
Fog and Edge Computing
Principles and Paradigms
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Fog and Edge Computing
Principles and Paradigms
About this book
A comprehensive guide to Fog and Edge applications, architectures, and technologies
Recent years have seen the explosive growth of the Internet of Things (IoT): the internet-connected network of devices that includes everything from personal electronics and home appliances to automobiles and industrial machinery. Responding to the ever-increasing bandwidth demands of the IoT, Fog and Edge computing concepts have developed to collect, analyze, and process data more efficiently than traditional cloud architecture.
Fog and Edge Computing: Principles and Paradigms provides a comprehensive overview of the state-of-the-art applications and architectures driving this dynamic field of computing while highlighting potential research directions and emerging technologies.
Exploring topics such as developing scalable architectures, moving from closed systems to open systems, and ethical issues rising from data sensing, this timely book addresses both the challenges and opportunities that Fog and Edge computing presents. Contributions from leading IoT experts discuss federating Edge resources, middleware design issues, data management and predictive analysis, smart transportation and surveillance applications, and more. A coordinated and integrated presentation of topics helps readers gain thorough knowledge of the foundations, applications, and issues that are central to Fog and Edge computing. This valuable resource:
- Provides insights on transitioning from current Cloud-centric and 4G/5G wireless environments to Fog Computing
- Examines methods to optimize virtualized, pooled, and shared resources
- Identifies potential technical challenges and offers suggestions for possible solutions
- Discusses major components of Fog and Edge computing architectures such as middleware, interaction protocols, and autonomic management
- Includes access to a website portal for advanced online resources
Fog and Edge Computing: Principles and Paradigms is an essential source of up-to-date information for systems architects, developers, researchers, and advanced undergraduate and graduate students in fields of computer science and engineering.
Trusted by 375,005 students
Access to over 1 million titles for a fair monthly price.
Study more efficiently using our study tools.
Information
Part I
Foundations
1
Internet of Things (IoT) and New Computing Paradigms
1.1 Introduction
- Bandwidth. The increasingly large and highâfrequent rate data produced by objects in IoT will exceed the bandwidth availability. For example, a connected car can generate tens of megabytes' data per second for the information of its route, speeds, carâoperating condition, driver's condition, surrounding environment, weather etc. Further, a selfâdriving vehicle can generate gigabytes of data per second due to the need for realâtime video streaming. Therefore, fully relying on the distant Cloud to manage the things becomes impractical.
- Latency. Cloud faces the challenges of achieving the requirement of controlling the endâtoâend latency within tens of milliseconds. Specifically, industrial smart grids systems, selfâdriving vehicular networks, virtual and augmented reality applications, realâtime financial trading applications, healthcare, and eldercare applications cannot afford the causes derived from the latency of CIoT.
- Uninterrupted. The long distance between cloud and the frontâend IoT devices can face issues derived from the unstable and intermittent network connectivity. For example, a CIoTâbased connected vehicle will be unable to function properly due to the disconnection occurred at the intermediate node between the vehicle and the distant cloud.
- Resourceâconstrained. Commonly, many frontâend devices are resourceâconstrained in which they are unable to perform complex computational tasks and hence, CIoT systems usually require frontâend devices to continuously stream their data to the cloud. However, such a design is impractical in many devices that operate with battery power because the endâtoâend data transmission via the Internet can still consume a lot of energy.
- Security. A large number of constraint frontâend devices may not have sufficient resources to protect themselves from the attacks. Specifically, outdoorâbased frontâend devices, which rely on the distant cloud to keep them updated with the security software, can be attackers' targets, in which the attackers are capable of performing a malicious activity at the edge network where the frontâend devices are located and the cloud does not have full control on it. Furthermore, the attacker may also damage or control the frontâend device and send false data to the cloud.
Table of contents
- Cover
- Table of Contents
- List of Contributors
- Preface
- Acknowledgments
- Part I: Foundations
- Part II: Middlewares
- Part III: Applications and Issues
- Index
- End User License Agreement
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app