SlideShare a Scribd company logo
40	 CO M PUTE R P U B L I S H E D B Y T H E I E E E CO M P U T E R S O C I E T Y 0 0 1 8 - 9 1 6 2 / 1 6 / $ 3 3 . 0 0 © 2 0 1 6 I E E E
CLOUD COVER
T
he Internet of Things (IoT) promises to make
many items—including consumer electronic
devices, home appliances, medical devices, cam-
eras, and all types of sensors—part of the Inter-
net environment.1 This opens the door to innovations that
facilitate new interactions among things and humans,
and enables the realization of smart cities, infrastruc-
tures, and services that enhance the quality of life.
By 2025, researchers estimate that the IoT could have
an economic impact—including, for example, revenue
generated and operational sav-
ings—of $11 trillion per year, which
would represent about 11 percent of
the world economy;2 and that users
will deploy 1 trillion IoT devices.
COPING WITH INTERNET
OF THINGS DATA
IoT environments generate un-
precedented amounts of data that
can be useful in many ways, par-
ticularly if analyzed for insights.
However, the data volume can over-
whelm today’s storage systems and
analytics applications.
Cloud computing could help
by offering on-demand and scal-
able storage, as well as processing
services that can scale to IoT requirements. However,
for health-­monitoring, emergency-response, and other
latency-­sensitive applications, the delay caused by trans-
ferring data to the cloud and back to the application is
unacceptable. In addition, it isn’t efficient to send so much
data to the cloud for storage and processing, as it would
saturate network bandwidth and not be scalable.
Recent analysis of a healthcare-related IoT application
with30millionusersshoweddataflowsupto25,000tuples
per second.3 And real-time data flows in smart cities with
Fog Computing:
Helping the Internet
of Things Realize
its Potential
Amir Vahid Dastjerdi and Rajkumar Buyya, University of Melbourne
The Internet of Things (IoT) could enable
innovations that enhance the quality of life, but it
generates unprecedented amounts of data that
are difficult for traditional systems, the cloud, and
even edge computing to handle. Fog computing
is designed to overcome these limitations.
AU G U S T 2 0 1 6 41
EDITOR SAN MURUGESAN
BRITE Professional Services;
san@computer.org
many more data sources could easily
reach millions of tuples per second.
To address these issues, edge com-
puting4 was proposed to use comput-
ing resources near IoT sensors for local
storage and preliminary data process-
ing. This would decrease network con-
gestion, as well as accelerate analysis
and the resulting decision making.
However, edge devices can’t handle
multiple IoT applications competing
for their limited resources, which re-
sults in resource contention and in-
creases processing latency.
Fog computing—which seamlessly
integrates edge devices and cloud re-
sources—helps overcome these lim-
itations. It avoids resource conten-
tion at the edge by leveraging cloud
resources and coordinating the use
of geographically distributed edge
devices.
FOG COMPUTING
CHARACTERISTICS
Fog computing is a distributed para-
digm that provides cloud-like services
to the network edge. It leverages cloud
and edge resources along with its own
infrastructure, as Figure 1 shows. In
essence, the technology deals with
IoT data locally by utilizing clients or
edge devices near users to carry out a
substantial amount of storage, com-
munication, control, configuration,
and management. The approach bene-
fits from edge devices’ close proximity
to sensors, while leveraging the on-­
demand scalability of cloud resources.
Fog computing involves the compo-
nents of data-processing or analytics
applications running in distributed
cloud and edge devices. It also facili-
tates the management and program-
ming of computing, networking, and
storage services between datacen-
ters and end devices. In addition, it
supports user mobility, resource and
interface heterogeneity, and distrib-
uted data analytics to address the
requirements of widely distributed ap-
plications that need low latency.
FOG-COMPUTING
COMPONENTS
Figure 2 presents a fog-computing
reference architecture. Fog systems
generally use the sense-process-actu-
ate and stream-processing program-
ming models. Sensors stream data to
IoT networks, applications running on
fog devices subscribe to and process
the information, and the obtained in-
sights are translated into actions sent
to actuators.
Fog systems dynamically dis-
cover and use APIs to build com-
plex functionalities. Components
at the resource-management layer
use information from the resource-­
monitoring service to track the state
of available cloud, fog, and network
resources and identify the best can-
didates to process incoming tasks.
With multitenant applications, the
resource-management components
prioritize the tasks of the various par-
ticipating users or programs.
Edge and cloud resources commu-
nicate using machine-to-machine
(M2M) standards such as MQTT (for-
merly MQ Telemetry Transport) and
the Constrained Application Protocol
(CoAP). Software-defined networking
(SDN) helps with the efficient manage-
ment of heterogeneous fog networks.
FOG-COMPUTING
SOFTWARE SYSTEMS
There are four prominent software
systems for building fog computing
environments and applications.
Provider A Provider B
Public cloud
Private cloudPrivate cloud
IoT sensors ...
Fog computing
Figure 1. Distributed data processing in a fog-computing environment. Based on the
desired functionality of a system, users can deploy Internet of Things sensors in differ-
ent environments including roads, medical centers, and farms. Once the system collects
information from the sensors, fog devices—including nearby gateways and private
clouds—­dynamically conduct data analytics.
42	 CO M PUTE R  W W W. C O M P U T E R . O R G / C O M P U T E R
CLOUD COVER
Cisco IOx provides device manage-
ment and enables M2M services in fog
environments.5 Using device abstrac-
tions provided by Cisco IOx APIs, ap-
plications running on fog devices can
communicate with other IoT devices
via M2M protocols.
Cisco Data in Motion (DMo) enables
data management and analysis at the
network edge and is built into prod-
ucts that Cisco Systems and its part-
ners provide.
LocalGrid’s fog-computing plat-
form is software installed on network
devices in smart grids. It provides re-
liable M2M communication between
devices and data-processing services
without going through the cloud.
Cisco ParStream’s fog-­computing
platformenablesreal-timeIoTanalytics.
FOG-COMPUTING
APPLICATIONS
Various applications could benefit
from fog computing.
Healthcare and activity tracking
Fog computing could be useful in
healthcare, in which real-time process-
ing and event response are critical. One
proposed system utilizes fog comput-
ing to detect, predict, and prevent falls
by stroke patients.6 The fall-detection
learning algorithms are dynamically
deployed across edge devices and cloud
resources. Experiments concluded that
this system had a lower response time
and consumed less energy than cloud-
only approaches.
A proposed fog computing–based
smart-healthcare system enables low
latency, mobility support, and location
and privacy awareness.7
Smart utility services
Fog computing can be used with smart
utility services,8 whose focus is im-
proving energy generation, delivery,
and billing. In such environments,
edge devices can report more fine-
grained energy-consumption details
(for example, hourly and daily, rather
than monthly, readings) to users’ mo-
bile devices than traditional smart
utility services. These edge devices
can also calculate the cost of power
consumption throughout the day and
suggest which energy source is most
economical at any given time or when
home appliances should be turned on
to minimize utility use.
Augmented reality, cognitive
systems, and gaming
Fog computing plays a major role
in augmented-reality applications,
which are latency sensitive. For exam-
ple, the EEG Tractor Beam augmented
multiplayer, online brain–computer-­
interaction game performs continu-
ous real-time brain-state classification
on fog devices and then tunes classifi-
cation models on cloud servers, based
on electroencephalogram readings
that sensors collect.9
A wearable cognitive-assistance
system that uses Google Glass devices
helps people with reduced mental
acuity perform various tasks, includ-
ing telling them the names of people
they meet but don’t remember.10 In
this application, devices communicate
with the cloud for delay-tolerant jobs
such as error reporting and logging.
For time-sensitive tasks, the system
streams video from the Glass cam-
era to the fog devices for processing.
The system demonstrates how using
nearby fog devices greatly decreases
end-to-end latency.
MODELING AND SIMULATION
To enable real-time analytics in fog
computing,wemustinvestigatevarious
resource-management and scheduling
Applications
Edge  cloud
resources
Software-
defined
networking
Machine-to-
machine
IoT sensors 
actuators
Programming
models
Sense-process-actuate Stream processing
Multitenant resource
management
Operator  flow
placement and resource
scheduling
Raw data
management
Monitoring 
profiling
API  service
management
API discovery
Authorization
 authentication
API composition
Figure 2. Fog-computing architecture. In the bottom layer are end devices—­including
sensors and actuators—along with applications that enhance their functionality. These
elements use the next layer, the network, for communicating with edge devices, such as
gateways, and then with cloud services. The resource-management layer runs the entire
infrastructure and enables quality-of-service enforcement. Finally, applications leverage
fog-computing programming models to deliver intelligent services to users.
AU G U S T 2 0 1 6 43
techniques including the placement,
migration, and consolidation of
stream-processing operators, applica-
tion modules, and tasks. This signifi-
cantly impacts processing latency and
decision-making times.
However, constructing a real IoT en-
vironment as a testbed for evaluating
such techniques is costly and doesn’t
provide a controllable environment for
conducting repeatable experiments.
To overcome this limitation, we devel-
oped an open source simulator called
iFogSim.11 iFogSim enables the model-
ing and simulation of fog-­computing
environments for the evaluation of re-
source-management and scheduling
policies across edge and cloud resources
undermultiplescenarios,basedontheir
impactonlatency,energyconsumption,
network congestion, and operational
costs. It measures performance met-
rics and simulates edge devices, cloud
datacenters, sensors, network links,
data streams, and stream-processing
applications.
CHALLENGES
Realizing fog computing’s full poten-
tial presents several challenges in-
cluding balancing load distribution
between edge and cloud resources, API
and service management and sharing,
and SDN communications. There are
several other important examples.
Enabling real-time analytics
In fog environments, resource man-
agement systems should be able to dy-
namically determine which analytics
tasks are being pushed to which cloud-
or edge-based resource to minimize
latency and maximize throughput.
Thesesystemsalsomustconsiderother
criteria such as various countries’ data
privacy laws involving, for example,
medical and financial information.
Programming models
and architectures
Most stream- and data-processing
frameworks, including Apache Storm
and S4, don’t provide enough scal-
ability and flexibility for fog and IoT
environments because their architec-
ture is based on static configurations.
Fog environments require the ability
to add and remove resources dynam-
ically because processing nodes are
generally mobile devices that fre-
quently join and leave networks.
Security, reliability,
and fault tolerance
Enforcing security in fog
environments—­which have multiple
service providers and users, as well as
distributed resources—is a key chal-
lenge. Designing and implementing
authentication and authorization tech-
niques that can work with multiple fog
nodes that have different computing
capacities is difficult. Public-key infra-
structures and trusted execution envi-
ronments are potential solutions.12
Users of fog deployments also must
plan for the failure of individual sen-
sors, networks, service platforms, and
applications. To help with this, they
could apply standards, such as the
Stream Control Transmission Proto-
col, that deal with packet and event re-
liability in wireless sensor networks.13
Power consumption
Fog environments consist of many
nodes. Thus, the computation is dis-
tributed and can be less energy effi-
cient than in centralized cloud sys-
tems. Using efficient communications
protocols such as CoAP, effective fil-
tering and sampling techniques, and
joint computing and network resource
optimization can minimize energy
consumption in fog environments.
F
og computing enables the seam-
less integration of edge and
cloud resources. It supports the
decentralized and intelligent process-
ing of unprecedented data volumes
generated by IoT sensors deployed for
smooth integration of physical and cy-
ber environments.
This could generate many benefits
to society by, for example, enabling
smart healthcare applications. The
further development of fog comput-
ing could thus help the IoT reach its
vast potential.
REFERENCES
1.	 R. Buyya and A. Dastjerdi, Internet
of Things: Principles and Paradigms,
Morgan Kaufmann, 2016.
2.	 J. Manyika et al., Unlocking the Poten-
tial of the Internet of Things, McKinsey
 Company, 2015.
3.	 R. Cortés et al., “Stream Processing
of Healthcare Sensor Data: Studying
User Traces to Identify Challenges
from a Big Data Perspective,” Proce-
dia Computer Science, vol. 52, 2015,
pp. 1004–1009.
4.	 W. Shi and S. Dustdar, “The Promise
of Edge Computing,” Computer, vol.
49, no. 5, 2016, pp. 78–81.
5.	 F. Bonomi et al., “Fog Computing: A
Platform for Internet of Things and
Analytics,” Big Data and Internet of
Things: A Roadmap for Smart Environ-
ments, N. Bessis and C. Dobre, eds.,
Springer, 2014, pp. 169–186.
6.	 Y. Cao et al., “FAST: A Fog Comput-
ing Assisted Distributed Analytics
System to Monitor Fall for Stroke
Mitigation,” Proc. 10th IEEE Int’l Conf.
Networking, Architecture and Storage
(NAS 15), 2015, pp. 2–11.
7.	 V. Stantchev et al., “Smart Items, Fog
and Cloud Computing as Enablers
of Servitization in Healthcare,” J.
Sensors  Transducers, vol. 185, no. 2,
2015, pp. 121–128.
8.	 J. Li et al., “EHOPES: Data-Centered
Fog Platform for Smart Living,” Proc.
2015 Int’l Telecommunication Networks
and Applications Conf. (ITNAC 15),
2015, pp. 308–313.
9.	 J. Zao et al., “Augmented Brain
Computer Interaction Based on Fog
Computing and Linked Data,” Proc.
10th IEEE Int’l Conf. Intelligent Envi-
ronments (IE 14), 2014, pp. 374–377.
10.	 K. Ha et al., “Towards Wearable
Cognitive Assistance,” Proc. 12th Int’l
Conf. Mobile Systems, Applications, and
Services (MobiSys 14), 2014, pp. 68–81.
11.	 H. Gupta et al., iFogSim: A Tool-
kit for Modeling and Simulation of
Resource Management Techniques
44	 CO M PUTE R  W W W. C O M P U T E R . O R G / C O M P U T E R
CLOUD COVER
in Internet of Things, Edge and Fog
Computing Environments, tech. report
CLOUDS-TR-2016-2, Cloud Comput-
ing and Distributed Systems Labora-
tory, Univ. of Melbourne, 2016; http://
cloudbus.org/tech_reports.html.
12.	 I. Stojmenovic and S. Wen, “The Fog
Computing Paradigm: Scenarios and
Security Issues,” Proc. 2014 Federated
Conf. Comp. Sci. and Info. Sys. (FedCSIS
14), 2014, pp. 1–8.
13.	 H. Madsen et al., “Reliability in the
Utility Computing Era: Towards Reli-
able Fog Computing,” Proc. 20th Int’l
Conf. Systems, Signals, and Image Pro-
cessing (IWSSIP 13), 2013, pp. 43–46.
AMIR VAHID DASTJERDI is a
Research Fellow with the University
of Melbourne’s Cloud Computing
and Distributed Systems (CLOUDS)
Laboratory. Contact him at amir
.vahid@unimelb.edu.au.
RAJKUMAR BUYYA is director of
the CLOUDS Laboratory and CEO
of Manjrasoft Pty Ltd., a university
spin-off company that commercial-
izes cloud-computing innovations.
Contact him at rbuyya@unimelb
.edu.au.
Selected CS articles and
columns are also available for
free at http://ComputingNow
.computer.org.
It’salreadyat
yourfingertips
If you do computational work,
you are going to love Computing
in Science  Engineering (CiSE).
Because CiSE appears in the
IEEE Xplore and AIP library
packages, representing more
than 50 scientific and engineering
societies, your institution is bound
to have it.

More Related Content

What's hot

IOT in Electrical & Electronics Engineering
IOT in Electrical & Electronics EngineeringIOT in Electrical & Electronics Engineering
IOT in Electrical & Electronics Engineering
Lokesh K N
 
IoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
IoT ( M2M) - Big Data - Analytics: Emulation and DemonstrationIoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
IoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
CHAKER ALLAOUI
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
sravya raju
 
Industrial Iot and Legacy Scada system - the solution for future ?
Industrial Iot and Legacy Scada system - the solution for future ?Industrial Iot and Legacy Scada system - the solution for future ?
Industrial Iot and Legacy Scada system - the solution for future ?
Prescinto Technologies Private Limited
 
Smart City Era
Smart City EraSmart City Era
Smart City Era
Joud Khattab
 
Wireless M2M - bringing smart interactivity into the world of moving machines...
Wireless M2M - bringing smart interactivity into the world of moving machines...Wireless M2M - bringing smart interactivity into the world of moving machines...
Wireless M2M - bringing smart interactivity into the world of moving machines...
Mobile Monday Brussels
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Mphasis
 
Autonomic computer
Autonomic computerAutonomic computer
Autonomic computer
Elanthendral Mariappan
 
Iot architecture report
Iot architecture reportIot architecture report
Iot architecture report
Niranjan Kumar
 
IRJET- A Review Paper on Internet of Things based Remotely Monitoring of ...
IRJET-  	  A Review Paper on Internet of Things based Remotely Monitoring of ...IRJET-  	  A Review Paper on Internet of Things based Remotely Monitoring of ...
IRJET- A Review Paper on Internet of Things based Remotely Monitoring of ...
IRJET Journal
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
IRJET Journal
 
Summer Internship report on IOT RTTC Trivandrum
Summer Internship report on IOT  RTTC TrivandrumSummer Internship report on IOT  RTTC Trivandrum
Summer Internship report on IOT RTTC Trivandrum
FathimaCec
 
Seminar ppt fog comp
Seminar ppt fog compSeminar ppt fog comp
Seminar ppt fog comp
Mahantesh Hiremath
 
Home Automation System
Home Automation SystemHome Automation System
Home Automation System
IRJET Journal
 
Fog computing 000
Fog computing 000Fog computing 000
Fog computing 000
pranjali rawke
 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and Protocols
Abdullah Alfadhly
 
Fog ppt
Fog pptFog ppt
Fog ppt
sabafarheen
 
Fog Computing Reality Check: Real World Applications and Architectures
Fog Computing Reality Check: Real World Applications and ArchitecturesFog Computing Reality Check: Real World Applications and Architectures
Fog Computing Reality Check: Real World Applications and Architectures
Biren Gandhi
 
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
AIRCC Publishing Corporation
 
Abi research over the edge
Abi research over the edgeAbi research over the edge
Abi research over the edge
myehuman
 

What's hot (20)

IOT in Electrical & Electronics Engineering
IOT in Electrical & Electronics EngineeringIOT in Electrical & Electronics Engineering
IOT in Electrical & Electronics Engineering
 
IoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
IoT ( M2M) - Big Data - Analytics: Emulation and DemonstrationIoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
IoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
Industrial Iot and Legacy Scada system - the solution for future ?
Industrial Iot and Legacy Scada system - the solution for future ?Industrial Iot and Legacy Scada system - the solution for future ?
Industrial Iot and Legacy Scada system - the solution for future ?
 
Smart City Era
Smart City EraSmart City Era
Smart City Era
 
Wireless M2M - bringing smart interactivity into the world of moving machines...
Wireless M2M - bringing smart interactivity into the world of moving machines...Wireless M2M - bringing smart interactivity into the world of moving machines...
Wireless M2M - bringing smart interactivity into the world of moving machines...
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Autonomic computer
Autonomic computerAutonomic computer
Autonomic computer
 
Iot architecture report
Iot architecture reportIot architecture report
Iot architecture report
 
IRJET- A Review Paper on Internet of Things based Remotely Monitoring of ...
IRJET-  	  A Review Paper on Internet of Things based Remotely Monitoring of ...IRJET-  	  A Review Paper on Internet of Things based Remotely Monitoring of ...
IRJET- A Review Paper on Internet of Things based Remotely Monitoring of ...
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Summer Internship report on IOT RTTC Trivandrum
Summer Internship report on IOT  RTTC TrivandrumSummer Internship report on IOT  RTTC Trivandrum
Summer Internship report on IOT RTTC Trivandrum
 
Seminar ppt fog comp
Seminar ppt fog compSeminar ppt fog comp
Seminar ppt fog comp
 
Home Automation System
Home Automation SystemHome Automation System
Home Automation System
 
Fog computing 000
Fog computing 000Fog computing 000
Fog computing 000
 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and Protocols
 
Fog ppt
Fog pptFog ppt
Fog ppt
 
Fog Computing Reality Check: Real World Applications and Architectures
Fog Computing Reality Check: Real World Applications and ArchitecturesFog Computing Reality Check: Real World Applications and Architectures
Fog Computing Reality Check: Real World Applications and Architectures
 
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
 
Abi research over the edge
Abi research over the edgeAbi research over the edge
Abi research over the edge
 

Similar to Fog Computing: Helping the Internet of Things Realize its Potential

IoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing ModelIoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing Model
Ahmed Banafa
 
Why IoT needs Fog Computing ?
Why IoT needs Fog Computing ?Why IoT needs Fog Computing ?
Why IoT needs Fog Computing ?
Ahmed Banafa
 
IRJET- An Overview of Slum Rehabilitation by IN-SITU Technique
IRJET- An Overview of Slum Rehabilitation by IN-SITU TechniqueIRJET- An Overview of Slum Rehabilitation by IN-SITU Technique
IRJET- An Overview of Slum Rehabilitation by IN-SITU Technique
IRJET Journal
 
IRJET- Integrating Wireless Sensor Networks with Cloud Computing and Emerging...
IRJET- Integrating Wireless Sensor Networks with Cloud Computing and Emerging...IRJET- Integrating Wireless Sensor Networks with Cloud Computing and Emerging...
IRJET- Integrating Wireless Sensor Networks with Cloud Computing and Emerging...
IRJET Journal
 
Fog comuting
Fog comutingFog comuting
Fog comuting
TalhaMuhammad27
 
Fog computing
Fog computingFog computing
Fog computing
Valarmathi Srinivasan
 
A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...
IJECEIAES
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
panvalkarchaitali
 
smart street light system using IOT
smart street light system using IOTsmart street light system using IOT
smart street light system using IOT
Karthikeyan T
 
The Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data ProcessingThe Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data Processing
FredReynolds2
 
Making Actionable Decisions at the Network's Edge
Making Actionable Decisions at the Network's EdgeMaking Actionable Decisions at the Network's Edge
Making Actionable Decisions at the Network's Edge
Cognizant
 
TheInternetofThings
TheInternetofThingsTheInternetofThings
TheInternetofThings
Kimmiegrif
 
Fog security
Fog securityFog security
Fog security
HarshitParkar6677
 
Internet Of Things (IOT)
Internet Of Things (IOT)Internet Of Things (IOT)
Internet Of Things (IOT)
Mindfire Solutions
 
A Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdfA Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdf
Enterprise Wired
 
fog&Edge computing
fog&Edge computingfog&Edge computing
fog&Edge computing
Nitin Kumar Yadav
 
STEAM++ AN EXTENSIBLE END-TO-END FRAMEWORK FOR DEVELOPING IOT DATA PROCESSING...
STEAM++ AN EXTENSIBLE END-TO-END FRAMEWORK FOR DEVELOPING IOT DATA PROCESSING...STEAM++ AN EXTENSIBLE END-TO-END FRAMEWORK FOR DEVELOPING IOT DATA PROCESSING...
STEAM++ AN EXTENSIBLE END-TO-END FRAMEWORK FOR DEVELOPING IOT DATA PROCESSING...
ijcsit
 
IJRAR1BHP007bbhjkmmgcxxfhnjkjkmmgfgvhjjjvv
IJRAR1BHP007bbhjkmmgcxxfhnjkjkmmgfgvhjjjvvIJRAR1BHP007bbhjkmmgcxxfhnjkjkmmgfgvhjjjvv
IJRAR1BHP007bbhjkmmgcxxfhnjkjkmmgfgvhjjjvv
vijayalaxmipatil2002
 
IRJET- Earthquake Early Warning System for Android
IRJET-  	  Earthquake Early Warning System for AndroidIRJET-  	  Earthquake Early Warning System for Android
IRJET- Earthquake Early Warning System for Android
IRJET Journal
 
IOT_PPT1.pdf
IOT_PPT1.pdfIOT_PPT1.pdf
IOT_PPT1.pdf
laxmikanth45
 

Similar to Fog Computing: Helping the Internet of Things Realize its Potential (20)

IoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing ModelIoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing Model
 
Why IoT needs Fog Computing ?
Why IoT needs Fog Computing ?Why IoT needs Fog Computing ?
Why IoT needs Fog Computing ?
 
IRJET- An Overview of Slum Rehabilitation by IN-SITU Technique
IRJET- An Overview of Slum Rehabilitation by IN-SITU TechniqueIRJET- An Overview of Slum Rehabilitation by IN-SITU Technique
IRJET- An Overview of Slum Rehabilitation by IN-SITU Technique
 
IRJET- Integrating Wireless Sensor Networks with Cloud Computing and Emerging...
IRJET- Integrating Wireless Sensor Networks with Cloud Computing and Emerging...IRJET- Integrating Wireless Sensor Networks with Cloud Computing and Emerging...
IRJET- Integrating Wireless Sensor Networks with Cloud Computing and Emerging...
 
Fog comuting
Fog comutingFog comuting
Fog comuting
 
Fog computing
Fog computingFog computing
Fog computing
 
A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
 
smart street light system using IOT
smart street light system using IOTsmart street light system using IOT
smart street light system using IOT
 
The Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data ProcessingThe Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data Processing
 
Making Actionable Decisions at the Network's Edge
Making Actionable Decisions at the Network's EdgeMaking Actionable Decisions at the Network's Edge
Making Actionable Decisions at the Network's Edge
 
TheInternetofThings
TheInternetofThingsTheInternetofThings
TheInternetofThings
 
Fog security
Fog securityFog security
Fog security
 
Internet Of Things (IOT)
Internet Of Things (IOT)Internet Of Things (IOT)
Internet Of Things (IOT)
 
A Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdfA Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdf
 
fog&Edge computing
fog&Edge computingfog&Edge computing
fog&Edge computing
 
STEAM++ AN EXTENSIBLE END-TO-END FRAMEWORK FOR DEVELOPING IOT DATA PROCESSING...
STEAM++ AN EXTENSIBLE END-TO-END FRAMEWORK FOR DEVELOPING IOT DATA PROCESSING...STEAM++ AN EXTENSIBLE END-TO-END FRAMEWORK FOR DEVELOPING IOT DATA PROCESSING...
STEAM++ AN EXTENSIBLE END-TO-END FRAMEWORK FOR DEVELOPING IOT DATA PROCESSING...
 
IJRAR1BHP007bbhjkmmgcxxfhnjkjkmmgfgvhjjjvv
IJRAR1BHP007bbhjkmmgcxxfhnjkjkmmgfgvhjjjvvIJRAR1BHP007bbhjkmmgcxxfhnjkjkmmgfgvhjjjvv
IJRAR1BHP007bbhjkmmgcxxfhnjkjkmmgfgvhjjjvv
 
IRJET- Earthquake Early Warning System for Android
IRJET-  	  Earthquake Early Warning System for AndroidIRJET-  	  Earthquake Early Warning System for Android
IRJET- Earthquake Early Warning System for Android
 
IOT_PPT1.pdf
IOT_PPT1.pdfIOT_PPT1.pdf
IOT_PPT1.pdf
 

More from HarshitParkar6677

Wi fi hacking
Wi fi hackingWi fi hacking
Wi fi hacking
HarshitParkar6677
 
D dos attack
D dos attackD dos attack
D dos attack
HarshitParkar6677
 
Notes chapter 6
Notes chapter  6Notes chapter  6
Notes chapter 6
HarshitParkar6677
 
Interface notes
Interface notesInterface notes
Interface notes
HarshitParkar6677
 
Chapter6 2
Chapter6 2Chapter6 2
Chapter6 2
HarshitParkar6677
 
Chapter6
Chapter6Chapter6
8086 cpu 1
8086 cpu 18086 cpu 1
8086 cpu 1
HarshitParkar6677
 
Chapter 6 notes
Chapter 6 notesChapter 6 notes
Chapter 6 notes
HarshitParkar6677
 
Chapter 5 notes
Chapter 5 notesChapter 5 notes
Chapter 5 notes
HarshitParkar6677
 
Chap6 procedures & macros
Chap6 procedures & macrosChap6 procedures & macros
Chap6 procedures & macros
HarshitParkar6677
 
Chapter 5 notes new
Chapter 5 notes newChapter 5 notes new
Chapter 5 notes new
HarshitParkar6677
 
Notes arithmetic instructions
Notes arithmetic instructionsNotes arithmetic instructions
Notes arithmetic instructions
HarshitParkar6677
 
Notes all instructions
Notes all instructionsNotes all instructions
Notes all instructions
HarshitParkar6677
 
Notes aaa aa
Notes aaa aaNotes aaa aa
Notes aaa aa
HarshitParkar6677
 
Notes 8086 instruction format
Notes 8086 instruction formatNotes 8086 instruction format
Notes 8086 instruction format
HarshitParkar6677
 
Misc
MiscMisc
Copy of 8086inst logical
Copy of 8086inst logicalCopy of 8086inst logical
Copy of 8086inst logical
HarshitParkar6677
 
Copy of 8086inst logical
Copy of 8086inst logicalCopy of 8086inst logical
Copy of 8086inst logical
HarshitParkar6677
 
Chapter3 program flow control instructions
Chapter3 program flow control instructionsChapter3 program flow control instructions
Chapter3 program flow control instructions
HarshitParkar6677
 
Chapter3 8086inst stringsl
Chapter3 8086inst stringslChapter3 8086inst stringsl
Chapter3 8086inst stringsl
HarshitParkar6677
 

More from HarshitParkar6677 (20)

Wi fi hacking
Wi fi hackingWi fi hacking
Wi fi hacking
 
D dos attack
D dos attackD dos attack
D dos attack
 
Notes chapter 6
Notes chapter  6Notes chapter  6
Notes chapter 6
 
Interface notes
Interface notesInterface notes
Interface notes
 
Chapter6 2
Chapter6 2Chapter6 2
Chapter6 2
 
Chapter6
Chapter6Chapter6
Chapter6
 
8086 cpu 1
8086 cpu 18086 cpu 1
8086 cpu 1
 
Chapter 6 notes
Chapter 6 notesChapter 6 notes
Chapter 6 notes
 
Chapter 5 notes
Chapter 5 notesChapter 5 notes
Chapter 5 notes
 
Chap6 procedures & macros
Chap6 procedures & macrosChap6 procedures & macros
Chap6 procedures & macros
 
Chapter 5 notes new
Chapter 5 notes newChapter 5 notes new
Chapter 5 notes new
 
Notes arithmetic instructions
Notes arithmetic instructionsNotes arithmetic instructions
Notes arithmetic instructions
 
Notes all instructions
Notes all instructionsNotes all instructions
Notes all instructions
 
Notes aaa aa
Notes aaa aaNotes aaa aa
Notes aaa aa
 
Notes 8086 instruction format
Notes 8086 instruction formatNotes 8086 instruction format
Notes 8086 instruction format
 
Misc
MiscMisc
Misc
 
Copy of 8086inst logical
Copy of 8086inst logicalCopy of 8086inst logical
Copy of 8086inst logical
 
Copy of 8086inst logical
Copy of 8086inst logicalCopy of 8086inst logical
Copy of 8086inst logical
 
Chapter3 program flow control instructions
Chapter3 program flow control instructionsChapter3 program flow control instructions
Chapter3 program flow control instructions
 
Chapter3 8086inst stringsl
Chapter3 8086inst stringslChapter3 8086inst stringsl
Chapter3 8086inst stringsl
 

Recently uploaded

Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
yokeleetan1
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
awadeshbabu
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Wearable antenna for antenna applications
Wearable antenna for antenna applicationsWearable antenna for antenna applications
Wearable antenna for antenna applications
Madhumitha Jayaram
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
mahammadsalmanmech
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
Ratnakar Mikkili
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
heavyhaig
 

Recently uploaded (20)

Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
Wearable antenna for antenna applications
Wearable antenna for antenna applicationsWearable antenna for antenna applications
Wearable antenna for antenna applications
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
 

Fog Computing: Helping the Internet of Things Realize its Potential

  • 1. 40 CO M PUTE R P U B L I S H E D B Y T H E I E E E CO M P U T E R S O C I E T Y 0 0 1 8 - 9 1 6 2 / 1 6 / $ 3 3 . 0 0 © 2 0 1 6 I E E E CLOUD COVER T he Internet of Things (IoT) promises to make many items—including consumer electronic devices, home appliances, medical devices, cam- eras, and all types of sensors—part of the Inter- net environment.1 This opens the door to innovations that facilitate new interactions among things and humans, and enables the realization of smart cities, infrastruc- tures, and services that enhance the quality of life. By 2025, researchers estimate that the IoT could have an economic impact—including, for example, revenue generated and operational sav- ings—of $11 trillion per year, which would represent about 11 percent of the world economy;2 and that users will deploy 1 trillion IoT devices. COPING WITH INTERNET OF THINGS DATA IoT environments generate un- precedented amounts of data that can be useful in many ways, par- ticularly if analyzed for insights. However, the data volume can over- whelm today’s storage systems and analytics applications. Cloud computing could help by offering on-demand and scal- able storage, as well as processing services that can scale to IoT requirements. However, for health-­monitoring, emergency-response, and other latency-­sensitive applications, the delay caused by trans- ferring data to the cloud and back to the application is unacceptable. In addition, it isn’t efficient to send so much data to the cloud for storage and processing, as it would saturate network bandwidth and not be scalable. Recent analysis of a healthcare-related IoT application with30millionusersshoweddataflowsupto25,000tuples per second.3 And real-time data flows in smart cities with Fog Computing: Helping the Internet of Things Realize its Potential Amir Vahid Dastjerdi and Rajkumar Buyya, University of Melbourne The Internet of Things (IoT) could enable innovations that enhance the quality of life, but it generates unprecedented amounts of data that are difficult for traditional systems, the cloud, and even edge computing to handle. Fog computing is designed to overcome these limitations.
  • 2. AU G U S T 2 0 1 6 41 EDITOR SAN MURUGESAN BRITE Professional Services; san@computer.org many more data sources could easily reach millions of tuples per second. To address these issues, edge com- puting4 was proposed to use comput- ing resources near IoT sensors for local storage and preliminary data process- ing. This would decrease network con- gestion, as well as accelerate analysis and the resulting decision making. However, edge devices can’t handle multiple IoT applications competing for their limited resources, which re- sults in resource contention and in- creases processing latency. Fog computing—which seamlessly integrates edge devices and cloud re- sources—helps overcome these lim- itations. It avoids resource conten- tion at the edge by leveraging cloud resources and coordinating the use of geographically distributed edge devices. FOG COMPUTING CHARACTERISTICS Fog computing is a distributed para- digm that provides cloud-like services to the network edge. It leverages cloud and edge resources along with its own infrastructure, as Figure 1 shows. In essence, the technology deals with IoT data locally by utilizing clients or edge devices near users to carry out a substantial amount of storage, com- munication, control, configuration, and management. The approach bene- fits from edge devices’ close proximity to sensors, while leveraging the on-­ demand scalability of cloud resources. Fog computing involves the compo- nents of data-processing or analytics applications running in distributed cloud and edge devices. It also facili- tates the management and program- ming of computing, networking, and storage services between datacen- ters and end devices. In addition, it supports user mobility, resource and interface heterogeneity, and distrib- uted data analytics to address the requirements of widely distributed ap- plications that need low latency. FOG-COMPUTING COMPONENTS Figure 2 presents a fog-computing reference architecture. Fog systems generally use the sense-process-actu- ate and stream-processing program- ming models. Sensors stream data to IoT networks, applications running on fog devices subscribe to and process the information, and the obtained in- sights are translated into actions sent to actuators. Fog systems dynamically dis- cover and use APIs to build com- plex functionalities. Components at the resource-management layer use information from the resource-­ monitoring service to track the state of available cloud, fog, and network resources and identify the best can- didates to process incoming tasks. With multitenant applications, the resource-management components prioritize the tasks of the various par- ticipating users or programs. Edge and cloud resources commu- nicate using machine-to-machine (M2M) standards such as MQTT (for- merly MQ Telemetry Transport) and the Constrained Application Protocol (CoAP). Software-defined networking (SDN) helps with the efficient manage- ment of heterogeneous fog networks. FOG-COMPUTING SOFTWARE SYSTEMS There are four prominent software systems for building fog computing environments and applications. Provider A Provider B Public cloud Private cloudPrivate cloud IoT sensors ... Fog computing Figure 1. Distributed data processing in a fog-computing environment. Based on the desired functionality of a system, users can deploy Internet of Things sensors in differ- ent environments including roads, medical centers, and farms. Once the system collects information from the sensors, fog devices—including nearby gateways and private clouds—­dynamically conduct data analytics.
  • 3. 42 CO M PUTE R W W W. C O M P U T E R . O R G / C O M P U T E R CLOUD COVER Cisco IOx provides device manage- ment and enables M2M services in fog environments.5 Using device abstrac- tions provided by Cisco IOx APIs, ap- plications running on fog devices can communicate with other IoT devices via M2M protocols. Cisco Data in Motion (DMo) enables data management and analysis at the network edge and is built into prod- ucts that Cisco Systems and its part- ners provide. LocalGrid’s fog-computing plat- form is software installed on network devices in smart grids. It provides re- liable M2M communication between devices and data-processing services without going through the cloud. Cisco ParStream’s fog-­computing platformenablesreal-timeIoTanalytics. FOG-COMPUTING APPLICATIONS Various applications could benefit from fog computing. Healthcare and activity tracking Fog computing could be useful in healthcare, in which real-time process- ing and event response are critical. One proposed system utilizes fog comput- ing to detect, predict, and prevent falls by stroke patients.6 The fall-detection learning algorithms are dynamically deployed across edge devices and cloud resources. Experiments concluded that this system had a lower response time and consumed less energy than cloud- only approaches. A proposed fog computing–based smart-healthcare system enables low latency, mobility support, and location and privacy awareness.7 Smart utility services Fog computing can be used with smart utility services,8 whose focus is im- proving energy generation, delivery, and billing. In such environments, edge devices can report more fine- grained energy-consumption details (for example, hourly and daily, rather than monthly, readings) to users’ mo- bile devices than traditional smart utility services. These edge devices can also calculate the cost of power consumption throughout the day and suggest which energy source is most economical at any given time or when home appliances should be turned on to minimize utility use. Augmented reality, cognitive systems, and gaming Fog computing plays a major role in augmented-reality applications, which are latency sensitive. For exam- ple, the EEG Tractor Beam augmented multiplayer, online brain–computer-­ interaction game performs continu- ous real-time brain-state classification on fog devices and then tunes classifi- cation models on cloud servers, based on electroencephalogram readings that sensors collect.9 A wearable cognitive-assistance system that uses Google Glass devices helps people with reduced mental acuity perform various tasks, includ- ing telling them the names of people they meet but don’t remember.10 In this application, devices communicate with the cloud for delay-tolerant jobs such as error reporting and logging. For time-sensitive tasks, the system streams video from the Glass cam- era to the fog devices for processing. The system demonstrates how using nearby fog devices greatly decreases end-to-end latency. MODELING AND SIMULATION To enable real-time analytics in fog computing,wemustinvestigatevarious resource-management and scheduling Applications Edge cloud resources Software- defined networking Machine-to- machine IoT sensors actuators Programming models Sense-process-actuate Stream processing Multitenant resource management Operator flow placement and resource scheduling Raw data management Monitoring profiling API service management API discovery Authorization authentication API composition Figure 2. Fog-computing architecture. In the bottom layer are end devices—­including sensors and actuators—along with applications that enhance their functionality. These elements use the next layer, the network, for communicating with edge devices, such as gateways, and then with cloud services. The resource-management layer runs the entire infrastructure and enables quality-of-service enforcement. Finally, applications leverage fog-computing programming models to deliver intelligent services to users.
  • 4. AU G U S T 2 0 1 6 43 techniques including the placement, migration, and consolidation of stream-processing operators, applica- tion modules, and tasks. This signifi- cantly impacts processing latency and decision-making times. However, constructing a real IoT en- vironment as a testbed for evaluating such techniques is costly and doesn’t provide a controllable environment for conducting repeatable experiments. To overcome this limitation, we devel- oped an open source simulator called iFogSim.11 iFogSim enables the model- ing and simulation of fog-­computing environments for the evaluation of re- source-management and scheduling policies across edge and cloud resources undermultiplescenarios,basedontheir impactonlatency,energyconsumption, network congestion, and operational costs. It measures performance met- rics and simulates edge devices, cloud datacenters, sensors, network links, data streams, and stream-processing applications. CHALLENGES Realizing fog computing’s full poten- tial presents several challenges in- cluding balancing load distribution between edge and cloud resources, API and service management and sharing, and SDN communications. There are several other important examples. Enabling real-time analytics In fog environments, resource man- agement systems should be able to dy- namically determine which analytics tasks are being pushed to which cloud- or edge-based resource to minimize latency and maximize throughput. Thesesystemsalsomustconsiderother criteria such as various countries’ data privacy laws involving, for example, medical and financial information. Programming models and architectures Most stream- and data-processing frameworks, including Apache Storm and S4, don’t provide enough scal- ability and flexibility for fog and IoT environments because their architec- ture is based on static configurations. Fog environments require the ability to add and remove resources dynam- ically because processing nodes are generally mobile devices that fre- quently join and leave networks. Security, reliability, and fault tolerance Enforcing security in fog environments—­which have multiple service providers and users, as well as distributed resources—is a key chal- lenge. Designing and implementing authentication and authorization tech- niques that can work with multiple fog nodes that have different computing capacities is difficult. Public-key infra- structures and trusted execution envi- ronments are potential solutions.12 Users of fog deployments also must plan for the failure of individual sen- sors, networks, service platforms, and applications. To help with this, they could apply standards, such as the Stream Control Transmission Proto- col, that deal with packet and event re- liability in wireless sensor networks.13 Power consumption Fog environments consist of many nodes. Thus, the computation is dis- tributed and can be less energy effi- cient than in centralized cloud sys- tems. Using efficient communications protocols such as CoAP, effective fil- tering and sampling techniques, and joint computing and network resource optimization can minimize energy consumption in fog environments. F og computing enables the seam- less integration of edge and cloud resources. It supports the decentralized and intelligent process- ing of unprecedented data volumes generated by IoT sensors deployed for smooth integration of physical and cy- ber environments. This could generate many benefits to society by, for example, enabling smart healthcare applications. The further development of fog comput- ing could thus help the IoT reach its vast potential. REFERENCES 1. R. Buyya and A. Dastjerdi, Internet of Things: Principles and Paradigms, Morgan Kaufmann, 2016. 2. J. Manyika et al., Unlocking the Poten- tial of the Internet of Things, McKinsey Company, 2015. 3. R. Cortés et al., “Stream Processing of Healthcare Sensor Data: Studying User Traces to Identify Challenges from a Big Data Perspective,” Proce- dia Computer Science, vol. 52, 2015, pp. 1004–1009. 4. W. Shi and S. Dustdar, “The Promise of Edge Computing,” Computer, vol. 49, no. 5, 2016, pp. 78–81. 5. F. Bonomi et al., “Fog Computing: A Platform for Internet of Things and Analytics,” Big Data and Internet of Things: A Roadmap for Smart Environ- ments, N. Bessis and C. Dobre, eds., Springer, 2014, pp. 169–186. 6. Y. Cao et al., “FAST: A Fog Comput- ing Assisted Distributed Analytics System to Monitor Fall for Stroke Mitigation,” Proc. 10th IEEE Int’l Conf. Networking, Architecture and Storage (NAS 15), 2015, pp. 2–11. 7. V. Stantchev et al., “Smart Items, Fog and Cloud Computing as Enablers of Servitization in Healthcare,” J. Sensors Transducers, vol. 185, no. 2, 2015, pp. 121–128. 8. J. Li et al., “EHOPES: Data-Centered Fog Platform for Smart Living,” Proc. 2015 Int’l Telecommunication Networks and Applications Conf. (ITNAC 15), 2015, pp. 308–313. 9. J. Zao et al., “Augmented Brain Computer Interaction Based on Fog Computing and Linked Data,” Proc. 10th IEEE Int’l Conf. Intelligent Envi- ronments (IE 14), 2014, pp. 374–377. 10. K. Ha et al., “Towards Wearable Cognitive Assistance,” Proc. 12th Int’l Conf. Mobile Systems, Applications, and Services (MobiSys 14), 2014, pp. 68–81. 11. H. Gupta et al., iFogSim: A Tool- kit for Modeling and Simulation of Resource Management Techniques
  • 5. 44 CO M PUTE R W W W. C O M P U T E R . O R G / C O M P U T E R CLOUD COVER in Internet of Things, Edge and Fog Computing Environments, tech. report CLOUDS-TR-2016-2, Cloud Comput- ing and Distributed Systems Labora- tory, Univ. of Melbourne, 2016; http:// cloudbus.org/tech_reports.html. 12. I. Stojmenovic and S. Wen, “The Fog Computing Paradigm: Scenarios and Security Issues,” Proc. 2014 Federated Conf. Comp. Sci. and Info. Sys. (FedCSIS 14), 2014, pp. 1–8. 13. H. Madsen et al., “Reliability in the Utility Computing Era: Towards Reli- able Fog Computing,” Proc. 20th Int’l Conf. Systems, Signals, and Image Pro- cessing (IWSSIP 13), 2013, pp. 43–46. AMIR VAHID DASTJERDI is a Research Fellow with the University of Melbourne’s Cloud Computing and Distributed Systems (CLOUDS) Laboratory. Contact him at amir .vahid@unimelb.edu.au. RAJKUMAR BUYYA is director of the CLOUDS Laboratory and CEO of Manjrasoft Pty Ltd., a university spin-off company that commercial- izes cloud-computing innovations. Contact him at rbuyya@unimelb .edu.au. Selected CS articles and columns are also available for free at http://ComputingNow .computer.org. It’salreadyat yourfingertips If you do computational work, you are going to love Computing in Science Engineering (CiSE). Because CiSE appears in the IEEE Xplore and AIP library packages, representing more than 50 scientific and engineering societies, your institution is bound to have it.