Mobile edge computing network user access control method oriented to heterogeneous service requirements

A technology for edge computing and business requirements, applied in access restrictions, network traffic/resource management, electrical components, etc.

Active Publication Date: 2021-05-14
NANJING UNIV OF POSTS & TELECOMM
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Since the current user terminals not only have call communication requests, but also task offloading of large applications and cache downloading of high-quality videos happen all the time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile edge computing network user access control method oriented to heterogeneous service requirements
  • Mobile edge computing network user access control method oriented to heterogeneous service requirements
  • Mobile edge computing network user access control method oriented to heterogeneous service requirements

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0076] The present invention discloses a mobile edge computing network user access control strategy oriented to heterogeneous service requirements, specifically as follows.

[0077] A mobile edge computing network user access control method for heterogeneous business requirements.

[0078] The mobile edge computing network includes n users, m base stations, and m corresponding MEC servers, where n 1 users have computing task offloading requests, n 2 users have file download cache requests, n=n 1 +n 2 , each user who needs to offload computing has only one computing task, and the computing task is represented by a quaternion, in is the input data size of the task, is the output data of the task, that is, the size of the task calculation result, τ j is the task completion time limit, β j Indicates the amount of calculation required by the task, expressed in CPU cycles, and the Zipf parameter for each user who needs to download files is μ j , the longest acceptable wai...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of mobile edge computing, in particular to a mobile edge computing network user access control method oriented to heterogeneous service requirements. The method comprises the steps: S1, carrying out association access on all users according to a maximum downlink signal-to-noise ratio strategy, meanwhile, judging the sizes of residual resources of each base station and the MEC server, and throwing out users incapable of obtaining associated base stations; S2, deleting residual resources of all the base stations and the corresponding MEC servers according to the existing associated users of each base station; and S3, carrying out association access on all thrown users which do not obtain association again, and adding corresponding resources to each base station and the corresponding MEC server. According to the user access control method provided by the invention, on the basis of a traditional maximum downlink signal-to-noise ratio access method, the number of subcarriers of the base station and the limitation of computing resources and cache resources of the MEC server are comprehensively considered, and effective access to users with different demand types is realized.

Description

technical field [0001] The invention relates to the technical field of mobile edge computing, in particular to a mobile edge computing network user access control method oriented to heterogeneous service requirements. Background technique [0002] With the rapid development of the mobile Internet and the Internet of Things in recent years, the capabilities of smartphones have become increasingly rich, gradually developing from a simple communication tool to a powerful terminal integrating communication, computing, entertainment, and office work. Various technologies such as augmented reality and virtual reality Applications such as games, LSB (Location Based Service) marketing, and assisted driving systems based on the Internet of Vehicles emerged as the times require, which comprehensively enriched the functions of smartphones. However, such typical applications with high computational complexity, high energy consumption, and minimal latency requirements not only increase t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W28/14H04W28/16H04W48/02H04L29/08
CPCH04W28/14H04W28/16H04W48/02H04L67/10H04L67/568
Inventor 徐鼎张海华
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products