FC
FC
FC
Kartei Details
Karten | 72 |
---|---|
Sprache | English |
Kategorie | Informatik |
Stufe | Universität |
Erstellt / Aktualisiert | 28.11.2020 / 17.07.2021 |
Lizenzierung | Keine Angabe |
Weblink |
https://card2brain.ch/box/20201128_dbt
|
Einbinden |
<iframe src="https://card2brain.ch/box/20201128_dbt/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>
|
Cloud Computing Characteristics (NIST)
On-Demand Self-Service
Broad Network Access
Resource Pooling
Rapid Elasticity
Measured Service
Why is cloud computing not enough?
Requires continuous connectivity
Too high latency
Bandwidth limitations
Regulations / privacy requirements
What is the edge?
Outskirt of an administrative domain
What is Fog Computing?
What does it provide?
Extension of the cloud model
applications can reside on multiple layers of a networks' topology
Combining cloud resources with edge devices and potential intermediary nodes in the network
Provides the ability to analyze data near the edge for
improving efficiency or
to operate while disconnected from a larger network
Cloud service can be used for tasks that require mode resources or elasticity
Fog Computing Characteristics
Runs required computations near the end-user
Uses lower latency storage at or near the edge
Uses low latency communication
Implements elements of management
Uses Cloud for strategic tasks
Multi-tenancy on a massive scale is required for some use cases
Geo Distributed
Physical location is significant
A dynamic pool of sites => unreliable connections between sites
Sites may be resource-constrained
In which areas does Fog Computing benefit?
Data Collection, Analytics & Privacy
Security
Moving security closed to the edge => higher performance security applications
Compliance Requirements
Geofencing, data sovereignty, copyright enforcement
Real-Time
Challenges to Adoption of Fog Computing (inherent)
General
They result from the very idea of using fog resources
Technical constraints
limits of computational power
Logical constraints
tradeoffs in distributed systems
Market constraints
there are currently no managed edge services
No Edge Services
Lack of Standardized Hardware
Management Effort
Managing QoS
IoT or autonomous cars have stronger quality requirements
More problems (network latency/partitioning, message loss/reordering) in non-centralized systems
No Network Transparency
Challenges to Adoption of Fog Computing (external)
General
The result from external entities
Government agencies
Attackers
Physical Security
E.g attaching hardware on top of street light pole instead of eye level
Protection against fire and vandalism
Legal and Regulatory Requirements
Data needs to be held in a certain physical location (eHealth)
Liquid Fog-based applications might have trouble fulfilling certain aspects of privacy regulations