SlideShare une entreprise Scribd logo
1  sur  26
Fog Computing
Under the guidance of:
Prof. V. S. Bhonkar
Presented by:
Miss Chaitali Gajanan Panvalkar
Roll no.:2201955
PRN no.:2030408246001
Institute of Petrochemical Engineering
Department of Information Technology
Dr. Babasaheb Ambedkar Technological University
Seminar on
Index
o What is IoT and Cloud ?
o Fog computing
o Limitations overcome from cloud
o Limitations overcome in fog
o Characteristics of fog computing
o Fog computing architecture
o How fog computing works ?
o Features of fog computing
o Advantages of fog computing
o Limitations of fog computing
o Why fog computing ?
o When to use fog computing ?
o Applications
o Conclusion
o Future scope
o References
What is IoT and Cloud ?
o Cloud Computing is defined as storing and accessing of data and computing
services over the internet.
o The Internet of Things can be described as connecting everyday objects to the
internet.
o IoT applications generate a large amount of data. Transferring this data to the cloud
leads to a number of issues/challenges.
o To overcome these challenges, faced by IoT applications, in the cloud environment,
the term fog computing was introduced by Cisco in the year 2012.
Fog Computing
It is also known as fogging/edge computing.
It is a decentralized computing infrastructure in which data, compute, storage and
applications are located somewhere between the data source and the cloud.
Rather than sending all of data to cloud-based servers to be processed, many of these
devices will create large amounts of raw data and then it will get forwarded to reduce
bandwidth.
Fog is nothing but cloud near end user.
Limitations overcome from cloud
Vulnerability
Depends on internet connection
The level of security
1
3
5
Power consumption
7
High latency
2
4
6
8 Low connection
Technical problem
Downtimes
Limitations overcome in Fog Computing
A lack of centralized processing power.
The ability to process data in real-time.
Increased distributed storage capacity with fog computing.
The ability to adapt more quickly than cloud computing when an outage occurs.
The ability to work better with IoT devices and big data sets.
Data Locality.
Faster Processing of data and power consumption.
Charcteristics of Fog Computing
Geographical
distribution
Real-time
interaction
Close to the end
user
Edge location
Massive sensor
networks
Fog Computing Architecture
The hierarchical fog architecture comprises of following three layers:
1. Terminal Layer
o This layer includes devices like mobile phones, sensors, smart vehicles, readers,
smartcards, etc.
o Devices are distributed across a number of locations separated far apart from each
other.
o The layer mostly deals with data sensing and capturing.
2. Fog Layer
o Fog layer includes devices like routers, gateways, access points, base stations,
specific fog servers, etc., called as Fog nodes.
o Fog nodes are located at the edge of a network. The Fog nodes are situated in-
between end devices and cloud data centers.
o Fog nodes can compute, transfer and store the data temporarily.
3. Cloud Layer
o This layer consists of devices that can provide large storage and machines (servers)
with high performance.
o The data centers are both scalable and provide compute resources on-demand basis.
o It acts as a back-up as well as provides permanent storage for data in a fog
architecture.
Terminal layer
Fog layer
Cloud layer
How Fog Computing works ?
4. Data is analyzed
locally, filtered, and
then sent to the
cloud for long-term
storage if necessary.
1.Works by
utilizing fog nodes
and edge devices.
3. This data is
sent to a fog
node close to the
data source.
2. Raw data is
captured by IoT
beacons.
1
Features of Fog
2 3 4
Aims to place the
data close to the
end user.
Enhance the cloud
experience.
Big data and
analytics can be
done faster with
better results.
Administrators are
able to support
location based
mobility demands.
Advantages of Fog Computing
Productivity
Privacy
Bandwidth
Security
Latency
Fog
computing
Limitations of Fog Computing
Complexity Security Maintenance
Why Fog Computing ?
Reduction of
network traffic
Suitable for
IOT tasks and
Quries
Scalability
Low Latency
requirement
Monitoring
Raw data
management
Resource
Provisioning
When to use Fog Computing ?
1
2
3
4
When only selected data is required to
send to the cloud.
When the data should be analyzed within a
fraction of seconds.
whenever a large number of services need to
be provided over a large area at different
geographical locations.
Devices that are subjected to rigorous
computations and processing’s.
Use
Applications of Fog Computing
Linked vehicles
Real-time analytics
Smart Grids and Smart
Cities:
Connected cars
o Fog computing is ideal for connected
vehicles (CV) because real-time interactions.
o The connected car will start saving lives by
reducing automobile accidents.
Decentralized smart building control
o Wireless sensors are installed to measure temperature,
humidity, or levels of various gaseous components in the
building atmosphere.
o Information can be exchanged among all sensors in the
floor.
Smart cities
o Fog computing would be able to obtain
sensor data on all levels, and integrate
all the mutually independent network
entities within.
Conclusion
o The key advantages of fog computing are greater comparing to cloud
computing.
o Fog provides unprecedented levels of security in the cloud and in social
networks.
o The usage of fog computing can accelerate the innovation process in ways
that has never been seen before.
Future Scope
Fog computing is the future for organizations. It has several
advantages over cloud computing.
Cloud computing for IoT may fade away but fog computing will
take over.
Fog computing is the key to accomplish this critical work. It can
boost usability and accessibility in various computing environments
Any Questions ?
THANK YOU
References
1. Bonomi, Flavio (September 19–23, 2011). "Connected Vehicles, the Internet of Things,
and Fog Computing, The 8th ACM International Workshop on VehiculAr Inter-
NETworking (VANET 2011), Las Vegas, NV, USA". www.sigmobile.org.
Retrieved 2019-08-07.
2. "What Is Fog Computing? Webopedia Definition". www.webopedia.com.
Retrieved 2017-04-07.
3. Bonomi, F., Milito, R., Zhu, J., and Addepalli, S. Fog Computing and its Role in the
Internet of Things. In Proc of MCC (2012), pp. 13-16.[4].
4. "Fog brings the cloud closer to the ground: Cisco innovates in fog
computing". newsroom.cisco.com. Retrieved 2019-01-24.

Contenu connexe

Similaire à semppt.pptx

A Review- Fog Computing and Its Role in the Internet of Things
A Review- Fog Computing and Its Role in the Internet of ThingsA Review- Fog Computing and Its Role in the Internet of Things
A Review- Fog Computing and Its Role in the Internet of ThingsIJERA Editor
 
Fog computing and internet of things
Fog computing and internet of thingsFog computing and internet of things
Fog computing and internet of thingsRahul Yadav
 
Fog Computing and Its Role in the Internet of Things
Fog Computing and Its Role in the Internet of ThingsFog Computing and Its Role in the Internet of Things
Fog Computing and Its Role in the Internet of ThingsHarshitParkar6677
 
IoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing ModelIoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing ModelAhmed Banafa
 
Security and privacy issues of fog
Security and privacy issues of fogSecurity and privacy issues of fog
Security and privacy issues of fogRezgar Mohammad
 
EDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGESEDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGESsuthi
 
Cloud and Edge Computing Systems
Cloud and Edge Computing SystemsCloud and Edge Computing Systems
Cloud and Edge Computing SystemsSayed Chhattan Shah
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentIJCNCJournal
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentIJCNCJournal
 
Security and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A SurveySecurity and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A SurveyHarshitParkar6677
 
Fog computing technology
Fog computing technologyFog computing technology
Fog computing technologyNikhil Sabu
 
Fog computing : The new age Technology
Fog computing : The new age TechnologyFog computing : The new age Technology
Fog computing : The new age TechnologyPrankit Mishra
 

Similaire à semppt.pptx (20)

A Review- Fog Computing and Its Role in the Internet of Things
A Review- Fog Computing and Its Role in the Internet of ThingsA Review- Fog Computing and Its Role in the Internet of Things
A Review- Fog Computing and Its Role in the Internet of Things
 
Seminar report
Seminar reportSeminar report
Seminar report
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog computing and internet of things
Fog computing and internet of thingsFog computing and internet of things
Fog computing and internet of things
 
Fog Computing and Its Role in the Internet of Things
Fog Computing and Its Role in the Internet of ThingsFog Computing and Its Role in the Internet of Things
Fog Computing and Its Role in the Internet of Things
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
fog computing
fog computingfog computing
fog computing
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Fog computing 000
Fog computing 000Fog computing 000
Fog computing 000
 
Fog security
Fog securityFog security
Fog security
 
IoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing ModelIoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing Model
 
Security and privacy issues of fog
Security and privacy issues of fogSecurity and privacy issues of fog
Security and privacy issues of fog
 
EDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGESEDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGES
 
Cloud and Edge Computing Systems
Cloud and Edge Computing SystemsCloud and Edge Computing Systems
Cloud and Edge Computing Systems
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
 
Security and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A SurveySecurity and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A Survey
 
Fog computing technology
Fog computing technologyFog computing technology
Fog computing technology
 
Fog computing : The new age Technology
Fog computing : The new age TechnologyFog computing : The new age Technology
Fog computing : The new age Technology
 

Dernier

Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxBridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxnuruddin69
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...soginsider
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesRAJNEESHKUMAR341697
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARKOUSTAV SARKAR
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksMagic Marks
 
Air Compressor reciprocating single stage
Air Compressor reciprocating single stageAir Compressor reciprocating single stage
Air Compressor reciprocating single stageAbc194748
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...HenryBriggs2
 

Dernier (20)

Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxBridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptx
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 
Air Compressor reciprocating single stage
Air Compressor reciprocating single stageAir Compressor reciprocating single stage
Air Compressor reciprocating single stage
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 

semppt.pptx

  • 1. Fog Computing Under the guidance of: Prof. V. S. Bhonkar Presented by: Miss Chaitali Gajanan Panvalkar Roll no.:2201955 PRN no.:2030408246001 Institute of Petrochemical Engineering Department of Information Technology Dr. Babasaheb Ambedkar Technological University Seminar on
  • 2. Index o What is IoT and Cloud ? o Fog computing o Limitations overcome from cloud o Limitations overcome in fog o Characteristics of fog computing o Fog computing architecture o How fog computing works ? o Features of fog computing o Advantages of fog computing o Limitations of fog computing o Why fog computing ? o When to use fog computing ? o Applications o Conclusion o Future scope o References
  • 3. What is IoT and Cloud ? o Cloud Computing is defined as storing and accessing of data and computing services over the internet. o The Internet of Things can be described as connecting everyday objects to the internet. o IoT applications generate a large amount of data. Transferring this data to the cloud leads to a number of issues/challenges. o To overcome these challenges, faced by IoT applications, in the cloud environment, the term fog computing was introduced by Cisco in the year 2012.
  • 4. Fog Computing It is also known as fogging/edge computing. It is a decentralized computing infrastructure in which data, compute, storage and applications are located somewhere between the data source and the cloud. Rather than sending all of data to cloud-based servers to be processed, many of these devices will create large amounts of raw data and then it will get forwarded to reduce bandwidth. Fog is nothing but cloud near end user.
  • 5. Limitations overcome from cloud Vulnerability Depends on internet connection The level of security 1 3 5 Power consumption 7 High latency 2 4 6 8 Low connection Technical problem Downtimes
  • 6. Limitations overcome in Fog Computing A lack of centralized processing power. The ability to process data in real-time. Increased distributed storage capacity with fog computing. The ability to adapt more quickly than cloud computing when an outage occurs. The ability to work better with IoT devices and big data sets. Data Locality. Faster Processing of data and power consumption.
  • 7. Charcteristics of Fog Computing Geographical distribution Real-time interaction Close to the end user Edge location Massive sensor networks
  • 8. Fog Computing Architecture The hierarchical fog architecture comprises of following three layers: 1. Terminal Layer o This layer includes devices like mobile phones, sensors, smart vehicles, readers, smartcards, etc. o Devices are distributed across a number of locations separated far apart from each other. o The layer mostly deals with data sensing and capturing.
  • 9. 2. Fog Layer o Fog layer includes devices like routers, gateways, access points, base stations, specific fog servers, etc., called as Fog nodes. o Fog nodes are located at the edge of a network. The Fog nodes are situated in- between end devices and cloud data centers. o Fog nodes can compute, transfer and store the data temporarily.
  • 10. 3. Cloud Layer o This layer consists of devices that can provide large storage and machines (servers) with high performance. o The data centers are both scalable and provide compute resources on-demand basis. o It acts as a back-up as well as provides permanent storage for data in a fog architecture.
  • 12. How Fog Computing works ? 4. Data is analyzed locally, filtered, and then sent to the cloud for long-term storage if necessary. 1.Works by utilizing fog nodes and edge devices. 3. This data is sent to a fog node close to the data source. 2. Raw data is captured by IoT beacons.
  • 13. 1 Features of Fog 2 3 4 Aims to place the data close to the end user. Enhance the cloud experience. Big data and analytics can be done faster with better results. Administrators are able to support location based mobility demands.
  • 14. Advantages of Fog Computing Productivity Privacy Bandwidth Security Latency Fog computing
  • 15. Limitations of Fog Computing Complexity Security Maintenance
  • 16. Why Fog Computing ? Reduction of network traffic Suitable for IOT tasks and Quries Scalability Low Latency requirement Monitoring Raw data management Resource Provisioning
  • 17. When to use Fog Computing ? 1 2 3 4 When only selected data is required to send to the cloud. When the data should be analyzed within a fraction of seconds. whenever a large number of services need to be provided over a large area at different geographical locations. Devices that are subjected to rigorous computations and processing’s. Use
  • 18. Applications of Fog Computing Linked vehicles Real-time analytics Smart Grids and Smart Cities:
  • 19. Connected cars o Fog computing is ideal for connected vehicles (CV) because real-time interactions. o The connected car will start saving lives by reducing automobile accidents.
  • 20. Decentralized smart building control o Wireless sensors are installed to measure temperature, humidity, or levels of various gaseous components in the building atmosphere. o Information can be exchanged among all sensors in the floor.
  • 21. Smart cities o Fog computing would be able to obtain sensor data on all levels, and integrate all the mutually independent network entities within.
  • 22. Conclusion o The key advantages of fog computing are greater comparing to cloud computing. o Fog provides unprecedented levels of security in the cloud and in social networks. o The usage of fog computing can accelerate the innovation process in ways that has never been seen before.
  • 23. Future Scope Fog computing is the future for organizations. It has several advantages over cloud computing. Cloud computing for IoT may fade away but fog computing will take over. Fog computing is the key to accomplish this critical work. It can boost usability and accessibility in various computing environments
  • 26. References 1. Bonomi, Flavio (September 19–23, 2011). "Connected Vehicles, the Internet of Things, and Fog Computing, The 8th ACM International Workshop on VehiculAr Inter- NETworking (VANET 2011), Las Vegas, NV, USA". www.sigmobile.org. Retrieved 2019-08-07. 2. "What Is Fog Computing? Webopedia Definition". www.webopedia.com. Retrieved 2017-04-07. 3. Bonomi, F., Milito, R., Zhu, J., and Addepalli, S. Fog Computing and its Role in the Internet of Things. In Proc of MCC (2012), pp. 13-16.[4]. 4. "Fog brings the cloud closer to the ground: Cisco innovates in fog computing". newsroom.cisco.com. Retrieved 2019-01-24.

Notes de l'éditeur

  1. It offers better security. Fog nodes are mobile in nature. Hence they can join and left the network at any time. It is easy to develop fog applications using the right tool that can drive machines as power customers needs. Fog nodes, such as tracks, cars, factory floors can survive harsh environmental conditions. Fog computing offers a reduction in latency as data are analyzed locally. This is due to less round trip time and is also a fewer amount of data bandwidth. It reduces the latency requirement and hence quick decisions can be made. This helps in avoiding accidents. It process selected data locally instead of sending them to the cloud for processing. This computing offers better privacy to the user’s data as they are analyzed locally instead of sending them to the cloud. The IT team can manage everything and control the devices.