SlideShare uma empresa Scribd logo
1 de 3
Baixar para ler offline
IEEE Communications Magazine • April 201718
Tutorial
1. What Is Fog Computing and How Is It Different
from Edge Computing?
Fog computing is an end-to-end horizontal architecture that dis-
tributes computing, storage, control, and networking functions
closer to users along the cloud-to-thing continuum.
The word “edge” may carry different meanings. A common
usage of the term refers to the edge network as opposed to
the core network, with equipment such as edge routers, base
stations, and home gateways. In that sense, there are several
differences between fog and edge.
First, fog is inclusive of cloud, core, metro, edge, clients, and
things. The fog architecture will further enable pooling, orches-
trating, managing, and securing the resources and functions
distributed in the cloud, anywhere along the cloud-to-thing
continuum, and on the things to support end-to-end services
and applications. Second, fog seeks to realize a seamless con-
tinuum of computing services from the cloud to the things
rather than treating the network edges as isolated computing
platforms. Third, fog envisions a horizontal platform that will
support the common fog computing functions for multiple
industries and application domains, including but not limited
to traditional telco services. Fourth, a dominant part of edge
is mobile edge, whereas the fog computing architecture will
be flexible enough to work over wireline as well as wireless
networks.
2. Is Fog Just a Smaller Cloud?
First, the size of the fog is flexible — it can range from a sin-
gle small fog node to large fog systems comparable to existing
clouds, depending on the application needs.
While fog will bring many cloud-like services closer to end
users and can have smaller footprints than the cloud, it has
a different vision from that of smaller or mini-clouds. Mini-
clouds tend to be designed as isolated computing platforms.
Fog envisions a seamlessly integrated cloud-fog-thing architec-
ture to enable computing anywhere along the cloud-to-things
continuum. Fog-to-cloud and fog-to-fog interactions will there-
fore be a focus of an end-to-end fog computing architecture
to distribute computing functions, and then manage, pool,
orchestrate, and secure the distributed resources and func-
tions. Fog may form a hierarchical architecture between the
cloud and the things, with fog nodes at different architectural
levels collaborating with each other to support end-to-end
applications.
Fog also concerns the control of cyber-physical systems and
D2D communication, in addition to computation and storage in
clouds, big or small.
3. Is Fog Equivalent to IoT?
Fog is an architecture. The Internet of Things (IoT) often refers
to a set of services and applications.
An architecture decides the allocation of functionalities. It
formulates and answers questions such as “who does what, and
at what timescale and location?” An architecture supports many
applications, some in existence today and others more futuristic.
For example, TCP/IP represents an Internet architecture. It
includes several key principles, such as addressing, and alloca-
tion of functionalities, such as congestion-independent, hop-
by-hop routing, and congestion-dependent, end-to-end session
control. Applications that leverage TCP/IP have come from a
wide and increasing range: from the web to emails and from
P2P to video streaming.
The relationship between fog and IoT is similar to that
between the Internet architecture and the web applications. Fog
also supports other areas of applications, such as those in fifth
generation (5G) cellular or embedded artificial intelligence.
4. Is Fog for Computation, or Communication, or
Control?
Fog is an umbrella term that includes an architecture for com-
putation, an architecture for communication, an architecture for
storage, and an architecture for control (both control of the
network itself and networked control in cyber-physical systems).
For example, fog computing explores new ways to decom-
pose a computational task so as to match an underlying compu-
tation substrate that is heterogeneous (in hardware and software
capabilities), volatile (in availability, mobility, and security), and
constrained (by bandwidth or battery). Fog communication
explores how devices may talk to each other despite intermit-
tent global connectivity. Fog control explores how clients might
crowd-sense network conditions and self-configure, and how to
leverage small and almost deterministic latency to enable feed-
back control loops.
5. What Are the Unique Advantages Offered by Fog?
Unique advantages that are potentially offered by fog can be
summarized with an acronym: “SCALE.” These advantages in
turn enable new services and business models, and may help
broaden revenues, reduce cost, or accelerate product rollouts.
Security: While fog faces unique security challenges, it also
offers certain advantages. In particular, by reducing the distance
that information needs to traverse, there is less chance of eaves-
dropping. By leveraging proximity-based authentication challeng-
es, identity verification can be strengthened.
Cognition: Awareness of client-centric objectives. A fog
architecture, aware of customer requirements, can best deter-
mine where to carry out the computing, storage, and control
functions along the cloud-to-thing continuum. Fog applications,
being close to the end users, can be built to be better aware of
and closely reflect customer requirements.
Agility: Rapid innovation and affordable scaling. It is usually
much faster and cheaper to experiment with client and edge
devices rather than waiting for vendors of large network and
cloud boxes to initiate or adopt an innovation. Fog will make it
easier to create an open marketplace for individuals and small
teams to use open application programming interfaces (APIs),
open software development kits (SDKs), and the proliferation of
mobile devices to innovate, develop, deploy, and operate new
services.
Latency: Real-time processing and cyber-physical system con-
trol. Fog enables data analytics at the network edge and can
support time-sensitive control functions for local cyber-physical
systems. This is essential for not only commercial applications but
also for the Tactile Internet vision to enable embedded AI applica-
tions with millisecond reaction times.
Efficiency: Pooling resources along the cloud-to-thing con-
tinuum. Fog can distribute computing, storage, and control
functions anywhere between the cloud and the endpoint to
take full advantage of the resources available along this con-
tinuum. It can also allow applications to leverage otherwise
idle computing, storage, and networking resources abundantly
available on network edge and end-user devices such as tab-
lets, laptops, smart home appliances, connected vehicles and
trains, and network edge routers. Fog’s closer proximity to
the endpoints will enable it to be more closely integrated with
end-user systems to enhance overall system efficiency and per-
Clarifying Fog Computing and Networking: 10 Questions and Answers
By Mung Chiang, Sangtae Ha, Chih-Lin I, Fulvio Risso, and Tao Zhang
IEEE Communications Magazine • April 2017 19
Tutorial
formance. This is especially important for performance-critical
cyber-physical systems.
6. Is Fog Good or Bad for Security and Privacy?
Fog systems and applications will often be distributed and oper-
ated remotely. Some fog systems can also be resource-con-
strained. Compared to centralized clouds, such distributed,
remote, and resource-constrained fog systems pose additional
security challenges often encountered in distributed systems.
On the other hand, fog can bring more processing resources
closer to the endpoints to help better protect the vast popu-
lation of diverse endpoints that often do not have sufficient
resources to adequately protect themselves. In other words,
fog systems can provide a wide range of local security services
to make the IoT as a whole more secure. For example, fog
systems can perform local security monitoring, local threat
detection, and local threat protection functions on behalf of
the endpoints. Fog nodes can also serve as proxies of the end-
points to help manage and update the security credentials and
software on the endpoints, eliminating the often impractical
needs for all the endpoints to directly communicate with the
remote cloud for such functions.
7. Will the Need for Fog Diminish as Network
Capacity and Delay Improve over Time?
While it is true that a primary benefit of fog computing is its abil-
ity to reduce latency and delay, the drivers for fog go far beyond
pure latency issues to include a variety of operational, regulato-
ry, business, and reliability issues.
For example, instead of the traditional way of adding new
applications by adding dedicated new local servers and network-
ing gear, fog can provide a common end-to-end platform for all
services provided to each customer. This can provide a unified
platform to support life cycle management, networking, and
security for all applications, which will reduce system complexity
and costs and also allow applications from different providers to
better interact with each other rather than stay siloed on their
dedicated hardware and software platforms. Fog can enable crit-
ical services to be operated autonomously or managed from the
cloud, the perimeter, or a variety of points in the network. Fog is
equally advantageous for areas where network connectivity can
be unreliable due to weather or other conditions. It can also sig-
nificantly reduce network bandwidth loads through its proximity
to where the data is generated. With fog, local operational and
business policies can be applied to enable more efficient local
data processing and analytics on premises.
As another example in cellular networks, cloud RAN, with
centralized or distributed network architecture, has the advan-
tage of being physically close to the end users and the capabili-
ty of utilizing the network resources at the edge. Consequently,
the cloud radio access network (C-RAN) will be an integral part
of the solution to meet stringent network delay requirements
that the traditional RAN network may fail to meet. Consequent-
ly, the Third Generation Partnership Project (3GPP) is now dis-
cussing a RAN architecture that contains both the central units
and the distributed units. Extending prior notions in C-RAN, fog
network is unique in the sense that the end user computing
and storage resource is considered as an integral part of the
whole network, by forming ad hoc subnets among end nodes.
Careful exploitation of such features will bring unique values
for fog networks.
8. What New Technologies and Standards, If Any,
Do We Need to Develop for Fog?
Fog systems will need to interact with each other, with the
clouds, and with a diverse range of user end devices. Therefore,
the success and wide adoption of fog computing will rely on
standards. While fog computing can benefit from many existing
standards, new standards may also be required, for example, in
the following areas:
Building unified fog-cloud platforms: Interfaces and pro-
tocols for the fog and the cloud to interact with each other
to enable unified cloud-fog service platform and applications,
move computing functions and applications between the
cloud and the fog, pool resources distributed in the cloud
and the fog, and manage the life cycle of the fog systems and
applications.
Support distributed and hierarchical fog systems over possi-
bly heterogeneous, volatile, and constrained physical resourc-
es: interfaces and protocols for different hierarchical levels in
a fog system to interact with each other, and for different fog
systems at the same hierarchical level to collaborate with each
other to serve as each other’s backup.
Access to fog services: A fog system, bringing resources
closer to end users, can enable a wide range of new fog-based
services. Standards will be required for users and their devices to
interact with the fog system to discover, request, and receive fog
services. So will automatic and lightweight bidding mechanisms
for access to fog resources and services to reinforce the eco-
nomic sustainability of the fog computing model, and enabling
economic transactions.
Data management: Local processing and management of
data is one of the important drivers for fog computing. Data,
however, comes from an increasingly wide range of sources.
Data management also imposes widely diverse requirements
from industry to industry. New standards may be required to
manage the diverse data, such as storing, accessing, and secur-
ing the data distributed in the fog and cloud.
Security and privacy: A distributed and remotely oper-
ated fog system can pose new security challenges not
present in centralized systems. Addressing these new
challenges may require new standards. For example, fog
computing will need to run a diverse set of local hardware
platforms. Therefore, new interfaces may be required for
fog software to interact with the various hardware plat-
forms, which may be provided by different vendors, to
ensure a trusted computing environment. New interfaces
and protocols may be required for automatic detection
of security compromises in a distributed and remote fog
system, and also for remote and automatic responses to
security compromises.
Furthermore, although standards may exist for some fog com-
puting needs, additional requirements in fog computing environ-
ments (e.g., low-latency, large number of resource-constrained
devices) may necessitate new standards that are more suitable
for fog computing environments.
9. What New Research Challenges Do We Have to
Address to Enable Fog?
Research challenges in fog span a wide range: from compu-
tation decomposition over heterogeneous and constrained
nodes to cloud-fog interface definition, from state consisten-
cy in dispersive computing to elastic storage over volatile
substrate, from pricing for economic incentives to scalable
security measures. Fundamental to these topics is the intrinsic
trade-off between “local” and “global” and between “brick”
and “click” as we slide between cloud and things in decid-
ing where to allocate a function and how to glue them back
together.
For example, fog computing enables a complex service
to possibly be delivered through a set of elementary soft-
ware elements that operate on heterogeneous nodes, such
as end user terminals and local servers, but also network ele-
ments and data centers. The problem of the orchestration of
20 IEEE Communications Magazine • April 2017
Tutorial
the above complex services is definitely an important chal-
lenge, complicated by the highly dynamic environment, the
many fog-enabled applications installed on end user devices
and things, and the necessity to support different adminis-
trative domains, to adapt the service to the extreme hetero-
geneity of the infrastructure, and to adapt the service (and
the orchestration algorithms) to the external environment.
For instance, fog applications cannot always count on the
availability of powerful computing devices that can execute
complex orchestration algorithms; in critical conditions (e.g.,
broken infrastructure as in the case of an earthquake), the fog
infrastructure has to be able to orchestrate services even in
the presence of limited computing capabilities, with an intrin-
sic degree of resiliency. Along this line, another important
challenge is the capability to create self-adapting applications,
which are able to automatically adapt their behavior based
on the surrounding environment, for example, in case some
required services (e.g., high-capacity storage or a high-pre-
cision sensor) cannot be reached, while still being able to
deliver the service the user is expecting, albeit with some
degradation.
10. What Commercial Opportunities Will Fog Bring?
Fog computing will bring many new commercial opportunities and
will disrupt the existing industry landscapes and business models,
disrupting the balance of power along the industry food chain.
For example, networking functions (e.g., routing and switch-
ing), application servers, and storage functions are already con-
verging into integrated “fog nodes”: edge devices that integrate
edge router and local application server and storage functions
are already commercially available. The emerging fog systems
will empower the cloud to do what it cannot effectively do
today by, for example, acting as proxies to connect and then
provide cloud services to the many devices that cannot be prac-
tically connected to the cloud directly. A growing range of inno-
vative fog-based services, including fog systems and services as
a service, will emerge. The cloud and the fog will converge into
unified end-to-end platforms and provide integrated services and
applications, creating opportunities for fundamental disruptions
to the existing cloud computing business models. Players of all
sizes will be able to deploy fog systems and operate fog ser-
vices. And the list goes on.

Mais conteúdo relacionado

Mais procurados

What is fog computing
What is fog computingWhat is fog computing
What is fog computingAhmed Banafa
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)Iffat Anjum
 
Review of implementing fog computing
Review of implementing fog computingReview of implementing fog computing
Review of implementing fog computingeSAT Journals
 
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computingarchana lisbon
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
A Study on Cloud and Fog Computing Security Issues and Solutions
A Study on Cloud and Fog Computing Security Issues and SolutionsA Study on Cloud and Fog Computing Security Issues and Solutions
A Study on Cloud and Fog Computing Security Issues and SolutionsAM Publications
 
Fog Computing Reality Check: Real World Applications and Architectures
Fog Computing Reality Check: Real World Applications and ArchitecturesFog Computing Reality Check: Real World Applications and Architectures
Fog Computing Reality Check: Real World Applications and ArchitecturesBiren Gandhi
 
Abi research over the edge
Abi research over the edgeAbi research over the edge
Abi research over the edgemyehuman
 
Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentationomkar parab
 
Fog Computing with VORTEX
Fog Computing with VORTEXFog Computing with VORTEX
Fog Computing with VORTEXAngelo Corsaro
 
fog05: The Fog Computing Platform
fog05: The Fog Computing Platformfog05: The Fog Computing Platform
fog05: The Fog Computing PlatformAngelo Corsaro
 
Fog Computing - DEV.BG 2018
Fog Computing - DEV.BG 2018Fog Computing - DEV.BG 2018
Fog Computing - DEV.BG 2018Trayan Iliev
 
Fog Computing and the Internet of Things
Fog Computing and the Internet of ThingsFog Computing and the Internet of Things
Fog Computing and the Internet of ThingsS.Mostafa Sayyedi
 

Mais procurados (20)

What is fog computing
What is fog computingWhat is fog computing
What is fog computing
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)
 
Review of implementing fog computing
Review of implementing fog computingReview of implementing fog computing
Review of implementing fog computing
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Bn4301364368
Bn4301364368Bn4301364368
Bn4301364368
 
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computing
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
A Study on Cloud and Fog Computing Security Issues and Solutions
A Study on Cloud and Fog Computing Security Issues and SolutionsA Study on Cloud and Fog Computing Security Issues and Solutions
A Study on Cloud and Fog Computing Security Issues and Solutions
 
Latest Thesis Topics for Fog computing
Latest Thesis Topics for Fog computingLatest Thesis Topics for Fog computing
Latest Thesis Topics for Fog computing
 
Fog Computing Reality Check: Real World Applications and Architectures
Fog Computing Reality Check: Real World Applications and ArchitecturesFog Computing Reality Check: Real World Applications and Architectures
Fog Computing Reality Check: Real World Applications and Architectures
 
Abi research over the edge
Abi research over the edgeAbi research over the edge
Abi research over the edge
 
Seminar ppt fog comp
Seminar ppt fog compSeminar ppt fog comp
Seminar ppt fog comp
 
Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentation
 
Fog Computing Defined
Fog Computing DefinedFog Computing Defined
Fog Computing Defined
 
Fog Computing with VORTEX
Fog Computing with VORTEXFog Computing with VORTEX
Fog Computing with VORTEX
 
fog05: The Fog Computing Platform
fog05: The Fog Computing Platformfog05: The Fog Computing Platform
fog05: The Fog Computing Platform
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
FOGCOMPUTING
FOGCOMPUTINGFOGCOMPUTING
FOGCOMPUTING
 
Fog Computing - DEV.BG 2018
Fog Computing - DEV.BG 2018Fog Computing - DEV.BG 2018
Fog Computing - DEV.BG 2018
 
Fog Computing and the Internet of Things
Fog Computing and the Internet of ThingsFog Computing and the Internet of Things
Fog Computing and the Internet of Things
 

Semelhante a Clarifying fog computing and networking 10 questions and answers

Security and privacy issues of fog
Security and privacy issues of fogSecurity and privacy issues of fog
Security and privacy issues of fogRezgar Mohammad
 
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing IJECEIAES
 
Cloud computing final format(1)
Cloud computing final format(1)Cloud computing final format(1)
Cloud computing final format(1)ahmed elmeghiny
 
Fog Computing and Its Role in the Internet of Things
Fog Computing and Its Role in the Internet of ThingsFog Computing and Its Role in the Internet of Things
Fog Computing and Its Role in the Internet of ThingsHarshitParkar6677
 
A survey of fog computing concepts applications and issues
A survey of fog computing concepts  applications and issuesA survey of fog computing concepts  applications and issues
A survey of fog computing concepts applications and issuesRezgar Mohammad
 
A220113
A220113A220113
A220113irjes
 
A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...IJECEIAES
 
Synopsis on cloud computing by Prashant upta
Synopsis on cloud computing by Prashant uptaSynopsis on cloud computing by Prashant upta
Synopsis on cloud computing by Prashant uptaPrashant Gupta
 
IRJET- Fog Route:Distribution of Data using Delay Tolerant Network
IRJET- Fog Route:Distribution of Data using Delay Tolerant NetworkIRJET- Fog Route:Distribution of Data using Delay Tolerant Network
IRJET- Fog Route:Distribution of Data using Delay Tolerant NetworkIRJET Journal
 
Fog Computing and Cloud Computing
Fog Computing and Cloud ComputingFog Computing and Cloud Computing
Fog Computing and Cloud ComputingAhmed Banafa
 
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...HarshitParkar6677
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportVivek Maurya
 

Semelhante a Clarifying fog computing and networking 10 questions and answers (20)

Fog computing
Fog computing Fog computing
Fog computing
 
Security and privacy issues of fog
Security and privacy issues of fogSecurity and privacy issues of fog
Security and privacy issues of fog
 
Fog comuting
Fog comutingFog comuting
Fog comuting
 
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
 
Cloud computing final format(1)
Cloud computing final format(1)Cloud computing final format(1)
Cloud computing final format(1)
 
fog computing
fog computingfog computing
fog computing
 
Fog Computing and Its Role in the Internet of Things
Fog Computing and Its Role in the Internet of ThingsFog Computing and Its Role in the Internet of Things
Fog Computing and Its Role in the Internet of Things
 
A survey of fog computing concepts applications and issues
A survey of fog computing concepts  applications and issuesA survey of fog computing concepts  applications and issues
A survey of fog computing concepts applications and issues
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
A220113
A220113A220113
A220113
 
A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...
 
Distributed system.pptx
Distributed system.pptxDistributed system.pptx
Distributed system.pptx
 
Synopsis on cloud computing by Prashant upta
Synopsis on cloud computing by Prashant uptaSynopsis on cloud computing by Prashant upta
Synopsis on cloud computing by Prashant upta
 
IRJET- Fog Route:Distribution of Data using Delay Tolerant Network
IRJET- Fog Route:Distribution of Data using Delay Tolerant NetworkIRJET- Fog Route:Distribution of Data using Delay Tolerant Network
IRJET- Fog Route:Distribution of Data using Delay Tolerant Network
 
Fog Computing and Cloud Computing
Fog Computing and Cloud ComputingFog Computing and Cloud Computing
Fog Computing and Cloud Computing
 
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...
 
Fog security
Fog securityFog security
Fog security
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
 
119 125
119 125119 125
119 125
 
119 125
119 125119 125
119 125
 

Mais de Rezgar Mohammad

A survey on data security in data warehousing1
A survey on data security in data warehousing1A survey on data security in data warehousing1
A survey on data security in data warehousing1Rezgar Mohammad
 
2904 supply chain_cyber_security
2904 supply chain_cyber_security2904 supply chain_cyber_security
2904 supply chain_cyber_securityRezgar Mohammad
 
Creating a secure supply chain
Creating a secure supply  chainCreating a secure supply  chain
Creating a secure supply chainRezgar Mohammad
 
Internet of things io t and its impact on supply chain a framework
Internet of things io t and its impact on supply chain a frameworkInternet of things io t and its impact on supply chain a framework
Internet of things io t and its impact on supply chain a frameworkRezgar Mohammad
 
Impacts of internet of things on supply chains
Impacts of internet of things on supply chainsImpacts of internet of things on supply chains
Impacts of internet of things on supply chainsRezgar Mohammad
 
A simulation based evaluation approach smart supply risk management
A simulation based evaluation approach smart supply risk managementA simulation based evaluation approach smart supply risk management
A simulation based evaluation approach smart supply risk managementRezgar Mohammad
 
A survey on data security in data warehousing
A survey on data security in data warehousing A survey on data security in data warehousing
A survey on data security in data warehousing Rezgar Mohammad
 

Mais de Rezgar Mohammad (7)

A survey on data security in data warehousing1
A survey on data security in data warehousing1A survey on data security in data warehousing1
A survey on data security in data warehousing1
 
2904 supply chain_cyber_security
2904 supply chain_cyber_security2904 supply chain_cyber_security
2904 supply chain_cyber_security
 
Creating a secure supply chain
Creating a secure supply  chainCreating a secure supply  chain
Creating a secure supply chain
 
Internet of things io t and its impact on supply chain a framework
Internet of things io t and its impact on supply chain a frameworkInternet of things io t and its impact on supply chain a framework
Internet of things io t and its impact on supply chain a framework
 
Impacts of internet of things on supply chains
Impacts of internet of things on supply chainsImpacts of internet of things on supply chains
Impacts of internet of things on supply chains
 
A simulation based evaluation approach smart supply risk management
A simulation based evaluation approach smart supply risk managementA simulation based evaluation approach smart supply risk management
A simulation based evaluation approach smart supply risk management
 
A survey on data security in data warehousing
A survey on data security in data warehousing A survey on data security in data warehousing
A survey on data security in data warehousing
 

Último

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Último (20)

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Clarifying fog computing and networking 10 questions and answers

  • 1. IEEE Communications Magazine • April 201718 Tutorial 1. What Is Fog Computing and How Is It Different from Edge Computing? Fog computing is an end-to-end horizontal architecture that dis- tributes computing, storage, control, and networking functions closer to users along the cloud-to-thing continuum. The word “edge” may carry different meanings. A common usage of the term refers to the edge network as opposed to the core network, with equipment such as edge routers, base stations, and home gateways. In that sense, there are several differences between fog and edge. First, fog is inclusive of cloud, core, metro, edge, clients, and things. The fog architecture will further enable pooling, orches- trating, managing, and securing the resources and functions distributed in the cloud, anywhere along the cloud-to-thing continuum, and on the things to support end-to-end services and applications. Second, fog seeks to realize a seamless con- tinuum of computing services from the cloud to the things rather than treating the network edges as isolated computing platforms. Third, fog envisions a horizontal platform that will support the common fog computing functions for multiple industries and application domains, including but not limited to traditional telco services. Fourth, a dominant part of edge is mobile edge, whereas the fog computing architecture will be flexible enough to work over wireline as well as wireless networks. 2. Is Fog Just a Smaller Cloud? First, the size of the fog is flexible — it can range from a sin- gle small fog node to large fog systems comparable to existing clouds, depending on the application needs. While fog will bring many cloud-like services closer to end users and can have smaller footprints than the cloud, it has a different vision from that of smaller or mini-clouds. Mini- clouds tend to be designed as isolated computing platforms. Fog envisions a seamlessly integrated cloud-fog-thing architec- ture to enable computing anywhere along the cloud-to-things continuum. Fog-to-cloud and fog-to-fog interactions will there- fore be a focus of an end-to-end fog computing architecture to distribute computing functions, and then manage, pool, orchestrate, and secure the distributed resources and func- tions. Fog may form a hierarchical architecture between the cloud and the things, with fog nodes at different architectural levels collaborating with each other to support end-to-end applications. Fog also concerns the control of cyber-physical systems and D2D communication, in addition to computation and storage in clouds, big or small. 3. Is Fog Equivalent to IoT? Fog is an architecture. The Internet of Things (IoT) often refers to a set of services and applications. An architecture decides the allocation of functionalities. It formulates and answers questions such as “who does what, and at what timescale and location?” An architecture supports many applications, some in existence today and others more futuristic. For example, TCP/IP represents an Internet architecture. It includes several key principles, such as addressing, and alloca- tion of functionalities, such as congestion-independent, hop- by-hop routing, and congestion-dependent, end-to-end session control. Applications that leverage TCP/IP have come from a wide and increasing range: from the web to emails and from P2P to video streaming. The relationship between fog and IoT is similar to that between the Internet architecture and the web applications. Fog also supports other areas of applications, such as those in fifth generation (5G) cellular or embedded artificial intelligence. 4. Is Fog for Computation, or Communication, or Control? Fog is an umbrella term that includes an architecture for com- putation, an architecture for communication, an architecture for storage, and an architecture for control (both control of the network itself and networked control in cyber-physical systems). For example, fog computing explores new ways to decom- pose a computational task so as to match an underlying compu- tation substrate that is heterogeneous (in hardware and software capabilities), volatile (in availability, mobility, and security), and constrained (by bandwidth or battery). Fog communication explores how devices may talk to each other despite intermit- tent global connectivity. Fog control explores how clients might crowd-sense network conditions and self-configure, and how to leverage small and almost deterministic latency to enable feed- back control loops. 5. What Are the Unique Advantages Offered by Fog? Unique advantages that are potentially offered by fog can be summarized with an acronym: “SCALE.” These advantages in turn enable new services and business models, and may help broaden revenues, reduce cost, or accelerate product rollouts. Security: While fog faces unique security challenges, it also offers certain advantages. In particular, by reducing the distance that information needs to traverse, there is less chance of eaves- dropping. By leveraging proximity-based authentication challeng- es, identity verification can be strengthened. Cognition: Awareness of client-centric objectives. A fog architecture, aware of customer requirements, can best deter- mine where to carry out the computing, storage, and control functions along the cloud-to-thing continuum. Fog applications, being close to the end users, can be built to be better aware of and closely reflect customer requirements. Agility: Rapid innovation and affordable scaling. It is usually much faster and cheaper to experiment with client and edge devices rather than waiting for vendors of large network and cloud boxes to initiate or adopt an innovation. Fog will make it easier to create an open marketplace for individuals and small teams to use open application programming interfaces (APIs), open software development kits (SDKs), and the proliferation of mobile devices to innovate, develop, deploy, and operate new services. Latency: Real-time processing and cyber-physical system con- trol. Fog enables data analytics at the network edge and can support time-sensitive control functions for local cyber-physical systems. This is essential for not only commercial applications but also for the Tactile Internet vision to enable embedded AI applica- tions with millisecond reaction times. Efficiency: Pooling resources along the cloud-to-thing con- tinuum. Fog can distribute computing, storage, and control functions anywhere between the cloud and the endpoint to take full advantage of the resources available along this con- tinuum. It can also allow applications to leverage otherwise idle computing, storage, and networking resources abundantly available on network edge and end-user devices such as tab- lets, laptops, smart home appliances, connected vehicles and trains, and network edge routers. Fog’s closer proximity to the endpoints will enable it to be more closely integrated with end-user systems to enhance overall system efficiency and per- Clarifying Fog Computing and Networking: 10 Questions and Answers By Mung Chiang, Sangtae Ha, Chih-Lin I, Fulvio Risso, and Tao Zhang
  • 2. IEEE Communications Magazine • April 2017 19 Tutorial formance. This is especially important for performance-critical cyber-physical systems. 6. Is Fog Good or Bad for Security and Privacy? Fog systems and applications will often be distributed and oper- ated remotely. Some fog systems can also be resource-con- strained. Compared to centralized clouds, such distributed, remote, and resource-constrained fog systems pose additional security challenges often encountered in distributed systems. On the other hand, fog can bring more processing resources closer to the endpoints to help better protect the vast popu- lation of diverse endpoints that often do not have sufficient resources to adequately protect themselves. In other words, fog systems can provide a wide range of local security services to make the IoT as a whole more secure. For example, fog systems can perform local security monitoring, local threat detection, and local threat protection functions on behalf of the endpoints. Fog nodes can also serve as proxies of the end- points to help manage and update the security credentials and software on the endpoints, eliminating the often impractical needs for all the endpoints to directly communicate with the remote cloud for such functions. 7. Will the Need for Fog Diminish as Network Capacity and Delay Improve over Time? While it is true that a primary benefit of fog computing is its abil- ity to reduce latency and delay, the drivers for fog go far beyond pure latency issues to include a variety of operational, regulato- ry, business, and reliability issues. For example, instead of the traditional way of adding new applications by adding dedicated new local servers and network- ing gear, fog can provide a common end-to-end platform for all services provided to each customer. This can provide a unified platform to support life cycle management, networking, and security for all applications, which will reduce system complexity and costs and also allow applications from different providers to better interact with each other rather than stay siloed on their dedicated hardware and software platforms. Fog can enable crit- ical services to be operated autonomously or managed from the cloud, the perimeter, or a variety of points in the network. Fog is equally advantageous for areas where network connectivity can be unreliable due to weather or other conditions. It can also sig- nificantly reduce network bandwidth loads through its proximity to where the data is generated. With fog, local operational and business policies can be applied to enable more efficient local data processing and analytics on premises. As another example in cellular networks, cloud RAN, with centralized or distributed network architecture, has the advan- tage of being physically close to the end users and the capabili- ty of utilizing the network resources at the edge. Consequently, the cloud radio access network (C-RAN) will be an integral part of the solution to meet stringent network delay requirements that the traditional RAN network may fail to meet. Consequent- ly, the Third Generation Partnership Project (3GPP) is now dis- cussing a RAN architecture that contains both the central units and the distributed units. Extending prior notions in C-RAN, fog network is unique in the sense that the end user computing and storage resource is considered as an integral part of the whole network, by forming ad hoc subnets among end nodes. Careful exploitation of such features will bring unique values for fog networks. 8. What New Technologies and Standards, If Any, Do We Need to Develop for Fog? Fog systems will need to interact with each other, with the clouds, and with a diverse range of user end devices. Therefore, the success and wide adoption of fog computing will rely on standards. While fog computing can benefit from many existing standards, new standards may also be required, for example, in the following areas: Building unified fog-cloud platforms: Interfaces and pro- tocols for the fog and the cloud to interact with each other to enable unified cloud-fog service platform and applications, move computing functions and applications between the cloud and the fog, pool resources distributed in the cloud and the fog, and manage the life cycle of the fog systems and applications. Support distributed and hierarchical fog systems over possi- bly heterogeneous, volatile, and constrained physical resourc- es: interfaces and protocols for different hierarchical levels in a fog system to interact with each other, and for different fog systems at the same hierarchical level to collaborate with each other to serve as each other’s backup. Access to fog services: A fog system, bringing resources closer to end users, can enable a wide range of new fog-based services. Standards will be required for users and their devices to interact with the fog system to discover, request, and receive fog services. So will automatic and lightweight bidding mechanisms for access to fog resources and services to reinforce the eco- nomic sustainability of the fog computing model, and enabling economic transactions. Data management: Local processing and management of data is one of the important drivers for fog computing. Data, however, comes from an increasingly wide range of sources. Data management also imposes widely diverse requirements from industry to industry. New standards may be required to manage the diverse data, such as storing, accessing, and secur- ing the data distributed in the fog and cloud. Security and privacy: A distributed and remotely oper- ated fog system can pose new security challenges not present in centralized systems. Addressing these new challenges may require new standards. For example, fog computing will need to run a diverse set of local hardware platforms. Therefore, new interfaces may be required for fog software to interact with the various hardware plat- forms, which may be provided by different vendors, to ensure a trusted computing environment. New interfaces and protocols may be required for automatic detection of security compromises in a distributed and remote fog system, and also for remote and automatic responses to security compromises. Furthermore, although standards may exist for some fog com- puting needs, additional requirements in fog computing environ- ments (e.g., low-latency, large number of resource-constrained devices) may necessitate new standards that are more suitable for fog computing environments. 9. What New Research Challenges Do We Have to Address to Enable Fog? Research challenges in fog span a wide range: from compu- tation decomposition over heterogeneous and constrained nodes to cloud-fog interface definition, from state consisten- cy in dispersive computing to elastic storage over volatile substrate, from pricing for economic incentives to scalable security measures. Fundamental to these topics is the intrinsic trade-off between “local” and “global” and between “brick” and “click” as we slide between cloud and things in decid- ing where to allocate a function and how to glue them back together. For example, fog computing enables a complex service to possibly be delivered through a set of elementary soft- ware elements that operate on heterogeneous nodes, such as end user terminals and local servers, but also network ele- ments and data centers. The problem of the orchestration of
  • 3. 20 IEEE Communications Magazine • April 2017 Tutorial the above complex services is definitely an important chal- lenge, complicated by the highly dynamic environment, the many fog-enabled applications installed on end user devices and things, and the necessity to support different adminis- trative domains, to adapt the service to the extreme hetero- geneity of the infrastructure, and to adapt the service (and the orchestration algorithms) to the external environment. For instance, fog applications cannot always count on the availability of powerful computing devices that can execute complex orchestration algorithms; in critical conditions (e.g., broken infrastructure as in the case of an earthquake), the fog infrastructure has to be able to orchestrate services even in the presence of limited computing capabilities, with an intrin- sic degree of resiliency. Along this line, another important challenge is the capability to create self-adapting applications, which are able to automatically adapt their behavior based on the surrounding environment, for example, in case some required services (e.g., high-capacity storage or a high-pre- cision sensor) cannot be reached, while still being able to deliver the service the user is expecting, albeit with some degradation. 10. What Commercial Opportunities Will Fog Bring? Fog computing will bring many new commercial opportunities and will disrupt the existing industry landscapes and business models, disrupting the balance of power along the industry food chain. For example, networking functions (e.g., routing and switch- ing), application servers, and storage functions are already con- verging into integrated “fog nodes”: edge devices that integrate edge router and local application server and storage functions are already commercially available. The emerging fog systems will empower the cloud to do what it cannot effectively do today by, for example, acting as proxies to connect and then provide cloud services to the many devices that cannot be prac- tically connected to the cloud directly. A growing range of inno- vative fog-based services, including fog systems and services as a service, will emerge. The cloud and the fog will converge into unified end-to-end platforms and provide integrated services and applications, creating opportunities for fundamental disruptions to the existing cloud computing business models. Players of all sizes will be able to deploy fog systems and operate fog ser- vices. And the list goes on.