File Download

There are no files associated with this item.

  • Find it @ UNIST can give you direct access to the published full text of this article. (UNISTARs only)
Related Researcher

임영빈

Im, Youngbin
Next-generation Networks and Systems Lab.
Read More

Views & Downloads

Detailed Information

Cited time in webofscience Cited time in scopus
Metadata Downloads

Optimal Network Protocol Selection for Competing Flows via Online Learning

Author(s)
Zhang, XiaoxiChen, SiqiZhang, YunfanIm, YoungbinGorlatova, MariaHa, SangtaeJoe-Wong, Carlee
Issued Date
2023-08
DOI
10.1109/tmc.2022.3162880
URI
https://scholarworks.unist.ac.kr/handle/201301/58858
Fulltext
https://ieeexplore.ieee.org/document/9755209
Citation
IEEE TRANSACTIONS ON MOBILE COMPUTING, v.22, no.8, pp.4822 - 4836
Abstract
Today's Internet must support applications with increasingly dynamic and heterogeneous connectivity requirements, such as video streaming and the Internet of Things. Yet current network management practices generally rely on pre-specified network configurations, which may not be able to cope with dynamic application needs. Moreover, even the best-specified policies will find it difficult to cover all possible scenarios, given applications' increasing heterogeneity and dynamic network conditions, e.g., on volatile wireless links. In this work, we instead propose a model-free learning approach to find the optimal network policies for current network flow requirements. This approach is attractive as comprehensive models do not exist for how different policy choices affect flow performance under changing network conditions. However, it can raise new challenges for online learning algorithms: policy configurations can affect the performance of multiple flows sharing the same network resources, and this performance coupling limits the scalability and optimality of existing online learning algorithms. In this work, we extend multi-armed bandit frameworks to propose new online learning algorithms for protocol selection with provably sublinear regret under certain conditions. We validate the optimality and scalability of our algorithms through data-driven simulations and testbed experiments.
Publisher
Institute of Electrical and Electronics Engineers
ISSN
1536-1233
Keyword (Author)
5G mobile communicationBandwidthHeuristic algorithmsMobile computingmulti-armed banditsNetwork protocol selectionNetwork topologyonline algorithmsonline learningProtocolsTopology

qrcode

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.