Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TR 36.859
Word version: 13.0.0
0…
2…
2
References
3
Definitions, symbols and abbreviations
4
Targeted network deployment and intra-cell interference scenarios
5
Multiuser superposition transmission schemes
6
System-level performance evaluation
7
Conclusion
A
Evaluation methodology
$
Change History
2
References
p. 5
3
Definitions, symbols and abbreviations
p. 8
3.1
Definitions
p. 8
3.2
Symbols
p. 8
3.3
Abbreviations
p. 8
4
Targeted network deployment and intra-cell interference scenarios
p. 8
4.1
Network deployment scenarios
p. 8
4.2
Intra-cell interference scenarios
p. 10
5
Multiuser superposition transmission schemes
p. 10
5.1
Candidate multiuser superposition transmission schemes
p. 10
5.1.1
MUST Category 1: Superposition transmission with adaptive power ratio on component constellations and non-Gray-mapped composite constellation
p. 11
5.1.2
MUST Category 2: Superposition transmission with adaptive power ratio on component constellations and Gray-mapped composite constellation
p. 12
5.1.3
MUST Category 3: Superposition transmission with label-bit assignment on Gray-mapped composite constellation
p. 13
5.2
Candidate receiver schemes
p. 13
5.3
Potential assistance information
p. 14
5.3.1
MUST category 1 & category 2
p. 14
5.3.2
MUST category 3
p. 15
5.4
Link-level performance evaluation
p. 16
5.5
Potential specification impacts
p. 17
6
System-level performance evaluation
p. 18
6.1
Evaluation results of MUST for PDSCH
p. 18
6.1.1
Evaluation results for full-buffer traffic
p. 18
6.1.2
Evaluation results for FTP traffic
p. 20
6.2
Evaluation results of MUST for PMCH
p. 33
6.3
Observations
p. 33
7
Conclusion
p. 34
A
Evaluation methodology
p. 35
A.1
System-level evaluation assumptions
p. 35
A.1.1
Evaluation assumptions for PDSCH
p. 35
A.1.2
Evaluation assumptions for PMCH
p. 37
A.2
Link-level evaluation assumptions
p. 38
A.3
Methodology for link-to-system modelling
p. 38
A.3.1
Methodology for ML/R-ML modelling
p. 38
A.3.1.1
Method 1
p. 38
A.3.1.2
Method 2
p. 40
A.3.1.3
Method 3
p. 41
A.3.1.4
Method 4
p. 41
A.3.1.5
Method 5
p. 42
A.3.2
Methodology for hard CW-IC
p. 43
A.3.3
Simplified link to system models for CWIC, SLIC, and MMSE-IRC receivers.
p. 44
$
Change History
p. 47