Topic name:-What are the business implications of fog computing?
Name:-Rajiv Devgan
Stu-Id:-11606873
Table of Content
Introduction1
Problem Domain…………………………………………………………………………………………………………………..2
Purpose and Justification.………………...………………………………………………………………………………..3
Research review...……………………………………………………..............................................................4
Conceptual or theoretical framework……………………………..…………………………………………………..5
Research and system development methods……………………………………………………………...........6
Data collection or system design methods………………………………………………………………………....7
Ethical issues……………………………………………………………………………………………………………………...8
Compliance Requirement…………………………………………………………………………………………………...9
Analysis of data………………………………………………………………………………………………………………….10
Deliverables………………………………………………………………………………………………………………………..11
Work breakdown structure…………………………………………………………………………………………………12
Risk analysis………………………………………………………………………………………………………………………..13
Duration and Gantt chart……………………………………………………………………………………………………14
Conclusion…………………………………………………………………………………………………………………………..15
References………………………………..………………………………………………………………………………………..16
Emerging Technology and Innovations
Title -What are the business implications of fog computing?-
⦁ Introduction
Background
The Fog Computing is also known as the fog networking, it is a form of decentralized computing Infrastructure. It is an extension of the Cloud Computing. Basically it extends the cloud computing paradigm. It provides all the applications provided under the Cloud Computing like the data, computing, storage and other associated applications in the form of decentralized way in a logical manner. Fog computing not only provides the features of Cloud Computing but also extend these features in advance way. It helps to provide the services to the edge of the networking. It improves the capability and features of the cloud computing (Shan he, Cheng, Qun, 2015).
Even though the Fog Computing is similar to the cloud computing but the major difference lies in the end user level service, the fog computing provides better decentralized control, better big data control and the better services for application with sufficient amount of data storage and control system (Manreet, Monika , 2014).
The Fog Computing has a control panel and the data plane, the nodes of the fog computing reside close to the edge of End user service system. It has Sensors and the edge devices where the data is generated and collected. In the Fog Computing system the processing of the services take place at the hub with the help of a smart device with smart router system that helps to reduce the pressure on the server. It manages the control system effectively. It does not replace the Cloud Computing but extends the features of cloud computing (Raj, Sabu, 2016).
Fog computing and it Business Implication
With the help of Fog computing as discussed above the end users in different sections in the Business get better services. The best advantage of applying the Fog computing is that it provides the services or we can say design the services according to business requirement.(William S, 2015) It provides features for automation, such as machine to machine Interaction, video camera and several other applications... The features provided by the fog computing helps in better resource optimization, better data storage and management. The most important feature of Fog Computing is it provides better work with current virtualization technology, smart devices and mobile devices which play a pivotal role in functioning of the business (Fatemah, 2015).
2.0 Need for Research in the following areas (Problem Statement)
Even though the Fog computing has provided the extension of the services provided through cloud computing but it is not a replacement of Cloud computing. The Fog computing does not have the capability for performing computation, analytics capability, machine learning features and most importantly high storage capability. It can provide the analytics for the short term analytics at the edge in comparison of long term analytics capability of Cloud computing (Mung, Bharath, Flavio, 2014), Next important issue is of the security it needs more strong features to deal with the issues like IP Address Spoofing, Man in middle attack and several other such types of issues. It also require to deal with issues like privacy, Authentication policies, wireless network security concerns and most importantly the cost factors for providing the services. The Fog Computing provides the facility to the organizations to monitor their equipment’s by providing continuously analytics data , provides better network facility, better resource optimization, it requires less bandwidth so implementation of this requires less cost. It provides the real time speed to the processing, with combining the Internet of Thing concept the Fog Computing works wonderfully in providing the services to the organizations (Paul, Oliver, Bogdan, Sergej, 2015).
3.0 Purpose and Justification
As discussed above the sections firstly the Fog computing provides the extension of the Cloud computing services, the main motivation of the research is to provide a service in the virtual computing that has capability of replacing the Cloud computing by providing better services and provide solutions in the services discussed above and to design application that works in better way in the current devices and applications.
One of the biggest weaknesses in services regarding the service of Fog Computing is the difference in quality and availability of Fog Services at different locations or difference in physical locality. One of the biggest issues the Organization raise is they prefer to keep their data centralized rather than distributed due to security concerns in case of Cloud Computing same in case of Fog Computing. The architecture of the Fog Computing is also complex and several other issues too. These issues are the main reason behind the motivation to do research in this area (Sonali, Dhanashree, 2015).
4.0 Research view
As discussed above the Fog Computing is the Next Generation Cloud Computing, with combining it with the Internet of Thing, it brings the processing, networking, storage and analytics near to the devices. As discussed above there are still weaknesses in present services available in Fog Computing. The research in this area will help to know firstly the services available in detail, then it will research on the weaknesses of the Fog Computing in detail. Then this research will study about the solutions of above discussed problems. Will study the related researches and will present the detail report that will present the current process and implementation of Fog computing.
5.0Conceptual or theoretical Framework
This study will also try to combine the elements of Internet of things so that better services can be provided, the services can be made near to the edge of organization and the devices. It will also present an analytical report on the services providing the Fog Computing such as services provided by IBM, CISCO and other companies thoroughly. It will also present the results of experiment study conducted on the smart devices for observing the performance of Fog Computing on these devices (Nisha, 2015).
6.0 Research and system development methods:
The research method to be applied for this will be based on firstly the Reliance study mainly the focus will be to study the features and application of Fog computing, its network requirement, its strength, its usability and most importantly its implication in the Business organizations. Then the next approach will be the verification of the findings through appropriate study and tests and practical deployment tests. Then at the end our research approach will be based on the methods complementing the Authentication of the services and applications through Fog Computing.
7.0 Data Collection or system design methods:
The data for the Research will be collected through previous research papers, deployment reports, the onsite visit, interviews with personnel and research.
8.0 Ethical Issues:
Privacy of Data-: The privacy of data is required to be kept following the need of person, location, data type under Fog Computing. The privacy of data should be maintained by using advance security and authentication techniques, proper networking and rules.
Social Norms-: In any case implementing the Fog computing any kind of social, regional, cultural, religion norms must be violated.
Control of Access -: There should be control of access be implemented to ensure the security and privacy of data by using strong rules and policies for accessing the data even interoperability between fog computing servers.
Detection of risk- The strong detection method for any causes affecting network in Fog computing should be applied. The flooding strike and port checking method for detection are implemented in the detection of grid system of Fog Computing.
9.0 Compliance Requirement:
In order to provide the Compliance in Fog computing the assurance of serviceability, security, reliability, interoperability, openness, agility, availability are some important features required. These features ensure proper serviceability.
10.0 Analysis of Data:
For Analysis of Data on Fog Computing various algorithm are implemented, the log files are monitored, the differential privacy policies are implemented to ensure the proper analysis of data on Fog computing. Along with this the analysis techniques like sampling are also implemented.
11.0 Deliverables
At the End of this research project the report should present the detail of-:
⦁ Fog computing advance features.
⦁ Fog computing Business Implications.
⦁ Fog Computing compatible smart devices detail and how they can support business implications under Fog Computing environment.
⦁ Practical demonstration.
12.0Work Break down structure
5.0 Gantt Chart
PERT Chart
Risk Analysis-
The Risk Analysis of functioning of Fog Computing is still complex task and big research area, as discussed above the Performance of Fog computing varies on location and has other factors too. The proper mechanism must be implemented to ensure node to node transfer of data.
Conclusion
The Fog Computing is a vast field, it was a simple student level approach with the limited knowledge we have and the time given. The report can be presented with more detail if more research and time was available. Doing this assignment was a learning experience and will be beneficial in my entire career.
Topic name:-What are the business implications of fog computing?
Name:-Rajiv Devgan
Stu-Id:-11606873
Table of Content
Introduction1
Problem Domain…………………………………………………………………………………………………………………..2
Purpose and Justification.………………...………………………………………………………………………………..3
Research review...……………………………………………………..............................................................4
Conceptual or theoretical framework……………………………..…………………………………………………..5
Research and system development methods……………………………………………………………...........6
Data collection or system design methods………………………………………………………………………....7
Ethical issues……………………………………………………………………………………………………………………...8
Compliance Requirement…………………………………………………………………………………………………...9
Analysis of data………………………………………………………………………………………………………………….10
Deliverables………………………………………………………………………………………………………………………..11
Work breakdown structure…………………………………………………………………………………………………12
Risk analysis………………………………………………………………………………………………………………………..13
Duration and Gantt chart……………………………………………………………………………………………………14
Conclusion…………………………………………………………………………………………………………………………..15
References………………………………..………………………………………………………………………………………..16
Emerging Technology and Innovations
Title -What are the business implications of fog computing?-
⦁ Introduction
Background
The Fog Computing is also known as the fog networking, it is a form of decentralized computing Infrastructure. It is an extension of the Cloud Computing. Basically it extends the cloud computing paradigm. It provides all the applications provided under the Cloud Computing like the data, computing, storage and other associated applications in the form of decentralized way in a logical manner. Fog computing not only provides the features of Cloud Computing but also extend these features in advance way. It helps to provide the services to the edge of the networking. It improves the capability and features of the cloud computing (Shan he, Cheng, Qun, 2015).
Even though the Fog Computing is similar to the cloud computing but the major difference lies in the end user level service, the fog computing provides better decentralized control, better big data control and the better services for application with sufficient amount of data storage and control system (Manreet, Monika , 2014).
The Fog Computing has a control panel and the data plane, the nodes of the fog computing reside close to the edge of End user service system. It has Sensors and the edge devices where the data is generated and collected. In the Fog Computing system the processing of the services take place at the hub with the help of a smart device with smart router system that helps to reduce the pressure on the server. It manages the control system effectively. It does not replace the Cloud Computing but extends the features of cloud computing (Raj, Sabu, 2016).
Fog computing and it Business Implication
With the help of Fog computing as discussed above the end users in different sections in the Business get better services. The best advantage of applying the Fog computing is that it provides the services or we can say design the services according to business requirement.(William S, 2015) It provides features for automation, such as machine to machine Interaction, video camera and several other applications... The features provided by the fog computing helps in better resource optimization, better data storage and management. The most important feature of Fog Computing is it provides better work with current virtualization technology, smart devices and mobile devices which play a pivotal role in functioning of the business (Fatemah, 2015).
2.0 Need for Research in the following areas (Problem Statement)
Even though the Fog computing has provided the extension of the services provided through cloud computing but it is not a replacement of Cloud computing. The Fog computing does not have the capability for performing computation, analytics capability, machine learning features and most importantly high storage capability. It can provide the analytics for the short term analytics at the edge in comparison of long term analytics capability of Cloud computing (Mung, Bharath, Flavio, 2014), Next important issue is of the security it needs more strong features to deal with the issues like IP Address Spoofing, Man in middle attack and several other such types of issues. It also require to deal with issues like privacy, Authentication policies, wireless network security concerns and most importantly the cost factors for providing the services. The Fog Computing provides the facility to the organizations to monitor their equipment’s by providing continuously analytics data , provides better network facility, better resource optimization, it requires less bandwidth so implementation of this requires less cost. It provides the real time speed to the processing, with combining the Internet of Thing concept the Fog Computing works wonderfully in providing the services to the organizations (Paul, Oliver, Bogdan, Sergej, 2015).
3.0 Purpose and Justification
As discussed above the sections firstly the Fog computing provides the extension of the Cloud computing services, the main motivation of the research is to provide a service in the virtual computing that has capability of replacing the Cloud computing by providing better services and provide solutions in the services discussed above and to design application that works in better way in the current devices and applications.
One of the biggest weaknesses in services regarding the service of Fog Computing is the difference in quality and availability of Fog Services at different locations or difference in physical locality. One of the biggest issues the Organization raise is they prefer to keep their data centralized rather than distributed due to security concerns in case of Cloud Computing same in case of Fog Computing. The architecture of the Fog Computing is also complex and several other issues too. These issues are the main reason behind the motivation to do research in this area (Sonali, Dhanashree, 2015).
4.0 Research view
As discussed above the Fog Computing is the Next Generation Cloud Computing, with combining it with the Internet of Thing, it brings the processing, networking, storage and analytics near to the devices. As discussed above there are still weaknesses in present services available in Fog Computing. The research in this area will help to know firstly the services available in detail, then it will research on the weaknesses of the Fog Computing in detail. Then this research will study about the solutions of above discussed problems. Will study the related researches and will present the detail report that will present the current process and implementation of Fog computing.
5.0Conceptual or theoretical Framework
This study will also try to combine the elements of Internet of things so that better services can be provided, the services can be made near to the edge of organization and the devices. It will also present an analytical report on the services providing the Fog Computing such as services provided by IBM, CISCO and other companies thoroughly. It will also present the results of experiment study conducted on the smart devices for observing the performance of Fog Computing on these devices (Nisha, 2015).
6.0 Research and system development methods:
The research method to be applied for this will be based on firstly the Reliance study mainly the focus will be to study the features and application of Fog computing, its network requirement, its strength, its usability and most importantly its implication in the Business organizations. Then the next approach will be the verification of the findings through appropriate study and tests and practical deployment tests. Then at the end our research approach will be based on the methods complementing the Authentication of the services and applications through Fog Computing.
7.0 Data Collection or system design methods:
The data for the Research will be collected through previous research papers, deployment reports, the onsite visit, interviews with personnel and research.
8.0 Ethical Issues:
Privacy of Data-: The privacy of data is required to be kept following the need of person, location, data type under Fog Computing. The privacy of data should be maintained by using advance security and authentication techniques, proper networking and rules.
Social Norms-: In any case implementing the Fog computing any kind of social, regional, cultural, religion norms must be violated.
Control of Access -: There should be control of access be implemented to ensure the security and privacy of data by using strong rules and policies for accessing the data even interoperability between fog computing servers.
Detection of risk- The strong detection method for any causes affecting network in Fog computing should be applied. The flooding strike and port checking method for detection are implemented in the detection of grid system of Fog Computing.
9.0 Compliance Requirement:
In order to provide the Compliance in Fog computing the assurance of serviceability, security, reliability, interoperability, openness, agility, availability are some important features required. These features ensure proper serviceability.
10.0 Analysis of Data:
For Analysis of Data on Fog Computing various algorithm are implemented, the log files are monitored, the differential privacy policies are implemented to ensure the proper analysis of data on Fog computing. Along with this the analysis techniques like sampling are also implemented.
11.0 Deliverables
At the End of this research project the report should present the detail of-:
⦁ Fog computing advance features.
⦁ Fog computing Business Implications.
⦁ Fog Computing compatible smart devices detail and how they can support business implications under Fog Computing environment.
⦁ Practical demonstration.
12.0Work Break down structure
5.0 Gantt Chart
PERT Chart
Risk Analysis-
The Risk Analysis of functioning of Fog Computing is still complex task and big research area, as discussed above the Performance of Fog computing varies on location and has other factors too. The proper mechanism must be implemented to ensure node to node transfer of data.
Conclusion
The Fog Computing is a vast field, it was a simple student level approach with the limited knowledge we have and the time given. The report can be presented with more detail if more research and time was available. Doing this assignment was a learning experience and will be beneficial in my entire career.