Redirigiendo al acceso original de articulo en 17 segundos...
Inicio  /  Applied Sciences  /  Vol: 12 Par: 17 (2022)  /  Artículo
ARTÍCULO
TITULO

Modeling Dew Computing in DISSECT-CF-Fog

Andras Markus    
Mate Biro    
Karolj Skala    
Zorislav ?ojat and Attila Kertesz    

Resumen

Fog computing provides an effective solution to various problems by extending the cloud?s functionality to typically more limited computing units closer to user devices. Fog computing can provide a higher level of user experience due to its geographic and network topology location and distribution. IoT services also need to be managed seamlessly to ensure adequate QoS (due to the mobility of devices or the temporary periods without an internet connection). Such domains are combined under the auspices of Dew computing, as in critical cases, extending an IoT service to the end user?s device is a feasible task. Such scenarios can hardly be investigated at a large scale due to the lack of dedicated simulation environments. In this paper, we present an extension of the DISSECT-CF-Fog simulator with a Dew computing model, to enable the simulation of IoT-Dew-Fog systems in a cost-effective manner. In particular, we focus on service migration options for mobile devices and cases with temporary internet access limitations. Finally, we performed measurements of real-world use cases with the extended simulator as an evaluation. Our simulation results show that the proposed proactive strategy reduces the processing time of IoT data, exploiting an IoT-Dew-Fog environment.

 Artículos similares

       
 
Kexiang Qian, Hongyu Yang, Ruyu Li, Weizhe Chen, Xi Luo and Lihua Yin    
With the rapid growth of IoT devices, the threat of botnets is becoming increasingly worrying. There are more and more intelligent detection solutions for botnets that have been proposed with the development of artificial intelligence. However, due to th... ver más
Revista: Applied Sciences

 
Shweta More, Moad Idrissi, Haitham Mahmoud and A. Taufiq Asyhari    
The rapid proliferation of new technologies such as Internet of Things (IoT), cloud computing, virtualization, and smart devices has led to a massive annual production of over 400 zettabytes of network traffic data. As a result, it is crucial for compani... ver más
Revista: Algorithms

 
Saad Said Alqahtany and Toqeer Ali Syed    
In the domain of computer forensics, ensuring the integrity of operations like preservation, acquisition, analysis, and documentation is critical. Discrepancies in these processes can compromise evidence and lead to potential miscarriages of justice. To ... ver más
Revista: Information

 
Anastasios Fanariotis, Theofanis Orphanoudakis and Vassilis Fotopoulos    
Having as a main objective the exploration of power efficiency of microcontrollers running machine learning models, this manuscript contrasts the performance of two types of state-of-the-art microcontrollers, namely ESP32 with an LX6 core and ESP32-S3 wi... ver más
Revista: Information

 
Yu Dai, Jiaming Fu, Zhen Gao and Lei Yang    
Due to CPU and memory limitations, mobile IoT devices face challenges in handling delay-sensitive and computationally intensive tasks. Mobile edge computing addresses this issue by offloading tasks to the wireless network edge, reducing latency and energ... ver más
Revista: Applied Sciences