School of Computer Science and Technology, Dalian University of Technology, Dalian116024, China.
Show Author Information
Hide Author Information
Abstract
Mobile-edge computing casts the computation-intensive and delay-sensitive applications of mobile devices onto network edges. Task offloading incurs extra communication latency and energy cost, and extensive efforts have focused on offloading schemes. Many metrics of the system utility are defined to achieve satisfactory quality of experience. However, most existing works overlook the balance between throughput and fairness. This study investigates the problem of finding an optimal offloading scheme in which the objective of optimization aims to maximize the system utility for leveraging between throughput and fairness. Based on Karush-Kuhn-Tucker condition, the expectation of time complexity is analyzed to derive the optimal scheme. A gradient-based approach for utility-aware task offloading is given. Furthermore, we provide an increment-based greedy approximation algorithm with ratio. Experimental results show that the proposed algorithms can achieve effective performance in utility and accuracy.
No abstract is available for this article. Click the button above to view the PDF directly.
References
[1]
J.Ren, H.Guo, C. G.Xu, and Y. X.Zhang, Serving at the edge: A scalable IoT architecture based on transparent computing, IEEE Network, vol. 31, no. 5, pp. 96-105, 2017.
Z. P.Cai, X.Zheng, and J. G.Yu, A differential-private framework for urban traffic flows estimation via taxi companies, IEEE Trans. Ind. Inf., vol. 15, no. 12, pp. 6492-6499, 2019.
Z. P.Cai and Z. B.He, Trading private range counting over big IoT data, in Proc. 39th IEEE Int. Conf. Distributed Computing Systems, Dallas, TX, USA, 2019.
J. W.Shang, C. K.Wang, C. P.Wang, G. Y.Guo, and J.Qian, An attribute-based community search method with graph refining, The Journal of Supercomputing, .
F.Firouzi, A. M.Firouzi, K.Mankodiya, M.Badaroglu, G. V.Merrett, P.Wong, and B.Farahani, Internet-of-things and big data for smarter healthcare: From device to architecture, applications and analytics, Future Generation Computer Systems, vol. 78, pp. 583-586, 2018.
C. K.Wang, C. P.Wang, Z.Wang, X. J.Ye, J. X.Yu, and B.Wang, DeepDirect: Learning directions of social ties with edge-based network embedding, IEEE Transactions on Knowledge and Data Engineering, vol. 31, no. 12, pp. 2277-2291, 2019.
B. J.Zhou, J.Li, X. Y.Wang, Y.Gu, L.Xu, Y. Q.Hu, and L. H.Zhu, Online internet traffic monitoring system using spark streaming, Big Data Mining and Analytics, vol. 1, no. 1, pp. 47-56, 2018.
X.Zheng, Z. P.Cai, J. G.Yu, C. K.Wang, and Y. S.Li, Follow but no track: Privacy preserved profile publishing in cyber-physical social systems, IEEE Internet Things J., vol. 4, no. 6, pp. 1868-1878, 2017.
K.Zhang, S. P.Leng, Y. J.He, S.Maharjan, and Y.Zhang, Mobile edge computing and networking for green and low-latency internet of things, IEEE Commun. Mag., vol. 56, no. 5, pp. 39-45, 2018.
X. L.Fang, Z. P.Cai, W. Y.Tang, G. C.Luo, L. J.Zhou, R.Bi, and H.Gao, Job scheduling to minimize total completion time on multiple edge servers, IEEE Transactions on Network Science and Engineering, .
Q. Y.Meng, K.Wang, X. M.He, and M. Y.Guo, QoE-driven big data management in pervasive edge computing environment, Big Data Mining and Analytics, vol. 1, no. 3, pp. 222-233, 2018.
X.Zheng, Z. P.Cai, J. Z.Li, and H.Gao, A study on application-aware scheduling in wireless networks, IEEE Trans. Mobile Comput., vol. 16, no. 7, pp. 1787-1801, 2017.
H.Li, K.Ota, and M. X.Dong, Learning IoT in edge: Deep learning for the internet of things with edge computing, IEEE Network, vol. 32, no. 1, pp. 96-101, 2018.
Z. P.Cai and X.Zheng, A private and efficient mechanism for data uploading in smart cyber-physical systems, IEEE Transactions on Network Science and Engineering, .
Z. J.Duan, W.Li, and Z. P.Cai, Distributed auctions for task assignment and scheduling in mobile crowdsensing systems, in Proc. 37th Int. Conf. Distributed Computing Systems, Atlanta, GA, USA, 2017, pp. 635-644.
Z. J.Duan, W.Li, X.Zheng, and Z. P.Cai, Mutual-preference driven truthful auction mechanism in mobile crowdsensing, in Proc. 39th IEEE Int. Conf. Distributed Computing Systems, Dallas, TX, USA, 2019.
Y. Z.Zhou, D.Zhang, and N. X.Xiong, Post-cloud computing paradigms: A survey and comparison, Tsinghua Science and Technology, vol. 22, no. 6, pp. 714-732, 2017.
J.Liu, Y. Y.Mao, J.Zhang, and K. B.Letaief, Delay-optimal computation task scheduling for mobile-edge computing systems, in IEEE International Symposium on Information Theory, Barcelona, Spain, 2016, pp. 1451-1455.
J. K.Ren, G. D.Yu, Y. L.Cai, and Y. H.He, Latency optimization for resource allocation in mobile-edge computation offloading, IEEE Trans. Wirel. Commun., vol. 17, no. 8, pp. 5506-5519, 2018.
L. N.Liu, X.Chen, Z. M.Lu, L. H.Wang, and X. M.Wen, Mobile-edge computing framework with data compression for wireless network in energy internet, Tsinghua Science and Technology, vol. 24, no. 3, pp. 271-280, 2019.
L.Lei, H. J.Xu, X.Xiong, K.Zheng, and W.Xiang, Joint computation offloading and multiuser scheduling using approximate dynamic programming in NB-IoT edge computing system, IEEE Internet Things J., vol. 6, no. 3, pp. 5345-5362, 2019.
T. X.Zhu, T.Shi, J. Z.Li, Z. P.Cai, and X.Zhou, Task scheduling in deadline-aware mobile edge computing systems, IEEE Internet Things J., vol. 6, no. 3, pp. 4854-4866, 2019.
Q. Y.Wang, S. T.Guo, J. D.Liu, and Y. Y.Yang, Energy-efficient computation offloading and resource allocation for delay-sensitive mobile edge computing, Sustain. Comput.: Inform. Syst., vol. 21, pp. 154-164, 2019.
X. C.Lyu, W.Ni, H.Tian, R. P.Liu, X.Wang, G. B.Giannakis, and A.Paulraj, Optimal schedule of mobile edge computing for internet of things using partial information, IEEE J. Sel. Areas Commun., vol. 35, no. 11, pp. 2606-2615, 2017.
R.Urgaonkar, U. C.Kozat, K.Igarashi, and M. J.Neely, Dynamic resource allocation and power management in virtualized data centers, in IEEE Network Operations and Management Symposium, Osaka, Japan, 2010, pp. 479-486.
F. M.Liu, Z.Zhou, H.Jin, B.Li, B. C.Li, and H. B.Jiang, On arbitrating the power-performance tradeoff in SaaS clouds, IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 10, pp. 2648-2658, 2014.
G. L.Nemhauser, L. A.Wolsey, and M. L.Fisher, An analysis of approximations for maximizing submodular set functions - I, Math. Program., vol. 14, no. 1, pp. 265-294, 1978.
Bi R, Liu Q, Ren J, et al. Utility Aware Offloading for Mobile-Edge Computing. Tsinghua Science and Technology, 2021, 26(2): 239-250. https://doi.org/10.26599/TST.2019.9010062
The articles published in this open access journal are distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/).
5.1 Gradient-based approach for utility-aware task offloading
We provide a gradient-based approach for utility-aware task offloading. The basic idea of the gradient method is to solve the dual problem. We consider the dual decomposition for Problem (
9
). Owing to the separability of Constraints (
10
) and (
11
), we present the Lagrangian form of the primal problem.
We can easily know that
and is a strictly concave function.
Without the constraints, the maximum value of can be achieved by a given . For a given , is defined as follows:
can be obtained by . For , we have
According to strict concavity, is unique. The dual problem is as follows:
Based on the preceding analysis, the gradient approach can be applied:
where is the iteration index, is a small positive step size, and denotes the projection onto the nonnegative quadrant.
Theorem 3 If we do not consider the Constraints (
10
) and (
11
), then the dual variable converges to the dual optimal as , and the primal variable also converges to the primal optimal variable .
Proof The objective function of Problem (
9
) is strictly concave. The problem satisfies Slater’s condition. Thus, the primal Problem (
9
) and dual Problem (
29
) are strong dualities, if we do not consider the constraints on delay latency and energy cost. As the duality gap is zero, the solution of Problem (
26
) is unique because of the strong duality. Therefore, the dual variable converges to the dual optimal as , and the primal variable also converges to the primal optimal variable .
We can obtain the optimal solution for the primal problem by solving the dual problem. Constraints (
10
) and (
11
) are linear functions with respect to . The feasible solution space is convex. The dual solution leads to the primal solution , when . In the iterative process, we should check the boundary conditions for . For a given , the boundary condition for is easily obtained due to the separability of Constraints (
10
) and (
11
).
According to the pseudocode as shown in Algorithm 1, the computation complexity depends on the and initial value of .
5.2 Increment-based approximation algorithm
Designing an exact algorithm with polynomial-time cost for optimal offloading scheme is difficult. In this section, we prove that the objective function of the proposed problem is increasing and submodular. Then, we provide a greedy algorithm called Increment-based Approximation Algorithm for Offloading Scheme (IAAOS). The approximation ratio bound is proved to be .
Theorem 4 The objective function of Problem (
9
) is submodular.
Proof We denote as a given feasible offloading scheme. For convenience, we define a unit set . will generate a new set , in which the schemes of all the tasks are the same as , and expect added by .
We denote as the increment of the utility where only is added by . Thus we can have the following:
Since is a monotone increasing function, we know .
For any given and , we can have
For any given and , we can get
Based on Lagrange mean value theorem, it can be known that
where and . And then we can have
According to the definition of submodular set function[
33
], the objective function of Problem (
9
) is submodular.
In the following, we propose an increment per-cost-based greedy algorithm and analyze the approximation ratio.
Step 1. We enumerate all feasible solutions of cardinality .
Step 2. For each feasible solution, we find the offloading task with the largest increment per cost. Let the corresponding be increased by , until Constraints (
10
)-(
13
) are not be satisfied. Then, is the input parameter for precision, which can be defined by the users.
Step 3. Finally, the algorithm returns the offloading scheme with the largest utility among all the schemes derived from Step 2, thereby obtaining the final result.
Based on the preceding analysis, Algorithm 2 presents the pseudocode of calculating the feasible offloading scheme.
Corollary 1 For a given precision parameter , let denote the utility of the optimal solutions of Problem (
9
). We denote the utility derived from the solution of Algorithm 2 as . Then, the approximation ratio satisfies
Proof Based on Theorem 4, the objective function of Problem (
9
) is increasing and submodular. According to Ref. [
34
], the provided greedy-based approximation algorithm is with ratio bound .
In Corollary 1, we note that the approximation ratio is also related to precision parameter . This condition means that for , .
feasible schemes exist, such that . According to Algorithm 2, the time complexity for enumerating all feasible solutions of cardinality is . For each feasible scheme , the complexity for greedily increasing by is , where . Then, the cost is from Lines . Based on the preceding analysis, the computation complexity is . The space complexity is . In conclusion, the proposed algorithm can be implemented in time complexity of and space complexity of .
10.26599/TST.2019.9010062.F1
Relationship between utility per device and server computation when 2) MB.
10.26599/TST.2019.9010062.F2
Relationship between utility per device and server computation when MB.
10.26599/TST.2019.9010062.F3
Relationship of utility per device and number of mobile devices when MB.
10.26599/TST.2019.9010062.F4
Relationship of approximation ratio and server computation.
10.26599/TST.2019.9010062.F5
Relationship between utility per device and server computation.
10.26599/TST.2019.9010062.F6
Relationship of utility per device and number of mobile devices.
10.26599/TST.2019.9010062.F7
Relationship of approximation ratio and server computation ().