Next Article in Journal
Three-Dimensional Seismic Analysis of Symmetrical Double-O-Tube Shield Tunnel
Previous Article in Journal
Measuring Device for More Precise Mistuning Identification of Integrated Bladed Discs
Previous Article in Special Issue
Public Opinion Evolution Based on the Two-Dimensional Theory of Emotion and Top2Vec-RoBERTa
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

QoS-Effective and Resilient Service Deployment and Traffic Management in MEC-Based Crowd Sensing

1
School of Computer and Computing Science, Hangzhou City University, Hangzhou 310025, China
2
School of Computer Science and Technology, Xidian University, Xi’an 710126, China
3
School of Art and Archeology, Hangzhou City University, Hangzhou 310025, China
*
Authors to whom correspondence should be addressed.
Symmetry 2025, 17(5), 718; https://doi.org/10.3390/sym17050718
Submission received: 20 March 2025 / Revised: 28 April 2025 / Accepted: 5 May 2025 / Published: 8 May 2025
(This article belongs to the Special Issue Machine Learning and Data Analysis II)

Abstract

:
The rapid development of Multi-access Edge Computing (MEC) technology is transforming traditional platform services and enabling realization of the mMTC vision of 5G networks. MEC allows computational tasks to be offloaded to devices at the network edge, enabling real-time crowd sensing. However, due to the limited resources in MEC environments, it is essential to propose efficient service deployment and traffic management strategies that balance Quality of Service (QoS) with costs. This paper addresses the challenge by modeling the QoS-effective joint service deployment and traffic management problem (QST) as a nonlinear integer optimization problem. We propose a customized genetic algorithm called GA4QST, which aims to minimize cost-performance ratios. In the experimental section, GA4QST is compared with baseline algorithms in terms of efficiency and effectiveness. Although GA4QST exhibits slightly increased complexity compared to the original genetic algorithm, it performs exceptionally well in balancing benefits and average time costs. GA4QST demonstrates strong capabilities in finding optimal solutions, consistently outperforming baseline algorithms. This further confirms the effectiveness and potential applicability of GA4QST in real-world scenarios. Finally, we also explore the impact on optimization outcomes of system configurations such as service diversity, data volume, processing power, and network characteristics. The results indicate that GA4QST has broad applicability and represents a feasible solution for practical MEC applications.

1. Introduction

Gently, the curtain rises on a new era of intelligent mobile computing, with a diverse array of visible mobile applications central to our lives, extending their influence to the unseen corners of our environment [1]. The report released by Ericsson predicts that there will be 24 billion interconnected devices around us by 2050 (https://www.ericsson.com/en/internet-of-things, accessed on 5 January 2024). This swift expansion presents both opportunities and challenges. The considerable user base and its diverse needs are expected to develop a varied service market. Conversely, we must also consider potential barriers. In addition to the constraints imposed by limited mobile device resources, the network congestion exacerbated by the explosion of connections could impede the provision of seamless experiences in traditional cloud computing paradigm, thereby undermining the adoption and widespread use of mobile services. Therefore, the multi-access edge computing (or mobile edge computing) paradigm has been considered as both a key supplement and an important solution to these issues. With its hierarchical computing architecture, MEC optimizes the utilization of mobile resources and wireless networks by executing computation tasks close to the data sources, thereby facilitating the delivery of high-quality services [2,3,4].
This study focuses on the field of service computing and service management. Several studies published in the Symmetry journal provide important references for this work. Duan et al. optimized cloud task scheduling using an adaptive genetic algorithm [5]. Cheng et al. proposed an improved beetle optimization algorithm for efficient task offloading in MEC [6]. Ye and Jiang developed a data integrity verification protocol to enhance security in edge computing [7]. These studies offer valuable insights for this research.
In our former paper [8], we elucidated the role of mobile devices as crowd sensing participants within an MEC environment. Edge servers are located within a single-hop or short-hop distance. Mobile devices capture environmental data, upload these data, and request service modules on the edge servers to perform analysis tasks. [9]. This architecture is depicted in Figure 1 [10]. Moreover, to augment the efficiency of sensing and analysis, edge servers can collaborate locally by utilizing Platform as a Service (PaaS) management technologies. Examples of these technologies include OpenShift (http://www.openshift.com/, accessed on 5 January 2024), Kubernetes (https://kubernetes.io/, accessed on 5 January 2024), and Software-Defined Network (SDN)-based network management technologies such as OpenFlow (https://opennetworking.org/sdn-resources/customer-case-studies/openflow/, accessed on 5 January 2024) [11,12,13]. These technologies allow for the flexible utilization of nearby cluster resources on a global scale. For example, an edge server can forward requests along with sensed data to other servers that are capable of processing the data. While this enhances service quality, the proliferation of the MEC paradigm also transforms the economy pattern of traditional PaaS systems, as resources can now be managed from a more fine-grained perspective.
However, the overall QoS improvement trends mentioned above still cannot compensate for the performance losses caused by improper resource allocation or deficiencies in network traffic scheduling strategies. Developers need to be more cautious when formulating resource allocation plans based on budget and QoS requirements, and should focus on how to optimally utilize the resources provided by the MEC platform to achieve QoS objectives. For example, too many available resources may be allocated to services that are rarely used, or high traffic may be scheduled through unstable network connections. This can lead to the edge service system being unable to meet performance expectations, particularly in the case of AI services that require very large amounts of computational power and data. While it is possible to allocate a wide range of resources to improve user experience [14], the associated costs can be prohibitive, especially when the resources of the related edge server are insufficient. Therefore, finding a cost-effective service placement and traffic management strategy becomes highly meaningful.
Our experiments demonstrate that the proposed GA4QST algorithm can effectively generate service placement and traffic management strategies with cost benefits. This algorithm outperforms baseline algorithms across multiple metrics. We performed numerous experiments to evaluate the resilience of the proposed GA4QST algorithm, finding that it showed significant ability to achieve optimal solutions. In summary, the contributions of this work are as follows:
1.
We conducted a detailed analysis on the MEC-based crowd sensing service system’s performance. Our investigation aimed to quantify the influence of service deployment and network strategies on system costs.
2.
We thoroughly investigated the tradeoff between performance and cost in the system across various service placement and traffic management strategies by creating a mathematical model of the QoS-effective joint service deployment and traffic management problem (QST).
3.
To address the target problem in a manageable way for a given system configuration, we propose an algorithm named GA4QST, which is based on the classical genetic algorithm framework. A comprehensive analysis of the proposed algorithm is also provided.
4.
To thoroughly evaluate the efficacy of the proposed algorithm, we conducted a detailed comparative analysis with baseline algorithms. The experimental results demonstrate that GA4QST performs excellently in generating optimal solutions. In addition, our experiments explored the impact of different system settings on the performance of the proposed algorithm.

2. Motivation and Scenarios

In this section, we present the motivation behind the current research and exhibit the research scenario using the brief case of an MEC-based crowd sensing service system. The presentation allows optimal operations to be demonstrated clearly before the problem formulation.
In MEC applications, Massive Machine-Type Communication (mMTC) represents one of the key research topics. The primary challenge lies in supporting connection densities as high as 1.0 × 106 device/km2 [15]. Smart cities represent one such scenario [16]. In a smart city, millions of distributed mobile devices sense their local environments and upload the data for further analysis, such as the City Brain (https://damo.alibaba.com/labs/city-brain?lang=en, accessed on 12 March 2024). However, to obtain the results in time, it is necessary to increase the data sampling frequency, which will unquestionably result in a data flood [17]. Thus, the MEC paradigm is taken advantage of to complete tasks using the resources of nearby edge servers.
For instance, a simple MEC-based crowd sensing service system in a smart city project with two different services ( s 1 and s 2 ), four access points ( a 1 a 4 ), and six edge devices ( h 1 h 2 and m 1 m 4 ) is shown in Figure 2. In this case, the MEC architecture follows the European Telecommunications Standards Institute (ESTI) reference (https://portal.etsi.org/, accessed on 8 February 2024) as Figure 3, where the MEC servers (edge servers) act as filters to hand the data flows from the mobile device to the cloud. Because not all edge devices are adequate to become edge servers [18,19,20], here only h 1 and h 2 are selected.
Using PaaS technology, service instances can be placed on any accessible MEC server that has sufficient resources. In this scenario, service s 1 is deployed on two individual service instances, namely, MEC servers h 1 and h 2 , while only one instance of service s 2 is deployed on h 2 . Each SDN-enabled edge device has its own flow table [21], represented by matrix-like forms near the edge devices (as shown in Figure 2). These flow tables indicate the routing of service requests. For instance, the entry ( s 1 : h 1 ) , ( s 2 : m 4 ) in the flow table near m 1 signifies that requests for s 1 are routed to h 1 by m 1 , while requests for s 2 are routed to m 4 . It is worth noting that ⌀ is used in this example to indicate that requests are processed by the service instance on the corresponding edge device; consequently, only MEC servers with the deployed service have ⌀ in their flow tables. In this case, the workloads of the instances for s 1 are unbalanced, as no requests for s 1 are dispatched to h 2 , resulting in the idle state of the service instance on h 2 , while the instance on h 1 handles all the requests. Thus, there are several potential optimizations of this system. For instance, when the instance on h 1 is capable of handling all the requests, the service instance of s 1 on h 2 can be released to reduce costs. Additionally, the flow table of m 2 can be modified from ( s 1 : h 1 ) to ( s 1 : h 2 ) in order to offload some of the workload from h 1 to h 2 for load balancing. Choosing between these operations depends on the present system state as well as the performance and cost requirements of the operator. Therefore, the objective of this paper is to quantify performance and cost while considering strategies for service deployment and network management (e.g., flow tables) as decision variables. The aim is to identify the optimal strategy for satisfying both performance and cost requirements.

3. Literature Review

3.1. Service Deployment in Edge Environments

As the evolution of MEC technology continues, the issue of service deployment has become increasingly important. An effective service deployment or placement strategy serves a dual purpose, balancing the workloads of high-load servers while ensuring the quality of service required by users. Many researchers have focused on studying service deployment strategies on edge servers. The main aim has been to improve the service hit rate on edge servers by optimizing service deployment, thereby reducing the average response time of services.
For instance, researchers have explored service deployment in industrial IoT-based MEC environments. Borsatti et al. introduced an automated deployment framework tailored for Industrial IoT applications, harnessing the capabilities of proximity computing platforms such as edge and fog environments. Their implementation showcased the swift conversion of industrial IoT applications to services based on MEC, covering a range of technological fields in mere seconds [22]. Although IoT plays a significant role, many researchers are also concerned with the cooperation of internal nodes. Lv et al. investigated the impact of service interactions and the resulting reduction in service performance due to increased node loads. They modeled service interactions as a communication overhead graph and introduced an approach using deep Q-learning to address the multi-objective service deployment problem. The goal was to control communication overhead and balance node load [23]. Regarding service deployment costs, Sriraghavendra et al. proposed a novel multilayer deadline-aware service placement architecture that comprehensively considers service response time and resource overhead [24]. Wang et al. proposed a microservice-oriented service placement mechanism to optimize resource utilization and reduce service latency in sustainable Internet of Vehicles (IoV) contexts supported by MEC [25]. Tang et al. introduced a two-time-scale hierarchical framework for jointly optimizing service deployment and task scheduling in satellite edge computing networks to enhance the network’s computational performance [26].
Compared to the aforementioned methods, many studies have also focused on designing efficient service chain deployment strategies to optimize the way in which services are provided. Zhang et al. proposed a framework called Dapper that uses Deep Reinforcement Learning (DRL) to deploy service function chains in programmable data planes [27]. Addressing the impact of heterogeneous devices on deployment and management in edge computing environments, Huang et al. proposed a service function chain deployment strategy that considers device heterogeneity, then optimizes the placement of service function chains to minimize service latency and improve resource utilization and energy efficiency [28]. While the above works focus on optimizing objectives such as service response time and resource utilization, they overlook the impact of service deployment on quality of service.

3.2. Network Management in Edge Environment

Network traffic management is also a significant challenge in MEC environments. In smart city scenarios, a large number of edge devices simultaneously sending service requests may cause network congestion, leading to degraded service quality and reduced data transmission efficiency. Mavromatis et al. developed a management framework for MEC-enabled IoT systems for multi-domain wireless sensor networks that was grounded in a software-defined network architecture. Their proposed dynamic framework offers continual detection for sensor faults. [29]. Bellavista et al. conducted research on application-aware network traffic management in MEC-integrated industrial environments by combining SDN and edge computing, leveraging eINP to achieve higher packet load processing capabilities [30]. To address the issues of high data traffic and latency in smart city scenarios, Saleem et al. proposed an Adaptive Information-Centric Networking–Edge Computing Framework (AICN-ECF), introducing network caching into the information-centric networking to enhance content delivery and improve user experience [31].
Compared to the aforementioned approaches, many recent studies have utilized deep learning for traffic management. Kim et al. focused on IoT device traffic and queuing delays, exploring innovative self-learning network management algorithms at edge nodes. They introduced a method hinging on deep reinforcement learning stratagems, incorporating a modulatory factor into the reward equation in order to strike a balance between queuing delay and data throughput [32]. Song et al. proposed a low-power active queue management algorithm based on deep reinforcement learning for IoT sensor networks, thereby optimizing information freshness to achieve traffic management [33]. Absardi et al. introduced a novel deep learning-based traffic management algorithm designed to predict alternative optimal paths containing specified nodes in IoT-pervasive environments [34].
Although there has been a significant amount of research on network traffic management and service deployment in edge environments, very few existing studies have combined these two directions for joint optimization. As a result, the aforementioned research on network management and service deployment cannot address the problem proposed in this paper, namely, optimizing service deployment and network traffic management strategies in order to balance system performance and cost while ensuring QoS.

4. System Model and Problem Description

This section explores the key related entities and how they connect with each other, showing the effect these connections have on the system’s state.

4.1. Introduction to System Entities

In this study, we investigate a crowd sensing service system based on MEC in which SDN is employed to manage the communication of edge devices. The primary goal is to pinpoint the optimal MEC servers for placing services and to create flow tables designed to ease possible network congestion. We represent the edge nodes or devices that may be chosen for MEC server deployment as H = { h 1 , , h N } . We denote the remaining edge nodes, which function as SDN switches, as  M = { m 1 , , m K } . For the purpose of this study, we designate wireless routers or base stations as our access points and represent these access points as A = { a 1 , a 2 , , a Q } , considering A as the collection of access points. Each a q A is responsible for connecting with mobile devices and receiving their requests. The array of services provided by the crowd sensing system based on MEC is represented as S = { s 1 , s 2 , , s W } , with each service s w S capable of being deployed and instantiated on any h n H . In particular, we define the set V = { h 1 , , h N , m 1 , , m K , a 1 , , a Q } to encompass all devices capable of dispatching requests, where | V | = N + K + Q . The topology of the MEC-based crowd sensing service system network is represented as V . The topology is calculated using Z { 0 , 1 } | V | × | V | , where for v , u V we have
Z v , u = 1 , v is connected with u 0 , otherwise .

4.2. System QoS Analysis

Given the aforementioned examples and definitions, we are equipped to begin evaluating the QoS and performance exhibited by the MEC-based crowd sensing service system. Specifically, we examine the average processing time of mobile device requests along with their resource consumption. If a service instance is situated on an MEC server that cannot be accessed, we may consider that such instances do not contribute to the processing of requests in these circumstances. As a result, the implementation of service deployment strategies and network management techniques is deemed to have minimal significance for these particular requests. Therefore, we divide the MEC-based crowd sensing service system into several connected subgraphs based on the value of Z , which are denoted as { Z 1 , Z 2 , , Z j , , Z B } . This division enables us to disregard extraneous details, permitting us to concentrate solely on examining the device behaviors pertinent to the specified request within a singular subgraph. For clarity and consistency, the notation in the rest of this paper omits the superscript j in the performance–cost analysis of Z j .

4.2.1. Wireless Transmission

For service requests pertaining to s w (including the collected data) produced from mobile devices in the vicinity of a q at a rate of λ q , w qps, the required duration for wireless data transfer between a mobile device and the access point is depicted as
t q , w W = d w v q ,
where v q represents the mean rate of wireless data transmission.

4.2.2. Request Routing

When the access point receives the service request of s w , it initiates a journey through the SDN switches until it reaches the target service instance of s w . The flow tables within the SDN switches and MEC servers can determine the routing of requests. However, in contrast to the example provided in Section 2, we can consider all flow tables to be represented using a tensor. This tensor P { 0 , 1 } W × | V | × | V | is denoted as
P w , v , u = Z v , u , v dispatches s w s request to u 0 , otherwise .
The deployment status of a service instance can be denoted by a matrix. This matrix Y { 0 , 1 } W × | V | is represented as
Y w , v = 1 , v H and s w is deployed on v 0 , otherwise .
Due to resource constraints, the MEC server cannot accommodate an infinite number of service instances. Under the limitation of service instances, we can assume that an MEC server v V can accommodate a maximum of Y v service instances and Y v W . For every server v V , we have the following constraint:
s w S Y w , v Y v .
Assuming that the service instance of any given service is deployed only once on an MEC server and that flows do not possess multiple destinations, we can deduce the following conclusion:
u V P w , v , u = 1 Y w , v , s w S .
Given the presence of a flow table tensor P for the system, it is possible to identify the target device for the service s w emanating from the edge device v by using P . This representation is signified by Ψ P ( w , v ) and is an element of the set V . By analyzing P , we can obtain a set of routing paths p = p w , q ( s w S , a q A ). These routing paths indicate the order of nodes that a request visits for service s w :
p w , q = < v w , q 1 , v w , q 2 , , v w , q l w , q >
where v w , q 1 = a q , v w , q i + 1 = Ψ P ( w , v w , q i ) and Y w , v w , q l w , q = 1.
Given the network’s prohibition of loops, the ensuing constraint is required to be in effect for ( s w , a q ) S × A and for any v w , q i , v w , q j within p w , q :
v w , q i v w , q j , i j .
The total time cost of routing can be appraised as follows:
t w , q R = i = 1 l w , q 1 d w Φ ( v w , q i , v w , q i + 1 )
for all u , v V , with the average data transmission rate between edge devices u and v denoted by Φ ( u , v ) .

4.2.3. Service Execution

When the MEC server receives the requests, it activates the relevant service instance for execution. Here, the mean rate at which service s w processes data is represented by μ w , while the time cost of processing is represented as
t w E = d w μ w .
In summary, the overall lifespan of a service request s w received from access point a q can be estimated as follows:
t w , q = t w , q W + t w , q R + t w E = d w 1 v q + 1 μ w + i = 2 l w , q 1 Φ ( v w , q i 1 , v w , q i ) .
When service s w requests are received at a rate of λ w , q qps near access point a q , the anticipated duration of a request’s lifetime, i.e., the mean time expense, is
T ¯ ( P , Y ) = a q A s w S λ w , q t w , q a q A s w S λ w , q .
With Equation (11), this can be transformed to
T ¯ ( P , Y ) = a q A , s w S λ w , q d w 1 v q + 1 μ w + i = 2 l w , q 1 Φ ( v w , q i 1 , v w , q i ) a q A s w S λ w , q = τ W + τ E Λ U + 1 Λ U a q A s w S i = 2 l w , q λ w , q d w Φ ( v w , q i 1 , v w , q i ) ,
where the constant τ W = a q A s w S λ w , q d w v q stands for the average wireless transmission time and  τ E = a q A s w S λ w , q d w μ w is the average processing time.

4.3. System Cost Evaluation

Now, we can measure the overall cost of the MEC-based crowd sensing service system considering a given flow table strategy P and service placement strategy Y . The cost comprises two components: monetary expense and balancing loss.
Budget Surplus. The budget surplus represents the difference between the allocated budget and the monetary expense incurred by utilizing edge device resources [35,36]. The monetary expense is determined by the pricing models employed by infrastructure vendors [9]. Here, we also utilize the linear model to determine the pricing for allocating resources to service instances. As a result, the budget surplus is computed as
C ( Y ) = | V | s w S β w s w S v V β w Y w , v ,
where β w is the unit price of instance s w . The value of β w is consistently influenced by maintenance costs, R&D costs, and electricity costs.
Balancing Gain. It is widely acknowledged that unbalanced allocation of resources can result in wasteful inefficiencies. In this study, we focus on the MEC-based crowd sensing service system and examine the balance between network resources and computation resources. Specifically, we investigate the extent of imbalance between these resources. The metric employed for assessing the network connectivity efficacy between a pair of edge devices ( v , u ) is the total throughput γ v , u :
γ v , u = a q A s w S d w λ w , q I [ Ψ P ( w , v ) = u ] · I [ v p w , q ]
where I [ expr ] { 0 , 1 } is the indicator that checks whether the expression expr is true (=1) or not (=0). Consequently, the degree of network imbalance is
γ N ( P , Y ) = V a r ( { γ v , u } v , u V ) .
In a parallel context, the service instances which leverage the computational resources of MEC servers exhibit a level of service s w imbalance that can be assessed using the following formula:
σ w = V a r ( { Y w , v } v H ) .
The cumulative unbalancing of the computational resources can be quantified as
γ S ( P , Y ) = s w S σ w .
Summing these measures allows us to assess the balancing gain:
L ( P , Y ) = L 1 γ N ( P , Y ) + L 2 γ S ( P , Y ) .

4.4. Problem Formulation

Upon introducing the aforementioned constraints, the objective becomes the quotient of system performance to system cost (the cost–performance ratio):
ρ ( P , Y ) = T ¯ ( P , Y ) α C C ( Y ) + α L L ( P . Y )
Now, we can present a precise and formal definition of our problem involving traffic management and service deployment within the MEC-based crowd sensing service system:
min P , Y ρ ( P , Y ) s . t . s w S Y w , v Y v u V P w , v , u = 1 Y w , v l w , q | V | , a q A , s w S Y w , v w , q l w , q = 1 , a q A , s w S .
Note that the no-loop constraint is translated into l w , q | V | , as a possible path without loops can only contain at most | V | nodes.
The important notation is summarized in Table 1.

5. Metaheuristic Algorithm for QST

The Genetic Algorithm (GA) is a well-established family of metaheuristic algorithms inspired by the natural selection process. GAs simulate evolution to solve optimization problems [37]. First, a GA evaluates a population by using a fitness function that describes how well an individual in the population adapts to the environment, then simulates how a solution contributes to the minimization of a given objective. Through iterative selection and filtering of the most adaptive characteristics, the quality of solutions is gradually enhanced. The converged solutions can then be adopted as the optimal final solutions. Based on the considerations above, in this paper we propose the GA4QST algorithm for solving the joint optimization problem of service deployment and traffic management (QST) by improving the GA framework. The flow of the proposed algorithm is shown in Algorithm 1, with an elite model specifically introduced to ensure the algorithm’s convergence [38]. In Algorithm 1, the function selectElite is used to ensure that the optimal solution is retained in each iteration. The subsequent sections delve into the details of the proposed algorithm at different stages.
Algorithm 1: GA for QST, GA4QST
Symmetry 17 00718 i001
(1)
Encoding and Initialization. In this phase, our objective is to represent our solution as a series of binary digits, commonly referred to as chromosomes, which is a term borrowed from biology where chromosomes carry genetic information and represent individuals. In this study, because Y and P are 0–1 (binary) variables, it is unnecessary to make an additional effort to encode chromosomes or solutions. After the encoding is established, we proceed to initialize the population, as shown in Algorithm 2. Typically, a large number of possible chromosomes are randomly generated (CI in line 3 of Algorithm 2) to form an initial population. The random generation is aimed at covering a wider solution space. However, because our problem imposes constraints on the solutions, the initialization cannot be random. On the contrary, we employ Algorithm 3 to initialize a valid solution. Initially, it randomly chooses an available h n H that is able to accommodate more than one service instance for each involved service s w S , ensuring the existence of all services (Algorithm 3, lines 3–5). Subsequently, it considers different service deployment strategies, where certain services may have multiple instances (Algorithm 3, lines 6–9). During this phase, a hyperparameter proby is used to control the number of instances in the final service deployment strategy. The function randAvailableMECServer() selects the MEC server with the following probability:
P r ( h n ) = Y h n v H Y v .
Algorithm 2: Population Initialization, PI
Symmetry 17 00718 i002
Algorithm 3: Chromosome Initialization, CI
Symmetry 17 00718 i003
Finally, the routing paths { p w , q } s w S , a q A are determined (Algorithm 4, lines 5) by tracing the request of service s w from access point a q . In this phase, the function randPath( a q ,v) is used to randomly select a legal routing path that starts from a q and ends with v by sampling from the legal routing path set LP ( u , v ) , which is generated recursively by
LP ( u , v ) = Z u , u = 1 { u u , LP ( u , v ) } .
Note that in Equation (23) the neighbor of u (i.e.,  u ) is obtained by observing the value of Z u , u , which means that generation of LP ( u , v ) is performed offline in advance.
With N POP chromosomes or solutions initialized by Algorithm 3, the population initialization algorithm (Algorithm 2) is then completed by packing them up.
Algorithm 4: Routing Path Generation, RPG
Symmetry 17 00718 i004
(2)
Selection. The genetic algorithm operates through the process of generation updating, with each iteration representing a attempt to find new solutions. In each update, some of the existing solutions are chosen to reproduce and create a new solutions based on their fitness or qualities. In our research, where the goal is to minimize the cost–performance ratio ρ ( P , Y ) , the fitness function f in our approach can be defined as f ( y ) = ρ ( P , Y ) . Let ( P i , Y i ) represent the i-th chromosome in the population POP. The probability of selecting ( P i , Y i ) as a parent can be denoted as
P r ( ( P i , Y i ) ) = 1 / ρ ( P i , Y i ) j = 1 N POP 1 / ρ ( P j , Y j ) .
(3)
Crossover. After selecting the mother chromosome and father chromosome with probabilities P r ( ( P i , Y i ) ) , as shown in Equation (24), the partial values carried by the father solution are exchanged into the mother solution to generate new child solutions. This process is similar to the chromosome crossover shown in Figure 4a (https://open.lib.umn.edu/horticulture/chapter/14-3-linkage-and-inheritance-of-small-differences/, accessed on 1 January 2024). In the method proposed in this paper, the crossover of two solutions in Algorithm 5 stands for the exchanging of selected service instances and their network status.
Algorithm 5: Crossover
  Input:
         P f , Y f : the father solution
         P m , Y m : the mother solution
         Y : the capacity vector
  Output:
         P s , Y s : the son solution
          P d , Y d : the daughter solution
1  σ f { s w : { v | v H , Y w , v f = 1 } | s w S } ;
2  σ m { s w : { v | v H , Y w , v m = 1 } | s w S } ;
    /*  ( instances to be exchanged (         */
3  S 1 sample( S , Random(W));
4  S 2 S S 1 ;
    /*  ( separate solutions (             */
5  σ f , 1 { s w : { v | v H , Y w , v f = 1 } | s w S 1 } ;
6  σ f , 2 { s w : { v | v H , Y w , v f = 1 } | s w S 2 } ;
7  σ m , 1 { s w : { v | v H , Y w , v m = 1 } | s w S 1 } ;
8  σ m , 2 { s w : { v | v H , Y w , v m = 1 } | s w S 2 } ;
    /*  ( generate new children (           */
9  σ s , σ d σ f , 1 σ m , 2 , σ f , 2 σ m , 1 ;
    /*  ( child solution standardization (                          */
10  Y s , Y d makeMatrix( σ s ), makeMatrix( σ d );
    /*  ( heal the solutions (             */
11  P s , Y s SH( P f , Y s , Y );
12  P d , Y d SH( P m , Y d , Y );
For instance, given a father solution and a mother solution as shown in Figure 4b, the service deployment strategies are initially partially exchanged. After  s 3 is chosen as the crossover point, the target MEC servers of s 3 and s 4 from the two chromosomes are interchanged, yielding a son solution and a daughter solution. Correspondingly, the traffic is redirected. In the son solution, the requests on s 3 that were initially sent to the instances on h 2 or h 3 in the father solution are now directed to h 2 or h 1 . The requests pertaining to s 4 are now required to be sent to h 4 . However, it is important to note that not all service deployment strategy crossovers are valid, as the capacities of MEC servers may vary. For instance, the father solution and mother solution are valid when Y 1 = 2, Y 2 = 3, Y 3 = 1, Y 4 = 1; however, for the son solution, h 1 now carries three service instances ( s 1 , s 2 , s 3 ), while for the daughter solution h 2 now holds three service instances ( s 1 , s 3 , s 4 ), where 3 > Y 1 and 2 > Y 2 . Therefore, we need to heal the solutions generated during the crossover process, as outlined in Algorithm 6.   
Algorithm 6: Solution Healing, SH
Symmetry 17 00718 i006
The heal operation consists of three phases: service deployment violation healing (PVH), service deployment rearranging (SPR), and network rearranging (NetR). In the PVH step, invalid placements resulting from the crossover operation are addressed by removing instances that exceed the capacities of the MEC servers. The detailed procedure is described in Algorithm 7.
Algorithm 7: Placement Violation Healing, PVH.
Symmetry 17 00718 i007a
Symmetry 17 00718 i007b
When all service instances have been successfully deployed via PVH, they must be transferred to suitable MEC servers via SPR, as outlined in Algorithm 8.    
Algorithm 8: Service Deployment Rearranging, SPR
Symmetry 17 00718 i008
At last, relevant network management tasks such as adjusting the flow tables are carried out via NetR (see Algorithm 9).    
Algorithm 9: Network Rearranging, NetR
Symmetry 17 00718 i009
(4)
Mutate. Following crossover, the mutate operation is adopted to prevent premature convergence. In this phase, some segments of the solutions change with probability p m , which is referred to as the mutation probability. In our study, mutation can occur in two directions: positive and negative. The process is illustrated in Algorithm 10. In positive mutation, a random service instance s w is deployed on an available MEC server h n , then the relationship ( s w : h n ) is added to the flow tables for h n . Conversely, in negative mutation, a duplicate service instance s w is removed from a randomly selected MEC server h n , then the corresponding flow tables are reset.
Algorithm 10: Mutation
Symmetry 17 00718 i010a
Symmetry 17 00718 i010b

6. Experiments and Analysis

In this section, we evaluate the efficacy of the proposed approach by comparing its results with those of numerous baselines. Additionally, perform a deeper analysis to identify factors that could influence the outcomes of our proposed approach.

6.1. Preliminary

The proposed GA4QST algorithm was implemented using Python 3.8 on a computer with 5220R CPU, 128 GB memory, and Ubuntu 20.04. Due to the absence of standard platforms and widely used datasets, we performed the experiments with synthetic data. The process used to generation the synthetic data is detailed in Algorithm 11, while Table 2 presents the statistics of the data. The code for GA4QST will be thoroughly documented and subsequently released.
Algorithm 11: Generate experimental data
Symmetry 17 00718 i011

6.2. Baselines

The target problem is framed as a constrained nonlinear integer optimization problem, making it challenging to find either an analytical solution or numerical optima. Consequently, researchers often resort to metaheuristic algorithms when solving such problems. The primary advantages of metaheuristic algorithms lie in their ability to handle complex nonlinear problems and their strong global optimization capabilities. In light of this, we selected several representative metaheuristic baseline algorithms for comparison with our proposed GA4QST algorithm:
1.
Original Genetic Algorithm (GA). As described above, the original GA draws inspiration from the process of natural selection, simulating evolution to solve optimization problems. It assesses a population of solutions using a fitness function that describes how an individual within the population adapts to the environment. The GA iteratively selects and retains those components that currently perform better, thereby facilitating adaptation.
2.
Artificial Fish Swarm Algorithm (AFSA). Swarm algorithms are a family of gradient-free population-based algorithms designed to solve complex nonlinear problems. The key concept of the AFSA is to comparison the aquatic environment of a fish to the solution space of the target problem and use the analogy of a fish finding food in water to the search for an optimum solution. Typically, a fish finds food by individually observing the environment or following others. The AFSA obtains optima in a similar way [39].
3.
Particle Swarm Optimization (PSO). The PSO algorithm is a population-based technique comprising numerous particles or agents. By shifting these particles or agents within the search space based on their current positions and velocities, they eventually reach the optimal position and identify the best solution [40,41].
4.
Differential Evolution (DE). DE is a population-based metaheuristic iterative search algorithm used for non-convex optimization problems. Unlike traditional real-coded genetic algorithms and evolution strategies, DE employs a mandatory self-referential mutation for its population members. Each member is perturbed with the scaled difference of individuals from the current generation [42].
These classical metaheuristic algorithms are generally capable of handling complex nonlinear problems to a large extent; however, they often face certain limitations when dealing with high-dimensional problems [43]. As the dimensionality of the problem increases, the characteristics of the objective function become more complex, making it difficult for the algorithms to efficiently explore the entire solution space. This paper aims to optimize service deployment and network traffic management while ensuring QoS. Due to the complexity and high-dimensional nature of the problem, classical metaheuristic algorithms may struggle to achieve satisfactory results.

6.3. Comparison with Baselines

The line chart in Figure 5a displays the performance of the objective ρ ( P , Y ) across different algorithms. Based on the description of the system model in Section 4, it is clear that the optimization goal is to minimize the objective function ρ ( P , Y ) . A smaller value of the objective function ρ indicates a better tradeoff between system performance and cost. It is evident that GA4QST outperforms the baselines as the population evolves, particularly when the settings are held constant across all approaches. The primary reason behind this advantage lies in the superior exploration ability of GA4QST. Unlike the baselines, which quickly converge and cease to change after the 25th generation, GA4QST continues to update itself until the 79th generation. This continuous evolution facilitated by our carefully designed mutation and crossover operators ensures that GA4QST maintains the necessary constraints throughout the process. Consequently, GA4QST has a greater likelihood of discovering optimal solutions. Furthermore, it is worth noting that the differences among the baselines in the final results are relatively small, which confirms the general applicability of these metaheuristic methods in addressing such complex problems. The objective function ρ ( P , Y ) encompasses multiple metrics, including budget surplus, balancing gain, and average request time cost. Hence, it is essential to evaluate these metrics individually. Figure 5b presents the corresponding results, with the y-axis on the right indicating the time cost measured in seconds. Upon analysis, it becomes evident that the budget surplus achieved by GA4QST surpasses that of the baselines by approximately 27.6%. Additionally, the trends for balancing gains and average time costs exhibit similar patterns across all approaches. In particular, GA4QST lags behind the best-performing baseline by only 9.5% in terms of balancing gain and 4.8% in terms of average time cost. To sum up, the proposed GA4QST algorithm demonstrates the ability to achieve a balanced running environment at lower cost. Furthermore, the average time cost of the system remains within acceptable limits.
However, achieving better optimization results comes at a cost. The incorporation of complex operators in GA4QST for solution validation introduces additional computational burden, resulting in increased running time compared to the original GA. Figure 5c illustrates the progression of execution times for GA4QST and the comparative baseline algorithms as they collectively approach the optimal solution throughout the evolutionary process. The measure of the difference between the current solution X = ( P , Y ) and the optimal solution X o p t = ( P o p t , Y o p t ) is denoted by
d i s ( X , X o p t ) = ρ ( X ) ρ ( X o p t ) ρ ( X o p t ) ,
where ρ ( X ) represents the objective function value of X . The quantity 1 dis ( X , X o p t ) is utilized to measure the closeness of the obtained result to the optimal solution in Figure 5c. Comparing GA4QST with the original GA, it is evident that the runtime curve of GA4QST is positioned above that of GA, indicating that GA4QST requires more time to generate a solution for a given objective value. However, this tradeoff is deemed acceptable, as the two curves almost intersect when they both achieve 60% of the optimal solution. This implies that in a case where a 60% near-optimal solution is sufficient, GA4QST can achieve a similar time cost. Additionally, GA4QST stands out as the only algorithm capable of surpassing the 60% optimality “barrier” that represents the best achievable result among the baseline algorithms.
To assess the resilience of the proposed algorithm, 1000 independent runs were conducted for each algorithm. The results are presented as a violin graph in Figure 5d. The violin plot is a method for visualizing continuous data, showcasing the distribution of the objective function values ρ ( P , Y ) across different algorithms after 1000 independent runs. A smaller value of the objective function ρ indicates a better tradeoff between system performance and cost. In the violin plot, the white dot represents the median, reflecting the central tendency of the data. The width of the violin plot corresponds to the density of the data distribution for each algorithm; wider regions indicate higher frequencies of results within that range, suggesting greater fluctuations in outcomes across multiple experiments. Notably, GA4QST exhibits remarkable ability to reach the optimum solution. Compared to the baselines, the violin graph for GA4QST is narrower and more concentrated in the lower-value region, indicating that the algorithm consistently achieves near-optimal solutions across most runs. The medians of the baseline algorithms are significantly higher than the median of GA4QST; even the SA algorithm, which exhibits the best robustness among the baselines, has a median value higher than GA4QST. These results further confirm the effectiveness and potential applicability of GA4QST in real-world scenarios.

6.4. Impact of System Properties

The comparisons mentioned above highlight the effectiveness of our proposed GA4QST algorithm in optimizing budget surplus while balancing the gains and average time costs of requests. In addition to comparing GA4QST with the baseline algorithms, we explored the impact of various factors associated with GA4QST from the service, server, and network perspectives.

6.5. Impacts of Service

(1)
Service Diversity. The service diversity (W) quantifies the complexity of the tasks handled by the system. To explore the impact of W on the results of GA4QST, we kept the same system settings as in Table 2 and varied the value of W. Figure 6(a.1) shows that the objective function value ρ ( P , Y ) increases as W grows. Conversely, in Figure 6(a.2) we can observe a close relationship between the budget surplus, balancing gain, and average time cost regardless of the value of W. This can be attributed to the limited availability of resources. When the system must handle a larger number of services, it becomes more challenging to achieve a good balance of performance and cost.
(2)
Data Size. The data size, denoted as d in this paper, represents the throughput of the system. To investigate the impact of d, the system settings were kept the same as in Table 2 during the experiment while varying the value of d. As shown in Figure 6(b.1), the objective function value ρ ( P , Y ) increases as d increases. This indicates that the optimization target deteriorates as the system becomes progressively overloaded. The details are illustrated in Figure 6(b.2). Specifically, it can be observed that the average time cost exhibits a nearly linear increase due to the proportional relationship between d w and t q , w W . Moreover, the balancing gain decreases as the system faces additional challenges in efficiently processing heavy traffic. It is worth noting that the budget surplus exhibits fluctuations in this figure, indicating that cost is no longer the primary factor contributing to the final objective when the traffic becomes heavier.
(3)
Processing Capacity. The processing capacity μ is indicative of the construction cost of the underlying infrastructure, as higher processing capacity often requires higher-quality hardware. To examine the impact of μ on the results, we maintained the system settings specified in Table 2 while varying the value of μ . In Figure 6(c.1), it is evident that the objective function value ρ ( P , Y ) decreases as μ increases. However, a diminishing marginal effect becomes apparent when μ reaches a certain threshold. Because improving processing capacity entails significant expenses, it is not advisable to overspend on this aspect. Figure 6(c.2) reveals that the optimization of ρ ( P , Y ) is primarily driven by the improvement in average time cost when μ 16 MB/s. Conversely, when μ 20 MB/s, the balancing gain assumes a more prominent role. This is because increasing μ beyond a certain level does not substantially reduce the average time cost, instead enabling the system to manage traffic scheduling more flexibly.
(4)
Deployment Cost. The deployment cost β represents the rental cost for developers, and is sometimes related to the value of μ in the same system. In Figure 6(d.1), it can be observed that the increase in deployment cost leads to a larger value of ρ ( P , Y ) , indicating a worse optimization outcome. The changes in C ( Y ) , L ( P , Y ) , and  T ¯ ( P , Y ) depicted in Figure 6(d.2) shed light on the relationship between the decrease in ρ ( P , Y ) and the tradeoff between average time cost and balancing gain. Both factors vie for the available resources, with the average time cost typically exerting a greater influence due to its higher weight in the calculation of ρ ( P , Y ) .

6.6. Impacts of Server

(1)
Server Density. The server density, denoted as ξ = N | V | , represents the percentage of edge servers in the device pool, and primarily reflects the parallelism of the system. In Figure 6(e.1), we can observe that an increase in server density leads to a better value of ρ ( P , Y ) , indicating an improved optimization outcome. However, the main contribution to this improvement can be attributed to the average time cost, as demonstrated in Figure 6(e.2). A higher server density facilitates better optimization results when the balancing gains are similar, such as at ξ = 71%, 57%, and 43%. Additionally, the budget surpluses show an upward trend in these cases.
(2)
Available Resources. The available resource metric Y represents the storage capacity of an edge server, which may have a partial effect on the value of β . In Figure 6(f.1), it can be observed that an increase in available resources leads to a decrease in the value of ρ ( P , Y ) , indicating an improvement in the optimization outcome. Similarly, in Figure 6(f.2) we can see that the contribution to this improvement primarily stems from the average time cost. This can be attributed to the fact that the edge servers can accommodate a greater number of service instances when there are more available resources, leading to better optimization results.

6.7. Impacts of Network

(1)
Wireless Transmission Rate. The wireless transmission rate v reflects the quality of communication between mobile IoT devices and the system. Figure 6(g.1) illustrates that an increase in the wireless transmission rate leads to a better value of ρ ( P , Y ) . This improvement can be attributed to the fact that a higher wireless transmission rate reduces the value of t q , w W . However, it is interesting to see that t q , w W is not linear with v, resulting in a nonlinear improvement in the optimization outcome. Similarly, in Figure 6(g.2) it can be observed that an increase in v also leads to a reduction in budget cost. This is because in most cases the time cost of a request is dominated by the transmission time. Therefore, improving the wireless transmission rate reduces the overall cost associated with the transmission process.
(2)
Connection Density. The connection density, denoted as χ = u , v Z u , v | V | ( | V | 1 ) , reflects the level of connectivity, and describes the system’s ability to efficiently handle traffic. In Figure 6(h.1), we can observe that an increase in the connection density does not necessarily lead to a better value of ρ ( P , Y ) . The relationship between the two is not straightforward. We can further examine the reasons behind this observation in Figure 6(h.2). Here, both the average time cost and balancing gain show improvements, suggesting that an increase in connections provides more opportunities for the system to optimize communication and accelerate response times. However, it is important to note that these improvements come at a cost. The decrease in the budget surplus is almost linear with the increase in χ due to the deployment of more service instances.
(3)
Request Rate. The request rate λ reflects the popularity or total load of the services. Figure 6(i.1) reveals that a heightened rate of requests results in an elevation of the optimization goal’s value. This is reasonable, as an increase in external requirements can strain the system’s capabilities. In Figure 6(i.2), it can be seen that the GA4QST algorithm maintains similar budget usage while adjusting the average time cost and balancing gain as the request rate λ changes. Furthermore, by observing the trends of the balancing gains in Figure 6(i.2), we can deduce that the GA4QST algorithm prioritizes the balancing gain as a lower optimization target when dealing with increasing values of λ . Therefore, if we want emphasize the importance of the balancing gain, this would require assigning it a higher weight during the optimization process.
(4)
Wired Transmission Rate. The wired transmission rate, denoted as Φ in this paper, reflects the quality of communication between edge devices. In Figure 6(j.1), we can observe that the value of ρ ( P , Y ) decreases as the wired transmission rate increases. This is because a higher wired transmission rate reduces the value of t w , q R , resulting in improved optimization outcomes. However, it is important to note that the relationship between t q , w R and Φ is inversely proportional, leading to a nonlinear improvement in the optimization outcome. Similarly, in Figure 6(j.2) we can observe that increasing Φ can potentially reduce the budget cost. This is because in most cases the time cost of a service request is dominated by the transmission time. Therefore, improving the wired transmission rate can lead to a reduction in the overall cost associated with the transmission process.

7. Conclusions and Future Work

In summary, this study has investigated the impact of service deployment and traffic management strategies on average response times of service requests, financial expenditure, and system resource balancing. To achieve optimal performance at minimal cost, we have introduced a specialized evolutionary algorithm called GA4QST. This algorithm incorporates unique operators to generate appropriate service deployment and traffic management strategies. Experimental results using synthetic data demonstrate that GA4QST outperforms other baseline approaches in terms of performance.
In large-scale edge server scenarios, the use of appropriate strategies for service deployment and traffic management can enhance system performance and resource utilization. In smart city scenarios, for example, many smart home devices can act as edge servers to handle smaller tasks. This approach can improve overall service quality and reduce latency.
While the proposed approach in this study exhibits strong performance, it is important to acknowledge that real-world scenarios become more intricate when considering service redundancy. With the increasing adoption of Software as a Service (SaaS) techniques, there may be multiple available services that offer the same functionality, which necessitates careful selection among these services. The current research primarily focuses on establishing a model for deploying services on the optimal edge server within a steady time slot. However, many additional factors affect this problem in real-world scenarios, such as service priority and the speed of data transmission between edge servers across different time slots. In future research, we plan to analyze how these factors influence service provisioning in MEC environments.

Author Contributions

Problem analysis: Z.X.; GA4QST algorithm design: Z.X. and F.Y.; conducting the experiments in Section 6: H.Y.; feasibility analysis, modeling discussion, and problem formulation: Y.X., Z.Z. and Y.Z.; writing—original draft preparation: Z.X. and F.Y.; writing—review and editing: Z.X. and Y.Z.; proofreading the manuscript: Y.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by the National Science and Technology Major Project (2022ZD0119103) and the National Natural Science Foundation of China (No. 62102350, 62072402).

Data Availability Statement

The experimental data and simulation results that support the findings of this study are available in https://github.com/xiangzz/GA4QST (accessed on 31 May 2024).

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
MECMulti-access Edge Computing
mMTCMassive Machine-Type Communication
PaaSPlatform as a Service
QoSQuality of Service
QSTQoS-effective Joint Service Deployment and Traffic Management Problem
ESTIEuropean Telecommunications Standards Institute
SDNSoftware-Defined Network
IoTInternet of Things
IoVInternet of Vehicles
BPSOBinary Particle Swarm Optimization
GAGenetic Algorithm
GA4QSTGenetic Algorithm for QoS-effective Service Deployment and Traffic Management
PIPopulation Initialization
CIChromosome Initialization
RPGRouting Path Generation
SHSolution Healing
PVHPlacement Violation Healing
SPRService Deployment Rearranging
NetRNetwork Rearranging
AFSA      Artificial Fish Swarm Algorithm
PSOParticle Swarm Optimization
DEDifferential Evolution
SaaSSoftware as a Service

References

  1. Badidi, E.; Moumane, K.; El Ghazi, F. Opportunities, applications, and challenges of edge-AI enabled video analytics in smart cities: A systematic review. IEEE Access 2023, 11, 80543–80572. [Google Scholar] [CrossRef]
  2. Lu, S.; Lu, J.; An, K.; Wang, X.; He, Q. Edge computing on IoT for machine signal processing and fault diagnosis: A review. IEEE Internet Things J. 2023, 10, 11093–11116. [Google Scholar] [CrossRef]
  3. Walia, G.K.; Kumar, M.; Gill, S.S. AI-empowered fog/edge resource management for IoT applications: A comprehensive review, research challenges, and future perspectives. IEEE Commun. Surv. Tutor. 2023, 26, 619–669. [Google Scholar] [CrossRef]
  4. Hua, H.; Li, Y.; Wang, T.; Dong, N.; Li, W.; Cao, J. Edge computing with artificial intelligence: A machine learning perspective. ACM Comput. Surv. 2023, 55, 1–35. [Google Scholar] [CrossRef]
  5. Duan, K.; Fong, S.; Siu, S.W.; Song, W.; Guan, S.S.U. Adaptive incremental genetic algorithm for task scheduling in cloud environments. Symmetry 2018, 10, 168. [Google Scholar] [CrossRef]
  6. Cheng, X.; Lu, X.; Deng, Y.; Lu, Q.; Kang, Y.; Tang, J.; Shi, Y.; Zhao, J. Offloading Strategy for Forest Monitoring Network Based on Improved Beetle Optimization Algorithm. Symmetry 2024, 16, 1569. [Google Scholar] [CrossRef]
  7. Ye, J.; Jiang, Y. Data Integrity Verification for Edge Computing Environments. Symmetry 2024, 16, 1648. [Google Scholar] [CrossRef]
  8. Xiang, Z.; Deng, S.; Zheng, Y.; Wang, D.; Zhang, C.; Chen, Y.; Zheng, Z. Activate Cost-Effective Mobile Crowd Sensing with Multi-access Edge Computing. In Proceedings of the Communications and Networking: 15th EAI International Conference, ChinaCom 2020, Shanghai, China, 20–21 November 2020; Springer: Berlin/Heidelberg, Germany, 2021; pp. 78–97. [Google Scholar]
  9. Xiang, Z.; Deng, S.; Jiang, F.; Gao, H.; Tehari, J.; Yin, J. Computing power allocation and traffic scheduling for edge service provisioning. In Proceedings of the 2020 IEEE International Conference on Web Services (ICWS), Beijing, China, 19–23 October 2020; pp. 394–403. [Google Scholar]
  10. Siriwardhana, Y.; Porambage, P.; Liyanage, M.; Ylianttila, M. A survey on mobile augmented reality with 5G mobile edge computing: Architectures, applications, and technical aspects. IEEE Commun. Surv. Tutor. 2021, 23, 1160–1192. [Google Scholar] [CrossRef]
  11. Van Anh, D.; Chehri, A.; Quy, N.M.; Hue, C.T.M.; Nguyen, D.C.; Quy, V.K. An Software Defined Networking (SDN) Enhanced Edge Computing Framework for Internet of Healthcare Things (IoHT). In Proceedings of the GLOBECOM 2024—2024 IEEE Global Communications Conference, Cape Town, South Africa, 8–12 December 2024; pp. 415–419. [Google Scholar]
  12. Al-Hammadi, I.; Li, M.; Islam, S.M.; Al-Mosharea, E. Collaborative computation offloading for scheduling emergency tasks in SDN-based mobile edge computing networks. Comput. Netw. 2024, 238, 110101. [Google Scholar] [CrossRef]
  13. Al-Shareeda, M.A.; Alsadhan, A.A.; Qasim, H.H.; Manickam, S. Software defined networking for internet of things: Review, techniques, challenges, and future directions. Bull. Electr. Eng. Inform. 2024, 13, 638–647. [Google Scholar] [CrossRef]
  14. Yu, J.; Alhilal, A.; Zhou, T.; Hui, P.; Tsang, D.H. Attention-based QoE-aware digital twin empowered edge computing for immersive virtual reality. IEEE Trans. Wirel. Commun. 2024, 23, 11276–11290. [Google Scholar] [CrossRef]
  15. Elgarhy, O.; Reggiani, L.; Alam, M.M.; Zoha, A.; Ahmad, R.; Kuusik, A. Energy efficiency and latency optimization for IoT URLLC and mMTC use cases. IEEE Access 2024, 12, 23132–23148. [Google Scholar] [CrossRef]
  16. Zaman, M.; Puryear, N.; Abdelwahed, S.; Zohrabi, N. A review of IoT-based smart city development and management. Smart Cities 2024, 7, 1462–1501. [Google Scholar] [CrossRef]
  17. Xiang, Z.; Wang, D.; He, M.; Chen, Y. Dynamic System Reconfiguration in Stable and Green Edge Service Provisioning. Mob. Netw. Appl. 2023, 29, 1663–1679. [Google Scholar] [CrossRef]
  18. Mehta, A.; Verma, R.K. QoS-aware edge server placement for collaborative predictive maintenance in industrial internet of things. J. Supercomput. 2024, 80, 19324–19350. [Google Scholar] [CrossRef]
  19. Li, X.; Teng, M.; Bu, Y.; Qiu, J.; Qin, X.; Wu, J. Cooperation-based server deployment strategy in mobile edge computing system. Comput. Netw. 2025, 257, 110932. [Google Scholar] [CrossRef]
  20. Xue, H.; Xia, Y. Profit-aware Edge Server Placement based on All-pay Auction for Edge Offloading. In Proceedings of the 2024 IEEE/ACM 32nd International Symposium on Quality of Service (IWQoS), Guangzhou, China, 19–21 June 2024; pp. 1–2. [Google Scholar]
  21. Kuźniar, M.; Perešíni, P.; Kostić, D. What you need to know about SDN flow tables. In Proceedings of the International Conference on Passive and Active Network Measurement. PAM 2015; Lecture Notes in Computer Science. Springer: Berlin/Heidelberg, Germany, 2015; Volume 8995, pp. 347–359. [Google Scholar]
  22. Borsatti, D.; Davoli, G.; Cerroni, W.; Raffaelli, C. Enabling industrial IoT as a service with multi-access edge computing. IEEE Commun. Mag. 2021, 59, 21–27. [Google Scholar] [CrossRef]
  23. Lv, W.; Wang, Q.; Yang, P.; Ding, Y.; Yi, B.; Wang, Z.; Lin, C. Microservice Deployment in Edge Computing Based on Deep Q Learning. IEEE Trans. Parallel Distrib. Syst. 2022, 33, 2968–2978. [Google Scholar] [CrossRef]
  24. Sriraghavendra, M.; Chawla, P.; Wu, H.; Gill, S.S.; Buyya, R. DoSP: A deadline-aware dynamic service placement algorithm for workflow-oriented IoT applications in fog-cloud computing environments. In Energy Conservation Solutions for Fog-Edge Computing Paradigms; Lecture Notes on Data Engineering and Communications Technologies; Springer: Singapore, 2022; Volume 74, pp. 21–47. [Google Scholar]
  25. Wang, L.; Deng, X.; Gui, J.; Chen, X.; Wan, S. Microservice-oriented service placement for mobile edge computing in sustainable internet of vehicles. IEEE Trans. Intell. Transp. Syst. 2023, 24, 10012–10026. [Google Scholar] [CrossRef]
  26. Tang, Q.; Xie, R.; Fang, Z.; Huang, T.; Chen, T.; Zhang, R.; Yu, F.R. Joint Service Deployment and Task Scheduling for Satellite Edge Computing: A Two-Timescale Hierarchical Approach. IEEE J. Sel. Areas Commun. 2024, 42, 1063–1079. [Google Scholar] [CrossRef]
  27. Zhang, X.; Cui, L.; Tso, F.P.; Li, Z.; Jia, W. Dapper: Deploying Service Function Chains in the Programmable Data Plane Via Deep Reinforcement Learning. IEEE Trans. Serv. Comput. 2023, 16, 2532–2544. [Google Scholar] [CrossRef]
  28. Huang, Y.; Yao, T.; Lin, Z.; Shang, X.; Yuan, Y.; Cui, L.; Yang, Y. Efficient Service Function Chain Placement Over Heterogeneous Devices in Deviceless Edge Computing Environments. IEEE Trans. Comput. 2024, 74, 222–236. [Google Scholar] [CrossRef]
  29. Mavromatis, A.; Colman-Meixner, C.; Silva, A.P.; Vasilakos, X.; Nejabati, R.; Simeonidou, D. A software-defined IoT device management framework for edge and cloud computing. IEEE Internet Things J. 2019, 7, 1718–1735. [Google Scholar] [CrossRef]
  30. Bellavista, P.; Fogli, M.; Giannelli, C.; Stefanelli, C. Application-aware network traffic management in mec-integrated industrial environments. Future Internet 2023, 15, 42. [Google Scholar] [CrossRef]
  31. Jaber, M.M.; Ali, M.H.; Abd, S.K.; Alkhayyat, A.; Malik, R. Application of edge computing-based information-centric networking in smart cities. Comput. Commun. 2023, 211, 46–58. [Google Scholar]
  32. Kim, M.; Jaseemuddin, M.; Anpalagan, A. Deep reinforcement learning based active queue management for iot networks. J. Netw. Syst. Manag. 2021, 29, 1–28. [Google Scholar] [CrossRef]
  33. Song, T.; Kyung, Y. Deep-Reinforcement-Learning-Based Age-of-Information-Aware Low-Power Active Queue Management for IoT Sensor Networks. IEEE Internet Things J. 2024, 11, 16700–16709. [Google Scholar] [CrossRef]
  34. Absardi, Z.N.; Javidan, R. IoT traffic management using deep learning based on osmotic cloud to edge computing. Telecommun. Syst. 2024, 87, 419–435. [Google Scholar] [CrossRef]
  35. Lai, P.; He, Q.; Cui, G.; Chen, F.; Grundy, J.; Abdelrazek, M.; Hosking, J.G.; Yang, Y. Cost-effective user allocation in 5g noma-based mobile edge computing systems. IEEE Trans. Mob. Comput. 2021, 21, 4263–4278. [Google Scholar] [CrossRef]
  36. Stavrinides, G.L.; Karatza, H.D. An energy-efficient, QoS-aware and cost-effective scheduling approach for real-time workflow applications in cloud computing systems utilizing DVFS and approximate computations. Future Gener. Comput. Syst. 2019, 96, 216–226. [Google Scholar] [CrossRef]
  37. Xiang, Z.; Zheng, Y.; He, M.; Shi, L.; Wang, D.; Deng, S.; Zheng, Z. Energy-effective artificial internet-of-things application deployment in edge-cloud systems. Peer-to-Peer Netw. Appl. 2022, 15, 1029–1044. [Google Scholar] [CrossRef]
  38. Bhandari, D.; Murthy, C.; Pal, S.K. Genetic algorithm with elitist model and its convergence. Int. J. Pattern Recognit. Artif. Intell. 1996, 10, 731–747. [Google Scholar] [CrossRef]
  39. Tirkolaee, E.B.; Goli, A.; Weber, G.W. Fuzzy mathematical programming and self-adaptive artificial fish swarm algorithm for just-in-time energy-aware flow shop scheduling problem with outsourcing option. IEEE Trans. Fuzzy Syst. 2020, 28, 2772–2783. [Google Scholar] [CrossRef]
  40. Al Hilli, A.; Al-Ibadi, M.; Alfadhel, A.M.; Abdulshaheed, S.H.; Hadi, A.H. Optimal path finding in stochastic quasi-dynamic environments using particle swarm optimization. Expert Syst. Appl. 2021, 186, 115706. [Google Scholar] [CrossRef]
  41. Han, H.; Bai, X.; Han, H.; Hou, Y.; Qiao, J. Self-Adjusting Multi-Task Particle Swarm Optimization. IEEE Trans. Evol. Comput. 2021, 26, 145–158. [Google Scholar] [CrossRef]
  42. Ghosh, A.; Das, S.; Das, A.K.; Gao, L. Reusing the past difference vectors in differential evolution—A simple but significant improvement. IEEE Trans. Cybern. 2019, 50, 4821–4834. [Google Scholar] [CrossRef]
  43. Kamal, R.; Amin, E.; AbdElminaam, D.S.; Ismail, R. A Comprehensive Survey on Meta-Heuristic Algorithms for Feature Selection in High-Dimensional Data: Challenges, Applications, and Future Directions. In Proceedings of the 2024 International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC), Cairo, Egypt, 13–14 November 2024; pp. 84–90. [Google Scholar] [CrossRef]
Figure 1. Framework of MEC-based crowd sensing.
Figure 1. Framework of MEC-based crowd sensing.
Symmetry 17 00718 g001
Figure 2. Case illustrating the MEC-based crowd sensing service system.
Figure 2. Case illustrating the MEC-based crowd sensing service system.
Symmetry 17 00718 g002
Figure 3. A feasible form of data flow in an MEC-based crowd sensing system.
Figure 3. A feasible form of data flow in an MEC-based crowd sensing system.
Symmetry 17 00718 g003
Figure 4. (a) An illustration of chromosome crossover in biology and (b) an illustration of the crossover of two solutions in GA4QST.
Figure 4. (a) An illustration of chromosome crossover in biology and (b) an illustration of the crossover of two solutions in GA4QST.
Symmetry 17 00718 g004
Figure 5. (a) Variation of the objective function value ρ ( P , Y ) for different algorithms as the number of iterations increases; (b) changes in different metrics within the objective function for various algorithms, including the budget surplus C ( Y ) , balanced revenue L ( P , Y ) , and average request time cost T ¯ ( P , Y ) ; (c) progress of execution time for different algorithms as they approach the optimal solution throughout the evolutionary process; (d) data distribution of the objective function ρ ( P , Y ) for different algorithms after 1000 experimental runs.
Figure 5. (a) Variation of the objective function value ρ ( P , Y ) for different algorithms as the number of iterations increases; (b) changes in different metrics within the objective function for various algorithms, including the budget surplus C ( Y ) , balanced revenue L ( P , Y ) , and average request time cost T ¯ ( P , Y ) ; (c) progress of execution time for different algorithms as they approach the optimal solution throughout the evolutionary process; (d) data distribution of the objective function ρ ( P , Y ) for different algorithms after 1000 experimental runs.
Symmetry 17 00718 g005
Figure 6. Under different system parameters, the impact on the proposed GA4QST algorithm is as follows: (a) Under different numbers of services W: 1. Changes in the objective function value ρ of the GA4QST; 2. Changes in different indicators within the objective function of the GA4QST; (b) Under different service request data volumes d: 1. Changes in the objective function value ρ of the GA4QST; 2. Changes in different indicators within the objective function of the GA4QST; (c) Under different edge server processing capabilities μ : 1. Changes in the objective function value ρ of the GA4QST; 2. Changes in different indicators within the objective function of the GA4QST; (d) Under different edge server deployment costs β : 1. Changes in the objective function value ρ of the GA4QST; 2. Changes in different indicators within the objective function of the GA4QST; (e) Under different edge server densities ξ : 1. Changes in the objective function value ρ of the GA4QST; 2. Changes in different indicators within the objective function of the GA4QST; (f) Under restrictions on the maximum number of service instances per server Y : 1. Changes in the objective function value ρ of the GA4QST; 2. Changes in different indicators within the objective function of the GA4QST; (g) Under different wireless transmission rates v: 1. Changes in the objective function value ρ of the GA4QST; 2. Changes in different indicators within the objective function of the GA4QST; (h) Under different edge server connection densities χ : 1. Changes in the objective function value ρ of the GA4QST; 2. Changes in different indicators within the objective function of the GA4QST; (i) Under different service request arrival rates λ : 1. Changes in the objective function value ρ of the GA4QST; 2. Changes in different indicators within the objective function of the GA4QST; (j) Under different communication qualities of edge devices Φ : 1. Changes in the objective function value ρ of the GA4QST; 2. Changes in different indicators within the objective function of the GA4QST.
Figure 6. Under different system parameters, the impact on the proposed GA4QST algorithm is as follows: (a) Under different numbers of services W: 1. Changes in the objective function value ρ of the GA4QST; 2. Changes in different indicators within the objective function of the GA4QST; (b) Under different service request data volumes d: 1. Changes in the objective function value ρ of the GA4QST; 2. Changes in different indicators within the objective function of the GA4QST; (c) Under different edge server processing capabilities μ : 1. Changes in the objective function value ρ of the GA4QST; 2. Changes in different indicators within the objective function of the GA4QST; (d) Under different edge server deployment costs β : 1. Changes in the objective function value ρ of the GA4QST; 2. Changes in different indicators within the objective function of the GA4QST; (e) Under different edge server densities ξ : 1. Changes in the objective function value ρ of the GA4QST; 2. Changes in different indicators within the objective function of the GA4QST; (f) Under restrictions on the maximum number of service instances per server Y : 1. Changes in the objective function value ρ of the GA4QST; 2. Changes in different indicators within the objective function of the GA4QST; (g) Under different wireless transmission rates v: 1. Changes in the objective function value ρ of the GA4QST; 2. Changes in different indicators within the objective function of the GA4QST; (h) Under different edge server connection densities χ : 1. Changes in the objective function value ρ of the GA4QST; 2. Changes in different indicators within the objective function of the GA4QST; (i) Under different service request arrival rates λ : 1. Changes in the objective function value ρ of the GA4QST; 2. Changes in different indicators within the objective function of the GA4QST; (j) Under different communication qualities of edge devices Φ : 1. Changes in the objective function value ρ of the GA4QST; 2. Changes in different indicators within the objective function of the GA4QST.
Symmetry 17 00718 g006
Table 1. Symbol description.
Table 1. Symbol description.
SymbolsThe Physical Meaning of the Notations
NThe number of edge nodes or devices
KThe number of SDN switches
QThe number of access points
WThe number of services
H The set of edge devices or edge nodes
M The set of SDN switches
A The set of access points
S The set of services
V The set of all devices capable of dispatching requests
Z u , v The topology representation between device u and device v
Z j The j-th connected subgraph
a q The q - th access points
s w The w - th services
λ q , w The rate at which mobile devices in the vicinity of a q generate service requests related to s w
v q The mean rate of wireless data transmission
d w The size of wireless data transmission
P w , v , u The service s w is sent from v to u
Y w , v The service instance s w is deployed on v
Y v The maximum number of service instances that MEC server v can accommodate
Y The maximum number of service instances that an MEC server can accommodate.
Ψ P ( w , v ) The target device to which the service s w is directed after being sent from the MEC server v can be determined through the flow table tensor P
p w , q The sequence of nodes when requesting access to service s w from the access point a q
Φ ( u , v ) The average data transmission rate between edge devices u and v
t q , w W The time required for wireless data transmission between the mobile device and the access point
t w , q R The total time cost of routing for service s w
t w E The time it takes for service s w to process data
μ w The average rate at which service s w processes data
T ¯ ( P , Y ) The expected request lifecycle when service s w requests are received at the rate of l a m b d a w , q queries per second near access point a q
C ( Y ) Function of budget surplus
β w The unit price of s w instance
γ v , u The total throughput
γ N ( P , Y ) Function of the degree of network imbalance
γ S ( P , Y ) Function of cumulative imbalance of computing resources
L ( P , Y ) Function of the balancing gain
ρ ( · ) The ratio of system performance to system cost
ξ The server density
vThe wireless transmission rate
χ The edge devices connection density
λ Services request rate
Table 2. System configurations.
Table 2. System configurations.
ItemValueItemValue
m5n10
v j N (2, 0 . 2 2 ) MB/s B j , k N (80, 8 2 ) MB/s
d i I N (3, 0 . 3 2 ) MB d i O N (3, 0 . 3 2 ) MB
η j N (10, 1 2 ) $/MIPS μ j N (2, 0 . 2 2 ) × 10 5 MIPS
Λ j , i t N (10, 1 2 ) QPS w i N (2, 0 . 2 2 ) × 10 4 MI
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Xiang, Z.; Ying, F.; Yan, H.; Zheng, Z.; Zhang, Y.; Xu, Y. QoS-Effective and Resilient Service Deployment and Traffic Management in MEC-Based Crowd Sensing. Symmetry 2025, 17, 718. https://doi.org/10.3390/sym17050718

AMA Style

Xiang Z, Ying F, Yan H, Zheng Z, Zhang Y, Xu Y. QoS-Effective and Resilient Service Deployment and Traffic Management in MEC-Based Crowd Sensing. Symmetry. 2025; 17(5):718. https://doi.org/10.3390/sym17050718

Chicago/Turabian Style

Xiang, Zhengzhe, Fuli Ying, Hao Yan, Zengwei Zheng, Yufei Zhang, and Yueshen Xu. 2025. "QoS-Effective and Resilient Service Deployment and Traffic Management in MEC-Based Crowd Sensing" Symmetry 17, no. 5: 718. https://doi.org/10.3390/sym17050718

APA Style

Xiang, Z., Ying, F., Yan, H., Zheng, Z., Zhang, Y., & Xu, Y. (2025). QoS-Effective and Resilient Service Deployment and Traffic Management in MEC-Based Crowd Sensing. Symmetry, 17(5), 718. https://doi.org/10.3390/sym17050718

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop