Fog computing refers to a decentralized computing structure, where resources, including the data and applications, get placed in logical locations between the data source and the cloud; it also is known by the terms ‘fogging’ and ‘fog networking.’
The goal of this is to bring basic analytic services to the network edge, improving performance by positioning computing resources closer to where they are needed, thereby reducing the distance that data needs to be transported on the network, improving overall network efficiency and performance. Fog computing can also be deployed for security reasons, as it has the ability to segment bandwidth traffic and introduce additional firewalls to a network for higher security.
Equipment & Machinery
Discrete Manufacturing Logistics & Warehousing
- CASE STUDIES
Altizon Systems: IoT Data Analytics Case Study - Packaging Films ManufacturerThe company manufactures packaging films on made to order or configure to order basis. Every order has a different set of requirements from the product characteristics perspective and hence requires machine’s settings to be adjusted accordingly. If the film quality does not meet the required standards, the degraded quality impacts customer delivery causes customer dissatisfaction and results in lower margins. The biggest challenge was to identify the real root cause and devise a remedy for that.PubNub: PubNub Aids in McDonald's Malaysian CampaignMcDonald’s Save the Sundae Cone campaign had a McDonald’s Sundae Cone on the digital billboard, which was slowly melting in the heat of the city. To “save” the sundae cone, the audience needed to spin a giant fan that would ‘cool’ the sundae cone and ‘un-melt’ it. They did this by spinning a mini-fan, which was accessed through their mobile device’s web browser. At the end, participants were given a voucher on their smartphone to be redeemed at a McDonald’s across the street for a free sundae cone. The realtime network needed to be able to handle hundreds of users simultaneously, and with such a large audience, 100% uptime was vital for the campaign.Intel: Employing Intel Deep Learning SDK Toward Bettering Image Recognition ModelsIn this case study, the challenge explored involves LeNet*, one of the prominent image recognition topologies for handwritten digit recognition. In the case study, we dive into how the training tool can be used to visually set up, tune, and train the Mixed National Institute of Standards and Technology (MNIST) dataset on Caffe* optimized for Intel® architecture. Data scientists are the intended audience.
- MARKET SIZE
- BUSINESS VIEWPOINT
What value do Fog Computing to companies?
By adding the capability to process data closer to where it is created, fog computing seeks to create a network with lower latency, and with fewer data to upload, it increases the efficiency at which it can be processed.
There is also the benefit that data can still be processed with fog computing in a situation of no bandwidth availability. It provides an intermediary between these IoT devices and the cloud computing infrastructure that they connect to, as it is able to analyze and process data closer to where it is coming from, filtering what gets uploaded up to the cloud.
What are the benefits of Fog Computing in real-time applications?
It is broadly used in IoT applications which involves real-time data. It acts as an extended version of cloud computing. It is an intermediate between the cloud and end users (closer to end users). It can be used in both the ways, that can be between machine and machine or between the human to machine.
- Mobile Big Data Analytics
- Water Pressure at Dams
- Smart Utility Service
- Health Data
- STAKEHOLDER VIEWPOINT
- TECHNOLOGY VIEWPOINT
- DATA VIEWPOINT
- DEPLOYMENT CHALLENGES
What are the major challenges in Fog Computing?
Security challenges are predominant in fog computing.
Fog computing considers the architecture of SOA. The network layer is established between the service layer and the application layer. Hence, Fog computing is designed ahead of traditional networking components, which are highly vulnerable security attacks.