Service Level Management in Emerging Environments. Nader Mbarek
User License Agreement
List of Illustrations
1 Chapter 1Figure 1.1. The ITU-T architecture of the Internet of Things (ITU-T 2012). For a...Figure 1.2. Architecture of the Internet of Things (Lin et al. 2015). For a colo...Figure 1.3. Architecture of the Internet of Things (Khalil et al. 2018)Figure 1.4. Comparison of the structure of the IEEE 802.15.4 and the QBAIoT supe...Figure 1.5. Algorithm for the QBAIoT access method at the gateway levelFigure 1.6. Algorithm for the QBAIoT access method at the loT object levelFigure 1.7. Average real-time mission critical delays for different scenariosFigure 1.8. Average real-time non-mission critical delays for different scenario...Figure 1.9. Packet Delivery Ratio for all QoS classe. For a color version of thi...
2 Chapter 2Figure 2.1. Standardization bodies for the Cloud (Sakai 2011). For a color versi...Figure 2.2. Depiction of an Autonomic Manager (IBM 2005). For a color version of...Figure 2.3. Inter Cloud broker-based Cloud Networking architecture. For a color ...Figure 2.4. Depiction of the XML diagram for an iSLAFigure 2.5. Interactions in a broker-type architectureFigure 2.6. Federation Cloud Networking architecture. For a color version of thi...Figure 2.7. Interactions in a federation-type architectureFigure 2.8. Evaluation of the average global end-to-end delay. For a color versi...Figure 2.9. Evaluation of the jitter. For a color version of this figure, see ww...Figure 2.10. Evaluation of the bandwidth cost. For a color version of this figur...Figure 2.11. Evaluation of the global VMs cost. For a color version of this figu...Figure 2.12. Evaluation of latency and response time. For a color version of thi...Figure 2.13. Evaluation of the global bandwidth cost. For a color version of thi...Figure 2.14. Evaluation of the global VM cost. For a color version of this figur...
3 Chapter 3Figure 3.1. Architecture of a microgrid. For a color version of this figure, see...Figure 3.2. Architecture of a DSM platform. For a color version of this figure, ...Figure 3.3. Classification of DSM approachesFigure 3.4. Architecture of a smart agent
4 Chapter 4Figure 4.1. The architecture of e-health systems (Hamdi et al. 2014)
5 Chapter 5Figure 5.1. The different architectures of a wireless mesh networkFigure 5.2. General architecture of the framework. For a color version of this f...Figure 5.3. Evaluating (a) average end-to-end delay and (b) jitter for a VoIP ap...Figure 5.4. Performances of the IMRR protocol versus MARIA and IDAR. Evaluation ...Figure 5.5. Evaluation of (a) average end-to-end delay and (b) average jitter fo...
6 Chapter 6Figure 6.1. Example of the protocol stack for the IoTFigure 6.2. Identity structure and secondary keyFigure 6.3. Peering processFigure 6.4. The processing windowFigure 6.5. Trust calculation – smart contractsFigure 6.6. Complete calculation window. For a color version of this figure, see...Figure 6.7. Simulation of failure of a node. For a color version of this figure,...
7 Chapter 7Figure 7.1. Device-to-Device communication between UE1 and UE2 as a sublayer in ...Figure 7.2. The machine learning flowchartFigure 7.3. Example of node positions for a morning traffic scenario with low us...Figure 7.4. Example of the node positions for a morning traffic scenario with hi...Figure 7.5. Number of periods required for complete discovery. For a color versi...Figure 7.6. Percentage of energy consumed for the two cases considered: low and ...
8 Chapter 8Figure 8.1. The contribution of different devices to the network’s energy consum...Figure 8.2. Energy consumption based on use (Barroso and Holzle 2007)Figure 8.3. The optimized carbon footprint for specific operational loads (Bianz...Figure 8.4. The Mitola cognition cycle (Mitola 1998)Figure 8.5. Compromise: The bandwidth, transmission power, distance and flow rat...Figure 8.6. State and condition of the channel for the SU. For a color version o...Figure 8.7. New machine learning algorithmFigure 8.8. CR versus CR with Q_learning. For a color version of this figure, se...
List of Tables
1 Chapter 1Table 1.1. Parameters for the QBAIoT simulation scenarios
2 Chapter 2Table 2.1. Platforms for implementing Cloud ComputingTable 2.2. Simulation software in Cloud ComputingTable 2.3. Tools for implementing and simulating Cloud NetworkingTable 2.4. Inter-Cloud implementation and simulation toolsTable 2.5. Standardization of QoS in the CloudTable 2.6. Standardization of security in the CloudTable 2.7. Standardization of security in the Cloud
3 Chapter 3Table 3.1. Table summarizing DSM approaches
4 Chapter 4Table 4.1. Importance of QoS for e-health procedures/services (Skorin-Kapov and ...Table 4.2. Medical images: characteristics and QoS required (Vouyioukas et al. 2...Table 4.3. QoS required for the constrained e-health flows (Gállego et al. 2005)Table 4.4. Security required by WBANs and possible solutions (Ng et al. 2006)
5 Chapter 6Table 6.1. Global parameters for BATMTable 6.2. BATM simulation parameters
6 Chapter 7Table 7.1. Examples of SVR kernel functionsTable 7.2. Simulation parameters and values
Guide
1 Cover
5 Preface
8 Index
Pages
1 v
2 iii
3 iv
4 xi
5 xii
6 xiii
7 1
8 2
9 3
10 4
11 5
12 6
13 7
14