2020
DOI: 10.1109/jsac.2020.2980911
|View full text |Cite
|
Sign up to set email alerts
|

Minimizing Age of Information With Power Constraints: Multi-User Opportunistic Scheduling in Multi-State Time-Varying Channels

Abstract: This work is motivated by the need of collecting fresh data from power-constrained sensors in the industrial Internet of Things (IIoT) network. A recently proposed metric, the Age of Information (AoI) is adopted to measure data freshness from the perspective of the central controller in the IIoT network. We wonder what is the minimum average AoI the network can achieve and how to design scheduling algorithms to approach it. To answer these questions when the channel states of the network are Markov time-varyin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
43
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 133 publications
(49 citation statements)
references
References 44 publications
0
43
0
Order By: Relevance
“…Afterwards, a series of works [5]- [12] aimed at characterizing the average AoI and its variations (e.g., Peak Age-of-Information (PAoI) [8]- [10] and Value of Information of Update (VoIU) [11]) for adaptations of the queueing model studied in [4]. Another direction of research [13]- [33] focused on employing AoI as a performance metric for different communication systems that deal with time critical information while having limited resources, e.g., multi-server information-update systems [14], broadcast networks [15]- [17], multi-hop networks [18], cognitive networks [19], unmanned aerial vehicle (UAV)assisted communication systems [20]- [22], IoT networks [2], [23], [24], ultra-reliable low-latency vehicular networks [25], multicast networks [26], decentralized random access schemes [32], and multi-state time-varying networks [33]. Particularly, the objective of this research direction was to characterize optimal policies that minimize average AoI, referred to as ageoptimal polices, by applying different tools from optimization theory.…”
Section: A Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Afterwards, a series of works [5]- [12] aimed at characterizing the average AoI and its variations (e.g., Peak Age-of-Information (PAoI) [8]- [10] and Value of Information of Update (VoIU) [11]) for adaptations of the queueing model studied in [4]. Another direction of research [13]- [33] focused on employing AoI as a performance metric for different communication systems that deal with time critical information while having limited resources, e.g., multi-server information-update systems [14], broadcast networks [15]- [17], multi-hop networks [18], cognitive networks [19], unmanned aerial vehicle (UAV)assisted communication systems [20]- [22], IoT networks [2], [23], [24], ultra-reliable low-latency vehicular networks [25], multicast networks [26], decentralized random access schemes [32], and multi-state time-varying networks [33]. Particularly, the objective of this research direction was to characterize optimal policies that minimize average AoI, referred to as ageoptimal polices, by applying different tools from optimization theory.…”
Section: A Related Workmentioning
confidence: 99%
“…Particularly, the objective of this research direction was to characterize optimal policies that minimize average AoI, referred to as ageoptimal polices, by applying different tools from optimization theory. Note that [13]- [33] did not consider energy harvesting as a powering source for the source nodes.…”
Section: A Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…To fill this gap, we study a scenario where the base station (BS) collects time-sensitive data from multiple sensors through time-varying channels. We generalize our previous work [ 22 ] by considering a more realistic time-varying channel with packet loss and a more general age penalty measurement to model different application scenarios. The main contributions of the paper are listed as follows.…”
Section: Introductionmentioning
confidence: 99%
“…There are variety of computation offloading methods such as [5]- [13] are proposed to offload task from edge users to servers in edge computing environments. However, most of the current computation offloading approaches assume that the edge users share the same settings.…”
Section: Introductionmentioning
confidence: 99%