 Research
 Open Access
 Published:
Emergency demand response in edge computing
EURASIP Journal on Wireless Communications and Networking volume 2020, Article number: 175 (2020)
Abstract
A cloudlet is a smallscale cloud datacenter deployed at the network edge to support mobile applications in proximity with low latency. While an individual cloudlet operates on moderate power, cloudlet clusters are wellsuited candidates for emergency demand response (EDR) scenarios due to substantial electricity consumption and job elasticity: mobile workloads in the edge often exhibit elasticity in their execution. To efficiently carry out edge EDR via cloudlet cluster control, two fundamental problems need to be addressed: how to incentivize the participation of cloudlet clusters and how to schedule and allocate workloads in each cluster to satisfy EDR requirements. We propose a twostage control scheme, consisting of (i) an auction mechanism to motivate clusters’ voluntary energy reduction and select participants with the minimum social cost and (ii) an online task scheduling algorithm for chosen clusters to dispatch workloads to guarantee target EDR power reduction. Using the primaldual optimization theory, we prove that our control scheme is truthful, individually rational, runs in polynomial time, and achieves nearoptimal performance. Largescale simulation studies based on realworld data also confirm the efficiency and superiority of our scheme over stateoftheart algorithms.
Introduction
Cloudlet, in the form of a small datacenter, is a new computing paradigm that extends today’s cloud architecture. As the middle tier of a 3tier hierarchy: mobile or IoT device—cloudlet—cloud, cloudlet is often placed at the edge of the network to provide lowlatency and high bandwidth services for nearby mobile or IoT devices [1]. A cloud service provider often deploys a cluster of cloudlets to serve mobile users, since the computing power of an individual cloudlet is limited. The wide distribution of cloudlets not only increases the edge network’s capacity and coverage but also brings flexibility in workload management [2, 3].
It is quintessential for a power network to be stable and reliable. When an emergency happens (e.g., extreme weather conditions), supply scarcity needs to adjust immediately to avoid involuntary service interruptions [4]. Besides clouds, cloudlet clusters now serve as an important force in emergency demand response (EDR). While individual cloudlet uses a moderate amount of electricity, a cluster of cloudlets consumes substantial electricity. Furthermore, edge computing tasks (e.g., video surveillance and analysis) are often elastic [5]. Hence, the task execution is flexible, which means that a task can tolerate a certain level of delay. The above features make cloudlet clusters well suited to participate in EDR programs to stabilize the power grid by reducing and temporally shifting peak loads. To realize edge EDR via cloudlet cluster control, two fundamental challenges need to be addressed. First, cloudlet clusters are often operated by different service providers at their own cost. How to incentivize them to voluntarily participate in EDR is a challenging problem. An efficient market mechanism must be created to select costconscious participants and reward them accordingly. Second, for a chosen cloudlet cluster which receives task execution requests from mobile users online, the main issue is how to make decisions on accepting/declining tasks and schedule accepted tasks, such that the target energy reduction is satisfied and its utility is maximized?
Many efforts have been made on incentive mechanism design for demand response and task scheduling. However, they cannot be applied to edge EDR directly. Previous work either only focuses on electricity procurement [6, 7] or does not consider the electricity consumption in scheduling algorithm design [8, 9]. More discussions can be found in Section 2. The goal of this work is to design an online control scheme for cloud clusters to participate in EDR. We propose a twostage approach to address the above two problems. We first propose an auction mechanism to stimulate the participation of cloudlet clusters, such that (i) the auction is computationally efficient; (ii) the auction is truthful and individually rational—all participants receive nonnegative and maximum utility by biding their true cost; (iii) the power reduction goal in EDR is met with minimum possible social cost. We then design an online task scheduling algorithm, tailored for a participant cloudlet cluster, to dispatch workloads to guarantee target EDR power consumption. Our algorithm has the following goals: (i) the algorithm is time efficient and makes task admission and scheduling decisions immediately upon the arrival of each task, (ii) the total power consumption in the specified EDR time window plus the local electricity generation can satisfy the EDR requirement, (iii) the utility of the cluster, which is completed tasks’ value minus the cluster’s operation cost, is maximized. Many edgecomputing tasks have flexibility in both placement and job completion time, so their workload can be distributed across different cloudlets. In addition, they allow a certain level of delay, and the task’s value depends on the degree of deadline violation. The operating cost primarily comprises of server maintenance cost and local generation cost. Our contributions are listed as follows:
First, on the first stage of EDR, the smart grid acts as the auctioneer to elicit bids from cloudlet clusters. Each cluster specifies its energy reduction and corresponding remuneration it asks for. We formulate the social cost minimization problem as an integer linear program (ILP), with a constraint to satisfy the EDR reduction target. The problem is proven to be NPhard. To solve the problem, we convert it to an equivalent ILP and adopt the primaldual method to obtain the solution based on its dual problem. We show that our algorithm runs in polynomial time and achieves 2approximation in social cost. We further propose a payment rule to determine winning clusters’ reward, which guarantees truthfulness as well as individual rationality.
Second, we proceed to consider the second stage, where the winning cluster manages its tasks scheduling to satisfy the EDR power consumption requirement. We design an online scheduling algorithm to determine whether a task should be accepted or not, when and where the accepted task should be processed, and the amount of local electricity generation. The cluster’s utility maximization problem is formulated as a convex problem. To eliminate the nonlinear constraints that capture the task’s temporal demand, we introduce a set of new variables for each task to represent feasible schedules. Although the new formulation has an exponential size of variables, we demonstrate that it can be solved in polynomial time. A primaldual method is applied to the new formulation and its dual problem. Two dual variables can be interpreted as the unit workload price and the unit local generation cost, respectively. They are used as the threshold to compute the best schedule with the maximum utility for each task. The proof for feasibility, efficiency, and a good competitive ratio are conducted in our theoretical analysis.
Third, we conduct largescale simulations based on the realworld circumstances. On the first stage of EDR, our algorithm performs better than the theoretical 2approximation worst case, achieving nearly 1.05 in approximation ratio at a 50 clusters scale and 1.025 with 400 clusters. On the second stage of EDR, we also obtain several noticeable results: (i) our algorithm achieves a low competitive ratio (<1.6); (ii) our algorithm beats two benchmark algorithms, a greedy algorithm based on the idea of [10] and a firstcome, firstserved algorithm applying the scheme in [11], in terms of cluster utility, either in different problem scales or time slots; (iii) our algorithm can control the peak usage of electricity and save up to 49.8%, 22.4% of the local generation, compared with other two algorithms, respectively; and (iv) the execution time of our algorithm grows mildly as problem scale increases, proving that our algorithm runs in polynomial time. Through extensive simulations in both theoretical and practical circumstances, we demonstrate the superiority of our method.
In the rest of this paper, we discuss related work in Section 2 and introduce the system model in Section 3. Algorithm designs for the first and second stage of edge EDR are presented in Sections 4 and 5, respectively. Section 6 evaluates the performance of proposed algorithms and Section 7 concludes the paper.
Related work
Demand response and edge EDR. Previous analyses for EDR tend to investigate the mutual impact between service providers and customers [12, 13], without fully considering energy provisioning. A series of recent studies exist on the reduction goal and social welfare maximization in demand response. For instance, in [14], a storageassisted system is considered, with batteries and plugin vehicles helping balance between supply and user demand. Demand response in residential power allocation is investigated by Ma et al. [15], in which two types of electricity applications are analyzed. Sun et al. [16] study an ecofriendly objective for reducing diesel generation. Chen et al. [17] argue that edge computing represents a natural subject of EDR. Their work differs from ours in that they fix the execution time slot of each workload and assume a simplified linear cost for deadline violation; our model is comparatively more practical. There are also several studies on online task allocation in EDR, including [18] and [19]. The former only maximizes the operator’s cost while the latter ignores local generator consumption. Our work presents a general scenario in edge computing where auction and scheduling take place, targeting EDR in the provision of electricity supply and scheduling tasks online with more flexibility.
Datacenter EDR. Existing studies mainly focus on EDR with colocation data centers. Each colocation tenant submits a bid, including its energy reduction and cost, to the operator controller who provisions electricity and other services to them. Ren and Islam [20] are the first to study “split incentive” in a demand response scenario. They propose a mechanism, iCODE, based on a reverse auction. More efforts can be seen in the work of Zhang et al. [6], which designs an efficient truthful mechanism to achieve 2approximation in colocation social cost. Zhou et al. [21] investigate a decentralized method in a geodistributed data center. Zhou et al. [22] and Chen et al. [7] both study the FPTAS auction to design a truthful and energysaving scheme. However, their assumptions of allocation in response to demand are barely offline situations. In our circumstance, the challenge escalates as a series of tasks arrive at the cloudlet stochastically over time.
Online Scheduling. Online scheduling is fundamental in cloud computing, where computing and storage resources are limited for task processing. Zhang et al. [8] propose a primaldual style auction to dynamically allocate tasks into different VMs, in which the time windows of users’ bids are fixed. Subsequently, Zhou et al. [9] develop the compact exponential method to handle hard and soft deadline constraints for job execution, showing more elastic than [8]. Scheduling jobs online is also studied in a general way to suit every aspect of daily life. Specifically, Garg et al. [23] and Devanur et al. [24] study online scheduling jobs on unrelated machines, with the first paying attention to weighted flow time and the latter considering arbitrary power functions of the machine. Their researches share a primaldual based framework with our model, but their problems are different from ours. Agrawal et al. [25] introduce a general version to solve online problems with a concave objective and convex constraints. However, they assume the inputs are independent and identically distributed. We study edge computing, targeting not only truthfulness and efficiency for the online mechanism appeared in cloud computing, but also the flexibility to schedule tasks in heterogeneous clusters.
System model
System overview
We consider a community where a smart grid provisions electricity to multiple heterogeneous cloudlet clusters. Each cluster signs a contract with the grid, specifying the electricity demand in a certain time period and the corresponding payment. While the grid is only in charge of power supply, the cloudlet cluster is responsible for their own operation, i.e., considering how to schedule computing tasks, such that its utility is maximized under limited energy. Let [X] denote the integer set \(\{1, 2,\dots, X\}\). The cloudlet clusters are denoted as \([I]=\{1, 2,\dots, I\}\). Cluster i consists of heterogeneous cloudlets, denoted by \([L_{i}]=\{1, 2,\dots, L_{i}\}\), ∀i∈[I]. A set of tasks \([J_{i}]=\{1, 2,\dots, J_{i}\}\), ∀i∈[I] run in cluster i where they reside, receiving their workloads at end users via access points and transmitting them to the particular service providers.
Emergency demand response via cloudlet clusters
EDR process. According to an agreement signed by the cloudlet operators and the smart grid, when an emergency event takes place, the smart grid acts as an auctioneer and sends signals to cloudlet clusters in the community to specify the total energy reduction target E_{all} in the following T time slots. In response, each cloudlet cluster voluntarily submits a bid. Recently, in edge computing, the tasks are mainly involved with video surveillance, whose power consumption usually varies little [26]. Based on records in the past, the clusters estimate an energy reduction when the emergency takes place. Cluster i submits a bid (c_{i},E_{i}), where E_{i} is the amount of power consumption it is willing to shed and c_{i} is the corresponding remuneration asked for. After receiving bids from cloudlet clusters, the smart grid determines which clusters are chosen for the EDR, as well as how much it should pay for the selected clusters. Figure 1 illustrates the first stage in the EDR event.
EDR decision variable. We introduce a binary variable z_{i} for each bid. If z_{i}=1, the bid submitted by cluster i is successfully chosen for EDR and earns a reward P_{i} from the grid; otherwise, the bid is not selected for EDR.
Truthful auction. Let v_{i} denote the true cost of E_{i}. v_{i} can be obtained from the previous data, usually proportional to the workload and duration. P_{i} is the reward for winning the bid in EDR. Cluster i’s utility with bidding price c_{i} is:
Each cluster is assumed to be selfish yet rational and aims to maximize its own utility. Cluster i may lie about its cost, i.e., c_{i}≠v_{i}, if doing so leads to a higher utility. Since our goal is to minimize the social cost of the community, it is important to elicit truthful bids from clusters.
Definition 1
(Truthful auction): An auction is a truthful auction if for any cluster i, its dominant strategy is to bid with its true cost, and its utility is maximized, i.e., u_{i}(v_{i})≥u_{i}(c_{i}),∀c_{i}≠v_{i}.
Definition 2
(Individual rationality): Clusters always obtain nonnegative utility, i.e., u_{i}(c_{i})≥0.
Definition 3
(Social welfare, social cost): The social welfare is the sum of the grid’s utility \(\sum _{i\in [I]}P_{i}\) and clusters’ utility \(\sum _{i\in [I]}(P_{i}v_{i}z)\). Maximizing the social welfare is equivalent to minimizing the social cost \(\sum _{i \in [I]}v_{i}z_{i}\), since payments cancel themselves.
EDR problem formulation. Our goal is to minimize the social cost in the community while ensuring the total reduction meets the EDR requirement E_{all}. The social cost minimization problem under truthful bidding (c_{i}=v_{i}) can be formulated into the following integer linear program (ILP):
subject to:
Scheduling in cloudlet clusters
Computing task information. Assume that cluster i is chosen at EDR, where a total number of L_{i} cloudlets are in the cluster. Each cloudlet l∈[L_{i}] can process at most R_{l} workloads. Let [J_{i}] denote the task set for i. Each task j in [J_{i}] is expressed by a tuple: Γ_{ij}={b_{ij},a_{ij},d_{ij},w_{ij},λ_{ij},f_{ij}(τ_{ij})}, where b_{ij} is the value of task j if it completes before its deadline. a_{ij} and d_{ij} are the arrival time and the deadline for task j, w_{ij} is the total number of time slots required to complete the task. We assume that the deadline for each task should be no longer than the end of the EDR period; otherwise, auctions must be executed again for those tasks. The workload in one time slot is λ_{ij}, so the total workload of task j is w_{ij}λ_{ij}. τ_{ij} refers to the level of deadline violation, whose penalty function is denoted by f_{ij}(τ_{ij}). \(f_{c_{ij}}(\tau _{ij})\) is a piecewise function of f_{ij}(τ_{ij}),f_{ij}(τ_{ij}) is a nondecreasing function, and f_{ij}(0)=0, defined as:
Decision variable. As shown in Fig. 2, in the second stage, every cloudlet cluster operates individually and schedules computing tasks to satisfy EDR energy consumption. For simplicity, we omit i in the element of the tuple for cluster i. We introduce two additional binaries, x_{ij} and y_{ijl}(t), to indicate whether task j in cluster i is scheduled and whether task j is scheduled at cloudlet l at time slot t. Important notations are summarized in Table 1 for ease of reference.
Problem formulation. Cluster i aims to maximize its own utility, i.e., the sum of its reward and value minus the sum of the delay penalty, local generation cost, and maintenance cost. The objective is to maximize \(P_{i}+\sum _{j\in [J]}b_{ij}x_{ij}\sum _{j \in [J] }f_{ij}(\tau _{ij}){pu}_{g} \theta _{i}\), where P_{i} indicates its reward, θ_{i} is its maintenance cost. Since P_{i} and θ_{i} are constants, we can omit them for simplicity in our integer program. p is the perunit local generation cost, and u_{g} is the amount of local generation. The optimization problem is formulated as follows:
In the above problem, \(e_{l}^{t}\) denotes the electricity consumption of cloudlet l at time slot t. An empirical study on cloudlet [27] formulates the energy consumption through a linear function: \(e^{t}_{l} = \left (N_{l} P_{idle}^{l} +\left (P_{peak}^{l}P_{idle}^{l}\right)\sum _{j \in J}\lambda _{ij}y_{ijl}(t)\right) \cdot {\text {PUE}}_{l}\), where N_{l} represents the number of running servers in cloudlet l. P_{idle} is the power consumption when the server is idle and P_{peak} is the sever power when the cloudlet is fully utilized. \(\sum _{j \in J}\lambda _{ij}y_{ijl}(t)\) is the amount of workload. PUE_{l}, the power usage efficiency ratio, is determined by statistical records of the ratio between the datacenter facility power and computational consumption. Next, since the EDR requires the chosen cloudlet cluster to reduce E_{i} electricity, its expected power consumption is the original demand minus the EDR requirement, D−E.
Constraint (4a) guarantees that in each time slot, the cloudlet l has enough computing resource to execute tasks. Constraint (4b) ensures that the total power consumption does not exceed the sum of the EDR requirement and local generation. For any possible tasks to be scheduled, they should run between the arrival time and the deadline, which is described by (4c). Additionally, in (4d), we assume that each task runs on one cloudlet at most. Constraint (4e) connects two binary variables, x_{ij} and y_{ijl}(t), to guarantee sufficient execution.
Challenges. We notice that the first ILP (2) is the classical knapsack problem. The challenge escalates as we need to ensure truthfulness and individual rationality in the auction design. For the second problem (4), if we let u_{g}=0 and τ_{ij}=0,∀j∈J, as well as ignore (4c), it becomes a knapsack problem. It is known to be NPhard, let alone the difficulties concerning online scheduling. In Section 4, we propose a 2approximation algorithm based on the primaldual method to select winning clusters and compute payments for EDR event. In Section 5, we propose an online algorithm to schedule tasks while satisfying EDR requirement in the winners.
Methods for EDR auction mechanism
In Section 4.1, we propose an efficient algorithm to determine the winners and calculate payments in the first stage of EDR event. We analyze its performance in Section 4.2.
EDR auction design
In the winner determination process, we introduce a set of inequalities [28] and reformulate ILP (2) to obtain an approximate solution. Consider a set of cloudlet clusters S, i.e., S⊂[I], we denote \(\Delta (S) = E_{all}  \sum _{i \in S}E_{i}\) as the remaining electricity reduction goal when all bids in S are accepted. Furthermore, we define a variable, E_{i}(S), to represent how a bid excluded from S can fill the gap between E_{all} and Δ(S), i.e., E_{i}(S)= min{E_{i},Δ(S)}. We reformulate ILP (2) into:
subject to:
Constraint (5a) states that when S⊂[I] is chosen, we enumerate all possible items in the rest of the set, [I]∖S, to cover the EDR target. It can be seen that all feasible integer solutions in ILP (2) are feasible in (5) and vice versa. Therefore, the two ILPs have equivalent optimal solutions. Next, we introduce dual variable m(S) to constraint (5a) and formulate the dual of (5) as:
subject to:
Based on the primaldual method, when the i^{∗}th constraint (6a) becomes tight, \(\phantom {\dot {i}\!}z_{i^{*}}\) in (5) is larger than 0. Due to the intrinsic 0−1 nature, z_{i} will be automatically adjusted to 1. The basic idea is we initialize an empty set \(\mathcal {R}\) to represent the accepted bid in accumulation and then gradually increase the value of dual variables, m(S), to reach the energy reduction objective in the aggregated accepted bids. In each round, we add one cluster to the set \(\mathcal {R}\) until no more clusters are left or the EDR target is successfully achieved.
AMEDR aims to tighten the constraints (6a) so that the corresponding cluster is selected and its indicated variable is set to 1. First, we initialize all primal and dual variables in line 1. Line 2 states that the algorithm terminates only when the EDR demand is met. We increase the dual variable until one of the dual constraints is tight, as is shown in line 3. After calculating the minimum required value of the dual variable m(S), the corresponding cluster i^{∗} is selected, added to \(\mathcal {R}\) in lines 3–4. Next, we design a payment rule to ensure truthfulness in lines 5–9. By picking the second smallest value, \(m(\widetilde {\mathcal {R}})\) from all m(S), we find the critical bid and compute the payment based on it. Then, cost values are updated in line 10. Finally, the winner set \(\widehat {S}\) and their payments are found. Although many other auction mechanisms have been designed for such problems, our method has nice properties which are listed as follows.
Theoretical analysis
Correctness and polynomial time
Lemma 1
ILP (2) is equivalent to ILP (5).
All missing proofs can be found in the Appendix.
Theorem 1
AMEDR produces a feasible solution for ILP (2) (5) and dual LP (6).
Theorem 2
AMEDR runs in polynomial time.
Approximation ratio
Definition 4
: Let the social cost calculated by AMEDR be SC and the optimal objective value of ILP (2) be OPT. The approximation ratio is the upper bound ratio of SC to OPT.
Theorem 3
The approximation ratio of AMEDR is 2.
Proof
The primal problems (2) (5) have equivalent optimal value, OPT, with the dual problems (6). AMEDR terminates only when \(\Delta (\mathcal {R}) \leq 0\). The last cluster picked by the algorithm is denoted as i_{n}, so we have \(\Delta (\widehat {S} \backslash i_{n}) > 0\).
Since every i in \(\widehat {S} \backslash i_{n}\) has a tight constraint in (6a), we reformulate the social cost among such items into:\(\sum _{i \in \widehat {S}} \sum _{\substack {\forall S \subset [I] :i \subset [I]\backslash S, \Delta (S) > 0}}E_{i}(S)m(S).\) However, due to the initialization, the nonnegative variables m(S) remains zero unless \(S \subset \widehat {S} \backslash i_{n}\). The equality above is simplified as \(\sum _{S \subset \widehat {S}}m(S)\sum _{i \in \widehat {S} \backslash S'}E_{i}(S').\) We further transform \(\sum _{i \in \widehat {S} \backslash S}E_{i}(S)\) into \(\sum _{i \in \widehat {S} \backslash S}E_{i}(S)=\sum _{i \in \widehat {S} \backslash i_{n}}E_{i}\sum _{i \in S}E_{i} + E_{i_{n}}(S)\), which is smaller than \(E_{all} \sum _{i \in S}E_{i} + E_{i_{n}}(S)\). Moreover, it is no larger than 2Δ(S). Since \(\Delta (\widehat {S} \backslash i_{n}) > 0\) holds, \(SC \leq 2\sum _{S' \subset \widehat {S}}m(S)\Delta (S) \leq 2OPT\), ensuring that the approximation ratio is 2. □
Truthfulness and individual rationality
Theorem 4
An auction mechanism is truthful if [29, 30]: (i) as the costs submitted by clusters decrease, and z_{i} is nondecreasing in its value; (ii) the winning bid payment is critical.
Lemma 2
Algorithm AMEDR is bidmonotonic: if cluster i^{∗} submits an alternative cost \(c_{\tilde {i}}\) subject to \(\phantom {\dot {i}\!}c_{\tilde {i}} < c_{i^{*}}\) and \(\phantom {\dot {i}\!}z_{i^{*}}=1\), then \(z_{\tilde {i}}=1\).
Lemma 3
The payment design in AMEDR is critical: the cost \(\phantom {\dot {i}\!}c_{i^{*}}\) submitted by winning bid i^{∗} should be not larger than the payment \(\phantom {\dot {i}\!}P_{i^{*}}\). If i^{∗} bids \(\phantom {\dot {i}\!}c_{i^{*}}\) which is larger than \(\phantom {\dot {i}\!}P_{i^{*}}, i^{*}\) will fail in the auction.
Theorem 5
AMEDR is a truthful auction.
Proof
By combining Lemma 2, 3 and the definition in Theorem 4, we finish the proof. □
Theorem 6
Algorithm AMEDR ensures individual rationality in each successful bid: the payments for bids are at least the cost of them.
Proof
Lemma 3 guarantees that any bid that violates P_{i}<c_{i} cannot be chosen to win, and therefore, individual rationality holds during the auction. □
Methods for online task scheduling
In the second stage of EDR event, supposing cluster i is selected, a primaldual algorithm is proposed to schedule tasks in Section 5.1. The theoretical analysis is presented in Section 5.2.
Online scheduling design
Reformulation. We consider how to schedule tasks in the chosen cloudlet cluster i. To deal with nonconventional scheduling constraints in (4c) and (4e), we reformulate (4) into an equivalent convex problem. Though the new formulation is packed with an exponential number of variables, it greatly simplifies the subsequent algorithm design. The new problem is formulated as follows:
subject to:
In the above program, ζ_{ij} is the set of all feasible schedules for task j. A feasible schedule is a vector h=(x_{ij},{y_{ijl}(t)}_{∀l∈[L],∀t∈[T]},τ_{ij}) that satisfies constraints (4c) and (4e). Binary variable, χ_{ijh}, indicates whether task j is accepted and scheduled according to schedule h (χ_{ijh}=1) or not (χ_{ijh}=0). bijh′ is the task value based on schedule h, i.e., bijh′=b_{ij}−f_{ij}(τ_{ij}). T(h) and L(h) are the set of time slots and cloudlets indicating when and where task j is running based on schedule h. g(u) is the local generation cost of cluster i. We let \(D'=D  ET(\sum _{l \in [L]} N_{l} P_{idle}^{l})\cdot {\text {PUE}}_{l}\) and u=D^{′}+u_{g}. g(u) can be defined as a piecewise function as follows:
g(u) indicates the energy consumption either below or above the EDR cap. We simplify the LHS of (4b), and let \(\beta _{l}=(P_{peak}^{l}P_{idle}^{l})\cdot {\text {PUE}}_{l}\). Constraints (7a) and (7b) are equivalent to (4a) and (4b).
Though we reformulate the problem into a packing structure, many challenges are still ahead of us. A primaldual technique can be applied to solve the problem in polynomial time. By introducing dual variables Z_{l}(t),C and ϕ_{ij}, as well as relaxing χ_{ijh}∈{0,1} to χ_{ijh}≥0, the dual of the primal problem is:
subject to:
where g^{∗}(C) is the Fenchel conjugate [31] of the function g(u):
Allocation and scheduling. Based on the idea of complementary slackness [32], each χ_{ijh} has a corresponding constraint in (8a). Only when the constraint goes tight, can χ_{ijh} be updated to 1. In that case, we automatically assign 1 to x_{ij} and {y_{ijl}(t)}_{l∈L(h),t∈T(h)} before we renew dual variables ϕ_{ij},Z_{l}(t) and C. Since ϕ_{ij} in dual constraint is nonnegative, we assign ϕ_{ij} as the maximum value between 0 and the RHS of (8a):
When ϕ_{ij}>0, dual constraint (8a) holds tight so that the related primal variable χ_{ijh}>0. In this case, task j is accepted, and h is the corresponding schedule for j. Otherwise, if \(\forall h \in \zeta _{ij}, \phi _{ij}=0, b_{ijh}'\sum _{l \in L(h)}\sum _{t \in T(h)}Z_{l}(t)\lambda _{ij} \sum _{l \in L(h)}\sum _{t \in T(h)} C\beta _{l} \lambda _{ij}\leq 0\), this task is rejected.
The reason can be explained as follows: If we interpret Z_{l}(t) as the per unit workload per unit time slot price for cloudlet l, and C as the per unit local generation cost, then the RHS of (8a) is the utility of task j. Therefore, when ϕ_{ij}>0, the utility of task j becomes positive so that the cluster is willing to process it. Note here C=0 when the task does not exceed the EDR cap; otherwise, C=p. p is the local generation cost per unit. If there is a delay in the task completion, bijh′ should contain the penalty expense; otherwise, bijh′=b_{ij}. When the value of the RHS of (9) is 0, the task is rejected. Equality (9) determines the cloudlets and slots to schedule tasks for the maximum utility, which is a key to the utility maximization.
We next discuss the update of Z_{l}(t). It is natural to think that as computing resource in a cloudlet decreases, the cluster may be reluctant to allocate more workload to this cloudlet. We develop a cost function for the cloudlet to reduce the possibility of accepting a task when it is almost fully occupied. The cost function is:
Where Z_{l}(t) starts at \(\frac {N}{e \sigma }\) and grows exponentially with the increase of R_{l}(t). N refers to the minimum value per unit workload per unit slot, and \(\sigma =\frac {T}{\min _{j} \{w_{ij}\}}\). By the time l is fully utilized, Z_{l}(t) is close to M, the maximum value per unit workload per unit slot. More specifically, \(N=\min _{j \in [J]}\frac {b_{ij}}{w_{ij} \lambda _{ij}}, M=\max _{j \in [J]}\frac {b_{ij}}{w_{ij} \lambda _{ij}}\).
For task j, given Z_{l}(t) and C, the key step is to find the best schedule that maximizes task j’s utility. The scheduling algorithm works as follows: upon the arrival of task j, we firstly fix the schedule between [a_{ij},T]. Since the original value of each task before the deadline is constant, we manage to calculate the resource consumption and energy expense in each plausible cloudlet and time slot. Then, in every situation, we fix the last time slot in order to find the minimal cost of the former (w_{ij}−1) slots. After adding the sum to the cost of the last time slot, we calculate the RHS of constraint (8a) and select the most economical one. Finally, we figure out the utility of task j according to (9) in each slot. We reject j if ϕ_{ij}=0; otherwise, j is accepted and we output the optimal schedule of task j.
Online scheduling algorithm. The online schedule algorithm PD for workload allocation in EDR is demonstrated in Algorithm 2. We input the needed variables for every cluster chosen by Algorithm 1. Initially, in line 1, all binary variables should be 0. Lines 2–8 call CORE in algorithm 3 and schedule each arriving task in the cluster. CORE computes x_{ij} and y_{ijl}(t) for each task while also updating dual variables Z_{l}(t), with estimated M, N values by former data. In CORE, upon the arrival of task j, we make initialization in line 1 and add all possible tuple (t,l) in line 2. Lines 3–8 compute the cost per time slot in the feasible set. Local generation cost is added if and only if processing task j exceeds the EDR cap. Then, we choose the cloudlets with minimum costs in each time slot to be the candidates for the schedule in line 9. In line 10, we mark the w_{ij}th slot. Lines 11–17 work as follows: by fixing the last slot for processing the task, the minimum cost of previous w_{ij}−1 slots should be picked up. When the completion time t^{′} violates the deadline, value for the task is diminished. Line 18 computes each possible utility and line 19 finds the max one. Lines 20–25 update binary and dual variables. If the previously selected utility is larger than 0, we accept the task and update cloudlet costs, amount of allocated resource, x_{ij} and {y_{ijl}(t)}; otherwise, no change is made.
Theoretical analysis of online task scheduling
Correctness and polynomial time
Theorem 7
The Algorithm PD computes a feasible solution for problems in (4) (7) and (8).
Theorem 8
PD runs in polynomial time.
Competitive ratio
The competitive ratio is defined as the upper bound ratio of the optimal objective value of (4) to the objective value achieved by PD. In reality, the ratio is always larger than 1.
We use OPT_{1} and OPT_{2} to denote the optimal objective values of (4) and (7). The equivalence between the two program indicates OPT_{1}=OPT_{2}. Let P^{0}=0 and \(D^{0}=\sum _{l}\sum _{t} \frac {N}{e \sigma } R_{l}\) be the beginning primal and dual values. We assign different values to P^{j} and D^{j} in the accumulation process, until the algorithm finishes the tasks allocation by achieving P^{J} and D^{J}.
Lemma 4
If one constant value α exists, such that (i) \(P^{j}P^{j1} \geq \frac {1}{\alpha }(D^{j}D^{j1}), \forall j \in [J]\), ii) \(P^{0}=0, D^{0} \leq \frac {OPT_{2}}{e}\), the algorithm obtains \(\frac {e}{e1}\alpha \)competitive.
Lemma 5
D_{0} in PD is at most \(\frac {OPT_{2}}{e}\) under the condition that the optimal objective value of (4) is at least \(\sum _{l} \frac {TN}{\sigma } R_{l}\).
Definition 5
The allocationutility relationship for PD with a parameter α is \(\lambda _{ij} Z_{l}^{j}(t) \geq \frac {1} {\alpha } R_{l} (Z_{l}^{j} (t) Z_{l}^{j1}(t)), \forall j \in [J],\forall l \in [L], \forall t \in [T]\).
Lemma 6
The allocationutility relationship with α guarantees:
Lemma 7
If α ensures the allocationutility relationship for PD, then \(P^{j}P^{j1}\geq \frac {1}{\alpha }(D^{j}D^{j1}), \forall j \in [J]\).
We posit that the resource consumption of the workload is much less than the existing resource capacity, which is λ_{ij}≪R_{l},∀j,∀l. As a result, the differential dZ_{l}(t) equals \(Z_{l}^{j}(t)Z_{l}^{j1}(t)\). The adaptation of allocationutility relationship is interpreted in the version:
Definition 6
The allocationutility relationship in a differential version with α is \(\lambda _{ij} Z_{l}^{j}(t) \geq \frac {1} {\alpha } R_{l} \text {d}Z_{l}(t), \forall j \in [J],\forall l \in [L], \forall t \in [T]\).
Lemma 8
We let \(\alpha _{ij} =\frac {1}{\lambda _{ij}} \left (\ln \left (\frac {\sigma M}{N}\right)+1\right)\), and it satisfies \(\lambda _{ij} Z_{l}^{j}(t) \geq \frac {1} {\alpha _{ij}} \left (R_{l}(Z_{l}^{j} (t)Z_{l}^{j1}(t)) \right)\) for task j.
Proof
According to our function,
For any j, we can find an α_{ij} holds the inequality such that \(\alpha _{ij}=\frac {R_{l} \text {d}Z_{l}(t)}{\lambda _{ij} Z_{l}^{j}(t)}=\frac {1}{\lambda _{ij}} \left (\ln \left (\frac {\sigma M}{N}\right)+1\right)\) □
Theorem 9
With \(\alpha =\max _{j \in [J]}\{\frac {1}{\lambda _{ij}} \left (\ln \left (\frac {\sigma M}{N}\right)+1\right)\}\), the task scheduling algorithm PD is \(\frac {e}{e1}\alpha \)competitive.
Proof
Combining Lemma 4–8 and the definition of allocationutility relationship, we can figure out the competitive ratio for all tasks in [J], and hence, the proof is completed. □
Performance evaluation
Experiment setup
To simulate the whole edge system, we collect realworld data about EDR. According to a real EDR event happening in New York on August 28, 2018, which lasted for 6 h [33]. Besides, the real field tests show that the EDR energy reduction rate under 25% would be tolerable for a data center to sustain the normal operation [34]. As for cloudlet, it is a smallscale cloud data center with 1–40 servers [35]. In this case, the typical PUE value is around 2.1 [36]. As for the strike price for the EDR event, mostly it is around $1100 to $1800 per MWh [37]. The EDR dispatch rate (i.e., the percentage of the number of clusters to engage in EDR event) is around 58% [38]. The idle power for each server is 60 w, and the peak power is 180 w [39]. The diesel price for local generation is set to 0.32$/kWh [40, 41].
We use the data stated above to construct our simulations. We assume that on average, a cloudlet should have a PUE of 2.2 and contain 20 servers. And the overall energycutting rate (i.e., the demand for energy reduction in the EDR event) is 25% with a 6h duration. We randomly scale the number of servers for each cloudlet from 16 to 20 and the PUE value from 1.9 to 2.5. In the experiment setting, one cluster contains 15 distributed cloudlets and is capable of executing 40 tasks. We set the length of one time slot into 10 min and divide the whole EDR process into 36 time slots. We randomly generate each cluster’s bidding price based on the cutting energy amount and the unit price. The original power for one cluster is estimated to be 600 kWh according to the number and power of servers and cloudlets. In the aspect of tasks, we randomly generate the workload from 0.4x to 1.0x toward normalized 20 servers. We use the Poisson distribution to randomly set each task’s arriving time and randomly generate the deadline before the EDR ends. The value of a task is proportional to its workload and the number of time slots required. We set M to be the upper bound of unit price, and N to be the lower bound because we randomly generate the unit price of each task from 0.01$ to 0.04$.
To deal with the objective value of integer programming (4), we use the MINLP solver SCIP [42] to obtain the offline optimal solution. We find the average acceptance rate is higher than 95% without using any local power generation, indicating that our experiment setting is suitable to simulate the realworld scenario.
Results and discussion
We consider several indexes to evaluate our algorithm: total social cost and approximation ratio on the first stage, and cluster utility, competitive ratio, and task acceptance rate on the second stage. Specifically, we compare four different approaches: (i) Greedy algorithm, which is based on [10], and always executes the maximum value task first in order to get optimal value; (ii) firstcome, firstserved (FCFS) algorithm, which always lets the earlyarriving task schedules first and cannot be preempted by a later task [11]; (iii) Optimum programming, which returns the optimal offline solution; and (iv) mixedinteger programming (MIP), with PD on the second stage, which gets the optimal solution until current slot.
Performance of AMEDR. Figure 3a shows the trend of approximation ratio under different energycutting rates. Here, we fix the EDR dispatch rate to 60%, we can see that the ratio of AMEDR tends to converge to 1.025. This result in practice is much better than the theoretical bound. Figure 3b reflects the same result when we adjust the EDR dispatch rate. These simulations demonstrate that AMEDR has a closetooptimal performance, especially with a large number of clusters.
Performance of PD. Firstly, we have to consider the influence of setting different M and N, the maximum and the minimum value per unit workload per unit slot, on the performance of PD. In Fig. 4a, suppose we already know all the task information and try to vary this ratio to 0.5x, 1.0x, and 1.5x. The simulation result indicates that this ratio only slightly influences the optimal value. Besides, in the simulation, this figure also reflects that competitive ratio is likely to increase as the number of tasks rises.
Figure 4b is the comparison between three online algorithms. We implement two benchmark algorithms, the Greedy algorithm and the FCFS algorithm. Figure 4c modifies the EDR duration time. We can find that the performance of PD is better than the greedy algorithm and the FCFS algorithm. Both algorithms do not take the task’s elastic deadline into consideration, so they will reject some of the tasks. PD performs better because it looks for flexible scheduling.
We change the energycutting rate to evaluate our algorithm in a relatively extreme situation. In Fig. 4c, we can see that the cluster’s utility decreases because we do not have enough power to execute all the tasks, or we have to pay the local generation cost for power replenishment. However, PD still beats the other two algorithms as well, because PD includes local generation cost if we have to replenish electricity and compare this cost with the task’s utility. This utility measurement can avoid consuming power to execute lowvalue tasks.
In Fig. 4e, we assign different weights to the penalty function and analyze sensitivity. We find the weight of the penalty function can influence the acceptance rate. This means PD rejects the task if the delay penalty is too heavy. As for the greedy algorithm or the FCFS algorithm, they do not consider this condition but finish the task before the deadline. However, this attribute is useful in an extreme condition with substantial worthless tasks to execute. We assume there are enough cloudlets to finish all the tasks. Hence, the differences are slight in the figure.
Figure 4f shows the electricity usage of different algorithms at each slot. We find that all algorithms perform well at low computation time, but PD can schedule tasks more efficiently at peak computation time. The local electricity usage of PD is 49.8%, 22.4% lower than the greedy algorithm, FCFS algorithm respectively, nearly close to the optimum. In this case, PD is more ecofriendly, compared with other algorithms.
Conclusion
In this work, we study how to enable edge emergency demand response via cloudlet clusters control. To address challenges in incentive mechanism design and task scheduling at participant cloudlet cluster, we propose a two stage control mechanism to facilitate edge EDR. In the first stage, a reverse auction, AMEDR, is proposed to select costefficient clusters and provide monetary remuneration to winners based on their energy reduction. We prove that AMEDR is computationally efficient, truthful, individual rational, and achieves 2approximation in social cost. In the second stage, we design an online primaldual algorithm, PD, for chosen cluster to schedule and allocate its workload while satisfy EDR energy reduction requirement. PD runs in polynomial time and achieves a provable competitive ratio. We conduct largescale simulations to verify the efficiency and advantages of our method over existing methods.
Appendix
Appendix A: Proof of Lemma 1
Proof
We first demonstrate that a feasible solution to (5) also satisfies the constraint of (2), via proof of contradiction. Let S^{∗} denote the set of variables that equal 1 in a feasible solution to ILP (5), i.e., z_{i}=1iff. i∈S^{∗}. Then, we transform (2a) into \(\sum _{i \in [S^{*}]} E_{i} \geq E_{all}\) and (5a) into \(\sum _{i \in S^{*} \cap ([I] \backslash S)} E_{i}(S) \geq \Delta (S), \forall S \subset [I] : \Delta (S) > 0.\) Assume that this solution is not feasible to (2), \(\sum _{i \in [S^{*}]} E_{i} < E_{all}\), which is equivalent to Δ(S^{∗})>0. Thus, we have \(\sum _{i \in S^{*} \cap ([I] \backslash S^{*})} E_{i}(S) \geq \Delta (S^{*})\). Since the lefthand side (LHS) of this inequality equals zero and the righthand side (RHS) is greater than 0, we reach a contradiction. As a result, an arbitrary solution to (5) is also feasible to (2). Here, we omit the proof of the reverse that all the feasible solutions to ILP (2) are also feasible to (5), which can also be deducted by proof of contradiction. Since ILP (2) and (5) share the same set of solution as well as objective value, they are equivalent. □
Appendix B: Proof of Theorem 1
Proof
(primal feasibility) Algorithm 1 stops at \(\Delta (\mathcal {R})\leq 0\), which suggests \(E_{all}\sum _{i \in \mathcal {R}}E_{i}\leq 0\). If we set all \(z_{i}, i \in \mathcal {R}\) to 1, otherwise to 0, constraint (2a) is satisfied. Therefore, the feasibility in ILP (2) is proved. Combining Lemma 1, Algorithm 1 guarantees feasibility in both primal problems.
(Dual feasibility) Consider the situation that cluster i is chosen in a loop. Since \(\mathcal {R}\) contains i, the update in the following loop will not change the variable in the previous loop and the constraints are not violated. As the number of tight constraints increases with \(\mathcal {R}\) accumulating, no constraints in (6a) are violated. □
Appendix C: Proof of Therorem 2
Proof
The While loop in line 2 iterates at most I times because only one winner i∈[I] is added into the winner set \(\widehat {S}\) at a time as long as the previous winners are not able to meet the whole EDR requirement. In each loop, calculations are performed at most O(I) times in the minimum value selection and the assignments of \(\phantom {\dot {i}\!}z_{i^{*}}, \mathcal {R}, [I]\) and \(\phantom {\dot {i}\!}c_{i^{*}}\). After adding all the running time together, we obtain O(I^{2}) in overall computation complexity. □
Appendix D: Proof of Lemma 2
Proof
The chosen bid i^{∗} has the minimum value for \(\phantom {\dot {i}\!}\frac {c_{i}}{E_{i}(S_{i^{*}})},i \in [I] \backslash S_{i^{*}}\). As \(\phantom {\dot {i}\!}c_{\tilde {i}} < c_{i^{*}}\), two inequalities \(\phantom {\dot {i}\!}\frac {c_{\tilde {i}}}{E_{\tilde {i}}(S_{i^{*}})}<\frac {c_{i^{*}}}{E_{i^{*}}(S_{i^{*}})}\) and \(\phantom {\dot {i}\!}\frac {c_{\tilde {i}}}{E_{\tilde {i}}(S_{i^{*}})}< m(\widetilde {S_{i}})\) hold true. Therefore, \(i^{*}=\mathop {\arg \min }_{i \in [I]}\{\frac {c_{i}}{E_{i}(\mathcal {R})}\}\). It can be seen that i^{∗} is also selected in the auction. □
Appendix E: Proof of Lemma 3
Proof
From lines 7–8 in AMEDR, we can deduce that \(m(\widetilde {S_{i}})\) is the smallest value of \(\phantom {\dot {i}\!}\frac {c_{i}}{E_{i}(S_{i^{*}})}, \forall i \in [I]\backslash (S_{i^{*}}\cup i^{*})\). However, when we assume \(\phantom {\dot {i}\!}\exists i^{*}, P_{i^{*}} < c_{i^{*}}\), we have \(\phantom {\dot {i}\!}m(\widetilde {S_{i}}) < m(S_{i^{*}})\) according to line 9. In this case, cluster \(\tilde {i}\) should be selected as the winning bid, and cluster i^{∗} fails to earn the payment. □
Appendix F: Proof of Theorem 7
Proof
To begin with, in Algorithm 3, line 2 provides feasible pairs of (t,l) in (4a). Constraint (4b) is guaranteed by line 3–8 in CORE, since we only utilize local generation cost when the consumption exceeds EDR cap. For each task j to be executed, we only add the time slots to the feasible set H if they are no earlier than a_{ij}, and based on line 11, we make it a rule that the w_{ij}−1 task slots are scheduled between a_{ij} and a_{ij}+τ_{ij}, which is described in (4c). (4d) mentions that in each time slot, the working cloudlet for task j is at most 1, a selfevident theory shown in line 9. Line 1 and 23 in CORE represent that x_{ij} and y_{ijl}(t) are binary, and the sum of y_{ijl}(t) is 0 or w_{ij}, satisfying (4e) (4f) (4g). Furthermore, IP (7) provides a packing structure that satisfies (4c) (4e) in IP (4), as is shown in line 23. (7a), (7b), and (7e) are feasible for (4a), (4b), and (4g). (7c) and (7d) demonstrate at most one feasible set is accepted, and they are guaranteed by \(\phantom {\dot {i}\!}h_{t^{*}}\) in line 19. Thus, the algorithm can be proven feasible in IP (7). Last, by demonstrating ϕ_{ij} in the initialization and line 20, CORE ensures the nonnegative quality of each variable for the dual problem (8). □
Appendix G: Proof of Theorem 8
Proof
We first analyze Algorithm CORE. The search for feasible sets in task j, as shown in line 2, runs in O(LT). The time complexity in line 3–8 is O(LT). Line 9 and 10 work in O(T) and O(T^{2}), respectively. The loop from line 11 to 17 takes at most O(w_{ij}T^{2}) time to run. Line 18–25 works to provide a feasible schedule, runs O(LT) time. To sum up, the total running time is O(LT+w_{ij}T^{2}).
Then PD simply runs all tasks via CORE, O(LT+w_{ij}T^{2}). The result, O(J(LT+ maxj∈[J],i∈[I]{w_{ij}}T^{2})), is also polynomial. □
Appendix H: Proof of Lemma 4
Proof
By summing up the inequalities in each turn, we obtain \(P^{J}=\sum _{j}(P^{j}P^{j1})\geq \frac {1}{\alpha }\sum _{j}(D^{j}D^{j1})=\frac {1}{\alpha }(D^{J}D^{0})\). On account of weak duality [32], D^{J}≥OPT_{2}. Additionally, we assume \(D^{0} \leq \frac {OPT_{2}}{e}\). As a result of \(P^{J} \geq \left (1\frac {1}{e}\right) \frac {1}{\alpha }{OPT}_{2}=\left (1\frac {1}{e}\right) \frac {1}{\alpha }{OPT}_{1}\), the algorithm achieves an competitive ratio of \(\frac {e}{e1}\alpha \). □
Appendix I: Proof of Lemma 5
Proof
We first make assumption that in a natural circumstance, when the resource and electricity are sufficient, tasks will be completed before deadline. Under such condition, if all cloudlets in the cluster process tasks in minw_{ij},∀j∈[J] time slots, i.e., \(\frac {T}{\sigma }\), and each R_{l} is fully occupied by workloads with minimum value per workload per time slot, then the cluster would generate the minimum utility for the offline setting. Since \(N=\min _{j \in [J]}\frac {b_{ij}}{w_{ij} \lambda _{ij}}\), the above circumstance will bring about \(\sum _{l} \frac {TN}{\sigma } R_{l}\) utility for the cluster, definitely smaller than the objective value of (4).
Back to PD algorithm, the dual problem initializes its objective value D^{0} at \(\sum _{l} \sum _{t} \frac {N}{e \sigma }R_{l}=\sum _{l} \frac {TN}{e \sigma }R_{l}\). Obviously, \(\frac {OPT_{2}}{e} \geq \sum _{l} \frac {TN}{e \sigma } R_{l} = D^{0}\). □
Appendix J: Proof of Lemma 6
Proof
If χ_{ijh}=0, the inequality is obviously correct as the RHS should be \(\frac {1}{\alpha }\phi _{ij}\), smaller than the value on the LHS. If χ_{ijh}=1, we sum all cloudlets and time slots of the allocationutility relationship, and we have \(\lambda _{ij}\sum _{l \in L(h)}\sum _{t \in T(h)}Z_{l}^{j}(t) \geq \frac {1}{\alpha } \left (\sum _{l \in L(h)}\sum _{t \in T(h)}R_{l}(Z^{j}_{l}(t)Z^{j1}_{l}(t)) \right), \forall j \in [J].\) Next, we add ϕ_{ij} to each side of the inequality, and
□
Appendix K: Proof of Lemma 7
Proof
When the jth task is rejected, P^{j}−P^{j−1}=D^{j}−D^{j−1}=0 certainly holds the inequality. Otherwise, P^{j}−P^{j−1}=bijh′−(g(u^{j})−g(u^{j−1})) represents the increased value in the scheduling, while \(D^{j}D^{j1}=\sum _{l} \sum _{t}(Z_{l}^{j}(t)Z_{l}^{j1}(t))R_{l}+\phi _{ij}+(g^{*}(C^{j})g^{*}(C^{j1}))\). Note that bijh′ is the value for task j. Due to complementary slackness, the inequality in (8a) goes tight, we can replace bijh′ with \(\phi _{ij}+\lambda _{ij}\sum _{l \in L(h)}\sum _{t \in T(h)} Z_{l}(t)+C^{j}\lambda _{ij} \sum _{l \in L(h)}\sum _{t \in T(h)} \beta _{l}\). Then, \(P^{j}P^{j1}=\phi _{ij}+\lambda _{ij}\sum _{l \in L(h)}\sum _{t \in T(h)} Z_{l}(t)+C^{j}\lambda _{ij} \sum _{l \in L(h)}\sum _{t \in T(h)} \beta _{l}(g(u^{j})g(u^{j1}))\)
In order to simplify the proof, we discuss the problem in 3 subcases.
i) If u^{j}≤D^{′}: in this case, since C^{j}=0, we have
\(\sum _{l} \sum _{t}(Z_{l}^{j}(t)Z_{l}^{j1}(t))\) can be further simplified to \(\sum _{l \in L(h)} \sum _{t \in T(h)}(Z_{l}^{j}(t)Z_{l}^{j1}(t))\) as \(Z_{l}^{j}(t)Z_{l}^{j1}(t)=0\) if l∉L(h) or t∉T(h). According to Lemma ??, PD ensures \(P^{j}P^{j1}\geq \frac {1}{\alpha _{1}}(D^{j}D^{j1}).\)
ii) If u^{j−1}≥D^{′}: \(C^{j}\lambda _{ij} \sum _{l \in L(h)}\sum _{t \in T(h)} \beta _{l}\) is equivalent with (g(u^{j})−g(u^{j−1})) because both represent an increment in the usage of local generator for processing task j. As a result, P^{j}−P^{j−1} and D^{j}−D^{j−1} are the same pattern with (i), and hence, the rest of the proof is similar to subcase (i).
(iii) if u^{j−1}≤D^{′}<u^{j}: according to CORE, \(C^{j1}=0, C^{j}=p, g(u^{j1})=0, g(u^{j})=p (u^{j1}+\lambda _{ij} \sum _{l \in L(h)}\sum _{t \in T(h)} \beta _{l})\). Then,
Since PD^{′}≥0, it is easy to verify the lemma at this subcase. □
Availability of data and materials
The data has been gathered from research papers and articles that are mentioned in the references.
Abbreviations
 EDR:

Emergency demand response
 IoT:

Internet of Things
 ILP:

Integer linear programming
 FPTAS:

Fully polynomial time approximation scheme
 VM:

Virtual machine
 AMEDR:

An auction mechanism for emergency demand response
 PD:

A primaldual based design for online allocation
References
M. Satyanarayanan, The emergence of edge computing. IEEE Comput.50(1), 30–39 (2017).
Y. Zhang, K. Wang, Y. Zhou, Q. He, Enhanced adaptive cloudlet placement approach for mobile application on spark. Secur. Commun. Netw.2018: (2018). https://doi.org/10.1155/2018/1937670.
N. Ansari, X. Sun, Mobile edge computing empowers Internet of Things. IEICE Trans. Comm.101(3), 604–619 (2018).
A. MolinaGarcia, F. Bouffard, D. Kirschen, Decentralized demandside contribution to primary frequency control. IEEE Trans. Power Syst.26(1), 411–419 (2010).
W. Shi, J. Cao, Q. Zhang, Y. Li, L. Xu, Edge computing: vision and challenges. IEEE Internet Things J.3(5), 637–646 (2016).
L. Zhang, S. Lei, C. Wu, Z. Li, in Proc. of IEEE INFOCOM. A truthful incentive mechanism for emergency demand response in colocation data centers, (2015), pp. 2632–2640. https://doi.org/10.1109/infocom.2015.7218654.
J. Chen, D. Ye, S. Ji, Q. He, Y. Xiang, Z. Liu, in Proc. of IEEE INFOCOM. A truthful FTPAs mechanism for emergency demand response in colocation data centers, (2019), pp. 2557–2565. https://doi.org/10.1109/infocom.2019.8737468.
X. Zhang, Z. Huang, C. Wu, Z. Li, F. Lau, in Proc. ACM SIGMETRICS, vol. 43. Online auctions in IAAs clouds: welfare and profit maximization with server costs, (2015), pp. 3–15. https://doi.org/10.1109/tnet.2016.2619743.
R. Zhou, Z. Li, C. Wu, Z. Huang, An efficient cloud market mechanism for computing jobs with soft deadlines. IEEEACM Trans. Netw.25(2), 793–805 (2016).
N. Jain, I. Menache, J. S. Naor, J. Yaniv, Nearoptimal scheduling mechanisms for deadlinesensitive jobs in large computing clusters. ACM Trans. Parallel Comput.2(1), 3–1329 (2015).
Z. Dong, N. Liu, R. RojasCessa, Greedy scheduling of tasks with time constraints for energyefficient cloudcomputing data centers. J. Cloud Comput.4:, 1–14 (2015).
D. Kim, J. Kim, Design of emergency demand response program using analytic hierarchy process. IEEE Trans. Smart Grid. 3(2), 635–644 (2012).
H. Kwag, J. Kim, Reliability modeling of demand response considering uncertainty of customer behavior. Appl. Energy. 122:, 24–33 (2014).
R. Zhou, Z. Li, C. Wu, in Proc. of IEEE INFOCOM. An online procurement auction for power demand response in storageassisted smart grids, (2015), pp. 2641–2649. https://doi.org/10.1109/infocom.2015.7218655.
K. Ma, T. Yao, J. Yang, X. Guan, Residential power scheduling for demand response in smart grid. Int. J. Electr. Power Energy Syst. 78:, 320–325 (2016).
Q. Sun, S. Ren, C. C. Wu, Z. Li, in Proc. of ACM eEnergy. An online incentive mechanism for emergency demand response in geodistributed colocation data centers, (2016), p. 3. https://doi.org/10.1145/2934328.2934331.
S. Chen, L. Jiao, L. Wang, F. Liu, in Proc. of IEEE INFOCOM. An online market mechanism for edge emergency demand response via cloudlet control, (2019), pp. 2566–2574. https://doi.org/10.1109/infocom.2019.8737574.
M. A. Islam, H. Mahmud, S. Ren, X. Wang, in Proc. of IEEE HPCA. Paying to save: reducing cost of colocation data center via rewards, (2015), pp. 235–245. https://doi.org/10.1109/hpca.2015.7056036.
Q. Sun, C. Wu, Z. Li, S. Ren, Colocation demand response: joint online mechanisms for individual utility and social welfare maximization. IEEE J. Sel. Areas Commun.34(12), 3978–3992 (2016).
S. Ren, M. A. Islam, in Proc. of USENIX ICAC. Colocation demand response: why do i turn off my servers? (2014), pp. 201–208. https://www.usenix.org/conference/icac14/technicalsessions/presentation/ren.
Z. Zhou, F. Liu, Z. Li, H. Jin, in Proc. of IEEE INFOCOM. When smart grid meets geodistributed cloud: an auction approach to datacenter demand response, (2015), pp. 2650–2658. https://doi.org/10.1109/infocom.2015.7218656.
R. Zhou, Z. Li, C. Wu, M. Chen, Demand response in smart grids: a randomized auction approach. IEEE J. Sel. Areas Commun.33(12), 2540–2553 (2015).
S. Anand, K. Garg, A. Kumar, in Proc. of SODA. Resource augmentation for weighted flowtime explained by dual fitting, (2012), pp. 1228–1241. https://doi.org/10.1137/1.9781611973099.97.
N. R. Devanur, Z. Huang, Primal dual gives almost optimal energyefficient online algorithms. TALG. 14(1), 5 (2018).
S. Agrawal, N. R. Devanur, in Proc. of SODA. Fast algorithms for online stochastic convex programming, (2014), pp. 1405–1424. https://doi.org/10.1137/1.9781611973730.93.
J. Wang, J. Pan, F. Esposito, in Proc. of SmartIoT. Elastic urban video surveillance system using edge computing, (2017). https://doi.org/10.1145/3132479.3132490.
A. Qureshi, Powerdemand routing in massive geodistributed systems. PhD thesis, MIT (2010). https://dspace.mit.edu/handle/1721.1/62430.
R. Carr, L. Fleischer, V. Leung, C. Phillips, in Proc. of SODA. Strengthening integrality gaps for capacitated network design and covering problems, (2000), pp. 106–115.
A. Archer, E. Tardos, in Proc. of IEEE Symposium on of Computer Science. Truthful mechanisms for oneparameter agents, (2001), pp. 482–491. https://doi.org/10.1007/springerreference_57955.
R. Myerson, Optimal auction design. Math. Oper. Res.6(1), 58–73 (1981).
R. Cole, N. Devanur, V. Gkatzelis, K. Jain, T. Mai, V. V. Vazirani, S. Yazdanbod, in Proc. of ACM EC. Convex program duality, fisher markets, and nash social welfare, (2017), pp. 459–460. https://doi.org/10.1145/3033274.3085109.
S. Boyd, L. Vandenberghe, Convex optimization (Cambridge, univ. press, Stanford University, 2004).
NYISO Summer 2018 Hot weather operations. [Online]. Available: http://www.nysrc.org. Accessed 18 July 2019.
G. Ghatikar, V. Ganti, N. Matson, M. A. Piette, Demand response opportunities and enabling technologies for data centers: findings from field studies (2012). https://doi.org/10.2172/1174175.
V. Bahl, Cloudlets for mobile computing (2014). https://www.microsoft.com/enus/research/publication/cloudletsformobilecomputing2/.
M. Ganeshalingam, A. Shehabi, L. B. Desroches, Shining a light on small data centers in the U.S. (2017). https://escholarship.org/uc/item/8dh8j3kq.
State of the Market Report for PJM. https://www.monitoringanalytics.com/reports/PJM_State_of_the_Market/2018/2018q3sompjm.pdf. Accessed 17 July 2019.
2018 Utility demand response market snapshot. https://www.peakload.org/2018utilitydrsnapshotreport. Accessed 14 July 2019.
D. Meisner, T. F. Wenisch, Peak power modeling for data center servers with switchedmode power supplies. ISLPED, 319–324 (2010). https://dl.acm.org/doi/abs/10.1145/1840845.1840911.
Free online calculation of diesel generator power, energy and fuel consumption. https://powercalculation.com/generatordieselenergycalculatorgenset.php. Accessed 20 July 2019.
U.S. Onhighway diesel fuel prices. https://www.eia.gov/petroleum/gasdiesel/. Accessed 15 July 2019.
A. Gleixner, L. Eifler, T. Gally, et al., The SCIP optimization suite 6.0. ZIBReport 1826, Zuse Institute Berlin (2018). http://nbnresolving.de/urn:nbn:de:0297zib69361. Accessed 10 July 2019.
Acknowledgements
The authors are grateful to the editor and anonymous referees for their valuable comments and suggestions. Only the authors are responsible for the views expressed and mistakes made.
Funding
This work was supported in part by the Technological Innovation Major Projects of Hubei Province (2017AAA125), the CUHK Grant (project # 3133067), and GRF grant 14201819. Part of this work by Ruiting Zhou was done while she was visiting CUHK.
Author information
Authors and Affiliations
Contributions
Zhaoyan Song proposed the algorithms, provided the proofs of theorems and lemmas, and drafted the manuscript. Ruiting Zhou developed the ideas for the study and edited the manuscript. Shihan Zhao was responsible for the data simulations and the writing of the simulation parts. Shixin Qin also participated in the data analysis. John C.S. Lui and Zongpeng Li reviewed the manuscript. The authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Competing interests
The authors declare that they have no competing interests.
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Song, Z., Zhou, R., Zhao, S. et al. Emergency demand response in edge computing. J Wireless Com Network 2020, 175 (2020). https://doi.org/10.1186/s1363802001789z
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/s1363802001789z
Keywords
 Emergency demand response
 Edge computing
 Auction mechanism
 Online scheduling
 Primaldual optimization