Lecture10
Lecture10
Server Nodes Location Within the internet. Edge of the local network.
2. Scalability: It can eiciently scale resources based on demand. For instance, in a smart
manufacturing facility, as more machines are added, fog nodes can be deployed to distribute computing
power, ensuring smooth operations without overloading a centralized cloud server.
3. Privacy and Data Security: Fog computing can enhance data privacy and security by keeping
sensitive data within the local network. In healthcare, patient data can be processed locally, ensuring
compliance with data privacy regulations like HIPAA.
4. Reduced Bandwidth Usage: By processing data locally, fog computing reduces the amount of data
that needs to be transmied to the cloud. In video surveillance systems, only relevant video footage may
be sent to the cloud, reducing bandwidth costs.
5. Reliability: Fog computing can ensure continuity of operations even in the absence of internet
connectivity. For example, in a remote agricultural seing, fog nodes can control irrigation systems
independently of cloud connectivity.
Disadvantages of Fog Computing
1. Resource Limitations: Fog devices may have limited computational resources compared to cloud
servers. This can be a limitation for processing complex tasks. For instance, running deep learning
models for image recognition may be challenging on resource-constrained edge devices.
2. Management Complexity: Managing a distributed fog computing infrastructure can be more complex
than managing a centralized cloud. Ensuring all edge devices are updated, secure, and coordinated can
be challenging.
3. Cost: Deploying and maintaining fog nodes at the edge can be costly, especially when dealing with a
large number of devices. The cost of hardware, maintenance, and energy consumption can add up.
4. Compatibility Issues: Ensuring compatibility and interoperability among various fog devices and
software can be challenging. In a smart home ecosystem, integrating devices from dierent
manufacturers may require significant eort.
5. Security Concerns: While fog computing can enhance security in some cases, it also introduces new
security challenges. Edge devices may be more vulnerable to physical aacks or tampering, and
managing security across a distributed network can be complex.
Applications
1. Smart Grid
2. Intelligent Transportation
The focus of the applications during analytics of data in biomedical area for correctly identifying smart health-care
decisions in the future.
3. Cost: Deploying and maintaining fog nodes at the edge can be costly,
especially when dealing with a large number of devices. The cost of hardware,
maintenance, and energy consumption can add up.