Reducing Age-of-Information for Computation-Intensive Messages via Packet Replacement
|
|
- Cecil Baker
- 5 years ago
- Views:
Transcription
1 Reducing Age-of-Information for Computation-Intensive Messages via Packet Replacement arxiv: v1 [cs.it] 15 Jan 19 Jie Gong, Qiaobin Kuang, Xiang Chen and Xiao Ma School of Data and Computer Science, Sun Yat-sen University, Guangzhou 516, China School of Electronics and Information Technology, Sun Yat-sen University, Guangzhou 516, China Abstract Freshness of data is an important performance metric for real-time applications, hich can be measured by age-of-information. For computation-intensive messages, the embedded information is not available until being computed. In this paper, e study the age-of-information for computationintensive messages, hich are firstly transmitted to a mobile edge server, and then processed in the edge server to extract the embedded information. The packet generation follos zeroait policy, by hich a ne packet is generated hen the last one is just delivered to the edge server. The queue in front of the edge server adopts one-packet-buffer replacement policy, meaning that only the latest received packet is preserved. We derive the expression of average age-of-information for exponentially distributed transmission time and computing time. With packet replacement, the average age is reduced compared ith the case ithout packet replacement, especially hen the transmission rate is close to or greater than the computing rate. I. INTRODUCTION Age-of-information, defined as the time elapsed since the generation of the latest delivered update, is one of the key metrics to measure the freshness of information in realtime monitoring and control applications [1]. Existing orks mainly study the influence of queuing and transmission delay on the age performance. Hoever, in computation-intensive applications such as autonomous driving and online facial recognition, an update, e.g. an image or a section of video record, needs to be processed to reveal the status information embedded in the packet. Due to the limited computational resource in the end devices, it is urgently required to adopt mobile edge computing (MEC) [] technology to offload the computing tasks. This ork focuses on the analysis of age-ofinformation for computation-intensive messages in MEC. In the literature, age-of-information as initially studied in the elementary queuing systems such as M/M/1, D/M/1, and M/D/1 queuing models ith first-come-first-served (FCFS) discipline [1]. As FCFS may result in large queuing delay, the last-come-first-served (LCFS) queue as considered to reduce the age-of-information [3]. Then, three packet management policies ere introduced to further enhance the performance [4], here out-dated messages ere discarded as they ere less valuable for status update. Other than applying queuing analysis here update packets are generated randomly, update generation policies can be designed hen the source has access to the channel s idle/busy state. The zero-ait policy, hich generates a fresh update just as the prior update is delivered and the channel becomes idle, as proposed in [5] to completely eliminate the aiting time in the queue. The optimality of the zero-ait policy as analyzed in [6]. The impact of computation on age has been recently considered in [7] hich focuses on scheduling in computation and netorking ith centralized cloud. Nevertheless, it is still an open problem to characterize age-of-information ith computing in MEC. In MEC, each packet experiences to stages: transmission and computing, hich can be vieed as a to-hop netork. Among the multi-hop related research efforts, the optimality of the last-generated-first-served (LGFS) policy as analyzed in multi-hop netorks [8]. The age-of-information for multiflo multi-hop netorks ith interference as studied in [9]. In the multi-hop line netork ith preemptive servers and random arrivals, a simple expression of average age as obtained in [1], [11] using stochastic hybrid systems (SHS) tool. Different from existing orks, our preliminary ork [1] derived the expression for the system ith zero-ait policy in transmission stage and M/M/1 FCFS queue in computing stage. In this paper, e further consider packet replacement policy in computing stage. In particular, the edge server preserves a queue of length one. If the queue is full and a ne packet arrives at the server, the old packet in the queue is discarded and replaced by the ne one. We characterize the age-of-information by deriving the distribution of transmission time, aiting time and inter-arrival time of the successfully computed packets. Numerical results illustrate that the message going through the system ith packet replacement is fresher than that ithout packet replacement. II. SYSTEM MODEL Consider a status update system for computation-intensive messages hich are processed at mobile edge server as shon in Fig. 1. The hole procedure is divided into to stages: transmission stage and computing stage. In the transmission stage, an update packet is firstly generated from the source, and then transmitted through the channel. The generation of update packets follos zero-ait policy, by hich a ne update is generated by the source hen the transmission of the previous update is just completed. Therefore, there is no
2 Acknoledgement Δ(t) P 3 P 4 Source Destination P Channel Edge Server Packet Replacement Fig. 1. Status update system ith MEC. Q 3 ~ Q Q 1 Q 4 τ 1 τ τ 3 τ 4 τ 5 τ 6 τ 7 τ 8 t t 1 t t 1 ' t 3 t ' t 4 t 3 ' t 4 ' t 5 X X 3 t 5 ' t aiting queue in the transmission stage. In the computing stage, the packet is received and computed by the edge server so that the information embedded in the packet is revealed to the destination. Both transmission and computing times are assumed to be random and follo exponential distribution ith means 1/λ and 1/µ, respectively, leading to queuing in the computing stage. In this paper, e consider a one-packet-buffer replacement queue, i.e., at most one packet is alloed to ait in the queue, and it is replaced if a ne one arrives. In this ay, the out-dated update is discarded and the freshest update goes into the queue for computing. It is expected to reduce the age-of-information compared ith FCFS queue. Denote τ i as the generation time instant of the i-th update packet, i 1,,. As zero-ait policy is adopted, τ i is also the transmission completion time of the(i 1)-th packet. Notice that not all the packets are received by the destination due to the packet replacement in the computing stage. We mainly focus on the computed packets as they account for the average age-of-information. For ease of analysis, the computed packets are re-indexed by k 1,,. Denote t k as the completion time instant of the transmission stage for the k-th computed packet, and t k as the completion time instant of the computing stage for the k-th computed packet. At the time instant t, the index of the latest information received by the destination is denoted by K(t) : max{k t k t}. (1) As τ i(t) t K(t) for some i(t), the generation time instant of this packet can be given as U(t) : τ i(t) 1. The age-ofinformation is defined as (t) : t U(t). () The satooth shaped sample path of the random process (t) is illustrated in Fig.. It can be seen from the figure that since the fifth packet has already arrived at the edge server just before the second packet is successfully computed. Hence, the fifth packet is re-indexed as the third computed packet. The average age in the observation range (,t) is defined by t : 1 t t (τ)dτ. (3) The integration is equal to the area belo the curve (t), hich can be calculated as the summation of the areas of parallelogramsp k and trapezoidsq k,k,,k(t), here X 1 Y Z 3 T Y 3 T 3 Fig.. A sample path of age-of-information ith MEC. K(t) is defined in (1). Therefore, the average age can be ritten as t K(t) 1 t Q 1 K(t) k (P k Q k )Q, (4) K(t) 1 here Q is the area in time interval (t K(t),t). As t goes to infinity, K(t) goes to infinity as ell. Consequently, the term Q 1Q K(t) 1 goes to zero as the nominator is finite. To calculate P k and Q k, denote X k : τ i τ i 1 as the transmission time for the k-th computed packet, hereisatisfies τ i t k, Y k : t k t k 1 as the time elapsed beteen the transmission completion time instants of the k-th and (k 1)-th computed packets, T k : t k t k as the system time of the k-th computed packet in the computing stage, including aiting time and service time, and Z k : t k t k 1 as the inter-departure time of the computing stage. We have P k X k 1 Z k, (5) Q k 1 (T k Y k ) 1 T k 1, (6) K(t) t t 1 Y k t, (7) k here t t t K(t). Substituting (5)-(7) into (4), and letting t going to infinity, e have lim t E[P k]e[q k ] t E[Y k ] 1 ( E[X k 1 Z k ]E[T k Y k ] 1 ) E[Y k ] E[Y k ], (8) here E[ ] is the expectation operator, and the fact that E[Tk ] E[T k 1 ] is used. Remark 1: The inter-departure time Z k is independent of X k 1 as it only depends on the arrival process at the edge server beteen the (k 1)-th and k-th packets and the system times of these to packets in computing stage. The
3 influence of X k 1 to Z k is blocked by the one-packet-buffer replacement queue principle. Hence, e have E[X k 1 Z k ] E[X k 1 ]E[Z k ]. (9) Furthermore, e have by definition that K(t) k E[Z k ] lim Z k t K(t) 1 lim t t K(t) 1 E[Y k]. (1) Hence, to calculate the average age-of-information, e only need to consider X k, Y k and T k. Remark : The average area E[Q k ] is equal to the one in [4] for M/M/1/ queue that is derived based on hether the queue is empty or not upon departure. For completeness of description, e re-calculate the result by proposing another method, hich directly derives the distributions of X k and Y k, hich are detailed in the next section. III. CALCULATION OF AVERAGE AGE In this section, e derive the average age according to (8). By definition, e have T k W k S k, here W k and S k are the aiting time and the service time in the computing stage, respectively. As X k and Y k depend on the system time of the (k 1)-th packet, e firstly derive the distribution of W k. Then, e calculate the terms in (8) one by one. A. Distribution of W k The event that the k-th packet has zero aiting time occurs if and only if there is no arrival during the service time s of the (k 1)-th packet, hich is equivalent to the event that the inter-arrival time in computing stage is larger than s. Since the inter-arrival time of the computing stage is exponentially distributed, e have Pr(W k ) Pr(no arrival in (,s))f Sk 1 (s)ds e λs µe µs ds µ λµ. (11) For the case that W k >, We consider the probability Pr( < W k S k 1 s). Notice that in the computing stage, the aiting time of the k-th packet is no longer than the service time of the (k 1)-th packet s. If s, W k is guaranteed. Then, the event W k > happens if and only if at least one packet arrives in time duration of length s. If s > on the other hand, the event < W k happens if and only if at least one packet arrives in time duration (s,s) 1. According to the total probability formula, e have Pr( < W k ) Pr( < W k S k 1 s)f Sk 1 (s)ds (1 e λs )µe µs ds (1 e λ )µe µs ds λ λµ (1 e (λµ) ). (1) 1 In this notation, e reset the transmission completion time instant of the (k 1)-th computed packet as. This is valid throughout this section. Hence, for >, the probability density function of W k is f W () : f Wk () λe (λµ), >. (13) B. Distribution of X k Recall that X k is the transmission time for the k-th computed packet. As X k is related to the aiting and computing process of the(k 1)-th packet, e derive the distribution ofx k conditioned on W k 1 and S k 1 by analyzing the probability Pr(X k > x W k 1,S k 1 s). Given W k 1 and S k 1, e analyze the conditions on hich the event X k > x occurs. In general, if the k-th packet arrives at time instant t, X k > x occurs if there are no packet arrivals before t for a time duration longer than x and no arrivals after t until the computing completion time for the (k 1)-th packet. The detailed results are as follos: 1) < s: If < s, and x, the event X k > x occurs hen the k-th packet arrives in the small interval (t,tdt) hile at the same time no packet arrivals during time intervals (t x, t) and (tdt, s), or no packet arrivals during (,s). The probability that a single packet arrives in (t,t dt) is λdt o(dt), Hence, the probability Pr(X k > x W k 1,S k 1 s) is the integral over all possible t, i.e., Pr(X k > x W k 1,S k 1 s) x e λ(t ) e λ(s t) λdt s x e λx e λ(s t) λdte λs (14) xλe λs e λx. (15) Notice that e ignore e λdt and o(dt) as they are higher-order infinitesimal. The first integral in (14) refers to the special case that the time interval before t is shorter than x. As there are no packet arrivals during (, ) by definition, this special case also results in X k > x. If < x s, the analysis is similar to the above, but the integral range is from x to s. Hence, e have Pr(X k > x W k 1,S k 1 s) x x e λ(t ) e λ(s t) λdt s x e λx e λ(s t) λdte λs (16) λe λs e λx. (17) If s < x s, the event X k > x occurs hen the k-th packet arrives in (t,tdt) hile at the same time no packet arrivals during time intervals (,t) and (t dt, s) for x < t < s, or no packet arrivals during (, s). We have Pr(X k > x W k 1,S k 1 s) s x e λ(t ) e λ(s t) λdte λs (s x)λe λs e λs. (18)
4 Finally, for the case that x > s, the event X k > x occurs hen there are no arrival during time interval (, x). Therefore, Pr(X k > x W k 1,S k 1 s) e λ(x ). (19) ) s < : In this case, e analyze the probability in the same ay. If x s, it is easy to verify that the result is equal to (15). Similarly, the result ith < x s is the same as (18), and the result ith x > s is the same as (19). While for s < x, the event X k > x occurs hen the k-th packet arrives in (t,t dt) hile at the same time no packet arrivals during time intervals (,t) and (tdt,s) for < t < s, or no packet arrivals during (, s). We have Pr(X k > x W k 1,S k 1 s) s e λ(t ) e λ(s t) λdte λs sλe λs e λs. () 3) : This case can be vieed the extreme case of s. By setting in (15)-(19) and check the validity, e have Pr(X k > x W k 1,S k 1 s) e λx. (1) In summary, by taking the derivative of Pr(X k > x W k 1,S k 1 s) in terms of x, e can obtain the conditional probability density function f X W,S (x,s) : f Xk W k 1,S k 1 (x,s) λe λx λe λs, x min{,s}, λe λx, < x s, λe λs, max{,s} < x s, () λe λ(x ), x > s,, else. According to (11), (13) and (), by the la of total expectation, e have E[X k ] E[E[X k W k 1,S k 1 ]] Pr(W k ) µe µs E[X k W k 1,S k 1 s]ds λe (λµ) µe µs E[X k W k 1,S k 1 s]dsd Pr(W k ) µe µs xλe λx dxds λe (λµ) µe µs xf X W,S (x,s)dxdsd 1 ( 1 1 µ ρ(1ρ) ρ 3 (1ρ) 4 ρ ) (1ρ), (3) here ρ λ/µ, and the second integral is calculated by dividing the integral region based on (). C. Distribution of Y k Recall that Y k is the time elapsed beteen the transmission completion time instants of the k-th and (k 1)-th computed packets. Similar to the previous subsection, e derive the conditional probability density functionf Yk W k 1,S k 1 (y,s) by calculating the conditional probability Pr(Y k y W k 1,S k 1 s). When y < s, the event Y k y occurs if and only if there is at least one packet arrival in (,y) and no packet arrivals in (y,s), i.e., Pr(Y k y W k 1,S k 1 s) (1 e λ(y ) )e λ(s y) e λ(s y) e λs. (4) When y s, the event Y k > y happens if and only if no packet arrivals in (,y). We have Pr(Y k y W k 1,S k 1 s) 1 Pr(Y k > y W k 1,S k 1 s) 1 e λ(y ). (5) By taking derivation of Pr(Y k y W k 1,S k 1 s), e have f Y W,S (y,s) : f Yk W k 1,S k 1 (y,s) { λe λ(s y), y < s, λe λ(y ), y s. (6) To calculate E[Y k ] and E[Yk ], e derive the probability density function of Y k as f Yk (y) Pr(W k 1 ) f Y W,S (y,s)µe µs ds λe (λµ) f Y W,S (y,s)µe µs dsd ( λ µ λµ ) e λy λµ(λµ) λµ (λµ) e µy ( λ µ λµ ) λµ λ y e (λµ)y. (7) Accordingly, e can obtain E[Y k ] 1 1ρρ µ ρ(1ρ), (8) ). (9) E[Y k ] µ ( 1 1 ρ ρ(1ρ) (1ρ) 4 D. Calculation of E[T k Y k ] To calculate E[T k Y k ], e rerite T k as a function of W k 1 and S k 1. We observe the relation beteen T k 1 and Y k. If T k 1 > Y k > W k 1, i.e., the k-th computed packet arrives at the edge server hen the (k 1)-th packet is still being processed, e have W k T k 1 Y k. Otherise, W k. Hence, e have W k (T k 1 Y k ) (W k 1 S k 1 Y k ). (3)
5 / packet replacement /o packet replacement ρ Fig. 3. Performance comparison for status update via mobile edge computing ith or ithout packet replacement. µ 1. Therefore, e obtain E[T k Y k ] E[(W k S k )Y k ] E[(W k 1 S k 1 Y k ) Y k ]E[S k ]E[Y k ] (31) as S k and Y k are independent ith each other. By utilizing the distributions of W k 1 and S k 1, and the conditional probability density function f Y W,S (y,s), e can calculate that E[(W k 1 S k 1 Y k ) Y k ] s Pr(W k 1 ) µe µs (s y)yλe λ(s y) dsdy λe (λµ) s µe µs (s y)yλe λ(s y) dydsd 1 ( 1 µ 1ρ 1ρ ) (1ρ) 4. (3) Since E[S k ] 1/µ, summarizing (8), (31) and (3), e have E[T k Y k ] 1 ( µ 1 1 ρ 1ρ ) (1ρ) 4. (33) E. Average Age-of-Information Finally, according to (8)-(1), (3), (8), (9) and (33), e obtain 1 ( µ ρ 13ρ (1ρ) ρ 3 (1ρ) 4 (1ρ) ) 1ρρ. (34) IV. NUMERICAL COMPARISON In this section, the average age-of-information for computation-intensive messages ith packet replacement is compared ith that ithout packet replacement as in [1], here all the packets ait in the queue for processing ith FCFS discipline. As shon in Fig. 3, ith packet replacement, the average age-of-information decreases as ρ increases. The phenomenon is reasonable as ith the increase of the channel transmission rate, the update packet aiting for computing is fresher as it is replaced by the latest update faster. Asymptotically, the minimum average age is achieved hen ρ, hich results in min /µ. In comparison, the average age ithout replacement first decreases as ρ increases, and then increases to infinity as ρ 1. When ρ is close to 1, the queue length in edge server becomes quite long, and the age becomes large due to the long time aiting in the queue. V. CONCLUSION AND FUTURE WORK In this paper, e have derived the average age-ofinformation for to-stage mobile computing system ith zeroait and packet replacement. The stationary distributions of some random processes are obtained, including the aiting time W k before being computed, the transmission time X k for the computed packet, and the inter-arrival time Y k of to consecutive computed packets. It is shon that ith packet replacement, the average age is reduced compared ith the case ithout packet replacement, and the value tends to a minimum /µ hen the transmission rate tends to infinity. Future ork includes finding other packet generation policies instead of zero-ait to further reduce the average age, and consider the cases ith multiple users or multiple edge servers. REFERENCES [1] S. Kaul, R. Yates, and M. Gruteser, Real-time status: Ho often should one update? in Proc. of IEEE INFOCOM, Mar. 1, pp [] Y. Mao, C. You, J. Zhang, K. Huang, and K. B. Letaief, A survey on mobile edge computing: The communication perspective, IEEE Commun. Surveys Tut., vol. 19, no. 4, pp , Fourthquarter 17. [3] S. K. Kaul, R. D. Yates, and M. Gruteser, Status updates through queues, in 46th Annual Conf. Inf. Sciences and Systems (CISS), Mar. 1, pp [4] M. Costa, M. Codreanu, and A. Ephremides, On the age of information in status update systems ith packet management, IEEE Trans. Inf. Theory, vol. 6, no. 4, pp , Apr. 16. [5] R. D. Yates, Lazy is timely: Status updates by an energy harvesting source, in IEEE Int. Symp. Inf. Theory (ISIT), Jun. 15, pp [6] Y. Sun, E. Uysal-Biyikoglu, R. D. Yates, C. E. Koksal, and N. B. Shroff, Update or ait: Ho to keep your data fresh, IEEE Trans. Inf. Theory, vol. 63, no. 11, pp , Nov. 17. [7] A. Alabbasi and V. Aggaral, Joint information freshness and completion time optimization for vehicular netorks, arxiv preprint arxiv: , 18. [8] A. M. Bedey, Y. Sun, and N. B. Shroff, Age-optimal information updates in multihop netorks, in IEEE Int. Symp. Inf. Theory (ISIT), Jun. 17, pp [9] R. Talak, S. Karaman, and E. Modiano, Minimizing age-of-information in multi-hop ireless netorks, in 55th Annual Allerton Conf. Commun., Control, and Computing (Allerton), Oct. 17, pp [1] R. D. Yates, Age of information in a netork of preemptive servers, in IEEE Conf. Computer Commun. Workshops (INFOCOM WKSHPS), Apr. 18, pp [11], The age of information in netorks: Moments, distributions, and sampling, arxiv preprint arxiv: , 18. [1] Q. Kuang, J. Gong, X. Chen, and X. Ma, Age-of-information for computation-intensive messages in mobile edge computing, arxiv preprint arxiv: v3, 19.
Multicast With Prioritized Delivery: How Fresh is Your Data?
Multicast With Prioritized Delivery: How Fresh is Your Data? Jing Zhong, Roy D Yates and Emina Solanin Department of ECE, Rutgers University, {ingzhong, ryates, eminasolanin}@rutgersedu arxiv:885738v [csit
More informationAge of Information Upon Decisions
Age of Information Upon Decisions Yunquan Dong, Zhengchuan Chen, Shanyun Liu, and Pingyi Fan School of Electronic & Information Engineering, Nanjing University of Information Science & Technology, Nanjing,
More informationAge-of-Information in the Presence of Error
Age-of-Information in the Presence of Error Kun Chen IIIS, Tsinghua University chenkun4@mails.tsinghua.edu.cn Longbo Huang IIIS, Tsinghua University longbohuang@tsinghua.edu.cn arxiv:65.559v [cs.pf] 2
More informationTHE Age of Information is a new metric that has been introduced
Age of Information With Prioritized Streams: When to Buffer Preempted Packets? Ali Maatouk *, Mohamad Assaad *, and Anthony Ephremides * TCL Chair on 5G, Laboratoire des Signaux et Systèmes, CentraleSupélec,
More informationDistributed Scheduling Algorithms for Optimizing Information Freshness in Wireless Networks
Distributed Scheduling Algorithms for Optimizing Information Freshness in Wireless Networks Rajat Talak, Sertac Karaman, and Eytan Modiano arxiv:803.06469v [cs.it] 7 Mar 208 Abstract Age of Information
More informationThe Age of Information in Multihop Networks
The Age of Information in Multihop Networks Ahmed M. Bedewy, Yin Sun, and Ness B. Shroff Dept. of ECE, Dept. of CSE, The Ohio State University, Columbus, OH. Dept. of ECE, Auburn University, Auburn, Alabama.
More informationAge-Optimal Updates of Multiple Information Flows
Age-Optimal Updates of Multiple Information Flows Yin Sun, Elif Uysal-Biyikoglu, and Sastry Kompella Dept. of ECE, Auburn University, Auburn, AL Dept. of EEE, Middle East Technical University, Ankara,
More informationOn the Energy-Delay Trade-off of a Two-Way Relay Network
On the Energy-Delay Trade-off of a To-Way Relay Netork Xiang He Aylin Yener Wireless Communications and Netorking Laboratory Electrical Engineering Department The Pennsylvania State University University
More informationUsing Erasure Feedback for Online Timely Updating with an Energy Harvesting Sensor
Using Erasure Feedback for Online Timely Updating with an Energy Harvesting Sensor Ahmed Arafa, Jing Yang, Sennur Ulukus 3, and H. Vincent Poor Electrical Engineering Department, Princeton University School
More informationAchieving the Age-Energy Tradeoff with a Finite-Battery Energy Harvesting Source
Achieving the Age-Energy Tradeoff ith a Finite-Battery Energy Harvesting Source Baran Tan Bacinoglu, Yin Sun, Elif Uysal-Biyikoglu, and Volkan Mutlu METU, Ankara, Turkey, Auburn University, AL, USA E-mail:
More informationAge-Minimal Online Policies for Energy Harvesting Sensors with Incremental Battery Recharges
Age-Minimal Online Policies for Energy Harvesting Sensors with Incremental Battery Recharges Ahmed Arafa, Jing Yang 2, Sennur Ulukus 3, and H. Vincent Poor Electrical Engineering Department, Princeton
More informationCan Determinacy Minimize Age of Information?
Can Determinacy Minimize Age of Information? Rajat Talak, Sertac Karaman, and Eytan Modiano Preemptive and non-preemptive last come first serve LCFS) queue with Poisson arrival and Gamma distributed service
More informationAge-Optimal Constrained Cache Updating
17 IEEE International Symposium on Information Theory (ISIT) -Optimal Constrained Cache Updating Roy D. Yates, Philippe Ciblat, Aylin Yener, Michèle Wigger Rutgers University, USA, ryates@winlab.rutgers.edu
More informationMinimizing Age of Information with Soft Updates
Minimizing Age of Information with Soft Updates Melih Bastopcu Sennur Ulukus arxiv:8.0848v [cs.it] 9 Dec 08 Department of Electrical and Computer Engineering University of Maryland, College Park, MD 074
More informationStatus Updates Through Queues
Status Updates hrough Queues Sanjit K. Kaul III-Delhi email: skkaul@iiitd.ac.in Roy D. Yates and Marco Gruteser WINLAB, ECE Dept., Rutgers University email: {ryates, gruteser}@winlab.rutgers.edu Abstract
More informationQueueing Theory I Summary! Little s Law! Queueing System Notation! Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K "
Queueing Theory I Summary Little s Law Queueing System Notation Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K " Little s Law a(t): the process that counts the number of arrivals
More informationIntro to Queueing Theory
1 Intro to Queueing Theory Little s Law M/G/1 queue Conservation Law 1/31/017 M/G/1 queue (Simon S. Lam) 1 Little s Law No assumptions applicable to any system whose arrivals and departures are observable
More informationOptimizing Information Freshness in Wireless Networks under General Interference Constraints
Optimizing Information Freshness in Wireless etworks under General Interference Constraints Rajat Talak, Sertac Karaman, Eytan Modiano arxiv:803.06467v [cs.it] 7 Mar 208 Abstract Age of information (AoI)
More informationReal-Time Status Updating: Multiple Sources
Real-Time Status Updating: Multiple Sources Roy D. Yates WINLAB, ECE Dept. Rutgers University email: ryates@winlab.rutgers.edu Sanjit Kaul IIIT-Delhi email: skkaul@iiitd.ac.in Abstract We examine multiple
More informationPerformance Evaluation of Queuing Systems
Performance Evaluation of Queuing Systems Introduction to Queuing Systems System Performance Measures & Little s Law Equilibrium Solution of Birth-Death Processes Analysis of Single-Station Queuing Systems
More informationCan Decentralized Status Update Achieve Universally Near-Optimal Age-of-Information in Wireless Multiaccess Channels?
Can Decentralized Status Update Achieve Universally Near-Optimal Age-of-Information in Wireless Multiaccess Channels? Zhiyuan Jiang, Bhaskar Krishnamachari, Sheng Zhou, Zhisheng Niu, Fellow, IEEE {zhiyuan,
More informationComputer Networks More general queuing systems
Computer Networks More general queuing systems Saad Mneimneh Computer Science Hunter College of CUNY New York M/G/ Introduction We now consider a queuing system where the customer service times have a
More informationThis document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.
This document is donloaded from DR-NTU, Nanyang Technological University Library, Singapore. Title Amplify-and-forard based to-ay relay ARQ system ith relay combination Author(s) Luo, Sheng; Teh, Kah Chan
More informationUpdate or Wait: How to Keep Your Data Fresh
Update or Wait: How to Keep Your Data Fresh Yin Sun, Elif Uysal-Biyikoglu, Roy D. Yates, C. Emre Koksal, and Ness B. Shroff Dept. of ECE, Dept. of CSE, The Ohio State University, Columbus, OH Dept. of
More informationM/G/1 and Priority Queueing
M/G/1 and Priority Queueing Richard T. B. Ma School of Computing National University of Singapore CS 5229: Advanced Compute Networks Outline PASTA M/G/1 Workload and FIFO Delay Pollaczek Khinchine Formula
More informationUpdate or Wait: How to Keep Your Data Fresh
Update or Wait: How to Keep Your Data Fresh Yin Sun, Elif Uysal-Biyikoglu, Roy Yates, C. Emre Koksal, and Ness B. Shroff Dept. of ECE, Dept. of CSE, The Ohio State University, Columbus, OH Dept. of EEE,
More informationQueueing systems. Renato Lo Cigno. Simulation and Performance Evaluation Queueing systems - Renato Lo Cigno 1
Queueing systems Renato Lo Cigno Simulation and Performance Evaluation 2014-15 Queueing systems - Renato Lo Cigno 1 Queues A Birth-Death process is well modeled by a queue Indeed queues can be used to
More informationOn Buffer Limited Congestion Window Dynamics and Packet Loss
On Buffer Limited Congestion Windo Dynamics and Packet Loss A. Fekete, G. Vattay Communication Netorks Laboratory, Eötvös University Pázmány P. sétány /A, Budapest, Hungary 7 Abstract The central result
More informationThe Age of Information in Networks: Moments, Distributions, and Sampling
The Age of Information in Networks: Moments, Distributions, and Sampling Roy D. Yates arxiv:806.03487v2 [cs.it 7 Jan 209 Abstract We examine a source providing status updates to monitors through a network
More informationStochastic Models of Manufacturing Systems
Stochastic Models of Manufacturing Systems Ivo Adan Systems 2/49 Continuous systems State changes continuously in time (e.g., in chemical applications) Discrete systems State is observed at fixed regular
More informationSolutions to Homework Discrete Stochastic Processes MIT, Spring 2011
Exercise 6.5: Solutions to Homework 0 6.262 Discrete Stochastic Processes MIT, Spring 20 Consider the Markov process illustrated below. The transitions are labelled by the rate q ij at which those transitions
More informationDynamic Power Allocation and Routing for Time Varying Wireless Networks
Dynamic Power Allocation and Routing for Time Varying Wireless Networks X 14 (t) X 12 (t) 1 3 4 k a P ak () t P a tot X 21 (t) 2 N X 2N (t) X N4 (t) µ ab () rate µ ab µ ab (p, S 3 ) µ ab µ ac () µ ab (p,
More informationM/G/1 and M/G/1/K systems
M/G/1 and M/G/1/K systems Dmitri A. Moltchanov dmitri.moltchanov@tut.fi http://www.cs.tut.fi/kurssit/elt-53606/ OUTLINE: Description of M/G/1 system; Methods of analysis; Residual life approach; Imbedded
More informationJob Scheduling and Multiple Access. Emre Telatar, EPFL Sibi Raj (EPFL), David Tse (UC Berkeley)
Job Scheduling and Multiple Access Emre Telatar, EPFL Sibi Raj (EPFL), David Tse (UC Berkeley) 1 Multiple Access Setting Characteristics of Multiple Access: Bursty Arrivals Uncoordinated Transmitters Interference
More informationChapter 2. Poisson Processes. Prof. Shun-Ren Yang Department of Computer Science, National Tsing Hua University, Taiwan
Chapter 2. Poisson Processes Prof. Shun-Ren Yang Department of Computer Science, National Tsing Hua University, Taiwan Outline Introduction to Poisson Processes Definition of arrival process Definition
More informationEnergy-Efficient Resource Allocation for Multi-User Mobile Edge Computing
Energy-Efficient Resource Allocation for Multi-User Mobile Edge Computing Junfeng Guo, Zhaozhe Song, Ying Cui Department of Electronic Engineering, Shanghai Jiao Tong University, Shanghai, P. R. China
More informationThe Age of Information: Real-Time Status Updating by Multiple Sources
1 The Age of Information: Real-Time Status Updating by Multiple Sources Roy D. Yates and Sanjit K. Kaul arxiv:1608.08622v2 [cs.it] 12 Dec 2017 Abstract We examine multiple independent sources providing
More informationAge of Information under Energy Replenishment Constraints
Age of Information under Energy Replenishment Constraints Baran Tan Bacinoglu, Elif Tugce Ceran, Elif Uysal-Biyioglu Middle East Technical University, Anara, Turey Imperial College, London,UK E-mail: barantan@metu.edu.tr,
More informationIntroduction to Queueing Theory
Introduction to Queueing Theory Raj Jain Washington University in Saint Louis Jain@eecs.berkeley.edu or Jain@wustl.edu A Mini-Course offered at UC Berkeley, Sept-Oct 2012 These slides and audio/video recordings
More informationChapter 2 Queueing Theory and Simulation
Chapter 2 Queueing Theory and Simulation Based on the slides of Dr. Dharma P. Agrawal, University of Cincinnati and Dr. Hiroyuki Ohsaki Graduate School of Information Science & Technology, Osaka University,
More informationThe Status Update Problem: Optimal Strategies for Pseudo-Deterministic Systems
The Status Update Problem: Optimal Strategies for Pseudo-Deterministic Systems Jared Tramontano under the direction of Dr. Shan-Yuan Ho Mr. Siddharth Venkatesh Department of Mathematics Massachusetts Institute
More informationIntroduction to Queueing Theory
Introduction to Queueing Theory Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: 30-1 Overview Queueing Notation
More informationQueuing Networks: Burke s Theorem, Kleinrock s Approximation, and Jackson s Theorem. Wade Trappe
Queuing Networks: Burke s Theorem, Kleinrock s Approximation, and Jackson s Theorem Wade Trappe Lecture Overview Network of Queues Introduction Queues in Tandem roduct Form Solutions Burke s Theorem What
More informationCDA5530: Performance Models of Computers and Networks. Chapter 4: Elementary Queuing Theory
CDA5530: Performance Models of Computers and Networks Chapter 4: Elementary Queuing Theory Definition Queuing system: a buffer (waiting room), service facility (one or more servers) a scheduling policy
More informationBatch Arrival Queuing Models with Periodic Review
Batch Arrival Queuing Models with Periodic Review R. Sivaraman Ph.D. Research Scholar in Mathematics Sri Satya Sai University of Technology and Medical Sciences Bhopal, Madhya Pradesh National Awardee
More informationQueueing Theory and Simulation. Introduction
Queueing Theory and Simulation Based on the slides of Dr. Dharma P. Agrawal, University of Cincinnati and Dr. Hiroyuki Ohsaki Graduate School of Information Science & Technology, Osaka University, Japan
More informationAn Improved Driving Scheme in an Electrophoretic Display
International Journal of Engineering and Technology Volume 3 No. 4, April, 2013 An Improved Driving Scheme in an Electrophoretic Display Pengfei Bai 1, Zichuan Yi 1, Guofu Zhou 1,2 1 Electronic Paper Displays
More informationFigure 10.1: Recording when the event E occurs
10 Poisson Processes Let T R be an interval. A family of random variables {X(t) ; t T} is called a continuous time stochastic process. We often consider T = [0, 1] and T = [0, ). As X(t) is a random variable
More informationOptimizing Age of Information in Wireless Networks with Throughput Constraints
Optimizing Age of Information in Wireless Networks with Throughput Constraints Igor adota, Abhishek Sinha and Eytan Modiano Laboratory for Information & Decision Systems, MIT Abstract Age of Information
More informationCPSC 531: System Modeling and Simulation. Carey Williamson Department of Computer Science University of Calgary Fall 2017
CPSC 531: System Modeling and Simulation Carey Williamson Department of Computer Science University of Calgary Fall 2017 Motivating Quote for Queueing Models Good things come to those who wait - poet/writer
More informationStochastic Hybrid Systems: Applications to Communication Networks
research supported by NSF Stochastic Hybrid Systems: Applications to Communication Networks João P. Hespanha Center for Control Engineering and Computation University of California at Santa Barbara Talk
More informationA POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation
A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation Karim G. Seddik and Amr A. El-Sherif 2 Electronics and Communications Engineering Department, American University in Cairo, New
More informationEnergy Cooperation and Traffic Management in Cellular Networks with Renewable Energy
Energy Cooperation and Traffic Management in Cellular Networks with Renewable Energy Hyun-Suk Lee Dept. of Electrical and Electronic Eng., Yonsei University, Seoul, Korea Jang-Won Lee Dept. of Electrical
More informationOn the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels
On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels Jie Luo, Anthony Ephremides ECE Dept. Univ. of Maryland College Park, MD 20742
More informationEnergy Optimal Control for Time Varying Wireless Networks. Michael J. Neely University of Southern California
Energy Optimal Control for Time Varying Wireless Networks Michael J. Neely University of Southern California http://www-rcf.usc.edu/~mjneely Part 1: A single wireless downlink (L links) L 2 1 S={Totally
More informationP e = 0.1. P e = 0.01
23 10 0 10-2 P e = 0.1 Deadline Failure Probability 10-4 10-6 10-8 P e = 0.01 10-10 P e = 0.001 10-12 10 11 12 13 14 15 16 Number of Slots in a Frame Fig. 10. The deadline failure probability as a function
More informationCS418 Operating Systems
CS418 Operating Systems Lecture 14 Queuing Analysis Textbook: Operating Systems by William Stallings 1 1. Why Queuing Analysis? If the system environment changes (like the number of users is doubled),
More informationP (L d k = n). P (L(t) = n),
4 M/G/1 queue In the M/G/1 queue customers arrive according to a Poisson process with rate λ and they are treated in order of arrival The service times are independent and identically distributed with
More informationA ROBUST BEAMFORMER BASED ON WEIGHTED SPARSE CONSTRAINT
Progress In Electromagnetics Research Letters, Vol. 16, 53 60, 2010 A ROBUST BEAMFORMER BASED ON WEIGHTED SPARSE CONSTRAINT Y. P. Liu and Q. Wan School of Electronic Engineering University of Electronic
More informationSimple queueing models
Simple queueing models c University of Bristol, 2012 1 M/M/1 queue This model describes a queue with a single server which serves customers in the order in which they arrive. Customer arrivals constitute
More information16:330:543 Communication Networks I Midterm Exam November 7, 2005
l l l l l l l l 1 3 np n = ρ 1 ρ = λ µ λ. n= T = E[N] = 1 λ µ λ = 1 µ 1. 16:33:543 Communication Networks I Midterm Exam November 7, 5 You have 16 minutes to complete this four problem exam. If you know
More informationNICTA Short Course. Network Analysis. Vijay Sivaraman. Day 1 Queueing Systems and Markov Chains. Network Analysis, 2008s2 1-1
NICTA Short Course Network Analysis Vijay Sivaraman Day 1 Queueing Systems and Markov Chains Network Analysis, 2008s2 1-1 Outline Why a short course on mathematical analysis? Limited current course offering
More informationUpdate or Wait: How to Keep Your Data Fresh
Update or Wait: How to Keep Your Data Fresh Yin Sun, Elif Uysal-Biyikoglu, Roy D. Yates, C. Emre Koksal, and Ness B. Shroff Dept. of ECE, Dept. of CSE, The Ohio State University, Columbus, OH Dept. of
More informationPart I Stochastic variables and Markov chains
Part I Stochastic variables and Markov chains Random variables describe the behaviour of a phenomenon independent of any specific sample space Distribution function (cdf, cumulative distribution function)
More information2905 Queueing Theory and Simulation PART III: HIGHER DIMENSIONAL AND NON-MARKOVIAN QUEUES
295 Queueing Theory and Simulation PART III: HIGHER DIMENSIONAL AND NON-MARKOVIAN QUEUES 16 Queueing Systems with Two Types of Customers In this section, we discuss queueing systems with two types of customers.
More informationAdaptive Noise Cancellation
Adaptive Noise Cancellation P. Comon and V. Zarzoso January 5, 2010 1 Introduction In numerous application areas, including biomedical engineering, radar, sonar and digital communications, the goal is
More informationIntroduction to queuing theory
Introduction to queuing theory Queu(e)ing theory Queu(e)ing theory is the branch of mathematics devoted to how objects (packets in a network, people in a bank, processes in a CPU etc etc) join and leave
More informationClass 11 Non-Parametric Models of a Service System; GI/GI/1, GI/GI/n: Exact & Approximate Analysis.
Service Engineering Class 11 Non-Parametric Models of a Service System; GI/GI/1, GI/GI/n: Exact & Approximate Analysis. G/G/1 Queue: Virtual Waiting Time (Unfinished Work). GI/GI/1: Lindley s Equations
More informationChapter 10. Queuing Systems. D (Queuing Theory) Queuing theory is the branch of operations research concerned with waiting lines.
Chapter 10 Queuing Systems D. 10. 1. (Queuing Theory) Queuing theory is the branch of operations research concerned with waiting lines. D. 10.. (Queuing System) A ueuing system consists of 1. a user source.
More informationScheduling Multicast Traffic with Deadlines in Wireless Networks
Scheduling Multicast Traffic with Deadlines in Wireless Networks yu Seob im, Chih-ping Li, and Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology Abstract
More informationOnline Scheduling for Energy Harvesting Broadcast Channels with Finite Battery
Online Scheduling for Energy Harvesting Broadcast Channels with Finite Battery Abdulrahman Baknina Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park,
More informationIntroduction to Markov Chains, Queuing Theory, and Network Performance
Introduction to Markov Chains, Queuing Theory, and Network Performance Marceau Coupechoux Telecom ParisTech, departement Informatique et Réseaux marceau.coupechoux@telecom-paristech.fr IT.2403 Modélisation
More informationE-Companion to Fully Sequential Procedures for Large-Scale Ranking-and-Selection Problems in Parallel Computing Environments
E-Companion to Fully Sequential Procedures for Large-Scale Ranking-and-Selection Problems in Parallel Computing Environments Jun Luo Antai College of Economics and Management Shanghai Jiao Tong University
More informationOptimal power-delay trade-offs in fading channels: small delay asymptotics
Optimal power-delay trade-offs in fading channels: small delay asymptotics Randall A. Berry Dept. of EECS, Northwestern University 45 Sheridan Rd., Evanston IL 6008 Email: rberry@ece.northwestern.edu Abstract
More informationSampling of the Wiener Process for Remote Estimation over a Channel with Random Delay
1 Sampling of the Wiener Process for Remote Estimation over a Channel with Random Delay Yin Sun, Yury Polyanskiy, and Elif Uysal-Biyikoglu Dept. of ECE, Auburn University, Auburn, AL Dept. of EECS, Massachusetts
More informationTransmission Schemes for Lifetime Maximization in Wireless Sensor Networks: Uncorrelated Source Observations
Transmission Schemes for Lifetime Maximization in Wireless Sensor Networks: Uncorrelated Source Observations Xiaolu Zhang, Meixia Tao and Chun Sum Ng Department of Electrical and Computer Engineering National
More informationLearning Algorithms for Minimizing Queue Length Regret
Learning Algorithms for Minimizing Queue Length Regret Thomas Stahlbuhk Massachusetts Institute of Technology Cambridge, MA Brooke Shrader MIT Lincoln Laboratory Lexington, MA Eytan Modiano Massachusetts
More informationThroughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting
Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting Swapna B.T., Atilla Eryilmaz, and Ness B. Shroff Departments of ECE and CSE The Ohio State University Columbus, OH 43210
More informationAnalysis of Software Artifacts
Analysis of Software Artifacts System Performance I Shu-Ngai Yeung (with edits by Jeannette Wing) Department of Statistics Carnegie Mellon University Pittsburgh, PA 15213 2001 by Carnegie Mellon University
More informationUNIVERSITY OF YORK. MSc Examinations 2004 MATHEMATICS Networks. Time Allowed: 3 hours.
UNIVERSITY OF YORK MSc Examinations 2004 MATHEMATICS Networks Time Allowed: 3 hours. Answer 4 questions. Standard calculators will be provided but should be unnecessary. 1 Turn over 2 continued on next
More informationTowards a Theory of Societal Co-Evolution: Individualism versus Collectivism
Toards a Theory of Societal Co-Evolution: Individualism versus Collectivism Kartik Ahuja, Simpson Zhang and Mihaela van der Schaar Department of Electrical Engineering, Department of Economics, UCLA Theorem
More informationEquivalent Models and Analysis for Multi-Stage Tree Networks of Deterministic Service Time Queues
Proceedings of the 38th Annual Allerton Conference on Communication, Control, and Computing, Oct. 2000. Equivalent Models and Analysis for Multi-Stage ree Networks of Deterministic Service ime Queues Michael
More informationAnalysis of A Single Queue
Analysis of A Single Queue Raj Jain Washington University in Saint Louis Jain@eecs.berkeley.edu or Jain@wustl.edu A Mini-Course offered at UC Berkeley, Sept-Oct 2012 These slides and audio/video recordings
More informationTraversing Virtual Network Functions from the Edge to the Core: An End-to-End Performance Analysis
Traversing Virtual Network Functions from the Edge to the Core: An End-to-End Performance Analysis Emmanouil Fountoulakis, Qi Liao, Manuel Stein, Nikolaos Pappas Department of Science and Technology, Linköping
More informationM/G/1 queues and Busy Cycle Analysis
queues and Busy Cycle Analysis John C.S. Lui Department of Computer Science & Engineering The Chinese University of Hong Kong www.cse.cuhk.edu.hk/ cslui John C.S. Lui (CUHK) Computer Systems Performance
More informationAn Analysis of the Preemptive Repeat Queueing Discipline
An Analysis of the Preemptive Repeat Queueing Discipline Tony Field August 3, 26 Abstract An analysis of two variants of preemptive repeat or preemptive repeat queueing discipline is presented: one in
More informationA Simple Memoryless Proof of the Capacity of the Exponential Server Timing Channel
A Simple Memoryless Proof of the Capacity of the Exponential Server iming Channel odd P. Coleman ECE Department Coordinated Science Laboratory University of Illinois colemant@illinois.edu Abstract his
More informationOptimum Relay Position for Differential Amplify-and-Forward Cooperative Communications
Optimum Relay Position for Differential Amplify-and-Forard Cooperative Communications Kazunori Hayashi #1, Kengo Shirai #, Thanongsak Himsoon 1, W Pam Siriongpairat, Ahmed K Sadek 3,KJRayLiu 4, and Hideaki
More informationRandomized Smoothing Networks
Randomized Smoothing Netorks Maurice Herlihy Computer Science Dept., Bron University, Providence, RI, USA Srikanta Tirthapura Dept. of Electrical and Computer Engg., Ioa State University, Ames, IA, USA
More informationSolutions to COMP9334 Week 8 Sample Problems
Solutions to COMP9334 Week 8 Sample Problems Problem 1: Customers arrive at a grocery store s checkout counter according to a Poisson process with rate 1 per minute. Each customer carries a number of items
More informationFundamental Limits of Invisible Flow Fingerprinting
Fundamental Limits of Invisible Flow Fingerprinting Ramin Soltani, Dennis Goeckel, Don Towsley, and Amir Houmansadr Electrical and Computer Engineering Department, University of Massachusetts, Amherst,
More informationChapter 1. Introduction. 1.1 Stochastic process
Chapter 1 Introduction Process is a phenomenon that takes place in time. In many practical situations, the result of a process at any time may not be certain. Such a process is called a stochastic process.
More informationComputation Offloading Strategy Optimization with Multiple Heterogeneous Servers in Mobile Edge Computing
IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING VOL XX NO YY MONTH 019 1 Computation Offloading Strategy Optimization with Multiple Heterogeneous Servers in Mobile Edge Computing Keqin Li Fellow IEEE Abstract
More informationPart II: continuous time Markov chain (CTMC)
Part II: continuous time Markov chain (CTMC) Continuous time discrete state Markov process Definition (Markovian property) X(t) is a CTMC, if for any n and any sequence t 1
More informationLink Models for Packet Switching
Link Models for Packet Switching To begin our study of the performance of communications networks, we will study a model of a single link in a message switched network. The important feature of this model
More informationDelay-Optimal Computation Task Scheduling for Mobile-Edge Computing Systems
Delay-Optimal Computation Task Scheduling for Mobile-Edge Computing Systems Juan Liu, Yuyi Mao, Jun Zhang, and K. B. Letaief, Fellow, IEEE Dept. of ECE, The Hong Kong University of Science and Technology,
More informationChapter 3 Balance equations, birth-death processes, continuous Markov Chains
Chapter 3 Balance equations, birth-death processes, continuous Markov Chains Ioannis Glaropoulos November 4, 2012 1 Exercise 3.2 Consider a birth-death process with 3 states, where the transition rate
More informationCHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION. From Exploratory Factor Analysis Ledyard R Tucker and Robert C. MacCallum
CHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION From Exploratory Factor Analysis Ledyard R Tucker and Robert C. MacCallum 1997 19 CHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION 3.0. Introduction
More informationLink Models for Circuit Switching
Link Models for Circuit Switching The basis of traffic engineering for telecommunication networks is the Erlang loss function. It basically allows us to determine the amount of telephone traffic that can
More informationQuiz 1 EE 549 Wednesday, Feb. 27, 2008
UNIVERSITY OF SOUTHERN CALIFORNIA, SPRING 2008 1 Quiz 1 EE 549 Wednesday, Feb. 27, 2008 INSTRUCTIONS This quiz lasts for 85 minutes. This quiz is closed book and closed notes. No Calculators or laptops
More information