Energy-Efficient Fog Computing: A Review and Future Directions
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2024, Vol 12, Issue 2
Abstract
Fog computing has emerged as a promising paradigm to meet the increasing demands of latency-sensitive and bandwidth-intensive applications in the era of the Internet of Things (IoT) and edge computing. However, the proliferation of fog nodes introduces significant energy consumption challenges, particularly in resource-constrained environments. This paper presents a comprehensive review of energy-efficient techniques in fog computing, focusing on optimization strategies to minimize energy consumption while meeting application requirements. We categorize existing research efforts based on their approaches, including task scheduling, resource allocation, communication protocols, and energy harvesting techniques. Additionally, we identify key open challenges and propose future research directions to further enhance energy efficiency in fog computing environments.
Authors and Affiliations
Priyanka Vashisht, Shalini Bhaskar Bajaj, and Ashima Narang
Urban Air Computing: For Air Quality Detection
Air pollution is one of the biggest challenges that every metro-political areas is facing today. There are several tools and techniques evolved to predict pollution level which in turn helps in controlling and mitigating...
An Improved Dynamic Round Robin CPU Scheduling Algorithm Using SJF Technique
CPU Scheduling is one of the fundamental concepts of operating system. There exists a number of CPU scheduling algorithms like first come f irst serve, shortest job first scheduling, round robin scheduling, priority sche...
Experimental Study on Light Weight Concrete by Partial Replacement of Cement by Flyash, Coarse Aggregate Pumice Stone and Thermocol Beads
In today’s world when focus is on reducing self-weight of concrete, light weight concrete has come with the high number of applications to reduce self-weight of concrete. In this study an attempt has been made to compare...
Analysis of Cyber Security Threats Using Machine Learning Techniques
Nowadays malware detection is a problem that researchers have tried to solve for so many years by using enormous type of methods. The behaviors of two given malware variants remain similar, although their signatures coul...
Pseudo-Code Attack (PCA) in Software Engineering
Software development has been more important in recent technological advancements in both hardware and software. The creation of scripting languages is critical to the development of software. The development of programm...