SlideShare a Scribd company logo
URLLC
Ultra-reliable low latency communication
URLLC (Ultra-reliable low latency
communication)
• Ultra Reliable → BLERs as low as 10^-9 (10^-5 on [ITU-R M.2410.0])
• Ultra Low Latency →Very low latency
• Relate to mission-critical applications, where interrupted and robust exchange of
data is of outmost importance.
uRLLC Use Case
Urllc 20190709
Source of Delay
• transmission delay
• coding delay
• computing delay
• propagation delay
• backhaul delay
• DL transmission delay
Source of Packet Loss
• transmission error -> depends on resource allocation
• queueing delay violation
Scheduled/Non-ScheduledTraffic
• Scheduled traffic
• Non-scheduled traffic
• Connected/disconnected devices that have critical data, usually have short payload size
• Devices that request access reservation for subsequent scheduled transmissions of
critical data
• Critical device-to-device communications
• Effect of non-scheduled traffic:
• Queuing delay violation for scheduled traffic
• Delay and packet error probability for the first transmission
URLLC SCHEDULING
Grant-FreeAccess
Removing phases of scheduling request and grant issuing
Conventional Grant-Free
K-Repetitions
• Repeating the transmission multiple time
• When the first connection is “broken” the second one could replace, and so on.
Urllc 20190709
CO-EXISTENCEWITH
EMBB SCHEDULING
Co-Existence with eMBB Schedulling
• Why it’s important? uRLLC traffic could be bursting,
• Types of scheduling:
• Instant Scheduling
• Ongoing transmission interrupted
• (-) Performance Degradation on the other transmission
• (+)outperform the reservation based
• Reservation Based Scheduling
• Resource are reserved before
• Types:
• Semi-static
• Dynamic
SCHEDULING
ALGORITHMS
+ Comp Sci Algorithms Related to Scheduling and Resource
Urllc 20190709
Greedy algorithms
• Find local optimum in intent to find global optimum solution
• Example in Scheduling:
• Select user with largest RB to scheduled first, then the rest filled in the rest. Until the
queue is empty. → Goal: OptimizeThroughput
• Select users with best Signal Strength to scheduled first. → Goal: maintain reliability
Knapsack
• Given a set of items, each with a
weight and a value, determine the
number of each item to include in a
collection so that the total weight
is less than or equal to a given limit
and the total value is as large as
possible.
• Example:
• Weight: Resource Block (RB)
• Value:Throughput
Optimize Knapsack is NP-Hard (Nondeterministic
Polynomial time to solve) or we can say better to
guess the solution. Greedy is one of the solution.

More Related Content

PDF
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
INFOGAIN PUBLICATION
 
PDF
Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...
IRJET Journal
 
PDF
MuMHR: Multi-path, Multi-hop Hierarchical Routing
M H
 
PDF
Iisrt arunkumar b (networks)
IISRT
 
PPTX
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
ArunChokkalingam
 
PPTX
MANETS Routing By Vikash Maianwal
VIKASH MAINANWAL
 
PDF
Study of Leach Protocol- A Review
Editor IJMTER
 
PPTX
QOD routing protocols : phase 1 ppt
AAKASH S
 
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
INFOGAIN PUBLICATION
 
Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...
IRJET Journal
 
MuMHR: Multi-path, Multi-hop Hierarchical Routing
M H
 
Iisrt arunkumar b (networks)
IISRT
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
ArunChokkalingam
 
MANETS Routing By Vikash Maianwal
VIKASH MAINANWAL
 
Study of Leach Protocol- A Review
Editor IJMTER
 
QOD routing protocols : phase 1 ppt
AAKASH S
 

What's hot (20)

PPTX
Qo s oriented distributed routing protocols : anna university 2nd review ppt
AAKASH S
 
PDF
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
IJTET Journal
 
PPTX
Network Coding in Disruption Tolerant Network (DTN)
University of Science & Technology, Beijing
 
PPTX
Traffic-adaptive Medium Access Protocol
Gaurav Chauhan
 
PDF
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
vtunotesbysree
 
PDF
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
IJMER
 
PDF
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
ijtsrd
 
PDF
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
IDES Editor
 
PPTX
Routing in Wireless Sensor Networks
sashar86
 
PDF
Ad hoc Networks
Darpan Dekivadiya
 
PPTX
Geo-Cast Routing Protocol
chirag bhatt
 
PPTX
Interference-Aware Multipath Routing In Wireless Sensor NetworksMinor projr...
Rakesh Behera
 
PDF
Routing protocols in ad hoc network
NIIS Institute of Business Management, Bhubaneswar
 
PDF
M phil-computer-science-mobile-computing-projects
Vijay Karan
 
PPTX
Introduction to Mobile Ad hoc Networks
Sayed Chhattan Shah
 
PPTX
Energy Efficient Routing Approaches in Ad-hoc Networks
Kishan Patel
 
PPT
Adhoc and Sensor Networks - Chapter 07
Ali Habeeb
 
PDF
Network on Chip Architecture and Routing Techniques: A survey
IJRES Journal
 
PDF
ROBOTIC INNER SIGNAL PROPAGATION AND RANDOM ACCESS OVER HYBRID ACCESS SCHEME
IJCNCJournal
 
PDF
Various Clustering Techniques in Wireless Sensor Network
Editor IJCATR
 
Qo s oriented distributed routing protocols : anna university 2nd review ppt
AAKASH S
 
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
IJTET Journal
 
Network Coding in Disruption Tolerant Network (DTN)
University of Science & Technology, Beijing
 
Traffic-adaptive Medium Access Protocol
Gaurav Chauhan
 
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
vtunotesbysree
 
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
IJMER
 
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
ijtsrd
 
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
IDES Editor
 
Routing in Wireless Sensor Networks
sashar86
 
Ad hoc Networks
Darpan Dekivadiya
 
Geo-Cast Routing Protocol
chirag bhatt
 
Interference-Aware Multipath Routing In Wireless Sensor NetworksMinor projr...
Rakesh Behera
 
Routing protocols in ad hoc network
NIIS Institute of Business Management, Bhubaneswar
 
M phil-computer-science-mobile-computing-projects
Vijay Karan
 
Introduction to Mobile Ad hoc Networks
Sayed Chhattan Shah
 
Energy Efficient Routing Approaches in Ad-hoc Networks
Kishan Patel
 
Adhoc and Sensor Networks - Chapter 07
Ali Habeeb
 
Network on Chip Architecture and Routing Techniques: A survey
IJRES Journal
 
ROBOTIC INNER SIGNAL PROPAGATION AND RANDOM ACCESS OVER HYBRID ACCESS SCHEME
IJCNCJournal
 
Various Clustering Techniques in Wireless Sensor Network
Editor IJCATR
 
Ad

Similar to Urllc 20190709 (20)

PDF
Urllc 20190705
Jonathan Afendy
 
PPTX
Packet Scheduling Algorithms Unit-3.pptx
441GHarshavardhan
 
PPTX
Routing mee
sara_3
 
PDF
Et24912915
IJERA Editor
 
PDF
Advanced networking scheduling and QoS part 2
GIST (Gwangju Institute of Science and Technology)
 
PDF
AAA (Allocation, Admission and Assignment Control) for Network management
contactmvrk
 
PPTX
Training course O-RAN scheduler
ssuser37e1ef
 
PDF
A Bandwidth Efficient Scheduling Framework for Non Real Time Applications in ...
ijdpsjournal
 
PPT
Mq Lecture
barnettj10974
 
PDF
Mobiles Energy Consumption in LTE Uplink Networks
idescitation
 
PDF
Lecture set 1
Gopi Saiteja
 
PDF
OMG Data-Distribution Service (DDS) Tutorial - 2009
Gerardo Pardo-Castellote
 
PDF
Scheduling Problems from Workshop to Collaborative Mobile Computing: A State ...
IJCSIS Research Publications
 
PDF
Introduction to message_queue
Manfred Furuholmen
 
PPTX
Topic 5- Communications v1.pptx
DanishMahmood23
 
PDF
RESOURCE ALLOCATION TECHNIQUE USING LOAD MATRIX METHOD IN WIRELESS CELLULAR S...
cscpconf
 
PPT
20
myrajendra
 
PDF
DS Unit-4-Communication .pdf
SantoshUpreti6
 
PDF
Ultra-scalable Architectures for Telecommunications and Web 2.0 Services
Mauricio Arango
 
PPTX
ADITYA BHATIA 28TH FEB2023 to know about.pptx
khanbybit
 
Urllc 20190705
Jonathan Afendy
 
Packet Scheduling Algorithms Unit-3.pptx
441GHarshavardhan
 
Routing mee
sara_3
 
Et24912915
IJERA Editor
 
Advanced networking scheduling and QoS part 2
GIST (Gwangju Institute of Science and Technology)
 
AAA (Allocation, Admission and Assignment Control) for Network management
contactmvrk
 
Training course O-RAN scheduler
ssuser37e1ef
 
A Bandwidth Efficient Scheduling Framework for Non Real Time Applications in ...
ijdpsjournal
 
Mq Lecture
barnettj10974
 
Mobiles Energy Consumption in LTE Uplink Networks
idescitation
 
Lecture set 1
Gopi Saiteja
 
OMG Data-Distribution Service (DDS) Tutorial - 2009
Gerardo Pardo-Castellote
 
Scheduling Problems from Workshop to Collaborative Mobile Computing: A State ...
IJCSIS Research Publications
 
Introduction to message_queue
Manfred Furuholmen
 
Topic 5- Communications v1.pptx
DanishMahmood23
 
RESOURCE ALLOCATION TECHNIQUE USING LOAD MATRIX METHOD IN WIRELESS CELLULAR S...
cscpconf
 
DS Unit-4-Communication .pdf
SantoshUpreti6
 
Ultra-scalable Architectures for Telecommunications and Web 2.0 Services
Mauricio Arango
 
ADITYA BHATIA 28TH FEB2023 to know about.pptx
khanbybit
 
Ad

Recently uploaded (20)

PDF
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
PDF
settlement FOR FOUNDATION ENGINEERS.pdf
Endalkazene
 
PPTX
22PCOAM21 Session 2 Understanding Data Source.pptx
Guru Nanak Technical Institutions
 
PDF
flutter Launcher Icons, Splash Screens & Fonts
Ahmed Mohamed
 
PPTX
Tunnel Ventilation System in Kanpur Metro
220105053
 
PDF
top-5-use-cases-for-splunk-security-analytics.pdf
yaghutialireza
 
PPT
SCOPE_~1- technology of green house and poyhouse
bala464780
 
PPT
1. SYSTEMS, ROLES, AND DEVELOPMENT METHODOLOGIES.ppt
zilow058
 
PDF
Packaging Tips for Stainless Steel Tubes and Pipes
heavymetalsandtubes
 
PPTX
database slide on modern techniques for optimizing database queries.pptx
aky52024
 
PPTX
Victory Precisions_Supplier Profile.pptx
victoryprecisions199
 
PDF
Zero Carbon Building Performance standard
BassemOsman1
 
PDF
EVS+PRESENTATIONS EVS+PRESENTATIONS like
saiyedaqib429
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PDF
Cryptography and Information :Security Fundamentals
Dr. Madhuri Jawale
 
PDF
Introduction to Data Science: data science process
ShivarkarSandip
 
PDF
Top 10 read articles In Managing Information Technology.pdf
IJMIT JOURNAL
 
PDF
Zero carbon Building Design Guidelines V4
BassemOsman1
 
PDF
Software Testing Tools - names and explanation
shruti533256
 
PDF
July 2025: Top 10 Read Articles Advanced Information Technology
ijait
 
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
settlement FOR FOUNDATION ENGINEERS.pdf
Endalkazene
 
22PCOAM21 Session 2 Understanding Data Source.pptx
Guru Nanak Technical Institutions
 
flutter Launcher Icons, Splash Screens & Fonts
Ahmed Mohamed
 
Tunnel Ventilation System in Kanpur Metro
220105053
 
top-5-use-cases-for-splunk-security-analytics.pdf
yaghutialireza
 
SCOPE_~1- technology of green house and poyhouse
bala464780
 
1. SYSTEMS, ROLES, AND DEVELOPMENT METHODOLOGIES.ppt
zilow058
 
Packaging Tips for Stainless Steel Tubes and Pipes
heavymetalsandtubes
 
database slide on modern techniques for optimizing database queries.pptx
aky52024
 
Victory Precisions_Supplier Profile.pptx
victoryprecisions199
 
Zero Carbon Building Performance standard
BassemOsman1
 
EVS+PRESENTATIONS EVS+PRESENTATIONS like
saiyedaqib429
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
Cryptography and Information :Security Fundamentals
Dr. Madhuri Jawale
 
Introduction to Data Science: data science process
ShivarkarSandip
 
Top 10 read articles In Managing Information Technology.pdf
IJMIT JOURNAL
 
Zero carbon Building Design Guidelines V4
BassemOsman1
 
Software Testing Tools - names and explanation
shruti533256
 
July 2025: Top 10 Read Articles Advanced Information Technology
ijait
 

Urllc 20190709

  • 2. URLLC (Ultra-reliable low latency communication) • Ultra Reliable → BLERs as low as 10^-9 (10^-5 on [ITU-R M.2410.0]) • Ultra Low Latency →Very low latency • Relate to mission-critical applications, where interrupted and robust exchange of data is of outmost importance.
  • 5. Source of Delay • transmission delay • coding delay • computing delay • propagation delay • backhaul delay • DL transmission delay
  • 6. Source of Packet Loss • transmission error -> depends on resource allocation • queueing delay violation
  • 7. Scheduled/Non-ScheduledTraffic • Scheduled traffic • Non-scheduled traffic • Connected/disconnected devices that have critical data, usually have short payload size • Devices that request access reservation for subsequent scheduled transmissions of critical data • Critical device-to-device communications • Effect of non-scheduled traffic: • Queuing delay violation for scheduled traffic • Delay and packet error probability for the first transmission
  • 9. Grant-FreeAccess Removing phases of scheduling request and grant issuing Conventional Grant-Free
  • 10. K-Repetitions • Repeating the transmission multiple time • When the first connection is “broken” the second one could replace, and so on.
  • 13. Co-Existence with eMBB Schedulling • Why it’s important? uRLLC traffic could be bursting, • Types of scheduling: • Instant Scheduling • Ongoing transmission interrupted • (-) Performance Degradation on the other transmission • (+)outperform the reservation based • Reservation Based Scheduling • Resource are reserved before • Types: • Semi-static • Dynamic
  • 14. SCHEDULING ALGORITHMS + Comp Sci Algorithms Related to Scheduling and Resource
  • 16. Greedy algorithms • Find local optimum in intent to find global optimum solution • Example in Scheduling: • Select user with largest RB to scheduled first, then the rest filled in the rest. Until the queue is empty. → Goal: OptimizeThroughput • Select users with best Signal Strength to scheduled first. → Goal: maintain reliability
  • 17. Knapsack • Given a set of items, each with a weight and a value, determine the number of each item to include in a collection so that the total weight is less than or equal to a given limit and the total value is as large as possible. • Example: • Weight: Resource Block (RB) • Value:Throughput Optimize Knapsack is NP-Hard (Nondeterministic Polynomial time to solve) or we can say better to guess the solution. Greedy is one of the solution.