Feasibility of Fog Computing: Blesson Varghese, Nan Wang, Dimitrios S. Nikolopoulos Rajkumar Buyya
Feasibility of Fog Computing: Blesson Varghese, Nan Wang, Dimitrios S. Nikolopoulos Rajkumar Buyya
cloud towards the edge of the network closer to the user. This
reduces the latency of communication between a user device and
the cloud, and is the premise of ‘fog computing’ defined in this
paper. The aim of this paper is to highlight the feasibility and
the benefits in improving the Quality-of-Service and Experience
by using fog computing. For an online game use-case, we found
that the average response time for a user is improved by 20%
when using the edge of the network in comparison to using a
cloud-only model. It was also observed that the volume of traffic
between the edge and the cloud server is reduced by over 90%
for the use-case. The preliminary results highlight the potential
of fog computing in achieving a sustainable computing model and
highlights the benefits of integrating the edge of the network into Fig. 1. A global view of executing applications in the current cloud paradigm
the computing ecosystem. where user devices are connected to the cloud. Blue dots show sample
locations of cloud data centers and the yellow dots show user devices that
I. A N OVERVIEW make use of the cloud as a centralised server.
V. C ONCLUSIONS
The fog computing model can reduce the latency and
frequency of communication between a user and an edge node.
This model is possible when concentrated computing resources
located in the cloud are decentralised towards the edge of
the network to process workloads closer to user devices. In
this paper, we have defined fog computing and contrasted
Fig. 5. Comparing average response time of iPokeMon game users when
using a server located on the cloud and on an edge node. In the fog computing it with the cloud. An online game use-case was employed
model, an improvement of over 20% is noted when the server is located on to test the feasibility of the fog computing model. The key
the edge node. result is that the latency of communication decreases for a
user thereby improving the QoS when compared to a cloud-
only model. Moreover, it is observed that the amount of data
that is transferred towards the cloud is reduced.
Fog computing can improve the overall efficiency and per-
formance of applications. These benefits are currently demon-
strated on research use-cases and there are no commercial
fog computing services that integrate the edge and the cloud
models. There are a number of challenges that will need to
be addressed before this integration can be achieved and fog
computing can be delivered as a utility [43]. First of all,
a marketplace will need to be developed that makes edge
nodes visible and accessible in the fog computing model.
This is not an easy task, given that the security and privacy
concerns in using edge nodes will need to be addressed.
Moreover, potential edge node owners and cloud service
providers will need to come to agreement on how edge nodes
can be transparently monitored and billed in the fog computing
model. To this end, standards and benchmarks will need to be
developed, pricing models will need to take multiple party
service level agreements and objectives into account, and the
risk for the user will need to be articulated. Not only are these
Fig. 6. Percentage reduction in the data traffic between edge nodes and the
cloud to highlight the benefit of using the fog computing model. The data socio-economic factors going to play an important role in the
transferred between the edge node and the cloud is reduced by 90%. integration of the edge and the cloud in fog computing, but
from the technology perspective, workload deployment models
and associated programming languages and tool-kits will need
spective of a user, which is measured by round trip latency to be developed.
from when the user device generates a request while playing
the game that needs to be serviced by a cloud server (this R EFERENCES
includes the computation time on the server). The response
[1] E. Strohmaier, J. J. Dongarra, H. W. Meuer, and H. D. Simon, “The
time is noted over a five minute time period for varying Marketplace of High-Performance Computing,” Parallel Computing,
number of users. In the fog computing model, it is noted that vol. 25, no. 1314, pp. 1517 – 1544, 1999.
on an average the response time can be reduced in the edge [2] ——, “Recent Trends in the Marketplace of High Performance Com-
puting,” Parallel Computing, vol. 31, no. 34, pp. 261 – 273, 2005.
computing model for the user playing the game by over 20%. [3] K. Asanovi, R. Bodik, B. C. Catanzaro, J. J. Gebis, P. Husbands,
Figure 6 presents the amount of data that is transferred K. Keutzer, D. A. Patterson, W. L. Plishker, J. Shalf, S. W. Williams, and
during the five minute time period to measure the average K. A. Yelick, “The Landscape of Parallel Computing Research: A View
from Berkeley,” EECS Department, University of California, Berkeley,
response time. As expected with increasing number of users Tech. Rep. UCB/EECS-2006-183, Dec 2006. [Online]. Available: http:
the data transferred increases. However, we observe that in //www2.eecs.berkeley.edu/Pubs/TechRpts/2006/EECS-2006-183.html
[4] P. Garcia Lopez, A. Montresor, D. Epema, A. Datta, T. Higashino, in IEEE International Symposium on Performance Analysis of Systems
A. Iamnitchi, M. Barcellos, P. Felber, and E. Riviere, “Edge-centric and Software, 2015, pp. 171–172.
Computing: Vision and Challenges,” SIGCOMM Computer Communi- [24] D. Bernstein, “Containers and Cloud: From LXC to Docker to Kuber-
cation Review, vol. 45, no. 5, pp. 37–42, Sep. 2015. netes,” IEEE Cloud Computing, vol. 1, no. 3, pp. 81–84, 2014.
[5] M. Satyanarayanan, P. Simoens, Y. Xiao, P. Pillai, Z. Chen, K. Ha, [25] B. Sharma, R. K. Thulasiram, P. Thulasiraman, S. K. Garg, and
W. Hu, and B. Amos, “Edge Analytics in the Internet of Things,” IEEE R. Buyya, “Pricing Cloud Compute Commodities: A Novel Financial
Pervasive Computing, vol. 14, no. 2, pp. 24–31, Apr 2015. Economic Model,” in Proceedings of the 12th IEEE/ACM International
[6] S. Agarwal, M. Philipose, and P. Bahl, “Vision: The Case for Cellular Symposium on Cluster, Cloud and Grid Computing, 2012, pp. 451–457.
Small Cells for Cloudlets,” in Proceedings of the International Workshop [26] H. Xu and B. Li, “A Study of Pricing for Cloud Resources,” SIGMET-
on Mobile Cloud Computing & Services, 2014, pp. 1–5. RICS Perform. Eval. Rev., vol. 40, no. 4, pp. 3–12, 2013.
[7] C. Meurisch, A. Seeliger, B. Schmidt, I. Schweizer, F. Kaup, and [27] Z. Shen, S. Subbiah, X. Gu, and J. Wilkes, “CloudScale: Elastic
M. Mühlhäuser, “Upgrading Wireless Home Routers for Enabling Large- Resource Scaling for Multi-tenant Cloud Systems,” in Proceedings of
scale Deployment of Cloudlets,” in Mobile Computing, Applications, and the 2nd ACM Symposium on Cloud Computing, 2011, pp. 5:1–5:14.
Services, 2015, pp. 12–29. [28] H. AlJahdali, A. Albatli, P. Garraghan, P. Townend, L. Lau, and J. Xu,
[8] A. V. Dastjerdi and R. Buyya, “Fog Computing: Helping the Internet of “Multi-tenancy in Cloud Computing,” in Proceedings of the 2014 IEEE
Things Realize Its Potential,” Computer, vol. 49, no. 8, 2016. 8th International Symposium on Service Oriented System Engineering,
[9] T. H. Luan, L. Gao, Z. Li, Y. Xiang, and L. Sun, “Fog Computing: 2014, pp. 344–351.
Focusing on Mobile Users at the Edge,” CoRR, vol. abs/1502.01815, [29] S. A. Baset, “Cloud SLAs: Present and Future,” ACM SIGOPS Operating
2015. [Online]. Available: http://arxiv.org/abs/1502.01815 Systems Review, vol. 46, no. 2, pp. 57–66, 2012.
[10] F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, “Fog Computing and [30] R. Buyya, S. K. Garg, and R. N. Calheiros, “SLA-oriented Resource
Its Role in the Internet of Things,” in Proceedings of the Workshop on Provisioning for Cloud Computing: Challenges, Architecture, and So-
Mobile Cloud Computing, 2012, pp. 13–16. lutions,” in Proceedings of the International Conference on Cloud and
[11] M. Satyanarayanan, P. Bahl, R. Caceres, and N. Davies, “The Case for Service Computing, 2011, pp. 1–10.
VM-Based Cloudlets in Mobile Computing,” IEEE Pervasive Comput- [31] N. Grozev and R. Buyya, “Inter-Cloud Architectures and Application
ing, vol. 8, no. 4, pp. 14–23, 2009. Brokering: Taxonomy and Survey,” Software: Practice and Experience,
[12] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, vol. 44, no. 3, pp. 369–390, 2014.
G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “A View [32] A. J. Ferrer, F. HernáNdez, J. Tordsson, E. Elmroth, A. Ali-Eldin,
of Cloud Computing,” Communications of the ACM, vol. 53, no. 4, pp. C. Zsigri, R. Sirvent, J. Guitart, R. M. Badia, K. Djemame, W. Ziegler,
50–58, 2010. T. Dimitrakos, S. K. Nair, G. Kousiouris, K. Konstanteli, T. Varvarigou,
[13] R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, “Cloud B. Hudzia, A. Kipp, S. Wesner, M. Corrales, N. Forgó, T. Sharif,
Computing and Emerging IT Platforms: Vision, Hype, and Reality for and C. Sheridan, “OPTIMIS: A Holistic Approach to Cloud Service
Delivering Computing as the 5th Utility,” Future Generation Computer Provisioning,” Future Generation Computer Systems, vol. 28, no. 1, pp.
Systems, vol. 25, no. 6, pp. 599 – 616, 2009. 66–77, 2012.
[33] K. Hashizume, D. G. Rosado, E. Fernández-Medina, and E. B. Fernan-
[14] A. Barker, B. Varghese, J. S. Ward, and I. Sommerville, “Academic
dez, “An Analysis of Security Issues for Cloud Computing,” Journal of
Cloud Computing Research: Five Pitfalls and Five Opportunities,”
Internet Services and Applications, vol. 4, no. 1, 2013.
in Proceedings of the USENIX Conference on Hot Topics in Cloud
[34] N. Gonzalez, C. Miers, F. Redı́golo, M. Simplı́cio, T. Carvalho,
Computing, 2014.
M. Näslund, and M. Pourzandi, “A Quantitative Analysis of Current
[15] A. Mukherjee, D. De, and D. G. Roy, “A Power and Latency Aware Security Concerns and Solutions for Cloud Computing,” Journal of
Cloudlet Selection Strategy for Multi-Cloudlet Environment,” IEEE Cloud Computing: Advances, Systems and Applications, vol. 1, no. 1,
Transactions on Cloud Computing, 2016. p. 11, 2012.
[16] P. Hari, K. Ko, E. Koukoumidis, U. Kremer, M. Martonosi, D. Ottoni, [35] I. Stojmenovic, S. Wen, X. Huang, and H. Luan, “An overview of
L.-S. Peh, and P. Zhang, “SARANA: Language, Compiler and Run- Fog Computing and its Security Issues,” Concurrency and Computation:
time System Support for Spatially Aware and Resource-aware Mobile Practice and Experience, vol. 28, no. 10, pp. 2991–3005, 2016.
Computing,” Philosophical Transactions of the Royal Society of London [36] Y. Wang, T. Uehara, and R. Sasaki, “Fog Computing: Issues and
A: Mathematical, Physical and Engineering Sciences, vol. 366, no. 1881, Challenges in Security and Forensics,” in Computer Software and
pp. 3699–3708, 2008. Applications Conference (COMPSAC), 2015 IEEE 39th Annual, vol. 3,
[17] M. N. Rahman and P. Sruthi, “Real Time Compressed Sensory Data Pro- July 2015, pp. 53–59.
cessing Framework to Integrate Wireless Sensory Networks with Mobile [37] B. Varghese, O. Akgun, I. Miguel, L. Thai, and A. Barker, “Cloud
Cloud,” in Online International Conference on Green Engineering and Benchmarking for Performance,” in Proceedings of the IEEE Internati-
Technologies (IC-GET), 2015, pp. 1–4. noal Conference on Cloud Computing Technology and Science, 2014,
[18] H. Hromic, D. Le Phuoc, M. Serrano, A. Antonic, I. P. Zarko, C. Hayes, pp. 535–540.
and S. Decker, “Real Time Analysis of Sensor Data for the Internet of [38] B. F. Cooper, A. Silberstein, E. Tam, R. Ramakrishnan, and R. Sears,
Things by Means of Clustering and Event Processing,” in Proceedings “Benchmarking Cloud Serving Systems with YCSB,” in Proceedings of
of the IEEE International Conference on Communications, 2015, pp. the ACM Symposium on Cloud Computing, 2010, pp. 143–154.
685–691. [39] B. Varghese, O. Akgun, I. Miguel, L. Thai, and A. Barker, “Cloud
[19] B. Zhou, A. V. Dastjerdi, R. Calheiros, S. Srirama, and R. Buyya, benchmarking for maximising performance of scientific applications,”
“mCloud: A Context-aware Offloading Framework for Heterogeneous IEEE Transactions on Cloud Computing, 2016.
Mobile Cloud,” IEEE Transactions on Services Computing, 2016. [40] J. Povedano-Molina, J. M. Lopez-Vega, J. M. Lopez-Soler, A. Corradi,
[20] D. G. Roy, D. De, A. Mukherjee, and R. Buyya, “Application-aware and L. Foschini, “DARGOS: A Highly Adaptable and Scalable Monitor-
Cloudlet Selection for Computation Offloading in Multi-cloudlet Envi- ing Architecture for Multi-tenant Clouds,” Future Generation Computer
ronment,” The Journal of Supercomputing, pp. 1–19, 2016. Systems, vol. 29, no. 8, pp. 2041–2056, 2013.
[21] B. Li, Y. Pei, H. Wu, and B. Shen, “Heuristics to Allocate High- [41] S. A. D. Chaves, R. B. Uriarte, and C. B. Westphall, “Toward an
performance Cloudlets for Computation Offloading in Mobile Ad Hoc Architecture for Monitoring Private Clouds,” IEEE Communications
Clouds,” Journal of Supercomputing, vol. 71, no. 8, pp. 3009–3036, Magazine, vol. 49, no. 12, pp. 130–137, 2011.
2015. [42] J. Montes, A. Sánchez, B. Memishi, M. S. Pérez, and G. Antoniu,
[22] L. Xu, Z. Wang, and W. Chen, “The Study and Evaluation of ARM- “GMonE: A Complete Approach to Cloud Monitoring,” Future Gen-
based Mobile Virtualization,” International Journal of Distributed Sen- eration Computer Systems, vol. 29, no. 8, pp. 2026–2040, 2013.
sor Networks, Jan. 2015. [43] B. Varghese, N. Wang, S. Barbhuiya, P. Kilpatrick, and D. S. Nikolopou-
[23] W. Felter, A. Ferreira, R. Rajamony, and J. Rubio, “An Updated los, “Challenges and Opportunities in Edge Computing,” in IEEE
Performance Comparison of Virtual Machines and Linux Containers,” International Conference on Smart Cloud, 2016.