scispace - formally typeset
Search or ask a question
Author

Vincent Latzko

Bio: Vincent Latzko is an academic researcher from Dresden University of Technology. The author has contributed to research in topics: Edge computing & Node (networking). The author has an hindex of 2, co-authored 8 publications receiving 79 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: This article comprehensively surveys the topic area of device-enhanced MEC mechanisms, i.e., mechanisms that jointly utilize the resources of the community of end devices and the installed MEC to provide services to end devices.
Abstract: Multi-access edge computing (MEC) has recently been proposed to aid mobile end devices in providing compute- and data-intensive services with low latency. Growing service demands by the end devices may overwhelm MEC installations, while cost constraints limit the increases of the installed MEC computing and data storage capacities. At the same time, the ever increasing computation capabilities and storage capacities of mobile end devices are valuable resources that can be utilized to enhance the MEC. This article comprehensively surveys the topic area of device-enhanced MEC, i.e., mechanisms that jointly utilize the resources of the community of end devices and the installed MEC to provide services to end devices. We classify the device-enhanced MEC mechanisms into mechanisms for computation offloading and mechanisms for caching. We further subclassify the offloading and caching mechanisms according to the targeted performance goals, which include throughput maximization, latency minimization, energy conservation, utility maximization, and enhanced security. We identify the main limitations of the existing device-enhanced MEC mechanisms and outline future research directions.

151 citations

Journal ArticleDOI
29 Sep 2020
TL;DR: This study designs representative Deep Reinforcement Learning agents that learn the control of multiple traffic lights without and with current traffic state information, and finds that the holistic system substantially increases average vehicle velocities and flow rates, while reducing CO2 emissions, average wait and trip times, as well as a driver stress metric.
Abstract: Traffic light control falls into two main categories: Agnostic systems that do not exploit knowledge of the current traffic state, e.g., the positions and velocities of vehicles approaching intersections, and holistic systems that exploit knowledge of the current traffic state. Emerging fifth generation (5G) wireless networks enable Vehicle-to-Infrastructure (V2I) communication to reliably and quickly collect the current traffic state. However, to the best of our knowledge, the optimized traffic light management without and with current traffic state information has not been compared in detail. This study fills this gap in the literature by designing representative Deep Reinforcement Learning (DRL) agents that learn the control of multiple traffic lights without and with current traffic state information. Our agnostic agent considers mainly the current phase of all traffic lights and the expired times since the last change. In addition, our holistic agent considers the positions and velocities of the vehicles approaching the intersections. We compare the agnostic and holistic agents for simulated traffic scenarios, including a road network from Barcelona, Spain. We find that the holistic system substantially increases average vehicle velocities and flow rates, while reducing CO2 emissions, average wait and trip times, as well as a driver stress metric.

12 citations

Journal ArticleDOI
TL;DR: The numerical evaluations indicate that the EETO approach consistently reduces the battery energy consumption across a wide range of task complexities and task completion deadlines and can thus extend the battery lifetimes of mobile devices operating with sliced edge computing resources.
Abstract: Cooperative edge offloading to nearby end devices via Device-to-Device (D2D) links in edge networks with sliced computing resources has mainly been studied for end devices (helper nodes) that are stationary (or follow predetermined mobility paths) and for independent computation tasks. However, end devices are often mobile, and a given application request commonly requires a set of dependent computation tasks. We formulate a novel model for the cooperative edge offloading of dependent computation tasks to mobile helper nodes. We model the task dependencies with a general task dependency graph. Our model employs the state-of-the-art deep-learning-based PECNet mobility model and offloads a task only when the sojourn time in the coverage area of a helper node or Multi-access Edge Computing (MEC) server is sufficiently long. We formulate the minimization problem for the consumed battery energy for task execution, task data transmission, and waiting for offloaded task results on end devices. We convert the resulting non-convex mixed integer nonlinear programming problem into an equivalent quadratically constrained quadratic programming (QCQP) problem, which we solve via a novel Energy-Efficient Task Offloading (EETO) algorithm. The numerical evaluations indicate that the EETO approach consistently reduces the battery energy consumption across a wide range of task complexities and task completion deadlines and can thus extend the battery lifetimes of mobile devices operating with sliced edge computing resources.

11 citations

Proceedings ArticleDOI
01 Dec 2020
TL;DR: In this paper, a basic three-node MEC system consisting of a user node with sequentially-dependent tasks, a helper/relay node, and a MEC server located at the base station is considered.
Abstract: Computation offloading is one of the main use-cases of the Multi-access Edge Computing (MEC) paradigm which can help to save the battery life of the resource-poor mobile devices by transferring the computation-intensive tasks to the resource-rich edge cloud servers. However, the ever-increasing internet traffic can negate this benefit due to possible failures of the MEC servers. On the other hand, the growth of computation capabilities of end devices as the result of recent developments of Central Processing Units (CPUs), can help to enhance the MEC systems performance and broaden the concept of edge computing by using device to device communication (D2D). The majority of existing works on computation offloading assume the tasks are independent and can be executed in parallel; however, the dependency among tasks can introduce new problems. To investigate this issue, in this paper, we consider a basic three-node MEC system consists of a user node with sequentially-dependent tasks, a helper/relay node, and a MEC server located at the base station (BS). We formulate the offloading problem into an energy-efficiency minimization problem while satisfying the task-dependency and completion deadline requirements. The simulation results show the superior performance of our proposed method compared to the other approaches.

10 citations

Book ChapterDOI
01 Jan 2021
TL;DR: This book chapter describes the research targets of Tactile Internet with Human-in-the-Loop (TaHiL) in the field of Communications and Control and the fundamental research topics for communications and control are presented.
Abstract: This book chapter describes the research targets of Tactile Internet with Human-in-the-Loop (TaHiL) in the field of Communications and Control. Communications describes the research field of transport, storage, and computing of information and is tailored to the application of control use cases for quasi-real-time, low-latency Cyber-Physical System (CPS) as well as the multimodal feedback for human–machine interaction. The research is adapted to the needs of other research fields and derives its technical parameters from them as it relates to latency, resilience, massiveness, heterogeneity, energy, and security. The fundamental research topics for communications and control are presented. Furthermore, the core technologies, such as compressed sensing, network coding, functional compression, and machine learning, are introduced and put into context.

4 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: This article analyzes the main features of MEC in the context of 5G and IoT and presents several fundamental key technologies which enable MEC to be applied in 5Gs and IoT, such as cloud computing, software-defined networking/network function virtualization, information-centric networks, virtual machine (VM) and containers, smart devices, network slicing, and computation offloading.
Abstract: To satisfy the increasing demand of mobile data traffic and meet the stringent requirements of the emerging Internet-of-Things (IoT) applications such as smart city, healthcare, and augmented/virtual reality (AR/VR), the fifth-generation (5G) enabling technologies are proposed and utilized in networks As an emerging key technology of 5G and a key enabler of IoT, multiaccess edge computing (MEC), which integrates telecommunication and IT services, offers cloud computing capabilities at the edge of the radio access network (RAN) By providing computational and storage resources at the edge, MEC can reduce latency for end users Hence, this article investigates MEC for 5G and IoT comprehensively It analyzes the main features of MEC in the context of 5G and IoT and presents several fundamental key technologies which enable MEC to be applied in 5G and IoT, such as cloud computing, software-defined networking/network function virtualization, information-centric networks, virtual machine (VM) and containers, smart devices, network slicing, and computation offloading In addition, this article provides an overview of the role of MEC in 5G and IoT, bringing light into the different MEC-enabled 5G and IoT applications as well as the promising future directions of integrating MEC with 5G and IoT Moreover, this article further elaborates research challenges and open issues of MEC for 5G and IoT Last but not least, we propose a use case that utilizes MEC to achieve edge intelligence in IoT scenarios

303 citations

01 Jan 2016
TL;DR: The global positioning system theory and practice is universally compatible with any devices to read and is available in the digital library an online access to it is set as public so you can get it instantly.
Abstract: Thank you very much for reading global positioning system theory and practice. As you may know, people have search numerous times for their favorite novels like this global positioning system theory and practice, but end up in infectious downloads. Rather than reading a good book with a cup of coffee in the afternoon, instead they juggled with some infectious virus inside their laptop. global positioning system theory and practice is available in our digital library an online access to it is set as public so you can get it instantly. Our books collection spans in multiple countries, allowing you to get the most less latency time to download any of our books like this one. Kindly say, the global positioning system theory and practice is universally compatible with any devices to read.

206 citations

Journal ArticleDOI
TL;DR: This work presents some important edge computing architectures and classify the previous works on computation offloading into different categories, and discusses some basic models such as channel model, computation and communication model, and energy harvesting model that have been proposed in offloading modeling.

159 citations

Journal Article
TL;DR: In this paper, the authors explore the limits of predictability in human dynamics by studying the mobility patterns of anonymized mobile phone users and find that 93% potential predictability for user mobility across the whole user base.
Abstract: A range of applications, from predicting the spread of human and electronic viruses to city planning and resource management in mobile communications, depend on our ability to foresee the whereabouts and mobility of individuals, raising a fundamental question: To what degree is human behavior predictable? Here we explore the limits of predictability in human dynamics by studying the mobility patterns of anonymized mobile phone users. By measuring the entropy of each individual's trajectory, we find a 93% potential predictability in user mobility across the whole user base. Despite the significant differences in the travel patterns, we find a remarkable lack of variability in predictability, which is largely independent of the distance users cover on a regular basis.

118 citations

Journal ArticleDOI
TL;DR: A comprehensive taxonomy of machine learning techniques for in-network caching in edge networks is formulated and a comparative analysis of the state-of-the-art literature is presented with respect to the parameters identified in the taxonomy.

71 citations