Cache-Aided Combination Networks with Asymmetric End Users

Ahmed A. Zewail, Aylin Yener

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Abstract

We study combination networks where a layer of relay nodes connects a server to a set of end users with cache memories via unicast links. Unlike previous models on cache-aided combination networks where all users are connected to the same number of relay nodes, in this work, we consider two classes of end users, where users from the same class are connected to the same number of relay nodes. Using maximum distance separable (MDS) codes, we provide a coded caching scheme by jointly optimizing the cache placement and the delivery phase in order to minimize the delivery load over the two hops. The scheme is performed over two stages. In the first stage, we serve users from both classes, then during the second stage, we serve users from the class connected to a smaller number of relays. We extend the proposed scheme to networks with more than two classes of end users.

Original languageEnglish (US)
Title of host publication2019 IEEE 20th International Workshop on Signal Processing Advances in Wireless Communications, SPAWC 2019
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781538665282
DOIs
StatePublished - Jul 2019
Event20th IEEE International Workshop on Signal Processing Advances in Wireless Communications, SPAWC 2019 - Cannes, France
Duration: Jul 2 2019Jul 5 2019

Publication series

NameIEEE Workshop on Signal Processing Advances in Wireless Communications, SPAWC
Volume2019-July

Conference

Conference20th IEEE International Workshop on Signal Processing Advances in Wireless Communications, SPAWC 2019
Country/TerritoryFrance
CityCannes
Period7/2/197/5/19

All Science Journal Classification (ASJC) codes

  • Electrical and Electronic Engineering
  • Computer Science Applications
  • Information Systems

Fingerprint

Dive into the research topics of 'Cache-Aided Combination Networks with Asymmetric End Users'. Together they form a unique fingerprint.

Cite this