Random access protocols for channel access. Markov chains and their stability. Laurent Massoulié.
|
|
|
- Robert Hall
- 9 years ago
- Views:
Transcription
1 Random access protocols for channel access Markov chains and their stability
2 Aloha: the first random access protocol for channel access [Abramson, Hawaii 70] Goal: allow machines on remote islands to transmit by radio to «master machine» without heavy coordination between them
3 Aloha: the first random access protocol for channel access [Abramson, Hawaii 70] Goal: allow machines on remote islands to transmit by radio to «master machine» without heavy coordination between them Key idea: use randomization for scheduling transmissions to avoid collisions between transmitters
4 Aloha: the first random access protocol for channel access [Abramson, Hawaii 70] Goal: allow machines on remote islands to transmit by radio to «master machine» without heavy coordination between them Key idea: use randomization for scheduling transmissions to avoid collisions between transmitters A randomized, distributed algorithm
5 Aloha s principle s0 s1 Slotted time: fixed transmission intervals s2 Station with message to send: emits it with probability p
6 Aloha s principle s0 s1 Slotted time: fixed transmission intervals s2 Station with message to send: emits it with probability p By end of interval: learns whether msg successfully received, or not (due to collision or other interference) Repeat until no message left to be sent
7 Aloha s principle s0 s1 Slotted time: fixed transmission intervals s2 Station with message to send: emits it with probability p By end of interval: learns whether msg successfully received, or not (due to collision or other interference) Repeat until no message left to be sent Minimal feedback (only listen for ack after having emitted) implicit coordination by receiver s acknowledgement
8 Ethernet principles [Metcalfe, Xerox Parc 73] Machine emits on shared medium randomly: After k failed attempts, waits before retransmitting for random number of slots picked uniformy from {1,2,,2 k } (so-called contention window)
9 Ethernet principles [Metcalfe, Xerox Parc 73] Machine emits on shared medium randomly: After k failed attempts, waits before retransmitting for random number of slots picked uniformy from {1,2,,2 k } (so-called contention window) The exponential backoff method, a refinement over Aloha
10 Ethernet principles [Metcalfe, Xerox Parc 73] Machine emits on shared medium randomly: After k failed attempts, waits before retransmitting for random number of slots picked uniformy from {1,2,,2 k } (so-called contention window) The exponential backoff method, a refinement over Aloha Other refinement: sense channel before transmitting (allows to compete by random access only during small fraction of total time) Principles underly x (Wi-Fi) protocols
11 Goals Understand performance of random access protocols for given traffic, or demand, or workload offered to system (=process of message request arrivals), Does system transmit them all? Does it reach some steady state behaviour? How long do transmissions take?
12 Outline Introduction to Markov chain theory Fundamental notions (recurrence, irreducibility, ergodicity, transience) Criteria for ergodicity or transience Performance of Random Access Protocols Aloha with finitely many stations Aloha with an infinite number of stations Results for Ethernet and other variants
13 Markov chains E a countable set (e.g., N or [n] = {1,..., n})
14 Markov chains E a countable set (e.g., N or [n] = {1,..., n}) Definition: {X n } n N Markov chain with transition matrix P iff n > 0, x n 0 = {x 0,..., x n } E n+1, P(X n = x n X n 1 0 = x n 1 0 ) = P(X n = x n X n 1 = x n 1 ) = p xnx n 1 where x, y E, p xy 0 and z E p xz = 1 (i.e. P is a stochastic matrix)
15 Markov chains E a countable set (e.g., N or [n] = {1,..., n}) Definition: {X n } n N Markov chain with transition matrix P iff n > 0, x n 0 = {x 0,..., x n } E n+1, P(X n = x n X n 1 0 = x n 1 0 ) = P(X n = x n X n 1 = x n 1 ) = p xnx n 1 where x, y E, p xy 0 and z E p xz = 1 (i.e. P is a stochastic matrix) Canonical example X 0 independent of {Y n } n 0 an i.i.d. sequence, Y n E For some function f : E E E, n 0, X n+1 = f (X n, Y n )
16 Markov chains E a countable set (e.g., N or [n] = {1,..., n}) Definition: {X n } n N Markov chain with transition matrix P iff n > 0, x n 0 = {x 0,..., x n } E n+1, P(X n = x n X n 1 0 = x n 1 0 ) = P(X n = x n X n 1 = x n 1 ) = p xnx n 1 where x, y E, p xy 0 and z E p xz = 1 (i.e. P is a stochastic matrix) Canonical example X 0 independent of {Y n } n 0 an i.i.d. sequence, Y n E For some function f : E E E, n 0, X n+1 = f (X n, Y n ) Illustration: reflected Random Walk on N : X n+1 = max(0, X n + Y n )
17 Basic properties By induction P(X n+m n = xn n+m ) = P(X n = x n ) n+m i=n+1 p x i 1 x i P(X n+m 0 = x n+m 0 X n = x n ) = P(X n 1 0 = x n 1 0 X n = x n ) n+1 X n = x n ) P(X n+m n+1 = x n+m (past and future independent conditionally on present)
18 Basic properties By induction P(X n+m n = xn n+m ) = P(X n = x n ) n+m i=n+1 p x i 1 x i P(X n+m 0 = x n+m 0 X n = x n ) = P(X n 1 0 = x n 1 0 X n = x n ) n+1 X n = x n ) P(X n+m n+1 = x n+m (past and future independent conditionally on present) Noting p n x,y = P(X n = y X 0 = x), semi-group property: p n+m xy = z E p n xzp m zy
19 Basic properties By induction P(X n+m n = xn n+m ) = P(X n = x n ) n+m i=n+1 p x i 1 x i P(X n+m 0 = x n+m 0 X n = x n ) = P(X n 1 0 = x n 1 0 X n = x n ) n+1 X n = x n ) P(X n+m n+1 = x n+m (past and future independent conditionally on present) Noting p n x,y = P(X n = y X 0 = x), semi-group property: p n+m xy = z E p n xzp m zy Linear algebra interpretation For finite E (e.g. E = [k]), Matrix p n = n-th power of P
20 Further properties Denote P x ( ) = P( X 0 = x) distribution of chain started at 0
21 Further properties Denote P x ( ) = P( X 0 = x) distribution of chain started at 0 Def: T N {+ } stopping time iff n N, {T = n} is σ(x0 n )-measurable, i.e. φ n : E n+1 {0, 1} such that I T =n = φ n (X0 n) Key example T x := inf{n > 0 : X n = x}
22 Further properties Denote P x ( ) = P( X 0 = x) distribution of chain started at 0 Def: T N {+ } stopping time iff n N, {T = n} is σ(x0 n )-measurable, i.e. φ n : E n+1 {0, 1} such that I T =n = φ n (X0 n) Key example T x := inf{n > 0 : X n = x} Strong Markov property Markov chain X0 with transition matrix P, stopping time T Then conditionally on T < + and X T = x, X0 T and X T independent with X T P x
23 Positive recurrence, null recurrence, transience, periodicity State x is recurrent if P x (T x < + ) = 1 positive recurrent if E x (T x ) < + null recurrent if P x (T x < + ) = 1 & E x (T x ) = + transient if not recurrent, i.e. P x (T x < + ) < 1 d-periodic if d = GCD(n 0 : pxx n > 0)
24 Positive recurrence, null recurrence, transience, periodicity State x is recurrent if P x (T x < + ) = 1 positive recurrent if E x (T x ) < + null recurrent if P x (T x < + ) = 1 & E x (T x ) = + transient if not recurrent, i.e. P x (T x < + ) < 1 d-periodic if d = GCD(n 0 : pxx n > 0) Illustration: reflected random walk on N, S n+1 = max(0, S n + Y n ) State 0 is positive recurrent if E(Y n ) < 0 transient if E(Y n ) > 0 null recurrent if E(Y n ) = 0 & 0 < Var(Y n ) < +
25 Decomposition in cycles of recurrent chains Fix a state x that is recurrent (P x (T x < + ) = 1), Let T x,k = instant of k-th visit to state x Trajectory X 1 : concatenation of cycles C k := {X n } Tx,k <n T x,k+1 Strong Markov property cycles C k are i.i.d.
26 Irreducibility Markov chain is irreducible iff x, y E, n N, x n 0 E n+1 x 0 = x, x n = y & n i=1 p x i 1 x i > 0 i.e., graph on E with directed edge (x, y) iff p xy > 0 strongly connected
27 Irreducibility Markov chain is irreducible iff x, y E, n N, x n 0 E n+1 x 0 = x, x n = y & n i=1 p x i 1 x i > 0 i.e., graph on E with directed edge (x, y) iff p xy > 0 strongly connected Example Standard random walk on graph G irreducible iff G connected
28 Irreducibility Markov chain is irreducible iff x, y E, n N, x n 0 E n+1 x 0 = x, x n = y & n i=1 p x i 1 x i > 0 i.e., graph on E with directed edge (x, y) iff p xy > 0 strongly connected Example Standard random walk on graph G irreducible iff G connected Proposition For irreducible chain, if one state x is transient (resp. null recurrent, positive recurrent, d-periodic) then all are
29 Stationary measures Non-negative measure π on E is stationary for P iff x E, π x = y E π y p yx
30 Stationary measures Non-negative measure π on E is stationary for P iff x E, π x = y E π y p yx Notation: P ν := x E ν x P x chain s distribution when X 0 ν For stationary probability distribution π, n > 0, P π (X n ) = P π (X 0 )
31 Limit theorems 1 Recurrence and stationary measures Irreducible recurrent chain admits a stationary measure, unique up T x to multiplicative factor y E, π y = E x n=1 I Xn=y Irreducible chain admits a stationary probability distribution iff it is positive recurrent
32 Limit theorems 1 Recurrence and stationary measures Irreducible recurrent chain admits a stationary measure, unique up T x to multiplicative factor y E, π y = E x n=1 I Xn=y Irreducible chain admits a stationary probability distribution iff it is positive recurrent Ergodic theorem Irreducible, positive recurrent chain satisfies almost sure convergence 1 n lim f (X n ) = π x f (x) n n x E k=1 for all π-integrable f, where π = unique stationary distribution
33 Limit theorems 1 Recurrence and stationary measures Irreducible recurrent chain admits a stationary measure, unique up T x to multiplicative factor y E, π y = E x n=1 I Xn=y Irreducible chain admits a stationary probability distribution iff it is positive recurrent Ergodic theorem Irreducible, positive recurrent chain satisfies almost sure convergence 1 n lim f (X n ) = π x f (x) n n x E k=1 for all π-integrable f, where π = unique stationary distribution Such chains are called ergodic
34 Limit theorems 2 Convergence in distribution Ergodic, aperiodic chain satisfies x E, lim n P(X n = x) = π x where π: unique stationary distribution
35 Limit theorems 2 Convergence in distribution Ergodic, aperiodic chain satisfies x E, lim n P(X n = x) = π x where π: unique stationary distribution Converse Irreducible, non-ergodic chain satisfies x E, lim n P(X n = x) = 0
36 Foster-Lyapunov criterion for ergodicity Theorem An irreducible chain such that there exist V : E R +, a finite set K E and ɛ, b > 0 satisfying { ɛ, x / K, E(V (X n+1 ) V (X n ) X n = x) b ɛ, x K, is then ergodic.
37 Aloha with finitely many stations Stations s S, S < New arrivals at station s in slot n: A n,s N, {A n,s } n 0 i.i.d. Probability of transmission by s if message in queue: p s Source of randomness: {B n,s } n 0 i.i.d., Bernoulli(p s ) Transmits iff B n,s = 0 where B n,s = B n,s I Ln,s>0
38 Aloha with finitely many stations Stations s S, S < New arrivals at station s in slot n: A n,s N, {A n,s } n 0 i.i.d. Probability of transmission by s if message in queue: p s Source of randomness: {B n,s } n 0 i.i.d., Bernoulli(p s ) Transmits iff B n,s = 0 where B n,s = B n,s I Ln,s>0 Queue dynamics L n+1,s = L n,s + A n,s B n,s (1 B n,s ) s s
39 Aloha with finitely many stations Assume s, 0 < P(A n,s = 0) < 1 Then chain is irreducible and aperiodic Sufficient condition for ergodicity s, λ s := E(A n,s ) < p s (1 p s ) s s Sufficient condition for transience s, λ s > p s (1 p s ) s s
40 Aloha with finitely many stations Symmetric case λ s = λ/ S, p s p: Recurrence if λ < S p(1 p) S 1 Transience if λ > S p(1 p) S 1 To achieve stability (ergodicity) for fixed λ, need p 0 as S Impractical! (Collisions take forever to be resolved)
41 Aloha with infinitely many stations Many stations, very rarely active (just one message) A n new messages in interval n, {A n } n 0 i.i.d. Source of randomness {B n,i } n,i 0 i.i.d., Bernoulli (p) Queue evolution L n+1 = L n + A n I Ln i=1 B n,i =1 Assumption 0 < P(A n = 0) < 1 ensures irreducibility (and aperiodicity)
42 Aloha with infinitely many stations Abramson s heuristic argument For A n Poisson(λ), Nb of attempts per slot Poisson(G) for unknown G Hence successful transmission with probability Ge G per slot Solution to λ = Ge G exists for all λ < 1/e Hence Aloha should be stable (ergodic) whenever λ < 1/e
43 Aloha with infinitely many stations Abramson s heuristic argument For A n Poisson(λ), Nb of attempts per slot Poisson(G) for unknown G Hence successful transmission with probability Ge G per slot Solution to λ = Ge G exists for all λ < 1/e Hence Aloha should be stable (ergodic) whenever λ < 1/e Theorem: Instability of Aloha With probability 1, channel jammed forever ( L n i=1 B n,i > 1) after finite time. Hence only finite number of messages ever transmitted.
44 Fixing Aloha: richer feedback Assumption: L n known Backlog-dependent retransmission probability p n = 1/L n Then system ergodic if λ := E(A n ) < 1 e 0.368
45 Fixing Aloha: richer feedback Assumption: L n known Backlog-dependent retransmission probability p n = 1/L n Then system ergodic if λ := E(A n ) < 1 e Denote J n = {0, 1, } outcome of n-th channel use (0: no transmission. 1: single successful transmission. : collision)
46 Fixing Aloha: richer feedback Assumption: L n known Backlog-dependent retransmission probability p n = 1/L n Then system ergodic if λ := E(A n ) < 1 e Denote J n = {0, 1, } outcome of n-th channel use (0: no transmission. 1: single successful transmission. : collision) Weaker assumption: channel state J n heard by all stations Backlog-dependent retransmission probability p n = 1/ˆL n, where estimate ˆL n computed by ˆL n+1 = max(1, ˆL n + αi Jn= βi Jn=0) renders Markov chain (L n, ˆL n ) n 0 ergodic for suitable α, β > 0 if λ := E(A n ) < 1 e 0.368
47 Fixing Aloha: richer feedback With same ternary feedback J n = {0, 1, }, can stability hold for λ > 1/e? Yes: rather intricate protocols have been invented and shown to achieve stability up to λ = Largest λ for which some protocol based on this feedback is stable? Unknown (only bounds)
48 Ethernet and variants Return to Acknowledgement-based feedback (only listen channel s state after transmission) Variant of exponential backoff: transmit with probability 2 k after k collisions Assume A n Poisson (λ)
49 Ethernet and variants Return to Acknowledgement-based feedback (only listen channel s state after transmission) Variant of exponential backoff: transmit with probability 2 k after k collisions Assume A n Poisson (λ) Theorem: instability of Ethernet s variant For any λ > 0, (modification of) Ethernet is transient.
50 Ethernet and variants Return to Acknowledgement-based feedback (only listen channel s state after transmission) Variant of exponential backoff: transmit with probability 2 k after k collisions Assume A n Poisson (λ) Theorem: instability of Ethernet s variant For any λ > 0, (modification of) Ethernet is transient. Weaker performance guarantees Ethernet and its modification are such that with probability 1: For λ < ln(2) 0.693, infinite number of messages is transmitted For λ > ln(2), only finitely many messages are transmitted
51 Ethernet and variants Return to Acknowledgement-based feedback (only listen channel s state after transmission) Variant of exponential backoff: transmit with probability 2 k after k collisions Assume A n Poisson (λ) Theorem: instability of Ethernet s variant For any λ > 0, (modification of) Ethernet is transient. Weaker performance guarantees Ethernet and its modification are such that with probability 1: For λ < ln(2) 0.693, infinite number of messages is transmitted For λ > ln(2), only finitely many messages are transmitted Unsolved conjecture No acknowledgement-based scheme can induce a stable (ergodic) system for any λ > 0.
52 Conclusions on Random Access Protocols Mostly negative results in theory, both for Aloha and Ethernet, yet......in practice, Ethernet and Wi-Fi s x protocols perform well
53 Conclusions on Random Access Protocols Mostly negative results in theory, both for Aloha and Ethernet, yet......in practice, Ethernet and Wi-Fi s x protocols perform well Finite number of stations helps Time to instability could be huge ( metastable behavior) Only small fraction of channel time used for random access collision resolution: Once station wins channel access, others wait till its transmission is over
54 Conclusions on Random Access Protocols Mostly negative results in theory, both for Aloha and Ethernet, yet......in practice, Ethernet and Wi-Fi s x protocols perform well Finite number of stations helps Time to instability could be huge ( metastable behavior) Only small fraction of channel time used for random access collision resolution: Once station wins channel access, others wait till its transmission is over Alternative protocols based on ternary feedback have not been used
55 Takeaway messages Markov chain theory: framework for system and algorithm performance analysis
56 Takeaway messages Markov chain theory: framework for system and algorithm performance analysis Ergodicity (stability) analysis: Determines for what demands system stabilizes into steady state A first order performance index (know when delays remain stable, not their magnitude)
57 Takeaway messages Markov chain theory: framework for system and algorithm performance analysis Ergodicity (stability) analysis: Determines for what demands system stabilizes into steady state A first order performance index (know when delays remain stable, not their magnitude) Foster-Lyapunov criteria to prove ergodicity
58 Takeaway messages Markov chain theory: framework for system and algorithm performance analysis Ergodicity (stability) analysis: Determines for what demands system stabilizes into steady state A first order performance index (know when delays remain stable, not their magnitude) Foster-Lyapunov criteria to prove ergodicity Simple questions on performance of Random Access yet unsolved, and results more negative than positive
59 Takeaway messages Markov chain theory: framework for system and algorithm performance analysis Ergodicity (stability) analysis: Determines for what demands system stabilizes into steady state A first order performance index (know when delays remain stable, not their magnitude) Foster-Lyapunov criteria to prove ergodicity Simple questions on performance of Random Access yet unsolved, and results more negative than positive Still, analysis of Aloha has led to new insights and new designs such as Ethernet
LECTURE 4. Last time: Lecture outline
LECTURE 4 Last time: Types of convergence Weak Law of Large Numbers Strong Law of Large Numbers Asymptotic Equipartition Property Lecture outline Stochastic processes Markov chains Entropy rate Random
ECE 333: Introduction to Communication Networks Fall 2002
ECE 333: Introduction to Communication Networks Fall 2002 Lecture 14: Medium Access Control II Dynamic Channel Allocation Pure Aloha In the last lecture we began discussing medium access control protocols
LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks
LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer
EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers
EECS 122: Introduction to Computer Networks Multiaccess Protocols Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776
Master s Theory Exam Spring 2006
Spring 2006 This exam contains 7 questions. You should attempt them all. Each question is divided into parts to help lead you through the material. You should attempt to complete as much of each problem
Probability Generating Functions
page 39 Chapter 3 Probability Generating Functions 3 Preamble: Generating Functions Generating functions are widely used in mathematics, and play an important role in probability theory Consider a sequence
The Exponential Distribution
21 The Exponential Distribution From Discrete-Time to Continuous-Time: In Chapter 6 of the text we will be considering Markov processes in continuous time. In a sense, we already have a very good understanding
IEOR 6711: Stochastic Models, I Fall 2012, Professor Whitt, Final Exam SOLUTIONS
IEOR 6711: Stochastic Models, I Fall 2012, Professor Whitt, Final Exam SOLUTIONS There are four questions, each with several parts. 1. Customers Coming to an Automatic Teller Machine (ATM) (30 points)
TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL
1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint
M/M/1 and M/M/m Queueing Systems
M/M/ and M/M/m Queueing Systems M. Veeraraghavan; March 20, 2004. Preliminaries. Kendall s notation: G/G/n/k queue G: General - can be any distribution. First letter: Arrival process; M: memoryless - exponential
Network Protocol Design and Evaluation
Network Protocol Design and Evaluation 08 - Analytical Evaluation Stefan Rührup Summer 2009 Overview In the last chapter: Simulation In this part: Analytical Evaluation: case studies 2 Analytical Evaluation
On the mathematical theory of splitting and Russian roulette
On the mathematical theory of splitting and Russian roulette techniques St.Petersburg State University, Russia 1. Introduction Splitting is an universal and potentially very powerful technique for increasing
Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
Structure Preserving Model Reduction for Logistic Networks
Structure Preserving Model Reduction for Logistic Networks Fabian Wirth Institute of Mathematics University of Würzburg Workshop on Stochastic Models of Manufacturing Systems Einhoven, June 24 25, 2010.
Supplement to Call Centers with Delay Information: Models and Insights
Supplement to Call Centers with Delay Information: Models and Insights Oualid Jouini 1 Zeynep Akşin 2 Yves Dallery 1 1 Laboratoire Genie Industriel, Ecole Centrale Paris, Grande Voie des Vignes, 92290
1 Gambler s Ruin Problem
Coyright c 2009 by Karl Sigman 1 Gambler s Ruin Problem Let N 2 be an integer and let 1 i N 1. Consider a gambler who starts with an initial fortune of $i and then on each successive gamble either wins
The Ergodic Theorem and randomness
The Ergodic Theorem and randomness Peter Gács Department of Computer Science Boston University March 19, 2008 Peter Gács (Boston University) Ergodic theorem March 19, 2008 1 / 27 Introduction Introduction
Lecture 13: Martingales
Lecture 13: Martingales 1. Definition of a Martingale 1.1 Filtrations 1.2 Definition of a martingale and its basic properties 1.3 Sums of independent random variables and related models 1.4 Products of
Lectures on Stochastic Processes. William G. Faris
Lectures on Stochastic Processes William G. Faris November 8, 2001 2 Contents 1 Random walk 7 1.1 Symmetric simple random walk................... 7 1.2 Simple random walk......................... 9 1.3
Introduction to Markov Chain Monte Carlo
Introduction to Markov Chain Monte Carlo Monte Carlo: sample from a distribution to estimate the distribution to compute max, mean Markov Chain Monte Carlo: sampling using local information Generic problem
Stochastic Models for Inventory Management at Service Facilities
Stochastic Models for Inventory Management at Service Facilities O. Berman, E. Kim Presented by F. Zoghalchi University of Toronto Rotman School of Management Dec, 2012 Agenda 1 Problem description Deterministic
Load Balancing and Switch Scheduling
EE384Y Project Final Report Load Balancing and Switch Scheduling Xiangheng Liu Department of Electrical Engineering Stanford University, Stanford CA 94305 Email: [email protected] Abstract Load
Monte Carlo-based statistical methods (MASM11/FMS091)
Monte Carlo-based statistical methods (MASM11/FMS091) Jimmy Olsson Centre for Mathematical Sciences Lund University, Sweden Lecture 5 Sequential Monte Carlo methods I February 5, 2013 J. Olsson Monte Carlo-based
ALGORITHMIC TRADING WITH MARKOV CHAINS
June 16, 2010 ALGORITHMIC TRADING WITH MARKOV CHAINS HENRIK HULT AND JONAS KIESSLING Abstract. An order book consists of a list of all buy and sell offers, represented by price and quantity, available
ECE302 Spring 2006 HW4 Solutions February 6, 2006 1
ECE302 Spring 2006 HW4 Solutions February 6, 2006 1 Solutions to HW4 Note: Most of these solutions were generated by R. D. Yates and D. J. Goodman, the authors of our textbook. I have added comments in
CS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA
n k=1 k=0 1/k! = e. Example 6.4. The series 1/k 2 converges in R. Indeed, if s n = n then k=1 1/k, then s 2n s n = 1 n + 1 +...
6 Series We call a normed space (X, ) a Banach space provided that every Cauchy sequence (x n ) in X converges. For example, R with the norm = is an example of Banach space. Now let (x n ) be a sequence
Estimating the Degree of Activity of jumps in High Frequency Financial Data. joint with Yacine Aït-Sahalia
Estimating the Degree of Activity of jumps in High Frequency Financial Data joint with Yacine Aït-Sahalia Aim and setting An underlying process X = (X t ) t 0, observed at equally spaced discrete times
Monte Carlo and Empirical Methods for Stochastic Inference (MASM11/FMS091)
Monte Carlo and Empirical Methods for Stochastic Inference (MASM11/FMS091) Magnus Wiktorsson Centre for Mathematical Sciences Lund University, Sweden Lecture 5 Sequential Monte Carlo methods I February
Hydrodynamic Limits of Randomized Load Balancing Networks
Hydrodynamic Limits of Randomized Load Balancing Networks Kavita Ramanan and Mohammadreza Aghajani Brown University Stochastic Networks and Stochastic Geometry a conference in honour of François Baccelli
Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh
Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh Peter Richtárik Week 3 Randomized Coordinate Descent With Arbitrary Sampling January 27, 2016 1 / 30 The Problem
1. (First passage/hitting times/gambler s ruin problem:) Suppose that X has a discrete state space and let i be a fixed state. Let
Copyright c 2009 by Karl Sigman 1 Stopping Times 1.1 Stopping Times: Definition Given a stochastic process X = {X n : n 0}, a random time τ is a discrete random variable on the same probability space as
Algebraic and Transcendental Numbers
Pondicherry University July 2000 Algebraic and Transcendental Numbers Stéphane Fischler This text is meant to be an introduction to algebraic and transcendental numbers. For a detailed (though elementary)
Wald s Identity. by Jeffery Hein. Dartmouth College, Math 100
Wald s Identity by Jeffery Hein Dartmouth College, Math 100 1. Introduction Given random variables X 1, X 2, X 3,... with common finite mean and a stopping rule τ which may depend upon the given sequence,
The Random Waypoint Mobility Model with Uniform Node Spatial Distribution
Noname manuscript No. (will be inserted by the editor) The Random Waypoint Mobility Model with Uniform Node Spatial Distribution Dieter Mitsche Giovanni Resta Paolo Santi Abstract In this paper, we tackle
MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 5 9/17/2008 RANDOM VARIABLES
MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 5 9/17/2008 RANDOM VARIABLES Contents 1. Random variables and measurable functions 2. Cumulative distribution functions 3. Discrete
a. CSMA/CD is a random-access protocol. b. Polling is a controlled-access protocol. c. TDMA is a channelization protocol.
CHAPTER 12 PRACTICE SET Questions Q12-1. The answer is CSM/CD. a. CSMA/CD is a random-access protocol. b. Polling is a controlled-access protocol. c. TDMA is a channelization protocol. Q12-3. The answer
Department of Mathematics, Indian Institute of Technology, Kharagpur Assignment 2-3, Probability and Statistics, March 2015. Due:-March 25, 2015.
Department of Mathematics, Indian Institute of Technology, Kharagpur Assignment -3, Probability and Statistics, March 05. Due:-March 5, 05.. Show that the function 0 for x < x+ F (x) = 4 for x < for x
A Uniform Asymptotic Estimate for Discounted Aggregate Claims with Subexponential Tails
12th International Congress on Insurance: Mathematics and Economics July 16-18, 2008 A Uniform Asymptotic Estimate for Discounted Aggregate Claims with Subexponential Tails XUEMIAO HAO (Based on a joint
Modeling and Performance Evaluation of Computer Systems Security Operation 1
Modeling and Performance Evaluation of Computer Systems Security Operation 1 D. Guster 2 St.Cloud State University 3 N.K. Krivulin 4 St.Petersburg State University 5 Abstract A model of computer system
Cooperative Multiple Access for Wireless Networks: Protocols Design and Stability Analysis
Cooperative Multiple Access for Wireless Networks: Protocols Design and Stability Analysis Ahmed K. Sadek, K. J. Ray Liu, and Anthony Ephremides Department of Electrical and Computer Engineering, and Institute
IEOR 6711: Stochastic Models I Fall 2012, Professor Whitt, Tuesday, September 11 Normal Approximations and the Central Limit Theorem
IEOR 6711: Stochastic Models I Fall 2012, Professor Whitt, Tuesday, September 11 Normal Approximations and the Central Limit Theorem Time on my hands: Coin tosses. Problem Formulation: Suppose that I have
Gambling and Data Compression
Gambling and Data Compression Gambling. Horse Race Definition The wealth relative S(X) = b(x)o(x) is the factor by which the gambler s wealth grows if horse X wins the race, where b(x) is the fraction
Message-passing sequential detection of multiple change points in networks
Message-passing sequential detection of multiple change points in networks Long Nguyen, Arash Amini Ram Rajagopal University of Michigan Stanford University ISIT, Boston, July 2012 Nguyen/Amini/Rajagopal
Reinforcement Learning
Reinforcement Learning LU 2 - Markov Decision Problems and Dynamic Programming Dr. Martin Lauer AG Maschinelles Lernen und Natürlichsprachliche Systeme Albert-Ludwigs-Universität Freiburg [email protected]
CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006
CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)
Big Data Technology Motivating NoSQL Databases: Computing Page Importance Metrics at Crawl Time
Big Data Technology Motivating NoSQL Databases: Computing Page Importance Metrics at Crawl Time Edward Bortnikov & Ronny Lempel Yahoo! Labs, Haifa Class Outline Link-based page importance measures Why
Reliability Guarantees in Automata Based Scheduling for Embedded Control Software
1 Reliability Guarantees in Automata Based Scheduling for Embedded Control Software Santhosh Prabhu, Aritra Hazra, Pallab Dasgupta Department of CSE, IIT Kharagpur West Bengal, India - 721302. Email: {santhosh.prabhu,
On the Traffic Capacity of Cellular Data Networks. 1 Introduction. T. Bonald 1,2, A. Proutière 1,2
On the Traffic Capacity of Cellular Data Networks T. Bonald 1,2, A. Proutière 1,2 1 France Telecom Division R&D, 38-40 rue du Général Leclerc, 92794 Issy-les-Moulineaux, France {thomas.bonald, alexandre.proutiere}@francetelecom.com
Random Access Protocols
Lecture Today slotted vs unslotted ALOHA Carrier sensing multiple access Ethernet DataLink Layer 1 Random Access Protocols When node has packet to send transmit at full channel data rate R. no a priori
1. Prove that the empty set is a subset of every set.
1. Prove that the empty set is a subset of every set. Basic Topology Written by Men-Gen Tsai email: [email protected] Proof: For any element x of the empty set, x is also an element of every set since
INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS
INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS STEVEN P. LALLEY AND ANDREW NOBEL Abstract. It is shown that there are no consistent decision rules for the hypothesis testing problem
2WB05 Simulation Lecture 8: Generating random variables
2WB05 Simulation Lecture 8: Generating random variables Marko Boon http://www.win.tue.nl/courses/2wb05 January 7, 2013 Outline 2/36 1. How do we generate random variables? 2. Fitting distributions Generating
Reinforcement Learning
Reinforcement Learning LU 2 - Markov Decision Problems and Dynamic Programming Dr. Joschka Bödecker AG Maschinelles Lernen und Natürlichsprachliche Systeme Albert-Ludwigs-Universität Freiburg [email protected]
Stationary random graphs on Z with prescribed iid degrees and finite mean connections
Stationary random graphs on Z with prescribed iid degrees and finite mean connections Maria Deijfen Johan Jonasson February 2006 Abstract Let F be a probability distribution with support on the non-negative
SOME APPLICATIONS OF MARTINGALES TO PROBABILITY THEORY
SOME APPLICATIONS OF MARTINGALES TO PROBABILITY THEORY WATSON LADD Abstract. Martingales are a very simple concept with wide application in probability. We introduce the concept of a martingale, develop
Analysis of a Production/Inventory System with Multiple Retailers
Analysis of a Production/Inventory System with Multiple Retailers Ann M. Noblesse 1, Robert N. Boute 1,2, Marc R. Lambrecht 1, Benny Van Houdt 3 1 Research Center for Operations Management, University
U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009. Notes on Algebra
U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009 Notes on Algebra These notes contain as little theory as possible, and most results are stated without proof. Any introductory
Theorem (informal statement): There are no extendible methods in David Chalmers s sense unless P = NP.
Theorem (informal statement): There are no extendible methods in David Chalmers s sense unless P = NP. Explication: In his paper, The Singularity: A philosophical analysis, David Chalmers defines an extendible
Techniques algébriques en calcul quantique
Techniques algébriques en calcul quantique E. Jeandel Laboratoire de l Informatique du Parallélisme LIP, ENS Lyon, CNRS, INRIA, UCB Lyon 8 Avril 25 E. Jeandel, LIP, ENS Lyon Techniques algébriques en calcul
Lecture 22: November 10
CS271 Randomness & Computation Fall 2011 Lecture 22: November 10 Lecturer: Alistair Sinclair Based on scribe notes by Rafael Frongillo Disclaimer: These notes have not been subjected to the usual scrutiny
Markov Chains. Chapter 4. 4.1 Stochastic Processes
Chapter 4 Markov Chains 4 Stochastic Processes Often, we need to estimate probabilities using a collection of random variables For example, an actuary may be interested in estimating the probability that
An example of a computable
An example of a computable absolutely normal number Verónica Becher Santiago Figueira Abstract The first example of an absolutely normal number was given by Sierpinski in 96, twenty years before the concept
Essentials of Stochastic Processes
i Essentials of Stochastic Processes Rick Durrett 70 60 50 10 Sep 10 Jun 10 May at expiry 40 30 20 10 0 500 520 540 560 580 600 620 640 660 680 700 Almost Final Version of the 2nd Edition, December, 2011
FINITE DIMENSIONAL ORDERED VECTOR SPACES WITH RIESZ INTERPOLATION AND EFFROS-SHEN S UNIMODULARITY CONJECTURE AARON TIKUISIS
FINITE DIMENSIONAL ORDERED VECTOR SPACES WITH RIESZ INTERPOLATION AND EFFROS-SHEN S UNIMODULARITY CONJECTURE AARON TIKUISIS Abstract. It is shown that, for any field F R, any ordered vector space structure
Math 181 Handout 16. Rich Schwartz. March 9, 2010
Math 8 Handout 6 Rich Schwartz March 9, 200 The purpose of this handout is to describe continued fractions and their connection to hyperbolic geometry. The Gauss Map Given any x (0, ) we define γ(x) =
Polarization codes and the rate of polarization
Polarization codes and the rate of polarization Erdal Arıkan, Emre Telatar Bilkent U., EPFL Sept 10, 2008 Channel Polarization Given a binary input DMC W, i.i.d. uniformly distributed inputs (X 1,...,
Performance Analysis of a Telephone System with both Patient and Impatient Customers
Performance Analysis of a Telephone System with both Patient and Impatient Customers Yiqiang Quennel Zhao Department of Mathematics and Statistics University of Winnipeg Winnipeg, Manitoba Canada R3B 2E9
1/3 1/3 1/3 0.4 0.4 0.4 0.4 0.4 0.4 0.4 0 1 2 3 4 5 6 7 8 0.6 0.6 0.6 0.6 0.6 0.6 0.6
HOMEWORK 4: SOLUTIONS. 2. A Markov chain with state space {, 2, 3} has transition probability matrix /3 /3 /3 P = 0 /2 /2 0 0 Show that state 3 is absorbing and, starting from state, find the expected
6.2 Permutations continued
6.2 Permutations continued Theorem A permutation on a finite set A is either a cycle or can be expressed as a product (composition of disjoint cycles. Proof is by (strong induction on the number, r, of
Corrected Diffusion Approximations for the Maximum of Heavy-Tailed Random Walk
Corrected Diffusion Approximations for the Maximum of Heavy-Tailed Random Walk Jose Blanchet and Peter Glynn December, 2003. Let (X n : n 1) be a sequence of independent and identically distributed random
Chapter 1. Introduction
Chapter 1 Introduction 1.1. Motivation Network performance analysis, and the underlying queueing theory, was born at the beginning of the 20th Century when two Scandinavian engineers, Erlang 1 and Engset
Gambling Systems and Multiplication-Invariant Measures
Gambling Systems and Multiplication-Invariant Measures by Jeffrey S. Rosenthal* and Peter O. Schwartz** (May 28, 997.. Introduction. This short paper describes a surprising connection between two previously
Math 431 An Introduction to Probability. Final Exam Solutions
Math 43 An Introduction to Probability Final Eam Solutions. A continuous random variable X has cdf a for 0, F () = for 0 <
How To Make A Multi-User Communication Efficient
Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the
Nonlinear Algebraic Equations. Lectures INF2320 p. 1/88
Nonlinear Algebraic Equations Lectures INF2320 p. 1/88 Lectures INF2320 p. 2/88 Nonlinear algebraic equations When solving the system u (t) = g(u), u(0) = u 0, (1) with an implicit Euler scheme we have
Homework set 4 - Solutions
Homework set 4 - Solutions Math 495 Renato Feres Problems R for continuous time Markov chains The sequence of random variables of a Markov chain may represent the states of a random system recorded at
Near Optimal Solutions
Near Optimal Solutions Many important optimization problems are lacking efficient solutions. NP-Complete problems unlikely to have polynomial time solutions. Good heuristics important for such problems.
Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD
Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch
Answer: that dprop equals dtrans. seconds. a) d prop. b) d trans
Chapter 1 1) p. 98: P-6 This elementary problem begins to explore propagation delay and transmission delay, two central concepts in data networking. Consider two hosts, A and B, connected by single link
Stochastic Inventory Control
Chapter 3 Stochastic Inventory Control 1 In this chapter, we consider in much greater details certain dynamic inventory control problems of the type already encountered in section 1.3. In addition to the
HOMEWORK 5 SOLUTIONS. n!f n (1) lim. ln x n! + xn x. 1 = G n 1 (x). (2) k + 1 n. (n 1)!
Math 7 Fall 205 HOMEWORK 5 SOLUTIONS Problem. 2008 B2 Let F 0 x = ln x. For n 0 and x > 0, let F n+ x = 0 F ntdt. Evaluate n!f n lim n ln n. By directly computing F n x for small n s, we obtain the following
UNIT 2 QUEUING THEORY
UNIT 2 QUEUING THEORY LESSON 24 Learning Objective: Apply formulae to find solution that will predict the behaviour of the single server model II. Apply formulae to find solution that will predict the
Voice Service Support over Cognitive Radio Networks
Voice Service Support over Cognitive Radio Networks Ping Wang, Dusit Niyato, and Hai Jiang Centre For Multimedia And Network Technology (CeMNeT), School of Computer Engineering, Nanyang Technological University,
What is Linear Programming?
Chapter 1 What is Linear Programming? An optimization problem usually has three essential ingredients: a variable vector x consisting of a set of unknowns to be determined, an objective function of x to
How to Gamble If You Must
How to Gamble If You Must Kyle Siegrist Department of Mathematical Sciences University of Alabama in Huntsville Abstract In red and black, a player bets, at even stakes, on a sequence of independent games
