Cloud computing is an emerging distributedcomputing paradigm for the dynamic provisioning of computing services on demand over the internet. Due to heavy demand of various IT services over the cloud, energy consumpti...
详细信息
ISBN:
(纸本)9781538642832
Cloud computing is an emerging distributedcomputing paradigm for the dynamic provisioning of computing services on demand over the internet. Due to heavy demand of various IT services over the cloud, energy consumption by data centers is growing significantly worldwide. the intense use of data centers leads to high energy consumptions, excessive CO2 emission and increase in the operating cost of the data centers. Although many virtual machine (VM) placement approaches have been proposed to improve the resource utilization and energy efficiency, most of these works assume a homogeneous environment in the data centers. However, the physical server configurations in heterogeneous data centers lead to varying energy consumption characteristics. In this paper, we model and implement a modified Intelligent Water Drop algorithm (MIWD) algorithm for dynamic provisioning of virtual machines on hosts in homogeneous and heterogeneous environments such that total energy consumption of a data center in cloud computing environment can be minimized Experimental results indicate that our proposed MIWD algorithm is giving superior results.
internet of things (IoT) systems are inherently built on data gathered from heterogeneous sources. In the quest to gather more data for better analytics, many IoT systems are instigating significant challenges. First,...
详细信息
ISBN:
(纸本)9781538639917
internet of things (IoT) systems are inherently built on data gathered from heterogeneous sources. In the quest to gather more data for better analytics, many IoT systems are instigating significant challenges. First, the sheer volume and velocity of data generated by IoT systems are burdening our networking infrastructure, especially at the edge. the mobility and intermittent connectivity of edge IoT nodes are further hampering real-time access and reporting of IoT data. As we attempt to synergize IoT systems to leverage resource discovery and remedy some of these challenges, the rising challenges of Quality of Information (QoI) and Quality of Resource (QoR) calibration, render many IoT interoperability attempts far-fetched. We survey a number of challenges in realizing IoT interoperability, and advocate for a uniform view of data management in IoT systems. We delve into three planes that encompass Big Sensed Data (BSD) research directions, presenting a building block for future research efforts in IoT data management.
We provide a distributed solution to the scheduling of slots over multiple channels in low power wireless sensor networks organized in data gathering tree which are the topologies that are expected to be deployed in t...
详细信息
ISBN:
(纸本)9781509043729
We provide a distributed solution to the scheduling of slots over multiple channels in low power wireless sensor networks organized in data gathering tree which are the topologies that are expected to be deployed in the internet of things (IoT). Our solution generates a dynamic and distributed schedule that achieves high throughput, low packet errors and collisions, as well as low energy consumption by avoiding deafness and reducing both overhead and overhearing. In our solution, nodes do not communicate large numbers of control message as local topology construction is only based on local link exchange to construct 2-hop neighborhood. To reach our goal, we chose to make use of Combinatorial Design theory, particularly Block Design. Within Block Design, we particularly focused on Latin Squares/Latin Rectangles (LS/LR), and Balanced Incomplete Block Design (BIBD). We evaluate the performance of our solution by comparing it with DiSCA (distributed Scheduling for Convergecast in Multichannel WSN) and show that we obtain better results in terms of throughput, packet delivery rate, and energy consumption. Our results are based on our implementation of both protocols on NS-3.26.
the upcoming internet of things (IoT) applications include real-time human activity monitoring with wearable sensors. Compared to the traditional environmental sensing with low-power wireless nodes, these new applicat...
详细信息
ISBN:
(纸本)9781538639917
the upcoming internet of things (IoT) applications include real-time human activity monitoring with wearable sensors. Compared to the traditional environmental sensing with low-power wireless nodes, these new applications generate a constant stream of a much higher rate. Nevertheless, the wearable devices remain battery powered and therefore restricted to low-power wireless standards such as IEEE 802.15.4 or Bluetooth Low Energy (BLE). Our work tackles the problem of building a reliable autonomous schedule for forwarding this kind of dynamic data in IEEE 802.15.4 TSCH networks. Due to the a priori unpredictability of these data source locations, the quality of the wireless links, and the routing topology of the forwarding network, it is wasteful to reserve the number of slots required for the worst-case scenario;under conditions of high expected datarate, it is downright impossible. the solution we propose is a hybrid approach where dedicated TSCH cells and shared TSCH slots coexist in the same schedule. We show that under realistic assumptions of wireless link diversity, adding shared slots to a TSCH schedule increases the overall packet delivery rate and the fairness of the system.
this paper proposes a conceptual Holistic Security Architecture for addressing the trust, confidentiality and privacy issues in internet of things (IoT). the novelty of IoT is their ability to increasingly perform aut...
详细信息
ISBN:
(纸本)9781538625019
this paper proposes a conceptual Holistic Security Architecture for addressing the trust, confidentiality and privacy issues in internet of things (IoT). the novelty of IoT is their ability to increasingly perform automated tasks in a way that was never envisaged. However, security and safety issues have been identified as key areas of huge concerns. this is not a surprise;as a disruptive technology, IoT come with inherent vulnerability and threats like most other computing systems. Its impact on everyday life, would obviously have a far-reaching devastating consequences when its security is breached or compromised. Providing end-to-end security and safety is an important critical success factor and assurance to sustain IoT' s benefits. Arguably, trust, confidentiality and privacy combined;connote one such layer of IoT security architecture. We provide a novel design with a configurable policy-based architecture that can scale proportionately in solving trust, confidentiality and privacy concerns simultaneously in distributed security domains. the architecture proposes a mechanism for negotiated release of provable attributes and resources, especially when devices have the capabilities and requirements to share data as well as collaborate in solving problems.
Task assignment is a crucial step in distributedcomputing system, the target of the task assignment problem in distributedcomputing system is to assign program tasks to processors so as to minimize overall costs mad...
详细信息
ISBN:
(纸本)9781538621653
Task assignment is a crucial step in distributedcomputing system, the target of the task assignment problem in distributedcomputing system is to assign program tasks to processors so as to minimize overall costs made of execution and communication costs and satisfy with various limited resources constraints simultaneously within a system. the task assignment problem with more than three processors is NP-hard. In this paper, we propose an algorithm based on Simplified Swarm Optimization (SSO) as an alternative method to solve the problem. the results of the proposed method ate demonstrated by comparing with well-known methods. the experimental results show that the proposed SSO produces good quality solutions and consumes moderate time in solving task assignment problem in distributedcomputing system.
In this paper we present a distributed, autonomous network calibration algorithm, which enables visual sensor networks to gather knowledge about the network topology. A calibrated sensor network provides the basis for...
详细信息
ISBN:
(纸本)9781538639917
In this paper we present a distributed, autonomous network calibration algorithm, which enables visual sensor networks to gather knowledge about the network topology. A calibrated sensor network provides the basis for more robust applications, since nodes are aware of their spatial neighbors. In our approach, sensor nodes estimate relative positions and orientations of nodes with overlapping fields of view based on jointly detected objects and geometric relations. Distance and angle measurements are the only information required to be exchanged between nodes. the process works iteratively, first calibrating camera neighbors in a pairwise manner and then spreading the calibration information through the network. Further, each node operates within its local coordinate system avoiding the need for any global coordinates. While existing methods mostly exploit computer vision algorithms to relate nodes to each other based on their images, we solely rely on geometric constraints.
暂无评论