Recovery for overloaded mobile edge computing

被引:89
作者
Satria, Dimas [1 ]
Park, Daihee [1 ]
Jo, Minho [1 ]
机构
[1] Korea Univ, Dept Comp & Informat Sci, Sejong City, South Korea
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2017年 / 70卷
关键词
Mobile edge computing (MEC); Recovery schemes; Offloading; Ad-hoc relay node; Fog computing; MOTIVATION;
D O I
10.1016/j.future.2016.06.024
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Mobile edge computing (MEC) allows the use of its services with low latency, location awareness and mobility support to make up for the disadvantages of cloud computing. But an overloaded MEC system or any MEC system failure significantly degrades quality of experience (QoE) and negates the advantages of MEC. In this paper, we propose two different recovery schemes for overloaded or broken MEC. One recovery scheme is where an overloaded MEC offloads its work to available neighboring MECs within transfer range. The other recovery scheme is for situations when there is no available neighboring MEC within transfer range. The second scheme accesses user devices of a neighboring MEC adjacent to the overloaded MEC as ad-hoc relay nodes in order to bridge the transfer disconnect between two MECs. Numerical experiments demonstrated the performance and verified the possibility of the proposed schemes, providing insightful results for potential future research. (C) 2016 Elsevier B.V. All rights reserved.
引用
收藏
页码:138 / 147
页数:10
相关论文
共 33 条
[1]  
Ahmed A, 2016, PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO'16)
[2]   Seamless application execution in mobile cloud computing: Motivation, taxonomy, and open challenges [J].
Ahmed, Ejaz ;
Gani, Abdullah ;
Khan, Muhammad Khurram ;
Buyya, Rajkumar ;
Khan, Samee U. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2015, 52 :154-172
[3]   Application optimization in mobile cloud computing: Motivation, taxonomies, and open challenges [J].
Ahmed, Ejaz ;
Gani, Abdullah ;
Sookhak, Mehdi ;
Ab Hamid, Siti Hafizah ;
Xia, Feng .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2015, 52 :52-68
[4]  
[Anonymous], 36211 3GPP TR
[5]  
[Anonymous], 2009, LTE RES GUID
[6]   Cloud-Centric Multi-Level Authentication as a Service for Secure Public Safety Device Networks [J].
Butun, Ismail ;
Erol-Kantarci, Melike ;
Kantarci, Burak ;
Song, Houbing .
IEEE COMMUNICATIONS MAGAZINE, 2016, 54 (04) :47-53
[7]   Mobile cloud-based depression diagnosis using an ontology and a Bayesian network [J].
Chang, Yue-Shan ;
Fan, Chih-Tien ;
Lo, Win-Tsung ;
Hung, Wan-Chun ;
Yuan, Shyan-Ming .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2015, 43-44 :87-98
[8]   Adaptive Cloud Offloading of Augmented Reality Applications on Smart Devices for Minimum Energy Consumption [J].
Chung, Jong-Moon ;
Park, Yong-Suk ;
Park, Jong-Hong ;
Cho, HyoungJun .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (08) :3090-3102
[9]   Embedded speech recognition applications in mobile phones: Status, trends, and challenges [J].
Cohen, Jordan .
2008 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING, VOLS 1-12, 2008, :5352-5355
[10]  
Frydman D., 2015, 3AGUNA BLOG