Improving throughput using multi-armed bandit algorithm for wireless LANs

被引:21
作者
Kuroda, Kaori [1 ]
Kato, Hiroki [1 ]
Kim, Song-Ju [2 ]
Naruse, Makoto [3 ]
Hasegawa, Mikio [1 ]
机构
[1] Tokyo Univ Sci, Dept Elect Engn, Katsushika Ku, 6-3-1 Niijuku, Tokyo 1258585, Japan
[2] Keio Univ, Grad Sch Media & Governance, 5322 Endo, Fujisawa, Kanagawa 2520882, Japan
[3] Natl Inst Informat & Commun Technol, Strateg Planning Dept, 4-2-1 Nukui Kita, Koganei, Tokyo 1848795, Japan
来源
IEICE NONLINEAR THEORY AND ITS APPLICATIONS | 2018年 / 9卷 / 01期
基金
日本学术振兴会;
关键词
multi-armed bandit algorithm; liquid tug-of-war model; cognitive radio model; wireless LAN;
D O I
10.1587/nolta.9.74
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Recently, various mobile communication systems have been widely deployed, and mobile traffic is increasing. However, the bandwidth available for mobile communications is limited, hence the scarcity of radio resources in mobile communications is a serious problem. As an approach to solve this problem, cognitive wireless communication models have been proposed. These model search for vacant time slots in multi-channel wireless communication systems. Although previous studies have shown that frequency utilization efficiency can be improved by multi-armed bandit algorithms, channels are assumed to be independent. However, channels used in 2.4 GHz wireless LANs (such as IEEE802.11b or IEEE802.11g) are not independent because these channels overlap with adjacent channels. In this paper, we propose an extended multi-armed bandit algorithm that uses continuous-valued rewards, which is applicable to wireless communication systems with overlapping channels. We show the effectiveness of the proposed method by experimental demonstrations.
引用
收藏
页码:74 / 81
页数:8
相关论文
共 10 条
  • [1] [Anonymous], 1999, MOMUC99
  • [2] Finite-time analysis of the multiarmed bandit problem
    Auer, P
    Cesa-Bianchi, N
    Fischer, P
    [J]. MACHINE LEARNING, 2002, 47 (2-3) : 235 - 256
  • [3] Cortical substrates for exploratory decisions in humans
    Daw, Nathaniel D.
    O'Doherty, John P.
    Dayan, Peter
    Seymour, Ben
    Dolan, Raymond J.
    [J]. NATURE, 2006, 441 (7095) : 876 - 879
  • [4] Cognitive radio: Brain-empowered wireless communications
    Haykin, S
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2005, 23 (02) : 201 - 220
  • [5] Efficient decision-making by volume-conserving physical object
    Kim, Song-Ju
    Aono, Masashi
    Nameda, Etsushi
    [J]. NEW JOURNAL OF PHYSICS, 2015, 17
  • [6] Amoeba-inspired algorithm for cognitive medium access
    Kima, Song-Ju
    Aono, Masashi
    [J]. IEICE NONLINEAR THEORY AND ITS APPLICATIONS, 2014, 5 (02): : 198 - 209
  • [7] Cognitive Medium Access: Exploration, Exploitation, and Competition
    Lai, Lifeng
    El Gamal, Hesham
    Jiang, Hai
    Poor, H. Vincent
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2011, 10 (02) : 239 - 253
  • [8] Medium Access in Cognitive Radio Networks: A Competitive Multi-armed Bandit Framework
    Lai, Lifeng
    Jiang, Hai
    Poor, H. Vincent
    [J]. 2008 42ND ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS, VOLS 1-4, 2008, : 98 - +
  • [9] SOME ASPECTS OF THE SEQUENTIAL DESIGN OF EXPERIMENTS
    ROBBINS, H
    [J]. BULLETIN OF THE AMERICAN MATHEMATICAL SOCIETY, 1952, 58 (05) : 527 - 535
  • [10] Sutton R.S., 2017, REINFORCEMENT LEARNI, V2, DOI DOI 10.1093/cercor/bhw013