Cloud and Fog Computing in 5G Mobile Networks: Emerging advances and applications

2: Department of Business Administration, Technological Educational Institute of Crete, Agios Nikolaos, Lakonia, Greece
3: Department of Computer Science, University of Nicosia, Nicosia, Engomi, Cyprus
Cloud computing is a key trend in computing and networking. Now diffused among endusers devices in mobile and wireline networks, the cloud is becoming the "fog". This book presents frameworks and schemes that use devices from end-users or near-users to carry out storage, communication, computation and control in the network. These novel approaches support the Internet of Things, the efficient provision of heterogeneous 5G mobile services, as well as emerging applications over future wireless network architectures. Elaborating on the emerging mobile networking paradigms for the 2020 5G timeframe, this book presents new connectivity services that are highly scalable and programmable in terms of speed, capacity, security, reliability, availability, latency and impact on battery life. Finally, the book discusses recent and new developments, prompting future directions on the theories, practices, standards and strategies related to 5G mobile systems. Topics covered include: network storage, Internet of Things (IoT); heterogeneous 5G mobile services; 5G green mobile networks; cloudlet-based architectures in mobile cloud computing environments; software-defined networking (SDN) and network functions virtualization (NFV); FOG-enabled navigation system; FIWARE and IoT technologies; real time video distribution; hybrid resource sharing; energy efficiency in cognitive radio networks; edge computing in future 5G mobile networks; and virtual network functions over cloud infrastructures.
Inspec keywords: 5G mobile communication; cloud computing; green computing; interference suppression; software defined networking; cognitive radio; Internet of Things
Other keywords: Internet of Things; fog computing; cognitive radio networks; 5G green mobile networks; self-interference cancellation technique; software-defined networking; mobile cloud computing
Subjects: General electrical engineering topics; Mobile radio systems; Environmental aspects of computing; Computer networks and techniques; Electromagnetic compatibility and interference; Information networks; Computer communications; General and management topics; Internet software
- Book DOI: 10.1049/PBTE070E
- Chapter DOI: 10.1049/PBTE070E
- ISBN: 9781785610837
- e-ISBN: 9781785610844
- Page count: 438
- Format: PDF
-
Front Matter
- + Show details - Hide details
-
p.
(1)
-
1 NOMA schemes for 5G green mobile networks
- + Show details - Hide details
-
p.
1
–22
(22)
The nonorthogonal multiple access (NOMA) is one of the fledging paradigms that the next generation radio access technologies sprouting toward. The NOMA with superposition coding (SC) in the transmitter and successive interference cancelation (SIC) at the receiver comes with many desirable features and benefits over orthogonal multiple access such as orthogonal frequency division multiple access adopted by long-term evolution. Various studies reveal that the NOMA is a noble spectrum-efficient technique, which can also be designed in the light of energy efficiency. In this chapter, we study the recent progresses of NOMA in fifth-generation (5G) systems. We discuss the basic concepts of NOMA and explain its aspects of importance for future radio access. Then, we provide a survey of the state of the art in NOMA solutions for 5G systems with numerical performances and provide some avenues for future research on NOMA on a set of open issues and challenges.
-
2 Fog computing in 5G networks: an application perspective
- + Show details - Hide details
-
p.
23
–56
(34)
Fifth generation (5G) cellular network promises to offer to its users sub-millisecond latency and 1 Gbit/s transmission speed. However, the current cloud-based computation and data delivery model do not allow these quality of service guarantees to be efficiently harnessed, due to the number of hops of wired networks between the 5G-base stations and the cloud, that leads to a significant increase in latency. Forwarding all the data generated by devices directly to the cloud may devour the bandwidth and lead to congestion. Therefore, it is necessary that processing be hosted near the devices, close to the source of the data, so that the high speed transmission of 5G can be utilized and data can be processed and filtered out by the time it reaches the cloud. This bringing down of computation, storage, and networking services to the network edge opens up many new research areas of applying fog computing over cellular network architecture. This chapter discusses the advantages of extending the cloud services to the edge by presenting use-cases that can be realized by fog computing over 5G networks.
-
3 The in-band full duplexing wireless exploiting self-interference cancellation techniques: algorithms, methods and emerging applications
- + Show details - Hide details
-
p.
57
–94
(38)
The most significant recent evolution in the wireless communication theory (WCT) is Full Duplexing of channel; that is, communicating a transmission simultaneously with reception. This has full impact on the communication system and the overall constituents of the WCT. This chapter aims at highlighting the developments in the in-band full duplexing (IBFD) access technique and its impact on the whole system linking the information source to termination channel. In this chapter, all techniques, algorithms and emerging applications are related to the reader to provide an updated starting point for the fresher and a comprehensive review of the current state of the art, for the experienced professional. The flow of the chapter started by relating the origins of the concept through to different evolved forms and finalizing with the emerging applications. The technique variants are presented in a categorized approach, providing the foundations of the concepts, how these progressed and how the older techniques have been incorporated into the newer context. The categorization was system based - that is relating the system block where the associated technique is exploited and network based, that is relating how these fit into different communication networks' topologies and applications. The categorization was well-related integrability and hybridization of the techniques, as well as presenting the reader with useful reviews and referencing to further readings. The impact of the IBFD is significant, and the pace of associated developments is extremely huge and fast; this art here presents a useful guide which is only relating the current state of art in the immediate temporal zone. IBFD field impacts every detail of the wireless communication system, so it is fair to anticipate the forthcoming decade to lay emphasis on the technique and its exploitations. Pertaining to the current temporal frame, this chapter covered mostly every foundation point in the concept.
-
4 Latency delay evaluation for cloudlet-based architectures in mobile cloud computing environments
- + Show details - Hide details
-
p.
95
–123
(29)
The vision of ubiquitous computing in interactive mobile cloud applications and Internet of Things (IoT) based systems is still difficult to achieve. The difficulty lies in the use of cloud services in mobile devices, which impacts the issues of performance, scalability, availability, and lack of resources in mobile computing environments. Despite the astonishing advancement achieved in IoT technology, there is still much to do. Some IoT-based systems, which rely on a variety of mobile devices, need to work even when the connection is temporarily unavailable or under-degraded. Besides, mobile cloud service providers can reduce network latency by moving some of their services close to the user. To cope with this challenge, we propose in this chapter the usage of small clouds known as cloudlets, and we describe two cloudletbased architectures, which allow leveraging the geographical proximity of cloud services to mobile users. We model the network latency of the different components of the two architectures using a continuous-time Markov chain (CTMC). These components are essentially the user nodes, the cloudlets, and the principal cloud. For each architecture, we simulate queries submitted by mobile users to a search engine, and we estimate the incurred delay by using the CTMC state models.
-
5 Survey on software-defined networking and network functions virtualisation in 5G emerging mobile computing
- + Show details - Hide details
-
p.
125
–170
(46)
This chapter contains a summary of 5G requirements and challenges, with emphasis on those supposed to be (partially) solved through SDN/ NFV control. Some relevant 5G use cases and services are summarised. A short presentation of SDN and NFV concepts and architectures is done related to layering, CPl and DPl issues, network operation systems (NOS) and software technologies, virtualisation, north-bound and south-bound interfaces, function chaining, scalability and real-time issues and so on. The second part of the chapter explores various architectures and implementations based on SDN/NFV in a 5G environment: distribution versus centralisation, unified CPl concepts in 5G/SDN, heterogeneous CRANs, cellular 5G with SDN control, an SDN approach for mobile cloud computing in 5G, backward compatibility and deployment issues.
-
6 Towards a FOG-enabled navigation system with advanced cross-layer management features and IoT equipment
- + Show details - Hide details
-
p.
171
–191
(21)
In this chapter, we present a cross-layer fog-enabled framework that offers visitors of small venues; such as museums, malls, convention centres, hospitals, and so on; enhanced context-aware experience and navigation services over 5G small-cell infrastructure. Distributed fog-enabled devices provide 5G networking throughout the surrounding establishment. The visitor, after signing into the network, is able to view various information and multimedia content concerning the narrow points of interest (POIs). The infrastructure also provides the ability to navigate the visitor throughout the establishment, using well-known positioning techniques. The positioning takes place with the mobile device receiving and juxtaposing the signal strength of small RF beacons sculling the local area. Finally, the network proposes other nearby POIs, depending on the user's preferences, based on the meta-data information stored inside the user's mobile device. The framework logic and calculations are transferred and sent back to the user through the cloud.
-
7 Internet of Things: a systematic literature review
- + Show details - Hide details
-
p.
193
–210
(18)
The “Internet of Things”(IoT) is becoming an increasingly growing topic of conversation worldwide that it promises to offer a revolutionary fully connected “smart”world. IoT represents a vision, in which the Internet extends into the real world involving everyday objects equipped with sensors, processing, and communications capabilities that will allow them to interconnect to each other over the Internet to accomplish some objective. This chapter reports on the current status of research on the IoT by examining the literature, identifying trends, exploring issues, challenges, and opportunities associated with IoT.
-
8 Internet of Everything: a survey on technologies, challenges, and applications
- + Show details - Hide details
-
p.
211
–238
(28)
Internet of Everything (IoE) is an interconnection of individuals, data, method, and devices. It identifies the convergence of numerous environments such as cloud computing, mobility, data processing, and to end with, an explosion in interconnected things. The IoE integrates the various methodologies and techniques, tries to construct a process mechanism, and includes individuals in this method in order to develop additional smart systems. IoE primarily used to collect and examine information from various sources such as instruments, senor devices, payment processing equipment, mobile devices, data stores, and it is also used to find predictions in future. The IoE is creating new challenges and opportunities that will be analyzed during the subsequent years. Large amounts of data will be produced and consumed, so Internet of Things frameworks will need to identify new methodologies and techniques associated to big data analysis, performance, and scalability. We consider that the configuration of local clouds of devices, close to the location where data is produced and consumed, is a good solution to solve these issues that may involve in security as well. This paper studies the definitions, architecture, fundamental technologies, and applications of IoE. In addition, this paper also discusses the emerging techniques such as device-to-device communication, machine-to-machine, and 5G mobile network for the implementation of IoE. Finally, the major applications, open issues, and challenges related to the IoE are investigated.
-
9 Combining FIWARE and IoT technologies for smart, small-scale farming: the case of QUHOMA platform architecture
- + Show details - Hide details
-
p.
239
–270
(32)
This work aims to integrate the technical designs of Future Internet (FI) Architecture of the European Community (FIWARE) with state-of-the-art Internet of Things (IoT) technologies and the platform's business requirements and specifications for realizing efficient, small-scale qualitative, farming. An innovative business model is introduced through a set of offered services that are based on networking `things' and passing contextual data (information) to business entities to further process, distribute and monetise the derived knowledge to their organisations (farmers, agronomists/mentors, Quality Certification Bodies). All these follow, technologically, the IoT concept. A FIWARE-enabled platform exploits Future Intelligence's end-to-end standardised modern wireless sensor network (Future Intelligence's Internet of Things (FINoT)) that performs tedious tasks and makes field-data available anytime and `everywhere'. Everywhere currently means within the under-development community or for public use only under farmers' (on a per demand case) permissions. The platform enables access to the sensor data and facilitates process automation, resource management and data handling. The main target of the solution is to establish an ecosystem of technology services that lead to very specific business opportunities: a data consolidation mechanism acquiring data from different sensor controllers bought from various vendors. In that sense, the platform aims to continue the integration of FI-enabled software tools with emergent technologies, architectures and business concepts. Creativity and quality of usage of the Generic Enablers and FIWARE's Technology chapters is profound: the proposed solution takes advantage of the already built-in application programming interfaces and tools provided by the FIWARE platform, like the IoT/context chapter smoothly integrated with FINoT platform and co-developing outstanding B2B Marketplace opportunities (Business Framework) consumed through an ideal User Experience Web Environment. Overall, the agriculture marketplace and community's (QUalitative HOrticulture Marketplace) vision is to promote and reward quality and sustainable farming in fruit and vegetables' production by bringing together Internet of People with the IoT; a bridge realised by a proper business model.
-
10 Stable real-time video distribution by exploiting cloud and peer-to-peer interaction
- + Show details - Hide details
-
p.
271
–302
(32)
Real-time video distribution over internet has already become enormously popular. Real-time video distribution is a continuous evolving and growing application because users of it increase their presence and because of the extraordinary growth of network technologies. In the future, similar application will have as its requirement to distribute video content with high playback rate with a way that will be able to cope up with dynamic and heterogeneous network environments. The rapid, reliable, and efficient transmission of the video content consist of the core of the problem. This chapter presents a P2P live video streaming system that is scalable and stable. The proposed system is able to guarantee the complete and on time video distribution to every participating peer based on the three aforementioned strategies. The contribution of this chapter is summarized to the development of these strategies with respect to the aforementioned P2P LS requirements. The rest of this chapter is structured as follows. Section 10.2 analyzes our system's architecture. Section 10.3 presents the playback rate adaptation strategy. Section 10.4 analyzes the provision of quality of service (QoS) through cloud assistance, whereas Section 10.5 analyzes the provision of QoS through other peer's assistance. Finally, in Section 10.6 we conclude and we give some hints on our future work.
-
11 Hybrid resource sharing for QoS preservation in virtual wireless networks
- + Show details - Hide details
-
p.
303
–324
(22)
An enabling technology for the fifth generation (5G) ofwireless communications is the virtualisation of network resources. 5G networks are expected to consist of dense deployments and efficient resource allocation is a top priority. At present, there is a growing number of research projects, investigating network virtualisation at different levels. The virtualisation of core network functionalities is the topic of the T-NOVA project where a virtualised cloud infrastructure is responsible to provide them, thus achieving elasticity and flexibility in network deployment. Moreover, various tools such as OpenFlow have been developed allowing the dynamic and scalable adaptation of the core network regarding the routing of data. Also, open-source solutions such as OpenStack have been adopted for the management of public and private clouds as well as the well-timed creation and effective maintenance of virtual machines.
-
12 Energy efficiency gains through opportunistic cooperative schemes in cognitive radio networks
- + Show details - Hide details
-
p.
325
–348
(24)
This chapter investigates how cognitive radio (CR) and cooperation would be an ideal combination, as cooperative systems can efficiently exploit the connectivity offered by spectrum cognition to ensure better spectrum usage. Approaches based on collaboration between cognitive and noncognitive nodes are actively pursued today to support the explosive growth of bandwidth-consuming services and drive the development of license-exempt applications. However, basic cooperative protocols often make use of relay resources in a deterministic fashion regardless of network randomness. As such, opportunistic cooperation through opportunistically scheduling the relay transmission is vital for reaping the performance benefit of cooperative communication. Little research efforts have developed practical proposals to demonstrate the system capabilities of hybrid architectures where the decision of cooperation is made depending on whether cooperation is beneficial or not. In this chapter, we introduce a novel cooperation selection scheme for dynamic spectrum access networks.
-
13 The role of edge computing in future 5G mobile networks: concept and challenges
- + Show details - Hide details
-
p.
349
–370
(22)
Future 5G technologies are expected to overcome the challenges of next generation networks aiming to tackle the novel and manifold business requirements associated to different vertical sectors. Extraordinarily high speed and capacity, multi-tenancy, heterogeneous technologies convergence, on-demand service-oriented resource allocation or even coordinated, automated management of resources are only few examples of the complex demands 5G aims to undertake. The shift from centralized cloud computing-based services towards data processing at the edge is becoming one of the fundamental components envisaged to enable those future 5G technologies. Edge computing is focused on pushing processing to the network edge where all the actual interactions in the access networks takes place and the critical low-latency processing occurs. Combination of network functions virtualization (NFV) and edge-computing technologies and mechanisms provides a wide range of novel opportunities for value-added service provisioning covering different features required in future access networks, such as Quality of Service (QoS), security, multi-tenancy, and low latency. This chapter provides an overview of edge-computing technologies, from supporting heterogeneous infrastructure up to service provisioning methodologies related to the application-specific requirements. It describes the role of edge computing and NFV in future 5G mobile networks. It also provides an insight into how edge computing can potentially facilitate and expedite provisioning of security in 5G networks. The manuscript analyses the role of the networking resources in edge-computing-based provisioning, where the demands of 5G mobile networks are to be met with wireless-networking technologies, which in essence are different to wired technologies present in core data centers. Initial results obtained from the evaluations of wireless fog networking backhauls are presented, and the challenges ahead of the actual implementation of those technologies are also analyzed in the chapter.
-
14 A novel marketplace for trading/brokering virtual network functions over cloud infrastructures
- + Show details - Hide details
-
p.
371
–412
(42)
Following up the success story of the OS-Specific App Stores, we present a new business case in network function virtualization (NFV), where function provider (FP) can publish, broke, trade, offer, and advertise their developed functions inside a novel Marketplace for NFV. This novel approach is able to attract new entrants to the networking market, including among other, a Novel Brokerage Platform, allowing Service Providers to transact with the FP. Finally, via the Marketplace, customers can browse and select services and virtual appliances that best match their needs, as well as negotiate Service Level Agreements and be charged under various billing models browse and select the services and virtual appliances that best match their needs.
-
Back Matter
- + Show details - Hide details
-
p.
(1)
Related content
