Next Article in Journal
From Seeing to Knowing with Artificial Intelligence: A Scoping Review of Point-of-Care Ultrasound in Low-Resource Settings
Previous Article in Journal
The Synergistic Effect between Precipitation and Temperature for the NDVI in Northern China from 2000 to 2018
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Maximizing the Capacity of Edge Networks with Multicasting

1
School of Computer and Information Engineering, Henan Normal University, Xinxiang 453007, China
2
Smart Business and Internet of Things Technology Henan Provincial Engineering Laboratory, Xinxiang 453007, China
*
Author to whom correspondence should be addressed.
Appl. Sci. 2023, 13(14), 8424; https://doi.org/10.3390/app13148424
Submission received: 2 July 2023 / Revised: 17 July 2023 / Accepted: 19 July 2023 / Published: 21 July 2023
(This article belongs to the Section Computing and Artificial Intelligence)

Abstract

:
Edge networks employ local computing and caching resources to process data, thus alleviating the bandwidth pressure on backbone networks and improve users’ quality of experience. System capacity is one of the key metrics to evaluate the performance of edge networks. However, maximizing system capacity in edge scenarios faces challenges due to the dynamical user sessions and the changing content popularity. This study reports on the influence of multicast communication on the capacity of edge caching networks. When large amounts of content are requested simultaneously or over a short period, one-to-one unicast transmission will consume copious network resources due to repetitious transmission. To solve this problem, this study used the one-to-many multicast scheme to realize cooperative transmission between edge servers. First, multiple copies of the content are distributed to multiple small base stations (SBSs) based on the content’s popularity and the SBSs’ cache sizes. Second, a multicast tree is constructed by using, as the root node, the SBS that stores the content. Third, the content is transmitted along the path of the multicast tree to each end-user. Finally, a simulation platform is constructed to analyze the performance of the two transmission schemes. The results of simulating on edge caching networks show that multicast communication responds well to users’ requests even when the requested content requires sudden transmission, is highly popular or is requested often within short time. This system’s capacity has been significantly improved compared to the classical methods.

1. Introduction

In the era of the “Internet of Everything”, terminals including tablets, computers, mobile phones and diverse sensors generate massive quantities of data. Huge network resources are required to process the large data flows, which often over-burdens the current cloud computing architecture. Edge computing with the locality feature is emerging as a new computing paradigm [1]. By deploying computing and caching resources to the network edge or migrating the tasks/services from the cloud to the network edge, users receive quicker responses and experience higher quality [2].
System capacity is one of the key indicators for evaluating a network’s performance. It reflects the transmission capability of a networking system per second. Gupta and Kumar [3] were the first to present the concept of wireless network capacity W L n , where W is the transmission rate of the network channel, L is the transmission distance of the content and n is the number of nodes in the network. The subsequent works follow this approach to evaluate the metric from different perspectives such as the network architecture [4], the routing model [5] and the caching strategies [6]. The key idea behind maximizing system capacity is to shorten the content transmission distance by various ingenious conceptions. Though it is well investigated in traditional wireless networks, maximizing system capacity in edge scenarios faces challenges due to the dynamical user sessions and the changing content popularity.
Local caching is one of the main features of edge networks since it reduces the access delay of content. Recent studies propose various caching schemes to improve the edge network’s performance, such as popularity-based caching [7]. Note that the same content may be requested by many users simultaneously or over a short period, for example, the requests for breaking news or major sporting events [8]. This indicates that multicast sessions can be employed in response to users’ requests and only leave content copies at branches of a multicast tree. It thus reduces the volume of repetitive transmission links, shortens the transmission distance and improves the edge caching network’s performance. However, to our knowledge, few works focus on the joint optimization of capacity by using multicasting and caching in edge computing. Related works on multicasting in traditional wireless networks neglect the impact of content caching on the system capacity, and those on edge networks employ the unicast routing model to receive/forward content item. Hence, the joint gain in capacity with multicasting and caching is not clear in edge networks.
Considering the above, we study the capacity of edge networks with respect to the multicasting and content caching. As the number of content copies affects the caching performance and the construction of multicast tree, we first calculated the optimal number of content copies based on user request volumes and the cache sizes of SBSs. Second, we constructed an efficient multicast tree to distribute the content copies. Our contributions are summarized as follows:
  • We investigated multicast communication in edge caching networks. SBS caching of the content was selected to construct the multicast tree and the content copy was held in the branch node;
  • We used the term capacity as the evaluation metric and analyzed the upper and lower bounds of system capacity. The upper bound is determined by considering the full k-ary tree and the lower bound by the assumption that multicast communication happens only at the last hop.
The remainder of this study is organized as follows. In Section 2, we review the related works. Section 3 describes the system architecture. The following four sections analyze the presentation of the system capacity. Section 8 evaluates the performance of the proposed methods. Finally, conclusions are presented in Section 9.

2. Related Work

Many factors impact system capacity. In this study, we classify the related works from the following perspectives.

2.1. Influence of Routing Scheme on the Capacity

The system capacity provides a reliable index to reflect the network performance. The papers [3,9] first proposed the computability of network capacity. The authors designed an optimal scheduling transmission scheme and established the upper limit of wireless network capacity. The authors in [10] further studied the influence of routing and scheduling algorithms on the capacity of ad hoc networks [11]. The authors used “shortest-path like” selection strategies to incorporate the path-length requirement [12]. Liu et al. [4] concluded that the gain in capacity is substantial even by minimally increasing the number of cell stations. A similar result is given in [13], where the transmission efficiency of device-to-device communication is improved with user-assisted cellular connections. In addition, the authors in [5] employed the scale-free characteristic to formulate network capacity. They rewired a small number of the links connecting to the central nodes to improve the transmission efficiency.
The aforementioned works give general solutions for computing system capacity based on the unicast routing mode. Conversely, the multicast transmission scheme has shown superiority in saving energy and improving delays [14,15,16]. Li et al. [17,18] studied the upper and lower bounds of multicast capacity in wireless networks. Their results indicate that the number of nodes in each multicast session layer plays a big role in system capacity. Furthermore, the authors of [19] showed that the achievable transmission rate per multicast session is bounded by the number of multicast flows in large-scale wireless networks. In addition, the authors of [20] studied the scaling law of capacity and delay for broadcast routing in highly mobile networks. Recent work [21] considered the capacity constraints for enabling workload sharing and load balancing between servers.

2.2. Influence of Caching Scheme on the Capacity

Recent studies show that a pre-caching scheme positively influences the network’s performance [22]. The authors of [23] analyzed the impacts of caching schemes on the wireless content distribution networks and two schemes were considered. The first is the nearest caching node scheme that responds to a user request by caching the content at the nearest node. The second is the transparent en route caching scheme that responds to a user request via an intermediate node on the route path caching the content. The authors of [24] investigated the capacity of an information-centric network when the cached content’s lifetime is limited. Liu et al. [25,26] studied the scaling law of a cache-enabled wireless network and concluded that, even if the number of nodes increases, the system’s capacity could remain unchanged under certain cache constraints. In the paper [27], the authors took the multicast routing and content caching into account. They concluded that the use of multicast transmission technology can significantly save bandwidth if each task request is processed from a local caching and computing site.

2.3. Multicasting in Edge Networks

The authors of [28] investigated the task offloading with multicast in vehicular edge networks. The study [29] studied the multicast-aware resource allocation for edge computing, and computing and caching are jointly optimized in multicast scenarios. Furthermore, the authors of [30] proposed a cooperative multicast-aware caching scheme to improve the delivery delay. The transmission bandwidth gain was analyzed in [27], where the local caching and computing policy are jointly considered subject to multicast transmission constraints.

2.4. Gap in the Existing Literature

The aforementioned works employ multicasting to improve the performance of edge networks. However, to the best of our knowledge, few works investigate the relationship between multicasting and the system capacity in edge networks. Furthermore, because of the dynamics in user sessions and content popularity, it is difficult to compute the content transmission distance. The work [27] inspired us to study the joint influence of multicast and caching on the system capacity, where the content is popular and requested by many users. This provides the basis for deploying multicast sessions in edge caching networks.

3. System Architecture

3.1. Network Model

This paper mainly studies the effect of multicasting on the capacity of edge caching networks. n SBSs are deployed in the network with a Poisson distribution intensity of λ e , and these nodes function as relays for multicast transmission. Each node has λ u π R 2 users in the coverage range, where λ u is the user distribution density and R denotes the communication range of edge servers. In addition, the entire network contains m independent content, and each SBS stores S. As shown in Figure 1, when multiple users covered by several SBSs request the same content simultaneously, the SBS caching the content is selected to transmit data to adjacent SBSs using multicasting, and distant SBSs obtain the requested content via the relay (red lines in the figure); in addition, if none of SBSs cache the content, the first SBS receiving the request forwards users’ demands to the BS. The BS then multicasts the content to the requesting users (black lines in the figure).

3.2. Multicast Tree

In contrast to the one-to-one unicast transmission mode, multicasting follows the one-to-many transmission mode. A separate link for each source-destination pair need not be established and the content copy and distribution only happens at the branches of the multicast tree.
During cooperative transmission, the relays form a multicast tree with the SBS where the content is located at the root node, and the leaf nodes are the SBSs near users that have requested the same content. In the multicast tree, if the source node or relay node has multiple child nodes, it can send content to all child nodes concurrently. Therefore, multicast can use fewer hops to achieve the same purpose, which, compared to unicast transmission, greatly reduces the transmission distance. In other words, the advantage of multicasting is that the content is only transmitted once to multiple receivers on the repeated path of multiple links. This greatly reduces the average transmission distance during dense link transmission, which indirectly affects the system capacity. In the edge network, SBSs have limited storage and computing capabilities and most tasks/services rely on cooperation between SBSs. This indicates that there are many cross-links in the network. Using multicasting to build a multicast tree for content transmission can reduce the transmission delay, optimize the network performance and increase the network capacity.
We next analyze the generalized representation of system capacity and calculate the average transmission distance in different cases.

4. Generalized Representation of Network Capacity

The classical work concludes that, when the number of nodes remains constant, the system capacity is inversely proportional to the transmission distance, that is, the smaller the transmission distance is, the larger the capacity is [31].
Let L i C i represent the transmission distance of the ith content with C i copies on average, and  p i denote its requested probability (The content popularity can follow the Zipf distribution as most related works did [26,32,33,34], or a predicating model can be used [35]). We obtain
L m = m i n i = 1 m L i C i p i .
s.t.
C i n i = 1 m C i n s
The first constraint imposes the limit that the maximum number of copies of each content item in the network cannot be bigger than the total number of SBSs, that is, to ensure that each content item has at most one copy in each SBS. The second constraint limits the total number of content copies, and these cannot exceed the total cache size. Therefore, in addition to content popularity, capacity is mainly dependent on the transmission distance L i C i , which includes two parts. The first is the cooperative transmission distance L i C i ¯ and the other is the length of the last hop, that is, the distance between the SBS and the user.
Note that each SBS has a cache size s and the total size of the content is m; the response probability that the SBS caches the requested content is therefore s m , and the probability of SBS collaboration is m s m  [36]. Then the transmission distance L m of the content can be presented as:
L m = i = 1 m L i C i p i = m s m i = 1 m L C i ¯ p i + 0 s / m p i . = m s m i = 1 m L i C i ¯ p i
where we ignore the length of the last hop because it is within the communication range R.
We replace L with L m in the formula C = W L n and obtain
C = W m ( m s ) i = 1 m L i C i ¯ p i n .
Before we analyze the average distance in the multicasting transmission, the wireless interference is firstly discussed. Let P t represent the transmission power of SBSs and V t denote the set of SBSs transmitting signals at time t. For content to be transmitted from i V t to j V t , the following path loss model is used
P t D i , j α N 0 + φ V t , φ i P t D φ , j α σ ,
where σ denotes the minimal signal-to-interference-plus-noise ratio, D i , j α is the distance between nodes i and j, N 0 is white noise and  α denotes the path-loss exponent, which describes how the signal strength decays with distance and is generally greater than two.

5. Multicast Transmission Distance

From the aforementioned analysis, the system capacity can be represented if the average transmission distance of the multicast tree can be formulated. However, it is difficult to calculate the average transmission distance since the content may be duplicated at any branch, and the distribution of branches is uncertain. To make the study more tractable, the upper and lower bound on the transmission distance are analyzed by employing the multicast tree feature. The first is the last-hop multicasting, i.e., the transmission adopts the unicast mode in the former hops and the multicast mode only occurs in the last hop as shown in Figure 2a. The second is the complete k-ary multicast tree, i.e., each branch node has k children.
We here employ Figure 2 to illustrate the difference in the two communication models. In Figure 2a, the root node needs to transmit two times for the same content if the last-hop multicasting is adopted, the number of transmitting time is only one if the complete k-ary multicasting technology is used in Figure 2b, whereas the number is four if we use the unicast communication.
The average transmission distance in the two cases can now be analyzed.

5.1. Upper Bound on the Transmission Distance

Lemma 1. 
In last-hop multicasting, the average distance from one SBS without caching the requested content to other SBSs can be calculated as
L C i ¯ = Q 1 m s C i
where Q 1 denotes s n 1 2 λ e λ u π R 2 .
The proof of Lemma 1 can be found in Appendix A. From Lemma 1, we obtain Theorem 1 as follows.
Theorem 1. 
In last-hop multicast, the system capacity can be represented as
C = W m Q 1 n i = 1 m p i C i .
Proof of Theorem 1. 
The process of proving this by replacing L C i ¯ with Equation (5) in Equation (4) is highly intuitive.    □

5.2. Lower Bound on the Transmission Distance

Lemma 2. 
In the complete k-ary multicast tree, the average distance from one SBS without caching the requested content to other SBSs is
L C i ¯ = Q 2 m s C i
where Q 2 denotes s h h 1 1 k 4 1 k h λ e λ u π R 2 .
The proof of Lemma 2 can be found in Appendix B.
Theorem 2. 
In the complete k-ary multicast, the system capacity can be represented as
C = 4 W m Q 2 n i = 1 m p i C i .
Proof of Theorem 2. 
The proof is almost identical to that of Theorem 1; it is omitted here for concision.    □

6. Optimal Number of Copies

As shown above, two factors impact on the transmission distance. The first is the number of cooperative SBSs and the second is the number of content copies. They are correlated since the number of copies relies on the multicast tree structure and the number of cooperative nodes is decided by the copy distribution method. This study investigates the first factor with the multicast tree structure, that is, the number of cooperating SBSs will not exceed the number of nodes in the tree assuming that we obtain the copy numbers. The second factor is now analyzed.

6.1. Optimal Number of Copies in the Last Hop Multicast

For convenient calculation, the optimization objective for Equation (6) becomes
m i n i = 1 m Q 1 p i C i m s .
s.t.
C i n i = 1 m C i n s
Theorem 3. 
In the proposed multicast cooperation model, the optimal solution of Equation (9) is
C i = 0 p i 0 Q 1 p i β m s 0 < p i < n 2 β m s Q 1 . n p i n 2 β m s Q 1
The proof of Theorem 3 is placed in Appendix C.

6.2. Optimal Number of Copies in the Complete K-Ary Multicast

In the complete k-ary multicast, the optimization objective becomes
m i n i = 1 m Q 2 p i m s C i .
s.t.
C i n i = 1 m C i n m
Theorem 4. 
In the proposed multicast cooperation model, the optimal solution of Equation (11) is
C i = 0 ; p i 0 Q 2 p i β m s ; 0 < p i < n 2 β m s Q 2 . n ; p i n 2 β m s Q 2
The proof of Theorem 4 is placed in Appendix D.
Theorems 3 and 4 reflect the relationship between the number of copies and the content’s popularity. When the number of nodes, the number of files and the cache size remain constant, the number of the ith content copies is mainly decided by its popularity. The more popular the content, the bigger the copy number. The next step is to distribute these copies throughout the edge caching network.

7. Multicast Network Capacity

7.1. Content Caching Algorithm

The aforementioned confirms that an efficient content caching algorithm is also important for improving the system’s performance. This is mainly because this study adopts the multicast transmission scheme and the collaborative distance between the SBS transferring the requested caching content to the SBS that received the request plays a key role in system capacity. An intuition is to place one copy in each subarea of the network to minimize the transmission distance. This is the proportional regional caching (PRC) algorithm. Specifically, first divide the SBS in the entire network into C i subareas (lines 3–5), and then store each copy in the C i subareas (lines 6–11). After that, the number of copies for the i-th content is reduced (line 12) as shown in Algorithm 1. When one copy is cached in one subarea, random caching is performed for the remaining copies.
Algorithm 1 The proportional regional caching algorithm
1:
The nodes are distributed according to the Poisson point process and the intensity is λ e .
The users are distributed according to the Poisson point process and the intensity is λ u .
2:
for  i = 1 to m do
3:
   All SBSs are divided into C i subareas
4:
   Select C i 1 cell randomly, and the number of SBSs in these cells is ceil n / C i
5:
   Divide the remaining SBSs into the last cell
6:
   for  t = 1 to C i  do
7:
     Randomly select an SBS j from cell t
8:
     while the cache size s j is equal to 0 do
9:
        Select another SBS randomly from the cell node
10:
     end while
11:
     Store content i into S B S j
12:
      c i c i 1
13:
   end for
14:
end for

7.2. Capacity

After we acquire the presentation of the optimal copy number in the two multicast schemes, the multicast capacity of the edge caching network can be presented as follows.
Theorem 5. 
The lower limitation on the system capacity with the last-hop multicast can be calculated by
C = W m Q 1 n i = 1 m p i C i .
where
C i = 0 ; p i 0 Q 1 p i β m s ; 0 < p i < n 2 β m s Q 1 n ; p i n 2 β m s Q 1
Correspondingly, Theorem 6 presents the system capacity in the complete k-array multicast.
Theorem 6. 
The upper limitation on the system capacity with the complete k-array multicast can be calculated by
C = 4 W m Q 2 n i = 1 m p i C i ,
where
C i = 0 ; p i 0 Q 2 p i β m s ; 0 < p i < n 2 β m s Q 2 n ; p i n 2 β m s Q 2

7.3. Scalability Analysis

From Theorems 5 and 6, it is clear to see that the system capacity is mainly relevant to the number of SBSs n if other parameters remain unchanged. Therefore, the system capacity tends to zero if n approaches to infinity. This result is consistent with the conclusion of [3]. However, the declining trend is slower than that of [3] because of the caching number of C i in edge scenarios.

8. Simulation Results and Performance Evaluation

8.1. Simulation Scenarios

This study converted the content transmission mode from unicasting to multicasting. This change to the transmission mode accelerated the edge network’s response to multi-user content requests, especially for highly popular breaking content. Multicast transmission alleviates the problems of network congestion and resource shortage, etc. To illustrate the superiority of the proposed scheme, this study uses the classical multicast work on network capacity [19], as a benchmark, and the paper [25], one recent but representative study on content caching networks to make a performance evaluation. In addition, we use the real data-set MovieLens as the data source to make the study as realistic as possible. This data-set contains a total of 100,000 rating records [37]. The scores of each file were summed and the normalized value was used as the file’s requested probability. Based on the normalized requested probability, the top 5000 files are selected as samples.
Table 1 shows the initial values of some key parameters used in the simulation. The following comparative tests were based on these experimental values.

8.2. Simulation Results

Figure 3 plots the networks topology and the construction process of the multicast tree. In Figure 3a, one hundred SBSs and two hundred users are distributed according to the Poisson distribution intensity λ u and λ e , respectively. Figure 3b,c show the proportional regional caching scheme, where the copy number 7 is used as an example. Figure 3d illustrates the construction process of the multicast. When one user (green dot) makes a content request, the adjacent SBS starts to request cooperation from the nearest SBS. When the SBS (small blue circle) of the content cache is found, the multicast transmission structure is established. The content is stored at the root node and starts being transmitted to the adjacent SBS with each branch. Then, if the requesting SBS is found, the transmission is stopped. Otherwise, the SBS that has received the content as the relay SBS continues to search for the most adjacent SBS and looks downstream for the transmission target until the requesting SBS is found, and the transmission process stops. Here, to facilitate viewing, the fork number of the multicast tree is taken as
Figure 4 shows the impact of the number of branches of the multicast tree on the capacity of the edge caching network. With an increase in k, the network capacity of the two schemes shows a growing trend. Multicast can directly improve the network capacity by reducing the traffic load and shortening the transmission distance. However, in the case of the full k-ary tree, when k is greater than 25, the growth trend slows down and begins to decline. Note that the rapid increase in capacity is because the cooperative transmission between SBS has changed from one-to-one unicast communication to one-to-k multicast communication, so that SBSs can simultaneously transmit content to more adjacent SBSs, reducing the transmission distance of multi-path repeated transmission; however, when the number of SBSs is kept at a certain level and is larger than its reasonable range, the overall transmission distance is limited because it is transmitted to SBSs with a longer distance, which makes the capacity growth trend worse or even lower. For the multicast tree with only the last hop, the distance reduction through multicast is very limited. When k increases, although the network capacity can be improved, the improvement speed is low. In fact, it is for this reason that only the last hop multicast tree can steadily improve the network performance with an increase in k.
The number of content copies can directly affect the transmission distance of content. Figure 5 shows that when the number of content copies increases gradually, the network capacity can grow steadily. However, as the copy number increases, the growth rate of network capacity becomes slow, and the upper and lower bounds on capacity gradually approach and tend to be stable. The reason for this trend is that when the number of content copies becomes large, the number of SBS in each subarea is small, and users in the network can obtain the requested content in the adjacent SBS. There is no need to cooperate with the remote SBS. All requests can be completed in two hops, or even one hop. In this case, all the leaf nodes are close to the root node, and the advantage of multicast becomes limited.
Figure 6 is the distribution diagram of the influence of the distribution intensity at the SBS on the network’s capacity. Generally, network capacity is improved because the distribution intensity of SBS becomes larger and the distribution is relatively dense, the distance between SBSs shortens and the capacity expands. In addition, the advantages of multicast communication are strongly apparent, and it is always superior to unicast communication. This is because multicast communication can serve multi-user requests simultaneously. Although the unicast transmission adopted in [25] does not consider the influence of SBS distribution, as the SBS distribution intensity increases, the distance between SBSs changes, therefore, capacity will also fluctuate, but generally, shows no significant improvement. The capacity change effected by the scheme proposed in this paper is always higher than that in the study [25], because as it expands, more SBSs and users serve the multicast tree, thus more rapidly improving its capacity. The capacity in [19] relies on the pair of source and destinations, therefore its optimization effect would not significantly change as the number of SBSs increases.
The parameter λ u determines the distribution density of users. A similar result is achieved in Figure 7, which verifies that the schemes proposed in this study can significantly improve the capacity with an increase in the distribution intensity of users, but there is no significant change in the papers [19,25]. This is because the proposed multicast tree structure can quickly serve more users with the increasing in λ u , which is also conducive to shortening the transmission distance and further improving the capacity.
The more times the request is sent, the more energy the system consumes, so the simulation results on energy efficiency are shown in Figure 8. The scheme proposed in this paper greatly reduces energy efficiency, and it can be seen from the figure that multicast reduces by 80 % on average. With an increase in the K value, the energy efficiency of the system increases. However, increasing in energy efficiency within multicasting is far slower than those within the unicast. This is because the multicast transmission method can quickly respond to user requests and reduce the transmission times.

9. Conclusions

To solve the problem that traditional unicast communication schemes greatly add pressure to edge networks, this study proposes that multicasting can improve the capacity of an edge caching system. Multicast communication transmits the same content to many receivers at once, and can effectively alleviate the traffic-load pressure on the edge network because a separate link need not be established for each user. Using this feature, we constructed a cooperative transmission multicast tree, where a content node is selected as the root node. This reduced the cooperative transmission distance for content and improved the network capacity. Given the last-hop multicasting and complete k-ary multicasting, a lower and upper bound on the system capacity is proposed. The simulation results verify the superiority of the proposed scheme. In future, more effective content distribution methods and root node selection schemes will be investigated to improve the edge system performance in multicasting session scenarios.

Author Contributions

Conceptualization, P.Y.; methodology, S.L.; software, M.L.; validation, C.L. and X.Z.; writing—original draft preparation, P.Y.; writing—review and editing, X.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported in part by the National Natural Science Foundation of China under Grant No. 62072159 and No. 61902112, the Science and Technology Research Project of Henan province under Grant No. 222102210011 and No. 232102211061.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. Proof of Lemma 1

Proof. 
Let X i k , y denote the distance from the kth SBS caching content i to the yth SBS and p k y denote the probability that the kth SBS caches content i and the yth SBS does not cache content i. We have
p k y = s m s m m s m m s m .
Therefore, the expectation of X i k , y is represented as
E X i k , y = s m s X i k , 1 + s m s X i k , 2 + + s m s X i k , n 1 = s m s y = 1 n 1 X i k , y .
Note that there are C i copies of content i and the average distance between two adjacent SBSs is 1 2 λ e [38]. We therefore obtain E X i k , y = s n 1 2 C i m s λ e . When the users follow the Poisson distribution with the distribution intensity λ u , each SBS covers π R 2 λ u users, hence the transmission distance of each user becomes 1 π R 2 λ u of that of unicast. Lemma 1 is thus proved. □

Appendix B. Proof of Lemma 2

Proof. 
Let h denote the depth of the complete k-ary multicast tree. The hops of the longest path in the multicast tree equal the depth h. Considering that the forwarding path may be stopped in any layer, the total hops in multicast tree thus equal to h h 1 h h 1 2 2.
Conversely, SBS follows the Poisson distribution with a distribution intensity of λ e , and k = π R 2 λ e . The number of nodes n h in the multicast tree is thus equal to ( 1 k h ) / ( 1 k ) . Note that each SBS covers π R 2 λ u users, we find that the expectation of X i k , j in this case is
E m X i k , j = 1 2 λ e × h h 1 2 1 2 λ e × h h 1 2 1 k h 1 k × π R 2 λ u 1 k h 1 k × π R 2 λ u = h h 1 4 n h λ e λ u π R 2 .
Similar to the proof of Lemma 1, the collaborating SBSs caching the content i is s m s and the number of copies is C i ; Lemma 2 is thus proved. □

Appendix C. Proof of Theorem 3

Proof. 
According to the standard form of the generalized Lagrange function, Equation (9) is described as an unconstrained single objective problem
i = 1 m Q 1 p i C i m s + i = 1 m α i C i n + β i = 1 m C i n m .
where α i and β represent Lagrange multipliers.
The corresponding Karush–Kuhn–Tucker (KKT) conditions are as follows
i = 1 m α i C i n = 0 ; α i 0 β i = 1 m C i n m = 0 ; β 0
The partial derivative of C i can thus be obtained:
L m C i = i = 1 m Q 1 p i C i 2 m s + α i + β .
Combined with the KKT condition, α is equal to zero if C i is smaller than n. Hence, the number of copies of content can be obtained as follows
C i = Q 1 p i β m s .
Because the number of allocated contents cannot be negative, i.e., not less than 0, when the value of C i is 0 we can infer
Q 1 p i β m s = 0 p i = 0 .
The number of copies per content item is limited by the number of SBSs. When C i is equal to n, the upper limitation on the number of copies can be obtained. Combined with the KKT conditions, we can obtain
Q 1 p i β m s = n p i = n 2 β m s Q 1 .

Appendix D. Proof of Theorem 4

Proof. 
According to the standard form of the generalized Lagrange function, Equation (11) is described as an unconstrained single objective problem
i = 1 m Q 2 p i m s C i + i = 1 m α i C i n + β i = 1 m C i n m .
The partial derivative of C i is
L m C i = Q 2 p i m s C i 2 + α i + β .
Let the above equation be equal to 0. The number of copies of content can be obtained as follows
C i = Q 2 p i β m s .
The number of allocated copies cannot be negative, that is, it should not be less than 0. Combined with the KKT condition, the value of α i is 0 if C i is smaller than n. Conversely, if the value of C i is 0, we have
Q 2 p i β m s = 0 p i = 0 .
Note that the number of copies per content item is bounded by the number of SBSs in the edge caching networks. The critical value of p i is
Q 2 p i β m s = n p i j = n 2 β m s Q 2 .
Because α i = Q 2 p i n m s β , thus, the optimal number of copies with the smallest transmission distance is obtained. □

References

  1. Satyanarayanan, M. The emergence of edge computing. Computer 2017, 50, 30–39. [Google Scholar] [CrossRef]
  2. Dutta, S.; Taleb, T.; Frangoudis, P.A.; Ksentini, A. On-the-fly QoE-aware transcoding in the mobile edge. In Proceedings of the 2016 IEEE Global Communications Conference (GLOBECOM), Washington, DC, USA, 4–8 December 2016; IEEE: Manhattan, NY, USA, 2016; pp. 1–6. [Google Scholar]
  3. Gupta, P.; Kumar, P.R. The capacity of wireless networks. IEEE Trans. Inf. Theory 2000, 46, 388–404. [Google Scholar] [CrossRef] [Green Version]
  4. Liu, B.; Thiran, P.; Towsley, D. Capacity of a wireless ad hoc network with infrastructure. In Proceedings of the 8th ACM International Symposium on Mobile AD HOC Networking and Computing, Montreal, QC, Canada, 9–14 September 2007; pp. 239–246. [Google Scholar]
  5. Kumari, S.; Saroha, A.; Singh, A. Efficient edge rewiring strategies for enhancement in network capacity. Phys. A Stat. Mech. Its Appl. 2020, 545, 123552. [Google Scholar] [CrossRef] [Green Version]
  6. Ji, M.; Caire, G.; Molisch, A.F. Fundamental limits of caching in wireless D2D networks. IEEE Trans. Inf. Theory 2015, 62, 849–869. [Google Scholar] [CrossRef] [Green Version]
  7. Li, S.; Xu, J.; Van Der Schaar, M.; Li, W. Popularity-driven content caching. In Proceedings of the IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications, San Francisco, CA, USA, 10–14 April 2016; IEEE: Manhattan, NY, USA, 2016; pp. 1–9. [Google Scholar]
  8. Gong, H.; Guo, C.; Liu, Y. Measuring network rationality and simulating information diffusion based on network structure. Phys. A Stat. Mech. Its Appl. 2021, 564, 125501. [Google Scholar] [CrossRef]
  9. Grossglauser, M.; Tse, D.N. Mobility increases the capacity of ad hoc wireless networks. IEEE/ACM Trans. Netw. 2002, 10, 477–486. [Google Scholar] [CrossRef]
  10. Kumar, V.A.; Marathe, M.V.; Parthasarathy, S.; Srinivasan, A. Algorithmic aspects of capacity in wireless networks. In Proceedings of the 2005 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, Banff, AB, Canada, 6–10 June 2005; pp. 133–144. [Google Scholar]
  11. Zhang, J.; Yuan, P.; Liu, P. Research and simulations of cluster routing protocols in ad hoc networks. In Proceedings of the WRI World Congress on Software Engineering, Xiamen, China, 19–21 May 2009; pp. 509–512. [Google Scholar]
  12. Yuan, P.; Pang, X.; Lin, P.; Zhang, E. FollowMe: One Social Importance-Based Collaborative Scheme in MONs. Future Internet 2019, 4, 98. [Google Scholar] [CrossRef] [Green Version]
  13. Yang, Y.; Liu, Z.; Fu, Z.; Peng, T.; Wang, W. Transmission capacity of device-to-device communication under heterogeneous networks with cellular users assisted. In Proceedings of the 2013 IEEE Globecom Workshops (GC Wkshps), Atlanta, GE, USA, 9–13 December 2013; IEEE: Manhattan, NY, USA, 2013; pp. 341–635. [Google Scholar]
  14. Jiang, D.; Xu, Z.; Li, W.; Chen, Z. Network coding-based energy-efficient multicast routing algorithm for multi-hop wireless networks. J. Syst. Softw. 2015, 104, 152–165. [Google Scholar] [CrossRef]
  15. Fu, L.; Fu, X.; Zhang, Z.; Xu, Z.; Wu, X.; Wang, X.; Lu, S. Joint optimization of multicast energy in delay-constrained mobile wireless networks. IEEE/ACM Trans. Netw. 2018, 26, 633–646. [Google Scholar] [CrossRef]
  16. Rezaei, A.; Farzinvash, L. Online QoS multicast routing in multi-channel multi-radio wireless mesh networks using network coding. In Proceedings of the 2019 9th International Conference on Computer and Knowledge Engineering (ICCKE), Mashhad, Iran, 24–25 October 2019; IEEE: Manhattan, NY, USA, 2019; pp. 53–59. [Google Scholar]
  17. Li, X.Y.; Tang, S.J.; Frieder, O. Multicast capacity for large scale wireless ad hoc networks. In Proceedings of the 13th Annual ACM International Conference on Mobile Computing and Networking, Montreal, QC, Canada, 9–14 September 2007; pp. 266–277. [Google Scholar]
  18. Wang, C.; Shao, L.; Li, Z.; Yang, L.; Li, X.Y.; Jiang, C. Capacity scaling of wireless social networks. IEEE Trans. Parallel Distrib. Syst. 2014, 26, 1839–1850. [Google Scholar] [CrossRef] [Green Version]
  19. Shakkottai, S.; Liu, X.; Srikant, R. The multicast capacity of large multihop wireless networks. In Proceedings of the 8th ACM International Symposium on Mobile AD HOC Networking and Computing, Montreal, QC, Canada, 9–14 September 2007; pp. 247–255. [Google Scholar]
  20. Talak, R.; Karaman, S.; Modiano, E. Capacity and delay scaling for broadcast transmission in highly mobile wireless networks. In Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing, Chennai, India, 10–14 July 2017; pp. 1–10. [Google Scholar]
  21. Lähderanta, T.; Leppänen, T.; Ruha, L.; Lovén, L.; Harjula, E.; Ylianttila, M.; Riekki, J.; Sillanpää, M.J. Edge computing server placement with capacitated location allocation. J. Parallel Distrib. Comput. 2021, 153, 130–149. [Google Scholar] [CrossRef]
  22. Niesen, U.; Shah, D.; Wornell, G.W. Caching in wireless networks. IEEE Trans. Inf. Theory 2012, 58, 6524–6540. [Google Scholar] [CrossRef]
  23. Liu, B.; Firoiu, V.; Kurose, J.; Leung, M.; Nanda, S. Capacity of cache enabled content distribution wireless ad hoc networks. In Proceedings of the 2014 IEEE 11th International Conference on Mobile AD HOC and Sensor Systems, Philadelphia, PA, USA, 28–30 October 2014; IEEE: Manhattan, NY, USA, 2014; pp. 309–317. [Google Scholar]
  24. Azimdoost, B.; Westphal, C.; Sadjadpour, H.R. On the throughput capacity of information-centric networks. In Proceedings of the 2013 25th International Teletraffic Congress (ITC), Shanghai, China, 10–12 September 2013; pp. 1–9. [Google Scholar]
  25. Qiu, L.; Cao, G. Popularity-aware caching increases the capacity of wireless networks. IEEE Trans. Mob. Comput. 2019, 19, 173–187. [Google Scholar] [CrossRef]
  26. Qiu, L.; Cao, G. Cache increases the capacity of wireless networks. In Proceedings of the IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications, San Francisco, CA, USA, 10–14 April 2016; IEEE: Manhattan, NY, USA, 2016; pp. 1–9. [Google Scholar]
  27. Sun, Y.; Chen, Z.; Tao, M.; Liu, H. Bandwidth gain from mobile edge computing and caching in wireless multicast systems. IEEE Trans. Wirel. Commun. 2020, 19, 3992–4007. [Google Scholar] [CrossRef] [Green Version]
  28. Li, H.; Li, X.; Zhang, M.; Ulziinyam, B. Multicast-oriented task offloading for vehicle edge computing. IEEE Access 2020, 8, 187373–187383. [Google Scholar] [CrossRef]
  29. Hao, H.; Xu, C.; Yang, S.; Zhong, L.; Muntean, G.M. Multicast-aware optimization for resource allocation with edge computing and caching. J. Netw. Comput. Appl. 2021, 193, 103195. [Google Scholar] [CrossRef]
  30. Huang, X.; Zhao, Z.; Zhang, H. Cooperate caching with multicast for mobile edge computing in 5G networks. In Proceedings of the 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), Sydney, Australia, 4–7 June 2017; IEEE: Manhattan, NY, USA, 2017; pp. 1–6. [Google Scholar]
  31. Yuan, P.; Li, S.; Cai, Y.; Zhao, X.; Tang, S.; Li, X. Maximizing the Capacity of Edge-Caching Networks with User-Content Evolution Relationship. IEEE Trans. Veh. Technol. 2022, 71, 12169–12178. [Google Scholar] [CrossRef]
  32. Spyropoulos, T.; Sermpezis, P. Soft cache hits and the impact of alternative content recommendations on mobile edge caching. In Proceedings of the Eleventh ACM Workshop on Challenged Networks, 2016, New York, NY, USA, 3–7 October 2016; pp. 51–56. [Google Scholar]
  33. Golzerai, N.; Shanmugam, K.; Dimakis, A.; Molisch, A.; Caire, G. Femtocaching: Wireless video content delivery through distributed caching helpers. In Proceedings of the IEEE International Conference on Computer Communications, Orlando, Florida, USA, 25–30 March 2012. [Google Scholar]
  34. Jiang, W.; Feng, G.; Qin, S. Optimal cooperative content caching and delivery policy for heterogeneous cellular networks. IEEE Trans. Mob. Comput. 2016, 16, 1382–1393. [Google Scholar] [CrossRef]
  35. Zhao, X.; Yuan, P.; Tang, S. Collaborative edge caching in context-aware device-to-device networks. IEEE Trans. Veh. Technol. 2018, 67, 9583–9596. [Google Scholar] [CrossRef]
  36. Yuan, P.; Cai, Y.; Huang, X.; Tang, S.; Zhao, X. Collaboration improves the capacity of mobile edge computing. IEEE Internet Things J. 2019, 6, 10610–10619. [Google Scholar] [CrossRef]
  37. Harper, F.M.; Konstan, J.A. The movielens datasets: History and context. ACM Trans. Interact. Intell. Syst. 2015, 5, 1–19. [Google Scholar] [CrossRef]
  38. Bettstetter, C. On the minimum node degree and connectivity of a wireless multihop network. In Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing, Lausanne, Switzerland, 9–11 June 2002; pp. 80–91. [Google Scholar]
Figure 1. System model.
Figure 1. System model.
Applsci 13 08424 g001
Figure 2. Two limits of multicasting. Last-hop in the left and complete k-ary in the right.
Figure 2. Two limits of multicasting. Last-hop in the left and complete k-ary in the right.
Applsci 13 08424 g002
Figure 3. Constructing process of multicast tree.
Figure 3. Constructing process of multicast tree.
Applsci 13 08424 g003
Figure 4. The fork number of the multicast tree vs. capacity.
Figure 4. The fork number of the multicast tree vs. capacity.
Applsci 13 08424 g004
Figure 5. Content copy number vs. capacity.
Figure 5. Content copy number vs. capacity.
Applsci 13 08424 g005
Figure 6. The distribution density of users vs. capacity [19,25].
Figure 6. The distribution density of users vs. capacity [19,25].
Applsci 13 08424 g006
Figure 7. The distribution density of users vs. capacity [19,25].
Figure 7. The distribution density of users vs. capacity [19,25].
Applsci 13 08424 g007
Figure 8. K vs. Energy Efficiency.
Figure 8. K vs. Energy Efficiency.
Applsci 13 08424 g008
Table 1. Initial settings of Parameters.
Table 1. Initial settings of Parameters.
Simulation area100 × 100
Number of SBSs100
Number of users200
λ e 10
λ u 20
Number of files5000
Buffer size of SBSs50
Communication range20
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Yuan, P.; Li, M.; Li, S.; Liu, C.; Zhao, X. Maximizing the Capacity of Edge Networks with Multicasting. Appl. Sci. 2023, 13, 8424. https://doi.org/10.3390/app13148424

AMA Style

Yuan P, Li M, Li S, Liu C, Zhao X. Maximizing the Capacity of Edge Networks with Multicasting. Applied Sciences. 2023; 13(14):8424. https://doi.org/10.3390/app13148424

Chicago/Turabian Style

Yuan, Peiyan, Ming Li, Shuhong Li, Chunhong Liu, and Xiaoyan Zhao. 2023. "Maximizing the Capacity of Edge Networks with Multicasting" Applied Sciences 13, no. 14: 8424. https://doi.org/10.3390/app13148424

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop