSPA and LTE+HSPA+WiFi configurations
mobility index s. achieve around 60 ms and 40 ms, respectively.

Network Topology
0.99999
RTT Another determining factor for URLLC is the way
in which devices are connected, that is, the net-
LTE work topology.
HSPA
0.9999 Wi-Fi Base Station Densification
PD LTE+HSPA BS densification is important for achieving ubiqui-
PD LTE+Wi-Fi tous reliable connectivity, allowing users to have
PD HSPA+Wi-Fi the best associations out of their many neighbor-
0.999
PD LTE+HSPA+Wi-Fi ing BSs. This contributes to URLLC in three ways:
short association distance, per-user resource allo-
cation increase, and multiple associations.
The decrease in BS-user association distance
0.99 mitigates the propagation loss, which is import-
ant for the most severely affected users. In the
noise-limited regime, where aggregate interfer-
0.9 ence is negligible compared to noise, network
densification increases the desired signal power
and improves the reliability. For the interfer-
ence-limited regime, the short propagation dis-
0 tances increase not only the desired signal power
1 2 5 10 20 50 100 200 500 but also the interference that may be generat-
l (ms) ed by numerous neighboring BSs. Nevertheless,
the desired signal power increase dominates the
FIGURE 4. Achievable reliability (y-axis) for different round-trip latencies (x-axis) of increase of interference due to the path loss,
packet duplication (PD) across multiple communication interfaces. which follows a power-law. Overall, network
densification thereby increases signal-to-interfer-
ence-plus-noise ratio (SINR) for all users [11].
Interface Diversity Network densification also leads to resource
Without intervening at the physical layer, diversity reuse and increases per-user resource allocation.
can be achieved through the use of multiple links This resource increment can be directly utilized for
and/or communication interfaces. Assuming that latency reduction. Alternatively, it can be dedicat-
a URLLC application uses UDP, since the latency ed to diversity for reliability enhancement. Finally,
budget does not allow transport layer retransmis- network densification makes BSs more likely to
sions, multi-interface diversity is easily achieved have a few or even no associated users within
by duplicating the application’s data packets and their coverage, especially in ultra-dense network
transmitting those through sockets attached to setups where the BS density exceeds user density.
different communication interfaces, for exam- Such user-void BSs are expected to be in an idle
ple, LTE, HSPA, and WiFi. Since the experienced state, not sending data signals for energy efficien-
latency is determined by the first arriving packet, cy, but may provide extra associations for URLLC
interface diversity with packet duplication (PD) users. However, this increases the downlink inter-
leads to an increase in reliability and lowering of ference from the awakened BSs, which can be
latency. mitigated by cooperation between neighboring
The concept of multi-interface diversity relates BSs. Consider two neighboring BSs that are inter-
to 3GPP’s dual connectivity, introduced in LTE connected through a high-speed backhaul, thanks

20 IEEE Network • March/April 2018


to their short inter-BS distance after densification.
30
In order to illustrate the concept, assume that the
No cooperation (all low-latency users)
network features two types of users: low-latency BS cooperation (all low-latency users)
users and latency-tolerant users. By exchanging BS cooperation (mixed low-latency and latency-tolerant users)
data signals and association information, these 25
two BSs can serve their users concurrently with-

Average latency of low-latency users (ms)


out incurring interference. This can be achieved
by utilizing interference cancellation or prioritizing
the transmission of low-latency users [12]. Fig- 20
ure 5 shows its effectiveness in average latency
reduction.

Device -to-Device Communication 15


Traditional cellular communication follows an
uplink-downlink topology, regardless of the end
device’s location. However, LTE Release-12
and 5G also support device-to-device (D2D) 10
communications, where physically close devic-
es (e.g., two vehicles) can communicate directly
over a so-called sidelink. Compared to regular
uplink-downlink communication, D2D communi- 5
0.005 0.01 0.015 0.02 0.025 0.03 0.035 0.04
cations benefits from a shorter link distance and
BS density (BSs/km2 )
fewer hops, which is beneficial from a reliability
perspective. Moreover, since communication is
FIGURE 5. Average latency reduction from BS densification (x-axis) and extra asso-
direct (i.e., without intermediate nodes), D2D has
ciations with BS cooperation (blue triangle and black star) for user density
the potential to provide very low latency.
0.01.
Access Protocols
Access networking represents a critical segment
for development of URLLC services in cellu-
Up to a 3-symbol-long
lar networks. In this context, 3GPP follows the mini-slot can be
standard design approach exposed previously, scheduled in this region
separately addressing the control plane (i.e.,
metadata and auxiliary) procedures and user
plane (data) procedures, foreseeing that 5G Up to a 2-symbol-long
radio access should be able to provide URLLC mini-slot can be
services with average control plane latency of scheduled in this region
10 ms, average user plane latency of 0.5 ms,
and reliability of 99.999 percent for 32-byte-
long packets with latency of up to 1 ms [13]. Position of CRS pilot
The performance of current cellular access net- symbols in LTE
works is far from these goals [13]. Also, some
of the verticals impose reliability and latency Slot Slot
requirements that may challenge the target 5G FIGURE 6. An example of scheduling mini-slots within a regular slot by preempting
URLLC performance. For instance, factory auto- some of its content. Some restrictions should be considered, for example,
mation, an important use case in Industrie 4.0, mini-slots cannot replace pilot symbols and/or control data (which is placed
may, according to some sources, require reli- at the beginning of the slot).
ability of 1 – 10–9 (!) with 0.5 ms of user plane
end-to-end latency [14]. Note that user plane
end-to-end latency relates only to (one-way) ing a portion of the eMBB data operating with
communication delay between the source-des- traditional slot-level granularity.
tination pair and, as such, is just a part of the On the other hand, supporting URLLC require-
cycle time in industrial applications; cycle time ments in the uplink is rather challenging. Current-
is the delay from the issuing of a command by ly, uplink transmissions are subject to resource
the controller until the feedback from the actu- reservation procedures with numerous stages and
ator is received, involving all processing, actuat- heavy signaling, which has a tremendous impact
ing, and sensing times [10]. on latency and reliability. In this respect, ongoing
As noted above, the primary method to reduce work in 3GPP considers design of control plane
latency in 5G radio access will be the use of novel procedures exploiting pre-established contexts
numerology and shortening of transmission times. among devices requiring URLLC service and the
In the downlink, latency could be further reduced BS by means of pre-configured/semi-persistent
by providing instant access to URLLC traffic at scheduling. However, such a solution is suitable
the expense of service performance of the other for devices with predictable traffic patterns, but
traffic types. Indeed, the 3GPP proposes a new otherwise exhibits low efficiency. Also, it applies
unit of scheduling called a mini-slot (Fig. 6), which only to the resources for the initial transmission,
can be flexibly configured to last between 1–6 while any possible redundancy follows the stan-
orthogonal frequency-division multiplex (OFDM) dard, lengthy hybrid automatic repeat request
symbols (while standard slots are 7 symbols long) (HARQ) procedure. In the following, we outline
[15]. Using mini-slots, the arriving URLLC data can two potential approaches to access protocol
be immediately scheduled by the BS by preempt redesign for traffic patterns with less determinism.

IEEE Network • March/April 2018 21


the mutual interference of the active users’ trans-
Combining packetization/framing with the mechanism of beamforming in massive MIMO leads to the missions is controlled.
study of the trade-off of the reliability gains from the two blocks. Integration of various diversity
sources with a latency-constrained access protocol is another example of a relevant research
Conclusions
We have formulated the communication-theo-
direction implied by this article. retic principles of URLLC from the perspective
of the standard models for communication sys-
tem design based on the classical information/
Grant-Free Access communication theory. Besides the transmission
The main idea of grant-free access is to skip the techniques applied to send data, ultra-high reli-
reservation phase. This is a disruptive solution, ability brings into focus the methods to send
which is by default random and non-orthogo- metadata and carry out the other auxiliary pro-
nal, involving collisions among users’ transmis- cedures, such as packet detection. For URLLC
sions. Slotted ALOHA, the standard paradigm it is essential to invest in diversity, and the arti-
used for collision resolution, is not suitable for cle reviews promising approaches for doing so in
URLLC services due to its unfavorable latency/ the domains of device and network architecture,
reliability trade-off. The principal approach to as well as communication protocols. One of the
achieve reliability with low latency in the pres- key conclusions is that efficient support of URLLC
ence of collisions is again to rely on redundan- requires accurate modeling and rethinking of the
cy/diversity. For instance, a user could devote classical assumptions applied in communication
more bandwidth and/or power to a transmission system engineering. The future research directions
than would be necessary if there were no colli- should build on detailing the design of the build-
sions, thus making it more robust to interference. ing blocks and combining them toward a com-
In such a way, multi-packet reception (MPR) can plete URLLC solution that corresponds to a use
be achieved. Such an access scheme should also case, such as industrial automation. For example,
deal with collisions involving more transmissions combining packetization/framing with the mech-
than the MPR capability at the receiver. In this anism of beamforming in massive MIMO leads
respect, a promising approach is to proactively to the study of the trade-off of the reliability gains
transmit multiple packet replicas. Performance from the two blocks. Integration of various diver-
in this case can be further boosted using com- sity sources with a latency-constrained access pro-
bining techniques and/or using successive inter- tocol is another example of a relevant research
ference cancellation (SIC)on the replicas. This direction implied by this article.
approach is also useful to combat reception
errors due to noise. Acknowledgment
Finally, a full-blown grant-free cellular uplink The work has partly been supported by the Euro-
URLLC solution for the cases without any prior pean Research Council (ERC Consolidator Grant
context existing between the BS and the devic- no. 648382 WILLOW), and partly by the Horizon
es should also deal with user activity detection/ 2020 project ONE5G (ICT-760809).
identification and lack of CSI. Novel approach-
es advocate use of compressed sensing in this References
regard, where users prepend sequences to the [1] P. Popovski, “Ultra-Reliable Communication in 5G Wireless
transmitted data, which can be used for both the Systems,” Proc. 2014 1st IEEE Int’l. Conf. 5G for Ubiquitous
activity detection and channel estimation. Connectivity, 2014, pp. 146–51.
[2] M. E. Porter and J. E. Heppelmann, “How Smart, Connected
Coordinated Grant-Free Access Products Are Transforming Competition,” Harvard Business
Review, vol. 92, no. 11, 2014, pp. 64–88.
A certain compromise, tailored for the cases [3] C. E. Shannon, “A Mathematical Theory of Communication,
where the devices have a relatively high proba- Part I, Part II,” Bell Sys. Tech. J., vol. 27, 1948, pp. 623–56.
[4] K. Pedersen et al., “A Flexible Frame Structure for 5G Wide
bility of activation, would be a protocol in which Area,” Proc. VTC-Fall 2015, 2015, pp. 1–5.
users undergo a scheduling procedure only [5] Y. Polyanskiy, H. V. Poor, and S. Verdú, “Channel Coding
once, followed by infrequent updates from the Rate in the Finite Blocklength Regime,” IEEE Trans. Info. The-
BS. Scheduling information could consist of a ory, vol. 56, no. 5, May 2010, pp. 2307–59.
[6] G. Liva et al., “Short Codes with Mismatched Channel State
specific access pattern, or a seed to generate it, Information: A Case Study,” arXiv:1705.05528 [cs.IT], May
that would tell the user in which slots to transmit 2017.
the packet and its replicas without the need for [7] K. F. Trillingsgaard and P. Popovski, “Downlink Transmission
prior scheduling. The advantage of such solution of Short Packets: Framing and Control Information Revis-
ited,” IEEE Trans. Commun., vol. 65, no. 5, Feb. 2017, pp.
is the simplified detection procedure at the BS 2048–61.
compared to the fully random grant-free tech- [8] S. R. Panigrahi, N. Björsell, and M. Bengtsson, “Feasibility of
nique. Due to the limited amount of resources Large Antenna Arrays towards Low Latency Ultra Reliable
and transmissions consisting of potentially sev- Communication,” IEEE Int’l. Conf. Industrial Technology, Mar.
2017.
eral replicas per user, the access patterns need [9] L. Jing et al., “Design and Performance Analysis of Nonco-
not be orthogonal. In such a case, the coordi- herent Detection Systems with Massive Receiver Arrays,”
nated grant-free technique could benefit from IEEE Trans. Signal Processing, vol. 64, no. 19, Oct. 2016, pp.
the MPR, combining, and SIC mechanisms, as 5000–10.
[10] 3GPP, “Service Requirements for the 5G System,” TS
described earlier. In that case, the BS should 22.261 v16.1.0, 09 2017.
assign access patterns in such a way that these [11] J. Park et al., “Revisiting Frequency Reuse Towards Support-
mechanisms are best exploited to satisfy the ing Ultra-Reliable Ubiquitous-Rate Communication,” Proc.
URLLC requirements. We conclude by noting IEEE WiOpt Wksp. SpaSWiN, Paris, France, May 2017.
[12] D. M. Kim, H. Thomsen, and P. Popovski, “On a User-Cen-
that this approach is reminiscent of a code-divi- tric Base Station Cooperation Scheme for Reliable Commu-
sion multiple access system, where the users are nications,” Proc. IEEE VTC-Spring 2017, June 2017.
assigned codes (i.e., access patterns) such that [13] 3GPP, “TR 38.913 V14.3.0,” tech. rep., June 2017.

22 IEEE Network • March/April 2018


[14] A. Osseiran et al., “Manufacturing Reengineered: Robots, Gøteborg, Sweden, where he has been a professor in commu-
5G and the Industrial IoT,” Ericsson Business Review, issue 4, nication systems since 2003. He currently heads the Division for
2015; https://www.ericsson.com/assets/local/publications/ Communications Systems. His research interests include signal
ericsson-business-review/issue-4--2015/ebr-issue4-2015-in- processing and communication theory.
dustrial-iot.pdf, accessed 25 Aug. 2017.
[15] “TR 38.802 V14.1.0,” tech. rep., June 2017. Kasper F. Trillingsgaard [S’12] received his B.Sc. degree in
electrical engineering, M.Sc. degree in wireless communications,
Biographies and Ph.D degree in wireless communications from Aalborg Uni-
versity in 2011, 2013, and 2017, respectively. He is currently a
P etar P opovski [S’97, A’98, M’04, SM’10, F’16] is a profes- postdoctoral researcher at the same institution. He was a visiting
sor at Aalborg University, Denmark. He received his Dipl.-Ing./ student at New Jersey Institute of Technology in 2012 and at
Magister Ing. in communication engineering from Sts. Cyril and Chalmers University of Technology in 2014. His research inter-
Methodius University, Skopje, Macedonia, and his Ph.D. from ests are in the areas of information and communication theory.
Aalborg University. He received an ERC Consolidator Grant
(2015) and the Danish Elite Researcher award (2016). He is an A lexandru -S abin B ana [S’16] is currently studying toward a
Area Editor for IEEE Transactions on Wireless Communications. Ph.D. in wireless communications focused on massive antenna
His research interests are in wireless communications/networks arrays for ultra-reliable low-latency communications, which he
and communication theory. expects to finish in 2019. His research interests include machine-
type communication, ultra-reliable and low-latency communica-
Jimmy Jessen Nielsen [S’06, M’08] is an associate professor with tions, and signal processing.
the Department of Electronic Systems, Aalborg University. He
obtained his B.Sc., M.Sc., and Ph.D. in wireless communications Dong Min Kim [M’16] is a postdoctoral researcher at Aalborg
from Aalborg University. His research interests include reliable University. He received his B.S. and Ph.D. degrees in electrical
and low-latency communications for IoT and machine-type com- and electronic engineering from Yonsei University, Seoul, Korea,
munications. in 2007 and 2014, respectively. His research interests include
machine-to-machine communications, ultra-reliable low-latency
Čedomir Stefanović [S’04, M’11, SM’17] received his Dipl.- communications, and IoT technologies.
Ing., Mr.-Ing., and Ph.D. degrees in electrical engineering from
the University of Novi Sad, Serbia. He is currently an associate Radoslaw Kotaba is an industrial Ph.D. student at Intel Mobile
professor at the Department of Electronic Systems, Aalborg Uni- Communications, Denmark, currently pursuing a Ph.D. degree
versity. In 2014 he was awarded an individual postdoc grant by in wireless communications at Aalborg University He obtained
the Danish Council for Independent Research (Det Frie Forsk- his M.Sc. from AGH University of Science and Technology in
ningsrd). His research interests include communication theory, Krakow, Poland. His research interests are on random access
and wireless and smart grid communications. protocols and device-to-device communications.

Elisabeth de Carvalho is a professor at Aalborg University. She Jihong Park is a postdoctoral researcher at Aalborg University.
received a Ph.D. in electrical engineering from Telecom Paris- He received his B.S. and Ph.D. degrees in electrical and elec-
Tech, France. She was a postdoctoral fellow at Stanford Univer- tronic engineering, in 2009 and 2016, respectively, from Yonsei
sity, California, and then worked in industry in the field of DSL University. His research interests include ultra-dense/ultra-reli-
and wireless LAN. She is a coauthor of the textbook A Practical able/massive-MIMO system designs.
Guide to the MIMO Radio Channel. Her main research interests
are in signal processing for wireless communications. René B. Sørensen [S’16] is currently pursuing a Ph.D. in commu-
nication methods for machine-type communications and Inter-
Erik G. Ström [S’93, M’95, SM’01] received his Ph.D. degree in net of Things, which he expects to finish in 2019. His research
electrical engineering from the University of Florida, Gainesville, interests include IoT protocols and architecture, applications,
in 1994. In 1996, he joined Chalmers University of Technology, and edge computing.

IEEE Network • March/April 2018 23

You might also like