Robust Access Point Clustering in Edge Computing Resource Optimization
نویسندگان
چکیده
Multi-access Edge Computing (MEC) technology has emerged to overcome traditional cloud computing limitations, challenged by the new 5G services with heavy and heterogeneous requirements on both latency bandwidth. In this work, we tackle problem of clustering access points in MEC environments, introducing a set models be deployed at pre-provisioning phase. We go through extensive simulations real-world traffic demands evaluate performance proposed solutions. addition, show how hosts capacity violation can decreased when integrating into orchestration model, investigating solution accuracy applied held-out users demands. The obtained results that our approach outperforms two state-of-the-art algorithms, reducing memory usage execution time, 46% 50%, respectively, comparison baseline algorithm. It surpasses methods gaining control over for different maximum achieved occupancy levels hosts.
منابع مشابه
Resource Sharing of a Computing Access Point for Multi-user Mobile Cloud Offloading with Delay Constraints
We consider a mobile cloud computing system with multiple users, a remote cloud server, and a computing access point (CAP). The CAP serves both as the network access gateway and a computation service provider to the mobile users. It can either process the received tasks from mobile users or offload them to the cloud. We jointly optimize the offloading decisions of all users, together with the a...
متن کاملOptimal Pricing-Based Edge Computing Resource Management in Mobile Blockchain
As the core issue of blockchain, the mining requires solving a proof-of-work puzzle, which is resource expensive to implement in mobile devices due to high computing power needed. Thus, the development of blockchain in mobile applications is restricted. In this paper, we consider the edge computing as the network enabler for mobile blockchain. In particular, we study optimal pricing-based edge ...
متن کاملReliable Distributed Authentication in Multi-Access Mobile Edge Computing
The fifth generation (5G) mobile telecommunication network is expected to support multi-access mobile edge computing (MEC), which intends to distribute computation tasks and services from the central cloud to the edge clouds. Towards ultraresponsive, ultra-reliable and ultra-low-latency MEC services, the current mobile network security architecture should enable more decentralized approach for ...
متن کاملResource optimization for fault-tolerant quantum computing
Quantum computing offers the potential for efficiently solving otherwise classically difficult problems, with applications in material and drug design, cryptography, theoretical physics, number theory and more. However, quantum systems are notoriously fragile; interaction with the surrounding environment and lack of precise control constitute noise, which makes construction of a reliable quantu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Network and Service Management
سال: 2022
ISSN: ['2373-7379', '1932-4537']
DOI: https://doi.org/10.1109/tnsm.2022.3186856