0704-883-0675     |      dataprojectng@gmail.com

CONTAINER BASED MULTI-ACCESS EDGE COMPUTING FOR 5G NETWORKS

  • Project Research
  • 1-5 Chapters
  • Abstract : Available
  • Table of Content: Available
  • Reference Style: APA
  • Recommended for : Student Researchers
  • NGN 3000

ABSTRACT

The growth of the telecommunication industry is fast paced with ground-breaking engineering achievements. Despite this, portable mobile handheld devices have very low computational, storage and energy carrying capacity occasioned by the needs to satisfy portability, very small form factor, ergonomics, style and trends. Proposals such as cloudlets, cyber foraging, mobile cloud computing (MCC), and more recently but most applicable, multi-access edge computing (MEC) have been proffered. New and emerging use cases, especially the deployments of 5G will bring up a lot of latencysensitive and resource-intensive applications. To address these challenges, this work introduced the use of secure containerization for MEC applications and location of MEC host at the 5G centralized unit within the radio access network (RAN) aiding offloading of computational, storage and analytics requirements close to UE at the fringe of the network where the data are being generated and results being applied. The major contribution of this thesis is the use of secured containerization technology to replace virtual machines, making it possible to use containers for MEC applications, reducing application overhead while satisfying the isolation of MEC infrastructure as required by the European Technology Standard Institute (ETSI) to ensure MEC application security. 5G end-to-end transport specifications were evaluated for the vantage location of MEC server within the radio access network and achieved theoretical values between 4.1ms and 14.1ms end-to-end latency. These figures satisfy requirements of VR/AR (7-12ms); tactile Internet (<10ms); Vehicle-to-Vehicle (< 10ms); Manufacturing & Robotic Control/Safety Systems (1-10ms). The results confirmed that edge computing has lower user plane latency figures and reduced backhaul traffic with lower application failure rate. Secured containerised Multi-access computing infrastructures have many advantages of mobile cloud computing for mobile wireless device computational power and energy carrying capacity deficiencies to cater asymmetric UE applications. Applications hosted within the RAN have better support for new and emerging application requirements in terms of high amount of computational, storage and analytics capabilities while at low latency figures. Edge deployments will reduce the pressure on network operators backhaul link saving end-to-end ecosystem from collapse due to heavy backhaul traffic that might result from billions of 5G UEs. No matter how fast 5G network will be, MEC will ensure the need not to transport huge data for processing in the cloud and returning the results to the UE. This will enhance privacy and security while also conserving bandwidth




FIND OTHER RELATED TOPICS


Related Project Materials

THE ROLE OF REWARD AND PUNISHMENT ON STUDENT’S ACADEMIC PERFORMANCE IN SOME SELECTED SECONDARY SCHOOLS IN OREDO LOCAL GOVERNMENT AREA OF EDO STATE.

ABSTRACT

This project work is the role of reward and punishment on student’s academic performance in some...

Read more
APPRAISAL OF SIMULATION FOR A QUEUING SYSTEM (A CASE STUDY OF IMO STATE TRANSPORT COMPANY ITC OWERRI)

Introduction

As the world's population grew, so did the number of lineups and their length. More clients equals more...

Read more
THE EFFECT OF SOCIAL STUDIES IN THE CORRECTION OF VICES AND THE IMPROVEMENT OF VALUES AMONG STUDENTS

Background Of The Study

Socrates, an ancient Greek philosopher, believed that a life without inquiry wa...

Read more
APPRAISING THE FINANCIAL CONTROL APPROACHES IN NIGERIA LOCAL GOVERNMENT SYSTEM

Abstract

In consonance with its transition of civil rule programme by the federal government this year,...

Read more
ASSESSMENT OF RADON-222 IN SOME SELECTED WATER SOURCES AT DUTSIN-MA TOWN, DUTSIN-MA LOCAL GOVERNMENT AREA, KATSINA STATE

ABSTRACT

 

Radon is one of the sources of nuclear contamination in water and the largest contributor of t...

Read more
DESIGN AND IMPLEMENTATION OF CAR RENTAL AND TRACKING SYSTEM

Statement of the Problem

In an organization running a car rental service, the process for searching client details is sl...

Read more
THE INFLUENCE OF SUPPLY CHAIN DIGITALIZATION ON LOGISTICS PERFORMANCE

Abstract: THE INFLUENCE OF SUPPLY CHAIN DIGITALIZATION ON LOGISTICS PERFORMANCE

This study examines the influence of supply chain digital...

Read more
ASSESSMENT OF KNOWLEDGE, ATTITUDE, PRACTICE AND AVAILABILITY OF SAFETY MEASURES TOWARDS PREVENTION OF HEALTHCARE-ASSOCIATED INFECTIONS AMONG PRIMARY HEALTHCARE WORKERS IN NIGERIA

ABSTRACT

This study assessed knowledge, attitude, practice and availability of safety measures towards prevention of Healthcare-Associate...

Read more
THE CAUSES AND CONSEQUENCES OF THE TWITTER BAN ON NIGERIAN CITIZENS

Background Of The Study

It has been known for a long time that social media is a type of human interact...

Read more
INFLUENCE OF INFORMATION SOURCES ON FARMERS KNOWLEDGE AND USAGE OF POULTRY DRUGS IN EDO AND DELTA STATES, NIGERIA.

ABSTRACT

A nation’s capacity for industrialization and employment depends on her improvement in l...

Read more
Share this page with your friends




whatsapp