{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T06:23:40Z","timestamp":1766298220706,"version":"build-2065373602"},"reference-count":42,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2023,1,18]],"date-time":"2023-01-18T00:00:00Z","timestamp":1674000000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Network"],"abstract":"<jats:p>Data center organization and optimization are increasingly receiving attention due to the ever-growing deployments of edge and fog computing facilities. The main aim is to achieve a topology that processes the traffic flows as fast as possible and that does not only depend on AI-based computing resources, but also on the network interconnection among physical hosts. In this paper, graph theory is introduced, due to its features related to network connectivity and stability, which leads to more resilient and sustainable deployments, where cage graphs may have an advantage over the rest. In this context, the Petersen graph cage is studied as a convenient candidate for small data centers due to its small number of nodes and small network diameter, thus providing an interesting solution for edge and fog data centers.<\/jats:p>","DOI":"10.3390\/network3010005","type":"journal-article","created":{"date-parts":[[2023,1,19]],"date-time":"2023-01-19T07:42:27Z","timestamp":1674114147000},"page":"93-114","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Edge Data Center Organization and Optimization by Using Cage Graphs"],"prefix":"10.3390","volume":"3","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8391-8946","authenticated-orcid":false,"given":"Pedro Juan","family":"Roig","sequence":"first","affiliation":[{"name":"Computer Engineering Department, Miguel Hern\u00e1ndez University, 03202 Elche, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3701-5583","authenticated-orcid":false,"given":"Salvador","family":"Alcaraz","sequence":"additional","affiliation":[{"name":"Computer Engineering Department, Miguel Hern\u00e1ndez University, 03202 Elche, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8985-0639","authenticated-orcid":false,"given":"Katja","family":"Gilly","sequence":"additional","affiliation":[{"name":"Computer Engineering Department, Miguel Hern\u00e1ndez University, 03202 Elche, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9537-415X","authenticated-orcid":false,"given":"Cristina","family":"Bernad","sequence":"additional","affiliation":[{"name":"Computer Engineering Department, Miguel Hern\u00e1ndez University, 03202 Elche, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6517-5395","authenticated-orcid":false,"given":"Carlos","family":"Juiz","sequence":"additional","affiliation":[{"name":"Mathematics and Computer Science Department, University of the Balearic Islands, 07022 Palma de Mallorca, Spain"}]}],"member":"1968","published-online":{"date-parts":[[2023,1,18]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1007\/s42979-022-01043-x","article-title":"AI-Based Modeling: Techniques, Applications and Research Issues Towards Automation, Intelligent and Smart Systems","volume":"3","author":"Sarker","year":"2022","journal-title":"SN Comput. Sci."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13677-015-0050-8","article-title":"A novel revenue optimization model to address the operation and maintenance cost of a data center","volume":"5","author":"Saha","year":"2016","journal-title":"J. Cloud Comput."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"154378","DOI":"10.4108\/eai.20-12-2017.154378","article-title":"Overview - Fog Computing and Internet-of-Things (IOT)","volume":"3","author":"Prabhu","year":"2017","journal-title":"EAI Endorsed Trans. Cloud Syst."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"954","DOI":"10.1080\/09540091.2021.1926929","article-title":"An effective scheduling in data centres for efficient CPU usage and service level agreement fulfillment using machine learning","volume":"33","author":"Daid","year":"2021","journal-title":"Connect. Sci."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1111\/jiec.13155","article-title":"Increasing the energy efficiency of a data center based on machine learning","volume":"26","author":"Yang","year":"2022","journal-title":"J. Ind. Ecol."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1093\/molbev\/msac034","article-title":"The Carbon Footprint of Bioinformatics","volume":"39","author":"Grealey","year":"2022","journal-title":"Mol. Biol. Evol."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"111793","DOI":"10.1016\/j.rser.2021.111793","article-title":"Making the internet globally sustainable: Technical and policy options for improved energy management, governance and community acceptance of Nordic datacenters","volume":"154","author":"Sovacool","year":"2022","journal-title":"Renew. Sustain. Energy Rev."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"111547","DOI":"10.1016\/j.rser.2021.111547","article-title":"Potential of data centers for fast frequency response services in synchronously isolated power systems","volume":"151","author":"Foley","year":"2021","journal-title":"Renew. Sustain. Energy Rev."},{"doi-asserted-by":"crossref","unstructured":"Andrews, D., Newton, E.J., Adibi, N., Chenadec, J., and Bienge, K. (2021). A Circular Economy for the Data Centre Industry: Using Design Methods to Address the Challenge of Whole System Sustainability in a Unique Industrial Sector. Sustainability, 13.","key":"ref_9","DOI":"10.3390\/su13116319"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"2342","DOI":"10.1049\/cmu2.12274","article-title":"A multi-objective method for virtual machines allocation in cloud data centres using an improved grey wolf optimization algorithm","volume":"15","author":"Hashemi","year":"2021","journal-title":"IET Commun."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"2529","DOI":"10.1007\/s10462-021-10071-7","article-title":"Recent advancement in VM task allocation system for cloud computing: Review from 2015 to 2021","volume":"55","author":"Ullah","year":"2022","journal-title":"Artif. Intell. Rev."},{"key":"ref_12","first-page":"125","article-title":"Optimized Energy Efficient Strategy for Data Reduction Between Edge Devices in Cloud-IoT","volume":"72","author":"Mukherjee","year":"2022","journal-title":"Comput. Mater. Contin."},{"key":"ref_13","first-page":"3174716","article-title":"Energy-Efficient Resource Allocation and Migration in Private Cloud Data Centre","volume":"2022","author":"Dhaya","year":"2022","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_14","first-page":"7873131","article-title":"Virtual MAChine Resource Allocation Optimization in Cloud Computing Based on Multiobjective Genetic Algorithm","volume":"1","author":"Shi","year":"2022","journal-title":"Comput. Intell. Neurosci."},{"unstructured":"(2022, December 28). What Are Data Centers? How They Work and How They Are Changing in Size and Scope. Available online: https:\/\/www.networkworld.com\/article\/3599213\/what-are-data-centers-how-they-work-and-how-they-are-changing-in-size-and-scope.html\/.","key":"ref_15"},{"unstructured":"(2022, December 28). 8 Tips to Optimize Your Data Center\u2019s HVAC and Energy Use for 2022. Available online: https:\/\/galooli.com\/blog\/top-8-tips-to-optimize-your-data-centers-hvac-and-energy-use-for-2022\/.","key":"ref_16"},{"unstructured":"(2022, December 28). Data Center Optimization Strategies. Available online: https:\/\/www.akcp.com\/blog\/data-center-optimization-strategies\/.","key":"ref_17"},{"unstructured":"(2022, December 28). Best Practices for Data Center Network Optimization. Available online: https:\/\/www.techtarget.com\/searchdatacenter\/tip\/Best-practices-for-data-center-network-optimization\/.","key":"ref_18"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"680","DOI":"10.1016\/j.future.2016.11.009","article-title":"Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges","volume":"78","author":"Mambo","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"56587","DOI":"10.1109\/ACCESS.2018.2872722","article-title":"Energy-Efficient Deployment of Edge Dataenters for Mobile Clouds in Sustainable IoT","volume":"6","author":"Mishra","year":"2018","journal-title":"IEEE Access"},{"unstructured":"Harary, F. (2019). Graph Theory, CRC Press.","key":"ref_21"},{"key":"ref_22","first-page":"171","article-title":"Integrity of Graph Operations","volume":"10","author":"Basavanagoud","year":"2021","journal-title":"Trans. Comb."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"2664","DOI":"10.1016\/j.disc.2019.06.007","article-title":"Edge integrity of nearest neighbor graphs and separator theorems","volume":"342","author":"Dunkum","year":"2019","journal-title":"Discret. Math."},{"key":"ref_24","first-page":"33","article-title":"Accessibility Integrity of Graphs","volume":"31","author":"Mahde","year":"2021","journal-title":"Adv. Stud. Contemp. Math. (Kyungshang)"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1181","DOI":"10.1007\/s00453-016-0127-x","article-title":"On the Computational Complexity of Vertex Integrity and Component Order Connectivity","volume":"76","author":"Drange","year":"2016","journal-title":"Algorithmica"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"2429","DOI":"10.3233\/JIFS-171685","article-title":"Concept of integrity and its value of fuzzy graphs","volume":"34","author":"Saravannan","year":"2018","journal-title":"J. Intell. Fuzzy Syst."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"329","DOI":"10.52280\/pujm.2021.530503","article-title":"Integrity of Wheel Related Graphs","volume":"53","author":"Basavanagoud","year":"2021","journal-title":"Punjab Univ. J. Math."},{"key":"ref_28","first-page":"1","article-title":"Hub edge integrity of graphs","volume":"15","author":"Mahde","year":"2020","journal-title":"Online J. Anal. Comb."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"453","DOI":"10.18576\/amis\/140312","article-title":"D Integrity and E Integrity Numbers in Graphs","volume":"14","author":"Mahde","year":"2020","journal-title":"Appl. Math. Inf. Sci."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1014","DOI":"10.1007\/s10910-016-0716-6","article-title":"The truncation of a cage graph","volume":"55","author":"Diudea","year":"2017","journal-title":"J. Math. Chem."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"2472","DOI":"10.1016\/j.camwa.2011.07.033","article-title":"New graphs related to (p,6) and (p,8)-cages","volume":"62","author":"Bretto","year":"2011","journal-title":"Comput. Math. Appl."},{"doi-asserted-by":"crossref","unstructured":"Pisanski, T., and Servatius, B. (2013). Graphs. Configurations from a Graphical Viewpoint, Birkh\u00e4user. Birkh\u00e4user Advanced Texts Basler Lehrb\u00fccher.","key":"ref_32","DOI":"10.1007\/978-0-8176-8364-1"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"1301","DOI":"10.1016\/j.disc.2009.12.014","article-title":"Finding small regular graphs of girth 6, 8 and 12 as subgraphs of cages","volume":"310","author":"Balbuena","year":"2010","journal-title":"Discret. Math."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1016\/j.dam.2017.04.014","article-title":"Codes for distributed storage from 3-regular graphs","volume":"229","author":"Gao","year":"2017","journal-title":"Discret. Appl. Math."},{"key":"ref_35","first-page":"39","article-title":"The integrity of small cage graphs","volume":"43","author":"Atici","year":"2009","journal-title":"Australas. J. Comb."},{"unstructured":"Fokkink, W. (2017). Modelling Distributed Systems, Springer. [2nd ed.].","key":"ref_36"},{"doi-asserted-by":"crossref","unstructured":"Groote, J.F., and Mousavi, M.R. (2014). Modeling and Analysis of Communicating Systems, MIT Press. [1st ed.].","key":"ref_37","DOI":"10.7551\/mitpress\/9946.001.0001"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"321","DOI":"10.3233\/FI-2021-2026","article-title":"Using Hoare Logic in a Process Algebra Setting","volume":"179","author":"Bergstra","year":"2021","journal-title":"Fundam. Informaticae"},{"unstructured":"Fokkink, W. (2007). Introduction to Process Algebra, Springer. [2nd ed.].","key":"ref_39"},{"unstructured":"Erra, R. (2019). Implementation of a Hardware Algorithm for Integer Division. [Master\u2019s Thesis, Electrical Engineering, Faculty Graduate College, Oklahoma State University].","key":"ref_40"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"299","DOI":"10.4236\/cs.2013.43041","article-title":"Power and Time Efficient IP Lookup Table Design Using Partitioned TCAMs","volume":"4","author":"Ahn","year":"2013","journal-title":"Circuits Syst."},{"doi-asserted-by":"crossref","unstructured":"Brown, C.E. (1998). Coefficient of Variation. Applied Multivariate Statistics in Geohydrology and Related Sciences, Springer.","key":"ref_42","DOI":"10.1007\/978-3-642-80328-4"}],"container-title":["Network"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2673-8732\/3\/1\/5\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T18:09:19Z","timestamp":1760119759000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2673-8732\/3\/1\/5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,18]]},"references-count":42,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2023,3]]}},"alternative-id":["network3010005"],"URL":"https:\/\/doi.org\/10.3390\/network3010005","relation":{},"ISSN":["2673-8732"],"issn-type":[{"type":"electronic","value":"2673-8732"}],"subject":[],"published":{"date-parts":[[2023,1,18]]}}}