Fog Computing Architecture

Fog Computing Architecture: Everything You Need to Know

Extending cloud services to edge devices is fog computing. The scope of fog computing starts from the outer

Extending cloud services to edge devices is fog computing.

The scope of fog computing starts from the outer edges where the data is collected to where it will be stored eventually.

Fog nodes play a vital role in the overall working of fog computing as they collect the data from multiple sources for further processing.

Fog nodes are distributed as well as deployed across the network. Data is analyzed with the help of these nodes.

These nodes act as decentralized local access, thus reducing the dependency on the cloud platform for analyzing the collected data.

The working process of fog computing can be further explained as under:

  • The automation controller reads the signals sent from IoT devices.
  • The control system uses protocol gateways for transmitting the collected data.
  • This data is converted into formats that could be easily understood by HTTP or MQTT.
  • This data is collected by fog nodes that analyze the data and convert the data into sets before forwarding them to clouds.

6 Layers of Fog Computing Architecture

Physical and Virtualization Layer

There are two types of nodes present in these layers; these are physical and virtual nodes.

Nodes are initially responsible for the collection of data at multiple locations.

Nodes are equipped with sensor technology, which helps them in collecting the data from their surroundings.

The data thus collected is sent for processing with the help of gateways.

Monitoring Layer

This layer is usually involved with the tasks of monitoring various nodes.

It involves monitoring the time of work a node is taking, the temperature, and the battery life of the device.

Pre-processing Layer

This layer is involved in the analysis part.

The main job of this layer is to bring out meaningful data from the information collected from multiple sources.

Data that is collected by nodes is thoroughly checked for errors and impurities.

This layer makes sure that the data is thoroughly checked before being used for other purposes.

Temporary Storage

Mainly used for storing the data before it is being forwarded to the cloud.

Data is stored with the help of virtual storage.

Security Layer

As the name of the layer suggests, this layer is entirely for the security of the data.

This layer takes care of the privacy of the data, which includes encryption and decryption of data.

Transport Layer

The primary function of this layer is to upload the data to the cloud for permanent storage.

The data is not uploaded completely, preferably only a portion of it is uploaded for efficiency purposes.

To ensure that the process is efficiently completed, the use of lightweight communication protocols is used.

Also Read: Cloud Computing vs. Virtualization: Difference Explained

Essential Characteristics of Fog computing

Low Latency

Because of the connectivity of the fog nodes with efficient and smart end devices, the analysis and generation of data by these devices are quicker.

This results in lower latency of data.

Heterogeneity

Fog computing is quite a heterogeneous infrastructure as it can collect data from multiple sources.

Being a virtualized platform providing end-user storage and other services like networking, it acts as a bridge between end devices and traditional cloud computing centers.

Mobility

Many fog computing applications have to communicate with mobile devices.

This makes them conducive to mobility techniques like LISP (Locator/ID Separation Protocol).

The main task of LISP is to decouple the location and identity.

Scalability and Agility of Fog-Node Clusters

Being adaptive in nature at the cluster level, it is able to support the majority of functions like elastic compute, data -load changes, and network variations.

The dominance of Wireless Access

Although fog computing is widely used in wired environments.

But the wireless sensors spread on vast areas associated with IoT devices demand different requirements related to analytics.

For this also, fog computing is suitable for wireless IoT access networks.

Working Architecture of Fog Computing

Working Architecture of Fog Computing

 

Also Read: Fog Computing vs. Cloud Computing: What’s the Difference?

About Jason Hoffman

I am the Director of Sales and Marketing at Wisdomplexus, capturing market share with E-mail marketing, Blogs and Social media promotion. I spend major part of my day geeking out on all the latest technology trends like artificial intelligence, machine learning, deep learning, cloud computing, 5G and many more. You can read my opinion in regards to these technologies via blogs on our website.