Abstract
We study a classical opportunistic wireless link scheduling problem in cognitive radio networks with Signal to Interference plus Noise Ratio (SINR) constraints. Consider a collection of communication links, assume that each link has a channel state. The state transitions follow a transition rule. The exact state information of each link is not available due to the uncertainty of primary users’ activities. The expected channel state is predicted probabilistically by investigating its history and feedbacks when the channels are used. The objective is to pick communication links sequentially over a long time horizon to maximize the average reward. To the best of our knowledge, no prior work can satisfyingly provide solutions for the opportunistic wireless link scheduling problem when considering SINR constraints. In this work, we adopt the robust paradigm of restless multi-armed bandit for the problem and design an efficient algorithm. We analyze the performance via Lyapunov potential function and demonstrate that the proposed algorithm can achieve an approximation bound.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ahmad, S., Liu, M.: Multi-channel opportunistic access: a case of restless bandits with multiple plays. In: Allerton, pp. 1361–1368 (2009)
Ahmad, S.H.A., Liu, M., Javidi, T., Zhao, Q., Krishnamachari, B.: Optimality of myopic sensing in multichannel opportunistic access. IEEE Trans. Inf. Theory 55(9), 4040–4050 (2009)
Blasco, P., Gündüz, D.: Multi-access communications with energy harvesting: a multi-armed bandit model and the optimality of the myopic policy. IEEE JSAC 33(3), 585–597 (2015)
Bubeck, S., Cesa-Bianchi, N., et al.: Regret analysis of stochastic and nonstochastic multi-armed bandit problems. Found. Trends Mach. Learn. 5(1), 1–122 (2012)
Gilbert, E., et al.: Capacity of a burst-noise channel. Bell Syst. Tech. J 39(9), 1253–1265 (1960)
Gittins, J., Glazebrook, K., Weber, R.: Multi-armed Bandit Allocation Indices. Wiley, Hoboken (2011)
Goussevskaia, O., Wattenhofer, R., Halldórsson, M.M., Welzl, E.: Capacity of arbitrary wireless networks. In: IEEE INFOCOM, pp. 1872–1880 (2009)
Guha, S., Munagala, K.: Approximation algorithms for partial-information based stochastic control with Markovian rewards. In: IEEE FOCS, pp. 483–493 (2007)
Guha, S., Munagala, K., Shi, P.: Approximation algorithms for restless bandit problems. J. ACM (JACM) 58(1), 3 (2010)
Gupta, P., Kumar, P.R.: The capacity of wireless networks. IEEE Trans. Inf. Theory 46(2), 388–404 (2000)
Le Ny, J., Dahleh, M., Feron, E.: Multi-UAV dynamic routing with partial observations using restless bandit allocation indices. In: American Control Conference, pp. 4220–4225. IEEE (2008)
Li, B., Yang, P., Li, X.-Y., Tang, S., Liu, Y., Wu, Q.: Almost optimal dynamically-ordered multi-channel accessing for cognitive networks. In: IEEE INFOCOM, pp. 3081–3085. IEEE (2012)
Li, C.-P., Neely, M.J.: Network utility maximization over partially observable markovian channels. Perform. Eval. 70(7), 528–548 (2013)
Liu, K., Zhao, Q.: Indexability of restless bandit problems and optimality of whittle index for dynamic multichannel access. IEEE Trans. Inf. Theory 56(11), 5547–5567 (2010)
Lunden, J., Koivunen, V., Poor, H.V.: Spectrum exploration and exploitation for cognitive radio: recent advances. IEEE Signal Process. Mag. 32(3), 123–140 (2015)
Mahajan, A., Teneketzis, D.: Multi-armed bandit problems. Found. Appl. Sens. Manag., 121–151 (2008)
Mitola, J., Maguire, G.Q., et al.: Cognitive radio: making software radios more personal. IEEE Pers. Commun. 6(4), 13–18 (1999)
Ouyang, W., Murugesan, S., Eryilmaz, A., Shroff, N.B.: Exploiting channel memory for joint estimation and scheduling in downlink networks–a Whittle’s indexability analysis. IEEE Trans. Inf. Theory 61(4), 1702–1719 (2015)
Wan, P.-J., Jia, X., Dai, G., Du, H., Frieder, O.: Fast and simple approximation algorithms for maximum weighted independent set of links. In: IEEE INFOCOM, pp. 1653–1661 (2014)
Wan, P.-J., Xu, X.: Weighted restless bandit and its applications. In: IEEE ICDCS, pp. 507–516 (2015)
Wang, K., Chen, L.: On optimality of myopic policy for restless multi-armed bandit problem: an axiomatic approach. IEEE Trans. Signal Process. 60(1), 300–309 (2012)
Wang, K., Chen, L., Liu, Q., Wang, W., Li, F.: One step beyond myopic probing policy: a heuristic lookahead policy for multi-channel opportunistic access. IEEE Trans. Wirel. Commun. 14(2), 759–769 (2015)
Wang, K., Chen, L., Yu, J., Zhang, D.: Optimality of myopic policy for multistate channel access. IEEE Commun. Lett. 20(2), 300–303 (2016)
Wang, K., Liu, Q., Li, F., Chen, L., Ma, X.: Myopic policy for opportunistic access in cognitive radio networks by exploiting primary user feedbacks. IET Commun. 9(7), 1017–1025 (2015)
Whittle, P.: Restless bandits: activity allocation in a changing world. J. Appl. Probab. 25, 287–298 (1988)
Xu, X., Li, X.-Y., Song, M.: Efficient aggregation scheduling in multihop wireless sensor networks with SINR constraints. IEEE Trans. Mob. Comput. 12(12), 2518–2528 (2013)
Xu, X., Song, M.: Approximation algorithms for wireless opportunistic spectrum scheduling in cognitive radio networks. In: IEEE INFOCOM (2016)
Yu, D., Ning, L., Zou, Y., Yu, J., Cheng, X., Lau, F.C.: Distributed spanner construction with physical interference: constant stretch and linear sparseness. IEEE/ACM Trans. Netw. 25(4), 2138–2151 (2017)
Yu, J., Huang, B., Cheng, X., Atiquzzaman, M.: Shortest link scheduling algorithms in wireless networks under the SINR model. IEEE Trans. Veh. Technol. 66(3), 2643–2657 (2017)
Acknowledgements
The research of authors is supported in part by KSU OVPR grant, NSFC Grant No. 61802097 and No. 61572377, and the Project of Qianjiang Talent (Grant No. QJD1802020).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Xu, X., Chen, Y., He, S., Bobbie, P.O. (2019). OWLS: Opportunistic Wireless Link Scheduling with SINR Constraints. In: Biagioni, E., Zheng, Y., Cheng, S. (eds) Wireless Algorithms, Systems, and Applications. WASA 2019. Lecture Notes in Computer Science(), vol 11604. Springer, Cham. https://doi.org/10.1007/978-3-030-23597-0_34
Download citation
DOI: https://doi.org/10.1007/978-3-030-23597-0_34
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-23596-3
Online ISBN: 978-3-030-23597-0
eBook Packages: Computer ScienceComputer Science (R0)