Beruflich Dokumente
Kultur Dokumente
Proposed by Mr. Hugues M. KAMDJOU & Mr. SOP DEFFO Lionel Landry | .
School year 2018-2019/ Second semester/ FET / Computer Engineering
Proposed by Mr. Hugues M. KAMDJOU & Mr. SOP DEFFO Lionel Landry | .
School year 2018-2019/ Second semester/ FET / Computer Engineering
Proposed by Mr. Hugues M. KAMDJOU & Mr. SOP DEFFO Lionel Landry | .
School year 2018-2019/ Second semester/ FET / Computer Engineering
Although some novel studies exist guiding the smart grid challenges, however, unfortunately,
they are not addressing the issues in the context of Industry 4.0. The SGI 4.0 paradigm offers
a platform, vision, and architecture of high-quality EGD in the smart grid. The key principals
behind the SGI 4.0 include decentralization, virtualization, real-time capability, service
orientation, modularity, and interoperability. While the fundamental characteristics of SGI 4.0
are data integration, flexible adaptation, secures communication, intelligent self-organizing,
optimization, electricity generation process, service orientation and interoperability. The SGI
4.0 decreases the average energy production price by improving the cost situation of the smart
grid for economic benefits, i.e., the ‗‗Moore‘s Law‘‘. Moreover, SGI 4.0 will provide
environment friendly, high quality, and competitive power generation solutions by using
renewable energy resources. Thus, electricity generation systems (EGSs) to meet varying
energy demands, especially during peak hours will be adaptable, more robust, flexible,
scalable and reliable to deal with customer demands. In SGI 4.0, the control centers, the
transmission infrastructures, and the substations are believed to interact and monitor the
electric devices remotely, employ novel technologies and services to improve the power
quality and to coordinate with their local devices in real-time and selfconsciously manner to
reduce lead times. A fundamental architecture of smart grid in the context of Industry 4.0 is
shown in Fig. 12.
Fig. 12. Shows the basic communication and services architecture for smart grid in the 4
context of Industry 4.0.
Proposed by Mr. Hugues M. KAMDJOU & Mr. SOP DEFFO Lionel Landry | .
School year 2018-2019/ Second semester/ FET / Computer Engineering
e) Sustainability of SG
In SGI 4.0, the smart grid systems are capable of collecting data, communicate with
computers for analyzing it and give advice on it to the operator for necessary actions. This
self-cognition, selfoptimization, and self-customization of the SGI 4.0 will enable different
systems of the power grid to operate independently or with less human interventions for high-
quality electricity.
f) Role of information and communication technologies in SG
To this end, the role of ubiquitous information and emerging ICTs infrastructure is very
important for the realization of SGI 4.0. In SGI 4.0, the key aim of ICTs is to build a highly
reliable and flexible communication infrastructure and allow protocols to enable real-time
interactions between producers and consumers in the smart grid. Moreover, in SGI 4.0, all
interconnected power generation and consumer systems through the continuous and the
autonomous exchange of information and data, cooperate closely to realize a digital and
intelligent smart grid.
g) Human role and job opportunities in SG
In SGI 4.0, though industrial processes are more automated, the human still continues to have
a central role to improve real-time grid performance in terms of power quality, productivity,
efficiency, and security. Therefore, it is important that workers and engineers need to improve
their social, professional, personal and methodical competences to achieve higher power
generation efficiency with less cost and fewer resources consumption.
5.2. Quality of service requirements and applications in SG
In SG various types of information from power generation to consumer applications with
different QoS requirements are efficiently moved through the advanced ICTs. It is expected
that by enabling various SG applications will result in the increasing data quantity unit from
Megabyte, Gigabyte, and Terabyte to Petabyte. This massive amount of data from the source
towards destination must be transferred in QoS manner. Hence interoperable, secure and
flexible bi-directional networking technologies that meet each SG component QoS
requirements are essential for the successful realization of SGI 4.0. Table 3 shows the QoS
requirements for various SG applications. In this study, we have highlighted below some of
the basic quantitative and qualitative requirements must be satisfied by the ICTs infrastructure
in a variety of SG applications in SGI 4.0. 5
Proposed by Mr. Hugues M. KAMDJOU & Mr. SOP DEFFO Lionel Landry | .
School year 2018-2019/ Second semester/ FET / Computer Engineering
Throughput
Proposed by Mr. Hugues M. KAMDJOU & Mr. SOP DEFFO Lionel Landry | .
School year 2018-2019/ Second semester/ FET / Computer Engineering
Throughput is the sum of data transferred between smart grid components in a specific time
interval. Throughput used by the SG for communication depends on the application
characteristics. For instance, the throughput required by the SG for AMI or DR
communication is different from the WASA or TLM.
Reliability
Reliability is an attribute defines how successfully communication systems timely exchange
messages according to its specifications. Therefore, it is extremely important that the
communication nodes always be reliable for successful and timely message exchanges in the
SG. The reliability based on the specifications varies in the SG applications.
b) Qualitative requirements
Data accuracy
Data accuracy is an essential data quality index that is directly related to the accuracy of the
SG components. The data accuracy has an impact on the applications efficiency, performance
and economic benefits.
Data validity
It is an important factor showing that how to retrieve useful information from the massive
ocean of data coming from different SG components. In order to provide various services to
customers in a more efficient manner, this data validity should be improved.
Accessibility
It means the customers must be offered equal opportunities to access SG application services
without discrimination.
Interoperability
It is obvious that various types of communication technologies and protocols will be
combined to provide efficient data exchange between diverse SG components. Therefore, the
interoperability is essential in both networks and SG applications for guaranteeing standard
data exchange with the same meaning.
Security
5.3. The Future of Smart Grid Technologies - UC Riverside
To protect the critical data from physical and cyber security attacks is one of the biggest
issues in the SG. In all SG applications, the end-to-end secure two-way communication is
essential for preventing any vulnerability to SG assets. 7
Since the early stage of electricity development, network designs have relied on demand
forecasting, thus allowing the sizing of:
Proposed by Mr. Hugues M. KAMDJOU & Mr. SOP DEFFO Lionel Landry | .
School year 2018-2019/ Second semester/ FET / Computer Engineering
Proposed by Mr. Hugues M. KAMDJOU & Mr. SOP DEFFO Lionel Landry | .
School year 2018-2019/ Second semester/ FET / Computer Engineering
with their 2050 vision, using a back-casting approach, but without an explicit modelling of an
offshore grid.
5.4. Future Concerns of Electricity Systems Worldwide
Transmission networks will have to cope with more uncertainties at all levels (macro-
economic growth, generation and consumption patterns, new power technologies) while
enabling energy players complying with energy policies set at governmental levels. This
requires transmission system operators (TSOs) to simultaneously support the efficient use of
existing transmission infrastructures and the implementation of new efficient infrastructure
investments. Electricity systems will thus progressively evolve as explained in Table 4. (Fig.
13).
Proposed by Mr. Hugues M. KAMDJOU & Mr. SOP DEFFO Lionel Landry | .
School year 2018-2019/ Second semester/ FET / Computer Engineering
research and development (R&D) on planning techniques to take into account several
irreversible trends.
5.4. ICT opportunities in future Smart Grids
Development of ―Smart grid‖ present one of global priority with numerous of
benefits, which has to be supported and promote by leading industries and governments
institutions. Information and Communication Technologies (ICT) sector has to play important
role because of development of modern telecommunication.
Example of ICT using is to empower today‘s power grid with the capability of supporting
two-way energy and information flow, facilitating the integration of renewable energy into the
grid and empowering the consumer with tools for optimizing energy consumption and costs.
Some of benefits are reduce peak demand, lower energy consumption, etc. In this paper is
present integration of ICT into the traditional power distribution infrastructure, development
and implementation of topics necessary for efficient management of the smart grid network,
and smart grid architecture.
The other example is, to use renewable energy sources on telecom sites, which are element of
smart grid. In telecommunication, in nowdays, the renewable energy sources, because of the
high cost for Wh, are generally used in remote areas where the public mains is unavailable.
Most of the world‘s electricity system was built when primary energy was relatively
inexpensive. Grid reliability was mainly ensured by having excess capacity in the system,
with unidirectional electricity flow to consumers from centrally dispatched power plants.
Investments in the electric system were made to meet increasing demand—not to change
fundamentally the way the system works. While innovation and technology have dramatically
transformed other industrial sectors, the electric system, for the most part, has continued to
operate the same way for decades. This lack of investment, combined with an asset life of 40
or more years, has resulted in an inefficient and increasingly unstable system. For modern
smart grid new architectures has do be desing. Requirements for smart grid are significant
different, comparing to ―old fashion‖ electricity system. These changes require a new, more
intelligent system that can manage the increasingly complex electric grid. The electrification
of the transportation system and the increasing reliance on renewable resources will require
new models for such loads and generators, new architecture for their efficient and secure
interactions through the cyber-physical infrastructure. New architectures also has to allow to
10
broker in real time the flexible smart loads demand while incorporating increasing volatility in
the energy provision, associated with green energy sources and decentralized generation.
Proposed by Mr. Hugues M. KAMDJOU & Mr. SOP DEFFO Lionel Landry | .
School year 2018-2019/ Second semester/ FET / Computer Engineering
In smart grid, different user can be involved in energy ―delivering‖ to the grid. The basic
prerequisites imposed to power systems are related to their safety, long life and
uninterruptible power.
An example of telecom hybrid power system as element of smart grid architecture is given in
Fig. 14.
manufacturing devices and equipment in a physical production space, and the internet of
Proposed by Mr. Hugues M. KAMDJOU & Mr. SOP DEFFO Lionel Landry | .
School year 2018-2019/ Second semester/ FET / Computer Engineering
things (IoT), a much broader term for a new reality where nearly everything we use has a chip
inside it connecting it to the global internet.
The Internet technology has undergone enormous changes since its early stages and it has
become an important communication infrastructure targeting anywhere, anytime connectivity.
Historically, human-to-human (H2H) communication, mainly voice communication, has been
the center of importance. Therefore, the current network protocols and infrastructure are
optimized for human-oriented traffic characteristics. Lately, an entirely different paradigm of
communication has emerged with the inclusion of "machines" in the communications
landscape. In that sense, machines/devices that are typically wireless such as sensors,
actuators, and smart meters are able to communicate with each other exchanging information
and data without human intervention. Since the number of connected devices/machines is
expected to surpass the human-centric communication devices by tenfold, machine-to-
machine (M2M) communication is expected to be a key element in future networks. With the
introduction of M2M, the next generation Internet or the Internet-of-Things (IoT) has to offer
the facilities to connect different objects together whether they belong to humans or not.
6.1. Next Generation M2M Cellular Networks: Challenges and Practical
Considerations
The ultimate objective of M2M communications is to construct comprehensive connections
among all machines distributed over an extensive coverage area. Recent reports show that the
projected number of connected machines/devices to the IoT will reach approximately 50
billions by 2020 (Fig. 15). This massive introduction of communicating machines has to be
planned for and accommodated with applications requiring wide range of requirements and
characteristics such as mobility support, reliability, coverage, required data rate, power
consumption, hardware complexity, and device cost. Other planning and design issues for
M2M communications include the future network architecture, the massive growth in the
number of users, and the various device requirements that enable the concept of IoT. In terms
of M2M, the future network has to provide machine requirements as power and cost are
critical aspects of M2M devices. For instance, a set-and-forget type of application in M2M
devices such as smart meters require very long battery life where the device has to operate in
an ultra low-power mode. Moreover, the future network should allow for low complex and
low data rate communication technologies which provide low cost devices that encourage the 12
large scale of the IoT. The network architecture, therefore, needs to be flexible enough to
provide these requirements and more. In this regard, a considerable amount of research has
Proposed by Mr. Hugues M. KAMDJOU & Mr. SOP DEFFO Lionel Landry | .
School year 2018-2019/ Second semester/ FET / Computer Engineering
been directed towards available network technologies such as Zigbee (IEEE 802.15.4) or
WiFi (IEEE 802.11b) by interconnecting devices in a form of large heterogeneous network.
Furthermore, solutions for the heterogeneous network architecture (connections, routing,
congestion control, energy-efficient transmission, etc.) have been presented to suit the new
requirements of M2M communications. However, it is still not clear whether these
sophisticated solutions can be applied to M2M communications due to constraints on the
hardware complexity.
Fig.15. Expected number of connected devices to the Internet. This chart is obtained from
recent reports developed by both Cisco and Ericsson. The reports discuss the expected growth
in the number of connected devices by 2020 due to the introduction of the M2M market.
With the large coverage and flexible data rates offered by cellular systems, research efforts
from industry have recently been focused on optimizing the existing cellular networks
considering M2M specifications. Among other solutions, scenarios defined by the 3rd
Generation Partnership Project (3GPP) standardization body emerge as the most promising
solutions to enable wireless infrastructure of M2M communications. In this front, a special
category that supports M2M features has been incorporated by the 3GPP to Long-Term-
Evolution (LTE) specifications. Due to the M2M communication challenges and the wide
range of supported device specifications, developing the features for M2M communication, 13
also refers to machine-type-communication (MTC) in the context of LTE, started as early as
release 10 (R10) for the advanced LTE standard. This continued to future releases including
Proposed by Mr. Hugues M. KAMDJOU & Mr. SOP DEFFO Lionel Landry | .
School year 2018-2019/ Second semester/ FET / Computer Engineering
release 13 (R13) that is currently developed and expected to be released in 2016. For these
reasons, in this article, we will focus on the cellular MTC architecture based on the LTE
technology as a key enabler with wide range of MTC support.
Due to the radical change in the number of users, the network has to carefully utilize the
available resources in order to maintain reasonable quality-of-service (QoS). Generally, one
of the most important resources in wireless communications is the frequency spectrum. To
support larger number of connected devices in the future IoT, it is likely to add more degrees
of freedom represented in more operating frequency bands. However, the frequency spectrum
is currently scarce and requiring additional frequency resources makes the problem of
supporting this massive number of devices even harder to solve. In fact, this issue is
extremely important especially for the cellular architecture since the spectrum scarcity
problem directly influences the reliability and the QoS offered by the network. To overcome
this problem, small cell design, interconnecting the cellular network to other wireless
networks, and cognitive radio (CR) support are three promising solutions.
6.2. Machine-to-Machine (M2M) Communications in Vehicular
Networks
When two electronic systems communicate autonomously, that is to say without human
intervention, the process is described as Machine-to-Machine (M2M) communications. The
main goal of M2M communications is to enable the sharing of information between electronic
systems autonomously. Due to the emergence and rapid adoption of wireless technologies, the
ubiquity of electronic control systems, and the increasing complexity of software systems,
wireless M2M has been attracting a lot of attention from industry and academia.
M2M communications include wired communications, but recent interest has focused on
wireless M2M communications. Moreover, the number of wireless devices (not including
mobile phones) which operate without human interaction (e.g. weather stations, electricity
meters, point of sales devices), is expected to grow to 1.5 billion by 2014.
Recent research efforts on M2M communications have investigated areas that include
network energy efficiency and green networking, the tradeoff between device power
consumption and device intelligence or processing power, standardization of communications,
data aggregation and bandwidth, privacy and security, and network scalability.
Although "M2M architecture" can technically refer to any number of machines 14
communicating (e.g. based on the fairly broad definition given by the European
Telecommunications Standards Institute, ETSI), it is generally accepted that M2M principles
Proposed by Mr. Hugues M. KAMDJOU & Mr. SOP DEFFO Lionel Landry | .
School year 2018-2019/ Second semester/ FET / Computer Engineering
apply particularly well to networks where a large number of machines is used, even up to the
1.5 billion wireless devices of the future. This means that when an M2M application is
discussed, it is generally presented on a national or global scale with a multitude of sensors
that are centrally coordinated. Consequently, when we evaluate a vehicular network as a type
of M2M architecture, this evaluation is done for a large-scale network that potentially has
many other devices connected to it, some of which may not be related to vehicular networks.
In this work we explore how vehicular networks can leverage the M2M paradigm to support
vehicular communications. We present a brief overview of some of the most recent
application areas of M2M, namely smart grid technology, home networking, health care, and
vehicular networking. The M2M network communication layers in a vehicular network are
then explored. We identify five fundamental M2M concepts that have been reported in the
literature to address vehicular communication challenges, such as the support for large-scale
deployment of devices, cross-platform networking, autonomous monitoring and control,
visualization of the system, and security.
Several research efforts have been investigating M2M communications support for vehicular
networks. In a vehicular network, vehicles communicate with other vehicles (Vehicle-to-
Vehicle (V2V)) or with an infrastructure (Vehicle-to-Infrastructure (V2I)). Applications for
vehicular networks can be divided into four broad categories, namely safety and collision
avoidance, traffic infrastructure management, vehicle telematics, and entertainment services
and Internet connectivity.
For the most part, previous vehicular network research has focused on point-to-point
communications or support for a limited set of vehicles. From a network architecture point of
view, this focus constitutes a bottom-up approach, where focus is initially placed on
developing routing protocols, PHYsical layer (PHY), Medium Access Control (MAC) layer,
and broadcasting. M2M networks use centralized and autonomous monitoring, and control of
data-collecting devices that are spatially distributed, using a hierarchical top-down approach.
The M2M paradigm can therefore improve vehicular networks' capacity to support features
such as cross-platform networking, autonomous monitoring and control, and visualization of
the devices and information in the M2M network. Given the potential that M2M holds for
vehicular networks, we focus on M2M communications for vehicular networks in this work.
15
To explain how vehicular networks are used, and to better understand the benefits of M2M
vehicular networks, four application areas for vehicular networking are presented below.
Proposed by Mr. Hugues M. KAMDJOU & Mr. SOP DEFFO Lionel Landry | .
School year 2018-2019/ Second semester/ FET / Computer Engineering
Proposed by Mr. Hugues M. KAMDJOU & Mr. SOP DEFFO Lionel Landry | .
School year 2018-2019/ Second semester/ FET / Computer Engineering
Proposed by Mr. Hugues M. KAMDJOU & Mr. SOP DEFFO Lionel Landry | .
School year 2018-2019/ Second semester/ FET / Computer Engineering
is not sufficient, because it will be impossible to take into account all future demands. In
consequence even a completely new designed future Internet will be subject to ongoing
evolution. This demand can not be achieved by a single component or protocol, but must be
supported by a new architecture that defines the fundamental organization of a system, the
relationship of components, and design and evolution principles according to. Especially the
definition of evolutionary principles allowing deliberate extensions and replacement of
functionality are important to avoid an architectural patchwork similar to today‘s Internet.
In order to enable evolution of network functionality in large scale networks it must be
possible to change functionality of an individual system (network node) and in addition there
must be concepts and methods to handle the resulting heterogeneity. The heterogeneity will
be inevitable, as in large scale networks it is not possible to synchronize changes because of
technical, logistic and even political constraints. We expect that achieving both goals will be
the key for a flexible network architecture that is able to evolve.
Developing concepts and techniques for more flexible networks have been a research topic
since many years now, but with varying focuses. In the 90‘s, there have been several
publications about automatic protocol configuration based on micro-protocols. Examples of
these are the ―Dynamic Network Architecture‖, DaCaPo and FuKSS. All these approaches
compose complex protocols using micro-protocols. In our approach we also use micro-
protocols, but use more abstract descriptions and different methods for composing and
controlling interactions of protocols.
7.2. New Framework and Protocol for Future Networking Applications
Today‘s Internet has been a massive success, providing connectivity for a wide variety of
applications on a planetary scale. However, in recent years a number of new trends have
begun to emerge that indicate fundamental shifts in requirements that future networks will
need to be able to address and that will require pushing the boundaries of today‘s Internet
technology. The same trends also point to new possibilities and business opportunities that
can be unleashed by technology that meets those new challenges. These trends include the
need for ever more ambitious service level guarantees for applications such as networked
Virtual or Augmented Reality (VR/AR), Tactile Internet, or Industrial Internet. Another trend
concerns the increasing need for abilities that allow to adapt and customize adapt network
behavior to particular applications and deployments, not just by vendors or operators but by 18
applications and end users. Other trends include the emergence of private networks that move
contents and data ever-closer to users, as well as the need for greatly simplified network
operations.
Proposed by Mr. Hugues M. KAMDJOU & Mr. SOP DEFFO Lionel Landry | .
School year 2018-2019/ Second semester/ FET / Computer Engineering
Fundamentally, many of these trends are putting the best-effort nature of today‘s Internet to
the test, as they point towards the need for high-precision networks: high precision in terms of
service level guarantees that can be given, in terms of packet loss that is avoided, in the way
resources are being allocated and accounted for, and in terms of behavior that is custom-
guided by the needs of individual services and applications as opposed to being determined by
best-effort principles. While incremental and fragmented technologies are emerging that cater
to different aspects and use cases for each of these trends, what has been lacking so far is a
comprehensive, holistic approach that rethinks how networking services are provided. This is
what Big Packet Protocol (BPP) delivers.
BPP is a novel approach to packet-based networking, intended to address the limitations
current internetworking technology is faced with. It introduces a new protocol, BPP, as well
as the framework to support it. BPP introduces the concept of a BPP Block, a block of data
that is carried as part of data packets in addition to header information and user payload. This
data includes metadata as well as commands that collectively provide guidance to nodes in the
network for how to handle packets and flows. BPP Blocks can be injected or stripped at the
edge of a network to interwork seamlessly with existing network technology. BPP does not
commit to a particular ―host protocol‖; it can be used at Layer 3 with IPv6 or IPv4 or even at
Layer 2.
BPP allows networking services to be programmed from the edge of the network by
information carried in packets and flows without requiring access to a network provider‘s
control plane, without need for administrative access to network devices to reprogram them,
and without dependency on lengthy product development or standardization cycles. This
programming occurs at the level of the individual packet and flow. BPP packets can affect
their own behavior and that of their flow but not the behavior of other packets or flows, in
similar ways as tenants in a cloud can program only their own virtual resources and not those
of other tenants. BPP consists of four cornerstones:
The BPP protocol itself defines how packets carry information that guides their
processing;
BPP stateful extensions involving so-called statelets allow packets to retain and
interact with state in the network;
BPP infrastructure provides the on-device execution environment for packet
19
commands and statelets;
BPP network operations provide the functionality required to safely deploy, monitor,
and run BPP applications.
Proposed by Mr. Hugues M. KAMDJOU & Mr. SOP DEFFO Lionel Landry | .
School year 2018-2019/ Second semester/ FET / Computer Engineering
Proposed by Mr. Hugues M. KAMDJOU & Mr. SOP DEFFO Lionel Landry | .
School year 2018-2019/ Second semester/ FET / Computer Engineering
techniques, permits services to be consumed now in a variety of wireless and wireline networks such
as ADSL, WLAN, or UMTS. Hence, the transition from single network-centric services to
application-centric multi- network services has occurred, cf. Fig. 17.
Proposed by Mr. Hugues M. KAMDJOU & Mr. SOP DEFFO Lionel Landry | .
School year 2018-2019/ Second semester/ FET / Computer Engineering
participation. Edge nodes should be enabled to form overlays of coordinated communities. They
require mechanisms to define overlays with application specific name spaces, routing and self-
organizing procedures for topology and resource management, cf. Fig.18.
Proposed by Mr. Hugues M. KAMDJOU & Mr. SOP DEFFO Lionel Landry | .
School year 2018-2019/ Second semester/ FET / Computer Engineering
computing comes into play. The term fog computing was coined by Cisco. It is a new
technology that provides many benefits to different fields, especially the IoT. Similar to the
Proposed by Mr. Hugues M. KAMDJOU & Mr. SOP DEFFO Lionel Landry | .
School year 2018-2019/ Second semester/ FET / Computer Engineering
cloud, fog computing provides services to IoT users such as data processing and storage. Fog
computing is based on providing data processing capabilities and storage locally to fog
devices instead of sending them to the cloud. Both the cloud and fog provide storage,
computing and networking resources.
8.1. Emerging Trends in Cloud Computing, Big Data, Fog Computing,
IoT
The integration of the cloud with the IoT, known as CoT, has many benefits. For instance, it
helps to manage IoT resources and provides more cost-effective and efficient IoT services. In
addition, it simplifies the flow of the IoT data and processing and provides quick, low-cost
installation and integration for complex data processing and deployment.
The CoT paradigm is not straight forward, it also introduces new challenges to the IoT system
that cannot be addressed by the traditional centralized cloud computing architecture, such as
latency, capacity constraints, resource-constrained devices, network failure with intermittent
connectivity and enhanced security
In addition, the centralized cloud approach is not appropriate for IoT applications where
operations are time-sensitive, or Internet connectivity is poor. There are many scenarios
where milliseconds can have serious significance, such as telemedicine and patient care. This
is the same scenario for vehicle-to-vehicle communications, where avoiding collisions or
accidents cannot tolerate the latency caused by the centralized cloud approach. Therefore, an
advanced cloud computing paradigm that improves the capacity and latency constraints is
required to handle these challenges. Cisco suggested new technology called fog computing to
address most of these challenges.
8.2. Big Data and Fog Computing
Fog computing is a paradigm with limited capabilities such as computing, storing and
networking services in a distributed manner between different end devices and classic cloud
computing. It provides a good solution for IoT applications that are latency-sensitive.
Although the term was originally coined by Cisco, fog computing has been defined by many
researchers and organizations from a number of different perspectives.
These tasks can be for supporting basic network functions or new services and applications
that run in a sandboxed environment. Users leasing part of their devices to host these services
get incentives for doing so‖. Fog computing is also defined by the OpenFog Consortium as; ―a 24
system-level horizontal architecture that distributes resources and services of computing,
storage, control and networking anywhere along the continuum from Cloud to Things‖.
Proposed by Mr. Hugues M. KAMDJOU & Mr. SOP DEFFO Lionel Landry | .
School year 2018-2019/ Second semester/ FET / Computer Engineering
Fig.19. Fog computing is an extension of the cloud but closer to end devices
8.3. Future Internet applications in IoT
The Internet of Things (IoT) provides connectivity for anyone at any time and place to
anything at any time and place. With the advancement in technology, we are moving towards
a society, where everything and everyone will be connected. The IoT is considered as the
future evaluation of the Internet that realizes machine-to-machine (M2M) learning. The basic
idea of IoT is to allow autonomous and secure connection and exchange of data between real
world devices and applications. The IoT links real life and physical activities with the virtual
world.
The numbers of Internet connected devices are increasing at the rapid rate. These devices 25
include personal computers, laptops, tablets, smart phones, PDAs and other hand-held
embedded devices. Most of the mobile devices embed different sensors and actuators that can
Proposed by Mr. Hugues M. KAMDJOU & Mr. SOP DEFFO Lionel Landry | .
School year 2018-2019/ Second semester/ FET / Computer Engineering
sense, perform computation, take intelligent decisions and transmit useful collected
information over the Internet. Using a network of such devices with different sensors can give
birth to enormous amazing applications and services that can bring significant personal,
professional and economic benefits.
The Internet has tremendously evolved in the last few years connecting billions of things
globally. These things have different sizes, capabilities, processing and computational power
and support different kind of applications. Thus, the traditional Internet merges into smart
future Internet, called IoT. The generic scenario of IoT is shown in Fig. 20. The IoT connects
real world objects and embeds the intelligence in the system to smartly process the object
specific information and take useful autonomous decisions. Thus, IoT can give birth to
enormous useful applications and services that we never imagined before. With the
advancement in technology, the devices processing power and storage capabilities
significantly increased while their sizes reduced.
sensory and intelligent manner. Fig. 21 shows basic IoT system implementing different type
of applications or services. The things connect and communicate with other things that
Proposed by Mr. Hugues M. KAMDJOU & Mr. SOP DEFFO Lionel Landry | .
School year 2018-2019/ Second semester/ FET / Computer Engineering
implement the same service type. The basic simplified workflow of IoT can be described as
follows:
Object sensing, identification and communication of object specific information. The
information is the sensed data about temperature, orientation, motion, vibration,
acceleration, humidity, chemical changes in the air depending on the type of sensors.
A combination of different sensors can be used for the design of smart services.
Trigger an action. The received object information is processed by a smart
device/system that then determines an automated action to be invoked.
The smart device/system provide rich services and includes a mechanism to provide
feedback to the administrator about the current system status and the results of actions
invoked.
Conclusion
In this course, we learned definitions of network analysis, architecture, and design; the
importance of network analysis in understanding the system and providing a defensible
architecture and design; and the model for the network analysis, architecture, and design
processes. The integration and convergence of traditional telecommunication networks and
the Internet is realized with the standardization of the Next Generation Network (NGN)
concept by ITU‐T. However, the NGN is not something that happens in a given moment of
time, but it is an ongoing process, an umbrella of principles and recommendations for synergy
of different existing and future technologies, which grows and adapts to the continuously 27
changing environment regarding the technologies as well as business and regulation aspects.
Finally, migration to NGN and future networks brings many challenges to network and
Proposed by Mr. Hugues M. KAMDJOU & Mr. SOP DEFFO Lionel Landry | .
School year 2018-2019/ Second semester/ FET / Computer Engineering
service providers, telecommunications and media regulators, equipment vendors, and other
related business segments, but at the same it provides endless possibilities for rapid
innovation of new networks, protocols and services.
Bibliography:
1. Future Networks: Architectures, Protocols, and Applications, IEEE access, 2017
2. Richard Li et al. New Framework and Protocol for Future Networking Applications,
Proceedings of the 2018 Workshop on Networking for Emerging Applications and
Technologies Pages 21-23
3. Abdelmohsen Ali, Walaa Hamouda, and Murat Uysal:Next Generation M2M Cellular
Networks:Challenges and Practical Considerations, arXiv, 20 June 2015
4. Raul Aquino-Santos, Víctor Rangel-Licea and Arthur Edwards Block Emerging
Technologies in Wireless Ad-hoc Networks: Applications and Future Development,
IGI Global's Online Bookstore 2010
5. Alrawais, A.; Alhothaily, A.; Hu, C.; Cheng, X. Fog Computing for the Internet of
Things: Security and Privacy Issues. IEEE Internet Comput. 2017, 21, 34–42.
[CrossRef]
28
Proposed by Mr. Hugues M. KAMDJOU & Mr. SOP DEFFO Lionel Landry | .