Smart Inventory System for Expiry Date Tracking
Volume-7 | Issue-2

Exploiting Vulnerabilities in Weak CAPTCHA Mechanisms within DVWA
Volume-7 | Issue-2

Investigating Process Scheduling Techniques for Optimal Performance and Energy Efficiency in Operating Systems
Volume-6 | Issue-4

Deep Fake Images and Videos Detection using Deep Learning
Volume-7 | Issue-2

AI-Powered Data Interaction: A Natural Language Chatbot for CSV, Excel, and SQL Files
Volume-7 | Issue-1

Gamification in Mobile Apps: Assessing the Effects on Customer Engagement and Loyalty in the Retail Industry
Volume-5 | Issue-4

AI based Identification of Students Dress Code in Schools and Universities
Volume-6 | Issue-1

A Comprehensive Study of Zero-Day Attacks
Volume-5 | Issue-3

Navigating the Cloud: Security, Compliance, and Risk Challenges in SME Adoption
Volume-7 | Issue-3

Review on Sanskrit Sandhi Splitting using Deep Learning Techniques
Volume-6 | Issue-2

AUTOMATION USING IOT IN GREENHOUSE ENVIRONMENT
Volume-1 | Issue-1

Principle of 6G Wireless Networks: Vision, Challenges and Applications
Volume-3 | Issue-4

Classification of Remote Sensing Image Scenes Using Double Feature Extraction Hybrid Deep Learning Approach
Volume-3 | Issue-2

Light Weight CNN based Robust Image Watermarking Scheme for Security
Volume-3 | Issue-2

VIRTUAL REALITY GAMING TECHNOLOGY FOR MENTAL STIMULATION AND THERAPY
Volume-1 | Issue-1

Design of Digital Image Watermarking Technique with Two Stage Vector Extraction in Transform Domain
Volume-3 | Issue-3

Analysis of Natural Language Processing in the FinTech Models of Mid-21st Century
Volume-4 | Issue-3

PROGRESS AND PRECLUSION OF KNEE OSTEOARTHRITIS: A STUDY
Volume-3 | Issue-3

Image Augmentation based on GAN deep learning approach with Textual Content Descriptors
Volume-3 | Issue-3

Comparative Analysis for Personality Prediction by Digital Footprints in Social Media
Volume-3 | Issue-2

Home / Archives / Volume-3 / Issue-4 / Article-5

Volume - 3 | Issue - 4 | december 2021

Effective Workload Allocation in Fog Device based on Power Consumption and Delay Tradeoff
Pages: 290-306
Full Article PDF pdf-white-icon
DOI
10.36548/jitdw.2021.4.005
Published
25 April, 2022
Abstract

Fog computing that emerges as an important paradigm, describes decentralized computing architecture between cloud and devices. It includes potential challenges, such as increase in traffic overhead, since all requests are sent to the main server that causes delay, which cannot be tolerated in delay sensitive applications and the usage of inappropriate scheduling causes high power consumption in fog device. These challenges must be overcome by employing effective workload. In this paper, in order to find effective workload allocation based on power and delay tradeoff various scheduling algorithms like SJF (Shortest Job First), FCFS (First Come First Served) and RR (Round Robin) are implemented in fog device and its power and delay trade off are analyzed in fog computing subsystem.

Keywords

Delay Fog device Power Process Trade-off Workload

×

Currently, subscription is the only source of revenue. The subscription resource covers the operating expenses such as web presence, online version, pre-press preparations, and staff wages.

To access the full PDF, please complete the payment process.

Subscription Details

Category Fee
Article Access Charge
15 USD
Open Access Fee Nil
Annual Subscription Fee
200 USD
After payment,
please send an email to irojournals.contact@gmail.com / journals@iroglobal.com requesting article access.
Subscription form: click here