Skip to main content
Log in

Analysis of wireless communication networks under edge computing scenarios

  • Original Paper
  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

In communication networks, edge computing is a method of distributing processing, storage, and bandwidth resources to the side of the network that is closest to the user. This could be achieved through small computing devices installed in proximity of user or the network routers. In this paper, we discuss the architecture and principles of mobile edge computing (MEC) and edge caching in large-scale wireless networks. Moreover, we also discuss the necessity, widespread use, and the future of MEC and caching technologies. Finally, we analyze five key issues when MEC and caching are used for large-scale wireless networks: (i) computation offloading, (ii) edge caching, (iii) multidimensional resource allocation, (iv) user association (including privacy protection), and (v) privacy protection. Furthermore, edge servers are typically equipped with limited resources and are unable to meet the service demands of all vehicular network users at the same time. Therefore, identifying locations for service offloading and providing low latency services to users, while working within the aforementioned constraints, continues to be a significant challenge. Using deep and deep intensive learning coordination, we propose an edge computing system model for 5G vehicular networks that includes an “end-to-edge cloud” coordination. We, then, suggest a distributed service offloading method, called DSOAC, based on the coordination. Based on data sets collected from real-world wireless communication networks, experimental findings reveal that the DSOAC method can decrease service offloading time by approximately 0.4 to 20.0% when compared to the four current service offloading techniques. We observed that this ranges from 4 to 20.4% of the typical user workloads. An approximate 4% of the average customer service delay was caused by the proposed offloading scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Data Availability

All the data is available in the paper.

References

  1. Guo, H., & Liu, J. (2018). Collaborative computation offloading for multiaccess edge computing over fiber–wireless networks [J]. IEEE Transactions on Vehicular Technology, 67(5), 4514–4526

    Article  Google Scholar 

  2. Bi, S., & Zhang, Y. J. (2018). Computation rate maximization for wireless powered mobile-edge computing with binary computation offloading [J]. IEEE Transactions on Wireless Communications, 17(6), 4177–4190

    Article  Google Scholar 

  3. Abbas, N., Zhang, Y., Taherkordi, A., et al. (2017). Mobile edge computing: A survey [J]. IEEE Internet of Things Journal, 5(1), 450–465

    Article  Google Scholar 

  4. Ko, S. W., Han, K., & Huang, K. (2018). Wireless networks for mobile edge computing: Spatial modeling and latency analysis [J]. IEEE Transactions on Wireless Communications, 17(8), 5225–5240

    Article  Google Scholar 

  5. Wang, F., & Zhang, X. (2018). Dynamic interface-selection and resource allocation over heterogeneous mobile edge-computing wireless networks with energy harvesting [C]//IEEE INFOCOM 2018-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE, : 190–195

  6. Zhang, X., & Zhu, Q. (2017). Distributed mobile devices caching over edge computing wireless networks [C]//2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE, : 127–132

  7. Gai, K., Xu, K., Lu, Z., et al. (2019). Fusion of cognitive wireless networks and edge computing [J]. IEEE Wireless Communications, 26(3), 69–75

    Article  Google Scholar 

  8. Lai, S., Zhao, R., Tang, S., et al. (2021). Intelligent secure mobile edge computing for beyond 5G wireless networks [J]. Physical Communication, 45, 101283

    Article  Google Scholar 

  9. Guo, F., Yu, F. R., Zhang, H., et al. (2019). Adaptive resource allocation in future wireless networks with blockchain and mobile edge computing [J]. IEEE Transactions on Wireless Communications, 19(3), 1689–1703

    Article  Google Scholar 

  10. Liang, B., Wong, V. W. S., Schober, R., et al. (2017). Mobile edge computing [J]. Key technologies for 5G wireless systems, 16(3):1397–1411

  11. Gu, Y., Yao, Y., Li, C., et al. (2021). Modeling and Analysis of Stochastic Mobile Edge Computing Wireless Networks [J]. IEEE Internet of Things Journal

  12. Mehmood, M. Y., Oad, A., Abrar, M., et al. (2021). Edge computing for IoT-enabled smart grid [J]. Security and Communication Networks, 2021

  13. Nguyen, D. C., Ding, M., Pham, Q. V., et al. (2021). Federated learning meets blockchain in edge computing: Opportunities and challenges [J]. IEEE Internet of Things Journal

  14. Al-Ansi, A., Al-Ansi, A. M., Muthanna, A., et al. (2021). Survey on Intelligence Edge Computing in 6G: Characteristics, Challenges, Potential Use Cases, and Market Drivers [J]. Future Internet, 13(5), 118

    Article  Google Scholar 

  15. Chen, Z., & Wang, X. (2020). Decentralized computation offloading for multi-user mobile edge computing: A deep reinforcement learning approach [J]. EURASIP Journal on Wireless Communications and Networking, 2020(1), 1–21

    Article  Google Scholar 

  16. Huang, L., Feng, X., Zhang, C., et al. (2019). Deep reinforcement learning-based joint task offloading and bandwidth allocation for multi-user mobile edge computing [J]. Digital Communications and Networks, 5(1), 10–17

    Article  Google Scholar 

  17. Li, N., Martinez-Ortega, J. F., & Diaz, V. H. (2018). Distributed power control for interference-aware multi-user mobile edge computing: a game theory approach [J]. Ieee Access : Practical Innovations, Open Solutions, 6, 36105–36114

    Article  Google Scholar 

  18. Ke, H., Wang, H., Sun, W., et al. (2021). Adaptive computation offloading policy for multi-access edge computing in heterogeneous wireless networks [J]. IEEE Transactions on Network and Service Management

  19. Derbeko, P., Dolev, S., & Gudes, E. (2021). Wavelet-based dynamic and privacy-preserving similitude data models for edge computing [J]. Wireless Networks, 27(1), 351–366

    Article  Google Scholar 

  20. Mao, Y., Zhang, J., Song, S. H., et al. (2017). Stochastic joint radio and computational resource management for multi-user mobile-edge computing systems [J]. IEEE Transactions on Wireless Communications, 16(9), 5994–6009

    Article  Google Scholar 

  21. Khan, A., Nasir, et al. (2017). A comparative study and workload distribution model for re-encryption schemes in a mobile cloud computing environment. International Journal of Communication Systems, 30, e3308

    Article  Google Scholar 

  22. Mustafa, S., et al. (2015). Resource management in cloud computing: Taxonomy, prospects, and challenges. Computers & Electrical Engineering, 47, 186–203

    Article  Google Scholar 

  23. Sonkoly, B., et al. (2021). “Survey on Placement Methods in the Edge and Beyond.“. IEEE Communications Surveys & Tutorials, 23(4), 2590–2629

    Article  Google Scholar 

  24. Khan, A., Ali, & Zakarya, M. (2021). “Energy, performance and cost efficient cloud datacentres: A survey.“. Computer Science Review, 40, 100390

    Article  Google Scholar 

  25. Zhang, Q., et al. (2020). Energy-Aware Scheduling in Edge Computing Based on Energy Internet. IEEE access, 8, 229052–229065

    Article  Google Scholar 

  26. Zakarya, M., et al. (2020). “Epcaware: a game-based, energy, performance and cost efficient resource management technique for multi-access edge computing.“IEEE Transactions on Services Computing

  27. Abbas, S., et al. (2021). Improving security of the Internet of Things via RF fingerprinting based device identification system. Neural Computing and Applications, 33(21), 14753–14769

    Article  Google Scholar 

  28. Khurshid, A., et al. (2019). Secure-CamFlow: A device‐oriented security model to assist information flow control systems in cloud environments for IoTs. Concurrency and Computation: Practice and Experience, 31(8), e4729

    Article  Google Scholar 

  29. Ali, B., Gregory, M. A., & Li, S. (2021). Multi-access edge computing architecture, data security and privacy: A review. Ieee Access : Practical Innovations, Open Solutions, 9, 18706–18721

    Article  Google Scholar 

Download references

Funding

Research on innovation countermeasures of library information Service from the perspective of big data”(Project No:SLGKY16-40).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jianhang Wang.

Ethics declarations

Competing interests

I declare that I have no conflict of interest.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, J. Analysis of wireless communication networks under edge computing scenarios. Wireless Netw 28, 3665–3676 (2022). https://doi.org/10.1007/s11276-022-03043-4

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-022-03043-4

Keywords

Navigation