In modern times, the need for latency sensitive applications is growing rapidly. Cloud computing infrastructure is unable to provide support to such delay sensitive applications. Therefore, a new paradigm called edge computing has emerged. In edge computing various paradigms like Fog, Cloudlet, Mobile Edge Computing, etc. provide real-time, location aware services to users. As a result number of requests are generated for processing in the edge servers. If these edge servers for some reason become unavailable for providing service, users will not be able to perform their delay sensitive or location aware operations. Like other servers in the network, edge servers can also become vulnerable to various security attacks. Among other security attacks, Distributed Denial of Service (DDoS) attack can be very threatening for edge servers. Capacity of edge servers compared to traditional servers is limited. Therefore, the effort needed to overwhelm the edge server will be smaller, on the other hand, the impact of DDoS attacks on edge servers will be dreadful. Importance of a proper functioning of edge servers is immense for providing uninterrupted support to the users. Therefore, some kind of recovery methods is needed to recover an overloaded edge server. Present state-of-art mentions some such recovery methods for the edge servers so that they can provide continuous services.
اصطلاحهای موضوعی کنترل نشده
اصطلاح موضوعی
Computer engineering
اصطلاح موضوعی
Computer science
نام شخص به منزله سر شناسه - (مسئولیت معنوی درجه اول )