Towards Joint Learning of Optimal MAC Signaling and Wireless Channel Access Alvaro Valcarce, Senior Member, IEEE, and Jakob Hoydis, Senior Member, IEEE

Towards Joint Learning of Optimal MAC Signaling and Wireless Channel Access Alvaro Valcarce, Senior Member, IEEE, and Jakob Hoydis, Senior Member, IEEE

1 Towards Joint Learning of Optimal MAC Signaling and Wireless Channel Access Alvaro Valcarce, Senior Member, IEEE, and Jakob Hoydis, Senior Member, IEEE Abstract—Communication protocols are the languages MAC Protocol used by network nodes. Before a user equipment (UE) exchanges data with a base station (BS), it must first nego- Signaling tiate the conditions and parameters for that transmission. Channel Access This negotiation is supported by signaling messages at all Policy Vocabulary Policy layers of the protocol stack. Each year, the telecoms in- dustry defines and standardizes these messages, which are designed by humans during lengthy technical (and often political) debates. Following this standardization effort, the development phase begins, wherein the industry interprets Fig. 1. MAC protocol constituent parts. This paper trains UEs to and implements the resulting standards. But is this massive jointly learn the policies highlighted as dashed blocks. development undertaking the only way to implement a given protocol? We address the question of whether radios can learn a pre-given target protocol as an intermediate signaling (i.e., the structure of the protocol data step towards evolving their own. Furthermore, we train units (PDUs), the control procedures, etc) and the cellular radios to emerge a channel access policy that channel access policy (listen before talk (LBT), performs optimally under the constraints of the target FDMA, etc). These are the main building blocks protocol. We show that multi-agent reinforcement learning (MARL) and learning-to-communicate (L2C) techniques of a MAC protocol (see Fig 1) and their implemen- achieve this goal with gains over expert systems. Finally, tation ultimately defines the performance that users we provide insight into the transferability of these results will experience. The signaling defines what control to scenarios never seen during training. information is available to the radio nodes and when Index Terms—communication system signaling, learning it is available. In doing so, it constraints the actions systems, mobile communication that a channel access policy can take and puts an upper bound to its attainable performance. As wireless technologies evolve and new radio I. INTRODUCTION environments emerge (e.g., industrial IoT, beyond 6 URRENT medium access control (MAC) pro- GHz, etc), new protocols are needed. The optimal C tocols obey fixed rules given by industrial MAC protocol may not be strictly contention-based standards (e.g., [1]). These standards are designed or coordinated as shown in Table I. For instance, arXiv:2007.09948v3 [cs.IT] 27 Apr 2021 by humans with competing commercial interests. 5GNR supports grant-free scheduling by means of Despite the standardization process’ high costs, the a Configured Grant to support ultra reliable low la- ensuing protocols are often ambiguous and not tency communications (URLLC). But are this acces necessarily optimal for a given task. This ambiguity policy and its associated signaling jointly optimal? increases the costs of testing, validation and imple- We are interested in the question of which MAC mentation, specially in cross-vendor systems like protocol is optimal for a given use case and whether cellular networks. In this paper, we study if there it can be learned through experience. might be an alternative approach to MAC protocol implementation based on reinforcement learning. To implement a MAC protocol for a wireless A. Related work application, vendors must respect the standardized Current research on the problem of emerging MAC protocols with machine learning focuses A. Valcarce and J. Hoydis are with Nokia Bell-Labs France, Route de Villejust, 91620 Nozay, France. Email: {alvaro.valcarce_rial, mainly on new channel access policies. Within this jakob.hoydis}@nokia-bell-labs.com body of research, contention-based policies domi- 2 TABLE I CHANNEL ACCESS SCHEMES, MAC PROTOCOLS AND THE TECHNOLOGIES THAT USE THEM Channel Access Schemes frequency division multiple access (FDMA) TDMA Time-variant CDMA Spatial Time-invariant Non-OFDMA OFDMA Aloha Contention CSMA N.A. Cognitive Radio based Cognitive Radio GSM MAC FM/AM radio LTE 3G Satcoms protocols Coordinated Token Ring POTS DVB-T 5G New Radio (5GNR) GPS MIMO Bluetooth nate (see [2], [3], [4] or [5]), although work on B. Contribution coordinated protocols also exists (e.g., [6], [7], [8]). For the reasons mentioned above, we believe that Other approaches such as [9] propose learning to machine-learned MAC protocols have the potential enable/disable existing MAC features. to outperform their human-built counterparts in cer- Given a channel access scheme (e.g., time divi- tain scenarios. This idea has been recently used sion multiple access (TDMA)), [2] asks whether for emerging new digital modulations (see, e.g., an agent can learn a channel access policy in an [15]). Protocols built this way are freed from human environment where other agents use heterogeneous intuitions and may be able to optimize control-plane policies (e.g., q-ALOHA, etc). Whereas this is inter- traffic and channel access in yet unseen ways. esting, it solely focuses on contention-based access The first step towards this goal is to train an and it ignores the signaling needed to support it. intelligent software agent to learn an existing Instead, we focus on the more ambitious goal of MAC protocol. Our agents are trained tabula rasa jointly emerging a channel access policy and its with no previous knowledge or logic about the associated signaling. target protocol. We show that this is possible in a simplified wireless scenario with MARL, Dynamic spectrum sharing is a similar prob- self-play and tabular learning techniques, and lay lem, where high performance has recently been the groundwork for scaling this further with deep achieved (see [10], [11]) by subdividing the task learning. In addition, we measure the influence into the smaller sub-problems of channel selection, of signaling on the achievable channel access admission control and scheduling. However, these performance. Finally, we present results on the studies focus exclusively on maximizing channel- extension of the learned signaling and channel access efficiency under the constraints of a pre-given access policy to other scenarios. signaling. None focuses on jointly optimizing the control signaling and channel access policy. The rest of this paper is organized as follows. The field of Emergent Communication has been Section II formalizes the concepts of channel access, growing since 2016 [12]. Advances in deep learning protocol and signaling. It then formulates the joint have enabled the application of MARL to the study learning problem and defines the research target. of how languages emerge and to teaching natural Section III describes the multi-agent learning frame- languages to artificial agents (see [13] or [14]). Due work. Section IV illustrates the achieved perfor- to the multi-agent nature of cellular networks and to mance, provides an example of the learned signaling the control-plane/user-plane traffic separation, these and discusses the transferability of these results. A techniques generalize well to the development of final discussion is provided in section V. machine-type languages (i.e., signaling). In cellular II. PROBLEM DEFINITION systems, we interpret the MAC signaling as the language spoken by UEs and the BS to coordinate A. Definitions while pursuing the goal of delivering traffic across We distinguish the concepts of channel access a network. scheme and MAC protocol as follows: 3 Base Station UE user data MAC MAC . channel access Uplink policy . User plane Control plane signaling Downlink User plane signaling Control plane Fig. 3. Left: Venn diagram of all possible signaling messages M = ∗ M퐷! [M*! of size ¹;, <º bits. The set " of messages for the optimal signaling (∗, as well as the set " : of messages for the :Cℎ Fig. 2. MAC protocol abstraction with UL data traffic only. arbitrary signaling (: are also shown. Right: An optimum signaling (∗ and the :Cℎ arbitrary signaling (: within the abstract space S of all possible signaling (i.e., the signaling corpus). • Channel access scheme: Method used by mul- tiple radios to share a communication channel (e.g., a wireless medium). The channel access a channel access policy and the MAC signaling scheme is implemented and constrained by the needed to coordinate channel access with the BS. physical layer (PHY). Sample channel access The BS uses an expert MAC that is not learned. schemes are frequency division multiplexing Let S be the set of all possible MAC signaling (FDM), time division multiplexing (TDM), etc. that UEs and a BS may ever use to communicate • MAC protocol: Combination of a channel (see Fig. 3). We formalize a signaling as a vo- access policy and a signaling with which a cabulary with downlink (DL) and UL messages, channel access scheme is used. Sample channel plus mappings from observations to these messages. access policies are LBT, dynamic scheduling, Since different signalings are possible, let us denote etc. Signaling is the vocabulary and rules (i.e., the :Cℎ signaling (: 2 S as: signaling policy) used by radios to coordinate (: = »" : ," : , and is described by the PDU structure, the sub- 퐷! *! $퐵( " : , headers, etc. The channel access policy decides ! 퐷! (1) when to send data through the user-plane pipe, $*퐸 " : ! *!¼ and the signaling rules decide when to send " : " : what through the control-plane pipe (see Fig. where 퐷! ⊆ M퐷! and *! ⊆ M*! are the sets 2).

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    14 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us