Reducing Age-of-Information for Computation-Intensive Messages via Packet Replacement

Size: px
Start display at page:

Download "Reducing Age-of-Information for Computation-Intensive Messages via Packet Replacement"

Transcription

1 Reducing Age-of-Information for Computation-Intensive Messages via Packet Replacement arxiv: v1 [cs.it] 15 Jan 19 Jie Gong, Qiaobin Kuang, Xiang Chen and Xiao Ma School of Data and Computer Science, Sun Yat-sen University, Guangzhou 516, China School of Electronics and Information Technology, Sun Yat-sen University, Guangzhou 516, China Abstract Freshness of data is an important performance metric for real-time applications, hich can be measured by age-of-information. For computation-intensive messages, the embedded information is not available until being computed. In this paper, e study the age-of-information for computationintensive messages, hich are firstly transmitted to a mobile edge server, and then processed in the edge server to extract the embedded information. The packet generation follos zeroait policy, by hich a ne packet is generated hen the last one is just delivered to the edge server. The queue in front of the edge server adopts one-packet-buffer replacement policy, meaning that only the latest received packet is preserved. We derive the expression of average age-of-information for exponentially distributed transmission time and computing time. With packet replacement, the average age is reduced compared ith the case ithout packet replacement, especially hen the transmission rate is close to or greater than the computing rate. I. INTRODUCTION Age-of-information, defined as the time elapsed since the generation of the latest delivered update, is one of the key metrics to measure the freshness of information in realtime monitoring and control applications [1]. Existing orks mainly study the influence of queuing and transmission delay on the age performance. Hoever, in computation-intensive applications such as autonomous driving and online facial recognition, an update, e.g. an image or a section of video record, needs to be processed to reveal the status information embedded in the packet. Due to the limited computational resource in the end devices, it is urgently required to adopt mobile edge computing (MEC) [] technology to offload the computing tasks. This ork focuses on the analysis of age-ofinformation for computation-intensive messages in MEC. In the literature, age-of-information as initially studied in the elementary queuing systems such as M/M/1, D/M/1, and M/D/1 queuing models ith first-come-first-served (FCFS) discipline [1]. As FCFS may result in large queuing delay, the last-come-first-served (LCFS) queue as considered to reduce the age-of-information [3]. Then, three packet management policies ere introduced to further enhance the performance [4], here out-dated messages ere discarded as they ere less valuable for status update. Other than applying queuing analysis here update packets are generated randomly, update generation policies can be designed hen the source has access to the channel s idle/busy state. The zero-ait policy, hich generates a fresh update just as the prior update is delivered and the channel becomes idle, as proposed in [5] to completely eliminate the aiting time in the queue. The optimality of the zero-ait policy as analyzed in [6]. The impact of computation on age has been recently considered in [7] hich focuses on scheduling in computation and netorking ith centralized cloud. Nevertheless, it is still an open problem to characterize age-of-information ith computing in MEC. In MEC, each packet experiences to stages: transmission and computing, hich can be vieed as a to-hop netork. Among the multi-hop related research efforts, the optimality of the last-generated-first-served (LGFS) policy as analyzed in multi-hop netorks [8]. The age-of-information for multiflo multi-hop netorks ith interference as studied in [9]. In the multi-hop line netork ith preemptive servers and random arrivals, a simple expression of average age as obtained in [1], [11] using stochastic hybrid systems (SHS) tool. Different from existing orks, our preliminary ork [1] derived the expression for the system ith zero-ait policy in transmission stage and M/M/1 FCFS queue in computing stage. In this paper, e further consider packet replacement policy in computing stage. In particular, the edge server preserves a queue of length one. If the queue is full and a ne packet arrives at the server, the old packet in the queue is discarded and replaced by the ne one. We characterize the age-of-information by deriving the distribution of transmission time, aiting time and inter-arrival time of the successfully computed packets. Numerical results illustrate that the message going through the system ith packet replacement is fresher than that ithout packet replacement. II. SYSTEM MODEL Consider a status update system for computation-intensive messages hich are processed at mobile edge server as shon in Fig. 1. The hole procedure is divided into to stages: transmission stage and computing stage. In the transmission stage, an update packet is firstly generated from the source, and then transmitted through the channel. The generation of update packets follos zero-ait policy, by hich a ne update is generated by the source hen the transmission of the previous update is just completed. Therefore, there is no

2 Acknoledgement Δ(t) P 3 P 4 Source Destination P Channel Edge Server Packet Replacement Fig. 1. Status update system ith MEC. Q 3 ~ Q Q 1 Q 4 τ 1 τ τ 3 τ 4 τ 5 τ 6 τ 7 τ 8 t t 1 t t 1 ' t 3 t ' t 4 t 3 ' t 4 ' t 5 X X 3 t 5 ' t aiting queue in the transmission stage. In the computing stage, the packet is received and computed by the edge server so that the information embedded in the packet is revealed to the destination. Both transmission and computing times are assumed to be random and follo exponential distribution ith means 1/λ and 1/µ, respectively, leading to queuing in the computing stage. In this paper, e consider a one-packet-buffer replacement queue, i.e., at most one packet is alloed to ait in the queue, and it is replaced if a ne one arrives. In this ay, the out-dated update is discarded and the freshest update goes into the queue for computing. It is expected to reduce the age-of-information compared ith FCFS queue. Denote τ i as the generation time instant of the i-th update packet, i 1,,. As zero-ait policy is adopted, τ i is also the transmission completion time of the(i 1)-th packet. Notice that not all the packets are received by the destination due to the packet replacement in the computing stage. We mainly focus on the computed packets as they account for the average age-of-information. For ease of analysis, the computed packets are re-indexed by k 1,,. Denote t k as the completion time instant of the transmission stage for the k-th computed packet, and t k as the completion time instant of the computing stage for the k-th computed packet. At the time instant t, the index of the latest information received by the destination is denoted by K(t) : max{k t k t}. (1) As τ i(t) t K(t) for some i(t), the generation time instant of this packet can be given as U(t) : τ i(t) 1. The age-ofinformation is defined as (t) : t U(t). () The satooth shaped sample path of the random process (t) is illustrated in Fig.. It can be seen from the figure that since the fifth packet has already arrived at the edge server just before the second packet is successfully computed. Hence, the fifth packet is re-indexed as the third computed packet. The average age in the observation range (,t) is defined by t : 1 t t (τ)dτ. (3) The integration is equal to the area belo the curve (t), hich can be calculated as the summation of the areas of parallelogramsp k and trapezoidsq k,k,,k(t), here X 1 Y Z 3 T Y 3 T 3 Fig.. A sample path of age-of-information ith MEC. K(t) is defined in (1). Therefore, the average age can be ritten as t K(t) 1 t Q 1 K(t) k (P k Q k )Q, (4) K(t) 1 here Q is the area in time interval (t K(t),t). As t goes to infinity, K(t) goes to infinity as ell. Consequently, the term Q 1Q K(t) 1 goes to zero as the nominator is finite. To calculate P k and Q k, denote X k : τ i τ i 1 as the transmission time for the k-th computed packet, hereisatisfies τ i t k, Y k : t k t k 1 as the time elapsed beteen the transmission completion time instants of the k-th and (k 1)-th computed packets, T k : t k t k as the system time of the k-th computed packet in the computing stage, including aiting time and service time, and Z k : t k t k 1 as the inter-departure time of the computing stage. We have P k X k 1 Z k, (5) Q k 1 (T k Y k ) 1 T k 1, (6) K(t) t t 1 Y k t, (7) k here t t t K(t). Substituting (5)-(7) into (4), and letting t going to infinity, e have lim t E[P k]e[q k ] t E[Y k ] 1 ( E[X k 1 Z k ]E[T k Y k ] 1 ) E[Y k ] E[Y k ], (8) here E[ ] is the expectation operator, and the fact that E[Tk ] E[T k 1 ] is used. Remark 1: The inter-departure time Z k is independent of X k 1 as it only depends on the arrival process at the edge server beteen the (k 1)-th and k-th packets and the system times of these to packets in computing stage. The

3 influence of X k 1 to Z k is blocked by the one-packet-buffer replacement queue principle. Hence, e have E[X k 1 Z k ] E[X k 1 ]E[Z k ]. (9) Furthermore, e have by definition that K(t) k E[Z k ] lim Z k t K(t) 1 lim t t K(t) 1 E[Y k]. (1) Hence, to calculate the average age-of-information, e only need to consider X k, Y k and T k. Remark : The average area E[Q k ] is equal to the one in [4] for M/M/1/ queue that is derived based on hether the queue is empty or not upon departure. For completeness of description, e re-calculate the result by proposing another method, hich directly derives the distributions of X k and Y k, hich are detailed in the next section. III. CALCULATION OF AVERAGE AGE In this section, e derive the average age according to (8). By definition, e have T k W k S k, here W k and S k are the aiting time and the service time in the computing stage, respectively. As X k and Y k depend on the system time of the (k 1)-th packet, e firstly derive the distribution of W k. Then, e calculate the terms in (8) one by one. A. Distribution of W k The event that the k-th packet has zero aiting time occurs if and only if there is no arrival during the service time s of the (k 1)-th packet, hich is equivalent to the event that the inter-arrival time in computing stage is larger than s. Since the inter-arrival time of the computing stage is exponentially distributed, e have Pr(W k ) Pr(no arrival in (,s))f Sk 1 (s)ds e λs µe µs ds µ λµ. (11) For the case that W k >, We consider the probability Pr( < W k S k 1 s). Notice that in the computing stage, the aiting time of the k-th packet is no longer than the service time of the (k 1)-th packet s. If s, W k is guaranteed. Then, the event W k > happens if and only if at least one packet arrives in time duration of length s. If s > on the other hand, the event < W k happens if and only if at least one packet arrives in time duration (s,s) 1. According to the total probability formula, e have Pr( < W k ) Pr( < W k S k 1 s)f Sk 1 (s)ds (1 e λs )µe µs ds (1 e λ )µe µs ds λ λµ (1 e (λµ) ). (1) 1 In this notation, e reset the transmission completion time instant of the (k 1)-th computed packet as. This is valid throughout this section. Hence, for >, the probability density function of W k is f W () : f Wk () λe (λµ), >. (13) B. Distribution of X k Recall that X k is the transmission time for the k-th computed packet. As X k is related to the aiting and computing process of the(k 1)-th packet, e derive the distribution ofx k conditioned on W k 1 and S k 1 by analyzing the probability Pr(X k > x W k 1,S k 1 s). Given W k 1 and S k 1, e analyze the conditions on hich the event X k > x occurs. In general, if the k-th packet arrives at time instant t, X k > x occurs if there are no packet arrivals before t for a time duration longer than x and no arrivals after t until the computing completion time for the (k 1)-th packet. The detailed results are as follos: 1) < s: If < s, and x, the event X k > x occurs hen the k-th packet arrives in the small interval (t,tdt) hile at the same time no packet arrivals during time intervals (t x, t) and (tdt, s), or no packet arrivals during (,s). The probability that a single packet arrives in (t,t dt) is λdt o(dt), Hence, the probability Pr(X k > x W k 1,S k 1 s) is the integral over all possible t, i.e., Pr(X k > x W k 1,S k 1 s) x e λ(t ) e λ(s t) λdt s x e λx e λ(s t) λdte λs (14) xλe λs e λx. (15) Notice that e ignore e λdt and o(dt) as they are higher-order infinitesimal. The first integral in (14) refers to the special case that the time interval before t is shorter than x. As there are no packet arrivals during (, ) by definition, this special case also results in X k > x. If < x s, the analysis is similar to the above, but the integral range is from x to s. Hence, e have Pr(X k > x W k 1,S k 1 s) x x e λ(t ) e λ(s t) λdt s x e λx e λ(s t) λdte λs (16) λe λs e λx. (17) If s < x s, the event X k > x occurs hen the k-th packet arrives in (t,tdt) hile at the same time no packet arrivals during time intervals (,t) and (t dt, s) for x < t < s, or no packet arrivals during (, s). We have Pr(X k > x W k 1,S k 1 s) s x e λ(t ) e λ(s t) λdte λs (s x)λe λs e λs. (18)

4 Finally, for the case that x > s, the event X k > x occurs hen there are no arrival during time interval (, x). Therefore, Pr(X k > x W k 1,S k 1 s) e λ(x ). (19) ) s < : In this case, e analyze the probability in the same ay. If x s, it is easy to verify that the result is equal to (15). Similarly, the result ith < x s is the same as (18), and the result ith x > s is the same as (19). While for s < x, the event X k > x occurs hen the k-th packet arrives in (t,t dt) hile at the same time no packet arrivals during time intervals (,t) and (tdt,s) for < t < s, or no packet arrivals during (, s). We have Pr(X k > x W k 1,S k 1 s) s e λ(t ) e λ(s t) λdte λs sλe λs e λs. () 3) : This case can be vieed the extreme case of s. By setting in (15)-(19) and check the validity, e have Pr(X k > x W k 1,S k 1 s) e λx. (1) In summary, by taking the derivative of Pr(X k > x W k 1,S k 1 s) in terms of x, e can obtain the conditional probability density function f X W,S (x,s) : f Xk W k 1,S k 1 (x,s) λe λx λe λs, x min{,s}, λe λx, < x s, λe λs, max{,s} < x s, () λe λ(x ), x > s,, else. According to (11), (13) and (), by the la of total expectation, e have E[X k ] E[E[X k W k 1,S k 1 ]] Pr(W k ) µe µs E[X k W k 1,S k 1 s]ds λe (λµ) µe µs E[X k W k 1,S k 1 s]dsd Pr(W k ) µe µs xλe λx dxds λe (λµ) µe µs xf X W,S (x,s)dxdsd 1 ( 1 1 µ ρ(1ρ) ρ 3 (1ρ) 4 ρ ) (1ρ), (3) here ρ λ/µ, and the second integral is calculated by dividing the integral region based on (). C. Distribution of Y k Recall that Y k is the time elapsed beteen the transmission completion time instants of the k-th and (k 1)-th computed packets. Similar to the previous subsection, e derive the conditional probability density functionf Yk W k 1,S k 1 (y,s) by calculating the conditional probability Pr(Y k y W k 1,S k 1 s). When y < s, the event Y k y occurs if and only if there is at least one packet arrival in (,y) and no packet arrivals in (y,s), i.e., Pr(Y k y W k 1,S k 1 s) (1 e λ(y ) )e λ(s y) e λ(s y) e λs. (4) When y s, the event Y k > y happens if and only if no packet arrivals in (,y). We have Pr(Y k y W k 1,S k 1 s) 1 Pr(Y k > y W k 1,S k 1 s) 1 e λ(y ). (5) By taking derivation of Pr(Y k y W k 1,S k 1 s), e have f Y W,S (y,s) : f Yk W k 1,S k 1 (y,s) { λe λ(s y), y < s, λe λ(y ), y s. (6) To calculate E[Y k ] and E[Yk ], e derive the probability density function of Y k as f Yk (y) Pr(W k 1 ) f Y W,S (y,s)µe µs ds λe (λµ) f Y W,S (y,s)µe µs dsd ( λ µ λµ ) e λy λµ(λµ) λµ (λµ) e µy ( λ µ λµ ) λµ λ y e (λµ)y. (7) Accordingly, e can obtain E[Y k ] 1 1ρρ µ ρ(1ρ), (8) ). (9) E[Y k ] µ ( 1 1 ρ ρ(1ρ) (1ρ) 4 D. Calculation of E[T k Y k ] To calculate E[T k Y k ], e rerite T k as a function of W k 1 and S k 1. We observe the relation beteen T k 1 and Y k. If T k 1 > Y k > W k 1, i.e., the k-th computed packet arrives at the edge server hen the (k 1)-th packet is still being processed, e have W k T k 1 Y k. Otherise, W k. Hence, e have W k (T k 1 Y k ) (W k 1 S k 1 Y k ). (3)

5 / packet replacement /o packet replacement ρ Fig. 3. Performance comparison for status update via mobile edge computing ith or ithout packet replacement. µ 1. Therefore, e obtain E[T k Y k ] E[(W k S k )Y k ] E[(W k 1 S k 1 Y k ) Y k ]E[S k ]E[Y k ] (31) as S k and Y k are independent ith each other. By utilizing the distributions of W k 1 and S k 1, and the conditional probability density function f Y W,S (y,s), e can calculate that E[(W k 1 S k 1 Y k ) Y k ] s Pr(W k 1 ) µe µs (s y)yλe λ(s y) dsdy λe (λµ) s µe µs (s y)yλe λ(s y) dydsd 1 ( 1 µ 1ρ 1ρ ) (1ρ) 4. (3) Since E[S k ] 1/µ, summarizing (8), (31) and (3), e have E[T k Y k ] 1 ( µ 1 1 ρ 1ρ ) (1ρ) 4. (33) E. Average Age-of-Information Finally, according to (8)-(1), (3), (8), (9) and (33), e obtain 1 ( µ ρ 13ρ (1ρ) ρ 3 (1ρ) 4 (1ρ) ) 1ρρ. (34) IV. NUMERICAL COMPARISON In this section, the average age-of-information for computation-intensive messages ith packet replacement is compared ith that ithout packet replacement as in [1], here all the packets ait in the queue for processing ith FCFS discipline. As shon in Fig. 3, ith packet replacement, the average age-of-information decreases as ρ increases. The phenomenon is reasonable as ith the increase of the channel transmission rate, the update packet aiting for computing is fresher as it is replaced by the latest update faster. Asymptotically, the minimum average age is achieved hen ρ, hich results in min /µ. In comparison, the average age ithout replacement first decreases as ρ increases, and then increases to infinity as ρ 1. When ρ is close to 1, the queue length in edge server becomes quite long, and the age becomes large due to the long time aiting in the queue. V. CONCLUSION AND FUTURE WORK In this paper, e have derived the average age-ofinformation for to-stage mobile computing system ith zeroait and packet replacement. The stationary distributions of some random processes are obtained, including the aiting time W k before being computed, the transmission time X k for the computed packet, and the inter-arrival time Y k of to consecutive computed packets. It is shon that ith packet replacement, the average age is reduced compared ith the case ithout packet replacement, and the value tends to a minimum /µ hen the transmission rate tends to infinity. Future ork includes finding other packet generation policies instead of zero-ait to further reduce the average age, and consider the cases ith multiple users or multiple edge servers. REFERENCES [1] S. Kaul, R. Yates, and M. Gruteser, Real-time status: Ho often should one update? in Proc. of IEEE INFOCOM, Mar. 1, pp [] Y. Mao, C. You, J. Zhang, K. Huang, and K. B. Letaief, A survey on mobile edge computing: The communication perspective, IEEE Commun. Surveys Tut., vol. 19, no. 4, pp , Fourthquarter 17. [3] S. K. Kaul, R. D. Yates, and M. Gruteser, Status updates through queues, in 46th Annual Conf. Inf. Sciences and Systems (CISS), Mar. 1, pp [4] M. Costa, M. Codreanu, and A. Ephremides, On the age of information in status update systems ith packet management, IEEE Trans. Inf. Theory, vol. 6, no. 4, pp , Apr. 16. [5] R. D. Yates, Lazy is timely: Status updates by an energy harvesting source, in IEEE Int. Symp. Inf. Theory (ISIT), Jun. 15, pp [6] Y. Sun, E. Uysal-Biyikoglu, R. D. Yates, C. E. Koksal, and N. B. Shroff, Update or ait: Ho to keep your data fresh, IEEE Trans. Inf. Theory, vol. 63, no. 11, pp , Nov. 17. [7] A. Alabbasi and V. Aggaral, Joint information freshness and completion time optimization for vehicular netorks, arxiv preprint arxiv: , 18. [8] A. M. Bedey, Y. Sun, and N. B. Shroff, Age-optimal information updates in multihop netorks, in IEEE Int. Symp. Inf. Theory (ISIT), Jun. 17, pp [9] R. Talak, S. Karaman, and E. Modiano, Minimizing age-of-information in multi-hop ireless netorks, in 55th Annual Allerton Conf. Commun., Control, and Computing (Allerton), Oct. 17, pp [1] R. D. Yates, Age of information in a netork of preemptive servers, in IEEE Conf. Computer Commun. Workshops (INFOCOM WKSHPS), Apr. 18, pp [11], The age of information in netorks: Moments, distributions, and sampling, arxiv preprint arxiv: , 18. [1] Q. Kuang, J. Gong, X. Chen, and X. Ma, Age-of-information for computation-intensive messages in mobile edge computing, arxiv preprint arxiv: v3, 19.

Multicast With Prioritized Delivery: How Fresh is Your Data?

Multicast With Prioritized Delivery: How Fresh is Your Data? Multicast With Prioritized Delivery: How Fresh is Your Data? Jing Zhong, Roy D Yates and Emina Solanin Department of ECE, Rutgers University, {ingzhong, ryates, eminasolanin}@rutgersedu arxiv:885738v [csit

More information

Age of Information Upon Decisions

Age of Information Upon Decisions Age of Information Upon Decisions Yunquan Dong, Zhengchuan Chen, Shanyun Liu, and Pingyi Fan School of Electronic & Information Engineering, Nanjing University of Information Science & Technology, Nanjing,

More information

Age-of-Information in the Presence of Error

Age-of-Information in the Presence of Error Age-of-Information in the Presence of Error Kun Chen IIIS, Tsinghua University chenkun4@mails.tsinghua.edu.cn Longbo Huang IIIS, Tsinghua University longbohuang@tsinghua.edu.cn arxiv:65.559v [cs.pf] 2

More information

THE Age of Information is a new metric that has been introduced

THE Age of Information is a new metric that has been introduced Age of Information With Prioritized Streams: When to Buffer Preempted Packets? Ali Maatouk *, Mohamad Assaad *, and Anthony Ephremides * TCL Chair on 5G, Laboratoire des Signaux et Systèmes, CentraleSupélec,

More information

Distributed Scheduling Algorithms for Optimizing Information Freshness in Wireless Networks

Distributed Scheduling Algorithms for Optimizing Information Freshness in Wireless Networks Distributed Scheduling Algorithms for Optimizing Information Freshness in Wireless Networks Rajat Talak, Sertac Karaman, and Eytan Modiano arxiv:803.06469v [cs.it] 7 Mar 208 Abstract Age of Information

More information

The Age of Information in Multihop Networks

The Age of Information in Multihop Networks The Age of Information in Multihop Networks Ahmed M. Bedewy, Yin Sun, and Ness B. Shroff Dept. of ECE, Dept. of CSE, The Ohio State University, Columbus, OH. Dept. of ECE, Auburn University, Auburn, Alabama.

More information

Age-Optimal Updates of Multiple Information Flows

Age-Optimal Updates of Multiple Information Flows Age-Optimal Updates of Multiple Information Flows Yin Sun, Elif Uysal-Biyikoglu, and Sastry Kompella Dept. of ECE, Auburn University, Auburn, AL Dept. of EEE, Middle East Technical University, Ankara,

More information

On the Energy-Delay Trade-off of a Two-Way Relay Network

On the Energy-Delay Trade-off of a Two-Way Relay Network On the Energy-Delay Trade-off of a To-Way Relay Netork Xiang He Aylin Yener Wireless Communications and Netorking Laboratory Electrical Engineering Department The Pennsylvania State University University

More information

Using Erasure Feedback for Online Timely Updating with an Energy Harvesting Sensor

Using Erasure Feedback for Online Timely Updating with an Energy Harvesting Sensor Using Erasure Feedback for Online Timely Updating with an Energy Harvesting Sensor Ahmed Arafa, Jing Yang, Sennur Ulukus 3, and H. Vincent Poor Electrical Engineering Department, Princeton University School

More information

Achieving the Age-Energy Tradeoff with a Finite-Battery Energy Harvesting Source

Achieving the Age-Energy Tradeoff with a Finite-Battery Energy Harvesting Source Achieving the Age-Energy Tradeoff ith a Finite-Battery Energy Harvesting Source Baran Tan Bacinoglu, Yin Sun, Elif Uysal-Biyikoglu, and Volkan Mutlu METU, Ankara, Turkey, Auburn University, AL, USA E-mail:

More information

Age-Minimal Online Policies for Energy Harvesting Sensors with Incremental Battery Recharges

Age-Minimal Online Policies for Energy Harvesting Sensors with Incremental Battery Recharges Age-Minimal Online Policies for Energy Harvesting Sensors with Incremental Battery Recharges Ahmed Arafa, Jing Yang 2, Sennur Ulukus 3, and H. Vincent Poor Electrical Engineering Department, Princeton

More information

Can Determinacy Minimize Age of Information?

Can Determinacy Minimize Age of Information? Can Determinacy Minimize Age of Information? Rajat Talak, Sertac Karaman, and Eytan Modiano Preemptive and non-preemptive last come first serve LCFS) queue with Poisson arrival and Gamma distributed service

More information

Age-Optimal Constrained Cache Updating

Age-Optimal Constrained Cache Updating 17 IEEE International Symposium on Information Theory (ISIT) -Optimal Constrained Cache Updating Roy D. Yates, Philippe Ciblat, Aylin Yener, Michèle Wigger Rutgers University, USA, ryates@winlab.rutgers.edu

More information

Minimizing Age of Information with Soft Updates

Minimizing Age of Information with Soft Updates Minimizing Age of Information with Soft Updates Melih Bastopcu Sennur Ulukus arxiv:8.0848v [cs.it] 9 Dec 08 Department of Electrical and Computer Engineering University of Maryland, College Park, MD 074

More information

Status Updates Through Queues

Status Updates Through Queues Status Updates hrough Queues Sanjit K. Kaul III-Delhi email: skkaul@iiitd.ac.in Roy D. Yates and Marco Gruteser WINLAB, ECE Dept., Rutgers University email: {ryates, gruteser}@winlab.rutgers.edu Abstract

More information

Queueing Theory I Summary! Little s Law! Queueing System Notation! Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K "

Queueing Theory I Summary! Little s Law! Queueing System Notation! Stationary Analysis of Elementary Queueing Systems  M/M/1  M/M/m  M/M/1/K Queueing Theory I Summary Little s Law Queueing System Notation Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K " Little s Law a(t): the process that counts the number of arrivals

More information

Intro to Queueing Theory

Intro to Queueing Theory 1 Intro to Queueing Theory Little s Law M/G/1 queue Conservation Law 1/31/017 M/G/1 queue (Simon S. Lam) 1 Little s Law No assumptions applicable to any system whose arrivals and departures are observable

More information

Optimizing Information Freshness in Wireless Networks under General Interference Constraints

Optimizing Information Freshness in Wireless Networks under General Interference Constraints Optimizing Information Freshness in Wireless etworks under General Interference Constraints Rajat Talak, Sertac Karaman, Eytan Modiano arxiv:803.06467v [cs.it] 7 Mar 208 Abstract Age of information (AoI)

More information

Real-Time Status Updating: Multiple Sources

Real-Time Status Updating: Multiple Sources Real-Time Status Updating: Multiple Sources Roy D. Yates WINLAB, ECE Dept. Rutgers University email: ryates@winlab.rutgers.edu Sanjit Kaul IIIT-Delhi email: skkaul@iiitd.ac.in Abstract We examine multiple

More information

Performance Evaluation of Queuing Systems

Performance Evaluation of Queuing Systems Performance Evaluation of Queuing Systems Introduction to Queuing Systems System Performance Measures & Little s Law Equilibrium Solution of Birth-Death Processes Analysis of Single-Station Queuing Systems

More information

Can Decentralized Status Update Achieve Universally Near-Optimal Age-of-Information in Wireless Multiaccess Channels?

Can Decentralized Status Update Achieve Universally Near-Optimal Age-of-Information in Wireless Multiaccess Channels? Can Decentralized Status Update Achieve Universally Near-Optimal Age-of-Information in Wireless Multiaccess Channels? Zhiyuan Jiang, Bhaskar Krishnamachari, Sheng Zhou, Zhisheng Niu, Fellow, IEEE {zhiyuan,

More information

Computer Networks More general queuing systems

Computer Networks More general queuing systems Computer Networks More general queuing systems Saad Mneimneh Computer Science Hunter College of CUNY New York M/G/ Introduction We now consider a queuing system where the customer service times have a

More information

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. This document is donloaded from DR-NTU, Nanyang Technological University Library, Singapore. Title Amplify-and-forard based to-ay relay ARQ system ith relay combination Author(s) Luo, Sheng; Teh, Kah Chan

More information

Update or Wait: How to Keep Your Data Fresh

Update or Wait: How to Keep Your Data Fresh Update or Wait: How to Keep Your Data Fresh Yin Sun, Elif Uysal-Biyikoglu, Roy D. Yates, C. Emre Koksal, and Ness B. Shroff Dept. of ECE, Dept. of CSE, The Ohio State University, Columbus, OH Dept. of

More information

M/G/1 and Priority Queueing

M/G/1 and Priority Queueing M/G/1 and Priority Queueing Richard T. B. Ma School of Computing National University of Singapore CS 5229: Advanced Compute Networks Outline PASTA M/G/1 Workload and FIFO Delay Pollaczek Khinchine Formula

More information

Update or Wait: How to Keep Your Data Fresh

Update or Wait: How to Keep Your Data Fresh Update or Wait: How to Keep Your Data Fresh Yin Sun, Elif Uysal-Biyikoglu, Roy Yates, C. Emre Koksal, and Ness B. Shroff Dept. of ECE, Dept. of CSE, The Ohio State University, Columbus, OH Dept. of EEE,

More information

Queueing systems. Renato Lo Cigno. Simulation and Performance Evaluation Queueing systems - Renato Lo Cigno 1

Queueing systems. Renato Lo Cigno. Simulation and Performance Evaluation Queueing systems - Renato Lo Cigno 1 Queueing systems Renato Lo Cigno Simulation and Performance Evaluation 2014-15 Queueing systems - Renato Lo Cigno 1 Queues A Birth-Death process is well modeled by a queue Indeed queues can be used to

More information

On Buffer Limited Congestion Window Dynamics and Packet Loss

On Buffer Limited Congestion Window Dynamics and Packet Loss On Buffer Limited Congestion Windo Dynamics and Packet Loss A. Fekete, G. Vattay Communication Netorks Laboratory, Eötvös University Pázmány P. sétány /A, Budapest, Hungary 7 Abstract The central result

More information

The Age of Information in Networks: Moments, Distributions, and Sampling

The Age of Information in Networks: Moments, Distributions, and Sampling The Age of Information in Networks: Moments, Distributions, and Sampling Roy D. Yates arxiv:806.03487v2 [cs.it 7 Jan 209 Abstract We examine a source providing status updates to monitors through a network

More information

Stochastic Models of Manufacturing Systems

Stochastic Models of Manufacturing Systems Stochastic Models of Manufacturing Systems Ivo Adan Systems 2/49 Continuous systems State changes continuously in time (e.g., in chemical applications) Discrete systems State is observed at fixed regular

More information

Solutions to Homework Discrete Stochastic Processes MIT, Spring 2011

Solutions to Homework Discrete Stochastic Processes MIT, Spring 2011 Exercise 6.5: Solutions to Homework 0 6.262 Discrete Stochastic Processes MIT, Spring 20 Consider the Markov process illustrated below. The transitions are labelled by the rate q ij at which those transitions

More information

Dynamic Power Allocation and Routing for Time Varying Wireless Networks

Dynamic Power Allocation and Routing for Time Varying Wireless Networks Dynamic Power Allocation and Routing for Time Varying Wireless Networks X 14 (t) X 12 (t) 1 3 4 k a P ak () t P a tot X 21 (t) 2 N X 2N (t) X N4 (t) µ ab () rate µ ab µ ab (p, S 3 ) µ ab µ ac () µ ab (p,

More information

M/G/1 and M/G/1/K systems

M/G/1 and M/G/1/K systems M/G/1 and M/G/1/K systems Dmitri A. Moltchanov dmitri.moltchanov@tut.fi http://www.cs.tut.fi/kurssit/elt-53606/ OUTLINE: Description of M/G/1 system; Methods of analysis; Residual life approach; Imbedded

More information

Job Scheduling and Multiple Access. Emre Telatar, EPFL Sibi Raj (EPFL), David Tse (UC Berkeley)

Job Scheduling and Multiple Access. Emre Telatar, EPFL Sibi Raj (EPFL), David Tse (UC Berkeley) Job Scheduling and Multiple Access Emre Telatar, EPFL Sibi Raj (EPFL), David Tse (UC Berkeley) 1 Multiple Access Setting Characteristics of Multiple Access: Bursty Arrivals Uncoordinated Transmitters Interference

More information

Chapter 2. Poisson Processes. Prof. Shun-Ren Yang Department of Computer Science, National Tsing Hua University, Taiwan

Chapter 2. Poisson Processes. Prof. Shun-Ren Yang Department of Computer Science, National Tsing Hua University, Taiwan Chapter 2. Poisson Processes Prof. Shun-Ren Yang Department of Computer Science, National Tsing Hua University, Taiwan Outline Introduction to Poisson Processes Definition of arrival process Definition

More information

Energy-Efficient Resource Allocation for Multi-User Mobile Edge Computing

Energy-Efficient Resource Allocation for Multi-User Mobile Edge Computing Energy-Efficient Resource Allocation for Multi-User Mobile Edge Computing Junfeng Guo, Zhaozhe Song, Ying Cui Department of Electronic Engineering, Shanghai Jiao Tong University, Shanghai, P. R. China

More information

The Age of Information: Real-Time Status Updating by Multiple Sources

The Age of Information: Real-Time Status Updating by Multiple Sources 1 The Age of Information: Real-Time Status Updating by Multiple Sources Roy D. Yates and Sanjit K. Kaul arxiv:1608.08622v2 [cs.it] 12 Dec 2017 Abstract We examine multiple independent sources providing

More information

Age of Information under Energy Replenishment Constraints

Age of Information under Energy Replenishment Constraints Age of Information under Energy Replenishment Constraints Baran Tan Bacinoglu, Elif Tugce Ceran, Elif Uysal-Biyioglu Middle East Technical University, Anara, Turey Imperial College, London,UK E-mail: barantan@metu.edu.tr,

More information

Introduction to Queueing Theory

Introduction to Queueing Theory Introduction to Queueing Theory Raj Jain Washington University in Saint Louis Jain@eecs.berkeley.edu or Jain@wustl.edu A Mini-Course offered at UC Berkeley, Sept-Oct 2012 These slides and audio/video recordings

More information

Chapter 2 Queueing Theory and Simulation

Chapter 2 Queueing Theory and Simulation Chapter 2 Queueing Theory and Simulation Based on the slides of Dr. Dharma P. Agrawal, University of Cincinnati and Dr. Hiroyuki Ohsaki Graduate School of Information Science & Technology, Osaka University,

More information

The Status Update Problem: Optimal Strategies for Pseudo-Deterministic Systems

The Status Update Problem: Optimal Strategies for Pseudo-Deterministic Systems The Status Update Problem: Optimal Strategies for Pseudo-Deterministic Systems Jared Tramontano under the direction of Dr. Shan-Yuan Ho Mr. Siddharth Venkatesh Department of Mathematics Massachusetts Institute

More information

Introduction to Queueing Theory

Introduction to Queueing Theory Introduction to Queueing Theory Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: 30-1 Overview Queueing Notation

More information

Queuing Networks: Burke s Theorem, Kleinrock s Approximation, and Jackson s Theorem. Wade Trappe

Queuing Networks: Burke s Theorem, Kleinrock s Approximation, and Jackson s Theorem. Wade Trappe Queuing Networks: Burke s Theorem, Kleinrock s Approximation, and Jackson s Theorem Wade Trappe Lecture Overview Network of Queues Introduction Queues in Tandem roduct Form Solutions Burke s Theorem What

More information

CDA5530: Performance Models of Computers and Networks. Chapter 4: Elementary Queuing Theory

CDA5530: Performance Models of Computers and Networks. Chapter 4: Elementary Queuing Theory CDA5530: Performance Models of Computers and Networks Chapter 4: Elementary Queuing Theory Definition Queuing system: a buffer (waiting room), service facility (one or more servers) a scheduling policy

More information

Batch Arrival Queuing Models with Periodic Review

Batch Arrival Queuing Models with Periodic Review Batch Arrival Queuing Models with Periodic Review R. Sivaraman Ph.D. Research Scholar in Mathematics Sri Satya Sai University of Technology and Medical Sciences Bhopal, Madhya Pradesh National Awardee

More information

Queueing Theory and Simulation. Introduction

Queueing Theory and Simulation. Introduction Queueing Theory and Simulation Based on the slides of Dr. Dharma P. Agrawal, University of Cincinnati and Dr. Hiroyuki Ohsaki Graduate School of Information Science & Technology, Osaka University, Japan

More information

An Improved Driving Scheme in an Electrophoretic Display

An Improved Driving Scheme in an Electrophoretic Display International Journal of Engineering and Technology Volume 3 No. 4, April, 2013 An Improved Driving Scheme in an Electrophoretic Display Pengfei Bai 1, Zichuan Yi 1, Guofu Zhou 1,2 1 Electronic Paper Displays

More information

Figure 10.1: Recording when the event E occurs

Figure 10.1: Recording when the event E occurs 10 Poisson Processes Let T R be an interval. A family of random variables {X(t) ; t T} is called a continuous time stochastic process. We often consider T = [0, 1] and T = [0, ). As X(t) is a random variable

More information

Optimizing Age of Information in Wireless Networks with Throughput Constraints

Optimizing Age of Information in Wireless Networks with Throughput Constraints Optimizing Age of Information in Wireless Networks with Throughput Constraints Igor adota, Abhishek Sinha and Eytan Modiano Laboratory for Information & Decision Systems, MIT Abstract Age of Information

More information

CPSC 531: System Modeling and Simulation. Carey Williamson Department of Computer Science University of Calgary Fall 2017

CPSC 531: System Modeling and Simulation. Carey Williamson Department of Computer Science University of Calgary Fall 2017 CPSC 531: System Modeling and Simulation Carey Williamson Department of Computer Science University of Calgary Fall 2017 Motivating Quote for Queueing Models Good things come to those who wait - poet/writer

More information

Stochastic Hybrid Systems: Applications to Communication Networks

Stochastic Hybrid Systems: Applications to Communication Networks research supported by NSF Stochastic Hybrid Systems: Applications to Communication Networks João P. Hespanha Center for Control Engineering and Computation University of California at Santa Barbara Talk

More information

A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation

A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation Karim G. Seddik and Amr A. El-Sherif 2 Electronics and Communications Engineering Department, American University in Cairo, New

More information

Energy Cooperation and Traffic Management in Cellular Networks with Renewable Energy

Energy Cooperation and Traffic Management in Cellular Networks with Renewable Energy Energy Cooperation and Traffic Management in Cellular Networks with Renewable Energy Hyun-Suk Lee Dept. of Electrical and Electronic Eng., Yonsei University, Seoul, Korea Jang-Won Lee Dept. of Electrical

More information

On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels

On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels Jie Luo, Anthony Ephremides ECE Dept. Univ. of Maryland College Park, MD 20742

More information

Energy Optimal Control for Time Varying Wireless Networks. Michael J. Neely University of Southern California

Energy Optimal Control for Time Varying Wireless Networks. Michael J. Neely University of Southern California Energy Optimal Control for Time Varying Wireless Networks Michael J. Neely University of Southern California http://www-rcf.usc.edu/~mjneely Part 1: A single wireless downlink (L links) L 2 1 S={Totally

More information

P e = 0.1. P e = 0.01

P e = 0.1. P e = 0.01 23 10 0 10-2 P e = 0.1 Deadline Failure Probability 10-4 10-6 10-8 P e = 0.01 10-10 P e = 0.001 10-12 10 11 12 13 14 15 16 Number of Slots in a Frame Fig. 10. The deadline failure probability as a function

More information

CS418 Operating Systems

CS418 Operating Systems CS418 Operating Systems Lecture 14 Queuing Analysis Textbook: Operating Systems by William Stallings 1 1. Why Queuing Analysis? If the system environment changes (like the number of users is doubled),

More information

P (L d k = n). P (L(t) = n),

P (L d k = n). P (L(t) = n), 4 M/G/1 queue In the M/G/1 queue customers arrive according to a Poisson process with rate λ and they are treated in order of arrival The service times are independent and identically distributed with

More information

A ROBUST BEAMFORMER BASED ON WEIGHTED SPARSE CONSTRAINT

A ROBUST BEAMFORMER BASED ON WEIGHTED SPARSE CONSTRAINT Progress In Electromagnetics Research Letters, Vol. 16, 53 60, 2010 A ROBUST BEAMFORMER BASED ON WEIGHTED SPARSE CONSTRAINT Y. P. Liu and Q. Wan School of Electronic Engineering University of Electronic

More information

Simple queueing models

Simple queueing models Simple queueing models c University of Bristol, 2012 1 M/M/1 queue This model describes a queue with a single server which serves customers in the order in which they arrive. Customer arrivals constitute

More information

16:330:543 Communication Networks I Midterm Exam November 7, 2005

16:330:543 Communication Networks I Midterm Exam November 7, 2005 l l l l l l l l 1 3 np n = ρ 1 ρ = λ µ λ. n= T = E[N] = 1 λ µ λ = 1 µ 1. 16:33:543 Communication Networks I Midterm Exam November 7, 5 You have 16 minutes to complete this four problem exam. If you know

More information

NICTA Short Course. Network Analysis. Vijay Sivaraman. Day 1 Queueing Systems and Markov Chains. Network Analysis, 2008s2 1-1

NICTA Short Course. Network Analysis. Vijay Sivaraman. Day 1 Queueing Systems and Markov Chains. Network Analysis, 2008s2 1-1 NICTA Short Course Network Analysis Vijay Sivaraman Day 1 Queueing Systems and Markov Chains Network Analysis, 2008s2 1-1 Outline Why a short course on mathematical analysis? Limited current course offering

More information

Update or Wait: How to Keep Your Data Fresh

Update or Wait: How to Keep Your Data Fresh Update or Wait: How to Keep Your Data Fresh Yin Sun, Elif Uysal-Biyikoglu, Roy D. Yates, C. Emre Koksal, and Ness B. Shroff Dept. of ECE, Dept. of CSE, The Ohio State University, Columbus, OH Dept. of

More information

Part I Stochastic variables and Markov chains

Part I Stochastic variables and Markov chains Part I Stochastic variables and Markov chains Random variables describe the behaviour of a phenomenon independent of any specific sample space Distribution function (cdf, cumulative distribution function)

More information

2905 Queueing Theory and Simulation PART III: HIGHER DIMENSIONAL AND NON-MARKOVIAN QUEUES

2905 Queueing Theory and Simulation PART III: HIGHER DIMENSIONAL AND NON-MARKOVIAN QUEUES 295 Queueing Theory and Simulation PART III: HIGHER DIMENSIONAL AND NON-MARKOVIAN QUEUES 16 Queueing Systems with Two Types of Customers In this section, we discuss queueing systems with two types of customers.

More information

Adaptive Noise Cancellation

Adaptive Noise Cancellation Adaptive Noise Cancellation P. Comon and V. Zarzoso January 5, 2010 1 Introduction In numerous application areas, including biomedical engineering, radar, sonar and digital communications, the goal is

More information

Introduction to queuing theory

Introduction to queuing theory Introduction to queuing theory Queu(e)ing theory Queu(e)ing theory is the branch of mathematics devoted to how objects (packets in a network, people in a bank, processes in a CPU etc etc) join and leave

More information

Class 11 Non-Parametric Models of a Service System; GI/GI/1, GI/GI/n: Exact & Approximate Analysis.

Class 11 Non-Parametric Models of a Service System; GI/GI/1, GI/GI/n: Exact & Approximate Analysis. Service Engineering Class 11 Non-Parametric Models of a Service System; GI/GI/1, GI/GI/n: Exact & Approximate Analysis. G/G/1 Queue: Virtual Waiting Time (Unfinished Work). GI/GI/1: Lindley s Equations

More information

Chapter 10. Queuing Systems. D (Queuing Theory) Queuing theory is the branch of operations research concerned with waiting lines.

Chapter 10. Queuing Systems. D (Queuing Theory) Queuing theory is the branch of operations research concerned with waiting lines. Chapter 10 Queuing Systems D. 10. 1. (Queuing Theory) Queuing theory is the branch of operations research concerned with waiting lines. D. 10.. (Queuing System) A ueuing system consists of 1. a user source.

More information

Scheduling Multicast Traffic with Deadlines in Wireless Networks

Scheduling Multicast Traffic with Deadlines in Wireless Networks Scheduling Multicast Traffic with Deadlines in Wireless Networks yu Seob im, Chih-ping Li, and Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology Abstract

More information

Online Scheduling for Energy Harvesting Broadcast Channels with Finite Battery

Online Scheduling for Energy Harvesting Broadcast Channels with Finite Battery Online Scheduling for Energy Harvesting Broadcast Channels with Finite Battery Abdulrahman Baknina Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park,

More information

Introduction to Markov Chains, Queuing Theory, and Network Performance

Introduction to Markov Chains, Queuing Theory, and Network Performance Introduction to Markov Chains, Queuing Theory, and Network Performance Marceau Coupechoux Telecom ParisTech, departement Informatique et Réseaux marceau.coupechoux@telecom-paristech.fr IT.2403 Modélisation

More information

E-Companion to Fully Sequential Procedures for Large-Scale Ranking-and-Selection Problems in Parallel Computing Environments

E-Companion to Fully Sequential Procedures for Large-Scale Ranking-and-Selection Problems in Parallel Computing Environments E-Companion to Fully Sequential Procedures for Large-Scale Ranking-and-Selection Problems in Parallel Computing Environments Jun Luo Antai College of Economics and Management Shanghai Jiao Tong University

More information

Optimal power-delay trade-offs in fading channels: small delay asymptotics

Optimal power-delay trade-offs in fading channels: small delay asymptotics Optimal power-delay trade-offs in fading channels: small delay asymptotics Randall A. Berry Dept. of EECS, Northwestern University 45 Sheridan Rd., Evanston IL 6008 Email: rberry@ece.northwestern.edu Abstract

More information

Sampling of the Wiener Process for Remote Estimation over a Channel with Random Delay

Sampling of the Wiener Process for Remote Estimation over a Channel with Random Delay 1 Sampling of the Wiener Process for Remote Estimation over a Channel with Random Delay Yin Sun, Yury Polyanskiy, and Elif Uysal-Biyikoglu Dept. of ECE, Auburn University, Auburn, AL Dept. of EECS, Massachusetts

More information

Transmission Schemes for Lifetime Maximization in Wireless Sensor Networks: Uncorrelated Source Observations

Transmission Schemes for Lifetime Maximization in Wireless Sensor Networks: Uncorrelated Source Observations Transmission Schemes for Lifetime Maximization in Wireless Sensor Networks: Uncorrelated Source Observations Xiaolu Zhang, Meixia Tao and Chun Sum Ng Department of Electrical and Computer Engineering National

More information

Learning Algorithms for Minimizing Queue Length Regret

Learning Algorithms for Minimizing Queue Length Regret Learning Algorithms for Minimizing Queue Length Regret Thomas Stahlbuhk Massachusetts Institute of Technology Cambridge, MA Brooke Shrader MIT Lincoln Laboratory Lexington, MA Eytan Modiano Massachusetts

More information

Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting

Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting Swapna B.T., Atilla Eryilmaz, and Ness B. Shroff Departments of ECE and CSE The Ohio State University Columbus, OH 43210

More information

Analysis of Software Artifacts

Analysis of Software Artifacts Analysis of Software Artifacts System Performance I Shu-Ngai Yeung (with edits by Jeannette Wing) Department of Statistics Carnegie Mellon University Pittsburgh, PA 15213 2001 by Carnegie Mellon University

More information

UNIVERSITY OF YORK. MSc Examinations 2004 MATHEMATICS Networks. Time Allowed: 3 hours.

UNIVERSITY OF YORK. MSc Examinations 2004 MATHEMATICS Networks. Time Allowed: 3 hours. UNIVERSITY OF YORK MSc Examinations 2004 MATHEMATICS Networks Time Allowed: 3 hours. Answer 4 questions. Standard calculators will be provided but should be unnecessary. 1 Turn over 2 continued on next

More information

Towards a Theory of Societal Co-Evolution: Individualism versus Collectivism

Towards a Theory of Societal Co-Evolution: Individualism versus Collectivism Toards a Theory of Societal Co-Evolution: Individualism versus Collectivism Kartik Ahuja, Simpson Zhang and Mihaela van der Schaar Department of Electrical Engineering, Department of Economics, UCLA Theorem

More information

Equivalent Models and Analysis for Multi-Stage Tree Networks of Deterministic Service Time Queues

Equivalent Models and Analysis for Multi-Stage Tree Networks of Deterministic Service Time Queues Proceedings of the 38th Annual Allerton Conference on Communication, Control, and Computing, Oct. 2000. Equivalent Models and Analysis for Multi-Stage ree Networks of Deterministic Service ime Queues Michael

More information

Analysis of A Single Queue

Analysis of A Single Queue Analysis of A Single Queue Raj Jain Washington University in Saint Louis Jain@eecs.berkeley.edu or Jain@wustl.edu A Mini-Course offered at UC Berkeley, Sept-Oct 2012 These slides and audio/video recordings

More information

Traversing Virtual Network Functions from the Edge to the Core: An End-to-End Performance Analysis

Traversing Virtual Network Functions from the Edge to the Core: An End-to-End Performance Analysis Traversing Virtual Network Functions from the Edge to the Core: An End-to-End Performance Analysis Emmanouil Fountoulakis, Qi Liao, Manuel Stein, Nikolaos Pappas Department of Science and Technology, Linköping

More information

M/G/1 queues and Busy Cycle Analysis

M/G/1 queues and Busy Cycle Analysis queues and Busy Cycle Analysis John C.S. Lui Department of Computer Science & Engineering The Chinese University of Hong Kong www.cse.cuhk.edu.hk/ cslui John C.S. Lui (CUHK) Computer Systems Performance

More information

An Analysis of the Preemptive Repeat Queueing Discipline

An Analysis of the Preemptive Repeat Queueing Discipline An Analysis of the Preemptive Repeat Queueing Discipline Tony Field August 3, 26 Abstract An analysis of two variants of preemptive repeat or preemptive repeat queueing discipline is presented: one in

More information

A Simple Memoryless Proof of the Capacity of the Exponential Server Timing Channel

A Simple Memoryless Proof of the Capacity of the Exponential Server Timing Channel A Simple Memoryless Proof of the Capacity of the Exponential Server iming Channel odd P. Coleman ECE Department Coordinated Science Laboratory University of Illinois colemant@illinois.edu Abstract his

More information

Optimum Relay Position for Differential Amplify-and-Forward Cooperative Communications

Optimum Relay Position for Differential Amplify-and-Forward Cooperative Communications Optimum Relay Position for Differential Amplify-and-Forard Cooperative Communications Kazunori Hayashi #1, Kengo Shirai #, Thanongsak Himsoon 1, W Pam Siriongpairat, Ahmed K Sadek 3,KJRayLiu 4, and Hideaki

More information

Randomized Smoothing Networks

Randomized Smoothing Networks Randomized Smoothing Netorks Maurice Herlihy Computer Science Dept., Bron University, Providence, RI, USA Srikanta Tirthapura Dept. of Electrical and Computer Engg., Ioa State University, Ames, IA, USA

More information

Solutions to COMP9334 Week 8 Sample Problems

Solutions to COMP9334 Week 8 Sample Problems Solutions to COMP9334 Week 8 Sample Problems Problem 1: Customers arrive at a grocery store s checkout counter according to a Poisson process with rate 1 per minute. Each customer carries a number of items

More information

Fundamental Limits of Invisible Flow Fingerprinting

Fundamental Limits of Invisible Flow Fingerprinting Fundamental Limits of Invisible Flow Fingerprinting Ramin Soltani, Dennis Goeckel, Don Towsley, and Amir Houmansadr Electrical and Computer Engineering Department, University of Massachusetts, Amherst,

More information

Chapter 1. Introduction. 1.1 Stochastic process

Chapter 1. Introduction. 1.1 Stochastic process Chapter 1 Introduction Process is a phenomenon that takes place in time. In many practical situations, the result of a process at any time may not be certain. Such a process is called a stochastic process.

More information

Computation Offloading Strategy Optimization with Multiple Heterogeneous Servers in Mobile Edge Computing

Computation Offloading Strategy Optimization with Multiple Heterogeneous Servers in Mobile Edge Computing IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING VOL XX NO YY MONTH 019 1 Computation Offloading Strategy Optimization with Multiple Heterogeneous Servers in Mobile Edge Computing Keqin Li Fellow IEEE Abstract

More information

Part II: continuous time Markov chain (CTMC)

Part II: continuous time Markov chain (CTMC) Part II: continuous time Markov chain (CTMC) Continuous time discrete state Markov process Definition (Markovian property) X(t) is a CTMC, if for any n and any sequence t 1

More information

Link Models for Packet Switching

Link Models for Packet Switching Link Models for Packet Switching To begin our study of the performance of communications networks, we will study a model of a single link in a message switched network. The important feature of this model

More information

Delay-Optimal Computation Task Scheduling for Mobile-Edge Computing Systems

Delay-Optimal Computation Task Scheduling for Mobile-Edge Computing Systems Delay-Optimal Computation Task Scheduling for Mobile-Edge Computing Systems Juan Liu, Yuyi Mao, Jun Zhang, and K. B. Letaief, Fellow, IEEE Dept. of ECE, The Hong Kong University of Science and Technology,

More information

Chapter 3 Balance equations, birth-death processes, continuous Markov Chains

Chapter 3 Balance equations, birth-death processes, continuous Markov Chains Chapter 3 Balance equations, birth-death processes, continuous Markov Chains Ioannis Glaropoulos November 4, 2012 1 Exercise 3.2 Consider a birth-death process with 3 states, where the transition rate

More information

CHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION. From Exploratory Factor Analysis Ledyard R Tucker and Robert C. MacCallum

CHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION. From Exploratory Factor Analysis Ledyard R Tucker and Robert C. MacCallum CHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION From Exploratory Factor Analysis Ledyard R Tucker and Robert C. MacCallum 1997 19 CHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION 3.0. Introduction

More information

Link Models for Circuit Switching

Link Models for Circuit Switching Link Models for Circuit Switching The basis of traffic engineering for telecommunication networks is the Erlang loss function. It basically allows us to determine the amount of telephone traffic that can

More information

Quiz 1 EE 549 Wednesday, Feb. 27, 2008

Quiz 1 EE 549 Wednesday, Feb. 27, 2008 UNIVERSITY OF SOUTHERN CALIFORNIA, SPRING 2008 1 Quiz 1 EE 549 Wednesday, Feb. 27, 2008 INSTRUCTIONS This quiz lasts for 85 minutes. This quiz is closed book and closed notes. No Calculators or laptops

More information