That being said, this anticipated surge in connected devices has some mobile network operators exploring new ways to complement their cloud service offerings, according to the latest market study by ABI Research.
One solution in particular is gaining adoption. 'Fog Networking' is a means to combat these challenges, with various telecom vendors developing their own architectures to bring the cloud closer to the end-user.
A distributed architecture, fog networking consists of multiple end-user clients or near-user edge devices that manage and operate on vast amounts of storage instead of using centralized cloud data centers.
Fog networking does this by enabling small purpose-built computing services to reside at the edge of the network, as opposed to on much larger servers in a hyperscale data center.
This doesn't replace the public cloud. Instead, fog networking enhances the cloud experience by managing some user data at the edge of the network. Administrators are then able to incorporate software analytics and additional security directly into their cloud services, as needed.
"The increase in connected devices presents two main challenges: the potential for unreliable communication due to network congestion and poor network connections for short-range wireless devices," said Sabir Rafiq, research analyst at ABI Research.
ABI believes that fog networking enables mobile network operators to build a new distributed telecom cloud computing market. It's built for applications where there's lots of real-time data, fast turnaround results are crucial and sending large amounts of data into the cloud is not the optimal solution.
The key benefits of fog networking include:
- Better Data Access: Removes the need to transport large quantities of data to the data center.
- Enhanced End User Experience: Creates an edge network at numerous points where demand is the greatest, thereby positioning services and applications closer to the end-user.
- Geographically Dispersed Infrastructure: Enables real-time processing of big data with software analytics and offers administrators the ability to support location-based mobility demands.
Besides, more computing is already moving to the edge of the traditional mobile network. Regardless, some mobile service providers assume that fog networking may present additional security risks. However, the reality is that more security layers are employed using this model. Instead of the data moving between many network nodes, the data goes from the Internet into the servers and onto the nodes.
This approach means that extra firewalls and security checkpoints are in place to search for malicious activity, typically making it harder for known IoT cyber threats to cause a problem.