Multi-Armed Bandit in Action: Optimizing Performance in Dynamic Hybrid Networks

被引:7
|
作者
Henri, Sebastien [1 ]
Vlachou, Christina [2 ]
Thiran, Patrick [1 ]
机构
[1] Ecole Polytech Fed Lausanne, INDY, CH-1015 Lausanne, Switzerland
[2] HPE Labs, Palo Alto, CA 94304 USA
关键词
Multi-armed bandit; dynamic networks; hybrid networks; wireless; power-line communications (PLC); OPTIMIZATION;
D O I
10.1109/TNET.2018.2856302
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Today's home networks are often composed of several technologies such as Wi-Fi or power-line communication (PLC). Yet, current network protocols rarely fully harness this diversity and use each technology for a specific, pre-defined role, for example, wired media as a backbone and the wireless medium for mobility. Moreover, a single path is generally employed to transmit data; this path is established in advance and remains in use as long as it is valid, although multiple possible paths offer more robustness against varying environments. We introduce HyMAB, an algorithm that explores different multipaths and finds the best one in a mesh hybrid network, while keeping congestion under control. We employ the multi-armed-bandit framework and prove that HyMAB achieves optimal throughput under a static scenario. HyMAB design also accounts for real-network intricacies and dynamic conditions; it adapts to varying environments and switches multipaths when needed. We implement HyMAB on a PLC/Wi-Fi test bed. This is, to the best of our knowledge, the first implementation on a real test bed of multi-armed-bandit strategies in the context of routing. Our experimental results confirm the optimality of HyMAB and its ability to adapt to dynamic network conditions, as well as the gains provided by employing multi-armed-bandit strategies.
引用
收藏
页码:1879 / 1892
页数:14
相关论文
共 50 条
  • [41] Dynamic Multi-Armed Bandit Algorithm for the Cyclic Bandwidth Sum Problem
    Rodriguez-Tello, Eduardo
    Narvaez-Teran, Valentina
    Lardeux, Frederic
    IEEE ACCESS, 2019, 7 : 40258 - 40270
  • [42] FOLPETTI: A Novel Multi-Armed Bandit Smart Attack for Wireless Networks
    Bout, Emilie
    Brighente, Alessandro
    Conti, Mauro
    Valeria, Loscri
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, ARES 2022, 2022,
  • [43] POMDP multi-armed bandit formulation for energy minimization in sensor networks
    Krishnamurthy, V
    2005 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1-5: SPEECH PROCESSING, 2005, : 793 - 796
  • [44] ON MULTI-ARMED BANDIT PROBLEM WITH NUISANCE PARAMETER
    孙嘉阳
    Science China Mathematics, 1986, (05) : 464 - 475
  • [45] Multi-armed bandit algorithms and empirical evaluation
    Vermorel, J
    Mohri, M
    MACHINE LEARNING: ECML 2005, PROCEEDINGS, 2005, 3720 : 437 - 448
  • [46] Sustainable Cooperative Coevolution with a Multi-Armed Bandit
    De Rainville, Francois-Michel
    Sebag, Michele
    Gagne, Christian
    Schoenauer, Marc
    Laurendeau, Denis
    GECCO'13: PROCEEDINGS OF THE 2013 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE, 2013, : 1517 - 1524
  • [47] Robust control of the multi-armed bandit problem
    Caro, Felipe
    Das Gupta, Aparupa
    ANNALS OF OPERATIONS RESEARCH, 2022, 317 (02) : 461 - 480
  • [48] Identifying Outlier Arms in Multi-Armed Bandit
    Zhuang, Honglei
    Wang, Chi
    Wang, Yifan
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 30 (NIPS 2017), 2017, 30
  • [49] Characterizing Truthful Multi-Armed Bandit Mechanisms
    Babaioff, Moshe
    Sharma, Yogeshwer
    Slivkins, Aleksandrs
    10TH ACM CONFERENCE ON ELECTRONIC COMMERCE - EC 2009, 2009, : 79 - 88
  • [50] ON MULTI-ARMED BANDIT PROBLEM WITH NUISANCE PARAMETER
    孙嘉阳
    ScienceinChina,SerA., 1986, Ser.A.1986 (05) : 464 - 475