Advertisement

Towards a Unified Smart Grid ICT Infrastructure

  • Fayҫal Bouhafs
  • Michael Mackay
  • Madjid Merabti
Chapter
Part of the SpringerBriefs in Computer Science book series (BRIEFSCOMPUTER)

Abstract

Throughout the previous chapters we have outlined the key technologies that will characterize the development of the smart grid. Innovative new power engineering technologies will be required to introduce flexibility so the power distribution network can incorporate new distributed generation systems and optimize delivery in a more responsive and dynamic environment. Moreover, an entirely new plane is introduced in the form of smart metering feeding back from end users towards energy suppliers and network operators and ultimately provide an end-point for dynamic two way communication between producers, providers, and consumers. As we have seen, the provision for these new technologies necessitates the provision for ubiquitous data communication networks, far beyond what is currently in place, and this has been the main focus of this work. However, while we have seen how communications networks can be built around the technologies considered here, we have yet to show how these systems could be composed together and what functionality will be necessary to govern the interaction between these disparate elements.

Keywords

Cloud Computing Cloud Service Distribution Network Smart Grid Cloud Provider 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    M. Armbrust, et al. Above the clouds: a Berkeley view of cloud computing, UC Berkeley Technical Report, 2009.Google Scholar
  2. 2.
    NIST Definition of Cloud Computing v15, 2009, http://www.nist.gov/itl/cloud/upload/cloud-def-v15.pdf
  3. 3.
    C. Clark, K. Fraser, A. Hand, J. Hansen, E. Jul, C. Limpach, I. Pratt, and A. Warfield. Live Migration of Virtual Machines. In Proc of the Symposium on Networked Systems Design and Implementation, 2005.Google Scholar
  4. 4.
    Y. Song, Y. Sun, H. Wang, X. Song. An adaptive resource flowing scheme amongst VMs in a VM-based utility computing. 7th IEEE International Conference on Computer and Information Technology, CIT 2007, pp. 1053–1058.Google Scholar
  5. 5.
    D. Catteddu, G. Hogben. Cloud Computing: Benifits, risks and recommendations for information security. European Network and Information Security Agency (ENISA), 2009.Google Scholar
  6. 6.
    Cloud Security Alliance, “Top Threats to Cloud Computing”, http://www.cloudsecurityalliance.org/topthreats, March 2010.
  7. 7.
    D. C. Marinescu. “Cloud Computing; Theory and Practice.” Morgan Kaufmann, 2013.Google Scholar
  8. 8.
    K. Grolinger, W. A. Higashino, A. Tiwari and M. A. Capretz, Data management in cloud environments: NoSQL and NewSQL data stores. Journal of Cloud Computing: Advances, Systems and Applications, 2013.Google Scholar
  9. 9.
    J. Dean, S. Ghemawat. MapReduce: simplified data processing on large clusters. In: Proc of OSDI, 2004.Google Scholar

Copyright information

© The Author(s) 2014

Authors and Affiliations

  • Fayҫal Bouhafs
    • 1
  • Michael Mackay
    • 1
  • Madjid Merabti
    • 1
  1. 1.School of Computing and MathsLiverpool John Moores UniversityLiverpoolUnited Kingdom

Personalised recommendations