Machine Learning Based Scheme for Contention Window Size Adaptation in LTE-LAA

被引:23
作者
Ali, Zoraze [1 ]
Giupponi, Lorenza [1 ]
Mangues-Bafalluy, Josep [1 ]
Bojovic, Biljana [1 ]
机构
[1] CERCA, CTTC, Castelldefels, Barcelona, Spain
来源
2017 IEEE 28TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC) | 2017年
关键词
LAA; HARQ; Machine Learning; Wi-Fi; Unlicensed Spectrum; ns-3; LBT; R language; Coexistence;
D O I
10.1109/PIMRC.2017.8292751
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
License Assisted Access (LAA) is the technology introduced by the Third Generation Partnership Project (3GPP) that enables the deployment of LTE networks in the unlicensed 5 GHz spectrum. To ensure a fair coexistence of LAA in the unlicensed spectrum with other technologies, e.g., with Wi-Fi, 3GPP has standardized the use of Listen Before Talk (LBT) as the default channel-access scheme for LAA. However, the performance of Wi-Fi when coexisting with LAA mainly relies on how the LBT parameters are configured by the LAA. In this paper, we focus on the Contention Window (CW) size parameter of LBT in LAA. We propose a Neural Network (NN) based scheme that adapts the CW size based on the predicted number of Negative Acknowledgments (NACKs) for all the subframes in a Transmit Opportunity (TXOP) of LAA. In particular, our proposed scheme learns from the past experience how many NACKs per subframe of a TXOP were received under certain channel conditions. The performance evaluation shows that our proposed scheme, when compared to the state-of-the-art approaches, provides the best trade-off between the fairness to Wi-Fi and the LAA performance in terms of both throughput and latency.
引用
收藏
页数:7
相关论文
共 50 条
  • [41] Machine Learning-Based Methods for Path Loss Prediction in Urban Environment for LTE Networks
    Moraitis, Nektarios
    Tsipi, Lefteris
    Vouyioukas, Demosthenes
    [J]. 2020 16TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2020,
  • [42] Algorithm of adaptation of electronic document management system based on machine learning technology
    Artem Obukhov
    Mikhail Krasnyanskiy
    Maxim Nikolyukin
    [J]. Progress in Artificial Intelligence, 2020, 9 : 287 - 303
  • [43] The control based on Lyapunov adaptation law to be improved by behavioral cloning and machine learning
    Kulic, R
    Vukic, Z
    [J]. Eurocon 2005: The International Conference on Computer as a Tool, Vol 1 and 2 , Proceedings, 2005, : 302 - 305
  • [44] Algorithm of adaptation of electronic document management system based on machine learning technology
    Obukhov, Artem
    Krasnyanskiy, Mikhail
    Nikolyukin, Maxim
    [J]. PROGRESS IN ARTIFICIAL INTELLIGENCE, 2020, 9 (04) : 287 - 303
  • [45] Reinforcement Learning based Joint Channel/Subframe Selection Scheme for Fair LTE-WiFi Coexistence
    Kishimoto, Yuki
    Wang, Xiaoyan
    Umehira, Masahiro
    [J]. 2020 16TH INTERNATIONAL CONFERENCE ON MOBILITY, SENSING AND NETWORKING (MSN 2020), 2020, : 367 - 372
  • [46] A machine learning based optimized energy dispatching scheme for restoring a hybrid microgrid
    Al Karim, Miftah
    Currie, Jonathan
    Lie, Tek-Tjing
    [J]. ELECTRIC POWER SYSTEMS RESEARCH, 2018, 155 : 206 - 215
  • [47] A Novel Feature Encoding Scheme for Machine Learning Based Malware Detection Systems
    Das, Vipin
    Nair, Binoy B.
    Thiruvengadathan, Rajagopalan
    [J]. IEEE ACCESS, 2024, 12 : 91187 - 91216
  • [48] MACHINE LEARNING BASED RATE ADAPTATION WITH ELASTIC FEATURE SELECTION FOR HTTP-BASED STREAMING
    Chien, Yu-Lin
    Lin, Kate Ching-Ju
    Chen, Ming-Syan
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA & EXPO (ICME), 2015,
  • [49] A proactive secret image sharing scheme with resistance to machine learning based steganalysis
    Espejel-Trujillo, Angelina
    Iwamoto, Mitsugu
    Nakano-Miyatake, Mariko
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (12) : 15161 - 15179
  • [50] A proactive secret image sharing scheme with resistance to machine learning based steganalysis
    Angelina Espejel-Trujillo
    Mitsugu Iwamoto
    Mariko Nakano-Miyatake
    [J]. Multimedia Tools and Applications, 2018, 77 : 15161 - 15179