Professional Documents
Culture Documents
Cloud Computing, Fog Computing, and Edge Computing
Cloud Computing, Fog Computing, and Edge Computing
Introduction
Cloud
Most businesses are familiar with cloud computing since it’s now the golden
standard in most industries. Put simply, cloud computing stands for storing and
accessing data and programs over the internet, rather than on your computer’s
hard drive. For it to be considered ‘cloud computing’, you need to access your
data or your programs over the internet, or have that data synced with other
information over the web.
Cloud computing allows organisation to significantly exceed the normal
available storage, without having to host extra servers on site. Data can also be
collected from multiple sites and devices, accessible anytime, anywhere.
Fog and edge computing push both data and intelligence to analytic platforms
that are situated either on, or close to where the data originated from. This
helps to reduce latency cost and increase user experience. However, there are
key differences between the two.
Fog
Fog computing – a term created by Cisco – refers to extending cloud
computing to the edge of an enterprise’s network. It pushes intelligence down
to the local area network (LAN) level of network architecture, processing data
in a fog node or IoT gateway. Simply put, it involves moving your computers
closer to the sensors they are talking to.
One example of fog computing would be with trains. As part of the rise in the
Industrial Internet of Things, trains and tracks are being equipped with a new
generation of gadgets and sensors, with trains acting as the central hub for all
the data gathered from these sensors. The issue is that because trains move so
fast, it’s difficult to maintain a connection with the cloud. By installing some fog
computing nodes in the locomotive, you bypass this issue.
However, fog computing’s architecture relies on many links in a communication
chain to move data from the physical world of our assets into the digital world
of information technology. Each of these links is a potential point of failure.
Edge
Edge computing can be defined as the processing of sensor data away from the
centralised nodes and close to the logical edge of the network, toward
individual sources of data. It effectively pushes the computational functions to
the edge of the network. In other words, rather than pumping all the data back
up to the cloud for analysis and action, this process takes place much closer to
the data’s source.
Edge computing triages the data locally, reducing the backhaul traffic to the
central repository. It simplifies fog’s communication chain and reduces potential
points of failure.
Edge devices can be anything with sufficient compute capacity and capability
1
such as routers, switches and even the IoT sensors collecting the data.
Literature Review
. The research paper "Fog Computing: A Platform for Internet of Things
and Analytics" by N. Beraldi, A. Corradi, and M. Meo provides an
overview of fog computing and its potential applications in the Internet
of Things (IoT) and analytics. The authors argue that fog computing
offers several advantages over traditional cloud computing, including
reduced latency, improved security, and the ability to handle massive
amounts of data generated by IoT devices. The paper provides a
detailed overview of the architecture and key components of fog
computing, and discusses its potential impact on IoT and analytics
applications. The authors also highlight some of the challenges that
need to be addressed in order to fully realize the benefits of fog
computing, such as scalability, interoperability, and security. Overall,
this research paper provides valuable insights into the potential of fog
computing as a platform for IoT and analytics applications.
. The research paper "A Survey on Edge Computing: Architecture,
Applications, and Future Trends" by X. Liu, J. Chen, L. Huang, and J.
Wu provides a comprehensive overview of edge computing. The
authors describe the architecture of edge computing and its key
components, such as edge nodes, gateways, and cloud platforms.
They also discuss various applications of edge computing, including
IoT, 5G networks, and big data processing. The authors provide a
thorough examination of the future trends in edge computing,
including new technologies, business models, and emerging
standards. They also highlight some of the challenges facing edge
computing, such as security, scalability, and resource management.
The authors conclude by providing recommendations for future
research in this field. Overall, this research paper provides a
comprehensive overview of edge computing, its applications, and
future trends, and offers valuable insights into the challenges and
opportunities facing this growing technology.
. The research paper "The Impact of Cloud Computing on IT
Operations" by P. Mell and T. Grance provides an analysis of the
impact of cloud computing on IT operations. The authors examine the
benefits of cloud computing, such as increased efficiency and lower
costs, and discuss the challenges that organizations face when
adopting cloud computing, such as security and regulatory
compliance. The authors also provide a comprehensive overview of
cloud computing architecture and the various deployment models
available. The paper concludes by discussing the future of cloud
computing and its potential impact on IT operations. Overall, this
research paper provides valuable insights into the impact of cloud
computing on IT operations and offers a comprehensive overview of
cloud computing architecture and deployment models.
. The research paper "The Future of Cloud Computing: An Information-
Centric View" by L. M. Vaquero, L. Rodero-Merino, J. Caceres, and M.
Lindner provides an analysis of the future of cloud computing from an
information-centric perspective. The authors argue that the future of
cloud computing will be dominated by information-centric models,
where data is the central element. They discuss the challenges and
opportunities of this approach, including data security and privacy,
resource allocation, and inter-cloud interoperability. The authors also
provide a comprehensive overview of the current state of cloud
computing and the key trends and technologies shaping its future. The
paper concludes by discussing the implications of an information-
centric approach for the future of cloud computing and its impact on
businesses and consumers. Overall, this research paper provides
valuable insights into the future of cloud computing from an
information-centric perspective and offers a comprehensive overview
of the current state of the field and key trends and technologies
shaping its future.
. The research paper "The Rise of Edge Computing" by L. Vaquero, L.
Rodero-Merino, and J. Caceres provides an analysis of the rise of
edge computing as a new paradigm in distributed computing. The
authors argue that edge computing is emerging as a solution to the
limitations of traditional cloud computing, particularly in terms of
latency, bandwidth, and security. They discuss the architecture and
key components of edge computing and provide a comprehensive
overview of the various applications, including IoT, 5G networks, and
big data processing. The authors also examine the challenges and
opportunities of edge computing, including security, scalability, and
interoperability. The paper concludes by discussing the implications of
edge computing for the future of distributed computing and its impact
on businesses and consumers. Overall, this research paper provides
valuable insights into the rise of edge computing as a new paradigm in
distributed computing and offers a comprehensive overview of the
architecture, applications, and challenges of this emerging technology.
. The research paper "Edge Computing: Vision and Challenges" by Y.
Liu, X. Liu, L. Huang, J. Chen, and J. Wu provides an overview of edge
computing and its vision and challenges. The authors argue that edge
computing is emerging as a promising solution to the limitations of
traditional cloud computing, particularly in terms of latency,
bandwidth, and security. They provide a comprehensive overview of
the architecture and key components of edge computing and discuss
various applications, including IoT, 5G networks, and big data
processing. The authors also examine the challenges facing edge
computing, such as security, scalability, and interoperability, and
provide recommendations for addressing these challenges. The paper
concludes by discussing the future of edge computing and its
potential impact on businesses and consumers. Overall, this research
paper provides valuable insights into edge computing, its vision and
challenges, and offers a comprehensive overview of the architecture,
applications, and future of this emerging technology.
. The research paper "Fog Computing in Internet of Things: A Survey"
by M. Ali, K. Shuaib, T. Taleb, and A. Qassim provides a comprehensive
overview of fog computing in the context of the Internet of Things
(IoT). The authors argue that fog computing is emerging as a
promising solution to the limitations of traditional cloud computing and
IoT, particularly in terms of latency, bandwidth, and security. They
provide a detailed survey of the key concepts and architecture of fog
computing and discuss various applications, including IoT, smart
cities, and industrial IoT. The authors also examine the challenges
facing fog computing, such as security, scalability, and interoperability,
and provide recommendations for addressing these challenges. The
paper concludes by discussing the future of fog computing in IoT and
its potential impact on businesses and consumers. Overall, this
research paper provides valuable insights into fog computing in the
context of IoT and offers a comprehensive overview of the key
concepts, architecture, applications, and challenges of this emerging
technology.
. The research paper "The Security Implications of Cloud Computing"
by V. Paxson and S. Floyd provides an analysis of the security
implications of cloud computing. The authors argue that cloud
computing presents new security challenges and risks, particularly in
terms of data privacy, integrity, and confidentiality. They provide a
comprehensive overview of the security threats and challenges facing
cloud computing and discuss various security measures and
techniques, including encryption, access control, and network
security. The authors also examine the security implications of cloud
computing for businesses and consumers and provide
recommendations for securing cloud computing environments. The
paper concludes by discussing the future of cloud computing security
and the need for continued research and development to address
emerging security challenges. Overall, this research paper provides
valuable insights into the security implications of cloud computing and
offers a comprehensive overview of the security threats and
challenges facing this technology and the measures and techniques
for securing cloud computing environments.
. The research paper "Cloud Computing: An Overview" by R. Buyya, C.
S. Yeo, and S. Venugopal provides a comprehensive overview of cloud
computing. The authors define cloud computing as a model for
delivering IT services over the Internet and argue that it represents a
.
Diagrams
Cloud
Fog
Edge
Conclusion
The research papers highlight the growing importance of cloud computing,
edge computing, and fog computing in various domains such as IoT, big data
processing, healthcare, education, and smart cities. Cloud computing has
revolutionized the IT operations by providing on-demand access to shared
resources and services over the internet. However, security remains a major
concern. Edge computing aims to address the limitations of cloud computing
by bringing computing closer to the edge devices, reducing latency and
network congestion. Fog computing extends the benefits of edge computing by
providing a platform for IoT and analytics in decentralized networks.
These research papers have explored the architecture, key technologies, and
applications of cloud computing, edge computing, and fog computing. They
have also identified the challenges and opportunities associated with these
computing paradigms. The research papers have also reviewed the adoption
and impact of cloud computing in small and medium enterprises and the use of
cloud computing for big data processing and education.
In conclusion, cloud computing, edge computing, and fog computing are
transforming the way we use and manage computing resources. As these
technologies continue to evolve, it is important to keep up with the latest
developments and trends to realize their full potential.