Fog Computing
Fog Computing
Computing
Fog Computing
Contents :
2
Introduction to Fog Computing
Less scalable than fog computing. Highly scalable when compared to edge computing.
Edge computing is a subdivision of fog computing. Fog computing is a subdivision of cloud computing.
The bandwidth requirement is very low. Because data The bandwidth requirement is high. Data originating from
comes from the edge nodes themselves. edge nodes is transferred to the cloud.
High privacy. Attacks on data are very low. The probability of data attacks is higher.
• Congestion may occur between the host and the fog node due
to increased traffic (heavy data flow).
• Scheduling tasks between host and fog nodes along with fog
nodes and the cloud is difficult.
2. Fog nodes
• Fog nodes are independent devices that pick up the generated
information.
• Fog nodes fall under three categories: fog devices, fog servers,
and gateways.
• These devices store necessary data while fog servers also
compute this data to decide the course of action.
• Fog devices are usually linked to fog servers.
• Fog gateways redirect the information between the various fog
devices and servers.
• This layer is important because it governs the speed of
processing and the flow of information.
• Setting up fog nodes requires knowledge of varied hardware
configurations, the devices they directly control, and network
connectivity.
Fog Computing Components
3. Monitoring services
• Monitoring services usually include application programming
interfaces (APIs) that keep track of the system’s performance
and resource availability.
• Monitoring systems ensure that all end devices and fog nodes
are up and communication isn’t stalled.
4. Data processors
• Data processors are programs that run on fog nodes. They filter,
trim, and sometimes even reconstruct faulty data that flows
from end devices.
• Data processors are in charge of deciding what to do with the
data — whether it should be stored locally on a fog server or
sent for long-term storage in the cloud.
• Information from varied sources is homogenized for easy
transportation and communication by these processors.
• This is done by exposing a uniform and programmable
interface to the other components in the system.
• Some processors are intelligent enough to fill the information
based on historical data if one or more sensors fail.
• This prevents any kind of application failure.
Fog Computing Components
5. Resource manager
• Fog computing consists of independent nodes that must work in
a synchronized manner.
• The resource manager allocates and deallocates resources to
various nodes and schedules data transfer between nodes and
the cloud.
• It also takes care of data backup, ensuring zero data loss.
• Since fog components take up some of the SLA commitments
of the cloud, high availability is a must.
• The resource manager works with the monitor to determine
when and where the demand is high.
• This ensures that there is no redundancy of data as well as fog
servers.
Fog Computing Components
6. Security tools
• Since fog components directly interact with raw data sources,
security must be built into the system even at the ground level.
•
• Encryption is a must since all communication tends to happen
over wireless networks.
• End users directly ask the fog nodes for data in some cases.
7. Applications
• Applications provide actual services to end-users.
Edge location: The origins of the Fog can be traced to early proposals to
support endpoints with rich services at the edge of the network, including
applications with low latency requirements (e.g. gaming, video streaming,
augmented reality.
• Fog service providers can be different parties like cloud service providers,
internet service providers, and end-users.
• This flexibility complicates the whole structure and trust situation of fog. A
rouge fog node is a fog device which pretends to be legal and coaxes end
user to connect to it.
• Once a user connects to it, it can manipulate the signals coming to and from
the user to the cloud and can easily launch attacks.
Major Issues with Fog Computing
Privacy
• Privacy concern is always there when there are many networks involved.
Since fog computing is based on wireless technology, there is a huge
concern regarding network privacy.
• There are so many fog nodes that each end-user is accessible to them and
because of this more sensitive information passes from end-users to the fog
nodes.
Security
Fog computing security issues arise as there are many devices connected to fog
nodes and at different gateways.
Each device has a different IP address, and any hacker can fake your IP address
to gain access to your personal information that is stored in that particular fog
node.
Major Issues with Fog Computing
Fog Servers
• The right placement of fog servers should be there so that it can deliver its
maximum service.
• The company should analyze the demand and work done by the fog node
before placing it will help in reducing the maintenance cost.
Energy consumption
• Energy consumption is very high in fog computing as the number of fog
nodes present in the fog environment are high and require energy to work.
• Companies should try to minimize the energy requirement by the fog nodes
so that they should become more energy-efficient and save costs.
Fog Architecture for smart cities
Fog Architecture for Healthcare
Fog Architecture for Vehicle Connections
Thank you