Contextual Bandit-Based Channel Selection for Wireless LANs with Interference-Driven Feature Extraction

03/23/2020
by   Kota Yamashita, et al.
0

This paper proposes a radio channel selection algorithm based on a contextual multi-armed bandit (CMAB) for a wireless local area network (WLAN) environment, in which the access probability of each access point (AP) and the throughput model are not given in advance. The problem to be considered inherently involves the exploration to obtain the knowledge of the throughput distribution, in which a realized value is observed only after attempting to select each channel. This can be formulated as a multi-armed bandit (MAB) problem; particularly, we focus on the usefulness of the surrounding channel allocation information as the side information and determine that CMAB is appropriate. However, directly applying common CMAB algorithms to the such problems can lead to the lack of learning efficiency when the number of contexts is large. To reduce the computational complexity of the CMAB algorithms, feature extraction is designed by focusing on interference with neighboring and same-channel APs after channel selection of a target AP, which also contributes to the learning efficiency. To learn the optimal channel efficiently, this study investigates the most efficient method among the typical CMAB algorithms, including epoch-greedy, LinUCB, and Thompson sampling. The simulation results reveal that the algorithm based on JointLinUCB learns most efficiently under the environment where the access probabilities of the APs are extremely different.

READ FULL TEXT

page 1

page 6

research
01/28/2020

Faster Activity and Data Detection in Massive Random Access: A Multi-armed Bandit Approach

This paper investigates the grant-free random access with massive IoT de...
research
07/15/2023

On the Robustness of Epoch-Greedy in Multi-Agent Contextual Bandit Mechanisms

Efficient learning in multi-armed bandit mechanisms such as pay-per-clic...
research
09/14/2019

IEEE 802.15.4.e TSCH-Based Scheduling for Throughput Optimization: A Combinatorial Multi-Armed Bandit Approach

In TSCH, which is a MAC mechanism set of the IEEE 802.15.4e amendment, c...
research
11/28/2022

Cooperate or not Cooperate: Transfer Learning with Multi-Armed Bandit for Spatial Reuse in Wi-Fi

The exponential increase of wireless devices with highly demanding servi...
research
01/02/2020

Multi-Armed Bandits for Decentralized AP selection in Enterprise WLANs

WiFi densification leads to the existence of multiple overlapping covera...
research
09/07/2020

LACO: A Latency-Driven Network Slicing Orchestration in Beyond-5G Networks

Network Slicing is expected to become a game changer in the upcoming 5G ...
research
06/06/2020

Visual Prediction of Priors for Articulated Object Interaction

Exploration in novel settings can be challenging without prior experienc...

Please sign up or login with your details

Forgot password? Click here to reset