Scheduling on a Channel with Failures and Retransmissions

Size: px
Start display at page:

Download "Scheduling on a Channel with Failures and Retransmissions"

Transcription

1 Scheduling on a Channel with Failures and Retransmissions Predrag R. Jelenković and Evangelia D. Skiani Department of Electrical Engineering Columbia University, NY 10027, USA {predrag,valia}@ee.columbia.edu October 6, 2013 *Supported by NSF grant P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18

2 Outline 1 Introduction Definitions & Notation 2 Main Results First Come First Served Processor Sharing 3 Simulation Example 1: FCFS Example 2: PS 4 Conclusions P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18

3 Introduction Failures & Retransmissions (Restarts) High variability frequent failures Possible solution: Restart the system Applications networking e.g. ARQ, HTTP computing Restarts cause power law delays & possibly zero throughput, even for superexponential files [ALSF 05-, JT 06-]: P[N > n] (a+1)n a (1) What is the best job scheduling policy? P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18

4 Introduction Failures & Retransmissions (Restarts) High variability frequent failures Possible solution: Restart the system Applications networking e.g. ARQ, HTTP computing Restarts cause power law delays & possibly zero throughput, even for superexponential files [ALSF 05-, JT 06-]: P[N > n] (a+1)n a (1) What is the best job scheduling policy? P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18

5 Introduction Failures & Retransmissions (Restarts) High variability frequent failures Possible solution: Restart the system Applications networking e.g. ARQ, HTTP computing Restarts cause power law delays & possibly zero throughput, even for superexponential files [ALSF 05-, JT 06-]: P[N > n] (a+1)n a (1) What is the best job scheduling policy? P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18

6 Introduction Failures & Retransmissions (Restarts) High variability frequent failures Possible solution: Restart the system Applications networking e.g. ARQ, HTTP computing Restarts cause power law delays & possibly zero throughput, even for superexponential files [ALSF 05-, JT 06-]: P[N > n] (a+1)n a (1) What is the best job scheduling policy? P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18

7 Introduction Motivation Scheduling & Retransmissions No known policies optimize the sojourn time tail across BOTH light and heavy-tailed job size distributions. Optimality Subexponential jobs: PS, shortest remaining processing time [ANA 99] Superexponential jobs: First come first served [RS 01] We study two scheduling policies: 1 First Come First Served (FCFS) 2 Processor Sharing (PS) Question: How do these policies work under retransmissions? P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18

8 Introduction Motivation Scheduling & Retransmissions No known policies optimize the sojourn time tail across BOTH light and heavy-tailed job size distributions. Optimality Subexponential jobs: PS, shortest remaining processing time [ANA 99] Superexponential jobs: First come first served [RS 01] We study two scheduling policies: 1 First Come First Served (FCFS) 2 Processor Sharing (PS) Question: How do these policies work under retransmissions? P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18

9 Introduction Motivation Scheduling & Retransmissions No known policies optimize the sojourn time tail across BOTH light and heavy-tailed job size distributions. Optimality Subexponential jobs: PS, shortest remaining processing time [ANA 99] Superexponential jobs: First come first served [RS 01] We study two scheduling policies: 1 First Come First Served (FCFS) 2 Processor Sharing (PS) Question: How do these policies work under retransmissions? P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18

10 Introduction Motivation Model of Channel Available periods {A n } n 1 :i.i.d. Unit Capacity A 1" U 1" A 2" U 2" Figure: A failure-prone system. Retransmission Model Generic job B (0, ) if B A n,success;else, retransmitatperioda n+1 B System with failures A n B restart no Figure: Jobs over a system with failures. P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18

11 Definitions & Notation Introduction Definitions & Notation Definition 1 (Service Time) The service time is the total time until a job is successfully served and is denoted as N 1 S = A i +B, i=1 where N is the number of attempts until the successful completion of the job. Denote the tail distributions of job sizes B and availability periods A as F (x) = P(B > x) and Ḡ(x) = P(A > x) P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18

12 Introduction Definitions & Notation ASimpleScenario There are m jobs of size B i, i = 1...m Each job requires S i time units No future arrivals Job Scheduling: B 3 # B 2 # B 1 # vs. B 1 # B 2 # B 3 # FCFS P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18 PS

13 Definitions & Notation Introduction Definitions & Notation Definition 2 (Total Completion Time) The total completion time is defined as the total time until all the jobs in the queue are successfully served and is denoted as m m = S i, where m is the total number of jobs in the system and S i s are the service times for each job. i=1 Note: Total completion time without retransmissions trivial! Always equal to m i=1 B i P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18

14 Main Results First Come First Served (FCFS) First Come First Served Theorem 1 If log F (x) alogḡ(x) for all x 0 and a > 0, ande[a 1+q ] < for some q > 0, then logp[ m > t] lim = a. t logt Proof [of Theorem 1]. Under the conditions of the Theorem, the result in [JT 06-] yields logp[s > t] lim = a as t, () t logt where S is the service time of one job if served alone. P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18

15 Main Results First Come First Served (FCFS) First Come First Served Theorem 1 If log F (x) alogḡ(x) for all x 0 and a > 0, ande[a 1+q ] < for some q > 0, then logp[ m > t] lim = a. t logt Proof [of Theorem 1]. Under the conditions of the Theorem, the result in [JT 06-] yields logp[s > t] lim = a as t, () t logt where S is the service time of one job if served alone. P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18

16 FCFS Main Results First Come First Served Proof [of Theorem 1]. The total completion time is lower bounded by a single job service time: P[ m > t] P[S 1 > t] () logp[ m > t] a. logt Let S i be the service time of a job i when we idle the server after job completion until next failure. Then, the upper bound is m P[ m > t] P S i > t mp S 1 > t m i=1 () logp[ m > t] a. logt P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18

17 FCFS Main Results First Come First Served Proof [of Theorem 1]. The total completion time is lower bounded by a single job service time: P[ m > t] P[S 1 > t] () logp[ m > t] a. logt Let S i be the service time of a job i when we idle the server after job completion until next failure. Then, the upper bound is m P[ m > t] P S i > t mp S 1 > t m i=1 () logp[ m > t] a. logt P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18

18 Main Results Processor Sharing Processor Sharing (PS) Theorem 2 If the hazard function log F (x) is regularly varying with index g 0, then, under the conditions of Theorem 1, i) if g 1, i.e. B is subexponential or exponential, then logp[ m > t] lim = a, t logt ii) if g > 1, i.e. B is superexponential, then logp[ m > t] lim t logt = a < a. mg 1 P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18

19 Main Results Processor Sharing Processor Sharing (PS) Theorem 2 If the hazard function log F (x) is regularly varying with index g 0, then, under the conditions of Theorem 1, i) if g 1, i.e. B is subexponential or exponential, then logp[ m > t] lim = a, t logt ii) if g > 1, i.e. B is superexponential, then logp[ m > t] lim t logt = a < a. mg 1 P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18

20 Idea of the proof (I) Main Results Processor Sharing The upper bound is m P[ m > t] P i=1 1 If B 1 is the smallest job, then P[N 1 > n] = EP B 1 > A m n S i > t (1+e) m i=1 P[ S i > t]. = E1 Ḡ(m B 1 ) n = E1 F 1 (m B 1 ) 1 n a 1 2 What is the relationship between F 1 (x) and Ḡ(x)? 3 Recalling (), log F 1 (x) = logp[m B 1 > x] = log F (xm) m m 1 g log F (x). logp[ S 1 > t] logt t a m g 1 () P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18

21 Idea of the proof (I) Main Results Processor Sharing The upper bound is m P[ m > t] P i=1 1 If B 1 is the smallest job, then P[N 1 > n] = EP B 1 > A m n S i > t (1+e) m i=1 P[ S i > t]. = E1 Ḡ(m B 1 ) n = E1 F 1 (m B 1 ) 1 n a 1 2 What is the relationship between F 1 (x) and Ḡ(x)? 3 Recalling (), log F 1 (x) = logp[m B 1 > x] = log F (xm) m m 1 g log F (x). logp[ S 1 > t] logt t a m g 1 () P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18

22 Idea of the proof (I) Main Results Processor Sharing The upper bound is m P[ m > t] P i=1 1 If B 1 is the smallest job, then P[N 1 > n] = EP B 1 > A m n S i > t (1+e) m i=1 P[ S i > t]. = E1 Ḡ(m B 1 ) n = E1 F 1 (m B 1 ) 1 n a 1 2 What is the relationship between F 1 (x) and Ḡ(x)? 3 Recalling (), log F 1 (x) = logp[m B 1 > x] = log F (xm) m m 1 g log F (x). logp[ S 1 > t] logt t a m g 1 () P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18

23 Idea of the proof (II) Main Results Processor Sharing 4 Similarly, for the 2 nd smallest job 1t a(m 1)1 g 5... and the last one 1t a If g > 1 (superexponential), then the lower bound is determined by the minimum power law index (am 1 g <...< a) logp[ m > t] logt a. (1) mg 1 Equivalently, if g 1 ((sub)exponential), then logp[ m > t] logt a. (2) P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18

24 Idea of the proof (II) Main Results Processor Sharing 4 Similarly, for the 2 nd smallest job 1t a(m 1)1 g 5... and the last one 1t a If g > 1 (superexponential), then the lower bound is determined by the minimum power law index (am 1 g <...< a) logp[ m > t] logt a. (1) mg 1 Equivalently, if g 1 ((sub)exponential), then logp[ m > t] logt a. (2) P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18

25 Simulations Simulation Example 1: FCFS Example 1. FCFS: All job types generate same power law asymptotics Service time S 1t 2 # jobs: m = 10 Figure: Logarithmic asymptotics for a = 2 under FCFS γ < 1 Exponential γ > 1 Asymptote P[T>t] t P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18

26 Simulations Simulation Example 2: PS Example 2. PS: The e ect of the number of (superexponential) jobs B superexponential (g > 1) # jobs: m = 2andm = 5, service time with a = 4 Figure: Logarithmic asymptotics for a = 4 under PS and FCFS discipline PS: m = 5 PS: m = 2 FCFS Asymptote 10 2 P[T>t] t P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18

27 Conclusions Queueing: PS could be always unstable Theorem 3 If jobs are superexponential (g > 1), then for any arrival rate l > 0 and any a > 0, thepsqueueisunstable. Queueing with retransmissions & scheduling is hard More to come in our forthcoming paper... P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18

28 Conclusions Queueing: PS could be always unstable Theorem 3 If jobs are superexponential (g > 1), then for any arrival rate l > 0 and any a > 0, thepsqueueisunstable. Queueing with retransmissions & scheduling is hard More to come in our forthcoming paper... P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18

29 Conclusions Conclusions FCFS: power law of same index for both super/subexponential PS: new phenomenon - dramatic di erence between super/subexponential jobs Queueing: for superexponential jobs, sharing induces instabilities zero throughput Sharing is not always good / P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18

30 Conclusions Conclusions FCFS: power law of same index for both super/subexponential PS: new phenomenon - dramatic di erence between super/subexponential jobs Queueing: for superexponential jobs, sharing induces instabilities zero throughput Sharing is not always good / P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18

31 Conclusions Conclusions FCFS: power law of same index for both super/subexponential PS: new phenomenon - dramatic di erence between super/subexponential jobs Queueing: for superexponential jobs, sharing induces instabilities zero throughput Sharing is not always good / P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18

32 Conclusions Conclusions FCFS: power law of same index for both super/subexponential PS: new phenomenon - dramatic di erence between super/subexponential jobs Queueing: for superexponential jobs, sharing induces instabilities zero throughput Sharing is not always good / P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18

33 Thank you Conclusions Questions? P.R.Jelenković & E.D.Skiani Scheduling on a Channel with Failures and Retransmissions October 6, / 18

Contents. Basic Concepts. Histogram of CPU-burst Times. Diagram of Process State CHAPTER 5 CPU SCHEDULING. Alternating Sequence of CPU And I/O Bursts

Contents. Basic Concepts. Histogram of CPU-burst Times. Diagram of Process State CHAPTER 5 CPU SCHEDULING. Alternating Sequence of CPU And I/O Bursts Contents CHAPTER 5 CPU SCHEDULING Basic Concepts Scheduling Criteria Scheduling Algorithms Multiple-Processor Scheduling Real-Time Scheduling Basic Concepts Maximum CPU utilization obtained with multiprogramming

More information

Section 7.2 Logarithmic Functions

Section 7.2 Logarithmic Functions Math 150 c Lynch 1 of 6 Section 7.2 Logarithmic Functions Definition. Let a be any positive number not equal to 1. The logarithm of x to the base a is y if and only if a y = x. The number y is denoted

More information

General Disposition Strategies of Series Configuration Queueing Systems

General Disposition Strategies of Series Configuration Queueing Systems General Disposition Strategies of Series Configuration Queueing Systems Yu-Li Tsai*, Member IAENG, Daichi Yanagisawa, Katsuhiro Nishinari Abstract In this paper, we suggest general disposition strategies

More information

Modeling load balancing in carrier aggregation mobile networks

Modeling load balancing in carrier aggregation mobile networks Modeling load balancing in carrier aggregation mobile networks R-M. Indre Joint work with F. Bénézit, S. E. El Ayoubi, A. Simonian IDEFIX Plenary Meeting, May 23 rd 2014, Avignon What is carrier aggregation?

More information

Logarithmic Functions and Their Graphs

Logarithmic Functions and Their Graphs Logarithmic Functions and Their Graphs Accelerated Pre-Calculus Mr. Niedert Accelerated Pre-Calculus Logarithmic Functions and Their Graphs Mr. Niedert 1 / 24 Logarithmic Functions and Their Graphs 1 Logarithmic

More information

Pattern Avoidance in Poset Permutations

Pattern Avoidance in Poset Permutations Pattern Avoidance in Poset Permutations Sam Hopkins and Morgan Weiler Massachusetts Institute of Technology and University of California, Berkeley Permutation Patterns, Paris; July 5th, 2013 1 Definitions

More information

3.5 Marginal Distributions

3.5 Marginal Distributions STAT 421 Lecture Notes 52 3.5 Marginal Distributions Definition 3.5.1 Suppose that X and Y have a joint distribution. The c.d.f. of X derived by integrating (or summing) over the support of Y is called

More information

Stability Analysis for Network Coded Multicast Cell with Opportunistic Relay

Stability Analysis for Network Coded Multicast Cell with Opportunistic Relay This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 00 proceedings Stability Analysis for Network Coded Multicast

More information

TSIN01 Information Networks Lecture 9

TSIN01 Information Networks Lecture 9 TSIN01 Information Networks Lecture 9 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 26 th, 2017 Danyo Danev TSIN01 Information

More information

Chapter 6: CPU Scheduling

Chapter 6: CPU Scheduling Chapter 6: CPU Scheduling Silberschatz, Galvin and Gagne 2013 Chapter 6: CPU Scheduling Basic Concepts Scheduling Criteria Scheduling Algorithms Sections from the textbook: 6.1, 6.2, and 6.3 6.2 Silberschatz,

More information

18 Logarithmic Functions

18 Logarithmic Functions 18 Logarithmic Functions Concepts: Logarithms (Section 3.3) Logarithms as Functions Logarithms as Exponent Pickers Inverse Relationship between Logarithmic and Exponential Functions. The Common Logarithm

More information

Event-Driven Scheduling. (closely following Jane Liu s Book)

Event-Driven Scheduling. (closely following Jane Liu s Book) Event-Driven Scheduling (closely following Jane Liu s Book) Real-Time Systems, 2009 Event-Driven Systems, 1 Principles Admission: Assign priorities to Jobs At events, jobs are scheduled according to their

More information

Wireless communications: from simple stochastic geometry models to practice III Capacity

Wireless communications: from simple stochastic geometry models to practice III Capacity Wireless communications: from simple stochastic geometry models to practice III Capacity B. Błaszczyszyn Inria/ENS Workshop on Probabilistic Methods in Telecommunication WIAS Berlin, November 14 16, 2016

More information

How user throughput depends on the traffic demand in large cellular networks

How user throughput depends on the traffic demand in large cellular networks How user throughput depends on the traffic demand in large cellular networks B. Błaszczyszyn Inria/ENS based on a joint work with M. Jovanovic and M. K. Karray (Orange Labs, Paris) 1st Symposium on Spatial

More information

You could identify a point on the graph of a function as (x,y) or (x, f(x)). You may have only one function value for each x number.

You could identify a point on the graph of a function as (x,y) or (x, f(x)). You may have only one function value for each x number. Function Before we review exponential and logarithmic functions, let's review the definition of a function and the graph of a function. A function is just a rule. The rule links one number to a second

More information

Near-Optimal Data Dissemination Policies for Multi-Channel, Single Radio Wireless Sensor Networks

Near-Optimal Data Dissemination Policies for Multi-Channel, Single Radio Wireless Sensor Networks Near-Optimal Data Dissemination Policies for Multi-Channel, Single Radio Wireless Sensor Networks David Starobinski Weiyao Xiao Xiangping Qin Ari Trachtenberg Department of Electrical and Computer Engineering

More information

Opportunistic Scheduling: Generalizations to. Include Multiple Constraints, Multiple Interfaces,

Opportunistic Scheduling: Generalizations to. Include Multiple Constraints, Multiple Interfaces, Opportunistic Scheduling: Generalizations to Include Multiple Constraints, Multiple Interfaces, and Short Term Fairness Sunil Suresh Kulkarni, Catherine Rosenberg School of Electrical and Computer Engineering

More information

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. XX, NO. X, AUGUST 20XX 1

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. XX, NO. X, AUGUST 20XX 1 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. XX, NO. X, AUGUST 0XX 1 Greenput: a Power-saving Algorithm That Achieves Maximum Throughput in Wireless Networks Cheng-Shang Chang, Fellow, IEEE, Duan-Shin Lee,

More information

Chapter 3 Exponential and Logarithmic Functions

Chapter 3 Exponential and Logarithmic Functions Chapter 3 Exponential and Logarithmic Functions Section 1 Section 2 Section 3 Section 4 Section 5 Exponential Functions and Their Graphs Logarithmic Functions and Their Graphs Properties of Logarithms

More information

Math Lecture 2 Inverse Functions & Logarithms

Math Lecture 2 Inverse Functions & Logarithms Math 1060 Lecture 2 Inverse Functions & Logarithms Outline Summary of last lecture Inverse Functions Domain, codomain, and range One-to-one functions Inverse functions Inverse trig functions Logarithms

More information

arxiv: v2 [math.pr] 20 Dec 2013

arxiv: v2 [math.pr] 20 Dec 2013 n-digit BENFORD DISTRIBUTED RANDOM VARIABLES AZAR KHOSRAVANI AND CONSTANTIN RASINARIU arxiv:1304.8036v2 [math.pr] 20 Dec 2013 Abstract. The scope of this paper is twofold. First, to emphasize the use of

More information

Optimal Rate-Diversity-Delay Tradeoff in ARQ Block-Fading Channels

Optimal Rate-Diversity-Delay Tradeoff in ARQ Block-Fading Channels Optimal Rate-Diversity-Delay Tradeoff in ARQ Block-Fading Channels Allen Chuang School of Electrical and Information Eng. University of Sydney Sydney NSW, Australia achuang@ee.usyd.edu.au Albert Guillén

More information

3644 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 6, JUNE 2011

3644 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 6, JUNE 2011 3644 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 6, JUNE 2011 Asynchronous CSMA Policies in Multihop Wireless Networks With Primary Interference Constraints Peter Marbach, Member, IEEE, Atilla

More information

Transport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks

Transport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks Transport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks Yi Sun Department of Electrical Engineering The City College of City University of New York Acknowledgement: supported

More information

The Chinese University of Hong Kong Department of Computer Science and Engineering. Ph.D. Term Paper. Program Execution Time, Reliability and Queueing

The Chinese University of Hong Kong Department of Computer Science and Engineering. Ph.D. Term Paper. Program Execution Time, Reliability and Queueing The Chinese University of Hong Kong epartment of Computer Science and Engineering Ph.. Term Paper Title: Program Execution Time, Reliability and Queueing Analysis in Mobile Environments Name: CHEN, Xinyu

More information

A Random Network Coding-based ARQ Scheme and Performance Analysis for Wireless Broadcast

A Random Network Coding-based ARQ Scheme and Performance Analysis for Wireless Broadcast ISSN 746-7659, England, U Journal of Information and Computing Science Vol. 4, No., 9, pp. 4-3 A Random Networ Coding-based ARQ Scheme and Performance Analysis for Wireless Broadcast in Yang,, +, Gang

More information

Maxima and Minima. Terminology note: Do not confuse the maximum f(a, b) (a number) with the point (a, b) where the maximum occurs.

Maxima and Minima. Terminology note: Do not confuse the maximum f(a, b) (a number) with the point (a, b) where the maximum occurs. 10-11-2010 HW: 14.7: 1,5,7,13,29,33,39,51,55 Maxima and Minima In this very important chapter, we describe how to use the tools of calculus to locate the maxima and minima of a function of two variables.

More information

Generalized Signal Alignment For MIMO Two-Way X Relay Channels

Generalized Signal Alignment For MIMO Two-Way X Relay Channels Generalized Signal Alignment For IO Two-Way X Relay Channels Kangqi Liu, eixia Tao, Zhengzheng Xiang and Xin Long Dept. of Electronic Engineering, Shanghai Jiao Tong University, Shanghai, China Emails:

More information

Service Response Time of Elastic Data Traffic in Cognitive Radio Networks

Service Response Time of Elastic Data Traffic in Cognitive Radio Networks 1 Service Response Time of Elastic Data Traffic in Cognitive Radio Networks Subodha Gunawardena, Student Member, IEEE, and Weihua Zhuang, Fellow, IEEE Abstract Quality of service (QoS) support over cognitive

More information

Balance Queueing and Retransmission: Latency-Optimal Massive MIMO Design

Balance Queueing and Retransmission: Latency-Optimal Massive MIMO Design Balance Queueing and Retransmission: Latency-Optimal Massive MIMO Design Xu Du, Yin Sun, Ness Shroff, Ashutosh Sabharwal arxiv:902.07676v [cs.it] 20 Feb 209 Abstract One fundamental challenge in 5G URLLC

More information

Solutions to the problems from Written assignment 2 Math 222 Winter 2015

Solutions to the problems from Written assignment 2 Math 222 Winter 2015 Solutions to the problems from Written assignment 2 Math 222 Winter 2015 1. Determine if the following limits exist, and if a limit exists, find its value. x2 y (a) The limit of f(x, y) = x 4 as (x, y)

More information

Optimal Distributed Scheduling under Time-varying Conditions: A Fast-CSMA Algorithm with Applications

Optimal Distributed Scheduling under Time-varying Conditions: A Fast-CSMA Algorithm with Applications 1 Optimal Distributed Scheduling under Time-varying Conditions: A Fast-CSMA Algorithm with Applications Bin Li and Atilla Eryilmaz Abstract Recently, low-complexity and distributed Carrier Sense Multiple

More information

COMP Online Algorithms. Paging and k-server Problem. Shahin Kamali. Lecture 11 - Oct. 11, 2018 University of Manitoba

COMP Online Algorithms. Paging and k-server Problem. Shahin Kamali. Lecture 11 - Oct. 11, 2018 University of Manitoba COMP 7720 - Online Algorithms Paging and k-server Problem Shahin Kamali Lecture 11 - Oct. 11, 2018 University of Manitoba COMP 7720 - Online Algorithms Paging and k-server Problem 1 / 19 Review & Plan

More information

The Degrees of Freedom of Full-Duplex. Bi-directional Interference Networks with and without a MIMO Relay

The Degrees of Freedom of Full-Duplex. Bi-directional Interference Networks with and without a MIMO Relay The Degrees of Freedom of Full-Duplex 1 Bi-directional Interference Networks with and without a MIMO Relay Zhiyu Cheng, Natasha Devroye, Tang Liu University of Illinois at Chicago zcheng3, devroye, tliu44@uic.edu

More information

A Backlog-Based CSMA Mechanism to Achieve Fairness and Throughput-Optimality in Multihop Wireless Networks

A Backlog-Based CSMA Mechanism to Achieve Fairness and Throughput-Optimality in Multihop Wireless Networks A Backlog-Based CSMA Mechanism to Achieve Fairness and Throughput-Optimality in Multihop Wireless Networks Peter Marbach, and Atilla Eryilmaz Dept. of Computer Science, University of Toronto Email: marbach@cs.toronto.edu

More information

Fast Sorting and Pattern-Avoiding Permutations

Fast Sorting and Pattern-Avoiding Permutations Fast Sorting and Pattern-Avoiding Permutations David Arthur Stanford University darthur@cs.stanford.edu Abstract We say a permutation π avoids a pattern σ if no length σ subsequence of π is ordered in

More information

Lectures 8 & 9. M/G/1 Queues

Lectures 8 & 9. M/G/1 Queues Lectures 8 & 9 M/G/1 Queues MIT Slide 1 M/G/1 QUEUE Poisson M/G/1 General independent Service times Poisson arrivals at rate λ Service time has arbitrary distribution with given E[X] and E[X 2 ] Service

More information

ON THE EQUATION a x x (mod b) Jam Germain

ON THE EQUATION a x x (mod b) Jam Germain ON THE EQUATION a (mod b) Jam Germain Abstract. Recently Jimenez and Yebra [3] constructed, for any given a and b, solutions to the title equation. Moreover they showed how these can be lifted to higher

More information

Asymptotic behaviour of permutations avoiding generalized patterns

Asymptotic behaviour of permutations avoiding generalized patterns Asymptotic behaviour of permutations avoiding generalized patterns Ashok Rajaraman 311176 arajaram@sfu.ca February 19, 1 Abstract Visualizing permutations as labelled trees allows us to to specify restricted

More information

On the Unicast Capacity of Stationary Multi-channel Multi-radio Wireless Networks: Separability and Multi-channel Routing

On the Unicast Capacity of Stationary Multi-channel Multi-radio Wireless Networks: Separability and Multi-channel Routing 1 On the Unicast Capacity of Stationary Multi-channel Multi-radio Wireless Networks: Separability and Multi-channel Routing Liangping Ma arxiv:0809.4325v2 [cs.it] 26 Dec 2009 Abstract The first result

More information

Power Controlled Random Access

Power Controlled Random Access 1 Power Controlled Random Access Aditya Dua Department of Electrical Engineering Stanford University Stanford, CA 94305 dua@stanford.edu Abstract The lack of an established infrastructure, and the vagaries

More information

Efficiency and detectability of random reactive jamming in wireless networks

Efficiency and detectability of random reactive jamming in wireless networks Efficiency and detectability of random reactive jamming in wireless networks Ni An, Steven Weber Modeling & Analysis of Networks Laboratory Drexel University Department of Electrical and Computer Engineering

More information

CS445: Modeling Complex Systems

CS445: Modeling Complex Systems CS445: Modeling Complex Systems Travis Desell! Averill M. Law, Simulation Modeling & Analysis, Chapter 2!! Time-Shared Computer Model Time Shared Computer Model Terminals Computer Unfinished s 2 2... Active

More information

A virtually nonblocking self-routing permutation network which routes packets in O(log 2 N) time

A virtually nonblocking self-routing permutation network which routes packets in O(log 2 N) time Telecommunication Systems 10 (1998) 135 147 135 A virtually nonblocking self-routing permutation network which routes packets in O(log 2 N) time G.A. De Biase and A. Massini Dipartimento di Scienze dell

More information

REU 2006 Discrete Math Lecture 3

REU 2006 Discrete Math Lecture 3 REU 006 Discrete Math Lecture 3 Instructor: László Babai Scribe: Elizabeth Beazley Editors: Eliana Zoque and Elizabeth Beazley NOT PROOFREAD - CONTAINS ERRORS June 6, 006. Last updated June 7, 006 at :4

More information

SNR Estimation in Nakagami-m Fading With Diversity Combining and Its Application to Turbo Decoding

SNR Estimation in Nakagami-m Fading With Diversity Combining and Its Application to Turbo Decoding IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 50, NO. 11, NOVEMBER 2002 1719 SNR Estimation in Nakagami-m Fading With Diversity Combining Its Application to Turbo Decoding A. Ramesh, A. Chockalingam, Laurence

More information

Bandwidth Estimation Using End-to- End Packet-Train Probing: Stochastic Foundation

Bandwidth Estimation Using End-to- End Packet-Train Probing: Stochastic Foundation Bandwidth Estimation Using End-to- End Packet-Train Probing: Stochastic Foundation Xiliang Liu Joint work with Kaliappa Ravindran and Dmitri Loguinov Department of Computer Science City University of New

More information

How Many Mates Can a Latin Square Have?

How Many Mates Can a Latin Square Have? How Many Mates Can a Latin Square Have? Megan Bryant mrlebla@g.clemson.edu Roger Garcia garcroge@kean.edu James Figler figler@live.marshall.edu Yudhishthir Singh ysingh@crimson.ua.edu Marshall University

More information

Recursive relations (Part 2/2). p.1/16

Recursive relations (Part 2/2). p.1/16 Recursive relations (Part 2/2). p.1/16 Bounded Definition. Let R(x, i) be a relation on N. The relation R obtained from R by bounded existential quantification is defined as follows: ( R)(x, y) iff i y

More information

Non-overlapping permutation patterns

Non-overlapping permutation patterns PU. M. A. Vol. 22 (2011), No.2, pp. 99 105 Non-overlapping permutation patterns Miklós Bóna Department of Mathematics University of Florida 358 Little Hall, PO Box 118105 Gainesville, FL 326118105 (USA)

More information

Connected Identifying Codes

Connected Identifying Codes Connected Identifying Codes Niloofar Fazlollahi, David Starobinski and Ari Trachtenberg Dept. of Electrical and Computer Engineering Boston University, Boston, MA 02215 Email: {nfazl,staro,trachten}@bu.edu

More information

Wireless Multicasting with Channel Uncertainty

Wireless Multicasting with Channel Uncertainty Wireless Multicasting with Channel Uncertainty Jie Luo ECE Dept., Colorado State Univ. Fort Collins, Colorado 80523 e-mail: rockey@eng.colostate.edu Anthony Ephremides ECE Dept., Univ. of Maryland College

More information

On Flow-Aware CSMA. in Multi-Channel Wireless Networks. Mathieu Feuillet. Joint work with Thomas Bonald CISS 2011

On Flow-Aware CSMA. in Multi-Channel Wireless Networks. Mathieu Feuillet. Joint work with Thomas Bonald CISS 2011 On Flow-Aware CSMA in Multi-Channel Wireless Networks Mathieu Feuillet Joint work with Thomas Bonald CISS 2011 Outline Model Background Standard CSMA Flow-aware CSMA Conclusion Outline Model Background

More information

November 6, Chapter 8: Probability: The Mathematics of Chance

November 6, Chapter 8: Probability: The Mathematics of Chance Chapter 8: Probability: The Mathematics of Chance November 6, 2013 Last Time Crystallographic notation Groups Crystallographic notation The first symbol is always a p, which indicates that the pattern

More information

37 Game Theory. Bebe b1 b2 b3. a Abe a a A Two-Person Zero-Sum Game

37 Game Theory. Bebe b1 b2 b3. a Abe a a A Two-Person Zero-Sum Game 37 Game Theory Game theory is one of the most interesting topics of discrete mathematics. The principal theorem of game theory is sublime and wonderful. We will merely assume this theorem and use it to

More information

THE field of personal wireless communications is expanding

THE field of personal wireless communications is expanding IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 5, NO. 6, DECEMBER 1997 907 Distributed Channel Allocation for PCN with Variable Rate Traffic Partha P. Bhattacharya, Leonidas Georgiadis, Senior Member, IEEE,

More information

PATTERN AVOIDANCE IN PERMUTATIONS ON THE BOOLEAN LATTICE

PATTERN AVOIDANCE IN PERMUTATIONS ON THE BOOLEAN LATTICE PATTERN AVOIDANCE IN PERMUTATIONS ON THE BOOLEAN LATTICE SAM HOPKINS AND MORGAN WEILER Abstract. We extend the concept of pattern avoidance in permutations on a totally ordered set to pattern avoidance

More information

7.4 Permutations and Combinations

7.4 Permutations and Combinations 7.4 Permutations and Combinations The multiplication principle discussed in the preceding section can be used to develop two additional counting devices that are extremely useful in more complicated counting

More information

Resource Management in QoS-Aware Wireless Cellular Networks

Resource Management in QoS-Aware Wireless Cellular Networks Resource Management in QoS-Aware Wireless Cellular Networks Zhi Zhang Dept. of Electrical and Computer Engineering Colorado State University April 24, 2009 Zhi Zhang (ECE CSU) Resource Management in Wireless

More information

Degrees of Freedom of Multi-hop MIMO Broadcast Networks with Delayed CSIT

Degrees of Freedom of Multi-hop MIMO Broadcast Networks with Delayed CSIT Degrees of Freedom of Multi-hop MIMO Broadcast Networs with Delayed CSIT Zhao Wang, Ming Xiao, Chao Wang, and Miael Soglund arxiv:0.56v [cs.it] Oct 0 Abstract We study the sum degrees of freedom (DoF)

More information

Sets. Definition A set is an unordered collection of objects called elements or members of the set.

Sets. Definition A set is an unordered collection of objects called elements or members of the set. Sets Definition A set is an unordered collection of objects called elements or members of the set. Sets Definition A set is an unordered collection of objects called elements or members of the set. Examples:

More information

EELE 6333: Wireless Commuications

EELE 6333: Wireless Commuications EELE 6333: Wireless Commuications Chapter # 4 : Capacity of Wireless Channels Spring, 2012/2013 EELE 6333: Wireless Commuications - Ch.4 Dr. Musbah Shaat 1 / 18 Outline 1 Capacity in AWGN 2 Capacity of

More information

Transmission Scheduling in Capture-Based Wireless Networks

Transmission Scheduling in Capture-Based Wireless Networks ransmission Scheduling in Capture-Based Wireless Networks Gam D. Nguyen and Sastry Kompella Information echnology Division, Naval Research Laboratory, Washington DC 375 Jeffrey E. Wieselthier Wieselthier

More information

The Case for Transmitter Training

The Case for Transmitter Training he Case for ransmitter raining Christopher Steger, Ahmad Khoshnevis, Ashutosh Sabharwal, and Behnaam Aazhang Department of Electrical and Computer Engineering Rice University Houston, X 775, USA Email:

More information

Communications Overhead as the Cost of Constraints

Communications Overhead as the Cost of Constraints Communications Overhead as the Cost of Constraints J. Nicholas Laneman and Brian. Dunn Department of Electrical Engineering University of Notre Dame Email: {jnl,bdunn}@nd.edu Abstract This paper speculates

More information

Scheduling broadcasts with deadlines

Scheduling broadcasts with deadlines Theoretical Computer Science 325 (2004) 479 488 www.elsevier.com/locate/tcs Scheduling broadcasts with deadlines Jae-Hoon Kim a,, Kyung-Yong Chwa b a Department of Computer Engineering, Pusan University

More information

Lectures: Feb 27 + Mar 1 + Mar 3, 2017

Lectures: Feb 27 + Mar 1 + Mar 3, 2017 CS420+500: Advanced Algorithm Design and Analysis Lectures: Feb 27 + Mar 1 + Mar 3, 2017 Prof. Will Evans Scribe: Adrian She In this lecture we: Summarized how linear programs can be used to model zero-sum

More information

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 6, DECEMBER /$ IEEE

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 6, DECEMBER /$ IEEE IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 17, NO 6, DECEMBER 2009 1805 Optimal Channel Probing and Transmission Scheduling for Opportunistic Spectrum Access Nicholas B Chang, Student Member, IEEE, and Mingyan

More information

Energy Efficient Scheduling Techniques For Real-Time Embedded Systems

Energy Efficient Scheduling Techniques For Real-Time Embedded Systems Energy Efficient Scheduling Techniques For Real-Time Embedded Systems Rabi Mahapatra & Wei Zhao This work was done by Rajesh Prathipati as part of his MS Thesis here. The work has been update by Subrata

More information

Link Models for Circuit Switching

Link Models for Circuit Switching Link Models for Circuit Switching The basis of traffic engineering for telecommunication networks is the Erlang loss function. It basically allows us to determine the amount of telephone traffic that can

More information

Achieving Low Outage Probability with Network Coding in Wireless Multicarrier Multicast Systems

Achieving Low Outage Probability with Network Coding in Wireless Multicarrier Multicast Systems Achieving Low Outage Probability with Networ Coding in Wireless Multicarrier Multicast Systems Juan Liu, Wei Chen, Member, IEEE, Zhigang Cao, Senior Member, IEEE, Ying Jun (Angela) Zhang, Senior Member,

More information

Graphs and Network Flows IE411. Lecture 14. Dr. Ted Ralphs

Graphs and Network Flows IE411. Lecture 14. Dr. Ted Ralphs Graphs and Network Flows IE411 Lecture 14 Dr. Ted Ralphs IE411 Lecture 14 1 Review: Labeling Algorithm Pros Guaranteed to solve any max flow problem with integral arc capacities Provides constructive tool

More information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 2, FEBRUARY Srihari Adireddy, Student Member, IEEE, and Lang Tong, Fellow, IEEE

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 2, FEBRUARY Srihari Adireddy, Student Member, IEEE, and Lang Tong, Fellow, IEEE IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 2, FEBRUARY 2005 537 Exploiting Decentralized Channel State Information for Random Access Srihari Adireddy, Student Member, IEEE, and Lang Tong, Fellow,

More information

November 8, Chapter 8: Probability: The Mathematics of Chance

November 8, Chapter 8: Probability: The Mathematics of Chance Chapter 8: Probability: The Mathematics of Chance November 8, 2013 Last Time Probability Models and Rules Discrete Probability Models Equally Likely Outcomes Crystallographic notation The first symbol

More information

Disposition Strategies for Open Queueing Networks with Different Service Rates

Disposition Strategies for Open Queueing Networks with Different Service Rates Disposition Strategies for Open Queueing Networks with Different Service Rates Yu-Li Tsai*, Member IAENG, Daichi Yanagisawa, and Katsuhiro Nishinari Abstract In this paper, we consider a popular kind of

More information

On Hierarchical Pipeline Paging in Multi-Tier Overlaid Hierarchical Cellular Networks

On Hierarchical Pipeline Paging in Multi-Tier Overlaid Hierarchical Cellular Networks IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL., NO. 9, SEPTEMBER 9 On Hierarchical Pipeline Paging in Multi-Tier Overlaid Hierarchical Cellular Networks Yang Xiao, Senior Member, IEEE, Hui Chen, Member,

More information

MA10103: Foundation Mathematics I. Lecture Notes Week 3

MA10103: Foundation Mathematics I. Lecture Notes Week 3 MA10103: Foundation Mathematics I Lecture Notes Week 3 Indices/Powers In an expression a n, a is called the base and n is called the index or power or exponent. Multiplication/Division of Powers a 3 a

More information

Channel Probing in Communication Systems: Myopic Policies Are Not Always Optimal

Channel Probing in Communication Systems: Myopic Policies Are Not Always Optimal Channel Probing in Communication Systems: Myopic Policies Are Not Always Optimal Matt Johnston Massachusetts Institute of Technology Joint work with Eytan Modiano and Isaac Keslassy 07/11/13 Opportunistic

More information

Stability Regions of Two-Way Relaying with Network Coding

Stability Regions of Two-Way Relaying with Network Coding Stability Regions of Two-Way Relaying with Network Coding (Invited Paper) Ertugrul Necdet Ciftcioglu Department of Electrical Engineering The Pennsylvania State University University Park, PA 680 enc8@psu.edu

More information

Near-Optimal Radio Use For Wireless Network Synch. Synchronization

Near-Optimal Radio Use For Wireless Network Synch. Synchronization Near-Optimal Radio Use For Wireless Network Synchronization LANL, UCLA 10th of July, 2009 Motivation Consider sensor network: tiny, inexpensive embedded computers run complex software sense environmental

More information

NON-OVERLAPPING PERMUTATION PATTERNS. To Doron Zeilberger, for his Sixtieth Birthday

NON-OVERLAPPING PERMUTATION PATTERNS. To Doron Zeilberger, for his Sixtieth Birthday NON-OVERLAPPING PERMUTATION PATTERNS MIKLÓS BÓNA Abstract. We show a way to compute, to a high level of precision, the probability that a randomly selected permutation of length n is nonoverlapping. As

More information

Environments y. Nitin H. Vaidya Sohail Hameed. Phone: (409) FAX: (409)

Environments y. Nitin H. Vaidya Sohail Hameed.   Phone: (409) FAX: (409) Scheduling Data Broadcast in Asymmetric Communication Environments y Nitin H. Vaidya Sohail Hameed Department of Computer Science Texas A&M University College Station, TX 77843-3112 E-mail fvaidya,shameedg@cs.tamu.edu

More information

Randomized Channel Access Reduces Network Local Delay

Randomized Channel Access Reduces Network Local Delay Randomized Channel Access Reduces Network Local Delay Wenyi Zhang USTC Joint work with Yi Zhong (Ph.D. student) and Martin Haenggi (Notre Dame) 2013 Joint HK/TW Workshop on ITC CUHK, January 19, 2013 Acknowledgement

More information

Downlink Scheduler Optimization in High-Speed Downlink Packet Access Networks

Downlink Scheduler Optimization in High-Speed Downlink Packet Access Networks Downlink Scheduler Optimization in High-Speed Downlink Packet Access Networks Hussein Al-Zubaidy SCE-Carleton University 1125 Colonel By Drive, Ottawa, ON, Canada Email: hussein@sce.carleton.ca 21 August

More information

Punctured vs Rateless Codes for Hybrid ARQ

Punctured vs Rateless Codes for Hybrid ARQ Punctured vs Rateless Codes for Hybrid ARQ Emina Soljanin Mathematical and Algorithmic Sciences Research, Bell Labs Collaborations with R. Liu, P. Spasojevic, N. Varnica and P. Whiting Tsinghua University

More information

Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks

Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks Ka Hung Hui, Dongning Guo and Randall A. Berry Department of Electrical Engineering and Computer Science Northwestern

More information

On the Average Rate Performance of Hybrid-ARQ in Quasi-Static Fading Channels

On the Average Rate Performance of Hybrid-ARQ in Quasi-Static Fading Channels 1 On the Average Rate Performance of Hybrid-ARQ in Quasi-Static Fading Channels Cong Shen, Student Member, IEEE, Tie Liu, Member, IEEE, and Michael P. Fitz, Senior Member, IEEE Abstract The problem of

More information

CONSIDER THE following power capture model. If

CONSIDER THE following power capture model. If 254 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 45, NO. 2, FEBRUARY 1997 On the Capture Probability for a Large Number of Stations Bruce Hajek, Fellow, IEEE, Arvind Krishna, Member, IEEE, and Richard O.

More information

An interesting class of problems of a computational nature ask for the standard residue of a power of a number, e.g.,

An interesting class of problems of a computational nature ask for the standard residue of a power of a number, e.g., Binary exponentiation An interesting class of problems of a computational nature ask for the standard residue of a power of a number, e.g., What are the last two digits of the number 2 284? In the absence

More information

LECTURE 3: CONGRUENCES. 1. Basic properties of congruences We begin by introducing some definitions and elementary properties.

LECTURE 3: CONGRUENCES. 1. Basic properties of congruences We begin by introducing some definitions and elementary properties. LECTURE 3: CONGRUENCES 1. Basic properties of congruences We begin by introducing some definitions and elementary properties. Definition 1.1. Suppose that a, b Z and m N. We say that a is congruent to

More information

Distributed Broadcast Scheduling in Mobile Ad Hoc Networks with Unknown Topologies

Distributed Broadcast Scheduling in Mobile Ad Hoc Networks with Unknown Topologies Distributed Broadcast Scheduling in Mobile Ad Hoc Networks with Unknown Topologies Guang Tan, Stephen A. Jarvis, James W. J. Xue, and Simon D. Hammond Department of Computer Science, University of Warwick,

More information

On the Capacity Regions of Two-Way Diamond. Channels

On the Capacity Regions of Two-Way Diamond. Channels On the Capacity Regions of Two-Way Diamond 1 Channels Mehdi Ashraphijuo, Vaneet Aggarwal and Xiaodong Wang arxiv:1410.5085v1 [cs.it] 19 Oct 2014 Abstract In this paper, we study the capacity regions of

More information

Cross-Layer Design and Analysis of Wireless Networks Using the Effective Bandwidth Function

Cross-Layer Design and Analysis of Wireless Networks Using the Effective Bandwidth Function 1 Cross-Layer Design and Analysis of Wireless Networks Using the Effective Bandwidth Function Fumio Ishizaki, Member, IEEE, and Gang Uk Hwang, Member, IEEE Abstract In this paper, we propose a useful framework

More information

Analytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls

Analytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls Analytical Model for an IEEE 80.11 WLAN using DCF with Two Types of VoIP Calls Sri Harsha Anurag Kumar Vinod Sharma Department of Electrical Communication Engineering Indian Institute of Science Bangalore

More information

Introduction to Source Coding

Introduction to Source Coding Comm. 52: Communication Theory Lecture 7 Introduction to Source Coding - Requirements of source codes - Huffman Code Length Fixed Length Variable Length Source Code Properties Uniquely Decodable allow

More information

Some constructions of mutually orthogonal latin squares and superimposed codes

Some constructions of mutually orthogonal latin squares and superimposed codes University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers: Part A Faculty of Engineering and Information Sciences 2012 Some constructions of mutually orthogonal

More information

Random permutations avoiding some patterns

Random permutations avoiding some patterns Random permutations avoiding some patterns Svante Janson Knuth80 Piteå, 8 January, 2018 Patterns in a permutation Let S n be the set of permutations of [n] := {1,..., n}. If σ = σ 1 σ k S k and π = π 1

More information

11.7 Maximum and Minimum Values

11.7 Maximum and Minimum Values Arkansas Tech University MATH 2934: Calculus III Dr. Marcel B Finan 11.7 Maximum and Minimum Values Just like functions of a single variable, functions of several variables can have local and global extrema,

More information

Opportunistic Beamforming Using Dumb Antennas

Opportunistic Beamforming Using Dumb Antennas IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 48, NO. 6, JUNE 2002 1277 Opportunistic Beamforming Using Dumb Antennas Pramod Viswanath, Member, IEEE, David N. C. Tse, Member, IEEE, and Rajiv Laroia, Fellow,

More information

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS The 20 Military Communications Conference - Track - Waveforms and Signal Processing TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS Gam D. Nguyen, Jeffrey E. Wieselthier 2, Sastry Kompella,

More information