Skip to main content Accessibility help
×
Home
  • Cited by 31
  • Print publication year: 2017
  • Online publication date: April 2017

4 - Mobile Edge Computing

from Part I - Communication Network Architectures for 5G Systems

Summary

Introduction

The ongoing development of the fifth generation (5G) wireless technologies is taking place in a unique landscape of recent advancement in information processing, marked by the emerging prevalence of cloud-based computing and smart mobile devices. These two technologies complement each other by design, with cloud servers providing the engine for computing and smart mobile devices naturally serving as human interfaces and untethered sensory inputs. Together, they are transforming a wide array of important applications such as telecommunications, industrial production, education, e-commerce, mobile healthcare, and environmental monitoring. We are entering a world where computation is ubiquitously accessible on local devices, global servers, and processors everywhere in between. Future wireless networks will provide communication infrastructure support for this ubiquitous computing paradigm, but at the same time they can also utilize the new-found computing power to drastically improve communication efficiency, expand service variety, shorten service delay, and reduce operational expenses.

The previous generations of wireless networks are passive systems. Residing near the edge of the Internet, they serve only as communication access pathways for mobile devices to reach the Internet core and the public switched telephone network (PSTN). Improvements to these wireless networks have focused on the communication hardware and software, such as advanced electronics and signal processing in the transmitters and receivers. Even for 5G, substantial research effort has been devoted to densification techniques, such as small cells, device-to-device (D2D) communications, and massive multiple-input multiple-output (MIMO). The successes of this communication-only wireless evolution reflect the classical view of an information age centered on information consumption through the Internet.

Yet, in many emerging applications, communication and computation are no longer separated, but interactive and unified. For example, in an augmented-reality application, which might be displayed on smart eyeglasses, the user's mobile device continuously records its current view, computes its own location, and streams the combined information to the cloud server, while the cloud server performs pattern recognition and information retrieval and sends back to the mobile device contextual augmentation labels, to be seamlessly displayed overlaying the actual scenery. As it can be seen from this example, there is a high level of interactivity between the communication and computing functions, and a low tolerance for the total delay due to information transmission and information processing.

[1] 5G Infrastructure Public Private Partnership, “5G vision: The 5G infrastructure public private partnership: The next generation of communication networks and services,” Feb. 2015.
[2] B., Ahlgren, C., Dannewitz, C., Imbrenda, D., Kutscher, and B., Ohlman, “A survey of information-centric networking,” IEEE Commun. Mag., vol. 50, no. 7, pp. 26–36, Jul. 2012.
[3] W., Bao and B., Liang, “Stochastic geometric analysis of user mobility in heterogeneous wireless networks,” IEEE J. Sel. Areas Commun., vol. 33, no. 10, pp. 2212–2225, Oct. 2015.
[4] F., Bonomi, R., Milito, J., Zhu, and S., Addepalli, “Fog computing and its role in the Internet of Things,” in Proc. of ACM SIGCOMM Workshop on Mobile Cloud Computing, Helsinki, Finland, Aug. 2012.
[5] D. G., Cattrysse and L. N., Van Wassenhove, “A survey of algorithms for the generalized assignment problem,” Eur. J. Oper. Res., vol. 60, no. 3, pp. 260–272, 1992.
[6] J. P., Champati and B., Liang, “Semi-online task partitioning and communication between local and remote processors,” in Proc. of IEEE International Conf. on Cloud Networking (CLOUDNET), Niagara Falls, Canada, Oct. 2015.
[7] J. P., Champati and B., Liang, “One-restart algorithm for scheduling and offloading in a hybrid cloud,” in Proc. of IEEE/ACM International Symposium on Quality of Service (IWQoS), Portland, OR, Jun. 2015.
[8] A., Checko, H. L., Christiansen, Y., Yan, L., Scolari, G., Kardaras, M. S., Berger, and L., Dittmann, “Cloud RAN for mobile networks – A technology overview,” IEEE Commun. Surv. Tutor., vol. 17, no. 1, pp. 405–426, First Quarter 2015.
[9] Y., Chen, A., Das, W., Qin, A., Sivasubramaniam, Q., Wang, and N., Gautam, “Managing server energy and operational costs in hosting centers,” in Proc. of ACM International Conf. on Measurement and Modeling of Computer Systems (SIGMETRICS), Banff, Canada, Jun. 2005.
[10] M. H., Chen, M., Dong, and B., Liang, “Joint offloading decision and resource allocation for mobile cloud with computing access point,” in Proc. of IEEE International Conf. on Acoustics, Speech and Signal Processing (ICASSP), Shanghai, China, Mar. 2016.
[11] B., Chun, S., Ihm, P., Maniatis, M., Naik, and A., Patti, “CloneCloud: Elastic execution between mobile device and cloud,” in Proc. of the European Conf. on Computer Systems (EuroSys), Salzburg, Austria, Apr. 2011.
[12] C., Clark, K., Fraser, S., Hand, J. G., Hansen, E., Jul, C., Limpach, I., Pratt, and A., Warfield, “Live migration of virtual machines,” in Proc. of USENIX Symposium on Networked Systems Design and Implementation (NSDI), Berkeley, CA, May 2005.
[13] E., Cuervo, A., Balasubramanian, D., Cho, A., Wolman, S., Saroiu, R., Chandra, and P., Bahl, “MAUI: Making smartphones last longer with code offload,” in Proc. of ACM International Conf. on Mobile Systems, Applications, and Services (MobiSys), San Francisco, CA, Jun. 2010.
[14] K., Doppler, M., Rinne, C., Wijting, C. B., Ribeiro, and K., Hugl, “Device-to-device communication as an underlay to LTE-Advanced networks,” IEEE Commun. Mag., vol. 47, no. 12, pp. 42–49, Dec. 2009.
[15] M., Drozdowski, Scheduling for Parallel Processing, Springer, 2009.
[16] ETSI, “Mobile edge computing (MEC); Technical requirements,” ETSI GS MEC 002 V1.1.1 (2016-03), Mar. 2016.
[17] ETSI, “Mobile edge computing (MEC); Framework and reference architecture,” ETSI GS MEC 003 V1.1.1 (2016-03), Mar. 2016.
[18] E., Friedman, A., Ghodsi, and C. A., Psomas, “Strategyproof allocation of discrete jobs on multiple machines,” in Proc. of ACM Conf. on Economics and Computation (EC), Palo Alto, CA, Jun. 2014.
[19] M., Gerla and L., Kleinrock, “Vehicular networks and the future of the mobile Internet,” Comput. Netw., vol. 55, no. 2, pp. 457–469, Feb. 2011.
[20] A., Ghodsi, M., Zaharia, B., Hindman, A., Konwinski, S., Shenker, and I., Stoica, “Dominant resource fairness: Fair allocation of multiple resource types,” in Proc. of USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, Mar. 2011.
[21] G., Ghinita, P., Kalnis, and S., Skiadopoulos, “PRIVE: Anonymous location-based queries in distributed mobile systems,” in Proc. of ACM International Conf. on World Wide Web (WWW), Banff, Canada, May 2007.
[22] A., Greenberg, J., Hamilton, D. A., Maltz, and P., Patel, “The cost of a cloud: Research problems in data center networks,” ACM SIGCOMM Computer Commun. Rev., vol. 39, no. 1, pp. 68–73, Dec. 2008.
[23] T., Guo, U., Sharma, P., Shenoy, T., Wood, and S., Sahu, “Cost-aware cloud bursting for enterprise applications,” ACM Trans. Internet Technol., vol. 13, no. 3, 10:1–10:24, May 2014.
[24] B., Han, V., Gopalakrishnan, L., Ji, and S., Lee, “Network function virtualization: Challenges and opportunities for innovations,” IEEE Commun. Mag., vol. 53, no. 2, pp. 90–97, Feb. 2015.
[25] C., Joe-Wong, S., Sen, T., Lan, and M., Chiang, “Multi-resource allocation: Fairness–efficiency tradeoffs in a unifying framework,” in Proc. of IEEE International Conference on Computer Communications (INFOCOM), Orlando, FL, Mar. 2012.
[26] K., Kumar and Y. H., Lu, “Cloud computing for mobile users: Can offloading computation save energy?” IEEE Computer, vol. 43, no. 4, pp. 51–56, Apr. 2010.
[27] K., Kumar, J., Liu, Y. H., Lu, and B., Bhargava, “A survey of computation offloading for mobile systems,” Mobile Netw. Appl., vol. 18, no. 1, pp. 129–140, Feb. 2013.
[28] E., Lee, E. K., Lee, M., Gerla, and S. Y., Oh, “Vehicular cloud networking: Architecture and design principles,” IEEE Commun. Mag., vol. 52, no. 2, pp. 148–155, Feb. 2014.
[29] A., Manzalini, R., Minerva, F., Callegati, W., Cerroni, and A., Campi, “Clouds of virtual machines in edge networks,” IEEE Commun. Mag., vol. 51, no. 7, pp. 63–70, Jul. 2013.
[30] T. T. T., Nguyen and G., Armitage, “A survey of techniques for Internet traffic classification using machine learning,” IEEE Commun. Surv. Tutor., vol. 10, no. 4, pp. 56–76, Fourth Quarter 2008.
[31] D., Oppenheimer, B., Chun, D., Patterson, A. C., Snoeren, and A., Vahdat, “Service placement in a shared wide-area platform,” in Proc. of USENIX Annual Technical Conf., Boston, MA, Jun. 2006.
[32] G., Pek, L., Buttyan, and B., Bencsath, “A survey of security issues in hardware virtualization,” ACM Comput. Surv., vol. 45, no. 3, pp. 40:1–40:34, Jul. 2013.
[33] M. L., Pinedo, Scheduling: Theory, Algorithms, and Systems, Springer, 2012.
[34] R., Ravindran, X., Liu, A., Chakraborti, X., Zhang, and G., Wang, “Towards software defined ICN based edge-cloud services,” in Proc. of IEEE International Conf. on Cloud Networking (CloudNet), San Francisco, CA, Nov. 2013.
[35] M., Satyanarayanan, P., Bahl, R., Caceres, and N., Davies, “The case for VM-based cloudlets in mobile computing,” IEEE Pervasive Comput., vol. 8, no. 4, pp. 14–23, Oct.–Dec. 2009.
[36] M., Satyanarayanan, G., Lewis, E., Morris, S., Simanta, J., Boleng, and K., Ha, “The role of cloudlets in hostile environments,” IEEE Pervasive Comput., vol. 12, no. 4, pp. 40–49, Oct.–Dec. 2013.
[37] B., Sharma, V., Chudnovsky, J. L., Hellerstein, R., Rifaat, and C. R., Das, “Modeling and synthesizing task placement constraints in Google compute clusters,” in Proc. of the ACM Symposium on Cloud Computing (SoCC), Cascais, Portugal, Oct. 2011.
[38] D. B., Shmoys, J., Wein, and D., P.Williamson, “Scheduling parallel machines on-line,” SIAM J. Comput., vol. 24, no. 6, pp. 1313–1331, Dec. 1995.
[39] Y., Song, M., Zafer, and K. W., Lee, “Optimal bidding in spot instance market,” in Proc. of IEEE International Conf. on Computer Communications (INFOCOM), Orlando, FL, Mar. 2012.
[40] E., Stevens-Navarro, Y., Lin, and V. W. S., Wong, “An MDP-based vertical handoff decision algorithm for heterogeneous wireless networks,” IEEE Trans. Veh. Technol., vol. 57, no. 2, pp. 1243–1254, Mar. 2008.
[41] I., Stojmenovic, S., Wen, X., Huang, and H., Luan, “An overview of fog computing and its security issues,” Concurr. Comput.: Pract. Exp., vol. 28, no. 10, pp. 2991–3005, Jul. 2016.
[42] S., Sundar and B., Liang, “Communication augmented latest possible scheduling for cloud computing with delay constraint and task dependency,” in Proc. of IEEE INFOCOM Workshop on Green and Sustainable Networking and Computing (GSNC), San Francisco, CA, Apr. 2016.
[43] R., Urgaonkara, S., Wang, T., He, M., Zafer, K., Chan, and K. K., Leung, “Dynamic service migration and workload scheduling in edge-clouds,” Perform. Eval., vol. 91, pp. 205–228, Sep. 2015.
[44] C., Wang and Z., Li, “Parametric analysis for adaptive computation offloading,” in Proc. of ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI), Washington, DC, Jun. 2004.
[45] W., Wang, B., Li, and B., Liang, “Towards optimal capacity segmentation with hybrid cloud pricing,” in Proc. of IEEE International Conf. on Distributed Computing Systems (ICDCS), Macau, China, Jun. 2012.
[46] W., Wang, C., Feng, B., Li, and B., Liang, “On the fairness–efficiency tradeoff for packet processing with multiple resources,” in Proc. of ACM SIGCOMM International Conf. on Emerging Networking Experiments and Technologies (CoNEXT), Sydney, Australia, Dec. 2014.
[47] W., Wang, D., Niu, B., Liang, and B., Li, “Dynamic cloud resource reservation via IaaS cloud brokerage,” IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 6, pp. 1580–1593, Jun. 2015.
[48] W., Wang, B., Liang, and B., Li, “Multi-resource fair allocation in heterogeneous cloud computing systems,” IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 10, pp. 2822–2835, Oct. 2015.
[49] R., Yahalom, B., Klein, and T., Beth, “Trust relationships in secure systems – A distributed authentication perspective,” in Proc. of IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, May 1993.
[50] H. P., Young, Equity: In Theory and Practice, Princeton University Press, 1994.
[51] Q., Zhang, Q., Zhu, and R., Boutaba, “Dynamic resource allocation for spot markets in cloud computing environments,” in Proc. of IEEE International Conf. on Utility and Cloud Computing (UCC), Victoria, Australia, Dec. 2011.
[52] B., Zhou, A. V., Dastjerdi, R. N., Calheiros, S. N., Srirama, and R., Buyya, “A context sensitive offloading scheme for mobile cloud computing service,” in Proc. of IEEE International Conf. on Cloud Computing (CLOUD), New York, Jun. 2015.