<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Fog Computing Architecture, Application and Resource Allocation: A Review</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author role="corresp">
							<persName><forename type="first">Satyakam</forename><surname>Rahul</surname></persName>
							<email>satyakam_rahul@yahoo.co.in</email>
							<affiliation key="aff0">
								<orgName type="department">Department of Computer Applications</orgName>
								<orgName type="institution">Lovely Professional University</orgName>
								<address>
									<settlement>Jalandhar</settlement>
									<region>Punjab</region>
									<country key="IN">India</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Rajni</forename><surname>Aron</surname></persName>
							<affiliation key="aff1">
								<orgName type="department">Department of CSE</orgName>
								<orgName type="institution">Lovely Professional University</orgName>
								<address>
									<settlement>Jalandhar</settlement>
									<region>Punjab</region>
									<country key="IN">India</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Fog Computing Architecture, Application and Resource Allocation: A Review</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">88C726C86F94354C4AABE28FE1955915</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T12:18+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Fog Computing</term>
					<term>Cloud Computing</term>
					<term>Resource Allocation</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Fog Computing, may be considered as Edge Computing which expands Cloud Computing model while improving efficiency, and lowers latency. Fog computing is used to keep up day by day growing need of IT related services with the alliance of cloud computing. Having fast development of IT, the fog computing is arising as an appealing solution for retrieval and transformation of the data related to IoT applications. This paper discusses the concept, architecture of fog computing and its implementation with the existing and new applications. Fog devices are very complex and heterogeneous. The resource allocation problem is one of the core challenges in running the IoT application in the Fog area. The goal of this paper is to examine recent work on the allocation of resources in the fog area. The rationale of this survey is to realize the application of fog computing and make some improvements in the existing technology. This study will help researchers to understand and utilize technology better.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Nowadays, a large number of device objects are attached to the Internet to capture and exchange data from the real world, which brings the new idea of the Internet of Things (IoT). As stated by Gartner, around fifty percent of the Internet of Things (IoT) study that is related with industry will be carried out at the edge by 2022. <ref type="bibr" target="#b0">[1]</ref>. According to an estimation that about 50 billion appliances may get linked to the IoT network by 2022 <ref type="bibr">[2][3]</ref>. This gives an idea that future computation will require a new and savvy edge computing foundation. Earlier, Mobile cloud computing (MCC) was broadly utilized to deal with tasks that require high efficiency, due to its large computation and storage assets to appease the fast increasing and changing need from distant cloud data centers <ref type="bibr" target="#b3">[4]</ref>. Nevertheless, it is not easy to deliver relying efficiency for IoT devices which are delay sensitive at the end of the network because of the considerable interval between arbitrarily scattered terminal devices and distant cloud data centers. As a response, the concerns of energy consumption, heavy load, delay, congestion, and unreliable wireless connections may be unavoidable, which would restrict cloud computing growth <ref type="bibr" target="#b4">[5]</ref>. Edge computing, therefore came into the existence to control the limitations of cloud computing. In contrast to conventional cloud computing an Edge computing offers data offloading services which is distributed and its near-to-terminal, which may enhance the accuracy of service and decrease the latent period. It has recently come out as a feasible solution to coordinate the network architecture which is currently existing and new network Architecture using large amounts of pliable fog deployed Nodes (FNs) for mutual offloading of tasks from the IoT systems nearby.</p><p>The goal of fog computing in IOT is, boosting its abilities and performance while decreasing the scale of data transmitted for collection, storage and analysis too. The data obtained by the sensors is transmitted to the edge appliances instead of being sent to the server, thereby reducing network traffic and latency. A new framework for services is provided via Fog computing incorporation with the IOT, This is classified as Fog as a Service (FaaS), in which supplier of the service creates the fog nodes array around its geographical footprint and functions as a distributor for many who require different services.</p><p>Each node of the fog hosts capabilities for local computation, networking and storage. All the fog computing resources are referred to as the entangled fog nodes through the Internet to the edge network.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Contribution of this paper</head><p>In this research analysis, we tend to examine different resource allocation techniques and its infrastructure that powers the components and server's devices. The remaining part of the paper is outlined as follows: In Section 2 it defines the related work done in the resource allocation technique. Section 3 provides the background and definition of key terms used, it explains the key difference in both the technologies that is Fog and Cloud Computing while discussing characteristics of Fog Computing and its architecture and deployment models. It also presents taxonomy of Fog Computing. Section 4 discusses related computing model and their differences. Section 5 discusses application of Fog Computing. Finally, section 6 discusses different resource allocation techniques used by researchers and presents their comparison.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1.">Related Work</head><p>The instruments of cloud computing / Fog computing and resources of it may be either tangible resources or virtual resources. The issue of resource allocation is a complex task in a Fog environment. It determines the right task distribution, given in to be done on the fog junctions or nodes to satisfy the QoS, at the side or edge of the network. Some criteria, such as latency, performance, energy use reduction, cost allocation minimization and response time, must be viewed as the product of any optimal resource allocation strategy. There are several experiments and studies of cloud/fog computing on resource distribution <ref type="bibr" target="#b5">[6]</ref> suggest a presumptive resource allocation model in which jobs come in accordance with a stochastic process and call a number of virtual machines. To guarantee the user's experience with the resource request, after a resource request has been sent by the user, a decision on the allocation of the resource must be taken in due time to position the VM on the server responding to this request, that involves making VM placement decisions without any potential information upon the delivery of the resource request. To take better advantage of a server's multi-resource capability and reduce the total number of active servers, VM placement should be developed. Some approaches proposes the idea of offline VM placement problem. Stillwell et al <ref type="bibr" target="#b6">[7]</ref> introduced algorithms to delegate different types of resources for engaging services Working with virtual machines on distributed, diverse systems. The key result of their input is, what he proposed as vector packing methods in a homogenous case can be generalized to deliver valued solutions in a diversified case and merged to support a single, effective algorithm. The online VM placement issue is taken into account by a few other strategies. Tang et al. <ref type="bibr" target="#b7">[8]</ref>used heuristic algorithm to achieve high resource utilization. But this couldn't achieve optimal resource utilization. Authors in <ref type="bibr" target="#b8">[9]</ref> established an algorithm which is based on a predictive control model for resource allocation. This model establishes the future workload depending on a restricted horizon and addresses the problems of autoscaling in the cloud. Chandra et al. <ref type="bibr" target="#b9">[10]</ref> suggested a system architecture that integrates the properties of the workload and the current state of the system with estimation and resource allocation techniques. The strategies for dynamic allocation of resources on public web servers were discussed. The key objective of their strategies is to respond to temporary system overburden by integrating online system frameworks.</p><p>In <ref type="bibr" target="#b10">[11]</ref> authors used non-pre-emptive technique for load balance to schedule VM configurations. Offloading decision making and Resource allocation for energy conservation.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2.">Background and Definition</head><p>Fog Computing <ref type="bibr" target="#b11">[12]</ref>, can also be identified as Edge Computing which expands the Cloud Computing model while improving efficiency, and lowers latency. It also improves location consciousness and assures better support for portability. As a result of this, business capabilities increases. The word first used by Cisco, It means that, instead of working on a centralized Cloud environment, it works at the end of the network. This is done by adding some intelligence, processes, and resources at the boundary of the Cloud, instead of initiating channels for Cloud storage and utilization. Fog computing technology disseminates the assets and services attached to the communication storage near to gadgets or close to the users. A fog computing paradigm analyses and runs applications on anything from the network center to the edge -wherever it is required. It is a process of extending computation and storage services almost immediately and near to the physical devices of an organization or at the boundary of the Cloud network. It is also a technique through internet can be bypassed, whose speeds are more often depends on bandwidth and carriers <ref type="bibr" target="#b12">[13]</ref>. Because of the highly variable and unpredictable fog environment, resource management is the difficult problems in the fog landscape that need to be taken into account.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Dissimilarities of Cloud Computing and Fog Computing</head><p>The amount of information is on the rise in overall networking. To deal with this, services such as cloud storage and cloud computing are used to handle and distribute data easily to end users. However, fog computing is a more feasible option for handling high levels of security updates and reducing bandwidth issues. Table1 shows the dissimilarities between the two technologies. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Taxonomy of Fog Computing</head><p>Qureshi et al. <ref type="bibr" target="#b39">[40]</ref> has given the taxonomy of Fog Computing focused on platform specifications application, technology. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.">Characterization of Fog Computing</head><p>It's basically an augmentation of the cloud, but similar to the stuff which functions with IoT Data. As seen in Figure <ref type="figure" target="#fig_0">1</ref> above, fog computing serves as mediator linking cloud and end devices, bringing storage and networking resources and processing closer to the end devices respectively. It provides less latency and location awareness due to the localization of fog nodes. It provides a dynamically virtualized interface services for storage, computing and networking between end computers and typical data centers for Cloud Computing. It has following characteristics <ref type="bibr" target="#b13">[14]</ref>  Low latency-fog nodes are near to the devices attached that makes response time very less and data processing faster. It supports awareness of locations in which fog In various locations, nodes can be installed.  Mobility-Because of the state forward communication between fog and devices it provides better mobility  Real-time Interaction -Because of the closeness of devices and fog nodes interactions may occur in real time not like batch processing in case of cloud computing.  Geographical distribution-For computing works in a distributed environment so it is quick in delivering high quality streaming services. The essence of fog computing is because of lack of aid with Quality Services at the end of network [15]  Protection and Privacy-Because the data contains subtle information, IoT has a critical role in defense Of that kind of detailsTo ensure defense from cyber hackers. It hase its own security implementation. <ref type="bibr" target="#b15">[16]</ref> Content caching-content caching in fog platform is a technique to reduce network traffic and improve response time by caching </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Layered Architecture for Fog Computing</head><p>As per Mukherjee et al. <ref type="bibr" target="#b16">[17]</ref>, The architecture is made up of six layers. -Virtualization and physical, control etc. Temporary storage, defense and transport layers-as seen in Figure <ref type="figure" target="#fig_2">3</ref>. The very first layer which is physical and virtualization includes multipule catogries of nodes, like physical nodes and virtual nodes. Various kinds of sensors are categorized to moniter the environment and transfer the acquired data to the higher layers through gateways for more preparation and refining. Monitoring layer controls the task which is requested and keep tracks of energy usage concerns of the fundamental physical devices. Preprocessing layer controls task related with the Data management like filtering and trimming. The temporary storage layer holds the Data for a short duration only. The security layer is concerned with the encryption/decryption of data. Additionaly, data integrity steps are also implemented to defend them from tampering. At the end, in the transport layer, previouslyprocessed data is submitted to the cloud to make the cloud able to retrieve and generate more valuable data <ref type="bibr" target="#b16">[17]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.3.">Fog Deployment Models</head><p>We may distinguish fog models based on the ownership of the fog infrastructure and underlying properties. We have four different types of fog models. </p><formula xml:id="formula_0"></formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.4.">Disadvantages of Fog Computing</head><p> Complexity: Different modules from both the edge and the central network can make use of a possible Fog computing framework. Usually, these modules are Equipped with different types of processors but not us ed for general purpose computation. Owing to its ambiguity, it can be difficult to grasp the principle of Fog computing. There are several computers placed at various locations that store and evaluate their own data collection. This could bring more complexity to the network. In addition, more advanced fog nodes exist in the fog infrastructure.  Security: Authentic entry to services and privacy in Fog computing are difficult to ensure. There are various devices and different fog nodes in the fog computing environment. These fog nodes are likely to be in a less secure environment. Hackers can conveniently use bogus IP addresses to obtain access to the corresponding fog node.  Power Consumption: There are many fog nodes available in the fog environment that is directly proportional to their energy consumption. That implies that these fog nodes need a high volume of energy to work. If the fog infrastructure requires more fog nodes, there is even more power usage.  Authentication: The service delivered by fog computing is on a wide scale. Fog networking is made up of end-users, Internet service providers, and cloud providers. This will also pose concerns about trust and authentication in the fog.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Related Computing Models</head><p>There are many similar computing models similar to Fog computing exist such as Edge computing, Dew computing, Mobile Edge Computing (MEC), Mobile Cloud Computing (MCC). In Cloud computing, there are many IoT appliances or devices attached face to face to the cloud and computing relies entirely on the cloud.</p><p> Mobile Cloud Computing: Mobile cloud computing makes use of cloud computing to provide services or required applications to mobile devices. This mobile application can be implemented far away using pace, mobility and development software. MCC Overcomes computing, energy, and storage capacity Restriction on smart mobile devices. At the edge of the network, Cloudlet is used to solve these problems <ref type="bibr" target="#b18">[19]</ref>. It increases the durability and reliability of cloud-backed and stored content.  Mobile Edge Computing: It enlarges the effectiveness of cloud computing by taking it to the edge of the network. Whereas conventional cloud computing takes place on remote servers located far from users and computers, MEC allows processes to take place at base stations, central offices and other aggregation points on the network. MEC supports the co-location of storage and computation Resources at cellular network base stations. According to Klas <ref type="bibr" target="#b17">[18]</ref>,</p><p>The development of mobile base stations is the MEC. Various services could be offered by this technique, including IoT, caching, location services, video analytics, and local Distribution of material.  Edge Computing: It is a recent development in computing model that carry out transformation of data at the "edge" of the network <ref type="bibr" target="#b18">[19]</ref>. It's a computing that is done at or near the data source, instead of depending on the cloud at one of a dozen data centers to do all the work. All devices attached with sensors will contain data sources, but the edges are different altogether. A cloudlet, for example the edge of the mobile application is a micro data center. Likewise, if a smart phone is running a cloud application, then the smartphone will be considered as edge <ref type="bibr" target="#b23">[24]</ref>. Its core principle is, it can be performed closer to the origins of data.  Dew Computing: Dew Computing is a model which makes use of programming that enables the plug-in to be omnipresent, ubiquitous and simple, ready-to-go. It facilitates a single Super-Hybrid-Peer P2P interaction link for personal networks. Its key objective is to access the raw data pool that can be fitted with meta-data. Skala et al. <ref type="bibr" target="#b18">[19]</ref> discussed that DC is largely effective in daily life than Fog computing. IoT-based apps are sponsored by Fog, although DC is a microservice idea and that's why it doesn't rely on any compact or centralized device, server or cloud, it requires low waiting time, real-time capacity and active network configuration.</p><p>In summary, IoT devices are linked to the cloud via Fog devices in the Fog computing paradigm. Fog devices are linked via the core network to the cloud. These similar paradigms vary on the basis of Internet and cloud access. Table <ref type="table" target="#tab_2">2</ref> displays the features of the similar computing discussed above. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Applications of Fog Computing</head><p>It is useful in various IoT applications. A large range of sensors can be mounted in the sea, airline fleets or a car, so it's difficult to dispatch and reserve all data produced instantaneous in the cloud. A few interim computing, analysis and processing will be provided by Fog Computing appliances.</p><p> Connected Vehicle: There are several useful qualities that rely on fog and Internet access which is applied to vehicles, like automatic transmission and "hands-free" operation or vehicle that is capable of parking itself, which means, no requirement for a human being to park a vehicle <ref type="bibr" target="#b7">[8]</ref>.</p><p>As part of the Intelligent Transport System, vehicle communication has been designed to achieve protection and efficiency through intelligent transportation by incorporating a variety of information. Connections in an intelligent transport system are accomplished by different communications variations which is vehicle-to-vehicle (V2V) and many a times vehicle-toinfrastructure (V2I). Fog computing is the highly capable approach for all Internet connections. Vehicles, as they have a high degree of real-time interaction., it will encourage vehicles, traffic lights and access points to exchange communication with each other in order to provide a reliable service to users <ref type="bibr" target="#b23">[24]</ref>.  Smart Traffic Lights: Fog computing enables road signals to be opened based on the sensing of blinking lights. It detects the appearance of bikes and pedestrians and monitors the speed and distance between vehicles in the vicinity. Sensor lighting is turned on as it detects motions and vice versa Fog computing enables traffic signals to clear roads based on the sensing of blinking lights.  Augmented Reality: Augmented -reality technologies are highly delay sensitive; a minor delay will result in significant errors in user interface. Therefore, Fog computing-based technologies will have tremendous potential in this area <ref type="bibr" target="#b24">[25]</ref>. Zao et al. <ref type="bibr" target="#b25">[26]</ref> proposed an improved interaction game for brain computers using Fog and cloud infrastructure.  Smart HealthCare: Because of pollution our surroundings have various kinds of bacteria and viruses which causes various diseases. Smart healthcare includes smart IoT, which is capable of tracking the activities of patients and keeps track of various parameters of their body and uploads the data on the fog nodes, and these are being noticed by the medical staffs and then appropriate measures are suggested by the doctors to the patients [27]  Waste management: The earth is getting polluted every day. To save the earth, we need to focus on natural resources. Rising waste and water loss from the ground needs significant consideration. Smart garbage management may be considered as one of the solutions for the improvement of the environment <ref type="bibr" target="#b24">[25]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7.">Resource Allocation</head><p>From a consumer's viewpoint, the distribution of resources relates to how the dissemination of products and services among users is done. The resource allocation problem is a major issues in the management of IoT applications in the fog scenario. To decrease time delay in mobile and time sensitive applications which works in real time, service allocation is crucial. Simultaneously, in order to control the set of large numbers of nodes scattered globally, the computational and storage resources of the fog layer should be used effectively. Fog computing must, in particular, manage resource allocations very effectively by taking into account the quality of service (QoS)which has been requested. Assignment of resources is generally carried out by choosing devices to provide the resources needed for the application services, taking into account certain constraints. According to Ni et al. <ref type="bibr" target="#b27">[28]</ref>, He suggested a Fog computing resource allocation policy based on priced Petri timed networks (PTPNs) that will encourage users to select required resources individually from a category of pre-assigned resources. The proposed solution regarded the time cost and factors to finish a task of creating the Petri nets task model. Alsaffar et al <ref type="bibr" target="#b28">[29]</ref> designed an algorithm which implements decision tree learning technique that depends on the scale of resources, completion time, and power metrics of VMs to handle and assigns user resource allocation requests in the fog environment. Quang et al. <ref type="bibr" target="#b29">[30]</ref> suggested First Fit placement algorithm to dispense IoT application modules in the Fog computing model. The algorithm allocates several modules, which depends on the configuration of the module. Each device, taking into account its processing capacity, bandwidth Capacity and RAM. Another method proposed in <ref type="bibr" target="#b30">[31]</ref> suggests a heuristic resource allocation algorithm for Fog Data Centers (FDC). The algorithm is designed to decrease the energy consumption and the price evolved of connectivity on these devices. Optimization-based resource allocation approaches provide an effective cost-effective estimation domain for different cases, like, time-sensitive applications, real-time applications, vehicle network applications, etc. Table <ref type="table" target="#tab_3">3</ref> shows the comparison between different resource allocation approaches. The fog computing resource scheduling problem decides the best allocation of the various tasks given in to be executed on the network edge fog nodes concerning to meet the QoS requirements signed with the owner of the IoT system thereby decreasing the implementation time for the specified task <ref type="bibr" target="#b31">[32]</ref>. First, as users send tasks, that can be split into a number of smaller sub-tasks. These secondary operations are then sent to the task scheduler where the task scheduling strategy and the QoS request play an important role in the task scheduler. The job scheduler collects user scheduling data, resource monitors and cloud gateways and assigns the corresponding fog resource to each mission. J. Du et al <ref type="bibr" target="#b32">[33]</ref> investigated cost conservation problem using min-max fairness while using the decision-making method, to reduce system costs. Authors devised an algorithm and named it computation offloading and resource allocation algorithm (CORA) which solves the articulated NP-hard optimization problem. In <ref type="bibr" target="#b29">[30]</ref> M. Peng et.Al analyzed latest events in performance measurement and radio resource allocation for socially conscious mobile networking in fog radio access networks (F-RANs).Authors in <ref type="bibr" target="#b34">[35]</ref> used Lyapunov optimization problem to minimize the system latency. They also used containers as a lightweight virtualization mechanism to simulate our proposed method. Xu et.al <ref type="bibr" target="#b35">[36]</ref> implemented a decoupled resource allocation technique called Zenith to handle the allocation of fog infrastructure computing resources. Besides this, an auction-based resource allocation approach was designed to ensure the service providers' truthfulness and utility maximization. Rahbari et al. <ref type="bibr" target="#b36">[37]</ref> proposed a knapsack-based schedule designed for symbiotic search.The contribution of their paper is reduction of delay and energy consumption with the increase in network usages. Zahaf et al <ref type="bibr" target="#b37">[38]</ref> presented the efficiency and energy utilization model of a parallel real-time task conducted on the ARM bigLITTLE architecture. In the second part of the paper, authors used this model, where they first describe the optimization problem and then suggest heuristics for an efficient solution.In <ref type="bibr" target="#b38">[39]</ref> Brogi et al. discussed the impact of the Monte Carlo simulations in the FogTorch tool while keeping time delay, bandwidth and resource usage in mind.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="8.">Discussion and Conclusion</head><p>Fog computing is a distributed processing system where computing, storage and software are placed somewhere between the data source and the cloud. The resource allocation problem is a challenging task in running the IoT application in the Fog scenario. The level Quality of service (QoS) efficiency in cloud computing is primarily controlled by the resource allocation approach implemented. In this paper we review several aspects of the resource allocation technique used in Fog computing area. A comparison is done among different resource allocation techniques used by their performance matrix and goals achieved. Besides reviewing different resource allocation techniques the architecture and features of Fog computing is also discussed. The difference between Fog and cloud computing is explained too. This work will give a chance to all nascent researchers.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure1: Taxonomy of Fog Computing<ref type="bibr" target="#b39">[40]</ref> </figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Fog Computing is an extention to cloud</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: Architecture of Fog Computing</figDesc><graphic coords="5,204.84,511.08,201.84,134.52" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1 :</head><label>1</label><figDesc>Differences between Cloud Computing and Fog Computing</figDesc><table><row><cell>FEATURE</cell><cell>CLOUD COMPUTING</cell><cell>FOG COMPUTING</cell></row><row><cell>Delay time</cell><cell>It is of enhanced latency</cell><cell>It is of less latency</cell></row><row><cell>Geographic Distribution</cell><cell>It's centralized.</cell><cell>It's distributed and decentralized.</cell></row><row><cell>Awareness of Location</cell><cell>Moderately Supported</cell><cell>completely Supported</cell></row><row><cell>Number of Server Nodes</cell><cell>Less server nodes.</cell><cell>High number of server nodes attached</cell></row><row><cell>Security</cell><cell>It's less secured than Fog Computing</cell><cell>Fog computing is of high security</cell></row><row><cell>Mobility</cell><cell>limited mobility</cell><cell>Mobility is provided by fog computing.</cell></row><row><cell></cell><cell>Access speed is fast and it</cell><cell></cell></row><row><cell>Speed</cell><cell>depends on the VM</cell><cell>Higher than Cloud Computing.</cell></row><row><cell></cell><cell>connectivity.</cell><cell></cell></row><row><cell>Power source</cell><cell>Power source Battery as well as direct power</cell><cell>Power source Battery/Direct power/Green</cell></row><row><cell>Failure management</cell><cell>Failure management Strong (VMs can be easily migrated from one node to other) Rescheduling of failed tasks</cell><cell>Failure management Strong (Solid (VMs can be quickly migrated from one node to another) Rescheduling of failed tasks</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head></head><label></label><figDesc>Private fog: A private fog is developed, purchased, maintained and controlled by an entity, a third entity or a variation thereof. It can be installed on or off-site. Private fog services are sold for absolute use by a single company.  Public fog: A public fog is owned, developed, and managed by, or a combination of, a corporation, academic institution or government organization. It is deployed on the premises of the fog suppliers. Public fog services are provided for open access by the common or general public.  Community fog: Community fog is developed, maintained and controlled by different community organizations, which may include a third party too, or a consolidation of them. It can be installed on or off-premises and services are provided for exclusive use, typically by customers in a particular group of organizations with common interests.  Hybrid fog: Hybrid fog is a type of cloud computing that incorporates the use of public/private/community fog with public/private cloud computing (i.e., hybrid cloud). It may be helpful due to the disadvantages of the physical resources in the fog. As a result, the platform is applied to the hybrid cloud to scale performance. The hybrid cloud is flexible, modular, and services are accessible on demand.</figDesc><table /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>Table 2 :</head><label>2</label><figDesc>Different Computing Models</figDesc><table><row><cell></cell><cell>MCC</cell><cell>MEC</cell><cell>EC</cell><cell>DC</cell><cell></cell><cell>Fog</cell></row><row><cell cols="2">The Cloud Link √</cell><cell>Both</cell><cell>Both</cell><cell>x</cell><cell></cell><cell>√</cell></row><row><cell cols="2">variety of Users Ambulant</cell><cell>Ambulant</cell><cell>Ambulant/</cell><cell cols="2">Uses devices</cell><cell>Ambulant/</cell></row><row><cell></cell><cell></cell><cell></cell><cell>Stationary</cell><cell>which</cell><cell>is</cell><cell>Stationary</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell cols="2">attached with</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell>sensors</cell><cell></cell></row><row><cell>Technology</cell><cell>It uses</cell><cell>It uses</cell><cell>Hypervisor or</cell><cell>Container</cell><cell></cell><cell>Hypervisor /</cell></row><row><cell>used</cell><cell>hypervisor /</cell><cell>Hypervisor /</cell><cell>Container</cell><cell></cell><cell></cell><cell>Container</cell></row><row><cell></cell><cell>Container</cell><cell>Container</cell><cell></cell><cell></cell><cell></cell></row><row><cell>key</cell><cell>Iis connected</cell><cell>MEC</cell><cell>Small Data</cell><cell>Mobile phone</cell><cell></cell><cell>devices which</cell></row><row><cell>component</cell><cell>with the base</cell><cell></cell><cell>Center</cell><cell></cell><cell></cell><cell>can compute,</cell></row><row><cell>engaged in</cell><cell>station server</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>store and has</cell></row><row><cell>computation</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>network</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>adapter</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_3"><head>Table 3 :</head><label>3</label><figDesc>Comparison between different Resource allocation approaches</figDesc><table><row><cell cols="2">Utilized Technique</cell><cell></cell><cell>Author</cell><cell>Performance Metrics</cell><cell>Goals Achieved</cell><cell>Simulation environment</cell></row><row><cell>Priced Petri net</cell><cell cols="2">Timed</cell><cell>Ni et al.[28]</cell><cell>Cost, Number of completing task</cell><cell cols="2">Efficient and realistic resource allocation</cell></row><row><cell cols="3">Heuristic-based</cell><cell>Alsaffar, Pham, Hong, Huh and Aazam[29]</cell><cell>Number of VM, Processing time</cell><cell cols="2">Effective distribution of partnership services on the basis of fog-cloud computing</cell><cell>CloudSim</cell></row><row><cell>heuristic</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="2">algorithms:</cell><cell></cell><cell></cell><cell></cell><cell cols="2">Resource enhancement,</cell></row><row><cell cols="2">MBFD MDC (Maximum</cell><cell>and</cell><cell>Zahra Pooranian et al[31]</cell><cell>heuristic and MDC algorithm, MBFD</cell><cell cols="2">number of chosen servers, response time on various electricity usage, and</cell><cell>iFogSim</cell></row><row><cell>Density</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>FN scales</cell></row><row><cell cols="3">Consolidation)</cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="3">Optimization (MINLP)</cell><cell>J. Du et. Al[33]</cell><cell>Offloading and Allocation Resource</cell><cell cols="2">Performance increased</cell><cell>Matlab</cell></row><row><cell cols="3">Optimization (F-RAN)</cell><cell>2016, Peng and Zhang [34]</cell><cell>Edge cache-based study of performance and distribution of</cell><cell cols="2">essential in solving partnership improvement in different caching</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell>radio services</cell><cell></cell></row><row><cell cols="2">Lyapunov optimization</cell><cell></cell><cell>A. Abouaomar et. Al[35]</cell><cell>System Performance</cell><cell cols="2">Minimizing delay and enhancing system performance</cell><cell>Docker containers</cell></row><row><cell cols="3">Auction-based</cell><cell></cell><cell></cell><cell></cell></row><row><cell>resource allocation</cell><cell></cell><cell></cell><cell>Xu et.al[36]</cell><cell>Resource Allocation</cell><cell cols="2">Minimizing latency and enhancing performance</cell><cell>iFogSim</cell></row><row><cell>strategy</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="3">knapsack-based scheduling</cell><cell>Rahbari et al.[37]</cell><cell>Energy consumption , network usages</cell><cell cols="2">improvements 1.17% in the energy consumption by18%, network usage by</cell><cell>iFogSim</cell></row><row><cell cols="3">Integer Non-linear Programming</cell><cell>Zahaf et al.[38]</cell><cell>Energy efficiency ,Response time</cell><cell cols="2">Increased response time efficiency and reduced energy</cell><cell>Matlab</cell></row><row><cell cols="4">Fog Torch Tool Brogi et al.[39]</cell><cell>Latency , bandwidth and Allocation Resource</cell><cell>Decreased allocation efficient</cell><cell>latency resource ,</cell><cell>Monte Carlo</cell></row></table></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="9.">Acknowledgements</head><p>The authors are thankful to the Lovely Professional University, Jalandhar for providing library and all necessary supports for the research.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<ptr target="https://www1.stratus.com/en-us/lp/gartner-research-zero-touch-edge-computing-issue-2/2019" />
		<title level="m">Zero-touch, edge computing infrastructure for industrial environments</title>
				<imprint/>
		<respStmt>
			<orgName>Gartner Research</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<ptr target="www.Cisco.com" />
		<title level="m">Fog Computing and the Internet of Things: Extend the Cloud to Where the Things Are</title>
				<imprint>
			<date type="published" when="2020">2020</date>
		</imprint>
		<respStmt>
			<orgName>Cisco Systems</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">A survey of fog computing: Concepts, applications and issues</title>
		<author>
			<persName><forename type="first">S</forename><surname>Yi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Li</surname></persName>
		</author>
		<idno type="DOI">10.1145/2757384.2757397</idno>
	</analytic>
	<monogr>
		<title level="m">Proc. Int. Symp. Mob. Ad Hoc Netw. Comput</title>
				<meeting>Int. Symp. Mob. Ad Hoc Netw. Comput</meeting>
		<imprint>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page" from="37" to="42" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">A survey of mobile cloud computing application models</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">U R</forename><surname>Khan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Othman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">A</forename><surname>Madani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">U</forename><surname>Khan</surname></persName>
		</author>
		<idno type="DOI">10.1109/SURV.2013.062613.00160</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Communications Surveys and Tutorials</title>
		<imprint>
			<biblScope unit="volume">16</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="393" to="413" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<ptr target="www.Cisco.com" />
		<title level="m">Fog Computing and the Internet of Things: Extend the Cloud to Where the Things Are</title>
				<imprint>
			<date type="published" when="2016">2016</date>
		</imprint>
		<respStmt>
			<orgName>Cisco Systems</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Improving Quality-of-Service in Cloud/Fog Computing through Efficient Resource Allocation</title>
		<author>
			<persName><forename type="first">S</forename><surname>Akintoye</surname></persName>
		</author>
		<author>
			<persName><surname>Bagula</surname></persName>
		</author>
		<idno type="DOI">10.3390/s19061267</idno>
	</analytic>
	<monogr>
		<title level="j">Sensors</title>
		<imprint>
			<biblScope unit="volume">19</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page">1267</biblScope>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Virtual machine resource allocation for service hosting on heterogeneous distributed platforms</title>
		<author>
			<persName><forename type="first">M</forename><surname>Stillwell</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Vivien</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Casanova</surname></persName>
		</author>
		<idno type="DOI">10.1109/IPDPS.2012.75</idno>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the IEEE International Parallel and Distributed Processing Symposium (IPDPS)</title>
				<meeting>the IEEE International Parallel and Distributed Processing Symposium (IPDPS)</meeting>
		<imprint>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="786" to="797" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">On First Fit Bin Packing for Online Cloud Server Allocation</title>
		<author>
			<persName><forename type="first">X</forename><surname>Tang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Ren</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Cai</surname></persName>
		</author>
		<idno type="DOI">10.1109/IPDPS.2016.42</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE International Parallel and Distributed Processing Symposium (IPDPS)</title>
				<meeting><address><addrLine>Chicago, IL</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2016">2016. 2016</date>
			<biblScope unit="page" from="323" to="332" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Efficient Autoscaling in the Cloud Using Predictive Models for Workload Forecasting</title>
		<author>
			<persName><forename type="first">N</forename><surname>Roy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Dubey</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Gokhale</surname></persName>
		</author>
		<idno type="DOI">10.1109/CLOUD.2011.42</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE 4th International Conference on Cloud Computing</title>
				<meeting><address><addrLine>Washington, DC</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2011">2011. 2011</date>
			<biblScope unit="page" from="500" to="507" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Dynamic Resource Allocation for Shared Data Centers Using Online Measurements</title>
		<author>
			<persName><forename type="first">A</forename><surname>Chandra</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Gong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Shenoy</surname></persName>
		</author>
		<idno type="DOI">10.1007/3-540-44884-5_21</idno>
		<ptr target="https://doi.org/10.1007/3-540-44884-5_21" />
	</analytic>
	<monogr>
		<title level="m">Quality of Service -IWQoS 2003</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">K</forename><surname>Jeffay</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">I</forename><surname>Stoica</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">K</forename><surname>Wehrle</surname></persName>
		</editor>
		<meeting><address><addrLine>Berlin, Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2003">2003</date>
			<biblScope unit="volume">2707</biblScope>
		</imprint>
	</monogr>
	<note>IWQoS 2003</note>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Joint Offloading Decision and Resource Allocation for Mobile Cloud With Computing Access Point</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">H</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Dong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Liang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. IEEE ICASSP</title>
				<meeting>IEEE ICASSP</meeting>
		<imprint>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="3516" to="3520" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<title level="m" type="main">The internet of things how the next evolution of the internet is changing everything</title>
		<author>
			<persName><forename type="first">D</forename><surname>Evans</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2011">2011</date>
			<publisher>Cisco White Pap</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Accelerator Virtualization in Fog Computing: Moving from the Cloud to the Edge</title>
		<author>
			<persName><forename type="first">B</forename><surname>Varghese</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Reano</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Silla</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Cloud Comput</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="28" to="37" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">A survey of fog computing: Concepts, applications and issues</title>
		<author>
			<persName><forename type="first">S</forename><surname>Yi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Li</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. Int. Symp. Mob. Ad Hoc Netw. Comput</title>
				<meeting>Int. Symp. Mob. Ad Hoc Netw. Comput</meeting>
		<imprint>
			<date type="published" when="2015-06">June. 2015</date>
			<biblScope unit="volume">2015</biblScope>
			<biblScope unit="page" from="37" to="42" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">A Review on Fog Computing : Conceptual Live Vm Migration Framework, Issues, Applications and Its Challenges</title>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">Sankara</forename><surname>Rao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Bhavya Sree</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Professor</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol. ©</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">10</biblScope>
			<biblScope unit="page" from="1175" to="1184" />
			<date type="published" when="2018">2018. 2018</date>
		</imprint>
	</monogr>
	<note>IJSRCSEIT</note>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Fog Computing with the Integration of Internet of Things: Architecture, Applications and Future Directions</title>
		<author>
			<persName><forename type="first">H</forename><surname>Wadhwa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Aron</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE Intl Conf on Parallel &amp; Distributed Processing with Applications, Ubiquitous Computing &amp; Communications, Big Data &amp; Cloud Computing, Social Computing &amp; Networking, Sustainable Computing &amp; Communications (ISPA/IUCC/BDCloud/SocialCom/SustainCom)</title>
				<meeting><address><addrLine>Melbourne, Australia</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="987" to="994" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Survey of Fog Computing: Fundamental, Network Applications, and Research Challenges</title>
		<author>
			<persName><forename type="first">M</forename><surname>Mukherjee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Shu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Wang</surname></persName>
		</author>
		<idno type="DOI">10.1109/COMST.2018.2814571</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Communications Surveys &amp; Tutorials</title>
		<imprint>
			<biblScope unit="volume">20</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="1826" to="1857" />
			<date type="published" when="2018">thirdquarter 2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">A Framework of Fog Computing: Architecture, Challenges and Optimization</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">E</forename><surname>Fieldsend</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Min</forename></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="page" from="1" to="10" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">The role of cloudlets in hostile environments</title>
		<author>
			<persName><forename type="first">M</forename><surname>Satyanarayanan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Lewis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Morris</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Simanta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Boleng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Ha</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Pervasive Computing</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="40" to="49" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<monogr>
		<title level="m" type="main">Fog computing and mobile edge cloud gain momentum open fog consortium etsi mec and cloudlets</title>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">I</forename><surname>Klas</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Edge Computing: Vision and Challenges</title>
		<author>
			<persName><forename type="first">W</forename><surname>Shi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Cao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Xu</surname></persName>
		</author>
		<idno type="DOI">10.1109/JIOT.2016.2579198</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Internet of Things Journal</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="637" to="646" />
			<date type="published" when="2016-10">Oct. 2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">The case for vm-based cloudlets in mobile computing</title>
		<author>
			<persName><forename type="first">M</forename><surname>Satyanarayanan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Bahl</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Caceres</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Davies</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE pervasive Computing</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="issue">4</biblScope>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Scalable distributed computing hierarchy: Cloud, fog and dew computing</title>
		<author>
			<persName><forename type="first">K</forename><surname>Skala</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Davidovic</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Afgan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Sovic</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Sojat</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Open Journal of Cloud Computing (OJCC)</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="16" to="24" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<monogr>
		<title level="m" type="main">Fog Computing and the Internet of Things: A Review&quot; Big Data and Cognitive Computing</title>
		<author>
			<persName><forename type="first">Hany</forename><forename type="middle">&amp;</forename><surname>Atlam</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Robert</forename><forename type="middle">&amp;</forename><surname>Walters</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Gary</forename><surname>Wills</surname></persName>
		</author>
		<idno type="DOI">2.10.3390/bdcc2020010</idno>
		<imprint>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Fog computing: Principles, architectures, and applications</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">V</forename><surname>Dastjerdi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Gupta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">N</forename><surname>Calheiros</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">K</forename><surname>Ghosh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Buyya</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Internet of Things: Principle &amp; Paradigms</title>
				<editor>
			<persName><forename type="first">M</forename><surname>Kaufmann</surname></persName>
		</editor>
		<meeting><address><addrLine>USA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Augmented brain computer interaction based on fog computing and linked data</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">K</forename><surname>Zao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">T</forename><surname>Gan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">K</forename><surname>You</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">J R</forename><surname>Méndez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">E</forename><surname>Chung</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Tewang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Mullen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">P</forename><surname>Jung</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceeding of the International Conference on Intelligent Environments (IE)</title>
				<meeting>eeding of the International Conference on Intelligent Environments (IE)</meeting>
		<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="374" to="377" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">Fog computing security: a review of current applications and security solutions</title>
		<author>
			<persName><forename type="first">S</forename><surname>Khan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Parkinson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Qin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Cloud Comput</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="issue">1</biblScope>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Resource Allocation Strategy in Fog Computing Based on Priced Timed Petri Nets</title>
		<author>
			<persName><forename type="first">L</forename><surname>Ni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Jiang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Yan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Yu</surname></persName>
		</author>
		<idno type="DOI">10.1109/JIOT.2017.2709814</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Internet of Things Journal</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="1216" to="1228" />
			<date type="published" when="2017-10">Oct. 2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">An architecture of IoT service delegation and resource allocation based on collaboration between fog and cloud computing</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Alsaffar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">P</forename><surname>Pham</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">S</forename><surname>Hong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">N</forename><surname>Huh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Aazam</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Mob. Inf. Syst</title>
		<imprint>
			<biblScope unit="volume">2016</biblScope>
			<biblScope unit="page" from="1" to="15" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">Studying and Developing a Resource Allocation Algorithm in Fog Computing</title>
		<author>
			<persName><forename type="first">Q</forename><surname>Nguyen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">Truong</forename><surname>Pham</surname></persName>
		</author>
		<idno type="DOI">10.1109/ACOMP.2018.00020</idno>
	</analytic>
	<monogr>
		<title level="m">2018 International Conference on Advanced Computing and Applications (ACOMP)</title>
				<meeting><address><addrLine>Ho Chi Minh City</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="76" to="82" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<analytic>
		<title level="a" type="main">A novel distributed fog-based networked architecture to preserve energy in fog data centers</title>
		<author>
			<persName><forename type="first">Zahra</forename><surname>Pooranian</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Mohammad</forename><surname>Shojafar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Paola</forename><surname>Gabriela Vinueza</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Luca</forename><surname>Naranjo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Mauro</forename><surname>Chiaraviglio</surname></persName>
		</author>
		<author>
			<persName><surname>Conti</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">14 th IEEE International Conference on Mobile Ad Hoc and Sensor Systems</title>
				<meeting><address><addrLine>MASS; Orlando, FL, USA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2017-10-22">2017. October 22-25. 2017</date>
			<biblScope unit="page" from="604" to="609" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b31">
	<analytic>
		<title level="a" type="main">An autonomous resource provisioning framework formassively multiplayer online games in cloud environment</title>
		<author>
			<persName><forename type="first">M</forename><surname>Ghobaei-Arani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Khorsand</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Ramezanpour</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Netw. Comput. Appl</title>
		<imprint>
			<biblScope unit="volume">142</biblScope>
			<biblScope unit="issue">18</biblScope>
			<biblScope unit="page" from="76" to="97" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b32">
	<analytic>
		<title level="a" type="main">Computation Offloading and Resource Allocation in Mixed Fog/Cloud Computing Systems With Min-Max Fairness Guarantee</title>
		<author>
			<persName><forename type="first">J</forename><surname>Du</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Zhao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Feng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Chu</surname></persName>
		</author>
		<idno type="DOI">10.1109/TCOMM.2017.2787700</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Communications</title>
		<imprint>
			<biblScope unit="volume">66</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="1594" to="1608" />
			<date type="published" when="2018-04">April 2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b33">
	<analytic>
		<title level="a" type="main">Recent Advances in Fog Radio Access Networks: Performance Analysis and Radio Resource Allocation</title>
		<author>
			<persName><forename type="first">M</forename><surname>Peng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Zhang</surname></persName>
		</author>
		<idno type="DOI">10.1109/ACCESS.2016.2603996</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="page" from="5003" to="5009" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b34">
	<analytic>
		<title level="a" type="main">A Resources Representation for Resource Allocation in Fog Computing Networks</title>
		<author>
			<persName><forename type="first">A</forename><surname>Abouaomar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Cherkaoui</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kobbane</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">A</forename><surname>Dambri</surname></persName>
		</author>
		<idno type="DOI">10.1109/GLOBECOM38437.2019.9014146</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE Global Communications Conference (GLOBECOM)</title>
				<meeting><address><addrLine>Waikoloa, HI, USA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">2019. 2019</date>
			<biblScope unit="page" from="1" to="6" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b35">
	<monogr>
		<title level="m" type="main">Zenith: Utility-Aware Resource Allocation for Edge Computing</title>
		<author>
			<persName><forename type="first">Jinlai</forename><forename type="middle">&amp;</forename><surname>Xu</surname></persName>
		</author>
		<author>
			<persName><surname>Palanisamy</surname></persName>
		</author>
		<author>
			<persName><surname>Balaji</surname></persName>
		</author>
		<author>
			<persName><surname>Ludwig</surname></persName>
		</author>
		<author>
			<persName><surname>Heiko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Qingyang</forename><surname>Wang</surname></persName>
		</author>
		<idno type="DOI">10.1109/IEEE.EDGE.</idno>
		<imprint>
			<date type="published" when="2017">2017. 2017</date>
			<biblScope unit="volume">15</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b36">
	<analytic>
		<title level="a" type="main">Scheduling of fog networks with optimized knapsack by symbiotic organisms search</title>
		<author>
			<persName><forename type="first">Dadmehr</forename><surname>Rahbari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Mohsen</forename><surname>Nickray</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">21 st Conference of Open Innovations Association, FRUCT 2017</title>
				<meeting><address><addrLine>Helsinki,Finland</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2017-10">November 6-10. 2017</date>
			<biblScope unit="page" from="278" to="283" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b37">
	<analytic>
		<title level="a" type="main">Energyefficient scheduling for moldable real-time tasks on heterogeneous computing platforms</title>
		<author>
			<persName><forename type="first">H.-E</forename><surname>Zahaf</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">E H</forename><surname>Benyamina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Olejnik</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Lipari</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Systems Architecture</title>
		<imprint>
			<biblScope unit="volume">74</biblScope>
			<biblScope unit="page" from="46" to="60" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b38">
	<analytic>
		<title level="a" type="main">How to best deploy your fog applications, probably</title>
		<author>
			<persName><forename type="first">Antonio</forename><surname>Brogi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Stefano</forename><surname>Forti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ahmad</forename><surname>Ibrahim</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">1st IEEE International Conference on Fog and Edge Computing, ICFEC 2017</title>
				<meeting><address><addrLine>Madrid, Spain</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2017">May 14-15. 2017</date>
			<biblScope unit="page" from="105" to="114" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b39">
	<analytic>
		<title level="a" type="main">A comparative analysis of resource allocation schemes for real-time services in high-performance computing systems</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">S</forename><surname>Qureshi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">B</forename><surname>Qureshi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Fayaz</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Distributed Sensor Networks</title>
		<imprint>
			<date type="published" when="2020-08">August 2020</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
