Chapter Summary
Chapter Summary
Key Points
- 1.
System reliability combines component-level probabilities using product rules for series systems () and parallel systems (). Inclusion-exclusion generalizes both to arbitrary network topologies, and the Bonferroni bounds provide efficient two-sided approximations.
- 2.
The probabilistic method proves existence by randomization: if , then some outcome achieves . This non-constructive technique underpins Shannon's 1948 random coding argument β the proof that communication at rates below capacity is possible without specifying which codebook to use.
- 3.
The birthday bound states that among i.i.d.
uniform draws from a universe of size , the probability of collision exceeds . The precise formula is . This determines hash function security, slotted ALOHA collision rates, and the capacity of random access protocols. - 4.
The coupon collector requires draws to see all types at least once. The proof decomposes into independent geometric waiting times and applies linearity of expectation. This governs channel sounding protocols, random scheduling, and any "coverage" problem requiring complete sampling of a finite set.
- 5.
All three combinatorial applications β reliability, random coding, and occupancy β reduce to asking how probability concentrates over structured random objects. The axioms of Chapter 1 and the independence framework of Chapter 2 are the only tools required.
Looking Ahead
Chapter 4 continues the combinatorial development with Stirling numbers, Bell numbers, the hypergeometric distribution (sampling without replacement), and the Poisson approximation. Chapters 5 and 6 move from discrete to continuous random variables, introducing the Gaussian and exponential distributions that model thermal noise, fading amplitudes, and waiting times in wireless systems. The birthday bound and inclusion-exclusion will return in Book ITA (Chapter 2, method of types) and Book FSI (Chapter 8, multiple testing corrections).