|
|
|
xiv | |
| Preface |
|
xix | |
|
|
|
1 | (4) |
|
|
|
|
|
|
|
|
|
|
|
1 | (1) |
|
|
|
2 | (1) |
|
|
|
3 | (2) |
|
Part I Optimal Cache Placement and Delivery |
|
|
5 | (120) |
|
2 Coded Caching for Heterogeneous Wireless Networks |
|
|
7 | (30) |
|
|
|
|
|
|
|
|
|
|
|
7 | (1) |
|
2.2 Overview of Coded Caching |
|
|
8 | (6) |
|
|
|
9 | (1) |
|
2.2.2 A Small Illustrative Example |
|
|
10 | (1) |
|
|
|
11 | (2) |
|
2.2.4 Approximate Optimality |
|
|
13 | (1) |
|
2.3 Non-uniform Content Popularity |
|
|
14 | (7) |
|
2.3.1 The Single-User Setup |
|
|
16 | (3) |
|
|
|
19 | (2) |
|
2.4 Multiple Cache Access |
|
|
21 | (9) |
|
2.4.1 Overview of Adaptive User-to-Cache Matching |
|
|
22 | (1) |
|
|
|
22 | (1) |
|
2.4.3 Balancing Two Extremes |
|
|
23 | (1) |
|
2.4.4 The Pure Coded Delivery (PCD) Scheme |
|
|
24 | (1) |
|
2.4.5 The Pure Adaptive Matching (PAM) Scheme |
|
|
25 | (1) |
|
2.4.6 The Hybrid Coding and Matching (HCM) Scheme |
|
|
26 | (2) |
|
2.4.7 Simultaneous Cache Multi-access |
|
|
28 | (2) |
|
2.5 Wireless Interference Networks: A Separation Architecture |
|
|
30 | (5) |
|
2.5.1 Caching in Interference Networks |
|
|
30 | (1) |
|
2.5.2 The Separation Architecture |
|
|
31 | (3) |
|
2.5.3 Other Network Topologies |
|
|
34 | (1) |
|
|
|
35 | (2) |
|
3 Wireless Device-to-Device Caching Networks |
|
|
37 | (29) |
|
|
|
|
|
37 | (1) |
|
3.2 General Network Model |
|
|
38 | (2) |
|
3.3 Uncoded D2D Caching Networks Based on the Protocol Channel Model |
|
|
40 | (9) |
|
3.3.1 Throughput-Outage Trade-off in Single-Hop D2D Caching Networks |
|
|
40 | (3) |
|
3.3.2 Uncoded Multi-hop D2D Caching |
|
|
43 | (6) |
|
3.4 Coded D2D Caching under the Protocol Model |
|
|
49 | (2) |
|
|
|
50 | (1) |
|
3.5 Physical Layer Caching in D2D Networks |
|
|
51 | (8) |
|
3.5.1 D2D Caching with the Optimal Rule of Treating Interference by Noise |
|
|
52 | (1) |
|
3.5.2 D2D Caching Networks with Poisson Point Processes |
|
|
53 | (2) |
|
3.5.3 D2D Caching Networks with Cooperations |
|
|
55 | (4) |
|
|
|
59 | (4) |
|
3.6.1 Mobility-Aware D2D Caching Based on Contact and Intercontact Time |
|
|
59 | (2) |
|
3.6.2 Mobility-Aware Centralized D2D Caching Based on Random Walks |
|
|
61 | (2) |
|
|
|
63 | (3) |
|
4 Cooperative Caching in Cloud-Assisted 5G Wireless Networks |
|
|
66 | (23) |
|
|
|
|
|
|
|
4.1 Cloud-Assisted Wireless Networks |
|
|
66 | (2) |
|
4.1.1 Cloud Radio Access Network (C-RAN) |
|
|
67 | (1) |
|
4.1.2 Mobile-Edge Computing (MEC) |
|
|
67 | (1) |
|
4.1.3 Co-deployment of C-RAN and MEC |
|
|
68 | (1) |
|
4.2 State of the Art in Cooperative Caching |
|
|
68 | (1) |
|
4.3 Cooperative Hierarchical Caching in C-RANs |
|
|
69 | (9) |
|
|
|
70 | (2) |
|
4.3.2 Cache Management Algorithms |
|
|
72 | (4) |
|
4.3.3 Performance Evaluation |
|
|
76 | (2) |
|
4.4 Cooperative Caching and Video Transcoding in MEC Networks |
|
|
78 | (8) |
|
|
|
79 | (2) |
|
4.4.2 Joint Cooperative Caching and Processing Algorithm |
|
|
81 | (2) |
|
4.4.3 Performance Evaluation |
|
|
83 | (3) |
|
|
|
86 | (1) |
|
|
|
86 | (3) |
|
5 Stochastic Caching Schemes in Large Wireless Networks |
|
|
89 | (17) |
|
|
|
|
|
|
|
|
|
89 | (2) |
|
|
|
91 | (1) |
|
5.3 Performance Metrics and Analysis |
|
|
92 | (4) |
|
5.3.1 Cache-Hit Probability |
|
|
92 | (1) |
|
5.3.2 Cache-Aided Throughput |
|
|
93 | (2) |
|
5.3.3 Average Content Delivery Delay |
|
|
95 | (1) |
|
5.4 Optimization of Probabilistic Caching Placement |
|
|
96 | (3) |
|
5.4.1 Cache-Hit Maximization |
|
|
96 | (2) |
|
5.4.2 Cache-Aided Throughput Maximization |
|
|
98 | (1) |
|
|
|
98 | (1) |
|
5.5 Numerical and Simulation Results |
|
|
99 | (4) |
|
|
|
103 | (1) |
|
|
|
104 | (2) |
|
6 Joint Policies for Caching, Routing, and Channel Selection in Next-Generation Wireless Edge Systems |
|
|
106 | (19) |
|
|
|
|
|
107 | (1) |
|
6.2 Related Work and Our Advances |
|
|
107 | (2) |
|
|
|
109 | (3) |
|
6.3.1 Network Setting Characterization |
|
|
109 | (1) |
|
|
|
110 | (1) |
|
6.3.3 Transmission and Interference Ranges and Capacity of a Link |
|
|
110 | (1) |
|
6.3.4 Capturing Interference via a Conflict Graph and Its Independent Sets |
|
|
111 | (1) |
|
6.4 Formulation of Joint Caching, Routing, and Channel Selection Policy Problem |
|
|
112 | (1) |
|
6.5 Column Generation for Efficient Approximation Solution |
|
|
113 | (4) |
|
6.5.1 Formulation of Regulated Master Subproblem |
|
|
113 | (1) |
|
6.5.2 Formulation of Slave Pricing Subproblem |
|
|
114 | (1) |
|
6.5.3 An Algorithm for an Approximation Solution with e Guarantees |
|
|
115 | (2) |
|
6.6 Experimental Evaluation |
|
|
117 | (3) |
|
|
|
117 | (1) |
|
|
|
117 | (1) |
|
6.6.3 Experimental Results and Discussion |
|
|
117 | (3) |
|
6.7 Benefits for Video Quality of Streaming Application |
|
|
120 | (1) |
|
|
|
121 | (1) |
|
|
|
121 | (4) |
|
Part II Proactive Caching |
|
|
125 | (90) |
|
7 Learning Popularity for Proactive Caching in Cellular Networks |
|
|
127 | (19) |
|
|
|
|
|
|
|
|
|
127 | (3) |
|
7.1.1 Background and Motivation |
|
|
128 | (1) |
|
7.1.2 Approach and Main Outcomes |
|
|
128 | (1) |
|
7.1.3 Optimal Caching Policy |
|
|
129 | (1) |
|
7.2 Learning and Predicting Popularity of Unpublished Videos |
|
|
130 | (6) |
|
7.2.1 Feature Extraction with Deep Neural Networks |
|
|
130 | (1) |
|
|
|
130 | (1) |
|
7.2.3 Probability Estimation in Multi-class Classification |
|
|
131 | (1) |
|
7.2.4 Performance Evaluation |
|
|
132 | (4) |
|
7.3 Published Set Popularity Updating |
|
|
136 | (5) |
|
7.3.1 Cumulative Loss Expectation |
|
|
139 | (1) |
|
7.3.2 Two-Expert Scenario |
|
|
139 | (2) |
|
|
|
141 | (1) |
|
7.5 Appendix: Proof of Theorem 7.1 |
|
|
142 | (2) |
|
|
|
144 | (2) |
|
8 Wireless Edge Caching for Mobile Social Networks |
|
|
146 | (27) |
|
|
|
|
|
|
|
|
|
|
|
|
|
146 | (3) |
|
8.2 Edge Caching for Mobile Social Networks: Challenges and Solutions |
|
|
149 | (10) |
|
8.2.1 Hierarchical Social-Network Content Caching |
|
|
149 | (2) |
|
8.2.2 Social-Aware Content Caching Placement and Delivery |
|
|
151 | (3) |
|
8.2.3 Proactive and Cooperative Social-Network Caching |
|
|
154 | (2) |
|
8.2.4 Delay Tolerance Social-Network Caching Policies |
|
|
156 | (1) |
|
8.2.5 Privacy and Security for Edge Caching in Mobile Social Networks |
|
|
157 | (2) |
|
8.3 Dynamic Edge Caching Approach for Mobile Social Networks |
|
|
159 | (9) |
|
|
|
160 | (1) |
|
8.3.2 Dynamic Demand Prediction |
|
|
161 | (3) |
|
8.3.3 Optimal Caching Strategy |
|
|
164 | (1) |
|
8.3.4 Business Model of MSN Service Provider |
|
|
165 | (1) |
|
8.3.5 Performance Evaluation |
|
|
166 | (2) |
|
8.4 Conclusions and Open Issues |
|
|
168 | (1) |
|
|
|
169 | (4) |
|
9 A Proactive and Big Data-Enabled Caching Analysis Perspective |
|
|
173 | (20) |
|
|
|
|
|
|
|
|
|
|
|
173 | (2) |
|
9.2 Big Data Analytics for Telcos: Requirements, Challenges, and Benefits |
|
|
175 | (1) |
|
9.2.1 Big Data Networking Challenges and Trends |
|
|
175 | (1) |
|
9.2.2 When Big Data Analytics Meets Caching |
|
|
176 | (1) |
|
|
|
176 | (5) |
|
|
|
181 | (5) |
|
9.4.1 Platform Description |
|
|
182 | (1) |
|
9.4.2 Data Extraction Procedures |
|
|
183 | (2) |
|
9.4.3 Traffic Characteristics |
|
|
185 | (1) |
|
9.5 Numerical Results and Discussions |
|
|
186 | (3) |
|
|
|
189 | (1) |
|
|
|
190 | (3) |
|
10 Mobility-Aware Caching in Cellular Networks |
|
|
193 | (22) |
|
|
|
|
|
|
|
10.1 Optimal Caching in Static Networks |
|
|
193 | (1) |
|
10.2 Mobility in Cellular Networks |
|
|
194 | (1) |
|
10.3 Overview of System Model |
|
|
195 | (3) |
|
|
|
196 | (1) |
|
10.3.2 Cell Selection Policy |
|
|
197 | (1) |
|
10.4 Optimal Caching in Cellular Networks |
|
|
198 | (8) |
|
|
|
198 | (6) |
|
|
|
204 | (2) |
|
10.5 Results and Discussion |
|
|
206 | (4) |
|
10.5.1 Mobility in Ultra-dense Networks |
|
|
206 | (1) |
|
10.5.2 Effect of the Number of Attempts |
|
|
207 | (1) |
|
10.5.3 Comparison of PI and V2 |
|
|
208 | (1) |
|
10.5.4 Comparison of the Mobile and Static Cases as a Function of n for VI |
|
|
209 | (1) |
|
10.5.5 Effect of Library Size (K) on the Hit Probability |
|
|
209 | (1) |
|
|
|
210 | (1) |
|
|
|
211 | (4) |
|
Part III Cache-Aided Interference and Physical Layer Management |
|
|
215 | (86) |
|
11 Cache-Enabled Cloud Radio Access Networks |
|
|
217 | (19) |
|
|
|
|
|
|
|
|
|
|
|
217 | (2) |
|
11.2 Cache-Enabled Cloud RAN Model |
|
|
219 | (4) |
|
|
|
219 | (1) |
|
11.2.2 Content-Centric BS Clustering |
|
|
219 | (2) |
|
|
|
221 | (1) |
|
|
|
221 | (2) |
|
11.3 Caching at BSs for Cooperation in Access Link |
|
|
223 | (4) |
|
11.3.1 Joint BS Clustering and Beam-Forming Design |
|
|
223 | (2) |
|
11.3.2 Performance Evaluation |
|
|
225 | (2) |
|
11.4 Caching at BSs for Multicasting in Backhaul Link |
|
|
227 | (6) |
|
11.4.1 Joint BS Cache Allocation and Beam-Forming Design |
|
|
227 | (2) |
|
11.4.2 Performance Evaluation |
|
|
229 | (4) |
|
11.5 Conclusions and Open Issues |
|
|
233 | (1) |
|
|
|
234 | (2) |
|
12 Fundamentals of Coded Caching for Interference Management |
|
|
236 | (21) |
|
|
|
|
|
|
|
|
|
|
|
236 | (1) |
|
12.2 Preliminaries of Interference Networks and Interference Management |
|
|
237 | (4) |
|
12.2.1 Interference Channel |
|
|
237 | (1) |
|
|
|
238 | (1) |
|
12.2.3 Cooperative X-Multicast Channel |
|
|
239 | (2) |
|
12.3 System Model and Performance Metric |
|
|
241 | (3) |
|
|
|
242 | (1) |
|
12.3.2 Two-Phase Operation Model |
|
|
242 | (1) |
|
12.3.3 Performance Metric |
|
|
243 | (1) |
|
12.4 NDT Analysis in Wireless Interference Networks |
|
|
244 | (7) |
|
12.4.1 Parametric Caching Scheme |
|
|
244 | (1) |
|
12.4.2 Content Delivery Strategy |
|
|
245 | (1) |
|
|
|
246 | (4) |
|
12.4.4 MIMO Interference Network |
|
|
250 | (1) |
|
12.5 Partially Connected Interference Network |
|
|
251 | (4) |
|
|
|
251 | (2) |
|
|
|
253 | (1) |
|
|
|
254 | (1) |
|
12.5.4 Application to Circular Network |
|
|
254 | (1) |
|
12.6 Conclusion and Open Issues |
|
|
255 | (1) |
|
|
|
255 | (2) |
|
13 Full-Duplex Radios for Edge Caching |
|
|
257 | (22) |
|
|
|
|
|
|
|
258 | (4) |
|
13.1.1 Full-Duplex Communications |
|
|
260 | (2) |
|
|
|
262 | (4) |
|
|
|
262 | (1) |
|
13.2.2 Cache-Aided Network Nodes |
|
|
262 | (2) |
|
|
|
264 | (1) |
|
13.2.4 Signal-to-Interference Ratio |
|
|
265 | (1) |
|
|
|
266 | (1) |
|
13.4 Performance Analysis |
|
|
267 | (4) |
|
13.5 Numerical Results and Discussion |
|
|
271 | (3) |
|
|
|
274 | (1) |
|
|
|
275 | (4) |
|
14 Caching in Mobile Millimeter Wave: Sub-6 GHz Networks |
|
|
279 | (22) |
|
|
|
|
|
|
|
14.1 Background, Related Works, and Summary of Contributions |
|
|
279 | (2) |
|
|
|
279 | (1) |
|
14.1.2 Summary of Contributions |
|
|
280 | (1) |
|
|
|
281 | (3) |
|
|
|
281 | (1) |
|
14.2.2 Antenna Gain Pattern |
|
|
282 | (1) |
|
|
|
283 | (1) |
|
14.2.4 Handover Process and Relevant Parameters |
|
|
284 | (1) |
|
14.3 Caching-Enabled Mobility Management |
|
|
284 | (3) |
|
14.3.1 Probability of Caching via mmW Links |
|
|
285 | (1) |
|
14.3.2 Statistics of the Caching Duration |
|
|
285 | (2) |
|
14.4 Performance Analysis of the Proposed Cache-Enabled Mobility Management Scheme |
|
|
287 | (1) |
|
14.4.1 Average Caching Data Rate |
|
|
287 | (1) |
|
14.4.2 Analysis of Performance Gains from the Proposed Caching-Based Mobility Management |
|
|
287 | (1) |
|
14.5 Proposed Cache-Enabled Mobility Management Based on Dynamic Matching |
|
|
288 | (6) |
|
14.5.1 Mobility Management as a Matching Game |
|
|
290 | (2) |
|
14.5.2 Mobility Management Based on Dynamic Matching |
|
|
292 | (1) |
|
14.5.3 Proposed Algorithm for Dynamically Stable Mobility Management |
|
|
292 | (2) |
|
|
|
294 | (4) |
|
14.6.1 Performance Analysis for Single-User Scenarios |
|
|
294 | (1) |
|
14.6.2 Performance Analysis of the Developed Algorithm |
|
|
295 | (3) |
|
|
|
298 | (1) |
|
|
|
298 | (3) |
|
Part IV Energy-Efficiency, Security, Economic, and Deployment |
|
|
301 | (107) |
|
15 Energy-Efficient Deployment in Wireless Edge Caching |
|
|
303 | (19) |
|
|
|
|
|
|
|
|
|
303 | (2) |
|
15.2 Signal Transmission and Caching Model |
|
|
305 | (3) |
|
|
|
305 | (2) |
|
15.2.2 Transmission Model |
|
|
307 | (1) |
|
15.3 Energy-Efficiency Analysis |
|
|
308 | (2) |
|
15.3.1 EE Analysis for Uncoded Caching Strategy |
|
|
308 | (1) |
|
15.3.2 EE Analysis for Coded Caching Strategy |
|
|
309 | (1) |
|
15.3.3 Comparison between the Two Strategies |
|
|
309 | (1) |
|
15.4 Energy-Efficiency Maximization in Edge Caching Wireless Networks |
|
|
310 | (2) |
|
15.4.1 EE Maximization for Uncoded Caching Strategy |
|
|
310 | (1) |
|
15.4.2 EE Maximization for Coded Caching Strategy |
|
|
311 | (1) |
|
15.5 Minimization of Content Delivery Time |
|
|
312 | (3) |
|
15.5.1 Minimization of Delivery Time for Uncoded Caching Strategy |
|
|
312 | (2) |
|
15.5.2 Minimization of Delivery Time for Coded Caching Strategy |
|
|
314 | (1) |
|
15.6 Non-uniform File Popularity Distribution |
|
|
315 | (1) |
|
|
|
316 | (3) |
|
15.7.1 Energy Efficiency Performance |
|
|
316 | (2) |
|
15.7.2 Delivery Time Performance |
|
|
318 | (1) |
|
|
|
319 | (1) |
|
|
|
320 | (2) |
|
16 Cache-Enabled UAVs in Wireless Networks |
|
|
322 | (22) |
|
|
|
|
|
|
|
|
|
322 | (1) |
|
16.2 Cache-Enabled UAVs for Users' QoE Maximization |
|
|
323 | (17) |
|
|
|
324 | (1) |
|
|
|
325 | (5) |
|
16.2.3 Conceptor Echo State Networks for Content Request Distribution and Mobility Pattern Predictions |
|
|
330 | (3) |
|
16.2.4 Optimal Content Caching and Locations for UAVs |
|
|
333 | (4) |
|
16.2.5 Simulation Results |
|
|
337 | (3) |
|
|
|
340 | (1) |
|
|
|
341 | (3) |
|
17 Physical Layer Security for Edge Caching Wireless Networks |
|
|
344 | (24) |
|
|
|
|
|
|
|
|
|
|
|
344 | (2) |
|
|
|
344 | (2) |
|
|
|
346 | (4) |
|
|
|
346 | (2) |
|
17.2.2 Caching and Backhaul Loading |
|
|
348 | (1) |
|
17.2.3 Secure Cooperative MIMO Transmission |
|
|
349 | (1) |
|
|
|
350 | (3) |
|
17.3.1 Achievable Secrecy Rate |
|
|
350 | (1) |
|
17.3.2 Second-Stage Online Delivery Optimization |
|
|
351 | (1) |
|
17.3.3 First-Stage Offline Cache Training |
|
|
352 | (1) |
|
|
|
353 | (4) |
|
17.4.1 Optimal Solution of Problem R0 in Large Cache Capacity Regime |
|
|
353 | (2) |
|
17.4.2 Suboptimal Solution of Problem R0 |
|
|
355 | (2) |
|
17.4.3 Solution of Problem Q0 |
|
|
357 | (1) |
|
|
|
357 | (4) |
|
17.5.1 Performance Comparisons with Baseline Schemes |
|
|
358 | (2) |
|
17.5.2 Impact of Number of Antennas |
|
|
360 | (1) |
|
17.6 Research Challenges and Opportunities |
|
|
361 | (2) |
|
17.6.1 Trustworthiness of Cache-Enabled Devices |
|
|
361 | (1) |
|
17.6.2 Imperfect, Statistical, and no CSI Knowledge about the Eavesdropper |
|
|
362 | (1) |
|
17.6.3 Active Eavesdropper |
|
|
362 | (1) |
|
17.6.4 Other Forms of Cache-Enabled PLS Techniques |
|
|
362 | (1) |
|
|
|
363 | (1) |
|
|
|
363 | (1) |
|
17.8.1 Proof of Theorem 17.2 |
|
|
363 | (1) |
|
|
|
364 | (4) |
|
18 Mobile VR Edge Delivery: Computing, Caching, and Communication Trade-Offs |
|
|
368 | (19) |
|
|
|
|
|
368 | (3) |
|
|
|
371 | (1) |
|
|
|
371 | (5) |
|
|
|
371 | (2) |
|
18.3.2 The 360° Streaming Model |
|
|
373 | (1) |
|
18.3.3 VR Computing and Data Complexity |
|
|
374 | (1) |
|
18.3.4 Cellular Network Model |
|
|
375 | (1) |
|
|
|
375 | (1) |
|
|
|
376 | (1) |
|
18.5 Polynomial-Time Approximation |
|
|
377 | (2) |
|
18.6 Experiment Evaluation |
|
|
379 | (3) |
|
|
|
382 | (1) |
|
|
|
383 | (4) |
|
19 Economic Ecosystems in Elastic Wireless Edge Caching |
|
|
387 | (21) |
|
|
|
|
|
|
|
|
|
387 | (3) |
|
|
|
390 | (1) |
|
19.3 Wireless Edge Caching versus In-Network Caching |
|
|
391 | (1) |
|
19.4 Elastic Wireless Cache Lease, Content Caching, and Routing |
|
|
392 | (12) |
|
|
|
392 | (1) |
|
19.4.2 Motivating Example of Elastic Cache Lease |
|
|
393 | (1) |
|
|
|
394 | (2) |
|
19.4.4 Problem Formulation |
|
|
396 | (1) |
|
19.4.5 Lyapunov-Based Elastic CDN Strategy |
|
|
397 | (7) |
|
19.5 Open Research Issues |
|
|
404 | (1) |
|
|
|
405 | (1) |
|
|
|
405 | (3) |
| Index |
|
408 | |