100% found this document useful (4 votes)
37 views

Fog, Edge, and Pervasive Computing in Intelligent IoT Driven Applications Deepak Gupta 2024 Scribd Download

Driven

Uploaded by

zornikwaim
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (4 votes)
37 views

Fog, Edge, and Pervasive Computing in Intelligent IoT Driven Applications Deepak Gupta 2024 Scribd Download

Driven

Uploaded by

zornikwaim
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 76

Download Full Version ebookmass - Visit ebookmass.

com

Fog, Edge, and Pervasive Computing in Intelligent


IoT Driven Applications Deepak Gupta

https://ebookmass.com/product/fog-edge-and-pervasive-
computing-in-intelligent-iot-driven-applications-deepak-
gupta/

OR CLICK HERE

DOWLOAD NOW

Discover More Ebook - Explore Now at ebookmass.com


Instant digital products (PDF, ePub, MOBI) ready for you
Download now and discover formats that fit your needs...

Intelligent Data Analysis: From Data Gathering to Data


Comprehension Deepak Gupta

https://ebookmass.com/product/intelligent-data-analysis-from-data-
gathering-to-data-comprehension-deepak-gupta/

ebookmass.com

The Cloud-to-Thing Continuum: Opportunities and Challenges


in Cloud, Fog and Edge Computing 1st ed. Edition Theo Lynn

https://ebookmass.com/product/the-cloud-to-thing-continuum-
opportunities-and-challenges-in-cloud-fog-and-edge-computing-1st-ed-
edition-theo-lynn/
ebookmass.com

Building Enterprise IoT Solutions with Eclipse IoT


Technologies: An Open Source Approach to Edge Computing
1st Edition Frédéric Desbiens
https://ebookmass.com/product/building-enterprise-iot-solutions-with-
eclipse-iot-technologies-an-open-source-approach-to-edge-
computing-1st-edition-frederic-desbiens/
ebookmass.com

(Re)Creating Language Identities in Animated Films:


Dubbing Linguistic Variation 1st Edition Vincenza
Minutella
https://ebookmass.com/product/recreating-language-identities-in-
animated-films-dubbing-linguistic-variation-1st-edition-vincenza-
minutella/
ebookmass.com
Business in Action, 10th Global Edition Courtland L. Bovée

https://ebookmass.com/product/business-in-action-10th-global-edition-
courtland-l-bovee/

ebookmass.com

Dungeon in the Clouds - A Dungeon Core LitRPG story (Rise


of Kers Book 1) Daniel Weber

https://ebookmass.com/product/dungeon-in-the-clouds-a-dungeon-core-
litrpg-story-rise-of-kers-book-1-daniel-weber/

ebookmass.com

Wolf in the Shadows Maria Vale

https://ebookmass.com/product/wolf-in-the-shadows-maria-vale-2/

ebookmass.com

Contemporary Aristotelian Ethics 7th Edition Arthur


Madigan S.J.

https://ebookmass.com/product/contemporary-aristotelian-ethics-7th-
edition-arthur-madigan-s-j/

ebookmass.com

ISE Fundamentals of Corporate Finance 11th Edition Richard


A. Brealey

https://ebookmass.com/product/ise-fundamentals-of-corporate-
finance-11th-edition-richard-a-brealey/

ebookmass.com
blogdown: Creating Websites with R Markdown Yihui Xie

https://ebookmass.com/product/blogdown-creating-websites-with-r-
markdown-yihui-xie/

ebookmass.com
Fog, Edge, and Pervasive Computing in Intelligent IoT Driven
Applications
IEEE Press
445 Hoes Lane
Piscataway, NJ 08854
IEEE Press Editorial Board
Ekram Hossain, Editor in Chief
Jón Atli Benediktsson David Alan Grier Elya B. Joffe
Xiaoou Li Peter Lian Andreas Molisch
Saeid Nahavandi Jeffrey Reed Diomidis Spinellis
Sarah Spurgeon Ahmet Murat Tekalp
Fog, Edge, and Pervasive Computing in
Intelligent IoT Driven Applications

Edited by
Deepak Gupta
Aditya Khamparia
Copyright © 2021 by The Institute of Electrical and Electronics Engineers, Inc. All rights
reserved.
Published by John Wiley & Sons, Inc., Hoboken, New Jersey.
Published simultaneously in Canada.
No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any
form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise,
except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without
either the prior written permission of the Publisher, or authorization through payment of the
appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers,
MA 01923, (978) 750-8400, fax (978) 750-4470, or on the web at www.copyright.com. Requests to
the Publisher for permission should be addressed to the Permissions Department, John Wiley &
Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at
http://www.wiley.com/go/permission.
Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best
efforts in preparing this book, they make no representations or warranties with respect to the
accuracy or completeness of the contents of this book and specifically disclaim any implied
warranties of merchantability or fitness for a particular purpose. No warranty may be created or
extended by sales representatives or written sales materials. The advice and strategies contained
herein may not be suitable for your situation. You should consult with a professional where
appropriate. Neither the publisher nor author shall be liable for any loss of profit or any other
commercial damages, including but not limited to special, incidental, consequential, or other
damages.
For general information on our other products and services or for technical support, please
contact our Customer Care Department within the United States at (800) 762-2974, outside the
United States at (317) 572-3993 or fax (317) 572-4002.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in
print may not be available in electronic formats. For more information about Wiley products,
visit our web site at www.wiley.com.
Library of Congress Cataloging-in-Publication Data
Names: Gupta, Deepak, editor. | Khamparia, Aditya, 1988- editor.
Title: Fog, edge, and pervasive computing in intelligent IoT driven
applications / edited by Deepak Gupta, Aditya Khamparia.
Description: Hoboken, New Jersey : Wiley-IEEE Press, 2020. | Includes
bibliographical references and index. | Description based on print version
record and CIP data provided by publisher; resource not viewed.
Identifiers: LCCN 2020025436 (print) | LCCN 2020025437 (ebook) | ISBN
9781119670100 (epub) | ISBN 9781119670094 (adobe pdf) | ISBN 9781119670070
(hardback) | ISBN 9781119670070q(hardback) | ISBN 9781119670094q(adobe
pdf) | ISBN 9781119670100q(epub)
Subjects: LCSH: Internet of things. | Cloud computing. | Distributed
databases. | UbIquitous computing.
Classification: LCC TK5105.8857 (ebook) | LCC TK5105.8857 .F64 2020 (print) |
DDC 004.67/8–dc23
LC record available at https://lccn.loc.gov/2020025436 LC record available at https://lccn.loc
.gov/2020025437
Cover Design: Wiley
Cover Image: © Andriy Onufriyenko/Getty Images
Set in 9.5/12.5pt STIXTwoText by SPi Global, Chennai, India
Printed in the United States of America
10 9 8 7 6 5 4 3 2 1
v

Contents

About the Editors xvii


List of Contributors xix
Preface xxv
Acknowledgments xxxiii

1 Fog, Edge and Pervasive Computing in Intelligent Internet of


Things Driven Applications in Healthcare: Challenges,
Limitations and Future Use 1
Afroj Alam, Sahar Qazi, Naiyar Iqbal, and Khalid Raza
1.1 Introduction 1
1.2 Why Fog, Edge, and Pervasive Computing? 3
1.3 Technologies Related to Fog and Edge Computing 6
1.4 Concept of Intelligent IoT Application in Smart (Fog) Computing
Era 9
1.5 The Hierarchical Architecture of Fog/Edge Computing 12
1.6 Applications of Fog, Edge and Pervasive Computing in IoT-based
Healthcare 15
1.7 Issues, Challenges, and Opportunity 17
1.7.1 Security and Privacy Issues 18
1.7.2 Resource Management 19
1.7.3 Programming Platform 19
1.8 Conclusion 20
Bibliography 20

2 Future Opportunistic Fog/Edge Computational Models and


their Limitations 27
Sonia Singla, Naveen Kumar Bhati, and S. Aswath
2.1 Introduction 28
2.2 What are the Benefits of Edge and Fog Computing for the Mechanical
Web of Things (IoT)? 32
vi Contents

2.3 Disadvantages 34
2.4 Challenges 34
2.5 Role in Health Care 35
2.6 Blockchain and Fog, Edge Computing 38
2.7 How Blockchain will Illuminate Human Services Issues 40
2.8 Uses of Blockchain in the Future 41
2.9 Uses of Blockchain in Health Care 42
2.10 Edge Computing Segmental Analysis 42
2.11 Uses of Fog Computing 43
2.12 Analytics in Fog Computing 44
2.13 Conclusion 44
Bibliography 44

3 Automating Elicitation Technique Selection using Machine


Learning 47
Hatim M. Elhassan Ibrahim Dafallaa, Nazir Ahmad, Mohammed Burhanur
Rehman, Iqrar Ahmad, and Rizwan khan
3.1 Introduction 47
3.2 Related Work 48
3.3 Model: Requirement Elicitation Technique Selection Model 52
3.3.1 Determining Key Attributes 54
3.3.2 Selection Attributes 54
3.3.2.1 Analyst Experience 55
3.3.2.2 Number of Stakeholders 55
3.3.2.3 Technique Time 56
3.3.2.4 Level of Information 56
3.3.3 Selection Attributes Dataset 56
3.3.3.1 Mapping the Selection Attributes 57
3.3.4 k-nearest Neighbor Algorithm Application 57
3.4 Analysis and Results 60
3.5 The Error Rate 61
3.6 Validation 61
3.6.1 Discussion of the Results of the Experiment 62
3.7 Conclusion 62
Bibliography 65

4 Machine Learning Frameworks and Algorithms for Fog and


Edge Computing 67
Murali Mallikarjuna Rao Perumalla, Sanjay Kumar Singh, Aditya
Khamparia, Anjali Goyal, and Ashish Mishra
4.1 Introduction 68
Contents vii

4.1.1 Fog Computing and Edge Computing 68


4.1.2 Pervasive Computing 68
4.2 Overview of Machine Learning Frameworks for Fog and Edge
Computing 69
4.2.1 TensorFlow 69
4.2.2 Keras 70
4.2.3 PyTorch 70
4.2.4 TensorFlow Lite 70
4.2.4.1 Use Pre-train Models 70
4.2.4.2 Convert the Model 70
4.2.4.3 On-device Inference 71
4.2.4.4 Model Optimization 71
4.2.5 Machine Learning and Deep Learning Techniques 71
4.2.5.1 Supervised, Unsupervised and Reinforcement Learning 71
4.2.5.2 Machine Learning, Deep Learning Techniques 72
4.2.5.3 Deep Learning Techniques 75
4.2.5.4 Efficient Deep Learning Algorithms for Inference 77
4.2.6 Pros and Cons of ML Algorithms for Fog and Edge Computing 78
4.2.6.1 Advantages using ML Algorithms 78
4.2.6.2 Disadvantages of using ML Algorithms 79
4.2.7 Hybrid ML Model for Smart IoT Applications 79
4.2.7.1 Multi-Task Learning 79
4.2.7.2 Ensemble Learning 80
4.2.8 Possible Applications in Fog Era using Machine Learning 81
4.2.8.1 Computer Vision 81
4.2.8.2 ML- Assisted Healthcare Monitoring System 81
4.2.8.3 Smart Homes 81
4.2.8.4 Behavior Analyses 82
4.2.8.5 Monitoring in Remote Areas and Industries 82
4.2.8.6 Self-Driving Cars 82
Bibliography 82

5 Integrated Cloud Based Library Management in Intelligent


IoT driven Applications 85
Md Robiul Alam Robel, Subrato Bharati, Prajoy Podder, and M. Rubaiyat
Hossain Mondal
5.1 Introduction 86
5.1.1 Execution Plan for the Mobile Application 86
5.1.2 Main Contribution 86
5.2 Understanding Library Management 87
viii Contents

5.3 Integration of Mobile Platform with the Physical Library- Brief


Concept 88
5.4 Database (Cloud Based) - A Must have Component for Library
Automation 88
5.5 IoT Driven Mobile Based Library Management - General Concept 89
5.6 IoT Involved Real Time GUI (Cross Platform) Available to User 93
5.7 IoT Challenges 98
5.7.1 Infrastructure Challenges 99
5.7.2 Security Challenges 99
5.7.3 Societal Challenges 100
5.7.4 Commercial Challenges 101
5.8 Conclusion 102
Bibliography 104

6 A Systematic and Structured Review of Intelligent Systems


for Diagnosis of Renal Cancer 105
Nikita, Harsh Sadawarti, Balwinder Kaur, and Jimmy Singla
6.1 Introduction 106
6.2 Related Works 107
6.3 Conclusion 119
Bibliography 119

7 Location Driven Edge Assisted Device and Solutions for


Intelligent Transportation 123
Saravjeet Singh and Jaiteg Singh
7.1 Introduction to Fog and Edge Computing 124
7.1.1 Need for Fog and Edge Computing 124
7.1.2 Fog Computing 125
7.1.2.1 Application Areas of Fog Computing 125
7.1.3 Edge Computing 126
7.1.3.1 Advantages of Edge Computing 127
7.1.3.2 Application Areas of Fog Computing 129
7.2 Introduction to Transportation System 129
7.3 Route Finding Process 131
7.3.1 Challenges Associated with Land Navigation and Routing
Process 132
7.4 Edge Architecture for Route Finding 133
7.5 Technique Used 135
7.6 Algorithms Used for the Location Identification and Route Finding
Process 137
7.6.1 Location Identification 137
7.6.2 Path Generation Technique 138
Contents ix

7.7 Results and Discussions 140


7.7.1 Output 140
7.7.2 Benefits of Edge-based Routing 143
7.8 Conclusion 145
Bibliography 146

8 Design and Simulation of MEMS for Automobile Condition


Monitoring Using COMSOL Multiphysics Simulator 149
Natasha Tiwari, Anil Kumar, Pallavi Asthana, Sumita Mishra, and Bramah
Hazela
8.1 Introduction 149
8.2 Related Work 151
8.3 Vehicle Condition Monitoring through Acoustic Emission 151
8.4 Piezo-resistive Micro Electromechanical Sensors for Monitoring the
Faults Through AE 152
8.5 Designing of MEM Sensor 153
8.6 Experimental Setup 153
8.6.1 FFT Analysis of Automotive Diesel Engine Sound Recording using
MATLAB 155
8.6.2 Design of MEMS Sensor using COMSOL Multiphysics 155
8.6.3 Electrostatic Study Steps for the Optimized Tri-plate Comb
Structure 156
8.7 Result and Discussions 157
8.8 Conclusion 158
Bibliography 158

9 IoT Driven Healthcare Monitoring System 161


Md Robiul Alam Robel, Subrato Bharati, Prajoy Podder, and M. Rubaiyat
Hossain Mondal
9.1 Introduction 161
9.1.1 Complementary Aspects of Cloud IoT in Healthcare Applications 162
9.1.2 Main Contribution 164
9.2 General Concept for IoT Based Healthcare System 164
9.3 View of the Overall IoT Healthcare System- Tiers Explained 165
9.4 A Brief Design of the IoT Healthcare Architecture-individual Block
Explanation 166
9.5 Models/Frameworks for IoT use in Healthcare 168
9.6 IoT e-Health System Model 171
9.7 Process Flow for the Overall Model 172
9.8 Conclusion 173
Bibliography 175
x Contents

10 Fog Computing as Future Perspective in Vehicular Ad hoc


Networks 177
Harjit Singh, Dr. Vijay Laxmi, Dr. Arun Malik, and Dr. Isha
10.1 Introduction 178
10.2 Future VANET: Primary Issues and Specifications 180
10.3 Fog Computing 181
10.3.1 Fog Computing Concept 183
10.3.2 Fog Technology Characterization 183
10.4 Related Works in Cloud and Fog Computing 185
10.5 Fog and Cloud Computing-based Technology Applications in
VANET 186
10.6 Challenges of Fog Computing in VANET 188
10.7 Issues of Fog Computing in VANET 189
10.8 Conclusion 190
Bibliography 191

11 An Overview to Design an Efficient and Secure Fog-assisted


Data Collection Method in the Internet of Things 193
Sofia, Arun Malik, Isha, and Aditya Khamparia
11.1 Introduction 193
11.2 Related Works 194
11.3 Overview of the Chapter 196
11.4 Data Collection in the IoT 197
11.5 Fog Computing 197
11.5.1 Why fog Computing for Data Collection in IoT? 197
11.5.2 Architecture of Fog Computing 200
11.5.3 Features of Fog Computing 200
11.5.4 Threats of Fog Computing 202
11.5.5 Applications of Fog Computing with the IoT 203
11.6 Requirements for Designing a Data Collection Method 204
11.7 Conclusion 206
Bibliography 206

12 Role of Fog Computing Platform in Analytics of Internet of


Things- Issues, Challenges and Opportunities 209
Mamoon Rashid and Umer Iqbal Wani
12.1 Introduction to Fog Computing 209
12.1.1 Hierarchical Fog Computing Architecture 210
12.1.2 Layered Fog Computing Architecture 212
12.1.3 Comparison of Fog and Cloud Computing 213
12.2 Introduction to Internet of Things 214
Contents xi

12.2.1 Overview of Internet of Things 214


12.3 Conceptual Architecture of Internet of Things 216
12.4 Relationship between Internet of Things and Fog Computing 217
12.5 Use of Fog Analytics in Internet of Things 218
12.6 Conclusion 218
Bibliography 218

13 A Medical Diagnosis of Urethral Stricture Using Intuitionistic


Fuzzy Sets 221
Prabjot Kaur and Maria Jamal
13.1 Introduction 221
13.2 Preliminaries 223
13.2.1 Introduction 223
13.2.2 Fuzzy Sets 223
13.2.3 Intuitionistic Fuzzy Sets 224
13.2.4 Intuitionistic Fuzzy Relation 224
13.2.5 Max-Min-Max Composition 224
13.2.6 Linguistic Variable 224
13.2.7 Distance Measure In Intuitionistic Fuzzy Sets 224
13.2.7.1 The Hamming Distance 224
13.2.7.2 Normalized Hamming Distance 224
13.2.7.3 Compliment of an Intuitionistic Fuzzy Set Matrix 225
13.2.7.4 Revised Max-Min Average Composition of A and B (A Φ B) 225
13.3 Max-Min-Max Algorithm for Disease Diagnosis 225
13.4 Case Study 226
13.5 Intuitionistic Fuzzy Max-Min Average Algorithm for Disease
Diagnosis 227
13.6 Result 228
13.7 Code for Calculation 229
13.8 Conclusion 233
13.9 Acknowledgement 234
Bibliography 234

14 Security Attacks in Internet of Things 237


Rajit Nair, Preeti Sharma, and Dileep Kumar Singh
14.1 Introduction 238
14.2 Reference Model of Internet of Things (IoT) 238
14.3 IoT Communication Protocol 246
14.4 IoT Security 247
14.4.1 Physical Attack 248
14.4.2 Network Attack 252
xii Contents

14.4.3 Software Attack 254


14.4.4 Encryption Attack 255
14.5 Security Challenges in IoT 256
14.5.1 Cryptographic Strategies 256
14.5.2 Key Administration 256
14.5.3 Denial of Service 256
14.5.4 Authentication and Access Control 257
14.6 Conclusion 257
Bibliography 257

15 Fog Integrated Novel Architecture for Telehealth Services


with Swift Medical Delivery 263
Inderpreet Kaur, Kamaljit Singh Saini, and Jaiteg Singh Khaira
15.1 Introduction 264
15.2 Associated Work and Dimensions 266
15.3 Need of Security in Telemedicine Domain and Internet of Things
(IoT) 267
15.3.1 Analytics Reports 268
15.4 Fog Integrated Architecture for Telehealth Delivery 268
15.5 Research Dimensions 269
15.5.1 Benchmark Datasets 269
15.6 Research Methodology and Implementation on Software Defined
Networking 270
15.6.1 Key Tools and Frameworks for IoT, Fog Computing and Edge
Computing 274
15.6.2 Simulation Analysis 276
15.7 Conclusion 282
Bibliography 282

16 Fruit Fly Optimization Algorithm for Intelligent IoT


Applications 287
Satinder Singh Mohar, Sonia Goyal, and Ranjit Kaur
16.1 An Introduction to the Internet of Things 287
16.2 Background of the IoT 288
16.2.1 Evolution of the IoT 288
16.2.2 Elements Involved in IoT Communication 288
16.3 Applications of the IoT 289
16.3.1 Industrial 290
16.3.2 Smart Parking 290
16.3.3 Health Care 290
16.3.4 Smart Offices and Homes 290
Contents xiii

16.3.5 Augment Maps 291


16.3.6 Environment Monitoring 291
16.3.7 Agriculture 291
16.4 Challenges in the IoT 291
16.4.1 Addressing Schemes 291
16.4.2 Energy Consumption 292
16.4.3 Transmission Media 292
16.4.4 Security 292
16.4.5 Quality of Service (QoS) 292
16.5 Introduction to Optimization 293
16.6 Classification of Optimization Algorithms 293
16.6.1 Particle Swarm Optimization (PSO) Algorithm 293
16.6.2 Genetic Algorithms 294
16.6.3 Heuristic Algorithms 294
16.6.4 Bio-inspired Algorithms 294
16.6.5 Evolutionary Algorithms (EA) 294
16.7 Network Optimization and IoT 295
16.8 Network Parameters optimized by Different Optimization
Algorithms 295
16.8.1 Load Balancing 295
16.8.2 Maximizing Network Lifetime 295
16.8.3 Link Failure Management 296
16.8.4 Quality of the Link 296
16.8.5 Energy Efficiency 296
16.8.6 Node Deployment 296
16.9 Fruit Fly Optimization Algorithm 297
16.9.1 Steps Involved in FOA 297
16.9.2 Flow Chart of Fruit Fly Optimization Algorithm 298
16.10 Applicability of FOA in IoT Applications 300
16.10.1 Cloud Service Distribution in Fog Computing 300
16.10.2 Cluster Head Selection in IoT 300
16.10.3 Load Balancing in IoT 300
16.10.4 Quality of Service in Web Services 300
16.10.5 Electronics Health Records in Cloud Computing 301
16.10.6 Intrusion Detection System in Network 301
16.10.7 Node Capture Attack in WSN 301
16.10.8 Node Deployment in WSN 302
16.11 Node Deployment Using Fruit Fly Optimization Algorithm 302
16.12 Conclusion 304
Bibliography 304
xiv Contents

17 Optimization Techniques for Intelligent IoT


Applications 311
Priyanka Pattnaik, Subhashree Mishra, and Bhabani Shankar Prasad
Mishra
17.1 Cuckoo Search 312
17.1.1 Introduction to Cuckoo 312
17.1.2 Natural Cuckoo 312
17.1.3 Artificial Cuckoo Search 313
17.1.4 Cuckoo Search Algorithm 313
17.1.5 Cuckoo Search Variants 314
17.1.6 Discrete Cuckoo Search 314
17.1.7 Binary Cuckoo Search 314
17.1.8 Chaotic Cuckoo Search 316
17.1.9 Parallel Cuckoo Search 317
17.1.10 Application of Cuckoo Search 317
17.2 Glow Worm Algorithm 317
17.2.1 Introduction to Glow Worm 317
17.2.2 Glow Worm Swarm Optimization Algorithm (GSO) 317
17.3 Wasp Swarm Optimization 321
17.3.1 Introduction to Wasp Swarm and Wasp Swarm Algorithm (WSO) 321
17.3.2 Fish Swarm Optimization (FSO) 322
17.3.3 Fruit Fly Optimization (FLO) 322
17.3.4 Cockroach Swarm Optimization 324
17.3.5 Bumblebee Algorithm 324
17.3.6 Dolphin Echolocation 325
17.3.7 Shuffled Frog-leaping Algorithm 326
17.3.8 Paddy Field Algorithm 327
17.4 Real World Applications Area 328
Summary 329
Bibliography 329

18 Optimization Techniques for Intelligent IoT Applications in


Transport Processes 333
Muzafer Saračević, Zoran Lončarević, and Adnan Hasanović
18.1 Introduction 333
18.2 Related Works 335
18.3 TSP Optimization Techniques 336
18.4 Implementation and Testing of Proposed Solution 338
18.5 Experimental Results 342
18.5.1 Example Test with 50 Cities 343
18.5.2 Example Test with 100 Cities 344
Contents xv

18.6 Conclusion and Further Works 346


Bibliography 347

19 Role of Intelligent IOT Applications in Fog paradigm: Issues,


Challenges and Future Opportunities 351
Priyanka Rajan Kumar and Sonia Goel
19.1 Fog Computing 352
19.1.1 Need of Fog computing 352
19.1.2 Architecture of Fog Computing 353
19.1.3 Fog Computing Reference Architecture 354
19.1.4 Processing on Fog 355
19.2 Concept of Intelligent IoT Applications in Smart Computing Era 355
19.3 Components of Edge and Fog Driven Algorithm 356
19.4 Working of Edge and Fog Driven Algorithms 357
19.5 Future Opportunistic Fog/Edge Computational Models 360
19.5.1 Future Opportunistic Techniques 361
19.6 Challenges of Fog Computing for Intelligent IoT Applications 361
19.7 Applications of Cloud Based Computing for Smart Devices 363
Bibliography 364

20 Security and Privacy Issues in Fog/Edge/Pervasive


Computing 369
Shweta Kaushik and Charu Gandhi
20.1 Introduction to Data Security and Privacy in Fog Computing 370
20.2 Data Protection/ Security 375
20.3 Great Security Practices In Fog Processing Condition 377
20.4 Developing Patterns in Security and Privacy 381
20.5 Conclusion 385
Bibliography 385

21 Fog and Edge Driven Security & Privacy Issues in IoT


Devices 389
Deepak Kumar Sharma, Aarti Goel, and Pragun Mangla
21.1 Introduction to Fog Computing 390
21.1.1 Architecture of Fog 390
21.1.2 Benefits of Fog Computing 392
21.1.3 Applications of Fog with IoT 393
21.1.4 Major Challenges for Fog with IoT 394
21.1.5 Security and Privacy Issues in Fog Computing 395
21.2 Introduction to Edge Computing 399
21.2.1 Architecture and Working 400
xvi Contents

21.2.2 Applications and use Cases 400


21.2.3 Characteristics of Edge Computing 403
21.2.4 Challenges of Edge Computing 404
21.2.5 How to Protect Devices “On the Edge”? 405
21.2.6 Comparison with Fog Computing 405
Bibliography 406

Index 409
xvii

About the Editors

Deepak Gupta is an eminent academician; he has


various roles and responsibilities juggling his time
between lectures, research, publications, consul-
tancy, community service, PhD and post-doctorate
supervision etc. With 12 years of rich expertise
in teaching and two years in industry; he focuses
on rational and practical learning. He has con-
tributed substantial literature in the fields of
Human–Computer Interaction, Intelligent Data
Analysis, Nature-Inspired Computing, Machine
Learning and Soft Computing. He is working as
an Assistant Professor at Maharaja Agrasen Institute of Technology (GGSIPU),
Delhi, India. He has served as Editor-in-Chief, Guest Editor, Associate Editor in
SCI and various other reputed journals (Elsevier, Springer, Wiley & MDPI). He has
actively been involved in the organization of various well reputed International
conferences. He is not only backed with a strong reputation but his innovative
ideas, end-results of his research and implementation of technology in the
medical field is significantly contributing to society. He is currently a Post-Doc
researcher at University of Valladolid, Spain. He has completed his Post-Doc from
Inatel, Brazil, and Ph.D. from Dr. APJ Abdul Kalam Technical University. He has
authored/edited 33 books published internationally (Elsevier, Springer, Wiley,
Katson). He has published 103 scientific research works in reputed International
Journals and Conferences including 50 SCI Indexed Journals of the IEEE,
Elsevier, Springer, Wiley and many more. He has also published one patent. He
is Editor-in-Chief of the OA journal Computers and Quantum Computing and
Applications (QCAA), Associate Editor of Expert Systems (Wiley), Intelligent
Decision Technologies (IOS Press), Journal of Computational and Theoretical
Nenoscience, Honorary Editor of ICSES Transactions on Image Processing and
Pattern Recognition. He is also a series editor of Intelligent Biomedical Data
xviii About the Editors

Analysis De Gruyter (Germany), series editor of Smart Sensor Technologies for


Biomedical Engineering with Elsevier. He is also associated with various profes-
sional bodies such as ISTE, IAENG, IACSIT, SCIEI, ICSES, UACEE, Internet
Society, SMEI, IAOP, and IAOIP. Invited as a Faculty Resource Person/Session
Chair/Reviewer/TPC member in different FDP, conferences and journals. He is
the convener of the ‘ICICC’ and ‘ICDAM’ springer conference series.

Aditya Khamparia is an eminent academician; he


has various roles and responsibilities including lec-
tures, research, publications, consultancy, commu-
nity service and PhD supervision etc. With seven
years of rich expertise in teaching and two years in
industry; he focuses on individual centric and prac-
tical learning. Currently, he is working as Associate
Professor of Computer Science and Engineering at
Lovely Professional University, Punjab, India. His
research areas are Machine Learning, Soft Comput-
ing, Educational Technologies, IoT, Semantic Web
and Ontologies. He has published more than 50 scientific research publica-
tions in reputed International/National Journals and Conferences, which are
indexed in various international databases. Invited as a Faculty Resource Per-
son/Session Chair/Reviewer/TPC member in different FDP, conferences and jour-
nals. Dr. Aditya received research excellence award in 2016, 2017, 2018 and
2019 at Lovely Professional University for his research contribution during the
academic year. He is member of CSI, IET, ISTE, IAENG, ACM and IACSIT.
He is also acting as reviewer and member of various renowned national and
international conferences/journals. Invited as a Faculty Resource Person/Session
Chair/Reviewer/TPC member in different FDP, conferences and journals.
xix

List of Contributors

Iqrar Ahmad Subrato Bharati


Department of information system Department of EEE
Community College Ranada Prasad Shaha University
King Khalid University Muhayel Narayanganj-1400
Kingdom of Saudi Arabia Bangladesh

Nazir Ahmad Naveen Kumar Bhati


Department of information system Sunder Deep College of Engineering
Community College and Technology
King Khalid University Muhayel Uttar Pradesh Technical University
Kingdom of Saudi Arabia India

Afroj Alam Hatim M. Elhassan Ibrahim Dafallaa


Department of Computer Science Department of information system
Integral University Community College
Lucknow King Khalid University Muhayel
India Kingdom of Saudi Arabia

Pallavi Asthana Charu Gandhi


Amity University Department of Computer Science
Uttar Pradesh JIIT
India Noida
India
S. Aswath
Department of Computer Science
PES University
Bangalore, 560008
India
xx List of Contributors

Aarti Goel Isha


Department of Information Associate Professor
Technology Lovely Professional University
Netaji Subhas University of Punjab
Technology India
New Delhi
India Maria Jamal
Department of Mathematics
Sonia Goel Birla Institute of Technology
Punjabi University Patiala India

Anjali Goyal Balwinder Kaur


Department of Computer Applications School of Computer Science and
GNIMT Engineering
Ludhiana Lovely Professional University
Punjab Phagwara
India India

Sonia Goyal Inderpreet Kaur


Department of Electronics and Reseach Scholar
Communication Engineering CU Gharaun
Punjabi University Patiala Dept. of Computer Applications
CGC landran
Adnan Hasanović
University of Novi Pazar Prabjot Kaur
36300 Novi Pazar Department of Mathematics
Dimitrija Tucovica bb Birla Institute of Technology
Serbia India

Bramah Hazela Ranjit Kaur


Amity University Department of Electronics and
Uttar Pradesh Communication Engineering
India Punjabi University Patiala

Naiyar Iqbal Shweta Kaushik


Department of Computer Science Department of Computer Science
and IT Engineering
Maulana Azad National Urdu ABES Institute of Technology
University New Delhi
Hyderabad India
List of Contributors xxi

Jaiteg Singh Khaira Zoran Lončarević


Dept. of Computer Applications ITS - Studies for Information
Chitkara University Technologies
Punjab Campus 11000 Belgrade
Savski nasip 7
Aditya Khamparia Serbia
School of Computer Science and
Engineering Arun Malik
Lovely Professional University Associate Professor
Phagwara Lovely Professional University
Punjab Punjab
India
and
School of Computer Science and Pragun Mangla
Engineering Department of Electronics and
Lovely Professional University Communication
Punjab Netaji Subhas Institute of Technology
India New Delhi
India
Rizwan khan
Al-Barkaat College of Graduate Ashish Mishra
Studies Gyan Ganga Institute of Technology
Aligarh Jabalpur
India Madhya Pradesh
India
Anil Kumar
Amity University Bhabani Shankar Prasad Mishra
Uttar Pradesh School of Computer Engineering
India KIIT University
Bhubaneswar
Priyanka Rajan Kumar Odisha
Punjabi University Patiala
Subhashree Mishra
Vijay Laxmi School of Electronics Engineering
Professor KIIT University
Guru Kashi University Bhubaneswar
Punjab Odisha
India
xxii List of Contributors

Sumita Mishra Prajoy Podder


Amity University Institute of ICT
Uttar Pradesh Bangladesh University of Engineering
India and Technology
Dhaka
Satinder Singh Mohar Bangladesh
Department of Electronics and
Communication Engineering Sahar Qazi
Punjabi University Patiala Department of Computer Science
Jamia Millia Islamia
M. Rubaiyat Hossain Mondal New Delhi
Institute of ICT
Mamoon Rashid
Bangladesh University of Engineering
Assistant Professor
and Technology
School of Computer Science and
Dhaka
Engineering
Bangladesh
Lovely Professional University
Jalandhar
Rajit Nair
India
Jagran Lakecity University
Khalid Raza
Nikita Department of Computer Science
School of Engineering & Technology Jamia Millia Islamia
CT University New Delhi
Ludhiana
India Mohammed Burhanur Rehman
Department of information system
Priyanka Pattnaik Community College
School of Computer Engineering King Khalid University Muhayel
KIIT University Kingdom of Saudi Arabia
Bhubaneswar
Odisha Md Robiul Alam Robel
Department of CSE
Murali Mallikarjuna Rao Perumalla Cumilla University
School of Computer Science and Cumilla
Engineering Bangladesh
Lovely Professional University
Harsh Sadawarti
Phagwara
School of Engineering & Technology
Punjab
CT University
Ludhiana
India
List of Contributors xxiii

Kamaljit Singh Saini Sanjay Kumar Singh


Dept. of Computer Applications School of Computer Science and
Chandigarh University Engineering
Gharuan Lovely Professional University
Phagwara
Muzafer Saračević Punjab
University of Novi Pazar
36300 Novi Pazar Saravjeet Singh
Dimitrija Tucovica bb Chitkara University Institute of
Serbia Engineering and Technology
Chitkara University
Deepak Kumar Sharma 140401 Punjab
Department of Information Rajpura
Technology India
Netaji Subhas University of
Technology Jimmy Singla
New Delhi School of Computer Science and
India Engineering
Lovely Professional University
Preeti Sharma Phagwara
Bansal College of Engineering India

Dileep Kumar Singh Sonia Singla


Jagran Lakecity University University of Leicester
U.K.
Harjit Singh
Research Scholar Sofia
Guru Kashi University Research Scholar
Punjab Lovely Professional University
India Punjab
India
Jaiteg Singh
Chitkara University Institute of Natasha Tiwari
Engineering and Technology University of Oxford
Chitkara University UK
140401 Punjab
Rajpura Umer Iqbal Wani
India Assistant Professor
School of Computer Science and
Engineering
Lovely Professional University
Jalandhar
India
xxv

Preface

This book focuses on recent advances, roles and benefits of fog, edge, and perva-
sive computing for intelligent and smart Internet of Things (IoT) enabled appli-
cations, aimed at narrowing the increasing gap. This book aims to describe the
different techniques of intelligent systems from a practical point of view: solv-
ing common life problems. But this book also brings a valuable point of view
to engineers and businessmen, trying to solve practical, economical, or technical
problems in the field of their company activities or expertise. The purely practical
approach helps to transmit the idea and the aim of the author is to communicate
the way to approach and to cope with problems that would be intractable in any
other way. This book solicits contributions which include theory, applications, and
design methods of intelligent systems, Ubiquitous techniques, trends of fog, edge,
and cloud applications as embedded in the fields of engineering, computer science,
mathematics, and life sciences, as well as the methodologies behind them.

Book Objectives
With the rapid growth and emerging development in artificial technology, novel
hybrid and intelligent IoT, edge, fog driven, and pervasive computing techniques
are an important part of our daily lives. These technologies are utilized in various
engineering, industrial, smart farming, video security surveillance, VANETs
and vision augmented driven applications. These applications required real time
processing of associated data and work on the principle of computational resource
oriented meta heuristic and machine learning algorithms. Due to physical size
limitations, small computing IoT and mobile devices are having resource limited
constraints with low computing power and are unable to manage good quality of
service and related parameters for distinguished applications. To overcome the
limitations of such mobile devices edge/fog and pervasive computing have been
proposed as a promising research area to carry out high end infrastructure usage
and provide computation, storage and task execution effectively for end device
xxvi Preface

users. As edge/fog computing is implemented at network edges, it promises low


latency as well as agile computation augmenting services for device users. To
successfully support intelligent IoT applications, therefore, there is a significant
need for (1) exploring the efficient deployment of edge/fog/pervasive computing
services at the network nodes level, (2) identifying the novel algorithm related
to fog/edge/pervasive computing for resource allocation with low constraint
and power usage, and (3) designing collaborative and distributed architectures
specialized for edge/fog/pervasive computing.

Target Audience
The target audience of book is professionals and practitioners in the field of intelli-
gent system, edge computing and cloud enabled applications and ubiquitous com-
puting science paradigm may benefit directly from others’ experiences. Graduate
and master students of final projects and particular courses in intelligent system,
edge and fog based real-life applications or medical domain can take advantage,
making the book interesting for engineering and medical university teaching pur-
poses. The research community of intelligent systems, sensor applications and
intelligent sensor-based applications, consisting of many conferences, workshops,
journals and other books, will take this as a reference book.

Organization
Chapter 1 describes the Internet of Things, fog, edge and pervasive computing are
emerging technologies, having several promising applications including health-
care. These technologies are witnessing a paradigm shift in the healthcare sector
moving out from traditional ways of visiting hospitals. It connects the doctors,
patients, and nurses through smart intelligent sensor devices at low cost with high
bandwidth network. In this chapter, authors discussed new computing paradigms
precisely and present their applications in ubiquitous healthcare. This chapter also
covers various problems and challenges that have been faced by the practitioners
in the last few years in the field of cloud computing and IoT that has been solved
by fog, edge and pervasive computing.
Chapter 2 discusses difficulties and future headings to investigate the role
of fog, edge and pervasive computing. Studies have revealed that fog/edge
computing (FEC) based organizations can expect an essential activity in expand-
ing the cloud by means of finishing go-between organizations at the edge of
the framework. Dimness/edge computing-based IoT’s (FECIoT) appropriated
configuration overhauls organization provisioning along the cloud-to-things
Preface xxvii

continuum, thus making it sensible for key applications. Edge and fog registering
are firmly related – both allude to the capacity to process information closer to
the requester/buyer to lessen idleness cost and increment client experience. Both
can channel information before it εhitsε a major information lake for further
utilization, lessening the measure of information that should be handled.
Chapter 3 addresses the technique selection issue encountered during the
requirements elicitation stage, through a proposed machine learning model to
transfer the experts’ knowledge of elicitation technique selection to the less expe-
rienced. Based on the system analysts, stakeholders automate various techniques
to provide the best optimization technique nomination.
Chapter 4 covers the advantages and disadvantages of using machine learning
in edge/fog/pervasive computing. The various studies carried out by researchers is
also covered. Every field has numerous applications, and in this chapter we discuss
a few possible applications in this fog era using machine learning techniques. By
the end of the chapter you should know about ML frameworks and the various
machine learning algorithms used for fog/edge computing.
Chapter 5 provides a description of the software which has three modules: stu-
dent, librarian and admin. These modules have unique features for searching for
library books with the title, author’s name, subject, ISBN/ISSN, etc. Within the
chapter the interfaces of the software are shown as images which is an abstraction
that may be developed on available mobile operating system like iOS, Android, etc.
The interfaces are designed bearing in mind that it will be used on cross platform
environments fulfilling minimum requirements using the IoT available in the mar-
ket. Furthermore, overall information is preserved with the help of cloud stor-
age while keeping parallel options for physical storage on the destination master
computer. The cloud-based system has given library management a new dimen-
sion while giving a new feature referred as εmanagement on the goε as a web or
abstract GUI.
Chapter 6 describes a systematic review that was conducted to determine
work done by various publishers on kidney cancer and to spot the research gaps
between the studies so far. The outcome of this study permitted the effective
diagnose of kidney cancer or renal cancer carried out using an adaptive neuro
fuzzy method with 94% accuracy. Although, many data mining techniques were
applied by researchers, the accuracy of these methods was less than the adaptive
neuro fuzzy method. This method is worthwhile to identify the diagnosis of renal
cancer better and more rigorously.
Chapter 7 explains a proposed approach to use edge computing in a trans-
portation and route-finding process in order to handle performance issues.
Huge demand for centralized cloud computing poses severe challenges such as
degraded spectral efficiency, high latency, poor connection, and security issues. To
handle these issues, fog computing and edge computing has come into existence.
xxviii Preface

One application of cloud computing is location based services (LBS). Intelligent


transport systems being the important application of LBS rely on GPS, sensors,
and spatial databases for convenient transport facilities. These location-based
applications are highly dependent on external systems like GPS devices and
map API’s (cloud support) for the spatial data and location information. These
applications acquire spatial data using API’s from different proprietary service
providers. The dependency on the API’s and GPS devices, create challenges for
effective fleet management and routing process in dead zones. Dead zones are
areas where no cellular coverage exists.
Chapter 8 describes the simulation and design of an optimized low-cost comb
drive based acoustic MEMS sensor. These sensors would be useful for condition
monitoring of automobiles on the basis of changes in sound waves emerging from
malfunctioning or defective parts of automobiles. These sensors can be developed
from silicon substrates. Simulation is done using COMSOL Multiphysics simula-
tion software based on finite element analysis. This optimized sensor is sensitive
for the frequency range of 30–300 Hz. This frequency range was obtained after the
FFT analysis of various signals received from engines using MATLAB software.
Chapter 9 offers an outline of developing the Internet of Things (IoT) technology
in the area of healthcare as a flourishing research and experimental trend at the
present time. The main advantages and benefits are considered in this chapter.
In recent times, several studies in the healthcare information system proposed
that the disintegration of health information is one of the most significant chal-
lenges in the arrangement of patient medical records. As a result, in this chapter,
we provide an detailed design and overview of IoT healthcare systems along with
its architecture.
Chapter 10 presents the combination of VANET and fog computing offering a
range of options for cloud computing applications and facilities. Fog computing
deals with high-virtualized VANET software and communication systems, where
dynamic-speed vehicles travel. Mobile Adhoc Netoworks may also require
low-latency fog computing in VANET and local connections within short dis-
tances. The modern state of the work and upcoming viewpoints of VANET fog
computing are explored in this chapter. In addition, this chapter outlines the
features of fog computing and fog-based services for VANETs. In addition to
this, fog and cloud computing-based technology applications in VANET are
discussed. Some possibilities for challenges and issues associated connected with
fog computing are also discussed in this chapter.
Chapter 11 outlines an idea to design an efficient data collection method in
the IoT network. IoT technology deals with smart devices to collect data as well
as to provide useful and accurate data to users. Many data collection methods
already exist, but they still have some drawbacks and need more enhancements.
Preface xxix

This chapter outlines detailed information about the design of a novel data collec-
tion method using fog computing in the IoT network. The main reason for using
fog computing over the cloud computing is to provide security to data which is
completely lacking in cloud computing. Now-a-days, security of data is one of the
most important requirements.
Chapter 12 provides an overview of using a fog computing platform for analyz-
ing data generated by IoT devices. A fog computing platform will be compared
with state-of-the-art to differentiate its impact in terms of analytics. Lots of data is
being generated in IoT based devices used in smart homes, traffic sensors, smart
cities, and various connected appliances. Fog computing is one area which is quite
popular in processing this huge amount of IoT data. However, there are challenges
in these models for performing real time analytics in such data for quick analytics
and insights. A fog analytics pipeline is one such area which could be a possible
solution to address these challenges.
Chapter 13 proposes a method of diagnosis based on the relationship between
patients and symptoms, and between symptoms and diagnosis using linguistic
variables by intuitionistic fuzzy sets. It then describes the state of some patients
after knowing the results of their medical tests by degree of membership and
degree of non-membership based on the relationship between patients and
symptoms, and symptoms and diagnosis. Later a max-min-max
composition and formula is applied to calculate the Hamming distance to iden-
tify the disease with the least Hamming distance for various patients. A revised
max-min average composition is applied to identify the disease with the maximum
score. Finally, it shows how urethral stricture in various patients is mathematically
diagnosed.
Chapter 14 discusses the types of attacks involved in the IoT network with their
counter measures, also covering the different layers, protocols, and the security
challenges related to the IoT. It is the capability of the device that makes the IoT
brilliant and this has been achieved by placing the intelligence into the devices.
The intelligence in the sensors is developed by adding sensors and actuators which
can collect information and pass it to the cloud through Wi-Fi, Bluetooth, ZigBee,
and so on. But these IoT network are vulnerable to different types of attack: phys-
ical, network, software, and encryption, and these attacks actually stop the IoT
devices performing their normal operations. So, it required that we must overcome
these attacks.
Chapter 15 discusses the domain of IoT integrated telehealth or telemedical
services with various segments where there is a need to work on advanced tech-
nologies to achieve a higher degree of accuracy and performance. As shown by the
research reports and analytics from Allied Market Research, the global value and
market of the IoT in telehealth and medical services will exceed 13 billion dollars.
From the extracts of Statista, the Statistical Research Portal the huge usage of IoT
xxx Preface

based deployments is quite prominent and is increasing very frequently because of


the usage patterns in various domains. In another research report, the usage pat-
terns of tablets in various locations from 2014 to 2019 shows that the figures are
growing. Because of these data, it is necessary to enforce the security mechanisms
for the IoT and wireless based environment.
Chapter 16 explores optimization in the IoT which is used to improve the
performance of network by enhancing the efficiency of the network, reducing
the overheads and energy consumption, and increasing the rate of deployment
of various devices in the IoT. The applications of IoT are smart cities, augmented
maps, IoT in health care etc. and various issues in IoT such as security, addressing
schemes etc. are discussed. Various optimization techniques such as heuristic
and bio-inspired algorithms, evolutionary algorithms, and their applicability in
IoT are described. Further the fruit fly optimization algorithm (FOA) and flow
chart of FOA is explored in detail. Finally the applications of FOA in IoT and
node deployment using FOA are explained. On the basis of observation FOA can
be used to increase the coverage rate of sensor nodes.
Chapter 17 chapter presents an overall and in-depth study of different optimiza-
tion algorithms inspired from nature’s behaviour. Today optimization is a powerful
tool for the engineer in virtually every discipline. It provides a rigorous, system-
atic method for rapidly zeroing in on the most innovative, cost-effective solutions
to some of today’s most challenging engineering design problems. The IoT is the
concept of connecting everyday devices to the internet allowing the devices to
send and receive data. With the IoT, devices can constantly report their status
to a receiving computer that uses information to optimize decision making. IoT
network optimization many benefits for improving traffic management, operat-
ing efficiency, energy conservation, reduction in latency, higher throughput, and
faster rates in scaling up or deploying IoT services and devices in the network.
Chapter 18 outlines the optimization techniques for intelligent IoT applications
in transport processes. The travelling salesman problem (TSP) has an important
role in operational research and in this case, it was implemented in the design
of the IoT application. The chapter describes some specific methods of solving,
analysing and implementing a possible solution with an emphasis on a technique
based on genetic algorithms. In this chapter we connect the TSP optimization
problem in transport and traffic with IoT-enabled applications for a smart city. In
the experimental part of the chapter we present specific development and imple-
mentation of the application for TSP with testing and experimental results.
Chapter 19 describes the impact of the Internet of everything solutions which are
connecting every object. This has generated a large amount of data. This amount
of data cannot be processed by a centralized cloud environment. There are applica-
tions where data needs real time response and low latency. The data being sent to
the cloud for processing and then coming back to the application generating data
Preface xxxi

can seriously impact the performance. This delay can cause delay in decision mak-
ing and this is not acceptable in real time applications. To handle such scenarios,
fog computing has emerged as a solution. Fog computing extends the cloud near
to the edge of the network to decrease latency as well as bandwidth requirements.
It acts as an intermediate layer between the cloud and devices generating data.
Chapter 20 is concerned with security and privacy handling issues occurred in
pervasive and edge boundary system for recognizing voice, sound using intelligent
IoT mining techniques. Fog computing is a promising registering worldview that
extends distributed computing to the edge of systems. Like distributed computing
yet with unique qualities, fog computing faces new security challenges other than
those acquired from distributed computing. This chapter studies existing writing
on fog figuring applications to recognize basic security holes. Comparable innova-
tions like edge figuring, cloudlets, and micro-server farms have additionally been
incorporated to give an all-encompassing survey process.
Chapter 21 focuses on fog computing and the second section deals with edge
computing. In this the author first introduces the basics of fog and edge computing,
its architecture, working, advantages and use cases, and then primarily focuses
on their security and privacy issues separately. In the end solutions and research
opportunities in both fields are discussed.

Closing Remarks
In conclusion, we would like to sum up here with few lines. This book is a small
step towards the enhancement of academic research through motivating the
research community and research organizations to think about the impact of fog,
edge and IoT computing frameworks, networking principles and its applications
for augmenting the academic research. This book is giving insight on the various
aspects of academic computing research and the need for knowledge sharing
and prediction of relationships through several links and their usages. This
includes research studies, experiments, and literature reviews about pervasive,
fog computational activities and to disseminate cutting-edge research results,
highlight research challenges and open issues, and promote further research
interest and activities in identifying missing links in cloud computing. We hope
that research scholars, educationalists and students alike will find significance in
this book and continue to use it to expand their perspectives in the field of edge,
fog and pervasive computing and its future challenges.
Deepak Gupta
Maharaja Agrasen Institute of Technology, India
Aditya Khamparia
Lovely Professional University, India
xxxiii

Acknowledgments

We would like to thank the many people; those who contributed, supported and
guided us through this book by different means. This book would not have been
possible without their guidance and help.
First and foremost, we want to express heartfelt gratitude to our Guru for spiri-
tual empathy and incessant blessings, to all teachers and friends for their contin-
ued guidance and inspiration throughout the period of our studies and career.
We would like to thank Wiley-IEEE Press publisher who gave us an opportunity
to publish with them. We would like to express our appreciation to all contribu-
tors including the accepted chapters’ authors, and many other contributors who
submitted their chapters that cannot be included in the book. Special thanks to
Mary Hatcher, Victoria Bradshaw, Teresa Netzler and Louis Vasanth Manoharan
from Wiley-IEEE Press for their kind support and great efforts in bringing the
book to completion. The encouragement of the Editorial Advisory Board (EAB)
cannot be overstated. These are renowned experts who took time from their busy
schedules to review chapters, provide constructive feedback, and improve the
overall quality of the chapters.
We would like to thank our dear friends and colleagues for their continuous
support and countless efforts throughout the process of publication of this book.
We express our personal and special thanks to our family members for support-
ing us throughout our careers, for love, the tremendous support and inspiration
which they gave throughout the years.
Last but not least: we request forgiveness of all those who have been with us over
the course of the years and whose names we have failed to mention.

Dr. Deepak Gupta


Maharaja Agrasen Institute of Technology, India

Dr. Aditya Khamparia


Lovely Professional University, India
1

Fog, Edge and Pervasive Computing in Intelligent Internet


of Things Driven Applications in Healthcare: Challenges,
Limitations and Future Use
Afroj Alam 1 , Sahar Qazi 2 , Naiyar Iqbal 3 , and Khalid Raza 2*
1
Department of Computer Science, Integral University, Lucknow, India
2
Department of Computer Science, Jamia Millia Islamia, New Delhi
3 Department of Computer Science and IT, Maulana Azad National Urdu University, Hyderabad

Abstract

The Internet of Things (IoT), fog, edge and pervasive computing are all emerging
technologies, which have several promising applications including healthcare. This
technology is witnessing a paradigm shift in the healthcare sector, moving out from
traditional ways of visiting hospitals. It connects the doctors, patients, and nurses
through smart intelligent sensor devices at low cost with high bandwidth networks.
In this chapter, we discuss these new computing paradigms precisely and present
their applications in ubiquitous healthcare. This chapter also covers various problems
and challenges that have been faced by practitioners in the last few years in the field
of cloud computing and the IoT that have been solved by fog, edge and pervasive
computing.

Keywords Fog Computing; Edge Computing; Pervasive Computing; IoT; Healthcare

1.1 Introduction
Today, the Internet of Things (IoT), fog, edge and pervasive computing are buz-
zwords, which have pivotal applications in different fields of studies including
healthcare, engineering, and other intelligent applications. Cloud computing and
the IoT have emerged as a new paradigm in the field of information and commu-
nication technology (ICT) as a revolution of the 21st century. It was a long-awaited
dream of to use computing as a utility. Traditional computing extends the model to

*Corresponding Author: kraza@jmi.ac.in

Fog, Edge, and Pervasive Computing in Intelligent IoT Driven Applications, First Edition.
Edited by Deepak Gupta and Aditya Khamparia.
© 2021 John Wiley & Sons, Inc. Published 2021 by John Wiley & Sons, Inc.
2 1 Fog, Edge and Pervasive Computing in Intelligent Internet

a cloud computing paradigm which has the capability to renovate a huge portion of
the information technology industry, making the software even more interesting
as a service that customers can access on-demand. The IoT acts as an interconnec-
tion between various gadgets and the Internet, including mobile phones, vehicles,
farms, factories, home automation systems, and wearable devices from the view-
point of the enhancement of the competence of real-life computing usage. This
new technology, especially in the healthcare sector, is a change from the conven-
tional approach of visiting clinics or hospitals. It links doctors, patients, and nurses
by means of intelligent, affordable sensor gadgets with the support of cloud com-
puting (Qi et al., 2019). Unfortunately, a number of IoT based intelligent sensor
gadgets are developing at a rapid rate. On the basis of evaluation, if the pace of
extension proceeds constantly from 2020, the number of wearable gadgets on the
planet will reach to around 26 billion (Imran and Qadeer, 2019). The volume of
data generated using these IoT gadgets is very large. The capability of the present
cloud model is not adequate to deal with the requirements of the IoT, i.e., the
current cloud has issues regarding volume, latency, and bandwidth. The current
cloud cannot fulfill every one of the prerequisites of QoS (Quality of Service) in the
IoT, therefore the goal is that another framework, fog computing, is introduced
that will solve the issues of volume, latency and bandwidth (Shi et al., 2015).
Fog computing has appeared with a new computation model which is placed
between the cloud and intelligence sensor-based IoT devices through which an
assortment of heterogeneous gadgets are pervasively associated as the terminal
of a network which provides communication facilities to ease the execution
of relevant IoT services (Chang et al., 2019). Fog computing covers the cloud
computing approach in the direction of the edge of the network, which has many
advantages over cloud computing. Fog computing is appropriate for the appli-
cations by which real-time, high response time, and less latency are important
issues, specifically in healthcare utilization (Mutlag et al., 2019). It is enabling
new or mutated applications and facilities with a productive transaction between
cloud and fog, especially with the issues of volume, latency, and bandwidth
regarding data management (JoSEP et al., 2010).
In this chapter, we propose to explain new trends of computing models to under-
stand the evolving IoT applications, exclusively fog and edge computing, their
background, features, model architecture and current challenges. This chapter
also covers various problems and challenges that have been faced by the practi-
tioners in previous years in the field of cloud computing associated with the IoT
that has been solved by fog, edge and pervasive computing (De Donno et al., 2019).
Further, because the Cybercrime Report 2016 suggests that cybercrime damages
will be around $6 trillion every year by 2021, up from $3 trillion in 2015 it will
cover how to secure the privacy of IoT based sensor devices and private data in the
cloud using machine learning. Further, we will demonstrate in this chapter that
1.2 Why Fog, Edge, and Pervasive Computing? 3

fog computing definitely reduces latency as opposed to cloud computing. The low
latency is significant for the medical IoT framework because of real-time require-
ments. Although the Cloud-based IoT (CIoT) structure is a typical way to deal
with executing IoT frameworks, it is, however, confronting developing difficulties
in the IoT. Specifically, CIoT deals with current challenges such as data transmis-
sion rate, latency rate, interruption, limitation of resource and secure system. The
developing difficulties of CIoT have brought up an issue – what is needed to con-
quer the barrier of current cloud-driven architecture? Fog computing architecture
is a visionary model that includes all probabilities to encompass the cloud to the
edge network of CIoT, from the distant central cloud datacenter, the interim sys-
tem hubs to the far edge where the front-end IoT gadgets are situated.

1.2 Why Fog, Edge, and Pervasive Computing?

Fog Computing
Fog computing is a distributed paradigm that provides computation, storage and
network facilities between client gadgets and cloud datacenters mostly but not
specifically situated on edge networks (Inbaraj, 2020). In such a way a cloud-based
facility can be enlarged nearer to the IoT gadgets/centers. In this scenario, fog
acts as a middle layer between IoT based sensor machines and cloud datacenters
(Bangui et al., 2018). The idea of fog computing was first created by Cisco in 2012
to report the difficulties of the IoT applications in traditional cloud computing.
The challenges of fog computing are the facilitation and enhancement of mobil-
ity, real-time interaction, privacy, security, low latency, low energy consumption
and network bandwidth for real-life applications where we need a quick response
from the cloud, especially in the healthcare sector.
One of the benefits of fog computing is that, in place of transferring the entire
data of IoT devices to the cloud, the fog will filter the data and then send a sum-
mary of the data. Another benefit is that fog computing processes the data before
transferring to the cloud and will lead to reducing the communication period rate
along with reducing the requirement of storage of massive data at the cloud. The
key role of fog computing is data gathering from IoT sensors gadgets, data pro-
cessing, data filtering and then finally sending a summary of the data to the cloud
(Mehdipour et al., 2019).

The Need for Fog Computing


Over the past decade, we have seen that the trend of storage, computing, control-
ling, and network management function over the data has been shifted from tra-
ditional computing to the cloud computing paradigm. On the basis of evaluation,
if the pace of extension proceeds constantly from 2020, the number of wearable
4 1 Fog, Edge and Pervasive Computing in Intelligent Internet

gadgets on the planet will reach around 26 billion (Imran and Qadeer, 2019). The
volume of data generated using these IoT gadgets is very large. The capability of
the present cloud model is insufficient to deal with the necessities of IoT, i.e., the
current cloud has issues of volume, latency, and bandwidth that will have a detri-
mental effect on the way the IoT works. This problem will need a real-time answer,
especially in the healthcare system (Mutlag et al., 2019; Kelly, 2016). So, another
platform is expected to meet these needs; a stage that we call fog computing or just
the fog because fog is a cloud near the ground (JoSEP et al., 2010).

Edge Computing
Edge computing is a developing model that allows computation to be executed
at the edge of network devices in support of a cloud downstream and upstream
for the benefit of IoT. An edge network is essentially comprised of client gadgets
(such as cell phones, smart devices, etc.), edge gadgets (such as routers, set-top
boxes, bridges, workstations, wireless access points etc.), edge servers, etc. and
these elements can be furnished with the essential capabilities for supporting edge
computation. If we deploy computing resources at the edge of the network, that
will improve the quality of service in a different application (e.g. in intelligent and
real-time healthcare system) in terms of the low latency of time, low bandwidth of
the network, optimizing cost, increasing privacy and providing high energy effi-
ciency. For example, fitness trackers act as an edge between bodies and clouds.
Research has proved that there are many benefits of edge computing, e.g. user
face recognition and response time is reduced by 900 ms to 169 ms when the com-
putation is deployed at the edge rather than the cloud. Also, energy consumption
reduced by 30%–40% by edge computing (Chun et al., 2011).
Edge computing brings two major improvements to the existing cloud comput-
ing. The first one is that edge nodes can preprocess large amounts of input data and
then filter the data to reduce the size before transferring it to the central servers
in the cloud. The other improvement is that the cloud resources are optimized by
enabling edge nodes with computing ability.

The Need for Edge Computing


Edge computing offers several advantages over traditional architectures, including
cost-saving, storing, and processing data faster. Some of the reasons for the need
are as follows.
Push from cloud services: In the last decade the IoT and Cloud of Things (CoT))
have started contributing to healthcare domains (Uddin, 2019). But, due to the
exponential increase of IoT based sensor devices in the large system, we have a
massive amount of data in smart healthcare (Tolentino et al., 2010). It is forecast
by the Cisco Internet Business Solutions Group that there will be 50 billion things
1.2 Why Fog, Edge, and Pervasive Computing? 5

to be connected to the Internet by 2020 (Bonomi et al., 2012). If all the data needs to
be sent to the cloud for processing, the response time will be too long and so we will
need huge network bandwidth. Some IoT applications, especially in healthcare,
might require a very short response time. In this case, the data needs to be pro-
cessed at the edge for shorter response time, more efficient processing and smaller
network pressure.
Change from Data Consumer to Producer: Nowadays most electrical devices are
IoT enabled which not only consume data but also produce data. For example: in
cloud computing, devices such as mobile phones at the network edge traditionally
only consume data, e.g., enabling a user to watch a video. Now, though, users
are also producing data with their mobile devices, such as by uploading posts
and photos to social networking sites. This change requires more functionality at
the network edge. Another example would be wearable health devices. Since the
physical data collected by the things at the edge of the network is usually private,
processing the data at the edge could protect user privacy better than uploading
raw data to the cloud (Mutlag et al., 2019).
Pull from IoT: as we know in the future most electronic devices will be IoT
enabled. These IoT based sensor devices generate a huge amount of data. For
example, fitness trackers, ECG, microwave-ovens, LED bars. These data we
have to send and request for processing to the cloud will be a huge load on the
cloud. Finally, we will face many problems like time latency, high bandwidth, etc.
These problems can be offloaded on the cloud by edge computing devices like
smartphones which act as an edge between humans and the cloud. By using edge
machines, we can reduce the burden of data, time latency and bandwidth on the
cloud.

Pervasive Computing
Pervasive computing, also called ubiquitous computing, was conceived by Mark
Weiser in 1988 at Xerox PARC. It is an embedded computational technology in the
form of a microprocessor in every object, these objects can communicate with each
other effectively and perform useful tasks. So, we can say that ubiquitous comput-
ing makes our lives convenient by creating digital atmospheres that are conscious,
robust, and receptive to human requirements. Pervasive computing can occur with
any device, any time, any place and in any data format across the network (Aazam
and Huh, 2015).
Pervasive computing has evolved not only in laptops and smart mobiles but
also in IoT based wearable devices, intelligent sensors, lighting systems and so
on. Nowadays pervasive computing has a big role in real-time healthcare systems
(Gia et al., 2015). Example: according to the current survey in China approximately
1 500 000 people die due to heart disease (Raza, 2019). What is happening is that
6 1 Fog, Edge and Pervasive Computing in Intelligent Internet

generally, it has been seen that heart disease patients stay at home and do not ask
for a doctor until they feel sick which occurs at a very late stage of the disease. So,
most patients die before getting any treatment.
Therefore, there should be a new paradigm for healthcare performance that
decreases the death rate which brings changes from the passive healthcare to per-
vasive healthcare model which will be a real-time monitoring system. Nowadays
we have healthcare services which are available only in hospitals. So, it is very diffi-
cult for elderly people or disabled people to fulfill their healthcare demands under
emergency conditions. In these cases, they have proposed pervasive healthcare to
deliver health services to everyone, everywhere, all of the time.

1.3 Technologies Related to Fog and Edge Computing


Mobile Edge Computing
According to the new Gartner prediction, that there will be 26 billion gadgets that
will become internet-enabled by 2020. The data generated through these devices
will be digitally representing the state of the physical world. Sharing this much
data in the network will have serious issues of security, privacy and misusing of
data by unauthorized users (Elhayatmy et al., 2018).
Also, to transmit this much huge data to the cloud for analysis and compu-
tation will be a heavy burden on the network, especially at peak times and it
is possible that network delays will increase exponentially for transmitting the
data to the cloud. Hence the service quality for various IoT applications will
decrease.
A novel approach to mobile edge computing shifts the computing analysis and
storage capacity from the remote data center to the Mobile Edge (ME) so that
we can reduce the latency time between end devices and computing devices.
This novel approach can free their workloads from computing devices to the
edge (Tabas and Glass, 2013). By integrating IoT with Mobile Edge Computing
(MEC), we can also enhance the Quality of Service (QoS) for IoT applications. As
we know IoT applications mostly obtain data from a variety of IoT gadgets and
produce business intelligence information by evaluating the obtained data, which
would be installed at the mobile edge (Ansari et al., 2018). Therefore, IoT devices
data will be transferred to the IoT applications without travel over the mobile
core web system. It can potentially speed up IoT applications in processing big
IoT data streams (Yousefpour et al., 2018).

Edge Cognitive Computing-based Smart Healthcare System


The industrial development and global environmental changes in a knowledge-
driven economy have increased the percentage of chronic disease, which is a threat
1.3 Technologies Related to Fog and Edge Computing 7

to human health (Tabas and Glass, 2013). In a traditional healthcare system, the
IoT devices transfer the clinical data to the cloud for diagnosis of disease, that
increases the time latency due to the heavy burden on the network because of huge
data on the cloud, and failure to produce real-time remedial analysis and services
in critical situation (Zhou et al., 2016a).
To overcome these problems, cognitive computing is exploited by medical pro-
fessionals. In an intelligent IoT application and a real-time healthcare system, it is
important to install the cognitive computing competency to the network edge and
follow up a cognitive study of the patient’s physical health and network devices.
This will reduce the latency time and allow many corresponding resources for
clients in a critical situation (Chen et al., 2018).

Similarities of Edge Computing and Fog Computing


Support for mobility: fog and edge computing applications both have features of
communication directly with mobile devices i.e. mobility support technique.
Real-time interaction with IoT devices: both applications have the capability of
real-time interaction i.e. quick response time which is very important in health-
care.
Energy consumption: in fog as well as at edge devices the consumption of energy
for computation is less compared to the cloud.
Heterogeneity support: both fog and edge computing nodes are available in
diverse forms and that will be established in a different variation of situations.
Low latency: fog and edge computing both reduce latency in comparison to cloud
computing.
Hardware Connectivity: both fog and edge computing support LAN, WAN,
WLAN, WiFi technology for communication with the cloud.

The Main Difference Between Edge Computing and Fog Computing


Edge computing mostly occurs upon edge devices (smartphone, smart object)
directly, through which sensors are attached or we can say that edge computing
acts as a gateway that is placed near to the sensors. Whereas fog computing shifts
the edge computing process towards the sensors that are connected to the LAN
or into the LAN hardware itself, so computing may be physically very far from
sensors and actuators (Zhou et al., 2016b).
In fog computing the computation of data is done at fog nodes or inside the LAN
which is situated at the IoT gateway. On the other hand, computation of data into
the edge computing is done upon the devices (smartphone, smart object) or on the
sensors (body fitness tracker) itself rather than transferred elsewhere (Vora et al.,
2017).
8 1 Fog, Edge and Pervasive Computing in Intelligent Internet

In fog computing the intelligent location and computation power are placed at
the local area network whereas edge computing is placed in the device itself (IoT
based sensor devices like ECG, smartwatch, smartphone) (Korzun et al., 2019).
Fog computing decreases a load of data on the cloud through filtering, which
means fog computing works with clouds, whereas edge computing exists without
the presence of a cloud. According to current edge computing, fog computing is a
superset of edge computing.
Fog computing has computation layer leverage devices known as Fog Com-
puting Nodes (FCNs), for example many-to-many gateways and wireless routers
which are useful for computation and storage of data from end devices locally
before sending it to the cloud. On the other hand, mobile edge computing says
that the arrangement of intermediary hubs with capacity and preparing abilities
in the base stations of wireless devices in this manner offers cloud computing
capacities inside the Radio Area Network (RAN) (Bonomi et al., 2012). Fog
computing follows de-centralized or hierarchical architecture whereas edge
computing follows distributed or localized architecture.

Characteristics of Fog in Comparison to Cloud


Features of fog computing are similar to cloud computing because both provide
the services as on-demand for computation, storage, and network gadgets.
Nevertheless, compared to cloud computation, fog computation implements near
IoT gadgets (Yousefpour et al., 2018). Some characteristics of fog computation
over the cloud are explained below.
Geographically cloud computing services are centralized, on the other hand we
need widespread deployment or locally deployment for fog computing applica-
tions, objectives and services that will be helpful for better administration to clients
on the edge of the network (Priyadarshini et al., 2019).
The proximity of fog computing near to the clients is one other feature of
fog computing compared to the cloud which is helpful for predicting the user
required services and provide real-time interaction for speedy services especially
in the healthcare system (Zhang et al., 2018).
There are lots of areas in which fog computing can play a better role than cloud
computing. Example: smart-traffic lights for enabling traffic indicators to clear
lanes on sensing the flashing light of an ambulance. Because in fog computing
we have real-time interactions with edge devices, these interactions are not as fast
due to high latency in the case of cloud computing because edge devices are very
far from the cloud (Peter, 2015).
1.4 Concept of Intelligent IoT Application in Smart (Fog) Computing Era 9

1.4 Concept of Intelligent IoT Application in Smart


(Fog) Computing Era
According to the new Gartner prediction, that there will be 26 billion
internet-enabled gadgets by 2020. These devices are health monitoring sen-
sors, wearable body sensor networks, consumer electronic devices, smart
vehicles, and all types of sensors coming under IoT (Mittal et al., 2017). This is
a new paradigm-shift from traditional interactions between sensor devices and
humans which provides the ubiquitous computing environment and realization
of smart hospitals, smart cities, smart healthcare, smart homes, and smart
vehicles that improve lifestyles (Dastjerdi et al., 2016a).
Scientists and investigators have estimated that by 2025 the number of economic
impacts will be reduced by 11 trillion annually, which would represent around 11
percent of the world economy IoT devices; and which requires the installation of
1 trillion IoT gadgets. It is predicted that after 2025 with the help of the IoT there
will be savings of $11 trillion annually that is a good economic impact because that
represents approximately 11% of the world economy (Dastjerdi et al., 2016a).
As we know most of the IoT based applications produce an unprecedented
amount of data, which needs computing resources, network bandwidth, storage
capability, heterogeneity, and others that have triggered a technological revolution
and are supplied through cloud computing. Most of the smart healthcare, smart
cities, and smart vehicles are connected with cloud computing, and this cloud
provides the services as on-demand and scalable storage, along with processing
facilities according to IoT application needs. However, cloud computing has
disadvantages in view of the large delay that negatively impacts IoT activity
which requires a real-time response (Mutlag et al., 2019). For example, for
health-controlling, critical response, and other inactivity sensitive applications,
the high delay activated for the data to the cloud and back to the application is
unsuitable.
According to a current survey of IoT applications related to the healthcare sector,
approximately 30 million clients are transferring data up to 25 000 records every
second which is not efficient for the cloud in terms of storage, computing and
bandwidth for real-time applications (Mukherjee et al., 2017).
Simultaneous with the increase in quantity there are different kinds of dynamic
end-user and access gadgets: tablets, smartphones, edge routers, intelligent build-
ing controllers, smart meters, and many more smart clients. So, it is very important
to understand “what we have to do near to the end-users’ devices?” Should your
Discovering Diverse Content Through
Random Scribd Documents
sincerely the Genevese gentlemen, for thus rejecting the influence of
the softer sex.

“Oh, woman! lovely woman! Nature made ye to temper man—


We had been brutes without you.”

The road to Lausanne lies alongside the lake, through a delightful


country abounding with vineyards, which produce the esteemed vin
de la Côte. We passed through the little towns of Nyons, Rouge, and
Morges, taking leave of our agreeable companions at the latter, and
arriving at Lausanne between two and three o’clock in the afternoon.
Before entering the town, we were amused with the economical
ostentation of our driver, who threw off a shabby old travelling dress,
and put on a fine red coat.

We found the Lion d’Or, to which we had been recommended,


quite full; when recollecting that I had an old college friend, Dr. V
⸺, residing at this place, we bent our steps to his house, with a
view of requesting him to recommend us an hotel; accordingly he
had the kindness to send his servant, to secure apartments at the
Hotel D’Angleterre; at the same time insisting upon our dining with
him. After dinner, Dr. V⸺ conducted us to the Jardin d’Arc, where
a society of gentlemen archers assemble in the evening for their
amusement: this is the spot from whence the panoramic view of
Lausanne, lately exhibited in London, was taken.

On the following day we visited the cathedral, and walked over the
town; the former is an ancient building, standing upon very high
ground, but which by its commanding view, I am informed, fully
repays the trouble of ascent.

In the evening we entered the circle literaire, an establishment


furnished with a good library, and where the newspapers and many
other periodical publications are taken in. One of the rules of this
society is, that no stranger can be admitted twice.

On Friday the 27th, we set out at an early hour, in a carriage called


a char, resembling a sofa placed lengthways on wheels, with a
curtained canopy over head, and an apron below, to protect the
traveller from the weather, to visit my friend R⸺, whom I have
before mentioned both at Toulouse and Montpellier, and who had
since taken a wife, and fixed himself near Vevay.

The road to Vevay throughout lies by the side of the lake, and is so
narrow, being bounded by a wall on each side, that it is impossible
that two carriages could pass each other. The sides of the mountains
that bound the road on the left, and which are so steep as to appear
inaccessible, are richly clothed with vineyards, artfully formed into
terraces, rising in tiers, one above the other. These terraces are
formed by strong and high stone walls, which preserve the soil from
shelving down, and are ascended by flights of steps. The vineyards
thus formed, are exposed to frequent injuries, and often to utter
destruction, by the rapid impulse of the mountain torrents
descending from above, and which occasionally sweep away wall,
terrace, and vines, in one indiscriminate ruin. These natural
visitations are, however, borne by the Swiss peasant with
resignation; and notwithstanding he may have lost the whole harvest
of his hopes, he immediately applies himself, to repair the injury,
burying the past in the anticipation of the future.

On arriving at Vevay, we found my friend on the look out for us,


and were immediately conducted to his house two miles beyond the
town, and introduced to his lady. After breakfast he took us to the
famous prison of Chillon, the subject of one of Lord Byron’s eccentric
poems, and which was three miles distant. Here, in the year 1530,
the patriot Bonnivard was doomed, by the duke of Savoy, to a
confinement of six years, in one of its most dismal dungeons.

“Lake Leman lies by Chillon’s walls;


A thousand feet in depth below,
Its massy waters meet and flow;
Thus much the fathom-line was sent
From Chillon’s snow-white battlement,
Which round about the wave enthrals.
A double dungeon, wall and wave
Half made, and like a living grave.
Below the surface of the lake
The dark vault lies⸺”

We entered this celebrated vault, and examined the seven “pillars


of Gothic mould,” but which, at present, retain only four of the seven
rings described by our poet, three pillars being without them; the
chains, said to have been connected with these rings, have entirely
disappeared.

After spending a very happy day, we were obliged, but with the
greatest regret, to leave our kind friend at an early hour, as we had
to prepare for our intended departure from Lausanne early on the
following morning.

But we were disappointed in our latter views, owing partly to the


weather, and partly to the difficulty of procuring a suitable
conveyance; we secured, however, places in a voiture for the
following morning, and made ourselves perfectly ready for setting
out.

In the morning, at an early hour, we were prepared for our journey.


We waited until six o’clock, when a man came to look at our luggage,
after which, a variety of excuses were sent, which terminated in our
being informed, that the voiture would not go that day, but that we
might be sent in a char to Berne, for which town, we had taken our
places. For a time, we insisted on the fulfilment of our agreement,
but, beginning to apprehend we should otherwise be prevented from
getting away to-day, we at length agreed to put up with the char. It
was accordingly brought forward; on placing, however, my friend’s
trunk behind it, this was found too large to be attached, without a risk
of injury on both sides. In consequence, they were obliged eventually
to convey us in the voiture; I am convinced, that in obtaining this
point, we were indebted entirely to their fears of offending Dr. V⸺.

I cannot leave Lausanne without paying the due tribute of gratitude


to this gentleman and his worthy father, for their kind attentions
during our stay at that place.
CHAP. XXVII.
FROM LAUSANNE TO STRASBURG.

After leaving Lausanne, we arrived at Maudon about noon, where


we dined with an English party that came in soon after ourselves.
We afterwards proceeded to Payerne, where we rested for the night.
At this place, a small, but short down-bed was placed loosely over
the coverlet, so that one slept both under a bed, and over a bed; this
is not uncommon in various parts of the continent; but however
comfortable the custom may be in winter, it was by no means
agreeable at midsummer.

On the following morning, after leaving Payerne, we passed


through the ancient town of Avenche, and the neat one of Morat,
close to a lake of the same name. We stopped to dine at the village
of Gummingen, situated on the banks of the Sarine, over which,
there is a covered wooden bridge, and which is distant about four
leagues from Berne. From hence we ascended a steep hill, from the
top of which, the town and lake of Neuchatel are visible. At half after
six in the evening, we arrived at Berne, where, finding the principal
inn full, we were obliged to put up with a secondary one; however we
were well accommodated.

We employed the following morning in examining this interesting


city: we promenaded the ramparts, and the fine public walk near to
the cathedral, which is greatly admired for its commanding view. This
was once the only public walk which the town possessed, but a new
one said to surpass it in magnificence, has been formed along a high
bank on the side of the Aar, which looks proudly upon the city and
country, with the Glaciers in their vicinity.

Berne is built with much regularity and some magnificence; the


houses are chiefly of white free-stone, and uniform in their height
and appearance; in the principal streets, piazzas are erected on
each side, over foot-paths elevated some height above the carriage
road, through the centre of which, runs a small and rapid stream led
off from the Aar, which gives a refreshing coolness to this part of the
town, and, at the same time, promotes its cleanliness.

The public buildings are particularly fine, especially the cathedral,


churches, and the arsenal.

My friend was much amused with the costume of the Bernoise


females, and in particular the peasantry from the country, who came
to supply the markets; their head-dress was very peculiar, and they
wore curious black cloth petticoats, so short as not to reach the
knee, with white stockings. The ladies and towns-women, however,
have adopted the greater length of petticoat.

On Wednesday, the 1st of August, we set off in a carriage, termed


a berlin, for Basle, distant eighteen leagues, paying as many francs
each for our places, and in company with a French gentleman, and a
Bernoise woman, in the dress of her canton. We arrived at Soleure
for dinner, which is an agreeable little town on the banks of the Aar;
the houses are particularly neat and clean, and at the same time
built with considerable taste. We visited the catholic cathedral, which
is a remarkably neat modern structure.

The country between Soleure and Basle is very hilly, and regarded
as beautiful beyond description. We slept at a village five leagues
from Basle, at which place we arrived about noon on the following
day.

We took up our residence at the Three Kings, situated on the


banks of the Rhine, over which majestic river, the windows of our
apartment projected. This town, except in point of situation, is very
inferior to Berne.

After dinner, we crossed the river by a wooden bridge to Little


Basle, with a view of inquiring into the possibility of getting down the
Rhine by boat; for we found there were no passage boats, as we had
been led to expect. We were informed that a boat was loading, which
would probably set off in a day or two days’ time; but, upon
consideration, were induced to prefer accompanying the French
gentleman with whom we had travelled from Berne, and who was
proceeding by diligence on the following morning.

We remarked a custom peculiar to this place, which, however,


has, I believe, been noticed by several travellers, that of keeping the
clock one hour in advance of the regular time. The following
explanation of the origin of this custom has been given. The
magistrates having received information of a plan to make a sudden
attack on the city at one o’clock on the morning, ordered the town-
clock to be put forward an hour. The enemy, hearing it strike two,
considered that their design had been discovered, and abandoned
the attempt. In commemoration of the event, it has ever since been
kept an hour in advance.

We left Basle for Strasburg, at eight o’clock in the morning of the


3rd of August, and entered France at the little town of St. Louis,
where our baggage underwent the strictest examination which we
had yet experienced, in consequence of the extensive illicit
introduction of Swiss manufactures, and particularly cambrics, into
France. A merchant, who was in our company, informed us, that
when once travelling in a carriage of his own, the officers threatened
to break it to pieces, unless he declared in what part the illicit goods,
which they were convinced he had with him, were concealed, stating
that they had information of its having been constructed for that
express purpose; they were only prevented from putting their threats
into execution, by his declaring, that as it contained nothing
contraband, he would certainly compel them to make good the
damage.

We dined at Mulhausen, famous for its fine printed cambrics, silks,


and calicoes, and where we were amused, as well as benefited, by
the economy of one of our French companions, who proposed, as it
was an early hour for dinner, that we should take only a petit dinér,
and which would be charged half-price: we assented to his proposal,
and certainly had as good and full a dinner as we could wish,
consisting of soup, entré, rôti, vegetables, a dessert, and un demi-
bottaile du vin.

We reached Colmar about seven o’clock, where we rested three


hours, after which we travelled all night, arriving at Strasburg at four
o’clock in the morning, and taking up our quarters at the Maison
Rouge. After dinner we walked to a bridge of pontoons over the
Rhine, about a league distant from the city, which we crossed, to the
gates of the small town of Kehl; on our way back, we found the bar
of a bridge over one of the tributary streams to the Rhine closed; our
passage was thus obstructed, but we got over it without difficulty, an
offence for which we only escaped arrest by pleading, as strangers,
our ignorance of the regulation. On our arrival at Strasburg, also, we
were but just in time to enter before the gates were shut; had we
been a little later, we must inevitably have been excluded for the
night.

On the next day, Sunday, we visited the noble Gothic cathedral,


which possesses the highest and finest steeple in the world, the
summit being five hundred and seventy-four feet from the ground.
This we ascended, and I had the temerity to mount some feet higher
than my companions, which procured me a severe lecture; I had no
small difficulty to convince them that the sense of touch, on which I
depended, was less likely to deceive than the eye, when the dizzy
height would make the

“⸺brain turn, and the deficient sight


Topple down headlong.”

This cathedral is remarkable for the numerous allegorical figures


about it, intended to expose the licentious and crafty characters of
the Monks of former times. We had the works of the renowned clock,
once one of the wonders of Europe, laid open to us, and which
describes the various revolutions of the heavenly bodies.

On our return, we found a military parade in the place where our


hotel stood, the band of which played a variety of fine airs.
On inquiring respecting conveyances down the Rhine, they
informed us, that the Coche d’Eau, which only goes once a week,
had unfortunately set out the morning of our arrival; and as the
diligence goes but twice a week (on Mondays and Thursdays) we
lost no time in securing our places for the morrow, as far as Spire,
being led to hope that we should find water conveyance, from that
place to Mayence.

We might indeed have gone down the river in a trading boat,


numbers of which are frequently going from, or passing by
Strasburg; but the accommodations are not to be depended upon,
and there was some uncertainty in their arrival and departure.

In the evening, after securing our places, we walked into the public
gardens, from whence a balloon was sent off, and which was
constructed in the shape of a wine cask, with a Bacchus astride it.
This was succeeded by a display of fire-works, with music and
dancing.
CHAP. XXVIII.
STRASBURG TO COBLENTZ.

We left Strasburg at half after six in the morning still in company


with our former French companion. In addition, we had, in our
diligence, two elderly French ladies, who were very chatty and
agreeable; they quitted us, however, in the afternoon, when in lieu of
them, we took in a very nice young woman going to her husband at
Gemmingen; and a merchant’s clerk, who had previously been
occupying the cabriolet. At eight in the evening we arrived at
Landau, were we slept at a most comfortable inn.

The whole of the next day was alternately fine and showery. When
we had travelled two leagues from Landau, the spring of the carriage
broke down, and detained us two hours. We noticed that the wife of
the blacksmith, who repaired it, assisted her husband throughout the
process, and appeared even the more dexterous of the two. On
entering Gemmingen, however, their work gave way, and we were in
consequence detained two hours longer; even this afterwards broke
out again, but fortunately just as we reached the end of our journey.
These delays were mortifying enough, as we did not reach Spire
until three in the afternoon, instead of nine o’clock in the morning, as
we had expected.

On our arrival at Spire, we might have proceeded forward


immediately in the diligence to Mayence, and which our French
companion availed himself of, but we preferred waiting until morning,
in the hope of finding a conveyance by water. We were however
disappointed, and obliged in the morning to leave Spire in a double
bodied diligence, the back part of which we had to ourselves. We
breakfasted at the Red Lion at Frankendal, a circumstance which I
more particularly mention, because I was highly pleased with the
attentive and feeling manner in which an interesting young woman
waited upon me.

About two leagues beyond this place, there is a bridge over the
Rhine, leading to the beautiful town of Manheim, situated on the
opposite bank of the river. After this we passed through Oppenheim,
Worms and Inheim, dining at the latter, and then proceeding to
Mayence, where we arrived about five o’clock, and took up our
quarters at the Three Crowns, an excellent inn, to which we had
been recommended by our French friend, who had left us at Spire,
under a promise of rejoining us here. He shortly afterwards came in
and informed us, that besides arranging his own business, he had
ascertained that a large boat sets out for Coblentz every morning at
six o’clock, the fare in which was six francs, with an additional trifle
for the luggage; this vessel, after stopping to dine at Bingen, arrives
at Coblentz, a distance of eighteen leagues, between six and nine
o’clock in the evening, according to the state of the wind; for sails are
made use of whenever the latter is favourable. In consequence of
this report, we determined to secure our passage for the morrow.

Mayence is an interesting town, and the bridge over the Rhine,


fortifications, and promenades, worthy the attention of the traveller.
There are a number of water-mills moored on the river, which make
a singular appearance. The town was at this time garrisoned by a
medley of Austrian, Prussian, and Brandenburgh troops.

The morning proved, unfortunately, both cold and showery, and of


course unfavourable for our journey by water. At six o’clock we left
Mayence. Notwithstanding the disadvantages of weather my friend
was highly interested by the beautiful scenery displayed on the
banks of this magnificent river, consisting of castles, ruins, villages,
and picturesque cottages, bounded by vine-clad mountains. On the
right we passed the mountain of Johansberg, celebrated for its
wines.

While dining at Bingen, twenty miles below Mentz, the grand duke
Nicholas of Russia passed through, on his way from the baths of
Emms, to visit the duke of Nassau, whose castle is situated on the
right banks of the Rhine, about four miles below Mentz.

Our dinner party consisted of a motley group of various nations,


some of the individuals composing which, were pleasant, agreeable
people. Amongst them were, what is in some measure unusual, two
or three loquacious Germans; and also a humorous old Dutchman,
from whom my friend elicited much information respecting the best
route to Amsterdam. We felt inclined to have prosecuted our journey
into Holland with this latter person, in order to have availed ourselves
of his local information; but it is questionable whether a plan of this
kind generally answers, for, on the continent, one does not always
find liberality enough in fellow-travellers to put one on his guard
against the impositions of their countrymen. We had a strong
illustration of this about the present time. I have frequently
mentioned a French gentleman with whom we had been travelling
from Berne, and to whose kind attentions and gentlemanly conduct,
we felt ourselves on a variety of occasions, highly indebted: one day,
another Frenchman who had also been travelling with us, proposed
to him to direct the landlord of the inn where we dined, to charge C
⸺ and myself double the established price, so as to let them off
without payment. Our friend most indignantly rejected the proposal,
asserting that he was a disgrace to his country, and that it was the
conduct of such scoundrels, which led to the traduction of its
character.

I must name one other individual of our dinner party at Bingen,—a


watchmaker, with a pack-full of watches, some of which he exhibited
to us; his prices were from six francs, to twice as many Louis, each;
several of our companions purchased of him at the former rate. How
he could afford to sell upon such terms, it is not easy to account for,
without supposing that he must have stolen his goods. He was a civil
middle-aged man, and had travelled over a great part of Europe,
and, in particular, followed the French army into Russia, where he
sold great numbers of his watches to the soldiers in exchange, I
suppose, for their plunder. After dinner we recommenced our
journey, and at half past eight arrived at Coblentz.
We were recommended by some of our fellow-passengers to fix
ourselves at the Pomme d’Or at this place, which proved, however,
to be only a second rate inn; and we afterwards learnt that the hotel
of the Three Swiss is the preferable one for travellers proceeding by
the Coche d’Eau.

On the following morning, we made a party with two young


Germans to visit the baths of Emms, distant about three leagues on
the other side of the Rhine; for this purpose we engaged a coach, to
convey us over one of the worst roads we had yet met with.

The bathing establishment at this place is perhaps the most


commodious in the world. The main building contains two hundred
and twenty lodging-rooms, at different rates; the prices of each being
marked on the doors; it comprises, besides, several beautiful
saloons for tables d’hôte, &c. We found a party of no less than three
hundred dining in one of them, as well as smaller parties in other
rooms. The ground floor is laid out in elegant shops and baths. In a
newly attached part, there is a most noble coffee-room, with billiard
and faro rooms.

The scenery around this spot is extremely beautiful, and bounded


by mountains rising majestically into the clouds, clothed to their very
summits with rich vineyards. These baths are the property of the
duke of Nassau, whose capital is about a league distant, and half a
mile from the village of Emms, through which my friend and myself
passed on our return in the evening, having left our German
companions behind us.
CHAP. XXIX.
COBLENTZ TO UTRECHT.

On the 11th of August, at six o’clock in the morning, we left


Coblentz in the Coche d’Eau. Amongst the companions who most
interested us, was a young Polish gentleman, undoubtedly a man of
family, and who had been studying at one of the universities on the
Rhine; we were much pleased with his merry convivial manners, and
apparent liberality of sentiment; he seemed desirous of gaining
general information, and was probably travelling with that intention,
as he was well acquainted with the French and German languages,
and spoke of visiting Italy and other parts of the continent within no
distant period.

At eleven o’clock we rested an hour for dinner, and at three landed


for a short time at Born, at which place we received on board, for the
diversion of the party, a fiddler, who, for at least three hours, tortured
our ears with a variety of the most discordant strains, both vocal and
instrumental, that can be imagined. A French gentleman and lady
also entered our vessel at this place, and accompanied us for a few
miles, when they disembarked at an interesting part of the river; they
were making a journey along the Rhine upon this principle, and an
excellent mode to us of enjoying its beauties. After leaving Born, we
passed a large and beautiful island, with a convent upon it. About
four o’clock, the country suddenly changed from a mountainous into
a rich champaign appearance. At eight in the evening we reached
Cologne, and placed ourselves at the Hotel de Mayence. We here, in
the newspapers, met with a first account of the Queen’s illness, and
which was accompanied by a report of her death.

We had no time to visit the churches and other interesting objects


at Cologne; amongst which, one of the most celebrated, is the house
where Rubens was born. Nor could we examine the flying, or rather
floating bridge over the Rhine, formed by two immense barges
fastened together, and which are decked, and railed round to prevent
accidents, and said to be sufficiently capacious to receive at least
one thousand persons, besides carriages, &c. at one time; it is
secured from passing down the stream, by an anchor in the middle
of the river; on the tinkling of a bell, the whole is set at liberty, when
the force of the current, assisted by the rudder, carries it to the other
side; this is repeated every quarter of an hour.

Cologne is a dull old town, containing many narrow ill-paved


streets. Every one is acquainted with its celebrity for the manufacture
of the favourite perfumed spirit, the eau de Cologne. Originally there
was only a single manufactory of this article, but the demand has
now so greatly increased, that ten different establishments are
engaged in it. We were informed that it sells here for eight francs the
case, containing six bottles. We were anxious to have purchased a
few for the benefit of our fair friends, but the risk of seizure deterred
us from gratifying our wishes.

At this place our agreeable French companion, who had


accompanied us from Berne, took leave of us; his name was M.
Gerard Mignon, a Champagne wine-merchant of Rheims, and had
been a captain in the French army; he intended passing by Aix la
Chapelle to Brussels, at which latter place I promised myself the
pleasure of again meeting with him.

We had proposed following the course of the Rhine as far as we


could towards Amsterdam, to which place I had agreed to
accompany my friend on his way to Russia; but on inquiry we found
there was no regular water conveyance, and therefore determined to
avail ourselves of a return Berlin to Cleves, for which we were to pay
sixteen francs each; and as the journey would occupy two days, this
was perhaps reasonable enough for this country.

At nine o’clock on Sunday morning we set out from Cologne, and


travelled throughout the day over heavy sandy roads; on this
account our driver shewed great consideration for his horses, as he
stayed to refresh them every two hours with bread and water; with
this view he had provided a number of loaves before setting out, and
which at first we supposed were intended for his own use. We dined
at a town named Nais, and halted for the night at Crevelt, a small but
well built town, celebrated for its manufactory of silks and velvets.

Our apartments at this place were so grand, that we thought


proper to inquire the price of them, which greatly hurt the landlord’s
feelings, and led him into a long explanation of his honourable
principles; he said he had fixed prices; and I must admit, that on
leaving, we had no cause to think them unreasonable. We had,
however, an additional charge made upon us, in consequence of
declining to take supper. The German innkeepers are sure to be
offended if you inquire their charges. It was Sunday evening, and our
host politely invited us to accompany him to their weekly ball, but we
preferred going to bed.

On Monday morning, after an early breakfast, we recommenced


our journey; and again resting our horses every two hours, arrived
about twelve o’clock at a small village, where we dined. In the
afternoon, we fell in with a return vehicle, a kind of cabriolet with two
horses, going to Nimeguen, which kept company with us till four
o’clock; when our driver succeeded in persuading us, that by taking
this opportunity we should reach Nimeguen to-night; as the driver
would turn off, leaving Cleves on the left, and make a nearer cut by a
league; whereas, otherwise we should not be able to advance farther
than the latter place this evening, and unable to proceed by
diligence, before noon next day. Anxiety to get forward, induced us
to avail ourselves of this push; but I think we never, in our whole
lives, travelled in so uneasy a vehicle, or over more wretched roads;
in addition, it began to rain very fast, and the curtains of our carriage
were unable to protect us. After passing through a wood, about
seven o’clock, we reached a decent kind of town, where our driver
fed his horses well; first with bread, and afterwards with chopped hay
and corn, placed before them in the street in a portable manger.
After this we proceeded on to Nimeguen, through an exceedingly
heavy sandy road. A short time before we reached this place, we left
the Prussian and entered the Dutch territories, without the least
interruption from the custom-house officers: instead of the usual
bureau, we only found an inn for entertainment; nor were we
detained in the least on this account, on entering Nimeguen,
although it is a strongly fortified and frontier town. We drove to an
inn, called the Post Waggon, which, however, we found so full, that
we were obliged to have beds made up in our sitting-room; the
civility with which we were here treated, induced us to give this
arrangement the preference to seeking out another inn. Before
retiring to bed, we secured our places for Utrecht in the diligence, or,
as it is here called, the Post Waggon, and which was to depart at half
after six in the morning.

On Tuesday, soon after leaving Nimeguen, we crossed the Waal


(a branch of the Rhine) on a flying bridge, which had two or three
small cabins built upon it, and masts with flags flying. We here
completed our complement of passengers, and had much
disputation respecting places, which a man belonging to the coach
settled in a very rough authoritative manner. We were tolerably
fortunate in our situation, for the carriage was a clumsy inconvenient
machine, with a front, back, and middle seat, intended for nine
passengers, and the roof timbers without lining.

This unfortunate outset was, however, succeeded by an


unexpected interesting conversation: amongst other agreeable
companions, we found a professor of the university of Leyden, who
advocated with great warmth the literary character of his country;
and asserted, in particular, that it had produced a number of poetical
works of higher merit than the world were disposed to admit of; that
even his own countrymen had not duly appreciated them; but that he
trusted the efforts, which were then making at Leyden, to collect and
make them public, would tend to remove this stigma. As none of us
were acquainted with the authors he enumerated, he remained, of
course, undisputed master of the field.

The professor’s wife, and their son, were also of the party; the
latter was a handsome lad of fifteen, who sat in the cabriolet, and
occupied himself in smoking a pipe nearly half as long as himself.
We expressed our surprise at his being allowed to indulge himself in
this manner, but his mother stated that he had entered the college,
and therefore was of the age when it was customary to commence
inhaling the fumes of this deleterious herb.

“Pernicious weed! whose scent the fair annoys,


Unfriendly to society’s chief joys;
Thy worst effect is banishing for hours,
The sex whose presence civilizes ours.”—Cowper.

But the ladies of Holland are too much used to this custom, to find
it disagreeable; not only habit, but an opinion of its utility, tends to
reconcile them to it. If it possesses any quality in destroying
contagion, I am disposed to imagine that this must depend upon the
stronger poison subduing the weaker, like Aaron’s serpent
swallowing up the rest.

We had also, in our party, a mild, pleasant, and well-informed


Swiss clergyman, the pastor of a protestant church at Hamburgh.

After dining hastily at a village on the road, we continued our


journey through a country, which my friend C⸺ described as
beautiful, and possessing a novel character; we passed Dry Bergen,
or three hills, a place much frequented in summer by the richer
inhabitants of Amsterdam and Utrecht; and afterwards a beautiful
village, where there is a magnificent chateau inhabited by Moravian
missionaries; although the roads were excellent, in consequence of
frequently baiting our horses, we did not reach Utrecht before half
after four o’clock; having occupied ten hours in accomplishing a
journey of only forty-two miles.
CHAP. XXX.
UTRECHT—AMSTERDAM.

On arriving at Utrecht, we were prevented from proceeding to


Amsterdam by boat, the same evening, as we had intended, in
consequence of heavy rains; and, by the recommendation of one of
our passengers, took up our quarters at an inferior inn, near which
the diligence stopped. The fire-pan, tobacco, and other
accompaniments for smoking, were very shortly placed before us for
our entertainment, and the good people seemed much astonished
that we should prefer the more simple enjoyment of tea.

This city is celebrated for having been the first to shake off the
galling yoke of Spain in the year 1579. It was here that the seven
provinces formed their alliance, under the counsels of William, prince
of Orange, in a conference known as the treaty of Utrecht.

In the morning, we prepared early to set off by the barge or


treckschuyt for Amsterdam; but, before leaving, we were destined to
meet with a specimen of Dutch manners. The master of the inn
made a most exorbitant charge, and, when my friend questioned it,
he repeated the sum in a rough manner, without deigning to give any
other answer, at the same time, approaching with a menacing
aspect; my friend took him by the shoulder and pushed him off; this
lowered his tone, but he was aware that we had no time to contest it,
as we must either set off instantly to gain the barge, or lose our
passage, and therefore obstinately adhered to his original demand,
and upon the principle of choosing the least of two evils, we thought
prudent to comply with it.

After traversing a great part of the city, we fortunately reached the


barge just as it was on the point of starting. There were three cabins,
of different prices, and we had the honour of being placed in the best
or aftermost, for our conveyance in which, and luggage, we were
charged thirty-one stivers each, equal to about half-a-crown; this, for
a journey of twenty miles, we could not complain of. The scenery
along this canal, my friend stated to be beautiful in the extreme; in
short, it is regarded as the most interesting and characteristic picture
that this country displays, and realizes the description of our amiable
poet, Goldsmith.

“The slow canal, the yellow-blossom’d vale,


The willow-tufted bank, the gliding sail,
The crowded mart, the cultivated plain.”

We heard them very merry in the fore cabin, but had the one we
occupied to ourselves until about noon, when two elderly Dutch
ladies, who were conversant in French, joined us, and proved
agreeable companions, although they were negative characters.

We rested for a short time at a house of entertainment on the


banks of the canal, where we were refreshed with buttered rolls,
which had slices of cheese laid between the divided halves. At half
after two, we arrived at Amsterdam, and took up our residence at the
Wapen van Amsterdam, instead of the City of Hamburg Hotel, to
which we had been recommended, a mistake we were not aware of
until some hours afterwards; however, it was one of the best inns in
the place, so that we had no reason to feel disappointed. At the table
d’hôte, charged thirty stivers per head, we met with a countryman of
ours, Mr. W., with his wife and daughter; and after dinner, were
conducted by him to a coffee-house, where, from the English papers,
we became acquainted with the particulars of her late majesty’s
death.

On the following day, August the 16th, notwithstanding it was


disposed to be rainy, we accompanied Mr., Mrs., and Miss W⸺ to
Broeck, and Saardam. After passing in a ferry-boat to Brocksluyh,
we engaged a tilted carriage, capable of containing nine persons,
constructed like a caravan, the sides with neat open work, and
canvas curtains to keep out the weather.
We arrived at Broeck for breakfast, and the day now proving fine,
our party were delighted with the novel and extraordinary
appearance, and cleanliness of this little paradise. In each house,
there is one particular door which is always kept closed, except on
the occasion of a wedding or funeral. The gardens are the very
picture of elegant neatness; in some of them the shrubs are
arranged and cut into the shapes of tables and chairs, or other
fanciful forms; the ground is laid out in pleasing walks and parterres,
and the eye enchanted with the most beautiful variety of flowers.

We now proceeded to Saardam, where the first circumstance


which attracted our notice, was a new married couple, returning from
church to take coffee, previous to enjoying the wedding dinner; on
this occasion, we were informed that the bride’s fortune was a
number of windmills, an article that Amsterdam and its
neighbourhood abounds with. Our leading object, however, was to
visit the house once occupied by Peter the Great, consisting of two
small rooms with an enclosed recess for a bed; the door of which we
opened, while some of us stepped within the frame on which the bed
had rested. A board was suspended from the ceiling, with an
inscription in the Dutch and Russian languages, of which, the
following is a translation.

“Nothing is too little for a great man.”

The Emperor Alexander visited this spot in the year 1813, and left
two Latin inscriptions on marble, commemorative of the event.

After this, we walked about the village, visited the church, and
returned to Amsterdam for a late dinner, highly gratified with our
day’s excursion.

We devoted the greater part of the next day to examining the city
of Amsterdam, which is so intersected with streets, canals, and
bridges, bearing a strong similarity to each other, that it is not an
easy matter to gain an accurate knowledge of it. It takes its name
from the river Amstel, and Dam, signifying a mound, raised to
prevent this river from overflowing the surrounding country. The city
is principally built upon piles, driven into the morass to form a solid
foundation, and of which it is said, that no less than thirteen
thousand are fixed under the Stadt-house alone. We visited the
Exchange, one of the finest buildings of the kind in Europe. After
this, we entered a Jew’s synagogue, the noisy and discordant
devotion of which, soon tired us, so that we were glad to take our
departure, particularly as we had no expectation of being permitted
to bid for the key of the sanctum sanctorum. We regretted this day,
parting from our new and agreeable acquaintance, Mr. W⸺ and
his family, who left us for Utrecht.

On the following morning, one of the partners of the bank of


Messrs. Melvil and Co. with whom I had done business the day
before, called to rectify some trifling error in the discounts, and
understanding that I was proceeding alone, kindly gave me a letter of
introduction to a friend at the Hague.

The time was now approaching, when my friend C⸺ felt


compelled to separate from me; he had from day to day deferred his
departure for St. Petersburg, in hopes of effecting a more agreeable
arrangement for his journey, than had previously offered itself; for he
would have been obliged to have pursued his journey partly by
canal, and partly by land, and the latter night and day, for nearly a
week unremittingly, through a wild country, and along dreadful roads.
He had, however, some prospect, as far as Hamburg, of the
company of the Swiss clergyman, who travelled with us from
Nimeguen to Utrecht, but here he was disappointed, for this
gentleman was uncertain when he could depart, and on account of
the advanced state of the summer, and possibility of the winter
setting in early, my friend thought it imprudent to delay any longer;
he therefore concluded upon setting out in the evening of Sunday
the 19th, by a vessel which crosses the Zuyder sea to Lemner, from
whence he was to proceed by diligence or canal to Groningen,
where he would find a conveyance to Bremen and Hamburg.

On Sunday morning, we visited the new church, the organ of


which is said to be the largest in Europe, and to exceed the
celebrated one at Haarlem. After this, we went to the Stadt-house,
one of the most magnificent buildings in Europe; the foundation-
stone of which, was laid in the year 1648; it is built of freestone, two
hundred and eighty-eight feet in length, two hundred and thirty-five
broad, and one hundred and sixteen in height, to the top of the roof.
The grand saloon is one hundred and twenty feet long, and one
hundred high. We ascended the tower, the view from whence my
friend C⸺ described to be most extensive, and extremely
beautiful, commanding the whole of the town and harbour, and a
considerable surface both of land and water.

We were anxious to have visited the dock-yard, and a variety of


other places in this interesting city, but it became necessary that we
should prepare for our respective departures, as I had determined to
set off to Haarlem, on my way to Brussels, at five in the evening; and
much of our time was frittered away in the unavoidable
arrangements for conveyances, &c. I was induced, in preference to
taking the diligence for Rotterdam, to pass by the barge through the
Hague, as this would afford me the better opportunity of gaining an
acquaintance with the country and its inhabitants.

I shall not attempt to enter into any particular description of the city
of Amsterdam, but merely observe, that I was forcibly impressed with
an idea of its similarity to Venice; both are situated on marshy
grounds, in the immediate vicinity of the sea, and intersected by
canals, which divide them into innumerable small islands; but the
farther parallel is certainly in favour of the latter; for although Pope
tells us, that

“Venice from dirt, and sea-weeds rose;”

yet I think the natural salubrity of its climate, as well as the general
superiority of its buildings, and more extensive display of specimens
of the fine arts, would prove greater attractions in the eyes of the
stranger. With respect to the point of salubrity, the canals of Venice
are more uniformly covered with water than those of Amsterdam,
which offer a surface of mud, and hence fewer noxious exhalations
are here generated; not that I am ignorant that Venice is far from
being a healthy summer residence, in consequence of injurious
miasmata, raised from its very foundations, by the intensity of the
solar ray.

The atmosphere of Amsterdam is greatly impregnated with


moisture, and the place necessarily very damp, which must favour
the production and aggravation of rheumatic disease; the liability to
which, is perhaps the best excuse that can be made for the general
use of tobacco by its inhabitants.

It is true, that the above custom also suits the calculating notions
of the Dutch. I am on this point forcibly reminded of the observation
of a solitary and smoking Dutchman, when Dr. Moore had
expressed, through the medium of an interpreter, his regret at being
unable to converse with him, in consequence of his ignorance of the
Dutch language; and which was to this effect: “They ought to console
themselves for the accident of not understanding each other; for as
they had no connexions, or dealings in trade together, their
conversing could not possibly answer any useful purpose.”

The moment now arrived, when I was to be separated from my


very kind friend, with whom I had, on the present tour, travelled more
than fourteen hundred miles; we cheered the painful moments of
parting, by the anticipations of soon meeting again. We fortunately
had little time to spend in useless regrets, for the boat, when we
reached the canal, was on the point of setting off, and they make it a
rule to wait for no one; even an English gentleman, who was in
expectation of the momentary arrival of two friends to accompany
him, was obliged to stay behind, because they would not tarry an
instant after the signal bell had rung. This was a source of regret to
my friend, as he had taken much pains to interest him in my favour,
and, indeed, I promised myself some pleasure from travelling in his
company. Not that my heart was sufficiently frenchified, to be
capable of suddenly expanding to the warmth of a new friendship;
no! I preferred indulging in the delightful emotions inspired in it, by
the recollections of my late amiable companion; of whose uniform
kindness, and anxious concern for me, I shall never—never cease to
be most sensible.
CHAP. XXXI.
JOURNEY FROM AMSTERDAM TO BRUSSELS.

I was now once more left to my own resources, and shortly


ascertained, that there were two young Dutchmen on board who
were acquainted with English. Their father, I afterward found, was a
merchant, retired from business in order to secure, under the present
depressed state of trade, the fruits of his former industry. The sons
had learnt English, as a necessary accomplishment for the duties of
their father’s office, the concerns of which lay chiefly in England.

Haarlem is distant seven miles from Amsterdam, and the journey


occupies nearly three hours; about midway we arrived at a village,
where we had to change both the canal and barge, walking through
the town, our luggage being conveyed by barrowmen. On our arrival
at Haarlem, the captain, after arranging with his other passengers,
accompanied me to the Lion d’Or, to which I had been
recommended. Before entering the inn, I was not a little surprised by
the landlord’s daughter inquiring from me in English, where my friend
was. I replied that I was alone; and she asked whether I had not had
a friend with me; on satisfying her, and saying that he was gone to
Hamburg, she offered to take care of me, and in case I was
proceeding to the Hague and Rotterdam, to give me letters to
houses where I should receive every attention. Of course I
endeavoured to learn how she had acquired any knowledge of me,
which she explained by stating, that her father had been the day
before, at our inn at Amsterdam, and had become acquainted with
my intention of visiting Haarlem, and that they looked out for me as
an uncommon traveller.

While I was taking refreshment, the gentlemen with a lady, who


had been disappointed in their passage by our barge, arrived, and as
they were proceeding to Leyden on the following morning, I
determined to avail myself of their invitation to accompany them.

We arose early in the morning to walk over the town, which is of


great antiquity, having been a flourishing place as early as 1155; but
the most interesting object, is the statue of Lawrence Coster, once
an alderman of this city, and the asserted inventor of the art of
printing, and which stands in the grand place. It is true that the
honour of the above invention is disputed with Coster and Haarlem,
by various other towns of Germany, as Mentz, Strasburg, &c.; but
there is strong ground to consider Coster entitled to the priority of
claim, as the dates of some of the books of his printing are anterior
to those of Faust, or any other of his competitors. Adrianus Junius,
who was born at Hoorn, in 1507, tells us, that Coster hit upon this
invention as he was walking in a wood near Haarlem, by cutting the
bark of beech-trees into letters, and then stamping them upon paper
as a seal; and that he afterwards extended and improved his
discovery, and set up a printing office in his house, and that Faust, or
Fust, who was a servant of his, one day, while the family were at
church, stole away his types and other materials, and fled with them
to Mentz, where he commenced business as a printer.

The first book which Coster brought out, and his original types, are
preserved in the Stadt-house for the inspection of the curious; we
had not, however, time to examine them, nor even to hear the
celebrated organ of this city, for we did not arrive on the day before
until after evening service had concluded; and to hear it at any other
time, is a gratification which must be handsomely paid for.

Immediately after breakfast, we set off to take the treckschuyt for


Leyden, to which the landlord’s daughter insisted on accompanying
me, notwithstanding I was now kindly assisted by my countrymen. I
took leave of her, of course, with feelings and expressions of
gratitude for her uncommon attention. The barges on these canals
are towed by horses, the rope passing from the top of a mast, in
order to carry it clear of the ground, and which mast is fixed on a
swivel joint to admit of its being lowered at pleasure in passing under
bridges. There were in the present boat three cabins, the aftermost,
which is considered the best, being occupied by a private party: we
were in the middle one, which was very commodious, and had but
few companions, and those not very loquacious, for the natives of
this country shew little disposition to enter into conversation with
strangers. We had a laugh or two at one of our companions, who,
finding his seat too hard, requested a cushion, for which
accommodation they afterwards made an extra charge; at another
time, he got out to walk on the bank, and had much difficulty to keep
up with the boat, before an opportunity offered of getting in again.
The day was fine, and the country around us said to be highly
luxuriant. At twelve o’clock we arrived at Leyden, being a distance of
four leagues.

Both this town and Haarlem are famous for the long sieges they
supported against the Spaniards, under Frederic, son of the duke of
Alva, in the year 1573.

After ordering dinner at the Golden Lion, we sallied forth to


examine the town, of which it is impossible I can give any thing like a
description, from so slight a perambulation, as it is said to comprise
eight gates, twenty-four canals, fifty islands, one hundred and eighty
streets, and one hundred and forty-five bridges. It was here that the
electric battery, named the Leyden Jar, was first invented, and that
the illustrious Boerhaave, filled with an eclat never surpassed, the
professorship of medicine in this celebrated university. This great
man was born at Voorhoot, a village near this place, in the year
1688, and died in 1738. There is a proverb of his which deserves a
marked attention, “The sparks of calumny will presently be extinct of
themselves, unless you blow them.”

I should have felt pleasure in staying longer at this place, but that I
was desirous of getting to Brussels without delay. I therefore, in
company with Mr. T—, one of the English gentlemen, the other
staying behind with his lady, set off by the barge to the Hague. In our
way, we passed the village of Leysendam, which we walked through
to another barge, on the right of which is Catwick, where the last
branch of the Rhine, which retains its original name, loses itself in
the sands. At eight o’clock in the evening we reached the Hague,
after a journey of three hours, and took up our quarters at the hotel
of Marshal Turenne.

On the following morning, Tuesday, Aug. 21st, we arose early, and


took a walk through the town before breakfast, and which we
afterwards extended to Scheveling. The road to this place is
excellent, shaded on both sides by trees. The village itself is large
and extremely neat, situated near the sea, and much resorted to as
a bathing-place during the summer; the sea, however, is not visible
from the town, a sand-hill being interposed between these points.

We returned from our walk in sufficient time to set out by the


treckschuyt for Rotterdam, which is thirteen miles distant from the
Hague. My companion was much pleased with the palaces and
walks about this place, which he thought must be a delightful
residence.

After travelling about an hour and a quarter, we reached Delft,


where we landed, and traversed the city to another barge on the
opposite side of it. Delft is a fine clean city, with canals running
through the streets, and rows of trees on each side of them. In one
of the churches are deposited the remains of William the First of
Nassau, prince of Orange, who, at the instigation of Philip the
Second, was assassinated at this place. Delft is also famous as the
birth-place of Hugo Grotius, the immortal author of a Treatise on the
Truth of the Christian Religion, as well as of many other works of
high estimation; and every one has heard of its manufactory of
earthenware, termed Delft China.

From Delft, we proceeded in a very large and handsome barge to


Rotterdam. At four o’clock we passed Schiedam, leaving it a mile on
our right, and at five arrived at Rotterdam. It happened to be the day
of a fair, and we had to traverse a great part of the city, through the
midst of a mass of people, before we reached the bath-house hotel,
to which we had been recommended. This house was full of
company, but they found us accommodations in a detached building
in the garden.

On making inquiries respecting the conveyances to Antwerp, I


found there were two every day, one by Breda, the other by Bergen-
op-Zoom; I preferred the latter, and secured my place for twenty-five
francs.

On entering the common sitting-room of our hotel, I almost fancied


myself transported into an English boarding-house, the party present
being all countrymen or Americans. We retired early to our bed-
room, and had the mortification to find the sheets wringing wet. This
is not unfrequently the case in Holland, where the table linen and
napkins are very commonly sent in perfectly damp; it is no doubt
attributable to the humid state of the atmosphere on the one hand,
and the expense of fuel to dry with on the other. We summoned the
chamber-maid, waiter, and master of the inn in succession, who all
endeavoured to convince us that they were perfectly dry. We had no
alternative but to make the best use we could of the warming-pan;
and it is fortunate that we sustained no injury.

My stay at Rotterdam was too brief to enable me to say much


about the city. It is a place of considerable commercial importance,
and, in some respects, has advantages over Amsterdam; as the
merchant vessels have only to come fifteen miles up a fine river, and
are able to discharge their cargoes at the very doors of the
warehouses. I was informed, that it enjoys a more extended trade
than either Amsterdam or Antwerp. It is also considered the
handsomest city in Holland, and obtains no little renown from having
been the birth-place of the celebrated Erasmus, whose statue in
bronze, ornaments the city.

On Wednesday, the 22nd of August, I left Rotterdam for Antwerp,


at five in the morning. We were conveyed, in a temporary carriage,
to the banks of a river, which we crossed to the island of Ysselmond,
where the regular diligence was awaiting our arrival. After traversing
this island, we embarked on a flying bridge, and were transported
across the Maese to the island of Voorn; from the opposite side of
which we crossed an arm of the sea, named Holland’s Diep, to
Williamstadt, a strong fortified town, built by the unfortunate William
before mentioned, as having been assassinated at Delft. This place
held out successfully against the French in 1793. After leaving
Williamstadt, we crossed a fourth, and then a fifth river, when we
arrived at Steenbergen; a small, but strongly fortified town,
surrounded by double walls and ditches, and distant seven miles
from Bergen-op-Zoom. We reached the latter place at two o’clock for
dinner. This town is only noted for its strong fortifications, being
defended by double walls, with immense ditches, and confirmed by
extensive outworks. I could not avoid a melancholy retrospection of
the unfortunate attack made upon this place, by my brave
countrymen in the late war. We recommenced our journey at three
o’clock, and soon afterwards entered the Netherlands, when the
road became so sandy and heavy, that we could not proceed at a
greater rate than a foot’s pace; when, however, we arrived within
three miles of Antwerp, it changed into a pavê, which continued until
we reached that town at half after eight in the evening; when I
accompanied an English gentleman, Mr. S⸺, who had travelled
with us all day, to the Hotel d’Angleterre.

As I only rested thirty-six hours in this fine and extensive city, it


would be presumptuous to attempt a description of it. The beauty of
the town, cathedral, and various churches, and the richness of its
cabinets of paintings, and the fine arts, are well known. An academy
of painting has lately been formed, or rather re-established here,
under the title of Rueben’s school.

At the table d’hôte, which was crowded with people of various


nations, I was fortunately placed near one of my countrymen, who,
hearing that I had lately arrived from Italy, entered into conversation
with me respecting some friends, and in particular a cousin of his,
whom I had known at Naples; he afterwards contributed to make the
remainder of the day pass away pleasantly.

He informed me, that Antwerp was not unlikely to regain a


considerable degree of its former commercial importance. It was
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade

Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.

Let us accompany you on the journey of exploring knowledge and


personal growth!

ebookmass.com

You might also like