电信科学 ›› 2017, Vol. 33 ›› Issue (3): 83-94.doi: 10.11959/j.issn.1000-0801.2017069
王莉,冯志勇,张平
修回日期:
2017-03-06
出版日期:
2017-03-01
发布日期:
2017-04-05
作者简介:
王莉(1982-),女,北京邮电大学教授、博士生导师,高性能通信与网络研究室主任,IEEE高级会员,主要从事异构网络融合、协作通信、社交网络、无线资源管理、分布式存储等方向的研究工作。作为项目负责人、主研人完成国家科技重大专项、国家“863”计划项目、国家自然科学基金项目等29项。|冯志勇(1971-),女,北京邮电大学教授、博士生导师,泛网无线通信教育部重点实验室主任,主要从事无线通信及网络方面的研究工作,在认知无线网络、宽带无线通信、无线网络资源虚拟化、频谱检测与动态频谱管理、雷达与通信一体化方面开展了系统研究。|张平(1959-),男,北京邮电大学教授、博士生导师,无线新技术研究所所长,网络与交换国家级重点实验室主任,国家自然科学基金委员会信息学部第五届咨询委员,国家重点基础研究发展计划(“973”计划)首席科学家,国家高技术研究发展计划(“863”计划)主题专家,国家科技重大专项“新一代宽带无线移动通信网”总体专家,主要研究方向为认知无线网络技术、3G/B3G/4G关键技术、MIMO-OFDM系统等。
基金资助:
Li WANG,Zhiyong FENG,Ping ZHANG
Revised:
2017-03-06
Online:
2017-03-01
Published:
2017-04-05
Supported by:
摘要:
移动社交网络平台的多元化发展与推广,使得移动用户对数据传输的需求呈爆发式增长趋势,并对匮乏的频谱资源及高负荷基站的管理提出了新挑战。为了解决这些问题,将分布式缓存系统引入无线协作网络中,鼓励移动用户间协作缓存热门内容,以实现用户间低能耗、高可靠、低时延的内容共享,同时为基站和回程链路减负。分析了无线分布式缓存系统中无线资源管理所面临的机遇和挑战,针对频谱高效、能量高效及安全传输等关键问题,围绕图论和匹配理论对无线资源管理方法展开了讨论和总结。此外,讨论和分析了挖掘和利用社交信息有效提升无线资源效率的可行性,同时对社会学和无线网络领域的交叉研究进行了展望。
中图分类号:
王莉,冯志勇,张平. 面向分布式缓存系统的无线资源管理:动机、挑战与方法[J]. 电信科学, 2017, 33(3): 83-94.
Li WANG,Zhiyong FENG,Ping ZHANG. Wireless resource allocation for distributed caching system:motivation, challenge and solution[J]. Telecommunications Science, 2017, 33(3): 83-94.
[1] | BASTUG E , BENNIS M , DEBBACAH M . Living on the edge:The role of proactive caching in 5G wireless networks[J]. IEEE Communications Magazine, 2014,52(8): 82-89. |
[2] | PIRINEN P . A brief overview of 5G research activities[C]// 2014 1st International Conferenceon 5G for Ubiquitous Connectivity(5GU), November 26-28, 2014, Akaslompolo, Finland. New Jersey: IEEE Press, 2014: 17-22. |
[3] | WUNDER G , JUNG P , KASPARICK M , et al. 5G NOW:Non-orthogonal, asynchronous waveforms for future mobile applications[J]. IEEE Communications Magazine, 2014,52(2): 97-105. |
[4] | WANG L , WU H , HAN Z . Wireless distributed storage in socially enabled D2D communications[J]. IEEE Access, 2016,4: 1971-1984. |
[5] | 徐非, 杨广文, 鞠大鹏 . 基于Peer-to-Peer的分布式存储系统的设计[J]. 软件学报, 2015,15(2): 268-277. |
XU F , YANG G W , JU D P . Design of distributed storage system on peer-to-peer structure[J]. Journal of Software, 2015,15(2): 268-277. | |
[6] | 李文中, 陈道蓄, 陆桑璐 . 分布式缓存系统中一种优化缓存部署的图算法[J]. 软件学报, 2010,21(7): 1524-1535. |
LI W Z , CHEN D X , LU S L . Graph-based optimal cache deployment algorithm for distributed caching systems[J]. Journal of Software, 2010,21(7): 1524-1535. | |
[7] | 王侃, 陈志奎 . 面向存储服务的分布式缓存系统研究[J]. 计算机工程, 2010,15(15): 80-85. |
WANG K , CHEN Z K . Research on storagese rvice-oriented distributed cache system[J]. Computer Engineering, 2010,15(15): 80-85. | |
[8] | A BBOUD A , BASTUG E , HAMIDOUCHE K , et al. Distributed caching in 5G networks: an alternating direction method of multipliers approach[C]// 2015 IEEE 16th Interna tional Workshop on Signal Processing Advancesin Wireless Communications(SPAWC), June 28-July 1, 2015, Stockholm, Swede. New Jersey: IEEE Press, 2015: 171-175. |
[9] | GOLREZAEI N , DMAKIS A G , MOLISCH A F . Scaling behavior for device-to-device communications with distributed caching[J]. IEEE Transactions on Information Theory, 2014,60(7): 4286-4298. |
[10] | 卫东升, 李钧, 王新 . 分布式存储中精确修复最小带宽再生码的性能研究[C]// 全国信息存储技术学术会议. 2012:1671-1680. |
WEI D S , LI J , WANG X . Performance study of exact minimum bandwidth regenerating codes in distributed storage[C]// The National Conference of Information, 2012:1671-1680. | |
[11] | BAI B , WANG L , HAN Z , et al. Caching based socially-aware D2D communications in wireless content delivery networks: a hypergraph framework[J]. IEEE Wireless Communications, 2016,23(4): 74-81. |
[12] | 3GPP.Proximity-based Services(ProSe)(release 12):V0.2.0[S/OL]. (2014-09-26)[2016-11-07]. . |
[13] | TEHRANI M , UYSAL M , YANIKOMEROGLU H . Device-to-device communication in 5g cellular networks: challenges, solutions, and future directions[J]. IEEE Communications Magazine, 2014,52(5): 86-92. |
[14] | ASADI A , WANG Q , MANCUSO V . survey on device-to-device communication in cellular networks[J]. IEEE Communications Survey & Tutorials, 2014,16(4): 1801-1819. |
[15] | WANG L , ARANITI G , CAO C , et al. Device-to-device users clus tering based on physical and social characteristics[J]. International Journal of Distributed Sensor Networks, 2015,11(8): 1-14. |
[16] | WANG L , WU H . Jamming partner selection for maximising the worst D2D secrecy rate based on social trust[J]. Transactions on Emerging Telecommunications Technologies, 2015, doi: 10.1002/ett.2992. |
[17] | ARANITI G , ORSINO A , MILITANO L , et al. Context-aware information diffusion for alerting messages in 5G mobile social networks[J]. IEEE Internet of Things Journal, 2016,doi:10.1109/JIOT.2016.2561839. |
[18] | ORSINO A , MILITANO L , ARANITI G , et al. Social-aware content delivery with D2D communications support for emergency scenarios in 5G systems[C]// 22th European Wireless Conference, May 18-20, 2016, Oulu, Finland.[S.l.:s.n.], 2016: 1-6. |
[19] | DIMAKIS A , RAMCHANDRAN K , WU Y , et al. A survey on network codes for distributed storage[J]. Proceedings of the IEEE, 2011,99(3): 476-489. |
[20] | DIMAKIS A , GODFREY P , WAINWRIGH M , et al. Network coding for distributed storage systems[C]// 26th IEEE International Conference on Computer Communications(IEEE INFOCOM 2007), May 6-12, Anchorage, AK, USA. New Jersey: IEEE Press, 2007: 2000-2008. |
[21] | PANTISANO F , BENNIS M , SAAD W , et al. Cache-aware user association in backhaul-constrained small cell networks[C]// International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, May 12-16, 2014, Hammamet, Tunisia. New Jersey: IEEE Press, 2014: 37-42. |
[22] | G OLREZAEI N , DIMAKIS A , MOLISCH A , et al. Wireless video content delivery through distributed caching and peer-to-peer gossiping[C]// 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers, November 6-9, 2011, Pacific Grove, California, USA. [S.l.:s.n.], 2011: 1177-1180. |
[23] | GOLREZAEI N , DIMAKIS A , MOLISCH A . Wirelessdevice-to-device communications with distributed caching[C]// Information Theory Proceedings (ISIT) 2012, June 1-6, 2012, Massachusetts, USA. New Jersey: IEEE Press, 2012: 2781-2785. |
[24] | LI J , LI B . Erasure coding for cloud storage systems: a survey[J]. Tsinghua Science and Technology, 2013,18(3): 259-272. |
[25] | HOU H , SHUM K , CHEN M , et al. Basic codes:lower-complexity regenerating codes for distributed storage systems[J]. IEEE Transactions on Information Theory, 2016,62(6): 3053-3069. |
[26] | M. KAMATH G , PRAKASH N , LALITHA P , et al. Codes with local regeneration and erasure correction[J]. IEEE Transactions on Information Theory, 2014,60(8): 4637-4660. |
[27] | LIU J , KATO N , MA J , et al. Device-to-device communication in LTE-advanced networks: a survey[J]. IEEE Communications Surveys & Tutorials, 2015,17(4): 1923-1940. |
[28] | DING Y , WANG L , WU H , et al. Performance analysis for wireless distributed storage via D2D links[C]// 2016 IEEE 84th Vehicular Technology Conference, September 18-21, 2016, Montréal,Canada. New Jersey: IEEE Press, 2016: 1-5. |
[29] | WU H , WANG L , SVENSSON T , et al. Resource allocation for wireless caching in socially-enabled D2D communications[C]// 2016 IEEE International Conference on Communications, May 22-27, 2016, Kuala Lumpur,Malaysia. New Jersey: IEEE Press, 2016: 1-6. |
[30] | WU Z , WANG L , ARANITI G , et al. Exploiting social-interest interactions on user clustering and content dissemination in device-to-device communications[C]// 2015 IEEE/CIC International Conference on Communications in China(ICCC), November 2-4, Shenzhen, China. New Jersey: IEEE Press, 2015: 1-6. |
[31] | WANG L , WU H . Fast pairing of device-to-device link underlay for spectrum sharing with cellular users[J]. IEEE Communications Letters, 2014,18(3): 1803-1806. |
[32] | VOLOSHIN V . Introduction to graph and hypergraph theory[M]. New York: Nova Science Publishers, 2009. |
[33] | WANG L , WU H , DING Y , et al. Hypergraph based wireless distributed storage optimization for cellular D2D underlay[J]. IEEE Journal on Selected Areas in Communications, 2016,34(10): 2650-2666. |
[34] | WANG L , WU H , WANG W , et al. Socially enabled wireless networks: resource allocation via bipartite graph matching[J]. IEEE Communications Magazine, 2015,53(10): 128-135. |
[35] | WANG L , TANG H , CIERNY M . Device-to-device link admission policy based on social interaction information[J]. IEEE Transactions on Vehicular Technology, 2015,64(9): 4180-4186. |
[36] | WYNER A D . The wire-tap channel[J]. The Bell Technical Journal, 1975,54(8): 1355-1387. |
[37] | WANG L , ZHANG X , MO J , et al. A secrecy evaluation scheme for infrastructure deployment in radio access network[C]// 2013 IEEE International Conference on Communications, June 9-13, 2013, Budapest,Hungary. New Jersey: IEEE Press, 2013: 2090-2094. |
[38] | CHEN G , GONG Y , XIAO P , et al. Physical layer network security in the full-duplex relay system[J]. IEEE Transaction on Information Forensics and Security, 2015,10(3): 574-583. |
[39] | WANG L , CAO C , WU H . Secure inter-cluster communications with cooperative jamming against social outcasts[J]. Computer Communications, 2015(63): 1-10. |
[40] | WANG L , WU H , STUBER G L . Cooperative jamming aided secrecy enhancement in P2P communications with social interaction constrains[J]. IEEE Transaction on Vehicular Technology, 2016,doi: 10.1109/TVT.2016.2553121. |
[41] | NEWMAN M E J . Networks an introduction[M]. New York: Oxford University Press, 2010. |
[42] | HAN X , WANG L , PARK S , et al. Alike people, alike interests? a larger-scale study on interest similarity in social networks[C]// Advances in Social Networks Analysis and Mining(ASONAM), August 17-20, Beijing,China. New Jersey: IEEE Press, 2014: 491-496. |
[43] | LI Y , WU T , HUI P , et al. Social-aware D2D communications:qualitative insights and quantitative analysis[J]. IEEE Communications Magazine, 2014,52(6): 150-158. |
[44] | LI G , WANG Y , ORGUN M. A. , et al. Finding the optimal social trust path for selection of trustworthy service providers in complex social networks[J]. IEEE Transactions on Services Computing, 2013,6(2): 152-167. |
[45] | XU S , LI X , PARKER T , et al. Exploiting trust-based social networks for distributed protection of sensitive data[J]. IEEE Transactions on Information Forensics and Security, 2011,6(1): 39-52. |
[46] | BAS E , BENNIS M , DEBBAH M . Living on the edge: the role of proactive caching in 5G wireless networks[J]. IEEE Communications Magazine, 2014,52(8): 82-89. |
[47] | LI S , XU J , SCHAARMV D , et al. Popularity-driven content caching[C]// 2016 IEEE Conference on Computer Communications, April 10-14, 2016, California,USA. New Jersey: IEEE Press, 2016: 1-9. |
[48] | FAMAEY J , ITERBEKE F , WAUTERS T , et al. Towards a predictive cache replacement strategy for multimedia content[J]. Journal of Network&Computer Applications, 2013,36(1): 219-227. |
[49] | YIU W P K , JIN X , CHAN S . VMesh:distributed segment storage for peer-to-peer interactive video streaming[J]. IEEE Journal on Selected Areas in Communications, 2007,25(9): 1717-1731. |
[50] | HONG J . Content popularity–based caching techniques for wireless content delivery[C]// 2015 International Conference on Information and Communication Technology Convergence(ICTC), October 28-30, 2015, Jeju Island,South Korea. New Jersey: IEEE Press, 2015: 1300-1302. |
[51] | ARKIN E , HASSIN R . On local search for weighted k-set packing[J]. Mathematics of Operations Research, 1998,23(3): 640-648. |
[52] | BAI B , WANG L , HAN Z , et al. Caching based socially-aware D2D communications in wireless content delivery networks: a hypergraph framework[J]. 2016,23(4): 74-81. |
[53] | FURER M , YU H . Approximating the k-set packing problem by local improvements[M]. Berlin: Combinatorial Optimization. Springer International Publishing, 2014. |
[54] | KIM T , DONG M . An iterative hungarian method to joint relay selection and resource allocation for D2D communications[J]. IEEE Wireless Communications Letters, 2014,3(6): 625-628. |
[55] | HOPCROFT J , KARP R M . An n^5/2 algorithm for maximum matchings in bipartite graphs[J]. SIAM Journal on Computing, 1973,2(4): 225-231. |
[56] | MUNKRES J . Algorithms for the assignment and transportation problems[J]. Journal of the Society for Industrial and Applied Mathematics, 1957,5(1): 32-38. |
[57] | GALE D , SHAPLEY L . College admissions and the stability of marriage[J]. The American Mathematical Monthly, 1962,69(1): 9-15. |
[58] | WANG L , STUBER G . Pairing for resource sharing in cellular device-to-device underlays[J]. IEEE Network, 2016,30(2): 122-128. |
[59] | BAI B , CHEN W , LETAIEF K , et al. A unified matching framework for multi-flow decode-and-forward cooperative networks[J]. IEEE Journal on Selected Areas in Communications, 2012,30(2): 397-406. |
[60] | CYGAN M . Improved approximation for 3-Dimensional matching via bounded pathwidth local search[J]. Annual Symposium on Foundations of Computer Science, 2013: 509-518. |
[61] | WU J . Stable matching beyond bipartite graphs[C]// IEEE International Parallel and Distributed Processing Symposium Workshops. IEEE Computer Society, May 23-27, 2016, Chicago, USA. New Jersey: IEEE Press, 2016: 480-488. |
[1] | 徐海勇,陶涛,黄岩,唐崔巍,张兆静,吴晶. 基于社交网络分析的流量红包客户挖掘与传播模式[J]. 电信科学, 2020, 36(8): 139-150. |
[2] | 张科,孙越佳,韩海. 基于协同过滤与社交网络混合算法的客户信用建模及授信方法[J]. 电信科学, 2020, 36(2): 52-60. |
[3] | 顾秋阳,吴宝,琚春华. 融入词汇共现的社交网络用户情感Biterm主题模型[J]. 电信科学, 2020, 36(11): 47-60. |
[4] | 顾秋阳,琚春华,吴功兴. 融入用户合作与领导激励的社交网络知识传播模型[J]. 电信科学, 2020, 36(10): 172-182. |
[5] | 李攀攀,谢正霞,乐光学,马柏林,陈丽,刘建华. SSDHT:基于社交网络的DHT安全增强机制[J]. 电信科学, 2018, 34(11): 10-20. |
[6] | 廖建新. 大数据技术的应用现状与展望[J]. 电信科学, 2015, 31(7): 1-12. |
[7] | 王瑞琴,潘俊,李一啸. 基于多社交数据源的协同推荐方法研究[J]. 电信科学, 2015, 31(6): 68-74. |
[8] | 沈士根,黄龙军,胡珂立,李宏杰,韩日昇,曹奇英. 基于微分博弈的在线社交网络恶意程序传播优化控制方法[J]. 电信科学, 2015, 31(10): 66-73. |
[9] | 亓晋,许斌,胡筱旋,徐匾珈,肖星琳. 基于用户行为认知的在线社交网络协同推荐[J]. 电信科学, 2015, 31(10): 108-114. |
[10] | 琚春华,黄治移,鲍福光. 融入音乐子人格特质和社交网络行为分析的音乐推荐方法[J]. 电信科学, 2015, 31(10): 115-123. |
[11] | 顾磊,王艺. 基于政府数据开放的智慧城市构建 *[J]. 电信科学, 2014, 30(11): 38-43. |
[12] | 孙晓晨,徐雅斌. 位置社交网络的潜在好友推荐模型研究[J]. 电信科学, 2014, 30(10): 71-77. |
[13] | 许晨,宋令阳. 协同异构蜂窝层叠网络中的终端直通通信技术[J]. 电信科学, 2013, 29(6): 10-16. |
[14] | 田峰,刘翰焘,周亮. 分层异构网络无线资源管理技术探讨[J]. 电信科学, 2013, 29(6): 32-38. |
[15] | 董宏成,张宁,李小文. 基于TTCN-3的RRM小区重选过程一致性测试[J]. 电信科学, 2013, 29(4): 47-50. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|