Actions at the Edge: Jointly Optimizing the Resources in Multi-Access Edge Computing
نویسندگان
چکیده
Multi-access edge computing (MEC) is an emerging paradigm that pushes resources for sensing, communications, computing, storage, and intelligence to the premises closer end users (i.e., edge) so they can leverage nearby rich improve their quality of experience. Due growing applications targeted at intelligentizing life-sustaining cyber-physical systems, this has become a hot research topic, particularly when MEC utilized provide real-time processing control. This article elaborates issues along line, including basic concepts performance metrics, killer applications, architectural design, modeling approaches solutions, future directions. It hoped provides quick introduction fruitful area, beginning researchers.
منابع مشابه
Access and Mobility Policy Control at the Network Edge
The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications ...
متن کاملOptimizing at the ergodic edge
Using a simple, annealed model, some of the key features of the recently introduced extremal optimization heuristic are demonstrated. In particular, it is shown that the dynamics of local search possesses a generic critical point under the variation of its sole parameter, separating phases of too greedy (non-ergodic, jammed) and too random (ergodic) exploration. Comparison of various local sear...
متن کاملReliable Distributed Authentication in Multi-Access Mobile Edge Computing
The fifth generation (5G) mobile telecommunication network is expected to support multi-access mobile edge computing (MEC), which intends to distribute computation tasks and services from the central cloud to the edge clouds. Towards ultraresponsive, ultra-reliable and ultra-low-latency MEC services, the current mobile network security architecture should enable more decentralized approach for ...
متن کاملMulti-access Edge Computing: The driver behind the wheel of 5G-connected cars
The automotive and telco industries have taken an investment bet on the connected car market, pushing for the digital transformation of the sector by exploiting recent Information and Communication Technology (ICT) progress. As ICT developments continue, it is expected that the technology advancements will be able to fulfill the sophisticated requirements for vehicular use cases, such as low la...
متن کاملThe effect of the angle upper edge in shaped noise barriers with a T-shaped upper edge
Background and Objective: Efforts to improve the effectiveness of noise barriers have been made, including shape, aesthetics, form and gender. Therefore, the aim of this study was to investigate the effect of the angle upper edge in shaped noise barriers with a T-shaped upper edge. Materials and Methods: A 2D boundary element method (BEM) was used to predict the insertion loss of the tested ba...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Wireless Communications
سال: 2022
ISSN: ['1558-0687', '1536-1284']
DOI: https://doi.org/10.1109/mwc.006.2100699