Distributed Learning for Multi-Channel Selection in Wireless Network Monitoring — Yuan Xue, Pan Zhou, Tao Jiang, Shiwen Mao and Xiaolei Huang.

Slides:



Advertisements
Similar presentations
Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
Advertisements

DBLA: D ISTRIBUTED B LOCK L EARNING A LGORITHM F OR C HANNEL S ELECTION I N C OGNITIVE R ADIO N ETWORKS Chowdhury Sayeed Hyder Department of Computer Science.
A novel Energy-Efficient and Distance- based Clustering approach for Wireless Sensor Networks M. Mehdi Afsar, Mohammad-H. Tayarani-N.
Online Distributed Sensor Selection Daniel Golovin, Matthew Faulkner, Andreas Krause theory and practice collide 1.
Delay and Throughput in Random Access Wireless Mesh Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department Rensselaer Polytechnic Institute (RPI)
1 Distributed Adaptive Sampling, Forwarding, and Routing Algorithms for Wireless Visual Sensor Networks Johnsen Kho, Long Tran-Thanh, Alex Rogers, Nicholas.
1 Maximal Independent Set. 2 Independent Set (IS): In a graph, any set of nodes that are not adjacent.
1 Multi-radio Channel Allocation algorithms based on game theory analysis Shirin Saeedi Bidokhti Supervised by Mark Felegyhazi Prof. Hubaux Feb
Mortal Multi-Armed Bandits Deepayan Chakrabarti,Yahoo! Research Ravi Kumar,Yahoo! Research Filip Radlinski, Microsoft Research Eli Upfal,Brown University.
Analyzing Multi-channel MAC Protocols for Underwater Sensor Networks Presenter: Zhong Zhou.
A Layered Hybrid ARQ Scheme for Scalable Video Multicast over Wireless Networks Zhengye Liu, Joint work with Zhenyu Wu.
Jointly Optimal Transmission and Probing Strategies for Multichannel Systems Saswati Sarkar University of Pennsylvania Joint work with Sudipto Guha (Upenn)
CS541 Advanced Networking 1 Spectrum Sharing in Cognitive Radio Networks Neil Tang 3/23/2009.
© Honglei Miao: Presentation in Ad-Hoc Network course (19) Minimal CDMA Recoding Strategies in Power-Controlled Ad-Hoc Wireless Networks Honglei.
Exploration and Exploitation Strategies for the K-armed Bandit Problem by Alexander L. Strehl.
Multi-armed Bandit Problems with Dependent Arms
LPT for Data Aggregation in Wireless Sensor networks Marc Lee and Vincent W.S Wong Department of Electrical and Computer Engineering, University of British.
Bluenet a New Scatternet Formation Scheme * Huseyin Ozgur Tan * Zifang Wang,Robert J.Thomas, Zygmunt Haas ECE Cornell Univ*
Evolving Strategies for Contentious but Efficient Coexistence in Unlicensed Bands N. Clemens C. Rose WINLAB.
RFID Cardinality Estimation with Blocker Tags
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
Yanyan Yang, Yunhuai Liu, and Lionel M. Ni Department of Computer Science and Engineering, Hong Kong University of Science and Technology IEEE MASS 2009.
Pipelined Two Step Iterative Matching Algorithms for CIOQ Crossbar Switches Deng Pan and Yuanyuan Yang State University of New York, Stony Brook.
COGNITIVE RADIO FOR NEXT-GENERATION WIRELESS NETWORKS: AN APPROACH TO OPPORTUNISTIC CHANNEL SELECTION IN IEEE BASED WIRELESS MESH Dusit Niyato,
Seyed Mohamad Alavi, Chi Zhou, Yu Cheng Department of Electrical and Computer Engineering Illinois Institute of Technology, Chicago, IL, USA ICC 2009.
Search and Planning for Inference and Learning in Computer Vision
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
An algorithm for dynamic spectrum allocation in shadowing environment and with communication constraints Konstantinos Koufos Helsinki University of Technology.
A Cooperative Diversity- Based Robust MAC Protocol in wireless Ad Hoc Networks Sangman Moh, Chansu Yu Chosun University, Cleveland State University Korea,
1 Optimal Power Allocation and AP Deployment in Green Wireless Cooperative Communications Xiaoxia Zhang Department of Electrical.
Reynold Cheng†, Eric Lo‡, Xuan S
1 Dr. Itamar Arel College of Engineering Electrical Engineering & Computer Science Department The University of Tennessee Fall 2009 August 24, 2009 ECE-517:
Interleaved Multi-Bank Scratchpad Memories: A Probabilistic Description of Access Conflicts DAC '15, June , 2015, San Francisco, CA, USA.
1 Performance Analysis of Coexisting Secondary Users in Heterogeneous Cognitive Radio Network Xiaohua Li Dept. of Electrical & Computer Engineering State.
Tracking with Unreliable Node Sequences Ziguo Zhong, Ting Zhu, Dan Wang and Tian He Computer Science and Engineering, University of Minnesota Infocom 2009.
Rensselaer Polytechnic Institute Rajagopal Iyengar Combinatorial Approaches to QoS Scheduling in Multichannel Wireless Systems Rajagopal Iyengar Rensselaer.
Mean Field Equilibria of Multi-Armed Bandit Games Ramki Gummadi (Stanford) Joint work with: Ramesh Johari (Stanford) Jia Yuan Yu (IBM Research, Dublin)
TRUST: A General Framework for Truthful Double Spectrum Auctions Xia Zhou Heather Zheng (University of California, Santa Barbara) Presenter: Emil Huang.
1 Multicast Algorithms for Multi- Channel Wireless Mesh Networks Guokai Zeng, Bo Wang, Yong Ding, Li Xiao, Matt Mutka Michigan State University ICNP 2007.
MAP: Multi-Auctioneer Progressive Auction in Dynamic Spectrum Access Lin Gao, Youyun Xu, Xinbing Wang Shanghai Jiaotong University.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
CS584 - Software Multiagent Systems Lecture 12 Distributed constraint optimization II: Incomplete algorithms and recent theoretical results.
1 A Randomized Space-Time Transmission Scheme for Secret-Key Agreement Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2 1 Department of Electrical.
Using Hierarchical Reinforcement Learning to Balance Conflicting Sub- problems By: Stephen Robertson Supervisor: Phil Sterne.
1 11 Channel Assignment for Maximum Throughput in Multi-Channel Access Point Networks Xiang Luo, Raj Iyengar and Koushik Kar Rensselaer Polytechnic Institute.
Covering Points of Interest with Mobile Sensors Milan Erdelj, Tahiry Razafindralambo and David Simplot-Ryl INRIA Lille - Nord Europe IEEE Transactions on.
Content caching and scheduling in wireless networks with elastic and inelastic traffic Group-VI 09CS CS CS30020 Performance Modelling in Computer.
Department of Electrical and Computer Engineering Sequential Learning for Passive Monitoring of Multichannel Wireless Networks Department of Electrical.
COMP 2208 Dr. Long Tran-Thanh University of Southampton Bandits.
Jinfang Jiang, Guangjie Han, Lei Shu, Han-Chieh Chao, Shojiro Nishio
Chance Constrained Robust Energy Efficiency in Cognitive Radio Networks with Channel Uncertainty Yongjun Xu and Xiaohui Zhao College of Communication Engineering,
Partially Overlapped Channels Not Considered Harmful Arunesh Mishra, Vivek Shrivastava, Suman Banerjee, William Arbaugh (ACM SIGMetrics 2006) Slides adapted.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Collision Helps! Algebraic Collision Recovery for Wireless Erasure Networks.
1 Low Latency Multimedia Broadcast in Multi-Rate Wireless Meshes Chun Tung Chou, Archan Misra Proc. 1st IEEE Workshop on Wireless Mesh Networks (WIMESH),
Shanghai Jiao Tong University Institute of Wireless Comm. Tech. (IWCT) 无线技术沙龙 Wireless Club 创 新 无 线 精 彩 无 限 Enabling Splendid Wireless A Theoretical Framework.
Self-Organized Resource Allocation in LTE Systems with Weighted Proportional Fairness I-Hong Hou and Chung Shue Chen.
Rate-Adaptive MAC Protocol in High-Rate Personal Area Networks Byung-Seo Kim, Yuguang Fang and Tan F. Wong Department of Electrical and Computer Engineering.
A Low Interference Channel Assignment Algorithm for Wireless Mesh Networks Can Que 1,2, Xinming Zhang 1, and Shifang Dai 1 1.Department of Computer Science.
Slide 1 Toward Optimal Sniffer-Channel Assignment for Reliable Monitoring in Multi-Channel Wireless Networks Donghoon Shin, Saurabh Bagchi and Chih-Chun.
Jian Li Institute for Interdisciplinary Information Sciences Tsinghua University Multi-armed Bandit Problems WAIM 2014.
By: Kenny Raharjo 1. Agenda Problem scope and goals Game development trend Multi-armed bandit (MAB) introduction Integrating MAB into game development.
Basics of Multi-armed Bandit Problems
Satisfaction Games in Graphical Multi-resource Allocation
User Interference Effect on Routing of Cognitive Radio Ad-Hoc Networks
Tingdan Luo 05/02/2016 Interactively Optimizing Information Retrieval Systems as a Dueling Bandits Problem Tingdan Luo
Multi-Agent Exploration
Feedback-Aware Social Event-Participant Arrangement
The Rich and the Poor: A Markov Decision Process Approach to Optimizing Taxi Driver Revenue Efficiency Huigui Rong, Xun Zhou, Chang Yang, Zubair Shafiq,
Is Dynamic Multi-Rate Worth the Effort?
Market-based Dynamic Task Allocation in Mobile Surveillance Systems
Presentation transcript:

Distributed Learning for Multi-Channel Selection in Wireless Network Monitoring — Yuan Xue, Pan Zhou, Tao Jiang, Shiwen Mao and Xiaolei Huang

Outline  Background & Goal  Problem Formulation  Algorithms  Experiment  Conclusion

Background In wireless monitoring, channel selection, i.e., how to choose channels with best (or worst) qualities timely and accurately can be tricky With the channel information initially unknown, adaptive channel allocation methods are needed While dedicated devices such as sniffers are implemented, coordination between multiple devices is an essential problem Applications in resource allocation, mission-critical scenarios, disaster recovery and military tasks

Goal Optimal channel selection With channel activities initially unknown, collecting channel information gradually during a sequential learning process Make best decision within limited time budget Coordination between devices For passive devices, they can communicate without inferences to make best choice For active devices, interferences are taken into consideration

Problem Formulation We need an adaptive learning method for channel selection To achieve a trade-off between time/resource budget and accuracy, we formulate this problem as a novel branch of the classic multi-armed bandit (MAB) problem, namely exploration bandit problem For multiple monitoring devices, we convert the original problem into a distributed exploration bandit problem

Multi-armed Bandit (MAB) Problem MAB is an online learning problem for decision making It is a classic example of tradeoff between exploration and exploitation, which aims to achieve the maximum cumulative sum of rewards in the learning process For channel selection in wireless monitoring, sniffers also need to make decisions of choosing best channel through the learning process, thus MAB algorithms work

Exploration Bandit Problem A new branch of MAB In the fixed budget setting, players should seek for a single best arm or a best subset of arms within a fixed time budget Exploration bandit methods have more accurate results in the channel selection of wireless monitoring because they can spend more time on ‘bad’ channels

Distributed Exploration Bandit An challenging problem under distributed environment, which remains unsolved In fixed budget setting, different players make their own decisions independently in a limited time For multiple players (sniffers in our case), how to avoid interferences and achieve higher reward in the meantime is the main problem

Active Sniffers without Communications Collision !

Algorithms Single sniffer channel selection algorithm Sequential Multiple Elimination (SME) algorithm separates the time budget into several rounds, and keeps eliminating unwanted channels while it learns the channel information SME allows sniffers to reduce the number of samples constantly during the process of channel monitoring, and guarantees each channel has been sampled enough times before been dropped

Single Sniffer Channel Selection

Algorithms Multiple sniffers without communication Different sniffer will access to different channel at the same time, and they will go through all channels in a round-robin fashion Efficiency is quite low, and might need a central controller

Multiple Sniffers without Communications

Multiple Sniffers With Communication Algorithm using virtual channels The channel elimination process is the same as the SME algorithm, but they will broadcast their results to other sniffers Based on their communication, different sniffers will stay at ‘virtual channels’ to avoid interferences with other sniffers

Multiple Sniffers With Communication Auction based algorithm The channel will be allocated to the bidder (sniffer) with highest ‘price’, and they will communicate their price with each other Prices are chosen according to sniffers’ previous monitoring results, they keep communicating until all channels have been allocated

Multiple Sniffers with Communications

Fully Distributed Algorithms We modify the multiple elimination algorithm and virtual channel algorithm to make them work for fully distributed scenario, in which sniffers are not allowed to communicate with each other Interferences among sniffers are taken into consideration, and we calculate the collision rate of both algorithms

Experiment In our experiment, we assume that each channel’s reward is associated with an i.i.d. Bernoulli distribution We compare our single sniffer algorithm with another famous exploration bandit algorithm, namely SAR algorithm We use regret to evaluate algorithms, which is defined as the difference between true means of optimal M channels and that of channel chosen by the algorithms

Experiment Regret comparison for single sniffer Communication cost for each sniffer

Experiment Multiple sniffers with communication Multiple sniffers without communication

Experiment Compared with SAR, our single sniffer algorithm improves the accuracy and efficiency for more than one hundred times Compared with the algorithm using virtual channel, auction based algorithm improves the accuracy of channel selection for more than 30%, but has much higher communication cost In fully distributed setting, two algorithm have roughly the same performance

Conclusion By modelling channel selection problem in wireless monitoring as an exploration bandit problem, we studied both single sniffer and multiple sniffer monitoring scenarios A few single or distributed exploration bandit algorithms are proposed in our paper for different practical scenarios Both theoretical analysis and simulation results show that our algorithms have excellent performances in different scenarios of channel selection in wireless monitoring

Q&A