Throughput Maximization in Uncooperative Spectrum Sharing Networks

Throughput-optimal transmission scheduling in wireless networks has been a well considered problem in the literature, and the method for achieving optimality, MaxWeight scheduling, has been known for several decades. This algorithm achieves optimality by adaptively scheduling transmissions relative to each user’s stochastic traffic demands. To implement the method, users must report their queue backlogs to the network controller and must rapidly respond to the resulting resource allocations. However, many currently-deployed wireless systems are not able to perform these tasks and instead expect to occupy a fixed assignment of resources. To accommodate these limitations, adaptive scheduling algorithms need to interactively estimate these uncooperative users’ queue backlogs and make scheduling decisions to account for their predicted behavior. In this work, we address the problem of scheduling with uncooperative legacy systems by developing algorithms to accomplish these tasks. We begin by formulating the problem of inferring the uncooperative systems’ queue backlogs as a partially observable Markov decision process and proceed to show how our resulting learning algorithms can be successfully used in a queue-length-based scheduling policy. Our theoretical analysis characterizes the throughput-stability region of the network and is verified using simulation results.

[1]  Eytan Modiano,et al.  Learning Algorithms for Scheduling in Wireless Networks with Unknown Channel Statistics , 2018, MobiHoc.

[2]  Abbas Jamalipour,et al.  Wireless communications , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[3]  Thomas H. Cormen,et al.  Introduction to algorithms [2nd ed.] , 2001 .

[4]  Eytan Modiano,et al.  Power allocation and routing in multibeam satellites with time-varying channels , 2003, TNET.

[5]  Zhongcheng Li,et al.  Almost Optimal Channel Access in Multi-Hop Networks with Unknown Channel Variables , 2013, 2014 IEEE 34th International Conference on Distributed Computing Systems.

[6]  Eytan Modiano,et al.  Minimizing the Age of Information in Wireless Networks with Stochastic Arrivals , 2019, IEEE Transactions on Mobile Computing.

[7]  Giuseppe Caire,et al.  WiFlix: Adaptive Video Streaming in Massive MU-MIMO Wireless Networks , 2015, IEEE Transactions on Wireless Communications.

[8]  Nicholas Bambos,et al.  Projective Cone Scheduling (PCS) Algorithms for Packet Switches of Maximal Throughput , 2009, IEEE/ACM Transactions on Networking.

[9]  Eytan Modiano,et al.  Optimal control for generalized network-flow problems , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[10]  John N. Tsitsiklis,et al.  Introduction to linear optimization , 1997, Athena scientific optimization and computation series.

[11]  Ness B. Shroff,et al.  The impact of imperfect scheduling on cross-layer rate control in wireless networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[12]  R. Gallager Stochastic Processes , 2014 .

[13]  Eytan Modiano,et al.  Throughput maximization in uncooperative spectrum sharing networks , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).

[14]  Eytan Modiano,et al.  An Overlay Architecture for Throughput Optimal Multipath Routing , 2017, IEEE/ACM Transactions on Networking.

[15]  Leandros Tassiulas,et al.  Resource Allocation and Cross-Layer Control in Wireless Networks , 2006, Found. Trends Netw..

[16]  Mérouane Debbah,et al.  Traffic-Aware Scheduling and Feedback Allocation in Multichannel Wireless Networks , 2018, IEEE Transactions on Wireless Communications.

[17]  Atilla Eryilmaz,et al.  Learning for serving deadline-constrained traffic in multi-channel wireless networks , 2017, 2017 15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt).

[18]  Sébastien Bubeck,et al.  Regret Analysis of Stochastic and Nonstochastic Multi-armed Bandit Problems , 2012, Found. Trends Mach. Learn..

[19]  J. Walrand,et al.  Sufficient conditions for stability of longest-queue-first scheduling: second-order properties using fluid limits , 2006, Advances in Applied Probability.

[20]  Naumaan Nayyar,et al.  Decentralized Learning for Multiplayer Multiarmed Bandits , 2014, IEEE Transactions on Information Theory.

[21]  Urbashi Mitra,et al.  Cognitive interference management in retransmission-based wireless networks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[22]  Sanjay Shakkottai,et al.  Regret of Queueing Bandits , 2016, NIPS.

[23]  Holger Boche,et al.  Joint Opportunistic Scheduling and Selective Channel Feedback , 2013, IEEE Transactions on Wireless Communications.

[24]  Alexandre Proutière,et al.  Optimal Rate Sampling in 802.11 systems , 2013, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[25]  Qing Zhao,et al.  Indexability of Restless Bandit Problems and Optimality of Whittle Index for Dynamic Multichannel Access , 2008, IEEE Transactions on Information Theory.

[26]  Shie Mannor,et al.  Multi-user lax communications: A multi-armed bandit approach , 2015, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[27]  Eytan Modiano,et al.  Optimizing Age of Information in Wireless Networks with Throughput Constraints , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.

[28]  Anthony Ephremides,et al.  Cooperation in Cognitive Underlay Networks: Stable Throughput Tradeoffs , 2014, IEEE/ACM Transactions on Networking.

[29]  Matti Latva-aho,et al.  The Stability Property of Cognitive Radio Systems with Imperfect Sensing , 2014, IEEE Journal on Selected Areas in Communications.

[30]  Michael J. Neely,et al.  Opportunistic Cooperation in Cognitive Femtocell Networks , 2011, IEEE Journal on Selected Areas in Communications.

[31]  Joshua R. Smith,et al.  Power consumption analysis of Bluetooth Low Energy, ZigBee and ANT sensor nodes in a cyclic sleep scenario , 2013, 2013 IEEE International Wireless Symposium (IWS).

[32]  Ananthram Swami,et al.  Distributed Algorithms for Learning and Cognitive Medium Access with Logarithmic Regret , 2010, IEEE Journal on Selected Areas in Communications.

[33]  Alexandre Proutière,et al.  Spectrum bandit optimization , 2013, 2013 IEEE Information Theory Workshop (ITW).

[34]  Mingyan Liu,et al.  Optimality of Myopic Sensing in Multi-Channel Opportunistic Access , 2008, 2008 IEEE International Conference on Communications.

[35]  Yi Zhang,et al.  Learning Temporal–Spatial Spectrum Reuse , 2016, IEEE Transactions on Communications.

[36]  Mingyan Liu,et al.  Online Learning Methods for Networking , 2014, Found. Trends Netw..

[37]  Michael J. Neely,et al.  Stability and Capacity Regions or Discrete Time Queueing Networks , 2010, ArXiv.

[38]  Ananthram Swami,et al.  Joint Design and Separation Principle for Opportunistic Spectrum Access in the Presence of Sensing Errors , 2007, IEEE Transactions on Information Theory.

[39]  Thomas Benjamin Stahlbuhk,et al.  Control of wireless networks under uncertain state information , 2018 .

[40]  Naumaan Nayyar,et al.  On Regret-Optimal Learning in Decentralized Multiplayer Multiarmed Bandits , 2015, IEEE Transactions on Control of Network Systems.

[41]  Nicholas Bambos,et al.  Queueing Dynamics and Maximal Throughput Scheduling in Switched Processing Systems , 2003, Queueing Syst. Theory Appl..

[42]  Jean C. Walrand,et al.  Achieving 100% throughput in an input-queued switch , 1996, Proceedings of IEEE INFOCOM '96. Conference on Computer Communications.

[43]  Rajesh Sundaresan,et al.  Augmenting max-weight with explicit learning for wireless scheduling with switching costs , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[44]  Leandros Tassiulas,et al.  Dynamic server allocation to parallel queues with randomly varying connectivity , 1993, IEEE Trans. Inf. Theory.

[45]  Thiemo Voigt,et al.  BLE and IEEE 802.15.4 in the IoT: Evaluation and Interoperability Considerations , 2015, IoT 360.

[46]  Changhee Joo,et al.  On the Performance of Back-Pressure Scheduling Schemes with Logarithmic Weight , 2011, IEEE Transactions on Wireless Communications.

[47]  Eytan Modiano,et al.  Throughput-Optimal Multihop Broadcast on Directed Acyclic Wireless Networks , 2015, IEEE/ACM Transactions on Networking.

[48]  Yi Gai,et al.  Learning Multiuser Channel Allocations in Cognitive Radio Networks: A Combinatorial Multi-Armed Bandit Formulation , 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN).

[49]  Leandros Tassiulas,et al.  Stability properties of constrained queueing systems and scheduling policies for maximum throughput in multihop radio networks , 1992 .

[50]  Mung Chiang,et al.  Cross-Layer Congestion Control, Routing and Scheduling Design in Ad Hoc Wireless Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[51]  Eytan Modiano,et al.  Learning Algorithms for Minimizing Queue Length Regret , 2018, 2018 IEEE International Symposium on Information Theory (ISIT).

[52]  Anurag Rai Towards practical policies for network control , 2018 .

[53]  Qing Zhao,et al.  Distributed Learning in Multi-Armed Bandit With Multiple Players , 2009, IEEE Transactions on Signal Processing.

[54]  Bhaskar Krishnamachari,et al.  Combinatorial Network Optimization With Unknown Variables: Multi-Armed Bandits With Linear Rewards and Individual Observations , 2010, IEEE/ACM Transactions on Networking.