FOG COMPUTING WITH INTERNET OF THINGS : AN OVERVIEW OF ARCHITECTURE, ALGORITHMS, CHALLENGES AND APPLICATIONS
Fog is an early design for data storage, computing, and application control. It includes both control and data planes and is useful in wired and wireless contexts. As a 5G, Internet of Things(IoT), and integrated artificial intelligence(AI) architecture, it supports an expanding variety of applications. Performance, security, latency, and network failure are just a few of the problems that integrated cloud computing (CC) must contend with as IoT applications continue to develop. The evolution of fog computing(FC) offers a solution to these issues by putting CC closer to the IoT. The main purpose of the fog is to deliver the data produced by the edge IoT devices. Instead of sending the data to a cloud server, local processing and data storage are carried out at the fog node(FN). When compared to the cloud, FC offers high-quality, quick-response services. FC may thus be the best choice for enabling the IoT to provide a reliable and highly secure service to a large number of IoT customers. In this article, we present the characteristics, architecture, integration with the IoT, and problem of FCs.
How to Cite
Copyright (c) 2023 Journal of Engineering and Technology (JET)
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Thank you for your interest in submitting your manuscript to the Journal of Engineering and Technology (JET).
JET publishes only original works. Manuscripts must not be previously published or under consideration by any other publications. Papers published in JET may not be published again in whole or in part without permission. Please review these guidelines for researching, writing, formatting and submitting your manuscript. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0).
Those submitting manuscripts should be carefully checked to ensure that all works contributed to the manuscript are acknowledged. The list of authors should include all those who can legitimately claim authorship. Manuscript should only be submitted for consideration once consent is given by all contributing authors using Transfer of Copyright form.