Table of Contents Author Guidelines Submit a Manuscript
Mobile Information Systems
Volume 2017 (2017), Article ID 8012517, 12 pages
https://doi.org/10.1155/2017/8012517
Research Article

A Device-to-Device Multicast Scheme for Delay-Constraint Content Delivery

Department of Information Engineering, Shanghai Maritime University, Shanghai 201306, China

Correspondence should be addressed to Yanli Xu; moc.361@1eozlyx

Received 9 September 2016; Revised 6 January 2017; Accepted 15 January 2017; Published 8 February 2017

Academic Editor: Michele Garetto

Copyright © 2017 Yanli Xu. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract

Motivated by the explosive increase of mobile traffic, study on the device-to-device (D2D) communication is kicked off for content delivery through proximal transmission among users. D2D multicast has advantage on serving multiple users simultaneously with less resource cost. However, when D2D multicast is appropriate for content delivery and how to make it serve delay-constraint traffic are still unclear. In this paper, parameters impacting on D2D multicast content delivery is investigated to find good chances for utilizing D2D multicast. Furthermore, some rules to be obeyed are proposed for the content caching and delivery of D2D multicast to satisfy delay constraints. Based on these analyses, a delay-aware multicast scheme is proposed to maximize the network performance utility while satisfying delay constraints of contents. Simulations results verify our analyses and show that the proposed scheme can significantly improve multicast efficiency with guaranteed delay.

1. Introduction

Considering video streaming currently accounts for almost percent of mobile data traffic with a -fold increase over the next years [1], the idea of caching contents proactively at mobile users to offload network traffic has received great attentions recently [24]. As device-to-device (D2D) communication is standardized by 3GPP, proximate users are permitted to be connected with each other under the assistance of cellular network, which motivates the study of D2D communication in many ways as reviewed in [5]. For example, information delivery mechanism is studied to offload data from base station (BS) in [6]. Interference mitigation and utilization are studied to integrate D2D to cellular networks in [7]. The performance of D2D-aided cellular networks is tried to be optimized in [8]. One of these hot topics on D2D is the content dissemination where user equipment (UE) can obtain required contents from proximal UE which cache them in advance.

To introduce D2D content delivery, some beginning works have been done such as the design of architecture, caching, and delivery strategy to realize proactive caching and intelligent delivery at UE. For example, by assuming that D2D UE with common interests constructs a cluster for D2D content sharing, the average number of served requests per cluster and optimal cluster size are analyzed in [9, 10]. A tractable closed-form equation to find when redundant caching should be used in order to minimize the expected energy consumption was derived in [11]. With the consideration of D2D interference and fading, some works analyze the D2D content delivery performance in [12, 13]. Being aware that the social relationships among mobile users may be benefit for D2D content delivery, some researches investigate content delivery protocol by combining social and communication layers [14].

Most of existing works on D2D content delivery are based on the architecture of D2D unicast with request-and-response pattern, whereas multicast also has its advantages for proactive caching in 5G networks due to its better usage of wireless broadcast character as advocated in [15]. As an assistant method for cellular multicast, some works investigate D2D multicast content delivery for content recovery with the help of proximal UE in the same multicast group. For example, some agents are selected for multicasting contents and the selection scheme is proposed to offload data from BS in [16]. A jointly using D2D multicast and unicast scheme is proposed to satisfy different requirements of UE in [17]. In [18], the grouping of D2D UE for content delivery is investigated to improve the energy efficiency. In [19], D2D communications are used for aiding cellular multicast to improve the performance of cell-edge devices.

However, D2D multicast pushes a content to multiple UE simultaneously and the content delivery cannot be adjusted by each content request like unicast and the quality of service (QoS) of delivery could not be guaranteed. Although a delay bound is necessary to ensure user experience for real-time video traffic with stringent delay requirements [2022], most of existing works on D2D-aided content delivery analyze or design D2D delivery mechanisms without considering a delay constraint. Thereby, whether D2D multicast is appropriate for content delivery and how to schedule the multicast intelligently to realize the D2D multicast gain are still unclear to the best of our knowledge. This work aims at designing a delay-guaranteed multicast scheme by intelligently scheduling the content delivery and caching to fulfill the D2D multicast content delivery in cellular networks. To achieve this goal, a D2D multicast scheme is proposed in which contents of UE are delivered through D2D multicast periodically. In this scheme, the interval between two multicast periods of a D2D transmitter and the caching strategy of a D2D receiver should satisfy some conditions. With study of these conditions, the multicast performance can be improved under guaranteed delay constraints.

The remaining parts of the paper are organized as follows. In Section 2, the system model is set up and the D2D multicast delivery problem is formulated. In Section 3, the management of content delivery and caching are studied to satisfy improve D2D multicast performance while satisfying delay constraints. Based on these analyses, an optimal D2D multicast content delivery scheme is proposed which can not only maximize the network utility but also satisfy delay constraints of contents. Simulation results and related discussion are presented in Section 4. Finally, Section 5 concludes this paper. List of Symbols Section lists main symbols used in the paper.

2. System Model

2.1. Network Architecture

We consider an infinite planer cellular network where UE transmits data with two alternative transmission modes, that is, cellular mode in which transmission traverses BS and D2D mode in which proximal UE communicated with each other directly without the relay of BS. In the D2D mode, neighboring UE can be detected based on Received Signal Strength Indicator (RSSI) by listening signals from other UE in the discovery period. For UE, another UE can be regarded as a neighbor if the RSSI from this UE is beyond a threshold. Based on this method, some works discuss the discovery procedure in LTE networks [23, 24]. For each communication link, a better transmission mode can be selected to achieve higher system performance according to a certain mode selection scheme [25, 26]. D2D communication links employ spatial reuse for interference mitigation and higher resource efficiency thanks to proximal transmission. Communication links under different transmission modes use orthogonal resources for interference mitigation.

Without loss of generality, we study a cell of the cellular network with radius as an interested system and study its content delivery performance for easy elaboration. Impacts from other cells such as interference are also considered for analyses. UE can obtain its required contents by listening to multicast contents from proximal transmitters. Transmitters are assumed to be distributed according to a Poisson point process (PPP) which is a popular model for characterizing locations of nodes in wireless environment and widely used for the analysis of D2D communication [2729].

2.2. Channel Model

For communication link , the transmission over it is regarded to be successful when the SIR at the receiver is larger than threshold . We assume that the thermal noise is negligible and this assumption may be easily relaxed (e.g., see [30, 31]) but at the cost of complicating the derived expressions without providing additional insight. For the power control of transmitter, the transmitter chooses its transmission power such that the signal power at the intended receiver will be some designated constant . For example, for a transmitter expected to cover a distance , the transmission power is , where is the path loss exponent. Some periodic resources with interval are allocated to D2D multicast for the content delivery (as shown in Figure 1). A multicast period includes several resource blocks (RBs) with bandwidth and lasts several subframes with time in the frequency and time domains, respectively. For a multicast period, the volume of transmitted data over a link iswhere is the received signal-interference-ratio (SIR) at the receiver , which can be written aswhere denotes the transmission power of UE , is the distance from the transmitter to the receiver , is the interference at the receiver from the simultaneous transmitter set and characterizes the fast fading power from to .

Figure 1: Resource allocation for D2D multicast.
2.3. Content Request and UE Experienced Delay

Each UE has a cache which can be populated with some video contents. Assume that the size of content is , is successfully delivered during a multicast period if ; that is, , where . As shown in Figure 2, multiple contents coexist in the network during an observation period. During the lifetime of , request for the content is modeled by Poisson arrival process with arriving rate , which can be easily generalized for more practical cases based on queuing theory. UE can obtain the required content by listening to multicast contents from proximal UE. Different from request-and-response in unicast content delivery, the multicast content may be not required by UE receiving it right now. UE cached the multicast content in case that it needs this content in the future. Considering the limited capacity of a cache, UE discards cached content with . Clearly, affects the multicast performance since it determines the amount of UE caching and transmitting . Thereby, the performance of D2D multicast can be improved by well-designed caching management policies in which UE chose caching time of video contents intelligently. UE may depart the system before it acquires its requested packet due to mobility. We assume that each UE leaves the system with rate .

Figure 2: An example for D2D multicast content delivery operation: during lifetime of content , user randomly generates request and the request is served via D2D periodic multicast.

UE may obtain a required content from precaching or from a multicast latter. Hence, whether UE can be served by D2D multicast is uncertain. As a key metric of real-time video traffic, the time delay experienced by UE requiring a content determines whether D2D multicast is appropriate for content delivery or not. Here, the time delay per content request is used for characterizing the access delay affected by scheduling and the transmission time affected by channel quality and link congestion.

3. D2D Multicast for Delay-Constraint Content Delivery

In this section, we investigate how to apply D2D multicast to the content delivery with delay constraints. To solve this problem, the first focus is the problem formulation and system architecture setup for the D2D multicast. Then impacts induced by delay constraints on D2D multicast are studied in terms of transmission and interval periods, respectively. Lastly, a delay-constraint multicast scheme is proposed.

3.1. Preliminary of the Multicast Content Delivery Scheme

Unlike unicast, content delivery through multicast is a push strategy. Multicast contents of UE are transmitted to proximal UE periodically in allocated D2D resources. Taking the multicast of D2D UE as an example, the system behaviors during the multicast and interval periods are illustrated in Figures 3(a) and 3(b), respectively. In the multicast scheme, D2D UE which caches some contents transmits multicast content at the beginning of a D2D period lasting (shown in Figure 3(a)). During , BS schedules idle neighbor UE of to listen to the multicast content. These neighbors of UE are searched during a neighbor discovery period in advance [32]. When these neighbors receive the multicast content, they determine whether to cache the content based on a caching strategy. During the interval period (shown in Figure 3(b)), the UE is scheduled to communicate with other UE after the multicast period if there are communication requirements. Which mode is used for the communication, that is, D2D unicast or cellular, and the corresponding communication time under each mode are determined by a predefined mode selection scheme.

Figure 3: System behaviors of the D2D multicast scheme.

To maximize the delivery efficiency served by D2D multicast while guaranteeing the delay constraints of contents, we denote a utility as and formulate the optimal problem as follows:where is the number of coexisting contents, is the successful probability of UE receiving a content under constraint , and is the probability that content is required by the UE. Hence, the utility denotes the expectation value of a request served by D2D multicast. The caching time constrained by the cache capacity is shown in (3b). That is, there is a lower bound, , of the discarding rate of contents in a cache to avoid overflow. (3c) shows the constraint to caching time which guarantees enough cache contents at UE to satisfy content requirements through D2D multicast; that is, the discarding rate of contents is less than threshold .

3.2. The Transmission Management for D2D Multicast

From the optimal problem under given constraints in (3a), (3b), and (3c), we observe that a key factor impacting on the delay-constraint multicast is , which is mainly determined by the transmission strategy in the multicast scheme. Thereby, we study how to manage the transmission of multicast UE in this subsection. Different from unicast, UE in the D2D multicast scheme received contents passively. UE is served by multicast if the received multicast content is required by this UE. For example, when UE requires a content at time , this content request is regarded to be satisfied by D2D multicast if the required content has been proactively cached by this UE and still not discarded at . Thereby, the service quality of D2D multicast for content requests depends on the probability of UE successfully receiving its required content. This probability is determined by two parts: (1) the matching degree between multicast and required contents and (2) the probability that UE can successfully receive multicast content from a transmitter. Firstly, we present the successful probability that UE can obtain content as follows.

Lemma 1. The successful probability of UE receiving a content during a multicast period iswhere is the probability that is transmitted by UE during an arbitrary multicast period, is the transmitter density sharing the resource, , , and is the Gamma function.

Proof. UE can obtain if and only if its transmitter sends and this UE successfully receives it; can be written aswhere denotes the event that is the transmitter UE listening to, denotes an event that successfully receives a content from UE , and denotes an event that the multicast content from is . Since only depends on channel quality between and , we have [29]Assume that the transmission probability of a content is independent identically distributed at each transmitter and denote . Since potential transmitters of are distributed uniformly with density in the circle with radius and origin , we have can be calculated by including (6) and (7) into (5) as follows:

For a multicast lasting , the expected amount of UE that successfully received the multicast content is with the average rate , where is the expected number of receivers and is the density of receivers. The probability that UE successfully caches a multicast content before it is required by this UE depends on the successful acquisition probability of the content in each multicast period. Since in each multicast period is independent of each other and once UE obtains the content, it will cache it. Then it will not receive this content in the following time. Thus, follows a geometric distribution.

Lemma 2. Without considering the discarded contents, the probability that a request for is covered by the D2D multicast before its delay constraint can be expressed by

reflects the probability that a content requirement is covered by a multicast; thereby, it is also called a multicast coverage probability (MCP) here. As indicated, one significant advantage of multicast is that multiple UE may benefit from once multicast. With the perspective of efficiency, a multicast is expected to satisfy more current and future content requirements. Here we denote a multicast coverage threshold and guarantee the probability that UE located in the coverage of a transmitter benefited from a multicast via . can be seen as the coverage requirement for a D2D multicast from UE. To achieve this goal, we present Theorem 3 as follows.

Theorem 3. The transmission scheduling should satisfy (10) to guarantee that the MCP is larger than a threshold :and satisfies

Proof. Including in (9) into inequality , we havethat is,Let . Sincethe left part of above formulary decreases with , and there is an upper bound for to satisfy (13), that is, the coverage constraint . Then is the solution of equation in (13); that is,

can be seen as a threshold for the multiplication of , , and . Similarly, there are bounds for the density (determined by simultaneous transmitters which share the same resource), targeted distance (determined by transmission power), and (determined by channel quality and decoding threshold at a receiver) due to the fact that increases with the above parameters. In addition, from (15), we see that these upper bounds depend on the delay constraint , the transmission strategy () at a transmitter, and targeted MCP threshold .

3.3. The Interval Management for D2D Multicast

From the analyses in the last subsection, we see that the multicast performance of contents is affected by the management of transmission in terms of simultaneous transmitter density and transmission range as shown in Theorem 3. To further study the multicast performance in a time flow view and reveal the impact of delay constraints on the multicast scheme, the interval between two multicast periods in the multicast scheme is investigated in this subsection. Without loss of generality, we take the delivery of an arbitrary content in the system as an example. The subscript of some symbols is omitted for simplification of mathematical expressions. For D2D-supported content delivery, the delivery performance depends on the number of UE caching contents, , to a large extent, and the delay performance is dominatingly determined by queuing delay which depends on the amount of UE requesting this content, . decreases when UE with content leaves the network or discards content and increases when UE successfully receives multicast content and caches it. Thereby, the variation of can be expressed by (16) during an infinite small time slot :which is a first-order linear nonhomogeneous differential equation with general solution as follows:where can be derived by substituting into (17) with the assumption that there is UE caching content at the start time . Then we have and

In the multicast strategy, a request for content from UE at is served if this UE caches before . Denoting the probability that is requested at as , the number of served requests by multicast is . Since the request arrival rate is and decreases with leaving UE with rate , the variation of can be expressed by

Solving (19), we obtain

Since UE which requests at any time with probability , the amount of UE requesting follows binomial distribution at an instantaneous time. Due to the fact that the request arrival rate is , we have the relationship based on the probability theory [33]. Then can be written by (21) by including and into (20):

Using , we have

Thus, can be written as

The steady state of D2D multicast content delivery can be obtained by

Denoting equilibrium values of and as and , these equilibrium values can be obtained by including (16) and (19) into (24):

According to Little’s law which indicates that the average number of requests is equal to the multiplier of valid arrival rate and served time per request [34], the served time per content request can be derived from

Submitting (25b) into (26), can be written as

Considering that D2D UE is only scheduled in a multicast period for content delivery, the total delay from UE requiring a content to it obtaining this content is affected by the scheduled period for D2D multicast. Given a service time for a content request and a multicast period lasting , the number of used multicast periods is and is the round down function. Then can be written asEquation (28) shows that and affect the delay of a content served by D2D multicast. Hence, time resources should be intelligently allocated to D2D multicast to satisfy different delay constraints of contents. For an intelligent scheduling, we present Theorem 4 here.

Theorem 4. For the D2D multicast content delivery, the resource allocation of D2D multicast should make the interval satisfy (29) to guarantee the delay QoS of a content request:where .

Proof. To guarantee that the delay for obtaining a required content via the service of D2D multicast satisfies delay constraint , we need . Including (28) into this inequality can easily get the conclusion.

Discussion. From Theorem 4, we can find that the interval between two multicast periods has an upper bound which supplies a reference for the practical resource allocation for D2D multicast according to a given content QoS requirement. In addition, it can be used for evaluating whether D2D multicast is appropriate for the delivery of content. For example, multicast is inappropriate to worse transmission environment due to larger time delay and more energy consumption caused by frequent transmissions. Furthermore, multicast is also inappropriate to the content with less popularity due to fewer number of benefit UE from the multicast while severer interference is induced by multicast intending to cover the farthest receiver.

3.4. A Delay-Aware Multicast Scheme for D2D Content Delivery

In above two subsections, the impact of delay constraint on the transmission and interval management are analyzed for the multicast scheme. Based on these analyses, we solve the optimal problem presented at the beginning of this section and propose a delay-aware multicast scheme for the D2D content delivery in this subsection.

From the optimal target in (3a), it is shown that the utility depends on the content requirement except the MCP characterizing the service performance of D2D multicast. To describe the probability of a content to be required by UE, the required statistics of contents is modeled by a Zipf distribution, which has been shown to fit well with video requirement [35, 36] and be widely used for the analysis of D2D content delivery [37, 38]. In the Zipf distribution, the probability that content is required by UE can be expressed bywhere is the Zipf exponent.

Institutively, content with more popularity should have longer cached time. However, the cache capacity of a device is limited. On one hand, it is expected that UE caches more contents for a longer time to make D2D multicast serve more content requests under different delay constraints. On the other hand, the cache capacity of a device is limited and it is impossible to cache abundant content without discarding them. These cache capacity and delay constraints are shown in (3b) and (3c), respectively. Given a service time bound to constrain the service time for a request of content , the constraint on in (3c) can be written as (31) by instituting in (27) into inequality and solving the inequality

The utility of (3a) can be written as follows by including (9) and (30) into (3a):

Letting , we can maximize through minimizing . The corresponding Lagrangian function of the optimization problem is as follows:

The KKT conditions are

Taking derivation of with respect to , we have

Substituting (35) into (34a), we obtain

Since

needs to satisfy (38) by including (37) into (36).

From (38), we see that is a function of and , which is denoted by . Including this relationship into (34b) and (34c), we can obtain -dimensional equation set as

Solving the equation set yields to and ; thereby, the optimal can be obtained.

From (38), we observe that the decreasing rate of with respect to needs to satisfy a given rate to guarantee the delivery performance while avoiding overflow as listed in Theorem 5.

Theorem 5. To maximize the expectation probability of a request served by D2D multicast with guaranteed delay QoS and avoid cache overflow, the decreasing rate of  with respect to needs to satisfywhere and are constants.

4. Performance Evaluation

In this section, some simulation results will be presented based on analyses in Section 3 to evaluate the performance of D2D multicast and validate proposed schemes. The simulation experiments are performed on MATLAB platform. In the simulation, a cellular cell is targeted to be evaluated with radius . In the cell, BS is located in the center and UE is uniformly distributed in the cell with a certain density and this UE density is the sum of transmitter density and receiver density . Content request arrivals at the simulation system with rate and UEs leaving the system with rate . D2D transmitters send multicast content every which lasts . Receivers randomly select a transmitter within distance and cache the successfully received contents. A communication link is regarded to be successful if the receiving SIR is larger than a threshold. Cached contents will be discarded with a certain rate, for example, for content . The default used simulation parameters are shown in Table 1. These sets of parameters can be referred to simulation settings recommended by 3GPP for D2D communication in [32] or prior related works [39, 40].

Table 1: Simulation parameters.

is used for evaluating the coverage probability of once multicast for requests of content and results are shown in Figure 4. As shown in this figure, decreases with the increase of , , and (led by increase of or decrease of ), which is in accordance with that of Theorem 3. Thus, we can determine whether the performance of D2D multicast is appropriate to content delivery or not based on Theorem 3 under different transmission environments. In addition, the comparison between two subfigures shows that the transmitting probability of content affects the performance significantly. Thereby, a popular content required by more UE is expected to transmitted with larger probability.

Figure 4: Successful probability of UE receiving a multicast content versus transmitter density .

Figure 5 shows MCP under different parameters to evaluate the service quality of D2D multicast when delay constraint is considered. is the constraint to the number of multicast periods used for receiving a content. also decreases with like due to the fact that is determined by . From this perspective, the improvement of is valid for improving the performance of multicast content delivery. In addition, D2D multicast is not appropriate to higher density of simultaneous transmitters case due to severe interference. Furthermore, it is also indicated that increases with which shows a possible scenario for D2D multicast content delivery, that is, higher density of UE. This criteria of UE density can be easily derived from our analysis on . Results of this figure also show that performs better at larger delay constraint; that is to say, multicast is more appropriate for delay tolerant traffic. It does not mean that multicast is not suitable for delay-constraint traffic. However, some rules should be obeyed to guarantee a delay QoS as analyzed, which are evaluated in Figure 6.

Figure 5: MCP versus transmitter density .
Figure 6: Comparison of time delay per request for D2D multicast content delivery against the scheduled multicast period .

The time delay per request is used for evaluating multicast performance in terms of delay. is the time experienced by UE from the start of its requirement of a content to its acquisition of this content. With different scheduled multicast periods , the variation of is shown in Figure 6. Here we define as the probability that the UE requesting a content fails to receive the content in a multicast period. It is shown that is affected by many parameters such as , , , and as analyzed. As illustrated in the figure, increasing can reduce the time delay given certain values of , , and . Hence, we can adjust by scheduling simultaneous transmitters and transmission time of each multicast resource to obtain targeted delivery performance based on Theorem 3. Furthermore, it is shown that increases with . Taking a time delay QoS constraint  ms as an example (labeled by a dotted line in this figure), we can see that has upper bounds which can be calculated by Theorem 4 (labeled by , , and , respectively) under different cases. When is smaller than these bounds, the time delay QoS requirement can be guaranteed under different cases. In addition, the served performance of content request is reduced by the increase of which indicates the importance of proactive caching for D2D content delivery. Thus, the caching time should be assigned to contents according to their popularity in practical applications. For example, considering the limitation of the cache capability of UE, the less popular content should be scheduled with shorter caching time, that is, larger .

Based on the proposed multicast scheme, Table 2 shows optimal under different parameters. Here is used to evaluate the scheme. From this table, we observe that optimal depends on delay constraints for different contents, transmitted probability, and requested probability. increases with the increase . That is because more frequent transmission leads to more caching UE which may excess the requirement to support requests for this content. Thus, increases to abort redundant contents for more useful contents. For similar reasons, is larger for contents with larger delay constraint. In addition, larger means less popular of contents, which also increase the optimal aborting rate of contents. Hence, the proposed scheme provides a feasible way for determining caching time of contents to guarantee different delay constraints of contents.

Table 2: Optimal based on proposed multicast scheme.

The utility is compared for different schemes as shown in Table 3. Schemes and 3 are equally caching schemes; that is, is equal for different contents. In Scheme , for . In Scheme , for . Scheme is the proposed multicast scheme where caching strategy is constrained by delay and optimized to maximize . Thereby, we present the constraint values to show whether constraints are satisfied (calculated based on (3b) and (3c)). Negative values of these constraint values mean that the corresponding constraint is satisfied. From this table, we see that optimal scheme provides maximal utility value when constraints are satisfied. Therefore, the proposed multicast scheme can improve multicast efficiency for D2D content delivery with guaranteed delay constraints.

Table 3: Utility and constraint values for different schemes.

In Figure 7, the proposed scheme is compared to two BS-based multicast schemes when delay-constraints are satisfied by these schemes. In BS multicast Scheme , advantages of BS are considered; that is, BS caches all contents and knows some a priori knowledge such as content requirements. Hence, the multicast content from BS is assumed to be required by receiving UE. In BS multicast Scheme , BS only caches all contents without preknown content requirements like D2D UE. From this figure, we see that the proposed scheme significantly improves the BS multicast performance under different parameters and the performance can be improved up to three times. As the number of contents increases, the constraint of the UE cache and the decrease of for each content lead to the performance reduction, while it is also better than BS multicast schemes.

Figure 7: Comparison of utility among proposed D2D multicast content delivery scheme and BS multicast schemes.

5. Conclusion

In this paper, device-to-device (D2D) multicast is investigated to efficiently integrate D2D multicast for content delivery in cellular networks. To achieve this goal, a delay-constraint multicast scheme is proposed. The D2D multicast performance is analyzed in terms of once multicast transmission and time flow, respectively. Successful delivery probability of once multicast, multicast coverage probability (MCP) of serving content requirements with delay constraints, and the serving time per request are provided which give an insight into the relationship between different parameters and the service quality of D2D multicast. Based on these analyses, rules for multicast scheduling to obey are proposed, which provides qualitative rules of the delivery scheduling for contents with different delay constraints. The distributed caching is also studied, which provides aborting rate for contents, that is, staying time of each contents cached by UE. Based on the proposed D2D multicast scheme, better delivery performance is achieved with guaranteed delay. Simulation results show that the delivery performance (MCP) is dependent on many factors such as transmission performance , cooperation range , transmitter density , and transmission probability . The quality of D2D multicast can be improved by adjusting these parameters. Furthermore, proposed schemes can support a delay-guaranteed content delivery with three times performance improvement compared to cellular multicast. In conclusion, the work presented in this paper will be useful for the efficient implementation of content delivery via D2D multicast in cellular networks.

Symbols

:Intended receiving power strength
:Path loss factor
:Interval period between two multicasts
:The volume of transmitted data over link to
:Allocated bandwidth
:Distance between node and
:Received SIR at D2D UE
:Fast fading power of the channel between and
:Coverage distance of a multicast UE
:Size of content
:Decoding SIR threshold
:Transmission power of UE
:Discarding rate of content at UE
:Arriving rate of content requests
:UE leaving rate
:Time delay per content request
:Multicast time per D2D period
:The successful probability of UE receiving a content under constraint
:Successful probability of UE receiving
:Average rate of UE receiving
:Transmitter density sharing the resource
:The probability that is transmitted by a UE
:Density of receivers
:Multicast coverage probability
:Number of pieces of UE caching at
:Number of pieces of UE requesting at
:Served time per content request.

Competing Interests

The author declares that there are no competing interests regarding the publication of this paper.

Acknowledgments

This work was supported in part by the Project of National Natural Science Foundation of China (no. 61601283, no. 61301110, and no. 61571108) and by the China Postdoctoral Science Foundation (no. 2016M590349).

References

  1. “Cisco visual networking index: Global mobile data traffic forecast update, 2015–2020 white paper,” Cisco, white paper, 2016 http://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/mobile-white-paper-c11-520862.html.
  2. B. Han, P. Hui, V. A. Kumar, M. V. Marathe, G. Pei, and A. Srinivasan, “Cellular traffic offloading through opportunistic communications: a case study,” in Proceedings of the 5th ACM Workshop on Challenged Networks (CHANTS '10), pp. 31–38, ACM, Chicago, Ill, USA, September 2010.
  3. H.-H. Cheng and K. C.-J. Lin, “Source selection and content dissemination for preference-aware traffic offloading,” IEEE Transactions on Parallel and Distributed Systems, vol. 26, no. 11, pp. 3160–3174, 2015. View at Publisher · View at Google Scholar · View at Scopus
  4. V. Sciancalepore, D. Giustiniano, A. Banchs, and A. Hossmann-Picu, “Offloading cellular traffic through opportunistic communications: analysis and optimization,” IEEE Journal on Selected Areas in Communications, vol. 34, no. 1, pp. 122–137, 2016. View at Publisher · View at Google Scholar · View at Scopus
  5. A. Asadi, Q. Wang, and V. Mancuso, “A survey on device-to-device communication in cellular networks,” IEEE Communications Surveys & Tutorials, vol. 16, no. 4, pp. 1801–1819, 2014. View at Publisher · View at Google Scholar · View at Scopus
  6. M. Dai, B. Mao, D. Shen, X. Lin, H. Wang, and B. Chen, “Incorporating D2D to current cellular communication system,” Mobile Information Systems, vol. 2016, Article ID 2732917, 7 pages, 2016. View at Publisher · View at Google Scholar · View at Scopus
  7. Y. Guo, J. Gao, and J. Hao, “Exploiting the user-level interference based on network coding in D2D underlaid cellular networks,” Mobile Information Systems, vol. 2015, Article ID 142967, 8 pages, 2015. View at Publisher · View at Google Scholar · View at Scopus
  8. B. Fang, Z. Qian, W. Zhong, W. Shao, and H. Xue, “Coordinated precoding for D2D communications underlay uplink mimo cellular networks,” Mobile Information Systems, vol. 2016, Article ID 1901952, 11 pages, 2016. View at Publisher · View at Google Scholar · View at Scopus
  9. A. Altieri, P. Piantanida, L. R. Vega, and C. G. Galarza, “A stochastic geometry approach to distributed caching in large wireless networks,” in Proceedings of the 11th International Symposium on Wireless Communications Systems (ISWCS '14), Barcelona, Spain, August 2014. View at Publisher · View at Google Scholar · View at Scopus
  10. N. Golrezaei, P. Mansourifard, A. F. Molisch, and A. G. Dimakis, “Base-station assisted device-to-device communications for high-throughput wireless video networks,” IEEE Transactions on Wireless Communications, vol. 13, no. 7, pp. 3665–3676, 2014. View at Publisher · View at Google Scholar · View at Scopus
  11. J. Paakkonen, C. Hollanti, and O. Tirkkonen, “Device-to-device data storage for mobile cellular systems,” in Proceedings of the IEEE Globecom Workshops (GC Wkshps '13), pp. 671–676, Atlanta, Ga, USA, December 2013. View at Publisher · View at Google Scholar · View at Scopus
  12. D. Malak and M. Al-Shalash, “Optimal caching for device-to-device content distribution in 5G networks,” in Proceedings of the IEEE Globecom Workshops (GC Wkshps '14), pp. 863–868, IEEE, Austin, Tex, USA, December 2014. View at Publisher · View at Google Scholar · View at Scopus
  13. H. J. Kang, K. Y. Park, K. Cho, and C. G. Kang, “Mobile caching policies for device-to-device (D2D) content delivery networking,” in Proceedings of the IEEE Conference on Computer Communications Workshops, pp. 299–304, IEEE, Toronto, Canada, May 2014. View at Publisher · View at Google Scholar · View at Scopus
  14. Z. Zheng, T. Wang, L. Song, Z. Han, and J. Wu, “Social-aware multi-file dissemination in device-to-device overlay networks,” in Proceedings of the IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS '14), pp. 219–220, IEEE, Ontario, Canada, May 2014. View at Publisher · View at Google Scholar · View at Scopus
  15. E. Bastug, M. Bennis, and M. Debbah, “Living on the edge: the role of proactive caching in 5G wireless networks,” IEEE Communications Magazine, vol. 52, no. 8, pp. 82–89, 2014. View at Publisher · View at Google Scholar · View at Scopus
  16. M. Zulhasnine, C. Huang, and A. Srinivasan, “Exploiting cluster multicast for P2P streaming application in cellular system,” in Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC '13), pp. 4493–4498, IEEE, Shanghai, China, April 2013. View at Publisher · View at Google Scholar · View at Scopus
  17. Y. Cao and A. Maaref, “Device cooperation-assisted scalable video multicast with heterogeneous QoE guarantees,” in Proceedings of the 11th International Symposium on Wireless Communications Systems (ISWCS '14), pp. 733–738, Barcelona, Spain, August 2014. View at Publisher · View at Google Scholar · View at Scopus
  18. Y. Zhang, F. Li, X. Ma, K. Wang, and X. Liu, “Cooperative energy-efficient content dissemination using coalition formation game over device-to-device communications,” Canadian Journal of Electrical and Computer Engineering, vol. 39, no. 1, pp. 2–10, 2016. View at Publisher · View at Google Scholar · View at Scopus
  19. L. Militano, M. Condoluci, G. Araniti, A. Molinaro, A. Iera, and G.-M. Muntean, “Single frequency-based device-to-device-enhanced video delivery for evolved multimedia broadcast and multicast services,” IEEE Transactions on Broadcasting, vol. 61, no. 2, pp. 263–278, 2015. View at Publisher · View at Google Scholar · View at Scopus
  20. G. Piro, L. A. Grieco, G. Boggia, R. Fortuna, and P. Camarda, “Two-level downlink scheduling for real-time multimedia services in LTE networks,” IEEE Transactions on Multimedia, vol. 13, no. 5, pp. 1052–1065, 2011. View at Publisher · View at Google Scholar · View at Scopus
  21. W. K. Lai and C.-L. Tang, “QoS-aware downlink packet scheduling for LTE networks,” Computer Networks, vol. 57, no. 7, pp. 1689–1698, 2013. View at Publisher · View at Google Scholar · View at Scopus
  22. S. E. Ghoreishi, A. Aijaz, and A. H. Aghvami, “Delay-constrained video transmission: a power-efficient resource allocation approach for guaranteed perceptual quality,” in Proceedings of the 58th IEEE Global Communications Conference (GLOBECOM '15), pp. 1–7, IEEE, San Diego, Calif, USA, December 2015. View at Publisher · View at Google Scholar · View at Scopus
  23. H. Tang, Z. Ding, and B. C. Levy, “Enabling D2D communications through neighbor discovery in LTE cellular networks,” IEEE Transactions on Signal Processing, vol. 62, no. 19, pp. 5157–5170, 2014. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  24. K. W. Choi and Z. Han, “Device-to-device discovery for proximity-based service in LTE-advanced system,” IEEE Journal on Selected Areas in Communications, vol. 33, no. 1, pp. 55–66, 2015. View at Publisher · View at Google Scholar · View at Scopus
  25. D. D. Penda, L. Fu, and M. Johansson, “Mode selection for energy efficient D2D communications in dynamic TDD systems,” in Proceedings of the IEEE International Conference on Communications Workshops (ICC '15), pp. 5404–5409, London, UK, June 2015.
  26. Y. Xu, “A mode selection scheme for D2D communication in heterogeneous cellular networks,” in Proceedings of the IEEE Global Communications Conference (GLOBECOM '15), pp. 1–6, IEEE, San Diego, Calif, USA, December 2015. View at Publisher · View at Google Scholar · View at Scopus
  27. A. Al-Hourani, S. Kandeepan, and A. Jamalipour, “Stochastic geometry study on device-to-device communication as a disaster relief solution,” IEEE Transactions on Vehicular Technology, vol. 65, no. 5, pp. 3005–3017, 2016. View at Publisher · View at Google Scholar · View at Scopus
  28. A. Altieri, P. Piantanida, L. R. Vega, and C. G. Galarza, “On fundamental trade-offs of device-to-device communications in large wireless networks,” IEEE Transactions on Wireless Communications, vol. 14, no. 9, pp. 4958–4971, 2015. View at Publisher · View at Google Scholar · View at Scopus
  29. Y. Xu and S. Wang, “Mode selection for energy efficient content delivery in cellular networks,” IEEE Communications Letters, vol. 20, no. 4, pp. 728–731, 2016. View at Publisher · View at Google Scholar · View at Scopus
  30. S. Weber, J. G. Andrews, and N. Jindal, “The effect of fading, channel inversion, and threshold scheduling on ad hoc networks,” IEEE Transactions on Information Theory, vol. 53, no. 11, pp. 4127–4149, 2007. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  31. N. Jindal, S. Weber, and J. G. Andrews, “Fractional power control for decentralized wireless networks,” IEEE Transactions on Wireless Communications, vol. 7, no. 12, pp. 5482–5492, 2008. View at Publisher · View at Google Scholar · View at Scopus
  32. “3gpp technical report 36.843,” Tech. Rep. 3GPP WG RAN1, 2014, http://www.3gpp.org/ftp/Specs/archive/36_series/36.843/.
  33. A. Papoulis and S. U. Pillai, Probability, Random Variables, and Stochastic Processes, Tata McGraw-Hill Education, 2002.
  34. D. Chhajed and T. J. Lowe, Eds., Building Intuition: Insights from Basic Operations Management Models and Principles, Springer US, 1st edition, 2008.
  35. L. Breslau, P. Cao, L. Fan, G. Phillips, and S. Shenker, “Web caching and Zipf-like distributions: evidence and implications,” in Proceedings of the 18th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '99), vol. 1, pp. 126–134, New York, NY, USA, March 1999. View at Publisher · View at Google Scholar
  36. M. Busari and C. Williamson, “On the sensitivity of web proxy cache performance to workload characteristics,” in Proceedings of the 12th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '01), vol. 3, pp. 1225–1234, Anchorage, Alaska, USA, April 2001. View at Publisher · View at Google Scholar
  37. E. Bastug, M. Bennis, and M. Debbah, “Social and spatial proactive caching for mobile data offloading,” in Proceedings of the IEEE International Conference on Communications Workshops (ICC '14), pp. 581–586, IEEE, Sydney, Australia, June 2014. View at Publisher · View at Google Scholar · View at Scopus
  38. K. Poularakis and L. Tassiulas, “Optimal selfishness-aware device-assisted content delivery in cellular networks,” in Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC '14), pp. 2288–2293, Istanbul, Turkey, April 2014. View at Publisher · View at Google Scholar · View at Scopus
  39. D. Qiu and R. Srikant, “Modeling and performance analysis of bittorrent-like peer-to-peer networks,” SIGCOMM Computer Communication Review, vol. 34, no. 4, pp. 367–378, 2004. View at Google Scholar
  40. A. Pyattaev, O. Galinina, S. Andreev, M. Katz, and Y. Koucheryavy, “Understanding practical limitations of network coding for assisted proximate communication,” IEEE Journal on Selected Areas in Communications, vol. 33, no. 2, pp. 156–170, 2015. View at Publisher · View at Google Scholar · View at Scopus