0% found this document useful (0 votes)
266 views

Unit V Introduction To Fog Computing Fog Computing-Definition

Fog computing is a model that extends cloud computing and services to the edge of the network. It facilitates operation of computing, storage, and networking between IoT devices and cloud data centers. Key characteristics include security, programmability to support multiple applications, real-time processing capabilities, support for multiple operating systems, and use of standard internet protocols. Fog computing can be used for scenarios that require selected data to be processed locally with minimal latency before being sent to cloud for long-term storage. It also enables services to be provided across large geographical areas and supports devices requiring rigorous computations. However, fog computing faces challenges related to authentication, privacy, security, server placement, energy consumption and complex trust models involving multiple involved parties

Uploaded by

Jay Ram
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
266 views

Unit V Introduction To Fog Computing Fog Computing-Definition

Fog computing is a model that extends cloud computing and services to the edge of the network. It facilitates operation of computing, storage, and networking between IoT devices and cloud data centers. Key characteristics include security, programmability to support multiple applications, real-time processing capabilities, support for multiple operating systems, and use of standard internet protocols. Fog computing can be used for scenarios that require selected data to be processed locally with minimal latency before being sent to cloud for long-term storage. It also enables services to be provided across large geographical areas and supports devices requiring rigorous computations. However, fog computing faces challenges related to authentication, privacy, security, server placement, energy consumption and complex trust models involving multiple involved parties

Uploaded by

Jay Ram
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

UNIT V

Introduction To Fog Computing

Fog Computing-Definition

Fog Computing is the term coined by Cisco that refers to extending cloud computing to an
edge of the enterprise’s network. Thus, it is also known as Edge Computing or Fogging. It
facilitates the operation of computing, storage, and networking services between end
devices and computing data centers.

Fog computing Characteristics

1 Security

-strong security

-Fault tolerance

2 Programmability
-Multiple application support

-Versatility in operating environment

3 Real time features

-Deterministic timing capabilities

4 Supports multiple operating platforms

-unix, windows, mac etc

5 Employs simple,fast and standrized IOT internet protocols(TCP/IP, Sockets, etc)

6 Runs on Affordable, off the shelf computing technologies

Fog computing Application

Issues with Fog Computing

Authentication and Trust issues


Authentication is one of the most concerning issues of fog computing since these services are
offered at a large scale.

Fog service providers can be different parties like cloud service providers, internet service
providers, and end-users.

This flexibility complicates the whole structure and trust situation of fog. A rouge fog node is
a fog device which pretends to be legal and coaxes end user to connect to it.

Privacy

Privacy concern is always there when there are many networks involved. Since fog
computing is based on wireless technology, there is a huge concern regarding network
privacy.

Security

Fog computing security issues arise as there are many devices connected to fog nodes and at
different gateways.

Each device has a different IP address, and any hacker can fake your IP address to gain
access to your personal information that is stored in that particular fog node

Fog Servers

The right placement of fog servers should be there so that it can deliver its maximum service.

The company should analyze the demand and work done by the fog node before placing it
will help in reducing the maintenance cost

Energy consumption
Energy consumption is very high in fog computing as the number of fog nodes present in the
fog environment are high and require energy to work.

Companies should try to minimize the energy requirement by the fog nodes so that they
should become more energy-efficient and save costs.

Fog Computing and Internet of Things-Pros and Cons

Need and Reasons for Fog Computing Fog Computing

use of fog computing

Fog Computing can be used in the following scenarios:


1. It is used when only selected data is required to send to the cloud. This selected data is
chosen for long term storage and is less frequently accessed by the host.
2. It is used whenever a large number of services need to be provided over a large area at
different geographical locations.
3. Devices that are subjected to rigorous computations and processings must use fog
computing.
4. Real-world examples where fog computing is used are in IoT devices (eg. Car-to-Car
Consortium, Europe), Devices with Sensors, Cameras (IIoT-Industrial Internet of
Things), etc.

Need for cloud computing

1.  Latency
Sending all of your device data to the cloud for processing and analytics can take anywhere
between a quick few minutes to several days at a stretch. For example, if your IoT devices are
generating one terabyte (TB) of data per day, it could take you a couple of days to transfer
this data to the cloud, process it, and generate actionable items from the data. By this time,
the window of opportunity to act on the conclusions drawn from the data may have passed. 

2.  Security
Sending sensitive operational data from the edge to the cloud puts the data and your edge
devices at risk. Multiple levels of security need to be put in place in an IoT system to ensure
that the data is securely transferred to cloud storage systems. Processing data at the edge
helps prevent data breaches and enables faster responses.

3.  Data Integrity


The cloud model has outsourced the storage and processing of data. Data integrity is a key
concern in the IoT because sensitive data from various critical applications is stored on a
public cloud. Cloud storage providers typically do not disclose the physical location of the
storage. In addition, sending data from the device to a gateway and then to a cloud over the
Internet puts the data at risk of corruption or unauthorized access.

4.  Data-Transfer and BandwidthCost


Transferring large volumes of data from the edge of the network to a cloud server can be
prohibitively expensive. For example a typical offshore oil platform can generate 1 to 2 TB of
data per day. The most common way for offshore oil platforms to transfer data is via a
satellite connection, where data speeds range from 64 Kbps to 2 Mbps. With these data
speeds, it would take more than 12 days to transfer one day’s worth of data from the oil
platform to a central repository. Furthermore, the cost of transferring this data on a daily basis
could lead to unsustainable communication costs in the long run.

5.  Independent Operation in Remote Locations


The fog computing model enables remote locations to reduce downtime and operate
independently when the central system is inaccessible. For example, if there is a network
outage and connectivity to the cloud system is lost, field sites can use local computing power
to process and analyze data. Processed data can then be sent to the cloud for long-term
storage when the connection is restored.

Advantages of fog computing


 This approach reduces the amount of data that needs to be sent to the cloud.
 Since the distance to be traveled by the data is reduced, it results in saving network
bandwidth.
 Reduces the response time of the system.
 It improves the overall security of the system as the data resides close to the host.
Disadvantages of fog computing
 Congestion may occur between the host and the fog node due to increased traffic (heavy
data-flow).
 Power consumption increases when another layer is placed between the host and the
cloud.
 Scheduling tasks between host and fog nodes along with fog nodes and the cloud is
difficult.
 Data management becomes tedious as along with the data stored and computed, the
transmission of data involves encryption-decryption too which in turn release data.

Edge/Fog computing myths

Myth 1: There is only one true definition of edge

“Edge can vary based on computing, storage, and where you engage streaming data,” says
Jason Mann, VP of IoT at SAS. It will also vary based on your point of view, adds Hopkins.
The enterprise edge will look different than a cloud vendor’s or a telco’s edge.

Myth 2: Edge computing is a single thing 

It is neither an easily categorized entity nor market, but rather “a way of recasting
infrastructure boundaries beyond the data center depending on the use case, industry, or
business function,” explains Richard Villars, VP, Data Center and Cloud, at IDC. “The edge
could be also looked at as a location in between the core (which is the corporate or cloud data
center) and the endpoints (smart sensors, devices, things) where the digital and physical
worlds intersect.”

Myth 3: Edge computing is new

The concept is not novel. However, advances in technology have made edge computing more
plausible and powerful. “The cost of computing devices and sensors has fallen. More
computing power is contained in smaller devices,” says Dr. James Stanger, chief technology
evangelist at CompTIA. “There’s been an explosion in the volume of data generated and
collected. New analytics tools make it possible to sort through this data more efficiently and
economically, allowing organizations to act on the information.”

Myth 4: Edge computing is a cloud killer

Cloud computing isn’t going anywhere. Some analyst firms have suggested that edge
computing will eat the cloud. Not true. “In reality, edge and cloud are complementary
technologies,” Mann says.

Myth 5: Edge computing and IoT are one and the same

“The edge does not equal IoT,” Forrester’s Hopkins notes. “IoT is a set of solutions that
involve connected things with sensors. Edge computing empowers IoT solutions to be more
responsive and less costly.” Edge computing can also be a critical element in non-IoT
situations such as mobile customer engagement and B2B process acceleration.

Myth 6: Edge computing is theoretical or immature

The edge is very much real. “Many companies are already implementing edge computing and
reaping the rewards of early adoption,” Mann says.

Myth 7: Real-time decision-making is the only benefit

While faster decision-making is important, edge computing can also serve as a solution to
issues like intermittent or non-existent connectivity, bandwidth issues, or networking costs.

Myth 8: The edge is suited for simple analytics only

There are certainly constraints and limitations depending on the scenario. However, Mann
says, “the edge is a robust analytics environment capable of running machine learning and
artificial intelligence (AI).”

Myth 6: Edge computing is theoretical or immature

The edge is very much real. “Many companies are already implementing edge computing and
reaping the rewards of early adoption,” Mann says.

Myth 7: Real-time decision-making is the only benefit

While faster decision-making is important, edge computing can also serve as a solution to
issues like intermittent or non-existent connectivity, bandwidth issues, or networking costs.

Myth 8: The edge is suited for simple analytics only

There are certainly constraints and limitations depending on the scenario. However, Mann
says, “the edge is a robust analytics environment capable of running machine learning and
artificial intelligence (AI).”

Myth 9: The edge is irrelevant to my particular business or industry

“It’s wise to think about how IP-enabled technologies, like sensors, cameras, robots, and
interfaces, will impact your business,” says Todd Loeppke, lead CTO architect at Sungard
Availability Services. “At first blush, it might be tempting to think IoT devices are not going
to impact your business, but I would encourage stakeholders to think outside the box, perhaps
past your legacy environment to what might be possible. This is critical to remain relevant
since it’s highly likely that startups in your industry are doing just that.”

Myth 10: Edge computing is a panacea

“Edge computing isn’t magic or some sort of dark art,” Mann says. In fact, for as many new
opportunities as it creates, it also requires a significant amount of work to do well.

You might also like