Pipelined fronthaul-edge content delivery in fog radio access networks

Avik Sengupta, Ravi Tandon, Osvaldo Simeone

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

Abstract

In a Fog Radio Access Network (F-RAN), content delivery is carried out using both edge caching and cloud processing. A key design question for F-RANs hence concerns the optimal use of edge and cloud resources. In this work, this problem is addressed from an information theoretic viewpoint by investigating the fundamental limits of the normalized delivery time (NDT) metric, which captures the high signal-to-noise ratio (SNR) worst-case latency for delivering any requested content to the users. Specifically, unlike prior work, the NDT performance of an F-RAN is studied under pipelined fronthaul-edge transmission, whereby edge nodes are capable of simultaneously receiving fronthaul messages from the cloud on fronthaul links while transmitting to the mobile users over the wireless edge channel. Lower and upper bounds on the NDT are derived that yield insights into the trade-off between cache storage capacity, fronthaul capacity and delivery latency and on the impact of fronthaul-edge pipelining.

Original languageEnglish (US)
Title of host publication2016 IEEE Globecom Workshops, GC Wkshps 2016 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781509024827
DOIs
StatePublished - 2016
Event2016 IEEE Globecom Workshops, GC Wkshps 2016 - Washington, United States
Duration: Dec 4 2016Dec 8 2016

Publication series

Name2016 IEEE Globecom Workshops, GC Wkshps 2016 - Proceedings

Other

Other2016 IEEE Globecom Workshops, GC Wkshps 2016
Country/TerritoryUnited States
CityWashington
Period12/4/1612/8/16

All Science Journal Classification (ASJC) codes

  • Communication
  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Pipelined fronthaul-edge content delivery in fog radio access networks'. Together they form a unique fingerprint.

Cite this