definition/concept of edge computing
cloud layer
edge layer
device layer
Security risks and its measures
(edge computing-explain points also)
How to secure edge computing ?
(explain points also)
Advantages of edge computing
Limitations of edge computing
Challenges in edge computing
Fog computing
-> it is a distributed computing paradigm that extends the cloud services to the edge of the network
-> It facilitates management and programming of compute, networking and storage services between data services and end devices
edge devices
->devices which are at the edge of the network or a bridge between two networks which works by being near the source of the data it manages.
->main function includes transmission, routing, processing, filtering, translation and storage of data between two networks.
eg: sensors, actuators and iot gateways
architecture of fog computing
(remember the functions of each layer)
(wrt fog computing)
Security risk 1:
Increased attack surface due to distributed nature of the technology
-> Securing the individual devices and systems that make up the fog network, as well as the connections bw them
-> to use encryption and authentication protocols so that only authorized people can access and data transmitted can be saved from eavesdropping and tampering
(wrt fog computing)
Security risk 2:
Privacy, as the technology often involves collection and processing personal data
-> Organizations need to be transparent about their data collection practices and allow users to opt out if needed
(wrt fog computing)
Security risk 3:
Fog computing introduces new challenges in terms of compliance with data protection regulations such as General Protection Regulation(GDPR) in the union
-> should work closely with legal and compliance experts
-> this may include implementing data protection by design principles, conducting regular risk assessments and maintaining detailed record of data processing activities.
Advantages of fog computing
(explain points also)
1.Reduction of network traffic
2. Suitable for iot tasks and queries
3. low-latency requirements
4.Scalability
limitations of fog computing
(explain points also)
Application of fog computing
(explain points also)
1.Healthcare
2.Augmented reality
difference between edge computing and fog computing
remember the points
edge routers (edge device)
manages data traffic to an IP address so multiple devices can operate using a single internet connection
WAN devices
devices extend over a large area even global
routing switches
can perform the same functions as router but also allow connections across different devices
firewalls
firewalls monitor all network traffic for security
multiplexers
merge data from multiple data sources over a single signal