Scheduling on a Channel with Failures and Retransmissions
|
|
- Virgil Hodge
- 5 years ago
- Views:
Transcription
1 Scheduling on a Channel with Failures and Retransmissions Predrag R. Jelenković and Evangelia D. Skiani Department of Electrical Engineering Columbia University, NY 10027, USA {predrag,valia}@ee.columbia.edu October 6, 2013 *Supported by NSF grant P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18
2 Outline 1 Introduction Definitions & Notation 2 Main Results First Come First Served Processor Sharing 3 Simulation Example 1: FCFS Example 2: PS 4 Conclusions P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18
3 Introduction Failures & Retransmissions (Restarts) High variability frequent failures Possible solution: Restart the system Applications networking e.g. ARQ, HTTP computing Restarts cause power law delays & possibly zero throughput, even for superexponential files [ALSF 05-, JT 06-]: P[N > n] (a+1)n a (1) What is the best job scheduling policy? P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18
4 Introduction Failures & Retransmissions (Restarts) High variability frequent failures Possible solution: Restart the system Applications networking e.g. ARQ, HTTP computing Restarts cause power law delays & possibly zero throughput, even for superexponential files [ALSF 05-, JT 06-]: P[N > n] (a+1)n a (1) What is the best job scheduling policy? P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18
5 Introduction Failures & Retransmissions (Restarts) High variability frequent failures Possible solution: Restart the system Applications networking e.g. ARQ, HTTP computing Restarts cause power law delays & possibly zero throughput, even for superexponential files [ALSF 05-, JT 06-]: P[N > n] (a+1)n a (1) What is the best job scheduling policy? P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18
6 Introduction Failures & Retransmissions (Restarts) High variability frequent failures Possible solution: Restart the system Applications networking e.g. ARQ, HTTP computing Restarts cause power law delays & possibly zero throughput, even for superexponential files [ALSF 05-, JT 06-]: P[N > n] (a+1)n a (1) What is the best job scheduling policy? P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18
7 Introduction Motivation Scheduling & Retransmissions No known policies optimize the sojourn time tail across BOTH light and heavy-tailed job size distributions. Optimality Subexponential jobs: PS, shortest remaining processing time [ANA 99] Superexponential jobs: First come first served [RS 01] We study two scheduling policies: 1 First Come First Served (FCFS) 2 Processor Sharing (PS) Question: How do these policies work under retransmissions? P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18
8 Introduction Motivation Scheduling & Retransmissions No known policies optimize the sojourn time tail across BOTH light and heavy-tailed job size distributions. Optimality Subexponential jobs: PS, shortest remaining processing time [ANA 99] Superexponential jobs: First come first served [RS 01] We study two scheduling policies: 1 First Come First Served (FCFS) 2 Processor Sharing (PS) Question: How do these policies work under retransmissions? P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18
9 Introduction Motivation Scheduling & Retransmissions No known policies optimize the sojourn time tail across BOTH light and heavy-tailed job size distributions. Optimality Subexponential jobs: PS, shortest remaining processing time [ANA 99] Superexponential jobs: First come first served [RS 01] We study two scheduling policies: 1 First Come First Served (FCFS) 2 Processor Sharing (PS) Question: How do these policies work under retransmissions? P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18
10 Introduction Motivation Model of Channel Available periods {A n } n 1 :i.i.d. Unit Capacity A 1" U 1" A 2" U 2" Figure: A failure-prone system. Retransmission Model Generic job B (0, ) if B A n,success;else, retransmitatperioda n+1 B System with failures A n B restart no Figure: Jobs over a system with failures. P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18
11 Definitions & Notation Introduction Definitions & Notation Definition 1 (Service Time) The service time is the total time until a job is successfully served and is denoted as N 1 S = A i +B, i=1 where N is the number of attempts until the successful completion of the job. Denote the tail distributions of job sizes B and availability periods A as F (x) = P(B > x) and Ḡ(x) = P(A > x) P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18
12 Introduction Definitions & Notation ASimpleScenario There are m jobs of size B i, i = 1...m Each job requires S i time units No future arrivals Job Scheduling: B 3 # B 2 # B 1 # vs. B 1 # B 2 # B 3 # FCFS P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18 PS
13 Definitions & Notation Introduction Definitions & Notation Definition 2 (Total Completion Time) The total completion time is defined as the total time until all the jobs in the queue are successfully served and is denoted as m m = S i, where m is the total number of jobs in the system and S i s are the service times for each job. i=1 Note: Total completion time without retransmissions trivial! Always equal to m i=1 B i P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18
14 Main Results First Come First Served (FCFS) First Come First Served Theorem 1 If log F (x) alogḡ(x) for all x 0 and a > 0, ande[a 1+q ] < for some q > 0, then logp[ m > t] lim = a. t logt Proof [of Theorem 1]. Under the conditions of the Theorem, the result in [JT 06-] yields logp[s > t] lim = a as t, () t logt where S is the service time of one job if served alone. P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18
15 Main Results First Come First Served (FCFS) First Come First Served Theorem 1 If log F (x) alogḡ(x) for all x 0 and a > 0, ande[a 1+q ] < for some q > 0, then logp[ m > t] lim = a. t logt Proof [of Theorem 1]. Under the conditions of the Theorem, the result in [JT 06-] yields logp[s > t] lim = a as t, () t logt where S is the service time of one job if served alone. P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18
16 FCFS Main Results First Come First Served Proof [of Theorem 1]. The total completion time is lower bounded by a single job service time: P[ m > t] P[S 1 > t] () logp[ m > t] a. logt Let S i be the service time of a job i when we idle the server after job completion until next failure. Then, the upper bound is m P[ m > t] P S i > t mp S 1 > t m i=1 () logp[ m > t] a. logt P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18
17 FCFS Main Results First Come First Served Proof [of Theorem 1]. The total completion time is lower bounded by a single job service time: P[ m > t] P[S 1 > t] () logp[ m > t] a. logt Let S i be the service time of a job i when we idle the server after job completion until next failure. Then, the upper bound is m P[ m > t] P S i > t mp S 1 > t m i=1 () logp[ m > t] a. logt P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18
18 Main Results Processor Sharing Processor Sharing (PS) Theorem 2 If the hazard function log F (x) is regularly varying with index g 0, then, under the conditions of Theorem 1, i) if g 1, i.e. B is subexponential or exponential, then logp[ m > t] lim = a, t logt ii) if g > 1, i.e. B is superexponential, then logp[ m > t] lim t logt = a < a. mg 1 P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18
19 Main Results Processor Sharing Processor Sharing (PS) Theorem 2 If the hazard function log F (x) is regularly varying with index g 0, then, under the conditions of Theorem 1, i) if g 1, i.e. B is subexponential or exponential, then logp[ m > t] lim = a, t logt ii) if g > 1, i.e. B is superexponential, then logp[ m > t] lim t logt = a < a. mg 1 P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18
20 Idea of the proof (I) Main Results Processor Sharing The upper bound is m P[ m > t] P i=1 1 If B 1 is the smallest job, then P[N 1 > n] = EP B 1 > A m n S i > t (1+e) m i=1 P[ S i > t]. = E1 Ḡ(m B 1 ) n = E1 F 1 (m B 1 ) 1 n a 1 2 What is the relationship between F 1 (x) and Ḡ(x)? 3 Recalling (), log F 1 (x) = logp[m B 1 > x] = log F (xm) m m 1 g log F (x). logp[ S 1 > t] logt t a m g 1 () P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18
21 Idea of the proof (I) Main Results Processor Sharing The upper bound is m P[ m > t] P i=1 1 If B 1 is the smallest job, then P[N 1 > n] = EP B 1 > A m n S i > t (1+e) m i=1 P[ S i > t]. = E1 Ḡ(m B 1 ) n = E1 F 1 (m B 1 ) 1 n a 1 2 What is the relationship between F 1 (x) and Ḡ(x)? 3 Recalling (), log F 1 (x) = logp[m B 1 > x] = log F (xm) m m 1 g log F (x). logp[ S 1 > t] logt t a m g 1 () P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18
22 Idea of the proof (I) Main Results Processor Sharing The upper bound is m P[ m > t] P i=1 1 If B 1 is the smallest job, then P[N 1 > n] = EP B 1 > A m n S i > t (1+e) m i=1 P[ S i > t]. = E1 Ḡ(m B 1 ) n = E1 F 1 (m B 1 ) 1 n a 1 2 What is the relationship between F 1 (x) and Ḡ(x)? 3 Recalling (), log F 1 (x) = logp[m B 1 > x] = log F (xm) m m 1 g log F (x). logp[ S 1 > t] logt t a m g 1 () P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18
23 Idea of the proof (II) Main Results Processor Sharing 4 Similarly, for the 2 nd smallest job 1t a(m 1)1 g 5... and the last one 1t a If g > 1 (superexponential), then the lower bound is determined by the minimum power law index (am 1 g <...< a) logp[ m > t] logt a. (1) mg 1 Equivalently, if g 1 ((sub)exponential), then logp[ m > t] logt a. (2) P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18
24 Idea of the proof (II) Main Results Processor Sharing 4 Similarly, for the 2 nd smallest job 1t a(m 1)1 g 5... and the last one 1t a If g > 1 (superexponential), then the lower bound is determined by the minimum power law index (am 1 g <...< a) logp[ m > t] logt a. (1) mg 1 Equivalently, if g 1 ((sub)exponential), then logp[ m > t] logt a. (2) P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18
25 Simulations Simulation Example 1: FCFS Example 1. FCFS: All job types generate same power law asymptotics Service time S 1t 2 # jobs: m = 10 Figure: Logarithmic asymptotics for a = 2 under FCFS γ < 1 Exponential γ > 1 Asymptote P[T>t] t P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18
26 Simulations Simulation Example 2: PS Example 2. PS: The e ect of the number of (superexponential) jobs B superexponential (g > 1) # jobs: m = 2andm = 5, service time with a = 4 Figure: Logarithmic asymptotics for a = 4 under PS and FCFS discipline PS: m = 5 PS: m = 2 FCFS Asymptote 10 2 P[T>t] t P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18
27 Conclusions Queueing: PS could be always unstable Theorem 3 If jobs are superexponential (g > 1), then for any arrival rate l > 0 and any a > 0, thepsqueueisunstable. Queueing with retransmissions & scheduling is hard More to come in our forthcoming paper... P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18
28 Conclusions Queueing: PS could be always unstable Theorem 3 If jobs are superexponential (g > 1), then for any arrival rate l > 0 and any a > 0, thepsqueueisunstable. Queueing with retransmissions & scheduling is hard More to come in our forthcoming paper... P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18
29 Conclusions Conclusions FCFS: power law of same index for both super/subexponential PS: new phenomenon - dramatic di erence between super/subexponential jobs Queueing: for superexponential jobs, sharing induces instabilities zero throughput Sharing is not always good / P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18
30 Conclusions Conclusions FCFS: power law of same index for both super/subexponential PS: new phenomenon - dramatic di erence between super/subexponential jobs Queueing: for superexponential jobs, sharing induces instabilities zero throughput Sharing is not always good / P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18
31 Conclusions Conclusions FCFS: power law of same index for both super/subexponential PS: new phenomenon - dramatic di erence between super/subexponential jobs Queueing: for superexponential jobs, sharing induces instabilities zero throughput Sharing is not always good / P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18
32 Conclusions Conclusions FCFS: power law of same index for both super/subexponential PS: new phenomenon - dramatic di erence between super/subexponential jobs Queueing: for superexponential jobs, sharing induces instabilities zero throughput Sharing is not always good / P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18
33 Thank you Conclusions Questions? P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18
Contents. Basic Concepts. Histogram of CPU-burst Times. Diagram of Process State CHAPTER 5 CPU SCHEDULING. Alternating Sequence of CPU And I/O Bursts
Contents CHAPTER 5 CPU SCHEDULING Basic Concepts Scheduling Criteria Scheduling Algorithms Multiple-Processor Scheduling Real-Time Scheduling Basic Concepts Maximum CPU utilization obtained with multiprogramming
More informationSection 7.2 Logarithmic Functions
Math 150 c Lynch 1 of 6 Section 7.2 Logarithmic Functions Definition. Let a be any positive number not equal to 1. The logarithm of x to the base a is y if and only if a y = x. The number y is denoted
More informationGeneral Disposition Strategies of Series Configuration Queueing Systems
General Disposition Strategies of Series Configuration Queueing Systems Yu-Li Tsai*, Member IAENG, Daichi Yanagisawa, Katsuhiro Nishinari Abstract In this paper, we suggest general disposition strategies
More informationModeling load balancing in carrier aggregation mobile networks
Modeling load balancing in carrier aggregation mobile networks R-M. Indre Joint work with F. Bénézit, S. E. El Ayoubi, A. Simonian IDEFIX Plenary Meeting, May 23 rd 2014, Avignon What is carrier aggregation?
More informationLogarithmic Functions and Their Graphs
Logarithmic Functions and Their Graphs Accelerated Pre-Calculus Mr. Niedert Accelerated Pre-Calculus Logarithmic Functions and Their Graphs Mr. Niedert 1 / 24 Logarithmic Functions and Their Graphs 1 Logarithmic
More informationPattern Avoidance in Poset Permutations
Pattern Avoidance in Poset Permutations Sam Hopkins and Morgan Weiler Massachusetts Institute of Technology and University of California, Berkeley Permutation Patterns, Paris; July 5th, 2013 1 Definitions
More information3.5 Marginal Distributions
STAT 421 Lecture Notes 52 3.5 Marginal Distributions Definition 3.5.1 Suppose that X and Y have a joint distribution. The c.d.f. of X derived by integrating (or summing) over the support of Y is called
More informationStability Analysis for Network Coded Multicast Cell with Opportunistic Relay
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 00 proceedings Stability Analysis for Network Coded Multicast
More informationTSIN01 Information Networks Lecture 9
TSIN01 Information Networks Lecture 9 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 26 th, 2017 Danyo Danev TSIN01 Information
More informationChapter 6: CPU Scheduling
Chapter 6: CPU Scheduling Silberschatz, Galvin and Gagne 2013 Chapter 6: CPU Scheduling Basic Concepts Scheduling Criteria Scheduling Algorithms Sections from the textbook: 6.1, 6.2, and 6.3 6.2 Silberschatz,
More information18 Logarithmic Functions
18 Logarithmic Functions Concepts: Logarithms (Section 3.3) Logarithms as Functions Logarithms as Exponent Pickers Inverse Relationship between Logarithmic and Exponential Functions. The Common Logarithm
More informationEvent-Driven Scheduling. (closely following Jane Liu s Book)
Event-Driven Scheduling (closely following Jane Liu s Book) Real-Time Systems, 2009 Event-Driven Systems, 1 Principles Admission: Assign priorities to Jobs At events, jobs are scheduled according to their
More informationWireless communications: from simple stochastic geometry models to practice III Capacity
Wireless communications: from simple stochastic geometry models to practice III Capacity B. Błaszczyszyn Inria/ENS Workshop on Probabilistic Methods in Telecommunication WIAS Berlin, November 14 16, 2016
More informationHow user throughput depends on the traffic demand in large cellular networks
How user throughput depends on the traffic demand in large cellular networks B. Błaszczyszyn Inria/ENS based on a joint work with M. Jovanovic and M. K. Karray (Orange Labs, Paris) 1st Symposium on Spatial
More informationYou could identify a point on the graph of a function as (x,y) or (x, f(x)). You may have only one function value for each x number.
Function Before we review exponential and logarithmic functions, let's review the definition of a function and the graph of a function. A function is just a rule. The rule links one number to a second
More informationNear-Optimal Data Dissemination Policies for Multi-Channel, Single Radio Wireless Sensor Networks
Near-Optimal Data Dissemination Policies for Multi-Channel, Single Radio Wireless Sensor Networks David Starobinski Weiyao Xiao Xiangping Qin Ari Trachtenberg Department of Electrical and Computer Engineering
More informationOpportunistic Scheduling: Generalizations to. Include Multiple Constraints, Multiple Interfaces,
Opportunistic Scheduling: Generalizations to Include Multiple Constraints, Multiple Interfaces, and Short Term Fairness Sunil Suresh Kulkarni, Catherine Rosenberg School of Electrical and Computer Engineering
More informationIEEE/ACM TRANSACTIONS ON NETWORKING, VOL. XX, NO. X, AUGUST 20XX 1
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. XX, NO. X, AUGUST 0XX 1 Greenput: a Power-saving Algorithm That Achieves Maximum Throughput in Wireless Networks Cheng-Shang Chang, Fellow, IEEE, Duan-Shin Lee,
More informationChapter 3 Exponential and Logarithmic Functions
Chapter 3 Exponential and Logarithmic Functions Section 1 Section 2 Section 3 Section 4 Section 5 Exponential Functions and Their Graphs Logarithmic Functions and Their Graphs Properties of Logarithms
More informationMath Lecture 2 Inverse Functions & Logarithms
Math 1060 Lecture 2 Inverse Functions & Logarithms Outline Summary of last lecture Inverse Functions Domain, codomain, and range One-to-one functions Inverse functions Inverse trig functions Logarithms
More informationarxiv: v2 [math.pr] 20 Dec 2013
n-digit BENFORD DISTRIBUTED RANDOM VARIABLES AZAR KHOSRAVANI AND CONSTANTIN RASINARIU arxiv:1304.8036v2 [math.pr] 20 Dec 2013 Abstract. The scope of this paper is twofold. First, to emphasize the use of
More informationOptimal Rate-Diversity-Delay Tradeoff in ARQ Block-Fading Channels
Optimal Rate-Diversity-Delay Tradeoff in ARQ Block-Fading Channels Allen Chuang School of Electrical and Information Eng. University of Sydney Sydney NSW, Australia achuang@ee.usyd.edu.au Albert Guillén
More information3644 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 6, JUNE 2011
3644 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 6, JUNE 2011 Asynchronous CSMA Policies in Multihop Wireless Networks With Primary Interference Constraints Peter Marbach, Member, IEEE, Atilla
More informationTransport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks
Transport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks Yi Sun Department of Electrical Engineering The City College of City University of New York Acknowledgement: supported
More informationThe Chinese University of Hong Kong Department of Computer Science and Engineering. Ph.D. Term Paper. Program Execution Time, Reliability and Queueing
The Chinese University of Hong Kong epartment of Computer Science and Engineering Ph.. Term Paper Title: Program Execution Time, Reliability and Queueing Analysis in Mobile Environments Name: CHEN, Xinyu
More informationA Random Network Coding-based ARQ Scheme and Performance Analysis for Wireless Broadcast
ISSN 746-7659, England, U Journal of Information and Computing Science Vol. 4, No., 9, pp. 4-3 A Random Networ Coding-based ARQ Scheme and Performance Analysis for Wireless Broadcast in Yang,, +, Gang
More informationMaxima and Minima. Terminology note: Do not confuse the maximum f(a, b) (a number) with the point (a, b) where the maximum occurs.
10-11-2010 HW: 14.7: 1,5,7,13,29,33,39,51,55 Maxima and Minima In this very important chapter, we describe how to use the tools of calculus to locate the maxima and minima of a function of two variables.
More informationGeneralized Signal Alignment For MIMO Two-Way X Relay Channels
Generalized Signal Alignment For IO Two-Way X Relay Channels Kangqi Liu, eixia Tao, Zhengzheng Xiang and Xin Long Dept. of Electronic Engineering, Shanghai Jiao Tong University, Shanghai, China Emails:
More informationService Response Time of Elastic Data Traffic in Cognitive Radio Networks
1 Service Response Time of Elastic Data Traffic in Cognitive Radio Networks Subodha Gunawardena, Student Member, IEEE, and Weihua Zhuang, Fellow, IEEE Abstract Quality of service (QoS) support over cognitive
More informationBalance Queueing and Retransmission: Latency-Optimal Massive MIMO Design
Balance Queueing and Retransmission: Latency-Optimal Massive MIMO Design Xu Du, Yin Sun, Ness Shroff, Ashutosh Sabharwal arxiv:902.07676v [cs.it] 20 Feb 209 Abstract One fundamental challenge in 5G URLLC
More informationSolutions to the problems from Written assignment 2 Math 222 Winter 2015
Solutions to the problems from Written assignment 2 Math 222 Winter 2015 1. Determine if the following limits exist, and if a limit exists, find its value. x2 y (a) The limit of f(x, y) = x 4 as (x, y)
More informationOptimal Distributed Scheduling under Time-varying Conditions: A Fast-CSMA Algorithm with Applications
1 Optimal Distributed Scheduling under Time-varying Conditions: A Fast-CSMA Algorithm with Applications Bin Li and Atilla Eryilmaz Abstract Recently, low-complexity and distributed Carrier Sense Multiple
More informationCOMP Online Algorithms. Paging and k-server Problem. Shahin Kamali. Lecture 11 - Oct. 11, 2018 University of Manitoba
COMP 7720 - Online Algorithms Paging and k-server Problem Shahin Kamali Lecture 11 - Oct. 11, 2018 University of Manitoba COMP 7720 - Online Algorithms Paging and k-server Problem 1 / 19 Review & Plan
More informationThe Degrees of Freedom of Full-Duplex. Bi-directional Interference Networks with and without a MIMO Relay
The Degrees of Freedom of Full-Duplex 1 Bi-directional Interference Networks with and without a MIMO Relay Zhiyu Cheng, Natasha Devroye, Tang Liu University of Illinois at Chicago zcheng3, devroye, tliu44@uic.edu
More informationA Backlog-Based CSMA Mechanism to Achieve Fairness and Throughput-Optimality in Multihop Wireless Networks
A Backlog-Based CSMA Mechanism to Achieve Fairness and Throughput-Optimality in Multihop Wireless Networks Peter Marbach, and Atilla Eryilmaz Dept. of Computer Science, University of Toronto Email: marbach@cs.toronto.edu
More informationFast Sorting and Pattern-Avoiding Permutations
Fast Sorting and Pattern-Avoiding Permutations David Arthur Stanford University darthur@cs.stanford.edu Abstract We say a permutation π avoids a pattern σ if no length σ subsequence of π is ordered in
More informationLectures 8 & 9. M/G/1 Queues
Lectures 8 & 9 M/G/1 Queues MIT Slide 1 M/G/1 QUEUE Poisson M/G/1 General independent Service times Poisson arrivals at rate λ Service time has arbitrary distribution with given E[X] and E[X 2 ] Service
More informationON THE EQUATION a x x (mod b) Jam Germain
ON THE EQUATION a (mod b) Jam Germain Abstract. Recently Jimenez and Yebra [3] constructed, for any given a and b, solutions to the title equation. Moreover they showed how these can be lifted to higher
More informationAsymptotic behaviour of permutations avoiding generalized patterns
Asymptotic behaviour of permutations avoiding generalized patterns Ashok Rajaraman 311176 arajaram@sfu.ca February 19, 1 Abstract Visualizing permutations as labelled trees allows us to to specify restricted
More informationOn the Unicast Capacity of Stationary Multi-channel Multi-radio Wireless Networks: Separability and Multi-channel Routing
1 On the Unicast Capacity of Stationary Multi-channel Multi-radio Wireless Networks: Separability and Multi-channel Routing Liangping Ma arxiv:0809.4325v2 [cs.it] 26 Dec 2009 Abstract The first result
More informationPower Controlled Random Access
1 Power Controlled Random Access Aditya Dua Department of Electrical Engineering Stanford University Stanford, CA 94305 dua@stanford.edu Abstract The lack of an established infrastructure, and the vagaries
More informationEfficiency and detectability of random reactive jamming in wireless networks
Efficiency and detectability of random reactive jamming in wireless networks Ni An, Steven Weber Modeling & Analysis of Networks Laboratory Drexel University Department of Electrical and Computer Engineering
More informationCS445: Modeling Complex Systems
CS445: Modeling Complex Systems Travis Desell! Averill M. Law, Simulation Modeling & Analysis, Chapter 2!! Time-Shared Computer Model Time Shared Computer Model Terminals Computer Unfinished s 2 2... Active
More informationA virtually nonblocking self-routing permutation network which routes packets in O(log 2 N) time
Telecommunication Systems 10 (1998) 135 147 135 A virtually nonblocking self-routing permutation network which routes packets in O(log 2 N) time G.A. De Biase and A. Massini Dipartimento di Scienze dell
More informationREU 2006 Discrete Math Lecture 3
REU 006 Discrete Math Lecture 3 Instructor: László Babai Scribe: Elizabeth Beazley Editors: Eliana Zoque and Elizabeth Beazley NOT PROOFREAD - CONTAINS ERRORS June 6, 006. Last updated June 7, 006 at :4
More informationSNR Estimation in Nakagami-m Fading With Diversity Combining and Its Application to Turbo Decoding
IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 50, NO. 11, NOVEMBER 2002 1719 SNR Estimation in Nakagami-m Fading With Diversity Combining Its Application to Turbo Decoding A. Ramesh, A. Chockalingam, Laurence
More informationBandwidth Estimation Using End-to- End Packet-Train Probing: Stochastic Foundation
Bandwidth Estimation Using End-to- End Packet-Train Probing: Stochastic Foundation Xiliang Liu Joint work with Kaliappa Ravindran and Dmitri Loguinov Department of Computer Science City University of New
More informationHow Many Mates Can a Latin Square Have?
How Many Mates Can a Latin Square Have? Megan Bryant mrlebla@g.clemson.edu Roger Garcia garcroge@kean.edu James Figler figler@live.marshall.edu Yudhishthir Singh ysingh@crimson.ua.edu Marshall University
More informationRecursive relations (Part 2/2). p.1/16
Recursive relations (Part 2/2). p.1/16 Bounded Definition. Let R(x, i) be a relation on N. The relation R obtained from R by bounded existential quantification is defined as follows: ( R)(x, y) iff i y
More informationNon-overlapping permutation patterns
PU. M. A. Vol. 22 (2011), No.2, pp. 99 105 Non-overlapping permutation patterns Miklós Bóna Department of Mathematics University of Florida 358 Little Hall, PO Box 118105 Gainesville, FL 326118105 (USA)
More informationConnected Identifying Codes
Connected Identifying Codes Niloofar Fazlollahi, David Starobinski and Ari Trachtenberg Dept. of Electrical and Computer Engineering Boston University, Boston, MA 02215 Email: {nfazl,staro,trachten}@bu.edu
More informationWireless Multicasting with Channel Uncertainty
Wireless Multicasting with Channel Uncertainty Jie Luo ECE Dept., Colorado State Univ. Fort Collins, Colorado 80523 e-mail: rockey@eng.colostate.edu Anthony Ephremides ECE Dept., Univ. of Maryland College
More informationOn Flow-Aware CSMA. in Multi-Channel Wireless Networks. Mathieu Feuillet. Joint work with Thomas Bonald CISS 2011
On Flow-Aware CSMA in Multi-Channel Wireless Networks Mathieu Feuillet Joint work with Thomas Bonald CISS 2011 Outline Model Background Standard CSMA Flow-aware CSMA Conclusion Outline Model Background
More informationNovember 6, Chapter 8: Probability: The Mathematics of Chance
Chapter 8: Probability: The Mathematics of Chance November 6, 2013 Last Time Crystallographic notation Groups Crystallographic notation The first symbol is always a p, which indicates that the pattern
More information37 Game Theory. Bebe b1 b2 b3. a Abe a a A Two-Person Zero-Sum Game
37 Game Theory Game theory is one of the most interesting topics of discrete mathematics. The principal theorem of game theory is sublime and wonderful. We will merely assume this theorem and use it to
More informationTHE field of personal wireless communications is expanding
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 5, NO. 6, DECEMBER 1997 907 Distributed Channel Allocation for PCN with Variable Rate Traffic Partha P. Bhattacharya, Leonidas Georgiadis, Senior Member, IEEE,
More informationPATTERN AVOIDANCE IN PERMUTATIONS ON THE BOOLEAN LATTICE
PATTERN AVOIDANCE IN PERMUTATIONS ON THE BOOLEAN LATTICE SAM HOPKINS AND MORGAN WEILER Abstract. We extend the concept of pattern avoidance in permutations on a totally ordered set to pattern avoidance
More information7.4 Permutations and Combinations
7.4 Permutations and Combinations The multiplication principle discussed in the preceding section can be used to develop two additional counting devices that are extremely useful in more complicated counting
More informationResource Management in QoS-Aware Wireless Cellular Networks
Resource Management in QoS-Aware Wireless Cellular Networks Zhi Zhang Dept. of Electrical and Computer Engineering Colorado State University April 24, 2009 Zhi Zhang (ECE CSU) Resource Management in Wireless
More informationDegrees of Freedom of Multi-hop MIMO Broadcast Networks with Delayed CSIT
Degrees of Freedom of Multi-hop MIMO Broadcast Networs with Delayed CSIT Zhao Wang, Ming Xiao, Chao Wang, and Miael Soglund arxiv:0.56v [cs.it] Oct 0 Abstract We study the sum degrees of freedom (DoF)
More informationSets. Definition A set is an unordered collection of objects called elements or members of the set.
Sets Definition A set is an unordered collection of objects called elements or members of the set. Sets Definition A set is an unordered collection of objects called elements or members of the set. Examples:
More informationEELE 6333: Wireless Commuications
EELE 6333: Wireless Commuications Chapter # 4 : Capacity of Wireless Channels Spring, 2012/2013 EELE 6333: Wireless Commuications - Ch.4 Dr. Musbah Shaat 1 / 18 Outline 1 Capacity in AWGN 2 Capacity of
More informationTransmission Scheduling in Capture-Based Wireless Networks
ransmission Scheduling in Capture-Based Wireless Networks Gam D. Nguyen and Sastry Kompella Information echnology Division, Naval Research Laboratory, Washington DC 375 Jeffrey E. Wieselthier Wieselthier
More informationThe Case for Transmitter Training
he Case for ransmitter raining Christopher Steger, Ahmad Khoshnevis, Ashutosh Sabharwal, and Behnaam Aazhang Department of Electrical and Computer Engineering Rice University Houston, X 775, USA Email:
More informationCommunications Overhead as the Cost of Constraints
Communications Overhead as the Cost of Constraints J. Nicholas Laneman and Brian. Dunn Department of Electrical Engineering University of Notre Dame Email: {jnl,bdunn}@nd.edu Abstract This paper speculates
More informationScheduling broadcasts with deadlines
Theoretical Computer Science 325 (2004) 479 488 www.elsevier.com/locate/tcs Scheduling broadcasts with deadlines Jae-Hoon Kim a,, Kyung-Yong Chwa b a Department of Computer Engineering, Pusan University
More informationLectures: Feb 27 + Mar 1 + Mar 3, 2017
CS420+500: Advanced Algorithm Design and Analysis Lectures: Feb 27 + Mar 1 + Mar 3, 2017 Prof. Will Evans Scribe: Adrian She In this lecture we: Summarized how linear programs can be used to model zero-sum
More informationIEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 6, DECEMBER /$ IEEE
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 17, NO 6, DECEMBER 2009 1805 Optimal Channel Probing and Transmission Scheduling for Opportunistic Spectrum Access Nicholas B Chang, Student Member, IEEE, and Mingyan
More informationEnergy Efficient Scheduling Techniques For Real-Time Embedded Systems
Energy Efficient Scheduling Techniques For Real-Time Embedded Systems Rabi Mahapatra & Wei Zhao This work was done by Rajesh Prathipati as part of his MS Thesis here. The work has been update by Subrata
More informationLink Models for Circuit Switching
Link Models for Circuit Switching The basis of traffic engineering for telecommunication networks is the Erlang loss function. It basically allows us to determine the amount of telephone traffic that can
More informationAchieving Low Outage Probability with Network Coding in Wireless Multicarrier Multicast Systems
Achieving Low Outage Probability with Networ Coding in Wireless Multicarrier Multicast Systems Juan Liu, Wei Chen, Member, IEEE, Zhigang Cao, Senior Member, IEEE, Ying Jun (Angela) Zhang, Senior Member,
More informationGraphs and Network Flows IE411. Lecture 14. Dr. Ted Ralphs
Graphs and Network Flows IE411 Lecture 14 Dr. Ted Ralphs IE411 Lecture 14 1 Review: Labeling Algorithm Pros Guaranteed to solve any max flow problem with integral arc capacities Provides constructive tool
More informationIEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 2, FEBRUARY Srihari Adireddy, Student Member, IEEE, and Lang Tong, Fellow, IEEE
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 2, FEBRUARY 2005 537 Exploiting Decentralized Channel State Information for Random Access Srihari Adireddy, Student Member, IEEE, and Lang Tong, Fellow,
More informationNovember 8, Chapter 8: Probability: The Mathematics of Chance
Chapter 8: Probability: The Mathematics of Chance November 8, 2013 Last Time Probability Models and Rules Discrete Probability Models Equally Likely Outcomes Crystallographic notation The first symbol
More informationDisposition Strategies for Open Queueing Networks with Different Service Rates
Disposition Strategies for Open Queueing Networks with Different Service Rates Yu-Li Tsai*, Member IAENG, Daichi Yanagisawa, and Katsuhiro Nishinari Abstract In this paper, we consider a popular kind of
More informationOn Hierarchical Pipeline Paging in Multi-Tier Overlaid Hierarchical Cellular Networks
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL., NO. 9, SEPTEMBER 9 On Hierarchical Pipeline Paging in Multi-Tier Overlaid Hierarchical Cellular Networks Yang Xiao, Senior Member, IEEE, Hui Chen, Member,
More informationMA10103: Foundation Mathematics I. Lecture Notes Week 3
MA10103: Foundation Mathematics I Lecture Notes Week 3 Indices/Powers In an expression a n, a is called the base and n is called the index or power or exponent. Multiplication/Division of Powers a 3 a
More informationChannel Probing in Communication Systems: Myopic Policies Are Not Always Optimal
Channel Probing in Communication Systems: Myopic Policies Are Not Always Optimal Matt Johnston Massachusetts Institute of Technology Joint work with Eytan Modiano and Isaac Keslassy 07/11/13 Opportunistic
More informationStability Regions of Two-Way Relaying with Network Coding
Stability Regions of Two-Way Relaying with Network Coding (Invited Paper) Ertugrul Necdet Ciftcioglu Department of Electrical Engineering The Pennsylvania State University University Park, PA 680 enc8@psu.edu
More informationNear-Optimal Radio Use For Wireless Network Synch. Synchronization
Near-Optimal Radio Use For Wireless Network Synchronization LANL, UCLA 10th of July, 2009 Motivation Consider sensor network: tiny, inexpensive embedded computers run complex software sense environmental
More informationNON-OVERLAPPING PERMUTATION PATTERNS. To Doron Zeilberger, for his Sixtieth Birthday
NON-OVERLAPPING PERMUTATION PATTERNS MIKLÓS BÓNA Abstract. We show a way to compute, to a high level of precision, the probability that a randomly selected permutation of length n is nonoverlapping. As
More informationEnvironments y. Nitin H. Vaidya Sohail Hameed. Phone: (409) FAX: (409)
Scheduling Data Broadcast in Asymmetric Communication Environments y Nitin H. Vaidya Sohail Hameed Department of Computer Science Texas A&M University College Station, TX 77843-3112 E-mail fvaidya,shameedg@cs.tamu.edu
More informationRandomized Channel Access Reduces Network Local Delay
Randomized Channel Access Reduces Network Local Delay Wenyi Zhang USTC Joint work with Yi Zhong (Ph.D. student) and Martin Haenggi (Notre Dame) 2013 Joint HK/TW Workshop on ITC CUHK, January 19, 2013 Acknowledgement
More informationDownlink Scheduler Optimization in High-Speed Downlink Packet Access Networks
Downlink Scheduler Optimization in High-Speed Downlink Packet Access Networks Hussein Al-Zubaidy SCE-Carleton University 1125 Colonel By Drive, Ottawa, ON, Canada Email: hussein@sce.carleton.ca 21 August
More informationPunctured vs Rateless Codes for Hybrid ARQ
Punctured vs Rateless Codes for Hybrid ARQ Emina Soljanin Mathematical and Algorithmic Sciences Research, Bell Labs Collaborations with R. Liu, P. Spasojevic, N. Varnica and P. Whiting Tsinghua University
More informationMedium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks
Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks Ka Hung Hui, Dongning Guo and Randall A. Berry Department of Electrical Engineering and Computer Science Northwestern
More informationOn the Average Rate Performance of Hybrid-ARQ in Quasi-Static Fading Channels
1 On the Average Rate Performance of Hybrid-ARQ in Quasi-Static Fading Channels Cong Shen, Student Member, IEEE, Tie Liu, Member, IEEE, and Michael P. Fitz, Senior Member, IEEE Abstract The problem of
More informationCONSIDER THE following power capture model. If
254 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 45, NO. 2, FEBRUARY 1997 On the Capture Probability for a Large Number of Stations Bruce Hajek, Fellow, IEEE, Arvind Krishna, Member, IEEE, and Richard O.
More informationAn interesting class of problems of a computational nature ask for the standard residue of a power of a number, e.g.,
Binary exponentiation An interesting class of problems of a computational nature ask for the standard residue of a power of a number, e.g., What are the last two digits of the number 2 284? In the absence
More informationLECTURE 3: CONGRUENCES. 1. Basic properties of congruences We begin by introducing some definitions and elementary properties.
LECTURE 3: CONGRUENCES 1. Basic properties of congruences We begin by introducing some definitions and elementary properties. Definition 1.1. Suppose that a, b Z and m N. We say that a is congruent to
More informationDistributed Broadcast Scheduling in Mobile Ad Hoc Networks with Unknown Topologies
Distributed Broadcast Scheduling in Mobile Ad Hoc Networks with Unknown Topologies Guang Tan, Stephen A. Jarvis, James W. J. Xue, and Simon D. Hammond Department of Computer Science, University of Warwick,
More informationOn the Capacity Regions of Two-Way Diamond. Channels
On the Capacity Regions of Two-Way Diamond 1 Channels Mehdi Ashraphijuo, Vaneet Aggarwal and Xiaodong Wang arxiv:1410.5085v1 [cs.it] 19 Oct 2014 Abstract In this paper, we study the capacity regions of
More informationCross-Layer Design and Analysis of Wireless Networks Using the Effective Bandwidth Function
1 Cross-Layer Design and Analysis of Wireless Networks Using the Effective Bandwidth Function Fumio Ishizaki, Member, IEEE, and Gang Uk Hwang, Member, IEEE Abstract In this paper, we propose a useful framework
More informationAnalytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls
Analytical Model for an IEEE 80.11 WLAN using DCF with Two Types of VoIP Calls Sri Harsha Anurag Kumar Vinod Sharma Department of Electrical Communication Engineering Indian Institute of Science Bangalore
More informationIntroduction to Source Coding
Comm. 52: Communication Theory Lecture 7 Introduction to Source Coding - Requirements of source codes - Huffman Code Length Fixed Length Variable Length Source Code Properties Uniquely Decodable allow
More informationSome constructions of mutually orthogonal latin squares and superimposed codes
University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers: Part A Faculty of Engineering and Information Sciences 2012 Some constructions of mutually orthogonal
More informationRandom permutations avoiding some patterns
Random permutations avoiding some patterns Svante Janson Knuth80 Piteå, 8 January, 2018 Patterns in a permutation Let S n be the set of permutations of [n] := {1,..., n}. If σ = σ 1 σ k S k and π = π 1
More information11.7 Maximum and Minimum Values
Arkansas Tech University MATH 2934: Calculus III Dr. Marcel B Finan 11.7 Maximum and Minimum Values Just like functions of a single variable, functions of several variables can have local and global extrema,
More informationOpportunistic Beamforming Using Dumb Antennas
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 48, NO. 6, JUNE 2002 1277 Opportunistic Beamforming Using Dumb Antennas Pramod Viswanath, Member, IEEE, David N. C. Tse, Member, IEEE, and Rajiv Laroia, Fellow,
More informationTRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS
The 20 Military Communications Conference - Track - Waveforms and Signal Processing TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS Gam D. Nguyen, Jeffrey E. Wieselthier 2, Sastry Kompella,
More information