Calculation migration method considering privacy protection in wireless metropolitan area network environment

A wireless metropolitan area network and privacy protection technology, applied in the fields of privacy protection and mobile network edge computing task planning, can solve problems such as cloud load balancing that have not yet taken into account user privacy protection

Active Publication Date: 2020-02-04
NANJING SHENYE INTELLIGENT SYST ENG
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, as far as research on the application of Duoyun in wireless metropolitan area network...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Calculation migration method considering privacy protection in wireless metropolitan area network environment
  • Calculation migration method considering privacy protection in wireless metropolitan area network environment
  • Calculation migration method considering privacy protection in wireless metropolitan area network environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0112] This embodiment simulates the dynamic scheduling of computing tasks in a wireless metropolitan area network.

[0113] like figure 2 As shown, in the experiment, we consider the situation of 6 computing tasks, 3 clouds, and 9 access points, that is, CL={cl 1 ,cl 2 ,cl 3}, AP={ap 1 ,ap 2 ,...,ap 9},T={t 1 ,t 2 ,...,t 6}. Among them, the number of virtual machines in each cloud is 10. The information of each computing task is shown in Table 1.

[0114] Table 1 Computing task information

[0115]

[0116] It can be seen from Table 1 that t 1 and t 2 There is a data conflict between t 3 and t 5 There is a data conflict between t 4 and t 5 Execution required more resources than cl 2 Therefore, in order to ensure the smooth execution of tasks and protect the privacy of users, the initial task scheduling strategy needs to be modified.

[0117] if t 2 still in cl 1 on the implementation, then t 1 Needs to be rescheduled, can migrate to cl 2 or cl 3 im...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a calculation migration method considering privacy protection in a wireless metropolitan area network environment. The method comprises the following steps: 1, obtaining cloudlet resource requirements, supply conditions and equipment deployment information in a wireless metropolitan area network; 2, obtaining a conflict state and a privacy leakage state of a calculation task; 3, formulating a calculation task dynamic scheduling method according to the characteristics of the calculation task; 4, according to a scheduling strategy, calculating an average resource utilization rate deviation of the clouds, and calculating a transmission delay of a task; and 5, evaluating the target function values under various scheduling strategies, and selecting an optimal strategy for managing the cloudlet calculation task of the enhanced service function of the wireless metropolitan area network. According to the method, a scheduling strategy is given in real time according to the resource information, so that the user privacy is protected, the cloudlet load balance is optimized, the calculation migration time can be shortened, and the service performance is improved.

Description

technical field [0001] The invention relates to the fields of privacy protection and mobile network edge computing task planning, in particular to a computing migration method that takes into account privacy protection in a wireless metropolitan area network environment. Background technique [0002] In recent years, with the development of mobile technology and the popularization of wireless networks, mobile applications have developed rapidly. In mobile applications, especially in an IoT (Internet of Things, Internet of Things) environment, mobile terminals need to perform a large number of data calculations to meet users' requirements for service quality. However, mobile terminals have problems such as insufficient storage space, limited computing resources, poor computing power, sensitive delay or large data calculation volume, etc., and it is difficult to achieve the desired effect of users, thereby reducing the service performance of mobile computing (Mobile Computing)...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08H04L29/06H04W28/08
CPCH04L63/0407H04W28/08H04L67/1001
Inventor 刘庆祥许小龙崔萌萌顾仁昊
Owner NANJING SHENYE INTELLIGENT SYST ENG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products