2021
DOI: 10.1109/tvt.2021.3116432
|View full text |Cite
|
Sign up to set email alerts
|

A Downlink Puncturing Scheme for Simultaneous Transmission of URLLC and eMBB Traffic by Exploiting Data Similarity

Abstract: Ultra Reliable and Low Latency Communications (URLLC) is deemed to be an essential service in 5G systems and beyond (also called 6G) to accommodate a wide range of emerging applications with stringent latency and reliability requirements. Coexistence of URLLC alongside other service categories calls for developing spectrally efficient multiplexing techniques. Specifically, coupling URLLC and conventional enhanced Mobile BroadBand (eMBB) through superposition/puncturing naturally arises as a promising option du… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 20 publications
(7 citation statements)
references
References 38 publications
0
7
0
Order By: Relevance
“…Thus, an adjustment in rate splitting factor results URLLC sum-rate improvement based on average SNR rather than instantaneous channel state information (CSI). A eMBB-URLLC multiplexing technique for a downlink transmission scenario is proposed in [50] with an objective of reducing the size of punctured eMBB symbols by exploiting possible similarities between two types of symbols. For this, BS only scans the eMBB traffic symbols which are punctured by URLLC users that have maximum symbol similarity.…”
Section: A Networking Slicing Based Resource Allocationmentioning
confidence: 99%
See 1 more Smart Citation
“…Thus, an adjustment in rate splitting factor results URLLC sum-rate improvement based on average SNR rather than instantaneous channel state information (CSI). A eMBB-URLLC multiplexing technique for a downlink transmission scenario is proposed in [50] with an objective of reducing the size of punctured eMBB symbols by exploiting possible similarities between two types of symbols. For this, BS only scans the eMBB traffic symbols which are punctured by URLLC users that have maximum symbol similarity.…”
Section: A Networking Slicing Based Resource Allocationmentioning
confidence: 99%
“…For the eMBB and URLLC coexistence models, three main network slicing techniques have been utilized in various works in the literature: OMA, NOMA and RSMA. Works in [27], [47] and [48] demonstrated use of OMA and NOMA by adopting both puncturing and superposition schemes whereas [49], [50] and [52] used the RSMA as a superior network slicing technique than OMA and NOMA. Orthogonalization and decoding interference are the traditional techniques to mitigate the interference in OMA and NOMA respectively.…”
Section: Lessons Learnedmentioning
confidence: 99%
“…We focus, in this work, on downlink scheduling, similarly to the majority of the existing related works in the literature, e.g., [13]- [23]. The system model and the scheduling framework follow the structure of [1], [8].…”
Section: B Scheduling Problem Formulationmentioning
confidence: 99%
“…The above operation is described in Lines 1-3. Afterwards, in Line 4, we remove the overlapping blocks with the higher aggregated throughput loss (within each category), using (13).…”
Section: B Heuristic Inspired From Bin Packing Optimizationmentioning
confidence: 99%
See 1 more Smart Citation