Robust Access Point Clustering in Edge Computing Resource Optimization

نویسندگان

چکیده

Multi-access Edge Computing (MEC) technology has emerged to overcome traditional cloud computing limitations, challenged by the new 5G services with heavy and heterogeneous requirements on both latency bandwidth. In this work, we tackle problem of clustering access points in MEC environments, introducing a set models be deployed at pre-provisioning phase. We go through extensive simulations real-world traffic demands evaluate performance proposed solutions. addition, show how hosts capacity violation can decreased when integrating into orchestration model, investigating solution accuracy applied held-out users demands. The obtained results that our approach outperforms two state-of-the-art algorithms, reducing memory usage execution time, 46% 50%, respectively, comparison baseline algorithm. It surpasses methods gaining control over for different maximum achieved occupancy levels hosts.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Resource Sharing of a Computing Access Point for Multi-user Mobile Cloud Offloading with Delay Constraints

We consider a mobile cloud computing system with multiple users, a remote cloud server, and a computing access point (CAP). The CAP serves both as the network access gateway and a computation service provider to the mobile users. It can either process the received tasks from mobile users or offload them to the cloud. We jointly optimize the offloading decisions of all users, together with the a...

متن کامل

Optimal Pricing-Based Edge Computing Resource Management in Mobile Blockchain

As the core issue of blockchain, the mining requires solving a proof-of-work puzzle, which is resource expensive to implement in mobile devices due to high computing power needed. Thus, the development of blockchain in mobile applications is restricted. In this paper, we consider the edge computing as the network enabler for mobile blockchain. In particular, we study optimal pricing-based edge ...

متن کامل

Reliable Distributed Authentication in Multi-Access Mobile Edge Computing

The fifth generation (5G) mobile telecommunication network is expected to support multi-access mobile edge computing (MEC), which intends to distribute computation tasks and services from the central cloud to the edge clouds. Towards ultraresponsive, ultra-reliable and ultra-low-latency MEC services, the current mobile network security architecture should enable more decentralized approach for ...

متن کامل

Resource optimization for fault-tolerant quantum computing

Quantum computing offers the potential for efficiently solving otherwise classically difficult problems, with applications in material and drug design, cryptography, theoretical physics, number theory and more. However, quantum systems are notoriously fragile; interaction with the surrounding environment and lack of precise control constitute noise, which makes construction of a reliable quantu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Network and Service Management

سال: 2022

ISSN: ['2373-7379', '1932-4537']

DOI: https://doi.org/10.1109/tnsm.2022.3186856