2018 IEEE Globecom Workshops (GC Wkshps) 2018
DOI: 10.1109/glocomw.2018.8644294
|View full text |Cite
|
Sign up to set email alerts
|

Flexible Design of Millimeter-Wave Cache Enabled Fog Networks

Abstract: Ultra-densification, millimeter wave (mmW) communications, and proactive network-edge caching, utilized within mmW fog networks (mmFNs), are foreseen to provide tangible gains for broadband access, network capacity, and latency. However, caching implementation in mmFN imposes high capital expenditure (CAPEX) due to the ultra-high density of base stations (BSs). For a given caching CAPEX, it may be more efficient to install higher capacity caches in a fraction of the BSs than installing smaller capacity caches … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 29 publications
0
1
0
Order By: Relevance
“…Contemporary IT use cases impose growing requirements on networks, for example, with healthcare applications that cannot afford any delay in processing [17], Augmented Reality (AR) and VR applications requiring extraordinary large bandwidth [18,19], and IoT use cases that generate a huge amount of data, requiring high reliability and a low latency guarantee across heterogeneous devices in a scalable manner [20][21][22][23]. Modern enterprises combining edge and cloud computing increasingly struggle with the growing requirements so that more and more often quality of service requirements cannot be met [24], real-time performance and reliability become insufficient [25], or an inefficient network architecture leads to congested connections and connectivity issues [9,17,20].…”
Section: A Fog Systemsmentioning
confidence: 99%
See 2 more Smart Citations
“…Contemporary IT use cases impose growing requirements on networks, for example, with healthcare applications that cannot afford any delay in processing [17], Augmented Reality (AR) and VR applications requiring extraordinary large bandwidth [18,19], and IoT use cases that generate a huge amount of data, requiring high reliability and a low latency guarantee across heterogeneous devices in a scalable manner [20][21][22][23]. Modern enterprises combining edge and cloud computing increasingly struggle with the growing requirements so that more and more often quality of service requirements cannot be met [24], real-time performance and reliability become insufficient [25], or an inefficient network architecture leads to congested connections and connectivity issues [9,17,20].…”
Section: A Fog Systemsmentioning
confidence: 99%
“…Description Relevance Design measures to improve the system on the characteristic Latency (55) Average required time from a request to its response including time spent on communication and processing for the entire fog system within and across its layers [48] Modern applications such as VR require near realtime processing and communication due to the speed of changes in their environment [3,17,35] Deploy more fog nodes closer to edge devices [35], Target low utilization of fog nodes to manage peak loads [57], Introduce more capable connections with larger bandwidths [58], Improve distribution of loads across fog nodes [59] Data load (27) Amount of data that needs to be transferred or stored within the fog system [60] Modern applications and an increased number of devices and sensors produce massive amounts of data to be managed in the fog system [60,61] Cache content near to end-users [19,62], Filter and aggregate data in lower levels of the system [63], Forward only prioritized/critical data, Compress data [63], More peer-to-peer communication [64] Security (26) The ability of fog systems to maintain availability, integrity, and confidentiality by defending against unauthorized interception, interruption, modification, and fabrication [65] Fog systems usually encompass a multitude of nodes, sensors, and actors in potentially critical domains such as mobility and healthcare in which any security breach can have a severe impact [48,61] Introduce peer trust models [66], Limit access to the fog system [49], Introduce authentication mechanisms for every layer [44], Introduce trust mechanisms for edge devices and fog nodes [56,67], Allow only validated edge devices or for nodes or registered persons to access the system [68], Constant monitoring of activities to check for abnormal behavior [49], Introduce blockchain-based strategies [61] Interoperability…”
Section: Characteristic (#Coding)mentioning
confidence: 99%
See 1 more Smart Citation
“…In [8], transmission-aware caching strategies were proposed for the distributed and centralized modes of F-RAN aiming at minimizing the mean download delay of the end-users. In [9], the authors proposed a probabilistic caching strategy that maximizes the hit probability in self-backhauled millimeter-wave F-RAN. The optimal cache design presented in [10] maximises the fractional offloaded traffic (FOT) and successful transmission probability (STP) for joint transmission and parallel transmission strategies.…”
Section: Introductionmentioning
confidence: 99%