Mobile edge computing network user access control method for heterogeneous service requirements

A technology for edge computing and business requirements, applied in access restrictions, network traffic/resource management, electrical components, etc., to achieve the effect of improving service efficiency and broad application prospects

Active Publication Date: 2022-08-02
NANJING UNIV OF POSTS & TELECOMM
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Since the current user terminals not only have call communication requests, but also task offloading of large applications and cache downloading of high-quality videos happen all the time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile edge computing network user access control method for heterogeneous service requirements
  • Mobile edge computing network user access control method for heterogeneous service requirements
  • Mobile edge computing network user access control method for heterogeneous service requirements

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0076] The invention discloses a mobile edge computing network user access control strategy oriented to heterogeneous service requirements, and the details are as follows.

[0077] A mobile edge computing network user access control method for heterogeneous service requirements.

[0078] The mobile edge computing network includes n users, m base stations, and m corresponding MEC servers, where n 1 users have computing task offload requests, n 2 users have file download cache requests, n=n 1 +n 2 , each user who needs computing offload has only one computing task, and its computing task is represented by a quadruple, in is the input data size of the task, is the output data of the task, that is, the size of the task calculation result, τ j is the task completion time limit, β j Indicates the amount of computation required by the task, expressed in the number of CPU cycles, and the Zipf parameter of each user who needs to download a file is μ j , the maximum acceptabl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of mobile edge computing, in particular to a mobile edge computing network user access control method oriented to heterogeneous service requirements. The method includes the following steps: S1. Perform associated access to all users according to the maximum downlink signal-to-noise ratio strategy, and simultaneously Determine the size of the remaining resources of each base station and MEC server and throw out users who cannot obtain the associated base station; S2. Delete remaining resources for all base stations and corresponding MEC servers according to the existing associated users of each base station; S3. The thrown users who have not obtained the association re-associate access and add corresponding resources to each base station and the corresponding MEC server. The user access control method proposed by the present invention, on the basis of the traditional maximum downlink signal-to-noise ratio access method, comprehensively considers the limitations of the number of sub-carriers of the base station, the computing resources of the MEC server and the buffer resources, and realizes the requirements for different demand types. Effective access for users.

Description

technical field [0001] The invention relates to the technical field of mobile edge computing, in particular to a mobile edge computing network user access control method oriented to heterogeneous service requirements. Background technique [0002] With the rapid development of the mobile Internet and the Internet of Things in recent years, the capabilities of smart phones have become increasingly rich, and they have gradually developed from a simple communication tool to a powerful terminal integrating communication, computing, entertainment, and office. Applications such as games, LSB (Location Based Service) marketing, and assisted driving systems based on the Internet of Vehicles have emerged, comprehensively enriching the functions of smartphones. However, such typical applications with high computational complexity, high energy consumption, and extremely small delay not only increase the pressure on the network load, but also lead to the congestion of the core network, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W28/14H04W28/16H04W48/02H04L67/10H04L67/568
CPCH04W28/14H04W28/16H04W48/02H04L67/10H04L67/568
Inventor 徐鼎张海华
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products