Please use this identifier to cite or link to this item: http://repository.futminna.edu.ng:8080/jspui/handle/123456789/16356
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMohammed, Abubakar Saddiq-
dc.contributor.authorOlukayode, Isiaka M.-
dc.contributor.authorZubair, Suleiman-
dc.date.accessioned2022-12-31T06:56:19Z-
dc.date.available2022-12-31T06:56:19Z-
dc.date.issued2022-04-23-
dc.identifier.citationAbubakar Saddiq Mohammeden_US
dc.identifier.isbn978-981-19-7040-5-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/16356-
dc.description.abstractPortable mobile devices capabilities are bedevilled by shortfall in computational memory, storage, networking and energy carrying capacity. These issues of resource poverty have been challenges the telecommunication industry had to cope with in portable mobile devices. Earlier research efforts like Cloudlets, Cyber Foraging, Mobile Cloud Computing (MCC), and recently, Multi-access Edge Computing (MEC) have been proffered. Container workflow orchestration provides automation capabilities for MEC to deliver just in time applications and services. This enables service providers to give ubiquitous access to specified applications or services since applications infrastructures are pushed to repositories and can be deployed by downloading from a repository. Containers are more easily orchestrated unlike virtual machines (VM) or bare metal, this provides the required DevOps ecosystem for developers and engineers to work across the entire application lifecycle. This streamlines the process of automating application setup by establishing standard procedures for rapid deployments while also reducing human error associated with manual setups. In this paper, secured containerization techniques were employed in order to achieve end-to-end low latency figures for MEC infrastructure isolation as required by the European Technology Standard Institute (ETSI) for MEC application security. An evaluation was done by comparing secured containerized app deployment in the cloud and edge scenarios. The result obtained validated that edge computing has lower User Plane (UP) latency figures, less backhaul traffic and a lower application failure rate.en_US
dc.language.isoenen_US
dc.publisherSpringer Production Houseen_US
dc.relation.ispartofseriesICAIAA_Paper ID_ 9856;Paper ID_ 9856-
dc.subjectKata Containeren_US
dc.subjectMulti-access Edge Computingen_US
dc.subjectUser Plane Latencyen_US
dc.titlePerformance Evaluation of Secured Containerization for Edge Computing in 5G Communication Networken_US
dc.title.alternativeInternational Conference on Artificial Intelligence: Advances and Applications (ICAIAA -2022)en_US
dc.typeArticleen_US
Appears in Collections:Telecommunication Engineering



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.