Please use this identifier to cite or link to this item: http://repository.futminna.edu.ng:8080/jspui/handle/123456789/18455
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMOHAMMED, MOSUDI, Isiaka Olukayode Abubakar Saddiq Abubakar Saddiq-
dc.contributor.authorS. Zubair-
dc.date.accessioned2023-04-27T14:19:17Z-
dc.date.available2023-04-27T14:19:17Z-
dc.date.issued2022-04-23-
dc.identifier.issnhttps://doi.org/10.1007/978-981-19-7041-2-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/18455-
dc.description.abstractPortable mobile devices capabilities are bedeviled by shortfall in com-putational memory, storage, networking and energy carrying capacity. These is-sues of resource poverty have been challenges the telecommunication industry had to cope with in portable mobile devices. Earlier research efforts like Cloud-lets, Cyber Foraging, Mobile Cloud Computing (MCC), and recently, Multi-ac-cess Edge Computing (MEC) have been proffered. Container workflow orches-tration provides automation capabilities for MEC to deliver just in time applica-tions and services. This enables service providers to give ubiquitous access to specified applications or services since applications infrastructures are pushed to repositories and can be deployed by downloading from a repository. Containers are more easily orchestrated unlike virtual machines (VM) or bare metal, this provides the required DevOps ecosystem for developers and engineers to work across the entire application lifecycle. This streamlines the process of automating application setup by establishing standard procedures for rapid deployments while also reducing human error associated with manual setups. In this paper, secured containerization techniques were employed in order to achieve end-to-end low latency figures for MEC infrastructure isolation as required by the Eu-ropean Technology Standard Institute (ETSI) for MEC application security. An evaluation was done by comparing secured containerized app deployment in the cloud and edge scenarios. The result obtained validated that edge computing has lower User Plane (UP) latency figures, less backhaul traffic and a lower applica-tion failure rate.en_US
dc.language.isoenen_US
dc.publisherSpringeren_US
dc.subjectKata Containeren_US
dc.subjectMulti-access Edge Computingen_US
dc.subjectUser Plane La-tencyen_US
dc.titlePerformance Evaluation of Secured Containerization for Edge Computing in 5G Communication Networken_US
dc.typeArticleen_US
Appears in Collections:Telecommunication Engineering

Files in This Item:
File Description SizeFormat 
UPDATED PAPER. ICAIAA_2022_Paper ID_ 9856(2).pdfKatacontainer832.85 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.