{"title":"Modelling a Leaf and Spine Topology for VM Migration in Fog Computing","authors":"P. Roig, S. Alcaraz, K. Gilly, C. Juiz","doi":"10.1109/IEEECONF49502.2020.9141611","DOIUrl":null,"url":null,"abstract":"As many IoT environments consider mobility features for the devices, their virtual computing capabilities allocated in hosts within a fog or edge datacentre may follow it to a closer location as the IoT device changes its position in order to minimise both latency and bandwidth use. In this paper, a model for VM migration in a Leaf and Spine Data Center topology is proposed, being that model expressed in both an algorithmic and an algebraic manner. Furthermore, the devices and their ports being part of each of the redundant paths available between any two given hosts are obtained by applying the model.","PeriodicalId":186085,"journal":{"name":"2020 24th International Conference Electronics","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 24th International Conference Electronics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IEEECONF49502.2020.9141611","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
As many IoT environments consider mobility features for the devices, their virtual computing capabilities allocated in hosts within a fog or edge datacentre may follow it to a closer location as the IoT device changes its position in order to minimise both latency and bandwidth use. In this paper, a model for VM migration in a Leaf and Spine Data Center topology is proposed, being that model expressed in both an algorithmic and an algebraic manner. Furthermore, the devices and their ports being part of each of the redundant paths available between any two given hosts are obtained by applying the model.