FOG-CLOUD-STRATEGIES OF DYNAMIC TELECOMMUNICATION NETWORKS MANAGEMENT
DOI:
https://doi.org/10.20535/2411-2976.22020.74-80Keywords:
FOG-Cloud infrastructure.Abstract
Background. Providing so called critical systems with reliable telecommunication service, and timely quality information by means of utilizing wireless sensor networks with mobile sensors, land telecommunication nodes, their efficient management along with simultaneous assurance of structural and functional connectivity of mobile sensors in response to their fast and unpredictable movement. Thus, such the methods development is challenging, that will allow dynamic network management on channel and network levels of OSI model, at the same time having the specified connectivity, operation time, service quality, information security enabled.
Objective. The purpose of the paper is description of the possible intellectualization strategies of high-performance sensor networks management based on utilization of dynamic telecommunication networks (DTCN) and computing FOGCloud infrastructure to increase performance, reliability, timeliness of information provisioning to critical systems functioning process and critical infrastructure components.
Methods. Alternative application strategies are synthesized concerning analysis of both the dynamic telecommunication network characteristics and dedicated FOG-Cloud-infrastructure configurations. DTCN control methodology is based on the fundamental automatic control theory tailored to DTCN objects.
Results. The paper studies the matters of alternative DTCN control utilization strategies in the form of the hybrid FOGCloud infrastructure generic control model and its adaptation method specifications to increase performance and reliability of dynamic telecommunication networks.
Conclusions. FOG technology is not an alternative to the Cloud infrastructure. In fact, FOG-infrastructure objects cooperate productively with Cloud infrastructure, especially in administration and data analysis, and such a collaboration generates the new application class. FOG networks distribute Cloud’s intelligence down to network upper edge. So called data processing authority delegation takes place from aggregated cloud down to network peripheral.
References
Chebotareva D.V. Optimization of topology
transmission network mobile communication with taking
into account conflicting quality parameters // Herald of
Lviv Polytechnic National University, Series of Radio
Electronics and Telecommunication – 2013. – № 766. –
pp. 124 – 131. (in Russian)
Uryvsky L.O. Methods and means of ensuring the
throughput and security of information communication
systems in a dynamic environment. / Ensuring functional
security of critical information and control systems. /
Monograph. – Kharkiv: Konstanta, 2019. – 272 p. (in
Ukrainian)
Lysenko Olexandr I. Increasing the efficiency of data
gathering in clustered wireless sensor networks using
UAV / Olexandr I. Lysenko, Miroslav K. Sparavalo,
Olena M. Tachinina, Valerii S. Yavisya and Sergiy
Ponomarenko // Information and telecommunication
sciences. – 2020. - Vol. 11, no. 1. - pp. 59-70. – DOI:
https://doi.org/10.20535/2411-2976.12020.59-70
Roland E. Best. Phase-Locked Loops: Design,
Simulation and Applications (англ.). — 6th. — McGraw-
Hill Education, 2007. (ISBN 978-0-07-149375-8).
Downloads
Published
How to Cite
Issue
Section
License
The ownership of copyright remains with the Authors.
Authors may use their own material in other publications provided that the Journal is acknowledged as the original place of publication and National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute” as the Publisher.
ITS articles are published under Creative Commons licence:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under CC BY 4.0that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.