arxiv: v1 [cs.ni] 13 Aug 2013

Size: px
Start display at page:

Download "arxiv: v1 [cs.ni] 13 Aug 2013"

Transcription

1 Robotic Message Ferrying for Wireless Networks using Coarse-Grained Backpressure Control Shangxing Wang Dept. of Electrical Engineering, Uniersity of Southern California, Los Angeles, CA Andrea Gasparri Department of Engineering Roma Tre Uniersity Rome, Italy Bhaskar Krishnamachari Dept. of Electrical Engineering, Uniersity of Southern California, Los Angeles, CA arxi: [cs.ni] 13 Aug 13 Abstract We formulate the problem of robots ferrying messages between statically-placed source and sink pairs that they can communicate with wirelessly. We first analyze the capacity region for this problem under both ideal (arbitrarily high elocity, long scheduling periods) and realistic conditions. We indicate how robots could be scheduled optimally to satisfy any arrial rate in the capacity region, gien prior knowledge about arrial rates. We find that if the number of robots allocated grows proportionally with the number of source-sink pairs, then the capacity of the network scales as Θ(1), similar to what was shown preiously by Grossglauser and Tse for uncontrolled mobility; howeer, in contrast to that prior result, we also find that with controlled mobility this constant capacity scaling can be obtained while ensuring finite delay. We then consider the setting where the arrial rates are unknown and present a coarsegrained backpressure message ferrying algorithm (CBMF) for it. In CBMF, the robots are matched to sources and sinks once eery epoch to maximize a queue-differential-based weight. The matching controls both motion and transmission for each robot: if a robot is matched to a source, it moes towards that source and collects data from it; and if it is matched to a sink, it moes towards that sink and transmits data to it. We show through analysis and simulations the conditions under which CBMF can stabilize the network. We show that the maximum achieable stable throughput with this policy tends to the ideal capacity as the schedule duration and robot elocity increase. I. INTRODUCTION Since the work by Tse and Grossglauser [1], it has been known that the use of delay tolerant mobile communications can dramatically increase the capacity of wireless networks by proiding ideal constant throughput scaling with network size at the expense of delay. Howeer, nearly all the work to date has focused on message ferrying in intermittently connected mobile networks where the mobility is either unpredictable, or predictable but uncontrollable. With the rapidly growing interest in multi-robot systems, we are entering an era where the position of network elements can be explicitly controlled in order to improe communication performance. This paper explores the fundamental limits of robotically controlled message ferrying in a wireless network. We consider a setting in which a set of K pairs of static wireless nodes act as sources and sinks that communicate not directly with each other (possibly because they are located far from each other and hence cannot communicate with each other at sufficiently high rates) but through a set of N controllable robots. We assume that there is a centralized control plane (which, because it collects only queue state information about all network entities, can be relatiely inexpensiely created either using infrastructure such as cellular / WiFi, or through a low-rate multi-hopping mesh oerlay). We mathematically characterize the capacity region of this system, considering both ideal (arbitrarily large) and realistic (finite) settings with respect to robot mobility and scheduling durations. This analysis shows that with N = K robots the system could be made to operate at full capacity (effectiely at the same throughput as if all sources and sinks were adjacent to each other). We indicate how any traffic that is within the capacity region of this network can be sered stably if the data arrial rates are known to the scheduler. We then consider how to schedule the robots when the arrial rates are not known a priori. For this case, we propose and ealuate a queue-backpressure based algorithm for message ferrying that is coarse-grained in the sense that robot motion and relaying decisions are made once eery fixed-duration epoch. We show that as the epoch duration and elocity of robots both increase, the throughput performance of this algorithm rapidly approaches that of the ideal case. II. PROBLEM FORMULATION There are K pairs of static source and destination nodes located at arbitrary locations. Let the source for the i th flow be denoted as src(i), and the destination or sink for that flow be denoted as sink(i). Source i receies packets at a constant rate denoted by λ i. There are N K mobile robotic nodes that act as message ferries, i.e. when they talk to a source node, they can collect packets from it, and when they talk to a sink node, they can transmit packets to it. Furthermore, for simplicity, we assume that the static nodes do not communicate directly with each other, but rather only through the mobile robots. Time is diided into discrete time steps of unit duration. The locations of the sources and sinks for flow i are denoted by x src(i) and x sink(i) respectiely, and the location of robot j at time t is denoted as x j (t). Let the distance between a source for flow i and a robot j be denoted as d(x src(i), x j (t)) (similarly for the sink). When in motion, the robotic nodes moe with a uniform elocity directly to the destination (there are no obstacles), so that if robot j is moing towards the source for flow i, its position x j (t) is updated so that it moes along the ector between its preious position and the source location to be at the following distance: d(x src(i), x j (t 1)) = maxd(x src(i), x j (t)), (1)

2 Fig. 1. flow 1 flow source 1 source robot 1 robot 3 robot robot 4 sink 1 sink A network containing pairs of source and sink nodes and 4 robots We assume that the rate at which a source for flow i can transmit to a robot j, denoted by R src(i),j (t) is always strictly positie, and decreases monotonically with the distance between them, and similarly for the rate at which a robot j can transmit to the sink for flow i, denoted by R j,sink(i) (t). We assume that when the robot is at a location of a particular source or sink, (i.e., the distance between them is ), the corresponding throughput between the mobile robot and that source or sink is R max The queue at the source for flow i is denoted as Q src(i). It is assumed that there is no queue at the sinks as they directly consume all packets intended for them. Each robot j maintains a separate queue for each flow i, labelled Q i j. Figure 1 shows an illustration of this system with K = flows and N = 4 robots. Eery T time steps there is a new epoch. At the start of each epoch, it is assumed that the information about queue states of all source and sink nodes as well as all queues at each of the robots is made aailable to a centralized scheduler. At that time this centralized scheduler can use this information to match each robot to either a source or sink. The matching is represented by an allocation matrix A such that A(i, j) is if the robot j is not allocated to either source or sink for flow i, 1 if it is allocated to src(i), and 1 if it is allocated to sink(i). When a robot is allocated to a gien source (or sink), for the rest of that epoch it moes closer to that node until it reaches its position. At all time steps of that epoch that robot will communicate exclusiely with that source (or sink) to pick up (or drop, in case of the sink) any aailable packets between the corresponding queues at a rate depending on its current distance to that node. If a robot j is communicating with src(i) at time t, the update equations for the corresponding queue of the robot and the source queue will be as follows: n p (t) = minr src(i),j (t), Q src(i) (t) Q i j(t 1) = Q i j(t 1) n p (t) Q src(i) (t 1) = Q src(i) (t 1) n p (t) λ i. () Similarly, if the robot j is communicating with sink(i) at time t, the queue update equation for the robot s corresponding queue will be: n p (t) = minr j,sink(i) (t), Q i j(t) Q i j(t 1) = Q i. (3) j(t 1) n p (t) III. CAPACITY ANALYSIS We define an open region Λ of arrial rates as follows: Λ = λ λ i < R max, i, λ i < R max N. (4) We shall show that this arrial rate region Λ can be sered by a conex combination of configurations in which robots are allocated to sere distinct flows. Let Γ be a finite set of ectors defined as: Γ = γ γ i = a i R max, i, a i, 1,, a i N For each element of this set Γ, the corresponding integer ector a corresponds to a basis allocation of robots to distinct sources and sinks that can serice each flow at rate γ i. Specifically, a i refers to the number of robots allocated to sere flow i. If a i = 1, this means exactly one robot is allocated to flow i, and can sere this flow maximally by spending half its time near the source and half the time near the sink (ignoring for now the time spent in transit), yielding a maximum serice rate of γ i = R max /. If two robots are allocated to a flow i, we hae that a i =, in which case two robots take turns spending time at the source and sink of the flow respectiely for half the time each, yielding a net rate of γ i = R max. The constraints on a i ensure that the total number of robots allocated does not exceed the aailable number N. Let us refer to the conex hull of Γ as H( Γ) or, for readability, simply H. Lemma 1: H Λ Proof: First, note that the conex hull of Γ can be written as follows: H = γ γ i = a i R max, a i [, ] i, a i N. (6) In other words, the conex hull of the set Γ is obtained by allowing a i to ary continuously. Now using the relationship a i = γ i, we can re-express H as follows: R max γ i γ i H = γ [, ] i, N R max R max. = γ γ i R max i, γ i R maxn Λ Each basis allocation corresponding to the elements of Γ can actually be expressed as two distinct but symmetric allocations of robots to sources/sinks oer two successie epochs. For the i th flow, if a i =, there is no robot allocated. (5)

3 to either the source or sink in either of these two epochs; if a i = 1, a particular robot is assigned to be at the source at the first epoch and at the sink at the second epoch; if a i =, two robots are assigned (call them R1 and R) such that R1 is at the source at the first epoch and at the sink at the second epoch while R is at the sink at the first epoch and at the source at the second epoch. The set H describes all possible robot serice rates that can be obtained by a conex combination of these basis allocations. Consider a rate ector γ H. Since it lies in the conex hull of the set Γ it can be described in terms of a ector of conex coefficients α each of whose elements corresponds to a basis allocation of robots. We can therefore 1 identify n i such that n i / n i = α i. The gien rate ector γ can then be i scheduled by allocating n i epochs each for the two parts of the i th basis allocation. And after a total of n i epochs, the i whole schedule can be repeated. This schedule will proide the desired serice rate ector γ. Thus far the schedules hae been deried under the assumption of instantaneous robot moements. Now we consider the effect of transit time. It is possible to choose T or to be sufficiently large to bound the fraction of time spent in transit d by ɛ, i.e. < ɛ. Thus een while taking into account time T wasted in transit, we can scale either time period of the epochs T or the elocity so as to proide a serice rate ector γ that is arbitrarily close to any ideal serice rate γ in the sense that γ i γ i < ɛ i. We now state one of our main results: Theorem 1: Λ is the achieable capacity region of the network. Proof: By construction, H represents the boundary of all feasible robot serice rates, and as we hae discussed time spent in transit can be accounted for by increasing T or so that any arrial rate that is in the interior of H can be sered. Since in lemma 1, we hae already shown that Λ H, any arrial rate in Λ can be stably sered. Furthermore, H represents the closure of the open set Λ. Thus any arrial rate ector that is a bounded distance outside of Λ cannot be sered stably (as it would also be outside of H). Together, these imply that Λ is the achieeable capacity region of the network. A. An Example Figure shows the capacity region when K =, N = 3. The labels such as (x, y) are gien to the basis allocations on the Pareto boundary to denote that they can be achieed by allocating an integer number of robots x to flow 1 and y to flow. Note in particular that the point (R max, R max ) is outside the region in this case because the only way to sere that rate is to allocate two robots full time to each of the two flows, and we hae only 3 robots. The ertices on the boundary 1 Here, for ease of exposition, we are assuming that α i is rational, otherwise it can be approximated by an arbitrarily close rational number which will not affect the oerall result. Fig.. Capacity region for a problem with 3 robots and flows of the region, which represent basis allocations, are all in the set Γ; the conex hull of Γ completely describes the region. B. Θ(1) Capacity Scaling with Controlled Mobility In [1], Grossglauser and Tse first showed that in a network with uncontrolled mobility, under certain mixing conditions, a total capacity of Θ(1) could be achieed by using one intermediate relay node. Our modeling in this paper shows that the total capacity region scales linearly with the number of robotic relays. Therefore, when the number of robots is linear in the number of flows, the per-pair network capacity will be Θ(1) here as well. There are a few minor differences between the model in this paper and what is considered in [1], howeer these differences are not consequential, as they affect only constants in the asymptotic scaling: In [1] it is assumed that all nodes are mobile. In our setting, first note that if the source and sink nodes were controllably mobile, then they could each be simply paired up directly and moed arbitrarily close to each other, and we would achiee Θ(1) scaling without een needing the controllable relays. Een if the source and sink were randomly moing, if they do so within a bounded region in such a way that the controllable robots could always locate and moe to them within a finite time, our results would be remain unaffected. In [1] it is assumed that each source/sink node is a source for one flow and a sink for another. Making the same assumption in our model for the static nodes would merely double the number of flows, and would result only in a constant factor difference. For ease of exposition and analysis, in our work we hae assumed that robots do not interfere with each other at any time. Howeer, for deriing the capacity region, it suffices to assume that the robots do not interfere with each other wheneer they are arbitrarily close to the source/sink they are communicating with. This is consonant with the modeling and result in [1] that when nodes are sufficiently close to each other they may communicate without experiencing interference from any number of other distant transmitters.

4 Finally, in [1], the Θ(1) capacity is obtained at the cost of aerage delay increasing with the size of the network. In stark contrast, in our formulation, as we discuss below, it is still possible to obtain a constant fraction of the full capacity (hence still maintaining the Θ(1) capacity scaling) een while keeping the delay bounded. C. Capacity Region under finite elocity and epoch duration The analysis thus far assumes that either the elocity of the robot or the epoch duration can be chosen to be arbitrarily large. Next, motiated by practical considerations we consider the case when and T are finite. In particular, the restriction of T to be finite is useful for two reasons: a) it fixes the oerhead of scheduling and b) it can be used to enforce a deterministic upper bound on delay (the time between generation and deliery of a gien packet). As may be expected, these constraints reduce the capacity region. The fraction of time spent in transit, is bounded by d T, where d is the maximum distance between the static nodes. We d assume that < 1, which implies that a robot can always T reach its destination (source or sink) within an epoch. This directly yields the following inner-bound on the capacity region when and T are finite and fixed: Λ IB (, T) = λ λ i < R max (1 d T ), i, λ i < R max(1 d T ) N. (7) Remark 1: Any arrial rate in the inner-bound region can still be achieed while scheduling them this way. As the inner bound is only a constant factor away from the full capacity region, this shows that a capacity scaling of Θ(1) can be achieed with controllable mobility een while keeping aerage delay to be bounded. This is in contrast to what happens with opportunistic mobility [1] where a constant capacity scaling is obtained at the cost of unbounded delay. Note further that when the number of robots N = K, it is possible to schedule the robots for each flow in alternate cycles so that een the worst case delay is bounded deterministically by T. IV. COARSE-GRAINED BACKPRESSURE CONTROL From the preious discussion, we know that if the arrial rate of each flow is known, and within the ideal capacity region of the system, the epoch duration and a serice schedule for the robots can be designed in such a way that the rate is sered in a stable manner (maintaining the aerage size of each queue to be bounded). We consider now the case when the arrial rates are within the capacity region but not known to the scheduling algorithm, and the and T parameters are kept fixed. Is it still possible to schedule the moement and communications of the robots in such a way that all queues remain stable? The answer to this question turns out to be yes, using the notion of Backpressure scheduling first proposed by Tassiulas and Ephremides []. We propose an algorithm for scheduling message ferrying robots that achiees throughput-optimal performance for finite and T parameters, which we refer to as coarse-grained backpressure-based message ferrying (CBMF). The CBMF algorithm works as follows. At the beginning of each epoch: compute the weights w src(i),j = (Q src(i) Q i j ) and w sink(i),j = (Q i j ). If the allocation A(i, j) = 1, denote w i,j = w src(i),j. If A(i, j) = 1, denote w i,j = w sink(i),j. Else, if A(i, j) =, w i,j =. Find the allocation A that maximizes i,j A(i, j) w i,j(a(i, j)) subject to the following three constraints: (1) i A(i, j) = 1, () j IA(i, j) = 1 1, j IA(i, j) = 1 1. (3) The first constraint ensures that each robot is allocated to exactly one source or sink. The second constraint (I represents the indicator function) ensures that no source is allocated more than one robot, while the third constraint ensures that no sink is allocated more than one robot. Theorem : For any arrial rate that is strictly within Λ IB (, T), the CBMF algorithm ensures that all source and robot queues are stable (always bounded by a finite alue). Proof: The proof essentially follows the treatment in [?]. Since the arrial rate is strictly interior in Λ IB (, T), we can make some simple assumptions. We ignore data transmitted when robots are moing. And at the beginning of each epoch, once the robots are allocated, they moe instantly to their destinations(sources or sinks) and remain static with a constant transmission rate as R max = R max (1 d T ). Let b ij (t) denote whether robot j is allocated to src(i) or not. b ij (t) = 1 means robot j is allocated to src(i); b ij (t) = means robot j is not allocated to src(i). Similarly, c ij (t) denotes whether robot j is allocated to sink(i) or not. c ij (t) = 1 means robot j is allocated to sink(i), and c ij (t) = means robot j is not allocated to sink(i). Then we hae R src(i),j (t) = b ij (t)r max and R j,sink(i) (t) = c ij (t)r max. The queue backlog at source i, i 1,..., K, is updated as follows Q src(i) (t1)=max Q src(i) (t) (b i1(t)... b in (t))r max, λ i. (8) The queue backlog at robot j for flow i, i 1,..., K and j 1,..., N, is gien by Q i j (t 1)=max Q i j (t) cij(t)r max, min Q src(i) (t), b ij(t)r max. (9) Define the queue backlog ector of this system as Θ(t)=(Q src(1) (t),..., Q src(k) (t), Q 1 1 (t),..., QK 1 (t),..., Q1 N (t),..., QK N (t)). (1) And the Lyapuno function as L(Θ(t)) = 1 N Q src(i) (t) Q i j(t). (11)

5 Then, L(Θ(t 1)) L(Θ(t)) = 1 K [ Qsrc(i) (t 1) Q src(i) (t) ] 1 N [ Q i j (t 1) Q i j(t) ] ( N b ij (t)r max) λ i N (c ij (t)r max) (b ij (t)r max) N Q src(i) (t) λ i b ij (t)r max) N Q i j(b ij (t) c ij (t))r max. (1) where the inequality comes from equations (8) and (9), and max Q b, a Q a b Q(a b). (13) max Q 1 c, min Q, b max Q 1 c, b. (14) Define the conditional Lyapuno drift as (Θ(t)) = E L(Θ(t 1)) L(Θ(t)) Θ(t). (15) Since i 1,..., K and j 1,..., N, b ij (t)r max R max, c ij (t)r max R max and the arrial rates are finite, the first two terms on the left-hand-side of inequality (15) can be upper bounded by a finite constant B. Thus, (Θ(t)) B Q src(i) (t)λ i N E (Q src(i) (t) Q i j(t))b ij(t)r maxq i j(t)c ij(t)r max Θ(t). Applying the CBMF algorithm to allocate robots, the last term on the right-hand-side can be maximized, thus the conditional drift can be minimized. Let b ij (t) and c ij (t) be any other robot allocation policy, then we hae (16) (Θ(t)) B Q src(i) (t)λ i N E (Q src(i) (t) Q i j(t))b ij(t)r maxq i j(t)c ij(t)r max Θ(t) ( N ) B Q src(i) (t) E b ij(t)r max Θ(t) λ i N Q i j(t)e ( c ij(t) b ij(t) ) R max Θ(t). In order to upper bound the terms on the right-hand-side, let us first consider the following problem: gien an arrial rate ector λ = (λ 1,..., λ K ) Λ IB (, T) a priori, we want to design an S-only (depends only on the channel states) algorithm to find ɛ > N s.t. λ i ɛ E b ij(t)r max i 1,..., K, E b ij(t)r max ɛ E c ij (t)r max, i 1,..., K and j 1,..., N. (18) The S-only algorithm to achiee any gien arrial rates which are strictly interior to the capacity region is designed as follows: Since λ = (λ 1,..., λ K ) H/ H, we can find a ector ɛ = (ɛ 1,..., ɛ K ) such that λ = (λ 1 ɛ 1,..., λ K ɛ K ) H. Let ɛ max = minɛ 1,..., ɛ K, and since λ is strictly interior in H, we hae ɛ max >. Since λ = (λ 1 ɛ max,..., λ K ɛ max ) H, it can be represented as a conex combination of basis allocations. To be specific, in a network containing K flows and N robots, there are M (depends on K and N, and is finite) basis allocations in total. Let [λ l1,..., λ lk ] T, l 1,..., M denote the capacity the l th allocation can proide. Let α = (α 1,..., α M ) be the allocation ector of the conex coefficients. And we hae α 1 [λ 11,..., λ 1K ] T... α M [λ M1,..., λ MK ] T =[λ 1 ɛ max,..., λ K ɛ max ] T. (19) Let us identify integers n l satisfying n l M n i = α l, l 1,..., M. Then the arrial rate ector λ can be sered by first allocating n l epochs for the l th basis allocation, and allocating the next n l epochs for the same l th basis allocation but exchanging the robots locations, l 1,..., M. And after a total of M n l epochs, repeat the whole process. l=1 Since the sered rate λ is ɛ max greater than the original gien rate λ, we can change the aboe scheduling scheme by (17)

6 adding a few more epochs to each n l epochs period, which l still supports the gien input rate. During these additional epochs, we can eenly allocate one robot at each sink to help delier data. In this way we can make sure there exists an ɛ > such that N λ i ɛ E b ij(t)r max, i 1,..., K, E b ij(t)r max ɛ E c ij(t)r max, i 1,..., K and j 1,..., N. () Take inequalities () into equation (17), we hae N (Θ(t)) B ɛ Q src(i) (t) Q i j(t). (1) Taking iterated expectations, summing the telescoping series, and rearranging terms yields: t 1 1 E Q src(i) (τ) N t τ= τ= E Q i j(τ) B ɛ EL(Θ()) ɛ. () t Therefore, 1 t 1 lim E Q src(i) (τ) N t t which indicates that the system is strongly stable. E Q i j(τ) B ɛ, (3) Remark : CBMF is proably stable for all arrial rates up to the inner-bound. Howeer, as and T increase, the innerbound approaches the ideal capacity region. V. DELAY ANALYSIS FOR SINGLE-FLOW TWO-ROBOTS Consider a system which contains one source S, one sink D, and two robots R 1, R. Initially, their queue backlogs are empty. The distance between source and sink is d. R 1 is at the same location as D, and R is at the same location as S. The moing speeds of robots is. The transmission rate function is R(x). Without loss of generality, we assume that after applying CFBP at the beginning of the first epoch, R 1 (called receiing robot) is allocated to S to receie data, and R (called deliering robot) is allocated to D to delier data. Thus, in the first epoch, R 1 moes towards the source and keep receiing data. Since R doesn t hae any data stored in its queue, it just moes to the destination without deliering data. At the end of this epoch, Q s =, Q R1 = λt and Q R =. In the second epoch, after applying CFBP, R 1 will be allocated to the destination to delier data, and R will be allocated to the source to receie data. Applying CFBP algorithm at the begging of each epoch, this whole process repeats eery two epochs in the flowing epochs. Since we focus on the stable state of the system in the long run, we can ignore the first epoch. What s more, the system eoles all the same in the following epochs except for changing the roles of R 1 and R (In one epoch, one is the receiing robot and the other is the deliering robot; In the next epoch, the other way around.). Thus, we can analyze one particular epoch instead. Let us focus on the second epoch. At the beginning of this epoch, queues at source S and robot R are both empty, and queue at R 1 is λt. According to the CFBP algorithm, in the second epoch, robot R 1 is the deliering robot moing towards the sink and delier data; and robot R is the receiing robot moing towards the source to receie data. Depending on different alues of arrial rate λ, the system eoles as one the following two cases. Case 1: when arrial rate λ is small enough so that the deliering robot R 1 can deplete all its packets before reaching the sink. Let s t 1 be the time when the queue at R 1 is empty. Then, λt t 1 R(d t)dt =, and t 1 d. Note the condition t 1 d also proides an upper bound ˆλ max for the input rate in this case. 1) When t 1 t 1, the deliering robot R 1 has data in its backlog and keeps transmitting data to D. Thus, its queue at time t 1 is Q R1 (t 1 ) = λt t 1 R(d t)dt. At the same time, new data arries at the source node S at rate λ, and the receiing robot R keeps receiing data from S. The total amount of data at S and R at t 1 is Q s (t 1 ) Q R (t 1 ) = λt 1. Thus, the total queue backlog in the system at t 1 is Q tot(t 1) = Q s(t 1)Q R1 (t 1)Q R (t 1) = λt t1 R(d t)dtλt 1. (4) ) When t 1 < t 1 T, the deliering robot R 1 has no data to transmit, thus Q R1 (t 1 ) =. The total amount of data at S and R at t 1 is still Q s (t 1 ) Q R (t 1 ) = λt 1. Thus, the total queue backlog in the system at t 1 is Q tot (t 1 ) = λt 1. (5) By definition, the time aerage total queue is Q tot = 1 T T Q(τ)dτ. Then, we hae Q tot = 1 t 1 τ T λt R(d t)dtλτ dτ λτdτ T t 1 = λt 1 λt 1 t 1 τ R(d t)dt dτ. (6) T is And by Little s Law, the time aerage delay of this system D = Q tot λ = t 1 T 1 t 1 τ R(d t)dt dτ. (7) λt Case : when arrial rate λ (ˆλ max < λ < λ max ) is large enough so that the deliering robot R 1 cannot finish depleting all its data during moing, i.e., it will keep downloading data at rate R max while it reaches the destination. Let t

7 be the time when the queue backlog at R 1 is empty. Then, λt R(d t)dt (t d )R max =. Note t T also proides the upper bound capacity λ max for the stable system. (where λ max = R ag = R(d t)dt(t d )Rmax T ) 1) When t 1 d, the deliering robot R 1 keeps moing towards D while transmitting data. Its queue backlog at t 1 is Q R1 (t 1 ) = λt t 1 R(d t)dt. The queue at source S and receiing robot R at time t 1 is Q s (t 1 ) Q R (t 1 ) = λt 1. Thus, the total queue backlog in the system at t 1 is Q tot (t 1 ) = Q s (t 1 ) Q R1 (t 1 ) Q R (t 1 ) = λt t1 R(d t)dt λt 1. (8) ) When d < t 1 t, deliering robot R 1 stays at the same location with sink D and keeps deliering data at the maximum rate R max. Then its queue at t 1 is R 1 (t 1 ) = λt R(d t)dt (t 1 d )R max. The queue at S and R is Q s (t 1 ) Q R (t 1 ) = λt 1. Thus, the total queue backlog at t 1 is Q tot (t 1 ) = λt R(d t)dt (t 1 d )R max λt 1. (9) 3) When t < t 1 T, the deliering robot R 1 has already deliered all its data, thus Q R1 (t 1 ) =. Besides, we still hae Q s (t 1 ) Q R (t 1 ) = λt 1. Thus, the total queue backlog is Thus, Q tot = 1 T and t d T t τ λt λt λτdτ = λt λt 1 T 1 T (t d ) Q tot (t 1 ) = λt 1. (3) R(d t)dt λτ dτ R(d t)dt (τ d )Rmax λτ dτ D = Q tot λ = t T 1 λt 1 λt (t d ) τ R(d t)dt dτ R(d t)dt Rmax T (t d ). τ R(d t)dt dτ (31) R(d t)dt R max λt (t d ). (3) VI. SIMULATIONS We first present numerical simulation results for two flows and four robots. We use η =, C = 1, d 1 = 5, d = 1, and T and λ i are aried as shown in the figures. In figure 3 we see the aerage end-to-end delay (time taken for a packet generated at the source to reach the sink; it is obtained by measuring the aerage total queue size for each flow in the simulations and diiding by the arrial rate, as per Little s Theorem [3]) ersus arrial rate for each flow, plotted whereer CBMF results in stable queues; we find that we are able to get conerging, bounded delays (indicatie of stability) een beyond the inner-bound capacity line. Also marked on the figure is the lower (inner) bound of capacity, for rates below which CBMF is proably stable. We see that as the elocity increases, so does the capacity, and at the same time the delay decreases. Thus improement in robot elocity benefits both throughput and delay performance of CBMF, as may be expected. Figure 4, in which the elocity is kept constant across cures but the epoch duration is aried, is somewhat similar but with one striking difference, howeer, as the epoch duration increases, so does the capacity; but at the same time, the aerage delay also increases (for the same arrial rates, so long stability is maintained). Thus, increasing the scheduling epoch duration improes throughput but hurts delay performance. Second, we present numerical simulation results for delay in one-flow two-robots system. We use d = 1, T, and λ are aried as shown in Figure 5. As it is shown in Figure 5, the simulation results match the theoretical results. We can reach the same conclusion as before: increasing the scheduling epoch duration improes throughput but hurts delay performance; howeer, increasing robot elocities benefits both throughput and delay performance. Besides, in the Figure 5, delay seems to be a linear function of the input rate λ. This can be shown theoretically if we ignore the integral part of equation (7) or equation (3). VII. CONCLUSIONS This paper has addressed two fundamental questions in robotic message ferrying for wireless networks: what is the throughput capacity region of such systems? How can they be scheduled to ensure stable operation, een without prior knowledge of arrial rates? There are a number of open directions suggested by the present work. The first is to improe the CBFM algorithm to support the entire capacity region without delay inefficiency, possibly by adapting the schedule length based on obsered delay or by considering finer-grained motion control. Finally, we are interested in deeloping decentralized scheduling mechanisms that the robots can implement in a distributed fashion. REFERENCES [1] M. Grossglauser and D. Tse, Mobility Increases the Capacity of Ad Hoc Wireless Networks, IEEE/ACM Trans. on Networking, ol 1, no 4, August. [] L. Tassiulas, A. Ephremides, Stability properties of constrained queueing systems and scheduling for maximum throughput in multihop radio networks, IEEE Transactions on Automatic Control, Vol. 37, No. 1, pp , December 199. [3] A. Leon-Garcia, Probability and Random Processes for Electrical Engineering, Addison-Wesley, 1993.

8 5 5 =sqrt() capacity inner bound=.3 =4*sqrt() campacity inner bound=.576 =1*sqrt() capacity inner bound=.688 =sqrt() capacity inner bound=.576 =4*sqrt() capacity inner bound=.665 =1*sqrt() capacity inner bound=.691 Delay of flow Delay of flow Input rate λ 1 Input rate λ Fig. 3. Delay of flows 1 (left) and (right) as we ary for T = Delay of flow 1 15 T=5 capacity inner bound=.3 T=5 capacity inner bound=4481 T=3 capacity inner bound=653 Delay of flow 15 T=5 capacity inner bound=576 T=5 capacity inner bound=6319 T=3 capacity inner bound= Input rate λ 1 Input rate λ Fig. 4. Delay of flows 1 (left) and (right) as we ary T for = T=1 in simulation 1 T=1 in theory capacity inner bound=.35 Delay 6 4 T= in simulation T= in theory capacity inner bound=.5 T=1 in simulation T=1 in theory capacity inner bound=.66 Delay 5 = in simulation = in theory capacity inner bound=.35 =5 in simulation =5 in theory capacity inner bound=.55 =1 in simulation =1 in theory capacity inner bound= Input rate λ Input rate λ Fig. 5. Delay of one-flow two-robots as we ary T for = (left) and we ary for T = 1 (right) [4] M. J. Neely, Stochastic Network Optimization with Application to Communication and Queueing Systems, Morgan and Claypool, 1.

Dynamic Power Allocation and Routing for Time Varying Wireless Networks

Dynamic Power Allocation and Routing for Time Varying Wireless Networks Dynamic Power Allocation and Routing for Time Varying Wireless Networks X 14 (t) X 12 (t) 1 3 4 k a P ak () t P a tot X 21 (t) 2 N X 2N (t) X N4 (t) µ ab () rate µ ab µ ab (p, S 3 ) µ ab µ ac () µ ab (p,

More information

Towards Green Distributed Storage Systems

Towards Green Distributed Storage Systems Towards Green Distributed Storage Systems Abdelrahman M. Ibrahim, Ahmed A. Zewail, and Aylin Yener Wireless Communications and Networking Laboratory (WCAN) Electrical Engineering Department The Pennsylania

More information

Dynamic Vehicle Routing with Moving Demands Part II: High speed demands or low arrival rates

Dynamic Vehicle Routing with Moving Demands Part II: High speed demands or low arrival rates Dynamic Vehicle Routing with Moing Demands Part II: High speed demands or low arrial rates Stephen L. Smith Shaunak D. Bopardikar Francesco Bullo João P. Hespanha Abstract In the companion paper we introduced

More information

Information Propagation Speed in Bidirectional Vehicular Delay Tolerant Networks

Information Propagation Speed in Bidirectional Vehicular Delay Tolerant Networks Information Propagation Speed in Bidirectional Vehicular Delay Tolerant Networks Emmanuel Baccelli, Philippe Jacquet, Bernard Mans, Georgios Rodolakis INRIA, France, {firstname.lastname}@inria.fr Macquarie

More information

Dynamic Vehicle Routing with Moving Demands Part II: High speed demands or low arrival rates

Dynamic Vehicle Routing with Moving Demands Part II: High speed demands or low arrival rates ACC 9, Submitted St. Louis, MO Dynamic Vehicle Routing with Moing Demands Part II: High speed demands or low arrial rates Stephen L. Smith Shaunak D. Bopardikar Francesco Bullo João P. Hespanha Abstract

More information

Throughput-Optimal Robotic Message Ferrying for Wireless Networks using Backpressure Control

Throughput-Optimal Robotic Message Ferrying for Wireless Networks using Backpressure Control Throughput-Optimal obotic Message Ferrying for Wireless Networks using Backpressure Control Andrea Gasparri Department of Engineering oma Tre University ome, Italy gasparri@dia.uniroma3.it Bhaskar Krishnamachari

More information

Dynamic Vehicle Routing with Heterogeneous Demands

Dynamic Vehicle Routing with Heterogeneous Demands Dynamic Vehicle Routing with Heterogeneous Demands Stephen L. Smith Marco Paone Francesco Bullo Emilio Frazzoli Abstract In this paper we study a ariation of the Dynamic Traeling Repairperson Problem DTRP

More information

Information in Aloha Networks

Information in Aloha Networks Achieving Proportional Fairness using Local Information in Aloha Networks Koushik Kar, Saswati Sarkar, Leandros Tassiulas Abstract We address the problem of attaining proportionally fair rates using Aloha

More information

Dynamic Vehicle Routing with Moving Demands Part I: Low speed demands and high arrival rates

Dynamic Vehicle Routing with Moving Demands Part I: Low speed demands and high arrival rates Dynamic Vehicle Routing with Moing Demands Part I: Low speed demands and high arrial rates Shaunak D. Bopardikar Stephen L. Smith Francesco Bullo João P. Hespanha Abstract We introduce a dynamic ehicle

More information

Energy Optimal Control for Time Varying Wireless Networks. Michael J. Neely University of Southern California

Energy Optimal Control for Time Varying Wireless Networks. Michael J. Neely University of Southern California Energy Optimal Control for Time Varying Wireless Networks Michael J. Neely University of Southern California http://www-rcf.usc.edu/~mjneely Part 1: A single wireless downlink (L links) L 2 1 S={Totally

More information

Dynamic Vehicle Routing with Moving Demands Part I: Low speed demands and high arrival rates

Dynamic Vehicle Routing with Moving Demands Part I: Low speed demands and high arrival rates ACC 2009, Submitted St. Louis, MO Dynamic Vehicle Routing with Moing Demands Part I: Low speed demands and high arrial rates Shaunak D. Bopardikar Stephen L. Smith Francesco Bullo João P. Hespanha Abstract

More information

Bounding the Effectiveness of Temporal Redundancy in Fault-tolerant Real-time Scheduling under Error Bursts

Bounding the Effectiveness of Temporal Redundancy in Fault-tolerant Real-time Scheduling under Error Bursts Bounding the Effectieness of Temporal Redundancy in Fault-tolerant Real-time Scheduling under Error Bursts Abhilash Thekkilakattil, Radu Dobrin, Sasikumar Punnekkat Mälardalen Real-Time Research Center,

More information

Online Companion to Pricing Services Subject to Congestion: Charge Per-Use Fees or Sell Subscriptions?

Online Companion to Pricing Services Subject to Congestion: Charge Per-Use Fees or Sell Subscriptions? Online Companion to Pricing Serices Subject to Congestion: Charge Per-Use Fees or Sell Subscriptions? Gérard P. Cachon Pnina Feldman Operations and Information Management, The Wharton School, Uniersity

More information

Fairness and Optimal Stochastic Control for Heterogeneous Networks

Fairness and Optimal Stochastic Control for Heterogeneous Networks λ 91 λ 93 Fairness and Optimal Stochastic Control for Heterogeneous Networks sensor network wired network wireless 9 8 7 6 5 λ 48 λ 42 4 3 0 1 2 λ n R n U n Michael J. Neely (USC) Eytan Modiano (MIT) Chih-Ping

More information

Purpose of the experiment

Purpose of the experiment Impulse and Momentum PES 116 Adanced Physics Lab I Purpose of the experiment Measure a cart s momentum change and compare to the impulse it receies. Compare aerage and peak forces in impulses. To put the

More information

EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing

EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing Michael J. Neely University of Southern California http://www-bcf.usc.edu/ mjneely 1 Abstract This collection of notes provides a

More information

Performance of Round Robin Policies for Dynamic Multichannel Access

Performance of Round Robin Policies for Dynamic Multichannel Access Performance of Round Robin Policies for Dynamic Multichannel Access Changmian Wang, Bhaskar Krishnamachari, Qing Zhao and Geir E. Øien Norwegian University of Science and Technology, Norway, {changmia,

More information

MOTION OF FALLING OBJECTS WITH RESISTANCE

MOTION OF FALLING OBJECTS WITH RESISTANCE DOING PHYSICS WIH MALAB MECHANICS MOION OF FALLING OBJECS WIH RESISANCE Ian Cooper School of Physics, Uniersity of Sydney ian.cooper@sydney.edu.au DOWNLOAD DIRECORY FOR MALAB SCRIPS mec_fr_mg_b.m Computation

More information

A Guidance Law for a Mobile Robot for Coverage Applications: A Limited Information Approach

A Guidance Law for a Mobile Robot for Coverage Applications: A Limited Information Approach Proceedings of the Third International Conference on Adances in Control and Optimization of Dynamical Systems, Indian Institute of Technology anpur, India, March 1-15, 014 Frcsh1.6 A Guidance Law for a

More information

Network Flow Problems Luis Goddyn, Math 408

Network Flow Problems Luis Goddyn, Math 408 Network Flow Problems Luis Goddyn, Math 48 Let D = (V, A) be a directed graph, and let s, t V (D). For S V we write δ + (S) = {u A : u S, S} and δ (S) = {u A : u S, S} for the in-arcs and out-arcs of S

More information

>

> The grade length should include 5% of the length of the ertical cures at the start and end of the grade. With two consecutie upgrades, 50% of the length of the ertical cure joining them should be included.

More information

0 a 3 a 2 a 3 0 a 1 a 2 a 1 0

0 a 3 a 2 a 3 0 a 1 a 2 a 1 0 Chapter Flow kinematics Vector and tensor formulae This introductory section presents a brief account of different definitions of ector and tensor analysis that will be used in the following chapters.

More information

State-space Modelling of Hysteresis-based Control Schemes

State-space Modelling of Hysteresis-based Control Schemes European Control Conference (ECC) July 7-9,, Zürich, Switzerland. State-space Modelling of Hysteresis-based Control Schemes Soumya Kundu Ian A. Hiskens Abstract The paper deelops a state-space model for

More information

Collective circular motion of multi-vehicle systems with sensory limitations

Collective circular motion of multi-vehicle systems with sensory limitations Collectie circular motion of multi-ehicle systems with sensory limitations Nicola Ceccarelli, Mauro Di Marco, Andrea Garulli, Antonello Giannitrapani Dipartimento di Ingegneria dell Informazione Uniersità

More information

UNDERSTAND MOTION IN ONE AND TWO DIMENSIONS

UNDERSTAND MOTION IN ONE AND TWO DIMENSIONS SUBAREA I. COMPETENCY 1.0 UNDERSTAND MOTION IN ONE AND TWO DIMENSIONS MECHANICS Skill 1.1 Calculating displacement, aerage elocity, instantaneous elocity, and acceleration in a gien frame of reference

More information

Towards Universal Cover Decoding

Towards Universal Cover Decoding International Symposium on Information Theory and its Applications, ISITA2008 Auckland, New Zealand, 7-10, December, 2008 Towards Uniersal Coer Decoding Nathan Axig, Deanna Dreher, Katherine Morrison,

More information

OPTIMIZATION OF FLOWS AND ANALYSIS OF EQUILIBRIA IN TELECOMMUNICATION NETWORKS

OPTIMIZATION OF FLOWS AND ANALYSIS OF EQUILIBRIA IN TELECOMMUNICATION NETWORKS OPTIMIZATION OF FLOWS AND ANALYSIS OF EQUILIBRIA IN TELECOMMUNICATION NETWORKS Ciro D Apice (a, Rosanna Manzo (b, Luigi Rarità (c (a, (b, (c Department of Information Engineering and Applied Mathematics,

More information

The Kinetic Theory of Gases

The Kinetic Theory of Gases 978-1-107-1788-3 Classical and Quantum Thermal Physics The Kinetic Theory of Gases CHAPTER 1 1.0 Kinetic Theory, Classical and Quantum Thermodynamics Two important components of the unierse are: the matter

More information

A possible mechanism to explain wave-particle duality L D HOWE No current affiliation PACS Numbers: r, w, k

A possible mechanism to explain wave-particle duality L D HOWE No current affiliation PACS Numbers: r, w, k A possible mechanism to explain wae-particle duality L D HOWE No current affiliation PACS Numbers: 0.50.-r, 03.65.-w, 05.60.-k Abstract The relationship between light speed energy and the kinetic energy

More information

Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks

Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks Changhee Joo, Xiaojun Lin, and Ness B. Shroff Abstract In this paper, we characterize the performance

More information

Dynamic Vehicle Routing for Translating Demands: Stability Analysis and Receding-Horizon Policies

Dynamic Vehicle Routing for Translating Demands: Stability Analysis and Receding-Horizon Policies 1 Dynamic Vehicle Routing for Translating Demands: Stability Analysis and Receding-Horizon Policies Shaunak D. Bopardikar Stephen L. Smith Francesco Bullo João P. Hespanha Abstract We introduce a problem

More information

On the Energy-Delay Trade-off of a Two-Way Relay Network

On the Energy-Delay Trade-off of a Two-Way Relay Network On the Energy-Delay Trade-off of a To-Way Relay Netork Xiang He Aylin Yener Wireless Communications and Netorking Laboratory Electrical Engineering Department The Pennsylvania State University University

More information

Position in the xy plane y position x position

Position in the xy plane y position x position Robust Control of an Underactuated Surface Vessel with Thruster Dynamics K. Y. Pettersen and O. Egeland Department of Engineering Cybernetics Norwegian Uniersity of Science and Technology N- Trondheim,

More information

Exploiting Source Redundancy to Improve the Rate of Polar Codes

Exploiting Source Redundancy to Improve the Rate of Polar Codes Exploiting Source Redundancy to Improe the Rate of Polar Codes Ying Wang ECE Department Texas A&M Uniersity yingang@tamu.edu Krishna R. Narayanan ECE Department Texas A&M Uniersity krn@tamu.edu Aiao (Andre)

More information

Optimal Joint Detection and Estimation in Linear Models

Optimal Joint Detection and Estimation in Linear Models Optimal Joint Detection and Estimation in Linear Models Jianshu Chen, Yue Zhao, Andrea Goldsmith, and H. Vincent Poor Abstract The problem of optimal joint detection and estimation in linear models with

More information

Node-based Distributed Optimal Control of Wireless Networks

Node-based Distributed Optimal Control of Wireless Networks Node-based Distributed Optimal Control of Wireless Networks CISS March 2006 Edmund M. Yeh Department of Electrical Engineering Yale University Joint work with Yufang Xi Main Results Unified framework for

More information

FREEWAY WEAVING. Highway Capacity Manual 2000 CHAPTER 24 CONTENTS EXHIBITS

FREEWAY WEAVING. Highway Capacity Manual 2000 CHAPTER 24 CONTENTS EXHIBITS CHAPTER 24 FREEWAY WEAVING CONTENTS I. INTRODUCTION... 24-1 Scope of the Methodology...24-1 Limitations of the Methodology...24-1 II. METHODOLOGY...24-1 LOS...24-2 Weaing Segment Parameters...24-3 Determining

More information

STABILITY OF MULTICLASS QUEUEING NETWORKS UNDER LONGEST-QUEUE AND LONGEST-DOMINATING-QUEUE SCHEDULING

STABILITY OF MULTICLASS QUEUEING NETWORKS UNDER LONGEST-QUEUE AND LONGEST-DOMINATING-QUEUE SCHEDULING Applied Probability Trust (7 May 2015) STABILITY OF MULTICLASS QUEUEING NETWORKS UNDER LONGEST-QUEUE AND LONGEST-DOMINATING-QUEUE SCHEDULING RAMTIN PEDARSANI and JEAN WALRAND, University of California,

More information

A State Action Frequency Approach to Throughput Maximization over Uncertain Wireless Channels

A State Action Frequency Approach to Throughput Maximization over Uncertain Wireless Channels A State Action Frequency Approach to Throughput Maximization over Uncertain Wireless Channels Krishna Jagannathan, Shie Mannor, Ishai Menache, Eytan Modiano Abstract We consider scheduling over a wireless

More information

VISUAL PHYSICS ONLINE RECTLINEAR MOTION: UNIFORM ACCELERATION

VISUAL PHYSICS ONLINE RECTLINEAR MOTION: UNIFORM ACCELERATION VISUAL PHYSICS ONLINE RECTLINEAR MOTION: UNIFORM ACCELERATION Predict Obsere Explain Exercise 1 Take an A4 sheet of paper and a heay object (cricket ball, basketball, brick, book, etc). Predict what will

More information

Message Delivery Probability of Two-Hop Relay with Erasure Coding in MANETs

Message Delivery Probability of Two-Hop Relay with Erasure Coding in MANETs 01 7th International ICST Conference on Communications and Networking in China (CHINACOM) Message Delivery Probability of Two-Hop Relay with Erasure Coding in MANETs Jiajia Liu Tohoku University Sendai,

More information

On queueing in coded networks queue size follows degrees of freedom

On queueing in coded networks queue size follows degrees of freedom On queueing in coded networks queue size follows degrees of freedom Jay Kumar Sundararajan, Devavrat Shah, Muriel Médard Laboratory for Information and Decision Systems, Massachusetts Institute of Technology,

More information

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS The 20 Military Communications Conference - Track - Waveforms and Signal Processing TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS Gam D. Nguyen, Jeffrey E. Wieselthier 2, Sastry Kompella,

More information

Theory of Network Communication

Theory of Network Communication Theory of Network Communication Dr. Christian Scheideler Johns Hopkins Uniersity, Sept. 9 2002 Introduction The goal of this lecture is to gie an introduction to the state of the art in the theory of network

More information

Distributed Power Control for Time Varying Wireless Networks: Optimality and Convergence

Distributed Power Control for Time Varying Wireless Networks: Optimality and Convergence Distributed Power Control for Time Varying Wireless Networks: Optimality and Convergence Tim Holliday, Nick Bambos, Peter Glynn, Andrea Goldsmith Stanford University Abstract This paper presents a new

More information

Collective circular motion of multi-vehicle systems with sensory limitations

Collective circular motion of multi-vehicle systems with sensory limitations Proceedings of the 44th IEEE Conference on Decision and Control, and the European Control Conference 2005 Seille, Spain, December 12-15, 2005 MoB032 Collectie circular motion of multi-ehicle systems with

More information

On the Linear Threshold Model for Diffusion of Innovations in Multiplex Social Networks

On the Linear Threshold Model for Diffusion of Innovations in Multiplex Social Networks On the Linear Threshold Model for Diffusion of Innoations in Multiplex Social Networks Yaofeng Desmond Zhong 1, Vaibha Sriastaa 2 and Naomi Ehrich Leonard 1 Abstract Diffusion of innoations in social networks

More information

Sample Average Approximation for Stochastic Empty Container Repositioning

Sample Average Approximation for Stochastic Empty Container Repositioning Sample Aerage Approimation for Stochastic Empty Container Repositioning E Peng CHEW a, Loo Hay LEE b, Yin LOG c Department of Industrial & Systems Engineering ational Uniersity of Singapore Singapore 9260

More information

SIMULATIONS OF CHARACTERISTICS OF TUNED LIQUID COLUMN DAMPER USING AN ELLIPTICAL FLOW PATH ESTIMATION METHOD

SIMULATIONS OF CHARACTERISTICS OF TUNED LIQUID COLUMN DAMPER USING AN ELLIPTICAL FLOW PATH ESTIMATION METHOD October -7, 008, Beijing, China SIMULATIONS OF CHARACTERISTICS OF TUNED LIQUID COLUMN DAMPER USING AN ELLIPTICAL FLOW PATH ESTIMATION METHOD P. Chaiiriyawong, S. Limkatanyu and T. Pinkaew 3 Lecturer, Dept.

More information

Computing and Communicating Functions over Sensor Networks

Computing and Communicating Functions over Sensor Networks Computing and Communicating Functions over Sensor Networks Solmaz Torabi Dept. of Electrical and Computer Engineering Drexel University solmaz.t@drexel.edu Advisor: Dr. John M. Walsh 1/35 1 Refrences [1]

More information

Section 6: PRISMATIC BEAMS. Beam Theory

Section 6: PRISMATIC BEAMS. Beam Theory Beam Theory There are two types of beam theory aailable to craft beam element formulations from. They are Bernoulli-Euler beam theory Timoshenko beam theory One learns the details of Bernoulli-Euler beam

More information

UNIVERSITY OF TRENTO ITERATIVE MULTI SCALING-ENHANCED INEXACT NEWTON- METHOD FOR MICROWAVE IMAGING. G. Oliveri, G. Bozza, A. Massa, and M.

UNIVERSITY OF TRENTO ITERATIVE MULTI SCALING-ENHANCED INEXACT NEWTON- METHOD FOR MICROWAVE IMAGING. G. Oliveri, G. Bozza, A. Massa, and M. UNIVERSITY OF TRENTO DIPARTIMENTO DI INGEGNERIA E SCIENZA DELL INFORMAZIONE 3823 Poo Trento (Italy), Via Sommarie 4 http://www.disi.unitn.it ITERATIVE MULTI SCALING-ENHANCED INEXACT NEWTON- METHOD FOR

More information

Channel Selection in Cognitive Radio Networks with Opportunistic RF Energy Harvesting

Channel Selection in Cognitive Radio Networks with Opportunistic RF Energy Harvesting 1 Channel Selection in Cognitive Radio Networks with Opportunistic RF Energy Harvesting Dusit Niyato 1, Ping Wang 1, and Dong In Kim 2 1 School of Computer Engineering, Nanyang Technological University

More information

Utility-Maximizing Scheduling for Stochastic Processing Networks

Utility-Maximizing Scheduling for Stochastic Processing Networks Utility-Maximizing Scheduling for Stochastic Processing Networks Libin Jiang and Jean Walrand EECS Department, University of California at Berkeley {ljiang,wlr}@eecs.berkeley.edu Abstract Stochastic Processing

More information

Information Theory Meets Game Theory on The Interference Channel

Information Theory Meets Game Theory on The Interference Channel Information Theory Meets Game Theory on The Interference Channel Randall A. Berry Dept. of EECS Northwestern University e-mail: rberry@eecs.northwestern.edu David N. C. Tse Wireless Foundations University

More information

Computing Laboratory A GAME-BASED ABSTRACTION-REFINEMENT FRAMEWORK FOR MARKOV DECISION PROCESSES

Computing Laboratory A GAME-BASED ABSTRACTION-REFINEMENT FRAMEWORK FOR MARKOV DECISION PROCESSES Computing Laboratory A GAME-BASED ABSTRACTION-REFINEMENT FRAMEWORK FOR MARKOV DECISION PROCESSES Mark Kattenbelt Marta Kwiatkowska Gethin Norman Daid Parker CL-RR-08-06 Oxford Uniersity Computing Laboratory

More information

P(c y) = W n (y c)p(c)

P(c y) = W n (y c)p(c) ENEE 739C: Adanced Topics in Signal Processing: Coding Theory Instructor: Alexander Barg Lecture 9 (draft; /7/3). Codes defined on graphs. The problem of attaining capacity. Iteratie decoding. http://www.enee.umd.edu/

More information

Quiz 1 EE 549 Wednesday, Feb. 27, 2008

Quiz 1 EE 549 Wednesday, Feb. 27, 2008 UNIVERSITY OF SOUTHERN CALIFORNIA, SPRING 2008 1 Quiz 1 EE 549 Wednesday, Feb. 27, 2008 INSTRUCTIONS This quiz lasts for 85 minutes. This quiz is closed book and closed notes. No Calculators or laptops

More information

Improved Bounds on the L(2, 1)-Number of Direct and Strong Products of Graphs

Improved Bounds on the L(2, 1)-Number of Direct and Strong Products of Graphs IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I: REGULAR AERS VOL. ***, NO. ***, *** 2007 Improed Bounds on the L(2, )-Number of Direct and Strong roducts of Graphs Zhendong Shao, Sandi Klažar, Daid Zhang,

More information

Admission Control and Profitability Analysis in Dynamic Spectrum Access Data Networks

Admission Control and Profitability Analysis in Dynamic Spectrum Access Data Networks Admission Control and Profitability Analysis in Dynamic Spectrum Access Data Networks ABSTRACT Sinem Kockan Department of Electrical and Computer Engineering Boston Uniersity Boston, MA 02215 kockan@bu.edu

More information

Algorithms and Data Structures 2014 Exercises and Solutions Week 14

Algorithms and Data Structures 2014 Exercises and Solutions Week 14 lgorithms and ata tructures 0 xercises and s Week Linear programming. onsider the following linear program. maximize x y 0 x + y 7 x x 0 y 0 x + 3y Plot the feasible region and identify the optimal solution.

More information

Transmission Schemes for Lifetime Maximization in Wireless Sensor Networks: Uncorrelated Source Observations

Transmission Schemes for Lifetime Maximization in Wireless Sensor Networks: Uncorrelated Source Observations Transmission Schemes for Lifetime Maximization in Wireless Sensor Networks: Uncorrelated Source Observations Xiaolu Zhang, Meixia Tao and Chun Sum Ng Department of Electrical and Computer Engineering National

More information

On the Throughput-Optimality of CSMA Policies in Multihop Wireless Networks

On the Throughput-Optimality of CSMA Policies in Multihop Wireless Networks Technical Report Computer Networks Research Lab Department of Computer Science University of Toronto CNRL-08-002 August 29th, 2008 On the Throughput-Optimality of CSMA Policies in Multihop Wireless Networks

More information

Decentralized Multi-Charger Coordination for Wireless Rechargeable Sensor Networks

Decentralized Multi-Charger Coordination for Wireless Rechargeable Sensor Networks Decentralized Multi-Charger Coordination for Wireless Rechargeable Sensor Networks Lei Mo, Pengcheng You, Xianghui Cao, Ye-Qiong Song, Jiming Chen To cite this ersion: Lei Mo, Pengcheng You, Xianghui Cao,

More information

Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting

Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting Swapna B.T., Atilla Eryilmaz, and Ness B. Shroff Departments of ECE and CSE The Ohio State University Columbus, OH 43210

More information

Communication Games on the Generalized Gaussian Relay Channel

Communication Games on the Generalized Gaussian Relay Channel Communication Games on the Generalized Gaussian Relay Channel Dileep M. alathil Department of Electrical Engineering University of Southern California manisser@usc.edu Rahul Jain EE & ISE Departments University

More information

Lecture 1. 1 Overview. 2 Maximum Flow. COMPSCI 532: Design and Analysis of Algorithms August 26, 2015

Lecture 1. 1 Overview. 2 Maximum Flow. COMPSCI 532: Design and Analysis of Algorithms August 26, 2015 COMPSCI 532: Design and Analysis of Algorithms August 26, 205 Lecture Lecturer: Debmalya Panigrahi Scribe: Allen Xiao Oeriew In this lecture, we will define the maximum flow problem and discuss two algorithms

More information

On resilience of distributed routing in networks under cascade dynamics

On resilience of distributed routing in networks under cascade dynamics On resilience of distributed routing in networks under cascade dynamics Ketan Sala Giacomo Como Munther A. Dahleh Emilio Frazzoli Abstract We consider network flow oer graphs between a single origin-destination

More information

Channel Allocation Using Pricing in Satellite Networks

Channel Allocation Using Pricing in Satellite Networks Channel Allocation Using Pricing in Satellite Networks Jun Sun and Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology {junsun, modiano}@mitedu Abstract

More information

Dynamics ( 동역학 ) Ch.2 Motion of Translating Bodies (2.1 & 2.2)

Dynamics ( 동역학 ) Ch.2 Motion of Translating Bodies (2.1 & 2.2) Dynamics ( 동역학 ) Ch. Motion of Translating Bodies (. &.) Motion of Translating Bodies This chapter is usually referred to as Kinematics of Particles. Particles: In dynamics, a particle is a body without

More information

AN EXTERNALITY BASED DECENTRALIZED OPTIMAL POWER ALLOCATION SCHEME FOR WIRELESS MESH NETWORKS

AN EXTERNALITY BASED DECENTRALIZED OPTIMAL POWER ALLOCATION SCHEME FOR WIRELESS MESH NETWORKS AN EXTERNALITY BASED DECENTRALIZED OPTIMAL POWER ALLOCATION SCHEME FOR WIRELESS MESH NETWORKS Shruti Sharma and Demos Teneketzis Department of Electrical Engineering and Computer Science University of

More information

Transmission lines using a distributed equivalent circuit

Transmission lines using a distributed equivalent circuit Cambridge Uniersity Press 978-1-107-02600-1 - Transmission Lines Equialent Circuits, Electromagnetic Theory, and Photons Part 1 Transmission lines using a distributed equialent circuit in this web serice

More information

Congestion Control In The Internet Part 1: Theory. JY Le Boudec 2018

Congestion Control In The Internet Part 1: Theory. JY Le Boudec 2018 Congestion Control In The Internet Part 1: Theory JY Le Boudec 2018 1 Contents 1. What is the problem; congestion collapse 2. Efficiency versus Fairness 3. Definitions of fairness 4. Additive Increase

More information

Introduction to Thermodynamic Cycles Part 1 1 st Law of Thermodynamics and Gas Power Cycles

Introduction to Thermodynamic Cycles Part 1 1 st Law of Thermodynamics and Gas Power Cycles Introduction to Thermodynamic Cycles Part 1 1 st Law of Thermodynamics and Gas Power Cycles by James Doane, PhD, PE Contents 1.0 Course Oeriew... 4.0 Basic Concepts of Thermodynamics... 4.1 Temperature

More information

Motion in Two and Three Dimensions

Motion in Two and Three Dimensions PH 1-1D Spring 013 Motion in Two and Three Dimensions Lectures 5,6,7 Chapter 4 (Halliday/Resnick/Walker, Fundamentals of Physics 9 th edition) 1 Chapter 4 Motion in Two and Three Dimensions In this chapter

More information

Stability of the Maximum Size Matching

Stability of the Maximum Size Matching Stability of the Maximum Size Matching Mohsen Bayati Dept. of Electrical Engineering Stanford University Stanford, CA 9405-950 bayati@stanford.edu Neda Beheshti Dept. of Electrical Engineering Stanford

More information

Low-Complexity and Distributed Energy Minimization in Multi-hop Wireless Networks

Low-Complexity and Distributed Energy Minimization in Multi-hop Wireless Networks IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. X, NO. XX, XXXXXXX X Low-Complexity and Distributed Energy Minimization in Multi-hop Wireless Networks Longbi Lin, Xiaojun Lin, Member, IEEE, and Ness B. Shroff,

More information

CJ57.P.003 REASONING AND SOLUTION According to the impulse-momentum theorem (see Equation 7.4), F t = mv

CJ57.P.003 REASONING AND SOLUTION According to the impulse-momentum theorem (see Equation 7.4), F t = mv Solution to HW#7 CJ57.CQ.003. RASONNG AND SOLUTON a. Yes. Momentum is a ector, and the two objects hae the same momentum. This means that the direction o each object s momentum is the same. Momentum is

More information

Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks

Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks Changhee Joo Departments of ECE and CSE The Ohio State University Email: cjoo@ece.osu.edu Xiaojun

More information

Displacement, Time, Velocity

Displacement, Time, Velocity Lecture. Chapter : Motion along a Straight Line Displacement, Time, Velocity 3/6/05 One-Dimensional Motion The area of physics that we focus on is called mechanics: the study of the relationships between

More information

A Starvation-free Algorithm For Achieving 100% Throughput in an Input- Queued Switch

A Starvation-free Algorithm For Achieving 100% Throughput in an Input- Queued Switch A Starvation-free Algorithm For Achieving 00% Throughput in an Input- Queued Switch Abstract Adisak ekkittikul ick ckeown Department of Electrical Engineering Stanford University Stanford CA 9405-400 Tel

More information

Residual migration in VTI media using anisotropy continuation

Residual migration in VTI media using anisotropy continuation Stanford Exploration Project, Report SERGEY, Noember 9, 2000, pages 671?? Residual migration in VTI media using anisotropy continuation Tariq Alkhalifah Sergey Fomel 1 ABSTRACT We introduce anisotropy

More information

Resource and Task Scheduling for SWIPT IoT Systems with Renewable Energy Sources

Resource and Task Scheduling for SWIPT IoT Systems with Renewable Energy Sources This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 1.119/JIOT.218.2873658,

More information

Queue Length Stability in Trees under Slowly Convergent Traffic using Sequential Maximal Scheduling

Queue Length Stability in Trees under Slowly Convergent Traffic using Sequential Maximal Scheduling 1 Queue Length Stability in Trees under Slowly Convergent Traffic using Sequential Maximal Scheduling Saswati Sarkar and Koushik Kar Abstract In this paper, we consider queue-length stability in wireless

More information

Alternative non-linear predictive control under constraints applied to a two-wheeled nonholonomic mobile robot

Alternative non-linear predictive control under constraints applied to a two-wheeled nonholonomic mobile robot Alternatie non-linear predictie control under constraints applied to a to-heeled nonholonomic mobile robot Gaspar Fontineli Dantas Júnior *, João Ricardo Taares Gadelha *, Carlor Eduardo Trabuco Dórea

More information

Algorithms Demands and Bounds. Demands and Bounds. Design and Analysis of Algorithms Andrei Bulatov

Algorithms Demands and Bounds. Demands and Bounds. Design and Analysis of Algorithms Andrei Bulatov Algorithms Demands and Bounds Demands and Bounds Design and Analysis of Algorithms Andrei Bulato Algorithms Demands and Bounds 1- Demands In our flow network model there is only 1 source and sink Can we

More information

Energy Cooperation and Traffic Management in Cellular Networks with Renewable Energy

Energy Cooperation and Traffic Management in Cellular Networks with Renewable Energy Energy Cooperation and Traffic Management in Cellular Networks with Renewable Energy Hyun-Suk Lee Dept. of Electrical and Electronic Eng., Yonsei University, Seoul, Korea Jang-Won Lee Dept. of Electrical

More information

THE FIFTH DIMENSION EQUATIONS

THE FIFTH DIMENSION EQUATIONS JP Journal of Mathematical Sciences Volume 7 Issues 1 & 013 Pages 41-46 013 Ishaan Publishing House This paper is aailable online at http://www.iphsci.com THE FIFTH DIMENSION EQUATIONS Niittytie 1B16 03100

More information

Broadcasting with a Battery Limited Energy Harvesting Rechargeable Transmitter

Broadcasting with a Battery Limited Energy Harvesting Rechargeable Transmitter roadcasting with a attery Limited Energy Harvesting Rechargeable Transmitter Omur Ozel, Jing Yang 2, and Sennur Ulukus Department of Electrical and Computer Engineering, University of Maryland, College

More information

Notes on Linear Minimum Mean Square Error Estimators

Notes on Linear Minimum Mean Square Error Estimators Notes on Linear Minimum Mean Square Error Estimators Ça gatay Candan January, 0 Abstract Some connections between linear minimum mean square error estimators, maximum output SNR filters and the least square

More information

On the stability of flow-aware CSMA

On the stability of flow-aware CSMA On the stability of flow-aware CSMA Thomas Bonald, Mathieu Feuillet To cite this version: Thomas Bonald, Mathieu Feuillet. On the stability of flow-aware CSMA. Performance Evaluation, Elsevier, 010, .

More information

arxiv: v1 [stat.ml] 15 Feb 2018

arxiv: v1 [stat.ml] 15 Feb 2018 1 : A New Algorithm for Streaming PCA arxi:1802.054471 [stat.ml] 15 Feb 2018 Puyudi Yang, Cho-Jui Hsieh, Jane-Ling Wang Uniersity of California, Dais pydyang, chohsieh, janelwang@ucdais.edu Abstract In

More information

different formulas, depending on whether or not the vector is in two dimensions or three dimensions.

different formulas, depending on whether or not the vector is in two dimensions or three dimensions. ectors The word ector comes from the Latin word ectus which means carried. It is best to think of a ector as the displacement from an initial point P to a terminal point Q. Such a ector is expressed as

More information

Why does Saturn have many tiny rings?

Why does Saturn have many tiny rings? 2004 Thierry De Mees hy does Saturn hae many tiny rings? or Cassini-Huygens Mission: New eidence for the Graitational Theory with Dual Vector Field T. De Mees - thierrydemees @ pandora.be Abstract This

More information

SUPPLEMENTARY MATERIAL. Authors: Alan A. Stocker (1) and Eero P. Simoncelli (2)

SUPPLEMENTARY MATERIAL. Authors: Alan A. Stocker (1) and Eero P. Simoncelli (2) SUPPLEMENTARY MATERIAL Authors: Alan A. Stocker () and Eero P. Simoncelli () Affiliations: () Dept. of Psychology, Uniersity of Pennsylania 34 Walnut Street 33C Philadelphia, PA 94-68 U.S.A. () Howard

More information

Cooperative Diamond Channel With Energy Harvesting Nodes Berk Gurakan, Student Member, IEEE, and Sennur Ulukus, Fellow, IEEE

Cooperative Diamond Channel With Energy Harvesting Nodes Berk Gurakan, Student Member, IEEE, and Sennur Ulukus, Fellow, IEEE 1604 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 34, NO. 5, MAY 016 Cooperative Diamond Channel With Energy Harvesting Nodes Berk Gurakan, Student Member, IEEE, and Sennur Ulukus, Fellow, IEEE

More information

Capacity and Delay Tradeoffs for Ad-Hoc Mobile Networks

Capacity and Delay Tradeoffs for Ad-Hoc Mobile Networks IEEE TRASACTIOS O IFORMATIO THEORY 1 Capacity and Delay Tradeoffs for Ad-Hoc Mobile etworks Michael J. eely University of Southern California mjneely@usc.edu http://www-rcf.usc.edu/ mjneely Eytan Modiano

More information

Astrometric Errors Correlated Strongly Across Multiple SIRTF Images

Astrometric Errors Correlated Strongly Across Multiple SIRTF Images Astrometric Errors Correlated Strongly Across Multiple SIRTF Images John Fowler 28 March 23 The possibility exists that after pointing transfer has been performed for each BCD (i.e. a calibrated image

More information

arxiv: v1 [physics.comp-ph] 17 Jan 2014

arxiv: v1 [physics.comp-ph] 17 Jan 2014 An efficient method for soling a correlated multi-item inentory system Chang-Yong Lee and Dongu Lee The Department of Industrial & Systems Engineering, Kongu National Uniersity, Kongu 34-70 South Korea

More information

Energy Harvesting Multiple Access Channel with Peak Temperature Constraints

Energy Harvesting Multiple Access Channel with Peak Temperature Constraints Energy Harvesting Multiple Access Channel with Peak Temperature Constraints Abdulrahman Baknina, Omur Ozel 2, and Sennur Ulukus Department of Electrical and Computer Engineering, University of Maryland,

More information