Next Article in Journal
Local Path Planning of Autonomous Vehicle Based on an Improved Heuristic Bi-RRT Algorithm in Dynamic Obstacle Avoidance Environment
Previous Article in Journal
On the Applications of EMG Sensors and Signals
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

CSV: Content Service Offloading System with Vehicular Caching

1
Division of Information & Communication Engineering, Kongju National University, Cheonan 31080, Korea
2
Department of Internet of Things, Soonchunhyang University, Asan 31538, Korea
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(20), 7967; https://doi.org/10.3390/s22207967
Submission received: 26 September 2022 / Revised: 14 October 2022 / Accepted: 17 October 2022 / Published: 19 October 2022
(This article belongs to the Section Physical Sensors)

Abstract

:
Vehicular caching (VC) has been considered as a promising technology to provide low end-to-end service latency and reduce the load of networks. However, it is difficult for VC to provide service continuity because of its opportunistic availability according to mobility. To mitigate this problem, we introduce a CSV: Content service offloading System with VC which can opportunistically distribute the load of the content server and support the service continuity. In CSV, the content service can be migrated between fog node (FN) and VC while maintaining the ongoing service without service disruption, which can opportunistically distribute the load of the content server and support the service continuity during migration. To assess the performance of CSV, we develop an analytical model for VC offloading efficiency. Extensive simulation results demonstrate that CSV can reduce the load of the content server compared to the conventional system.

1. Introduction

Recently, video traffic has explosively grown as numerous Internet of Things (IoT) devices consume massive amounts of video content such as higher definition 360-degree videos and augmented/virtual reality services [1]. To provide low end-to-end service latency and reduce the load of networks, contents are shifted from cloud to fog nodes (FNs) co-located with the access network device such as a cellular base station (BS) [2]. However, even though the FNs are promising to deliver the contents to users, the scalability issue can also occur because of limited resources and increasing number of content service users including IoT devices [3]. For instance, if many IoT devices within a similar location request content simultaneously, FN can be overloaded. To mitigate this challenge, content delivery via vehicular caching (VC) is introduced. VC can store the contents, and thus users can receive contents from distributed VC, which can reduce the load of FN. VC can provide content to users only when they are in the vicinity of users and have content that the users request [4,5]. This means that users can opportunistically receive the contents from VC when both conditions are satisfied.
For efficient utilization of VC, numerous works have been conducted to determine the content placement and resource allocation [5,6], provide the collaborative content dissemination [7,8], and consider social and economic attributes [4,9]. In these works, the content delivery within the connection time between vehicles is usually utilized. This means that these works did not consider the service continuity between the connection and disconnection time according to the mobility of VC. On one hand, when VC provides the contents to users, service disruption can unwillingly occur because of its mobility during the service. In other words, the ongoing session between the user and VC can be terminated when VC leaves, which can result in the quality of service (QoS) degradation. On the other hand, when static FN delivers the contents to users, service offloading might be required when VC becomes available to distribute the load of FN. Therefore, how VC can be exploited with service continuity as much as possible considering its mobility should be analyzed to efficiently distribute the load of FN.
Meanwhile, there have been works to optimize the service provisioning based on the users’ mobility. As an initial concept, follow-me-cloud has been introduced to allow cloud services to be migrated to the optimal data center according to the users’ mobility without service disruption [10]. In addition to cloud services, this concept has been extended to FN architecture [11,12]. However, these works have focused on the mobility of users. This means that the mobility of the content source such as VC is not taken into account. Although our previous work introduced a policy at each decision epoch to select VC or FN to provide contents to users [13], it cannot make the best use of VC and does not consider the service continuity for the content service offloading in the continuous time domain.
To offload more content services to VC with service continuity, we introduce the content service offloading system with VC, named CSV. In CSV, the content service can be migrated between FN and VC while maintaining the ongoing service without service disruption. That is, when VC moves close to the user and has the same content that the user requests, the ongoing content service is offloaded from FN to VC. Then, the content service can be provided through VC without affecting the user, which also makes the best use of VC. As the 3GPP standards have made progress in supporting vehicular communications, vehicle-to-everything (V2X) services, and vertical enabler architectures [14,15], CSV can be one of the network scenarios in the future mobile networks (i.e., 6G). The key contribution of this paper is twofold: (1) to the best of our knowledge, this is the first analytical study that considers the service continuity for the content service offloading with VC. Specifically, we develop the analytical models for the VC offloading efficiency considering the service continuity; and (2) based on the simulation works, we demonstrate how much content can be delivered with VC, which can be interpreted as the load distribution effect.
The remainder of this paper is organized as follows. The system description is introduced in Section 2. In Section 3, the performance analysis is conducted. Then, the simulation results and conclusion are provided in Section 4 and Section 5, respectively.

2. System Description

Figure 1 shows the system model of this paper. It is assumed that FN connected to BS is always available whereas VC is only available when it moves close enough to users. In addition, the contents that users request can exist or not in VC according to the popularity of contents and the limited caching capacity of VC. Although there can be a caching capacity constraint for FN, we assume that all the contents for users are cached in FN to focus on the load distribution effect by VC. Considering the central cloud node to request the contents from FN will be one of our future works. Note that users can recognize the connection and disconnection with VC by using periodic signaling messages [16,17,18]. Moreover, for the service migration, this paper utilizes session migration between FN and VC which transfers the session information such as socket and state information to provide light and fast service continuity [12,19]. Since the session migration is not for the full content synchronization, it can be performed between nodes that have the same content currently being served.
As an example in Figure 1, users 1 and 2 want to download the specific content. In the case of user 1, the session starts at τ s 1 . At the time, since VC is not available, the content service is provided directly from FN. After τ 1 , to utilize VC which becomes available for user 1, the service migration is performed from FN to VC, which results in the period of no change for the downloaded content size, t m . After the migration, the content service is continuously provided to user 1 from VC until the end of the session τ e 1 without service disruption. On the other hand, the session of user 2 starts at τ s 2 with VC and content service can be provided from VC because of its proximity. The session should be maintained after VC leaves at τ 4 . In this case, after the service migration from VC to FN is performed (i.e., t m ), user 2 can continuously use the content service from FN until the end of session τ e 2 . In this way, CSV can opportunistically utilize the VC which can distribute the load of FN while maintaining the ongoing content service without affecting users.
For the tactical analysis, we assume that the contact time between VC and the user (e.g., from τ 1 to τ 2 and from τ 3 to τ 4 in Figure 1) denoted by t v follows an exponential distribution with mean 1/ μ v as it is widely utilized for VC residence time [20]. In addition, it is assumed that the period when VC is not available (i.e., non-contact time) represented by t f follows an exponential distribution with mean 1/ μ f as it is usually assumed for the period in a FN (BS)-only area [21,22]. From the start, the session continues during the session duration represented by t d (i.e., t d 1 and t d 2 in Figure 1) which follows an exponential distribution with mean 1/ λ d [23]. During the session duration, the content service can be provided to the user. The elapsed time from the session start to the migration is represented by t r f (i.e., from the session start with FN and migration to VC) and t r v (i.e., from the session start with VC and migration to FN) as shown in Figure 1. According to the residual life theory [24], the PDF of t r f and t r v can be given by
f r f ( t ) = μ f ( 1 F f ( t ) )
and
f r v ( t ) = μ v ( 1 F v ( t ) ) .
The VC offloading time denoted by t o f f is defined as the elapsed session duration in the contact time between VC and the user (e.g., from τ 1 to τ 2 and from τ 3 to τ 4 in Figure 1). The VC offloading time can be exploited to provide the content service to users through VC, which consequently can reduce the load on FN. Based on the assumption that the user meets a VC once in session duration, t o f f is less or equal to t v . In addition, we assume that FN and VC can deliver the contents to users with the data rate of BS (i.e., d b ) and that of VC (i.e., d v ), respectively.
Let Q denote the total number of contents. Since we assume that the popularity of the content follows a Zipf distribution [5,25], the request probability of content q is given by
p q = 1 r q ϵ / ( q = 1 Q 1 r q ϵ )
where ϵ is the exponent characterizing the distribution and r q is the popularity ranks of the content q. Moreover, due to the limited caching capacity of VC (i.e., C v ), the least-recently-used (LRU) is assumed as it is generally utilized in the content caching process for the replacement policy [26].

3. Performance Analysis

In this section, the analytical model of CSV is introduced in order to evaluate the performance of CSV compared to that of the non-migration system. In the non-migration system, service migration is not considered. That is, when the session starts with FN, it maintains with FN during the session duration even though VC becomes available. On the other hand, if the session starts with VC, it terminates when VC leaves and a new session re-starts with FN. Specifically, VC offloading efficiency, E E , which is defined as the ratio of the expected amount of downloaded content from VC to the expected total amount of downloaded content during the session period, is derived as an important performance metric.

3.1. Effective VC Offloading Time

To obtain the offloading efficiency by VC of CSV, the expected VC offloading time, E [ t o f f ] , can be derived considering five disjoint cases in Figure 2: (a) τ s t f , t d < t r f , (b) τ s t f , t r f t d < t r f + t v , (c) τ s t f , t r f + t v t d , (d) τ s t v , t d < t r v , and (e) τ s t v , t r v t d . Let E Y , C be the partial offloading time in the case Y {a, b, c, d, e} for CSV. Consequently, E Y , C can be derived as follows.

3.1.1. E a , C

When τ s t f , t d < t r f , the content service is provided only by FN because the session starts and ends before VC is available. Therefore, E a , C is simply 0.

3.1.2. E b , C

When τ s t f , t r f t d < t r f + t v , the ongoing session is migrated to VC and completed during the VC contact time t v . As a result, t o f f is given by t d t r f t m . The joint PDF of the t d , t r f , and t v is obtained by f d , r f , v t d , t r f , t v . Since t d , t r f , and t v are independent, the joint PDF can be the product of each PDF (i.e., f d t d f r f t r f f v t v ). Moreover, since t v = 0 t r f = 0 f r f ( t r f ) f v ( t v ) d t r v d t v is commonly required for E b , C , E c , C , E d , C , and E e , C , we omit the common part for simplicity. Consequently, E b , C can be defined as
E b , C = t d = t r f + t m t r f + t v ( t d t r f t m ) f d ( t d ) d t d .
Note that E b , C is valid when t d t r f t m . In other words, if t d t r f < t m , E b , C is assumed to be 0 (i.e., t o f f is not effective) due to the long migration time, which can be considered as an offloading failure. The offloading failure will be described in Section 3.3.

3.1.3. E c , C

When τ s t f , t r f + t v t d , the ongoing session is migrated to VC and completed after the VC contact time t v . Consequently, t o f f is obtained by t v t m . Therefore, E c , C can be given by
E c , C = t d = t r f + t v ( t v t m ) f d ( t d ) d t d .
Note that E c , C is valid when t v > t m . In other words, if t v t m , E c , C is assumed to be 0 (i.e., t o f f is not effective), which can be considered as an offloading failure and also will be described in Section 3.3.

3.1.4. E d , C

If τ s t v , t d < t r v , the session starts and ends during the VC contact time, which means that t o f f is same to t d . As a result, E d , C can be obtained by
E d , C = t d = 0 t r v t d f d ( t d ) d t d .

3.1.5. E e , C

If τ s t v , t r v t d , t o f f is same with t r v because the session starts in the VC contact time and ends after the contact time. Therefore, E e , C can be defined
E e , C = t d = t r v t r v f d ( t d ) d t d .
Because the cases from (a) to (e) are disjoint events, the expected VC offloading time of CSV, E [ t o f f ] , can be obtained by E a , C + E b , C + E c , C + E d , C + E e , C .
On the other hand, E [ t o f f ] in the non-migration system, can be the same with the sum of E d , C and E e , C because it does not consider the service migration when the VC becomes available. Specifically, when the session starts with FN (like cases from (a) to (c) in Figure 2), the session maintains with FN (i.e., no migration to VC) until it completes. Therefore, the offloading by VC in the non-migration system is only valid when the session starts during VC contact time.
To utilize the expected VC offloading time (i.e., E [ t o f f ] ) as derived above for both systems, it is required for VC to have the same content as that of the user’s ongoing session. Note that the content q can be requested by VC with the request probability p q and then be cached at VC. Therefore, the effective VC offloading time, E T , can of CSV can be given by p q E [ t o f f ] .

3.2. VC Offloading Efficiency

The expected amounts of downloaded content during the effective VC offloading time (i.e., E T ) can be calculated as E T d v for both CSV and non-migration systems. On the other hand, the expected total amounts of downloaded content during the session duration can be obtained by E T d v + ( E [ t d ] E T ) d b . Therefore, the VC offloading efficiency can be given by
E E = E T d v E T d v + ( E [ t d ] E T ) d b .
Particularly, if E E = 0 , it means that the content of the user’s ongoing session does not exist in VC, or the session starts and ends without VC offloading. On the other hand, if E E = 1 , it indicates that the session maintains with VC through the entire session duration.

3.3. VC Offloading Failure

As described in Section 3.1, when the user tries to offload the service from FN to VC considering two cases (b) and (c) in Figure 2, it can be failed due to the long migration time. Let F Y be the probability of the VC offloading failure in the case Y { b , c { for CSV. Consequently, F Y can be derived as follows.

3.3.1. F b

In case (b), the VC offloading failure can occur when t d t r f < t m . Consequently, F b can be obtained by
F b = t v = 0 t r f = 0 t d = t r f t r f + t m f d ( t d ) f r f ( t r f ) f v ( t v ) d t d d t r f d t v .

3.3.2. F c

In case (c), if t v t m , the VC offloading failure can occur. Therefore, F c can be defined as
F c = t v = 0 t m t r f = 0 t d = t r f + t v f d ( t d ) f r f ( t r f ) f v ( t v ) d t d d t r f d t v .
Because the cases (b) and (c) are disjoint events, the total probability of the VC offloading failure for CSV, P F , can be obtained by F b + F c .

4. Simulation Results

To verify the analytical results, event-driven simulations based on MATLAB R2018b are performed in Windows 10 with 16 GB RAM. Moreover, arrival times of events are drawn by generating 20,000 random numbers of t f and t d and the average values are utilized. As described in Section 3, the simulation results of CSV are compared to those of the non-migration scheme. The default values of μ f , λ d , d b , d v , Q, t m , r q , and C v are 10, 10, 10 Mbps, 5 Mbps, 50, 0.01 , 1, and 10 GB respectively [9,25] as shown in Table 1. In addition, the content size is within the range of [500 MB, 1000 MB] and the exponent of the Zipf distribution (i.e., ϵ ) is 0.7 [25]. Figure 3 shows the effect of the average contact time between VC and the user 1 / μ v which is normalized by the non-contact time 1 / μ f for the VC offloading efficiency E E and effective VC offloading time E T . In Figure 3a,b, as the VC contact time increases, VC offloading efficiency becomes higher because the expected VC offloading time can increase. From Figure 3a, it can be found that CSV can achieve higher offloading efficiency compared to the non-migration system. This is because CSV efficiently exploits the VC to offload the service when it becomes available thanks to the service migration. In addition, VC offloading efficiency at 1 / λ d = 0.1 is higher than that at 1 / λ d = 0.2 . This is because the increasing amount of downloaded content through the FN is larger than that through the VC when 1 / λ d increases. This means that the denominator rapidly increases than the numerator in Equation (8) according to the increasing 1 / λ d . In addition, at the same 1 / λ d , the differences in the offloading efficiency between the two schemes increase as 1 / μ v increases. This is because the effect of cases (b) and (c) in Figure 2 on the offloading efficiency is marginal at smaller 1 / μ v and becomes significant at bigger 1 / μ v . On the other hand, from Figure 3b, it can be found that the effective VC offloading time becomes higher when 1 / λ d increases for both systems because the opportunity to offload the service to VC also increases. However, the increasing rate of the non-migration system is much smaller than that of CSV. This means that the cases (d) and (e) in Figure 2 do not have an important effect on the expected VC offloading time according to the change of 1 / λ d . Specifically, Table 2 summarizes the ratio of the partial offloading time for each case (i.e., E b , C , E c , C , E d , C , and E e , C as defined in Section 3) to the total expected offloading time (i.e., E [ t o f f ] ) for CSV. From Table 2, it can be noted that as 1 / λ d increases, the effect of E d , C and E e , C decreases while that of E a , C and E b , C increases. For example, when 1 / μ v = 0.6 / μ f , the ratio of E a , C to the total expected offloading time accounts for 11.7 % and 21.7 % for 1 / λ d = 0.1 and 1 / λ d = 0.2 , respectively (i.e., approximately 10 % increase). On the other hand, the ratio of E d , C to the total expected offloading time becomes 26.5 % from 35.3 % when 1 / λ d changes into 0.2 from 0.1 (i.e., approximately 8.8 % decrease).
Table 3 shows the effect of the service migration time t m to the VC offloading efficiency E E when 1 / μ v changes from 0.5 / μ f to 1 / μ f . From Table 3, it can be found that the VC offloading efficiency decreases according to the increasing migration time because the service cannot be provided during the migration time. In addition, Table 4 shows the VC offloading failure probability according to the service migration time. The VC offloading failure probability increases as the migration time increases, which can be considered a risk to try to offload the service that exists. However, as the service migration has become efficient and fast [12], it can be expected that the effect of the migration time will become trivial. In addition, since the service operator can predict the migration time based on the network status [12], service migration can be exploited at low offloading failure probability.
Figure 4 illustrates the effect of the popularity rank r q of the content on the VC offloading efficiency E E . We assume that the first rank is the lowest rank. For both systems, the VC offloading efficiency decreases as the popularity rank increases. This is because the probability that the VC and user have the same content decreases when the popularity rank increases. In addition, the VC offloading efficiency increases according to the increasing exponent of the Zipf distribution (i.e., ϵ ). The reason is that the request probability of high-rank contents becomes higher as the exponent increases. Specifically, the sum of the request probabilities of the top ten contents becomes approximately 13 % higher from ϵ = 0.7 to ϵ = 1 .
Table 5 shows the effect of the total number of contents Q to the VC offloading efficiency E E . For both systems, the VC offloading efficiency decreases as the total number of contents increases. The reason is that the probability that VC has the same content with user’s request becomes reduced when the total number of contents increases. Furthermore, the difference of the VC offloading efficiency between both schemes decreases according to the increasing the total number of contents. This is because the decreasing rate of the Zipf distribution becomes reduced according to the total number of contents.
Figure 5 illustrates the effect of the caching capacity of VC C v on the VC offloading efficiency E E . For both systems, the VC offloading efficiency increases as the caching capacity of VC increases. This is because the probability that the VC has the same content with user’s request increases when the caching capacity increases. In addition, the increasing rate of CSV is higher than that of the non-migration scheme because CSV has more opportunity to utilize VC compared to the non-migration scheme. Specifically, the increasing rates of CSV and non-migration schemes are about 0.016 and 0.005 , respectively, when 1 / λ d is 0.1 and C v changes from 5 to 14.

5. Conclusions

In this paper, we introduced a CSV where the content service is offloaded to the VC to reduce the load of the FN and provide service continuity. To analyze the performance of CSV, we developed the analytical model of the VC offloading efficiency. Simulation results show that CSV can improve the VC offloading efficiency compared to the non-migration system and the offloading efficiency is affected by the session duration, VC contact time, migration time, and the popularity rank of the content. In our future work, we will validate the CSV by means of the emulation-based feasibility test.

Author Contributions

Conceptualization, Y.K.; methodology, Y.K.; validation, Y.K.; formal analysis, Y.K. and T.S.; investigation, T.S.; resources, Y.K. and T.S.; data curation, Y.K. and T.S.; writing—original draft preparation, Y.K.; writing—review and editing, Y.K. and T.S.; visualization, Y.K.; supervision, T.S.; funding acquisition, T.S. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the Soonchunhyang University Research Fund (No. 20210447).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Acknowledgments

This work was supported in part by the Soonchunhyang University Research Fund (No. 20210447) and in part by the National Research Foundation of Korea (NRF) grant funded by the Korea Government (MSIT) (No. 2020R1G1A1100493).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Liu, Y.; Peng, M.; Shou, G.; Chen, Y.; Chen, S. Toward edge intelligence: Multiaccess edge computing for 5G and internet of things. IEEE Internet Things J. 2020, 7, 672–6747. [Google Scholar] [CrossRef]
  2. Fan, Q.; Ansari, N. Towards workload balancing in fog computing empowered IoT. IEEE Trans. Netw. Sci. Eng. 2020, 7, 253–262. [Google Scholar] [CrossRef]
  3. Wang, X.; Ning, Z.; Wang, L. Offloading in internet of vehicles: A fog-enabled real-time traffic management system. IEEE Trans. Ind. Inform. 2018, 14, 4568–4578. [Google Scholar] [CrossRef]
  4. Ruan, Y.; Joe-Wong, C. On the Economic Value of Mobile Caching. In Proceedings of the IEEE INFOCOM, Toronto, ON, Canada, 6–9 July 2020. [Google Scholar]
  5. Su, Z.; Hui, Y.; Xu, Q.; Yang, T.; Liu, J.; Jia, Y. An edge caching scheme to distribute content in vehicular networks. IEEE Trans. Veh. Technol. 2018, 67, 5346–5356. [Google Scholar] [CrossRef]
  6. Wu, H.; Zhang, J.; Cai, Z.; Liu, F.; Li, Y.; Liu, A. Toward energy-aware caching for intelligent connected vehicles. IEEE Internet Things J. 2020, 7, 8157–8166. [Google Scholar] [CrossRef]
  7. Huang, X.; Xu, K.; Chen, Q.; Zhang, J. Delay-aware caching in internet of vehicles networks. IEEE Internet Things J. 2021, 8, 10911–10921. [Google Scholar] [CrossRef]
  8. Zhang, Y.; Li, C.; Luan, T.H.; Fu, Y.; Shi, W.; Zhu, L. A mobility-aware vehicular caching scheme in content centric networks: Model and optimization. IEEE Trans. Veh. Technol. 2019, 68, 3100–3112. [Google Scholar] [CrossRef]
  9. Yao, L.; Wang, Y.; Wang, X.; Guowei, W.U. Cooperative caching in vehicular content centric network based on social attributes and mobility. IEEE Trans. Mob. Comput. 2021, 20, 391–402. [Google Scholar] [CrossRef]
  10. Taleb, T.; Ksentini, A. Follow me cloud: Interworking federated Clouds and distributed mobile networks. IEEE Netw. 2013, 27, 12–19. [Google Scholar] [CrossRef]
  11. Bao, W.; Yuan, D.; Yang, Z.; Wang, S.; Li, W.; Zhou, B.B.; Zomaya, A.Y. Follow me fog: Toward seamless handover timing schemes in a fog computing environment. IEEE Commun. Mag. 2017, 55, 72–78. [Google Scholar] [CrossRef]
  12. Addad, R.A.; Dutra, D.L.C.; Bagaa, M.; Taleb, T.; Flinck, H. Fast service migration in 5G trends and scenarios. IEEE Netw. 2020, 34, 92–98. [Google Scholar] [CrossRef]
  13. Kyung, Y.; Kim, E.; Song, T. Opportunistic offloading scheme for content delivery service using electro-mobility networks. IET Intell. Transp. Syst. 2022, 1–8. [Google Scholar] [CrossRef]
  14. TS 23.285; Architecture Enhancements for V2X Services. 3GPP: Sophia Antipolis, France, 2022.
  15. TS 23.286; Application Layer Support for Vehicle-to-Everything (V2X) Services. 3GPP: Sophia Antipolis, France, 2022.
  16. Ko, H.; Kyung, Y. DYSON: Delayed offloading scheme with opportunistic fog nodes. IEEE Trans. Veh. Technol. 2022, 71, 10203–10208. [Google Scholar] [CrossRef]
  17. Shah, S.A.A.; Ahmed, E.; Imran, M.; Zeadally, S. 5G for Vehicular Communications. IEEE Commun. Mag. 2019, 56, 111–117. [Google Scholar] [CrossRef]
  18. Michalopoulou, M.; Kolios, P.; Panayiotou, C.; Ellinas, G. An Event-Triggering Approach for Bus Tracking Based on Multimodel Mobility Prediction. In Proceedings of the IEEE Intelligent Transportation System Conference, Auckland, New Zealand, 27–30 October 2019. [Google Scholar]
  19. Wichtlhuber, M.; Reinecke, R.; Hausheer, D. An SDN-based CDN/ISP collaboration architecture for managing high-volume flows. IEEE Trans. Netw. Serv. Manag. 2015, 12, 48–60. [Google Scholar] [CrossRef]
  20. Lee, J.H.; Lee, G.; Pack, S. Pseudonyms in IPv6 ITS communications: Use of pseudonyms, performance degradation, and optimal pseudonym change. Int. J. Distrib. Sens. Netw. 2015, 2015, 189389. [Google Scholar] [CrossRef] [Green Version]
  21. Ko, H.; Lee, J.; Pack, S. Performance optimization of delayed WiFi offloading in heterogeneous networks. IEEE Trans. Veh. Technol. 2017, 66, 9436–9447. [Google Scholar] [CrossRef]
  22. Lim, H.T.; Kim, Y.; Pack, S.; Kang, C.H. Call admission control with heterogeneous mobile stations in cellular/WLAN interworking systems. EURASIP J. Wirel. Comm. Netw. 2011, 91. [Google Scholar] [CrossRef] [Green Version]
  23. Suh, D.; Ko, H.; Pack, S. Efficiency analysis of WiFi offloading techniques. IEEE Trans. Veh. Technol. 2016, 65, 3813–3817. [Google Scholar] [CrossRef]
  24. Ross, S.M. Stochastic Processes; John Wiley: New York, NY, USA, 1996. [Google Scholar]
  25. Wu, H.; Chen, J.; Xu, W.; Cheng, N.; Shi, W.; Wang, L.; Shen, X. Delay-minimized edge caching in heterogeneous vehicular networks: A matching-based approach. IEEE Trans. Wirel. Commun. 2020, 19, 6409–6424. [Google Scholar] [CrossRef]
  26. Gao, J.; Zhang, S.; Zhao, L.; Shen, X. The design of dynamic probabilistic caching with time-varying content popularity. IEEE Trans. Mob. Comput. 2021, 20, 1672–1684. [Google Scholar] [CrossRef]
Figure 1. System model.
Figure 1. System model.
Sensors 22 07967 g001
Figure 2. Timing diagrams of CSV.
Figure 2. Timing diagrams of CSV.
Sensors 22 07967 g002aSensors 22 07967 g002b
Figure 3. Effect of the average contact time between VC and the user. (a): VC Offloading Efficiency, (b): Effective VC Offloading Time.
Figure 3. Effect of the average contact time between VC and the user. (a): VC Offloading Efficiency, (b): Effective VC Offloading Time.
Sensors 22 07967 g003
Figure 4. Effect of the popularity rank of the content on the VC offloading efficiency.
Figure 4. Effect of the popularity rank of the content on the VC offloading efficiency.
Sensors 22 07967 g004
Figure 5. Effect of the caching capacity of VC ( C v ) on the VC offloading efficiency ( E E ).
Figure 5. Effect of the caching capacity of VC ( C v ) on the VC offloading efficiency ( E E ).
Sensors 22 07967 g005
Table 1. Simulation parameters.
Table 1. Simulation parameters.
ParameterDefault Value
μ f 10
λ d 10
d b 10 Mbps
d v 5 Mbps
Q50
t m 0.01
r q 1
C v 10 GB
Content size[500 MB, 1000 MB]
ϵ 0.7
Table 2. Ratio of the partial offloading time.
Table 2. Ratio of the partial offloading time.
1 / λ d 1 / μ v E b , C E c , C E d , C E e , C
0.1 0.3 / μ f 10.1 % 22.6 % 34.9 % 32.4 %
0.6 / μ f 11.7 % 22.6 % 35.3 % 30.3 %
0.9 / μ f 12.5 % 20.4 % 37.4 % 29.7 %
0.2 0.3 / μ f 19.1 % 25.9 % 28.0 % 26.9 %
0.6 / μ f 21.7 % 27.3 % 26.5 % 24.5 %
0.9 / μ f 22.8 % 26.4 % 26.8 % 23.9 %
Table 3. VC offloading efficiency ( E E ) according to t m .
Table 3. VC offloading efficiency ( E E ) according to t m .
tm0.010.020.030.040.05
1/μv
0.5/μf0.1590.1410.1270.1140.104
1/μf0.2570.2400.2250.2130.202
Table 4. VC offloading failure probability ( P F ) according to t m .
Table 4. VC offloading failure probability ( P F ) according to t m .
tm0.010.020.030.040.05
1/μv
0.5/μf0.33%1.64%2.93%4.21%5.46%
1/μf0.05%0.64%1.45%2.25%3.05%
Table 5. VC offloading efficiency ( E E ) according to the total number of contents (Q).
Table 5. VC offloading efficiency ( E E ) according to the total number of contents (Q).
Q1030507090
 
CSV0.2440.1790.1590.1480.141
None0.1600.1170.1040.0970.092
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Kyung, Y.; Song, T. CSV: Content Service Offloading System with Vehicular Caching. Sensors 2022, 22, 7967. https://doi.org/10.3390/s22207967

AMA Style

Kyung Y, Song T. CSV: Content Service Offloading System with Vehicular Caching. Sensors. 2022; 22(20):7967. https://doi.org/10.3390/s22207967

Chicago/Turabian Style

Kyung, Yeunwoong, and Taewon Song. 2022. "CSV: Content Service Offloading System with Vehicular Caching" Sensors 22, no. 20: 7967. https://doi.org/10.3390/s22207967

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop