Edge computing task scheduling method based on user’s social relations: a construction and solution for Smart City Library

View article
PeerJ Computer Science

Introduction

A large number of mobile devices and real-time applications often support the process of building a Smart City Library. The availability of advanced ICT tools such as smartphones and cloud computing has enabled libraries to improve their services and expand outreach. The article tries to conceptualize a methodology for a smart library information system that uses the smart attributes of recent technological means for library service improvements [36]. However, the growth of mobile devices and real-time applications has strained their computing resources, resulting in a subpar user experience (Yu et al., 2022; Goudarzi et al., 2020). Edge computing addresses this issue by delegating computing tasks to edge devices like mobile phones and edge servers (Fu et al., 2023; Wang et al., 2019). However, user reluctance and device resource consumption challenge task offloading (Lv et al., 2021). An altruistic behavior in social networks offers task collaboration opportunities, and social relationships can be quantified for secure identification of mobile edge service devices. Trust information can then be implemented to schedule tasks through mobile device collaboration.

Device-to-device (D2D) technology is a communication technology that allows nearby devices to exchange information, easing data loading pressure on a core network (Patsias et al., 2023). A D2D connection between a mobile device acting as an edge server and resource-limited user equipment to aid task transmission can be constructed in mobile edge computing. A D2D communication is ideal for short-distance communications, offering higher link gain and transmission efficiency and contributing to battery conservation. A D2D has become a critical technology in the development of 5G (Li G. Cai, 2020).

Nevertheless, the prime objective in the investigation of the edge computing domain is the mitigation of challenges related to task execution delays and energy consumption. A pivotal hurdle arises in employing a user’s mobile device as an edge server and task offloading through mobile device collaboration, driven by resource constraints and users’ inherent self-interest.

The utilization of social relationships for task scheduling in edge computing has yet to be extensively researched. Nevertheless, social relationships between nodes are currently being researched in related fields such as the Internet of Things (IoTs) and fog computing. Recent studies have shown that effective and trusted collaboration can be achieved by employing a social relationship structure between mobile devices and wearable devices when users execute collaborative computing tasks. Zhou et al. (2018) proposed a collaborative mobile edge computing paradigm based on social motivation, employing the device social graph model to capture social relationships and implementing a two-part task offloading algorithm based on social perception (Chen et al., 2018). Yang et al. (2015) introduced a Top-K task offloading algorithm based on social relationships to improve the load balancing of task scheduling (Yang et al., 2015). Yu et al. (2019) suggested a socially conscious task offloading framework by combining a MEC offloading and a D2D offloading. In edge computing networks utilizing D2D communication, a data task scheduling based on a D2D device users’ social relationships is also an important research direction. Pu et al. (2016) put forward a named data framework for social perception to implement D2D communication collaboration for content retrieval on edge devices, greatly saving cellular network traffic. Yan et al. (2018) suggested a cooperative perception data task forwarding mechanism for social D2D networks, which assessed user importance by employing differences in user interests, local centrality, and affinity to rationally select cooperative users and realize more efficient data task forwarding. However, the focus of the above approaches is to resolve a collaborative problem in a task scheduling process, and there has yet to be in-depth research and investigation on a task scheduling problem, which has limitations.

The research introduces a novel approach for formulating a task scheduling model in edge computing grounded in social relationships. The key contributions encompass (1) the examination and quantification of user social relationships through mathematical convolution and the Jaccard similarity ratio, leading to the creation of a comprehensive user social relationship graph; (2) the establishment of a user-device-service device connection graph, rooted in Euclidean distance principles to ensure compliance with D2D communication conditions; amalgamating a user’s social relationship graph with this connection graph results in a task-device bipartite graph, where the execution costs of a computing task determine edge weights; (3) the implementation of a task scheduling model based on social relationships in edge computing, resolved through the utilization of the Kuhn–Munkres (KM) algorithm.

The methodology proposed for crafting task scheduling models based on social relationships in edge computing introduces several key innovations: (1) Leveraging D2D communication technology enhances transmission efficiency and contributes to the energy conservation of a battery. (2) Introducing quantification criteria rooted in investigating social relationships among users facilitates quantifying analysis results, and identifying secure and reliable mobile edge service devices. (3) The methodology collaboratively schedules tasks for mobile devices, enhancing user experience.

The overarching structure of the manuscript unfolds as follows: Section ‘Introduction’ provides an introduction, Section ‘Related Work’ delves into the related work, Section ‘Construction of a Social Relationship-Based Model for Scheduling Edge Computing Tasks’ establishes a model grounded in social relationships for scheduling edge computing tasks, Section ‘Solution to Edge Computing Task Scheduling Model Using KM Algorithm’ presents a KM algorithm-based solution for edge computing task scheduling models, Section ‘Experimental Analysis’ conducts a thorough performance assessment of the proposed method through experimental analysis, and Section ‘Conclusion’ concludes the research.

Related Work

Currently, many scholars have researched improving the performance of edge computing. Many computational tasks still need to be carried out at edge nodes due to insufficient computational performance of edge nodes and the transmission bandwidth of a WAN. Due to the limited computational power of edge nodes and transmission bandwidth of wireless access networks, a task scheduling problem in edge computing has become the focus of current research. Márquez-Sánchez et al. (2023) researched a task scheduling decision-making problem at an application level. They proposed that each application consists of multiple tasks, which should be completed before a deadline. In addition, several researchers carried out task scheduling based on the perspective of edge operations, which cut down resource consumption and improved computational performance. The current work on edge computing task scheduling can be categorized holistically into cross-layer and peer task scheduling.

A cross-layer task scheduling boosts local computing power by handling computation offloading. Distributed computation offloading schemes for goal optimization have been extensively examined, including energy consumption (Wen, Zhang & Luo, 2012; Chen, 2015; Iftikhar et al., 2023), resolution latency (Zheng et al., 2019; Chen et al., 2016; Guo et al., 2019), bandwidth loss (Barbera et al., 2013), and mobility management (Rahimi, Venkatasubramanian & Vasilakos, 2013; Shi, Chen & Xu, 2018). Sardellitti, Scutari & Barbarossa (2015) considered various scenarios comprehensively and designed corresponding algorithms based on user scenarios to optimize computational resources. Yang et al. (2021) proposed network-aware computational partitioning for multi-user edge computing. Li, Ota & Dong (2018) suggested a joint edge-cloud offloading strategy for deep IoTs. Kwak et al. (2015) obtained a task allocation algorithm that optimized CPU and network energy under time delay constraints. Chen, Zhou & Xu (2018) suggested an efficient load-scheduling algorithm that can rationalize workload scheduling among edge nodes.

Peer task scheduling extensively conducted by researchers explores the potential of peer cooperation in improving resource efficacy. Chen, Zhou & Xu (2018) investigated collaborative cooperation between small base stations (SBS) and designed an online peer-to-peer offloading algorithm to optimize the system’s computational performance. Cui et al. (2017) implemented centralized scheduling in D2D networks and proposed a novel greedy algorithm for large-scale scheduling problems, thus reducing energy consumption.

Only a few studies have researched cross-layer task scheduling and peer task scheduling. Champati & Liang (2021) mainly investigated static task scheduling, while dynamic task scheduling requires many constraints to be realized. The literature does not consider the dynamic scalability of computing resources (Deng et al., 2016; Josilo & Dan, 2019). In the manuscript, an efficient task scheduling algorithm is provided that can realize efficient task scheduling in complex social relationships.

Construction of a Social Relationship-Based Model for Scheduling Edge Computing Tasks

The description of the scenario

In an edge computing environment, mobile devices may experience postpones or poor performance when executing computationally intensive or time-sensitive tasks due to limited device resources. To address this issue, mobile devices can request assistance from nearby devices with available resources, which we refer to as service devices. In the research, we refer to the mobile devices that need scheduling as user equipment or user nodes, while the devices that can assist in task execution are called service devices or service nodes. When multiple user devices send task requests, and there are multiple available service devices, the challenge is to select the appropriate service device to minimize overall delay and energy consumption while ensuring task safety and reliability. To address this challenge, the research combines social relationships between mobile devices to pick service devices for task scheduling to minimize delay and energy consumption during task executions.

A task scheduling scenario in mobile edge computing is considered, where a base station (BS) is equipped with an edge computing server, multiple mobile devices, and multiple service devices. The BS receives real-time task-scheduling requests from the user’s equipment and monitors idle service devices. When a user device has a difficult task, it sends a task scheduling request to a BS, which chooses a suitable service device according to a certain strategy and constructs a D2D connection between devices. This allows the user’s equipment to transmit a task directly to a selected service device for computation. The task scheduling scenario is illustrated in Fig. 1.

Schematic diagram of edge computing task scheduling scenario.

Figure 1: Schematic diagram of edge computing task scheduling scenario.

In this scenario, BS monitors mobile devices in real-time. At a certain moment, assume that the user’s equipment sends task scheduling requests and that M service devices have idle resources. Each task is represented by a quaternion <Ii, Ci, Oi, Ttol i>, where Ii Ci, Oi, and Ttol indicate the input data for a task, the computing resources required, the output data, the user’s maximum tolerance time from sending a task request to its completion, respectively. Tool I reflects a user’s sensitivity to delay, as different users have different sensitivity to time. Additionally, each task is indivisible and can only be dispatched to one device. For the number of M service devices, the CPU operating frequency of each device is denoted by fy, reflecting the number of CPU cycles per unit time. Each service device can only assist in executing one task during a round of task allocation. The edge server uses the KM algorithm to pick a service device for task execution based on task requirements, computing resources, social relationships, and other information. The matching result is sent back to the user equipment, which executes the task locally or sends a task scheduling request to the service device matched by the BS via a D2D connection. Eventually, the outcomes are attained by the local execution or executed by the service device and transmitted to the user equipment.

A scheduling method

In the task scheduling method of edge computing based on social relationships, the following steps are taken to schedule tasks:

A Construction of User Social Relationship Graph: Leveraging social assessment data within a user social evaluation dataset, social relationships among user devices and service devices are analyzed and quantified. A comprehensive user social relationship graph is meticulously constructed by implementing mathematical convolution and the Jaccard similarity ratio. Also, task execution costs are computed based on task requirements and device information.

The Construction of Edge Computing Task Scheduling Model: A task-device bipartite graph and task scheduling model are combined to construct a model used for edge computing task scheduling. The model considers factors such as task execution delay, the energy consumption of a task execution, and the energy consumption of a user equipment standby.

KM Algorithm-based Solution: The edge computing task scheduling model is resolved by implementing the KM algorithm, presenting the result of a task scheduling that minimizes delay and energy consumption.

The scheduling method ensures that tasks are scheduled to be executed on safe and reliable service devices by analyzing and quantifying a social relationship between devices. The physical distance between a user and service devices is also considered to construct an energy-efficient D2D connection. The method ultimately provides a task scheduling result that minimizes delay and energy consumption. The task scheduling method based on social relationships in edge computing is illustrated in Fig. 2.

Building a social relationship graph

In D2D communication, task offloading requires a user node to transmit a task to a service node via a D2D connection for processing. However, malicious service nodes in a network can disrupt node cooperation, compromising user privacy and causing incomplete task execution. To ensure safe task offloading, social trust between a user and a service device holder is examined and quantified through social relationships between mobile devices. A social trust relationship enables users to discern secure and dependable service devices for efficient task offloading. Moreover, given the prevalence of altruistic behaviors within individuals maintaining social ties, the inclination of service device holders to share their resources can be assessed through an analysis of social relationships among individuals with mobile devices. Thus, the research considers social relationships between users as a crucial basis for designing task scheduling strategies and represents social relationships between users through the graph of a user’s social relationship.

A social relationship graph Gs between users is represented by a (N+M) by (N+M) matrix (Pij), storing social relationship scores, which are uniformly maintained and updated by the edge server of BS. After a service node provides computing services for a user node, a user node can rate the service node, and vice versa. The rating is an integer ranging from 0 to 5, with higher scores indicating greater satisfaction with the other party’s performance in the cooperation, like rating scheme used for food delivery service or taxi service providers in everyday life, service providers can also rate their cooperation with users. Thus, a service node can also rate a user node, and an assessment between the 2 is mutual but not necessarily equal.

Edge computing task scheduling method based on social relationships.

Figure 2: Edge computing task scheduling method based on social relationships.

The research introduces the computation of the social relationship score of service nodes from the perspective of user nodes. A social relationship score in the social relationship graph can be found based on the service assessment factor, recommendation trust factor, and similar recommendation factor. The calculation methods for these 3 decision factors are given as follows:

Social relationship computing

(1) Service assessment factors

The social relationship graph can store a social relationship score between user node i and service node j if they have had a direct interaction. This score is calculated by employing the service assessment of node i to node j and stored. Assuming the latest H service evaluation records of node i to node j are Sij = {Sij(1), Sij(2), …, Sij(k), …, Sij(H)}, where Sij(k) represents scores given by user node i to service node j, k ∈[1, H]. H represents the number of service assessments of user node i to service node j within a specific period to ensure the effectiveness of service assessment. The research employs the mathematical convolution concept (Wei, Yang & Liu, 2023) to derive Eq. (1) to compute the service assessment factor of user node i to service node j. To facilitate the processing of the proportion of each decision factor in the social relationship, service assessment factor scores are normalized by implementing Eq. (2). Q i j = 1 H k = 1 H S i j k × 1 H k + 1 Q i j = Q i j min Q i j max Q i j min Q i j = Q i j 5

where Qij’ represents the service assessment calculated directly through historical evaluation. After normalization is run, Qij represents the service assessment factor, with max(Qij) and min(Qij), which are the maximum and minimum scores of a service evaluation, 0 and 5, respectively.

(2) Recommended trust factor

When there is no direct assessment between a user node and a device node, a user node can still calculate the social relationship score by referring to other nodes’ assessment of the service node since trust can be transferred. An intermediary node is a node assessed by user nodes and has assessments for service nodes.

Let the intermediary node set of user node i and service node j be Vij, Vij ={Vij(1), Vij(2), …, Vij(k), …, Vij(—Vij—)}, where —Vij— represents the number of intermediary nodes. The recommendation trust Wij of the user node i to the device node j can be computed based on the service assessment of user node i to the intermediary node by employing Eq. (3). W i j = 1 V i j k = 1 V i j Q i k × Q k j

(3) Similar recommendation factor

When the user node i has not assessed the service node j, the user node i can also refer to the evaluation of the service node j by nodes with similar assessments to itself to judge the credibility of the nodes (Park & Tussyadiah, 2020). Assuming that node Kij(η) has not only assessed the same node as user node i , but also assessed node j, then Kij(η) represents a reference node. The set of reference nodes is denoted by Kij ={ Kij(1), Kij(2), …, Kij(η), …, Kij(—Kij—)} and the size of the set is denoted by —Kij—. Nξ denotes the intersection set of nodes serving user node i and reference node η, and the set size is represented by —Nξ—. The research employs the generalized Jaccard similarity coefficient to attain the similarity score between user node i and reference node η on the same group of service nodes Nξ, as shown in Eq. (4). J i η = ξ = 1 N ξ min Q i ξ , Q η ξ ξ = 1 N ξ max Q i ξ , Q η ξ

(4) Calculation of social relationship score

Users tend to trust their judgments more than others’ opinions. Therefore, when there is a direct assessment between user node i and service node j, the social relationship between them in the social relationship graph is determined by the service assessment, represented by Pij = Qij.

However, when there is no direct assessment between user node i and service node j, the social relationship must be computed based on the recommendation trust factor Wij and the similar recommendation factor Aij. The impact of Wij and Aij on the social relationship Pij can be gauged by the number of intermediary nodes —Vij— and the number of reference nodes —Kij—.

The social relationship score Pij of user node i to service node j in a user social relationship matrix P can be obtained by implementing Eq. (5): P i j = Q i j , H 0 φ × W i j + 1 φ × A i j , H = 0 , V i j + K i j 0 0 . 5 , V i j + K i j = 0 .

Construction of social relationship graph

The process of constructing and implementing a user social relationship graph Gs is presented as follows: Firstly, the number of N user nodes and the number of M service nodes are obtained. Next, service rating information between mobile devices is obtained. Then, for each user node, a social relationship score between it and each service node is computed.

To determine whether to add an edge between a user node and a service node in the social relationship graph, the social relationship score P between them is compared to a set threshold δ. An edge is added if P is greater than or equal to δ. Otherwise, the social relationship graph is not modified, and the next service device is monitored.

The construction of a connection graph

Given that the maximum communication distance of D2D is represented by Lmax, the location coordinates of the user equipment i are (x1 i, y1 i), and the location coordinates of service equipment are (x2 j, y2 j), a connection diagram between the user equipment and service equipment is denoted as Gd. Equation (6), the Euclidean distance formula, is used to compute the distance between user equipment i and service equipment j within the BS coverage. L i j = x i 1 x j 2 2 + y i 1 y j 2 2 .

The connection graph between user equipment and service equipment, Gd, can be constructed by attaining the serial numbers of N user nodes, the serial numbers of M service nodes, and their respective location information. The physical distance, L, between each user and service equipment, can then be computed. If L is less than or equal to the maximum D2D communication distance, Lmax, a link between the user and service equipment in the Gd edge, can be added. On the other hand, if the condition is not met, the device connection diagram remains unmodified.

The construction of bipartite graph

To optimize the overall scenario by minimizing delay and energy consumption, the task-device bipartite graph G is constructed by combining the user equipment-service equipment connection graph Ga and the user social relationship graph Gs of mobile devices.

Figure 3 illustrates the task-device bipartite graph, consisting of 2 disjoint subsets, X and Y. The set X represents the tasks that users must perform. In contrast, set Y represents the mobile devices capable of performing tasks. The set Y comprises user and service equipment, represented in solid circles in Fig. 3.

Diagram of the task-equipment bipartite.

Figure 3: Diagram of the task-equipment bipartite.

In any case, a user can execute a task locally, resulting in an edge relationship between the user’s task i and their equipment in the task-device bipartite graph. However, due to limited resources, users may seek task offloading and thus cannot provide computing services for other user’s tasks. Therefore, there are no associated edges between user task i and other user devices, meaning user devices cannot serve other devices.

The construction of edge computing task scheduling model

Calculation of communication cost

Under the control of the BS, any user equipment can construct a D2D connection with a serving device. Since tasks are typically time-sensitive, the BS only constructs and maintains one D2D connection per mobile device. A D2D communication is adopted among mobile devices, assuming orthogonal spectrum resources and no interference between devices. According to Shannon’s theorem, a D2D communication transmission rate between user equipment i and service equipment j can be calculated by Eq. (7): R i j = B log 2 P i t D i j 2 L i j γ Σ U i U , i i P i D i j 2 L i j γ + σ 2 + 1

where B, PT i, and Dij represent the available bandwidth of the transmission channel, the transmission power of the user equipment i, and the channel parameter of the D2D transmission. The path loss between user device i and serving device j is L −γ ij, where L, γ, σ2 represent the physical distance between mobile devices, the path loss exponent, and the noise variance.

In a task transmission, the mobile device can only construct one D2D connection at a time, and the mobile device, as the server, has relatively limited computing power and can only receive one task to do a calculation at a time. The time it takes for user equipment i to transmit a task to service equipment j is the data transmission delay Td ij. The transmission delay caused by task scheduling of user equipment to service equipment can be computed. When tasks are scheduled to service nodes for calculation, two parts of energy consumption will be generated. One is the energy consumption caused by user equipment i scheduling tasks to service equipment j, and the other is the energy consumption led by service equipment j sending task execution outcomes back to user equipment i. Total energy consumption, the sum of the energy consumption of these 2 parts, constitutes the energy consumption Ed ij of scheduling transmission. Equations (8) and (9) are used to do calculations as follows:

T i j d = I i R i j + O i R j i E i j d = I i R i j P i t + O i R j i P j t .

The cost calculation of a task execution

User devices have two options for task execution: local execution or scheduling tasks on other mobile devices. When a task is executed locally on a user device, the cost of task execution includes the energy consumption and computational delay produced by the device itself. On the other hand, when a user device schedules a task to be executed on a service node, the cost of the energy consumption of task execution includes the energy consumption for task transmission, the energy consumption for computing tasks on the service device, the standby energy consumption of the user device waiting for the task to return, and the delay cost, which includes task transmission and task computation delays.

To execute locally, Eqs. (10) through (16) are used:

T i l o c = I i C i F i E i l o c = P i c T i l o c .

To execute scheduling, the relevant equations are given as follows:

T i j c = I i C i F j E i j c = P i c T i j c T i j s c h = T i j d + T i j c E i w = T i j s c h × E o E i j s c h = E i j d + E i j c + E i w .

Task scheduling model

Let λij set as a binary decision variable of task scheduling. If a task of a user node i is offloaded to the service node j, then λij = 1; otherwise, λij = 0. It means the task is not executed on the service node. The task-device bipartite graph is represented by G = {N, ɛ}, where eij represents the associated edge between user task i and device node j, which satisfies the social and communication conditions required for task scheduling. To sum up, this research aims to minimize the execution delay and energy consumption of all tasks in the entire scenario, and the objective function is shown in Eq. (17): min λ i = 1 N 1 j = 1 M λ i , j Z i l o c + j = 1 M λ i , j Z i j s c h = min λ 1 2 i = 1 N 1 j = 1 M λ i , j T i l o c + E i l o c + j = 1 M λ i , j T i j s c h + E i j s c h .

Solution to Edge Computing Task Scheduling Model Using KM Algorithm

Construction and implementation of user social relationship graph

The edge server of a BS obtains service assessment information and computes the social relationship score between user equipment and service equipment implementing the formula from the previous analysis. It then determines whether the social relationship score meets the social threshold score to construct the user’s social relationship graph. The user’s social relationship graph is implemented in Java and stored as an array. When there is no social relationship between the user and the service equipment, the score is set to 0. When there is a social relationship, the score is assigned to 1. Since user equipment and service equipment are disjoint sets with no associated edges within the same set, the user’s social relationship graph represents a bipartite graph. Although we do not need to consider the bipartite graph property of the social relationship graph in this section, it facilitates the construction of the task-equipment bipartite graph. The flow chart showing the construction of the user’s social relationship graph is presented in Algorithm 1.

Construction and implementation of user equipment-service equipment connection graph

The mobile device’s location information is attained to compute the physical distance between the user equipment and service equipment and determine whether a D2D communication condition is met to construct the user equipment-service equipment connection graph. The user equipment-service equipment connection graph is implemented in Java and stored as an array. When a D2D communication condition is not satisfied, the score is set to 0, and when it is satisfied, the score is assigned to 1. The user equipment-service equipment connection graph is also bipartite since user equipment and service equipment are disjoint sets, with no associated edges within the same set. We do not need to consider the bipartite graph properties of the user equipment-service equipment connection graph here.

Table 1:
The implementation process of user social relationship graph construction algorithm.
Algorithm 1: User social relationship graph construction algorithm
Input: Number of user devices N, number of server devices M, service evaluation information, threshold P
Output: Social Relationships Pij between user device i and service device j
Begin
1:      if Pij>P
2:     Social[i][j]=1
3:     j+1
4:      else if Pij<=P then
5:      j+1
6:         if j>M
7::        i+1
8:              if i>N
9:                  i+1
10:              else if
11:         else if j<=M then
12:             return Pij
13:         End if
14:      End
DOI: 10.7717/peerjcs.2457/table-1

Construction and implementation of task-equipment bipartite graph

A task-equipment graph is constructed by implementing the relationship between the user’s social relationship graph and the edges in the user equipment-service equipment connection graph. The task-equipment bipartite graph is implemented in Java and stored as an array. When a social relationship between user equipment and service equipment and D2D communication conditions are met, the array score is assigned to 1. If no social relationships or D2D communication conditions are not met, the array score is assigned to 0. If there is no social relationship and D2D communication conditions are not met, the array score is also set to 0.

Solution algorithm and implementation of edge computing task scheduling model based on KM algorithm

Based on a task-equipment bipartite graph, the edge computing task scheduling model is constructed to attain the weights of the edges in the bipartite graph, which can be resolved by implementing the KM algorithm.

According to the proposed model, the specific execution steps for resolving the edge computing task scheduling model based on the KM algorithm are as follows:

Step 1: Compute the task execution cost as the weight of the bipartite graph edge.

Step 2: Set the top mark for the task and device nodes.

Step 3: Construct equal subgraphs.

Step 4: Find augmenting paths in equal subgraphs. If an augmenting path is found, go to Step 5. If not, go to Step 6.

Step 5: Determine whether a complete match is attained. If not, return to Step 4. If so, end.

Step 6: Compute the top mark’s modified score, modify it, and return to Step 3.

Experimental Analysis

The experimental execution environment for the research is macOS 10.13.6 with a 1.4 GHz Intel Core i5 processor and 4GB of memory. Dataset 5 was collected from a taxi-hailing service program in 2022, and the research implements passenger and driver information from the dataset. The proposed model is compared with three other algorithms: Pure KM(PKM), which is the KM without social relations; improved Genetic Algorithm (IGA) (Zhou et al., 2018), which aims to reduce delay and energy consumption; and JPORA (Saleem et al., 2020), which aims to decrease overall task execution delay.

Comparisons of objective function scores and task execution delay when the number of devices changes

As shown in Fig. 4A, the objective function score increases as the number of mobile devices rises. The increase in the number of devices leads to a rise in the tasks of user equipment, resulting in increased delay and energy consumption. The proposed KMWSR performs the best, followed by the JPORA, with the PKM and IGA ranked third and fourth, respectively. The proposed algorithm considers both task execution delay and energy consumption and the social relationship between mobile devices, allowing user devices to be offloaded to trusted service devices, resulting in better task execution and a lower probability of task rejection. The JPORA reduces task execution delay, the PKM attains the optimal match, and the IGA attains an approximate optimal solution. The objective function score’s growth rate slows as the number of mobile devices rises due to the increasing density of service devices that user equipment can choose from.

Comparisons of (A) objective function values and (B) task execution delay when the number of devices changes.

Figure 4: Comparisons of (A) objective function values and (B) task execution delay when the number of devices changes.

After reviewing Fig. 4B, the JPORA prioritizes reducing task execution delay and outperforms the KMWSR in this aspect. Although the time delay curves of the PKM and IGA are similar, the PKM achieves better results since it acquires the optimal solution for matching user tasks with service devices. In contrast, the IGA produces an approximate optimal solution. The total latency of tasks performed by user devices increases more slowly as the number of mobile devices grows due to the unchanging mobile range and maximum communication distance of D2D communication. This increased density raises the number of service devices with good performance available around the user device, making it simpler to schedule tasks on mobile devices closer in proximity. However, the total latency of the JPORA, PKM, and IGA increases more rapidly than the KMWSR because these three algorithms do not consider social relationships among device users. As a result, service devices may reject some tasks, and only local executions in areas with relatively scarce computing resources are feasible, leading to a faster total delay growth as shown in Fig. 4.

Comparisons of energy consumption when the number of devices changes

Figure 5 shows that as the range of mobile devices remains constant, the total energy consumption of task execution increases with the number of mobile devices. Among the algorithms assessed in the research, the proposed KMWSR is the most effective in terms of energy saving, followed by the PKM. The IGA attains an approximate optimal solution and has a slightly lower energy-saving effect than the PKM. On the other hand, the JPORA, focusing more on decreasing time delay, has the worst performance in terms of energy consumption. This is because the JPORA does not consider energy consumption as much as the other algorithms. Eventually, the proposed KMWSR achieves relatively the best energy consumption even though the number of mobile devices increases.

Comparisons of energy consumption when the number of devices changes.

Figure 5: Comparisons of energy consumption when the number of devices changes.

Comparison of objective function scores when social relationship threshold changes

Figure 6 illustrates the change in the objective function as the social relationship threshold increases while the number of mobile devices remains constant. It shows that when the social relationship score increases, the objective function score attained by all four algorithms also increases. This is because a higher social relationship threshold increases the likelihood of task rejection by service devices and dispatching to devices with average performance or local execution, resulting in increased delay and energy consumption. The KMWSR performs the best in this scenario, with only a slight increase in the objective function score. The KMWSR considers social relationships and excludes devices with weak connections, preventing task rejection. However, increasing the social relationship score reduces the number of devices in the candidate service set, potentially excluding devices with good performance, leading to an increase in the objective function score.

Comparison of objective function values when social relationship threshold changes.

Figure 6: Comparison of objective function values when social relationship threshold changes.

Comparison of task execution delay and energy consumption of task execution when the number of devices and the social relationship threshold change

Figure 7A shows that when the number of mobile devices remains constant, the task execution delay of the four algorithms increases with the rise of the social relationship threshold score. This is because the number of service devices remains the same, and as the social threshold increases, users with weak social connections find it difficult to find service devices willing to accept tasks. Among the algorithms assessed in the research, the proposed KMWSR is the least affected by the change in social threshold score, and its performance is the most stable. This is because the KMWSR considers the social relationship between devices and excludes service devices unwilling to accept tasks in advance, thus preventing the possibility of service devices matching edge servers and rejecting tasks. Consequently, the tasks of user devices will be scheduled to the optimal available server.

Comparison of (A) task execution delay when the number of devices changes and (B) energy consumption of task execution when the social relationship threshold changes.

Figure 7: Comparison of (A) task execution delay when the number of devices changes and (B) energy consumption of task execution when the social relationship threshold changes.

Figure 7B illustrates that as the social relationship score increases, the energy consumption of task execution also rises for all four algorithms when the number of user devices remains constant. The proposed KMWSR is the least affected by changes in the social relationship score and performs the best in reducing energy consumption. This is because it considers the social relationship between users and avoids task rejections. However, even the KMWSR is slightly affected by increased social threshold as it reduces the number of available service devices, potentially excluding devices with better performance.

When a social relationship score is low, the PKM and IGA exhibit similar outcomes to that of the KMWSR. Nevertheless, with an elevation in the social threshold, the effectiveness of these two algorithms experiences a notable decline. This phenomenon stems from the heightened social relationship score, increasing the probability of service device task rejections. Consequently, user devices must opt for suboptimal servers or perform local task execution, amplifying energy consumption. Notably, the JPORA, prioritizing delay reduction, demonstrates inferior energy-saving performance.

The comparison of task execution delay when the number of task changes

Figure 8 presents the delay time of task execution of distinct algorithms as the social relationship threshold grows for distinct numbers of tasks in non-specific cases. The delay time of the four algorithms in executing the task grows as the social relationship threshold increases.

(a) The number of tasks is 100

(b) The number of tasks is 200

(c) The number of tasks is 300

Comparison of task execution delay when the number of tasks changes.

Figure 8: Comparison of task execution delay when the number of tasks changes.

The proposed KMWSR can ensure the stable growth of task execution delay under distinct numbers of tasks since the KMWSR can ensure the allocation of computational resources under the premise of considering the social relationship, thus realizing the reasonable scheduling of tasks. The remaining three algorithms exhibit a substantial and escalating growth pattern as the task count rises. This trend suggests challenges in efficiently allocating computational resources through social relations division when confronted with varying task volumes, leading to diminished scheduling performance. The JPORA performs like the proposed algorithms. However, as task count rises, there is an elevated likelihood of task rejection for execution by the JPORA, resulting in a performance decline. This phenomenon is also observed in the PKM and the IGA, where the performance of the same algorithm is adversely affected by an increased task count. Similarly, the performances of the PKM and IGA are also severely affected by the number of tasks, and the task execution delay increases significantly. This shows that the proposed KMWSR is more effective for scheduling massive tasks.

In summary, alterations in the social relationship threshold score exert a discernible impact on task execution delay and energy consumption. The proposed algorithm exhibits a relatively lower susceptibility to such variations, showcasing superior performance when compared to the other three algorithms within the social relationship score range of 0.2 to 0.4. This range balances energy conservation and task load reliability, facilitating efficient and stable scheduling for substantial task volumes. In practical scenarios integrated with the BS, the edge server should adjust the social relationship threshold dynamically based on real-time user social relationships. This adaptive approach ensures the provision of high-response, low-energy task scheduling services while upholding the safety and reliability of task executions.

Conclusion

The research introduces an innovative edge computing task scheduling model grounded in user social relations, resolved through the KM. The contribution encompasses a task scheduling approach for edge computing, intending to minimize latency and energy consumption while ensuring secure and dependable task scheduling. Service evaluation, recommendation trust, and analogous recommendation factors are combined to quantitatively assess social relationships among users. Constructing a user social relationship graph based on these scores guarantees the safety and reliability of task scheduling. To facilitate D2D communication connections, the physical distance is computed between mobile devices by implementing Euclidean distance, forming a user device-service device connection graph. The synthesis of the user social relation graph and the user device-service device connection graph results in a task-device bipartite graph. An edge computing task scheduling model is formulated that accounts for both the local execution cost and the scheduling execution cost of tasks. Ultimately, the KM is applied to determine the model and validate its efficacy through comparisons with mainstream algorithms. The research findings indicate that leveraging D2D communication technology for task transmission mitigates delay, energy consumption, and core network communication pressure.

Supplemental Information

  Visitors   Views   Downloads