Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services 2019
DOI: 10.1145/3360774.3368201
|View full text |Cite
|
Sign up to set email alerts
|

An analysis of fog computing data placement algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
3
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(5 citation statements)
references
References 17 publications
0
3
0
1
Order By: Relevance
“…Tier 3 (CLOUD) devices in this level are generally having significantly higher amount of resources. These they make up for example, virtual machines in data centers (Amancio da Silva, et al, 2020).…”
Section: The Fog Computing Architecturementioning
confidence: 99%
“…Tier 3 (CLOUD) devices in this level are generally having significantly higher amount of resources. These they make up for example, virtual machines in data centers (Amancio da Silva, et al, 2020).…”
Section: The Fog Computing Architecturementioning
confidence: 99%
“…This level serve as data sources, the devices here, distributes and capture data to the next tier level. Tier 2 (FOG) in this level, IoT devices are integrated and labelled as fod nodes [4]. Processing and gathering of information including translating communication protocols and help in data decimination to other part of network is here in the IoT gatways and hubs, this level includes other devices like access points and routers.…”
Section: The Fog Computing Architecturementioning
confidence: 99%
“…Since these devices are in edges of the network, they are normaly positioned in the customers domain, fog nodes are characterised with limited resources.Tier 3 (CLOUD) devices in this level are generally having significantly higher amount of resources. These they make up for example, virtual machines in data centers [4].…”
Section: The Fog Computing Architecturementioning
confidence: 99%
“…Therefore, offloading is not required for this technique. However, many solutions use offloading techniques nonetheless to perform edge placement strategies [64].…”
Section: Principles Of Edge Computingmentioning
confidence: 99%