Fog and Edge computing
Karthikeyan L
2nd
MCA
Thiagarajar college of Engineering, Madurai
What is Fog and Edge computing?
• Computation takes place at the edge of a device’s network is called as
edge computing.
• That means computer is connected with the network of the device,
which processes the data and send the data to the cloud in real-time.
• Fog computing is a decentralized computing structure that is located
between the cloud and devices that produce data(edge devices).
• Edge devices send huge amounts of data to the cloud, fog nodes
receive the data and analyze what’s important and then transfer the
important data to the cloud to be stored and delete or keep the
remaining for future analysis.
Diagrammatic Representation
Example of fog and edge computing
• Fog networking supports the Internet of Things (IoT) concept, in which
most of the devices used by humans on a daily basis will be connected to
each other.
• Examples include phones, wearable health monitoring devices,
connected vehicle and augmented reality using devices such as the
Google Glass.
• Autonomous vehicle edge computing devices collect data from cameras
and sensors on the vehicle, process it and make decisions in milliseconds.
• Cloud-Fog-Edge computing framework for combating COVID-19
pandemic.
Characteristics:
• The shorter physical distance also implies a low network latency and
low need for computing resources due to limited data amounts.
• Data can be analyzed locally and in real time.
• Nodes can be scaled flexibly in response to growing numbers of users
in small networks and regions with a small priority of single nodes.
• Nodes in the fog act as handlers between edge networks and the
cloud. Urgent requests are forwarded to the cloud, and requests that
can be processed locally are.
Frameworks
• FogBus
• A lightweight framework that uses block chain to implement fog and edge
computing.
• DD-FoG
• A distributed framework that uses micro services approach.
• EmuFog
• Emulation framework that allows developer to design fog computing
infrastructure and evaluate it.
Advantages:
• Network latency: Lower distance to the end-user and smaller data
consumption leads to lower network delay and lower computing
time.
• Data analysis: Low data amounts allow for real-time data analysis and
the limitation of cloud usage.
• Security: Configuring fog nodes to the data protection needs ensures
that cloud service providers only gain access to as much data as
needed.
• Cost reduction: The regional placement and subdivision can minimize
the hardware and energy cost for the fog service providers.
Obstacles for the implementation
• Authentication and trust issues: Just like cloud service providers, fog service
providers can be different parties with varying trust levels. One provider can pose
as a trustworthy entity and manipulate the integrity of the fog for its connected
end-users.
• Privacy: Decentralizing data security and media rights management to the fog and
outsourcing the responsibility to a third party instead of the cloud or edge devices
endangers user’s privacy due to the number of fog nodes.
• Security: Due to the number of devices connected to fog nodes, it is difficult to
ensure the security of all gateways and the protection of personal information.
• Node placement: The physical and logical location of fog nodes should be
optimized to reach the maximum service quality. The data for the right placement
has to be analyzed and chosen carefully.

Fog and Edge computing for your reference.pptx

  • 1.
    Fog and Edgecomputing Karthikeyan L 2nd MCA Thiagarajar college of Engineering, Madurai
  • 2.
    What is Fogand Edge computing? • Computation takes place at the edge of a device’s network is called as edge computing. • That means computer is connected with the network of the device, which processes the data and send the data to the cloud in real-time. • Fog computing is a decentralized computing structure that is located between the cloud and devices that produce data(edge devices). • Edge devices send huge amounts of data to the cloud, fog nodes receive the data and analyze what’s important and then transfer the important data to the cloud to be stored and delete or keep the remaining for future analysis.
  • 3.
  • 4.
    Example of fogand edge computing • Fog networking supports the Internet of Things (IoT) concept, in which most of the devices used by humans on a daily basis will be connected to each other. • Examples include phones, wearable health monitoring devices, connected vehicle and augmented reality using devices such as the Google Glass. • Autonomous vehicle edge computing devices collect data from cameras and sensors on the vehicle, process it and make decisions in milliseconds. • Cloud-Fog-Edge computing framework for combating COVID-19 pandemic.
  • 5.
    Characteristics: • The shorterphysical distance also implies a low network latency and low need for computing resources due to limited data amounts. • Data can be analyzed locally and in real time. • Nodes can be scaled flexibly in response to growing numbers of users in small networks and regions with a small priority of single nodes. • Nodes in the fog act as handlers between edge networks and the cloud. Urgent requests are forwarded to the cloud, and requests that can be processed locally are.
  • 6.
    Frameworks • FogBus • Alightweight framework that uses block chain to implement fog and edge computing. • DD-FoG • A distributed framework that uses micro services approach. • EmuFog • Emulation framework that allows developer to design fog computing infrastructure and evaluate it.
  • 7.
    Advantages: • Network latency:Lower distance to the end-user and smaller data consumption leads to lower network delay and lower computing time. • Data analysis: Low data amounts allow for real-time data analysis and the limitation of cloud usage. • Security: Configuring fog nodes to the data protection needs ensures that cloud service providers only gain access to as much data as needed. • Cost reduction: The regional placement and subdivision can minimize the hardware and energy cost for the fog service providers.
  • 8.
    Obstacles for theimplementation • Authentication and trust issues: Just like cloud service providers, fog service providers can be different parties with varying trust levels. One provider can pose as a trustworthy entity and manipulate the integrity of the fog for its connected end-users. • Privacy: Decentralizing data security and media rights management to the fog and outsourcing the responsibility to a third party instead of the cloud or edge devices endangers user’s privacy due to the number of fog nodes. • Security: Due to the number of devices connected to fog nodes, it is difficult to ensure the security of all gateways and the protection of personal information. • Node placement: The physical and logical location of fog nodes should be optimized to reach the maximum service quality. The data for the right placement has to be analyzed and chosen carefully.