Intelligent Load Balancing and Resource Allocation in O-RAN: A Multi-Agent Multi-Armed Bandit Approach

被引:2
|
作者
Lai, Chia-Hsiang [1 ]
Shen, Li-Hsiang [2 ]
Feng, Kai-Ten [1 ]
机构
[1] Natl Yang Ming Chiao Tung Univ, Dept Elect & Elect Engn, Hsinchu, Taiwan
[2] Univ Calif Berkeley, Calif PATH, Berkeley, CA 94720 USA
关键词
O-RAN; load balancing; resource allocation; multi-agent; multi-armed bandit; MANAGEMENT;
D O I
10.1109/PIMRC56721.2023.10293795
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The open radio access network (O-RAN) architecture offers a cost-effective and scalable solution for internet service providers to optimize their networks using machine learning algorithms. The architecture's open interfaces enable network function virtualization, with the O-RAN serving as the primary communication device for users. However, the limited frequency resources and information explosion make it difficult to achieve an optimal network experience without effective traffic control or resource allocation. To address this, we consider mobility-aware load balancing to evenly distribute loads across the network, preventing network congestion and user outages caused by excessive load concentration on open radio unit (O-RU) governed by a single open distributed unit (O-DU). We have proposed a multi-agent multi-armed bandit for load balancing and resource allocation (mmLBRA) scheme, designed to both achieve load balancing and improve the effective sum-rate performance of the O-RAN network. We also present the mmLBRA-LB and mmLBRA-RA sub-schemes that can operate independently in non-realtime RAN intelligent controller (Non-RT RIC) and near-RT RIC, respectively, providing a solution with moderate loads and high-rate in O-RUs. Simulation results show that the proposed mmLBRA scheme significantly increases the effective network sum-rate while achieving better load balancing across O-RUs compared to rule-based and other existing heuristic methods in open literature.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Resource load balancing based on multi-agent in ServiceBSP model
    Jiang, Yan
    Tong, Weiqin
    Zhao, Wentao
    COMPUTATIONAL SCIENCE - ICCS 2007, PT 3, PROCEEDINGS, 2007, 4489 : 42 - +
  • [42] A Batched Multi-Armed Bandit Approach to News Headline Testing
    Mao, Yizhi
    Chen, Miao
    Wagle, Abhinav
    Pan, Junwei
    Natkovich, Michael
    Matheson, Don
    2018 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2018, : 1966 - 1973
  • [43] MABAT: A Multi-Armed Bandit Approach for Threat-Hunting
    Dekel, Liad
    Leybovich, Ilia
    Zilberman, Polina
    Puzis, Rami
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 477 - 490
  • [44] A Multi-Armed Bandit Approach to Wireless Information and Power Transfer
    Xing, Yuan
    Qian, Yuchen
    Dong, Liang
    IEEE COMMUNICATIONS LETTERS, 2020, 24 (04) : 886 - 889
  • [45] A multi-armed bandit approach for exploring partially observed networks
    Kaushalya Madhawa
    Tsuyoshi Murata
    Applied Network Science, 4
  • [46] A Bayesian Multi-armed Bandit Approach for Identifying Human Vulnerabilities
    Miehling, Erik
    Xiao, Baicen
    Poovendran, Radha
    Basar, Tamer
    DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2018, 2018, 11199 : 521 - 539
  • [47] Multi-Armed Bandit for Species Discovery: A Bayesian Nonparametric Approach
    Battiston, Marco
    Favaro, Stefano
    Teh, Yee Whye
    JOURNAL OF THE AMERICAN STATISTICAL ASSOCIATION, 2018, 113 (521) : 455 - 466
  • [48] A multi-armed bandit approach for exploring partially observed networks
    Madhawa, Kaushalya
    Murata, Tsuyoshi
    APPLIED NETWORK SCIENCE, 2019, 4 (01)
  • [49] Multi-Agent Multi-Armed Bandit Learning for Grant-Free Access in Ultra-Dense IoT Networks
    Raza, Muhammad Ahmad
    Abolhasan, Mehran
    Lipman, Justin
    Shariati, Negin
    Ni, Wei
    Jamalipour, Abbas
    IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2024, 10 (04) : 1356 - 1370
  • [50] A Multi-armed Bandit Approach to Online Spatial Task Assignment
    Hassan, Umair ul
    Curry, Edward
    2014 IEEE 11TH INTL CONF ON UBIQUITOUS INTELLIGENCE AND COMPUTING AND 2014 IEEE 11TH INTL CONF ON AUTONOMIC AND TRUSTED COMPUTING AND 2014 IEEE 14TH INTL CONF ON SCALABLE COMPUTING AND COMMUNICATIONS AND ITS ASSOCIATED WORKSHOPS, 2014, : 212 - 219