January 2018
Intermediate to advanced
524 pages
13h 33m
English
The consortium defines this level as the hardware security portion of the stack. Higher level fog nodes should be able to monitor lower-level fog nodes as part of the hierarchy in the topology (covered later). Peer nodes should be able to monitor their east-west neighbors. This layer also has the following responsibilities:
Read now
Unlock full access