[go: up one dir, main page]

Skip to main content

Advertisement

Log in

On the Analysis of Content Dissemination with Reactive Content Pushing in Cache-Enabled D2D Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Device-to-device (D2D) communication has huge potential to offload ever increasing cellular traffic. As a premise, devices should store as many popular contents as possible. For augmenting the number of cached contents, in this paper, we propose a reactive content pushing (RCP) mechanism in cache-enabled D2D networks, in which some devices overhear the transmitted contents utilizing the broadcast nature of wireless medium. Since no proactive content pushing is involved, it doesn’t generate interference to the D2D links for normal content requests and its implementation is quite simple. By modeling the D2D network by Poisson point process (PPP), we derive the probabilities that users are in the defined states and the law of evolution of content caching distribution. Moreover, based on the PPP model, we derive the expressions of the successful offloading probability, the average delay and the upper bound of average energy consumption of a request. Simulation results demonstrate the accuracy of the theoretical results and the superiority of the RCP mechanism compared with general content dissemination process.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Notes

  1. \({\bar{\text{X}}}\) (\({\text{X}}\) represents \({\text{C}}\), \({\text{T}}\), \({\text{P}}\) or \({\text{S}}\)) signifies the complementary event of \({\text{X}}\).

References

  1. Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2016–2021. (2017). Cisco. Retrieved from http://www.cisco.com. Accessed 20 July 2017.

  2. Dehos, C., Gonzalez, J. L., De Domenico, A., Ktenas, D., & Dussopt, L. (2014). Millimeter-wave access and backhauling: The solution to the exponential data traffic increase in 5G mobile communications systems? IEEE Communications Magazine, 52(9), 88–95.

    Article  Google Scholar 

  3. Li, R., Chen, Y., Li, G. Y., & Liu, G. (2017). Full-duplex cellular networks. IEEE Communications Magazine, 55(4), 184–191.

    Article  Google Scholar 

  4. Ge, X., Tu, S., Mao, G., Wang, C.-X., & Han, T. (2016). 5G ultra-dense cellular networks. IEEE Wireless Communications, 23(1), 72–79.

    Article  Google Scholar 

  5. Luan, Z., Qu, H., Zhao, J., Chen, B., & Principe, J. C. (2016). Correntropy induced joint power and admission control algorithm for dense small cell network. IET Communications, 10(16), 2154–2161.

    Article  Google Scholar 

  6. Shanmugam, K., Golrezaei, N., Dimakis, A. G., Molisch, A. F., & Caire, G. (2013). FemtoCaching: Wireless content delivery through distributed caching helpers. IEEE Transactions on Information Theory, 59(12), 8402–8413.

    Article  MathSciNet  MATH  Google Scholar 

  7. Jin, H., Xu, D., Zhao, C., & Liang, D. (2017). Information-centric mobile caching network frameworks and caching optimization: A survey. EURASIP Journal on Wireless Communications and Networking, 2017, 1–32. https://doi.org/10.1186/s13638-017-0806-6.

    Article  Google Scholar 

  8. Bastug, E., Bennis, M., & Debbah, M. (2014). Living on the edge: The role of proactive caching in 5G wireless networks. IEEE Communications Magazine, 52(8), 82–89.

    Article  Google Scholar 

  9. Liu, D., Chen, B., Yang, C., & Molisch, A. F. (2016). Caching at the wireless edge: Design aspects, challenges, and future directions. IEEE Communications Magazine, 54(9), 22–28.

    Article  Google Scholar 

  10. Li, J., Chen, Y., Lin, Z., Chen, W., Vucetic, B., & Hanzo, L. (2015). Distributed caching for data dissemination in the downlink of heterogeneous networks. IEEE Transactions on Communications, 63(10), 3553–3568.

    Article  Google Scholar 

  11. Poularakis, K., Iosifidis, G., & Tassiulas, L. (2014). Approximation algorithms for mobile data caching in small cell networks. IEEE Transactions on Communications, 62(10), 3665–3677.

    Article  Google Scholar 

  12. Ren, G., Qu, H., Zhao, J., Zhao, S., & Luan, Z. (2017). A distributed user association and resource allocation method in cache-enabled small cell networks. China Communications, 14(10), 95–107.

    Article  Google Scholar 

  13. Blaszczyszyn, B., & Giovanidis, A. (2015). Optimal geographic caching in cellular networks. In 2015 IEEE international conference on communications (ICC) (pp. 3358–3363). London: IEEE.

  14. Ji, M., Caire, G., & Molisch, A. F. (2016). Wireless device-to-device caching networks: Basic principles and system performance. IEEE Journal on Selected Areas in Communications, 34(1), 176–189.

    Article  Google Scholar 

  15. Chen, B., Yang, C., & Xiong, Z. (2017). Optimal caching and scheduling for cache-enabled D2D communications. IEEE Communications Letters, 21(5), 1155–1158.

    Article  Google Scholar 

  16. Malak, D., Al-Shalash, M., & Andrews, J. G. (2016). Optimizing content caching to maximize the density of successful receptions in device-to-device networking. IEEE Transactions on Communications, 64(10), 4365–4380.

    Google Scholar 

  17. Pan, Y., Pan, C., Zhu, H., Ahmed, Q. Z., Chen, M., & Wang, J. (2017). On consideration of content preference and sharing willingness in D2D assisted offloading. IEEE Journal on Selected Areas in Communications, 35(4), 978–993.

    Google Scholar 

  18. Chen, Z., Pappas, N., & Kountouris, M. (2017). Probabilistic caching in wireless D2D networks: Cache hit optimal versus throughput optimal. IEEE Communications Letters, 21(3), 584–587.

    Article  Google Scholar 

  19. Elayoubi, S. E., Masucci, A. M., Roberts, J., & Sayrac, B. (2017). Optimal D2D content delivery for cellular network offloading. Mobile Networks and Applications. https://doi.org/10.1007/s11036-017-0821-1.

    Google Scholar 

  20. Yang, C., Yao, Y., Chen, Z., & Xia, B. (2016). Analysis on cache-enabled wireless heterogeneous networks. IEEE Transactions on Wireless Communications, 15(1), 131–145.

    Article  Google Scholar 

  21. Rao, J., Feng, H., Yang, C., Chen, Z., & Xia, B. (2016). Optimal caching placement for D2D assisted wireless caching networks. In 2016 IEEE international conference on communications (ICC) (pp. 1–6). Kuala Lumpur: IEEE.

  22. Jiang, W., Feng, G., & Qin, S. (2017). Optimal cooperative content caching and delivery policy for heterogeneous cellular networks. IEEE Transactions on Mobile Computing, 16(5), 1382–1393.

    Article  Google Scholar 

  23. Wang, Y., Tao, X., Zhang, X., & Gu, Y. (2017). Cooperative caching placement in cache-enabled D2D underlaid cellular network. IEEE Communications Letters, 21(5), 1151–1154.

    Article  Google Scholar 

  24. Wang, X., Chen, M., Kwon, T. T., Jin, L., & Leung, V. C. M. (2014). Mobile traffic offloading by exploiting social network services and leveraging opportunistic device-to-device sharing. IEEE Wireless Communications, 21(3), 28–36.

    Article  Google Scholar 

  25. Breslau, L., Pei, C., Li, F., Phillips, G., & Shenker, S. (1999). Web caching and Zipf-like distributions: Evidence and implications. In 1999 IEEE conference on computer communications (INFOCOM) (pp. 126–134). New York: IEEE.

  26. Zhou, B., Cui, Y., & Tao, M. (2016). Stochastic content-centric multicast scheduling for cache-enabled heterogeneous cellular networks. IEEE Transactions on Wireless Communications, 15(9), 6284–6297.

    Article  Google Scholar 

  27. Lee, S., & Huang, K. (2012). Coverage and economy of cellular networks with many base stations. IEEE Communications Letters, 16(7), 1038–1040.

    Article  Google Scholar 

  28. Boyd, S., & Vandenberghe, L. (2004). Convex optimization. Cambridge: Cambridge University Press.

    Book  MATH  Google Scholar 

  29. Andrews, J. G., Baccelli, F., & Ganti, R. K. (2011). A tractable approach to coverage and rate in cellular networks. IEEE Transactions on Communications, 59(11), 3122–3134.

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by National Natural Science Foundation of China under Grant Nos. 61372092 and 61531013.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gongye Ren.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendices

Appendices

1.1 Proof of Proposition 2

According to the file request protocol and the definition of successful D2D transmission, we have

$$p_{\text{r,d}} = \sum\limits_{f = 1}^{F} {q_{f} \left( {1 - p_{f} } \right)p_{{{\text{r,d}},f}} } = \sum\limits_{f = 1}^{F} {q_{f} \left( {1 - p_{f} } \right)\int_{0}^{{R_{\text{d}} }} {\varvec{\mathbb{P}}\left[ {R_{f} \ge R_{0} |r} \right]f_{{r_{f} }} \left( r \right)dr} } ,$$
(10)

where \(R_{f}\) and \(r_{f}\) are the instantaneous data rate and the distance from the nearest transmitter with \(f\) to the reference receiver. The PDF of \(r_{f}\) is given by \(f_{{r_{f} }} \left( r \right) = 2\pi \lambda_{{{\text{t}},f}} re^{{ - \pi \lambda_{{{\text{t}},f}} r^{2} }}\) (\(r \ge 0\)) [29]. Considering an interference-limited network and neglecting background noise, \(R_{f}\) is given by

$$R_{f} = B\log_{2} \left( {1 + \frac{{hr^{ - \alpha } }}{{I_{{\bar{f},r}} + I_{f,r} }}} \right),$$
(11)

where \(h\) is a random variable that follows the exponential distribution with mean 1 for Rayleigh fading, and \(\alpha\) is path loss exponent. \(I_{{\bar{f},r}}\) is the total interference from all the BTs that don’t transmit \(f\) and \(I_{f,r}\) is the total interference from all the other BTs that transmit \(f\). They are all normalized by \(P_{\text{d}}\) and only consider path loss and Rayleigh fading in our model.

Similar to the proof of Theorem 2 in [29], we have

$$\begin{aligned} \varvec{\mathbb{P}}\left[ {R_{f} \ge R_{0} |r} \right] & = \mathcal{\mathcal{L}}_{{I_{{\bar{f},r}} + I_{f,r} }} \left( {\gamma_{0} r^{\alpha } } \right) \\ & = \exp \left( { - \pi \lambda_{{{\text{t,b}},\bar{f}}} r^{2} \gamma_{0}^{{{2 \mathord{\left/ {\vphantom {2 \alpha }} \right. \kern-0pt} \alpha }}} \int_{0}^{\infty } {\frac{1}{{1 + u^{{{\alpha \mathord{\left/ {\vphantom {\alpha 2}} \right. \kern-0pt} 2}}} }}du} - \pi \lambda_{{{\text{t,b}},f}} r^{2} \gamma_{0}^{{{2 \mathord{\left/ {\vphantom {2 \alpha }} \right. \kern-0pt} \alpha }}} \int_{{\gamma_{0}^{{ - {2 \mathord{\left/ {\vphantom {2 \alpha }} \right. \kern-0pt} \alpha }}} }}^{\infty } {\frac{1}{{1 + u^{{{\alpha \mathord{\left/ {\vphantom {\alpha 2}} \right. \kern-0pt} 2}}} }}du} } \right) \\ & = \exp \left( { - \pi \lambda_{{{\text{t,b}},\bar{f}}} r^{2} \delta \left( {\gamma_{0} ,\alpha } \right) - \pi \lambda_{{{\text{t,b}},f}} r^{2} \beta \left( {\gamma_{0} ,\alpha } \right)} \right), \\ \end{aligned}$$
(12)

where \(\mathcal{\mathcal{L}}_{{I_{{\bar{f},r}} + I_{f,r} }} \left( \cdot \right)\) denotes the Laplace transform of random variable \(I_{{\bar{f},r}} + I_{f,r}\). Plugging (12) into (10), we have

$$\begin{aligned} p_{\text{r,d}} & = \sum\limits_{f = 1}^{F} {q_{f} \left( {1 - p_{f} } \right)p_{{{\text{r,d}},f}} } \\ & = \sum\limits_{f = 1}^{F} {q_{f} \left( {1 - p_{f} } \right)\int_{0}^{{R_{\text{d}} }} {2\pi \lambda_{{{\text{t}},f}} r\exp \left( { - \pi \lambda_{{{\text{t,b}},\bar{f}}} r^{2} \delta \left( {\gamma_{0} ,\alpha } \right) - \pi \lambda_{{{\text{t,b}},f}} r^{2} \beta \left( {\gamma_{0} ,\alpha } \right) - \pi \lambda_{{{\text{t}},f}} r^{2} } \right)dr} } \\ & = \sum\limits_{f = 1}^{F} {q_{f} \left( {1 - p_{f} } \right)\int_{0}^{{R_{\text{d}} }} {2\pi \lambda_{{{\text{t}},f}} r\exp \left( { - \pi r^{2} A_{f} \left( {\gamma_{0} ,\alpha } \right)} \right)dr} } \\ & = \sum\limits_{f = 1}^{F} {q_{f} \left( {1 - p_{f} } \right)\frac{{\lambda_{{{\text{t}},f}} \left( {1 - e^{{ - \pi R_{\text{d}}^{2} A_{f} \left( {\gamma_{0} ,\alpha } \right)}} } \right)}}{{A_{f} \left( {\gamma_{0} ,\alpha } \right)}}} . \\ \end{aligned}$$
(13)

The proof is completed.□

1.2 Proof of Proposition 3

Equation (5) is derived based on the law of total probability, and we proof it by presenting the probabilities of the following three cases and the content caching probability in each case. These cases correspond to the three roles of users: BTs, ITs and receivers.

Case 1

The probability of a user being a BT at the \(t\)-th time period is \(\left( {1 - \rho } \right)p_{\text{t,b}}^{t}\). For a BT, its cached files remain unchanged, i.e., the content caching probability for content \(f\) at the \(\left( {t + 1} \right)\)-th time period is also \(p_{f}^{t}\).

Case 2

The probability of a user being an IT at the \(t\)-th time period is \(\left( {1 - \rho } \right)\left( {1 - p_{\text{t,b}}^{t} } \right)\). The cached files of an IT at the \(\left( {t + 1} \right)\)-th time period depend on whether certain uncached file is received successfully. In order to derive \(p_{f}^{t + 1}\) for a reference IT concisely, we derive the probabilities of the following events at the \(t\)-th time period at first:

  1. 1.

    Event\({\text{C}}\) The reference IT caches \(f\);

  2. 2.

    Event\({\text{T}}\) The nearest BT of the reference IT transmits \(f\);

  3. 3.

    Event\({\text{P}}\) The content \(f\) is chosen to push from the nearest BT to the reference IT (on the condition that \({\bar{\text{C}}}\) and \({\text{T}}\) occur simultaneouslyFootnote 1);

  4. 4.

    Event\({\text{S}}\) The instantaneous data rate from the nearest BT to the reference IT is larger than or equal to \(R_{0}\) and the distance between them is shorter than \(R_{\text{d}}\).

\(\varvec{\mathbb{P}}\left[ {\text{C}} \right] = p_{f}^{t}\) is evident. The probability that a transmitter transmits \(f\) is \(p_{f}^{t} u_{f}^{t}\) and the probability that a transmitter is busy is \(p_{\text{t,b}}^{t}\). Thus, the probability that a BT transmits \(f\) is \(\varvec{\mathbb{P}}\left[ {\text{T}} \right] = {{p_{f}^{t} u_{f}^{t} } \mathord{\left/ {\vphantom {{p_{f}^{t} u_{f}^{t} } {p_{\text{t,b}}^{t} }}} \right. \kern-0pt} {p_{\text{t,b}}^{t} }}\). Let \(\mathcal{\mathcal{F}}_{\text{i,b}}^{t}\) be a set containing all the contents \(f \in \mathcal{\mathcal{F}}\) that satisfy the following two conditions: 1) The reference IT doesn’t cache \(f\); 2) The nearest BT of the reference IT transmits \(f\). Then we have \({\mathbb{E}}\left[ {\left| {\mathcal{\mathcal{F}}_{\text{i,b}}^{t} } \right|} \right] = \sum\nolimits_{f = 1}^{F} {\frac{{p_{f}^{t} u_{f}^{t} }}{{p_{\text{t,b}}^{t} }}\left( {1 - p_{f}^{t} } \right)}\). Each content in \(\mathcal{\mathcal{F}}_{\text{i,b}}^{t}\) is chosen to push with equal probability \(\varvec{\mathbb{P}}\left[ {\text{P}} \right] = \frac{1}{{{\mathbb{E}}\left[ {\left| {\mathcal{\mathcal{F}}_{\text{i,b}}^{t} } \right|} \right]}} = \frac{{p_{\text{t,b}}^{t} }}{{\sum\nolimits_{f = 1}^{F} {p_{f}^{t} u_{f}^{t} \left( {1 - p_{f}^{t} } \right)} }}\) according to the RCP mechanism. We denote \(\varvec{\mathbb{P}}\left[ {\text{S}} \right]\) by \(p_{\text{t,r}}^{t}\). With slight modification to the proof of Theorem 2 in [29], we can easily obtain

$$p_{\text{t,r}}^{t} = \int_{0}^{{R_{\text{d}} }} {\varvec{\mathbb{P}}\left[ {R_{\text{p}}^{t} \ge R_{0} |r} \right]f_{{r^{t} }} \left( r \right)dr} = \frac{{1 - e^{{ - \pi \lambda_{\text{t,b}}^{t} R_{\text{d}}^{2} \left( {\beta \left( {\gamma_{0} ,\alpha } \right) + 1} \right)}} }}{{\beta \left( {\gamma_{0} ,\alpha } \right) + 1}},$$
(14)

where \(R_{\text{p}}^{t}\) is the instantaneous pushing data rate, and \(f_{{r^{t} }} \left( r \right)\) is the PDF of the distance from the nearest BT to the reference IT.

In order to obtain \(p_{f}^{t + 1}\) for a given content \(f\), we list all events for an IT at the \(t\)-th time period in Table 2. The probabilities in the second column are derived based on the fact that the event \({\text{C}}\), \({\text{T}}\) and \({\text{S}}\) are mutually independent events.

Table 2 All events for an IT with respect to content \(f\) at the \(t\)-th time period

For an IT, according to the law of total probability, the probability that it stores \(f\) at the \(\left( {t + 1} \right)\)-th time period is

$$p_{f}^{t + 1} = p_{f}^{t} + \left( {1 - p_{f}^{t} } \right)p_{\text{t,r}}^{t} \frac{{p_{f}^{t} u_{f}^{t} }}{{p_{\text{t,b}}^{t} }}\frac{{p_{\text{t,b}}^{t} }}{{\sum\nolimits_{k = 1}^{F} {p_{k}^{t} u_{k}^{t} \left( {1 - p_{k}^{t} } \right)} }} = p_{f}^{t} + p_{\text{t,r}}^{t} v_{f}^{t} .$$
(15)

Case 3

The probability of a user being a receiver is \(\rho\). For a receiver, if it caches \(f\) at the \(t\)-th time period, it also caches \(f\) at the \(\left( {t + 1} \right)\)-th time period. If the receiver doesn’t cache \(f\) but requests \(f\), it certainly stores \(f\) at the next time period according to the file request protocol. Otherwise, the receiver will not store \(f\) at the next time period. Thus, the probability that a receiver caches \(f\) at the \(\left( {t + 1} \right)\)-th time period is \(p_{f}^{t} + \left( {1 - p_{f}^{t} } \right)q_{f}\).

Applying the law of total probability again based on the above derivation, (5) is obtained.

1.3 Proof of Proposition 4

According to the file request protocol and the assumptions in Sect. 5.2, the content request delay comes from three cases: (1) Receiving files via D2D transmission successfully; (2) failing in receiving files via D2D transmission and then accessing to BSs; (3) finding no transmitter with the requested files within \(R_{\text{d}}\) and then connecting to BSs. In a word, delay is evaluated for the receivers that 1) request \(f\) and 2) don’t cache \(f\) (\(f\) represents any file). We refer to these receivers as \(f\)-outward receivers, and the probability that a receiver is an \(f\)-outward receiver is \(q_{f} \left( {1 - p_{f} } \right)\). We present the probability and the value of delay for an \(f\)-outward receiver in each case as follows.

Case 1

The probability that an \(f\)-outward receiver receives \(f\) via D2D transmission successfully is \(p_{{{\text{r,d}},f}}\) according to (13). For a BT, the average number of different files it transmits is \(N_{\text{t,b}} \triangleq \frac{1}{{p_{\text{t,b}} }}\sum\limits_{f = 1}^{F} {p_{f} u_{f} }\). The average proportion of time in a frame allocated to one file is \({1 \mathord{\left/ {\vphantom {1 {N_{\text{t,b}} }}} \right. \kern-0pt} {N_{\text{t,b}} }}\). Thus, the average delay for an \(f\)-outward receiver in Case 1 is \({\mathbb{E}}\left[ {{{N_{\text{t,b}} S} \mathord{\left/ {\vphantom {{N_{\text{t,b}} S} {\hat{R}_{f} }}} \right. \kern-0pt} {\hat{R}_{f} }}} \right]\), in which \(\hat{R}_{f}\) is the instantaneous data rate of an \(f\)-outward receiver receiving \(f\) via D2D transmission successfully and the expectation is taken with respect to \(\hat{R}_{f}\). Nevertheless, the accurate derivation involves evaluating the expectation of the reciprocal of \(\hat{R}_{f}\), which entails lengthy intractable integral expression. To keep tractability, we approximate \({\mathbb{E}}\left[ {{{N_{\text{t,b}} S} \mathord{\left/ {\vphantom {{N_{\text{t,b}} S} {\hat{R}_{f} }}} \right. \kern-0pt} {\hat{R}_{f} }}} \right]\) by \({{N_{\text{t,b}} S} \mathord{\left/ {\vphantom {{N_{\text{t,b}} S} {{\mathbb{E}}\left[ {\hat{R}_{f} } \right]}}} \right. \kern-0pt} {{\mathbb{E}}\left[ {\hat{R}_{f} } \right]}}\). Denoting \({\mathbb{E}}\left[ {\hat{R}_{f} } \right]\) by \(\bar{R}_{f}\), the average delay for an \(f\)-outward receiver in Case 1 is approximated by \({{N_{\text{t,b}} S} \mathord{\left/ {\vphantom {{N_{\text{t,b}} S} {\bar{R}_{f} }}} \right. \kern-0pt} {\bar{R}_{f} }}\).

According to the definition of \(\bar{R}_{f}\), we have

$$\begin{aligned} \bar{R}_{f} = {\mathbb{E}}\left[ {\hat{R}_{f} } \right] & = {\mathbb{E}}\left[ {R_{f} |R_{f} \ge R_{0} ,r_{f} \le R_{\text{d}} } \right] \\ & = \int_{ - \infty }^{\infty } {{\mathbb{E}}\left[ {R_{f} |R_{f} \ge R_{0} ,r} \right]f_{{r_{f} }} \left( {r|r_{f} \le R_{\text{d}} } \right)dr} , \\ \end{aligned}$$
(16)

where the expectation in the second line is taken over both the PPP and the fading distribution, and \(f_{{r_{f} }} \left( {r|r_{f} \le R_{\text{d}} } \right)\) is the conditional PDF of \(r_{f}\). Given \(f_{{r_{f} }} \left( r \right) = 2\pi \lambda_{{{\text{t}},f}} re^{{ - \pi \lambda_{{{\text{t}},f}} r^{2} }}\) (\(r \ge 0\)), \(f_{{r_{f} }} \left( {r|r_{f} \le R_{\text{d}} } \right)\) is simply given by

$$f_{{r_{f} }} \left( {r|r_{f} \le R_{\text{d}} } \right) = \left\{ {\begin{array}{*{20}l} {\frac{{2\pi \lambda_{{{\text{t}},f}} re^{{ - \pi \lambda_{{{\text{t}},f}} r^{2} }} }}{{p_{{{\text{in}},f}} }},} \hfill & {0 \le r \le R_{\text{d}} ,} \hfill \\ {0,} \hfill & {r > R_{\text{d}} .} \hfill \\ \end{array} } \right.$$
(17)

According to the definition of the conditional expectation, we have

$${\mathbb{E}}\left[ {R_{f} |R_{f} \ge R_{0} ,r} \right] = R_{0} + \frac{1}{{\varvec{\mathbb{P}}\left[ {R_{f} > R_{0} |r} \right]}}\int_{{R_{0} }}^{\infty } {\varvec{\mathbb{P}}\left[ {R_{f} > x|r} \right]dx} .$$
(18)

Plugging (17) and (18) into (16), we have

$$\begin{aligned} \bar{R}_{f} & = {\mathbb{E}}\left[ {R_{f} |R_{f} \ge R_{0} ,r_{f} \le R_{\text{d}} } \right] \\ & = \frac{1}{{p_{{{\text{in}},f}} }}\int_{0}^{{R_{\text{d}} }} {2\pi \lambda_{{{\text{t}},f}} re^{{ - \pi \lambda_{{{\text{t}},f}} r^{2} }} \left( {R_{0} + \frac{1}{{\varvec{\mathbb{P}}\left[ {R_{f} > R_{0} |r} \right]}}\int_{{R_{0} }}^{\infty } {\varvec{\mathbb{P}}\left[ {R_{f} > x|r} \right]dx} } \right)dr} \\ & = R_{0} + \frac{{\lambda_{{{\text{t}},f}} }}{{p_{{{\text{in}},f}} }}\int_{{R_{0} }}^{\infty } {\int_{0}^{{R_{\text{d}} }} {2\pi re^{{ - \pi r^{2} B_{f} \left( {x,\gamma_{0} ,\alpha } \right)}} dr} dx} \\ & = R_{0} + \frac{{\lambda_{{{\text{t}},f}} }}{{p_{{{\text{in}},f}} }}\int_{{R_{0} }}^{\infty } {\frac{{1 - e^{{ - \pi R_{\text{d}}^{2} B_{f} \left( {x,\gamma_{0} ,\alpha } \right)}} }}{{B_{f} \left( {x,\gamma_{0} ,\alpha } \right)}}dx} . \\ \end{aligned}$$
(19)

Case 2

The probability that an \(f\)-outward receiver finds at least one transmitter with \(f\) within \(R_{\text{d}}\) (termed event “Hit”) is \(p_{{{\text{in}},f}} \triangleq 1 - e^{{ - \pi \lambda_{{{\text{t}},f}} R_{\text{d}}^{2} }}\) [18]. Under the condition that event “Hit” occurs, successful D2D transmission and failed D2D transmission are complementary events. Thus, the probability that an \(f\)-outward receiver fails to receive \(f\) via D2D transmission is \(p_{{{\text{in}},f}} - p_{{{\text{r,d}},f}}\). In this case, additional delay \(D_{0}\) is entailed to detect failed D2D transmission. The delay of cellular transmission is simply \({S \mathord{\left/ {\vphantom {S {R_{0} }}} \right. \kern-0pt} {R_{0} }}\), and the total delay for an \(f\)-outward receiver in Case 2 is \({S \mathord{\left/ {\vphantom {S {R_{0} }}} \right. \kern-0pt} {R_{0} }} + D_{0}\).

Case 3

Based on the previous analysis, the probability that an \(f\)-outward receiver finds no transmitter caching \(f\) within \(R_{\text{d}}\) is \(p_{{{\text{out}},f}}\). In this case, the request for \(f\) has to be handled by BSs and the delay is \({S \mathord{\left/ {\vphantom {S {R_{0} }}} \right. \kern-0pt} {R_{0} }}\).

Given the above results, the approximated average delay for an \(f\)-outward receiver is \(p_{{{\text{r,d}},f}} \frac{{N_{\text{t,b}} S}}{{\bar{R}_{f} }} + \left( {p_{{{\text{in}},f}} - p_{{{\text{r,d}},f}} } \right)\left( {\frac{S}{{R_{0} }} + D_{0} } \right) + p_{{{\text{out}},f}} \frac{S}{{R_{0} }}\). Averaging over all the files in \(\mathcal{\mathcal{F}}\), the average delay for a receiver is approximated by (7).

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ren, G., Qu, H., Zhao, J. et al. On the Analysis of Content Dissemination with Reactive Content Pushing in Cache-Enabled D2D Networks. Wireless Pers Commun 106, 401–422 (2019). https://doi.org/10.1007/s11277-019-06169-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-019-06169-5

Keywords

Navigation