You are currently viewing a new version of our website. To view the old version click .
Symmetry
  • Article
  • Open Access

9 November 2021

5G Network Data Migration Service Based on Edge Computing

and
School of International Education, Huanghuai University, Zhumadian 463000, China
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Symmetry/Asymmetry in Wireless Communication and Sensor Networks

Abstract

With the development of mobile network technology, the continuous increase of mobile traffic has put forward higher requirements for quality of service (QoS) issues such as asymmetric transmission delay. The paper mainly studies the energy distribution problem on the migration data link from the terminal device to the edge node in the mobile edge network. Multiple data service packages are set up at each hop on the migration data link, and these data service packages compete with each other, and ultimately only one terminal provides and stores energy for this hop. The migration strategy of the data service package is affected by the edge node, and the edge node changes the migration strategy according to the migration strategy of the data service package. The paper is based on the formation of nodes between the data service packages of different nodes on the 5G network data link to jointly control the migration strategy, coordinate the migration strategy formulated, and better coordinate the migration strategy. In this competitive game model, the optimal migration strategy of nodes is found out according to the terminal equipment access requirements. Then according to the node stability rules, the composition of nodes when the nodes are stable is obtained, the migration strategy of stable nodes and the migration and spectrum strategies of operators are obtained, and the migration strategy of joint control provides energy for edge nodes.

1. Introduction

5th Generation Mobile Communication Technology (5G) is a new Generation of broadband Mobile Communication Technology featuring high speed, low delay and large connection. It is a network infrastructure for the realization of man-machine and object interconnection. In the future, the main technological update of mobile communication technology will improve the efficiency of energy utilization while avoiding environmental damage. For asymmetric services, the amount of data information, service time, transfer time and other parameters entering the network at any time are randomly variable, so the corresponding performance analysis is quite challenging. It is relatively difficult to make a substantive breakthrough. However, asymmetric services can be more flexibly used in real life. In practical applications, there are often different information or different sites. Accordingly, under the same service strategy, the parameters set by the system need to meet the requirements of different sites, which requires asymmetric service strategy.
In reference [1], the author proposed a system LAVEA for edge computing, which can unload the computing tasks between the client and the edge node. It can also cooperate with the nearby edge node, and provide low latency video analysis near the user. The priority edge design is adopted to minimize the response time, and the variable placement schemes set for edge cooperation are compared. The client edge configuration is used to speed up the local or cloud client tasks. In reference [2], a general architecture and framework for the use of mobile devices for hybrid mobile edge computing is proposed. This is a new use case of edge computing, which is called hybrid mobile edge computing. In this technology, mobile devices can overcome their battery limitations and performance limitations by dynamically using the computing power provided by edge computing. It can improve performance and reduce energy consumption. It also provides a means to protect user privacy, sensitive data and computing [3]. In reference [4], the author describes the model of unloading system and proposes an innovative architecture of “MVR”, which is helpful for computing unloading in mobile edge computing. MVR supports the use of virtual resources (VR) in edge computing to reduce the burden of resources, reduce the energy consumption of mobile devices and improve the performance of applications. In reference [5], the computing offload and MEC server framework are introduced, and then the existing algorithms are analyzed, compared and summarized according to the computing offload algorithm model and evaluation index. In reference [6], the integration of MEC and small cellular network (SCN) are studied. Firstly, the energy-saving unloading problem is studied to optimize the unloading energy of tasks and reduce the delay. In the application of cloud computing technology, businesses can be unloaded to remote cloud servers for processing through computing unloading technology so as to effectively solve the problem of large equipment load.
Currently, the high energy consumption in mobile networks mainly lies in two aspects: one is the data collection and data processing of terminal mobile network equipment, and the other is the generation, transmission and energy storage of energy required for data traffic transmission. Regarding how to reduce energy consumption, it is also an issue worthy of attention.
Mobile network devices are usually devices with weak computing power to reduce the size of the device. It is usually necessary to offload the tasks of various applications with a large number of computing resources to a computing system with sufficient computing resources, such as servers, cloud systems or data centers for processing; but this will inevitably lead to high latency and network congestion. Users’ demand for high-speed mobile networks and the ever-increasing variety of services, such as AR/VR, high-definition video, autonomous driving and other new services, have led to a rapid increase in the amount of data in the business, which will inevitably affect the 5G communication system, leading to high The delay may even cause network congestion, affecting the normal use of users.
In the traditional network structure, the way to transfer computing tasks to the cloud has been difficult to meet the future business needs. This structure not only increases the amount of data transmission, but also causes great pressure to the core network, and introduces a large amount of data transmission delay, and reduces the quality of service. In order to solve the above problems, two technologies, MEC and D2D communication, are introduced into 5G network. Among them, D2D communication technology is a new technology under the control of the base station, which allows the user data to be transferred directly between terminals without passing through the network. It can effectively expand the cellular communication and reduce the load pressure of the base station.
For a long time, the standard IT service platform is a centralized cloud computing model architecture, which transfers resources through the network to the central cloud server center for data storage, processing and business processing. With the rapid growth of transmission traffic, the current centralized business processing will inevitably lead to excessive load pressure on central network data transmission [7]. Mobile Edge Computing (MEC) is a solution that can effectively alleviate the large amount of data transmitted in the network.This paper proposes that energy suppliers at different nodes form an alliance to jointly formulate strategies. The problem is modeled as a Stackel berg game, in which the participants are leaders (operators) and multiple followers (alliances composed of energy suppliers). In order to solve this game, the reverse analysis method is used to obtain the strategy of the alliance composed of energy suppliers, and the operators adjust their spectrum strategy and pricing strategy according to the strategy of the energy supplier alliance [8].
The main innovations of this paper are as follows:
(1)
In this paper, the game between edge nodes and renewable energy suppliers is modeled as Stackel berg game.
(2)
By forming an alliance, jointly formulate strategies, and calculate the spectrum strategy of stabilizing the alliance according to the alliance stability rules.
(3)
According to the exponential access demand of the terminal, the resource allocation method on the retransmission link under multiple access requirements is obtained.
This paper takes 5G network as the basis, and in the case that the demand quantity of terminal equipment is distributed exponentially. Through the cooperative game relationship between data back haul links in 5G network, combined with Formation conditions and algorithm design of stable relay terminal of energy terminal, a data migration service strategy model is created.
The other structure of this paper is Section 2 introduces the related work. Section 3 discusses the system model of 5G access data back haul link. Section 4 is the relay terminal analysis and data migration service of 5 g network energy terminal. Section 5 is the simulation experiment, and Section 6 is the conclusion of the whole paper.

4. Relay Terminal Analysis and Data Migration Service of 5G Network Energy Terminal

In this section, we first studies the conditions under which the energy terminal relay terminal can achieve the maximum data exchange peak, then gives the definition of a stable relay terminal, studies how the energy terminal forms a stable relay terminal, and gives the composition of the stable relay terminal And the algorithm to form a stable relay terminal. Based on this, the largest migration service of the power terminal relay is explored.

4.1. Nash Stability Definition of the Energy Terminal Relay End

First, give the definition of Nash stable relay terminal:
Definition 1.
When each energy terminal in the relay terminal cannot transmit the current relay terminal to obtain a larger data exchange peak value, the relay terminal is Nash stable. That is, { W B 1 , W B 2 , , W B m } is the strategy of the energy terminal relay end. For any relay end B j B , when the condition   B j ( W B , ) B , ( W s j ) is satisfied, the relay end is Nash stable.
However, combined with the definition of Nash stable relay terminal, it is unstable for all terminals to form a large relay terminal. It can be seen from Theorem 1 that the migration data of each relay terminal and the total migration data of the energy terminal decrease as the number m of relay terminals formed increases. Therefore, when all terminals form a large relay terminal, the migration data is the highest, and when all energy terminals remain independent, the migration data is the lowest. Theorem 2 proves that each relay terminal obtains the same migration data, and the migration data of the relay terminal has nothing to do with the real composition of the relay terminal, but is only related to the number of terminals composed of the terminal and the terminal access demand function.

4.2. Formation Conditions and Algorithm Design of Stable Relay Terminal of Energy Terminal

Each energy terminal will get more benefits than the original uncooperative state. According to the result of this game, the wireless base station can work out the optimal data return service profit and loss and the expected value of the data volume provided to the end user. This section studies the formation process of the terminal relay. In the process of forming a relay terminal, each energy terminal is free and can freely form a relay terminal with other terminals or choose to remain independent.
Given the relay end structure for the distribution of the migration data of the relay end, under the Nash stability concept, a non-independent energy terminal transmits back to the current relay end. If the relay end is transmitted, it can obtain more migration data. Assuming that the feasible transmission of the energy terminal is to transmit the current relay terminal to remain independent or to transmit the current relay terminal to join other relay terminals, it also means that the relay terminal it joins can obtain more migration data when it joins.
Let the relay end migration data of the relay end structure with m relay ends be ( m ) .
( m ) = ( λ + γ C ) D ( ω , p ) 1 m   ϕ ( ε ) L ( h i ) : i B m
Under the concept of Nash stability, if a terminal in a relay can obtain more migration data by transmitting the current relay, it will transmit the current relay.   | B j | represents the number of energy terminals in the relay terminal   B j , and U ( m ) = ( m ) ( m + 1 ) represents the migration data of the relay terminal structure with m relay terminals and the terminal transmits the migration data of the relay terminal structure independent of the relay terminal. Without loss of generality, let   | B 1 | B N | , and for a given relay terminal structure, the energy terminal has only two states: independent and non-independent.
For a given relay terminal structure B = { B 1 , , B m } , it is Nash stable if and only if the following conditions are true:
(1)
  U ( m 1 ) | B 2 | + 1 , it is proved that there are independent energy terminals in the relay end structure,
(2)
  U ( m ) | B n | | , it is proved that there are non-independent energy terminals in the relay terminal structure.
If U ( m ) = ( m ) ( m + 1 ) represents the ratio of migration data before and after transmission by members in the relay. It measures the desire of the terminal to transmit the current relay to join other relays, and the transmission relay to remain independent or maintain the current state.
According to the proof of Theorem 3, for a given relay end structure of m relay ends,   U ( m 1 ) measures the tendency of independent terminals to remain independent, and   U ( m ) measures the non-independent energy terminals not transmitting the current tendency of the relay end to remain independent. Therefore, the value of   U ( m ) determines the stability of the relay terminal. The smaller the value, the independent terminal is more likely to remain independent, and the non-independent terminal is more likely to transmit the relay terminal to become independent. In the following,   U ( m ) represents the stability factor. In order to test whether the structure of the relay end is Nash stable, it is necessary to understand the behavior of the stability factor   U ( m ) . Based on the above theorem, some properties of   U ( m ) can be derived.
Under the exponential access demand     Q ( p )   of terminal equipment, the stability factor   U ( m ) should satisfy: ΣΣ ∈ ∈=ΠΠ=.
U ( m ) = ( m ) ( m + 1 ) = 1 γ ( m + 1 ) 1 + h m [ L ( h i ) : i B m ] [ L ( h i ) : i B m + 1 ]
Further, we can acquire U ( m ) m = ( 1 γ ) β ( 1 γ m ) 2 D ( ω , p m ) D ( ω , p m + 1 ) [ L ( h i ) : i B m ] [ L ( h i ) : i B m + 1 ] , where p k = ( 1 γ ) k + λ + C ( 1 γ ) ( 1 γ k ) represents the profit and loss of a single terminal when the relay end structure with k relay ends is stable.
Proof. 
The expression of   U ( m ) in Formula (21) is derived from the definition of Formula (20) and   U ( m ) . Let   k = 1 γ ( m + 1 ) 1 m , φ = D ( ω , p m ) D ( ω , p n + 1 ) , so that
U ( m ) m = φ κ m + K ϕ m
It can be obtained κ m = γ 2 ( 1 γ m ) 2   , φ m = λ γ ( 1 γ ) ( 1 γ ( m + 1 ) ) by derivation.
According to Formula (12), and p m + 1 = λ ( 1 γ ) ( m + 1 ) + λ + C ( 1 γ ) ( 1 γ ( m + 1 ) ) , K m   , φ m is substituted into Formula (12), we can get:
U ( m ) m = φ ( 1 γ ) γ ( 1 γ m ) 2
In Formula (13), it can be seen that   U ( m ) is only related to the sign of γ with the increase or decrease of m, which is related to the curvature of the demand function   ψ ( p ) = 1 + γ .When γ > 0 is ψ   (   p   )   <   1 ,   U ( m ) increases as m increases, which means that the terminal is more likely to form a relay end. When γ < 0 ,   U ( m ) decreases as m increases, which means that the terminal tends to remain independent. The relationship between the curvature of the demand function and the transfer rate along with the transfer rate can be used to explain the stability effect of the demand curvature on the structure of the relay end. The pass-through rate is the ratio of the reduction in the overall profit and loss caused by the reduction in a single profit and loss. The mathematical expression of the transfer rate is d p d W , the function d p d W = 1 2 Ψ ( p ) is required to solution curvature. Therefore, in   Ψ ( p ) < 1 , the transfer rate is less than 100%, in Ψ ( p ) = 1 , it is equal to 100%, and in   Ψ ( p ) > 1 , it is greater than 100%.
When     Q ( p )   is an exponential demand function, when λ > 0 , γ = 0 . Therefore, the   λ = 1 b , Ψ ( p ) = 1 transfer rate is equal to 100%, and   U ( m ) = e 2.73 .
Given the relay end structure B = { B 1 , , B m } , where   | B 1 | = 1 , | B 2 | = = | B ρ | = 2 , B ( n ) ( n ) are denoted as B ( n ) ( n )   = { B 1 , , B m } , where   | B 1 mod e l s = | B m | = 2 . Without loss of generality,   | B 1 | B m | is let. B ¯ represents an independent structure, such as:   | B ¯ | = 1 , that is, there is only one energy terminal in each relay terminal, and B is a large relay terminal, that is, all energy terminals of   | B | = m are in the same relay terminal. □
According to the above research on the stable relay terminal of the energy terminal, the distributed iterative algorithm design for the energy terminal to form the Nash stable relay terminal is now given. The specific algorithm flow is shown in Figure 3.
Figure 3. The distributed iterative algorithm of the Nash stable relay terminal structure formed by the energy terminal in the 5G access back haul link.
Step 1:
Assume that the relay terminal structure B = { B 1 , , B e γ } is formed through its own actions at the energy terminal.
Step 2:
B 1 to B m in turn, U ( m ) = ( m ) ( m + 1 ) is calculated.
Step 3:
If the number of energy terminals on the relay end is 1, then it will remain independent during   U ( m 1 ) B 2 | + 1 . Otherwise, it will deviate from the current relay and join other relays.
Step 4:
If the number of energy terminals in the relay end is greater than 1, then it will stay in the current relay end during   U ( m 1 ) B 2 | + 1 . Otherwise, it deviates from the current relay and joins other relays or becomes independent.
Step 5:
Return to the second step to traverse the entire relay end structure B = { B 1 , , B n } .

4.3. Maximum Migration Service Analysis

For the relay terminal structure B = { B 1 , , B m } , according to the condition function of the base station in Formula (7), the data migration of the base station is affected by two factors: the data packet p obtained from the terminal device and the energy supply profit and loss of all energy terminals on the back haul link. At the same time, for the terminal relay end, the strategy with the greatest profit should also be selected. When the relay end can obtain the maximum migration data, the first derivative of Formula (10) needs to meet the conditions:
i k W i k = [ D ( ω , W ) + ( W R , j C B j )   ϕ ( ε ) L ( h l ) : i B j ] = 0
Because the value of   ϕ ( ε ) L ( h l ) : i B j is not 0, Formula (14) can be converted to:
W B , C B j = D + ( ω , W ) D + ( ω , W )
Because   W = h j 1 W B J so there is Q ( ω , W ) W k j = d Q ( ω , W ) d W , Formula (15) can be converted to:
W B j C B j = Q ( ω , W ) d Q ( ω , W )
That is W B 1 C B 1 = W B 2 C B 2 = = W B 2 C B 2 , it can be seen that in order to obtain the maximum benefit for the energy terminal, when the amount of data transmitted by all nodes on the back haul link is the same, regardless of whether the data amount is the same, all the relay terminals obtain the same migration data. When the relay end structure   B = { B 1 , , B m } and the relay end pricing strategy   { W R , W B , , , W B k } are known, the base station will obtain data packets from the terminal equipment according to the maximum data migration. In order for the base station to obtain the maximum migration data, the first derivative of the profit and loss p in Formula (13) needs to meet the following conditions:
  d L y d p = [ D ( ω , p ) + ( p W ) D ( ω , p ) ] [ ϕ ( ε ) L ( h j ) : i n ] = 0
In Formula (17), D ( ω , p ) D ( ω , p ) + μ W = 0 . Demand     Q ( p )   can get the best profit and loss   p = W + 1 b . In the same way, in order for the energy terminal to obtain the maximum migration data, the optimal   ( p , D ) of the base station at this time depends on the overall energy gains and losses of all energy terminals.
Because the number of terminal accesses is     Q ( p )   , the elasticity of profit and loss is η ( p ) = p D ( ω , p ) D ( ω , p ) , where   D ( ω , p ) = d D ( ω , p ) d p . Suppose that let η ( p ) = p ( λ + γ ) , where λ and γ are constants, and λ 0 , γ 1 . Because     Q ( p )   is the access demand function, the above profit and loss elasticity formula needs to satisfy λ + γ p > 0 , and   ψ ( p ) = D ( ω , p ) D ( ω , p ) ( D ( ω , p ) ) 2 is a constant, which represents the curvature of the demand function.
In order to ensure that there is an equilibrium solution for the base station’s profit and loss, the condition   ψ ( p ) 2 , namely γ 1 , is required. ( m ) represents the migration data of the relay terminal with m energy terminals.
For a given relay terminal structure and energy terminal energy loss, the base station must maximize its own migration data. Therefore, the profit and loss of the maximum migration data can be obtained as   p = λ + W 1 + γ . The profit and loss   p is substituted when the base station obtains the optimal migration data into the relay end migration data function, we can obtain:
d B j d W B j = [ D ( ω , p ) + ( W B , i C B j ) D ( ω , p + ) = [ ( 1 γ m ) W λ m C ] [ ϕ ( ε ) L ( h ) : i B ]
It can be noted in Formula (18) that if there is   ( 1 γ m ) 0 , the migration data of the relay end B j strictly increases with the increase of W B j . Therefore, the higher the profit and loss p is set at this time, the higher the migration data of the relay end, which does not conform to the actual situation, and this situation is not considered. When   ( 1 γ m ) > 0 , according to Formula (15), the migration data of relay B j has a peak value obtained at   W = λ m + C 1 ψ m :
  W B n C B n = =   W B n C B n = λ + r C 1 r m
  W is substituted into the maximum migration data, the profit and loss are   P , we can get:
  P = λ ( 1 γ ) m + λ + C ( 1 γ ) ( 1 γ m )
  W , and   P are substituted into the relay terminal migration data function and the base station migration data function respectively, we can get B j = ( λ + γ C ) 1 m D ( ω , p ) [ ϕ ( ε ) L ( h ) i B j ] ,   f = λ + γ C ( 1 γ ) ( 1 γ m ) D ( ω , p ) [ ϕ ( ε ) L ( h ) : i n ] ,   B j B . It is inferred:
  W m 0 , p m 0 , ( m ) m 0 , D ( ω , p ) m 0 , m ( m ) m 0
Assuming   1 γ m 0 , if   1 γ m 0 , there will be no relationship between the energy terminal and the relay terminal, that is, if there is no migration data, the energy terminal will not form a relay terminal.
When the energy terminal forms the relay terminal according to the optimal profit and loss strategy, the relay terminal is not necessarily stable, so it is necessary to study how the energy terminal forms a Nash stable relay terminal.

5. Simulation Experiment

5.1. Simulation Environment Settings

In order to evaluate the algorithm in this paper and compare the performance indicators of existing algorithms, a variety of simulation evaluation methods in the paper is proposed. In the simulation area of 100 m × 100 m, 100 nodes are randomly thrown around the base station node located in the central area, and the migration data 5G network is constructed as shown in Figure 4.
Figure 4. Distribution of 5G data nodes.
In Figure 4, 60% of the data is deployed for ordinary nodes twice the E0 level 1 node; 20% of the data is deployed for 1/2E0 migration data nodes, and the remaining nodes are second-level nodes with normal data levels.
In this paper, edge computing is adopted to cluster disordered network nodes into clusters. By adopting the first clustering measure, it is helpful to determine the minimum distance between the cluster head node and the base station, and reduce the network energy consumption. The final clustering result adopts the Tyson polygon as shown in Figure 5.
Figure 5. Edge clustering algorithm results.
In the test of simulating the effect of edge computing, the initial experimental parameters determine the performance of the entire experimental results. The specific parameters are shown in Table 1.
Table 1. Simulation parameters.
Because the unreasonable data distribution and consumption agreement accelerates the process of node death, the more data the node stores, it means that it can bring the greatest benefits of network survival, which directly reflects the survival value of the agreement.
The hardware environment of this experiment is Intel Core i7-10700M processor with the main frequency of 4.80 GHz. The performance of this scheme is simulated and analyzed by Matlab 2016a simulation platform. The simulation edge computing network scenario includes 1 edge base station and 12 user equipment. Each user is randomly distributed in the [ 200 m , 200 m ] . For parameter setting, consider that the working frequency of the local CPU of the equipment is 1G cycles/s, the maximum transmission power is 0.8 W; the transmission bandwidth between the equipment and the base station is 15 MHz; the noise power and unloading transmission channel gain are σ 2 = 2 × 10 13 and h i = 127 + 30 × log d respectively, and d is the transmission distance. It is assumed that the maximum computing capacity of the edge is 35G cycles/s. The equipment idle power is 0.01 W, the task data size is 0.42 MB and the task processing density is 297.62 cycles/bit. For the cache content data setting, the maximum capacity of edge cache assistance is 120 MB.
The paper comprehensively compares the Leach protocol and its improved Leach-E and SPE algorithms. In order to fully analyze the characteristics of the algorithm, the evaluation is mainly based on the following.

5.2. The Remaining Data Balance Ratio

The remaining data balance ratio is expressed as the ratio of the remaining data of the node to the total data of all nodes. Because the initial data priority is different, the loss of the data loss value of each node is different at different positions. The edge calculation proposed in this paper is 1000. In the second iteration, the number of dead nodes is 4, and the remaining data balance ratio of most nodes exceeds 50%. The balance comparison with other algorithms is shown in Figure 6.
Figure 6. Comparison of residual data balance effect.
In Figure 6, the edge computing proposed in this article has a significant effect on solving the data balance problem in 5G wireless sensor networks.

5.3. Node Death Cycle

In the 5G wireless sensor network, due to the large difference in migration data, the traditional LEACH algorithm based on the probability of disadvantages highlights the serious situation that the node death occurs first; the improved LEACH-E algorithm makes up for this deficiency, but The problem of cluster head selection does not essentially solve the congenital defects in the algorithm process; the SPE algorithm itself uses two nodes with different initial data, and designs different cluster head election thresholds, making the advanced node become the cluster head. The probability is further improved, increasing the death time of the first node; however, this method does not consider the negative impact of the distance between the cluster head node and the base station, which promotes the death probability of the node in a certain period of time. Great, it did not get the proper lifting effect. The simulation results are shown in Figure 7.
Figure 7. Network life cycle.
Figure 7 compares the initial node death algebra, 50% node death algebra, and all node death algebras of various algorithms, as shown in Table 2.
Table 2. Comparison of network life cycle data of various algorithms.
Compared with LEACH algorithm, LEACH-E algorithm, and SPE algorithm, the initial node death cycle in this article has increased by 226.30%, 223.15%, and 146.73%, respectively. Compared with the life cycle, it has increased by 70.1%, 32.3%, and 119.3%, respectively. %, so the experimental data shows that this article has profound significance and influence in improving the network life cycle.

5.4. Number of Data Packets Received by the Base Station

The more data the base station receives, the longer the survival time of the network. In a complex environment, the amount of information monitored by the network will increase, which directly reflects the effectiveness of the algorithm in this paper, as shown in Figure 8.
Figure 8. Base station receives data value.
The data in this article is about 36,679, which are LEACH algorithm, LEACH-E algorithm, and SPE algorithm increased by 65%, 49% and 47%.

5.5. Average Node Remaining Data

The average node remaining data is the ratio between the total data of the current node and the number of surviving nodes. The higher the average node remaining data means the higher the survival value of the network and the greater the use value of the network. The result is shown in Figure 9.
Figure 9. Number of received information groups.
The fitness function is established by combining the residual energy of the network node and the distance from the node to the base station, making full use of the relationship between the node energy and location in the process of information transmission, selecting the three nodes with the strongest adaptability in each cluster, iteratively selecting the cluster head node that can best reflect the current cluster structure, and completing the cluster transmission of sensor information. Finally, a variety of evaluation criteria are used to simulate the real network environment. The experimental results show that the model has a good network life cycle and has better adaptability than the traditional isomorphic and heterogeneous network models; in addition, although the proposed algorithm improves the life cycle of heterogeneous WSNs networks, it does not consider the delay and jitter in the process of information transmission.
Compared with the other three algorithms, the algorithm proposed in this paper has the smallest slope, which means that the data loss is slower in the same network living space, which is about 33% higher than the traditional LEACH algorithm and LEACH-E algorithm, and is better than the SPE algorithm an increase of nearly 50%.

6. Conclusions

This study designs a 5G wireless data network migration strategy based on edge computing, which not only improves the life cycle of the 5G network, but also improves the utilization rate of the remaining data in the network. The experiment shows that the model has a good network life cycle and better adaptability than the traditional network model. However, although this method improves the life cycle of 5G network, it does not consider the problem of time delay and jitter in the process of information transmission. Therefore, in the following research, this method will be optimized from these two aspects.

Author Contributions

Writing–original draft, F.L.; Writing–review & editing, D.W. All authors have read and agreed to the published version of the manuscript.

Funding

This research was partially funded by key scientific research projects of universities in Henan Province, grant number 21A440015.

Data Availability Statement

All data, models, and code generated or used during the study appear in the submitted article.

Acknowledgments

This work is partially supported by key scientific research projects of universities in Henan Province, which number is 21A440015.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Hassan, N.; Yau, K.L.A.; Wu, C. Edge computing in 5G: A review. IEEE Access 2019, 7, 127276–127289. [Google Scholar] [CrossRef]
  2. Abdenacer, N.; Wu, H.; Abdelkader, N.N.; Dhelim, S.; Ning, H. A Novel Framework for Mobile Edge Computing By Optimizing Task Offloading. IEEE Internet Things J. 2021, 8. [Google Scholar] [CrossRef]
  3. Kiani, A.; Ansari, N. Edge computing aware NOMA for 5G networks. IEEE Internet Things J. 2018, 5, 1299–1306. [Google Scholar] [CrossRef]
  4. Hu, P.; Dhelim, S.; Ning, H.; Qiu, T. Survey on fog computing: Architecture, key technologies, applications and open issues. J. Netw. Comput. Appl. 2017, 98, 27–42. [Google Scholar] [CrossRef]
  5. Yan, S.; Peng, M.; Wang, W. Fog Computing based Radio Access Networks: Issues and Challenges. IEEE Netw. 2015, 30, 46–53. [Google Scholar]
  6. Mao, Y.; You, C.; Zhang, J.; Huang, K.; Letaief, K.B. A Survey on Mobile Edge Computing: The Communication Perspective. IEEE Commun. Surv. Tutor. 2017, 19, 2322–2358. [Google Scholar] [CrossRef] [Green Version]
  7. Chen, X.; Jiao, L.; Li, W.; Fu, X. Efficient Multi-User Computation Offloading for Mobile-Edge CloudComputing. IEEE/ACM Trans. Netw. 2015, 24, 2795–2808. [Google Scholar] [CrossRef] [Green Version]
  8. Dolui, K.; Datta, S.K. Comparison of edge computingimplementations: Fog computing, cloudlet and mobile edge computing. In Proceedings of the 2017 Global Internet of Things Summit (GIoTS), Geneva, Switzerland, 6–9 September 2017; pp. 1–6. [Google Scholar]
  9. Siddique, U.; Tabassum, H.; Hossain, E. Spectrum allocation for wireless backhauling of 5G small cells. In Proceedings of the IEEE International Conference on Communications Workshops, Kuala Lumpur, Malaysia, 23–27 May 2016. [Google Scholar]
  10. Yi, S.; Hao, Z.; Zhang, Q.; Zhang, Q.; Shi, W.; Li, Q. LAVEA: Latency-Aware Video Analytics on Edge Computing Platform. In Proceedings of the 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), Atlanta, GA, USA, 5–7 June 2017. [Google Scholar]
  11. Reiter, A.; Zefferer, T. Hybrid Mobile Edge Computing: Unleashing the Full Potential of Edge Computing inMobile Device Use Cases. In Proceedings of the IEEE/ACM International Symposium on Cluster, Madrid, Spain, 14–17 May 2017. [Google Scholar]
  12. Granjal, J.; Monteiro, E.; Jorge Sá, S. Security for the Internet of Things: A Survey of Existing Protocolsand Open Research Issues. IEEE Commun. Surv. Tutor. 2015, 17, 1294–1312. [Google Scholar] [CrossRef]
  13. Chandakkar, P.S.; Li, Y.; Ding, P.L.K.; Li, B. Strategies for Re-Training a Pruned Neural Network in an EdgeComputing Paradigm. In Proceedings of the IEEE International Conference on Edge Computing, Honolulu, HI, USA, 25–30 June 2017. [Google Scholar]
  14. Shantharama, P.; Thyagaturu, A.S.; Karakoc, N.; Ferrari, L.; Reisslein, M.; Scaglione, A. LayBack: SDN Management of Multi-access EdgeComputing (MEC) for Network Access Services and Radio Resource Sharing. IEEE Access 2018, 6, 57545–57561. [Google Scholar] [CrossRef]
  15. Liu, J.; Shou, G.; Liu, Y.; Hu, Y.; Guo, Z. Performance Evaluation of Integrated Multi-Access EdgeComputing and Fiber-Wireless Access Networks. IEEE Access 2018, 6, 30269–30279. [Google Scholar] [CrossRef]
  16. Wei, X.; Wang, S.; Zhou, A.; Xu, J.; Su, S.; Kumar, S.; Yang, F. MVR: An Architecture for Computation Offloading in Mobile EdgeComputing. In Proceedings of the 2017 IEEE International Conference on Edge Computing (EDGE), Honolulu, HI, USA, 25–30 June 2017. [Google Scholar]
  17. Shan, X.; Zhi, H.; Li, P.; Han, Z. A Survey on Computation Offloading for Mobile Edge Computing Information. In Proceedings of the 2018 IEEE 4th International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE InternationalConference on Intelligent Data and Security (IDS), Omaha, NE, USA, 3–5 May 2018. [Google Scholar]
  18. Zhang, H.; Guo, J.; Yang, L.; Li, X.; Ji, H. Computation offloading considering fronthaul and backhaul in small-cellnetworks integrated with MEC. In Proceedings of the Computer Communications Workshops, Atlanta, GA, USA, 1–4 May 2017. [Google Scholar]
  19. Xu, J.; Palanisamy, B.; Ludwig, H.; Wang, Q. Zenith: Utility-aware Resource Allocation for Edge Computing. In Proceedings of the IEEE International Conference on Edge Computing, Honolulu, HI, USA, 25–30 June 2017. [Google Scholar]
  20. Song, Y.; Yau, S.S.; Yu, R.; Zhang, X.; Xue, G. An Approach to QoS-based Task Distribution in Edge Computing Networksfor IoT Applications. In Proceedings of the 2017 IEEE International Conference on Edge Computing (EDGE), Honolulu, HI, USA, 25–30 June 2017. [Google Scholar]
  21. Ito, Y.; Koga, H.; Iida, K. A bandwidth allocation scheme to meet flow requirements in mobile edgecomputing. In Proceedings of the IEEE International Conference on Cloud Networking, Prague, Czech Republic, 25–27 September 2017. [Google Scholar]
  22. Shrawankar, U.; Hatwar, P. Approach towards V M Management for Green Computing. In Proceedings of the IEEE International Conference on Computational Intelligence & Computing Research, Tamilnadu, India, 10–12 December 2015. [Google Scholar]
  23. Wang, N.; Hossain, E.; Bhargava, V. Joint Downlink Cell Association and Bandwidth Allocation for WirelessBackhauling in Two-Tier HetNets with Large-Scale Antenna Arrays. IEEE Trans. Wirel. 2016, 15, 3251–3268. [Google Scholar] [CrossRef] [Green Version]
  24. Sandip, K.; Das, B.A. Two-stage Rate Allocation Game in Wireless Access Networks with PON Backhaul. IEEE Commun. Lett. 2018, 22, 1814–1817. [Google Scholar]
  25. Yusoff, R.; Baba, M.D.; Ali, D. Energy-efficient resource allocation scheduler with QoS aware supports forgreen LTE network. In Proceedings of the Control & System Graduate Research Colloquium, Shah Alam, Malaysia, 8 August 2016. [Google Scholar]
  26. Liu, D.; Chen, Y.; Chai, K.K.; Zhang, T.; Elkashlan, M. Two Dimensional Optimization on User Association and Green EnergyAllocation for HetNets with Hybrid Energy Sources. IEEE Trans. Commun. 2015, 63, 4111–4124. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.