Automated Application Deployment on Multi-access Edge Computing: A Survey
نویسندگان
چکیده
The advent of technologies such as 5G makes it possible to improve the availability and quality existing services introduce new ones, enhanced mobile broadband, IoT applications, augmented reality, mission-critical services, cloud gaming, or smart infrastructure. It is now get faster responses a wide range requests, but addition more users can still make normal operation difficult due network congestion, bandwidth limitations, scalability issues, service differentiation, security concerns. To solve this problem, help meet Service Level Agreements (SLAs), some must be brought closer user. Multi-access Edge Computing (MEC) initiative step in direction, enabling cloud-like moved end user, providing lower access latencies. However, dynamic nature edge computing environments, mobility users, require implementation automated delivery processes that adapt environmental conditions, use optimal policies tailored scenario. This article surveys research focused on MECs, particularly those deployment mechanisms, namely Infrastructure Code (IaC) tools. Today, these tools play key role especially for maintaining policies, which under investigation. result assessment has been identification relevance IaC future directions.
منابع مشابه
A Survey on Access Control Deployment
Access control is a security aspect whose requirements evolve with technology advances and, at the same time, contemporary social contexts. Multitudes of access control models grow out of their respective application domains such as healthcare and collaborative enterprises; and even then, further administering means, human factor considerations, and infringement management are required to effec...
متن کاملReliable Distributed Authentication in Multi-Access Mobile Edge Computing
The fifth generation (5G) mobile telecommunication network is expected to support multi-access mobile edge computing (MEC), which intends to distribute computation tasks and services from the central cloud to the edge clouds. Towards ultraresponsive, ultra-reliable and ultra-low-latency MEC services, the current mobile network security architecture should enable more decentralized approach for ...
متن کاملMulti-channel Medium Access Control Protocols for Wireless Sensor Networks: A Survey
Extensive researches on Wireless Sensor Networks (WSNs) have been performed and many techniques have been developed for the data link (MAC) layer. Most of them assume single-channel MAC protocols. In the usual dense deployment of the sensor networks, single-channel MAC protocols may be deficient because of radio collisions and limited bandwidth. Hence, using multiple channels can significantly ...
متن کاملMulti-channel Medium Access Control Protocols for Wireless Sensor Networks: A Survey
Extensive researches on Wireless Sensor Networks (WSNs) have been performed and many techniques have been developed for the data link (MAC) layer. Most of them assume single-channel MAC protocols. In the usual dense deployment of the sensor networks, single-channel MAC protocols may be deficient because of radio collisions and limited bandwidth. Hence, using multiple channels can significantly ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2023
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2023.3307023