Next Article in Journal
Estimating Departure Time Using Thermal Camera and Heat Traces Tracking Technique
Next Article in Special Issue
Energy-Efficient Protocol of Link Scheduling in Cognitive Radio Body Area Networks for Medical and Healthcare Applications
Previous Article in Journal
Automatic Museum Audio Guide
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Two-Stage Interference Cancellation for Device-to-Device Caching Networks

1
Department of Military Information Engineering, Hanyang University, Ansan 15588, Korea
2
Department of Electronic Engineering, Kwangwoon University, Seoul 01897, Korea
*
Author to whom correspondence should be addressed.
Sensors 2020, 20(3), 780; https://doi.org/10.3390/s20030780
Submission received: 17 December 2019 / Revised: 26 January 2020 / Accepted: 30 January 2020 / Published: 31 January 2020
(This article belongs to the Special Issue Selected Papers from ICTC 2019)

Abstract

:
Wireless device-to-device (D2D) caching networks are studied, in which n nodes are distributed uniformly at random over the network area. Each node caches M files from the library of size m M and independently requires a file from the library. Each request will be served by cooperative D2D transmission from other nodes having the requested file in their cache memories. In many practical sensor or Internet of things (IoT) networks, there may exist simple sensor or IoT devices that are not able to perform real-time rate and power control based on the reported channel quality information (CQI). Hence, it is assumed that each node transmits a file with a fixed rate and power so that an outage is inevitable. To improve the outage-based throughput, a cache-enabled interference cancellation (IC) technique is proposed for cooperative D2D file delivery which first performs IC, utilizing cached files at each node as side information, and then performs successive IC of strongly interfering files. Numerical simulations demonstrate that the proposed scheme significantly improves the overall throughput and, furthermore, such gain is universally achievable for various caching placement strategies such as random caching and probabilistic caching.

1. Introduction

Wireless traffic has grown exponentially in recent years, mainly due to on-demand video streaming and web browsing [1]. To support such soaring traffic, wireless caching has been actively studied as a promising solution to cost-effectively boost the throughput of wireless content delivery networks. Together with the main trend on the fifth-generation (5G) cell densification with different hierarchy consisting of macro, small, and femto base stations (BSs), caching objects have been moved to network edges, called edge-caching [2,3,4].
Wireless caching techniques in general consist of two phases: the file placement phase and the file delivery phase. Most existing works have studied the joint design of file placement and delivery strategies to optimize the hit probability, network throughput, etc., for examples, see [2,3,4,5,6,7] and the references therein. Although the joint design and optimization of the file placement and delivery schemes can improve the performance of caching networks, it might excessively increase the system complexity and signaling overhead and, furthermore, such optimization requires a priori knowledge of the file popularity profile, which is very challenging for most of the sensor or IoT networks implemented with low-cost hardware devices that have limited communication and computing capabilities. To address such limitations in sensor or IoT devices, in this paper, we rather focus on developing an efficient file delivery scheme that can provide an improved throughput with limited signaling compared to the conventional file delivery schemes and can be universally applied to any file placement strategies. In particular, we propose cooperative device-to-device (D2D) file delivery at the transmitter side and cache-enabled interference cancellation (IC) technique, which first performs IC based on cached files and then performs successive IC of strongly interfering files, at the receiver side. By numerical simulations, we show that the proposed scheme can improve the outage-based throughput regardless of the choice of file placement strategies.
To the best of our knowledge, our work is the first attempt to provide a unified IC framework for wireless D2D caching networks incorporating cooperative transmission from multiple nodes sending the same file [4,8], IC by utilizing cached files as side information [6,8], and IC by interference decoding of undesired files [9,10]. (Throughout the paper, we assume that point-to-point Shannon-capacity-achieving channel codes are used to transmit each file. Hence, a transmitted file will be successfully decoded if its received signal-to-interference-plus-noise ratio (SINR) is greater than 2 R - 1 , where R is the transmission rate of the file.) As a result, the proposed scheme attains a synergistic gain that is able to improve the overall throughput of D2D caching networks, universally achievable for any file placement strategies. The key observation is that the same encoded bits induced by the same file request can be transmitted by multiple nodes for D2D caching networks, and these superimposed signals can be treated as a single received signal for decoding at each node. Notice that such a decoding procedure at each node is indeed beneficial for decoding not only the desired file but also interfering files, i.e., undesired files, because it boosts the received power of interfering files so that a subset of strongly interfering files becomes decodable and, as a result, each node can cancel out their interference before decoding the desired file. Furthermore, treating multiple simultaneously transmitted signals as a single aggregate signal drastically reduces the decoding complexity, i.e., the optimization procedure of establishing an optimal subset of interfering files for successive IC as well as their optimal decoding order.

1.1. Related Work

Recently, D2D caching has been actively studied, in order to allow end terminals to cache content files and then to directly serve each other via D2D single-hop or multihop file delivery [5,6,7,8,11,12]. Specifically, the optimal throughput scaling laws for D2D caching networks achievable by single-hop file delivery and multihop file delivery were derived in [5,11,12]. Analytical modeling for traffic dynamics has been studied in [6] to investigate packet loss rates for cache-enabled networks. In [8], IC by using cached files as side information at each receiver was proposed for cache-enabled networks. Caching placement optimization for probabilistic random caching was studied in [7].
In addition to improving throughput performance of wireless networks, caching has also been considered as a core technology for enhancing or guaranteeing various quality of service (QoS) requirements in sensor or Internet of things (IoT) applications. To reduce energy consumption of wireless sensor networks, node selection for caching sensor data to reduce the communication cost was studied in [13], and dynamic selection of such nodes was further proposed in [14]. A cache-based transport layer protocol was proposed to reduce end-to-end delivery cost of wireless sensor networks in [15]. A comprehensive survey on the state-of-the-art cache-based transport protocols in wireless sensor networks such as cache insertion/replacement policy, cache size requirement, cache location, cache partition, and cache decision was provided in [16]. Recently, caching strategies to support various IoT applications were studied [17,18,19,20]. It was shown in [17] that in-network caching of IoT data at content routers significantly reduces network load by caching highly requested IoT data. Energy-harvesting-based IoT sensing has been studied in [18], which analyzes the trade-off between energy consumption and caching. In [19], a cooperative caching scheme that is able to utilize resource pooling, content storing, node locating, and other related situations was proposed for computing in IoT networks. In [20], an energy-aware dynamic resource caching strategy to enable a broker to cache popular resources was proposed to maximize the energy savings from servers in smart city applications.

1.2. Paper Organization

The rest of the paper is organized as follows. The problem formulation, including the network model and performance metric used in this paper, is described in Section 2. The proposed cache-enabled IC scheme is given in Section 3. The performance evaluation of the proposed scheme is provided in Section 4. Finally, Section 5 concludes the paper.

2. Problem Formulation

For notational convenience, [ 1 : n ] denotes { 1 , 2 , , n } in this paper. We also use the subscript ( · ) i (without bracket) for node indices and the subscript ( · ) [ k ] (with bracket) for file indices.

2.1. Wireless D2D Caching Networks

We consider a wireless D2D network in which n nodes are uniformly distributed at random over the network area of size [ 0 , a ] 2 and assumed to operate in half-duplex mode. We assume a static network topology, i.e., once the positions of n nodes are given, they remain the same during the entire time block. Let q i [ 0 , a ] 2 denote the position vector of node i and d i j denote the Euclidean distance between nodes i and j, where i , j [ 1 : n ] . That is, d i j = q i - q j , where · denotes the Euclidean norm of a vector. The path-loss channel model is assumed in which the channel coefficient from node i to node j at time t is given by h j i [ t ] = q j i [ t ] d j i γ / 2 . Here, γ 2 is the path-loss exponent and q j i [ t ] is the short-term fading at time t, which is drawn independent and identically distributed (i.i.d.) from a continuous distribution with zero mean and unit variance. The received signal of node j at time t is given by
y j [ t ] = i = 1 , i j n h j i [ t ] x i [ t ] + n j [ t ] ,
where x i [ t ] is the transmit signal of node i and n j [ t ] is the additive noise at node j that follows CN ( 0 , 1 ) . Each node should satisfy the average transmit power constraint, i.e., E | x i | 2 [ t ] P for all i [ 1 : n ] . For notational simplicity, we omit the time index t from now on.
As in the general case, a caching scheme consists of two phases: the file placement phase and the file delivery phase. We assume a library F = { f [ 1 ] , f [ 2 ] , , f [ m ] } consisting of m files with equal size. During the file placement phase, each node i stores M files in its local cache memory from F , where M < m . Let p r ( F ) = p r ( f [ 1 ] ) , p r ( f [ 2 ] ) , , p r ( f [ m ] ) be the file popularity distribution, where p r ( f [ k ] ) denotes the demand probability of file f [ k ] , k [ 1 : m ] . Without loss of generality, we assume p r ( f [ k ] ) p r ( f [ l ] ) if k l . During the file delivery phase, each node i demands a file in F —independently, according to the file popularity distribution p r ( F ) —and the network operates in a way to satisfy the requested file demands.

2.2. Outage-Based Throughput

Various sensor or IoT networks are currently implemented using low-cost hardware devices with limited communication and computing capabilities [21]. Hence, the joint optimization of the file placement and delivery schemes and implementation of such a centralized optimal solution might be impractical in wireless D2D caching networks. To overcome such limitation, in this paper, we focus on developing an efficient file delivery protocol for wireless D2D caching networks after the file placement phase is completed, i.e., M cached files are already stored in each cache memory via an arbitrary file placement strategy. Let F i F denote the M cached files stored in the cache memory of node i. During the file delivery phase, each node i transmits one of the files in F i when it is requested by neighbor nodes, which will be specified in Section 3.
In many practical communication systems, especially for sensor or IoT applications, there may exist simple sensor or IoT devices that are not able to perform real-time rate and power control based on the reported channel quality information (CQI). Therefore, we assume that each node i transmits a file with fixed rate R and power P, i.e., no rate and power adaptation is applied. Then, by applying a point-to-point Shannon-capacity-achieving channel code, the transmitted file can be decoded at the receiver side if the received signal-to-interference-plus-noise ratio (SINR) is greater than 2 R - 1 . Consequently, an outage occurs for some nodes if their capacity limits, which are determined by their SINR values, are smaller than the transmission rate R. The outage-based throughput is then given by R times the number of nodes that can successfully decode their desired files, i.e.,
. T = R i = 1 n I ( f ^ i = f i ) ,
where I ( · ) is the indicator function of an event, which is one if the event occurs or zero otherwise. Here, f i denotes the desired file at node i and f ^ i denotes the estimated version of it at node i. For the rest of the paper, we will propose a cache-enabled IC scheme for improving the outage-based throughput in (2) for a given file placement strategy.
Remark 1
(File demand in its local cache memory). Since each node demands a file according to p r ( F ) , the desired files of some nodes might be already stored in their cache memories for some cases. Those files can be immediately delivered so that the throughput in (2) defined as bps/Hz becomes infinity if we count such a delivery, because the transmission time is zero for this case. To avoid such trivial cases, we only count the file delivery from other nodes when calculating (2).

3. Cache-Enabled Interference Cancellation

In this section, we propose a cache-enabled IC scheme for cooperative D2D file delivery. In particular, the proposed scheme performs a two-step procedure. The first step is to select a cached file to transfer from each node and then send the selected file cooperatively. The second step is to cancel out interference at each node in order to improve the outage-based throughput, in which each node first performs IC based on its own cached files and then performs successive IC of strongly interfering files. In the following, we describe the first and second steps of the proposed scheme in details.
For ease of explanation, we assume that the desired file of each node is not included in its local cache memory, i.e., f i F i , for the rest of this section, as also mentioned in Remark 1.

3.1. Step 1: File Request and Transfer at the Transmitter Side

In this subsection, we state how to select a file to transfer for each node i among its M cached files in F i . Let δ > 0 denote the maximum allowable distance for single-hop D2D file delivery, which will be numerically optimized later. Node i broadcasts a file request message of the desired file f i , denoted by f ˜ i (the file index of f i ), to the other nodes. This file request procedure can be performed based on a predetermined round-robin manner via extra interactive signals, similarly assumed in [6,8]. Note that node i might have multiple requested files or might not have any requested files in its cache memory after finishing the above file request message broadcasting. Then, node i first broadcasts a file transmission message of file f i , denoted by f ˜ ˜ i (again, the file index of f i ), if node i has f i in its cache memory and node i is the closest node of node i within the radius of δ among nodes that satisfy f i F i , where i i . It is assumed that after the file request transmission, each node can know the distance between itself and the other nodes by utilizing CQI at the receiver side. If there is no such node i for node i, node i does not broadcast the file transmission message. As the same manner used for the file request message broadcasting, such procedure can be performed based on a predetermined round-robin manner. It is assumed that the size of f ˜ i and f ˜ ˜ i (file indices) is much smaller than the file size, so the transmission time or signal overhead required for broadcasting file request and transmission messages is ignored when calculating (2). After the file transmission message broadcasting, each node i simultaneously transmits file f i for all i [ 1 : n ] .
It is worthwhile mentioning that the synchronization between nodes is required to be established in the above file request and transmission procedure. Such synchronization might be achievable for orthogonal frequency-division multiplexing (OFMD) systems if the propagation delay between nodes is within the cyclic prefix interval of OFMD systems. Additionally, it is assumed that codebooks are shared among nodes before communication or all the nodes use the same codebook for file delivery.
Figure 1 illustrates an example of file request message and the corresponding file transmission, where [ · ] in Figure 1a indicates a cached file at each node and it is assumed that f i f j for i j for simplicity (Note that f i can be equal to f j even if i j in the proposed scheme in general). In the example, nodes 1, 3, and 7 do not transmit any file since the y do not have any requested files in their cache memories, and node 4 transmits file f 1 since the distance from node 1 is closer than the distance from node 2 (and this also applies to node 6).

3.2. Step 2: Interference Cancellation at the Receiver Side

Suppose that each node transmits a requested file (or does not transmit) according to Step 1. For k [ 1 : m ] , let N [ k ] [ 1 : n ] denote the subset of nodes that transmits a file f [ k ] . In addition, N [ 0 ] [ 1 : n ] denotes the subset of nodes that does not transmit any file. From the file request message and file transmission message broadcasting in Step 1, the sets { N [ k ] } k [ 1 : m ] are available at each node, i.e., the file indices for received signals are reported at each node as in [6,8]. Such file indices are needed to perform the first-stage IC stated in Section 3.2.1. Note that N [ k ] N [ l ] = Ø for k l and k = 0 m N [ k ] = [ 1 : n ] from the definition. Denote the transmit signal associated with file f [ k ] by x [ k ] , which is generated according to CN ( 0 , P ) and independent over different k. That is, all nodes in N [ k ] transmit the same signal x [ k ] to deliver file f [ k ] . Then, from (1), the received signal of node j is represented by y j = k = 1 m i N [ k ] h j i x [ k ] + n j from the fact that x i = x [ k ] for all i N [ k ] and x [ 0 ] = 0 (no transmission). Define
g j [ k ] : = i N [ k ] h j i = i N [ k ] q j i d j i γ / 2
as the effective channel coefficient from the nodes in N [ k ] to node j, where g j [ k ] = 0 if N [ k ] = Ø . Then, we have
y j = k = 1 m g j [ k ] x [ k ] + n j .
In the proposed scheme, node j first exploits its cached files F j for the two-stage IC as stated below.

3.2.1. First-Stage Interference Cancellation

The first-stage IC utilizes cached files as side information, i.e., this strategy directly removes interference signals caused by the files in F j by subtracting k = 1 , f [ k ] F j m g j [ k ] x [ k ] from the received signal y j . Then, after the first-stage IC, we have
y j ( 0 ) : = y j - k = 1 , f [ k ] F j m g j [ k ] x [ k ] = k = 1 , f [ k ] F F j m g j [ k ] x [ k ] + n j .
Suppose that node j attempts to decode file f [ l ] from y j ( 0 ) in (5), where f [ l ] F F j . Note that f [ l ] can be the desired file f j . Then, the average SINR value for decoding f [ l ] from y j ( 0 ) , denoted by η j [ l ] ( 0 ) , is given by
η j [ l ] ( 0 ) = E [ | g j [ l ] | 2 ] P 1 + k = 1 , f [ k ] F ( F j { f [ l ] } ) m E [ | g j [ k ] | 2 ] P
from the fact that the average received desired signal power (caused by file f [ l ] ) is given by E | g j [ l ] x [ l ] | 2 = E [ | g j [ l ] | 2 ] P and that the average received interference power (caused by the files in F ( F j { f [ l ] } ) ) is given by
E | k = 1 , f [ k ] F ( F j { f [ l ] } ) m g j [ k ] x [ k ] | 2 = k = 1 , f [ k ] F ( F j { f [ l ] } ) m E [ | g j [ k ] | 2 ] P ,
since x [ k ] is independent over different k and channel coefficients. Here, E [ | g j [ k ] | 2 ] is given by
E [ | g j [ k ] | 2 ] = E | i N [ k ] q j i d j i γ / 2 | 2 = i N [ k ] d j i - γ
from the fact that q j i is independent over different i whose variance is one. Therefore, up to the first-stage IC, node j is able to decode file f [ l ] from y j ( 0 ) if
log 2 1 + η j [ l ] ( 0 ) R ,
i.e., η j [ l ] ( 0 ) 2 R - 1 .

3.2.2. Second-Stage Interference Cancellation

The second-stage IC is related to so-called interference decoding [9], in which each node firstly decodes a subset of interfering files and then cancels out their contributions before decoding the intended file. Hence, some strong interfering files can be removed, which results in an improved SINR for decoding the intended file and, as a result, enhancing the outage-based throughput performance in Section 2.2.
For the second-stage IC, node j first decodes a subset of undesired files and then eliminates their contributions before decoding the desired file. Denote U j [ 1 : m ] as the set of cached file indices in F j and denote V j = [ v j ( 1 ) , v j ( 2 ) , v j ( m - M ) ] [ 1 : m ] as the set of ordered file indices of [ 1 : m ] U j satisfying E [ | g j [ v j ( l ) ] | 2 ] E [ | g j [ v j ( l ) ] | 2 ] for l l , where l , l [ 1 : m - M ] . This results in η j [ v j ( l ) ] ( 0 ) η j [ v j ( l ) ] ( 0 ) if l l . Consequently, node j cannot decode files f [ v j ( 2 ) ] , f [ v j ( 3 ) ] , , f [ v j ( m - M ) ] if it cannot decode file f [ v j ( 1 ) ] , i.e.,
log 2 1 + η j [ v j ( 1 ) ] ( 0 ) < R .
Therefore, in the proposed successive IC, node j first attempts to decode f [ v j ( 1 ) ] from y j ( 0 ) in (5).
Suppose that η j [ v j ( 1 ) ] ( 0 ) 2 R - 1 so that node j successfully decodes file f [ v j ( 1 ) ] . Then, by subtracting the interference signal caused by file f [ v j ( 1 ) ] from y j ( 0 ) in (5), we have
y j ( 1 ) = y j ( 0 ) - g j [ v j ( 1 ) ] x [ v j ( 1 ) ] = k = 1 , f [ k ] F ( F j { f [ v j ( 1 ) ] } ) m g j [ k ] x [ k ] + n j .
Similarly, node j cannot decode files f [ v j ( 3 ) ] , , f [ v j ( m - M ) ] if it cannot decode file f [ v j ( 2 ) ] from y j ( 1 ) . Therefore, node j now tries to decode f [ v j ( 2 ) ] from y j ( 1 ) in (11).
The second-stage IC sequentially performs the above procedure, i.e., successive IC with decoding order v j ( 1 ) , v j ( 2 ) , v j ( m - M ) until the desired file f j is decoded. If the desired file f j is not included in the set of decoded files, then an outage occurs for node j. Notice that the received signal of node j after successive IC of the decoded files v j ( 1 ) , , v j ( l - 1 ) is given by
y j ( l - 1 ) = k = 1 , f [ k ] F ( F j { f [ v j ( 1 ) ] , , f [ v j ( l - 1 ) ] } ) m g j [ k ] x [ k ] + n j ,
and the average SINR value for decoding file v j ( l ) from y j ( l - 1 ) is given by
η j [ v j ( l ) ] ( l - 1 ) = E [ | g j [ v j ( l ) ] | 2 ] P 1 + ( k = 1 , f [ k ] F ( F j { f [ v j ( 1 ) ] , , f [ v j ( l ) ] } ) m E [ | g j [ k ] | 2 ] ) P ,
where l [ 1 : m - M ] . By comparing (13) with (6), we can confirm the SINR improvement due to the second-stage IC.
The pseudocode of the second-stage IC for each node j is summarized in Algorithm 1.
Algorithm 1: Second-stage IC of the proposed scheme.
 1 Initialization: Set F j dec = Ø and construct y j ( 0 ) and  V j from the first-stage IC.
 2 For l = 1 : m - M
 3 If η j [ v j ( l ) ] ( l - 1 ) 2 R - 1
 4  Decode f [ v j ( l ) ] from y j ( l - 1 ) .
 5  Update F j dec F j dec { f [ v j ( l ) ] } .
 6  Construct y j ( l ) from y j ( l - 1 ) by cancelling interference caused by  f [ v j ( l ) ] .
 7  If f j F j dec
 8   Return ‘no outage’ for node j.
 9  End
 10 Else
 11   Return ‘outage’ for node j.
 12 End
 13 End
 14 Result: ‘no outage’ or ‘outage’ for node j.

4. Simulation Results

In this section, we numerically evaluate the achievable outage-based throughput of the proposed scheme in (2).

4.1. Caching Placement

To maximize the hit probability, we apply the recently established caching placement in [7]. For completeness, we briefly introduce the optimal caching placement proposed in [7] as below:
Remark 2
(Caching placement optimization).In [7], the optimal probabilistic caching placement that maximizes the hit probability has been proposed under a homogeneous Poisson Point Process (PPP) with node density λ. Let ρ [ k ] denote the caching probability of file k at each node, where k = 1 m ρ [ k ] = M . Then, the optimal caching probability that maximizes the hit probability within the radius τ is represented by ρ [ k ] = min { max { ρ [ k ] ( μ ) , 0 } , 1 } , where
ρ [ k ] ( μ ) = - ω μ p r ( f [ k ] ) exp ( 1 + π λ τ 2 ) π λ τ 2 + 1 π λ τ 2 + 1 .
Here, ω denotes the Lambert W function and μ can be obtained by the bisection search method, satisfying k = 1 m ρ [ k ] = M .
In addition, as a simple baseline caching placement, we also consider a random caching placement in which each node caches M different files uniformly at random among m files in the library.

4.2. Simulation Environment

In simulations, we set a = 10 , n = 100 , and γ = 4 . Recall that a 2 , n, and γ denote the network area, the number of nodes, and the path-loss exponent, respectively. We assume that the short-term fading q j i follows CN ( 0 , 1 ) , i.e., Rayleigh fading, and the file popularity distribution follows a Zipf distribution with the Zipf exponent ν [22]. That is,
p r ( f [ k ] ) = k - ν l = 1 m l - ν .
The simulations were implemented in Matlab. Since we assumed static network topology, the path-loss component between nodes is fixed during the entire time block, i.e., 1 d j i γ / 2 , but the short-term fading component q j i [ t ] varies over time slots. We further average out the outage-based throughput performance by conducting simulation for a large enough number of time blocks, i.e., averaging for random network topology. The parameters R and δ are numerically optimized to maximize the outage-based throughput in (2) for each simulation. Furthermore, we assume an 8-bit uniform analog-to-digital converter (ADC) at each node such that the maximum signal strength of each ADC is set as the average received signal power transmitted at a unit distance. Therefore, if d j i < 1 , the received signal power is saturated with the same value as when d j i = 1 . For the same reason, if d j i > 4 , the received signal power will be less than the lowest signal level of each ADC, and signal detection is impossible for this case. Table 1 summarizes the parameters used in simulations.
To demonstrate the performance of the proposed scheme, we compare it with three benchmark schemes. As a baseline scheme, we first consider the conventional D2D file delivery without any IC, which is denoted as ‘no IC’. In [6,8], IC by utilizing cached files as side information has been proposed, which is the second benchmark scheme, denoted as ‘IC with cached files’. It is worthwhile mentioning that IC or successive IC by interference decoding of undesired files has been widely adopted in the literature, for examples, see [9,10]. In addition, cooperative transmission gain from multiple nodes sending the same file has been utilized in [4,8] for caching networks, which can be adopted in IC or successive IC by interference decoding. Hence, the last benchmark scheme combines the above two techniques, which is simply denoted as ‘IC by interference decoding’.

4.3. Numerical Results and Discussions

In this subsection, we present our numerical results and discuss the performance of the proposed scheme with respect to the parameters such as Zipf exponent, caching capability, and library size. We further discuss the effect of channel estimation error on the performance of the proposed scheme.

4.3.1. Throughput Comparison with Respect to the Zipf Exponent

To evaluate the performance tendency of the proposed scheme with respect to the Zipf exponent ν , we plot achievable throughputs when ν = 1.4 and ν = 2 for the max-hit caching placement in Figure 2 and for the random caching placement in Figure 3. Note that the cases when ν = 1.7 are depicted in Figure 4. From these figures, it is observed that throughputs increase with ν regardless of the choice of caching placement strategies or interference cancellation schemes. This is because the gain from cooperative D2D file delivery increases with ν , since the probability that each node sends the same popular file increases with ν . Furthermore, in the case of the max-hit caching placement, throughputs of ‘IC with cached files’ increase significantly with ν compared to those of ‘IC by interference decoding’, because the amount of interfering signals that each node can remove by using cached files increases as the popularity of files is concentrated on a certain subset of files. On the other hand, in a similar vein, it is observed that throughput improvement attained from ‘IC by interference decoding’ becomes dominant in the case of random caching placement compared to max-hit caching placement, since non-optimal caching placement reduces the gain of the cache-enabled IC. More importantly, the ‘Proposed IC’ scheme provides a synergistic throughput improvement compared to the cases of ‘IC with cached files’ and ‘IC by interference decoding’ for a wide range of ν .

4.3.2. Throughput Comparison with Respect to Caching Capability

To evaluate the performance tendency with respect to caching capability, we plot achievable throughputs for m = 50 and m = 20 in Figure 4 and Figure 5, respectively, when M = 10 and ν = 1.7 . In particular, Figure 4 plots achievable throughputs of the considered schemes as a function of P when m = 50 , M = 10 , and v = 1.7 . As expected, the max-hit caching placement achieves an improved throughput compared to the random caching placement for ‘IC with cached files’ and ‘Proposed IC’, but it achieves worse throughputs for ‘IC by interference decoding’ and ‘No IC’ due to the fact that cached files cannot be used as side information while the total amount of interfering signals at each node increases because of the maximized hit probability due to the optimal caching placement. Furthermore, again, the ‘Proposed IC’ scheme provides a significant throughput improvement compared to the cases of ‘IC with cached files’, ‘IC by interference decoding’, and ‘no IC’, and this is true independent of caching placement strategies.
For instance, the proposed scheme provides 26 % , 59.3 % , and 283.1 % throughput improvements compared to ‘IC with cached files’, ‘IC by interference decoding’, and ‘no IC’ for the max-hit caching placement when P = 20 dB, respectively, and it also provides 47.5 % , 20 % , 115.3 % improvements compared to ‘IC with cached files’, ‘IC by interference decoding’, and ‘no IC’ for the random caching placement when P = 20 dB, respectively.
As seen in Figure 5, similar tendency can be observed when m = 20 , M = 10 , and ν = 1.7 , except the fact that the gain from ‘IC with cached files’ relatively increases. This is because the frequency with which cached files are used as side information increases as the entire file size m is reduced with fixed M.

4.3.3. Throughput comparison with Respect to the Library Size

Figure 6 plots achievable throughputs with respect to the library size m when M = 10 , P = 10 dB, and ν = 1.7 . As seen in the figure, the throughput enhancement attained by the ‘Proposed IC’ scheme becomes larger as the cache memory size M is relatively smaller than the entire file size m, as discussed in Section 4.3.2. Furthermore, it is observed that the performance gap between ‘Proposed IC’ and ‘IC with cached files’ increases with m. Note that as m increases, the optimized maximum distance for D2D file delivery becomes larger so that there might be strong interfering nodes between D2D file delivery pairs. For such cases, ‘IC by interference decoding’, which is also implemented in the proposed scheme, can efficiently remove such strong interfering signals and thus play an important role in improving throughputs, especially for large m.

4.3.4. Impacts of Imperfect Channel Estimation at The receiver Side

Throughout the paper, we have assumed perfect channel state information at the receiver side (CSIR), but channel estimation error may exist in practice. Therefore, here we examine the impacts of channel estimation error on throughputs. Specifically, the mean squared error (MSE) of the channel estimation is assumed to be given by 0.05 for all the channel coefficients, i.e., the short-term fading q j i is given by q j i = q ¯ j i + q ˜ j i , where the estimated channel coefficient q ¯ j i follows CN ( 0 , 1 ) while the channel estimation error q ˜ j i follows CN ( 0 , 0.05 ) , for all i , j [ 1 : n ] . Figure 7 and Figure 8 plot throughputs as a function of P when m = 50 , M = 10 , and ν = 1.7 with and without channel estimation error at the receiver side, where the max-hit caching placement and the random caching placement are used, respectively. The results demonstrate that the overall performance tendency in the presence of channel estimation error is similar to that with perfect CSIR in both the caching placement strategies. Furthermore, the ‘Proposed IC’ scheme still provides a synergistic throughput improvement over the other schemes, even in the presence of channel estimation error.

5. Concluding Remarks

In this paper, we developed a new file delivery scheme for wireless D2D caching networks, consisting of cooperative transmission at the transmitter side and two-stage IC at the receiver side. Specifically, in the proposed two-stage IC, each node first removes interfering signals by using cached files as side information and then performs successive IC in which the decoding order is determined by the received signal power. Numerical simulations demonstrated that the proposed IC scheme significantly outperforms the conventional scheme regardless of the choice of caching policies, and the performance gain due to the proposed scheme increases as the cache memory size M becomes relatively smaller compared to the entire file size m.
In practice, we might need to consider dynamics of network topologies and file popularity distributions. For such a case, the procedure of file request and selection of sender nodes needs to be modified depending on the node mobility. In addition, although most of the caching research in the literature, including our work, assumed a static file popularity distribution; in practice, some new files will be appeared and old files or non-popular files will be disappeared over time, which results in a time-varying file popularity distribution [23]. Therefore, file placement in each cache memory should be periodically updated. For such a case, signaling overhead or communication cost for such a periodic update should be reflected in overall caching gain.

Author Contributions

S.-W.J. and S.H.C. conceived and designed this study; S.-W.J. derived theorems and wrote the paper; S.H.C. performed and analyzed simulations and edited the manuscript. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Acknowledgments

The work of S.-W.J. was supported by the Electronics and Telecommunications Research Institute (ETRI) grant funded by the Korean Government (18ZF1100, Wireless Transmission Technology in Multi-point to Multi-point Communications). The work of S.H.C. was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT) (No. NRF-2018R1C1B5045463) and by the Research Grant of Kwangwoon University in 2019.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Cisco. Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2016–2021. In Cisco Public Information; Cisco: San Jose, CA, USA, 2017. [Google Scholar]
  2. Shanmugam, K.; Golrezaei, N.; Dimakis, A.G.; Molisch, A.F.; Caire, G. Femtocaching: Wireless content delivery through distributed caching helpers. IEEE Trans. Inf. Theory 2013, 59, 8402–8413. [Google Scholar] [CrossRef]
  3. Chae, S.H.; Choi, W. Caching placement in stochastic wireless caching helper networks: Channel selection diversity via caching. IEEE Trans. Wireless Commun. 2016, 15, 6626–6637. [Google Scholar] [CrossRef] [Green Version]
  4. Chen, Z.; Lee, J.; Quek, T.Q.S.; Kountouris, M. Cooperative caching and transmission design in cluster-centric small cell networks. IEEE Trans. Wireless Commun. 2017, 16, 3401–3415. [Google Scholar] [CrossRef] [Green Version]
  5. Ji, M.; Caire, G.; Molisch, A.F. Wireless device-to-device caching networks: Basic principles and system performance. IEEE J. Select. Areas Commun. 2016, 34, 176–189. [Google Scholar] [CrossRef] [Green Version]
  6. Xia, B.; Yang, C.; Cao, T. Modeling and analysis for cache-enabled networks with dynamic traffic. IEEE Commun. Lett. 2016, 20, 2506–2509. [Google Scholar] [CrossRef] [Green Version]
  7. Chen, Z.; Pappas, N.; Kountouris, M. Probabilistic caching in wireless D2D networks: Cache hit optimal versus throughput optimal. IEEE Commun. Lett. 2017, 21, 584–587. [Google Scholar] [CrossRef] [Green Version]
  8. Liu, Y.; Yang, C.; Yao, Y.; Xia, B.; Chen, Z.; Li, X. Interference management in cache-enabled stochastic networks: A content diversity approach. IEEE Access 2017, 5, 1609–1617. [Google Scholar] [CrossRef]
  9. Etkin, R.H.; Tse, D.N.C.; Wang, H. Gaussian interference channel capacity to within one bit. IEEE Trans. Inf. Theory 2008, 54, 5534–5562. [Google Scholar] [CrossRef] [Green Version]
  10. Zhang, X.; Haenggi, M. The Performance of Successive Interference Cancellation in Random Wireless Networks. IEEE Trans. Inf. Theory 2014, 60, 6368–6388. [Google Scholar] [CrossRef] [Green Version]
  11. Jeon, S.-W.; Hong, S.-N.; Ji, M.; Caire, G.; Molisch, A.F. Wireless multihop device-to-device caching networks. IEEE Trans. Inf. Theory 2017, 63, 1662–1676. [Google Scholar] [CrossRef]
  12. Do, T.A.; Jeon, S.-W. Shin, W.-Y. How to cache in mobile hybrid IoT networks? IEEE Access 2019, 7, 27814–27828. [Google Scholar] [CrossRef]
  13. Prabh, K.S.; Abdelzaher, T.F. Energy-conserving data cache placement in sensor networks. ACM Trans. Sensor Netw. 2004, 1, 178–203. [Google Scholar] [CrossRef]
  14. Dimokas, N.; Katsaros, D.; Manolopoulos, Y. Cooperative caching in wireless multimedia sensor networks. Mobile. Netw. Appl. 2008, 13, 337–356. [Google Scholar] [CrossRef] [Green Version]
  15. Tiglao, N.M.; Grilo, A. An analytical model for transport layer caching in wireless sensor networks. Perform. Eval. 2012, 69, 227–245. [Google Scholar] [CrossRef]
  16. Alipio, M.; Tiglao, N.M.; Grilo, A.; Bokhari, F.; Chaudhry, U.; Qureshi, S. Cache-based transport protocols in wireless sensor networks: A survey and future directions. J. Netw. Comput. Appl. 2017, 88, 29–49. [Google Scholar] [CrossRef]
  17. Vural, S.; Navaratnam, P.; Wang, N.; Wang, C.; Dong, L.; Tafazolli, R. In-network caching of Internet-of-Things data. In Proceedings of the IEEE ICC, Sydney, Australia, 10–14 June 2014. [Google Scholar]
  18. Niyato, D.; Kim, D.I.; Wang, P.; Song, L. A novel caching mechanism for Internet of Things (IoT) sensing service with energy harvesting. In Proceedings of the IEEE ICC, Kuala Lumpur, Malaysia, 23–27 May 2016. [Google Scholar]
  19. Song, F.; Ai, Z.-Y.; Li, J.-J.; Pau, G.; Collotta, M.; You, I.; Zhang, H.-K. Smart collaborative caching for information-centric IoT in fog computing. Sensors 2017, 17, 2512. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  20. Sun, X.; Ansari, N. Dynamic resource caching in the IoT application layer for smart cities. IEEE Internet Things 2018, 5, 606–613. [Google Scholar] [CrossRef]
  21. 3rd Generation Partnership Project (3GPP). Study on Provision of Low-Cost Machine-Type Communications (MTC) User Equipments (UEs) based on LTE. TR36.888 V12.0.0. June 2013. Available online: http://www.3gpp.org/ftp/Specs/archive/36_series/36.888/36888-c00.zip (accessed on 17 December 2019).
  22. Breslau, L.; Cao, P.; Fan, L.; Phillips, G.; Shenker, S. Web caching and Zipf-like distributions: Evidence and implications. In Proceedings of the IEEE INFOCOM, New York, NY, USA, 21–25 March 1999. [Google Scholar]
  23. Song, H.-G.; Chae, S.H.; Shin, W.-Y.; Jeon, S.-W. Predictive caching via learning temporal distribution of content requests. IEEE Commun. Lett. Dec. 2019, 23, 2335–2339. [Google Scholar] [CrossRef]
Figure 1. Example of file request message and file transmission. (a) file request message, (b) file transmission.
Figure 1. Example of file request message and file transmission. (a) file request message, (b) file transmission.
Sensors 20 00780 g001
Figure 2. Throughputs as a function of P when m = 50 and M = 10 , where the max-hit caching placement is used.
Figure 2. Throughputs as a function of P when m = 50 and M = 10 , where the max-hit caching placement is used.
Sensors 20 00780 g002
Figure 3. Throughputs as a function of P when m = 50 and M = 10 , where the random caching placement is used.
Figure 3. Throughputs as a function of P when m = 50 and M = 10 , where the random caching placement is used.
Sensors 20 00780 g003
Figure 4. Throughputs as a function of P when m = 50 , M = 10 , and ν = 1.7 .
Figure 4. Throughputs as a function of P when m = 50 , M = 10 , and ν = 1.7 .
Sensors 20 00780 g004
Figure 5. Throughputs as a function of P when m = 20 , M = 10 , and ν = 1.7 .
Figure 5. Throughputs as a function of P when m = 20 , M = 10 , and ν = 1.7 .
Sensors 20 00780 g005
Figure 6. Throughputs as a function of m when M = 10 , P = 10 dB, and ν = 1.7 .
Figure 6. Throughputs as a function of m when M = 10 , P = 10 dB, and ν = 1.7 .
Sensors 20 00780 g006
Figure 7. Throughputs as a function of P when m = 50 , M = 10 , and ν = 1.7 with and without channel estimation error at the receiver side, where the max-hit caching placement is used.
Figure 7. Throughputs as a function of P when m = 50 , M = 10 , and ν = 1.7 with and without channel estimation error at the receiver side, where the max-hit caching placement is used.
Sensors 20 00780 g007
Figure 8. Throughputs as a function of P when m = 50 , M = 10 , and ν = 1.7 with and without channel estimation error at the receiver side, where the random caching placement is used.
Figure 8. Throughputs as a function of P when m = 50 , M = 10 , and ν = 1.7 with and without channel estimation error at the receiver side, where the random caching placement is used.
Sensors 20 00780 g008
Table 1. Simulation parameters.
Table 1. Simulation parameters.
ParameterAssumption
Network area, a × a 100
Number of nodes, n100
Path-loss exponent, γ 4
Channel modelRayleigh fading
Channel estimationPerfect at the receiver side, unknown to the transmitter side
File popularity distributionZipf distribution
Analog to digital converter (ADC) resolution8 bits

Share and Cite

MDPI and ACS Style

Jeon, S.-W.; Chae, S.H. Two-Stage Interference Cancellation for Device-to-Device Caching Networks. Sensors 2020, 20, 780. https://doi.org/10.3390/s20030780

AMA Style

Jeon S-W, Chae SH. Two-Stage Interference Cancellation for Device-to-Device Caching Networks. Sensors. 2020; 20(3):780. https://doi.org/10.3390/s20030780

Chicago/Turabian Style

Jeon, Sang-Woon, and Sung Ho Chae. 2020. "Two-Stage Interference Cancellation for Device-to-Device Caching Networks" Sensors 20, no. 3: 780. https://doi.org/10.3390/s20030780

APA Style

Jeon, S. -W., & Chae, S. H. (2020). Two-Stage Interference Cancellation for Device-to-Device Caching Networks. Sensors, 20(3), 780. https://doi.org/10.3390/s20030780

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop