FOG-CLOUD-STRATEGIES OF DYNAMIC TELECOMMUNICATION NETWORKS MANAGEMENT
Background. Providing so called critical systems with reliable telecommunication service, and timely quality information by means of utilizing wireless sensor networks with mobile sensors, land telecommunication nodes, their efficient management along with simultaneous assurance of structural and functional connectivity of mobile sensors in response to their fast and unpredictable movement. Thus, such the methods development is challenging, that will allow dynamic network management on channel and network levels of OSI model, at the same time having the specified connectivity, operation time, service quality, information security enabled.
Objective. The purpose of the paper is description of the possible intellectualization strategies of high-performance sensor networks management based on utilization of dynamic telecommunication networks (DTCN) and computing FOGCloud infrastructure to increase performance, reliability, timeliness of information provisioning to critical systems functioning process and critical infrastructure components.
Methods. Alternative application strategies are synthesized concerning analysis of both the dynamic telecommunication network characteristics and dedicated FOG-Cloud-infrastructure configurations. DTCN control methodology is based on the fundamental automatic control theory tailored to DTCN objects.
Results. The paper studies the matters of alternative DTCN control utilization strategies in the form of the hybrid FOGCloud infrastructure generic control model and its adaptation method specifications to increase performance and reliability of dynamic telecommunication networks.
Conclusions. FOG technology is not an alternative to the Cloud infrastructure. In fact, FOG-infrastructure objects cooperate productively with Cloud infrastructure, especially in administration and data analysis, and such a collaboration generates the new application class. FOG networks distribute Cloud’s intelligence down to network upper edge. So called data processing authority delegation takes place from aggregated cloud down to network peripheral.
Chebotareva D.V. Optimization of topology
transmission network mobile communication with taking
into account conflicting quality parameters // Herald of
Lviv Polytechnic National University, Series of Radio
Electronics and Telecommunication – 2013. – № 766. –
pp. 124 – 131. (in Russian)
Uryvsky L.O. Methods and means of ensuring the
throughput and security of information communication
systems in a dynamic environment. / Ensuring functional
security of critical information and control systems. /
Monograph. – Kharkiv: Konstanta, 2019. – 272 p. (in
Lysenko Olexandr I. Increasing the efficiency of data
gathering in clustered wireless sensor networks using
UAV / Olexandr I. Lysenko, Miroslav K. Sparavalo,
Olena M. Tachinina, Valerii S. Yavisya and Sergiy
Ponomarenko // Information and telecommunication
sciences. – 2020. - Vol. 11, no. 1. - pp. 59-70. – DOI:
Roland E. Best. Phase-Locked Loops: Design,
Simulation and Applications (англ.). — 6th. — McGraw-
Hill Education, 2007. (ISBN 978-0-07-149375-8).