SlideShare uma empresa Scribd logo
1 de 3
What is fog computing? 
by Ahmed Banafa on Thoughts on Cloud led by IBMers 
The term “fog computing” or “edge computing” means that rather than hosting and working 
from a centralized cloud, fog systems operate on network ends. It is a term for placing some 
processes and resources at the edge of the cloud, instead of establishing channels for cloud 
storage and utilization. 
Fog computing tackles an important problem in cloud computing, namely, reducing the need for 
bandwidth by not sending every bit of information over cloud channels, and instead aggregating 
it at certain access points. This type of distributed strategy lowers costs and improves 
efficiencies. More interestingly, it’s one approach to dealing with the emerging concept of 
Internet of Things (IoT). 
Fog computing extends the cloud computing paradigm to the edge of the network to address 
applications and services that do not fit the paradigm of the cloud due to technical and 
infrastructure limitation including: 
• Applications that require very low and predictable latency 
• Geographically distributed applications 
• Fast mobile applications 
• Large-scale distributed control systems 
Applications of fog computing 
Tech giants like IBM are the driving force behind fog computing, and link their concept to IoT. 
Today, there might be hundreds of connected devices in an office or data center, but in just a few 
years that number could explode to thousands or tens of thousands, all connected and
communicating. Most of the buzz around fog has a direct correlation with IoT. The fact that 
everything from cars to thermostats are gaining web intelligence means that direct user-end 
computing and communication may soon be more important than ever. The following are some 
of the practical examples: 
• Connected cars: It’s ideal for connected cars, because real-time interactions will make 
communications between cars, access points and traffic lights as safe and efficient as possible. 
• Smart grids: Allows fast, machine-to-machine (M2M) handshakes and human to machine 
interactions (HMI), which would work in cooperation with the cloud. 
• Smart cities: Fog computing would be able to obtain sensor data on all levels of the activities 
of cities, and integrate all the mutually independent network entities within. 
• Healthcare: The cloud computing market for healthcare is expected to reach $5.4 billion by 
2017, according to a MarketsandMarkets report, and fog computing would allow this on a more 
localized level. 
A closer look at fog computing shows that it is about taking decisions as close to the data as 
possible. Hadoop and other big data solutions have started the trend to bring processing close to 
the data’s location. Fog computing is about doing the same on a larger scale. You want decisions 
to be taken as close to where the data is generated and stop it from reaching the cloud. Only 
valuable data should be traveling cloud computing networks. 
There are economical advantages to using fog computing. All that is needed is a simple solution 
(or multiple solutions) to train models and send them to highly optimized and low resource 
intensive execution engines that can be easily embedded in devices, mobile phones and smart 
hubs/gateways. 
To achieve this goal, fog computing is best done via machine learning models that get trained on 
a fraction of the data on the cloud. After a model is considered adequate, then it is pushed to the 
devices. Algorithms like decision tree or some fuzzy logic or even a deep belief network can be 
used locally on a device to make a decision that is cheaper than setting up an infrastructure in the 
cloud that needs to deal with raw data from millions of devices. 
What is next for fog computing? 
Fog computing can really be thought of as a way of providing services more immediately, but 
also as a way of bypassing the wider internet, whose speeds are largely dependent on carriers. 
Google and Facebook are among several companies looking into establishing alternate means of 
internet access, such as balloons and drones to avoid network bottleneck. But smaller 
organizations could be able to create a fog out of whatever devices are currently around to 
establish closer and quicker connections to compute resources. 
There will certainly still be a place for more centralized and aggregated cloud computing, but it 
seems that as sensors move into more things and data grows at an enormous rate, a new approach 
to hosting the applications will be needed. Fog computing, which could inventively utilize 
existing devices, could be the right approach to hosting an important new set of applications.
However, the movement to the edge does not diminish the importance of the center. On the 
contrary, it means that the data center needs to be a stronger nucleus for expanding computing 
architecture. InformationWeek contributor Kevin Casey recently wrote that the cloud hasn’t 
actually diminished server sales, as one might otherwise expect. Hybrid computing models, big 
data and IoT have contributed to server requirements that may be shifting, but aren’t really 
abating as some experts had predicted. 
The IoT is a relevant bridge to some of the biggest issues dividing the cloud and the fog (like 
bandwidth, which could lead to a hybrid fog-cloud model) as organizations seek to balance their 
enterprise-grade data center needs with support for increasing edge network growth. 
About Ahmed Banafa 
Ahmed Banafa has extensive experience in operations and management, as well as a research 
background in a variety of techniques and analysis. He is a certified Microsoft Office Specialist, 
and he has served as a reviewer and technical contributor for the publication of several business 
and technical books. His experience in higher education includes serving as an instructor in 
business and technology at several universities and colleges, including the University of 
California, Berkeley; California State University, East Bay; Ohlone College; and Heald College. 
He is the recipient of several awards, including Distinguished Tenured Staff Award of 2013 , 
Business Program Instructor of the year for 2013, 2014 and the Parthenon award for best 
instructor in 2012, 2010 and the 2003, Certificate of Honor for Instructor from the City and 
County of San Francisco. Banafa is included in the 2000–2001 Who’s Who in Finance and 
Industry.

Mais conteúdo relacionado

Mais procurados

FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation
Anjana Shivangi
 

Mais procurados (20)

Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)
 
Introduction to Fog Computing
Introduction to Fog ComputingIntroduction to Fog Computing
Introduction to Fog Computing
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog computing
Fog computing Fog computing
Fog computing
 
Fog computing
Fog computingFog computing
Fog computing
 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog ppt
Fog pptFog ppt
Fog ppt
 
Fog computing
Fog computingFog computing
Fog computing
 
Wsn in iot updated
Wsn in iot updatedWsn in iot updated
Wsn in iot updated
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation
 
Seminar ppt fog comp
Seminar ppt fog compSeminar ppt fog comp
Seminar ppt fog comp
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Fog computing
Fog computingFog computing
Fog computing
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsn
 
Zigbee ppt
Zigbee pptZigbee ppt
Zigbee ppt
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Li Fi technology abstract document
Li Fi technology abstract documentLi Fi technology abstract document
Li Fi technology abstract document
 

Destaque

Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud ppt
priyanka reddy
 
Latest Thesis Topics for Fog computing
Latest Thesis Topics for Fog computingLatest Thesis Topics for Fog computing
Latest Thesis Topics for Fog computing
Thesis Scientist Private Limited
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
priyanka reddy
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Dr. Mazlan Abbas
 

Destaque (19)

Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud ppt
 
Cloud Computing - Benefits and Risks
Cloud Computing - Benefits and RisksCloud Computing - Benefits and Risks
Cloud Computing - Benefits and Risks
 
Disadvantages of Cloud Computing
Disadvantages of Cloud ComputingDisadvantages of Cloud Computing
Disadvantages of Cloud Computing
 
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computing
 
Fog Computing with VORTEX
Fog Computing with VORTEXFog Computing with VORTEX
Fog Computing with VORTEX
 
Face detection issues
Face detection issuesFace detection issues
Face detection issues
 
Security Issues of IoT with Fog
Security Issues of IoT with FogSecurity Issues of IoT with Fog
Security Issues of IoT with Fog
 
Latest Thesis Topics for Fog computing
Latest Thesis Topics for Fog computingLatest Thesis Topics for Fog computing
Latest Thesis Topics for Fog computing
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and Applications
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
What is the Internet of Things?
What is the Internet of Things?What is the Internet of Things?
What is the Internet of Things?
 
What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
 

Semelhante a What is fog computing

The cloud promises
The cloud promisesThe cloud promises
The cloud promises
Grand Crue
 

Semelhante a What is fog computing (20)

Fog compute good
Fog compute goodFog compute good
Fog compute good
 
A Guide to Edge Computing Technology For Business Operations
A Guide to Edge Computing Technology For Business OperationsA Guide to Edge Computing Technology For Business Operations
A Guide to Edge Computing Technology For Business Operations
 
cloud-computing
cloud-computingcloud-computing
cloud-computing
 
Introduction To Cloud Computing
Introduction To  Cloud ComputingIntroduction To  Cloud Computing
Introduction To Cloud Computing
 
The Future of Cloud Computing Latest Trends and Innovations.pptx
The Future of Cloud Computing Latest Trends and Innovations.pptxThe Future of Cloud Computing Latest Trends and Innovations.pptx
The Future of Cloud Computing Latest Trends and Innovations.pptx
 
The Future of Cloud Computing Latest Trends and Innovations.pptx
The Future of Cloud Computing Latest Trends and Innovations.pptxThe Future of Cloud Computing Latest Trends and Innovations.pptx
The Future of Cloud Computing Latest Trends and Innovations.pptx
 
cloud computing in e commerce
cloud computing in e commercecloud computing in e commerce
cloud computing in e commerce
 
Cloud Computing Essays
Cloud Computing EssaysCloud Computing Essays
Cloud Computing Essays
 
Cloud Computing Essays
Cloud Computing EssaysCloud Computing Essays
Cloud Computing Essays
 
Assignment on Cloud Computing
Assignment on Cloud ComputingAssignment on Cloud Computing
Assignment on Cloud Computing
 
The Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data ProcessingThe Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data Processing
 
The cloud promises
The cloud promisesThe cloud promises
The cloud promises
 
IoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing ModelIoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing Model
 
Cloud report
Cloud report Cloud report
Cloud report
 
Weekly Assignment Slideshare #4
Weekly Assignment Slideshare #4Weekly Assignment Slideshare #4
Weekly Assignment Slideshare #4
 
Cloud Computing Essay
Cloud Computing EssayCloud Computing Essay
Cloud Computing Essay
 
Cloud Computing in migrant
 Cloud Computing in migrant Cloud Computing in migrant
Cloud Computing in migrant
 
What is Cloud Computing? A Complete Guide
What is Cloud Computing? A Complete GuideWhat is Cloud Computing? A Complete Guide
What is Cloud Computing? A Complete Guide
 
What is Cloud Computing? A Complete Guide
What is Cloud Computing? A Complete GuideWhat is Cloud Computing? A Complete Guide
What is Cloud Computing? A Complete Guide
 
Cloud
CloudCloud
Cloud
 

Mais de Ahmed Banafa

Mais de Ahmed Banafa (20)

IoT and 5G convergence
IoT and 5G convergenceIoT and 5G convergence
IoT and 5G convergence
 
Quantum Computing and AI
Quantum Computing and AIQuantum Computing and AI
Quantum Computing and AI
 
The convergence of IoT and Quantum Computing
The convergence of IoT and Quantum ComputingThe convergence of IoT and Quantum Computing
The convergence of IoT and Quantum Computing
 
Quantum Internet Explained
Quantum Internet ExplainedQuantum Internet Explained
Quantum Internet Explained
 
IoT and Covid 19
IoT and Covid 19IoT and Covid 19
IoT and Covid 19
 
Quantum Teleportation
Quantum TeleportationQuantum Teleportation
Quantum Teleportation
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
 
How blockchain is revolutionizing crowdfunding
How blockchain is revolutionizing crowdfundingHow blockchain is revolutionizing crowdfunding
How blockchain is revolutionizing crowdfunding
 
Blockchain technology and supply chain management
Blockchain technology and supply chain managementBlockchain technology and supply chain management
Blockchain technology and supply chain management
 
8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world edited8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world edited
 
Blockchain Technology and COVID19
Blockchain Technology and COVID19Blockchain Technology and COVID19
Blockchain Technology and COVID19
 
Ten trends of blockchain in 2020
Ten trends of blockchain in 2020Ten trends of blockchain in 2020
Ten trends of blockchain in 2020
 
Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths  Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths
 
Ten Blockchain Applications
Ten Blockchain ApplicationsTen Blockchain Applications
Ten Blockchain Applications
 
Hot technologies of 2019
Hot technologies of 2019Hot technologies of 2019
Hot technologies of 2019
 
Blockchain and AI
Blockchain and AIBlockchain and AI
Blockchain and AI
 
The Blockchain Wave in 2019 and Beyond - SJSU
The Blockchain Wave in 2019 and Beyond - SJSU The Blockchain Wave in 2019 and Beyond - SJSU
The Blockchain Wave in 2019 and Beyond - SJSU
 
9 IoT predictions for 2019
9 IoT predictions for 20199 IoT predictions for 2019
9 IoT predictions for 2019
 
Secure and Smart IoT using Blockchain and AI
Secure and Smart  IoT using Blockchain and AISecure and Smart  IoT using Blockchain and AI
Secure and Smart IoT using Blockchain and AI
 
The Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondThe Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and Beyond
 

Último

一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
ayvbos
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Monica Sydney
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
Asmae Rabhi
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Monica Sydney
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
ayvbos
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
ydyuyu
 

Último (20)

20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
Power point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria IuzzolinoPower point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria Iuzzolino
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 

What is fog computing

  • 1. What is fog computing? by Ahmed Banafa on Thoughts on Cloud led by IBMers The term “fog computing” or “edge computing” means that rather than hosting and working from a centralized cloud, fog systems operate on network ends. It is a term for placing some processes and resources at the edge of the cloud, instead of establishing channels for cloud storage and utilization. Fog computing tackles an important problem in cloud computing, namely, reducing the need for bandwidth by not sending every bit of information over cloud channels, and instead aggregating it at certain access points. This type of distributed strategy lowers costs and improves efficiencies. More interestingly, it’s one approach to dealing with the emerging concept of Internet of Things (IoT). Fog computing extends the cloud computing paradigm to the edge of the network to address applications and services that do not fit the paradigm of the cloud due to technical and infrastructure limitation including: • Applications that require very low and predictable latency • Geographically distributed applications • Fast mobile applications • Large-scale distributed control systems Applications of fog computing Tech giants like IBM are the driving force behind fog computing, and link their concept to IoT. Today, there might be hundreds of connected devices in an office or data center, but in just a few years that number could explode to thousands or tens of thousands, all connected and
  • 2. communicating. Most of the buzz around fog has a direct correlation with IoT. The fact that everything from cars to thermostats are gaining web intelligence means that direct user-end computing and communication may soon be more important than ever. The following are some of the practical examples: • Connected cars: It’s ideal for connected cars, because real-time interactions will make communications between cars, access points and traffic lights as safe and efficient as possible. • Smart grids: Allows fast, machine-to-machine (M2M) handshakes and human to machine interactions (HMI), which would work in cooperation with the cloud. • Smart cities: Fog computing would be able to obtain sensor data on all levels of the activities of cities, and integrate all the mutually independent network entities within. • Healthcare: The cloud computing market for healthcare is expected to reach $5.4 billion by 2017, according to a MarketsandMarkets report, and fog computing would allow this on a more localized level. A closer look at fog computing shows that it is about taking decisions as close to the data as possible. Hadoop and other big data solutions have started the trend to bring processing close to the data’s location. Fog computing is about doing the same on a larger scale. You want decisions to be taken as close to where the data is generated and stop it from reaching the cloud. Only valuable data should be traveling cloud computing networks. There are economical advantages to using fog computing. All that is needed is a simple solution (or multiple solutions) to train models and send them to highly optimized and low resource intensive execution engines that can be easily embedded in devices, mobile phones and smart hubs/gateways. To achieve this goal, fog computing is best done via machine learning models that get trained on a fraction of the data on the cloud. After a model is considered adequate, then it is pushed to the devices. Algorithms like decision tree or some fuzzy logic or even a deep belief network can be used locally on a device to make a decision that is cheaper than setting up an infrastructure in the cloud that needs to deal with raw data from millions of devices. What is next for fog computing? Fog computing can really be thought of as a way of providing services more immediately, but also as a way of bypassing the wider internet, whose speeds are largely dependent on carriers. Google and Facebook are among several companies looking into establishing alternate means of internet access, such as balloons and drones to avoid network bottleneck. But smaller organizations could be able to create a fog out of whatever devices are currently around to establish closer and quicker connections to compute resources. There will certainly still be a place for more centralized and aggregated cloud computing, but it seems that as sensors move into more things and data grows at an enormous rate, a new approach to hosting the applications will be needed. Fog computing, which could inventively utilize existing devices, could be the right approach to hosting an important new set of applications.
  • 3. However, the movement to the edge does not diminish the importance of the center. On the contrary, it means that the data center needs to be a stronger nucleus for expanding computing architecture. InformationWeek contributor Kevin Casey recently wrote that the cloud hasn’t actually diminished server sales, as one might otherwise expect. Hybrid computing models, big data and IoT have contributed to server requirements that may be shifting, but aren’t really abating as some experts had predicted. The IoT is a relevant bridge to some of the biggest issues dividing the cloud and the fog (like bandwidth, which could lead to a hybrid fog-cloud model) as organizations seek to balance their enterprise-grade data center needs with support for increasing edge network growth. About Ahmed Banafa Ahmed Banafa has extensive experience in operations and management, as well as a research background in a variety of techniques and analysis. He is a certified Microsoft Office Specialist, and he has served as a reviewer and technical contributor for the publication of several business and technical books. His experience in higher education includes serving as an instructor in business and technology at several universities and colleges, including the University of California, Berkeley; California State University, East Bay; Ohlone College; and Heald College. He is the recipient of several awards, including Distinguished Tenured Staff Award of 2013 , Business Program Instructor of the year for 2013, 2014 and the Parthenon award for best instructor in 2012, 2010 and the 2003, Certificate of Honor for Instructor from the City and County of San Francisco. Banafa is included in the 2000–2001 Who’s Who in Finance and Industry.