Enabling high performance fog computing through fog-2-fog coordination model

Mohammed Al-Khafajiy, Thar Baker, Atif Waraich, Omar Alfandi, Aseel Hussien

Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBNpeer-review

Abstract

Fog computing is a promising network paradigm in the IoT area as it has a great potential to reduce processing time for time-sensitive IoT applications. However, fog can get congested very easily due to fog resources limitations in term of capacity and computational power. In this paper, we tackle the issue of fog congestion through a request offloading algorithm. The result shows that the performance of fogs nodes can be increased be sharing fog's overload over several fog nodes. The proposed offloading algorithm could have the potential to achieve a sustainable network paradigm and highlights the significant benefits of fog offloading for the future networking paradigm.

Original languageEnglish
Title of host publication16th ACS/IEEE International Conference on Computer Systems and Applications, AICCSA 2019
PublisherIEEE Computer Society Press
ISBN (Electronic)9781728150529
DOIs
Publication statusPublished - 16 Mar 2020
Event16th ACS/IEEE International Conference on Computer Systems and Applications, AICCSA 2019 - Abu Dhabi, United Arab Emirates
Duration: 3 Nov 20197 Nov 2019

Publication series

NameProceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA
Volume2019-November
ISSN (Print)2161-5322
ISSN (Electronic)2161-5330

Conference

Conference16th ACS/IEEE International Conference on Computer Systems and Applications, AICCSA 2019
Country/TerritoryUnited Arab Emirates
CityAbu Dhabi
Period3/11/197/11/19

Bibliographical note

Publisher Copyright:
© 2019 IEEE.

Keywords

  • Fog Computing
  • Fog-to-Fog
  • High performance computing
  • Internet of Things
  • Resource management

Fingerprint

Dive into the research topics of 'Enabling high performance fog computing through fog-2-fog coordination model'. Together they form a unique fingerprint.

Cite this