PDF  PubReader

Fountoulakis , Charalambous , Nomikos , Ephremides , and Pappas: Information Freshness and Packet Drop Rate Interplay in a Two-User Multi-Access Channel

Emmanouil Fountoulakis , Themistoklis Charalambous , Nikolaos Nomikos , Anthony Ephremides and Nikolaos Pappas

Information Freshness and Packet Drop Rate Interplay in a Two-User Multi-Access Channel

Abstract: In this work, we combine the two notions of timely delivery of information to study their interplay; namely, deadlineconstrained packet delivery due to latency constraints and freshness of information. More specifically, we consider a twouser multiple access setup with random access, in which user 1 is a wireless device with a buffer and has external bursty traffic which is deadline-constrained, while user 2 monitors a sensor and transmits status updates to the destination. We provide analytical expressions for the throughput and drop probability of user 1. For user 2, we derive in closed form the age of information distribution, the average age of information (AoI), and the probability the AoI to be larger than a certain value for each time slot. The relations reveal a trade-off between the average AoI of user 2 and the drop rate of user 1: the lower the average AoI, the higher the drop rate, and vice versa. Simulations corroborate the validity of our theoretical results.

Keywords: Age of information , deadline-constrained traffic , multi-access channel , random access

I. INTRODUCTION

The proliferation of inexpensive devices with impressive sensing, computing, and control capabilities has lead to their widespread use in modern control environments which are often referred to as wireless networked control systems (WNCSs). Wireless sensors offer several advantages compared to their wired counterparts, such as scalability and flexibility in deployment at a lower cost, while at the same time they facilitate breaking new disruptive technologies into the market, such as autonomous vehicles, wireless industrial automation, environmental, and health monitoring, to name a few [2], [3]. In such scenarios, however, often a shared wireless network is used for information exchange, which introduces unique challenges that need to be addressed to avoid degradation of performance or even loss of stability [4]. This setup accentuates the need for developing efficient algorithms offering timely delivery of information updates. On several occasions, this requires information to arrive at the destination within a certain period (deadline-constrained) due to stringent requirements in terms of latency, while in other cases, it is required to keep the information at the destination as fresh as possible. Information timeliness or freshness at the destination is captured by a new metric, called the age of information (AoI) [5], [6]. It was first introduced in [7], and it is defined as the time elapsed since the generation of the status update that was most recently received by a destination. In this work, we consider a two-user multiple access setup with heterogeneous traffic characteristics: one user with external bursty traffic which is deadline-constrained, while the other user monitors a sensor that transmits status updates, in the form of packets, to the destination; this is depicted in Fig. 1. The considered setup is expected to occur in several scenarios in wireless industrial automation (Industry 4.0), in which several processes are required to be completed within a predetermined timeline, and various processes are the preceding or the following of another and sensing the state of the system (or the preceding/following process) is essential.

A. Related Works

Systems with deadline-constrained traffic have been considered almost two decades ago [8]. Packets with deadlines are connected with the notion of timely throughput, which measures the average number of successful deliveries before the deadline expiration. Recently, there has been a renewed interest in studying the performance of systems with deadline-constrained traffic [9], especially due to the ongoing automation of traditional manufacturing and industrial practices, under the fourth industrial revolution. For example, the works in [10]–[13] consider optimal scheduling schemes for traffic with deadlines. The works in [14], [15], study the performance of random access deadline-constrained wireless networks. In [16], [17], the authors analyze the benefits of scheduling based on exploiting variable transmission times in multi-channel wireless systems with heterogeneous traffic flows. In [18], the authors consider a joint scheduling-andpower- allocation problem of a downlink cellular system with real-time and non-real-time users. The authors proposed an algorithm that satisfies the hard deadline requirements for the real-time users and stability constraints for the non-real-time ones. In [19], a dynamic algorithm that solves the problem of minimizing packet drop rate in deadline-constrained traffic by optimizing power allocation under average power consumption

Fig. 1.

An illustrative example of the system model. User 1 has deadlineconstrained bursty traffic, while user 2 monitors a sensor and its traffic is AoI-oriented.
1.png

constraints was proposed. The work in [20] considers a mixed type of traffic with deadline-constrained users and users with minimum throughput requirements. A dynamic algorithm is proposed for minimizing the packet drop rate while satisfying the throughput and average power consumption constraints. In [21], the authors consider a wireless system that includes users with buffers handling packets with deadlines and users with buffers handling queues with packet arrivals. In this context, the problem considered is to minimize the drop rate while guaranteeing queueing stability. The authors propose a dynamic scheduling algorithm by utilizing tools from Lyapunov optimization theory and Markov decision theory. Furthermore, there is a line of works that studies the optimal number of retransmissions of a packet before its deadline expiration [22]–[24].

Recently, the optimization and analysis of the average age of information have attracted a lot of attention; see, for example, [25]–[34]. In [25], the authors consider the link scheduling problem in a multiple users system under age of information constraints. In [26], the authors consider the age of information minimization problem in an Internet of things (IoT) system in which packets arrive with either random or fixed deadlines. In addition, some works consider the transmission of status updates that arrive randomly at the users, [28], [29], [31]. The goal of these works is to find an optimal scheduling policy to minimize the average age of information. Furthermore, the mechanism of generate-at-will has been considered in the literature. In these cases, the user can sample fresh information at will, [30]–[33]. It has been shown, that whenever this is possible, the age of information of the system can be improved as well as the management of the resources.

There is a line of papers that consider the interplay of AoI with throughput or latency. For example, in [35], the authors consider age of information-oriented users and users with random packet arrivals. The goal is to minimize the average age of information while guaranteeing queueing stability of the users with the random packet arrivals. The work in [36] derives optimal status updating policies for a system with a source-destination pair that communicates via a wireless link, whereby the source node is comprised of a buffer and serves two traffic flows, one that is AoI sensitive and one that is throughput oriented. In [37], the authors consider a system with an age of information-oriented user, and a user with packets with deadlines. In this work, one user can transmit per time slot. The age of information minimization problem is considered under timely throughput constraints. In [38], the authors study the performance of a multiple access channel with heterogeneous traffic: One grid-connected node has bursty data arrivals and another node with energy harvesting capabilities sends status updates to a common destination. The work closer to our work is [39], in which the interplay between delay violation probability and average AoI in a two-user wireless multiple-access channel with multi packet reception (MPR) capability is studied. Nevertheless, the authors do not consider packets with deadlines and they do not discard a packet even if the delay is larger than a threshold. On the other hand, we consider a user with packets with deadlines, and therefore, we have to cope with a number of dropped packets. This changes fundamentally the problem and a different analysis approach is needed to be investigated.

B. Contributions

In this work, we study the interplay of deadline-constrained traffic and the information freshness in a two-user random access channel with MPR capabilities. The deadline-constrained user has external bursty traffic modeled by a Bernoulli process, and the incoming packets are stored in its buffer. Each packet has a predefined deadline, by which if it has not been received by the destination then it is dropped from the system. The second user monitors a sensor and generates status updates at will in a timeslot. Even though this setup is small, it is tractable to analyze and it serves as a building block for more advanced setups.

The contributions of this work are the following.

1) For the deadline-constrained user, we provide the distribution of the waiting time of a packet and the expression for the drop rate.

2) For the age of information-oriented user, we provide the distribution of the age of information, the average age of information, and the probability the age of information to be larger than a value for each time slot.

3) We validate the accuracy of our analytical findings with simulations.

3) We validate the accuracy of our analytical findings with simulations.

The results show a trade-off between the average AoI of user 2 and the drop rate of user 1: The lower the average AoI, the higher the drop rate, and vice versa. This is expected, since for reducing either the drop rate or the average AoI, the probability of transmission of the corresponding user should increase, causing interference to the other user.

II. SYSTEM MODEL

We consider two users transmitting their information in form of packets over a wireless fading channel to a receiver as shown in Fig. 1. Time is assumed to be slotted. Lets [TeX:] $$t \in \mathbb{Z}_{+}$$ denote the tth slot.

At each time slot t, a packet arrives in the buffer of user 1 with arrival probability [TeX:] $$\lambda.$$ Each packet j of user 1 has a deadline of [TeX:] $$d_{j}$$ slots since its arrival. Therefore, the packet must be successfully transmitted within [TeX:] $$d_{j}$$ slots; otherwise, it is dropped and discarded from the system. For simplicity of exposition, we assume that [TeX:] $$d_{j}$$ is the same for all packets, i.e., [TeX:] $$d_{j}=d, \forall j,$$ which is usually the case of packets that belong to the same traffic flow. User 1 attempts for transmission, when its buffer is non-empty, with probability [TeX:] $$q_{1}$$ at each time slot.

At each time slot t, user 2, with probability [TeX:] $$q_{2},$$ samples “fresh” information and attempts to transmit it in form of a packet. We consider that the procedures of sampling together with transmission take one time slot. User 2 discards the sampled packet after the attempted transmission.

A. Physical Layer Model

We consider that a packet from user i is successfully transmitted to the receiver if and only if the signal-to-noise ratio or signal-to-interference-and-noise ratio (without or with interference, respectively) is above a certain threshold [TeX:] $$\gamma_{i},$$ i.e., [TeX:] $$\operatorname{SINR}_{i} \geq \gamma_{i} . \text { Let } P_{\mathrm{tx}, i}$$ be the transmit power of user i, and [TeX:] $$\boldsymbol{r}_{i}$$ be the distance between user i and the receiver. The received power, when user i transmits, is [TeX:] $$P_{\mathrm{rx}, i}=h_{i} s_{i},$$ where [TeX:] $$h_{i}$$ is a random variable (RV) representing small-scale fading and [TeX:] $$s_{i}$$ is the received power factor. Under Rayleigh fading, [TeX:] $$h_{i}$$ is exponentially distributed [40]. The received power factor [TeX:] $$S_{i}$$ is given by [TeX:] $$s_{i}=P_{\mathrm{tx}, i} r_{i}^{-\alpha}, \text { where } \alpha$$ is the path loss exponent. When only user i transmits, the successful transmission probability for user i is given by [TeX:] $$P_{i / i}=\exp \left(-\frac{\gamma_{i} \eta}{v_{i} s_{i}}\right) \text {, where } v_{i}$$ is the parameter of the Rayleigh fading RV [TeX:] $$\text { (i.e., } h_{i} \sim \text { Rayleigh }\left(v_{i}\right) \text { ) }, \text { and } \eta$$ is the noise power at the receiver. When both users transmit, the successful transmission probability for user i is given by [41, Theorem 1]

(1)
[TeX:] $$P_{i / i, j}=\exp \left(-\frac{\gamma_{i} \eta}{v_{i} s_{i}}\right)\left(1+\gamma_{i} \frac{v_{j} s_{j}}{v_{i} s_{i}}\right)^{-1},$$

where j = i mod 2 + 1.1 Then, the service probability for user 1 is

1 We would like to emphasize that the analysis presented in this work is more general and it can be applied to other channel cases as long as we can obtain the values for the success probabilities.

(2)
[TeX:] $$\begin{aligned} \mu_{1} &=q_{1}\left(1-q_{2}\right) P_{1 / 1}+q_{1} q_{2} P_{1 / 1,2} \\ &=q_{1}\left[\left(1-q_{2}\right) P_{1 / 1}+q_{2} P_{1 / 1,2}\right], \end{aligned}$$

and for user 2 is

(3)
[TeX:] $$\begin{aligned} \mu_{2} &=q_{2}\left(1-q_{1} \operatorname{Pr}\{Q>0\}\right) P_{2 / 2}+q_{2} q_{1}\left(\operatorname{Pr}\{Q>0\} P_{2 / 2,1}\right) \\ &=q_{2}\left[\left(1-q_{1} \operatorname{Pr}\{Q>0\}\right) P_{2 / 2}+q_{1}\left(\operatorname{Pr}\{Q>0\} P_{2 / 2,1}\right)\right], \end{aligned}$$

respectively, where Q is a random variable that indicates if the buffer of user 1 is empty (Q = 0), or non-empty [TeX:] $$(Q>0).$$ Then, the average success probability for user 1 and user 2 is

[TeX:] $$p_{1}=\left(1-q_{2}\right) P_{1 / 1}+q_{2} P_{1 / 1,2},$$

and

[TeX:] $$p_{2}=\left(1-q_{1} \operatorname{Pr}\{Q>0\}\right) P_{2 / 2}+q_{1}\left(\operatorname{Pr}\{Q>0\} P_{2 / 2,1}\right),$$

respectively.

Fig. 2.

The DTMC that models the AoI evolution.
2.png

III. AVERAGE AOI ANALYSIS AND DISTRIBUTION

In this section, we provide the analysis for the average and distribution of AoI. Age of information represents how “fresh” is the information from the perspective of the receiver. Let A(t) be a strictly positive integer that depicts the age of information associated with user 2 at the receiver. The age of information evolution at the receiver is written as

(4)
[TeX:] $$A(t+1)= \begin{cases}1, & \text { successful packet reception } \\ A(t)+1, & \text { otherwise. }\end{cases}$$

We model the evolution of the AoI as a discrete-time Markov chain (DTMC). According to (4), at each time slot, the AoI drops to one in the case of successful packet reception from user 2. Otherwise, it increases by one. The Markov chain is described by [TeX:] $$P_{j \rightarrow i}=\operatorname{Pr}\left\{X_{t+1}=i \mid X_{t}=j\right\},$$ where [TeX:] $$X_{t}$$ denotes the value of A(t) at the tth slot. [TeX:] $$P_{j \rightarrow i}$$ represents the probability to transit to state i given that the current state is j. The DTMC is shown in Fig. 2, where [TeX:] $$\bar{\mu}_{2}=1-\mu_{2}$$2 When the system is in state i, [TeX:] $$\forall i,$$ it can transit only to two possible states: a) To state 1, if we have successful packet reception; b) to state i + 1, otherwise. The transition matrix of the Markov chain is shown below

2 2For simplicity of exposition, given a probability of an event, denoted by p, we denote the probability of its complementary event by [TeX:] $$\bar{p}=1-p .$$

(5)
[TeX:] $$\mathbf{P}_{A}=\left[\begin{array}{ccccc} \mu_{2} & 1-\mu_{2} & 0 & 0 & \cdots \\ \mu_{2} & 0 & 1-\mu_{2} & 0 & \ddots \\ \vdots & \vdots & \vdots & \ddots & \ddots \end{array}\right].$$

We denote the steady state distribution of AoI by [TeX:] $$\pi^{A}= \left[\pi_{1}^{A}, \pi_{2}^{A}, \cdots\right].$$ To obtain [TeX:] $$\pi^{A}$$ we solve the following linear system of equations,

[TeX:] $$\pi^{A} \mathbf{P}_{A}, \pi^{A} \mathbf{1}=1.$$

Using the balance equations, we obtain

(6)
[TeX:] $$\pi_{i}^{A}=\left(1-\mu_{2}\right)^{(i-1)} \mu_{2}, \forall i,$$

which represents the probability the age of information to have the value of i. We can now obtain the expression for the average AoI by using the steady-state distribution. The average AoI is calculated as

Fig. 3.

The DTMC for which the deadline of packets is equal to 3 time slots, i.e., d = 3.
3.png

(7)
[TeX:] $$\bar{A}=\sum_{i=1}^{\infty} \pi_{i}^{A} i=\sum_{i=1}^{\infty}\left(1-\mu_{2}\right)^{i-1} \mu_{2} i \\ =\frac{\mu_{2}}{1-\mu_{2}} \sum_{i=1}^{\infty}\left(1-\mu_{2}\right)^{i} i$$

(8)
[TeX:] $$\stackrel{(a)}{=} \frac{\mu_{2}}{1-\mu_{2}} \frac{1-\mu_{2}}{\mu_{2}^{2}}=\frac{1}{\mu_{2}},$$

where (a) follows by utilizing [TeX:] $$\sum_{i=1}^{\infty} i c^{i}=c /(1-c)^{2},|c|<1.$$

Furthermore, we calculate the probability of the age of information to be larger than a value, x, where [TeX:] $$x \in \mathbb{Z}_{+}.$$ We have that

(9)
[TeX:] $$\operatorname{Pr}\{A>x\}=1-\operatorname{Pr}\{A \leq x\}=1-\sum_{i=1}^{x} \pi_{i}^{A} \stackrel{(b)}{=}\left(1-\mu_{2}\right)^{x},$$

where (b) follows by utilizing [TeX:] $$\sum_{i=0}^{n} c^{i}= \left(c^{n+1}-1\right) /(c-1), c \neq 1 . \operatorname{Pr}\{A>x\}$$ is characterized as the age of information violation probability which is an important metric and it indicates us the probability the age of information to have a value larger than x at each time slot.

IV. PACKET DROP RATE OF USER 1

In this section, we provide the expression for the drop rate of user 1. We consider that if a packet from user 1 is not successfully transmitted because of channel errors, we have the option to retransmit it. In particular, we retransmit the packet until it is either successfully transmitted or its deadline has expired. As a result, the maximum number of retransmissions is d − 1.

We use a DTMC to model the system. In particular, the states of the Markov chain represent the waiting time of the packet that is in the head of the queue (i.e., the packet that is first in the buffer). The number of states of the DTMC is equal to d + 1. In Fig. 3, we depict an example of a DTMC for a system with d = 3. The system is in state 0 if there is no packet waiting in the buffer. It transits to state 1 after the arrival of a packet. The packet experiences one slot waiting time right after its arrival because we consider the early departure - late arrival model. Therefore, the packet has the chance to be delivered in the next slot and so on. When the system is in state 1, it transits to state 0 if the packet at the head of the queue has been successfully transmitted (with probability [TeX:] $$\left.\left(\mathrm{W}_{\cdot} \mathrm{p}_{\cdot}\right) \mu_{1}\right)$$ and no packet arrived in the current slot [TeX:] $$(\text { w.p. } \bar{\lambda}).$$ From state 1, it transits to state [TeX:] $$2\left(\text { w.p. } \bar{\mu}_{1}\right)$$ when the packet is not successfully transmitted. Finally, it remains in state 1 when the packet that is in the head of the queue, is successfully transmitted and a new packet arrived in the current slot [TeX:] $$\text { (w.p. } \left.\mu_{1} \lambda\right).$$

The system is in state 2 when the packet that is in the head of the queue has a waiting time that equals two slots. It remains in state 2 if the packet of the head is successfully transmitted in the current and a new packet arrived in the previous slot w.p. [TeX:] $$\mu_{1} \lambda.$$ From state 2, the state transits to state 1 only if we have a successful transmission and arrival in the current slot and no packet arrived in the previous slot (w.p. [TeX:] $$\left.\lambda \bar{\lambda} \mu_{1}\right).$$ It transits to state 0, from state 2, only if the packet is successfully transmitted and no packets arrived in the two previous slots [TeX:] $$\left(w \cdot p \cdot \bar{\lambda} \bar{\lambda} \mu_{1}\right).$$ It transits to state 3 only if the packet is not successfully transmitted [TeX:] $$\left.1 \text { (w.p. } \bar{\mu}_{1}\right)$$ and since the waiting time is equal to three, the packet is dropped.

The system remains in state 3 only if a packet arrived three slots before the current slot [TeX:] $$(w . p . \lambda),$$ therefore its waiting time equals to three slots. Since the deadline is equal to three slots, if any packet arrived at least three slots ago, either it had been transmitted or dropped. The system transits to state 1 only if a packet arrived in the current slot and no packets arrived in the two previous slots [TeX:] $$\text { (w.p. } \lambda \bar{\lambda}^{2} \text { ) }.$$ It transits to state 2 only if a packet arrived in the previous slot and no packet arrived two slots ago [TeX:] $$(\mathrm{w} \cdot \mathrm{p} \cdot \lambda \bar{\lambda}).$$ Finally, the system transits to state 0 only if no packets arrived in the three previous slots, w.p. [TeX:] $$\overline{\lambda^{3}}.$$

The transition probability matrix (row stochastic) of the Markov chain, depicted in Fig. 3, is shown below.

[TeX:] $$\mathbf{P}=\left[\begin{array}{cccc} \bar{\lambda} & \lambda & 0 & 0 \\ \mu_{1} \bar{\lambda} & \mu_{1} \lambda & \bar{\mu}_{1} & 0 \\ \mu_{1} \bar{\lambda}^{2} & \mu_{1} \lambda \bar{\lambda} & \mu_{1} \lambda & \bar{\mu}_{1} \\ \bar{\lambda}^{3} & \lambda \bar{\lambda}^{2} & \lambda \bar{\lambda} & \lambda \end{array}\right].$$

In general, the transition matrix of the Markov chain in the general case, where the deadline is d, is shown below

[TeX:] $$\mathbf{P}=\left[\begin{array}{cccccc} \bar{\lambda} & \lambda & & & & \\ \mu_{1} \bar{\lambda} & \mu_{1} \lambda & \bar{\mu}_{1} & & & \\ \mu_{1} \bar{\lambda}^{2} & \mu_{1} \lambda \bar{\lambda} & \mu_{1} \lambda & \bar{\mu}_{1} & & \\ \vdots & \vdots & \vdots & \ddots & \ddots & \\ \mu_{1} \bar{\lambda}^{d-1} & \mu_{1} \lambda^{\bar{\lambda}^{d-2}} & \mu_{1} \lambda \bar{\lambda}^{d-3} & \cdots & \mu_{1} \lambda & \bar{\mu}_{1} \\ \bar{\lambda}^{d} & \lambda \bar{\lambda}^{d-1} & \lambda \bar{\lambda}^{d-2} & \cdots & \bar{\lambda} & \lambda \end{array}\right]$$

We denote by [TeX:] $$\pi=\left[\begin{array}{llll} \pi_{0} & \pi_{1} & \cdots & \pi_{d} \end{array}\right]$$ the steady-state distribution of the Markov chain. To derive π, we solve the following linear system of equations [TeX:] $$\pi \mathbf{P}=\pi, \pi 1=1.$$ We observe that [TeX:] $$\pi$$ is an eigenvector of P. After applying eigenvalue decomposition we obtain the eigenvectors and eigenvalues of matrix P. We find the eigenvector that corresponds to the eigenvalue that is equal to 1. We normalize the elements of the eigenvector and we obtain [TeX:] $$\pi.$$ Then, we calculate the drop rate as [TeX:] $$\bar{D}=\pi_{d} \bar{\mu}_{1}.$$ In addition, we calculate the probability the buffer of user 1 to be non empty; [TeX:] $$\operatorname{Pr}\{Q>0\}=1-\pi_{0}.$$ Therefore, all the terms in (7) are now known and the average age of information can be computed.

Fig. 4.

[TeX:] $$q_{2}=0.5, \lambda=0.8 . q_{1}=0.1,0.2, \cdots, 1.$$
4.png
A. Discussion on the Lumpability of a DTMC

The DTMC in Fig. 3 can be an aggregated form of a twodimensional (2D) DTMC which takes into account the actions of user 1 as individual cases. The 2D DTMC is described by [TeX:] $$P_{(i, j) \rightarrow(u, k)}^{2 D}=\operatorname{Pr}\left\{X_{t+1}=u, Y_{n+1}=k \mid X_{n}=i, Y_{n}=j\right\},$$ where [TeX:] $$X_{t} \text { and } Y_{t}$$ denote the states of the action of user 2 and the waiting time in the queue for a packet of user 1, respectively. Note that [TeX:] $$X_{t}$$ can take either the value of one (if user 2 is active) or zero (if user 2 is silent). Note that [TeX:] $$P_{(0, i) \rightarrow(0, j)}^{2 \mathrm{D}}=P_{(1, i) \rightarrow(0, j)}^{2 \mathrm{D}} \text { and } P_{(0, i) \rightarrow(1, j)}^{2 \mathrm{D}}=P_{(1, i) \rightarrow(1, j)}^{2 \mathrm{D}},\forall i, j,$$ because the action of user 2 in the previous slot does not affect the transition in the current slot. Therefore, [TeX:] $$P_{(0, i) \rightarrow(0, j)}^{2 \mathrm{D}}+P_{(0, i) \rightarrow(1, j)}^{2 \mathrm{D}}=P_{(1, i) \rightarrow(0, j)}^{2 \mathrm{D}}+P_{(1, i) \rightarrow(1, j)}^{2 \mathrm{D}}, \forall i, j .$$ Let us consider a partition of the states that is defined as [TeX:] $$\mathcal{A}_{j}=\{(0, j),(1, j)\}.$$ According to Theorem 6.3.2 [42, Theorem 6.3.2, Chapter 6], the Markov chain is lumpable with respect to the partition [TeX:] $$\mathcal{A}=\left\{\mathcal{A}_{1}, \mathcal{A}_{2}, \cdots, \mathcal{A}_{d}\right\}.$$ Therefore, the DTMC in Fig. 3 is an equivalent Markov chain with the 2D Markov chain described above.

V. NUMERICAL AND SIMULATION RESULTS

In this section, we provide results that show the interplay between the packet drop rate of user 1 and average AoI of user 2 at the receiver. Also, we validate our analysis by comparing the analytical with the simulation results.

We consider different scenarios. However, at each scenario we consider that the users are located at distance [TeX:] $$r_{i}=30 \mathrm{~m}$$ from the receiver. The receiver noise power is [TeX:] $$\eta=-50 \mathrm{dBm},$$ and the path loss exponent is [TeX:] $$\alpha=4.$$ Also, both users transmit with power [TeX:] $$P_{1}=P_{2}=10 \mathrm{~mW}.$$

In Figs. 4, and 5, we depict the interplay between the average AoI of user 2 and packet drop rate of user 1. In Fig. 4, we show the effect of the value of [TeX:] $$q_{1}$$ on the average AoI. We consider four different cases each one with different MPR capabilities. We denote that a receiver has strong MPR capabilities only if [TeX:] $$\delta=P_{1 / 1} / P_{1 / 1,2}+P_{2 / 2} / P_{2 / 2,1}>1,$$ otherwise we consider that the receiver has weak MPR capabilities. For [TeX:] $$\gamma=-5 \mathrm{~dB} \text { and }-3 \mathrm{~dB}, \delta=1.5195$$ and

Fig. 5.

[TeX:] $$q_{1}=0.5, \lambda=0.5 . q_{2}=0.1,0.2, \cdots, 1.$$
5.png

1.3323, respectively. Therefore, the receiver has strong MPR capabilities. For [TeX:] $$\gamma=0 \mathrm{~dB} \text { and } 1 \mathrm{~dB}, \text { then } \delta=1$$ and 0.8854, respectively. Therefore, the receiver has weak MPR capabilities.

In Fig. 4, we consider that the sampling probability is [TeX:] $$q_{2}= 0.5.$$ We obtain the drop rate and average AoI for different values of [TeX:] $$q_{1}.$$ We observe that when the receiver has strong MPR capabilities, the access probability of user 1 does not significantly affect the average AoI (red line). Therefore, in this case, we obtain that the best strategy would be to allow both users to transmit at the same time. On the other hand, we observe that as the MPR capabilities become weak the access probability of user 1 significantly affects the average AoI (black and green lines).

In Fig. 5, we consider that the access probability of user 1, [TeX:] $$q_{1}$$, is fixed and equal to 0.5. Also, the arrival rate is [TeX:] $$\lambda=0.5.$$ In this scenario, we consider different values of the sampling probability. We observe that when the receiver has strong MPR capabilities (red line), we can significantly decrease the average AoI while keeping the drop rate low for user 1 (red line). However, as the MPR capabilities become weaker, the drop rate is affected by higher values of [TeX:] $$q_{2}.$$ To give a more realistic example, let us consider that our goal is to keep the average AoI below 5. For [TeX:] $$\gamma=-5 \mathrm{~dB},$$ we observe that we can achieve this target for sampling rate [TeX:] $$q_{2}=0.3$$ and drop rate is 0.17. Thus, allowing both users to transmit is beneficial. For the case which [TeX:] $$\gamma=1 \mathrm{~dB}$$ (weak MPR capabilities), we observe that, in order to keep the average AoI below 5, we should increase the sampling probability [TeX:] $$q_{2}$$ to the value of 0.7. However, the drop rate for user 1 is high and it is equal to 0.41, i.e., almost half of the packets are dropped. In this case, a time sharing scheme will be more beneficial.

In Fig. 6, we show how the value [TeX:] $$\operatorname{Pr}\{A>x\}$$ changes for different values of [TeX:] $$q_{2} \text { and } \gamma.$$ As we increase the value of [TeX:] $$q_{2}$$ the probability decreases because user 2 samples and attempts for transmission more often. However, due to the error-prone channel, we observe that [TeX:] $$\operatorname{Pr}\{A>x\}$$ has higher values for the case of weak MPR capabilities. Note that this metric, i.e., [TeX:] $$\operatorname{Pr}\{A>x\},$$ is important when we study the AoI in a slot

Fig. 6.

Probability the AoI of user 2 at the receiver to be larger than a value, x. [TeX:] $$\lambda=0.5, q_{1}=0.5.$$ Strong [TeX:] $$(\gamma=-3 \mathrm{~dB})$$ and weak [TeX:] $$(\gamma=0 \mathrm{~dB})$$ MPR capabilities.
6.png

Fig. 7.

The AoI distribution for [TeX:] $$\gamma=-5 \mathrm{~dB}$$ for different values of [TeX:] $$q_{2} .$$
7.png

by slot basis. More precisely, based on this metric, we know what is the probability the AoI to be greater than a value of x at a time slot. Therefore, we can configure or optimize the system, e.g., the value of [TeX:] $$q_{2},$$ based on our targets.

In Figs. 7–10, we present the AoI distribution for the second user for various values of [TeX:] $$\gamma \text { and } q_{2}.$$ In the legend of each figure, we present also the average drop rate for the first user to have a more complete view of the system’s performance. We have considered the case [TeX:] $$q_{1}=0.5, \lambda=0.5.$$

Figs. 7 and 8 depict the AoI distribution for the strong MPR case. In this case, for [TeX:] $$q_{2}=0.9,$$ the values AoI with non-zero probability are concentrated in the lower regime (less than seven). In these figures, we observe that even when the arrival probability is high and the transmission probability for the first user is [TeX:] $$q_{1}=0.5,$$ the system can sustain both users with acceptable performance.

Figs. 9 and 10 depict the AoI distribution of the second user for the case of weak MPR capability. As we mentioned earlier, interference is destructive in this case thus, we observe

Fig. 8.

The AoI distribution for [TeX:] $$\gamma=-3 \mathrm{~dB}$$ for different values of [TeX:] $$q_{2}.$$
8.png

Fig. 9.

The AoI distribution for [TeX:] $$\gamma=0 \mathrm{~dB}$$ for different values of [TeX:] $$q_{2}.$$
9.png

high values for the drop rates for the traffic of the first user.

In addition, we observe that the distribution of AoI takes non-negligible values [TeX:] $$(>0.03)$$ over a larger span, and also the lower values of AoI of the second user have smaller probabilities compared to the case of strong MPR capabilities. Even when [TeX:] $$q_{2}=0.9$$ which is a high sampling and transmit probability for the second user, and [TeX:] $$\gamma=1 \mathrm{~dB},$$ having an AoI of 10 timeslots can happen with a probability of approximately 0.035. Thus, here a time sharing scheme can be beneficial.

VI. CONCLUSIONS AND FUTURE DIRECTIONS

In this work, we studied the interplay of deadlineconstrained packet delivery and freshness of information at the destination. More specifically, we considered a two-user multiple access setup with random access, in which user 1 is a wireless device with a buffer and has external bursty traffic which is deadline-constrained, while user 2 monitors a sensor and transmits status updates to the destination. We

Fig. 10.

The AoI distribution for [TeX:] $$\gamma=1 \mathrm{~dB}$$ for different values of [TeX:] $$q_{2}.$$
10.png

provided analytical expressions for the throughput and drop probability of user 1. We provided the distribution regarding AoI, the AoI delay violation probability and the average age of information of user 2 in terms of closed form expressions. We demonstrated that there exists a trade-off between the average AoI of user 2 and the drop rate of user 1. Our analytical findings are validated through simulations.

From our results it is evident that the probability of accessing the channel affects the performance of individual users as well as that of the overall system. Ongoing work focuses on optimizing the performance of such systems utilizing the frameworks of Markov decision Processes and Lyapunov optimization. Furthermore, larger and more general setups will be considered.

Biography

Emmanouil Fountoulakis

Emmanouil Fountoulakis (Graduate Student Member, IEEE) received the diploma in Electronic and Computer Engineering from the Technical University of Crete, Greece, and the Ph.D. degree in Wireless Networking from the Linköping University, Sweden, in 2016 and 2021, respectively. His interests include age of information, low-latency networking, and semantics-aware communications. He is currently a Postdoctoral Researcher at the Communication Systems department, EURECOM, France.

Biography

Themistoklis Charalambous

Themistoklis Charalambous (Senior Member, IEEE) received the B.A. degree in Electrical and Information Sciences from Trinity College Dublin, the M.Eng. degree in Electrical and Information Sciences from the University of Cambridge, in 2005, and the Ph.D. degree from the Control Laboratory, Engineering Department, University of Cambridge, in 2010. He joined the Human Robotics Group, Imperial College London, as a Research Associate, from September 2009 to September 2010. From September 2010 to December 2011, he worked as a Visiting Lecturer with the Department of Electrical and Computer Engineering, University of Cyprus. From January 2012 to January 2015, he worked with the Department of Automatic Control, School of Electrical Engineering, Royal Institute of Technology, as a Postdoctoral Researcher. From April 2015 to December 2016, he worked as a Postdoctoral Researcher with the Department of Electrical Engineering, Chalmers University of Technology. In January 2017, he joined the Department of Electrical Engineering and Automation, School of Electrical Engineering, Aalto University, as a tenuretrack Assistant Professor. Since September 2018, he has been a Research Fellow of the Academy of Finland. From July 2020 to August 2021, he was a tenured Associate Professor and since then he has been a Visiting Professor. Since September 2021, he has been a tenure-track Assistant Professor at the University of Cyprus. His primary research interests include the design and analysis of (wireless) networked control systems that are stable, scalable, and energy efficient.

Biography

Nikolaos Nomikos

Nikolaos Nomikos (Senior Member, IEEE) received the Diploma degree in Electrical Engineering and Computer Technology from the University of Patras, Greece, in 2009, and the M.Sc. and Ph.D. degrees from the Information and Communication Systems Engineering Department, University of the Aegean, Samos, Greece, in 2011 and 2014, respectively. From November 2014 to October 2019, he worked as a Postdoctoral Researcher with the Information and Communication Systems Engineering Department, University of the Aegean. From September 2018 to September 2019, he was an Adjunct Lecturer at the Open University of Cyprus. From January 2019 to December 2019, he worked as a Postdoctoral Researcher with the General Department, National and Kapodistrian University of Athens. He is currently a Research Associate with the IRIDA Research Centre for Communication Technologies, Department of Electrical and Computer Engineering, University of Cyprus. His research interests include cooperative communications, non-orthogonal multiple access, fullduplex communications, and machine learning for wireless networks optimization. He is a member of the IEEE Communications Society and the Technical Chamber of Greece.

Biography

Anthony Ephremides

Anthony Ephremides (Life Fellow, IEEE) received the Ph.D. degree in Electrical Engineering from Princeton University in 1971. Since 1971, he has been with the University of Maryland, College Park, MD, USA. He holds the Cynthia Kim Professorship of Information Technology with the Department of Electrical and Computer Engineering, University of Maryland, where he is currently a Distinguished University Professor. He has a joint appointment with the Institute for Systems Research, of which he was among the founding members in 1986. He has authored more than 100 articles, conference presentations, and patents. His research interests include communication systems and networks and all related disciplines, such as information theory, control and optimization, satellite systems, queueing models, and signal processing. He is especially interested in wireless networks, energy efficient systems, and the new notion of age of information.

Biography

Nikolaos Pappas

Nikolaos Pappas (Senior Member, IEEE) received the B.Sc. degree in Computer Science, the B.Sc. degree in Mathematics, the M.Sc. degree in Computer Science, and the Ph.D. degree in Computer Science from the University of Crete, Crete, Greece, in 2005, 2012, 2007, and 2012, respectively. From 2005 to 2012, he was a Graduate Research Assistant with the Telecommunications and Networks Laboratory, Institute of Computer Science, Foundation for Research and Technology Hellas, Crete, and a Visiting Scholar with the Institute of Systems Research, University of Maryland at College Park, College Park, MD, USA. From 2012 to 2014, he was a Postdoctoral Researcher with the Department of Telecommunications, Supélec, Gif-sur-Yvette, France. Since 2014, he has been with Linköping University, Norrköping, Sweden, as a Marie Curie Fellow (IAPP). He is currently an Associate Professor of Mobile Telecommunications with the Department of Science and Technology, Linköping University, Linköping, Sweden. His main research interests include the field of wireless communication networks with emphasis on the stability analysis, energy harvesting networks, network-level cooperation, age of information, network coding, and stochastic geometry.Dr. Pappas was an Editor of IEEE COMMUNICATIONS LETTERS from 2013 to 2018. He is currently an Editor of IEEE TRANSACTIONS ON COMMUNICATIONS, IEEE OPEN JOURNAL OF COMMUNICATIONS SOCIETY , and IEEE/KICS JOURNAL OF COMMUNICATIONS AND NETWORKS.

References

  • 1 E. Fountoulakis, T. Charalambous, N. Nomikos, A. Ephremides, N. Pappas, "Information freshness and packet drop rate interplay in a two-user multi-access channel," in Proc IEEE ITW, 2021;doi:[[[10.1109/itw46852.2021.9457624]]]
  • 2 M. A. Abd-Elmagid, N. Pappas, H. S. Dhillon, "On the role of age of information in the Internet of Things," IEEE Commun. Mag., vol. 57, no. 12, pp. 72-77, 2019.doi:[[[10.1109/mcom.001.1900041]]]
  • 3 T. Shreedhar, S. K. Kaul, R. D. Yates, "An age control transport protocol for delivering fresh updates in the Internet-of-Things," in Proc. IEEE WoWMoM, 2019;doi:[[[10.1109/wowmom.2019.8793011]]]
  • 4 P. Park, S. C. Ergen, C. Fischione, C. Lu, K. H. Johansson, "Wireless network design for control systems: A survey," IEEE Commun. Surveys Tuts, vol. 20, no. 2, pp. 978-1013, 2018.doi:[[[10.1109/COMST.2017.2780114]]]
  • 5 A. Kosta, N. Pappas, V. Angelakis, Age of information: A new concept, metric, and tool, Foundations Trends Netw., vol. 12, no. 3, pp. 162-259, 2017.doi:[[[10.1561/1300000060]]]
  • 6 Y. Sun, I. Kadota, R. Talak, E. Modiano, "Age of information: A new metric for information freshness," Synthesis Lectures Commun. Netw., vol. 12, no. 2, pp. 1-224, 2019.doi:[[[10.2200/s00954ed2v01y201909cnt023]]]
  • 7 S. Kaul, R. Yates, M. Gruteser, "Real-time status: How often should one update?," in Proc. IEEE INFOCOM, 2012;doi:[[[10.1109/infcom.2012.6195689]]]
  • 8 S. Shakkottai, R. Srikant, "Scheduling real-time traffic with deadlines over a wireless channel," in Wireless Netw., 2002;vol. 8, no. 1, pp. 13-26. doi:[[[10.1023/A:1012763307361]]]
  • 9 Y. Cui, V. K. Lau, R. Wang, H. Huang, S. Zhang, "A survey on delay-aware resource control for wireless systems—large deviation theory, stochastic Lyapunov drift, and distributed stochastic learning," IEEE Trans. Inf. Theory, vol. 58, no. 3, pp. 1677-1701, 2012.doi:[[[10.1109/tit.2011.2178150]]]
  • 10 A. Fu, E. Modiano, J. N. Tsitsiklis, "Optimal transmission scheduling over a fading channel with energy and deadline constraints," IEEE Trans. Wireless Commun., vol. 5, no. 3, pp. 630-641, 2006.doi:[[[10.1109/TWC.2006.1611093]]]
  • 11 A. Dua, N. Bambos, "Downlink wireless packet scheduling with deadlines," IEEE Trans. on Mobile Comput., vol. 6, no. 12, pp. 1410-1425, 2007.doi:[[[10.1109/TMC.2007.1055]]]
  • 12 S. ElAzzouni, E. Ekici, N. Shroff, "Is deadline oblivious scheduling efficient for controlling real-time traffic in cellular downlink systems?," in Proc. IEEE INFOCOM, 2020;doi:[[[10.1109/infocom41043.2020.9155523]]]
  • 13 Q. He, D. Yuan, A. Ephremides, "Optimal scheduling for emptying a wireless network: Solution characterization, applications, including deadline constraints," IEEE Trans. Inf. Theory, vol. 66, no. 3, pp. 1882-1892, 2020.doi:[[[10.1109/tit.2019.2957800]]]
  • 14 Y. H. Bae, "Analysis of optimal random access for broadcasting with deadline in cognitive radio networks," IEEE Commun. Lett., vol. 17, no. 3, pp. 573-575, 2013.doi:[[[10.1109/LCOMM.2013.012213.122755]]]
  • 15 Y. H. Bae, "Queueing analysis of deadline-constrained broadcasting in wireless networks," IEEE Commun. Lett., vol. 19, no. 10, pp. 1782-1785, 2015.doi:[[[10.1109/LCOMM.2015.2461212]]]
  • 16 E. Fountoulakis, N. Pappas, Q. Liao, V. Suryaprakash, D. Yuan, "An examination of the benefits of scalable TTI for heterogeneous traffic management in 5G networks," in Proc. WiOpt, 2017;doi:[[[10.23919/wiopt.2017.7959871]]]
  • 17 L. You, Q. Liao, N. Pappas, D. Yuan, "Resource optimization with flexible numerology and frame structure for heterogeneous services," IEEE Commun. Lett., vol. 22, no. 12, pp. 2579-2582, 2018.doi:[[[10.1109/lcomm.2018.2865314]]]
  • 18 A. E. Ewaisha, C. Tepedelenlioglu, "Optimal power control and scheduling for real-time and non-real-time data," IEEE Trans. Veh. Technol., vol. 67, no. 3, pp. 2727-2740, 2018.doi:[[[10.1109/TVT.2017.2773569]]]
  • 19 E. Fountoulakis, N. Pappas, Q. Liao, A. Ephremides, V. Angelakis, "Dynamic power control for packets with deadlines," in Proc. IEEE GLOBECOM, 2018;doi:[[[10.1109/glocom.2018.8648124]]]
  • 20 E. Fountoulakis, N. Pappas, A. Ephremides, "Dynamic power control for time-critical networking with heterogeneous traffic," ITU J. Future Evolving Technol., Mar, 2021.doi:[[[10.52953/sagv1643]]]
  • 21 M. J. Neely, S. Supittayapornpong, "Dynamic markov decision policies for delay constrained wireless scheduling," IEEE Trans. Automatic Control, vol. 58, no. 8, pp. 1948-1961, 2013.doi:[[[10.1109/TAC.2013.2256682]]]
  • 22 N. Master, N. Bambos, "Power control for packet streaming with head-of-line deadlines," Performance Evaluation, vol. 106, pp. 1-18, 2016.doi:[[[10.1016/j.peva.2016.10.003]]]
  • 23 N. Nomikos, N. Pappas, T. Charalambous, Y.-A. Pignolet, "Deadline-constrained bursty traffic in random access wireless networks," in Proc. SPAWC, 2018;doi:[[[10.1109/spawc.2018.8445861]]]
  • 24 A. Faridi, A. Ephremides, "Distortion control for delay-sensitive sources," IEEE Trans. Inf. Theory, vol. 54, no. 8, pp. 3399-3411, 2008.doi:[[[10.1109/TIT.2008.926338]]]
  • 25 Q. He, G. Dán, V. Fodor, "On emptying a wireless network with minimum-energy under age constraints," in Proc. IEEE INFOCOM Workshops, May, 2019;doi:[[[10.1109/infcomw.2019.8845089]]]
  • 26 J. Li, Y. Zhou, H. Chen, "Age of information for multicast transmission with fixed and random deadlines in iot systems," IEEE Internet Things J., vol. 7, no. 9, pp. 8178-8191, 2020.doi:[[[10.1109/jiot.2020.2981144]]]
  • 27 I. Kadota, E. Modiano, "Minimizing the age of information in wireless networks with stochastic arrivals," IEEE Trans. Mobile Comput., vol. 20, no. 3, pp. 1173-1185, 2021.doi:[[[10.1145/3323679.3326520]]]
  • 28 R. Talak, E. Modiano, "Age-delay tradeoffs in queueing systems," IEEE Trans. Inf. Theory, vol. 67, no. 3, pp. 1743-1758 2020. doi:[[[10.1109/tit.2020.3046412]]]
  • 29 Z. Qian, F. Wu, J. Pan, K. Srinivasan, N. B. Shroff, "Minimizing age of information in multi-channel time-sensitive information update systems," in Proc. IEEE INFOCOM, 2020;doi:[[[10.1109/infocom41043.2020.9155420]]]
  • 30 M. A. Abd-Elmagid, H. S. Dhillon, N. Pappas, "AoI-optimal joint sampling and updating for wireless powered communication systems," IEEE Trans. Veh. Technol., vol. 69, no. 11, pp. 14110-14115, 2020.doi:[[[10.1109/tvt.2020.3029018]]]
  • 31 I. Kadota, A. Sinha, E. Modiano, "Scheduling algorithms for optimizing age of information in wireless networks with throughput constraints," IEEE /ACMTrans.Net., vol. 27, no. 4, pp. 1359-1372, 2019.doi:[[[10.1109/tnet.2019.2918736]]]
  • 32 A. M. Bedewy, Y. Sun, S. Kompella, N. B. Shroff, "Optimal sampling and scheduling for timely status updates in multi-source networks," IEEE Trans.Inf.Theory, vol. 67, no. 6, pp. 4019-4034, 2021.doi:[[[10.1109/tit.2021.3060387]]]
  • 33 E. Fountoulakis, M. Codreanu, A. Ephremides, N. Pappas, "Joint sampling and transmission policies for minimizing cost under aoi constraints," arXiv preprint arXiv:2103.15450, 2021.custom:[[[-]]]
  • 34 O. T. Yavascan, E. Uysal, "Analysis of slotted aloha with an age threshold," IEEE J. Sel. Areas Commun., vol. 39, no. 5, pp. 1456-1470, 2021.doi:[[[10.1109/jsac.2021.3065043]]]
  • 35 Z. Chen, N. Pappas, E. Björnson, E. G. Larsson, "Optimizing information freshness in a multiple access channel with heterogeneous devices," IEEE Open J. Commun. Society, vol. 2, pp. 456-470, 2021.doi:[[[10.1109/ojcoms.2021.3062678]]]
  • 36 G. Stamatakis, N. Pappas, A. Traganitis, "Optimal policies for status update generation in an IoT device with heterogeneous traffic," IEEE Internet Things J., vol. 7, no. 6, pp. 5315-5328, 2020.doi:[[[10.1109/jiot.2020.2976690]]]
  • 37 J. Sun, L. Wang, Z. Jiang, S. Zhou, Z. Niu, "Age-optimal scheduling for heterogeneous traffic with timely throughput constraints," IEEE J. Sel. Areas Commun., vol. 39, no. 5, pp. 1485-1498, 2021.doi:[[[10.1109/jsac.2021.3065059]]]
  • 38 Z. Chen, N. Pappas, E. Björnson, E. G. Larsson, "Age of information in a multiple access channel with heterogeneous traffic and an energy harvesting node," in Proc. IEEE INFOCOM Workshops, 2019;doi:[[[10.1109/infcomw.2019.8845083]]]
  • 39 N. Pappas, M. Kountouris, "Delay violation probability and age of information interplay in the two-user multiple access channel," in Proc. IEEE SPAWC, 2019;doi:[[[10.1109/spawc.2019.8815559]]]
  • 40 D. Tse, P. Viswanath, Fundamentals of wireless communication, Cambridge university press, 2005.doi:[[[10.1017/cbo9780511807213]]]
  • 41 G. D. Nguyen, S. Kompella, J. E. Wieselthier, A. Ephremides, "Optimization of transmission schedules in capture-based wireless networks," in Proc. IEEE MILCOM, 2008;doi:[[[10.1109/milcom.2008.4753605]]]
  • 42 S. J. L. Kemeny, John G, Finite kov Chains. Springer-Verlag, Mar, 1976.custom:[[[-]]]