Next Article in Journal
Vibration-Based Damage Detection Using Finite Element Modeling and the Metaheuristic Particle Swarm Optimization Algorithm
Previous Article in Journal
Misfire Detection in Automotive Engines Using a Smartphone through Wavelet and Chaos Analysis
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Proactive Caching in D2D Assisted Multitier Cellular Network

1
Department of Electrical and Computer Engineering, COMSATS University Islamabad, Wah Campus, Wah 47040, Pakistan
2
Faculty of Electrical and Computer Engineering, University of Engineering and Technology Peshawar, Peshawar 25000, Pakistan
3
Research Chair of New Emerging Technologies and 5G Networks and Beyond, Computer Engineering Department, College of Computer and Information Sciences, King Saud University, Riyadh 11543, Saudi Arabia
4
Department of Computer Engineering, College of Computer and Information Sciences, King Saud University, Riyadh 11543, Saudi Arabia
*
Authors to whom correspondence should be addressed.
Sensors 2022, 22(14), 5078; https://doi.org/10.3390/s22145078
Submission received: 14 June 2022 / Revised: 29 June 2022 / Accepted: 1 July 2022 / Published: 6 July 2022
(This article belongs to the Section Communications)

Abstract

:
Cache-enabled networks suffer hugely from the challenge of content caching and content delivery. In this regard, cache-enabled device-to-device (D2D) assisted multitier cellular networks are expected to relieve the network data pressure and effectively solve the problem of content placement and content delivery. Consequently, the user can have a better opportunity to get their favored contents from nearby cache-enabled transmitters (CETs) through reliable and good-quality links; however, as expected, designing an effective caching policy is a challenging task due to the limited cache memory of CETs and uncertainty in user preferences. In this article, we introduce a joint content placement and content delivery technique for D2D assisted multitier cellular networks (D2DMCN). A support vector machine (SVM) is employed to predict the content popularity to determine which content is to be cached and where it is to be cached, thereby increasing the overall cache hit ratio (CHR). The content request is satisfied either by the neighboring node through the D2D link or by the cache-enabled base stations (BSs) of the multitier cellular networks (MCNs). Similarly, to solve the problem of optimal content delivery, the Hungarian algorithm is employed aiming to improve the quality of satisfaction. The simulation results indicate that the proposed content placement strategy effectively optimizes the overall cache hit ratio of the system. Similarly, an effective content delivery approach reduces the request content delivery delay and power consumption.

1. Introduction

In the recent era, although various technologies have been developed in the field of wireless communication, device-to-device (D2D) communication can be distinguished. This technology has received extensive attraction due to the fact that it can communicate directly within a certain range of distance without the assistance of an intermediate node, thus reducing the huge cost of back haul and transmission power [1,2]. In addition to this, the emergence of edge caching technology enables users to get their favored contents from their neighboring cache-enabled nodes, thus reducing latency and enhancing user experience [3] and satisfaction ratio [4]. Similarly, the introduction of multitier networks brings the network closer to the user, thus enhancing the link quality [5]. Therefore, the combination of these three techniques allows embarking on a new research arena for researchers in data traffic offloading in wireless communication. Consequently, the user can get their favored contents with little delay through good links. Highly favored contents can be cached in D2D transmitters and in the BSs of the multitier cellular networks in advance. If the requested contents are cached in neighboring D2D transmitters, then a request is served; otherwise, the request is sent to the cache-enabled multi-tier cellular networks. Every new technology has certain issues. The same is the case with proactive caching. Here, one of the big issues is content placement. The content placement determines the amount of data unloaded from the cache-enabled nodes. Hence, the cache hit ratio plays a vital role [6,7]. In this regard, the popularity of the contents should be known in advance for optimal cache placement [8,9,10,11]. Hence, if the contents are cached properly in the cache-limited memory of caching nodes, then users can download their requested contents from neighboring nodes within a short distance, thus achieving a high data rate. Similarly, the same content may be requested by different users simultaneously or the request of a user may be satisfied by multiple transmitters. Thus, content delivery needs a proper mechanism. In the nest section of this research article, we introduce some results and limitations prior to our work.

1.1. Motivation and Related Work

The existing literature includes huge data related to various proactive caching and content delivery techniques. The authors in [12,13] introduced probabilistic caching schemes by optimizing the D2D link and reliability of transmission. Similarly, the author in [14] used the Indian buffet process (IBP) to increase the caching performance by predicting the content requests. System performance was also improved by estimating the future contents requests using logistic regression models [15,16]. The author in [17] also designed new caching techniques considering user preferences. The problem of data sparsity in [18] was solved using collaborative filtering (CF) and the latent factor model. For better prediction, a deep learning algorithm was also used, which fairly and accurately predicted content popularity [19,20]. Stochastic geometry was used to address the problem of contents in terms of CHR, the density of served requests, and power consumption. In [21], the Poisson point process (PPP) solved the problem of optimal geographical content placement. Golrezaei et al. [22] introduced a caching technique for each base station (BS) to reduce the downloading delay. The survey in [23] discussed caching in two-tier small networks. In [24], the performance analysis of content caching in three-tier heterogeneous networks was discussed. However, few studies have utilized the concept of multitier caching. For instance, in [25], the authors discussed the performance analysis of content caching in three-tier heterogeneous networks while keeping content size identical. In [26], the authors suggested a caching mechanism in two-tier networks. However, the authors in [25,26] did not discuss the different caching strategies with practical considerations for limited cache. Similarly, the authors in [27,28,29] suggested different content delivery schemes from BSs to users. However, these studies were only limited to single-tier caching. On other hand, few studies have been conducted on small base station D2D (SBS-D2D) caching, again limited to single-tier only. For example, in [30], for SBS-D2D caching, an optimal cooperative-based caching policy was discussed. The authors in [31] suggested an intelligent caching technique based on Z-Pf request distribution in cache-enabled D2D networks. Similarly, the authors in [32] proposed user mobility-based content caching and solved energy and delay minimization using reinforcement learning, albeit restricted to D2D networks. In contrast to all existing studies, we combined cache-enabled D2D networks and cache-enabled multitier cellular networks to solve the problems of content caching and content delivery using SVM and the Hungarian algorithm, respectively. SVM is one of the best learners and is used in wireless communication in different scenarios [33,34,35]. It uses the radial basis function (RBF) as a kernel for transformation. The RBF can better map feature vectors into a nonlinear space as compared to other learners [36,37,38]. On the other hand, the Hungarian algorithm is also already utilized to solve various assignment issues such as resource allocation in wireless communication systems [39,40,41].

1.2. Contributions and Outcomes

The existing work mainly focused on caching favored contents in cache-enabled D2D networks. This article not only exclusively encompasses the proactive caching issues but also solves the delay and power consumption minimization problems in D2D assisted cache-enabled multitier cellular networks (D2DMCNs).
Two different algorithms are employed, one for content caching and the second one for power and delay minimization. The support vector algorithm predicts the popularity of the contents, and the Hungarian algorithm optimizes the delay and power consumption on the basis of a reward function. The content popularity prediction is based on content attributes such as the number of likes, numbers of dislikes, shares, and first-day view counts. Cache placement is carried out in the D2DMCN after predicting first-day view counts.
Although limitations exist, the addition of D2D technology to MCN greatly increases the satisfaction ratio of the users. As there is no free lunch, an agreement between D2D users and the cellular network operator is necessary. Therefore, as an incentive, extra free MBs are allocated for D2D transmitters, as their memories and battery power are used for content caching and content delivery, although incentive-based mechanisms are not discussed in this paper. This allocation of extra MBs is bounded to the memory and battery power of the D2D transmitter volunteered for proactive caching.
The major contributions of this research paper are described below.

1.2.1. Novel Caching Scheme

In this research work, a joint content caching and content delivering scheme is developed to solve the cache hit problems, content delay, and power requirements in D2DMCN. This content caching policy considers different contents attributes for their popularity. The most popular contents are placed in incentivized D2D transmitters (ID2DTs) and MCN. A picocell, microcell, and macrocell constitute an MCN.

1.2.2. Implementation of Content Placement Techniques

In this research, we use the SVM-based learning algorithm to predict content popularity. Then, on the basis of SVM’s predictions, content placement is carried out in ID2DTs and MCN. Hence, the cache hit ratio is maximized, and the delay and power consumption are minimized.

1.2.3. Content Delivery Decision Making

The content delivery problem in a cache-enabled D2DMCN is formulated as an assignment problem, where the distances of the D2D receivers (D2DRs) from ID2DTs and BSs of the MCN, channel gain, and transmission power are considered as inputs. A dynamic content delivery link is established between D2DRs and ID2DTs or between D2DRs and BSs of the MCN with the goal of minimizing the content delivery delay and power consumption, thereby solving the problem of content delivery using the Hungarian algorithm.

1.2.4. Maximization of Objective Function

A reward function is constructed, consisting of power consumption and content delay. Contents may be delivered from ID2DTs or BSs of the MCN depending on their reward function.
A simulation is conducted from the perspective of the cache-enabled ID2DTs, cache-enabled MCN, and D2D receiver. The weight coefficients of the reward function are adjusted so that the content delivery problem is optimized. Hence, the D2DRs receive contents from neighboring ID2DTs or the MCN.
Clusters based on similarities of ID2DTs are formed using K-means clustering. The ID2DTs are selected, and clusters are further squeezed into those D2DRs which are in the threshold distance range of the selected ID2DTs.

2. System Model

As shown in Figure 1, consider a cache-enabled D2DMCN consisting of cache-limited pico BSs, micro BSs, and macro BSs. The ID2DTs are also employed to serve the neighboring D2DRs. Popular contents are cached in ID2DTs and in the cache-enabled BSs of MCN. The contents are cached from a content library set = { 1 , 2 , , f , . F } . The ID2Ds set is K = { 1 , 2 , . , i , k } and D2DRs set is = { 1 , 2 , 3 , . . , j , R } . ID2DTs can store f u files while pico BSs, micro BSs, and macro BSs can store up to f p , f m , and f M files, respectively. ID2DTs have limited cache memory s D 2 D while S p ,   S m , and S M are the cache memories of pico BSs, micro BSs, and macro BSs, respectively.
The delay and power consumption in cellular communications are huge as compared to D2D communication. Consequently, the user satisfaction rate is high as they are served by ID2DTs lying in the neighborhood. However, this can be accomplished only when they are in the threshold distance range d m a x   of the ID2DTs. Otherwise, the signal quality will be very bad. If a D2DR finds its requested contents in the neighboring ID2DTs, it establishes a D2D link with them; otherwise, it sends its request to the cache-enabled MCN to offload the contents via cellular link. Each file size is considered to be the same; mostly, at each time slot, the D2DR can only request one file, and ID2DTs can send one file. The D2D users with the same content requirements form a virtual cluster. This cluster is further squeezed, and only those D2D users which are in the threshold range of the ID2DTs occupy the cluster. Figure 2 shows the formation of a squeezed cluster in proximity of the ID2DTs. The contents can be cached in pico BSs, micro BSs, and macro BSs depending on the behavior of their users. The contents are placed in ID2DTs for some allocated time and then they are replaced by new contents. The time allocation for contents to be present in the cache memory of the devices depends on the variation in the popularity of the favored contents.

3. Problem Formulation

In cache-enabled cellular networks, prime issues are what to cache and where to cache, as well as how to deliver and from where to deliver. In addition to this, efficient prediction of popularity of contents is also necessary for maximization of the cache hit ratio and minimization of the delay and power consumption. All of these problems directly affect the efficiency of cache-enabled cellular communication systems. In order to formulate our problems, we have to define certain system parameters. Table 1 shows the system-related parameters and their descriptions.
Any D2DR positioned within the proximity of the ID2DTs is considered to be in the squeezed cluster (SC), i.e., if λ i , j = 1 , then D2DR j exists within the proximity of ID2DT i . Otherwise, λ i , j = 0 .
Similarly, D2DRs are connected in one of the following modes: (i) D2D mode, (ii) pico mode, (iii) micro mode, or (iv) macro mode.
If ( d i , j ) η d ( d p , j ) η p , then Z i , j = { 1 ,   D 2 D R   i s   connected   in   D 2 D   mode 0 ,   otherwise } .
If ( d p , j ) η p ( d m , j ) η m , then Z P , j = { 1 ,   D 2 DR   is   connected   in   pico   mode 0 ,   otherwise } .
If ( d m , j ) η m ( d M , j ) η M , then Z m , j = { 1 ,   D 2 DR   is   connected   in   micro   mode 0 ,   otherwise } .
Otherwise, Z M , j = { 1 ,   D 2 DR   is   connected   to   macro   mode 0 ,   D 2 DR   is   connected   to   remote   server } .
Let R j , f be the request sent by the D2DR j for file f to ID2DT i . If the file f is cached by the ID2DT i , then X i , f = 1 ; otherwise ,   X i , f = 0 . Similarly, if the file is cached by the BS of tier t , then Y t , f = 1 ; otherwise,   Y t , f = 0 .
S j ,   S P , S m , and S M are cache memories of the ID2DT, pico BS, micro BS, and macro BS, respectively. The overall cache hit ratio of the system is given as
β = f i K j { ( X i , f R j , f λ i , j ) Z i , j + ( 1 Z i , j ) [ ( Y p , f R j , f ) Z p , j + ( 1 Z p , j ) ( ( Y m , f R j , f ) Z m , j + ( 1 Z m , j ) Y j , f R j , f Z M , j ) ] } f j R j , f
One of the tasks of this research is to optimize the overall cache hit ratio of the cache enabled D2DMCN, which is expressed as follows:
max { X i , f , Y t , f } β
subject to
C 1 : s D 2 D < s p < s m < s M
C 2 : x i , f { 0 , 1 }
C 3 : y t , f { 0 , 1 }
The objective function in Equation (2) accounts for the overall cache ratio of the system. Constraint C 1 shows the limitations for the cache memory of BSs of MCN, while constraints C 2 and C 3 are binary variables. Thus, in order to maximize the overall cache hit ratio of the cache-enabled D2DMCN, the optimal variables X i , f and Y t , f are set by constructing a suitable cache placement framework to maximize the cache hit ratio. We represent the cache hit ratio as a mixed integer linear programming (MILP) problem, which is NP-hard, whose computational complexity increases exponentially with the increasing size of the D2Ds. Hence, we suggest a machine learning-based distributed solution which has less complexity and is based on prediction of popularity of newly published contents and placement of those contents which are mostly to be viewed in near future. Accordingly, the optimization objectives of this research are described below.
First, the popularity of the contents is determined, and contents are placed in ID2DTs and the MCN, with the prime goal of improving the cache hit ratio of the system using the support vector algorithm. Then, the dynamic content delivery scheme is implemented on the basis of the Hungarian algorithm, which reduces the overall time delay and power consumption. Those D2D transmitters and receivers which have a common content interest are combined in virtual clusters. An agreement is established between ID2DTs and cellular network operators. After this, each cluster is further squeezed, and those D2DRs not in the proximity of the ID2DTs are removed from the clusters. Furthermore, a content delivery policy is also necessary to minimize the delay and power consumption. The transmission rate of either ID2DTs or the MCN varies due to the difference in channel gain and channel fading. Therefore, the transmission rate R i , j of the cache-enabled ID2DTs can be given as
R i , j = l o g 2 ( 1 + P i , j g i , j d i , j α i i P i , j d i , j α g i , j + P p , j g p , j d p , j α + P m , j g m , j d m , j α + P M , j g M , j d M , j α + σ 2 )
where P i , j is the transmit power of ID2DT i to D2DR j , g i , j and d i , j are the channel gain and distance between D2D transmitter i and D2D receiver j , respectively,   d i , j α indicates the path loss, α shows the channel attenuation index, and σ 2 is the power of Gaussian noise. P p , j , g p , j , and P m , j , g m , j are the transmit power and channel gains of the pico cell transmitter and micro cell transmitter, respectively, while d p , j and d m , j are the distance between the pico transmitter and D2DR j and between the micro transmitter and D2DR j , respectively. Similarly, P M , j is the power transmitted by the macro cell transmitter, and g M , j and d M , j are the channel gain and distance between the macro cell transmitter and D2DR j , respectively. Therefore, the delay D i j faced by D2DR j for content request and receiving that content from the neighboring D2D transmitter i is given as
D i , j = 2 d i , j R i , j
Now, the power consumed to deliver content from ID2DT i to D2DR j is given as
P i , j = P d i , j γ i , j g i , j d i , j α
where P is the power consumed for successful transmission of the requested content in a unit distance under ideal channel conditions, and γ i , j indicates the balance between the ideal channel and current channel. Similarly, the transmission rate R p , j of the pico BS is given as
R p , j = l o g 2 ( 1 + P p , j g p , j d p , j α i P i , j g i , j d i , j α + P m , j g m , j d m , j α + P M , j g M , j d M , j α + σ 2 )
Now, the power consumed to deliver content from pico cell transmitter p to D2DR j is given as
P p , j = P d p , j γ p , j g p , j d p , j α
where γ p , j indicates the balance between the ideal channel and current channel in pico mode. The delay D p , j in getting the content from the neighboring pico cell transmitter p by the D2DR j is given as
D p , j = 2 d p , j R p , j  
Similarly, the transmission rate R m , j of the micro cell transmitter m can be given as
R m , j = l o g 2 ( 1 + P m , j g m , j d m , j α i P i , j g i , j d i , j α + P p , j g p , j d p , j α + P M , j g M , j d M , j α + σ 2 )
Now, the power consumed to deliver content from micro cell transmitter m to D2D receiver j is given as
P m , j = P d m , j γ m , j g m , j d m , j α
where γ m , j shows the balance between the ideal channel and current channel in micro mode. The delay D m , j in getting the content from the micro cell transmitter m by the D2DR j   is given as
D m , j = 2 d m , j R m , j
Similarly, the transmission rate R M , j of the macro BS M   can be given as
R M , j = l o g 2 ( 1 + P M , j g M , j d M , j α i P i , j g i , j d i , j α + P p , j g p , j d p , j α + P m , j g m , j d m , j α + σ 2 )
Now, the power consumed to deliver content from macro cell transmitter M to D2D receiver j is given as
P M , j = P d M , j g M , j d M , j α  
The delay   D M , j in getting the content f from the macro BS M by the D2DR j is given as
D M , j = 2 d M , j R M , j
Therefore, the overall delay of the system is represented by τ and is given as
τ = i K j 2 d i , j R i , j + j ( 2 d p , j R p , j + 2 d m , j R m , j + 2 d M , j R M , j )
The overall power consumed by the system is
ρ = i Κ j ϵ P i , j + j ϵ ( P p , j + P m , j + P M , j )
In order to minimize the delay and power consumption of the system, we can write the relation as
γ = ξ τ + ϱ ρ
where ξ   and   ϱ are weight coefficients. Both τ and ρ are expected to be very small. For optimal transmission, weights need to be adjusted in such a way that the delay and the transmission power reach to an optimal balance. However, this is more challenging in the cache-enabled D2DMCN as the request sent by a user may be satisfied by multiple transmitters. These transmitters may be ID2DTs or BSs of the MCN. This means that D2DR can get its favored contents from any of the transmitters, i.e., (i) ID2DTs, (ii) pico BSs, (iii) micro BSs, or (iv) macro BSs. The selection is based on three factors: the power transmitted, the gain of the channel, and the distance between transmitter and receiver. To simplify the process, we consider only those D2DRs which are in the range of multiple ID2DTs and the MCN, and which are considered as common receivers. For this, the subscript j is replaced with j*. Hence, ID2DT is generally expressed with i * . Thus, Equations (18)–(20) are generalized and are given as
τ = i * j * 2 d i * , j * R i * j *
ρ = i * j * P i * , j *
γ = ξ τ + ϱ ρ
Now, for the selection of transmitters, we introduce a decision variable y i * , j * . Our prime goal is to minimize the power consumption and content delay in the cache-enabled D2DMCN. For this purpose, we introduce a system reward function R v . This system reward minimizes the total delay and power consumption of the system. The reward of the system is defined as
R v = ( ξ d i * , j * l o g 2 ( 1 + P i * , j * g i * , j * d i * , j * α i * i * p i * , j * g i * . j * d i * , j * α + σ 2 ) ϱ d i * , j * P g i * . j * d i * , j * α )
where ξ   and   ϱ are the weight coefficients indicating the significance of content delay and power consumption, respectively. These weight coefficients can be used to balance the relative importance of the content delay and power consumption. If the value of ϱ is high, then, in that the scenario, the importance of content delivery will be high. Hence, the second optimization problem is given below.
max { y i * , j * } i * j * y i * , j * R v
subject to
C 4 :   y i * , j * { 0 , 1 }
C 5 : i * y i * , j * 1   ,   j *
C 6 : i * y i * , j * P i * , j * P k max , i *
The objective function in Equation (25) accounts for the reward of the system, which is maximized when the content delay and power consumption are minimized. Constraint C 4 is a binary variable whose value is 1 when content is delivered from transmitter i * to D2DR j * and 0 otherwise. C 5 represents that D2DR j * can be served by a single transmitter i * at a time, while constraint C 6 indicates the power range of the system.

4. Clustering and Cache Making Strategy

K-means clustering and the support vector algorithm were used for clustering and content caching, respectively.

4.1. K-means Clustering and the Concept of Squeezed Cluster

The caching process becomes easier and more efficient if similar D2Ds are placed in virtual groups called clusters. These clusters are formed on the basis of the similarity of the contents, as requested by the users. There are many unsupervised learning algorithms for cluster formation, but the K-means clustering algorithm is more viable. The inputs to the algorithm are the ratings given by the users to different contents. ID2DTs are selected, and an agreement is made between ID2DTs and cellular operators. According to that agreement, the cellular operator can use the limited memory and battery power of ID2DTs; in response, the cellular operator allocates extra MBs for this purpose. After this, squeezed clusters are formed, and those D2DRs within the threshold distance range of ID2DTs are left in the cluster. This means that every ID2DT has its own squeezed cluster, and there is a fairly greater chance of D2DRs getting their requested contents from ID2DTs. Sometime, a D2DR can be in the range of two or more ID2DTs. In such a scenario, the Hungarian algorithm is used for content delivery, as discussed later.

4.2. Support Vector Algorithm for Estimating the Popularity Matrix and Proactive Caching

In cache-enabled D2DMCN, content caching has a direct impact on the cache hit ratio and satisfaction rate. Thus, content caching plays a pivotal role. Each user can easily find their favored contents in their neighborhood if content caching is properly carried out. The neighborhood may have a cache-enabled ID2DT or the BS of a cache-enabled MCN. This can hugely reduce the backhaul link load and transmission delays. On the other hand, if content caching is not properly designed, then the user’s frustration level will increase as they cannot find their requested content with ease. Thus, for more effective content caching, the user content request distribution plays a vital role. This will ease the process of what to cache and where to cache. Different machine learning algorithms are employed for predicting the content popularity. In our research work, we used the support vector algorithm. The attributes of the contents are numbers of likes, numbers of shares, numbers of dislikes, numbers of comments, first-day view counts, etc. First, the machine is trained, and the popularity is predicted. Then, highly popular contents are cached in the ID2DTs and BSs of-cache enabled MCNs. Few contents are cached in the limited memory of the ID2DT. MCNs are also limited in terms of cache memory. Therefore, the first problem, which is related to the overall cache hit ratio, can be solved by the support vector algorithm. The support vector machine uses the radial basis function (RBF) as a kernel for transformation. The RBF can better map feature vectors into a nonlinear space. This nonlinear property of RBF kernel transformation performs better prediction of the content popularity because it does not rely only on the linear relation between first-day view count and the view count on later days. The SVM finds the evaluation pattern in the dataset and predicts the content’s first-day view count accordingly. According to the SVM-based model, the numbers of views of contents f at θ t can be defined as
ρ ( f , θ t , θ r ) = s = 1 S γ s . φ ( W ( f , θ r ) , W ( s , θ r ) ) + G
where ρ ( f , θ t , θ r ) indicates the predicted numbers of views for content f at time   θ r when a prediction is made at time θ t . Similarly, φ ( w , y ) = exp ( w y 2 2 δ 2 ) is a Gaussian RBF with δ parameter, W ( s , θ r ) is a feature vector for content f at time θ r , { W ( s , θ r ) S s = 1 } is the support vector returned by the SVR algorithm with a set coefficient { γ s } s = 1 S , and G is the intercept.

4.3. Clustered-SVM

We combined K-means clustering and SVM, which we named clustered-SVM. As shown in Figure 3, the content popularity was predicted by SVM, and D2D clustering was carried out by K-means clustering. ID2DTs were selected and squeezed clusters were formed, consisting of those D2DRs in the proximity of ID2DTs. Then, we connected selected ID2DTs with the content popularity and decided on what to cache and where to cache. Similarly, the popularity of contents in each tier of the MCN was predicted by the SVM, and contents were cached accordingly. The two cache decision variables X i , f , Y t , f could be obtained using clustered-SVM, as given in Algorithm 1. Let D 1 , D , D t r a i n be the datasets for the distance between the D2Ds, ratings of the past requested contents, and attributes of contents, respectively, while D t e s t d 2 d , D t e s t 1 , D t e s t 2 , D t e s t 3 are the testing data of content popularity for the D2D, pico BS, micro BS, and macro BS respectively. Similarly, D is the dataset for fresh content file f request R j , f of D2DR j . Initially, using dataset D , clusters C 1 ,   C 2 , , C c , having similar D2Ds, are formed using K-means clustering. Then, ID2DTs are selected and, using D 1 , squeezed clusters s c i are formed, thereby removing those D2DRs not in the proximity d m a x of the selected ID2DTs. SVM is trained with D t r a i n and tested with D t e s t d 2 d , and the popularity of the contents is determined by predicting the first-day view count of the contents. Then, the popularity is sorted in descending order, and the most popular contents are cached in the ID2DTs in descending order until the cache memory is not fully occupied. The same process applied for the pico BS, micro BS, and macro BS. The process is repeated until all cache memories of the BSs of MCN are occupied by the popular contents. Finally, cache decision variables X i , f , Y t , f are obtained.
Algorithm 1. Clustered-SVM to Predict Content Popularity and Implement Decision Making for Proactive Caching in Cache-Enabled D2DMCN
Require:   D ,   D 1 , D , D t r a i n , D t e s t d 2 d , D t e s t 1 , D t e s t 2 , D t e s t 3 , S , ρ m i n
Ensure: X i , f , Y t , f ,   β
Step 0: Clustering and contents popularity predication
1.    Load D , D 1 , D , D t r a i n , D t e s t d 2 d , D t e s t 1 ,   D t e s t 2 , D t e s t 3
2.    Create C clusters C 1 ,   C 2 , . . , C c based on data set D
3.    for c = 1 : C do
4.    Randomly select a set of incentivized D2D transmitters
5.        for i = 1 : K do
6.               determine vicinity of D2D transmitter, R m a x = ( P i / ρ   j m i n ) 1 / η d
7.            for j = 1 : R do
8.                    if d i , j       R m a x
9.                    s c i j // s c i     i s   s q u e e z e d   c l u s t e r   i
10.                   Update the D2D receiver in the squeezed cluster
11.                   end if
12.            end for
13.        end for
14.    end for
15.    Train SVM using the data set D t r a i n
16.    Test   D t e s t d 2 d , D t e s t 1 ,   D t e s t 2 , D t e s t 3 and predict 1st day count in D t e s t d 2 d , D t e s t 1 ,   D t e s t 2 , D t e s t 3
17.    Determine the content popularity in each case.
18.    Sort the content popularity in descending order in each case
Step1: Content caching at incentivized D2D transmitter
19.    for i = 1 : K   do
20.    Initialize the cache size s i and caching matrix X i
21.        for f = 1 : F do
22.          if Q f D 2 D + s i ^ s i // Q f D 2 D is the size of the file to be cached at D2DT
23.            X i 1
24.            s i   ^   s i   ^   + Q f D 2 D
25.            Else
26.            Break
27.          end if
28.            Return X i , f
29.        end for
30.    End for
Step 2: Content caching at pico BS
31.    Repeat 19–30 and replacing subscripts i by p and return Y p , f
Step 3: Content caching at micro BS
32.    Repeat 19–30 and replacing subscripts i by m and return Y m , f
Step 4: Content caching at macro BS
33.    Repeat steps 19–30, and replacing subscripts i by M and return Y M , f
34.    Return     Y t , f
Step 5: Mode selection
35.    for i = 1 : K do
36.      for j = 1 : R do
37.         if     ( r i , j ) η d     ( r p , j ) η p  then select D2D mode and Z i , j 1
38.        Else if  ( r P , j ) η p     ( r m , j ) η m , then select pico mode and Z p , j 1
39.         Else if   ( r m i ) η m     ( r M , i ) η M , then select micro and Z m , j 1
40.          Else select macro mode and Z M , j 1
41.           end if
42.        end for
43.    end for
Step 6: For Cache hit ratio
44.    Optimize Equation (1)
45.    Return   β

5. Hungarian Algorithm for Content Delivery

The second problem in cache-enabled D2DMCN is the fast deliverance of the requested content to the D2DRs. This problem is a combinatorial assignment problem and can be solved by the Hungarian algorithm. The D2DRs can get the requested contents through D2D links or through cellular links. This content delivery becomes more cumbersome in the cache-enabled D2DMCN, since (1) the content request of a user can be satisfied by multiple transmitters at the same time, and (2) content cached by any of the transmitters may be requested by multiple receivers simultaneously. These transmitters are ID2DTs and BSs of the MCN. The said issues can be solved using the Hungarian algorithm. The Hungarian algorithm predominantly solves assignment problems. The Hungarian algorithm takes the decision of connecting D2DRs either with ID2DTs or with BSs of the MCN to get the requested contents as mentioned in the Algorithm 2 in details. To this end, the reward function is optimized. The reward function depends on the transmit power P i , j , which is the minimum transmission power required by transmitter i and receiver j for complete transfer of information in a fading environment, the channel gain g i , j , and the distance d i , j between transmitter i receiver j . Hungarian algorithm aims to maximize the reward function and minimize the power consumption and content delivery delay. The whole process is shown in Figure 4.
The D2DRs which are in the range of multiple ID2D transmitters are considered as common receivers and are designated by j * . Their distances and channel gains are loaded from datasets D 1 and D 2 , respectively. Similarly, distance and channel gains of common D2DRs from BSs of MCN are loaded from datasets D 3 and D 4 , respectively. The power consumed, transmission rate, and content delay are determined in each case, and the reward function is formed. The maximization of that reward function accounts for minimization of the overall system delay and power consumption to solve the problem of content delivery.
Algorithm 2. Hungarian Algorithm to Perform Content Delivery Decision Making and Optimizaion of Reward of the System
1. Definition:
2. D 1 : data set for distance between ID2D transmitters and D2D receiver
3. D 2 : data set for channel gains of link between ID2D transmitters and D2D receivers
4. D 3 : data set for distance between multi-tier BSs and D2D receivers
5. D 4 : data set for channel gains of multi-tier BSs and D2D receivers
      ξ ,   ϱ :   Weight coefficients
6. Require:   D 1 , D 2 ,   D 3 , D 4 ,   ξ ,   ϱ
7. Ensure:   y i * , j *
8. Load  D 1 , D 2 ,   D 3 ,   D
9. Set values of   ξ ,   ϱ
10.   for t = 1 : 3   // when   t = 1 , we have pico BS,
11.       for   i = 1 : K  do
12.         for   j = 1 : R do
13. Using P i , j ,   d i , j ,   g i , j , P p , j , d p , j ,   P m , j , g m , j , d m , j ,   P M , j , g M . j   a n d   d M , j in ( 6 ) ,   ( 9 ) ,   ( 12 )   and   ( 15 ) to
            Compute R i , j ,     R p , j ,   R m , j   a n d   R M , j
14. Using R i , j , R p , j ,   R m , j   a n d   R M c r in (7), (11), (13) and (16) to Compute     D i , j ,   D p , j ,   D m , j , D M , j
15.         end for
16.       end for
17.    end for
18.   for   i = 1 : K  do
19.        for j = 1 : R   do
20.         Find common D2DRs set among squeezed clusters and MCN
21.       end for
22.    end for
23.   for i * = 1 : k     d o   // for general transmitters i *   K
24.         for j *   = 1 :   R do
25.            Calculate the reward using formula (24)
26.            Use Hungarian algorithm maximize the reward of the system
27.         end for
28.   end for
29. return  y i * , j *

6. Performance Evaluation

6.1. Simulation Setup

In this section, we provide different simulation results for the performance of the D2DMCN with the proposed content caching and content delivery scheme. D2DRs can obtain contents either from ID2DTs or from multiple tiers of the cellular network. These tiers are the macrocell tier, microcell tier, and picocell tier. All tiers are in the coverage circle of macrocell with radius R = 800m. Additionally, 200 D2DRs are distributed randomly forming a Poisson distribution. The macro BS and pico BS are also installed with radii of 300 m and 150 m, respectively. Almost 10% of the D2Ds are ID2DTs, while the remainder are D2DRs. For simplicity, one ID2DT can only be connected to one D2DR at a time for file transfer. Similarly, one file can be transmitted at each time. On the other hand, the MCN has also its own receivers, which can obtain contents directly from the BSs of the MCN. Each D2D transmitter can cache up to 10 files. The size of file is similar (1 MB for simplicity). The maximum transmit power is 1 W, the sensitivity of each D2DR is ρ min = 70   dBm , and the path loss exponent is α = 3 . Different parameters and their values/types used in this research are given in Table 2.
For validation of the performance of the experiment, huge datasets were required [43,44,45]. A few datasets were selected from Movie Lens (ML) as experimental data containing records of 5000 ratings, while others were generated according to the social behavior of the users. These datasets comprised requests of the users for various contents, attributes of the contents for content popularity, distances between D2Ds located at a different locations, distances between D2Ds and multitier BSs, channel gain and transmitted power for D2D communication, channel gain and transmitted power for cellular communication, etc. For content popularity, the number of training data was 3000, and the number of testing data was 2000.

6.2. Numerical Results and Discussion

6.2.1. Performance Evaluation of Content Caching Based on Different Learning Algorithms for D2DMCN

Figure 5 depicts the overall cache hit ratio of the cache-enabled D2D assisted MTCNs. It can be observed that content caching based on SVM is better compared to the fine K-nearest neighbor (FKNN), medium K-nearest neighbor (MKNN), and complex tree algorithms. The reason is that SVM has a higher prediction accuracy owing to the fact that the RBF can better map feature vectors into a nonlinear space. This nonlinear property of RBF kernel transformation enables better prediction of the content popularity because it does not rely only on the linear relationship between first-day view count and the view count on later days. SVM finds the evaluation pattern in the dataset and predicts the content’s first-day view count accordingly.

6.2.2. Performance Comparison of Different Proactive Content Caching Techniques for D2DMCN

We consider the following contents caching polices for D2DMCN:
  • Ground truth content caching method
In this method, the most popular contents are cached in different cache-enabled transmitters without predicting the popularity of contents [42,46].
  • Random content caching method
In this technique, random sets of content files are proactively periodically cached in different cache-enabled transmitters [47].
  • SVM-based content caching method
The content popularity is predicated on using SVM from a training set, and the most popular contents are cached accordingly.
Figure 6 shows the performance comparison of SVM-based caching with the ground truth caching technique and random caching technique. As expected, the SVM performed better as compared to the other two caching techniques due to the prior prediction of content popularity of newly published contents.

6.2.3. Improvement in the Cache Hit Ratio Due to Inclusion of ID2DTs in MCN

Figure 7 describes various content caching schemes of D2DMCN. It can be observed that, if contents are cached in ID2DTs and at each tier of MCN, then D2DRs will have more chance to get their favored content either from neighboring ID2DTs or from the MCN. This means that caching at D2D is not sufficient to satisfy the varying demands of the users. This hierarchal-level caching makes the caching process more efficient.

6.2.4. Content Caching at D2D Transmitters

Figure 8 shows that, when the number of ID2DTs is increased, then the cache hit ratio is increased accordingly. This is due to fact that more cache-enabled ID2DTs share their cache memory for content caching.

6.2.5. Impact of Varying Weight Coefficient on the Reward of the System

Figure 9 illustrates the reward of the system with varying values of weight coefficients ξ and ϱ . We can see that, when ξ = 0.3 and ϱ = 0.7, then the total delay of the system is low; on the other hand, when ξ = 0.7 and ϱ = 0.3, then the total power consumption of the system is low. The first case is conducive for the D2D receiver to send content requests, while the second case is conducive for the contents to be delivered from the cache-enabled transmitters. Hence, by adjusting the values of the two weight coefficients, ξ and ϱ , the performance of the system can be improved.

6.2.6. Performance Comparison for the Content Delay and Power Consumption

In Figure 10a,b, we compare the Hungarian-based content delivery scheme with the random content delivery scheme [48,49,50,51,52,53] for minimizing the overall content delay and the power consumption of the system, respectively. We show that the Hungarian-based delivery scheme works much better as compared to random content delivery. Hence, the power consumption and the content delay of the system are minimized when content delivery is conducted from the D2DMCN using the Hungarian algorithm. As expected, the inclusion of cache-enabled ID2DTs in the MCN optimized the overall power consumption and delay of the system. On the other hand, if caching is performed at the tier level only, then, as expected, the power consumption and delay of the system are greater. This means that, if more ID2DTs are selected and more contents are cached in them, then the overall delay and power consumption will be decreased, and the content downloading speed will be high. Similarly, if there is no caching, then the overall delay and power consumption of the system will be much greater.

7. Conclusions

In this study, we proposed novel frameworks for content caching and content delivery in D2DMCN. Specifically, on the basis of the similarities of the contents, virtual clusters of D2Ds were formed. These clusters were reduced to squeeze clusters, thus leaving behind only those D2D receivers in the threshold distance range of the ID2DTs. According to the attributes of the contents, the popularity of the contents was predicted using the SVM, and popular contents were cached in the limited cache of ID2DTs and in the cache-enabled MCN. The simulation results depict that the inclusion of ID2DTs in the MCN and the use of SVM improved the overall cache hit ratio of the system. On the other hand, to solve the problem of content delivery and power consumption, a reward function of the system was constructed, which was maximized using the Hungarian algorithm. As expected, the simulation results show that the maximization of the reward function led to a minimization of the content delay and power consumption. Hence, combining the content caching and content delivery, we can greatly improve the performance of the system.

Author Contributions

Conceptualization, I.H. and G.M.; data curation, Z.U. and S.A.A.; formal analysis, G.M.; funding acquisition, I.H. and G.M.; investigation, A.A. and G.M.; methodology, A.A. and I.H.; project administration, I.H. and G.M.; resources, I.H.; software, F.A. and I.H.; supervision, A.A.; validation, I.H., G.M. and S.A.A.; visualization, I.H. and S.A.A.; writing—original draft, F.A. and A.A.; writing—review and editing, F.A., A.A. and I.H. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Research Chair of New Emerging Technologies and 5G Networks and Beyond, Computer Engineering Department, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

The authors acknowledge the Research Chair of New Emerging Technologies and 5G Networks and Beyond, Computer Engineering Department, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia, for funding this work.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Liu, A.; Lau, V.K.N.; Caire, G. Cache-induced hierarchical cooperation in wireless device-to-device caching networks. IEEE Trans. Inf. Theory 2018, 64, 4629–4652. [Google Scholar] [CrossRef] [Green Version]
  2. Jameel, F.; Hamid, Z.; Jabeen, F.; Zeadally, S.; Javed, M.A. A survey of device-to-device communications: Research issues and challenges. IEEE Commun. Surv. Tutor. 2018, 20, 2133–2168. [Google Scholar] [CrossRef]
  3. Chen, B.; Yang, C. Caching policy optimization for D2D communications by learning user preference. In Proceedings of the 85th Vehicular Technology Conference (VTC Spring), Sydney, Australia, 4–7 June 2017; pp. 1–6. [Google Scholar]
  4. Shen, G.; Pei, L.; Zhiwen, P.; Nan, L.; Xiaohu, Y. Machine learning based small cell cache strategy for ultra dense networks. In Proceedings of the 2017 9th International Conference on Wireless Communications and Signal Processing (WCSP), Nanjing, China, 11–13 October 2017; pp. 1–6. [Google Scholar]
  5. Ahmad, F.; Ahmad, A.; Hussain, I.; Uthansakul, P.; Khan, S. Cooperation Based Proactive Caching in Multi-Tier Cellular Networks. Appl. Sci. 2020, 10, 6145. [Google Scholar] [CrossRef]
  6. Li, L.; Zhao, G.; Blum, R.S. A survey of caching techniques in cellular networks: Research issues and challenges in content placement and delivery strategies. IEEE Commun. Surv. Tutor. 2018, 20, 1710–1732. [Google Scholar] [CrossRef]
  7. Jiang, W.; Feng, G.; Qin, S.; Yum, T.S.P. Efficient D2D Content Caching Using Multi-Agent Reinforcement Learning. In Proceedings of the IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Honolulu, HI, USA, 15–19 April 2018. [Google Scholar]
  8. Ullah, I.; Hussain, I.; Singh, M. Exploiting Grasshopper and Cuckoo Search Bio-Inspired Optimization Algorithms for Industrial Energy Management System: Smart Industries. Electronics 2020, 9, 105. [Google Scholar] [CrossRef] [Green Version]
  9. Lee, M.C.; Molisch, A.F. Individual Preference Aware Caching Policy Design for Energy-Efficient Wireless D2D Communications. In Proceedings of the GLOBECOM 2017—IEEE Global Communications Conference, Singapore, 4–8 December 2017. [Google Scholar]
  10. Ullah, H.; Khan, M.; Hussain, I.; Ullah, I.; Uthansakul, P.; Khan, N. An Optimal Energy Management System for University Campus Using the Hybrid Firefly Lion Algorithm (FLA). Energies 2021, 14, 6028. [Google Scholar] [CrossRef]
  11. Ji, M.; Caire, G.; Molisch, A.F. Wireless device-to-device caching networks: Basic principles and system performance. IEEE J. Sel. Areas Commun. 2015, 34, 176–189. [Google Scholar] [CrossRef] [Green Version]
  12. Chen, Z.; Pappas, N.; Kountouris, M. Probabilistic caching in wireless D2D networks: Cache hit optimal versus throughput optimal. IEEE Commun. Lett. 2016, 21, 584–587. [Google Scholar] [CrossRef] [Green Version]
  13. Zhao, N.; Liu, X.; Chen, Y.; Zhang, S.; Li, Z.; Chen, B.; Alouini, M.-S. Caching D2D connections in small-cell networks. IEEE Trans. Veh. Technol. 2018, 67, 12326–12338. [Google Scholar] [CrossRef] [Green Version]
  14. Zhang, Y.; Pan, E.; Song, L.; Saad, W.; Dawy, Z.; Han, Z. Social network aware device-to-device communication in wireless networks. IEEE Trans. Wirel. Commun. 2015, 14, 177–190. [Google Scholar] [CrossRef]
  15. Zhang, N.; Zheng, K.; Tao, M. Using grouped linear prediction and accelerated reinforcement learning for online content caching. In Proceedings of the 2018 IEEE International Conference on Communications Workshops (ICC Workshops), Kansas City, MO, USA, 20–24 May 2018; pp. 1–6. [Google Scholar]
  16. Jiang, Y.; Ma, M.; Bennis, M.; Zheng, F.C.; You, X. User preference learning-based edge caching for fog radio access network. IEEE Trans. Commun. 2019, 67, 1268–1283. [Google Scholar] [CrossRef] [Green Version]
  17. Fan, H.; Zhang, T.; Loo, J.; Liu, D. Caching deployment algorithm based on user preference in device-to-device networks. In Proceedings of the 2017 IEEE Global Communications Conference (GLOBECOM), Singapore, 4–8 December 2017; pp. 1–6. [Google Scholar]
  18. Wang, Y.; Ding, M.; Chen, Z.; Luo, L. Caching placement with recommendation systems for cache-enabled mobile social networks. IEEE Commun. Lett. 2017, 21, 2266–2269. [Google Scholar] [CrossRef]
  19. Ullah, I.; Hussain, I.; Rehman, K.; Wróblewski, P.; Lewicki, W.; Kavin, B.P. Exploiting the Moth–Flame Optimization Algorithm for Optimal Load Management of the University Campus: A Viable Approach in the Academia Sector. Energies 2022, 15, 3741. [Google Scholar] [CrossRef]
  20. Chen, Z.; Kountouris, M. D2D caching vs. small cell caching: Where to cache content in a wireless network? In Proceedings of the IEEE International Workshop on Signal Processing Advances in Wireless Communications, Edinburgh, UK, 3–6 July 2016; pp. 1–6. [Google Scholar]
  21. Hussain, I.; Ullah, I.; Ali, W.; Muhammad, G.; Ali, Z. Exploiting lion optimization algorithm for sustainable energy management system in industrial applications. Sustain. Energy Technol. Assess. 2022, 52, 102237. [Google Scholar] [CrossRef]
  22. Golrezaei, N.; Shanmugam, K.; Dimakis, A.G.; Molisch, A.F.; Caire, G. FemtoCaching: Wireless video content delivery through distributed caching helpers. In Proceedings of the IEEE INFOCOM, Orlando, FL, USA, 25–30 March 2012; pp. 1107–1115. [Google Scholar]
  23. Bastug, E.; Bennis, M.; Debbah, M. Living on the edge: The role of proactive caching in 5G wireless networks. IEEE Commun. Mag. 2014, 52, 82–89. [Google Scholar] [CrossRef] [Green Version]
  24. Yang, C.; Yao, Y.; Chen, Z.; Xia, B. Analysis on cache-enabled wireless heterogeneous networks. IEEE Trans. Wirel. Commun. 2016, 15, 131–145. [Google Scholar] [CrossRef] [Green Version]
  25. Hu, L.; Qian, Y.; Chen, M.; Hossain, M.S.; Muhammad, G. Proactive Cache-based Location Privacy Preserving for Vehicle Networks. IEEE Wirel. Commun. 2018, 25, 77–83. [Google Scholar] [CrossRef]
  26. Shahjehan, W.; Hussain, I.; Amin, K.; Ali, I.; Riaz, A.; Uthansakul, P. Hepta-Band Antenna for 5G Applications. Wirel. Pers. Commun. 2022, 1–24. [Google Scholar] [CrossRef]
  27. Tao, M.; Chen, E.; Zhou, H.; Yu, W. Content-centric sparse multicast beamforming for cache-enabled cloud RAN. IEEE Trans. Wirel. Commun. 2016, 15, 6118–6131. [Google Scholar] [CrossRef] [Green Version]
  28. Liu, A.; Lau, V.K.N. Exploiting base station caching in MIMO cellular networks: Opportunistic cooperation for video streaming. IEEE Trans. Signal Process. 2014, 63, 57–69. [Google Scholar] [CrossRef]
  29. Li, X.; Wang, X.; Li, K.; Chi, H.; Leung, V.C.M. Resource allocation for content delivery in cache-enabled OFDMA small cell networks. In Proceedings of the 2017 IEEE 86th Vehicular Technology Conference (IEEE VTC-Fall), Sydney, Australia, 24–27 September 2017; pp. 1–6. [Google Scholar]
  30. Ullah, I.; Hussain, I.; Uthansakul, P.; Riaz, M.; Khan, M.N.; Lloret, J. Exploiting Multi-Verse Optimization and Sine-Cosine Algorithms for Energy Management in Smart Cities. Appl. Sci. 2020, 10, 2095. [Google Scholar] [CrossRef] [Green Version]
  31. Malak, D.; Al-Shalash, M.; Andrews, J.G. Optimizing content caching to maximize the density of successful receptions in device-todevice networking. IEEE Trans. Commun. 2016, 64, 4365–4380. [Google Scholar]
  32. Li, L.; Xu, Y.; Yin, J.; Liang, W.; Li, X.; Chen, W.; Han, Z. Deep Reinforcement Learning Approaches for Content Caching in Cache-Enabled D2D Networks. IEEE Internet Things J. 2020, 7, 544–557. [Google Scholar] [CrossRef]
  33. Li, Q.; Wen, Z.; He, B. Adaptive Kernel Value Caching for SVM Training. IEEE Trans. Neural Netw. Learn. Syst. (TNNLS) 2019, 31, 2376–2386. [Google Scholar] [CrossRef] [Green Version]
  34. Goian, H.S.; Al-Jarrah, O.Y.; Muhaidat, S.; Al-Hammadi, Y.; Yoo, P.; Dianati, M. Popularity-Based Video Caching Techniques for Cache-Enabled Networks: A Survey. IEEE Access J. 2019, 7, 27699–27719. [Google Scholar] [CrossRef]
  35. Hussain, I.; Samara, G.; Ullah, I.; Khan, N. Encryption for End-User Privacy: A Cyber-Secure Smart Energy Management System. In Proceedings of the 2021 22nd International Arab Conference on Information Technology (ACIT), Muscat, Oman, 21–23 December 2021; pp. 1–6. [Google Scholar] [CrossRef]
  36. Hussain, I.; Ullah, M.; Ullah, I.; Bibi, A.; Naeem, M.; Singh, M.; Singh, D. Optimizing Energy Consumption in the Home Energy Management System via a Bio-Inspired Dragonfly Algorithm and the Genetic Algorithm. Electronics 2020, 9, 406. [Google Scholar] [CrossRef]
  37. Boujelbene, S.Z.; Mezghani, D.B.A.; Ellouze, N. Improving SVM by modifying kernel functions for speaker identification task. Int. J. Digit. Content Technol. Appl. 2010, 4, 100–105. [Google Scholar]
  38. Min, R.; Bonner, A.; Zhang, Z. Modifying kernels using label information improves SVM classification performance. In Proceedings of the 6th International Conference on Machine Learning and Applications (ICMLA 2007), Cincinnati, OH, USA, 13–15 December 2007; pp. 13–18. [Google Scholar]
  39. Nizam, F.; bin Roslee, M.; Yusoff, Z.; Anuar, K.; Alzoubi, K.H.; Elgamati, M.A.A.; Billah, M.J. Resource Allocation Algorithm for D2D Communication in Cellular Networks Based on Hungarian Algorithm. In Proceedings of the 2019 IEEE 14th Malaysia International Conference on Communication (MICC), Selangor, Malaysia, 2–4 December 2019. [Google Scholar]
  40. Khan, A.A.; Adve, R.S.; Yu, W. Optimizing Downlink Resource Allocation in Multiuser MIMO Networks via Fractional Programming and the Hungarian Algorithm. IEEE Trans. Wirel. Commun. 2020, 19, 5162–5175. [Google Scholar] [CrossRef]
  41. Buzzi, S.; D’Andrea, C.; Fresia, M.; Zhang, Y.P.; Feng, S. Pilot Assignment in Cell-Free Massive MIMO based on the Hungarian Algorithm. IEEE Wirel. Commun. Lett. 2020, 10, 34–37. [Google Scholar] [CrossRef]
  42. Jiang, W.; Feng, G.; Qin, S. Optimal Cooperative Content Caching and Delivery Policy for Heterogeneous Cellular Networks. IEEE Trans. Mob. Comput. 2017, 16, 1382–1393. [Google Scholar] [CrossRef]
  43. Altaheri, H.; Muhammad, G.; Alsulaiman, M.; Amin, S.U.; Altuwaijri, G.A.; Abdul, W.; Bencherif, M.A.; Faisal, M. Deep Learning Techniques for Classification of Electroencephalogram (EEG) Motor Imagery (MI) Signals: A Review. Neural Comput. Appl. 2021. [Google Scholar] [CrossRef]
  44. Muhammad, G.; Alshehri, F.; Karray, F.; El Saddik, A.; Alsulaiman, M.; Falk, T.H. A comprehensive survey on multimodal medical signals fusion for smart healthcare systems. Inf. Fusion 2021, 76, 355–375. [Google Scholar] [CrossRef]
  45. Muhammad, G.; Alqahtani, S.; Alelaiwi, A. Pandemic Management for Diseases Similar to COVID-19 Using Deep Learning and 5G Communications. IEEE Netw. 2021, 35, 21–26. [Google Scholar] [CrossRef]
  46. Ramachandran, V.; Ramalakshmi, R.; Kavin, B.P.; Hussain, I.; Almaliki, A.H.; Almaliki, A.A.; Elnaggar, A.Y.; Hussein, E.E. Exploiting IoT and Its Enabled Technologies for Irrigation Needs in Agriculture. Water 2022, 14, 719. [Google Scholar] [CrossRef]
  47. Baştuğ, E.; Bennis, M.; Zeydan, E.; Kader, M.A.; Karatepe, I.A.; Er, A.S.; Debbah, M. Big Data Meets Telcos: A Proactive Caching Perspective. J. Commun. Netw. 2015, 17, 549–557. [Google Scholar] [CrossRef] [Green Version]
  48. Liu, J.; Bai, B.; Zhang, J.; Letaief, K.B. Content Caching at the Wireless Network Edge: A Distributed Algorithm via Belief Propagation. In Proceedings of the IEEE international Conference on Communication 2016, Kuala Lumpur, Malaysia, 22–27 May 2016. [Google Scholar]
  49. Tsai, K.C.; Wang, L.; Han, Z. Mobile Social Media Networks Caching with Convolutional Neural Network. In Proceedings of the IEEE Wireless Communications and Networking Conference Workshops (WCNCW): Workshop on Intelligent Computing and Caching at the Network Edge 2018, Barcelona, Spain, 15–18 April 2018. [Google Scholar]
  50. Prabakaran, S.; Ramar, R.; Hussain, I.; Kavin, B.P.; Alshamrani, S.S.; AlGhamdi, A.S.; Alshehri, A. Predicting Attack Pattern via Machine Learning by Exploiting Stateful Firewall as Virtual Network Function in an SDN Network. Sensors 2022, 22, 709. [Google Scholar] [CrossRef]
  51. Zaman, S.; Khan, L.U.; Hussain, I.; Mihet-Popa, L. Fast Computation of Highly Oscillatory ODE Problems: Applications in High-Frequency Communication Circuits. Symmetry 2022, 14, 115. [Google Scholar] [CrossRef]
  52. Ullah, W.; Hussain, I.; Shehzadi, I.; Rahman, Z.; Uthansakul, P. Tracking a Decentralized Linear Trajectory in an Intermittent Observation Environment. Sensors 2020, 20, 2127. [Google Scholar] [CrossRef] [Green Version]
  53. Zaman, S.; Hussain, I.; Singh, D. Fast Computation of Integrals with Fourier-Type Oscillator Involving Stationary Point. Mathematics 2019, 7, 1160. [Google Scholar] [CrossRef] [Green Version]
Figure 1. Cache-enabled D2D assisted multitier cellular network.
Figure 1. Cache-enabled D2D assisted multitier cellular network.
Sensors 22 05078 g001
Figure 2. Formation of squeezed cluster in proximity of ID2DTs.
Figure 2. Formation of squeezed cluster in proximity of ID2DTs.
Sensors 22 05078 g002
Figure 3. Content popularity prediction-based caching framework in D2D networks.
Figure 3. Content popularity prediction-based caching framework in D2D networks.
Sensors 22 05078 g003
Figure 4. Content delivery strategy based on maximization of reward function.
Figure 4. Content delivery strategy based on maximization of reward function.
Sensors 22 05078 g004
Figure 5. Performance evaluation of content caching based on SVM at D2D assisted multitier cellular networks.
Figure 5. Performance evaluation of content caching based on SVM at D2D assisted multitier cellular networks.
Sensors 22 05078 g005
Figure 6. Performance comparison of different content caching techniques for D2D assisted multitier cellular networks.
Figure 6. Performance comparison of different content caching techniques for D2D assisted multitier cellular networks.
Sensors 22 05078 g006
Figure 7. Improvement in performance due to the inclusion of D2D transmitters at various tiers of multitier cellular network.
Figure 7. Improvement in performance due to the inclusion of D2D transmitters at various tiers of multitier cellular network.
Sensors 22 05078 g007
Figure 8. Cache hit ratio vs. cache size of incentivized D2D transmitters.
Figure 8. Cache hit ratio vs. cache size of incentivized D2D transmitters.
Sensors 22 05078 g008
Figure 9. Reward of the system based on Hungarian algorithm with varying weight coefficients.
Figure 9. Reward of the system based on Hungarian algorithm with varying weight coefficients.
Sensors 22 05078 g009
Figure 10. (a) Performance comparison of the delay of the system; (b) Performance comparison of the power consumption of the system.
Figure 10. (a) Performance comparison of the delay of the system; (b) Performance comparison of the power consumption of the system.
Sensors 22 05078 g010
Table 1. System-related parameters.
Table 1. System-related parameters.
ParametersDescriptions
P i m a x maximum   transmit   power   of   ID 2 DT
ρ m i n minimum   sensitivity   of   D 2 DR
d m a x = ( P i m a x / ρ m i n ) 1 / η d [42]proximity of the ID2DT
η d path   loss   coefficient   for   D 2 D   link
η p path loss coefficient for a link between pico BS p and D2DR j
η m path loss coefficient for a link between micro BS m and D2DR j
η M path loss coefficient for a link between macro BS M and D2DR j
d p , j distance between pico BS p and D2DR j
d m , j distance between micro BS m and D2DR j
d M , j distance   between   macro   BS   M   and   D 2 DR   j
Table 2. Parameters for simulations.
Table 2. Parameters for simulations.
ParametersValues/Types
Total number of D2D users200
Radius of macrocell800 m
Radius of microcell300 m
Radius of picocell150 m
Total number of clusters2
Path loss exponent4
Thermal noise1
Weight coefficient A and B0 to 1
Size of each file1
SoftwareMATLAB
Total number of contents2000
System bandwidth900 MHz
Minimum sensitivity of D2D receiver−70 dBm
Bandwidth per channel200 kHZ
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Ahmad, F.; Ahmad, A.; Hussain, I.; Muhammad, G.; Uddin, Z.; AlQahtani, S.A. Proactive Caching in D2D Assisted Multitier Cellular Network. Sensors 2022, 22, 5078. https://doi.org/10.3390/s22145078

AMA Style

Ahmad F, Ahmad A, Hussain I, Muhammad G, Uddin Z, AlQahtani SA. Proactive Caching in D2D Assisted Multitier Cellular Network. Sensors. 2022; 22(14):5078. https://doi.org/10.3390/s22145078

Chicago/Turabian Style

Ahmad, Fawad, Ayaz Ahmad, Irshad Hussain, Ghulam Muhammad, Zahoor Uddin, and Salman A. AlQahtani. 2022. "Proactive Caching in D2D Assisted Multitier Cellular Network" Sensors 22, no. 14: 5078. https://doi.org/10.3390/s22145078

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop