• Tidak ada hasil yang ditemukan

Planning Fog networks for time-critical IoT requests

N/A
N/A
Protected

Academic year: 2024

Membagikan "Planning Fog networks for time-critical IoT requests"

Copied!
1
0
0

Teks penuh

(1)

Planning Fog networks for time-critical IoT requests

ABSTRACT

The massive growth of the Internet of Things (IoT) applications and the challenges of Cloud computing have increased the importance of Fog networks for timely processing the

requests from delay-sensitive applications. A Fog network provides local aggregation, analysis, and processing of IoT requests that may or may not be time-critical. One of the major issues of Fog is its capacity planning considering the traffic load of time-critical requests. The response time can be huge if a time-critical request is processed on Cloud.

The response time of a time-critical request can be big on the Fog layer if it is not

prioritized. Hence, there is a need to handle the time-critical traffic on a priority basis at the Fog layer. In this paper, a priority queuing model with preemption has been proposed considering the mixed types of requests at the Fog layer. The proposed approach determines the required number of Fog nodes in order to satisfy the desired Quality of Service (QoS) requirements of IoT requests. The proposed mechanism is evaluated through simulations using the iFogSim simulator. The work can be used in the capacity planning of Fog networks.

Referensi

Dokumen terkait

e-ISSN: 2527-9165 Internet of Things IoT for Soil Moisture Detection Using Time Series Model Iman Setiawan1, Junaidi2, Fadjryani3, Fika Reski Amaliah4 238 The Arduino Uno board,

This study proposed to conduct a research about the Information Real-Time Delivery Systems IRTD through the Internet of Things IoT that can give the information of real-time

The critical data must be timely reached to Sink node especially for the real-time data in non-delay tolerant networks like secure healthcare data sharing for patients.. Security of

Proposed scheme This section explains our improved authentication scheme for roaming user in IoT-based wireless networks, the reasons effecting Lu et al.’s security are considered in

The challenges of Cloud Computing Adoption for SMEs Challenges Description Data management • Issues relating to the protection, confidentiality, laws and enforcement of data in

As a key note of this research article, the contributions would be as follows: i An intelligent task offloading model is proposed in fog-cloud collaboration based on logistic regression,

An industrial IoT-based blockchain-enabled secure searchable encryption approach for healthcare systems using neural network ABSTRACT The IoT refers to the interconnection of

Transfer learning auto-encoder neural networks for anomaly detection of DDoS generating IoT devices ABSTRACT Machine Learning based anomaly detection ap-proaches have long training