scholarly journals PureEdgeSim: A simulation framework for performance evaluation of cloud, edge and mist computing environments

Author(s):  
Charafeddine Mechalikh ◽  
Hajer Taktak ◽  
Faouzi Moussa

Edge and Mist Computing are two emerging paradigms that aim to reduce latency and the Cloud workload by bringing its applications close to the Internet of Things (IoT) devices. In such complex environments, simulation makes it possible to evaluate the adopted strategies before their deployment on a real distributed system. However, despite the research advancement in this area, simulation tools are lacking, especially in the case of Mist Computing [11], where heterogeneous and constrained devices cooperate and share their resources. Motivated by this, in this paper, we present PureEdgeSim, a simulation toolkit that enables the simulation of Cloud, Edge, and Mist Computing environments and the evaluation of the adopted resources management strategies, in terms of delays, energy consumption, resources utilization, and tasks success rate. To show its capabilities, we introduce a case study, in which we evaluate the different architectures, orchestration algorithms, and the impact of offloading criteria. The simulation results show the effectiveness of PureEdgeSim in modeling such complex and dynamic environments.

2015 ◽  
Vol 2015 ◽  
pp. 1-16 ◽  
Author(s):  
Floris Van den Abeele ◽  
Jeroen Hoebeke ◽  
Ingrid Moerman ◽  
Piet Demeester

As the Internet of Things continues to expand in the coming years, the need for services that span multiple IoT application domains will continue to increase in order to realize the efficiency gains promised by the IoT. Today, however, service developers looking to add value on top of existing IoT systems are faced with very heterogeneous devices and systems. These systems implement a wide variety of network connectivity options, protocols (proprietary or standards-based), and communication methods all of which are unknown to a service developer that is new to the IoT. Even within one IoT standard, a device typically has multiple options for communicating with others. In order to alleviate service developers from these concerns, this paper presents a cloud-based platform for integrating heterogeneous constrained IoT devices and communication models into services. Our evaluation shows that the impact of our approach on the operation of constrained devices is minimal while providing a tangible benefit in service integration of low-resource IoT devices. A proof of concept demonstrates the latter by means of a control and management dashboard for constrained devices that was implemented on top of the presented platform. The results of our work enable service developers to more easily implement and deploy services that span a wide variety of IoT application domains.


2019 ◽  
Vol 20 (2) ◽  
pp. 365-376 ◽  
Author(s):  
Vivek Kumar Prasad ◽  
Madhuri D Bhavsar ◽  
Sudeep Tanwar

The evolution of the Internet of Things (IoT) has augmented the necessity for Cloud, edge and fog platforms. The chief benefit of cloud-based schemes is they allow data to be collected from numerous services and sites, which is reachable from any place of the world. The organizations will be benefited by merging the cloud platform with the on-site fog networks and edge devices and as result, this will increase the utilization of the IoT devices and end users too. The network traffic will reduce as data will be distributed and this will also improve the operational efficiency. The impact of monitoring in edge and fog computing can play an important role to efficiently utilize the resources available at these layers. This paper discusses various techniques involved for monitoring for edge and fog computing and its advantages. The paper ends with a case study to demonstarte the need of monitoring in fog and edge in the healthcare system.


Energies ◽  
2021 ◽  
Vol 14 (14) ◽  
pp. 4100
Author(s):  
Mariana Huskinson ◽  
Antonio Galiano-Garrigós ◽  
Ángel Benigno González-Avilés ◽  
M. Isabel Pérez-Millán

Improving the energy performance of existing buildings is one of the main strategies defined by the European Union to reduce global energy costs. Amongst the actions to be carried out in buildings to achieve this objective is working with passive measures adapted to each type of climate. To assist designers in the process of finding appropriate solutions for each building and location, different tools have been developed and since the implementation of building information modeling (BIM), it has been possible to perform an analysis of a building’s life cycle from an energy perspective and other types of analysis such as a comfort analysis. In the case of Spain, the first BIM environment tool has been implemented that deals with the global analysis of a building’s behavior and serves as an alternative to previous methods characterized by their lack of both flexibility and information offered to designers. This paper evaluates and compares the official Spanish energy performance evaluation tool (Cypetherm) released in 2018 using a case study involving the installation of sunlight control devices as part of a building refurbishment. It is intended to determine how databases and simplifications affect the designer’s decision-making. Additionally, the yielded energy results are complemented by a comfort analysis to explore the impact of these improvements from a users’ wellbeing viewpoint. At the end of the process the yielded results still confirm that the simulation remains far from reality and that simulation tools can indeed influence the decision-making process.


2020 ◽  
Vol 8 (9) ◽  
pp. 697
Author(s):  
Xiang Gao ◽  
Linying Chen ◽  
Pengfei Chen ◽  
Yu Luo ◽  
Junmin Mou

The transport of liquefied natural gas (LNG) has significant impact on traffic capacity of waterways, especially the approach channels shared by LNG carriers and other types of ships (general cargo ships, container ships, etc.). Few studies take the behavioral characteristics of LNG carriers and their impacts into consideration. In this paper, we propose a framework for capacity analysis of shared approach channels based on the spatial–temporal consumption method. It consists of three modules: (1) the tide module predicts the tidal height and tidal time for identifying the time windows for LNG carriers; (2) the spatial–temporal consumption module is introduced to calculate the capacity of approach channels; (3) the LNG carrier navigation module is for analyzing the characteristics of LNG carriers and the impact on the capacity of approach channels. A spatial–temporal indexed chart is designed to visualize the utilization of the spatial–temporal resources. A case study on the approach channel of Yueqing Bay near the east coast of China is conducted to verify the effectiveness of the framework. The utilization rates of the approach channel and the impact of LNG carriers are presented using our method. The results of the case study indicate that the proposed traffic capacity analyzing framework can provide support for making traffic management strategies.


2017 ◽  
Vol 21 (1) ◽  
pp. 57-70 ◽  
Author(s):  
Lorna Uden ◽  
Wu He

Purpose Current knowledge management (KM) systems cannot be used effectively for decision-making because of the lack of real-time data. This study aims to discuss how KM can benefit by embedding Internet of Things (IoT). Design/methodology/approach The paper discusses how IoT can help KM to capture data and convert data into knowledge to improve the parking service in transportation using a case study. Findings This case study related to intelligent parking service supported by IoT devices of vehicles shows that KM can play a role in turning the incoming big data collected from IoT devices into useful knowledge more quickly and effectively. Originality/value The literature review shows that there are few papers discussing how KM can benefit by embedding IoT and processing incoming big data collected from IoT devices. The case study developed in this study provides evidence to explain how IoT can help KM to capture big data and convert big data into knowledge to improve the parking service in transportation.


Sensors ◽  
2019 ◽  
Vol 19 (19) ◽  
pp. 4121 ◽  
Author(s):  
Alberto Giaretta ◽  
Nicola Dragoni ◽  
Fabio Massacci

Cybersecurity is one of the biggest challenges in the Internet of Things (IoT) domain, as well as one of its most embarrassing failures. As a matter of fact, nowadays IoT devices still exhibit various shortcomings. For example, they lack secure default configurations and sufficient security configurability. They also lack rich behavioural descriptions, failing to list provided and required services. To answer this problem, we envision a future where IoT devices carry behavioural contracts and Fog nodes store network policies. One requirement is that contract consistency must be easy to prove. Moreover, contracts must be easy to verify against network policies. In this paper, we propose to combine the security-by-contract (S × C) paradigm with Fog computing to secure IoT devices. Following our previous work, first we formally define the pillars of our proposal. Then, by means of a running case study, we show that we can model communication flows and prevent information leaks. Last, we show that our contribution enables a holistic approach to IoT security, and that it can also prevent unexpected chains of events.


Author(s):  
Santosh Pandurang Jadhav

The Internet of Things (IoT) is becoming the most relevant next Internet-related revolution in the world of Technology. It permits millions of devices to be connected and communicate with each other. Beside ensuring reliable connectivity their security is also a great challenge. Abounding IoT devices have a minimum of storage and processing capacity and they usually need to be able to operate on limited power consumption. Security paths that depend maximum on encryption are not good for these resource constrained devices, because they are not suited for performing complicated encryption and decryption tasks quickly to be able to transmit data securely in real-time. This paper contains an overview of some of the cryptographic-based schemes related to communication and computational costs for resource constrained devices and considers some approaches towards the development of highly secure and lightweight security mechanisms for IoT devices.


2021 ◽  
Author(s):  
Mairi Kerin ◽  
Duc Truong Pham ◽  
Jun Huang ◽  
Jeremy Hadall

Abstract A digital twin is a “live” virtual replica of a sensorised component, product, process, human, or system. It accurately copies the entity being modelled by capturing information in real time or near real time from the entity through embedded sensors and the Internet-of-Things. Many applications of digital twins in manufacturing industry have been investigated. This article focuses on the development of product digital twins to reduce the impact of quantity, quality, and demand uncertainties in remanufacturing. Starting from issues specific to remanufacturing, the article derives the functional requirements for a product digital twin for remanufacturing and proposes a UML model of a generic asset to be remanufactured. The model has been demonstrated in a case study which highlights the need to translate existing knowledge and data into an integrated system to realise a product digital twin, capable of supporting remanufacturing process planning.


Author(s):  
Tzu Yang Loh ◽  
Mario P. Brito ◽  
Neil Bose ◽  
Jingjing Xu ◽  
Natalia Nikolova ◽  
...  

The maturing of autonomous technology has fostered a rapid expansion in the use of Autonomous Underwater Vehicles (AUVs). To prevent the loss of AUVs during deployments, existing risk analysis approaches tend to focus on technicalities, historical data and experts’ opinion for probability quantification. However, data may not always be available and the complex interrelationships between risk factors are often neglected due to uncertainties. To overcome these shortfalls, a hybrid fuzzy system dynamics risk analysis (FuSDRA) is proposed. The approach utilises the strengths while overcoming limitations of both system dynamics and fuzzy set theory. Presented as a three-step iterative framework, the approach was applied on a case study to examine the impact of crew operating experience on the risk of AUV loss. Results showed not only that initial experience of the team affects the risk of loss, but any loss of experience in earlier stages of the AUV program have a lesser impact as compared to later stages. A series of risk control policies were recommended based on the results. The case study demonstrated how the FuSDRA approach can be applied to inform human resource and risk management strategies, or broader application within the AUV domain and other complex technological systems.


Sign in / Sign up

Export Citation Format

Share Document