This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

A Novel Content Caching and Delivery Scheme for Millimeter Wave Device-to-Device Communications

Theshani Nuradha1, Tharaka Samarasinghe12, Kasun T. Hemachandra1 This work is supported by the Senate Research Council, University of Moratuwa, Sri Lanka, under grant SRC/LT/2018/2. Email: theshanin@uom.lk, tharakas@uom.lk, kasunh@uom.lk 1Department of Electronic and Telecommunication Engineering, University of Moratuwa, Moratuwa, Sri Lanka
2Department of Electrical and Electronic Engineering, University of Melbourne, Victoria, Australia
Abstract

A novel content caching strategy is proposed for a cache enabled device-to-device (D2D) network where the user devices are allowed to communicate using millimeter wave (mmWave) D2D links (>> 6 GHz) as well as conventional sub 6 GHz cellular links. The proposed content placement strategy maximizes the successful content delivery probability of a line of sight D2D link. Furthermore, a heuristic algorithm is proposed for efficient content delivery. The overall scheme improves the successful traffic offloading gain of the network compared to conventional cache-hit maximizing content placement and delivery strategies. Significant energy efficiency improvements can also be achieved in ultra-dense networks.

Index Terms:
content caching, device-to-device communications, millimeter wave, ultra-dense networks

I Introduction

Small cells and device-to-device (D2D) communications are envisioned to be promising technologies for enhancing the quality of service (QoS), throughput and energy efficiency of next generation wireless networks [1, 2]. Due to scarcity in existing cellular spectrum, millimeter wave (mmWave) frequencies have been considered as an enabling technology for high speed D2D communications. In D2D aided cellular networks, the successful establishment of D2D connections depends on the availability of popular files in proximity devices. Therefore, content placement in user devices is of paramount importance for D2D based traffic offloading. This paper presents a novel content caching strategy for a cache enabled D2D network, where the user devices are allowed to communicate using mmWave D2D links as well as conventional sub 6 GHz cellular links.

Cache placement schemes based on cache hit probability maximization [3], and cache aided throughput maximization [4], can be found in the literature for conventional cellular networks. In these works, optimal caching probabilities are obtained such that the achieved content diversity leads to better network performance. When it comes to mmWave networks, a D2D aware caching policy that splits the most popular content into two content groups, and randomly distributes the content groups among the users is proposed in [5]. The partitioning of the most popular content is performed based on fairness considerations, such that the two content groups have equal self cache hit probability in a user device. The content placement does not consider the characteristics of mmWave propagation and the effects of blockage when placing content. A cache hit probability maximization based optimal cache placement in a mmWave ad-hoc network is studied in [6]. The paper omits the effect of interference from other D2D links, which can be crucial factor on network performance.

In this paper, we consider a cloud radio access network (C-RAN) operating in the sub 6 GHz band, and supports D2D communications using mmWave spectrum. A content placement scheme is proposed for user device caching, considering the propagation characteristics of mmWave links and the interference from other D2D links, which makes it different to [5] and [6]. In addition, it also considers the popularity and application specific QoS constraints of different files, which makes it more applicable to next generation wireless networks, where QoS measures such as latency are considered to be key performance indicators. Thus, we maximize a different metric, referred to as the successful content reception probability, which is the probability of reception without violating the file specific QoS constraints. The main contributions of the paper are as follows:

  • A content placement scheme is proposed for user devices by solving an optimization problem, that maximizes the successful content delivery probability within the line of sight (LoS) region of a D2D transmitter. Optimal caching probabilities of a multitude of heterogeneous files, that have their own rate constraints for successful reception, are obtained.

  • The cache placement scheme is coupled with a user association scheme to further improve the offloading gain without violating QoS constraints.

  • The performance of the network in terms of successful delivery of content and offloading gain is evaluated both analytically and through simulations, to clearly highlight the gains of the proposed content placement and the user association schemes with respective to energy efficiency as well.

The overall scheme improves the successful traffic offloading gain of the network compared to conventional cache-hit maximizing content placement and delivery strategies. Significant energy efficiency improvements can also be achieved in ultra-dense networks.

The paper organization is as follows. Section II presents the system model and the problem formulation. The solution to the optimization problem which leads to the content placement strategy, and the user association scheme are presented in Section III. The performance of the proposed schemes are evaluated theoretically and numerically in Section IV and Section V, respectively. Section VI concludes the paper.

II System Model And Problem Formulation

II-A Topological Model

We consider a C-RAN, where the remote radio heads (RRHs) are spatially distributed according to a homogeneous Poisson point process (HPPP) ΦR\Phi_{R} with intensity λR\lambda_{R}. The RRHs are wirelessly connected to the edge cloud (fronthaul links) and the edge clouds are connected to the core network (backhaul links). The spatial distribution of the mobile user (MU) devices is modelled using an independent HPPP Φu\Phi_{u} with intensity λu\lambda_{u}. Content to a MU may either be delivered from a RRH through a cellular link that operates in the sub 6 GHz band (transmit power PcP_{c}, wavelength WcW_{c}, bandwidth BcB_{c}) or from another MU through a mmWave D2D link (transmit power PdP_{d}, wavelength WdW_{d}, bandwidth BdB_{d}). Content delivery through a D2D link will only be possible if the requested file is in the cache of another proximity MU. Each MU is capable of caching MdM_{d} files of equal size.

RRHs are equipped with omni-directional transmitting antennas while the MUs are equipped with omni-directional antennas for cellular communications and directional antennas for mmWave communications. Similar to [5], sectorized antenna pattern is adopted at the transmitters to approximate the antenna pattern for the mmWave links. It is assumed that the antennas of the transmitter and the receiver are perfectly aligned for desired links while the interfering transmitter antenna bore-sight is uniformly distributed over [0,2π][0,2\pi]. This means the probability distribution of the i.i.d. random antenna gain GG^{\prime} associated an interfering mmWave link is given by 𝖯𝗋{G=Gm2}=(Δθ2π)2,\mathsf{Pr}\left\{G^{\prime}=G_{m}^{2}\right\}=\left(\frac{\Delta\theta}{2\pi}\right)^{2}, 𝖯𝗋{G=Gs2}=(2πΔθ2π)2,\mathsf{Pr}\left\{G^{\prime}=G_{s}^{2}\right\}=\left(\frac{2\pi-\Delta\theta}{2\pi}\right)^{2}, and 𝖯𝗋{G=GmGs}=2Δθ(2πΔθ)(2π)2,\mathsf{Pr}\left\{G^{\prime}=G_{m}G_{s}\right\}=\frac{2\Delta\theta\left(2\pi-\Delta\theta\right)}{\left(2\pi\right)^{2}}, where GmG_{m} and GsG_{s} denote the main and side lobe gains, respectively, and Δθ\Delta\theta denotes the angle of deviation from the antenna bore-sight.

We refer to the MUs that request content as active MUs. At a given time, the probability of an MU being active is ρ\rho. The remaining MUs, which we refer to as inactive MUs, can serve as potential D2D transmitters. It is assumed that all RRHs are active at a given time. Without loss of generality, we consider a typical MU located at the origin for our analysis.

II-B Channel Model

For the cellular links that operate below 6 GHz, the simple path loss model with a path loss exponent αc\alpha_{c} is used to model the location dependent path loss. For mmWave links, the average LoS ball model is used [7, 8]. According to this model, a link is considered as a LoS link if the link is shorter than DLD_{L}. Otherwise, it is considered a non-line of sight (NLoS) link. The average size and the density of the blockages determine DLD_{L} [9]. For mmWave links, blockage effects induce different path loss exponents αL\alpha_{L} and αN\alpha_{N} for LoS and NLoS links, respectively, with αL<αN\alpha_{L}<\alpha_{N}. We assume fast Rayleigh fading where the fading power is exponentially distributed with unit mean [5]. The received signal-to-interference-plus-noise-ratio (SINR{\rm SINR}) when receiving file ii from the D2D transmitter located at xΦdx\in\Phi_{d} is given by

SINRd,i,x=Gm2hxrxαdN^+yΦd{x}hyGryαd,{\rm SINR}_{d,i,x}=\frac{G_{m}^{2}h_{x}r_{x}^{-\alpha_{d}}}{\hat{N}+\sum_{y\in\Phi_{d}\setminus\left\{{x}\right\}}h_{y}G^{\prime}r_{y}^{-\alpha_{d}}}, (1)

where Φd\Phi_{d}, hxh_{x} and rxr_{x} denote the point process of the active D2D transmitters, fading power and the distance between the MU and the D2D transmitter at xx, respectively, αd{αL,αN}\alpha_{d}\in\left\{\alpha_{L},\alpha_{N}\right\}, N^=16π2NoFNBdPdWd2\hat{N}=\frac{16\pi^{2}N_{o}F_{N}B_{d}}{P_{d}W_{d}^{2}}, NoN_{o} is the noise power spectral density and FNF_{N} is the noise figure of the receiver. Similarly, an expression for the received SINR{\rm SINR} when receiving file ii through a cellular link from the RRH xΦRx\in\Phi_{R}, which we denote by SINRc,i,x{\rm SINR}_{c,i,x}, can be obtained by replacing subscript dd in (1) with subscript cc and by replacing both antenna gains Gm2G_{m}^{2} and GG^{\prime} by GTGRG_{T}G_{R}, where GTG_{T} and GRG_{R} are the antenna gains of the transmitting RRH and the receiving MU, respectively.

II-C Content Placement

We assume that MUs request content from a finite content library of NN files of equal size, and the file requests follow a Zipf distribution of popularity exponent ϵ\epsilon. Thus, the probability of requesting the ii-th most popular file is given by

βi=iϵj=1Njϵ.\beta_{i}=\frac{i^{-\epsilon}}{\sum_{j=1}^{N}j^{-\epsilon}}.

The rate and the delay constraints of the files may vary with the file type and the associated application. The rate constraint for the ii-th most popular file is denoted by RiR_{i}, and this constraint necessitates an SINR{\rm SINR} greater than Ti=2RiB1,T_{i}=2^{\frac{R_{i}}{B}}-1, for a link having a bandwidth of BB\in {Bd,Bc}\left\{B_{d},B_{c}\right\}.

Due to the limited storage capacity of the MUs, the propagation characteristics of mmWaves, and the rate requirements of different files, caching content at MUs should be done in an efficient manner. In this paper, we focus on designing a content placement scheme that offloads the traffic to the D2D devices without violating the rate (QoS) constraints, which are considered to be crucial in next generation networks. Moreover, considering the effects of blockage, it is preferred to have LoS D2D links. Thus, we focus on the successful LoS reception probability (SLP{\rm SLP}) for the ii-th most popular file, which we define as

SLPi=𝖯𝗋{SINRd,i,x^Tirx^DL},{\rm SLP}_{i}=\mathsf{Pr}\left\{{\rm SINR}_{d,i,\hat{x}}\geq T_{i}\cap r_{\hat{x}}\leq D_{L}\right\}, (2)

where x^\hat{x} denotes the location of the closest D2D transmitter who has the ii-th file in its cache. The SLP{\rm SLP} depicts the probability of receiving content from the nearest LoS D2D transmitter without violating the rate threshold.

Let the probability of the ii-th file being stored in the cache of an MU be qiq_{i}. We define 𝒒\boldsymbol{q}, an NN-dimensional caching probability vector 𝒒=[q1,..,qN]\boldsymbol{q}=[q_{1},..,q_{N}], which denotes the probabilities of an MU caching the NN files in the content library. We focus on finding 𝒒\boldsymbol{q} that maximizes the average successful LoS reception probability (ASLP{\rm ASLP}), defined as

ASLP(𝒒)=i=1NβiSLPi,{\rm ASLP}(\boldsymbol{q})=\sum_{i=1}^{N}\beta_{i}{\rm SLP}_{i},

where the SLPi{\rm SLP}_{i} values are averaged over the request probabilities, while not violating the MU storage constraints statistically (on average). Note that our objective function captures both popularity and the QoS requirements of different content, and also the effects of wireless propagation. The optimization problem can be formulated as

maximize𝒒\displaystyle\underset{\boldsymbol{q}}{\text{maximize}} ASLP(𝒒)=i=1NβiSLPi\displaystyle{\rm ASLP}(\boldsymbol{q})=\sum_{i=1}^{N}\beta_{i}{\rm SLP}_{i} (3)
subject to 0qi1,i=1,,N,\displaystyle 0\leq q_{i}\leq 1,\;i=1,\ldots,N,
i=1NqiMd.\displaystyle\sum_{i=1}^{N}q_{i}\leq M_{d}.

III System Design

III-A Successful LoS Reception Probability

An expression for SLPi{\rm SLP}_{i} can be obtained using fundamentals of stochastic geometry [10]. That is, from (2),

SLPi=𝖯𝗋{hx^>Tirx^αL(I^+N^)rx^DL}𝖯𝗋{rx^DL}=0DLLI^(TixαL)eN^TixαLfrx^(x)𝑑x,\begin{split}{\rm SLP}_{i}&=\mathsf{Pr}\left\{h_{\hat{x}}>T_{i}r_{\hat{x}}^{\alpha_{L}}\left(\hat{I}+\hat{N}\right)\mid r_{\hat{x}}\leq D_{L}\right\}\mathsf{Pr}\left\{r_{\hat{x}}\leq D_{L}\right\}\\ &=\int_{0}^{D_{L}}L_{\hat{I}}\left(T_{i}x^{\alpha_{L}}\right){\rm e}^{-\hat{N}T_{i}x^{\alpha_{L}}}f_{r_{\hat{x}}}(x)\ dx,\end{split}

where I^=yΦd{x^}hyGryαd\hat{I}=\sum_{y\in\Phi_{d}\setminus\left\{{\hat{x}}\right\}}h_{y}G^{\prime}r_{y}^{-\alpha_{d}} and LI^(S)L_{\hat{I}}\left(S\right) is the Laplace transform of the interference from mmWave D2D links. The Laplace transform of the D2D interference is given by

LI^(S)=𝖤[yΦd{x^}𝖤G,hy[eGhyryαdSGm2]]=(a)exp(ρλupd02π0(1𝖤G,hy[eGhyzαdSGm2])z𝑑z𝑑ϕ)=(b)exp[2πρλupd𝖤G[0DL(1Gm21+GzαLS)zdz+DL(1Gm21+GzαNS)zdz]],\begin{split}&L_{\hat{I}}\left(S\right)=\mathsf{E}\left[\prod_{y\in\Phi_{d}\setminus\{\hat{x}\}}\mathsf{E}_{G^{{}^{\prime}},h_{y}}\left[{\rm e}^{-\frac{G^{\prime}h_{y}r_{y}^{-\alpha_{d}}S}{G_{m}^{2}}}\right]\right]\\ &\stackrel{{\scriptstyle\text{(a)}}}{{=}}\exp\hskip-2.84544pt\left(\hskip-2.84544pt-\rho\lambda_{u}p_{d}\int_{0}^{2\pi}\hskip-7.11317pt\int_{0}^{\infty}\hskip-5.97527pt\left(1-\mathsf{E}_{G^{{}^{\prime}},h_{y}}\left[e^{-\frac{G^{\prime}h_{y}z^{-\alpha_{d}}S}{G_{m}^{2}}}\right]\right)\hskip-2.84544ptzdzd\phi\right)\\ &\stackrel{{\scriptstyle\text{(b)}}}{{=}}\exp\left[-2\pi\rho\lambda_{u}p_{d}\mathsf{E}_{G^{\prime}}\left[\int_{0}^{D_{L}}\left(1-\frac{G_{m}^{2}}{1+G^{\prime}z^{-\alpha_{L}}S}\right)zdz\right.\right.\\ &\left.\left.+\int_{D_{L}}^{\infty}\left(1-\frac{G_{m}^{2}}{1+G^{\prime}z^{-\alpha_{N}}S}\right)zdz\right]\right],\end{split}

where (a) follows from the probability generating functional (PGFL) of the PPP, pdp_{d} is the probability of receiving the requested content via a D2D link, which has to be separately calculated, as shown later Section IV, and the expectation in (b) can be evaluated by using the PDF of GG^{\prime} given in Section II, which would result in a product of three exponential functions.

It is not hard to see that the resulting expression, which has multiple integrals, makes it prohibitively hard for us to use it in a meaningful manner in the optimization problem. We have an NN-dimensional non-convex constrained optimization problem, and even obtaining the optimum solution numerically is not trivial. Hence, we make few approximations to obtain a mathematically tractable expression for SLPi{\rm SLP}_{i}, i.e., we obtain a convex approximation of the objective function such that we can solve the optimization problem in closed form. We note that these approximations are made only to design the content placement policy, and all assumptions are relaxed in the remainder of the paper, which includes the performance evaluation and the numerical evaluations in Sections IV and V, respectively.

Firstly, we neglect small-scale fading with regards to mmWave propagation since it causes only minor changes in received power when the transmitter is within the LoS region [11, 12]. Secondly, we consider the worst case of D2D interference where all the user requests are catered by D2D transmitters, and approximate the random interference using the average worst case interference. To overcome the singularity when computing the D2D interference averaged only over the large-scale fading, we use the bounded path loss model g(r)=min(1,rαd)g(r)=\min\left(1,r^{-\alpha_{d}}\right) to model the path loss from the interferers, similar to [13]. With these approximations, and by using Campbell’s theorem, the average interference can be written as

I¯=𝖤[yΦd{x}Gmin(1,ryαd)]=λuρ4π(GmΔθ+Gs(2πΔθ))2×(αL2DL2αLαL2+2DL2αNαN2).\bar{I}=\mathsf{E}\left[\sum_{y\in\Phi_{d}\setminus\left\{x\right\}}G^{\prime}\min\left(1,r_{y}^{-\alpha_{d}}\right)\right]\\ \hskip-71.13188pt=\frac{\lambda_{u}\rho}{4\pi}\left(G_{m}\Delta\theta+G_{s}\left(2\pi-\Delta\theta\right)\right)^{2}\\ \times\left(\frac{\alpha_{L}-2D_{L}^{2-\alpha_{L}}}{\alpha_{L}-2}+\frac{2D_{L}^{2-\alpha_{N}}}{\alpha_{N}-2}\right).

From (2), and by considering the maximum search discovery distance to initiate a D2D communication link to be DRD_{R}, we have

SLPi=𝖯𝗋{rx^min(D^i,DL,DR)},{\rm SLP}_{i}=\mathsf{Pr}\left\{r_{\hat{x}}\leq\min\left(\hat{D}_{i},D_{L},D_{R}\right)\right\},

where

D^i=[Gm2TiI¯+TiN^]αL.\hat{D}_{i}=\left[\frac{G_{m}^{2}}{T_{i}\bar{I}+T_{i}\hat{N}}\right]^{\alpha_{L}}.

On the assumption that the transmitters having the ii-th content stored in their cache form a PPP of intensity λu(1ρ)qi\lambda_{u}\left(1-\rho\right)q_{i}, and by using the distribution of the distance to the nearest MU in a PPP, we have

SLPi=1exp(πλu(1ρ)qiDi,c2),{\rm SLP}_{i}=1-\exp\left(-\pi\lambda_{u}(1-\rho)q_{i}D_{i,c}^{2}\right), (4)

where Di,c=min{D^i,DL,DR}D_{i,c}=\min\left\{\hat{D}_{i},D_{L},D_{R}\right\}.

III-B Optimum Content Placement

Once the approximations are applied, it is straightforward to see that the optimization problem becomes convex. The Lagrangian can be written as

(𝒒,μ)=1+i=1Nβiexp(πλu(1ρ)qiDi,c2)+μ(i=1NqiMd),\mathcal{L}(\boldsymbol{q},\mu)=-1+\sum_{i=1}^{N}\beta_{i}\exp\left(-\pi\lambda_{u}(1-\rho)q_{i}D_{i,c}^{2}\right)\\ +\mu\left(\sum_{i=1}^{N}q_{i}-M_{d}\right),

where μ\mu is the non-negative Lagrangian multiplier. By applying Karush-Kuhn-Tucker (KKT) conditions, we have

qi(μ)=ln[μ/(βiπλu(1ρ)Di,c2)][λu(1ρ)Di,c2],q_{i}(\mu)=-\frac{\ln\left[\mu/\left(\beta_{i}\pi\lambda_{u}(1-\rho)D_{i,c}^{2}\right)\right]}{\left[\lambda_{u}(1-\rho)D_{i,c}^{2}\right]},

and according to the first inequality constraint, the optimum qiq_{i} should satisfy qi=min{max{qi(μ),0},1},q_{i}^{\star}=\min\left\{\max\left\{q_{i}(\mu^{\star}),0\right\},1\right\}, and according to the second constraint, which is met with equality, gives us i=1Nmin{max{qi(μ),0},1}=Md.\sum_{i=1}^{N}\min\left\{\max\left\{q_{i}(\mu^{\star}),0\right\},1\right\}=M_{d}. This can be used to find μ\mu^{\star} through a simple root finding algorithm such as bisection search[3, 4].

III-C User Association

In a hybrid (multi-tier) wireless network, it is important to associate users with the appropriate tiers to achieve traffic offloading while maintaining QoS constraints. In our system model, an MU may receive content via a LoS D2D link, a NLoS D2D link or a cellular link. Therefore, it is important to recognize the appropriate method of content delivery. From (4), one can see that an MU can successfully receive the ii-th file from a D2D transmitter in the LoS region if the distance to the D2D transmitter is less than Di,cD_{i,c}. However, we have assumed the worst case D2D interference when obtaining Di,cD_{i,c}. This means, it may be possible to increase this threshold further without violating the rate constraints, which will facilitate more offloading. Since 𝒒\boldsymbol{q} is now defined, the probability of receiving the requested content from a D2D transmitter within the LoS region can be calculated as γ=i=1Nβi(1qi)(1exp(πλu(1ρ)qiDL2)),\gamma=\sum_{i=1}^{N}\beta_{i}\left(1-q_{i}^{\star}\right)\left(1-\exp{\left(-\pi\lambda_{u}(1-\rho)q_{i}^{\star}D_{L}^{2}\right)}\right), where we have used the fact that the D2D mode initiates when the required content is not found in self-cache. We can use γ\gamma to scale the worst-case average interference to have a tighter approximation of the interference from the active D2D transmitters. Hence, assuming that the interference is dominated by the D2D transmitters in the LoS region, we can obtain an updated distance threshold value that satisfies the QoS requirement as

D^i,L=[Gm2TiγI¯+TiN^]1/αL.\hat{D}_{i,L}=\left[\frac{G_{m}^{2}}{T_{i}\gamma\bar{I}+T_{i}\hat{N}}\right]^{1/\alpha_{L}}.

By replacing subscript LL with NN, we can obtain a similar distance threshold D^i,N\hat{D}_{i,N} for a transmitter in the NLoS region.

The proposed user association scheme can be summarized as follows. For the ii-th file, the MU first checks its own cache. If not found, it checks with D2D transmitters who are closer than

Di,u=min{D^i,L,max{D^i,N,DL},DR},D_{i,u}=\min\left\{\hat{D}_{i,L},\max\left\{\hat{D}_{i,N},D_{L}\right\},D_{R}\right\},

for a D2D connection. If both actions fail, the MU connects to the nearest RRH through a cellular link. The process is summarized in Algorithm 1.

Algorithm 1 User Association Scheme
1:fiRequested filef_{i}\leftarrow\textnormal{Requested file}
2:ALcircular region with the radiusmin{D^i,L,DR}A_{L}\leftarrow\textnormal{circular region with the radius}\min\left\{\hat{D}_{i,L},D_{R}\right\}
3:ANcircular region with the radiusmin{D^i,N,DR}A_{N}\leftarrow\textnormal{circular region with the radius}\min\left\{\hat{D}_{i,N},D_{R}\right\}
4:if  fif_{i} in the device self cache  then
5:   Get file from self cache
6:else if D^i,LDL\hat{D}_{i,L}\leq D_{L} AND fif_{i} in ALA_{L} then
7:   Get file from the closest LoS D2D transmitter
8:else if D^i,N>DL\hat{D}_{i,N}>D_{L} AND fif_{i} in ANA_{N}  then
9:  Get File from the closest NLoS D2D transmitter
10:else
11:  if  fi in Edge cloudf_{i}\textnormal{ in Edge cloud}  then
12:    Get file from the edge cloud (fronthaul link)
13:  else
14:    Get file from the core network (backhaul link)
15:  end if
16:end if

The rationale behind the distance thresholds can be explained as follows. When D^i,L<DL\hat{D}_{i,L}<D_{L}, it is straightforward that the threshold is D^i,L\hat{D}_{i,L}, as any transmitter outside this (both LoS and NLoS) will not satisfy the rate constraints. When D^i,L>DL\hat{D}_{i,L}>D_{L}, we particularly focus on transmitters between DLD_{L} and D^i,L\hat{D}_{i,L}, who are NLoS according to the channel model. Whether these NLoS transmitters can transmit successfully or not will depend on the value of D^i,N\hat{D}_{i,N}. To this end, if D^i,N<DL\hat{D}_{i,N}<D_{L}, none of the NLoS transmitters will be able to transmit successfully. Thus, we set the threshold as DLD_{L}. However, when DLD^i,ND^i,LD_{L}\leq\hat{D}_{i,N}\leq\hat{D}_{i,L}, all NLoS transmitters between DLD_{L} and D^i,N\hat{D}_{i,N} will satisfy the rate constraints, thus we pick D^i,N\hat{D}_{i,N} as the threshold. Hence, overall, the distance threshold is given by max{D^i,N,DL}\max\left\{\hat{D}_{i,N},D_{L}\right\}. The user association policy tries to make use of candidate NLoS transmitters as well, to further facilitate offloading. Note that we will have D^i,L>D^i,N\hat{D}_{i,L}>\hat{D}_{i,N} for all meaningful link lengths as αN>αL\alpha_{N}>\alpha_{L}.

IV Performance Analysis

Having placed content, and have decided on the user association policy, a performance analysis of the network presented in Section II will be carried out in this section. Note that the assumptions made in Section III are relaxed in this analysis since the assumptions were made only to obtain a mathematically tractable objective function.

An offloading event occurs when a content request is served by self cache or via a D2D link. To this end, the probability of finding the required content in the device cache itself is given by ps=i=1Nβiqi.p_{s}=\sum_{i=1}^{N}\beta_{i}q_{i}^{\star}. The probability of receiving the requested content via a D2D link is given by

pd=i=1Nβi(1qi)(1exp(πλu(1ρ)qiDi,u2)).p_{d}=\sum_{i=1}^{N}\beta_{i}\left(1-q_{i}^{\star}\right)\left(1-\exp{\left(-\pi\lambda_{u}(1-\rho)q_{i}^{\star}D_{i,u}^{2}\right)}\right). (5)

Thus, pd+psp_{d}+p_{s} gives us the offloading probability.

We define the successful reception probability (SP{\rm SP}) as the probability of an MU receiving content without violating the rate constraints. The SP{\rm SP} through a D2D link is given by i=1Nβi(1qi)𝖯𝗋{SINRd,i,x^Tirx^Di,u},\sum_{i=1}^{N}\beta_{i}\left(1-q_{i}^{\star}\right)\mathsf{Pr}\left\{{\rm SINR}_{d,i,\hat{x}}\geq T_{i}\cap r_{\hat{x}}\leq D_{i,u}\right\}, and similarly, the SP{\rm SP} through the cellular network is given by i=1Nβi(1qi)eπλu(1ρ)qiDi,u2𝖯𝗋{SINRc,i,xTi}.\sum_{i=1}^{N}\beta_{i}\left(1-q_{i}^{\star}\right){\rm e}^{{-\pi\lambda_{u}(1-\rho)q_{i}^{\star}D_{i,u}^{2}}}\mathsf{Pr}\left\{{\rm SINR}_{c,i,x}\geq T_{i}\right\}. The sum of these two probabilities and psp_{s} gives us SP{\rm SP}.

An expression for 𝖯𝗋{SINRc,i,xTi}\mathsf{Pr}\left\{{\rm SINR}_{c,i,x}\geq T_{i}\right\} can be obtained using the fundamentals of stochastic geometry, by following a similar approach to the one shown in Section III. Considering the closest RRH to be located at xΦRx\in\Phi_{R},

𝖯𝗋{SINRc,i,xTi}=𝖯𝗋{hx>Tirxαc(I^c+N^c)}\begin{split}\mathsf{Pr}\left\{{\rm SINR}_{c,i,x}\geq T_{i}\right\}&=\mathsf{Pr}\left\{h_{x}>T_{i}r_{x}^{\alpha_{c}}\left(\hat{I}_{c}+\hat{N}_{c}\right)\right\}\end{split}
=0LI^c(Tizαc)eN^cTizαcfrx(z)𝑑z,=\int_{0}^{\infty}L_{\hat{I}_{c}}\left(T_{i}z^{\alpha_{c}}\right){\rm e}^{-\hat{N}_{c}T_{i}z^{\alpha_{c}}}f_{r_{x}}(z)\ dz,

where I^c=yΦR{x}hyryαc\hat{I}_{c}=\sum_{y\in\Phi_{R}\setminus\left\{x\right\}}h_{y}r_{y}^{-\alpha_{c}}, N^c=16π2NoFNBcGTGRPcWc2\hat{N}_{c}=\frac{16\pi^{2}N_{o}F_{N}B_{c}}{G_{T}G_{R}P_{c}W_{c}^{2}}, and frxf_{r_{x}} is the PDF of the distance to the nearest RRH, given by frx(z)=2πλRzeπλRz2f_{r_{x}}(z)=2\pi\lambda_{R}z{\rm e}^{-\pi\lambda_{R}z^{2}}, for z0z\geq 0. Furthermore, we have

LI^c(S)=𝖤[yΦR{x}𝖤hy[ehyryαcS]]=exp(2πλRx(111+vαcS)v𝑑v).\begin{split}L_{\hat{I}_{c}}\left(S\right)&=\mathsf{E}\left[\prod_{y\in\Phi_{R}\setminus\{x\}}\mathsf{E}_{h_{y}}\left[{\rm e}^{-h_{y}r_{y}^{-\alpha_{c}}S}\right]\right]\\ &=\exp\left(-2\pi\lambda_{R}\int_{x}^{\infty}\left(1-\frac{1}{1+v^{-\alpha_{c}}S}\right)vdv\ \right).\end{split}

An expression for 𝖯𝗋{SINRd,i,x^Tirx^Di,u}\mathsf{Pr}\left\{{\rm SINR}_{d,i,\hat{x}}\geq T_{i}\cap r_{\hat{x}}\leq D_{i,u}\right\} can be obtained along similar lines, and by appropriately changing the distance limits in the integration. To this end, we get

𝖯𝗋{SINRd,i,x^Tirx^Di,u}=0D1LI^(TizαL)eN^TizαL/Gm2frx^(z)𝑑z+DLD2LI^(TizαN)eN^TizαN/Gm2frx^(x)𝑑z\begin{split}&\mathsf{Pr}\left\{{\rm SINR}_{d,i,\hat{x}}\geq T_{i}\cap r_{\hat{x}}\leq D_{i,u}\right\}\\ &=\int_{0}^{D1}L_{\hat{I}}\left(T_{i}z^{\alpha_{L}}\right){\rm e}^{-\hat{N}T_{i}z^{\alpha_{L}}/G^{2}_{m}}f_{r_{\hat{x}}}(z)\ dz\ \\ &+\int_{D_{L}}^{D2}L_{\hat{I}}\left(T_{i}z^{\alpha_{N}}\right){\rm e}^{-\hat{N}T_{i}z^{\alpha_{N}}/G^{2}_{m}}f_{r_{\hat{x}}}(x)\ dz\,\end{split}

where frx^f_{r_{\hat{x}}} is the PDF of the distance to the nearest MU in a PPP of intensity λu(1ρ)qi\lambda_{u}\left(1-\rho\right)q_{i}^{\star}, D1=min{DL,D^i,L,DR}D1=\min\left\{D_{L},\hat{D}_{i,L},D_{R}\right\} and D2=max{DL,min(D^i,N,DR)}D2=\max\left\{D_{L},\min\left(\hat{D}_{i,N},D_{R}\right)\right\}. Moreover,

LI^(S)=exp(2πρλupd𝖤G[0(1Gm21+GSyα(y))y𝑑y]),L_{\hat{I}}\left(S\right)\hskip-2.84544pt=\exp\hskip-2.84544pt\left(\hskip-2.84544pt-2\pi\rho\lambda_{u}p_{d}\mathsf{E}_{G^{\prime}}\hskip-2.84544pt\left[\int_{0}^{\infty}\hskip-5.69046pt\left(\hskip-2.84544pt{1\hskip-2.84544pt-\hskip-2.84544pt\frac{G_{m}^{2}}{1+G^{\prime}Sy^{-\alpha(y)}}}\hskip-2.84544pt\right)ydy\right]\right),

where α(y)=[1(1αL)𝟣{yDL}][1(1αN)𝟣{y>DL}],\alpha(y)=\hskip-2.84526pt\left[1-\hskip-2.84526pt\left(1-\alpha_{L}\right)\mathsf{1}_{\left\{y\leq D_{L}\right\}}\right]\hskip-2.84526pt\left[1-\hskip-2.84526pt\left(1-\alpha_{N}\right)\mathsf{1}_{\left\{y>D_{L}\right\}}\right], the expectation can be straightforwardly evaluated using the PDF of GG^{\prime} given in Section III, and pdp_{d} is given by (5).

V Numerical Results and Discussions

In this section, the performance of the proposed scheme is evaluated using simulations. The simulation parameters are set to align with previous works [5, 12, 3, 9] and presented in Table I. We consider Ri=RR_{i}=R \forall i{1,,N}i\in\{1,\ldots,N\} for simplicity.

TABLE I: Simulation Parameters
RRH density λR\lambda_{R} 10/km210/\textnormal{km}^{2}
User requesting probability ρ\rho 0.5
Path loss exponent (fcf_{c} = 1 GHz) αc\alpha_{c} 2.5
Path loss exponent (fcf_{c} = 28 GHz) αL\alpha_{L} ,αN\alpha_{N} 2.1, 4
Transmit power of a RRH PcP_{c} 100 mW
Power consumption for backhaul PbP_{b} 1 W
Transmit power of a user device PdP_{d} 2 mW
Main lobe gain of the user antenna GmG_{m} 9dB
Side lobe gain of the user antenna GsG_{s} -9dB
Noise power density NoN_{o} -178 dB/Hz
Noise figure FNF_{N} 10 dB
Content Library size NN 100
Edge cloud cache capacity MeM_{e} 50
Device cache capacity MdM_{d} 2
Bandwidth in cellular link BcB_{c} 20 MHz
Bandwidth in mmWave link BdB_{d} 1 GHz
Maximum search discovery distance of a device DRD_{R} 150 m

We compare the performance of the proposed system (S-1) with the system proposed in [3] (S-2), where the content is placed to maximize the cache hit probability and the content delivery is based on D2D links within a radius of DRD_{R}, which is the maximum discovery distance of an MU.

Refer to caption
Figure 1: The behavior of the overall SP{\rm SP} of the system with λu\lambda_{u} for different [DLD_{L},R,ϵ]\epsilon] combinations.

Fig. 1 compares the SP{\rm SP} performance of the overall systems, and S-1 outperforms S-2 in all considered scenarios. When DLD_{L} decreases (blockage density increases), the SP{\rm SP} reduces in both systems. However, we can observe the performance gap between S-1 and S-2 increasing. Since S-1 has prioritized the LoS region for both content placement and delivery, it is more robust to changes in DLD_{L}. On the other hand, S-2, that has focused on DRD_{R} (which is generally larger than DLD_{L}), may encounter frequent unsuccessful D2D transmissions when the blockage density increases. When both rate constraints and DLD_{L} reduce, the SP{\rm SP} of S-2 decreases with λu\lambda_{u}. This is due to the increased interference from D2D links and the QoS requirements not being satisfied with S-2. However, since S-1 considers the effect of interference in both the content placement and delivery (user association), the SP{\rm SP} increases with λu\lambda_{u}, making S-1 a promising approach for future ultra-dense networks. When ϵ\epsilon is reduced while keeping the other parameters fixed, the overall success of both the systems reduce. The reduction in ϵ\epsilon leads to the content requests spreading out over a large range of files, which in fact reduces the probability of successfully receiving a file over a D2D link. Since both systems have averaged the objective functions over all possible files, a similar trend is observed for all values of ϵ\epsilon.

Refer to caption
Figure 2: Offloading and the successful offloading probabilities of the D2D network for 1 Gbps data rate, where ϵ=1.2\epsilon=1.2.

Fig. 2 compares the offloading probability (OPd\rm{OP}_{d}) of the two systems. S-2 having a higher offloading probability is rather obvious since considering DRD_{R} leads to a larger offloading region with S-2. However, the figure also conveys that a considerable portion of the offloaded traffic in S-2 will not be successfully delivered, and hence, the successful offloading probability (SOPd\rm{SOP}_{d}) of S-2 is lower than S-1. When DLD_{L} reduces, the unsuccessful offloading of S-2 increases, but in S-1, the gap between the two offloading probabilities remains low as it is more robust to changes in DLD_{L}, as described with respect to Fig. 1.

Refer to caption
Figure 3: The Energy Efficiency of the D2D link with λu\lambda_{u} for different [DLD_{L},R,ϵ]\epsilon] combinations.

Energy efficiency (EE) can be computed by the ratio between the average throughput from successful transmissions and the average power consumption, per user request. Some insights on the EE of the two systems can be inferred from Fig. 2. When λu\lambda_{u} increases, the probability of initiating a D2D link increases in both schemes. This leads to the average throughput from successful transmissions increasing, and the average power consumption decreasing. However, the average throughput from successful transmissions of S-1 increases at a higher rate with λu\lambda_{u} compared to S-2. On the other hand, the average power consumption of S-2 decreases at a higher rate with λu\lambda_{u} compared to S-1 due to the higher offloading. Therefore, the overall EE of the two systems are almost similar. However, one can identify that the EE of D2D links is significantly higher for S-1, compared to S-2, which is illustrated in Fig. 3. This is due to the unsuccessful D2D transmissions in S-2 resulting in device energy wastage. When λu\lambda_{u} is varied from 200 to 1400 /km2\textnormal{km}^{2}, for DL=75D_{L}=75m and ϵ=1.2\epsilon=1.2, on average, a 1.3 fold improvement in terms of EE is observed with S-1 compared to S-2. This improves significantly when DLD_{L} is further reduced. For example, on average, a 3.5 fold improvement can be observed at DL=50D_{L}=50m. This depicts the superior performance of S-1 in ultra-dense networks with high blockage.

VI Conclusions

The performance of a cache enabled D2D network, where D2D communications occur exclusively in the mmWave band, has been studied using a stochastic geometric framework. As a result, a novel content caching scheme in user devices to maximize the successful content delivery probability of LoS D2D links has been introduced. The performance gains of the proposed content placement and delivery schemes have been highlighted through simulations. The numerical results have shown that the proposed scheme achieves higher successful content offloading, improved energy efficiency while satisfying QoS requirements of the users, and superior performance in ultra-dense networks with high blockage.

References

  • [1] F. Jameel, Z. Hamid, F. Jabeen, S. Zeadally, and M. A. Javed, “A survey of device-to-device communications: Research issues and challenges,” IEEE Commun. Surv. Tut., vol. 20, pp. 2133–2168, Apr. 2018.
  • [2] R. I. Ansari, C. Chrysostomou, S. A. Hassan, M. Guizani, S. Mumtaz, J. Rodriguez, and J. J. P. C. Rodrigues, “5G D2D networks: Techniques, challenges, and future prospects,” IEEE Syst. J., vol. 12, pp. 3970–3984, Dec. 2018.
  • [3] Z. Chen and M. Kountouris, “D2D caching vs. small cell caching: Where to cache content in a wireless network?,” in Proc. IEEE International Workshop on Signal Processing Advances in Wireless Communications, pp. 1–6, Jul. 2016.
  • [4] Z. Chen, N. Pappas, and M. Kountouris, “Probabilistic caching in wireless D2D networks: Cache hit optimal versus throughput optimal,” IEEE Commun. Letters, vol. 21, pp. 584–587, Mar. 2017.
  • [5] N. Giatsoglou, K. Ntontin, E. Kartsakli, A. Antonopoulos, and C. Verikoukis, “D2D-aware device caching in mmWave-cellular networks,” IEEE J. Sel. Areas Commun., vol. 35, pp. 2025–2037, Sep. 2017.
  • [6] S. Vuppala, T. X. Vu, S. Gautam, S. Chatzinotas, and B. Ottersten, “Cache-aided millimeter wave ad-hoc networks,” in Proc. IEEE Wireless Communications and Networking Conference, pp. 1–6, Apr. 2018.
  • [7] T. Bai and R. W. Heath, “Coverage and rate analysis for millimeter-wave cellular networks,” IEEE Trans. Wireless Commun., vol. 14, pp. 1100–1114, Feb. 2015.
  • [8] Y. Zhu, L. Wang, K. Wong, and R. W. Heath, “Secure communications in millimeter wave ad hoc networks,” IEEE Trans. Wireless Commun., vol. 16, pp. 3205–3217, May 2017.
  • [9] J. G. Andrews, T. Bai, M. N. Kulkarni, A. Alkhateeb, A. K. Gupta, and R. W. Heath, “Modeling and analyzing millimeter wave cellular systems,” IEEE Trans. Commun., vol. 65, pp. 403–430, Jan. 2017.
  • [10] M. Haenggi, J. G. Andrews, F. Baccelli, O. Dousse, and M. Franceschetti, “Stochastic geometry and random graphs for the analysis and design of wireless networks,” IEEE J. Sel. Areas Commun., vol. 27, pp. 1029–1046, Sep. 2009.
  • [11] F. Wang, H. Wang, H. Feng, and X. Xu, “A hybrid communication model of millimeter wave and microwave in D2D network,” in Proc. IEEE Vehicular Technology Conference, pp. 1–5, May 2016.
  • [12] Y. Zhu, G. Zheng, L. Wang, K. Wong, and L. Zhao, “Performance analysis and optimization of cache-enabled small cell networks,” in Proc. IEEE Global Telecommunications Conference, pp. 1–6, Dec. 2017.
  • [13] N. Deng, M. Haenggi, and Y. Sun, “Millimeter-wave device-to-device networks with heterogeneous antenna arrays,” IEEE Trans. Commun., vol. 66, pp. 4271–4285, Sep. 2018.