Scheduling for Periodic Multi-Source Systems with Peak-Age Violation Guarantees

Kuan Yu Lin, Yu Chih Huang*, Yu Pin Hsu

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

3 Scopus citations

Abstract

Age of information (AoI) is an effective performance metric measuring the freshness of information and is particularly suitable for applications involving status update. In this paper, using the age violation probability as the metric, scheduling for heterogeneous multi-source systems is studied. Two queueing disciplines, namely the infinite packet queueing discipline and the single packet queueing discipline, are considered for scheduling packets within each source. A generalized round-robin (GRR) scheduling policy is then proposed to schedule the sources. Bounds on the exponential decay rate of the age violation probability for the proposed GRR scheduling policy under each queueing discipline are rigorously analyzed. Simulation results are provided, which show that the proposed GRR scheduling policy can efficiently serve many sources with heterogeneous arrivals and that our bounds can capture the true decay rate quite accurately. When specialized to the homogeneous source setting, the analysis concretizes the common belief that the single packet queueing discipline has a better AoI performance than the infinite packet queueing discipline. Moreover, simulations on this special case reveals that under the proposed scheduling policy, the two disciplines would have similar asymptotic performance when the inter-arrival time is much larger than the total transmission time.

Original languageEnglish
Pages (from-to)7102-7116
Number of pages15
JournalIEEE Transactions on Communications
Volume71
Issue number12
DOIs
StatePublished - 1 Dec 2023

Keywords

  • Age of information (AoI)
  • age violation probability
  • scheduling algorithms

Fingerprint

Dive into the research topics of 'Scheduling for Periodic Multi-Source Systems with Peak-Age Violation Guarantees'. Together they form a unique fingerprint.

Cite this