On the Energy-Delay Trade-off of a Two-Way Relay Network

Size: px
Start display at page:

Download "On the Energy-Delay Trade-off of a Two-Way Relay Network"

Transcription

1 On the Energy-Delay Trade-off of a To-Way Relay Netork Xiang He Aylin Yener Wireless Communications and Netorking Laboratory Electrical Engineering Department The Pennsylvania State University University Park, PA 68 xxh9@psu.edu yener@ee.psu.edu Abstract We consider a three node netork in hich a pair of nodes ith stochastic arrivals communicate ith each other ith the help of an intermediate relay. The bi-directional nature of the traffic, in this setting, poses a ne energy delay trade-off. Namely, the relay node may choose to cache packets from one direction and send it only after packets from the other direction arrive, using an XOR netork coding scheme. Doing so ould save energy, but ould also incur some delay for the packet. In this ork, e analyze this trade-off hen the relay node queues packets from each direction and uses a first-come-firstserve policy. We sho that under an even traffic load here one ould hope for the most energy savings, to achieve the minimum energy expenditure promised by the XOR netork coding scheme, the average delay has to go to. Keyords: To-ay relay, queuing, energy-delay trade-off I. INTRODUCTION The to-ay relay netork considered in this ork consists of to nodes ho ish to communicate ith each other via a relay node. Significant recent effort has been dedicated to this model, in particular, to understanding its information-theoretic performance. The capacity region under to-phase/multiplephase protocols and decode-and-forard relaying is presented in [], []. Reference [] also computes these for Gaussian fading channels. Achievable rates for the to-ay relay netork are given in [3]. Practical relay coding schemes are proposed in [4], [5] and poer/rate optimization problems are presented in [6]. The model is extended to multiple relay nodes, and the capacity scaling la hen the relay sum poer is fixed and number of relays goes to infinity is considered in [7]. There are to implicit assumptions behind all these orks: i Traffic arriving at the to source nodes are modeled as deterministic flos ith constant rates. ii To obtain the information theoretic achievable rates, the code ord length is assumed to be infinity. While these assumptions are idely used and are essential to simplify the analysis, there are certain scenarios under hich they may not hold. A likely scenario is that the packets can arrive at the transmitters in a stochastic fashion. Hence, one can no longer guarantee that at a certain time instant, the relay ould receive data from both directions. In this case, a relevant issue is that of the characterization of the stability region [8] [] under assumption ii. In addition, commonly envisioned applications such as voice and video are delay sensitive. Therefore, the delay that the received data incurs at the relay node must be limited, rendering it impossible for the relay to code over long blocks. To address the first problem, a natural solution is to allo the relay to cache the traffic in one direction and transmit only after traffic from the other direction arrives, and employ netork coding [4]. Doing this is advantageous, since combining to or more transmissions into one ill allo the relay to save energy. Hoever, e immediately see that doing this ill increase the delay of the traffic since e must ait for the packets arriving from the more idle direction. Therefore, there is a trade-off beteen energy consumption at the relay and the end-to-end communication delay. Energy-delay trade-off has been considered previously for a number of different ireless communication scenarios. From the physical layer perspective, reference [] considers the average energy consumption hen channel coding may be done over a limited number of independent channel fading states for a multiple access channel. Reference [] explores this for a relay netork. From a medium access layer perspective as ell, it is idely accepted to ait for good channel states and save energy at the cost of delay. This trade-off is considered in [3] and the loer bound of energy consumption hen delay goes is given and shon to be tight. This result is extended to a multi-user scenario in [4]. We note that both results are restricted to single hop communication. The energy delay trade-off therein is a result of the concave relationship beteen the transmission poer and the service rate. By comparison, the energy delay tradeoff in to-ay relay netork considered here results from the lack of coordination of traffic demands at the to source nodes. In this ork, e investigate the energy delay trade-off in a bi-directional relay netork hen the relay node uses a first-come-first-serve policy. The details of the system model and the relevant assumptions are presented in Section II. In Section III, e analyze the stationary behavior of the queues at the relay node. The average packet delay and average energy consumption are related via the queue capacity at relay node. Our analysis shos that, in the case here e have a symmetric traffic load coming in from both directions, here one ould expect to harvest the energy savings of the XOR combining the most, to achieve the minimum energy, the eno-end delay goes to infinity. This is equivalent to saying the 865

2 Fig.. λ multiple access µ h h R h 3 h 4 R System Model L L Broadcast Queues at the relay node queues become unstable and leads to the conclusion that the netork coding protocol must be used in conjunction ith other protocols in order to ensure the stability of the queues. II. SYSTEM MODEL AND ASSUMPTIONS We consider a packet-based communication system, depicted in Figure. The channel is assumed to be static, and the channel state information is assumed to be globally knon. We assume the packets arrive at node and node from to independent Poisson processes ith parameters λ and µ respectively. The added redundancy and the energy of a packet are chosen in such a ay that each packet can be decoded reliably at the relay node, even if packets arrive at the relay node at the same time. Under this assumption, the traffic flo at the relay node from node and node are also Poisson processes ith the same parameters. At the relay, the decoded traffic flos from node and node are stored in to queues, ith buffer capacity L and L respectively. The policy employed by the relay to process the packets from the queues is described belo. When a packet arrives, if the queue holding the traffic from the opposite direction is not empty, the relay sends out the coded version of the binary sum of this packet and the packet in the queue from the opposite direction immediately. For the XOR netork coding to ork, e assume each packet contains same number of information bits. Again, e assume the redundancy and the energy of each packet are chosen such that they can be successfully decoded at both node and node. When a packet arrives, if the queue holding the traffic from the opposite direction is empty, then the relay stores the packet in the queue that contains packets for the arrival direction. If this queue is full, the relay sends out the oldest packet in the queue immediately and makes room to store this latest packet. Again, e assume the redundancy and energy of each packet are chosen such that it can be successfully decoded at its intended destination. In both cases, e assume the packet size is small enough such that the transmission delay is negligible. In other ords, the transmissions can be modeled as points on the time axis. Therefore, the average delay experienced by the packets equals the average amount of time they spend in the queue at the Fig.. λ λ λ λ λ λ L L µ µ µ µ µ µ State Transition Diagram relay. In the next section, e ill explore the relationship of the average delay ith the average transmission poer of the relay. Remark : We assume that the traffic generated from the to ends are independent. This assumption may not hold in a scenario here the traffic of node is triggered by the response from node. The assumption on the other hand is appropriate hen the to end nodes are simply routers in an ad hoc netork forarding data to each other. Remark : We assume the queues at the relay node have finite capacity. This is a seemingly different starting point as compared to previous ork that assumes infinite buffer size [8] []. The connection beteen these orks ill become apparent hen e let the capacity of the queue, i.e., the buffer size, go to in order to minimize the energy consumption. III. ENERGY DELAY TRADE-OFF A. Queuing Model and Stationary Distribution Based on the transmission policy at the relay described in the previous section, e remark that at most one queue at the relay node can be non-empty. Therefore, the state of queues at the relay node can be characterized ith a single number S [ L, L ]. Since the future state is independent from its past given the current state, S is a continuous time finite state Markov chain. Recall that the traffic flos arriving at the relay node are to independent Poisson processes ith parameters λ and µ respectively. Therefore, for a given time interval t, e have the transition probabilities: P S t + t a + S t a λ t + o t, a [ L, L ] P S t + t a S t a µ t + o t, a [ L +, L ] The resulting continuous time Markov chain is shon in Figure. We note that Figure is tantamount to a M/M//L + L + system [5]. Therefore, they have the same stationary distribution, given by 3 belo, here u λ/µ. P S i { uu i+l u L +L +, u L +L +, u 3 i L...L 866

3 3 B. Average Poer The average poer expended by the relay node is defined as: [ ] ε E [P] lim E t t P S t ip S t + t j St i lim ε ij t t i,j Here ε ij is the energy cost associated ith state transition i j. From the model described in the previous section, e kno that ε ij is decided by the coding scheme used ithin each packet and the channel conditions. Let ε a be the energy cost to successfully multi-cast the XOR-ed packet to both node and node. ε b is the energy cost to successfully send the packet from the relay to node. Similarly, ε c is the energy cost to send the packet from relay to node. Ho ε a, ε b, ε c are computed is not relevant to our discussion. In practice, they may be approximated by the folloing equations: 4 ε b N R /h 4 5 ε c N R /h 3 6 ε a max {ε b, ε c } 7 here N, N are the variance of the additive Gaussian noise seen by node and node. h 4, h 3 are the channel gains from the relay node to node and to node respectively see Figure. R i is the rate used from node i, i,. For the state diagram in Figure, since there are only finite number of states, e may manipulate 4 by interchanging the summation and the limit, as shon belo: lim t i,j i,j lim t i j P S t ip S t + t j S i ε ij 8 t P S t ip S t + t j S i ε ij 9 t P S i P S t + t j S iε ij L P S iµε a + P S L λε b i L + P S iλε a + P S L µε c i Substituting 3 into, for u, e obtain: E [P] ul+l+ u L+L+ µε a u L+L+ λε a u ul+l + u L+L+ λε u b + u L+L+ µε c Remark 3: From, e readily see that the average poer consumption by the relay node depends only on the traffic load from the source nodes and the total storage capacity at the relay, L +L. It does not depend on the service order. Remark 4: Minimal energy consumption is achieved hen L + L goes to. If L + L, e observe C. Average Delay E[P] λ µε b + µε a 3 Let us focus on the delay experienced by a packet sent from node to node. The case of the other direction can be addressed in a similar fashion. Suppose that the packet arrives at τ. Then the distribution of the delay T is given by P T t i P T t S τ ip S τ i 4 Note that there are only to possible ays for the packet to leave the queue. Enough packets from the opposite direction arrive so that it gets served ith XOR-ed ith a packet from the other queue. Too many packets from node arrive after this packet so that it needs to be transmitted by itself. Therefore each term P T t S τ i in the summation can be computed as: P T t S τ i P n t i + S τ i 5 +P n t < i +, n t L S τ i here n i t is the number of packets received from node i during time τ, t + τ]. The first term in 5 is given by: P n t i + S τ i i µt k e µt 6 k! k The second term in 5 can be computed as: P n t < i +, n t L S τ i P n t < i + P n t L i µt k L e µt λt n 7 e λt k! n! k n Note that, ith the Poisson flos, the residual time [5] the packet has to ait to see a packet from the opposite direction is an exponential random variable ith parameter /µ. With these preparations, e are no ready to compute E[T]. E [T] i t d P T < t 8 t d P T < t S ip S i 9 Each term of the summation in 9 can be expressed as: t d P T < t S i t d P T < t S i P T < t S i 867

4 4 We notice that P T < t S i is the sum of terms of the form ct a e bt. Therefore the integral can be computed using the folloing equation, here a is a non-negative integer. x a e λx dx λ a+ a! 3 Using this result, along ith 7, 6, becomes: i i L k L k λ λ + µ µt λt k e λ+µt 4! k! k µ λ + µ + 5 here k+! k!!. Substituting 5 and 3 back to 9, e obtain the average delay from node to node as 6 for u. The delay seen by traffic from node to node is similar, as shon in 7. E [T] L i L i k u L+ u L u L+L+ E [T] L i L i k u L+ u L u L+L+ D. Energy Delay Trade-off λ k µ λ + µ λ + µ + µ k λ λ + µ λ + µ + 6 u i 7 An immediate thought folloing the analysis above is the selection of L and L to minimize traffic delay under a relay poer constraint. Before doing that, e prove a monotonic property of the average delay, hich ill be useful later. We kno from that there is a bijection beteen the average poer and total storage capacity L + L. Also, if L +L increases, the average poer consumption decreases. Therefore, e only need to examine the behavior of the average delay 6 7 under fixed L +L. If L +L is fixed and L increases, from 7, e readily see that E [T] ill decrease. What is less obvious is that E [T] ill increase, as shon belo. Suppose L increases by. Then, as shon in 3, the first term in 6 ill increase by at least u fold. Since L decreases by, the remaining part in 6 ill decrease at least by u fold. Therefore, their product E [T] ill increase. By a similar reasoning, it can be shon that if L is fixed, then E [T] ill increase ith L. If L is fixed, then E [T] ill increase ith L. L + i L + > > i L + i L u i L + i L k i k k i λ k µ λ + µ λ + µ + λ k µ λ + µ λ + µ + L L i k λ k µ λ + µ λ + µ + λ k µ λ + µ λ + µ The minimum delay T under the average poer constraint is defined as 3 belo. We are interested in T as a function of P, hich ill yield the optimal energy delay trade-off curve achievable under this relay policy. T min L,L max {E [T],E [T]} s.t. E [P] P 3 It follos from the previous discussion that the poer constraint can be translated to a loer bound on L + L. From the monotonic properties of E [T] and E [T] e have just argued, e kno that the equivalent constraint on L + L must be binding. Therefore L + L is fixed. Under this condition, e have shon above that E [T] is a strictly increasing function of L, and E [T] is a strictly decreasing function of L. Also, it is obvious to see that hen L, E [T] and hen L, E [T]. Therefore, the optimal solution can only be of the folloing form and can be easily found via a bisection method: L is either L,a or L,a +. L,a is chosen such that E [T]L,a E [T]L,a,E [T]L,a + E [T]L,a +. Notice that T can be reduced by employing time sharing beteen L L,a and L L,a + hile keeping L +L fixed. The resulting energy delay trade-off curve is given in Figure 3 for ε a ε b ε c. The horizontal dotted lines depict the average relay poer consumption hen L +L for different λ, µ. We observe that hen λ and µ are close to each other, a ider trade-off beteen energy and delay can be achieved. When the traffic load becomes less even, the achievable trade-off range becomes smaller. E. The Symmetric Case λ µ In Figure 3, e observe that hen λ µ, to achieve the loer bound on average poer, the average delay ill go to. We next prove this observation formally via the folloing lemma. Lemma : P µεa OL, T OL ith L L L 868

5 5 P Fig λ. µ.9 λ. µ T λµ.5 Energy Delay Trade-off Curve hen L + L Proof: First e examine the average delay T. We notice that the solution of 3 yields L L L. Therefore, it suffices to derive an upper bound and loer bound of 6 hen L. T T L i L i k L i i k+ λ + µl + L +,k +k i+l k+ λ + µl + L + L i + L λ + µl + L L + λ + µl + L 36 O L 37 L i,k +k i k+ T λ + µl + L + 38 L i + i λ + µl + L L + L + λ + µl + L + 4 L + L + λ + µl + 4 O L 4 Where 35 and 39 follo from the binomial expansion formula. Remark 5: The loer bound 4 implies that T as L. Next, let us examine P µε a. Substituting 3 into, e obtain: L + L P µε a + µ ε b + ε c L + L + L + L + P µε a µ ε b + ε c ε a L + L + µ ε b + ε c ε a L + 43 From 43 and the upper bound for T, e observe that if T increases at a rate of OL, the average poer P ill not decrease faster than OL. Remark 6: As shon by Lemma, for the symmetric traffic load λ µ, the average delay to achieve the minimum energy. Remark 7: If each packet must be paired along ith a packet from the opposite direction for transmission, thus achieving minimal energy, then first-come-first-serve policy does achieve the minimal sum delay E [T]+E [T]. This can be shon as follos: Consider to sets of packets A, B and A, B paired as such to be transmitted. Suppose A arrived before A, but B arrived after B, in other ords, the packets are not paired according to first-come-first-serve. It is then easy to verify that pairing these packets as A, B and A, B instead ill not incur a greater sum delay for these four packets. On the other hand, due to the symmetry of the system, e have E [T] E [T]. This means achieving minimal sum delay is equivalent to min max delay T. Therefore e find that first-come-first-serve policy is indeed the optimal policy. This means to achieve minimal energy consumption, T ill go to regardless of hat service policy is in use. Remark 8: Our assumptions in section II dictates that the system operates at a rate that belongs to the achievable rate region C ith the coding scheme used. Therefore, it is rather surprising to see the queues become unstable, since there are many knon rate allocation policies [8] [] hich stabilize queues for all rate points inside C. Hoever, a closer look shos none of these policies use netork coding as the only coding scheme. Reference [8] uses the superposition coding scheme for the broadcast phase. In [9], the stability proof of the opportunistic netork coding scheduling algorithm relies on the fact that a multi-hopping scheme is used along ith netork coding scheme. The policy in [] is also a hybrid scheme; netork coding is used along ith direct transmission so that the resulting stability region has a nonempty interior. The stability of the queues is henceforth guaranteed via the CMDB policy []. An insight obtained is that a deterministic netork coding scheme must be used along ith other coding schemes. This hybrid approach as considered previously to obtain a larger achievable rate region of the underlying coding scheme [9], []. Hoever, it is easy to see for a symmetric channel, i.e., hen the relay is in the middle of the to source nodes, this approach ill not increase the maximal rate or the sum rate. Nevertheless, e sho here that a hybrid approach is still necessary. A multi-hopping scheme must be considered in a netork coding protocol in order to stabilize the queues. 869

6 6 IV. CONCLUSION In this paper, e have investigated the energy-delay tradeoff in a to-ay relay netork hen the relay node uses a first-come-first-serve policy and aims to harvest the energy savings by employing XOR combining of the data arriving from the sources. The trade-off is a result of the stochastic nature of the traffic from the source nodes. We have proved for the case ith an even traffic load from both directions, to fully achieve the energy saving promised by XOR netork coding scheme, the average delay ill go to. The energy-delay trade-off curve here is derived under a specific policy used at the relay node. In that sense it is an achievability result. When a different policy is used, a different curve may result. It is of interest to derive an loer bound for this energy-delay trade-off curve as future ork, along ith the optimal strategy that ill achieve this loer bound. REFERENCES [] T. J. Oechtering, I. Bjelakovic, C. Schnurr, and H. Boche. Broadcast Capacity Region of To-Phase Bidirectional Relaying, 7. submitted to IEEE Transactions on Information Theory. [] S. J. Kim, P. Mitran, and V. Tarokh. Performance Bounds for Bi- Directional Coded Cooperation Protocols. International Conference on Distributed Computing Systems Workshops, 7. [3] B. Rankov and A. Wittneben. Achievable Rate Regions for the To-ay Relay Channel. IEEE International Symposium on Information Theory, 6. [4] S. Zhang, S. C. Lie, and P. Lam. Physical Layer Netork Coding, 7. available online at [5] P. Popovski and Y. Hiroyuki. Physical Netork Coding in To- Way Wireless Relay Channels. IEEE International Conference on Communications, 7. [6] H. Ingmar, K. Marc, E. Celal, J. Zhao, A. Wittneben, and G. Bauch. MIMO To-Way Relaying ith Transmit CSI at the Relay. IEEE Signal Processing Advances in Wireless Communications, 7. [7] R. Vaze and R. W. Heath. Capacity Scaling for MIMO To-Way Relaying, 7. submitted to IEEE Transactions on Information Theory. [8] T.J. Oechtering and H. Boche. Stability Region of an Efficient Bi- Directional Regenerative Half-duplex Relaying Protocol. IEEE Information Theory Workshop, 6. [9] C.H. Liu and X. Feng. Netork Coding for To-Way Relaying: Rate Region, Sum Rate and Opportunistic Scheduling. IEEE International Conference on Communications, 8. [] E.N. Ciftcioglu, A. Yener, and R. A. Berry. Stability of Bi-Directional Cooperative Relay Netorks. IEEE Information Theory Workshop, 8. [] S. Hanly and D. Tse. Multi-Access Fading Channels: Part II: Delay Limited Capacities. IEEE Trasactions on Information Theory, 447:86 83, 998. [] D. Gunduz and E. Erkip. Opportunistic Cooperation by Dynamic Resource Allocation. IEEE Transactions on Wireless Communication, 64: , 7. [3] R. A. Berry and R. G. Gallager. Communication over Fading Channels ith Delay Constraints. IEEE Transactions on Information Theory, 485:35 49,. [4] M.J. Neely. Optimal Energy and Delay Tradeoffs for Multi-user Wireless Donlink. IEEE Transactions on Information Theory, 539:395 33, 7. [5] L. Kleinrock. Queueing Systems, Volume I: Theory. Wiley-Interscience, 975. [6] L. Tassiulas and A. Ephremides. Stability Properties of Constrained Queueing Systems and Scheduling Policies for Maximum Throughput in Multihop Radio Netorks. IEEE Trans. on Automatic Control, 37: ,

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. This document is donloaded from DR-NTU, Nanyang Technological University Library, Singapore. Title Amplify-and-forard based to-ay relay ARQ system ith relay combination Author(s) Luo, Sheng; Teh, Kah Chan

More information

Energy Harvesting Multiple Access Channel with Peak Temperature Constraints

Energy Harvesting Multiple Access Channel with Peak Temperature Constraints Energy Harvesting Multiple Access Channel with Peak Temperature Constraints Abdulrahman Baknina, Omur Ozel 2, and Sennur Ulukus Department of Electrical and Computer Engineering, University of Maryland,

More information

Information in Aloha Networks

Information in Aloha Networks Achieving Proportional Fairness using Local Information in Aloha Networks Koushik Kar, Saswati Sarkar, Leandros Tassiulas Abstract We address the problem of attaining proportionally fair rates using Aloha

More information

Online Scheduling for Energy Harvesting Broadcast Channels with Finite Battery

Online Scheduling for Energy Harvesting Broadcast Channels with Finite Battery Online Scheduling for Energy Harvesting Broadcast Channels with Finite Battery Abdulrahman Baknina Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park,

More information

Reducing Age-of-Information for Computation-Intensive Messages via Packet Replacement

Reducing Age-of-Information for Computation-Intensive Messages via Packet Replacement Reducing Age-of-Information for Computation-Intensive Messages via Packet Replacement arxiv:191.4654v1 [cs.it] 15 Jan 19 Jie Gong, Qiaobin Kuang, Xiang Chen and Xiao Ma School of Data and Computer Science,

More information

Dynamic Power Allocation and Routing for Time Varying Wireless Networks

Dynamic Power Allocation and Routing for Time Varying Wireless Networks Dynamic Power Allocation and Routing for Time Varying Wireless Networks X 14 (t) X 12 (t) 1 3 4 k a P ak () t P a tot X 21 (t) 2 N X 2N (t) X N4 (t) µ ab () rate µ ab µ ab (p, S 3 ) µ ab µ ac () µ ab (p,

More information

Capacity of the Discrete Memoryless Energy Harvesting Channel with Side Information

Capacity of the Discrete Memoryless Energy Harvesting Channel with Side Information 204 IEEE International Symposium on Information Theory Capacity of the Discrete Memoryless Energy Harvesting Channel with Side Information Omur Ozel, Kaya Tutuncuoglu 2, Sennur Ulukus, and Aylin Yener

More information

Cooperative Energy Harvesting Communications with Relaying and Energy Sharing

Cooperative Energy Harvesting Communications with Relaying and Energy Sharing Cooperative Energy Harvesting Communications with Relaying and Energy Sharing Kaya Tutuncuoglu and Aylin Yener Department of Electrical Engineering The Pennsylvania State University, University Park, PA

More information

On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels

On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels Jie Luo, Anthony Ephremides ECE Dept. Univ. of Maryland College Park, MD 20742

More information

Optimum Relay Position for Differential Amplify-and-Forward Cooperative Communications

Optimum Relay Position for Differential Amplify-and-Forward Cooperative Communications Optimum Relay Position for Differential Amplify-and-Forard Cooperative Communications Kazunori Hayashi #1, Kengo Shirai #, Thanongsak Himsoon 1, W Pam Siriongpairat, Ahmed K Sadek 3,KJRayLiu 4, and Hideaki

More information

Optimal power-delay trade-offs in fading channels: small delay asymptotics

Optimal power-delay trade-offs in fading channels: small delay asymptotics Optimal power-delay trade-offs in fading channels: small delay asymptotics Randall A. Berry Dept. of EECS, Northwestern University 45 Sheridan Rd., Evanston IL 6008 Email: rberry@ece.northwestern.edu Abstract

More information

Broadcasting with a Battery Limited Energy Harvesting Rechargeable Transmitter

Broadcasting with a Battery Limited Energy Harvesting Rechargeable Transmitter roadcasting with a attery Limited Energy Harvesting Rechargeable Transmitter Omur Ozel, Jing Yang 2, and Sennur Ulukus Department of Electrical and Computer Engineering, University of Maryland, College

More information

Morning Session Capacity-based Power Control. Department of Electrical and Computer Engineering University of Maryland

Morning Session Capacity-based Power Control. Department of Electrical and Computer Engineering University of Maryland Morning Session Capacity-based Power Control Şennur Ulukuş Department of Electrical and Computer Engineering University of Maryland So Far, We Learned... Power control with SIR-based QoS guarantees Suitable

More information

Channel Allocation Using Pricing in Satellite Networks

Channel Allocation Using Pricing in Satellite Networks Channel Allocation Using Pricing in Satellite Networks Jun Sun and Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology {junsun, modiano}@mitedu Abstract

More information

Node-based Distributed Optimal Control of Wireless Networks

Node-based Distributed Optimal Control of Wireless Networks Node-based Distributed Optimal Control of Wireless Networks CISS March 2006 Edmund M. Yeh Department of Electrical Engineering Yale University Joint work with Yufang Xi Main Results Unified framework for

More information

Cooperative HARQ with Poisson Interference and Opportunistic Routing

Cooperative HARQ with Poisson Interference and Opportunistic Routing Cooperative HARQ with Poisson Interference and Opportunistic Routing Amogh Rajanna & Mostafa Kaveh Department of Electrical and Computer Engineering University of Minnesota, Minneapolis, MN USA. Outline

More information

Energy Optimal Control for Time Varying Wireless Networks. Michael J. Neely University of Southern California

Energy Optimal Control for Time Varying Wireless Networks. Michael J. Neely University of Southern California Energy Optimal Control for Time Varying Wireless Networks Michael J. Neely University of Southern California http://www-rcf.usc.edu/~mjneely Part 1: A single wireless downlink (L links) L 2 1 S={Totally

More information

Delay QoS Provisioning and Optimal Resource Allocation for Wireless Networks

Delay QoS Provisioning and Optimal Resource Allocation for Wireless Networks Syracuse University SURFACE Dissertations - ALL SURFACE June 2017 Delay QoS Provisioning and Optimal Resource Allocation for Wireless Networks Yi Li Syracuse University Follow this and additional works

More information

EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing

EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing Michael J. Neely University of Southern California http://www-bcf.usc.edu/ mjneely 1 Abstract This collection of notes provides a

More information

A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation

A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation Karim G. Seddik and Amr A. El-Sherif 2 Electronics and Communications Engineering Department, American University in Cairo, New

More information

Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting

Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting Swapna B.T., Atilla Eryilmaz, and Ness B. Shroff Departments of ECE and CSE The Ohio State University Columbus, OH 43210

More information

Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users

Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users Junjik Bae, Randall Berry, and Michael L. Honig Department of Electrical Engineering and Computer Science Northwestern University,

More information

Half-Duplex Gaussian Relay Networks with Interference Processing Relays

Half-Duplex Gaussian Relay Networks with Interference Processing Relays Half-Duplex Gaussian Relay Networks with Interference Processing Relays Bama Muthuramalingam Srikrishna Bhashyam Andrew Thangaraj Department of Electrical Engineering Indian Institute of Technology Madras

More information

Information Theory vs. Queueing Theory for Resource Allocation in Multiple Access Channels

Information Theory vs. Queueing Theory for Resource Allocation in Multiple Access Channels 1 Information Theory vs. Queueing Theory for Resource Allocation in Multiple Access Channels Invited Paper Ali ParandehGheibi, Muriel Médard, Asuman Ozdaglar, and Atilla Eryilmaz arxiv:0810.167v1 cs.it

More information

MMSE Equalizer Design

MMSE Equalizer Design MMSE Equalizer Design Phil Schniter March 6, 2008 [k] a[m] P a [k] g[k] m[k] h[k] + ṽ[k] q[k] y [k] P y[m] For a trivial channel (i.e., h[k] = δ[k]), e kno that the use of square-root raisedcosine (SRRC)

More information

Queueing Theory I Summary! Little s Law! Queueing System Notation! Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K "

Queueing Theory I Summary! Little s Law! Queueing System Notation! Stationary Analysis of Elementary Queueing Systems  M/M/1  M/M/m  M/M/1/K Queueing Theory I Summary Little s Law Queueing System Notation Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K " Little s Law a(t): the process that counts the number of arrivals

More information

Energy State Amplification in an Energy Harvesting Communication System

Energy State Amplification in an Energy Harvesting Communication System Energy State Amplification in an Energy Harvesting Communication System Omur Ozel Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland College Park, MD 20742 omur@umd.edu

More information

Operations Research Letters. Instability of FIFO in a simple queueing system with arbitrarily low loads

Operations Research Letters. Instability of FIFO in a simple queueing system with arbitrarily low loads Operations Research Letters 37 (2009) 312 316 Contents lists available at ScienceDirect Operations Research Letters journal homepage: www.elsevier.com/locate/orl Instability of FIFO in a simple queueing

More information

Stability Analysis in a Cognitive Radio System with Cooperative Beamforming

Stability Analysis in a Cognitive Radio System with Cooperative Beamforming Stability Analysis in a Cognitive Radio System with Cooperative Beamforming Mohammed Karmoose 1 Ahmed Sultan 1 Moustafa Youseff 2 1 Electrical Engineering Dept, Alexandria University 2 E-JUST Agenda 1

More information

A Generalization of a result of Catlin: 2-factors in line graphs

A Generalization of a result of Catlin: 2-factors in line graphs AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 72(2) (2018), Pages 164 184 A Generalization of a result of Catlin: 2-factors in line graphs Ronald J. Gould Emory University Atlanta, Georgia U.S.A. rg@mathcs.emory.edu

More information

On the Throughput-Optimality of CSMA Policies in Multihop Wireless Networks

On the Throughput-Optimality of CSMA Policies in Multihop Wireless Networks Technical Report Computer Networks Research Lab Department of Computer Science University of Toronto CNRL-08-002 August 29th, 2008 On the Throughput-Optimality of CSMA Policies in Multihop Wireless Networks

More information

EP2200 Course Project 2017 Project II - Mobile Computation Offloading

EP2200 Course Project 2017 Project II - Mobile Computation Offloading EP2200 Course Project 2017 Project II - Mobile Computation Offloading 1 Introduction Queuing theory provides us a very useful mathematic tool that can be used to analytically evaluate the performance of

More information

Business Cycles: The Classical Approach

Business Cycles: The Classical Approach San Francisco State University ECON 302 Business Cycles: The Classical Approach Introduction Michael Bar Recall from the introduction that the output per capita in the U.S. is groing steady, but there

More information

y(x) = x w + ε(x), (1)

y(x) = x w + ε(x), (1) Linear regression We are ready to consider our first machine-learning problem: linear regression. Suppose that e are interested in the values of a function y(x): R d R, here x is a d-dimensional vector-valued

More information

On Distribution and Limits of Information Dissemination Latency and Speed In Mobile Cognitive Radio Networks

On Distribution and Limits of Information Dissemination Latency and Speed In Mobile Cognitive Radio Networks This paper was presented as part of the Mini-Conference at IEEE INFOCOM 11 On Distribution and Limits of Information Dissemination Latency and Speed In Mobile Cognitive Radio Networks Lei Sun Wenye Wang

More information

A ROBUST BEAMFORMER BASED ON WEIGHTED SPARSE CONSTRAINT

A ROBUST BEAMFORMER BASED ON WEIGHTED SPARSE CONSTRAINT Progress In Electromagnetics Research Letters, Vol. 16, 53 60, 2010 A ROBUST BEAMFORMER BASED ON WEIGHTED SPARSE CONSTRAINT Y. P. Liu and Q. Wan School of Electronic Engineering University of Electronic

More information

Communication Games on the Generalized Gaussian Relay Channel

Communication Games on the Generalized Gaussian Relay Channel Communication Games on the Generalized Gaussian Relay Channel Dileep M. alathil Department of Electrical Engineering University of Southern California manisser@usc.edu Rahul Jain EE & ISE Departments University

More information

STABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS

STABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS The 8th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 7) STABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS Ka-Hung

More information

Job Scheduling and Multiple Access. Emre Telatar, EPFL Sibi Raj (EPFL), David Tse (UC Berkeley)

Job Scheduling and Multiple Access. Emre Telatar, EPFL Sibi Raj (EPFL), David Tse (UC Berkeley) Job Scheduling and Multiple Access Emre Telatar, EPFL Sibi Raj (EPFL), David Tse (UC Berkeley) 1 Multiple Access Setting Characteristics of Multiple Access: Bursty Arrivals Uncoordinated Transmitters Interference

More information

Markov Chain Model for ALOHA protocol

Markov Chain Model for ALOHA protocol Markov Chain Model for ALOHA protocol Laila Daniel and Krishnan Narayanan April 22, 2012 Outline of the talk A Markov chain (MC) model for Slotted ALOHA Basic properties of Discrete-time Markov Chain Stability

More information

IN this paper, we show that the scalar Gaussian multiple-access

IN this paper, we show that the scalar Gaussian multiple-access 768 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 5, MAY 2004 On the Duality of Gaussian Multiple-Access and Broadcast Channels Nihar Jindal, Student Member, IEEE, Sriram Vishwanath, and Andrea

More information

Efficient Nonlinear Optimizations of Queuing Systems

Efficient Nonlinear Optimizations of Queuing Systems Efficient Nonlinear Optimizations of Queuing Systems Mung Chiang, Arak Sutivong, and Stephen Boyd Electrical Engineering Department, Stanford University, CA 9435 Abstract We present a systematic treatment

More information

Message Delivery Probability of Two-Hop Relay with Erasure Coding in MANETs

Message Delivery Probability of Two-Hop Relay with Erasure Coding in MANETs 01 7th International ICST Conference on Communications and Networking in China (CHINACOM) Message Delivery Probability of Two-Hop Relay with Erasure Coding in MANETs Jiajia Liu Tohoku University Sendai,

More information

On the Stability and Optimal Decentralized Throughput of CSMA with Multipacket Reception Capability

On the Stability and Optimal Decentralized Throughput of CSMA with Multipacket Reception Capability On the Stability and Optimal Decentralized Throughput of CSMA with Multipacket Reception Capability Douglas S. Chan Toby Berger Lang Tong School of Electrical & Computer Engineering Cornell University,

More information

requests/sec. The total channel load is requests/sec. Using slot as the time unit, the total channel load is 50 ( ) = 1

requests/sec. The total channel load is requests/sec. Using slot as the time unit, the total channel load is 50 ( ) = 1 Prof. X. Shen E&CE 70 : Examples #2 Problem Consider the following Aloha systems. (a) A group of N users share a 56 kbps pure Aloha channel. Each user generates at a Passion rate of one 000-bit packet

More information

Decodability Analysis of Finite Memory Random Linear Coding in Line Networks

Decodability Analysis of Finite Memory Random Linear Coding in Line Networks Decodability Analysis of Finite Memory Random Linear Coding in Line Networks Nima Torabkhani, Faramarz Fekri School of Electrical and Computer Engineering Georgia Institute of Technology, Atlanta GA 30332,

More information

Anytime Capacity of the AWGN+Erasure Channel with Feedback. Qing Xu. B.S. (Beijing University) 1997 M.S. (University of California at Berkeley) 2000

Anytime Capacity of the AWGN+Erasure Channel with Feedback. Qing Xu. B.S. (Beijing University) 1997 M.S. (University of California at Berkeley) 2000 Anytime Capacity of the AWGN+Erasure Channel with Feedback by Qing Xu B.S. (Beijing University) 1997 M.S. (University of California at Berkeley) 2000 A dissertation submitted in partial satisfaction of

More information

Technion - Computer Science Department - Technical Report CS On Centralized Smooth Scheduling

Technion - Computer Science Department - Technical Report CS On Centralized Smooth Scheduling On Centralized Smooth Scheduling Ami Litman January 25, 2005 Abstract Shiri Moran-Schein This paper studies evenly distributed sets of natural numbers and their applications to scheduling in a centralized

More information

Approximate Queueing Model for Multi-rate Multi-user MIMO systems.

Approximate Queueing Model for Multi-rate Multi-user MIMO systems. An Approximate Queueing Model for Multi-rate Multi-user MIMO systems Boris Bellalta,Vanesa Daza, Miquel Oliver Abstract A queueing model for Multi-rate Multi-user MIMO systems is presented. The model is

More information

Relaying Information Streams

Relaying Information Streams Relaying Information Streams Anant Sahai UC Berkeley EECS sahai@eecs.berkeley.edu Originally given: Oct 2, 2002 This was a talk only. I was never able to rigorously formalize the back-of-the-envelope reasoning

More information

Performance Evaluation of Queuing Systems

Performance Evaluation of Queuing Systems Performance Evaluation of Queuing Systems Introduction to Queuing Systems System Performance Measures & Little s Law Equilibrium Solution of Birth-Death Processes Analysis of Single-Station Queuing Systems

More information

Lecture 3a: The Origin of Variational Bayes

Lecture 3a: The Origin of Variational Bayes CSC535: 013 Advanced Machine Learning Lecture 3a: The Origin of Variational Bayes Geoffrey Hinton The origin of variational Bayes In variational Bayes, e approximate the true posterior across parameters

More information

Amr Rizk TU Darmstadt

Amr Rizk TU Darmstadt Saving Resources on Wireless Uplinks: Models of Queue-aware Scheduling 1 Amr Rizk TU Darmstadt - joint work with Markus Fidler 6. April 2016 KOM TUD Amr Rizk 1 Cellular Uplink Scheduling freq. time 6.

More information

Network Control: A Rate-Distortion Perspective

Network Control: A Rate-Distortion Perspective Network Control: A Rate-Distortion Perspective Jubin Jose and Sriram Vishwanath Dept. of Electrical and Computer Engineering The University of Texas at Austin {jubin, sriram}@austin.utexas.edu arxiv:8.44v2

More information

Randomized Smoothing Networks

Randomized Smoothing Networks Randomized Smoothing Netorks Maurice Herlihy Computer Science Dept., Bron University, Providence, RI, USA Srikanta Tirthapura Dept. of Electrical and Computer Engg., Ioa State University, Ames, IA, USA

More information

Capacity of a Two-way Function Multicast Channel

Capacity of a Two-way Function Multicast Channel Capacity of a Two-way Function Multicast Channel 1 Seiyun Shin, Student Member, IEEE and Changho Suh, Member, IEEE Abstract We explore the role of interaction for the problem of reliable computation over

More information

On the approximation of real powers of sparse, infinite, bounded and Hermitian matrices

On the approximation of real powers of sparse, infinite, bounded and Hermitian matrices On the approximation of real poers of sparse, infinite, bounded and Hermitian matrices Roman Werpachoski Center for Theoretical Physics, Al. Lotnikó 32/46 02-668 Warszaa, Poland Abstract We describe a

More information

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS The 20 Military Communications Conference - Track - Waveforms and Signal Processing TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS Gam D. Nguyen, Jeffrey E. Wieselthier 2, Sastry Kompella,

More information

Performance Analysis of a Threshold-Based Relay Selection Algorithm in Wireless Networks

Performance Analysis of a Threshold-Based Relay Selection Algorithm in Wireless Networks Communications and Networ, 2010, 2, 87-92 doi:10.4236/cn.2010.22014 Published Online May 2010 (http://www.scirp.org/journal/cn Performance Analysis of a Threshold-Based Relay Selection Algorithm in Wireless

More information

Queue Proportional Scheduling in Gaussian Broadcast Channels

Queue Proportional Scheduling in Gaussian Broadcast Channels Queue Proportional Scheduling in Gaussian Broadcast Channels Kibeom Seong Dept. of Electrical Engineering Stanford University Stanford, CA 9435 USA Email: kseong@stanford.edu Ravi Narasimhan Dept. of Electrical

More information

Fairness and Optimal Stochastic Control for Heterogeneous Networks

Fairness and Optimal Stochastic Control for Heterogeneous Networks λ 91 λ 93 Fairness and Optimal Stochastic Control for Heterogeneous Networks sensor network wired network wireless 9 8 7 6 5 λ 48 λ 42 4 3 0 1 2 λ n R n U n Michael J. Neely (USC) Eytan Modiano (MIT) Chih-Ping

More information

Econ 201: Problem Set 3 Answers

Econ 201: Problem Set 3 Answers Econ 20: Problem Set 3 Ansers Instructor: Alexandre Sollaci T.A.: Ryan Hughes Winter 208 Question a) The firm s fixed cost is F C = a and variable costs are T V Cq) = 2 bq2. b) As seen in class, the optimal

More information

Long run input use-input price relations and the cost function Hessian. Ian Steedman Manchester Metropolitan University

Long run input use-input price relations and the cost function Hessian. Ian Steedman Manchester Metropolitan University Long run input use-input price relations and the cost function Hessian Ian Steedman Manchester Metropolitan University Abstract By definition, to compare alternative long run equilibria is to compare alternative

More information

Towards Achieving Full Secrecy Rate and Low Delays in Wireless Networks

Towards Achieving Full Secrecy Rate and Low Delays in Wireless Networks owards Achieving Full Secrecy Rate and Low Delays in Wireless Networks Zhoujia Mao Department of ECE he Ohio State University maoz@ece.osu.edu Can Emre Koksal Department of ECE he Ohio State University

More information

Group-invariant solutions of nonlinear elastodynamic problems of plates and shells *

Group-invariant solutions of nonlinear elastodynamic problems of plates and shells * Group-invariant solutions of nonlinear elastodynamic problems of plates and shells * V. A. Dzhupanov, V. M. Vassilev, P. A. Dzhondzhorov Institute of mechanics, Bulgarian Academy of Sciences, Acad. G.

More information

ABSTRACT WIRELESS COMMUNICATIONS. criterion. Therefore, it is imperative to design advanced transmission schemes to

ABSTRACT WIRELESS COMMUNICATIONS. criterion. Therefore, it is imperative to design advanced transmission schemes to ABSTRACT Title of dissertation: DELAY MINIMIZATION IN ENERGY CONSTRAINED WIRELESS COMMUNICATIONS Jing Yang, Doctor of Philosophy, 2010 Dissertation directed by: Professor Şennur Ulukuş Department of Electrical

More information

Towards Achieving Full Secrecy Rate in Wireless Networks: A Control Theoretic Approach

Towards Achieving Full Secrecy Rate in Wireless Networks: A Control Theoretic Approach owards Achieving Full Secrecy Rate in Wireless Networks: A Control heoretic Approach Zhoujia Mao Department of ECE he Ohio State University maoz@ece.osu.edu Can Emre Koksal Department of ECE he Ohio State

More information

Primary Rate-Splitting Achieves Capacity for the Gaussian Cognitive Interference Channel

Primary Rate-Splitting Achieves Capacity for the Gaussian Cognitive Interference Channel Primary Rate-Splitting Achieves Capacity for the Gaussian Cognitive Interference Channel Stefano Rini, Ernest Kurniawan and Andrea Goldsmith Technische Universität München, Munich, Germany, Stanford University,

More information

M/G/FQ: STOCHASTIC ANALYSIS OF FAIR QUEUEING SYSTEMS

M/G/FQ: STOCHASTIC ANALYSIS OF FAIR QUEUEING SYSTEMS M/G/FQ: STOCHASTIC ANALYSIS OF FAIR QUEUEING SYSTEMS MOHAMMED HAWA AND DAVID W. PETR Information and Telecommunications Technology Center University of Kansas, Lawrence, Kansas, 66045 email: {hawa, dwp}@ittc.ku.edu

More information

Enhancing Generalization Capability of SVM Classifiers with Feature Weight Adjustment

Enhancing Generalization Capability of SVM Classifiers with Feature Weight Adjustment Enhancing Generalization Capability of SVM Classifiers ith Feature Weight Adjustment Xizhao Wang and Qiang He College of Mathematics and Computer Science, Hebei University, Baoding 07002, Hebei, China

More information

Information Theory Meets Game Theory on The Interference Channel

Information Theory Meets Game Theory on The Interference Channel Information Theory Meets Game Theory on The Interference Channel Randall A. Berry Dept. of EECS Northwestern University e-mail: rberry@eecs.northwestern.edu David N. C. Tse Wireless Foundations University

More information

CHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION. From Exploratory Factor Analysis Ledyard R Tucker and Robert C. MacCallum

CHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION. From Exploratory Factor Analysis Ledyard R Tucker and Robert C. MacCallum CHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION From Exploratory Factor Analysis Ledyard R Tucker and Robert C. MacCallum 1997 19 CHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION 3.0. Introduction

More information

ENERGY harvesting (EH), a technology to collect energy. Optimal Relaying in Energy Harvesting Wireless Networks with Wireless-Powered Relays

ENERGY harvesting (EH), a technology to collect energy. Optimal Relaying in Energy Harvesting Wireless Networks with Wireless-Powered Relays Optimal elaying in Energy Harvesting Wireless Networks with Wireless-Powered elays Masoumeh Moradian, tudent Member, IEEE, Farid Ashtiani, Member, IEEE, and Ying Jun (Angela) Zhang, enior Member, IEEE

More information

Queue length analysis for multicast: Limits of performance and achievable queue length with random linear coding

Queue length analysis for multicast: Limits of performance and achievable queue length with random linear coding Queue length analysis for multicast: Limits of performance and achievable queue length with random linear coding The MIT Faculty has made this article openly available Please share how this access benefits

More information

Backlog Optimal Downlink Scheduling in Energy Harvesting Base Station in a Cellular Network

Backlog Optimal Downlink Scheduling in Energy Harvesting Base Station in a Cellular Network MTech Dissertation Backlog Optimal Downlink Scheduling in Energy Harvesting Base Station in a Cellular Network Submitted in partial fulfillment of the requirements for the degree of Master of Technology

More information

Random Access Protocols ALOHA

Random Access Protocols ALOHA Random Access Protocols ALOHA 1 ALOHA Invented by N. Abramson in 1970-Pure ALOHA Uncontrolled users (no coordination among users) Same packet (frame) size Instant feedback Large (~ infinite) population

More information

Science Degree in Statistics at Iowa State College, Ames, Iowa in INTRODUCTION

Science Degree in Statistics at Iowa State College, Ames, Iowa in INTRODUCTION SEQUENTIAL SAMPLING OF INSECT POPULATIONSl By. G. H. IVES2 Mr.. G. H. Ives obtained his B.S.A. degree at the University of Manitoba in 1951 majoring in Entomology. He thm proceeded to a Masters of Science

More information

Minimum Repair Bandwidth for Exact Regeneration in Distributed Storage

Minimum Repair Bandwidth for Exact Regeneration in Distributed Storage 1 Minimum Repair andwidth for Exact Regeneration in Distributed Storage Vivec R Cadambe, Syed A Jafar, Hamed Malei Electrical Engineering and Computer Science University of California Irvine, Irvine, California,

More information

An Admission Control Mechanism for Providing Service Differentiation in Optical Burst-Switching Networks

An Admission Control Mechanism for Providing Service Differentiation in Optical Burst-Switching Networks An Admission Control Mechanism for Providing Service Differentiation in Optical Burst-Switching Networks Igor M. Moraes, Daniel de O. Cunha, Marco D. D. Bicudo, Rafael P. Laufer, and Otto Carlos M. B.

More information

Computer Networks More general queuing systems

Computer Networks More general queuing systems Computer Networks More general queuing systems Saad Mneimneh Computer Science Hunter College of CUNY New York M/G/ Introduction We now consider a queuing system where the customer service times have a

More information

ABSTRACT ENERGY HARVESTING COMMUNICATION NETWORKS WITH SYSTEM COSTS. Title of dissertation: Ahmed Arafa, Doctor of Philosophy, 2017

ABSTRACT ENERGY HARVESTING COMMUNICATION NETWORKS WITH SYSTEM COSTS. Title of dissertation: Ahmed Arafa, Doctor of Philosophy, 2017 ABSTRACT Title of dissertation: ENERGY HARVESTING COMMUNICATION NETWORKS WITH SYSTEM COSTS Ahmed Arafa, Doctor of Philosophy, 2017 Dissertation directed by: Professor Şennur Ulukuş Department of Electrical

More information

STABILITY OF MULTICLASS QUEUEING NETWORKS UNDER LONGEST-QUEUE AND LONGEST-DOMINATING-QUEUE SCHEDULING

STABILITY OF MULTICLASS QUEUEING NETWORKS UNDER LONGEST-QUEUE AND LONGEST-DOMINATING-QUEUE SCHEDULING Applied Probability Trust (7 May 2015) STABILITY OF MULTICLASS QUEUEING NETWORKS UNDER LONGEST-QUEUE AND LONGEST-DOMINATING-QUEUE SCHEDULING RAMTIN PEDARSANI and JEAN WALRAND, University of California,

More information

End-to-end Secure Multi-hop Communication with Untrusted Relays is Possible

End-to-end Secure Multi-hop Communication with Untrusted Relays is Possible End-to-end Secure Multi-hop Communication with Untrusted Relays is Possible Xiang He Aylin Yener Wireless Communications and Networking Laboratory Electrical Engineering Department The Pennsylvania State

More information

Outage Probability for Two-Way Solar-Powered Relay Networks with Stochastic Scheduling

Outage Probability for Two-Way Solar-Powered Relay Networks with Stochastic Scheduling Outage Probability for Two-Way Solar-Powered Relay Networks with Stochastic Scheduling Wei Li, Meng-Lin Ku, Yan Chen, and K. J. Ray Liu Department of Electrical and Computer Engineering, University of

More information

Error Exponent Region for Gaussian Broadcast Channels

Error Exponent Region for Gaussian Broadcast Channels Error Exponent Region for Gaussian Broadcast Channels Lihua Weng, S. Sandeep Pradhan, and Achilleas Anastasopoulos Electrical Engineering and Computer Science Dept. University of Michigan, Ann Arbor, MI

More information

Optimal Link Adaptation in Wideband CDMA Systems

Optimal Link Adaptation in Wideband CDMA Systems Optimal Link Adaptation in Wideband CDMA Systems Tim Holliday, Andrea Goldsmith, and Peter Glynn Stanford University Abstract We develop a general framework for optimizing link adaptation for multiuser

More information

Ressource Allocation Schemes for D2D Communications

Ressource Allocation Schemes for D2D Communications 1 / 24 Ressource Allocation Schemes for D2D Communications Mohamad Assaad Laboratoire des Signaux et Systèmes (L2S), CentraleSupélec, Gif sur Yvette, France. Indo-french Workshop on D2D Communications

More information

1646 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 64, NO. 4, APRIL 2016

1646 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 64, NO. 4, APRIL 2016 646 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 64, NO. 4, APRIL 6 On the Throughput Capacity Study for Aloha Mobile Ad Hoc Networks Yin Chen, Member, IEEE, Yulong Shen, Member, IEEE, Jinxiao Zhu, Xiaohong

More information

3 - Vector Spaces Definition vector space linear space u, v,

3 - Vector Spaces Definition vector space linear space u, v, 3 - Vector Spaces Vectors in R and R 3 are essentially matrices. They can be vieed either as column vectors (matrices of size and 3, respectively) or ro vectors ( and 3 matrices). The addition and scalar

More information

Green Distributed Storage Using Energy Harvesting Nodes

Green Distributed Storage Using Energy Harvesting Nodes 1 Green Distributed Storage Using Energy Harvesting Nodes Abdelrahman M. Ibrahim, Student Member, IEEE, Ahmed A. Zewail, Student Member, IEEE, and Aylin Yener, Fellow, IEEE Abstract We consider a distributed

More information

Resource Allocation for Video Streaming in Wireless Environment

Resource Allocation for Video Streaming in Wireless Environment Resource Allocation for Video Streaming in Wireless Environment Shahrokh Valaee and Jean-Charles Gregoire Abstract This paper focuses on the development of a new resource allocation scheme for video streaming

More information

Minimizing and maximizing compressor and turbine work respectively

Minimizing and maximizing compressor and turbine work respectively Minimizing and maximizing compressor and turbine ork respectively Reversible steady-flo ork In Chapter 3, Work Done during a rocess as found to be W b dv Work Done during a rocess It depends on the path

More information

Towards a Theory of Societal Co-Evolution: Individualism versus Collectivism

Towards a Theory of Societal Co-Evolution: Individualism versus Collectivism Toards a Theory of Societal Co-Evolution: Individualism versus Collectivism Kartik Ahuja, Simpson Zhang and Mihaela van der Schaar Department of Electrical Engineering, Department of Economics, UCLA Theorem

More information

ASYMPTOTIC PERFORMANCE OF MIMO WIRELESS CHANNELS WITH LIMITED FEEDBACK

ASYMPTOTIC PERFORMANCE OF MIMO WIRELESS CHANNELS WITH LIMITED FEEDBACK ASYMPTTIC PERFRMANCE F MIM WIRELESS CHANNELS WITH LIMITED FEEDBACK Wiroonsak Santipach and Michael L. Honig Department of Electrical and Computer Engineering Northestern University 2145 Sheridan Road Evanston,

More information

Distributed Power Control for Time Varying Wireless Networks: Optimality and Convergence

Distributed Power Control for Time Varying Wireless Networks: Optimality and Convergence Distributed Power Control for Time Varying Wireless Networks: Optimality and Convergence Tim Holliday, Nick Bambos, Peter Glynn, Andrea Goldsmith Stanford University Abstract This paper presents a new

More information

ANALYSIS OF THE RTS/CTS MULTIPLE ACCESS SCHEME WITH CAPTURE EFFECT

ANALYSIS OF THE RTS/CTS MULTIPLE ACCESS SCHEME WITH CAPTURE EFFECT ANALYSIS OF THE RTS/CTS MULTIPLE ACCESS SCHEME WITH CAPTURE EFFECT Chin Keong Ho Eindhoven University of Technology Eindhoven, The Netherlands Jean-Paul M. G. Linnartz Philips Research Laboratories Eindhoven,

More information

Random Access: An Information-Theoretic Perspective

Random Access: An Information-Theoretic Perspective Random Access: An Information-Theoretic Perspective Paolo Minero, Massimo Franceschetti, and David N. C. Tse Abstract This paper considers a random access system where each sender can be in two modes of

More information

Homework Set 2 Solutions

Homework Set 2 Solutions MATH 667-010 Introduction to Mathematical Finance Prof. D. A. Edards Due: Feb. 28, 2018 Homeork Set 2 Solutions 1. Consider the ruin problem. Suppose that a gambler starts ith ealth, and plays a game here

More information

Equivalent Models and Analysis for Multi-Stage Tree Networks of Deterministic Service Time Queues

Equivalent Models and Analysis for Multi-Stage Tree Networks of Deterministic Service Time Queues Proceedings of the 38th Annual Allerton Conference on Communication, Control, and Computing, Oct. 2000. Equivalent Models and Analysis for Multi-Stage ree Networks of Deterministic Service ime Queues Michael

More information

WIRELESS COMMUNICATIONS AND COGNITIVE RADIO TRANSMISSIONS UNDER QUALITY OF SERVICE CONSTRAINTS AND CHANNEL UNCERTAINTY

WIRELESS COMMUNICATIONS AND COGNITIVE RADIO TRANSMISSIONS UNDER QUALITY OF SERVICE CONSTRAINTS AND CHANNEL UNCERTAINTY University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Theses, Dissertations, and Student Research from Electrical & Computer Engineering Electrical & Computer Engineering, Department

More information