CN108737507B - D2D wireless caching method - Google Patents
D2D wireless caching method Download PDFInfo
- Publication number
- CN108737507B CN108737507B CN201810394414.5A CN201810394414A CN108737507B CN 108737507 B CN108737507 B CN 108737507B CN 201810394414 A CN201810394414 A CN 201810394414A CN 108737507 B CN108737507 B CN 108737507B
- Authority
- CN
- China
- Prior art keywords
- file
- probability
- cache
- user
- users
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 22
- 238000009826 distribution Methods 0.000 claims abstract description 34
- 238000005516 engineering process Methods 0.000 claims abstract description 10
- 238000004891 communication Methods 0.000 claims description 26
- 238000005457 optimization Methods 0.000 claims description 14
- 230000005540 biological transmission Effects 0.000 claims description 4
- NAWXUBYGYWOOIX-SFHVURJKSA-N (2s)-2-[[4-[2-(2,4-diaminoquinazolin-6-yl)ethyl]benzoyl]amino]-4-methylidenepentanedioic acid Chemical group C1=CC2=NC(N)=NC(N)=C2C=C1CCC1=CC=C(C(=O)N[C@@H](CC(=C)C(O)=O)C(O)=O)C=C1 NAWXUBYGYWOOIX-SFHVURJKSA-N 0.000 claims description 3
- 230000010267 cellular communication Effects 0.000 claims description 3
- 102100029469 WD repeat and HMG-box DNA-binding protein 1 Human genes 0.000 claims 1
- 101710097421 WD repeat and HMG-box DNA-binding protein 1 Proteins 0.000 claims 1
- 238000003860 storage Methods 0.000 description 7
- 238000004088 simulation Methods 0.000 description 4
- 230000001186 cumulative effect Effects 0.000 description 2
- 238000005315 distribution function Methods 0.000 description 2
- 238000001228 spectrum Methods 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 239000000872 buffer Substances 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000013341 scale-up Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/568—Storing data temporarily at an intermediate stage, e.g. caching
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/10—Complex mathematical operations
- G06F17/11—Complex mathematical operations for solving equations, e.g. nonlinear equations, general mathematical optimization problems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/70—Services for machine-to-machine communication [M2M] or machine type communication [MTC]
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Data Mining & Analysis (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computational Mathematics (AREA)
- Databases & Information Systems (AREA)
- Algebra (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Operations Research (AREA)
- Memory System Of A Hierarchy Structure (AREA)
- Mobile Radio Communication Systems (AREA)
- Information Transfer Between Computers (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention discloses a D2D wireless caching method, which obtains the popularity distribution of files through the request of a user for the current popular files. And designing a wireless caching scheme according to the popularity distribution of the files. According to the scheme, on the premise of reducing the operation complexity, the cache hit probability of the D2D wireless cache is effectively improved at the cost of less performance loss. Compared with the traditional wireless cache technology, the method can effectively reduce the redundancy of the cache, improve the cache hit probability, and has wider application scenes.
Description
Technical Field
The invention belongs to the technical field of D2D communication, and particularly relates to a D2D wireless caching method.
Background
In recent years, due to the rapid popularization of intelligent terminals, the number of users accessing the mobile internet by using wireless communication is increasing, and the service demand of the users is also increasing. In the peak time of the communication service, the base station needs to serve a large number of terminal users, so that the problems of delay, terminals and the like are easy to occur, and the user experience is reduced. The existing scheme aims to improve the system capacity by increasing available spectrum resources and improving the spectrum utilization efficiency, solves the existing problems and does not pay attention to the characteristics of data traffic.
As mentioned in cisco for future global mobile data traffic prediction, by 2021 mobile video traffic will account for 78% of the total mobile traffic. A large amount of communication resources are used for video traffic transmission. Video files themselves have one important characteristic: content reusability, i.e., a few hot videos may be viewed many times by a large number of users over a period of time. In addition, the popularity of the hot spot files changes relatively slowly within a certain time limit. In addition, with the advancement of storage technologies, the storage capacity of hard disks has been rapidly increasing. Now, the capacity of the ordinary mechanical hard disk reaches the TB order of magnitude, and the price is only a few hundred yuan. The storage capacity of the hard disk is larger and larger, the read-write performance is better and better, and the cost performance is higher and higher. This provides a good opportunity for the development of video caching technology.
In addition, the D2D communication technology has been proposed to make the D2D terminal caching technology attract attention. The D2D terminal caching technology means that the base station caches popular files in advance in the memory of the user terminal. When a user requests file transmission, the user can firstly search the file in the memory of the user. If the requested file is cached in the memory in advance, the user can directly use the file; if the file is not cached in local storage, but is cached in terminal storage in the surrounding vicinity, the user requests the end user storing the file to transfer the file via D2D communication technology; if the file is not stored in both the local storage and the terminal storage in the vicinity of the user, the user issues a file transfer request to the base station or the server.
The existing D2D wireless caching strategy mainly has the problems of high implementation complexity, low cache hit rate, excessive redundancy of file caches, limitation to specific scenes and the like. Meanwhile, the possibility that the opposite side is unwilling to provide service when the terminal requests the opposite side to transmit the file is not considered.
Disclosure of Invention
The invention aims to provide a D2D wireless caching method to solve the problems.
In order to achieve the purpose, the invention adopts the following technical scheme:
a D2D wireless caching method comprises the following steps:
step 1: acquiring a content popularity distribution expression:
suppose that a user requests a file from a repository M of M fileslib(ii) a Each user independently requests files from the file library according to Zipf distribution; the higher the probability that the top ranked file is requested;wherein the probability that a file ranked at position i is requested is
Wherein γ represents the prevalence constant of the Zipf distribution;
step 2: obtaining an optimization model
Each user can freely select a cellular communication mode and a D2D communication mode for communication, and when the users communicate in the D2D communication mode, the maximum communication radius of the users is RD2D(ii) a K adjacent users exist in the range of the maximum D2D communication radius, and K obeys the Poisson point process with the density of lambda; the user is centered on himself with radius RD2DHas a probability of k users in the range of
Suppose that each user can cache MdFiles, without loss of generality, assume that each file is 1 in size; at RD2DThe D2D communication technology is used for file transmission among users in the range, and files cached by the users are called virtual caches; user intention RD2DThe probability that other users in the range share the self cache file is rho; the probability that a user can obtain a file from the virtual cache is called cache hit probability and is marked as Pi Hit;
With qiRepresenting the probability that the user caches the file ranked at the ith bit, then
The probability that a user requests a file ranked at the ith bit and acquires the file is expressed as
Substituting the formulas (1) and (2) into the formula (4) to obtain
The positions of all users are randomly distributed, so that the cache hit probability of all users is the same on average; the probability that the user finds the requested file in the virtual cache is
By determining the caching probability q of the filei=[q1,q2,...,qM]Maximizing the average cache hit rate; the optimization model is therefore represented as:
and step 3: proposing an optimization algorithm
File library MlibThe file in (1) is divided into two parts: partial files with high popularity and partial files with relatively low popularity. Under a cache strategy of Zipf distribution, files with high popularity are cached redundantly, so that the cache probability of the part is reduced in proportion; the less popular file cache hit probability is low, so we scale up this partial cache probability.
Namely, it is
In the formula:
α indicates a high popularity multiplier of file caching probability
β denotes a low popularity multiplier of file caching probability
M' — the last file with high popularity corresponds to the rank
substituting formula (8) into formula (7)
At this point, the original optimization model is transformed into
And 4, step 4: solve for the optimal value
By observing the formula (9), the following results can be found
Obtaining an optimal solution by a formula (9);
is represented by the formula (10)
Substituting (11) into equation (9) yields the equivalence problem:
firstly, keeping M 'unchanged, obtaining α the optimum value when M' is, and then obtaining the optimum value of M 'by traversing M' from 1 to M.
Further, the specific steps of obtaining the optimal M' value in step 4 are as follows:
order to
Then, through traversing M 'from 1 to M, the optimal α value α' is obtained;
at the same time, the optimum β value β' is obtained from equation (11).
Further, in step 1, when γ is larger, the request of the user is more concentrated on the hot spot file with the top rank.
Compared with the prior art, the invention has the following technical effects:
compared with the optimal cache strategy, the cache hit probability of the D2D communication wireless cache method provided by the invention has about 3% of performance loss, but the optimal cache strategy needs a plurality of iterative computation processes, and the method can obtain a result only by traversing the file library once, and the operation complexity of the method is lower than that of the optimal cache strategy; compared with the common equal-probability random cache strategy, the most popular file cache strategy and the Zipf distributed cache strategy, the cache hit probability of the method is higher than that of the above strategies, and the performance is better than that of the above centralized strategies. Therefore, the method has more application scenes.
Drawings
FIG. 1 is a cumulative distribution function of a Zipf distribution with prevalence constants γ of 0.6, 1, and 1.4, respectively, for the Zipf distribution;
FIG. 2 is a diagram of a D2D wireless cache network model;
fig. 3 shows the neighboring user sharing probability ρ of 0.5, MdWhen the number is 3, improving a theoretical performance curve and an actual simulation performance curve graph of a cache strategy of Zipf distribution;
fig. 4 shows that when the neighboring user sharing probability ρ is 0.5, MdWhen the number is 3, the performance graphs of the optimal caching strategy and the caching strategy for improving Zipf distribution;
fig. 5 shows that when the neighboring user sharing probability ρ is 0.5, MdWhen the number is 3, performance graphs of an equiprobable random cache strategy, a most popular file cache strategy, a cache strategy of Zipf distribution and a cache strategy of improving Zipf distribution are obtained;
Detailed Description
The invention is further described below with reference to the accompanying drawings:
referring to fig. 1-5, the present invention provides a D2D wireless caching strategy. We first studied the distribution of popularity of hot files. And in combination with the popularity of the hot spot file, the hit probability of the file cached by the D2D is modeled under the conditions that the users in the cell obey the Poisson Point process and the caching space of the user terminal is limited. A suboptimal caching algorithm with low complexity is provided. Simulation shows that the algorithm can achieve performance close to the optimal caching strategy.
Step 1: obtaining content popularity distribution expression
When researchers have studied the distribution of recent web page requests and video browsing, it has been found that these distributions can be approximated by Zipf distributions. Therefore, in the related algorithm design and simulation, we assume that the request distribution of the user follows the Zipf distribution. Suppose that a user requests a file from a repository M of M fileslib. Each user independently requests files from the file repository according to the Zipf distribution. The higher the probability that the top ranked file is requested. Wherein the probability that a file ranked at position i is requested is
Where γ represents the prevalence constant of the Zipf distribution. When γ is larger, the user's request is more focused on the top ranked hotspot video file.
Step 2: obtaining an optimization model
Let us consider that in a cell, there is one Base Station (BS) and N end users, and users are evenly distributed around the Base Station with radius RBSWithin the range of (1). Each user can communicate in cellular communication mode and D2D communication mode, and when the users communicate in D2D communication mode, the maximum communication radius of the users is RD2D. And there are K adjacent users within the range of the maximum D2D communication radius, K following the poisson point process with density λ. The user is centered on himself with radius RD2DHas a probability of k users in the range of
Suppose that each userHomoenergetic buffers MdFor each file, without loss of generality, assume that each file is 1 in size. At RD2DFiles can be transmitted between users in a range by using the D2D communication technology, and files cached by the users are called virtual caches. User intention RD2DThe probability that other users in the range share the self cache file is rho. We call the probability that a user can obtain a file from the virtual cache as the cache hit probability, denoted as Pi Hit。
We use qiRepresenting the probability that the user caches the file ranked at the ith bit, then
The probability that a user requests a file ranked at the ith bit and retrieves the file (i.e., the cache hit probability) may be expressed as
Substituting the formulas (1) and (2) into the formula (4) to obtain
The positions of all users are randomly distributed, so that the cache hit probability of each user is the same on average. The probability that a user can find a requested file in the "virtual cache" is
We want to determine the caching probability q of a filei=[q1,q2,…,qM]The average cache hit rate is maximized. The optimization problem can be expressed as:
this is a condition-limited non-linear convex optimization problem. The optimization problem has high complexity and is difficult to apply in an actual system.
And step 3: proposing an optimization algorithm
We propose a caching strategy that improves the Zipf distribution. The basic idea of this strategy is: first, a document library MlibThe file in (1) is divided into two parts: partial files with high popularity and partial files with relatively low popularity. If the cache probability of the file with high popularity can be properly reduced and the cache probability of the file with low popularity is improved, the cache hit probability better than that of a cache strategy of Zipf distribution can be realized.
Namely, it is
substituting formula (8) into formula (7)
At this point, the original optimization problem turns into
And 4, step 4: solve for the optimal value
To obtain the optimal solution of equation (9), a condition is satisfied, i.e.
This condition is a necessary condition for obtaining an optimal solution.
Is represented by the formula (10)
Substituting (11) into equation (9) yields the equivalence problem:
firstly, keeping M 'unchanged, solving α the optimal value when M', and then, solving the optimal M 'value by traversing M' between 1 and M.
The method comprises the following specific steps:
order to
And traversing M 'from 1 to M to obtain an optimal α value α'.
At the same time, the optimum β value β' is obtained from equation (11).
As can be seen from fig. 1, the popularity constant γ of the Zipf distribution is different, and the cumulative distribution function of the corresponding Zipf distribution is also different. When gamma is smaller, the popularity difference of the files with different ranks is smaller; when γ is large, the popularity difference of the files with different ranks becomes larger and larger, and the requests of the user for the files are gradually concentrated on the top several files.
As can be seen from fig. 2, within a cell, neighboring terminals may form a "virtual cache" through the D2D communication mode. The user can acquire files required by the user from the virtual cache with a certain probability.
As can be seen from fig. 3, the theoretical performance of the cache strategy for improving the Zipf distribution is consistent with the actual simulation performance.
As can be seen from fig. 4, the performance under the optimal caching strategy is better than that of the caching strategy improving the Zipf distribution, but the performance difference between the two is not very large. The performance of the cache strategy for improving the Zipf distribution is about 3% lower than that of the optimal cache strategy.
As can be seen from fig. 5, comparing the equal-probability random caching strategy, the most popular file caching strategy, and the cache strategy of the Zipf distribution, the cache strategy for improving the Zipf distribution proposed by the present solution has the best performance. Under the equal probability random cache strategy, the cache hit probability is always kept at a lower level. The most popular file caching strategy has the worst performance when the popularity constant gamma of the file is small, the performance is obviously improved when the gamma is increased, and the most popular file caching strategy performance is close to that of a Zipf distributed caching strategy when the gamma value is large. When the gamma value is smaller, the performance difference between the Zipf distributed cache strategy and the Zipf distributed improved cache strategy is not obvious, when the gamma value is larger, the performance difference between the Zipf distributed cache strategy and the Zipf distributed improved cache strategy is larger, and the final performance difference is about 5%.
Therefore, in summary, the D2D communication wireless cache method provided by the invention can effectively improve the cache hit probability of the D2D wireless cache at the cost of less performance loss on the premise of reducing the operation complexity.
While the invention has been described in further detail with reference to specific preferred embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.
Claims (3)
1. A D2D wireless caching method is characterized by comprising the following steps:
step 1: acquiring a content popularity distribution expression:
suppose that a user requests a file from a repository M of M fileslib(ii) a Each user independently requests files from the file library according to Zipf distribution; the higher the probability that the top ranked file is requested; wherein the probability that a file ranked at position i is requested is
Wherein γ represents the prevalence constant of the Zipf distribution;
step 2: obtaining an optimization model
Each user can freely select a cellular communication mode and a D2D communication mode for communication, and when the users communicate in the D2D communication mode, the maximum communication radius of the users is RD2D(ii) a K adjacent users exist in the range of the maximum D2D communication radius, and K obeys the Poisson point process with the density of lambda; the user is centered on himself with radius RD2DHas a probability of k users in the range of
Suppose that each user can cache MdA file, each file size is assumed to be 1; at RD2DThe D2D communication technology is used for file transmission among users in the range, and files cached by the users are called virtual caches; user intention RD2DThe probability that other users in the range share the self cache file is rho; the probability that a user can obtain a file from the virtual cache is called cache hit probability and is marked as Pi Hit;
With qiRepresenting the probability that the user caches the file ranked at the ith bit, then
Cache hit probability Pi HitThe probability of requesting a file ranked at the ith bit and retrieving the file for the user is expressed as
Substituting the formulas (1) and (2) into the formula (4) to obtain
The positions of all users are randomly distributed, so that the cache hit probability of all users is the same on average; the probability that the user finds the requested file in the virtual cache is
By determining the caching probability q of the filei=[q1,q2,…,qM]Maximizing the average cache hit rate; the optimization model is therefore represented as:
and step 3: proposing an optimization algorithm
File library MlibThe file in (1) is divided into two parts: partial files with high popularity and partial files with low popularity; under a cache strategy of Zipf distribution, files with high popularity are cached redundantly, so that the cache probability of the part is reduced in proportion; the file cache with low popularity has low hit probability, so the cache probability of the part is enlarged proportionally;
namely, it is
In the formula:
α indicates a high popularity multiplier of file caching probability
β denotes a low popularity multiplier of file caching probability
M' — the last file with high popularity corresponds to the rank
substituting formula (8) into formula (7)
At this point, the original optimization model is transformed into
And 4, step 4: solve for the optimal value
By observing the formula (9), the following results can be found
Obtaining an optimal solution by a formula (9);
is represented by the formula (10)
Substituting (11) into equation (9) yields the equivalence problem:
firstly, keeping M 'unchanged, obtaining α the optimum value when M' is, and then obtaining the optimum value of M 'by traversing M' from 1 to M.
2. The D2D wireless caching method according to claim 1, wherein the specific steps of finding the optimal M' value in step 4 are as follows:
order to
Then, through traversing M 'from 1 to M, the optimal α value α' is obtained;
at the same time, the optimum β value β' is obtained from equation (11).
3. The D2D wireless caching method according to claim 1, wherein in step 1, when γ is larger, the user's request is more concentrated on the top-ranked hotspot file.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810394414.5A CN108737507B (en) | 2018-04-27 | 2018-04-27 | D2D wireless caching method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810394414.5A CN108737507B (en) | 2018-04-27 | 2018-04-27 | D2D wireless caching method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108737507A CN108737507A (en) | 2018-11-02 |
CN108737507B true CN108737507B (en) | 2020-07-28 |
Family
ID=63940073
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810394414.5A Expired - Fee Related CN108737507B (en) | 2018-04-27 | 2018-04-27 | D2D wireless caching method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108737507B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109587260B (en) * | 2018-12-18 | 2022-03-04 | 维沃移动通信有限公司 | Resource acquisition method, device and system |
CN109495865B (en) * | 2018-12-27 | 2021-06-01 | 华北水利水电大学 | D2D-assisted self-adaptive cache content placement method and system |
CN110062356B (en) * | 2019-03-13 | 2022-05-06 | 重庆邮电大学 | Cache copy layout method in D2D network |
CN110896526A (en) * | 2019-12-04 | 2020-03-20 | 南方科技大学 | Cache resource scheduling method, device, server and storage medium |
CN111782612B (en) * | 2020-05-14 | 2022-07-26 | 北京航空航天大学 | File data edge caching method in cross-domain virtual data space |
CN111541778B (en) * | 2020-05-25 | 2023-09-22 | 广东电网有限责任公司 | Active pushing method for on-site operation and maintenance information of power communication network |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2249550A1 (en) * | 2009-05-04 | 2010-11-10 | Thomson Licensing | device and method for controlling dissemination of contents between peers having wireless communication capacities, depending on impatience reaction functions |
CN105791391A (en) * | 2016-01-29 | 2016-07-20 | 西安交通大学 | Method for calculating optimal cooperation distance of D2D fusion network based on file popularity |
CN106231622A (en) * | 2016-08-15 | 2016-12-14 | 北京邮电大学 | A kind of content storage method limited based on buffer memory capacity |
CN106303927A (en) * | 2016-08-31 | 2017-01-04 | 电子科技大学 | A kind of cache allocation method in the wireless buffer network of D2D |
CN106936478A (en) * | 2017-04-28 | 2017-07-07 | 北京邮电大学 | A kind of energy transmits motivational techniques and device |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101794417B1 (en) * | 2015-11-24 | 2017-11-07 | 한국과학기술원 | Method and apparatus for user centric cache allocation in infrastructure wireless mesh networks |
-
2018
- 2018-04-27 CN CN201810394414.5A patent/CN108737507B/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2249550A1 (en) * | 2009-05-04 | 2010-11-10 | Thomson Licensing | device and method for controlling dissemination of contents between peers having wireless communication capacities, depending on impatience reaction functions |
CN105791391A (en) * | 2016-01-29 | 2016-07-20 | 西安交通大学 | Method for calculating optimal cooperation distance of D2D fusion network based on file popularity |
CN106231622A (en) * | 2016-08-15 | 2016-12-14 | 北京邮电大学 | A kind of content storage method limited based on buffer memory capacity |
CN106303927A (en) * | 2016-08-31 | 2017-01-04 | 电子科技大学 | A kind of cache allocation method in the wireless buffer network of D2D |
CN106936478A (en) * | 2017-04-28 | 2017-07-07 | 北京邮电大学 | A kind of energy transmits motivational techniques and device |
Non-Patent Citations (2)
Title |
---|
D2D caching vs. small cell caching: Where to cache content in a wireless network?;Zheng Chen,Marios Kountouris;《2016 IEEE 17th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC)》;20160811;1-6 * |
面向无线缓存的D2D技术研究;黄小柠;《中国优秀硕士学位论文全文数据库 信息科技辑》;20170215;19-30 * |
Also Published As
Publication number | Publication date |
---|---|
CN108737507A (en) | 2018-11-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108737507B (en) | D2D wireless caching method | |
CN107889160B (en) | Small cell network edge part caching method considering user time delay | |
CN106851731B (en) | A kind of D2D cache allocation method maximizing unloading probability | |
CN107911711B (en) | Edge cache replacement improvement method considering partitions | |
CN112218337B (en) | Cache strategy decision method in mobile edge calculation | |
CN106998353B (en) | Optimal caching configuration method for files in content-centric networking | |
CN108093435B (en) | Cellular downlink network energy efficiency optimization system and method based on cached popular content | |
CN110290507B (en) | Caching strategy and spectrum allocation method of D2D communication auxiliary edge caching system | |
CN108600998B (en) | Cache optimization decision method for ultra-density cellular and D2D heterogeneous converged network | |
CN110996293B (en) | Network deployment and resource allocation method and system for unmanned aerial vehicle | |
CN108541025B (en) | Wireless heterogeneous network-oriented base station and D2D common caching method | |
CN108521640B (en) | Content distribution method in cellular network | |
CN108616845B (en) | D2D grouping multi-target caching method based on social content and system and device thereof | |
Zhang et al. | Clustered device-to-device caching based on file preferences | |
CN110062356B (en) | Cache copy layout method in D2D network | |
CN113473540B (en) | Mixed caching method based on base station cooperation in heterogeneous cellular network | |
CN108810139B (en) | Monte Carlo tree search-assisted wireless caching method | |
Wang et al. | Segment-based joint caching and recommendation optimization for mobile video transmission | |
CN110139125B (en) | Video sharing method based on demand perception and resource caching in wireless mobile network | |
CN111432380A (en) | D2D-oriented auxiliary data unloading cache optimization method | |
CN116366876A (en) | Method and system for deploying and scheduling film and television resources under Bian Yun collaborative scene | |
CN115361710A (en) | Content placement method in edge cache | |
CN108429919B (en) | Caching and transmission optimization method of multi-rate video in wireless network | |
Wu et al. | Video placement and delivery in edge caching networks: Analytical model and optimization scheme | |
CN113038496B (en) | D2D content caching method based on personal preference perception |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20200728 |