2017 Second International Conference on Fog and Mobile Edge Computing (FMEC)最新文献

筛选
英文 中文
Automated service delivery platform for C-RANs c - ran的自动服务交付平台
2017 Second International Conference on Fog and Mobile Edge Computing (FMEC) Pub Date : 2017-05-01 DOI: 10.1109/FMEC.2017.7946434
D. Bhamare, A. Erbad, R. Jain, M. Samaka
{"title":"Automated service delivery platform for C-RANs","authors":"D. Bhamare, A. Erbad, R. Jain, M. Samaka","doi":"10.1109/FMEC.2017.7946434","DOIUrl":"https://doi.org/10.1109/FMEC.2017.7946434","url":null,"abstract":"Cloud computing is gaining significant attention and virtualized data-centers are becoming popular as cost-effective infrastructure. Recently, there has been a trend to collocate the baseband unit (BBU) functionalities and services from multiple cellular base stations into centralized BBU pool for statistical multiplexing gain. The technology is known as Cloud Radio Access Network (C-RAN). C-RAN is a novel mobile network architecture that can address a number of challenges the mobile operators face while trying to support growing end users' needs. The idea is to virtualize BBU pools, which can be shared by different cellular network operators, allowing them to rent radio access network (RAN) as a cloud service. However, manual configuration of the BBU services over the virtualized infrastructure may be inefficient and error-prone with the increasing mobile traffic. In this work, we propose development of a novel automated service deployment platform, which will help to automate the instantiation of virtual machines at the central clouds as per user demands vary and achieve end-to-end automation in service delivery for C-RANs.","PeriodicalId":426271,"journal":{"name":"2017 Second International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114245877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A critical overview of latest challenges and solutions of Mobile Cloud Computing 移动云计算的最新挑战和解决方案的关键概述
2017 Second International Conference on Fog and Mobile Edge Computing (FMEC) Pub Date : 2017-05-01 DOI: 10.1109/FMEC.2017.7946435
H. Allam, N. Nassiri, Amala V. Rajan, Jinesh Ahmad
{"title":"A critical overview of latest challenges and solutions of Mobile Cloud Computing","authors":"H. Allam, N. Nassiri, Amala V. Rajan, Jinesh Ahmad","doi":"10.1109/FMEC.2017.7946435","DOIUrl":"https://doi.org/10.1109/FMEC.2017.7946435","url":null,"abstract":"The unabated plethora of research activities to augment multifarious mobile devices by leveraging cloud resources have created new research field called Mobile Cloud Computing (MCC). Recently, researchers have found Mobile Cloud Computing (MCC) to be a promising venture combining the advantage of both the cloud and mobility in giving users available resources on the cloud wherever they are using their mobile phone. Despite its benefits, many challenges still remain with MCC. This paper addressed recent challenges ranging from limited computational capacity, connectivity, security, latency, and heterogeneity. Solutions for these challenges are suggested including mobile processes offloading, using HTML5 technologies to compensate for connectivity loss, SDN centralized control features for data security, utilizing the cloud for time consuming applications, and using cross platform applications neutralizes heterogeneous technologies. Finally, the paper concludes with an extracted list of new research idea for scholars to work on to further enhance MCC.","PeriodicalId":426271,"journal":{"name":"2017 Second International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126567037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Priority-based Session Admission Control method for next generation Internet 基于优先级的下一代互联网会话准入控制方法
2017 Second International Conference on Fog and Mobile Edge Computing (FMEC) Pub Date : 2017-05-01 DOI: 10.1109/FMEC.2017.7946423
A. Skrastins, J. Jelinskis
{"title":"Priority-based Session Admission Control method for next generation Internet","authors":"A. Skrastins, J. Jelinskis","doi":"10.1109/FMEC.2017.7946423","DOIUrl":"https://doi.org/10.1109/FMEC.2017.7946423","url":null,"abstract":"The growing demand for Internet connection rapid growth increases the number of processed data flows. Connection admission control (CAC) policies realized by network operators require selective and priority-based connection processing strategy. An existing CAC solutions do not provide the ability to analyze multiple connection requests for the same decision-making moment, therefore lacks a comparative assessment among closely following requests and the current CAC together with DiffServ solution allows to realize only packet-level priority-based admission control. In this paper we argue that it is necessary to change new connection processing mechanisms of existing CAC solutions enabling comparison among concurrent sessions, as result, to realize session-level priority-based admission policy. Analysis of session-level Internet traffic demonstrate that lifetime of around 80% of flows is 3 – 6 seconds and the high intensity of new connection requests is one of the preconditions that allowed to offer a new approach to admission control solution for high-speed (gigabit) internet links. An experimental prototype of proposed admission control was realized on router available in the INET framework, by creating an experimental prototype for evaluation in the OMNeT++ simulation environment. The results show that the selectivity and choice possibilities in decision-making contribute to approval of different type of sessions and provide a strong ability to realize the priority-based management policy if compared with existed CAC approaches.","PeriodicalId":426271,"journal":{"name":"2017 Second International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126942916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
IoT development: Discovering, enabling and validation of real life IoT scenarios 物联网开发:发现、启用和验证现实生活中的物联网场景
2017 Second International Conference on Fog and Mobile Edge Computing (FMEC) Pub Date : 2017-05-01 DOI: 10.1109/FMEC.2017.7946424
Denis Makoshenko, Ilya Enkovich
{"title":"IoT development: Discovering, enabling and validation of real life IoT scenarios","authors":"Denis Makoshenko, Ilya Enkovich","doi":"10.1109/FMEC.2017.7946424","DOIUrl":"https://doi.org/10.1109/FMEC.2017.7946424","url":null,"abstract":"The paper outlines directions for further development of global IoT. In particular, it discusses steps supposed to unlock IoT potential to assist consumers in their day-to-day routines. For these purposes requirements for scalable model of interactions between IoT entities formulated and a particular model satisfying these requirements proposed, alternatives for distribution of intelligence across IoT discussed with focus on consequences to IoT scalability, and finally software simulation approach to IoT development briefed. It is suggested that key roadblocks on the path to IoT sustainable growth can be removed by running simulation of IoT universe. In particular, software simulation allows validation and debugging of a given IoT model; verification of model scalability; experiments with adding random capabilities to various IoT entities; exposure of new usage scenarios and validation of integration scenarios for new IoT entities into network.","PeriodicalId":426271,"journal":{"name":"2017 Second International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126119152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Exploring the trade-off between performance and energy consumption in cloud infrastructures 探索云基础设施中性能和能耗之间的权衡
2017 Second International Conference on Fog and Mobile Edge Computing (FMEC) Pub Date : 2017-05-01 DOI: 10.1109/FMEC.2017.7946418
D. Kanapram, G. Lamanna, M. Repetto
{"title":"Exploring the trade-off between performance and energy consumption in cloud infrastructures","authors":"D. Kanapram, G. Lamanna, M. Repetto","doi":"10.1109/FMEC.2017.7946418","DOIUrl":"https://doi.org/10.1109/FMEC.2017.7946418","url":null,"abstract":"Emerging fog and mobile edge computing paradigms will create distributed pervasive virtualization environments, where computing, storage, and networking resources will be deployed at the network boundary in a capillary way. To effectively tackle the large dynamic fluctuations in workload engendered by user-centric services, effective energy management schemes must be in place to modulate power consumption according to the actual processing load in each installation. In this respect, service orchestrators and multi- and cross-cloud energy management systems need proper tools to understand how power consumption would change with different placement decisions, both in the single as well as in federated clouds. In this paper, we describe a framework for exploring the trade-off between performance and energy consumption. Our work builds on the availability of both resource usage and power consumption measurements in Cloud Management Software, and makes proper correlation between these values to effectively support energy-efficiency strategies. We describe the implementation of energy monitoring framework in OpenStack, which leverages available features in the Ceilometer component.","PeriodicalId":426271,"journal":{"name":"2017 Second International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130160171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Resilience at the edge in cyber-physical systems 网络物理系统边缘的弹性
2017 Second International Conference on Fog and Mobile Edge Computing (FMEC) Pub Date : 2017-05-01 DOI: 10.1109/FMEC.2017.7946421
A. Dubey, G. Karsai, Subhav Pradhan
{"title":"Resilience at the edge in cyber-physical systems","authors":"A. Dubey, G. Karsai, Subhav Pradhan","doi":"10.1109/FMEC.2017.7946421","DOIUrl":"https://doi.org/10.1109/FMEC.2017.7946421","url":null,"abstract":"As the number of low cost computing devices at the edge of communication network increase, there are greater opportunities to enable innovative capabilities, especially in cyber-physical systems. For example, micro-grid power systems can make use of computing capabilities at the edge of a Smart Grid to provide more robust and decentralized control. However, the downside to distributing intelligence to the edge away from the controlled environment of the data centers is the increased risk of failures. The paper introduces a framework for handling these challenges. The contribution of this framework is to support strategies to (a) tolerate the transient faults as they appear due to network fluctuations or node failures, and to (b) systematically reconfigure the application if the faults persist.","PeriodicalId":426271,"journal":{"name":"2017 Second International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122443771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An Energy-Efficient Cross-Layer approach for cloud wireless green communications 云无线绿色通信的节能跨层方法
2017 Second International Conference on Fog and Mobile Edge Computing (FMEC) Pub Date : 2017-05-01 DOI: 10.1109/FMEC.2017.7946436
A. Sadiq, Turfah Zeyad Almohammad, Rabiatul Adawiah Bt Muhamed Khadri, Abdulghani Ali, Jaime Lloret
{"title":"An Energy-Efficient Cross-Layer approach for cloud wireless green communications","authors":"A. Sadiq, Turfah Zeyad Almohammad, Rabiatul Adawiah Bt Muhamed Khadri, Abdulghani Ali, Jaime Lloret","doi":"10.1109/FMEC.2017.7946436","DOIUrl":"https://doi.org/10.1109/FMEC.2017.7946436","url":null,"abstract":"In wireless sensor networks (WSN), energy consumption is one of the crucial issues. It is very important to conserve energy at each sensor node to prolong a network lifetime. The main challenge in WSN is to develop an energy efficient algorithm to minimize energy consumption during transmitting information from deployed sensors up to the cloud resources. Many researches have been studied the designing of energy efficient technique based on one-layer stack model approach. In this study, we propose Energy-Efficient Cross-Layer (EECL) approach by using the interaction of MAC layer and physical layer information to be exploited by a network layer to achieve energy efficient communication. More precisely, network layer could utilize the MAC layer and physical layer information to establish an energy efficient route path to be used in forwarding data. The proposed EECL approach uses X-MAC protocol in support of duty cycle which introduces short preambles that switches to wake-up/sensing mode only for nodes belonging to routing path while the other nodes set to be in sleep mode. The distance between nodes that influences energy consumption and Bit Error Rate (BER) are set to be the parameters which they are help in indicating the required power for each hop during route path selection in WSN and avoid the rely-hops that suffering from high average BER and with farther distance. We conduct the experiment using Matlab to evaluate the effectiveness of our proposed approach in terms of power consumption and obtained data rate. The results show that our proposed EECL approach outperforms its representatives in the ability of tuning the power utilized in respect with required data rate that could satisfy the desired Quality-of-Service (QoS).","PeriodicalId":426271,"journal":{"name":"2017 Second International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126538297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Collision-free anycast transmission scheduling in UWSNs uwsn中的无冲突任播传输调度
2017 Second International Conference on Fog and Mobile Edge Computing (FMEC) Pub Date : 2017-05-01 DOI: 10.1109/FMEC.2017.7946432
Ahmad A. Ababneh, M. Al-Ayyoub, Y. Jararweh, M. Alsmirat
{"title":"Collision-free anycast transmission scheduling in UWSNs","authors":"Ahmad A. Ababneh, M. Al-Ayyoub, Y. Jararweh, M. Alsmirat","doi":"10.1109/FMEC.2017.7946432","DOIUrl":"https://doi.org/10.1109/FMEC.2017.7946432","url":null,"abstract":"Underwater Wireless Sensor Network (UWSNs) have been proposed to monitor underwater regions such as seas and oceans. A typical example of an UWSN consists of a set of underwater sensor nodes and a set of sink nodes that are deployed at the sea surface. Using acoustic transmission, the sensors send their collected data to at least one of the sinks in what is known as the anycast transmission problem. One of the major problems with underwater nodes is their limited power, which means that transmission collisions are very costly. In this paper, we propose a collision-free anycast transmission scheduling algorithm for UWSNs. The proposed algorithm is a location-based routing algorithm that schedules transmissions between sensor nodes and sink nodes in order to minimize the energy consumption and possible collisions. We perform a set of experiments using the NS2 Aqua-Sim simulator to show that the proposed algorithm can provide up to 26% in energy savings compared with a simple greedy algorithm.","PeriodicalId":426271,"journal":{"name":"2017 Second International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"931 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133348478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Defining and testing virtual federated networks across multiple cloud sites 定义和测试跨多个云站点的虚拟联邦网络
2017 Second International Conference on Fog and Mobile Edge Computing (FMEC) Pub Date : 2017-05-01 DOI: 10.1109/FMEC.2017.7946416
Iván Andrade, C. Alfonso, I. Blanquer
{"title":"Defining and testing virtual federated networks across multiple cloud sites","authors":"Iván Andrade, C. Alfonso, I. Blanquer","doi":"10.1109/FMEC.2017.7946416","DOIUrl":"https://doi.org/10.1109/FMEC.2017.7946416","url":null,"abstract":"This article presents a federated network architecture which will be tested through different uses cases to analyze the performance and benefits of virtualized networks in a federated network environment, like download speed, latency, isolation and dynamic IP allocation via a single multi-site DHCP service. The tests will be made based in 3 scenarios: a physical network (WAN UPV), a virtual private network; and a virtual federated network. We will use the first scenario as our basis for all tests. After several tests, we detect a slight loss of performance when we go through different layers of virtualization in the federated environment, but small enough in comparison with the benefit that a federated network can give. We can have the interaction between different types of topology, cloud providers or independent partners where we can share resources through different sites. The article concludes that the benefits of a federated network environment are way bigger than the disadvantages.","PeriodicalId":426271,"journal":{"name":"2017 Second International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127053517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Internet of Things data analytics for user authentication and activity recognition 用于用户认证和活动识别的物联网数据分析
2017 Second International Conference on Fog and Mobile Edge Computing (FMEC) Pub Date : 2017-05-01 DOI: 10.1109/FMEC.2017.7946428
Samera Batool, N. Saqib, M. Khan
{"title":"Internet of Things data analytics for user authentication and activity recognition","authors":"Samera Batool, N. Saqib, M. Khan","doi":"10.1109/FMEC.2017.7946428","DOIUrl":"https://doi.org/10.1109/FMEC.2017.7946428","url":null,"abstract":"In recent years Internet of Things has been among the hot topics of research in the field of computing and information technology. It has enabled thousands of connected devices including sensors, cell phones and daily home appliances to store data for various useful purposes. The amount of data generated by IoT devices is huge, and there is a need to analyze IoT data for prospective uses. Heterogeneity and the structure of IoT data make it a challenging task. This paper presents a frame work for IoT data analytics for creating models for user identification, user authentication and activity recognition. Focus of this study is on the data set of accelerometer sensor from internet of things perspectives to add an extra layer of security. The novelty of our approach lies in the customization of the data set, and the experiments performed for the construction of models for each individual activity and user. The dataset is collected from 19 different subjects of real world conditions performing basic activities, i.e. walking, sitting and standing. This data set is used for the authentication process without requiring any additional information. In existing studies, the results are obtained using more than one accelerometer sensor reading or a combination of gyroscope sensor and accelerometer sensor. Whereas we have used single sensing tri-axial sensor reading for activity recognition and user authentication models. These models are later verified by real time data sets which were not used in the training process. The results of the experiments show accuracy up to 93%. The results obtained by the experiments are also helpful for future research directions in the field of IoT data analytics, activity recognition and user authentication. By enhancing the accuracy and adding context aware aspects in the authentication models can lead to the significant advances in the biometric authentication process using IoT data.","PeriodicalId":426271,"journal":{"name":"2017 Second International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123663695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信