Prioritized Task Distribution Considering Opportunistic Fog Computing Nodes.

Sensors (Basel)

School of Computer Engineering, Hanshin University, Osan 18101, Korea.

Published: April 2021

As service latency and core network load relates to performance issues in the conventional cloud-based computing environment, the fog computing system has gained a lot of interest. However, since the load can be concentrated on specific fog computing nodes because of spatial and temporal service characteristics, performance degradation can occur, resulting in quality of service (QoS) degradation, especially for delay-sensitive services. Therefore, this paper proposes a prioritized task distribution scheme, which considers static as well as opportunistic fog computing nodes according to their mobility feature. Based on the requirements of offloaded tasks, the proposed scheme supports delay sensitive task processing at the static fog node and delay in-sensitive tasks by means of opportunistic fog nodes for task distribution. To assess the performance of the proposed scheme, we develop an analytic model for the service response delay. Extensive simulation results are given to validate the analytic model and to show the performance of the proposed scheme, compared to the conventional schemes in terms of service response delay and outage probability.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC8069752PMC
http://dx.doi.org/10.3390/s21082635DOI Listing

Publication Analysis

Top Keywords

fog computing
16
task distribution
12
opportunistic fog
12
computing nodes
12
proposed scheme
12
prioritized task
8
performance proposed
8
analytic model
8
service response
8
response delay
8

Similar Publications

Solu: a cloud platform for real-time genomic pathogen surveillance.

BMC Bioinformatics

January 2025

Solu Healthcare Oy, Kalevankatu 31 A 13, 00100, Helsinki, Finland.

Background: Genomic surveillance is extensively used for tracking public health outbreaks and healthcare-associated pathogens. Despite advancements in bioinformatics pipelines, there are still significant challenges in terms of infrastructure, expertise, and security when it comes to continuous surveillance. The existing pipelines often require the user to set up and manage their own infrastructure and are not designed for continuous surveillance that demands integration of new and regularly generated sequencing data with previous analyses.

View Article and Find Full Text PDF

In response to the demand for advanced tools in environmental monitoring and policy formulation, this work leverages modern software and big data technologies to enhance novel road transport emissions research. This is achieved by making data and analysis tools more widely available and customisable so users can tailor outputs to their requirements. Through the novel combination of vehicle emissions remote sensing and cloud computing methodologies, these developments aim to reduce the barriers to understanding real-driving emissions (RDE) across urban environments.

View Article and Find Full Text PDF

Ensuring Reliable Network Communication and Data Processing in Internet of Things Systems with Prediction-Based Resource Allocation.

Sensors (Basel)

January 2025

Department of Computer Science and Systems Engineering, Faculty of Information and Communication Technology, Wrocław University of Science and Technology, 50-370 Wrocław, Poland.

The distributed nature of IoT systems and new trends focusing on fog computing enforce the need for reliable communication that ensures the required quality of service for various scenarios. Due to the direct interaction with the real world, failure to deliver the required QoS level can introduce system failures and lead to further negative consequences for users. This paper introduces a prediction-based resource allocation method for Multi-Access Edge Computing-capable networks, aimed at assurance of the required QoS and optimization of resource utilization for various types of IoT use cases featuring adaptability to changes in users' requests.

View Article and Find Full Text PDF

Most current research in cloud forensics is focused on tackling the challenges encountered by forensic investigators in identifying and recovering artifacts from cloud devices. These challenges arise from the diverse array of cloud service providers as each has its distinct rules, guidelines, and requirements. This research proposes an investigation technique for identifying and locating data remnants in two main stages: artefact collection and evidence identification.

View Article and Find Full Text PDF

Securing Cloud-Based Internet of Things: Challenges and Mitigations.

Sensors (Basel)

December 2024

Department of Computer Science & Engineering, Sungkyunkwan University, Suwon 16419, Republic of Korea.

The Internet of Things (IoT) has seen remarkable advancements in recent years, leading to a paradigm shift in the digital landscape. However, these technological strides have introduced new challenges, particularly in cybersecurity. IoT devices, inherently connected to the internet, are susceptible to various forms of attacks.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!