SlideShare une entreprise Scribd logo
1  sur  26
CS4098 – SEMINAR
PRESENTED BY
NIKHIL SABU
B120792CS
FOG COMPUTING
TECHNOLOGY
CONTENTS
• ABSTRACT
• INTRODUCTION
• CHARACTERISTICS OF FOG COMPUTING
• CLOUD vs. FOG
• ARCHITECTURE OF FOG TECHNOLOGY
• APPLICATIONS OF FOG
• CONCLUSION
• REFERENCES
• Extends Cloud computing and services to the edge of the
network.
• Similar to Cloud, Fog provides data, compute, storage, and
application services to end-users.
• Motivations for Fog Computing - Smart Grid, smart traffic lights in
vehicular networks and software defined networks.
ABSTRACT
INTRODUCTION
What is fog computing?
• Fog computing (aka, Edge computing) is a model in which data, processi
ng and applications are concentrated in devices at the network edge rath
er than existing almost entirely in the cloud.
• The term "Fog Computing" was introduced by the Cisco Systems as new
model to ease wireless data transfer to distributed devices in the Internet
of Things (IoT) network paradigm.
• In Fog Computing, devices communicate peer-to-peer to efficiently share
/store data and take local decisions.
What is the need for fog computing ?
• Fog computing was developed to address applications and services that
do not fit the paradigm of the cloud.
• Fog Computing keeps data right where the Internet of Things needs it.
• Existing data protection mechanisms in Cloud Computing such as encrypt
ion failed in securing the data from the attackers.
• Limitations of cloud (high latency, security shortcomings, bandwidth, etc.)
Cloud architecture before the advent of fog technology
Cloud architecture with the advent of fog technology
CHARACTERISTICS OF FOG COMPUTING
• Edge location, location awareness, and low latency : Fog computing su
pport endpoints with finest services at the edge of the network
• Geographical distribution : The services and application objective of the
fog is widely distributed.
• Support for mobility : Using LISP protocol fog devices provide mobility t
echniques like decouple host identity to location identity.
• Real time interactions : fog computing requires real time interactions for
speedy service.
• Heterogeneity : Fog nodes can be deployed in a wide variety of environ
ments.
• Interoperability : Fog components must be able to interoperate in order
to give wide range of services like streaming.
CLOUD vs. FOG
Fog – Solution to Cloud’s Limitations
• Reduction in data movement across the network resulting in
reduced congestion.
• Elimination of bottlenecks resulting from centralized comput
ing systems.
• Improved security of encrypted data as it stays closer to the
end user.
CLOUD vs. FOG
CLOUD vs. FOG
ARCHITECTURE OF FOG TECHNOLOGY
The design of fog architecture or the key components of fog architecture ar
e discussed below:
• Heterogeneous Physical Resources
• Fog Abstraction Layer
• Fog Service Orchestration Layer
• Foglet Software Agent
• Distributed Database
• Policy-Based Service Orchestration
Components in Fog architecture
Heterogeneous Physical Resources:
Heterogeneous in nature, ranging from high-speed links connecting enterpri
se data centers and the core to multiple wireless access technologies towar
ds the edge.
3G/4G, LTE, WiFi etc.
Fog Abstraction Layer:
A uniform and programmable interface for seamless resource management
and control.
The layer provides generic APIs for monitoring, provisioning and controlling
physical resources such as CPU, memory, network and energy.
Fog Service Orchestration Layer:
Provides dynamic, policy-based life-cycle management of Fog services.
Managing services on a large volume of Fog nodes with a wide range of ca
pabilities is achieved with the following technology and components:
• Foglet Software Agent,
• Distributed Database, persistent storage to store policies and resource m
eta-data,
• Policy-Based Service Orchestration, provides policy-based service routing,
i.e., routes an incoming service request to the appropriate service instanc
e that confirms to the relevant business policies.
Policy based orchestration framework of fog technology
APPLICATIONS OF FOG
• Tech giants Cisco and IBM are the driving forces behind fog computing, a
nd link their concept to the emerging Internet of Things (IoT).
• Fog has a direct correlation with IoT.
• According to CISCO, the important areas where fog would play a vital rol
e are the following :
Connected cars
Fog computing is ideal for Connected Vehicles (CV) because real-time intera
ctions will make communications between cars, access points and traffic ligh
ts as safe and efficient as possible.
At some point in time, the connected car will start saving lives by reducing
automobile accidents.
Fog computing will be the best option for all internet connected vehicles be
cause fog computing gives real time interaction.
Connected Vehicles communicating each other
Smart grids
Fog computing allows fast, machine-to-machine (M2M) handshakes and hu
man to machine interactions (HMI), which would work in cooperation with
the cloud.
Based on demand for energy, its obtainability and low cost, these smart dev
ices can switch to other energies like solar and winds. The edge process the
data collected by fog collectors and generate control command to the actu
ators. The filtered data are consumed locally and the balance to the higher t
iers for visualization, real-time reports and transactional analytics. Fog supp
orts semi-permanent storage at the highest tier and momentary storage at
the lowest tier.
Decentralized Smart Building Control
Wireless sensors are installed to measure temperature, humidity, or levels of
various gaseous components in the building atmosphere.
Information can be exchanged among all sensors in the floor and the readin
g can be combined to form reliable measurements.
Using distributed decision making the fog devices react to data.
The system gears up to work together to lower the temperature, input fresh
air and output moisture from the air or increase humidity.
Health Care
Fog computing would be able to obtain sensor data on all levels, and integr
ate all the mutually independent network entities within.
The cloud computing market for healthcare is expected to reach $5.4 billion
by 2017, according to a Markets and Markets report, and fog computing
would allow this on a more localized level.
Smart Cities
CONCLUSION
• We have analyzed Fog Computing and its real time applications.
• Fog computing has the ability to handle the data tsunami created by Inte
rnet of Things.
• The characteristics of fog computing like mobility, proximity to end-users,
low latency, location awareness, heterogeneity and due to its real-time ap
plications fog computing platform is considered as the appropriate platfo
rm for Internet of Things.
• By using the concepts of fog computing, if the same device can be used
for these kind of processing, data generated can be put to immediate us
e and deliver a much better user experience.
REFERENCES
1. CISCO Technology Radar Trends Report:
https://techradar.cisco.com/pdf/ciscotechnology-radar.pdf
2. Feds Look to Fight Leaks With ‘Fog of Disinformation’:
http://www.wired.com/2012/07/fog-computing/
3. What Comes After the Cloud? How About the Fog? :
http://spectrum.ieee.org/tech-talk/computing/networks/what-comes-after
thecloud-how-about-the-fog
4. IJRET: International Journal of Research in Engineering and Technology eISSN:
2319-1163 | pISSN: 2321-7308: FOG COMPUTING: A NEW CONCEPT TO
MINIMIZE THE ATTACKS AND TO PROVIDE SECURITY IN CLOUD COMPUTING
ENVIRONMENT BY Sonali Khairnar and Dhanashree Borkar

Contenu connexe

Tendances (20)

Fog computing : The new age Technology
Fog computing : The new age TechnologyFog computing : The new age Technology
Fog computing : The new age Technology
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Fog Computing and Cloud Computing
Fog Computing and Cloud ComputingFog Computing and Cloud Computing
Fog Computing and Cloud Computing
 
Fog computing
Fog computing Fog computing
Fog computing
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog computing
Fog computingFog computing
Fog computing
 
Edge Computing
Edge ComputingEdge Computing
Edge Computing
 
Fog computing
Fog computingFog computing
Fog computing
 
FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Edge Computing : future of IoT ?
Edge Computing : future of IoT ? Edge Computing : future of IoT ?
Edge Computing : future of IoT ?
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentation
 
Fog ppt
Fog pptFog ppt
Fog ppt
 
Edge computing
Edge computingEdge computing
Edge computing
 
Edge computing
Edge computingEdge computing
Edge computing
 
Fog computing
Fog computingFog computing
Fog computing
 
Seminar ppt fog comp
Seminar ppt fog compSeminar ppt fog comp
Seminar ppt fog comp
 
EDGE COMPUTING
EDGE COMPUTINGEDGE COMPUTING
EDGE COMPUTING
 
Edge Computing: Bringing the Internet Closer to You
Edge Computing: Bringing the Internet Closer to YouEdge Computing: Bringing the Internet Closer to You
Edge Computing: Bringing the Internet Closer to You
 

En vedette

What is fog computing
What is fog computingWhat is fog computing
What is fog computingAhmed Banafa
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptpriyanka reddy
 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt sravya raju
 
Disadvantages of Cloud Computing
Disadvantages of Cloud ComputingDisadvantages of Cloud Computing
Disadvantages of Cloud ComputingMaikel Mardjan
 
Cloud Computing - Benefits and Risks
Cloud Computing - Benefits and RisksCloud Computing - Benefits and Risks
Cloud Computing - Benefits and RisksMichael Yung
 
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computingarchana lisbon
 
Security Issues of IoT with Fog
Security Issues of IoT with FogSecurity Issues of IoT with Fog
Security Issues of IoT with FogAchu Anna
 
Fog Computing with VORTEX
Fog Computing with VORTEXFog Computing with VORTEX
Fog Computing with VORTEXAngelo Corsaro
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsDr. Mazlan Abbas
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsLiwei Ren任力偉
 
What is the Internet of Things?
What is the Internet of Things?What is the Internet of Things?
What is the Internet of Things?Felix Grovit
 
What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?Dr. Mazlan Abbas
 

En vedette (20)

Fog computing
Fog computingFog computing
Fog computing
 
What is fog computing
What is fog computingWhat is fog computing
What is fog computing
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud ppt
 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt
 
Utility fog ppt
Utility fog pptUtility fog ppt
Utility fog ppt
 
Utility Fog
Utility FogUtility Fog
Utility Fog
 
Disadvantages of Cloud Computing
Disadvantages of Cloud ComputingDisadvantages of Cloud Computing
Disadvantages of Cloud Computing
 
Cloud Computing - Benefits and Risks
Cloud Computing - Benefits and RisksCloud Computing - Benefits and Risks
Cloud Computing - Benefits and Risks
 
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computing
 
Security Issues of IoT with Fog
Security Issues of IoT with FogSecurity Issues of IoT with Fog
Security Issues of IoT with Fog
 
Fog Computing with VORTEX
Fog Computing with VORTEXFog Computing with VORTEX
Fog Computing with VORTEX
 
Latest Thesis Topics for Fog computing
Latest Thesis Topics for Fog computingLatest Thesis Topics for Fog computing
Latest Thesis Topics for Fog computing
 
Face detection issues
Face detection issuesFace detection issues
Face detection issues
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and Applications
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
What is the Internet of Things?
What is the Internet of Things?What is the Internet of Things?
What is the Internet of Things?
 
What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?
 

Similaire à Fog computing technology

IoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing ModelIoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing ModelAhmed Banafa
 
FOG COMPUTING, what and why a fog computing
FOG COMPUTING, what and why a fog computingFOG COMPUTING, what and why a fog computing
FOG COMPUTING, what and why a fog computingShivangi Bali
 
The Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data ProcessingThe Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data ProcessingFredReynolds2
 
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing IJECEIAES
 
Clarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answersClarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answersRezgar Mohammad
 
Fog computing and internet of things
Fog computing and internet of thingsFog computing and internet of things
Fog computing and internet of thingsRahul Yadav
 
Fog Computing and Its Role in the Internet of Things
Fog Computing and Its Role in the Internet of ThingsFog Computing and Its Role in the Internet of Things
Fog Computing and Its Role in the Internet of ThingsHarshitParkar6677
 
Fog computing presentration
Fog computing presentrationFog computing presentration
Fog computing presentrationmehedi15
 
A Review- Fog Computing and Its Role in the Internet of Things
A Review- Fog Computing and Its Role in the Internet of ThingsA Review- Fog Computing and Its Role in the Internet of Things
A Review- Fog Computing and Its Role in the Internet of ThingsIJERA Editor
 
A Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdfA Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdfEnterprise Wired
 
Fog Computing: Helping the Internet of Things Realize its Potential
Fog Computing: Helping the Internet of Things Realize its PotentialFog Computing: Helping the Internet of Things Realize its Potential
Fog Computing: Helping the Internet of Things Realize its PotentialHarshitParkar6677
 
IOT DATA MANAGEMENT AND COMPUTE STACK.pptx
IOT DATA MANAGEMENT AND COMPUTE STACK.pptxIOT DATA MANAGEMENT AND COMPUTE STACK.pptx
IOT DATA MANAGEMENT AND COMPUTE STACK.pptxMeghaShree665225
 

Similaire à Fog computing technology (20)

Seminar report
Seminar reportSeminar report
Seminar report
 
IoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing ModelIoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing Model
 
fog&Edge computing
fog&Edge computingfog&Edge computing
fog&Edge computing
 
FOG COMPUTING, what and why a fog computing
FOG COMPUTING, what and why a fog computingFOG COMPUTING, what and why a fog computing
FOG COMPUTING, what and why a fog computing
 
The Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data ProcessingThe Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data Processing
 
Fog compute good
Fog compute goodFog compute good
Fog compute good
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
fog computing
fog computingfog computing
fog computing
 
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
 
Clarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answersClarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answers
 
Fog comuting
Fog comutingFog comuting
Fog comuting
 
Fog computing and internet of things
Fog computing and internet of thingsFog computing and internet of things
Fog computing and internet of things
 
Fog Computing and Its Role in the Internet of Things
Fog Computing and Its Role in the Internet of ThingsFog Computing and Its Role in the Internet of Things
Fog Computing and Its Role in the Internet of Things
 
Fog computing presentration
Fog computing presentrationFog computing presentration
Fog computing presentration
 
A Review- Fog Computing and Its Role in the Internet of Things
A Review- Fog Computing and Its Role in the Internet of ThingsA Review- Fog Computing and Its Role in the Internet of Things
A Review- Fog Computing and Its Role in the Internet of Things
 
Fog computing
Fog computingFog computing
Fog computing
 
A Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdfA Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdf
 
Fog Computing: Helping the Internet of Things Realize its Potential
Fog Computing: Helping the Internet of Things Realize its PotentialFog Computing: Helping the Internet of Things Realize its Potential
Fog Computing: Helping the Internet of Things Realize its Potential
 
IOT DATA MANAGEMENT AND COMPUTE STACK.pptx
IOT DATA MANAGEMENT AND COMPUTE STACK.pptxIOT DATA MANAGEMENT AND COMPUTE STACK.pptx
IOT DATA MANAGEMENT AND COMPUTE STACK.pptx
 

Dernier

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 

Dernier (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 

Fog computing technology

  • 1. CS4098 – SEMINAR PRESENTED BY NIKHIL SABU B120792CS FOG COMPUTING TECHNOLOGY
  • 2. CONTENTS • ABSTRACT • INTRODUCTION • CHARACTERISTICS OF FOG COMPUTING • CLOUD vs. FOG • ARCHITECTURE OF FOG TECHNOLOGY • APPLICATIONS OF FOG • CONCLUSION • REFERENCES
  • 3. • Extends Cloud computing and services to the edge of the network. • Similar to Cloud, Fog provides data, compute, storage, and application services to end-users. • Motivations for Fog Computing - Smart Grid, smart traffic lights in vehicular networks and software defined networks. ABSTRACT
  • 4. INTRODUCTION What is fog computing? • Fog computing (aka, Edge computing) is a model in which data, processi ng and applications are concentrated in devices at the network edge rath er than existing almost entirely in the cloud. • The term "Fog Computing" was introduced by the Cisco Systems as new model to ease wireless data transfer to distributed devices in the Internet of Things (IoT) network paradigm. • In Fog Computing, devices communicate peer-to-peer to efficiently share /store data and take local decisions.
  • 5.
  • 6. What is the need for fog computing ? • Fog computing was developed to address applications and services that do not fit the paradigm of the cloud. • Fog Computing keeps data right where the Internet of Things needs it. • Existing data protection mechanisms in Cloud Computing such as encrypt ion failed in securing the data from the attackers. • Limitations of cloud (high latency, security shortcomings, bandwidth, etc.)
  • 7. Cloud architecture before the advent of fog technology
  • 8. Cloud architecture with the advent of fog technology
  • 9. CHARACTERISTICS OF FOG COMPUTING • Edge location, location awareness, and low latency : Fog computing su pport endpoints with finest services at the edge of the network • Geographical distribution : The services and application objective of the fog is widely distributed. • Support for mobility : Using LISP protocol fog devices provide mobility t echniques like decouple host identity to location identity. • Real time interactions : fog computing requires real time interactions for speedy service. • Heterogeneity : Fog nodes can be deployed in a wide variety of environ ments. • Interoperability : Fog components must be able to interoperate in order to give wide range of services like streaming.
  • 10. CLOUD vs. FOG Fog – Solution to Cloud’s Limitations • Reduction in data movement across the network resulting in reduced congestion. • Elimination of bottlenecks resulting from centralized comput ing systems. • Improved security of encrypted data as it stays closer to the end user.
  • 13. ARCHITECTURE OF FOG TECHNOLOGY The design of fog architecture or the key components of fog architecture ar e discussed below: • Heterogeneous Physical Resources • Fog Abstraction Layer • Fog Service Orchestration Layer • Foglet Software Agent • Distributed Database • Policy-Based Service Orchestration
  • 14. Components in Fog architecture
  • 15. Heterogeneous Physical Resources: Heterogeneous in nature, ranging from high-speed links connecting enterpri se data centers and the core to multiple wireless access technologies towar ds the edge. 3G/4G, LTE, WiFi etc. Fog Abstraction Layer: A uniform and programmable interface for seamless resource management and control. The layer provides generic APIs for monitoring, provisioning and controlling physical resources such as CPU, memory, network and energy.
  • 16. Fog Service Orchestration Layer: Provides dynamic, policy-based life-cycle management of Fog services. Managing services on a large volume of Fog nodes with a wide range of ca pabilities is achieved with the following technology and components: • Foglet Software Agent, • Distributed Database, persistent storage to store policies and resource m eta-data, • Policy-Based Service Orchestration, provides policy-based service routing, i.e., routes an incoming service request to the appropriate service instanc e that confirms to the relevant business policies.
  • 17. Policy based orchestration framework of fog technology
  • 18. APPLICATIONS OF FOG • Tech giants Cisco and IBM are the driving forces behind fog computing, a nd link their concept to the emerging Internet of Things (IoT). • Fog has a direct correlation with IoT. • According to CISCO, the important areas where fog would play a vital rol e are the following :
  • 19. Connected cars Fog computing is ideal for Connected Vehicles (CV) because real-time intera ctions will make communications between cars, access points and traffic ligh ts as safe and efficient as possible. At some point in time, the connected car will start saving lives by reducing automobile accidents. Fog computing will be the best option for all internet connected vehicles be cause fog computing gives real time interaction.
  • 21. Smart grids Fog computing allows fast, machine-to-machine (M2M) handshakes and hu man to machine interactions (HMI), which would work in cooperation with the cloud. Based on demand for energy, its obtainability and low cost, these smart dev ices can switch to other energies like solar and winds. The edge process the data collected by fog collectors and generate control command to the actu ators. The filtered data are consumed locally and the balance to the higher t iers for visualization, real-time reports and transactional analytics. Fog supp orts semi-permanent storage at the highest tier and momentary storage at the lowest tier.
  • 22. Decentralized Smart Building Control Wireless sensors are installed to measure temperature, humidity, or levels of various gaseous components in the building atmosphere. Information can be exchanged among all sensors in the floor and the readin g can be combined to form reliable measurements. Using distributed decision making the fog devices react to data. The system gears up to work together to lower the temperature, input fresh air and output moisture from the air or increase humidity.
  • 23. Health Care Fog computing would be able to obtain sensor data on all levels, and integr ate all the mutually independent network entities within. The cloud computing market for healthcare is expected to reach $5.4 billion by 2017, according to a Markets and Markets report, and fog computing would allow this on a more localized level. Smart Cities
  • 24.
  • 25. CONCLUSION • We have analyzed Fog Computing and its real time applications. • Fog computing has the ability to handle the data tsunami created by Inte rnet of Things. • The characteristics of fog computing like mobility, proximity to end-users, low latency, location awareness, heterogeneity and due to its real-time ap plications fog computing platform is considered as the appropriate platfo rm for Internet of Things. • By using the concepts of fog computing, if the same device can be used for these kind of processing, data generated can be put to immediate us e and deliver a much better user experience.
  • 26. REFERENCES 1. CISCO Technology Radar Trends Report: https://techradar.cisco.com/pdf/ciscotechnology-radar.pdf 2. Feds Look to Fight Leaks With ‘Fog of Disinformation’: http://www.wired.com/2012/07/fog-computing/ 3. What Comes After the Cloud? How About the Fog? : http://spectrum.ieee.org/tech-talk/computing/networks/what-comes-after thecloud-how-about-the-fog 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308: FOG COMPUTING: A NEW CONCEPT TO MINIMIZE THE ATTACKS AND TO PROVIDE SECURITY IN CLOUD COMPUTING ENVIRONMENT BY Sonali Khairnar and Dhanashree Borkar