Next Article in Journal
A Negative Emotion Recognition System with Internet of Things-Based Multimodal Biosignal Data
Previous Article in Journal
Inertial Measurement Unit-Based Real-Time Adaptive Algorithm for Human Walking Pattern and Gait Event Detection
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

The Markov Concept of the Energy Efficiency Assessment of the Edge Computing Infrastructure Peripheral Server Functioning over Time

1
Internet of Things Group, Institute of Theoretical and Applied Informatics Polish Academy of Sciences, Bałtycka 5, 44-100 Gliwice, Poland
2
Computer Science Department, Community College, King Saud University, Riyadh 11451, Saudi Arabia
3
Department of Mathematics Applications and Methods for Artificial Intelligence, Faculty of Applied Mathematics, Silesian University of Technology, ul. Akademicka 2A, 44-100 Gliwice, Poland
*
Author to whom correspondence should be addressed.
Electronics 2023, 12(20), 4320; https://doi.org/10.3390/electronics12204320
Submission received: 15 September 2023 / Revised: 15 October 2023 / Accepted: 16 October 2023 / Published: 18 October 2023
(This article belongs to the Section Computer Science & Engineering)

Abstract

:
The article is devoted to the research of the peripheral server energy consumption managing process defined based on the threshold policy by manipulating the values of the characteristic parameters of the arithmetic-logical complex of the latter. The research object is formalized by a Markov queue model with a single-threshold control scheme for the intensity of accepted requests service. A characteristic feature of the life cycle of a peripheral server is the non-stationary mode of operation in terms of energy consumption, due to the need to periodically poll the controlled sensor network and process the received data in real-time. To take into account this circumstance, the intensities of transitions in the heterogeneous birth-and-death Markov process of the created model are interpreted as non-random periodic functions of time. The resulting mathematical apparatus is summarized in the metric that allows us to estimate the target peripheral server’s energy consumption both at a specific moment and for a censored time interval (this distinguishes the obtained result from existing analogs).

1. Introduction

1.1. Research Background

When developing a network infrastructure, one usually considers either local computing or cloud computing. But these two options and their combinations are not enough. For example, what to do if you cannot refuse cloud computing, but there is not enough bandwidth or the traffic is too expensive? Add an intermediate link that will perform part of the calculations at the edge of the local network or production process. This modern edge concept is called Edge Computing [1,2,3,4,5] and harmonizes the current cloud data usage model.
As peripheral nodes in Edge Computing, the corresponding servers [6,7,8,9] are used, which are placed directly where information is produced. Usually, these are production or technical premises in which it is impossible to mount a server rack and ensure cleanliness. Considering such extreme placement conditions, peripheral server cases are made, first of all, protected from moisture and dust. At the same time, significantly less attention is paid to the organization of their cooling. Taking into account the last fact, the energy efficiency of the operation of such devices determines not only their efficiency but also their service life. Considering that the topology of sensor networks in which such peripheral servers are involved is constantly growing, the relevance of ensuring the energy efficiency of the latter is becoming an increasingly urgent task.
In the context of our study, the mechanisms for achieving the energy efficiency of computing elements are of greater interest. We will mention the most popular ones [1,2,3], namely the on-off method, the dynamic frequency scaling method (also known as CPU throttling), and the dynamic voltage scaling method. These methods reflect two real ways to reduce processor power consumption:
turn off some subsystems;
reduce frequency or voltage.
Operations aimed at implementing each of the mentioned ways to reduce power consumption are summarized in the corresponding instruction sets: C-states, and P-states.
C-states describe the first way to reduce processor power consumption, which is why they are called idle states. To disable a subsystem, nothing should be running on it. Thus, the C[X] C-state means that one or more processor subsystems, referred to as X, are disabled. P-states describe the second case. Processor subsystems are running but do not require maximum performance, so the clock speed and/or voltage for that subsystem may be reduced. Thus, P[X] P-state means that the computing subsystem operates at a set frequency, which corresponds to the ordinal number of state X (more on this below).
Let us mention the main C-states (defined in the Advanced Configuration and Power Interface (ACPI) standard [10] with subject comments:
C0: Active, the processor/core is executing instructions. The P-states are used here, the processor/core can work in maximum performance mode (P0) or power saving mode (in a state other than P0);
C1: Halt, the processor does not execute instructions, but can instantly return to the C0 state. Because the processor is idle, the P-states are not relevant for states different than C0.
P-states imply that the processor is in the C0 state because it needs the power to execute instructions. P-states allow us to change the frequency and voltage of the cores (in other words, the operating mode) to reduce power consumption. There is a set of P-states, each corresponding to other operating modes (frequency-voltage pairs). Most often, the choice of the P-state is implemented through the operating system. We can select the operating frequency (by specifying the appropriate P-state code), and the voltage is selected by the computational unit depending on the selected frequency and another factor. After the P-state is requested by writing to the unit-dependent register, the voltage is changed to the firmware-calculated value and the clock oscillator switches to a specified frequency. All computational unit cores share the same P-state. The P-state change is instantaneous, so a lot of transitions can be made per second. This is in contrast to C-state transitions, which take longer and require energy spending.
Having outlined a modern approach to managing processor power consumption using the policy of determining C- and P-states, we can make some generalizations in the context of the fact that our server is a peripheral computing element of an Edge Computing infrastructure. Such a peripheral server, on the one hand, periodically polls the sensor network it manages to collect data. On the other hand, it processes the collected data in real-time and sends the report to the cloud. Such a schedule of operation is remarkably implemented in the energy consumption policy C 3 P 0 (maximum performance in the active phase—maximum energy saving (hibernation) in the rest of the time). The problem is that at any time a request for an extraordinary data collection can be received from the cloud or instructions can be received to correct the schedule, and the peripheral server must respond as quickly as possible. Thus, the acceptable base C-state for the peripheral server is C0. If we talk about P-states, then in the active phase this is, of course, P0. In the waiting phase, this will be the P-state with the number N (the last number provided for the current processor model). Such a C 0 P 0 | C 0 PN scheme is known to researchers as a T policy which we will discuss in more detail below.

1.2. Related Works

Several concepts and related technologies have already been developed for server power management. It should be noted that each of them has its advantages and disadvantages. We will not make a detailed review of specialized technologies—this has already been performed by respected colleagues [11,12,13,14,15]. But let us, however, pay closer attention to two works. In the survey [16], the authors focus on an interesting class of terminal edge devices that operate in the mode of power consumption from batteries for most of their life cycle. The authors of [16] postulate that all processing and interpretation of data in such devices is performed in the cloud, which reduces the load on the computing platform and reduces the rate of battery discharge but determines significantly higher requirements for the quality of communications. At the same time, the authors of the mentioned survey single out the issue of energy efficiency of peripheral servers as especially important. As an obvious justification for the relevance of such researchers, the authors mention that about 33% of all energy dissipation in the world falls on cyber-physical systems involved in the manufacturing industry. In such systems, both the edge computing paradigm and the corresponding infrastructure, including peripheral servers, are actively used. Even if the latter accounts for a tenth of a percent of the total amount of dissipated energy, this is still a colossal value, even a slight decrease which will have a huge economic and environmental effect.
Investigating the phenomenon of energy consumption of computing elements and their complexes, scientists often resort to modeling the paradigm of queuing systems with different control schemes. In such a case, the researcher’s task is to find an appropriate control scheme for the components of the simulated computing device or their associated composition by analyzing the corresponding characteristics of the queuing system under certain initial conditions. Among the numerous scientific and applied works on this topic, it is worth noting the works [17,18,19,20,21,22] (systems with D policy), [19,23,24,25] (systems with N policy), [24,25,26,27,28] (systems with T policy). Despite the sufficient development of the subject area, research in this direction is constantly relevant. This is facilitated by the constant evolution of technological platforms on which modern computing, information and communication conglomerates are built.
We focus on describing the power consumption of a peripheral server based on a queuing system with a threshold policy. In this case, it is necessary to pay attention to the key parameters that characterize the efficiency of queuing systems that describe the functioning of computing subsystems. Among these parameters, we mention [29,30,31] the intensity of the outgoing flow of requests, the probability of servicing, the probability of losing requests, the average waiting time for requests in the queue, the average time the request stays in the system, the average queue length, the average number of busy service channels, the average number of requests in the system. The focus is on the properties of monotony and convexity (concavity) of these characteristics. This emphasis is due to the desire of researchers to determine simple approximating expressions for combinations of functional dependencies of these characteristics within given boundaries. At the moment, these dependencies are defined for many types of queuing systems [10,11,12,13,14,15,16], which does not negate the obvious fact that these parameters are not directly related to the power consumption characteristics of computing systems as such. As a result, it is difficult for engineers to interpret such mathematical models to evaluate the energy efficiency of real computing systems. A simple and unambiguously interpretable metric is needed, the formalization of which to describe the energy consumption of computing operations on a peripheral server is the focus of this article.
However, it will not be too categorical and we will unambiguously determine the closest analog for the research problem mentioned in the article. Article [27] is devoted to the issue of increasing the energy efficiency of the basic computing element of the Data Center, i.e., the server, due to the implementation of the mechanism of threshold control of the processor clock frequency. The authors of this article used a T policy M | M | 1 queuing system as the server model. According to this policy, if the total number of requests accepted by the model (to be processed target data packets) is less than T , then the intensity of their service is equal f 0 . When the total number of accepted requests is greater than or equal to T , then the intensity of their service instantly becomes equal f > f 0 . The T policy considered by the authors coincides with the usual threshold service intensity management strategy, which has been repeatedly described in the literature on queuing systems. Without focusing on the mathematical results obtained by the authors of [27] concerning the properties (monotonicity, convexity) of the main stationary characteristics of the model depending on the value of T , we focus our attention on the practical value of the mentioned article. It consists in formalizing the transition from the mathematical model to the energy efficiency characteristics of the server. Also, the mentioned article presents the results of computational experiments (the dependence of the average power consumption in the stationary mode on the corresponding controlled parameters). All the results presented in [27] were obtained under the assumption that both the intensity of request receipt and the intensity of their service do not depend on time. This limitation is easily explained by the fact that the Data Center server operates in a mode close to stationary. It is this circumstance that does not allow us to describe the life cycle of a peripheral server in terms of the mathematical apparatus described in the mentioned article. Despite this, the study of the issues raised in the mentioned article regarding the investigation of the energy efficiency of a peripheral server is of undoubted interest. In this case, we will need to take into account that in the model we create, the intensities will be non-random functions of time. It is this mode of operation that is typical for a peripheral server, the life cycle of which can be characterized by an inhomogeneous birth-and-death Markov process.

1.3. Research Attributes

Next, the authors identified the main attributes of scientific research.
The object of research is the energy consumption managing process of the Edge Computing infrastructure peripheral server over time, defined based on the threshold policy.
The subject of research includes the theory of probability and mathematical statistics, the theory of Markov processes, and the queuing theory.
The purpose of the research is formulated as follows: to analytically formalize in simple energy efficiency metrics the process of functioning of the Edge Computing infrastructure peripheral server, represented by the M ( t ) | M ( t ) | 1 | Markov queuing system with T policy, in time.
Accordingly, the objectives of the research are:
analytically formalize the Markov concept of the energy efficiency assessment of the Edge Computing infrastructure peripheral server functioning over time,
analytically formalize the approach for determining time-uniform estimates of the approximation error of the original multiparameter weakly ergodic Markov process using processes with a lower number of states,
analytically determine the main probabilistic characteristics of the research object based on the proposed concept using the above-mentioned approach,
justify the adequacy of the proposed mathematical apparatus and demonstrate its functionality in the context of the research purpose.
Let us formulate the main contribution of the research. The material of the article is devoted to the research of the peripheral server energy consumption managing process defined based on the threshold policy by manipulating the values of the characteristic parameters of the arithmetic-logical complex of the latter. This process is formalized by a Markov queue model with a single-threshold control scheme for the intensity of accepted requests service. A characteristic feature of the life cycle of a peripheral server is the non-stationary mode of operation in terms of energy consumption, due to the need to periodically poll the controlled sensor network and process the received data in real-time. To take into account this circumstance, the intensities of transitions in the heterogeneous birth-and-death Markov process of the created model are interpreted as non-random periodic functions of time. The resulting mathematical apparatus is summarized in the metric that allows us to estimate the target peripheral server’s energy consumption both at a specific moment and for a censored time interval.

2. Materials and Methods

2.1. Statement of the Research

Edge Computing is a viable solution for organizations whose activities involve processing data in real-time. This distributed computing paradigm focuses on data processing, storage, and analytics at the edge of the network (closer to the data source). This approach can provide numerous benefits, including improved performance, increased security, and reduced latency. At the same time, computing resources at the edge of the network are limited compared to the power of central cloud servers. This circumstance actualizes the problem of ensuring the energy efficiency of computing on the peripheral server as a basic unit in the Edge Computing infrastructure.
As a model of the peripheral server, we will use the Markov queuing system, in which we will predict the dependence of transitions on time, that is, M ( t ) | M ( t ) | 1 | . As a basic scheme for managing the energy efficiency of peripheral server calculations, we will use the T policy in the author’s interpretation, where the number T 2 , T , will be called the threshold. As long as the number of requests in the model is less than T , the system serves them with an exponential intensity with a characteristic of η 0 ( t ) . When the moment t 0 comes, when the number of requests is accepted by the model T , the law of their service by the system changes η ( t ) , η ( t ) > η 0 ( t ) . At the same time, we will assume that the accepted requests will be served by the system in the order of arrival, and the switching of the model between non-random functions { η 0 ( t ) , η ( t ) } takes place instantly.
The dynamics of changes in the peripheral server’s energy availability over time are characterized by a non-homogeneous Markov chain { S ( t ) , t 0 } with continuous time and a family of discrete states S = { i } , i 0 , i . The state index i S represents the number of requests accepted by the model. The logic of the system’s functioning assumes that the model can transit from the state i only to neighboring states: { i 1 , i + 1 } .
We characterize the Markov process S ( t ) with transition probabilities p i j ( x , t ) = Pr { S ( t ) = j | S ( x ) = i } , 0 x t . The probability that at moment t process S ( t ) is in state i is characterized by the value p i ( t ) = Pr ( S ( t ) = i ) , i 0 . Let us summarize these probabilistic characteristics in the form of a vector p ( t ) = { p i ( t ) } T , i 0 .
Let us introduce the concept of a small time interval τ 0 . Taking this parameter into account, we redefine the transition probabilities of the process S ( t ) as
Pr ( S ( t + τ ) = j | S ( t ) = i ) = { μ ( t ) τ + λ i j ( t , τ ) j = i + + , i 0 ; η 0 ( t ) τ + λ i j ( t , τ ) j = i , i = 1 , T ¯ ; η ( t ) τ + λ i j ( t , τ ) j = i , i T ; λ i j ( t , τ ) other cases ,
where sup i | λ i j ( t , τ ) | = o ( τ ) , and μ ( t ) is a characteristic of the Poisson intensity of the arrival of new requests to the model.
Taking this into account, we determine the transition intensities matrix of the process S ( t ) in the form of a three-diagonal matrix:
Q ( t ) = ( μ ( t ) μ ( t ) 0 0 0 0 0 0 η 0 ( t ) ν 0 ( t ) μ ( t ) 0 0 0 0 0 0 η 0 ( t ) ν 0 ( t ) μ ( t ) 0 0 0 0 0 0 0 0 η 0 ( t ) ν 0 ( t ) μ ( t ) 0 0 0 0 0 0 η ( t ) ν 0 ( t ) μ ( t ) 0 0 0 0 0 0 η ( t ) μ ( t ) ) ,
where ν 0 ( t ) = μ ( t ) + η 0 ( t ) , ν ( t ) = μ ( t ) + η ( t ) .
Let us generalize the matrix Q ( t ) and probabilities p i ( t ) in the form of a system of Chapman’s differential equations:
d p ( t ) d t = Q T ( t ) p ( t ) .
Note, that the time-inhomogeneous Markov chain S ( t ) is weakly ergodic if, for any initial conditions p ( t ) , p ( t ) , the p ( t ) p ( t ) 0 holds at t , where p ( t ) , p ( t ) are the corresponding solutions of the system of Equations (2), and is the l 1 norm.
Let us define the mathematical expectation of the process S ( t ) (the average number of accepted requests) as M k ( t ) = M { S ( t ) | S ( 0 ) = k } with initial conditions S ( 0 ) = m k . Starting from this definition, we say that the function ϕ ( t ) is the limiting mean for S ( t ) if the equality lim t ( ϕ ( t ) M k ( t ) ) = 0 is fulfilled k .
Further analytical constructions are formulated taking into account the following reasonable assumptions:
the intensities of receiving and servicing requests are periodic with the same period h (the polling of the sensor array placed on the data source is carried out with the specified periodicity),
the service intensity of received requests by the system is proportional: η 0 ( t ) = k η ( t ) , 0 < k < 1 (this reproduces the possibility of manipulating the FID multiplier provided in the Intel SpeedStep and AMD Cool’n’Quiet firmware).

2.2. The Markov Concept of the Edge Computing Infrastructure Peripheral Server Functioning over Time

Let us denote the average intensities of receiving and servicing requests by the system η ¯ = 1 h 0 h η ( t ) d t , η ¯ 0 = 1 h 0 h η 0 ( t ) d t , μ ¯ = 1 h 0 h μ ( t ) d t . Then, using the theorem presented in Appendix A, generalized by expressions (A2), (A3), and its corollary (A5) (the reason for including these materials in the appendix is that, according to the authors, these materials will be of greater interest to theoretical mathematicians, while the main text of the article has an applied orientation), we can formulate several statements that are directly relevant to our research.
We can classify a process S ( t ) as weakly ergodic if the inequality μ ¯ < η ¯ holds. Under such conditions, t for any initiating values p ( 0 ) , p ( 0 ) , such estimates of the convergence rate as
p ( t ) p ( t ) 4 L e ν ¯ t i 1 z i | p i ( 0 ) p i ( 0 ) | ,
will be admissible, where L = e 0 h η 0 ( t ) d t , ν ¯ = ( η ¯ 0 μ ¯ ) , z i = n = 1 i b n , b n = α n 1 , α = η ¯ 0 / μ ¯ . At k :
| M k ϕ ( t ) | 4 L V e ν ¯ t p ( 0 ) e k i B ,
where V = inf n 1 α n 1 n , 1 B l 1 .
If we develop the theorem presented in Appendix A in the direction of estimating the solution error of the Chapman system of the form (2) for a process S ( t ) with a set of states S = { i } , i = 0 , N ¯ , and intensities η ¯ , η ¯ 0 , μ ¯ , then for the resulting p ( t ) , p N ( t ) probabilities the inequality
p ( t ) p N ( t ) 8 L 3 / 2 ν ¯ 3 / 2 α N 1 C μ ( C μ + C η ) ,
will hold at p ( 0 ) = e 0 , p N ( 0 ) = p ( 0 ) where the constants C μ , C η limit at t [ 0 , ) the linear combinations of the finite number of locally integrated functions of the intensities μ ( t ) and η 0 ( t ) , η ( t ) , respectively: μ ( t ) C μ < , η 0 ( t ) , η ( t ) C η < .
By analogy with expression (5), for the limit values of the process S ( t ) mathematical expectation, the following estimate will be true:
| M 0 ( t ) M 0 , N ( t ) | 4 L 3 / 2 V ν ¯ 3 / 2 α N 1 C μ ( C μ + C η ) .

2.3. The Metric for the Energy Efficiency Assessment of the Studied Process

Let us connect the obtained in Section 2.2 probabilistic-time characteristics with the established interpretation of the concept of energy efficiency of computing elements. The well-known formula [27] for energy consumption (used power) of a computer system Π :
Π = C U 2 f + Π s ,
where C is the capacity of transistor gates, f is the frequency of the algorithmic-logic conglomerate (central processor only or a central processor and graphics subsystem), U is the supply voltage, and Π s is the constant power consumption incl. energy consumption for the functioning of communication equipment located in the peripheral server.
The values of the parameters C , U , Π s will be constant for a particular peripheral server. The speed of data processing changes synchronously with the change in the clock frequency f of the algorithmic-logical conglomerate as part of the peripheral server. Suppose that if the number of requests for data processing in the buffer of the algorithmic-logical conglomerate is less than T , then the latter functions with a clock frequency of f 0 . If the number of accepted data processing requests in the queue is equal to or exceeds T , then the clock frequency is equal to f > f 0 . As a result, the consumed power Π transcendentally depends on the threshold T due to the current value of the clock frequency f .
For the general case, we will assume that the dependence of the service intensity of received requests η 0 ( t ) , η ( t ) on the clock frequency of the algorithmic-logic complex s has a linear character:
η 0 ( t ) = C β f 0 β ( t ) ,   η ( t ) = C β f β ( t ) ,
where β ( t ) is a non-random periodic function of time, the existence of which is based on the periodicity of polling of the sensor network by the peripheral server, and the coefficient C β is a constant of the computing potential, the value of which is determined as a result of an independent external evaluation of the algorithmic-logical complex of the peripheral server using, for example, constantly updating the AIDA64 utility (versions 6.*). This software product of FinalWire Ltd. (Budapest, Hungary) is justifiably popular due to the availability of objective tests of the components of personal computers running the MS Windows operating system.
We integrate the mathematical apparatus formalized in the section, which characterizes the process of functioning of the peripheral server, represented by the Markov queue system M ( t ) | M ( t ) | 1 | defined within the framework of T policy, in time, into expression (7) taking into account functional dependencies (8):
Π ( t , T , f , f 0 ) = C U 2 [ f ( 1 i = 0 T 1 p i ( t ) ) + f 0 ( 1 i = 0 T 1 p i ( t ) ) ] + Π s ,
Since characteristic (9) depends on time, it is expedient to investigate the averaged version of this characteristic, i.e., Π ¯ ( t , T , f , f 0 ) . Let us define a sufficiently long time interval [ t , t + t ¯ ] , in which t ¯ is the interval during which all functional and service operations performed periodically by the peripheral server are fully manifested. Under such circumstances, we formalize the characteristic Π ¯ ( t , T , f , f 0 ) with the expression
Π ¯ ( t , T , f , f 0 ) = 1 t ¯ 0 t ¯ Π ( t , T , f , f 0 ) d t .
Expression (10) can be interpreted as the average energy consumption (used power) of the peripheral server during time [ t , t + t ¯ ] .

3. Results

In this section, we will focus on simulating the computing process of a peripheral server whose computing subsystem changes the rate of information packet service by the T -policy. At the same time, we will present the simulation results in metrics (9) and (10), focused on the representation of the studied process in the context of energy consumption.
In Section 2, we presented the computational process of a peripheral server as a M ( t ) | M ( t ) | 1 | queuing system, in which the client is an information package, and the processor pipeline is a device. The first dependence M ( t ) in the abbreviation of the created queuing system means that packets arrive at the input of the queuing system by Poisson’s law and intensity μ , i.e., the time between arrivals of packets is characterized by an exponential law with the same steamer. The second dependence M ( t ) in the abbreviation of the created system characterizes the service of received packets. Accordingly, the time to service the information packet is also characterized by an exponential law. At the same time, the implementation of the threshold policy predetermines that the service time is distributed exponentially with two different parameters η 0 and η . The logic of the created system provides that switching from low service intensity η 0 to high service intensity η occurs automatically if the number of received information packets exceeds the threshold value T . Note, that the packet arrival time and service time are independent parameters. Finally, the number 1 in the abbreviation of the created system means that one processor unit is involved in servicing packets. In general, the system M ( t ) | M ( t ) | 1 | implements a first-in-first-out discipline for servicing received information packets (without priorities). Thus, the created model fully reflects the specifics of the studied process.
We will demonstrate the functionality of the mathematical apparatus presented in Section 2 in practice with an orientation to the popular Dell PowerEdge XE family. This choice determines the values of some parameters-constants mentioned in expression (7) fundamental for the target metric (9), (10). Based on the Dell PowerEdge XE family specification, let us define U = 1.35 V, Π s = 5 W, f 0 , f [ 2.4 , 2.7 ] GHz, C 14.23 nF (for U = 1.35 V, Π s = 5 W, f = 2.7 GHz).
We will determine the function of the intensities of the arrival of new requests to the model μ ( t ) and the function β ( t ) , which regulates the periodicity of this process:
μ ( t ) = 0.8 + 0.01 sin ( 2 π t ) ,   β ( t ) = 1 + 0.033 sin ( 0.04 π t ) .
Note, that the need to take into account periodic dependencies (11) reflects the specifics of the operation of the peripheral server, in which the sensor network is polled as a rule with some periodicity.
To preserve the comparability of the author’s results with the closest analog [27], we define the constant C β as 0.37 .
The set values and functions allow us to determine the intensity of processing requests by the system according to expression (8) as η 0 ( t ) = 0.37 ( 1 + 0.033 sin ( 0.04 π t ) ) f 0 , η ( t ) = 0.37 ( 1 + 0.033 sin ( 0.04 π t ) ) f .
Finally, we will form a plan for experiments. We have already mentioned that we summarize the mathematical apparatus pressed down in Section 2 in the form of useful metric (9), (10) that allows us to estimate the target peripheral server’s energy consumption Π both at a specific moment (expression (9)) and for a censored time interval (expression (10)). The main characteristic parameters of the metric are the threshold T (the capacity of the accepted for processing data packets queue), the base frequency f 0 (before the threshold is exceeded) and the operating frequency f of the computing subsystem (after the threshold is exceeded), and time t . Thus, in general terms, the power consumption of a peripheral server in the proposed metric is a function of four parameters, which does not allow us to present the results of experiments in one figure. Next, we will show how the metric (9) and (10) reacts to a change in each of the four characteristic parameters for fixed values of the corresponding three of them.
Based on the defined parameters and functions, we calculate the value of the variant of the characteristic (10) for f 0 [ 2.40 , 2.70 ] , f = 2.70 and T = { 5 , 10 , 15 , 20 } . The calculation results are visualized in Figure 1 and Table 1.
Taking into account the paired representation of the intensity of processing of received requests by the system, it is of interest to determine the dependence (10) variant for f 0 = 2.60 , f [ 2.4 , 2.7 ] and T = { 5 , 10 , 15 , 20 } . The calculation results are visualized in Figure 2 and Table 2.
Now let us determine the dynamics of changes in the values of the characteristic (10) variant from the threshold T [ 2 , 16 ] at f 0 = 2.60 and f = { 2.50 , 2.60 , 2.70 } . The calculation results are visualized in Figure 3 and Table 3.
Finally, let us determine the dynamics of changes in the values of the characteristic (9) variant for the time interval [ t , t + t ¯ ] = [ 2250 , 2300 ] with f 0 = 2.60 and f = 2.70 . The calculation results are visualized in Figure 4 and Table 4.
The format of the presentation of calculations of characteristics (9), and (10) by a set of two-dimensional functions presented in Figure 1, Figure 2, Figure 3 and Figure 4, chosen for clarity and taking into account the fact that characteristics (9), and (10) are functions of four variables, which makes its graphical interpretation on a static medium impossible. The change ranges of characteristic parameters (9) and (10) are selected in such a way as to simplify the comparison of the obtained results with analogs (proving the adequacy of the mathematical apparatus presented in Section 2) and to demonstrate specific features of the dynamics of characteristics (9), (10) that deserve special attention (see Section 4).

4. Discussion

Let us recall the results of the review presented in Section 1. In particular, the work [27] is semantically closest to the author’s research. The authors of article [27] model the functioning of the computing unit of the Data Center with an emphasis on determining the energy efficiency of the first. As a model of the computing unit, the authors of the mentioned article propose a M | M | 1 | queuing system taking into account the single-threshold energy consumption management policy. At the same time, in the article [27], it is assumed that both the intensity of requests to the model and the intensity of their processing by the system do not depend on time (for a Data Center with a consistently high load on its computing units, this assumption is perceived as natural). In the article [27], we are primarily interested in the results of computational experiments, namely, the dependence of the average energy consumption of the computing unit in the stationary mode Π ¯ on the threshold T , the basic clock frequency f 0 and the increased clock frequency f at the determined stable parameters of the metric (7), i.e., { C , U , Π s } .
In the experiments, the results of which are presented in Section 3, we used similar values of both the fixed parameters of the metric (7) and similar ranges of changes of the controlled parameters, i.e., { T , f , f 0 } . Our choice was aimed at simplifying the substantiation of the adequacy of the mathematical apparatus presented in Section 3. As shown in Figure 1, Figure 2 and Figure 3, dependencies are generated by our model in a time-normalized form. As expected, the results of the calculation of the variants of dependence Π ¯ ( f 0 , f , T )  carried out based on the author’s model of type M ( t ) | M ( t ) | 1 | in a time-normalized form (Figure 1 and Figure 2), are extremely close to the semantically identical dependencies presented in the analog [27] (Figures 2a and 3a in [27], respectively). This allows us to draw an inductive conclusion that the author’s concept of the energy efficiency assessment of the Edge Computing infrastructure peripheral server functioning over time is adequate.
Separately, we note that the mentioned analog (the M | M | 1 | model of the computing unit taking into account the energy consumption policy T ) cannot be used for the object we are researching, i.e., the process of functioning of the Edge Computing infrastructure peripheral server because the latter is characterized by the need for periodic peak computing power (survey of the sensor network, initial real-time processing of received data and sending a report). The model [27] is simply not able to account for these spikes. It was this fact that prompted us to consider the intensity of the arrival of new requests to the model and the intensity of the processing of accepted requests by the system as non-random functions of time while preserving the interpretation of the research object as a birth-and-death Markov process. The mathematical apparatus presented in Section 2 is focused on determining time-uniform estimates of the approximation error of the original Markov multiparameter process using processes with a lower number of states. This approach makes it possible to determine the value of the sought probabilistic characteristics of the initial weak ergodic process with the required accuracy on a representative time interval.
Now let us interpret the characteristic trends that follow from the graphs presented in Section 3. Let us pay attention to Figure 1. It can be seen that an increase in the base clock frequency f 0 leads to a synchronous monotonic increase in the average power consumption Π ¯ (which is accompanied by a decrease in the service waiting time for requests accepted by the model). However, with a decrease in the value of f 0 , the rate of decrease in energy consumption Π ¯ is different and depends on the value of the threshold T . This circumstance makes it possible to predict the possibility of setting the problem of determining the optimal value of the threshold T to minimize the power consumption of the peripheral server in standby mode when the algorithmic-logical complex of the latter operates at the frequency f 0 .
Figure 2 shows that an increase in the clock frequency f leads to an increase in the power consumption of the peripheral server. Manipulation of the threshold value T affects only the intensity of growth of the graphs, but not the overall trend. But note that these graphs are obtained for a fixed value of f 0 = 2.60 , while f [ 2.40 , 2.70 ] . The situation f < f 0 was not considered in the formalization of the energy consumption management policy, but the model shows signs of survivability, the limits of which can be further explored.
Graphs from Figure 3 confirm those determined about Figure 2 trends. It can be seen that the decisive influence on power consumption Π ¯ causes the increase in the clock frequency f . Threshold value T causes a noticeable effect on power consumption only when parameters f 0 , f are close in value. This circumstance allows us to state that the classic version of the energy consumption management T policy does not reveal its full potential in the context of the research object. Taking into account this fact, the authors consider it promising to switch to an interval interpretation of the parameter f . Moreover, the author’s mathematical apparatus allows for setting up and solving related optimization problems with sufficient computational efficiency.
The results presented in Figure 4 show that over time, the value of energy consumption goes to the corresponding limit value, which depends on the value of the threshold T at fixed values of the parameters f 0 , f . This unequivocally confirms the fundamental suitability of the T policy for power consumption management of the peripheral server as an important link of the Edge Computing infrastructure. It was the use of the author’s mathematical apparatus that made it possible to obtain objective confirmation of this. We also note that the influence of the periodic nature of the intensity functions (11) on the level of energy consumption decreases with the increase in the value of the threshold T .
Also, note that our goal was to provide engineers with a simple and adequate metric for estimating the power consumption of a functioning edge server both at an arbitrary moment in time and for a certain time interval. It is this goal that determines both the compactness of the final metric (9) and (10) and the simplicity of the parametric representation of a rather mathematically complex queuing system M ( t ) | M ( t ) | 1 | in it.

5. Conclusions

Edge computing is a viable solution for organizations whose activities involve real-time data processing. A solution in the distributed computing paradigm can provide numerous benefits, including improved performance, increased security, and reduced latency. At the same time, computing resources at the edge of the network are limited compared to the central cloud server’s power. This circumstance actualizes the problem of ensuring the energy efficiency of computing on the peripheral server as the edge computing infrastructure basic unit.
The material of the article is devoted to the research of the peripheral server energy consumption managing process defined based on the threshold policy by manipulating the values of the characteristic parameters of the arithmetic-logical complex of the latter. The research object is formalized by a Markov queue model with a single-threshold control scheme for the intensity of accepted requests service. A characteristic feature of the life cycle of a peripheral server is the non-stationary mode of operation in terms of energy consumption, due to the need to periodically poll the controlled sensor network and process the received data in real-time. To take into account this circumstance, the intensities of transitions in the heterogeneous birth-and-death Markov process of the created model are interpreted as non-random periodic functions of time. An approach for determining time-uniform estimates of the approximation error of the original weakly ergodic multiparameter Markov process using processes with a smaller number of states is proposed. Using this approach, the main probabilistic characteristics of the research object are analytically determined with the necessary accuracy on a representative time interval. The adequacy of the created mathematical apparatus is substantiated based on the closest semantically analog.
A computational experiment on estimating the energy consumption of a peripheral server instance in time proved the functionality of the created mathematical apparatus. The discussion of the experiment results made it possible to outline a whole list of directions for promising further research, in particular:
setting the problem of determining the optimal value of the energy policy threshold to minimize the power consumption of the peripheral server in standby mode;
It was experimentally confirmed that the created model shows signs of survivability when the values of the controlled parameters exceed the established limits. The search and analysis of the origins of this survivability is a promising research task;
There are signs of a promising transition to interval interpretation of individual characteristic parameters of the created model. This thesis needs research.
The mathematical apparatus proposed in the article was evaluated taking into account simplified and synthetic query distributions. Based on the recommendation of a respected reviewer, the authors are going to devote the next work to conducting a series of experiments to evaluate, using the tools proposed in the article, the functioning processes of real EDGE systems containing peripheral servers with various scenarios for receiving data from sensor networks

Author Contributions

Conceptualization, V.K.; methodology, V.K.; software, V.K.; validation, T.A., M.A.-M. and W.K.; formal analysis, V.K.; investigation, V.K.; resources, T.A., M.A.-M. and W.K.; data curation, T.A., M.A.-M. and W.K.; writing—original draft preparation, V.K.; writing—review and editing, V.K.; visualization, V.K.; supervision, V.K.; project administration, V.K.; funding acquisition, V.K. All authors have read and agreed to the published version of the manuscript.

Funding

This work was funded by Researchers Supporting Project number (RSP2023R503), King Saud University, Saudi Arabia.

Data Availability Statement

Most data is contained within the article. All the data are available on request due to restrictions, e.g., privacy or ethics.

Acknowledgments

The authors are grateful to King Saud University, Saudi Arabia for funding this work through the Researchers Supporting Project number (RSP2023R503), and also grateful to all persons and organizations that contributed to the publication of the article.

Conflicts of Interest

The authors declare no conflict of interest.

Nomenclature

T is a threshold or the total number of requests accepted by the model M ( t ) | M ( t ) | 1 | ;
f 0 is a base frequency frequency (before the threshold is exceeded) of the computing subsystem;
f is an operating frequency (after the threshold is exceeded) of the computing subsystem;
η 0 ( t ) is an intensity of servicing received requests by the system, provided that their number does not exceed T ;
η ( t ) is an intensity of servicing received requests by the system, provided that their number exceeds T ;
S is a set of states of a Markov chain { S ( t ) , t 0 } ;
p i j ( x , t ) = Pr { S ( t ) = j | S ( x ) = i } are the transition probabilities of a Markov process S ( t ) ;
μ ( t ) is a characteristic of the intensity of the arrival of new requests to the model;
M k ( t ) = M { S ( t ) | S ( 0 ) = k } is an average number of accepted requests;
ϕ ( t ) is the function limiting mean for S ( t ) ;
C μ is a constant that limits the linear combinations of the finite number of locally integrated functions of the intensities μ ( t ) ;
C η are the constants that limit the linear combinations of the finite number of locally integrated functions of the intensities η 0 ( t ) , η ( t ) ;
Π is the energy consumption (used power) of a computer system;
Π ¯ is the average energy consumption (used power) of a computer system;
C is the capacity of transistor gates;
U is the supply voltage of the processor unit;
Π s is the constant power consumption of the computer system;
β ( t ) is a non-random periodic function of time, the existence of which is based on the periodicity of polling of the sensor network by the peripheral server;
C β is a constant of the computing potential.

Appendix A

The approach stated in the research objectives for determining time-uniform estimates of the approximation error of the original multiparameter weakly ergodic Markov process using processes with a lower number of states is based on the theoretical material presented below, formalized in the parametric space defined in Section 2.1.
Let the dynamics of the birth-and-death Markov process be characterized by the intensity functions μ k ( t ) , η k ( t ) , k 0 . Assume the existence of a set { b i } B , i = 1 , 2 , , b 1 = 1 , for which 0 λ ( t ) d t = , where B = ( b 1 b 1 b 1 0 b 2 b 2 0 0 b 3 ) , b = inf i 1 b i = 1 , λ k ( t ) = μ k ( t ) + η k + 1 ( t ) b k + 1 b k μ k + 1 ( t ) b k 1 b k η k ( t ) ,
λ ( t ) = inf λ k k 0 ( t ) .
Then the Markov process S ( t ) is considered as a weakly ergodic. Based on this fact, we can formulate the following inequality conditions:
Δ p ( t ) 1 B e x t λ ( τ ) d τ p ( x ) p ( x ) 1 B ,
Δ p ( t ) 1 B 4 e x t λ ( τ ) d τ i 1 z i | p i ( x ) p i ( x ) | ,
t x 0 , Δ p ( t ) = p ( t ) p ( t ) , and for arbitrary initial values of p ( x ) , p ( x ) .
Let us prove the authenticity of what was said. Since p ( t ) Ω   t 0 , where Ω is a set of probability l 1 vectors with positive elements and unit norm, we can write: p 0 ( t ) = 1 i 1 p i ( t ) . On this basis, we formulate the system of equations
d p ( t ) d t = p ( t ) Β ( t ) + μ ( t ) ,
where p ( t ) = ( p 1 ( t ) , p 2 ( t ) , ) T , μ ( t ) = ( μ 0 ( t ) , 0 , 0 , ) T , Β ( t ) = ( b i j ) , i , j [ 1 , ) ,
β i j = { ( μ 0 μ 1 η 1 ) i = j = 1 ; ( μ 2 η 0 ) i = 1 , j = 2 ; ( μ 0 ) i = 1 , j > 2 ; ( η j ) i = j 1 > 1 , ( μ j ) i = j + 0 > 1 ; ( μ j η j ) i = j > 1 ; 0 else .
The solution of the system of inhomogeneous linear differential Equation (A4) can be described as p ( t ) = Υ ( t , 0 ) p ( 0 ) + 0 t Υ ( t , τ ) μ ( τ ) d τ , where Υ ( t , p ) is the Cauchy operator for the system (A4)
If we define the system (A4) in space l 1 B = { p = ( p 1 , p 2 , ) T : p 1 B B p < } , then the inequality μ ( t ) 1 B = b 1 μ 0 ( t ) C μ will hold t 0 .
Let us redefine the inhomogeneous birth-and-death Markov process S ( t ) as
1 / S ( t ) = ( μ 0 η 1 b 1 b 2 η 2 0 0 b 2 b 1 μ 1 μ 1 η 2 b 2 b 3 η 3 0 0 b 3 b 2 μ 2 μ 2 η 3 b 3 b 4 η 4 ) .
Given this interpretation of S ( t ) , the inequality
Β ( t ) 1 B = sup k 0 ( μ k ( t ) + η k + 1 ( t ) + b k 1 b k η k ( t ) + b k + 1 b k μ k + 1 ( t ) ) sup k 0 ( μ k ( t ) η k + 1 ( t ) b k 1 b k η k ( t ) b k + 1 b k μ k + 1 ( t ) + 2 μ k + 1 ( t ) ) 2 ( C μ + C η )
concerning Β ( t ) 1 B will hold for almost all t 0 .
Then in the l 1 B space μ ( t ) can be interpreted as the vector-function. In turn, and Β ( t ) can be interpreted as the operator function in the same conditions. The mentioned functions are bounded and locally integrable on l 1 B .
Now, because of (A1), let us formalize the norm ν ( Β ( t ) ) in the conditions of space l 1 B as
ν ( Β ) 1 B = sup i 0 ( b i + 1 b i μ i + 1 ( t ) μ i ( t ) η i + 1 ( t ) + b i 1 b i η i ( t ) ) ,
i.e., ν ( Β ) 1 B = inf k 0 ( λ k ( t ) ) = λ ( t ) .
Accordingly, we obtain: Υ ( t , x ) 1 B exp ( x t λ ( τ ) d τ ) , that is, inequality (A2) is satisfied.
Now let us examine p :
p i 1 b i | p i | = b 1 | i 1 p i + i 2 p i | + d 2 | i 2 p i + i 3 p i | + b 1 | i 1 p i | + 2 b 2 | i 2 p i | + 2 p 1 B .
Therefore, for any p , p and the corresponding p we can write: p p 2 p , that is, inequality (A3) is satisfied.
If the values b i grow significantly faster V > 0 , then the process S ( t ) has a limiting value ϕ ( t ) , which can be determined from the inequality
| ϕ ( t ) M k ( t ) | 4 1 V e 0 t λ ( τ ) d τ p ( 0 ) e k 1 B

References

  1. Knebel, F.P.; Trevisan, R.; Nascimento, G.S.D.; Abel, M.; Wickboldt, J.A. A Study on Cloud and Edge Computing for the Implementation of Digital Twins in the Oil & Gas Industries. Comput. Ind. Eng. 2023, 182, 109363. [Google Scholar] [CrossRef]
  2. Kovtun, V.; Altameem, T.; Al-Maitah, M.; Kempa, W. Information Technology for Maximizing Energy Consumption for Useful Information Traffic in a Dense Wi-Fi 6/6E Ecosystem. Electronics 2023, 12, 3847. [Google Scholar] [CrossRef]
  3. Reiss-Mirzaei, M.; Ghobaei-Arani, M.; Esmaeili, L. A Review on the Edge Caching Mechanisms in the Mobile Edge Computing: A Social-Aware Perspective. Internet Things 2023, 22, 100690. [Google Scholar] [CrossRef]
  4. Laroui, M.; Nour, B.; Moungla, H.; Cherif, M.A.; Afifi, H.; Guizani, M. Edge and Fog Computing for IoT: A Survey on Current Research Activities & Future Directions. Comput. Commun. 2021, 180, 210–231. [Google Scholar] [CrossRef]
  5. Islam, A.; Debnath, A.; Ghose, M.; Chakraborty, S. A Survey on Task Offloading in Multi-Access Edge Computing. J. Syst. Arch. 2021, 118, 102225. [Google Scholar] [CrossRef]
  6. Dinar, A.E.; Ghouali, S.; Merabet, B.; Feham, M.; Guellil, M.S.; Hussein, E.K. 5G Network Performance by Cell-Edge Servers Optimization Assignment (5GNP-CESOA). Procedia Comput. Sci. 2021, 194, 140–148. [Google Scholar] [CrossRef]
  7. Izonin, I.; Tkachenko, R.; Krak, I.; Berezsky, O.; Shevchuk, I.; Shandilya, S.K. A Cascade Ensemble-Learning Model for the Deployment at the Edge: Case on Missing IoT Data Recovery in Environmental Monitoring Systems. Front. Environ. Sci. 2023, 11, 1295526. [Google Scholar]
  8. Illiashenko, O.; Kharchenko, V.; Babeshko, I.; Fesenko, H.; Di Giandomenico, F. Security-Informed Safety Analysis of Autonomous Transport Systems Considering AI-Powered Cyberattacks and Protection. Entropy 2023, 25, 1123. [Google Scholar] [CrossRef]
  9. Kovtun, V.; Izonin, I.; Gregus, M. Modeling a Session of Subject-System Interaction in a Wireless Communication Infrastructure with a Mixed Resource. PLoS ONE 2022, 17, e0271536. [Google Scholar] [CrossRef]
  10. Mochurad, L.; Hladun, Y.; Tkachenko, R. An Obstacle-Finding Approach for Autonomous Mobile Robots Using 2D LiDAR Data. Big Data Cogn. Comput. 2023, 7, 43. [Google Scholar] [CrossRef]
  11. Bisikalo, O.; Kharchenko, V.; Kovtun, V.; Krak, I.; Pavlov, S. Parameterization of the Stochastic Model for Evaluating Variable Small Data in the Shannon Entropy Basis. Entropy 2023, 25, 184. [Google Scholar] [CrossRef]
  12. Semenov, A.; Prytula, M.; Stalchenko, O.; Donskyi, O. Protecting IoТ Wearable Devices from Electromagnetic Radiation Using Radio-Opaque Fabrics. Secur. Infocommun. Syst. Internet Things 2023, 01007. [Google Scholar] [CrossRef]
  13. Jiang, C.; Fan, T.; Gao, H.; Shi, W.; Liu, L.; Cérin, C.; Wan, J. Energy Aware Edge Computing: A Survey. Comput. Commun. 2020, 151, 556–580. [Google Scholar] [CrossRef]
  14. Shao, X.; Zhang, Z.; Song, P.; Feng, Y.; Wang, X. A Review of Energy Efficiency Evaluation Metrics for Data Centers. Energy Build. 2022, 271, 112308. [Google Scholar] [CrossRef]
  15. Long, S.; Li, Y.; Huang, J.; Li, Z.; Li, Y. A Review of Energy Efficiency Evaluation Technologies in Cloud Data Centers. Energy Build. 2022, 260, 111848. [Google Scholar] [CrossRef]
  16. Cao, K.; Hu, S.; Shi, Y.; Colombo, A.; Karnouskos, S.; Li, X. A Survey on Edge and Edge-Cloud Computing Assisted Cyber-Physical Systems. IEEE Trans. Ind. Inform. 2021, 17, 7806–7819. [Google Scholar] [CrossRef]
  17. Cao, K.; Weng, J.; Li, K. Reliability-Driven End–End–Edge Collaboration for Energy Minimization in Large-Scale Cyber-Physical Systems. IEEE Trans. Reliab. 2023, 1–15. [Google Scholar] [CrossRef]
  18. Kai, Y.; Wang, J.; Zhu, H. Energy Minimization for D2D-Assisted Mobile Edge Computing Networks. In Proceedings of the ICC 2019—2019 IEEE International Conference on Communications (ICC), Shanghai, China, 20–24 May 2019. [Google Scholar] [CrossRef]
  19. Chen, G.; Liu, Z.; Zhang, J. The Effect of D-Policy on the Strategic Customer Behavior in M/G/1 Queues. Oper. Res. Lett. 2019, 47, 157–161. [Google Scholar] [CrossRef]
  20. Kovtun, V.; Izonin, I. Study of the Operation Process of the E-Commerce Oriented Ecosystem of 5Ge Base Station, Which Supports the Functioning of Independent Virtual Network Segments. J. Theor. Appl. Electron. Commer. Res. 2021, 16, 2883–2897. [Google Scholar] [CrossRef]
  21. Ayyappan, G.; Karpagam, S. Analysis of a Bulk Queue with Unreliable Server, Immediate Feedback, N-Policy, Bernoulli Schedule Multiple Vacation and Stand-by Server. Ain Shams Eng. J. 2019, 10, 873–880. [Google Scholar] [CrossRef]
  22. Mochurad, L.I. Canny Edge Detection Analysis Based on Parallel Algorithm, Constructed Complexity Scale and CUDA. Comput. Inform. 2022, 41, 957–980. [Google Scholar] [CrossRef]
  23. Barbhuiya, F.; Gupta, U. Analytical and Computational Aspects of the Infinite Buffer Single Server N Policy Queue with Batch Renewal Input. Comput. Oper. Res. 2020, 118, 104916. [Google Scholar] [CrossRef]
  24. Rani, S.; Jain, M.; Meena, R.K. Queueing Modeling and Optimization of a Fault-Tolerant System with Reboot, Recovery, and Vacationing Server Operating under Admission Control Policy. Math. Comput. Simul. 2023, 209, 408–425. [Google Scholar] [CrossRef]
  25. Kumar, A.; Jain, M. Cost Optimization of an Unreliable Server Queue with Two Stage Service Process under Hybrid Vacation Policy. Math. Comput. Simul. 2023, 204, 259–281. [Google Scholar] [CrossRef]
  26. Zaitseva, E.; Hovorushchenko, T.; Pavlova, O.; Voichur, Y. Identifying the Mutual Correlations and Evaluating the Weights of Factors and Consequences of Mobile Application Insecurity. Systems 2023, 11, 242. [Google Scholar] [CrossRef]
  27. Semenov, A.; Semenova, O.; Kryvinska, N.; Tromsyuk, V.; Tsyrulnyk, S.; Rudyk, A.; Kacprzyk, J. Advanced Correlation Method for Bit Position Detection towards High Accuracy Data Processing in Industrial Computer Systems. Inf. Sci. 2023, 624, 652–673. [Google Scholar] [CrossRef]
  28. Rusnak, P.; Zaitseva, E.; Coolen, F.P.; Kvassay, M.; Levashenko, V. Logic Differential Calculus for Reliability Analysis Based on Survival Signature. IEEE Trans. Dependable Secur. Comput. 2022, 20, 1529–1540. [Google Scholar] [CrossRef]
  29. Spallina, A.; Araldo, A.; Chahed, T.; Castel-Taleb, H.; Di Stefano, A.; Atmaca, T. Energy-Efficient Resource Allocation in Multi-Tenant Edge Computing Using Markov Decision Processes. In Proceedings of the NOMS 2022—2022 IEEE/IFIP Network Operations and Management Symposium, Budapest, Hungary, 25–29 April 2022. [Google Scholar] [CrossRef]
  30. Radenkovic, M.; Ha Huynh, V.S. Energy-Aware Opportunistic Charging and Energy Distribution for Sustainable Vehicular Edge and Fog Networks. In Proceedings of the 2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC), Paris, France, 20–23 April 2020. [Google Scholar] [CrossRef]
  31. Chen, W.; Chen, Y.; Liu, J. Service Migration for Mobile Edge Computing Based on Partially Observable Markov Decision Processes. Comput. Electr. Eng. 2023, 106, 108552. [Google Scholar] [CrossRef]
Figure 1. Dependence Π ¯ ( f 0 ) on f = 2.70 and T = { 5 , 10 , 15 , 20 } .
Figure 1. Dependence Π ¯ ( f 0 ) on f = 2.70 and T = { 5 , 10 , 15 , 20 } .
Electronics 12 04320 g001
Figure 2. Dependence Π ¯ ( f ) on f 0 = 2.60 and T = { 5 , 10 , 15 , 20 } .
Figure 2. Dependence Π ¯ ( f ) on f 0 = 2.60 and T = { 5 , 10 , 15 , 20 } .
Electronics 12 04320 g002
Figure 3. Dependence Π ¯ ( T ) on f 0 = 2.60 and f = { 2.50 ; 2.60 ; 2.70 } .
Figure 3. Dependence Π ¯ ( T ) on f 0 = 2.60 and f = { 2.50 ; 2.60 ; 2.70 } .
Electronics 12 04320 g003
Figure 4. Dependence Π ( t ) on f 0 = 2.60 , f = 2.70 and T = { 5 , 10 , 15 } .
Figure 4. Dependence Π ( t ) on f 0 = 2.60 , f = 2.70 and T = { 5 , 10 , 15 } .
Electronics 12 04320 g004
Table 1. The exact values of the dependencies are presented in Figure 1.
Table 1. The exact values of the dependencies are presented in Figure 1.
f 0 Π ¯     at   T = 5 Π ¯     at   T = 10 Π ¯     at   T = 15 Π ¯     at   T = 20
2.4070.4503668.8049968.0860667.70365
2.4170.5882968.9584668.2854267.90301
2.4270.7109569.0813368.4847768.16355
2.4370.8488769.2501168.6841768.3782
2.4470.9867869.327168.914168.57758
2.4571.1094169.4652969.1134768.83817
2.4671.2473369.5575769.3280969.06805
2.4771.3852469.6957569.5274969.28274
2.4871.5384269.8492169.7574469.4974
2.4971.6610670.0332769.9873969.75794
2.5071.7989870.1561570.2020669.98791
2.5171.9521470.462670.4320170.20256
2.5272.1053370.6772770.6925870.44784
2.5372.2432670.9530970.8613170.69307
2.5472.4117271.1524771.1065870.93832
2.5572.5343471.4283171.3518471.18358
2.5672.7028271.7041871.5818371.41353
2.5772.8560171.9647171.7811271.67408
2.5873.0091972.2558672.0417171.91932
2.5973.1776372.4858372.2716672.1646
2.6073.3155272.7463472.5015972.42515
2.6173.4992572.976372.7468772.6551
2.6273.6524473.2215572.9768172.91564
2.6373.7903373.4362473.2067873.16089
2.6473.9435173.6355873.45273.37554
2.6574.1272473.8808673.6972973.66669
2.6674.2804174.080273.9578373.92724
2.6774.4793974.3254674.1571974.14189
2.6874.6173174.5248274.4330474.41775
2.6974.8010274.7394774.6629974.61709
2.7074.9999874.9694474.9541574.92352
Table 2. The exact values of the dependencies are presented in Figure 2.
Table 2. The exact values of the dependencies are presented in Figure 2.
f Π ¯     at   T = 5 Π ¯     at   T = 10 Π ¯     at   T = 15 Π ¯     at   T = 20
2.4067.2596867.2665167.2391867.23918
2.4167.4031967.3348567.2938567.25968
2.4267.546767.4100267.3348567.29385
2.4367.6833767.4920367.3826967.31435
2.4467.8200567.567267.4305267.34169
2.4567.9498967.6355467.4715367.37585
2.4668.0865667.7107167.5125367.40319
2.4768.2095767.7790467.567267.42369
2.4868.3394167.8473867.5945367.44419
2.4968.4624167.9088867.6218767.46469
2.5068.5785967.9703967.6628767.48519
2.5168.7015968.0250667.7038767.50569
2.5268.7972768.0933967.7312167.5262
2.5368.9202768.154967.7585467.5467
2.5469.0227868.2095767.7858867.55353
2.5569.1389568.2642467.8200567.57403
2.5669.2414668.3189167.8405567.5877
2.5769.350868.3667467.8610567.60137
2.5869.4396468.4145867.8883867.61503
2.5969.5489768.4692567.9225567.63554
2.6069.6378168.5102567.9498967.6492
2.6169.7403268.5512567.9703967.6492
2.6269.8496668.5990967.9840567.6697
2.6369.9316668.6469268.0113967.68337
2.6470.020568.6742668.0318967.68337
2.6570.1093468.7289368.0523967.69704
2.6670.1913468.7699368.0660667.71754
2.6770.2733568.804168.0933967.71071
2.6870.3553568.8382768.1207367.73121
2.6970.4373668.8792768.134467.73121
2.7070.5125368.9066168.154967.75171
Table 3. The exact values of the dependencies are presented in Figure 3.
Table 3. The exact values of the dependencies are presented in Figure 3.
T Π ¯ ( T , f = 2.50 ) Π ¯ ( T , f = 2.60 ) Π ¯ ( T , f = 2.70 )
269.2127770.9489472.54894
369.2297971.0255372.68511
469.2468171.0851172.80426
569.2638371.1276672.90638
669.2638371.1702173
769.2723471.2042673.08511
869.2808571.238373.14468
969.2893671.2638373.20426
1069.3063871.2893673.2383
1169.3148971.3063873.27234
1269.3148971.3148973.31489
1369.323471.3319173.34894
1469.323471.3319173.34894
1569.323471.3489473.38298
1669.323471.3659673.40851
Table 4. The exact values of the dependencies are presented in Figure 4.
Table 4. The exact values of the dependencies are presented in Figure 4.
t Π ( t , T = 5 ) Π ( t , T = 10 ) Π ( t , T = 15 )
225073.3892772.7998372.56985
225273.384372.7982672.56998
225473.3776172.7966972.56841
225673.3692372.7951272.57025
225873.3574572.7918672.56698
226073.3456672.7885872.56542
226273.3355772.7819172.56726
226473.3254872.7752372.56228
226673.317172.7702572.56072
226873.3104372.7652872.56085
227073.3071572.7637272.55758
227273.30972.7604472.55601
227473.3108472.7639972.55615
227673.3143872.7624372.55629
227873.3230472.7642672.55813
228073.3316872.766172.55656
228273.3420572.7713572.5584
228473.3541172.7731972.56194
228673.3661772.7801372.56208
228873.3782372.7836872.56562
229073.3834872.7923472.56406
229273.3904372.7992972.5693
229473.3956872.8011272.56944
229673.3992272.8046772.57127
229873.3993572.804872.56971
230073.3977872.8015472.56985
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Kovtun, V.; Altameem, T.; Al-Maitah, M.; Kempa, W. The Markov Concept of the Energy Efficiency Assessment of the Edge Computing Infrastructure Peripheral Server Functioning over Time. Electronics 2023, 12, 4320. https://doi.org/10.3390/electronics12204320

AMA Style

Kovtun V, Altameem T, Al-Maitah M, Kempa W. The Markov Concept of the Energy Efficiency Assessment of the Edge Computing Infrastructure Peripheral Server Functioning over Time. Electronics. 2023; 12(20):4320. https://doi.org/10.3390/electronics12204320

Chicago/Turabian Style

Kovtun, Viacheslav, Torki Altameem, Mohammed Al-Maitah, and Wojciech Kempa. 2023. "The Markov Concept of the Energy Efficiency Assessment of the Edge Computing Infrastructure Peripheral Server Functioning over Time" Electronics 12, no. 20: 4320. https://doi.org/10.3390/electronics12204320

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop