IEEE 802.15.4.e TSCH-Based Scheduling for Throughput Optimization: A Combinatorial Multi-Armed Bandit Approach

09/14/2019
by   Nastooh Taheri Javan, et al.
0

In TSCH, which is a MAC mechanism set of the IEEE 802.15.4e amendment, calculation, construction, and maintenance of the packet transmission schedules are not defined. Moreover, to ensure optimal throughput, most of the existing scheduling methods are based on the assumption that instantaneous and accurate Channel State Information (CSI) is available. However, due to the inevitable errors in the channel estimation process, this assumption cannot be materialized in many practical scenarios. In this paper, we propose two alternative and realistic approaches. In our first approach, we assume that only the statistical knowledge of CSI is available a priori. Armed with this knowledge, the average packet rate on each link is computed and then, using the results, the throughput-optimal schedule for the assignment of (slot-frame) cells to links can be formulated as a max-weight bipartite matching problem, which can be solved efficiently using the well-known Hungarian algorithm. In the second approach, we assume that no CSI knowledge (even statistical) is available at the design stage. For this zero-knowledge setting, we introduce a machine learning-based algorithm by formally modeling the scheduling problem in terms of a combinatorial multi-armed bandit (CMAB) process. Our CMAB-based scheme is widely applicable to many real operational environments, thanks to its reduced reliance on design-time knowledge. Simulation results show that the average throughput obtained by the statistical CSI-based method is within the margin of 15 instantaneous CSI. The aforesaid margin is around 18 learning-theoretic solution.

READ FULL TEXT

page 1

page 12

research
03/30/2020

Decentralized Learning for Channel Allocation in IoT Networks over Unlicensed Bandwidth as a Contextual Multi-player Multi-armed Bandit Game

We study a decentralized channel allocation problem in an ad-hoc Interne...
research
03/23/2020

Contextual Bandit-Based Channel Selection for Wireless LANs with Interference-Driven Feature Extraction

This paper proposes a radio channel selection algorithm based on a conte...
research
12/12/2018

Multi-Player Multi-Armed Bandit Based Resource Allocation for D2D Communications

Device-to-device (D2D) communications is expected to play a significant ...
research
08/04/2023

Deep Reinforcement Learning Empowered Rate Selection of XP-HARQ

The complex transmission mechanism of cross-packet hybrid automatic repe...
research
06/07/2019

Graph Embedding based Wireless Link Scheduling with Few Training Samples

Link scheduling in device-to-device (D2D) networks is usually formulated...
research
02/05/2022

Age of Information-based Scheduling for Wireless D2D Systems with a Deep Learning Approach

Device-to-device (D2D) links scheduling for avoiding excessive interfere...
research
03/25/2023

Distributed Multi-Agent Deep Q-Learning for Fast Roaming in IEEE 802.11ax Wi-Fi Systems

The innovation of Wi-Fi 6, IEEE 802.11ax, was be approved as the next si...

Please sign up or login with your details

Forgot password? Click here to reset