Next Article in Journal
Physicochemical Mechanics and Nonequilibrium Chemical Thermodynamics
Next Article in Special Issue
Blahut–Arimoto Algorithms for Inner and Outer Bounds on Capacity Regions of Broadcast Channels
Previous Article in Journal
Network Analysis of Depression Using Magnetoencephalogram Based on Polynomial Kernel Granger Causality
Previous Article in Special Issue
Design of Multi-User Noncoherent Massive SIMO Systems for Scalable URLLC
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Age of Synchronization Minimization Algorithms in Wireless Networks with Random Updates under Throughput Constraints †

1
Beijing National Research Center for Information Science and Technology (BNRist), Beijing 100084, China
2
Department of Electronic Engineering, Tsinghua University, Beijing 100084, China
3
Research Institute, Tsinghua University in Shenzhen, Shenzhen 518057, China
4
Shenzhen International Graduate School, Tsinghua University, Shenzhen 518055, China
*
Author to whom correspondence should be addressed.
This paper is an extended version of our paper published In Proceedings of the 2022 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), Bilbao, Spain, 15–17 June 2022.
Entropy 2023, 25(9), 1331; https://doi.org/10.3390/e25091331
Submission received: 14 August 2023 / Revised: 11 September 2023 / Accepted: 12 September 2023 / Published: 14 September 2023
(This article belongs to the Special Issue Advances in Multiuser Information Theory)

Abstract

:
This study considers a wireless network where multiple nodes transmit status updates to a base station (BS) through a shared bandwidth-limited channel. Considering the random arrival of status updates, we measure the data freshness with the age of synchronization (AoS) metric; specifically, we use the time elapsed since the latest synchronization as a metric. The objective of this study is to minimize the weighted sum of the average AoS of the entire network while meeting the minimum throughput requirement of each node. We consider both the central scheduling scenario and the distributed scheduling scenario. In the central scheduling scenario, we propose the optimal stationary randomized policy when the transmission feedback is unavailable and the max-weight policy when it is available. In the distributed scenario, we propose a distributed policy. The complexity of the three scheduling policies is significantly low. Numerical simulations show that the policies can satisfy the throughput constraint in the central controlling scenario and the AoS performance of the max-weight policy is close to the lower bound.

1. Introduction

With the development of various time-sensitive applications, such as the industrial Internet of Things and automatic driving, the freshness of information has attracted more and more attention. It is important to transmit time-sensitive information to the central controller in a timely manner in order to ensure safety and efficient control in these networks. Figure 1 shows a scenario for the industrial IoT where the central processor monitors the real-time status of various network components, including materials, equipment, power, transportation, staff, etc.
To evaluate the freshness of status updates, researchers have introduced the concept of the age of information (AoI) [1], which is defined as the time elapsed since the the generation of the most recent status update. Previous studies [2,3,4,5,6,7,8,9,10] have focused on developing scheduling algorithms that minimize the average AoI across the network in the generate-at-will scenario, which means the generation of status update packets can be controlled. Various low-complexity algorithms were presented in [2] to minimize the average AoI in the network, demonstrating their proximity to the theoretical lower bound. Power constraints and cross-layer scheduling were considered in [6], where the authors formulated the AoI optimization problem as a constrained Markov decision process and proposed an effective asymptotic optimal scheduling algorithm.
In addition to the generate-at-will scenario, researchers also focus on the random-update scenario, where status updates arrive at terminal devices randomly. Several scheduling algorithms have been proposed in [11,12,13,14,15,16] to minimize the average AoI. However, in the random-update scenario, the AoI may not show the desynchronization of the information. For example, if no new update arrives after the latest update is received, the information at the receiver remains fresh while the AoI still keeps increasing.
Therefore, the concept of the age of synchronization (AoS) was proposed in [17], which is defined as the time elapsed since the desynchronization of the freshest information at the receiver. An age-based max-weight policy was proposed in [18] to minimize the time-average AoS in error-free transmission scenarios. In [19], scheduling algorithms based on the Markov decision process and the restless multi-arm bandit were designed to optimize AoS in unreliable wireless transmission channels. Additionally, when transmitting over unreliable time-varying wireless channels, the authors in [20] modeled the AoS optimization problem as a constrained Markov decision process and revealed a threshold structure for the optimal policy. The primary objective of these works was to minimize the time-average AoS of the whole system. However, in broadcast services, network users may possess varying levels of importance and diverse requirements, such as different throughput needs. Previous studies have investigated the design of scheduling strategies that optimize data freshness, taking into account heterogeneous requirements such as timely throughput and transmission delay [5,21,22,23]. These works indicated that the AoS optimization strategies may cause unfairness among different users.
To address this issue, we consider a model in which each user in the network has a time-average throughput need. Our objective is to propose scheduling policies that not only minimize the time-average AoS for network users but also ensure that the throughput requirement of each user is met. Under different conditions, we propose three corresponding scheduling policies. To be specific, we propose the optimal stationary randomized policy, the max-weight policy, and the distributed policy to deal with ACK-available/ACK-unavailable and centralized/distributed scenarios, respectively. Part of this work has been published in Proceedings of the 2022 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB) [24].
The rest of the paper is structured in the following manner. Section 2 introduces the system model, the constraints, and the definition of AoS, and the optimization problem is modeled. In Section 3, a lower bound of the AoS optimization problem is presented. In Section 4, we proposed three scheduling policies—the optimal stationary randomized policy, the max-weight policy, and the distributed policy—and give the corresponding algorithms. In Section 5, the performance of the policies is shown and compared with numerical simulations. Finally, Section 6 concludes the paper.

2. System Model

We consider a model where M nodes transmit random status updates to a base station (BS), as illustrated in Figure 2. The time is slotted and denoted by k { 1 , 2 , , K } . An indicator function Λ i ( k ) records whether a new update arrives at node i { 1 , 2 , , M } in the time slot before time slot k. Λ i ( k ) follows an independent and identical Bernoulli distribution with parameter λ i .
The nodes transmit status updates the BS through a shared channel. u i ( k ) denotes the transmission indicator function, meaning that u i ( k ) = 1 suggests node i transmits an update to the BS at the beginning of time slot k. The transmission from node i succeeds with probability p i . An indicator of successful transmission is denoted by d i ( k ) . If d i ( k ) = 1 , the transmission succeeds and the BS receives the update from node i by the end of time slot k.
If u i ( k ) = 1 at time slot k, node i transmits an update to the BS. d i ( k ) = 1 with probability p i and d i ( k ) = 0 with probability 1 p i . If u i ( k ) = 0 , indicating that node i does not transmit to the BS in time slot k, d i ( k ) must be 0.

2.1. Age of Synchronization

The age of synchronization (AoS) describes the time elapsed since the last time that the newest information at the receiver was synchronized with the transmitter. we define s i ( k ) as the AoS of node i at the end of time slot k. The evolution of the AoS with random arrival and successful transmission is illustrated in Figure 3. While the latest update is successfully transmitted in time slot 5, the AoS of node i drops to 0 and remains 0 until a new update arrives during time slot 7. Then, the AoS of node i keeps increasing by 1 in every subsequent time slot until the new update is received by the BS in time slot 12.
As the BS is only interested in the newest updates, each node always transmits the newest updates in the buffer to the BS. The evolution of s i ( k ) follows:
s i ( k ) = 0 , if d i ( k ) = 1 ; 0 , if s i ( k 1 ) = 0 , and Λ i ( k ) = 0 ; s i ( k 1 ) + 1 , otherwise .
We consider that the AoSs of different nodes have different importance, which is represented by α i > 0 , and we are interested in the expected weighted sum AoS of the network. We denote the expected weighted-sum AoS during the first K time slots under scheduling policy π as
J K π = 1 K M E k = 1 K i = 1 M α i s i ( k ) | s i ( 0 ) ,
where the expectation is denoted with respect to the randomness of the channel and the scheduling policy.
Without loss of generality, we assume that the sources are synchronized at the beginning, so the initial values of the AoS follow s i ( 0 ) = 0 , i { 1 , , M } .

2.2. Constraints

We consider that the nodes transmit to the BS through a bandwidth-limited channel and the bandwidth requires that one node at most can transmit in each time slot. This bandwidth constraint can be formulated as
i = 1 M u i ( k ) 1 , k { 1 , , K } .
We consider that each node in the network has a minimum throughput requirement and let q i denote the minimum time-average throughput requirement of node i. The long-term time-average throughput under a specific policy π denoted by q ^ i π can be computed by
q ^ i π : = lim K 1 K k = 1 K E π d i ( k ) .
Then, the throughput constraint can be expressed as
q ^ i π q i , i { 1 , , M } .
The minimum throughput requirement of the entire network is feasible under the following assumption.
Assumption 1.
i = 1 M q i p i 1 ,
q i λ i , i { 1 , , M } .

2.3. Optimization Problem

We now formulate the optimization problem as follows.
Problem 1
(AoS optimization).
π * = arg min π Π lim K J K π ,
s . t . q ^ i π q i , i { 1 , , M } ;
i = 1 M u i ( k ) 1 , k { 1 , , K } .
Equation (8b) describes the throughput constraints and (8c) describes the bandwidth constraints. We denote the optimal expected weighted-sum AoS under the AoS-optimal policy as
A o S * = lim K J K π *
Then, we give a lower bound of the AoS optimization problem (Equations (8a)–(8c)) first. In three different cases, three scheduling policies are proposed.

3. Lower Bound

A lower bound of Equations (8a)–(8c) is obtained as follows.
Theorem 1.
The AoS optimization problem (Equations (8a)–(8c)) can be lower bounded by Equations (10a)–(10c) for every network setup ( M , λ i , p i , q i , α i ) .
A o S L B = min q ^ i 1 2 M i = 1 M α i 1 q ^ i + 2 2 λ i λ i 2 q ^ i 2 λ i λ i ,
s . t . q ^ i q i , i { 1 , , M } ;
i = 1 M u i ( k ) 1 , k { 1 , , K } .
Proof. 
Let Ω be the sample space associated with the network and ω Ω be a certain sample path. Let D i ( K ) = k = 1 K d i ( k ) denote the number of updates successfully transmitted from node i during the first K time slots under a certain sample path ω . Define U i [ m ] as the time index of the m-th arrival of a new update and T i [ m ] as the time index of the m-th successful transmission from node i, as shown in Figure 4. Then, the inter-delivery time can be computed by
I i [ m ] = T i [ m ] T i [ m 1 ] , m { 2 , , D i ( K ) }
and I i [ 1 ] = T i [ 1 ] . Denote the time from the m-th delivery to the next arrival as
X i [ m ] = min j { U i [ j ] | U i [ j ] > T i [ m 1 ] } T i [ m 1 ] , m { 2 , , D i ( K ) }
and X i [ 1 ] = U i [ 1 ] for simplicity.
Then, the K time slots can be decoupled as
K = m = 1 D i ( K ) I i m + R i , i { 1 , , M } ,
where R i denotes the rest slots after the D i ( K ) -th delivery. X i denotes the time from the last delivery to the next arrival or K. Since the arrival of updates follows a Bernoulli distribution with the parameter λ i , X i [ m ] and X i follow a geometric distribution with the parameter λ i , which is independent from I i [ m ] . During each I i [ m ] , the AoS increases after X i [ m ] slots from 0 to I i [ m ] X i [ m ] , so the time-average AoS of node i is
1 K E k = 1 K s i ( k ) = 1 K E m = 1 D i ( K ) ( I i [ m ] X i [ m ] ) ( I i [ m ] X i [ m ] + 1 ) 2 + ( R i X i ) ( R i X i + 1 ) 2
= ( a ) 1 2 K E m = 1 D i ( K ) I i 2 [ m ] + X i 2 [ m ] X i [ m ] + R i 2 + X i 2 X i 2 K X i [ m ] + K
= ( b ) 1 2 K E m = 1 D i ( K ) I i 2 [ m ] + R i 2 + ( D i ( K ) + 1 ) ( X i 2 X i ) 2 K X i + K ,
where (a) is derived by merging linear terms to K using Equation (13) and (b) is because X i [ m ] and X i are independent identically.
The first part of Equation (16) can be lower bounded by Jensen’s inequality
m = 1 D i ( K ) I i 2 [ m ] + R i 2 1 D i ( K ) + 1 m = 1 D i ( K ) I i [ m ] + R i 2 = K 2 D i ( K ) + 1 .
To calculate the second part of Equation (16), we can use the property of X i and q ^ i :
E [ X i ] = 1 λ i ,
E [ X i 2 ] = 2 λ i λ i 2 ,
lim K D i ( K ) K = q ^ i .
Combining Equations (16)–(19) and (2), we have
1 K E k = 1 K s i ( k ) K 2 ( D i ( K ) + 1 ) + D i ( K ) + 1 K · 1 λ i λ i 2 1 λ i + 1 2 .
Take K in Equation (21) and apply Equation (20):
lim K 1 K E k = 1 K s i ( k ) 1 2 q ^ i + 1 λ i λ i 2 q ^ i 2 λ i 2 λ i .
Summing over i { 1 , , M } gives the limitation of J K :
lim K J K 1 2 M i = 1 M α i 1 q ^ i + 2 2 λ i λ i 2 q ^ i 2 λ i λ i .
The lower bound for Equations (10a)–(10c) is proved.    □

4. Scheduling Policies

In this section, we propose three scheduling policies. When a central controller schedules the transmissions, we propose the optimal stationary randomized policy in the case where transmission acknowledgement is unused and we propose the max-weight policy in the case where the central controller can get transmission acknowledgement. We consider the BS as the central controller for simplicity. When there is no central scheduling and each node is unaware of the status of the other nodes, we propose the distributed policy.

4.1. Optimal Stationary Randomized Policy

In the case without transmission acknowledgement, the BS cannot compute the AoS of the nodes simultaneously. Therefore, the scheduling policy needs to be independent of the AoS. If a policy is entirely based on probability and will not change with the state of the network, it is called a stationary randomized policy and denoted by R Π R . A stationary randomized policy R chooses node i to transmit with probability μ i ( 0 , 1 ] and keeps idle with probability μ i d l e . μ i has the property that i = 1 M μ i + μ i d l e = 1 and μ i = E [ u i ( k ) ] . Then, we can determine the throughput and AoS of the stationary randomized policy R:
Proposition 1.
The long-term throughput and the expected time-average AoS of node i under a policy R Π R is
q ^ i R = p i μ i ;
lim K 1 K E k = 1 K s i ( k ) = 1 p i μ i 1 λ i + p i μ i λ i p i μ i .
Proof. 
Since the probabilities of both transmitting to node i and transmitting successfully—which refer to μ i and p i , respectively—are determined and independent, the BS receives an update from node i in a time slot with probability p i μ i . This implies the long-term throughput q ^ i R = p i μ i . The inter-delivery time I i [ m ] now follows a geometric distribution with parameter p i μ i .
Let the sum AoS during an inter-delivery time I i [ m ] be A i [ m ] = k = k i [ m ] + 1 k i [ m ] + I i [ m ] S i ( k ) , where k i [ m ] = j = 1 m 1 I i [ j ] if m > 1 and k i [ m ] = 0 if m = 1 . A i [ m ] can be derived by summing over the possible values of waiting time X i [ m ] .
A i [ m ] = x = 1 I i [ m ] 1 2 ( I i [ m ] x + 1 ) ( I i [ m ] x ) λ i ( 1 λ i ) x 1
= 1 2 I i [ m ] ( I i [ m ] + 1 ) I i [ m ] λ i + 1 λ i λ i 2 1 ( 1 λ i ) I i [ m ] + 1 .
The distribution of I i [ m ] gives
E [ I i [ m ] ] = 1 p i μ i ;
E [ I i 2 [ m ] ] = 2 p i μ i ( p i μ i ) 2 ;
E [ ( 1 λ i ) I i [ m ] ] = p i μ i ( 1 λ i ) 1 ( 1 λ i ) ( 1 p i μ i ) .
Combining Equations (27)–(30), the expectation of A i [ m ] is given as
E [ A i [ m ] ] = 1 ( p i μ i ) 2 1 p i μ i ( λ i + p i μ i λ i p i μ i ) .
The inter-delivery times I i [ m ] , m { 1 , , D i ( K ) } for each node i are independently identically distributed, so the expected time-average AoS of node i is equal to the ratio of expectation of A i [ m ] to I i [ m ] , which leads to Equation (25).    □
Substituting Equations (24) and (25) into Equations (8a)–(8c), the computation of the optimal stationary randomized policy can be formulated as follows.
Problem 2
(AoS optimization over stationary randomized policies).
A o S R * = min R Π R 1 M i = 1 M α i 1 p i μ i 1 λ i + p i μ i λ i p i μ i ,
s . t . p i μ i q i , i { 1 , , M } ;
i = 1 M μ i 1 .
Compare Equations (32a)–(32c) with the lower bound of Equations (10a)–(10c). The throughput q ^ i π solving the lower bound can also satisfy Equations (32b) and (32c). Replacing p i μ i with q ^ i π and subtracting the expression in the minimization function of A o S R * from that of 2 A o S L B gives
1 M i = 1 M α i 1 q ^ i π + 2 2 λ i λ i 2 q ^ i π 2 λ i λ i 1 M i = 1 M α i 1 q ^ i π 1 λ i + q ^ i π λ i q ^ i π
= 1 M i = 1 M α i 2 2 λ i λ i 2 q ^ i π 2 λ i λ i + 1 1 ( 1 λ i ) ( 1 q ^ i π )
> 1 M i = 1 M α i 2 2 λ i λ i 2 q ^ i π 2 λ i λ i + 1
= 1 M i = 1 M α i 2 ( 1 λ i ) ( q ^ i π λ i ) λ i 2
Though Equation (35) is smaller than 0 for q ^ i π < λ i , it is much smaller than the common part 1 / M i = 1 M α i / q ^ i π . Therefore, A o S R * can be bounded by 2 A o S L B adding a small incremental.
Solving Problem 2 means finding the optimal set of scheduling probabilities { μ i * } i = 1 M . For simplicity, we use B i ( μ i ) to represent α i M ( 1 p i μ i 1 λ i + p i μ i λ i p i μ i ) . Let ω i 0 , i { 1 , , M } and γ 0 be the Lagrange multiplier. The Lagrange equation is defined as
L ( μ i , ω i , γ ) = i = 1 M B i ( μ i ) + i = 1 M ω i ( q i p i μ i ) + γ ( i = 1 M μ i 1 ) .
Then, the KKT conditions are
μ i L ( μ i , ω i , γ ) = B i ( μ i ) μ i ω i p i + γ = 0 , i ;
ω i ( q i p i μ i ) = 0 , i ;
γ i = 1 M μ i 1 = 0 .
We change the form of B i ( μ i ) as follows
B i ( μ i ) = α i M 1 p i μ i 1 λ i + p i μ i λ i p i μ i
= α i M p i μ i 1 1 λ i p i μ i + 1 λ i .
B i ( μ i ) can be expressed as the product of two parts that are both positive and monotonically decreasing with μ i , so B i ( μ i ) monotonically decreases with μ i and B i ( μ i ) μ i < 0 . This gives
γ = B i ( μ i ) μ i + ω i p i > ω i p i 0 .
Combining Equations (39) and (42) we get
i = 1 M μ i = 1 .
According to Equation (38), a node i indicates whether ω i = 0 or p i μ i = q i . If p i μ i = q i , ω i 0 and γ B i ( μ i ) μ i . If ω i = 0 , Equation (42) turns to γ = B i ( μ i ) μ i . We can derive the monotonicity of B i ( μ i ) μ i by calculating the second partial derivative of B i ( μ i ) .
2 B i ( μ i ) μ i 2 = α i p i 2 M 1 ( p i μ i ) 3 ( 1 λ i ) 2 ( λ i + p i μ i λ i p i μ i ) 3 .
It is clear that 1 > ( 1 λ i ) 2 and ( p i μ i ) 3 < ( λ i + p i μ i λ i p i μ i ) 3 , so 2 B i ( μ i ) μ i 2 > 0 and B i ( μ i ) μ i increases monotonically with μ i .
Note that γ is shared by all μ i , so μ i can be derive by comparing B i ( q i / p i ) μ i and γ . When B i ( q i / p i ) μ i > γ , μ i is the solution of γ = B i ( μ i ) μ i , which is bigger than q i p i ; otherwise, it is μ i = q i p i .
We can get the optimal { μ i * } i = 1 M with the following steps. Start from a large γ so that μ i = q i p i , i . Now, we have i = 1 M μ i = i = 1 M q i p i 1 . When γ decreases to the point that γ < B i ( q i / p i ) μ i , μ i will be replaced by the solution of γ = B i ( μ i ) μ i , which increases gradually with the decrease in γ . Let γ decrease until i = 1 M μ i reaches 1. That is when the solution is reached.
Theorem 2
(Optimal stationary randomized policy). The optimal stationary randomized policy R * solving Equations (32a)–(32c) is the set of scheduling probabilities { μ i * } i = 1 M derived from Algorithm 1.
Algorithm 1 Solution to the optimal stationary randomized policy
1:
Initialization: M, α i , p i , q i , λ i and B i ( μ i ) = α i M ( 1 p i μ i 1 λ i + p i μ i λ i p i μ i )
2:
μ i = q i p i , i { 1 , 2 , , M }
3:
γ i = B i ( μ i ) μ i
4:
γ = max i γ i
5:
while i = 1 M μ i < 1 do
6:
   decrease γ slightly
7:
   for each i { 1 , 2 , , M }  do
8:
     if   B i ( μ i ) μ i > γ  then
9:
        replace μ i by the solution of γ = B i ( μ i ) μ i
10:
     end if
11:
   end for
12:
end while
13:
Output: γ * = γ and μ i * = μ i , i { 1 , 2 , , M }

4.2. Max-Weight Policy

When the transmission acknowledgement is used, the BS can make decisions according to the AoS of the network. The idea of the max-weight policy is to optimize the network by controlling the expected increase in the Lyapunov function. The Lyapunov function becomes large with a large AoS or a lack in throughput.
We define the throughput debt x i ( k ) as the difference between the target throughput and the number of actually delivered updates. A large x i ( k ) indicates that node i needs more transmissions to satisfy the throughput constraint.
x i ( k + 1 ) = k q i t = 1 k d i ( t ) .
If x i ( k ) < 0 , node i leads the target throughput so that the BS has no motivation to choose node i from the perspective of throughput. Therefore, we just focus on positive x i ( k ) . We use operator ( · ) + = max { ( · ) , 0 } to denote the positive part of the throughput debt x i + ( k ) = max { x i ( k ) , 0 } . Then, the throughput constraint can be satisfied when
lim K 1 K E k = 1 K x i + ( k ) < .
Define the system state at the beginning of time slot k as S k = ( s i ( k ) , x i + ( k ) ) i = 1 M and the Lyapunov function as
L ( S k ) : = 1 2 i = 1 M α i s i 2 ( k ) + V ( x i + ( k ) ) 2 ,
where V is a positive real number indicating the importance of the throughput constraint. Thus, L ( S k ) grows with the AoS or the throughput debt. We define the Lyapunov drift as
Δ ( S k ) : = E { L ( S k + 1 ) L ( S k ) | S k } .
The Lyapunov drift describes the expected change in the Lyapunov function in each time slot, so L ( S k ) can be restricted by reducing Δ ( S k ) . To help execute the max-weight policy, an upper bound of Δ ( S k ) is given below.
Proposition 2.
The Lyapunov drift can be upper-bounded by
Δ ( S k ) i = 1 M W i ( k ) E { u i ( k ) | S k } + C ( k ) ,
where
W i ( k ) = α i p i 2 s i ( k ) + 1 2 + V p i x i + ( k ) ;
C ( k ) = i = 1 M α i s i ( k ) + 1 2 + V q i x i + ( k ) + 1 2 .
Proof. 
Δ ( S k ) = 1 2 i = 1 M α i E { s i 2 ( k + 1 ) s i 2 ( k ) | S k } + V 2 i = 1 M E { [ x i + ( k + 1 ) ] 2 [ x i + ( k ) ] 2 | S k } .
Consider the latter part first. By the definition of x i ( k ) ,
[ x i + ( k + 1 ) ] 2 = [ max { x i ( k ) d i ( k ) + q i , 0 } ] 2 [ max { x i + ( k ) d i ( k ) + q i , 0 } ] 2 [ x i + ( k ) d i ( k ) + q i ] 2 [ x i + ( k ) ] 2 + 2 x i 2 ( k ) ( d i ( k ) + q i ) + 1 .
Take the expectation and use the property of d i ( k ) :
V 2 i = 1 M E { [ x i + ( k + 1 ) ] 2 [ x i + ( k ) ] 2 | S k } V i = 1 M x i + ( k ) p i E { u i ( k ) | S k } + q i + 1 2 .
The next step is dealing with the former part of Δ ( S k ) .
E { s i 2 ( k + 1 ) } 0 · E { d i ( k ) } + ( s i ( k ) + 1 ) 2 ( 1 E { d i ( k ) } )
= ( s i ( k ) + 1 ) 2 ( 1 p i E { u i ( k ) | S k } ) .
The inequality is because the AoS remains 0 rather than s i ( k ) + 1 if s i ( k ) = 0 . So, we have
E { s i 2 ( k + 1 ) s i 2 ( k ) | S k } ( s i ( k ) + 1 ) 2 p i E { u i ( k ) | S k } + 2 s i ( k ) + 1 .
Combining Equations (52), (54), and (57) completes the proof.    □
We can find from the form of Equations (49)–(51) that W i ( k ) and C ( k ) fully depend on the system state S ( k ) . What our policy controls is the set of u i ( k ) . We want to choose a node i that can reduce S k most to transmit in each time slot. So, the node with the largest W i ( k ) is the optimal choice. That is how max-weight works.
Lemma 1.
The max-weight policy satisfies any feasible set of minimum throughput requirements { q i } i = 1 M .
Lemma 2
(Upper bound of the max-weight policy). The optimal expected time-average AoS of the max-weight policy can be upper-bounded by
A o S M W 2 M i = 1 M α i p i μ i + V .
Lemmas 1 and 2 are from Theorems 6 and 7 in [25]. The upper bound of max-weight is near four times the lower bound in Equations (10a)–(10c). Though A o S M W has a large upper bound compared to A o S R * , it was found in the numerical simulation that max-weight performs much better than the optimal stationary randomized policy.

4.3. Distributed Policy

When the number of nodes increases, it is difficult and costly to apply the centralized policies proposed above. As an alternative, we study the distributed policy, where a node knows neither the system states of the other nodes nor when the other nodes are transmitting. It is possible that more than one node transmits to the BS in the same time slot. So, we first relax the bandwidth constraints (Equation (8c)) to a time-average constraint
1 K k = 1 K i = 1 M E u i ( k ) 1 .
Then, we solve the optimization problem with the Lagrange multiplier method.
Problem 3
(Relaxed AoS optimization).
A o S r e * = min π Π lim K 1 K M k = 1 K i = 1 M α i E [ s i ( k ) ] + C E u i ( k ) 1 M + θ i q i p i E u i ( k ) ,
s . t . θ i 0 , i { 1 , , M } ;
C 0 ,
where θ i and C are Lagrange multipliers respectively associated with throughput constraints E u i ( k ) q i p i and the relaxed bandwidth constraint (Equation (59)).
The form of Equation (60a) is independent for each node. Thus, the relaxed optimization problems associated with each individual node can be solved separately. From the perspective of the nodes, each node only considers its own AoS, and the action space is simplified to either transmitting or not in each time slot. As the following proposition shows, the transmission policy has a threshold structure.
Proposition 3.
(Threshold policy). The relaxed optimization problem (Equations (60a)–(60c)) for each single node i has an optimal threshold policy. Under the policy, node i chooses to transmit when s i ( k ) S i and to remain idle when 0 s i ( k ) < S i in time slot k. For given C and θ i , i { 1 , , M } , and if C > θ i , the threshold is
S i = 5 2 1 p i 1 λ i + 5 2 1 p i 1 λ i 2 + 2 C θ i α i p i 1 2 λ i λ i 1 p i p i .
If C θ i , S i = 0 .
When C θ i , the coefficient of E u i ( k ) in the objective function (Equation (60a)) is C θ i 0 . In that case, node i will always choose to transmit, as there is no constraint on transmission, which is equivalent to S i = 0 . When C > θ i , the proof of Proposition 3 follows from Appendix E in [19].
The final issue is how to choose the values of C and θ i . In order to examine the influence of the multipliers on the objective function, we can derive a lower bound of A o S r e * . Let C > θ i , as the function will fail to meet the bandwidth constraint otherwise. We use E s i ( k ) S i 1 and E u i ( k ) 0
max C , θ i ( L ( C , θ i ) ) A o S r e * ,
where
L ( C , θ i ) = 1 M i = 1 M α i ( S i 1 ) C M + q i θ i p i .
Taking the partial derivative of C and θ i
L ( C , θ i ) θ i = 1 M ϕ i + q i M p i ;
L ( C , θ i ) C = 1 M 1 + i = 1 M 1 ϕ i ,
where
ϕ i = p i 5 2 1 p i 1 λ i 2 + 2 C θ i α i p i 1 2 λ i λ i 1 p i p i .
Let Equation (64) equal 0
1 ϕ i = q i p i , i { 1 , , M } ;
Substituting Equation (67) into (65), we derive
L ( C , θ i ) C = 1 M 1 + i = 1 M q i p i 0 .
To maximize L ( C , θ i ) , we can continuously decrease C until Equation (65) equals 0. The initial value of C is given by Equation (67) and C θ i 0 , i . The values of C and θ i can be given by Algorithm 2.
Then, the distributed policy works in the following way. Each node i monitors its own AoS s i ( k ) and transmits to the BS when s i ( k ) exceeds the threshold S i . If multiple nodes attempt to transmit to the BS in a time slot, only one randomly selected node will be able to transmit, and the transmissions of the other nodes will be treated as failures.
Algorithm 2 Solution of the distributed policy
1:
Initialization: M, α i , p i , q i and λ i
2:
χ i = α i p i 2 1 q i 2 5 2 1 p i 1 λ i 2 + 2 ( 1 2 λ i ) ( 1 p i ) λ i p i , i { 1 , 2 , , M }
3:
C = max i { χ i }
4:
χ i = min { C , χ i } , i { 1 , 2 , , M }
5:
ϕ i = p i 5 2 1 p i 1 λ i 2 + 2 χ i α i p i ( 1 2 λ i ) ( 1 p i ) λ i p i , i { 1 , 2 , , M }
6:
while i = 1 M ϕ i 1 < 1 do
7:
   decrease C slightly
8:
   repeat steps 4 and 5
9:
end while
10:
Output: C * = C and θ i * = C * χ i , i { 1 , 2 , , M }

5. Simulation Results

In this section, we provide simulation results for the optimal stationary randomized policy, the max-weight policy, and the distributed policy. For comparison, we simulated the round robin policy, the largest-weighted-debt-first policy, and the drift-plus-penalty policy. The round robin policy, which has no randomness and functions regardless of the system state, chooses each node that will transmit in turn. The largest-weighted-debt-first policy is proposed in [26] and chooses the nodes with the highest x i ( k ) / p i in time slot k. The drift-plus-penalty policy proposed from [25] chooses the node with the highest W i ( k ) = β i p i 2 h i ( k ) + V p i x i + ( k ) , where h i ( k ) is the age of information of node i and β i is a positive real value associated with node i. When transmission feedback is unavailable, only the optimal stationary randomized policy and the round robin policy can be used.
We simulated a network with M nodes. Node i has the weight α i = i / i = 1 M i . Arriving rates of the M new updates are evenly distributed between 0.5 and 0.1 . The set of channel reliability values p i is a vector of M evenly spaced points between 0.9 and 0.1 . A parameter ε [ 0 , 1 ) shows the hardness of the throughput constraints to be satisfied. The set of q i / p i sums to ε and is proportional to a set of M evenly spaced points between 0.06 and 0.1 . The importance of the throughput constraint in the max-weight was set to V = 100 .
Figure 5 shows the performance of the throughput of the policies over time. The max normalized throughput debt was defined as max i { x i + ( K + 1 ) / ( K q i ) } . The system was set with M = 10 , K = 10 5 , and ε = 0.8 , and the results were taken as the average from 100 simulations. After the initial rise, the max normalized throughput debt of the optimal stationary randomized policy, the max-weight policy, the round robin policy, the largest-weighted-debt-first policy, and the drift-plus-penalty policy gradually approached zero with different speeds, which proves that these policies can satisfy throughput constraints in steady state. It is reasonable that the largest-weighted-debt-first policy descended fastest, as its optimization objective is the same as this measurement. Notice that the max normalized throughput debt of the distributed policy could not reach zero, meaning that the distributed policy could not give a throughput guarantee. However, compared with the results for the distributed policy without the multipliers θ i , our distributed policy has made great progress in meeting the throughput constraints.
Figure 6 compares the expected weighted-sum AoS of five policies over time and the lower bound defined by Equations (10a)–(10c). The system was set with M = 10 , K = 10 5 , and ε = 0.8 . The results were taken as the average from 100 simulations. The optimal stationary randomized policy and the round robin policy had significant disadvantages compared to the other policies because they are unable to use the system states. However, the optimal stationary randomized policy performed much better than the round robin policy. The steady AoS of the optimal stationary randomized policy was close to twice the lower bound, which matches the previous analysis. When transmission feedback was available, it was clear that max-weight performed best regarding the expected weighted-sum AoS and was close to the lower bound. Though the AoS of the distributed policy grew faster at the beginning due to the threshold structure, it gradually converged to a good level close to the largest-weighted-debt-first policy.
Figure 7 compares the expected weighted-sum AoS of the policies and the lower bound with different numbers of nodes, which were set by M { 5 , 10 , , 45 , 50 } . The total simulation time was K = 10 5 . Each result was the average of the data for the time duration 0.9 × 10 5 to 10 5 . The hardness of throughput constraints was ε = 0.8 . The performance of the six policies generally kept stable gaps and moved closer to the lower bound while the number of nodes grew. When the number of nodes was very large, the distributed policy showed greater potential for progress and the AoS of the max-weight policy was very close to the lower bound.
Figure 8 compares the expected weighted-sum AoS under different throughput constraints. We set the hardness of the throughput constraints ε to change from 0.5 to 0.95 . A larger ε means the throughput constraints are closer to the upper bound limited by Assumption 1. The system was set with M = 10 , K = 10 5 . Each result was the average of the data for the time duration 0.9 × 10 5 to 10 5 . When the hardness of satisfying the throughput constraints increased, each policy had to prioritize the throughput and had fewer resources available to reduce the AoS. Thus, it can be seen that the gap between the max-weight, the drift-plus-penalty, and the largest-weighted-debt-first policies and the gap between the optimal stationary randomized and round robin policies decreased with the growth in ε . The distributed policy showed a similar trend as the max-weight policy.

6. Conclusions

In this study, we investigated a wireless network that transmits time-sensitive data from multiple nodes to a single base station (BS) over a shared imperfect channel while ensuring the minimum throughput requirement of each node. We measured the freshness of information stored at the BS with a metric called the age of synchronization (AoS). The objective of this study was to minimize the time-average AoS of the entire network while meeting the throughput requirement of each node. We proposed three low-complexity scheduling policies under different scenarios: the optimal stationary randomized policy, the max-weight policy, and the distributed policy. Numerical simulations showed that, in the central control scenario, the optimal stationary randomized policy and the max-weight policy could meet the minimum throughput requirement well. In the case where transmission feedback was unavailable to the BS, the optimal stationary randomized policy showed good AoS performance, and when transmission feedback was available, the max-weight policy closely approximated the AoS lower bound. In the distributed scenario, though the throughput requirement could not be guaranteed, the distributed policy made a great contribution toward meeting the throughput requirement and performed well in terms of AoS.

Author Contributions

Conceptualization, Y.H.; methodology, Y.H. and G.C.; validation, Y.H.; formal analysis, Y.H. and Y.C.; writing—original draft, Y.H.; writing—review and editing, Y.C., J.W. and J.S.; supervision, J.W. and J.S. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the National Key Research and Development Program of China under Grant 2022YFE0101700; and by Science, Technology and Innovation Commission of Shenzhen Municipality under Grant JSGG20211029095003004.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

The data presented in this study are available on request from the corresponding author. The data are not publicly available due to privacy.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Kaul, S.; Yates, R.; Gruteser, M. Real-time status: How often should one update? In Proceedings of the 2012 Proceedings IEEE INFOCOM, Orlando, FL, USA, 25–30 March 2012; pp. 2731–2735. [Google Scholar] [CrossRef]
  2. Kadota, I.; Uysal-Biyikoglu, E.; Singh, R.; Modiano, E. Minimizing the Age of Information in broadcast wireless networks. In Proceedings of the 2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, IL, USA, 27–30 September 2016; pp. 844–851. [Google Scholar] [CrossRef]
  3. Yates, R.D.; Ciblat, P.; Yener, A.; Wigger, M. Age-optimal constrained cache updating. In Proceedings of the 2017 IEEE International Symposium on Information Theory (ISIT), Aachen, Germany, 25–30 June 2017; pp. 141–145. [Google Scholar] [CrossRef]
  4. Talak, R.; Kadota, I.; Karaman, S.; Modiano, E. Scheduling Policies for Age Minimization in Wireless Networks with Unknown Channel State. In Proceedings of the 2018 IEEE International Symposium on Information Theory (ISIT), Vail, CO, USA, 17–22 June 2018; pp. 2564–2568. [Google Scholar] [CrossRef]
  5. Kadota, I.; Sinha, A.; Uysal-Biyikoglu, E.; Singh, R.; Modiano, E. Scheduling Policies for Minimizing Age of Information in Broadcast Wireless Networks. IEEE/ACM Trans. Netw. 2018, 26, 2637–2650. [Google Scholar] [CrossRef]
  6. Tang, H.; Wang, J.; Song, L.; Song, J. Minimizing Age of Information with Power Constraints: Multi-User Opportunistic Scheduling in Multi-State Time-Varying Channels. IEEE J. Sel. Areas Commun. 2020, 38, 854–868. [Google Scholar] [CrossRef]
  7. Tang, H.; Ciblat, P.; Wang, J.; Wigger, M.; Yates, R.D. Cache Updating Strategy Minimizing the Age of Information with Time-Varying Files’ Popularities. In Proceedings of the 2020 IEEE Information Theory Workshop (ITW), Riva del Garda, Italy, 11–15 April 2021; pp. 1–5. [Google Scholar] [CrossRef]
  8. Oğuz, T.K.; Ceran, E.T.; Uysal, E.; Girici, T. Implementation and Evaluation of Age-Aware Downlink Scheduling Policies in Push-Based and Pull-Based Communication. Entropy 2022, 24, 673. [Google Scholar] [CrossRef] [PubMed]
  9. Sun, J.; Zhang, S.; Yang, C.; Huang, L. Age of Information Minimization for Radio Frequency Energy-Harvesting Cognitive Radio Networks. Entropy 2022, 24, 596. [Google Scholar] [CrossRef] [PubMed]
  10. Wang, L.; Peng, F.; Chen, X.; Zhou, S. Optimal Information Update for Energy Harvesting Sensor with Reliable Backup Energy. Entropy 2022, 24, 961. [Google Scholar] [CrossRef] [PubMed]
  11. Hsu, Y.P.; Modiano, E.; Duan, L. Age of information: Design and analysis of optimal scheduling algorithms. In Proceedings of the 2017 IEEE International Symposium on Information Theory (ISIT), Aachen, Germany, 25–30 June 2017; pp. 561–565. [Google Scholar] [CrossRef]
  12. Hsu, Y.P. Age of Information: Whittle Index for Scheduling Stochastic Arrivals. In Proceedings of the 2018 IEEE International Symposium on Information Theory (ISIT), Vail, CO, USA, 17–22 June 2018; pp. 2634–2638. [Google Scholar] [CrossRef]
  13. Qian, Z.; Wu, F.; Pan, J.; Srinivasan, K.; Shroff, N.B. Minimizing Age of Information in Multi-channel Time-sensitive Information Update Systems. In Proceedings of the IEEE INFOCOM 2020—IEEE Conference on Computer Communications, Toronto, ON, Canada, 6–9 July 2020; pp. 446–455. [Google Scholar] [CrossRef]
  14. Hsu, Y.P.; Modiano, E.; Duan, L. Scheduling Algorithms for Minimizing Age of Information in Wireless Broadcast Networks with Random Arrivals. IEEE Trans. Mob. Comput. 2020, 19, 2903–2915. [Google Scholar] [CrossRef]
  15. Kadota, I.; Modiano, E. Minimizing the Age of Information in Wireless Networks with Stochastic Arrivals. IEEE Trans. Mob. Comput. 2021, 20, 1173–1185. [Google Scholar] [CrossRef]
  16. Zhang, J.; Xu, Y. Age Analysis of Status Updating System with Probabilistic Packet Preemption. Entropy 2022, 24, 785. [Google Scholar] [CrossRef] [PubMed]
  17. Zhong, J.; Yates, R.D.; Soljanin, E. Two Freshness Metrics for Local Cache Refresh. In Proceedings of the 2018 IEEE International Symposium on Information Theory (ISIT), Vail, CO, USA, 17–22 June 2018; pp. 1924–1928. [Google Scholar] [CrossRef]
  18. Joo, C.; Eryilmaz, A. Wireless scheduling for information freshness and synchrony: Drift-based design and heavy-traffic analysis. In Proceedings of the 2017 15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), Paris, France, 15–19 May 2017; pp. 1–8. [Google Scholar] [CrossRef]
  19. Tang, H.; Wang, J.; Tang, Z.; Song, J. Scheduling to Minimize Age of Synchronization in Wireless Broadcast Networks with Random Updates. IEEE Trans. Wirel. Commun. 2020, 19, 4023–4037. [Google Scholar] [CrossRef]
  20. Zhang, Q.; Tang, H.; Wang, J. Minimizing the Age of Synchronization in Power-Constrained Wireless Networks with Unreliable Time-Varying Channels. In Proceedings of the IEEE INFOCOM 2020—IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Toronto, ON, Canada, 6–9 July 2020; pp. 936–941. [Google Scholar] [CrossRef]
  21. Sun, J.; Wang, L.; Jiang, Z.; Zhou, S.; Niu, Z. Age-Optimal Scheduling for Heterogeneous Traffic with Timely Throughput Constraints. IEEE J. Sel. Areas Commun. 2021, 39, 1485–1498. [Google Scholar] [CrossRef]
  22. Tan, Y.; Tang, H.; Wang, J.; Song, J. Early Drop: A Packet-Dropping Incentive Rate Control Mechanism to Keep Data Fresh under Heterogeneous QoS Requirements. In Proceedings of the 2021 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), Chengdu, China, 4–6 August 2021; pp. 1–6. [Google Scholar] [CrossRef]
  23. Li, B. Efficient Learning-based Scheduling for Information Freshness in Wireless Networks. In Proceedings of the IEEE INFOCOM 2021—IEEE Conference on Computer Communications, Vancouver, BC, Canada, 10–13 May 2021; pp. 1–10. [Google Scholar] [CrossRef]
  24. He, Y.; Chen, G.; Chen, Y.; Wang, J.; Song, J. Scheduling Algorithms for Minimizing the Age of Synchronization in Wireless Networks with Random Updates under Throughput Constraints. In Proceedings of the 2022 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), Bilbao, Spain, 15–17 June 2022; pp. 1–6. [Google Scholar] [CrossRef]
  25. Kadota, I.; Sinha, A.; Modiano, E. Scheduling Algorithms for Optimizing Age of Information in Wireless Networks with Throughput Constraints. IEEE/ACM Trans. Netw. 2019, 27, 1359–1372. [Google Scholar] [CrossRef]
  26. Hou, I.H.; Borkar, V.; Kumar, P.R. A Theory of QoS for Wireless. In Proceedings of the IEEE INFOCOM 2009, Rio de Janeiro, Brazil, 19–25 April 2009; pp. 486–494. [Google Scholar] [CrossRef]
Figure 1. An industrial IoT network contains many components.
Figure 1. An industrial IoT network contains many components.
Entropy 25 01331 g001
Figure 2. System model.
Figure 2. System model.
Entropy 25 01331 g002
Figure 3. A demonstration of random arrival and update transmission is shown above. The evolution of the AoS is shown below.
Figure 3. A demonstration of random arrival and update transmission is shown above. The evolution of the AoS is shown below.
Entropy 25 01331 g003
Figure 4. The definition of I i [ m ] and X i [ m ] .
Figure 4. The definition of I i [ m ] and X i [ m ] .
Entropy 25 01331 g004
Figure 5. The max normalized throughput debt varied with time.
Figure 5. The max normalized throughput debt varied with time.
Entropy 25 01331 g005
Figure 6. The expected weighted-sum AoS varied with time.
Figure 6. The expected weighted-sum AoS varied with time.
Entropy 25 01331 g006
Figure 7. The expected weighted-sum AoS varied with the number of nodes.
Figure 7. The expected weighted-sum AoS varied with the number of nodes.
Entropy 25 01331 g007
Figure 8. The expected weighted-sum AoS varied with the hardness of the throughput constraints.
Figure 8. The expected weighted-sum AoS varied with the hardness of the throughput constraints.
Entropy 25 01331 g008
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

He, Y.; Chen, G.; Chen, Y.; Wang, J.; Song, J. Age of Synchronization Minimization Algorithms in Wireless Networks with Random Updates under Throughput Constraints. Entropy 2023, 25, 1331. https://doi.org/10.3390/e25091331

AMA Style

He Y, Chen G, Chen Y, Wang J, Song J. Age of Synchronization Minimization Algorithms in Wireless Networks with Random Updates under Throughput Constraints. Entropy. 2023; 25(9):1331. https://doi.org/10.3390/e25091331

Chicago/Turabian Style

He, Yuqiao, Guozhi Chen, Yuchao Chen, Jintao Wang, and Jian Song. 2023. "Age of Synchronization Minimization Algorithms in Wireless Networks with Random Updates under Throughput Constraints" Entropy 25, no. 9: 1331. https://doi.org/10.3390/e25091331

APA Style

He, Y., Chen, G., Chen, Y., Wang, J., & Song, J. (2023). Age of Synchronization Minimization Algorithms in Wireless Networks with Random Updates under Throughput Constraints. Entropy, 25(9), 1331. https://doi.org/10.3390/e25091331

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop