Skip to main content

Building Fog Networks with Telecom Cloud Services

The Internet of Things (IoT) and the process of connecting sensor devices to public cloud services will become commonplace in 2016. But it's unknown if the current hyperscale cloud computing infrastructure will be capable of adding billions of latency-sensitive devices in the future.

That being said, this anticipated surge in connected devices has some mobile network operators exploring new ways to complement their cloud service offerings, according to the latest market study by ABI Research.

One solution in particular is gaining adoption. 'Fog Networking' is a means to combat these challenges, with various telecom vendors developing their own architectures to bring the cloud closer to the end-user.

A distributed architecture, fog networking consists of multiple end-user clients or near-user edge devices that manage and operate on vast amounts of storage instead of using centralized cloud data centers.

Fog networking does this by enabling small purpose-built computing services to reside at the edge of the network, as opposed to on much larger servers in a hyperscale data center.

This doesn't replace the public cloud. Instead, fog networking enhances the cloud experience by managing some user data at the edge of the network. Administrators are then able to incorporate software analytics and additional security directly into their cloud services, as needed.

"The increase in connected devices presents two main challenges: the potential for unreliable communication due to network congestion and poor network connections for short-range wireless devices," said Sabir Rafiq, research analyst at ABI Research.

ABI believes that fog networking enables mobile network operators to build a new distributed telecom cloud computing market. It's built for applications where there's lots of real-time data, fast turnaround results are crucial and sending large amounts of data into the cloud is not the optimal solution.

The key benefits of fog networking include:

  • Better Data Access: Removes the need to transport large quantities of data to the data center.
  • Enhanced End User Experience: Creates an edge network at numerous points where demand is the greatest, thereby positioning services and applications closer to the end-user.
  • Geographically Dispersed Infrastructure: Enables real-time processing of big data with software analytics and offers administrators the ability to support location-based mobility demands.

Besides, more computing is already moving to the edge of the traditional mobile network. Regardless, some mobile service providers assume that fog networking may present additional security risks. However, the reality is that more security layers are employed using this model. Instead of the data moving between many network nodes, the data goes from the Internet into the servers and onto the nodes.

This approach means that extra firewalls and security checkpoints are in place to search for malicious activity, typically making it harder for known IoT cyber threats to cause a problem.

Popular posts from this blog

Wireless Solutions Advance Work from Home Trends

Despite a challenging backdrop from the ongoing effects of the global COVID-19 pandemic, the negative impact on fifth-generation (5G) wireless supply chains has been minimal compared to the wider mobile smartphone market. This led to 5G mobile devices becoming more diverse, brought to market quickly at a variety of price points, thereby accelerating affordability and adoption. The mobile market is transitioning to 5G and many leading vendors are now exploring the low-priced 5G smartphone segment. According to the latest worldwide market study by ABI Research, 681 million 5G handsets will be shipped in 2022. Therefore, the race is on for OEMs to find that all-important level of differentiation in their flagship portfolios to help boost margins and improve market share. 5G Wireless Market Development Vendors continue to drive the adoption of new product designs, screen technology, chipsets, and camera setups -- notably within the flagship smartphone segment. Meanwhile, the leaders seek a

Software-Defined Infrastructure: The Platform of Choice

As more organizations adapt to a hybrid working model for their distributed workforce, enterprise CIOs and CTOs are tasked with delivering new productivity-enabling applications, while also seeking ways to effectively reduce IT cost, complexity, and risk. Traditional IT hardware infrastructure is evolving to more software-based solutions. The worldwide software-defined infrastructure (SDI) combined software market reached $12.17 billion during 2020 -- that's an increase of 5 percent over 2019, according to the latest market study by International Data Corporation (IDC). The market grew faster than other core IT technologies. The three technology pillars within the SDI market are: software-defined compute (53 percent of market value), software-defined storage controller (36 percent), and software-defined networking (11 percent). "Software-defined infrastructure solutions have long been popular for companies looking to eliminate cost, complexity, and risk within their data cente

Digital Identity Verification Market to Reach $16.7B

As more enterprise organizations embrace the ongoing transition to digital business transformation, CIOs and CTOs are adopting new technologies that enable the secure identification of individuals within their key stakeholder communities. A "digital identity" is a unique representation of a person. It enables individuals to prove their physical identity during transactions. Moreover, a digital identity is a set of validated digital attributes and credentials for online interactions -- similar to a person's identity within the physical world. Individuals can use a 'digital ID' to be verified through an authorized digital channel. Usually issued or regulated by a national ID scheme, a digital identity serves to identify a unique person online or offline. Digital Identity Systems Market Development Complementary to more traditional forms of identification, digital identity verification systems can enhance the authenticity, security, confidentiality, and efficiency of