413 Hits in 7.0 sec

Multi-Access Edge Computing: A Survey

Abderrahime Filali, Amine Abouaomar, Soumaya Cherkaoui, Abdellatif Kobbane, Mohsen Guizani
2020 IEEE Access  
Finally, we propose an architectural framework for a MEC-NFV environment based on the standard SDN architecture.  ...  Multi-access Edge Computing (MEC) is a key solution that enables operators to open their networks to new services and IT ecosystems to leverage edge-cloud benefits in their networks and systems.  ...  [40] formulate a VNF placement optimization problem that minimizes the end-toend latency of the MEC network.  ... 
doi:10.1109/access.2020.3034136 fatcat:ncqn7le65jfshcqnqzy7twrwwu

Adaptive Service Function Chain Scheduling in Mobile Edge Computing via Deep Reinforcement Learning

Tianfeng Wang, Jiachen Zu, Guyu Hu, Dongyang Peng
2020 IEEE Access  
This technology not only minimizes the end-to-end latency but also increases the efficiency of computing.  ...  To solve this optimization problem, a deep reinforcement learning based algorithm DQS is proposed.  ...  In order to solve the scheduling problem in the online scenario, a matching-based algorithm is proposed, which can guarantee a stable scheduling [39] .  ... 
doi:10.1109/access.2020.3022038 fatcat:oysyyob5sjdldfldqptgn7flrq

Optimal orchestration of virtual network functions

Meihui Gao, Bernardetta Addis, Mathieu Bouet, Stefano Secci
2018 Computer Networks  
The emergence of Network Functions Virtualization (NFV) is bringing a set of novel algorithmic challenges in the operation of communication networks.  ...  Virtual Network Functions (VNFs) can belong to VNF chains, where nodes in a chain can serve multiple demands coming from the network edges.  ...  Meihui Gao Ph.D. is supported by a grant of the French Ministry of Advanced Education and Research.  ... 
doi:10.1016/j.comnet.2018.06.006 fatcat:2hk3s3lksrdzjoccrde3llskz4

NETRA: Enhancing IoT Security using NFV-based Edge Traffic Analysis [article]

Rishi Sairam, Suman Sankar Bhunia, Vijayanand Thangavelu, Mohan Gurusamy
2018 arXiv   pre-print
We study the performance of proposed NFV based edge analysis for IoT security and show that attacks can be detected with more than 95% accuracy in less than a second.  ...  We explain the importance of Network Function Virtualization (NFV) in order to deploy security functions at the network edge.  ...  The rest of the paper outlines the way to harness the power of Dockers and NFV to provide a secure platform for IoT.  ... 
arXiv:1805.10815v1 fatcat:v7xox3fc6jcwhkf2lyu3qweuju

Context-Aware Task Offloading for Multi-Access Edge Computing: Matching with Externalities

Bo Gu, Zhenyu Zhou, Shahid Mumtaz, Valerio Frascolla, Ali Kashif Bashir
2018 2018 IEEE Global Communications Conference (GLOBECOM)  
Hence, we propose a matching theory based task assignment mechanism which takes into account the devices' and MEC servers' computation capabilities, wireless channel conditions, and delay constraints.  ...  Since offloading tasks incurs extra transmission energy consumption and transmission latency, two key questions to be addressed in MEC deployments are: (i) offload the workload to the edge or compute it  ...  Then we propose a heuristic swap matching based algorithm that solves the energy consumption minimization problem in focus.  ... 
doi:10.1109/glocom.2018.8647845 dblp:conf/globecom/GuZMFB18 fatcat:wcw7ypxqunfsjc3b3xxp5kjspa

Enabling Heterogeneous Network Function Chaining

Lin Cui, Fung Po Tso, Song Guo, Weijia Jia, Kaimin Wei, Wei Zhao
2019 IEEE Transactions on Parallel and Distributed Systems  
HOPE guarantees that network functions (NFs) that implement a policy chain are optimally placed onto heterogeneous NFBs such that the network cost of the policy is minimized.  ...  This observation is then used to formulate the Heterogeneous Network Policy Placement problem, which is shown to be NP-Hard. To solve the problem efficiently, an online algorithm is proposed.  ...  Example: Cost on Delays We will show an example of how to calculate the cost of a policy based on latency, i.e., Cost(p i ) = T (p i ).  ... 
doi:10.1109/tpds.2018.2871845 fatcat:pobvbe7qjbeytgoqiehygsmpqu

Heterogeneous NetwOrk Policy Enforcement in data centers

Lin Cui, Fung Po Tso, Weijia Jia
2017 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)  
Given the set of F, P, NFBs B and D, we need to find an appropriate allocation of NFs A, which that minimizes the total expected end-to-end delays of the network: Sink (f.dst) D (b x , f. d st ) ...  ...  For a node x in 1st tier, the weight of edges from f i .src to x is D(f i .src, x)+ t p (s). For a node y in lth tier, the weight of the directed edges from y to f i .dst is D(y, f i .dst).  ... 
doi:10.23919/inm.2017.7987327 dblp:conf/im/CuiTJ17 fatcat:p4lr3yrukbfu7lbn3toxsgqvz4

Low-latency Networking: Where Latency Lurks and How to Tame It [article]

Xiaolin Jiang, Hossein S. Ghadikolaei, Gabor Fodor, Eytan Modiano, Zhibo Pang, Michele Zorzi, Carlo Fischione
2018 arXiv   pre-print
We will be able to develop low-latency networks only if we address the problem of these complex interactions from the new point of view of sub-milliseconds latency.  ...  In this article, we propose a holistic analysis and classification of the main design principles and enabling technologies that will make it possible to deploy low-latency wireless communication networks  ...  [167] formulated a constrained shortest path problem to minimize a convex combination of packet loss and jitter subject to an end-to-end latency constraint.  ... 
arXiv:1808.02079v1 fatcat:oelyjh7uebg3pmkblv4wq35ks4

Low-Latency Networking: Where Latency Lurks and How to Tame It

Xiaolin Jiang, Hossein Shokri-Ghadikolaei, Gabor Fodor, Eytan Modiano, Zhibo Pang, Michele Zorzi, Carlo Fischione
2018 Proceedings of the IEEE  
Ultimately, the fifth step of the communication network revolution is expected to ensure end-to-end communication latencies below 1 ms.  ...  The vision is founded on the implementation of a "wireless sense" using low-latency and highly reliable proximal communications via device-to-device and short-range communication technologies [7] , thereby  ...  [167] formulated a constrained shortest path problem to minimize a convex combination of packet loss and jitter subject to an end-to-end latency constraint.  ... 
doi:10.1109/jproc.2018.2863960 fatcat:azsjbzlunvbtbfjexhbnxsco3a

Enforcing network policy in heterogeneous network function box environment

Lin Cui, Fung Po Tso, Weijia Jia
2018 Computer Networks  
scheme that will not only support the use of both physical and virtual NFBs but also minimize latency along the policy path (i.e. service chain) such that end-to-end delay will become more predictable  ...  and not a mix, and secondly, NFBs can co-exist at various locations in the network as a result of emerging technologies such as Software Defined Networking (SDN) and network function virtualization (NFV  ...  Acknowledgements The work has been partially supported in part by Chinese National Re-  ... 
doi:10.1016/j.comnet.2018.03.029 fatcat:zaqofoa3gveqnbj24dzqmwr6eq

The 5G Ecosystem Forges Ahead as Remote Services Take Center Stage [Mobile Radio]

Claudio Casetti
2021 IEEE Vehicular Technology Magazine  
Commercial devices based on the Snapdragon 750 G were expected to be commercially available by the end of 2020.  ...  Huawei MEC nodes collaborate with training platforms in the cloud to periodically update the industrial vision algorithms and manage algorithms used on different edge nodes in a unified manner, simplifying  ... 
doi:10.1109/mvt.2020.3039294 fatcat:yrwc2hwp5vbx7lddj45gigxzdq

Network Slicing with Mobile Edge Computing for Micro-Operator Networks in Beyond 5G

Tachporn Sanguanpuak, Nandana Rajatheva, Dusit Niyato, Matti Latva-aho
2018 2018 21st International Symposium on Wireless Personal Multimedia Communications (WPMC)  
We numerically show that the solution of the matching game leads to two-sided stable matching.  ...  We illustrate that it is sufficient for the MNO to use a small fraction of the SBS to serve the UE while satisfying the latency constraint.  ...  The algorithm keeps track of the best matching found thus far. This algorithm converges to a two-sided exchange-stable matching [11] .  ... 
doi:10.1109/wpmc.2018.8712904 dblp:conf/wpmc/SanguanpuakRNL18 fatcat:rszyzdajxzcrzifrq43vljlm7y

Research Challenges for Network Function Virtualization - Re-Architecting Middlebox for High Performance and Efficient, Elastic and Resilient Platform to Create New Services -

2018 IEICE transactions on communications  
plane of a middlebox and enables the innovation of policy implementation by using SF chaining.  ...  Even though there have been several survey studies in this area, this area is continuing to grow rapidly. In this paper, we present a recent survey of this area.  ...  These vertical edges are weighted by a cost that is defined by the processing cost for using a NF on node v. Shortest path algorithms, such as Dijkstra's, are used to compute the path.  ... 
doi:10.1587/transcom.2017ebi0001 fatcat:5u722sdhsjfrxcfz6vqn3cq3yu

A Comprehensive Survey of the Tactile Internet: State of the art and Research Directions [article]

N. Promwongsa, A. Ebrahimzadeh, D. Naboulsi, S. Kianpisheh, F. Belqasmi, R. Glitho, N. Crespi, O. Alfandi
2020 arXiv   pre-print
To address these lacunae, we provide a comprehensive survey of the architectures and algorithms proposed to date for the Tactile Internet.  ...  The Internet has made several giant leaps over the years, from a fixed to a mobile Internet, then to the Internet of Things, and now to a Tactile Internet.  ...  ACKNOWLEDGMENT This work is partially funded by the Canadian Natural Sciences and Engineering Research Council (NSERC) and by Ericsson through a CRD grant, as well as by the Canada Research Chair program  ... 
arXiv:2009.12164v1 fatcat:iymlwb3gufhjzfkiuiatza2kni

Artificial Intelligence-Empowered Edge of Vehicles: Architecture, Enabling Technologies, and Applications

Hongjing Ji, Osama Alfarraj, Amr Tolba
2020 IEEE Access  
To substantially reduce the latency and the energy consumption, application work is offloaded from a mobile device to a remote cloud or a nearby mobile edge cloud for processing.  ...  Compared with remote clouds, mobile edge clouds are located at the edge of the network.  ...  By actively storing files in the base station (BS), the mobile edge cache can provide content directly without remote file extraction, which reduces the end-to-end latency and the backhaul stress.  ... 
doi:10.1109/access.2020.2983609 fatcat:b45abdrxbracnbfpvtvtu5uxui
« Previous Showing results 1 — 15 out of 413 results