0% found this document useful (0 votes)
103 views37 pages

6 - Fog Computing

Fog computing extends cloud computing by placing resources closer to IoT devices at the edge of the network. This helps address issues with cloud computing like high latency, bandwidth constraints, lack of mobility support, and security vulnerabilities. Fog deployments result in faster processing, lower bandwidth usage, ability to work offline, and improved security compared to cloud. Fog nodes ingest data from IoT devices and direct different types of data to optimal locations like other fog nodes or the cloud for analysis based on response time needs and application requirements.

Uploaded by

manazir islam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
103 views37 pages

6 - Fog Computing

Fog computing extends cloud computing by placing resources closer to IoT devices at the edge of the network. This helps address issues with cloud computing like high latency, bandwidth constraints, lack of mobility support, and security vulnerabilities. Fog deployments result in faster processing, lower bandwidth usage, ability to work offline, and improved security compared to cloud. Fog nodes ingest data from IoT devices and direct different types of data to optimal locations like other fog nodes or the cloud for analysis based on response time needs and application requirements.

Uploaded by

manazir islam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 37

FOG

COMPUTING
Dr. Md. Sazzadur Rahman
Associate Professor
IIT-JU
2
Table Of
Content
1. Cloud Computing Limitation.
2. Fog Computing & Its Characteristics.
3. Fog VS. Cloud.
4. Fog Technology Architecture.
5. Case Study.
6. Further Applications.
7. Review Paper.
8. Summary & References.
3
Existing
Cloud
Computing
System
Cloud computing is a type of
computing that relies on sharing
computing resources rather than
having local servers or personal
devices to handle applications.

4
Cloud Computing
Limitations
1.Not Always Connected:
• Connectivity to the Cloud is a pre-requisite of cloud computing.
• Some IoT systems need to work even if connection is temporarily unavailable.

2. Not Always Enough Bandwidth:


• Cloud computing assumes that there is enough bandwidth to collect the data.
• That can become an overly strong assumptions for Industrial IoT applications.

3. Cloud computing centralizes analytics:


• Thus defining the lower bound reaction time of the system.
• Some IoT applications won’t be able to wait for the data to get to the cloud, be
analyzed and for insights to get back.

4. Security Shortcomings:
• Existing data protection mechanisms in Cloud Computing such as
encryption failed in securing the data from the attackers.

5
Fog
Computing
Whereas the cloud is "up there" in
the sky somewhere, distant and
remote and deliberately abstracted.
The "fog" is close to the ground,
right where things are getting
done.

6
Fog
Computing
•Fog computing (aka, Edge computing) is a paradigm that extends Cloud computing and
services to the edge of the network.
• Fog computing places processes and resources at the edge of the cloud, often on
network
devices, while data remains stored in the cloud.
• This leads to faster processing times and fewer resources consumed.
• The term "Fog Computing" was introduced by the Cisco Systems in January 2014 as
new
model to ease wireless data transfer to distributed devices in the IoT network
paradigm.

7
Fog
Computing

8
Fog Computing: Before &
After

Cloud architecture before the advent of fog technology Cloud architecture with the advent of fog technology
9
Fog Computing
Characteristics
Geographical The services and application objective of the fog is widely
distribution distributed.

Support for Fog devices provide mobility techniques like decouple host
identity to location identity.
mobility
Real time Fog computing requires real time interactions for speedy
service.
interactions
Heterogeneity Fog nodes can be deployed in a wide variety of environments.

Fog components must be able to interoperate in order to give


Interoperability
wide range of services like streaming.

10
FOG VS. CLOUD
Reduction in data movement across the network resulting in reduced congestion.
Elimination of bottlenecks resulting from centralized computing systems.
Improved security of encrypted data as it stays closer to the end user.

11
Fog VS.
Cloud Requirement
Latency
Cloud Computing
High
Fog Computing
Low
Delay Jitter High Very Low
Location of Server Nodes With in Internet At the edge of local n/w
Distance between the client and server Multiple Hops One Hop
Security Undefined Can be Defined
Attack on data enrouter High Probability Very Less Probability
Location Awareness No Yes
Geographical Distribution Centralized Distributed
No. of server nodes Few Very Large
Support for Mobility Limited Supported
Real time interactions Supported Supported
Type of last mile connectivity Leased line Wireless

12
FOG COMPUTING &
INTERNET OF
THINGS
By 2020, the number of “things” that are part of the IoT may reach up to 50
billion. That’s a lot of data being generated.

13
Internet of
Things (IoT)
The Internet of Things (IoT) is the
network of physical objects devices,
vehicles, buildings and other items
embedded with electronics, software,
sensors, and network connectivity that
enables these objects to collect and
exchange data.

14
Fog Computing
Architecture
IoT Applications

Application Models Sense-Process-Actuate Stream Processing


Resource Provisioning and
Resource Management Operator Placement
Scheduling
Performance Knowledge
Infrastructure Monitoring Monitoring
Prediction Base
Data Generated Data Streams

Fog Devices

IoT Sensors and Actuators

15
Fog Computing
Architecture
•IoT Sensors:
• Are placed at the bottommost layer of the architecture and distributed geographically,
sensing the environment, and emitting observed values to upper layers via gateways for
further processing and filtering.
• IoT Data Streams are made of a sequence of immutable values emitted by sensors.
• IoT Actuators:
• Similarly operate at the bottommost layer of the architecture and are responsible for
controlling a mechanism or system. Actuators are usually designed to respond to changes in
environments that are captured by sensors.
• Fog Device:
• In the architecture any element in the network that is capable of hosting application modules
is called Fog Device. Fog devices that connect sensors to the Internet are generally called
gateways.

16
Fog Computing
Architecture
• In addition, the architecture defines three main services for Fog and IoT
environments that are described below:
• Monitoring Components:
• Keep track of the resource utilization and availability of sensors, actuators, Fog devices
and network elements. They keep track of the applications and services deployed on the
infrastructure by monitoring their performance and status. Monitoring components
supply this information to other services as required.
• Resource Management:
• Is the core component of the architecture and consists of components that coherently
manage resources in such a way that application level QoS constraints are met and
resource wastage is minimized. To this end, Placement and Scheduler components play
a major role by keeping track of the state of available resources to identify the best
candidates for hosting an application module.

17
Fog Computing
Architecture
• Power Monitoring:
• One of the toughest challenges that most IoT solutions face is utilization of resources of
IoT nodes while considering constraints on energy consumption.
• In contrast to cloud data centers, Fog computing encompasses a large number of
devices with heterogeneous power consumption, making energy management difficult
to achieve.

18
Fog & Policy Management

Policy based orchestration framework of fog technology

19
How Does Fog
Work?
• Developers either port or write IoT applications for fog nodes at the network edge.

• The fog nodes closest to the network edge ingest the data from IoT devices. Then
the fog IoT application directs different types of data to the optimal place for
analysis, as shown in Table:
Fog Nodes Closest to IoT Devices Fog Aggregation Nodes Cloud
Response time Milliseconds to sub second Seconds to minutes Minutes, days, weeks
Application M2M communication, including Visualization Big data analytics
examples telemedicine and training Simple analytics Graphical dashboards

How long IoT data


is stored Transient Hours, days, or weeks Months or years

Geographic
coverage Very local: for example, one city block Wider Global

20
What Happens in the Fog and the
Cloud?
Fog nodes Cloud platform
• Receive feeds from IoT devices using • Receives and aggregates data
any protocol, in real time. summaries from many fog nodes.
• Run IoT-enabled applications for real- • Performs analysis on the IoT data and
time control and analytics, with data from other sources to gain
millisecond response time. business insight.
• Provide transient storage, often 1–2 • Can send new application rules to the
hours. fog nodes based on these insights.
• Send periodic data summaries to
the
cloud.
21
CASE STUDY
Fog Computing in Healthcare: A Review and Discussion

22
Challenges For Healthcare
• Healthcare systems in most countries face enormous challenges that will increase
due to aging population and the rise of chronic diseases.
• Growing nursing staff shortage.
• Much time is wasted in hospitals by manually measuring biometric parameters
and transferring the data between systems.

23
Requirements of Healthcare
Applications
Bandwidth require a bandwidth of at least 20.48 kbit/s and 96 kbit/s.
A192-leadEEGcan demand 921.6 kbit/s bandwidth.

Latency For ECG, latencies of up to 2 to 4 seconds in real-time monitoring are acceptable.

some in-body sensors rely on energy-harvesting, either by heat or kinetic energy.


Energy-Efficiency some sensors may require an operation of the patient when battery needs replacement.

Dependability
Depending on what data is used for, system failures have different consequences, from
minor inconvenience to serious threat to the patients’ lives.

Security the security requirements in healthcare are high.

Systems, even when provided by different vendors, should be interoperable with each
Interoperability other.

24
The Vision of Fog Computing
in Healthcare
• Flexibility of Computation locus:
• The location can be dynamic and depend on the current context, environment and
application requirements.
• Integration:
• Within fog computing architecture, new sensors can be added to the existing
infrastructure.
• Fog computing can also serve as a compatibility layer to translate between various
standards.
• Patient mobility:
• Application-specific infrastructure also limits the area where patients can be
monitored.
• the transitions between different environments can be managed more gradually.
• New Applications:
• Fog computing will provide latency and response time improvements, as well as
energy
savings for wearable and low-cost devices, while performing complex tasks such 25
as fall
Health Applications: Without
Fog

26
Health Applications: With
Fog

27
Use Case
Classes

28
FURTHER
APPLICATIONS
Tech giants Cisco and IBM are the driving forces behind fog computing,
and link their concept to the emerging Internet of Things (IoT).
According to Cisco, the important areas where fog would play a vital
role
are the following:

29
Fog Computing
Applications
• Connected Cars:
• Fog computing is ideal for Connected Vehicles because real-time interactions will make
communications between cars, access points and traffic lights as safe and efficient as
possible.
• Fog computing will be the best option for all internet connected vehicles because fog
computing gives real time interaction.

30
Fog Computing
Applications

Connected Vehicles communicating each other

31
Fog Computing
Applications
• Smart Grids:

• Fog computing allows fast, machine-to-machine (M2M) handshakes and human to


machine interactions (HMI), which would work in cooperation with the cloud.

• Based on demand for energy, its obtainability and low cost, these smart devices can
switch to other energies like solar and winds. The edge process the data collected by fog
collectors and generate control command to the actuators. The filtered data are
consumed locally and the balance to the higher tiers for visualization, real-time reports
and transactional analytics.

• Fog supports semi-permanent storage at the highest tier and momentary storage at the
lowest tier.

32
Fog Computing
Applications
• Smart Cities:
• Fog computing would be able to obtain sensor data on all levels, and integrate all the
mutually independent network entities within.

33
Fog Computing
Milestones
Author & Year
Salvatore J. Stolfo
(2012)
Techniques & Parameters
Detect abnormal data access patterns,
User Behavior Profiling
Advantages
Securing data in the
cloud using offensive decoy
Limitations
Unprecedented levels
of security in the Cloud and in social
technology networks

Jiang Zhu (2013) Web optimization, webpage rendering Web optimization applied in a novel Feasibility and optimization needed
performance, webserver or CDNs manner, various methods can be
combined with unique knowledge
that only available at the edge nodes

Luis M. Vaquero (2014) Network Function Virtualization (NFV), It offers a comprehensive definition of Integration of various technologies
peer-to-peer (P2P), Internet of Things the fog, comprehending technologies into a single IT scenario is an answer
(IoT), Sensor networks, Cloud computing, as diverse as cloud, sensor and P2P to new requirements introduced by
Configuration management networks, network virtualization device ubiquity and demands for
functions or configuration agile network and service
management techniques management and privacy but it’s
not a simple work and time
consuming process.

Tom H. Luan (2016) Cloud based internet, proliferation, agility of Outline the main features of Fog Issues on network management,
service, real time response, long thin computing and describe its concept, traffic engineering, big data and
connection architecture and design goals. novel service
delivery

34
Summary
• Fog computing gives the cloud a companion to handle the two exabytes of data
generated daily from the Internet of Things. Processing data closer to where it is
produced and needed solves the challenges of exploding data volume, variety, and
velocity.
• Fog computing accelerates awareness and response to events by eliminating a
round trip to the cloud for analysis.
• It avoids the need for costly bandwidth additions by offloading gigabytes of
network traffic from the core network. It also protects sensitive IoT data by
analyzing it inside company walls. Ultimately, organizations that adopt fog
computing gain deeper and faster insights, leading to increased business agility,
higher service levels, and improved safety.

35
References
• IJRET: Fog Computing: Beginning of a New Era in Cloud Computing, e-ISSN: 2395 -
0056 | p-ISSN: 2395-0072 (2017)
• https://www.researchgate.net/publication/317009776_Fog_Computing_Beggining_of_a
_New_Era_in_Cloud_Computing?ev=srch_pub

• Fog Computing and Internet of Things: Extend the cloud to where the things are
(2015)
• http://www.cisco.com/c/dam/en_us/solutions/trends/iot/docs/computing-overview.pdf

• Fog Computing in Healthcare – A Review and Discussion, DOI: 10.1109 |


ACCESS.2017.2704100 (2017)
• https://www.researchgate.net/publication/316946904

36
FOGGY FUTURE
Cloud computing has quickly gained mainstream adoption... but fog
computing has the potential to be just as dominant, if not more so.

37

You might also like