Development and analysis of models for service migration to the MEC server based on hysteresis approach

Cover Page

Cite item

Abstract

Online video services are among the most popular ways of content consumption. Video hosting servers have a very high load every day, which we propose to reduce by migrating the application with the video content in demand to the local Multi-access Edge Computing (MEC) server of the target. This makes it possible to improve the quality of services (QoS) provided to users by reducing the transmission delay. Therefore, an architecture has been proposed that allows, at times of increased demand for the same video content, to migrate the video service application to the edge servers of the network operator. To evaluate the performance of this approach, a mathematical model was developed in the form of a queuing system. The results of the numerical experiment make it possible to optimize the time of using local MEC servers to provide video content.

Full Text

1. Introduction In the modern world, demand for various multimedia services is increasing every year. For example, services for providing online video content are very popular and allow us to access information in a simple way anytime and anywhere from a device with Internet connection. However, with the growth in the amounts of video content and an increase in its demand, requirements for the quality of the services (QoS) are as well increased. Video service providers, in turn, are trying to reduce transmission delays and improve the quality of the video, which increases the size of video files and requires more channel bandwidth to be transmitted to the end user. The idea of decentralized content placement by a video service provider is not new. In most countries, large cities, operators use the services of geographically distributed content delivery network architecture (CDN). It allows for the video data delivery optimization by using servers, located much closer to the end user. Multi-access Edge Computing (MEC) servers utilization allows service providers to optimize the transmission process by placing the user-requested content on servers not only within a specific city, but also within a specific district or street. In the same way it solves the problem of high load on transport networks, which is beneficial for the video service provider, who gets the opportunity to provide high-quality content. Thus, the transport network operator can reduce network operation costs and receive additional profit for renting edge computing servers. MEC introduces the cloud computing capabilities and IT service environment at the edge of the mobile network. The network edge includes base station infrastructure and data centers close to the radio network. In work [1], the authors have presented a classification of application models and a study of the latest models of mobile cloud applications. In [2], a brief analysis of the requirements for mobile cloud computing (MCC) have been done, the main applications and upload technologies, the classification of contexts and context management methods. In [3], the authors have provided an overview of the definitions, architectures, and applications of MCC, as well as common problems and some existing solutions. In reference [4] a study of existing work on MCC platforms and intelligent access schemes can be found. Another group of scientists in [5] has investigated a detailed taxonomy of mobile cloud computing based on key issues and approaches to address them. Work [6] has introduced a comprehensive overview of the current MCC authentication mechanism and compared cloud computing. The authors in [7] have studied a taxonomy of MEC based on various aspects, including its characteristics, access technologies, applications, purposes, etc. Reference [8] has categorized deployed applications in MEC according to the technical metrics of MEC and the benefit brought by MEC to network stakeholders. A discussion of threats and security in boundary paradigms, as well as possible solution for each specific problem, can be found in [9]. In [10], representative applications and various aspects of the study of fog computing problems are highlighted. An overview on emerging security and privacy issues in fog computing, as well as cloud computing issues is closely discussed in [11]. A study of web caching and prefetching methods for improving network performance, as well as a classification of web caching policies, can be found in [12]. A description of the advantages and disadvantages of cache replacement strategies can be found in [13]. The model of interaction between the edge computing based on Software-defined networking (SDN) and Network functions virtualization (NFV) technology and the cloud computing in the next generation Internet of Things (IoT) is presented in [14]. In [15] authors consider the usage of a MEC server for processing home health monitoring data locally, making it possible to optimize the system-wide cost and the number of patients benefiting from MEC. 2. System description As described above, the consumption of online video content is growing every year, since any information presented by a video sequence with sound accompaniment makes it easier to perceive or just spend leisure time. Requests for the provision of such services, especially of an entertainment nature, do not have a constant intensity, but in most cases occur in avalanche bursts at different times or days. For example, in the evening, most people come home from work and watch their favorite series, talk shows, etc. This section describes the process of providing online video and possible scenarios for optimizing content delivery to users. Figure 1. Network architecture for connecting users to a video content service The figure 1 shows a diagram for providing online video services to users. On the left side the service provider’s servers are shown. These servers host and process videos to provide the users on demand. On the right is the operator’s last mile access network, which provides end users with access to the global network, and, in particular, connections to the service provider’s servers. This network is presented in more detail and consists of - 1st segment - it includes all elements of the operator’s network core and, is responsible for routing traffic within the network and outside of it; - 2nd segment - it consists of terminal switching devices for wired connection of users and/or base stations of a cellular network for a wireless connection of mobile users (this segment is variable and changes depending on the task). Between the service provider and the network operator, there are backbone operators and traffic exchange points, which are shown as a direct connection, since they mainly just make data transfer delay, and are also not the main beneficiaries in optimizing the process of providing a service to users. We consider the process of providing a service to users. The very process of establishing a connection for an online video service has been described and studied in detail in work [16]. Thus it is proposed to focus on the main points presented in the figure 2: 1) a user in the carrier’s network sends a video viewing request to a service provider; 2) the service provider processes the request and sends a connection confirmation to the user; 3) a connection is established and the user starts watching the video. The network operator serves several zones (districts) with
×

About the authors

Dmitry S. Poluektov

Peoples’ Friendship University of Russia (RUDN University)

Author for correspondence.
Email: poluektov-ds@rudn.ru
ORCID iD: 0000-0002-4246-8483

postgraduate student of Department of Applied Probability and Informatics

6, Miklukho-Maklaya St., Moscow, 117198, Russian Federation

Abdukodir A. Khakimov

Peoples’ Friendship University of Russia (RUDN University)

Email: khakimov-aa@rudn.ru
ORCID iD: 0000-0003-2362-3270

Researcher of Department of Applied Probability and Informatics

6, Miklukho-Maklaya St., Moscow, 117198, Russian Federation

References

  1. A. Khan, M. Othman, S. A. Madani, and S. U. Khan, “A Survey of Mobile Cloud Computing Application Models,” IEEE Communications Surveys & Tutorials, vol. 16, no. 1, pp. 393-413, 2014. doi: 10.1109/SURV.2013.062613.00160.
  2. L. Guan, X. Ke, M. Song, and J. Song, “A Survey of Research on Mobile Cloud Computing,” in 2011 10th IEEE/ACIS International Conference on Computer and Information Science, 2011, pp. 387-392. doi: 10.1109/ICIS.2011.67.
  3. H. Dinh Thai, C. Lee, D. Niyato, and P. Wang, “A survey of mobile cloud computing: Architecture, applications, and approaches,” Wireless Communications and Mobile Computing, vol. 13, Dec. 2013. doi: 10.1002/wcm.1203.
  4. X. Fan, J. Cao, and H. Mao, A survey of mobile cloud computing, English, 2011.
  5. N. Fernando, S. W. Loke, and W. Rahayu, “Mobile cloud computing: A survey,” Future Generation Computer Systems, vol. 29, no. 1, pp. 84- 106, 2013, Including Special section: AIRCC-NetCoM 2009 and Special section: Clouds and Service-Oriented Architectures. doi: 10.1016/j.future.2012.05.023.
  6. M. Alizadeh, S. Abolfazli, M. Zamani, S. Baharun, and K. Sakurai, “Authentication in mobile cloud computing: A survey,” Journal of Network and Computer Applications, vol. 61, pp. 59-80, 2016. doi: 10.1016/j.jnca.2015.10.005.
  7. A. Ahmed and E. Ahmed, “A survey on mobile edge computing,” in 10th International Conference on Intelligent Systems and Control (ISCO), 2016, pp. 1-8. doi: 10.1109/ISCO.2016.7727082.
  8. M. Beck, M. Werner, S. Feld, and T. Schimper, “Mobile Edge Computing: A Taxonomy,” in The Sixth International Conference on Advances in Future Internet, 2014, pp. 48-54.
  9. R. Roman, J. Lopez, and M. Mambo, “Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges,” Future Generation Computer Systems, vol. 78, part 2, pp. 680-698, 2018. doi: 10.1016/j.future.2016.11.009.
  10. S. Yi, C. Li, and Q. Li, “A Survey of Fog Computing: Concepts, Applications and Issues,” in Proceedings of the 2015 Workshop on Mobile Big Data, ser. Mobidata ’15, Hangzhou, China: Association for Computing Machinery, 2015, pp. 37-42. doi: 10.1145/2757384.2757397.
  11. S. Yi, Z. Qin, and Q. Li, “Security and Privacy Issues of Fog Computing: A Survey,” Aug. 2015, pp. 685-695. doi: 10.1007/978-3-319-218373_67.
  12. W. Ali, S. M. Shamsuddin, and A. S. Ismail, “A Survey of Web Caching and Prefetching A Survey of Web Caching and Prefetching,” International Journal of Advances in Soft Computing and its Applications, vol. 3, no. 1, 2011.
  13. S. Podlipnig and L. Böszörmenyi, “A Survey of Web Cache Replacement Strategies,” ACM Comput. Surv., vol. 35, no. 4, pp. 374-398, Dec. 2003. doi: 10.1145/954339.954341.
  14. Z. Lv and W. Xiu, “Interaction of Edge-Cloud Computing Based on SDN and NFV for Next Generation IoT,” IEEE Internet of Things Journal, vol. 7, no. 7, pp. 5706-5712, 2020. doi: 10.1109/JIOT.2019.2942719.
  15. Z. Ning, P. Dong, X. Wang, X. Hu, L. Guo, B. Hu, Y. Guo, T. Qiu, and R. Y. K. Kwok, “Mobile Edge Computing Enabled 5G Health Monitoring for Internet of Medical Things: A Decentralized Game Theoretic Approach,” IEEE Journal on Selected Areas in Communications, vol. 39, no. 2, pp. 463-478, 2021. doi: 10.1109/JSAC.2020.3020645.
  16. T. Stockhammer, “Dynamic Adaptive Streaming over HTTP: Standards and Design Principles,” in Proceedings of the Second Annual ACM Conference on Multimedia Systems, ser. MMSys ’11, San Jose, CA, USA: Association for Computing Machinery, 2011, pp. 133-144. doi: 10.1145/1943552.1943572.
  17. A. Khakimov, E. Mokrov, D. Poluektov, K. Samouylov, and A. Koucheryavy, “Evaluating the Quality of Experience Performance Metric for UAV-Based Networks,” Sensors, vol. 21, no. 17, 2021. doi: 10.3390/s21175689.

Copyright (c) 2022 Poluektov D.S., Khakimov A.A.

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

This website uses cookies

You consent to our cookies if you continue to use our website.

About Cookies