SlideShare a Scribd company logo
 As data volume, the variety of objects connecting to
the network, and the need for more efficiency
increase, new requirements appear, and those
requirements tend to bring the need for data analysis
closer to the IoT system. These new requirements
include the following:
 Minimizing latency: Milliseconds matter for many types of industrial
systems, such as when you are trying to prevent manufacturing line
shutdowns or restore electrical service. Analyzing data close to the device
that collected the data can make a difference between averting disaster and a
cascading system failure.
 Conserving network bandwidth: Offshore oil rigs generate 500 GB of
data weekly. Commercial jets generate 10 TB for every 30 minutes of flight.
It is not practical to transport vast amounts of data from thousands or
hundreds of thousands of edge devices to the cloud. Nor is it necessary
because many critical analyses do not require cloud-scale processing and
storage.
 Increasing local efficiency: Collecting and securing data across a wide
geographic area with different environmental conditions may not be useful.
The environmental conditions in one area will trigger a local response
independent from the conditions of another site hundreds of miles away.
Analyzing both areas in the same cloud system may not be necessary for
immediate efficiency.
IoT systems function differently. Several data-related problems
need to be addressed:
 Bandwidth in last-mile IoT networks is very limited. When
dealing with thousands/millions of devices, available bandwidth
may be on order of tens of Kbps per device or even less.
 Latency can be very high. Instead of dealing with latency in the
milliseconds range, large IoT networks often introduce latency of
hundreds to thousands of milliseconds.
 Network backhaul from the gateway can be unreliable and often
depends on 3G/LTE or even satellite links. Backhaul links can
also be expensive if a per-byte data usage model is necessary.
 The volume of data transmitted over the backhaul can be high,
and much of the data may not really be that interesting (such as
simple polling messages).
 Big data is getting bigger. The concept of storing and analyzing
all sensor data in the cloud is impractical. The sheer volume of
data generated makes real-time analysis and response to the data
almost impossible.
Fog Computing
The defining characteristic of fog computing are as follows:
 Contextual location awareness and low latency: The fog node sits as close to the
IoT endpoint as possible to deliver distributed computing.
 Geographic distribution: In sharp contrast to the more centralized cloud, the
services and applications targeted by the fog nodes demand widely distributed
deployments.
 Deployment near IoT endpoints: Fog nodes are typically deployed in the
presence of a large number of IoT endpoints. For example, typical metering
deployments often see 3000 to 4000 nodes per gateway router, which also
functions as the fog computing node.
 Wireless communication between the fog and the IoT endpoint: Although it is
possible to connect wired nodes, the advantages of fog are greatest when
dealing with a large number of endpoints, and wireless access is the easiest way
to achieve such scale.
 Use for real-time interactions: Important fog applications involve real-time
interactions rather than batch processing. Preprocessing of data in the fog
nodes allows upper-layer applications to perform batch processing on a subset
of the data.
Edge Computing
 Fog computing solutions are being adopted by many
industries, and efforts to develop distributed
applications and analytics tools are being introduced
at an accelerating pace. The natural place for a fog
node is in the network device that sits closest to the
IoT endpoints, and these nodes are typically spread
throughout an IoT network
The Hierarchy of Edge, Fog, and
Cloud

More Related Content

What's hot

Weather Station Using IoT
Weather Station Using IoT Weather Station Using IoT
Weather Station Using IoT
fatinfaqihah5124
 
Physical design of io t
Physical design of io tPhysical design of io t
Physical design of io t
ShilpaKrishna6
 
IoT Networking
IoT NetworkingIoT Networking
IoT Networking
Hitesh Mohapatra
 
presentation on Edge computing
presentation on Edge computingpresentation on Edge computing
presentation on Edge computing
sairamgoud16
 
UNIT-5 IoT Reference Architecture.pdf
UNIT-5 IoT Reference Architecture.pdfUNIT-5 IoT Reference Architecture.pdf
UNIT-5 IoT Reference Architecture.pdf
MansiMehta96928
 
IoT Levels and Deployment Templates
IoT Levels and Deployment TemplatesIoT Levels and Deployment Templates
IoT Levels and Deployment Templates
Prakash Honnur
 
Wireless Sensor Networks ppt
Wireless Sensor Networks pptWireless Sensor Networks ppt
Wireless Sensor Networks ppt
Devdutta Chakrabarti
 
Comet Cloud
Comet CloudComet Cloud
Comet Cloud
pradeepas7
 
Unit 4
Unit 4Unit 4
Chapter 7
Chapter 7Chapter 7
Chapter 7
pavan penugonda
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
juno susi
 
IoT Communication Protocols
IoT Communication ProtocolsIoT Communication Protocols
IoT Communication Protocols
Pradeep Kumar TS
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
skumartarget
 
M2M - Machine to Machine Technology
M2M - Machine to Machine TechnologyM2M - Machine to Machine Technology
M2M - Machine to Machine Technology
Samip jain
 
Grid protocol architecture
Grid protocol architectureGrid protocol architecture
Grid protocol architecture
Pooja Dixit
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
juno susi
 
Physical Design of IoT.pdf
Physical Design of IoT.pdfPhysical Design of IoT.pdf
Physical Design of IoT.pdf
JoshuaKimmich1
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
 
IoT with Python
IoT with PythonIoT with Python
IoT with Python
Dr. Sanjay Shitole
 

What's hot (20)

Weather Station Using IoT
Weather Station Using IoT Weather Station Using IoT
Weather Station Using IoT
 
Physical design of io t
Physical design of io tPhysical design of io t
Physical design of io t
 
IoT Networking
IoT NetworkingIoT Networking
IoT Networking
 
presentation on Edge computing
presentation on Edge computingpresentation on Edge computing
presentation on Edge computing
 
UNIT-5 IoT Reference Architecture.pdf
UNIT-5 IoT Reference Architecture.pdfUNIT-5 IoT Reference Architecture.pdf
UNIT-5 IoT Reference Architecture.pdf
 
IoT Levels and Deployment Templates
IoT Levels and Deployment TemplatesIoT Levels and Deployment Templates
IoT Levels and Deployment Templates
 
Wireless Sensor Networks ppt
Wireless Sensor Networks pptWireless Sensor Networks ppt
Wireless Sensor Networks ppt
 
Comet Cloud
Comet CloudComet Cloud
Comet Cloud
 
Unit 4
Unit 4Unit 4
Unit 4
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
IoT Communication Protocols
IoT Communication ProtocolsIoT Communication Protocols
IoT Communication Protocols
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
 
CLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGECLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGE
 
M2M - Machine to Machine Technology
M2M - Machine to Machine TechnologyM2M - Machine to Machine Technology
M2M - Machine to Machine Technology
 
Grid protocol architecture
Grid protocol architectureGrid protocol architecture
Grid protocol architecture
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
Physical Design of IoT.pdf
Physical Design of IoT.pdfPhysical Design of IoT.pdf
Physical Design of IoT.pdf
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
IoT with Python
IoT with PythonIoT with Python
IoT with Python
 

Similar to IOT DATA MANAGEMENT AND COMPUTE STACK.pptx

semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
panvalkarchaitali
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
panvalkarchaitali
 
The Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data ProcessingThe Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data Processing
FredReynolds2
 
FOG COMPUTING, what and why a fog computing
FOG COMPUTING, what and why a fog computingFOG COMPUTING, what and why a fog computing
FOG COMPUTING, what and why a fog computing
Shivangi Bali
 
fog computing related to cyber securityf
fog computing related to cyber securityffog computing related to cyber securityf
fog computing related to cyber securityf
Prathmeshnawale2
 
Fog computing
Fog computingFog computing
Fog computing
Hari Priyanka
 
Fog computing technology
Fog computing technologyFog computing technology
Fog computing technology
Nikhil Sabu
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
Manoj Mandava
 
IoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing ModelIoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing Model
Ahmed Banafa
 
Fog Computing: Issues, Challenges and Future Directions
Fog Computing: Issues, Challenges and Future Directions Fog Computing: Issues, Challenges and Future Directions
Fog Computing: Issues, Challenges and Future Directions
IJECEIAES
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
Pachipulusu Giridhar
 
Fog computing
Fog computing Fog computing
Fog computing
Pachipulusu Giridhar
 
A Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdfA Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdf
Enterprise Wired
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
panvalkarchaitali
 
Fog computing and internet of things
Fog computing and internet of thingsFog computing and internet of things
Fog computing and internet of things
Rahul Yadav
 
Fog Computing and Its Role in the Internet of Things
Fog Computing and Its Role in the Internet of ThingsFog Computing and Its Role in the Internet of Things
Fog Computing and Its Role in the Internet of Things
HarshitParkar6677
 
A Review- Fog Computing and Its Role in the Internet of Things
A Review- Fog Computing and Its Role in the Internet of ThingsA Review- Fog Computing and Its Role in the Internet of Things
A Review- Fog Computing and Its Role in the Internet of Things
IJERA Editor
 
fog computing
fog computingfog computing
fog computing
AMITTRIPATHI182
 
IRJET- Fog Route:Distribution of Data using Delay Tolerant Network
IRJET- Fog Route:Distribution of Data using Delay Tolerant NetworkIRJET- Fog Route:Distribution of Data using Delay Tolerant Network
IRJET- Fog Route:Distribution of Data using Delay Tolerant Network
IRJET Journal
 
Fog Computing – Enhancing the Maximum Energy Consumption of Data Servers.
Fog Computing – Enhancing the Maximum Energy Consumption of Data Servers.Fog Computing – Enhancing the Maximum Energy Consumption of Data Servers.
Fog Computing – Enhancing the Maximum Energy Consumption of Data Servers.
dbpublications
 

Similar to IOT DATA MANAGEMENT AND COMPUTE STACK.pptx (20)

semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
 
The Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data ProcessingThe Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data Processing
 
FOG COMPUTING, what and why a fog computing
FOG COMPUTING, what and why a fog computingFOG COMPUTING, what and why a fog computing
FOG COMPUTING, what and why a fog computing
 
fog computing related to cyber securityf
fog computing related to cyber securityffog computing related to cyber securityf
fog computing related to cyber securityf
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog computing technology
Fog computing technologyFog computing technology
Fog computing technology
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
IoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing ModelIoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing Model
 
Fog Computing: Issues, Challenges and Future Directions
Fog Computing: Issues, Challenges and Future Directions Fog Computing: Issues, Challenges and Future Directions
Fog Computing: Issues, Challenges and Future Directions
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Fog computing
Fog computing Fog computing
Fog computing
 
A Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdfA Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdf
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
 
Fog computing and internet of things
Fog computing and internet of thingsFog computing and internet of things
Fog computing and internet of things
 
Fog Computing and Its Role in the Internet of Things
Fog Computing and Its Role in the Internet of ThingsFog Computing and Its Role in the Internet of Things
Fog Computing and Its Role in the Internet of Things
 
A Review- Fog Computing and Its Role in the Internet of Things
A Review- Fog Computing and Its Role in the Internet of ThingsA Review- Fog Computing and Its Role in the Internet of Things
A Review- Fog Computing and Its Role in the Internet of Things
 
fog computing
fog computingfog computing
fog computing
 
IRJET- Fog Route:Distribution of Data using Delay Tolerant Network
IRJET- Fog Route:Distribution of Data using Delay Tolerant NetworkIRJET- Fog Route:Distribution of Data using Delay Tolerant Network
IRJET- Fog Route:Distribution of Data using Delay Tolerant Network
 
Fog Computing – Enhancing the Maximum Energy Consumption of Data Servers.
Fog Computing – Enhancing the Maximum Energy Consumption of Data Servers.Fog Computing – Enhancing the Maximum Energy Consumption of Data Servers.
Fog Computing – Enhancing the Maximum Energy Consumption of Data Servers.
 

Recently uploaded

Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 

Recently uploaded (20)

Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 

IOT DATA MANAGEMENT AND COMPUTE STACK.pptx

  • 1.
  • 2.  As data volume, the variety of objects connecting to the network, and the need for more efficiency increase, new requirements appear, and those requirements tend to bring the need for data analysis closer to the IoT system. These new requirements include the following:
  • 3.  Minimizing latency: Milliseconds matter for many types of industrial systems, such as when you are trying to prevent manufacturing line shutdowns or restore electrical service. Analyzing data close to the device that collected the data can make a difference between averting disaster and a cascading system failure.  Conserving network bandwidth: Offshore oil rigs generate 500 GB of data weekly. Commercial jets generate 10 TB for every 30 minutes of flight. It is not practical to transport vast amounts of data from thousands or hundreds of thousands of edge devices to the cloud. Nor is it necessary because many critical analyses do not require cloud-scale processing and storage.  Increasing local efficiency: Collecting and securing data across a wide geographic area with different environmental conditions may not be useful. The environmental conditions in one area will trigger a local response independent from the conditions of another site hundreds of miles away. Analyzing both areas in the same cloud system may not be necessary for immediate efficiency.
  • 4.
  • 5. IoT systems function differently. Several data-related problems need to be addressed:  Bandwidth in last-mile IoT networks is very limited. When dealing with thousands/millions of devices, available bandwidth may be on order of tens of Kbps per device or even less.  Latency can be very high. Instead of dealing with latency in the milliseconds range, large IoT networks often introduce latency of hundreds to thousands of milliseconds.  Network backhaul from the gateway can be unreliable and often depends on 3G/LTE or even satellite links. Backhaul links can also be expensive if a per-byte data usage model is necessary.  The volume of data transmitted over the backhaul can be high, and much of the data may not really be that interesting (such as simple polling messages).  Big data is getting bigger. The concept of storing and analyzing all sensor data in the cloud is impractical. The sheer volume of data generated makes real-time analysis and response to the data almost impossible.
  • 7. The defining characteristic of fog computing are as follows:  Contextual location awareness and low latency: The fog node sits as close to the IoT endpoint as possible to deliver distributed computing.  Geographic distribution: In sharp contrast to the more centralized cloud, the services and applications targeted by the fog nodes demand widely distributed deployments.  Deployment near IoT endpoints: Fog nodes are typically deployed in the presence of a large number of IoT endpoints. For example, typical metering deployments often see 3000 to 4000 nodes per gateway router, which also functions as the fog computing node.  Wireless communication between the fog and the IoT endpoint: Although it is possible to connect wired nodes, the advantages of fog are greatest when dealing with a large number of endpoints, and wireless access is the easiest way to achieve such scale.  Use for real-time interactions: Important fog applications involve real-time interactions rather than batch processing. Preprocessing of data in the fog nodes allows upper-layer applications to perform batch processing on a subset of the data.
  • 8. Edge Computing  Fog computing solutions are being adopted by many industries, and efforts to develop distributed applications and analytics tools are being introduced at an accelerating pace. The natural place for a fog node is in the network device that sits closest to the IoT endpoints, and these nodes are typically spread throughout an IoT network
  • 9. The Hierarchy of Edge, Fog, and Cloud