2021
DOI: 10.1109/ojcoms.2021.3062678
|View full text |Cite
|
Sign up to set email alerts
|

Optimizing Information Freshness in a Multiple Access Channel With Heterogeneous Devices

Abstract: In this work, we study age-optimal scheduling with stability constraints in a multiple access channel with two heterogeneous source nodes transmitting to a common destination. The first node is connected to a power grid and it has randomly arriving data packets. Another energy harvesting (EH) sensor monitors a stochastic process and sends status updates to the destination. We formulate an optimization problem that aims at minimizing the average age of information (AoI) of the EH node subject to the queue stabi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
29
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 41 publications
(29 citation statements)
references
References 40 publications
0
29
0
Order By: Relevance
“…The work [16] investigated AoI-optimal scheduling in a cognitive radio EH system. In [17], the authors studied age-optimal scheduling under stability constraints in a multiple access channel with two heterogeneous nodes (including an EH node) transmitting to a common destination. In [18], the sensor monitors a stochastic process and tracks its evolution and thereby, a modified definition of AoI is proposed to account for the discrepancy in the remote destination.…”
Section: B Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The work [16] investigated AoI-optimal scheduling in a cognitive radio EH system. In [17], the authors studied age-optimal scheduling under stability constraints in a multiple access channel with two heterogeneous nodes (including an EH node) transmitting to a common destination. In [18], the sensor monitors a stochastic process and tracks its evolution and thereby, a modified definition of AoI is proposed to account for the discrepancy in the remote destination.…”
Section: B Related Workmentioning
confidence: 99%
“…where Jπ R,µ is the average number of command actions under policy π R,µ , which is calculated using (17). From (17) and the fact that (P3) is decoupled into K per-sensor problems (P4), Jπ R,µ is calculated as Jπ R,µ = 1 K K k=1 Jπ R,µ,k , where Jπ R,µ,k denotes the per-sensor time average number of command actions under the per-sensor policy π R,µ,k , which is defined as…”
Section: A Cmdp Formulationmentioning
confidence: 99%
“…It is assumed that the jammer does not have a constant source of power supply, but it has energy harvesting ability. The energy arrival process at the jammer is modeled by a Bernoulli process where the rate of energy arrival is assumed to be δ [32]- [36]. These chunks are stored in a battery (an energy buffer).…”
Section: A Network Layer Modelmentioning
confidence: 99%
“…For the second moment, the computations lead to a more involved expression, shown at the top of the next page in (18). Finally, using ( 16), (17), and ( 18), together with ( 7) and ( 8), one can substitute in (10) and evaluate the long-term average AoI achieved with a γ-threshold policy.…”
Section: Lemmamentioning
confidence: 99%
“…with E ∆ (j) given by ( 16) after replacing λ d with λ d,j , and the first and second moments of w max{e (κ) , d (κ) } given by ( 17) and (18), respectively, after replacing λ d with λ d,κ .…”
Section: The Multiple Sources Casementioning
confidence: 99%