SlideShare a Scribd company logo
1 of 2
Download to read offline
Age of Information in Physical
Network Coding Enabled Two
Networks
Abstract
This paper investigates the information freshness of two
(TWRNs) operated with physical
freshness is quantified by age of information (AoI), defined as the time
elapsed since the generation time of the latest received information update.
PNC reduces the communication latency of TWRNs by turning superimposed
electromagnetic waves into network
send update packets to each other more frequently via the relay. While
sending update packets more frequently has the potential to reduce AoI, how
to handle packet corruption in TWRNs has not been investigated. Specifically,
if an old packet is corrupted in any hop of a TWRN, one needs to decide
whether to drop or to retransmit the old packet, e.g., a new packet has more
recent information but may take more time to be delivered. Therefore, we
study the average AoI with and without au
Age of Information in Physical-Layer
Network Coding Enabled Two-Way Relay
This paper investigates the information freshness of two-way relay networks
(TWRNs) operated with physical-layer network coding (PNC). Information
quantified by age of information (AoI), defined as the time
elapsed since the generation time of the latest received information update.
PNC reduces the communication latency of TWRNs by turning superimposed
electromagnetic waves into network-coded messages so that end users can
send update packets to each other more frequently via the relay. While
sending update packets more frequently has the potential to reduce AoI, how
to handle packet corruption in TWRNs has not been investigated. Specifically,
ld packet is corrupted in any hop of a TWRN, one needs to decide
whether to drop or to retransmit the old packet, e.g., a new packet has more
recent information but may take more time to be delivered. Therefore, we
study the average AoI with and without automatic repeat request (ARQ) in
Layer
Way Relay
way relay networks
layer network coding (PNC). Information
quantified by age of information (AoI), defined as the time
elapsed since the generation time of the latest received information update.
PNC reduces the communication latency of TWRNs by turning superimposed
s so that end users can
send update packets to each other more frequently via the relay. While
sending update packets more frequently has the potential to reduce AoI, how
to handle packet corruption in TWRNs has not been investigated. Specifically,
ld packet is corrupted in any hop of a TWRN, one needs to decide
whether to drop or to retransmit the old packet, e.g., a new packet has more
recent information but may take more time to be delivered. Therefore, we
tomatic repeat request (ARQ) in
PNC-enabled TWRNs. Interestingly, our analysis shows that neither the non-
ARQ scheme nor the pure ARQ scheme achieves a good average AoI.
Hence, we put forth an uplink-lost-then-drop (ULTD) protocol that combines
packet drop and ARQ. Experiments on software-defined radios indicate that
ULTD significantly outperforms non-ARQ and pure ARQ schemes in terms of
average AoI, especially when the two end users have imbalanced channel
conditions. We believe the insight of ULTD on TWRNs generally applies to
other two-hop networks: to achieve high information freshness, when packets
are corrupted in the first hop, new packets should be generated and sent (i.e.,
old packets are discarded); when packets are corrupted in the second hop,
old packets should be retransmitted until they are successfully received.

More Related Content

Similar to Age of Information in Physical-Layer Network Coding Enabled Two-Way Relay Networks.pdf

Predictable Packet Lossand Proportional Buffer Scaling Mechanism
Predictable Packet Lossand Proportional Buffer Scaling MechanismPredictable Packet Lossand Proportional Buffer Scaling Mechanism
Predictable Packet Lossand Proportional Buffer Scaling Mechanism
IDES Editor
 

Similar to Age of Information in Physical-Layer Network Coding Enabled Two-Way Relay Networks.pdf (20)

Wormhole switching : Notes
Wormhole switching : NotesWormhole switching : Notes
Wormhole switching : Notes
 
Predictable Packet Lossand Proportional Buffer Scaling Mechanism
Predictable Packet Lossand Proportional Buffer Scaling MechanismPredictable Packet Lossand Proportional Buffer Scaling Mechanism
Predictable Packet Lossand Proportional Buffer Scaling Mechanism
 
TCP with delayed ack for wireless networks
TCP with delayed ack for wireless networksTCP with delayed ack for wireless networks
TCP with delayed ack for wireless networks
 
Computer Communication Networks, network layer performance.pptx
Computer Communication Networks, network layer performance.pptxComputer Communication Networks, network layer performance.pptx
Computer Communication Networks, network layer performance.pptx
 
A Novel Path Tracing Scheme In All-Optical Networks Using Benes Network
A Novel Path Tracing Scheme In All-Optical Networks Using Benes NetworkA Novel Path Tracing Scheme In All-Optical Networks Using Benes Network
A Novel Path Tracing Scheme In All-Optical Networks Using Benes Network
 
Quantum Entanglement - Cryptography and Communication
Quantum Entanglement - Cryptography and CommunicationQuantum Entanglement - Cryptography and Communication
Quantum Entanglement - Cryptography and Communication
 
Unit 3 CND physical layer_switching_pranoti doke
Unit 3  CND physical layer_switching_pranoti dokeUnit 3  CND physical layer_switching_pranoti doke
Unit 3 CND physical layer_switching_pranoti doke
 
Unit 3 cnd physical layer_switching_pranoti doke
Unit 3  cnd physical layer_switching_pranoti dokeUnit 3  cnd physical layer_switching_pranoti doke
Unit 3 cnd physical layer_switching_pranoti doke
 
Clock synchronization estimation of non deterministic delays in wireless mess...
Clock synchronization estimation of non deterministic delays in wireless mess...Clock synchronization estimation of non deterministic delays in wireless mess...
Clock synchronization estimation of non deterministic delays in wireless mess...
 
MSN_CameraReady.pdf
MSN_CameraReady.pdfMSN_CameraReady.pdf
MSN_CameraReady.pdf
 
32 marycherian 336-349
32 marycherian 336-34932 marycherian 336-349
32 marycherian 336-349
 
Conjestion control
Conjestion controlConjestion control
Conjestion control
 
Analytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum ThroughputAnalytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum Throughput
 
Ch 18 intro to network layer - section 3
Ch 18   intro to network layer - section 3Ch 18   intro to network layer - section 3
Ch 18 intro to network layer - section 3
 
Design and implementation of low latency weighted round robin (ll wrr) schedu...
Design and implementation of low latency weighted round robin (ll wrr) schedu...Design and implementation of low latency weighted round robin (ll wrr) schedu...
Design and implementation of low latency weighted round robin (ll wrr) schedu...
 
switching techniques
switching techniques switching techniques
switching techniques
 
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
 
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
 
Tcp performance simulationsusingns2
Tcp performance simulationsusingns2Tcp performance simulationsusingns2
Tcp performance simulationsusingns2
 
Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...
Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...
Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...
 

More from OKOKPROJECTS

More from OKOKPROJECTS (20)

Distributed State Estimation With Deep Neural Networks for Uncertain Nonlinea...
Distributed State Estimation With Deep Neural Networks for Uncertain Nonlinea...Distributed State Estimation With Deep Neural Networks for Uncertain Nonlinea...
Distributed State Estimation With Deep Neural Networks for Uncertain Nonlinea...
 
Distributed Inference in Resource-Constrained IoT for Real-Time Video Surveil...
Distributed Inference in Resource-Constrained IoT for Real-Time Video Surveil...Distributed Inference in Resource-Constrained IoT for Real-Time Video Surveil...
Distributed Inference in Resource-Constrained IoT for Real-Time Video Surveil...
 
DLTIF Deep Learning-Driven Cyber Threat Intelligence Modeling and Identificat...
DLTIF Deep Learning-Driven Cyber Threat Intelligence Modeling and Identificat...DLTIF Deep Learning-Driven Cyber Threat Intelligence Modeling and Identificat...
DLTIF Deep Learning-Driven Cyber Threat Intelligence Modeling and Identificat...
 
DGSSC A Deep Generative Spectral-Spatial Classifier for Imbalanced Hyperspect...
DGSSC A Deep Generative Spectral-Spatial Classifier for Imbalanced Hyperspect...DGSSC A Deep Generative Spectral-Spatial Classifier for Imbalanced Hyperspect...
DGSSC A Deep Generative Spectral-Spatial Classifier for Imbalanced Hyperspect...
 
Digital Restoration of Cultural Heritage With Data-Driven Computing A Survey.pdf
Digital Restoration of Cultural Heritage With Data-Driven Computing A Survey.pdfDigital Restoration of Cultural Heritage With Data-Driven Computing A Survey.pdf
Digital Restoration of Cultural Heritage With Data-Driven Computing A Survey.pdf
 
Dependable Intrusion Detection System for IoT A Deep Transfer Learning Based ...
Dependable Intrusion Detection System for IoT A Deep Transfer Learning Based ...Dependable Intrusion Detection System for IoT A Deep Transfer Learning Based ...
Dependable Intrusion Detection System for IoT A Deep Transfer Learning Based ...
 
DendroMap Visual Exploration of Large-Scale Image Datasets for Machine Learni...
DendroMap Visual Exploration of Large-Scale Image Datasets for Machine Learni...DendroMap Visual Exploration of Large-Scale Image Datasets for Machine Learni...
DendroMap Visual Exploration of Large-Scale Image Datasets for Machine Learni...
 
Dense Nested Attention Network for Infrared Small Target Detection.pdf
Dense Nested Attention Network for Infrared Small Target Detection.pdfDense Nested Attention Network for Infrared Small Target Detection.pdf
Dense Nested Attention Network for Infrared Small Target Detection.pdf
 
Detection of Small Moving Targets in Cluttered Infrared Imagery.pdf
Detection of Small Moving Targets in Cluttered Infrared Imagery.pdfDetection of Small Moving Targets in Cluttered Infrared Imagery.pdf
Detection of Small Moving Targets in Cluttered Infrared Imagery.pdf
 
Depression Screening in Humans With AI and Deep Learning Techniques.pdf
Depression Screening in Humans With AI and Deep Learning Techniques.pdfDepression Screening in Humans With AI and Deep Learning Techniques.pdf
Depression Screening in Humans With AI and Deep Learning Techniques.pdf
 
DeepTx Deep Learning Beamforming With Channel Prediction.pdf
DeepTx Deep Learning Beamforming With Channel Prediction.pdfDeepTx Deep Learning Beamforming With Channel Prediction.pdf
DeepTx Deep Learning Beamforming With Channel Prediction.pdf
 
DeHIN A Decentralized Framework for Embedding Large-Scale Heterogeneous Infor...
DeHIN A Decentralized Framework for Embedding Large-Scale Heterogeneous Infor...DeHIN A Decentralized Framework for Embedding Large-Scale Heterogeneous Infor...
DeHIN A Decentralized Framework for Embedding Large-Scale Heterogeneous Infor...
 
DefQ Defensive Quantization Against Inference Slow-Down Attack for Edge Compu...
DefQ Defensive Quantization Against Inference Slow-Down Attack for Edge Compu...DefQ Defensive Quantization Against Inference Slow-Down Attack for Edge Compu...
DefQ Defensive Quantization Against Inference Slow-Down Attack for Edge Compu...
 
Deep-Learning-Driven Proactive Maintenance Management of IoT-Empowered Smart ...
Deep-Learning-Driven Proactive Maintenance Management of IoT-Empowered Smart ...Deep-Learning-Driven Proactive Maintenance Management of IoT-Empowered Smart ...
Deep-Learning-Driven Proactive Maintenance Management of IoT-Empowered Smart ...
 
Deep-Distributed-Learning-Based POI Recommendation Under Mobile-Edge Networks...
Deep-Distributed-Learning-Based POI Recommendation Under Mobile-Edge Networks...Deep-Distributed-Learning-Based POI Recommendation Under Mobile-Edge Networks...
Deep-Distributed-Learning-Based POI Recommendation Under Mobile-Edge Networks...
 
DeepCog A Trustworthy Deep Learning-Based Human Cognitive Privacy Framework i...
DeepCog A Trustworthy Deep Learning-Based Human Cognitive Privacy Framework i...DeepCog A Trustworthy Deep Learning-Based Human Cognitive Privacy Framework i...
DeepCog A Trustworthy Deep Learning-Based Human Cognitive Privacy Framework i...
 
DeepCrowd A Deep Model for Large-Scale Citywide Crowd Density and Flow Predic...
DeepCrowd A Deep Model for Large-Scale Citywide Crowd Density and Flow Predic...DeepCrowd A Deep Model for Large-Scale Citywide Crowd Density and Flow Predic...
DeepCrowd A Deep Model for Large-Scale Citywide Crowd Density and Flow Predic...
 
D2Net Deep Denoising Network in Frequency Domain for Hyperspectral Image.pdf
D2Net Deep Denoising Network in Frequency Domain for Hyperspectral Image.pdfD2Net Deep Denoising Network in Frequency Domain for Hyperspectral Image.pdf
D2Net Deep Denoising Network in Frequency Domain for Hyperspectral Image.pdf
 
Decentralized Federated Learning for Industrial IoT With Deep Echo State Netw...
Decentralized Federated Learning for Industrial IoT With Deep Echo State Netw...Decentralized Federated Learning for Industrial IoT With Deep Echo State Netw...
Decentralized Federated Learning for Industrial IoT With Deep Echo State Netw...
 
Cyber Code Intelligence for Android Malware Detection.pdf
Cyber Code Intelligence for Android Malware Detection.pdfCyber Code Intelligence for Android Malware Detection.pdf
Cyber Code Intelligence for Android Malware Detection.pdf
 

Recently uploaded

SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
CaitlinCummins3
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 

Recently uploaded (20)

e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptx
 
Climbers and Creepers used in landscaping
Climbers and Creepers used in landscapingClimbers and Creepers used in landscaping
Climbers and Creepers used in landscaping
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
An Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppAn Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge App
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
Scopus Indexed Journals 2024 - ISCOPUS Publications
Scopus Indexed Journals 2024 - ISCOPUS PublicationsScopus Indexed Journals 2024 - ISCOPUS Publications
Scopus Indexed Journals 2024 - ISCOPUS Publications
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
demyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptxdemyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptx
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
The Liver & Gallbladder (Anatomy & Physiology).pptx
The Liver &  Gallbladder (Anatomy & Physiology).pptxThe Liver &  Gallbladder (Anatomy & Physiology).pptx
The Liver & Gallbladder (Anatomy & Physiology).pptx
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
 

Age of Information in Physical-Layer Network Coding Enabled Two-Way Relay Networks.pdf

  • 1. Age of Information in Physical Network Coding Enabled Two Networks Abstract This paper investigates the information freshness of two (TWRNs) operated with physical freshness is quantified by age of information (AoI), defined as the time elapsed since the generation time of the latest received information update. PNC reduces the communication latency of TWRNs by turning superimposed electromagnetic waves into network send update packets to each other more frequently via the relay. While sending update packets more frequently has the potential to reduce AoI, how to handle packet corruption in TWRNs has not been investigated. Specifically, if an old packet is corrupted in any hop of a TWRN, one needs to decide whether to drop or to retransmit the old packet, e.g., a new packet has more recent information but may take more time to be delivered. Therefore, we study the average AoI with and without au Age of Information in Physical-Layer Network Coding Enabled Two-Way Relay This paper investigates the information freshness of two-way relay networks (TWRNs) operated with physical-layer network coding (PNC). Information quantified by age of information (AoI), defined as the time elapsed since the generation time of the latest received information update. PNC reduces the communication latency of TWRNs by turning superimposed electromagnetic waves into network-coded messages so that end users can send update packets to each other more frequently via the relay. While sending update packets more frequently has the potential to reduce AoI, how to handle packet corruption in TWRNs has not been investigated. Specifically, ld packet is corrupted in any hop of a TWRN, one needs to decide whether to drop or to retransmit the old packet, e.g., a new packet has more recent information but may take more time to be delivered. Therefore, we study the average AoI with and without automatic repeat request (ARQ) in Layer Way Relay way relay networks layer network coding (PNC). Information quantified by age of information (AoI), defined as the time elapsed since the generation time of the latest received information update. PNC reduces the communication latency of TWRNs by turning superimposed s so that end users can send update packets to each other more frequently via the relay. While sending update packets more frequently has the potential to reduce AoI, how to handle packet corruption in TWRNs has not been investigated. Specifically, ld packet is corrupted in any hop of a TWRN, one needs to decide whether to drop or to retransmit the old packet, e.g., a new packet has more recent information but may take more time to be delivered. Therefore, we tomatic repeat request (ARQ) in
  • 2. PNC-enabled TWRNs. Interestingly, our analysis shows that neither the non- ARQ scheme nor the pure ARQ scheme achieves a good average AoI. Hence, we put forth an uplink-lost-then-drop (ULTD) protocol that combines packet drop and ARQ. Experiments on software-defined radios indicate that ULTD significantly outperforms non-ARQ and pure ARQ schemes in terms of average AoI, especially when the two end users have imbalanced channel conditions. We believe the insight of ULTD on TWRNs generally applies to other two-hop networks: to achieve high information freshness, when packets are corrupted in the first hop, new packets should be generated and sent (i.e., old packets are discarded); when packets are corrupted in the second hop, old packets should be retransmitted until they are successfully received.