Skip to main content
Log in

A game theoretical distributed approach for opportunistic caching strategy

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Wireless network virtualization (WNV) has been a hot topic recently, which can provide the customized service to construct virtual networks for various requirements quickly and flexibly by resource sharing. However, most of the traffic is generated by duplicate downloads for a few popular contents. Meanwhile, due to the isolation in the existing WNV, these popular contents cannot be shared among various requests, and thus the congestion and overhead would be caused in the remote data center. Therefore, in order to decline the congestion and overhead from the remote data center, the caching problem is addressed in this paper, which aims to overhear and cache content opportunistically to provide the quicker response for the future requests by in-network nodes. To well understand the impact of content caching, we formulate this issue as a Markov chain, and analyze the content response ratio according to the steady-state mathematically. Furthermore, we define the content caching strategy decision as an optimization problem, and use potential game to decide caching strategy based on Nash Equilibrium in a distributed manner, denoted as Game based Opportunistic Caching Strategy (GOCS). The experimental results show the effectiveness of GOCS in terms of average response hops, average cache hit ratio, data center load reduction ratio, and average resource consumption.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Cisio. (2017). Cisco visual networking index: Global mobile DataTraffic forecast. Retrieved February 18, 2017, from https://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/mobile-white-paper-c11-520862.html.

  2. Richart, M., Baliosian, J., Serrat, J., & Gorricho, J. (2016). Resource slicing in virtual wireless networks: A survey. IEEE Transactions on Network and Service Management, 13(3), 462–476.

    Article  Google Scholar 

  3. Van de Belt, J., Ahmadi, H., & Doyle, L. E. (2017). Defining and surveying wireless link virtualization and wireless network virtualization. IEEE Communications Surveys & Tutorials, 19(3), 1603–1627.

    Article  Google Scholar 

  4. Wang, X., Chen, Q., & Qiu, H. (2017). A effective two-step strategy of multi-domain virtual network embedding in 5G network slicing. In 3rd IEEE international conference on computer and communications (ICCC) (pp. 1174–1179).

  5. Hou, W., Ning, Z., Guo, L., Chen, Z., & Obaidat, M. S. (2018). Novel framework of risk-aware virtual network embedding in optical data center networks. IEEE Systems Journal, 12(3), 2473–2482.

    Article  Google Scholar 

  6. Chowdhury, M., Rahman, M. R., & Boutaba, R. (2012). ViNEYard: Virtual network embedding algorithms with coordinated node and link mapping. IEEE/ACM Transactions on Networking, 20(1), 206–219.

    Article  Google Scholar 

  7. Mijumbi, R., Serrat, J., Gorricho, J., & Boutaba, R. (2015). A path generation approach to embedding of virtual networks. IEEE Transactions on Network and Service Management, 12(3), 334–348.

    Article  Google Scholar 

  8. Cao, H., Guo, Y., Qu, Z., Wu, S., Zhu, H., & Yang, L. (2018). ER-VNE: A joint energy and revenue embedding algorithm for embedding virtual networks. IEEE Access, 6, 47815–47827.

    Article  Google Scholar 

  9. Zhang, Z., Su, S., Zhang, J., Shuang, K., & Xu, P. (2015). Energy aware virtual network embedding with dynamic demands. In IEEE international conference on communications (ICC) (pp. 5386–5391).

  10. Wang, K., Yu, F. R., Li, H., & Li, Z. (2017). Information-centric wireless networks with virtualization and D2D communications. IEEE Wireless Communications, 24(3), 104–111.

    Article  Google Scholar 

  11. Osman, Niemah Izzeldin. (2017). Will video caching remain energy efficient in future core optical networks? Digital Communications and Networks, 3, 39–46.

    Article  Google Scholar 

  12. Wang, X., Chen, M., Taleb, T., Ksentini, A., & Leung, V. C. M. (2014). Cache in the air: Exploiting content caching and delivery techniques for 5G systems. IEEE Communications Magazine, 52(2), 131–139.

    Article  Google Scholar 

  13. Zhang, M., Luo, H., & Zhang, H. (2015). A survey of caching mechanisms in information-centric networking. IEEE Communications Surveys & Tutorials, 17(3), 1473–1499.

    Article  Google Scholar 

  14. Jacobson, V., Smetters, D. K., James, F. P., Michael, B., Nicholas, B., & Rebecca, B. (2009). Networking named content. In 5th ACM international conference on emerging networking experiments and technologies (CoNEXT) (pp. 1–12).

  15. Arianfar, S., Nikander, P., & Ott, J. (2010). On content-centric router design and implications. In 6th ACM international conference on emerging networking experiments and technologies (CoNEXT).

  16. Wu, H., Li, J., & Zhi, J. (2015). MBP: A max-benefit probability-based caching strategy in information-centric networking. In 2015 IEEE international conference on communications (ICC) (pp. 5646–5651).

  17. Zhang, R., Liu, J., Huang, T., & Xie, R. (2017). Popularity based probabilistic caching strategy design for named data networking. In IEEE conference on computer communications workshops (INFOCOM WKSHPS) (pp. 476–481).

  18. Ndikumana, A., Ullah, S., LeAnh, T., Tran, N. H., & Hong, C. S. (2017). Collaborative cache allocation and computation offloading in mobile edge computing. In 19th Asia-Pacific network operations and management symposium (APNOMS) (pp. 366-369).

  19. Zhang, S., He, P., Suto, K., Yang, P., Zhao, L., & Shen, X. (2018). Cooperative edge caching in user-centric clustered mobile networks. IEEE Transactions on Mobile Computing, 17(8), 1791–1805.

    Article  Google Scholar 

  20. Hu, Z., Zheng, Z., Wang, T., Song, L., & Li, X. (2016). Game theoretic approaches for wireless proactive caching. IEEE Communications Magazine, 54(8), 37–43.

    Article  Google Scholar 

  21. Xie, J., Xie, R., Huang, T., Liu, J., Yu, F. R., & Liu, Y. (2016). Caching resource sharing in radio access networks: A game theoretic approach. Frontiers of Information Technology & Electronic Engineering, 17(12), 1253–1265.

    Article  Google Scholar 

  22. Cui, Y., Wang, Z., Yang, Y., Yang, F., Ding, L., & Qian, L. (2018). Joint and competitive caching designs in large-scale multi-tier wireless multicasting networks. IEEE Transactions on Communications, 66(7), 3108–3121.

    Article  Google Scholar 

  23. Yang, F., Wang, Z., Chen, J., & Liu, Y. (2010). VLB-VNE: A regionalized valiant load-balancing algorithm in virtual network mapping. In IEEE international conference on wireless communications, networking and information security (pp. 432–436).

  24. Gong, L., Wen, Y., Zhu, Z., & Lee, T. (2014). Toward profit-seeking virtual network embedding algorithm via global resource capacity. In IEEE INFOCOM 2014-IEEE conference on computer communications (pp. 1–9).

  25. Li, Z., Zheng, X., Zhang Y., & Xue, Q. (2017). Multi-objective virtual network embedding algorithm based on global resource capacity. In IEEE international conference on computational science and engineering and IEEE international conference on embedded and ubiquitous computing (CSE & EUC) (pp. 647–650).

  26. Feng, M., Liao, J., Wang, J., Qing, S., & Qi, Q. (2014). Topology-aware virtual network embedding based on multiple characteristics. In IEEE international conference on communications (ICC) (pp. 2956–2962).

  27. Baumgartner, A., Reddy, V. S., & Bauschert, T. (2015). Mobile core network virtualization: A model for combined virtual core network function placement and topology optimization. In 1st IEEE conference on network softwarization (NetSoft) (pp. 1–9).

  28. Breslau, L., Cao, P., Fan, L., Phillips, G., & Shenker, S. (1999). Web caching and Zipf-like distributions: Evidence and implications. In Eighteenth annual joint conference of the IEEE computer and communications societies. The future is now (Cat. No. 99CH36320) (pp. 126–134).

  29. Monderer, D., & Shapley, L. S. (1996). Potential games. Games and Economic Behavior, 14(1), 124–143.

    Article  MathSciNet  MATH  Google Scholar 

  30. MacKenzie, A. B., & DaSilva, L. A. (2006). Game theory for wireless engineers. Morgan & Claypool.

  31. Sundström, M. R. (2010). A pedagogical history of compactness. The American Mathematical Monthly, 122(7), 619–635.

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bin Cao.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This work was supported by National Natural Science Foundation of China (61701059).

Appendices

Appendix 1

Proof

Equation (15) can be rewritten as follows.

$$\begin{aligned} E({H}) = \frac{\sum \limits _{\forall i \in {\mathcal {V}}}\sum \limits _{\forall c_k \in {\mathcal {O}}}R_{k}\sum \limits _{x=0}^{H_i}xG_{i,k}(x)}{NK} \end{aligned}$$
(28)

In order to analyze that (28) is continuous and bounded, we give Theorem 1 as follows.

Theorem 1

If a function is continuous in the closed interval [ab], the function must be bounded in closed interval [ab] [31].

Because variable\(p_{i,k}\)is continuous and bounded in [0, 1], according to Eqs. (47), \(P_{mn}\)is a linear function of\(p_{i,k}\). Therefore, we can conclude that\(P_{mn}\)is a continuous and bounded function when\(p_{i,k} \in [0,1]\). Next, as\(P_{mn}\)is a variable for\(\pi _{i}(n)\)in Eq. (8), we can also derive that\(\pi _{i}(n)\)is a continuous and bounded function.Similarly, since\(G_{i,k}(x)\)is affected by\(g_{i,k}\)in Eqs. (12) and (20), it is also a continuous and bounded function when\(p_{i,k} \in [0,1]\). Finally, according to expression (28), we can conclude thatE(H) is a continuous and bounded function with\(p_{i,k}\).

Appendix 2

Proof

We define the potential function of \({\mathcal {G}}\) as

$$\begin{aligned} \begin{aligned} \Phi _i({s_{i}}, {s_{-i}}) = {\mathcal {H}}_i({s_{i}}, {s_{-i}})\\ \end{aligned} \end{aligned}$$
(29)

\(\square\)

According to Definition 2, the ith player \((\forall i \in {\mathcal {N}})\) changes its strategy from \({s_{i}}\) to \({s_{i}^{\prime }}\) (\({s_{i}}, {s_{i}^{\prime }} \in {\mathcal {S}}_i\)). The variation of cost function of the ith player is given as follows.

$$\begin{aligned} \begin{aligned} \Delta {\mathcal {H}}_i&= {\mathcal {H}}_i({s_{i}}, {s_{-i}})-{\mathcal {H}}_i({s_{i}^{\prime }}, {s_{-i}})\\&=\frac{\sum \limits _{\forall c_k \in {\mathcal {O}}}\left\{ E({H_{i, k}(s_i,s_{-i})})-E({H_{i, k}(s_{i}^{\prime },s_{-i})})\right\} }{K}. \end{aligned} \end{aligned}$$
(30)

Simultaneously, the variation of potential function is given as:

$$\begin{aligned} \begin{aligned} \Delta \Phi _i&= \Phi (s_i,s_{-i})-\Phi (s_{i}^{\prime },s_{-i})\\&=\frac{\sum \limits _{\forall c_k \in {\mathcal {O}}}\left\{ E({H_{i, k}(s_i,s_{-i})})-E({H_{i, k}(s_{i}^{\prime },s_{-i})})\right\} }{K} \\&\quad + \frac{\sum \limits _{f \ne i, \forall f \in {\mathcal {N}}}\sum \limits _{\forall c_k \in {\mathcal {O}}}\left\{ E({H_{f, k}(s_i,s_{-i})})-E({H_{f, k}(s_{i}^{\prime },s_{-i})})\right\} }{(N-1)K}\\&= \Delta {\mathcal {H}}_{i}+\Delta {\mathcal {H}}_{-i}. \end{aligned} \end{aligned}$$
(31)

The ith player changes its strategy from \(({s_i},{s_{-i}})\) to \(({s_{i}^{\prime }},{s_{-i}})\), while the other players do not change their strategies unilaterally. As a result, \(E({H_{f, k}(s_i,s_{-i})}) = E({H_{f, k}(s_{i}^{\prime },s_{-i})})\), and \(\Delta {\mathcal {H}}_{-i} = 0\). Hence, we can conclude that \({\mathcal {H}}_{i}({s_{i}}, {s_{-i}}) -{\mathcal {H}}_{i}({s_{i}^{\prime }}, {s_{-i}})= \Phi ({s_{i}}, {s_{-i}}) -\Phi ({s_{i}^{\prime }}, {s_{-i}})\). Therefore, the game \({\mathcal {G}} = [{\mathcal {N}}, \{{\mathcal {S}}_{i}\}_{i \in {\mathcal {N}}}, \{{\mathcal {H}}_{i}\}_{i \in {\mathcal {N}}}]\) is an exact potential game, and Eq. (23) is a potential function.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, Q., Wang, Y., Zhuge, L. et al. A game theoretical distributed approach for opportunistic caching strategy. Wireless Netw 25, 2817–2829 (2019). https://doi.org/10.1007/s11276-019-01996-7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-019-01996-7

Keywords

Navigation