More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Fog Computing Architecture
Fog Computing Architecture: Everything You Need to Know

Extending cloud services to edge devices is fog computing.

The scope of fog computing starts from the outer edges where the data is collected to where it will be stored eventually.

Fog nodes play a vital role in the overall working of fog computing as they collect the data from multiple sources for further processing.

Fog nodes are distributed as well as deployed across the network. Data is analyzed with the help of these nodes.

These nodes act as decentralized local access, thus reducing the dependency on the cloud platform for analyzing the collected data.

The working process of fog computing can be further explained as under:

  • The automation controller reads the signals sent from IoT devices.
  • The control system uses protocol gateways for transmitting the collected data.
  • This data is converted into formats that could be easily understood by HTTP or MQTT.
  • This data is collected by fog nodes that analyze the data and convert the data into sets before forwarding them to clouds.

6 Layers of Fog Computing Architecture

Physical and Virtualization Layer

There are two types of nodes present in these layers; these are physical and virtual nodes.

Nodes are initially responsible for the collection of data at multiple locations.

Nodes are equipped with sensor technology, which helps them in collecting the data from their surroundings.

The data thus collected is sent for processing with the help of gateways.

Monitoring Layer

This layer is usually involved with the tasks of monitoring various nodes.

It involves monitoring the time of work a node is taking, the temperature, and the battery life of the device.

Pre-processing Layer

This layer is involved in the analysis part.

The main job of this layer is to bring out meaningful data from the information collected from multiple sources.

Data that is collected by nodes is thoroughly checked for errors and impurities.

This layer makes sure that the data is thoroughly checked before being used for other purposes.

Temporary Storage

Mainly used for storing the data before it is being forwarded to the cloud.

Data is stored with the help of virtual storage.

Security Layer

As the name of the layer suggests, this layer is entirely for the security of the data.

This layer takes care of the privacy of the data, which includes encryption and decryption of data.

Transport Layer

The primary function of this layer is to upload the data to the cloud for permanent storage.

The data is not uploaded completely, preferably only a portion of it is uploaded for efficiency purposes.

To ensure that the process is efficiently completed, the use of lightweight communication protocols is used.

Also Read: Cloud Computing vs. Virtualization: Difference Explained

Essential Characteristics of Fog computing

Low Latency

Because of the connectivity of the fog nodes with efficient and smart end devices, the analysis and generation of data by these devices are quicker.

This results in lower latency of data.

Heterogeneity

Fog computing is quite a heterogeneous infrastructure as it can collect data from multiple sources.

Being a virtualized platform providing end-user storage and other services like networking, it acts as a bridge between end devices and traditional cloud computing centers.

Mobility

Many fog computing applications have to communicate with mobile devices.

This makes them conducive to mobility techniques like LISP (Locator/ID Separation Protocol).

The main task of LISP is to decouple the location and identity.

Scalability and Agility of Fog-Node Clusters

Being adaptive in nature at the cluster level, it is able to support the majority of functions like elastic compute, data -load changes, and network variations.

The dominance of Wireless Access

Although fog computing is widely used in wired environments.

But the wireless sensors spread on vast areas associated with IoT devices demand different requirements related to analytics.

For this also, fog computing is suitable for wireless IoT access networks.

Working Architecture of Fog Computing

Working Architecture of Fog Computing

 

Also Read: Fog Computing vs. Cloud Computing: What’s the Difference?


Related Blogs

Subscribe

Subscribe to our newsletter nd receive notifications for Free!

    Sign up to stay tuned and to be notified about new releases and blogs directly in your inbox. We hate spam too, unsubscribe at any time! Click here for Privacy Policy.

    WisdomPlexus publishes market-specific content on behalf of our clients, with our capabilities and extensive experience in the industry we assure them with high quality and economical business solutions designed, produced, and developed specifically for their needs.

    Follow Us On


    Copyright © 2024 Wisdomplexus . All rights reserved.

    Scroll to Top