0 ratings 0% found this document useful (0 votes) 31 views 21 pages Unit 11
This document discusses Fog Computing and Edge Computing, highlighting their roles in addressing the challenges posed by the increasing data generated by IoT devices and the limitations of traditional cloud computing. It outlines the architecture, features, advantages, and applications of Fog Computing, emphasizing its decentralized approach that enhances real-time processing and reduces latency. Additionally, it contrasts Fog Computing with Cloud Computing and introduces Edge Computing as a complementary technology for efficient data management and service delivery.
AI-enhanced title and description
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, 
claim it here .
Available Formats
Download as PDF or read online on Scribd
Go to previous items Go to next items 
Save Unit-11 (1) For Later 224
UNIT 11 FOG COMPUTING AND EDGE
COMPUTING
Structure
11.1 Introduction
11.2 Objectives
113. Fog Computing
11.3.1 Features of Fog Computing
114 Cloud Computing Vs Fog Computing
115 Fog Computing Architecture
11.6 Working of Fog Computing
11.7 Advantages of Fog Computing
11.8 Applications of Fog Computing
11.9 Challenges in Fog Computing
11.10 Edge Computing
11.11 Edge Computing Architecture
11.12. Cloud-Fog-Edge Architecture
11.13 Cloud Vs Fog Vs Edge
11.14 Applications of Edge Computing
11.15 Summary
11.16  Solutions/Answers
11,17 Further Readings
11.1 INTRODUCTION
The utilization of burgeoning technologies such as IoT, online applications,
and the widespread adoption of social networking platforms is driving a
substantial surge in internet users. Consequently, the daily generation of data
is skyrocketing, placing a significant burden on cloud infrastructure.
Moreover, there is a mounting demand for escalated bandwidth and an
imperative need for real-time applications and analytics, further amplifying
the challenges faced in meeting these evolving requirements
Fog computing represents a pioneering paradigm in the realm of computing,
strategically positioned at the nexus between the cloud and edge devices.
Developed to address the limitations of centralized cloud systems, this
innovative technology, often attributed to the Cisco Group, endeavors to
bring computational capabilities closer to where data is generated and
utilized. By harnessing the power of distributed nodes at the edge of
networks, fog computing optimizes the processing, storage, and networking.
resources available, fostering quicker decision-making and enhanced
efficiency for a myriad of Intemet of Things (IoT) devices.Its decentralized architecture (which we will be learning in this unit) offers a
dynamic framework for handling the vast volumes of data generated by IoT
devices, enabling real-time processing at the edge while selectively
offloading complex tasks to the cloud for more extensive computations. This,
convergence of edge and cloud resources marks a transformative shift in
computing paradigms, promising to revolutionize how data is managed and
services are delivered in an increasingly connected and data-driven world,
 
 
In this unit, we will study the concept of Fog Computing, need for Fog
computing, differences between Cloud Computing and Fog Computing, Fog
Architecture, issues and challenges, concept of Edge Computing, Working of
Edge computing, differences between Fog, Cloud and Edge and towards the
end we will learn the applications and use cases.
 
11.2. OBJECTIVES
After going through this unit, you should be able to:
* describe Fog computing and the underlying working principle
* identify the differences between fog and cloud computing;
 
* discuss the fog architecture, advantages, applications and challenges
associated;
* define Edge computing
+ differentiate between Cloud, Fog and Edge computing
«specify some applications and use cases of Edge computing
 
11.3 FOG COMPUTING
 
The proliferation of Internet of Things (lo) devices and internet users has
resulted in an exponential rise in network traffic, storage demands, and
processing requirements. Cisco's 2020 estimates projected that by the close of
2023, there would be approximately 29.3 billion devices and 5.3 billion
internet users, amplifying these trends,
Cloud computing, a technology offering computation services over the
internet on a pay-per-use basis, delivers dynamic provisioning of resources
like storage, computation, and networking based on user demand, While it
boasts advantages such as costeffeetiveness, rapid provisioning, robust
computational capabilities, flexibility, automated updates, and user-side
management, it also presents drawbacks. These include increased response
times due to distant server locations, security concems over remotely stored
and accessed resources via the internet, amplified bandwidth demands, and
heightened network loads owing to escalating user numbers.
  
In 2014, Cisco introduced ‘Fog Computing,’ a technology extending
computing capabilities to the network's edge. The fog concept alludes to a
cloud-like infrastructure situated close to the ground, akin to how fog gathers
at the network's periphery.
Fog Computing and
Edge Computing
225Application
Development,
 
Fog Comps
‘Case Studies
226
ing and
Fog computing strategically situates resources - compute, data, storage, and
applications - between end-user layers where data originates and the cloud.
Devices like gateways, routers, and base stations can be configured as fog
devices. This approach brings cloud computing advantages closer to data
generation sources, thereby reducing response times, _ bandwidth
requirements, bolstering security, and offering other benefits.
According to the OpenFog Consortium fog computing is "a horizontal
system-level architecture that distributes computing, storage, control, and
networking functions closer to users along a continuum from cloud to
device."
Fog computing doesn't seek to replace cloud computing but rather
supplements it. Fog servers or devices provide limited resources compared to
extensive cloud infrastructure, Therefore, while cloud computing operates as
a centralized system for high processing power and storage, fog devices serve
in the user's proximity for low-latency operations, balancing the computing
load efficiently.
11.3.1 Features of Fog Computing
Fog nodes(FN) spread close to IoT devices at the edge of the network,
optimizing the services provided, and increasing the utilization of fog node
resources such as storage, networking, and data transmission. The features of
fog computing can be understood in contrast with the features of cloud
computing and are listed as follows:
 
 
© Location Awareness and Low Latency: FN provides IoT devices with
s based on their locations relative to the region of that FN. Each
device sends data and gets services from the closest FN, and receives
responses within milliseconds. Therefore fog nodes services improve the
efficiency of the real-time and decision making services.
 
serv’
 
* Geographic Distribution: FNs are distributed at consecutive locations
to guarantee highquality data transmission between themselves and [oT
devices during their traverse of FNs’ regions.
© Decentralization: Multiple FNs can cooperate to perform any heavy
computing services from IoT devices. When computing is distributed
between FNs’ resources, there is no need for centralized servers.
‘© Real-Time Services: FNs have the ability to provide the users with real-
time services, with great value to many systems that do not tolerate
  
‘© Saving Utilization of Cloud Storage: The FNs collect a massive
amount of user data, and onlyfiltered data is emigrated to be stored in the
cloud,
‘+ Heterogeneity: Fog computing system consists of broad types of FNs
that vary in the capabilities from one to another, due to different
operating systems between high-capacity servers and limitedcapacity
sensors, Communication in the fog computing systems also varies in
speed and nature, and may be wired or wirelesses, depending on the
requirements of serviced systems.* Mobility Support: FNs allow direct communication with mobile
devices, enabling user identity and location to be distinguished using
protocols such as Cisco’s locator/ID separation protocol.
11.4 CLOUD COMPUTING Vs FOG COMPUTING
Cloud computing is defined as a model that allows ubiquitous access to
shared resources on demand over the internet on a pay-per-use basis. Large
pools of resources are maintained at data centers by the cloud service
providers. Virtual resources from these pools are dynamically provisioned
and allocated to users on demand. High performance can be achieved by
using cloud resources but it may not be used for real time applications that
demand higher response time due to the distant location of cloud servers.
  
Fog computing is introduced to fill up the gap between the cloud servers and
end devices. Fog servers like cloud servers can offer various resources —
compute, storage, or network. Due to its proximity to end users, it allows
computations to be done faster or near real time. Hence it is better suited for
latency sensitive applications. Since fog computing makes use of devices
like- switches, routers, gateways; it is generally limited by resources and
hence offers less computation power as compared to cloud. Some of the
differences between cloud computing and fog computing are given in Table
Il
 
   
Table 1: Differences between Cloud Computing and Fog Computing
 
 
 
 
 
 
 
 
 
 
 
 
Criterion Cloud Computing Fog Computing
‘Architecture Architecture in | Architecture is
centralized distributed
Location Distant location from | In the proximity of end
the end users users
Resources Huge amount of | Limited amount of,
resources resources
Computational Higher computation | Lower computation
Capabilities capabilities capabilities
Response Time More response time Less response time
Access, Can be accessed over |Can be accessed by
intemet various protocols and
standards
Security Less security More security
Geographical Centralized Localized
Distribution
Distance between the | Multiple Hop Single Hop
Client and the
Serving Node
Service Provide delay in real- | Perfectly suited for real-
time services time services.
Mobility Support __| Limited support Fully support
 
 
 
 
 
Fog Computing and
Edge Computing
227Application
Developme
Fog Computing and
‘Case Studies
 
228
11.5 FOG COMPUTING ARCHITECTURE
Fog architecture is illustrated as a three-tier architecture, comprising the
edge, fog, and cloud levels, as shown in Figure 1. Researchers described the
fog architecture as a network of IoT back-end systems, and also considered
the fog level to be an extension of the cloud level, to provide services closer
to the edge-based position of the IoT applications. In ascending order, the
edge, fog, and cloud levels have increasing processing and storage capacities.
In short, the level of fog is a decentralized level imposed between the cloud
and the edge levels, to reduce the overhead and latency of applications in the
cloud. Services will be sent to the cloud level when there are computations
and data requiring more computing power than that available or expedient in
the fog level. The fog level is made up of several geographically distributed
Fog nodes(FN) represented by high computational devices (such as routers,
bridges, gateways, switches, and local servers). These fog nodes are
connected from one side to the Io devices (such as mobile phones, sensors,
cameras, and wearable devices), and from the other side to the cloud servers.
All of them are linked via wireless connections (e.g. Bluetooth and Zigbee
ete.), wired connections (optical fiber, Ethernet, etc.), or both connection
types can be used in combination. The level of the cloud is “used to support
services such as Infrastructure as a Service (IaaS), Software as a Service
(SaaS) and Platform as a Service (PaaS)”
Three layer logical architecture of fog computing is given in Fig 1. The first
layer represents the end devices layer, middle layer represents the fog
devices, and the top most layer represents the cloud servers.
 
pote ST) CLOUD LAYER
Ln = ros Laven
/ i] P\N
< Hoan
END DEVICES
 
 
 
 
 
 
 
 
 
 
 
Figure 1: Fog ArchitectureGeneral architecture of fog computing is composed of three layers (as shown,
in Fig 1)
i) End Devices Layer - Layer | is composed of end devices which can be
mobile devices, IoT devices, computer systems, camera, etc. Data either
captured or generated from these end devices is forwarded to a nearby
fog server at Layer 2 for processing.
ii) Fog Layer - Layer 2 is composed of multiple fog nodes or devices or
servers. They are placed at the edge of a network, between layer 1 and
cloud servers. They can be implemented in devices like — switches,
routers, base stations, access points or can be specially configured fog
servers.
iii) Cloud Layer - Layer 3 is composed of Cloud data centers, They consist
of huge infrastructure - high performance servers, massive storage
devices, etc. They provide all cloud benefits like- high performance,
automatic backup, agility.
> Check Your Progress 1
1) What is Fog Computing?
        
 
2) Mention the differences between Cloud computing and Fog computing,
       
    
3) Explain the architecture of Fog Computing,
       
       
    
11.6 WORKING OF FOG COMPUTING
Introducing a fog layer between the centralized cloud and end devices
significantly enhances the system's overall performance. The collaboration
between fog computing and cloud computing unfolds as follows:
Fog Computing and
Edge Computing
229Application
Development,
 
Fog Comps
‘Case Studies
230
ing and
+ A substantial volume of data originates from end devices and IoT
gadgets such as mobile phones, cameras, and laptops. This data is then
directed to the nearest fog server (in layer 2) for processing.
+ Data sensitive to latency or requiring real-time responses receives
priority processing by the fog servers. Processed results or necessary
actions are then relayed back to the end devices. Additionally, fog
servers transmit condensed results to cloud servers in layer 3 for future
analysis, allowing only refined data to be sent to the cloud layer.
   
 
+ Im instances where fog servers encounter resource unavailability or lack
necessary information to fulfill requests, they can engage with
neighboring servers or, based on the offloading strategy, forward the
request to cloud servers at Layer 3. Moreover, data that is less time-
sensitive is generally routed to cloud servers for processing and storage.
Upon task completion, responses are delivered to users at layer 1 through
fog servers.
11.7 ADVANTAGES OF FOG COMPUTING
Fog computing emerged as a response to the evolving challenges posed by
the surge in connected devices and the limitations of traditional cloud-centrie
models. Its necessity stems from several key factors:
‘+ Low Lateney Requirements: Many applications, especially in IoT and
real-time analytics, demand instantaneous processing and response times.
Fog computing brings computational resources closer to the edge
devices, minimizing latency by reducing the distance data needs to travel
for processing.
 
+ Bandwidth Optimization: Transmitting enormous volumes of raw data
from edge devices to centralized cloud servers can strain network
bandwidth. Fog computing enables local processing and selective data
transmission, optimizing bandwidth usage and reducing network
congestion.
 
* Enhanced Privacy and Security: Certain sensitive data might require
immediate processing or secure handling without being transmitted to
distant cloud servers. Fog computing allows for local data processing,
improving privacy and security by keeping critical information closer to
its source.
 
* Scalability and Reliability: With the exponential growth of IoT devices,
fog computing offers a scalable infrastructure, It distributes computing
resources across the network, enhancing reliability by reducing
dependency on a single centralized location.
 
* Offline Operations: In scenarios where continuous connectivity isn’t
‘guaranteed, such as remote areas or unstable network environments, fog
computing enables devices to function autonomously by processing data
locally, ensuring continuity even without constant connectivity to the
cloud.* Regulatory Compliance: Certain regulations or compliance standards
may necessitate data processing or storage within specific geographical
boundaries. Fog computing allows for compliance by processing data
locally, adhering to regional regulations.
These needs collectively drive the adoption and development of fog
computing, offering a versatile and efficient solution to the challenges
imposed by the burgeoning IoT landscape and the demand for real-time,
 
 
11.8 APPLICATIONS OF FOG COMPUTING
Fog computing since its introduction, is gaining popularity due to its
applications in various industries. Some of the applications are
Smart Cities
‘Urban areas leveraging technology to enhance the quality of life and services
offered to residents are often termed as smart cities. Fog computing stands as,
a pivotal component in the construction of smart cities. Through the
utilization of smart devices, IoT technologies, and fog devices, various tasks
become achievable, These include the creation of smart homes and buildings
through efficient energy management, bolstering security measures, and
cultivating intelligent urban landscapes by establishing systems for smart
parking, infrastructure development, traffic management, and environmental
monitoring. Additionally, the integration of fog computing facilitates the
enhancement of services in sectors such as hospitals, highways, factories, and
other industrial domains (See Fig. 2).
 
 
     
     
       
 
     
   
    
  
lousane ian ey
*) aan ‘Series a foes
     
 
Figure 2: Smart Cities Scenario (Source: www. OpenFogConsortium.org)
Smart Car and Traffic Control System
Utilizing IoT devices in conjunction with widespread fog devices enables the
establishment of vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V21)
Fog Computing and
Edge Computing
231Application
Development,
 
Fog Comps
‘Case Studies
232
ing and
communication networks. Vehicles equipped with sensors can communicate
both internally and externally, connecting with their surroundings.
Furthermore, sensors and actuators can be affixed to infrastructure elements
along roadways, such as traffic lights, street signs, and gates. These sensors
collect data and transmit it to nearby or vehicle-attached fog devices.
Subsequent computation by fog devices allows for the execution of actions
by either the vehicle or infrastructure, employing various control mechanisms
(actuators). For instance, upon detecting vehicles traveling in the wrong
direction or pedestrians approaching, a traffic light might signal red to
prevent collisions, or other vehicles could be automatically prompted to apply
brakes for safety measures (See Fig. 3).
 
    
 
 
 
   
 
 
===" @)
 
 
   
 
   
e acres
 
 
 
Figure 3: Smart ear and Traffic control System (Source: www.OpenFogConsortium.org)
Smart Grids
The electrical grid functions as a network transmitting energy generated from
diverse sources to consumers. Employing fog computing enables the efficient
distribution of energy. IoT sensors have the capability to monitor energy
produced by various sources, including wind energy farms, thermal plants,
hydraulic plants, and more, Subsequently, this data is relayed to nearby fog
servers, facilitating the identification of the most optimal energy source and
the detection of potential issues, such as equipment malfunctions. Depending
on the identified problems, these systems can also suggest alternative energy
sources to maintain efficiency and uninterrupted energy supply (See Fig. 4).Fog Computing and
Edge Computing
 
 
 
 
 
Smart Healthcare Systems
Fog computing finds relevance in healthcare systems as well. Various sensors
can capture and transmit patients’ health reports to fog devices. These fog
devices, upon conducting analyses such as diagnosing cardiac diseases, are
capable of initiating required actions based on the insights gained.
 
 
Surveillance
Security and surveillance cameras are prevalent across numerous locations.
Transmitting extensive data collected by these cameras to cloud servers faces,
challenges due to bandwidth limitations. Consequently, the data gathered
from these cameras can be directed to nearby fog servers. These fog servers
can conduct video processing tasks to detect issues such as theft,
kidnappings, or even aid in identifying missing individuals or resolving
yes. Subsequently, necessary actions can be initiated through alert
generation or reporting to law enforcement agencies.
 
11.9 CHALLENGES IN FOG COMPUTING
Fog computing, despite its numerous advantages, encounters several
challenges:
+ Complexity: Fog devices can be diverse in architecture and located at
different locations. Fog devices further store and analyse their own data
hence add more complexity to the network.
+ Power Consumption: Fog devices require high power consumption for
proper functioning. Adding more fog devices increases energy
consumption, which results in an increase of cost.
+ Data Management: Data is distributed across multiple fog devices
hence data management and maintaining consistency is challenging.
+ Authentication: Establishing trust and authentication may raise issues.
+ Security Concerns: As data is processed closer to the edge, there are 033Application
Development,
Fog Computing and
‘Case Studies
  
234
heightened concerns regarding security vulnerabilities. Fog nodes and
devices may be more susceptible to breaches, raising issues about data
privacy and integrity.
     
+ Interoperability: The diversity in devices, protocols, and standards
poses a challenge for seamless communication and interoperability
between various fog devices and systems. Ensuring compatibility and
smooth operations across heterogeneous platforms remains a challenge.
+ Scalability: Managing the scalability of fog computing infrastructure is a
complex task. Accommodating the increasing number of devices, users,
and data streams while maintaining performance and responsiveness
demands sophisticated scalability mechanisms.
 
+ Resource Constraints: Fog devices typically have _ limited
computational power, storage, and energy resources compared to cloud
data centers. Optimizing resource usage and managing constraints
effectively without compromising performance is a significant challenge
+ Reliability and Resilience: Ensuring the reliability and resilience of fog
‘computing systems is crucial, especially in dynamic environments where
devices might intermittently connect or disconnect. Maintaining
continuous service availability becomes challenging in such scenarios.
 
+ Data Management and Analytics: Handling vast amounts of data
generated by ToT devices demands efficient data management and
analytics. Processing and analyzing this data at the edge require
sophisticated algorithms and strategies to extract meaningful insights,
 
+ Standardization and Governance: Lack of standardized protocols and
governance frameworks in fog computing can hinder its widespread
adoption. Establishing unified standards and governance _ models
becomes essential for seamless integration and operation.
 
Navigating these challenges is crucial for the successful adoption and
implementation of fog computing across various industries and applications.
Addressing these obstacles will enable the realization of its full potential in
enhancing efficiency, reducing latency, and enabling real-time processing,
© Check Your Progress 2
1) Explain advantages and challenges associated with fog computing.2) Whatare the various application areas of fog computing.
         
11.10 EDGE COMPUTING
Edge computing is a distributed computing paradigm that brings computation,
and data storage closer to the sources of data. This is expected to improve
response times and save bandwidth. It is a technology which offers data
processing on the same layer where data is generated by making use of edge
devices having computation capabilities. This allows data to be processed
faster than processing at fog devices at no or a very low cost. This also
increases utilization of edge devices.
   
Bdge or end devices found today are smarter with various advanced features
like artificial intelligence enabled in them. Edge computing takes advantage
of this intelligence to reduce load on network or cloud servers. Also edge
devices when used for computation offers hardware security along with low
power consumption. It can improve security by encrypting data closer to the
network core,
 
Edge computing is often seen as similar to fog computing but there are
several differences, Edge computing devices are limited in their resource
capabilities and therefore cannot replace existing Cloud or Fog computing
technology. But edge computing when added with these technologies can
offer numerous advantages and applications
Edge computing revolyes around storing and processing data in closer
proximity to users and the applications they utilize. Ultimately, this approach
diminishes latency and provides a safeguard against internet disruptions.
Architectures in edge computing hold the potential to drive advancements in:
+ Smart homes
+ Autonomous vehicles
+ Surgical roboties
* Advanced real-time gaming experiences
‘As an alternative architecture to cloud computing, edge computing caters to
applications requiring high-speed and continuous availability. The reliance of
applications solely on cloud-based data storage and processing creates
dependency on internet connectivity, making them susceptible to its inherent
vulnerabilities. Instances where internet connectivity slows down or becomes
unavailable result in a slowdown or failure of the entire application.
 
Edge computing circumvents these intemet dependencies by situating data as
close as possible to its origin and consumption points. This proximity
Fog Computing and
Edge Computing
235Application
Development,
 
Fog Comps
‘Case Studies
236
ing and
accelerates application performance and enhances their continuous
availability. Fig 5 shows the Cloud-Fog-Edge collaboration scenario,
11.11 EDGE COMPUTING ARCHITECTURE
Following are the fundamental components constituting an edge ecosystem:
+ Edge Devices: Specialized equipment designed for specific purposes,
equipped with limited computational capabilities
 
+ Edge Nodes: Devices, servers, or gateways responsible for executing
edge computing tasks.
+ Edge Servers: Computers situated in facilities near edge devices. These
systems manage application workloads and shared services, necessitating
higher computational power compared to edge devices.
+ Edge Gateways: Edge servers tasked with network operations such as
tunneling, firewall management, protocol translation, and wircless
connections. These gateways can also support application workloads,
* Cloud: A public or private cloud serving as a storage repository for
containerized workloads, encompassing applications and machine
leaming models. Additionally, the cloud hosts and operates applications
responsible for managing edge nodes.
Edge computing has three primary nodes: the device edge, local edge, and
the cloud as shown in Fig 5:
DEVICE EDGE LOCAL EDGE THE CLOUD
+ U@VERe
+ Basic anoyties > - Bininess onl
| on
 
= Dotawarehousing
 
Figure $: Edge Computing Architecture
Device edge refers to the physical site where edge devices operate on-site,
encompassing cameras, sensors, industrial machinery, and similar apparatus.
These devices possess the computational capability necessary to collect and
transmit data,Local edge denotes a system that supports applications and network
workloads, comprising two distinet layers:
+ An application layer responsible for executing applications that exceed
the processing capacity of edge devices due to their substantial footprint
This layer manages tasks such as intricate video analytics or complex
processing for Internet of Things (Io) applications.
+ A network layer responsible for managing physical or virtualized
network components like routers and switches.
‘The cloud or the nexus, hosts application and network workloads responsible
for handling processing tasks beyond the capability of other edge nodes.
Despite its name, this edge layer operates either within an on-site data center
or within the cloud infrastructure,
The Fig 6 below offers a comprehensive architectural depiction, highlighting
components pertinent to each individual edge node.
 
 
 
 
DEVICE EDGE LOCAL EDGE THE CLOUD
cron oun
Industry sohatons elite Rekbood
topes onappe 4 4
T Petes direc
Edge —_‘Mult-cloud > Bw
cee cence Becoes
ea Cy
classaevice Wt Soren networks
 
 
 
Figure 6: Edge Computing Architecture Showing all of its Components
‘As shown in Fig 6, industry solutions and applications may reside across
various nodes, with particular workloads better suited for either the device or
the local edge. Additionally, certain workloads have the flexibility to
transition dynamically between nodes based on specific conditions, either
through manual intervention or automated processes.
Virtualization stands as a critical component within an expansive edge
computing infrastructure. This technology simplifies the deployment and
operation of numerous applications on edge servers.
11.12 CLOUD-FOG-EDGE ARCHITECTURE
Edge computing facilitates data processing at the network's edge, offering
several benefits such as decreased latency, reduced data transmission to cloud
or fog, lowered bandwidth costs, and minimized energy consumption.
Fog Computing and
Edge Computing
237Application
Developme
Fog Computing and
‘Case Studies
 
238
Edge computing can work in collaboration with cloud computing only or ean
be either implemented with Cloud —Fog collaboration environment. As
shown in Fig 7, instead of sending all the data directly to the cloud or fog
layer from the edge devices, data is first processed at the edge layer.
Processing data at the edge layer gives near real time response due to
physical proximity of edge devices. As data generated at the edge layer is
huge, it cannot be handled entirely at the edge layer. Hence it is offloaded to
the Cloud or Fog layer. In Cloud-Fog-Edge collaboration scenario, data from
edge layer is first offloaded to fog servers over a localized network, which in
tum can offload it to cloud servers for updates or further processing needs. In
Cloud-Edge scenarios, data after processing on the edge layer, can be
offloaded to the cloud layer as resources available at the edge layer are
insufficient to handle large amounts of data, Here the edge layer can decide
what is relevant and what is not before sending to further layers, hence
reducing load on cloud and fog servers.
 
 
CLOUD SERVERS
AAA
a
 
CLOUD LAYER
     
    
  
Cloud offloading
FOG SERVERS FOG SERVERS
FOG LAYER
EDGE LAYER
 
 
 
Figure 7: Cloud ~ Fog - Edge Computing Architecture
11.13 CLOUD Vs FOG Vs EDGE
Cloud, fog and edge computing all are concepts of distributed computing. All
of them perform computation but at different proximity levels and with
different resource capacities. Adding Edge and fog layer to the cloud reduces,
the amount of storage needed at cloud. It allows data to be transferred at a
faster data rate because of transferring relevant data. Also the cloud would
store and process only relevant data resulting in cost reduction,
Edge computing devices are located at the closest proximity to users. Fog
computing devices are located at intermediate proximity. Cloud computing
devices are at distant and remote locations from users. Fog computing
generally makes use of a centralized system which interacts with gatewaysand computer systems on LAN. Edge computing makes use of embedded
systems directly interfacing with sensors and controllers. But this distinction
does not always exist. Some of the common differences between Cloud, Fog
and Edge computing are shown in Table 2.
 
Table
 
: Differences between Cloud, Fog and Edge Computing
 
 
Cloud Computing _| Fog Computing Edge Comput
 
 
Centralized approach | Distributed approach _| Distributed approach
Large amount of | Intermediate amount of | |
resources resources
High latency Medium latency Low latency
Low data rate Medium data rate High data rate
Globally distributed | Regionally distributed _| Locally distributed
 
 
 
Non-teal time response | Near real time response | Real time response
Can be accessed with
Can be accessed with | 5 thout {Cb accessed
internet — without internet
 
 
 
 
In the next section, let us study some applications of edge computing.
11.14 APPLICATIONS OF EDGE COMPUTING
Edge computing has applications similar to fog computing due to its close
proximity. Some of the applications are listed below:
 
+ Smart Manufacturing: Edge computing facilitates _ predictive
maintenance in manufacturing plants by analyzing real-time data from
machinery sensors. It enables proactive equipment maintenance,
minimizing downtime and improving overall operational efficiency.
+ Telemedicine and Healtheare: In healthcare, edge computing supports
remote patient monitoring and wearable medical devices. It enables real-
time analysis of patient data, facilitating prompt medical interventions
and personalized healthcare services.
   
+ Autonomous Vehicles: Edge computing processes data from sensors in
autonomous vehicles, enabling quick decision-making for nay
collision avoidance, and ensuring safety on the roads.
 
 
+ Retail and Inventory Management: In retail, edge computing assists in
inventory management by analyzing data from sensors and cameras in
stores. It enables real-time inventory tracking, minimizing stockouts and
optimizing supply chain operations.
+ Smart Cities: Edge computing powers smart city initiatives by enabling
real-time data processing for traffic management, waste management,
environmental monitoring, and public safety systems
Fog Computing and
Edge Computing
239Application
Development,
 
Fog Comps
‘Case Studies
240
ing and
+ Content Delivery and Streaming: Edge computing enhances content
delivery networks (CDNs) by caching and delivering content from edge
servers closer to users. It reduces latency for streaming services, ensuring
faster and smoother content delivery.
+ Energy Management: In the energy sector, edge computing supports
the optimization of energy grids and renewable energy sources. It
enables real-time monitoring and control of energy distribution,
improving efficiency and reliability.
+ Edge AI and Surveillance: Edge computing facilitates Al-powered
video analytics for surveillance cameras. It allows real-time object
detection, facial recognition, and threat identification, enhancing security
systems’ efficiency.
+ Fleet Management: For logistics and transportation, edge computing
assists in fleet management by analyzing vehicle data in real time. It
helps optimize routes, monitor driver behavior, and ensure efficient
logistics operations.
 
+ Gaming and AR/VR: Edge computing reduces latency in cloud gaming
and augmented/virtual reality applications. It ensures smoother and more
responsive gaming experiences by processing data closer to the user.
+ Patient monitoring:Edge devices present on the hospital site can
process data generated from various monitoring devices like-
temperature sensors, glucose monitors ete, Notifications can be
generated to depict unusual trends and behaviours.
 
+ Monitoring Within Oil and Gas Industries: Edge computing can help
prevent oil and gas failures. These plants typically operate in remote
locations, so an edge center is a much better option than a distant server
or cloud. Devices can use real-time analytics to monitor the system and
shut down machines before a disaster occurs.
These use cases illustrate how edge computing addresses specific needs
across industries, leveraging its ability to process data closer to the source,
reduce latency, and enable real-time decision-mal
 
 
© Check Your Progress 3
1) What
 
Edge Computing?
      
   
2) Mention the differences between Cloud, Fog and Edge Computing.2) State some applications of Edge Computing
           
11.15 SUMMARY
In this unit two emerging technologies — Fog computing and Edge computing,
are discussed. Cisco introduced Fog Computing as a technology which
extends computing to the edge of the network.
Fog computing systems are modem decentralized architectures that extend
cloud storage, networking, and computing capabilities to the edge of the
network to support IoT applications on a large scale. The location awareness
of the fog computing system, geographic distribution, and other features
provide new security challenges that should be taken into account,
Edge computing refers to a decentralized computing paradigm where data
processing and storage are performed closer to the data source rather than
relying solely on centralized cloud servers. In this model, data processing
‘occurs at or near the “edge” of the network, closer to where data is generated
or consumed, such as IoT devices, sensors, or user devices. Rather than
sending all data to a centralized cloud for processing, edge computing
distributes computational tasks to localized servers or devices situated closer
to where the data is created. This proximity reduces latency, enhances real-
time processing capabilities, and decreases the volume of data that needs to
be transmitted to remote servers. It allows for quicker decision-making,
especially for time-sensitive applications.Edge computing architectures
involve a network of edge devices, gateways, and servers that collectively
manage and process data. These edge devices can include sensors, routers,
IoT devices, and servers deployed in various locations, such as factories,
smart cities, vehicles, or retail stores.
   
   
  
11.16 SOLUTIONS / ANSWERS.
Cheek Your Progress 1
1. Cisco in 2014 introduced a term called ‘Fog Computing’ to a technology
which extends computing to the edge of the network. Fog computing is a
technology in which resources like - compute, data, storage and
applications are located in-between the end user layer (where data is
generated) and the cloud. Devices like gateways, routers, base stations
can be configured as fog devices. It can bring all the advantages offered
by cloud computing closer to the location where data is generated; hence
leading to reduced response time, reduced bandwidth requirements,
enhanced security and other benefits.
 
Fog Computing and
Edge Computing
241Application
Development,
Fog Computing and
‘Case Studies
 
242
2. Some of the differences between cloud computing and fog computing
are!
 
Cloud Computing
Fog Computing
 
Architecture in centralized
Architecture is distributed
 
Distant location from the end users
In the proximity of end users
 
Huge amount of resources
Limited amount of resources
 
Higher computation capabilities
Lower computation capabilities
 
More response time
Less response time
 
 
Less security
 
More security
 
3. Architecture of fog computing is composed of three layers =~
 
 
1, End Devices Layer — It is composed of end devices which can be
mobile devices, IoT devices, computer systems, camera, etc. Data
either captured or generated from these end devices is forwarded to a
nearby fog server at Layer 2 for processing,
2. Fog Layer—It is composed of multiple fog devices or servers. They
are placed at the edge of a network, between layer 1 and cloud
servers. They can be implemented in devices like — switches,
routers, base stations, access points or can be specially configured
fog servers,
 
3. Cloud Layer — It is composed of Cloud data centers. They consist of
huge infrastructure - high performance servers, massive storage
devices, ete. They provide all cloud benefits like- high performance,
automatic backup, agility.
 
Cheek Your Progress 2
Various advantages associated with fog computing are:
a) Low latency
b) Reduced bandwidth
©) Reduced cost
4) Mobility
Various challenges associated with fog are:
 
a) Complexity
b) Maintaining security
©) Authenticating
4) Additional power consumption
Various application areas of fog computing are —
a) Smart Cities
Fog computing can play a vital role in building smart cities. With the
help of smart devices, IoT devices and fog devices, it is possible to do
tasks like - creating smart homes and buildings by energy managementof buildings, maintaining security, etc.
b) Smart Car and Traffic Control System
By making use of IoT devices and ubiquitous fog devices, vehicle-to-
vehicle (V2V) and vehicle-to-infrastructure (V2) communication is
possible. Fog devices afier computation can direct the vehicle or
infrastructure to take action with the help of various controls (actuators).
   
c) Surveillance
Security and Surveillance cameras are deployed in many areas. Data
collected from these can be forwarded to nearby fog servers. Fog servers
in tum can perform video processing to find out problems like theft,
kidnapping, murders, ete.
Check your progress 3
 
1, Edge computing is a technology which offers data processing on the
same layer where data is generated by making use of edge devices
having computation capabilities. This allows data to be processed even
faster than processing at fog devices at no or a very low cost. This also
increases utilization of edge devices.
 
2. Various differences between cloud, fog and edge computing are :
 
Cloud Computing | Fog Computing Edge Computing
lize
Comiplized Distributed approach _| Distributed approach
approach
Large amount of | Intermediate amount of
Limited resources
 
      
 
 
 
 
 
resources resources
High latency Medium latene; Low latency
Low data edium data rate High data rate
Globally :
Regionally distributed | Locally distribute<
distributed ew y di |
Non-eal time | Near realtime
Real time response
response response
Can be act with
Can be accessed | Can be accessed
intemet or without
with internet . without internet
internet
 
 
 
3. Some applications of edge computing are:
a) Gaming
Gamings which require live streaming feed of the game depends upon
latency. In this, edge servers are placed closed to the gamers to reduce
latency.
b) Content Delivery
It allows caching of data like- web pages, videos near users in order to
improve performance by delivering content fastly.
Fog Computing and
Edge Computing
243Application
    
‘Case Studies
244
 
) Smart Homes
IoT devices can collect data from around the house and process it.
Response generated is secure and in real time as round-trip time is
reduced. For example, response generated by Amazon’s Alexa.
11.17 FURTHER READINGS
1, Fog Computing-Theory and Practice, Assad Abbas, Samee U, Khan,
Albert Y. Zomaya, Wiley, 2020.
2. Fog and Edge Computing: Principles and Paradigms, Rajkumar Buyya,
Satish Narayana Srirama, John Wiley & Sons, 2019
3. Multidisciplinary Applications of Fog Computing : Responsiveness in
Real-Time, Debi Prasanna Acharjya, Kauser Ahmed P, IGI Global,
2023.
4, Fog Computing - Concepts, Frameworks, and Applications (eBook),
 
Ravi Tomar, Avita Katal, Sus!
Choudhary,CRC Press, 2022.
5, Edge Computing — Fundamentals, Advances and Applications, K. Anitha
Kumari, G. Sudha Sadasivam, D. Dharani, CRC Press, 2022
6. Edge Computing, Ajit Singh, SPD, 2019.
1a Dahiya, Niharika Singh, Tanupriya