Contextual Bandit-Based Channel Selection for Wireless LANs with Interference-Driven Feature Extraction

by   Kota Yamashita, et al.

This paper proposes a radio channel selection algorithm based on a contextual multi-armed bandit (CMAB) for a wireless local area network (WLAN) environment, in which the access probability of each access point (AP) and the throughput model are not given in advance. The problem to be considered inherently involves the exploration to obtain the knowledge of the throughput distribution, in which a realized value is observed only after attempting to select each channel. This can be formulated as a multi-armed bandit (MAB) problem; particularly, we focus on the usefulness of the surrounding channel allocation information as the side information and determine that CMAB is appropriate. However, directly applying common CMAB algorithms to the such problems can lead to the lack of learning efficiency when the number of contexts is large. To reduce the computational complexity of the CMAB algorithms, feature extraction is designed by focusing on interference with neighboring and same-channel APs after channel selection of a target AP, which also contributes to the learning efficiency. To learn the optimal channel efficiently, this study investigates the most efficient method among the typical CMAB algorithms, including epoch-greedy, LinUCB, and Thompson sampling. The simulation results reveal that the algorithm based on JointLinUCB learns most efficiently under the environment where the access probabilities of the APs are extremely different.


page 1

page 6


Faster Activity and Data Detection in Massive Random Access: A Multi-armed Bandit Approach

This paper investigates the grant-free random access with massive IoT de...

On the Robustness of Epoch-Greedy in Multi-Agent Contextual Bandit Mechanisms

Efficient learning in multi-armed bandit mechanisms such as pay-per-clic...

IEEE 802.15.4.e TSCH-Based Scheduling for Throughput Optimization: A Combinatorial Multi-Armed Bandit Approach

In TSCH, which is a MAC mechanism set of the IEEE 802.15.4e amendment, c...

Cooperate or not Cooperate: Transfer Learning with Multi-Armed Bandit for Spatial Reuse in Wi-Fi

The exponential increase of wireless devices with highly demanding servi...

Multi-Armed Bandits for Decentralized AP selection in Enterprise WLANs

WiFi densification leads to the existence of multiple overlapping covera...

LACO: A Latency-Driven Network Slicing Orchestration in Beyond-5G Networks

Network Slicing is expected to become a game changer in the upcoming 5G ...

Visual Prediction of Priors for Articulated Object Interaction

Exploration in novel settings can be challenging without prior experienc...

Please sign up or login with your details

Forgot password? Click here to reset