8 research outputs found

    Architectural Designs from Mobile Cloud Computing to Ubiquitous Cloud Computing - Survey

    No full text

    Optimised Green IoT Network Architectures

    Get PDF
    The work in this thesis proposes a number of energy efficient architectures of IoT networks. These proposed architectures are edge computing, Passive Optical Network (PON) and Peer to Peer (P2P) based architectures. A framework was introduced for virtualising edge computing assisted IoT. Two mixed integer linear programming (MILP) models and heuristics were developed to minimise the power consumption and to maximise the number of served IoT processing tasks. Further consideration was also given to the limited IoT processing capabilities and hence the potential of processing task blockage. Two placement scenarios were studied revealing that the optimal distribution of cloudlets achieved 38% power saving compared to placing the cloudlet in the gateway while gateway placement can save up to 47% of the power compared to the optimal placement but blocked 50% of the total IoT object requests. The thesis also investigated the impact of PON deployment on the energy efficiency of IoT networks. A MILP model and a heuristic were developed to optimally minimise the power consumption of the proposed network. The results of this investigation showed that packing most of the VMs in OLT at a low traffic reduction percentage and placing them in relays at high traffic reduction rate saved power Also, the results revealed that utilising energy efficient PONs and serving heterogeneous VMs can save up to 19% of the total power. Finally, the thesis investigated a peer-to-peer (P2P) based architecture for IoT networks with fairness and incentives. It considered three VM placement scenarios and developed MILP models and heuristics to maximise the number of processing tasks served by VMs and to minimise the total power consumption of the proposed network. The results showed that the highest service rate was achieved by the hybrid scenario which consumes the highest amount of power compared to other scenarios

    Cloud Services Brokerage for Mobile Ubiquitous Computing

    Get PDF
    Recently, companies are adopting Mobile Cloud Computing (MCC) to efficiently deliver enterprise services to users (or consumers) on their personalized devices. MCC is the facilitation of mobile devices (e.g., smartphones, tablets, notebooks, and smart watches) to access virtualized services such as software applications, servers, storage, and network services over the Internet. With the advancement and diversity of the mobile landscape, there has been a growing trend in consumer attitude where a single user owns multiple mobile devices. This paradigm of supporting a single user or consumer to access multiple services from n-devices is referred to as the Ubiquitous Cloud Computing (UCC) or the Personal Cloud Computing. In the UCC era, consumers expect to have application and data consistency across their multiple devices and in real time. However, this expectation can be hindered by the intermittent loss of connectivity in wireless networks, user mobility, and peak load demands. Hence, this dissertation presents an architectural framework called, Cloud Services Brokerage for Mobile Ubiquitous Cloud Computing (CSB-UCC), which ensures soft real-time and reliable services consumption on multiple devices of users. The CSB-UCC acts as an application middleware broker that connects the n-devices of users to the multi-cloud services. The designed system determines the multi-cloud services based on the user's subscriptions and the n-devices are determined through device registration on the broker. The preliminary evaluations of the designed system shows that the following are achieved: 1) high scalability through the adoption of a distributed architecture of the brokerage service, 2) providing soft real-time application synchronization for consistent user experience through an enhanced mobile-to-cloud proximity-based access technique, 3) reliable error recovery from system failure through transactional services re-assignment to active nodes, and 4) transparent audit trail through access-level and context-centric provenance
    corecore