Next Article in Journal
A New Algorithm for Medical Color Images Encryption Using Chaotic Systems
Next Article in Special Issue
On the Information Bottleneck Problems: Models, Connections, Applications and Information Theoretic Views
Previous Article in Journal
List-Decoding Capacity of the Gaussian Arbitrarily-Varying Channel
Previous Article in Special Issue
Robust Baseband Compression Against Congestion in Packet-Based Fronthaul Networks Using Multiple Description Coding
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Cross-Entropy Method for Content Placement and User Association in Cache-Enabled Coordinated Ultra-Dense Networks

1
Communication Engineering Research Centre, Harbin Institute of Technology (Shenzhen), HIT Campus of University Town of Shenzhen, Shenzhen 518055, China
2
Peng Cheng Laboratory, Shenzhen 518055, China
3
School of Electronic and Communication Engineering, Shenzhen Polytechnic, Shenzhen 518055, China
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Entropy 2019, 21(6), 576; https://doi.org/10.3390/e21060576
Submission received: 27 March 2019 / Revised: 31 May 2019 / Accepted: 1 June 2019 / Published: 8 June 2019
(This article belongs to the Special Issue Information Theory for Data Communications and Processing)

Abstract

:
Due to the high splitting-gain of dense small cells, Ultra-Dense Network (UDN) is regarded as a promising networking technology to achieve high data rate and low latency in 5G mobile communications. In UDNs, each User Equipment (UE) may receive signals from multiple Base Stations (BSs), which impose severe interference in the networks and in turn motivates the possibility of using Coordinated Multi-Point (CoMP) transmissions to further enhance network capacity. In CoMP-based Ultra-Dense Networks, a great challenge is to tradeoff between the gain of network throughput and the worsening backhaul latency. Caching popular files on BSs has been identified as a promising method to reduce the backhaul traffic load. In this paper, we investigated content placement strategies and user association algorithms for the proactive caching ultra dense networks. The problem has been formulated to maximize network throughput of cell edge UEs under the consideration of backhaul load, which is a constrained non-convex combinatorial optimization problem. To decrease the complexity, the problem is decomposed into two suboptimal problems. We first solved the content placement algorithm based on the cross-entropy (CE) method to minimize the backhaul load of the network. Then, a user association algorithm based on the CE method was employed to pursue larger network throughput of cell edge UEs. Simulation were conducted to validate the performance of the proposed cross-entropy based schemes in terms of network throughput and backhaul load. The simulation results show that the proposed cross-entropy based content placement scheme significantly outperform the conventional random and Most Popular Content placement schemes, with with 50% and 20% backhaul load decrease respectively. Furthermore, the proposed cross-entropy based user association scheme can achieve 30% and 23% throughput gain, compared with the conventional N-best, No-CoMP, and Threshold based user association schemes.

1. Introduction

Inspired by the development of intelligent terminal such as smart phones, the demand for data traffic in mobile communication systems is exponentially growing. To cater for this demand, a 1000-fold improvement of capacity per area in the next generation of mobile communication system (5G) compared to 4G is required. An Ultra-Dense Network (UDN) is capable of significantly improving the capacity per area under the limited spectrum resource due to the high splitting-gain of densely located small cells and is widely considered as one of the most promising techniques in the coming 5G. It also benefits load balance between Base Stations (BSs) since Small Base Stations (SBSs) can offload data traffic of Macro Base Stations (MBSs). Nevertheless, due to the short distance between BSs, the intercell interference in UDNs is severe, therefore making the user experience unsatisfactory. Coordinated Multi-Point (CoMP) transmissions technique is widely studied in academia and the industry, which can leverage the cooperation of multiple BSs to enhance the signal to interference and noise ratio (SINR), to counteract intercell interference and to enhance network capacity in UDNs.
Despite remarkable performance gain in network capacity, congestion on backhaul links caused by CoMP risks the mobile communication systems. In order to cooperatively serve users, BSs need to fetch more files from the Core Network (CN) via backhaul links in a CoMP-employed system, which brings heavy load to backhaul links between BSs and the CN and probably results in congestion. One way to alleviate backhaul load is to cache popular files on BSs. When BSs cache files requested by users, it does not need to fetch files from the CN, so the backhaul load can be dramatically reduced. In [1], an architecture based on distributed caching of content in SBSs was presented. Works on proactive caching in UDNs concentrate on two major issues: Content placement and content distribution.
Content placement focuses on how to distribute popular and hotspot files to the BSs’ caching unit whose capacity is limited. In [2], an optimal content placement strategy is proposed to maximize the hit rate. In [3], the problem of content placement is studied to maximize energy efficiency. In [4], an approximation algorithm is proposed to jointly optimize routing and caching policy to maximize the fraction of requested files cached locally. In [5], a distributed algorithm is proposed to investigate content placement and user association jointly. In [6], a content placement strategy is investigated based on reinforcement learning. In [7], a content placement strategy is proposed under cooperation schemes of maximum ratio transmission (MRT) and zero-forcing beamforming (ZFBF). In [8], a caching space allocation scheme is proposed to improve the hit rate based on the categories of contents and UEs.
Content distribution is the study of how to associate UEs and BSs to improve the hit rate. In [9], the user association problem is modeled as an one-to-many game problem, based on which algorithm is proposed to maximize the average download rate under a given content placement strategy. In [10], an user association algorithm under a given content distribution in a CoMP enabled network is proposed to minimize the backhaul load under a guaranteed rate requirements of UEs. In [11], the content caching and user association schemes are proposed on two different scales: The caching algorithm operates in a long time scale and the user association algorithm operates frequently. In [12], user association is investigated to tradeoff between load balancing and backhaul savings in UDN.
To the best of our knowledge, related works on the content placement caching and user association have been investigated separately in small-scale networks. We are thus motivated to jointly investigate the tasks of caching and user association in more realistic large-scale UDNs. The main contributions of this paper are summarized as follows.
  • The problem of content placement and user association is investigated jointly in large-scale cache-enabled coordinated ultra dense networks. We formulate the problem as a constrained non-convex combinatorial programming problem to maximize network throughput of cell edge UEs under the consideration of the backhaul load;
  • A two-step heuristic algorithm based on the cross-entropy (CE) method is proposed to solve the problem: A content placement strategy is first proposed based on cross entropy under the assumption of the conventional N-Best scheme; given the proposed content placement strategy, a user association algorithm is then proposed based on the cross-entropy method. Extensive simulations are conducted to evaluate the performance of the proposed approach. Simulations are conducted to validate the performance of the proposed cross-entropy based schemes in terms of network throughput and backhaul load. Simulation results show that the proposed caching and user association algorithms can reduce backhaul load and improve network throughput of cell edge UEs simultaneously.
The rest of this paper is organized as follows. The system model is established in Section 2 with some basic assumptions. In Section 3, we formulate the problem and propose the algorithms. In Section 4, simulation results are presented and the system performance is evaluated. Section 5 concludes this paper.

2. System Model

2.1. Network

In this paper, we consider a heterogeneous Ultra-Dense Network consisting of N MBS Macro BSs (MBS) and N SBS Small Base Stations (SBS). The Macro BSs are uniformly distributed to provide coverage and to support capacity. The small BSs are randomly distributed within the covering area, following a Poisson Point Process (PPP) with a density of λ SBS . Let B Ω = { b | b = 1 , 2 , , | B Ω | } denote the set of BSs consisting of both Macro BSs and Small BSs, where | B Ω | = N MBS + N SBS is the total number of BSs.
UEs are randomly distributed following a PPP with density of λ U . The set of UEs is denoted by M Ω = { m | m = 1 , 2 , , | M Ω | } . UEs located at the edges of cells usually suffer from severe intercell interference and low capacity. To reduce the interference and enhance peak data rates of cell edge users, joint transmission Coordinated Multi-Point (termed as JT CoMP) is considered in the network architecture, which allows multiple BSs in the neighborhood to cooperatively serve a specific UE simultaneously.
The association relationship between UEs, m, and BS, b, is denoted by a bit number x m , b ( m M Ω , b B Ω ) defined as:
x m , b = 1 UE m is associated with BS b 0 otherwise .
Thus, the entire association result between BSs and UEs in the considering network can be presented by:
X = x 1 , 1 x 1 , 2 x 1 , B Ω x 2 , 1 x 2 , 2 x 2 , B Ω x M Ω , 1 x M Ω , 2 x M Ω , B Ω .
The SINR of a specific UE in a downlink transmission can be presented in terms of x m , b as follows,
Γ m = b B Ω x m , b P b g m , b b B Ω ( 1 x m , b ) P b g m , b + σ 2 ,
where P b is the transmit power of BS b, g m , b is the channel gain between BS b and UE m, and  σ 2 is the variance of additive white Gaussian noise (AWGN). Equation (3) suggests that the more BSs are associated with UE m, the better service it can obtain. However, the necessary overhead to accomplish a JT CoMP transmission involving too much BSs is unacceptable. Thus, it is better to narrow the associating BSs of a UE into N BSs in close proximity.
As in 4G LTE and 5G NR (New Radio) wireless standards, resource block (RB) is considered the unit of time and spectrum resource for allocation in this paper. Assume that the bandwidth of each RB is W and the total number of RBs is N RB . Each UE in the network can occupy a part of resource for transmission. Let β m denote the proportion that the resource assigned to UE m out of all. Then the data rate of a downlink transmission to UE m can be given by:
R m = W β m N RB log 2 1 + Γ m ,
where x is the minimum integer smaller than or equal to x; Γ m is defined by Equation (3).
Let B m Ω B Ω denote the set consisting of BSs associated with UE m, i.e., B m Ω = { b | b B Ω , and x m , b = 1 } . Similarly, let M b Ω M Ω denote the set consisting of UEs associated with BS b,  i.e., M b Ω = { m | m M Ω , and x m , b = 1 } . The resource that BS b can assign to UE m should be no more than 1 | M b Ω | , where | M b Ω | represents the total number of UEs associated with BS b. In the case where JT CoMP is employed, the resource that UE m can be obtained is restricted by the most heavy-loading BS among those associated with UE m. As a result, the proportion β m can be given by:
β m = min 1 M b Ω , b B m Ω .

2.2. Caching

UDNs can benefit from caching popular files on BSs in terms of throughput, delay, and traffic load on backhaul links. It is obvious that the more files cached on BSs, the better performance a network can achieve. The cache-enabled heterogeneous UDN we considered in this paper is illustrated as Figure 1. For simplicity, we assume that the files requested by all UEs in the networks are restricted into the set of F Ω = { f | f = 1 , 2 , , | F Ω | } , and each file is in the same size of F max bits. We assume the popularity of files follows Zipf distribution [13]. Let p f denote the probability mass function of popularity random variable F. The probability that file f is requested can be given by:
p f = f = 1 | F Ω | f γ 1 f γ ,
where γ is the Shape Factor (SF) indicating the correlation between requests of UEs [13]. It is seen that the larger the shape factor γ is, the smaller the probability mass function p f would be, the lower probability file f is requested out of the caching set F Ω .
Define a caching index vector y b = [ y b , 1 , y b , 2 , , y b , f , y b , | F Ω | ] , where y b , f indicates whether BS b caches file f in the caching set F Ω or not. More specifically,
y b , f = 1 file f is cached on BS b 0 otherwise .
Then the File-BS caching matrix can be denoted by:
Y = y 1 , 1 y 1 , 2 y B Ω , | F Ω | y 2 , 1 y 2 , 2 y B Ω , | F Ω | y B Ω , 1 y B Ω , 2 y B Ω , F Ω .
As for UEs, we define a row vector   q m = [ q m , 1 , q m , 2 , , q m , f , ] , where q m , f represents the request of UE m to file f, i.e.,
q m , f = 1 file f is requested by UE m 0 otherwise .
Suppose a UE can request one and only one file at each time, then we have f q m , f = 1 , m M Ω .
Then   q m y b T represents whether the file requested by UE m is caching on BS b, where v T represents the transpose of the vector v .
q m y b T = 1 file f requested by UE m is on BS b 0 otherwise .
If UE m is associated with BS b (i.e., x m , b = 1 ), we say that BS b misses a file if file f requested by UE m is not cached in it.
If BSs miss a file, they need to fetch the file from the Core Network (CN). We assume a centralized deployment of the considered UDN, where each BS is directly connected to the CN via backhaul links. The backhaul load is defined as the traffic carried by backhaul links between BSs and the CN [14]. In the case that BS b misses a file requested by UE m, BS b have to fetch the file from the CN through the backhaul link, which aggravates the backhaul load of BS b inevitably. In reality, the capacity of backhaul links is usually limited. Congestion occurs when the backhaul load of BS b exceeds the backhaul capacity C b max .
Let U back represent the increase of backhaul load due to fetching a file from the CN. The backhaul load caused by UE m can be given by:
V m = b B m Ω ( 1 q m y b T ) U back .
It is obvious that the more files BSs cache (i.e., the less files BSs miss), the less heavier the backhaul load will be.

2.3. Delay

In addition to reducing backhaul load, caching also benefits from reducing the time delay of transmissions. In this paper, we consider the average time delay of UEs, which consists of two major parts: Wireless propagation delay and backhaul delay. Let d 1 denote the average wireless propagation delay of a UDN which is related to the size of a file F max and the data rate of transmission.
d 1 = 1 M Ω m M Ω F max R m .
Backhaul delay, denoted by d 2 , is related to whether the files are hit by the associating BSs of UEs. Due to joint transmission of CoMP, the backhaul delay for a specific UE m occurs when the requested file is not cached on all its associated BSs. That is, the minimum operation should be applied on backhaul delays due to file transmission between the associated BSs and the core network. More specifically, d 2 can be represented as follows,
d 2 = 1 M Ω m M Ω min F max U back , b B m Ω ( 1 q m y b T ) F max U back .
As a result, the total time delay of the network is:
D = d 1 + d 2 .

3. Problem Formulation

3.1. Mathematical Formulation

In this paper, we aim to develop the optimal solution of content placement and user association that balances network throughput and the backhaul load simultaneously. Considering the fairness of UEs, the network throughput of cell edge UEs is used as the performance metric. Thus the objective function is a tradeoff between network throughput of cell edge UEs and backhaul load.
max X , Y m M Ω log 10 ( R m ) λ m M Ω V m M Ω
s . t . C 1 : 1 | B m Ω | N , m M Ω C 2 : m x m , b N RB , b B Ω , m M Ω C 3 : m x m , b ( 1 q m y b T ) U back C b max , b B Ω
where the constraint C1 indicates that a specific UE m should be served by at least one BS, meanwhile the total number of BSs that cooperatively serve a specific UE should not be more than a given number N by considering the tradeoff between throughput gain and backhaul load due to the joint transmission of CoMP; C2 indicates that the total number of RBs allocated to UEs associating with a specific BS is limited to the maximum N RB ; C3 indicates that aggregate backhaul load of BS m should not be over the backhaul capacity C b max .
λ 0 in Equation (15) is a coefficient that influences the balance between network throughput and backhaul load. A larger λ suggests that we prefer improving network throughput than reducing backhaul load, and vice versa. Let m M Ω log 2 ( R m ( 0 ) ) and m M Ω V m ( 0 ) M Ω denote sum of logarithm of data rate and averaged load on backhaul links when λ = 0 , respectively. We define λ with m M Ω log 2 ( R m ( 0 ) ) and m M Ω V m ( 0 ) M Ω as benchmarks, and then λ can be given by:
λ = m M Ω log 2 ( R m ( 0 ) ) M Ω μ m M Ω V m ( 0 ) .
where μ [ 0 , 1 ] is a weight factor used for adjusting λ .
The problem in Equation (15) is a constrained non-convex combinatorial optimization problem, which requires extraordinary high complexity to trace its optimal solution. To obtain a practical solution, we decompose the problem into two steps based on the cross-entropy (CE) method. In this paper, the CE method is chosen because it is a simple, efficient, and general method for solving a great variety of estimation and optimization problems, especially NP-hard combinatorial deterministic and stochastic problems [15]. First, we minimize the backhaul load of the system under the assumption of the conventional N-Best user association strategy (By N-Best user association strategy, a CoMP UE will associate with N max BSs which have N best SINRs [16]) and propose a content placement algorithm based on cross entropy, which is termed as the CPCE algorithm. Subsequently, under the given content placement strategy, we propose an user association algorithm based on cross entropy, which is referred to as UACE in the rest of this paper.

3.2. Cross-Entropy Method

The CE method was originally used in the context of rare event simulation [17] and has been extended as a Monte Carlo method for importance sampling and optimization [17,18].
The principle behind the CE method is to get as close as possible to the optimal importance sampling distribution by using the Kullback-–Leibler (KL) distance as a measure of closeness. By repeatedly updating the Probability Density Function (PDF) of generated samples, the PDF of the samples can finally converge with the obtained optimal strategy solution [19]. Another method with a similar idea is logarithmic loss distortion measure [20,21], where logarithmic loss is also known as cross-entropy loss. The logarithmic loss distortion measure has been recently used in the study of Deep Neural Networks (DNNs) to approach an accurate classifier by minimizing the logarithmic loss. It also performs well on tradeoff between complexity and relevance in representation learning [22].
The main steps of the CE method can be depicted as follows:
STEP 1: (Encode Strategy Space). Consider a UDN constituted by B Ω BSs, where each BS b is a decision-making entity. Suppose that each BS b can make a decision out of N b possible strategies, then the strategy set at BS b can be expressed as S b = [ S b 1 , S b 2 , , S b N b ] . For a specific decision-making entity BS b, S b i is one strategy that belongs to S b . The strategy set of B Ω BSs entities in a UDN can be represented as S B Ω = [ S 1 , S 2 , , S | B Ω | ] , which is termed as the strategy space of the CE method. Then the samples of the strategy space of the CE method correspond to the strategies at all BSs in a UDN in current iteration.
Let P b = [ P b , 1 , P b , 2 , , P b , N b ] denote the probability distribution of sample strategies at BS b. Let  P b , i denote as the probability of strategy i at a specific BS b. First, P b , i is initialized to be equal as follows,
P b , i = 1 N b , and i = 1 N b P b , i = 1 , ( i = 1 , , N b ) .
STEP 2: (Generate Samples According to the Probability). In the second step of the CE method, sufficient strategy samples should be generated according to the given probability distribution. Denote the zth generated sample by A ( z ) = A 1 T ( z ) , A 2 T ( z ) , , A b T ( z ) , , A | B Ω | T ( z ) , where A b ( z ) is the subsample set generated by decision-making entity element b. More specifically, the subsample A b ( z ) can be represented as:
A b ( z ) = α b , 1 ( z ) , α b , 2 ( z ) , , α b , i ( z ) , , α b , N b ( z ) ,
where α b , i ( z ) is a binary number. For each A b ( z ) , only one α b , i ( z ) is “1” and others are “0” (i.e.,  i = 1 N b α b , i = 1 ), indicating that only one strategy out of all can be selected at each decision epoch. The probability of subsample A b is P b , i P b with α b , i = 1 and α b , j = 0 ( j i ) .
STEP 3: (Performance Evaluation). Fitness values of strategy samples can be calculated according to the result of the strategy in the current iteration. Let F ( z ) denote the fitness value of strategy sample z, which can be expressed as:
F ( z ) = b m x m b ( 1 q m y b T ) U b a c k .
Rearrange F ( z ) in descending order as F ( 1 ) F ( 2 ) F ( Z ) , where Z is the maximum number of strategy samples. Then calculate the ρ -quantile of the strategy samples in current iteration F ρ and weed out the unexpected samples. The samples with fitness value F ( i ) F ρ are selected for probability updating in the next iteration.
STEP 4: (Probability Updating). According to samples selected in the performance evaluation step, the probabilities of each strategy can be updated as follows,
P b , i update = z = 1 Z I F ( z ) F ρ α b , i ( z ) z = 1 Z I F ( z ) F ρ ,
where I is defined as,
I x y = 1 if x y 0 others .
Go back to STEP 2, regenerate the samples based on the updated probability distribution and repeat STEP 2 to STEP 4.
STEP 5: (Convergence Conditions). The algorithm will come to an end when the fitness value reaches convergence or the algorithm reaches the maximum iteration number set in advance. The cross-entropy method is a global random search procedure, and asymptotical convergence can be achieved to find the optimal solution with probability arbitrarily close to 1 [23,24].

3.3. Content Placement Algorithm Based on the Cross-Entropy Method (CPCE)

Before joining in a network, a specific UE will measure Channel State Information (CSI) and choose the candidate BSs with the biggest reference signal received power (RSRP). To investigate the content placement strategies of BSs, we assume the conventional N-Best scheme for user association in the first place. BSs in the network are modeled as decision-making entities in the CE method, and feasible content placement candidates are strategies of each entity. The CPCE algorithm can be depicted as Algorithm 1.
The optimized content placement strategy Y can be given by Algorithm 1, under the assumption of the N-best user association scheme. User association results can be further optimized with the obtained Y .
Algorithm 1 Content Placement based on CE method (CPCE)
1:
User association under N-Best strategy.
2:
Generate content placement request samples of UEs q m based on Zipf distribution. Map BSs ⟷ Decision-making entities in CE method.
3:
Map the content placement strategy set ⟷ Strategies in CE method.
4:
Map the sum backhaul load ⟷ Fitness value in CE method.
5:
Execute CPCE.
6:
Map the obtained solution into the best content placement strategies of BSs and output Y .

3.4. User Association Algorithm Based on the Cross-Entropy Method (UACE)

By Algorithm 1, we obtain the optimal content placement strategy of each BS under the N-Best user association scheme. However, the N-Best user association scheme does not take into account load balancing and interference management. Under the obtained content placement result, we can further optimize the user association algorithm.
The user association problem is a constrained non-convex integer programming problem, which can also be solved by the CE method [15,19]. Considering that the maximum number of BSs associated with a UE is N, the amount of association strategies of a UE will be no more than 2 N 1 . Similarly, the steps of the proposed UACE method is as follows.
STEP 1: (Encode Strategy Space). In UACE, the decision-making entities are UEs in the network. Suppose that each UE m can make a decision out of N m possible strategies, then the strategy set at UE m can be expressed as S m = [ S m 1 , S m 2 , , S m N m ] . Let P m = [ P b , 1 , P b , 2 , , P b , N m ] denote the probability distribution of sample strategies at UE m, where P m , i denote the probability of strategy i at a specific UE m. P m , i can be initialized to be equal as follows,
P m , i = 1 N m , and i = 1 N m P m , i = 1 , ( i = 1 , , N m ) .
STEP 2: (Generate Samples According to the Probability). Samples are generated in this step in a similar way described in STEP 2 of Section 3.2.
STEP 3: (Encode Strategy Space). The fitness value of strategy samples in UACE is
m M Ω log 10 ( R m ) λ m M Ω V m | M Ω |
STEP 4 (Probability Updating) and STEP 5 (Convergence Conditions) of UACE are also similar to STEP 4 and STEP 5 in Section 3.2. Then the proposed UACE algorithm can be depicted as in Algorithm 2.
By applying Algorithms 1 and 2, we can obtain suboptimal solutions to problem (15). With the obtained results, optimized performance of the considered UDN in terms of both throughput and backhaul load is achieved.
Algorithm 2 User Association based on Cross-Entropy Algorithm (UACE)
1:
Execute the proposed CPCE Algorithm 1 under popular contents’ statistics.
2:
Map UEs ⟷ Decision-making entities in CE method.
3:
Map association strategy set for a specific UE ⟷ Strategies in CE method.
4:
Map network throughput of all the cell edge UEs ⟷ Fitness value in CE method.
5:
Execute UACE.
6:
Map the obtain solution into optimal user association solution and output X .

3.5. Complexity Analysis of the Cross-Entropy Method

From the description in the previous subsection, the computational complexity of the proposed CE algorithm is made up of 5 parts.
(1)
Initialize the probability distribution of sample strategies. According to the size of encode strategy space and Equation (17), the computational complexity is O ( | B Ω | ) ;
(2)
Generate samples according to the probability. According to Equations (18) and (19), there are Z samples at most, and the size of each sample is N b × | B Ω | . Hence, the computational complexity is O ( Z × N b × | B Ω | ) ;
(3)
Performance Evaluation. According to Equation (20), we should calculate the fitness value of each strategy sample according to Equation (20), and the computational complexity is O ( Z × | M Ω | × | B Ω | ) ;
(4)
Probability Updating. According to Equation (21) and the size of the probability distribution of the sample strategy, the computation complexity is O ( Z × N b × | B Ω | ) ;
(5)
Iteration. The proposed algorithm will come to an end when the maximal iteration number V is reached. Hence, the computation complexity is V times the sum of the computation complexity from Equations (1)–(4), i.e., O ( V × Z × N b × | M Ω | × | B Ω | ) .
According to the analysis above, the total computation complexity of the proposed algorithm based on the CE method is computable in polynomial time.

4. Simulation and Analysis

Extensive simulations are conducted to evaluate the performance of the proposed content placement and user association algorithm. In the simulation, 7 MBSs are uniformly distributed in the considered area, while SBSs and UEs randomly drops, the maximum number of BSs that a UE can be associated is 3 [25]. Major parameter settings are listed in Table 1.

4.1. System Performance under Different Content Placement Schemes

For content placement strategies, we compared the performance of the proposed CECP scheme to that of random scheme and Most Popular Content (MPC) scheme under different SFs ( γ ) of popularity of files. Network performance in terms of backhaul load and normalized time delay is shown in Figure 2 and Figure 3 respectively.
When γ = 0.2 , the backhaul load of the proposed CPCE scheme is two-times less than that of the MPC scheme and the random scheme. As the shape factor increases, the backhaul load and time delay decrease sharply for both the proposed CECP scheme and the MPC scheme. This is because as the shape factor increases, popular files tend to be prone to fewer files, thus more gain can be obtained by selecting proper caching strategies. When γ becomes larger and larger ( γ > 0.2 in the simulation), the backhaul load and time delay of the CPCE scheme are comparable to that of the MPC, being about more than 13 times smaller than the Random scheme as shown in Figure 2 and Figure 3.

4.2. System Performance of CPCE with Different Numbers of UEs

A simulation was also conducted to evaluate the performance of the proposed CPCE scheme under different network scales with γ = 1 . As expected, the proposed CPCE algorithm outperforms the MPC and random caching scheme in terms of the backhaul load under different scales of the network, as shown in Figure 4. When UEs are sparsely distributed in the network, the backhaul load of the CPCE scheme is almost ignorable. Even if the number of UEs increases up to 200, the backhaul load of CPCE is still a great deal lower than that of the random scheme and MPC. Figure 5 shows the normalized time delay of each content placement scheme under different network scales. It is observed that CPCE can achieve the lowest time delay compared to the MPC and random caching scheme.

4.3. System Performance of CPCE under Different Storage Capacity of BSs

Figure 6 and Figure 7 show the impact on network performance of the BSs’ different storage capacity. It is clear that the more files that BSs can cache, the more possibility that BSs hit required files. We assume the total number of files is 20. When the storage capacity of BSs is half of total files, both backhaul load and time delay of the proposed CPCE is as a third as that of MPC. Even when storage capacity is very limited (for example, only 1 file can be cached), the backhaul load of CPCE is acceptable, as shown in Figure 6. Meanwhile, as shown in Figure 7, time delay decreases as the storage capacity increases, and the proposed CPCE outperforms the other two.
The performance of Random and MPC comparing with the proposed CPCE in terms of time delay and backhaul load is listed in Table 2.

4.4. System Performance of CPCE-UACE under Different Weight Factor

The performance of the entire CPCE-UACE algorithm is evaluated in the simulation and compared with N-best, No-CoMP, and Threshold user association schemes. No-CoMP scheme means each UE, no matter where it is located, can be associated only to the BS with the best RSRP. Threshold scheme allows a specific UE to be associated with multiple BSs whose RSRP is better than a given threshold [16]. We also assess backhaul load and network throughput of CPCE-UACE algorithm under a different weight factor μ (increases from 0 to 1 by step of 0.5). Generally speaking, the more BSs each UE in the network can be associated with, the better throughput can be achieved, while heavier the backhaul load will be. Fortunately, the proposed CPCE-UACE algorithm can balance backhaul load and network throughput by carefully selecting a weight factor μ . As shown in Figure 8 and Figure 9, network throughput and backhaul load of CPCE-UACE decreases as the weight factor μ grows. When μ is very small (less than 0.05), throughput of CPCE-UACE is significantly better than the others, but the load of it is also outstandingly heavy. On the other hand, when μ is as large as 0.5, both throughput and the backhaul load of CPCE-UACE is lowest in the four schemes considered in the simulation. As a result, we can narrow the range of an optimal μ that perfectly balances network performance in terms of the two aspects into [ 0.05 , 0.5 ] . We consider μ = 0.1 as the almost optimal weight factor due to relatively high throughput, as well as the low backhaul load, of CPCE-UACE as shown in Figure 8 and Figure 9.

4.5. System Performance of CPCE-UACE under Different Numbers of UEs

In this subsection, we evaluated the proposed CPCE-UACE algorithm jointly in terms of throughput and backhaul load under different network scales with μ = 0.1 . The number of UEs in the network is set to be from 50 to 200 with an interval 50.
As shown in Figure 10, the average data rate of each UE decreases as the number of UEs in the network grows. It is obvious that the proposed CPCE-UACE algorithm can always achieve an outstanding performance compared to the No-CoMP and N-Best scheme, and 40% performance gain is obtained if | M Ω | 150 . Despite the threshold scheme being comparable to the CPCE-UACE algorithm in terms of the average data rate, the threshold scheme has the heaviest backhaul load as shown in Figure 11. It is observed that the proposed CPCE-UACE algorithm has the better performance of the backhaul load compared to the N-Best scheme and threshold scheme, as shown in Figure 11. Furthermore, the proposed CPCE-UACE algorithm is comparable with the No-CoMP scheme under a small number of UEs ( | M Ω | 50 ) and outperforms the other schemes in large scale networks ( | M Ω | 100 ).
The performance of No-CoMP, N-best, and Threshold compared with the proposed CPCE-UACE in terms of data rate and backhaul load is listed in Table 3.

5. Conclusions

This paper considered a problem involving content placement and user association in UDNs where proactive caching and CoMP are enabled. To alleviate the backhaul load and improve network performance, the CPCE-UACE algorithm was proposed to solve the problem. Simulation results demonstrated that the proposed algorithm was capable of decreasing the necessary backhaul traffic and improving network throughput simultaneously. Simulation results showed that the proposed cross-entropy based content placement scheme significantly outperformed the conventional random and MPC placement schemes, with a 50% and 20% backhaul load decrease respectively. Furthermore, the proposed cross-entropy based user association scheme could achieve 30% and 23% throughput gain, compared with the conventional N-best, No-CoMP, and Threshold based user association schemes.

Author Contributions

Conceptualization, Y.W.; Methodology, J.Y.; Project administration, S.G.; Supervision, Q.Z.; Writing—original draft, S.C.; Writing-review & editing, J.Y. and Y.Z.

Funding

This research received no external funding.

Acknowledgments

This work was supported in part by the National Natural Sciences Foundation of China (NSFC) under Grant 61701136; Shenzhen Basic Research Program under Grant JCYJ20170811154233370; and Shenzhen Science and Technology Projection under Grant JCYJ2016060815123996.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Golrezaei, N.; Molisch, A.F.; Dimakis, A.G.; Caire, G. Femtocaching and device-to-device collaboration: A new architecture for wireless video distribution. IEEE Commun. Mag. 2013, 51, 142–149. [Google Scholar] [CrossRef]
  2. Golrezaei, N.; Shanmugam, K.; Dimakis, A.G.; Molisch, A.F.; Caire, G. FemtoCaching: Wireless video content delivery through distributed caching helpers. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), Orlando, FL, USA, 25–30 March 2012; pp. 1107–1115. [Google Scholar]
  3. Gabry, F.; Bioglio, V.; Land, I. On energy-efficient edge caching in heterogeneous networks. IEEE J. Sel. Areas Commun. 2016, 34, 3288–3298. [Google Scholar] [CrossRef]
  4. Poularakis, K.; Iosifidis, G.; Tassiulas, L. Approximation Algorithms for Mobile Data Caching in Small Cell Networks. IEEE Trans. Commun. 2014, 62, 3665–3677. [Google Scholar] [CrossRef]
  5. Wang, Y.; Tao, X.; Zhang, X.; Mao, G. Joint Caching Placement and User Association for Minimizing User Download Delay. IEEE Access 2016, 4, 8625–8633. [Google Scholar] [CrossRef]
  6. ElBamby, M.S.; Bennis, M.; Saad, W.; Latva-aho, M. Content-aware user clustering and caching in wireless small cell networks. In Proceedings of the International Symposium on Wireless Communications Systems (ISWCS), Barcelona, Spain, 26–29 August 2014; pp. 945–949. [Google Scholar]
  7. Ao, W.C.; Psounis, K. Fast Content Delivery via Distributed Caching and Small Cell Cooperation. IEEE Trans. Mob. Comput. 2018, 17, 1048–1061. [Google Scholar] [CrossRef]
  8. Huo, R.; Xie, R.; Zhang, H.; Huang, T.; Liu, Y. What to cache: Differentiated caching resource allocation and management in information-centric networking. China Commun. 2016, 13, 261–276. [Google Scholar] [CrossRef]
  9. Pantisano, F.; Bennis, M.; Saad, W.; Debbah, M. Cache-aware user association in backhaul-constrained small cell networks. In Proceedings of the International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), Hammamet, Tunisia, 12–16 May 2014; pp. 37–42. [Google Scholar]
  10. Yu, Y.; Tsai, W.; Pang, A. Backhaul Traffic Minimization under Cache-Enabled CoMP Transmissions over 5G Cellular Systems. In Proceedings of the IEEE Global Communications Conference (GLOBECOM), Washington, DC, USA, 4–8 December 2016; pp. 1–7. [Google Scholar]
  11. Kwak, J.; Le, L.B.; Wang, X. Two Time-Scale Content Caching and User Association in 5G Heterogeneous Networks. In Proceedings of the IEEE Global Communications Conference (GLOBECOM), Singapore, 4–8 December 2017; pp. 1–6. [Google Scholar]
  12. Dai, B.; Yu, W. Joint user association and content placement for Cache-enabled wireless access networks. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Shanghai, China, 20–25 March 2016; pp. 3521–3525. [Google Scholar]
  13. Breslau, L.; Cao, P.; Fan, L.; Phillips, G.; Shenker, S. Web caching and Zipf-like distributions: Evidence and implications. In Proceedings of the IEEE INFOCOM ’99, New York, NY, USA, 21–25 March 1999; pp. 126–134. [Google Scholar]
  14. Lakshmana, T.R.; Li, J.; Botella, C.; Papadogiannis, A.; Svensson, T. Scheduling for backhaul load reduction in CoMP. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), Shanghai, China, 7–10 April 2013. [Google Scholar]
  15. Rubinstein, R.Y.; Kroese, D.P. The Cross-Entropy Method: A Unified Approach to Combinatorial Optimization, Monte-Carlo Simulation, and Machine Learning; Springer: New York, NY, USA, 2014; ISBN 978-0-387-21240-1. [Google Scholar]
  16. Chen, S.; Zhao, T.; Chen, H.; Lu, Z.; Meng, W. Performance Analysis of Downlink Coordinated Multipoint Joint Transmission in Ultra-Dense Networks. IEEE Netw. 2017, 31, 106–114. [Google Scholar] [CrossRef]
  17. Rubinstein, R.Y. Optimization of computer simulation models with rare events. Eur. J. Oper. Res. 1997, 99, 89–112. [Google Scholar] [CrossRef]
  18. Rubinstein, R.Y. The cross-entropy method for combinatorial and continuous optimization. Methodol. Comput. Appl. Probab. 1999, 1, 127–190. [Google Scholar] [CrossRef]
  19. De Boer, P.-T.; KroeseShie, D.P.; Rubinstein, M.R.Y. A Tutorial on the cross-entropy Method. Ann. Oper. Res. 2005, 134, 19–67. [Google Scholar] [CrossRef]
  20. Ugur, Y.; Estella Aguerri, I.; Zaidi, A. Rate Distortion Region of the Vector CEO Problem under Logarithmic Loss. In Proceedings of the IEEE Information Theory Workshop (ITW 2018), Guangzhou, China, 25–29 November 2018. [Google Scholar]
  21. Estella Aguerri, I.; Zaidi, A. Distributed Information Bottleneck Method for Discrete and Gaussian Sources. In Proceedings of the IEEE Int. Zurich Seminar on Information and Communications(IZS 2018), Zürich, Switzerland, 21–23 February 2018. [Google Scholar]
  22. Estella Aguerri, I.; Zaidi, A. Distributed Variational Representation Learning. arXiv 2018, arXiv:1807.04193. [Google Scholar]
  23. Margolin, L. On the Convergence of the cross-entropy Method. Ann. Oper. Res. 2005, 134, 201–214. [Google Scholar] [CrossRef]
  24. Costa, A.; Owen, J.; Kroese, D.P. Convergence Properties of the cross-entropy Method for Discrete Optimization. Oper. Res. Lett. 2007, 35, 573–580. [Google Scholar] [CrossRef]
  25. Liu, L.; Garcia, V.; Tian, L.; Pan, Z.; Shi, J. Joint clustering and inter-cell resource allocation for CoMP in ultra dense cellular networks. In Proceedings of the IEEE International Conference on Communications (ICC), London, UK, 8–12 June 2015; pp. 2560–2564. [Google Scholar]
Figure 1. System model of caching-enabled Ultra-Dense Network (UDN) with joint transmission Coordinated Multi-Point (JT CoMP).
Figure 1. System model of caching-enabled Ultra-Dense Network (UDN) with joint transmission Coordinated Multi-Point (JT CoMP).
Entropy 21 00576 g001
Figure 2. Backhaul load with different γ ( | M Ω | = 200 ).
Figure 2. Backhaul load with different γ ( | M Ω | = 200 ).
Entropy 21 00576 g002
Figure 3. Time delay under different γ ( | M Ω | = 200 ).
Figure 3. Time delay under different γ ( | M Ω | = 200 ).
Entropy 21 00576 g003
Figure 4. Backhaul load under different numbers of UEs ( γ = 1 ).
Figure 4. Backhaul load under different numbers of UEs ( γ = 1 ).
Entropy 21 00576 g004
Figure 5. Normalized time delay under different numbers of UEs ( γ = 1 ).
Figure 5. Normalized time delay under different numbers of UEs ( γ = 1 ).
Entropy 21 00576 g005
Figure 6. Backhaul load under different storage capacity of BSs ( γ = 1 ).
Figure 6. Backhaul load under different storage capacity of BSs ( γ = 1 ).
Entropy 21 00576 g006
Figure 7. Normalized time delay under different storage capacity of BSs ( γ = 1 ).
Figure 7. Normalized time delay under different storage capacity of BSs ( γ = 1 ).
Entropy 21 00576 g007
Figure 8. Network throughput under different μ .
Figure 8. Network throughput under different μ .
Entropy 21 00576 g008
Figure 9. Backhaul load under different μ .
Figure 9. Backhaul load under different μ .
Entropy 21 00576 g009
Figure 10. Network throughput under different numbers of UEs.
Figure 10. Network throughput under different numbers of UEs.
Entropy 21 00576 g010
Figure 11. Backhaul load under different numbers of UEs.
Figure 11. Backhaul load under different numbers of UEs.
Entropy 21 00576 g011
Table 1. Parameters setting.
Table 1. Parameters setting.
ParametersValue
Plane of Topology1.5 × 1.5 km 2
Number of MBSs7
Number of SBSs40
Number of UEs50–200
Channel ModelWINNER
Transmit Power of MBS40 W
Transmit Power of SBS2 W
Number of Available RB100
Total Number of Files20
Backhaul Capacity of MBS1 Gbps
Backhaul Capacity of SBS100 Mbps
Maximal Number of Caching Files on each BS10
U back 10 Mbps
N3
Table 2. Comparison of algorithms in terms of delay and backhaul load.
Table 2. Comparison of algorithms in terms of delay and backhaul load.
Time DelayBackhaul Load
Randomhighhigh
MPClow to highlow to high
CPCElowlow
Table 3. Comparison of algorithms in terms of data rate and backhaul load.
Table 3. Comparison of algorithms in terms of data rate and backhaul load.
Data RateBackhaul Load
No-CoMPlowlow to medium
N-bestlowlow to medium
Thresholdmedium to highhigh
CPCE-UACEhighlow

Share and Cite

MDPI and ACS Style

Yu, J.; Wang, Y.; Gu, S.; Zhang, Q.; Chen, S.; Zhang, Y. Cross-Entropy Method for Content Placement and User Association in Cache-Enabled Coordinated Ultra-Dense Networks. Entropy 2019, 21, 576. https://doi.org/10.3390/e21060576

AMA Style

Yu J, Wang Y, Gu S, Zhang Q, Chen S, Zhang Y. Cross-Entropy Method for Content Placement and User Association in Cache-Enabled Coordinated Ultra-Dense Networks. Entropy. 2019; 21(6):576. https://doi.org/10.3390/e21060576

Chicago/Turabian Style

Yu, Jia, Ye Wang, Shushi Gu, Qinyu Zhang, Siyun Chen, and Yalin Zhang. 2019. "Cross-Entropy Method for Content Placement and User Association in Cache-Enabled Coordinated Ultra-Dense Networks" Entropy 21, no. 6: 576. https://doi.org/10.3390/e21060576

APA Style

Yu, J., Wang, Y., Gu, S., Zhang, Q., Chen, S., & Zhang, Y. (2019). Cross-Entropy Method for Content Placement and User Association in Cache-Enabled Coordinated Ultra-Dense Networks. Entropy, 21(6), 576. https://doi.org/10.3390/e21060576

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop