Professional Documents
Culture Documents
Edge Computing Resource Allocation Method For Mining 5G Communication System
Edge Computing Resource Allocation Method For Mining 5G Communication System
Edge Computing Resource Allocation Method For Mining 5G Communication System
ABSTRACT In the actual production of coal mines, the transmission needs of existing underground
applications cannot be met due to a lack of strategies and customized equipment for underground
5G application scenarios, which causes increased underground data processing delay and low transmission
efficiency. To solve the problem above, the mobile edge computing (MEC) technology based on the
5G wireless base station is studied, and underground 5G communication capability is improved by edge
caching and dynamic resource allocation according to the actual situation of coal mines. The experimental
result shows that under the premise of maintaining the rated power and transmit power of the existing base
station, the average delay of executing tasks is 15 ms, which is 50% lower than the average delay of all
local execution methods. The average delay is 37.5% lower than all MEC execution methods. At the same
time, the uplink rate of a single base station can reach 1 Gbps and the downlink rate can reach 1.5 Gbps.
Our method can significantly improve the reliability of mining 5G communication systems and the rational
allocation of resources.
INDEX TERMS Mine 5G communication, mobile edge computing, deep learning, intelligent coal mine.
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
49730 VOLUME 11, 2023
L. Zhang et al.: Edge Computing Resource Allocation Method for Mining 5G Communication System
5G communication technology in the intelligent construction extreme value theory, which make users reassociated to MEC
of coal mines, it is necessary to explore how to maximize servers in order to offload tasks using higher rates or access-
the bandwidth utilization rate of 5G communication base ing proximal servers. However, no strategy or customized
stations in mines under the condition of limited resources, equipment is suitable for these underground scenarios in
so as to meet the requirements of low-delay, large-bandwidth actual production. Even after adjusting the existing param-
and high-speed communication for main system data in intel- eters, the advantages of 5G technology cannot be brought
ligent coal mines [5]. into play and the transmission requirements of existing under-
As shown in Figure 1, the current 5G network deploy- ground applications cannot be met [14], [15]. At present,
ment architecture diagram of coal mines shows that the core the mine 5G system submitted for approval in safety cer-
network is installed in the ground central machine room, tification does not have relevant technology for the special
with BBU, RHUB, and RRU installed underground. BBU needs, which carries out explosion-proof transformation on
is connected to RHUB through an optical fiber, and RHUB the ground 5G flameproof products, with large volume and
is connected to pRRU+ directional antenna through optical weight. This raises the following questions:
cable to achieve 5G signal coverage [6], [7]. All 5G net- • Contrary to the ground 5G products focusing on down-
work communication in underground coal mines relies on link rate, the performance advantages of existing mine
small stations. In order to prevent gas explosions caused 5G system can not be fully played in the underground
by high-power wireless emission, the RF threshold power application scenarios, resulting in a waste of most of
(the product of effective output power of wireless emission bandwidth and performance resources [16].
equipment and antenna gain) of wireless emission equipment • At present, there is no optimization strategy for under-
in underground coal mines shall not be greater than 6W. ground application scenarios, such as dynamic resource
Switching the upstream and downstream time slot ratio is allocation strategy, underground edge computing, edge
commonly used to increase the uplink bandwidth. After mod- cache, etc., which leads to the increase of under-
ification, the uplink rate can reach 450Mbps [8], [9], [10]. ground data processing delay and low transmission
efficiency [17], [18].
• The volume and weight of flameproof equipment are
too large to install conveniently, which cannot meet the
application requirements of all underground scenarios.
To solve the problems above, an edge computing resource
allocation method for the mining 5G communication system
is proposed. Based on the mobile edge computing (MEC)
technology of 5G wireless base station and the actual sit-
uation of coal mines, the underground 5G communication
capability is improved by edge caching and dynamic resource
allocation. Under the premise of maintaining the rated power
and transmitting power of the existing base station, the uplink
rate of a single base station can reach 1 Gbps and the downlink
rate can reach 10 Gbps by using edge caching and dynamic
resource allocation technology.
where 0 ≤ µi , N
PN
i=1 µi = 1, 0 ≤ ki ,
P
i=1 ki = 1. MEC be calculated to represent the attributes of the subfile. For
resource allocation is a convex function of variable sum µi files in image format, each frame image or picture is assigned
and ki , so the Lagrangian function of MEC to deal with the the name of the image as a label to construct the feature
total delay problem can be expressed as: vector. For files in document format, IF-IDF method is used
to calculate the feature vector of the document file. Finally,
L (k, µ, β1 , β2 , θ1 , θ2 )
for each subfile ak in the file Fn , it is expressed in the way of
N N
!
X Bxi X attribute feature vector, that is ak = {c1 , c2 , c3 , . . . , cn }.
= + β1 µi − 1
Shannon entropy, also known as information entropy,
g2 2
i=1 µ Hog 1 + 2 i=1
describes the relationship between information and proba-
N N N
!
X X cxi X bility mainly through mathematical formulas in informatics.
− β2i µi + + θ1 ki − 1 Its principle mapped to the resource cache is to calculate
kfs
i=1 i=1 i=1 the probability of the occurrence of each attribute value in
N
X the collection where the user has generated behaviors on the
− θ2i ki (11) file. If the probability value is high, it means the information
i=1 is very large. If the probability value is low, it means the
where θ1 , θ2 = [θ21 , θ22 · · · θ2n ]T , β1 , β2 = [β21 , β22 · · · β2n ]T information is small. By calculating the probability of the
are Lagrange multipliers. If this equation has an optimal solu- attribute value, we can judge the distinguishing ability of
tion ki∗ , µ∗i , it needs to meet the conditions that as follows: the attribute. The calculation formula of Shannon entropy is
described as:
∂L Bi x1
+ = − +2
+ β1 − β2i (12) n
∂µi
gipp
X
µi W log 1 + σ2
H =− Pi × log Pi (19)
∂L ci xi i=1
= − ∗ + θ1 − θ2i (13) In the subfile ak , calculate its probability of all attributes
∂ki∗ ki fss
N
! occurring:
|num (cn )|
X
β1 µi − 1 = 0
∗
(14)
pn = (20)
i=1 m
N
X where, pn denotes the occurrence probability of the attribute
β2i µ∗i = 0 (15) value cn , and num( cn ) denotes the total number of subfiles
i=1 in the attribute set whose attribute value is cn , and m denotes
N
!
X the total number of files.
θ1 ki∗ −1 =0 (16) By calculating the Shannon entropy of each attribute in the
i=1 file, the Shannon entropy of the subfile ak can be obtained by
N
X the following formula:
θ2i ki∗ = 0. (17) n
i=1
X
H (ak ) = − Pi × log Pi (21)
By solving the equation above, the optimal configuration i=1
of spectrum and computing resources can be obtained as The size of the Shannon entropy represents the prevalence
follows: of the subfile. The larger the Shannon entropy is, the higher
√ √
Bi xi Ci xi the popularity will be. The first n subfiles of each file F
µi = PN √
+
, ki = PN √
∗
(18)
i=1 Bi xi i=1 Ci xi
are selected according to the Shannon entropy and stored in
each cache node according to random rules. When users and
III. CACHE ALLOCATION terminal devices obtain file information, they are sent through
If there is an information file in the underground storage each node in parallel, which relieves the pressure on cache
node in the current situation, definite the file as F = nodes and improves the transmission speed.
{a1 , a2 , a3 · · · ak }, where ak is the subfile of each part of the
file. The information in the overall information file F needs to IV. BANDWIDTH ALLOCATION
be sent to different devices and users, so the file needs to be Due to the limitations of the special networking mode and
divided into sub-files and stored in different cache nodes. Not base station design in coal mines, the transmission bandwidth
all the information in the file is needed by the underground allocation between storage nodes and devices is more strict
users and terminals, so it is necessary to divide the popularity and complex. A user-based collaborative filtering algorithm
and interest degree of each subfile, and the Shannon entropy is adopted. User-based collaborative filtering algorithm is
method [21] is used to calculate the popularity division [22]. a recommendation algorithm. The content that a user is
Currently, there are n information files {F1 , F2 , F3 , · · · Fn }, interested in will be recommended to another one based on
and each file is divided into k subfiles. That is Fn = the user‘s similarity. Through the user-based collaborative
{a1 , a2 , a3 · · · ak }. For any subfile ak , its feature vector should filtering algorithm, the underground bandwidth is reasonably
[2] D. Lin, ‘‘5G technology and its application in the seismograph intelli-
gence,’’ IOP Conf. Ser., Earth Environ. Sci., vol. 791, no. 1, Jun. 2021,
Art. no. 012182.
[3] K. Zhang, L. Kang, X. Chen, M. He, C. Zhu, and D. Li, ‘‘A review of
intelligent unmanned mining current situation and development trend,’’
Energies, vol. 15, no. 2, p. 513, Jan. 2022.
[4] Z. Suo, F. Luo, and K. Li, ‘‘Innovative exploration of 5G integrated appli-
cation in coal mining operation,’’ Proc. SPIE, vol. 12332, pp. 207–219,
Sep. 2022.
[5] L. Ma, ‘‘Study on intelligent mine based on the application of 5G wireless
communication system,’’ IOP Conf. Ser., Earth Environ. Sci., vol. 558,
no. 3, Aug. 2020, Art. no. 032050.
[6] X. Xu, D. Li, M. Sun, S. Yang, S. Yu, G. Manogaran, G. Mastorakis,
and C. X. Mavromoustakis, ‘‘Research on key technologies of smart
FIGURE 6. Devices and its uplink and downlink speed. campus teaching platform based on 5G network,’’ IEEE Access, vol. 7,
pp. 20664–20675, 2019.
[7] Q. Zhao, W. Yang, and L. Zhang, ‘‘Energy-efficient resource allocation for
NOMA-based heterogeneous 5G mine Internet of Things,’’ IEEE Access,
13 different devices were tested in this experiment, and the vol. 10, pp. 67437–67450, 2022.
uplink and downlink rates of each different device were [8] B. Zhao, W. Wei, G. Yang, and M. Song, ‘‘Research on the construction
calculated respectively. Through repeated verification of a of intelligent mines based on 5G,’’ Proc. SPIE, vol. 12249, pp. 483–487,
May 2022.
large amount of data, it can be seen that the uplink rate of
[9] X. Wo, G. Li, Y. Sun, J. Li, S. Yang, and H. Hao, ‘‘The changing tendency
the 13 devices ranges from 0.92-1.07 Gbps, and the average and association analysis of intelligent coal mines in China: A policy text
uplink bandwidth is 1 Gbps. The downlink rate ranges from mining study,’’ Sustainability, vol. 14, no. 18, p. 11650, Sep. 2022.
1.44 to 1.55 Gbps, and the average downlink rate is 1.5 Gbps. [10] X. Zhu and X. Qu, ‘‘Research on 5G lightweight core network technology
for vertical industries,’’ in Proc. Int. Wireless Commun. Mobile Comput.
Therefore, the edge caching and dynamic resource allocation (IWCMC), Jun. 2021, pp. 1499–1505.
technologies proposed to enable the uplink rate of a single [11] M. Chen, Y. Miao, H. Gharavi, L. Hu, and I. Humar, ‘‘Intelligent
base station to reach 1 Gbps and the downlink rate to reach traffic adaptive resource allocation for edge computing-based 5G net-
works,’’ IEEE Trans. Cogn. Commun. Netw., vol. 6, no. 2, pp. 499–508,
1.5 Gbps, which can meet the actual production needs in coal Jun. 2020.
mines effectively. [12] K. Zhang, Y. Mao, S. Leng, Q. Zhao, L. Li, X. Peng, L. Pan, S. Maharjan,
and Y. Zhang, ‘‘Energy-efficient offloading for mobile edge computing
in 5G heterogeneous networks,’’ IEEE Access, vol. 4, pp. 5896–5907,
VI. CONCLUSION 2016.
To solve the problems existing in the practical application of [13] C.-F. Liu, M. Bennis, M. Debbah, and H. V. Poor, ‘‘Dynamic task offload-
ing and resource allocation for ultra-reliable low-latency edge computing,’’
mining 5G technology, the resource allocation method based IEEE Trans. Commun., vol. 67, no. 6, pp. 4132–4150, Jun. 2019.
on edge computing is proposed. On the basis of the demand [14] M. Ghaddar, I. Ben Mabrouk, M. Nedil, K. Hettak, and L. Talbi, ‘‘Deter-
for underground large-bandwidth data transmission, the MEC ministic modeling of 5G millimeter-wave communication in an under-
ground mine tunnel,’’ IEEE Access, vol. 7, pp. 116519–116528, 2019.
edge computing technology based on the 5G wireless base [15] G. Wang, G. Zhao, and Y. Hu, ‘‘Application prospect of 5G technology
station side is studied. Edge caching and dynamic resource in coal mine intelligence,’’ J. China Coal Soc., vol. 45, no. 1, pp. 16–23,
allocation are carried out according to the actual situation 2020.
[16] G. A. Akpakwu, B. J. Silva, G. P. Hancke, and A. M. Abu-Mahfouz,
of coal mines to improve the 5G communication capability ‘‘A survey on 5G networks for the Internet of Things: Communication
underground. Under the premise of maintaining the rated technologies and challenges,’’ IEEE Access, vol. 6, pp. 3619–3647, 2017.
power and transmitting power of the existing base station, [17] H. Guo, J. Liu, and J. Lv, ‘‘Toward intelligent task offloading at the edge,’’
IEEE Netw., vol. 34, no. 2, pp. 128–134, Mar. 2020.
the average time delay of tasks executed by the method [18] A. Qin, C. Cai, Q. Wang, Y. Ni, and H. Zhu, ‘‘Game theoretical multi-user
is 15ms when the number of coal-mine devices reaches 50, computation offloading for mobile-edge cloud computing,’’ in Proc. IEEE
with the utilization of edge caching and dynamic resource Conf. Multimedia Inf. Process. Retr. (MIPR), Mar. 2019, pp. 328–332.
[19] C. Jian, J. Chen, J. Ping, and M. Zhang, ‘‘An improved chaotic bat swarm
allocation technology, which is 50% lower than that of the scheduling learning model on edge computing,’’ IEEE Access, vol. 7,
local method and 37.5% lower than that of all MEC execution pp. 58602–58610, 2019.
methods. In terms of transmission, the uplink rate of a single [20] E. Baccour, A. Erbad, A. Mohamed, M. Guizani, and M. Hamdi,
‘‘CE-D2D: Collaborative and popularity-aware proactive chunks caching
base station can reach 1 Gbps and the downlink rate can in edge networks,’’ in Proc. Int. Wireless Commun. Mobile Comput.
reach 1.5 Gbps. The simulation result shows that, compared (IWCMC), Jun. 2020, pp. 1770–1776.
with the sub-optimal algorithm, the proposed method owned [21] C. E. Shannon, ‘‘A mathematical theory of communication,’’ Bell Syst.
Tech. J., vol. 27, no. 3, pp. 379–423, Jul./Oct. 1948.
obvious advantages in improving the reliability of mining
[22] M. Zhao, J.-J. Yu, W.-T. Li, D. Liu, S. Yao, W. Feng, C. She, and T. Q. Quek,
5G communication system, reducing the energy consumption ‘‘Energy-aware task offloading and resource allocation for time-sensitive
of users during task unloading, and improving the algorithm services in mobile edge computing systems,’’ IEEE Trans. Veh. Technol.,
vol. 70, no. 10, pp. 10925–10940, Oct. 2021.
performance under multi-mobile-device conditions.
[23] T. Li, X. Zhu, and X. Liu, ‘‘An end-to-end network slicing algo-
rithm based on deep Q-learning for 5G network,’’ IEEE Access, vol. 8,
REFERENCES pp. 122229–122240, 2020.
[24] Y. Chi, Y. Zhang, Y. Liu, H. Zhu, Z. Zheng, R. Liu, and P. Zhang, ‘‘Deep
[1] G. Wang, H. Ren, G. Zhao, D. Zhang, Z. Wen, L. Meng, and S. Gong, reinforcement learning based edge computing network aided resource
‘‘Research and practice of intelligent coal mine technology systems in allocation algorithm for smart grid,’’ IEEE Access, vol. 11, pp. 6541–6550,
China,’’ Int. J. Coal Sci. Technol., vol. 9, no. 1, pp. 1–17, Dec. 2022. 2023.
LIYA ZHANG (Member, IEEE) received the M.S. ZHIFANG YANG was born in Luoyang, Henan,
degree from the China University of Mining and China, in 1994. He received the master’s degree
Technology, Beijing, in 2012. He is currently from the School of Automation, University
pursuing the Ph.D. degree with the School of of Science and Technology Beijing, China,
Electronic and Information Engineering, Beijing in 2022. He is currently working with CCTEG
Jiaotong University. He is also working as the China Coal Research Institute, studying in the
Chief Expert (second-level) at CCTEG China Coal fields of control science and engineering, deep
Research Institute, China, and the Director of the learning, mining, and industrial intelligence.
Smart Mining Institute. His current research inter- He has published an EI conference as the
ests include coal mine 5G communication, coal first author and participated in the publication
mine safety monitoring systems, and emergency rescue communication. of four SCI papers.
BONAN HAO was born in Tangshan, Hebei, QING ZHAO was born in Tangshan, Hebei, China,
China, in 1993. He received the master’s degree in 1992. She received the master’s degree from
from the China University of Mining and Tech- the Renmin University of China, in 2016. She
nology, Beijing, in 2019. He is currently working is currently working as an Intermediate Engineer
as a Research Assistant with CCTEG China Coal with CCTEG China Coal Research Institute. Her
Research Institute. His research interests include research interests include mine artificial intelli-
mine artificial intelligence, including research gence, including research and technology devel-
and technology development in mining machine opment in mining machine vision, big data, deep
vision, big data, deep learning, and other fields. learning, and other fields.