
Citation: | ZHOU Chengcheng, ZHANG Lukai, ZENG Guangping, LIN Fuhong. Dispersed Computing Resource Discovery Model and Algorithm for Polymorphic Migration Network Architecture[J]. Chinese Journal of Electronics, 2023, 32(4): 821-839. DOI: 10.23919/cje.2022.00.305 |
Edge computing can effectively reduce the burden on the core network and enable real-time responsiveness. However, edge servers are unable to handle large volumes of sudden and urgent requests due to limitations in computing power, scalability and operating costs. Dispersed computing is more capable of handling such tasks. The dispersed computing architecture is fully decentralized and efficiently mobile, which leverages geographically distributed hardware to provide diverse and flexible idle resources in a collaborative and shared manner [1]. It can expand the associated wireless network devices (e.g., servers, vehicles, UAVs, portable devices, smart equipments, etc.) from basic transmission nodes to networked computing points (NCPs) available for real-time connectivity [2]. These NCPs have equal functional status and high connectivity degree of freedom, which can quickly and automatically form independent resource networks to perform computing tasks spontaneously and collaboratively. An important prerequisite for dispersed computing applications to be implemented is that the various resources in the current dispersed computing resource network can be dynamically sensed and discovered [3]. This study focuses on the optimization mechanism of distributed computing resource discovery. The main motivations include i) using the basic theory of complex networks to solve the problem of structural analysis of uncertain decentralized computing networks; ii) using an optimal decision-making model to solve the mode selection problem of dispersed computing discovery under complex spatio-temporal conditions; and iii) using a reasonable heuristic algorithm to solve the efficiency problem of schemes for dispersed computing resource discovery.
The resource discovery needs to adapt to the real-time access of available resources, that is, the resource information of each node can be grasped by others in the network through the resource information list. It can be seen that resource pool information is the key to visualizing the supply relationship between network resources, computing nodes, and potential task demands. The data exchange protocol for dispersed computing resource discovery is different from the traditional service discovery protocol (SDP). The resource information in the latter includes resource categories and addresses of the resource providers. The resource information in the former includes supported task types, resource categories, node identifiers, mode and state parameters of the network (i.e., the number of network migration cycles, the number of nodes, transmission distance between nodes, discovery mode of nodes) [3]. The key to resource discovery for dispersed computing is the construction and maintenance of the resource pool information list.
The networks of dispersed computing resources are dynamic and complex. There are many variations and the composition of the nodes is random. The establishment and maintenance of the resource pool information list will be affected by the change of the network topology. In view of these features, the studied network has properties similar to small-world networks and scale-free networks [4]. Therefore, we need to use complex network topology features to analyze the polymorphic migration properties of the resource discovery network. Additionally, the operation of the discovery mode for computing devices under time-varying conditions is strongly associated with the energy consumption of the system [5]. In other words, the establishment and maintenance of resource pool information lists also involve considerable energy costs due to frequent updates of resource information state (RIS) and massive packet delivery, which need to be continuously optimized in the operation of the dispersed computing discovery system. Since the energy consumption of resource discovery and the accuracy of RIS are opposed to each other [6], the study needs to analyze and dynamically select the resource discovery mode with the goal of total energy consumption of resource discovery under the condition of RIS accuracy. Existing studies have focused on discovery strategies for multi-mode selection to synthesize the advantages of different discovery modes [7]–[11]. However, these studies do not model and solve problems from the perspective of strategy optimization, which results in that these problems cannot be intuitively quantified and analyzed.
Based on these considerations, our challenges are to i) analytically construct complex and dynamic networks for dispersed computing resources; ii) explore the operating process and quantitative indicators of different resource discovery modes; iii) build an optimization model with accurate decision variables, objective functions, and constraints for dispersed computing resource discovery; and iv) design an algorithm and a complete system simulation process for dispersed computing resource discovery.
To address these challenges, we consider the resource discovery problem with complex patterns and state changes as a multi-level decision problem. A bi-level programming approach is employed to optimally model the resource discovery problem for dispersed computing, where time cost, energy consumption, and accuracy of information acquisition are the driving factors of the model. The upper-level programming model aims at designing a reasonable network structure for dispersed computing resource discovery, while the lower-level programming model explores the efficient resource discovery modes. The upper level intervenes in the lower level through decision making, while the lower level obtains its own decision solution and feeds back to the upper level, both of which form a closed-loop and unified overall optimization process. In detail, the main contributions of this paper are as follows.
• This paper firstly develops a bi-level programming model for describing the optimization of dispersed computing resource discovery.
• This is the first time to apply complex network topology features to the analysis of polymorphic migration of networks with dispersed computing resources.
• This research integrally proposes a method for calculating energy consumption in agent mode and self-directed mode in dispersed computing resource discovery.
• This work innovatively designs a heuristic algorithm based on the symmetric trust region (STRA) for solving the dispersed computing discovery model.
• This paper completely implements the numerical simulation of dispersed computing resource networks in multiple modes and topological states.
The remainder of the paper is structured as follows. Section II goes over related work and achievements in resource discovery. Section III models and describes the dispersed computing resource discovery based on a polymorphic migration network. Section IV provides an optimization solution for the proposed dispersed computing resource discovery problem. Numerical simulations corresponding to our model and algorithm are revealed in Section V. Finally, we conclude the work in Section VI.
Many achievements have been made about computing resource discovery in various fields such as grid computing, edge computing, fog computing, inter-cloud environment, mobile ad hoc networks, and wireless sensor networks. The research on discovery strategies is mainly divided into two categories, that is, resource discovery strategies based on single mode (e.g., active mode or passive mode) and resource discovery strategies based on multi-mode (e.g., active-passive hybrid mode) selection.
Wolfson et al. [12] proposed a resource discovery method based on active mode for mobile ad hoc networks, which avoids the inefficiency caused by frequent network disconnection by proactively pushing information. Chung et al. [13] proposed a protocol for grid resource discovery and information monitoring based on an active mode with offset-sensitive, time-sensitive, and hybrid mechanisms to support changing resource states. Murturi et al. [14] proposed a discovery strategy based on locally browsed resources in edge computing environments. This strategy exchanges metadata of available resources within a certain range between edge nodes in a peer-to-peer manner, allowing users to perform various complex queries locally. Battula et al. [15] proposed an efficient resource discovery strategy based on support and confidence for fog environments. The approach enables efficient resource discovery and monitoring services with minimal resource consumption. The above research results show that each of these single strategies has advantages and disadvantages in different scenarios, for example, resource discovery based on active mode is more efficient in resource search but can lead to non-essential costs due to frequent release of information, while resource discovery based on passive mode is unfavorable in the time spent on request search.
In recent years, more research has focused on multi-mode discovery strategies to combine the advantages of different strategies. Xiao et al. [7], [8] emphasized the importance of resource discovery for future space/air/ground networks and reviewed resource discovery strategies in UAV-based wireless ad hoc networks in detail. The research results show that multi-mode discovery strategies are more desirable than single-mode discovery strategies. Filali et al. [9] proposed a peer-to-peer resource discovery mechanism in a grid environment based on multi-mode selection. Each peer in this mechanism can request resources or publish resources and maintain a local message cache. Huang et al. [10] proposed a resource discovery strategy for the cloud computing environment, which can intelligently switch between two modes based on user requirements and the state of the monitored resources. Liu et al. [6] proposed an adaptive selection method for resource discovery, which automatically switches between centralized and flooding policies depending on different network environments. Zhou et al. [11] proposed a resource discovery method that combines active and passive modes. This method solves the mobility problem in the peer-to-peer ad hoc network by repetition. The results show that resource discovery based on combined patterns can not only improve the success rate of search, but also reduce the network consumption caused by information transmission.
Since dispersed computing is an emerging computing paradigm, there is a lack of research on its resource discovery. Yang et al. [3] proposed an operational flow and important components for resource discovery in dispersed computing. Compared with edge computing, fog computing, inter-cloud environments and mobile ad hoc networks, the dispersed computing network is more prominent for the free mobility of nodes, heterogeneity of available resources, variable resource availability, complexity of task requirements, and dynamic uncertainty of network states and topologies. All these bring analytical difficulties to the resource discovery research of dispersed computing. In addition, existing research on resource discovery pays less attention to optimization modeling and solving, especially to specific factors such as the optimization objective, controllable variables, and operating mode of the problem. Compared to existing works, the solution of this study has several contributions. These changes compensate for the shortcomings of the existing works. In summary, the resource discovery research of dispersed computing should apply reasonable modeling tools to determine the network topology and resource discovery modes based on the network structure and resources.
In this section, the resource discovery process for dispersed computing is first described. In addition, two resource discovery modes are elaborated. Finally, considering the dynamic multi-level decision problem, a system model for dispersed computing resource discovery is developed, which is driven by time cost, energy consumption and accuracy of information retrieval.
As the running time continues, computing devices in the network tend to join, exit, move, and deplete, resulting in changes in the service capacity and operational state of networked computing resources. In this case, a time window can be used to discretely describe and analyze the dynamic process of such variations. Meanwhile, the function of resource discovery in a dispersed computing network is realized by a list of resource pool information spread over the NCPs. Within a single time window, the list of resource pool information is applied to all NCPs, which is continuously updated during the operation of the dispersed computing system. The list contains the types of resources (computing resources, storage, communication resources, etc.), the serial numbers of computing devices corresponding to the resources, and the types of tasks supported by the resources. In addition, the system architecture and procedure of dispersed computing resource discovery are shown in Fig.1 and Fig.2, respectively.
The list of resource pool information plays a key role in dispersed computing resource discovery. Firstly, when a task requests a service, it can send a request message to any NCP and can obtain the resource availability status of the whole network for dispersed computing resources. Additionally, the retrieval form of the unified resource information list ensures the timeliness and accuracy of the state information of the entire network of dispersed computing resources. Furthermore, the list of resource information describes the matching and constraint relationships among resources, nodes and tasks through structured data, which improves the execution efficiency of resource discovery and ensures the reliability of resource information maintenance.
After some NCPs build the resource pool information list, the remaining NCPs will receive the list. Therefore, the core problem of dispersed computing resource discovery is to establish and maintain the resource pool information list through a reasonable optimization process. Under the condition of dynamic changes, the problem of establishing and maintaining the resource pool information list involves both the state migration of the network topology and the time and energy costs caused by the node selection and frequent interactions of information between nodes. In view of this, the cost-driven design of resource networks and resource retrieval processes need to be considered comprehensively in this study. At the same time, the mode of resource discovery needs to be reasonably analyzed and dynamically selected in terms of specific driving factors such as energy consumption and accuracy of information retrieval.
An NCP generally has data exchange protocols such as maintenance of local resource database, resource access module, resource query module and maintenance of global resource database (list of resource pool information in the network). This makes the NCP have the functions of proxy of resource directory, retrieval of resource directory and computing services. The NCP can switch roles freely, which is to act as query agent node (QAN) and/or general computing node (GCN). For the network of dispersed computing resources, we propose two discovery modes, namely, the agent mode and the self-directed mode, which are characterized as follows:
• In the agent mode, a QAN is selected and configured to retrieve proxy resource directories under the condition of a specific number of candidates. To obtain the list of resource pool information, for all task categories, resource retrieval requests are sent to the QAN through some GCNs. After that, the QAN sends the list of resource pool information for all tasks to all GCNs connected to it.
• In the self-directed mode, the QAN does not play its agent role, but performs the same operational process as a GCN. For all task categories, the list of resource pool information is obtained by hop-by-hop transmission and retrieval from individual nodes to the rest of the nodes. After that, the individual nodes transmit information to subsequent nodes again for pushing the list to all nodes.
In response to the design of resource networks and the retrieval of resources in dispersed computing resource discovery, we introduce a bi-level programming approach for optimal modeling. The upper-level programming model lies in determining a reasonable network structure. Its decision objective is to reduce the total time cost of resource discovery agent services for a dispersed computing system. In addition, it makes decisions by selecting and configuring QANs and establishing connections between GCNs and QANs. The lower-level programming model is to investigate the effective resource discovery mode in dispersed computing, where the decision objective is to reduce the total energy consumption of resource discovery and the decision form is to select the resource discovery mode. Section III.2 Resource discovery mode includes a self-directed mode and an agent mode. In this model, the decision variable is in binary form, corresponding to the above two modes respectively. According to the optimization objective and decision form of the model, the characteristics of the bi-level programming decision for dispersed computing resource discovery are shown in Fig.3. To establish the bi-level programming model, the sets, parameters and variables are defined in Table 1.
Parameters | Connotations |
K | The set of time windows indexed by k, that is, k={1,2,…,kmax} (The time window represents the numerical sequence of migration cycles in the problem). |
Num_node(k) | The total number of nodes in the network at the kth time window. |
I | The set of GCNs indexed by i. |
J | The set of QAN candidates indexed by j. |
cselj | The time required to configure the QAN candidate j. |
cconij | The time required to establish a connection between GCN i and QAN j. |
l(k)ij | There may be movement of nodes at different time windows. This parameter indicates the actual communication distance between GCN i and QAN candidate j at the kth time window. |
dc | Communication coverage distance of a single QAN. |
Θ(k)i | The set of all QAN candidates that can cover the GCN i and Θ(k)i={j∣l(k)ij≤dc}. |
X(k)(m)j | Decision variable. 1 indicates that the node candidate j for the mth resource in the kth time window can be used as a QAN in the agent mode and a GCN in the self-directed mode. 0 indicates that it can only be used as a GCN in the self-directed mode. |
W(k)(m)ij | Decision variable. It is 1 to indicate that GCN i establishes a connection with QAN candidate j when searching for the mth resource in the kth time window, otherwise it is 0. |
Y(k)(m)i | Decision variable. It is 1 to indicate that GCN i runs the agent mode during resource discovery for the mth resource requirement in the kth time window, otherwise it is 0 (self-directed mode). |
D(k)(m)i_agent | For the mth resource demand in the kth time window, the energy consumption of GCN i running in agent mode to complete the resource discovery process. |
D(k)(m)i_self | For the mth resource demand in the kth time window, the energy consumption of GCN i running in self-directed mode to complete the resource discovery process. |
Q(k)(m)i_agent | For the mth resource demand in the kth time window, the accuracy sign of the RIS for GCN i to complete resource discovery in agent mode. |
Q(k)(m)i_self | For the mth resource demand in the kth time window, the accuracy sign of the RIS for GCN i to complete resource discovery in self-directed mode. |
Qreq | To ensure the efficiency and accuracy of resource discovery, thresholds for RIS sign are defined. |
1) Upper-level programming model
Based on the analysis of the decision characteristics in Fig.3, a bi-level programming model for dispersed computing resource discovery is established. The upper-level model focuses on the design of the network topology for the state migration problem. It is specified as a polymorphic connection relationship among QANs, candidate QANs and GCNs within a dynamic time window. In practice, firstly, a specific number of nodes are selected as the set of QAN candidates. Then, a single QAN and its actual connections to other nodes are determined through optimization. Meanwhile, opportunistic connections exist between GCNs, as shown in Fig.4.
We attempt to minimize the total time to configure QAN and the total time to establish connections between GCNs and QAN. The upper-level programming model is formulated as follows:
MinZ1=∑j∈J∑k∈K∑m∈Mc(k)_seljX(k)(m)j+∑i∈I∑j∈J∑k∈K∑m∈Mc(k)_conijY(k)(m)is.t.C1:∑j∈{N(k)i∩J}X(k)(m)j=1,∀k∈K,m∈MC2:∑i∈I∑j∈JW(k)(m)ij≥1,∀k∈K,m∈MC3:∑j∈J∑m∈MW(k)(m)ij=1,∀i∈I,k∈KC4:X(k)(m)j≥W(k)(m)ij,∀i∈I,j∈{N(k)i∩J},k∈K,m∈MC5:P[W(k)(m)ij=1]∼η(c(k)_conij),∀i∈I,j∈J,k∈K,m∈MC6:X(k)(m)j∈{0,1},∀i∈I,j∈{N(k)i∩J},k∈K,m∈MC7:W(k)(m)ij∈{0,1},∀i∈I,j∈{N(k)i∩J},k∈K,m∈M | (1) |
where
The analytical features of the model show that the network of dispersed computing resource belongs to the variable-weight unstable network. The core feature of the network is that although the spatial aggregation structure of the nodes changes dynamically, it always maintains the undirected graph connectivity with non-unique matching. In other words, during the migration of a dispersed computing network, there is at least one path of bi-directional connectivity between NCPs. This path refers to both forward and reverse transmission of packets between two NCPs. In addition, the shortest path between two NCPs is unique and computationally available [4]. As shown in Fig.5, when NCPs 1, 2 and 3 are covered by the communication capability, the three NCPs may form a link. When NCP 3 is far away from the other two NCPs, the node may be isolated. Therefore, the above constraint assumptions of the connectivity graph are essential.
In terms of application, such features ensure the feasibility of the dispersed computing network to maintain multi-site data exchange and collaborative retrieval of multiple types of resources under multiple migration cycles, multiple operation modes, and multiple performance states. In terms of mathematical analysis, the corresponding network topology characteristics are demonstrated as follows.
Lemma 1 In two consecutive migration cycles, let
Proof Let
2) Lower-level programming model
The upper-level model intervenes in the lower-level model by determining the network topology of the dispersed computing resources. The lower-level model implements the optimization of mode selection for nodes driven by the total energy consumption and constrained by the RIS sign. At the same time, the decision-making optimization scheme obtained by the lower-level model is counteracted to the upper-level model. The principle of the lower-level model is shown in Fig.6.
Considering to minimize the total energy consumption of the entire resource discovery process, the lower-level programming model is shown below,
MinZ2=∑i∈I∑k∈K∑m∈M[D(k)(m)i−agent⋅Y(k)(m)i]+∑i∈I∑k∈K∑m∈M[D(k)(m)i−self⋅(1−Y(k)(m)i)]s.t.C1:Y(k)(m)i≤W(k)(m)ij,∀i∈I,j∈N(k)i∩J,k∈K,m∈MC2:∑i∈I∑k∈K∑m∈M[E(Q(k)(m)i−agent)⋅Y(k)(m)i]≥∣Q∣req_agentC3:∑i∈I∑k∈K∑m∈M[E(Q(k)(m)i−self)⋅Y(k)(m)i]≥∣Q∣req_selfC4:Y(k)(m)i∈{0,1},∀i∈I,k∈K,m∈M | (2) |
where
3) The calibration of energy consumption and RIS sign
This subsection describes the calibration process of parameters such as energy consumption of resource discovery and RIS sign in the lower-level programming model. The decision variable in the lower-level model is the choice of resource discovery mode (
a) The update state in agent mode
In the agent mode, the directory of resource information is obtained through the QAN selected by the upper-level model. In this paper, we take a certain computing resource
Δt1=ΓmNreso(m) | (3) |
where
The maximum number of tasks that can be completed in a given time interval
¯Ntask=Δt2Δt1 | (4) |
where
The relationship between
Case 1
In a given interval
Nupdate=2¯Ntask⋅(Num_node(k)−1)=2⋅Δt2⋅Nreso(m)Γm⋅(Num_node(k)−1) | (5) |
Case 2
In a given interval
Nupdate=2Ntask(m)⋅(Num_node(k)−1) | (6) |
Furthermore, the total number of updates of all GCNs in the polymorphic migration cycle
Nallupdate=TΔt2∑m∈MNmupdate | (7) |
where
When a GCN’s available resources change, the corresponding changes should be updated in the directory of resource information. At the same time, the status of available resources on GCNs always changes dynamically, so RIS may suffer from accuracy deviation due to delayed updates. In addition, the update of RIS consumes some energy. The more frequent the updates are, the more energy consumption is. In detail, the accuracy of the RIS is related to the time when the RIS is updated and the time when the actual state of the resource changes, as shown in Fig.9.
In resource discovery, it is assumed that the resource requests received by GCNs obey the Poisson distribution [6].
In order to ensure the accuracy of resource state information, the update time
b) The update state in self-directed mode
Within each polymorphic migration cycle
HC∑n=0Pn=1 | (8) |
where
HC should be reasonably set so that the information of resource search can reach all GCNs in the dispersed computing network. If HC is small, it is difficult to achieve node traversal and to ensure the accuracy of RIS at the system level. If the HC is too large, it will lead to more energy consumption to complete the data forwarding and delivery process. Therefore, a reasonable HC needs to be set to reduce energy consumption under the premise of accurate RIS. The expected value of the accuracy sign of the RIS represented by the binary random variable
E(Q)=Q⋅HC∑n=0Pn+(1−Q)⋅HC∑n=0(1−Pn) | (9) |
where
• Energy consumption calculation
Based on the analysis of the operational state of the two resource discovery modes, the corresponding energy consumption metrics are calculated.
If the agent mode is adopted, the energy consumption generated by resource discovery within
Dagent=σall_resc⋅esend+σall_resc⋅eobtain+Nall_accupdate⋅esend | (10) |
where the total energy consumption
If the self-directed mode is adopted, let the number of nodes covered by the wireless transmission range of a single node be
E(Nbrc)=NIall⋅Pn | (11) |
The average HC between the node requesting the resource discovery and the node responding to the resource discovery is calculated as follows:
¯HC=HC∑n=0(Pn⋅n) | (12) |
The energy consumption resulting from a single request for resource discovery within
D′self={NIall⋅esend+∑HC−1n=1(Pn⋅NIall⋅(eobtain+esend))+NIall⋅¯HC⋅(eobtain+esend),HC≥22NIall⋅(esend+eobtain),HC=1 | (13) |
where the total energy consumption
Dself=σall_resc⋅D′self | (14) |
Considering the NP-hard characteristics of the bi-level programming problem [17], the acquisition of the global optimal solution is difficult and has certain limitations if an exact algorithm is applied. In this paper, a heuristic algorithm is employed to solve the system model. The lower-level model implements the energy consumption calculation for resource discovery by identifying the appropriate operation mode based on binary decisions. In this model, the decision variables are all integers; the dimensionality of the solution space is high; there are multiple couplings between multiple variables. Therefore, the heuristic algorithm needs to converge vertically and quickly. This algorithm needs to easily nest the optimization results of the lower-level energy consumption. In this paper, an STRA is proposed for the solution.
A trusted region is a form of efficient solution sets in optimization theory. In other words, this region refers to the range of decision variables that satisfy the constraints of all parties (e.g., multi-objective decision-making, bi-level decision-making) and are trusted by all parties under different interest-driven directions. Further, it essentially refers to the region where the optimal solution can be fully trusted. In this region, it gradually converges to the heuristic optimal solution through iterations [16]. Compared with the traditional “mountain-climbing” search algorithm, this paper aims to achieve the discretized search and approximation of the optimal solution based on the trust region space. At the same time, taking into account the structural characteristics of the bi-level programming model, we propose a trust domain vector method with symmetric constraints and objectives for the upper and lower-level model to efficiently approximate the optimal solution. The computational process we design belongs to a heuristic optimal search technique. It has good generalizability to the model. The key search elements involved in the process include the transformation of the combinatorial problem, the determination of the trust region vector, the correction of the trust domain vector, and the judgment of convergence. The steps of the STRA are specified as follows.
Step 1: Initialization. The original bi-level programming problem
Step 2: The determination of the initial trust region vector. In the original bi-level programming model, the decision variables include three types of 0-1 variables. Let the vector
Step 3: The solution of the combinatorial problem. The trust region vector
Step 4: For
Step 5: Two elements
Step 6: At the
Step 7: If
Step 8: At the
Step 9: If
Step 10: Output the current optimal solutions
For the proposed dispersed computing resource discovery model of polymorphic migration network architecture and its corresponding algorithm, numerical simulations are performed in this section to verify the accuracy of the method and process. In the conditions of numerical simulation, the benchmark parameters are set as shown in Table 2, where the corresponding parameters can be adjusted according to the computational requirements and the sensitivity analysis. In detail,
Parameters | num_node | interval | T/s | Δt2/s | Q(k)(m)i_agent | Q(k)(m)i_self | num_T |
Values | 50 | ±10% | 2 | 0.1 | 0.1 | 0.1 | 100 |
In this simulation, the routing of data between nodes is implemented by the Floyd algorithm. The algorithm is a dynamic programming technical process for the specific path selection between multiple-site sources to ensure orderly and full coverage of nodes. For a network with dispersed computing resources, the Floyd algorithm guarantees arbitrary coverage from the requesting node to the nodes in the entire network. This algorithm can accurately obtain the specific path of the request and response packets. In path search, the edge weight of the network can be positive or negative, which can adapt to the diverse transmission directions of packets. For self-directed mode, broadcast routing traverses the same range of paths as the Floyd algorithm. Broadcast routing and the Floyd algorithm produce the same energy consumption for transmission. For a dispersed computing network with
In the upper-level model, opportunistic connections exist between the GCNs except for the real connections between the QANs and the GCNs. The probability of an opportunistic connection obeys a negative exponential distribution as
The resource discovery modes corresponding to each cycle during the simulation are shown in Fig.13, where 1 indicates the agent mode and 0 indicates the self-directed mode. In addition, as the simulation proceeds, the structure of the dispersed computing network changes, which in turn affects the energy consumption and accuracy of the information state in resource discovery.
Figs.14 and 15 show the total energy consumption and the expected values of RIS for resource discovery, respectively. It can be seen that as the cycle evolves, the corresponding decision-making constraints change significantly. The influence of network migration is further accentuated.
Furthermore, the key metrics of the energy consumption and the expected value of the RIS for resource discovery in the different modes are measured and analyzed, which allows an intuitive comparison of the effectiveness of the two modes applied in resource discovery, as shown in Table 3. In terms of total energy consumption, the agent mode is smaller than the self-directed mode regarding the maximum, minimum and average values. In terms of the expected value of RIS, the corresponding indexes of the agent mode are larger than those of the self-directed mode. It can be inferred that the agent mode is more applicable than the self-directed mode for the resource discovery simulation. The agent mode is more consistent with the resource discovery requirements of dispersed computing with low energy consumption and high accuracy. However, this applicable effect is only related to the optimization process of the lower-level model. Adopting the agent mode alone can be too costly in terms of time, so the two resource discovery modes should be combined when making optimization decisions. The comparison of the two modes reflects the different states of resource discovery. The comparison results show that there is no fixed discovery mode for dynamic and complex networks. Different time windows, different types of resources, and different nodes may affect the mode of resource discovery.
Modes | # migration cycles | Max. TEC3 | Min. TEC | Avg. TEC | Max. RIS EV4 | Min. RIS EV | Avg. RIS EV |
AM1 | 46 | 495.95 | 107.83 | 296.76 | 0.93 | 0.24 | 0.59 |
SM2 | 54 | 497.48 | 117.78 | 305.51 | 0.75 | 0.04 | 0.34 |
Note: 1 AM: Agent mode; 2 SM: Self-directed mode; 3 (T)EC: (Total) energy consumption; 4 EV: Expected value. |
Fig.16 shows the distribution of the number of updates of the nodes (agent mode) and the average HCs (self-directed mode) in a single cycle of network migration in relation to the total energy consumption of the resource discovery and the expected value of the RIS. For the total energy consumption, the distribution trends of the number of updates and the average HCs are significantly different, that is, there are distinct “peaks” and “valleys”. The reason is that the energy consumption is related to the frequency of packet transmission between nodes, whereas a large number of updates and multi-hop broadcasts lead to a high transmission frequency. For the expected information state, the distribution trends of both the number of updates and the average HCs are more regular, that is, there are no significant numerical fluctuations. In the optimization process of the model, the simulation results of the number of updates and the average HCs indicate well-adapted patterns. Rationally, the accuracy of the RIS is not only related to the number of valid packets and the reachable range of the broadcast, but also influenced by the frequency of packet transmission and the number of nodes. The structure of the bi-level programming model and the form of lower-level decision variables indicate that the frequency of packet transmission and the number of nodes play a more prominent role in the optimization process. The synergy of these two variables makes the value of the RIS stable.
Fig.17 shows the game-driven situation of the bi-level objectives in the resource discovery model, where the horizontal axis represents the total energy consumption of resource discovery in a single cycle and the vertical axis represents the total time cost of resource discovery in a single cycle. The distribution of data points shows a negative correlation between total time cost and total energy consumption. The reason for this is that these two optimization objectives are mutually constrained and it is difficult to achieve optimal results by simultaneous optimization. Moreover, Table 4 lists the objective function values of the model driven by different optimization directions. The driven directions include the minimum total energy consumption, the optimal solution obtained from the proposed STRA, the median solution, and the minimum total time cost, where the median solution is the average of the 50th and 51st positions in Fig.17. These schemes help to achieve specific decision objectives for resource discovery, such as time cost only, system energy only, and both time cost and system energy. In the bi-level programming model, the median solution of the upper and lower-level objectives represents the trade-off solution of the two objectives. From a computational perspective, the median solution represents a more desirable optimization. In addition, the optimal solution obtained in this paper based on the STRA is closer to the median solution, which initially verifies the effectiveness and feasibility of the algorithm.
Optimization directions | EC | TC | # nodes | ||||
Total | AM | SM | Total | AM | SM | ||
Min. TEC | 107.83 | 79.04 | 28.79 | 85.25 | 32.91 | 52.34 | 51 |
Optimal solution | 298.07 | 208.49 | 89.58 | 53.68 | 27.24 | 26.44 | 54 |
Median solution | 305.77 | 234.13 | 71.64 | 53.63 | 21.22 | 32.41 | 49 |
Min. TTC1 | 497.48 | 344.65 | 152.83 | 14.41 | 8.24 | 6.17 | 53 |
Note: 1 TTC: (Total) time cost. |
To further verify the accuracy and computational efficiency of STRA, we introduce the tabu search algorithm (TSA) [19], which is similar to the trust region algorithm, to perform the computation under the same conditions and compare the results, as shown in Table 5. Considering the objective function, STRA outperforms TSA in terms of total energy consumption and total time cost. STRA achieves higher computational accuracy. In terms of efficiency, the number of convergence iterations and computing time of STRA are significantly lower than those of TSA, that is, STRA is more efficient for solving network optimization problems under polymorphic migration. In addition, compared with TSA, STRA has a smaller gap in the difficulty of obtaining the initial solution. The reason is that i) the system model is a bi-level programming model; ii) the coupling effect between decision variables is obvious; and iii) the construction of the symmetric trust domain in the initial stage is relatively complicated, which leads to a stochastic limitation of the initial solution in the iteration.
Algorithms | TEC | TCC | Convergence iterations | Computing time (s) | Time for initial solution (s) |
STRA | 298.07 | 53.68 | 424 | 3955 | 408.55 |
TSA | 314.82 | 61.44 | 562 | 5049 | 396.85 |
GA1 | 327.45 | 70.29 | 403 | 3764 | 412.37 |
SAA2 | 341.26 | 73.02 | 411 | 3850 | 427.19 |
PSO3 | 329.93 | 76.63 | 428 | 4014 | 422.52 |
ACO4 | 345.78 | 80.39 | 433 | 4195 | 410.20 |
Note: 1 GA: genetic algorithm; 2 SAA: simulated annealing algorithm; 3 PSO: particle swarm optimization; 4 ACO: ant colony optimization. |
In addition, compared with meta-heuristic algorithms (GA, SAA, PSO, ACO), STRA has significant advantages regarding the objective function (i.e., higher computational accuracy). But STRA does not perform better in terms of convergence iterations and computing time. This is related to the convergence rules of the algorithm. In terms of the computing time for initial solution, STRA outperforms meta-heuristic algorithms. This is because the complex encoding rules of the meta-heuristic algorithm in this model lead to difficulties in obtaining the initial solution.
In order to analyze the adaptability of the resource discovery model for network polymorphic migration, we adjust the range of increase and decrease of the total number of nodes in the network. The simulation of the whole process is implemented for the networks containing different numbers of nodes. The corresponding results are shown in Table 6. It can be seen that the energy and time costs for different resource discovery modes are less affected by the increase or decrease of the limitation of the number of nodes in the network. The total number of nodes in the network does not show a significant correlation with the magnitude of the limitation. The reason for this is that the dispersed computing network has a strong ad hoc characteristic in the resource discovery process, that is, the QAN and GCNs can interchange roles freely and the physical connection between nodes is characterized by a high degree of freedom in terms of probability.
Range | EC | TC | # nodes | ||||
Total | AM | SM | Total | AM | SM | ||
50±10% | 298.07 | 208.49 | 89.58 | 53.68 | 27.24 | 26.44 | 54 |
50±20% | 335.09 | 234.38 | 100.71 | 60.35 | 30.63 | 29.72 | 58 |
50±30% | 250.22 | 175.01 | 75.20 | 45.06 | 22.89 | 22.19 | 40 |
50±40% | 368.63 | 257.84 | 110.79 | 66.39 | 33.69 | 32.70 | 66 |
50±50% | 267.98 | 187.44 | 80.54 | 48.26 | 24.49 | 23.77 | 45 |
50±60% | 236.98 | 165.76 | 71.22 | 42.68 | 21.66 | 21.02 | 37 |
50±70% | 354.56 | 247.99 | 106.57 | 63.85 | 32.41 | 31.45 | 63 |
50±80% | 313.96 | 219.60 | 94.36 | 56.54 | 28.70 | 27.85 | 56 |
50±90% | 404.72 | 283.08 | 121.64 | 72.89 | 36.99 | 35.90 | 78 |
To verify the reasonability and practicability of the model and parameters, a sensitivity analysis of the lower bound constraints
In the process of resource discovery,
In this paper, we propose a dispersed computing resource discovery model based on polymorphic migration networks. The model explores reasonable network structures for resource discovery and dynamically selects resource discovery modes driven by the time cost, energy consumption, and the accuracy of information acquisition. The feasibility of the dispersed computing network to maintain multi-site data transfer and collaborative retrieval of multiple types of resources under polymorphic migration is demonstrated through the features of complex network topology. Through an integrative approach, the calibration of energy consumption in both discovery modes is achieved. In addition, we propose a heuristic algorithm based on the symmetric trust region, which is capable of fast convergence vertically and easy to nest the results of energy consumption optimization in the lower-level model. Finally, numerical simulation results show the feasibility of the model and the effectiveness of the algorithm.
[1] |
M. R. Schurgot, M. Wang, A. E. Conway, et al., “A dispersed computing architecture for resource-centric computation and communication,” IEEE Communications Magazine, vol.57, no.7, pp.13–19, 2019. DOI: 10.1109/MCOM.2019.1800776
|
[2] |
C. C. Zhou, C. Gong, H. W. Hui, et al., “A task-resource joint management model with intelligent control for mission-aware dispersed computing,” China Communications, vol.18, no.10, pp.214–232, 2021. DOI: 10.23919/JCC.2021.10.016
|
[3] |
H. G. Yang, G. Li, G. Y. Sun, et al., “Dispersed computing for tactical edge in future wars: Vision, architecture, and challenges,” Wireless Communications and Mobile Computing, vol.2021, article no.8899186, 2021. DOI: 10.1155/2021/8899186
|
[4] |
J. J. Wu, C. K. Tse, F. C. M. Lau, et al., “Analysis of communication network performance from a complex network perspective,” IEEE Transactions on Circuits and Systems I:Regular Papers, vol.60, no.12, pp.3303–3316, 2013. DOI: 10.1109/TCSI.2013.2264697
|
[5] |
P. Loreti and L. Bracciale, “Optimized neighbor discovery for opportunistic networks of energy constrained IoT devices,” IEEE Transactions on Mobile Computing, vol.19, no.6, pp.1387–1400, 2020. DOI: 10.1109/tmc.2019.2908402
|
[6] |
W. Liu, T. Nishio, R. Shinkuma, et al., “Adaptive resource discovery in mobile cloud computing,” Computer Communications, vol.50, pp.119–129, 2014. DOI: 10.1016/j.comcom.2014.02.006
|
[7] |
Z. Y. Xiao, Z. Han, A. Nallanathan, et al., “Antenna array enabled space/air/ground communications and networking for 6G,” IEEE Journal on Selected Areas in Communications, vol.40, no.10, pp.2773–2804, 2022. DOI: 10.1109/JSAC.2022.3196320
|
[8] |
Z. Y. Xiao, L. P. Zhu, Y. M. Liu, et al., “A survey on millimeter-wave beamforming enabled UAV communications and networking,” IEEE Communications Surveys & Tutorials, vol.24, no.1, pp.557–610, 2022. DOI: 10.1109/COMST.2021.3124512
|
[9] |
I. Filali, F. Huet, and C. Vergoni, “A simple cache based mechanism for peer to peer resource discovery in grid environments,” in Proceedings of the 8th IEEE International Symposium on Cluster Computing and the Grid, Lyon, France, pp.602–608, 2008.
|
[10] |
H. Huang and L. Q. Wang, “P&P: a combined push-pull model for resource monitoring in cloud computing environment,” in Proceedings of the IEEE 3rd International Conference on Cloud Computing, Miami, FL, USA, pp.260–267, 2010.
|
[11] |
S. Zhou and X. F. Meng, “A location and time-aware resource searching scheme in mobile P2P ad hoc networks,” The Journal of Supercomputing, vol.76, no.9, pp.6809–6833, 2020. DOI: 10.1007/s11227-019-03139-3
|
[12] |
O. Wolfson, B. Xu, H. B. Yin, et al., “Resource discovery using spatio-temporal information in mobile ad-hoc networks,” in Proceedings of the 5th International Workshop on Web and Wireless Geographical Information Systems, Lausanne, Switzerland, pp.129–142, 2005.
|
[13] |
W. C. Chung and R. S. Chang, “A new mechanism for resource monitoring in grid computing,” Future Generation Computer Systems, vol.25, no.1, pp.1–7, 2009. DOI: 10.1016/j.future.2008.04.008
|
[14] |
I. Murturi, C. Avasalcai, C. Tsigkanos, et al., “Edge-to-edge resource discovery using metadata replication,” in Proceedings of IEEE 3rd International Conference on Fog and Edge Computing, Larnaca, Cyprus, pp.1–6, 2019.
|
[15] |
S. K. Battula, S. Garg, J. Montgomery, et al., “An efficient resource monitoring service for fog computing environments,” IEEE Transactions on Services Computing, vol.13, no.4, pp.709–722, 2020. DOI: 10.1109/TSC.2019.2962682
|
[16] |
W. Sun and Y. X. Yuan, “Optimization theory and methods: nonlinear programming,” Springer Science & Business Media, New York, USA, 2006.
|
[17] |
R. Lotfi, N. Mardani, and G. W. Weber, “Robust bi-level programming for renewable energy location,” International Journal of Energy Research, vol.45, no.5, pp.7521–7534, 2021. DOI: 10.1002/er.6332
|
[18] |
L. Sahoo, S. Sen, K. Tiwary, et al., “Modified floyd-warshall’s algorithm for maximum connectivity in wireless sensor networks under uncertainty,” Discrete Dynamics in Nature and Society, vol.2022, article no.5973433, 2022. DOI: 10.1155/2022/5973433
|
[19] |
N. Hou, F. Z. He, Y. Zhou, et al., “An efficient GPU-based parallel tabu search algorithm for hardware/software co-design,” Frontiers of Computer Science, vol.14, no.5, article no.145316, 2020. DOI: 10.1007/s11704-019-8184-3
|
[1] | WANG Danyang, SHAO Fangming. Research of Neural Network Structural Optimization Based on Information Entropy[J]. Chinese Journal of Electronics, 2020, 29(4): 632-638. DOI: 10.1049/cje.2020.05.006 |
[2] | XIAO Shuo, LI Tianxu, TANG Chaogang, CAO Yuan. Coverage Adaptive Optimization Algorithm of Static-Sensor Networks for Target Discovery[J]. Chinese Journal of Electronics, 2019, 28(2): 398-403. DOI: 10.1049/cje.2018.02.009 |
[3] | XUAN Hengnong, ZHANG Runchi, SHI Shengsheng. An Efficient Cuckoo Search Algorithm for System-Level Fault Diagnosis[J]. Chinese Journal of Electronics, 2016, 25(6): 999-1004. DOI: 10.1049/cje.2016.06.035 |
[4] | GENG Kui, LI Fenghua, CAO Jin, LI Hui, CHEN Chen, ZHANG Cui. A Trustworthy Path Discovery Mechanism in Ubiquitous Networks[J]. Chinese Journal of Electronics, 2016, 25(2): 312-319. DOI: 10.1049/cje.2016.03.018 |
[5] | XU Jiuyun, Stephan Reiff-Marganiec. HIAWSC: An Immune Algorithm Based Heuristic Web Service Composition Framework[J]. Chinese Journal of Electronics, 2014, 23(3): 579-585. |
[6] | WANG Li, QU Hua, ZHAO Jihong. Virtual Network Embedding Algorithm for Load Balance with Various Requests[J]. Chinese Journal of Electronics, 2014, 23(2): 382-387. |
[7] | ZHANG Xiaodong, CUI Xiaoyan, ZHENG Shizhuo. Heuristic Task Scheduling Algorithm Based on Rational Ant Colony Optimization[J]. Chinese Journal of Electronics, 2014, 23(2): 311-314. |
[8] | LIAO Shengquan, WU Chunming, YANG Qiang, WANG Baojin, JIANG Ming. A Resource-efficient Load Balancing Algorithm for Network Virtualization[J]. Chinese Journal of Electronics, 2011, 20(4): 667-670. |
[9] | HAN Laiquan, WANG Jinkuan, WANG Xingwei. A Function Migration Algorithm Based on Programmable Router of Multipath Networks[J]. Chinese Journal of Electronics, 2011, 20(1): 170-174. |
[10] | YANG Yuan, ZHANG Hailin. Robust Bit-Level M-Algorithm for MIMO Detection[J]. Chinese Journal of Electronics, 2009, 18(4): 719-723. |
Parameters | Connotations |
K | The set of time windows indexed by k, that is, k={1,2,…,kmax} (The time window represents the numerical sequence of migration cycles in the problem). |
Num_node(k) | The total number of nodes in the network at the kth time window. |
I | The set of GCNs indexed by i. |
J | The set of QAN candidates indexed by j. |
cselj | The time required to configure the QAN candidate j. |
cconij | The time required to establish a connection between GCN i and QAN j. |
l(k)ij | There may be movement of nodes at different time windows. This parameter indicates the actual communication distance between GCN i and QAN candidate j at the kth time window. |
dc | Communication coverage distance of a single QAN. |
Θ(k)i | The set of all QAN candidates that can cover the GCN i and Θ(k)i={j∣l(k)ij≤dc}. |
X(k)(m)j | Decision variable. 1 indicates that the node candidate j for the mth resource in the kth time window can be used as a QAN in the agent mode and a GCN in the self-directed mode. 0 indicates that it can only be used as a GCN in the self-directed mode. |
W(k)(m)ij | Decision variable. It is 1 to indicate that GCN i establishes a connection with QAN candidate j when searching for the mth resource in the kth time window, otherwise it is 0. |
Y(k)(m)i | Decision variable. It is 1 to indicate that GCN i runs the agent mode during resource discovery for the mth resource requirement in the kth time window, otherwise it is 0 (self-directed mode). |
D(k)(m)i_agent | For the mth resource demand in the kth time window, the energy consumption of GCN i running in agent mode to complete the resource discovery process. |
D(k)(m)i_self | For the mth resource demand in the kth time window, the energy consumption of GCN i running in self-directed mode to complete the resource discovery process. |
Q(k)(m)i_agent | For the mth resource demand in the kth time window, the accuracy sign of the RIS for GCN i to complete resource discovery in agent mode. |
Q(k)(m)i_self | For the mth resource demand in the kth time window, the accuracy sign of the RIS for GCN i to complete resource discovery in self-directed mode. |
Qreq | To ensure the efficiency and accuracy of resource discovery, thresholds for RIS sign are defined. |
Parameters | num_node | interval | T/s | Δt2/s | Q(k)(m)i_agent | Q(k)(m)i_self | num_T |
Values | 50 | ±10% | 2 | 0.1 | 0.1 | 0.1 | 100 |
Modes | # migration cycles | Max. TEC3 | Min. TEC | Avg. TEC | Max. RIS EV4 | Min. RIS EV | Avg. RIS EV |
AM1 | 46 | 495.95 | 107.83 | 296.76 | 0.93 | 0.24 | 0.59 |
SM2 | 54 | 497.48 | 117.78 | 305.51 | 0.75 | 0.04 | 0.34 |
Note: 1 AM: Agent mode; 2 SM: Self-directed mode; 3 (T)EC: (Total) energy consumption; 4 EV: Expected value. |
Optimization directions | EC | TC | # nodes | ||||
Total | AM | SM | Total | AM | SM | ||
Min. TEC | 107.83 | 79.04 | 28.79 | 85.25 | 32.91 | 52.34 | 51 |
Optimal solution | 298.07 | 208.49 | 89.58 | 53.68 | 27.24 | 26.44 | 54 |
Median solution | 305.77 | 234.13 | 71.64 | 53.63 | 21.22 | 32.41 | 49 |
Min. TTC1 | 497.48 | 344.65 | 152.83 | 14.41 | 8.24 | 6.17 | 53 |
Note: 1 TTC: (Total) time cost. |
Algorithms | TEC | TCC | Convergence iterations | Computing time (s) | Time for initial solution (s) |
STRA | 298.07 | 53.68 | 424 | 3955 | 408.55 |
TSA | 314.82 | 61.44 | 562 | 5049 | 396.85 |
GA1 | 327.45 | 70.29 | 403 | 3764 | 412.37 |
SAA2 | 341.26 | 73.02 | 411 | 3850 | 427.19 |
PSO3 | 329.93 | 76.63 | 428 | 4014 | 422.52 |
ACO4 | 345.78 | 80.39 | 433 | 4195 | 410.20 |
Note: 1 GA: genetic algorithm; 2 SAA: simulated annealing algorithm; 3 PSO: particle swarm optimization; 4 ACO: ant colony optimization. |
Range | EC | TC | # nodes | ||||
Total | AM | SM | Total | AM | SM | ||
50±10% | 298.07 | 208.49 | 89.58 | 53.68 | 27.24 | 26.44 | 54 |
50±20% | 335.09 | 234.38 | 100.71 | 60.35 | 30.63 | 29.72 | 58 |
50±30% | 250.22 | 175.01 | 75.20 | 45.06 | 22.89 | 22.19 | 40 |
50±40% | 368.63 | 257.84 | 110.79 | 66.39 | 33.69 | 32.70 | 66 |
50±50% | 267.98 | 187.44 | 80.54 | 48.26 | 24.49 | 23.77 | 45 |
50±60% | 236.98 | 165.76 | 71.22 | 42.68 | 21.66 | 21.02 | 37 |
50±70% | 354.56 | 247.99 | 106.57 | 63.85 | 32.41 | 31.45 | 63 |
50±80% | 313.96 | 219.60 | 94.36 | 56.54 | 28.70 | 27.85 | 56 |
50±90% | 404.72 | 283.08 | 121.64 | 72.89 | 36.99 | 35.90 | 78 |