2019
DOI: 10.1002/cpe.5343
|View full text |Cite
|
Sign up to set email alerts
|

Optimization policy for file replica placement in fog domains

Abstract: Fog computing architectures distribute computational and storage resources along the continuum from the cloud to things. Therefore, the execution of services or the storage of files can be closer to the users. The main objectives of fog computing domains are to reduce the user latency and the network usage. Availability is also an issue in fog architectures because the topology of the network does not guarantee redundant links between devices. Consequently, the definition of placement polices is a key challeng… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 54 publications
0
5
0
Order By: Relevance
“…Fog computing architectures substantially differ from cloud architectures. In particular, according to recent literature: –Fog nodes feature limited and very heterogeneous resources, while data center nodes feature high (and virtually unbounded) computational, storage and power capabilities. –Fog devices are highly geographically distributed—often mobile—and possibly span wide large‐scale networks reaching closer to (human and machine) end users, while cloud data centers are located in few geographic locations all over the world and connect directly to fibre backbones. –End‐to‐end latency between cloud nodes within data centers is usually negligible and bandwidth availability is guaranteed via redundant links, while in fog domains, network QoS between nodes can largely vary due to the presence of a plethora of different (wired or wireless) communication and Internet access technologies. –Fog nodes are owned and managed by various service providers (from end users to Internet service providers to cloud operators) and might also opportunistically include available edge devices (eg, crowd computing, ad hoc networks) whereas the largest cloud data centers are in the hands of a few big players. …”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Fog computing architectures substantially differ from cloud architectures. In particular, according to recent literature: –Fog nodes feature limited and very heterogeneous resources, while data center nodes feature high (and virtually unbounded) computational, storage and power capabilities. –Fog devices are highly geographically distributed—often mobile—and possibly span wide large‐scale networks reaching closer to (human and machine) end users, while cloud data centers are located in few geographic locations all over the world and connect directly to fibre backbones. –End‐to‐end latency between cloud nodes within data centers is usually negligible and bandwidth availability is guaranteed via redundant links, while in fog domains, network QoS between nodes can largely vary due to the presence of a plethora of different (wired or wireless) communication and Internet access technologies. –Fog nodes are owned and managed by various service providers (from end users to Internet service providers to cloud operators) and might also opportunistically include available edge devices (eg, crowd computing, ad hoc networks) whereas the largest cloud data centers are in the hands of a few big players. …”
Section: Introductionmentioning
confidence: 99%
“…Fog computing architectures substantially differ from cloud architectures. In particular, according to recent literature [12][13][14][15][16] : -Fog nodes feature limited and very heterogeneous resources, while data center nodes feature high (and virtually unbounded) computational, storage and power capabilities. -Fog devices are highly geographically distributed-often mobile-and possibly span wide large-scale networks reaching closer to (human and machine) end users, while cloud data centers are located in few geographic locations all over the world and connect directly to fibre backbones.…”
Section: Introductionmentioning
confidence: 99%
“…Besides, we compare the proposed mechanism with two baseline mechanisms. The first mechanism is called “FFRPP,” 18 which is a graph portioning‐based approach, and the second mechanism is called “MCS,” 19 which is a greedy‐based solution.…”
Section: Resultsmentioning
confidence: 99%
“…Guerrero et al 18 developed a graph portioning approach for solving file replica placement. They use graph partition algorithms to select the best fog devices that store data replicas and increase data availability.…”
Section: Related Workmentioning
confidence: 99%
“…Replica placement in fog has been discussed both for data [16], and for services [12,7,5]. In a survey by Salaht et al [27] that presents an overview of service placement algorithms in fog computing, the authors note that most current service placement techniques are reactive, i.e., they do not anticipate client movement as we do in this work.…”
Section: Related Workmentioning
confidence: 99%