Device-to-Device Data Storage for Mobile Cellular Systems

Device-to-Device Data Storage for Mobile Cellular Systems

Joonas Pääkkönen, Camilla Hollanti, Olav Tirkkonen
Department of Communications and Networking, School of Electrical Engineering,
Department of Mathematics and System Analysis, School of Science,
Aalto University, Espoo, Finland.
{joonas.paakkonen, camilla.hollanti, olav.tirkkonen}@aalto.fi
Abstract

As an alternative to downloading content from a cellular access network, mobile devices could be used to store data files and distribute them through device-to-device (D2D) communication. We consider a D2D-based storage community that is comprised of mobile users. Assuming that transmitting data from a base station to a mobile user consumes more energy than transmitting data between two mobile users, we show that it can be beneficial to use redundant storage to ensure that data files stay available to the community even if some of the storing users leave the network. We derive a tractable closed-form equation stating when redundancy should be used in order to minimize the expected energy consumption of data retrieval. We find that replication is the preferred method of adding redundancy as opposed to regenerating codes. Our findings are verified by computer simulations.

I Introduction

The amount of mobile data traffic is growing tremendously. The total global mobile traffic was about petabytes per month at the end of 2012, and is expected to keep increasing [1]. As traditional techniques for increasing the capacity of wireless systems have their limits, new ways of reducing the load of the access network are needed.

Recently, device-to-device (D2D) communication has been suggested as a means of increasing the capacity and the throughput of cellular systems, as well as improving the energy consumption of user devices, see [2]-[4]. As the storage capacity of mobile devices increases, data files could be stored and retrieved from the mobile users themselves in order to offload download traffic from the infrastructure network. Distributed storage in Delay Tolerant, Ad Hoc and D2D networks has been suggested in [5, 6, 7]. In these, mobile terminals (with backup connections to an infrastructure network) are used to cache and distribute data files. To increase the reliability of transmissions within the storage community, packet level erasure coding is investigated in [8].

In this paper, we concentrate on a system consisting of a base station and a set of mobile users within the range of the base station, forming a D2D storage community. The community consists of mobile users that will, sooner or later, leave the system. In order to avoid losing stored data files, redundancy can be added to the stored data. The simplest way to do this is to store several copies of the files. However, erasure coding can increase the performance of distributed data storage [9]. Further, codes that are tailor-made for distributed storage can improve system performance [10].

We apply regenerating codes [11] to a D2D storage community and assess their performance. In [12], we investigated a similar system, under more complicated assumptions. Here, we assume a wide-sense stationary storage community, with a constant expected number of nodes. We assume that the community is able to recover and regenerate the lost data after each single node departure before another departure takes place . We concentrate on the communication cost incurred by file requests and storage regeneration, assuming that the nodes have infinite storage capacities.

We find that, under the considered system assumptions, the simplest method of storing redundancy, i.e. storing one redundant replica of a file, is also the optimal method in terms of energy consumption.

It should be noted that, in this paper, we fully confine ourselves to assessing the theoretical performance of the storage and distribution methods at hand, and that we do not discuss the practical implementation of such methods. Likewise, we do not go into D2D device discovery, signaling, synchronization, power control, code construction etc.

The remainder of this paper is organized as follows: Section II explains the system model that we use throughout this paper. Section III derives analytical expressions for the select distribution methods. Section IV shows both theoretical and simulated numerical results. Finally, section V provides concluding remarks.

Ii System Model

We consider a wireless cellular system where mobile devices, referred to as nodes, roam freely in and out of a geographically limited area. We assume that the nodes themselves can be used to store (cache) data and they can, upon request, transmit data to one another.

A set of nodes that are within a specified distance from each other forms a storage community, or a local network. The local nodes can communicate with each other in D2D mode, without the help of the base station. Also, the base station can be used to transmit data to the nodes but there is no need to relay data from a node to another node via the base station.

Nodes arrive in the system according to a Poisson process with exponentially distributed inter-arrival times. The expected time for which a single node sojourns in the system is denoted by , the expected node lifetime. The expected number of nodes in the system is denoted by . By Little’s law [13], the arrival rate of the nodes is . The expected inter-arrival time of two consecutive nodes is , which is also the expected time between two consecutive node departures. These times are exponentially distributed. The flow into system equals the flow out of the system, and the number of nodes fluctuates around . Fig. 1 exemplifies this fluctuation.

Fig. 1: An example realization of the number of nodes in the system. Here the expected number of nodes is and the expected node lifetime is .

The time development of the number of local nodes can, thus, be described with the M/M/ Markov model, depicted in Fig. 2. The steady-state probabilities for the M/M/ model are well-known [14]. The probability that there are nodes in the system is

(1)

Fig. 2: The M/M/ Markov chain state diagram for the number of local nodes. The name of the state corresponds to the number of nodes (blue). The incoming rate (green) of the nodes is constant, whereas the outgoing rate (red) is proportional to the number of nodes in the system. The expected number of nodes is and .

We assume that local nodes themselves can be used to cache data. For simplicity, we assume that the storage capacity of each node is infinite. We rationalize this by observing that the storage capacity of mobile devices has been dramatically increasing. This is why we presume that each node has some free capacity that could be used for the common good.

The main motivation for assuming an infinite storage capacity is that the storage problem of multiple files decouples. Accordingly, it is sufficient to consider the storage and distribution problem of a single file, with a specified request rate.

We denote the request rate of one file by one local node by . The inter-arrival time of two consecutive file requests follow the exponential distribution with mean .

We normalize the size of the file to (bit). Similarly, we say that the cost (in transmit energy) of transmitting one file from a local node to another local node is also (joule). All the simplifying assumptions mentioned here allow for tractable, tangible results.

We assume that there is one data file. At random time instants, local nodes request the file and download it. The file can either be retrieved from the base station or from the local nodes through D2D communications. It is, on average, times as expensive to download a bit from the base station as compared to downloading a bit from another local node, with . The caching model is depicted in Fig. 3.

The downloading node can download the file from the local nodes only if the file is cached. In this paper, we compare two caching methods:

  • Simple caching: If the requested file is already cached on another local node, the caching node transmits the file to the requesting node in D2D mode. If the file is not cached on any of the local nodes, the base station transmits the file to the requesting node. Thence, the requesting node caches the file and, later on, transmits it to other users upon request. Only one local node at a time is caching the data file and, thus, there is no redundancy.

  • Redundant caching: A subset of the local nodes is used to transmit parts of the file to the downloading node and the original file is reconstructed at the downloading node. Two or more nodes are caching the file or a fraction of the file. One of the caching nodes is redundant.

The simplest way of redundant caching is allocating two exact replicas of the whole file on two different nodes. We call this method 2-replication.

Retrieving a file from the base station is never beneficial as long as the file is available in the storage community, and it is more expensive to retrieve data from the base station than to retrieve data from another node.

We assume that the file is always available – only the cost (in transmit energy) and the data traffic load on the base station change depending on the distribution method. Whether it is beneficial to use simple caching or redundant caching depends on the system parameters and the popularity (request rate) of the requested file.

BS

R

1

Fig. 3: A node (blue) requesting the file. Two local nodes (green) are caching a copy of the file (2-replication). Other nodes (gray) stay idle. We say that the cost of transmitting the file from a caching node is , while the cost of transmitting the file from the base station (BS) is .

We define the cost as the expected total amount of transmit energy per time unit that must be used by the local nodes and the base station. Our objective is to find expressions for the expected total cost of different distribution methods given the system parameters and . Eventually, we find the distribution method that yields the smallest expected cost given the aforementioned system parameters.

Iii Analysis

In this section, we derive closed-form expressions (approximations) for the expected total costs of simple caching and redundant caching. Later in this section, we compare these methods with each other.

Iii-a Simple caching

Initially, suppose that the file is already cached on one of the local nodes. Thus, as long as the node that is caching the file stays in the system, all file requests result in retrievals from this node. There are on average local nodes that generate requests, each at rate , and the expected lifetime of any of the nodes is . Therefore, the expected number of requests during the lifetime of the caching node is .

Now suppose that the cost of retrieving the file (of size ) from another local node is simply . Hence, the expected cost of downloading the file from the base station is . If the caching node has left the system, the next node that requests the file has to download it from the base station. The expected time in which this happens is as the expected total request rate is . Thus, the time in which an expected number of requests are generated is . The expected cost of these requests is and, thereby, the expected cost of simple caching becomes:

(2)

Iii-B Redundant caching

Here we use a regenerating code [11] to cache the file on a set of local nodes in a distributed manner. Thus, any nodes that are caching an encoded fraction of the file can be used to reconstruct or repair the file. The file is fractioned into encoded blocks and one block is allocated to different caching nodes. One block is redundancy, and . Hence, should any of the caching nodes leave the system, the remaining (surviving) nodes can be used to regenerate the lost block.

The repair bandwidth of a regenerating code is defined as the number of data communicated when a lost block is regenerated. As we consider infinite storage capacities, only the repair bandwidth of is relevant. For this reason, we choose to use the Minimum Bandwidth Regenerating (MBR) code (see Fig. 4).

Fig. 4: Regenerating codes can be used to repair a lost encoded block by only transmitting a number of data equal to the block size. The code that achieves this property is called the Minimum Bandwidth Regenerating (MBR) code (rightmost point). Traditional erasure coding (leftmost point) requires the whole data object to be communicated. Here the file size () is .

Whenever there is a failure, i.e. one of the caching nodes leaves the system, the lost block is repaired to another local node. This requires bits to be transmitted for the MBR code with repair degree [11]. The repair bandwidth of an MBR code is equal to the size of the encoded (cached) block . Thus, in total, bits must be transmitted whenever a local node downloads the file from a set of caching nodes.

Next, we derive an approximation for the expected cost of redundant caching with the regenerating code. We note that the expected state of the system is such that there are nodes in the system and out of these nodes are caching an encoded data block. The expected sojourn time of all of these nodes in the system equals the expected node lifetime . When one of these caching nodes leaves, bits need to be communicated in order to repair the lost data block and store it on another node. Setting the cost of transmitting a bit from a local node to another local node to , the expected repair cost becomes

(3)

which is, interestingly, independent of , and equals the cost of the repair process of 2-replication111The expected repair cost of 2-replication is as there are two blocks, each of size (the file size). The process of 2-replication is depicted in Fig. 5. Even though increasing decreases the repair bandwidth , it also increases the expected number of failures, as a failure takes place whenever a caching node leaves the system. These effects cancel out each other.

For simplicity, let us assume that the number of local nodes never drops below and the repair process is so fast (immediate) that no nodes leave the system before the repair process is complete. Thence, we never need to reallocate data from the base station, and only repairs incur upkeep costs. Therefore, the expected cost per time unit of redundant caching becomes

as all requests result in local downloads and the expected cost of retrieving (reconstructing) the file is . It is easy to see that is minimized at . This is not a regenerating code – the method that minimizes the expected total cost of redundant caching is 2-replication. Note that also minimizes the probability that a file request results in a local download. This is because in order for a local request to take place, there must to be at least nodes in the system. The expected cost of 2-replication becomes

(4)

It should be noted that more than two copies of the file could be replicated on the nodes. The derivation of the cost in this case would be similar. Having more than just two copies of the file would enable the system to withstand more than one caching node leaving the system. However, as we assume that the file can be repaired before another node leaves the system, we restrict ourselves to the case where there is only one redundant copy of the data file in the system.

Besides having the smallest possible repair bandwidth, another benefit of 2-replication over regenerating codes is its simplicity. There is no need to perform excessive computations when the file is reconstructed or requested—the file is simply copied from a caching to the requesting node. Similarly, at repair, the file is simply copied to the newcomer node. See Fig. 5 for an illustration of the repair process.

departure

repair

Fig. 5: Repair of 2-replication. If a caching node (orange) leaves the system, the surviving caching node (green) can repair the file by sending a copy of the file to an idle node. This node stores the copy and, thereby, becomes the new caching node (newcomer, yellow).

If 2-replication is used, the file, or a redundant copy of the file, needs to be reallocated from the base station only if the number of nodes drops below two. According to (1), the probability of this is . For large , we can approximate this to be zero (for instance, already for ). This is the reason why we ignore the cost of reallocating the file to the nodes from the base station. This is also the reason why we assume that, when 2-replication is used, there is always a node to which we can copy the file whenever a caching node leaves the system. This allows us to approximate the total repair cost in (3) as , as discussed earlier.

Iii-C Comparison

Here we derive a straightforward decision rule on when to use simple caching (without redundancy) and when to use redundant caching (2-replication with one redundant copy). Simply by setting ((2), (4)), we find that redundant caching outperforms simple caching if

which yields

(5)

Fig. 6 shows the decision boundary of (5). It is interesting to note that as long as , the best method is, independently of the other parameters, simple caching. Also, note that can be interpreted as the expected number of file requests made in the system during the lifetime of a single node. For example, if the expected number of requests during the lifetime of a node is greater than two, is enough to justify redundant caching.

Fig. 6: Cost ratio threshold. Whenever (white region), 2-replication yields the lowest expected cost. Otherwise (red region), simple caching should be used instead.

It might seem tempting to use redundant caching (2-replication) over simple caching whenever condition (5) is met. However, simple caching only takes up half of the storage space of 2-replication. Consequently, simple caching can store twice as many files as 2-replication. In addition, 2-replication requires a D2D connection to be established for the repair process whenever a caching node leaves the system.

Even though D2D data distribution may reduce the traffic load on the base station and decrease the overall power consumption, it should be noted that the power consumption of the users that store and distribute data may increase considerably. This is why the caching users should be provided with perks, e.g. they could be granted more download bandwidth.

Table I concludes this section by comparing the expected costs (or their approximations) of the considered caching methods.

method caching nodes cost (per time)
base station only
simple caching
2-replication
regenerating code
TABLE I: Comparison of caching methods

Iv Numerical Results

This section provides simulation results of the expected cost for simple caching and 2-replication. All the simulations are conducted over time units, where is the expected node lifetime, and the average cost per time unit over the runs is presented. Simulation results are compared with the theoretical results. Overall, it can be concluded that the expected theoretical values coincide with the average simulated values. However, there is some (yet negligible) discrepancy due to the random nature of the simulations.

Figures 7 and 8 illustrate the expected theoretical costs and the average simulated costs as functions of the expected cost ratio and the expected number of nodes , respectively. The expected cost behaves similarly as a function and (see Table I).

Fig. 7: Expected cost vs. cost ratio with parameter values and . The cost of simple caching is linear w.r.t. , while the cost of 2-replication is practically independent of . The simulation results are well in line with Equation (5); 2-replication outperforms simple caching as long as .
Fig. 8: Expected cost vs. expected number of nodes with parameter values and .
Fig. 9: Expected cost vs. expected node lifetime with parameter values and . As tends to infinity, the expected cost of simple caching tends to as does that of 2-replication (Table I). As tends to , the expected cost of 2-replication tends to infinity, while the expected cost of simple caching tends to (2).

Finally, Fig. 9 shows the expected theoretical costs and the average simulated costs as functions of the expected node lifetime . As tends to infinity, the expected cost of simple caching tends to that of 2-replication, namely, (Table I). This means that if the nodes stay in the system for a long period of time, all the file requests result in local downloads from the caching nodes and the distribution method is irrelevant. Conversely, if tends to , the expected cost of 2-replication tends to infinity, while the expected cost of simple caching tends to (2). Thus, 2-replication should not be used for highly unstable systems with short node lifetimes – a short node lifetime implies a high departure rate of caching nodes and, consequently, a high repair cost.

V Conclusions

We have shown that, for the regenerating code, the expected total repair bandwidth is practically independent of and coincides with that of 2-replication. Also, we have demonstrated that, under our assumptions, the expected total cost of 2-replication is lower than that of the aforementioned regenerating code. Finally, we have found a simple decision rule for choosing between simple caching and 2-replication in order to minimize the expected total cost in terms of energy consumption.

References

  • [1] Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2012-2017. [Online]. Available: http://www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/
    ns705/ns827/white_paper_c11-520862pdf.
  • [2] B. Kaufman, and B. Aazhang, ”Cellular networks with an overlaid device to device network,” Asilomar Conference on Signals, Systems and Computers, pp. 1537-1541, Oct. 2008.
  • [3] C.-H. Yu, O. Tirkkonen, K. Doppler and C. Ribeiro, “On the performance of Device-to-Device underlay communication with simple power control,” IEEE VTC–Spring, 5 pp., April 2009.
  • [4] M. Belleschi, G. Fodor, and A. Abrardo, “Performance Analysis of a Distributed Resource Allocation Scheme for D2D Communications,” IEEE Workshop on Machine-to-Machine Communications, December 2011.
  • [5] J. Ott and M. Pitkänen. DTN-based Content Storage and Retrieval. IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications (AOC), June 2007.
  • [6] V. Lenders, G. Karlsson, and M. May, “Wireless Ad Hoc Podcasting,” IEEE Conference on Sensor, Mesh, and Ad Hoc Communications and Networks (SECON), June 2007.
  • [7] N. Golrezaei, A. G. Dimakis, and A. F. Molisch, “Base Station Assisted Device-to-Device Communications for High-Throughput Wireless Video Networks,” IEEE International Conference on Communications, Realizing Advanced Video Optimized Wireless Networks, 2012.
  • [8] M. Pitkänen, and J. Ott, ”Redundancy and distributed caching in mobile DTNs,” CM/IEEE international workshop on Mobility in the evolving internet architecture, 7 pp. Aug. 2007.
  • [9] H. Weatherspoon, and J. D. Kubiatowicz, “Erasure coding vs. replication: a quantitative comparison,” in Proc. International Workshop on Peer-to-Peer Systems, March, 2002.
  • [10] A. Datta, and F. Oggier, “An Overview of Codes Tailor-made for Networked Distributed Data Storage,” Association for Computing Machinery Special Interest Group on Algorithms and Computation Theory News, vol. 44, no. 1, March 2013, pp. 89-105.
  • [11] A. G. Dimakis, P. B. Godfrey, Y. Wu, M. O. Wainwright, and K. Ramchandran, “Network coding for distributed storage systems,” IEEE Transactions on Information Theory, vol. 56, no. 9, pp. 4539-4551, September, 2010.
  • [12] J. Pääkkönen, P. Dharmawansa, C. Hollanti, and O. Tirkkonen, “Distributed Storage for Proximity Based Services,” in Proc. IEEE Swedish Communication Technologies Workshop, October, 2012, pp. 30-35.
  • [13] Allen, A. O., Probability, Statistics, and Queueing Theory: With Computer Science Applications. Gulf Professional Publishing, 1990, pp. 259.
  • [14] P. Harrison, and N. M. Patel, Performance Modelling of Communication Networks and Computer Architectures. Addison-Wesley, 1992, pp. 173.
Comments 0
Request Comment
You are adding the first comment!
How to quickly get a good reply:
  • Give credit where it’s due by listing out the positive aspects of a paper before getting into which changes should be made.
  • Be specific in your critique, and provide supporting evidence with appropriate references to substantiate general statements.
  • Your comment should inspire ideas to flow and help the author improves the paper.

The better we are at sharing our knowledge with each other, the faster we move forward.
""
The feedback must be of minimum 40 characters and the title a minimum of 5 characters
   
Add comment
Cancel
Loading ...
255364
This is a comment super asjknd jkasnjk adsnkj
Upvote
Downvote
""
The feedback must be of minumum 40 characters
The feedback must be of minumum 40 characters
Submit
Cancel

You are asking your first question!
How to quickly get a good answer:
  • Keep your question short and to the point
  • Check for grammar or spelling errors.
  • Phrase it like a question
Test
Test description