58 research outputs found

    Content Offloading via D2D Communications Based on User Interests and Sharing Willingness

    Get PDF
    As a promising solution to offload cellular traffic, device-to-device (D2D) communication has been adopted to help disseminate contents. In this paper, the D2D offloading utility is maximized by proposing an optimal content pushing strategy based on the user interests and sharing willingness. Specifically, users are classified into groups by their interest probabilities and carry out D2D communications according to their sharing willingness. Although the formulated optimization problem is nonconvex, the optimal solution is obtained in closed-form by applying Karush-Kuhn-Tucker conditions. The theoretical and simulation results show that more contents should be pushed to the user group that is most willing to share, instead of the group that has the largest number of interested users

    On consideration of content preference and sharing willingness in D2D assisted offloading

    Get PDF
    Device-to-device (D2D) assisted offloading heavily depends on the participation of human users. The content preference and sharing willingness of human users are two crucial factors in the D2D assisted offloading. In this paper, with consideration of these two factors, the optimal content pushing strategy is investigated by formulating an optimization problem to maximize the offloading gain measured by the offloaded traffic. Users are placed into groups according to their content preferences, and share content with intergroup and intragroup users at different sharing probabilities. Although the optimization problem is nonconvex, the closed-form optimal solution for a special case is obtained, when the sharing probabilities for intergroup and intragroup users are the same. Furthermore, an alternative group optimization (AGO) algorithm is proposed to solve the general case of the optimization problem. Finally, simulation results are provided to demonstrate the offloading performance achieved by the optimal pushing strategy for the special case and AGO algorithm. An interesting conclusion drawn is that the group with the largest number of interested users is not necessarily given the highest pushing probability. It is more important to give high pushing probability to users with high sharing willingness

    A review on green caching strategies for next generation communication networks

    Get PDF
    © 2020 IEEE. In recent years, the ever-increasing demand for networking resources and energy, fueled by the unprecedented upsurge in Internet traffic, has been a cause for concern for many service providers. Content caching, which serves user requests locally, is deemed to be an enabling technology in addressing the challenges offered by the phenomenal growth in Internet traffic. Conventionally, content caching is considered as a viable solution to alleviate the backhaul pressure. However, recently, many studies have reported energy cost reductions contributed by content caching in cache-equipped networks. The hypothesis is that caching shortens content delivery distance and eventually achieves significant reduction in transmission energy consumption. This has motivated us to conduct this study and in this article, a comprehensive survey of the state-of-the-art green caching techniques is provided. This review paper extensively discusses contributions of the existing studies on green caching. In addition, the study explores different cache-equipped network types, solution methods, and application scenarios. We categorically present that the optimal selection of the caching nodes, smart resource management, popular content selection, and renewable energy integration can substantially improve energy efficiency of the cache-equipped systems. In addition, based on the comprehensive analysis, we also highlight some potential research ideas relevant to green content caching

    Mobile Edge Computing

    Get PDF
    This is an open access book. It offers comprehensive, self-contained knowledge on Mobile Edge Computing (MEC), which is a very promising technology for achieving intelligence in the next-generation wireless communications and computing networks. The book starts with the basic concepts, key techniques and network architectures of MEC. Then, we present the wide applications of MEC, including edge caching, 6G networks, Internet of Vehicles, and UAVs. In the last part, we present new opportunities when MEC meets blockchain, Artificial Intelligence, and distributed machine learning (e.g., federated learning). We also identify the emerging applications of MEC in pandemic, industrial Internet of Things and disaster management. The book allows an easy cross-reference owing to the broad coverage on both the principle and applications of MEC. The book is written for people interested in communications and computer networks at all levels. The primary audience includes senior undergraduates, postgraduates, educators, scientists, researchers, developers, engineers, innovators and research strategists

    Blockchain-empowered federated learning approach for an intelligent and reliable D2D caching scheme

    Get PDF
    Cache-enabled device-to-device (D2D) communication is a potential approach to tackle the resource shortage problem. However, public concerns of data privacy and system security still remain, which thus arises an urgent need for a reliable caching scheme. Fortunately, federated learning (FL) with a distributed paradigm provides an effective way to privacy issue by training a high-quality global model without any raw data exchanges. Besides privacy issue, blockchain can be further introduced into FL framework to resist the malicious attacks occurred in D2D caching networks. In this study, we propose a double-layer blockchain-based deep reinforcement FL (BDRFL) scheme to ensure privacy-preserved and caching-efficient D2D networks. In BDRFL, a double-layer blockchain is utilized to further enhance data security. Simulation results first verify the convergence of BDRFL-based algorithm, and then demonstrate that the download latency of the BDRFL-based caching scheme can be significantly reduced under different types of attacks when compared with some existing caching policies
    • …
    corecore