Implementation of Docker for mobile edge computing embedded platform

2021 ◽  
pp. 440-454
Author(s):  
Durga Chouhan ◽  
Nilima Gautam ◽  
Gaurav Purohit ◽  
Rajesh Bhdada

Some of the glitches in Mobile cloud computing are high latency, network bottleneck, and congestion. From a centralized to a decentralized computing scenario, Mobile Edge computing can transfer the computation to the edge, which decreases the response time for the application and increase the user experience. This paper assesses Docker as a medium for Edge Computing, a container-based technology. Docker can be seen as an open platform for designers and system managers to use Docker Engine, a portable, lightweight runtime and packaging tool to build, ship, run applications, and Docker hub. This cloud service distributes applications and mechanizing workflows. The key benefit is that, as soon as possible, Docker can get code checked and can fit into production. This paper will discuss Docker and present how this technology has overcome the earlier problems of virtualization with building and deploying large applications in two ways. We have implemented Docker of YOLO and AQM models on Jetson TX2 and compared both applications on Docker and Host OS. We can use dockers in two ways either we can use previously made dockers or build our own Docker according to our needs. In this paper, I have used the Docker image of YOLO and built my own Docker for AQM Model. These Docker containers' performance measured in this paper based on their device performance, memory consumption, boot time, and Docker performed very well.

2021 ◽  
pp. 1-8
Author(s):  
Yan Zhang

AbstractThis chapter first introduces the fundamental concepts of mobile cloud computing. The differences between mobile edge computing and mobile cloud computing are then discussed in detail. The European Telecommunications Standards Institute’s concept of mobile edge computing is introduced with respect to mobile edge computing’s definition, architecture, advantages, and potential applications.


2021 ◽  
Vol 11 (13) ◽  
pp. 5802
Author(s):  
Tian Liu ◽  
Wenhao Fan ◽  
Fan Wu ◽  
Wei Xie ◽  
Wen Yuan

Mobile terminal applications with high computing complexity and high time delay sensitivity are developing quite fast today, which aggravates the load of mobile cloud computing and storage and further leads to network congestion and service quality decline. Mobile edge computing (MEC) is a way of breaking through the limits of computing and storage resources of mobile cloud and alleviating the load of mobile cloud. Computing time costs and transmission time costs are considered to be the main issues for the mobile cloud when carrying out computing offloading and data caching. Therefore, an efficient resource management strategy, which could minimize the system delay, is proposed in this paper. The new scheme offloads reasonably computing tasks and caches the tasks’ data from the mobile cloud to mobile edge computing-enabled base stations. An intelligence algorithm, genetic algorithm, is being used to solve the global optimization problem which would cause transmission delay and computing resources occupation, and to determine the computing offloading and data caching probability. The simulation of the system using MATLAB is conducted in 8 different scenarios with different parameters. The results show that our new scheme improves the system computing speed and optimizes the user experience in all scenarios, compared with the scheme without data caching and the scheme without computing offloading and data caching.


2018 ◽  
Vol 2018 ◽  
pp. 1-14 ◽  
Author(s):  
Xu Wu

Mobile cloud computing (MCC) has attracted extensive attention in recent years. With the prevalence of MCC, how to select trustworthy and high quality mobile cloud services becomes one of the most urgent problems. Therefore, this paper focuses on the trustworthy service selection and recommendation in mobile cloud computing environments. We propose a novel service selection and recommendation model (SSRM), where user similarity is calculated based on user context information and interest. In addition, the relational degree among services is calculated based on PropFlow algorithm and we utilize it to improve the accuracy of ranking results. SSRM supports a personalized and trusted selection of cloud services through taking into account mobile user’s trust expectation. Simulation experiments are conducted on ns3 simulator to study the prediction performance of SSRM compared with other two traditional approaches. The experimental results show the effectiveness of SSRM.


2014 ◽  
Vol 8 (8) ◽  
pp. 1417-1424 ◽  
Author(s):  
Qi Qi ◽  
Jianxin Liao ◽  
Yufei Cao

2018 ◽  
Vol 7 (2.32) ◽  
pp. 161
Author(s):  
Sk Sk Mahaboob Sharif ◽  
K V.V Satyanarayana ◽  
M Harsha vardhan ◽  
V Harika

Cloud Computing is an on demand service where resources like online office software and on-line storage are made available as per the users requirement. The word cloud in cloud computing is used as a symbol for internet since it offers various computing services as well as resources  like storage, servers, platforms  and applications are provided to devices over the internet. Mobile cloud computing joins the cloud computing with mobile computing and giving the shopper with limitless pool of useful resource from cloud without hampering mobility of consumer. The mobile cloud computing generation is developing rapidly many of the customers and at the equal time it introduces the early protection threats inside. A mobile user storing data on the cloud can be read by the cloud service provider or hacked by man-in-middle attack, thus affecting consumer privateers and integrity. So information saved on the cloud have to be encrypted, disallowing unauthorized user to access saved records. Mobile devices are resource constrained since they are battery powered, have less processing power and have less storage space. Any set of rules or technique used for securing mobile users statistics have to don't forget above constraints for powerful makes use of cloud for portable clients. Most of the mobile devices have nearly equal functionalities, so mobile devices will face some problems associated with security and third parties, by this paper we have given a review of different techniques for secure storage of mobile user’s data in the cloud, their merits and demerits for mobile environment.  


Sign in / Sign up

Export Citation Format

Share Document