Page 37 - ITU Journal Future and evolving technologies – Volume 2 (2021), Issue 2
P. 37

ITU Journal on Future and Evolving Technologies, Volume 2 (2021), Issue 2




          At  irst, we are reminded of the previously proposed  In the model network, all users are moving according to
          Distance Based Clustering Algorithm (DBCA) and Hier‑  the Random Direction Mobility Model (RDMM) [45]. In
          archical Caching Algorithm (HCA) [34, 44]. DBCA aims  RDMM users move towards a random direction with a
          to form maximal cliques and boost cooperation among  random speed until they reach the boundary of the area.
          Helper Users (HUs). Moreover, HCA provides effective  At the edge of the boundary users bounce back to the area
          usage of users’ limited cache capacity and maximizes  and keep moving until the end of the simulation. Since re‑
          the network’s average of loading. Furthermore, we pro‑  alizing the cell borders are unlikely, bouncing users can
          pose Advertisement Based (ABD2D) and Discovery Based  be interpreted as newcomers to the cell. Fig. 1 illustrates
          (DBD2D) D2D user/ content discovery procedures to    the system model.
          complement the DBCA and HCA. These schemes aim to
          advertise cached content by the clusters and discovery of
          cached content by Ordinary Users (OUs), respectively.
          A model network comprises mobile cellular users where
          some of them (HUs) are cache enabled and able to cre‑
          ate clusters in order to make cache placement and con‑
          tent discovery more ef icient, in terms of of loading and
          control messaging overhead. Clustering and cache place‑
          ment algorithms are applied consecutively before the pro‑
          posed advertisement and discovery procedures. This is
          the  irst work that addresses the D2D‑based distributed
                                                                          Fig. 1 – Illustration of Network Topology
          cache placement and content delivery along with the crit‑
          ical components of device discovery and content adver‑  Content set 1, 2, ...,    is bounded and HUs have limited
          tisement. We have implemented an LTE‑based simulation  cache capacity (   ) which necessitates an excogitated
                                                                                 
          setup and analyzed the performance of proposed proce‑  cache placement approach. Each content is assumed to
          dures in terms of average of loading and messaging over‑  be of equal size. Content popularity among users are uni‑
          head against a varying number of Discovery Resource  form, Zipf distributed at each user and assumed to be
          Blocks (RBs), Helper Users(HUs), Ordinary Users (OUs)  known by all users in the network. According to the Zipf’s
          and Signal to Interference Noise Ratio (SINR) threshold.  Law, out of a content set with    elements popularity of
          Results are presented, discussed and highlighted in Sec‑  the content of rank    is de ined as [46];
          tion 7.
                                                                                             1
                                                                               (   ∶   ,   ) =               (1)
          2.  SYSTEM MODEL                                                               ∑     (  1    )
                                                                                             =1   
          We consider a simplex content delivery procedure be‑
          tween cellular users where HUs provide content to OUs
          upon request. A model network consists of a Base Station  Where  istheskewnessexponentoftheZipfdistribution.
          (BS) placedat thecenter ofacircularareaand all usersare  Bigger    reveals the domination of the most popular con‑
          randomly distributed. Users are categorized into three  tent, while on the other hand smaller    induce to a more
          groups:                                              uniform‑likely distribution.    is the size of the content
                                                               set and    is the rank of the content where    = 1 stands
            • Helper Users (HUs) are able to cache content and  for the most popular content of the set.
             provide them to the OUs via D2D links upon request.
             HUs are also able to form clusters with the help of  For successful content delivery, in addition to content
             the BS and manage intra‑cluster cache placement in  availability, some other conditions must be met. First
             a hierarchical structure.                         of all, users must meet the SINR threshold constraint to
                                                               exchange discovery/advertisement beacons. Since the
            • Isolated Helper Users (IHUs) have the same role  number of dedicated RBs for discovery and advertise‑
             and abilities as HUs but at a certain time slot they  ment procedures are limited and randomly selected by
             have not been able to join any cluster and thus stay  users, interference and collisions are inevitable. Without
             alone. IHUs cache and serve content individually.  exception, HUs and OUs, which are exposed to interfer‑
             Since all HUs are mobile, relative positions are time‑  ence, are unable to establish D2D links in an Awareness
             varying. Therefore, being isolated might be thought  Zone (AZ), cannot receive and transmit content in the De‑
             of as a transient state.                          livery Zone (DZ) and cannot make any contribution to of‑
                                                                loading sequentially. On the other hand, if discovery is
            • Ordinary Users (OUs) are not cache enabled and ac‑  successful, enough resources are assumed to exist and
             quire available content from HUs via D2D links. OUs  content transmission is assumed to be successful. LTE
             request desired content from BS if they cannot estab‑  physical layer and channel models [47] are adopted in the
             lish D2D links via the proposed procedures.       simulations.





                                             © International Telecommunication Union, 2021                    23
   32   33   34   35   36   37   38   39   40   41   42