2022
DOI: 10.1016/j.sysarc.2021.102362
|View full text |Cite
|
Sign up to set email alerts
|

Resource provisioning in edge/fog computing: A Comprehensive and Systematic Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 75 publications
(31 citation statements)
references
References 54 publications
0
17
0
Order By: Relevance
“…Fog computing uses edge devices, e.g., routers and gateways, by users for storage and computing purpose. Finally, MEC places servers in the BSs [29], [30], [31] and is a common concept discussed in 3GPP documents.…”
Section: Cloud Computing and Mobile Edge Computingmentioning
confidence: 99%
“…Fog computing uses edge devices, e.g., routers and gateways, by users for storage and computing purpose. Finally, MEC places servers in the BSs [29], [30], [31] and is a common concept discussed in 3GPP documents.…”
Section: Cloud Computing and Mobile Edge Computingmentioning
confidence: 99%
“…In the simulated edge-cloud system, there are 1000 tasks randomly requesting one of 100 services. For every task, its required computing size is randomly set between 0.5-1.2GHz, and the amount of its input data is in the range of [5,6]MB, referring to [18]. The deadline of each task is set between 1 and 5 seconds.…”
Section: A Experiments Designmentioning
confidence: 99%
“…The mobile and IoT users' requirements cannot be guaranteed only by cloud computing for service delivery, due to the abundant variety and quantity of Internet services and the high network latency of the cloud [5]. Therefore, more and more service providers use edge computing to improve the service quality, by placing some computing resources close to user devices [6].…”
Section: Introductionmentioning
confidence: 99%
“…Resource autoscaling is a crucial way to provide elastic resource provisioning in cloud/edge computing [18]. Some reactive autoscaling methods perform resource scaling when the runtime consumptions of resources, such as CPU utilization, memory utilization, or network bandwidth, exceed thresholds.…”
Section: Related Workmentioning
confidence: 99%