Fog Computing Is A New Concept Of Data Distribution

Fog Computing Is A New Concept Of Data Distribution

Fog Computing Is A New Concept Of Data Distribution

For the last couple of years there have hardly been any new concepts in cloud computing. But hardly doesn’t mean never. Since the summer of 2013 you might have noticed the appearance of a new trend that has been called Fog Computing. The main purpose of fog computing is to gather services, applications, large data volumes in one place and unite them with the networks of a new generation. The aim is to offer data, computing power, memory and services at a really distributed level.

fog-computing

The thing is that today’s data is extremely dispersed and delivered continuously, in large volumes and to a large number of users with different devices. In order to make an effective cloud model, businesses need to learn how to deliver the content to their users via geographically distributed platforms and not via the cloud which is placed in one place. Thus, the idea of fog computing is to distribute all data and place it closer to a user, remove network delays and other possible obstacles connected with data transfer. Users need all their data and apps at any time in any place – this is the essence of cloud services. And fog computing may take this service to the next level.

The concept of this abstract fog is based on the concept of a drop (here we see why the concept has such a name). A drop is a chip of a microcontroller with built-in memory and data transfer interface, which is combined with wireless connection Mesh chip. Such a drop works on a small battery which is enough for a couple of years. You can connect different temperature, light, voltage sensors, etc. This drop is a basic technology for fog computing. With the help of such mini-chips it is possible to create really distributed network of data or devices all around the planet.

So what are the possible advantages of using fog computing?

Firstly, with the help of fog computing you can place data closer to the final user, even geographically. Constant data circulation in the world makes providers to create new technologies for their local storage and caching. The drops allow keeping the data close to a user instead of storing them in a data-center somewhere far. It helps to escape possible delays in data transfer.

Fog computing also helps to provide quality service for mobile users. The administrator of your infrastructure gets access to such data as from where and how your users get information, and how fast the process is. It helps to improve the interaction with clients, and make this interaction safer. By controlling data in all node points, fog computing allows turning your data center into a distributed cloud platform for users.

Secondly, this concept is not something to be developed in the future. It is already here. A lot of companies already introduce fog computing, while other companies are ready for it. Actually, any company which delivers content can start using fog computing.

What is important is that fog computing is not a replacement for cloud computing. It’s an addition which develops the concept of cloud services. Thanks to the “drops” it will be possible to isolate data in the cloud systems and keep them close to users.

By Eugene Rudenko

Eugene is a marketing manager for Oxagile, software development company offering custom SaaS solutions development for all types of businesses. Follow them in Twitter @Oxagile.

(Image Source: Shutterstock)

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

2 Responses to Fog Computing Is A New Concept Of Data Distribution

  1. A very interesting post describing a potentially powerful tool in the constant struggle to cope with the volumes of data traversing networks. This is really a technology re-working of the trend about a decade ago, where data was cached in routers local to users. I guess the real power of this technology will be released if mobile device vendors incorporate these “Drop” chips in their architectures?

  2. That will be one of the easiest solutions, actually. But I’m not sure that it will be possible for biggest vendors to come to an agreement easily.

Controversial Chinese Cybersecurity Law Under Review Again

Controversial Chinese Cybersecurity Law Under Review Again

Cybersecurity Law BEIJING. The National People’s Congress, the equivalence of the Chinese Parliament, moved forward in drafting a second version of a controversial cybersecurity law first introduced almost a year ago. This means the law is thought to be closer to passing and will bring greater censorship for both foreign and domestic citizens and businesses.…

Personal Account of Google CEO Compromised

Personal Account of Google CEO Compromised

Personal Account Compromised The security of our information online, whether it’s our banking details, emails or personal information, is important. Hackers pose a very real threat to our privacy when there are vulnerabilities in the security of the services we use online. It can be worrying then when the CEO of perhaps the largest holder…

How You Can Improve Customer Experience With Fast Data Analytics

How You Can Improve Customer Experience With Fast Data Analytics

Fast Data Analytics In today’s constantly connected world, customers expect more than ever before from the companies they do business with. With the emergence of big data, businesses have been able to better meet and exceed customer expectations thanks to analytics and data science. However, the role of data in your business’ success doesn’t end…

Data Protection and Session Fixation Attacks

Data Protection and Session Fixation Attacks

Keeping the man out of the middle: preventing session fixation attacks In a nutshell, session fixation is a type of man in the middle attack where an attacker is able to pretend to be a victim using a session variable. For instance, let’s say you have an application that uses sessions to validate the user.…

E-Commerce Advances For Savvy Marketers

E-Commerce Advances For Savvy Marketers

Digital Marketing Platforms Advertising and marketing techniques have progressed rapidly in the last decade with both channel focus and the direction of content shifting considerably due primarily to advances in cloud technology. Gartner’s Magic Quadrant for Digital Commerce 2016 singles out a few ecommerce providers who are topping their sector in both ability to execute…

SaaS And The Cloud Are Still Going Strong

SaaS And The Cloud Are Still Going Strong

SaaS And The Cloud With the results of Cisco Global Could Index: 2013-2018 and Hosting and Cloud Study 2014, predictions for the future of cloud computing are notable. Forbes reported that spending on infrastructure-related services has increased as public cloud computing uptake spreads, and reflected on Gartner’s Public Cloud Services Forecast. The public cloud service…

Cloud Computing Is Greener Than You Think

Cloud Computing Is Greener Than You Think

Cloud Computing Is Greener Than You Think Last week we touched upon how a project in Finland had blended two of the world’s most important industries, cloud computing and green technology, to produce a data centre that used nearby sea water to both cool their servers and heat local homes.  Despite such positive environmental projects, there…

5 Considerations You Need To Review Before Investing In Data Analytics

5 Considerations You Need To Review Before Investing In Data Analytics

Review Before Investing In Data Analytics Big data, when handled properly, can lead to big change. Companies in a wide variety of industries are partnering with data analytics companies to increase operational efficiency and make evidence-based business decisions. From Kraft Foods using business intelligence (BI) to cut customer satisfaction analysis time in half, to a…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring One of the hottest topics in Information and Communication Technology (ICT) is the Internet of Things (IOT). According to the report of International Telecommunication Union (2012), “the Internet of things can be perceived as a vision with technological and societal implications. It is considered as a…

Cloud Computing Then & Now

Cloud Computing Then & Now

The Evolving Cloud  From as early as the onset of modern computing, the possibility of resource distribution has been explored. Today’s cloud computing environment goes well beyond what most could even have imagined at the birth of modern computing and innovation in the field isn’t slowing. A Brief History Matillion’s interactive timeline of cloud begins…