SlideShare a Scribd company logo
Understanding mobile service usage
and user behavior pattern for MEC
Resource Management (assignment,
scaling, and migration)
Sabidur Rahman
Friday group meeting
Netlab, UC Davis
Jan 26, 2018
Overview
• Application usage behavior/pattern of mobile
service users: Survey of a study of collected
data by Orange Lab
• Mobile Edge Computing: definition and
usecases
• Central office re-architected as a datacenter
• Who’s problem?
• Problem statement
Application
usage pattern
in Mobile
Network
• Universidad Carlos III Madrid and Orange Labs
studies 3G/4G mobile network deployed over a
major European country (France).
• Almost all considered services exhibit quite
different temporal usage
• In contrast to such temporal behavior, spatial
patterns are fairly uniform across all services
• When looking at usage patterns at different
locations, the average traffic volume per user is
dependent on the urbanization level
• This findings not only have sociological
implications, but are also relevant to the
orchestration of network resources
C. Marquez, M. Gramaglia, M. Fiore, A. Banchs, C. Ziemlicki, Z. Smoreda. “Not All Apps Are Created Equal: Analysis of Spatiotemporal Heterogeneity
in Nationwide Mobile Service Usage.” CoNEXT, 2017.
C. Marquez, M. Gramaglia, M. Fiore, A. Banchs, C. Ziemlicki, Z. Smoreda. “Not All Apps Are Created Equal: Analysis of Spatiotemporal Heterogeneity
in Nationwide Mobile Service Usage.” CoNEXT, 2017.
Temporal Effect (which service/App at what time?)
Activity peak detected in sample time series.
C. Marquez, M. Gramaglia, M. Fiore, A. Banchs, C. Ziemlicki, Z. Smoreda. “Not All Apps Are Created Equal: Analysis of Spatiotemporal Heterogeneity
in Nationwide Mobile Service Usage.” CoNEXT, 2017.
Spatial Effect (which service/App where?)
Paris-Lyon-Marseille
Commute path
Netflix usage is less
evenly distributed (less
rural users).
Netflix usage
correlates with
availability of 4G
network.
User behavior
-> Resource
Management
in Mobile
Edge
Computing
• Prediction (of app usage, user location) based
on repetitive behavior (past history)
• Use the predicted number to deploy resources.
• Can user data be labeled as big data (3V:
volume, variety and velocity)?
• How findings from big data help for Mobile
Compute resource allocation?
What is MEC?
• Multi-access/Mobile Edge
Computing (MEC), or simply edge
computing, is the application of
cloud architecture principles to
compute, storage and networking
infrastructure close to the user, at
the edge of a network.
• Edge computing is typically located
at the access point, one hop away
from the user.
• Fog computing is a superset of
edge computing, and essentially
includes everything that is not a
cloud.
Radio Area Network (RAN) for LTE/5G
Radio Network Controller (RNC) for WiFi
Cable Modem Termination System (CMTS) for cable
PON OLT for fiber
Review of Industry report by SDxCentral:
https://www.sdxcentral.com/reports/mec-edge-computing-download-2017/
Edge Computing Usecases
Review of Industry report by SDxCentral: https://www.sdxcentral.com/reports/mec-edge-computing-download-2017/
Architecture of MEC system
Y. Mao, C. You, J. Zhang, K. Huang, K. B. Letaief, “A survey on mobile edge computing: The communication perspective.” IEEE Communications Surveys & Tutorials. Aug 2017
Central office re-architected as a data center (CORD)
L. Peterson, A. Al-Shabibi, T. Anshutz, S. Baker, A. Bavier, S. Das, J. Hart, G. Palukar, and W. Snow. "Central office
re-architected as a data center," IEEE Commun. Magazine, vol. 54, no. 10, pp. 96-101, Oct. 2016
MEC Resource
Management
Problem
• Placement/Allocation Problem: For an
incoming/expected service load (from
user) how to decide where to
serve/place the request?
• Scaling Problem: How to scale resources
(CPU/MEM/Network) when load goes
up/down?
• Migration Problem: How to migrate
contents/VMs when user location
changes?
• Constraints to consider: Limited
hardware (CPU/Mem/Network)
resources, Latency, User priority class.
• Understanding of user behavior/usage-
pattern helps. For example, if Netflix is
used less during office hours and
Twitter/Fb/Youtube used more. Does
that help in Mobile resource allocation? W. Wang, Y. Zhao, M. Tornatore, A. Gupta, J. Zhang, and B. Mukherjee. “Virtual machine placement and
workload assignment for mobile edge computing,” In Proc. 6th IEEE Cloud Networking (CloudNet), Sep. 2017.
Who’s Problem?
What is the motivation for MEC tenants
(Twitter/Netflix)?
• As a tenant of MEC, why would 3rd party
application/service providers (for example,
Twitter/Netflix) be interested to place
application servers/contents closer to users?
Why would they pay for MEC?
• MEC is closer to user (low latency, local
processing, better QoS).
• Users are mobile. Mobile users (for example,
commuters) can benefit from moving service
points.
What is the motivation for MEC owners
(AT&T/Verizon/Akamai)?
• Flexible pay-per-use revenue model for
tenants/enterprise customers.
• Lower latency, better QoS.
• Off-loading traffic from the Core/Central Cloud
Data Centers.
• Mobile user/traffic management.
• Dynamic resource management: how much
resources to deploy: where? What time? For
which tenant?
• Use of collected data: this can be a practical
usage of the collected usage data from all over
the network.
http://www.verizonenterprise.com/products/networking/sdn-nfv/virtual-network-services/
Problem
Statement
1) Derive the numbers from user behavior/historic usage
pattern
- Predict future usage
- Measure recent changes
- Infer resource requirements in near future
2) Use those numbers (output from step 1) to make
necessary resource management decisions: assign, scale,
and/or migrate resources for applications to improve QoS,
improve User experience, and reduce cost.
Thanks!

More Related Content

What's hot

BDE Technical Webinar 1 : Requirements elicitation
BDE Technical Webinar 1 : Requirements elicitationBDE Technical Webinar 1 : Requirements elicitation
BDE Technical Webinar 1 : Requirements elicitation
BigData_Europe
 
International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)
ijujournal
 
Call for Papers -April Issue - International Journal of Ubiquitous Computing ...
Call for Papers -April Issue - International Journal of Ubiquitous Computing ...Call for Papers -April Issue - International Journal of Ubiquitous Computing ...
Call for Papers -April Issue - International Journal of Ubiquitous Computing ...
ijujournal
 
The Future is Cyber-Healthcare
The Future is Cyber-Healthcare The Future is Cyber-Healthcare
The Future is Cyber-Healthcare
PayamBarnaghi
 
Big data analytics, machine learning and artificial intelligence in next gene...
Big data analytics, machine learning and artificial intelligence in next gene...Big data analytics, machine learning and artificial intelligence in next gene...
Big data analytics, machine learning and artificial intelligence in next gene...
nexgentechnology
 
Ppt template (1)
Ppt template (1)Ppt template (1)
Ppt template (1)
prakash mahato
 
UMOBILE: Universal, mobile-centric and opportunistic communications architecture
UMOBILE: Universal, mobile-centric and opportunistic communications architectureUMOBILE: Universal, mobile-centric and opportunistic communications architecture
UMOBILE: Universal, mobile-centric and opportunistic communications architecture
Paulo Milheiro Mendes
 
October Issue : Scope & Topics International Journal of Ubiquitous Computing ...
October Issue : Scope & Topics International Journal of Ubiquitous Computing ...October Issue : Scope & Topics International Journal of Ubiquitous Computing ...
October Issue : Scope & Topics International Journal of Ubiquitous Computing ...
ijujournal
 
A survey of mac layer issues and protocols for machine to-machine communications
A survey of mac layer issues and protocols for machine to-machine communicationsA survey of mac layer issues and protocols for machine to-machine communications
A survey of mac layer issues and protocols for machine to-machine communications
ieeeprojectsbangalore
 
Intelligent Data Processing for the Internet of Things
Intelligent Data Processing for the Internet of Things Intelligent Data Processing for the Internet of Things
Intelligent Data Processing for the Internet of Things
PayamBarnaghi
 
Data Analytics for Smart Cities: Looking Back, Looking Forward
Data Analytics for Smart Cities: Looking Back, Looking Forward Data Analytics for Smart Cities: Looking Back, Looking Forward
Data Analytics for Smart Cities: Looking Back, Looking Forward
PayamBarnaghi
 
Poster nci 2010
Poster   nci 2010Poster   nci 2010
Poster nci 2010
bdemchak
 
Modelling and Simulation Approaches for Techno-Societal Phenomena
Modelling and Simulation Approaches for Techno-Societal Phenomena Modelling and Simulation Approaches for Techno-Societal Phenomena
Modelling and Simulation Approaches for Techno-Societal Phenomena
Yannis Charalabidis
 
BT-RESUME
BT-RESUMEBT-RESUME
BT-RESUME
Bakary Toure
 
Provisioning Privacy for TIP Attribute in Trusted Third Party (TTP) Location ...
Provisioning Privacy for TIP Attribute in Trusted Third Party (TTP) Location ...Provisioning Privacy for TIP Attribute in Trusted Third Party (TTP) Location ...
Provisioning Privacy for TIP Attribute in Trusted Third Party (TTP) Location ...
Rida Qayyum
 
Future Profiles of e-Research
Future Profiles of e-Research Future Profiles of e-Research
Future Profiles of e-Research
Ian Miles
 
Advanced mobility dialog - outcomes and next steps aug2011
Advanced mobility dialog -  outcomes and next steps aug2011Advanced mobility dialog -  outcomes and next steps aug2011
Advanced mobility dialog - outcomes and next steps aug2011
Rick Holgate
 
M-Lab and CATNIX. Open Internet Measurement for the Researchers and the Public
M-Lab and CATNIX. Open Internet Measurement for the Researchers and the PublicM-Lab and CATNIX. Open Internet Measurement for the Researchers and the Public
M-Lab and CATNIX. Open Internet Measurement for the Researchers and the Public
CSUC - Consorci de Serveis Universitaris de Catalunya
 
Simon Forge TAFI workshop
Simon Forge TAFI workshopSimon Forge TAFI workshop
Simon Forge TAFI workshop
blogzilla
 
How to make data more usable on the Internet of Things
How to make data more usable on the Internet of ThingsHow to make data more usable on the Internet of Things
How to make data more usable on the Internet of Things
PayamBarnaghi
 

What's hot (20)

BDE Technical Webinar 1 : Requirements elicitation
BDE Technical Webinar 1 : Requirements elicitationBDE Technical Webinar 1 : Requirements elicitation
BDE Technical Webinar 1 : Requirements elicitation
 
International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)
 
Call for Papers -April Issue - International Journal of Ubiquitous Computing ...
Call for Papers -April Issue - International Journal of Ubiquitous Computing ...Call for Papers -April Issue - International Journal of Ubiquitous Computing ...
Call for Papers -April Issue - International Journal of Ubiquitous Computing ...
 
The Future is Cyber-Healthcare
The Future is Cyber-Healthcare The Future is Cyber-Healthcare
The Future is Cyber-Healthcare
 
Big data analytics, machine learning and artificial intelligence in next gene...
Big data analytics, machine learning and artificial intelligence in next gene...Big data analytics, machine learning and artificial intelligence in next gene...
Big data analytics, machine learning and artificial intelligence in next gene...
 
Ppt template (1)
Ppt template (1)Ppt template (1)
Ppt template (1)
 
UMOBILE: Universal, mobile-centric and opportunistic communications architecture
UMOBILE: Universal, mobile-centric and opportunistic communications architectureUMOBILE: Universal, mobile-centric and opportunistic communications architecture
UMOBILE: Universal, mobile-centric and opportunistic communications architecture
 
October Issue : Scope & Topics International Journal of Ubiquitous Computing ...
October Issue : Scope & Topics International Journal of Ubiquitous Computing ...October Issue : Scope & Topics International Journal of Ubiquitous Computing ...
October Issue : Scope & Topics International Journal of Ubiquitous Computing ...
 
A survey of mac layer issues and protocols for machine to-machine communications
A survey of mac layer issues and protocols for machine to-machine communicationsA survey of mac layer issues and protocols for machine to-machine communications
A survey of mac layer issues and protocols for machine to-machine communications
 
Intelligent Data Processing for the Internet of Things
Intelligent Data Processing for the Internet of Things Intelligent Data Processing for the Internet of Things
Intelligent Data Processing for the Internet of Things
 
Data Analytics for Smart Cities: Looking Back, Looking Forward
Data Analytics for Smart Cities: Looking Back, Looking Forward Data Analytics for Smart Cities: Looking Back, Looking Forward
Data Analytics for Smart Cities: Looking Back, Looking Forward
 
Poster nci 2010
Poster   nci 2010Poster   nci 2010
Poster nci 2010
 
Modelling and Simulation Approaches for Techno-Societal Phenomena
Modelling and Simulation Approaches for Techno-Societal Phenomena Modelling and Simulation Approaches for Techno-Societal Phenomena
Modelling and Simulation Approaches for Techno-Societal Phenomena
 
BT-RESUME
BT-RESUMEBT-RESUME
BT-RESUME
 
Provisioning Privacy for TIP Attribute in Trusted Third Party (TTP) Location ...
Provisioning Privacy for TIP Attribute in Trusted Third Party (TTP) Location ...Provisioning Privacy for TIP Attribute in Trusted Third Party (TTP) Location ...
Provisioning Privacy for TIP Attribute in Trusted Third Party (TTP) Location ...
 
Future Profiles of e-Research
Future Profiles of e-Research Future Profiles of e-Research
Future Profiles of e-Research
 
Advanced mobility dialog - outcomes and next steps aug2011
Advanced mobility dialog -  outcomes and next steps aug2011Advanced mobility dialog -  outcomes and next steps aug2011
Advanced mobility dialog - outcomes and next steps aug2011
 
M-Lab and CATNIX. Open Internet Measurement for the Researchers and the Public
M-Lab and CATNIX. Open Internet Measurement for the Researchers and the PublicM-Lab and CATNIX. Open Internet Measurement for the Researchers and the Public
M-Lab and CATNIX. Open Internet Measurement for the Researchers and the Public
 
Simon Forge TAFI workshop
Simon Forge TAFI workshopSimon Forge TAFI workshop
Simon Forge TAFI workshop
 
How to make data more usable on the Internet of Things
How to make data more usable on the Internet of ThingsHow to make data more usable on the Internet of Things
How to make data more usable on the Internet of Things
 

Similar to Understanding mobile service usage and user behavior pattern for mec resource management (assignment, scaling, and migration)

The common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generationThe common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generation
eSAT Journals
 
The common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generationThe common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generation
eSAT Publishing House
 
Hsing cuhk talk wireless 5_g_why-how-what_mar 31 2014
Hsing cuhk talk wireless 5_g_why-how-what_mar 31 2014Hsing cuhk talk wireless 5_g_why-how-what_mar 31 2014
Hsing cuhk talk wireless 5_g_why-how-what_mar 31 2014
HarshitParkar6677
 
An efficient approach on spatial big data related to wireless networks and it...
An efficient approach on spatial big data related to wireless networks and it...An efficient approach on spatial big data related to wireless networks and it...
An efficient approach on spatial big data related to wireless networks and it...
eSAT Journals
 
PERFORMANCE ANALYSIS OF MOBILE DATA OFFLOADING IN HETEROGENEOUS NETWORKS
 PERFORMANCE ANALYSIS OF MOBILE DATA OFFLOADING IN HETEROGENEOUS NETWORKS PERFORMANCE ANALYSIS OF MOBILE DATA OFFLOADING IN HETEROGENEOUS NETWORKS
PERFORMANCE ANALYSIS OF MOBILE DATA OFFLOADING IN HETEROGENEOUS NETWORKS
nexgentechnology
 
IntroToMEC.pptx
IntroToMEC.pptxIntroToMEC.pptx
IntroToMEC.pptx
AliArsal5
 
IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET Journal
 
Machine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdfMachine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdf
adeyimikaipaye
 
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
IJECEIAES
 
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...
IJERA Editor
 
Intelligent Agents in Telecommunications
Intelligent Agents in TelecommunicationsIntelligent Agents in Telecommunications
Intelligent Agents in Telecommunications
IJCSIS Research Publications
 
Ip and 3 g
Ip and 3 gIp and 3 g
Ip and 3 g
Dickson Chepkwony
 
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim
IJECEIAES
 
Mobile database security threats
Mobile database security threatsMobile database security threats
Mobile database security threats
Akhil Kumar
 
Safe Drinking Water In Bangladesh Essay
Safe Drinking Water In Bangladesh EssaySafe Drinking Water In Bangladesh Essay
Safe Drinking Water In Bangladesh Essay
Susan Cox
 
395 401
395 401395 401
Performance and handoff evaluation of heterogeneous wireless networks 2
Performance and handoff evaluation of heterogeneous wireless networks 2Performance and handoff evaluation of heterogeneous wireless networks 2
Performance and handoff evaluation of heterogeneous wireless networks 2
IAEME Publication
 
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...
IJCNCJournal
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
paperpublications3
 
Collation of Mobile operatives
Collation of Mobile operativesCollation of Mobile operatives
Collation of Mobile operatives
IJERA Editor
 

Similar to Understanding mobile service usage and user behavior pattern for mec resource management (assignment, scaling, and migration) (20)

The common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generationThe common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generation
 
The common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generationThe common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generation
 
Hsing cuhk talk wireless 5_g_why-how-what_mar 31 2014
Hsing cuhk talk wireless 5_g_why-how-what_mar 31 2014Hsing cuhk talk wireless 5_g_why-how-what_mar 31 2014
Hsing cuhk talk wireless 5_g_why-how-what_mar 31 2014
 
An efficient approach on spatial big data related to wireless networks and it...
An efficient approach on spatial big data related to wireless networks and it...An efficient approach on spatial big data related to wireless networks and it...
An efficient approach on spatial big data related to wireless networks and it...
 
PERFORMANCE ANALYSIS OF MOBILE DATA OFFLOADING IN HETEROGENEOUS NETWORKS
 PERFORMANCE ANALYSIS OF MOBILE DATA OFFLOADING IN HETEROGENEOUS NETWORKS PERFORMANCE ANALYSIS OF MOBILE DATA OFFLOADING IN HETEROGENEOUS NETWORKS
PERFORMANCE ANALYSIS OF MOBILE DATA OFFLOADING IN HETEROGENEOUS NETWORKS
 
IntroToMEC.pptx
IntroToMEC.pptxIntroToMEC.pptx
IntroToMEC.pptx
 
IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...
 
Machine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdfMachine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdf
 
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
 
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...
 
Intelligent Agents in Telecommunications
Intelligent Agents in TelecommunicationsIntelligent Agents in Telecommunications
Intelligent Agents in Telecommunications
 
Ip and 3 g
Ip and 3 gIp and 3 g
Ip and 3 g
 
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim
 
Mobile database security threats
Mobile database security threatsMobile database security threats
Mobile database security threats
 
Safe Drinking Water In Bangladesh Essay
Safe Drinking Water In Bangladesh EssaySafe Drinking Water In Bangladesh Essay
Safe Drinking Water In Bangladesh Essay
 
395 401
395 401395 401
395 401
 
Performance and handoff evaluation of heterogeneous wireless networks 2
Performance and handoff evaluation of heterogeneous wireless networks 2Performance and handoff evaluation of heterogeneous wireless networks 2
Performance and handoff evaluation of heterogeneous wireless networks 2
 
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
 
Collation of Mobile operatives
Collation of Mobile operativesCollation of Mobile operatives
Collation of Mobile operatives
 

More from Sabidur Rahman

Smart city- services and technologies
Smart city- services and technologiesSmart city- services and technologies
Smart city- services and technologies
Sabidur Rahman
 
Blockchain technology and its’ usecases in computer networks
Blockchain technology and its’ usecases in computer networksBlockchain technology and its’ usecases in computer networks
Blockchain technology and its’ usecases in computer networks
Sabidur Rahman
 
T-SDN Controllers for Transport Network
T-SDN Controllers for Transport NetworkT-SDN Controllers for Transport Network
T-SDN Controllers for Transport Network
Sabidur Rahman
 
5 g and beyond! IEEE ICC 2018 keynotes reviewed
5 g and beyond! IEEE ICC 2018 keynotes reviewed5 g and beyond! IEEE ICC 2018 keynotes reviewed
5 g and beyond! IEEE ICC 2018 keynotes reviewed
Sabidur Rahman
 
Meeting the requirements to deploy cloud RAN over optical networks - elastic ...
Meeting the requirements to deploy cloud RAN over optical networks - elastic ...Meeting the requirements to deploy cloud RAN over optical networks - elastic ...
Meeting the requirements to deploy cloud RAN over optical networks - elastic ...
Sabidur Rahman
 
Akamai Edge 2017 reviewed
Akamai Edge 2017 reviewedAkamai Edge 2017 reviewed
Akamai Edge 2017 reviewed
Sabidur Rahman
 
Innovations in Edge Computing and MEC
Innovations in Edge Computing and MECInnovations in Edge Computing and MEC
Innovations in Edge Computing and MEC
Sabidur Rahman
 
Dynamic workload migration over optical backbone network to minimize data cen...
Dynamic workload migration over optical backbone network to minimize data cen...Dynamic workload migration over optical backbone network to minimize data cen...
Dynamic workload migration over optical backbone network to minimize data cen...
Sabidur Rahman
 
Migration of groups of virtual machines in distributed data centers to reduce...
Migration of groups of virtual machines in distributed data centers to reduce...Migration of groups of virtual machines in distributed data centers to reduce...
Migration of groups of virtual machines in distributed data centers to reduce...
Sabidur Rahman
 
Big data and machine learning for network research problems
Big data and machine learning for network research problemsBig data and machine learning for network research problems
Big data and machine learning for network research problems
Sabidur Rahman
 
Cost savings from auto-scaling of network resources using machine learning
Cost savings from auto-scaling of network resources using machine learningCost savings from auto-scaling of network resources using machine learning
Cost savings from auto-scaling of network resources using machine learning
Sabidur Rahman
 
IoT Mobility Forensics
IoT Mobility ForensicsIoT Mobility Forensics
IoT Mobility Forensics
Sabidur Rahman
 
Network tomography to enhance the performance of software defined network mon...
Network tomography to enhance the performance of software defined network mon...Network tomography to enhance the performance of software defined network mon...
Network tomography to enhance the performance of software defined network mon...
Sabidur Rahman
 
Approximation techniques used for general purpose algorithms
Approximation techniques used for general purpose algorithmsApproximation techniques used for general purpose algorithms
Approximation techniques used for general purpose algorithms
Sabidur Rahman
 
Computer Security: Worms
Computer Security: WormsComputer Security: Worms
Computer Security: Worms
Sabidur Rahman
 

More from Sabidur Rahman (15)

Smart city- services and technologies
Smart city- services and technologiesSmart city- services and technologies
Smart city- services and technologies
 
Blockchain technology and its’ usecases in computer networks
Blockchain technology and its’ usecases in computer networksBlockchain technology and its’ usecases in computer networks
Blockchain technology and its’ usecases in computer networks
 
T-SDN Controllers for Transport Network
T-SDN Controllers for Transport NetworkT-SDN Controllers for Transport Network
T-SDN Controllers for Transport Network
 
5 g and beyond! IEEE ICC 2018 keynotes reviewed
5 g and beyond! IEEE ICC 2018 keynotes reviewed5 g and beyond! IEEE ICC 2018 keynotes reviewed
5 g and beyond! IEEE ICC 2018 keynotes reviewed
 
Meeting the requirements to deploy cloud RAN over optical networks - elastic ...
Meeting the requirements to deploy cloud RAN over optical networks - elastic ...Meeting the requirements to deploy cloud RAN over optical networks - elastic ...
Meeting the requirements to deploy cloud RAN over optical networks - elastic ...
 
Akamai Edge 2017 reviewed
Akamai Edge 2017 reviewedAkamai Edge 2017 reviewed
Akamai Edge 2017 reviewed
 
Innovations in Edge Computing and MEC
Innovations in Edge Computing and MECInnovations in Edge Computing and MEC
Innovations in Edge Computing and MEC
 
Dynamic workload migration over optical backbone network to minimize data cen...
Dynamic workload migration over optical backbone network to minimize data cen...Dynamic workload migration over optical backbone network to minimize data cen...
Dynamic workload migration over optical backbone network to minimize data cen...
 
Migration of groups of virtual machines in distributed data centers to reduce...
Migration of groups of virtual machines in distributed data centers to reduce...Migration of groups of virtual machines in distributed data centers to reduce...
Migration of groups of virtual machines in distributed data centers to reduce...
 
Big data and machine learning for network research problems
Big data and machine learning for network research problemsBig data and machine learning for network research problems
Big data and machine learning for network research problems
 
Cost savings from auto-scaling of network resources using machine learning
Cost savings from auto-scaling of network resources using machine learningCost savings from auto-scaling of network resources using machine learning
Cost savings from auto-scaling of network resources using machine learning
 
IoT Mobility Forensics
IoT Mobility ForensicsIoT Mobility Forensics
IoT Mobility Forensics
 
Network tomography to enhance the performance of software defined network mon...
Network tomography to enhance the performance of software defined network mon...Network tomography to enhance the performance of software defined network mon...
Network tomography to enhance the performance of software defined network mon...
 
Approximation techniques used for general purpose algorithms
Approximation techniques used for general purpose algorithmsApproximation techniques used for general purpose algorithms
Approximation techniques used for general purpose algorithms
 
Computer Security: Worms
Computer Security: WormsComputer Security: Worms
Computer Security: Worms
 

Recently uploaded

一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
upoux
 
P5 Working Drawings.pdf floor plan, civil
P5 Working Drawings.pdf floor plan, civilP5 Working Drawings.pdf floor plan, civil
P5 Working Drawings.pdf floor plan, civil
AnasAhmadNoor
 
Mechatronics material . Mechanical engineering
Mechatronics material . Mechanical engineeringMechatronics material . Mechanical engineering
Mechatronics material . Mechanical engineering
sachin chaurasia
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
nedcocy
 
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
sydezfe
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
Atif Razi
 
Height and depth gauge linear metrology.pdf
Height and depth gauge linear metrology.pdfHeight and depth gauge linear metrology.pdf
Height and depth gauge linear metrology.pdf
q30122000
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
ydzowc
 
SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
harshapolam10
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
OOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming languageOOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming language
PreethaV16
 
5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf
AlvianRamadhani5
 
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICSUNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
vmspraneeth
 
Supermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdfSupermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdf
Kamal Acharya
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
UReason
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
Paris Salesforce Developer Group
 
Pressure Relief valve used in flow line to release the over pressure at our d...
Pressure Relief valve used in flow line to release the over pressure at our d...Pressure Relief valve used in flow line to release the over pressure at our d...
Pressure Relief valve used in flow line to release the over pressure at our d...
cannyengineerings
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
Divyanshu
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
VANDANAMOHANGOUDA
 

Recently uploaded (20)

一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
 
P5 Working Drawings.pdf floor plan, civil
P5 Working Drawings.pdf floor plan, civilP5 Working Drawings.pdf floor plan, civil
P5 Working Drawings.pdf floor plan, civil
 
Mechatronics material . Mechanical engineering
Mechatronics material . Mechanical engineeringMechatronics material . Mechanical engineering
Mechatronics material . Mechanical engineering
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
 
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
 
Height and depth gauge linear metrology.pdf
Height and depth gauge linear metrology.pdfHeight and depth gauge linear metrology.pdf
Height and depth gauge linear metrology.pdf
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
 
SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
OOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming languageOOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming language
 
5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf
 
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICSUNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
 
Supermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdfSupermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdf
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
 
Pressure Relief valve used in flow line to release the over pressure at our d...
Pressure Relief valve used in flow line to release the over pressure at our d...Pressure Relief valve used in flow line to release the over pressure at our d...
Pressure Relief valve used in flow line to release the over pressure at our d...
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
 

Understanding mobile service usage and user behavior pattern for mec resource management (assignment, scaling, and migration)

  • 1. Understanding mobile service usage and user behavior pattern for MEC Resource Management (assignment, scaling, and migration) Sabidur Rahman Friday group meeting Netlab, UC Davis Jan 26, 2018
  • 2. Overview • Application usage behavior/pattern of mobile service users: Survey of a study of collected data by Orange Lab • Mobile Edge Computing: definition and usecases • Central office re-architected as a datacenter • Who’s problem? • Problem statement
  • 3. Application usage pattern in Mobile Network • Universidad Carlos III Madrid and Orange Labs studies 3G/4G mobile network deployed over a major European country (France). • Almost all considered services exhibit quite different temporal usage • In contrast to such temporal behavior, spatial patterns are fairly uniform across all services • When looking at usage patterns at different locations, the average traffic volume per user is dependent on the urbanization level • This findings not only have sociological implications, but are also relevant to the orchestration of network resources C. Marquez, M. Gramaglia, M. Fiore, A. Banchs, C. Ziemlicki, Z. Smoreda. “Not All Apps Are Created Equal: Analysis of Spatiotemporal Heterogeneity in Nationwide Mobile Service Usage.” CoNEXT, 2017.
  • 4. C. Marquez, M. Gramaglia, M. Fiore, A. Banchs, C. Ziemlicki, Z. Smoreda. “Not All Apps Are Created Equal: Analysis of Spatiotemporal Heterogeneity in Nationwide Mobile Service Usage.” CoNEXT, 2017.
  • 5. Temporal Effect (which service/App at what time?) Activity peak detected in sample time series. C. Marquez, M. Gramaglia, M. Fiore, A. Banchs, C. Ziemlicki, Z. Smoreda. “Not All Apps Are Created Equal: Analysis of Spatiotemporal Heterogeneity in Nationwide Mobile Service Usage.” CoNEXT, 2017.
  • 6. Spatial Effect (which service/App where?) Paris-Lyon-Marseille Commute path Netflix usage is less evenly distributed (less rural users). Netflix usage correlates with availability of 4G network.
  • 7. User behavior -> Resource Management in Mobile Edge Computing • Prediction (of app usage, user location) based on repetitive behavior (past history) • Use the predicted number to deploy resources. • Can user data be labeled as big data (3V: volume, variety and velocity)? • How findings from big data help for Mobile Compute resource allocation?
  • 8. What is MEC? • Multi-access/Mobile Edge Computing (MEC), or simply edge computing, is the application of cloud architecture principles to compute, storage and networking infrastructure close to the user, at the edge of a network. • Edge computing is typically located at the access point, one hop away from the user. • Fog computing is a superset of edge computing, and essentially includes everything that is not a cloud. Radio Area Network (RAN) for LTE/5G Radio Network Controller (RNC) for WiFi Cable Modem Termination System (CMTS) for cable PON OLT for fiber Review of Industry report by SDxCentral: https://www.sdxcentral.com/reports/mec-edge-computing-download-2017/
  • 9. Edge Computing Usecases Review of Industry report by SDxCentral: https://www.sdxcentral.com/reports/mec-edge-computing-download-2017/
  • 10. Architecture of MEC system Y. Mao, C. You, J. Zhang, K. Huang, K. B. Letaief, “A survey on mobile edge computing: The communication perspective.” IEEE Communications Surveys & Tutorials. Aug 2017
  • 11. Central office re-architected as a data center (CORD) L. Peterson, A. Al-Shabibi, T. Anshutz, S. Baker, A. Bavier, S. Das, J. Hart, G. Palukar, and W. Snow. "Central office re-architected as a data center," IEEE Commun. Magazine, vol. 54, no. 10, pp. 96-101, Oct. 2016
  • 12. MEC Resource Management Problem • Placement/Allocation Problem: For an incoming/expected service load (from user) how to decide where to serve/place the request? • Scaling Problem: How to scale resources (CPU/MEM/Network) when load goes up/down? • Migration Problem: How to migrate contents/VMs when user location changes? • Constraints to consider: Limited hardware (CPU/Mem/Network) resources, Latency, User priority class. • Understanding of user behavior/usage- pattern helps. For example, if Netflix is used less during office hours and Twitter/Fb/Youtube used more. Does that help in Mobile resource allocation? W. Wang, Y. Zhao, M. Tornatore, A. Gupta, J. Zhang, and B. Mukherjee. “Virtual machine placement and workload assignment for mobile edge computing,” In Proc. 6th IEEE Cloud Networking (CloudNet), Sep. 2017.
  • 13. Who’s Problem? What is the motivation for MEC tenants (Twitter/Netflix)? • As a tenant of MEC, why would 3rd party application/service providers (for example, Twitter/Netflix) be interested to place application servers/contents closer to users? Why would they pay for MEC? • MEC is closer to user (low latency, local processing, better QoS). • Users are mobile. Mobile users (for example, commuters) can benefit from moving service points. What is the motivation for MEC owners (AT&T/Verizon/Akamai)? • Flexible pay-per-use revenue model for tenants/enterprise customers. • Lower latency, better QoS. • Off-loading traffic from the Core/Central Cloud Data Centers. • Mobile user/traffic management. • Dynamic resource management: how much resources to deploy: where? What time? For which tenant? • Use of collected data: this can be a practical usage of the collected usage data from all over the network. http://www.verizonenterprise.com/products/networking/sdn-nfv/virtual-network-services/
  • 14. Problem Statement 1) Derive the numbers from user behavior/historic usage pattern - Predict future usage - Measure recent changes - Infer resource requirements in near future 2) Use those numbers (output from step 1) to make necessary resource management decisions: assign, scale, and/or migrate resources for applications to improve QoS, improve User experience, and reduce cost.