Fog computing, also known as fog or nebulization, is a decentralized computing infrastructure in which data, calculation, storage and applications are distributed in the most logical and efficient place between the data source and the cloud. Cloud computing essentially extends cloud computing and services to the edge of the network, bringing the advantages and power of the cloud to where data is created and acted upon.
Fog or fog computing, also known as fog, is an architecture that uses one or more collaborative multiplicity of end-user or near-edge clients to perform a substantial amount of storage (rather than being stored primarily in data centers In the cloud), control, configuration, measurement and management (instead of being controlled primarily by network gateways such as the LTE core network).
Fog computing can be perceived both in large cloud systems and in large data structures, referring to the increasing difficulties in accessing information objectively. This results in a lack of quality of the content obtained. The effects of cloud computing on cloud computing and large data systems may vary; However, a common aspect that can be extracted is a limitation in the precise distribution of content, an issue that has been addressed with the creation of metrics that try to improve accuracy.
The fog connection consists of a control plane and a data plane. For example, in the data plane, cloud computing allows computing services to reside at the edge of the network as opposed to servers in a data center. Compared to cloud computing, cloud computing emphasizes proximity to end users and customer targets, dense geographic distribution and local pooling resources, latency reduction and backbone bandwidth savings to achieve better quality of Service (QoS) resulting in superior user experience and redundancy in case of failure.
The fog network supports the Internet of Things (IoT) concept, in which most devices used by humans on a daily basis will be connected to each other. Examples include telephones, health monitoring devices that can be used, connected vehicles, and augmented reality using devices such as Google Glass. SPAWAR, a division of the United States Navy, is designing and testing a scalable and secure Disruptive Tolerant Mesh Network to protect strategic military assets, both stationary and mobile. Machine control applications, which run on the mesh nodes, "take control", when you lose Internet connectivity. Use cases include Internet of Things, p. Smart drone swarms.
ISO / IEC 20248 provides a method by which data of the objects identified by edge computation using an automated identification data identifier (AIDC), a bar code and / or an RFID tag, can be read, interpreted , Check and make available in the fog The "edge" even when the AIDC tag has moved on.