Computer Network Data Management Model Based on Edge Computing
-
Published:2023-12-02
Issue:
Volume:
Page:
-
ISSN:0218-5393
-
Container-title:International Journal of Reliability, Quality and Safety Engineering
-
language:en
-
Short-container-title:Int. J. Rel. Qual. Saf. Eng.
Author:
Liu Hongxia1ORCID,
Song Lina1ORCID,
Sundarasekar Revathi2ORCID,
Gnana Malar A. Jasmine3ORCID
Affiliation:
1. School of Computer, Heze University, Heze, Shandong 274000, P. R. China
2. Information and Communication Engineering, Anna University, Chennai 600025, Tamil Nadu, India
3. Department of EEE, PSN College Engineering & Technology, Tirunelveli 627152, Tamil Nadu, India
Abstract
Data reliability and confidence in the data are very important issues, especially when the system integrates fraud or false information. The misusing of data collected may create serious problems. With the fast development of computing techniques, much data are collected from various terminals and industrial devices. Edge computing operates by driving data, software and computer resources from the centralized network to its extremes, allowing pieces of knowledge to lie on distributed cloud networks. Its target customers continue to use commercial Internet application software for every internet customer. Edge computing is used to provide delay-free customer experience assistance for features of the Internet of Things (IoT) services on the edge of the user network. The document identifies an IoT computing platform collaborating with the edge competitive data management latency (CDML) tool. This approach separately categorizes edge layer requests and response data over time using demand-density driven optimization. A difference-based optimization optimizes the frame limits for simultaneous request processing and exact allocation of data. The architectural efficiency of edge computing can be assessed by comparing latency, bandwidth usage, and overhead. Furthermore, estimating the availability, credibility and confidentiality of security solutions within each party would take into consideration security concerns in edge computing and propose a safety assessment process for IoT networks with edge computing. This procedure is finally validated using appropriate tests, and the resulting findings are examined to demonstrate the method’s accuracy. Experimental data are used to validate methods to request maintenance and processing, response time, resource utilization and contract period. In comparison to current approaches, the results of the proposed CDML are measured with a percentage of 97.90%. The proposed system enhances the request and response comparison ratio 97.5%, analyzing request performance ratio 98.1%, response with time analysis ratio of 98.3%, data allocation approach analysis ratio 97.7%.
Funder
Research on the Mechanism of Public Opinion and Emotion Communication in Emergency Management of Public Emergencies
Publisher
World Scientific Pub Co Pte Ltd
Subject
Electrical and Electronic Engineering,Industrial and Manufacturing Engineering,Energy Engineering and Power Technology,Aerospace Engineering,Safety, Risk, Reliability and Quality,Nuclear Energy and Engineering,General Computer Science