creating a new environment, namely the Internet of Things
(IoT), that enables a wide range of future Internet applications.
In this work, we present Mobile Fog, a high level
programming model for future Internet applications that are
geospatially distributed, large–scale, and latency–sensitive.
We analyze use cases for the programming model with camera
network and connected vehicle applications to show the
efficacy of Mobile Fog. We also evaluate application performance
through simulation.
IRJET- Fog Route:Distribution of Data using Delay Tolerant NetworkIRJET Journal
This document summarizes a research paper that proposes using delay tolerant network (DTN) approaches for data dissemination in fog computing networks. It describes a hybrid data dissemination framework with a two-plane architecture: 1) the cloud serves as a control plane to process content updates and organize data flows, and 2) geometrically distributed fog servers form a data plane to disseminate data among themselves using DTN techniques. This allows non-urgent, high-volume content to be distributed across fog servers in an efficient manner without relying on expensive bandwidth between the fog and cloud layers.
A survey of fog computing concepts applications and issuesRezgar Mohammad
This document provides a survey of fog computing that discusses its key concepts, applications, and issues. It defines fog computing as a scenario that provides computation, storage, and networking services between end devices and cloud servers at the edge of the network. Representative applications of fog computing discussed include augmented reality, real-time video analytics, content delivery/caching, and mobile big data analytics. Potential issues covered include fog networking, quality of service concerns regarding connectivity, reliability, and capacity, and resource management challenges in dynamically provisioning and scheduling resources across fog nodes.
ABSTRACT
In today’s world, the swift increase of utilizing mobile services and simultaneously discovering of the cloud computing services, made the Mobile Cloud Computing (MCC) selected as a wide spread technology among mobile users. Thus, the MCC incorporates the cloud computing with mobile services for achieving facilities in daily using mobile. The capability of mobile devices is limited of computation context, memory capacity, storage ability, and energy. Thus, relying on cloud computing can handle these troubles in the mobile surroundings. Cloud Computing gives computing easiness and capacity such provides availability of services from anyplace through the Internet without putting resources into new foundation, preparing, or application authorizing. Additionally, Cloud Computing is an approach to expand the limitations or increasing the abilities dynamically. The primary favourable position of Cloud Computing is that clients just use what they require and pay for what they truly utilize. Mobile cloud computing is a form for various services, where a mobile gadget is able to utilize the cloud for data saving, seeking, information mining, and multimedia preparing. Cloud computing innovation is also causes many new complications in side of safety and gets to direct when users store significant information with cloud servers. As the clients never again have physical ownership of the outsourced information, makes the information trustworthiness, security, and authenticity insurance in Cloud Computing is extremely difficult and conceivably troublesome undertaking. In MCC environments, it is hard to find a paper embracing most of the concepts and issues such as: architecture, computational offloading, challenges, security issues, authentications and so on. In this paper we discuss these concepts with presenting a review of the most recent papers in the domain of MCC.
Contemporary Energy Optimization for Mobile and Cloud Environmentijceronline
Cloud and mobile computing applications are increasing heavily in terms of usage. These two areas extending usability of systems. This review paper gives information about cloud and mobile applications in terms of resources they consume and the need of choosing variety of features for users from several locations and the evolutionary provisions for service provider and end users. Both the fields are combined to provide good functionality, efficiency and effectiveness with mobile phones. The enhancement by considering power consumption by means of resource constrained nature of devices, communication media and cost effectiveness. This paper discuss about the concepts related to power consumption, underlying protocols and the other performance issues
Fog Computing and Its Role in the Internet of ThingsHarshitParkar6677
This document discusses fog computing and its role in supporting Internet of Things applications. It defines fog computing as extending cloud computing to the edge of the network to enable applications requiring low latency, mobility support, and location awareness. Key characteristics of fog include its geographical distribution, support for real-time interactions, and role in wireless networks. The document argues fog is well-suited as a platform for critical IoT applications and services in areas like connected vehicles, smart grids, and wireless sensor networks due to these characteristics. It also describes the interplay between fog and cloud platforms for data analytics with fog handling real-time processing near data sources and cloud providing long-term global analytics.
This document summarizes a research paper that proposes a framework for dynamically partitioning mobile applications between a mobile device and cloud computing resources. The framework consists of runtime systems on both the mobile device and cloud to support adaptive partitioning and distributed execution. It aims to efficiently serve large numbers of users by allowing computation instances on the cloud to be shared among multiple applications and tenants. The paper formulates the partitioning problem as an optimization problem that allocates application components and wireless bandwidth to maximize throughput.
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...IJCNCJournal
The article develops a method to ensure the efficient use of cloudlet resources by the mobile users. The article provides a solution to the problem of correct use of cloudlets located on the movement route of mobile users in Wireless Metropolitan Area Networks - WMAN environment. Conditions for downloading
necessary applications to the appropriate cloudlet using the possible values that determine the importance and coordinates of the cloudlets were studied. The article provides a model of the mobile user's route model in metropolitan environments and suggests a method for solving the problem.
A Generic Open Source Framework for Auto Generation of Data Manipulation Comm...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
IRJET- Fog Route:Distribution of Data using Delay Tolerant NetworkIRJET Journal
This document summarizes a research paper that proposes using delay tolerant network (DTN) approaches for data dissemination in fog computing networks. It describes a hybrid data dissemination framework with a two-plane architecture: 1) the cloud serves as a control plane to process content updates and organize data flows, and 2) geometrically distributed fog servers form a data plane to disseminate data among themselves using DTN techniques. This allows non-urgent, high-volume content to be distributed across fog servers in an efficient manner without relying on expensive bandwidth between the fog and cloud layers.
A survey of fog computing concepts applications and issuesRezgar Mohammad
This document provides a survey of fog computing that discusses its key concepts, applications, and issues. It defines fog computing as a scenario that provides computation, storage, and networking services between end devices and cloud servers at the edge of the network. Representative applications of fog computing discussed include augmented reality, real-time video analytics, content delivery/caching, and mobile big data analytics. Potential issues covered include fog networking, quality of service concerns regarding connectivity, reliability, and capacity, and resource management challenges in dynamically provisioning and scheduling resources across fog nodes.
ABSTRACT
In today’s world, the swift increase of utilizing mobile services and simultaneously discovering of the cloud computing services, made the Mobile Cloud Computing (MCC) selected as a wide spread technology among mobile users. Thus, the MCC incorporates the cloud computing with mobile services for achieving facilities in daily using mobile. The capability of mobile devices is limited of computation context, memory capacity, storage ability, and energy. Thus, relying on cloud computing can handle these troubles in the mobile surroundings. Cloud Computing gives computing easiness and capacity such provides availability of services from anyplace through the Internet without putting resources into new foundation, preparing, or application authorizing. Additionally, Cloud Computing is an approach to expand the limitations or increasing the abilities dynamically. The primary favourable position of Cloud Computing is that clients just use what they require and pay for what they truly utilize. Mobile cloud computing is a form for various services, where a mobile gadget is able to utilize the cloud for data saving, seeking, information mining, and multimedia preparing. Cloud computing innovation is also causes many new complications in side of safety and gets to direct when users store significant information with cloud servers. As the clients never again have physical ownership of the outsourced information, makes the information trustworthiness, security, and authenticity insurance in Cloud Computing is extremely difficult and conceivably troublesome undertaking. In MCC environments, it is hard to find a paper embracing most of the concepts and issues such as: architecture, computational offloading, challenges, security issues, authentications and so on. In this paper we discuss these concepts with presenting a review of the most recent papers in the domain of MCC.
Contemporary Energy Optimization for Mobile and Cloud Environmentijceronline
Cloud and mobile computing applications are increasing heavily in terms of usage. These two areas extending usability of systems. This review paper gives information about cloud and mobile applications in terms of resources they consume and the need of choosing variety of features for users from several locations and the evolutionary provisions for service provider and end users. Both the fields are combined to provide good functionality, efficiency and effectiveness with mobile phones. The enhancement by considering power consumption by means of resource constrained nature of devices, communication media and cost effectiveness. This paper discuss about the concepts related to power consumption, underlying protocols and the other performance issues
Fog Computing and Its Role in the Internet of ThingsHarshitParkar6677
This document discusses fog computing and its role in supporting Internet of Things applications. It defines fog computing as extending cloud computing to the edge of the network to enable applications requiring low latency, mobility support, and location awareness. Key characteristics of fog include its geographical distribution, support for real-time interactions, and role in wireless networks. The document argues fog is well-suited as a platform for critical IoT applications and services in areas like connected vehicles, smart grids, and wireless sensor networks due to these characteristics. It also describes the interplay between fog and cloud platforms for data analytics with fog handling real-time processing near data sources and cloud providing long-term global analytics.
This document summarizes a research paper that proposes a framework for dynamically partitioning mobile applications between a mobile device and cloud computing resources. The framework consists of runtime systems on both the mobile device and cloud to support adaptive partitioning and distributed execution. It aims to efficiently serve large numbers of users by allowing computation instances on the cloud to be shared among multiple applications and tenants. The paper formulates the partitioning problem as an optimization problem that allocates application components and wireless bandwidth to maximize throughput.
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...IJCNCJournal
The article develops a method to ensure the efficient use of cloudlet resources by the mobile users. The article provides a solution to the problem of correct use of cloudlets located on the movement route of mobile users in Wireless Metropolitan Area Networks - WMAN environment. Conditions for downloading
necessary applications to the appropriate cloudlet using the possible values that determine the importance and coordinates of the cloudlets were studied. The article provides a model of the mobile user's route model in metropolitan environments and suggests a method for solving the problem.
A Generic Open Source Framework for Auto Generation of Data Manipulation Comm...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Software defined networking with pseudonym systems for secure vehicular cloudsredpel dot com
The document proposes a Software-Defined Pseudonym System (SDPS) to manage pseudonyms in vehicular clouds. SDPS uses a hierarchical architecture with distributed pseudonym pools that are scheduled and managed elastically and programmatically using Software Defined Networking. To decrease overhead from inter-pool communication, the paper formulates pseudonym resource scheduling as a two-sided matching problem to optimally match pseudonym transmitters and receivers. Simulation results show SDPS improves pseudonym utilization and strengthens location privacy compared to previous approaches.
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...IJCNCJournal
As SD-WAN disrupts legacy WAN technologies and becomes the preferred WAN technology adopted by corporations, and Kubernetes becomes the de-facto container orchestration tool, the opportunities for deploying edge-computing containerized applications running over SD-WAN are vast. Service orchestration in SD-WAN has not been provided with enough attention, resulting in the lack of research focused on service discovery in these scenarios. In this article, an in-house service discovery solution that works alongside Kubernetes’ master node for allowing improved traffic handling and better user experience when running micro-services is developed. The service discovery solution was conceived following a design science research approach. Our research includes the implementation of a proof-ofconcept SD-WAN topology alongside a Kubernetes cluster that allows us to deploy custom services and delimit the necessary characteristics of our in-house solution. Also, the implementation's performance is tested based on the required times for updating the discovery solution according to service updates. Finally, some conclusions and modifications are pointed out based on the results, while also discussing possible enhancements.
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...csandit
This document presents a design model for a file sharing system for mobile devices using both cloud and text computing. The proposed system allows wireless file transfer between connected devices up to 300 meters away, with transfer rates of 50-140 Mbps. This provides more secure, long-range and faster file sharing compared to existing Bluetooth systems. The document discusses how cloud computing provides on-demand access to shared computing resources over the internet, while text computing provides additional performance and efficiency measures.
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloudiosrjce
This summary provides the key details from the document in 3 sentences:
The document proposes an efficient IoT-based sensor data analysis system in wireless sensor networks using cloud computing. It utilizes the Greedy Perimeter Stateless Routing (GPSR) algorithm to route sensor data to cloud storage. The system is evaluated through simulations analyzing parameters like packet delivery ratio, energy consumption, and delay.
Cooperative hierarchical based edge-computing approach for resources allocati...IJECEIAES
Using mobile and Internet of Things (IoT) applications is becoming very popular and obtained researchers’ interest and commercial investment, in order to fulfill future vision and the requirements for smart cities. These applications have common demands such as fast response, distributed nature, and awareness of service location. However, these requirements’ nature cannot be satisfied by central systems services that reside in the clouds. Therefore, edge computing paradigm has emerged to satisfy such demands, by providing an extension for cloud resources at the network edge, and consequently, they become closer to end-user devices. In this paper, exploiting edge resources is studied; therefore, a cooperative-hierarchical approach for executing the pre-partitioned applications’ modules between edges resources is proposed, in order to reduce traffic between the network core and the cloud, where this proposed approach has a polynomial-time complexity. Furthermore, edge computing increases the efficiency of providing services, and improves end-user experience. To validate our proposed cooperative-hierarchical approach for modules placement between edge nodes’ resources, iFogSim toolkit is used. The obtained simulation results show that the proposed approach reduces network’s load and the total delay compared to a baseline approach for modules’ placement, moreover, it increases the network’s overall throughput.
This document provides a 3 paragraph summary of a seminar report on cloud computing submitted by Rahul Gupta to his professor Shraddha Khenka. The report acknowledges those who contributed to advancements in internet and computing technologies that enable cloud computing. It includes an introduction to cloud computing, comparisons to other technologies, economics of cloud computing, architectural layers, key features, deployment models, and issues. The summary covers the essential topics and information presented in the seminar report on cloud computing.
A practical architecture for mobile edge computingTejas subramanya
Recently, mobile broadband networks are focused
on bringing additional capabilities to the network edge. For
instance, Mobile Edge Computing (MEC) brings storage and
processing capabilities closer to the mobile user i.e., at the radio
access network, in order to deploy services with minimum delay.
In this paper, we propose a resource constrained cloud-enabled
small cell that includes a MEC server for deploying mobile
edge computing functionalities. We present the architecture with
special focus on realizing the proper forwarding of data packets
between the mobile data path and the MEC applications, based
on the principles of SDN, without requiring any changes to
the functionality of existing mobile network nodes both in the
access and the core network segments. The significant benefits
of adopting the proposed architecture are analyzed based on a
proof-of-concept demonstration for content caching application
use case.
Cloud Computing Building A Framework For Successful Transition Gtsijerry0040
The document discusses cloud computing and provides a framework for government agencies to successfully transition to cloud solutions. It defines cloud computing and outlines its key characteristics and deployment models. The benefits of cloud computing for government include increased capacity at lower costs, reduced IT operating costs and resources, and improved collaboration. The document proposes a five step Cloud Computing Maturity Model for agencies to follow: 1) consolidation of servers and resources, 2) virtualization, 3) automation, 4) utility or on-demand access, and 5) full adoption of cloud solutions. Each step builds upon the previous to help agencies maximize benefits while mitigating risks of the transition.
Energy Optimized Link Selection Algorithm for Mobile Cloud ComputingEswar Publications
Mobile cloud computing is the revolutionary distributed computing research area which consists of three different domains: cloud computing, wireless networks and mobile computing targeting to improve the task computational capabilities of the mobile devices in order to minimize the energy consumption. Heavy computations can be offloaded to the cloud to decrease energy consumption for the mobile device. In some mobile cloud applications, it has been more energy inefficient to use the cloud compared to the conventional computing conducted in the local device. Despite mobile cloud computing being a reliable idea, still faces several
problems for mobile phones such as storage, short battery life and so on. One of the most important concerns for mobile devices is low energy consumption. Different network links has different bandwidths to uplink and downlink task as well as data transmission from mobile to cloud or vice-versa. In this paper, a novel optimal link selection algorithm is proposed to minimize the mobile energy. In the first phase, all available networks are
scanned and then signal strength is calculated. All the calculated signals along with network locations are given
input to the optimal link selection algorithm. After the execution of link selection algorithm, an optimal network link is selected.
This document compares and contrasts cloud computing and grid computing. Grid computing refers to cooperation between multiple computers and servers to boost computational power, with a focus on high-capacity CPU tasks. Cloud computing delivers on-demand access to shared computing resources like networks, servers, storage and applications via the internet. Key differences include grid computing having a lower level of abstraction and scalability compared to cloud computing. Cloud computing also has stronger fault tolerance, is more widely accessible via the internet, and offers real-time services through its utility-based pricing model.
Secured Communication Model for Mobile Cloud Computingijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Abstract: Cloud computing is a latest trend and a hot topic in today global world. In which sources are provided to concern as local user on an on demand basically as usual it provides the path or means of internet. Mobile cloud computing is simply cloud computing throughout that at all smallest variety of devices could be involved as wireless equipment this paper concern multiple procedure and procedure for the mobile cloud computing . It developed every General mobile cloud computing solution and application specific solution. It also concern about the cloud computing in which mobile phones are used to browse the web, write e-mails, videos etc. Mobile phones are become the universal interface online services and cloud computing application general run local on mobile phones.
This document discusses virtualizing private cloud resources to maximize utilization. It begins by introducing cloud computing and its service models of Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). It then explains how virtualizing an existing private cloud using virtualization software like VMware can enable multiple virtual clouds to run on a single physical machine. This "cloud within a cloud" approach significantly improves CPU and memory utilization compared to a single private cloud.
This document discusses several research papers related to networking, mobile computing, cloud computing, security, and data engineering. The papers cover topics such as energy-efficient networking protocols, buffer sizing in routers, live streaming techniques, address misconfiguration detection, dynamic routing, location monitoring in wireless sensor networks, multicasting in mobile ad hoc networks, throughput optimization, traffic measurement, data integrity in cloud storage, data compression techniques, recommendation diversity, application placement, document clustering, query-dependent ranking, cloud caching, parallel data processing, service system monitoring, proxy caching, TCP throughput prediction, online social networks, intrusion detection, failure detection, intrusion detection, privacy-
Cloud computing pros and cons for computer forensic investigationspoojagupta010
This document discusses the pros and cons of cloud computing for computer forensic investigations. It begins with an introduction to cloud computing and its key characteristics and models. It then provides background on computer forensics, including digital evidence and forensic procedures. The document goes on to discuss virtualization and how it relates to cloud computing. Finally, it merges these topics and outlines the main challenges of applying forensic procedures in cloud environments, concluding that while backups may provide useful evidence, seizing data can be difficult due to data mobility and copies across servers.
Security and Privacy Issues of Fog Computing: A SurveyHarshitParkar6677
Abstract. Fog computing is a promising computing paradigm that ex-
tends cloud computing to the edge of networks. Similar to cloud comput-
ing but with distinct characteristics, fog computing faces new security
and privacy challenges besides those inherited from cloud computing. In
this paper, we have surveyed these challenges and corresponding solu-
tions in a brief manner.
This document summarizes a research paper on developing a mobile application called MeghaOS that allows users to access and run desktop applications hosted on cloud infrastructure directly from their smartphones. The application was created to bridge the gap between limited smartphone capabilities and more powerful desktop applications. It implements an interface to Amazon Web Services that allows users to launch virtual machine instances, install and run web applications, and access them through their smartphone. The paper outlines the components of the MeghaOS application, proposed methodology, implementation details and screenshots. It also compares MeghaOS to other mobile cloud applications and file sync services.
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing IJECEIAES
Cloud computing is a technology that was developed a decade ago to provide uninterrupted, scalable services to users and organizations. Cloud computing has also become an attractive feature for mobile users due to the limited features of mobile devices. The combination of cloud technologies with mobile technologies resulted in a new area of computing called mobile cloud computing. This combined technology is used to augment the resources existing in Smart devices. In recent times, Fog computing, Edge computing, and Clone Cloud computing techniques have become the latest trends after mobile cloud computing, which have all been developed to address the limitations in cloud computing. This paper reviews these recent technologies in detail and provides a comparative study of them. It also addresses the differences in these technologies and how each of them is effective for organizations and developers.
Clarifying fog computing and networking 10 questions and answersRezgar Mohammad
Fog computing is an architecture that distributes computing, storage, control and networking functions closer to users along the cloud-to-thing continuum compared to traditional cloud computing architectures. It aims to provide a seamless continuum of services from the cloud to end devices. Key differences between fog and edge computing are that fog is more inclusive, seeks to realize a seamless continuum rather than isolated platforms, and envisions a horizontal platform to support multiple industries. Fog computing is expected to enable new commercial opportunities and business models by providing integrated end-to-end services and applications through the convergence of cloud and fog platforms.
This document summarizes challenges with migrating applications between cloud environments and discusses potential solutions. It addresses three main points:
1) Application architecture impacts migration ability, and architectures like asynchronous apps are better suited for cloud portability.
2) Standards like OVF could help by providing universal metadata for virtual machines, but full standards adoption will take time.
3) Tools to automate migration are needed to move apps without rewriting them for each cloud, but current tools often result in multiple versions that are difficult to manage.
Software defined networking with pseudonym systems for secure vehicular cloudsredpel dot com
The document proposes a Software-Defined Pseudonym System (SDPS) to manage pseudonyms in vehicular clouds. SDPS uses a hierarchical architecture with distributed pseudonym pools that are scheduled and managed elastically and programmatically using Software Defined Networking. To decrease overhead from inter-pool communication, the paper formulates pseudonym resource scheduling as a two-sided matching problem to optimally match pseudonym transmitters and receivers. Simulation results show SDPS improves pseudonym utilization and strengthens location privacy compared to previous approaches.
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...IJCNCJournal
As SD-WAN disrupts legacy WAN technologies and becomes the preferred WAN technology adopted by corporations, and Kubernetes becomes the de-facto container orchestration tool, the opportunities for deploying edge-computing containerized applications running over SD-WAN are vast. Service orchestration in SD-WAN has not been provided with enough attention, resulting in the lack of research focused on service discovery in these scenarios. In this article, an in-house service discovery solution that works alongside Kubernetes’ master node for allowing improved traffic handling and better user experience when running micro-services is developed. The service discovery solution was conceived following a design science research approach. Our research includes the implementation of a proof-ofconcept SD-WAN topology alongside a Kubernetes cluster that allows us to deploy custom services and delimit the necessary characteristics of our in-house solution. Also, the implementation's performance is tested based on the required times for updating the discovery solution according to service updates. Finally, some conclusions and modifications are pointed out based on the results, while also discussing possible enhancements.
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...csandit
This document presents a design model for a file sharing system for mobile devices using both cloud and text computing. The proposed system allows wireless file transfer between connected devices up to 300 meters away, with transfer rates of 50-140 Mbps. This provides more secure, long-range and faster file sharing compared to existing Bluetooth systems. The document discusses how cloud computing provides on-demand access to shared computing resources over the internet, while text computing provides additional performance and efficiency measures.
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloudiosrjce
This summary provides the key details from the document in 3 sentences:
The document proposes an efficient IoT-based sensor data analysis system in wireless sensor networks using cloud computing. It utilizes the Greedy Perimeter Stateless Routing (GPSR) algorithm to route sensor data to cloud storage. The system is evaluated through simulations analyzing parameters like packet delivery ratio, energy consumption, and delay.
Cooperative hierarchical based edge-computing approach for resources allocati...IJECEIAES
Using mobile and Internet of Things (IoT) applications is becoming very popular and obtained researchers’ interest and commercial investment, in order to fulfill future vision and the requirements for smart cities. These applications have common demands such as fast response, distributed nature, and awareness of service location. However, these requirements’ nature cannot be satisfied by central systems services that reside in the clouds. Therefore, edge computing paradigm has emerged to satisfy such demands, by providing an extension for cloud resources at the network edge, and consequently, they become closer to end-user devices. In this paper, exploiting edge resources is studied; therefore, a cooperative-hierarchical approach for executing the pre-partitioned applications’ modules between edges resources is proposed, in order to reduce traffic between the network core and the cloud, where this proposed approach has a polynomial-time complexity. Furthermore, edge computing increases the efficiency of providing services, and improves end-user experience. To validate our proposed cooperative-hierarchical approach for modules placement between edge nodes’ resources, iFogSim toolkit is used. The obtained simulation results show that the proposed approach reduces network’s load and the total delay compared to a baseline approach for modules’ placement, moreover, it increases the network’s overall throughput.
This document provides a 3 paragraph summary of a seminar report on cloud computing submitted by Rahul Gupta to his professor Shraddha Khenka. The report acknowledges those who contributed to advancements in internet and computing technologies that enable cloud computing. It includes an introduction to cloud computing, comparisons to other technologies, economics of cloud computing, architectural layers, key features, deployment models, and issues. The summary covers the essential topics and information presented in the seminar report on cloud computing.
A practical architecture for mobile edge computingTejas subramanya
Recently, mobile broadband networks are focused
on bringing additional capabilities to the network edge. For
instance, Mobile Edge Computing (MEC) brings storage and
processing capabilities closer to the mobile user i.e., at the radio
access network, in order to deploy services with minimum delay.
In this paper, we propose a resource constrained cloud-enabled
small cell that includes a MEC server for deploying mobile
edge computing functionalities. We present the architecture with
special focus on realizing the proper forwarding of data packets
between the mobile data path and the MEC applications, based
on the principles of SDN, without requiring any changes to
the functionality of existing mobile network nodes both in the
access and the core network segments. The significant benefits
of adopting the proposed architecture are analyzed based on a
proof-of-concept demonstration for content caching application
use case.
Cloud Computing Building A Framework For Successful Transition Gtsijerry0040
The document discusses cloud computing and provides a framework for government agencies to successfully transition to cloud solutions. It defines cloud computing and outlines its key characteristics and deployment models. The benefits of cloud computing for government include increased capacity at lower costs, reduced IT operating costs and resources, and improved collaboration. The document proposes a five step Cloud Computing Maturity Model for agencies to follow: 1) consolidation of servers and resources, 2) virtualization, 3) automation, 4) utility or on-demand access, and 5) full adoption of cloud solutions. Each step builds upon the previous to help agencies maximize benefits while mitigating risks of the transition.
Energy Optimized Link Selection Algorithm for Mobile Cloud ComputingEswar Publications
Mobile cloud computing is the revolutionary distributed computing research area which consists of three different domains: cloud computing, wireless networks and mobile computing targeting to improve the task computational capabilities of the mobile devices in order to minimize the energy consumption. Heavy computations can be offloaded to the cloud to decrease energy consumption for the mobile device. In some mobile cloud applications, it has been more energy inefficient to use the cloud compared to the conventional computing conducted in the local device. Despite mobile cloud computing being a reliable idea, still faces several
problems for mobile phones such as storage, short battery life and so on. One of the most important concerns for mobile devices is low energy consumption. Different network links has different bandwidths to uplink and downlink task as well as data transmission from mobile to cloud or vice-versa. In this paper, a novel optimal link selection algorithm is proposed to minimize the mobile energy. In the first phase, all available networks are
scanned and then signal strength is calculated. All the calculated signals along with network locations are given
input to the optimal link selection algorithm. After the execution of link selection algorithm, an optimal network link is selected.
This document compares and contrasts cloud computing and grid computing. Grid computing refers to cooperation between multiple computers and servers to boost computational power, with a focus on high-capacity CPU tasks. Cloud computing delivers on-demand access to shared computing resources like networks, servers, storage and applications via the internet. Key differences include grid computing having a lower level of abstraction and scalability compared to cloud computing. Cloud computing also has stronger fault tolerance, is more widely accessible via the internet, and offers real-time services through its utility-based pricing model.
Secured Communication Model for Mobile Cloud Computingijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Abstract: Cloud computing is a latest trend and a hot topic in today global world. In which sources are provided to concern as local user on an on demand basically as usual it provides the path or means of internet. Mobile cloud computing is simply cloud computing throughout that at all smallest variety of devices could be involved as wireless equipment this paper concern multiple procedure and procedure for the mobile cloud computing . It developed every General mobile cloud computing solution and application specific solution. It also concern about the cloud computing in which mobile phones are used to browse the web, write e-mails, videos etc. Mobile phones are become the universal interface online services and cloud computing application general run local on mobile phones.
This document discusses virtualizing private cloud resources to maximize utilization. It begins by introducing cloud computing and its service models of Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). It then explains how virtualizing an existing private cloud using virtualization software like VMware can enable multiple virtual clouds to run on a single physical machine. This "cloud within a cloud" approach significantly improves CPU and memory utilization compared to a single private cloud.
This document discusses several research papers related to networking, mobile computing, cloud computing, security, and data engineering. The papers cover topics such as energy-efficient networking protocols, buffer sizing in routers, live streaming techniques, address misconfiguration detection, dynamic routing, location monitoring in wireless sensor networks, multicasting in mobile ad hoc networks, throughput optimization, traffic measurement, data integrity in cloud storage, data compression techniques, recommendation diversity, application placement, document clustering, query-dependent ranking, cloud caching, parallel data processing, service system monitoring, proxy caching, TCP throughput prediction, online social networks, intrusion detection, failure detection, intrusion detection, privacy-
Cloud computing pros and cons for computer forensic investigationspoojagupta010
This document discusses the pros and cons of cloud computing for computer forensic investigations. It begins with an introduction to cloud computing and its key characteristics and models. It then provides background on computer forensics, including digital evidence and forensic procedures. The document goes on to discuss virtualization and how it relates to cloud computing. Finally, it merges these topics and outlines the main challenges of applying forensic procedures in cloud environments, concluding that while backups may provide useful evidence, seizing data can be difficult due to data mobility and copies across servers.
Security and Privacy Issues of Fog Computing: A SurveyHarshitParkar6677
Abstract. Fog computing is a promising computing paradigm that ex-
tends cloud computing to the edge of networks. Similar to cloud comput-
ing but with distinct characteristics, fog computing faces new security
and privacy challenges besides those inherited from cloud computing. In
this paper, we have surveyed these challenges and corresponding solu-
tions in a brief manner.
This document summarizes a research paper on developing a mobile application called MeghaOS that allows users to access and run desktop applications hosted on cloud infrastructure directly from their smartphones. The application was created to bridge the gap between limited smartphone capabilities and more powerful desktop applications. It implements an interface to Amazon Web Services that allows users to launch virtual machine instances, install and run web applications, and access them through their smartphone. The paper outlines the components of the MeghaOS application, proposed methodology, implementation details and screenshots. It also compares MeghaOS to other mobile cloud applications and file sync services.
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing IJECEIAES
Cloud computing is a technology that was developed a decade ago to provide uninterrupted, scalable services to users and organizations. Cloud computing has also become an attractive feature for mobile users due to the limited features of mobile devices. The combination of cloud technologies with mobile technologies resulted in a new area of computing called mobile cloud computing. This combined technology is used to augment the resources existing in Smart devices. In recent times, Fog computing, Edge computing, and Clone Cloud computing techniques have become the latest trends after mobile cloud computing, which have all been developed to address the limitations in cloud computing. This paper reviews these recent technologies in detail and provides a comparative study of them. It also addresses the differences in these technologies and how each of them is effective for organizations and developers.
Clarifying fog computing and networking 10 questions and answersRezgar Mohammad
Fog computing is an architecture that distributes computing, storage, control and networking functions closer to users along the cloud-to-thing continuum compared to traditional cloud computing architectures. It aims to provide a seamless continuum of services from the cloud to end devices. Key differences between fog and edge computing are that fog is more inclusive, seeks to realize a seamless continuum rather than isolated platforms, and envisions a horizontal platform to support multiple industries. Fog computing is expected to enable new commercial opportunities and business models by providing integrated end-to-end services and applications through the convergence of cloud and fog platforms.
This document summarizes challenges with migrating applications between cloud environments and discusses potential solutions. It addresses three main points:
1) Application architecture impacts migration ability, and architectures like asynchronous apps are better suited for cloud portability.
2) Standards like OVF could help by providing universal metadata for virtual machines, but full standards adoption will take time.
3) Tools to automate migration are needed to move apps without rewriting them for each cloud, but current tools often result in multiple versions that are difficult to manage.
This document discusses security and privacy issues of fog computing based on a survey of existing work. It begins with an overview of fog computing, defining it as an extension of cloud computing to the edge of networks. It then identifies several key security and privacy challenges of fog computing, including issues of trust and authentication, network security, secure data storage, and secure and private data computation. Several potential solutions are also briefly discussed, such as reputation-based trust models, biometric authentication, software-defined networking for security, and techniques like homomorphic encryption to enable verifiable and private computation on outsourced data.
This document discusses fog computing and its role in supporting Internet of Things applications. It defines fog computing as extending cloud computing to the edge of the network to enable applications requiring low latency, mobility support, and location awareness. Key characteristics of fog include its geographical distribution, support for real-time interactions, and role in streaming and sensor applications. The document argues fog is well-suited as a platform for connected vehicles, smart grids, smart cities, and wireless sensor networks due to its ability to meet latency and mobility requirements. It also describes the interplay between fog and cloud for data analytics, with fog handling real-time analytics near data sources and cloud providing long-term global analytics.
This document discusses fog computing and its role in supporting Internet of Things applications. It defines fog computing as extending cloud computing to the edge of the network to enable applications requiring low latency, mobility support, and location awareness. Key characteristics of fog include its geographical distribution, support for real-time interactions, and role in streaming and sensor applications. The document argues fog is well-suited as a platform for connected vehicles, smart grids, smart cities, and wireless sensor networks due to its ability to meet latency and mobility requirements. It also describes how fog and cloud can work together with fog handling real-time analytics near data sources and cloud providing long-term global analytics and data storage.
A Review- Fog Computing and Its Role in the Internet of ThingsIJERA Editor
Fog computing extends the Cloud Computing paradigm to the edge of the network, thus enabling a new breed of applications and services. Dening characteristics of the Fog are: a) Low latency and location awareness; b) Wide-spread geographical distribution; c) Mobility; d) Very large number of nodes, e) Predominant role of wireless access, f) Strong presence of streaming and real time applications, g) Het-erogeneity. In this paper we argue that the above characteristics make the Fog the appropriate platform for a number of critical Internet of Things (IoT) services and applications, namely, Connected Vehicle, Smart Grid , Smart Cities, and, in general, Wireless Sensors and Actuators Net-works (WSANs).
The common challenges of mobile internet for up coming generationeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
The common challenges of mobile internet for up coming generationeSAT Journals
Abstract In this survey we concentrate on the mobile internet. Our main focus on mobile internet in two different cases of fixed connection which is provided by the telecommunication network provider and the second one is the wireless network which is getting from internet access point can be home network, Education campus .etc; in this case we also would like to discuss about network layer (protocols and Transport layer protocols).
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...IRJET Journal
This document discusses resource management in mobile cloud computing using Mobile Software as a Service (MSaaS) and Mobile Platform as a Service (MPaaS) with femtocell and Wi-Fi networks. It proposes using femtocell and Wi-Fi private cloud networks to overcome mobile performance issues like limited battery life, storage, and bandwidth. MSaaS and MPaaS can further improve quality of service, pricing, and standard interfaces. The document suggests this approach can effectively manage resources and improve the performance of mobile cloud computing.
Cloud-computing applications are characterized by stateful access, with differentiated service levels, charged to the end user using the pay-per-use pricing model. Implicit in this model is the assumption that a cloud application is always on. Scaling the cloud delivery model to an Internet scale (millions of users) is a challenge that next-generation Layer 4–7 infrastructure needs to overcome.
In this paper we are study-ing about cloud computing, their types, need to use cloud computing. We also study the architecture of the mobile cloud computing. So we included new techniques for backup and restoring data from mobile to cloud. Here we proposed to apply some compres-sion technique while backup and restore data from Smartphone to cloud and cloud to the Smartphone.
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...IJRES Journal
Mobile cloud computing in light of the increasing popularity among users of mobile smart
technology which is the next indispensable that enables users to take advantage of the storage cloud computing
services. However, mobile cloud computing, the migration of information on the cloud is reliable their privacy
and security issues. Moreover, mobile cloud computing has limitations in resources such as power energy,
processor, Memory and storage. In this paper, we propose a solution to the problem of privacy with saving and
reducing resources power energy, processor and Memory. This is done through data encryption in the mobile
cloud computing by symmetric algorithm and sent to the private cloud and then the data is encrypted again and
sent to the public cloud through Asymmetric algorithm. The experimental results showed after a comparison
between encryption algorithms less time and less time to decryption are as follows: Blowfish algorithm for
symmetric and the DSA algorithm for Asymmetric. The analysis results showed a significant improvement in
reducing the resources in the period of time and power energy consumption and processor.
This document provides an overview of fog computing, including its characteristics, architecture, applications, examples, advantages, and disadvantages. Fog computing extends cloud computing by performing computing tasks closer to end users at the edge of the network to reduce latency. It has a dense geographical distribution and supports mobility and real-time interactions better than cloud computing. The document outlines the key components of fog architecture and discusses scenarios where fog computing can be applied, such as smart grids, smart buildings, and connected vehicles.
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...IJERA Editor
Despite the advances in hardware for hand-held mobile devices, resource-intensive applications (e.g., video and imagestorage and processing or map-reduce type) still remain off bounds since they require large computation and storage capabilities.Recent research has attempted to address these issues by employing remote servers, such as clouds and peer mobile devices.For mobile devices deployed in dynamic networks (i.e., with frequent topology changes because of node failure/unavailability andmobility as in a mobile cloud), however, challenges of reliability and energy efficiency remain largely unaddressed. To the best of ourknowledge, we are the first to address these challenges in an integrated manner for both data storage and processing in mobilecloud, an approach we call k-out-of-n computing. In our solution, mobile devices successfully retrieve or process data, in the mostenergy-efficient way, as long as k out of n remote servers are accessible. Through a real system implementation we prove the feasibilityof our approach. Extensive simulations demonstrate the fault tolerance and energy efficiency performance of our framework in largerscale networks.
This document discusses context-aware mobile cloud computing and its challenges. It defines mobile cloud computing as integrating cloud computing technology with mobile devices to enhance their computational power, memory, storage, energy, and context awareness. It discusses two types of mobile cloud computing architectures - infrastructure-based systems where cloud hardware provides services to mobile users, and ad hoc systems where mobile devices form groups to share services. The document highlights the need for context-aware mobile cloud application development models that support computation offloading between smartphones and clouds. It discusses challenges like determining when offloading improves performance or saves energy given factors like available resources and bandwidth.
Similar to Mobile Fog: A Programming Model for Large–Scale Applications on the Internet of Things (20)
Chances are you have a Wi-Fi network at home, or live close to one (or more) that tantalizingly pops up in a list whenever you boot up the laptop.
The problem is, if there's a lock next to the network name (AKA the SSID, or service set identifier), that indicates security is activated. Without the password or passphrase, you're not going to get access to that network, or the sweet, sweet internet that goes with it.
A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic. DDoS attacks achieve effectiveness by utilizing multiple compromised computer systems as sources of attack traffic. Exploited machines can include computers and other networked resources such as IoT devices. From a high level, a DDoS attack is like a traffic jam clogging up with highway, preventing regular traffic from arriving at its desired destination.
A microprocessor is an electronic component that is used by a computer to do its work. It is a central processing unit on a single integrated circuit chip containing millions of very small components including transistors, resistors, and diodes that work together.
A microprocessor is an electronic component that is used by a computer to do its work. It is a central processing unit on a single integrated circuit chip containing millions of very small components including transistors, resistors, and diodes that work together.
A microprocessor is an electronic component that is used by a computer to do its work. It is a central processing unit on a single integrated circuit chip containing millions of very small components including transistors, resistors, and diodes that work together.
There are two methods for interfacing memory and I/O devices with a microprocessor: I/O mapped I/O and memory mapped I/O. I/O mapped I/O treats I/O devices and memory separately, while memory mapped I/O treats I/O devices as memory. I/O mapped I/O can use either 8 or 16 address lines, allowing connection of up to 256 fixed I/O devices or 65,536 variable I/O devices. Specific instructions like IN, OUT, and MOV are used to access I/O ports depending on whether it is fixed or variable addressing.
A microprocessor is an electronic component that is used by a computer to do its work. It is a central processing unit on a single integrated circuit chip containing millions of very small components including transistors, resistors, and diodes that work together.
A microprocessor is an electronic component that is used by a computer to do its work. It is a central processing unit on a single integrated circuit chip containing millions of very small components including transistors, resistors, and diodes that work together.
This document discusses procedures, macros, and stack operations in assembly language. It explains that procedures allow repetitive code to be written once and called multiple times to save memory. Procedures use stack operations to push return addresses and data onto the stack. Macros simplify programming by reducing repetitive code. Procedures are called at runtime, while macro calls are replaced with their body at assembly time.
A microprocessor is an electronic component that is used by a computer to do its work. It is a central processing unit on a single integrated circuit chip containing millions of very small components including transistors, resistors, and diodes that work together.
Procedures and macros allow code to be reused in assembly language programs. Procedures are subroutines that are called using CALL and RET instructions. Macros allow short, repetitive code sequences to be defined once and reused by replacing the macro call with its body code. Some key differences are that procedures occupy less memory than macros since macro code is generated each time, while procedures' code is only stored once. Procedures are accessed using CALL while macros are accessed by name.
A microprocessor is an electronic component that is used by a computer to do its work. It is a central processing unit on a single integrated circuit chip containing millions of very small components including transistors, resistors, and diodes that work together. Some microprocessors in the 20th century required several chips. Microprocessors help to do everything from controlling elevators to searching the Web. Everything a computer does is described by instructions of computer programs, and microprocessors carry out these instructions many millions of times a second. [1]
Microprocessors were invented in the 1970s for use in embedded systems. The majority are still used that way, in such things as mobile phones, cars, military weapons, and home appliances. Some microprocessors are microcontrollers, so small and inexpensive that they are used to control very simple products like flashlights and greeting cards that play music when you open them. A few especially powerful microprocessors are used in personal computers.
A microprocessor is an electronic component that is used by a computer to do its work. It is a central processing unit on a single integrated circuit chip containing millions of very small components including transistors, resistors, and diodes that work together. Some microprocessors in the 20th century required several chips. Microprocessors help to do everything from controlling elevators to searching the Web. Everything a computer does is described by instructions of computer programs, and microprocessors carry out these instructions many millions of times a second. [1]
Microprocessors were invented in the 1970s for use in embedded systems. The majority are still used that way, in such things as mobile phones, cars, military weapons, and home appliances. Some microprocessors are microcontrollers, so small and inexpensive that they are used to control very simple products like flashlights and greeting cards that play music when you open them. A few especially powerful microprocessors are used in personal computers.
A microprocessor is an electronic component that is used by a computer to do its work. It is a central processing unit on a single integrated circuit chip containing millions of very small components including transistors, resistors, and diodes that work together. Some microprocessors in the 20th century required several chips. Microprocessors help to do everything from controlling elevators to searching the Web. Everything a computer does is described by instructions of computer programs, and microprocessors carry out these instructions many millions of times a second. [1]
Microprocessors were invented in the 1970s for use in embedded systems. The majority are still used that way, in such things as mobile phones, cars, military weapons, and home appliances. Some microprocessors are microcontrollers, so small and inexpensive that they are used to control very simple products like flashlights and greeting cards that play music when you open them. A few especially powerful microprocessors are used in personal computers.
A microprocessor is an electronic component that is used by a computer to do its work. It is a central processing unit on a single integrated circuit chip containing millions of very small components including transistors, resistors, and diodes that work together. Some microprocessors in the 20th century required several chips. Microprocessors help to do everything from controlling elevators to searching the Web. Everything a computer does is described by instructions of computer programs, and microprocessors carry out these instructions many millions of times a second. [1]
Microprocessors were invented in the 1970s for use in embedded systems. The majority are still used that way, in such things as mobile phones, cars, military weapons, and home appliances. Some microprocessors are microcontrollers, so small and inexpensive that they are used to control very simple products like flashlights and greeting cards that play music when you open them. A few especially powerful microprocessors are used in personal computers.
This document describes the Jcc family of conditional jump instructions in x86 assembly language. It provides the instruction name, description of the condition tested, and any alternative mnemonics or opposite instructions. The instructions test various CPU flags like carry, zero, sign, overflow, parity, and compare values based on signed or unsigned arithmetic.
A microprocessor is an electronic component that is used by a computer to do its work. It is a central processing unit on a single integrated circuit chip containing millions of very small components including transistors, resistors, and diodes that work together. Some microprocessors in the 20th century required several chips. Microprocessors help to do everything from controlling elevators to searching the Web. Everything a computer does is described by instructions of computer programs, and microprocessors carry out these instructions many millions of times a second. [1]
Microprocessors were invented in the 1970s for use in embedded systems. The majority are still used that way, in such things as mobile phones, cars, military weapons, and home appliances. Some microprocessors are microcontrollers, so small and inexpensive that they are used to control very simple products like flashlights and greeting cards that play music when you open them. A few especially powerful microprocessors are used in personal computers.
A microprocessor is an electronic component that is used by a computer to do its work. It is a central processing unit on a single integrated circuit chip containing millions of very small components including transistors, resistors, and diodes that work together. Some microprocessors in the 20th century required several chips. Microprocessors help to do everything from controlling elevators to searching the Web. Everything a computer does is described by instructions of computer programs, and microprocessors carry out these instructions many millions of times a second. [1]
Microprocessors were invented in the 1970s for use in embedded systems. The majority are still used that way, in such things as mobile phones, cars, military weapons, and home appliances. Some microprocessors are microcontrollers, so small and inexpensive that they are used to control very simple products like flashlights and greeting cards that play music when you open them. A few especially powerful microprocessors are used in personal computers.
A microprocessor is an electronic component that is used by a computer to do its work. It is a central processing unit on a single integrated circuit chip containing millions of very small components including transistors, resistors, and diodes that work together. Some microprocessors in the 20th century required several chips. Microprocessors help to do everything from controlling elevators to searching the Web. Everything a computer does is described by instructions of computer programs, and microprocessors carry out these instructions many millions of times a second. [1]
Microprocessors were invented in the 1970s for use in embedded systems. The majority are still used that way, in such things as mobile phones, cars, military weapons, and home appliances. Some microprocessors are microcontrollers, so small and inexpensive that they are used to control very simple products like flashlights and greeting cards that play music when you open them. A few especially powerful microprocessors are used in personal computers.
A microprocessor is an electronic component that is used by a computer to do its work. It is a central processing unit on a single integrated circuit chip containing millions of very small components including transistors, resistors, and diodes that work together. Some microprocessors in the 20th century required several chips. Microprocessors help to do everything from controlling elevators to searching the Web. Everything a computer does is described by instructions of computer programs, and microprocessors carry out these instructions many millions of times a second. [1]
Microprocessors were invented in the 1970s for use in embedded systems. The majority are still used that way, in such things as mobile phones, cars, military weapons, and home appliances. Some microprocessors are microcontrollers, so small and inexpensive that they are used to control very simple products like flashlights and greeting cards that play music when you open them. A few especially powerful microprocessors are used in personal computers.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSIJNSA Journal
The smart irrigation system represents an innovative approach to optimize water usage in agricultural and landscaping practices. The integration of cutting-edge technologies, including sensors, actuators, and data analysis, empowers this system to provide accurate monitoring and control of irrigation processes by leveraging real-time environmental conditions. The main objective of a smart irrigation system is to optimize water efficiency, minimize expenses, and foster the adoption of sustainable water management methods. This paper conducts a systematic risk assessment by exploring the key components/assets and their functionalities in the smart irrigation system. The crucial role of sensors in gathering data on soil moisture, weather patterns, and plant well-being is emphasized in this system. These sensors enable intelligent decision-making in irrigation scheduling and water distribution, leading to enhanced water efficiency and sustainable water management practices. Actuators enable automated control of irrigation devices, ensuring precise and targeted water delivery to plants. Additionally, the paper addresses the potential threat and vulnerabilities associated with smart irrigation systems. It discusses limitations of the system, such as power constraints and computational capabilities, and calculates the potential security risks. The paper suggests possible risk treatment methods for effective secure system operation. In conclusion, the paper emphasizes the significant benefits of implementing smart irrigation systems, including improved water conservation, increased crop yield, and reduced environmental impact. Additionally, based on the security analysis conducted, the paper recommends the implementation of countermeasures and security approaches to address vulnerabilities and ensure the integrity and reliability of the system. By incorporating these measures, smart irrigation technology can revolutionize water management practices in agriculture, promoting sustainability, resource efficiency, and safeguarding against potential security threats.
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet of Things
1. Mobile Fog: A Programming Model for Large–Scale
Applications on the Internet of Things
Kirak Hong, David Lillethun, Umakishore
Ramachandran
College of Computing
Georgia Institute of Technology
Atlanta, Georgia, USA
{khong9, davel, rama }@cc.gatech.edu
Beate Ottenwälder, Boris Koldehofe
Institute of Parallel and Distributed Systems
University of Stuttgart
Stuttgart, Germany
{ottenwaelder,koldehofe}@ipvs.uni-
stuttgart.de
ABSTRACT
The ubiquitous deployment of mobile and sensor devices is
creating a new environment, namely the Internet of Things
(IoT), that enables a wide range of future Internet appli-
cations. In this work, we present Mobile Fog, a high level
programming model for future Internet applications that are
geospatially distributed, large–scale, and latency–sensitive.
We analyze use cases for the programming model with cam-
era network and connected vehicle applications to show the
efficacy of Mobile Fog. We also evaluate application perfor-
mance through simulation.
Keywords
fog computing; cloud computing; programming model; In-
ternet of Things; future Internet applications; situation aware-
ness applications
Categories and Subject Descriptors
C.2.1 [Network Architecture and Design]: Distributed
networks; C.2.4 [Distributed Systems]: Distributed ap-
plications
1. INTRODUCTION
The growing ubiquity of mobile and sensor devices, such
as smart phones and surveillance cameras, is enabling a wide
range of novel, large–scale, latency–sensitive applications
that are often classified as Future Internet Applications. For
example, traffic applications can analyze recent location in-
formation shared by vehicles to detect traffic patterns, such
as accidents or traffic jams, and use these patterns to en-
rich navigation systems in vehicles [5]. Smart surveillance
applications can support police officers by displaying video
streams on their smart phones showing suspicious people
who were nearby within the last few minutes [3].
Platform as a Service (PaaS) clouds are attractive for
developing large–scale applications due to their scalability
Permission to make digital or hard copies of all or part of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for profit or commercial advantage and that copies bear this notice and the full cita-
tion on the first page. Copyrights for components of this work owned by others than
ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or re-
publish, to post on servers or to redistribute to lists, requires prior specific permission
and/or a fee. Request permissions from permissions@acm.org.
MCC’13, August 12, 2013, Hong Kong, China.
Copyright 2013 ACM 978-1-4503-2180-8/13/08 ...$15.00.
and high–level programming models that simplify develop-
ing large–scale web services. However, existing PaaS pro-
gramming models are designed for traditional web appli-
cations, rather than future Internet applications running
on various mobile and sensor devices. Furthermore, pub-
lic clouds, as they exist in practice today, are far from the
idealized utility computing model. Applications are devel-
oped for a particular provider’s platform and run in data
centers that exist at singular points in space. This makes
their network distance too far from many users to support
highly latency–sensitive applications.
Cisco recently proposed a new computing paradigm called
fog computing [2] that runs generic application logic on re-
sources throughout the network, including routers and ded-
icated computing nodes. In contrast to the cloud, putting
intelligence in the network allows fog computing resources to
perform low–latency processing near the edge while latency–
tolerant, large–scope aggregation can still be efficiently per-
formed on powerful resources in the core of the network.
Data center resources may still be used with fog computing,
but they do not constitute the entire picture.
However, developing applications using fog computing re-
sources is tricky because it involves orchestrating highly dy-
namic, heterogeneous resources at different levels of net-
work hierarchy to support low latency and scalability re-
quirements of applications. To ease such complexity, this
paper presents a PaaS programming model, called Mobile
Fog, that provides a simplified programming abstraction
and supports applications dynamically scaling at runtime.
Our contributions include the design of our programming
model and the use case analysis of Mobile Fog. While Mo-
bile Fog can support diverse applications, we use situation
awareness applications as canonical examples in this work.
This paper is structured as follows: Section 2 discusses
related work. Section 3 explains the details of the Mobile
Fog programming model. Section 4 shows specific use cases
for our programming model. Finally, Section 6 concludes
with future work.
2. RELATED WORK
Cloud and data center systems provide highly scalable
solutions for web-scale applications, but edge devices must
communicate across the Internet to reach the cloud data
centers. Satyanarayanan, et al. [7], show that WAN laten-
cies can be high and that these latencies interfere with in-
teractive applications. We argue that situation awareness
applications are vulnerable to the same issue due to the
15
2. sense-process-actuate loop, as would be any other applica-
tions with feedback loops. In short, the could is too far from
many mobile users for latency–sensitive applications.
Two systems that can provide resources for computing
near the edge of the network are the MediaBroker [6] for
live sensor stream analysis, and Cloudlets [7] for interactive
applications. However, neither currently supports widely
distributed geospatial applications.
Recent advances in software–defined networking (SDN) [4]
allow programming in-the-middle network resources. How-
ever, these approaches only allow injecting routing logic into
network elements, not generic application logic. Further-
more, SDN offers neither an elastic resource model nor a
programming model for general–purpose applications.
Bonomi et al. [2] define the characteristics of fog comput-
ing and show that the fog is the appropriate platform for
various applications, including connected vehicles and smart
cities. This work complements our work since it presents the
potential benefits of fog computing in terms of efficiency and
latency while our work focuses on the right programming
model for developing applications on the fog.
3. PROGRAMMING MODEL
As a programming model for large–scale situation aware-
ness applications, Mobile Fog has two design goals: The first
is to provide a high–level programming model that simpli-
fies development on a large number of heterogeneous devices
distributed over a wide area. The second goal is to allow
applications to dynamically scale based on their workload
using on–demand resources in the fog and in the cloud.
3.1 System Assumptions
In this work, we assume various devices are available to
Mobile Fog for running large–scale applications. These het-
erogeneous devices include edge devices such as smartphones
and connected vehicles, on–demand computing instances in
a fog computing infrastructure, and a compute cloud with an
Infrastructure as a Service (IaaS) interface (see Figure 1).
The physical devices are placed at different levels of the
network hierarchy from the edge to the core network. We
assume each device is associated with a certain geophysical
location through a localization technique such as GPS.
For the fog computing infrastructure, we assume physical
devices called fog computing nodes are placed in the net-
work infrastructure. For example, specialized routers can
accommodate generic application computing in addition to
packet forwarding, while dedicated computing devices can
also be placed within the network for the sole purpose of fog
computing. We further assume that the fog provides a pro-
gramming interface that allows managing on–demand com-
puting instances, similar to an IaaS cloud, including creating
and terminating computing resources for a specific geospa-
tial region and at a certain level of network hierarchy. Each
computing instance has certain system resource capacities
such as CPU speed, number of cores, memory size, and stor-
age capacity, as specified by Mobile Fog. Once computing
instances are created in the fog, Mobile Fog can use the
instances to execute application code.
3.2 Application Model
Many large–scale future Internet applications require location–
and hierarchy–aware processing to handle the data streams
from widely distributed edge devices. In Mobile Fog, an ap-
Fog
Cloud
F3 F4
F9
F10
F11
F2
Core
Edge
F5 F6 F7
F1
F12 F13 F14
Loation
Network
Hierarchy
F5
F3
F6
F7
F4
F2
F8
A B
Figure 1: A logical structure of an application
plication consists of distributed Mobile Fog processes that
are mapped onto distributed computing instances in the
fog and cloud, as well as various edge devices. While run-
ning, each process performs application–specific tasks such
as sensing and aggregation with respect to its location and
level in the network hierarchy.
Mobile Fog exposes the physical hierarchy of devices through
a logical hierarchy of Mobile Fog processes that is described
in Figure 1. As shown in the figure, a process on an edge
device becomes a leaf node while a process in the cloud be-
comes the root node of a hierarchy, while processes on fog
computing nodes become intermediate nodes. A connection
between two processes indicates a communication path al-
lowed through the Mobile Fog communication API, which
is not necessarily a direct physical connection, but rather a
logical one. Since communication costs within a data center
are relatively inexpensive, root processes are connected to
each other in a mesh network (e.g., F1 and F8 in the cloud).
Each Mobile Fog process handles the workload from a
certain geospatial region. For instance, Figure 1 shows pro-
cesses F5 and F6 mapped onto a connected vehicle and a
smartphone within region A. These leaf processes are con-
nected to process F3 running on a edge fog node that covers
the region A. Similarly, processes F3 and F4 are connected
to F2 running on a core fog node that covers a region en-
compassing A and B.
3.3 API
In Mobile Fog, application code consists of a set of event
handlers that the application must implement (Table 1) and
a set of functions that applications can call (Table 2). The
event handlers are invoked by the Mobile Fog runtime sys-
tem upon certain events. For example, on_create() is in-
voked when an application is started while on_message() is
invoked when a message arrives. Mobile Fog runs the same
application code on various devices, including smartphones,
smart cameras, connected vehicles, and the computing nodes
in the fog and the cloud. This symmetric design simplifies
large–scale application development since a developer does
not need to write different programs for heterogeneous de-
vices with different connectivity.
Mobile Fog also provides detailed information about the
underlying physical devices in order to allow application
code to perform its task with respect to the geophysical
location, available system resources, device capabilities, and
network hierarchy level. In particular, application code can
16
3. Handler Description
void on_create (node self) Called when a new node is created.
void on_sense(type t, data d) Called upon a new sensor reading from a passive sensor (e.g., a camera).
void on_message (tag t, node sender,
message m)
Called when a new message arrived at a node. A tag specifies an application-
specific type of the message. A sender specifies the identifier of the source
node.
void on_new_child(node child) Called at a parent node when a new child node is connected.
void on_new_parent(node parent) Called at a child node when a new parent node is connected.
void on_child_leave(node child) Called at a parent node when a child node is leaving.
void on_parent_leave(node parent) Called at a child node when a parent node is leaving.
Table 1: Mobile Fog Event Handlers
Programming Interface Description
void send_up (tag t, message m) Sends a message from a child node to its parent node.
void send_down (tag t,
message m, set<int>index)
Sends a message from a node to its child nodes.
void send_to (tag t,
message m, node destination)
Sends a message to a specific destination node.
data sense (type t) Retrieve a sensor data from an active sensor (e.g., temperature sensor).
int num_children() Get the number of children of the calling node.
Location query_location() Get the location of this device. Returns a location range (location coverage)
if invoked on a fog computing node. If invoked on an edge device, returns a
single location point.
int query_level() Get the level of this device in the network hierarchy.
CapDesc query_capability(type t) Query a specific type of capability such as sensing and actuation functionality
on a device. As a result, a descriptor for the capability is returned if the device
has the capability.
ResDesc query_resource (type t) Query a specific type of resource (e.g., CPU and memory) on a device. As a
result, a descriptor for the resource is returned.
set<object> get_object(key k, location-
Range lr, timeRange tr)
Get application context data that matches a key, location range, and time
range.
void put_object(object o, key k, location
l, time t)
Put application context data associated with a key, location (range), and time
(range).
Table 2: Mobile Fog Application Programming Interface
retrieve information about available system resources by in-
voking query_resource(). An application can also query
the device capabilities through query_capability(). Depend-
ing on the capabilities of the physical device, the applica-
tion code can invoke sense() to retrieve specific sensor data.
However, if the sensor type is passive, the application code
is notified of new sensor data through the on_sense() event
handler. Mobile Fog also provides information about the lo-
cation through query_location(). If a process is running on
an edge device, query_location() returns the location of the
underlying device, whereas it returns the geospatial cover-
age of a process running on a computing node in the fog or
the cloud. Finally, an application can query its level in the
network hierarchy through query_level().
Running processes on different devices can communicate
with each other using our hierarchical communication API,
send_up() and send_down(), as well as a point-to-point
communication API, send_to(). We provide the hierarchical
communication API to encourage application developers to
perform more efficient in–network processing. On the other
hand, we provide the point-to-point API to support commu-
nication with mobile nodes while the connection between a
mobile node and a computing instance in the fog changes as
the mobile node moves.
Once the code is written, an application developer com-
piles the code to generate a Mobile Fog process image that
can be deployed with an associated unique identifier called
an appkey. With the appkey, a developer can manage the
application using the management interfaces provided by
Mobile Fog. To launch an application, a developer invokes
start_app() with four parameters. The first parameter, app-
key, specifies the application code to deploy. Region speci-
fies a geospatial region where the application will run. Level
specifies the total number of levels in the hierarchy of Mobile
Fog processes. For instance, a video surveillance application
may need three levels of hierarchy to perform motion de-
tection at smart cameras, face recognition at fog computing
instances, and aggregation of identities at a cloud comput-
ing instance. The Capacity parameter specifies the class of
on–demand computing instances at each level of the network
hierarchy. In the previous example, each fog computing in-
stance requires high CPU capacity for face recognition while
the cloud computing instance requires high storage capac-
ity to record the location of each individual over time. We
also allow defining a dynamic scaling policy, which will be
explained in detail in Section 3.4.
Unlike the computing instances in the fog and the cloud,
edge devices join an application by invoking connect_fog()
17
4. with the appkey. As a result, the edge device creates a
local Mobile Fog process, using its local system resources,
that connects to the Mobile Fog process on a fog computing
instance covering the location of the edge device.
If an edge device is mobile, the connection from the edge
device to a fog computing node changes as the location of the
edge device changes. When a mobile device moves from one
region to another, a Mobile Fog process covering the new re-
gion becomes the new parent of the edge device. To acknowl-
edge such a handover to the application, Mobile Fog in-
vokes a set of handlers, on_child_join(), on_parent_join(),
on_child_leave(), and on_parent_leave() on the mobile de-
vice, the old parent, and the new parent.
3.4 Dynamic Scaling
Many future Internet applications, especially sensor– and
event–based applications, deal with dynamic workloads from
the real world. To support these applications, Mobile Fog uses
on–demand computing instances in the fog and the cloud
to provide transparent scalability based on a user–provided
scaling policy. The scaling policy includes a set of monitor-
ing metrics, such as CPU utilization and bandwidth, and
scaling conditions that trigger dynamic scaling (e.g., CPU
utilization over 80%).
When a computing instance becomes overloaded due to
the dynamic workload, Mobile Fog creates on–demand fog
instances at the same network hierarchy level as the over-
loaded instance. To distribute the workload over multiple
computing instances, Mobile Fog splits the geospatial cov-
erage of the overloaded process into multiple smaller cover-
ages. Similarly, when multiple nearby processes at the same
network hierarchy level become underloaded according to
the user–provided scaling policy, Mobile Fog merges their
geospatial coverages into a single coverage area and termi-
nates all the processes except one for the merged coverage.
To allow transparent scaling, an application has to store
its application–specific data in a local object store called the
spatio–temporal object store. An application can store its ob-
jects tagged by type, location, and time using put_object()
and get_object(). For example, a traffic monitoring applica-
tion may store detected license plate numbers, tagged by the
detection time, camera location, and type LicensePlateNum-
ber. Upon dynamic scaling, Mobile Fog automatically parti-
tions the objects onto multiple Mobile Fog processes accord-
ing to the location of the objects and geospatial coverage of
the processes.
4. APPLICATIONS
4.1 Vehicle Tracking using Cameras
A metro area may have hundreds of cameras monitor-
ing the highways. These sensors could enable an applica-
tion that uses traffic cameras to help police identify and
track vehicles for which they have issued a search, which
we refer to as a BOLO. Pseudocode for a simplified ver-
sion of this application is given in Figure 2 to illustrate how
our API provides the necessary abstractions to keep track
of device capabilities and to build applications with sense-
process-actuate patterns. For brevity, a few important parts
of the application have been intentionally omitted.
There are three types of Mobile Fog processes in this ap-
plication. Camera processes are the leaves of the tree and
are responsible for sensing the environment and delivering
1: T racking ← ∅
2: function on_sense(Type t, Data frame)
3: if ¬query_capability(CAP_MOTION_DET) ∨
detect_motion(frame) then
4: send_up(MSG_VIDEO_FRAME, Message(frame))
5: end if
6: end
7: function on_message(Tag t, Node sender, Message m)
8: if t = MSG_VIDEO_FRAME then
9: Interest ← ∅
10: V ehicles ← detect_vehicles(m.frame)
11: for ∀vehic ∈ V ehicles do
12: if vehic ∈ T racking then
13: update_position(vehic)
14: put_object(vehic, vehic.license_no,
m.time, m.location)
15: else
16: license ← detect_license(vehic)
17: if license then
18: license_no ← read_license(license)
19: if is_bolo(license_no) then
20: put_object(vehic, license_no,
m.time, m.location)
21: T racking ← T racking ∪ {vehic}
22: send_up(MSG_FOUND_VEHIC, vehic)
23: end if
24: else
25: Interest ← Interest ∪ {vehic}
26: end if
27: end if
28: end for
29: if |Interest| > 0 then
30: ptz_cmd ← get_PTZ(choose_vehicle(Interest))
31: else
32: ptz_cmd ← get_PTZ(REST_POSITION)
33: end if
34: send_down(MSG_PTZ, ptz_cmd, {sender})
35: else if t = MSG_PTZ then
36: if query_capability(CAP_PTZ) then
37: execute_PTZ(m.ptz_cmd)
38: end if
39: end if
40: end
Figure 2: BOLO Vehicle Tracking Algorithm
video frames to their parent processes. Lines 2-6 in Figure 2
show the handler that is executed every time a video frame
is produced. Our API can be used to determine whether a
“smart camera” has the ability to detect motion in the scene
(line 3), and if present, it can be used to avoid sending video
to the camera’s parent unless motion is detected.
The lowest tier of fog instances are the immediate parents
of the cameras and are responsible for identifying and track-
ing vehicles (lines 9-28) as well as controlling the cameras
(lines 29-38). This allows the most intensive computation
to be handled by the most widely distributed and lowest–
latency resources. Video frames received by processes with
camera children are processed by lines 9-34. First, a com-
puter vision algorithm is used to detect_vehicles() in the
video. If a vehicle is in the set of vehicles being tracked by
this camera (i.e., it was previously detected), then the ve-
hicle’s position in space is updated and the location of the
vehicle at that time is stored by put_object() on line 14.
Otherwise it is a newly detected vehicle, and the algorithm
attempts to identify it by its license plate. If the plate can
be read clearly on line 16, then we can detect the license
number (line 18) and determine if there is a BOLO for that
vehicle (line 19). If so, we record the vehicle’s location, add
it to the set of vehicles being tracked, and notify this pro-
18
5. 1: Requires: n //number of levels in hierarchy
2: function on_new_parent(node parent)
3: if query_level()= n then
4: da ← create_detection_algorithm(query_location())
5: rq ← generate_range_query(query_location())
6: send_up(MSG_DEPLOY,Message(da, rq, mobileId))
7: end if
8: end
9: function on_message(tag t, node sender, message m)
10: if t = MSG_SENSOR_DAT ∧ query_level()= n − 1 then
11: put_object(sensor_data(m),"DAT",m.time,m.location)
12: else if t = MSG_DEPLOY then
13: if m.rq.range ⊂ query_location()) then
14: put_object(m.da,"DETECTION",NULL,
m.rq.range))
15: location_multicast(MSG_RQ,
Message(m.rq, nodeId),m.rq.range)
16: else
17: send_up(m)
18: end if
19: else if t = MSG_RQ then
20: if query_level()= n − 1 then
21: B ← get_object("DAT",m.rq.time,m.rq.range)
22: send_to(MSG_BUFF, message(B), m.nodeId)
23: else
24: location_multicast(MSG_RQ,m,m.rq.range)
25: end if
26: else if t = MSG_BUFF then
27: D ← get_object("DETECTION",NULL, NULL)
28: P ← process_events(D, m.Events)
29: send_to(MSG_PATTERN,message(P), mobileId(P))
30: end if
31: end
Figure 3: Traffic Monitoring with MCEP
cess’ parent that a new BOLO vehicle was detected (lines
20-22).
However, if the license is not sufficiently clear to read, we
can use pan-tilt-zoom (PTZ) camera capabilities to zoom in
for a better view. Line 25 adds the vehicle to a set of “ve-
hicles of interest”. Since a camera can only zoom in on one
vehicle at a time, lines 29-33 select the vehicle to focus on
using a choose_vehicle() algorithm and then sends the PTZ
command to the camera (line 34). Lines 35-38 handle the
PTZ command when it is received by the camera. The in-
corporation of PTZ creates a sense-process-actuate feedback
loop that requires the low latency provided by the fog.
4.2 Traffic Monitoring using MCEP
Information from sensors on mobile devices, e.g., vehicles,
can help detect traffic situations if the information is shared
and aggregated. For example, a sequence of several similar
movement and acceleration patterns from different vehicles
on the same road can determine if an accident blocks the
road. The Mobility–driven distributed Complex Event Pro-
cessing (MCEP) system [5] enables deriving such patterns
from sensor data. MCEP allows consumers to specify their
interest in recent, nearby patterns with a detection algo-
rithm (da) and an associated spatio–temporal range query
(rq), which is parametrized with a time and range. For
example, a range query could select relevant sensor data
around a consumer that occurred in the last hour within a
one kilometer perimeter around the consumer.
Figure 3 shows how a simplified version of the MCEP
system is implemented using the Mobile Fog programming
model. Vehicles are on the nth level of the Mobile Fog hi-
erarchy and connect to the MCEP system by calling con-
nect_fog() (not shown). Sensor data from those vehicles is
buffered by Mobile Fog processes on level n − 1, henceforth
referred to as edge processes (Lines 17-18). This buffering
allows efficiently answering spatio–temporal range queries
after the vehicle has moved away from the edge process.
Each connected vehicle can post a query by sending a
MSG_DEPLOY message containing a detection algorithm,
range query, and its ID to its parent using send_up() (see
Lines 3-8), e.g., the vehicle connected to F5 in Figure 1. The
detection algorithm is pushed up the hierarchy to the Mobile
Fog process that is associated with a geospatial range that
fully contains the range of the query (Line 19-25), e.g., F3 in
Figure 1. This process is going to perform the detection al-
gorithm and pushes the range query down, via send_down(),
to all Mobile Fog processes that overlap with the range of
the query (Lines 22 & 31), e.g., F5 and F6 in Figure 1.
Edge processes buffer the relevant sensor data for the detec-
tion and thus process the range query. Results of the range
query are sent via ID to the resource node that hosts the
detection algorithm (Lines 27-29) and processed there. De-
tected patterns are sent via ID to the mobile device (Lines
34-36). With each location update of a vehicle, or when a
vehicle connects to a new resource node, the callback inter-
faces on_child_leave() and on_new_parent() deploy a new
detection algorithm and range query, and revoke the previ-
ous one (see Line 2). To automatically migrate detection
algorithms and buffered sensor data when Mobile Fog scales
up or down, they are put in the context store.
5. EVALUATION
To show the benefits of Mobile Fog over a cloud–based
approach, in terms of communication cost, we conducted a
network simulation using OMNeT++ [8] with realistic traf-
fic patterns generated by SUMO [1]. We simulated a thou-
sand randomly moving vehicles over fifteen minutes on the
road network of an urban area (7.7 × 3.5 km). The entire
area was covered by a Quadtree communication structure:
one cloud as root, four core fog computing nodes, and six-
teen edge fog nodes that directly communicate with vehicles.
Fog nodes at each level cover uniformly divided parts of the
entire area. The network latency between each pair of nodes
is 20 milliseconds.
Based on the above setup, we simulated two large–scale
application scenarios requiring low end-to-end latencies. The
first application is vehicle–to–vehicle video streaming, where
each vehicle randomly chooses another vehicle within a query
range and starts streaming a fixed sized video to the target
vehicle. In this application, a cloud–based approach streams
all videos through the cloud while the Mobile Fog–based ap-
proach streams videos through intermediate fog computing
nodes, similar to software defined networking. The second
application is Mobile CEP, where a vehicle requests process-
ing sensor data from a certain query range. In this appli-
cation, the Mobile Fog–based approach stores sensor data
in the nearby edge fog computing nodes, while the cloud–
based approach stores all sensor data in the cloud. Both ap-
plications use the send_up() and send_down() API to han-
dle user requests in the Mobile Fog–based approach, which
means higher level nodes in the Quadtree will be utilized to
handle larger query ranges.
Figure 4 (a-b) shows the relative end–to–end latency and
core network traffic of the Mobile Fog–based approach com-
pared to the cloud–based approach while varying the query
range. The results show that the Mobile Fog–based ap-
19
6. 0
0.2
0.4
0.6
0.8
1
1.2
1.4
0 3000 6000 9000 12000
0
0.2
0.4
0.6
0.8
1
1.2
1.4
latency
core-traffic
query range [meter]
Network Traffic
Latency
(a) Vehicle–to–vehicle video streaming
0
0.5
1
1.5
2
2.5
0 200 400 600 800 1000
0
0.5
1
1.5
2
2.5
latency
coretraffic
query range [meter]
Network Traffic
Latency
(b) Traffic monitoring using MCEP
0
100000
200000
300000
400000
500000
600000
0 0.2 0.4 0.6 0.8 1
avg#events
Cummulative Fraction of Nodes
(c) Workload distribution of MCEP
Figure 4: Relative latency and network traffic of Mobile Fog compared to the cloud–based approach
proach significantly reduces both end–to–end network la-
tency and core network traffic when query ranges are small,
since Mobile Fog allows users to be served by nearby fog
nodes. In the vehicle–to–vehicle video streaming application
(Figure 4(a)), the Mobile Fog–based approach always out-
performs the cloud–based approach since the video stream
goes through the cloud only when a vehicle picks a far–
away target vehicle. However, in the MCEP scenario (Fig-
ure 4(b)), the cloud–based approach outperforms Mobile
Fog when the query range is very large because the Mobile
Fog–based approach has to aggregate sensor data stored in
edge fog computing nodes before serving a user query. If
such a wide–scope aggregation happens frequently, the Mo-
bile Fog–based approach could also push sensor data up to
the cloud to achieve lower latency and lower network traffic
for query processing at the expense of higher network traffic
for normal operation.
Figure 4(c) shows the various workloads at different fog
nodes. We measured the total number of events stored at
each Mobile Fog process running on edge fog nodes in the
MCEP scenario. The number of events stored at each pro-
cess is directly related to the necessary storage capacity,
as well as the processing needs since more events implies a
higher chance of a user request. As shown in the figure, the
workload distribution over different Mobile Fog processes is
highly skewed, i.e., only a few processes are overloaded be-
cause certain regions have higher vehicle traffic. This result
motivates dynamic scaling to handle the highly skewed and
dynamic workload of applications.
6. DISCUSSION AND FUTURE WORK
In this paper we discussed the design of Mobile Fog, a
programming model for large–scale, latency–sensitive appli-
cations in the Internet of Things (IoT). Since this is ongoing
research, it creates interesting research problems for future
work.
Runtime system implementation: We plan to develop a
runtime system that implements the Mobile Fog program-
ming model on real fog-enabled devices. The key challenge
is to develop a distributed runtime system that can migrate
Mobile Fog processes across different devices while provid-
ing reliability, security, and performance isolation for shared
infrastructure resources.
Process placement algorithm: To achieve better network
bandwidth utilization, latency, and load balance across dis-
tributed devices, we are currently working on an algorithm
that can adaptively find a near-optimal placement of Mobile
Fog processes. The key challenge in this direction is to find
a better placement based on dynamic constraints includ-
ing available resources, application workload, and migration
cost for Mobile Fog processes.
Acknowledgment
This work is supported by contract research “CEP in the
Large” of the Baden-Württemberg Stiftung.
7. REFERENCES
[1] M. Behrisch, L. Bieker, J. Erdmann, and D. Krajzewicz.
SUMO - Simulation of Urban MObility: An overview.
In Advances in System Simulation, SIMUL ’11, 2011.
[2] F. Bonomi, R. Milito, J. Zhu, and S. Addepalli. Fog
computing and its role in the internet of things. In
Workshop on Mobile cloud Computing, MCC ’12, 2012.
[3] K. Hong, S. Smaldone, J. Shin, D. J. Lillethun,
L. Iftode, and U. Ramachandran. Target container: A
target-centric parallel programming abstraction for
video-based surveillance. In International Conference
on Distributed Smart Cameras, ICDSC ’11, 2011.
[4] B. Koldehofe, F. Dürr, M. A. Tariq, and K. Rothermel.
The power of software-defined networking: line-rate
content-based routing using openflow. In Workshop on
Middleware for Next Generation Internet Computing,
MW4NG ’12, 2012.
[5] B. Koldehofe, B. Ottenwälder, K. Rothermel, and
U. Ramachandran. Moving range queries in distributed
complex event processing. In Distributed Event-Based
Systems, DEBS ’12, 2012.
[6] D. J. Lillethun, D. Hilley, S. Horrigan, and
U. Ramachandran. MB++: An integrated architecture
for pervasive computing and high-performance
computing. In Embedded and Real-Time Computing
Systems and Applications, RTCSA ’07, 2007.
[7] M. Satyanarayanan, P. Bahl, R. Caceres, and
N. Davies. The case for VM-based cloudlets in mobile
computing. IEEE Pervasive Computing, 8(4), October -
December 2009.
[8] A. Varga and R. Hornig. An overview of the
OMNeT++ simulation environment. In Simulation
tools and techniques for communications, networks and
systems & workshops, Simutools ’08, 2008.
20