Implementation and Evaluation of Age-Aware Downlink Scheduling Policies in Push-Based and Pull-Based Communication

Oğuz, Tahir Kerem
Ceran Arslan, Elif Tuğçe
Uysal, Elif
Girici, Tolga
As communication systems evolve to better cater to the needs of machine-type applications such as remote monitoring and networked control, advanced perspectives are required for the design of link layer protocols. The age of information (AoI) metric has firmly taken its place in the literature as a metric and tool to measure and control the data freshness demands of various applications. AoI measures the timeliness of transferred information from the point of view of the destination. In this study, we experimentally investigate AoI of multiple packet flows on a wireless multi-user link consisting of a transmitter (base station) and several receivers, implemented using software-defined radios (SDRs). We examine the performance of various scheduling policies under push-based and pull-based communication scenarios. For the push-based communication scenario, we implement age-aware scheduling policies from the literature and compare their performance with those of conventional scheduling methods. Then, we investigate the query age of information (QAoI) metric, an adaptation of the AoI concept for pull-based scenarios. We modify the former age-aware policies to propose variants that have a QAoI minimization objective. We share experimental results obtained in a simulation environment as well as on the SDR testbed.


Implementation and evaluation of age-aware downlink scheduling policies in communication networks
Oğuz, Tahir Kerem; Uysal, Elif; Department of Electrical and Electronics Engineering (2021-9-09)
As communication systems evolve, advanced perspectives are needed to meet the requirements of emerging applications. The Age of Information metric has taken its place in the literature to examine the information freshness demands of various applications. With the Age of Information perspective, the freshness of information subject to communication is monitored from the destination’s point of view. Within the scope of the thesis, a wireless network with a single transmitter (base station) and multiple receiv...
Implementation of an Enhanced Target Localization and Identification Algorithm on a Magnetic WSN
Baghaee, Sajjad; GÜRBÜZ, SEVGİ ZÜBEYDE; Uysal, Elif (2015-10-01)
Wireless sensor networks (WSNs) are ubiquitous in a wide range of applications requiring the monitoring of physical and environmental variables, such as target localization and identification. One of these applications is the sensing of ferromagnetic objects. In typical applications, the area to be monitored is typically large compared to the sensing radius of each magnetic sensor. On the other hand, the RF communication radii of WSN nodes are invariably larger than the sensing radii. This makes it economic...
Implementation and evaluation of a synchronous time-slotted medium access protocol for networked industrial embedded systems
Gözcü, Ahmet Korhan; Schmidt, Şenan Ece; Department of Electrical and Electronics Engineering (2011)
Dynamic Distributed Dependable Real-time Industrial communication Protocol family (D3RIP), has been proposed in the literature considering the periodic or event-based traffic characteristics of the industrial communication networks. D3RIP framework consists of two protocol families: Interface Layer (IL) protocol family, which is responsible for providing the accurate time-division multiple access (TDMA) on top of a shared-medium broadcast channel, and Coordination Layer (CL), which is defined to fulfill the...
Evaluation of priority dependent and time scheduled MAC layer protocols for ad-hoc networks
Erdeğer, İsmail; Baykal, Buyurman; Department of Electrical and Electronics Engineering (2015)
Ad-hoc networks have very unique features, such as dynamic topologies, relatively limited bandwidth and wireless signal propagation schemes, which present various challenges for wireless communication. In this thesis, control mechanisms for channel access scheduling and topology in ad-hoc networks are evaluated, which utilize the information from two-hop neighborhood to cope with the communication difficulties in ad-hoc networks. Channel assignment is one of the most important topics for ad-hoc networks. Ch...
Evaluation and selection of case tools: a methodology and a case study
Okşar, Koray; Okşar, Koray; Department of Information Systems (2010)
Today’s Computer Aided Software Engineering (CASE) technology covers nearly all activities in software development ranging from requirement analysis to deployment.Organizations are evaluating CASE tool solutions to automate or ease their processes. While reducing human errors, these tools also increase control, visibility and auditability of the processes. However, to achieve these benefits, the right tool or tools should be selected for usage in the intended processes. This is not an easy task when the vas...
Citation Formats
T. K. Oğuz, E. T. Ceran Arslan, E. Uysal, and T. Girici, “Implementation and Evaluation of Age-Aware Downlink Scheduling Policies in Push-Based and Pull-Based Communication,” Entropy, vol. 24, no. 5, pp. 0–0, 2022, Accessed: 00, 2022. [Online]. Available: