GNU Radio Implementation of MALIN: "Multi-Armed bandits Learning for Internet-of-things Networks"

02/05/2019 ∙ by Lilian Besson, et al. ∙ 0

We implement an IoT network the following way: one gateway, one or several intelligent (i.e., learning) objects, embedding the proposed solution, and a traffic generator that emulates radio interferences from many other objects. Intelligent objects communicate with the gateway with a wireless ALOHA-based protocol, which does not require any specific overhead for the learning. We model the network access as a discrete sequential decision making problem, and using the framework and algorithms from Multi-Armed Bandit (MAB) learning, we show that intelligent objects can improve their access to the network by using low complexity and decentralized algorithms, such as UCB1 and Thompson Sampling. This solution could be added in a straightforward and costless manner in LoRaWAN networks, just by adding this feature in some or all the devices, without any modification on the network side.

READ FULL TEXT VIEW PDF

Authors

page 5

This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.

I Introduction

The monitoring of large scale systems, such as smart grids and smart cities, requires the development of networks dedicated to Internet-of-Things (IoT) applications. For instance, Low Power Wide Area Networks (LPWAN) [1], as LoRaWAN or SigFox, are nowadays deployed in unlicensed bands to handle a large number of objects transmitting a few packets per day or week. In order to reduce the energy consumption of end-devices, these networks rely on pure ALOHA-based Medium Access (MAC) protocols.

One of the challenges in the design of MAC solutions for the IoT is to design solutions which improve the performance of the network and reduce the Packet Loss Ratio (PLR), without reducing the end-devices battery life. In particular, many IoT standards operate in unlicensed bands, that is why we have to find solutions that do not increase the PLR due to the interference caused by other standards and networks which share the same band, without coordination. As this interfering traffic is generated by different standards and networks, it cannot be controlled, and it is not evenly distributed in the different channels.

Multi-Armed Bandit (MAB) algorithms [2] have been recently proposed as a solution to improve the performance of IoT networks and in particular in LPWAN [3, 4]. In this paper, we describe the way we implemented a demo where we evaluate MAB algorithms [2], used in combination with a pure ALOHA-based protocol (such as the ones employed in LPWAN). This demonstration is the first implementation which aims at assessing the potential gain of MAB learning algorithms in IoT scenarios. Following our recent work [5], we propose to model this problem as Non-Stationary111 Note that non-stationarity only comes from the presence of more than one dynamic object, as the background traffic is assumed independent and identically distributed i.i.d.. MAB. We suggest to use low-cost algorithms, focusing on two well-known algorithms: a frequentist one () and a Bayesian one (TS). We consider the Upper-Confidence Bound () [6], and the Thompson Sampling (TS) algorithms [7]. Both algorithms have already been applied with success in the context of wireless decision making, both empirically for Opportunistic Spectrum Access [8], and more recently for multi-users Cognitive Radio problems [9] with a more theoretical approach.

We use a TestBed designed in 2017 by our team SCEE [10], containing different USRP boards [11], controlled by a single laptop using GNU Radio [12], and where the intelligence of each object corresponds to a learning algorithm, implemented as a GNU Radio block [13] and written in Python or C++.

In our demo, we consider a simple wireless network, consisting of one gateway (radio access point), and a certain interfering background traffic, assumed to be stationary (i.i.d.), which is generated by end-devices communicating in other networks. Some dynamic intelligent objects (end-user or autonomous objects) try to communicate with the gateway, with a low-overhead protocol. This communication can be done in different channels which are also shared by devices using other networks. Once the gateway receives a packet transmitted by a dynamic device in one channel, it transmits back to it an acknowledgement in the same channel, after a fixed-time delay, as it is done in the LoRaWAN standard. This ACK allows the device to learn about the channel quality and thus, to use learning algorithms for the purpose of best channel selection.

In this demo, we can generate scenarios with different parameters (number of channels, interfering traffic, etc) in order to evaluate the performance of learning in various settings. Moreover, we compare the performance of learning with that of the random uniform access to channels, which is the current state-of-the-art of commercial LPWAN solutions. This allows to check that in case of uniform traffic, when there is nothing to learn, the intelligent objects at least do not reduce their successful communication rate in comparison to the naive objects. This also shows that in case of non-uniform stationary traffic, the MAB learning algorithms indeed help to increase the global efficiency of the network by improving the success rate of the intelligent objects.

The rest of this paper is organized as follows. The system model is introduced in Section 2. In Section 3, we describe more formally both the and the TS algorithms. Our implementation is presented in Section 4, and results are given in Section 5.

Ii System Model

We consider the system model presented in Figure 1, where a set of object sends uplink packets to the network gateway, in the ISM band. The communication between IoT devices and this gateway is done through a simple pure ALOHA-based protocol where devices transmit uplink packets of fixed duration whenever they want. The devices can transmit their packets in channels (e.g., ). In the case where the gateway receives an uplink in one channel, it transmits an acknowledgement to the end-device in the same channel, after a fixed delay (of s).

These communications operate in unlicensed ISM bands and, consequently, suffer from interference generated by uncoordinated neighboring networks. This interfering traffic is uncontrolled, and can be unevenly distributed over the different channels.

Fig. 1: In our system model, some dynamic devices transmit packets to a gateway and suffer from the interference generated by neighboring networks.

We consider the network from the point of view of one end-user. Every times the end-user has to communicate with the gateway, it has to choose one channel (at each transmission ), denoted as . Then, the end-users starts waiting in this channel for an acknowledgement sent by the gateway. Before sending another message (i.e., at time ), the end-user knows if it received or not this ACK message. For this reason, selecting channel (or arm) at time yields a (random) feedback, called a reward, , being if no ACK was received before the next message, or if ACK was successfully received. The goal of the end-user is to minimize its packet loss ratio, or equivalently, it is to maximize its cumulative reward, as it is usually done in MAB problems [7, 14, 15].

This problem is a special case of the so-called “stochastic” MAB, where the sequence of rewards drawn from a given arm is assumed to be i.i.d., under some distribution , that has a mean . Several types of reward distributions have been considered in the literature, for example distributions that belong to a one-dimensional exponential family (e.g.

, Gaussian, Exponential, Poisson or Bernoulli distributions).

Rewards are binary in our model, and so we consider only Bernoulli distributions, in which , that is, and . Contrary to many previous work done in the CR field (e.g., Opportunistic Spectrum Access), the reward does not come from a sensing phase before sending the -th message, as it would do for any “listen-before-talk” model. Rewards come from receiving an acknowledgement from the gateway, between the -th and -th messages.

The problem parameters are of course unknown to the end-users, so to maximize its cumulated reward, it must learn the distributions of the channels, in order to be able to progressively focus on the best arm (i.e., the arm with largest mean). This requires to tackle the so-called exploration-exploitation dilemma

: a player has to try all arms a sufficient number of times to get a robust estimate of their qualities, while not selecting the worst arms too many times.

Iii MAB Algorithms

Before discussing the relevance of a MAB model for our IoT application, we present two bandit algorithms, and Thompson Sampling, which are both known to be efficient for stationary i.i.d. rewards and are shown to be useful in our setting (in Sec. V).

Iii-a The Algorithm

A naive approach could be to use an empirical mean estimator of the rewards for each channel, and select the channel with highest estimated mean at each time; but this greedy approach is known to fail dramatically [15]. Indeed, with this policy, the selection of arms is highly dependent on the first draws: if the first transmission in one channel fails and the first one on other channels succeed, the end-user will never use the first channel again, even it is the best one (i.e., the most available, in average).

Rather than relying on the empirical mean reward, Upper Confidence Bounds algorithms instead use a confidence interval on the unknown mean of each arm, which can be viewed as adding a “bonus” exploration to the empirical mean. They follow the “optimism-in-face-of-uncertainty” principle: at each step, they play according to the best model, as the statistically best possible arm (i.e., the highest upper confidence bound) is selected.

More formally, for one end-user, let be the number of times channel was selected up-to time . The empirical mean estimator of channel is defined as the mean reward obtained by selecting it up to time , . For , the confidence term is , giving the upper confidence bound , which is used by the end-user to decide the channel for communicating at time step : . is called an index policy.

The algorithm uses a parameter , originally was set to [6], but empirically is known to work better (uniformly across problems), and is advised by the theory [2]. In our model, every dynamic end-user implements its own algorithm, independently. For one end-user, the time is the total number of sent messages from the beginning, as rewards are only obtained after a transmission.

Iii-B Thompson Sampling

Thompson Sampling [7] was introduced early on, in as the very first bandit algorithm, in the context of clinical trials (in which each arm models the efficacy of one treatment across patients). Given a prior distribution on the mean of each arm, the algorithm selects the next arm to draw based on samples from the conjugated

posterior distribution, which for Bernoulli rewards is a Beta distribution.

A Beta prior (initially uniform) is assumed on , and at time the posterior is . After every channel selection, the posterior is updated to have and counting the number of successful and failed transmissions made on channel . So if the ACK message is received, , and , otherwise , and . Then, the decision is done by sampling an index for each arm, at each time step , from the arm posteriors: , and the chosen channel is simply the channel with highest index . For this reason, Thompson Sampling is called a randomized index policy.

The TS algorithm, although being simple and easy to implement, is known to perform well for stochastic problems, for which it was proven to be asymptotically optimal [16, 17]. It is known to be empirically efficient, and for these reasons it has been used successfully in various applications, including on problems from Cognitive Radio [18, 19], and also in previous work on decentralized IoT-like networks [20].

Iv GNU Radio Implementation

In this section, we present our implementation of MAB algorithms in our model of IoT networks. We first describe the simplified physical layer of this demo, then we present our GNU Radio implementation.

Iv-a Physical Layer and Protocol

In this paper, we implement a PHY/MAC layers solution in order to improve the performance of IoT communications in unlicensed bands. We could have used any physical layer and any ALOHA-based protocol. We choose to implement our own physical layer and protocol, for both clarity and conciseness.

Regarding the physical layer, we consider a QPSK constellation. Moreover, we use simplified packets composed of two parts. The first part is the preamble which is used for the purpose of synchronization (phase correction). Then, we have the index of the user, which is a sequence of QPSK symbols. For example, this index can be a simple QPSK symbol (). Once the gateway receives an uplink packet, it detects this index and transmits an acknowledgement which has the same frame structure, but where the index is the conjugate of the index of the uplink packet (e.g., ). Thanks to this index, we can have several devices communicating with the same gateway.

In turn, the end-device that receives the acknowledgement demodulates it, and checks if the index is the conjugate of its own index. In this case, the ACK was for him, and it knows that its packet has been received and decoded correctly by the gateway.

Iv-B Equipment

We use USRP N210 boards [11], from Ettus Research (National Instrument). As illustrated in Figure 2, our implementation is composed of at least USRP. The gateway, a USRP which emulates the interfering traffic, and at least one dynamic device.

Fig. 2: Schematic of our implementation that presents the role of each USRP card.

The boards have their own power supply, and are all connected to a local Ethernet switch, itself connected to a single laptop, running GNU/Linux and Ubuntu. To ease the synchronization in both time and frequency between the boards representing the dynamic objects and the gateway, we use an Octoclock [21], also by Ettus Research, and coaxial cables connecting every card to the Octoclock for time (PPS) and frequency synchronization, but this is not mandatory.

Iv-C Implementation

We used GNU Radio Companion (GRC, version , ), and for the demonstration the laptop runs one GRC design to configure and control each USRP card. As such, a single laptop can run in parallel the control program of any number of boards222 Even if in practice, maximum efficiency is kept as long as there is not more than one GRC design by CPU core..

GNU Radio applications are a flow-graph: a series of signal processing blocks connected together to describe a data flow. For maximum efficiency, we wrote all of our blocks in C++. GNU Radio Companion is a graphical UI used to develop GNU Radio applications: when a flow-graph is compiled in GRC, a Python code is produced, which can be executed to connect to the USRP, create the desired GUI windows and widgets, and create and connect the blocks in the flow-graph.

Iv-D User Interface

We have designed a user interface in order to visualize the results obtained with our experimental demonstration. This user interface is shown in Figure 3. We can see that it is made of three parts, one for each USRP, as highlighted in red:

Fig. 3: User interface of our demonstration.

The first part is the interface of the IoT traffic generator, where we see the traffic generated by this USRP, presented in a waterfall view in the time vs frequency domain.

The second part is the interface of the intelligent device which is made of four parts. At the top left, we observe the constellation of the transmitted packet (a). At the bottom left, we have a time/frequency view of the lasts packets transmitted by the object (b). We can see, in this view that the object transmitted its last packets in the two best channels (channel and ). Then, at the top right of this interface (c), we can see the traffic observed by this device, where we have the interfering traffic (green), the uplink packets transmitted by this object (red) and the acknowledgements sent by the gateway (blue). Finally, at the bottom right (d), we have four histograms showing the performance indicators of the chosen MAB algorithm (number of transmissions, number of successful transmissions, UCB indexes and success rates, in each channel).

The last part is the interface of the gateway, where we can see the traffic observed by the gateway (a) and the channels in which the last acknowledgements have been sent (b).

V Results and Discussions

We compare the two algorithms described in Section III-A against a uniform access algorithm, that uniformly selects its channel at random. Three objects are compared by their mean successful communication rates, on a horizon of communication slots, and were using three algorithms: uniform random access (in cyan), Thompson Sampling (in green) and (in red). Figure 4 shows the results averaged on repetitions using the same conditions. Each experiment takes about half a day, as we make objects generate one message every seconds, in order to artificially speed up the process and with no loss of generality. Learning can be useful only when there is a large enough difference between “good” and “bad” channels, Each object was learning to access different non-overlapping channels, that we chose to have occupancy rates of . When facing the same stationary background traffic, we see that the learning objects are both very quickly more efficient than the naive uniform object. We obtain an improvement in terms of successful communication rate from to about in only communications (about ), and up-to in only communications. In stationary environments, both the TS and algorithms are very efficient and converge quickly, resulting in a very strong decrease in collisions and failed communication slots. is faster to learn but eventually TS gives a (slightly) better average performance.

Similar results are obtained for overlapping channels, when dynamic devices are learning in the presence of multiple devices, all using the same learning algorithm. Empirical results confirm the simulations presented in our paper [5, Fig.3]. Such results are very encouraging, and illustrate well the various strong possibilities of MAB learning applied to IoT networks.

Fig. 4: Less than communication slots (i.e., less than trials in each channel) suffice for the two learning objects to reach a successful communication rate close to , which is twice as much as the non-learning (uniform) object, which stays around of success. Similar gains of performance were obtained in many different scenarios.

Vi Conclusion

We presented in this article a demonstration, by specifying the system model and explaining the two MAB algorithms used in practice. We gave all the necessary details on both the PHY and the MAC layer, as well as details on the User Interface developed for the demo. Results obtained in practice were discussed, to highlight the interest of using learning algorithms for radio online optimization problem, and especially multi-armed bandit learning algorithms. By using such low-cost algorithms, we demonstrated empirically that a dynamically reconfigurable object can learn on its own to favor a certain channel, if the environment traffic is not uniform between the different channels.

Possible future extensions of this work include: considering more dynamic objects (e.g., ), implementing a real-world IoT communication protocol (like the LoRaWAN standard), and studying the interference in case of other gateways located nearby. We are also interested in studying the possible gain of using a learning step when the transmission model follows ALOHA-like retransmissions.

Availability of data and materials

The source code of our demonstration is fully available online, open-sourced under GPLv3 license, at bitbucket.org/scee_ietr/malin-multi-arm- bandit-learning-for-iot-networks-with-grc/. It contains both the GNU Radio Companion flowcharts and blocks, with ready-to-use Makefiles to easily compile, install and launch the demonstration.

A -minute video showing our demonstration is at youtu.be/HospLNQhcMk. It shows examples of dynamic devices learning simultaneously, confirming the results of Fig. 4 for overlapping channels.

Acknowledgment

The authors acknowledge the work of two CentraleSupélec students, Clément Barras and Théo Vanneuville, for their GNU Radio project in Spring 2017.

This work is supported by CentraleSupélec, the French National Research Agency (ANR), under project SOGREEN (grant coded: N ANR-14-CE28-0025-02), Région Bretagne, France, CPER SOPHIE/STICS & Ones, the French Ministry of Higher Education and Research, and ENS Paris-Saclay.

References

  • [1] U. Raza, P. Kulkarni, and M. Sooriyabandara, “Low power wide area networks: An overview,” IEEE Communications Surveys Tutorials, vol. 19, pp. 855–873, Secondquarter 2017.
  • [2] S. Bubeck, N. Cesa-Bianchi, et al., “Regret analysis of Stochastic and Non-Stochastic Multi-Armed Bandit Problems,”

    Foundations and Trends® in Machine Learning

    , vol. 5, no. 1, pp. 1–122, 2012.
  • [3]

    R. Bonnefoi, C. Moy, and J. Palicot, “Improvement of the LPWAN AMI backhaul’s latency thanks to reinforcement learning algorithms,”

    EURASIP Journal on Wireless Communications and Networking, vol. 2018, no. 1, p. 34, 2018.
  • [4] A. Azari and C. Cavdar, “Self-organized low-power iot networks: A distributed learning approach,” in IEEE Globecom 2018, 12 2018.
  • [5] R. Bonnefoi, L. Besson, C. Moy, E. Kaufmann, and J. Palicot, “Multi-Armed Bandit Learning in IoT Networks: Learning helps even in non-stationary settings,” in 12th EAI Conference on Cognitive Radio Oriented Wireless Network and Communication, CROWNCOM Proceedings, 2017.
  • [6] P. Auer, N. Cesa-Bianchi, and P. Fischer, “Finite-time Analysis of the Multi-armed Bandit Problem,” Machine Learning, vol. 47, no. 2, pp. 235–256, 2002.
  • [7]

    W. R. Thompson, “On the likelihood that one unknown probability exceeds another in view of the evidence of two samples,”

    Biometrika, vol. 25, 1933.
  • [8] W. Jouini, D. Ernst, C. Moy, and J. Palicot, “Upper Confidence Bound Based Decision Making Strategies and Dynamic Spectrum Access,” in 2010 IEEE International Conference on Communications, pp. 1–5, 2010.
  • [9] L. Besson and E. Kaufmann, “Multi-Player Bandits Revisited,” in Algorithmic Learning Theory, (Lanzarote, Spain), Mehryar Mohri and Karthik Sridharan, 2018.
  • [10] Q. Bodinier, Coexistence of Communication Systems Based on Enhanced Multi-Carrier Waveforms with Legacy OFDM Networks. PhD thesis, CentraleSupélec, 2017.
  • [11] “USRP Manual, Ettus Research.” http://files.ettus.com/manual/page_usrp2.html. Accessed: 2018-07-23.
  • [12] “GNU Radio Documentation.” https://www.gnuradio.org/about/. Accessed: 2018-07-23.
  • [13] “GRC Documentation.” https://wiki.gnuradio.org/index.php/GNURadioCompanion. Accessed: 2018-07-23.
  • [14] H. Robbins, “Some aspects of the sequential design of experiments,” Bulletin of the American Mathematical Society, vol. 58, no. 5, pp. 527–535, 1952.
  • [15] T. L. Lai and H. Robbins, “Asymptotically efficient adaptive allocation rules,” Advances in Applied Mathematics, vol. 6, no. 1, pp. 4–22, 1985.
  • [16] S. Agrawal and N. Goyal, “Analysis of Thompson sampling for the Multi-Armed Bandit problem,” in JMLR, Conference On Learning Theory, pp. 39–1, 2012.
  • [17] E. Kaufmann, N. Korda, and R. Munos, Thompson Sampling: an Asymptotically Optimal Finite-Time Analysis, pp. 199–213. Springer, Berlin Heidelberg, 2012.
  • [18] V. Toldov et al., “A Thompson Sampling approach to channel exploration-exploitation problem in multihop cognitive radio networks,” in PIMRC, pp. 1–6, 2016.
  • [19] A. Maskooki, V. Toldov, L. Clavier, V. Loscrí, and N. Mitton, “Competition: Channel Exploration/Exploitation Based on a Thompson Sampling Approach in a Radio Cognitive Environment,” in EWSN, 2016.
  • [20] C. Moy, J. Palicot, and S. J. Darak, “Proof-of-Concept System for Opportunistic Spectrum Access in Multi-user Decentralized Networks,” EAI Endorsed Transactions on Cognitive Communications, vol. 2, 2016.
  • [21] “OctoClock Clock Distribution Module with GPSDO - Ettus Research.” http://www.ettus.com/product/details/OctoClock-G. Accessed: 2018-07-23.