2019
DOI: 10.1002/spe.2699
|View full text |Cite
|
Sign up to set email alerts
|

Characterizing application scheduling on edge, fog, and cloud computing resources

Abstract: Summary Cloud computing has grown to become a popular distributed computing service offered by commercial providers. More recently, edge and fog computing resources have emerged on the wide‐area network as part of Internet of things (IoT) deployments. These three resource abstraction layers are complementary, and offer distinctive benefits. Scheduling applications on clouds has been an active area of research, with workflow and data flow models offering a flexible abstraction to specify applications for execut… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
31
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 48 publications
(31 citation statements)
references
References 164 publications
(781 reference statements)
0
31
0
Order By: Relevance
“…Varshney and Simmhan [23] surveys the scheduling in the ecosystem by providing a taxonomy on resource allocation. The study shows the taxonomy based on different metrics such as type of scheduling, techniques of scheduling, pricing, and Quality of Service (QoS)…”
Section: Iot and Fog Applications And Architecturesmentioning
confidence: 99%
See 1 more Smart Citation
“…Varshney and Simmhan [23] surveys the scheduling in the ecosystem by providing a taxonomy on resource allocation. The study shows the taxonomy based on different metrics such as type of scheduling, techniques of scheduling, pricing, and Quality of Service (QoS)…”
Section: Iot and Fog Applications And Architecturesmentioning
confidence: 99%
“…Gil et al [12] IoT applications smart city Naha et al [14] IoT applications and architectures Fog layer taxonomy Mukherjee et al [16] IoT applications ecosystem architecture Perera et al [13] IoT applications ecosystem protocols Al-Fuqaha et al [17] IoT communication network protocols Yassein et al [18] IoT communication MQTT protocol Maag et al [15] air pollution application IoT sensor layer Maheswari et al [19] IoT data process security Hathaliya and Tanwar [20] IoT healthcare application security Markus and Kertesz [21] IoT simulation software simulator Yangui [22] IoT application IoT services Varshney and Simmhan [23] IoT resource allocation scheduling…”
Section: Topic Key Aspectmentioning
confidence: 99%
“…Ignoring partial processing by tier 2 leads to considerable network delay, application deadline failure, and increased data processing workload in tier 3. Generally, by moving from the bottom to top layers, the hardware resources (processing, [8] memory, cache, bandwidth capacity) increases. As a negative effect, the network link delay rises, too.…”
Section: Introductionmentioning
confidence: 99%
“…Generally, task and workflow scheduling are already proven to be NP-hard problems in fog and cloud computing environments [20]. Several scheduling frameworks such as [21] have been investigated and introduced to schedule IoT tasks on fog computing's virtual resources. However, only a few scheduling schemes are proposed for fog computing environments that have considered security issues and especially DDoS attacks.…”
Section: Introductionmentioning
confidence: 99%