_Module II_Fog Computing (1).pptx
_Module II_Fog Computing (1).pptx
Introduction to
Fog Computing
Module II
Module II –L1
LO1:OUTLINE THE FEATURES OF COMMUNICATION
MODEL
LO2:DESCRIBE THE ARCHITECTURE OF FOG
COMPUTING
Introduction
❖ Fog architecture involves services of end devices (switches, routers,
multiplexers, etc) for computational, storage and processing purposes.
2. Software, and
❖ Devices are distributed across a number of locations separated far apart from each
other.
❖ The layer mostly deals with data sensing and capturing. Devices from different
platforms and different architectures are mainly found in this layer.
❖ The devices have the property of working in a heterogeneous environment, with other
devices from separate technologies and separate modes of communication.
Hierarchical Fog Computing Architecture
Fog Layer
❖ Fog layer includes devices like routers, gateways, access points, base stations, specific fog servers,
etc., called as Fog nodes.
❖ Fog nodes are located at the edge of a network. An edge can be a hop distance from the end device.
❖ Fog nodes can be static, e.g., located in a bus terminal or coffee shop, or they can be moving, e.g.,
fitted inside in a moving vehicle.
❖ Fog nodes can compute, transfer and store the data temporarily.
❖ Fog nodes and cloud data center connections are enabled by the IP core networks, providing
interaction and cooperation with the cloud for enhancing processing and storage capabilities.
Hierarchical Fog Computing Architecture
Cloud Layer
❖ This layer consists of devices that can provide large storage and machines (servers) with
high performance.
❖ This layer performs computation analysis and stores data permanently, for back-up and
permanent access to the users.
❖ Enormous data centers with high computing abilities form a cloud layer.
❖ The cloud layer lies at the extreme end of the overall fog architecture. It acts as a back-up as
well as provides permanent storage for data in a fog architecture
Layered Fog Computing Architecture
Physical and Virtualization Layer
❖ This layer comprises nodes (Physical and virtual).
❖ The nodes perform the primary task of capturing data and are located at
different locations. Nodes usually involve sensing technology to capture their
surroundings.
❖ Sensors used at this node collect data from the surroundings and collect data
which is then sent to upper layers via gateways for further processing.
❖ A node can be a stand-alone device like a mobile phone or it can be a part of a
large device like a temperature sensor fitted inside a vehicle.
Monitoring Layer
❖ Nodes can be monitored for the amount of time they work, the temperature
and other physical properties they are possessing, the maximum battery life of
the device, etc.
❖ The performance of applications as well as their present state is also
monitored.
❖ The fog nodes are checked for their energy consumption, the amount of
battery power they consume while performing their tasks.
Pre Processing Layer
❖ This layer performs various data operations mainly related to analysis.
❖ Data is cleaned and checked for any unwanted data present. Data impurity is
removed and only useful data is collected.
❖ Data analysis at this layer can involve mining meaningful and relevant
information from a vast amount of data collected by the end devices.
❖ Data analysis is one of the essential features that should be taken into
consideration before data is used for a specific purpose.
Temporary Storage Layer
❖ This layer is involved with the privacy of data, the integrity of data, encryption,
and decryption of data.
❖ Privacy in the case of fog computing data can include use-based privacy,
data-based privacy, and location-based privacy.
❖ The security layer ensures secure and preservation of privacy for the data
which is outsourced to the fog nodes.
Security Layer
❖ This layer is involved with the privacy of data, the integrity of data, encryption,
and decryption of data.
❖ Privacy in the case of fog computing data can include use-based privacy,
data-based privacy, and location-based privacy.
❖ The security layer ensures secure and preservation of privacy for the data
which is outsourced to the fog nodes.
Mobile Fog Computing (MFC)
LoRa is the physical layer i.e. the chip and LoRaWAN is the MAC layer i.e. the software that’s put
on the chip to enable networking.
5G Standards
❖ 5G architecture is needed for several reasons, as it addresses the limitations
of previous generations of wireless technology (such as 4G, 3G, and 2G) and
provides significant benefits to both consumers and industries.
1. Higher Data Rates: Higher data rates compared to previous generations
(2Mbps/20Mbps/20 Gbps).
2. Lower Latency: Ultra-low latency, reducing the delay in data
transmission(Fog Computing / Network Slicing).
5G Standards
3. Massive Connectivity: Can handle a massive number of
connected devices, making it suitable for the Internet of
Things (IoT).
4. Network Slicing: Creation of virtual networks tailored to
specific use cases or services/ Same physical infrastructure
can be used to support a wide range of applications with
varying requirements, from high bandwidth to low latency.
5. Enhanced Mobile Broadband: superior mobile broadband
experience
5G Protocol Stack
5G Architecture
OWA Layer: OWA layer is the short form of Open Wireless Architecture
layer. It functions as physical layer and data link layer of OSI stack.
Network Layer: It is used to route data from source IP device to the
destination IP device/system. It is divided into lower and upper network
layers
Open Transport Layer: It combines functionality of both transport layer
and session layer.
Application Layer: It marks the data as per proper format required. It also
does encryption and decryption of the data. It selects the best wireless
connection for given service.
5G Architecture
5G Architecture
1) User Equipment (UE):
• This is the endpoint device.
• Smartphone, tablet, IoT device, or any device capable of connecting to a 5G
network.
• UEs are responsible for transmitting and receiving data to and from the
network.
1) Radio Access Network (RAN):
• It connects the UE to the core network.
• In 5G, the RAN is more distributed and utilizes various technologies
• Provide efficient and high-capacity connections.
5G Architecture
• RAN includes:
• New Radio (NR) - air interface technology
• Small Cells - use small cells to provide localized coverage and capacity
/ urban areas, stadiums, and other high-density environments to
enhance the user experience.
• Dynamic Spectrum Sharing (DSS): DSS enables the efficient use of
spectrum by allowing both 4G and 5G to coexist on the same frequency
bands, making the transition to 5G smoother.
5G Architecture
• Core Network (CN): The core network is the central part of the 5G
architecture. It is responsible for managing and routing traffic and supporting
various network functions, including:
1. Network Function Virtualization (NFV): 5G core networks use
virtualization technologies, allowing network functions to run on virtual
machines rather than dedicated hardware.
2. Software-Defined Networking (SDN): SDN enhances network
management by separating the control plane from the data plane, allowing
for dynamic and programmable network configurations.
5G Architecture
• Network Function Virtualization (NFV):
• NFV allows for the separation of communication services from
dedicated hardware, such as routers and firewalls.
• This separation means network operations can provide new services
dynamically and without installing new hardware.
• Deploying network components with network functions virtualization
takes hours instead of months like with traditional networking
5G Architecture
• Software-Defined Networking (SDN):
is responsible for providing network services and
applications to end-users.
3. List any three difference between Cloud, Fog and Edge Computing[4]