Opportunistic routing for mobile edge computing: A community detected and task priority aware approach

IF 4.6 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Computer Networks Pub Date : 2025-02-01 DOI:10.1016/j.comnet.2024.111000
Jia Wu , Tingyi Dai , Peiyuan Guan , Ziru Chen , Fangfang Gou , Amir Taherkordi
{"title":"Opportunistic routing for mobile edge computing: A community detected and task priority aware approach","authors":"Jia Wu ,&nbsp;Tingyi Dai ,&nbsp;Peiyuan Guan ,&nbsp;Ziru Chen ,&nbsp;Fangfang Gou ,&nbsp;Amir Taherkordi","doi":"10.1016/j.comnet.2024.111000","DOIUrl":null,"url":null,"abstract":"<div><div>As the 5G era develops quickly, there has been a significant growth in the amount of network data. Concurrently, traditional routing algorithms are encountering growing challenges. Traditional routing algorithms typically rely on maintaining stable end-to-end paths to facilitate smooth data transmission. However, in wireless multi-hop networks, the mobility of nodes and the dynamic nature of network topology make maintaining stable end-to-end paths exceedingly difficult, if not impossible. Consequently, data transmission efficiency decreases while network overhead increases. To address these challenges, opportunistic routing has emerged. Opportunistic routing is self-organizing networks that rely on chance encounters between nodes to transmit messages, and the store-and-carry forwarding technique is used for data transmission between nodes. Typically, most traditional opportunistic routing algorithms divide nodes into communities. However, such approaches often overlook node characteristics, potentially leading to disparate nodes being assigned to separate communities despite positive correlations. Thus, accurately dividing communities remains a significant challenge. To address this, we propose the Efficient Community Detection Data Transmitting (ECDDT) algorithm. During community detection, ECDDT combines social attributes and network topology using mobile edge computing. Subsequently, to expedite task execution, we schedule these tasks in a reasonable manner. Through simulation experiments across four diverse real datasets, we evaluate the algorithm’s efficacy. Our findings demonstrate favorable performance in delivery rate and routing overhead.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"258 ","pages":"Article 111000"},"PeriodicalIF":4.6000,"publicationDate":"2025-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1389128624008326","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0

Abstract

As the 5G era develops quickly, there has been a significant growth in the amount of network data. Concurrently, traditional routing algorithms are encountering growing challenges. Traditional routing algorithms typically rely on maintaining stable end-to-end paths to facilitate smooth data transmission. However, in wireless multi-hop networks, the mobility of nodes and the dynamic nature of network topology make maintaining stable end-to-end paths exceedingly difficult, if not impossible. Consequently, data transmission efficiency decreases while network overhead increases. To address these challenges, opportunistic routing has emerged. Opportunistic routing is self-organizing networks that rely on chance encounters between nodes to transmit messages, and the store-and-carry forwarding technique is used for data transmission between nodes. Typically, most traditional opportunistic routing algorithms divide nodes into communities. However, such approaches often overlook node characteristics, potentially leading to disparate nodes being assigned to separate communities despite positive correlations. Thus, accurately dividing communities remains a significant challenge. To address this, we propose the Efficient Community Detection Data Transmitting (ECDDT) algorithm. During community detection, ECDDT combines social attributes and network topology using mobile edge computing. Subsequently, to expedite task execution, we schedule these tasks in a reasonable manner. Through simulation experiments across four diverse real datasets, we evaluate the algorithm’s efficacy. Our findings demonstrate favorable performance in delivery rate and routing overhead.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
移动边缘计算的机会路由:社区检测和任务优先级感知方法
随着5G时代的快速发展,网络数据量出现了显著增长。同时,传统的路由算法也面临着越来越大的挑战。传统的路由算法通常依赖于保持稳定的端到端路径来促进数据的顺利传输。然而,在无线多跳网络中,节点的移动性和网络拓扑的动态性使得保持稳定的端到端路径非常困难,如果不是不可能的话。因此,数据传输效率降低,网络开销增加。为了应对这些挑战,机会路由出现了。机会路由是一种自组织网络,它依靠节点之间的偶遇来传输消息,节点之间的数据传输采用存储携带转发技术。通常,大多数传统的机会路由算法将节点划分为社区。然而,这种方法往往忽略了节点的特征,从而可能导致不同的节点被分配到不同的社区,尽管存在正相关性。因此,准确划分社区仍然是一项重大挑战。为了解决这个问题,我们提出了高效社区检测数据传输(ECDDT)算法。在社区检测过程中,ECDDT利用移动边缘计算将社会属性与网络拓扑相结合。随后,为了加快任务的执行,我们以合理的方式安排这些任务。通过四个不同真实数据集的模拟实验,我们评估了算法的有效性。我们的研究结果表明,在交付率和路由开销方面具有良好的性能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Computer Networks
Computer Networks 工程技术-电信学
CiteScore
10.80
自引率
3.60%
发文量
434
审稿时长
8.6 months
期刊介绍: Computer Networks is an international, archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in the computer communications networking area. The audience includes researchers, managers and operators of networks as well as designers and implementors. The Editorial Board will consider any material for publication that is of interest to those groups.
期刊最新文献
Design and evaluation of a robust and explainable intrusion detection framework for 5G/B5G networks OnlineADS: An online active learning approach to intrusion detection for WSNs Dynamic reliable SFC orchestration for SDN-NFV enabled networks Efficient level-3 secure certificateless signature against malicious KGC attacks for IoT An improved dynamic anonymous authentication and key agreement scheme for resource constrained IoT devices
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1