Seminar Report Jones
Seminar Report Jones
BELAGAVI
A
SEMINAR REPORT
On
“Multi-Access Edge Computing”
By
Jones G (1HK16IS116)
Under the guidance of
SEMINAR REPORT
ON
VIII SEMESTER
2019-2020
SUBMITTED BY:
Jones G (1HK15IS116)
HKBK COLLEGE OF ENGINEERING
22/1, Nagawara, Bengaluru – 560 045.
( Accredited by NAAC )
CERTIFICATE
Certified that the Seminar work entitled “Multi-Access Edge Computing” is a bonafide
work carried out by Jones G (1HK16IS116), in partial fulfillment of SEMINAR (15CSS86),
I would like to place my regards and acknowledgement to all who helped in making this
seminar possible. I thank all those whose guidance served as a beacon of light and crowned
our efforts with success.
First of all I would take this opportunity to express our heartfelt gratitude to the management
committee - Chairman Mr. C. M. Ibrahim, Director Mr. C.M. Faiz Mohammed and the
Principal Dr. M S Bhagyashekar for all the infrastructures provided to complete the
SEMINAR in time.
I deeply indebted to Dr. Syed Mustafa, HOD, Information Science and Engineering for the
ineffable encouragement he provided for the successful completion of the project.
A special and an earnest word of thanks to the guide Prof. Devi Sivasankari for their
constant assistance, support, patience, endurance and constructive suggestions for the
betterment of the Seminar.
I’m extremely thankful to the teaching and non-teaching staff of the Department of
Information Science and Engineering for their valuable guidance and cooperation throughout
our dissertation.
I thank my parents for their support and guidance provided to us to finish the seminar well
ahead of time. I thank my friends who lent their support in every way possible to make sure
the mini project has been completed. Last, but not least I would like to thank God for giving
us this opportunity to do everything in the appropriate time to finish this seminar.
Name: Jones G .
USN: 1HK15IS116
iv
ABSTRACT
v
Table of Contents
1. INTRODUCTION
1.1 DEFINITION........................................................................................................... 07
1.2 PRINCIPLE............................................................................................................. 07
1.3 BRIEF.......................................................................................................................07
5. NETWORK SLICING
6. INTERNET OF THINGS
7.2 NFV......................................................................................................................15
7.3 SDN...................................................................................................................... 16
7.4 ICN.......................................................................................................................17
7.5 NS......................................................................................................................... 18
7.6 IoT........................................................................................................................ 19
8. SNAPSHOTS................................................................................................................22
CONCLUSION.......................................................................................................... 25
REFERENCES....................................................................................................................26
vi
Introduction Multi-Access Edge Computing
Chapter 1
INTRODUCTION
1.1 Definition
1.2 Principle
The basic idea behind MEC is that by running applications and performing related
processing tasks closer to the cellular customer, network congestion is reduced and applications
perform better.
1.3 Brief
encourage use cases which require location based services. Finally, MEC servers can exploit
real-time network data such as radio conditions and network statistics to offer context related
services to the particular applications. This can also differentiate the mobile broadband
experience and be monetized. Thus, MEC plays a key role to achieve the vision of the fifth
generation (5G) wireless networks which are expected to reach 1 ms latency and high
bandwidth along with the quantified users’ quality of experience (QoE). In addition to MEC,
few other edge computing paradigms are also emerging such as Mobile Cloud Computing
(MCC), Fog computing, and Cloudlets. However, MEC is considered as better choice for 5G
mobile networks than other owing to its compatibility with cellular networks and heavy backup
by mobile standardization organizations such as ESTI. In spite of its huge potential, the
realization of MEC should be upheld by a multitude of underlying technologies. In this article,
we examine five of those key enabling technologies, including Network Function Virtualization
(NFV), Software Defined Networking (SDN), Information Centric Networking (ICN), Network
Slicing, and Internet of Things (IoT), and illustrate how to utilize them to accelerate the
adaption and development of MEC systems. Besides identifying open challenges, we also
pinpoint tangible integration paths and future directions for MEC.
1.4 Techniques
Chapter 2
NETWORK FUNCTION VIRTUALIZATION
2.1 Network Function Virtualization
NFV proposes to utilize virtualization technologies to decouple physical network
equipment from the functions that run on them. Via this, different Virtual Network Functions
(VNFs) can be implemented in software running on one or more industry standard physical
servers. The VNFs can be relocated and instantiated at different physical network locations
without necessarily requiring the purchase and installation of new hardware.
Moreover, NFV is regarded as one of the key enablers for deployment of MEC in 5G
networks. Both NFV and MEC technologies can be used together in 5G mobile networks to
elevate computing capacity to meet the increased networking demands. Both MEC and NFV
share similar characteristics. For instance, MEC architecture is also based on a virtualized
platform which is similar to NFV, as depicted in Figure 1. Both technologies feature stackable
components and each has a virtualization layer. Accordingly to ESTI, it is beneficial to reuse
the infrastructure and infrastructure management of NFV to the largest extent possible, by
hosting both VNFs and MEC applications on the same platform to enhance the computing
experience. In addition, MEC can use the NFVI (NFV Infrastructure) as the virtualization
platform to run mobile edge applications alongside other VNFs. Therefore, MEC applications
also appear as VNFs in the NFV environment and parts of mobile edge orchestration can be
delegated to the NFVO (NFV Orchestration).
On on hand, the main benefit of using MEC in NFV is to achieve low latency. MEC
offers the possibility to host virtualized network functions closer to the user devices. Moreover,
Service Function Chaining (SFC) is a part of NFV systems which use to connect to VNFs to
follow an order and the data traffic to be flowed through the chain for carrying out the whole
service. The use of MEC enhances the performance of SFC because deploying the functions
closer to the end users decreases the latency and eliminates long-haul transmission of data
traffic for carrying out the whole service.
On the other hand, the use of NFV in MEC will increase the scalability of MEC
applications. NFV provides the high scalability by scaling in and out the networks resources
depending on need and application usage. Thus, combine use of these two technologies will
deliver a dynamic, quick and scalable computing platform for 5G ecosystem.
Dept. Of ISE, HKBKCE 9 2019-2020
Software Defined Networking Multi-Access Edge Computing
Chapter 3
SOFTWARE DEFINED NETWORKING
SDN has capabilities of orchestrating the network, its services and devices by hiding the
complexities of the heterogeneous mobile environment from end users. Thus, SDN has a
significant potential for mitigating the barriers and restrictions that multi-tier MEC
infrastructure will encounter. Illustrates a usage possibility of SDN for MEC ecosystem. For
instance, The SDN control mechanism can lower the complexity of MEC architecture by
offering a novel approach to the networking and utilizing the available resources in a more
efficient manner.
SDN can dynamically route the traffic between tier-MEC servers and cloud servers to
provide the highest quality of service to end users. Moreover, SDN paradigm concentrates the
network intelligence at the central software-based controller. This will relieve the relatively
simpler MEC devices from executing the complex networking activities such as flow
management, service discovery and orchestration.
Chapter 4
INFORMATION CENTRIC NETWORKING
Several benefits can be achieved by exploiting the synergy between MEC and ICN. The
use of ICN can solve some MEC issues related to the content delivery and application level
reconfiguration. ICN can offer high speed content delivery between the MEC and central cloud
systems. Application level reconfiguration is challenging in MEC systems, since a session re-
initialization is required whenever a session is being served by a non-optimal service instance.
This process always increases the session migration delay and significantly affects the low
latency applications. ICN can reduce the application level reconfiguration delay by minimizing
the network configuration delay for MEC applications. Due to the servicecentric networking
characteristics in ICN technology, it allows fast resolution of named service instances.
The coexistence of ICN and MEC can also improve the performance of the edge storage
and caching function at the edge networks. This is enabled by two features of ICN naming
location independent data replication and opportunistic caching at strategic points in the
network. These features benefit both realtime and non-realtime 5G applications where a set of
users share the same content.
ICN will significantly improve the efficiency of session mobility in MEC networks with
the optimal operational cost and bandwidth utilization for signaling traffic. In contrast to the
anchor-based mobility approach used in current MEC networks, ICN handles session mobility
by using application bound identifier and location split principles which have significantly
reduced control and user plane overheads.
The real-time context aware applications could be accomplished with the correct
coordination between MEC platforms. ICN provides considerable opportunities for context-
aware data distribution in the networks by allowing content distribution over unreliable radio
links and transparent mobility between heterogeneous network. Due the latency support of
MEC, ICN-MEC integration is important to provide services for high mobility 5G applications
such as tactile Internet and autonomous vehicles.
Chapter 5
NETWORK SLICING
Upcoming 5G architecture will utilize both MEC and net-work slicing [10] along with
other technologies. MEC and network slicing can be used together to provide in different
application domains in 5G. One of such application domains is Massive IoT [11]. In order to
support massive IoT systems, the network should be able to satisfy the requirements such as
massive cost reduction, network scalability and edge analytics.
Network slicing with the MEC-based analytics and security assets can be used to deliver
these requirements. Another use case is critical communications for delay critical applications
such Tactile Internet, autonomous driving and industrial Internet. The key requirements to
enable the critical communications are reduced latency and traffic prioritization. While MEC
can be used to reduce the latency, network slicing can support traffic prioritization. As shown in,
network slicing can help to divide the MEC resources to different slices based on tenants’
demands.
Moreover, network slicing can enable dynamic and in short life cycles for network
services. This feature will enable new value creation opportunities where resource sharing
among virtual MNOs (Mobile Network Operators), services and applications in time share
manner. MEC provides edge analytics and faster security assets for better network slicing
which will lead to massive cost reduction and increase of network scalability.
MEC has been identified as one of the key attributes to realize the aforementioned
network slicing extensions in 3GPP (3rd Generation Partnership Project) toward full multi-
tenancy. Thus, the synergy between MEC and network slicing will play a critical role in the
deployment of 5G applications.
Chapter 6
INTERNET OF THINGS
Firstly, MEC allows IoT to filter large volumes of data generated by massive IoT
applications at the edge of the network, saving the time and cost of transmitting data to the data
centers. Moreover, if the IoT devices do not need global level services, with the cloud
computing capability, MEC servers can process the packets and provide the required services
without sending to the core network. This will reduce the traffic volume in the core network and
reduce the latency.
Secondly, MEC facilitates rapid decision making based on the locally processed data by
reducing the End-to-End (E2E) delay. This is very important in the critical IoT applications
(e.g., remote surgeries, smart grid, autonomous vehicles, and video conferencing), which have
very high demands of reliability, availability, and low latency.
Thirdly, MEC will improve the scalability as the number of IoT connections increase
and reduce the drain on the battery due to the less transmission time between the device and
application server.
Chapter 7
CHALLENGES, FUTURE DIRECTIONS AND
INTEGRATION PATH
In this chapter we discuss the obstacles and challenges related to the integration of
different technologies. Based on each category, we share our insights on future directions and
integration plan.
7.2 NFV
Main research challenges and obstacles for NFV-MEC integration are the absent of
standards, immaturity of technologies, deployment complexity and new security risks. These
obstacles and challenges to be address to achieve the full integration benefits of MEC and NFV
in 5G networks.
Both NFV and MEC are recent technology are evolving through the phases of
implementation and requires standardization emanating from collaboration of industry and
researchers over an agreed platform. Specially, the interfaces and architectural components
which are required to MEC NFV integration should be defined at global level. Otherwise, wide
spread adaptation will hinder due to the compatibility issues.
Most NFV and MEC projects will face a steep learning curve in getting their
infrastructure to work as expected because of their heavy dependency on non-standardized
implementations. Due to the immaturity of both technologies, the updates are released
frequently. Thus, keeping up in an operational deployment model is hard to achieve.
Minimizing the latencies through optimal utilization of resources can be achieved with
the efficient deployment of MEC services. However, it is difficult to optimize the MEC services
when they are depending on complex system components such as NFV. Specially, de-facto
NFV standard implementations such as OpenStack, is also notoriously difficult to learn, deploy,
and use.
NFV-MEC integration creates several new security challenges as well. On one hand,
MEC introduces software components such as MEPM, VNFM to NFV deployments. These
components are not a part of traditional NFV model and they cause to create a longer chain of
trust. On the other hand, the NFV features such as resource pooling can lead to the sharing of
risk between multiple unrelated MEC domain. For instance, an attack on a certain VNF might
affect other VNFs running on the same VM (Virtual Machine) or physical server.
7.3 SDN
There are a few research challenges such as new security risks and modification of APIs
(Application Programmable Interfaces) which need to be addressed to achieve the full
integration benefits of MEC and SDN technologies.
The use of SDN introduces new security threats on MEC systems. SDN has many
security threats including SDN protocol weaknesses, information disclosure through
interception, flow poisoning, side channel attacks and DoS (Denial of Service) on SDN
controller. Since MEC extends cloud computing capabilities to the edge of mobile networks, the
level of protection that can be offered to the edge hosts is low compared to what is obtainable in
traditional large data centers. Thus, the integration of MEC with SDN will further reduce the
protection of SDN systems and the impact of SDN based attacks will results the service
degradation on MEC systems.
In addition, MEC has its own security issues. For instance, proposed architectural
modifications in MEC create a number of security vulnerabilities such as malicious mode
problems, privacy leakages, and VM manipulation. The impact of these MEC threats on the
open network based SDN is more devastating. In contrast to traditional black-box type network
devices, SDN uses software programmable common standard backhaul devices. It will not only
ease the work of network administrators but also allow malicious attackers to deploy attacks.
It is also necessary to define APls so that applications and services can program network
functions and SDN network directly bypassing control and management to optimize the
performance, For instance, such APIs are need to support ultralow latency applications.
Otherwise, information exchange between MEC and SDN systems will introduce additional
delays in network operations.
7.4 ICN
As per today, MEC and ICN are complementary concepts that are mostly deployed
independently. Good coordination is needed to obtain the best outcomes of their synergies.
Proper APIs have to be defined in order to communicate between the systems. Although there is
on-going research to define interfaces for MEC-NFV and MEC-SDN integrations, the interface
for MEC-ICN communication is yet to be defined. Moreover, ICN-MEC integration requires a
cross-domain industry collaborations and standard development organizations.
The real advantages of MEC can be achieved by obtaining context information such as users’
location, other users in vicinity, condition and resources in the environment. Although ICN can
provide different levels of context information (application, network and device level), their
Dept. Of ISE, HKBKCE 17 2019-2020
Challenges and Future Work Multi-Access Edge Computing
simultaneous retrievals are still challenging. Most of the current ICN research is focused on
providing the basic functionality, rather than on utilizing the available context information to
improve network parameters such as Quality of Service (QoS) and Quality of Experience (QoE).
In ICN-MEC collaborations, it is required to examine typical scenarios encompassing different
5G applications (AR/VR, autonomous driving, Tactile Internet) with varying context.
Moreover, MEC-ICN integrated systems face severe challenges due to authorization and
access control issues in ICN systems. User/level authorization is a significant challenge in ICN
due to the the lack of user-to-server authentication. ICN systems can not use traditional access
control schemes based on Access Control List (ACL). The in-network caching function of ICN
enable the possibility to deliver Named Data Objects (NDOs) on demand basis. In this
environment, ICN entities have to maintain an identical control policy over NDOs for each
consumer to support ACL based access control. However, such mechanism is challenging due
to privacy issues and computational overhead.
7.5 NS
There are several challenges that has to be address to achieve the true cooperate benefits
of network slicing and MEC technologies.
The inter-system vertical coordination between the two technologies should be clearly
structured and modeled for efficient information sharing. This vertical coordination can be
chieved via two ways. First method is to define APIs between management systems of slicing
and MEC to share the available resources. Second method is to use physical resource
coordination aimed to efficient resource handling through policy and analytics. However,
standardization these interfaces have to be performed to synchronize the various research and
development activities around the globe.
If the MEC servers can offer service composition with finegrained network functions, it
will enhance the scalability tosupport different vendors. Each coarse grained function at the
MEC server can be further divided into many sub-functions. Nevertheless, the granularity of
those networking functions should be defined carefully in such a way to comply with the
available standardized interfaces. Otherwise, same as in the above case the interfaces need to be
recognized by the respective standardization entities.
When multiple RATs are accommodating the 5G paradigms, there should be some ways
to multiplex them on specialized or dedicated hardware. Although network slicing may lead to
virtualize RAN instances, it is mandate to ensure radio resource isolation and manage efficiency.
In order to assist RAN virtualization for slicing, Software Defined ) RAN controllers can be run
at the MEC servers.
Even though the high-level description of a concrete slice in terms of infrastructure and
network functions is defined, the physical realization of E2E slice orchestration is still to be
established. As the intermediary edge computing platforms, the MEC servers play a vital role to
support E2E slice orchestration and management by correlating cloud and radio resources.
7.6 Iot
Although IoT is becoming a mature technology, the constant addition of new IoT
devices to the consumer market and their versatile connectivities create myriads of security and
scalability issues. When MEC is coincided with IoT, these challenges will arise in a broader
manner. Security, privacy, and trust management are three important research areas of IoT
which have many synergies. Edge computing users are increasingly vulnerable to security
threats as more IoT devices and applications use the edge to transmit information. The
heightened exposure of user’s data in MEC and IoT may create many possible ways which the
sensitive data can be breached. With the growing intelligence of the smart devices, there can be
the possibility of one IoT device betraying the implicit trust of another IoT device. Typically,
the IoT devices are programmed to automatically trust another connected device and to share
data without a validation process. If all the devices natively trust each other and share data, it is
hard to identify whether there is a misbehaving device. This may create a big issue specially
with the absence of a perimeter around the network edge prohibits firewalls to block out MEC
security threats. Moreover, the frequent back and forth transfer of data from a device to the
network edge increases the opportunity for breaching data and hacking devices. In MEC
systems, it is challenging to identify, authenticate, and authorize devices and the data they
generate from the edge to cloud and back while maintaining a latency of some milliseconds.
Scalability and mobility are two other important features that MEC provides for IoT
applications. In many applications, IoT devices will require scalability of services by applying
load balancing mechanisms which can be managed by a cloud orchestrator in MEC nodes. As
edge devices uses different access technologies including 3G, 4G, 5G, Wi-Fi and Wi- Max the
Dept. Of ISE, HKBKCE 19 2019-2020
Challenges and Future Work Multi-Access Edge Computing
We explain here the integration paths and pinpoint tangible steps to realize them.
1) Control Level Orchestration:
To achieve added benefits in MEC-enabled networks, different technologies must work
together. Given that 5G is going to integrate those five driving technologies with MEC, as
depicted, it is expected to enable them simultaneously in 5G. Meanwhile, such integration will
face challenges at control level. For instance, SDN, NFV, Network Slicing and MEC are
independent technologies. Each technology utilizes its own orchestrator and management
entities such as SDN controller, NFV orchestrator, network slicing manager and mobile edge
platform manager. In this respect, a synergy between these control entities is needed to jointly
optimize the network resources and also to create efficient Service Function Chains (SFCs) for
each user application.
Chapter 8
SNAPSHOTS
CONCLUSION
This helps in analyzing five integration technological directions that can accelerate the
utilization and deployment of MEC in 5G mobile networks, including NFV, SDN, ICN,
Network Slicing and IoT. We highlight the benefits of using each technology in MEC systems
as well as identify the remaining challenges and integration path to realize the full integration
benefits. With careful integration, the suite of these solutions will form the future of MEC
deployments.
REFERNCES
[1] Y.-C. Hu, M. Patel, D. Sabella, N. Sprecher, and V. Internet Architecture. ACM, 2015, pp. 8–13.
Young, “Mobile Edge Computing : A Key Technology
Towards 5G,” ETSI White Paper, vol. 11, no. 11, pp. [12] P. Porambage, J. Okwuibe, M. Liyanage, M.
1–16, 2015. Ylianttila, and T. Taleb, “Survey on multi-access edge
computing for internet of things realization,” IEEE
[2] R. Mijumbi, J. Serrat, J.-L. Gorricho, N. Bouten, F. Communications Surveys and Tutorials, 2018.
De Turck, and R. Boutaba, “Network Function
Virtualization: State-of-the-art and Research [13] F. Bonomi, R. Milito, P. Natarajan, and J. Zhu,
Challenges,” Communications Surveys & Tutorials, “Fog Computing: A Platform for Internet of Things
vol. 18, no. 1, pp. 236–262, 2016. and Analytics,” in Big data and internet of things: A
roadmap for smart environments. Springer, 2014, pp.
[3] L. Gupta, R. Jain, and H. A. Chan, “Mobile Edge 169–186.
Computing–An Important Ingredient of 5G
Networks,” IEEE Software Defined Networks, [14] D. Grewe, M. Wagner, M. Arumaithurai, I. Psaras,
Newsletter, 2016. and D. Kutscher, “Information-Centric Mobile Edge
Computing for Connected Vehicle Environments:
[4] “Mobile Edge Computing (MEC); Deployment of Challenges and Research Directions,” in Proceedings
Mobile Edge Computing in an NFV environment,” of the Workshop on Mobile Edge Communications.
ETSI Industry Specification Group (ISG) White Paper, ACM, 2017, pp. 7–12.
February 2018.
[15] L. Iliadis, I. Maglogiannis, and V. Plagianakos,
[5] D. Kreutz, F. M. Ramos, P. E. Verissimo, C. E. Artificial Intelligence Applications and Innovations.
Rothenberg, S. Azodolmolky, and S. Uhlig, Springer, 2018, vol. 520.
“Software-Defined Networking: A Comprehensive
Survey,” Proceedings of the IEEE, vol. 103, no. 1, pp.
14–76, 2015.