Inicio  /  Computers  /  Vol: 11 Par: 6 (2022)  /  Artículo
ARTÍCULO
TITULO

Can We Trust Edge Computing Simulations? An Experimental Assessment

Gonçalo Carvalho    
Filipe Magalhães    
Bruno Cabral    
Vasco Pereira and Jorge Bernardino    

Resumen

Simulators allow for the simulation of real-world environments that would otherwise be financially costly and difficult to implement at a technical level. Thus, a simulation environment facilitates the implementation and development of use cases, rendering such development cost-effective and faster, and it can be used in several scenarios. There are some works about simulation environments in Edge Computing (EC), but there is a gap of studies that state the validity of these simulators. This paper compares the execution of the EdgeBench benchmark in a real-world environment and in a simulation environment using FogComputingSim, an EC simulator. Overall, the simulated environment was 0.2% faster than the real world, thus allowing for us to state that we can trust EC simulations, and to conclude that it is possible to implement and validate proofs of concept with FogComputingSim.

 Artículos similares

       
 
Tim Hulsen    
Artificial Intelligence (AI) describes computer systems able to perform tasks that normally require human intelligence, such as visual perception, speech recognition, decision-making, and language translation. Examples of AI techniques are machine learni... ver más
Revista: AI

 
Abdelrahman M. Farouk, Ahmad Zhahiruddin Zulhisham, Yong Siang Lee, Mohammad Sadra Rajabi and Rahimi A. Rahman    
Implementing building information modeling (BIM) in construction projects can provide team members with an effective collaboration process. Therefore, organizations are implementing BIM to acquire the benefits. However, project members still use traditio... ver más
Revista: Infrastructures

 
Bochuan Hou, Yang Xin, Hongliang Zhu, Yixian Yang and Jianhua Yang    
Vehicle ad-hoc network (VANET) is interconnected through message forwarding and exchanging among vehicle nodes. Due to its highly dynamic topology and its wireless and heterogeneous communication mode, VANET is more vulnerable to security threats from mu... ver más
Revista: Applied Sciences

 
Jing Chen, Gang Zhou, Jicang Lu, Shiyu Wang and Shunhang Li    
Fake news detection has become a significant topic based on the fast-spreading and detrimental effects of such news. Many methods based on deep neural networks learn clues from claim content and message propagation structure or temporal information, whic... ver más
Revista: Applied Sciences

 
Jun Huang and Yidong Zeng    
This paper presents a fast trajectory optimization method combining the hp-Legendre pseudospectral method and convex optimization for the 6-Degree-of-Freedom rocket-powered landing problem. To accelerate calculations, this paper combines the Legendre pse... ver más
Revista: Aerospace