• Home
  • AI News
  • Bookmarks
  • Contact US
Reading: What is Fog Computing? How is it Used in Machine Learning?
Share
Notification
Aa
  • Inspiration
  • Thinking
  • Learning
  • Attitude
  • Creative Insight
  • Innovation
Search
  • Home
  • Categories
    • Creative Insight
    • Thinking
    • Innovation
    • Inspiration
    • Learning
  • Bookmarks
    • My Bookmarks
  • More Foxiz
    • Blog Index
    • Sitemap
Have an existing account? Sign In
Follow US
© Foxiz News Network. Ruby Design Company. All Rights Reserved.
> Blog > AI News > What is Fog Computing? How is it Used in Machine Learning?
AI News

What is Fog Computing? How is it Used in Machine Learning?

admin
Last updated: 2022/05/29 at 6:01 AM
admin
Share
27 Min Read

Introduction:  What is Fog Computing? How is it Used in Machine Learning?

IoT is well known for being one of the main sources of Big Data since it connects a huge number of smart objects that continuously report their status. Although the IoT paradigm focuses on the connection of objects and their interconnection, its true potential lies not in the physical objects themselves, but in extracting valuable knowledge from the data generated by these objects. The Internet of Things is not about things, but rather about data. In this context, ML is a useful tool for processing the generated data and transforming it into information, knowledge, predictions, insights, and automated decisions. The use of ML techniques in the Internet of Things (IoT) raises several challenges, especially regarding their computational requirements. Data produced by IoT device can be typically processed in 3 different layers: in the source layer (things), in cloud computing, and in the intermediate or fog layer.

Contents
Introduction:  What is Fog Computing? How is it Used in Machine Learning?What is Fog Computing? How does fog computing work?Fog Computing and Its StructureFog Nodes or Microdata Centers (MDCs).Smart Gateway.Virtual Servers.Management Subsystem.Fog Computing vs. Cloud ComputingDrawbacks of the cloud-based model include the following:What is edge computing? Everything you need to knowFog computing vs. edge computingHow and why is fog computing used?What are the benefits of fog computing?What are the disadvantages of fog computing?Fog computing and the Internet of ThingsFog computing and 5GFog Computing: Outcomes at the Edge with Machine LearningThree Use Cases for Fog Computing:Remote monitoring for Oil & Gas operations:Machine Learning Models:Self Driving Cars:Securing Industrial IoT Through Fog ComputingWhat is next for fog computing?Share this:
Fog Computing
Fog ComputingBuy Now

We earn a commission if you make a purchase, at no additional cost to you.
09/20/2023 09:56 am GMT

The performance of each layer depends on the QoS parameters and the complexity of the processing required. Current ML techniques impose an overhead on devices of the fog layer, which are resource-constrained, hindering their widespread adoption in this setting. New developments in running ML algorithms show that, due to the limited hardware and power supply of fog devices, the decision-making processes in the fog are not an easy task. On the contrary, a decision-making procedure built upon information extracted from various devices on the network is far more reliable than by taking a limited view of the context alone. We will discuss the challenges to implementing big data analytics in fog computing using the latest AI developments.

Also Read: Impact of AI in Smart Homes.

- Advertisement -
Ad imageAd image

What is Fog Computing? 

Decentralized computing is a distributed computing infrastructure in which data and compute are located somewhere between the source and the cloud. Fog computing is one example of this type of architecture. Like edge computing, Fog Computing brings the advantages and power that the cloud has to offer closer to where data is generated and processed. Both fog computing and edge computing involve bringing intelligence and processing close to where the data is generated. It’s often done to improve efficiency but it may also be done for security or compliance reasons.

The fog metaphor comes directly from the meteorological term “fog” which describes a cloud close to the earth. The term is often associated with Cisco; the company’s product line manager, Ginny Nichols, is believed to have coined the term. Cisco Fog Computing is an official name; fog computing is available for anyone to use. Computing capability improved is a direct improvement of quality of service provided.

Source: YouTube

How and why is fog computing used?

There are any number potential uses for fog computing. Traffic control is one increasingly common use case for Fog Computing. Because sensors are usually connected to cellular networks, some cities use computing resources near the cell towers. Real-time analytics enables traffic signals to respond in a timely manner to changing conditions.

Autonomous vehicles can also benefit from this concept. Due to their vast onboard computing power, autonomous vehicles function as edge devices. The vehicles must be able to ingest data from numerous sensors, analyze it in real-time, and then respond accordingly.

As autonomous vehicles do not require cloud connectivity to operate, it’s tempting to think of them as disconnected devices. Though an autonomous vehicle must be capable of driving safely even without cloud connectivity, it is still possible to use connectivity when available. It is being considered by some cities how an autonomous vehicle might operate with the same computing resources as traffic lights. For example, a vehicle of this type could be used as an edge device and relay real-time data to a system that receives traffic data from other sources. Using this data, the underlying platform can better control traffic signals.

What are the benefits of fog computing?

Fog computing is no different from any other technology. Here are some advantages of fog computing:

By reducing the amount of data that is sent to the cloud, fog computing reduces bandwidth consumption and related costs.

Reduced latency. Since the data processing occurs near the data, the response time is improved. Millisecond-level responsiveness enables near-real-time processing of data.

Network agnostic.

Although fog computing generally places compute resources at the LAN level, as opposed to the device level, which is the case with edge computing, the network can be included in the fog computing architecture. While fog computing is network-agnostic, it can be used over wired, wireless, or even 5G networks.

Training process can be used with neural networks to improve performance and anomaly detection.

Monitoring performance metrics using smart devices in realtime is a game changer as it allows businesses to adapt in real time based on the performance metrics reported.

Distribution of computing tasks reduces load and distributed computing tasks can enhance performance without overloading the cloud computing services.

What are the disadvantages of fog computing?

Fog computing does, however, have some disadvantages, such as the following:

Physical location. Since fog computing is tied to a physical location, it undermines some of the “anytime/anywhere” benefits associated with cloud computing.

Under the right circumstances, fog computing can be subject to security issues, such as IP address spoofing or man-in-the-middle attacks.

Fog computing uses both edge and cloud resources, which means that there are associated startup costs.

Ambiguous concept. There is still some ambiguity surrounding fog computing’s definition, even though it has been around for several years. Different vendors define fog computing differently.

Fog computing and the Internet of Things

The use of fog computing is common in Internet of things (IoT) applications, since cloud computing is not viable. Smart sensors and IoT devices generate large amounts of data that a cloud-based approach could not handle, which would be costly and labor-intensive to process and analyze. By using fog computing, there is a reduction in bandwidth and in the back-and-forth communication between the cloud and the sensors, which can negatively affect IoT performance.

Fog computing and 5G

The fog computing architecture makes use of IoT devices to receive real-time data from a series of nodes. These nodes process data in real time, with millisecond response times. Information from the nodes is periodically sent to the cloud for analysis. The data is then analyzed by a cloud-based application that provides actionable insight based on the data received from the various nodes.

Such an architecture requires more than just computing power. A high-speed connection between the IoT devices and nodes is required. The goal is to process data within milliseconds. Different use cases require different connectivity options. IoT sensors on a factory floor, for example, are likely to use a wired connection. However, mobile resources, such as an autonomous vehicle, or isolated resources, such as a wind turbine in the middle of a field, will require an alternate form of connectivity. A compelling reason to choose 5G is that it provides the high-speed connectivity necessary for data to be analyzed in near-real time. 5G enables this to be done via cellular networks.

Fog Computing: Outcomes at the Edge with Machine Learning

(Edge) Computing [Source: Cisco] Edge computing (or Fog Computing) is a method of optimizing cloud computing systems by performing data processing near the edge of the network. Edge computing is a natural step following cloud computing. Using the cloud for every device would not be practical. Modern smartphones send all data to the cloud for processing, the data is stored there, and the results are sent back to the device.

A number of examples demonstrate how edge computing gives IoT a competitive edge. In industrial internet of things applications such as aviation, smart traffic lights, or manufacturing, edge devices can capture streaming data that can be used to prevent parts from failing, reroute traffic, optimize production, and prevent product defects. Data analysis at the edge of a network is known as Edge Analytics. Data is more valuable at the edge:

Data has a time value, meaning that the data you have today won’t mean as much a week, a day, or even an hour from now. As a result, organizations are using edge computing to provide real-time analytics that impact the bottom line, and in some cases, prevent disasters from ever occurring. Other factors driving edge computing adoption include the proliferation of IoT sensors, video cameras, social media, and other streaming data.

For data analytics, organizations currently use large and complex clusters. These clusters have a number of bottlenecks, including data pipelining, indexing and extracting, as well as transform and load processes. It is crucial for today’s organizations to have fast and actionable insight by correlating newly acquired data with legacy data in order to maintain or gain a strong competitive advantage by using centralized infrastructures to analyze static or historical data.

As most data is priceless as soon as it is collected, such as the instance of a financial fraud or hacker accessing accounts, it loses all value during the process of moving it to the centralized data center infrastructure or uploading it to the cloud. Slow decision-making is not acceptable when an edge-computing platform can provide near-instant intelligence by eliminating moving data. Using data analytics at the edge, organizations can fight fraud or prevent data breaches in real time.

Three Use Cases for Fog Computing:

Remote monitoring for Oil & Gas operations:

The use of edge computing in Oil & Gas operations can make the difference between a disaster and a normal operation. Centralized data analytics infrastructures can provide insight into what caused downtime or can predict failure using supervised learning based on a trained dataset. Nevertheless, establishing rules that can perform near-instant analysis on the data at the site as it is being created can detect the signs of a disaster and prevent it before it begins.

Machine Learning Models:

Models to detect anomalies (e.g. Kalman Anomaly), predictive models (e.g. Bayesian change detection), and optimization methods (e.g. Linear optimization) Retail customer behavior analytics: Retail analytics to lessen cart abandonment and improve customer engagement using near-instant edge analytics where sales data, images, coupons used, traffic patterns, and videos are created provide unparalleled insight into consumer behavior. Retailers can use this intelligence to target merchandise, sales, and promotions and to redesign store layouts and product placement to improve the customer experience. Using beacons, for example, retailers can collect information from customers’ smartphones such as transaction history, then target promotions and sales items as they walk through the store. Models such as statistical methods (e.g., market basket analysis, Apriori), time series clustering, classification model, neural networks etc.

Self Driving Cars:

The next-generation of advanced driver assistance systems (ADAS) will make cars safer and more efficient by making them increasingly aware of and responsive to the surrounding driving environment and conditions. In order for ADAS to succeed, it must be democratized by making it available to everyone-from first-time drivers to seniors, in passenger vehicles as well as commercial vehicles.

In order for cars to compete with the development and deployment of next-generation technologies and self-driving vehicles in the near future, we need to look at how a collective set of systems inside the car can deliver a better experience compared to viewing the car as a collection of independent technologies.

ML Models: Image Processing, Classification model, Anomaly Detection (e.g. Outlier Detection in Isolation Forests), Reinforcement Learning, VLSAM Technologies, etc.

Combining forces of autonomous vehicles, for cluster forming internet of vehicles to control systems and manage traffic across cities to reduce congestion without impacting cloud resources or the centralized cloud. More power to internet of vehicles.

Securing Industrial IoT Through Fog Computing

Fog’s dispersed design safeguards linked systems by placing computing, storage, networking, and communications closer to the services and data sources, thereby providing an added layer of security. Fog nodes perform a variety of security tasks on networked devices, even the tiniest and most resource-constrained ones, to protect cloud-based industrial IoT and fog-based services. Security credentials, malware detection, and software patch distribution at scale can be managed and upgraded with the fog, which provides a trusted distributed platform and execution environment for applications and services.

Fog provides reliable communication and enhanced security through detection, verification, and reporting of assaults. By monitoring the security status of devices around it, the fog can detect and isolate risks quickly in the event of a security breach. Through the fog, the deployment of blockchains to IoT endpoints can be done at low cost. Operations managers can remotely isolate and shut down affected generators if multiple power generators are attacked with malware using fog’s node-based root-of-trust capabilities. The result is minimal service interruptions. The fog nodes protect domains from hackers exploiting a vulnerability in assembly-line equipment. Once a potential assault has been identified, traffic is monitored from the internet into the distributed fog network, and machine learning is used to detect it.