Reference Hub14
Proactive Mobile Fog Computing using Work Stealing: Data Processing at the Edge

Proactive Mobile Fog Computing using Work Stealing: Data Processing at the Edge

Sander Soo, Chii Chang, Seng W. Loke, Satish Narayana Srirama
Copyright: © 2017 |Volume: 8 |Issue: 4 |Pages: 19
ISSN: 1937-9412|EISSN: 1937-9404|EISBN13: 9781522511984|DOI: 10.4018/IJMCMC.2017100101
Cite Article Cite Article

MLA

Soo, Sander, et al. "Proactive Mobile Fog Computing using Work Stealing: Data Processing at the Edge." IJMCMC vol.8, no.4 2017: pp.1-19. http://doi.org/10.4018/IJMCMC.2017100101

APA

Soo, S., Chang, C., Loke, S. W., & Srirama, S. N. (2017). Proactive Mobile Fog Computing using Work Stealing: Data Processing at the Edge. International Journal of Mobile Computing and Multimedia Communications (IJMCMC), 8(4), 1-19. http://doi.org/10.4018/IJMCMC.2017100101

Chicago

Soo, Sander, et al. "Proactive Mobile Fog Computing using Work Stealing: Data Processing at the Edge," International Journal of Mobile Computing and Multimedia Communications (IJMCMC) 8, no.4: 1-19. http://doi.org/10.4018/IJMCMC.2017100101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

A common design of the Internet of Things (IoT) system relies on distant Cloud for management and processing, which faces the challenge of latency, especially when the application requires rapid response in the edge network. Therefore, researchers have proposed the Fog computing architecture, which distributes the computational data processing tasks to the edge network nodes located in the vicinity of data sources and end-users to reduce the latency. Although the Fog computing architecture is promising, it still faces a challenge in mobility when the tasks come from ubiquitous mobile applications in which the data sources are moving objects. In order to address the challenge, this article proposes a proactive Fog service provisioning framework, which hastens the task distribution process in Mobile Fog use cases. Further, the proposed framework provides an optimization scheme in task allocation based on runtime context information. A proof-of-concept prototype has been implemented and tested on real devices.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.