You are on page 1of 12

1476 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 18, NO.

7, JULY 2019

Cache Replacement Schemes Based


on Adaptive Time Window for Video on
Demand Services in Femtocell Networks
Zohreh Hajiakhondi-Meybodi, Jamshid Abouei , Senior Member, IEEE, and
Amir Hossein Fahim Raouf , Student Member, IEEE

Abstract—The cache replacement policy is a crucial phase in caching-based systems that deal with the process of selecting applicable
cache contents. In this paper, we propose two novel cache replacement algorithms based on the dataset obtained from a typical wireless
femto network. In the first algorithm, called Weighted Least Frequently used with an Adaptive Time Window (WLF-ATW), we aim to make
a balance between the network’s traffic and the recognition of popular contents. The WLF-ATW algorithm takes the frequency and the
recency information of files into account to ascertain the popularity of contents. We suggest another new cache replacement policy
namely Fairness Scheduling-based with an Adaptive Time Window (FS-ATW) that is based on fairness scheduling in order to minimize
the user’s access delay. The novelty of our proposed FS-ATW lies in ranking clients according to their last situations that lead to a further
user’s experience. The effectiveness of these new algorithms is evaluated from the cache hit ratio, transferred byte volume, user’s
access delay, user’s experience, and load balance. A comprehensive numerical evaluation shows that the performance of the proposed
WLF-ATW and FS-ATW algorithms is significantly better than some existing cache replacement strategies.

Index Terms—Femtocell, cache, cache updating, content updating, wireless network

1 INTRODUCTION

C ACHINGhas been recognized as a promising solution


dealing with the user latency, network’s bandwidth
usage and the traffic load on the origin server with the
requested content is provided by the main server. In addi-
tion, the transferred byte volume is the most commonly
performance metric used in the literature for evaluation of
application on femtocell systems in the fifth generation of replacement schemes [5].
wireless networks [1]. The key idea behind the caching By introducing caching-based systems for the web
technology is to shrink the cell size and bring the most pop- cache proxy and wireless networks, a wide variety of cache
ular contents closer to clients using Femto Access Points replacement policies have been proposed. Totally, replace-
(FAPs), equipped with a high storage memory [2]. Since ment policies in the caching have been categorized into the
Video on Demand (VoD) streaming services such as those randomized [6], recency-based [7], [8], [9], frequency-based
offered by Netflix and YouTube are dramatically increas- [10], [11], recency/frequency-based [12] and function-based
ing wireless traffic [3], the caching-based mechanism is one methods [13], [14]. The authors in [7] present the Low Inter-
of the most capable approaches to mitigate this burden. As reference Recency Set (LIRS) strategy which addresses lim-
the popularity of contents varies over time, FAPs need to its of the Least Recently Used (LRU) algorithm to evaluate
be updated regularly with the most popular contents to the inter-reference recency for making a replacement deci-
achieve the best quality of service and the optimum usage sion. Generally, recency-based algorithms discard the least
of resources [4]. Furthermore, when the cache is full and a recently requested contents by considering the fact that a
new content is requested, the deployed cache replacement content referenced in recent past is likely to be referenced
strategy determines which content to be evicted. These fun- again in near future [9]. Given that such strategies neglect
damental requirements give rise to main challenges in the access counts of contents, they are incapable of recogniz-
cache replacement policies with the focus on cost incre- ing the frequently requested files. In another perspective,
ment. If a requested content exists in the FAP, the cache hit the authors in [10] suggest a frequency-based strategy,
occurs, otherwise, it is known as a hit miss and the known as Least Frequently Used-Aging (LFU-Aging) policy
to enhance the performance of the LFU-based strategy by
limiting the request counters. Since in frequency-based
 The authors are with the WINEL Research Lab., Department of Electrical
Engineering, Yazd University, Box No. 89195-741, Yazd, Iran. strategies, contents with a large counter value are identified
E-mail: {hajiakhoondi, amirh.fraouf}@stu.yazd.ac.ir, abouei@yazd.ac.ir. as the popular one, such strategies suffer from the cache
Manuscript received 18 Aug. 2017; revised 9 June 2018; accepted 24 July pollution which results in remaining a formerly popular
2018. Date of publication 7 Aug. 2018; date of current version 31 May 2019. content in the cache for a long time.
(Corresponding author: Jamshid Abouei.) Some recent studies employ a mixture of recency and fre-
For information on obtaining reprints of this article, please send e-mail to:
reprints@ieee.org, and reference the Digital Object Identifier below. quency information of contents, called recency/frequency-
Digital Object Identifier no. 10.1109/TMC.2018.2864164 based policy. In [15], the authors provide a comprehensive
1536-1233 ß 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See ht_tp://www.ieee.org/publications_standards/publications/rights/index.html for more information.

Authorized licensed use limited to: UNIVERSITY TEKNOLOGI MALAYSIA. Downloaded on June 02,2021 at 10:19:43 UTC from IEEE Xplore. Restrictions apply.
HAJIAKHONDI-MEYBODI ET AL.: CACHE REPLACEMENT SCHEMES BASED ON ADAPTIVE TIME WINDOW FOR VIDEO ON ... 1477

survey in the recency/frequency-used algorithms such as problem in the limited capacity backhaul connection link to
HYPER-G [16], Least Recently/Frequently-Used (LRFU) the core network. In this regard, FAPs store some segments
[17] and Adaptive Replacement Cache (ARC) [18] algo- of the Fountain-encoded versions of the most popular files,
rithms. The first study on the recency/frequency-used where the popularity of files is determined via the combina-
methods was framed in [16], where the authors introduced torial multi-armed bandit framework. Among those early
the HYPER-G strategy, which considers simultaneously the studies covering video popularity models, reference [27]
recency, frequency and the size of all contents to select the suggests two auction-based algorithms with a low computa-
best file to evict. This line of work was further extended in tional complexity for selection of the most popular files to
[17] where the LRFU strategy is deployed by considering a satisfy mobile users.
weighting function with the control parameter  to provide Objectives. Taking the above challenges into account, the
a spectrum of replacement policies that subsume the two key contributions of this work are summarized as follows:
independent LRU and LFU algorithms. To reduce the
computational overhead in [17], Das et al. in [19] introduce i) In this work, we have applied our algorithms in the
the Least Frequently Recently-Used (LFRU) replacement macro cellular network implemented at the Yazd
policy in which the content with the minimum rank University consisting of FAPs, which are equipped
achieved by multiplying the recency in the frequency value with storage and some User Terminals (UTs). The
is evicted. To enhance the performance of the LRFU strategy main objective in the first part of this paper is to
in [17], the authors in [20] introduce a combination of the select the best updating time, which is considered as
LRU and the window-LFU algorithms. This policy achieves a trade-off between the network’s traffic and the on-
a better performance than the conventional LRFU algorithm time popularity recognition of contents using an
when the control parameter  is small. Although most of adaptive time window. The dynamic nature of video
the recency/frequency-based strategies impose an addi- file popularity leads to identifying popular contents
tional complexity on the system, they benefit from the and updating the cache of FAPs. Hence, we propose a
advantages of both recency and frequency features. fast cache replacement strategy that responds to the
There are also several function-based algorithms that rec- time varying of contents’ popularity. If the content
ognize certain predetermined parameters in the form of the replacement process happens after the occurrence of
cost function evaluating a request value to order the con- each cache miss, the traffic load on the network
tents of the cache [2], [14], [21]. One of the well-known algo- increases [28], [29]. On the other hand, the main prob-
rithms in this category is proposed by Golrezaei et al. with lem in classical periodic content replacement strate-
the application on femtocell systems [14]. The cost function gies (e.g., [21], [30], [31]) is that if the time interval
associated with this strategy is based on the content access between two consecutive updating times is too long,
delay which can be directly translated into the user’s quality the identification of popular files will experience
of service. The authors in [2] suggest an optimal cache more delay. To tackle these problems, we introduce
replacement strategy, in which similar cached contents of for the first time a heuristic adaptive time window to
all FAPs are selected centrally by the MBS. In this case, if optimize the best updating time. For the proposed
the FAP’s deployment is dense enough, clients will be able scheme, the affiliation of adaptive time window’s
to communicate with multiple FAPs, instead of one FAP length to the number of requests leads to accelerating
and each user experiences a distributed cache that is the to the identification of popular files in the peak time,
union of the FAPs’ caches. The uncoded femtocaching in [2] when a lot of clients are active and the probability
is based on the minimization of the client’s latency, which is that a file becomes popular will increase. In the same
shown that the optimum file assignment is an NP-complete situation, if the updating time is selected as a specific
optimization problem. time, we face a drastic drop in the users’ satisfaction.
Some practical caching systems often use simple cache ii) In the second part of this paper, we propose two
replacement algorithms without considering the future efficient cache replacement strategies to enhance the
content popularity. In this regard, some recent literature cache hit ratio and the user’s access delay. The first
involve learning the popularity of video files to make cache proposed algorithm, namely Weighted Least Fre-
replacement decisions [22], [23], [24], [25]. One online learn- quently used with an Adaptive Time Window
ing approach, which requires no training phase, is intro- (WLF-ATW) algorithm, is based on the recency/fre-
duced in [23] to learn the relationship between the future quency information of contents. In contrast to many
popularity of contents and the requested video files. The classical pertinent schemes (e.g., [7], [8], [9], [10],
authors in [24] enhance the popularity-driven content cach- [11]), the WLF-ATW strategy considers both recency
ing algorithm in [23] that aims to accelerate the cache and frequency characteristics of contents to make an
replacement procedure. In another perspective, the authors appropriate decision to select the best file to store
in [25] suggest a context-aware proactive caching algorithm into the FAPs. To further highlight the advantages
for wireless networks based on the contextual multi-armed of our proposed WLF-ATW scheme, we should
bandits that maximizes the expected number of satisfied emphasize on this point that traditional LRU-based
requests. There exist some other remarkable works employ- schemes [7], [8], [9] are time-consuming processes,
ing the learning popularity of files in femtocaching [26], because the items on the list should be moved at
[27]. Sengupta et. al. [26] propose a coded caching strategy each time when the memory is accessed. To reduce
in heterogeneous small cell wireless networks. The main the implementation costs, LFU-based strategies are
idea behind the scheme in [26] is to reduce the bottleneck introduced, in which the cache replacement keeps

Authorized licensed use limited to: UNIVERSITY TEKNOLOGI MALAYSIA. Downloaded on June 02,2021 at 10:19:43 UTC from IEEE Xplore. Restrictions apply.
1478 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 18, NO. 7, JULY 2019

track of the frequency of requests without consider-


ing the request time [10], [11]. To overcome these
problems, several approaches based on the recency/
frequency of files with a more complexity have been
proposed in the literature [15], [16], [17], [18], [19],
that one of the most efficient schemes is the Win-
dow-LRFU strategy introduced in [20]. The main
advantage of the proposed WLF-ATW algorithm is
that the number of requests of files in a time window
is employed in this scheme to take into account a
combination of recency and frequency characteristics
of contents with a low complexity. It is numerically
shown that employing the proposed WLF-ATW
cache replacement algorithm exhibits a better perfor-
Fig. 1. A typical structure of a single-cell network indicating connectivity
mance than the Window-LRFU [20], the LRU-based between one MBS, eight FAPs, and some UTs.
[8] and the LFU-based [15] schemes in terms of the
portion of satisfied requests. In fact, our scheme wireless networks is the necessity of reducing the network’s
improves the cache hit ratio and reduces the trans- traffic. In this regard, to evaluate the performance of cache
ferred byte volume along with a lower complexity in replacement strategies, many conventional performance
the implementation. metrics in the field of QoS such as cache hit ratio, transferred
iii) In the second proposed cache replacement strategy, byte volume and latency are introduced. To provide a suffi-
namely the Fairness Scheduling algorithm with an cient QoE, the FS-ATW cache replacement strategy is pro-
Adaptive Time Window (FS-ATW), the selection of posed to find the most popular files by maintaining the
the most popular files to save into the cache of FAPs fairness among clients. To achieve this goal, the satisfaction
is the solution of an optimization problem. We prove rate of all users are substantial to select the most popular file.
that our problem involves placing video files in the Numerical results show that the FS-ATW algorithm not only
cache of FAPs to minimize the average delay of all decreases the user’s access delay, but it also provides a better
UTs. In this regard, we compare the performance of experience for all users by deploying a fairness schedule.
the proposed FS-ATW algorithm with the uncoded The rest of this paper is organized as follows. In Section 2,
femtocaching scheme in [2] as a benchmark. In more the network’s model is described and the main assumptions
details, the femtocaching algorithm in [2] introduces and performance metrics required for our algorithms are
an optimum mechanism of assigning files to the introduced. Section 3 introduces the user behavior pattern
FAPs, to minimize the expected downloading time and the basic concept of the popularity distribution of video
for files, that the result is a reduction in the network’s files. Section 4 deals with introducing two proposed cache
load. In this regard, the cached contents of all FAPs replacement strategies. Some numerical results are pre-
in [2] are selected centrally by the MBS according to sented in Section 5. Finally, in Section 6, an overview of the
a specific optimization algorithm. If each client com- results and some conclusion remarks are presented.
municates to only one FAP, the most similar popular
files are saved into the cache of all FAPs. In another
perspective, when UTs connect to several FAPs,
2 PROBLEM DESCRIPTION AND ASSUMPTIONS
instead of one FAP, each user experiences a distrib- In this work, we consider a macro cellular network imple-
uted cache of FAPs. In this case, the authors in [2] mented at the Yazd University consisting of S User Termi-
show that the caching policy is an NP-complete opti- nals and N FAPs, denoted by ff1 ; f2 ; . . . ; fN g, which are
mization problem. However, in the proposed FS- equipped with a considerable and equal cache size, denoted
ATW algorithm, due to the distributed nature of the by Cf , and an equal transmission range r (see Fig. 1). In this
content replacement, the cached contents of all FAPs paper, we assume that all the FAPs work in the closed-
are different without any requirement to solve an access mode. The network contains a macro base station,
NP-complete optimization problem. Moreover, in denoted by MBS, in a preassigned location with the commu-
contrast to the femtocaching algorithm in [2], the FS- nication range R, which includes the whole library of con-
ATW strategy is based on the “fairness scheduling” tents C ¼ fc1 ; c2 ; . . . ; cM g, where M is the cardinality of the
in order to minimize the user’s access delay with contents’ set, and each video file ck has the size sck . Since
development of load balance among clients. more than 70 percent of all mobile data traffic in near future
It is worth mentioning that there are two different per- is devoted to downloading video contents [3], in this work,
spectives to investigate the superiority of a cache replace- we occasionally use the term “contents” instead of “video
ment method, Quality of Service (QoS) and Quality of files”. It is assumed that each FAP fi only serves UTs
ðiÞ ðiÞ ðiÞ ðiÞ
Experience (QoE) parameters. QoE is a measure for the uj 2 U fi ¼ fu1 ; u2 ; . . . ; uNi g, i ¼ 1; 2; . . . ; N, existing in its
overall level of client satisfaction, that is related to but dif- transmission range, where Ni denotes the cardinality of the
fers from QoS, which embodies the notion that the set U fi . In addition, it is supposed that the MBS PNcan serve
network’s characteristics can be improved. In the last all S user terminals in the network, where i¼1 Ni  S.
decade, one of the most significant reasons that many The connectivity between FAPs and UTs is shown in Fig. 1.
ðiÞ ðiÞ
researchers have made the concept of caching from wired to The edge between FAP fi and UT uj means uj is in the

Authorized licensed use limited to: UNIVERSITY TEKNOLOGI MALAYSIA. Downloaded on June 02,2021 at 10:19:43 UTC from IEEE Xplore. Restrictions apply.
HAJIAKHONDI-MEYBODI ET AL.: CACHE REPLACEMENT SCHEMES BASED ON ADAPTIVE TIME WINDOW FOR VIDEO ON ... 1479

communication range of fi and can access to all cache of FAP fi , hence user uj ðiÞ can access the file ck without any
contents in the FAP fi . delay, otherwise, T j;k would be 1 . In addition, the delay of
ðiÞ
User Access Description. When a client uj requests a con- downloading a video file ck with size sck from the MBS is
tent ck 2 C, it is forwarded to its corresponding FAP, fi . If ck defined as ’ck ¼ sck mb , where mb is the time delay of download-
exists in the cache of fi , it is directly sent to the client by the ing one video file per bit. According to the above performance
FAP fi and the cache hit occurs, otherwise, it is forwarded to metrics, the best cache replacement strategy is the one that
the MBS and the cache miss happens. When the MBS trans- maximizes the cache hit ratio and minimizes the transferred
mits ck to fi , the FAP decides to store a copy of ck , while satis- byte volume and the user’s access delay.
fying the client’s request. In this case, further requests of ck
ðiÞ
by ul ; l ¼ 1; 2; . . . ; Ni , are served by fi without contacting Definition 4 (User’s Experience). To investigate the user’s
the MBS. For such a user access description, the traffic on the experience measurement, this paper brings into play the average
network and the load on the MBS are reduced. immediate satisfied requested contents of all users. The user’s
The common performance metrics used to evaluate the experience, denoted by UE, is obtained by
operation of replacement strategies are the cache hit ratio, PNi Su ðiÞ
j
the transferred byte volume, the user’s access delay and the j¼1 T ðiÞ
uj
user’s experience. For such a performance metrics, we have UE ¼ ; i ¼ 1; . . . ; N; (2)
Ni
the following definitions.
where Suj ðiÞ indicates the number of immediate satisfied
Definition 1 (Cache Hit Ratio). This metric is defined as the
ratio of all requested contents which are cached in the cache mem- requests of user uj ðiÞ , and Tuj ðiÞ is the total requested contents
ory of FAPs versus total requests. Let NF represents the number by user uj ðiÞ .
of requested contents served by FAPs and NT denotes the total Definition 5 (Load Balance). To evaluate the performance of
number of requests in a specific period of time. In this case, the cache replacement strategies in terms of fairness, the load balance
cache hit ratio, denoted by CHR, is obtained as CHR ¼ N F
NT . If metric is introduced. This metric illustrates the number of requests
the embedded storage of FAPs is large enough to store the entire served by the MBS versus the total requests for each client. In this
set of contents, the cache hit ratio is maximized, i.e., case, the load balance, denoted by LB, is obtained as follows:
CHR ¼ 100%. However, due to the limited cache space, FAPs
can only store a subset of the frequently accessed contents. In this u
ðiÞ

regard, the most efficient replacement policy is the one that stores N j
LB ¼ B ; j ¼ 1; . . . ; Ni ; i ¼ 1; . . . ; N; (3)
more requested contents in order to improve the cache hit ratio. Tuj ðiÞ
ðiÞ
Definition 2 (Transferred Byte Volume). This performance u ðiÞ
where NBj represents the number of requests of user uj
metric is used to characterize the amount of data flowing which is not existed in the cache of FAP fi , and Tuj ðiÞ is the
between the MBS and FAPs. The transferred byte volume, total requested contents by user uj ðiÞ in a specific period of
denoted by TBV , is obtained by TBV ¼ B
BT , where BF indicates
F
time. It is worth mentioning that the low quantity of LB indi-
the total bytes sent by the MBS to FAPs and BT is the total cates the user’s satisfaction, due to serving a large portion of
requested bytes. user’s requests by FAPs. Moreover, the flat distribution of the
Definition 3 (User’s Access Delay). We define the user’s load balance for all clients means the majority of users benefit
access delay as the time from the user’s request arrives at the from the caching-based network with emphasis on the fairness
system till it is satisfied. Note that a request is immediately sat- of the cache replacement strategy.
isfied if the requested content is in the cache of local FAP. In
this case, the user’s delay would be approximated with zero. 3 USER’S BEHAVIOR PATTERN
Furthermore, the user’s delay in downloading of one content The main goal of this section is to present the user’s behav-
from the MBS depends on several factors, including the total ior pattern, such as the request arrival pattern and the popu-
number of active users and their positions in the cell, the dis- larity distribution of video files in the VoD-based network at
tance between clients and the MBS, the channel quality and the the Yazd University, to propose an efficient cache replace-
requested file size. It is shown in [14] that the effect of user’s ment strategy in achieving a better system performance.
position and the channel quality on the aforementioned delay is Several prior researches on the user’s behavior analysis in
negligible. In this paper, the user’s delay in downloading of one VoD-based systems illustrate that the distribution of popu-
content from the MBS is influenced by either the requested con- larity of contents follows the Zipf-like distribution (e.g.,
tent existed in the cache of local FAP or not. Based on the above see [32], [33]). This distribution describes the relationship
argument, the expected user’s access delay for uj ðiÞ in the trans- between the frequency of requesting of one content and its
mission range of FAP fi , i ¼ 1; . . . ; N, is obtained as rank, when contents are ranked with respect to the fre-
quency of reference.
X
M Based on the information extracted from the campus net-
Duj ðiÞ ¼ ’ck Puj ðiÞ ;ck T j;k ; j ¼ 1; . . . ; Ni ; (1) work at the Yazd University, video files are categorized
k¼1
into five groups: “Trailer”, “Music”, “News”, “Sport” and
“Entertainment”, denoted by y1 ; y2 ; . . . ; y5 , respectively. It is
where Puj ðiÞ ;c represents the probability of requesting file ck assumed that each group contains Myl video files, where
k
ðiÞ P5
by user uj as will be described in Section 3, T j;k is an indica- l¼1 M yl
¼ M. The users’ requests do not follow the same
tor variable which is equal to 0, if the video file ck is in the cache behavior pattern meaning that the probability of requesting

Authorized licensed use limited to: UNIVERSITY TEKNOLOGI MALAYSIA. Downloaded on June 02,2021 at 10:19:43 UTC from IEEE Xplore. Restrictions apply.
1480 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 18, NO. 7, JULY 2019

a category may be altered for different users. The probabil-


ity of requesting category yl by user uj ðiÞ , j ¼ 1; . . . ; Ni , and
i ¼ 1; . . . ; N, denoted by PuðiÞ ;y , is obtained based on the his-
j l
tory of users’ requests. Thus, we can write the probability
ðy Þ
of requesting file ck l by user uj ðiÞ as PuðiÞ ;cðyl Þ ¼ PuðiÞ ;y Pcðyl Þ ,
j k j l k
ðy Þ
where we use the superscript (yl ) for ck l to show that ck is
the subset of category yl , Pcðyl Þ represents the probability
k
ðy Þ
of requesting file ck l by all users and is obtained as
N Rðy Þ
c l
P ðyl Þ ¼ k
NTR
, where N Rðyl Þ is the number of requesting file
ck ck
ðy Þ
ck l by all users in a specific time interval t as will be intro-
Fig. 2. (a) An adaptive time window selection in the WFL-ATW strategy.
duced in Section 4, and NTR is the total number of requests (b) The time interval between two consecutive updating times ti1 and ti .
at time duration t. It should be noted that the Zipf-like dis-
ðy Þ
tribution indicates the probability of request ck l by all
and the on-time recognition of popular files. To address
users, while PuðiÞ ;cðyl Þ in our user’s behavior pattern repre-
j k this issue, we utilize an adaptive sliding window to select
ðy Þ
sents the probability of requesting file ck l by user uj ðiÞ . We the best updating time to enhance the performance of the
employ such additional information in the proposed algo- cached-based network.
rithms to enhance the quality of experience for all users. Algorithm 1- Weighted Least Frequently used with an Adap-
tive Time Window (WLF-ATW).
4 PROPOSED CACHING REPLACEMENT This two-phased cache replacement algorithm uses both
ALGORITHMS the frequency and the recency information of video contents
with an adaptive time window. The main purpose of this
Considering the variation of content’s popularity over time algorithm is to take into account the network’s traffic cou-
and the cache space limitation, the content replacement is pled with the identification of popular contents swiftly.
unavoidable. In this regard, we propose two efficient cache Phase 1 (Adaptive Time Window Length Identification). In the
replacement strategies, namely Weighted Least Frequently first phase, the MBS aims to recognize the best value for
used with an Adaptive Time Window and Fairness Sched- the adaptive time window length, denoted by t i , i.e., the
uling-based with an Adaptive Time Window algorithms, time interval between two consecutive updating times. We
for the network’s model introduced in Section 2. The main define NR as the total number of users’ requests during
idea behind the WLF-ATW algorithm is to utilize both the the last updating time to the current time. Denoting t0 as the
frequency and the recency information of video contents starting time, as depicted in Fig. 2a, NR is set to zero and
with an adaptive time window to maximize the cache hit gradually increases by one after each request. Once NR
ratio and control the traffic load of the network. Further- reaches a predetermined threshold level h, and the instanta-
more, the content replacement in the FS-ATW algorithm is neous network’s traffic1 is less than the threshold level z,
based on minimizing the users’ access delay. It should be the cache replacement occurs at time t1 . After that, NR is set
noted that the proposed WLF-ATW is applicable for wire- to zero and the above procedure is repeated until NR
less networks, where achieving a low computational com- reaches again level h. In this case, if the instantaneous
plexity is one of the most important factors, and the FS- network’s traffic is more than z, the cache replacement does
ATW, due to the reduction of the client’s latency, is suitable not occur till it is equal or less than z. This capability leads
for the fifth generation of cellular networks. For such meth- to mitigating the network’s traffic.
ods, there are two following approaches to select the best In this algorithm, the threshold level h, which represents
time to replace cached contents of FAPs: the number of users’ requests, is a determinant factor to
i) Generally, in most LRU/LFU-based methods (e.g., find the next updating time. As will be shown in numerical
[28], [29]), a content replacement occurs when a results in Section 5, a small value of h leads to an increase in
cache miss happens. However, due to sequential the traffic load of the network, however, the popular content
content replacements in these methods, the traffic identification process occurs faster. To get more insight into
load on the network increases. the selection process of parameter h, we plot in Fig. 3 the
ii) On the other hand, in proactive-based cache replace- average percentage of number of requests per hour accord-
ment algorithms (e.g., [21], [30], [31]), a content ing to the information obtained from the campus network at
replacement occurs periodically in hours of a day (in the Yazd University during the period of November 1, 2015
most cases one specific time in a day), when the to February 3, 2016. It is observed from Fig. 3 that the
network’s traffic is low. However, these approaches network’s traffic follows a fluctuation in different times of a
suffer from the lack of on-time recognition of popular day. If the network’s traffic in hours of a day is compared to
files due to the long time interval between two conse- a preassigned threshold z, which is selected as an average
cutive updating times, which leads to decreasing the network’s traffic, we conclude that a great deal of video
cache hit ratio and increasing the user’s access latency.
Taking the above challenges into account, it makes 1. In this work, the network’s traffic concept means the instanta-
sense to create a balance between the network’s traffic neous number of users’ requests.

Authorized licensed use limited to: UNIVERSITY TEKNOLOGI MALAYSIA. Downloaded on June 02,2021 at 10:19:43 UTC from IEEE Xplore. Restrictions apply.
HAJIAKHONDI-MEYBODI ET AL.: CACHE REPLACEMENT SCHEMES BASED ON ADAPTIVE TIME WINDOW FOR VIDEO ON ... 1481

Step 3. Content Rating Calculation. If the value of NR


obtained in Step 2 is equal to h, check the instantaneous
network’s traffic, and perform one of the following cases:
Case 1. If the instantaneous network’s traffic is less than
the threshold level z, then calculate the content rating of
all requested video files at time ti , denoted by Rck ðti Þ,
according to:
ti ti1
X Kc ðtA" Þ
D
k
Rck ðti Þ ¼ ; i ¼ 1; 2; . . . (5)
"¼1
ti  tA"

Fig. 3. The average percentage of number of requests per hour during


where ti and ti1 denote the current and the last updating
the period of November 1, 2015 to February 3, 2016, with an average times, respectively (see Fig. 2b). In this regard, the video file
network’s traffic 4:17 rounded down z ¼ b4:17c ¼ 4. with the highest value of Rck ðti Þ is the most popular file.
Case 2. If the instantaneous network’s traffic is more than
data traffic is related to midday, i.e., 10 a.m. to 18 p.m., the threshold level z, get the information of frequency
while it decreases on early morning and midnight. Hence, counter of the requested video files ck ; k ¼ 1; . . . ; M, and the
the length of sliding time window t i is changed over time, time of requests, and sequentially check the network’s traf-
as shown in Fig. 2a. The optimum value of h leads to accel- fic until it is equal or less than z, then calculate Rck ðti Þ by
erating the identification of files that have been recently (5), to select the most popular files as in Case 1.
popular and reducing the network’s traffic. In addition, Step 4. Sorting Process. Sort the video files in descending
as will be shown in Section 5, parameter h is numerically order of Rck ðti Þ, meaning that the video file with the highest
selected in order to maximize the cache hit ratio, while value of Rck ðti Þ is the most popular file.
minimizing the additional network’s traffic. To investi- Step 5. Termination. Update the cache of FAPs by storing
gate the impact of the user’s mobility on parameter h and the first set of popular video files equal to the capacity
considering the fact that the value of h depends on the of the cache memory. Then, set NR ¼ 0 and t0 ¼ tLast is
average network’s traffic, if clients move inside a cell, replaced with t1 ¼ tLast and the algorithm in Phase 2 is
while the average number of active users experiences repeated from Step 2.
smooth fluctuations, the mobility of users has no effect on Remark 1. It is worth mentioning that using (5), if the time
h. Using parameter h obtained from Phase 1, the MBS uti- of user’s request tA" is close to the current updating time
lizes an adaptive time window to trace all requested ti , the higher value of Rck ðti Þ, corresponding to the
video files and gets the information of both frequency requested file ck , is achieved. Hence, recent requested
counter (or equivalently, the number of requests associ- contents have more priority than the older ones to be
ated with video file ck ) and the time of requests corre- stored into the cache of FAPs. In this regard, the video file
sponding to tA" , denoted by Kck ðtA" Þ. More precisely, as with the highest value of Rck ðti Þ is the most popular file.
shown in Fig. 2b, if the time interval between two conse- The proposed WLF-ATW cache replacement strategy
cutive updating times, for instance the time duration eliminates the cache pollution by considering the time of
t i ¼ ½ti1 ; ti , is divided to equal size D ¼ tA"  tA"1 , video file requests. The pseudo-code of proposed WLF-
Kck ðtA" Þ represents the number of requests of video file ck ATW algorithm is outlined in Algorithm 1.
at time interval ½tA"1 ; tA"  over the period of t i . In this
regard, tA" is obtained as follows: Algorithm 2. Fairness Scheduling-based with an Adaptive
Time Window (FS-ATW) Algorithm. This algorithm is based
ti  ti1
tA" ¼ ð"  1Þ  D þ ti1 ; " ¼ 1; 2; . . . ; : (4) on the fairness scheduling in order to minimize the users’
D access delay in (1). Since the number of requests and
It should be noted that the value of D is selected in such a demanded contents are different in each FAP, the cache
way that ti tDi1 would be integer. In the following, we pro- updating time and stored contents in each FAP are not
pose the second phase of the innovative WLF-ATW cache equal. It means that the cache replacement phase is not per-
replacement strategy. formed in a centralized manner by the MBS. The most sig-
Phase 2. (Content Rating Calculation). In the second phase nificant benefit of our distributed content replacement is
of the WLF-ATW cache replacement algorithm, the content that the video files, which are stored in the cache of FAPs,
replacement is done based on the frequency and the recency are different, therefore, it is suitable for clients that access to
information of contents. In this regard, all the following more than one FAP. Consequently, the following phases are
steps are performed by the MBS. performed for fj ; j ¼ 1; . . . ; N.
Step 1. Initialization. Set i ¼ 1, NR ¼ 0, t0 ¼ tLast , and h is Phase 1 (Adaptive Time Window Length Identification). In this
selected from Phase 1. phase, distances between UTs and FAPs are calculated to find
Step 2. Submit Information. Count the number of users’ all users in the transmission range of FAPs. According to the
requests in the network (i.e., parameter NR ), and compare assumption that each user just accesses to one FAP, the dis-
that with the threshold level h. Till NR is less than h, get the tance between FAP fj and all users is calculated as follows:
information of frequency counter of requested video files X
j1
ck ; k ¼ 1; . . . ; M, and the corresponding time of request tA" , ðxul  xfj Þ2 þ ðyul  yfj Þ2  r2 ; l ¼ 1; . . . ; S  Nk ; (6)
both represented by Kck ðtA" Þ. k¼1

Authorized licensed use limited to: UNIVERSITY TEKNOLOGI MALAYSIA. Downloaded on June 02,2021 at 10:19:43 UTC from IEEE Xplore. Restrictions apply.
1482 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 18, NO. 7, JULY 2019

where ðxul ; yul Þ and ðxfj ; yfj Þ represent spatial coordinates Step 2. Updating Time Calculation. Count the number of
of user ul and FAP fj , respectively. For the case, when users’ requests in the FAP fj ; j ¼ 1; . . . ; N (i.e., parameter
the transmission ranges of FAPs do not overlap and NRj ), and compare that with the threshold level hj . While
assuming that each user can access to only one FAP, the NRj reaches the value of hj and the instantaneous network’s
distance
P in (6) must be calculated for FAP fj and traffic is equal or less than zj , the cache replacement for
S  j1 h¼1 h users, j ¼ 1; . . . ; N. In contrast to Phase 1 in
N FAP fj occurs.
the WLF-ATW strategy, hj is determined for FAP Step 3. (Acknowledgment). At the time of cache replace-
fj ; j ¼ 1; . . . ; N, based on the network’s traffic on the cor- ment ti , all mobile users in the transmission range of FAP fj
responding FAP fj . Denoting NRj as the number of send an ACK message to the corresponding FAP. In the
requested contents arrived at FAP fj ; once NRj ¼ hj and other words, if FAP fj receives an ACK message at time ti
ðrÞ
the instantaneous network’s traffic is equal or less than from user ul ; r ¼ 1; . . . ; N; r 6¼ j, that they did not connect
ðrÞ
the threshold zj , the cache replacement process on FAP to the FAP fj at time ti1 , it means that ul is a mobile user.
fj commences. Therefore, the number of users in the transmission range of
FAP fj are updated with the value of Nj at time ti . In this
Algorithm 1. Proposed WLF-ATW Cache Replacement regard, the fixed and mobile users connecting to the FAP fj
Strategy are considered on the optimization problem in the next step.
1: Phase 1 (Adaptive Time Window Identification): Step 4. User’s Access Delay Calculation. To minimize the
ðjÞ
2: Consider the network’s traffic to select the best value of h. user’s access delay of all users ul , l ¼ 1; . . . ; Nj , in the com-
3: Phase 2 (Content Rating Calculation): munication range of FAP fj , the optimization problem is
ðjÞ
4: Initialization: Set i ¼ 1, NR ¼ 0, t0 ¼ tLast , h is selected performed for each user ul as
from Phase 1. min DuðjÞ ; l ¼ 1; . . . ; Nj ;
Tl;k l
5: for All users’ requests do
6: while NR < h do X
M (7)
7: Get the information of frequency counter Kck ðtA" Þ and subject to sck ð1  T l;k Þ  Cfj ;
time of request tA" . k¼1

8: NR NR þ 1 where DuðjÞ is obtained by (1). We form an Nj  M indicator


9: end while l
10: if NR ¼ h then variable matrix of FAP fj , denoted by T fj , which lth row of
11: Check the instantaneous network’s traffic T fj is the solution of the optimization problem in (7) for
ðjÞ
12: if The instantaneous network’s traffic is equal or less user ul .
than the threshold z then Step 5. Fairness Scheduling. Considering the fact that
13: for All requested video files ck do the cache capacity of FAPs is not enough to save all users’
14: Calculate Rck ðti Þ of all requested video files accord- popular contents, users are ranked according to their satis-
ing to (5). factions. In this regard, we define the difference vector
15: end for E ¼ ½e1 ; . . . ; eNj , where el is obtained as follows:
16: else NTl
17: while The instantaneous network’s traffic is more el ¼ ; l ¼ 1; . . . ; Nj ; (8)
than z do NSl
18: Get the information of frequency counter Kck ðtA" Þ where NSl and NTl represent the number of satisfied requests
and time of request tA" . ðjÞ
19: end while of user ul by FAP fj and the total number of user’s requests
ðjÞ
20: for All requested video files ck do ul in the adaptive time window, respectively. A large
21: Calculate Rck ðti Þ. value of el represents the minority of user’s requests served
22: end for by FAP; for this reason, the priority of this user is more in
ðjÞ
23: end if the next updating time. Accordingly, the priority of user ul
24: Sort the video files in descending order of Rck ðti Þ. in ith time window, denoted by rl ðti Þ, is obtained as
25: for All i 2 N do
26: Update the cache of FAPs by storing the first set of rl ðti Þ ¼ el rl ðti1 Þ; l ¼ 1; . . . ; Nj : (9)
videos equal to the capacity of the cache memory ðjÞ
27: end for Since T l;k ¼ 0 represents the interest of user ul to file ck ,
ðjÞ
28: ti ¼ tLast , i i þ 1, NR ¼ 0. the priority of user ul is meaningless. Therefore, the
29: end if complementation of matrix T fj , denoted by T cfj , is
30: end for formed, in which the element T cl;k ¼ 1 shows the popular-
ðjÞ
31: Output: Update cache of all FAPs f j , j 2 N. ity of file ck for user ul .
c ðjÞ
After the matrix T fj formation, the priority of user ul is
c
Phase 2 (Content Replacement). In this phase, contents are multiplied in lth row of matrix T fj , and the matrix U fj is
ranked based on minimizing the users’ access delay in (1). obtained in the current updating time ti , where U l;k ¼
Then, the most popular ones are stored in the cache of FAPs rl ðti Þ  T cl;k . Then, the elements of column k, k ¼ 1; . . . ; M of
ðjÞ
till the capacity of the cache memory is not full. This phase matrix U fj , represented the rank of file ck for users ul ,
is performed as follows. l ¼ 1; . . . ; Nj , are added together and the cache replacement
Step 1. Initialization. Set i ¼ 1, NRj ¼ 0, t0 ¼ tLast , and hj is of FAP fj matrix, denoted by Rfj ¼ ½r1 ; . . . ; rM  is obtained,
PNj
selected from Phase 1 for each FAP fj ; j ¼ 1; . . . ; N. where rk ¼ l¼1 U l;k .

Authorized licensed use limited to: UNIVERSITY TEKNOLOGI MALAYSIA. Downloaded on June 02,2021 at 10:19:43 UTC from IEEE Xplore. Restrictions apply.
HAJIAKHONDI-MEYBODI ET AL.: CACHE REPLACEMENT SCHEMES BASED ON ADAPTIVE TIME WINDOW FOR VIDEO ON ... 1483

Algorithm 2. Proposed FS-ATW Cache Replacement Step 6. Termination. Sort the video files in descending
Strategy order of rk , meaning that the video file with the highest
value of rk is the most popular file. Then, update the cache
1: Phase 1 (Adaptive Time Window Identification): of FAP fj by storing the first set of popular video files equal
2: for fj ; j ¼ 1; . . . ; N, do
to the capacity of the cache memory. Finally, set NRj ¼ 0
3: Calculate the distances between UTs and FAPs to find all
and t0 ¼ tLast is replaced with t1 ¼ tLast and the algorithm in
UTs in the communication range of FAPs according to:
Phase 2 is repeated from Step 2.
X
j1
The pseudo-code of our proposed algorithm is outlined
ðxul  xfj Þ2 þ ðyul  yfj Þ2  r2 l ¼ 1; . . . ; S  Nk ;
k¼1
in Algorithm 2. In general, the computational complexity of
the FS-ATW scheme is of order OðNNj MÞ, where N, Nj and
4: Consider the network’s traffic to select the best value of
M are the number of FAPs, the cardinality of clients in the
hj .
transmission range of FAP fj and the number of distin-
5: end for
6: Phase 2 (Content Replacement):
guished video contents in an implemented network, respec-
7: Initialization: Set i ¼ 1, NRj ¼ 0, t0 ¼ tLast , hj is selected tively. In more details, in the first Phase, distances between
from Phase 1 for each FAP fj ; j ¼ 1; . . . ; N. UTs and FAPs are calculated to find all users P in the trans-
8: for fj ; j ¼ 1; . . . ; N, do mission range of FAPs, where OðN  ðS  j1 k¼1 Nk ÞÞ stands
9: for All users’ requests do for the complexity of Phase 1. Moreover, the order of com-
10: NRj NRj þ 1 plexity of the optimization problem in the second Phase is
Cf
11: if NRj ¼ hj then OðNj  ðð2M  Mj  3Þ þ M þ M 2 ÞÞ, where Mj ¼ sc j illus-
k
12: if The instantaneous network’s traffic is less than the trates the capacity of FAP fj in the number of contents,
threshold zj then and the last step, related to sorting of popular contents is
13: All users send an ACK message to the correspond- of order OðMj2 Þ. Therefore, the total complexity of the FS-
ing FAP fj P
ðjÞ
ATW is OððN  ðS  j1 k¼1 Nk ÞÞ þ N  ðNj  ðð2M  Mj  3Þ þ
14: for All users ul do M þ M 2 Þ þ Mj2 ÞÞ. To compare the computational complexity
ðjÞ
15: Calculate the user’s access delay for all users ul of the FS-ATW scheme with other cache replacement algo-
in the communication range of FAP fj as follows: rithms such as the femtocaching algorithm in [2], it is worth
X
M
mentioning that the complexity of the femtocaching strategy
DuðjÞ ¼ ’ck PuðjÞ ;c T ck ;fj ; P
l l k in [2] is of order OððN þ SÞMÞ, where S ¼ N N
j¼1 j is the
k¼1
total number of clients in the network. Obviously, the imple-
16: Then minimize the optimization problem as fol- mentation of the FS-ATW algorithm in the network make a
lows: bit more complexity than the femtocaching strategy in [2],
while the FS-ATW scheme leads to 33 percent improvement
min DuðjÞ ; l ¼ 1; . . . ; Nj ;
T ðjÞ l in the load balance of clients when compared to the uncoded
ck ;u
l
femtocaching algorithm in [2]. It means that the number of
X
M
satisfied users in a caching-based network implemented by
s:t: sck ð1  T c ðjÞ Þ  Cfj :
k ;ul the FS-ATW strategy, due to the fairness scheduling is more
k¼1
than the uncoded femtocaching algorithm in [2].
17: Calculate the difference vector E ¼ ½e1 ; . . . ; eNj 
Nl
where el ¼ Tl .
NS 5 NUMERICAL RESULTS
18: Then calculate the priority of users according to:
In this section, we evaluate and compare the performances
rl ðti Þ ¼ el rl ðti1 Þ of the proposed WLF-ATW and FS-ATW algorithms in dif-
ðjÞ ferent scenarios with the existing conventional replacement
19: Multiple the priority of user ul by lth row of strategies such as the LRU and the LFU algorithms in [8],
matrix T cfj and then add the columns. [15] and the femtocaching replacement strategy [2] in terms
20: end for
of the cache hit ratio, transferred byte volume, user’s access
21: else
delay, user’s experience and the effect of cache capacity. For
22: while The instantaneous network’s traffic is more
the scenarios under simulation, we investigate how the
than zj do
cache replacement phase affects the aforementioned perfor-
23: Check the instantaneous network’s traffic, until
it is equal or less than zj , then do Step 13 till 19. mance metrics, and show the superiority of our algorithms
24: end while compared with traditional cache replacement methods.
25: end if Simulation Setup. We consider a macro cellular network
26: Sort the video files in descending order of rk . implemented at the Yazd University where 5104 UTs are
27: Update the cache of FAP f j by storing the first set of uniformly distributed inside the area covered by the MBS
videos equal to the capacity of the cache memory with the radius R ¼ 500 m. The MBS uses a transmission
28: ti ¼ tLast , i i þ 1, NRj ¼ 0. scheme similar to the 4G LTE standard, based on the OFDM
29: end if physical layer. In our simulation, we assume that the con-
30: end for nectivity range of each FAP is r ¼ 20 m, and the transmis-
31: end for sion range of FAPs are not overlapped as used in [2]. In
32: Output: Update the cache of all FAPs f j , j 2 N. addition, we assume that the size of all requested contents
is the same and about 37.5 MB, which is reasonable

Authorized licensed use limited to: UNIVERSITY TEKNOLOGI MALAYSIA. Downloaded on June 02,2021 at 10:19:43 UTC from IEEE Xplore. Restrictions apply.
1484 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 18, NO. 7, JULY 2019

Second Scenario. In this part, we compare the performance


of our proposed replacement algorithms described in Sec-
tion 4 with the LRU, LFU, Window-LRFU and the uncoded
femtocaching replacement strategy in [2] from the aspect of
the cache hit ratio over the period of November 1, 2015 to
December 1, 2015 in 30 consecutive days. Since the WLF-
ATW algorithm is based on a combination of the content’s
recency and frequency information, it is seen in Fig. 5a that
our proposed WLF-ATW algorithm exhibits a higher cache
hit ratio when compared to the LRU, the LFU and the Win-
dow-LRFU schemes. This can be justified by noting that our
WLF-ATW algorithm predicts the popular contents based
Fig. 4. The cache hit ratio versus different values of h in the WLF-ATW on the both recency and frequency information of contents.
cache replacement algorithm.
On the other hand, the proposed FS-ATW algorithm is com-
assuming for 720p format with a resolution of 1280  720 px, pared with the uncoded femtocaching replacement strategy
known as “HD” resolution, and a short length ( 5 min) play- introduced in [2] in Fig. 5b. As previously mentioned, the
back time. Furthermore, it is supposed that the cache size of uncoded femtocaching algorithm aims to solve an optimiza-
each FAP is 22.5 GB, i.e., 10 percent size of total contents. In tion problem in finding the optimum way of assigning files
this dataset, the total number of requested files is equal to to the FAPs, in order to minimize the expected download-
1846707, which 42.99 percent of them (or equivalently 820812 ing time of contents. For this reason, the uncoded femto-
video files) are duplicated requests. All simulations are run caching algorithm in [2] is considered here as a benchmark
on a personal computer with 2.6 GHz Intel Core i7 with 16 GB scheme. As seen from Fig. 5b, the gap between the uncoded
RAM using the MATLAB software 8.6.0.267246 (R2015b). In femtocaching scheme in [2] and our proposed FS-ATW
these scenarios, it is assumed that the connectivity between algorithm is negligible. However, it is worth mentioning
users and FAPs does not change during the transmission of a that the FS-ATW scheme has the best performance in terms
video file. In addition, the number of active users per time are of the user’s experience, due to considering the fairness
calculated based on the information extracted from the cam- scheduling to select the cache contents.
pus network at the Yazd University as shown in Fig. 3. Taking We also evaluate the performance of our proposed WLF-
the above considerations into account, we present the follow- ATW replacement algorithm with that of the Window-
ing scenarios based on the proposed cache replacement strate- LRFU, LRU and LFU schemes from the aspect of transferred
gies described in Algorithms 1 and 2. byte volume during 30 consecutive days in Fig. 6a. It should
First Scenario. We first evaluate the effect of different val- be noted that if the size of requested contents is equal, the
ues of h on the WLF-ATW replacement algorithm described amount of data flowing between the MBS and FAPs are
in Section 4, where we consider 5104 users over the period inversely proportional to the cache hit ratio. In general,
of November 1, 2015 to February 1, 2016 in a macro cellular increasing the probability of finding the desired content in
network implemented at the Yazd University. Fig. 4 illus- the local FAP’s cache memories leads to decreasing the
trates the cache hit ratio versus different values of h ¼ bz, in amount of data flowing between the MBS and FAPs and a
which z represents the average network’s traffic defined in better performance of the cache replacement algorithm.
Section 4. According to the results in Fig. 4, a large value of h With the same arguments as earlier in this scenario, the FS-
leads to identifying popular contents with more delay and ATW algorithm exhibits approximately a similar behavior
decreasing the cache hit ratio. As a result, there exists a trade compared to the uncoded femtocaching benchmark in [2]
off between the on-time recognition of popular contents and (see Fig. 6b).
the network’s resources consumption. It is seen from Fig. 4 Third Scenario. In this scenario, we compare the perfor-
that the best value of h for our simulation setup is h ¼ 10z, mance of our proposed replacement algorithms with the
where we use this value for the subsequent scenarios. Window-LRFU, LRU, LFU and the uncoded femtocaching

Fig. 5. The cache hit ratio versus the period of November 1, 2015 to December 1, 2015 for (a) WLF-ATW, Window-LRFU [20], LRU [8] and LFU [15];
and (b) FS-ATW and the Uncoded Femtocaching algorithm in [2] with h ¼ 10z.

Authorized licensed use limited to: UNIVERSITY TEKNOLOGI MALAYSIA. Downloaded on June 02,2021 at 10:19:43 UTC from IEEE Xplore. Restrictions apply.
HAJIAKHONDI-MEYBODI ET AL.: CACHE REPLACEMENT SCHEMES BASED ON ADAPTIVE TIME WINDOW FOR VIDEO ON ... 1485

Fig. 6. The transferred byte volume versus the period of November 1, 2015 to December 1, 2015 for (a) WLF-ATW, Window-LRFU [20], LRU [8] and
LFU [15]; and (b) FS-ATW and the Uncoded Femtocaching algorithm in [2] with h ¼ 10z.

in terms of the average user’s access delay in an adaptive access delay, it also provides a better experience for all users
time window’s length after the updating time. Indeed, if the by deploying a fairness schedule.
requested content is in the local FAP, the user’s access delay Fourth Scenario. In this scenario, we evaluate the perfor-
would be approximated with zero, otherwise, it would be mance of the proposed WLF-ATW and FS-ATW replace-
’ck . For a better comparison of the user’s access delay, we ment algorithms with the Window-LRFU, LRU, LFU and
normalize DuðiÞ with the maximum value of access latency the uncoded femtocaching from the aspect of the user’s
j
to file ck (i.e., parameter ’ck ). With the same arguments as in experience. As observed from Fig. 8, due to considering
the second scenario, the proposed WLF-ATW and FS-ATW the fairness scheduling to select the cache contents, the
algorithms significantly reduce the user’s access delay proposed FS-ATW scheme has the best performance in
when compared to the Window-LRFU, LRU and the LFU terms of the user’s experience which illustrates the aver-
schemes. As seen from Fig. 7, the FS-ATW algorithm drasti- age immediate satisfied requested content of all users.
cally reduces the average delay of all users, while the result Since conventional cache replacement algorithms gener-
is close to the uncoded femtocaching benchmark in [2]. ally neglect the fairness scheduling in their policies of
Hence, the FS-ATW algorithm not only decreases the user’s selecting popular contents, the average immediate satis-
fied requests in the FS-ATW is maximum. In this regard,
the proposed FS-ATW algorithm makes an effort to equi-
tably dedicate the cache capacity among the users. Hence,
the priority of storing popular contents is related to the
latest users’ situations.
Fifth Scenario. In this scenario, we demonstrate the effect
of increasing the storage capacity of each FAP on the sys-
tem’s performance. Fig. 9 compares the cache hit ratio ver-
sus the storage capacity of FAP stations which is expressed
as the percentage of the total volume of files in the network.
It is observed from Fig. 9 that increasing the volume of
cache capacity in all replacement strategies leads to enhanc-
ing the cache hit ratio. However, as it can be seen from
Fig. 7. The users access normalized average delay versus the period of
Fig. 9, the proposed FS-ATW algorithm displays almost the
November 1, 2015 to December 1, 2015 for WLF-ATW, FS-ATW,
Uncoded Femtocaching algorithm in [2], Window-LRFU [20], LRU [8], same behavior as the uncoded femtocaching algorithm,
and LFU [15] cache replacement algorithms with h ¼ 10z. known as the benchmark in this work, where the cache

Fig. 8. The user’s experience versus the period of November 1, 2015 to Fig. 9. The effect of cache capacity of FAPs on the cache hit ratio for
December 1, 2015 for WLF-ATW, FS-ATW, Uncoded Femtocaching WLF-ATW, FS-ATW, Uncoded Femtocaching algorithm in [2], Window-
algorithm in [2], Window-LRFU [20], LRU [8], and LFU [15] cache LRFU [20], LRU [8], and LFU [15] cache replacement algorithms with
replacement algorithms with h ¼ 10z. h ¼ 10z.

Authorized licensed use limited to: UNIVERSITY TEKNOLOGI MALAYSIA. Downloaded on June 02,2021 at 10:19:43 UTC from IEEE Xplore. Restrictions apply.
1486 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 18, NO. 7, JULY 2019

the portion of the number of satisfied requests of each user


versus the total number of the user’s requests. Numerical
results have shown almost 22 percent improvement in the
user’s experience for the FS-ATW algorithm when com-
pared to the uncoded femtocaching algorithm in [2]. In
addition, our evaluations showed that the WLF-ATW
scheme, with a simple computational complexity compared
to the FS-ATW and the uncoded femtocaching in [2], out-
performed the Window-LRFU, the LRU and the LFU algo-
rithms in different scenarios. In this paper, we assumed that
all the FAPs work in the closed-access mode. Our future
Fig. 10. The load balance versus the clients for FS-ATW, Uncoded research involves considering the effect of mobility and fluc-
Femtocaching [2], and Window-LRFU cache replacement algorithms tuation of the number of active users on the Adaptive Time
with h ¼ 10z. Window method in an open-accessed mode femto network.
capacity of FAPs is more than 60 percent of the total volume
of files in the network.
ACKNOWLEDGMENTS
Sixth Scenario. Finally, we evaluate the performance of The work was supported in part by the project entitled
the proposed FS-ATW replacement algorithms with the “Femtocaching Networks,” T/500/5856-ITRC, Iran.
Window-LRFU and the uncoded femtocaching from the
aspect of the load balance introduced in Section 2. To illus- REFERENCES
trate the advantage of the proposed FS-ATW scheme in [1] S. Andreev, O. Galinina, A. Pyattaev, J. Hosek, P. Masek, H.
terms of the load balance, we evaluate the number of Yanikomeroglu, and Y. Koucheryavy, “Exploring synergy
requested contents of 100 users, served by the MBS in the between communications, caching and computing in 5G-grade
deployments,” IEEE Commun. Mag., vol. 54, no. 8, pp. 60–69, Aug.
implemented cache-based network at the Yazd University. 2016.
As shown in Fig. 10, the flat distribution of the load balance [2] K. Shanmugam, N. Golrezaei, A. G. Dimakis, A. F. Molisch, and
for clients in the FS-ATW strategy indicates that all users G. Caire, “FemtoCaching: Wireless content delivery through dis-
benefit equally from FAPs and the intense fluctuations in tributed caching helpers,” IEEE Trans. Inf. Theory, vol. 59, no. 12,
pp. 8402–8413, Dec. 2013.
the case of uncoded femtocaching and Window-LRFU algo- [3] Cisco, Cisco visual networking index: Global mobile data traffic
rithms illustrate that the satisfaction rate of all users is not forecast update, 2015–2020 white paper, 2016. [Online]. Available:
the same and some users have more priority in the network. http://www.cisco.com/c/en/us/solutions/collateral/service-
provider/visual-networking-index-vni/mobile-white-paper-c11-
As observed from Figs. 8 and 10, the proposed FS-ATW 520862.html
scheme with emphasis on the fairness of the cache replace- [4] H. ElAarag, Web Proxy Cache Replacement Strategies: Simulation,
ment strategy to select the cache contents has the best per- Implementation and Performance Evaluation. Berlin, Germany:
formance in terms of the user’s experience which illustrates Springer Science & Business Media, 2012.
[5] H. Ahlehagh and S. Dey, “Video-aware scheduling and caching in
the average immediate satisfied requested content of all the radio access network,” IEEE/ACM Trans. Netw., vol. 22, no. 5,
users. Since conventional cache replacement algorithms dis- pp. 1444–1462, Oct. 2014.
regard the fairness to select the most popular files, these [6] K. Psounis and B. Prabhakar, “Efficient randomized web-cache
strategies such as the femtocaching scheme in [2] just reduce replacement schemes using samples from past eviction times,”
IEEE/ACM Trans. Netw., vol. 10, no. 4, pp. 441–455, Aug. 2002.
the network’s load, however, the FS-ATW scheme decreases [7] S. Jiang and X. Zhang, “LIRS: An efficient low inter-reference
both the network’s traffic and the client’s load. recency set replacement policy to improve buffer cache perform-
ance,” ACM SIGMETRICS Perform. Eval. Rev., vol. 30, no. 1,
pp. 31–42, 2002.
6 CONCLUSION [8] M. Z. Farooqui, M. Shoaib, and M. Z. Khan, “A comprehensive
In this paper, we proposed two innovative cache replace- survey of page replacement algorithms,” Int. J. Adv. Res. Comput.
Eng. Technol., vol. 3, pp. 52–58, 2014.
ment algorithms based on the dataset obtained from the [9] A. Giovanidis and A. Avranas, “Spatial multi-LRU caching for
campus network at the Yazd University. The first algorithm, wireless networks with coverage overlaps,” in Proc. ACM SIG-
called Weighted Least Frequently used with an Adaptive METRICS Int. Conf. Meas. Model. Comput. Sci., 2016, pp. 403–405.
Time Window, intended to deal with the network’s traffic [10] M. Arlitt, R. Friedrich, and T. Jin, “Performance evaluation of web
proxy cache replacement policies,” Elsevier Perform. Eval., vol. 39,
and the recognition of popular files. The WLF-ATW algo- no. 1, pp. 149–164, 2000.
rithm uses frequency counters and the recency information [11] G. Einziger and R. Friedman, “TinyLFU: A highly efficient cache
of the contents in the victim selection process. Furthermore, admission policy,” in Proc. IEEE Euromicro Int. Conf. Parallel Dis-
trib. Netw.-Based Process., 2014, pp. 146–153.
we extended the WLF-ATW scheme to a new algorithm, [12] J. Alghazo, A. Akaaboune, and N. Botros, “SF-LRU cache replace-
namely Fairness Scheduling-based with an Adaptive Time ment algorithm,” in Proc. IEEE Int. Workshop Memory Technol. Des.
Window to schedule user’s requests fairly with the aim of Testing, 2004, pp. 19–24.
maximizing the user’s experience. We realized the best [13] M. Kharbutli and R. Sheikh, “LACS: A locality-aware cost-sensi-
tive cache replacement algorithm,” IEEE Trans. Comput., vol. 63,
updating time and solved the optimization problem of min- no. 8, pp. 1975–1987, Aug. 2014.
imizing the user’s access delay. The uniqueness of our pro- [14] N. Golrezaei, K. Shanmugam, A. G. D. G, A. F. Molisch, and G.
posed FS-ATW lies in ranking users according to their last Caire, “FemtoCaching: Wireless video content delivery through
conditions that lead to a further user’s experience. Since our distributed caching helpers,” in Proc. IEEE INFOCOM, 2012,
pp. 1107–1115.
work has focused on the improvement of the user’s experi-
ence, we defined a difference vector for all users to identify

Authorized licensed use limited to: UNIVERSITY TEKNOLOGI MALAYSIA. Downloaded on June 02,2021 at 10:19:43 UTC from IEEE Xplore. Restrictions apply.
HAJIAKHONDI-MEYBODI ET AL.: CACHE REPLACEMENT SCHEMES BASED ON ADAPTIVE TIME WINDOW FOR VIDEO ON ... 1487

[15] S. Podlipnig and L. B€ osz€


ormenyi, “A survey of web cache replace- Zohreh Hajiakhondi-Meybodi received the BSc
ment strategies,” ACM Comput. Surv., vol. 35, no. 4, pp. 374–398, degree in communication engineering from Yazd
2003. University, Iran, and the MSc degree in communi-
[16] M. Abrams, C. R. Standridge, G. Abdulla, E. A. Fox, and S. cation systems engineering (with the highest
Williams, “Removal policies in network caches for World-Wide honor) from Yazd University, Iran, in 2013 and
Web documents,” in Proc. ACM SIGCOMM Comput. Commun. 2017, respectively. Since 2014, she has been an
Rev., 1996, pp. 293–305. active member of the WINEL Research Lab at
[17] D. Lee, J. Choi, J. Kim, S. H. Noh, S. L. Min, Y. Cho, and C. S. Kim, Yazd University. Her research interests are in gen-
“LRFU: A spectrum of policies that subsumes the least recently eral areas of wireless communication networks
used and least frequently used policies,” IEEE Trans. Comput., and optimization algorithms, with particular refer-
vol. 50, no. 12, pp. 1352–1361, Dec. 2001. ence to applications of caching-based systems.
[18] N. Megiddo and D. S. Modha, “Outperforming LRU with an
adaptive replacement cache algorithm,” IEEE Comput., vol. 37, Jamshid Abouei received the BSc degree in
no. 4, pp. 58–65, Apr. 2004. electronics engineering and the MSc degree in
[19] S. Das and A. Banerjee, “An arbitration on cache replacements communication systems engineering (with the
based on frequency-recency product values,” in Proc. IEEE Int. highest honor) both from the Isfahan University
Conf. VLSI Syst. Archit. Technol. Appl., 2016, pp. 1–6. of Technology (IUT), Iran, in 1993 and 1996,
[20] S. Bai, X. Bai, and X. Che, “Window-LRFU: A cache replacement respectively, and the PhD degree in electrical
policy subsumes the LRU and Window-LFU policies,” Concur- engineering from the University of Waterloo,
rency Comput.: Practice Experience, vol. 28, no. 9, pp. 2670–2684, Waterloo, ON, Canada, in 2009. From 2009 to
2016. 2010, he was a postdoctoral fellow in the Multi-
[21] A. Pingyod and Y. Somchit, “Rank-based content updating media Lab, Department of Electrical & Computer
method in femtocaching,” in Proc. TENCON IEEE Region 10 Conf., Engineering, University of Toronto, ON, Canada.
2014, pp. 1–6. Currently, he is an associate professor with the Department of Electrical
[22] M. V. D. S. S. Li, J. Xu, and W. Li, “Popularity-driven content cach- Engineering, Yazd University, Iran. His research interests are in general
ing,” in Proc. IEEE Comput. Commun., 2016, pp. 1–9. areas of wireless ad hoc and sensor networks, with particular reference
[23] M. V. D. S. S. Mller, O. Atan, and A. Klein, “Smart caching in wire- to energy efficiency and optimal resource allocations. He is a senior
less small cell networks via contextual multi-armed bandits,” in member of the IEEE.
Proc. IEEE Commun., 2016, pp. 1–7.
[24] M. V. D. S. S. Li, J. Xu, and W. Li, “Trend-aware video caching
through online learning,” IEEE Trans. Multimedia, vol. 18, no. 12, Amir Hossein Fahim Raouf received the BSc
pp. 2503–2516, Dec. 2016. degree in communication systems engineering
[25] M. V. D. S. S. Mller, O. Atan, and A. Klein, “Context-aware proac- from the Isfahan University of Technology (IUT),
tive content caching with service differentiation in wireless Iran, and the MSc degree in communication sys-
networks,” IEEE Trans. Wireless Commun., vol. 16, no. 2, pp. 1024– tems engineering from Yazd University, Iran, in
1036, Feb. 2017. 2012 and 2016, respectively. Since 2013, he has
[26] R. T. R. M. B. A. Sengupta, S. Amuru, and T. C. Clancy, “Learning been an active member of the WINEL Research
distributed caching strategies in small cell networks,” in Proc. Lab at Yazd University. His research interests
IEEE Wireless Commun. Syst., 2014, pp. 917–921. are in general areas of wireless communication
[27] J. Yue, B. Yang, C. Chen, X. Guan, and W. Zhang, “Femtocaching networks, information theory, and network cod-
in video content delivery: Assignment of video clips to serve ing. He is a student member of the IEEE.
dynamic mobile users,” Comput. Commun., vol. 51, pp. 60–69,
Sept. 2014. " For more information on this or any other computing topic,
[28] R. Sheikh and M. Kharbutli, “Improving cache performance by please visit our Digital Library at www.computer.org/publications/dlib.
combining cost-sensitivity and locality principles in cache replace-
ment algorithms,” in Proc. IEEE Int. Conf. Comput. Des., 2010,
pp. 76–83.
[29] S. Bhalgama and S. S. Parmar, “A novel adaptive cache replace-
ment policy using weighting and ranking parameter,” Amer. Int. J.
Contemporary Sci. Res., vol. 2, no. 5, pp. 7–16, 2015.
[30] T. Chen, “Obtaining the optimal cache document replacement
policy for the caching system of an EC website,” Eur. J. Oper. Res.,
vol. 181, no. 2, pp. 828–841, 2007.
[31] D. Marinca, A. Hamieh, D. Barth, K. Khawam, D. D.
Vleeschauwer, and Y. Lelouedec, “Cache management using tem-
poral pattern based solicitation for content delivery,” in Proc.
IEEE Int. Conf. Telecommun., 2012, pp. 1–6.
[32] S. H. Jeon, S. An, C. Yoon, H. Lee, and J. Choi, “User centric con-
tent management system for open IPTV over SNS,” J. Commun.
Netw., vol. 17, no. 3, pp. 296–305, 2015.
[33] W. K. S. Tang, E. W. M. Wong, S. Chan, and K. Ko, “Optimal video
placement scheme for batching VOD services,” IEEE Trans. Broad-
cast., vol. 50, no. 1, pp. 16–25, Mar. 2004.

Authorized licensed use limited to: UNIVERSITY TEKNOLOGI MALAYSIA. Downloaded on June 02,2021 at 10:19:43 UTC from IEEE Xplore. Restrictions apply.

You might also like