DEEDSP: Deadline‐aware and energy‐efficient dynamic service placement in integrated Internet of Things and fog computing environments

Author(s):  
Meeniga Sri Raghavendra ◽  
Priyanka Chawla ◽  
Sukhpal Singh Gill
2021 ◽  
Vol 11 (22) ◽  
pp. 10996
Author(s):  
Jongbeom Lim

As Internet of Things (IoT) and Industrial Internet of Things (IIoT) devices are becoming increasingly popular in the era of the Fourth Industrial Revolution, the orchestration and management of numerous fog devices encounter a scalability problem. In fog computing environments, to embrace various types of computation, cloud virtualization technology is widely used. With virtualization technology, IoT and IIoT tasks can be run on virtual machines or containers, which are able to migrate from one machine to another. However, efficient and scalable orchestration of migrations for mobile users and devices in fog computing environments is not an easy task. Naïve or unmanaged migrations may impinge on the reliability of cloud tasks. In this paper, we propose a scalable fog computing orchestration mechanism for reliable cloud task scheduling. The proposed scalable orchestration mechanism considers live migrations of virtual machines and containers for the edge servers to reduce both cloud task failures and suspended time when a device is disconnected due to mobility. The performance evaluation shows that our proposed fog computing orchestration is scalable while preserving the reliability of cloud tasks.


Author(s):  
Dharmendra Trikamlal Patel

In recent years, internet of things (IoT) has expanded due to very good internet infrastructure everywhere. IoT has the ability to create a network of physical things that use embedded technologies in order to sense, converse, cooperate, and team up with other things. IoT-based applications require scalability and fault tolerance, which is very difficult to implement in centralized systems and computing environments. Distributed computing is an ideal solution to implement IoT-based applications. The chapter starts with the basics of distributed computing where difference with centralized computing, challenges, and types of distributed computing applications are discussed. The chapter deals with the role of distributed computing for IoT based on advantages, issues, and related IoT-based applications. The chapter discusses the recent topic of distributed computing—FOG computing—in connection with IoT-based applications. At last, the chapter addresses research and interest trends about distributed computing and IoT.


2021 ◽  
Vol 23 (07) ◽  
pp. 1499-1508
Author(s):  
Bhukya Suresh ◽  
◽  
G Shyama Chandra Prasad ◽  

Wireless Sensor Networks (WSNs) are a resource-constrained network class recognized as a major energy consumer. Wireless sensor technologies are used in many commercialized industrial automation processes and other real-world applications. The WSN protocol is well-suited to harsh situations where deployment is difficult or impossible, such as the battlefield, a toxic chemical plant, the cloud, fog computing, and the Internet of Things, but not in a high-temperature network infrastructure environment. WSNs have introduced various Energy-Efficient Routing Protocols based on network (NW) organization and protocols in recent years. Various WSN routing options for energy efficiency are explored in this work. The WSN Energy Efficient Routing Protocol is compared to other routing systems. We also compare and investigate better WSN routing algorithms for cloud computing, fog computing, and the Internet of Things.


Author(s):  
Kashif Munir ◽  
Lawan A. Mohammed

In the IoT scenario, things at the edge can create significantly large amounts of data. Fog computing has recently emerged as the paradigm to address the needs of edge computing in internet of things (IoT) and industrial internet of things (IIoT) applications. Authentication is an important issue for the security of fog computing since services are offered to massive-scale end users by front fog nodes. Fog computing faces new security and privacy challenges besides those inherited from cloud computing. Authentication helps to ensure and confirms a user's identity. The existing traditional password authentication does not provide enough security for the data, and there have been instances when the password-based authentication has been manipulated to gain access to the data. Since the conventional methods such as passwords do not serve the purpose of data security, this chapter focuses on biometric user authentication in fog computing environments. In this chapter, the authors present biometric smartcard authentication to protect the fog computing environment.


2018 ◽  
Vol 1-2 ◽  
pp. 14-26 ◽  
Author(s):  
Ryuji Oma ◽  
Shigenari Nakamura ◽  
Dilawaer Duolikun ◽  
Tomoya Enokido ◽  
Makoto Takizawa

Author(s):  
Dharmendra Trikamlal Patel

In recent years, internet of things (IoT) has expanded due to very good internet infrastructure everywhere. IoT has the ability to create a network of physical things that use embedded technologies in order to sense, converse, cooperate, and team up with other things. IoT-based applications require scalability and fault tolerance, which is very difficult to implement in centralized systems and computing environments. Distributed computing is an ideal solution to implement IoT-based applications. The chapter starts with the basics of distributed computing where difference with centralized computing, challenges, and types of distributed computing applications are discussed. The chapter deals with the role of distributed computing for IoT based on advantages, issues, and related IoT-based applications. The chapter discusses the recent topic of distributed computing—FOG computing—in connection with IoT-based applications. At last, the chapter addresses research and interest trends about distributed computing and IoT.


In the era of new technologies, Fog computing becomes very popular in today’s scenario. Fog computing paradigm brings a concept that extends cloud computing to the edge and close proximity to the Internet of Things (IoT) network. The fundamental components of fog computing are fog nodes. Additionally, fog nodes are energy efficient nodes. Numerous fog nodes are deployed in the associated fields that will handle the Internet of Things (IoT) sensors computation. Meanwhile, the Internet of Things (IoT) faces challenges, among which energy efficiency is one of the most prominent or critical challenges in the current scenario. However, sensor devices are an energy constraintthatcreateshotspotduringtheroutingprocess.Forthis reason,tohandlesuchconstraints,thispaperpresentsaneffective hotspot mechanism using fog nodes that demonstrate the routing process and directed the sensors to choose the routing path as selected by the fog node. Moreover, fog node will act as a decision maker node and maintain the energy efficiency of sensors during the routing as fog nodes are energy efficient nodes. As it moves towards the emergency situation, the most appropriate and effective routing approach has been designed who maintain the energy level of sensors will be high during the routing process. The proposed routing technique could be better performance for the sake of efficient routing in terms of energy consumption and prolonging networklifetime.


Sign in / Sign up

Export Citation Format

Share Document