Optimized Caching and Spectrum Partitioning for D2D ...

17
0090-6778 (c) 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCOMM.2020.2983015, IEEE Transactions on Communications 1 Optimized Caching and Spectrum Partitioning for D2D enabled Cellular Systems with Clustered Devices Ramy Amer, Student Member, IEEE, Hesham Elsawy, Senior Member, IEEE, M. Majid Butt, Senior Member, IEEE, Eduard A. Jorswieck, Fellow IEEE, Mehdi Bennis, Senior Member, IEEE, and Nicola Marchetti, Senior Member, IEEE Abstract—Caching at mobile devices and leveraging device- to-device (D2D) communication are two promising approaches to support massive content delivery over wireless networks. The analysis of cache-enabled wireless networks is usually carried out by assuming that devices are uniformly distributed, however, in social networks, mobile devices are intrinsically grouped into disjoint clusters. In this regards, this paper proposes a spa- tiotemporal mathematical model that tracks the service requests arrivals and account for the clustered devices geometry. Two kinds of devices are assumed, particularly, content clients and content providers. Content providers are assumed to have a surplus memory which is exploited to proactively cache contents from a known library, following a random probabilistic caching scheme. Content clients can retrieve a requested content from the nearest content provider in their proximity (cluster), or, as a last resort, the base station (BS). The developed spatiotemporal model is leveraged to formulate a joint optimization problem of the content caching and spectrum partitioning in order to minimize the average service delay. Due to the high complexity of the optimization problem, the caching and spectrum partitioning problems are decoupled and solved iteratively using the block coordinate descent (BCD) optimization technique. To this end, an optimal and suboptimal solutions are obtained for the bandwidth partitioning and probabilistic caching subproblems, respectively. Numerical results highlight the superiority of the proposed scheme over conventional caching schemes under equal and optimized bandwidth allocations. Particularly, it is shown that the average service delay is reduced by nearly 100% and 350%, compared to the Zipf and uniform caching schemes under equal bandwidth allocations, respectively. Index Terms—D2D communication, spatiotemporal, proba- bilistic caching, delay analysis, queuing theory. I. I NTRODUCTION Caching at mobile devices significantly improves system performance by facilitating device-to-device (D2D) communi- Ramy Amer and Nicola Marchetti are with CONNECT Centre for Future Networks, Trinity College Dublin, Ireland. Email:{ramyr, nicola.marchetti}@tcd.ie. Hesham ElSawy is with King Fahd University of Petroleum and Minerals (KFUPM), Saudi Arabia. Email: [email protected]. M. Majid Butt is with Nokia Bell Labs, France, and CONNECT Centre for Future Networks, Trinity College Dublin, Ireland. Email: [email protected]. Eduard A. Jorswieck is with Institute for Communications Technology TU Braunschweig, Germany, Email: [email protected]. Mehdi Bennis is with the Centre for Wireless Communications, University of Oulu, Finland, and the Department of Computer Engineering, Kyung Hee University, South Korea. Email: mehdi.bennis@oulu.fi. This publication has emanated from research conducted with the financial support of Science Foundation Ireland (SFI) and is co-funded under the European Regional Development Fund under Grant Number 13/RC/2077. cations, which enhances the spectrum efficiency and alleviates the heavy burden on backhaul links [1]. Prior works in the literature commonly followed two approaches for the content placement, namely, deterministic placement and probabilistic placement. For deterministic placement, contents are cached and optimized for specific networks in a deterministic man- ner [1]–[3]. However, in practice, the wireless channels and the geographic distribution of devices are time-variant. This requires frequent updates to the optimal content placement strategy, which is a highly complicated task. To cope with this problem, probabilistic content placement considers that each device randomly caches a subset of content with a certain caching probability [4]–[6]. In this paper, we particularly focus on probabilistic content placement. Modeling cache-enabled heterogeneous networkss (Het- Nets), including base stations (BSs) and mobile devices, followed two main directions in the literature. The first line of work, popularly named as protocol model, focuses on the fundamental throughput scaling results by assuming a simple channel model [1]–[3]. In this model, two devices can communicate if they are within a certain distance. The second line of work, defined as the physical interference model, considers a more realistic model for the underlying physical layer [7]–[11]. This physical interference model is based on the fundamental signal-to-interference ratio (SIR) metric, and hence, is applicable to any wireless communication system whose performance is measured by some SIR-based utility function. In this work, we consider a realistic physical layer model where all transmissions are subject to outage due to fading and interference. Next, we review relevant literature to the D2D caching networks. A. State of the Art and Prior Works Modeling and analysis of D2D communication networks are widely adopted in the literature with the assumption that the mobile devices are uniformly distributed, especially in the wireless caching area [7] and [8]. For instance, the authors in [7] investigated the relationship between offloading probability of a cache-enabled D2D network and the energy cost of caching helpers that are uniformly distributed according to a Poisson point process (PPP). Meanwhile, the authors in [8] jointly optimized caching and scheduling to maximize the of- floading probability of a network whose users’ locations follow a PPP. For such D2D caching networks, PPP is an appealing Authorized licensed use limited to: Oulu University. Downloaded on March 25,2020 at 06:54:39 UTC from IEEE Xplore. Restrictions apply.

Transcript of Optimized Caching and Spectrum Partitioning for D2D ...

Page 1: Optimized Caching and Spectrum Partitioning for D2D ...

0090-6778 (c) 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCOMM.2020.2983015, IEEETransactions on Communications

1

Optimized Caching and Spectrum Partitioning forD2D enabled Cellular Systems with Clustered

DevicesRamy Amer, Student Member, IEEE, Hesham Elsawy, Senior Member, IEEE,

M. Majid Butt, Senior Member, IEEE, Eduard A. Jorswieck, Fellow IEEE,

Mehdi Bennis, Senior Member, IEEE, and Nicola Marchetti, Senior Member, IEEE

Abstract—Caching at mobile devices and leveraging device-to-device (D2D) communication are two promising approachesto support massive content delivery over wireless networks. Theanalysis of cache-enabled wireless networks is usually carried outby assuming that devices are uniformly distributed, however, insocial networks, mobile devices are intrinsically grouped intodisjoint clusters. In this regards, this paper proposes a spa-tiotemporal mathematical model that tracks the service requestsarrivals and account for the clustered devices geometry. Twokinds of devices are assumed, particularly, content clients andcontent providers. Content providers are assumed to have asurplus memory which is exploited to proactively cache contentsfrom a known library, following a random probabilistic cachingscheme. Content clients can retrieve a requested content fromthe nearest content provider in their proximity (cluster), or, as alast resort, the base station (BS). The developed spatiotemporalmodel is leveraged to formulate a joint optimization problemof the content caching and spectrum partitioning in order tominimize the average service delay. Due to the high complexity ofthe optimization problem, the caching and spectrum partitioningproblems are decoupled and solved iteratively using the blockcoordinate descent (BCD) optimization technique. To this end, anoptimal and suboptimal solutions are obtained for the bandwidthpartitioning and probabilistic caching subproblems, respectively.Numerical results highlight the superiority of the proposedscheme over conventional caching schemes under equal andoptimized bandwidth allocations. Particularly, it is shown thatthe average service delay is reduced by nearly 100% and 350%,compared to the Zipf and uniform caching schemes under equalbandwidth allocations, respectively.

Index Terms—D2D communication, spatiotemporal, proba-bilistic caching, delay analysis, queuing theory.

I. INTRODUCTION

Caching at mobile devices significantly improves systemperformance by facilitating device-to-device (D2D) communi-

Ramy Amer and Nicola Marchetti are with CONNECT Centrefor Future Networks, Trinity College Dublin, Ireland. Email:{ramyr,nicola.marchetti}@tcd.ie.

Hesham ElSawy is with King Fahd University of Petroleum and Minerals(KFUPM), Saudi Arabia. Email: [email protected].

M. Majid Butt is with Nokia Bell Labs, France, and CONNECT Centre forFuture Networks, Trinity College Dublin, Ireland. Email: [email protected].

Eduard A. Jorswieck is with Institute for Communications Technology TUBraunschweig, Germany, Email: [email protected].

Mehdi Bennis is with the Centre for Wireless Communications, Universityof Oulu, Finland, and the Department of Computer Engineering, Kyung HeeUniversity, South Korea. Email: [email protected].

This publication has emanated from research conducted with the financialsupport of Science Foundation Ireland (SFI) and is co-funded under theEuropean Regional Development Fund under Grant Number 13/RC/2077.

cations, which enhances the spectrum efficiency and alleviatesthe heavy burden on backhaul links [1]. Prior works in theliterature commonly followed two approaches for the contentplacement, namely, deterministic placement and probabilisticplacement. For deterministic placement, contents are cachedand optimized for specific networks in a deterministic man-ner [1]–[3]. However, in practice, the wireless channels andthe geographic distribution of devices are time-variant. Thisrequires frequent updates to the optimal content placementstrategy, which is a highly complicated task. To cope withthis problem, probabilistic content placement considers thateach device randomly caches a subset of content with a certaincaching probability [4]–[6]. In this paper, we particularly focuson probabilistic content placement.

Modeling cache-enabled heterogeneous networkss (Het-Nets), including base stations (BSs) and mobile devices,followed two main directions in the literature. The first lineof work, popularly named as protocol model, focuses onthe fundamental throughput scaling results by assuming asimple channel model [1]–[3]. In this model, two devices cancommunicate if they are within a certain distance. The secondline of work, defined as the physical interference model,considers a more realistic model for the underlying physicallayer [7]–[11]. This physical interference model is based onthe fundamental signal-to-interference ratio (SIR) metric, andhence, is applicable to any wireless communication systemwhose performance is measured by some SIR-based utilityfunction. In this work, we consider a realistic physical layermodel where all transmissions are subject to outage due tofading and interference. Next, we review relevant literature tothe D2D caching networks.

A. State of the Art and Prior Works

Modeling and analysis of D2D communication networksare widely adopted in the literature with the assumption thatthe mobile devices are uniformly distributed, especially in thewireless caching area [7] and [8]. For instance, the authors in[7] investigated the relationship between offloading probabilityof a cache-enabled D2D network and the energy cost ofcaching helpers that are uniformly distributed according to aPoisson point process (PPP). Meanwhile, the authors in [8]jointly optimized caching and scheduling to maximize the of-floading probability of a network whose users’ locations followa PPP. For such D2D caching networks, PPP is an appealing

Authorized licensed use limited to: Oulu University. Downloaded on March 25,2020 at 06:54:39 UTC from IEEE Xplore. Restrictions apply.

Page 2: Optimized Caching and Spectrum Partitioning for D2D ...

0090-6778 (c) 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCOMM.2020.2983015, IEEETransactions on Communications

2

analytical framework due to its simplicity and tractability[12] and [13]. However, a realistic model for D2D cachingnetworks needs to capture the notion of device clustering,which is fundamental to the D2D network architecture [14]and [15]. Clustered D2D models imply that a given devicetypically has multiple proximate devices, where any of themcan act as a serving device. Such models can be effectivelydescribed by cluster processes [16]–[18].

In this regard, the authors in [16] developed a stochasticgeometry-based model to characterize the performance ofcontent placement in a clustered D2D network. In particular,the authors proposed different strategies of content placementin a Poisson cluster process (PCP) deployment. Meanwhile,the work in [17] proposed a cluster-centric content placementscheme where the content of interest is cached closer tothe cluster center. Moreover, the authors in [18] proposedcooperation among the D2D transmitters and hybrid cachingstrategies to save the energy cost of content providers, wherethe location of these providers is modeled by a GaussianPoisson process (GPP). Inspired by the Matern hard-core pointprocess, the authors in [19] proposed a spatially correlatedcaching strategy for which devices that cache the same contentcan not get closer to each other. However, while interesting,the works in [16] and [17] only characterized the performanceof clustered D2D networks with the assumption that contentsare pre-cached, i.e., there was no study of the caching prob-lem. Moreover, [18] and [19] focused solely on optimizingthe content placement for D2D networks to maximize theoffloading probability. In particular, there was no study ofjoint caching and communication, e.g., bandwidth allocationand spectrum access, which is vital to improve importantperformance metrics, e.g., service delay and spectral efficiency.

Recently, delay analysis and minimization for wirelesscaching networks have received significant attention, see,e.g., [1], [3], and [20]–[22]. For instance, the authors in[1] advocated to set up helpers with caching capability incellular networks to reduce the access delay. Meanwhile, [3]proposed an inter-cluster collaborative caching architecture toreduce the average service delay for clustered D2D networks.The authors in [20] proposed a cache-based content deliveryscheme in a three-tier HetNet consisting of BSs, relays, andD2D pairs. Particularly, the average throughput and delayare characterized based on a queuing model and continuous-time Markov process. In [21], the authors maximized theenergy efficiency in an additive white Gaussian channel withcontent caching subject to delay constraint. The authors in[22] proposed joint request routing and content caching tominimize the average access delay. However, in these works,the authors studied the content placement problem to analyzeand minimize the network delay while the joint optimizationof caching and communication was not considered.

Compared with this prior art [16]–[22], this paper providesa comprehensive performance analysis and optimization fora clustered D2D caching network. In particular, we firstdevelop a spatiotemporal model that accounts for the requests’arrival, the clustered geometry of devices, content caching,and overlay interactions between the cellular and D2D com-munications. Then, we formulate an optimization problem

based on the developed spatiotemporal model aiming to reducethe average service delay. Our approach effectively capturesthe notion of device clustering and accounts for resourceallocation and scheduling of devices. These aspects have notbeen addressed yet in the literature, especially in the contextof the joint design of caching and spectrum partitioning. To

the best of our knowledge, this is the first work to propose a

joint caching and spectrum partitioning scheme to reduce the

average service delay for clustered D2D networks. Moreover,

this paper introduces the first spatiotemporal analysis for D2D

cache-enabled networks. The main contributions of this paperare summarized as follows:

• We consider a spatially clustered D2D caching networkin which users with different interests exist in disjointvicinities, i.e., different popularity profiles per clusters.For this network, we study the content caching anddelivery among clusters’ devices and propose a jointcaching and spectrum partitioning scheme to reduce theaverage service delay.

• We develop a spatiotemporal model by combining toolsfrom stochastic geometry and queuing theory, whichallows us to account for the notion of device clustering,requests’ arrival and service rates, and the traffic queuedynamics. We then conduct the rate coverage analysis toobtain the service rates of the traffic modeling queues. Wecan then characterize the conditions under which the net-work sustains its stability, and obtain the request averageservice delay as a function of the system parameters.

• Towards a minimized service delay, we jointly optimizespectrum partitioning between D2D and BS-to-devicecommunications and content caching. Given the non-convexity of the joint problem, the bandwidth allocationand caching subproblems are decoupled and solved iter-atively using block coordinate descent (BCD) optimiza-tion technique. In particular, we characterize the optimalbandwidth allocation in a closed-form expression, and asuboptimal solution for the content caching subproblemis also obtained.

• Our results reveal that the optimal bandwidth allocationheavily depends on the request arrival rate, popularityof files, and the network geometry. Moreover, it is shownthat the average service delay can be significantly reducedby the joint optimization of spectrum partitioning andcontent caching compared to other benchmark schemes.

The rest of this paper is organized as follows. Section IIand Section III present, respectively, the system model andrate coverage probability analysis. The average service delayminimization is then conducted in Section IV. Numericalresults are presented in Section V and conclusions are drawnin Section VI.

II. SYSTEM MODEL

A. Network Model

We consider a clustered D2D cache-enabled network inwhich devices can share their cached content within the samecluster. For this network, we model the location of the deviceswith a Thomas cluster process (TCP) composed of parentand their corresponding daughter points. A general TCP is

Authorized licensed use limited to: Oulu University. Downloaded on March 25,2020 at 06:54:39 UTC from IEEE Xplore. Restrictions apply.

Page 3: Optimized Caching and Spectrum Partitioning for D2D ...

0090-6778 (c) 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCOMM.2020.2983015, IEEETransactions on Communications

3

0 1 2 3 4 50

1

2

3

4

5Parent pointsDaughter points

One cluster

Fig. 1. A realization of the proposed TCP network whose parent points formPPP �p of density �p = 5 km

�2, and the average number of devices percluster is n̄ = 5. The standard deviation of normal scattering (distribution) is� = 100m.

generated by taking a parent homogeneous PPP and daughterGaussian PPP, one per parent, and translating the daughterprocesses to the position of their parents [13]. The clusterprocess is then the union of all the daughter points. Letus denote the parent point process by �p = {x1,x2, . . . },where xi 2 R2, and i 2 N , see Fig. 1. Further, let (�i)

be a family of finite point sets representing the untranslateddaughter Gaussian PPPs, i.e., untranslated clusters. The clusterprocess is then the union of the translated clusters:

� =� [i2Nxi + �i. (1)

The parent points and offspring are referred to as clustercenters and cluster members, respectively. We assume that thecluster centers are drawn from the PPP �p whose density is�p, while the number of cluster members is a Poisson randomvariable (RV) with a certain mean. We also assume that, forGaussian PPPs, the cluster members (daughter points) arenormally scattered of variance �

2 2 R around their clustercenters (parent points) [13]. Given this normal scattering ofdaughter points, the probability distribution function (PDF) ofthe cluster member location relative to its cluster center equals

fY (y) =1

2⇡�2exp⇣� kyk

2

2�2

⌘, y 2 R2

, (2)

where y 2 R2 is the device location relative to its clustercenter, k.k is the Euclidean norm. If the average number ofdevices per cluster is n̄, the cluster intensity function will be:

�c(y) =n̄

2⇡�2exp�� kyk

2

2�2

�, y 2 R2

. (3)

Therefore, the intensity of the entire process � will be� = n̄�p. We assume two kind of devices co-exist within thesame cluster, namely, content clients and content providersas done in [18]. In particular, the devices that can performproactive caching and provide content delivery are calledcontent providers while those requesting content are calledcontent clients. All content providers are assumed to have thesame transmission power Pd.

We also consider a tier of BSs, which are connected tothe core network and communicate with the content clientsonly when their requests cannot be satisfied by D2D links.We assume that all the content that might be requested by

content clients are available at the BSs. The BSs’ spatialdistribution follows another PPP �b with density �b, whichis independent of �p. All BSs have the same transmissionpower Pb. We assume an overlay operation such that the BSsand D2D transmitters are assigned non-overlapping frequencybands to avoid cross-tier interference. In particular, the totalsystem bandwidth W is divided into two portions, Wb forthe BS-to-device communication, and Wd = W � Wb forD2D communications. The cellular and D2D channels arecharacterized by non-line-of-sight (NLoS) communicationsand both large-scale and small-scale fading, e.g., see [16]–[19]. Large-scale fading is represented by the power path losslaw `(w) = w

�↵, where w is the communication distanceand ↵ > 2 is the path loss exponent. Moreover, the small-scale fading follows a Rayleigh distribution whose channelgain gw is exponentially distributed with unit mean, i.e.,gw ⇠ exp(1).1 We set all transmit powers to unity and focuson the interference-limited regime, thus, the thermal noise isignored.

In the adopted system model, we assume that each trans-mitter, either BS or device, sends codewords drawn from aGaussian codebook with a fixed rate log(1 + ✓)Pc, where✓ is the target SIR threshold and Pc is the rate coverageprobability. This fixed rate expression will be explained laterin our discussions. A quasi-static channel model is adoptedwhere the channel gain is assumed to be constant during onecodeword transmission, and changes from one codeword toanother [23]. The codeword length is determined based onthe underlying coding and modulation schemes, which arecaptured by the fixed rate expression log(1 + ✓)Pc. Next, weintroduce our proposed content caching and delivery schemes.

B. Content Popularity and Probabilistic Caching Model

We assume that each content provider has a surplus memoryof size M files, designated for caching contents. The totalnumber of contents is Nf �M and the set (library) of contentindices is denoted as F = {1, 2, . . . , Nf}. These contentsrepresent the content catalog that all the devices in a clustermay request, which are indexed in a descending order ofpopularity. The probability that the i-th content is requestedfollows a Zipf distribution given by [24],

qi =i��

PNf

k=1 k��

, (4)

where � is a parameter that reflects how skewed the popularitydistribution is. For example, if � = 0, the popularity ofthe contents has a uniform distribution. Increasing � in-creases the disparity among the contents’ popularity such thatlower indexed contents have higher popularity. By definition,PNf

i=1 qi = 1. We assume that the popularity of files mightdiffer among different clusters. This is motivated by the factthat disjoint user groups in different locations may havedifferent interests. Hence, we use the Zipf distribution to

1In Section V, the channel model is revisited to evaluate the performanceof a clustered cache-enabled D2D network in which intra-cluster devicesexperience line-of-sight (LoS) communications.

Authorized licensed use limited to: Oulu University. Downloaded on March 25,2020 at 06:54:39 UTC from IEEE Xplore. Restrictions apply.

Page 4: Optimized Caching and Spectrum Partitioning for D2D ...

0090-6778 (c) 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCOMM.2020.2983015, IEEETransactions on Communications

4

model the popularity of contents per cluster. The popularityof contents is assumed to be perfectly known.2

Fig. 2. Illustrative example of the proposed PC scheme for a library of filesof size Nf = 5 and maximum cache size per device of M = 3 files.

For the caching policy, we adopt a random content place-ment scheme where each content provider independently se-lects a content to cache according to a specific probabilityfunction b = {b1, b2, . . . , bNf

}, where bi is the probability thata device caches the i-th content, 0 bi 1, 8i 2 F . To avoidduplicate caching of the same content within the memory ofthe same device, we follow a probabilistic caching approachproposed in [5] and illustrated in Fig. 2. An illustrativeexample of the adopted PC is given in Fig. 2, for a librarysize Nf = 5 and per-device cache size M = 3. Firstly,M is equally divided into 3 (vertical) blocks of unit size.Then, for given caching probabilities {b1, b2, . . . , b5}, withPNf=5

i=1 bi = M = 3, the three vertical blocks are populatedwith the bi values. Finally, a random number 2 [0, 1] isgenerated and content i is chosen from each block whosebi fills the partition intersecting with the generated randomnumber. In this way, if the random number is 0.5 for thegiven example in Fig. 2, the contents {1, 2, 4} are chosen to becached. The caching probabilities bi, i 2 F , can be tuned so asto optimize a particular performance metric, e.g., the averageservice delay as detailed later. It is worth mentioning that PCis a standard caching technique that is widely adopted in theliterature, see, e.g., [4]–[6]. Next, we will discuss the contentsharing via D2D communications and explain the mechanismof D2D link setup.

C. Content Request and Delivery Model

Due to the cost of participating in content caching anddelivery, e.g., battery consumption and memory utilization,not all content providers can be active in all time slots.Furthermore, some content providers may be busy in their owncommunications. Hence, within each cluster, we assume that

2Given the time-varying content popularity in practical scenarios, incor-poration of estimation errors of content popularity might be required toconvey a more conservative study of the network performance [6]. As anexample of factoring in the time-varying popularity, the classical web cachingsystems adopt dynamic eviction policies like least recently used in order tocombat time-varying content popularity in a heuristic manner [25]. However,considering time-varying popularity is out of the scope of this work. For adetailed review of the main results and the literature on the topic of time-varying content popularity, the reader is referred to [26]–[28].

Fig. 3. The traffic and communication models for a content client in a givencluster are shown. Queues Qd and Qb are used to model requests servedvia D2D and BS-to-device communications, respectively. In the top left, ⌘⇣brepresents the aggregate arrived requests from ⌘ clients that are served by thesame BS on the same physical radio resource.

content providers can be available for content delivery withprobability p 2 [0, 1].3

Within each cluster, we assume a content client devicewhose distance to its cluster center is drawn from a Rayleighdistribution of scale parameter �, according to the TCP defini-tion. Throughout time, content clients in different clusters mayrequest files i 2 F with a probability following the assumedper-cluster Zipf distribution in (4). Similar to [3] and [1], weneglect the device self-cache and assume that desired contentscan be only brought by D2D or BS-to-device communications.Since each cluster has its own library, a given content clientmay either be served via a D2D connection from the nearestactive provider within the same cluster or, as a last resort, viathe nearest geographical BS.

For our network, we assume a BS-assisted D2D link setupthat works as follows [29]. A content client first sends itsrequest to its geographical closest BS, which knows the activecontent providers, their cashed files, as well as their locations.If there is an active content provider caching the requested file,the BS then establishes a direct D2D link between the contentclient and its geographically closest active content provider.Otherwise, the content client attaches to this closest BS, as alast resort, to download the desired file. Next, we illustrate theadopted traffic and queueing models.

D. Traffic Model

We assume that the per client request arrival follows aPoisson arrival process with parameter ⇣ (requests per timeslot). As shown in Fig. 3, the incoming requests are furtherdivided according to where they are served from. The arrivalrate of requests served via the D2D communication is denotedby ⇣d, while ⇣b is the arrival rate for those served from theBS. By definition, ⇣d and ⇣b are also Poisson arrival processes.Without loss of generality, we assume that the content size hasa general distribution G whose mean is denoted as S MBytes.

3Incentivizes for the devices to cache and deliver contents is a standaloneproblem that is studied in the literature, see, e.g., [8], however, it is out ofour scope in this paper.

Authorized licensed use limited to: Oulu University. Downloaded on March 25,2020 at 06:54:39 UTC from IEEE Xplore. Restrictions apply.

Page 5: Optimized Caching and Spectrum Partitioning for D2D ...

0090-6778 (c) 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCOMM.2020.2983015, IEEETransactions on Communications

5

Hence, an M/G/1 queuing model is adopted whereby two non-interacting queues, Qd and Qb, model the client traffic servedvia D2D and BS-to-device communications, respectively. Letµd and µb be the service rates of Qd and Qb, respectively.Although Qd and Qb are non-interacting queues, as the D2Dcommunication is assumed to be out-of-band, these two queuesare spatially interacting with their similar queues in otherclusters (or BSs), as we will detail later.

We assume that the average number of potentially activedevices, i.e., content providers, is n̄. Hence, according to theproposed channel access scheme, the set of active deviceswithin the same cluster follows a Poisson RV whose mean ispn̄. The probability that there are k active devices per clusteris hence equal to (pn̄)ke�pn̄

k! . Accordingly, the probability thatthere exists k active providers for content i is (bipn̄)

ke�bipn̄

k! ,where bi is the caching probability. Hence, the probability thatthere exists at least one active provider for content i is 1-minusthe void probability (i.e., k = 0), given by 1 � e

�bipn̄. It isworth highlighting that Qb and Qd account for requests forcontent demanded by a client, not the content itself. Thesecontent requests are assumed of finite-small sizes such that theeffect of the limited buffer size of Qd and Qb can be ignored.The assumption of finite-small packet sizes of requests and,accordingly, the intangible impact of buffer sizes of Qd andQb is perfectly practical as we deal with requests for content,not the content itself. However, if the accumulated packetsor requests are of significant sizes compared to the buffersizes, admission control policies can be imposed. In particular,admission policies could be applied at the device or BS levelssuch that there is a maximum number of accumulated requestsin the device queue or a maximum number of devices tobe served by the BS, respectively. This would help limit thequeue overflow, i.e., reduce the probability that the numberof accumulated requests exceeds a certain threshold. As such,devices or requests being served undergo finite truncated delaywith no probability of overflow at the buffers or experiencinginfinite delays. However, this will happen at the expense ofmore discarded requests and fewer number of users to beserved by the BSs. The spatiotemporal analysis for cachingnetworks with underlying admission policies is beyond thescope of this paper. Nonetheless, it can be a good subject forfuture work.

Given the Poisson arrival rate ⇣ and the Zipf popularity ofcontent, we get

⇣d = ⇣

NfX

i=1

qi(1� e�bipn̄), (5)

⇣b = ⇣

NfX

i=1

qie�bipn̄. (6)

We assume a first in first out (FIFO) scheduling techniquewhereby a request for content arrives first will be scheduledfirst either by the D2D or BS-to-device communication, ifthe content is cached among the active providers or not,respectively. Notice that the result of FIFO scheduling at BSsonly relies on the time when the request arrives at the queue,

i.e., it is irrelevant to the particular device that issues therequest.

Having obtained the arrival rates, next, we characterize thecorresponding service rates of Qd and Qb. To do that, we willturn our attention to the communication part of our system.We assume a SIR threshold model that works as follows: Ifthe SIR of a wireless link is above a threshold ✓, the link canbe successfully used for information transmission at spectralefficiency log2(1 + ✓) bits/sec/Hz. In other words, we adopta fixed rate transmission scheme, whereby each device (orBS) transmits at the fixed rate of log2(1 + ✓) bits/sec/Hz,where ✓ is a design parameter. Note that such definition iswidely adopted and accepted in the literature as in [18], [23],and [30]–[32]. Since the rate is fixed, the transmission isprone to outage due to fading and interference fluctuations.Consequently, the de facto average transmissions rate, i.e.,average throughput (aka goodput), can be expressed similarto [18], [23], and [30]–[32] as

Cl = Wllog2(1 + ✓)⌥l, (7)

where l 2 {d, b} for the D2D and BS-to-device communi-cation, respectively, ⌥l = E[1{SIR > ✓}], and 1{.} is theindicator function. The rate coverage probability ⌥l is definedas the probability that a content is downloadable with an SIRhigher than a certain threshold ✓.

Given the memoryless property of the Poisson arrival pro-cess along with the fact that the service process is independentof the arrival process, we reach the following result: Thenumber of requests in each queue at a future time only dependsupon the current number in the system (at time t) and thearrivals or departures that occur within the interval e, i.e.,

Ql(t+ e) = Ql(t) + ⇤l(e)�Ml(e), (8)

where l 2 {d, b}, and ⇤l(e) is the number of arrivals in thetime interval (t, t+ e) whose mean is ⇣l. Similarly, Ml(e) isthe number of departures in the same interval, which has themean

µl =Cl

S=

Wllog2(1 + ✓)⌥l

S. (9)

The mean service time is hence ⌧l =1µl

=S

Wllog2(1+✓)⌥l

,which follows the same distribution as the content size.Since ⌥l = E[1{SIR > ✓}], it is clear that the servicerates µl depend on the traffic dynamics. This is because arequest being served via Qd (or Qb) in a given cluster isinterfered only from other clusters (or BSs) that serve requestsvia D2D (or BS-to-device) communications. More precisely,lower encountered request arrival rates are equivalent to lowerinterference received at the client device, and vice versa.This observation will be revisited later in our discussionsin Section IV. Having described the underlying spatial andtemporal models, next, we introduce our main performancemetric, namely, the average service delay. We particularlyrelate this metric to the underlying spatiotemporal model andexplain the proposed joint caching and bandwidth partitioningoptimization problem.

Authorized licensed use limited to: Oulu University. Downloaded on March 25,2020 at 06:54:39 UTC from IEEE Xplore. Restrictions apply.

Page 6: Optimized Caching and Spectrum Partitioning for D2D ...

0090-6778 (c) 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCOMM.2020.2983015, IEEETransactions on Communications

6

E. Minimized Average Service Delay

Serving a client by fetching its desired content via eitherD2D or BS-to-device communication is susceptible to latency.This is because requests are subject to both queuing andtransmission delays. Ensuring low latency for applicationssuch as video streaming or application downloads is a criticalmatter for the quality-of-experience (QoE) perceived by theusers. In particular, human eyes need to experience smoothsequences of video frames with sufficiently low latency. How-ever, temporary outages due to impairments in the receivedsignal-to-noise-plus-interference ratio (SINR) are frequent inwireless environments. Hence, the joint design of cachingand communication, e.g., bandwidth allocation, is essential toensure reduced service delay and improved QoE. Therefore,our target is to study and minimize the per request averageservice delay incurred to deliver contents to the correspondingdevices (clients).

From our previous discussions on the queuing and com-munication models, we first observe that the caching proba-bility bi controls the arrival rates ⇣d and ⇣b of Qd and Qd,respectively (from (5) and (6)). Moreover, the bandwidths Wd

and Wb determine their corresponding service rates, namely,µd and µb. For instance, if Wd is arbitrarily larger thanWb, requests served via the D2D communication mode mightexperience lower delay than those served via the cellularcommunication mode, and vice versa. This, in turn, couldyield overall larger weighted average service delay. Moreover,allocating bandwidths to these two communication modesregardless of their percentage of served traffic will lead toinefficient spectrum utilization. Hence, it is vital to jointlydesign the caching scheme and allocate the bandwidth betweenthe D2D and cellular communications such that the averageservice delay is efficiently reduced. Finally, to obtain theservice rates µl in (9), l 2 {d, b}, we must calculate the ratecoverage probabilities ⌥l. We next conduct the rate coverageanalysis for both D2D and cellular communications to obtainthe rate coverage probabilities ⌥l.

III. RATE COVERAGE PROBABILITY

A. D2D Coverage Probability

Without loss of generality, we conduct the next analysisfor a cluster whose center is at x0 2 �p, referred to asrepresentative cluster, and a client device, henceforth calledtypical device, located at the origin. We denote the locationof the nearest active provider for content i by y0i relativeto the cluster center x0. From Fig. 3, the distance from thetypical device to this provider is hi = kx0 + y0ik. We firstcharacterize the PDF fHi

(hi), then, we readily obtain the ratecoverage probability and transmission rate.

That being said, that average number of content providersper cluster is set to be n̄. Hence, active content providers forfile i 2 F form a Gaussian PPP �ci of intensity �ci(y) =

bip�c(y) =bipn̄

2⇡�2 exp�� kyk2

2�2

�by the thinning theorem [13].

Based on that, the PDF of the distance to the nearest activeprovider for content i can be derived as follows.

Lemma 1. The PDF of the distance to the nearest active

provider for content i is given by:

fHi(hi) =bipn̄

Z 1

v0=0fV0(v0)fHi|V0

(hi|v0)⇥

exp

⇣� bipn̄

Zhi

0fH|V0

(h|v0) dh⌘dv0 , (10)

where fV0(v0) = Rayleigh(v0,�) is a Rayleigh PDF of a

scale parameter �, which models the distance between the typ-

ical device and its cluster center; fH|V0(h|v0) = Rice(h|v0,�)

is a Rician PDF of parameter � that models the distance

H = kx + yk between an intra-cluster device located at yrelative to the cluster center and the origin (0, 0).

Proof. Please see Appendix A for the proof.

In Fig. 4, we verify the accuracy of the derived PDFfHi

(hi) in (10). The figure shows that the analytical expressionmatches the simulation well. Fig. 4 also shows that thedistance to the nearest provider statistically decreases whenbi increases. This is intuitive because it is more likely tohave closer providers when they cache the content with higherprobabilities.

It is worth highlighting that, when a desired content i isdownloaded from the nearest active provider, the distancePDF fHi

(hi) depends on the caching probability b. Thisis different from the case when the content is delivered bya randomly-selected provider within the same cluster. Toillustrate, from the definition of Gaussian PPP, the PDF ofthe distance from the client to a randomly-selected provideris fR(r) =

r

2�2 e� r

2

4�2 , which is, remarkably, independent ofthe caching probability b. This leads to that, if a content isbrought from a randomly-selected provider, all contents aredownloadable with the same average rate irrespective of theircaching probability. However, when downloading from nearestproviders, this yields different rates for different content. Thisfact is crucial in the delay analysis, as we will discuss inSection IV.

Having characterized the nearest distance PDF fHi(hi),

next, we conduct the D2D coverage probability analysis. Thereceived power at the client device from the nearest contentprovider located at y0i relative to the cluster center at x0 isgiven by

Pi = Pdg0ikx0 + y0ik�↵= Pdg0ih

�↵

i(11)

where g0i ⇠ exp(1) is the fading of the desired link. Thetypical device sees two types of interference, particularly,intra-and inter-cluster interference. The former is generatedfrom active devices within the same cluster while the latter isproduced from active devices in the remote clusters. The setof active devices in a remote cluster is denoted as Bp, wherep refers to the access probability. Similarly, the set of activedevices in the local cluster is denoted as Ap. The inter-clusterinterference is hence given by

I�!p=

X

x2�!p

X

y2Bp

Pdgyxkx+ yk�↵

=

X

x2�!p

X

y2Bp

Pdguu�↵

,

(12)

Authorized licensed use limited to: Oulu University. Downloaded on March 25,2020 at 06:54:39 UTC from IEEE Xplore. Restrictions apply.

Page 7: Optimized Caching and Spectrum Partitioning for D2D ...

0090-6778 (c) 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCOMM.2020.2983015, IEEETransactions on Communications

7

(a) bi = 1

(b) bi = 0.5

Fig. 4. The PDF of the nearest serving distance is presented versus hi atdifferent caching probabilities: (n̄ = 20, � = 5m, and p = 0.5).

where �!p= �p \ x0, y 2 Bp are the locations of interfering

devices relative to their cluster center at x 2 �!p, and u =

kx+ yk are the inter-cluster interfering distances, see Fig. 3;gyx⇠ exp(1) is the fading of an interfering link, and gu =

gyxfor ease of notation. For the intra-cluster interference, we

further divide Ap into two sets, namely, Ap

1 and Ap

2. We letAp

1 and Ap

2 be the set of active devices farther, and closer thanthe distance hi, respectively. Clearly, active devices belongingto Ap

2 do not cache the desired content i. Hence, we have

I�c=

X

y2Ap

1

Pdgyx0kx0 + yk�↵

+

X

y2Ap

2

Pdgyx0kx0 + yk�↵

=

X

y2Ap

1

Pdgrr�↵

+

X

y2Ap

2

Pdgrr�↵

, (13)

where y 2 Ap are the locations of intra-cluster interferingdevices relative to their cluster center at x0 2 �p, andr = kx0 + yk are the intra-cluster interfering distances, seeFig. 3. We substitute gr = gyx0

for ease of notation, wheregyx0

⇠ exp(1). Hence, the received SIR at the typical devicefor content i will be:

�hi=

P

I�!p+ I�c

=Pdg0ih

�↵

i

I�!p+ I�c

. (14)

The probability that the typical device receives content i

via D2D communications with an SIR higher than a target

threshold ✓, i.e., the rate coverage probability, can be obtainedfrom:

⌥i = P(�hi> ✓) = E

hP⇣Pdg0ih

�↵

i

I�!p+ I�c

> ✓

⌘i

= EhP⇣g0i >

✓h↵

i

Pd

[I�!p+ I�c

]

⌘i

(a)= EI�!

p

,I�c,hi

hexp��✓h↵

i

Pd

[I�!p+ I�c

]�i

(b)= Ehi

LI�!p

(s)LI�c(s), (15)

where (a) follows from g0i ⇠ exp(1), and (b) follows fromthe assumption that intra- and inter-cluster interference areindependent and the Laplace transform of them, with s =

✓h↵

i

Pd

.Next, we derive the Laplace transform of intra- and inter-cluster interference.

Lemma 2. Laplace transform of the intra-cluster interference

can be approximated by

LI�c(s) ⇡ exp

⇣� pn̄b̄i

Zhi

r=0

sfR(r)

s+ r↵dr

⌘⇥

exp

⇣� pn̄

Z 1

r=hi

sfR(r)

s+ r↵dr

⌘, (16)

where b̄i = 1 � bi, and fR(r) = Rayleigh(r,p2�) is a

Rayleigh PDF of a scale parameterp2�, which models the

distance between an intra-cluster interfering device to the

typical device.

Proof. Please see Appendix B.

The accuracy of the adopted approximation in Lemma 2will be verified via simulations. Having characterized Laplacetransform of the intra-cluster interference, next, we similarlyobtain Laplace transform of the inter-cluster interference.

Lemma 3. Laplace transform of the inter-cluster aggregate

interference I�!p

is given by

LI�!p

(s) = exp

⇣� 2⇡�p

Z 1

v=0

⇣1� e

�pn̄'(s,v)⌘v dv

⌘,

(17)

where s =✓h

i

Pd

, '(s, v) =R1u=0

s

s+u↵ fU (u|v) du, and

fU (u|v) = Rice(u|v,�) is a Rician PDF of parameter � that

models the distance U = kx + yk between an interfering

device at y relative to its cluster center at x 2 �p and the

origin (0, 0), conditioned on V = kxk = v.

Proof. Please see Appendix C.

From Lemma 2 and 3, the rate coverage probability ofcontent i 2 F will be given by:

⌥i =

Z 1

hi=0P(�hi

> ✓)fHi(hi) dhi . (18)

In Fig. 5, we plot the D2D rate coverage probability ⌥i

against the channel access probability p at different cachingprobability bi. Fig. 5 first verifies the accuracy of the approxi-mation in Lemma 2. Moreover, it is clear that the rate coverageprobability for content i increases with its caching probability

Authorized licensed use limited to: Oulu University. Downloaded on March 25,2020 at 06:54:39 UTC from IEEE Xplore. Restrictions apply.

Page 8: Optimized Caching and Spectrum Partitioning for D2D ...

0090-6778 (c) 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCOMM.2020.2983015, IEEETransactions on Communications

8

0.1 0.2 0.3 0.4 0.5 0.6 0.70.4

0.45

0.5

0.55

0.6

0.65

0.7

Fig. 5. The D2D rate coverage probability ⌥i versus the access probabilityp (�p = 50 km

�2,� = 10m, n̄ = 20, ✓ = 0dB).

bi. This is because contents that are cached with higherprobabilities are reachable with statistically shorter distances,and, subsequently, stronger received signal power. Moreover,Fig. 5 also illustrates that ⌥i first increases with p driven by theincreasing probability of channel access. Then, ⌥i declines asp increases due to the effect of adverse interference conditions.The access probability can be treated as an input parameter

that reflects the interest of devices to participate in content

sharing based on various parameters, e.g., their battery levels

or cache sizes.

B. BS-to-Device Coverage Probability

If a content client attaches to the nearest BS from �b

to download a desired content, the BS-to-device coverageprobability can be expressed similar to [12] as: ⌥b =

12F1(1,��;1��;�✓) , where 2F1(.) is the Gaussian hypergeometricfunction and � = 2/↵.

Having obtained the rate coverage probabilities for D2D andBS-to-device links, next, we characterize the average servicedelay and formulate the average service delay minimizationproblem.

IV. DELAY ANALYSIS AND MINIMIZATION

In this section, we conduct the delay analysis and formulatethe delay minimization problem. To do so, we start by char-acterizing the average service rates and corresponding servicedelays of the queues Qd and Qb, which model requests servedvia D2D and BS-to-device communications, respectively.

A. D2D Service Rate and Service Delay

Having explained, the rate coverage probability dependson its caching probability bi, since bi impacts the distancedistribution to the nearest active provider as given in (10).Additionally, given that Ci = Wdlog2(1+ ✓)⌥i and µi =

Ci

S̄,

i 2 F , different files are downloadable with different rates viaD2D communications.4 Similar to [3] and [20], we assume that

4In [3] and [20], different service rates are equivalent to different transmis-sion modes of serving files whereas each mode has a different transmissionrate. However, even though Qd models the D2D transmission mode, i.e., onlyone transmission mode, different contents are downloadable with differentrates based on the content availability.

the content size follows an exponential distribution of meanS, hence, the content service time also obeys an exponentialdistribution with means ⌧i =

1µi

. Moreover, Qd represents amulticlass processor sharing queue (MPSQ) whose arrival rateand service rates are ⇣d and µi, i 2 F , respectively [33]. Thisis because different contents have different D2D service rates,see, e.g., [3] and [20]. Given the Poisson arrival process ⇣d,content i also has a Poisson arrival whose arrival rate andmean inter-arrival time are ⇣i = qi(1 � e

�bipn̄)⇣ and 1⇣i

,respectively. Hence, the D2D aggregate arrival rate is givenby ⇣d =

PNf

i=1 ⇣i = ⇣PNf

i=1 qi(1� e�bipn̄).

The traffic intensity of a queue is defined as the ratio ofmean service time to mean inter-arrival time. Let ⇢d be theintensity of traffic served via D2D communications, where

⇢d =

NfX

i=1

1/µi

1/⇣i=

NfX

i=1

⇣i

µi

=S̄

Wdlog2(1 + ✓)

NfX

i=1

⇣i

⌥i

. (19)

The stability condition then requires that ⇢d < 1, otherwise,the overall delay will be infinite. In addition, the mean queuesize for an MPSQ with traffic intensity ⇢d can be approximatedby Ld =

⇢d

1�⇢d

[33]. From [34], the average service delay isthe ratio of mean queue size Ld over the arrival rate ⇣d. Hence,we can express the D2D service delay as:

Td =Ld

⇣d=

1

⇣d

⇢d

1� ⇢d=

1

⇣d

1

1⇢d

� 1=

1

⇣d

1

Wdlog2(1+✓)

S̄PN

f

i=1⇣i

⌥i

� 1

=⇣

⇣d

PNf

i=1qi(1�e

�bipn̄)⌥i

Wd

S̄log2(1 + ✓)� ⇣

PNf

i=1qi(1�e�bipn̄)

⌥i

!. (20)

Remark 1. From (20), it readily follows that the D2D ser-

vice delay Td decreases as the rate coverage probability ⌥i

increases. Accordingly, the average service delay T will also

improve with the improvement of the rate coverage probability.

The rate coverage probability ⌥i increases as either the

density of clusters or the distance between devices decrease,

which correspond to lower interference and higher signal

levels, respectively. This characteristic is revisited in Section V

when we study the effect of network geometry on the average

service delay.

B. BS-to-device Service Rate and Service Delay

Given the BS coverage probability ⌥b, the BS-to-deviceaverage rate will be: Cb = Wblog2(1 + ✓)⌥b, and corre-spondingly, the service rate is µb =

Cb

S̄=

Wb

Slog2(1 + ✓)⌥b.

To characterize the average service delay, we must calculatethe average number of clients attached to the same BS andspecify the scheduling policy. Under the assumption of onecontent client per cluster, the locations of clients form a PPPwith the same intensity �p as the cluster centers. This is adirect result from the displacement theory of the PPP [13],where the clients can be considered as the cluster centers thatare independently displaced from their locations. Hence, theaverage number of clients per BS is ⌘ =

�p

�b

[35]. Moreover,we assume a FIFO scheduling where each BS schedules theearliest arriving request in each time slot. Hence, all queuesat a BS could be considered as a single large queue whose

Authorized licensed use limited to: Oulu University. Downloaded on March 25,2020 at 06:54:39 UTC from IEEE Xplore. Restrictions apply.

Page 9: Optimized Caching and Spectrum Partitioning for D2D ...

0090-6778 (c) 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCOMM.2020.2983015, IEEETransactions on Communications

9

arrival rate is ⌘⇣b, see Fig. 3. The average service delay ofBS-served requests of the typical device equals the averageservice delay of the requests arriving at this large queue.

The probability that more than two requests arrive simul-taneously at the large queue is very small [30]. Therefore,the arrival process at the large queue can be consideredas a Poisson process whose aggregate arrival rate is ⌘⇣b.Given the exponential distribution of content size, the trafficmodel at each BS is equivalent to a M/M/1 queueing systemwhose mean queue size, arrival rate, and service rate are,respectively, Lb, ⌘⇣b, and µb. The traffic intensity is hence⇢b =

⌘⇣b

µb

, and, correspondingly, the mean queue size will beLb =

⇢b

1�⇢b

=⌘⇣b

µb�⌘⇣b[34]. The average service delay per

request for Qb of the typical device can be obtained from

Tb =Lb

⌘⇣b=

1

µb � ⌘⇣b=

1

Wb

Slog2(1 + ✓)⌥b � ⌘⇣b

. (21)

Having discussed, the service rates of Qd and Qb dependon the traffic of the network. This is attributed to the fact thatrequests being served are susceptible to interference only ifthere are concurrently-served requests in other clusters (or byother BSs). Next, we conduct the delay analysis for a dominantsystem as widely-adopted in the literature, see, e.g., [30], [31],and [36]. Particularly, the dominant network is a fictitioussystem that is identical to the original system, except thatterminals may choose to transmit even when their respectivebuffers are empty, i.e., they transmit a dummy packet. If bothoriginal and dummy systems started from the same initial stateand fed with the same arrivals, then, the queues in the fictitiousdominant system can never be shorter than the queues in theoriginal system. Hence, the obtained average service delay forthe dominant system represents an upper bound on that of theoriginal system. Hence, in the sequel, the obtained averageservice delay for the dominant system represents an upperbound on that of the original system.

C. Average Service Delay Minimization

Next, we first characterize the conditions under which thenetwork sustains its stability, i.e., the average service delayis bounded almost surely. Then, we obtain and minimize theaverage service delay.

Proposition 1. The original system is stable if Qd and Qb arestable, and the sufficient conditions of Qd and Qb stability are,respectively,

NfX

i=1

⇣i

⌥i

<Wdlog2(1 + ✓)

S̄, (22)

⇣b <Wblog2[1 + ✓]⌥b

⌘S. (23)

Proof. Equations (22) and (23) implies, respectively, that ⇢dand ⇢b are less than one, which guarantee the stability ofQd and Qb in the dominant system where all queues thathave empty buffers make dummy transmissions. By Loynes’theorem [37], it follows that limt!1Qi(t) < 1, i 2 {d, b},(almost surely) for all queues in the dominant network.

The weighted average service delay T will be then ex-pressed as:

T =⇣dTd + ⇣bTb

⇣=

PNf

i=1qi(1�e

�bipn̄)⌥i

Wd

S̄log2(1 + ✓)� ⇣

PNf

i=1qi(1�e�bipn̄)

⌥i

+⇣b

1

Wb

Slog2(1 + ✓)⌥b � ⌘⇣b

=

PNf

i=1qi(1�e

�bipn̄)⌥i

Wd

S̄log2(1 + ✓)� ⇣

PNf

i=1qi(1�e�bipn̄)

⌥i

+

PNf

i=1 qie�bipn̄

W�Wd

Slog2(1 + ✓)⌥b � ⌘⇣

PNf

i=1 qie�bipn̄

. (24)

Next, we minimize the average per request service delayT by optimizing the bandwidth allocation and caching prob-ability b. It should be readily apparent that b determines thearrival rates ⇣d and ⇣b while the service rates µd and µb heavilydepend on the allocated bandwidth. We hence formulate thedelay joint caching and bandwidth allocation minimizationproblem as

P1: minb,Wd

T (b,Wd) (25)

s.t.NfX

i=1

bi = M, bi 2 [0, 1] 8i 2 F , (26)

0 Wd W, (27)

NfX

i=1

qi(1� e�bipn̄)

µi

< 1, (28)

⌘⇣

NfX

i=1

qie�bipn̄ < µb, (29)

where constraints (28) and (29) are the stability conditions forQd and Qb, respectively. Next, we first show that T (b,Wd) isa convex function of Wd for a given caching probability b.

Lemma 4. For fixed b, the objective function of P1 in (25) is

convex with respect to (w.r.t.) Wd, and the optimal bandwidth

allocation is given in a closed-form expression as

W⇤d=

⇣A+

qA

B⌥b

�WC⌥b � ⌘⇣B

�C + C⌥b

qA

B⌥b

� , (30)

where A =PNf

i=1qi(1�e

�bipn̄)⌥i

, B =PNf

i=1 qie�bipn̄, and C =

log2(1+✓)S̄

.

Proof. The sketch of the proof is found in Appendix D.

Before proceeding with the solution of P1, we first providekey insights on the performance of our proposed joint cachingand bandwidth allocation scheme based on (30). Firstly, fromthe first term in the numerator of (30), it readily follows thatthe D2D optimal allocated bandwidth W

⇤d

increases with thearrival rate of D2D communication-served requests. This isan interesting result since the system tends to cope up withsuch an increase in these D2D-served requests by allocatingmore bandwidth to the D2D communications. This behavior

Authorized licensed use limited to: Oulu University. Downloaded on March 25,2020 at 06:54:39 UTC from IEEE Xplore. Restrictions apply.

Page 10: Optimized Caching and Spectrum Partitioning for D2D ...

0090-6778 (c) 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCOMM.2020.2983015, IEEETransactions on Communications

10

0.5 1 1.5 20.35

0.4

0.45

0.5

0.55

0.6

0.65

(a) Optimal bandwidth W⇤d

W versus the popularity exponent

0.2 0.4 0.6 0.8 10.3

0.4

0.5

0.6

0.7

=1

=1

=2

(b) Optimal bandwidth W⇤d

W versus the arrival rate ⇣

Fig. 6. The effect of various system parameters on the optimal bandwidthallocation W ⇤

d .

is shown in Fig. 6 where we compare the bandwidth allocatedto D2D and base-to-device communications. In Fig. 6(a), weplot the optimal bandwidth W

⇤d

Wversus the popularity exponent

�. Fig. 6(a) shows that the optimal allocated bandwidth W⇤d

W

monotonically increases with �, which can be interpreted asfollows. When � increases, a smaller number of contents be-come highly demanded. These contents can be entirely cachedand shared among the cluster devices. To cope with such alarger number of requests served via the D2D communication,i.e., higher ⇣d, the bandwidth W

⇤d

Wneeds to be increased.

Fig. 6(b) illustrates the effect of arrival rate ⇣ on the allocatedbandwidth W

⇤d

. It is shown that W⇤d

tends to decrease as ⇣

increases, which can be interpreted as follows. Given that theaggregate arrival rate at each BS is ⌘⇣b, when ⇣ increases,the average service delay can be minimized by balancing theloads and capacities of each communication mode. This canbe attained by allocating more bandwidth to the BS-to-devicecommunication mode to cope up with the increasing load. This

result reveals that it is vital to have joint load-aware resource

allocation and content caching schemes to optimize the overall

network performance.

Although the objective function of P1 is convex w.r.t. Wd,the coupling of the optimization variables b and Wd makes

Algorithm 1: BCD algorithm for P1Input : W , Nf , M , ⌥i, ⌥b, �, S, ✓, p, T0;Initialization: b b0, Wd W

2 ;(T ) Eq. (24) (b0,Wd);while T < T0 do

/* Update T0 with the calculateddelay. */

T0 = T ;(b) interior point method(b,Wd);(Wd) Eq. (30) (b);(T ) Eq. (24) (b,Wd);

end whileOutput: b, Wd;

P1 a non-convex optimization problem. Therefore, P1 cannotbe solved directly using standard optimization methods. Byapplying the BCD optimization technique, P1 can be solvedin an iterative manner as follows. First, for a given cachingprobability b, we calculate W

⇤d

from (30). Afterwards, the ob-tained W

⇤d

is used to update b. Given W⇤d

from the bandwidthallocation subproblem, the caching probability subproblem canbe formulated as

P2: minb

T (b,W ⇤d) (31)

s.t. (26), (28), (29).

The caching probability subproblem P2 is a sum of twofractional functions, where the first fraction is a prohibitivelycomplex expression of b, since ⌥i is an involved functionof b. This renders obtaining the optimal caching probabilityfor P2 very difficult. Instead, we seek a heuristic yet efficientalgorithm to solve for a suboptimal caching solution for P2.Particularly, we use the interior point method, implementedin Mathematica, to obtain a suboptimal caching probabilityb, as done in [8]. The entire proposed algorithm to solve P1is presented in Algorithm 1 and works as follows.5 Firstly,we start with an initial caching probability b0 and allocatedbandwidth Wd =

W

2 to obtain a suboptimal caching solutionbased on the interior point method. Then, the obtained cachingprobability b is used to update the bandwidth allocation in(30). The explained procedure, i.e., solving the two subprob-lems iteratively, is repeated until the value of P1’s objectivefunction converges to a pre-specified accuracy. Importantly, thecaching probability solution b, given the optimal bandwidthW

⇤d

, depends on the initial value input to the interior pointalgorithm [38]. We use the Zipf caching as an initial pointfor this algorithm to obtain a suboptimal caching probabilitygiven the bandwidth calculated from (30).

V. NUMERICAL RESULTS

At first, we validate the developed mathematical model viaMonte Carlo simulations. Then we benchmark the proposedcaching scheme against conventional caching schemes. Unless

5In the initialization of Algorithm 1, T0 is first set to a large value, then,updated periodically based on the new b and Wd.

Authorized licensed use limited to: Oulu University. Downloaded on March 25,2020 at 06:54:39 UTC from IEEE Xplore. Restrictions apply.

Page 11: Optimized Caching and Spectrum Partitioning for D2D ...

0090-6778 (c) 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCOMM.2020.2983015, IEEETransactions on Communications

11

TABLE ISIMULATION PARAMETERS

Description Parameter ValueSystem bandwidth W 20MHz

SIR threshold ✓ 0dB

Popularity exponent � 0.5Library size Nf 10

Cache size per device M 1Path loss exponent ↵ 4

Average number of devices per cluster n̄ 20Density of clusters �p 50 km

�2

Total request arrival rate ⇣ 0.5 request/secAverage content size S 5Mbits

Displacement standard deviation � 10m

Density of BSs �b 10 km�2

otherwise stated, the network parameters are selected as shownin Table I.6

20 40 60 80 1000

0.1

0.2

0.3

0.4

0.5

0.6

0.7

Fig. 7. The rate coverage probability ⌥i is plotted versus the network spatialparameters �p and � (bi = 1, p = 0.2).

A. D2D Rate Coverage Probability

In Fig. 7, we plot the D2D rate coverage probability ⌥i

versus the displacement standard deviation � at differentclusters’ density �p. Fig. 7 shows that ⌥i monotonicallydecreases with both � and �p. This is attributed to the fact thatthe increase of � and �p results in larger serving distance andshorter interfering distance, i.e., lower signal power due to thelarge-scale fading, and higher interference power received bythe typical device, respectively. This explains the encountereddegradation of ⌥i with � and �p.

In Fig. 8, we investigate the effects of the network topologyand small-scale fading parameters on the achievable perfor-mance. Firstly, Fig. 8(a) compares the achievable rate coverageprobability ⌥i of our proposed TCP network to the PPP andMCP counterparts, which are assumed to operate as follows.For a fair comparison, we first set the PPP intensity to be thesame as the TCP’s one of n�p. Recall that n is the averagenumber of devices per cluster and �p is the density of clusters.Moreover, for the MCP, the parent points are drawn from thesame PPP �p as the TCP. However, the cluster devices are

6In Table I, we assume a unit cache size per device and a file libraryof relatively small size. These values, which are close to that used in [18]and [39], are reasonable in the study of communication and caching aspectsof D2D content delivery networks. Other works in the literature, e.g., [2],considered a much larger size of file library, however, their objective was toconduct the scaling analysis of caching networks.

-5 0 5 100

0.2

0.4

0.6

0.8

1

(a) Rate coverage probability ⌥i for different point processes, namely,TCP, MCP, and PPP

-5 0 5 100

0.2

0.4

0.6

0.8

1

(b) Rate coverage probability ⌥i under different channel fading anddifferent selections of the content provider

Fig. 8. Effects of the network topology and small-scale and large-scale fadingon the achievable rate coverage probability ⌥i.

uniformly distributed in a ball of radius rd centered at thecluster center for the MCP (with rd set similar to the standarddeviation � for the TCP). Fig. 8(a) first shows that dependingon the distance between devices within the same cluster (i.e.,� for TCP and rd for MCP), the achievable rate coverageprobability ⌥i of the TCP or MCP might outperform that ofPPP or not. In particular, it is shown that if the distancesbetween devices within the same cluster are sufficiently small,i.e., the smaller is � or rd, the higher is ⌥i for the TCP, andvice versa. Moreover, the achievable rate coverage probabilityfor MCP is shown to surpass that of the TCP for the differentsetups of � (or rd).

Secondly, in Fig. 8(b), we investigate the effect of smallscale fading and LoS communications on the achievable per-formance of our proposed network. Particularly, we comparethe performance of the proposed clustered D2D cache-enablednetwork, under the assumption of NLoS communication andRayleigh fading channels, to that of a network undergoingLoS-dominated intra-cluster communication. In other words,we consider a variant of the channel model under which,devices within the same cluster have direct LoS communica-tions, while those in different clusters experience NLoS com-

Authorized licensed use limited to: Oulu University. Downloaded on March 25,2020 at 06:54:39 UTC from IEEE Xplore. Restrictions apply.

Page 12: Optimized Caching and Spectrum Partitioning for D2D ...

0090-6778 (c) 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCOMM.2020.2983015, IEEETransactions on Communications

12

munication and Rayleigh fading channels. The inter-clustercommunication channels are the same as described in SectionII-A, i.e., characterized by exponentially distributed channelpower gains with unit power, and path loss whose exponent is↵. However, the intra-cluster channel model follows the LoStransmission approach of [40], which is described as follows.The intra-cluster channels are characterized by both large-scale and small-scale fading. The large-scale fading is alsorepresented by the path loss law, however, with a smaller pathloss exponent ↵l, i.e., ↵l < ↵. Moreover, the large scale fadingis accompanied with a Nakagami small-scale fading whosefading parameter is m > 1. The intra-cluster channel param-eters are indicated in Table II, which are similar to the LoSchannel parameters of [10]. From Fig. 8(b), it is clear that theexistence of Nakagami fading along with LoS communicationsamong cluster devices substantially deteriorates the achievablerate coverage probability. This can be interpreted to that whileNakagami and LoS communications lead to an improved(desired) signal level at the typical device, compared to NLoScommunications and Rayleigh fading channels, this also yieldsa stronger interference power and, accordingly, poorer ratecoverage probability. Fig. 8(b) also evaluates the D2D ratecoverage probability under two system setups, namely, nearestand channel-based content provider selections. For the latter,the channel state information (CSI) is assumed to be known atthe devices. Intuitively, the rate coverage probability is shownto improve under the channel-based content provider selection.However, such a gain is on the expense of high signaling andhandover overheads.

TABLE IILOS SIMULATION PARAMETERS

Description Parameter ValuePath loss exponent ↵l 2.09

Nakagami fading parameter m 3

B. Delay Results

The performance of our proposed joint PC and bandwidthallocation scheme is evaluated and compared with other bench-mark schemes in Fig. 9. In particular, Fig. 9(a) compares theaverage service delay of our proposed scheme with randomcaching (RC) and Zipf caching schemes. For RC, contentsto be cached are uniformly chosen at random while for Zipfcaching, the contents are chosen based on their popularity asin (4). We first note that our proposed scheme significantlyreduces the average service delay compared to the Zipf and RCschemes under a fixed bandwidth allocation (i.e., Wd = Wb =

W/2). Particularly, for small �, the average service delay canbe reduced by nearly 100% (350%) compared to Zipf caching(RC) under the fixed bandwidth allocation scheme. Moreover,under the optimized bandwidth allocation for RC and Zipf,our proposed PC still attains the best performance among allschemes. Meanwhile, except for the RC, the average servicedelay monotonically decreases with the increase of � since asmaller number of contents will undergo the highest demand.Fig. 9(b) manifests the effect of the request arrival rate ⇣ onthe average service delay. We compare the performance ofour proposed PC under two schemes, namely, optimized and

0.5 1 1.5 20

1

2

3

4

(a) Optimized average service delay versus the popularity index.

0 0.2 0.4 0.6 0.8

0.5

1

1.5

2

2.5

3

(b) Optimized average service delay T versus the arrival rate ⇣.

Fig. 9. Comparison of the proposed joint PC and bandwidth allocation withother benchmark schemes (�p = 10 km

�2, ⌘ = 5).

equally-divided bandwidth allocation. Intuitively, the averageservice delay monotonically increases with ⇣ since largerrequest arrival rates result in a higher queuing delay for bothQd and Qb. Moreover, we note that the system might becomeunstable, i.e., the average service delay goes to infinity, when⇣ becomes considerably large. Interestingly, we see that theproposed optimal bandwidth allocation scheme is more robustin terms of stability and can significantly reduce the averageservice delay. Particularly, the proposed scheme extends thestability region of the system in terms of request arrivals whencompared to other schemes.

Fig. 10 shows the effect of the network geometry, e.g.,clusters’ density �p and displacement standard deviation �, onthe optimal allocated bandwidth W

⇤d

and the average servicedelay. In Fig. 10(a), we plot the optimal normalized bandwidthW

⇤d

Wversus the displacement standard deviation � at different

clusters’ density �p. We first observe that the normalizedoptimal bandwidth tends to increase with both � and �p. Thisbehavior can be understood in the light of (30) as follows.Firstly, the rate coverage probabilities ⌥i decrease as � and�p increase, as discussed above. Accordingly, the D2D servicerates µi =

Wdlog2(1+✓)⌥i

S̄, i 2 F , also decrease with the

increase of � and �p. However, while the D2D service rate µd

tends to decrease with the decrease of ⌥i, the optimal allocated

Authorized licensed use limited to: Oulu University. Downloaded on March 25,2020 at 06:54:39 UTC from IEEE Xplore. Restrictions apply.

Page 13: Optimized Caching and Spectrum Partitioning for D2D ...

0090-6778 (c) 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCOMM.2020.2983015, IEEETransactions on Communications

13

5 10 15 20 25 300.2

0.3

0.4

0.5

0.6

0.7

0.8

D2D bandwidth

BS-to-device bandwidth

(a) Optimal bandwidth W⇤d

W versus the displacement �

5 10 15 20 25 300

1

2

3

4

5

(b) Optimized average service delay versus the displacement �

Fig. 10. Effects of the network geometrical parameters on the average servicedelay and allocated bandwidth (� = 1.0, ⌘ = 5).

bandwidth tends to increase to compensate for the service ratedegradation, and eventually, minimizing the average servicedelay.

In Fig. 10(b), we plot the average service delay versus �

at different clusters’ density �p. We notice that the averageservice delay monotonically increases with � and �p. Thiscan be interpreted similarly to Fig. 7 and Fig. 10(a) as follows.As � and �p increase, the rate coverage probability ⌥i and,correspondingly, service rates µi will increase. This results inhigher queuing and transmission delay in Qd, and eventually,larger average service delay.

Finally, the effect of the access probability p on the averageservice delay is investigated in Fig. 11. The average servicedelay is plotted against p for our proposed PC under optimizedand equally-divided bandwidth allocation schemes. We cansee that there exists an optimal p that minimizes the averageservice delay. In essence, the value of p yields an inherenttradeoff between the channel access opportunities and theeffect of adverse interference. Clearly, our proposed bandwidthallocation attains the lowest average service delay and is seento be more robust than the equally-divided bandwidth schemein terms of stability. Particularly, the proposed scheme extendsthe stability region of the system in terms of request arrivals

0.2 0.4 0.6 0.8 10

1

2

3

4

Fig. 11. The average service delay T is plotted versus the access probabilityp (✓ = 5dB, �p = 10 km

�2, ⌘ = 5).

when compared to other schemes. Having said, the channelaccess probability can be seen as an input to the system thatreflects how individual devices will participate in the contentdelivery and sharing.

VI. CONCLUSION

In this paper, we have proposed a joint spectrum parti-tioning and content caching optimization framework that isleveraged to reduce the average service delay for clusteredD2D networks. Based on a developed spatiotemporal model,we have characterized the D2D and BS-to-device rate coverageprobabilities and the content arrival and service rates. We havethen formulated the delay joint optimization problem whosedecision variables are the content caching and bandwidthallocation. Employing a BCD optimization technique, we haveobtained the optimal allocated bandwidth in a closed-formexpression, and a suboptimal caching scheme is also provided.Our results reveal that the joint optimization of spectrumpartitioning and caching can effectively reduce the averageservice delay, e.g., by nearly 100% and 350%, compared tothe Zipf and uniform caching schemes under equal bandwidthallocations, respectively. Moreover, it is shown that the trafficload and content popularity play an important role in thedesign of resource allocation and content placement schemes.

APPENDIX APROOF OF LEMMA 1

With reference to Fig. 3, the nearest distance hi is definedas the distance from the typical device at (0, 0) to its nearestactive content provider belonging to the same cluster. Thepoint generating function (PGF) of the number of activeproviders caching content i within a ball b(o, hi) with radius

Authorized licensed use limited to: Oulu University. Downloaded on March 25,2020 at 06:54:39 UTC from IEEE Xplore. Restrictions apply.

Page 14: Optimized Caching and Spectrum Partitioning for D2D ...

0090-6778 (c) 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCOMM.2020.2983015, IEEETransactions on Communications

14

hi and centered around the origin o is

GN (#) = Eh#

Py0i2�ci

1{kx0+y0ik<hi}i

= E�c,x0

Y

y0i2�ci

h#

1{kx0+y0ik<hi}i

(a)= Ex0exp

⇣� bipn

Z

R2

(1� #1{kx0+y0ik<hi})fY 0i(y0i)dy0i

(b)= Ex0exp

⇣� bipn

Z

R2

(1� #1{kz0k<hi})fY 0i(z0 � x0)dz0

⌘,

(32)

where 1{.} is the indicator function, and x0 2 R2 is a RVmodeling the location of representative cluster’s center relativeto the origin o, with a realization X0 = x0. (a) followsfrom the probability generating functional (PGFL) of the PPP�ci along with its intensity function �ci(y) = bipnfY 0i(y0i),and (b) follows from change of variables z0 = x0 + y0i.By converting Cartesian coordinates to polar coordinates withh = kx0 + y0ik = kz0k, we get

GN (#) = EV0e�bipn

R 1h=0(1�#

1{h<hi})fH|V0(h|v0)dh

(c)= EV0e

�bipnR hi

h=0(1�#)fH|V0(h|v0)dh (d)

=

Z 1

v0=0fV0(v0)exp

⇣� bipn

Zhi

h=0(1� #)fH|V0

(h|v0) dh⌘dv0 ,

(33)

where V0 2 R is a RV modeling the distance from repre-sentative cluster’s center to the origin o, with a realizationV0 = v0 = kx0k. (c) follows from the definition of the indi-cator function 1{h < hi}, and (d) follows from unconditioingover v0.

Given the intensity �ci(y) of the Gaussian PPP �ci, follow-ing [41], we can obtain the cumulative distribution function(CDF) of the distance to the nearest content provider from:

FHi(hi) = 1�GN (0) =

1�Z 1

v0=0fV0(v0)exp

⇣� bipn̄

Zhi

0fH|V0

(h|v0) dr⌘dv0 ,

(34)

where fV0(v0) = Rayleigh(v0,�) is a Rayleigh PDF of a scaleparameter �, which models the distance V0 = kx0k betweenthe client device at the origin and the cluster center at x0,see Fig. 3. Similarly, fR|V0

(r|v0) = Rice(r; v0,�) is a RicianPDF of a shape parameter v0

2�2 , which models the distanceR = kx0 + yk between an intra-cluster active device at yrelative to the cluster center at x0 2 �p and the origin (0, 0),conditioned on V0 = kx0k = v0. Applying Leibniz integralrule, which states that:

d

dx

⇣Z b(x)

a(x)f(x, t)

⌘= f(x, b(x))

d

dxb(x)� f(x, a(x))

d

dxa(x)

+

Zb(x)

a(x)

@

@xf(x, t), (35)

we obtain the nearest distance PDF as

fHi(hi) =

@

@hi

�FHi

(hi)�=

� @

@hi

⇣Z 1

v0=0fV0(v0)exp

⇣� bin̄

Zhi

0fH|V0

(h|v0) dh⌘dv0

= �Z 1

v0=0fV0(v0)

@

@hi

exp

⇣� bin̄

Zhi

0fH|V0

(h|v0) dh⌘dv0

=

Z 1

v0=0fV0(v0)

⇣bin̄

@

@hi

Zhi

0fH|V0

(h|v0) dr⌘⇥

exp

⇣� bin̄

Zhi

0fH|V0

(h|v0) dh⌘dv0

= bipn̄

Z 1

v0=0fV0(v0)fHi|V0

(hi|v0)⇥

exp

⇣� bipn̄

Zhi

0fH|V0

(h|v0) dh⌘dv0 . (36)

APPENDIX BPROOF OF LEMMA 2

Under the proposed channel access scheme, the set Ap

1

forms a Gaussian PPP of intensity p�c(y), while Ap

2 formsa Gaussian PPP of intensity pb̄i�c(y), where bi = 1� b̄i. Withthis in mind, Laplace transform of the intra-cluster interferenceI�c

is obtained as follows: given the distance v0 from thecluster center to the origin (see Fig. 3), we have LI�c

(s|v0) =

E"e�s

⇣P

y2Ap

1gyx0

kx0+yk�↵+P

y2Ap

2gyx0

kx0+yk�↵

⌘#

= E�ci,gyx0

Y

y2Ap

1

e�sgyx0

kx0+yk�↵ Y

y2Ap

2

e�sgyx0

kx0+yk�↵

= E�ci

Y

y2Ap

1

Egyx0e�sgyx0

kx0+yk�↵

Y

y2Ap

2

Egyx0e�sgyx0

kx0+yk�↵

(a)= E�ci

Y

y2Ap

1

1

1 + skx0 + yk�↵E�ci

Y

y2Ap

2

1

1 + skx0 + yk�↵

(b)= e

�pn̄Ry2Ap

1

�1� 1

1+skx0+yk�↵

�fY (y)dy⇥

e�pb̄in̄

Ry2Ap

2

�1� 1

1+skx0+yk�↵

�fY (y)dy

,

where (a) follows from the Rayleigh fading assumption, and(b) follows from the PGFL of the Gaussian PPP �ci [13]. Bychanging the variables z0 = x0 + y with dz0 = dy, we get

LI�c(s|v0) = e

�pn̄Ry2Ap

1

�1� 1

1+skz0k�↵

�fY (z0�x0)dz0⇥

e�pb̄in̄

Ry2Ap

2

�1� 1

1+skz0k�↵

�fY (z0�x0)dz0

(c)= exp

⇣� pn̄

Z 1

r=hi

sfR(r|v0)s+ r↵

dr

⌘⇥

exp

⇣� pb̄in̄

Zhi

r=0

sfR(r|v0)s+ r↵

dr

Authorized licensed use limited to: Oulu University. Downloaded on March 25,2020 at 06:54:39 UTC from IEEE Xplore. Restrictions apply.

Page 15: Optimized Caching and Spectrum Partitioning for D2D ...

0090-6778 (c) 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCOMM.2020.2983015, IEEETransactions on Communications

15

where (c) follows from converting the cartesian coordinatesto polar coordinates, with r = kz0k. To clarify how in (c)the normal distribution fY (z0 � x0) is converted to the Ricedistribution fR(r|v0), recall first that the representative clusteris centered at x0, with a distance v0 = kx0k from the origin.Further, intra-cluster interfering devices have their coordinatesrelative to x0 chosen independently from a Gaussian distribu-tion of standard deviation �. Then, by definition, the distancer from an interfering device to the origin has a Rician PDFfR(r|v0) of a shape parameter v0

2�2 . Neglecting the correlationof the intra-cluster interfering distances, i.e., the common partx0 in r = kx0 + yk, y 2 Ap, we can obtain a simple yetaccurate expression of the Laplace transform as follows. Sinceboth the client and interfering devices have their locationsdrawn from a Gaussian distribution of variance �

2 relativeto cluster center, then, every intra-cluster interfering distancehas a Rayleigh PDF of parameter

p2�, which yields

LI�c(s) ⇡ exp

⇣� pn̄

Z 1

r=hi

s

s+ r↵fR(r) dr

⌘⇥

exp

⇣� pb̄in̄

Zhi

r=0

s

s+ r↵fR(r) dr

⌘, (37)

when the correlation is neglected. This completes the proof.

APPENDIX CPROOF OF LEMMA 3

Laplace transform of the inter-cluster interference I�!p

canbe evaluated as

LI�!p

(s) = E"e�s

P�!p

Py2Bp gyx

kx+yk�↵

#

= E�p

"Y

�!p

E�ci,gyx

Y

y2Bp

e�sgyx

kx+yk�↵

#

= E�p

"Y

�!p

E�ci

Y

y2Bp

Egyxe�sgyx

kx+yk�↵

#

(a)= E�p

"Y

�!p

E�ci

Y

y2Bp

1

1 + skx+ yk�↵

#

(b)= E�p

Y

�!p

exp

⇣� pn̄

Z

R2

⇣1� 1

1 + skx+ yk�↵

⌘fY (y) dy

(c)= exp

� �p

Z

R2

⇣1� exp

⇣� pn̄

Z

R2

⇣1�

1

1 + skx+ yk�↵

⌘fY (y) dy

⌘dx

!, (38)

where (a) follows from the Rayleigh fading assumption, (b)follows from the PGFL of the Gaussian PPP �ci, and (c)follows from the PGFL of the parent PPP �p [13]. Bychanging of variables z = x+ y with dz = dy, we get

LI�!p

(s) = exp

� �p

Z

R2

⇣1� exp

⇣� pn̄

Z

R2

⇣1�

1

1 + skzk�↵

⌘fY (z � x) dy

⌘dx

!

(d)= exp

� 2⇡�p

Z 1

v=0

⇣1� exp

⇣� pn̄

Z 1

u=0

⇣1�

1

1 + su�↵

⌘fU (u|v) du

⌘v dv

!

= exp

⇣� 2⇡�p

Z 1

v=0

⇣1� e

�pn̄'(s,v)⌘v dv

⌘, (39)

where '(s, v) =R1u=0

s

s+u↵ fU (u|v) du; (d) follows fromconverting the cartesian coordinates to polar coordinates withu = kzk. This completes the proof.

APPENDIX DPROOF OF LEMMA 4

The weighted average service delay can be rewritten as

T (b,Wd) = A

⇣WdC � ⇣A

⌘�1+B

⇣(W �Wd)C⌥b � ⌘⇣B

⌘�1,

(40)

and the delay first and second derivatives with respect to Wd

will be given, respectively, by

@T (b,Wd)

@Wd

= �AC

⇣WdC � ⇣A

⌘�2+

BC⌥b

⇣(W �Wd)C⌥b � ⌘⇣B

⌘�2, (41)

and@2T (b,Wd)

@W2d

= 2AC2⇣WdC � ⇣A

⌘�3+

2B(C⌥b)2⇣(W �Wd)C⌥b � ⌘⇣B

⌘�3. (42)

The stability conditions of Qd and Qb, respectively, require thatWdC > ⇣A, and (W�Wd)C⌥b > ⌘⇣B. Hence, @

2T (b,Wd)@W

2d

>

0, and, correspondingly, the objective function is convex w.r.t.Wd. The optimal bandwidth allocation can be directly obtainedby from @T (b,Wd)

@Wd

= 0, which yields:

AC⇣WdC � ⇣A

⌘2 =BC⌥b⇣

(W �Wd)C⌥b � ⌘⇣B

⌘2

pA

⇣(W �Wd)C⌥b � ⌘⇣B

⌘=

pB⌥b

⇣WdC � ⇣A

W⇤d=

⇣A+

qA

B⌥b

�WC⌥b � ⌘⇣B

�C + C⌥b

qA

B⌥b

� . (43)

This completes the proof.

REFERENCES

[1] K. Shanmugam, N. Golrezaei, A. G. Dimakis, A. F. Molisch, andG. Caire, “Femtocaching: Wireless content delivery through distributedcaching helpers,” IEEE Transactions on Information Theory, vol. 59,no. 12, pp. 8402–8413, December 2013.

[2] N. Golrezaei, P. Mansourifard, A. F. Molisch, and A. G. Dimakis, “Base-station assisted device-to-device communications for high-throughputwireless video networks,” IEEE Transactions on Wireless Communica-

tions, vol. 13, no. 7, pp. 3665–3676, July 2014.[3] R. Amer, M. M. Butt, M. Bennis, and N. Marchetti, “Inter-cluster

cooperation for wireless D2D caching networks,” IEEE Transactions

on Wireless Communications, vol. 17, no. 9, pp. 6108–6121, September2018.

Authorized licensed use limited to: Oulu University. Downloaded on March 25,2020 at 06:54:39 UTC from IEEE Xplore. Restrictions apply.

Page 16: Optimized Caching and Spectrum Partitioning for D2D ...

0090-6778 (c) 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCOMM.2020.2983015, IEEETransactions on Communications

16

[4] Z. Chen, N. Pappas, and M. Kountouris, “Probabilistic caching inwireless D2D networks: Cache hit optimal versus throughput optimal,”IEEE Communications Letters, vol. 21, no. 3, pp. 584–587, March 2017.

[5] B. Blaszczyszyn and A. Giovanidis, “Optimal geographic caching in cel-lular networks,” in IEEE International Conference on Communications

(ICC), June 2015, pp. 3358–3363.[6] S. H. Chae and W. Choi, “Caching placement in stochastic wireless

caching helper networks: Channel selection diversity via caching,” IEEE

Transactions on Wireless Communications, vol. 15, no. 10, pp. 6626–6637, October 2016.

[7] B. Chen, C. Yang, and A. F. Molisch, “Cache-enabled device-to-devicecommunications: Offloading gain and energy cost,” IEEE Transactions

on Wireless Communications, vol. 16, no. 7, pp. 4519–4536, July 2017.[8] B. Chen, C. Yang, and Z. Xiong, “Optimal caching and scheduling for

cache-enabled D2D communications,” IEEE Communications Letters,vol. 21, no. 5, pp. 1155–1158, May 2017.

[9] R. Amer, M. M. Butt, H. ElSawy, M. Bennis, J. Kibilda, andN. Marchetti, “On minimizing energy consumption for D2D clus-tered caching networks,” in IEEE Global Communications Conference

(GLOBECOM), December 2018, pp. 1–6.[10] R. Amer, W. Saad, H. ElSawy, M. Butt, and N. Marchetti, “Caching

to the sky: Performance analysis of cache-assisted CoMP for cellular-connected UAVs,” in Proc. of the IEEE Wireless Communications and

Networking Conference (WCNC), Marrakech, Morocco, April. 2019.[11] R. Amer, H. ElSawy, J. Kibiłda, M. M. Butt, and N. Marchetti,

“Cooperative transmission and probabilistic caching for clustered D2Dnetworks,” in IEEE Wireless Communications and Networking Confer-

ence (WCNC), April 2019, pp. 1–6.[12] J. G. Andrews, F. Baccelli, and R. K. Ganti, “A tractable approach

to coverage and rate in cellular networks,” IEEE Transactions on

Communications, vol. 59, no. 11, pp. 3122–3134, November 2011.[13] M. Haenggi, Stochastic geometry for wireless networks. Cambridge

University Press, 2012.[14] Y. Zhang, E. Pan, L. Song, W. Saad, Z. Dawy, and Z. Han, “Social

network aware device-to-device communication in wireless networks,”IEEE Transactions on Wireless Communications, vol. 14, no. 1, pp. 177–190, January 2015.

[15] X. Hu, L. Meng, and A. D. Striegel, “Evaluating the raw potential fordevice-to-device caching via co-location,” Procedia Computer Science,vol. 34, pp. 376–383, 2014.

[16] M. Afshang, H. S. Dhillon, and P. H. J. Chong, “Modeling andperformance analysis of clustered device-to-device networks,” IEEE

Transactions on Wireless Communications, vol. 15, no. 7, pp. 4957–4972, July 2016.

[17] ——, “Fundamentals of cluster-centric content placement in cache-enabled device-to-device networks,” IEEE Transactions on Communi-

cations, vol. 64, no. 6, pp. 2511–2526, June 2016.[18] N. Deng and M. Haenggi, “The benefits of hybrid caching in gauss’

poisson D2D networks,” IEEE Journal on Selected Areas in Communi-

cations, vol. 36, no. 6, pp. 1217–1230, June 2018.[19] D. Malak, M. Al-Shalash, and J. G. Andrews, “Spatially correlated con-

tent caching for device-to-device communications,” IEEE Transactions

on Wireless Communications, vol. 17, no. 1, pp. 56–70, January 2018.[20] C. Yang, Y. Yao, Z. Chen, and B. Xia, “Analysis on cache-enabled

wireless heterogeneous networks,” IEEE Transactions on Wireless Com-

munications, vol. 15, no. 1, pp. 131–145, January 2016.[21] W. Huang, W. Chen, and H. V. Poor, “Energy efficient pushing in

AWGN channels based on content request delay information,” IEEE

Transactions on Communications, vol. 66, no. 8, pp. 3667–3682, August2018.

[22] M. Dehghan, B. Jiang, A. Seetharam, T. He, T. Salonidis, J. Kurose,D. Towsley, and R. Sitaraman, “On the complexity of optimal re-quest routing and content caching in heterogeneous cache networks,”IEEE/ACM Transactions on Networking, vol. 25, no. 3, pp. 1635–1648,June 2017.

[23] H. ElSawy, A. Sultan-Salem, M. Alouini, and M. Z. Win, “Modelingand analysis of cellular networks using stochastic geometry: A tutorial,”IEEE Communications Surveys Tutorials, vol. 19, no. 1, pp. 167–203,Firstquarter 2017.

[24] L. Breslau, Pei Cao, Li Fan, G. Phillips, and S. Shenker, “Web cachingand zipf-like distributions: evidence and implications,” in 18th Annual

Joint Conference of the IEEE Computer and Communications Societies

(INFOCOM), 1999.[25] G. Paschos, E. Bastug, I. Land, G. Caire, and M. Debbah, “Wireless

caching: technical misconceptions and business barriers,” IEEE Com-

munications Magazine, vol. 54, no. 8, pp. 16–22, August 2016.

[26] S. M. Azimi, O. Simeone, A. Sengupta, and R. Tandon, “Online edgecaching and wireless delivery in fog-aided networks with dynamiccontent popularity,” IEEE Journal on Selected Areas in Communications,vol. 36, no. 6, pp. 1189–1202, June 2018.

[27] M. Leconte, G. Paschos, L. Gkatzikis, M. Draief, S. Vassilaras, andS. Chouvardas, “Placing dynamic content in caches with small popu-lation,” in 35th Annual Joint Conference of the IEEE Computer and

Communications Societies (INFOCOM), April 2016, pp. 1–9.[28] S. Tamoor-ul-Hassan, S. Samarakoon, M. Bennis, M. Latva-aho, and

C. S. Hong, “Learning-based caching in cloud-aided wireless networks,”IEEE Communications Letters, vol. 22, no. 1, pp. 137–140, January2018.

[29] M. Lee and A. F. Molisch, “Caching policy and cooperation dis-tance design for base station-assisted wireless D2D caching networks:Throughput and energy efficiency optimization and tradeoff,” IEEE

Transactions on Wireless Communications, vol. 17, no. 11, pp. 7500–7514, November 2018.

[30] Y. Zhong, T. Q. Quek, and X. Ge, “Heterogeneous cellular networks withspatio-temporal traffic: Delay analysis and scheduling,” IEEE Journal on

Selected Areas in Communications, vol. 35, no. 6, pp. 1373–1386, June2017.

[31] Y. Zhong, M. Haenggi, T. Q. Quek, and W. Zhang, “On the stabilityof static poisson networks under random access,” IEEE Transactions on

Communications, vol. 64, no. 7, pp. 2985–2998, July 2016.[32] K. Stamatiou and M. Haenggi, “Random-access poisson networks:

stability and delay,” IEEE Communications Letters, vol. 14, no. 11, pp.1035–1037, November 2010.

[33] T. Collings et al., “A queueing problem in which customers havedifferent service distributions,” Journal of the Royal Statistical Society

Series C, vol. 23, no. 1, pp. 75–82, 1974.[34] L. Kleinrock, Queueing Systems, vol. 1. NY, USA: Wiley, 1975.[35] H. Jo, Y. J. Sang, P. Xia, and J. G. Andrews, “Heterogeneous cellular

networks with flexible cell association: A comprehensive downlink SINRanalysis,” IEEE Transactions on Wireless Communications, vol. 11,no. 10, pp. 3484–3495, October 2012.

[36] Y. Zhong, M. Haenggi, F. Zheng, W. Zhang, T. Q. S. Quek, and W. Nie,“Toward a tractable delay analysis in ultra-dense networks,” IEEE

Communications Magazine, vol. 55, no. 12, pp. 103–109, December2017.

[37] R. M. Loynes, “The stability of a queue with non-independent inter-arrival and service times,” in Mathematical Proceedings of the Cam-

bridge Philosophical Society, vol. 58, no. 3, 1962, pp. 497–520.[38] S. Boyd and L. Vandenberghe, Convex optimization. Cambridge

university press, 2004.[39] S. H. Chae, T. Q. S. Quek, and W. Choi, “Content placement for wireless

cooperative caching helpers: A tradeoff between cooperative gain andcontent diversity gain,” IEEE Transactions on Wireless Communications,vol. 16, no. 10, pp. 6795–6807, October 2017.

[40] M. Ding, P. Wang, D. López-Pérez, G. Mao, and Z. Lin, “Performanceimpact of LoS and NLoS transmissions in dense cellular networks,”IEEE Transactions on Wireless Communications, vol. 15, no. 3, pp.2365–2380, March 2016.

[41] M. Afshang, C. Saha, and H. S. Dhillon, “Nearest-neighbor and con-tact distance distributions for thomas cluster process,” IEEE Wireless

Communications Letters, vol. 6, no. 1, pp. 130–133, February 2017.

Authorized licensed use limited to: Oulu University. Downloaded on March 25,2020 at 06:54:39 UTC from IEEE Xplore. Restrictions apply.

Page 17: Optimized Caching and Spectrum Partitioning for D2D ...

0090-6778 (c) 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCOMM.2020.2983015, IEEETransactions on Communications

17

Ramy Amer received the MSc degree in ElectricalEngineering from Alexandria University, Egypt, in2016. Since 2016, he is pursuing his PhD de-gree in wireless communication, especially, wire-less caching, under the supervision of Dr NicolaMarchetti at CONNECT centre, Trinity CollegeDublin, Ireland. His research interests include cross-layer design, Cognitive Radio, Energy Harvesting,Stochastic Geometry, and Reinforcement Learning.Prior to CONNECT, he was also an assistant lecturerfor the switching department, National Telecom-

munication Institute of Egypt (NTI), Cairo, Egypt, where he conductedprofessional training both at the national and international levels. He wasa visiting scholar at Wireless at Virginia Tech, with Prof Walid Saad’s groupfrom September 2018 to March 2019. He is the recipient of best paperaward from IFIP NTMS in 2019 and the IEEE student travel grant fromWCNC in 2019. He is recognized as an Exemplary Reviewer by the IEEETRANSACTIONS ON COMMUNICATIONS 2019. He is also certified as aCisco instructor and has other Cisco data and voice certificates. He workedas a part-time instructor for many national and international training centres,e.g., New-Horizon Egypt and Fast-Lane KSA.

Hesham ElSawy (S’10 – M’14 – SM’17) is an assis-tant professor at King Fahd University of Petroleumand Minerals (KFUPM), Saudi Arabia. Prior to that,he was a postdoctoral Fellow at King Abdullah Uni-versity of Science and Technology (KAUST), SaudiArabia, a research assistant at TRTech, Winnipeg,MB, Canada, and a telecommunication engineer atthe National Telecommunication Institute, Egypt.Dr. ElSawy received his Ph.D. degree in Electri-cal Engineering from the University of Manitoba,Canada, in 2014, where he received several academic

awards, including the NSERC Industrial Postgraduate Scholarship duringthe period of 2010?2013, and the TRTech Graduate Students Fellowshipin the period of 2010?2014. He co-authored three award-winning papersthat are recognized by the IEEE COMSOC Best Survey Paper Award, theBest Scientific Contribution Award to the IEEE International Symposium onWireless Systems 2017, and the Best Paper Award in Small Cell and 5GNetworks (SmallNets) Workshop of the 2015 IEEE International Conferenceon Communications (ICC). He is the recipient of the IEEE ComSoc Outstand-ing Young Researcher Award for Europe, Middle East, & Africa Region in2018. He is recognized as an exemplary reviewer by the IEEE Transactionson Communications for the three years 2014?2016, by the IEEE Transactionson Wireless Communications in 2017 and 2018, and by the IEEE WirelessCommunications Letters in 2018. His research interests include statisticalmodeling of wireless networks, stochastic geometry, and queueing analysisfor wireless communication networks.

M. Majid Butt (S’07 – M’10 – SM’15) receivedthe MSc degree in Digital Communications fromChristian Albrechts University, Kiel, Germany, in2005, and the PhD degree in Telecommunicationsfrom the Norwegian University of Science and Tech-nology, Trondheim, Norway, in 2011. He is anAssistant Professor at University of Glasgow as wellas an adjunct Assistant Professor at Trinity CollegeDublin, Ireland. Before that, he has held seniorresearcher positions at Trinity College Dublin, Ire-land and Qatar University. He is recipient of Marie

Curie Alain Bensoussan postdoctoral fellowship from European ResearchConsortium for Informatics and Mathematics (ERCIM). He held ERCIMpostdoc fellow positions at Fraunhofer Heinrich Hertz Institute, Germany, andUniversity of Luxembourg. Dr. Majid’s major areas of research interest includecommunication techniques for wireless networks with focus on radio resourceallocation, scheduling algorithms, energy efficiency and cross layer design. Hehas authored more than 50 peer reviewed conference and journal publicationsin these areas. He has served as TPC chair for various communicationworkshops in conjunction with IEEE WCNC, ICUWB, CROWNCOM, IEEEGreencom and Globecom. He is a senior member of IEEE and serves as anassociate editor for IEEE Access journal and IEEE Communication Magazinesince 2016.

Eduard Jorswieck was born in 1975 in Berlin,Germany. Since 2019, he has been the head ofthe Chair for Communications Systems and FullProfessor at Technische Universitat Braunschweig,Germany. From 2008 until 2019, he was the head ofthe Chair of Communications Theory and Full Pro-fessor at Dresden University of Technology (TUD),Germany. Eduard’s main research interests are inthe broad area of communications. He has publishedmore than 115 journal papers, 13 book chapters, 3monographs, and some 280 conference papers on

these topics. Dr. Jorswieck is IEEE Fellow. He is member of the IEEE SAMTechnical Committee since 2015. Since 2017, he serves as Editor-in-Chiefof the EURASIP Journal on Wireless Communications and Networking. Hecurrently serves on the editorial board for IEEE Transactions on InformationForensics and Security. In 2006, he received the IEEE Signal ProcessingSociety Best Paper Award.

Mehdi Bennis (S’07 – AM’08 – SM’15) receivedhis M.Sc. degree in electrical engineering jointlyfrom EPFL, Switzerland, and the Eurecom Institute,France, in 2002. He obtained his Ph.D. from theUniversity of Oulu in December 2009 on spectrumsharing for future mobile cellular systems. Currentlyhe is an associate professor at the University ofOulu and an Academy of Finland research fellow.His main research interests are in radio resourcemanagement, heterogeneous networks, game theory,and machine learning in 5G networks and beyond.

He has co-authored one book and published more than 200 research papers ininternational conferences, journals, and book chapters. He was the recipient ofthe prestigious 2015 Fred W. Ellersick Prize from the IEEE CommunicationsSociety, the 2016 Best Tutorial Prize from the IEEE Communications Society,the 2017 EURASIP Best Paper Award for the Journal of Wireless Communi-cations and Networks, and the all-University of Oulu research award.

Nicola Marchetti Dr. Nicola Marchetti is currentlyAssociate Professor in Wireless Communicationsat Trinity College Dublin, Ireland. He performshis research under the Wireless Engineering andComplexity Science lab (WhyCOM) and the IrishResearch Centre for Future Networks and Com-munications (CONNECT). He received the PhD inWireless Communications from Aalborg University,Denmark in 2007, and the M.Sc. in Electronic En-gineering from University of Ferrara, Italy in 2003.He also holds an M.Sc. in Mathematics which he

received from Aalborg University in 2010. His collaborations include researchprojects in cooperation with Nokia Bell Labs and US Air Force Office ofScientific Research, among others. His research interests include Adaptiveand Self-Organizing Networks, Complex Systems Science for CommunicationNetworks, PHY Layer, Radio Resource Management. He has authored inexcess of 130 journals and conference papers, 2 books and 8 book chapters,holds 4 patents, and received 4 best paper awards.

Authorized licensed use limited to: Oulu University. Downloaded on March 25,2020 at 06:54:39 UTC from IEEE Xplore. Restrictions apply.