Multicast With Prioritized Delivery: How Fresh is Your Data?

Size: px
Start display at page:

Download "Multicast With Prioritized Delivery: How Fresh is Your Data?"

Transcription

1 Multicast With Prioritized Delivery: How Fresh is Your Data? Jing Zhong, Roy D Yates and Emina Solanin Department of ECE, Rutgers University, {ingzhong, ryates, eminasolanin}@rutgersedu arxiv:885738v [csit 7 Aug 8 Abstract We consider a multicast networ in which real-time status updates generated by a source are replicated and sent to multiple interested receiving nodes through independent lins The receiving nodes are divided into two groups: one priority group consists of nodes that require the reception of every update pacet, the other non-priority group consists of all other nodes without the delivery requirement Using age of information as a freshness metric, we analyze the time-averaged age at both priority and non-priority nodes For shifted-exponential lin delay distributions, the average age at a priority node is lower than that at a non-priority node due to the delivery guarantee However, this advantage for priority nodes disappears if the lin delay is exponential distributed Both groups of nodes have the same time-averaged age, which implies that the guaranteed delivery of updates has no effect the time-averaged freshness I INTRODUCTION The analysis of information freshness arises from a variety of real-time status updating systems, in which update messages generated by the sources are sent to interested receivers through a communication system For instance, the real-time information updates of autonomous cars are broadcast to nearby vehicles and infrastructures Similarly, live video captured for remote surgery is required to be available at the doctor with ultra low delay In these systems, the nowledge of the source state at the receiver is desired to be as fresh as possible This leads to the introduction and analysis of an Age of Information (AoI) freshness metric [ [8 Age of information, or simply age, measures the time difference between now and when the most recent update was generated At any time t, if the most recent update at the receiver is generated at time u(t), then the instantaneous age at the receiver is t u(t) In early wor on age analysis [, it was shown that the source should limit its update rate in order to avoid queueing delay caused by overloading the system with first-come firstserved (FCFS) policy Given the observation of unnecessary waiting in FCFS systems, subsequent research looed at lastcome first-served (LCFS) queueing systems that discard older updates as soon as a new update comes [3, [5, and lastgenerated first-server (LGFS) policy with preemption in service for multihop networs [6 When the source has no nowledge of the service system state, allowing pacet preemption at the queue provides lower average age in general However, these results are limited to the case where the update arrival process is given In [4, the authors consider a different scenario where the system state is available at the source such that a new update is generated only after the service of the previous update is completed A lazy updating scheme is proved to be age-optimal, indicating that the source should wait for a short period before sending a new update if the service time of the previous update is too small The analysis in [4 applies only to systems without preemption In this wor, we consider an update multicast system in which real-time update messages generated by the source are broadcast to a set of nodes through iid lins with random networ delays The receiving nodes are categorized into two groups The priority group consists of nodes that require the delivery of every update, while all other nodes without the delivery requirement are regarded as the non-priority group Once a node receives an entire update message, it acnowledges the source by sending instantaneous feedbac This model arises in a variety of delay-sensitive applications, eg vehicle networs where the update messages are popular and simultaneously request by large numbers of users Some receiving nodes require the history of all updates for the purpose of data aggregation and processing; thus the delivery of every update message is crucial Our wor is closely related to the LCFS and LGFS systems with preemption and state-dependent updating Since any new update generated by the source leads to the termination of the previous update, each lin is equivalent to a LCFS queue with preemption in service Thus, the instantaneous feedbac enables the source to submit new updates based on the state of the queue, either replacing staled updates with a fresh update or waiting for the service of the current update to be completed We assume each update pacet is divided into small chuns and encoded with a rateless code to overcome channel erasure in the multicast networ In this case, the number of chuns corresponding to an update is required to reach a certain minimum level for the update to be successfully decoded Moreover, the source is also able to instantaneously terminate an update in the middle of transmission Here we consider a simple updating scheme that exploits instantaneous feedbac Once the current update is delivered to all the nodes in the priority group, the source terminates the transmission of the current update and broadcasts a fresh update Our goal here is to evaluate the average age for both types of nodes II PROBLEM FORMULATION We consider a status updating system with a single source broadcasting time-stamped updates to multiple nodes through independent lins with random delays, as shown in Fig Each update message is time-stamped when it is generated at the source, and it taes time X i to be successfully delivered to

2 Source + Node Node Node Node + Fig : System diagram: source broadcasts status updates to n nodes through iid channels The nodes in the priority group are shaded The transmission of update + is initiated only after update is delivered to all nodes in the group node i The priority group consists of nodes,,, and the source guarantees the delivery of every update to all of these priority nodes In this wor, we assume there is an instantaneous feedbac channel from every node i bac to the source, and node i acnowledges the source instantly as soon as the update is delivered to the node i When all nodes in the priority group report receiving the update, this update is considered completed and the transmissions of this update to all other nodes are terminated The source immediately generates the next update + and repeats the multicast process When most recently received update at time t at node i is time-stamped at time u i (t), the status update age or simply the age, is the random process i (t) t u i (t) When an update reaches node i, u i (t) is advanced to the timestamp of the new update message The time average of age process at a node, which is also called the age of information, is defined as i lim τ τ τ i (t) () In this wor, we derive the average age at both the priority node and the non-priority nodes, and we will show that the average age depends on the order statistics of the random lin delay X i Definition The -th order statistic of random variables X,,X n, denoted X :n, is the -th smallest variable For shifted exponential X with CDF F X (x) e λ(x c), X :n has expectation and variance µ :n E[X :n c+ λ (H n H n ), (a) σ :n Var[X :n λ ( Hn H (n ) ), (b) where H n and H n are the generalized harmonic numbers defined as H n n and H n n III PRIORITY NODES We start by evaluating the average age at a single node in the priority group Fig depicts a sample path of the age over time at some node i in priority group with nodes Update begins transmission at time t and is timestamped T Here we remar that X i is the service time to deliver the P (t) Y A i T X i X i X i Y A i T T Fig : Sample path of the age P (t) for node i within the priority group with nodes Update delivery instances are mared by update to node i Since the X i are iid for all i and, the i (t) processes are statistically identical and each node i has the same average age i If one node gets an update earlier than any of the other nodes, it has to wait for an idle period until that update is delivered to all priority nodes The transmission time of an update to all nodes, which we call a service interval, is given by Y max(x,,x ) X : (3) We denote that update goes into service at time T and gets delivered to all nodes at time T T + Y Using similar techniques as in [9, we represent the area under the age sawtooth as the concatenation of the polygonsa i,,a i, thus the average age is P lim J J J A i J lim J J Y i It follows from Fig that E[A E[Y (4) A i Y X i +X i/+x i (Y X i )+(Y X i ) / Y X i +Y / (5) Since X i is independent of the transmission time Y of the previous update, E[A E[YE[X+E [ Y / (6) Denoting µ E[X, (), (4) and (6) yield the next theorem Theorem The average age at an individual node in the priority group is P µ+ µ : + σ : µ : Note that Theorem is valid for any distribution of X In terms of the Euler-Mascheroni constant γ 577, we also have the following result Corollary For shifted exponential (λ, c) service time X, the average age at an individual node in the priority group is lower bounded by P 3c + λ log +γ +, (7) λ t

3 E (t) Y Y + Y + T T T T + T + T +3 Fig 3: Sample path of the age E(t) in the non-priority group: successful update deliveries (at times mared by ) occur in intervals,,, and +3 Updates to the node are terminated in intervals + and + Proof appears in the Appendix Corollary indicates that the average age in the priority group P is independent of the number of nodes n in the system, and it behaves almost lie a logarithmic function as the number of nodes increases W l A l IV NON-PRIORITY NODES For a node in the non-priority group, the transmission of the current update is terminated right after the delivery of the update to all the nodes in the priority group That is, a nonpriority node i fails to receive the update if and only if the service time X i is larger than the service times of all the nodes in the priority group Let s further denote that the priority nodes have service times X,X,,X, and the non-priority node has service time X + For iid service time X, the probability that X + is the largest among all + nodes is simply q /( + ), since the ran of X + among + random variables is uniform from to + Here we also refer to q as the failure probability for a non-priority node If update is not delivered to a node i, the node waits for a service interval Y until the source generates the next update Suppose an update is delivered to node i during service interval and the next successful update delivery to node i is in service interval +M l In this case, M l is a geometric rv with probability mass function (PMF) P M (m) q m ( q), and first and second moments E[M q +, (8) E [ M +q ( +)( +) ( q) (9) We remar that M l and Y are independent An example of the age process is shown in Figure 3 The update is delivered in service interval with end time T, and the node + waits for M l 3 service intervals until the next successful delivery in interval + 3 We represent the shaded trapezoid area as A l and the length in time between two service t intervals with successful updates as W l +M l Y The time-averaged age for non-priority node is then E lim L L L l A l L lim L L l W E[A l E[W () Denote the random variable as the service time of a successful update sent to a non-priority node with CDF F (x) F X X <Y (x) Evaluating Fig 3, we have A l ( W l + ) W l + W l () Since and W are independent, the average age in () is E ( E[W E[ W [ ) +E E[W E[ W E[W +E [ () We first define Y S as the length of a service interval given that the update is successfully delivered to the non-priority node +, and Y F as the length of a service interval given that the update is failed to be delivered Thus, Y S and Y F have PDFs f YS (y) f Y Y X+ (y) and f YF (y) f Y Y<X+ (y), respectively Furthermore, E[Y qe[y F +( q)e[y S Lemma W has first and second moments E[W E[ME[Y, (3) E [ W (E[M )Var[Y F +Var[Y S + ( E [ M E[M+ ) (E[Y F ) +(E[Y S ) +(E[M )E[Y F E[Y S (4) Proof of the lemma appears in the Appendix Lemma leads to the following result for non-priority nodes Theorem The average age at an individual node in the nonpriority group is where we denote E µ i:+ +δ ()+δ (), δ () σ :+ +σ +:+ ( +)µ : + δ () µ :+ +µ +:+ +µ +:+µ :+ ( +)µ : Proof In (), indicates the service time of a non-priority node + given that X + < max(x,,x ) This condition implies X + cannot be the largest among all + nodes Thus, E[ E[X + X + < X +:+ µ i:+ (5) The claim follows by substituting (3), (4) and (5) bac into (), and replacing E[M and E [ M by (8) and (9)

4 4 3 4 non-priority priority Fig 5: Average age versus the exponential shift c with λ The priority group size (a) exponential X (b) shifted exponential X with c Fig 4: Average age versus the priority group size circle mars the priority group and cross mars the non-priority group The lower bound for priority group is shown as dashed line For exponential service times, Theorems and yield the next claim Theorem 3 For exponential service time X, the average age is the same for both priority and non-priority nodes and is given by E P λ + H λ + H λh, (6) where is the priority group size Theorem 3 implies that the average age is identical for both groups regardless of whether an update is delivered to a node or not V EVALUATION Figures 4a and 4b compare the simulation results of the average age for the priority group P and the non-priority group E as a function of the priority group size In Fig 4a, the lin delay to every node i is exponentially distributed with different λ The average age curves for both groups overlap with each other and increases monotonically, which matches Theorem 3 The lower bound on the average age for the priority group in Corollary captures the trend for varying, and becomes tighter for sufficiently large Fig 4b shows the similar result for shifted exponential delay with c For small group size, there is a significant difference between the average age for two groups As increases, the age for non-priority group E decreases slightly in the beginning and climbs up after a certain We also observe that the age difference between two groups vanishes for large enough Fig 5 depicts the average age as a function of the shift parameter c for shifted exponential delay X In Fig 5 with exponential rate λ, both groups have almost linear increasing average age for different the constant shift c The two curves start at the same point for c, and the difference in slopes leads to a larger gap between two curves as c increases VI CONCLUSION In this wor, we examine a status updating multicast networ where the receivers are prioritized in terms of pacet deliveries The average age at each receiver depends on the order statistics of the random lin service time If the service time is identically distributed as exponential for every lin, we show analytically and numerically that the average age at a priority node with pacet delivery guarantee is the same as that without the guarantee The difference between two types of nodes arises if the exponential service time is mixed with a non-zero constant time shift The analysis in this wor is limited to exponential class service time, but we believe the difference between two types of nodes is related to the hazard rate of the service distribution, which potentially determines when the source should preempt the service of the current update with a fresh update APPENDIX Proof Corollary Substituting (a) and (b) into Theorem gives P 3c + λ + H λ + H λ c+λh (7) Note that H is monotonically increasing for n Z + and lim H π /6 Thus, given λ and c, lim H λ c+λh (8) The harmonic number is given asymptotically by H log+ γ +O( ), which can be lower bounded by H log +γ, for Z > (9) Thus, (7) is given by substituting (8) and (9) into (7)

5 Proof Lemma We note the sequence Y,,Y +Ml and the number of summation terms M l are dependent Since M l is geometric, the event M l m indicates a sequence of m consecutive failures followed by a success Thus,Y is identical to Y F for {,, +M l } and the last variable in the sequence Y +Ml is identical to Y S This implies [ m M E[W P M (m)e Y i m ( ) P M (m) (m )E[Y F +E[Y S E[Y F (E[M )+E[Y S () Substituting (8) into () yields E[W + ( + E[Y F+ ) + E[Y S E[ME[Y () For the second moment, we write E [ W in total expectation as E [ [ W ( m ) M P M (m)e Y i m [ m ( [ m ) P M (m) Var Y i + E Y i Since the random variables Y i are independent, we let [ m ω P M (m)var Y i ( ) P M (m) (m )Var[Y F +Var[Y S () ( ) Var[Y F E[M +Var[Y S (3) Similarly, we have ( [ m ) ω P M (m) E Y i ( P M (m) (m )E[Y F +E[Y S ( E [ M E[M+ ) (E[Y F ) +(E[M )E[Y F E[Y S +(E[Y S ) (4) The claim follows by substituting (3) and (4) in () Proof Theorem 3 For priority nodes, we obtain the average age by substituting (a) and (b) to Theorem with c, which directly yields (6) For non-priority nodes, the first term in Theorem is δ () µ i:+ (5a) ) H + λ H + H + i λ λ H i (5b) (5c) H + + λ λ (H + ) (5d) λ + λ H + λ (5e) In (5d), we use the series identity of Harmonic numbers H i ( + )(H + ) Similarly, substituting (a) and (b) into δ () and δ () gives δ () (H (+) )+H (+) ( +)λh H λh λ( +), (6) H δ () + (H + ) H+ + ( +) λh ( +) λh + + (H + )H + λh (7) We note that δ () in (5e) and δ () in (7) only contain first order harmonic numbers, thus we combine two terms and rewrite H + H +/(+), which gives δ ()+δ () λ + H λ + λ( +) (8) H The claim is given by the sum of (6) and (8) ACKNOWLEDGMENT Part of this research is based upon wor supported by the National Science Foundation under grants CNS-4988 and and CCF-774 REFERENCES [ S Kaul, R D Yates, and M Gruteser, Real-time status: How often should one update? in Proc INFOCOM, Apr, pp [ C Kam, S Kompella, and A Ephremides, Age of information under random updates, in Proc IEEE Int Symp Inform Theory, Jul 3, pp 66 7 [3 M Costa, M Codreanu, and A Ephremides, Age of information with pacet management, in Proc IEEE Int Symp Inform Theory, 4, pp [4 Y Sun, E Uysal-Biyioglu, R Yates, C E Kosal, and N B Shroff, Update or wait: How to eep your data fresh, in Proc INFOCOM, 6 [5 E Nam and R Nasser, Age of information: The gamma awaening, in Proc IEEE Int Symp Inform Theory, 6, pp [Online Available: [6 A M Bedewy, Y Sun, and N B Shroff, Optimizing data freshness, throughput, and delay in multi-server information-update systems Proc IEEE Int Symp Inform Theory, 6 [7 I Kadota, E Uysal-Biyioglu, R Singh, and E Modiano, Minimizing the Age of Information in broadcast wireless networs Proc Allerton Conf on Commun, Control and Computing, pp , 6 [8 R D Yates, E Nam, E Solanin, and J Zhong, Timely updates over an erasure channel, in Proc IEEE Int Symp Inform Theory, 7 [9 J Zhong, E Solanin, and R D Yates, Status updates through multicast networs, in Proc Allerton Conf on Commun, Control and Computing, 7, pp

Distributed Scheduling Algorithms for Optimizing Information Freshness in Wireless Networks

Distributed Scheduling Algorithms for Optimizing Information Freshness in Wireless Networks Distributed Scheduling Algorithms for Optimizing Information Freshness in Wireless Networks Rajat Talak, Sertac Karaman, and Eytan Modiano arxiv:803.06469v [cs.it] 7 Mar 208 Abstract Age of Information

More information

Age-Optimal Updates of Multiple Information Flows

Age-Optimal Updates of Multiple Information Flows Age-Optimal Updates of Multiple Information Flows Yin Sun, Elif Uysal-Biyikoglu, and Sastry Kompella Dept. of ECE, Auburn University, Auburn, AL Dept. of EEE, Middle East Technical University, Ankara,

More information

Using Erasure Feedback for Online Timely Updating with an Energy Harvesting Sensor

Using Erasure Feedback for Online Timely Updating with an Energy Harvesting Sensor Using Erasure Feedback for Online Timely Updating with an Energy Harvesting Sensor Ahmed Arafa, Jing Yang, Sennur Ulukus 3, and H. Vincent Poor Electrical Engineering Department, Princeton University School

More information

Age-Optimal Constrained Cache Updating

Age-Optimal Constrained Cache Updating 17 IEEE International Symposium on Information Theory (ISIT) -Optimal Constrained Cache Updating Roy D. Yates, Philippe Ciblat, Aylin Yener, Michèle Wigger Rutgers University, USA, ryates@winlab.rutgers.edu

More information

Age-of-Information in the Presence of Error

Age-of-Information in the Presence of Error Age-of-Information in the Presence of Error Kun Chen IIIS, Tsinghua University chenkun4@mails.tsinghua.edu.cn Longbo Huang IIIS, Tsinghua University longbohuang@tsinghua.edu.cn arxiv:65.559v [cs.pf] 2

More information

The Age of Information in Multihop Networks

The Age of Information in Multihop Networks The Age of Information in Multihop Networks Ahmed M. Bedewy, Yin Sun, and Ness B. Shroff Dept. of ECE, Dept. of CSE, The Ohio State University, Columbus, OH. Dept. of ECE, Auburn University, Auburn, Alabama.

More information

Reducing Age-of-Information for Computation-Intensive Messages via Packet Replacement

Reducing Age-of-Information for Computation-Intensive Messages via Packet Replacement Reducing Age-of-Information for Computation-Intensive Messages via Packet Replacement arxiv:191.4654v1 [cs.it] 15 Jan 19 Jie Gong, Qiaobin Kuang, Xiang Chen and Xiao Ma School of Data and Computer Science,

More information

Age-Minimal Online Policies for Energy Harvesting Sensors with Incremental Battery Recharges

Age-Minimal Online Policies for Energy Harvesting Sensors with Incremental Battery Recharges Age-Minimal Online Policies for Energy Harvesting Sensors with Incremental Battery Recharges Ahmed Arafa, Jing Yang 2, Sennur Ulukus 3, and H. Vincent Poor Electrical Engineering Department, Princeton

More information

The Age of Information in Networks: Moments, Distributions, and Sampling

The Age of Information in Networks: Moments, Distributions, and Sampling The Age of Information in Networks: Moments, Distributions, and Sampling Roy D. Yates arxiv:806.03487v2 [cs.it 7 Jan 209 Abstract We examine a source providing status updates to monitors through a network

More information

THE Age of Information is a new metric that has been introduced

THE Age of Information is a new metric that has been introduced Age of Information With Prioritized Streams: When to Buffer Preempted Packets? Ali Maatouk *, Mohamad Assaad *, and Anthony Ephremides * TCL Chair on 5G, Laboratoire des Signaux et Systèmes, CentraleSupélec,

More information

Minimizing Age of Information with Soft Updates

Minimizing Age of Information with Soft Updates Minimizing Age of Information with Soft Updates Melih Bastopcu Sennur Ulukus arxiv:8.0848v [cs.it] 9 Dec 08 Department of Electrical and Computer Engineering University of Maryland, College Park, MD 074

More information

Age of Information Upon Decisions

Age of Information Upon Decisions Age of Information Upon Decisions Yunquan Dong, Zhengchuan Chen, Shanyun Liu, and Pingyi Fan School of Electronic & Information Engineering, Nanjing University of Information Science & Technology, Nanjing,

More information

The Age of Information: Real-Time Status Updating by Multiple Sources

The Age of Information: Real-Time Status Updating by Multiple Sources 1 The Age of Information: Real-Time Status Updating by Multiple Sources Roy D. Yates and Sanjit K. Kaul arxiv:1608.08622v2 [cs.it] 12 Dec 2017 Abstract We examine multiple independent sources providing

More information

Channel Probing in Communication Systems: Myopic Policies Are Not Always Optimal

Channel Probing in Communication Systems: Myopic Policies Are Not Always Optimal Channel Probing in Communication Systems: Myopic Policies Are Not Always Optimal Matthew Johnston, Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology Cambridge,

More information

Age of Information under Energy Replenishment Constraints

Age of Information under Energy Replenishment Constraints Age of Information under Energy Replenishment Constraints Baran Tan Bacinoglu, Elif Tugce Ceran, Elif Uysal-Biyioglu Middle East Technical University, Anara, Turey Imperial College, London,UK E-mail: barantan@metu.edu.tr,

More information

Real-Time Status Updating: Multiple Sources

Real-Time Status Updating: Multiple Sources Real-Time Status Updating: Multiple Sources Roy D. Yates WINLAB, ECE Dept. Rutgers University email: ryates@winlab.rutgers.edu Sanjit Kaul IIIT-Delhi email: skkaul@iiitd.ac.in Abstract We examine multiple

More information

Status Updates Through Queues

Status Updates Through Queues Status Updates hrough Queues Sanjit K. Kaul III-Delhi email: skkaul@iiitd.ac.in Roy D. Yates and Marco Gruteser WINLAB, ECE Dept., Rutgers University email: {ryates, gruteser}@winlab.rutgers.edu Abstract

More information

Can Determinacy Minimize Age of Information?

Can Determinacy Minimize Age of Information? Can Determinacy Minimize Age of Information? Rajat Talak, Sertac Karaman, and Eytan Modiano Preemptive and non-preemptive last come first serve LCFS) queue with Poisson arrival and Gamma distributed service

More information

Can Decentralized Status Update Achieve Universally Near-Optimal Age-of-Information in Wireless Multiaccess Channels?

Can Decentralized Status Update Achieve Universally Near-Optimal Age-of-Information in Wireless Multiaccess Channels? Can Decentralized Status Update Achieve Universally Near-Optimal Age-of-Information in Wireless Multiaccess Channels? Zhiyuan Jiang, Bhaskar Krishnamachari, Sheng Zhou, Zhisheng Niu, Fellow, IEEE {zhiyuan,

More information

Optimizing Age of Information in Wireless Networks with Throughput Constraints

Optimizing Age of Information in Wireless Networks with Throughput Constraints Optimizing Age of Information in Wireless Networks with Throughput Constraints Igor adota, Abhishek Sinha and Eytan Modiano Laboratory for Information & Decision Systems, MIT Abstract Age of Information

More information

Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting

Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting Swapna B.T., Atilla Eryilmaz, and Ness B. Shroff Departments of ECE and CSE The Ohio State University Columbus, OH 43210

More information

Relaying a Fountain code across multiple nodes

Relaying a Fountain code across multiple nodes Relaying a Fountain code across multiple nodes Ramarishna Gummadi, R.S.Sreenivas Coordinated Science Lab University of Illinois at Urbana-Champaign {gummadi2, rsree} @uiuc.edu Abstract Fountain codes are

More information

The Status Update Problem: Optimal Strategies for Pseudo-Deterministic Systems

The Status Update Problem: Optimal Strategies for Pseudo-Deterministic Systems The Status Update Problem: Optimal Strategies for Pseudo-Deterministic Systems Jared Tramontano under the direction of Dr. Shan-Yuan Ho Mr. Siddharth Venkatesh Department of Mathematics Massachusetts Institute

More information

Update or Wait: How to Keep Your Data Fresh

Update or Wait: How to Keep Your Data Fresh Update or Wait: How to Keep Your Data Fresh Yin Sun, Elif Uysal-Biyikoglu, Roy D. Yates, C. Emre Koksal, and Ness B. Shroff Dept. of ECE, Dept. of CSE, The Ohio State University, Columbus, OH Dept. of

More information

Update or Wait: How to Keep Your Data Fresh

Update or Wait: How to Keep Your Data Fresh Update or Wait: How to Keep Your Data Fresh Yin Sun, Elif Uysal-Biyikoglu, Roy Yates, C. Emre Koksal, and Ness B. Shroff Dept. of ECE, Dept. of CSE, The Ohio State University, Columbus, OH Dept. of EEE,

More information

Prioritized Random MAC Optimization via Graph-based Analysis

Prioritized Random MAC Optimization via Graph-based Analysis Prioritized Random MAC Optimization via Graph-based Analysis Laura Toni, Member, IEEE, Pascal Frossard, Senior Member, IEEE Abstract arxiv:1501.00587v1 [cs.it] 3 Jan 2015 Motivated by the analogy between

More information

Optimizing Information Freshness in Wireless Networks under General Interference Constraints

Optimizing Information Freshness in Wireless Networks under General Interference Constraints Optimizing Information Freshness in Wireless etworks under General Interference Constraints Rajat Talak, Sertac Karaman, Eytan Modiano arxiv:803.06467v [cs.it] 7 Mar 208 Abstract Age of information (AoI)

More information

On Scheduling for Minimizing End-to-End Buffer Usage over Multihop Wireless Networks

On Scheduling for Minimizing End-to-End Buffer Usage over Multihop Wireless Networks On Scheduling for Minimizing End-to-End Buffer Usage over Multihop Wireless Networs V.J. Venataramanan and Xiaojun Lin School of ECE Purdue University Email: {vvenat,linx}@purdue.edu Lei Ying Department

More information

Chapter 2: Random Variables

Chapter 2: Random Variables ECE54: Stochastic Signals and Systems Fall 28 Lecture 2 - September 3, 28 Dr. Salim El Rouayheb Scribe: Peiwen Tian, Lu Liu, Ghadir Ayache Chapter 2: Random Variables Example. Tossing a fair coin twice:

More information

requests/sec. The total channel load is requests/sec. Using slot as the time unit, the total channel load is 50 ( ) = 1

requests/sec. The total channel load is requests/sec. Using slot as the time unit, the total channel load is 50 ( ) = 1 Prof. X. Shen E&CE 70 : Examples #2 Problem Consider the following Aloha systems. (a) A group of N users share a 56 kbps pure Aloha channel. Each user generates at a Passion rate of one 000-bit packet

More information

An Improved Bound for Minimizing the Total Weighted Completion Time of Coflows in Datacenters

An Improved Bound for Minimizing the Total Weighted Completion Time of Coflows in Datacenters IEEE/ACM TRANSACTIONS ON NETWORKING An Improved Bound for Minimizing the Total Weighted Completion Time of Coflows in Datacenters Mehrnoosh Shafiee, Student Member, IEEE, and Javad Ghaderi, Member, IEEE

More information

Near-optimal policies for broadcasting files with unequal sizes

Near-optimal policies for broadcasting files with unequal sizes Near-optimal policies for broadcasting files with unequal sizes Majid Raissi-Dehkordi and John S. Baras Institute for Systems Research University of Maryland College Park, MD 20742 majid@isr.umd.edu, baras@isr.umd.edu

More information

Guess & Check Codes for Deletions, Insertions, and Synchronization

Guess & Check Codes for Deletions, Insertions, and Synchronization Guess & Chec Codes for Deletions, Insertions, and Synchronization Serge Kas Hanna, Salim El Rouayheb ECE Department, IIT, Chicago sashann@hawiitedu, salim@iitedu Abstract We consider the problem of constructing

More information

On the Capacity of Wireless 1-Hop Intersession Network Coding A Broadcast Packet Erasure Channel Approach

On the Capacity of Wireless 1-Hop Intersession Network Coding A Broadcast Packet Erasure Channel Approach 1 On the Capacity of Wireless 1-Hop Intersession Networ Coding A Broadcast Pacet Erasure Channel Approach Chih-Chun Wang, Member, IEEE Abstract Motivated by practical wireless networ protocols, this paper

More information

Giuseppe Bianchi, Ilenia Tinnirello

Giuseppe Bianchi, Ilenia Tinnirello Capacity of WLAN Networs Summary Ł Ł Ł Ł Arbitrary networ capacity [Gupta & Kumar The Capacity of Wireless Networs ] Ł! Ł "! Receiver Model Ł Ł # Ł $%&% Ł $% '( * &%* r (1+ r Ł + 1 / n 1 / n log n Area

More information

Minimizing response times and queue lengths in systems of parallel queues

Minimizing response times and queue lengths in systems of parallel queues Minimizing response times and queue lengths in systems of parallel queues Ger Koole Department of Mathematics and Computer Science, Vrije Universiteit, De Boelelaan 1081a, 1081 HV Amsterdam, The Netherlands

More information

Scheduling Multicast Traffic with Deadlines in Wireless Networks

Scheduling Multicast Traffic with Deadlines in Wireless Networks Scheduling Multicast Traffic with Deadlines in Wireless Networks yu Seob im, Chih-ping Li, and Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology Abstract

More information

Age of Information under Energy Replenishment Constraints

Age of Information under Energy Replenishment Constraints Age of Information under Energy Replenishment Constraints Baran Tan Bacinoglu t, Elif Tugce Ceran :j:, Elif Uysal-Biyioglu* * t Middle East Technical University, Anara, Turey :j: Imperial College, London,UK

More information

Discrete Random Variables

Discrete Random Variables CPSC 53 Systems Modeling and Simulation Discrete Random Variables Dr. Anirban Mahanti Department of Computer Science University of Calgary mahanti@cpsc.ucalgary.ca Random Variables A random variable is

More information

Capacity and Delay Tradeoffs for Ad-Hoc Mobile Networks

Capacity and Delay Tradeoffs for Ad-Hoc Mobile Networks IEEE TRASACTIOS O IFORMATIO THEORY 1 Capacity and Delay Tradeoffs for Ad-Hoc Mobile etworks Michael J. eely University of Southern California mjneely@usc.edu http://www-rcf.usc.edu/ mjneely Eytan Modiano

More information

Update or Wait: How to Keep Your Data Fresh

Update or Wait: How to Keep Your Data Fresh Update or Wait: How to Keep Your Data Fresh Yin Sun, Elif Uysal-Biyikoglu, Roy D. Yates, C. Emre Koksal, and Ness B. Shroff Dept. of ECE, Dept. of CSE, The Ohio State University, Columbus, OH Dept. of

More information

Coded Caching with Low Subpacketization Levels

Coded Caching with Low Subpacketization Levels Electrical and Computer Engineering Conference Papers, Posters and Presentations Electrical and Computer Engineering 06 Coded Caching with Low Subpacetization Levels Li Tang Iowa State University, litang@iastateedu

More information

Guess & Check Codes for Deletions, Insertions, and Synchronization

Guess & Check Codes for Deletions, Insertions, and Synchronization Guess & Check Codes for Deletions, Insertions, and Synchronization Serge Kas Hanna, Salim El Rouayheb ECE Department, Rutgers University sergekhanna@rutgersedu, salimelrouayheb@rutgersedu arxiv:759569v3

More information

Sampling for Data Freshness Optimization: Non-linear Age Functions

Sampling for Data Freshness Optimization: Non-linear Age Functions 1 Sampling for Data Freshness Optimization: Non-linear Age Functions Yin Sun and Benjamin Cyr Dept. of ECE, Auburn University, Auburn, AL Dept. of EECS, University of Michigan, Ann Arbor, MI arxiv:1812.7241v1

More information

A Simple Model for the Window Size Evolution of TCP Coupled with MAC and PHY Layers

A Simple Model for the Window Size Evolution of TCP Coupled with MAC and PHY Layers A Simple Model for the Window Size Evolution of TCP Coupled with and PHY Layers George Papageorgiou, John S. Baras Institute for Systems Research, University of Maryland, College Par, MD 20742 Email: gpapag,

More information

Sampling of the Wiener Process for Remote Estimation over a Channel with Random Delay

Sampling of the Wiener Process for Remote Estimation over a Channel with Random Delay 1 Sampling of the Wiener Process for Remote Estimation over a Channel with Random Delay Yin Sun, Yury Polyanskiy, and Elif Uysal-Biyikoglu Dept. of ECE, Auburn University, Auburn, AL Dept. of EECS, Massachusetts

More information

Upper Bounds on the Capacity of Binary Intermittent Communication

Upper Bounds on the Capacity of Binary Intermittent Communication Upper Bounds on the Capacity of Binary Intermittent Communication Mostafa Khoshnevisan and J. Nicholas Laneman Department of Electrical Engineering University of Notre Dame Notre Dame, Indiana 46556 Email:{mhoshne,

More information

Appendix A Prototypes Models

Appendix A Prototypes Models Appendix A Prototypes Models This appendix describes the model of the prototypes used in Chap. 3. These mathematical models can also be found in the Student Handout by Quanser. A.1 The QUANSER SRV-02 Setup

More information

Giuseppe Bianchi, Ilenia Tinnirello

Giuseppe Bianchi, Ilenia Tinnirello Capacity of WLAN Networs Summary Per-node throughput in case of: Full connected networs each node sees all the others Generic networ topology not all nodes are visible Performance Analysis of single-hop

More information

On ARQ for Packet Erasure Channels with Bernoulli Arrivals

On ARQ for Packet Erasure Channels with Bernoulli Arrivals On ARQ for Packet Erasure Channels with Bernoulli Arrivals Dinkar Vasudevan, Vijay G. Subramanian and Douglas J. Leith Hamilton Institute, National University of Ireland, Maynooth Abstract We study packet

More information

AGE of Information (AoI) has been receiving increasing

AGE of Information (AoI) has been receiving increasing SUBITTD TO I/AC TRANSACTIONS ON NTWORING Scheduling Policies for inimizing Age of Information in Broadcast Wireless Networks Igor adota, Abhishek Sinha, lif Uysal-Biyikoglu, Rahul Singh and ytan odiano

More information

Algebraic Gossip: A Network Coding Approach to Optimal Multiple Rumor Mongering

Algebraic Gossip: A Network Coding Approach to Optimal Multiple Rumor Mongering Algebraic Gossip: A Networ Coding Approach to Optimal Multiple Rumor Mongering Supratim Deb, Muriel Médard, and Clifford Choute Laboratory for Information & Decison Systems, Massachusetts Institute of

More information

A Piggybacking Design Framework for Read-and Download-efficient Distributed Storage Codes

A Piggybacking Design Framework for Read-and Download-efficient Distributed Storage Codes A Piggybacing Design Framewor for Read-and Download-efficient Distributed Storage Codes K V Rashmi, Nihar B Shah, Kannan Ramchandran, Fellow, IEEE Department of Electrical Engineering and Computer Sciences

More information

Queue length analysis for multicast: Limits of performance and achievable queue length with random linear coding

Queue length analysis for multicast: Limits of performance and achievable queue length with random linear coding Queue length analysis for multicast: Limits of performance and achievable queue length with random linear coding The MIT Faculty has made this article openly available Please share how this access benefits

More information

Average Age of Information with Hybrid ARQ under a Resource Constraint

Average Age of Information with Hybrid ARQ under a Resource Constraint 1 Average Age of Information with Hybrid ARQ under a Resource Constraint arxiv:1710.04971v3 [cs.it] 5 Dec 2018 Elif Tuğçe Ceran, Deniz Gündüz, and András György Department of Electrical and Electronic

More information

STATE AND OUTPUT FEEDBACK CONTROL IN MODEL-BASED NETWORKED CONTROL SYSTEMS

STATE AND OUTPUT FEEDBACK CONTROL IN MODEL-BASED NETWORKED CONTROL SYSTEMS SAE AND OUPU FEEDBACK CONROL IN MODEL-BASED NEWORKED CONROL SYSEMS Luis A Montestruque, Panos J Antsalis Abstract In this paper the control of a continuous linear plant where the sensor is connected to

More information

On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels

On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels Jie Luo, Anthony Ephremides ECE Dept. Univ. of Maryland College Park, MD 20742

More information

Fairness and Optimal Stochastic Control for Heterogeneous Networks

Fairness and Optimal Stochastic Control for Heterogeneous Networks λ 91 λ 93 Fairness and Optimal Stochastic Control for Heterogeneous Networks sensor network wired network wireless 9 8 7 6 5 λ 48 λ 42 4 3 0 1 2 λ n R n U n Michael J. Neely (USC) Eytan Modiano (MIT) Chih-Ping

More information

Max-Min Relay Selection for Legacy Amplify-and-Forward Systems with Interference

Max-Min Relay Selection for Legacy Amplify-and-Forward Systems with Interference 1 Max-Min Relay Selection for Legacy Amplify-and-Forward Systems with Interference Ioannis Kriidis, Member, IEEE, John S. Thompson, Member, IEEE, Steve McLaughlin, Senior Member, IEEE, and Norbert Goertz,

More information

Approximately achieving the feedback interference channel capacity with point-to-point codes

Approximately achieving the feedback interference channel capacity with point-to-point codes Approximately achieving the feedback interference channel capacity with point-to-point codes Joyson Sebastian*, Can Karakus*, Suhas Diggavi* Abstract Superposition codes with rate-splitting have been used

More information

Exploring the Tradeoff between Waiting Time and Service Cost in Non-Asymptotic Operating Regimes

Exploring the Tradeoff between Waiting Time and Service Cost in Non-Asymptotic Operating Regimes Exploring the radeoff between Waiting ime and Service Cost in Non-Asymptotic Operating Regimes Bin Li, Ozgur Dalkilic and Atilla Eryilmaz Abstract Motivated by the problem of demand management in smart

More information

Performance Limits of Coded Caching under Heterogeneous Settings Xiaojun Lin Associate Professor, Purdue University

Performance Limits of Coded Caching under Heterogeneous Settings Xiaojun Lin Associate Professor, Purdue University Performance Limits of Coded Caching under Heterogeneous Settings Xiaojun Lin Associate Professor, Purdue University Joint work with Jinbei Zhang (SJTU), Chih-Chun Wang (Purdue) and Xinbing Wang (SJTU)

More information

Primary Rate-Splitting Achieves Capacity for the Gaussian Cognitive Interference Channel

Primary Rate-Splitting Achieves Capacity for the Gaussian Cognitive Interference Channel Primary Rate-Splitting Achieves Capacity for the Gaussian Cognitive Interference Channel Stefano Rini, Ernest Kurniawan and Andrea Goldsmith Technische Universität München, Munich, Germany, Stanford University,

More information

Cooperative Spectrum Sensing for Cognitive Radios under Bandwidth Constraints

Cooperative Spectrum Sensing for Cognitive Radios under Bandwidth Constraints Cooperative Spectrum Sensing for Cognitive Radios under Bandwidth Constraints Chunhua Sun, Wei Zhang, and haled Ben Letaief, Fellow, IEEE Department of Electronic and Computer Engineering The Hong ong

More information

Energy Harvesting Wireless Sensor Networks: Delay Analysis Considering Energy Costs of Sensing and Transmission

Energy Harvesting Wireless Sensor Networks: Delay Analysis Considering Energy Costs of Sensing and Transmission Energy Harvesting Wireless Sensor Networks: Delay Analysis Considering Energy Costs of Sensing and Transmission Wanchun Liu, Xiangyun Zhou, Salman Durrani, Hani Mehrpouyan, 1 arxiv:1509.06089v2 [cs.it]

More information

Reliability of Broadcast Communications Under Sparse Random Linear Network Coding

Reliability of Broadcast Communications Under Sparse Random Linear Network Coding 1 Reliability of Broadcast Communications Under Sparse Random Linear Network Coding Suzie Brown, Oliver Johnson and Andrea Tassi arxiv:1705.09473v3 [cs.it] 4 Jan 2018 Abstract Ultra-reliable Point-to-Multipoint

More information

Achieving Shannon Capacity Region as Secrecy Rate Region in a Multiple Access Wiretap Channel

Achieving Shannon Capacity Region as Secrecy Rate Region in a Multiple Access Wiretap Channel Achieving Shannon Capacity Region as Secrecy Rate Region in a Multiple Access Wiretap Channel Shahid Mehraj Shah and Vinod Sharma Department of Electrical Communication Engineering, Indian Institute of

More information

Achieving the Age-Energy Tradeoff with a Finite-Battery Energy Harvesting Source

Achieving the Age-Energy Tradeoff with a Finite-Battery Energy Harvesting Source Achieving the Age-Energy Tradeoff ith a Finite-Battery Energy Harvesting Source Baran Tan Bacinoglu, Yin Sun, Elif Uysal-Biyikoglu, and Volkan Mutlu METU, Ankara, Turkey, Auburn University, AL, USA E-mail:

More information

Maximum Sum Rate of Slotted Aloha with Capture

Maximum Sum Rate of Slotted Aloha with Capture Maximum Sum Rate of Slotted Aloha with Capture Yitong Li and Lin Dai, Senior Member, IEEE arxiv:50.03380v3 [cs.it] 7 Dec 205 Abstract The sum rate performance of random-access networks crucially depends

More information

Chapter 2 Queueing Theory and Simulation

Chapter 2 Queueing Theory and Simulation Chapter 2 Queueing Theory and Simulation Based on the slides of Dr. Dharma P. Agrawal, University of Cincinnati and Dr. Hiroyuki Ohsaki Graduate School of Information Science & Technology, Osaka University,

More information

Inter-Session Network Coding Schemes for 1-to-2 Downlink Access-Point Networks with Sequential Hard Deadline Constraints

Inter-Session Network Coding Schemes for 1-to-2 Downlink Access-Point Networks with Sequential Hard Deadline Constraints Inter-Session Network Coding Schemes for -to- Downlink Access-Point Networks with Sequential Hard Deadline Constraints Xiaohang Li, Chih-Chun Wang, and Xiaojun Lin Center for Wireless Systems and Applications,

More information

Asymptotically Optimal and Bandwith-efficient Decentralized Detection

Asymptotically Optimal and Bandwith-efficient Decentralized Detection Asymptotically Optimal and Bandwith-efficient Decentralized Detection Yasin Yılmaz and Xiaodong Wang Electrical Engineering Department, Columbia University New Yor, NY 10027 Email: yasin,wangx@ee.columbia.edu

More information

On the Secrecy Capacity of the Z-Interference Channel

On the Secrecy Capacity of the Z-Interference Channel On the Secrecy Capacity of the Z-Interference Channel Ronit Bustin Tel Aviv University Email: ronitbustin@post.tau.ac.il Mojtaba Vaezi Princeton University Email: mvaezi@princeton.edu Rafael F. Schaefer

More information

Raptor Codes: From a Math Idea to LTE embms. BIRS, October 2015

Raptor Codes: From a Math Idea to LTE embms. BIRS, October 2015 Raptor Codes: From a Math Idea to LTE embms BIRS, October 2015 The plan is to... 1 introduce LT codes and Raptor codes 2 provide insights into their design 3 address some common misconceptions 2 / 31 The

More information

Queueing Theory I Summary! Little s Law! Queueing System Notation! Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K "

Queueing Theory I Summary! Little s Law! Queueing System Notation! Stationary Analysis of Elementary Queueing Systems  M/M/1  M/M/m  M/M/1/K Queueing Theory I Summary Little s Law Queueing System Notation Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K " Little s Law a(t): the process that counts the number of arrivals

More information

Bounds on Achievable Rates for General Multi-terminal Networks with Practical Constraints

Bounds on Achievable Rates for General Multi-terminal Networks with Practical Constraints Bounds on Achievable Rates for General Multi-terminal Networs with Practical Constraints Mohammad Ali Khojastepour, Ashutosh Sabharwal, and Behnaam Aazhang Department of Electrical and Computer Engineering

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 7, JULY

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 7, JULY IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 7, JULY 2016 4635 Energy Harvesting Wireless Sensor Networks: Delay Analysis Considering Energy Costs of Sensing and Transmission Wanchun Liu,

More information

Streaming Big Data meets Backpressure in Distributed Network Computation

Streaming Big Data meets Backpressure in Distributed Network Computation A version of this paper has been accepted for publication in IEEE INFOCOM 2016. Streaming Big Data meets Bacpressure in Distributed Networ Computation Apostolos Destounis, Georgios S. Paschos, and Iordanis

More information

n! (k 1)!(n k)! = F (X) U(0, 1). (x, y) = n(n 1) ( F (y) F (x) ) n 2

n! (k 1)!(n k)! = F (X) U(0, 1). (x, y) = n(n 1) ( F (y) F (x) ) n 2 Order statistics Ex. 4. (*. Let independent variables X,..., X n have U(0, distribution. Show that for every x (0,, we have P ( X ( < x and P ( X (n > x as n. Ex. 4.2 (**. By using induction or otherwise,

More information

Cache-Enabled Opportunistic Cooperative MIMO for Video Streaming in Wireless Systems

Cache-Enabled Opportunistic Cooperative MIMO for Video Streaming in Wireless Systems Cache-Enabled Opportunistic Cooperative MIMO for Video Streaming in Wireless Systems An Liu, Member IEEE, and Vincent Lau, Fellow IEEE, Department of Electronic and Computer Engineering, Hong Kong University

More information

Mixed Noisy Network Coding

Mixed Noisy Network Coding Mixed Noisy Networ Coding Arash Behboodi Dept of elecommunication Systems, U Berlin 10587 Berlin, Germany Email: behboodi@tntu-berlinde Pablo Piantanida Dept of elecommunications, SUPELEC 9119 Gif-sur-Yvette,

More information

One billion+ terminals in voice network alone

One billion+ terminals in voice network alone Traffic Engineering Traffic Engineering One billion+ terminals in voice networ alone Plus data, video, fax, finance, etc. Imagine all users want service simultaneously its not even nearly possible (despite

More information

Queueing Theory and Simulation. Introduction

Queueing Theory and Simulation. Introduction Queueing Theory and Simulation Based on the slides of Dr. Dharma P. Agrawal, University of Cincinnati and Dr. Hiroyuki Ohsaki Graduate School of Information Science & Technology, Osaka University, Japan

More information

Relay Selection for Geographical Forwarding in Sleep-Wake Cycling Wireless Sensor Networks

Relay Selection for Geographical Forwarding in Sleep-Wake Cycling Wireless Sensor Networks 1 Relay Selection for Geographical Forwarding in Sleep-Wae Cycling Wireless Sensor Networs K. P. Naveen, Student Member, IEEE and Anurag Kumar, Fellow, IEEE Abstract Our wor is motivated by geographical

More information

arxiv: v1 [cs.lg] 21 Sep 2018

arxiv: v1 [cs.lg] 21 Sep 2018 SIC - MMAB: Synchronisation Involves Communication in Multiplayer Multi-Armed Bandits arxiv:809.085v [cs.lg] 2 Sep 208 Etienne Boursier and Vianney Perchet,2 CMLA, ENS Cachan, CNRS, Université Paris-Saclay,

More information

Sharing LRU Cache Resources among Content Providers: A Utility-Based Approach

Sharing LRU Cache Resources among Content Providers: A Utility-Based Approach Sharing LRU Cache Resources among Content Providers: A Utility-Based Approach Mostafa Dehghan 1, Weibo Chu 2, Philippe Nain 3, Don Towsley 1 1 University of Massachusetts, Amherst, USA 2 Northwestern Polytechnical

More information

Optimal power-delay trade-offs in fading channels: small delay asymptotics

Optimal power-delay trade-offs in fading channels: small delay asymptotics Optimal power-delay trade-offs in fading channels: small delay asymptotics Randall A. Berry Dept. of EECS, Northwestern University 45 Sheridan Rd., Evanston IL 6008 Email: rberry@ece.northwestern.edu Abstract

More information

16:330:543 Communication Networks I Midterm Exam November 7, 2005

16:330:543 Communication Networks I Midterm Exam November 7, 2005 l l l l l l l l 1 3 np n = ρ 1 ρ = λ µ λ. n= T = E[N] = 1 λ µ λ = 1 µ 1. 16:33:543 Communication Networks I Midterm Exam November 7, 5 You have 16 minutes to complete this four problem exam. If you know

More information

Repeated Inter-Session Network Coding Games: Efficiency and Min-Max Bargaining Solution

Repeated Inter-Session Network Coding Games: Efficiency and Min-Max Bargaining Solution Repeated Inter-Session Networ Coding Games: Efficiency and Min-Max Bargaining Solution Hamed Mohsenian-Rad, Member, IEEE, Jianwei Huang, Senior Member, IEEE, Vincent W.S. Wong, Senior Member, IEEE, and

More information

Scheduling Algorithms for Optimizing Age of Information in Wireless Networks with Throughput Constraints

Scheduling Algorithms for Optimizing Age of Information in Wireless Networks with Throughput Constraints SUBITTED TO IEEE/AC TRANSACTIONS ON NETWORING Scheduling Algorithms for Optimizing Age of Information in Wireless Networks with Throughput Constraints Igor adota, Abhishek Sinha and Eytan odiano Abstract

More information

Delay bounds (Simon S. Lam) 1

Delay bounds (Simon S. Lam) 1 1 Pacet Scheduling: End-to-End E d Delay Bounds Delay bounds (Simon S. Lam) 1 2 Reerences Delay Guarantee o Virtual Cloc server Georey G. Xie and Simon S. Lam, Delay Guarantee o Virtual Cloc Server, IEEE/ACM

More information

Problem Y is an exponential random variable with parameter λ = 0.2. Given the event A = {Y < 2},

Problem Y is an exponential random variable with parameter λ = 0.2. Given the event A = {Y < 2}, ECE32 Spring 25 HW Solutions April 6, 25 Solutions to HW Note: Most of these solutions were generated by R. D. Yates and D. J. Goodman, the authors of our textbook. I have added comments in italics where

More information

FEEDBACK does not increase the capacity of a discrete

FEEDBACK does not increase the capacity of a discrete 1 Sequential Differential Optimization of Incremental Redundancy Transmission Lengths: An Example with Tail-Biting Convolutional Codes Nathan Wong, Kasra Vailinia, Haobo Wang, Sudarsan V. S. Ranganathan,

More information

Rover-to-Orbiter Communication in Mars: Taking Advantage of the Varying Topology

Rover-to-Orbiter Communication in Mars: Taking Advantage of the Varying Topology Rover-to-Orbiter Communication in Mars: Taing Advantage of the Varying Topology Songze Li, Student Member, IEEE, David T.H. Kao, Member, IEEE, and A. Salman Avestimehr, Member, IEEE arxiv:50.0797v [cs.it

More information

Soft Covering with High Probability

Soft Covering with High Probability Soft Covering with High Probability Paul Cuff Princeton University arxiv:605.06396v [cs.it] 20 May 206 Abstract Wyner s soft-covering lemma is the central analysis step for achievability proofs of information

More information

An Indian Journal FULL PAPER. Trade Science Inc. A real-time causal order delivery approach in largescale ABSTRACT KEYWORDS

An Indian Journal FULL PAPER. Trade Science Inc. A real-time causal order delivery approach in largescale ABSTRACT KEYWORDS [Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 18 BioTechnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(18), 2014 [10717-10723] A real-time causal order delivery approach in largescale

More information

Information in Aloha Networks

Information in Aloha Networks Achieving Proportional Fairness using Local Information in Aloha Networks Koushik Kar, Saswati Sarkar, Leandros Tassiulas Abstract We address the problem of attaining proportionally fair rates using Aloha

More information

Wireless Peer-to-Peer Scheduling in Mobile Networks

Wireless Peer-to-Peer Scheduling in Mobile Networks PROC. 46TH ANNUAL CONF. ON INFORMATION SCIENCES AND SYSTEMS (CISS), MARCH 212 (INVITED PAPER) 1 Wireless Peer-to-Peer Scheduling in Mobile Networs Abstract This paper considers peer-to-peer scheduling

More information

Latency analysis for Distributed Storage

Latency analysis for Distributed Storage Latency analysis for Distributed Storage Parimal Parag Archana Bura Jean-François Chamberland Electrical Communication Engineering Indian Institute of Science Electrical and Computer Engineering Texas

More information

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS The 20 Military Communications Conference - Track - Waveforms and Signal Processing TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS Gam D. Nguyen, Jeffrey E. Wieselthier 2, Sastry Kompella,

More information