Hierarchical Capacity Provisioning for Fog Computing

Research output: Contribution to journalArticlepeer-review

25 Scopus citations


The concept of fog computing is centered around providing computation resources at the edge of the network, thereby reducing the latency and improving the quality of service. However, it is still desirable to investigate how and where at the edge of the network the computation capacity should be provisioned. To this end, we propose a hierarchical capacity provisioning scheme. In particular, we consider a two-tier network architecture consisting of shallow and deep cloudlets and explore the benefits of hierarchical capacity provisioning based on queuing analysis. Moreover, we explore two different network scenarios in which the network delay between the two tiers is negligible and the case that the deep cloudlet is located somewhere deeper in the network and thus the delay is significant. More importantly, we model the first network delay scenario with bufferless shallow cloudlets and the second scenario with finite-size buffer shallow cloudlets, and formulate an optimization problem for each model. We also use stochastic ordering to solve the optimization problem formulated for the first model and an upper bound-based technique is proposed for the second model. The performance of the proposed scheme is evaluated via simulations in which we show the accuracy of the proposed upper bound technique and the queue length estimation approach for both randomly generated input and real trace data.

Original languageEnglish (US)
Article number8688628
Pages (from-to)962-971
Number of pages10
JournalIEEE/ACM Transactions on Networking
Issue number3
StatePublished - Jun 2019

All Science Journal Classification (ASJC) codes

  • Software
  • Computer Science Applications
  • Computer Networks and Communications
  • Electrical and Electronic Engineering


  • Edge computing
  • network design
  • queuing


Dive into the research topics of 'Hierarchical Capacity Provisioning for Fog Computing'. Together they form a unique fingerprint.

Cite this