
Cloud and Fog Computing Platforms for Internet of Things
- 198 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Cloud and Fog Computing Platforms for Internet of Things
About this book
Today, relevant data are typically delivered to cloud-based servers for storing and analysis in order to extract key features and enable enhanced applications beyond the basic transmission of raw data and to realize the possibilities associated with the impending Internet of Things (IoT). To allow for quicker, more efficient, and expanded privacy-preserving services, a new trend called Fog Computing has emerged: moving these responsibilities to the network's edge.
Traditional centralized cloud computing paradigms confront new problems posed by IoT application growth, including high latency, limited storage, and outages due to a lack of available resources. Fog Computing puts the cloud and IoT devices closer together to address these issues. Instead of sending IoT data to the cloud, the fog processes and stores it locally at IoT devices. Unlike the cloud, fog-based services have a faster reaction time and better quality overall.
Fog Computing, Cloud Computing, and their connectivity with the IoT are discussed in this book, with an emphasis on the advantages and implementation issues. It also explores the various architectures and appropriate IoT applications. Fog Computing, Cloud Computing, and Internet of Things are being suggested as potential research directions.
Features:
- A systematic overview of the state-of-the-art in Cloud Computing, Fog Computing, and Internet of Things
- Recent research results and some pointers to future advancements in architectures and methodologies
- Detailed examples from clinical studies using several different data sets
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
1 Resource Allocation Techniques in Cloud Computing
Contents
- 1.1 Introduction
- 1.2 Resource Management
- 1.3 Virtualization
- 1.4 Resource Allocation Algorithms
- 1.4.1 Priority-Based Resource Allocation Algorithm (PB-RA Algorithm)
- 1.4.2 Round-Robin-Based Resource Allocation Algorithm (RRB-RA Algorithm)
- 1.4.3 QoS-Based Resource Allocation Algorithms (QoSB-RA Algorithms)
- 1.4.4 Energy-Aware Based Resource Allocation Algorithms (EAB-RA Algorithms)
- 1.4.5 Machine Learning-Based Resource Allocation Algorithms (MLB-RA Algorithms)
- 1.4.6 Dynamic Resource Allocation Algorithms (DRA Algorithms)
- 1.5 Resource Allocation Factors
- 1.6 Conclusion and Future Works
- References
1.1 Introduction



1.2 Resource Management

1.3 Virtualization
Table of contents
- Cover Page
- Half Title page
- Series Page
- Title Page
- Copyright Page
- Contents
- Preface
- Editor Biography
- Contributors
- 1 Resource Allocation Techniques in Cloud Computing
- 2 Transforming Healthcare through Internet of Things
- 3 IoT Motivated Cyber-Physical and Industrial Internet Systems
- 4 Internet of Things in E-commerce: A Thematic Analysis
- 5 Data Security and Privacy in Fog Computing Applications
- 6 Energy-Efficient Cloud and Fog Computing in Internet of Things: Techniques and Challenges
- 7 Deployment of Distributed Clustering Approach in WSNs and IoTs
- 8 Long-Range IoT for Agricultural Acquisition through Cloud Computing
- 9 Resource Allocation with Task Scheduling in Cloud Computing
- 10 Service Availability of Virtual Machines in Cloud Computing
- 11 Analysis of Security Challenges and Threats in Social Network and Cloud Computing
- 12 Secured Trusted Authentication with Trust-Based Congestion Scheme for V2V Communication
- 13 MQTT Protocol-Based Wide-Range Smart Motor Control for Unmanned Electric Vehicular Application: A Case Study in IoT
- 14 IoT-Based Water Quality Monitoring System Using Cloud for Agriculture Use
- Index