Skip to main content
Top
Published in: Wireless Networks 5/2019

07-05-2019

A game theoretical distributed approach for opportunistic caching strategy

Authors: Qilie Liu, Yanyu Wang, Liqiang Zhuge, Bin Cao, Hongmei Xue

Published in: Wireless Networks | Issue 5/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Wireless network virtualization (WNV) has been a hot topic recently, which can provide the customized service to construct virtual networks for various requirements quickly and flexibly by resource sharing. However, most of the traffic is generated by duplicate downloads for a few popular contents. Meanwhile, due to the isolation in the existing WNV, these popular contents cannot be shared among various requests, and thus the congestion and overhead would be caused in the remote data center. Therefore, in order to decline the congestion and overhead from the remote data center, the caching problem is addressed in this paper, which aims to overhear and cache content opportunistically to provide the quicker response for the future requests by in-network nodes. To well understand the impact of content caching, we formulate this issue as a Markov chain, and analyze the content response ratio according to the steady-state mathematically. Furthermore, we define the content caching strategy decision as an optimization problem, and use potential game to decide caching strategy based on Nash Equilibrium in a distributed manner, denoted as Game based Opportunistic Caching Strategy (GOCS). The experimental results show the effectiveness of GOCS in terms of average response hops, average cache hit ratio, data center load reduction ratio, and average resource consumption.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Literature
2.
go back to reference Richart, M., Baliosian, J., Serrat, J., & Gorricho, J. (2016). Resource slicing in virtual wireless networks: A survey. IEEE Transactions on Network and Service Management, 13(3), 462–476.CrossRef Richart, M., Baliosian, J., Serrat, J., & Gorricho, J. (2016). Resource slicing in virtual wireless networks: A survey. IEEE Transactions on Network and Service Management, 13(3), 462–476.CrossRef
3.
go back to reference Van de Belt, J., Ahmadi, H., & Doyle, L. E. (2017). Defining and surveying wireless link virtualization and wireless network virtualization. IEEE Communications Surveys & Tutorials, 19(3), 1603–1627.CrossRef Van de Belt, J., Ahmadi, H., & Doyle, L. E. (2017). Defining and surveying wireless link virtualization and wireless network virtualization. IEEE Communications Surveys & Tutorials, 19(3), 1603–1627.CrossRef
4.
go back to reference Wang, X., Chen, Q., & Qiu, H. (2017). A effective two-step strategy of multi-domain virtual network embedding in 5G network slicing. In 3rd IEEE international conference on computer and communications (ICCC) (pp. 1174–1179). Wang, X., Chen, Q., & Qiu, H. (2017). A effective two-step strategy of multi-domain virtual network embedding in 5G network slicing. In 3rd IEEE international conference on computer and communications (ICCC) (pp. 1174–1179).
5.
go back to reference Hou, W., Ning, Z., Guo, L., Chen, Z., & Obaidat, M. S. (2018). Novel framework of risk-aware virtual network embedding in optical data center networks. IEEE Systems Journal, 12(3), 2473–2482.CrossRef Hou, W., Ning, Z., Guo, L., Chen, Z., & Obaidat, M. S. (2018). Novel framework of risk-aware virtual network embedding in optical data center networks. IEEE Systems Journal, 12(3), 2473–2482.CrossRef
6.
go back to reference Chowdhury, M., Rahman, M. R., & Boutaba, R. (2012). ViNEYard: Virtual network embedding algorithms with coordinated node and link mapping. IEEE/ACM Transactions on Networking, 20(1), 206–219.CrossRef Chowdhury, M., Rahman, M. R., & Boutaba, R. (2012). ViNEYard: Virtual network embedding algorithms with coordinated node and link mapping. IEEE/ACM Transactions on Networking, 20(1), 206–219.CrossRef
7.
go back to reference Mijumbi, R., Serrat, J., Gorricho, J., & Boutaba, R. (2015). A path generation approach to embedding of virtual networks. IEEE Transactions on Network and Service Management, 12(3), 334–348.CrossRef Mijumbi, R., Serrat, J., Gorricho, J., & Boutaba, R. (2015). A path generation approach to embedding of virtual networks. IEEE Transactions on Network and Service Management, 12(3), 334–348.CrossRef
8.
go back to reference Cao, H., Guo, Y., Qu, Z., Wu, S., Zhu, H., & Yang, L. (2018). ER-VNE: A joint energy and revenue embedding algorithm for embedding virtual networks. IEEE Access, 6, 47815–47827.CrossRef Cao, H., Guo, Y., Qu, Z., Wu, S., Zhu, H., & Yang, L. (2018). ER-VNE: A joint energy and revenue embedding algorithm for embedding virtual networks. IEEE Access, 6, 47815–47827.CrossRef
9.
go back to reference Zhang, Z., Su, S., Zhang, J., Shuang, K., & Xu, P. (2015). Energy aware virtual network embedding with dynamic demands. In IEEE international conference on communications (ICC) (pp. 5386–5391). Zhang, Z., Su, S., Zhang, J., Shuang, K., & Xu, P. (2015). Energy aware virtual network embedding with dynamic demands. In IEEE international conference on communications (ICC) (pp. 5386–5391).
10.
go back to reference Wang, K., Yu, F. R., Li, H., & Li, Z. (2017). Information-centric wireless networks with virtualization and D2D communications. IEEE Wireless Communications, 24(3), 104–111.CrossRef Wang, K., Yu, F. R., Li, H., & Li, Z. (2017). Information-centric wireless networks with virtualization and D2D communications. IEEE Wireless Communications, 24(3), 104–111.CrossRef
11.
go back to reference Osman, Niemah Izzeldin. (2017). Will video caching remain energy efficient in future core optical networks? Digital Communications and Networks, 3, 39–46.CrossRef Osman, Niemah Izzeldin. (2017). Will video caching remain energy efficient in future core optical networks? Digital Communications and Networks, 3, 39–46.CrossRef
12.
go back to reference Wang, X., Chen, M., Taleb, T., Ksentini, A., & Leung, V. C. M. (2014). Cache in the air: Exploiting content caching and delivery techniques for 5G systems. IEEE Communications Magazine, 52(2), 131–139.CrossRef Wang, X., Chen, M., Taleb, T., Ksentini, A., & Leung, V. C. M. (2014). Cache in the air: Exploiting content caching and delivery techniques for 5G systems. IEEE Communications Magazine, 52(2), 131–139.CrossRef
13.
go back to reference Zhang, M., Luo, H., & Zhang, H. (2015). A survey of caching mechanisms in information-centric networking. IEEE Communications Surveys & Tutorials, 17(3), 1473–1499.CrossRef Zhang, M., Luo, H., & Zhang, H. (2015). A survey of caching mechanisms in information-centric networking. IEEE Communications Surveys & Tutorials, 17(3), 1473–1499.CrossRef
14.
go back to reference Jacobson, V., Smetters, D. K., James, F. P., Michael, B., Nicholas, B., & Rebecca, B. (2009). Networking named content. In 5th ACM international conference on emerging networking experiments and technologies (CoNEXT) (pp. 1–12). Jacobson, V., Smetters, D. K., James, F. P., Michael, B., Nicholas, B., & Rebecca, B. (2009). Networking named content. In 5th ACM international conference on emerging networking experiments and technologies (CoNEXT) (pp. 1–12).
15.
go back to reference Arianfar, S., Nikander, P., & Ott, J. (2010). On content-centric router design and implications. In 6th ACM international conference on emerging networking experiments and technologies (CoNEXT). Arianfar, S., Nikander, P., & Ott, J. (2010). On content-centric router design and implications. In 6th ACM international conference on emerging networking experiments and technologies (CoNEXT).
16.
go back to reference Wu, H., Li, J., & Zhi, J. (2015). MBP: A max-benefit probability-based caching strategy in information-centric networking. In 2015 IEEE international conference on communications (ICC) (pp. 5646–5651). Wu, H., Li, J., & Zhi, J. (2015). MBP: A max-benefit probability-based caching strategy in information-centric networking. In 2015 IEEE international conference on communications (ICC) (pp. 5646–5651).
17.
go back to reference Zhang, R., Liu, J., Huang, T., & Xie, R. (2017). Popularity based probabilistic caching strategy design for named data networking. In IEEE conference on computer communications workshops (INFOCOM WKSHPS) (pp. 476–481). Zhang, R., Liu, J., Huang, T., & Xie, R. (2017). Popularity based probabilistic caching strategy design for named data networking. In IEEE conference on computer communications workshops (INFOCOM WKSHPS) (pp. 476–481).
18.
go back to reference Ndikumana, A., Ullah, S., LeAnh, T., Tran, N. H., & Hong, C. S. (2017). Collaborative cache allocation and computation offloading in mobile edge computing. In 19th Asia-Pacific network operations and management symposium (APNOMS) (pp. 366-369). Ndikumana, A., Ullah, S., LeAnh, T., Tran, N. H., & Hong, C. S. (2017). Collaborative cache allocation and computation offloading in mobile edge computing. In 19th Asia-Pacific network operations and management symposium (APNOMS) (pp. 366-369).
19.
go back to reference Zhang, S., He, P., Suto, K., Yang, P., Zhao, L., & Shen, X. (2018). Cooperative edge caching in user-centric clustered mobile networks. IEEE Transactions on Mobile Computing, 17(8), 1791–1805.CrossRef Zhang, S., He, P., Suto, K., Yang, P., Zhao, L., & Shen, X. (2018). Cooperative edge caching in user-centric clustered mobile networks. IEEE Transactions on Mobile Computing, 17(8), 1791–1805.CrossRef
20.
go back to reference Hu, Z., Zheng, Z., Wang, T., Song, L., & Li, X. (2016). Game theoretic approaches for wireless proactive caching. IEEE Communications Magazine, 54(8), 37–43.CrossRef Hu, Z., Zheng, Z., Wang, T., Song, L., & Li, X. (2016). Game theoretic approaches for wireless proactive caching. IEEE Communications Magazine, 54(8), 37–43.CrossRef
21.
go back to reference Xie, J., Xie, R., Huang, T., Liu, J., Yu, F. R., & Liu, Y. (2016). Caching resource sharing in radio access networks: A game theoretic approach. Frontiers of Information Technology & Electronic Engineering, 17(12), 1253–1265.CrossRef Xie, J., Xie, R., Huang, T., Liu, J., Yu, F. R., & Liu, Y. (2016). Caching resource sharing in radio access networks: A game theoretic approach. Frontiers of Information Technology & Electronic Engineering, 17(12), 1253–1265.CrossRef
22.
go back to reference Cui, Y., Wang, Z., Yang, Y., Yang, F., Ding, L., & Qian, L. (2018). Joint and competitive caching designs in large-scale multi-tier wireless multicasting networks. IEEE Transactions on Communications, 66(7), 3108–3121.CrossRef Cui, Y., Wang, Z., Yang, Y., Yang, F., Ding, L., & Qian, L. (2018). Joint and competitive caching designs in large-scale multi-tier wireless multicasting networks. IEEE Transactions on Communications, 66(7), 3108–3121.CrossRef
23.
go back to reference Yang, F., Wang, Z., Chen, J., & Liu, Y. (2010). VLB-VNE: A regionalized valiant load-balancing algorithm in virtual network mapping. In IEEE international conference on wireless communications, networking and information security (pp. 432–436). Yang, F., Wang, Z., Chen, J., & Liu, Y. (2010). VLB-VNE: A regionalized valiant load-balancing algorithm in virtual network mapping. In IEEE international conference on wireless communications, networking and information security (pp. 432–436).
24.
go back to reference Gong, L., Wen, Y., Zhu, Z., & Lee, T. (2014). Toward profit-seeking virtual network embedding algorithm via global resource capacity. In IEEE INFOCOM 2014-IEEE conference on computer communications (pp. 1–9). Gong, L., Wen, Y., Zhu, Z., & Lee, T. (2014). Toward profit-seeking virtual network embedding algorithm via global resource capacity. In IEEE INFOCOM 2014-IEEE conference on computer communications (pp. 1–9).
25.
go back to reference Li, Z., Zheng, X., Zhang Y., & Xue, Q. (2017). Multi-objective virtual network embedding algorithm based on global resource capacity. In IEEE international conference on computational science and engineering and IEEE international conference on embedded and ubiquitous computing (CSE & EUC) (pp. 647–650). Li, Z., Zheng, X., Zhang Y., & Xue, Q. (2017). Multi-objective virtual network embedding algorithm based on global resource capacity. In IEEE international conference on computational science and engineering and IEEE international conference on embedded and ubiquitous computing (CSE & EUC) (pp. 647–650).
26.
go back to reference Feng, M., Liao, J., Wang, J., Qing, S., & Qi, Q. (2014). Topology-aware virtual network embedding based on multiple characteristics. In IEEE international conference on communications (ICC) (pp. 2956–2962). Feng, M., Liao, J., Wang, J., Qing, S., & Qi, Q. (2014). Topology-aware virtual network embedding based on multiple characteristics. In IEEE international conference on communications (ICC) (pp. 2956–2962).
27.
go back to reference Baumgartner, A., Reddy, V. S., & Bauschert, T. (2015). Mobile core network virtualization: A model for combined virtual core network function placement and topology optimization. In 1st IEEE conference on network softwarization (NetSoft) (pp. 1–9). Baumgartner, A., Reddy, V. S., & Bauschert, T. (2015). Mobile core network virtualization: A model for combined virtual core network function placement and topology optimization. In 1st IEEE conference on network softwarization (NetSoft) (pp. 1–9).
28.
go back to reference Breslau, L., Cao, P., Fan, L., Phillips, G., & Shenker, S. (1999). Web caching and Zipf-like distributions: Evidence and implications. In Eighteenth annual joint conference of the IEEE computer and communications societies. The future is now (Cat. No. 99CH36320) (pp. 126–134). Breslau, L., Cao, P., Fan, L., Phillips, G., & Shenker, S. (1999). Web caching and Zipf-like distributions: Evidence and implications. In Eighteenth annual joint conference of the IEEE computer and communications societies. The future is now (Cat. No. 99CH36320) (pp. 126–134).
30.
go back to reference MacKenzie, A. B., & DaSilva, L. A. (2006). Game theory for wireless engineers. Morgan & Claypool. MacKenzie, A. B., & DaSilva, L. A. (2006). Game theory for wireless engineers. Morgan & Claypool.
Metadata
Title
A game theoretical distributed approach for opportunistic caching strategy
Authors
Qilie Liu
Yanyu Wang
Liqiang Zhuge
Bin Cao
Hongmei Xue
Publication date
07-05-2019
Publisher
Springer US
Published in
Wireless Networks / Issue 5/2019
Print ISSN: 1022-0038
Electronic ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-019-01996-7

Other articles of this Issue 5/2019

Wireless Networks 5/2019 Go to the issue