Page 75 - ITU Journal Future and evolving technologies – Volume 2 (2021), Issue 2
P. 75

ITU Journal on Future and Evolving Technologies, Volume 2 (2021), Issue 2







                A RESOURCE MANAGEMENT SURVEY FOR MISSION‑CRITICAL AND TIME‑CRITICAL
                                 APPLICATIONS IN MULTIACCESS EDGE COMPUTING

                                                       1
                                               Nina Santi and Nathalie Mitton 2
                             1 Inria, France, nina.santi@inria.fr, Inria, France, nathalie.mitton@inria.fr
                                                           2
                                     NOTE: Corresponding author: Nina Santi, nina.santi@inria.fr


          Abstract – Multiaccess Edge Computing (MEC) brings additional computing power in proximity of mobile users, reducing
          latency, saving energy and alleviating the network’s bandwidth. This proximity is bene icial, especially for mission‑critical
          applications where each second matters, such as disaster management or military operations. Moreover, it enables MEC
          resources embedded on mobile units like drones or robots that are  lexible to be deployed for mission‑critical applications.
          However, the MEC servers are capacity‑limited and thus need an acute management of their resources. The mobile resources
          also need a smart deployment scheme to deliver their services ef iciently. In this survey, we review mission‑critical applica‑
          tions, resource allocation and deployment of mobile resources techniques in the context of the MEC. First, we introduce the
          technical speci ics and uses of MEC in mission‑critical applications to highlight their needs and requirements. Then, we dis‑
          cuss the resource allocation schemes for MEC and assess their  it depending on the application needs. In the same fashion, we
           inally review the deployment of MEC mobile resources. We believe this work could serve as a helping hand to design ef icient
          MEC resource management schemes that respond to challenging environments such as mission‑critical applications.

          Keywords – Disaster management, multiaccess computing, resource allocation, resource deployment, unmanned aerial
          vehicles

          1.  INTRODUCTION                                     edge of the network, i.e., next to users or things produ-
                                                               cing  data  [5].  This  proximity  provides  advantages  over
          Mission‑critical applications require particular attention
                                                               the cloud, namely: i) latency reduction [5, 6, 7] ii) energy
          as they may imply life or important assets losses, which
                                                               saving [5, 6], iii) augmented privacy [6, 7] and iv) location


          entails  entail  tremendous consequences in their fai-


                                                               and context  awareness [5,  6]. These    its represent



          lure. We  can  consider  disaster  management  applica-

                                                               the  key  to  carrying  out  the  strong  requirements  of
          tions,  where  time  is  a  precious  resource:  the   irst  72
                                                               real‑time  applications.  It  is  especially  the  case  for
          hours,  the  golden  relief  time,  is  particularly  critical  to
                                                               mission‑critical and time‑critical applications where time



          locate  and  res‑  cue people [1]. Military  applications

                                                               is an important resource  [7]. Different  edge  computing

          are also mission‑  critical  as  they  defend  citizens  from

                                                               paradigms  exist,  each  more  or  less  speci ic.  Fog
          external threats and defend the country. IoT technology

                                                               computing  and  edge  com‑  puting  both  bring  cloud
          combined  with  cloud  computing  has  the  potential  to   services  to  the  edge  of  the  net‑  work, hence can be



          assist rescuers and agents to gain every precious second,   confused [8].    However, edge com‑  puting  focuses



          by  gathering  information,  analyzing  the  situation  and
                                                               more on things while fog  computing  focuses  on  the




          providing  support  services.  It  will  also help agents    overall infrastructure from the edge to the cloud [5, 8].





          organize and coordinate their op‑ eration to handle the   Cloudlets are  “data  center in  a box”  close to users  and







          situation   [2].    Cloud   computing   retains   many   accessible by  WiFi. They  take  example  of WiFi access


          advantages, like reduced costs [3] and is easily scalable   point  but  with  computing  capacities  to  deliver  cloud
          [4].  However,  cloud  computing  is  constrained  by  its   services  close  to  users  with  little  maintenance  and low
          remote location from end users, leading to high latency   power [9]. However, they have been discarded be‑







          and delays.  This problem is increased by the heavy data   cause of their WiFi access that implies limited coverage,
          generation from IoT devices that  burden the net‑    dif icult mobility support between cloudlets and security







          work and possibly creating bottlenecks  when tasks are   concerns. Similar to cloudlets, micro‑data‑centers consist






          not processed rapidly enough [5]. In addition, mission‑   of 10 servers or less and are placed next to users [10].

          critical applications operate in challenging environments   Finally, Mobile  Edge  Computing  (MEC)  is  de ined  by

          with a damaged or scarce network, making the cloud dif‑   ETSI in  2015  as  edge  computing  incorporated in  Radio



            icult  to reach. Hence, cloud computing  may not   it all   Access  Networks  (RANs)  to  serve  mobile  users  [11]  as




          the mission‑critical applications’ challenges and require‑   shown in Figure 1. The term mobile edge computing has
          ments.                                               evolved  to  multiaccess  computing  [12],  allowing





          In recent years, a new trend has arisen, moving cloud   heterogeneous Ra‑ dio Access Technologies (RATs), like







          computing  capacities to the edge of the network. This   5G,  L TE,  Wi‑Fi  and  so  on,  in  the  paradigm  and  so




          paradigm is called edge computing where connected de‑   broadening  its  use  cases. In  this  paper,  we  therefore

          vices send their tasks to computing nodes located at the  employ MEC as multiaccess edge computing as a generic
                                             © International Telecommunication Union, 2021                    61
   70   71   72   73   74   75   76   77   78   79   80