Vol-3194/paper13

From BITPlan ceur-ws Wiki
Revision as of 17:59, 30 March 2023 by Wf (talk | contribs) (edited by wikiedit)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Paper

Paper
edit
description  
id  Vol-3194/paper13
wikidataid  Q117345005→Q117345005
title  Energy and QoE aware Placement of Applications and Data at the Edge
pdfUrl  https://ceur-ws.org/Vol-3194/paper13.pdf
dblpUrl  https://dblp.org/rec/conf/sebd/MordacchiniFCKC22
volume  Vol-3194→Vol-3194
session  →

Energy and QoE aware Placement of Applications and Data at the Edge

load PDF

Energy and QoE aware Placement of Applications and
Data at the Edge
Matteo Mordacchini1 , Luca Ferrucci2 , Emanuele Carlini2 , Hanna Kavalionak2 ,
Massimo Coppola2 and Patrizio Dazzi3
1
  IIT-CNR, Pisa, 56124, Italy
2
  ISTI-CNR, Pisa, 56124, Italy
3
  Department of Computer Science, University of Pisa, 56127, Italy


                                         Abstract
                                         Recent years are witnessing extensions of cyber-infrastructures towards distributed environments. The
                                         Edge of the network is gaining a central role in the agenda of both infrastructure and application
                                         providers. Following the actual distributed structure of such a computational environment, nowadays,
                                         many solutions face resource and application management needs in Cloud/Edge continua. One of
                                         the most challenging aspects is ensuring highly available computing and data infrastructures while
                                         optimizing the system’s energy consumption. In this paper, we describe a decentralized solution that
                                         limits the energy consumption by the system without failing to match the users’ expectations, defined
                                         as the services’ Quality of Experience (QoE) when accessing data and leveraging applications at the
                                         Edge. Experimental evaluations through simulation conducted with PureEdgeSim demonstrate the
                                         effectiveness of the approach.

                                         Keywords
                                         Edge Computing, Self-organization, QoE




1. Introduction
Cloud solutions are spreading and getting momentum, being used in a vast majority of fields
and environments. In spite of the large availability and variety of cloud solutions, we witness
increasing difficulties in coping with next generation applications, like latency-sensitive ones.
Edge/Cloud continua have all the possibilities to overcome these limits by seamlessly integrating
one (or more) Cloud(s) and large numbers of Edge resources that are geographically distributed.
Despite being conceptually feasible, many challenges emerge for the actual management,
coordination and optimization of these huge sets of heterogeneous and dispersed resources [1,
2, 3]. A key issue is the efficient management of the overall energy consumption, memory and
computational resource usage of the system. As a matter of fact, one way to achieve these results

SEBD 2022: The 30th Italian Symposium on Advanced Database Systems, June 19-22, 2022, Tirrenia (PI), Italy
$ matteo.mordacchini@iit.cnr.it (M. Mordacchini); luca.ferrucci@isti.cnr.it (L. Ferrucci);
emanuele.carlini@isti.cnr.it (E. Carlini); hanna.kavalionak@isti.cnr.it (H. Kavalionak); massimo.coppola@isti.cnr.it
(M. Coppola); patrizio.dazzi@unipi.it (P. Dazzi)
€ https://www.iit.cnr.it/matteo.mordacchini/ (M. Mordacchini)
� 0000-0002-1406-828X (M. Mordacchini); 0000-0003-4159-0644 (L. Ferrucci); 0000-0003-3643-5404 (E. Carlini);
0000-0002-8852-3062 (H. Kavalionak); 0000-0003-4159-0644 (M. Coppola); 0000-0001-8504-1503 (P. Dazzi)
                                       © 2022 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).
    CEUR
    Workshop
    Proceedings
                  http://ceur-ws.org
                  ISSN 1613-0073
                                       CEUR Workshop Proceedings (CEUR-WS.org)
�is to optimize the placement of the instances of the applications requested by the users, by taking
into account the functional needs of the applications, the computational limits of Edge resources
and the non-functional requirements associated with the users’ Quality of Experience (QoE).
Distributed [4, 5], self-organizing [6, 7] and adaptive [8, 9] solutions have been proposed for
facing such challenges at the Edge. In this paper, we describes a decentralized, self-organizing
and QoE-centric scheme for the optimization of the energy consumed by the system. The
approach enables Edge entities to interact with one another to exchange information in an
attempt to determine whether the users of each application can be served using a lower number
of instances. This behaviour allows to reduce the number of instances executed in the system,
thus reducing the energy consumed and resource usage. When taking the decision to shut
down a potential redundant instance, the entities exploit the data they have exchanged to
evaluate whether this decision is in accordance with the services’ QoE and the computational
limits of Edge resources. Experimental results through simulation show that the proposed
solution is able to reduce the energy required by the system up to nearly 40%. The rest of
this paper is organized as follows. Section 2 contextualizes this work in the related scientific
literature. Section 3 presents our the definition of the problem and the approach we propose.
Section 4 describes the experimental evaluation of the proposed solution. Finally, Section 5
draws concluding remarks and highlights future work directions.


2. Related Work
Edge-based systems are the object of many researches that try to optimize the overall perfor-
mances of a system by limiting the communications with centralized Clouds [10, 11, 12, 13, 14, 15].
In fact, data exchange between Cloud and Edge systems introduce significant overhead and
could potentially degrade the performance of applications running at the Edge, like locality and
context-based services. A well-known approach to overcome this problem is to use decentralized
and/or self-organizing solutions [16, 17]. These solutions achieve their goal by moving the
applications [18, 19, 20] and/or data closer to users. When the data is moved in the system,
the aim is to make it easy for the users to access it [21, 22]. In this case, the general strategy
is to shorten the distance between the data storage devices or the data producers and their
respective consumers [23, 24]. To achieve an optimization of the energy consumption levels
of the entities at the Edge, we use a method which does not move data and/or applications
closer to each other and/or closer to their users. Beraldi et al. propose CooLoad [25], a scheme
where Edge datacenters re-direct their requests to other adjacent data centers whenever they
become congested. Carlini et al. [14] propose a decentralized system, where autonomous entities
in a Cloud Federation communicate to exchange computational services, trying to maximize
the profit of the whole Federation. Differently from the previous solutions, in this paper, the
efficient exploitation of the resources at the Edge is obtained by optimizing the energy con-
sumption of the system as a whole. As we explain in depth in the rest of the paper, this result is
achieved through point-to-point interactions between Edge entities, known as Edge Miniclouds
(EMCs). These entities use their communications to detect potential redundant instances of
the applications requested by the users. As a result, the users are directed to use only a limited
set of instances, thus allowing to shut down the others. However, an user request could be
�served by a different instance running on another EMC only if the associated QoE constraints
remain satisfied. The outcome of the collective behaviour of the entities at the Edge is a notable
reduction of the energy needed by the system performing the computational tasks requested by
its users.


3. Problem Definition and Proposed Solution
Consistently with the definitions of the EU ACCORDION project 1 , we consider that the
system at the Edge is a federation of so-called Edge mini-clouds (EMCs). Each EMC is an entity
that supervises a set of other devices with limited resources, like IoT devices, sensors, etc.
Applications are sent to an EMC, which is in charge to orchestrate their execution among the
devices it controls. We consider that 𝐸 = {𝐸𝑀 𝐶1 , . . . , 𝐸𝑀 𝐶𝑚 } is the set of all the EMCs in
the system, with |𝐸| = 𝑀 . The set 𝐴 = {𝐴1 , . . . , 𝐴𝑛 } is the set of all the types of applications
that can be executed in the system, with 𝑁 = |𝐴|. Each 𝐴𝑖 ∈ 𝐴 represents a distinct type
of service, with specific requirements in term of resources. In order to meet the requests of
the users, several instances of an application 𝐴𝑖 can be deployed on the EMCs. The symbol
𝑎𝑖𝑗 denotes the instance of the application 𝐴𝑖 executed by 𝐸𝑀 𝐶𝑗 . Running 𝑎𝑖𝑗 implies a
resource occupancy equal to 𝑤𝑖𝑗 . This weight is composed of a base weight 𝑤𝑖𝑓 𝑖𝑥 and a variable
component 𝑤𝑖𝑗  𝑣𝑎𝑟 , where the variable component depends on the number of users served by

𝑎𝑖𝑗 . Therefore, if we denote with 𝑢𝑖𝑗 the number of users of 𝑎𝑖𝑗 , we have that 𝑤𝑖𝑗    𝑣𝑎𝑟 = 𝑢 𝑤 𝑢 ,
                                                                                                𝑖𝑗 𝑖
where 𝑤𝑖𝑢 is the weight-per-user of 𝐴𝑖 . Thus, 𝑤𝑖𝑗 = 𝑤𝑖𝑓 𝑖𝑥 + 𝑢𝑖𝑗 𝑤𝑖𝑢 . The overall number of
users served by all the instances of 𝐴𝑖 is 𝑈𝑖 , while 𝑊𝑗 is the maximum weight that can be
supported by 𝐸𝑀 𝐶𝑗 for running all the instances that are assigned to it. In addition to the
functional requirements, in order to meet the required QoE, each application has also additional
non-functional requirements. These requirements limit the EMCs where an instance can be
deployed. QoE is expressed in terms of latency that each service 𝐴𝑖 constraints to be lower
than a value 𝐿𝑖 . In fact, latency is one of the main factors that influence a user’s perception
of the quality of a service. We assume that each time a user requests a service, an instance
of such service is activated in the user’s closest EMC (in terms of latency), thus latency is
initially minimized but this allocation scheme also generate a set of redundant instances of the
same service. In fact, users initially assigned to different EMCs could be served by just one,
properly selected instance, without violating the service’s QoE. This allows to shut down the
other instances and reduce the amount of energy consumed for serving the same users. Always
relaying on the direct intervention of a distant Cloud orchestrator to reach this result could be
a source of delay and degradation of the QoE. To overcome this limit, we developed an adaptive
decentralized approach that identifies and stop redundant instances of the running applications.
In the next, following the pseudocode given in Algorithm 1, we describe the steps executed by
a generic 𝐸𝑀 𝐶𝑗 . 𝐸𝑀 𝐶𝑗 has a set 𝒩 of neighboring EMCs (EMCs within the communication
range of 𝐸𝑀 𝐶𝑗 ). The latency between 𝐸𝑀 𝐶𝑗 and any of its neighbors 𝐸𝑀 𝐶𝑘 ∈ 𝒩 is ℒ(𝑗, 𝑘).
𝐼𝑗𝑡 is the set of application types running on the instances on 𝐸𝑀 𝐶𝑗 at time 𝑡. Each application
𝐴𝑖 ∈ 𝐼𝑗𝑡 has a maximum agreed latency 𝐿𝑖 , and a set of users 𝑢𝑖𝑗 , which experiences a maximum
latency 𝑙𝑖𝑗 . At regular time intervals, 𝐸𝑀 𝐶𝑗 randomly chooses one neighbor 𝐸𝑀 𝐶𝑘 ∈ 𝒩 .It
    1
        https://www.accordion-project.eu/
�Algorithm 1 Actions performed by a generic 𝐸𝑀 𝐶𝑗 at each time step 𝑡
  Input: 𝒩 = set of neighbors of 𝐸𝑀 𝐶𝑗
  Randomly choose 𝐸𝑀 𝐶𝑘 ∈ 𝒩
  Request 𝐼𝑘𝑡 , 𝑊𝑘 , 𝑊𝑘𝑡 to 𝐸𝑀 𝐶𝑘
  Compute 𝐼𝑗𝑘 = {𝐴𝑖 |𝐴𝑖 ∈ 𝐼𝑗𝑡 ∩ 𝐼𝑘𝑡 }
  if 𝐼𝑗𝑘 ̸= ∅ then
     if 𝑊𝑗𝑡 ≥ 𝑊𝑘𝑡 then
        𝒜𝑗𝑘 = {𝐴𝑖 ∈ 𝐼𝑗𝑘 |𝑙𝑖𝑗 + ℒ(𝑗, 𝑘) ≤ 𝐿𝑖 }
        Order 𝒜𝑗𝑘 in ascending order using 𝑤𝑖𝑗
        Let 𝑚 be the index of the first application 𝐴𝑚 ∈ 𝒜𝑗𝑘 s.t. 𝑊𝑘𝑡 + 𝑤𝑚
                                                                         𝑢𝑢
                                                                            𝑚𝑗 ≤ 𝑊𝑘
        Direct the users of 𝑎𝑚𝑗 to use 𝑎𝑚𝑘
        Turn off 𝑎𝑚𝑗
     else
        𝒜𝑘𝑗 = {𝐴𝑖 ∈ 𝐼𝑗𝑘 |𝑙𝑖𝑘 + ℒ(𝑗, 𝑘) ≤ 𝐿𝑖 }
        Order 𝒜𝑘𝑗 in ascending order using 𝑤𝑖𝑘
        Let 𝑚 be the index of the first application 𝐴𝑚 ∈ 𝒜𝑘𝑗 s.t. 𝑊𝑗𝑡 + 𝑤𝑚
                                                                         𝑢𝑢
                                                                           𝑚𝑘 ≤ 𝑊𝑗
        Direct the users of 𝑎𝑚𝑘 to use 𝑎𝑚𝑗
        Tell 𝐸𝑀 𝐶𝑘 to turn off 𝑎𝑚𝑘
     end if
  end if


then asks 𝐸𝑀 𝐶𝑘 for the list of its running applications 𝐼𝑘𝑡 with their number of users, its
maximum capacity 𝑊𝑘 and its actual resource occupancy 𝑊𝑘𝑡 . The solution tries to gather
the users of both the instances on the EMC with the lowest actual occupancy. If 𝐼𝑗𝑘 ̸= ∅, 𝑠 is
the source EMC (the one from which the users will be moved), with 𝑑 the EMC receiving that
users. Thus, 𝑊𝑠𝑡 ≥ 𝑊𝑑𝑡 . 𝐸𝑀 𝐶𝑗 builds a set 𝒜𝑠𝑑 = {𝐴𝑖 ∈ 𝐼𝑠𝑑 |𝑙𝑖𝑠 + ℒ(𝑠, 𝑑) ≤ 𝐿𝑖 } containing
the instances whose users can be moved without violating the QoE. 𝐸𝑀 𝐶𝑗 traverses 𝒜𝑠𝑑 in
descending order (on the basis of the instances weights in 𝐸𝑀 𝐶𝑠 ), choosing for the exchange
the first application whose users can be transferred without exceeding 𝑊𝑑 . In the special case
where both the EMCs select each other for an exchange, having equal loads and selecting the
same service, the EMC with the lowest ID rejects to receive the exchange, asking for another
application. Once the users are directed to another instance, the instance on 𝐸𝑀 𝐶𝑠 is turned
off. This action allows both to save energy and to free space for other potential exchanges or
new instances.


4. Experimental Evaluation
The experimental evaluation has been conducted through a simulation of a target scenario
using PureEdgeSim [26], a discrete-event simulator for Edge environments, that well matches
the EMC-based structure of our scenario, allowing also to measure energy consumptions. At
the beginning of the simulation, each user requests a single application to its closest EMC.
In case an instance of the requested application type already exists on that EMC, the user
�Table 1
Values of fixed weights 𝑤𝑓 𝑖𝑥 and per-user 𝑤𝑢 for each application type and resource
       App. type     VCPU     Ram     BW    VCPU (per user)     RAM (per user)    BW (per user)
       Balanced         1      200    20     1 each 10 users          20          2
     Comp Bound         2      200    20     1 each 5 users           20          2
     Mem Bound          1      400    20     1 each 10 users          40          2
      I/O Bound         1      200    40     1 each 10 users          20          4


is simply added to the instance’s local set of users. In the experiments the number of users
varies in the set {60, 120, 180}. Each user device is placed randomly in a bi-dimensional area of
200 × 200 metres. In all the experiments the number of EMCs is fixed to 4. They are placed at
predefined locations inside the simulation space. We assume that any EMC can host any type
of application. Moreover, each EMC is able to communicate with the others. There are three
types of resources available in the system (at the EMCs): the number of VCPU; the amount of
RAM; the amount of network bandwidth (BW). In the simulations, we use four different types
of applications. Application types differ on the resources they request and, as a consequence,
the energy footprint they produce when their instances are executed. The application types
are divided as Computational Bound (i.e, computational intensive), Memory Bound (memory
intensive) and I/O Bound (networking intensive) applications, where “intensive” means having
double the requirements of the basic Balanced application type. The load of an EMC is calculated
as the mean of the percentage of availability of the three resources. The fixed weight 𝑤𝑖𝑓 𝑖𝑥 and
the weights per user 𝑤𝑢 associated with the different application types is shown in Table 1. RAM
and BW are in Mbytes and Mbit/s, respectively. In addition to these parameters, we also use
three different values for the maximum application latency 𝐿𝑖 : 0.2, 0.3, 0.5 seconds. Therefore,
we have 12 possible combinations of parameters for the applications: 4 types of applications
times 3 different latency constraints. All the results presented in the next are the average of 10
independent runs. The first and main result of our evaluation is presented in Figure 1a. This
figure presents the evolution over time of the energy required by all the EMCs in the system,
including the energy needed for inter-EMCs communications. The results are presented as the
ratio between the energy needed at a time 𝑡 > 0 and the energy consumed by the system at
the beginning of the simulation. It is possible to observe that the level that is required to serve
the very same number of users drops by a minimum of 20% (with 180 users) up to nearly 40%
(with 60 users); this drastic reduction in the energy footprint of the system demonstrates the
high level of efficiency of the proposed approach.
   Figure 1b depicts how the configurations adopted by the system are able to remain compliant
with the applications’ QoE. A simulated latency function is calculated for each user’s device,
which is the composition of a fixed part, which is dependent from the communication channel
type, and a linear part, proportional to the Euclidean distance between the EMC hosting the
instance of the serving application and the user’s device. The average latency is measured as
the percentage of the maximum average latency, as constrained by the applications’ limits. It
is possible to note that there is only a limited increase on the average latency. Therefore, the
proposed solution shows its ability to remarkably reduce the energy needed to run the instances
�                                                                                                                                                     44
                              1
                                                                                                               60 users
                                                                                                              120 users                              43
                                                                                                              180 users
Energy consumption (ratio)


                             0.9                                                                                                                     42




                                                                                                                                    Percentage %
                                                                                                                                                     41
                             0.8                                                                                                                     40
                                                                                                                                                     39
                             0.7                                                                                                                     38
                                                                                                                                                     37                                                            60 users
                             0.6                                                                                                                                                                                  120 users
                                                                                                                                                     36
                                                                                                                                                                                                                  180 users
                                                                                                                                                     35
                             0.5                                                                                                                          0   2       4       6      8   10 12 14 16 18 20              22 24 26 28
                                   0              2           4     6   8   10     12   14   16     18   20   22   24     26   28
                                                                                 Iteration number                                                                                         Iteration number

                                                                                    (a)                                                                                                      (b)

Figure 1: Temporal evolution of the levels of energy (a) and average latency (b)


that serve a given population of users, while remaining well below the limits of the required QoE.
In order to better understand how these results are achieved, the next set of figures analyses how
the system collectively adapts its behaviour and how it changes the exploitation of the available
resources. Figure 2a presents the variation over time of the number of running instances in the
system. Clearly, these entities are the source of energy consumption. The ability of the system
to detect and eliminate redundant instances is the basis for the energy minimization scheme. It
is possible to observe a clear and sharp decrease of this quantity. The final number is nearly
the half of the original number of instances. Figure 2b presents the global level of exploitation
                                                             45
                                                                                               60 users
                                                                                              120 users
                                                             40                               180 users                                              90
                                                                                                                                                                     VCPUs: 180 users         VCPUs: 120 users       VCPUs: 60 users
                                                                                                                                                                      RAM: 180 users           RAM: 120 users         RAM: 60 users
                                                                                                                                                     80           Bandwidth: 180 users     Bandwidth: 120 users   Bandwidth: 60 users
                                       Number of instances




                                                             35
                                                                                                                                      Percentage %




                                                                                                                                                     70

                                                                                                                                                     60
                                                             30
                                                                                                                                                     50

                                                             25                                                                                      40

                                                                                                                                                     30
                                                             20
                                                                                                                                                          0   2       4       6      8   10 12 14 16 18 20             22 24 26 28

                                                             15                                                                                                                          Iteration number
                                                                  0 2 4 6 8 10 12 14 16 18 20 22 24 26 28
                                                                                 Iteration number

                                                                                    (a)                                                                                                      (b)

Figure 2: Variation of the total number of instances (a) and system resource loads (b), over time


of the resources. The 𝑦 axis presents the percentage of all the resources that are required to
run the application instances. As in the previous case, we can observe a clear reduction. The
amount of this reduction is lower than that of the number of instances, since users are moved
from a redundant instance to an active one. As we highlighted in Section 3, each user bring an
additional cost in terms of resources. Despite this fact, the overall level of occupied resources is
decremented, since the fixed costs needed for running redundant instances are saved.
�5. Conclusions
This paper presents a solution for application placement performing edge-to-edge exchanges to
reduce the energy consumption and resource usage, while guaranteeing the QoE of applications
by keeping the communication latency below given thresholds. The paper provides a definition
of the problem and the pseudo code of the proposed approach. An experimental evaluation via
simulation shows the validity of our solution. While the solution is quite a promising one, there
is space to improve the results in the near future. It is worth e.g. considering alternative local
search criteria and heuristics for the selection criteria of the EMC and application for the swap
proposal. This may improve the asymptotic cost savings and is likely to improve the achieved
savings as well as the convergence speed of our algorithm.


References
 [1] C.-H. Youn, M. Chen, P. Dazzi, Cloud Broker and Cloudlet for Workflow Scheduling,
     Springer, 2017.
 [2] T. Taleb, B. Samdanis, Kand Mada, H. Flinck, S. Dutta, D. Sabella, On multi-access edge
     computing: A survey of the emerging 5g network edge cloud architecture and orchestration,
     IEEE Communications Surveys Tutorials 19 (2017) 1657–1681.
 [3] N. Kumar, A. Jindal, M. Villari, S. N. Srirama, Resource management of iot edge devices:
     Challenges, techniques, and solutions, Software: Practice and Experience 51 (2021) 2357–
     2359. doi:https://doi.org/10.1002/spe.3006.
 [4] G. F. Anastasi, E. Carlini, P. Dazzi, Smart cloud federation simulations with cloudsim,
     in: Proceedings of the first ACM workshop on Optimization techniques for resources
     management in clouds, 2013, pp. 9–16.
 [5] M. Marzolla, M. Mordacchini, S. Orlando, A p2p resource discovery system based on a forest
     of trees, in: 17th International Workshop on Database and Expert Systems Applications
     (DEXA’06), IEEE, 2006, pp. 261–265.
 [6] L. Ferrucci, L. Ricci, M. Albano, R. Baraglia, M. Mordacchini, Multidimensional range
     queries on hierarchical voronoi overlays, Journal of Computer and System Sciences (2016).
 [7] M. Conti, M. Mordacchini, A. Passarella, L. Rozanova, A semantic-based algorithm for
     data dissemination in opportunistic networks, in: 7th International Workshop on Self-
     Organizing Systems (IWSOS 2013), LNCS 8221, Springer, 2013, pp. 14–26.
 [8] R. Baraglia, P. Dazzi, B. Guidi, L. Ricci, Godel: Delaunay overlays in p2p networks via
     gossip, in: IEEE 12th International Conference on Peer-to-Peer Computing (P2P), IEEE,
     2012, pp. 1–12.
 [9] M. Mordacchini, A. Passarella, M. Conti, S. M. Allen, M. J. Chorley, G. B. Colombo, V. Tanas-
     escu, R. M. Whitaker, Crowdsourcing through cognitive opportunistic networks, ACM
     Transactions on Autonomous and Adaptive Systems (TAAS) 10 (2015) 1–29.
[10] F. Salaht, F. Desprez, A. Lebre, An overview of service placement problem in fog and edge
     computing, ACM Comput. Surv. 53 (2020).
[11] G. Z. Santoso, Y.-W. Jung, S.-W. Seok, E. Carlini, P. Dazzi, J. Altmann, J. Violos, J. Marshall,
�     Dynamic resource selection in cloud service broker, in: 2017 Int. Conf. on High Perform.
     Comput. Simul. (HPCS), IEEE, 2017, pp. 233–235.
[12] U. Ahmed, A. Al-Saidi, I. Petri, O. F. Rana, Qos-aware trust establishment for cloud
     federation, Concurrency and Computation: Practice and Experience 34 (2022) e6598.
[13] J. Altmann, B. Al-Athwari, E. Carlini, M. Coppola, P. Dazzi, A. J. Ferrer, N. Haile, Y.-W.
     Jung, J. Marshall, E. Psomakelis, et al., Basmati: an architecture for managing cloud and
     edge resources for mobile users, in: International Conference on the Economics of Grids,
     Clouds, Systems, and Services, Springer, Cham, 2017, pp. 56–66.
[14] E. Carlini, M. Coppola, P. Dazzi, M. Mordacchini, A. Passarella, Self-optimising decen-
     tralised service placement in heterogeneous cloud federation, in: 2016 IEEE 10th Interna-
     tional Conference on Self-adaptive and Self-organizing Systems (SASO), IEEE, 2016, pp.
     110–119.
[15] G. F. Anastasi, M. Coppola, P. Dazzi, M. Distefano, Qos guarantees for network bandwidth
     in private clouds, Procedia Computer Science 97 (2016) 4–13.
[16] M. Mordacchini, M. Conti, A. Passarella, R. Bruno, Human-centric data dissemination in
     the iop: Large-scale modeling and evaluation, ACM Trans. Auton. Adapt. Syst. 14 (2020).
[17] C. Gennaro, M. Mordacchini, S. Orlando, F. Rabitti, Mroute: A peer-to-peer routing index
     for similarity search in metric spaces, in: 5th VLDB International Workshop on Databases,
     Information Systems and Peer-to-Peer Computing (DBISP2P 2007), 2007.
[18] Z. Ning, P. Dong, X. Wang, S. Wang, X. Hu, S. Guo, T. Qiu, B. Hu, R. Kwok, Distributed
     and dynamic service placement in pervasive edge computing networks, IEEE Transactions
     on Parallel and Distributed Systems (2020).
[19] A. M. Maia, Y. Ghamri-Doudane, D. Vieira, M. F. de Castro, Optimized placement of
     scalable iot services in edge computing, in: 2019 IFIP/IEEE Symposium on Integrated
     Network and Service Management (IM), 2019, pp. 189–197.
[20] P. Dazzi, M. Mordacchini, Scalable decentralized indexing and querying of multi-streams
     in the fog, Journal of Grid Computing 18 (2020) 395–418.
[21] E. Carlini, M. Coppola, P. Dazzi, D. Laforenza, S. Martinelli, L. Ricci, Service and resource
     discovery supports over p2p overlays, in: 2009 International Conference on Ultra Modern
     Telecommunications & Workshops, IEEE, 2009, pp. 1–8.
[22] M. Mordacchini, P. Dazzi, G.Tolomei, R. Baraglia, F. Silvestri, S. Orlando, Challenges in
     designing an interest-based distributed aggregation of users in p2p systems, in: 2009 IEEE
     ICUMT, IEEE, 2009, pp. 1–8.
[23] A. Aral, T. Ovatman, A decentralized replica placement algorithm for edge computing,
     IEEE Trans. on Network and Service Management 15 (2018) 516–529.
[24] C. Li, Y. Wang, H. Tang, Y. Zhang, Y. Xin, Y. Luo, Flexible replica placement for enhancing
     the availability in edge computing environment, Computer Communications 146 (2019)
     1–14.
[25] R. Beraldi, A. Mtibaa, H. Alnuweiri, Cooperative load balancing scheme for edge computing
     resources, in: 2017 Second International Conference on Fog and Mobile Edge Computing
     (FMEC), IEEE, 2017, pp. 94–100.
[26] C. Mechalikh, H. Takta, F. Moussa, Pureedgesim: A simulation toolkit for performance
     evaluation of cloud, fog, and pure edge computing environments, in: 2019 Int. Conf. on
     High Perform. Comput. Simul. (HPCS), 2019, pp. 700–707.
�