Optimal application deployment in resource constrained distributed edges

Shuiguang Deng*, Zhengzhe Xiang, Javid Taheri, Mohammad Ali Khoshkholghi, Jianwei Yin, Albert Y. Zomaya, Schahram Dustdar

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

105 Citations (Scopus)

Abstract

The dramatically increasing of mobile applications make it convenient for users to complete complex tasks on their mobile devices. However, the latency brought by unstable wireless networks and the computation failures caused by constrained resources limit the development of mobile computing. A popular approach to solve this problem is to establish a mobile service provisioning system based on a mobile edge computing (MEC) paradigm. In the MEC paradigm, plenty of machines are placed at the edge of the network so that the performance of applications can be optimized by using the involved microservice instances deployed on them. In this paper, we explore the deployment problem of microserivce-based applications in the MEC environment and propose an approach to help to optimize the cost of application deployment with the constraints of resources and the requirement of performance. We conduct a series of experiments to evaluate the performance of our approach. The result shows that our approach can improve the average response time of mobile services.

Original languageEnglish
Pages (from-to)1907-1923
Number of pages17
JournalIEEE Transactions on Mobile Computing
Volume20
Issue number5
Early online date30 Jan 2020
DOIs
Publication statusPublished - 01 May 2021
Externally publishedYes

Bibliographical note

Publisher Copyright:
© 2002-2012 IEEE.

Keywords

  • distributed system
  • mobile edge computing
  • Mobile service
  • service deployment

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Optimal application deployment in resource constrained distributed edges'. Together they form a unique fingerprint.

Cite this