特集 : 国別レポートが13,000件から検索可能になりました!

特集 : 海外市場の委託調査がセミカスタムベースでお手軽にできます

株式会社グローバルインフォメーション
TEL: 044-952-0102
市場調査レポート

フォグコンピューティング:CSP (通信サービスプロバイダ) にとっての機会と課題

Fog Computing: Opportunities & Challenges for CSPs

発行 Heavy Reading 商品コード 408572
出版日 ページ情報 英文 25 Pages
納期: 即日から翌営業日
価格
本日の銀行送金レート: 1USD=107.17円で換算しております。
フォグコンピューティング:CSP (通信サービスプロバイダ) にとっての機会と課題 Fog Computing: Opportunities & Challenges for CSPs
出版日: 2016年12月13日 ページ情報: 英文 25 Pages
概要

フォグコンピューティング (Fog Computing、フォグネットワーキングとも) は、世界各国のCSP (通信サービスプロバイダ) にとって破壊的な影響をもたらし得る新技術です。フォグコンピューティングのビジョンは明白で、仮想化やクラウドを突き詰めて、待機時間を (ローカルレベルで) ゼロにまで短縮しようという試みとなっています。ただし、その実現に当たっては、IoT (モノのインターネット) やコア/モバイル・ネットワークとの兼ね合いなど、解決すべき問題が山積しています。

当レポートでは、フォグコンピューティング (Fog Computing) の概略や今後の普及見通し、各種ネットワークやIoTとの関連性などについて分析すると共に、通信サービスプロバイダがこの分野から得られる市場機会や、そのために解決すべき課題について考察しております。

第1章 エグゼクティブ・サマリー

第2章 フォグコンピューティングとコアネットワーク

  • 「待ち時間 (レイテンシー) ゼロの世界へようこそ」
  • 分散型・予見型ポリシーとアナリティクスの登場
  • オープンソースとマイクロサービスの影響度
  • クラウドのコンバージェンス (集約化)

第3章 フォグコンピューティングとモバイルネットワーク

  • 市場概況:現実
  • 市場概況:希望的予測
  • モバイルネットワークの資産 (アセット)
  • デバイス:リソースとしてのハンドセット

第4章 フォグコンピューティングとデータセンター

第5章 IoT (モノのインターネット):フォグコンピューティングの触媒

  • M2M (機械間通信) のもつれを解く
  • IoTと「エッジ」
  • バーチャルエッジ
  • クラウドレット (Cloudlets、小規模クラウド) とフォグ
  • IoTのエコシステムがOpenFog Consortiumを左右する
  • フォグによるIoTの実現
  • 企業ネットワークの管理
  • 付加価値サービスの市場機会としてフォグを取り込むCSP (通信サービスプロバイダ)
  • IoTはフォグの触媒となるのか、それとも違う方向へと導くのか?

第6章 フォグセキュリティ:第四の領域の登場

利用条件

目次

The certainty of change -- along with the uncertainty that change brings -- is now painfully common for communications service providers (CSPs). While CSPs and the networks and services they deliver are at the heart of the global economy, the now-constant barrage of technology innovations, business disruptions, and regulatory shifts has put CSPs under enormous pressure that shows no sign of easing.

Fog computing (a.k.a. fog networking) is the latest potential disruptor for CSPs and their technology suppliers. The term itself raises the specter of fear, uncertainty, and doubt that CSPs have faced since the dawn of this century. If virtualization and the cloud weren't murky enough concepts, fog comes rolling in to add to the degree of difficulty for developing and implementing long-term business and technology plans.

Despite its vaguely menacing name, the underlying concept of fog computing is fairly clear. Very simply put, fog computing pushes the concept of virtualization out to the very edges of the network, with the goal of getting network latency as close to zero as possible. In this context, fog is a logical extension of the network virtualization that is taking place deeper inside the network.

Mobile edge computing (MEC) can be viewed as one aspect of the fog model, specific to mobile networks. The MEC architecture uses virtualization to push applications and processing tasks closer to the user, potentially as far as the base station -- which not only greatly reduces the distance from the network to the end user, but also reduces backhaul requirements. ETSI is now working on standards for MEC, which is seen as essential to the successful deployment of 5G networks and services.

But fog computing's potential benefits can be extended to wireline networks, as well. The most obvious application for fog in the wireline network is the extension of cloud services out to the network edge, again with lower latency in mind. Extending the fog model to all types of networks will also be critical for applications that will run over different types of networks, such as Internet of Things (IoT) systems. And taken to its logical conclusion, fog will eventually extend to envelop the end devices themselves.

While the basic concept of fog computing is relatively straightforward, implementation and deployment issues are far from clear. One obvious reason is that fog is still in a fairly early stage of development. The OpenFog Consortium, an industry/university group, was launched in November 2015, and to this point its output consists of a handful of white papers. Another cause is the very real possibility that different implementations will require variations on the overall fog theme: Yes, fog computing involves pushing more functions out to the edge, but which functions are pushed and where they end up will vary.

This report presents Heavy Reading's current thinking on fog computing and its likely role in the development of next-generation networks and services. For this initial look at fog and its potential impact on CSP networks and services, we've focused on five basic aspects of fog deployment: the conventional core network, mobile networks, CSP data centers, IoT systems, and security. Subsequent reports will provide deeper dives into these areas and other aspects of fog computing and networking.

Fog Computing: Opportunities & Challenges for CSPs is organized as follows:

  • In Section 2, Senior Analyst Jim Hodges explores the implications fog computing has for the core network.
  • In Section 3, Senior Analyst Gabriel Brown examines the potential impact of fog computing on mobile networks.
  • Senior Analyst Roz Roseboro outlines the possible implications of fog computing in CSP data centers in Section 4.
  • In Section 5, Senior Analyst Steve Bell assesses the transformative possibilities of fog computing and IoT.
  • Chief Analyst Patrick Donegan discusses the security implications of fog computing in Section 6.

Table of Contents

1. EXECUTIVE SUMMARY

  • 1.1 Key Findings
  • 1.2 Report Outline

2. FOG COMPUTING & THE CORE NETWORK

  • 2.1 Welcome to the World of Zero Latency
  • 2.2 The Rise of Distributed Predictive Policy & Analytics
  • 2.3 The Impact of Open Source & Microservices
  • 2.4 Cloud Convergence

3. FOG COMPUTING & THE MOBILE NETWORK

  • 3.1 Market View - the Reality
  • 3.2 Market View - the Hype
  • 3.3 Mobile Network Assets
  • 3.4 Devices - Handsets as Fog Resource

4. FOG COMPUTING & THE DATA CENTER

5. IOT: THE CATALYST FOR FOG

  • 5.1 Disentangling M2M
  • 5.2 IoT & the Edge
  • 5.3 The Virtual Edge
  • 5.4 Cloudlets & Fog
  • 5.5 IoT Ecosystems Drive the OpenFog Consortium
  • 5.6 Fog Enables IoT
  • 5.7 Enterprise Network Management
  • 5.8 CSPs Embrace Fog as a Value-Added Opportunity
  • 5.9 Is IoT the Catalyst for Fog, or the Other Way Round?

6. FOG SECURITY: THE RISE OF THE FOURTH DOMAIN

TERMS OF USE