Professional Documents
Culture Documents
7, JULY 2020
Abstract—In order to improve the stability of mobile network computing tasks to the cloud, which however, increases the
system for application of the next generation of Internet of Things amount of data transmission, brings great pressure to the core
(IoT), balance the network load and guarantee the quality of network, and undermines the service quality as a result of
user service experience, this article first introduces the comput-
ing migration framework for the network of the next generation, excessive data transmission.
and summarizes the concept and content of mobile edge comput- At present, the research of the next generation network tech-
ing (MEC) using software-defined network (SDN) and network nology goes from strength to strength and research institutions
function virtualization (NFV). And then, this article proceeds to at home and abroad are fully engaged in the research of 5G
introduce the MEC strategy based on SDN and NFV technology standard establishment and its key technology [3]. At present,
as well as multiattribute decision making, computing migration,
multiattribute decision, the MEC decision model based on SDN there are relatively a few studies conducted on mobile edge
and NFV technology and the solving process of the MEC decision computing (MEC) migration strategy, while the main research
model based on SDN and NFV. Finally, the three sets of simu- focus is on the theory and application scenario of MEC.
lation experiments based on MATLAB are designed to validate Alenezi et al. [4] achieved MEC in mobile network by virtue
the multiattribute decision of MEC migration strategy based on of software-defined network (SDN), network function virtual-
SDN and NFV. The results show that the multiattribute decision
making based on SDN and NFV can select the appropriate MEC ization (NFV), and fog computing. Farshin and Sharifian [5]
center, further reduce the server response time and improve the successfully reduced the patient waiting time by means of
quality of user service experience. This article is of great signif- MEC in healthcare. Song et al. [6] validated and evaluated
icance to the application of IoT terminal in the next generation the application of MEC in telemedicine and results showed
of network environment. that an MEC is possible in telemedicine.
Index Terms—Cloud computing, edge computing, Internet of MEC is critical in the next generation network technol-
Things (IoT) applications, network function virtualization (NFV), ogy. By definition, MEC technology is to install the servers
software-defined network (SDN). with the functions of cloud computing, storage, and processing
in the accessories of base station, which can provide reli-
I. I NTRODUCTION able cloud service for mobile users near the base station [7].
A. Background For mobile networks, computing migration strategy can con-
trol network traffic, and network load balancing can improve
ITH the rapid development of Internet of Things (IoT)
W applications and smart terminals, according to rele-
vant reports [1], statistics of the aggregate growth of mobile
system performance. For users, computing migration strategy
can improve the quality of user experience service. Therefore,
the research of edge computing migration strategy based on
data indicate that the total mobile data is expected to achieve MEC is of great practical significance to both the users and
a sevenfold increase in the next four years. Between 2016 mobile networks.
and 2019, virtual reality traffic grew from 13.3 petabytes per
month to 140 petabytes per month. The proliferation of a
mobile network traffic poses a huge challenge to the exist- B. Introduction to Relevant Technology
ing mobile networks, and the existing network technology no 1) Introduction to the Next Generation Network
longer meets the business needs arising from the explosion Environment: From 2G to 3G and from 3G to 4G, the
of mobile data [2]. The existing network structure migrates speed of the development of mobile network is very fast.
Manuscript received August 6, 2019; revised September 1, 2019; When it comes to the next generation network environment,
accepted September 16, 2019. Date of publication October 9, 2019; 5G technology undoubtedly will promote the development of
date of current version July 10, 2020. This work was supported IoT, and the reverse holds true. 5G technology can satisfy
in part by the National Natural Science Foundation of China under
Grant 61902203, in part by the Natural Science Foundation of higher transmission demand, achieve shorter transmission
Shandong Province under Grant ZR2017QF015, and in part by the time, and contributes to more efficient network society. The
Technology and Innovation Commission of Shenzhen Municipality under 5G network architecture is divided into system architecture
Grant JCYJ20170412142239369. (Corresponding author: Zhihan Lv.)
Z. Lv is with the School of Data Science and Software Engineering, and group network architecture. The logical view of 5G
Qingdao University, Qingdao 266071, China (e-mail: lvzhihan@gmail.com). network consists of access plane, forwarding plane, and
W. Xiu is with the Research and Development Center, Shenzhen Urban control plane. The network view of 5G network consists of
Public Safety and Technology Institute, Shenzhen 518046, China (e-mail:
xiuwenqun@qq.com). central level, convergence level, regional level, and access
Digital Object Identifier 10.1109/JIOT.2019.2942719 level [8].
2327-4662
c 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: Kyunghee Univ. Downloaded on November 15,2020 at 04:17:20 UTC from IEEE Xplore. Restrictions apply.
LV AND XIU: INTERACTION OF EDGE-CLOUD COMPUTING BASED ON SDN AND NFV FOR NEXT GENERATION IoT 5707
Authorized licensed use limited to: Kyunghee Univ. Downloaded on November 15,2020 at 04:17:20 UTC from IEEE Xplore. Restrictions apply.
5708 IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 7, JULY 2020
The cost mainly includes two parts: 1) migration cost and not explained here). In Fig. 1, X1 , X2 , and X3 represent the
2) communication cost. According to the characteristics of the three candidate schemes in the decision; b1 , b2 , b3 , b4 , and b5
cost index, the lower is the index value of the model, the represent time delay cost, time, bandwidth, energy consump-
better is the scheme design. Equations (1) and (2) represent tion, and computation energy, respectively. In this article, the
the migration cost model and the communication cost model, destination of edge data migration is a user-centered circle
respectively with the radius of K for data selection, and the set of candidate
schemes is composed of these selected data centers.
Cm (si, sj) = Wm ∗ dsi,sj (1)
Because of the large difference between the indexes in the
where Cm represents the cost of migration; dsi,sj represents decision-making process, the calculation process is complex,
the migration cost and the distance of migration; and Wm which leads to the inaccuracy of the experimental results. In
represents the unit migration cost order to facilitate computation and minimize the difference
between the indexes, the indexes should be standardized.
Cc (si, sj) = Wc ∗ dsi,sj (2) There are two ways of standardization: 1) vector nor-
where Cc represents the communication energy consumption; malization and 2) linear scaling transformation. In vector
dsi,sj represents the communication distance; and Wc represents normalization, index attribute values are scaled down to the
the unit communication cost. same unit length, as shown
The time index refers to the time the users need from send- xi,j
yi,j = (7)
ing data to receiving data. Time is a cost index, the lower the n 2
i=1 xi,j
value, the better the scheme. It consists of two parts: 1) trans-
mission delay and 2) computation delay [16]. The time model where xi,j is the original attribute value of the attribute in
is shown column J of the i scheme; and yi,j indicates that the attribute
value has been normalized. However, each attribute in this
T = Tp + Tc . (3) method should be normalized.
When it comes to bandwidth, it means that there are m In linear scaling transformation method, different indexes
virtual machines in a computing center which can serve m are standardized differently. In this article, there are posi-
users at the same time, and the total amount of bandwidth tive indexes (bandwidth and computing power) and negative
of a computing center is fixed [17]. Assuming the amount of indexes (energy consumption, time, and cost), so the corre-
bandwidth a virtual machine can have is B, the limit values of sponding linear transformation is adopted to standardize the
the number of users in each computing center are set as T1 indexes.
and T2. Thus, the broadband model can be expressed Equations (8) and (9) can be used to transform positive
⎧ indexes
⎨ Bmax , m < T1
B = W/m, T1 ≤ m ≤ T2 (4) xj∗ = max , xi,j = 0 (8)
⎩ 1<i<m
Bmin , n > T2 . xi,j
yij = (1 ≤ i ≤ m) (9)
Energy consumption refers to the energy consumed when xj∗
the MCE computing center offers service to users [18]. Energy
where xj∗ represents the minimum value of the attribute in
consumption is also a cost index. The energy consumption
column j in the candidate scheme; and yij represents the
model is shown
standardized attribute value.
Esi = Eb + m ∗ Cvm (5) And (10) and (11) can be used to transform positive indexes
where Esi refers to the total energy consumed when the com- xj∗ = min , xi,j = 0 (10)
1<i<m
puter center runs a single virtual machine for m seconds; xi,j
Eb refers to the total standby power consumption of a sin- yij = (1 ≤ i ≤ m). (11)
xj∗
gle virtual machine running in an MEC data center; and Cvm
represents the unit energy consumption of the virtual machine. B. Migration Process of Edge Computing Based on SDN
In this way, the capacity of a computer can be known. and NFV
The capacity of a computer is fixed and it can serve N users
simultaneously, the model is shown The mobile edge cloud computing center can detect other
MEC centers within the specified range in the process of com-
C puting. Other MEC centers complete the computing migration
v= (6)
n tasks through the wired network (such as optical fiber) to
where v represents the computer capacity acquired by each ensure the quality of user experience [5], [19]. The compu-
user; C represents the total capacity of the computer, and n tational migration model between MEC centers is shown in
represents the number of users. Fig. 3.
In this article, cost, time, bandwidth, energy consumption, Fig. 4 shows the interoperation between MEC and the vir-
and computation energy are the five factors that influence the tual machine. The source computing center A is the computer
multiple attribute decision of MEC computing migration strat- center connected by the user mobile terminal and offering
egy. The experimental decision matrix is shown in Fig. 1 (and service to users. When the user starts to move, the distance
Authorized licensed use limited to: Kyunghee Univ. Downloaded on November 15,2020 at 04:17:20 UTC from IEEE Xplore. Restrictions apply.
LV AND XIU: INTERACTION OF EDGE-CLOUD COMPUTING BASED ON SDN AND NFV FOR NEXT GENERATION IoT 5709
Fig. 5. Completion (a) time and (b) cost of transport-intensive tasks under
different migration strategies.
Authorized licensed use limited to: Kyunghee Univ. Downloaded on November 15,2020 at 04:17:20 UTC from IEEE Xplore. Restrictions apply.
5710 IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 7, JULY 2020
TABLE I
S IMULATION PARAMETER D ESIGN
Fig. 7. Completion (a) time and (b) cost of computationally intensive tasks
under different migration strategies.
Authorized licensed use limited to: Kyunghee Univ. Downloaded on November 15,2020 at 04:17:20 UTC from IEEE Xplore. Restrictions apply.
LV AND XIU: INTERACTION OF EDGE-CLOUD COMPUTING BASED ON SDN AND NFV FOR NEXT GENERATION IoT 5711
Fig. 9. Completion (a) time and (b) cost of IO tasks under different migration
strategies.
Authorized licensed use limited to: Kyunghee Univ. Downloaded on November 15,2020 at 04:17:20 UTC from IEEE Xplore. Restrictions apply.
5712 IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 7, JULY 2020
operation occupies the majority of the task. So time is very [3] A. A. Diro, H. T. Reda, and N. Chilamkurti, “Differential flow
important and plays a significant role in multifactor comput- space allocation scheme in SDN based fog computing for IoT appli-
cations,” J. Ambient Intell. Humanized Comput., vol. 5, pp. 1–11,
ing decision strategy. Therefore, only completion time and cost Jan. 2018.
are compared in this simulation environment. It is shown from [4] M. Alenezi, K. Almustafa, and K. A. Meerja, “Cloud based SDN and
the graph that the strategy presented in this article performs NFV architectures for IoT infrastructure,” Egyptian Informat. J., vol. 20,
no. 1, pp. 1–10, 2019.
better in completion time and cost under three load condi- [5] A. Farshin and S. Sharifian, “A chaotic grey wolf controller allocator for
tions, indicating a wide range of adaptability. Results of the software defined mobile network (SDMN) for 5th generation of cloud-
two simulation experiments are consistent, which guarantees based cellular systems (5G),” Comput. Commun., vol. 108, pp. 94–109,
Aug. 2017.
the reliability of the results. [6] S. Song, C. Lee, H. Cho, G. Lim, and J.-M. Chung, “Clustered vir-
Based on the performance comparison of the above three tualized network functions resource allocation based on context-aware
simulation environments, the multiple attribute decision strat- grouping in 5G edge networks,” IEEE Trans. Mobile Comput., to be
published.
egy proposed in this article takes multiple factors into account [7] I. Alawe, A. Ksentini, Y. Hadjadj-Aoul, and P. Bertin, “Improving traf-
and performed better in most tasks and load conditions. It is fic forecasting for 5G core network scalability: A machine learning
important to design a more reasonable computing strategy to approach,” IEEE Netw., vol. 32, no. 6, pp. 42–49, Nov./Dec. 2018.
[8] V. S. Shah, “Multi-agent cognitive architecture-enabled IoT applica-
improve network performance. tions of mobile edge computing,” Ann. Telecommun., vol. 73, nos. 7–8,
pp. 487–497, 2018.
[9] P. K. Sharma, S. Rathore, Y.-S. Jeong, and J. H. Park, “Softedgenet:
IV. C ONCLUSION SDN based energy-efficient distributed network architecture for edge
computing,” IEEE Commun. Mag., vol. 56, no. 12, pp. 104–111,
This article studies the interaction between the edge com- Dec. 2018.
[10] K. Kaur, S. Garg, G. S. Aujla, N. Kumar, and J. J. P. C. Rodrigues, “Edge
puting based on SDN and NFV technology and the cloud computing in the industrial Internet of Things environment: Software-
computing in the next generation IoT. This article first intro- defined-networks-based edge-cloud interplay,” IEEE Commun. Mag.,
duces the concept and implication of MEC based on SDN and vol. 56, no. 2, pp. 44–51, Feb. 2018.
[11] H.-C. Hsieh, J.-L. Chen, and A. Benslimane, “5G virtualized multi-
NFV, then illuminates the multiattribute decision making based access edge computing platform for IoT applications,” J. Netw. Comput.
on SDN and NFV, and analyzes the solving process of MEC Appl., vol. 115, pp. 94–112, Aug. 2018.
decision model based on SDN and NFV technology. Finally, [12] J. Ordonez-Lucena, P. Ameigeiras, D. Lopez, J. J. Ramos-Munoz,
J. Lorca, and J. Folgueira, “Network slicing for 5G with SDN/NFV:
three sets of simulation experiments based on MATLAB were Concepts, architectures, and challenges,” IEEE Commun. Mag., vol. 55,
designed to validate the multiattribute decision of MEC migra- no. 5, pp. 80–87, May 2017.
tion strategy based on SDN and NFV. In this article, compares [13] C. Mouradian, N. T. Jahromi, and R. H. Glitho, “NFV and SDN-based
distributed IoT gateway for large-scale disaster management,” IEEE
the performance results of the three simulation environments, Internet Things J., vol. 5, no. 5, pp. 4119–4131, Oct. 2018.
and the results show that considering multiple attributes serves [14] Q. Wei and H. Zhang, “Future Internet architecture: Research status,
to perform better in most tasks and load status. In addition, hot topics, and development practice,” Scientia Sinica, vol. 67, no. 2,
pp. 56–58, 2017.
two groups of experiments were used in the simulation exper- [15] A. M. Zarca et al., “Security management architecture for NFV/SDN-
iment, which proves that the design of multiattribute decision aware IoT systems,” IEEE Internet Things J., to be published.
computing strategy based on SDN and NFV is more reason- [16] J. Pan and J. Mcelhannon, “Future edge cloud and edge computing for
Internet of Things applications,” IEEE Internet Things J., vol. 5, no. 1,
able, and indirectly proves that cloud computing can guide pp. 439–449, Feb. 2018.
edge computing to serve the network. [17] A. Gharaibeh et al., “Smart cities: A survey on data management, secu-
This article not only has important research significance for rity, and enabling technologies,” IEEE Commun. Surveys Tuts., vol. 19,
no. 4, pp. 2456–2501, 4th Quart., 2017.
the improvement of network performance but also promotes [18] S. Zhang, L. T. Yang, L. Kuang, J. Feng, J. Chen, and V. Piuri, “A
the application of IoT terminal in the next generation network tensor-based forensics framework for virtualized network functions in
environment. In future, we will improve our research by new the Internet of Things: Utilizing tensor algebra in facilitating more effi-
cient network forensic investigations,” IEEE Consum. Electron. Mag.,
technology [20], [21]. vol. 8, no. 3, pp. 23–27, May 2019.
[19] B. R. Al-Kaseem, Y. Al-Dunainawi, and H. S. Al-Raweshidy,
“End-to-end delay enhancement in 6LoWPAN testbed using pro-
R EFERENCES grammable network concepts,” IEEE Internet Things J., vol. 6, no. 2,
pp. 3070–3086, Apr. 2019.
[1] R. Muñoz et al., “Integration of IoT, transport SDN, and edge/cloud [20] R. Shi, Y. Gan, and Y. Wang, “Evaluating scalability bottlenecks by
computing for dynamic distribution of IoT analytics and efficient use of workload extrapolation,” in Proc. IEEE 26th Int. Symp. Model. Anal.
network resources,” J. Lightw. Technol., vol. 36, no. 7, pp. 1420–1428, Simulat. Comput. Telecommun. Syst. (MASCOTS), Milwaukee, WI,
Apr. 1, 2018. USA, Sep. 2018, pp. 333–347.
[2] H.-C. Hsieh, C.-S. Lee, and J.-L. Chen, “Mobile edge computing [21] P. Jin et al., “PostMan: Rapidly mitigating bursty traffic by offloading
platform with container-based virtualization technology for IoT applica- packet processing,” in Proc. USENIX Annu. Tech. Conf. (USENIX ATC),
tions,” Wireless Pers. Commun., vol. 102, no. 1, pp. 527–542, 2018. Renton, WA, USA, 2019, pp. 849–862.
Authorized licensed use limited to: Kyunghee Univ. Downloaded on November 15,2020 at 04:17:20 UTC from IEEE Xplore. Restrictions apply.