2015 IEEE Global Communications Conference (GLOBECOM) 2015
DOI: 10.1109/glocom.2015.7417276
|View full text |Cite
|
Sign up to set email alerts
|

Network-Coded Content Delivery in Femtocaching-Assisted Cellular Networks

Abstract: Abstract-Next-generation cellular networks are expected to be assisted by femtocaches (FCs), which collectively store the most popular files for the clients. Given any arbitrary non-fragmented placement of such files, a strict no-latency constraint, and clients' prior knowledge, new file download requests could be efficiently handled by both the FCs and the macrocell base station (MBS) using opportunistic network coding (ONC). In this paper, we aim to find the best allocation of coded file downloads to the FCs… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 21 publications
(9 citation statements)
references
References 8 publications
0
9
0
Order By: Relevance
“…They also analyze asymptotic scaling laws. Caching methods based on network coding (coded-multicast) are investigated in [13] and [14], as examples. The former considers femto-caching in conjunction with opportunistic network coding and derives the optimal cache placement.…”
Section: A Related Workmentioning
confidence: 99%
“…They also analyze asymptotic scaling laws. Caching methods based on network coding (coded-multicast) are investigated in [13] and [14], as examples. The former considers femto-caching in conjunction with opportunistic network coding and derives the optimal cache placement.…”
Section: A Related Workmentioning
confidence: 99%
“…It is assumed that there is no overlap of the users in each proximity set; that is, the users in each proximity network that are "geographically close" can communicate locally but not outside this network. Unlike previous works [22,23] that consider ideal transmissions amongst the users and from the servers, in this manuscript, we have made the more realistic assumption that the users-to-users and serversto-users' communications links are subject to random erasure.…”
Section: System Modelmentioning
confidence: 99%
“…The problem is first modelled using graphical representation proposed in [22], namely, the IDNC graph with induced subgraphs. This graph representation overcomes the limitations of the conventional graphical representation [23], as it is not compatible to implement with a system model having fullduplex communications and the additional constraints that arise from D2D-enabled communications. With this graph modelling of the system, the optimal solution is formulated using the SSP technique and shown to be NP-hard and not applicable for real-time applications [24].…”
Section: Introductionmentioning
confidence: 99%
“…Indeed, their inclusion/exclusion produce the same objective function. This section proposes using a method similar to the one in [29] to select one of the points that achieve the optimum of theorem (4). The fundamental concept of the heuristic is to arrange users in multiple layers in descending order of criticality and to heuristically solve the maximum weight independent set in each layer.…”
Section: Proposed Solutionmentioning
confidence: 99%
“…With the emergence of smart phones, the 4G and 5G cellular network architectures, the data download problem has become more attractive in the wireless scenarios. Consequently, the data download problem was modified from a classical full package download problem into a download completion problem [3,4]. The large storage capabilities of modern user equipment enable these devices to benefit from the already downloaded messages and request only the missed ones.…”
Section: Introductionmentioning
confidence: 99%