You are on page 1of 7

5706 IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO.

7, JULY 2020

Interaction of Edge-Cloud Computing Based on


SDN and NFV for Next Generation IoT
Zhihan Lv and Wenqun Xiu

Abstract—In order to improve the stability of mobile network computing tasks to the cloud, which however, increases the
system for application of the next generation of Internet of Things amount of data transmission, brings great pressure to the core
(IoT), balance the network load and guarantee the quality of network, and undermines the service quality as a result of
user service experience, this article first introduces the comput-
ing migration framework for the network of the next generation, excessive data transmission.
and summarizes the concept and content of mobile edge comput- At present, the research of the next generation network tech-
ing (MEC) using software-defined network (SDN) and network nology goes from strength to strength and research institutions
function virtualization (NFV). And then, this article proceeds to at home and abroad are fully engaged in the research of 5G
introduce the MEC strategy based on SDN and NFV technology standard establishment and its key technology [3]. At present,
as well as multiattribute decision making, computing migration,
multiattribute decision, the MEC decision model based on SDN there are relatively a few studies conducted on mobile edge
and NFV technology and the solving process of the MEC decision computing (MEC) migration strategy, while the main research
model based on SDN and NFV. Finally, the three sets of simu- focus is on the theory and application scenario of MEC.
lation experiments based on MATLAB are designed to validate Alenezi et al. [4] achieved MEC in mobile network by virtue
the multiattribute decision of MEC migration strategy based on of software-defined network (SDN), network function virtual-
SDN and NFV. The results show that the multiattribute decision
making based on SDN and NFV can select the appropriate MEC ization (NFV), and fog computing. Farshin and Sharifian [5]
center, further reduce the server response time and improve the successfully reduced the patient waiting time by means of
quality of user service experience. This article is of great signif- MEC in healthcare. Song et al. [6] validated and evaluated
icance to the application of IoT terminal in the next generation the application of MEC in telemedicine and results showed
of network environment. that an MEC is possible in telemedicine.
Index Terms—Cloud computing, edge computing, Internet of MEC is critical in the next generation network technol-
Things (IoT) applications, network function virtualization (NFV), ogy. By definition, MEC technology is to install the servers
software-defined network (SDN). with the functions of cloud computing, storage, and processing
in the accessories of base station, which can provide reli-
I. I NTRODUCTION able cloud service for mobile users near the base station [7].
A. Background For mobile networks, computing migration strategy can con-
trol network traffic, and network load balancing can improve
ITH the rapid development of Internet of Things (IoT)
W applications and smart terminals, according to rele-
vant reports [1], statistics of the aggregate growth of mobile
system performance. For users, computing migration strategy
can improve the quality of user experience service. Therefore,
the research of edge computing migration strategy based on
data indicate that the total mobile data is expected to achieve MEC is of great practical significance to both the users and
a sevenfold increase in the next four years. Between 2016 mobile networks.
and 2019, virtual reality traffic grew from 13.3 petabytes per
month to 140 petabytes per month. The proliferation of a
mobile network traffic poses a huge challenge to the exist- B. Introduction to Relevant Technology
ing mobile networks, and the existing network technology no 1) Introduction to the Next Generation Network
longer meets the business needs arising from the explosion Environment: From 2G to 3G and from 3G to 4G, the
of mobile data [2]. The existing network structure migrates speed of the development of mobile network is very fast.
Manuscript received August 6, 2019; revised September 1, 2019; When it comes to the next generation network environment,
accepted September 16, 2019. Date of publication October 9, 2019; 5G technology undoubtedly will promote the development of
date of current version July 10, 2020. This work was supported IoT, and the reverse holds true. 5G technology can satisfy
in part by the National Natural Science Foundation of China under
Grant 61902203, in part by the Natural Science Foundation of higher transmission demand, achieve shorter transmission
Shandong Province under Grant ZR2017QF015, and in part by the time, and contributes to more efficient network society. The
Technology and Innovation Commission of Shenzhen Municipality under 5G network architecture is divided into system architecture
Grant JCYJ20170412142239369. (Corresponding author: Zhihan Lv.)
Z. Lv is with the School of Data Science and Software Engineering, and group network architecture. The logical view of 5G
Qingdao University, Qingdao 266071, China (e-mail: lvzhihan@gmail.com). network consists of access plane, forwarding plane, and
W. Xiu is with the Research and Development Center, Shenzhen Urban control plane. The network view of 5G network consists of
Public Safety and Technology Institute, Shenzhen 518046, China (e-mail:
xiuwenqun@qq.com). central level, convergence level, regional level, and access
Digital Object Identifier 10.1109/JIOT.2019.2942719 level [8].
2327-4662 
c 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.

Authorized licensed use limited to: Kyunghee Univ. Downloaded on November 15,2020 at 04:17:20 UTC from IEEE Xplore. Restrictions apply.
LV AND XIU: INTERACTION OF EDGE-CLOUD COMPUTING BASED ON SDN AND NFV FOR NEXT GENERATION IoT 5707

2) Introduction to SDN and NFV Technology: In the tra-


ditional communication network, the network nodes, network
topology, and hardware are closely coupled. Each service node
has specialized equipment, and the device deployment is com-
plex. With the rapid increase and expansion of new network
services, the reconstruction and upgrading of node equipment
in the traditional network is not only slow but also with heavy
workload, which hinders the development of the new network Fig. 1. Matrix representation of classical multiattribute decision model.
services. With the development of SDNs and NFV technology,
its application to the network makes it to accomplish new fea-
tures, such as on-demand allocation of resources and business satisfaction of mobile users but also improve the quality of
flexibility. their service experience.
In the original proposed SDN architecture, the control plane 2) Research Contents of Mobile Edge Computing Based on
and the data forwarding plane are separated. The reason is that SDN and NFV: There are six aspects of the main research con-
several controlled forwarding devices constitute the data for- tents of MEC: 1) the standard protocol is to perform mobile
warding plane, and the business logic and the forwarding route edge computation according to standardized protocol; 2) the
are controlled by the controller on the control plane controls, development of simulation platform is indispensable in the
thus the SDN architecture can realize flexible and convenient research of MEC; 3) mobile management suggests that spe-
control of traffic flow. However, after SDN was proposed, it cific location of users in the mobile process can be obtained by
not only separates the control panel from the data forward- virtue of mobile management to ensure the quality of service
ing panel but also enhances the direct programming control experience of users; 4) because the pricing model of data flow
mode, which makes the network better control the data for- calculated by moving edge is different from the traditional
warding. The SDN architecture consists of a control plane, an pricing model, so a new pricing model is needed; 5) extensi-
application plane, a data plane, and a control plane [9]. bility; and 6) security is the ability of MEC services to ensure
NFV can make general hardware resources map into virtual the authentication of visiting users of hosted apps and the
resources and its main function is to achieve traditional and security of database.
noncloud network elements.
II. M IGRATION S TRATEGY OF M OBILE E DGE C OMPUTING
C. Introduction to Mobile Edge Computing Based on SDN BASED ON M ULTIPLE ATTRIBUTE D ECISION
and NFV A. Migration Decision Model for Mobile Edge Computing
1) Concept of Mobile Edge Computing: MEC is a new 1) Classic Multiple Attribute Decision Model: In the clas-
type of information technology that provides services to the sical multiple attribute decision model, during the decision
mobile users close to mobile wireless access by virtue of making process, not only the set of candidate schemes should
cloud computing. NFV, SDN, and cloud computing are impor- be determined but also the scheme should possess multiple
tant technologies in MEC. These technologies improve the attributes [15]. Given a set X, there are i schemes in X,
data center server installed next to the wireless base station, denoted as X1 , X2 , . . . , and Xm . If each candidate scheme has
which can compress large amounts of data. It is estimated that N attributes, they are denoted as b1 , b2 , . . . , and bn . Because
the data computing center server next to the wireless base sta- each element in X is discrete, it can be represented as a matrix,
tion can reduce the use of wired broadband by 36% and the as shown in Fig. 1. In Fig. 1, X1 , X2 , and X3 represent the three
user network transmission time by 49% [10]. candidate schemes in the decision; b1 , b2 , b3 , b4 , and b5 repre-
The moving edge computing is a form of distributed sent the attributes of each scheme. Thus in the decision matrix
computing, boasting the characteristics of low latency, fast Xi,j , the attribute bj is in the candidate scheme Xi .
data processing, and intelligence [11]. MEC does not transfer 2) Edge Computing Decision Migration Model of Based on
all the data to remote cloud data centers, instead, it filters the SDN and NFV: As is commonly known, the decision index
data uploaded by the mobile devices, indicating that data are is significantly related to the decision result. Therefore, this
analyzed and filtered in terms of user layer. This approach article divides the decision indexes into three aspects: 1) ben-
not only saves time effectively but also reduces the pressure efit index, which is usually referred to as positive index. The
on the core network and effectively reduces the data trans- higher the index, the better the result; 2) cost index, also known
mitted from the device to the cloud [12]–[14]. In terms of as reverse index, the smaller the value, the better the result;
the intelligentization of MEC, it transfers the computation and and 3) neutral index, the optimal solution is achieved when the
storage from the core network to the edge network, which can value of the index is taken in the middle of a certain range.
effectively reduce network delay. In the meantime, network According to MEC migration scenarios, this article con-
load, user location, and other real-time information can be pro- siders that the MEC migration is carried out in the mobile
vided to research and development personnel. During research network. According to the characteristics of the mobile
and development, research and development personnel can add network, this article selects five indexes to establish a model,
real-time network information to applications and deliver ser- including cost, time, bandwidth, energy consumption, and
vice content to mobile users, which can not only increase the energy calculation to model.

Authorized licensed use limited to: Kyunghee Univ. Downloaded on November 15,2020 at 04:17:20 UTC from IEEE Xplore. Restrictions apply.
5708 IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 7, JULY 2020

The cost mainly includes two parts: 1) migration cost and not explained here). In Fig. 1, X1 , X2 , and X3 represent the
2) communication cost. According to the characteristics of the three candidate schemes in the decision; b1 , b2 , b3 , b4 , and b5
cost index, the lower is the index value of the model, the represent time delay cost, time, bandwidth, energy consump-
better is the scheme design. Equations (1) and (2) represent tion, and computation energy, respectively. In this article, the
the migration cost model and the communication cost model, destination of edge data migration is a user-centered circle
respectively with the radius of K for data selection, and the set of candidate
schemes is composed of these selected data centers.
Cm (si, sj) = Wm ∗ dsi,sj (1)
Because of the large difference between the indexes in the
where Cm represents the cost of migration; dsi,sj represents decision-making process, the calculation process is complex,
the migration cost and the distance of migration; and Wm which leads to the inaccuracy of the experimental results. In
represents the unit migration cost order to facilitate computation and minimize the difference
between the indexes, the indexes should be standardized.
Cc (si, sj) = Wc ∗ dsi,sj (2) There are two ways of standardization: 1) vector nor-
where Cc represents the communication energy consumption; malization and 2) linear scaling transformation. In vector
dsi,sj represents the communication distance; and Wc represents normalization, index attribute values are scaled down to the
the unit communication cost. same unit length, as shown
The time index refers to the time the users need from send- xi,j
yi,j =  (7)
ing data to receiving data. Time is a cost index, the lower the n 2
i=1 xi,j
value, the better the scheme. It consists of two parts: 1) trans-
mission delay and 2) computation delay [16]. The time model where xi,j is the original attribute value of the attribute in
is shown column J of the i scheme; and yi,j indicates that the attribute
value has been normalized. However, each attribute in this
T = Tp + Tc . (3) method should be normalized.
When it comes to bandwidth, it means that there are m In linear scaling transformation method, different indexes
virtual machines in a computing center which can serve m are standardized differently. In this article, there are posi-
users at the same time, and the total amount of bandwidth tive indexes (bandwidth and computing power) and negative
of a computing center is fixed [17]. Assuming the amount of indexes (energy consumption, time, and cost), so the corre-
bandwidth a virtual machine can have is B, the limit values of sponding linear transformation is adopted to standardize the
the number of users in each computing center are set as T1 indexes.
and T2. Thus, the broadband model can be expressed Equations (8) and (9) can be used to transform positive
⎧ indexes
⎨ Bmax , m < T1
B = W/m, T1 ≤ m ≤ T2 (4) xj∗ = max , xi,j = 0 (8)
⎩ 1<i<m
Bmin , n > T2 . xi,j
yij = (1 ≤ i ≤ m) (9)
Energy consumption refers to the energy consumed when xj∗
the MCE computing center offers service to users [18]. Energy
where xj∗ represents the minimum value of the attribute in
consumption is also a cost index. The energy consumption
column j in the candidate scheme; and yij represents the
model is shown
standardized attribute value.
Esi = Eb + m ∗ Cvm (5) And (10) and (11) can be used to transform positive indexes
where Esi refers to the total energy consumed when the com- xj∗ = min , xi,j = 0 (10)
1<i<m
puter center runs a single virtual machine for m seconds; xi,j
Eb refers to the total standby power consumption of a sin- yij = (1 ≤ i ≤ m). (11)
xj∗
gle virtual machine running in an MEC data center; and Cvm
represents the unit energy consumption of the virtual machine. B. Migration Process of Edge Computing Based on SDN
In this way, the capacity of a computer can be known. and NFV
The capacity of a computer is fixed and it can serve N users
simultaneously, the model is shown The mobile edge cloud computing center can detect other
MEC centers within the specified range in the process of com-
C puting. Other MEC centers complete the computing migration
v= (6)
n tasks through the wired network (such as optical fiber) to
where v represents the computer capacity acquired by each ensure the quality of user experience [5], [19]. The compu-
user; C represents the total capacity of the computer, and n tational migration model between MEC centers is shown in
represents the number of users. Fig. 3.
In this article, cost, time, bandwidth, energy consumption, Fig. 4 shows the interoperation between MEC and the vir-
and computation energy are the five factors that influence the tual machine. The source computing center A is the computer
multiple attribute decision of MEC computing migration strat- center connected by the user mobile terminal and offering
egy. The experimental decision matrix is shown in Fig. 1 (and service to users. When the user starts to move, the distance

Authorized licensed use limited to: Kyunghee Univ. Downloaded on November 15,2020 at 04:17:20 UTC from IEEE Xplore. Restrictions apply.
LV AND XIU: INTERACTION OF EDGE-CLOUD COMPUTING BASED ON SDN AND NFV FOR NEXT GENERATION IoT 5709

Fig. 2. Computational migration between MEC computing centers.

Fig. 3. MEC virtual machine migration timing diagram.

Fig. 5. Completion (a) time and (b) cost of transport-intensive tasks under
different migration strategies.

is performed along with the computational migration. When


the computational migration is finished, the source computing
center A will continue to offer services to users.

III. S IMULATION AND R ESULT A NALYSIS OF E DGE


C OMPUTING M IGRATION S TRATEGY BASED
ON SDN AND NFV
A. Simulation Design
1) Simulation Scenario: Fig. 1 is a system diagram of MEC
migration strategy based on SDN and NFV technology, which
Fig. 4. MEC migration strategy simulation flow chart. consists of initialization module, information gathering mod-
ule, strategy selection module, and evaluation module. The
initialization module consists of three parts: 1) initialization
between the user and the source computing becomes larger, of simulation scenarios; 2) initialization of task; and 3) ini-
which results in the increase of transmission time. In order to tialization of evaluation indexes. In this module, the user’s
ensure the quality of user experience, the MEC migration deci- connection to the MEC computing center needs to be demon-
sion based on multiple attribute decision should be launched. strated to initialize computing power, bandwidth, and location.
Whether the computational migration should be launched or The information collection module mainly records the instan-
not is decided by the computation results of the multiat- taneous value of the dynamic variables, such as the location of
tribute decision: if source computing center A is in the first mobile devices and the residual computation amount of tasks.
place, no computing migration will be carried out, and the The policy selection module is to select and implement the
source computing center A will provide services to users; If appropriate strategies from NO-migrate strategy, Markov deci-
other computing centers are in the first place, computation sion, and multiple attribute decision. Evaluation index module

Authorized licensed use limited to: Kyunghee Univ. Downloaded on November 15,2020 at 04:17:20 UTC from IEEE Xplore. Restrictions apply.
5710 IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 7, JULY 2020

TABLE I
S IMULATION PARAMETER D ESIGN

Fig. 7. Completion (a) time and (b) cost of computationally intensive tasks
under different migration strategies.

intensive, and IO intensive. For each type of task, the com-


puting center is set under light load, normal load, and heavy
load to compare the performance of multiple attribute decision
strategy and other two classic strategies. The indices for com-
parison include task delay, completion cost, network energy
consumption, and bandwidth occupation time.
1) Analysis of Simulation Results of Group 1:
Fig. 5 demonstrates the comparison of simulation performance
regarding completion time and cost between the migration
Fig. 6. Energy consumption and bandwidth occupation time of transmission-
intensive tasks under different migration strategies. (a) Energy consumption.
strategy proposed in this article and the other two classic
(b) Bandwith occupation time. strategies under different load conditions in simulation envi-
ronment 1. In order to ensure the noncontingency of the
calculates and records the completion time and cost of tasks, simulation results, two experiments were carried out for the
energy consumption, and bandwidth occupation time. same strategy and load state. Their simulation results are
marked in different colors in Fig. 5. It can be seen that the
2) Simulation Parameters: The simulation parameters are
performance of the two experiments is consistent. In terms
shown in Table I. As can be seen from the table, the param-
of task delay, under heavy load and normal load, Markov
eter settings are: task upload is set as 1M, task calculation
decision migration strategy and the multiple attribute decision
is 800 MIPS, server power consumption is [2, 10], task
strategy proposed in this article perform better than the non-
migration is 2M, task downloads are 5M, virtual computing
migration strategy. Similarly, under light load, the multiple
power is [60 000, 100 000], each server handles unit task costs
attribute decision strategy outperforms the other two. When
are [4, 6] ∗ 10(−4).
it comes to task completion cost, experimental results indi-
cate that the performance of multiple attribute decision is
B. Simulation Results and Analysis weakened under heavy load condition, because in the multiple
In this article, three groups of simulation environment are attribute decision strategy, more weight is dedicated to con-
set up. The task types are transmission intensive, computation sideration of time delay performance of the task than the

Authorized licensed use limited to: Kyunghee Univ. Downloaded on November 15,2020 at 04:17:20 UTC from IEEE Xplore. Restrictions apply.
LV AND XIU: INTERACTION OF EDGE-CLOUD COMPUTING BASED ON SDN AND NFV FOR NEXT GENERATION IoT 5711

Fig. 9. Completion (a) time and (b) cost of IO tasks under different migration
strategies.

Fig. 8. Energy consumption and bandwidth occupation time of compu-


tationally intensive tasks under different migration strategies. (a) Energy
consumption. (b) Occupation loan duration. performance of NO-migrate strategy and Markov decision
migration strategy demonstrates significant variation in dif-
ferent load states. Among them, the NO-migrate strategy
performs well under light load, while Markov decision strategy
consideration of the distance factor ratio, while the consid- performs better under heavy load, and both strategies perform
eration of distance factor is emphasized in Markov decision. poorly in opposite conditions. In contrast, the multiple attribute
Nevertheless, under normal load and light load conditions, the decision strategy proposed in this article is more stable in
completion cost of the multiple attribute decision is compa- different conditions, can be more widely applied and more
rable to the Markov decision strategy, which both outperform advantageous.
the NO-migrate strategy. 2) Analysis of Simulation Results of Group 2: Fig. 8 is
Fig. 6 demonstrates a comparison of performance regarding the comparison of the performance of energy consumption
energy consumption and bandwidth occupation time among and bandwidth occupation time in simulation environment 2.
the three strategies. Two experiments under the same exper- Two experiments under the same experimental conditions both
imental conditions both indicate that the multiple attribute indicate that the multiple attribute decision strategy presented
decision strategy proposed in this article considers several fac- in this article is more advantageous than the other two deci-
tors in the service decision, and optimizes what is neglected sion strategies and boasts wider possibilities for application.
by other algorithms. Compared with the other two computing In computationally intensive tasks, the key energy consump-
strategies, the multiple attribute decision strategy presented in tion lies in computing and the energy consumption factor has
this article outperforms them. a great influence. The simulation results show that the multiple
Fig. 7 demonstrates the comparison of simulation attribute decision strategy performs better under heavy load
performance regarding completion time and cost between the and normal load.
migration strategy proposed in this article and the other two 3) Analysis of Simulation Results of Group 3: Fig. 9 shows
classic strategies under different load conditions in simula- the comparison of completion time and cost in simulation
tion environment 2. In order to ensure the noncontingency environment 3. In order to ensure the noncontingency of the
of the simulation results, two experiments were carried out simulation results, two experiments are carried out under the
for the same strategy and load state. Their simulation results same strategy and load conditions. The simulation results are
are marked in different colors in Fig. 7. It can be seen marked in different colors. From the comparison, it can be
that the performance of the two experiments is consistent seen that the performance of the two experiments is consistent.
under the same experimental conditions. In addition, the In the IO task, CPU consumption is low, waiting for IO

Authorized licensed use limited to: Kyunghee Univ. Downloaded on November 15,2020 at 04:17:20 UTC from IEEE Xplore. Restrictions apply.
5712 IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 7, JULY 2020

operation occupies the majority of the task. So time is very [3] A. A. Diro, H. T. Reda, and N. Chilamkurti, “Differential flow
important and plays a significant role in multifactor comput- space allocation scheme in SDN based fog computing for IoT appli-
cations,” J. Ambient Intell. Humanized Comput., vol. 5, pp. 1–11,
ing decision strategy. Therefore, only completion time and cost Jan. 2018.
are compared in this simulation environment. It is shown from [4] M. Alenezi, K. Almustafa, and K. A. Meerja, “Cloud based SDN and
the graph that the strategy presented in this article performs NFV architectures for IoT infrastructure,” Egyptian Informat. J., vol. 20,
no. 1, pp. 1–10, 2019.
better in completion time and cost under three load condi- [5] A. Farshin and S. Sharifian, “A chaotic grey wolf controller allocator for
tions, indicating a wide range of adaptability. Results of the software defined mobile network (SDMN) for 5th generation of cloud-
two simulation experiments are consistent, which guarantees based cellular systems (5G),” Comput. Commun., vol. 108, pp. 94–109,
Aug. 2017.
the reliability of the results. [6] S. Song, C. Lee, H. Cho, G. Lim, and J.-M. Chung, “Clustered vir-
Based on the performance comparison of the above three tualized network functions resource allocation based on context-aware
simulation environments, the multiple attribute decision strat- grouping in 5G edge networks,” IEEE Trans. Mobile Comput., to be
published.
egy proposed in this article takes multiple factors into account [7] I. Alawe, A. Ksentini, Y. Hadjadj-Aoul, and P. Bertin, “Improving traf-
and performed better in most tasks and load conditions. It is fic forecasting for 5G core network scalability: A machine learning
important to design a more reasonable computing strategy to approach,” IEEE Netw., vol. 32, no. 6, pp. 42–49, Nov./Dec. 2018.
[8] V. S. Shah, “Multi-agent cognitive architecture-enabled IoT applica-
improve network performance. tions of mobile edge computing,” Ann. Telecommun., vol. 73, nos. 7–8,
pp. 487–497, 2018.
[9] P. K. Sharma, S. Rathore, Y.-S. Jeong, and J. H. Park, “Softedgenet:
IV. C ONCLUSION SDN based energy-efficient distributed network architecture for edge
computing,” IEEE Commun. Mag., vol. 56, no. 12, pp. 104–111,
This article studies the interaction between the edge com- Dec. 2018.
[10] K. Kaur, S. Garg, G. S. Aujla, N. Kumar, and J. J. P. C. Rodrigues, “Edge
puting based on SDN and NFV technology and the cloud computing in the industrial Internet of Things environment: Software-
computing in the next generation IoT. This article first intro- defined-networks-based edge-cloud interplay,” IEEE Commun. Mag.,
duces the concept and implication of MEC based on SDN and vol. 56, no. 2, pp. 44–51, Feb. 2018.
[11] H.-C. Hsieh, J.-L. Chen, and A. Benslimane, “5G virtualized multi-
NFV, then illuminates the multiattribute decision making based access edge computing platform for IoT applications,” J. Netw. Comput.
on SDN and NFV, and analyzes the solving process of MEC Appl., vol. 115, pp. 94–112, Aug. 2018.
decision model based on SDN and NFV technology. Finally, [12] J. Ordonez-Lucena, P. Ameigeiras, D. Lopez, J. J. Ramos-Munoz,
J. Lorca, and J. Folgueira, “Network slicing for 5G with SDN/NFV:
three sets of simulation experiments based on MATLAB were Concepts, architectures, and challenges,” IEEE Commun. Mag., vol. 55,
designed to validate the multiattribute decision of MEC migra- no. 5, pp. 80–87, May 2017.
tion strategy based on SDN and NFV. In this article, compares [13] C. Mouradian, N. T. Jahromi, and R. H. Glitho, “NFV and SDN-based
distributed IoT gateway for large-scale disaster management,” IEEE
the performance results of the three simulation environments, Internet Things J., vol. 5, no. 5, pp. 4119–4131, Oct. 2018.
and the results show that considering multiple attributes serves [14] Q. Wei and H. Zhang, “Future Internet architecture: Research status,
to perform better in most tasks and load status. In addition, hot topics, and development practice,” Scientia Sinica, vol. 67, no. 2,
pp. 56–58, 2017.
two groups of experiments were used in the simulation exper- [15] A. M. Zarca et al., “Security management architecture for NFV/SDN-
iment, which proves that the design of multiattribute decision aware IoT systems,” IEEE Internet Things J., to be published.
computing strategy based on SDN and NFV is more reason- [16] J. Pan and J. Mcelhannon, “Future edge cloud and edge computing for
Internet of Things applications,” IEEE Internet Things J., vol. 5, no. 1,
able, and indirectly proves that cloud computing can guide pp. 439–449, Feb. 2018.
edge computing to serve the network. [17] A. Gharaibeh et al., “Smart cities: A survey on data management, secu-
This article not only has important research significance for rity, and enabling technologies,” IEEE Commun. Surveys Tuts., vol. 19,
no. 4, pp. 2456–2501, 4th Quart., 2017.
the improvement of network performance but also promotes [18] S. Zhang, L. T. Yang, L. Kuang, J. Feng, J. Chen, and V. Piuri, “A
the application of IoT terminal in the next generation network tensor-based forensics framework for virtualized network functions in
environment. In future, we will improve our research by new the Internet of Things: Utilizing tensor algebra in facilitating more effi-
cient network forensic investigations,” IEEE Consum. Electron. Mag.,
technology [20], [21]. vol. 8, no. 3, pp. 23–27, May 2019.
[19] B. R. Al-Kaseem, Y. Al-Dunainawi, and H. S. Al-Raweshidy,
“End-to-end delay enhancement in 6LoWPAN testbed using pro-
R EFERENCES grammable network concepts,” IEEE Internet Things J., vol. 6, no. 2,
pp. 3070–3086, Apr. 2019.
[1] R. Muñoz et al., “Integration of IoT, transport SDN, and edge/cloud [20] R. Shi, Y. Gan, and Y. Wang, “Evaluating scalability bottlenecks by
computing for dynamic distribution of IoT analytics and efficient use of workload extrapolation,” in Proc. IEEE 26th Int. Symp. Model. Anal.
network resources,” J. Lightw. Technol., vol. 36, no. 7, pp. 1420–1428, Simulat. Comput. Telecommun. Syst. (MASCOTS), Milwaukee, WI,
Apr. 1, 2018. USA, Sep. 2018, pp. 333–347.
[2] H.-C. Hsieh, C.-S. Lee, and J.-L. Chen, “Mobile edge computing [21] P. Jin et al., “PostMan: Rapidly mitigating bursty traffic by offloading
platform with container-based virtualization technology for IoT applica- packet processing,” in Proc. USENIX Annu. Tech. Conf. (USENIX ATC),
tions,” Wireless Pers. Commun., vol. 102, no. 1, pp. 527–542, 2018. Renton, WA, USA, 2019, pp. 849–862.

Authorized licensed use limited to: Kyunghee Univ. Downloaded on November 15,2020 at 04:17:20 UTC from IEEE Xplore. Restrictions apply.

You might also like