Fog Computing Application Deployment and Management

Fog Computing Application Deployment and Management

Ranjitha G., Pankaj Lathar, G. M. Siddesh
Copyright: © 2019 |Pages: 16
DOI: 10.4018/978-1-5225-6070-8.ch004
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Fog computing enhances cloud computing to be closer to the processes that act on IOT devices. Fogging was introduced to overcome the cloud computing paradigm which was not able to address some services, applications, and other limitations of cloud computing such as security aspects, bandwidth, and latency. Fog computing provides the direct correlation with the internet of things. IBM and CISCO are linking their concepts of internet of things with the help of fog computing. Application services are hosted on the network edge. It improves the efficiency and reduces the amount of data that is transferred to the cloud for analysis, storage, and processing. Developers write the fog application and deploy it to the access points. Several applications like smart cities, healthcare domain, pre-processing, and caching applications have to be deployed and managed properly.
Chapter Preview
Top

Introduction

The fog computing enhances the cloud computing to be closer to the process that act on the IOT devices. It is also known as fogging. Fog computing is invented by CISCO. Fog computing provides services and storage to the client. Fog computing also provides the services between the cloud data centers and enterprise end devices. It is wireless information transferring across the distributed devices in the Internet of things (IOT) network. Fogging was introduced to overcome the cloud computing paradigm which was not able to address some services, applications and other limitations of cloud computing such as security aspects, bandwidth and latency. The protection mechanism which was used in cloud for encryption was failed in providing the security for the data from the attackers. Fog computing address these type of issues.

Figure 1.

Fog computing

978-1-5225-6070-8.ch004.f01

Fog computing applications are considered as the edge network computing. Edge network devices provide an entry point to the provider’s network. In fog computing communication takes place as peer to peer. In Internet of thing the sensor will generate extremely large amount of data. With the network connection the fog devices which are known as fog nodes can be deployed anywhere. It can be deployed on power pool, floor or the factory, vehicle, side of a railway track, etc. The fog nodes are routers, switches, controllers in industries, surveillance camera’s etc. This type of communication is used to provide storage and efficient sharing and to take the decisions. FC is a novel idea which is expected to solve problems and provides solution for the latency, sensitive information computing problems. The local computing resources are used by the fog computing instead of real cloud for processing data. The transmission latency is reduced because of the proximity between the processors and data sources.

Top

Features Of Fog Computing Applications

Figure 2.

Features of fog computing applications

978-1-5225-6070-8.ch004.f02
  • 1.

    Local Data Processing: It is implemented in a way that provides intelligence at the gateway which helps to analyze the streaming of data locally (Bonomi, Milito, Zhu, & Addepalli, 2012). It helps in handling large amount of data in less time span. It responses to the various conditions.

  • 2.

    Adaptive Applications: The fog layer data transmission need to be adaptive. It includes data request and also transmission rate from fog to cloud layer.

  • 3.

    Local Storage: Gateways process the incoming data locally. It contains an operating system that handles the repository. In non-volatile memory it stores the data. It compresses and encrypts the data and stores it locally.

  • 4.

    Security: Security is the most major requirements of application. If the system is not secured it leads to serious vulnerabilities. Iptables are used for configuring the IP packets and it also contains set of rules.

  • 5.

    Interoperability: It plays an important role for the success of an application. IOT based system contains the mixture of protocols, technologies and platforms. Integrating these application is major challenge. Fog computing provides easy integration of these network and technologies.

  • 6.

    Sensor Node Energy Efficiency: Sensor nodes has to be processed properly. Fog computing provides a signal processing tasks from the nodes to gateways. It uses low power transmission protocol to save the energy during transmission.

Complete Chapter List

Search this Book:
Reset