Professional Documents
Culture Documents
D2D Communications in Heterogeneous Networks With Full-Duplex Relays and Edge Caching
D2D Communications in Heterogeneous Networks With Full-Duplex Relays and Edge Caching
Abstract—This paper studies the joint optimal resource requested and accessed at different levels [3]. Among all the
allocation and probabilistic caching design for device-to- measured contents, a small percentage of total contents present
device (D2D) communications in a wireless heterogeneous high access demands by a majority of users, whereas a large
network with full-duplex (FD) relays. In particular, popular
contents can be cached at user devices as well as at relays portion of the contents present rather low access demands [3].
that are located close to users. A user can request contents In particular, the information and communications tech-
from another user via D2D communications and also from nology industries is under tremendous pressure to seek new
a nearby relay equipped with FD radios. In the case that architectures, new deployment models, and new services for
there is a caching miss (i.e., the requested contents are not
the industrial IoT ecosystem, which is an evolving enterprise
found at the other users/relays within the coverage range),
users can connect to the base station via a relay by using consisting of massive smart objects, intelligent devices, smart
the FD communication technology. Subsequently, we de- phones, different types of sensors, machines, and instruments
velop mathematical models to analyze the throughput per- [4]–[7]. The intelligent environment architecture can achieve
formance with edge caching where both cochannel system the goals of connecting a broad community of equipment,
level interference and FD self-interference are considered.
sensors, and machines to serve their demands for monitoring,
Due to the high complexity of stochastic optimization, we
develop low-complexity optimization formulation by decom- control, and maintenance. However, cloud radio access network
posing the original problem into three simple subproblems (cloud-RAN) technology, or C-RAN, still faces the inevitable
that can be efficiently solved. Finally, numerical results are problems, such as long latency due to the long distance from
presented to illustrate developed theoretical findings in the devices to the Internet cloud, fronthaul/backhaul bandwidth
paper and significant performance gains of the throughput
limitation, high energy consumption, etc. Recently, fog com-
performance.
puting has become a promising technology for the industrial
Index Terms—Caching design, device-to-device (D2D) IoT. It puts a substantial amount of storage, communication,
communications, full-duplex (FD) communications, control, configuration, measurement, and management at the
throughput analysis, throughput maximization.
edge of the network, rather than establishing channels for the
I. INTRODUCTION centralized cloud storage and utilization as in the conventional
C-RANs [8], [9]. Hence, fog computing can overcome the
N THE future, Internet of Things (IoT) in 5G wireless net-
I works, emerging broadband, and multimedia wireless appli-
cations will demand an unprecedented capacity escalation and
disadvantages of the C-RANs with the fronthaul/backhaul
constraints. However, we would design an advantageous
fog-computing architecture by considering the supporting
stringent quality of service (QoS) in cellular networks. To tackle technologies, namely caching placement, device-to-device
these challenges, advanced technologies are needed to enhance (D2D) communications and full-duplex (FD) communications.
the capacity and QoS in cellular networks [1], [2]. Further, re- The combination of D2D communications and caching place-
cent studies and measurements reveal that different contents are ment in wireless heterogeneous networks (HetNets) has been
recently proposed and studied [10], [11]. In [10], Golrezaei
Manuscript received January 29, 2018; revised May 18, 2018; ac-
cepted June 22, 2018. Date of publication July 12, 2018; date of current et al. move the data storage from the cloud to the edges that
version October 3, 2018. This work was supported by the National Sci- are special nodes with a large storage capacity; and hence, this
ence Foundation under Grant NeTS-1423348, Grant NeTS-1423408, reduces the content downloading delay significantly. Then, the
Grant EARS-1547312, and Grant EARS-1547330. Paper no. TII-17-
2865. (Corresponding author: Le Thanh Tan.) authors extend to apply both coding in the delivery phase and
L. T. Tan and R. Q. Hu are with the Department of Electrical and spatial reuse in a D2D network [11]. Other works develop prob-
Computer Engineering, Utah State University, Logan, UT 84322 USA abilistic caching policies where the relays act as the friendly
(e-mail: tan.le@usu.edu; rose.hu@usu.edu).
Y. Qian is with the Department of Electrical and Computer Engineer- helpers [12]–[14]. In particular, these works aim for optimiz-
ing, University of Nebraska–Lincoln, Lincoln, NE 84322 USA (e-mail: ing the system performance in terms of latency, probability of
yqian2@unl.edu). correct reception, and service providers’ profit. In [15], Wang
Color versions of one or more of the figures in this paper are available
online at http://ieeexplore.ieee.org. et al. conducted theoretical analysis for the push-based content
Digital Object Identifier 10.1109/TII.2018.2855187 delivery methods where the most popular contents are pushed
1551-3203 © 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Indian Institute of Technology - BHUBANESWAR. Downloaded on October 06,2021 at 05:25:05 UTC from IEEE Xplore. Restrictions apply.
4558 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 14, NO. 10, OCTOBER 2018
through broadcasting to alleviate the cellular data bottleneck. metric and formulate the optimization problem in Section IV.
However, there have been few studies in which both relays and The suboptimal solution is presented in Section V. Section VI
terminal users can cooperatively store the multimedia contents. presents performance results followed by concluding remarks
To cooperatively perform caching at user and relay levels, one in Section VII.
must carefully select the contents to be cached at these levels
and hence enhance the probability of cache hits as well as the II. BACKGROUND
overall system performance.
Furthermore, FD radio technology has been considered as a In this section, we present the current status of caching-aided
promising 5G technology to greatly improve the capacity and HetNet with D2D communications in 5G standards and indus-
reduce the transmission delay [16], [17]. By employing the ad- trial applications.
vanced FD transceiver, each user can transmit and receive data
simultaneously on the same time/frequency resource [18]. In A. Network Architecture
particular, FD technology can be integrated into next-generation Compared with the 4G/LTE network, 5G network is expected
wireless networks, e.g., small cell networks and heterogeneous to serve the rapidly growing demands for the thousandfold
wireless networks [19], to significantly enhance the network growth of mobile data traffic [23]. Mobile network operators
performance. Practical FD transceivers, however, still suffer and their suppliers are actively developing strategies, such as
from self-interference, which is caused by power leakage from increasing additional spectrum, seeking advanced and sophisti-
a transmitter to a receiver. Self-interference can indeed lead to cated technologies, using diverse kinds of infrastructures, such
serious communication performance degradation. Despite re- as pico/indoor femto BSs, relays, distributed antennas, WiFi, and
cent advances on self-interference cancelation techniques [16], D2D nodes, and offloading traffic to alternative access networks.
self-interference still exists due to the hardware limitations and These technologies aim to increase coverage, boost network ca-
channel estimation errors. Employment of FD transceivers for pacity, and cost-effectively bring contents closer to users.
more efficient spectrum access design in wireless networks has HetNet is a key attribute to future wireless networks. It can
been extensively explored in the literature [16]–[21]. Also, re- bring the cell site closer to end users and shorten the radio
cent works have been focused on solutions targeting FD inter- transmission distance. HetNet is comprised of a variety of radio
ference footprint reduction and the potential benefits brought by access technologies with different formats and aspects. Many
the adoption of caching to improve the FD throughput [21], [22]. applications prefer to deploy relays, distributed antennas, and
In this paper, we make a further bold step in designing, an- small cellular access points (such as femtocells, picocells, metro
alyzing, and optimizing the cooperative caching placement at cells, and microcells) in residential homes, subways, enterprises,
both user and relay levels and resource allocation, considering and hotspot areas. In particular, cell sizes have been progres-
the constraints of self-interference at relays and the interference sively shrinking from the order of hundreds of square kilometers
footprint caused by many FD links. We assume that both the BSs to a fraction of 1 m2 or less. As such network capacity can be
and the users operate in the half-duplex (HD) mode, whereas the effectively increased when the cell becomes smaller. Further-
relays operate in the FD mode. Specifically, the contributions more, the small cell can enhance spatial reuse and offload traffic
of this paper can be summarized as follows. First, we model the efficiently.
HetNets with D2D communications and edge caching, where There exist rich research literature in HetNets (e.g., see [24]
caching placements are at both user and relay levels. Cache hit and references therein), where various aspects including in-
occurs if requested content is received from a local user, or a terference management, cell association, stochastic network
nearby user, via D2D communications, or a relay. In the case modeling, and energy efficiency have been investigated. Up-
of cache miss, the relay employs the FD communications to link and downlink imbalance in HetNets can cause various new
simultaneously receive the requested content from the BS and types of interferences [1]. Novel cell association mechanisms
send it to the requesting user. We further formulate the joint and architectures shall be developed, where recent advanced
optimal caching and resource allocation problem to maximize techniques, namely flexible uplink/downlink communications,
the system throughput under the constraints of limited storage massive multiple-input multiple-output, D2D communications,
capacities at user and relay levels, the content popularity, the full-duplexing, etc., can be utilized [1]. Network modeling ap-
transmit powers at both the users and the relays, and the quality proaches based on stochastic geometric tools have recently
of self-interference cancelation (QSIC). Then, we analyze the gained enormous attention in both academia and industry [25].
throughput and propose the suboptimal caching scheme to al- At the same time, the rapid developments and fundamental in-
leviate the high complexity of joint optimal caching placement sights have been corroborated by industry field trials and obser-
and resource allocation. Finally, we present numerical results vations from extremely detailed simulation tools [26]. All these
to illustrate performance of the proposed algorithms and the provide effective mechanisms for evaluating the performance of
throughput gains due to optimal parameter configuration. cellular networks.
The remainder of this paper is organized as follows.
Section II describes the brief background of caching-aided
HetNet with D2D communications in 5G standards and indus- B. Network Protocol
trial applications. Section III describes the system model. We Caching is deemed one of the most important research top-
define the caching-aided throughput as the main performance ics in content delivery networks [10]–[14]. It helps lower down
Authorized licensed use limited to: Indian Institute of Technology - BHUBANESWAR. Downloaded on October 06,2021 at 05:25:05 UTC from IEEE Xplore. Restrictions apply.
TAN et al.: D2D COMMUNICATIONS IN HETEROGENEOUS NETWORKS WITH FULL-DUPLEX RELAYS AND EDGE CACHING 4559
devices that request this information. Again the requesting users contents are assumed to have the equal size of L and the caching
can determine whether to keep the received contents for serving capacity of LMR for all relays are the same, where MR < N .
the nearby users or not. In this paper, throughput is the key QoS PR = [pR 1 , p2 , . . . , pi , . . . , pN ] is defined as the caching place-
R R R
performance metric that we are considering. ment probabilities at relays, where pR i is the percentage of re-
lays that cache content i, 0 ≤ pR ≤ 1 for i = 1, 2, . . . , i, . . . , N
i
and N i=1 ip R
≤ M R . The distribution of relays that have con-
III. SYSTEM MODELS tent i follows the PPP with density λR pR i . Furthermore, all
In this section, we first introduce a two-tier HetNet with un- the users are assumed to have the same caching capacity LMU .
derlay D2D communications and edge caching, as illustrated in PU = [pU1 , pU2 , . . . , pUi , . . . , pUN ] is defined as the caching place-
Fig. 1, where relays and users are spatially distributed accord- ment at the users, where pUi is the portion of users that have
Authorized licensed use limited to: Indian Institute of Technology - BHUBANESWAR. Downloaded on October 06,2021 at 05:25:05 UTC from IEEE Xplore. Restrictions apply.
4560 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 14, NO. 10, OCTOBER 2018
N U
content i, 0 ≤ pUi ≤ 1 for i = 1, 2, . . . , N , and i=1 pi ≤
by the D2D cache hits. We denote by pUhit,i and pUsucc,i the
MU . Similarly, the distribution of users that have content i also D2D cache hit probability and the success probability of D2D
follows the PPP with density αλU pUi . transmission for file i, respectively. The third term of (2) is the
throughput achieved by the relay cache hits. Here, we define
B. Content Access Protocol pR R
hit,i and psucc,i as the relay cache hit probability and the suc-
The content access protocol includes four cases, which are cess probability of relay-user transmission for file i, respectively.
presented in the following. An example including four cases is The last term in (2) expresses the throughput achieved by cache
presented in Fig. 1. misses. phit,i and pFsucc D
,i , respectively, denote the total cache hit
Case 1—Local cache hit: The requested content can be found probability and the success probability of FD communications.
from user’s own cache. We can move on to determine case 2 cache hit probability
Case 2—D2D cache hit: Local cache miss but the requested pUhit,i , case 3 cache hit probability pR hit,i , case 1 + case 2 +
content can be found from a nearby user within distance RU . If case 3 cache hit probability phit,i , case 2 content transmission
there is at least one user who has the requested content, the user success probability pUsucc,i , case 3 content transmission success
will establish the D2D transmission with the nearest user with probability pR succ,i , and case 4 content transmission success
the cached content. probability pFsuccD
,i in the following.
Case 2—Relay cache hit: Both case 1 and case 2 fail but the 1) Cache Hit Probabilities pU , pR , and phit, i : Based on
requested content can be provided by a nearby relay within a hit, i hit, i
[25] and [29], the distribution of file i at user level follows the
radius RR .
PPP with the density of (1 − α)λU pUi . The probability that file
Case 4—Cache miss: Cases 1–3 all fail. The requested con-
i has D2D cache hit is given as follows:
tent has to be provided by a BS via a relay. Here, at least one
relay within a distance of RR from the user performs FD com- pUhit,i = 1 − exp −π (1 − α) λU pUi RU2 . (3)
munications to simultaneously receive the content from the BS
and transmit it to the requesting user. This helps reduce the Similarly, the distribution of file i at relay level follows the PPP
access latency and also helps users to save power. with the density of λR pR i . The probability that file i has a relay
cache hit is given as follows:
IV. CACHE-AIDED HETNET WITH D2D COMMUNICATIONS
hit,i = 1 − exp −πλR pi RR .
pR R 2
(4)
AND FD RELAYS
Authorized licensed use limited to: Indian Institute of Technology - BHUBANESWAR. Downloaded on October 06,2021 at 05:25:05 UTC from IEEE Xplore. Restrictions apply.
TAN et al.: D2D COMMUNICATIONS IN HETEROGENEOUS NETWORKS WITH FULL-DUPLEX RELAYS AND EDGE CACHING 4561
D2D transmission, and σ 2 is the thermal noise power. Ij 0 is the Note that the difference between Ik 0 j 0 and IkFD
0j0
comes from the
total interference, which is expressed as follows: fact that IkFD includes the interference caused by transmission
0j0
between the BS and relay k0 .
Ij 0 = PD h2j j 0 d−β
j j0 +
1
PR h2k j 0 d−β 1
k j0 SINRFDR is the SINR at relay k0 from the BS given as
j ∈Φ Uj \{j̄ 0 j 0 } k ∈Φ R
j
0 0
PBS h2BSk0 d−β 2
k ∈Φ R
k 0 \k 0 l∈Φ R
interference caused by the base station BSl (relay l is associ- k0
ated with BSl ) that user j0 is associated with. Relay l is in the (16)
user j0 coverage but performs FD communications to help other
Here the first term in (16) is the interference caused by the
users. Note that PBS is the transmit power of the BS and β2 is
transmission of user j, which is in the set ΦR U
k 0 falling in the
the pathloss exponent for transmission between the BS and the
coverage of relay k0 . The second term in (16) presents the self-
users.
interference caused by leakage power from the transmission of
Similarly, we calculate the success probability pR succ,i of a relay k0 , and ξ is the parameter of QSIC (see [20] for detailed
relay k0 content transmission in case 3 as follows:
modeling and cancelation of self-interference). The third term
succ,i = Pr SINRj 0 > φ .
pR RU
(9) in (16) represents the interference caused by the transmission
of relay k ∈ ΦR k 0 , where Φk 0 is the set of active relays within
R
SINRRj0
U
is the SINR at user j0 from relay k0 , which can be coverage of the considered relay k0 . The fourth term in (16)
expressed as follows: represents the interference from transmission between the base
PR h2k 0 j 0 d−β 1
k 0j0
station BSl and relay l. Here, relay l is within relay k0 ’s coverage
j0 =
SINRR U
. (10) and performs FD communications to help other users.
σ 2 + Ik 0 j 0
The interference Ik 0 j 0 is calculated as follows: B. Throughput Analysis
Ik 0 j 0 = PD h2j j 0 d−β
j j0 +
1
PR h2k j 0 d−β
k j0
1
This section presents the mathematical derivations of the fol-
j ∈Φ Uj \j 0
0
k ∈Φ R
j \k 0
0
lowing:
1) the success probability of D2D transmission for file i in
+ PBS h2BSl j 0 d−β
BSl j 0 1Θ l .
2
(11) case 2 pUsucc,i ;
j \k 0
l∈Φ R
0
2) the success probability of relay-user transmission for file i
in case 3 pR
succ,i ; and
Furthermore, the success of the FD transmission pFD
succ,i when 3) the success probability of FD communications in case 4
a cache miss occurs (case 4) is determined as follows: pFD
succ,i .
succ,i = Pr SINRj 0 > φ and SINRR > φ .
pFD FD FD 1) Case 2: The Success Probability of D2D Transmission
(12)
pUsucc, i : From (6)–(8), we have
Here, each transmission consists of two hops, where the first hop
is the communication from the BS to the relay and the second φ 2
hop is the communication from the relay to the user. SINRFD pUsucc,i = Pr h2j¯0 j 0 dj−β 1
¯0 j 0 ≥ σ + ID + IR + IB
j 0 is PD
the SINR at user j0 from a nearby relay k0 , which is given as
follows: φσ 2 djβ¯01j 0 φ β1
= exp − E exp − dj¯0 j 0 ID
PR h2k 0 j 0 d−β 1
k 0j0
PD PD
SINRFD
j0 = . (13)
σ 2 + IkFD
0j0 φ β1 φ β1
E exp − d IR E exp − d IB
The interference IkFD is calculated as follows: PD j¯0 j 0 PD j¯0 j 0
0j0
(17)
−β 1
IkFDj = P D h 2
j j d + PR h2k j 0 d−β 1
PD h2j j 0 d−β
j j k j0
where ID = j j 0 , IR =
0 0 0 0
j ∈Φ Uj \j 0 k ∈Φ R j ∈Φ Uj \{j̄ 0 j 0 }
1
k ∈Φ R PR h2k j 0
j \k 0
0 0 0 j0
d−β
k j 0 , and IB =
1
l∈Φ R PBS h2B S l j 0 d−β
BSl j 0 1Θ l . E(•) is the ex-
2
Authorized licensed use limited to: Indian Institute of Technology - BHUBANESWAR. Downloaded on October 06,2021 at 05:25:05 UTC from IEEE Xplore. Restrictions apply.
4562 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 14, NO. 10, OCTOBER 2018
Authorized licensed use limited to: Indian Institute of Technology - BHUBANESWAR. Downloaded on October 06,2021 at 05:25:05 UTC from IEEE Xplore. Restrictions apply.
TAN et al.: D2D COMMUNICATIONS IN HETEROGENEOUS NETWORKS WITH FULL-DUPLEX RELAYS AND EDGE CACHING 4563
V. THROUGHPUT MAXIMIZATION
Algorithm 1: THROUGHPUT OPTIMIZATION IN HETNET
In order to maximize the overall throughput defined in P1, WITH EDGE CACHING AND FULL-DUPLEX RADIO.
simulated annealing method is used to approximate the global 1: Initialization of PU = {pUi }, PR = {pR i }, PD and PR .
optimal solutions to the original nonconvex stochastic problem 2: For given PR = {pR i }, P D and P R , find the optimal
P1. However, this method has a very high complexity. Hence, U,∗
PU,∗ = {pi } by solving P2.
we propose the suboptimal scheme to solve this problem. In 3: For given PD , PR , and PU,∗ = {pU,∗ i } (obtained at step
particular, P1 is decomposed into three subproblems, i.e., P2,
2), determine the optimal PR ,∗ = {pR ,∗
i } by solving P3.
P3, and P4 as follows.
Given PR = {pR 4: For obtained PU,∗ = {pU,∗ i } (at step 2) and PR ,∗ =
i }, PD , and PR , we formulate the optimiza-
tion problem for caching placement at user level as follows. {pRi
,∗
} (at step 3), determine the optimal (PD ,∗ , PR ,∗ )
P2: Caching Placement Optimization at User Level by solving P4.
5: If ΔN T ≤ , return step 2. Otherwise, stop and return
the solutions.
N
max N T 1 = αλU pUi qi + qi 1 − pUi pUhit,i pUsucc,i
PU i=1
N
scenario, we account the interferences caused by D2D commu-
s.t. pUi ≤ MU .
i=1 nications, BS-relay communications, and the self-interference
Here, we aim to maximize the throughput achieved by caching at the relay caused by the FD communications of BS-relay user.
placement policies at the users under the assumption that the We give a characterization of optimal solutions for P2 and
requesting users can obtain the requested contents at their own P3 based on the following lemmas.
cache storage or from other users via D2D communications. Lemma 1: The optimal caching placement at user level is
For the given PD , PR , and PU,∗ = {pU,∗ + !
i }, we formulate the pU,∗ = min p̂Ui , 1 , i = [1, . . . , N ] (31)
i
optimization problem for caching placement at relay level in the
following. where p̂Ui is the root of equation
P3: Caching Placement Optimization at Relay Level
ϕ
K1i −1 + 1 − pUi ρ + 1 exp −ρpUi +1− =0
αλU qi
N
N (32)
max N T 2 = αλU pU,∗
i qi + αλU qi ρ = π(1 − α)λU RU2 , [x]+ = max(x, 0), ϕ is the Lagrangian
PR
i=1
i=1
multiplier that satisfies the condition that N i=1 pi = MU , and
U
i
× 1 − pU,∗ pU,∗ U K1 is the constant. We note that ϕ can be efficiently solved by
i hit,i psucc,i using the bisection method.
N Lemma 2: The optimal caching placement at relay level is
+ αλU qi 1 − pU,∗
i R + !
i=1 pR
i
,∗
= min p̂i , 1 , i = [1, . . . , N ] (33)
× 1 − pU,∗ R R
hit,i phit,i psucc,i
where
N ln αλU qi ϑK2i 1 − pU,∗
i 1 − pU,∗
hit,i − ln (η)
i =
p̂R
s.t. i ≤ MR .
pR ϑ
i=1 (34)
The solution of P3 will give caching placement strategies at re- ϑ = πλR RR 2
, [x]+ = max(x, 0), η is the Lagrangian multiplier
lays to maximize the throughput under the assumption that the that satisfies the condition that N i=1 pi = MR , and K2 is the
R i
requested contents will be provided by a nearby relay. More- constant. Again η can be obtained by using the bisection search
over, the cache placement probability at users is replaced by the mechanism.
probability of cache hit at the users and the results of P2 are The proofs of these lemmas are omitted due to space limit
used in this subproblem, i.e., pUi and pUhit,i become pU,∗
i and and can be found in the technical report [30].
Then, we use the exhaustive search mechanism to solve P4.
pU,∗
hit,i . Because we have only two parameters of PD and PR . We it-
Finally, for obtained PU,∗ = {pU,∗ R ,∗
i } and PR ,∗ = {pi }, the eratively solve three subproblems until ΔN T ≤ , where is
power optimization is formulated as follows: the predetermined small value. The procedure for parameter
P4: Power Control configuration can be described in Algorithm 1.
The intuition of this proposed method in solving optimization
max N T (PU∗ , PR∗ , PD , PR )
P D ,P R problem P1 can be translated as follows. First, we aim to maxi-
mize the offloading by using the caching placement mechanism
s.t. PD ≤ P̄D , PR ≤ P̄R . (30)
at both the users and the relays (P2 and P3) when PD and PR
In this subproblem, we aim to optimize the original through- are given. Thus, we can mitigate the heavy burden at the down-
put with respect to the parameters of PD and PR . For this link between users and the macro BSs as well as the number of
Authorized licensed use limited to: Indian Institute of Technology - BHUBANESWAR. Downloaded on October 06,2021 at 05:25:05 UTC from IEEE Xplore. Restrictions apply.
4564 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 14, NO. 10, OCTOBER 2018
Authorized licensed use limited to: Indian Institute of Technology - BHUBANESWAR. Downloaded on October 06,2021 at 05:25:05 UTC from IEEE Xplore. Restrictions apply.
TAN et al.: D2D COMMUNICATIONS IN HETEROGENEOUS NETWORKS WITH FULL-DUPLEX RELAYS AND EDGE CACHING 4565
Fig. 3. For λU = 10−3 (per m2 ) and λR = 10−5 (per m2 ), throughput Fig. 5. (a) Throughput versus ξ for our proposed scheme, λU = 10−3
versus (a) Zipf parameter γ with M d = 2, M R = 8 and (b) user caching (per m2 ), N = 50, (R U , R R , R B S ) = (15, 50, 200) m, ξ = 0.2, and
storage M d with N = 50, M R = M d + 6, and γ = 1.2. (M d , M R ) = (8, 16). (b) Throughput gap versus relay density for γ =
1.2 and λU = 10−4 (per m2 ), N = 10, (R U , R R , R B S ) = (15, 50, 200) m,
ξ = 0.2, and (M d , M R ) = (2, 8).
Authorized licensed use limited to: Indian Institute of Technology - BHUBANESWAR. Downloaded on October 06,2021 at 05:25:05 UTC from IEEE Xplore. Restrictions apply.
4566 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 14, NO. 10, OCTOBER 2018
λU = 10−3 (per m2 ), N = 50, (RU , RR , RB S ) = (15, 50, 200) [4] L. D. Xu, W. He, and S. Li, “Internet of things in industries: A survey,”
IEEE Trans. Ind. Inform., vol. 10, no. 4, pp. 2233–2243, Nov. 2014.
m, ξ = 0.2, and (Md , MR ) = (8, 16). In particular, we con- [5] Q. Chi, H. Yan, C. Zhang, Z. Pang, and L. D. Xu, “A reconfigurable smart
sider ξ = 0.001, 0.01, and 0.4, which represent high, medium, sensor interface for industrial WSN in IoT environment,” IEEE Trans. Ind.
and low QSIC, respectively. It is observed that the throughput Inform., vol. 10, no. 2, pp. 1417–1425, May 2014.
[6] L. T. Tan and L. B. Le, “Compressed sensing based data processing and
decreases when QSIC value increases due to the increase in mac protocol design for smartgrids,” Proc. IEEE Wireless Commun. Netw.
self-interference at the FD relay. There is a noticeable gap be- Conf., 2015, pp. 2138–2143.
tween high and low QSICs when the relay density increases. [7] L. T. Tan and L. B. Le, “Joint data compression and MAC protocol de-
sign for smartgrids with renewable energy,” Wireless Commun. Mobile
This observation can be explained as follows. Note that in the Comput., vol. 16, no. 16, pp. 2590–2604, Jul. 2016.
network setting, the user density of this considered scenario is [8] R. Tandon and O. Simeone, “Harnessing cloud and edge synergies: Toward
high. So, the number of requested contents is large. Due to the an information theory of fog radio access networks,” IEEE Commun. Mag.,
vol. 54, no. 8, pp. 44–50, Aug. 2016.
limit of the user and relay storage, some users’ requests cannot [9] The Network, “Cisco delivers vision of fog computing to accelerate
be accommodated locally and hence the BS has to serve them value from billions of connected devices,” Jan. 2014. [Online]. Available:
via the relays using FD communications. For the high relay http://newsroom.cisco.com/press-release-content?articleId=1334100
[10] N. Golrezaei, A. F. Molisch, A. G. Dimakis, and G. Caire, “Femtocaching
density, the requesting user can be beneficial from the FD trans- and device-to-device collaboration: A new architecture for wireless video
mission in the case of high QSIC, whereas in the case of low distribution,” IEEE Commun. Mag., vol. 51, no. 4, pp. 142–149, Apr. 2013.
QSIC, it cannot exploit the FD transmission due to the excessive [11] M. Ji, G. Caire, and A. F. Molisch, “Fundamental limits of caching in
wireless D2D networks,” IEEE Trans. Inf. Theory, vol. 62, no. 2, pp. 849–
self-interference. Therefore, the throughput achieved in the case 869, Feb. 2016.
of high QSIC is significantly improved when compared to the [12] J. Li, H. Chen, Y. Chen, Z. Lin, B. Vucetic, and L. Hanzo, “Pricing and
throughput achieved in the case of low QSIC. For the low relay resource allocation via game theory for a small-cell video caching system,”
IEEE J. Sel. Areas Commun., vol. 34, no. 8, pp. 2115–2129, Aug. 2016.
density, the number of relays is not enough to sever the huge [13] J. Li, Y. Chen, Z. Lin, W. Chen, B. Vucetic, and L. Hanzo, “Distributed
number of users. Therefore, the throughput performances are caching for data dissemination in the downlink of heterogeneous net-
low and the throughput gap between the cases of high and low works,” IEEE Trans. Commun., vol. 63, no. 10, pp. 3553–3568, Oct. 2015.
[14] Y. Chen, M. Ding, J. Li, Z. Lin, G. Mao, and L. Hanzo, “Probabilistic
QSICs is small. small-cell caching: Performance analysis and optimization,” IEEE Trans.
Finally, we demonstrate the efficacy of the proposed algo- Veh. Technol., vol. 66, no. 5, pp. 4341–4354, May 2017.
rithm by comparing its throughput performance with that ob- [15] K. Wang, Z. Chen, and H. Liu, “Push-based wireless converged networks
for massive multimedia content delivery,” IEEE Trans. Wireless Commun.,
tained using the optimal brute-force search algorithm for small vol. 13, no. 5, pp. 2894–2905, May 2014.
N . In particular, we demonstrate the throughput gap between [16] A. Sabharwal, P. Schniter, D. Guo, D. W. Bliss, S. Rangarajan, and R.
our proposed scheme and the optimal mechanism in Fig. 5(b). Wichman, “In-band full-duplex wireless: Challenges and opportunities,”
The network setting is presented as γ = 1.2 and λU = 10−4 IEEE J. Sel. Areas Commun., vol. 32, no. 9, pp. 1637–1652, Sep. 2014.
[17] Z. Zhang, K. Long, A. V. Vasilakos, and L. Hanzo, “Full-duplex wireless
(per m2 ), N = 5, (RU , RR , RB S ) = (15, 50, 200) m, ξ = 0.2, communications: Challenges, solutions, and future research directions,”
and (Md , MR ) = (2, 8). Fig. 5(b) confirms that our proposed Proc. IEEE, vol. 104, no. 7, pp. 1369–1409, Jul. 2016.
[18] M. Duarte, C. Dick, and A. Sabharwal, “Experiment-driven characteri-
scheme achieves throughput very close to the throughput at- zation of fullduplex wireless systems,” IEEE Trans. Wireless Commun.,
tained by the optimal solution where the throughput gap is al- vol. 11, no. 12, pp. 4296–4307, Dec. 2012.
ways below 2%. We also compare the equal caching scheme [19] L. B. Le et al., “Enabling 5G mobile wireless technologies,” EURASIP J.
Wireless Commun. Netw., vol. 2015, Dec. 2015, Art. no. 218.
and most popular caching scheme to the optimal solution, where [20] L. T. Tan, L. Ying, and D. W. Bliss, “Power control and relay selection
their throughput gaps are very high. in full-duplex cognitive relay networks: Coherent versus non-coherent
scenarios,” in Proc. 51st Annu. Conf. Inf. Sci. Syst., 2017, pp. 1–6.
[21] M. Maso, I. Atzeni, I. Ghamnia, E. Batu, and M. Debbah, “Cache-aided
VII. CONCLUSION full-duplex small cells,” in Proc. 15th Int. Symp. Model. Optim. Mobile,
Ad Hoc, and Wireless Netw., 2017, pp. 1–6.
In this paper, we proposed a joint optimal resource allocation [22] M. Naslcheraghi, S. A. Ghorashi, and M. Shikh-Bahaei, “FD device-to-
and probabilistic caching placement design scheme for Het- device communication for wireless video distribution,” IET Commun.,
Net with D2D communications and edge caching. In order to vol. 11, no. 7, pp. 1074–1081, 2017.
[23] E. Bastug, M. Bennis, and M. Debbah, “Living on the edge: The role of
achieve a high throughput, full-duplex relays are used in the proactive caching in 5G wireless networks,” IEEE Commun. Mag., vol. 52,
HetNet. Throughput is analyzed by using stochastic geometry no. 8, pp. 82–89, Aug. 2014.
tools and is then further optimized through caching placements. [24] J. G. Andrews, H. Claussen, M. Dohler, S. Rangan, and M. C. Reed,
“Femtocells: Past, present, and future,” IEEE J. Sel. Areas Commun.,
Numerical results provide insights to the important theoretical vol. 30, no. 3, pp. 497–508, Apr. 2012.
findings in the paper and show significant performance gains [25] J. G. Andrews, F. Baccelli, and R. K. Ganti, “A tractable approach to
achieved by the configuration for the proposed scheme. coverage and rate in cellular networks,” IEEE Trans. Commun., vol. 59,
no. 11, pp. 3122–3134, Nov. 2011.
[26] H. S. Dhillon, R. K. Ganti, F. Baccelli, and J. G. Andrews, “Modeling and
REFERENCES analysis of k-tier downlink heterogeneous cellular networks,” IEEE J. Sel.
Areas Commun., vol. 30, no. 3, pp. 550–560, Apr. 2012.
[1] R. Q. Hu and Y. Qian, “An energy efficient and spectrum efficient wireless [27] J. Wang, “A survey of web caching schemes for the internet,” ACM SIG-
heterogeneous network framework for 5G systems,” IEEE Commun. Mag., COMM Comput. Commun. Rev., vol. 29, no. 5, pp. 36–46, Oct. 1999.
vol. 52, no. 5, pp. 94–101, May 2014. [28] B. Ahlgren, C. Dannewitz, C. Imbrenda, D. Kutscher, and B. Ohlman, “A
[2] L. Wei, R. Q. Hu, Y. Qian, and G. Wu, “Enable device-to-device communi- survey of information-centric networking,” IEEE Commun. Mag., vol. 50,
cations underlaying cellular networks: Challenges and research aspects,” no. 7, pp. 26–36, Jul. 2012.
IEEE Commun. Mag., vol. 52, no. 6, pp. 90–96, Jun. 2014. [29] M. Haenggi and R. K. Ganti, “Interference in large wireless networks,”
[3] M. Cha, H. Kwak, P. Rodriguez, Y. Ahn, and S. Moon, “I tube, Foundations Trends Netw., vol. 3, no. 2, pp. 127–248, 2009.
you tube, everybody tubes: Analyzing the world’s largest user gener- [30] “D2D communications in heterogeneous networks with full-duplex relays
ated content video system,” in Proc. ACM SIGCOMM Internet Meas., and edge caching,” Tech. Rep., 2018. [Online]. Available: https://www.
2007, pp. 1–14. dropbox.com/s/oc9ud0sm3igljke/TIISSTechreport.pdf?dl=0
Authorized licensed use limited to: Indian Institute of Technology - BHUBANESWAR. Downloaded on October 06,2021 at 05:25:05 UTC from IEEE Xplore. Restrictions apply.
TAN et al.: D2D COMMUNICATIONS IN HETEROGENEOUS NETWORKS WITH FULL-DUPLEX RELAYS AND EDGE CACHING 4567
Le Thanh Tan (S’11–M’15) received the B.Eng. Yi Qian (M’95–SM’07) received the Ph.D. de-
and M.Eng. degrees from Ho Chi Minh Univer- gree in electrical engineering from Clemson Uni-
sity of Technology, Ho Chi Minh City, Vietnam, versity, Clemson, SC, USA, in 1996.
in 2002 and 2004, respectively, and the Ph.D. He was a Senior Member of the Scientific
degree from Institut National de la Recherche Staff and a Technical Advisor with Nortel Net-
Scientifique, Quebec City, QC, Canada, in 2015, works, a Senior Systems Engineer and a Techni-
all in telecommunications. cal Advisor with several start-up companies, an
He is currently with the Department of Elec- Assistant Professor with the University of Puerto
trical & Computer Engineering, Utah State Uni- Rico at Mayaguez, and a Senior Researcher with
versity, Logan, UT, USA. From 2002 to 2010, he the National Institute of Standards and Technol-
was a Lecturer with Ho Chi Minh University of ogy. He is currently a Professor with the Depart-
Technical Education. In 2015, he was a Postdoctoral Research Asso- ment of Electrical and Computer Engineering, University of Nebraska–
ciate with the Ecole Polytechnique de Montreal, Montreal, QC, Canada. Lincoln (UNL), Lincoln, NE, USA. He has a successful track record in
From 2016 to 2017, he was a Postdoctoral Research Associate with leading research teams and publishing research results in leading sci-
Arizona State University, Tempe AZ, USA. His research interests include entific journals and conferences. Several of his recent journal articles on
artificial intelligence, machine learning, Internet of Things, vehicular net- wireless network design and wireless network security are among the
works, 5G wireless communications, edge computing, fog computing most accessed papers in the IEEE Digital Library. His research interests
and cloud computing, information centric networking, software defined include information assurance and network security, network design, net-
networking, and network function virtualization. work modeling, simulation and performance analysis for next-generation
Dr. Tan was on TPCs of different international conferences including wireless networks, wireless ad hoc and sensor networks, vehicular net-
IEEE CROWNCOM, VTC, PIMRC, etc. works, broadband satellite networks, optical networks, high-speed net-
works, and the Internet.
Prof. Qian is a member of the ACM. He is the Chair for the IEEE
Communications Society Technical Committee for Communications and
Rose Qingyang Hu (S’95–M’98–SM’06) re- Information Security. He is a Distinguished Lecturer of the IEEE Vehicu-
ceived the B.S. degree in electrical engineering lar Technology Society. He is the Associate Editor-in-Chief of the IEEE
from the University of Science and Technology WIRELESS COMMUNICATIONS. He received the Henry Y. Kleinkauf Family
of China, Hefei, China, in 1992, the M.S. degree
Distinguished New Faculty Teaching Award in 2011 and the Holling Fam-
in mechanical engineering from the Polytechnic ily Distinguished Teaching Award in 2012 from the College of Engineer-
Institute of New York University, Brooklyn, NY,
ing, UNL. He is currently on the editorial board for several international
USA, in 1995, and the Ph.D. degree in electri-
journals and magazines.
cal engineering from The University of Kansas,
Lawrence, KS, USA, in 1998.
She has more than ten years of research and
development experience in the telecommunica-
tions industry as a Technical Manager, a Senior Wireless System Ar-
chitect, and a Senior Research Scientist. From 2002 to 2004, she was
an Assistant Professor with the Department of Electrical and Computer
Engineering, Mississippi State University. She is currently an Associate
Professor with the Department of Electrical and Computer Engineering,
Utah State University, Logan, UT, USA. Her research interests include
next-generation wireless communications and networks, network design
and optimization, multimedia QoS/QoE, wireless system modeling and
performance analysis, and network security. She has published exten-
sively and holds a number of patents in these areas.
Dr. Hu is currently on the Editorial Boards of the Security and Com-
munication Networks and Wireless Communications and Mobile Com-
puting. She was a Guest Editor of the IEEE COMMUNICATIONS, the IEEE
WIRELESS COMMUNICATIONS, and the IEEE NETWORK. She is a member
of Phi Kappa Phi and Epsilon Pi Epsilon Honor Societies.
Authorized licensed use limited to: Indian Institute of Technology - BHUBANESWAR. Downloaded on October 06,2021 at 05:25:05 UTC from IEEE Xplore. Restrictions apply.