Coexistence Mechanism between eMBB and uRLLC in 5G Wireless Networks
Abstract
uRLLC and eMBB are two influential services of the emerging 5G cellular network. Latency and reliability are major concerns for uRLLC applications, whereas eMBB services claim for the maximum data rates. Owing to the trade-off among latency, reliability and spectral efficiency, sharing of radio resources between eMBB and uRLLC services, heads to a challenging scheduling dilemma. In this paper, we study the co-scheduling problem of eMBB and uRLLC traffic based upon the puncturing technique. Precisely, we formulate an optimization problem aiming to maximize the MEAR of eMBB UEs while fulfilling the provisions of the uRLLC traffic. We decompose the original problem into two sub-problems, namely scheduling problem of eMBB UEs and uRLLC UEs while prevailing objective unchanged. Radio resources are scheduled among the eMBB UEs on a time slot basis, whereas it is handled for uRLLC UEs on a mini-slot basis. Moreover, for resolving the scheduling issue of eMBB UEs, we use PSUM based algorithm, whereas the optimal TM is adopted for solving the same problem of uRLLC UEs. Furthermore, a heuristic algorithm is also provided to solve the first sub-problem with lower complexity. Finally, the significance of the proposed approach over other baseline approaches is established through numerical analysis in terms of the MEAR and fairness scores of the eMBB UEs.
I Introduction
The wireless industries are going through different kinds of emerging applications and services, e.g., high-resolution video streaming, virtual reality (VR), augmented reality (AR), autonomous cars, smart cities and factories, smart grids, remote medical diagnosis, unmanned aerial vehicles (UAV), artificial intelligence (AI) based personal assistants, sensing, metering, monitoring etc, along with the explosive trends of mobile traffic [1]. It is foreseen that the mobile application market will flourish in a CAGR of during [2]. Energy efficiency, latency, reliability, data rate, etc are distinct for separate applications and services. To handle these diversified requirements, International Telecommunication Union (ITU) has already classified 5G services into uRLLC, mMTC, and eMBB categories[3]. Gigabit per second (Gbps) level data rates are required for eMBB users, whereas connection density and energy efficiency are the major concern for mMTC, and uRLLC traffic focuses on extremely high reliability () and remarkably low latency ( ms/packet)[4].
Generally, the lions’ share of wireless traffic is produced by eMBB UEs. uRLLC traffic is naturally infrequent and needs to be addressed spontaneously. The easiest way to settle this matter is to allocate some resources for uRLLC. However, under-utilization of radio resources may emerge from this approach, and generally, effective multiplexing of traffics is required. For efficient multiplexing of eMBB and uRLLC traffics, 3GPP has recommended a superposition/puncturing skeleton [4] and the short-TTI/puncturing approaches [5] in 5G cellular systems. Though the short-TTI mechanism is straightforward for implementation, it degrades spectral efficiency because of the massive overhead in the control channel. On the contrary, the puncturing strategy decreases the above overhead, although it necessitates an adequate mechanism for recognizing and healing the punctured case. Slot ( ms) and mini-slot ( ms) are proposed as time units for meeting the latency requirement of uRLLC traffic in the 5G NR. At the outset of a slot, eMBB traffic is scheduled and continues unchanged throughout the slot. If the same physical resources are used, uRLLC traffic is overridden upon the scheduled eMBB transmission.
Currently, much attention has been paid to resource sharing for offering QoS or QoE to the users. Studies [6] and [7] investigate the sharing of an unlicensed spectrum between LTE and WiFi networks, however, the study [8] con sider LTE-A and NB-IoT services for sharing the same resources. Study [9] solves user association and resource allocation problems. The study [9] consider the downlink of fog network to support QoS provisions of the uRLLC and eMBB. Some other studies, however, investigates and/or analyzes the influence of uRLLC traffic on eMBB [10, 11, 12, 13, 14, 15] or presents architecture and/or framework for co-scheduling of eMBB and uRLLC traffic [16, 17, 18, 19]. Moreover, some authors consider eMBB and uRLLC traffic in their coexisting/multiplexing proposals [20, 21, 22, 23, 24, 25, 26, 27] where they apply puncturing technique.
As per our knowledge, concrete mathematical models and solutions, however, are lacking in most of these coexistence mechanisms. Most of the studies mainly focus on analysis, system-level design or framework. Thus, effective coexistence proposals between eMBB and uRLLC traffic are wanting in literature. So, to enable eMBB and uRLLC services in G wireless networks, we propose an effective coexistence mechanism in this paper. Our preliminary work has been published in [24] where we have used a one-sided matching and heuristic algorithm, respectively, for resolving resource allocation problems of eMBB and uRLLC users. The major difference between [24] and current work is the involvement of PSUM and TM for solving similar problems. This paper mainly focuses on the followings:
-
•
First, we formulate an optimization problem for eMBB UEs with some constraints, where the objective is to maximize the minimum expected rate of eMBB UEs over time.
-
•
Second, to solve the optimization problem effectively, we decompose it into two sub-problems: resource scheduling for eMBB UEs, and resource scheduling of uRLLC UEs. PSUM is used to solve the first sub-problem, whereas the TM is employed to solve the second one.
-
•
Third, we redefine the first sub-problem into a minimization problem for each slot and provide an algorithm based upon PSUM to obtain near-optimal solutions.
-
•
Fourth, we redefine the second sub-problem as a minimization problem for each mini-slot within every slot and present the algorithm based upon MCC and MODI methods of the transportation model to find an optimal solution of the second sub-problem.
-
•
Fifth, we also present a cost-effective heuristic algorithm for resolving the first sub-problem.
- •
The remainder of the paper is systematized as follows. In Section II, we present the literature review. We explain the system model and present the problem formulation in Section III. The proposed solution approach of the above-mentioned problem is addressed in Section IV. In Section V, we provide experimental investigation, discussion, and comparison concerning the proposed solution. Finally, we conclude the paper in Section VI.
II Literature Review
Recently, both industry and academia focus on the study of multiplexing between eMBB traffic and uRLLC traffic on the same physical resources. Information-theoretic arguments-based performance analysis for eMBB and uRLLC traffic has performed in [10]. The authors consider both OMA and NOMA for uplink in C-RAN framework. An insight into the performance trade-offs among the eMBB and uRLLC traffic is explained in [10]. In [11], authors have introduced eMBB influenced minimization problem to protect the uRLLC traffic from the dominant eMBB services. This paper explores their proposal for the mobile front-haul environment. In [12], the authors present an effective solution for multiplexing different traffics on a shared resource. Particularly, they propose an effective radio resource distribution method between the uRLLC and eMBB service classes following trade-offs among the reliability, latency and spectral efficiency. Moreover, they investigate the uRLLC and eMBB performance adopting different conditions.
Abbreviation | Elaboration |
---|---|
uRLLC | Ultra-reliable Low-latency Communication |
eMBB, MBB | Enhanced Mobile Broadband, Mobile Broadband |
mMTC | Massive Machine-type Communication |
PSUM, SUM | Penalty Successive Upper bound Minimization, Successive Upper bound Minimization |
TTI | Transmission Time Interval |
NR | New Radio |
QoS | Quality-of-Service |
QoE | Quality-of-Experience |
TM, BTM | Transportation Model, Balanced Transportation Model |
MCC | Minimum Cell Cost |
MODI | Modified Distribution |
PS | Punctured Scheduler |
MUPS | Multi-User Preemptive Scheduler |
RS | Random Scheduler |
EDS | Equally Distributed Scheduler |
MBS | Matching Based Scheduler |
MEAR | Minimum Expected Achieved Rate |
NOMA, OMA | Non-orthogonal Multiple Access, Orthogonal Multiple Access |
PRB, RB | Physical Resource Block, Resource Block |
MIMO | Multiple-input Multiple-output |
SINR | signal-to-interference-noise-ratio |
gNB | Next Generation Base Station |
CP | Combinatorial Programming |
CDF, ECDF | Cumulative Distribution Function, Empirical Cumulative Distribution Function |
NWC | Northwest corner |
VAM | Vogel’s Approximation Method |
MCS | Modulation and Coding Scheme |
CVaR | Conditional Value at Risk |
CAGR | Cumulative Average Growth Rate |
C-RAN | Cloud Radio Access Network |
In order to 5G service provisioning (i.e., eMBB, mMTC and uRLLC services), the authors of [13] have studied radio resources slicing mechanism, where the performance of both orthogonal and non-orthogonal are analyzed. They have proposed a communication-theoretic model by considering the heterogeneity of 5G services. They also found that the non-orthogonal slicing is significantly better to perform instead of orthogonal slicing for those 5G service multiplexing. Recently, for 5G NR physical layer challenges and solution mechanisms of uRLLC traffic communications has been presented in [14], where they pay attention to the structure of packet and frame. Additionally, they focus on the improvement of scheduling and reliability mechanism for uRLLC traffic communication such that the coexistence of uRLLC with eMBB is established. In [15], the authors have been analyzed the designing principle of the 5G wireless network by employing low-latency and high-reliability for uRLLC traffic. To do this, they consider varying requirements of uRLLC services such as variation of delay, packet size, and reliability. To an extent, they explore different topology network architecture under the uncertainty.
The authors of [16, 17, 18] present a resilient frame formation for multiplexing the provisions of different users. In [16], the authors jointly MBB and mission-critical communication traffic by engaging dynamic TDD and TTI. In [17], the authors represent tractable multiplexing of MBB, MCC, and mMTC considering dynamic TTI. The authors of [18] present a holistic overview of the agile scheduling for 5G that incorporates multiple users. They envision an E2E QoS architecture to offer improved opportunities for application-layer scheduling functionality that ensures QoE for each user. queueing model-based system-level design has proposed for fulfilling uRLLC traffic demand in [19], where they exhibit that the static bandwidth partitioning is inefficient for eMBB and uRLLC traffic. Thus, the authors of [19] have illustrated a dynamic mechanism for multiplexing of eMBB and uRLLC traffic and apply this in both frequency and time domain.
The efficient way of network resource sharing for the eMBB and uRLLC is studied in [20] and [21]. A dynamic puncturing mechanism is proposed for uRLLC traffic in [20] within eMBB resources to increase the overall resource utilization in the network. To enhance the performance for decoding of eMBB traffic, a joint signal space diversity and dynamic puncturing schemes have proposed, where they improve the performance of component interleaving as well as rotation modulation. In [21], a joint scheduling problem is formulated for eMBB and uRLLC traffic in the goal of maximizing eMBB users’utility while satisfying stochastic demand for the uRLLC UEs. Specifically, they measure the loss of eMBB users for superposition/puncturing by introducing three models, which include linear, convex and threshold-based schemes. For reducing the queuing delay of the uRLLC traffic, the authors introduce punctured scheduling (PS) in [22]. In case of insufficient radio resource availability, the scheduler promptly overwrites a portion of the eMBB transmission by the uRLLC traffic. The scheduler improves the uRLLC latency performance; however, the performance of the eMBB users are profoundly deteriorated. The authors of [23] and [24] manifest the coexistence technique for enabling 5G wireless services like eMBB and uRLLC based upon a punctured scheme. The authors present an enhanced PS (EPS) scheduler to enable an improved ergodic capacity of the eMBB users in [25]. EPS is capable of recovering the lost information due to puncturing and partially. eMBB users are supposed to be cognizant about the corresponding resource that is being penetrated by uRLLC. Therefore, the victim eMBB users ignore the punctured resources from the erroneous chase condensing HARQ process. The authors of [26] propose a MUPS, where they discretize the trade-off among network system capacity and uRLLC performance. MUPS first tries to match the incoming uRLLC traffic inside an eMBB traffic in a conventional MU-MIMO transmission. MUPS serves the uRLLC traffic instantly by using PS if multi-user (MU) pairing cannot be entertained immediately. Though MUPS shows improved spectral efficiency, it is not feasible for uRLLC latency as MU pairing mostly depends on the rate maximization. Hence, the inter-user interference can further degrade the SINR quality of the uRLLC traffic, which can lead to reliability concerns. The authors of [27] propose a null-space-based preemptive scheduler (NSBPS) for jointly serving uRLLC and eMBB traffic in a densely populated 5G arrangement. The proposed approach ensures on-the-spot scheduling for the sporadic uRLLC traffic, while makes a minimal shock on the overall system outcome. The approach employs the system spatial degrees of freedom (SDoF) for uRLLC traffic for spontaneously providing a noise-free subspace. In [28], the authors present a risk-sensitive approach for allocating RBs to uRLLC traffic in the goal of minimizing the uncertainty of eMBB transmission. Particularly, they launch the Conditional Value at Risk (CVaR) for estimating the uncertainty of eMBB traffic in [28].

III System Model and Problem Formulation
In this work, we consider a 5G network scenario with one gNB which supports a group of user equipment (UE) requiring eMBB service, and a set of user equipment demanding uRLLC service. The system operates in downlink mode for the UEs and the overall system diagram is shown in Fig. 1. gNB supports the UEs using licensed RBs each with equal bandwidth of . Every time slot, with a length , is split into mini-slots of duration for managing low latency services. For supporting eMBB UEs, we consider LTE time slots and denoted by . uRLLC traffic arrive at gNB (any mini-slot of time slot ) follows Gaussian distribution, i.e., . Here, and denote the mean and variance of . Each uRLLC UE request for a payload of size (varying from 32 to 200 Bytes [29]).
Symbol | Meaning |
---|---|
Set of active eMBB users | |
Set of uRLLC users | |
Set of RBs of uniform bandwidth | |
Bandwidth of a RB | |
Duration of a time slot | |
Duration of a mini-slot | |
Number of mini-slots in a time slot | |
Total number of time slots | |
Mean value of arrival rate of uRLLC traffic | |
Random number representing arrival rate of traffics for uRLLC users at mini-slot of time slot | |
Payload size of uRLLC user at mini-slot of time slot | |
SNR of eMBB user in time slot | |
Transmission power of gNB for eMBB user | |
Channel gain of for eMBB user from gNB | |
Noise spectral density | |
Resource allocation vector for | |
SINR/SNR of uRLLC user from gNB at mini-slot of time slot | |
Transmission power of gNB for uRLLC user | |
Channel gain of for uRLLC user from gNB | |
Channel dispersion for uRLLC user | |
Blocklength of uRLLC traffic from user | |
Complementary Gaussian cumulative distribution function | |
Probability of decoding error for uRLLC user | |
Resource allocation vector for | |
Vector for representing current serving uRLLC users | |
uRLLC reliability probability | |
Achievable rate of eMBB user in RB of time slot | |
Achievable rate of uRLLC user in RB at mini-slot m of time slot |
gNB allots the RBs to the eMBB UEs at the commencement of any time slot . The achievable rate of for RB is as follows:
(1) |
where presents SNR. is the transmission power of gNB for and denotes the gain of from the gNB, and represnts the noise spectral density. eMBB UEs require more than one RB for satisfying their QoS. Therefore, the achievable rate of eMBB UE in time slot as follows:
(2) |
where denotes the resource allocation vector for at any time slot , and each element is as follows:
(3) |
uRLLC traffic can arrive at some moment (i.e. mini-slot) inside any time slot and requires to be attended quickly. Any uRLLC traffic needs to be completed within a mini-slot period for its’ latency and reliability constraints. Normally, the payload size of uRLLC traffic is really short, and therefore, we cannot straightforwardly adopt Shannon’s data rate formulation[10]. The achievable rate of a uRLLC UE in RB , when its’ traffic is overlapped with eMBB traffic, can properly be approximated by employing [30] as follows:
(4) |
where represents the SINR for at mini-slot of . Here, indicates the interference generated from serving in the same RB, depicts the channel dispersion, and meaning of other symbols are shown in II. However, the reliability of uRLLC traffic fall into vulnerability due to the interference. Hence, superposition mechanism is not a suitable for serving uRLLC UE[11]. Thus, for serving uRLLC UEs, we concentrate on the puncturing technique . In the punctured mini-slot, gNB allots zero power for eMBB UE, and therefore, the interference cannot affect the uRLLC traffic. At that time, and . The achieved rate of , when it uses multiple RBs, is as follows:
(5) |
where is the resource allocation vector for at of , and each of its’ element follows:
(6) |

All the uRLLC request in any of needs to be served for sure, and hence,
(7) |
where denotes a vector for the serving uRLLC UEs, and thus,
(8) |
Within the stipulated period , the payload of needs to be transferred, and hence, satisfy the following:
(9) |
Hence, the reliability and latency concerns of uRLLC traffic are simultaneously shielded by (7) and (9). Besides, loses some throughput at if uRLLC traffic is punctured within its’ RBs. We utilize the linear model of [21] for estimating the throughput-losses of eMBB UE. Therefore, the throughput-losses looks like as follows:
(10) |
So, the actual achievable rate of in any is as follows:
(11) |
We see that affects on , and hence, impact negatively to the eMBB throughput in each . At the start of any , gNB allocates the RBs among the in an orthogonal fashion as shown in Fig. 2. These characteristics of are shown mathematically as follows:
(12) |
(13) |
(14) |
Within each , gNB allows uRLLC UEs to get some RBs immediately on a mini-slot basis. Therefore, uRLLC traffic overlaps with eMBB traffic at and also shown in Fig. 2. Accordingly, satisfy the following conditions on each :
(15) |
(16) |
(17) |
Finally, our objective is to maximize the actual achievable rate of each eMBB UE across while entertaining nearly every uRLLC request within its’ speculated latency. We apply Max-Min fairness doctrine for this mission, and it contributes stationary service quality, enhances spectral efficiency and makes UEs more pleasant in the network. Hence, the maximization problem is formulated as follows:
(18) | ||||
s.t. | (18a) | |||
(18b) | ||||
(18c) | ||||
(18d) | ||||
(18e) | ||||
(18f) | ||||
(18g) | ||||
(18h) |
In (18), the reliability and latency constraints of the uRLLC UEs are preserved by (18a) and (18b). Constraints (18c) and (18d) are used to show the orthogonality of RBs among eMBB and uRLLC UEs, respectively. At least one RB is posed by every active UE and is encapsulated by both (18e) and (18f). Resource restriction is presented by constraint (18g). Constraint (18h) shows that every item of , and are binary. The formulation (18) is a Combinatorial Programming (CP) problem having chance constraint, and NP-hard due to its nature.

IV Decomposition as a Solution Approach for problem (18)
We assume that eMBB UEs are data-hungry over the considered period. Thus, at the commencement of a time slot , gNB schedules all of its’ RBs among the eMBB UEs and stay unchanged over . If uRLLC traffic requests come in any of , the scheduler tries to serve the requests in the next . Hence, the overlapping of uRLLC traffic over eMBB traffic happens as shown in Fig. 2. Usually, a portion of all RBs is required for serving such uRLLC traffic. However, the challenge is to find the victimized eMBB UE(s) following the aspiration of the problem (18).
For getting an effective solution to the problem (18), we can utilize the concept of a divide-and-conquer strategy. Here, we divide (18) into two resource allocation sub-problems, namely, for eMBB UEs on time slot basis and uRLLC UEs on a mini-slot basis. The first sub-problem is as follows:
(19) | ||||
s.t. | (19a) | |||
(19b) | ||||
(19c) | ||||
(19d) |
On the other hand, the second sub-problem (with as the solution of 19) is manifested as follows:
(20) | ||||
s.t. | (20a) | |||
(20b) | ||||
(20c) | ||||
(20d) | ||||
(20e) | ||||
(20f) |
Fig. 3 shows the solution overview of the optimization problem (18). We can better understand the philosophy of the problem and the solution approach with an illustrative example in Fig. 2. At the beginning of the time slot, , let us assume that there are 3 eMBB UEs, each of whom owns 4 RBs. Within , the service request for uRLLC UEs came abruptly and the allocation of RBs for that UEs is shown in Fig. 2, as overlapped uRLLC traffic in the mini-slots. During this time, eMBB users and waste throughput equivalent to RBs mini-slot, RBs mini-slot, and RBs mini-slot, respectively. At the start of the next time slot, , gNB acknowledges the resource scheduling of uRLLC UEs of to allocate and compensate eMBB UEs. gNB allocates more RBs to eMBB user 2 and less to eMBB user 3 as they lose more and less, respectively, in the time slot . Moreover, EgNB tries to serve uRLLC users such that the loss of throughput of eMBB users are almost similar in the time slot . Therefore, gNB makes a balance among the throughput of eMBB users in each time slot, which ultimately serves to reach the goal of (18) on a long-run basis.
IV-A PSUM as a Solution of the Sub-Problem (19)
Problem (19) is still is computationally expensive to reach a globally optimal solution due to its’ NP-hardness. In this sub-section, we propose the PSUM algorithm to solve (19) approximately with low complexity. Relaxation of the binary variable and the addition of a penalty term to the objective function is the main philosophy of our proposed PSUM algorithm. We redefine (19) as follows:
(21) | ||||
s.t. | (21a) | |||
(21b) | ||||
(21c) |
Now according to Theorem 2 of [31], if is sufficiently large then original sub-problem (19) and (21) are equivalent. Moreover, we add a penalty term to the objective function to get binary soltion of relaxed variable from (21). Let and we can rewrite (19a) as . The penalized problem is as follows:
(22) | ||||
s.t. | (22a) |
where is the penalty parameter,
(23) |
with , and is any non-negative constant. Following the fact of [32] which is further described in [31], the optimal value is as follows:
(24) |
Generally, the parameter should big enough to make the values of near zero or one. Then, we achieve a feasible solution of (22) by applying the rounding process.
It is not easy to solve (22) directly. However, by utilizing the successive upper bound minimization (SUM) technique [33, 34], we can efficiently resolve (22). This method tries to secure the lower bound of the actual objective function by determining a sequence of approximation of the objective functions. As is concave in nature and hence,
(25) |
where is the value of current allocation of iteration . At the -th iteration of , we solve the following problem:
(26) | ||||
s.t. | (26a) |
IV-B Solution of Sub-Problem (20) through TM
Due to the existence of chance constraint (20a) and also the combinatorial variable, , (20) is still difficult to resolve by using traditional optimizer. Now, we need to transmute (20a) into deterministic form for solving (20). Moreover, let us assume , and and hence,
(27) | ||||
(27a) | ||||
(27b) | ||||
(27c) | ||||
(27d) |
Here, is the cumulative distribution function (CDF) of random variable . Thus, from constraint (20a), we can rewrite as follows:
(28) | |||
(28a) | |||
(28b) | |||
(28c) | |||
(28d) |
Now, (28d) and (20a) are identical. Hence, the renewed form of (20) looks like as follows:
(29) | ||||
s.t. | (29a) | |||
(29b) | ||||
(29c) |
Problem (29) is still NP-hard due to the appearance of combinatorial variable. In (29), (29a) holds for a particular value of when gNB serves a certain portion of uRLLC UE . For a of , let us assume and . We can determine the requisite RBs, holding as the upper-bound in (20b) and let . As gNB engages OFDMA for uRLLC UEs, constraint (20c) holds. Moreover, depending on , constraints (20d), (20e), and (20f) also hold. Constraint (29c) can be used as a basic block to build a cost matrix . As are held by eMBB UEs in any time slot , we can find a vector . Now redefine problem (29) as follows:
(30) | ||||
s.t. | (30a) | |||
(30b) | ||||
(30c) | ||||
(30d) | ||||
(30e) |
The goal of (30) is to find a matrix that will minimize the cost/loss of eMBB UEs. This is a linear programming problem equivalent to the Hitchcock problem [35] with inequities, which contributed to unbalanced transportation model. Introducing slack variables and in the constraints (30b) and (30c), respectively, which convert them into equality, we have:
(31) |
(32) |
Now the modified problem in (30) is a BTM. Moreover, we have to add to the demand vector as and a row to cost matrix as . BTM can be solved by the simplex method [36]. The solution matrix will be in the form of . NWC[37], MCC[37], and VAM[37, 38] are some of the popular methods for obtaining initial feasible solution of BTM. We can use the stepping-stone [39] or MODI [40] method to get an optimal solution of the BTM. In the following sub-section, we use the combination of the MCC and MODI for acquaring the optimal result from the BTM.
IV-B1 Determining Initial Feasible Solution by MCC Method
MCC method allots to those cells of considering the lowest cost from . Firstly, the method allows the maximum permissible to the cell with the lowest per RB cost. Secondly, the amount of quantity and need is synthesized while crossing out the satisfied row(s) or column(s). Either row or column is ruled out if both of them are satisfied concurrently. Thirdly, we inquire into the uncrossed-out cells which have the least unit cost and continue it till there is specifically one row or column is left uncrossed. The primary steps of the MCC method are compiled as follows:
-
Step 1: Distribute maximum permissible to the worthwhile cell of which have the minimum cost found from , and update the supply () and demand ().
-
Step 2: Continue Step 1 till there is any demand that needs to be satisfied.
IV-B2 MODI Method for Finding an Optimal Solution
The initial solution found from section IV-B1 is used as input in the MODI method for finding an optimal solution. We need to augment an extra left-hand column and the top row (indicated by and respectively) with whose values require to be calculated. The values are measured for all cells which have the corresponding allocation in and shown as follows:
(33) |
Now we solve (33) to obtain all and . If necessary then assign zero to one of the unknowns toward finding the solution. Next, evaluate for all the empty cells of as follows:
(34) |
Now select corresponding to the most negative value and determine the stepping-stone path for that cell to know the reallocation amount to the cell. Next, allocate the maximum permissible to the empty cell of corresponding to the selected . and values for and must be recomputed with the help of (33) and a cost change for the empty cells of need to be figured out using (34). A corresponding reallocation takes place just like the previous step and the process continues till there is a negative . At the end of this repetitive process, we get the optimal allocation (). The MODI method described above can be summed as follows:
-
Step 1: Develop a preliminary solution () applying the MCC method.
-
Step 2: For every row and column of , measure and by applying (33) to each cell of that has an allocation.
-
Step 3: For every corresponding empty cell of , calculate by applying (34).
-
Step 4: Determine the stepping-stone path [39] from corresponding to minimum that found in Step 3.
-
Step 5: Based on the stepping-stone path found in Step 4, allocate the highest possible to the free cell of .
-
Step 6: Reiterate Step 2 to 5 until all .
IV-C Low-Complexity Heuristic Algorithm for Solving Sub-Problem (19)
Though Algorithm 1 can solve the sub-problem (19) optimally, but computation time requires to solve it grows much faster as the size of the problem increase. Besides, the number of eMBB UEs is large in reality, and we have a short period to resolve this kind of problem. Therefore, we need a faster and efficient heuristic algorithm, which may sacrifice optimality, to solve (19). Thus, we propose Algorithm 2 for solving (19). At , Algorithm 2 allocate resources equally to the eMBB UEs. But, it allocates resources to eMBB UEs in the rest of the time slots depending on the proportional loss of the previous time slot. In this way, Algorithm 2 can accommodate the EAR of eMBB UEs in the long-run. The complexity of Algorithm 2 depends on and .
V Numerical Analysis and Discussions
In this section, we assess the proposed approach using comprehensive experimental analyses. Here, we compare our results with the results of the following state-of-the-art schedulers:
-
•
PS[22]: PS immediately overwrite part of the continuing eMBB transmission with the sporadic uRLLC traffic if there are not sufficient PRBs available. It chooses PRBs with the highest MCS that already been allotted to eMBB UEs.
-
•
MUPS[26]: In case of insufficient RBs, MUPS allocates PRBs to the uRLLC UEs where they endure better channel quality depending on the CQI feedback.
-
•
RS: RS takes the RBs from the eMBB UEs randomly in case of inadequate PRBs for supporting uRLLC traffic.
-
•
EDS: For supporting sporadic uRLLC traffic, EDS offers the PRBs to this traffic after preempting PRBs equally from the eMBB UEs in case of unavailable PRBs.
-
•
MBS: gNB uses many to one matching game for snatching PRBs from eMBB UEs for supporting uRLLC traffic.
The main performance parameters are MEAR and fairness [41] of the eMBB UEs and defined as follows:
(35) |
(36) |
In our scenario, we consider an area with a radius of m and gNB resides in the middle of the considered area. eMBB and uRLLC UEs are disseminated randomly in the coverage space. gNB works on a MHz licensed band for supporting the UEs in downlink mode. Every uRLLC UE needs a single PRB for its service. Furthermore, gNB estimates path-loss for both eMBB and uRLLC UEs using a free space propagation model amidst Rayleigh fading. Table III exhibits the significant parameters for this experiment. We use similar PSUM parameters as of [31]. We realize the results of every approaches after taking runs.
Symbol | Value | Symbol | Value |
kHz | |||
ms | ms | ||
dBm | dBm | ||
dBm | |||
bytes | |||
eMBB traffic model | Full buffer | ||
A comparison of MEAR and fairness scores are presented in Fig. 4 and Fig. 5, respectively, between the proposed (PSUM+TM) and the optimal value for a small network. Fig. 4 shows the ECDF of MEAR and the probability of MEAR being at least Mbps are around and , respectively, for the proposed and optimal methods, consequently. The optimality gap of average MEAR for the proposed method is as represented in Fig. 4. Fig. 5 shows the ECDF of the fairness scores where the probability of the scores being at least is in the proposed method in comparison of being in the optimal mechanism. The optimality gap of the proposed method for the average fairness score is as exposed from Fig. 5.

For growing uRLLC arrivals, the ECDF of the MEAR values is exhibited in Fig. 6. Fig. 6 reveals the results that are preferred to those of the other considered methods. The probability of MEAR values for being at least Mbps are , , , , , and for the proposed, RS, EDS, MBS, PS, and MUPS methods, respectively, that are shown in Fig. 6(a). Fig. 6(b) reveals that the likelihood of MEAR values for obtaining a minimum of Mbps are , , , , and for the proposed, RS, EDS, MBS, and PS methods, respectively, while the MUPS method can accommodate under Mbps in every case. Fig. 6(c) shows that the proposed, MBS and PS methods provide a minimum MEAR value of Mbps with a probability , , and , respectively, while RS, EDS, and MUPS can produce less than Mbps for sure. Moreover, the MEAR value decreases with the growing rate of for all the methods because of the requirement of more RBs for the uRLLC UEs as shown in Fig. 6. But, the increasing arrivals of uRLLC traffic affect the MUPS method more as they require extra RBs from the distant eMBB UEs. However, the performance gap between the proposed and PS method reduces with the increased arrival of uRLLC traffic, as the PS scheme gets more chance to adjust the users with the higher expected achieved rate.

We compare the fairness scores among various methods with different values of which is shown in Fig. 7. The scores originating from the proposed method are greater than or similar to that of others as indicated in Fig. 7. Fig. 7(a) reveals that the median of the scores for the proposed, RS, EDS, MBS, PS, and MUPS methods are , , , , , and , respectively. The similar scores are , , , , , , and , , , , , for the corresponding methods and are presented in Fig. 7(b) and 7(c), respectively. Moreover, the fairness scores increase for the Proposed, MBS and PS methods with the increasing value of as it gets more chance to maximize the minimum achieved rate, whereas the same scores decrease with the increasing value of for RS, EDS and MUPS as eMBB UEs have more opportunity to be affected by the uRLLC UEs.


Fig. 8 and 9, respectively, show the average MEAR and fairness score for varying value of . In Fig. 8, we find that our method overpasses other schemes for different rates of in the case of average MEAR. The figure also explicates that the average MEAR is declining with the growing value of due to the additional requirement of PRBs for extra uRLLC traffic. Particularly, our method results , , , , and higher on average MEAR than those of RS, EDS, MBS, PS, and MUPS, respectively, for . Moreover, similar values are , , , , and for . The average fairness score emerging from our method is bigger than or similar to other comparing methods for different values of and shown in Fig. 9. Fig. 9 also reveals that the value has a negligible impact on the average score of the fairness in the Proposed, RS, EDS, MBS, PS methods, but it impacts inversely to the MUPS method more and more uRLLC traffic choose same eMBB UE for the PRBs. Moreover, the average fairness scores of the proposed method are similar to both MBS and PS methods. However, the proposed method treats eMBB UEs , , and fairly than RS, EDS, and MUPS methods , respectively, when , whereas, the similar scores are , , and , respectively, during .

In Fig. 10, we compare the average MEAR of eMBB UEs for considering varying uRLLC load () and uRLLC traffic (). The MEAR value of our method surpasses other concerned methods in every circumstance as revealed from Fig. 10. The same figure also explicates that these values degrade when increases for varying as the system needs to allocate more PRBs to the uRLLC UEs. Moreover, these values decrease with the increasing value of for a fixed , and also the same for increasing the value of with a fixed . In Fig. 11, we compare the average fairness score of eMBB UEs for the different methods for changing the uRLLC load () and uRLLC traffic (). Fig. 11 exposes that the fairness scores of our method are better than or at least similar to that of its’ rivals. The figure also reveals that these scores decrease with an increasing for the lower value of . However, these scores increase with the increasing when value is high. Moreover, for the MUPS method, these values decrease with the increasing value of and .



VI Conclusions
In this paper, we have introduced a novel approach for coexisting uRLLC and eMBB traffic in the same radio resource for enabling 5G wireless systems. We have expressed the coexisting dilemma as a maximizing problem of the MEAR value of eMBB UEs meanwhile attending the uRLLC traffic. We handle the problem with the help of the decomposition strategy. In every time slot, we resolve the resource scheduling sub-problem of eMBB UEs using a PSUM based algorithm, whereas the similar sub-problem of uRLLC UEs is unraveled through optimal transportation model, namely MCC and MODI methods. For the efficient scheduling of PRBs among eMBB UEs, we also present a heuristic algorithm. Our extensive simulation outcomes demonstrate a notable performance gain of the proposed approach over the baseline approaches in the considered indicators.
References
- [1] Cisco, “Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2016 - 2021,” White Paper, June 2017.
- [2] 5G Forum, “5G Service Roadmap 2022,” White Paper, March 2016.
- [3] ITU-R, “IMT vision-framework and overall objectives of the future development of IMT for 2020 and beyond,” Recommendation M.2083-0, September 2015.
- [4] 3GPP, “3GPP TSG RAN WG1 Meeting #87,” November 2016.
- [5] 3GPP, “Downlink Multiplexing of eMBB and uRLLC Transmission,” 3GPP TSG RAN WG1 NR Ad-Hoc Meeting, R1-1700374, January 2017.
- [6] A. K. Bairagi, S. F. Abedin, N. H. Tran, D. Niyato, and C. S. Hong, “QoE-Enabled Unlicensed Spectrum Sharing in 5G: A Game-Theoretic Approach,” IEEE Access, vol. 6, pp.50538-50554, September 2018.
- [7] A. K. Bairagi, N. H. Tran, W. Saad, and C. S. Hong, “Bargaining Game for Effective Coexistence between LTE-U and Wi-Fi Systems,” in IEEE/IFIP Network Operations and Management Symposium (NOMS), Taipei, Taiwan, April 2018.
- [8] S. Liu, F. Yang, J. Song, and Z. Han, “Block Sparse Bayesian Learning-Based NB-IoT Interference Elimination in LTE-Advanced Systems,” IEEE Transactions on Communications, vol. 65, no. 10, pp. 4559-4571, October 2017.
- [9] S. F. Abedin, G. R. Alam, S.M. A. Kazmi, N. H. Tran, D. Niyato, and C. S. Hong, “Resource Allocation for Ultra-reliable and Enhanced Mobile Broadband IoT Applications in Fog Network,” IEEE Transactions on Communications, vol.67, no. 1, pp. 489-502, January 2019.
- [10] R. Kassab, O. Simeone and P. Popovski, “Coexistence of URLLC and eMBB Services in the C-RAN Uplink: An Information-Theoretic Study,” 2018 IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates, 2018, pp. 1-6.
- [11] K. Ying, J. M. Kowalski, T. Nogami, Z. Yin, and J. Sheng, “Coexistence of enhanced mobile broadband communications and ultra-reliable low-latency communications in mobile front-haul,” Proc. SPIE 10559, Broadband Access Communication Technologies XII, 105590C, January 2018.
- [12] G. Pocovi, K. I. Pedersen, and P. Mogensen, “Joint Link Adaptation and Scheduling for 5G Ultra-Reliable Low-Latency Communications,” IEEE Access, vol. 6, pp. 28912-28922, May 2018.
- [13] P. Popovski, K. F. Trillingsgaard, O. Simeone, and G. Durisi, “5G Wireless Network Slicing for eMBB, URLLC, and mMTC: A Communication-Theoretic View,” in IEEE Access, vol. 6, pp. 55765-55779, September 2018.
- [14] H. Ji, S. Park, J. Yeo, Y. Kim, J. Lee, and B. Shim, “Ultra Reliable and Low Latency Communications in 5G Downlink: Physical Layer Aspects,” IEEE Wireless Communications, vol. 25, no. 3, pp. 124-130, June 2018.
- [15] M. Bennis, M. Debbah, and H. V. Poor, “Ultra-Reliable and Low-Latency Wireless Communication: Tail, Risk and Scale,” in Proceedings of the IEEE, vol. 106, no. 10, pp. 1834-1853, October 2018.
- [16] Q. Liao, P. Baracca, D. Lopez-Perez, and L. G. Giordano, “Resource Scheduling for Mixed Traffic Types with Scalable TTI in Dynamic TDD Systems,” in IEEE Globecom Workshops (GC Wkshps), Washington, DC, USA, December 2016.
- [17] K. I. Pedersen, G. Berardinelli, F. Frederiksen, P. Mogensen, and A. Szufarska, “A flexible 5G frame structure design for frequency-division duplex cases,” IEEE Communications Magazine, vol. 54, no. 3, pp. 53-59, March 2016.
- [18] K. Pedersen, G. Pocovi, J. Steiner, and A. Maeder, “Agile 5G Scheduler for Improved E2E Performance and Flexibility for Different Network Implementations,” IEEE Communications Magazine, vol. 56, no. 3, pp. 210-217, March 2018.
- [19] C. Li, J. Jiang, W. Chen, T. Ji, and J. Smee, “5G ultra-reliable and low-latency systems design,” in 2017 European Conference on Networks and Communications (EuCNC), Oulu, Finland, June 2017.
- [20] Z. Wu, F. Zhao, and X. Liu, “Signal Space Diversity Aided Dynamic Multiplexing for eMBB and URLLC Traffics”, in 3rd IEEE International Conference on Computer and Communication, Chengdu, China, December 2017.
- [21] A. Anand, G. Veciana, and S. Shakkottai, “Joint Scheduling of URLLC and eMBB Traffic in 5G Wireless Networks,” in IEEE International Conference on Computer Communications, Honolulu, USA, April 2018.
- [22] K. I. Pedersen, G. Pocovi, J. Steiner, and S. R. Khosravirad, “Punctured Scheduling for Critical Low Latency Data on a Shared Channel with Mobile Broadband,” in IEEE 86th Vehicular Technology Conference (VTC-Fall), Toronto, Canada, September 2017.
- [23] A. K. Bairagi, M. S. Munir, S. F. Abedin, and C. S. Hong , “Coexistence of eMBB and uRLLC in 5G Wireless Networks,” in Korea Computer Congress, Jeju, South Korea, June 2018.
- [24] A. K. Bairagi, M. S. Munir, M. Alsenwi, and C. S. Hong , “A Matching Based Coexistence Mechanism between eMBB and uRLLC in 5G Wireless Networks,” in 34th ACM/SIGAPP Symposium on Applied Computing (SAC 2019), Limassol, Cyprus, April 2019.
- [25] K. I. Pedersen, G. Pocovi, and J. Steiner, “Preemptive scheduling of latency critical traffic and its impact on mobile broadband performance,” in IEEE 87th Vehicular Technology Conference (VTC-Spring), Porto, Portugal, June 2018.
- [26] A. A. Esswie, and K. I. Pedersen, “Multi-user preemptive scheduling for critical low latency communications in 5G networks,” in IEEE Symposium on Computers and Communications (ISCC 2018), Natal, Brazil, June 2018.
- [27] A. A. Esswie, and K. I. Pedersen, “Opportunistic Spatial Preemptive Scheduling for URLLC and eMBB Coexistence in Multi-User 5G Networks,” IEEE Access, vol. 6, pp. 38451-38463, July 2018.
- [28] M. Alsenwi, N. H. Tran, M. Bennis, A. K. Bairagi, and C. S. Hong, “eMBB-URLLC Resource Slicing: A Risk-Sensitive Approach,” IEEE Communications Letters, vol. 23, no. 4, pp. 740-743, April. 2019.
- [29] 3GPP, “Study on New Radio Access Technology Physical Layer Aspects,” Document 3GPP RT 38.802v14.0.0, March 2017.
- [30] J. Scarlett, V. Y. F. Tan, and G. Durisi, “The dispersion of nearest-neighbor decoding for additive non-gaussian channels,” IEEE Transactions on Information Theory, vol. 63, no. 1, pp. 81–92, January 2017.
- [31] N. Zhang, Y. F. Liu, H. Farmanbar, T. H. Chang, M. Hong, and Z. Q. Luo, “Network Slicing for Service-Oriented Networks Under Resource Constraints,” IEEE Journal on Selected Areas in Communications, vol. 35, no. 11, pp. 2512–2521, November 2017.
- [32] P. Liu, Y. F. Liu, and J. Li, “An iterative reweighted minimization framework for joint channel and power allocation in the OFDMA system,” in 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), South Brisbane, Australia, April 2015.
- [33] D. R. Hunter, and K. Lange, “A Tutorial on MM Algorithms,” The American Statistician, vol. 58, no. 1, pp. 30–37, February 2004.
- [34] M. Razaviyayn, M. Hong, and Z. Luo, “A Unified Convergence Analysis of Block Successive Minimization Methods for Nonsmooth Optimization,” SIAM Journal on Optimization, vol. 23, no. 2, pp. 1126–1153, June 2013.
- [35] F. L. Hitchcock, “The Distribution of a Product from Several Sources to Numerous Localities”,Journal of Mathematics and Physics, vol. 20, no. 1-4, pp. 224–230, April 1941.
- [36] G.B. Dantzig, “Linear Programming and Extensions”, Princeton University Press, Princeton, N J, 1963.
- [37] N.V. Reinfeld, and W.R. Vogel, “Mathematical Programming”,Prentice-Hall, Englewood Gliffs, New Jersey, 1958.
- [38] D.G. Shimshak, J.A. Kaslik, and T.D. Barclay, “A modification of Vogel’s approximation method through the use of heuristics”,Information Systems and Operational Research, vol. 19, no. 3, pp. 259-263, 1981.
- [39] A. Charnes, and W. W. Cooper, “The Stepping Stone Method of Explaining Linear Programming Calculations in Transportation Problems”,Management Science, vol. 1, no. 1, pp. 1–102, October 1954.
- [40] H. A. Taha, “Operations Research: An introduction”, Pearson Education, Inc., Upper Saddle River, New Jersey, 2007.
- [41] R. Jain, D.M. Chiu, and W.R. Hawe, “A quantitative measure of fairness and discrimination for resource allocation in shared computer system,” Eastern Research Laboratory, Digital Equipment Corporation, vol. 38, September 1984.