<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Fog Computing Architecture, Allocation: A Review</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Satyakam Rahul</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Rajni Aron</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Lovely Professional University, Department of CSE</institution>
          ,
          <addr-line>Jalandhar, Punjab</addr-line>
          ,
          <country country="IN">India</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Lovely Professional University, Department of Computer Applications</institution>
          ,
          <addr-line>Jalandhar, Punjab</addr-line>
          ,
          <country country="IN">India</country>
        </aff>
      </contrib-group>
      <fpage>31</fpage>
      <lpage>42</lpage>
      <abstract>
        <p>Fog Computing, may be considered as Edge Computing which expands Cloud Computing model while improving efficiency, and lowers latency. Fog computing is used to keep up day by day growing need of IT related services with the alliance of cloud computing. Having fast development of IT, the fog computing is arising as an appealing solution for retrieval and transformation of the data related to IoT applications. This paper discusses the concept, architecture of fog computing and its implementation with the existing and new applications. Fog devices are very complex and heterogeneous. The resource allocation problem is one of the core challenges in running the IoT application in the Fog area. The goal of this paper is to examine recent work on the allocation of resources in the fog area. The rationale of this survey is to realize the application of fog computing and make some improvements in the existing technology. This study will help researchers to understand and utilize technology better.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Fog Computing</kwd>
        <kwd>Cloud Computing</kwd>
        <kwd>Resource Allocation</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Nowadays, a large number of device objects are attached to the Internet to capture and exchange
data from the real world, which brings the new idea of the Internet of Things (IoT). As stated by Gartner,
around fifty percent of the Internet of Things (IoT) study that is related with industry will be carried out
at the edge by 2022. [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. According to an estimation that about 50 billion appliances may get linked to
the IoT network by 2022[
        <xref ref-type="bibr" rid="ref2">2</xref>
        ][
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. This gives an idea that future computation will require a new and savvy
edge computing foundation. Earlier, Mobile cloud computing (MCC) was broadly utilized to deal with
tasks that require high efficiency, due to its large computation and storage assets to appease the fast
increasing and changing need from distant cloud data centers [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Nevertheless, it is not easy to deliver
relying efficiency for IoT devices which are delay sensitive at the end of the network because of the
considerable interval between arbitrarily scattered terminal devices and distant cloud data centers. As a
response, the concerns of energy consumption, heavy load, delay, congestion, and unreliable wireless
connections may be unavoidable, which would restrict cloud computing growth [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Edge computing,
therefore came into the existence to control the limitations of cloud computing. In contrast to
conventional cloud computing an Edge computing offers data offloading services which is distributed
and its near-to-terminal, which may enhance the accuracy of service and decrease the latent period. It
has recently come out as a feasible solution to coordinate the network architecture which is currently
existing and new network Architecture using large amounts of pliable fog deployed Nodes (FNs) for
mutual offloading of tasks from the IoT systems nearby.
      </p>
      <p>The goal of fog computing in IOT is, boosting its abilities and performance while decreasing the
scale of data transmitted for collection, storage and analysis too. The data obtained by the sensors is
transmitted to the edge appliances instead of being sent to the server, thereby reducing network traffic
and latency. A new framework for services is provided via Fog computing incorporation with the IOT,
This is classified as Fog as a Service (FaaS), in which supplier of the service creates the fog nodes
array around its geographical footprint and functions as a distributor for many who require different
services.</p>
      <p>Each node of the fog hosts capabilities for local computation, networking and storage. All the fog
computing resources are referred to as the entangled fog nodes through the Internet to the edge network.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Contribution of this paper</title>
      <p>In this research analysis, we tend to examine different resource allocation techniques and its
infrastructure that powers the components and server’s devices. The remaining part of the paper is
outlined as follows: In Section 2 it defines the related work done in the resource allocation technique.
Section 3 provides the background and definition of key terms used, it explains the key difference in
both the technologies that is Fog and Cloud Computing while discussing characteristics of Fog
Computing and its architecture and deployment models. It also presents taxonomy of Fog Computing.
Section 4 discusses related computing model and their differences. Section 5 discusses application of
Fog Computing. Finally, section 6 discusses different resource allocation techniques used by
researchers and presents their comparison.</p>
    </sec>
    <sec id="sec-3">
      <title>2.1. Related Work</title>
      <p>
        The instruments of cloud computing / Fog computing and resources of it may be either tangible
resources or virtual resources. The issue of resource allocation is a complex task in a Fog environment.
It determines the right task distribution, given in to be done on the fog junctions or nodes to satisfy the
QoS, at the side or edge of the network. Some criteria, such as latency, performance, energy use
reduction, cost allocation minimization and response time, must be viewed as the product of any optimal
resource allocation strategy. There are several experiments and studies of cloud/fog computing on
resource distribution [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] suggest a presumptive resource allocation model in which jobs come in
accordance with a stochastic process and call a number of virtual machines. To guarantee the user's
experience with the resource request, after a resource request has been sent by the user, a decision on
the allocation of the resource must be taken in due time to position the VM on the server responding to
this request, that involves making VM placement decisions without any potential information upon the
delivery of the resource request. To take better advantage of a server's multi-resource capability and
reduce the total number of active servers, VM placement should be developed. Some approaches
proposes the idea of offline VM placement problem. Stillwell et al [7] introduced algorithms to delegate
different types of resources for engaging services Working with virtual machines on distributed, diverse
systems. The key result of their input is, what he proposed as vector packing methods in a homogenous
case can be generalized to deliver valued solutions in a diversified case and merged to support a single,
effective algorithm. The online VM placement issue is taken into account by a few other strategies.
Tang et al. [
        <xref ref-type="bibr" rid="ref7">8</xref>
        ]used heuristic algorithm to achieve high resource utilization. But this couldn’t achieve
optimal resource utilization. Authors in [
        <xref ref-type="bibr" rid="ref8">9</xref>
        ] established an algorithm which is based on a predictive
control model for resource allocation. This model establishes the future workload depending on a
restricted horizon and addresses the problems of autoscaling in the cloud. Chandra et al. [
        <xref ref-type="bibr" rid="ref9">10</xref>
        ] suggested
a system architecture that integrates the properties of the workload and the current state of the system
with estimation and resource allocation techniques. The strategies for dynamic allocation of resources
on public web servers were discussed. The key objective of their strategies is to respond to temporary
system overburden by integrating online system frameworks.
      </p>
      <p>In [11] authors used non-pre-emptive technique for load balance to schedule VM configurations.
Offloading decision making and Resource allocation for energy conservation.</p>
    </sec>
    <sec id="sec-4">
      <title>2.2. Background and Definition</title>
      <p>
        Fog Computing [
        <xref ref-type="bibr" rid="ref10">12</xref>
        ], can also be identified as Edge Computing which expands the Cloud Computing
model while improving efficiency, and lowers latency. It also improves location consciousness and
assures better support for portability. As a result of this, business capabilities increases. The word first
used by Cisco, It means that, instead of working on a centralized Cloud environment, it works at the
end of the network. This is done by adding some intelligence, processes, and resources at the boundary
of the Cloud, instead of initiating channels for Cloud storage and utilization. Fog computing technology
disseminates the assets and services attached to the communication storage near to gadgets or close to
the users. A fog computing paradigm analyses and runs applications on anything from the network
center to the edge -wherever it is required. It is a process of extending computation and storage services
almost immediately and near to the physical devices of an organization or at the boundary of the Cloud
network. It is also a technique through internet can be bypassed, whose speeds are more often depends
on bandwidth and carriers [
        <xref ref-type="bibr" rid="ref11">13</xref>
        ]. Because of the highly variable and unpredictable fog environment,
resource management is the difficult problems in the fog landscape that need to be taken into account.
      </p>
    </sec>
    <sec id="sec-5">
      <title>3. Dissimilarities of Cloud Computing and Fog Computing</title>
      <p>The amount of information is on the rise in overall networking. To deal with this, services such as
cloud storage and cloud computing are used to handle and distribute data easily to end users. However,
fog computing is a more feasible option for handling high levels of security updates and reducing
bandwidth issues. Table1 shows the dissimilarities between the two technologies.</p>
    </sec>
    <sec id="sec-6">
      <title>4. Taxonomy of Fog Computing</title>
      <p>
        Qureshi et al. [
        <xref ref-type="bibr" rid="ref38">40</xref>
        ] has given the taxonomy of Fog Computing focused on platform specifications
application, technology.
Application
Application
Requirement
Mobility
Scalability
Hetrogenity
      </p>
      <p>User
requirement</p>
      <p>Response</p>
      <p>Time
Accuracy
Deadline</p>
      <p>Infrastructure</p>
      <p>Requirement
ProcessingPowe
r &amp; Storage</p>
      <p>Memory</p>
      <p>Infrastruture</p>
      <p>Platform Service</p>
      <p>Network
Requirement</p>
      <p>Service
Requirement</p>
      <p>Resource
Allocation &amp;
Scheduling</p>
      <p>Management</p>
      <p>Fog
computing</p>
      <p>Fog
Device</p>
      <p>IOT</p>
      <p>Device
Processing
&amp; Gateway</p>
      <p>Device</p>
    </sec>
    <sec id="sec-7">
      <title>4.1. Characterization of Fog Computing</title>
      <p>
        It’s basically an augmentation of the cloud, but similar to the stuff which functions with IoT Data.
As seen in Figure 1 above, fog computing serves as mediator linking cloud and end devices, bringing
storage and networking resources and processing closer to the end devices respectively. It provides less
latency and location awareness due to the localization of fog nodes. It provides a dynamically
virtualized interface services for storage, computing and networking between end computers and typical
data centers for Cloud Computing. It has following characteristics [
        <xref ref-type="bibr" rid="ref12">14</xref>
        ]





      </p>
      <p>Low latency- fog nodes are near to the devices attached that makes response time very less and
data processing faster. It supports awareness of locations in which fog In various locations,
nodes can be installed.</p>
      <p>Mobility- Because of the state forward communication between fog and devices it provides
better mobility
Real-time Interaction - Because of the closeness of devices and fog nodes interactions may
occur in real time not like batch processing in case of cloud computing.</p>
      <p>
        Geographical distribution- For computing works in a distributed environment so it is quick in
delivering high quality streaming services. The essence of fog computing is because of lack of
aid with Quality Services at the end of network [
        <xref ref-type="bibr" rid="ref13">15</xref>
        ]
Protection and Privacy-Because the data contains subtle information, IoT has a critical role in
defense Of that kind of detailsTo ensure defense from cyber hackers. It hase its own security
implementation. [
        <xref ref-type="bibr" rid="ref14">16</xref>
        ]
      </p>
      <p>Content caching-content caching in fog platform is a technique to reduce network traffic and
improve response time by caching</p>
    </sec>
    <sec id="sec-8">
      <title>4.2. Architecture of Fog Computing</title>
      <p>It is a connection between edge devices and the cloud. It's a combination of devices connected at
edge and cloud. Three-layered architecture is very common architecture. The layers are discussed below
Layer 1: This is lowermost level which consists of all IoT devices they are capable of storing and
transmitting raw data to its upper layer
Layer 2: The middle layer consists of different network devices like routers, switches which can process
and temporarily store information. These devices are linked to the cloud network and keep sending data
to the cloud at the regular intervals.</p>
      <p>Layer 3: The uppermost layer has many servers and data centers. which are capable of storing a high
amount of data and have capacity to process it too.</p>
      <p>Layered Architecture for Fog Computing</p>
      <p>
        As per Mukherjee et al. [
        <xref ref-type="bibr" rid="ref15">17</xref>
        ], The architecture is made up of six layers. — Virtualization and
physical, control etc. Temporary storage, defense and transport layers—as seen in Figure 3.
      </p>
      <p>
        The very first layer which is physical and virtualization includes multipule catogries of nodes, like
physical nodes and virtual nodes. Various kinds of sensors are categorized to moniter the environment
and transfer the acquired data to the higher layers through gateways for more preparation and refining.
Monitoring layer controls the task which is requested and keep tracks of energy usage concerns of the
fundamental physical devices. Preprocessing layer controls task related with the Data management like
filtering and trimming. The temporary storage layer holds the Data for a short duration only. The
security layer is concerned with the encryption/decryption of data. Additionaly, data integrity steps are
also implemented to defend them from tampering. At the end, in the transport layer,
previouslyprocessed data is submitted to the cloud to make the cloud able to retrieve and generate more valuable
data [
        <xref ref-type="bibr" rid="ref15">17</xref>
        ].
      </p>
    </sec>
    <sec id="sec-9">
      <title>4.3. Fog Deployment Models</title>
      <p>We may distinguish fog models based on the ownership of the fog infrastructure and underlying
properties. We have four different types of fog models.</p>
      <p>


</p>
      <p>Private fog: A private fog is developed, purchased, maintained and controlled by an entity, a
third entity or a variation thereof. It can be installed on or off-site. Private fog services are sold
for absolute use by a single company.</p>
      <p>Public fog: A public fog is owned, developed, and managed by, or a combination of, a
corporation, academic institution or government organization. It is deployed on the premises of
the fog suppliers. Public fog services are provided for open access by the common or general
public.</p>
      <p>Community fog: Community fog is developed, maintained and controlled by different
community organizations, which may include a third party too, or a consolidation of them. It
can be installed on or off-premises and services are provided for exclusive use, typically by
customers in a particular group of organizations with common interests.</p>
      <p>Hybrid fog: Hybrid fog is a type of cloud computing that incorporates the use of
public/private/community fog with public/private cloud computing (i.e., hybrid cloud). It may
be helpful due to the disadvantages of the physical resources in the fog. As a result, the platform
is applied to the hybrid cloud to scale performance. The hybrid cloud is flexible, modular, and
services are accessible on demand.</p>
    </sec>
    <sec id="sec-10">
      <title>4.4. Disadvantages of Fog Computing</title>
      <p>


</p>
      <p>Complexity: Different modules from both the edge and the central network can make use of a
possible Fog computing framework. Usually, these modules are Equipped with different types
of processors but not us ed for general purpose computation. Owing to its ambiguity, it can be
difficult to grasp the principle of Fog computing. There are several computers placed at various
locations that store and evaluate their own data collection. This could bring more complexity
to the network. In addition, more advanced fog nodes exist in the fog infrastructure.
Security: Authentic entry to services and privacy in Fog computing are difficult to ensure. There
are various devices and different fog nodes in the fog computing environment. These fog nodes
are likely to be in a less secure environment. Hackers can conveniently use bogus IP addresses
to obtain access to the corresponding fog node.</p>
      <p>Power Consumption: There are many fog nodes available in the fog environment that is directly
proportional to their energy consumption. That implies that these fog nodes need a high volume
of energy to work. If the fog infrastructure requires more fog nodes, there is even more power
usage.</p>
      <p>Authentication: The service delivered by fog computing is on a wide scale. Fog networking is
made up of end-users, Internet service providers, and cloud providers. This will also pose
concerns about trust and authentication in the fog.</p>
    </sec>
    <sec id="sec-11">
      <title>5. Related Computing Models</title>
      <p>There are many similar computing models similar to Fog computing exist such as Edge computing,
Dew computing, Mobile Edge Computing (MEC), Mobile Cloud Computing (MCC). In Cloud
computing, there are many IoT appliances or devices attached face to face to the cloud and computing
relies entirely on the cloud.</p>
      <p>


</p>
      <p>
        Mobile Cloud Computing: Mobile cloud computing makes use of cloud computing to provide
services or required applications to mobile devices. This mobile application can be
implemented far away using pace, mobility and development software. MCC Overcomes
computing, energy, and storage capacity Restriction on smart mobile devices. At the edge of
the network, Cloudlet is used to solve these problems [
        <xref ref-type="bibr" rid="ref17">19</xref>
        ]. It increases the durability and
reliability of cloud-backed and stored content.
      </p>
      <p>
        Mobile Edge Computing: It enlarges the effectiveness of cloud computing by taking it to the
edge of the network. Whereas conventional cloud computing takes place on remote servers
located far from users and computers, MEC allows processes to take place at base stations,
central offices and other aggregation points on the network. MEC supports the co-location of
storage and computation Resources at cellular network base stations. According to Klas [
        <xref ref-type="bibr" rid="ref16">18</xref>
        ],
The development of mobile base stations is the MEC. Various services could be offered by this
technique, including IoT, caching, location services, video analytics, and local Distribution of
material.
      </p>
      <p>
        Edge Computing: It is a recent development in computing model that carry out transformation
of data at the “edge” of the network [
        <xref ref-type="bibr" rid="ref17">19</xref>
        ]. It’s a computing that is done at or near the data source,
instead of depending on the cloud at one of a dozen data centers to do all the work. All devices
attached with sensors will contain data sources, but the edges are different altogether. A
cloudlet, for example the edge of the mobile application is a micro data center. Likewise, if a
smart phone is running a cloud application, then the smartphone will be considered as edge
[
        <xref ref-type="bibr" rid="ref22">24</xref>
        ]. Its core principle is, it can be performed closer to the origins of data.
      </p>
      <p>
        Dew Computing: Dew Computing is a model which makes use of programming that enables
the plug-in to be omnipresent, ubiquitous and simple, ready-to-go. It facilitates a single
SuperHybrid-Peer P2P interaction link for personal networks. Its key objective is to access the raw
data pool that can be fitted with meta-data. Skala et al. [
        <xref ref-type="bibr" rid="ref17">19</xref>
        ] discussed that DC is largely
effective in daily life than Fog computing. IoT-based apps are sponsored by Fog, although DC
is a microservice idea and that’s why it doesn’t rely on any compact or centralized device,
server or cloud, it requires low waiting time, real-time capacity and active network
configuration.
      </p>
      <p>In summary, IoT devices are linked to the cloud via Fog devices in the Fog computing paradigm.
Fog devices are linked via the core network to the cloud. These similar paradigms vary on the basis of
Internet and cloud access. Table 2 displays the features of the similar computing discussed above.</p>
      <p>EC
Both
Ambulant/
Stationary
Hypervisor or
Container
Small Data
Center</p>
      <p>DC
x
Uses
which
attached
sensors
Container
devices</p>
      <p>is
with
Mobile phone</p>
      <p>Fog
√
Ambulant/
Stationary
Hypervisor /
Container
devices which
can compute,
store and has
network
adapter</p>
    </sec>
    <sec id="sec-12">
      <title>6. Applications of Fog Computing</title>
      <p>It is useful in various IoT applications. A large range of sensors can be mounted in the sea, airline
fleets or a car, so it’s difficult to dispatch and reserve all data produced instantaneous in the cloud. A
few interim computing, analysis and processing will be provided by Fog Computing appliances.




</p>
      <p>
        Connected Vehicle: There are several useful qualities that rely on fog and Internet access which
is applied to vehicles, like automatic transmission and "hands-free" operation or vehicle that is
capable of parking itself, which means, no requirement for a human being to park a vehicle [
        <xref ref-type="bibr" rid="ref7">8</xref>
        ].
As part of the Intelligent Transport System, vehicle communication has been designed to
achieve protection and efficiency through intelligent transportation by incorporating a variety
of information. Connections in an intelligent transport system are accomplished by different
communications variations which is vehicle-to-vehicle (V2V) and many a times
vehicle-toinfrastructure (V2I). Fog computing is the highly capable approach for all Internet connections.
Vehicles, as they have a high degree of real-time interaction., it will encourage vehicles, traffic
lights and access points to exchange communication with each other in order to provide a
reliable service to users [
        <xref ref-type="bibr" rid="ref22">24</xref>
        ].
      </p>
      <p>Smart Traffic Lights: Fog computing enables road signals to be opened based on the sensing
of blinking lights. It detects the appearance of bikes and pedestrians and monitors the speed and
distance between vehicles in the vicinity. Sensor lighting is turned on as it detects motions and
vice versa Fog computing enables traffic signals to clear roads based on the sensing of blinking
lights.</p>
      <p>
        Augmented Reality: Augmented - reality technologies are highly delay sensitive; a minor
delay will result in significant errors in user interface. Therefore, Fog computing-based
technologies will have tremendous potential in this area [
        <xref ref-type="bibr" rid="ref23">25</xref>
        ]. Zao et al. [
        <xref ref-type="bibr" rid="ref24">26</xref>
        ] proposed an
improved interaction game for brain computers using Fog and cloud infrastructure.
Smart HealthCare: Because of pollution our surroundings have various kinds of bacteria and
viruses which causes various diseases. Smart healthcare includes smart IoT, which is capable
of tracking the activities of patients and keeps track of various parameters of their body and
uploads the data on the fog nodes, and these are being noticed by the medical staffs and then
appropriate measures are suggested by the doctors to the patients [
        <xref ref-type="bibr" rid="ref25">27</xref>
        ]
Waste management: The earth is getting polluted every day. To save the earth, we need to
focus on natural resources. Rising waste and water loss from the ground needs significant
consideration. Smart garbage management may be considered as one of the solutions for the
improvement of the environment [
        <xref ref-type="bibr" rid="ref23">25</xref>
        ].
      </p>
    </sec>
    <sec id="sec-13">
      <title>7. Resource Allocation</title>
      <p>
        From a consumer's viewpoint, the distribution of resources relates to how the dissemination of
products and services among users is done. The resource allocation problem is a major issues in the
management of IoT applications in the fog scenario. To decrease time delay in mobile and time sensitive
applications which works in real time, service allocation is crucial. Simultaneously, in order to control
the set of large numbers of nodes scattered globally, the computational and storage resources of the fog
layer should be used effectively. Fog computing must, in particular, manage resource allocations very
effectively by taking into account the quality of service (QoS)which has been requested. Assignment of
resources is generally carried out by choosing devices to provide the resources needed for the
application services, taking into account certain constraints. According to Ni et al. [
        <xref ref-type="bibr" rid="ref26">28</xref>
        ], He suggested
a Fog computing resource allocation policy based on priced Petri timed networks (PTPNs) that will
encourage users to select required resources individually from a category of pre-assigned resources.
The proposed solution regarded the time cost and factors to finish a task of creating the Petri nets task
model. Alsaffar et al [
        <xref ref-type="bibr" rid="ref27">29</xref>
        ] designed an algorithm which implements decision tree learning technique that
depends on the scale of resources, completion time, and power metrics of VMs to handle and assigns
user resource allocation requests in the fog environment. Quang et al.[
        <xref ref-type="bibr" rid="ref28">30</xref>
        ] suggested First Fit placement
algorithm to dispense IoT application modules in the Fog computing model. The algorithm
allocates several modules, which depends on the configuration of the module. Each device, taking into
account its processing capacity, bandwidth Capacity and RAM. Another method proposed in [
        <xref ref-type="bibr" rid="ref29">31</xref>
        ]
suggests a heuristic resource allocation algorithm for Fog Data Centers (FDC). The algorithm is
designed to decrease the energy consumption and the price evolved of connectivity on these devices.
Optimization-based resource allocation approaches provide an effective cost-effective estimation
domain for different cases, like, time-sensitive applications, real-time applications, vehicle network
applications, etc. Table 3 shows the comparison between different resource allocation approaches.
      </p>
      <p>
        Brogi et al.[
        <xref ref-type="bibr" rid="ref37">39</xref>
        ]
latency ,
resource
      </p>
      <p>Monte Carlo</p>
      <p>
        The fog computing resource scheduling problem decides the best allocation of the various tasks
given in to be executed on the network edge fog nodes concerning to meet the QoS requirements signed
with the owner of the IoT system thereby decreasing the implementation time for the specified task
[
        <xref ref-type="bibr" rid="ref30">32</xref>
        ]. First, as users send tasks, that can be split into a number of smaller sub-tasks. These secondary
operations are then sent to the task scheduler where the task scheduling strategy and the QoS request
play an important role in the task scheduler. The job scheduler collects user scheduling data, resource
monitors and cloud gateways and assigns the corresponding fog resource to each mission. J. Du et al
[
        <xref ref-type="bibr" rid="ref31">33</xref>
        ] investigated cost conservation problem using min-max fairness while using the decision-making
method, to reduce system costs. Authors devised an algorithm and named it computation offloading and
resource allocation algorithm (CORA) which solves the articulated NP-hard optimization problem. In
[
        <xref ref-type="bibr" rid="ref28">30</xref>
        ] M. Peng et.Al analyzed latest events in performance measurement and radio resource allocation
for socially conscious mobile networking in fog radio access networks (F-RANs).Authors in [
        <xref ref-type="bibr" rid="ref33">35</xref>
        ] used
Lyapunov optimization problem to minimize the system latency. They also used containers as a
lightweight virtualization mechanism to simulate our proposed method. Xu et.al[
        <xref ref-type="bibr" rid="ref34">36</xref>
        ] implemented a
decoupled resource allocation technique called Zenith to handle the allocation of fog infrastructure
computing resources. Besides this, an auction-based resource allocation approach was designed to
ensure the service providers' truthfulness and utility maximization. Rahbari et al.[
        <xref ref-type="bibr" rid="ref35">37</xref>
        ] proposed a
knapsack-based schedule designed for symbiotic search.The contribution of their paper is reduction of
delay and energy consumption with the increase in network usages. Zahaf et al[
        <xref ref-type="bibr" rid="ref36">38</xref>
        ] presented the
efficiency and energy utilization model of a parallel real-time task conducted on the ARM bigLITTLE
architecture. In the second part of the paper, authors used this model, where they first describe the
optimization problem and then suggest heuristics for an efficient solution.In [
        <xref ref-type="bibr" rid="ref37">39</xref>
        ] Brogi et al. discussed
the impact of the Monte Carlo simulations in the FogTorch tool while keeping time delay, bandwidth
and resource usage in mind.
      </p>
    </sec>
    <sec id="sec-14">
      <title>8. Discussion and Conclusion</title>
      <p>Fog computing is a distributed processing system where computing, storage and software are placed
somewhere between the data source and the cloud. The resource allocation problem is a challenging
task in running the IoT application in the Fog scenario. The level Quality of service (QoS) efficiency in
cloud computing is primarily controlled by the resource allocation approach implemented. In this paper
we review several aspects of the resource allocation technique used in Fog computing area. A
comparison is done among different resource allocation techniques used by their performance matrix
and goals achieved. Besides reviewing different resource allocation techniques the architecture and
features of Fog computing is also discussed. The difference between Fog and cloud computing is
explained too. This work will give a chance to all nascent researchers.</p>
    </sec>
    <sec id="sec-15">
      <title>9. Acknowledgements 10.References</title>
      <p>The authors are thankful to the Lovely Professional University, Jalandhar for providing library and
all necessary supports for the research.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>Gartner</given-names>
            <surname>Research</surname>
          </string-name>
          .
          <article-title>"Zero-touch, edge computing infrastructure for industrial environments"</article-title>
          , https://www1.stratus.com/en-us/lp/gartner-research
          <article-title>-zero-touch-edge-computing-issue-2/ 2019</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Cisco</given-names>
            <surname>Systems</surname>
          </string-name>
          ,
          <article-title>"Fog Computing and the Internet of Things: Extend the Cloud to Where the Things Are”, www</article-title>
          .Cisco.com, p.
          <fpage>6</fpage>
          ,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>S.</given-names>
            <surname>Yi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>and Q.</given-names>
            <surname>Li</surname>
          </string-name>
          , “
          <article-title>A survey of fog computing: Concepts, applications and issues”</article-title>
          ,
          <source>Proc. Int. Symp. Mob. Ad Hoc Netw. Comput</source>
          .(
          <year>2015</year>
          )
          <fpage>37</fpage>
          -
          <lpage>42</lpage>
          . doi:
          <volume>10</volume>
          .1145/2757384.2757397
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>A. U. R.</given-names>
            <surname>Khan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Othman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Madani</surname>
          </string-name>
          , S. U. Khan,”
          <article-title>A survey of mobile cloud computing application models</article-title>
          ,
          <source>” IEEE Communications Surveys and Tutorials</source>
          ,
          <volume>16</volume>
          .1(
          <year>2014</year>
          )
          <fpage>393</fpage>
          -
          <lpage>413</lpage>
          .doi:
          <volume>10</volume>
          .1109/SURV.
          <year>2013</year>
          .
          <volume>062613</volume>
          .00160
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>Cisco</given-names>
            <surname>Systems</surname>
          </string-name>
          ,”
          <article-title>Fog Computing and the Internet of Things: Extend the Cloud to Where the Things Are”, www</article-title>
          .Cisco.com, p.
          <fpage>6</fpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>S.B</given-names>
            <surname>Akintoye</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A</given-names>
            <surname>Bagula</surname>
          </string-name>
          .
          <article-title>"Improving Quality-of-Service in Cloud/Fog Computing through Efficient Resource Allocation</article-title>
          .
          <source>Sensors (Basel) "19.6</source>
          (
          <year>2019</year>
          )1267, doi: 10.3390/s19061267 [7]
          <string-name>
            <given-names>M.</given-names>
            <surname>Stillwell</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Vivien</surname>
          </string-name>
          , H. Casanova,”
          <article-title>Virtual machine resource allocation for service hosting on heterogeneous distributed platforms”</article-title>
          ,
          <source>in: Proceedings of the IEEE International Parallel and Distributed Processing Symposium (IPDPS)</source>
          , pp.
          <fpage>786</fpage>
          -
          <lpage>797</lpage>
          ,
          <year>2012</year>
          . doi:
          <volume>10</volume>
          .1109/IPDPS.
          <year>2012</year>
          .75
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>X.</given-names>
            <surname>Tang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Ren</surname>
          </string-name>
          and
          <string-name>
            <given-names>W.</given-names>
            <surname>Cai</surname>
          </string-name>
          ,
          <article-title>"On First Fit Bin Packing for Online Cloud Server Allocation,"</article-title>
          <source>2016 IEEE International Parallel and Distributed Processing Symposium (IPDPS)</source>
          , Chicago, IL,
          <year>2016</year>
          , pp.
          <fpage>323</fpage>
          -
          <lpage>332</lpage>
          , doi: 10.1109/IPDPS.
          <year>2016</year>
          .
          <volume>42</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>N.</given-names>
            <surname>Roy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Dubey</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Gokhale</surname>
          </string-name>
          ,
          <article-title>"Efficient Autoscaling in the Cloud Using Predictive Models for Workload Forecasting,"</article-title>
          <source>2011 IEEE 4th International Conference on Cloud Computing</source>
          , Washington, DC,
          <year>2011</year>
          , pp.
          <fpage>500</fpage>
          -
          <lpage>507</lpage>
          , doi: 10.1109/CLOUD.
          <year>2011</year>
          .
          <volume>42</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Chandra</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gong</surname>
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shenoy</surname>
            <given-names>P.</given-names>
          </string-name>
          (
          <year>2003</year>
          )
          <article-title>Dynamic Resource Allocation for Shared Data Centers Using Online Measurements</article-title>
          . In:
          <string-name>
            <surname>Jeffay</surname>
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stoica</surname>
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wehrle</surname>
            <given-names>K</given-names>
          </string-name>
          . (eds) Quality of Service - IWQoS
          <year>2003</year>
          .
          <source>IWQoS 2003. Lecture Notes in Computer Science</source>
          , vol
          <volume>2707</volume>
          . Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44884-5_
          <fpage>21</fpage>
          [11]
          <string-name>
            <given-names>M. H.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Dong</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Liang</surname>
          </string-name>
          , et al.,
          <article-title>“Joint Offloading Decision and Resource Allocation for Mobile Cloud With Computing Access Point,”</article-title>
          <source>in Proc. IEEE ICASSP</source>
          ,
          <year>2016</year>
          , pp.
          <fpage>3516</fpage>
          -
          <lpage>3520</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Evans</surname>
            <given-names>D</given-names>
          </string-name>
          , “
          <article-title>The internet of things how the next evolution of the internet is changing everything</article-title>
          .,” Cisco White Pap.,
          <year>2011</year>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>B.</given-names>
            <surname>Varghese</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Reano</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F.</given-names>
            <surname>Silla</surname>
          </string-name>
          , “
          <article-title>Accelerator Virtualization in Fog Computing: Moving from the Cloud to the Edge,” IEEE Cloud Comput</article-title>
          ., vol.
          <volume>5</volume>
          , no.
          <issue>6</issue>
          , pp.
          <fpage>28</fpage>
          -
          <lpage>37</lpage>
          ,
          <year>2018</year>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>S.</given-names>
            <surname>Yi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>and Q.</given-names>
            <surname>Li</surname>
          </string-name>
          , “
          <article-title>A survey of fog computing: Concepts, applications</article-title>
          and issues,
          <source>” Proc. Int. Symp. Mob. Ad Hoc Netw. Comput.</source>
          , vol. 2015-June, pp.
          <fpage>37</fpage>
          -
          <lpage>42</lpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Sankara Rao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Bhavya Sree</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Professor</surname>
          </string-name>
          , “
          <article-title>A Review on Fog Computing : Conceptual Live Vm Migration Framework, Issues, Applications</article-title>
          and Its Challenges,
          <source>” Int. J. Sci. Res. Comput. Sci. Eng</source>
          . Inf. Technol. ©
          <source>2018 IJSRCSEIT</source>
          , vol.
          <volume>1</volume>
          , no.
          <issue>10</issue>
          , pp.
          <fpage>1175</fpage>
          -
          <lpage>1184</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>H.</given-names>
            <surname>Wadhwa</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.</given-names>
            <surname>Aron</surname>
          </string-name>
          ,
          <article-title>"Fog Computing with the Integration of Internet of Things: Architecture, Applications and Future Directions,"</article-title>
          <source>IEEE Intl Conf on Parallel &amp; Distributed Processing with Applications, Ubiquitous Computing &amp; Communications, Big Data &amp; Cloud Computing, Social Computing &amp; Networking</source>
          ,
          <string-name>
            <given-names>Sustainable</given-names>
            <surname>Computing</surname>
          </string-name>
          &amp;
          <string-name>
            <surname>Communications</surname>
          </string-name>
          (ISPA/IUCC/BDCloud/SocialCom/SustainCom), Melbourne, Australia, pp.
          <fpage>987</fpage>
          -
          <lpage>994</lpage>
          ,
          <year>2018</year>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>M.</given-names>
            <surname>Mukherjee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Shu</surname>
          </string-name>
          and
          <string-name>
            <given-names>D.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <article-title>"</article-title>
          <source>Survey of Fog Computing: Fundamental</source>
          ,
          <string-name>
            <given-names>Network</given-names>
            <surname>Applications</surname>
          </string-name>
          , and Research Challenges,
          <article-title>"</article-title>
          <source>in IEEE Communications Surveys &amp; Tutorials</source>
          , vol.
          <volume>20</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>1826</fpage>
          -
          <lpage>1857</lpage>
          , thirdquarter
          <year>2018</year>
          , doi: 10.1109/COMST.
          <year>2018</year>
          .
          <volume>2814571</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>Y</given-names>
          </string-name>
          , Fieldsend,
          <string-name>
            <surname>J.E</surname>
          </string-name>
          , Min, G.”
          <article-title>A Framework of Fog Computing: Architecture, Challenges</article-title>
          and Optimization”
          <source>IEEE Access</source>
          <year>2017</year>
          ,
          <volume>4</volume>
          ,
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>M.</given-names>
            <surname>Satyanarayanan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Lewis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Morris</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Simanta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Boleng</surname>
          </string-name>
          , and
          <string-name>
            <given-names>K.</given-names>
            <surname>Ha</surname>
          </string-name>
          , “
          <article-title>The role of cloudlets in hostile environments,” IEEE Pervasive Computing</article-title>
          , vol.
          <volume>12</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>40</fpage>
          -
          <lpage>49</lpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [20]
          <string-name>
            <surname>G. I. Klas</surname>
          </string-name>
          , “
          <article-title>Fog computing and mobile edge cloud gain momentum open fog consortium etsi mec and cloudlets</article-title>
          ,”
          <year>2015</year>
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>W.</given-names>
            <surname>Shi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Cao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Li</surname>
          </string-name>
          and
          <string-name>
            <given-names>L.</given-names>
            <surname>Xu</surname>
          </string-name>
          ,
          <article-title>"Edge Computing: Vision and Challenges,"</article-title>
          <source>in IEEE Internet of Things Journal</source>
          , vol.
          <volume>3</volume>
          , no.
          <issue>5</issue>
          , pp.
          <fpage>637</fpage>
          -
          <lpage>646</lpage>
          , Oct.
          <year>2016</year>
          , doi: 10.1109/JIOT.
          <year>2016</year>
          .
          <volume>2579198</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>M.</given-names>
            <surname>Satyanarayanan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Bahl</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Caceres</surname>
          </string-name>
          , and
          <string-name>
            <given-names>N.</given-names>
            <surname>Davies</surname>
          </string-name>
          , “
          <article-title>The case for vm-based cloudlets in mobile computing</article-title>
          ,
          <source>” IEEE pervasive Computing</source>
          , vol.
          <volume>8</volume>
          , no.
          <issue>4</issue>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>K.</given-names>
            <surname>Skala</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Davidovic</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Afgan</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Sovic</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Z.</given-names>
            <surname>Sojat</surname>
          </string-name>
          , “
          <article-title>Scalable distributed computing hierarchy: Cloud, fog and dew computing,”</article-title>
          <source>Open Journal of Cloud Computing (OJCC)</source>
          , vol.
          <volume>2</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>16</fpage>
          -
          <lpage>24</lpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [24]
          <string-name>
            <surname>Atlam</surname>
            ,
            <given-names>Hany</given-names>
          </string-name>
          &amp; Walters, Robert &amp; Wills, Gary ”
          <article-title>Fog Computing and the Internet of Things: A Review” Big Data and Cognitive Computing</article-title>
          .,
          <year>2018</year>
          ,
          <volume>2</volume>
          .
          <fpage>10</fpage>
          .3390/bdcc2020010.
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>A. V.</given-names>
            <surname>Dastjerdi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Gupta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. N.</given-names>
            <surname>Calheiros</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. K.</given-names>
            <surname>Ghosh</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Buyya</surname>
          </string-name>
          , “
          <article-title>Fog computing: Principles, architectures, and applications</article-title>
          ,” in Internet of Things: Principle &amp;
          <string-name>
            <surname>Paradigms</surname>
          </string-name>
          , M. Kaufmann, Ed., USA,
          <year>2016</year>
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>J. K.</given-names>
            <surname>Zao</surname>
          </string-name>
          , T. T. Gan,
          <string-name>
            <given-names>C. K.</given-names>
            <surname>You</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. J. R.</given-names>
            <surname>Méndez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. E.</given-names>
            <surname>Chung</surname>
          </string-name>
          , Y. TeWang, T. Mullen, and
          <string-name>
            <given-names>T. P.</given-names>
            <surname>Jung</surname>
          </string-name>
          , “
          <article-title>Augmented brain computer interaction based on fog computing and linked data,” in Proceeding of the International Conference on Intelligent Environments (IE)</article-title>
          . IEEE,
          <year>2014</year>
          , pp.
          <fpage>374</fpage>
          -
          <lpage>377</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>S.</given-names>
            <surname>Khan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Parkinson</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Qin</surname>
          </string-name>
          , “
          <article-title>Fog computing security: a review of current applications and security solutions</article-title>
          ,
          <source>” J. Cloud Comput.</source>
          , vol.
          <volume>6</volume>
          , no.
          <issue>1</issue>
          , 2017
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>L.</given-names>
            <surname>Ni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Jiang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Yan</surname>
          </string-name>
          and
          <string-name>
            <given-names>K.</given-names>
            <surname>Yu</surname>
          </string-name>
          ,
          <article-title>"Resource Allocation Strategy in Fog Computing Based on Priced Timed Petri Nets,"</article-title>
          <source>in IEEE Internet of Things Journal</source>
          , vol.
          <volume>4</volume>
          , no.
          <issue>5</issue>
          , pp.
          <fpage>1216</fpage>
          -
          <lpage>1228</lpage>
          , Oct.
          <year>2017</year>
          , doi: 10.1109/JIOT.
          <year>2017</year>
          .
          <volume>2709814</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [29]
          <string-name>
            <surname>Alsaffar</surname>
            ,
            <given-names>A.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pham</surname>
            ,
            <given-names>H.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hong</surname>
            ,
            <given-names>C.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Huh</surname>
            ,
            <given-names>E.N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Aazam</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>”</surname>
          </string-name>
          <article-title>An architecture of IoT service delegation and resource allocation based on collaboration between fog and cloud computing</article-title>
          .
          <source>Mob. Inf. Syst”</source>
          .vol.
          <year>2016</year>
          , pp
          <fpage>1</fpage>
          -
          <lpage>15</lpage>
          ,
          <year>2016</year>
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>Q.</given-names>
            <surname>Nguyen</surname>
          </string-name>
          and
          <string-name>
            <given-names>T. Truong</given-names>
            <surname>Pham</surname>
          </string-name>
          ,
          <article-title>"Studying and Developing a Resource Allocation Algorithm in Fog Computing,"</article-title>
          <source>2018 International Conference on Advanced Computing and Applications</source>
          (ACOMP),
          <source>Ho Chi Minh City</source>
          ,
          <year>2018</year>
          , pp.
          <fpage>76</fpage>
          -
          <lpage>82</lpage>
          , doi: 10.1109/ACOMP.
          <year>2018</year>
          .
          <volume>00020</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [31]
          <string-name>
            <surname>Zahra</surname>
            <given-names>Pooranian</given-names>
          </string-name>
          , Mohammad Shojafar, Paola Gabriela Vinueza Naranjo, Luca Chiaraviglio, and Mauro Conti.
          <article-title>” A novel distributed fog-based networked architecture to preserve energy in fog data centers</article-title>
          .
          <source>” In 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems</source>
          ,MASS 2017, Orlando, FL, USA,
          <source>October 22-25</source>
          , pages
          <fpage>604</fpage>
          -
          <lpage>609</lpage>
          ,
          <year>2017</year>
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [32]
          <string-name>
            <surname>Ghobaei-Arani</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Khorsand</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ramezanpour</surname>
            ,
            <given-names>M.”</given-names>
          </string-name>
          <article-title>An autonomous resource provisioning framework formassively multiplayer online games in cloud environment”</article-title>
          .
          <source>J. Netw. Comput. Appl</source>
          .
          <volume>142</volume>
          (
          <issue>18</issue>
          ),
          <fpage>76</fpage>
          -
          <lpage>97</lpage>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>J.</given-names>
            <surname>Du</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Zhao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Feng</surname>
          </string-name>
          and
          <string-name>
            <given-names>X.</given-names>
            <surname>Chu</surname>
          </string-name>
          ,
          <article-title>"Computation Offloading and Resource Allocation in Mixed Fog/Cloud Computing Systems With Min-Max Fairness Guarantee,"</article-title>
          <source>in IEEE Transactions on Communications</source>
          , vol.
          <volume>66</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>1594</fpage>
          -
          <lpage>1608</lpage>
          ,
          <year>April 2018</year>
          , doi: 10.1109/TCOMM.
          <year>2017</year>
          .
          <volume>2787700</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [34]
          <string-name>
            <given-names>M.</given-names>
            <surname>Peng</surname>
          </string-name>
          and
          <string-name>
            <given-names>K.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <article-title>"Recent Advances in Fog Radio Access Networks: Performance Analysis and Radio Resource Allocation,"</article-title>
          <source>in IEEE Access</source>
          , vol.
          <volume>4</volume>
          , pp.
          <fpage>5003</fpage>
          -
          <lpage>5009</lpage>
          ,
          <year>2016</year>
          , doi: 10.1109/ACCESS.
          <year>2016</year>
          .
          <volume>2603996</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [35]
          <string-name>
            <given-names>A.</given-names>
            <surname>Abouaomar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Cherkaoui</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kobbane</surname>
          </string-name>
          and
          <string-name>
            <given-names>O. A.</given-names>
            <surname>Dambri</surname>
          </string-name>
          ,
          <article-title>"A Resources Representation for Resource Allocation in Fog Computing Networks,"</article-title>
          <source>2019 IEEE Global Communications Conference (GLOBECOM)</source>
          , Waikoloa,
          <string-name>
            <surname>HI</surname>
          </string-name>
          , USA,
          <year>2019</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          , doi: 10.1109/GLOBECOM38437.
          <year>2019</year>
          .
          <volume>9014146</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [36]
          <string-name>
            <surname>Xu</surname>
            ,
            <given-names>Jinlai</given-names>
          </string-name>
          &amp; Palanisamy, Balaji &amp; Ludwig, Heiko &amp; Wang,
          <string-name>
            <surname>Qingyang.</surname>
          </string-name>
          (
          <year>2017</year>
          ).
          <article-title>Zenith: UtilityAware Resource Allocation for Edge Computing</article-title>
          .
          <volume>10</volume>
          .1109/IEEE.EDGE.
          <year>2017</year>
          .
          <volume>15</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [37]
          <string-name>
            <given-names>Dadmehr</given-names>
            <surname>Rahbari</surname>
          </string-name>
          and
          <string-name>
            <given-names>Mohsen</given-names>
            <surname>Nickray</surname>
          </string-name>
          .
          <article-title>Scheduling of fog networks with optimized knapsack by symbiotic organisms search</article-title>
          .
          <source>In 21st Conference of Open Innovations Association, FRUCT</source>
          <year>2017</year>
          , Helsinki,Finland, November 6-
          <issue>10</issue>
          , pages
          <fpage>278</fpage>
          -
          <lpage>283</lpage>
          ,
          <year>2017</year>
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [38]
          <string-name>
            <surname>H.-E. Zahaf</surname>
            ,
            <given-names>A. E. H.</given-names>
          </string-name>
          <string-name>
            <surname>Benyamina</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Olejnik</surname>
          </string-name>
          , and G. Lipari, “
          <article-title>Energyefficient scheduling for moldable real-time tasks on heterogeneous computing platforms</article-title>
          ,
          <source>” Journal of Systems Architecture</source>
          , vol.
          <volume>74</volume>
          , pp.
          <fpage>46</fpage>
          -
          <lpage>60</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [39]
          <string-name>
            <surname>Antonio</surname>
            <given-names>Brogi</given-names>
          </string-name>
          , Stefano Forti, and
          <string-name>
            <given-names>Ahmad</given-names>
            <surname>Ibrahim</surname>
          </string-name>
          .
          <article-title>How to best deploy your fog applications, probably</article-title>
          .
          <source>In 1st IEEE International Conference on Fog and Edge Computing</source>
          ,
          <string-name>
            <surname>ICFEC</surname>
          </string-name>
          <year>2017</year>
          , Madrid, Spain, May
          <volume>14</volume>
          -15, pages
          <fpage>105</fpage>
          -
          <lpage>114</lpage>
          ,
          <year>2017</year>
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          [40]
          <string-name>
            <surname>Qureshi</surname>
            <given-names>MS</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Qureshi</surname>
            <given-names>MB</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fayaz</surname>
            <given-names>M</given-names>
          </string-name>
          , et al.
          <article-title>A comparative analysis of resource allocation schemes for real-time services in high-performance computing systems</article-title>
          .
          <source>International Journal of Distributed Sensor Networks. August 2020</source>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>