SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 129
Fog Route: Distribution of Data using Delay Tolerant Network
Vidya Dorge1, Shubham Gapat2, Neelima Kamtam3, Nilima Nikam4
1,2,3Student, Dept. of Computer Science and Engineering, YTIET College, Karjat, India
4Professer, Dept. of Computer Science and Engineering, YTIET College, Karjat, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Fog Computing is an extension of Cloud
Computing. As in a Cloud, Fog computing also provides data,
compute, storage, and application services to end-users. The
difference is Fog provides proximity to its end users through
dense geographical distribution and it also supports mobility.
Access points or set-up boxes are used as end devices to host
services at the network. These end devices are also termed as
edge network. Fog computing improves the Quality of service
and also reduces latency. A Fog computing system is of a three
tier Mobile-Fog-Cloud structure; mobile user getsservice from
Fog servers using local wireless connections, and Fog servers
update their contents from Cloud using the cellular or wired
networks. This, however, may suffer high content update cost
when the bandwidth between the Fog and Cloud servers is
expensive, e.g., using the cellular network, and is therefore
inefficient for non-urgent, high volume contents. Inthispaper,
we address the issue by proposing a hybriddatadissemination
framework which applies DTN (delay tolerable network)
approaches in Fog computing. We decompose the Fog
computing network architecture with two planes, where the
cloud is a control plane to process content update queries and
organize data flows, and the geometrically distributed Fog
servers form a data plane to disseminate data among Fog
servers with delay tolerant network technique.
Key Words: Fog Computing, Delay Tolerant Network,
Data Dissemination
1. INTRODUCTION
Fog computing – a term created by Cisco that refers to
extending cloud computing to the edge of an enterprise's
network. Also known as edge computing or fogging, fog
computing facilitates the operation of compute, storage,and
networking services between end devices and cloud
computing data centers. While edge computing is typically
referred to the location where services are instantiated, fog
computing implies distribution of the communication,
computation, and storage resources and services onorclose
to devices and systems in the control of end-users. Fog
computing is a medium weight and intermediate level of
computing power. Rather than a substitute, fog computing
often serves as a complement to cloud computing. Fog
computing concept, actually a Cloud computing close to the
‘ground’, creates automated response that drives the value.
Both Cloud and Fog provide data, computation, storage and
application services to end-users. However, Fog can be
distinguished from Cloud by its proximity to end-users, the
dense geographical distribution and its supportformobility.
Fog computing typically has a three-tier Mobile-Fog-Cloud
structure [3]. In the Mobile tier, it could include all wireless
devices, such as smartphones, tablets, laptops. In the Fog
tier, Fog servers provide services to the end users and
synchronize data with the Cloud. In the Cloud tier, Cloud
provider provides content service required by geo-
distributed Fog servers. Data dissemination between a
mobile user and a Fog server is occurred when this mobile
user retrieves content. If this Fog server has the required
content, it sends the content to the mobile user. Otherwise,
this Fog server needs to send a query to its Cloudprovider to
find and download it into its local storage. On another side,
Fog servers need to regularly check with their Cloud
providers whether the Fog servers have the updated
contents or not; if not, they need to update their storage by
retrieving from the Cloud via either wired or wireless
networks, e.g., cellar networks. Such data disseminations
may involve a huge cost due to the large data volume.
According to the report from Cisco [4], the overall mobile
data traffic is expected to grow to 24.3 exabytes per month
by 2019 and more traffic will be offloaded from cellular
networks, such as Fog devices, than remains on cellular
networks by 2016.
1.1 Related Work
1.1.1 Cloud computing
Cloud computing, [5] a kind of Internet-based paradigm,
refers to both the applications delivered as services overthe
Internet and the hardware and software in the data centers
that provide these services. The research on cloud
computing has attractedgreatattentionwitha largequantity
of literatures. For example, Armbruster et al. quantify
comparisons between cloud and conventional computing,
and identify the top technical and non-technical obstacles
and opportunities of cloud computing. The emergence of
cloud computing has established a trend towards building
massive, energy-hungry, and geographically distributed
Internet data centers as cloud servers. Due to their
enormous energy consumption, Rao etal. [13], [14]
investigate how to coordinate the collection of data centers
so as to minimize the electricity expense while maintaining
the quality of the cloud computingservice. Ourwork extends
from the existing related papers on cloud computing to a
newly emerged paradigm named fog computing. However,
the transition is not trivial, since fog is quite different cloud
in terms of location, distribution, and computing capability.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 130
1.1.2 Fog Computing in Distributed Data
Management
In the paper given in [1] emerging area of the Internet of
Things (IoT), the exponential growth of the numberofsmart
devices leads to a growing need for efficient data storage
mechanisms. Cloud Computing was an efficient solution so
far to store and manipulate such huge amount of data.
However, in the next years it is expected that Cloud
Computing will be unable to handle the huge amount of the
IoT devices efficiently due to bandwidth limitations. An
arising technology which promises to overwhelm many
drawbacks in large-scale networks in IoT is Fog Computing.
Computational power and storage capacity could be offered
from the Fog, with low latency and high bandwidth. This
survey discusses the main features of Fog Computing,
introduces representative simulators and tools, highlights
the benefits of Fog Computing in line withtheapplicationsof
large-scale IoT networks, and identifies various aspects of
issues we may encounter when designing andimplementing
social IoT systems in the context of the Fog Computing
paradigm.
1.1.3 Delay tolerant network
Nowadays, theresearchand applicationaboutdelay-tolerant
network (DTN) have become moreandmorepopular.DTNis
a new kind of network derived from deep space
communication. Differed with traditional network, DTN
network has the followingseveral characteristics:longdelay,
limited resources, interval connectivity, asymmetric data
rate, low signal to noise ratio, and high error rate. In this
paper, we present the developmentand basic characteristics
of DTN, and discuss the network architecture in details. In
addition, the issues of reliability transmission, congestion
control, security and applications are also be covered in this
paper [2].
1.1.4 Dissemination based on Delay Tolerant
Network Technique
For high volume and non-urgent data, it is not wise to use
expensive network transmission techniques. Instead, delay
tolerant network technique could be used to provide data
dissemination between Fog servers and between mobile
users and Fog servers as well. Delay Tolerant Network
(DTN)[9] [10] is featured with long latency and unstable
network topology, where end-to-end delay canbemeasured
in hours or days and data dissemination paths maynotexist.
Data dissemination in DTN uses store-carry- forward
techniques; if there is no connection available at a particular
time, the source node needs to store and carry the message
until the next available node isencountered.DakNetisa DTN
technique based application and developed by researchers
from the MIT Media Lab. It has been deployed in remote
parts of Cambodia and India at a cost two orders of
magnitude less compared to traditional landlines networks.
DakNet uses existing communications and transport
infrastructure to form a delay tolerant network, where it
combines physical transportation with a wireless data
transferal function to extend Internet connectivity to a
central hub, such as cyberspace or a post office. DakNetdoes
not need to relay data over a long distance, which is an
advantage because it would reduce costs and save a lot of
power. Instead, DakNet transmits data over short point-to-
point links between kiosks and portable storage devices
called mobile access points (MAPs). A MAP can exchange
data among public kiosks, Internet enableddevicesand non-
Internet accessed hubs by using mobile generatorsmounted
on and powered by a bus or motorcycle.
2. System Design and Model
2.1 System Architecture
To have an efficient data dissemination in Fog computing,
DTN is used to offload data transmitted among Fog servers.
In Fig, if Fog server A has some small contents, such asa new
video ads, but Fog server B does not. In previous, Fog server
B needs to get the update from Cloud server directly. With
DTN technique, user 1 could download this content when he
has a coffee in this cafe shop. After a couple of hours, he goes
to shopping center for shopping. When he moves into the
transmission range of Fog server B, this content storied in
user 1’s mobile device automatically upload to Fog server B
and this store-carry-forward process is finished. For large
content, e.g. a high definition movie, transmitted from Fog
server B to Fog server A, vehicle based DTN is used. In this
example, if car 2 is parked in the shopping center and within
the Fog server B’s transmission range, it downloads this
movie into its local storage. Once this vehicle moves to the
transmission range of Fog server A,thismovieis uploadedto
it and this data dissemination is completed.
Fig- 1: Three Tier Architecture Based on Delay Tolerant
Network Technique
2.2 Hybrid Data Dissemination
Hybrid data disseminationis determinedbycontrol plane, as
shown in below Fig 2. Where Cloud provider in the control
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 131
plane has the global information to control the data plane.
The main data flow control algorithm conducted by Cloud
provider is illustrated in Algorithm, where Cloud provider
checks its global Fog server and content lists to determine
the Fog server that needed to be updated, and the required
content. It also checks which Fog server has this content. If
none of Fog server has this content, Cloud provider sends
updated content to that Fog server directly by using
traditional Cloud based techniques, such as broadband and
cellular networks. Other- wise, the DTN based data
dissemination is applied by using Algorithm 2 to choose
mobile devices, which are connecting with these selected
Fog servers, as carriers to provider DTN based data
dissemination services.
Fig- 2: Hybrid Data Dissemination Model in Fog
Computing
2.3 Algorithm
Step 1: Cloud provider compares its “Global Content List”
table with “Fog Server List” table to determine which Fog
server is needed to be updated. In this case, Fog sever Fd is
determined and content C needs to be update.
if There is no other Fog server having this content then
Cloud provider sends this content to the Fog server directly,
which is the same as traditional Cloud service and this
dissemination process is finished.
else Move to the next step
end if
Step 2: Cloud provider determines a list of Fog servers, <
Fc1, Fc2, Fc3, · · · >, which have this content.
Step 3: Algorithm is used to select n most suitable carriers,
Carrier n, to provide this DTN dissemination service.
if n greater than 0 then
Move to the next step
else Cloud provider sends this content to the Fog server
directly, which is the same as traditional Cloud service and
this dissemination process is finished.
end if
Step 4: Cloud provider sends “DTN Data Dissemination
Request” message to each of selected Fog servers to ask
them send the content C to Fd by using the carrier (mobile
device) determined in Step 3.
Step 5: Once a Fog server receives “DTN Data Dissemination
Request” message, it sends the content C along with the
destination, Fd, to the selected carrier.
if Content C is transferred to the selected carrier completely
then
This Fog server sends the “DTN Data Dissemination Accept”
message to its Cloud provider and move to the next step.
else This Fog server send the “DTN Data Dissemination
Decline” message toitsCloud provider. WhenCloudprovider
receives this message, it repeats Step 3 to get the “n+1” Fog
server, if it has, and continue from Step 4.
end if
Step 6: Once Fd receives the content C, it sends “DTN Data
Dissemination Acknowledgement” message to Cloud
provider.
Step 7: if Cloud provider receives the “DTN Data
Dissemination Acknowledgement” message within a pre-
defined period, T delay, then
It updates “Fog Server List” and “Global Content List” tables,
and this data dissemination is finished
else It repeats from the Step 1
end if
3. EXPERIMENTAL RESULTS
This following section shows snapshots of our system web
application. It shows how our system works and gives us
an idea about the system.
Fig- 3: Project Name in WampServer
The above screenshot shows the wampserver page with
project name.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 132
Fig- 4: Admin Login Page
The above screenshot shows the admin login page with
admin name and password.
Fig- 5: Image Files Uploaded By Admin
The above screenshot shows theimagefileswhichadminare
uploaded.
Fig- 6: Videos Uploaded By Admin
The above screenshot shows videos which are uploaded by
admin.
Fig- 7: Music Files Uploaded By Admin
The above screenshot shows music uploaded by admin.
Fig- 8: Different Types of Files
The above screenshot shows the types of files which are
uploaded by admin
Fig- 9: How to Insert New File
The above screenshot shows that how to upload newfiles on
the server page.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 133
Fig- 10: User Details
The above screenshot shows the user details.
4. CONCLUSION
We have outlined the vision and delayed key characteristics
Of Fog Computing, a platform to deliver a rich portfolio of
new services and applications at the edge of the network.
The motivating examples peppered throughout the
discussion range from conceptual visions to existing point
solution prototypes. We envision the Fog to be a unifying
platform, rich enough to deliver this new breed of emerging
services and enable the development of new applications
Future work will expand on the Fog computing paradigm in
Smart Grid. In this scenario, two models for Fog devices can
be developed. Independent Fog devicesconsultdirectlywith
the Cloud for periodic updates on price and demands, while
interconnected. Fog devices may consult each other, and
create coalitions for further enhancements.
ACKNOWLEDGEMENT
This work was supported in part by Prof. Nilima Nikam, Mr
Shubham gapat, Ms. Neelima Kamtam We gratefully
acknowledge the work of Yadavrao Tasgaonkar Institute of
Engineering and Technology.
REFERENCES
[1] F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, “Fog
computing and its role in the internet of things,”
in Proceedings of the First Edition of the MCC
Workshop on Mobile Cloud Computing, ser. MCC '12.
New York, NY, USA: ACM, 2012, pp. 13–16.
[2] Cisco, “Cisco delivers vision of fog computing to
accelerate value from billions of connected
devices,” Cisco Press Release, Jan 2014.
[3] T. H. Luan, L. Gao, Z. Li, Y. Xiang, and L. Sun, “Fog
Computing: Focusing on Mobile Users at the
Edge,” ArXiv e-prints, Feb. 2015.
[4] C. Stojmenovic and S. Wen, “The fog computing
paradigm: Scenarios and security issues,” in Computer
Science and Information Systems (FedCSIS), 2014
Federated Conference on, Sept 2014, pp. 1–8.
[5] R. Deng, R. Lu, C. Lai, T. H. Luan, and H. Liang, “Optimal
workload allocation in fog-cloud computing towards
balanced delay and power consumption,” IEEE Internet
of Things Journal, May 2016.
[6] A. Targhetta, D. Owen, and P. Gratz, “The design space
of ultra-lowenergy asymmetric cryptography,”
in Performance Analysis of Systems and Software
(ISPASS), 2014 IEEE International Symposium on, March
2014, pp. 55–65.
[7] R. Lu, X. Lin, H. Zhu, X. Shen, and B. Preiss, “Pi: A
practical incentive protocol for delay tolerant
networks,” Wireless Communications, IEEETransactions
on, vol. 9, no. 4, pp. 1483–1493, April 2010.
[8] A. Pentland, R. Fletcher, and A. Hasson, “DakNet:
rethinking connectivity in developing
nations,” Computer, vol. 37, no. 1, pp. 78–83, 2004.
[9] L. Gao, S. Yu, T. H. Luan, and W. Zhou, Delay Tolerant
Networks and Their Applications. Springer Publishing
Company, Incorporated, 2015.
[10] Y. Cao and Z. Sun, “Routing in delay/disruption tolerant
networks: A taxonomy, survey and challenges,”
Communications Surveys Tutorials, IEEE, vol. 15, no. 2,
pp. 654–677, Second 2013.
[11] A. Pentland, R. Fletcher, and A. Hasson, “DakNet:
rethinking connectivity in developing nations,”
Computer, vol. 37, no. 1, pp. 78–83, 2004.
[12] L. Gao, M. Li, A. Bonti, W. Zhou, and S. Yu,
“Multidimensional routingprotocol inhuman-associated
delay-tolerant networks,” Mobile Computing, IEEE
Transactions on, vol. 12, no. 11, pp. 2132–2144, Nov
2013.
[13] A. Targhetta, D. Owen, and P. Gratz, “The design spaceof
ultra-low energy asymmetric cryptography,” in
PerformanceAnalysisofSystemsandSoftware(ISPASS),
2014 IEEE International Symposiumon,March2014,pp.
55–65.
[14] X. Zhuo, W. Gao, G. Cao, and S. Hua, “An incentive
framework for cellular traffic offloading,” Mobile
Computing, IEEE Transactionson,vol.13, no.3, pp.541–
555, March 2014.

More Related Content

What's hot

HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRESHYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRESijcsit
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
WIRLESS CLOUD NETWORK
WIRLESS CLOUD NETWORKWIRLESS CLOUD NETWORK
WIRLESS CLOUD NETWORKAashish Pande
 
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...Sushil kumar Choudhary
 
Core of Cloud Computing
Core of Cloud ComputingCore of Cloud Computing
Core of Cloud ComputingIJERA Editor
 
Disambiguating Advanced Computing for Humanities Researchers
Disambiguating Advanced Computing for Humanities ResearchersDisambiguating Advanced Computing for Humanities Researchers
Disambiguating Advanced Computing for Humanities ResearchersBaden Hughes
 
Bt9002 grid computing 1
Bt9002 grid computing 1Bt9002 grid computing 1
Bt9002 grid computing 1Techglyphs
 
A survey of fog computing concepts applications and issues
A survey of fog computing concepts  applications and issuesA survey of fog computing concepts  applications and issues
A survey of fog computing concepts applications and issuesRezgar Mohammad
 
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...HarshitParkar6677
 
Cloud Computing Building A Framework For Successful Transition Gtsi
Cloud Computing   Building A Framework For Successful Transition   GtsiCloud Computing   Building A Framework For Successful Transition   Gtsi
Cloud Computing Building A Framework For Successful Transition Gtsijerry0040
 
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...IJCNCJournal
 
A New Improved Storage Model of Wireless Devices using the Cloud
A New Improved Storage Model of  Wireless  Devices using the CloudA New Improved Storage Model of  Wireless  Devices using the Cloud
A New Improved Storage Model of Wireless Devices using the CloudIJCNC
 
A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis...
A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis...A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis...
A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis...Eswar Publications
 
云计算及其应用
云计算及其应用云计算及其应用
云计算及其应用lantianlcdx
 

What's hot (19)

HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRESHYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
WIRLESS CLOUD NETWORK
WIRLESS CLOUD NETWORKWIRLESS CLOUD NETWORK
WIRLESS CLOUD NETWORK
 
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
 
Core of Cloud Computing
Core of Cloud ComputingCore of Cloud Computing
Core of Cloud Computing
 
Disambiguating Advanced Computing for Humanities Researchers
Disambiguating Advanced Computing for Humanities ResearchersDisambiguating Advanced Computing for Humanities Researchers
Disambiguating Advanced Computing for Humanities Researchers
 
G0314043
G0314043G0314043
G0314043
 
50120140502004
5012014050200450120140502004
50120140502004
 
Bt9002 grid computing 1
Bt9002 grid computing 1Bt9002 grid computing 1
Bt9002 grid computing 1
 
D0362035
D0362035D0362035
D0362035
 
A survey of fog computing concepts applications and issues
A survey of fog computing concepts  applications and issuesA survey of fog computing concepts  applications and issues
A survey of fog computing concepts applications and issues
 
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...
 
Cloud Computing Building A Framework For Successful Transition Gtsi
Cloud Computing   Building A Framework For Successful Transition   GtsiCloud Computing   Building A Framework For Successful Transition   Gtsi
Cloud Computing Building A Framework For Successful Transition Gtsi
 
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
 
A New Improved Storage Model of Wireless Devices using the Cloud
A New Improved Storage Model of  Wireless  Devices using the CloudA New Improved Storage Model of  Wireless  Devices using the Cloud
A New Improved Storage Model of Wireless Devices using the Cloud
 
Cloud versus cloud
Cloud versus cloudCloud versus cloud
Cloud versus cloud
 
A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis...
A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis...A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis...
A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis...
 
Untitled 1
Untitled 1Untitled 1
Untitled 1
 
云计算及其应用
云计算及其应用云计算及其应用
云计算及其应用
 

Similar to IRJET- Fog Route:Distribution of Data using Delay Tolerant Network

Security and privacy issues of fog
Security and privacy issues of fogSecurity and privacy issues of fog
Security and privacy issues of fogRezgar Mohammad
 
A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...IJECEIAES
 
Security and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A SurveySecurity and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A SurveyHarshitParkar6677
 
Green Cloud Computing :Emerging Technology
Green Cloud Computing :Emerging TechnologyGreen Cloud Computing :Emerging Technology
Green Cloud Computing :Emerging TechnologyIRJET Journal
 
IRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational LeapIRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational LeapIRJET Journal
 
IRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational LeapIRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational LeapIRJET Journal
 
Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...rajender147
 
Assessment to Delegate the Task to Cloud for Increasing Energy Efficiency of ...
Assessment to Delegate the Task to Cloud for Increasing Energy Efficiency of ...Assessment to Delegate the Task to Cloud for Increasing Energy Efficiency of ...
Assessment to Delegate the Task to Cloud for Increasing Energy Efficiency of ...IRJET Journal
 
Fog computing and internet of things
Fog computing and internet of thingsFog computing and internet of things
Fog computing and internet of thingsRahul Yadav
 
Efficient architectural framework of cloud computing
Efficient architectural framework of cloud computing Efficient architectural framework of cloud computing
Efficient architectural framework of cloud computing Souvik Pal
 
Decision to offload the task to Cloud for increasing energy efficiency of Mob...
Decision to offload the task to Cloud for increasing energy efficiency of Mob...Decision to offload the task to Cloud for increasing energy efficiency of Mob...
Decision to offload the task to Cloud for increasing energy efficiency of Mob...IRJET Journal
 
Energy Optimized Link Selection Algorithm for Mobile Cloud Computing
Energy Optimized Link Selection Algorithm for Mobile Cloud ComputingEnergy Optimized Link Selection Algorithm for Mobile Cloud Computing
Energy Optimized Link Selection Algorithm for Mobile Cloud ComputingEswar Publications
 
ENERGY EFFICIENT COMPUTING FOR SMART PHONES IN CLOUD ASSISTED ENVIRONMENT
ENERGY EFFICIENT COMPUTING FOR SMART PHONES IN CLOUD ASSISTED ENVIRONMENTENERGY EFFICIENT COMPUTING FOR SMART PHONES IN CLOUD ASSISTED ENVIRONMENT
ENERGY EFFICIENT COMPUTING FOR SMART PHONES IN CLOUD ASSISTED ENVIRONMENTIJCNCJournal
 
Clarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answersClarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answersRezgar Mohammad
 
Fog Computing – Enhancing the Maximum Energy Consumption of Data Servers.
Fog Computing – Enhancing the Maximum Energy Consumption of Data Servers.Fog Computing – Enhancing the Maximum Energy Consumption of Data Servers.
Fog Computing – Enhancing the Maximum Energy Consumption of Data Servers.dbpublications
 
Contemporary Energy Optimization for Mobile and Cloud Environment
Contemporary Energy Optimization for Mobile and Cloud EnvironmentContemporary Energy Optimization for Mobile and Cloud Environment
Contemporary Energy Optimization for Mobile and Cloud Environmentijceronline
 

Similar to IRJET- Fog Route:Distribution of Data using Delay Tolerant Network (20)

Security and privacy issues of fog
Security and privacy issues of fogSecurity and privacy issues of fog
Security and privacy issues of fog
 
A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...
 
Security and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A SurveySecurity and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A Survey
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Green Cloud Computing :Emerging Technology
Green Cloud Computing :Emerging TechnologyGreen Cloud Computing :Emerging Technology
Green Cloud Computing :Emerging Technology
 
IRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational LeapIRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational Leap
 
IRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational LeapIRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational Leap
 
Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...
 
Assessment to Delegate the Task to Cloud for Increasing Energy Efficiency of ...
Assessment to Delegate the Task to Cloud for Increasing Energy Efficiency of ...Assessment to Delegate the Task to Cloud for Increasing Energy Efficiency of ...
Assessment to Delegate the Task to Cloud for Increasing Energy Efficiency of ...
 
Fog computing and internet of things
Fog computing and internet of thingsFog computing and internet of things
Fog computing and internet of things
 
Efficient architectural framework of cloud computing
Efficient architectural framework of cloud computing Efficient architectural framework of cloud computing
Efficient architectural framework of cloud computing
 
fog computing
fog computingfog computing
fog computing
 
Decision to offload the task to Cloud for increasing energy efficiency of Mob...
Decision to offload the task to Cloud for increasing energy efficiency of Mob...Decision to offload the task to Cloud for increasing energy efficiency of Mob...
Decision to offload the task to Cloud for increasing energy efficiency of Mob...
 
Energy Optimized Link Selection Algorithm for Mobile Cloud Computing
Energy Optimized Link Selection Algorithm for Mobile Cloud ComputingEnergy Optimized Link Selection Algorithm for Mobile Cloud Computing
Energy Optimized Link Selection Algorithm for Mobile Cloud Computing
 
ENERGY EFFICIENT COMPUTING FOR SMART PHONES IN CLOUD ASSISTED ENVIRONMENT
ENERGY EFFICIENT COMPUTING FOR SMART PHONES IN CLOUD ASSISTED ENVIRONMENTENERGY EFFICIENT COMPUTING FOR SMART PHONES IN CLOUD ASSISTED ENVIRONMENT
ENERGY EFFICIENT COMPUTING FOR SMART PHONES IN CLOUD ASSISTED ENVIRONMENT
 
Clarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answersClarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answers
 
Fog Computing – Enhancing the Maximum Energy Consumption of Data Servers.
Fog Computing – Enhancing the Maximum Energy Consumption of Data Servers.Fog Computing – Enhancing the Maximum Energy Consumption of Data Servers.
Fog Computing – Enhancing the Maximum Energy Consumption of Data Servers.
 
Fog computing
Fog computing Fog computing
Fog computing
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Contemporary Energy Optimization for Mobile and Cloud Environment
Contemporary Energy Optimization for Mobile and Cloud EnvironmentContemporary Energy Optimization for Mobile and Cloud Environment
Contemporary Energy Optimization for Mobile and Cloud Environment
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...Call Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 

Recently uploaded (20)

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 

IRJET- Fog Route:Distribution of Data using Delay Tolerant Network

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 129 Fog Route: Distribution of Data using Delay Tolerant Network Vidya Dorge1, Shubham Gapat2, Neelima Kamtam3, Nilima Nikam4 1,2,3Student, Dept. of Computer Science and Engineering, YTIET College, Karjat, India 4Professer, Dept. of Computer Science and Engineering, YTIET College, Karjat, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Fog Computing is an extension of Cloud Computing. As in a Cloud, Fog computing also provides data, compute, storage, and application services to end-users. The difference is Fog provides proximity to its end users through dense geographical distribution and it also supports mobility. Access points or set-up boxes are used as end devices to host services at the network. These end devices are also termed as edge network. Fog computing improves the Quality of service and also reduces latency. A Fog computing system is of a three tier Mobile-Fog-Cloud structure; mobile user getsservice from Fog servers using local wireless connections, and Fog servers update their contents from Cloud using the cellular or wired networks. This, however, may suffer high content update cost when the bandwidth between the Fog and Cloud servers is expensive, e.g., using the cellular network, and is therefore inefficient for non-urgent, high volume contents. Inthispaper, we address the issue by proposing a hybriddatadissemination framework which applies DTN (delay tolerable network) approaches in Fog computing. We decompose the Fog computing network architecture with two planes, where the cloud is a control plane to process content update queries and organize data flows, and the geometrically distributed Fog servers form a data plane to disseminate data among Fog servers with delay tolerant network technique. Key Words: Fog Computing, Delay Tolerant Network, Data Dissemination 1. INTRODUCTION Fog computing – a term created by Cisco that refers to extending cloud computing to the edge of an enterprise's network. Also known as edge computing or fogging, fog computing facilitates the operation of compute, storage,and networking services between end devices and cloud computing data centers. While edge computing is typically referred to the location where services are instantiated, fog computing implies distribution of the communication, computation, and storage resources and services onorclose to devices and systems in the control of end-users. Fog computing is a medium weight and intermediate level of computing power. Rather than a substitute, fog computing often serves as a complement to cloud computing. Fog computing concept, actually a Cloud computing close to the ‘ground’, creates automated response that drives the value. Both Cloud and Fog provide data, computation, storage and application services to end-users. However, Fog can be distinguished from Cloud by its proximity to end-users, the dense geographical distribution and its supportformobility. Fog computing typically has a three-tier Mobile-Fog-Cloud structure [3]. In the Mobile tier, it could include all wireless devices, such as smartphones, tablets, laptops. In the Fog tier, Fog servers provide services to the end users and synchronize data with the Cloud. In the Cloud tier, Cloud provider provides content service required by geo- distributed Fog servers. Data dissemination between a mobile user and a Fog server is occurred when this mobile user retrieves content. If this Fog server has the required content, it sends the content to the mobile user. Otherwise, this Fog server needs to send a query to its Cloudprovider to find and download it into its local storage. On another side, Fog servers need to regularly check with their Cloud providers whether the Fog servers have the updated contents or not; if not, they need to update their storage by retrieving from the Cloud via either wired or wireless networks, e.g., cellar networks. Such data disseminations may involve a huge cost due to the large data volume. According to the report from Cisco [4], the overall mobile data traffic is expected to grow to 24.3 exabytes per month by 2019 and more traffic will be offloaded from cellular networks, such as Fog devices, than remains on cellular networks by 2016. 1.1 Related Work 1.1.1 Cloud computing Cloud computing, [5] a kind of Internet-based paradigm, refers to both the applications delivered as services overthe Internet and the hardware and software in the data centers that provide these services. The research on cloud computing has attractedgreatattentionwitha largequantity of literatures. For example, Armbruster et al. quantify comparisons between cloud and conventional computing, and identify the top technical and non-technical obstacles and opportunities of cloud computing. The emergence of cloud computing has established a trend towards building massive, energy-hungry, and geographically distributed Internet data centers as cloud servers. Due to their enormous energy consumption, Rao etal. [13], [14] investigate how to coordinate the collection of data centers so as to minimize the electricity expense while maintaining the quality of the cloud computingservice. Ourwork extends from the existing related papers on cloud computing to a newly emerged paradigm named fog computing. However, the transition is not trivial, since fog is quite different cloud in terms of location, distribution, and computing capability.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 130 1.1.2 Fog Computing in Distributed Data Management In the paper given in [1] emerging area of the Internet of Things (IoT), the exponential growth of the numberofsmart devices leads to a growing need for efficient data storage mechanisms. Cloud Computing was an efficient solution so far to store and manipulate such huge amount of data. However, in the next years it is expected that Cloud Computing will be unable to handle the huge amount of the IoT devices efficiently due to bandwidth limitations. An arising technology which promises to overwhelm many drawbacks in large-scale networks in IoT is Fog Computing. Computational power and storage capacity could be offered from the Fog, with low latency and high bandwidth. This survey discusses the main features of Fog Computing, introduces representative simulators and tools, highlights the benefits of Fog Computing in line withtheapplicationsof large-scale IoT networks, and identifies various aspects of issues we may encounter when designing andimplementing social IoT systems in the context of the Fog Computing paradigm. 1.1.3 Delay tolerant network Nowadays, theresearchand applicationaboutdelay-tolerant network (DTN) have become moreandmorepopular.DTNis a new kind of network derived from deep space communication. Differed with traditional network, DTN network has the followingseveral characteristics:longdelay, limited resources, interval connectivity, asymmetric data rate, low signal to noise ratio, and high error rate. In this paper, we present the developmentand basic characteristics of DTN, and discuss the network architecture in details. In addition, the issues of reliability transmission, congestion control, security and applications are also be covered in this paper [2]. 1.1.4 Dissemination based on Delay Tolerant Network Technique For high volume and non-urgent data, it is not wise to use expensive network transmission techniques. Instead, delay tolerant network technique could be used to provide data dissemination between Fog servers and between mobile users and Fog servers as well. Delay Tolerant Network (DTN)[9] [10] is featured with long latency and unstable network topology, where end-to-end delay canbemeasured in hours or days and data dissemination paths maynotexist. Data dissemination in DTN uses store-carry- forward techniques; if there is no connection available at a particular time, the source node needs to store and carry the message until the next available node isencountered.DakNetisa DTN technique based application and developed by researchers from the MIT Media Lab. It has been deployed in remote parts of Cambodia and India at a cost two orders of magnitude less compared to traditional landlines networks. DakNet uses existing communications and transport infrastructure to form a delay tolerant network, where it combines physical transportation with a wireless data transferal function to extend Internet connectivity to a central hub, such as cyberspace or a post office. DakNetdoes not need to relay data over a long distance, which is an advantage because it would reduce costs and save a lot of power. Instead, DakNet transmits data over short point-to- point links between kiosks and portable storage devices called mobile access points (MAPs). A MAP can exchange data among public kiosks, Internet enableddevicesand non- Internet accessed hubs by using mobile generatorsmounted on and powered by a bus or motorcycle. 2. System Design and Model 2.1 System Architecture To have an efficient data dissemination in Fog computing, DTN is used to offload data transmitted among Fog servers. In Fig, if Fog server A has some small contents, such asa new video ads, but Fog server B does not. In previous, Fog server B needs to get the update from Cloud server directly. With DTN technique, user 1 could download this content when he has a coffee in this cafe shop. After a couple of hours, he goes to shopping center for shopping. When he moves into the transmission range of Fog server B, this content storied in user 1’s mobile device automatically upload to Fog server B and this store-carry-forward process is finished. For large content, e.g. a high definition movie, transmitted from Fog server B to Fog server A, vehicle based DTN is used. In this example, if car 2 is parked in the shopping center and within the Fog server B’s transmission range, it downloads this movie into its local storage. Once this vehicle moves to the transmission range of Fog server A,thismovieis uploadedto it and this data dissemination is completed. Fig- 1: Three Tier Architecture Based on Delay Tolerant Network Technique 2.2 Hybrid Data Dissemination Hybrid data disseminationis determinedbycontrol plane, as shown in below Fig 2. Where Cloud provider in the control
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 131 plane has the global information to control the data plane. The main data flow control algorithm conducted by Cloud provider is illustrated in Algorithm, where Cloud provider checks its global Fog server and content lists to determine the Fog server that needed to be updated, and the required content. It also checks which Fog server has this content. If none of Fog server has this content, Cloud provider sends updated content to that Fog server directly by using traditional Cloud based techniques, such as broadband and cellular networks. Other- wise, the DTN based data dissemination is applied by using Algorithm 2 to choose mobile devices, which are connecting with these selected Fog servers, as carriers to provider DTN based data dissemination services. Fig- 2: Hybrid Data Dissemination Model in Fog Computing 2.3 Algorithm Step 1: Cloud provider compares its “Global Content List” table with “Fog Server List” table to determine which Fog server is needed to be updated. In this case, Fog sever Fd is determined and content C needs to be update. if There is no other Fog server having this content then Cloud provider sends this content to the Fog server directly, which is the same as traditional Cloud service and this dissemination process is finished. else Move to the next step end if Step 2: Cloud provider determines a list of Fog servers, < Fc1, Fc2, Fc3, · · · >, which have this content. Step 3: Algorithm is used to select n most suitable carriers, Carrier n, to provide this DTN dissemination service. if n greater than 0 then Move to the next step else Cloud provider sends this content to the Fog server directly, which is the same as traditional Cloud service and this dissemination process is finished. end if Step 4: Cloud provider sends “DTN Data Dissemination Request” message to each of selected Fog servers to ask them send the content C to Fd by using the carrier (mobile device) determined in Step 3. Step 5: Once a Fog server receives “DTN Data Dissemination Request” message, it sends the content C along with the destination, Fd, to the selected carrier. if Content C is transferred to the selected carrier completely then This Fog server sends the “DTN Data Dissemination Accept” message to its Cloud provider and move to the next step. else This Fog server send the “DTN Data Dissemination Decline” message toitsCloud provider. WhenCloudprovider receives this message, it repeats Step 3 to get the “n+1” Fog server, if it has, and continue from Step 4. end if Step 6: Once Fd receives the content C, it sends “DTN Data Dissemination Acknowledgement” message to Cloud provider. Step 7: if Cloud provider receives the “DTN Data Dissemination Acknowledgement” message within a pre- defined period, T delay, then It updates “Fog Server List” and “Global Content List” tables, and this data dissemination is finished else It repeats from the Step 1 end if 3. EXPERIMENTAL RESULTS This following section shows snapshots of our system web application. It shows how our system works and gives us an idea about the system. Fig- 3: Project Name in WampServer The above screenshot shows the wampserver page with project name.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 132 Fig- 4: Admin Login Page The above screenshot shows the admin login page with admin name and password. Fig- 5: Image Files Uploaded By Admin The above screenshot shows theimagefileswhichadminare uploaded. Fig- 6: Videos Uploaded By Admin The above screenshot shows videos which are uploaded by admin. Fig- 7: Music Files Uploaded By Admin The above screenshot shows music uploaded by admin. Fig- 8: Different Types of Files The above screenshot shows the types of files which are uploaded by admin Fig- 9: How to Insert New File The above screenshot shows that how to upload newfiles on the server page.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 133 Fig- 10: User Details The above screenshot shows the user details. 4. CONCLUSION We have outlined the vision and delayed key characteristics Of Fog Computing, a platform to deliver a rich portfolio of new services and applications at the edge of the network. The motivating examples peppered throughout the discussion range from conceptual visions to existing point solution prototypes. We envision the Fog to be a unifying platform, rich enough to deliver this new breed of emerging services and enable the development of new applications Future work will expand on the Fog computing paradigm in Smart Grid. In this scenario, two models for Fog devices can be developed. Independent Fog devicesconsultdirectlywith the Cloud for periodic updates on price and demands, while interconnected. Fog devices may consult each other, and create coalitions for further enhancements. ACKNOWLEDGEMENT This work was supported in part by Prof. Nilima Nikam, Mr Shubham gapat, Ms. Neelima Kamtam We gratefully acknowledge the work of Yadavrao Tasgaonkar Institute of Engineering and Technology. REFERENCES [1] F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, “Fog computing and its role in the internet of things,” in Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, ser. MCC '12. New York, NY, USA: ACM, 2012, pp. 13–16. [2] Cisco, “Cisco delivers vision of fog computing to accelerate value from billions of connected devices,” Cisco Press Release, Jan 2014. [3] T. H. Luan, L. Gao, Z. Li, Y. Xiang, and L. Sun, “Fog Computing: Focusing on Mobile Users at the Edge,” ArXiv e-prints, Feb. 2015. [4] C. Stojmenovic and S. Wen, “The fog computing paradigm: Scenarios and security issues,” in Computer Science and Information Systems (FedCSIS), 2014 Federated Conference on, Sept 2014, pp. 1–8. [5] R. Deng, R. Lu, C. Lai, T. H. Luan, and H. Liang, “Optimal workload allocation in fog-cloud computing towards balanced delay and power consumption,” IEEE Internet of Things Journal, May 2016. [6] A. Targhetta, D. Owen, and P. Gratz, “The design space of ultra-lowenergy asymmetric cryptography,” in Performance Analysis of Systems and Software (ISPASS), 2014 IEEE International Symposium on, March 2014, pp. 55–65. [7] R. Lu, X. Lin, H. Zhu, X. Shen, and B. Preiss, “Pi: A practical incentive protocol for delay tolerant networks,” Wireless Communications, IEEETransactions on, vol. 9, no. 4, pp. 1483–1493, April 2010. [8] A. Pentland, R. Fletcher, and A. Hasson, “DakNet: rethinking connectivity in developing nations,” Computer, vol. 37, no. 1, pp. 78–83, 2004. [9] L. Gao, S. Yu, T. H. Luan, and W. Zhou, Delay Tolerant Networks and Their Applications. Springer Publishing Company, Incorporated, 2015. [10] Y. Cao and Z. Sun, “Routing in delay/disruption tolerant networks: A taxonomy, survey and challenges,” Communications Surveys Tutorials, IEEE, vol. 15, no. 2, pp. 654–677, Second 2013. [11] A. Pentland, R. Fletcher, and A. Hasson, “DakNet: rethinking connectivity in developing nations,” Computer, vol. 37, no. 1, pp. 78–83, 2004. [12] L. Gao, M. Li, A. Bonti, W. Zhou, and S. Yu, “Multidimensional routingprotocol inhuman-associated delay-tolerant networks,” Mobile Computing, IEEE Transactions on, vol. 12, no. 11, pp. 2132–2144, Nov 2013. [13] A. Targhetta, D. Owen, and P. Gratz, “The design spaceof ultra-low energy asymmetric cryptography,” in PerformanceAnalysisofSystemsandSoftware(ISPASS), 2014 IEEE International Symposiumon,March2014,pp. 55–65. [14] X. Zhuo, W. Gao, G. Cao, and S. Hua, “An incentive framework for cellular traffic offloading,” Mobile Computing, IEEE Transactionson,vol.13, no.3, pp.541– 555, March 2014.