Details

Fog and Fogonomics


Fog and Fogonomics

Challenges and Practices of Fog Computing, Communication, Networking, Strategy, and Economics
Information and Communication Technology Series, Band 57 1. Aufl.

von: Yang Yang, Jianwei Huang, Tao Zhang, Joe Weinman

108,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 14.01.2020
ISBN/EAN: 9781119501107
Sprache: englisch
Anzahl Seiten: 416

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<p><b>THE ONE-STOP RESOURCE FOR ANY INDIVIDUAL OR ORGANIZATION CONSIDERING FOG COMPUTING</b> <p><i>Fog and Fogonomics</i> is a comprehensive and technology-centric resource<i></i> that highlights the system model, architectures, building blocks, and IEEE standards for fog computing platforms and solutions. The "fog" is defined as the multiple interconnected layers of computing along the continuum from cloud to endpoints such as user devices and things including racks or microcells in server closets, residential gateways, factory control systems, and more. <p>The authors—noted experts on the topic—review business models and metrics that allow for the economic assessment of fog-based information communication technology (ICT) resources, especially mobile resources. The book contains a wide range of templates and formulas for calculating quality-of-service values. Comprehensive in scope, it covers topics including fog computing technologies and reference architecture, fog-related standards and markets, fog-enabled applications and services, fog economics (fogonomics), and strategy. <p>This important resource: <ul> <li>Offers a comprehensive text on fog computing</li> <li>Discusses pricing, service level agreements, service delivery, and consumption of fog computing</li> <li>Examines how fog has the potential to change the information and communication technology industry in the next decade</li> <li>Describes how fog enables new business models, strategies, and competitive differentiation, as with ecosystems of connected and smart digital products and services</li> <li>Includes case studies featuring integration of fog computing, communication, and networking systems</li> </ul> </ul> <p>Written for product and systems engineers and designers, as well as for faculty and students, <i>Fog and Fogonomics</i> is an essential book that explores the technological and economic issues associated with fog computing.
<p>List of Contributors xvii</p> <p>Preface xxi</p> <p><b>1 Fog Computing and Fogonomics 1<br /></b><i>Yang Yang, Jianwei Huang, Tao Zhang, and Joe Weinman</i></p> <p><b>2 Collaborative Mechanism for Hybrid Fog-Cloud Scenarios 7<br /></b><i>Xavi Masip, Eva Marín, Jordi Garcia, and Sergi Sànchez</i></p> <p>2.1 The Collaborative Scenario 7</p> <p>2.1.1 The F2C Model 11</p> <p>2.1.1.1 The Layering Architecture 13</p> <p>2.1.1.2 The Fog Node 14</p> <p>2.1.1.3 F2C as a Service 16</p> <p>2.1.2 The F2C Control Architecture 19</p> <p>2.1.2.1 Hierarchical Architecture 20</p> <p>2.1.2.2 Main Functional Blocks 24</p> <p>2.1.2.3 Managing Control Data 25</p> <p>2.1.2.4 Sharing Resources 26</p> <p>2.2 Benefits and Applicability 28</p> <p>2.3 The Challenges 29</p> <p>2.3.1 Research Challenges 30</p> <p>2.3.1.1 What a Resource is 30</p> <p>2.3.1.2 Categorization 30</p> <p>2.3.1.3 Identification 31</p> <p>2.3.1.4 Clustering 33</p> <p>2.3.1.5 Resources Discovery 33</p> <p>2.3.1.6 Resource Allocation 34</p> <p>2.3.1.7 Reliability 35</p> <p>2.3.1.8 QoS 36</p> <p>2.3.1.9 Security 36</p> <p>2.3.2 Industry Challenges 37</p> <p>2.3.2.1 What an F2C Provider Should Be? 38</p> <p>2.3.2.2 Shall Cloud/Fog Providers Communicate with Each Other 38</p> <p>2.3.2.3 How Multifog/Cloud Access is Managed 39</p> <p>2.3.3 Business Challenges 40</p> <p>2.4 Ongoing Efforts 41</p> <p>2.4.1 ECC 41</p> <p>2.4.2 mF2C 42</p> <p>2.4.3 MEC 42</p> <p>2.4.4 OEC 44</p> <p>2.4.5 OFC 44</p> <p>2.5 Handling Data in Coordinated Scenarios 45</p> <p>2.5.1 The New Data 46</p> <p>2.5.2 The Life Cycle of Data 48</p> <p>2.5.3 F2C Data Management 49</p> <p>2.5.3.1 Data Collection 49</p> <p>2.5.3.2 Data Storage 51</p> <p>2.5.3.3 Data Processing 52</p> <p>2.6 The Coming Future 52</p> <p>Acknowledgments 54</p> <p>References 54</p> <p><b>3 Computation Offloading Game for Fog-Cloud Scenario 61<br /></b><i>Hamed Shah-Mansouri and Vincent W.S. Wong</i></p> <p>3.1 Internet of Things 61</p> <p>3.2 Fog Computing 63</p> <p>3.2.1 Overview of Fog Computing 63</p> <p>3.2.2 Computation Offloading 64</p> <p>3.2.2.1 Evaluation Criteria 65</p> <p>3.2.2.2 Literature Review 66</p> <p>3.3 A Computation Task Offloading Game for Hybrid Fog-Cloud Computing 67</p> <p>3.3.1 System Model 67</p> <p>3.3.1.1 Hybrid Fog-Cloud Computing 68</p> <p>3.3.1.2 Computation Task Models 68</p> <p>3.3.1.3 Quality of Experience 71</p> <p>3.3.2 Computation Offloading Game 71</p> <p>3.3.2.1 Game Formulation 71</p> <p>3.3.2.2 Algorithm Development 74</p> <p>3.3.2.3 Price of Anarchy 74</p> <p>3.3.2.4 Performance Evaluation 75</p> <p>3.4 Conclusion 80</p> <p>References 80</p> <p><b>4 Pricing Tradeoffs for Data Analytics in Fog–Cloud Scenarios 83<br /></b><i>Yichen Ruan, Liang Zheng, Maria Gorlatova, Mung Chiang, and Carlee Joe-Wong</i></p> <p>4.1 Introduction: Economics and Fog Computing 83</p> <p>4.1.1 Fog Application Pricing 85</p> <p>4.1.2 Incentivizing Fog Resources 86</p> <p>4.1.3 A Fogonomics Research Agenda 86</p> <p>4.2 Fog Pricing Today 87</p> <p>4.2.1 Pricing Network Resources 87</p> <p>4.2.2 Pricing Computing Resources 89</p> <p>4.2.3 Pricing and Architecture Trade-offs 89</p> <p>4.3 Typical Fog Architectures 90</p> <p>4.3.1 Fog Applications 90</p> <p>4.3.2 The Cloud-to-Things Continuum 90</p> <p>4.4 A Case Study: Distributed Data Processing 92</p> <p>4.4.1 A Temperature Sensor Testbed 92</p> <p>4.4.2 Latency, Cost, and Risk 95</p> <p>4.4.3 System Trade-off: Fog or Cloud 98</p> <p>4.5 Future Research Directions 101</p> <p>4.6 Conclusion 102</p> <p>Acknowledgments 102</p> <p>References 103</p> <p><b>5 Quantitative and Qualitative Economic Benefits of Fog 107<br /></b><i>Joe Weinman</i></p> <p>5.1 Characteristics of Fog Computing Solutions 108</p> <p>5.2 Strategic Value 109</p> <p>5.2.1 Information Excellence 110</p> <p>5.2.2 Solution Leadership 110</p> <p>5.2.3 Collective Intimacy 110</p> <p>5.2.4 Accelerated Innovation 111</p> <p>5.3 Bandwidth, Latency, and Response Time 111</p> <p>5.3.1 Network Latency 113</p> <p>5.3.2 Server Latency 114</p> <p>5.3.3 Balancing Consolidation and Dispersion to Minimize Total Latency 114</p> <p>5.3.4 Data Traffic Volume 115</p> <p>5.3.5 Nodes and Interconnections 116</p> <p>5.4 Capacity, Utilization, Cost, and Resource Allocation 117</p> <p>5.4.1 Capacity Requirements 117</p> <p>5.4.2 Capacity Utilization 118</p> <p>5.4.3 Unit Cost of Delivered Resources 119</p> <p>5.4.4 Resource Allocation, Sharing, and Scheduling 120</p> <p>5.5 Information Value and Service Quality 120</p> <p>5.5.1 Precision and Accuracy 120</p> <p>5.5.2 Survivability, Availability, and Reliability 122</p> <p>5.6 Sovereignty, Privacy, Security, Interoperability, and Management 123</p> <p>5.6.1 Data Sovereignty 123</p> <p>5.6.2 Privacy and Security 123</p> <p>5.6.3 Heterogeneity and Interoperability 124</p> <p>5.6.4 Monitoring, Orchestration, and Management 124</p> <p>5.7 Trade-Offs 125</p> <p>5.8 Conclusion 126</p> <p>References 126</p> <p><b>6 Incentive Schemes for User-Provided Fog Infrastructure 129<br /></b><i>George Iosifidis, Lin Gao, Jianwei Huang, and Leandros Tassiulas</i></p> <p>6.1 Introduction 129</p> <p>6.2 Technology and Economic Issues in UPIs 132</p> <p>6.2.1 Overview of UPI models for Network Connectivity 132</p> <p>6.2.2 Technical Challenges of Resource Allocation 134</p> <p>6.2.3 Incentive Issues 135</p> <p>6.3 Incentive Mechanisms for Autonomous Mobile UPIs 137</p> <p>6.4 Incentive Mechanisms for Provider-assisted Mobile UPIs 140</p> <p>6.5 Incentive Mechanisms for Large-Scale Systems 143</p> <p>6.6 Open Challenges in Mobile UPI Incentive Mechanisms 145</p> <p>6.6.1 Autonomous Mobile UPIs 145</p> <p>6.6.1.1 Consensus of the Service Provider 145</p> <p>6.6.1.2 Dynamic Setting 146</p> <p>6.6.2 Provider-assisted Mobile UPIs 146</p> <p>6.6.2.1 Modeling the Users 146</p> <p>6.6.2.2 Incomplete Market Information 147</p> <p>6.7 Conclusions 147</p> <p>References 148</p> <p><b>7 Fog-Based Service Enablement Architecture 151<br /></b><i>Nanxi Chen, Siobhán Clarke, and Shu Chen</i></p> <p>7.1 Introduction 151</p> <p>7.1.1 Objectives and Challenges 152</p> <p>7.2 Ongoing Effort on FogSEA 153</p> <p>7.2.1 FogSEA Service Description 156</p> <p>7.2.2 Semantic Data Dependency Overlay Network 158</p> <p>7.2.2.1 Creation and Maintenance 159</p> <p>7.2.2.2 Semantic-Based Service Matchmarking 161</p> <p>7.3 Early Results 164</p> <p>7.3.1 Service Composition 165</p> <p>7.3.1.1 SeDDON Creation in FogSEA 167</p> <p>7.3.2 Related Work 168</p> <p>7.3.2.1 Semantic-Based Service Overlays 169</p> <p>7.3.2.2 Goal-Driven Planning 170</p> <p>7.3.2.3 Service Discovery 171</p> <p>7.3.3 Open Issue and Future Work 172</p> <p>References 174</p> <p><b>8 Software-Defined Fog Orchestration for IoT Services 179<br /></b><i>Renyu Yang, Zhenyu Wen, David McKee, Tao Lin, Jie Xu, and Peter Garraghan</i></p> <p>8.1 Introduction 179</p> <p>8.2 Scenario and Application 182</p> <p>8.2.1 Concept Definition 182</p> <p>8.2.2 Fog-enabled IoT Application 184</p> <p>8.2.3 Characteristics and Open Challenges 185</p> <p>8.2.4 Orchestration Requirements 187</p> <p>8.3 Architecture: A Software-Defined Perspective 188</p> <p>8.3.1 Solution Overview 188</p> <p>8.3.2 Software-Defined Architecture 189</p> <p>8.4 Orchestration 191</p> <p>8.4.1 Resource Filtering and Assignment 192</p> <p>8.4.2 Component Selection and Placement 194</p> <p>8.4.3 Dynamic Orchestration with Runtime QoS 195</p> <p>8.4.4 Systematic Data-Driven Optimization 196</p> <p>8.4.5 Machine-Learning for Orchestration 197</p> <p>8.5 Fog Simulation 198</p> <p>8.5.1 Overview 198</p> <p>8.5.2 Simulation for IoT Application in Fog 199</p> <p>8.5.3 Simulation for Fog Orchestration 201</p> <p>8.6 Early Experience 202</p> <p>8.6.1 Simulation-Based Orchestration 202</p> <p>8.6.2 Orchestration in Container-Based Systems 206</p> <p>8.7 Discussion 207</p> <p>8.8 Conclusion 208</p> <p>Acknowledgment 208</p> <p>References 208</p> <p><b>9 A Decentralized Adaptation System for QoS Optimization 213<br /></b><i>Nanxi Chen, Fan Li, Gary White, Siobhán Clarke, and Yang Yang</i></p> <p>9.1 Introduction 213</p> <p>9.2 State of the Art 217</p> <p>9.2.1 QoS-aware Service Composition 217</p> <p>9.2.2 SLA (Re-)negotiation 219</p> <p>9.2.3 Service Monitoring 221</p> <p>9.3 Fog Service Delivery Model and AdaptFog 224</p> <p>9.3.1 AdaptFog Architecture 224</p> <p>9.3.2 Service Performance Validation 227</p> <p>9.3.3 Runtime QoS Monitoring 232</p> <p>9.3.4 Fog-to-Fog Service Level Renegotiation 235</p> <p>9.4 Conclusion and Open Issues 240</p> <p>References 240</p> <p><b>10 Efficient Task Scheduling for Performance Optimization 249<br /></b><i>Yang Yang, Shuang Zhao, Kunlun Wang, and Zening Liu</i></p> <p>10.1 Introduction 249</p> <p>10.2 Individual Delay-minimization Task Scheduling 251</p> <p>10.2.1 System Model 251</p> <p>10.2.2 Problem Formulation 251</p> <p>10.2.3 POMT Algorithm 253</p> <p>10.3 Energy-efficient Task Scheduling 255</p> <p>10.3.1 Fog Computing Network 255</p> <p>10.3.2 Medium Access Protocol 257</p> <p>10.3.3 Energy Efficiency 257</p> <p>10.3.4 Problem Properties 258</p> <p>10.3.5 Optimal Task Scheduling Strategy 259</p> <p>10.4 Delay Energy Balanced Task Scheduling 260</p> <p>10.4.1 Overview of Homogeneous Fog Network Model 260</p> <p>10.4.2 Problem Formulation and Analytical Framework 261</p> <p>10.4.3 Delay Energy Balanced Task Offloading 262</p> <p>10.4.4 Performance Analysis 262</p> <p>10.5 Open Challenges in Task Scheduling 265</p> <p>10.5.1 Heterogeneity of Mobile Nodes 265</p> <p>10.5.2 Mobility of Mobile Nodes 265</p> <p>10.5.3 Joint Task and Traffic Scheduling 265</p> <p>10.6 Conclusion 266</p> <p>References 266</p> <p><b>11 Noncooperative and Cooperative Computation Offloading 269<br /></b><i>Xu Chen and Zhi Zhou</i></p> <p>11.1 Introduction 269</p> <p>11.2 Related Works 271</p> <p>11.3 Noncooperative Computation Offloading 272</p> <p>11.3.1 System Model 272</p> <p>11.3.1.1 Communication Model 272</p> <p>11.3.1.2 Computation Model 273</p> <p>11.3.2 Decentralized Computation Offloading Game 275</p> <p>11.3.2.1 Game Formulation 275</p> <p>11.3.2.2 Game Property 276</p> <p>11.3.3 Decentralized Computation Offloading Mechanism 280</p> <p>11.3.3.1 Mechanism Design 280</p> <p>11.3.3.2 Performance Analysis 282</p> <p>11.4 Cooperative Computation Offloading 283</p> <p>11.4.1 HyFog Framework Model 283</p> <p>11.4.1.1 Resource Model 283</p> <p>11.4.1.2 Task Execution Model 284</p> <p>11.4.2 Inadequacy of Bipartite Matching–Based Task Offloading 285</p> <p>11.4.3 Three-Layer Graph Matching Based Task Offloading 287</p> <p>11.5 Discussions 289</p> <p>11.5.1 Incentive Mechanisms for Collaboration 290</p> <p>11.5.2 Coping with System Dynamics 290</p> <p>11.5.3 Hybrid Centralized–Decentralized Implementation 291</p> <p>11.6 Conclusion 291</p> <p>References 292</p> <p><b>12 A Highly Available Storage System for Elastic Fog 295<br /></b><i>Jaeyoon Chung, Carlee Joe-Wong, and Sangtae Ha</i></p> <p>12.1 Introduction 295</p> <p>12.1.1 Fog Versus Cloud Services 296</p> <p>12.1.2 A Fog Storage Service 297</p> <p>12.2 Design 299</p> <p>12.2.1 Design Considerations 299</p> <p>12.2.2 Architecture 300</p> <p>12.2.3 File Operations 301</p> <p>12.3 Fault Tolerant Data Access and Share Placement 303</p> <p>12.3.1 Data Encoding and Placement Scheme 303</p> <p>12.3.2 Robust and Exact Share Requests 304</p> <p>12.3.3 Clustering Storage Nodes 305</p> <p>12.3.4 Storage Selection 306</p> <p>12.3.4.1 File Download Times 307</p> <p>12.3.4.2 Optimizing Share Locations 307</p> <p>12.4 Implementation 309</p> <p>12.4.1 Metadata 310</p> <p>12.4.2 Access Counting 311</p> <p>12.4.3 NAT Traversal 312</p> <p>12.5 Evaluation 312</p> <p>12.6 Discussion and Open Questions 318</p> <p>12.7 Related Work 319</p> <p>12.8 Conclusion 320</p> <p>Acknowledgments 320</p> <p>References 320</p> <p><b>13 Development of Wearable Services with Edge Devices 325<br /></b><i>Yuan-Yao Shih, Ai-Chun Pang, and Yuan-Yao Lou</i></p> <p>13.1 Introduction 325</p> <p>13.2 Related Works 328</p> <p>13.2.1 Without Developer’s Effort 329</p> <p>13.2.2 Require Developer’s Effort 330</p> <p>13.3 Problem Description 331</p> <p>13.4 System Architecture 332</p> <p>13.4.1 End Device 332</p> <p>13.4.2 Fog Node 333</p> <p>13.4.3 Controller 333</p> <p>13.5 Methodology 333</p> <p>13.5.1 End Device 334</p> <p>13.5.1.1 Localization 334</p> <p>13.5.1.2 Speech Recognition 335</p> <p>13.5.1.3 Retrieving Google Calendar Information 336</p> <p>13.5.2 Fog Node 337</p> <p>13.5.3 Controller 338</p> <p>13.6 Performance Evaluation 339</p> <p>13.6.1 Experiment Setup 339</p> <p>13.6.2 Different Computation Loads 340</p> <p>13.6.3 Different Types of Applications 342</p> <p>13.6.4 Remote Wearable Services Provision 344</p> <p>13.6.5 Estimation of Power Consumption 346</p> <p>13.7 Discussion 348</p> <p>13.8 Conclusion 349</p> <p>References 350</p> <p><b>14 Security and Privacy Issues and Solutions for Fog 353<br /></b><i>Mithun Mukherjee, Mohamed Amine Ferrag, Leandros Maglaras, Abdelouahid Derhab, and Mohammad Aazam</i></p> <p>14.1 Introduction 353</p> <p>14.1.1 Major Limitations in Traditional Cloud Computing 353</p> <p>14.1.2 Fog Computing: An Edge Computing Paradigm 354</p> <p>14.1.3 A Three-Tier Fog Computing Architecture 357</p> <p>14.2 Security and Privacy Challenges Posed by Fog Computing 360</p> <p>14.3 Existing Research on Security and Privacy Issues in Fog Computing 361</p> <p>14.3.1 Privacy-preserving 361</p> <p>14.3.2 Authentication 363</p> <p>14.3.3 Access Control 363</p> <p>14.3.4 Malicious attacks 364</p> <p>14.4 Open Questions and Research Challenges 366</p> <p>14.4.1 Trust 367</p> <p>14.4.2 Privacy preservation 367</p> <p>14.4.3 Authentication 367</p> <p>14.4.4 Malicious Attacks and Intrusion Detection 368</p> <p>14.4.5 Cross-border Issues and Fog Forensic 369</p> <p>14.5 Summary 369</p> <p>Exercises 370</p> <p>References 370</p> <p>Index 375</p>
<p><b>YANG YANG, P<small>H</small>D</b> is a professor with ShanghaiTech University and a Co-Director of Shanghai Institute of Fog Computing Technology (SHIFT), China. <p><b>JIANWEI HUANG, P<small>H</small>D</b> is a Presidential Chair Professor and the Associate Dean of School of Science and Engineering, The Chinese University of Hong Kong, Shenzhen, and the Associate Director of Shenzhen Institute of Artificial Intelligence and Robotics for Society, China. <p><b>TAO ZHANG, P<small>H</small>D</b> is currently with the National Institute of Standards and Technology (NIST), USA. <p><b>JOE WEINMAN</b> is the former<b></b> Senior Vice President of Cloud Services and Strategy at Telx, and is the founder of Cloudonomics, which takes a rigorous, multidisciplinary approach to valuing the cloud. He is the Cloud economics and strategy editor for <i>IEEE Cloud Computing</i> magazine and author of <i>Cloudonomics: The Business Value of Cloud Computing</i> and <i>Digital Disciplines: Attaining Market Leadership via the Cloud, Big Data, Social, Mobile, and the Internet of Things</i>.
<p><b>THE ONE-STOP RESOURCE FOR ANY INDIVIDUAL OR ORGANIZATION CONSIDERING FOG COMPUTING</b> <p><i>Fog and Fogonomics</i> is a comprehensive and technology-centric resource<i></i> that highlights the system model, architectures, building blocks, and IEEE standards for fog computing platforms and solutions. The "fog" is defined as the multiple interconnected layers of computing along the continuum from cloud to endpoints such as user devices and things including racks or microcells in server closets, residential gateways, factory control systems, and more. <p>The authors—noted experts on the topic—review business models and metrics that allow for the economic assessment of fog-based information communication technology (ICT) resources, especially mobile resources. The book contains a wide range of templates and formulas for calculating quality-of-service values. Comprehensive in scope, it covers topics including fog computing technologies and reference architecture, fog-related standards and markets, fog-enabled applications and services, fog economics (fogonomics), and strategy. <p>This important resource: <ul> <li>Offers a comprehensive text on fog computing</li> <li>Discusses pricing, service level agreements, service delivery, and consumption of fog computing</li> <li>Examines how fog has the potential to change the information and communication technology industry in the next decade</li> <li>Describes how fog enables new business models, strategies, and competitive differentiation, as with ecosystems of connected and smart digital products and services</li> <li>Includes case studies featuring integration of fog computing, communication, and networking systems</li> </ul> </ul> <p>Written for product and systems engineers and designers, as well as for faculty and students, <i>Fog and Fogonomics</i> is an essential book that explores the technological and economic issues associated with fog computing.

Diese Produkte könnten Sie auch interessieren:

Bandwidth Efficient Coding
Bandwidth Efficient Coding
von: John B. Anderson
PDF ebook
114,99 €
Bandwidth Efficient Coding
Bandwidth Efficient Coding
von: John B. Anderson
EPUB ebook
114,99 €