Mobile Edge Computing Tradeoffs
Mobile Edge Computing Tradeoffs
Uplink Downlink
Abstract—In this paper, we exploit computation replication to
User 1 User 1
reduce the communication time for task offloading in mobile
edge computing networks, by introducing a tradeoff between Input W1 EN 1 Output Z
a
computation load, and communication latency defined as a
User 2 User 2
pair of the normalized uploading time (NULT) and normalized
downloading time (NDLT). The key idea of replication is to Input W2 EN 2 Output Z
a
let mobile users offload their tasks to multiple edge nodes for
User 3 User 3
repetitive execution so as to enable the transmission cooperation
in computed results downloading, and consequent interference Input W3
EN 3
Output Z
a
mitigation across users. We develop an achievable communication Fig. 1. A three-user three-server MEC network. This figure only shows
latency pair at a given computation load, where the NULT is the case that computation load r = 3. The uplink channel is the multicast
optimal and the NDLT is within a multiplicative gap of 2 to an interference channel whose per-receiver DoF is 1 achieved via TDMA, while
information theoretic lower bound. We show that in the specific the downlink is the MISO broadcast channel with full transmitter cooperation
interval, the NDLT can be traded by the computation load in an whose per-receiver DoF is 1 achieved by using zero-forcing precoding. Solid
inversely proportional function. circle denotes that the channels inside it carry the same information.
each task can be divided arbitrarily, and the uplink and (Xj (t))Tt=1 , where Xj (t) ∈ C is the transmitted symbol at
downlink channels are cooperative X-multicast channels. In time t ∈ [T u ]. Each codeword has an average power constraint
this paper, we consider binary offloading, and the uplink and of Pu , i.e., T1u ||Xj || ≤ Pu . Then, the received signal Yi (t) ∈ C
downlink channels become circular cooperative interference- of each EN i at time t ∈ [T u ] is given by
N
multicast channels. Moreover, [12] aims to minimize the total Yi (t) =
X
hij (t)Xj (t) + Zi (t), ∀i ∈ M, (2)
communication and computation time, and hence cannot give j=1
a formulation on the relationship between computation load where Zi (t) ∼ CN (0, 1) is the noise at EN i. Each ENui uses
and communication latency in MEC systems. a decoding function to map received signals (Yi (t))Tt=1 and
Notations: [a : b] denotes the set {a + 1, a + 2, . . . , b}, [K] channel coefficients H to the estimate {Ŵj : Wj ∈ Ti } of its
denotes the set {1, 2, . . . , K}. assigned task inputs. The
error probability is given by
II. P ROBLEM F ORMULATION [ n o
Peu = max P Ŵj 6= Wj . (3)
i∈M
A. MEC Network Model Wj ∈Ti
We consider an MEC network consisting of M single- 1 Note that the extension to the general case where each task has distinct
antenna ENs and N single-antenna users, as shown in Fig. input (or output) data size causes the uploading (or downloading) times for
1 with M = N = 3. Each EN is equipped with a computing different tasks unaligned, which is intractable for further analysis.
Our goal is to characterize the optimal communication
2) Downloading phase: After receiving the assigned task latency pair at any given feasible computation load r.
input data and executing them at the server, n each EN oi III. M AIN R ESULTS
obtains the output data of its assigned tasks, Wfj : Wj ∈ Ti ,
Theorem 1. (Inner bound). An achievable communication
and begins to transmit these computed results back to users.
latency pair τau (r), τad (r) at an integer computation load
The computed results downloading is similar to the task
r ∈ [M ], for binary task offloading in the MEC network with
uploading operation. Briefly, each EN encodes the task outputs
n o
fj : Wj ∈ Ti and channel coefficients G , [gji ]j∈N ,i∈M M ENs and N users, is givenby
W Nr
u
into a codeword of block length T d over the downlink in- τa (r) = min 1 + ,N , (8)
M
terference channel, with an average power constraint of Pd .
N N
Each user j decodes its desired task output data W fj from its τad (r) = min 1 + , , (9)
ˆ M r
received signals and G, and obtain the estimate Wf j . The error
when M N
∈ Z+ . If M N
is not an integer, we can always find δ1
probability is given by and δ2 such that M N +δ1 N
−δ2 is the closest integer to M and the
ˆ above results still hold by replacing N with N+δ1 and M with
Ped = max P W f j 6
= W
f j . (4)
j∈N M− δ2 . An inner bound of the optimal communication latency
region, denoted as Tin , is given by the union of all achievable
A task offloading policy, denoted as {Wj,Φ }, L, L e , r , with
computation load r consists of a sequence of task assignment latency pairs (τ u (r), τ d (r)) at all integer computation load r’s
schemes {Wj,Φ }, task input uploading schemes with time T u , satisfying τ u (r) ≥ τau (r) and τ d (r) ≥ τau (r) for ∀r ∈ [M ].
and task output downloading schemes with time T d , indexed We prove the achievability of Theorem 1 in Section IV.
by the task input and output data size pair L, L
e . It is said to
Theorem 2. (Outer bound).
The optimal communication la-
be feasible when the error probabilities Pe and Ped approach
u ∗ ∗
tencynpair τ u (r), τ d (r) at any feasibleo computation load
to zero when L → ∞ and L e → ∞. PM
r ∈ r : i=1 ai = N r, ai ∈ [0 : N ], ∀i ∈ M 2 , for binary task
C. Performance Metric offloading in the MEC network with M ENs and N users, is
We characterize the performance of the considered MEC lower bounded by
network by the computation load r as well as the asymptotic ∗ Nr
τ u (r) ≥ min 1 + ,N , (10)
communication times for task input uploading and output M
downloading. ∗ N
τ d (r) ≥ . (11)
min{M, N }
Definition 2. The normalized uploading time (NULT) and An outer bound of the optimal communication latency region,
normalized downloading time (NDLT) for a given feasible denoted as Tout , is given by the union of all latency pairs
task offloading policy with computation load r are defined, (τ u (r), τ d (r)) at all feasible computation load r’s satisfying
respectively, as
Nr
N
u
EH [T u ] τ (r) ≥ +1, N , τ d (r) ≥ (12)
τ u (r) , lim lim , (5) M min{M, N }
Pu →∞ L→∞ L/ log Pu n P o
M
for ∀r ∈ r : i=1 ai = N r, ai ∈ [0 : N ], ∀i ∈ M .
EH [T d ]
τ d (r) , lim lim . (6)
Pd →∞ L→∞
e L/
e log Pd The full proof of Theorem 2 is given in Section V. Here,
we give the main idea of converse proof. First, we use genie-
The NULT (or NDLT) definition follows the NDT defined in
aided arguments to derive a lower bound on the NULT of
[13]. Note that L/logPd (or L/logP
e d ) is the reference time to
any given feasible task assignment with computation load r.
transmit the task input (or output) data of L (or L) e bits for one
Then, we optimize the lower bound over all feasible task
task in a Gaussian point-to-point baseline system in the high
assignment schemes to obtain the minimum NULT for a given
SNR regime. Thus, an NULT (or NDLT) of τ u (r) (or τ d (r))
computation load r. For NDLT, since the downlink channel
indicates that the time required to upload (or download) the
capacity in this problem cannot exceed that of a virtual MISO
tasks of all users is τ u (r) (or τ d (r)) times of this reference
broadcast channel with N single-antenna receivers and a M -
time period.
antenna transmitter, so we have the lower bound of NDLT in
Definition 3. A communication latency pair (τ u (r), τ d (r)) at (11). By comparing the achievable NULT and NDLT to their
a computation load r is said tobe achievable if there exists a lower bounds, we prove the optimality of NULT and the gap
feasible task offloading policy {Wj,Φ }, L, L , r . The opti-
e of NDLT, which are given below.
mal communication latency region is the closure of the set of Corollary 1. (Gap of NULT, NDLT). At a computation load
all achievable communication latency pairs (τ u (r), τ d (r) r ∈ [M ], the achievable NULT in (8) is optimal, and the
at all possible computation load r’s, i.e.,
2 Note that different from the achievable inner bound in Theorem 1, the outer
T (r) , closure τ u (r), τ d (r) : ∀ τ u (r), τ d (r) is achievable,
bound in converse proof given in Section V holds for any feasible r for binary
∀r ∈ [1, M ]} . (7) offloading, and this feasible region contains the integer set {r : r ∈ [M ]}.
achievable NDLT in (9) is within a multiplicative gap of 2 2.2
to its minimum. 2
r=1
1.8 increasing r
The proof of Corollary 1 is also given in Section V.
Fig. 2 shows the inner bound Tin and outer bound Tout of
NDLT (τd)
1.6
2 Inner bound
1.4
the optimal communication latency region in the MEC network Outer bound
with M = N = 10. 1.2
User 1 EN 1 User 1 a DoF of Nr for each user, and then compare it with the per-
Z Z
a receiver DoF of NM +M achieved by only using interference
User 2 EN 2 User 2
Z alignment. Please refer to Appendix B for the full proof.
Z
a
User 3 EN 3 User 3 The traffic load for each user to download its task output
Z
Z
a data is L bits. Hence, by [13, Remark 3] and [14, Remark 1],
load r is given by
User 4 User 4
Z
EN 4
Z
the NDLT for each user at computation
a
aZ
1 N N
Fig. 3. Illustration of even task assignment for M = N = 4 and r = 3. τad (r) = = min +1, , r ∈ [M ]. (17)
The tasks circularly assigned to 4 ENs are {W1 , W2 , W3 }, {W4 , W1 , W2 }, DoFrd M r
{W3 , W4 , W1 }, and {W2 , W3 , W4 }. The uplink channel is the circular Based on Eq. (15) and Eq. (17), we thus have the achievable
interference-multicast channel whose per-receiver DoF is 34 , while the down-
link is the circular cooperative interference channel whose per-receiver DoF is communication latency pair (τau (r),τad (r)) at an integer com-
3
4
. Solid circle denotes that the channels inside it carry the same information. putation load r ∈ [M ] for binary offloading. An inner bound
genie-aided information, each EN k ∈ M/{i} can compute τ u (r, a) ≥ max min{ai +1, N } = min max ai +1, N . (37)
i∈M i∈M
the transmitted signals {xj : j 6= to } and subtract them from u∗
Therefore, the minimum NULT τ (r) for all feasible task
the received signal. Thus, the received signal of EN k 6= i can ∗ ∗
assignment schemes is given by τ u (r) = min τ u (r, a). It
be rewritten as a
XN can be lower bounded by the optimal solution of the following
ȳk = yk − Hkj xj = Hkto xto + zk . (25) integer programming problem,
j=1,6=to
P1 : min min max ai + 1, N
Since the message Wt is intended for some ENs in M/{i}, a i∈M
denoted as Rt , the ENs in Rt can decode it. By Fano’s M
X
inequality and (25), we have s.t. ai = N r
H(Wt |yk , W, Wr ) ≤ T u , k ∈ Rt . (26) i=1
that the total dimension of the spaces spanned by the inter- (59)
ference vectors is n(s + 1)Γ . Then, the desired sΓ streams By (59), we have:
corresponding to the desired signal Xj can be decoded by 1) The product term in the l-th row of Uk contains wk (l) with
0
zero-forcing the interferences from an us = sΓ + n(s + 1)Γ - exponent 1, but do not contain wk0 (l), ∀k 6= k. Thus, all the
dimensional received signal vector. We ensure this by de- monomial elements in the l-th row of [U1 U2 · · · Un ] are
unique.
signing the beamforming vectors V̄j as follows, where the
message W fj desired by receiver j is at transmitter d j e ∈ M 2) The equations corresponding to G(i−1)n+k,i are not con-
n
by (13), tained in the interference alignment relations of (56) for Uk ,
span(Ḡji V̄(i−1)n+1 ) ⊂ span(U1 )
so the monomial elements in the l-th row of Uk do not contain
h(i−1)n+k,i , ∀i ∈ M. It means that all the monomial terms in
span(Ḡji V̄(i−1)n+2 ) ⊂ span(U2 )
Ḡ(i−1)n+k,i V̄(i−1)n+k are different from those in Uk . They
..
∀j ∈ N , ∀i ∈ M,
are also different from the monomial terms in Uk0 , ∀k 0 6= k,
.
due to wk (l).
span(Ḡji V̄(i−1)n+k ) ⊂ span(Uk )
j6=(i−1)n+k for ∀k ∈[n],
..
Therefore, we can conclude that these us vectors in Λj
.
are independent, and hence Λj is a full-rank matrix. Taking
span(Ḡji V̄in ) ⊂ span(Un )
s to infinity, the scheme achieves a per-receiver DoF of
sΓ 1 M
lims→+∞ sΓ +n(s+1) Γ = 1+n = N +M . Comparing it with
where Uk is a us × (s + 1)Γ matrix, ∀k ∈ [n]. Next, we 1
design {Vj } and {Uk } to satisfy above conditions. First, we the DoF of N achieved by TDMA, the per-receiver DoF
generate n us × 1 column vectors wk = (wkl )ul=1 s
, k ∈ [n]. of the considered
n downlink o channel for r = 1 is given by
d M 1
All elements of these n vectors are chosen i.i.d from some DoF1 = max N +M , N .
continuous distribution whose support lies between a finite ii) r ≥ 2: We first consider interference neutralization enabled
minimum value and a finite maximum value. Then, the sets by transmitter cooperation. Encode the task output message
of column vectors of V̄j and Uk are denoted as V̄j and Uk , fj into r independent streams xp , p ∈ [r]. For better illus-
W j
tration, each stream xpj is given an index (p−1)N +j. There [6] V. S. Annapureddy, A. E. Gamal, and V. V. Veeravalli, “Degrees of free-
are a total of N r (or M n) different streams corresponding to dom of interference channels with CoMP transmission and reception,”
IEEE Trans. Inf. Theory, vol. 58, no. 9, pp. 5740–5760, Sep. 2012.
all N messages. Based on the index order, these N r different [7] V. R. Cadambe and S. A. Jafar, “Interference alignment and degrees of
streams can be divided into N groups, each group with r freedom of the K-user interference channel,” IEEE Trans. Inf. Theory,
different streams, where the k-th group is given by vol. 54, no. 8, pp. 3425–3441, Aug. 2008.
[8] S. Li, M. A. Maddah-Ali, Q. Yu, and A. S. Avestimehr, “A fundamental
Qk = xpj : (p−1)N +j ∈ [(k−1)r+1 : kr] , k ∈ [N ].
tradeoff between computation and communication in distributed com-
(60) puting,” IEEE Trans. Inf. Theory, vol. PP, no. 99, pp. 1–1, 2017.
[9] K. Lee, M. Lam, R. Pedarsani, D. Papailiopoulos, and K. Ramchandran,
Since each message exists at r different transmitters, each “Speeding up distributed machine learning using codes,” IEEE Trans.
stream is also owned by r different transmitters. Each group Inf. Theory, vol. PP, no. 99, pp. 1–1, 2017.
of streams is downloaded in the time division manner. The [10] D. Wang, G. Joshi, and G. Wornell, “Efficient task replication for fast
response times in parallel computation,” in Proc. ACM SIGMETRICS,
downlink channel formed by transmitting each group of r 2014.
streams can be treated as a MISO broadcast channel with [11] I. Wang and D. N. C. Tse, “Interference mitigation through limited
perfect transmitter cooperation, whose sum DoF is r [6], [18] transmitter cooperation,” IEEE Trans. Inf. Theory, vol. 57, no. 5, pp.
2941–2965, May 2011.
achieved by using interference neutralization. Thus, a DoF of [12] K. Li, M. Tao, and Z. Chen, “Exploiting computation replication in
r
N is obtained for each receiver in the r ≥ 2 case. multi-user multi-server mobile edge computing networks,” in Proc. IEEE
Then, we apply asymptotic interference alignment scheme Global Commun. Conf. (GLOBECOM), Dec. 2018.
N [13] A. Sengupta, R. Tandon, and O. Simeone, “Fog-aided wireless networks
in the r = 1 case. Since M = n1 , the messages at each for content delivery: Fundamental latency tradeoffs,” IEEE Trans. Inf.
transmitter i are Wk : k ∈ [(i − 1)n1 + 1 : in1 ] for r = 1
f Theory, vol. 63, no. 10, pp. 6650–6678, Oct. 2017.
fk+1 : k ∈ [(i−1)rn1 : (irn1 −1)](mod N ) for r ≥ 2. [14] F. Xu, M. Tao, and K. Liu, “Fundamental tradeoff between storage and
and W latency in cache-aided wireless interference networks,” IEEE Trans. Inf.
In r ≥ 2 case, we can let each transmitter only transmit the Theory, vol. 63, no. 11, pp. 7464–7491, Nov. 2017.
n1 messages among the total rn1 messages, and different [15] J. Hachem, U. Niesen, and S. Diggavi, “Degrees of freedom of cache-
aided wireless interference networks,” IEEE Trans. Inf. Theory, pp. 1–1,
transmitters transmit non-overlapped messages. By doing so, 2018.
we construct a downlink channel with the same information [16] A. M. Girgis, Ö. Erçetin, M. Nafie, and T. A. ElBatt, “Degrees of
flow as r =1 case. Utilizing the alignment scheme in r = 1 freedom of interference networks with transmitter-side caches,” CoRR,
vol. abs/1712.05957, 2017. [Online]. Available: http://arxiv.org/abs/
case, we thus obtain a per-receiver DoF of NM+M nfor r≥ 2 case.
o 1712.05957
Comparing above two schemes, a Dof of max NM r
+M , N is [17] V. R. Cadambe, S. A. Jafar, “Interference alignment and the degrees
of freedom of wireless X networks,” IEEE Trans. Inf. Theory, vol. 55,
obtained. no. 9, pp. 3893–3908, Sep. 2009.
Summarizing the per-receiver DoF for r = 1 and r ≥ 2 cases, [18] T. Gou and S. A. Jafar, “Degrees of freedom of the k user mtimesn
we thus prove Lemma 2. mimo interference channel,” IEEE Trans. Inf. Theory, vol. 56, no. 12,
pp. 6040–6057, Dec 2010.
2) Converse proof of Lemma 2: For the upper bound, we [19] H. Weingarten, Y. Steinberg, and S. S. Shamai, “The capacity region
assume that each transmitter has known all N task output of the gaussian multiple-input multiple-output broadcast channel,” IEEE
messages so that the full transmitter cooperation among M Trans. Inf. Theory, vol. 52, no. 9, pp. 3936–3964, Sep. 2006.
transmitters is enabled. This assumption can only improve the
channel capacity. We thus construct a virtual MISO broadcast
channel with N single-antenna receivers and a M -antenna
transmitter, whose optimal sum DoF is min{M, N } [19]. The
capacity of the considered cooperative interference channel
cannot exceed that of this virtual MISO broadcast channel.
∗
Hence, the optimal per-receiver DoF DoFrd is upper bounded
}
by min{M,N
N . The gap between this upper bound and the
∗
DoFrd
achievable lower bound in (16) satisfies DoFrd
≤ 2.
R EFERENCES
[1] S. Barbarossa, S. Sardellitti, and P. D. Lorenzo, “Communicating while
computing: Distributed mobile cloud computing over 5G heterogeneous
networks,” IEEE Signal Process. Mag., vol. 31, no. 6, pp. 45–55, Nov.
2014.
[2] Y. Mao, C. You, J. Zhang, K. Huang, and K. B. Letaief, “A survey
on mobile edge computing: The communication perspective,” IEEE
Commun. Surveys Tuts., vol. 19, no. 4, pp. 2322–2358, 4th Quart. 2017.
[3] S. Li, M. A. Maddah-Ali, and A. S. Avestimehr, “Communication-aware
computing for edge processing,” in Proc. IEEE Int. Symp. Inf. Theory
(ISIT), Jun. 2017, pp. 2885–2889.
[4] J. Liu, Y. Mao, J. Zhang, and K. B. Letaief, “Delay-optimal computation
task scheduling for mobile-edge computing systems,” in Proc. IEEE Int.
Symp. Inf. Theory (ISIT), Jul. 2016, pp. 1451–1455.
[5] A. Al-Shuwaili and O. Simeone, “Energy-efficient resource allocation
for mobile edge computing-based augmented reality applications,” IEEE
Wireless Commun. Letters, vol. 6, no. 3, pp. 398–401, Jun. 2017.