Chapter Summary

Chapter Summary

Key Points

  • 1.

    System reliability combines component-level probabilities using product rules for series systems (Rs=∏RiR_s = \prod R_i) and parallel systems (Rs=1βˆ’βˆ(1βˆ’Ri)R_s = 1 - \prod(1-R_i)). Inclusion-exclusion generalizes both to arbitrary network topologies, and the Bonferroni bounds provide efficient two-sided approximations.

  • 2.

    The probabilistic method proves existence by randomization: if E[f(X)]<t\mathbb{E}[f(X)] < t, then some outcome achieves f<tf < t. This non-constructive technique underpins Shannon's 1948 random coding argument β€” the proof that communication at rates below capacity is possible without specifying which codebook to use.

  • 3.

    The birthday bound states that among mβ‰ˆnm \approx \sqrt{n} i.i.d.
    uniform draws from a universe of size nn, the probability of collision exceeds 1/21/2. The precise formula is P(collision)β‰ˆ1βˆ’eβˆ’m2/(2n)P(\text{collision}) \approx 1 - e^{-m^2/(2n)}. This determines hash function security, slotted ALOHA collision rates, and the capacity of random access protocols.

  • 4.

    The coupon collector requires E[Tn]=nHnβ‰ˆnln⁑n\mathbb{E}[T_n] = nH_n \approx n\ln n draws to see all nn types at least once. The proof decomposes TnT_n into nn independent geometric waiting times and applies linearity of expectation. This governs channel sounding protocols, random scheduling, and any "coverage" problem requiring complete sampling of a finite set.

  • 5.

    All three combinatorial applications β€” reliability, random coding, and occupancy β€” reduce to asking how probability concentrates over structured random objects. The axioms of Chapter 1 and the independence framework of Chapter 2 are the only tools required.

Looking Ahead

Chapter 4 continues the combinatorial development with Stirling numbers, Bell numbers, the hypergeometric distribution (sampling without replacement), and the Poisson approximation. Chapters 5 and 6 move from discrete to continuous random variables, introducing the Gaussian and exponential distributions that model thermal noise, fading amplitudes, and waiting times in wireless systems. The birthday bound and inclusion-exclusion will return in Book ITA (Chapter 2, method of types) and Book FSI (Chapter 8, multiple testing corrections).