Edge server placement problem in multi-access edge computing environment: models, techniques, and applications

Bahareh Bahrami, Mohammad Reza Khayyambashi, Seyedali Mirjalili

Research output: Contribution to journalReview articlepeer-review

1 Citation (Scopus)

Abstract

Multi-Access Edge Computing (MEC) is known as a promising communication paradigm that enables IoT and 5G scenarios by using edge servers located in the proximity of end users. As an integral part of MEC, edge servers provide virtualized resources and host different MEC applications. Therefore, user equipment and IoT devices can offload tasks to edge servers instead of remote cloud data centers. A proper edge server placement strategy can significantly improve the performance of mobile applications. The optimum number of edge servers and their placement is a problem called edge server placement. This optimization problem is NP-hard. In recent years, the research community has made great efforts to solve this problem. To achieve Quality of Service (QoS), various metrics are considered in different research papers. However, a comprehensive overview of the different aspects of the Edge Server Placement Problem (ESPP) is still missing. This paper first highlights the edge server's importance and gives its applications. Then, it provides a comprehensive summary and taxonomies based on the objectives, applications, datasets, frameworks, and strategies of the different research on the placement of edge servers. Also, this paper summarizes the ESPP and other optimization problems raised as joint optimization problems. Finally, considering the capabilities and features of the MEC environment, some open issues are presented.

Original languageEnglish
JournalCluster Computing
DOIs
Publication statusPublished - 2023

Keywords

  • Edge server placement
  • Mobile edge computing
  • Multi-access edge computing
  • Optimization

Fingerprint

Dive into the research topics of 'Edge server placement problem in multi-access edge computing environment: models, techniques, and applications'. Together they form a unique fingerprint.

Cite this