Skip to main content Accessibility help
×
Hostname: page-component-7c8c6479df-nwzlb Total loading time: 0 Render date: 2024-03-19T11:56:01.535Z Has data issue: false hasContentIssue false

4 - Mobile Edge Computing

from Part I - Communication Network Architectures for 5G Systems

Published online by Cambridge University Press:  28 April 2017

Ben Liang
Affiliation:
The University of Toronto, Canada
Vincent W. S. Wong
Affiliation:
University of British Columbia, Vancouver
Robert Schober
Affiliation:
Friedrich-Alexander-Universität Erlangen-Nürnberg, Germany
Derrick Wing Kwan Ng
Affiliation:
University of New South Wales, Sydney
Li-Chun Wang
Affiliation:
National Chiao Tung University, Taiwan
Get access

Summary

Introduction

The ongoing development of the fifth generation (5G) wireless technologies is taking place in a unique landscape of recent advancement in information processing, marked by the emerging prevalence of cloud-based computing and smart mobile devices. These two technologies complement each other by design, with cloud servers providing the engine for computing and smart mobile devices naturally serving as human interfaces and untethered sensory inputs. Together, they are transforming a wide array of important applications such as telecommunications, industrial production, education, e-commerce, mobile healthcare, and environmental monitoring. We are entering a world where computation is ubiquitously accessible on local devices, global servers, and processors everywhere in between. Future wireless networks will provide communication infrastructure support for this ubiquitous computing paradigm, but at the same time they can also utilize the new-found computing power to drastically improve communication efficiency, expand service variety, shorten service delay, and reduce operational expenses.

The previous generations of wireless networks are passive systems. Residing near the edge of the Internet, they serve only as communication access pathways for mobile devices to reach the Internet core and the public switched telephone network (PSTN). Improvements to these wireless networks have focused on the communication hardware and software, such as advanced electronics and signal processing in the transmitters and receivers. Even for 5G, substantial research effort has been devoted to densification techniques, such as small cells, device-to-device (D2D) communications, and massive multiple-input multiple-output (MIMO). The successes of this communication-only wireless evolution reflect the classical view of an information age centered on information consumption through the Internet.

Yet, in many emerging applications, communication and computation are no longer separated, but interactive and unified. For example, in an augmented-reality application, which might be displayed on smart eyeglasses, the user's mobile device continuously records its current view, computes its own location, and streams the combined information to the cloud server, while the cloud server performs pattern recognition and information retrieval and sends back to the mobile device contextual augmentation labels, to be seamlessly displayed overlaying the actual scenery. As it can be seen from this example, there is a high level of interactivity between the communication and computing functions, and a low tolerance for the total delay due to information transmission and information processing.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2017

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

[1] 5G Infrastructure Public Private Partnership, “5G vision: The 5G infrastructure public private partnership: The next generation of communication networks and services,” Feb. 2015.
[2] B., Ahlgren, C., Dannewitz, C., Imbrenda, D., Kutscher, and B., Ohlman, “A survey of information-centric networking,” IEEE Commun. Mag., vol. 50, no. 7, pp. 26–36, Jul. 2012.Google Scholar
[3] W., Bao and B., Liang, “Stochastic geometric analysis of user mobility in heterogeneous wireless networks,” IEEE J. Sel. Areas Commun., vol. 33, no. 10, pp. 2212–2225, Oct. 2015.Google Scholar
[4] F., Bonomi, R., Milito, J., Zhu, and S., Addepalli, “Fog computing and its role in the Internet of Things,” in Proc. of ACM SIGCOMM Workshop on Mobile Cloud Computing, Helsinki, Finland, Aug. 2012.
[5] D. G., Cattrysse and L. N., Van Wassenhove, “A survey of algorithms for the generalized assignment problem,” Eur. J. Oper. Res., vol. 60, no. 3, pp. 260–272, 1992.Google Scholar
[6] J. P., Champati and B., Liang, “Semi-online task partitioning and communication between local and remote processors,” in Proc. of IEEE International Conf. on Cloud Networking (CLOUDNET), Niagara Falls, Canada, Oct. 2015.
[7] J. P., Champati and B., Liang, “One-restart algorithm for scheduling and offloading in a hybrid cloud,” in Proc. of IEEE/ACM International Symposium on Quality of Service (IWQoS), Portland, OR, Jun. 2015.
[8] A., Checko, H. L., Christiansen, Y., Yan, L., Scolari, G., Kardaras, M. S., Berger, and L., Dittmann, “Cloud RAN for mobile networks – A technology overview,” IEEE Commun. Surv. Tutor., vol. 17, no. 1, pp. 405–426, First Quarter 2015.Google Scholar
[9] Y., Chen, A., Das, W., Qin, A., Sivasubramaniam, Q., Wang, and N., Gautam, “Managing server energy and operational costs in hosting centers,” in Proc. of ACM International Conf. on Measurement and Modeling of Computer Systems (SIGMETRICS), Banff, Canada, Jun. 2005.
[10] M. H., Chen, M., Dong, and B., Liang, “Joint offloading decision and resource allocation for mobile cloud with computing access point,” in Proc. of IEEE International Conf. on Acoustics, Speech and Signal Processing (ICASSP), Shanghai, China, Mar. 2016.
[11] B., Chun, S., Ihm, P., Maniatis, M., Naik, and A., Patti, “CloneCloud: Elastic execution between mobile device and cloud,” in Proc. of the European Conf. on Computer Systems (EuroSys), Salzburg, Austria, Apr. 2011.
[12] C., Clark, K., Fraser, S., Hand, J. G., Hansen, E., Jul, C., Limpach, I., Pratt, and A., Warfield, “Live migration of virtual machines,” in Proc. of USENIX Symposium on Networked Systems Design and Implementation (NSDI), Berkeley, CA, May 2005.
[13] E., Cuervo, A., Balasubramanian, D., Cho, A., Wolman, S., Saroiu, R., Chandra, and P., Bahl, “MAUI: Making smartphones last longer with code offload,” in Proc. of ACM International Conf. on Mobile Systems, Applications, and Services (MobiSys), San Francisco, CA, Jun. 2010.
[14] K., Doppler, M., Rinne, C., Wijting, C. B., Ribeiro, and K., Hugl, “Device-to-device communication as an underlay to LTE-Advanced networks,” IEEE Commun. Mag., vol. 47, no. 12, pp. 42–49, Dec. 2009.Google Scholar
[15] M., Drozdowski, Scheduling for Parallel Processing, Springer, 2009.
[16] ETSI, “Mobile edge computing (MEC); Technical requirements,” ETSI GS MEC 002 V1.1.1 (2016-03), Mar. 2016.
[17] ETSI, “Mobile edge computing (MEC); Framework and reference architecture,” ETSI GS MEC 003 V1.1.1 (2016-03), Mar. 2016.
[18] E., Friedman, A., Ghodsi, and C. A., Psomas, “Strategyproof allocation of discrete jobs on multiple machines,” in Proc. of ACM Conf. on Economics and Computation (EC), Palo Alto, CA, Jun. 2014.
[19] M., Gerla and L., Kleinrock, “Vehicular networks and the future of the mobile Internet,” Comput. Netw., vol. 55, no. 2, pp. 457–469, Feb. 2011.Google Scholar
[20] A., Ghodsi, M., Zaharia, B., Hindman, A., Konwinski, S., Shenker, and I., Stoica, “Dominant resource fairness: Fair allocation of multiple resource types,” in Proc. of USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, Mar. 2011.
[21] G., Ghinita, P., Kalnis, and S., Skiadopoulos, “PRIVE: Anonymous location-based queries in distributed mobile systems,” in Proc. of ACM International Conf. on World Wide Web (WWW), Banff, Canada, May 2007.
[22] A., Greenberg, J., Hamilton, D. A., Maltz, and P., Patel, “The cost of a cloud: Research problems in data center networks,” ACM SIGCOMM Computer Commun. Rev., vol. 39, no. 1, pp. 68–73, Dec. 2008.Google Scholar
[23] T., Guo, U., Sharma, P., Shenoy, T., Wood, and S., Sahu, “Cost-aware cloud bursting for enterprise applications,” ACM Trans. Internet Technol., vol. 13, no. 3, 10:1–10:24, May 2014.Google Scholar
[24] B., Han, V., Gopalakrishnan, L., Ji, and S., Lee, “Network function virtualization: Challenges and opportunities for innovations,” IEEE Commun. Mag., vol. 53, no. 2, pp. 90–97, Feb. 2015.Google Scholar
[25] C., Joe-Wong, S., Sen, T., Lan, and M., Chiang, “Multi-resource allocation: Fairness–efficiency tradeoffs in a unifying framework,” in Proc. of IEEE International Conference on Computer Communications (INFOCOM), Orlando, FL, Mar. 2012.
[26] K., Kumar and Y. H., Lu, “Cloud computing for mobile users: Can offloading computation save energy?” IEEE Computer, vol. 43, no. 4, pp. 51–56, Apr. 2010.Google Scholar
[27] K., Kumar, J., Liu, Y. H., Lu, and B., Bhargava, “A survey of computation offloading for mobile systems,” Mobile Netw. Appl., vol. 18, no. 1, pp. 129–140, Feb. 2013.Google Scholar
[28] E., Lee, E. K., Lee, M., Gerla, and S. Y., Oh, “Vehicular cloud networking: Architecture and design principles,” IEEE Commun. Mag., vol. 52, no. 2, pp. 148–155, Feb. 2014.Google Scholar
[29] A., Manzalini, R., Minerva, F., Callegati, W., Cerroni, and A., Campi, “Clouds of virtual machines in edge networks,” IEEE Commun. Mag., vol. 51, no. 7, pp. 63–70, Jul. 2013.Google Scholar
[30] T. T. T., Nguyen and G., Armitage, “A survey of techniques for Internet traffic classification using machine learning,” IEEE Commun. Surv. Tutor., vol. 10, no. 4, pp. 56–76, Fourth Quarter 2008.Google Scholar
[31] D., Oppenheimer, B., Chun, D., Patterson, A. C., Snoeren, and A., Vahdat, “Service placement in a shared wide-area platform,” in Proc. of USENIX Annual Technical Conf., Boston, MA, Jun. 2006.
[32] G., Pek, L., Buttyan, and B., Bencsath, “A survey of security issues in hardware virtualization,” ACM Comput. Surv., vol. 45, no. 3, pp. 40:1–40:34, Jul. 2013.Google Scholar
[33] M. L., Pinedo, Scheduling: Theory, Algorithms, and Systems, Springer, 2012.
[34] R., Ravindran, X., Liu, A., Chakraborti, X., Zhang, and G., Wang, “Towards software defined ICN based edge-cloud services,” in Proc. of IEEE International Conf. on Cloud Networking (CloudNet), San Francisco, CA, Nov. 2013.
[35] M., Satyanarayanan, P., Bahl, R., Caceres, and N., Davies, “The case for VM-based cloudlets in mobile computing,” IEEE Pervasive Comput., vol. 8, no. 4, pp. 14–23, Oct.–Dec. 2009.Google Scholar
[36] M., Satyanarayanan, G., Lewis, E., Morris, S., Simanta, J., Boleng, and K., Ha, “The role of cloudlets in hostile environments,” IEEE Pervasive Comput., vol. 12, no. 4, pp. 40–49, Oct.–Dec. 2013.Google Scholar
[37] B., Sharma, V., Chudnovsky, J. L., Hellerstein, R., Rifaat, and C. R., Das, “Modeling and synthesizing task placement constraints in Google compute clusters,” in Proc. of the ACM Symposium on Cloud Computing (SoCC), Cascais, Portugal, Oct. 2011.
[38] D. B., Shmoys, J., Wein, and D., P.Williamson, “Scheduling parallel machines on-line,” SIAM J. Comput., vol. 24, no. 6, pp. 1313–1331, Dec. 1995.Google Scholar
[39] Y., Song, M., Zafer, and K. W., Lee, “Optimal bidding in spot instance market,” in Proc. of IEEE International Conf. on Computer Communications (INFOCOM), Orlando, FL, Mar. 2012.
[40] E., Stevens-Navarro, Y., Lin, and V. W. S., Wong, “An MDP-based vertical handoff decision algorithm for heterogeneous wireless networks,” IEEE Trans. Veh. Technol., vol. 57, no. 2, pp. 1243–1254, Mar. 2008.Google Scholar
[41] I., Stojmenovic, S., Wen, X., Huang, and H., Luan, “An overview of fog computing and its security issues,” Concurr. Comput.: Pract. Exp., vol. 28, no. 10, pp. 2991–3005, Jul. 2016.Google Scholar
[42] S., Sundar and B., Liang, “Communication augmented latest possible scheduling for cloud computing with delay constraint and task dependency,” in Proc. of IEEE INFOCOM Workshop on Green and Sustainable Networking and Computing (GSNC), San Francisco, CA, Apr. 2016.
[43] R., Urgaonkara, S., Wang, T., He, M., Zafer, K., Chan, and K. K., Leung, “Dynamic service migration and workload scheduling in edge-clouds,” Perform. Eval., vol. 91, pp. 205–228, Sep. 2015.Google Scholar
[44] C., Wang and Z., Li, “Parametric analysis for adaptive computation offloading,” in Proc. of ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI), Washington, DC, Jun. 2004.
[45] W., Wang, B., Li, and B., Liang, “Towards optimal capacity segmentation with hybrid cloud pricing,” in Proc. of IEEE International Conf. on Distributed Computing Systems (ICDCS), Macau, China, Jun. 2012.
[46] W., Wang, C., Feng, B., Li, and B., Liang, “On the fairness–efficiency tradeoff for packet processing with multiple resources,” in Proc. of ACM SIGCOMM International Conf. on Emerging Networking Experiments and Technologies (CoNEXT), Sydney, Australia, Dec. 2014.
[47] W., Wang, D., Niu, B., Liang, and B., Li, “Dynamic cloud resource reservation via IaaS cloud brokerage,” IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 6, pp. 1580–1593, Jun. 2015.Google Scholar
[48] W., Wang, B., Liang, and B., Li, “Multi-resource fair allocation in heterogeneous cloud computing systems,” IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 10, pp. 2822–2835, Oct. 2015.Google Scholar
[49] R., Yahalom, B., Klein, and T., Beth, “Trust relationships in secure systems – A distributed authentication perspective,” in Proc. of IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, May 1993.
[50] H. P., Young, Equity: In Theory and Practice, Princeton University Press, 1994.
[51] Q., Zhang, Q., Zhu, and R., Boutaba, “Dynamic resource allocation for spot markets in cloud computing environments,” in Proc. of IEEE International Conf. on Utility and Cloud Computing (UCC), Victoria, Australia, Dec. 2011.
[52] B., Zhou, A. V., Dastjerdi, R. N., Calheiros, S. N., Srirama, and R., Buyya, “A context sensitive offloading scheme for mobile cloud computing service,” in Proc. of IEEE International Conf. on Cloud Computing (CLOUD), New York, Jun. 2015.

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×