Energy constrained operation: The nodes in a MANET rely on battery power source. Mobile node batteries are small and normally store a very limited amount of energy. Inefficient network operations, such as routing, network initialization, etc., can rapidly drain batteries. In this situation, the most essential basic system paradigm should be vitality preservation.
Limited physical security: Mobile networks are prone to many more types of security threats than fixed networks, mainly due to wireless transmissions and collaborative routing. There are increased possibilities of eavesdropping, spoofing, and DOS attacks in these networks. Also, nodes are vulnerable to capture and compromise.
1.5 Summary
The basics of cloud computing have been described in this introductory chapter. The chapter began with a description of the evolution of cloud computing, including the historical advancement of cloud and how different computer systems are linked to form a cloud infrastructure. The concept of grid computing and its architecture and also cluster computing and its architecture were discussed. This chapter also presented a comparison-based study of cluster, grid and cloud, and concluded with a discussion of mobile computing.
EXERCISES
1 What is cloud computing? How do you differentiate it from internet computing?
2 Differentiate between a tightly coupled and a loosely coupled system with examples.
3 Define the cluster of computer environment. How can the cluster be used for high availability purposes?
4 What are the benefits of cloud computing?
5 What is a cloud?
6 Explain the architecture of the cluster of computers with neat sketches.
7 What is computer grid? How does the concept of grid computing mimic the electric grid?
8 Differentiate between distributed computing and peer-to-peer computing. What are the major challenges in distributed computing and peer-to-peer computing?
9 Explain how the grid computing environment is deployed.
10 What is mobile computing? Explain the three-tier structure of the mobile computing environment.
11 Briefly discuss the structure of mobile peer-to-peer computing. What are the characteristics of mobile peer-to-peer computing?
12 What is an ad-hoc network? Is it always mobile? Briefly discuss the major application of mobile ad-hoc network.
13 Which are the different layers that define cloud architecture?
14 What are the different data types used in cloud computing?
15 What are the different layers in cloud computing? Explain how they work.
References
1. Garfinkel, S. (1999). Architects of the information society: 35 years of the Laboratory for Computer Science at MIT. MIT press. ISBN 978-0-262-07196-3.
2. Paul, F., & Michael, S. (2000). Fire in the valley: The making of the personal computer. New York: Osborne-McGraw-Hill.
3. Foster, I. (2003). The grid: Computing without bounds. Scientific American, 288(4), 78-85.
4. Sadashiv, N., & Kumar, S. D. (2011, August). Cluster, grid and cloud computing: A detailed comparison. In 2011 6th International Conference on Computer Science & Education (ICCSE) (pp. 477-482). IEEE.
5. Buyya, R. (1999). High performance cluster computing: Architectures and systems (volume 1). Prentice Hall, Upper SaddleRiver, NJ, USA, 1, 999.
6. Mark baker and Rajkumar Buyya, “Cluster Computing at a Glance”
7. Foster, I., & Kesselman, C. (Eds.). (2003). The Grid 2: Blueprint for a new computing infrastructure. Elsevier.
8. Zhang, S., Chen, X., Zhang, S., & Huo, X. (2010, October). The comparison between cloud computing and grid computing. In 2010 International Conference on Computer Application and System Modeling (ICCASM 2010) (Vol. 11, pp. V11-72). IEEE.
9. Weishaupl, T., & Schikuta, E. (2004, October). Towards the merger of grid and economy. In International Conference on Grid and Cooperative Computing (pp. 563-570). Springer, Berlin, Heidelberg.
10. Jackson, K. R., Ramakrishnan, L., Muriki, K., Canon, S., Cholia, S., Shalf, J., ... & Wright, N. J. (2010, November). Performance analysis of high performance computing applications on the amazon web services cloud. In 2010 IEEE second international conference on cloud computing technology and science (pp. 159-168). IEEE.
11. Le, D. N., Kumar, R., Nguyen, G. N., & Chatterjee, J. M. (2018). Cloud Computing and Virtualization. John Wiley & Sons.
12. Le, D. N., Bhatt, C. M., & Madhukar, M. (Eds.). (2019). Security Designs for the Cloud, IoT, and Social Networking. John Wiley & Sons.
13. Hurwitz, J. S., & Kirsch, D. (2020). Cloud Computing for Dummies. John Wiley & Sons.
14. Ruan, L., Guo, S., Qiu, X., & Buyya, R. (2020). Fog Computing for Smart Grids: Challenges and Solutions. arXiv preprint arXiv:2006.00812.
15. Huth, A., & Cebula, J. (2011). The Basics of Cloud Computing. United States Computer.
16. Allahvirdizadeh, Y., Moghaddam, M. P., & Shayanfar, H. (2019). A survey on cloud computing in energy management of the smart grids. International Transactions on Electrical Energy Systems, 29(10), e12094.
17. Srinivasan, S. (2014). Cloud Computing Basics. Springer.
18. Pattnaik, P. K., & Mall, R. (2015). Fundamentals of Mobile Computing. PHI Learning Pvt. Ltd..
19. Rountree, D., & Castrillo, I. (2013). The basics of cloud computing: Understanding the fundamentals of cloud computing in theory and practice. Newnes.
20. Machidon, O., Fajfar, T., & Pejovic, V. (2020). Implementing Approximate Mobile Computing. In Proc. of the 2020 Workshop on Approximate Computing Across the Stack (WAX) (pp. 1-3).
21. Van, V. N., Long, N. Q., Nguyen, G. N., & Le, D. N. (2016). A performance analysis of openstack open-source solution for IaaS cloud computing. In Proceedings of the Second International Conference on Computer and Communication Technologies (pp. 141-150). Springer, New Delhi.
22. Van, V. N., Long, N. Q., & Le, D. N. (2016). Performance analysis of network virtualization in cloud computing infrastructures on openstack. In Innovations in Computer Science and Engineering (pp. 95-103). Springer, Singapore.
23. Hurwitz, J. S., & Kirsch, D. (2020). Cloud computing for Dummies. John Wiley & Sons.
24. Seth, B., Dalal, S., Jaglan, V., Le, D. N., Mohan, S., & Srivastava, G. (2020). Integrating encryption techniques for secure data storage in the cloud. Transactions on Emerging Telecommunications Technologies, e4108.
25. Bohu, L., Lin, Z., & Xudong, C. (2020). Introduction to cloud manufacturing. ZTE Communications, 8(4), 6-9.
3