SlideShare a Scribd company logo
1 of 15
Download to read offline
Understanding mobile service usage
and user behavior pattern for MEC
Resource Management (assignment,
scaling, and migration)
Sabidur Rahman
Friday group meeting
Netlab, UC Davis
Jan 26, 2018
Overview
• Application usage behavior/pattern of mobile
service users: Survey of a study of collected
data by Orange Lab
• Mobile Edge Computing: definition and
usecases
• Central office re-architected as a datacenter
• Who’s problem?
• Problem statement
Application
usage pattern
in Mobile
Network
• Universidad Carlos III Madrid and Orange Labs
studies 3G/4G mobile network deployed over a
major European country (France).
• Almost all considered services exhibit quite
different temporal usage
• In contrast to such temporal behavior, spatial
patterns are fairly uniform across all services
• When looking at usage patterns at different
locations, the average traffic volume per user is
dependent on the urbanization level
• This findings not only have sociological
implications, but are also relevant to the
orchestration of network resources
C. Marquez, M. Gramaglia, M. Fiore, A. Banchs, C. Ziemlicki, Z. Smoreda. “Not All Apps Are Created Equal: Analysis of Spatiotemporal Heterogeneity
in Nationwide Mobile Service Usage.” CoNEXT, 2017.
C. Marquez, M. Gramaglia, M. Fiore, A. Banchs, C. Ziemlicki, Z. Smoreda. “Not All Apps Are Created Equal: Analysis of Spatiotemporal Heterogeneity
in Nationwide Mobile Service Usage.” CoNEXT, 2017.
Temporal Effect (which service/App at what time?)
Activity peak detected in sample time series.
C. Marquez, M. Gramaglia, M. Fiore, A. Banchs, C. Ziemlicki, Z. Smoreda. “Not All Apps Are Created Equal: Analysis of Spatiotemporal Heterogeneity
in Nationwide Mobile Service Usage.” CoNEXT, 2017.
Spatial Effect (which service/App where?)
Paris-Lyon-Marseille
Commute path
Netflix usage is less
evenly distributed (less
rural users).
Netflix usage
correlates with
availability of 4G
network.
User behavior
-> Resource
Management
in Mobile
Edge
Computing
• Prediction (of app usage, user location) based
on repetitive behavior (past history)
• Use the predicted number to deploy resources.
• Can user data be labeled as big data (3V:
volume, variety and velocity)?
• How findings from big data help for Mobile
Compute resource allocation?
What is MEC?
• Multi-access/Mobile Edge
Computing (MEC), or simply edge
computing, is the application of
cloud architecture principles to
compute, storage and networking
infrastructure close to the user, at
the edge of a network.
• Edge computing is typically located
at the access point, one hop away
from the user.
• Fog computing is a superset of
edge computing, and essentially
includes everything that is not a
cloud.
Radio Area Network (RAN) for LTE/5G
Radio Network Controller (RNC) for WiFi
Cable Modem Termination System (CMTS) for cable
PON OLT for fiber
Review of Industry report by SDxCentral:
https://www.sdxcentral.com/reports/mec-edge-computing-download-2017/
Edge Computing Usecases
Review of Industry report by SDxCentral: https://www.sdxcentral.com/reports/mec-edge-computing-download-2017/
Architecture of MEC system
Y. Mao, C. You, J. Zhang, K. Huang, K. B. Letaief, “A survey on mobile edge computing: The communication perspective.” IEEE Communications Surveys & Tutorials. Aug 2017
Central office re-architected as a data center (CORD)
L. Peterson, A. Al-Shabibi, T. Anshutz, S. Baker, A. Bavier, S. Das, J. Hart, G. Palukar, and W. Snow. "Central office
re-architected as a data center," IEEE Commun. Magazine, vol. 54, no. 10, pp. 96-101, Oct. 2016
MEC Resource
Management
Problem
• Placement/Allocation Problem: For an
incoming/expected service load (from
user) how to decide where to
serve/place the request?
• Scaling Problem: How to scale resources
(CPU/MEM/Network) when load goes
up/down?
• Migration Problem: How to migrate
contents/VMs when user location
changes?
• Constraints to consider: Limited
hardware (CPU/Mem/Network)
resources, Latency, User priority class.
• Understanding of user behavior/usage-
pattern helps. For example, if Netflix is
used less during office hours and
Twitter/Fb/Youtube used more. Does
that help in Mobile resource allocation? W. Wang, Y. Zhao, M. Tornatore, A. Gupta, J. Zhang, and B. Mukherjee. “Virtual machine placement and
workload assignment for mobile edge computing,” In Proc. 6th IEEE Cloud Networking (CloudNet), Sep. 2017.
Who’s Problem?
What is the motivation for MEC tenants
(Twitter/Netflix)?
• As a tenant of MEC, why would 3rd party
application/service providers (for example,
Twitter/Netflix) be interested to place
application servers/contents closer to users?
Why would they pay for MEC?
• MEC is closer to user (low latency, local
processing, better QoS).
• Users are mobile. Mobile users (for example,
commuters) can benefit from moving service
points.
What is the motivation for MEC owners
(AT&T/Verizon/Akamai)?
• Flexible pay-per-use revenue model for
tenants/enterprise customers.
• Lower latency, better QoS.
• Off-loading traffic from the Core/Central Cloud
Data Centers.
• Mobile user/traffic management.
• Dynamic resource management: how much
resources to deploy: where? What time? For
which tenant?
• Use of collected data: this can be a practical
usage of the collected usage data from all over
the network.
http://www.verizonenterprise.com/products/networking/sdn-nfv/virtual-network-services/
Problem
Statement
1) Derive the numbers from user behavior/historic usage
pattern
- Predict future usage
- Measure recent changes
- Infer resource requirements in near future
2) Use those numbers (output from step 1) to make
necessary resource management decisions: assign, scale,
and/or migrate resources for applications to improve QoS,
improve User experience, and reduce cost.
Thanks!

More Related Content

What's hot

BDE Technical Webinar 1 : Requirements elicitation
BDE Technical Webinar 1 : Requirements elicitationBDE Technical Webinar 1 : Requirements elicitation
BDE Technical Webinar 1 : Requirements elicitationBigData_Europe
 
International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)ijujournal
 
Call for Papers -April Issue - International Journal of Ubiquitous Computing ...
Call for Papers -April Issue - International Journal of Ubiquitous Computing ...Call for Papers -April Issue - International Journal of Ubiquitous Computing ...
Call for Papers -April Issue - International Journal of Ubiquitous Computing ...ijujournal
 
The Future is Cyber-Healthcare
The Future is Cyber-Healthcare The Future is Cyber-Healthcare
The Future is Cyber-Healthcare PayamBarnaghi
 
Big data analytics, machine learning and artificial intelligence in next gene...
Big data analytics, machine learning and artificial intelligence in next gene...Big data analytics, machine learning and artificial intelligence in next gene...
Big data analytics, machine learning and artificial intelligence in next gene...nexgentechnology
 
UMOBILE: Universal, mobile-centric and opportunistic communications architecture
UMOBILE: Universal, mobile-centric and opportunistic communications architectureUMOBILE: Universal, mobile-centric and opportunistic communications architecture
UMOBILE: Universal, mobile-centric and opportunistic communications architecturePaulo Milheiro Mendes
 
October Issue : Scope & Topics International Journal of Ubiquitous Computing ...
October Issue : Scope & Topics International Journal of Ubiquitous Computing ...October Issue : Scope & Topics International Journal of Ubiquitous Computing ...
October Issue : Scope & Topics International Journal of Ubiquitous Computing ...ijujournal
 
A survey of mac layer issues and protocols for machine to-machine communications
A survey of mac layer issues and protocols for machine to-machine communicationsA survey of mac layer issues and protocols for machine to-machine communications
A survey of mac layer issues and protocols for machine to-machine communicationsieeeprojectsbangalore
 
Intelligent Data Processing for the Internet of Things
Intelligent Data Processing for the Internet of Things Intelligent Data Processing for the Internet of Things
Intelligent Data Processing for the Internet of Things PayamBarnaghi
 
Data Analytics for Smart Cities: Looking Back, Looking Forward
Data Analytics for Smart Cities: Looking Back, Looking Forward Data Analytics for Smart Cities: Looking Back, Looking Forward
Data Analytics for Smart Cities: Looking Back, Looking Forward PayamBarnaghi
 
Poster nci 2010
Poster   nci 2010Poster   nci 2010
Poster nci 2010bdemchak
 
Modelling and Simulation Approaches for Techno-Societal Phenomena
Modelling and Simulation Approaches for Techno-Societal Phenomena Modelling and Simulation Approaches for Techno-Societal Phenomena
Modelling and Simulation Approaches for Techno-Societal Phenomena Yannis Charalabidis
 
Provisioning Privacy for TIP Attribute in Trusted Third Party (TTP) Location ...
Provisioning Privacy for TIP Attribute in Trusted Third Party (TTP) Location ...Provisioning Privacy for TIP Attribute in Trusted Third Party (TTP) Location ...
Provisioning Privacy for TIP Attribute in Trusted Third Party (TTP) Location ...Rida Qayyum
 
Future Profiles of e-Research
Future Profiles of e-Research Future Profiles of e-Research
Future Profiles of e-Research Ian Miles
 
Advanced mobility dialog - outcomes and next steps aug2011
Advanced mobility dialog -  outcomes and next steps aug2011Advanced mobility dialog -  outcomes and next steps aug2011
Advanced mobility dialog - outcomes and next steps aug2011Rick Holgate
 
Simon Forge TAFI workshop
Simon Forge TAFI workshopSimon Forge TAFI workshop
Simon Forge TAFI workshopblogzilla
 
How to make data more usable on the Internet of Things
How to make data more usable on the Internet of ThingsHow to make data more usable on the Internet of Things
How to make data more usable on the Internet of ThingsPayamBarnaghi
 

What's hot (20)

BDE Technical Webinar 1 : Requirements elicitation
BDE Technical Webinar 1 : Requirements elicitationBDE Technical Webinar 1 : Requirements elicitation
BDE Technical Webinar 1 : Requirements elicitation
 
International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)
 
Call for Papers -April Issue - International Journal of Ubiquitous Computing ...
Call for Papers -April Issue - International Journal of Ubiquitous Computing ...Call for Papers -April Issue - International Journal of Ubiquitous Computing ...
Call for Papers -April Issue - International Journal of Ubiquitous Computing ...
 
The Future is Cyber-Healthcare
The Future is Cyber-Healthcare The Future is Cyber-Healthcare
The Future is Cyber-Healthcare
 
Big data analytics, machine learning and artificial intelligence in next gene...
Big data analytics, machine learning and artificial intelligence in next gene...Big data analytics, machine learning and artificial intelligence in next gene...
Big data analytics, machine learning and artificial intelligence in next gene...
 
Ppt template (1)
Ppt template (1)Ppt template (1)
Ppt template (1)
 
UMOBILE: Universal, mobile-centric and opportunistic communications architecture
UMOBILE: Universal, mobile-centric and opportunistic communications architectureUMOBILE: Universal, mobile-centric and opportunistic communications architecture
UMOBILE: Universal, mobile-centric and opportunistic communications architecture
 
October Issue : Scope & Topics International Journal of Ubiquitous Computing ...
October Issue : Scope & Topics International Journal of Ubiquitous Computing ...October Issue : Scope & Topics International Journal of Ubiquitous Computing ...
October Issue : Scope & Topics International Journal of Ubiquitous Computing ...
 
A survey of mac layer issues and protocols for machine to-machine communications
A survey of mac layer issues and protocols for machine to-machine communicationsA survey of mac layer issues and protocols for machine to-machine communications
A survey of mac layer issues and protocols for machine to-machine communications
 
Intelligent Data Processing for the Internet of Things
Intelligent Data Processing for the Internet of Things Intelligent Data Processing for the Internet of Things
Intelligent Data Processing for the Internet of Things
 
Data Analytics for Smart Cities: Looking Back, Looking Forward
Data Analytics for Smart Cities: Looking Back, Looking Forward Data Analytics for Smart Cities: Looking Back, Looking Forward
Data Analytics for Smart Cities: Looking Back, Looking Forward
 
Poster nci 2010
Poster   nci 2010Poster   nci 2010
Poster nci 2010
 
Modelling and Simulation Approaches for Techno-Societal Phenomena
Modelling and Simulation Approaches for Techno-Societal Phenomena Modelling and Simulation Approaches for Techno-Societal Phenomena
Modelling and Simulation Approaches for Techno-Societal Phenomena
 
BT-RESUME
BT-RESUMEBT-RESUME
BT-RESUME
 
Provisioning Privacy for TIP Attribute in Trusted Third Party (TTP) Location ...
Provisioning Privacy for TIP Attribute in Trusted Third Party (TTP) Location ...Provisioning Privacy for TIP Attribute in Trusted Third Party (TTP) Location ...
Provisioning Privacy for TIP Attribute in Trusted Third Party (TTP) Location ...
 
Future Profiles of e-Research
Future Profiles of e-Research Future Profiles of e-Research
Future Profiles of e-Research
 
Advanced mobility dialog - outcomes and next steps aug2011
Advanced mobility dialog -  outcomes and next steps aug2011Advanced mobility dialog -  outcomes and next steps aug2011
Advanced mobility dialog - outcomes and next steps aug2011
 
M-Lab and CATNIX. Open Internet Measurement for the Researchers and the Public
M-Lab and CATNIX. Open Internet Measurement for the Researchers and the PublicM-Lab and CATNIX. Open Internet Measurement for the Researchers and the Public
M-Lab and CATNIX. Open Internet Measurement for the Researchers and the Public
 
Simon Forge TAFI workshop
Simon Forge TAFI workshopSimon Forge TAFI workshop
Simon Forge TAFI workshop
 
How to make data more usable on the Internet of Things
How to make data more usable on the Internet of ThingsHow to make data more usable on the Internet of Things
How to make data more usable on the Internet of Things
 

Similar to Understanding mobile service usage and user behavior pattern for mec resource management (assignment, scaling, and migration)

The common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generationThe common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generationeSAT Publishing House
 
The common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generationThe common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generationeSAT Journals
 
Hsing cuhk talk wireless 5_g_why-how-what_mar 31 2014
Hsing cuhk talk wireless 5_g_why-how-what_mar 31 2014Hsing cuhk talk wireless 5_g_why-how-what_mar 31 2014
Hsing cuhk talk wireless 5_g_why-how-what_mar 31 2014HarshitParkar6677
 
An efficient approach on spatial big data related to wireless networks and it...
An efficient approach on spatial big data related to wireless networks and it...An efficient approach on spatial big data related to wireless networks and it...
An efficient approach on spatial big data related to wireless networks and it...eSAT Journals
 
PERFORMANCE ANALYSIS OF MOBILE DATA OFFLOADING IN HETEROGENEOUS NETWORKS
 PERFORMANCE ANALYSIS OF MOBILE DATA OFFLOADING IN HETEROGENEOUS NETWORKS PERFORMANCE ANALYSIS OF MOBILE DATA OFFLOADING IN HETEROGENEOUS NETWORKS
PERFORMANCE ANALYSIS OF MOBILE DATA OFFLOADING IN HETEROGENEOUS NETWORKSnexgentechnology
 
IntroToMEC.pptx
IntroToMEC.pptxIntroToMEC.pptx
IntroToMEC.pptxAliArsal5
 
IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...IRJET Journal
 
Machine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdfMachine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdfadeyimikaipaye
 
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing IJECEIAES
 
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...IJERA Editor
 
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim IJECEIAES
 
Mobile database security threats
Mobile database security threatsMobile database security threats
Mobile database security threatsAkhil Kumar
 
Safe Drinking Water In Bangladesh Essay
Safe Drinking Water In Bangladesh EssaySafe Drinking Water In Bangladesh Essay
Safe Drinking Water In Bangladesh EssaySusan Cox
 
Performance and handoff evaluation of heterogeneous wireless networks 2
Performance and handoff evaluation of heterogeneous wireless networks 2Performance and handoff evaluation of heterogeneous wireless networks 2
Performance and handoff evaluation of heterogeneous wireless networks 2IAEME Publication
 
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...IJCNCJournal
 
Collation of Mobile operatives
Collation of Mobile operativesCollation of Mobile operatives
Collation of Mobile operativesIJERA Editor
 

Similar to Understanding mobile service usage and user behavior pattern for mec resource management (assignment, scaling, and migration) (20)

The common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generationThe common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generation
 
The common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generationThe common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generation
 
Hsing cuhk talk wireless 5_g_why-how-what_mar 31 2014
Hsing cuhk talk wireless 5_g_why-how-what_mar 31 2014Hsing cuhk talk wireless 5_g_why-how-what_mar 31 2014
Hsing cuhk talk wireless 5_g_why-how-what_mar 31 2014
 
An efficient approach on spatial big data related to wireless networks and it...
An efficient approach on spatial big data related to wireless networks and it...An efficient approach on spatial big data related to wireless networks and it...
An efficient approach on spatial big data related to wireless networks and it...
 
PERFORMANCE ANALYSIS OF MOBILE DATA OFFLOADING IN HETEROGENEOUS NETWORKS
 PERFORMANCE ANALYSIS OF MOBILE DATA OFFLOADING IN HETEROGENEOUS NETWORKS PERFORMANCE ANALYSIS OF MOBILE DATA OFFLOADING IN HETEROGENEOUS NETWORKS
PERFORMANCE ANALYSIS OF MOBILE DATA OFFLOADING IN HETEROGENEOUS NETWORKS
 
IntroToMEC.pptx
IntroToMEC.pptxIntroToMEC.pptx
IntroToMEC.pptx
 
IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...
 
Machine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdfMachine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdf
 
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
 
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...
 
Intelligent Agents in Telecommunications
Intelligent Agents in TelecommunicationsIntelligent Agents in Telecommunications
Intelligent Agents in Telecommunications
 
Ip and 3 g
Ip and 3 gIp and 3 g
Ip and 3 g
 
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim
 
Mobile database security threats
Mobile database security threatsMobile database security threats
Mobile database security threats
 
Safe Drinking Water In Bangladesh Essay
Safe Drinking Water In Bangladesh EssaySafe Drinking Water In Bangladesh Essay
Safe Drinking Water In Bangladesh Essay
 
395 401
395 401395 401
395 401
 
Performance and handoff evaluation of heterogeneous wireless networks 2
Performance and handoff evaluation of heterogeneous wireless networks 2Performance and handoff evaluation of heterogeneous wireless networks 2
Performance and handoff evaluation of heterogeneous wireless networks 2
 
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
 
Collation of Mobile operatives
Collation of Mobile operativesCollation of Mobile operatives
Collation of Mobile operatives
 

More from Sabidur Rahman

Smart city- services and technologies
Smart city- services and technologiesSmart city- services and technologies
Smart city- services and technologiesSabidur Rahman
 
Blockchain technology and its’ usecases in computer networks
Blockchain technology and its’ usecases in computer networksBlockchain technology and its’ usecases in computer networks
Blockchain technology and its’ usecases in computer networksSabidur Rahman
 
T-SDN Controllers for Transport Network
T-SDN Controllers for Transport NetworkT-SDN Controllers for Transport Network
T-SDN Controllers for Transport NetworkSabidur Rahman
 
5 g and beyond! IEEE ICC 2018 keynotes reviewed
5 g and beyond! IEEE ICC 2018 keynotes reviewed5 g and beyond! IEEE ICC 2018 keynotes reviewed
5 g and beyond! IEEE ICC 2018 keynotes reviewedSabidur Rahman
 
Meeting the requirements to deploy cloud RAN over optical networks - elastic ...
Meeting the requirements to deploy cloud RAN over optical networks - elastic ...Meeting the requirements to deploy cloud RAN over optical networks - elastic ...
Meeting the requirements to deploy cloud RAN over optical networks - elastic ...Sabidur Rahman
 
Akamai Edge 2017 reviewed
Akamai Edge 2017 reviewedAkamai Edge 2017 reviewed
Akamai Edge 2017 reviewedSabidur Rahman
 
Innovations in Edge Computing and MEC
Innovations in Edge Computing and MECInnovations in Edge Computing and MEC
Innovations in Edge Computing and MECSabidur Rahman
 
Dynamic workload migration over optical backbone network to minimize data cen...
Dynamic workload migration over optical backbone network to minimize data cen...Dynamic workload migration over optical backbone network to minimize data cen...
Dynamic workload migration over optical backbone network to minimize data cen...Sabidur Rahman
 
Migration of groups of virtual machines in distributed data centers to reduce...
Migration of groups of virtual machines in distributed data centers to reduce...Migration of groups of virtual machines in distributed data centers to reduce...
Migration of groups of virtual machines in distributed data centers to reduce...Sabidur Rahman
 
Big data and machine learning for network research problems
Big data and machine learning for network research problemsBig data and machine learning for network research problems
Big data and machine learning for network research problemsSabidur Rahman
 
Cost savings from auto-scaling of network resources using machine learning
Cost savings from auto-scaling of network resources using machine learningCost savings from auto-scaling of network resources using machine learning
Cost savings from auto-scaling of network resources using machine learningSabidur Rahman
 
IoT Mobility Forensics
IoT Mobility ForensicsIoT Mobility Forensics
IoT Mobility ForensicsSabidur Rahman
 
Network tomography to enhance the performance of software defined network mon...
Network tomography to enhance the performance of software defined network mon...Network tomography to enhance the performance of software defined network mon...
Network tomography to enhance the performance of software defined network mon...Sabidur Rahman
 
Approximation techniques used for general purpose algorithms
Approximation techniques used for general purpose algorithmsApproximation techniques used for general purpose algorithms
Approximation techniques used for general purpose algorithmsSabidur Rahman
 
Computer Security: Worms
Computer Security: WormsComputer Security: Worms
Computer Security: WormsSabidur Rahman
 

More from Sabidur Rahman (15)

Smart city- services and technologies
Smart city- services and technologiesSmart city- services and technologies
Smart city- services and technologies
 
Blockchain technology and its’ usecases in computer networks
Blockchain technology and its’ usecases in computer networksBlockchain technology and its’ usecases in computer networks
Blockchain technology and its’ usecases in computer networks
 
T-SDN Controllers for Transport Network
T-SDN Controllers for Transport NetworkT-SDN Controllers for Transport Network
T-SDN Controllers for Transport Network
 
5 g and beyond! IEEE ICC 2018 keynotes reviewed
5 g and beyond! IEEE ICC 2018 keynotes reviewed5 g and beyond! IEEE ICC 2018 keynotes reviewed
5 g and beyond! IEEE ICC 2018 keynotes reviewed
 
Meeting the requirements to deploy cloud RAN over optical networks - elastic ...
Meeting the requirements to deploy cloud RAN over optical networks - elastic ...Meeting the requirements to deploy cloud RAN over optical networks - elastic ...
Meeting the requirements to deploy cloud RAN over optical networks - elastic ...
 
Akamai Edge 2017 reviewed
Akamai Edge 2017 reviewedAkamai Edge 2017 reviewed
Akamai Edge 2017 reviewed
 
Innovations in Edge Computing and MEC
Innovations in Edge Computing and MECInnovations in Edge Computing and MEC
Innovations in Edge Computing and MEC
 
Dynamic workload migration over optical backbone network to minimize data cen...
Dynamic workload migration over optical backbone network to minimize data cen...Dynamic workload migration over optical backbone network to minimize data cen...
Dynamic workload migration over optical backbone network to minimize data cen...
 
Migration of groups of virtual machines in distributed data centers to reduce...
Migration of groups of virtual machines in distributed data centers to reduce...Migration of groups of virtual machines in distributed data centers to reduce...
Migration of groups of virtual machines in distributed data centers to reduce...
 
Big data and machine learning for network research problems
Big data and machine learning for network research problemsBig data and machine learning for network research problems
Big data and machine learning for network research problems
 
Cost savings from auto-scaling of network resources using machine learning
Cost savings from auto-scaling of network resources using machine learningCost savings from auto-scaling of network resources using machine learning
Cost savings from auto-scaling of network resources using machine learning
 
IoT Mobility Forensics
IoT Mobility ForensicsIoT Mobility Forensics
IoT Mobility Forensics
 
Network tomography to enhance the performance of software defined network mon...
Network tomography to enhance the performance of software defined network mon...Network tomography to enhance the performance of software defined network mon...
Network tomography to enhance the performance of software defined network mon...
 
Approximation techniques used for general purpose algorithms
Approximation techniques used for general purpose algorithmsApproximation techniques used for general purpose algorithms
Approximation techniques used for general purpose algorithms
 
Computer Security: Worms
Computer Security: WormsComputer Security: Worms
Computer Security: Worms
 

Recently uploaded

Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgsaravananr517913
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsSachinPawar510423
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Piping Basic stress analysis by engineering
Piping Basic stress analysis by engineeringPiping Basic stress analysis by engineering
Piping Basic stress analysis by engineeringJuanCarlosMorales19600
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptSolving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptJasonTagapanGulla
 

Recently uploaded (20)

Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documents
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Piping Basic stress analysis by engineering
Piping Basic stress analysis by engineeringPiping Basic stress analysis by engineering
Piping Basic stress analysis by engineering
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptSolving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.ppt
 

Understanding mobile service usage and user behavior pattern for mec resource management (assignment, scaling, and migration)

  • 1. Understanding mobile service usage and user behavior pattern for MEC Resource Management (assignment, scaling, and migration) Sabidur Rahman Friday group meeting Netlab, UC Davis Jan 26, 2018
  • 2. Overview • Application usage behavior/pattern of mobile service users: Survey of a study of collected data by Orange Lab • Mobile Edge Computing: definition and usecases • Central office re-architected as a datacenter • Who’s problem? • Problem statement
  • 3. Application usage pattern in Mobile Network • Universidad Carlos III Madrid and Orange Labs studies 3G/4G mobile network deployed over a major European country (France). • Almost all considered services exhibit quite different temporal usage • In contrast to such temporal behavior, spatial patterns are fairly uniform across all services • When looking at usage patterns at different locations, the average traffic volume per user is dependent on the urbanization level • This findings not only have sociological implications, but are also relevant to the orchestration of network resources C. Marquez, M. Gramaglia, M. Fiore, A. Banchs, C. Ziemlicki, Z. Smoreda. “Not All Apps Are Created Equal: Analysis of Spatiotemporal Heterogeneity in Nationwide Mobile Service Usage.” CoNEXT, 2017.
  • 4. C. Marquez, M. Gramaglia, M. Fiore, A. Banchs, C. Ziemlicki, Z. Smoreda. “Not All Apps Are Created Equal: Analysis of Spatiotemporal Heterogeneity in Nationwide Mobile Service Usage.” CoNEXT, 2017.
  • 5. Temporal Effect (which service/App at what time?) Activity peak detected in sample time series. C. Marquez, M. Gramaglia, M. Fiore, A. Banchs, C. Ziemlicki, Z. Smoreda. “Not All Apps Are Created Equal: Analysis of Spatiotemporal Heterogeneity in Nationwide Mobile Service Usage.” CoNEXT, 2017.
  • 6. Spatial Effect (which service/App where?) Paris-Lyon-Marseille Commute path Netflix usage is less evenly distributed (less rural users). Netflix usage correlates with availability of 4G network.
  • 7. User behavior -> Resource Management in Mobile Edge Computing • Prediction (of app usage, user location) based on repetitive behavior (past history) • Use the predicted number to deploy resources. • Can user data be labeled as big data (3V: volume, variety and velocity)? • How findings from big data help for Mobile Compute resource allocation?
  • 8. What is MEC? • Multi-access/Mobile Edge Computing (MEC), or simply edge computing, is the application of cloud architecture principles to compute, storage and networking infrastructure close to the user, at the edge of a network. • Edge computing is typically located at the access point, one hop away from the user. • Fog computing is a superset of edge computing, and essentially includes everything that is not a cloud. Radio Area Network (RAN) for LTE/5G Radio Network Controller (RNC) for WiFi Cable Modem Termination System (CMTS) for cable PON OLT for fiber Review of Industry report by SDxCentral: https://www.sdxcentral.com/reports/mec-edge-computing-download-2017/
  • 9. Edge Computing Usecases Review of Industry report by SDxCentral: https://www.sdxcentral.com/reports/mec-edge-computing-download-2017/
  • 10. Architecture of MEC system Y. Mao, C. You, J. Zhang, K. Huang, K. B. Letaief, “A survey on mobile edge computing: The communication perspective.” IEEE Communications Surveys & Tutorials. Aug 2017
  • 11. Central office re-architected as a data center (CORD) L. Peterson, A. Al-Shabibi, T. Anshutz, S. Baker, A. Bavier, S. Das, J. Hart, G. Palukar, and W. Snow. "Central office re-architected as a data center," IEEE Commun. Magazine, vol. 54, no. 10, pp. 96-101, Oct. 2016
  • 12. MEC Resource Management Problem • Placement/Allocation Problem: For an incoming/expected service load (from user) how to decide where to serve/place the request? • Scaling Problem: How to scale resources (CPU/MEM/Network) when load goes up/down? • Migration Problem: How to migrate contents/VMs when user location changes? • Constraints to consider: Limited hardware (CPU/Mem/Network) resources, Latency, User priority class. • Understanding of user behavior/usage- pattern helps. For example, if Netflix is used less during office hours and Twitter/Fb/Youtube used more. Does that help in Mobile resource allocation? W. Wang, Y. Zhao, M. Tornatore, A. Gupta, J. Zhang, and B. Mukherjee. “Virtual machine placement and workload assignment for mobile edge computing,” In Proc. 6th IEEE Cloud Networking (CloudNet), Sep. 2017.
  • 13. Who’s Problem? What is the motivation for MEC tenants (Twitter/Netflix)? • As a tenant of MEC, why would 3rd party application/service providers (for example, Twitter/Netflix) be interested to place application servers/contents closer to users? Why would they pay for MEC? • MEC is closer to user (low latency, local processing, better QoS). • Users are mobile. Mobile users (for example, commuters) can benefit from moving service points. What is the motivation for MEC owners (AT&T/Verizon/Akamai)? • Flexible pay-per-use revenue model for tenants/enterprise customers. • Lower latency, better QoS. • Off-loading traffic from the Core/Central Cloud Data Centers. • Mobile user/traffic management. • Dynamic resource management: how much resources to deploy: where? What time? For which tenant? • Use of collected data: this can be a practical usage of the collected usage data from all over the network. http://www.verizonenterprise.com/products/networking/sdn-nfv/virtual-network-services/
  • 14. Problem Statement 1) Derive the numbers from user behavior/historic usage pattern - Predict future usage - Measure recent changes - Infer resource requirements in near future 2) Use those numbers (output from step 1) to make necessary resource management decisions: assign, scale, and/or migrate resources for applications to improve QoS, improve User experience, and reduce cost.