Unit V Introduction To Fog Computing Fog Computing-Definition
Unit V Introduction To Fog Computing Fog Computing-Definition
Fog Computing-Definition
Fog Computing is the term coined by Cisco that refers to extending cloud computing to an
edge of the enterprise’s network. Thus, it is also known as Edge Computing or Fogging. It
facilitates the operation of computing, storage, and networking services between end
devices and computing data centers.
1 Security
-strong security
-Fault tolerance
2 Programmability
-Multiple application support
Fog service providers can be different parties like cloud service providers, internet service
providers, and end-users.
This flexibility complicates the whole structure and trust situation of fog. A rouge fog node is
a fog device which pretends to be legal and coaxes end user to connect to it.
Privacy
Privacy concern is always there when there are many networks involved. Since fog
computing is based on wireless technology, there is a huge concern regarding network
privacy.
Security
Fog computing security issues arise as there are many devices connected to fog nodes and at
different gateways.
Each device has a different IP address, and any hacker can fake your IP address to gain
access to your personal information that is stored in that particular fog node
Fog Servers
The right placement of fog servers should be there so that it can deliver its maximum service.
The company should analyze the demand and work done by the fog node before placing it
will help in reducing the maintenance cost
Energy consumption
Energy consumption is very high in fog computing as the number of fog nodes present in the
fog environment are high and require energy to work.
Companies should try to minimize the energy requirement by the fog nodes so that they
should become more energy-efficient and save costs.
1. Latency
Sending all of your device data to the cloud for processing and analytics can take anywhere
between a quick few minutes to several days at a stretch. For example, if your IoT devices are
generating one terabyte (TB) of data per day, it could take you a couple of days to transfer
this data to the cloud, process it, and generate actionable items from the data. By this time,
the window of opportunity to act on the conclusions drawn from the data may have passed.
2. Security
Sending sensitive operational data from the edge to the cloud puts the data and your edge
devices at risk. Multiple levels of security need to be put in place in an IoT system to ensure
that the data is securely transferred to cloud storage systems. Processing data at the edge
helps prevent data breaches and enables faster responses.
“Edge can vary based on computing, storage, and where you engage streaming data,” says
Jason Mann, VP of IoT at SAS. It will also vary based on your point of view, adds Hopkins.
The enterprise edge will look different than a cloud vendor’s or a telco’s edge.
It is neither an easily categorized entity nor market, but rather “a way of recasting
infrastructure boundaries beyond the data center depending on the use case, industry, or
business function,” explains Richard Villars, VP, Data Center and Cloud, at IDC. “The edge
could be also looked at as a location in between the core (which is the corporate or cloud data
center) and the endpoints (smart sensors, devices, things) where the digital and physical
worlds intersect.”
The concept is not novel. However, advances in technology have made edge computing more
plausible and powerful. “The cost of computing devices and sensors has fallen. More
computing power is contained in smaller devices,” says Dr. James Stanger, chief technology
evangelist at CompTIA. “There’s been an explosion in the volume of data generated and
collected. New analytics tools make it possible to sort through this data more efficiently and
economically, allowing organizations to act on the information.”
Cloud computing isn’t going anywhere. Some analyst firms have suggested that edge
computing will eat the cloud. Not true. “In reality, edge and cloud are complementary
technologies,” Mann says.
Myth 5: Edge computing and IoT are one and the same
“The edge does not equal IoT,” Forrester’s Hopkins notes. “IoT is a set of solutions that
involve connected things with sensors. Edge computing empowers IoT solutions to be more
responsive and less costly.” Edge computing can also be a critical element in non-IoT
situations such as mobile customer engagement and B2B process acceleration.
The edge is very much real. “Many companies are already implementing edge computing and
reaping the rewards of early adoption,” Mann says.
While faster decision-making is important, edge computing can also serve as a solution to
issues like intermittent or non-existent connectivity, bandwidth issues, or networking costs.
There are certainly constraints and limitations depending on the scenario. However, Mann
says, “the edge is a robust analytics environment capable of running machine learning and
artificial intelligence (AI).”
The edge is very much real. “Many companies are already implementing edge computing and
reaping the rewards of early adoption,” Mann says.
While faster decision-making is important, edge computing can also serve as a solution to
issues like intermittent or non-existent connectivity, bandwidth issues, or networking costs.
There are certainly constraints and limitations depending on the scenario. However, Mann
says, “the edge is a robust analytics environment capable of running machine learning and
artificial intelligence (AI).”
“It’s wise to think about how IP-enabled technologies, like sensors, cameras, robots, and
interfaces, will impact your business,” says Todd Loeppke, lead CTO architect at Sungard
Availability Services. “At first blush, it might be tempting to think IoT devices are not going
to impact your business, but I would encourage stakeholders to think outside the box, perhaps
past your legacy environment to what might be possible. This is critical to remain relevant
since it’s highly likely that startups in your industry are doing just that.”
“Edge computing isn’t magic or some sort of dark art,” Mann says. In fact, for as many new
opportunities as it creates, it also requires a significant amount of work to do well.