scholarly journals A Novel UDT-Based Transfer Speed-Up Protocol for Fog Computing

2018 ◽  
Vol 2018 ◽  
pp. 1-11 ◽  
Author(s):  
Zhijie Han ◽  
Weibei Fan ◽  
Jie Li ◽  
Miaoxin Xu

Fog computing is a distributed computing model as the middle layer between the cloud data center and the IoT device/sensor. It provides computing, network, and storage devices so that cloud based services can be closer to IOT devices and sensors. Cloud computing requires a lot of bandwidth, and the bandwidth of the wireless network is limited. In contrast, the amount of bandwidth required for “fog computing” is much less. In this paper, we improved a new protocol Peer Assistant UDT-Based Data Transfer Protocol (PaUDT), applied to Iot-Cloud computing. Furthermore, we compared the efficiency of the congestion control algorithm of UDT with the Adobe’s Secure Real-Time Media Flow Protocol (RTMFP), based on UDP completely at the transport layer. At last, we built an evaluation model of UDT in RTT and bit error ratio which describes the performance. The theoretical analysis and experiment result have shown that UDT has good performance in IoT-Cloud computing.

Author(s):  
Himanshu Sahu ◽  
Gaytri

IoT requires data processing, which is provided by the cloud and fog computing. Fog computing shifts centralized data processing from the cloud data center to the edge, thereby supporting faster response due to reduced communication latencies. Its distributed architecture raises security and privacy issues; some are inherited from the cloud, IoT, and network whereas others are unique. Securing fog computing is equally important as securing cloud computing and IoT infrastructure. Security solutions used for cloud computing and IoT are similar but are not directly applicable in fog scenarios. Machine learning techniques are useful in security such as anomaly detection, intrusion detection, etc. So, to provide a systematic study, the chapter will cover fog computing architecture, parallel technologies, security requirements attacks, and security solutions with a special focus on machine learning techniques.


2013 ◽  
Vol 846-847 ◽  
pp. 1468-1471
Author(s):  
De Wen Wang ◽  
Yang Liu

A multi-QoS evaluation model for electric power users is defined, combined with the characteristics of data center in electric power corporation, based on the research of cloud computing platform of data center in electric power corporation and task scheduling strategies of cloud data center. And a genetic algorithm based on multi-QoS, which fitness functions are QoS utility value and completion time, is put forward. Tests in Cloudsim platform and the result shows that the genetic algorithm based on multi-QoS can satisfy the requirements of multi-QoS of electric power users and improve the operating efficiency of data center in electric power corporation.


Author(s):  
Prasanta K. Manohari ◽  
Niranjan K. Ray

Cloud computing is one of the emerging technology in the recent times which has varieties of applications at different fields. It is an Internet dependent technology and it store and maintain the data in a cloud data center. Cloud center usually supports more numbers of user, applications and data. In the same time, it also suffered with numerous challenges. Security is a key requirement for cloud data center. Different security mechanisms are proposed for cloud computing environment. In this chapter, we address the background of cloud computing, security risk, requirements, issues, and some of the security techniques are discussed. We discuss different security issues and focus on some existing solutions.


2017 ◽  
Vol 10 (13) ◽  
pp. 162
Author(s):  
Amey Rivankar ◽  
Anusooya G

Cloud computing is the latest trend in large-scale distributed computing. It provides diverse services on demand to distributive resources such asservers, software, and databases. One of the challenging problems in cloud data centers is to manage the load of different reconfigurable virtual machines over one another. Thus, in the near future of cloud computing field, providing a mechanism for efficient resource management will be very significant. Many load balancing algorithms have been already implemented and executed to manage the resources efficiently and adequately. The objective of this paper is to analyze shortcomings of existing algorithms and implement a new algorithm which will give optimized load balancingresult.


Sensors ◽  
2019 ◽  
Vol 19 (16) ◽  
pp. 3612 ◽  
Author(s):  
Algimantas Venčkauskas ◽  
Nerijus Morkevicius ◽  
Vaidas Jukavičius ◽  
Robertas Damaševičius ◽  
Jevgenijus Toldinas ◽  
...  

Development of the Internet of Things (IoT) opens many new challenges. As IoT devices are getting smaller and smaller, the problems of so-called “constrained devices” arise. The traditional Internet protocols are not very well suited for constrained devices comprising localized network nodes with tens of devices primarily communicating with each other (e.g., various sensors in Body Area Network communicating with each other). These devices have very limited memory, processing, and power resources, so traditional security protocols and architectures also do not fit well. To address these challenges the Fog computing paradigm is used in which all constrained devices, or Edge nodes, primarily communicate only with less-constrained Fog node device, which collects all data, processes it and communicates with the outside world. We present a new lightweight secure self-authenticable transfer protocol (SSATP) for communications between Edge nodes and Fog nodes. The primary target of the proposed protocol is to use it as a secure transport for CoAP (Constrained Application Protocol) in place of UDP (User Datagram Protocol) and DTLS (Datagram Transport Layer Security), which are traditional choices in this scenario. SSATP uses modified header fields of standard UDP packets to transfer additional protocol handling and data flow management information as well as user data authentication information. The optional redundant data may be used to provide increased resistance to data losses when protocol is used in unreliable networks. The results of experiments presented in this paper show that SSATP is a better choice than UDP with DTLS in the cases, where the CoAP block transfer mode is used and/or in lossy networks.


Author(s):  
Arif Ullah ◽  
Nazri Mohd Nawi ◽  
Hairulnizam Bin Mahdin ◽  
Samad Baseer ◽  
Mustafa Mat Deris

In modern data centres of cloud computing contains virtualization system. In order to improve network stability, energy efficiency, and makespan proper virtualization need. The virtual machine is one of the examples of virtualizations. Cloud computing data centres consist of millions of virtual machine to manage load balancing. In this study check the different number of virtual machine role in data centres, for that purpose, we established a network with the help of cloudsim and compare different data centres at each zones taking a different number of the virtual machine with different paramater and network banwith.After the simulation the result shows that increasning in the number of VM can affect the netwok accuracy in term of energy ,processing time ,coast and network stabality . 


Author(s):  
Abdullah Fadil ◽  
Waskitho Wibisono

Komputasi awan atau cloud computing merupakan lingkungan yang heterogen dan terdistribusi, tersusun atas gugusan jaringan server dengan berbagai kapasitas sumber daya komputasi yang berbeda-beda guna menopang model layanan yang ada di atasnya. Virtual machine (VM) dijadikan sebagai representasi dari ketersediaan sumber daya komputasi dinamis yang dapat dialokasikan dan direalokasikan sesuai dengan permintaan. Mekanisme live migration VM di antara server fisik yang terdapat di dalam data center cloud digunakan untuk mencapai konsolidasi dan memaksimalkan utilisasi VM. Pada prosedur konsoidasi vm, pemilihan dan penempatan VM sering kali menggunakan kriteria tunggal dan statis. Dalam penelitian ini diusulkan pemilihan dan penempatan VM menggunakan multi-criteria decision making (MCDM) pada prosedur konsolidasi VM dinamis di lingkungan cloud data center guna meningkatkan layanan cloud computing. Pendekatan praktis digunakan dalam mengembangkan lingkungan cloud computing berbasis OpenStack Cloud dengan mengintegrasikan VM selection dan VM Placement pada prosedur konsolidasi VM menggunakan OpenStack-Neat. Hasil penelitian menunjukkan bahwa metode pemilihan dan penempatan VM melalui live migration mampu menggantikan kerugian yang disebabkan oleh down-times sebesar 11,994 detik dari waktu responnya. Peningkatan response times terjadi sebesar 6 ms ketika terjadi proses live migration VM dari host asal ke host tujuan. Response times rata-rata setiap vm yang tersebar pada compute node setelah terjadi proses live migration sebesar 67 ms yang menunjukkan keseimbangan beban pada sistem cloud computing.


Mobile Cloud Computing is a combination of general Cloud Computing and Mobile Computing in which we have to access resources from the remote cloud data center with the help of mobile electronics and peripherals like mobile smartphones, laptops, gadgets, etc. via Cellular Technology or Wireless Communication. Mobile devices have lots of resource constraints like storage capacity, processing speed, and battery life. Hence through simple mobile computing software and programming, we cannot manipulate on mobile devices of cloud data center information. Because of such kinds of difficulty, we have to process information or data through external mobile devices. Accessing and processing of data with the help of Trusted Third Party Agency (TPA) outside the cloud data center and mobile devices have lots of security challenges. To make cloud data secure over outside resources, lots of terminologies and theory are put forward by various researchers. In this paper, we will analyze their theory and its limitations and offer our security algorithm proposal. In this thesis article, we analyze the security framework for storing data on Cloud Server by Mobile and limitation of this process. Also, we review the theory of how data can be secure our data on cloud administrators


Webology ◽  
2020 ◽  
Vol 17 (2) ◽  
pp. 599-606
Author(s):  
Nagarjuna Valeti ◽  
V. Ceronmani Sharmila

The meaning of cloud computing is providing services by using the internet. From the Cloud Data Centres (CDC) the services are utilized by the cloud users. Presently (Internet of things) IOT playing the key role to improve the performance of the fog computing enabled applications. Migrating the wireless sensor networks with IOT becomes the most powerful and error free application based on the availability of the services, cloud storage, computation and these are transferred efficiently between server and cloud. Health domain is most widely affecting system in cloud computing as well as by using fog computing with IOT. The system causes various failures for providing the service continuously. Enabling the fog computing with the integration of cloud for the medical devices to transmit the patient information to the cloud storage has become the complicated for the IOT sensors continuously. This may cause the data loss and also reduce the performance of the medical device. To improve the continuous services within the cloud server. In this paper, the Fault detection based Connected Dominating Set (FDCDS) which provides the continuous services with the integration of fog computing and IOT devices with wireless sensor networks. Simulation shows the performance of the proposed system.


2021 ◽  
Vol 13 (12) ◽  
pp. 320
Author(s):  
Ahmed H. Ibrahim ◽  
Zaki T. Fayed ◽  
Hossam M. Faheem

Cloud computing has been a dominant computing paradigm for many years. It provides applications with computing, storage, and networking capabilities. Furthermore, it enhances the scalability and quality of service (QoS) of applications and offers the better utilization of resources. Recently, these advantages of cloud computing have deteriorated in quality. Cloud services have been affected in terms of latency and QoS due to the high streams of data produced by many Internet of Things (IoT) devices, smart machines, and other computing devices joining the network, which in turn affects network capabilities. Content delivery networks (CDNs) previously provided a partial solution for content retrieval, availability, and resource download time. CDNs rely on the geographic distribution of cloud servers to provide better content reachability. CDNs are perceived as a network layer near cloud data centers. Recently, CDNs began to perceive the same degradations of QoS due to the same factors. Fog computing fills the gap between cloud services and consumers by bringing cloud capabilities close to end devices. Fog computing is perceived as another network layer near end devices. The adoption of the CDN model in fog computing is a promising approach to providing better QoS and latency for cloud services. Therefore, a fog-based CDN framework capable of reducing the load time of web services was proposed in this paper. To evaluate our proposed framework and provide a complete set of tools for its use, a fog-based browser was developed. We showed that our proposed fog-based CDN framework improved the load time of web pages compared to the results attained through the use of the traditional CDN. Different experiments were conducted with a simple network topology against six websites with different content sizes along with a different number of fog nodes at different network distances. The results of these experiments show that with a fog-based CDN framework offloading autonomy, latency can be reduced by 85% and enhance the user experience of websites.


Sign in / Sign up

Export Citation Format

Share Document