Professional Documents
Culture Documents
7, JULY 2019
Abstract—The cache replacement policy is a crucial phase in caching-based systems that deal with the process of selecting applicable
cache contents. In this paper, we propose two novel cache replacement algorithms based on the dataset obtained from a typical wireless
femto network. In the first algorithm, called Weighted Least Frequently used with an Adaptive Time Window (WLF-ATW), we aim to make
a balance between the network’s traffic and the recognition of popular contents. The WLF-ATW algorithm takes the frequency and the
recency information of files into account to ascertain the popularity of contents. We suggest another new cache replacement policy
namely Fairness Scheduling-based with an Adaptive Time Window (FS-ATW) that is based on fairness scheduling in order to minimize
the user’s access delay. The novelty of our proposed FS-ATW lies in ranking clients according to their last situations that lead to a further
user’s experience. The effectiveness of these new algorithms is evaluated from the cache hit ratio, transferred byte volume, user’s
access delay, user’s experience, and load balance. A comprehensive numerical evaluation shows that the performance of the proposed
WLF-ATW and FS-ATW algorithms is significantly better than some existing cache replacement strategies.
1 INTRODUCTION
Authorized licensed use limited to: UNIVERSITY TEKNOLOGI MALAYSIA. Downloaded on June 02,2021 at 10:19:43 UTC from IEEE Xplore. Restrictions apply.
HAJIAKHONDI-MEYBODI ET AL.: CACHE REPLACEMENT SCHEMES BASED ON ADAPTIVE TIME WINDOW FOR VIDEO ON ... 1477
survey in the recency/frequency-used algorithms such as problem in the limited capacity backhaul connection link to
HYPER-G [16], Least Recently/Frequently-Used (LRFU) the core network. In this regard, FAPs store some segments
[17] and Adaptive Replacement Cache (ARC) [18] algo- of the Fountain-encoded versions of the most popular files,
rithms. The first study on the recency/frequency-used where the popularity of files is determined via the combina-
methods was framed in [16], where the authors introduced torial multi-armed bandit framework. Among those early
the HYPER-G strategy, which considers simultaneously the studies covering video popularity models, reference [27]
recency, frequency and the size of all contents to select the suggests two auction-based algorithms with a low computa-
best file to evict. This line of work was further extended in tional complexity for selection of the most popular files to
[17] where the LRFU strategy is deployed by considering a satisfy mobile users.
weighting function with the control parameter to provide Objectives. Taking the above challenges into account, the
a spectrum of replacement policies that subsume the two key contributions of this work are summarized as follows:
independent LRU and LFU algorithms. To reduce the
computational overhead in [17], Das et al. in [19] introduce i) In this work, we have applied our algorithms in the
the Least Frequently Recently-Used (LFRU) replacement macro cellular network implemented at the Yazd
policy in which the content with the minimum rank University consisting of FAPs, which are equipped
achieved by multiplying the recency in the frequency value with storage and some User Terminals (UTs). The
is evicted. To enhance the performance of the LRFU strategy main objective in the first part of this paper is to
in [17], the authors in [20] introduce a combination of the select the best updating time, which is considered as
LRU and the window-LFU algorithms. This policy achieves a trade-off between the network’s traffic and the on-
a better performance than the conventional LRFU algorithm time popularity recognition of contents using an
when the control parameter is small. Although most of adaptive time window. The dynamic nature of video
the recency/frequency-based strategies impose an addi- file popularity leads to identifying popular contents
tional complexity on the system, they benefit from the and updating the cache of FAPs. Hence, we propose a
advantages of both recency and frequency features. fast cache replacement strategy that responds to the
There are also several function-based algorithms that rec- time varying of contents’ popularity. If the content
ognize certain predetermined parameters in the form of the replacement process happens after the occurrence of
cost function evaluating a request value to order the con- each cache miss, the traffic load on the network
tents of the cache [2], [14], [21]. One of the well-known algo- increases [28], [29]. On the other hand, the main prob-
rithms in this category is proposed by Golrezaei et al. with lem in classical periodic content replacement strate-
the application on femtocell systems [14]. The cost function gies (e.g., [21], [30], [31]) is that if the time interval
associated with this strategy is based on the content access between two consecutive updating times is too long,
delay which can be directly translated into the user’s quality the identification of popular files will experience
of service. The authors in [2] suggest an optimal cache more delay. To tackle these problems, we introduce
replacement strategy, in which similar cached contents of for the first time a heuristic adaptive time window to
all FAPs are selected centrally by the MBS. In this case, if optimize the best updating time. For the proposed
the FAP’s deployment is dense enough, clients will be able scheme, the affiliation of adaptive time window’s
to communicate with multiple FAPs, instead of one FAP length to the number of requests leads to accelerating
and each user experiences a distributed cache that is the to the identification of popular files in the peak time,
union of the FAPs’ caches. The uncoded femtocaching in [2] when a lot of clients are active and the probability
is based on the minimization of the client’s latency, which is that a file becomes popular will increase. In the same
shown that the optimum file assignment is an NP-complete situation, if the updating time is selected as a specific
optimization problem. time, we face a drastic drop in the users’ satisfaction.
Some practical caching systems often use simple cache ii) In the second part of this paper, we propose two
replacement algorithms without considering the future efficient cache replacement strategies to enhance the
content popularity. In this regard, some recent literature cache hit ratio and the user’s access delay. The first
involve learning the popularity of video files to make cache proposed algorithm, namely Weighted Least Fre-
replacement decisions [22], [23], [24], [25]. One online learn- quently used with an Adaptive Time Window
ing approach, which requires no training phase, is intro- (WLF-ATW) algorithm, is based on the recency/fre-
duced in [23] to learn the relationship between the future quency information of contents. In contrast to many
popularity of contents and the requested video files. The classical pertinent schemes (e.g., [7], [8], [9], [10],
authors in [24] enhance the popularity-driven content cach- [11]), the WLF-ATW strategy considers both recency
ing algorithm in [23] that aims to accelerate the cache and frequency characteristics of contents to make an
replacement procedure. In another perspective, the authors appropriate decision to select the best file to store
in [25] suggest a context-aware proactive caching algorithm into the FAPs. To further highlight the advantages
for wireless networks based on the contextual multi-armed of our proposed WLF-ATW scheme, we should
bandits that maximizes the expected number of satisfied emphasize on this point that traditional LRU-based
requests. There exist some other remarkable works employ- schemes [7], [8], [9] are time-consuming processes,
ing the learning popularity of files in femtocaching [26], because the items on the list should be moved at
[27]. Sengupta et. al. [26] propose a coded caching strategy each time when the memory is accessed. To reduce
in heterogeneous small cell wireless networks. The main the implementation costs, LFU-based strategies are
idea behind the scheme in [26] is to reduce the bottleneck introduced, in which the cache replacement keeps
Authorized licensed use limited to: UNIVERSITY TEKNOLOGI MALAYSIA. Downloaded on June 02,2021 at 10:19:43 UTC from IEEE Xplore. Restrictions apply.
1478 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 18, NO. 7, JULY 2019
Authorized licensed use limited to: UNIVERSITY TEKNOLOGI MALAYSIA. Downloaded on June 02,2021 at 10:19:43 UTC from IEEE Xplore. Restrictions apply.
HAJIAKHONDI-MEYBODI ET AL.: CACHE REPLACEMENT SCHEMES BASED ON ADAPTIVE TIME WINDOW FOR VIDEO ON ... 1479
communication range of fi and can access to all cache of FAP fi , hence user uj ðiÞ can access the file ck without any
contents in the FAP fi . delay, otherwise, T j;k would be 1 . In addition, the delay of
ðiÞ
User Access Description. When a client uj requests a con- downloading a video file ck with size sck from the MBS is
tent ck 2 C, it is forwarded to its corresponding FAP, fi . If ck defined as ’ck ¼ sck mb , where mb is the time delay of download-
exists in the cache of fi , it is directly sent to the client by the ing one video file per bit. According to the above performance
FAP fi and the cache hit occurs, otherwise, it is forwarded to metrics, the best cache replacement strategy is the one that
the MBS and the cache miss happens. When the MBS trans- maximizes the cache hit ratio and minimizes the transferred
mits ck to fi , the FAP decides to store a copy of ck , while satis- byte volume and the user’s access delay.
fying the client’s request. In this case, further requests of ck
ðiÞ
by ul ; l ¼ 1; 2; . . . ; Ni , are served by fi without contacting Definition 4 (User’s Experience). To investigate the user’s
the MBS. For such a user access description, the traffic on the experience measurement, this paper brings into play the average
network and the load on the MBS are reduced. immediate satisfied requested contents of all users. The user’s
The common performance metrics used to evaluate the experience, denoted by UE, is obtained by
operation of replacement strategies are the cache hit ratio, PNi Su ðiÞ
j
the transferred byte volume, the user’s access delay and the j¼1 T ðiÞ
uj
user’s experience. For such a performance metrics, we have UE ¼ ; i ¼ 1; . . . ; N; (2)
Ni
the following definitions.
where Suj ðiÞ indicates the number of immediate satisfied
Definition 1 (Cache Hit Ratio). This metric is defined as the
ratio of all requested contents which are cached in the cache mem- requests of user uj ðiÞ , and Tuj ðiÞ is the total requested contents
ory of FAPs versus total requests. Let NF represents the number by user uj ðiÞ .
of requested contents served by FAPs and NT denotes the total Definition 5 (Load Balance). To evaluate the performance of
number of requests in a specific period of time. In this case, the cache replacement strategies in terms of fairness, the load balance
cache hit ratio, denoted by CHR, is obtained as CHR ¼ N F
NT . If metric is introduced. This metric illustrates the number of requests
the embedded storage of FAPs is large enough to store the entire served by the MBS versus the total requests for each client. In this
set of contents, the cache hit ratio is maximized, i.e., case, the load balance, denoted by LB, is obtained as follows:
CHR ¼ 100%. However, due to the limited cache space, FAPs
can only store a subset of the frequently accessed contents. In this u
ðiÞ
regard, the most efficient replacement policy is the one that stores N j
LB ¼ B ; j ¼ 1; . . . ; Ni ; i ¼ 1; . . . ; N; (3)
more requested contents in order to improve the cache hit ratio. Tuj ðiÞ
ðiÞ
Definition 2 (Transferred Byte Volume). This performance u ðiÞ
where NBj represents the number of requests of user uj
metric is used to characterize the amount of data flowing which is not existed in the cache of FAP fi , and Tuj ðiÞ is the
between the MBS and FAPs. The transferred byte volume, total requested contents by user uj ðiÞ in a specific period of
denoted by TBV , is obtained by TBV ¼ B
BT , where BF indicates
F
time. It is worth mentioning that the low quantity of LB indi-
the total bytes sent by the MBS to FAPs and BT is the total cates the user’s satisfaction, due to serving a large portion of
requested bytes. user’s requests by FAPs. Moreover, the flat distribution of the
Definition 3 (User’s Access Delay). We define the user’s load balance for all clients means the majority of users benefit
access delay as the time from the user’s request arrives at the from the caching-based network with emphasis on the fairness
system till it is satisfied. Note that a request is immediately sat- of the cache replacement strategy.
isfied if the requested content is in the cache of local FAP. In
this case, the user’s delay would be approximated with zero. 3 USER’S BEHAVIOR PATTERN
Furthermore, the user’s delay in downloading of one content The main goal of this section is to present the user’s behav-
from the MBS depends on several factors, including the total ior pattern, such as the request arrival pattern and the popu-
number of active users and their positions in the cell, the dis- larity distribution of video files in the VoD-based network at
tance between clients and the MBS, the channel quality and the the Yazd University, to propose an efficient cache replace-
requested file size. It is shown in [14] that the effect of user’s ment strategy in achieving a better system performance.
position and the channel quality on the aforementioned delay is Several prior researches on the user’s behavior analysis in
negligible. In this paper, the user’s delay in downloading of one VoD-based systems illustrate that the distribution of popu-
content from the MBS is influenced by either the requested con- larity of contents follows the Zipf-like distribution (e.g.,
tent existed in the cache of local FAP or not. Based on the above see [32], [33]). This distribution describes the relationship
argument, the expected user’s access delay for uj ðiÞ in the trans- between the frequency of requesting of one content and its
mission range of FAP fi , i ¼ 1; . . . ; N, is obtained as rank, when contents are ranked with respect to the fre-
quency of reference.
X
M Based on the information extracted from the campus net-
Duj ðiÞ ¼ ’ck Puj ðiÞ ;ck T j;k ; j ¼ 1; . . . ; Ni ; (1) work at the Yazd University, video files are categorized
k¼1
into five groups: “Trailer”, “Music”, “News”, “Sport” and
“Entertainment”, denoted by y1 ; y2 ; . . . ; y5 , respectively. It is
where Puj ðiÞ ;c represents the probability of requesting file ck assumed that each group contains Myl video files, where
k
ðiÞ P5
by user uj as will be described in Section 3, T j;k is an indica- l¼1 M yl
¼ M. The users’ requests do not follow the same
tor variable which is equal to 0, if the video file ck is in the cache behavior pattern meaning that the probability of requesting
Authorized licensed use limited to: UNIVERSITY TEKNOLOGI MALAYSIA. Downloaded on June 02,2021 at 10:19:43 UTC from IEEE Xplore. Restrictions apply.
1480 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 18, NO. 7, JULY 2019
Authorized licensed use limited to: UNIVERSITY TEKNOLOGI MALAYSIA. Downloaded on June 02,2021 at 10:19:43 UTC from IEEE Xplore. Restrictions apply.
HAJIAKHONDI-MEYBODI ET AL.: CACHE REPLACEMENT SCHEMES BASED ON ADAPTIVE TIME WINDOW FOR VIDEO ON ... 1481
Authorized licensed use limited to: UNIVERSITY TEKNOLOGI MALAYSIA. Downloaded on June 02,2021 at 10:19:43 UTC from IEEE Xplore. Restrictions apply.
1482 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 18, NO. 7, JULY 2019
where ðxul ; yul Þ and ðxfj ; yfj Þ represent spatial coordinates Step 2. Updating Time Calculation. Count the number of
of user ul and FAP fj , respectively. For the case, when users’ requests in the FAP fj ; j ¼ 1; . . . ; N (i.e., parameter
the transmission ranges of FAPs do not overlap and NRj ), and compare that with the threshold level hj . While
assuming that each user can access to only one FAP, the NRj reaches the value of hj and the instantaneous network’s
distance
P in (6) must be calculated for FAP fj and traffic is equal or less than zj , the cache replacement for
S j1 h¼1 h users, j ¼ 1; . . . ; N. In contrast to Phase 1 in
N FAP fj occurs.
the WLF-ATW strategy, hj is determined for FAP Step 3. (Acknowledgment). At the time of cache replace-
fj ; j ¼ 1; . . . ; N, based on the network’s traffic on the cor- ment ti , all mobile users in the transmission range of FAP fj
responding FAP fj . Denoting NRj as the number of send an ACK message to the corresponding FAP. In the
requested contents arrived at FAP fj ; once NRj ¼ hj and other words, if FAP fj receives an ACK message at time ti
ðrÞ
the instantaneous network’s traffic is equal or less than from user ul ; r ¼ 1; . . . ; N; r 6¼ j, that they did not connect
ðrÞ
the threshold zj , the cache replacement process on FAP to the FAP fj at time ti1 , it means that ul is a mobile user.
fj commences. Therefore, the number of users in the transmission range of
FAP fj are updated with the value of Nj at time ti . In this
Algorithm 1. Proposed WLF-ATW Cache Replacement regard, the fixed and mobile users connecting to the FAP fj
Strategy are considered on the optimization problem in the next step.
1: Phase 1 (Adaptive Time Window Identification): Step 4. User’s Access Delay Calculation. To minimize the
ðjÞ
2: Consider the network’s traffic to select the best value of h. user’s access delay of all users ul , l ¼ 1; . . . ; Nj , in the com-
3: Phase 2 (Content Rating Calculation): munication range of FAP fj , the optimization problem is
ðjÞ
4: Initialization: Set i ¼ 1, NR ¼ 0, t0 ¼ tLast , h is selected performed for each user ul as
from Phase 1. min DuðjÞ ; l ¼ 1; . . . ; Nj ;
Tl;k l
5: for All users’ requests do
6: while NR < h do X
M (7)
7: Get the information of frequency counter Kck ðtA" Þ and subject to sck ð1 T l;k Þ Cfj ;
time of request tA" . k¼1
Authorized licensed use limited to: UNIVERSITY TEKNOLOGI MALAYSIA. Downloaded on June 02,2021 at 10:19:43 UTC from IEEE Xplore. Restrictions apply.
HAJIAKHONDI-MEYBODI ET AL.: CACHE REPLACEMENT SCHEMES BASED ON ADAPTIVE TIME WINDOW FOR VIDEO ON ... 1483
Algorithm 2. Proposed FS-ATW Cache Replacement Step 6. Termination. Sort the video files in descending
Strategy order of rk , meaning that the video file with the highest
value of rk is the most popular file. Then, update the cache
1: Phase 1 (Adaptive Time Window Identification): of FAP fj by storing the first set of popular video files equal
2: for fj ; j ¼ 1; . . . ; N, do
to the capacity of the cache memory. Finally, set NRj ¼ 0
3: Calculate the distances between UTs and FAPs to find all
and t0 ¼ tLast is replaced with t1 ¼ tLast and the algorithm in
UTs in the communication range of FAPs according to:
Phase 2 is repeated from Step 2.
X
j1
The pseudo-code of our proposed algorithm is outlined
ðxul xfj Þ2 þ ðyul yfj Þ2 r2 l ¼ 1; . . . ; S Nk ;
k¼1
in Algorithm 2. In general, the computational complexity of
the FS-ATW scheme is of order OðNNj MÞ, where N, Nj and
4: Consider the network’s traffic to select the best value of
M are the number of FAPs, the cardinality of clients in the
hj .
transmission range of FAP fj and the number of distin-
5: end for
6: Phase 2 (Content Replacement):
guished video contents in an implemented network, respec-
7: Initialization: Set i ¼ 1, NRj ¼ 0, t0 ¼ tLast , hj is selected tively. In more details, in the first Phase, distances between
from Phase 1 for each FAP fj ; j ¼ 1; . . . ; N. UTs and FAPs are calculated to find all users P in the trans-
8: for fj ; j ¼ 1; . . . ; N, do mission range of FAPs, where OðN ðS j1 k¼1 Nk ÞÞ stands
9: for All users’ requests do for the complexity of Phase 1. Moreover, the order of com-
10: NRj NRj þ 1 plexity of the optimization problem in the second Phase is
Cf
11: if NRj ¼ hj then OðNj ðð2M Mj 3Þ þ M þ M 2 ÞÞ, where Mj ¼ sc j illus-
k
12: if The instantaneous network’s traffic is less than the trates the capacity of FAP fj in the number of contents,
threshold zj then and the last step, related to sorting of popular contents is
13: All users send an ACK message to the correspond- of order OðMj2 Þ. Therefore, the total complexity of the FS-
ing FAP fj P
ðjÞ
ATW is OððN ðS j1 k¼1 Nk ÞÞ þ N ðNj ðð2M Mj 3Þ þ
14: for All users ul do M þ M 2 Þ þ Mj2 ÞÞ. To compare the computational complexity
ðjÞ
15: Calculate the user’s access delay for all users ul of the FS-ATW scheme with other cache replacement algo-
in the communication range of FAP fj as follows: rithms such as the femtocaching algorithm in [2], it is worth
X
M
mentioning that the complexity of the femtocaching strategy
DuðjÞ ¼ ’ck PuðjÞ ;c T ck ;fj ; P
l l k in [2] is of order OððN þ SÞMÞ, where S ¼ N N
j¼1 j is the
k¼1
total number of clients in the network. Obviously, the imple-
16: Then minimize the optimization problem as fol- mentation of the FS-ATW algorithm in the network make a
lows: bit more complexity than the femtocaching strategy in [2],
while the FS-ATW scheme leads to 33 percent improvement
min DuðjÞ ; l ¼ 1; . . . ; Nj ;
T ðjÞ l in the load balance of clients when compared to the uncoded
ck ;u
l
femtocaching algorithm in [2]. It means that the number of
X
M
satisfied users in a caching-based network implemented by
s:t: sck ð1 T c ðjÞ Þ Cfj :
k ;ul the FS-ATW strategy, due to the fairness scheduling is more
k¼1
than the uncoded femtocaching algorithm in [2].
17: Calculate the difference vector E ¼ ½e1 ; . . . ; eNj
Nl
where el ¼ Tl .
NS 5 NUMERICAL RESULTS
18: Then calculate the priority of users according to:
In this section, we evaluate and compare the performances
rl ðti Þ ¼ el rl ðti1 Þ of the proposed WLF-ATW and FS-ATW algorithms in dif-
ðjÞ ferent scenarios with the existing conventional replacement
19: Multiple the priority of user ul by lth row of strategies such as the LRU and the LFU algorithms in [8],
matrix T cfj and then add the columns. [15] and the femtocaching replacement strategy [2] in terms
20: end for
of the cache hit ratio, transferred byte volume, user’s access
21: else
delay, user’s experience and the effect of cache capacity. For
22: while The instantaneous network’s traffic is more
the scenarios under simulation, we investigate how the
than zj do
cache replacement phase affects the aforementioned perfor-
23: Check the instantaneous network’s traffic, until
it is equal or less than zj , then do Step 13 till 19. mance metrics, and show the superiority of our algorithms
24: end while compared with traditional cache replacement methods.
25: end if Simulation Setup. We consider a macro cellular network
26: Sort the video files in descending order of rk . implemented at the Yazd University where 5104 UTs are
27: Update the cache of FAP f j by storing the first set of uniformly distributed inside the area covered by the MBS
videos equal to the capacity of the cache memory with the radius R ¼ 500 m. The MBS uses a transmission
28: ti ¼ tLast , i i þ 1, NRj ¼ 0. scheme similar to the 4G LTE standard, based on the OFDM
29: end if physical layer. In our simulation, we assume that the con-
30: end for nectivity range of each FAP is r ¼ 20 m, and the transmis-
31: end for sion range of FAPs are not overlapped as used in [2]. In
32: Output: Update the cache of all FAPs f j , j 2 N. addition, we assume that the size of all requested contents
is the same and about 37.5 MB, which is reasonable
Authorized licensed use limited to: UNIVERSITY TEKNOLOGI MALAYSIA. Downloaded on June 02,2021 at 10:19:43 UTC from IEEE Xplore. Restrictions apply.
1484 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 18, NO. 7, JULY 2019
Fig. 5. The cache hit ratio versus the period of November 1, 2015 to December 1, 2015 for (a) WLF-ATW, Window-LRFU [20], LRU [8] and LFU [15];
and (b) FS-ATW and the Uncoded Femtocaching algorithm in [2] with h ¼ 10z.
Authorized licensed use limited to: UNIVERSITY TEKNOLOGI MALAYSIA. Downloaded on June 02,2021 at 10:19:43 UTC from IEEE Xplore. Restrictions apply.
HAJIAKHONDI-MEYBODI ET AL.: CACHE REPLACEMENT SCHEMES BASED ON ADAPTIVE TIME WINDOW FOR VIDEO ON ... 1485
Fig. 6. The transferred byte volume versus the period of November 1, 2015 to December 1, 2015 for (a) WLF-ATW, Window-LRFU [20], LRU [8] and
LFU [15]; and (b) FS-ATW and the Uncoded Femtocaching algorithm in [2] with h ¼ 10z.
in terms of the average user’s access delay in an adaptive access delay, it also provides a better experience for all users
time window’s length after the updating time. Indeed, if the by deploying a fairness schedule.
requested content is in the local FAP, the user’s access delay Fourth Scenario. In this scenario, we evaluate the perfor-
would be approximated with zero, otherwise, it would be mance of the proposed WLF-ATW and FS-ATW replace-
’ck . For a better comparison of the user’s access delay, we ment algorithms with the Window-LRFU, LRU, LFU and
normalize DuðiÞ with the maximum value of access latency the uncoded femtocaching from the aspect of the user’s
j
to file ck (i.e., parameter ’ck ). With the same arguments as in experience. As observed from Fig. 8, due to considering
the second scenario, the proposed WLF-ATW and FS-ATW the fairness scheduling to select the cache contents, the
algorithms significantly reduce the user’s access delay proposed FS-ATW scheme has the best performance in
when compared to the Window-LRFU, LRU and the LFU terms of the user’s experience which illustrates the aver-
schemes. As seen from Fig. 7, the FS-ATW algorithm drasti- age immediate satisfied requested content of all users.
cally reduces the average delay of all users, while the result Since conventional cache replacement algorithms gener-
is close to the uncoded femtocaching benchmark in [2]. ally neglect the fairness scheduling in their policies of
Hence, the FS-ATW algorithm not only decreases the user’s selecting popular contents, the average immediate satis-
fied requests in the FS-ATW is maximum. In this regard,
the proposed FS-ATW algorithm makes an effort to equi-
tably dedicate the cache capacity among the users. Hence,
the priority of storing popular contents is related to the
latest users’ situations.
Fifth Scenario. In this scenario, we demonstrate the effect
of increasing the storage capacity of each FAP on the sys-
tem’s performance. Fig. 9 compares the cache hit ratio ver-
sus the storage capacity of FAP stations which is expressed
as the percentage of the total volume of files in the network.
It is observed from Fig. 9 that increasing the volume of
cache capacity in all replacement strategies leads to enhanc-
ing the cache hit ratio. However, as it can be seen from
Fig. 7. The users access normalized average delay versus the period of
Fig. 9, the proposed FS-ATW algorithm displays almost the
November 1, 2015 to December 1, 2015 for WLF-ATW, FS-ATW,
Uncoded Femtocaching algorithm in [2], Window-LRFU [20], LRU [8], same behavior as the uncoded femtocaching algorithm,
and LFU [15] cache replacement algorithms with h ¼ 10z. known as the benchmark in this work, where the cache
Fig. 8. The user’s experience versus the period of November 1, 2015 to Fig. 9. The effect of cache capacity of FAPs on the cache hit ratio for
December 1, 2015 for WLF-ATW, FS-ATW, Uncoded Femtocaching WLF-ATW, FS-ATW, Uncoded Femtocaching algorithm in [2], Window-
algorithm in [2], Window-LRFU [20], LRU [8], and LFU [15] cache LRFU [20], LRU [8], and LFU [15] cache replacement algorithms with
replacement algorithms with h ¼ 10z. h ¼ 10z.
Authorized licensed use limited to: UNIVERSITY TEKNOLOGI MALAYSIA. Downloaded on June 02,2021 at 10:19:43 UTC from IEEE Xplore. Restrictions apply.
1486 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 18, NO. 7, JULY 2019
Authorized licensed use limited to: UNIVERSITY TEKNOLOGI MALAYSIA. Downloaded on June 02,2021 at 10:19:43 UTC from IEEE Xplore. Restrictions apply.
HAJIAKHONDI-MEYBODI ET AL.: CACHE REPLACEMENT SCHEMES BASED ON ADAPTIVE TIME WINDOW FOR VIDEO ON ... 1487
Authorized licensed use limited to: UNIVERSITY TEKNOLOGI MALAYSIA. Downloaded on June 02,2021 at 10:19:43 UTC from IEEE Xplore. Restrictions apply.