skip to main content
10.1145/3229543.3229551acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article
Free Access

Wireless Optimisation via Convex Bandits: Unlicensed LTE/WiFi Coexistence

Published:07 August 2018Publication History

ABSTRACT

Bandit Convex Optimisation (BCO) is a powerful framework for sequential decision-making in non-stationary and partially observable environments. In a BCO problem, a decision-maker sequentially picks actions to minimize the cumulative cost associated with these decisions, all while receiving partial feedback about the state of the environment. This formulation is a very natural fit for wireless-network optimisation problems and has great application potential since: i) instead of assuming full observability of the network state, it only requires the metric to optimise as input, and ii) it provides strong performance guarantees while making only minimal assumptions about the network dynamics. Despite these advantages, BCO has not yet been explored in the context of wireless-network optimisation. In this paper, we make the first steps to demonstrate the potential of BCO techniques by formulating an unlicensed LTE/WiFi fair coexistence use case in the framework, and providing empirical results in a simulated environment. On the algorithmic front, we propose a simple and natural sequential multi-point BCO algorithm amenable to wireless networking optimisation, and provide its theoretical analysis. We expect the contributions of this paper to pave the way to further research on the application of online convex methods in the bandit setting.

References

  1. 3rd Generation Partnership Project.{n. d.}. 3GPP TR 36.889 v13.0.0 - Study on Licensed-Assisted Access to Unlicensed Spectrum (Release 13).Google ScholarGoogle Scholar
  2. Alekh Agarwal, Ofer Dekel, and Lin Xiao. 2010. Optimal Algorithms for Online Convex Optimization with Multi-Point Bandit Feedback.. In Conference on Learning Theory (COLT). 28--40.Google ScholarGoogle Scholar
  3. Anwer Al-Dulaimi, Saba Al-Rubaye, Qiang Ni, and Elvino Sousa. 2015. 5G communications race: Pursuit of more capacity triggers LTE in unlicensed band. IEEE vehicular technology magazine 10, 1 (2015), 43--51.Google ScholarGoogle Scholar
  4. Sébastien Bubeck and Nicolò Cesa-Bianchi. 2012. Regret Analysis of Stochastic and Nonstochastic Multi-armed Bandit Problems. Now Publishers, Inc.Google ScholarGoogle Scholar
  5. Sébastien Bubeck, Ronen Eldan, and Yin Tat Lee. 2016. Kernel-based methods for bandit convex optimization. arXiv preprint arXiv: 1607.03084 (2016).Google ScholarGoogle Scholar
  6. Cristina Cano and Douglas J. Leith. 2016. Unlicensed LTE/WiFi Coexistence: Is LBT Inherently Fairer Than CSAT?. In IEEE Int. Conf. on Comms. (ICC).Google ScholarGoogle Scholar
  7. Cristina Cano, Douglas J. Leith, Andres Garcia-Saavedra, and Pablo Serrano. 2017. Fair Coexistence of Scheduled and Random Access Wireless Networks: Unlicensed LTE/WiFi. IEEE/ACM Transactions on Networking (TON) Accepted, pending publication, available at: http://ieeexplore.ieee.org/document/8007247/. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Cristina Cano, David Lopez-Perez, Holger Claussen, and Douglas J Leith. 2016. Using LTE in unlicensed bands: potential benefits and coexistence issues. IEEE Communications Magazine 54, 12 (2016), 116--123. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Cristina Cano and Gergely Neu. 2018. Wireless Optimisation via Convex Bandits: Unlicensed LTE/WiFi Coexistence. arXiv preprint arXiv: 1802.04327 (2018).Google ScholarGoogle Scholar
  10. Andre M. Cavalcante, Erika Almeida, Robson D. Vieira, Sayantan Choudhury, Esa Tuomaala, Klaus Doppler, Fabiano Chaves, Rafael CD. Paiva, and Fuad Abinader. 2013. Performance evaluation of LTE and Wi-Fi coexistence in unlicensed bands. In IEEE Vehicular Technology Conference (VTC Spring).Google ScholarGoogle ScholarCross RefCross Ref
  11. Nicolò Cesa-Bianchi and Gábor Lugosi. 2012. Combinatorial bandits. J. Comput. System Sci. 78 (2012), 1404--1422. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Alessandro Checco and Douglas J. Leith. 2011. Proportional fairness in 802.11 wireless LANs. IEEE Communication Letters 15, 8 (2011), 807--809.Google ScholarGoogle ScholarCross RefCross Ref
  13. Richard Combes, M. Sadegh Talebi, and Alexandre Proutiere. 2015. Combinatorial bandits revisited. In Advances in Neural Information Processing Systems (NIPS). 2116--2124. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Abraham D. Flaxman, Adam Kalai, and Brendan McMahan. 2005. Online Convex Optimization in the Bandit Setting: Gradient Descent Without a Gradient. In In Proceedings of the Sixteenth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA). 385--394. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Zhangyu Guan and Tommaso Melodia. 2016. CU-LTE: Spectrally-Efficient and Fair Coexistence Between LTE and Wi-Fi in Unlicensed Bands. IEEE Int. Conference on Computer Comms. (INEOCOM) (2016).Google ScholarGoogle Scholar
  16. Elad Hazan. 2016. Introduction to online convex optimization. Foundations and Trends in Optimization 2, 3--4 (2016), 157--325. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Elad Hazan and Yuanzhi Li. 2016. An optimal algorithm for bandit convex optimization. arXiv preprint arXiv:1603.04350 (2016).Google ScholarGoogle Scholar
  18. Xiaowei Hu, LA. Prashanth, András György, and Csaba Szepesvári. 2016. (Bandit) Convex Optimization with Biased Noisy Gradient Oracles. In Artificial Intelligence and Statistics (AISTATS). 819--828.Google ScholarGoogle Scholar
  19. Robert D. Kleinberg. 2005. Nearly Tight Bounds for the Continuum-Armed Bandit Problem. In Advances in Neural Information Processing Systems (NIPS). 697--704. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Setareh Maghsudi and Ekram Hossain. 2016. Multi-armed bandits with application to 5G small cells. IEEE Wireless Communications 23, 3 (2016), 64--73.Google ScholarGoogle ScholarCross RefCross Ref
  21. Setareh Maghsudi and Ekram Hossain. 2017. Distributed user association in energy harvesting small cell networks: A probabilistic bandit model. IEEE Transactions on Wireless Communications 16, 3 (2017), 1549--1563. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Paul Patras, Andres Garcia-Saavedra, David Malone, and Douglas J. Leith. 2016. Rigorous and practical proportional-fair allocation for multi-rate Wi-Fi. Ad Hoc Networks 36 (2016). Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Ahmed K. Sadek, Tamer Kadous, Kai Tang, Heechoon Lee, and Mingxi Fan. 2015. Extending LTE to unlicensed band-Merit and coexistence. In IEEE Int. Conf. on Comms. Workshop.Google ScholarGoogle ScholarCross RefCross Ref
  24. Martin Zinkevich. 2003. Online Convex Programming and Generalized Infinitesimal Gradient Ascent. In Proceedings of the Twentieth International Conference on Machine Learning (ICML). Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Wireless Optimisation via Convex Bandits: Unlicensed LTE/WiFi Coexistence

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          NetAI'18: Proceedings of the 2018 Workshop on Network Meets AI & ML
          August 2018
          86 pages
          ISBN:9781450359115
          DOI:10.1145/3229543

          Copyright © 2018 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 7 August 2018

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited

          Acceptance Rates

          Overall Acceptance Rate13of38submissions,34%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader