Skip to main content
Top
Published in: The Journal of Supercomputing 6/2018

17-02-2018

Design and energy-efficient resource management of virtualized networked Fog architectures for the real-time support of IoT applications

Published in: The Journal of Supercomputing | Issue 6/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With the incoming 5G access networks, it is forecasted that Fog computing (FC) and Internet of Things (IoT) will converge onto the Fog-of-IoT paradigm. Since the FC paradigm spreads, by design, networking and computing resources over the wireless access network, it would enable the support of computing-intensive and delay-sensitive streaming applications under the energy-limited wireless IoT realm. Motivated by this consideration, the goal of this paper is threefold. First, it provides a motivating study the main “killer” application areas envisioned for the considered Fog-of-IoT paradigm. Second, it presents the design of a CoNtainer-based virtualized networked computing architecture. The proposed architecture operates at the Middleware layer and exploits the native capability of the Container Engines, so as to allow the dynamic real-time scaling of the available computing-plus-networking virtualized resources. Third, the paper presents a low-complexity penalty-aware bin packing-type heuristic for the dynamic management of the resulting virtualized computing-plus-networking resources. The proposed heuristic pursues the joint minimization of the networking-plus-computing energy by adaptively scaling up/down the processing speeds of the virtual processors and transport throughputs of the instantiated TCP/IP virtual connections, while guaranteeing hard (i.e., deterministic) upper bounds on the per-task computing-plus-networking delays. Finally, the actual energy performance-versus-implementation complexity trade-off of the proposed resource manager is numerically tested under both wireless static and mobile Fog-of-IoT scenarios and comparisons against the corresponding performances of some state-of-the-art benchmark resource managers and device-to-device edge computing platforms are also carried out.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Borgia E (2014) The internet of things vision: key features, applications and open issues. Comput Commun 54:1–31CrossRef Borgia E (2014) The internet of things vision: key features, applications and open issues. Comput Commun 54:1–31CrossRef
2.
go back to reference Ouaddah A, Mousannif H, Elkalam AA, Ouahman AA (2017) Access control in the internet of things: big challenges and new opportunities. Comput Netw 112:237–262CrossRef Ouaddah A, Mousannif H, Elkalam AA, Ouahman AA (2017) Access control in the internet of things: big challenges and new opportunities. Comput Netw 112:237–262CrossRef
3.
go back to reference Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing. ACM, pp 13–16 Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing. ACM, pp 13–16
4.
go back to reference Baccarelli E, Biagi M (2004) Power-allocation policy and optimized design of multiple-antenna systems with imperfect channel estimation. IEEE Trans Veh Technol 53(1):136–145CrossRef Baccarelli E, Biagi M (2004) Power-allocation policy and optimized design of multiple-antenna systems with imperfect channel estimation. IEEE Trans Veh Technol 53(1):136–145CrossRef
5.
go back to reference Baccarelli E, Biagi M, Pelizzoni C, Cordeschi N (2008) Optimal MIMO UWB-IR transceiver for Nakagami-fading and Poisson-arrivals. JCM 3(1):27–40CrossRef Baccarelli E, Biagi M, Pelizzoni C, Cordeschi N (2008) Optimal MIMO UWB-IR transceiver for Nakagami-fading and Poisson-arrivals. JCM 3(1):27–40CrossRef
6.
go back to reference Shojafar M, Cordeschi N, Amendola D, Baccarelli E (2015) Energy-saving adaptive computing and traffic engineering for real-time-service data centers. In: 2015 IEEE International Conference on Communication Workshop (ICCW 2015), London, UK, pp 1800–1806 Shojafar M, Cordeschi N, Amendola D, Baccarelli E (2015) Energy-saving adaptive computing and traffic engineering for real-time-service data centers. In: 2015 IEEE International Conference on Communication Workshop (ICCW 2015), London, UK, pp 1800–1806
7.
go back to reference Gupta H, Dastjerdi AV, Ghosh SK, Buyya R (2016) iFogSim: a toolkit for modeling and simulation of resource management techniques in internet of things, edge and fog computing environments. arXiv preprint arXiv:1606.02007 Gupta H, Dastjerdi AV, Ghosh SK, Buyya R (2016) iFogSim: a toolkit for modeling and simulation of resource management techniques in internet of things, edge and fog computing environments. arXiv preprint arXiv:​1606.​02007
8.
go back to reference Beloglazov A, Abawajy J, Buyya R (2012) Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing. Future Gener Comput Syst 28(5):755–768CrossRef Beloglazov A, Abawajy J, Buyya R (2012) Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing. Future Gener Comput Syst 28(5):755–768CrossRef
9.
go back to reference Lovász G, Niedermeier F, de Meer H (2013) Performance tradeoffs of energy-aware virtual machine consolidation. Clust Comput 16(3):481–496CrossRef Lovász G, Niedermeier F, de Meer H (2013) Performance tradeoffs of energy-aware virtual machine consolidation. Clust Comput 16(3):481–496CrossRef
10.
go back to reference Chang H, Kodialam M, Kompella RR, Lakshman T, Lee M, Mukherjee S (2011) Scheduling in mapreduce-like systems for fast completion time. In: 2011 Proceedings IEEE INFOCOM. IEEE, pp 3074–3082 Chang H, Kodialam M, Kompella RR, Lakshman T, Lee M, Mukherjee S (2011) Scheduling in mapreduce-like systems for fast completion time. In: 2011 Proceedings IEEE INFOCOM. IEEE, pp 3074–3082
11.
go back to reference Guazzone M, Anglano C, Canonico M (2011) Energy-efficient resource management for cloud computing infrastructures. In: Proceedings of the IEEE Third International Conference on Cloud Computing Technology and Science (CloudSim 2011), Athens, Greece, pp 1–11 Guazzone M, Anglano C, Canonico M (2011) Energy-efficient resource management for cloud computing infrastructures. In: Proceedings of the IEEE Third International Conference on Cloud Computing Technology and Science (CloudSim 2011), Athens, Greece, pp 1–11
12.
go back to reference Verma A, Cherkasova L, Kumar VS, Campbell RH (2012) Deadline-based workload management for mapreduce environments: pieces of the performance puzzle. In: Network Operations and Management Symposium (NOMS), 2012 IEEE. IEEE, pp 900–905 Verma A, Cherkasova L, Kumar VS, Campbell RH (2012) Deadline-based workload management for mapreduce environments: pieces of the performance puzzle. In: Network Operations and Management Symposium (NOMS), 2012 IEEE. IEEE, pp 900–905
13.
go back to reference Lim N, Majumdar S, Ashwood-Smith P (2014) A constraint programming-based resource management technique for processing mapreduce jobs with SLAs on clouds. In: 43rd International Conference on Parallel Processing (ICPP 2014). IEEE, pp 411–421 Lim N, Majumdar S, Ashwood-Smith P (2014) A constraint programming-based resource management technique for processing mapreduce jobs with SLAs on clouds. In: 43rd International Conference on Parallel Processing (ICPP 2014). IEEE, pp 411–421
14.
go back to reference Wirtz T, Ge R (2011) Improving mapreduce energy efficiency for computation intensive workloads. In: 2011 International Green Computing Conference and Workshops (IGCC). IEEE, pp 1–8 Wirtz T, Ge R (2011) Improving mapreduce energy efficiency for computation intensive workloads. In: 2011 International Green Computing Conference and Workshops (IGCC). IEEE, pp 1–8
15.
go back to reference Kim KH, Buyya R, Kim J (2007) Power aware scheduling of bag-of-tasks applications with deadline constraints on DVS-enabled clusters. In: Seventh IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2007), vol 7, pp 541–548 Kim KH, Buyya R, Kim J (2007) Power aware scheduling of bag-of-tasks applications with deadline constraints on DVS-enabled clusters. In: Seventh IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2007), vol 7, pp 541–548
16.
go back to reference Beloglazov A, Buyya R (2010) Energy efficient resource management in virtualized cloud data centers. In: Proceedings of the 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing. IEEE Computer Society, pp 826–831 Beloglazov A, Buyya R (2010) Energy efficient resource management in virtualized cloud data centers. In: Proceedings of the 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing. IEEE Computer Society, pp 826–831
17.
go back to reference Cardosa M, Singh A, Pucha H, Chandra A (2012) Exploiting spatio-temporal tradeoffs for energy-aware mapreduce in the cloud. IEEE Trans Comput 61(12):1737–1751MathSciNetCrossRefMATH Cardosa M, Singh A, Pucha H, Chandra A (2012) Exploiting spatio-temporal tradeoffs for energy-aware mapreduce in the cloud. IEEE Trans Comput 61(12):1737–1751MathSciNetCrossRefMATH
18.
go back to reference Çavdar D, Chen LY, Alagöz F (2014) Green mapreduce for heterogeneous data centers. In: 2014 IEEE Global Communications Conference (GLOBECOM). IEEE, pp 1120–1126 Çavdar D, Chen LY, Alagöz F (2014) Green mapreduce for heterogeneous data centers. In: 2014 IEEE Global Communications Conference (GLOBECOM). IEEE, pp 1120–1126
19.
go back to reference Chiang Y-J, Ouyang Y-C, Hsu C-HR (2015) An efficient green control algorithm in cloud computing for cost optimization. IEEE Trans Cloud Comput 3(2):145–155CrossRef Chiang Y-J, Ouyang Y-C, Hsu C-HR (2015) An efficient green control algorithm in cloud computing for cost optimization. IEEE Trans Cloud Comput 3(2):145–155CrossRef
20.
go back to reference Baccarelli E, Cusani R (1996) Recursive Kalman-type optimal estimation and detection of hidden Markov chains. Sig Process 51(1):55–64CrossRefMATH Baccarelli E, Cusani R (1996) Recursive Kalman-type optimal estimation and detection of hidden Markov chains. Sig Process 51(1):55–64CrossRefMATH
21.
go back to reference Neumeyer L, Robbins B, Nair A, Kesari A (2010) S4: distributed stream computing platform. In: 2010 IEEE International Conference on Data Mining Workshops (ICDMW). IEEE, pp 170–177 Neumeyer L, Robbins B, Nair A, Kesari A (2010) S4: distributed stream computing platform. In: 2010 IEEE International Conference on Data Mining Workshops (ICDMW). IEEE, pp 170–177
22.
go back to reference Zaharia M, Das T, Li H, Shenker S, Stoica I (2012) Discretized streams: an efficient and fault-tolerant model for stream processing on large clusters. In: Proceedings of the 4th USENIX Conference on Hot Topics in Cloud Computing (HotCloud), vol 12, p 10 Zaharia M, Das T, Li H, Shenker S, Stoica I (2012) Discretized streams: an efficient and fault-tolerant model for stream processing on large clusters. In: Proceedings of the 4th USENIX Conference on Hot Topics in Cloud Computing (HotCloud), vol 12, p 10
23.
go back to reference Qian Z, He Y, Su C, Wu Z, Zhu H, Zhang T, Zhou L, Yu Y, Zhang Z (2013) Timestream: reliable stream computation in the cloud. In: Proceedings of the 8th ACM European Conference on Computer Systems. ACM, pp 1–14 Qian Z, He Y, Su C, Wu Z, Zhu H, Zhang T, Zhou L, Yu Y, Zhang Z (2013) Timestream: reliable stream computation in the cloud. In: Proceedings of the 8th ACM European Conference on Computer Systems. ACM, pp 1–14
24.
go back to reference Kumbhare AG, Simmhan Y, Prasanna VK (2014) Plasticc: predictive look-ahead scheduling for continuous dataflows on clouds. In: 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2014). IEEE, pp 344–353 Kumbhare AG, Simmhan Y, Prasanna VK (2014) Plasticc: predictive look-ahead scheduling for continuous dataflows on clouds. In: 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2014). IEEE, pp 344–353
25.
go back to reference Bonomi F (2011) Connected vehicles, the internet of things, and fog computing. In: Proceedings of the Eighth ACM International Workshop on Vehicular Internetworking, Las Vegas, pp 1–5 Bonomi F (2011) Connected vehicles, the internet of things, and fog computing. In: Proceedings of the Eighth ACM International Workshop on Vehicular Internetworking, Las Vegas, pp 1–5
26.
go back to reference Kai K, Cong W, Tao L (2016) Fog computing for vehicular ad-hoc networks: paradigms, scenarios, and issues. J China Univ Posts Telecommun 23(2):56–96CrossRef Kai K, Cong W, Tao L (2016) Fog computing for vehicular ad-hoc networks: paradigms, scenarios, and issues. J China Univ Posts Telecommun 23(2):56–96CrossRef
28.
go back to reference Baccarelli E, Vinueza Naranjo PG, Scarpiniti M, Shojafar M, Abawajy JH, Abawajy JH (2017) Fog of everything: energy-efficient networked computing architectures, research challenges, and a case study. IEEE Access 5:9882–9910CrossRef Baccarelli E, Vinueza Naranjo PG, Scarpiniti M, Shojafar M, Abawajy JH, Abawajy JH (2017) Fog of everything: energy-efficient networked computing architectures, research challenges, and a case study. IEEE Access 5:9882–9910CrossRef
29.
go back to reference Peralta G, Iglesias-Urkia M, Barcelo M, Gomez R, Moran A, Bilbao J (2017) Fog computing based efficient IoT scheme for the industry 4.0. In: Proceedings of the 2017 International Workshop of Electronics, Control, Measurement, Signals and Their Application to Mechatronics (ECMSM 2017), Donostia-San Sebastian, Spain, pp 24–26 Peralta G, Iglesias-Urkia M, Barcelo M, Gomez R, Moran A, Bilbao J (2017) Fog computing based efficient IoT scheme for the industry 4.0. In: Proceedings of the 2017 International Workshop of Electronics, Control, Measurement, Signals and Their Application to Mechatronics (ECMSM 2017), Donostia-San Sebastian, Spain, pp 24–26
30.
go back to reference Tao F, Zuo Y, Da Xu L, Zhang L (2014) IoT-based intelligent perception and access of manufacturing resource toward cloud manufacturing. IEEE Trans Ind Inform 10(2):1547–1557CrossRef Tao F, Zuo Y, Da Xu L, Zhang L (2014) IoT-based intelligent perception and access of manufacturing resource toward cloud manufacturing. IEEE Trans Ind Inform 10(2):1547–1557CrossRef
31.
go back to reference Ma Y, Wang X, Zhou X, Gao Z, Wu Y, Yin J, Xu X (2016) An overview of energy internet. In: 2016 Chinese Control and Decision Conference (CCDC). IEEE, pp 6212–6215 Ma Y, Wang X, Zhou X, Gao Z, Wu Y, Yin J, Xu X (2016) An overview of energy internet. In: 2016 Chinese Control and Decision Conference (CCDC). IEEE, pp 6212–6215
32.
go back to reference Baccarelli E, Cordeschi N, Mei A, Panella M, Shojafar M, Stefa J (2016) Energy-efficient dynamic traffic offloading and reconfiguration of networked data centers for big data stream mobile computing: review, challenges, and a case study. IEEE Netw 30(2):54–61CrossRef Baccarelli E, Cordeschi N, Mei A, Panella M, Shojafar M, Stefa J (2016) Energy-efficient dynamic traffic offloading and reconfiguration of networked data centers for big data stream mobile computing: review, challenges, and a case study. IEEE Netw 30(2):54–61CrossRef
33.
go back to reference Yovanof GS, Hazapis GN (2009) An architectural framework and enabling wireless technologies for digital cities and intelligent urban environments. Wirel Pers Commun 49(3):445–463CrossRef Yovanof GS, Hazapis GN (2009) An architectural framework and enabling wireless technologies for digital cities and intelligent urban environments. Wirel Pers Commun 49(3):445–463CrossRef
34.
go back to reference Baccarelli E, Cordeschi N, Polli V (2013) Optimal self-adaptive QoS resource management in interference-affected multicast wireless networks. IEEE/ACM Trans Netw (TON) 21(6):1750–1759CrossRef Baccarelli E, Cordeschi N, Polli V (2013) Optimal self-adaptive QoS resource management in interference-affected multicast wireless networks. IEEE/ACM Trans Netw (TON) 21(6):1750–1759CrossRef
35.
go back to reference Portnoy M (2012) Virtualization essentials. Wiley, New York Portnoy M (2012) Virtualization essentials. Wiley, New York
36.
go back to reference Soltesz S, Pötzl H, Fiuczynski ME, Bavier A, Peterson L (2007) Container-based operating system virtualization: a scalable, high-performance alternative to hypervisors. In: ACM SIGOPS Operating Systems Review, vol 41. ACM, pp 275–287 Soltesz S, Pötzl H, Fiuczynski ME, Bavier A, Peterson L (2007) Container-based operating system virtualization: a scalable, high-performance alternative to hypervisors. In: ACM SIGOPS Operating Systems Review, vol 41. ACM, pp 275–287
37.
go back to reference Kwak J, Kim Y, Lee J, Chong S (2015) DREAM: dynamic resource and task allocation for energy minimization in mobile cloud systems. IEEE J Sel Areas Commun 33(12):2510–2523CrossRef Kwak J, Kim Y, Lee J, Chong S (2015) DREAM: dynamic resource and task allocation for energy minimization in mobile cloud systems. IEEE J Sel Areas Commun 33(12):2510–2523CrossRef
38.
go back to reference McCarthy D, Malone P, Hange J, Doyle K, Robson E, Conway D, Ivanov S, Radziwonowicz L, Kleinfeld R, Michalareas T, Kastrinogiannis T, Stasinos N, Lampathaki F (2015) Personal cloudlets: implementing a user-centric datastore with privacy aware access control for cloud-based data platforms. In: Proceedings of the First International Workshop on TEchnical and LEgal Aspects of Data pRIvacy and SEcurity (TELERISE), Florence, Italy, pp 38–43 McCarthy D, Malone P, Hange J, Doyle K, Robson E, Conway D, Ivanov S, Radziwonowicz L, Kleinfeld R, Michalareas T, Kastrinogiannis T, Stasinos N, Lampathaki F (2015) Personal cloudlets: implementing a user-centric datastore with privacy aware access control for cloud-based data platforms. In: Proceedings of the First International Workshop on TEchnical and LEgal Aspects of Data pRIvacy and SEcurity (TELERISE), Florence, Italy, pp 38–43
39.
go back to reference Huang X, Xiang Y, Bertino E, Zhou J, Xu L (2014) Robust multi-factor authentication for fragile communications. IEEE Trans Dependable Secure Comput 11(6):568–581CrossRef Huang X, Xiang Y, Bertino E, Zhou J, Xu L (2014) Robust multi-factor authentication for fragile communications. IEEE Trans Dependable Secure Comput 11(6):568–581CrossRef
40.
go back to reference Stojmenovic I, Wen S, Huang X, Luan H (2016) An overview of fog computing and its security issues. Concurr Comput Pract Exp 28(10):2991–3005CrossRef Stojmenovic I, Wen S, Huang X, Luan H (2016) An overview of fog computing and its security issues. Concurr Comput Pract Exp 28(10):2991–3005CrossRef
41.
go back to reference Dsouza C, Ahn G-J, Taguinod M (2014) Policy-driven security management for fog computing: preliminary framework and a case study. In: 2014 IEEE 15th International Conference on Information Reuse and Integration (IRI), Redwood City, CA, USA, pp 16–23 Dsouza C, Ahn G-J, Taguinod M (2014) Policy-driven security management for fog computing: preliminary framework and a case study. In: 2014 IEEE 15th International Conference on Information Reuse and Integration (IRI), Redwood City, CA, USA, pp 16–23
42.
go back to reference Abdo J, Demerjian J, Chaouchi H, Atechian T, Bassil C (2015) Privacy using mobile cloud computing. In: 2015 Fifth International Conference on Digital Information and Communication Technology and its Applications (DICTAP). Lebanese University, Beirut, Lebanon, pp 178–182 Abdo J, Demerjian J, Chaouchi H, Atechian T, Bassil C (2015) Privacy using mobile cloud computing. In: 2015 Fifth International Conference on Digital Information and Communication Technology and its Applications (DICTAP). Lebanese University, Beirut, Lebanon, pp 178–182
43.
go back to reference Wang C, Ren K, Wang J (2016) Secure optimization computation outsourcing in cloud computing: a case study of linear programming. IEEE Trans Comput 65(1):216–229MathSciNetCrossRefMATH Wang C, Ren K, Wang J (2016) Secure optimization computation outsourcing in cloud computing: a case study of linear programming. IEEE Trans Comput 65(1):216–229MathSciNetCrossRefMATH
44.
go back to reference Perez R, Sailer R, Van Doorn L (2006) vTPM: virtualizing the trusted platform module. In: Proceedings of 15th Conference on USENIX Security Symposium, pp 305–320 Perez R, Sailer R, Van Doorn L (2006) vTPM: virtualizing the trusted platform module. In: Proceedings of 15th Conference on USENIX Security Symposium, pp 305–320
45.
go back to reference Hong K, Lillethun D, Ramachandran U, Ottenwälder B, Koldehofe B (2013) Mobile fog: a programming model for large-scale applications on the internet of things. In: Proceedings of the Second ACM SIGCOMM Workshop on Mobile Cloud Computing, Hong Kong, China, pp 15–20 Hong K, Lillethun D, Ramachandran U, Ottenwälder B, Koldehofe B (2013) Mobile fog: a programming model for large-scale applications on the internet of things. In: Proceedings of the Second ACM SIGCOMM Workshop on Mobile Cloud Computing, Hong Kong, China, pp 15–20
46.
go back to reference Kansal A, Zhao F, Liu J, Kothari N, Bhattacharya AA (2010) Virtual machine power metering and provisioning. In: Proceedings of the 1st ACM Symposium on Cloud Computing. ACM, pp 39–50 Kansal A, Zhao F, Liu J, Kothari N, Bhattacharya AA (2010) Virtual machine power metering and provisioning. In: Proceedings of the 1st ACM Symposium on Cloud Computing. ACM, pp 39–50
47.
go back to reference Urgaonkar B, Pacifici G, Shenoy P, Spreitzer M, Tantawi A (2007) Analytic modeling of multitier internet applications. ACM Trans Web (TWEB) 1(1):2CrossRef Urgaonkar B, Pacifici G, Shenoy P, Spreitzer M, Tantawi A (2007) Analytic modeling of multitier internet applications. ACM Trans Web (TWEB) 1(1):2CrossRef
48.
go back to reference Gulati A, Merchant A, Varman PJ (2010) mClock: handling throughput variability for hypervisor IO scheduling. In: Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation. USENIX Association, pp 437–450 Gulati A, Merchant A, Varman PJ (2010) mClock: handling throughput variability for hypervisor IO scheduling. In: Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation. USENIX Association, pp 437–450
49.
go back to reference Guo C, Lu G, Wang HJ, Yang S, Kong C, Sun P, Wu W, Zhang Y (2010) SecondNet: a data center network virtualization architecture with bandwidth guarantees. In: Proceedings of the 6th International Conference on Emerging Networking Experiments and Technologies (CoNEXT). ACM, p 15 Guo C, Lu G, Wang HJ, Yang S, Kong C, Sun P, Wu W, Zhang Y (2010) SecondNet: a data center network virtualization architecture with bandwidth guarantees. In: Proceedings of the 6th International Conference on Emerging Networking Experiments and Technologies (CoNEXT). ACM, p 15
50.
go back to reference Iyengar SS, Brooks RR (2012) Distributed sensor networks: sensor networking and applications. CRC Press, Boca RatonCrossRefMATH Iyengar SS, Brooks RR (2012) Distributed sensor networks: sensor networking and applications. CRC Press, Boca RatonCrossRefMATH
51.
go back to reference Da Costa F (2013) Rethinking the Internet of Things: a scalable approach to connecting everything. Apress, New York Da Costa F (2013) Rethinking the Internet of Things: a scalable approach to connecting everything. Apress, New York
52.
go back to reference Zhou Z, Liu F, Xu Y, Zou R, Xu H, Lui JCS, Jin H (2013) Carbon-aware load balancing for geo-distributed cloud services. In: 2013 IEEE 21st International Symposium on Modelling, Analysis and Simulation of Computer and Telecommunication Systems. IEEE, pp 232–241 Zhou Z, Liu F, Xu Y, Zou R, Xu H, Lui JCS, Jin H (2013) Carbon-aware load balancing for geo-distributed cloud services. In: 2013 IEEE 21st International Symposium on Modelling, Analysis and Simulation of Computer and Telecommunication Systems. IEEE, pp 232–241
53.
go back to reference Abe Y, Geambasu R, Joshi K, Lagar-Cavilla HA, Satyanarayanan M (2013) vTube: efficient streaming of virtual appliances over last-mile networks. In: Proceedings of the ACM 4th Annual Symposium on Cloud Computing, Santa Clara, CA, USA, p 16, 1–3 Oct 2013 Abe Y, Geambasu R, Joshi K, Lagar-Cavilla HA, Satyanarayanan M (2013) vTube: efficient streaming of virtual appliances over last-mile networks. In: Proceedings of the ACM 4th Annual Symposium on Cloud Computing, Santa Clara, CA, USA, p 16, 1–3 Oct 2013
54.
go back to reference Baccarelli E, Cusani R, Galli S (1998) A novel adaptive receiver with enhanced channel tracking capability for TDMA-based mobile radio communications. IEEE J Sel Areas Commun 16(9):1630–1639CrossRef Baccarelli E, Cusani R, Galli S (1998) A novel adaptive receiver with enhanced channel tracking capability for TDMA-based mobile radio communications. IEEE J Sel Areas Commun 16(9):1630–1639CrossRef
55.
go back to reference Taleb T, Ksentini A (2016) Follow me cloud: interworking federated clouds and distributed mobile networks. IEEE Netw 27(5):12–19CrossRef Taleb T, Ksentini A (2016) Follow me cloud: interworking federated clouds and distributed mobile networks. IEEE Netw 27(5):12–19CrossRef
56.
go back to reference Gandotra P, Jha RK, Jain S (2017) A survey on device-to-device (D2D) communication: architecture and security issues. J Netw Comput Appl 78:9–29CrossRef Gandotra P, Jha RK, Jain S (2017) A survey on device-to-device (D2D) communication: architecture and security issues. J Netw Comput Appl 78:9–29CrossRef
57.
go back to reference Byers CC, Wetterwald P (2015) Ubiquity symposium: the Internet of Things: fog computing: distributing data and intelligence for resiliency and scale necessary for IoT. Ubiquity 11:1–12CrossRef Byers CC, Wetterwald P (2015) Ubiquity symposium: the Internet of Things: fog computing: distributing data and intelligence for resiliency and scale necessary for IoT. Ubiquity 11:1–12CrossRef
58.
go back to reference Kaur R, Mahajan M (2015) Fault tolerance in cloud computing. Int J Sci Technol Manag (IJSTM) 6(1):1–4 Kaur R, Mahajan M (2015) Fault tolerance in cloud computing. Int J Sci Technol Manag (IJSTM) 6(1):1–4
Metadata
Title
Design and energy-efficient resource management of virtualized networked Fog architectures for the real-time support of IoT applications
Publication date
17-02-2018
Published in
The Journal of Supercomputing / Issue 6/2018
Print ISSN: 0920-8542
Electronic ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-018-2274-0

Other articles of this Issue 6/2018

The Journal of Supercomputing 6/2018 Go to the issue

Premium Partner