Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (24)

Search Parameters:
Keywords = finite blocklength

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
23 pages, 4594 KiB  
Article
Minimization of Resource Consumption with URLLC Constraints for Relay-Assisted IIoT
by Yujie Zhao, Tao Peng, Yichen Guo, Yijing Niu and Wenbo Wang
Sensors 2025, 25(15), 4846; https://doi.org/10.3390/s25154846 - 6 Aug 2025
Viewed by 199
Abstract
In relay-assisted Industrial Internet of Things (IIoT) systems with ultra-reliable low-latency communication (uRLLC) requirements, finite blocklength coding imposes stringent resource constraints. In this work, the packet error probability (PEP) and blocklength allocation across two-hop links are jointly optimized to minimize total blocklength (resource [...] Read more.
In relay-assisted Industrial Internet of Things (IIoT) systems with ultra-reliable low-latency communication (uRLLC) requirements, finite blocklength coding imposes stringent resource constraints. In this work, the packet error probability (PEP) and blocklength allocation across two-hop links are jointly optimized to minimize total blocklength (resource consumption) while satisfying reliability, latency, and throughput requirements. The original multi-variable problem is decomposed into two tractable subproblems. In the first subproblem, for a fixed total blocklength, the achievable rate is maximized. A near-optimal PEP is first derived via theoretical analysis. Subsequently, theoretical analysis proves that blocklength must be optimized to equalize the achievable rates between the two hops to maximize system performance. Consequently, the closed-form solution to optimal blocklength allocation is derived. In the second subproblem, the total blocklength is minimized via a bisection search method. Simulation results show that by adopting near-optimal PEPs, our approach reduces computation time by two orders of magnitude while limiting the achievable rate loss to within 1% compared to the exhaustive search method. At peak rates, the hop with superior channel conditions requires fewer resources. Compared with three baseline algorithms, the proposed algorithm achieves average resource savings of 21.40%, 14.03%, and 17.18%, respectively. Full article
Show Figures

Figure 1

18 pages, 1468 KiB  
Article
Minimization of Average Peak Age of Information for Timely Status Updates in Two-Hop IoT Networks
by Jin-Ho Chung and Yoora Kim
Appl. Sci. 2025, 15(13), 7042; https://doi.org/10.3390/app15137042 - 23 Jun 2025
Viewed by 275
Abstract
Timely status updates are essential for Internet of Things (IoT) services. The freshness of these updates can be quantified using Age of Information (AoI). The worst-case behavior of AoI is evaluated by peak AoI (PAoI), denoting the maximum AoI just before each successful [...] Read more.
Timely status updates are essential for Internet of Things (IoT) services. The freshness of these updates can be quantified using Age of Information (AoI). The worst-case behavior of AoI is evaluated by peak AoI (PAoI), denoting the maximum AoI just before each successful update. To characterize the time-averaged evolution of the PAoI over a long time horizon, we adopt the average PAoI as a performance metric. In this paper, we consider a two-hop status update system in IoT monitoring networks, where sensors periodically transmit short status packets to a remote edge server via a sink node. The sink node encodes status packets received from multiple sensors into a single longer packet to enhance the transmission reliability of short-packet communications. Here, we analyze the average PAoI in this setup as a function of system parameters and minimize this function by jointly optimizing three key parameters: (i) the number of status packets for joint coding at the sink node, (ii) the blocklength of a status packet in the first hop, and (iii) the blocklength of a coded packet in the second hop. Through numerical studies, we demonstrate the effectiveness of the proposed optimization in reducing the average PAoI. Full article
(This article belongs to the Special Issue Future Information & Communication Engineering 2024)
Show Figures

Figure 1

17 pages, 1320 KiB  
Article
Finite-Blocklength Analysis of Coded Modulation with Retransmission
by Ming Jiang, Yi Wang, Fan Ding and Qiushi Xu
Entropy 2024, 26(10), 863; https://doi.org/10.3390/e26100863 - 14 Oct 2024
Viewed by 1037
Abstract
The rapid developments of 5G and B5G networks have posed higher demands on retransmission in certain scenarios. This article reviews classical finite-length coding performance prediction formulas and proposes rate prediction formulas for coded modulation retransmission scenarios. Specifically, we demonstrate that a recently proposed [...] Read more.
The rapid developments of 5G and B5G networks have posed higher demands on retransmission in certain scenarios. This article reviews classical finite-length coding performance prediction formulas and proposes rate prediction formulas for coded modulation retransmission scenarios. Specifically, we demonstrate that a recently proposed model for correcting these prediction formulas also exhibits high accuracy in coded modulation retransmissions. To enhance the generality of this model, we introduce a range variable Pfinal to unify the predictions with different SNRs. Finally, based on simulation results, the article puts forth recommendations specific to retransmission with a high spectral efficiency. Full article
(This article belongs to the Special Issue Information Theory and Network Coding II)
Show Figures

Figure 1

28 pages, 16386 KiB  
Article
Ultra-Reliable and Low-Latency Wireless Hierarchical Federated Learning: Performance Analysis
by Haonan Zhang, Peng Xu and Bin Dai
Entropy 2024, 26(10), 827; https://doi.org/10.3390/e26100827 - 29 Sep 2024
Cited by 1 | Viewed by 1179
Abstract
Wireless hierarchical federated learning (WHFL) is an implementation of wireless federated Learning (WFL) on a cloud–edge–client hierarchical architecture that accelerates model training and achieves more favorable trade-offs between communication and computation. However, due to the broadcast nature of wireless communication, the WHFL is [...] Read more.
Wireless hierarchical federated learning (WHFL) is an implementation of wireless federated Learning (WFL) on a cloud–edge–client hierarchical architecture that accelerates model training and achieves more favorable trade-offs between communication and computation. However, due to the broadcast nature of wireless communication, the WHFL is susceptible to eavesdropping during the training process. Apart from this, recently ultra-reliable and low-latency communication (URLLC) has received much attention since it serves as a critical communication service in current 5G and upcoming 6G, and this motivates us to study the URLLC-WHFL in the presence of physical layer security (PLS) issue. In this paper, we propose a secure finite block-length (FBL) approach for the multi-antenna URLLC-WHFL, and characterize the relationship between privacy, utility, and PLS of the proposed scheme. Simulation results show that when the eavesdropper’s CSI is perfectly known by the edge server, our proposed FBL approach not only almost achieves perfect secrecy but also does not affect learning performance, and further shows the robustness of our schemes against imperfect CSI of the eavesdropper’s channel. This paper provides a new method for the URLLC-WHFL in the presence of PLS. Full article
Show Figures

Figure 1

23 pages, 1762 KiB  
Article
Dynamic Framing and Power Allocation for Real-Time Wireless Networks with Variable-Length Coding: A Tandem Queue Approach
by Yuanrui Liu, Xiaoyu Zhao, Wei Chen and Ying-Jun Angela Zhang
Network 2024, 4(3), 367-389; https://doi.org/10.3390/network4030017 - 27 Aug 2024
Viewed by 1120
Abstract
Ensuring high reliability and low latency poses challenges for numerous applications that require rigid performance guarantees, such as industrial automation and autonomous vehicles. Our research primarily concentrates on addressing the real-time requirements of ultra-reliable low-latency communication (URLLC). Specifically, we tackle the challenge of [...] Read more.
Ensuring high reliability and low latency poses challenges for numerous applications that require rigid performance guarantees, such as industrial automation and autonomous vehicles. Our research primarily concentrates on addressing the real-time requirements of ultra-reliable low-latency communication (URLLC). Specifically, we tackle the challenge of hard delay constraints in real-time transmission systems, overcoming this obstacle through a finite blocklength coding scheme. In the physical layer, we encode randomly arriving packets using a variable-length coding scheme and transmit the encoded symbols by truncated channel inversion over parallel channels. In the network layer, we model the encoding and transmission processes as tandem queues. These queues backlog the data bits waiting to be encoded and the encoded symbols to be transmitted, respectively. This way, we represent the system as a two-dimensional Markov chain. By focusing on instances when the symbol queue is empty, we simplify the Markov chain into a one-dimensional Markov chain, with the packet queue being the system state. This approach allows us to analytically express power consumption and formulate a power minimization problem under hard delay constraints. Finally, we propose a heuristic algorithm to solve the problem and provide an extensive evaluation of the trade-offs between the hard delay constraint and power consumption. Full article
Show Figures

Figure 1

19 pages, 1964 KiB  
Article
Minimizing Task Age upon Decision for Low-Latency MEC Networks Task Offloading with Action-Masked Deep Reinforcement Learning
by Zhouxi Jiang, Jianfeng Yang and Xun Gao
Sensors 2024, 24(9), 2812; https://doi.org/10.3390/s24092812 - 28 Apr 2024
Cited by 2 | Viewed by 1284
Abstract
In this paper, we consider a low-latency Mobile Edge Computing (MEC) network where multiple User Equipment (UE) wirelessly reports to a decision-making edge server. At the same time, the transmissions are operated with Finite Blocklength (FBL) codes to achieve low-latency transmission. We introduce [...] Read more.
In this paper, we consider a low-latency Mobile Edge Computing (MEC) network where multiple User Equipment (UE) wirelessly reports to a decision-making edge server. At the same time, the transmissions are operated with Finite Blocklength (FBL) codes to achieve low-latency transmission. We introduce the task of Age upon Decision (AuD) aimed at the timeliness of tasks used for decision-making, which highlights the timeliness of the information at decision-making moments. For the case in which dynamic task generation and random fading channels are considered, we provide a task AuD minimization design by jointly selecting UE and allocating blocklength. In particular, to solve the task AuD minimization problem, we transform the optimization problem to a Markov Decision Process problem and propose an Error Probability-Controlled Action-Masked Proximal Policy Optimization (EMPPO) algorithm. Via simulation, we show that the proposed design achieves a lower AuD than baseline methods across various network conditions, especially in scenarios with significant channel Signal-to-Noise Ratio (SNR) differences and low average SNR, which shows the robustness of EMPPO and its potential for real-time applications. Full article
(This article belongs to the Special Issue Edge Computing in IoT Networks Based on Artificial Intelligence)
Show Figures

Figure 1

24 pages, 967 KiB  
Article
Effective Energy Efficiency under Delay–Outage Probability Constraints and F-Composite Fading
by Fahad Qasmi, Irfan Muhammad, Hirley Alves and Matti Latva-aho
Sensors 2024, 24(7), 2328; https://doi.org/10.3390/s24072328 - 6 Apr 2024
Viewed by 1331
Abstract
The paradigm of the Next Generation cellular network (6G) and beyond is machine-type communications (MTCs), where numerous Internet of Things (IoT) devices operate autonomously without human intervention over wireless channels. IoT’s autonomous and energy-intensive characteristics highlight effective energy efficiency (EEE) as a crucial [...] Read more.
The paradigm of the Next Generation cellular network (6G) and beyond is machine-type communications (MTCs), where numerous Internet of Things (IoT) devices operate autonomously without human intervention over wireless channels. IoT’s autonomous and energy-intensive characteristics highlight effective energy efficiency (EEE) as a crucial key performance indicator (KPI) of 6G. However, there is a lack of investigation on the EEE of random arrival traffic, which is the underlying platform for MTCs. In this work, we explore the distinct characteristics of F-composite fading channels, which specify the combined impact of multipath fading and shadowing. Furthermore, we evaluate the EEE over such fading under a finite blocklength regime and QoS constraints where IoT applications generate constant and sporadic traffic. We consider a point-to-point buffer-aided communication system model, where (1) an uplink transmission under a finite blocklength regime is examined; (2) we make realistic assumptions regarding the perfect channel state information (CSI) available at the receiver, and the channel is characterized by the F-composite fading model; and (3) due to its effectiveness and tractability, application data are found to have an average arrival rate calculated using Markovian sources models. To this end, we derive an exact closed-form expression for outage probability and the effective rate, which provides an accurate approximation for our analysis. Moreover, we determine the arrival and required service rates that satisfy the QoS constraints by applying effective bandwidth and capacity theories. The EEE is shown to be quasiconcave, with a trade-off between the transmit power and the rate for maximising the EEE. Measuring the impact of transmission power or rate individually is quite complex, but this complexity is further intensified when both variables are considered simultaneously. Thus, we formulate power allocation (PA) and rate allocation (RA) optimisation problems individually and jointly to maximise the EEE under a QoS constraint and solve such a problem numerically through a particle swarm optimization (PSO) algorithm. Finally, we examine the EEE performance in the context of line-of-sight and shadowing parameters. Full article
Show Figures

Figure 1

23 pages, 663 KiB  
Article
Joint Trajectory Design and Resource Optimization in UAV-Assisted Caching-Enabled Networks with Finite Blocklength Transmissions
by Yang Yang and Mustafa Cenk Gursoy
Drones 2024, 8(1), 12; https://doi.org/10.3390/drones8010012 - 4 Jan 2024
Cited by 2 | Viewed by 2251
Abstract
In this study, we design and analyze a reliability-oriented downlink wireless network assisted by unmanned aerial vehicles (UAVs). This network employs non-orthogonal multiple access (NOMA) transmission and finite blocklength (FBL) codes. In the network, ground user equipments (GUEs) request content from a remote [...] Read more.
In this study, we design and analyze a reliability-oriented downlink wireless network assisted by unmanned aerial vehicles (UAVs). This network employs non-orthogonal multiple access (NOMA) transmission and finite blocklength (FBL) codes. In the network, ground user equipments (GUEs) request content from a remote base station (BS), and there are no direct connections between the BS and the GUEs. To address this, we employ a UAV with a limited caching capacity to assist the BS in completing the communication. The UAV can either request uncached content from the BS and then serve the GUEs or directly transmit cached content to the GUEs. In this paper, we first introduce the decoding error rate within the FBL regime and explore caching policies for the UAV. Subsequently, we formulate an optimization problem aimed at minimizing the average maximum end-to-end decoding error rate across all GUEs while considering the coding length and maximum UAV transmission power constraints. We propose a two-step alternating optimization scheme embedded within a deep deterministic policy gradient (DDPG) algorithm to jointly determine the UAV trajectory and transmission power allocations, as well as blocklength of downloading phase, and our numerical results show that the combined learning-optimization algorithm efficiently addresses the considered problem. In particular, it is shown that a well-designed UAV trajectory, relaxing the FBL constraint, increasing the cache size, and providing a higher UAV transmission power budget all lead to improved performance. Full article
Show Figures

Figure 1

15 pages, 631 KiB  
Article
Optimizing Finite-Blocklength Nested Linear Secrecy Codes: Using the Worst Code to Find the Best Code
by Morteza Shoushtari and Willie Harrison
Entropy 2023, 25(10), 1456; https://doi.org/10.3390/e25101456 - 17 Oct 2023
Cited by 2 | Viewed by 1576
Abstract
Nested linear coding is a widely used technique in wireless communication systems for improving both security and reliability. Some parameters, such as the relative generalized Hamming weight and the relative dimension/length profile, can be used to characterize the performance of nested linear codes. [...] Read more.
Nested linear coding is a widely used technique in wireless communication systems for improving both security and reliability. Some parameters, such as the relative generalized Hamming weight and the relative dimension/length profile, can be used to characterize the performance of nested linear codes. In addition, the rank properties of generator and parity-check matrices can also precisely characterize their security performance. Despite this, finding optimal nested linear secrecy codes remains a challenge in the finite-blocklength regime, often requiring brute-force search methods. This paper investigates the properties of nested linear codes, introduces a new representation of the relative generalized Hamming weight, and proposes a novel method for finding the best nested linear secrecy code for the binary erasure wiretap channel by working from the worst nested linear secrecy code in the dual space. We demonstrate that our algorithm significantly outperforms the brute-force technique in terms of speed and efficiency. Full article
(This article belongs to the Special Issue Information Theory and Coding for Wireless Communications II)
Show Figures

Figure 1

19 pages, 979 KiB  
Article
Multi-Antenna Jammer-Assisted Secure Short Packet Communications in IoT Networks
by Dechuan Chen, Jin Li, Jianwei Hu, Xingang Zhang and Shuai Zhang
Future Internet 2023, 15(10), 320; https://doi.org/10.3390/fi15100320 - 26 Sep 2023
Cited by 1 | Viewed by 1783
Abstract
In this work, we exploit a multi-antenna cooperative jammer to enable secure short packet communications in Internet of Things (IoT) networks. Specifically, we propose three jamming schemes to combat eavesdropping, i.e., the zero forcing beamforming (ZFB) scheme, null-space artificial noise (NAN) scheme, and [...] Read more.
In this work, we exploit a multi-antenna cooperative jammer to enable secure short packet communications in Internet of Things (IoT) networks. Specifically, we propose three jamming schemes to combat eavesdropping, i.e., the zero forcing beamforming (ZFB) scheme, null-space artificial noise (NAN) scheme, and transmit antenna selection (TAS) scheme. Assuming Rayleigh fading, we derive new closed-form approximations for the secrecy throughput with finite blocklength coding. To gain further insights, we also analyze the asymptotic performance of the secrecy throughput in the case of infinite blocklength. Furthermore, we investigate the optimization problem in terms of maximizing the secrecy throughput with the latency and reliability constraints to determine the optimal blocklength. Simulation results validate the accuracy of the approximations and evaluate the impact of key parameters such as the jamming power and the number of antennas at the jammer on the secrecy throughput. Full article
Show Figures

Figure 1

12 pages, 515 KiB  
Article
Joint Design of Polar Coding and Physical Network Coding for Two−User Downlink Non−Orthogonal Multiple Access
by Zhaopeng Xie, Pingping Chen and Yong Li
Entropy 2023, 25(2), 233; https://doi.org/10.3390/e25020233 - 27 Jan 2023
Cited by 3 | Viewed by 1941
Abstract
In this paper, we propose a joint polar coding and physical network coding (PNC) for two−user downlink non−orthogonal multiple access (PN−DNOMA) channels, since the successive–interference–cancellation–aided polar decoding cannot be optimal for finite blocklength transmissions. In the proposed scheme, we first constructed the XORed [...] Read more.
In this paper, we propose a joint polar coding and physical network coding (PNC) for two−user downlink non−orthogonal multiple access (PN−DNOMA) channels, since the successive–interference–cancellation–aided polar decoding cannot be optimal for finite blocklength transmissions. In the proposed scheme, we first constructed the XORed message of two user messages. Then, the XORed message was superimposed with the message of the weak User 2 for broadcast. By doing so, we can utilize the PNC mapping rule and polar decoding to directly recover the message of User 1, while at User 2, we equivalently constructed a long−length polar decoder to obtain its user message. The channel polarization and decoding performance can be greatly improved for both users. Moreover, we optimized the power allocation of the two users with their channel conditions by considering the user fairness and the performance. The simulation results showed that the proposed PN−DNOMA can achieve performance gains of about 0.4−0.7 dB over the conventional schemes in two−user downlink NOMA systems. Full article
(This article belongs to the Special Issue Advances in Multiuser Information Theory)
Show Figures

Figure 1

14 pages, 409 KiB  
Article
Optimal Channel Training Design for Secure Short-Packet Communications
by Dechuan Chen, Jin Li, Jianwei Hu, Xingang Zhang and Shuai Zhang
Sensors 2023, 23(3), 1068; https://doi.org/10.3390/s23031068 - 17 Jan 2023
Viewed by 1765
Abstract
Physical layer security is a promising technique to ensure the confidentiality of short-packet communications, since no additional channel uses are needed. Motivated by the fact of finite coding blocklength in short-packet communications, we attempt to investigate the problem of how many the channel [...] Read more.
Physical layer security is a promising technique to ensure the confidentiality of short-packet communications, since no additional channel uses are needed. Motivated by the fact of finite coding blocklength in short-packet communications, we attempt to investigate the problem of how many the channel uses utilized for channel training should be allocated to perform secure communications. Based on the finite blocklength information theory, we derive a closed-form expression to approximate the average achievable secrecy throughput. To gain more insights, we also present the asymptotic average secrecy throughput under two special cases, i.e., high signal-to-noise ratio (SNR) and infinite blocklength. Moreover, we determine the optimal channel training length to maximize the average secrecy throughput under the reliability constraint and given blocklength. Numerical results are provided to validate the analysis and demonstrate that the performance gain achieved by the optimal channel training length is remarkable, relative to other benchmark schemes. Full article
Show Figures

Figure 1

32 pages, 1958 KiB  
Tutorial
An Information-Theoretic View of Mixed-Delay Traffic in 5G and 6G
by Homa Nikbakht, Michèle Wigger, Malcolm Egan, Shlomo Shamai (Shitz), Jean-Marie Gorce and H. Vincent Poor
Entropy 2022, 24(5), 637; https://doi.org/10.3390/e24050637 - 30 Apr 2022
Cited by 13 | Viewed by 3590
Abstract
Fifth generation mobile communication systems (5G) have to accommodate both Ultra-Reliable Low-Latency Communication (URLLC) and enhanced Mobile Broadband (eMBB) services. While eMBB applications support high data rates, URLLC services aim at guaranteeing low-latencies and high-reliabilities. eMBB and URLLC services are scheduled on the [...] Read more.
Fifth generation mobile communication systems (5G) have to accommodate both Ultra-Reliable Low-Latency Communication (URLLC) and enhanced Mobile Broadband (eMBB) services. While eMBB applications support high data rates, URLLC services aim at guaranteeing low-latencies and high-reliabilities. eMBB and URLLC services are scheduled on the same frequency band, where the different latency requirements of the communications render their coexistence challenging. In this survey, we review, from an information theoretic perspective, coding schemes that simultaneously accommodate URLLC and eMBB transmissions and show that they outperform traditional scheduling approaches. Various communication scenarios are considered, including point-to-point channels, broadcast channels, interference networks, cellular models, and cloud radio access networks (C-RANs). The main focus is on the set of rate pairs that can simultaneously be achieved for URLLC and eMBB messages, which captures well the tension between the two types of communications. We also discuss finite-blocklength results where the measure of interest is the set of error probability pairs that can simultaneously be achieved in the two communication regimes. Full article
(This article belongs to the Special Issue Wireless Networks: Information Theoretic Perspectives Ⅱ)
Show Figures

Figure 1

13 pages, 435 KiB  
Article
Effective Capacity Analysis of NOMA Networks with Short Packets
by Xiurong Zhang, Xinwei Yue and Shaoli Kang
Appl. Sci. 2021, 11(23), 11438; https://doi.org/10.3390/app112311438 - 2 Dec 2021
Cited by 5 | Viewed by 2386
Abstract
Low latency and a massive connection have become the requirements of energy internet wireless communication. Effective capacity analysis of non-orthogonal multiple access (NOMA) networks with short packets is of vital importance in energy internet communication planning and design. Low-latency communications are one of [...] Read more.
Low latency and a massive connection have become the requirements of energy internet wireless communication. Effective capacity analysis of non-orthogonal multiple access (NOMA) networks with short packets is of vital importance in energy internet communication planning and design. Low-latency communications are one of the main application scenarios in next-generation wireless networks. This paper focuses on the effective capacity of NOMA networks, where the finite blocklength, delay exponent, and transmission error probability are taken into account. New exact and asymptotic expressions of effective capacities are derived for arbitrarily ordered users with a finite blocklength. Based on the analytical results, the high Signal-to-Noise Ratio slopes of effective capacity in NOMA networks are carefully attained. The numerical results validate that (a) non-orthogonal users are capable of obtaining a larger effective capacity when the blocklength decreases, and that (b), as the value of the error probability and delay exponent increases, the effective capacity of non-orthogonal users worsens. Full article
(This article belongs to the Special Issue Energy System Planning and Design)
Show Figures

Figure 1

21 pages, 1006 KiB  
Article
Low-Latency Short-Packet Transmission over a Large Spatial Scale
by Lei Huang, Xiaoyu Zhao, Wei Chen and H. Vincent Poor
Entropy 2021, 23(7), 916; https://doi.org/10.3390/e23070916 - 19 Jul 2021
Cited by 6 | Viewed by 3542
Abstract
Short-packet transmission has attracted considerable attention due to its potential to achieve ultralow latency in automated driving, telesurgery, the Industrial Internet of Things (IIoT), and other applications emerging in the coming era of the Six-Generation (6G) wireless networks. In 6G systems, a paradigm-shifting [...] Read more.
Short-packet transmission has attracted considerable attention due to its potential to achieve ultralow latency in automated driving, telesurgery, the Industrial Internet of Things (IIoT), and other applications emerging in the coming era of the Six-Generation (6G) wireless networks. In 6G systems, a paradigm-shifting infrastructure is anticipated to provide seamless coverage by integrating low-Earth orbit (LEO) satellite networks, which enable long-distance wireless relaying. However, how to efficiently transmit short packets over a sizeable spatial scale remains open. In this paper, we are interested in low-latency short-packet transmissions between two distant nodes, in which neither propagation delay, nor propagation loss can be ignored. Decode-and-forward (DF) relays can be deployed to regenerate packets reliably during their delivery over a long distance, thereby reducing the signal-to-noise ratio (SNR) loss. However, they also cause decoding delay in each hop, the sum of which may become large and cannot be ignored given the stringent latency constraints. This paper presents an optimal relay deployment to minimize the error probability while meeting both the latency and transmission power constraints. Based on an asymptotic analysis, a theoretical performance bound for distant short-packet transmission is also characterized by the optimal distance–latency–reliability tradeoff, which is expected to provide insights into designing integrated LEO satellite communications in 6G. Full article
(This article belongs to the Special Issue Short Packet Communications for 5G and Beyond)
Show Figures

Figure 1

Back to TopTop