Page 76 - ITU Journal Future and evolving technologies – Volume 2 (2021), Issue 2
P. 76

ITU Journal on Future and Evolving Technologies, Volume 2 (2021), Issue 2










          term that  also includes the mobile edge computing   cuss previous work. Abbas et al. [18] provide a de ini‑






          paradigm. MEC is the most promising candidate for    tion of MEC and its application. They also provide in‑

          mission‑critical  and  time‑critical  applications,  because   sight of MEC related research and technologies. Vhora




          of its proximity, good mobility  support for mobile users   and Gandhi [19] introduce a review on MEC architec‑
          and integration of multiple  access technologies. In    ture, related research and challenges, tools for simula‑




          MEC  networks, local  servers are limited in resources   tion and  inally MEC applications. Peng et al. [21] review





          and  as  a  recent  paradigm,  it  undertakes  open   service adoption and provision for MEC. They consider
          challenges  to  manage  these  limited‑capacity  resources   MEC service adoption, i.e task of loading, from the mobile
          [5,  13].  Thus,  MEC  resources  need  to  be  properly   users’ perspective and MEC service provision, i.e resource
          managed  to  handle  ef iciently  the  users’  requests.  The   allocation and server placement, from the edge server
          resource management in MEC is divided in three aspects :   side. Wang et al. [22] review service migration in MEC
          i),  of loading  decision,  ii),  resource  allocation  and  iii),   that they de ine and compare with previous existing con‑
          users mobility management, i.e service migration.    cepts. They discuss the state‑of‑art methods and techni‑
                                                               cal service hosting solutions. Zamzam et al. [23] propose
          In mission‑critical scenarios, edge resources may be em‑
                                                               a resource management survey using machine learning
          barked on mobile units, such as drones and vehicles. In‑

          deed, communication  networks are often damaged by   methods. They organize the research by goals and classify





          disaster or are nonexistent due to remote location [14].  machine learning methods. There also are surveys about
          Thus, drones and vehicles have the necessary mobility to  public safety and mission‑critical wireless network solu‑
          be deployed rapidly in emergency areas, temporarily and  tions [24, 25, 26, 27] or technology solutions [15, 2, 28].
                                                               Baldini et al. [24] survey public safety organization use







          are   lexible  enough to move to follow the demands’ dy‑

                                                               cases, requirements and their wireless communications
          namic (which occurs when users are mobile or in situa‑
                                                               standard. Jarwan et al. [25] provide design requirements,
          tions where demands are highly dynamic in a single de‑
                                                               architecture solutions and standards for public safety net‑
          vice) [15, 16, 17]. The resource management is then en‑



          larged with a fourth aspect :  iv) mobile resource   works based on LTE. These works also provide a testing






          management  which  includes  the  deployment  of  the  and evaluation framework for such networks using Net‑
          resources,  i.e., their number  and location,  their path  work Simulator NS‑3. Yu et al. [27] describe the layered




          planning  and  new costs such  as deployment delays.  architecture of public safety communication. Then they




          In this survey, we  start  by  presenting  related  surveys  review communication technologies for device‑to‑device


          in  Section  2.  We then present two  main use cases of  communications and dynamic wireless networks. They





          mission‑critical    applications  that  may  use  edge  also discuss the integration of some technologies in pub‑
          computing  in  Section  3. As MEC is a recent   ield, we  lic safety networks like 5G and edge computing. Kumbhar






          also include other edge com‑ puting  paradigms like  fog  et al. [26] introduce public safety networks standards and





          computing  or cloudlets.  We  then  review  in  Section  4  challenges with a focus on LTE, Land Mobile Radio System

          resource  allocation  methods  for  MEC,  not  only  for  (LMRS) and Software‑De ined Radio (SDR). The white pa‑
          mobile resources, as again there is not enough work on  per [15] reports technologies employed in public safety
          it. Finally,  we  review  resource  deployment schemes for  applications and highlights gaps and the technology that

          MEC in Section 5 and provide open challenges and future  can  ill them. The authors provide thorough use cases and


          research direction in Section  6. With  that  survey, we  their technologies’ opportunities. Works [2, 28] study the





          aim to provide tools and insight for the design of robust  application of IoT technologies for disaster management







          MEC resource management schemes that are be itting for  operations and future research directions. We can note
          real  life  hard‑constrained  use  cases. To the best of our  that none of these surveys focus on MEC. This survey is

          knowledge,  it  is  the   irst  survey  that  provides a review  complementary to these previous ones as it browses MEC
          about MEC resource management through  the  scope  of  resource management work and discusses them by their
          mission‑critical applications.                       suitability depending on the applications, with a focus on
                                                               mission‑critical applications.
          2.  RELATED WORKS
                                                               3.   MISSION‑CRITICAL APPLICATIONS USE

          Several surveys about MEC exist in the literature. They   CASES




          are either general  [6, 18,  19, 20]  or focus on different






          aspects and  methods  [21, 22, 23].  Mao et al.  [6] in‑   MEC offer computing services independently from the



          troduce MEC with the modelling of MEC communication   Internet and at proximity to requesting users and de‑
          and computation, mobile devices and edge server.  They   vices [8].  This proximity allow new low‑latency ser‑





          then review and classify resource management,  and  i‑   vices such as object or speech recognition [10] or aug‑


          nally  identify open research directions. Mach and Bec‑   mented/virtualreality [19, 11]. It also offers a newtype of





          var [20] present a thorough survey about MEC of loading,   location‑aware and context‑aware services [6, 29]. The‑
          resource allocation, user mobility management and its ar‑   ses MEC services may be employed by mobile users but
          chitecture. They highlight what to take into account when   also by IoT devices [19, 11], such as security cameras [17,
          designing MEC computation of loading schemes and dis‑  30]. Mission‑critical applications may pro it from these
          62                                 © International Telecommunication Union, 2021
   71   72   73   74   75   76   77   78   79   80   81