Cloud or fog computing also known as nebulization. It is an architecture that uses one or more collaborative end-user clients or peripheral devices close to the user to carry out a large amount of storage (instead of being stored mainly in data centers). data in the cloud). instead of being routed through the backbone of the internet), control, configuration, measurement and administration (instead of being controlled mainly by network gateways such as those of the LTE core network).
Cloud computing can be perceived both in large cloud systems and in big data structures, making reference to the increasing difficulties to access information objectively. This results in a lack of quality of the content obtained. The effects of cloud computing on cloud computing and big data systems can vary; However, a common aspect that can be extracted is a limitation in the precise distribution of content, a problem that has been addressed with the creation of metrics that attempt to improve accuracy.
The fog network consists of a control plane and a data plane. For example, in the data plane, fog computing allows IT services to reside at the edge of the network instead of servers in a data center. Compared to cloud computing, fog computing emphasizes proximity to end users and customer objectives, dense geographic distribution and local resource pooling, latency reduction and bandwidth savings to achieve better quality of service (QoS ) and edge analysis / flow mining. User experience and redundancy in case of failure.
The fog network supports the concept of the Internet of Things (IoT), in which most devices used by human beings on a daily basis will connect with each other. Examples include telephones, portable health monitoring devices, connected vehicles and augmented reality using devices such as Google Glass.
SPAWAR, a division of the US Navy. UU., Is creating prototypes and testing a secure and scalable disruption mesh network to protect strategic military assets, both fixed and mobile. The machine's control applications, which run on the mesh nodes, "take over" when the connectivity to the Internet is lost. The use cases include Internet of Things, p. swarms of smart drones:
ISO / IEC 20248 provides a method by which data from objects identified by edge computing using Automated Identification Data Conveyors [AIDC], a barcode and / or RFID tag, can be read, interpreted, verified and placed available in "Fog" and in the "Edge" even when the AIDC tag has been moved.