Welcome!

Java IoT Authors: Elizabeth White, Zakia Bouachraoui, Liz McMillan, Yeshim Deniz, Pat Romanski

Related Topics: @ThingsExpo, Java IoT, Agile Computing, @CloudExpo, @DXWorldExpo

@ThingsExpo: Article

IoT and Fog Computing Architecture | @ThingsExpo #IoT #DigitalTransformation

Fog computing represents an evolution from a centralized toward a decentralized cloud system

Cloud computing changed data analytics for good. It enabled companies to drastically decrease resources and architecture previously assigned with business intelligence departments. It also enabled laymen to run advanced business analytics. Cloud was also the architecture of choice for storing and processing big data.

Data piling is a continuous process, which is going to explode with emerging Internet of Things concept. Answer to this issue developers found in new concept called fog computing. As opposed to clouds, fog computing architecture is capable of conducting all required computations and analytics directly at the data source. This way, single network administrator is able to control the work of thousands (or even millions) of different data generating devices, by real time and predictive analytics, without overloading the network with huge piles of data going back and forth.

This process goes on as far as devices are working in a regular way. The moment when some problem occurs, and some device requires repair or maintenance, administrator receives a notice. With this approach that also includes advanced BI software that continuously conducts analysis of device's work, administrators are able to overlook huge number of devices, using little network capacity and bandwidth.

Benefits of fog computing
Fog computing concept comes with long list of benefits. Some of them are:

  • It frees up network capacity - As we said earlier, fog computing uses much less bandwidth, which means it doesn't cause bottlenecks and other similar occupancies. Less data movement on the network frees up network capacity, which then can be used for other things.
  • It is truly real-time - Fog computing has much higher expedience than any other cloud computing architecture we know today. Since all data analysis are being done at the spot it represents a true real time concept, which means it is a perfect match for the needs of Internet of Things concept.
  • It boosts data security - Collected data is more secure when it doesn't travel. This way, cyber criminals can't intercept it and use it for fraudulent purposes. The whole concept also makes data storing much simpler, because it stays in its country of origin. Sending data abroad might violate certain laws.

Disadvantages of fog computing
Like any new concept fog computing also comes with few disadvantages, although it is hard to say whether these disadvantages can even be compared with those that we experienced in previous computing architectures. Some developers state these three main disadvantages of systems that work on fog computing paradigm:

  • Analytics is done locally- You probably noticed that we mentioned this as a benefit in previous paragraph and a trick that enables fog computing systems to use much less bandwidth. Well, some developers argue that cloud computing concept should enable people to access data from everywhere around the world. Of course fog computing concept enables developers to access most important IoT data from other locations, but it still keeps piles of less important information in local storages;
  • Some companies don't like their data being out of their premises- basically this is the same with all cloud environments. Some people still don't believe outside servers, and since with fog computing lots of data is stored on the devices themselves (which are often located outside of company offices), this is perceived as a risk by part of developers' community.
  • Whole system sounds a little bit confusing- Concept that includes huge number of devices that store, analyze and send their own data, located all around the world sounds utterly confusing.

More complex hardware and software
Fog computing is a very complicated architecture, and the fact that every device does its own data analytics requires combination of both hardware and software components. Some of the required hardware includes: Wi-Fi routers, computer chips, various switches and IP cameras. Some of the companies that already developed their own systems in this field are: Cisco, IBM, Intel, EMC and several others.

If we think about it fog computing represents an evolution from centralized toward a decentralized cloud system. Mobile communications and the dynamic life people are living requires provisioning resources locally. Progress of Internet of Things idea largely contributed to fog computing development and in the future all world networks will be forced to apply this system, due to increasing growth of big data.

More Stories By Nate Vickery

Nate M. Vickery is a business consultant from Sydney, Australia. He has a degree in marketing and almost a decade of experience in company management through latest technology trends. Nate is also the editor-in-chief at bizzmarkblog.com.

IoT & Smart Cities Stories
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and sh...
What are the new priorities for the connected business? First: businesses need to think differently about the types of connections they will need to make – these span well beyond the traditional app to app into more modern forms of integration including SaaS integrations, mobile integrations, APIs, device integration and Big Data integration. It’s important these are unified together vs. doing them all piecemeal. Second, these types of connections need to be simple to design, adapt and configure...
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
Contextual Analytics of various threat data provides a deeper understanding of a given threat and enables identification of unknown threat vectors. In his session at @ThingsExpo, David Dufour, Head of Security Architecture, IoT, Webroot, Inc., discussed how through the use of Big Data analytics and deep data correlation across different threat types, it is possible to gain a better understanding of where, how and to what level of danger a malicious actor poses to an organization, and to determin...
Nicolas Fierro is CEO of MIMIR Blockchain Solutions. He is a programmer, technologist, and operations dev who has worked with Ethereum and blockchain since 2014. His knowledge in blockchain dates to when he performed dev ops services to the Ethereum Foundation as one the privileged few developers to work with the original core team in Switzerland.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Cloud-enabled transformation has evolved from cost saving measure to business innovation strategy -- one that combines the cloud with cognitive capabilities to drive market disruption. Learn how you can achieve the insight and agility you need to gain a competitive advantage. Industry-acclaimed CTO and cloud expert, Shankar Kalyana presents. Only the most exceptional IBMers are appointed with the rare distinction of IBM Fellow, the highest technical honor in the company. Shankar has also receive...
DXWorldEXPO LLC announced today that Telecom Reseller has been named "Media Sponsor" of CloudEXPO | DXWorldEXPO 2018 New York, which will take place on November 11-13, 2018 in New York City, NY. Telecom Reseller reports on Unified Communications, UCaaS, BPaaS for enterprise and SMBs. They report extensively on both customer premises based solutions such as IP-PBX as well as cloud based and hosted platforms.
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, will provide an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life ...