Submit Search
Upload
IRJET- Fog Route:Distribution of Data using Delay Tolerant Network
•
0 likes
•
32 views
IRJET Journal
Follow
https://blog.irjet.net/archives/V6/i4/IRJET-V6I427.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 5
Download now
Download to read offline
Recommended
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...
IJERA Editor
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
IJECEIAES
Fog Computing and Its Role in the Internet of Things
Fog Computing and Its Role in the Internet of Things
HarshitParkar6677
Fog security
Fog security
HarshitParkar6677
Fog Computing: Issues, Challenges and Future Directions
Fog Computing: Issues, Challenges and Future Directions
IJECEIAES
Bandwidth Management on Cloud Computing Network
Bandwidth Management on Cloud Computing Network
iosrjce
Cloud computing pros and cons for computer forensic investigations
Cloud computing pros and cons for computer forensic investigations
poojagupta010
IRJET- Advantages of Mobile Cloud Computing
IRJET- Advantages of Mobile Cloud Computing
IRJET Journal
Recommended
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...
IJERA Editor
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
IJECEIAES
Fog Computing and Its Role in the Internet of Things
Fog Computing and Its Role in the Internet of Things
HarshitParkar6677
Fog security
Fog security
HarshitParkar6677
Fog Computing: Issues, Challenges and Future Directions
Fog Computing: Issues, Challenges and Future Directions
IJECEIAES
Bandwidth Management on Cloud Computing Network
Bandwidth Management on Cloud Computing Network
iosrjce
Cloud computing pros and cons for computer forensic investigations
Cloud computing pros and cons for computer forensic investigations
poojagupta010
IRJET- Advantages of Mobile Cloud Computing
IRJET- Advantages of Mobile Cloud Computing
IRJET Journal
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
ijcsit
International Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
WIRLESS CLOUD NETWORK
WIRLESS CLOUD NETWORK
Aashish Pande
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
Sushil kumar Choudhary
Core of Cloud Computing
Core of Cloud Computing
IJERA Editor
Disambiguating Advanced Computing for Humanities Researchers
Disambiguating Advanced Computing for Humanities Researchers
Baden Hughes
G0314043
G0314043
iosrjournals
50120140502004
50120140502004
IAEME Publication
Bt9002 grid computing 1
Bt9002 grid computing 1
Techglyphs
D0362035
D0362035
iosrjournals
A survey of fog computing concepts applications and issues
A survey of fog computing concepts applications and issues
Rezgar Mohammad
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...
HarshitParkar6677
Cloud Computing Building A Framework For Successful Transition Gtsi
Cloud Computing Building A Framework For Successful Transition Gtsi
jerry0040
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
IJCNCJournal
A New Improved Storage Model of Wireless Devices using the Cloud
A New Improved Storage Model of Wireless Devices using the Cloud
IJCNC
Cloud versus cloud
Cloud versus cloud
Masoud Gholami
A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis...
A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis...
Eswar Publications
Untitled 1
Untitled 1
ajayzkumarz
云计算及其应用
云计算及其应用
lantianlcdx
Security and privacy issues of fog
Security and privacy issues of fog
Rezgar Mohammad
A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...
IJECEIAES
Security and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A Survey
HarshitParkar6677
More Related Content
What's hot
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
ijcsit
International Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
WIRLESS CLOUD NETWORK
WIRLESS CLOUD NETWORK
Aashish Pande
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
Sushil kumar Choudhary
Core of Cloud Computing
Core of Cloud Computing
IJERA Editor
Disambiguating Advanced Computing for Humanities Researchers
Disambiguating Advanced Computing for Humanities Researchers
Baden Hughes
G0314043
G0314043
iosrjournals
50120140502004
50120140502004
IAEME Publication
Bt9002 grid computing 1
Bt9002 grid computing 1
Techglyphs
D0362035
D0362035
iosrjournals
A survey of fog computing concepts applications and issues
A survey of fog computing concepts applications and issues
Rezgar Mohammad
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...
HarshitParkar6677
Cloud Computing Building A Framework For Successful Transition Gtsi
Cloud Computing Building A Framework For Successful Transition Gtsi
jerry0040
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
IJCNCJournal
A New Improved Storage Model of Wireless Devices using the Cloud
A New Improved Storage Model of Wireless Devices using the Cloud
IJCNC
Cloud versus cloud
Cloud versus cloud
Masoud Gholami
A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis...
A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis...
Eswar Publications
Untitled 1
Untitled 1
ajayzkumarz
云计算及其应用
云计算及其应用
lantianlcdx
What's hot
(19)
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
International Journal of Engineering Research and Development
International Journal of Engineering Research and Development
WIRLESS CLOUD NETWORK
WIRLESS CLOUD NETWORK
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
Core of Cloud Computing
Core of Cloud Computing
Disambiguating Advanced Computing for Humanities Researchers
Disambiguating Advanced Computing for Humanities Researchers
G0314043
G0314043
50120140502004
50120140502004
Bt9002 grid computing 1
Bt9002 grid computing 1
D0362035
D0362035
A survey of fog computing concepts applications and issues
A survey of fog computing concepts applications and issues
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...
Cloud Computing Building A Framework For Successful Transition Gtsi
Cloud Computing Building A Framework For Successful Transition Gtsi
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
A New Improved Storage Model of Wireless Devices using the Cloud
A New Improved Storage Model of Wireless Devices using the Cloud
Cloud versus cloud
Cloud versus cloud
A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis...
A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis...
Untitled 1
Untitled 1
云计算及其应用
云计算及其应用
Similar to IRJET- Fog Route:Distribution of Data using Delay Tolerant Network
Security and privacy issues of fog
Security and privacy issues of fog
Rezgar Mohammad
A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...
IJECEIAES
Security and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A Survey
HarshitParkar6677
Fog Computing
Fog Computing
IRJET Journal
Green Cloud Computing :Emerging Technology
Green Cloud Computing :Emerging Technology
IRJET Journal
IRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational Leap
IRJET Journal
IRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational Leap
IRJET Journal
Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...
rajender147
Assessment to Delegate the Task to Cloud for Increasing Energy Efficiency of ...
Assessment to Delegate the Task to Cloud for Increasing Energy Efficiency of ...
IRJET Journal
Fog computing and internet of things
Fog computing and internet of things
Rahul Yadav
Efficient architectural framework of cloud computing
Efficient architectural framework of cloud computing
Souvik Pal
fog computing
fog computing
AMITTRIPATHI182
Decision to offload the task to Cloud for increasing energy efficiency of Mob...
Decision to offload the task to Cloud for increasing energy efficiency of Mob...
IRJET Journal
Energy Optimized Link Selection Algorithm for Mobile Cloud Computing
Energy Optimized Link Selection Algorithm for Mobile Cloud Computing
Eswar Publications
ENERGY EFFICIENT COMPUTING FOR SMART PHONES IN CLOUD ASSISTED ENVIRONMENT
ENERGY EFFICIENT COMPUTING FOR SMART PHONES IN CLOUD ASSISTED ENVIRONMENT
IJCNCJournal
Clarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answers
Rezgar Mohammad
Fog Computing – Enhancing the Maximum Energy Consumption of Data Servers.
Fog Computing – Enhancing the Maximum Energy Consumption of Data Servers.
dbpublications
Fog computing
Fog computing
Pachipulusu Giridhar
Fog Computing
Fog Computing
Pachipulusu Giridhar
Contemporary Energy Optimization for Mobile and Cloud Environment
Contemporary Energy Optimization for Mobile and Cloud Environment
ijceronline
Similar to IRJET- Fog Route:Distribution of Data using Delay Tolerant Network
(20)
Security and privacy issues of fog
Security and privacy issues of fog
A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...
Security and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A Survey
Fog Computing
Fog Computing
Green Cloud Computing :Emerging Technology
Green Cloud Computing :Emerging Technology
IRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational Leap
Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...
Assessment to Delegate the Task to Cloud for Increasing Energy Efficiency of ...
Assessment to Delegate the Task to Cloud for Increasing Energy Efficiency of ...
Fog computing and internet of things
Fog computing and internet of things
Efficient architectural framework of cloud computing
Efficient architectural framework of cloud computing
fog computing
fog computing
Decision to offload the task to Cloud for increasing energy efficiency of Mob...
Decision to offload the task to Cloud for increasing energy efficiency of Mob...
Energy Optimized Link Selection Algorithm for Mobile Cloud Computing
Energy Optimized Link Selection Algorithm for Mobile Cloud Computing
ENERGY EFFICIENT COMPUTING FOR SMART PHONES IN CLOUD ASSISTED ENVIRONMENT
ENERGY EFFICIENT COMPUTING FOR SMART PHONES IN CLOUD ASSISTED ENVIRONMENT
Clarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answers
Fog Computing – Enhancing the Maximum Energy Consumption of Data Servers.
Fog Computing – Enhancing the Maximum Energy Consumption of Data Servers.
Fog computing
Fog computing
Fog Computing
Fog Computing
Contemporary Energy Optimization for Mobile and Cloud Environment
Contemporary Energy Optimization for Mobile and Cloud Environment
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
Asutosh Ranjan
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
upamatechverse
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
DeepakSakkari2
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
AbhinavSharma374939
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ranjana rawat
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
Call Girls in Nagpur High Profile
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
ranjana rawat
Internship report on mechanical engineering
Internship report on mechanical engineering
malavadedarshan25
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Tsuyoshi Horigome
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZTE
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Suman Mia
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
ranjana rawat
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
SIVASHANKAR N
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
Recently uploaded
(20)
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
Internship report on mechanical engineering
Internship report on mechanical engineering
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
IRJET- Fog Route:Distribution of Data using Delay Tolerant Network
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 129 Fog Route: Distribution of Data using Delay Tolerant Network Vidya Dorge1, Shubham Gapat2, Neelima Kamtam3, Nilima Nikam4 1,2,3Student, Dept. of Computer Science and Engineering, YTIET College, Karjat, India 4Professer, Dept. of Computer Science and Engineering, YTIET College, Karjat, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Fog Computing is an extension of Cloud Computing. As in a Cloud, Fog computing also provides data, compute, storage, and application services to end-users. The difference is Fog provides proximity to its end users through dense geographical distribution and it also supports mobility. Access points or set-up boxes are used as end devices to host services at the network. These end devices are also termed as edge network. Fog computing improves the Quality of service and also reduces latency. A Fog computing system is of a three tier Mobile-Fog-Cloud structure; mobile user getsservice from Fog servers using local wireless connections, and Fog servers update their contents from Cloud using the cellular or wired networks. This, however, may suffer high content update cost when the bandwidth between the Fog and Cloud servers is expensive, e.g., using the cellular network, and is therefore inefficient for non-urgent, high volume contents. Inthispaper, we address the issue by proposing a hybriddatadissemination framework which applies DTN (delay tolerable network) approaches in Fog computing. We decompose the Fog computing network architecture with two planes, where the cloud is a control plane to process content update queries and organize data flows, and the geometrically distributed Fog servers form a data plane to disseminate data among Fog servers with delay tolerant network technique. Key Words: Fog Computing, Delay Tolerant Network, Data Dissemination 1. INTRODUCTION Fog computing – a term created by Cisco that refers to extending cloud computing to the edge of an enterprise's network. Also known as edge computing or fogging, fog computing facilitates the operation of compute, storage,and networking services between end devices and cloud computing data centers. While edge computing is typically referred to the location where services are instantiated, fog computing implies distribution of the communication, computation, and storage resources and services onorclose to devices and systems in the control of end-users. Fog computing is a medium weight and intermediate level of computing power. Rather than a substitute, fog computing often serves as a complement to cloud computing. Fog computing concept, actually a Cloud computing close to the ‘ground’, creates automated response that drives the value. Both Cloud and Fog provide data, computation, storage and application services to end-users. However, Fog can be distinguished from Cloud by its proximity to end-users, the dense geographical distribution and its supportformobility. Fog computing typically has a three-tier Mobile-Fog-Cloud structure [3]. In the Mobile tier, it could include all wireless devices, such as smartphones, tablets, laptops. In the Fog tier, Fog servers provide services to the end users and synchronize data with the Cloud. In the Cloud tier, Cloud provider provides content service required by geo- distributed Fog servers. Data dissemination between a mobile user and a Fog server is occurred when this mobile user retrieves content. If this Fog server has the required content, it sends the content to the mobile user. Otherwise, this Fog server needs to send a query to its Cloudprovider to find and download it into its local storage. On another side, Fog servers need to regularly check with their Cloud providers whether the Fog servers have the updated contents or not; if not, they need to update their storage by retrieving from the Cloud via either wired or wireless networks, e.g., cellar networks. Such data disseminations may involve a huge cost due to the large data volume. According to the report from Cisco [4], the overall mobile data traffic is expected to grow to 24.3 exabytes per month by 2019 and more traffic will be offloaded from cellular networks, such as Fog devices, than remains on cellular networks by 2016. 1.1 Related Work 1.1.1 Cloud computing Cloud computing, [5] a kind of Internet-based paradigm, refers to both the applications delivered as services overthe Internet and the hardware and software in the data centers that provide these services. The research on cloud computing has attractedgreatattentionwitha largequantity of literatures. For example, Armbruster et al. quantify comparisons between cloud and conventional computing, and identify the top technical and non-technical obstacles and opportunities of cloud computing. The emergence of cloud computing has established a trend towards building massive, energy-hungry, and geographically distributed Internet data centers as cloud servers. Due to their enormous energy consumption, Rao etal. [13], [14] investigate how to coordinate the collection of data centers so as to minimize the electricity expense while maintaining the quality of the cloud computingservice. Ourwork extends from the existing related papers on cloud computing to a newly emerged paradigm named fog computing. However, the transition is not trivial, since fog is quite different cloud in terms of location, distribution, and computing capability.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 130 1.1.2 Fog Computing in Distributed Data Management In the paper given in [1] emerging area of the Internet of Things (IoT), the exponential growth of the numberofsmart devices leads to a growing need for efficient data storage mechanisms. Cloud Computing was an efficient solution so far to store and manipulate such huge amount of data. However, in the next years it is expected that Cloud Computing will be unable to handle the huge amount of the IoT devices efficiently due to bandwidth limitations. An arising technology which promises to overwhelm many drawbacks in large-scale networks in IoT is Fog Computing. Computational power and storage capacity could be offered from the Fog, with low latency and high bandwidth. This survey discusses the main features of Fog Computing, introduces representative simulators and tools, highlights the benefits of Fog Computing in line withtheapplicationsof large-scale IoT networks, and identifies various aspects of issues we may encounter when designing andimplementing social IoT systems in the context of the Fog Computing paradigm. 1.1.3 Delay tolerant network Nowadays, theresearchand applicationaboutdelay-tolerant network (DTN) have become moreandmorepopular.DTNis a new kind of network derived from deep space communication. Differed with traditional network, DTN network has the followingseveral characteristics:longdelay, limited resources, interval connectivity, asymmetric data rate, low signal to noise ratio, and high error rate. In this paper, we present the developmentand basic characteristics of DTN, and discuss the network architecture in details. In addition, the issues of reliability transmission, congestion control, security and applications are also be covered in this paper [2]. 1.1.4 Dissemination based on Delay Tolerant Network Technique For high volume and non-urgent data, it is not wise to use expensive network transmission techniques. Instead, delay tolerant network technique could be used to provide data dissemination between Fog servers and between mobile users and Fog servers as well. Delay Tolerant Network (DTN)[9] [10] is featured with long latency and unstable network topology, where end-to-end delay canbemeasured in hours or days and data dissemination paths maynotexist. Data dissemination in DTN uses store-carry- forward techniques; if there is no connection available at a particular time, the source node needs to store and carry the message until the next available node isencountered.DakNetisa DTN technique based application and developed by researchers from the MIT Media Lab. It has been deployed in remote parts of Cambodia and India at a cost two orders of magnitude less compared to traditional landlines networks. DakNet uses existing communications and transport infrastructure to form a delay tolerant network, where it combines physical transportation with a wireless data transferal function to extend Internet connectivity to a central hub, such as cyberspace or a post office. DakNetdoes not need to relay data over a long distance, which is an advantage because it would reduce costs and save a lot of power. Instead, DakNet transmits data over short point-to- point links between kiosks and portable storage devices called mobile access points (MAPs). A MAP can exchange data among public kiosks, Internet enableddevicesand non- Internet accessed hubs by using mobile generatorsmounted on and powered by a bus or motorcycle. 2. System Design and Model 2.1 System Architecture To have an efficient data dissemination in Fog computing, DTN is used to offload data transmitted among Fog servers. In Fig, if Fog server A has some small contents, such asa new video ads, but Fog server B does not. In previous, Fog server B needs to get the update from Cloud server directly. With DTN technique, user 1 could download this content when he has a coffee in this cafe shop. After a couple of hours, he goes to shopping center for shopping. When he moves into the transmission range of Fog server B, this content storied in user 1’s mobile device automatically upload to Fog server B and this store-carry-forward process is finished. For large content, e.g. a high definition movie, transmitted from Fog server B to Fog server A, vehicle based DTN is used. In this example, if car 2 is parked in the shopping center and within the Fog server B’s transmission range, it downloads this movie into its local storage. Once this vehicle moves to the transmission range of Fog server A,thismovieis uploadedto it and this data dissemination is completed. Fig- 1: Three Tier Architecture Based on Delay Tolerant Network Technique 2.2 Hybrid Data Dissemination Hybrid data disseminationis determinedbycontrol plane, as shown in below Fig 2. Where Cloud provider in the control
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 131 plane has the global information to control the data plane. The main data flow control algorithm conducted by Cloud provider is illustrated in Algorithm, where Cloud provider checks its global Fog server and content lists to determine the Fog server that needed to be updated, and the required content. It also checks which Fog server has this content. If none of Fog server has this content, Cloud provider sends updated content to that Fog server directly by using traditional Cloud based techniques, such as broadband and cellular networks. Other- wise, the DTN based data dissemination is applied by using Algorithm 2 to choose mobile devices, which are connecting with these selected Fog servers, as carriers to provider DTN based data dissemination services. Fig- 2: Hybrid Data Dissemination Model in Fog Computing 2.3 Algorithm Step 1: Cloud provider compares its “Global Content List” table with “Fog Server List” table to determine which Fog server is needed to be updated. In this case, Fog sever Fd is determined and content C needs to be update. if There is no other Fog server having this content then Cloud provider sends this content to the Fog server directly, which is the same as traditional Cloud service and this dissemination process is finished. else Move to the next step end if Step 2: Cloud provider determines a list of Fog servers, < Fc1, Fc2, Fc3, · · · >, which have this content. Step 3: Algorithm is used to select n most suitable carriers, Carrier n, to provide this DTN dissemination service. if n greater than 0 then Move to the next step else Cloud provider sends this content to the Fog server directly, which is the same as traditional Cloud service and this dissemination process is finished. end if Step 4: Cloud provider sends “DTN Data Dissemination Request” message to each of selected Fog servers to ask them send the content C to Fd by using the carrier (mobile device) determined in Step 3. Step 5: Once a Fog server receives “DTN Data Dissemination Request” message, it sends the content C along with the destination, Fd, to the selected carrier. if Content C is transferred to the selected carrier completely then This Fog server sends the “DTN Data Dissemination Accept” message to its Cloud provider and move to the next step. else This Fog server send the “DTN Data Dissemination Decline” message toitsCloud provider. WhenCloudprovider receives this message, it repeats Step 3 to get the “n+1” Fog server, if it has, and continue from Step 4. end if Step 6: Once Fd receives the content C, it sends “DTN Data Dissemination Acknowledgement” message to Cloud provider. Step 7: if Cloud provider receives the “DTN Data Dissemination Acknowledgement” message within a pre- defined period, T delay, then It updates “Fog Server List” and “Global Content List” tables, and this data dissemination is finished else It repeats from the Step 1 end if 3. EXPERIMENTAL RESULTS This following section shows snapshots of our system web application. It shows how our system works and gives us an idea about the system. Fig- 3: Project Name in WampServer The above screenshot shows the wampserver page with project name.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 132 Fig- 4: Admin Login Page The above screenshot shows the admin login page with admin name and password. Fig- 5: Image Files Uploaded By Admin The above screenshot shows theimagefileswhichadminare uploaded. Fig- 6: Videos Uploaded By Admin The above screenshot shows videos which are uploaded by admin. Fig- 7: Music Files Uploaded By Admin The above screenshot shows music uploaded by admin. Fig- 8: Different Types of Files The above screenshot shows the types of files which are uploaded by admin Fig- 9: How to Insert New File The above screenshot shows that how to upload newfiles on the server page.
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 133 Fig- 10: User Details The above screenshot shows the user details. 4. CONCLUSION We have outlined the vision and delayed key characteristics Of Fog Computing, a platform to deliver a rich portfolio of new services and applications at the edge of the network. The motivating examples peppered throughout the discussion range from conceptual visions to existing point solution prototypes. We envision the Fog to be a unifying platform, rich enough to deliver this new breed of emerging services and enable the development of new applications Future work will expand on the Fog computing paradigm in Smart Grid. In this scenario, two models for Fog devices can be developed. Independent Fog devicesconsultdirectlywith the Cloud for periodic updates on price and demands, while interconnected. Fog devices may consult each other, and create coalitions for further enhancements. ACKNOWLEDGEMENT This work was supported in part by Prof. Nilima Nikam, Mr Shubham gapat, Ms. Neelima Kamtam We gratefully acknowledge the work of Yadavrao Tasgaonkar Institute of Engineering and Technology. REFERENCES [1] F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, “Fog computing and its role in the internet of things,” in Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, ser. MCC '12. New York, NY, USA: ACM, 2012, pp. 13–16. [2] Cisco, “Cisco delivers vision of fog computing to accelerate value from billions of connected devices,” Cisco Press Release, Jan 2014. [3] T. H. Luan, L. Gao, Z. Li, Y. Xiang, and L. Sun, “Fog Computing: Focusing on Mobile Users at the Edge,” ArXiv e-prints, Feb. 2015. [4] C. Stojmenovic and S. Wen, “The fog computing paradigm: Scenarios and security issues,” in Computer Science and Information Systems (FedCSIS), 2014 Federated Conference on, Sept 2014, pp. 1–8. [5] R. Deng, R. Lu, C. Lai, T. H. Luan, and H. Liang, “Optimal workload allocation in fog-cloud computing towards balanced delay and power consumption,” IEEE Internet of Things Journal, May 2016. [6] A. Targhetta, D. Owen, and P. Gratz, “The design space of ultra-lowenergy asymmetric cryptography,” in Performance Analysis of Systems and Software (ISPASS), 2014 IEEE International Symposium on, March 2014, pp. 55–65. [7] R. Lu, X. Lin, H. Zhu, X. Shen, and B. Preiss, “Pi: A practical incentive protocol for delay tolerant networks,” Wireless Communications, IEEETransactions on, vol. 9, no. 4, pp. 1483–1493, April 2010. [8] A. Pentland, R. Fletcher, and A. Hasson, “DakNet: rethinking connectivity in developing nations,” Computer, vol. 37, no. 1, pp. 78–83, 2004. [9] L. Gao, S. Yu, T. H. Luan, and W. Zhou, Delay Tolerant Networks and Their Applications. Springer Publishing Company, Incorporated, 2015. [10] Y. Cao and Z. Sun, “Routing in delay/disruption tolerant networks: A taxonomy, survey and challenges,” Communications Surveys Tutorials, IEEE, vol. 15, no. 2, pp. 654–677, Second 2013. [11] A. Pentland, R. Fletcher, and A. Hasson, “DakNet: rethinking connectivity in developing nations,” Computer, vol. 37, no. 1, pp. 78–83, 2004. [12] L. Gao, M. Li, A. Bonti, W. Zhou, and S. Yu, “Multidimensional routingprotocol inhuman-associated delay-tolerant networks,” Mobile Computing, IEEE Transactions on, vol. 12, no. 11, pp. 2132–2144, Nov 2013. [13] A. Targhetta, D. Owen, and P. Gratz, “The design spaceof ultra-low energy asymmetric cryptography,” in PerformanceAnalysisofSystemsandSoftware(ISPASS), 2014 IEEE International Symposiumon,March2014,pp. 55–65. [14] X. Zhuo, W. Gao, G. Cao, and S. Hua, “An incentive framework for cellular traffic offloading,” Mobile Computing, IEEE Transactionson,vol.13, no.3, pp.541– 555, March 2014.
Download now