Fog, Edge, and Pervasive Computing in Intelligent IoT Driven Applications Deepak Gupta 2024 Scribd Download
Fog, Edge, and Pervasive Computing in Intelligent IoT Driven Applications Deepak Gupta 2024 Scribd Download
com
https://ebookmass.com/product/fog-edge-and-pervasive-
computing-in-intelligent-iot-driven-applications-deepak-
gupta/
OR CLICK HERE
DOWLOAD NOW
https://ebookmass.com/product/intelligent-data-analysis-from-data-
gathering-to-data-comprehension-deepak-gupta/
ebookmass.com
https://ebookmass.com/product/the-cloud-to-thing-continuum-
opportunities-and-challenges-in-cloud-fog-and-edge-computing-1st-ed-
edition-theo-lynn/
ebookmass.com
https://ebookmass.com/product/business-in-action-10th-global-edition-
courtland-l-bovee/
ebookmass.com
https://ebookmass.com/product/dungeon-in-the-clouds-a-dungeon-core-
litrpg-story-rise-of-kers-book-1-daniel-weber/
ebookmass.com
https://ebookmass.com/product/wolf-in-the-shadows-maria-vale-2/
ebookmass.com
https://ebookmass.com/product/contemporary-aristotelian-ethics-7th-
edition-arthur-madigan-s-j/
ebookmass.com
https://ebookmass.com/product/ise-fundamentals-of-corporate-
finance-11th-edition-richard-a-brealey/
ebookmass.com
blogdown: Creating Websites with R Markdown Yihui Xie
https://ebookmass.com/product/blogdown-creating-websites-with-r-
markdown-yihui-xie/
ebookmass.com
Fog, Edge, and Pervasive Computing in Intelligent IoT Driven
Applications
IEEE Press
445 Hoes Lane
Piscataway, NJ 08854
IEEE Press Editorial Board
Ekram Hossain, Editor in Chief
Jón Atli Benediktsson David Alan Grier Elya B. Joffe
Xiaoou Li Peter Lian Andreas Molisch
Saeid Nahavandi Jeffrey Reed Diomidis Spinellis
Sarah Spurgeon Ahmet Murat Tekalp
Fog, Edge, and Pervasive Computing in
Intelligent IoT Driven Applications
Edited by
Deepak Gupta
Aditya Khamparia
Copyright © 2021 by The Institute of Electrical and Electronics Engineers, Inc. All rights
reserved.
Published by John Wiley & Sons, Inc., Hoboken, New Jersey.
Published simultaneously in Canada.
No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any
form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise,
except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without
either the prior written permission of the Publisher, or authorization through payment of the
appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers,
MA 01923, (978) 750-8400, fax (978) 750-4470, or on the web at www.copyright.com. Requests to
the Publisher for permission should be addressed to the Permissions Department, John Wiley &
Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at
http://www.wiley.com/go/permission.
Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best
efforts in preparing this book, they make no representations or warranties with respect to the
accuracy or completeness of the contents of this book and specifically disclaim any implied
warranties of merchantability or fitness for a particular purpose. No warranty may be created or
extended by sales representatives or written sales materials. The advice and strategies contained
herein may not be suitable for your situation. You should consult with a professional where
appropriate. Neither the publisher nor author shall be liable for any loss of profit or any other
commercial damages, including but not limited to special, incidental, consequential, or other
damages.
For general information on our other products and services or for technical support, please
contact our Customer Care Department within the United States at (800) 762-2974, outside the
United States at (317) 572-3993 or fax (317) 572-4002.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in
print may not be available in electronic formats. For more information about Wiley products,
visit our web site at www.wiley.com.
Library of Congress Cataloging-in-Publication Data
Names: Gupta, Deepak, editor. | Khamparia, Aditya, 1988- editor.
Title: Fog, edge, and pervasive computing in intelligent IoT driven
applications / edited by Deepak Gupta, Aditya Khamparia.
Description: Hoboken, New Jersey : Wiley-IEEE Press, 2020. | Includes
bibliographical references and index. | Description based on print version
record and CIP data provided by publisher; resource not viewed.
Identifiers: LCCN 2020025436 (print) | LCCN 2020025437 (ebook) | ISBN
9781119670100 (epub) | ISBN 9781119670094 (adobe pdf) | ISBN 9781119670070
(hardback) | ISBN 9781119670070q(hardback) | ISBN 9781119670094q(adobe
pdf) | ISBN 9781119670100q(epub)
Subjects: LCSH: Internet of things. | Cloud computing. | Distributed
databases. | UbIquitous computing.
Classification: LCC TK5105.8857 (ebook) | LCC TK5105.8857 .F64 2020 (print) |
DDC 004.67/8–dc23
LC record available at https://lccn.loc.gov/2020025436 LC record available at https://lccn.loc
.gov/2020025437
Cover Design: Wiley
Cover Image: © Andriy Onufriyenko/Getty Images
Set in 9.5/12.5pt STIXTwoText by SPi Global, Chennai, India
Printed in the United States of America
10 9 8 7 6 5 4 3 2 1
v
Contents
2.3 Disadvantages 34
2.4 Challenges 34
2.5 Role in Health Care 35
2.6 Blockchain and Fog, Edge Computing 38
2.7 How Blockchain will Illuminate Human Services Issues 40
2.8 Uses of Blockchain in the Future 41
2.9 Uses of Blockchain in Health Care 42
2.10 Edge Computing Segmental Analysis 42
2.11 Uses of Fog Computing 43
2.12 Analytics in Fog Computing 44
2.13 Conclusion 44
Bibliography 44
Index 409
xvii
List of Contributors
Preface
This book focuses on recent advances, roles and benefits of fog, edge, and perva-
sive computing for intelligent and smart Internet of Things (IoT) enabled appli-
cations, aimed at narrowing the increasing gap. This book aims to describe the
different techniques of intelligent systems from a practical point of view: solv-
ing common life problems. But this book also brings a valuable point of view
to engineers and businessmen, trying to solve practical, economical, or technical
problems in the field of their company activities or expertise. The purely practical
approach helps to transmit the idea and the aim of the author is to communicate
the way to approach and to cope with problems that would be intractable in any
other way. This book solicits contributions which include theory, applications, and
design methods of intelligent systems, Ubiquitous techniques, trends of fog, edge,
and cloud applications as embedded in the fields of engineering, computer science,
mathematics, and life sciences, as well as the methodologies behind them.
Book Objectives
With the rapid growth and emerging development in artificial technology, novel
hybrid and intelligent IoT, edge, fog driven, and pervasive computing techniques
are an important part of our daily lives. These technologies are utilized in various
engineering, industrial, smart farming, video security surveillance, VANETs
and vision augmented driven applications. These applications required real time
processing of associated data and work on the principle of computational resource
oriented meta heuristic and machine learning algorithms. Due to physical size
limitations, small computing IoT and mobile devices are having resource limited
constraints with low computing power and are unable to manage good quality of
service and related parameters for distinguished applications. To overcome the
limitations of such mobile devices edge/fog and pervasive computing have been
proposed as a promising research area to carry out high end infrastructure usage
and provide computation, storage and task execution effectively for end device
xxvi Preface
Target Audience
The target audience of book is professionals and practitioners in the field of intelli-
gent system, edge computing and cloud enabled applications and ubiquitous com-
puting science paradigm may benefit directly from others’ experiences. Graduate
and master students of final projects and particular courses in intelligent system,
edge and fog based real-life applications or medical domain can take advantage,
making the book interesting for engineering and medical university teaching pur-
poses. The research community of intelligent systems, sensor applications and
intelligent sensor-based applications, consisting of many conferences, workshops,
journals and other books, will take this as a reference book.
Organization
Chapter 1 describes the Internet of Things, fog, edge and pervasive computing are
emerging technologies, having several promising applications including health-
care. These technologies are witnessing a paradigm shift in the healthcare sector
moving out from traditional ways of visiting hospitals. It connects the doctors,
patients, and nurses through smart intelligent sensor devices at low cost with high
bandwidth network. In this chapter, authors discussed new computing paradigms
precisely and present their applications in ubiquitous healthcare. This chapter also
covers various problems and challenges that have been faced by the practitioners
in the last few years in the field of cloud computing and IoT that has been solved
by fog, edge and pervasive computing.
Chapter 2 discusses difficulties and future headings to investigate the role
of fog, edge and pervasive computing. Studies have revealed that fog/edge
computing (FEC) based organizations can expect an essential activity in expand-
ing the cloud by means of finishing go-between organizations at the edge of
the framework. Dimness/edge computing-based IoT’s (FECIoT) appropriated
configuration overhauls organization provisioning along the cloud-to-things
Preface xxvii
continuum, thus making it sensible for key applications. Edge and fog registering
are firmly related – both allude to the capacity to process information closer to
the requester/buyer to lessen idleness cost and increment client experience. Both
can channel information before it εhitsε a major information lake for further
utilization, lessening the measure of information that should be handled.
Chapter 3 addresses the technique selection issue encountered during the
requirements elicitation stage, through a proposed machine learning model to
transfer the experts’ knowledge of elicitation technique selection to the less expe-
rienced. Based on the system analysts, stakeholders automate various techniques
to provide the best optimization technique nomination.
Chapter 4 covers the advantages and disadvantages of using machine learning
in edge/fog/pervasive computing. The various studies carried out by researchers is
also covered. Every field has numerous applications, and in this chapter we discuss
a few possible applications in this fog era using machine learning techniques. By
the end of the chapter you should know about ML frameworks and the various
machine learning algorithms used for fog/edge computing.
Chapter 5 provides a description of the software which has three modules: stu-
dent, librarian and admin. These modules have unique features for searching for
library books with the title, author’s name, subject, ISBN/ISSN, etc. Within the
chapter the interfaces of the software are shown as images which is an abstraction
that may be developed on available mobile operating system like iOS, Android, etc.
The interfaces are designed bearing in mind that it will be used on cross platform
environments fulfilling minimum requirements using the IoT available in the mar-
ket. Furthermore, overall information is preserved with the help of cloud stor-
age while keeping parallel options for physical storage on the destination master
computer. The cloud-based system has given library management a new dimen-
sion while giving a new feature referred as εmanagement on the goε as a web or
abstract GUI.
Chapter 6 describes a systematic review that was conducted to determine
work done by various publishers on kidney cancer and to spot the research gaps
between the studies so far. The outcome of this study permitted the effective
diagnose of kidney cancer or renal cancer carried out using an adaptive neuro
fuzzy method with 94% accuracy. Although, many data mining techniques were
applied by researchers, the accuracy of these methods was less than the adaptive
neuro fuzzy method. This method is worthwhile to identify the diagnosis of renal
cancer better and more rigorously.
Chapter 7 explains a proposed approach to use edge computing in a trans-
portation and route-finding process in order to handle performance issues.
Huge demand for centralized cloud computing poses severe challenges such as
degraded spectral efficiency, high latency, poor connection, and security issues. To
handle these issues, fog computing and edge computing has come into existence.
xxviii Preface
This chapter outlines detailed information about the design of a novel data collec-
tion method using fog computing in the IoT network. The main reason for using
fog computing over the cloud computing is to provide security to data which is
completely lacking in cloud computing. Now-a-days, security of data is one of the
most important requirements.
Chapter 12 provides an overview of using a fog computing platform for analyz-
ing data generated by IoT devices. A fog computing platform will be compared
with state-of-the-art to differentiate its impact in terms of analytics. Lots of data is
being generated in IoT based devices used in smart homes, traffic sensors, smart
cities, and various connected appliances. Fog computing is one area which is quite
popular in processing this huge amount of IoT data. However, there are challenges
in these models for performing real time analytics in such data for quick analytics
and insights. A fog analytics pipeline is one such area which could be a possible
solution to address these challenges.
Chapter 13 proposes a method of diagnosis based on the relationship between
patients and symptoms, and between symptoms and diagnosis using linguistic
variables by intuitionistic fuzzy sets. It then describes the state of some patients
after knowing the results of their medical tests by degree of membership and
degree of non-membership based on the relationship between patients and
symptoms, and symptoms and diagnosis. Later a max-min-max
composition and formula is applied to calculate the Hamming distance to iden-
tify the disease with the least Hamming distance for various patients. A revised
max-min average composition is applied to identify the disease with the maximum
score. Finally, it shows how urethral stricture in various patients is mathematically
diagnosed.
Chapter 14 discusses the types of attacks involved in the IoT network with their
counter measures, also covering the different layers, protocols, and the security
challenges related to the IoT. It is the capability of the device that makes the IoT
brilliant and this has been achieved by placing the intelligence into the devices.
The intelligence in the sensors is developed by adding sensors and actuators which
can collect information and pass it to the cloud through Wi-Fi, Bluetooth, ZigBee,
and so on. But these IoT network are vulnerable to different types of attack: phys-
ical, network, software, and encryption, and these attacks actually stop the IoT
devices performing their normal operations. So, it required that we must overcome
these attacks.
Chapter 15 discusses the domain of IoT integrated telehealth or telemedical
services with various segments where there is a need to work on advanced tech-
nologies to achieve a higher degree of accuracy and performance. As shown by the
research reports and analytics from Allied Market Research, the global value and
market of the IoT in telehealth and medical services will exceed 13 billion dollars.
From the extracts of Statista, the Statistical Research Portal the huge usage of IoT
xxx Preface
can seriously impact the performance. This delay can cause delay in decision mak-
ing and this is not acceptable in real time applications. To handle such scenarios,
fog computing has emerged as a solution. Fog computing extends the cloud near
to the edge of the network to decrease latency as well as bandwidth requirements.
It acts as an intermediate layer between the cloud and devices generating data.
Chapter 20 is concerned with security and privacy handling issues occurred in
pervasive and edge boundary system for recognizing voice, sound using intelligent
IoT mining techniques. Fog computing is a promising registering worldview that
extends distributed computing to the edge of systems. Like distributed computing
yet with unique qualities, fog computing faces new security challenges other than
those acquired from distributed computing. This chapter studies existing writing
on fog figuring applications to recognize basic security holes. Comparable innova-
tions like edge figuring, cloudlets, and micro-server farms have additionally been
incorporated to give an all-encompassing survey process.
Chapter 21 focuses on fog computing and the second section deals with edge
computing. In this the author first introduces the basics of fog and edge computing,
its architecture, working, advantages and use cases, and then primarily focuses
on their security and privacy issues separately. In the end solutions and research
opportunities in both fields are discussed.
Closing Remarks
In conclusion, we would like to sum up here with few lines. This book is a small
step towards the enhancement of academic research through motivating the
research community and research organizations to think about the impact of fog,
edge and IoT computing frameworks, networking principles and its applications
for augmenting the academic research. This book is giving insight on the various
aspects of academic computing research and the need for knowledge sharing
and prediction of relationships through several links and their usages. This
includes research studies, experiments, and literature reviews about pervasive,
fog computational activities and to disseminate cutting-edge research results,
highlight research challenges and open issues, and promote further research
interest and activities in identifying missing links in cloud computing. We hope
that research scholars, educationalists and students alike will find significance in
this book and continue to use it to expand their perspectives in the field of edge,
fog and pervasive computing and its future challenges.
Deepak Gupta
Maharaja Agrasen Institute of Technology, India
Aditya Khamparia
Lovely Professional University, India
xxxiii
Acknowledgments
We would like to thank the many people; those who contributed, supported and
guided us through this book by different means. This book would not have been
possible without their guidance and help.
First and foremost, we want to express heartfelt gratitude to our Guru for spiri-
tual empathy and incessant blessings, to all teachers and friends for their contin-
ued guidance and inspiration throughout the period of our studies and career.
We would like to thank Wiley-IEEE Press publisher who gave us an opportunity
to publish with them. We would like to express our appreciation to all contribu-
tors including the accepted chapters’ authors, and many other contributors who
submitted their chapters that cannot be included in the book. Special thanks to
Mary Hatcher, Victoria Bradshaw, Teresa Netzler and Louis Vasanth Manoharan
from Wiley-IEEE Press for their kind support and great efforts in bringing the
book to completion. The encouragement of the Editorial Advisory Board (EAB)
cannot be overstated. These are renowned experts who took time from their busy
schedules to review chapters, provide constructive feedback, and improve the
overall quality of the chapters.
We would like to thank our dear friends and colleagues for their continuous
support and countless efforts throughout the process of publication of this book.
We express our personal and special thanks to our family members for support-
ing us throughout our careers, for love, the tremendous support and inspiration
which they gave throughout the years.
Last but not least: we request forgiveness of all those who have been with us over
the course of the years and whose names we have failed to mention.
Abstract
The Internet of Things (IoT), fog, edge and pervasive computing are all emerging
technologies, which have several promising applications including healthcare. This
technology is witnessing a paradigm shift in the healthcare sector, moving out from
traditional ways of visiting hospitals. It connects the doctors, patients, and nurses
through smart intelligent sensor devices at low cost with high bandwidth networks.
In this chapter, we discuss these new computing paradigms precisely and present
their applications in ubiquitous healthcare. This chapter also covers various problems
and challenges that have been faced by practitioners in the last few years in the field
of cloud computing and the IoT that have been solved by fog, edge and pervasive
computing.
1.1 Introduction
Today, the Internet of Things (IoT), fog, edge and pervasive computing are buz-
zwords, which have pivotal applications in different fields of studies including
healthcare, engineering, and other intelligent applications. Cloud computing and
the IoT have emerged as a new paradigm in the field of information and commu-
nication technology (ICT) as a revolution of the 21st century. It was a long-awaited
dream of to use computing as a utility. Traditional computing extends the model to
Fog, Edge, and Pervasive Computing in Intelligent IoT Driven Applications, First Edition.
Edited by Deepak Gupta and Aditya Khamparia.
© 2021 John Wiley & Sons, Inc. Published 2021 by John Wiley & Sons, Inc.
2 1 Fog, Edge and Pervasive Computing in Intelligent Internet
a cloud computing paradigm which has the capability to renovate a huge portion of
the information technology industry, making the software even more interesting
as a service that customers can access on-demand. The IoT acts as an interconnec-
tion between various gadgets and the Internet, including mobile phones, vehicles,
farms, factories, home automation systems, and wearable devices from the view-
point of the enhancement of the competence of real-life computing usage. This
new technology, especially in the healthcare sector, is a change from the conven-
tional approach of visiting clinics or hospitals. It links doctors, patients, and nurses
by means of intelligent, affordable sensor gadgets with the support of cloud com-
puting (Qi et al., 2019). Unfortunately, a number of IoT based intelligent sensor
gadgets are developing at a rapid rate. On the basis of evaluation, if the pace of
extension proceeds constantly from 2020, the number of wearable gadgets on the
planet will reach to around 26 billion (Imran and Qadeer, 2019). The volume of
data generated using these IoT gadgets is very large. The capability of the present
cloud model is not adequate to deal with the requirements of the IoT, i.e., the
current cloud has issues regarding volume, latency, and bandwidth. The current
cloud cannot fulfill every one of the prerequisites of QoS (Quality of Service) in the
IoT, therefore the goal is that another framework, fog computing, is introduced
that will solve the issues of volume, latency and bandwidth (Shi et al., 2015).
Fog computing has appeared with a new computation model which is placed
between the cloud and intelligence sensor-based IoT devices through which an
assortment of heterogeneous gadgets are pervasively associated as the terminal
of a network which provides communication facilities to ease the execution
of relevant IoT services (Chang et al., 2019). Fog computing covers the cloud
computing approach in the direction of the edge of the network, which has many
advantages over cloud computing. Fog computing is appropriate for the appli-
cations by which real-time, high response time, and less latency are important
issues, specifically in healthcare utilization (Mutlag et al., 2019). It is enabling
new or mutated applications and facilities with a productive transaction between
cloud and fog, especially with the issues of volume, latency, and bandwidth
regarding data management (JoSEP et al., 2010).
In this chapter, we propose to explain new trends of computing models to under-
stand the evolving IoT applications, exclusively fog and edge computing, their
background, features, model architecture and current challenges. This chapter
also covers various problems and challenges that have been faced by the practi-
tioners in previous years in the field of cloud computing associated with the IoT
that has been solved by fog, edge and pervasive computing (De Donno et al., 2019).
Further, because the Cybercrime Report 2016 suggests that cybercrime damages
will be around $6 trillion every year by 2021, up from $3 trillion in 2015 it will
cover how to secure the privacy of IoT based sensor devices and private data in the
cloud using machine learning. Further, we will demonstrate in this chapter that
1.2 Why Fog, Edge, and Pervasive Computing? 3
fog computing definitely reduces latency as opposed to cloud computing. The low
latency is significant for the medical IoT framework because of real-time require-
ments. Although the Cloud-based IoT (CIoT) structure is a typical way to deal
with executing IoT frameworks, it is, however, confronting developing difficulties
in the IoT. Specifically, CIoT deals with current challenges such as data transmis-
sion rate, latency rate, interruption, limitation of resource and secure system. The
developing difficulties of CIoT have brought up an issue – what is needed to con-
quer the barrier of current cloud-driven architecture? Fog computing architecture
is a visionary model that includes all probabilities to encompass the cloud to the
edge network of CIoT, from the distant central cloud datacenter, the interim sys-
tem hubs to the far edge where the front-end IoT gadgets are situated.
Fog Computing
Fog computing is a distributed paradigm that provides computation, storage and
network facilities between client gadgets and cloud datacenters mostly but not
specifically situated on edge networks (Inbaraj, 2020). In such a way a cloud-based
facility can be enlarged nearer to the IoT gadgets/centers. In this scenario, fog
acts as a middle layer between IoT based sensor machines and cloud datacenters
(Bangui et al., 2018). The idea of fog computing was first created by Cisco in 2012
to report the difficulties of the IoT applications in traditional cloud computing.
The challenges of fog computing are the facilitation and enhancement of mobil-
ity, real-time interaction, privacy, security, low latency, low energy consumption
and network bandwidth for real-life applications where we need a quick response
from the cloud, especially in the healthcare sector.
One of the benefits of fog computing is that, in place of transferring the entire
data of IoT devices to the cloud, the fog will filter the data and then send a sum-
mary of the data. Another benefit is that fog computing processes the data before
transferring to the cloud and will lead to reducing the communication period rate
along with reducing the requirement of storage of massive data at the cloud. The
key role of fog computing is data gathering from IoT sensors gadgets, data pro-
cessing, data filtering and then finally sending a summary of the data to the cloud
(Mehdipour et al., 2019).
gadgets on the planet will reach around 26 billion (Imran and Qadeer, 2019). The
volume of data generated using these IoT gadgets is very large. The capability of
the present cloud model is insufficient to deal with the necessities of IoT, i.e., the
current cloud has issues of volume, latency, and bandwidth that will have a detri-
mental effect on the way the IoT works. This problem will need a real-time answer,
especially in the healthcare system (Mutlag et al., 2019; Kelly, 2016). So, another
platform is expected to meet these needs; a stage that we call fog computing or just
the fog because fog is a cloud near the ground (JoSEP et al., 2010).
Edge Computing
Edge computing is a developing model that allows computation to be executed
at the edge of network devices in support of a cloud downstream and upstream
for the benefit of IoT. An edge network is essentially comprised of client gadgets
(such as cell phones, smart devices, etc.), edge gadgets (such as routers, set-top
boxes, bridges, workstations, wireless access points etc.), edge servers, etc. and
these elements can be furnished with the essential capabilities for supporting edge
computation. If we deploy computing resources at the edge of the network, that
will improve the quality of service in a different application (e.g. in intelligent and
real-time healthcare system) in terms of the low latency of time, low bandwidth of
the network, optimizing cost, increasing privacy and providing high energy effi-
ciency. For example, fitness trackers act as an edge between bodies and clouds.
Research has proved that there are many benefits of edge computing, e.g. user
face recognition and response time is reduced by 900 ms to 169 ms when the com-
putation is deployed at the edge rather than the cloud. Also, energy consumption
reduced by 30%–40% by edge computing (Chun et al., 2011).
Edge computing brings two major improvements to the existing cloud comput-
ing. The first one is that edge nodes can preprocess large amounts of input data and
then filter the data to reduce the size before transferring it to the central servers
in the cloud. The other improvement is that the cloud resources are optimized by
enabling edge nodes with computing ability.
to be connected to the Internet by 2020 (Bonomi et al., 2012). If all the data needs to
be sent to the cloud for processing, the response time will be too long and so we will
need huge network bandwidth. Some IoT applications, especially in healthcare,
might require a very short response time. In this case, the data needs to be pro-
cessed at the edge for shorter response time, more efficient processing and smaller
network pressure.
Change from Data Consumer to Producer: Nowadays most electrical devices are
IoT enabled which not only consume data but also produce data. For example: in
cloud computing, devices such as mobile phones at the network edge traditionally
only consume data, e.g., enabling a user to watch a video. Now, though, users
are also producing data with their mobile devices, such as by uploading posts
and photos to social networking sites. This change requires more functionality at
the network edge. Another example would be wearable health devices. Since the
physical data collected by the things at the edge of the network is usually private,
processing the data at the edge could protect user privacy better than uploading
raw data to the cloud (Mutlag et al., 2019).
Pull from IoT: as we know in the future most electronic devices will be IoT
enabled. These IoT based sensor devices generate a huge amount of data. For
example, fitness trackers, ECG, microwave-ovens, LED bars. These data we
have to send and request for processing to the cloud will be a huge load on the
cloud. Finally, we will face many problems like time latency, high bandwidth, etc.
These problems can be offloaded on the cloud by edge computing devices like
smartphones which act as an edge between humans and the cloud. By using edge
machines, we can reduce the burden of data, time latency and bandwidth on the
cloud.
Pervasive Computing
Pervasive computing, also called ubiquitous computing, was conceived by Mark
Weiser in 1988 at Xerox PARC. It is an embedded computational technology in the
form of a microprocessor in every object, these objects can communicate with each
other effectively and perform useful tasks. So, we can say that ubiquitous comput-
ing makes our lives convenient by creating digital atmospheres that are conscious,
robust, and receptive to human requirements. Pervasive computing can occur with
any device, any time, any place and in any data format across the network (Aazam
and Huh, 2015).
Pervasive computing has evolved not only in laptops and smart mobiles but
also in IoT based wearable devices, intelligent sensors, lighting systems and so
on. Nowadays pervasive computing has a big role in real-time healthcare systems
(Gia et al., 2015). Example: according to the current survey in China approximately
1 500 000 people die due to heart disease (Raza, 2019). What is happening is that
6 1 Fog, Edge and Pervasive Computing in Intelligent Internet
generally, it has been seen that heart disease patients stay at home and do not ask
for a doctor until they feel sick which occurs at a very late stage of the disease. So,
most patients die before getting any treatment.
Therefore, there should be a new paradigm for healthcare performance that
decreases the death rate which brings changes from the passive healthcare to per-
vasive healthcare model which will be a real-time monitoring system. Nowadays
we have healthcare services which are available only in hospitals. So, it is very diffi-
cult for elderly people or disabled people to fulfill their healthcare demands under
emergency conditions. In these cases, they have proposed pervasive healthcare to
deliver health services to everyone, everywhere, all of the time.
to human health (Tabas and Glass, 2013). In a traditional healthcare system, the
IoT devices transfer the clinical data to the cloud for diagnosis of disease, that
increases the time latency due to the heavy burden on the network because of huge
data on the cloud, and failure to produce real-time remedial analysis and services
in critical situation (Zhou et al., 2016a).
To overcome these problems, cognitive computing is exploited by medical pro-
fessionals. In an intelligent IoT application and a real-time healthcare system, it is
important to install the cognitive computing competency to the network edge and
follow up a cognitive study of the patient’s physical health and network devices.
This will reduce the latency time and allow many corresponding resources for
clients in a critical situation (Chen et al., 2018).
In fog computing the intelligent location and computation power are placed at
the local area network whereas edge computing is placed in the device itself (IoT
based sensor devices like ECG, smartwatch, smartphone) (Korzun et al., 2019).
Fog computing decreases a load of data on the cloud through filtering, which
means fog computing works with clouds, whereas edge computing exists without
the presence of a cloud. According to current edge computing, fog computing is a
superset of edge computing.
Fog computing has computation layer leverage devices known as Fog Com-
puting Nodes (FCNs), for example many-to-many gateways and wireless routers
which are useful for computation and storage of data from end devices locally
before sending it to the cloud. On the other hand, mobile edge computing says
that the arrangement of intermediary hubs with capacity and preparing abilities
in the base stations of wireless devices in this manner offers cloud computing
capacities inside the Radio Area Network (RAN) (Bonomi et al., 2012). Fog
computing follows de-centralized or hierarchical architecture whereas edge
computing follows distributed or localized architecture.
On the following day we visited the cathedral, and walked over the
town; the former is an ancient building, standing upon very high
ground, but which by its commanding view, I am informed, fully
repays the trouble of ascent.
The road to Vevay throughout lies by the side of the lake, and is so
narrow, being bounded by a wall on each side, that it is impossible
that two carriages could pass each other. The sides of the mountains
that bound the road on the left, and which are so steep as to appear
inaccessible, are richly clothed with vineyards, artfully formed into
terraces, rising in tiers, one above the other. These terraces are
formed by strong and high stone walls, which preserve the soil from
shelving down, and are ascended by flights of steps. The vineyards
thus formed, are exposed to frequent injuries, and often to utter
destruction, by the rapid impulse of the mountain torrents
descending from above, and which occasionally sweep away wall,
terrace, and vines, in one indiscriminate ruin. These natural
visitations are, however, borne by the Swiss peasant with
resignation; and notwithstanding he may have lost the whole harvest
of his hopes, he immediately applies himself, to repair the injury,
burying the past in the anticipation of the future.
After spending a very happy day, we were obliged, but with the
greatest regret, to leave our kind friend at an early hour, as we had
to prepare for our intended departure from Lausanne early on the
following morning.
The country between Soleure and Basle is very hilly, and regarded
as beautiful beyond description. We slept at a village five leagues
from Basle, at which place we arrived about noon on the following
day.
In the evening, after securing our places, we walked into the public
gardens, from whence a balloon was sent off, and which was
constructed in the shape of a wine cask, with a Bacchus astride it.
This was succeeded by a display of fire-works, with music and
dancing.
CHAP. XXVIII.
STRASBURG TO COBLENTZ.
The whole of the next day was alternately fine and showery. When
we had travelled two leagues from Landau, the spring of the carriage
broke down, and detained us two hours. We noticed that the wife of
the blacksmith, who repaired it, assisted her husband throughout the
process, and appeared even the more dexterous of the two. On
entering Gemmingen, however, their work gave way, and we were in
consequence detained two hours longer; even this afterwards broke
out again, but fortunately just as we reached the end of our journey.
These delays were mortifying enough, as we did not reach Spire
until three in the afternoon, instead of nine o’clock in the morning, as
we had expected.
About two leagues beyond this place, there is a bridge over the
Rhine, leading to the beautiful town of Manheim, situated on the
opposite bank of the river. After this we passed through Oppenheim,
Worms and Inheim, dining at the latter, and then proceeding to
Mayence, where we arrived about five o’clock, and took up our
quarters at the Three Crowns, an excellent inn, to which we had
been recommended by our French friend, who had left us at Spire,
under a promise of rejoining us here. He shortly afterwards came in
and informed us, that besides arranging his own business, he had
ascertained that a large boat sets out for Coblentz every morning at
six o’clock, the fare in which was six francs, with an additional trifle
for the luggage; this vessel, after stopping to dine at Bingen, arrives
at Coblentz, a distance of eighteen leagues, between six and nine
o’clock in the evening, according to the state of the wind; for sails are
made use of whenever the latter is favourable. In consequence of
this report, we determined to secure our passage for the morrow.
While dining at Bingen, twenty miles below Mentz, the grand duke
Nicholas of Russia passed through, on his way from the baths of
Emms, to visit the duke of Nassau, whose castle is situated on the
right banks of the Rhine, about four miles below Mentz.
The professor’s wife, and their son, were also of the party; the
latter was a handsome lad of fifteen, who sat in the cabriolet, and
occupied himself in smoking a pipe nearly half as long as himself.
We expressed our surprise at his being allowed to indulge himself in
this manner, but his mother stated that he had entered the college,
and therefore was of the age when it was customary to commence
inhaling the fumes of this deleterious herb.
But the ladies of Holland are too much used to this custom, to find
it disagreeable; not only habit, but an opinion of its utility, tends to
reconcile them to it. If it possesses any quality in destroying
contagion, I am disposed to imagine that this must depend upon the
stronger poison subduing the weaker, like Aaron’s serpent
swallowing up the rest.
This city is celebrated for having been the first to shake off the
galling yoke of Spain in the year 1579. It was here that the seven
provinces formed their alliance, under the counsels of William, prince
of Orange, in a conference known as the treaty of Utrecht.
We heard them very merry in the fore cabin, but had the one we
occupied to ourselves until about noon, when two elderly Dutch
ladies, who were conversant in French, joined us, and proved
agreeable companions, although they were negative characters.
The Emperor Alexander visited this spot in the year 1813, and left
two Latin inscriptions on marble, commemorative of the event.
After this, we walked about the village, visited the church, and
returned to Amsterdam for a late dinner, highly gratified with our
day’s excursion.
We devoted the greater part of the next day to examining the city
of Amsterdam, which is so intersected with streets, canals, and
bridges, bearing a strong similarity to each other, that it is not an
easy matter to gain an accurate knowledge of it. It takes its name
from the river Amstel, and Dam, signifying a mound, raised to
prevent this river from overflowing the surrounding country. The city
is principally built upon piles, driven into the morass to form a solid
foundation, and of which it is said, that no less than thirteen
thousand are fixed under the Stadt-house alone. We visited the
Exchange, one of the finest buildings of the kind in Europe. After
this, we entered a Jew’s synagogue, the noisy and discordant
devotion of which, soon tired us, so that we were glad to take our
departure, particularly as we had no expectation of being permitted
to bid for the key of the sanctum sanctorum. We regretted this day,
parting from our new and agreeable acquaintance, Mr. W⸺ and
his family, who left us for Utrecht.
I shall not attempt to enter into any particular description of the city
of Amsterdam, but merely observe, that I was forcibly impressed with
an idea of its similarity to Venice; both are situated on marshy
grounds, in the immediate vicinity of the sea, and intersected by
canals, which divide them into innumerable small islands; but the
farther parallel is certainly in favour of the latter; for although Pope
tells us, that
yet I think the natural salubrity of its climate, as well as the general
superiority of its buildings, and more extensive display of specimens
of the fine arts, would prove greater attractions in the eyes of the
stranger. With respect to the point of salubrity, the canals of Venice
are more uniformly covered with water than those of Amsterdam,
which offer a surface of mud, and hence fewer noxious exhalations
are here generated; not that I am ignorant that Venice is far from
being a healthy summer residence, in consequence of injurious
miasmata, raised from its very foundations, by the intensity of the
solar ray.
It is true, that the above custom also suits the calculating notions
of the Dutch. I am on this point forcibly reminded of the observation
of a solitary and smoking Dutchman, when Dr. Moore had
expressed, through the medium of an interpreter, his regret at being
unable to converse with him, in consequence of his ignorance of the
Dutch language; and which was to this effect: “They ought to console
themselves for the accident of not understanding each other; for as
they had no connexions, or dealings in trade together, their
conversing could not possibly answer any useful purpose.”
The first book which Coster brought out, and his original types, are
preserved in the Stadt-house for the inspection of the curious; we
had not, however, time to examine them, nor even to hear the
celebrated organ of this city, for we did not arrive on the day before
until after evening service had concluded; and to hear it at any other
time, is a gratification which must be handsomely paid for.
Both this town and Haarlem are famous for the long sieges they
supported against the Spaniards, under Frederic, son of the duke of
Alva, in the year 1573.
I should have felt pleasure in staying longer at this place, but that I
was desirous of getting to Brussels without delay. I therefore, in
company with Mr. T—, one of the English gentlemen, the other
staying behind with his lady, set off by the barge to the Hague. In our
way, we passed the village of Leysendam, which we walked through
to another barge, on the right of which is Catwick, where the last
branch of the Rhine, which retains its original name, loses itself in
the sands. At eight o’clock in the evening we reached the Hague,
after a journey of three hours, and took up our quarters at the hotel
of Marshal Turenne.
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
ebookmass.com