Age of Information Aware Communication Systems


Book Description

Advances in wireless communications and networking technology have taken us towards a pervasively connected world in which a vast array of wireless devices, from mobile phones to environmental sensors, seamlessly communicate with each other. In many of these systems the freshness of the transmitted information is of high importance. Characterization of time-critical information can be achieved through the so-called real-time status updates that are messages, encapsulated in packets, carrying the timestamp of their generation. Status updates track time-varying content that needs to be transmitted from the generation point to a remote destination in a network. To quantify the freshness of information in networked systems, a novel metric, different from delay or latency, termed as “age of information” (AoI) has been introduced. In this thesis, we focus on characterizing and controlling age under various communication system setups. The first part of the thesis considers multiple access communication systems and comprises two papers. The first paper, investigates AoI in relation with throughput in a shared access setup with heterogeneous traffic. More specifically, we consider a shared access system consisting of a primary link and a network of secondary nodes, with multipacket reception (MPR) capabilities. To study the joint throughput-timeliness performance, we formulate two optimization problems considering both objectives and provide guidelines for the design of such a multiple access system satisfying both timeliness and throughput requirements. In the second paper, we study the AoI performance in various multiple access schemes, including scheduling and random access. We present an analysis of the AoI with and without packet management at the transmission queue of the source nodes, considering that packet management is the capability to replace unserved packets in the queue whenever newer ones arrive. We incorporate the effect of channel fading and network path diversity in such a system and provide simulation results that illustrate the impact of network operating parameters on the performance of the considered access protocols. The second part of the thesis considers the characterization of AoI and other freshness performance metrics in a point-to-point communication link, again comprising two papers. In the third paper of this thesis, we expand the concept of information ageing by introducing the cost of update delay (CoUD) metric to characterize the cost of having stale information at the destination. Furthermore, we introduce the value of information of update (VoIU) metric that captures the degree of importance of the update received at the destination. We employ queue-theoretic concepts and provide a theoretical analysis and insights into the prospects of cost and value. Finally, in the last paper, we study the properties of a sample path of the AoI process, and we obtain a general formula of its stationary distribution. We relate this result to a discrete time queueing system and provide a general expression of the generating function of AoI in relation with the system time, and the peak age of information (PAoI). To illustrate the applicability of the results, we analyze the AoI in single-server queues with different disciplines and assumptions. We build upon these results to provide a methodology for analyzing general non-linear age functions for this type of systems.




Age of Information


Book Description

Information usually has the highest value when it is fresh. For example, real-time knowledge about the location, orientation, and speed of motor vehicles is imperative in autonomous driving, and the access to timely information about stock prices and interest rate movements is essential for developing trading strategies on the stock market. The Age of Information (AoI) concept, together with its recent extensions, provides a means of quantifying the freshness of information and an opportunity to improve the performance of real-time systems and networks. Recent research advances on AoI suggest that many well-known design principles of traditional data networks (for, e.g., providing high throughput and low delay) need to be re-examined for enhancing information freshness in rapidly emerging real-time applications. This book provides a suite of analytical tools and insightful results on the generation of information-update packets at the source nodes and the design of network protocols forwarding the packets to their destinations. The book also points out interesting connections between AoI concept and information theory, signal processing, and control theory, which are worthy of future investigation.




Age of Information


Book Description

The Age of Information is destined to become an important research topic in networked systems. This monograph provides the reader with an easy-to-read tutorial-like introduction into this novel approach of dealing with the freshness of information within systems.




Systems Engineering for the Digital Age


Book Description

Systems Engineering for the Digital Age Comprehensive resource presenting methods, processes, and tools relating to the digital and model-based transformation from both technical and management views Systems Engineering for the Digital Age: Practitioner Perspectives covers methods and tools that are made possible by the latest developments in computational modeling, descriptive modeling languages, semantic web technologies, and describes how they can be integrated into existing systems engineering practice, how best to manage their use, and how to help train and educate systems engineers of today and the future. This book explains how digital models can be leveraged for enhancing engineering trades, systems risk and maturity, and the design of safe, secure, and resilient systems, providing an update on the methods, processes, and tools to synthesize, analyze, and make decisions in management, mission engineering, and system of systems. Composed of nine chapters, the book covers digital and model-based methods, digital engineering, agile systems engineering, improving system risk, and more, representing the latest insights from research in topics related to systems engineering for complicated and complex systems and system-of-systems. Based on validated research conducted via the Systems Engineering Research Center (SERC), this book provides the reader a set of pragmatic concepts, methods, models, methodologies, and tools to aid the development of digital engineering capability within their organization. Systems Engineering for the Digital Age: Practitioner Perspectives includes information on: Fundamentals of digital engineering, graphical concept of operations, and mission and systems engineering methods Transforming systems engineering through integrating M&S and digital thread, and interactive model centric systems engineering The OODA loop of value creation, digital engineering measures, and model and data verification and validation Digital engineering testbed, transformation, and implications on decision making processes, and architecting tradespace analysis in a digital engineering environment Expedited systems engineering for rapid capability and learning, and agile systems engineering framework Based on results and insights from a research center and providing highly comprehensive coverage of the subject, Systems Engineering for the Digital Age: Practitioner Perspectives is written specifically for practicing engineers, program managers, and enterprise leadership, along with graduate students in related programs of study.




Security and Privacy in Mobile Information and Communication Systems


Book Description

This book constitutes the thoroughly refereed post-conference proceedings of the fourth International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MOBISEC 2012) held in Frankfurt/Main, Germany, in June 2012. The 13 revised full papers were carefully selected from numerous submissions and cover the application layer of security, highlighting the practical importance of security of mobile devices in concrete usages. Contributions to MobiSec 2012 range from treatments on user privacy issues, over mobile application and app security, to mobile identity management, and NFC. With the orientation toward applications, MobiSec is a perfect interface between academia and industry in the field of mobile communications.




Handbook of Mobile Data Privacy


Book Description

This handbook covers the fundamental principles and theory, and the state-of-the-art research, systems and applications, in the area of mobility data privacy. It is primarily addressed to computer science and statistics researchers and educators, who are interested in topics related to mobility privacy. This handbook will also be valuable to industry developers, as it explains the state-of-the-art algorithms for offering privacy. By discussing a wide range of privacy techniques, providing in-depth coverage of the most important ones, and highlighting promising avenues for future research, this handbook also aims at attracting computer science and statistics students to this interesting field of research. The advances in mobile devices and positioning technologies, together with the progress in spatiotemporal database research, have made possible the tracking of mobile devices (and their human companions) at very high accuracy, while supporting the efficient storage of mobility data in data warehouses, which this handbook illustrates. This has provided the means to collect, store and process mobility data of an unprecedented quantity, quality and timeliness. As ubiquitous computing pervades our society, user mobility data represents a very useful but also extremely sensitive source of information. On one hand, the movement traces that are left behind by the mobile devices of the users can be very useful in a wide spectrum of applications such as urban planning, traffic engineering, and environmental pollution management. On the other hand, the disclosure of mobility data to third parties may severely jeopardize the privacy of the users whose movement is recorded, leading to abuse scenarios such as user tailing and profiling. A significant amount of research work has been conducted in the last 15 years in the area of mobility data privacy and important research directions, such as privacy-preserving mobility data management, privacy in location sensing technologies and location-based services, privacy in vehicular communication networks, privacy in location-based social networks, privacy in participatory sensing systems which this handbook addresses.. This handbook also identifies important privacy gaps in the use of mobility data and has resulted to the adoption of international laws for location privacy protection (e.g., in EU, US, Canada, Australia, New Zealand, Japan, Singapore), as well as to a large number of interesting technologies for privacy-protecting mobility data, some of which have been made available through open-source systems and featured in real-world applications.




Age of Information


Book Description

A comprehensive treatment of Age of Information, this cutting-edge text includes detailed exposition and real-world applications.




Information Society in Global Age


Book Description




Global Awareness


Book Description

This book raises students' awareness and understanding of global trends, forces, and events by showing them how to think about the world systematically. Based on more than a decade of teaching about global issues to university undergraduates, the book focuses on understanding globalization and its effects on our lives. The book's seven chapters cover important principles and concepts from the systems perspective, such as what a system is, what global systems are, how and why systems grow and decline, what makes global systems invisible, how global issues are addressed as political questions, and others. Seven case studies apply these principles to global issues, such as the AIDS pandemic, endangered species and endangered languages, global energy systems and gasoline prices, contaminated food, and the consequences of the terrorist attacks of 9-11. The book includes two appendices: a glossary of important global system terms, and a description of global systems and cyberspace, including the structure and governance of the Internet.




Public Administration in the Information Age: Revisited


Book Description

The information age has become a reality, and has brought with it many implications for public administration. New ICT's offer new opportunities for government and governing, but at the same time they pose challenges in some key areas of public administration, like trust, or the idea of checks and balances. This book is an examination of the developments and effects of ICT in public administration over the last 10 to 15 years. It represents a re-visiting of the 1998 IOS Press publication ‘Public Administration in an Information Age: A Handbook’. As a point of departure, the authors of this new book have chosen the speed of the succession of theoretical approaches, represented by the 'phase of theories' which has appeared since 1998. This approach, which reflects that of the 1998 handbook, avoids the impression of technological determinism and provides an opportunity to focus on the phases of theory and technological developments. The book is divided into five sections. The first section examines key issues, and the second focuses on aspects of democracy. In the third section, the focus shifts towards structural conditions; the conditions that public administration has to meet in order to maintain its effectiveness and its legitimacy in the information age. Section four addresses some objects of implementation, like IT-inspired redesign, HRM and the phenomenon of Street Level Bureaucrats. Finally, the last section offers some concluding thoughts.