Evolution of Cloud to Fog Computing

The way to store and access personal as well as business information has taken a massive revolution. Carrying the data on a physical device is now an outdated fashion and with the rapid growth of the network, users can virtually connect with any data that they have access for, anywhere in the world.

Lets get into the real need first. Let us tell you what exactly we are discussing here.
In a new Boeing 787S, almost every part of the aircraft is well connected to the Internet. As per Virgin Atlantic, a single flight itself generates half a terabyte of data. Thus we need the information on an array of mobile devices but the problem is the bandwidth. The modern 3G and 4G cellular network aren’t nimble enough to transmit data to the cloud at the pace it is generated? Yes, they basically stand no where when you are transmitting half a terabyte data in about a few seconds.

Moreover, these huge data needs to be secured as well with high level security.

Thus, cloud computing gets behind the scene and fog computing came into picture.

Fog computing was introduced with three primary goals-

  • To improve efficiency and trim the amount of data that requires to be transmitted for processing, analysis and storage.
  • Place the data close to the end user.
  • Provide security and compliance to the data transmission over cloud.

Fog Networking consists of a control plane and a data plane, where most of the processing takes place in the data plane of a smart mobile and/or on the edge of the network in a gateway device.

In fog computing, much of the processing takes place in a local device. This type of computing creates a virtual platform that provides networking, compute and storage services and functions in the middle of cloud data centers and end devices.  These services are central to both fog and cloud computing.

Fog computing can be treated as a broadly decentralized “cloud”, that functions close to the level where data is generated and most often used. This enables data management, compute power, reliability and recovery limited only to those end users who meet its requirement.