2. CONTENT
Introduction
Need of fog
OpenFog Consortium
OpenFog Reference Architecture
Use cases
Advantages
References
3. INTRODUCTION
Fog computing is a horizontal, system-level architecture that
distributes computing, storage, control and networking
functions closer to the users along a cloud-to-thing
continuum[1].
It has three essential attributes[1]:
Horizontal Architecture
Cloud-to-things Continuum
System-level
4. Why we need fog?
According to Cisco report
Total volume of data generated b IoT will reach 600 ZB per
year by , which is 275 times higher than projected traffic
going from data centers to end users/devices, 39 times higher
than total projected data center traffic[2].
Problem with cloud[1]
High latency
Cost
Security
Source :- openfogconsortium.org
6. OpenFog Consortium
OpenFog Consortium aimed at the standardization and promotion
of fog computing in various capacities and fields.
The goal is to create an open reference architecture for fog
computing, build operational models and testbeds, define and
advance technology, educate the market.
OpenFog released its reference architecture for fog computing on
13 February 2017.[5]
In July 2018, the IEEE Standards Assocation announced it had
adopted the OpenFog Reference Architecture as the first standard
for fog computing.[6]
7. Key pillars of the OpenFog architecture
framework
Source :- openfogconsortium.org
9. OpenFog RA is a composite of perspectives and multiple stakeholder
views used to satisfy a given fog computing deployment or scenario[4].
The three views that include Software, System, and Node.
Software view :- is represented in the top three layers shown in the
architecture description, and include Application Services, Application
Support, and Node Management (IB) and Software Backplane.
System view :- is represented in the middle layers shown in the
architecture description, which include Hardware Virtualization down
through the Hardware Platform Infrastructure.
Node view :- is represented in the bottom two layers , which includes
the Protocol Abstraction Layer and Sensors, Actuators, and Control
11. Cloud Computing Fog Computing
High latency Low latency
No user-defined security User-defined security
Prone to attack Safe from attack
No location awareness Location awareness