Joint and Competitive Caching Designs in Large-Scale Multi-Tier Wireless Multicasting Networks

Similar documents
Joint and Competitive Caching Designs in Large-Scale Multi-Tier Wireless Multicasting Networks

Analysis and Optimization of Caching and Multicasting for Multi-Quality Videos in Large-Scale Wireless Networks

Stochastic Content-Centric Multicast Scheduling for Cache-Enabled Heterogeneous Cellular Networks

Average Throughput Analysis of Downlink Cellular Networks with Multi-Antenna Base Stations

Cache-Enabled Heterogeneous Cellular Networks: Optimal Tier- Level Content Placement. Title. Wen, W; Huang, K; Yang, S.; Li, VOK

Call Completion Probability in Heterogeneous Networks with Energy Harvesting Base Stations

Applications of Robust Optimization in Signal Processing: Beamforming and Power Control Fall 2012

Caching Policy Toward Maximal Success Probability and Area Spectral Efficiency of Cache-enabled HetNets

User Association with Unequal User Priorities in Heterogeneous Cellular Networks

Energy-Efficient Resource Allocation for Multi-User Mobile Edge Computing

PERFORMANCE COMPARISON OF DATA-SHARING AND COMPRESSION STRATEGIES FOR CLOUD RADIO ACCESS NETWORKS. Pratik Patil, Binbin Dai, and Wei Yu

Optimal Geographical Caching in Heterogeneous Cellular Networks

Resource Management and Interference Control in Distributed Multi-Tier and D2D Systems. Ali Ramezani-Kebrya

Optimization in Wireless Communication

Optimal Power Control in Decentralized Gaussian Multiple Access Channels

Machine-Type Communication with Random Access and Data Aggregation: A Stochastic Geometry Approach

Massive MIMO for Maximum Spectral Efficiency Mérouane Debbah

Game Theoretic Approach to Power Control in Cellular CDMA

Nash Bargaining in Beamforming Games with Quantized CSI in Two-user Interference Channels

Gibbsian On-Line Distributed Content Caching Strategy for Cellular Networks

Mobile Network Energy Efficiency Optimization in MIMO Multi-Cell Systems

Outage and Capacity of Heterogeneous Cellular Networks with Intra-tier Dependence

THE dramatically increased mobile traffic can easily lead

ECE Optimization for wireless networks Final. minimize f o (x) s.t. Ax = b,

6.254 : Game Theory with Engineering Applications Lecture 7: Supermodular Games

Characterization of Convex and Concave Resource Allocation Problems in Interference Coupled Wireless Systems

NOMA: An Information Theoretic Perspective

Analysis of Urban Millimeter Wave Microcellular Networks

Revisiting Frequency Reuse towards Supporting Ultra-Reliable Ubiquitous-Rate Communication

Distributed power allocation for D2D communications underlaying/overlaying OFDMA cellular networks

Dynamic Spectrum Leasing with Two Sellers

A Tractable Approach to Uplink Spectral Efficiency of Two-Tier Massive MIMO Cellular HetNets

Exploiting Mobility in Cache-Assisted D2D Networks: Performance Analysis and Optimization

Channel Allocation Using Pricing in Satellite Networks

Game Theoretic Solutions for Precoding Strategies over the Interference Channel

DOWNLINK transmit beamforming has recently received

Optimal Power Allocation for Parallel Gaussian Broadcast Channels with Independent and Common Information

Green Heterogeneous Networks through Dynamic Small-Cell Operation

MULTI-INPUT multi-output (MIMO) channels, usually

AN EXTERNALITY BASED DECENTRALIZED OPTIMAL POWER ALLOCATION SCHEME FOR WIRELESS MESH NETWORKS

Uplink Performance Analysis of Dense Cellular Networks with LoS and NLoS Transmissions

Information Theory Meets Game Theory on The Interference Channel

Energy-Efficient Resource Allocation for

STABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS

NOMA: Principles and Recent Results

Distributed Joint Offloading Decision and Resource Allocation for Multi-User Mobile Edge Computing: A Game Theory Approach

Success Probability and Area Spectral Efficiency in Multiuser MIMO HetNets

Pricing and Resource Allocation via Game Theory for a Small-Cell Video Caching System

Ressource Allocation Schemes for D2D Communications

Sum-Rate Capacity of Poisson MIMO Multiple-Access Channels

Two-Stage Channel Feedback for Beamforming and Scheduling in Network MIMO Systems

Signaling Design of Two-Way MIMO Full-Duplex Channel: Optimality Under Imperfect Transmit Front-End Chain

Coded Caching for Multi-level Popularity and Access

Front Inform Technol Electron Eng

Energy Harvesting Multiple Access Channel with Peak Temperature Constraints

4888 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 7, JULY 2016

Under sum power constraint, the capacity of MIMO channels

Delay QoS Provisioning and Optimal Resource Allocation for Wireless Networks

Optimal Linear Precoding Strategies for Wideband Non-Cooperative Systems based on Game Theory-Part II: Algorithms

Cell throughput analysis of the Proportional Fair scheduler in the single cell environment

Node-based Distributed Optimal Control of Wireless Networks

Optimal Power Allocation With Statistical QoS Provisioning for D2D and Cellular Communications Over Underlaying Wireless Networks

Uniqueness of Generalized Equilibrium for Box Constrained Problems and Applications

Dirty Paper Coding vs. TDMA for MIMO Broadcast Channels

Performance Limits of Coded Caching under Heterogeneous Settings Xiaojun Lin Associate Professor, Purdue University

Capacity and Scheduling in Small-Cell HetNets

Optimal Resource Allocation for Multi-User MEC with Arbitrary Task Arrival Times and Deadlines

Cognitive Hierarchy Theory for Distributed Resource Allocation in the Internet of Things

Asymptotics and Meta-Distribution of the Signal-to-Interference Ratio in Wireless Networks

Autonomous Uplink Intercell Interference Coordination in OFDMA-based Wireless Systems

Policy Optimization for Content Push via. Energy Harvesting Small Cells in Heterogeneous Networks

SIR Distribution and Scheduling Gain of Normalized SNR Scheduling in Poisson Networks

Joint Downlink Base Station Association and Power Control for Max-Min Fairness: Computation and Complexity

Power Control in Multi-Carrier CDMA Systems

Multiuser Downlink Beamforming: Rank-Constrained SDP

Optimization of Multistatic Cloud Radar with Multiple-Access Wireless Backhaul

Coverage and Area Spectral Efficiency of Clustered Device-to-Device Networks

Distributed Power Control for Time Varying Wireless Networks: Optimality and Convergence

Markov decision processes with threshold-based piecewise-linear optimal policies

L interférence dans les réseaux non filaires

The Economics of Video Websites with Membership-Advertising Mode in Wireless Networks

Energy-Efficient Resource Allocation for Cache-Assisted Mobile Edge Computing

Competitive Scheduling in Wireless Collision Channels with Correlated Channel State

USING multiple antennas has been shown to increase the

Channel Hardening and Favorable Propagation in Cell-Free Massive MIMO with Stochastic Geometry

Minimax Problems. Daniel P. Palomar. Hong Kong University of Science and Technolgy (HKUST)

THE IC-BASED DETECTION ALGORITHM IN THE UPLINK LARGE-SCALE MIMO SYSTEM. Received November 2016; revised March 2017

Cache-Enabled Opportunistic Cooperative MIMO for Video Streaming in Wireless Systems

This is a repository copy of HetNets with Random DTX Scheme: Local Delay and Energy Efficiency.

A Novel Iterative Convex Approximation Method

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS 1. WIRELESS data traffic is expected to increase exponen- 35

Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users

Distributed Spectrum Access with Spatial Reuse

Stochastic Content-Centric Multicast Scheduling for Cache-Enabled Heterogeneous Cellular Networks

A New SLNR-based Linear Precoding for. Downlink Multi-User Multi-Stream MIMO Systems

Coverage and Rate Analysis for Massive MIMO-enabled Heterogeneous Networks with Millimeter wave Small Cells

Open Loop Optimal Control of Base Station Activation for Green Networks

Modeling and Analysis of Ergodic Capacity in Network MIMO Systems

Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks

Energy Cooperation and Traffic Management in Cellular Networks with Renewable Energy

Transcription:

Joint and Competitive Caching Designs in Large-Scale Multi-Tier Wireless Multicasting Networks Zitian Wang, Zhehan Cao, Ying Cui Shanghai Jiao Tong University, China Yang Yang Intel Deutschland GmbH, Germany Abstract Caching and multicasting are two promising methods to support massive content delivery in multi-tier wireless networks. In this paper, we consider a random caching and multicasting scheme with caching distributions in the two tiers as design parameters, to achieve efficient content dissemination in a two-tier large-scale cache-enabled wireless multicasting network. First, we derive tractable expressions for the successful transmission probabilities in the general region as well as the high SNR and high user density region, respectively, utilizing tools from stochastic geometry. Then, for the case of a single operator for the two tiers, we formulate the optimal joint caching design problem to maximize the successful transmission probability in the asymptotic region, which is nonconvex in general. By using the block successive approximate optimization technique, we develop an iterative algorithm, which is shown to coverage to a stationary point. Next, for the case of two different operators, one for each tier, we formulate the competitive caching design game where each tier maximizes its successful transmission probability in the asymptotic region. We show that the game has a unique Nash equilibrium NE) and develop an iterative algorithm, which is shown to converge to the NE under a mild condition. Finally, by numerical simulations, we show that the proposed designs achieve significant gains over existing schemes. Index Terms Cache, multicast, multi-tier wireless network, stochastic geometry, optimization, game theory, Nash equilibrium I. INTRODUCTION The rapid proliferation of smart mobile devices has triggered an unprecedented growth of the global mobile data traffic. Multi-tier wireless networks have been proposed as an

1 effective way to meet the dramatic traffic growth by deploying different tiers of point of attachments POAs), e.g., base stations BSs) or access points APs) together, to provide better time or frequency reuse. In general, there are two scenarios, depending on whether different tiers are managed by the same operator. One typical example for the scenario of the same operator is deploying short range small-bss together with traditional macro-bss, i.e., heterogeneous wireless networks Hetnets). One typical example for the scenario of different operators is deploying IEEE 802.11 APs of different owners. To further reduce the load of the core network, caching at POAs in multi-tier wireless networks is recognized as a promising approach. A lot of literature considers optimal caching design in large-scale cache-enabled Hetnets for the case of the same operator. For example, in [1] and [2], the authors focus on the maximization of the probability that the signal-to-interference plus noise ratio SINR) of a typical user is above a threshold, which does not reflect the resource sharing among users. In a special case where all tiers have the same threshold, the problem is convex and the optimal solution is obtained [1], [2]. In the general case, the problem is nonconvex. [2] simplifies the nonconvex problem to a convex one and uses the optimal solution to the simplified convex problem as a sub-optimal solution to the original nonconvex problem. In addition, some works consider competitive caching design games among different POAs [3], [4]. For instance, in [3], the authors consider an Exact Potential Game among cache-enabled femto-bss, prove the existence of Nash equilibrium NE) and propose a convergent algorithm to obtain a NE. In [4], the authors consider a mean-field game among cache-enabled small-bss, and obtain the unique mean field equilibrium. On the other hand, enabling multicast service at POAs in multi-tier wireless networks is an efficient way to deliver popular contents to multiple requesters simultaneously by effectively utilizing the broadcast nature of the wireless medium. In our previous work [5], we consider analysis and optimization of a hybrid caching and multicasting design in a large-scale cache-enabled Hetnet. The hybrid design requires the files stored at macro-bss and pico-bss to be nonoverlapping and the files stored at all macro-bss to be identical. Thus, the spatial file diversity provided by the hybrid caching design is limited, which may cause network performance degradation at some system parameters. Note that [1] [4] do not consider multicasting. In summary, further studies are required to facilitate the design of practical cache-enabled

2 multi-tier wireless multicasting networks for massive content dissemination. In this paper, we consider a random caching and multicasting design with caching distributions in the two tiers as the design parameters to provide high spatial file diversity, utilizing tools from stochastic geometry. Our main contributions are summarized below. For the case of a single operator for the two tiers, we formulate the optimal joint caching design problem to maximize the successful transmission probability in the asymptotic region, which is a nonconvex problem in general. By using the block successive approximate optimization technique [6], we develop an iterative algorithm to obtain a stationary point. Specifically, by carefully choosing an approximation function, we obtain the closed-form optimal solution to the approximate optimization problem in each iteration. For the case of two different operators, one for each tier, we formulate the competitive caching design game where each tier maximizes its successful transmission probability in the asymptotic region. We show that the game has a unique NE and develop an iterative algorithm to obtain the NE. We also provide a convergence condition for the iterative algorithm, which holds in most practical scenarios. Finally, by numerical simulations, we show that the proposed designs achieve significant gains over existing schemes. A. Network Model and Performance Metric II. SYSTEM MODEL We consider a general large-scale two-tier downlink network consisting of two tiers of POAs, e.g., BSs or APs, as shown in Fig. 1. The two tiers can be managed by a single operator e.g., Hetnet with BSs being POAs) or by two different operators e.g., IEEE 802.11 APs of two owners). 1 The locations of the POAs in tier 1 and tier 2 are spatially distributed as two independent homogeneous Poisson point processes PPPs) Φ 1 and Φ 2 with densities λ 1 and λ 2, respectively. The locations of the users are also distributed as an independent homogeneous PPP Φ u with density λ u. Each POA in the jth tier has one transmit antenna with transmission power P j, where j = 1, 2. For notational convenience, we define σ 1 P 1 P 2 and σ 2 P 2 P 1. Each user has one receive antenna. All POAs are operating on the same frequency band with a bandwidth W Hz). Consider a discrete-time system with time being slotted and 1 The network model we considered in this paper is similar to that in [5]. But here, we consider a random caching design which is more general and includes the hybrid caching design in [5] as a special case. In addition, different from [1], [2], we specify the random caching design by the caching probabilities of file combinations, so as to investigate the file load distribution and the impact of multicasting.

3 POA in Tier 1 cache K 1 = 3 POA in Tier 2 cache K 2 = 2 User Signal N = 8 Fig. 1. Network model. Each file n N corresponds to a Voronoi tessellation in the same color as the file), determined by the locations and transmission powers of all POAs storing this file. study one slot of the network. Both path loss and small-scale fading are considered: for path loss, a transmitted signal from any tier with distance D is attenuated by a factor D α, where α > 2 is the path loss exponent; for small-scale fading, Rayleigh fading channels are adopted [7]. Let N {1, 2,, N} denote the set of N files in the two-tier network. For ease of illustration, assume that all files have the same size. Each file is of certain popularity, which is assumed to be identical among all users. Each user randomly requests one file, which is file n N with probability a n 0, 1), where n N a n = 1. Thus, the file popularity distribution is given by a a n ) n N, which is assumed to be known apriori. In addition, without loss of generality w.l.o.g.), assume a 1 > a 2 >... > a N. The two-tier network consists of cache-enabled POAs. In the jth tier, each POA is equipped with a cache of size K j < N to store different popular files out of N. We say every K j different files form a combination. Thus, there are in total I j N K j ) different combinations, each with Kj different files. Let I j {1, 2,, I j } denote the set of I j combinations, and let N j,i denote the set of K j files contained in combination i of tier j. B. Caching To provide high spatial file diversity, we consider a random caching design where the caching distributions in the two tiers may be different, as illustrated in Fig. 1. The probability

4 that combination i I j is stored in each POA of tier j is p j,i, where 0 p j,i 1, i I j, p j,i = 1. 1) i I j A random caching design in tier j is specified by the caching distribution p j p j,i ) i Ij. Let I j,n denote the set of I j,n N 1 K j 1) combinations containing file n. Let T j,n i I j,n p j,i, n N 2) denote the probability that file n is stored at a POA in the jth tier. Therefore, the random caching design in the large-scale cache-enabled two-tier network is fully specified by the design parameters p 1, p 2 ). C. Multicasting Consider a user requesting file n. If file n is not stored in any tier, the user will not be served. Otherwise adopt the following user association rules: i) If file n is stored only in the jth tier, the user is associated with the nearest POA in the jth tier storing a combination i I j,n ; ii) If file n is stored in both tiers, the user is associated with the POA which stores file n and provides the maximum long-term average received power RP) among all the POAs) [1], [2]. We consider multicasting in the large-scale cache-enabled two-tier network. Consider a POA schedules to serve requests for k different files. Then, it transmits each of the k files only once to concurrently serve users requesting the same file, at a rate τ bit/second) and over 1 k of the total bandwidth W using frequency division multiple access FDMA). As a matter of fact, both multicast and unicast may happen with different probabilities). Without loss of generality, as in [5], we refer to this transmission as multicast. Note that, by avoiding transmitting the same file multiple times to multiple users, this content-centric multicast can improve the efficiency of the utilization of the wireless medium and reduce the load of the wireless network, compared to the traditional connection-based unicast [7]. From the above illustration, we can see that the design parameters p 1, p 2 ) affect the performance of the random caching and multicasting design. D. Performance Metric In this paper, we study w.l.o.g. the performance of a typical user u 0, which is located at the origin. Suppose u 0 requests file n. Let j 0 denote the index of the tier with which u 0 is

5 SINR n,0 = q jp j, p j ) = n N D α j 0,l 0,0 h j 0,l 0,0 2 l Φ j0 \l 0 D α j 0,l,0 h j 0,l,0 2 + l Φ j0 D α a na j,np j, p j )Pr h j 0,l,0 j0,l,0 2 P j0 P j0 + N 0 [ W K j,n,0 log 2 1 + SINR n,0) τ. 3) P j0 ] j0 = j. 4) associated, and let j 0 denote the other tier. Let l 0 Φ j0 denote the index of the serving POA of u 0. We denote D j,l,0 and h d j,l,0 CN 0, 1) as the distance and the small-scale channel between POA l Φ j and u 0, respectively. We assume the complex additive white Gaussian noise of power N 0 evaluated over the entire frequency band) at u 0. When u 0 requests file n and file n is transmitted by POA l 0, the SINR of u 0 is given by 3) [5] at the top of this page. When T j,n > 0, let K j,n,0 {1,, K j } denote the number of different cached files requested by the users associated with POA l 0 Φ j. Note that K j,n,0 is a discrete random variable, whose probability mass function p.m.f.) depends on a, λ u and the design parameters p 1, p 2 ). The file can be decoded correctly at u 0 if the channel capacity between POA l 0 and u 0 is greater than or equal to τ. Requesters are mostly concerned about whether their desired files can be successfully received. Therefore, we adopt the probability that a randomly requested file by u 0 is successfully transmitted, referred to as the successful transmission probability, as the network performance metric [5]. Let A j,n p j, p j ) denote the probability that u 0 requesting file n is associated with tier j. By total probability theorem, the successful transmission probability under the considered scheme is q p 1, p 2 ) = q 1 p 1, p 2 ) + q 2 p 2, p 1 ), 5) where q j p j, p j ) is given by 4) at the top of this page and represents the probability that a randomly requested file by u 0 is successfully transmitted from a POA in tier j, also referred to as the successful transmission probability of tier j. III. PERFORMANCE ANALYSIS A. Performance Analysis in General Region In this subsection, we analyze the successful transmission probability qp 1, p 2 ) in the general region. The user association probability A j,n p j, p j ) and the cumulative distribution

6 ω j,n,k p j, p j ) i I j,n p j,i f j,k x, y) 2πλ j 0 X {S N j,i, n : S =k 1} m X 1 b j,m) m N j,i, n \X d exp πλ j θ 1,k x + θ 2,j,k y + θ 3,j,k ) d 2) exp b j,m. 6) ) 2 kτ W 1 d α N 0 P j ) dd. 7) θ 1,k = 2 ) 2 kτ 2 α W 1 B 2 α α, 1 2 ) kτ, 2 W 2 B α α, 1 2 ) ) + 1. 8) α θ 2,j,k = 2λ ) j σ ) 2 αλ j 2 kτ α W 1 B 2 j α, 1 2 ) kτ, 2 W 2 B α α, 1 2 ) ) + λ j α σ 2 α λ. 9) j j θ 3,j,k = 2 α 2 kτ W ) 2 α 2 1 B α, 1 2 ) + 2λ ) j σ ) 2 α αλ j 2 kτ α W 2 1 B j α, 1 2 ). 10) α function c.d.f.) of SINR n,0 can be found in [1], [2]. In this paper, we analyze the p.m.f. of file load K j,n,0 by generalizing the method in [5], [7]. As in [5], [7], the dependence of the p.m.f. of K j,n,0 and the c.d.f. of SINR n,0 is ignored. Then, based on A j,n p j, p j ), c.d.f. of SINR n,0 and p.m.f. of K j,n,0, we can derive q p 1, p 2 ). Theorem 1 Performance): The successful transmission probability is q p 1, p 2 ) = q 1 p 1, p 2 )+ q 2 p 2, p 1 ), where q j p j, p j ) = n N a Kj n k=1 ω j,n,kp j, p j )f j,k T j,n, T j,n ). Here, ω j,n,k p j, p j ) is given by 6) at the top of this page with b j,m given by b j,m 1 + a ) 3.5 mλ u  j,m T j,m, T j,m ), 11) 3.5λ j  j,m T j,m, T j,m ) λ j Pj ) 2 α λ j T j,m + λ j T j,m P j 12) and N j,i, n N j,i \ {n}, and f j,k T j,n, T j,n ) is given by 7) with θ 1,k, θ 2,j,k and θ 3,j,k given by 8), 9) and 10) at the top of this page. B x, y, z) 1 z ux 1 1 u) y 1 du and Bx, y) 1 0 ux 1 1 u) y 1 du denote the complementary incomplete Beta function and the Beta function, respectively. Proof: Please refer to Appendix A. From Theorem 1, we can see that the impacts of the physical layer parameters α, W, λ 1, λ 2, λ u, manner. P 1 N 0, P 2 N 0 and the design parameters p 1, p 2 ) on qp 1, p 2 ) are coupled in a complex

7 B. Performance Analysis in Asymptotic Region Note that the gain of multicasting over unicasting increases with user density [5]. In this subsection, to obtain design insights into caching and multicasting, we analyze the asymptotic successful transmission probability in the high SNR and high user density region. Let P 1 N 0 and P 2 N 0 while fixing the power ratio, i.e., σ 1 σ 2 ). In addition, when λ u, K j,n,0 K j in distribution. From Theorem 1, we have the following corollary. Corollary 1 Asymptotic Performance): When P N 0 and λ u, 2 where qp 1, p 2 ) = q 1, T 1, T 2 ) + q 2, T 2, T 1 ) q T 1, T 2 ), 13) q j, T j, T j ) = n N a n T j,n θ 1,Kj T j,n + θ 2,j,Kj T j,n + θ 3,j,Kj. 14) Here, T j,n is given by 2), and θ 1,k, θ 2,j,k and θ 3,j,k are given by 8), 9) and 10). Proof: Please refer to Appendix B. Note that the asymptotic successful transmission probability in Corollary 1 and the performance metric in [1], [2] have different meanings, although they share similar forms. From Corollary 1, we can see that in the high SNR and high user density region, the impact of the physical layer parameters α, W, λ j and σ j, captured by θ 1,j, θ 2,j,Kj and θ 3,j,Kj, and the impact of the design parameters p 1, p 2 ) on q T 1, T 2 ) can be easily separated. In most practical cases, θ 1,K1, θ 1,K2 > 0. Thus, we consider θ 1,K1, θ 1,K2 > 0 in the rest of the paper. Fig. 2 verifies Theorem 1 and Corollary 1, and demonstrates the accuracy of the approximation adopted. Fig. 2 also indicates that q T 1, T 2 ) provides a simple and good approximation P for q p 1, p 2 ) in the high SNR e.g., N 0 λ u 3 10 5 ). 120 db) and the high user density region e.g., In the asymptotic region, from [5], we know that the constraints on p 1, p 2 ) in 1) and 2) can be equivalently rewritten as T 1, T 2 ) T 1 T 2, where T j is defined as T j T j 0 T j,n 1, n N, T j,n = K j. 15) n N 2 Note that when λ u corresponding to the full file load case), q j and q become functions of T 1 and T 2 instead of p 1 and p 2.

8 Successful Transmission Probability 0.6 0.4 0.2 Asympt Monte Carlo Analytical 0 140 6 120 5 100 4 Transmission SNR P/N0dB) 80 3 60 2 10-5 Fig. 2. Successful transmission probability versus SNR P N 0 and user density λ u. N = 10, K 1 = 3, K 2 = 2, p 1,i = 1 10 3 ) for all i = 1, 2,, ) 10 3, p2,i = 1 10 2 ) for all i = 1, 2,, ) 10 2, λ1 = 5 10 7, λ 2 = 3 10 6, P 1 = 10 1.5 P, P 2 = P, α = 4, W = 20 10 6, τ = 35 10 4 n and a n = γ with γ = 1. n N n γ To obtain design insights into caching in large-scale multi-tier wireless multicasting networks, in Section IV and Section V, we focus on the joint and competitive caching designs in the asymptotic region, respectively. IV. JOINT CACHING DESIGN In this section, we consider the case that the two tiers of POAs are managed by a single operator, e.g., as in a Hetnet. We first formulate the optimal joint caching design problem to maximize the successful transmission probability in the asymptotic region. Then, we develop an algorithm to obtain a stationary point. A. Optimization Problem Formulation In this subsection, we formulate the optimal joint caching design problem to maximize the successful transmission probability q T 1, T 2 ) by optimizing the caching distributions of the two tiers, i.e., T 1, T 2 ). Problem 1 Joint Caching Design): q max T 1,T 2 q T 1, T 2 ) 16) s.t. T j T j,

9 where q T 1, T 2 ) is given by 13) and T j is given by 15). Problem 1 maximizes a differentiable nonconcave in general) function over a convex set, and it is thus nonconvex in general. Note that Problem 1 and Problem 0 in [2] are mathematically equivalent, although this paper and [2] have different scopes. In the following subsection, we propose an efficient algorithm to solve Problem 1. In contrast, [2] simplifies the nonconvex problem to a convex one, and uses the optimal solution to the simplified problem as a sub-optimal solution to the original problem, which does not provide performance guarantee. B. Algorithm Design We can obtain a stationary point of Problem 1 using the gradient projection method GPM) with a diminishing stepsize. However, the rate of convergence of GPM is strongly dependent on the choices of stepsize. If it is chosen improperly, it may take a large number of iterations for GPM to meet some convergence criterion. To address this problem, in this subsection we propose an iterative algorithm to obtain a stationary point of Problem 1 more efficiently. Note that a stationary point is a point that satisfies the necessary optimality conditions of a nonconvex optimization problem, and it is the classic goal in the design of iterative algorithms for nonconvex optimization problems. This algorithm is based on the block successive upperbound minimization algorithm originally proposed in [6]. It alternatively updates T 1 and T 2 by maximizing an approximate function of q T 1, T 2 ), which is successively refined so that eventually the iterative algorithm can converge to a stationary point of Problem 1. Specifically, at iteration t, we update the caching distribution of the jth tier by maximizing the approximate function of q T 1, T 2 ) given the caching distribution of the jth tier, and fix the caching distribution of the jth tier. For notational convenience, we define q T j, T j ), j = 1, q T j, T j ) 17) q T j, T j ), j = 2. At iteration t, choose g j T j, T 1 t), T 2 t)) to be an approximate function of q T j, T j t)), where g j T j, T 1 t), T 2 t)) is given by 18) at the top of the next page. Note that the first concave component function of q T j, T j t)), i.e., q j, T j, T j t)) is left unchanged, and only the second nonconcave actually convex) component function, i.e., q j, T j t), T j ) is linearized at T j = T j t). This choice of approximate function is beneficial

10 ) g j Tj, T 1t), T ) ) ) 2t) q j, T j, T j t) + q j, T j t), T jt) + q j, T j t), T jt) Tj,n T ) j,nt) T j,n n N ) ) = q j, T j, T j t) + q j, T j t), T jt) a nθ 2,j,Kj T j,n t) T j,n T ) j,nt) ) 2. n N θ 1,Kj T j,n t) + θ 2,j,Kj T j,nt) + θ 3,j,Kj 18) g j Tjt), T 1 t), T 2 t) ) ) = q T j t), T j t), T 1t), T ) 2t) T 1 T 2. 19) g j Tj, T 1 t), T 2 t) ) ) q T j, T j t), T j T j, T 1 t), T 2 t) ) T 1 T 2. 20) g j ) ) Tj, T 1 t), T 2 t) ; d j Tj = q T j, T j ; d, d j with T jt) + d j T j. =Tj t) Tj =Tj t),t j =T j t) 21) from several aspects. Firstly, it can guarantee the convergence of the algorithm to a stationary point of Problem 1, which will be seen in Theorem 2. Secondly, the partial concavity of the original objective function is preserved as much as possible, and the resulting algorithm typically converges much faster than GPM, where all component functions are linearized and no partial concavity is exploited. Thirdly, it yields a closed-form optimal solution to the optimization problem at each iteration, which will be explained in Lemma 1. Specifically, g j T j, T 1 t), T 2 t)) is strictly concave on T j for any given T 1 t), T 2 t) ) T 1 T 2, and satisfies 3 19), 20) and 21) shown at the top of this page), where d = d j, 0) when j = 1, and d = 0, d j ) when j = 2. The conditions in 19) and 20) imply that g j T j, T 1 t), T 2 t)) is a tight lower bound of q T j, T j t)). The condition in 21) guarantees that the first order behavior of g j T j, T 1 t), T 2 t)) is the same as q T j, T j t)) locally. At each iteration t, we update the caching distribution of the jth tier given the caching distribution of the jth tier by solving the following problem, where j = t + 1) mod 2) + 1, and fix the caching distribution of the jth tier. Problem 2 Optimization at Iteration t): For tier j = t + 1) mod 2) + 1, we have T j t + 1) = argmax T j g j Tj, T 1 t), T 2 t) ) s.t. T j T j, 3 Note that the directional derivative of function r : D R, where D is a convex set, at point x in direction d is defined by r rx+δd) rx) x; d) lim inf. In addition, in 21), the directional derivative g δ 0 δ jt j, T 1t), T 2t); d j) is only with respect to T j. 20) is hold since q j, T j, T j) is a convex function of T j for any given T j T j.

11 Algorithm 1 Stationary Point of Problem 1 Based on BSUM 1: Initialize t = 1 and choose any T j1) T j e.g., T j,n1) = K j N 2: Compute j = t + 1) mod 2) + 1. 3: For all n N, compute T j,nt + 1) according to Lemma 1. 4: For all n N, set T j,n t + 1) = T j,n t). 5: Set t = t + 1 and go to Step 2. for all n N ), j = 1, 2. T j,nt + 1) = min 1 θ 1,Kj νj + a nθ 2,j,Kj T j,n t) + θ 3,j,Kj ) a nθ 2,j,Kj T j,n t) θ 1,Kj Tj,n t)+θ2,j,kj T j,n t)+θ3,j,kj ) 2 θ2,j,k j T j,n t) + θ3,j,k j θ 1,Kj +, 1, n N. 22) where g j Tj, T 1 t), T 2 t) ) is given by 18). Problem 2 is a convex optimization problem and Slater s condition is satisfied, implying that strong duality holds. Using KKT conditions, we can obtain the closed-form optimal solution to Problem 2. Lemma 1 Optimal Solution to Problem 2): The optimal solution to Problem 2 is given by 22) at the top of this page, where [x] + max{x, 0} and νj is the Lagrange multiplier that satisfies n N T j,nt + 1) = K j. Note that νj can be efficiently obtained by using bisection search. The details are summarized in Algorithm 1. Based on the conditions in 19), 20) and 21), we show the convergence of Algorithm 1. Theorem 2 Convergence of Algorithm 1): The sequence { q T 1 t), T 2 t)) } generated by Algorithm 1 is convergent, and every limit point of { T 1 t), T 2 t)) } is a stationary point of Problem 1. Proof: Please refer to Appendix C. Different from GPM, Algorithm 1 does not rely on a stepsize. Thus, Algorithm 1 may have more robust convergence performance than GPM, as we shall illustrate later in Fig. 3. V. COMPETITIVE CACHING DESIGN In this section, we study the scenario that the two tiers of POAs are managed by two different operators, e.g., IEEE 802.11 APs of two owners. The two different operators have

12 T j,n = min 1 θ 1,Kj anθ2,j,k T + j j,n θ3,j,k ) j ν j θ2,j,k j T j,n + θ3,j,k j θ 1,Kj +, 1, n N, j = 1, 2. 24) their own interests and thus cannot be jointly managed. Besides, one operator may be sacrificed in order to achieve the maximum total utility. Therefore, we propose a game theoretic approach and adopt the NE as a desirable outcome. We first formulate the competitive caching design for the two different operators within the framework of game theory. Then, we characterize a NE of the game and develop an algorithm to obtain a NE. A. Game Formulation In this subsection, we formulate the competitive caching design for two different operators within the framework of game theory. We consider a strategic noncooperative game, where the two operators are the players. The utility function of player j is the successful transmission probability for tier j, i.e., q j, T j, T j ). Each tier j competes against the other tier j by choosing its caching distribution T j i.e., strategy or action) in the set of admissible strategies T j to maximize its utility function, i.e., q j, T j, T j ). Problem 3 Competitive Caching Game): For all j = 1, 2, we have max T j q j, T j, T j ) s.t. T j T j, where q j, T j, T j ) is given by 14) and T j is given by 15). Let G denote the game. A solution, i.e., a NE, of game G is defined as follows. Definition 1 Nash Equilibrium of Game G): A pure) strategy profile T 1, T 2) T 1 T 2 is a NE of game G if q j, T j, T j ) q j, T j, T j ), T j T j, j = 1, 2. 23) B. Algorithm Design In this subsection, we first characterize a NE of game G. Lemma 2 NE of Game G): Game G has a unique NE which is given by 24) at the top of this page, where ν j is the Lagrange multiplier that satisties n N T j,n = K j.

13 Algorithm 2 Nash Equilibrium of Game G 1: Initialize t = 1 and choose any T j1) T j e.g., T j,n1) = K j N 2: Compute j = t + 1) mod 2) + 1. ) 3: Compute T jt + 1) = argmax q j, T j, T j t). T j T j 4: Set T j t + 1) = T j t). 5: Set t = t + 1 and go to Step 2. for all n N ), j = 1, 2. Proof: Please refer to Appendix D. Then, we develop an iterative algorithm to obtain the NE of game G. It alternatively updates T 1 while T 2 is fixed and T 2 while T 1 is fixed by solving the following problem at each iteration t. Problem 4 Optimization at Iteration t): For player j = t + 1) mod 2) + 1, we have T j t + 1) = argmax T j q j, T j, T j t)) s.t. T j T j. The optimal solution to Problem 4 has the same form as 24) except that T j,n and T j,n are replaced by T j,n t + 1) and T j,n t), respectively. Based on the optimal solution to Problem 4, at iteration t, we update the strategy of player j = t + 1) mod 2) + 1, and fix the strategy of player j. The details for obtaining the NE of game G is summarized in Algorithm 2. Next, we provide a convergence condition for Algorithm 2. Theorem 3 Convergence of Algorithm 2): If max 1, 1 θ 1,K 1 max 1, 1 θ 1,K 2 < 4, θ 3,1,K1 θ 3,2,K2 where θ 1,k, θ 2,j,k and θ 3,j,k are given by 8), 9) and 10), Algorithm 2 converges to the unique NE of game G for all T j 1) T j, j = 1, 2, i.e., T 1 t), T 2 t)) T 1, T 2) as t, where T 1, T 2) is given by Lemma 2. Proof: Please refer to Appendix E. Note that the convergence condition given in Theorem 3 can be easily satisfied in most cases we are interested in, which will be shown in Fig. 3. VI. NUMERICAL RESULTS In the simulation, we choose W = 20 10 6, τ = 4 10 4, N = 500, α = 4, λ 1 = 5 10 7, λ 2 = 3 10 6, and P 1 P 2 = 16dB. We assume that the popularity follows

14 Zipf distribution, i.e., a n = n γ n N n γ, where γ is the Zipf exponent. First, we show the convergence and complexity of the proposed algorithms. Fig. 3 illustrates the successful transmission probability versus the number of iterations. From Fig. 3, we can observe that the rate of convergence of GPM is strongly dependent on the choices of stepsize ɛt). In addition, Algorithm 1 and Algorithm 2 have more robust convergence performance than GPM, as they do not rely on a stepsize. Fig. 4 illustrates the computing time versus the cache size K j and the Zipf exponent γ. From Fig. 4, we can observe that the computing times of all the algorithms do not change much with the K j or γ, and the computing times of the proposed algorithms are shorter than that of Algorithm 2 in [5] which is to obtain an asymptotically optimal hybrid caching design. These observations demonstrate the advantage of the proposed algorithms. Next, we compare the successful transmission probabilities of the proposed joint and competitive caching designs with those of three baselines. Baseline 1 most popular) refers to the design in which each POA in tier j stores the K j most popular files. Baseline 2 i.i.d. file popularity) refers to the design in which each POA in tier j randomly stores K j files, in an i.i.d. manner with file n being selected with probability a n. Baseline 3 hybrid caching) refers to the hybrid caching design obtained by Algrithm 2 in [5] which is a feasible solution to Problem 1). The three baseline schemes also adopt the same multicasting scheme as in our design. Fig. 5 illustrates the successful transmission probability versus the cache size K j and the Zipf exponent γ, respectively. From Fig. 5, we can observe that as K j and γ increases, the successful transmission probability of each scheme increases. We can also observe that the two proposed designs outperform all the three baseline schemes. In addition, we can see that when K j is large or γ is large, the two proposed designs reduce to the most popular caching design. When K j is small or γ is small, the two proposed designs perform similarly as the hybrid caching design. These observations show that the two proposed designs can well adapt to the changes of the system parameters and can wisely utilize storage resources. VII. CONCLUSION In this paper, we considered a random caching and multicasting scheme in a two-tier large-scale cache-enabled wireless multicasting network, operated by a single operator or two different operators. First, we formulated the optimal joint caching design problem in the asymptotic region. We develop an iterative algorithm, which is shown to coverage to a

15 0.34 Successful Transmission Probability 0.32 0.3 0.28 0.26 0.24 0.22 0.2 Alg. 1 proposed) Alg. 2 proposed) GPM c=1000) GPM c=100) 0.18 0 5 10 15 20 Number of Iterations Fig. 3. is ɛt) = Successful transmission probability versus number of iterations at K 2 = 35, K 1 = 55, stepsize for GPM c 2+t 0.55. we choose the same initial point for all the algorithms shown in Fig. 3 0.1 0.09 0.08 Alg. 1 proposed) Alg. 2 proposed) Alg. 2 in [5] GPM 0.08 0.07 Alg. 1 proposed) Alg. 2 proposed) Alg. 2 in [5] GPM Computing times) 0.07 0.06 0.05 Computing times) 0.06 0.05 0.04 0.04 0.03 0.03 0.02 0 10 20 30 40 50 60 70 80 Cache Size K2 a) cache size K 2 K 1 ) at γ = 0.55, K 1 = K 2 + 20. 0.02 0.2 0.4 0.6 0.8 1 1.2 Zipf Exponent γ b) Zipf exponent γ at K 2 = 35, K 1 = 55. Fig. 4. Computing time versus the cache size or Zipf exponent γ at stepsize for GPM is ɛt) = c 2+t 0.55. For GPM, each point corresponds to the minimum computing time by choosing the optimal parameter c {500, 1000, 1500, 2000, 2500}. stationary point. Next, we formulated the competitive caching design game in the asymptotic region, obtained the unique NE of the game and developed an iterative algorithm, which is shown to converge to the NE under a mild condition. Finally, by numerical simulations, we showed that the two proposed designs achieve significant gains over existing schemes.

16 Successful Transmission Probility 0.45 0.4 0.35 0.3 0.25 0.2 joint caching proposed) competitive caching proposed) most popular i.i.d file popularity hybrid caching Successful Transmission Probility 0.8 0.7 0.6 0.5 0.4 0.3 0.2 joint caching proposed) competitive caching proposed) most popular i.i.d file popularity hybrid caching 0.15 0 10 20 30 40 50 60 70 80 Cache Size K2 a) cache size K 2 K 1 ) at γ = 0.55, K 1 = K 2 + 20. 0.1 0.2 0.4 0.6 0.8 1 1.2 Zipf Exponent γ b) Zipf exponent γ at K 2 = 35, K 1 = 55. Fig. 5. Successful transmission probability versus the cache size or Zipf exponent γ. APPENDIX A: PROOF OF THEOREM 1 By [1] and [2], the user association probability A j,n p j, p j ) and the conditional c.d.f. of SINR n,0 are provided in the following result. Result 1 User Association Probability and Conditional c.d.f. of SINR n,0 ): The user association probability A j,n p j, p j ) is given by A j,n p j, p j ) = λ j T j,n Pj ) 2 α λ j T j,n + λ j T j,n P j and the conditional c.d.f. of SINR n,0 is given by [ ) ] Pr SINR n,0 2 kτ W 1 j 0 = j where ÂT j,n, T j,n ) is given by 12). A j,n T j,n, T j,n ), 25) = f j,kt j,n, T j,n ) ÂT j,n, T j,n ), 26) It remains to show the conditional p.m.f. of K j,n,0 in the following lemma. Lemma 3 Conditional p.m.f. of K j,n,0 ): The conditional p.m.f. of K j,n,0 given j 0 = j is given by Pr [ K j,n,0 = k j0 = j] = p j,i T j,n i I j,n X {S N j,i, n : S =k 1} m X where k = 1,, K j, and b j,m is given by 11). 1 bj,m ) m N j,i, n \X b j,m, 27)

17 Proof: When typical user u 0 requests file n N, let random variable Y j,m,n,i {0, 1} denote whether file m N j,i \ {n} is requested by the users associated with serving BS l 0 of tier j when BS l 0 contains combination i I j,n. When u 0 requests file n N and serving BS l 0 contains combination i I j,n, we have K j,n,0 = 1 + m N j,i, n Y j,m,n,i. Thus, we have Pr [ ] K j,n,0 = k BS l 0 tier j contains combination i I j,n = 1 Pr[Y j,m,n,i = 0]) Pr[Y j,m,n,i = 0], k = 1,, K j. X {S N j,i, n : S =k 1} m X m N j,i, n \X The probability that BS l 0 of tier j contains combination i I j,n is p j,i T j,n. Thus, we have Pr [ K j,n,0 = k ] = i I j,n 28) p j,i T j,n Pr [ K j,n,0 = k BS l 0 of tier j contains combination i I j,n ], k = 1,, Kj. It remains to calculate Pr[Y j,m,n,i = 0]. The p.m.f. of Y j,m,n,i depends on the p.d.f. of the size of the Voronoi cell of BS l 0 of tier j w.r.t. file m N j,i, n when BS l 0 contains combination i I j,n, which is unknown. We approximate this p.d.f. based on the known result of the p.d.f. of the size of the Voronoi cell to which a randomly chosen user belongs [8, Lemma 3]. Thus, we have 4 Pr[Y j,m,n,i = 0] = 1 + ) a m λ u A j,m T j,m, T j,m 3.5T j,m λ j 3.5 = b j,m. 29) Based on Result 1 and Lemma 3, we can derive the successful transmission probability q p 1, p 2 ) according to 4) and show Theorem 1. APPENDIX B: PROOF OF COROLLARY 1 ) When P 1 N 0 and P 2 N 0, we have exp 2 kτ W 1 ) exp 2 kτ W 1 d α N 0 P 1 ) 1 and d α N 0 P 2 ) 1. When λ u, we have K j,n,0 K j in distribution. Noting that d exp cd 2) dd = 1, we can solve integrals in 7). Thus, we can prove 0 2c Corollary 1. ) ) 4 Note that  j,m T j,m, T j,m = A j,m T j,m,t j,m T j,m.

18 APPENDIX C: PROOF OF THEOREM 2 We show that the conditions in Theorem 2 a) of [6] hold. i) By noting that 19), 20) and 21) hold and g j Tj, T 1 t), T 2 t) ) is continuous, we know that Assumption 2 in [6] is satisfied. ii) Since g j Tj, T 1 t), T 2 t) ) is strictly concave on T j for any given T 1 t), T 2 t) ) T 1 T 2, Problem 2 has a unique solution for any given T 1 t), T 2 t) ) T 1 T 2. iii) For all d d 1, d 2 ) satisfying q T1, T 2 ; d 1, 0) ) 0 and q T1, T 2 ; 0, d 2 ) ) 0, d j R N, j = 1, 2, we have T 1, T 2 ; d ) = q q T 1, T 2 ), d = q T 1, T 2 ), d 1, 0) + q T 1, T 2 ), 0, d 2 ) = q T1, T 2 ; d 1, 0) ) + q T1, T 2 ; 0, d 2 ) ) 0. 30) Thus, q T 1, T 2 ) is regular at any point in T 1 T 2 [6]. Therefore, by Theorem 2 a) in [6], we can prove Theorem 2. APPENDIX D: PROOF OF LEMMA 2 First, we use Proposition 20.3 in [9] to prove the existence of NE of game G. It is obvious that for all j = 1, 2, the set of admissible strategies T j is nonempty, compact and convex, and the utility function q j, T j, T j ) is a continuous function of T 1, T 2 ). Since q j, T j, T j ) is strictly concave on T j for any given T j T j, then q j, T j, T j ) is quasi-concave on T j for any given T j T j. Thus, by Proposition 20.3 in [9], we know that there exists at least one NE of game G. Next, we prove the uniqueness of NE by Theorem 2 in [10]. By the first order strict concavity condition, we know that a strictly concave function must be diagonally strictly concave [10]. Thus, by Theorem 2 in [10], we know that there exists a unique NE of game G. Last, we characterize T 1, T 2). By Definition 1, we know that for all j = 1, 2, T j = argmax q j, T j, T ), 31) j T j s.t. T j T j. 32) Since q j, T j, T j ) is strictly concave on T j for any given T j T j, this optimization problem is convex and Slater s condition is satisfied, implying that strong duality holds. Using KKT conditions, we can solve the problem and show Lemma 2.

19 APPENDIX E: PROOF OF THEOREM 3 We prove the convergence of Algorithm 2 by verifying the conditions in Theorem 1 of [11]. i) It can be easily seen that for all j = 1, 2, q j, T j, T j ) is strictly concave on T j for any given T j T j and is second order Fréchet differentiable [12]. ii) By the discussion of optimal solution to Problem 4 in Section V-B, we know that there exists an optimal solution to Problem 4 for any given T j t) T j. iii) To guarantee the convergence of Algorithm 2, it remains to show that 2 q T j, T 2 j, T j j )) 1 2 T j T q j, T j, T j j ) 2 q T 2 j, T j, T j )) 1 2 T T j j j q j, T j, T j ) T j =T j t+2),t j =T j t+1) T j =T j t),t j =T j t+1) = ζ < 1 33) 2 holds for any T j t) T j and t + 1) mod 2) + 1 = j. Here, 2 denotes the spectral norm [12]. By Corollary 1, we have 2 q T j, T 2 j, T j j )) 1 2 T j T q j, T j, T j j ) 2 q T 2 j, T j, T j )) 1 2 T T j j j q j, T j, T j ) T j =T j t+2),t j =T j t+1) T j =T j t),t =T t+1) j j 2 ) a) = diag θ 2,j,Kj θ 2,j,Kj θ 1,Kj T j,n t + 2) θ 1,Kj T j,n t + 1) 1 1 4θ 1,Kj θ 1,Kj θ 2,j,Kj T j,n t + 1) + θ 3,j,Kj θ 2,j,Kj T j,n t) + θ 3,j,Kj ) b) θ 2,j,Kj θ 2,j,Kj θ 1,Kj T j,n t + 2) θ 1,Kj T j,n t + 1) = max 1 1 n N 4θ 1,Kj θ 1,Kj θ 2,j,Kj T j,n t + 1) + θ 3,j,Kj θ 2,j,Kj T j,n t) + θ 3,j,Kj c) 1 4 max n N 1 θ 1,Kj T j,n t + 2) θ 2,j,Kj T j,n t + 1) + θ 3,j,Kj max n N 1 θ 1,Kj T j,n t + 1) θ 2,j,Kj T j,n t) + θ 3,j,Kj d) 1 4 max 1, 1 θ 1,K j θ 3,j,Kj max 1, 1 θ 1,Kj θ < 1, 34) 3,j,Kj where a) is obtained by the definition of second order derivative, b) is obtained by the definition of spectral norm, c) is obtained based on the formula max x ny n max x n max y n, 35) n N n N n N n N 2

20 where x n, y n R for all n N, and by noting that θ 2,j,K j θ 2,j,Kj 4θ 1,Kj θ 1,Kj to 1 θ 1,K j θ 3,j,Kj 1 θ 1,K j θ 3,j,Kj 1 1 Therefore, by Theorem 1 of [6], we can prove Theorem 3. = 1, and d) is obtained due 4 θ 1,Kj T j,n t + 2) θ 2,j,Kj T j,n t + 1) + θ 3,j,Kj 1, 36) θ 1,Kj T j,n t + 1) θ 2,j,Kj T j,n t) + θ 3,j,Kj 1. 37) REFERENCES [1] K. Li, C. Yang, Z. Chen, and M. Tao, Optimization and analysis of probabilistic caching in n-tier heterogeneous networks, arxiv preprint arxiv:1612.04030, 2016. [2] J. Wen, K. Huang, S. Yang, and V. O. Li, Cache-enabled heterogeneous cellular networks: Optimal tier-level content placement, arxiv preprint arxiv:1612.05506, 2016. [3] Y. Tan, Y. Yuan, T. Yang, Y. Xu, and B. Hu, Femtocaching in wireless video networks: Distributed framework based on exact potential game, in Communications in China ICCC), 2016 IEEE/CIC International Conference on. IEEE, 2016, pp. 1 6. [4] H. Kim, J. Park, M. Bennis, S.-L. Kim, and M. Debbah, Ultra-dense edge caching under spatio-temporal demand and network dynamics, arxiv preprint arxiv:1703.01038, 2017. [5] Y. Cui and D. Jiang, Analysis and optimization of caching and multicasting in large-scale cache-enabled heterogeneous wireless networks, IEEE Trans. Wireless Commun., vol. 16, no. 1, pp. 250 264, 2017. [6] M. Razaviyayn, M. Hong, and Z.-Q. Luo, A unified convergence analysis of block successive minimization methods for nonsmooth optimization, SIAM Journal on Optimization, vol. 23, no. 2, pp. 1126 1153, 2013. [7] S. Singh, H. S. Dhillon, and J. G. Andrews, Offloading in heterogeneous networks: modeling, analysis, and design insights, IEEE Trans. Wireless Commun., vol. 12, no. 5, pp. 2484 2497, March 2013. [8] S. M. Yu and S.-L. Kim, Downlink capacity and base station density in cellular networks, in Modeling Optimization in Mobile, Ad Hoc Wireless Networks WiOpt), 2013 11th International Symposium on, May 2013, pp. 119 124. [9] M. J. Osborne and A. Rubinstein, A course in game theory. MIT press, 1994. [10] J. B. Rosen, Existence and uniqueness of equilibrium points for concave n-person games, Econometrica: Journal of the Econometric Society, pp. 520 534, 1965. [11] S. Li and T. Başar, Distributed algorithms for the computation of noncooperative equilibria, Automatica, vol. 23, no. 4, pp. 523 533, 1987. [12] D. G. Luenberger, Optimization by vector space methods. John Wiley & Sons, 1969.