Service Migrations in Multi-Access Edge Computing Using Adaptive Migration Window DOI
Saravanan Velrajan, V. Ceronmani Sharmila

Published: Sept. 14, 2023

5G networks support a Multi-access Edge Computing (MEC) infrastructure to host many heterogeneous applications at the network's edge. MEC helps achieve high-bandwidth and low-latency targets demanded by modern applications. Applications hosted in have Service Level Agreements (SLAs) that guarantee service quality users. migrations are done prevent SLA violations caused application performance or overload conditions. While several existing research on study impact of user mobility, there is paucity studies performed during This paper proposes novel Adaptive Migration Window (ASMWA) algorithm initiate using application's resource utilisation, QoS migration duration. We compared ASMWA with state-of-the-art Exponential Weighted Moving Average (EWMA3) static threshold algorithms. Our simulations show performs better when EWMA3 algorithms minimising degradation MEC.

Language: Английский

On-Chain and Off-Chain Data Management for Blockchain-Internet of Things: A Multi-Agent Deep Reinforcement Learning Approach DOI
Yung Po Tsang, C.K.M. Lee, Kening Zhang

et al.

Journal of Grid Computing, Journal Year: 2024, Volume and Issue: 22(1)

Published: Jan. 20, 2024

Language: Английский

Citations

10

Energy-efficient virtual machine placement algorithm based on power usage DOI
Shilpa Sunil, Sanjeev Patel

Computing, Journal Year: 2023, Volume and Issue: 105(7), P. 1597 - 1621

Published: Feb. 13, 2023

Language: Английский

Citations

14

Efficient cloud data center: An adaptive framework for dynamic Virtual Machine Consolidation DOI

Seyyed Meysam Rozehkhani,

Farnaz Mahan, Witold Pedrycz

et al.

Journal of Network and Computer Applications, Journal Year: 2024, Volume and Issue: 226, P. 103885 - 103885

Published: April 20, 2024

Language: Английский

Citations

6

Resource optimization using predictive virtual machine consolidation approach in cloud environment DOI
Vaneet Garg, Balkrishan Jindal

Intelligent Decision Technologies, Journal Year: 2023, Volume and Issue: 17(2), P. 471 - 484

Published: Jan. 17, 2023

The Proliferation of on-demand usage-based IT services, as well the diverse range cloud users, have led to establishment energy-hungry hefty data centers. Therefore, service providers are striving reduce energy consumption for cost-saving and environmental sustainability issues In this direction, Virtual Machine (VM) consolidated is a widely used approach optimize hardware resources at cost performance degradation due unnecessary migrations. Hence, motivation proposed minimize while maintaining This leads reduction in overall an increase reliability providers. To achieve goal Predictive Consolidation (PVMC) algorithm using exponential smoothing moving average (ESMA) method. algorithm, ratio deviation utilization calculated VM selection placement. migrating high CPU VMs or we can restrict steady resource-consuming from migration. outcomes validated on computer-based simulation under dynamic workload variable number (1–290). experimental results show improvement mean threshing index (40%, 45%) instruction (15%, 17%) over existing policies. could be real-world centers reducing low level agreement violations.

Language: Английский

Citations

12

Virtual Machine Migration Techniques for Optimizing Energy Consumption in Cloud Data Centers DOI Creative Commons

Zhoujun Ma,

Di Ma, Mengjie Lv

et al.

IEEE Access, Journal Year: 2023, Volume and Issue: 11, P. 86739 - 86753

Published: Jan. 1, 2023

The energy used by cloud data centers (CDCs) to support large volumes of storage and computation is dramatically increasing as the scope services continues expand. This puts a greater burden on environment results in higher expenses for providers. Virtualization migration consolidation have been widely current CDCs achieve ser-vice reduce consumption (EC). study divides fundamental tasks virtual machine (VM) into three portions: determining timing, choosing VMs migrate out, selecting destination hosts. An EC levels-based adaptive dynamic threshold method timing was proposed, well correlation utilization-based strategy out an improved EC-aware best-fit algorithm pro-posed algorithms were evaluated using CloudSim toolbox, real VM workload traces from PlanetLab experimental data. According experiments, proposed EC, service level agreement violation (SLAV), number migrations average 15.49%, 7.85%, 83.32% comparison related state-of-the-art methods benchmark algorithms. suggests that outperform other techniques migration, even when necessitates significant or amount host resources, improve quality while optimizing consumption. However, experiments conducted simulation platform, which has some drawbacks, leading varying slightly actual environment.

Language: Английский

Citations

11

DBSCAN based approach for energy efficient VM placement using medium level CPU utilization DOI

Akanksha Tandon,

Sanjeev Patel

Sustainable Computing Informatics and Systems, Journal Year: 2024, Volume and Issue: 43, P. 101025 - 101025

Published: Aug. 2, 2024

Language: Английский

Citations

3

EMaC: Dynamic VM Consolidation Framework for Energy-Efficiency and Multi-metric SLA Compliance in Cloud Data Centers DOI
Vikas Mongia

SN Computer Science, Journal Year: 2024, Volume and Issue: 5(5)

Published: June 13, 2024

Language: Английский

Citations

2

VM consolidation steps in cloud computing: A perspective review DOI

Seyyed Meysam Rozehkhani,

Farnaz Mahan, Witold Pedrycz

et al.

Simulation Modelling Practice and Theory, Journal Year: 2024, Volume and Issue: 138, P. 103034 - 103034

Published: Nov. 9, 2024

Language: Английский

Citations

2

QoS-Aware Service Migration in Multi-access Edge Compute Using Closed-Loop Adaptive Particle Swarm Optimization Algorithm DOI
Saravanan Velrajan, V. Ceronmani Sharmila

Journal of Network and Systems Management, Journal Year: 2022, Volume and Issue: 31(1)

Published: Dec. 14, 2022

Language: Английский

Citations

9

Beyond Limits: How to Disable Validators in Secure Networks DOI
Tomáš Hlaváček, Philipp Jeitner, Donika Mirdita

et al.

Published: Sept. 1, 2023

Relying party validator is a critical component of RPKI: it fetches and validates signed authorizations mapping prefixes to their owners. Routers use this information block bogus BGP routes.

Language: Английский

Citations

5