Envisioning Internet of Things using Fog Computing
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 1
Abstract
Internet of Things is the future of the Internet. It encircles a wide scope. There are currently billions of devices connected to the Internet and this trend is expecting to grow exponentially. Cisco predicts there are at present 20 billion connected devices. These devices, along with their varied data types, transmission rates and communication protocols connect to the Internet seamlessly. The futuristic implementation of Internet of Things across various scenarios demands the real time performance delivery. These range from RFID connected devices to huge data centers. Until date, there is no single communication protocol available for envisioning IoT. There is still no common, agreed upon architecture. Hence, huge challenges lie ahead. One of the ways to envision Internet of Things is to make use of Fog Networks. Fog is essentially a cloudlet, located nearer to the ground. It offers lower latency and better bandwidth conservation. The Fog or Fog computing is a recent concept. The OpenFog Consortium is a joint effort of many vendors. Its latest work is the background study for realizing Fog as a possible paltform for activating Internet of Things. This paper revolves around Envisioning Internet of Things using Fog computing. It begins with a detailed background study of Internet of Things and Fog Architecture. It covers applications and scenarios where such knowledge is highly applicable. The paper concludes by proposing Fog Computing as a possible platform for Internet of Things.
Authors and Affiliations
Urooj Yousuf Khan, Tariq Rahim Soomro
Design of an Intelligent Combat Robot for war fields
The objective of this paper is to minimize human casualties in terrorist attack such as 26/11. The combat robot [1] has been designed to tackle such a cruel terror attacks. This robot is radio operated, self- powered, an...
A SURVEY OF NETWORK-ON-CHIP TOOLS
Nowadays System-On-Chips (SoCs) have evolved considerably in term of performances, reliability and integration capacity. The last advantage has induced the growth of the number of cores or Intellectual Properties (IPs) i...
Cloud Security based on the Homomorphic Encryption
Cloud computing provides services rather than products; where it offers many benefits to clients who pay to use hardware and software resources. There are many advantages of using cloud computing such as low cost, easy t...
Agent-Based System for Efficient kNN Query Processing with Comprehensive Privacy Protection
Recently, location based services (LBSs) have become increasingly popular due to advances in mobile devices and their positioning capabilities. In an LBS, the user sends a range of queries regarding his k-nearest neighbo...
A Review of Scripting Techniques Used in Automated Software Testing
Software testing is the process of evaluating the developed system to assess the quality of the final product. Unfortunately, software-testing process is expensive and consumes a lot of time through software development...