Abstract
In this paper, we consider the problem of link adaptation (rate allocation) of Orthogonal Multiple Access Multiple Relay Channel (OMAMRC) using the Multi-Armed Bandit (MAB) online learning framework. The cooperative system is composed of a transmission phase where sources transmit in a round robin manner, and a retransmission phase where a scheduled node sends redundancies. We assume that we have no knowledge of the Channel State Information (CSI) nor of the Channel Distributed Information (CDI). Accordingly, rate allocation must be learned online following a sequential learning algorithm. We adapt to one variant of the MAB framework algorithms, the Upper Confidence Bound (UCB) family, and specifically the UCB1 algorithm. The UCB1 algorithm achieves a logarithmic regret uniformly over time, without any preliminary knowledge about the reward distributions. Due to the exponential growth of the number of arms, following the multiple sources included in the rate allocation, the UCB1 algorithm features a complexity problem. Thus, we propose a sequential UCB1 (SUCB1) algorithm which solves the complexity issue, and outperforms the UCB1 algorithm.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Kramer, G., Marić, I., Yates, R.D.: Cooperative communications (2007)
Kramer, G., Gastpar, M., Gupta, P.: Cooperative strategies and capacity theorems for relay networks. IEEE Trans. Inf. Theory 51(9), 3037–3063 (2005)
Sankaranarayanan, L., Kramer, G., Mandayam, N.B.: Hierarchical sensor networks: capacity bounds and cooperative strategies using the multiple-access relay channel model. In: 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, SECON 2004, pp. 191–199. IEEE (2004)
Laneman, J.N.: Cooperative diversity in wireless networks: algorithms and architectures. Ph.D. dissertation, Massachusetts Institute of Technology, Cambridge, MA (2002)
Lim, S.H., Kim, Y.H., Gamal, A.E., Chung, S.Y.: Noisy network coding. IEEE Trans. Inf. Theory 57(5), 3132–3152 (2011)
Avestimehr, A.S., Diggavi, S.N., Tse, D.N.C.: Wireless network information flow: a deterministic approach. IEEE Trans. Inf. Theory 57(4), 1872–1905 (2011)
Cover, T., Gamal, A.E.: Capacity theorems for the relay channel. IEEE Trans. Inf. Theory 25(5), 572–584 (1979)
Khansa, A.A., Cerovic, S., Visoz, R., Hayel, Y., Lasaulce, S.: Slow-link adaptation algorithm for multi-source multi-relay wireless networks using best-response dynamics. To be presented at NetGCOOP (2021)
Bubeck, S., Cesa-Bianchi, N.: Regret analysis of stochastic and nonstochastic multi-armed bandit problems. arXiv preprint arXiv:1204.5721 (2012)
Lai, T.L., Robbins, H.: Asymptotically efficient adaptive allocation rules. Adv. Appl. Math. 6(1), 4–22 (1985)
Weng, L.: The multi-armed bandit problem and its solutions. lilianweng.github.io/lil-log (2018)
Bubeck, S.: Bandits games and clustering foundations. Ph.D. dissertation, INRIA Nord Europe (2010)
Garivier, A., Cappé, O.: The KL-UCB algorithm for bounded stochastic bandits and beyond. In: Proceedings of the 24th Annual Conference on Learning Theory. In: JMLR Workshop and Conference Proceedings, pp. 359–376 (2011)
Thompson, W.R.: On the likelihood that one unknown probability exceeds another in view of the evidence of two samples. Biometrika 25(3/4), 285–294 (1933)
Chapelle, O., Li, L.: An empirical evaluation of Thompson sampling. Adv. Neural Inf. Process. Syst. 24, 2249–2257 (2011)
Russo, D., Van Roy, B., Kazerouni, A., Osband, I., Wen, Z.: A tutorial on Thompson sampling. arXiv preprint arXiv:1707.02038 (2017)
Combes, R., Magureanu, S., Proutiere, A.: Minimal exploration in structured stochastic bandits. arXiv preprint arXiv:1711.00400 (2017)
Ameur, W.B., Mary, P., Hélard, J.-F., Dumay, M., Schwoerer, J.: Autonomous power decision for the grant free access MUSA scheme in the mMTC scenario. Sensors 21(1), 116 (2021)
Nasim, I., Ibrahim, A.S., Kim, S.: Learning-based beamforming for multi-user vehicular communications: a combinatorial multi-armed bandit approach. IEEE Access 8, 219 891–219 902 (2020)
Chen, W., Wang, Y., Yuan, Y.: Combinatorial multi-armed bandit: general framework and applications. In: International Conference on Machine Learning. PMLR, pp. 151–159 (2013)
Kuchibhotla, V., Harshitha, P., Elugoti, D.: Combinatorial sleeping bandits with fairness constraints and long-term non-availability of arms. In: 2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA), pp. 1575–1581. IEEE (2020)
Cerovic, S., Visoz, R., Madier, L., Berthet, A.O.: Centralized scheduling strategies for cooperative HARQ retransmissions in multi-source multi-relay wireless networks. In: Proceedings of IEEE ICC 2018, Kansas City, MO, USA, May 2018
Mohamad, A., Visoz, R., Berthet, A.O.: Outage analysis of various cooperative strategies for the multiple access multiple relay channel. In: IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC). IEEE 2013, pp. 1321–1326 (2013)
Auer, P., Cesa-Bianchi, N., Fischer, P.: Finite-time analysis of the multiarmed bandit problem. Mach. Learn. 47(2), 235–256 (2002)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendix
Appendix
1.1 A: Outage Events
Based on [23] proposition 1, we see a direct relation between the individual outage and the common outage. The individual outage is defined as the event that an individual source is not decoded correctly at the destination after \(T_{max}\) rounds. Similarly, common outage is defined for a set of sources, and it is declared when at least one of the sources within this set is not decoded correctly at the destination. In other words, common outage of a set occurs when one or more of its source nodes are in an individual outage.
Both, the individual outage event \(\mathcal {O}_{s,t}(a_t,\mathcal {S}_{a_t,t-1} |\mathcal {P}_{t-1})\) of a source s after round t, and the common outage event \(\mathcal {E}_t(a_t,\mathcal {S}_{a_t,t-1} |\mathcal {P}_{t-1})\) after round t, depend directly on the rate being scheduled. In addition, they depend on the selected node \(a_t\in \mathcal {N}\) and its associated decoding set \(\mathcal {S}_{a_t,t-1}\). They are conditional on the knowledge of \(\mathcal {P}_{t-1}\), where \(\mathcal {P}_{t-1}\) denotes the set collecting the nodes \(\widehat{a}_l\) which were selected in rounds \(l \in \{ 1,\dots ,t-1 \}\) prior to round t together with their associated decoding sets \(\mathcal {S}_{\widehat{a}_l,l-1}\), and the decoding set of the destination \(\mathcal {S}_{d,t-1}\) (\(\mathcal {S}_{d,0}\) is the destination’s decoding set after the first phase).
Analytically, the common outage event of a given subset of sources is declared if the vector of their rates lies outside of the corresponding MAC capacity region. For some subset of sources \(\mathcal {B}\subseteq \overline{\mathcal {S}}_{d,t-1}\), where \(\overline{\mathcal {S}}_{d,t-1}=\mathcal {S} \setminus {\mathcal {S}}_{d,t-1}\) is the set of non-successfully decoded sources at the destination after round \(t-1\), and for a candidate node \(a_t\) this event can be expressed as:
where \(I_{a,b}\) denotes the mutual information between the nodes a and b (the mutual information is defined based on the channel inputs, check Sect. 6 for Gaussian inputs example), and where \(\mathcal {C}_{\widehat{a}_l}\) and \(\mathcal {C}_{a_t}\) have the following definitions:
The individual outage event of a source s after round t for a candidate node \(a_t\) can be defined as:
where \(\overline{\mathcal {I}}=\overline{\mathcal {S}}_{d,t-1}\setminus \mathcal {I}\).
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Khansa, A.A., Visoz, R., Hayel, Y., Lasaulce, S. (2021). Resource Allocation for Multi-source Multi-relay Wireless Networks: A Multi-Armed Bandit Approach. In: Elbiaze, H., Sabir, E., Falcone, F., Sadik, M., Lasaulce, S., Ben Othman, J. (eds) Ubiquitous Networking. UNet 2021. Lecture Notes in Computer Science(), vol 12845. Springer, Cham. https://doi.org/10.1007/978-3-030-86356-2_6
Download citation
DOI: https://doi.org/10.1007/978-3-030-86356-2_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-86355-5
Online ISBN: 978-3-030-86356-2
eBook Packages: Computer ScienceComputer Science (R0)