Translate

Monday, 18 April 2016

Fog Computing: Is it the future of cloud computing?


Fog computing: Is it the future of cloud computing?




Fog computing is the new buzz in the world of computer technology. The term fog computing was coined by CISCO. Fog computing also known as fogging or edge computing closely resembles cloud computing and aims to provide core data, compute, storage, and application services on a truly distributed level (i.e. at the edge of the network).


What is cloud computing?


Before we go into fog computing it is essential to know about the concept of cloud and cloud computing.

The word is cloud is a metaphor for the internet. The term cloud computing means internet based computing.  In this kind of computing a network of remote servers hosted on the internet are used for processing and storing data.


What is fog computing?


The name fog computing conveys the idea that the advantages of cloud computing can be brought closer to the source of the data i.e. the end users (Fog is a cloud at the ground level that surrounds us).


So what does it mean when we say the advantages of the cloud are brought closer to the user?


In cloud computing all the data and the operations on it are centered to the cloud. Whereas in fog computing, the devices on the edge of the network are responsible for locally storing and operating on the data. This removes the heavy dependency on the cloud.


Fog computing is in essence an extension of cloud computing and its services to the edge of the network.
Some application services are handled at the network edge in a smart device and some application services are handled in a remote data center i.e. in the cloud.


Why fog computing?


The current cloud architecture is heavily reliant on distributed processing and available bandwidth from the edge device to the back end server. Most of the processing occurs in the cloud rather than the end devices.

Cloud computing is efficient in dealing with the present data processing and storage needs. The problem occurs when the amount of data to be handled by the servers is very huge. In such a scenario, the current cloud structure falls apart as it relies heavily on distributed processing and available bandwidth from the edge device to the backend server. This leads to bandwidth bottleneck problem which reduces the efficiency of the system. Also it is impractical to force the cloud to store and process all the data.

Fog computing removes these disadvantages of cloud computing by ensuring that the processing of data is done at the edge of the network. It also suggests that end devices be allowed to communicate with each other without the cloud intermediate. This removes the bandwidth bottleneck problem.


The distinguishing characteristics of fog computing: 


         Proximity to the end users

         Dense geographical distribution

         Support for mobility

         Reduced latency


Applications of fog computing:


There are many applications of fogging. Some of them are listed below:

         Smart Grids

         Smart traffic lights and Connected cars

         Software Defined Networks (SDN)

         Wireless Sensor and Actuator Networks (WSAN)    
   

Advantages of fog computing:


Fogging reduces network congestion, latency and bandwidth bottle neck problem as data processing is done at the edge of the network. Fog computing provides a strong support for internet of things. It also reduces the time required to store and retrieve data. Ultimately providing a better user experience.


Disadvantages of fogging:


The major drawback of fogging is the privacy risk it poses. For example, in smart grids it is difficult to hide details such as what device was used at what time. Not only that, it also provides a security risk. For example gateways serving as fog devices may be compromised or replaced by fake ones.


Conclusion:


Fog computing performs better compared to cloud computing with respect to the new technologies. This does not mean that fog computing is a complete replacement for the cloud. The best way to put it would be that fog computing is an extension of the cloud to the edge of the network.



References:








Wednesday, 23 March 2016

Trending technologies in simple words



We live in a world where life without technology is next to impossible. Thus it’s very important to stay up to date with the new and upcoming technologies. Here we explain a few of the hottest and most sought after technologies. Hope you enjoy it….
Internet of things (IoT ) :                                                                          
 Internet of Things (IoT) is the network of physical objects—devices, vehicles, buildings and other items—embedded with electronics, software, sensors, and network connectivity that enables these objects to collect and exchange data.-Wikipedia

So why is IoT such a big deal??
Mainly because it has the potential to change our lives drastically. How??
Well imagine its 2025. You are just getting out of your bed (which of course has an inbuilt sensor which can tell if you’re up or not). Once you are out of the bed, the bed tells your coffee maker to make coffee , so you have a hot pot of coffee ready waiting for you.
Not convinced yet??
Here’s another example:
You pick up your phone and start moving towards your front door to leave for work. Your smart phone which has an in-built motion sensor tells your garage doors to open and your car to park itself outside your door.
It seems fantastic doesn’t it?
But it comes with risks of it own. Always being connected to the things around us would mean the possibility of more surveillance. It also means the possibility for more fraud, scams and other vicious hacking & cyber attacks.
Oh, and just think of what the advertisers will do with it!

Big data:
Big data is a term for data sets that are so large or complex that traditional data processing applications are inadequate. – Wikipedia
The three most important characteristics of big data are:
          Volume - Volume describes the amount of data generated by organizations or individuals.
          Velocity - Velocity describes the frequency at which data is generated, captured and shared.
         Variety - Data can be stored in multiple format. For example excel, csv, access or for the matter of the fact, it can be stored in a simple text file. Sometimes the data is not even in the traditional format as we assume, it may be in the form of video, SMS, pdf or something we might have not thought about it.  This variety of the data represents Big Data.
Why do we need big data?
The pot of information (both private and public) generated by humanity has recently come to a boil. We're generating more content than ever before, capturing and analyzing such huge amounts of data in the conventional way is not efficient, hence, big data.
From healthcare, to sports, to the way we elect a president, big data will make big changes to the way we live our lives. How?
You’ll be surprised to know that big data is already used by us in many applications.
          Mobile Maps: Our GPS is available because of big data. Thousands of reports and other maps are scanned in and used to make our GPS devices as accurate as possible. We can collect and analyze this data because of big data.
          Online Shopping: Ever notice how the ads on your browser are similar to something you just bought or just looked at buying? You can thank big data for that one. Big data is also responsible for any “Recently viewed items” or “Featured recommendations” you might find on websites.
Again as with IoT the major drawback is the security risk it poses.

Virtual Reality (VR):
Virtual reality or virtual realities (VR), also known as immersive multimedia or computer-simulated reality, is a computer technology that replicates an environment, real or imagined, and simulates a user's physical presence in that environment in a way that allows the user to interact with it. Virtual realities artificially create sensory experience, which can include sight, touch, hearing, and smell. – Wikipedia

In simpler terms virtual reality is fooling your brain into perceiving something as real when it’s not really there.
Ever wished for a court side seat at a game or wanted to visit some place but have been unable to?
VR will bring these things right to your doorstep.
It can give you the thrill of standing at the peak of the Himalayas or drop you right in the middle of the Amazon forest. 
Not only can VR teleport you from one place to another, it also allows you to experience gaming and movies from a new perspective where you would feel as if you’re right in the middle of the action.
These are some of the more entertaining applications of VR. But probably the most important applications of VR are in situations where it is too dangerous, expensive or impractical to do something in reality.
For example, commercial pilots can use realistic cockpits with VR technology for a holistic training that incorporate virtual flight and live instruction. Surgeons can train with virtual tools and patients, instead of working on live patients. Studies show that such training leads better trained people in a shorter time.
As the saying goes every coin has two sides. Though VR is very useful it also has a great potential for causing harm. VR causes a disconnection from the real world. Many people find themselves so immersed in social media and video games that they lose touch with reality. This leads to emotional, psychological and physical harm to the person.
Cloud Computing:
Cloud Computing is a technology in which a network of remote servers are used via internet to store, manage and process data, instead of using the local server or hard disk.
So what does this really mean to us as the user?
Usually the computer hardware and software you use are located on your system or in your company’s network. This is not the case in cloud computing. The hardware and software you’re using is provided as a service by another company and accessed over the Internet. Exactly where the hardware and software is located and how it all works doesn't matter to you, the user—it's just somewhere up in the nebulous "cloud" that the Internet represents.
Most of us use cloud computing all day long without realizing it. When you type a query into Google, the computer on your desk isn't playing much part in finding the answers you need. The words you type are sent over the internet to one of Google's hundreds of thousands of computers, which dig out your results and send them back to you.
Preparing documents over the net is another example of cloud computing. All of us know Google documents this is an example of cloud computing.
Another good example of a cloud is the drop box.
Some of the drawbacks of cloud computing are cost, security, dependency on service provider, access to the internet (which is not always possible).
Artificial Intelligence (AI):
Artificial intelligence is the intelligence exhibited by machines or software. It is the field of computer science in which we study how to create computers and computer software that are capable of intelligent behavior. - Wikipedia

Artificial intelligence is about making computers capable of thinking like humans, to enable computers to make decisions based on the occurrence of previous events.
Did you know that many news articles that we read today are not really written by people but through the use of artificial intelligence and in most cases it is impossible to tell the difference between them.
Self driving car is another example for AI.
AI has the potential to simplify the interaction between humans and the computer. You could simply walk up to a computer and talk to it. You wouldn't need any specialized knowledge about the operation of the computer.
But, risks are always a part and parcel of technology. More powerful the technology, more the danger associated with it. Imagine a situation where robots get corrupted or malfunction which may lead us to a situation similar to that of terminator.


Biometric Technology:  
Biometrics refers to the study of measurable biological characteristics. In computer security, biometrics refers to authentication techniques that rely on measurable physical characteristics that can be automatically checked.- webopedia
There are several types of biometric identification schemes. To name a few we have face, fingerprint, hand geometry, retina, iris, signature and voice recognition identification etc..
Some examples of biometric technology facial scan to unlock your phone, voice scan for unlocking your vault or safe, fingerprint scanning for authentication etc..
Many people believe that biometrics will play a critical role in future computers, and especially in e-commerce. Biometrics provides a higher level of security as it completely eliminates the need for passwords which can be stolen (and of course, it prevents the hassle of remembering them).
The main problem with the biometric technology is its implementation. It is difficult to accurately scan the biometrics of a person. The changes in the environment (i.e. lighting, background disturbance, etc.) affect the way in which a person’s biometrics are scanned.  Another problem is that the biometric measurements should exactly match the measurements taken initially (for example the pressure applied during a finger print scan) which may not be possible always.

Fog Computing:
Fog computing, also known as fogging, is a model in which data, processing and applications are concentrated in devices at the network edge rather than existing almost entirely in the cloud.
That concentration means that data can be processed locally in smart devices rather than being sent to the cloud for processing.
Seems similar to cloud computing doesn’t it?
This is because fog computing is similar to cloud computing. In cloud computing the data is stored and processed in the cloud whereas in fogging most of the processing occurs at the edge of the cloud i.e. the devices which the user uses directly.
Then why do we need fog computing when we already have cloud computing?
The reason is that in the current cloud architecture is heavily dependent on distributed processing, which in turn is dependent on the available bandwidth from the edge device to the backend server (i.e. cloud).This structure works well for our current needs. When we talk about technologies like IoT we have a large collection of devices in a network, which exchange huge amount of data through the cloud. In such a situation it is impractical to force the cloud to do all the processing.
Fogging suggests that the end devices should handle their own processing and the end devices should be allowed to communicate between each other without an intermediate. Fog computing will be able to handle the tsunami of data created by IoT, at the same time removing the bandwidth bottleneck problem.
Some of the possible applications of fog computing are connected cars( hands free driving!!), smart traffic lights, self maintaining trains etc..

Conclusion:
In today’s world, there are new technologies being invented on almost daily basis. In such cases it is important to stay in tune with these new changes as it affects us directly. This article was an attempt to explain the trending technologies in a simple and concise manner. Hope you like it.
We look forward to your comments.
 signing off- Shriya & Pujitha





References:

http://www.businessinsider.com.au/9-real-life-scenarios-that-show-how-the-internet-of-things-could-transform-our-lives-2014-8