DAG Scheduling in Mobile Edge Computing

نویسندگان

چکیده

In Mobile Edge Computing, edge servers have limited storage and computing resources which can only support a small number of functions. Meanwhile, mobile applications are becoming more complex, consisting multiple dependent tasks, modeled as Directed Acyclic Graph (DAG). When request arrives, typically in an online manner with deadline specified, we need to configure the assign tasks for efficient processing. This work jointly considers problem task placement scheduling on-demand function configuration on servers, aiming meet many deadlines possible. For single request, when each server is fixed, derive FixDoc find optimal scheduling. allowed, propose GenDoc , novel approximation algorithm, analyze its additive error from theoretically. requests, OnDoc algorithm easy deploy practice. Our extensive experiments show that outperforms state-of-the-art baselines processing 86.14% these unique applications, reduces their average completion time by at least 24% . The satisfy 1.9 × baselines.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Advances in a Dag-Scheduling Theory for Internet-Based Computing

Earlier work has developed the underpinnings of a theory of scheduling computations having intertask dependencies—modeled via dags—for Internet-based computing. The goal of the schedules produced is to render tasks eligible for execution at the maximum possible rate. This goal aims: (a) to utilize remote clients’ computational resources well, by always having work to allocate to an available cl...

متن کامل

1 Mobile Edge Computing

The ongoing development of the fifth-generation (5G) wireless technologies takes place in a unique landscape of recent advancement in information processing, marked by the emerging prevalence of cloud-based computing and smart mobile devices. These two technologies complement each other by design, with cloud servers providing the engine for computing and smart mobile devices naturally serving a...

متن کامل

Preserving Location Privacy in Mobile Edge Computing

The burgeoning technology of Mobile Edge Computing is attracting the traditional LBS and LS to deploy due to its nature characters such as low latency and location awareness. Although this transplant will avoid the location privacy threat from the central cloud provider, there still exists the privacy concerns in the LS of MEC scenario. Location privacy threat arises during the procedure of the...

متن کامل

Optimization Task Scheduling Algorithm in Cloud Computing

Since software systems play an important role in applications more than ever, the security has become one of the most important indicators of softwares.Cloud computing refers to services that run in a distributed network and are accessible through common internet protocols. Presenting a proper scheduling method can lead to efficiency of resources by decreasing response time and costs. This rese...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM Transactions on Sensor Networks

سال: 2023

ISSN: ['1550-4859', '1550-4867']

DOI: https://doi.org/10.1145/3616374