Skip to main content

OWLS: Opportunistic Wireless Link Scheduling with SINR Constraints

  • Conference paper
  • First Online:
Wireless Algorithms, Systems, and Applications (WASA 2019)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 11604))

Abstract

We study a classical opportunistic wireless link scheduling problem in cognitive radio networks with Signal to Interference plus Noise Ratio (SINR) constraints. Consider a collection of communication links, assume that each link has a channel state. The state transitions follow a transition rule. The exact state information of each link is not available due to the uncertainty of primary users’ activities. The expected channel state is predicted probabilistically by investigating its history and feedbacks when the channels are used. The objective is to pick communication links sequentially over a long time horizon to maximize the average reward. To the best of our knowledge, no prior work can satisfyingly provide solutions for the opportunistic wireless link scheduling problem when considering SINR constraints. In this work, we adopt the robust paradigm of restless multi-armed bandit for the problem and design an efficient algorithm. We analyze the performance via Lyapunov potential function and demonstrate that the proposed algorithm can achieve an approximation bound.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ahmad, S., Liu, M.: Multi-channel opportunistic access: a case of restless bandits with multiple plays. In: Allerton, pp. 1361–1368 (2009)

    Google Scholar 

  2. Ahmad, S.H.A., Liu, M., Javidi, T., Zhao, Q., Krishnamachari, B.: Optimality of myopic sensing in multichannel opportunistic access. IEEE Trans. Inf. Theory 55(9), 4040–4050 (2009)

    Google Scholar 

  3. Blasco, P., Gündüz, D.: Multi-access communications with energy harvesting: a multi-armed bandit model and the optimality of the myopic policy. IEEE JSAC 33(3), 585–597 (2015)

    Google Scholar 

  4. Bubeck, S., Cesa-Bianchi, N., et al.: Regret analysis of stochastic and nonstochastic multi-armed bandit problems. Found. Trends Mach. Learn. 5(1), 1–122 (2012)

    Google Scholar 

  5. Gilbert, E., et al.: Capacity of a burst-noise channel. Bell Syst. Tech. J 39(9), 1253–1265 (1960)

    Google Scholar 

  6. Gittins, J., Glazebrook, K., Weber, R.: Multi-armed Bandit Allocation Indices. Wiley, Hoboken (2011)

    Google Scholar 

  7. Goussevskaia, O., Wattenhofer, R., Halldórsson, M.M., Welzl, E.: Capacity of arbitrary wireless networks. In: IEEE INFOCOM, pp. 1872–1880 (2009)

    Google Scholar 

  8. Guha, S., Munagala, K.: Approximation algorithms for partial-information based stochastic control with Markovian rewards. In: IEEE FOCS, pp. 483–493 (2007)

    Google Scholar 

  9. Guha, S., Munagala, K., Shi, P.: Approximation algorithms for restless bandit problems. J. ACM (JACM) 58(1), 3 (2010)

    Google Scholar 

  10. Gupta, P., Kumar, P.R.: The capacity of wireless networks. IEEE Trans. Inf. Theory 46(2), 388–404 (2000)

    Google Scholar 

  11. Le Ny, J., Dahleh, M., Feron, E.: Multi-UAV dynamic routing with partial observations using restless bandit allocation indices. In: American Control Conference, pp. 4220–4225. IEEE (2008)

    Google Scholar 

  12. Li, B., Yang, P., Li, X.-Y., Tang, S., Liu, Y., Wu, Q.: Almost optimal dynamically-ordered multi-channel accessing for cognitive networks. In: IEEE INFOCOM, pp. 3081–3085. IEEE (2012)

    Google Scholar 

  13. Li, C.-P., Neely, M.J.: Network utility maximization over partially observable markovian channels. Perform. Eval. 70(7), 528–548 (2013)

    Google Scholar 

  14. Liu, K., Zhao, Q.: Indexability of restless bandit problems and optimality of whittle index for dynamic multichannel access. IEEE Trans. Inf. Theory 56(11), 5547–5567 (2010)

    Google Scholar 

  15. Lunden, J., Koivunen, V., Poor, H.V.: Spectrum exploration and exploitation for cognitive radio: recent advances. IEEE Signal Process. Mag. 32(3), 123–140 (2015)

    Google Scholar 

  16. Mahajan, A., Teneketzis, D.: Multi-armed bandit problems. Found. Appl. Sens. Manag., 121–151 (2008)

    Google Scholar 

  17. Mitola, J., Maguire, G.Q., et al.: Cognitive radio: making software radios more personal. IEEE Pers. Commun. 6(4), 13–18 (1999)

    Google Scholar 

  18. Ouyang, W., Murugesan, S., Eryilmaz, A., Shroff, N.B.: Exploiting channel memory for joint estimation and scheduling in downlink networks–a Whittle’s indexability analysis. IEEE Trans. Inf. Theory 61(4), 1702–1719 (2015)

    Google Scholar 

  19. Wan, P.-J., Jia, X., Dai, G., Du, H., Frieder, O.: Fast and simple approximation algorithms for maximum weighted independent set of links. In: IEEE INFOCOM, pp. 1653–1661 (2014)

    Google Scholar 

  20. Wan, P.-J., Xu, X.: Weighted restless bandit and its applications. In: IEEE ICDCS, pp. 507–516 (2015)

    Google Scholar 

  21. Wang, K., Chen, L.: On optimality of myopic policy for restless multi-armed bandit problem: an axiomatic approach. IEEE Trans. Signal Process. 60(1), 300–309 (2012)

    Google Scholar 

  22. Wang, K., Chen, L., Liu, Q., Wang, W., Li, F.: One step beyond myopic probing policy: a heuristic lookahead policy for multi-channel opportunistic access. IEEE Trans. Wirel. Commun. 14(2), 759–769 (2015)

    Google Scholar 

  23. Wang, K., Chen, L., Yu, J., Zhang, D.: Optimality of myopic policy for multistate channel access. IEEE Commun. Lett. 20(2), 300–303 (2016)

    Google Scholar 

  24. Wang, K., Liu, Q., Li, F., Chen, L., Ma, X.: Myopic policy for opportunistic access in cognitive radio networks by exploiting primary user feedbacks. IET Commun. 9(7), 1017–1025 (2015)

    Google Scholar 

  25. Whittle, P.: Restless bandits: activity allocation in a changing world. J. Appl. Probab. 25, 287–298 (1988)

    Google Scholar 

  26. Xu, X., Li, X.-Y., Song, M.: Efficient aggregation scheduling in multihop wireless sensor networks with SINR constraints. IEEE Trans. Mob. Comput. 12(12), 2518–2528 (2013)

    Google Scholar 

  27. Xu, X., Song, M.: Approximation algorithms for wireless opportunistic spectrum scheduling in cognitive radio networks. In: IEEE INFOCOM (2016)

    Google Scholar 

  28. Yu, D., Ning, L., Zou, Y., Yu, J., Cheng, X., Lau, F.C.: Distributed spanner construction with physical interference: constant stretch and linear sparseness. IEEE/ACM Trans. Netw. 25(4), 2138–2151 (2017)

    Google Scholar 

  29. Yu, J., Huang, B., Cheng, X., Atiquzzaman, M.: Shortest link scheduling algorithms in wireless networks under the SINR model. IEEE Trans. Veh. Technol. 66(3), 2643–2657 (2017)

    Google Scholar 

Download references

Acknowledgements

The research of authors is supported in part by KSU OVPR grant, NSFC Grant No. 61802097 and No. 61572377, and the Project of Qianjiang Talent (Grant No. QJD1802020).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaohua Xu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Xu, X., Chen, Y., He, S., Bobbie, P.O. (2019). OWLS: Opportunistic Wireless Link Scheduling with SINR Constraints. In: Biagioni, E., Zheng, Y., Cheng, S. (eds) Wireless Algorithms, Systems, and Applications. WASA 2019. Lecture Notes in Computer Science(), vol 11604. Springer, Cham. https://doi.org/10.1007/978-3-030-23597-0_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-23597-0_34

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-23596-3

  • Online ISBN: 978-3-030-23597-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics